]> git.ipfire.org Git - thirdparty/git.git/blame - builtin/receive-pack.c
shallow: extract a header file for shallow-related functions
[thirdparty/git.git] / builtin / receive-pack.c
CommitLineData
1e4cd68c 1#include "builtin.h"
a49d2834 2#include "repository.h"
b2141fc1 3#include "config.h"
697cc8ef 4#include "lockfile.h"
fc04c412 5#include "pack.h"
8a65ff76 6#include "refs.h"
f3a3214e 7#include "pkt-line.h"
38a81b4e 8#include "sideband.h"
b1bf95bb 9#include "run-command.h"
d807c4a0 10#include "exec-cmd.h"
11031d7e
JS
11#include "commit.h"
12#include "object.h"
d79796bc 13#include "remote.h"
47a59185 14#include "connect.h"
da3efdb1 15#include "string-list.h"
cff38a5e 16#include "sha1-array.h"
52fed6e1 17#include "connected.h"
31c42bff 18#include "argv-array.h"
ff5effdf 19#include "version.h"
d05b9618
JH
20#include "tag.h"
21#include "gpg-interface.h"
ec7dbd14 22#include "sigchain.h"
5d477a33 23#include "fsck.h"
722ff7f8 24#include "tmp-objdir.h"
ab6eea6f 25#include "oidset.h"
3836d88a 26#include "packfile.h"
cbd53a21 27#include "object-store.h"
aa9bab29 28#include "protocol.h"
64043556 29#include "commit-reach.h"
4ef34648 30#include "worktree.h"
120ad2b0 31#include "shallow.h"
575f4974 32
1b68387e
SS
33static const char * const receive_pack_usage[] = {
34 N_("git receive-pack <git-dir>"),
35 NULL
36};
575f4974 37
986e8239 38enum deny_action {
3d95d92b 39 DENY_UNCONFIGURED,
986e8239
JK
40 DENY_IGNORE,
41 DENY_WARN,
1404bcbb
JS
42 DENY_REFUSE,
43 DENY_UPDATE_INSTEAD
986e8239
JK
44};
45
1b53a076
JH
46static int deny_deletes;
47static int deny_non_fast_forwards;
3d95d92b 48static enum deny_action deny_current_branch = DENY_UNCONFIGURED;
747ca245 49static enum deny_action deny_delete_current = DENY_UNCONFIGURED;
dab76d3a
JH
50static int receive_fsck_objects = -1;
51static int transfer_fsck_objects = -1;
5d477a33 52static struct strbuf fsck_msg_types = STRBUF_INIT;
e28714c5
JH
53static int receive_unpack_limit = -1;
54static int transfer_unpack_limit = -1;
1b70fe5d 55static int advertise_atomic_push = 1;
c714e45f 56static int advertise_push_options;
46732fae 57static int unpack_limit = 100;
c08db5a2 58static off_t max_input_size;
96f1e58f 59static int report_status;
38a81b4e 60static int use_sideband;
68deed29 61static int use_atomic;
c714e45f 62static int use_push_options;
c207e34f 63static int quiet;
b74fce16 64static int prefer_ofs_delta = 1;
77e3efbf
JH
65static int auto_update_server_info;
66static int auto_gc = 1;
1b68387e 67static int reject_thin;
5732373d
JH
68static int stateless_rpc;
69static const char *service_dir;
747ca245 70static const char *head_name;
96ec7b1e 71static void *head_name_to_free;
185c04e0 72static int sent_capabilities;
0a1bc12b 73static int shallow_update;
5dbd7676 74static const char *alt_shallow_file;
a85b377d 75static struct strbuf push_cert = STRBUF_INIT;
a09c985e 76static struct object_id push_cert_oid;
d05b9618 77static struct signature_check sigcheck;
b89363e4
JH
78static const char *push_cert_nonce;
79static const char *cert_nonce_seed;
80
81static const char *NONCE_UNSOLICITED = "UNSOLICITED";
82static const char *NONCE_BAD = "BAD";
83static const char *NONCE_MISSING = "MISSING";
84static const char *NONCE_OK = "OK";
5732373d 85static const char *NONCE_SLOP = "SLOP";
b89363e4 86static const char *nonce_status;
5732373d 87static long nonce_stamp_slop;
dddbad72 88static timestamp_t nonce_stamp_slop_limit;
222368c6 89static struct ref_transaction *transaction;
cfee10a7 90
83558686
JK
91static enum {
92 KEEPALIVE_NEVER = 0,
93 KEEPALIVE_AFTER_NUL,
94 KEEPALIVE_ALWAYS
95} use_keepalive;
96static int keepalive_in_sec = 5;
97
722ff7f8
JK
98static struct tmp_objdir *tmp_objdir;
99
986e8239
JK
100static enum deny_action parse_deny_action(const char *var, const char *value)
101{
102 if (value) {
103 if (!strcasecmp(value, "ignore"))
104 return DENY_IGNORE;
105 if (!strcasecmp(value, "warn"))
106 return DENY_WARN;
107 if (!strcasecmp(value, "refuse"))
108 return DENY_REFUSE;
1404bcbb
JS
109 if (!strcasecmp(value, "updateinstead"))
110 return DENY_UPDATE_INSTEAD;
986e8239
JK
111 }
112 if (git_config_bool(var, value))
113 return DENY_REFUSE;
114 return DENY_IGNORE;
115}
116
ef90d6d4 117static int receive_pack_config(const char *var, const char *value, void *cb)
6fb75bed 118{
daebaa78
JH
119 int status = parse_hide_refs_config(var, value, "receive");
120
121 if (status)
122 return status;
123
a240de11
JK
124 if (strcmp(var, "receive.denydeletes") == 0) {
125 deny_deletes = git_config_bool(var, value);
126 return 0;
127 }
128
e28714c5 129 if (strcmp(var, "receive.denynonfastforwards") == 0) {
6fb75bed
SP
130 deny_non_fast_forwards = git_config_bool(var, value);
131 return 0;
132 }
133
e28714c5
JH
134 if (strcmp(var, "receive.unpacklimit") == 0) {
135 receive_unpack_limit = git_config_int(var, value);
fc04c412
SP
136 return 0;
137 }
138
e28714c5
JH
139 if (strcmp(var, "transfer.unpacklimit") == 0) {
140 transfer_unpack_limit = git_config_int(var, value);
141 return 0;
142 }
143
cd94c6f9
JS
144 if (strcmp(var, "receive.fsck.skiplist") == 0) {
145 const char *path;
146
147 if (git_config_pathname(&path, var, value))
148 return 1;
149 strbuf_addf(&fsck_msg_types, "%cskiplist=%s",
150 fsck_msg_types.len ? ',' : '=', path);
151 free((char *)path);
152 return 0;
153 }
154
5d477a33
JS
155 if (skip_prefix(var, "receive.fsck.", &var)) {
156 if (is_valid_msg_type(var, value))
157 strbuf_addf(&fsck_msg_types, "%c%s=%s",
158 fsck_msg_types.len ? ',' : '=', var, value);
159 else
160 warning("Skipping unknown msg id '%s'", var);
161 return 0;
162 }
163
20dc0016
MK
164 if (strcmp(var, "receive.fsckobjects") == 0) {
165 receive_fsck_objects = git_config_bool(var, value);
166 return 0;
167 }
168
dab76d3a
JH
169 if (strcmp(var, "transfer.fsckobjects") == 0) {
170 transfer_fsck_objects = git_config_bool(var, value);
171 return 0;
172 }
173
986e8239
JK
174 if (!strcmp(var, "receive.denycurrentbranch")) {
175 deny_current_branch = parse_deny_action(var, value);
176 return 0;
177 }
178
747ca245
JH
179 if (strcmp(var, "receive.denydeletecurrent") == 0) {
180 deny_delete_current = parse_deny_action(var, value);
181 return 0;
182 }
183
b74fce16
NP
184 if (strcmp(var, "repack.usedeltabaseoffset") == 0) {
185 prefer_ofs_delta = git_config_bool(var, value);
186 return 0;
187 }
188
77e3efbf
JH
189 if (strcmp(var, "receive.updateserverinfo") == 0) {
190 auto_update_server_info = git_config_bool(var, value);
191 return 0;
192 }
193
194 if (strcmp(var, "receive.autogc") == 0) {
195 auto_gc = git_config_bool(var, value);
196 return 0;
197 }
198
0a1bc12b
NTND
199 if (strcmp(var, "receive.shallowupdate") == 0) {
200 shallow_update = git_config_bool(var, value);
201 return 0;
202 }
203
b89363e4
JH
204 if (strcmp(var, "receive.certnonceseed") == 0)
205 return git_config_string(&cert_nonce_seed, var, value);
a85b377d 206
5732373d
JH
207 if (strcmp(var, "receive.certnonceslop") == 0) {
208 nonce_stamp_slop_limit = git_config_ulong(var, value);
209 return 0;
210 }
211
1b70fe5d
RS
212 if (strcmp(var, "receive.advertiseatomic") == 0) {
213 advertise_atomic_push = git_config_bool(var, value);
214 return 0;
215 }
216
c714e45f
SB
217 if (strcmp(var, "receive.advertisepushoptions") == 0) {
218 advertise_push_options = git_config_bool(var, value);
219 return 0;
220 }
221
83558686
JK
222 if (strcmp(var, "receive.keepalive") == 0) {
223 keepalive_in_sec = git_config_int(var, value);
224 return 0;
225 }
226
c08db5a2
JK
227 if (strcmp(var, "receive.maxinputsize") == 0) {
228 max_input_size = git_config_int64(var, value);
229 return 0;
230 }
231
ef90d6d4 232 return git_default_config(var, value, cb);
6fb75bed
SP
233}
234
1b7ba794 235static void show_ref(const char *path, const struct object_id *oid)
575f4974 236{
52d2ae58 237 if (sent_capabilities) {
1b7ba794 238 packet_write_fmt(1, "%s %s\n", oid_to_hex(oid), path);
52d2ae58
JH
239 } else {
240 struct strbuf cap = STRBUF_INIT;
241
242 strbuf_addstr(&cap,
243 "report-status delete-refs side-band-64k quiet");
1b70fe5d
RS
244 if (advertise_atomic_push)
245 strbuf_addstr(&cap, " atomic");
52d2ae58
JH
246 if (prefer_ofs_delta)
247 strbuf_addstr(&cap, " ofs-delta");
b89363e4
JH
248 if (push_cert_nonce)
249 strbuf_addf(&cap, " push-cert=%s", push_cert_nonce);
c714e45f
SB
250 if (advertise_push_options)
251 strbuf_addstr(&cap, " push-options");
52d2ae58 252 strbuf_addf(&cap, " agent=%s", git_user_agent_sanitized());
81c634e9 253 packet_write_fmt(1, "%s %s%c%s\n",
1b7ba794 254 oid_to_hex(oid), path, 0, cap.buf);
52d2ae58
JH
255 strbuf_release(&cap);
256 sent_capabilities = 1;
257 }
575f4974
LT
258}
259
78a766ab 260static int show_ref_cb(const char *path_full, const struct object_id *oid,
8b24b9e7 261 int flag, void *data)
6b01ecfe 262{
8b24b9e7 263 struct oidset *seen = data;
78a766ab
LF
264 const char *path = strip_namespace(path_full);
265
266 if (ref_is_hidden(path, path_full))
267 return 0;
268
6b01ecfe
JT
269 /*
270 * Advertise refs outside our current namespace as ".have"
271 * refs, so that the client can use them to minimize data
fea6c47f 272 * transfer but will otherwise ignore them.
6b01ecfe 273 */
8b24b9e7
JK
274 if (!path) {
275 if (oidset_insert(seen, oid))
276 return 0;
6b01ecfe 277 path = ".have";
63d428e6
JK
278 } else {
279 oidset_insert(seen, oid);
8b24b9e7 280 }
1b7ba794 281 show_ref(path, oid);
bc98201d 282 return 0;
6b01ecfe
JT
283}
284
bdf4276c 285static void show_one_alternate_ref(const struct object_id *oid,
ab6eea6f 286 void *data)
b7a025d9 287{
ab6eea6f 288 struct oidset *seen = data;
b7a025d9 289
ab6eea6f
JK
290 if (oidset_insert(seen, oid))
291 return;
292
1b7ba794 293 show_ref(".have", oid);
6b01ecfe
JT
294}
295
8a65ff76 296static void write_head_info(void)
575f4974 297{
ab6eea6f 298 static struct oidset seen = OIDSET_INIT;
2b2a5be3 299
63d428e6 300 for_each_ref(show_ref_cb, &seen);
ab6eea6f
JK
301 for_each_alternate_ref(show_one_alternate_ref, &seen);
302 oidset_clear(&seen);
185c04e0 303 if (!sent_capabilities)
1b7ba794 304 show_ref("capabilities^{}", &null_oid);
cfee10a7 305
ad491366
NTND
306 advertise_shallow_grafts(1);
307
b7a025d9
MH
308 /* EOF */
309 packet_flush(1);
575f4974
LT
310}
311
eb1af2df
LT
312struct command {
313 struct command *next;
cfee10a7 314 const char *error_string;
160b81ed
PYH
315 unsigned int skip_update:1,
316 did_not_exist:1;
5dbd7676 317 int index;
9c44ea44 318 struct object_id old_oid;
319 struct object_id new_oid;
8f1d2e6f 320 char ref_name[FLEX_ARRAY]; /* more */
575f4974
LT
321};
322
466dbc42
SP
323static void rp_error(const char *err, ...) __attribute__((format (printf, 1, 2)));
324static void rp_warning(const char *err, ...) __attribute__((format (printf, 1, 2)));
325
326static void report_message(const char *prefix, const char *err, va_list params)
327{
b7115a35 328 int sz;
466dbc42
SP
329 char msg[4096];
330
b7115a35 331 sz = xsnprintf(msg, sizeof(msg), "%s", prefix);
466dbc42
SP
332 sz += vsnprintf(msg + sz, sizeof(msg) - sz, err, params);
333 if (sz > (sizeof(msg) - 1))
334 sz = sizeof(msg) - 1;
335 msg[sz++] = '\n';
336
337 if (use_sideband)
338 send_sideband(1, 2, msg, sz, use_sideband);
339 else
340 xwrite(2, msg, sz);
341}
342
343static void rp_warning(const char *err, ...)
344{
345 va_list params;
346 va_start(params, err);
347 report_message("warning: ", err, params);
348 va_end(params);
349}
350
351static void rp_error(const char *err, ...)
352{
353 va_list params;
354 va_start(params, err);
355 report_message("error: ", err, params);
356 va_end(params);
357}
358
6d525d38
SP
359static int copy_to_sideband(int in, int out, void *arg)
360{
361 char data[128];
83558686
JK
362 int keepalive_active = 0;
363
364 if (keepalive_in_sec <= 0)
365 use_keepalive = KEEPALIVE_NEVER;
366 if (use_keepalive == KEEPALIVE_ALWAYS)
367 keepalive_active = 1;
368
6d525d38 369 while (1) {
83558686
JK
370 ssize_t sz;
371
372 if (keepalive_active) {
373 struct pollfd pfd;
374 int ret;
375
376 pfd.fd = in;
377 pfd.events = POLLIN;
378 ret = poll(&pfd, 1, 1000 * keepalive_in_sec);
379
380 if (ret < 0) {
381 if (errno == EINTR)
382 continue;
383 else
384 break;
385 } else if (ret == 0) {
386 /* no data; send a keepalive packet */
387 static const char buf[] = "0005\1";
388 write_or_die(1, buf, sizeof(buf) - 1);
389 continue;
390 } /* else there is actual data to read */
391 }
392
393 sz = xread(in, data, sizeof(data));
6d525d38
SP
394 if (sz <= 0)
395 break;
83558686
JK
396
397 if (use_keepalive == KEEPALIVE_AFTER_NUL && !keepalive_active) {
398 const char *p = memchr(data, '\0', sz);
399 if (p) {
400 /*
401 * The NUL tells us to start sending keepalives. Make
402 * sure we send any other data we read along
403 * with it.
404 */
405 keepalive_active = 1;
406 send_sideband(1, 2, data, p - data, use_sideband);
407 send_sideband(1, 2, p + 1, sz - (p - data + 1), use_sideband);
408 continue;
409 }
410 }
411
412 /*
413 * Either we're not looking for a NUL signal, or we didn't see
414 * it yet; just pass along the data.
415 */
6d525d38
SP
416 send_sideband(1, 2, data, sz, use_sideband);
417 }
418 close(in);
419 return 0;
420}
421
fabec2c5 422static void hmac(unsigned char *out,
b89363e4
JH
423 const char *key_in, size_t key_len,
424 const char *text, size_t text_len)
425{
fabec2c5 426 unsigned char key[GIT_MAX_BLKSZ];
427 unsigned char k_ipad[GIT_MAX_BLKSZ];
428 unsigned char k_opad[GIT_MAX_BLKSZ];
b89363e4 429 int i;
fabec2c5 430 git_hash_ctx ctx;
b89363e4
JH
431
432 /* RFC 2104 2. (1) */
fabec2c5 433 memset(key, '\0', GIT_MAX_BLKSZ);
434 if (the_hash_algo->blksz < key_len) {
435 the_hash_algo->init_fn(&ctx);
436 the_hash_algo->update_fn(&ctx, key_in, key_len);
437 the_hash_algo->final_fn(key, &ctx);
b89363e4
JH
438 } else {
439 memcpy(key, key_in, key_len);
440 }
441
442 /* RFC 2104 2. (2) & (5) */
443 for (i = 0; i < sizeof(key); i++) {
444 k_ipad[i] = key[i] ^ 0x36;
445 k_opad[i] = key[i] ^ 0x5c;
446 }
447
448 /* RFC 2104 2. (3) & (4) */
fabec2c5 449 the_hash_algo->init_fn(&ctx);
450 the_hash_algo->update_fn(&ctx, k_ipad, sizeof(k_ipad));
451 the_hash_algo->update_fn(&ctx, text, text_len);
452 the_hash_algo->final_fn(out, &ctx);
b89363e4
JH
453
454 /* RFC 2104 2. (6) & (7) */
fabec2c5 455 the_hash_algo->init_fn(&ctx);
456 the_hash_algo->update_fn(&ctx, k_opad, sizeof(k_opad));
457 the_hash_algo->update_fn(&ctx, out, the_hash_algo->rawsz);
458 the_hash_algo->final_fn(out, &ctx);
b89363e4
JH
459}
460
dddbad72 461static char *prepare_push_cert_nonce(const char *path, timestamp_t stamp)
b89363e4
JH
462{
463 struct strbuf buf = STRBUF_INIT;
fabec2c5 464 unsigned char hash[GIT_MAX_RAWSZ];
b89363e4 465
cb71f8bd 466 strbuf_addf(&buf, "%s:%"PRItime, path, stamp);
fabec2c5 467 hmac(hash, buf.buf, buf.len, cert_nonce_seed, strlen(cert_nonce_seed));
b89363e4
JH
468 strbuf_release(&buf);
469
470 /* RFC 2104 5. HMAC-SHA1-80 */
fc06be3b 471 strbuf_addf(&buf, "%"PRItime"-%.*s", stamp, (int)the_hash_algo->hexsz, hash_to_hex(hash));
b89363e4
JH
472 return strbuf_detach(&buf, NULL);
473}
474
475/*
476 * NEEDSWORK: reuse find_commit_header() from jk/commit-author-parsing
477 * after dropping "_commit" from its name and possibly moving it out
478 * of commit.c
479 */
cbaf82cc
JT
480static char *find_header(const char *msg, size_t len, const char *key,
481 const char **next_line)
b89363e4
JH
482{
483 int key_len = strlen(key);
484 const char *line = msg;
485
486 while (line && line < msg + len) {
487 const char *eol = strchrnul(line, '\n');
488
489 if ((msg + len <= eol) || line == eol)
490 return NULL;
491 if (line + key_len < eol &&
492 !memcmp(line, key, key_len) && line[key_len] == ' ') {
493 int offset = key_len + 1;
cbaf82cc
JT
494 if (next_line)
495 *next_line = *eol ? eol + 1 : eol;
b89363e4
JH
496 return xmemdupz(line + offset, (eol - line) - offset);
497 }
498 line = *eol ? eol + 1 : NULL;
499 }
500 return NULL;
501}
502
503static const char *check_nonce(const char *buf, size_t len)
504{
cbaf82cc 505 char *nonce = find_header(buf, len, "nonce", NULL);
dddbad72 506 timestamp_t stamp, ostamp;
5732373d 507 char *bohmac, *expect = NULL;
b89363e4
JH
508 const char *retval = NONCE_BAD;
509
510 if (!nonce) {
511 retval = NONCE_MISSING;
512 goto leave;
513 } else if (!push_cert_nonce) {
514 retval = NONCE_UNSOLICITED;
515 goto leave;
516 } else if (!strcmp(push_cert_nonce, nonce)) {
517 retval = NONCE_OK;
518 goto leave;
519 }
520
5732373d
JH
521 if (!stateless_rpc) {
522 /* returned nonce MUST match what we gave out earlier */
523 retval = NONCE_BAD;
524 goto leave;
525 }
526
527 /*
528 * In stateless mode, we may be receiving a nonce issued by
529 * another instance of the server that serving the same
530 * repository, and the timestamps may not match, but the
531 * nonce-seed and dir should match, so we can recompute and
532 * report the time slop.
533 *
534 * In addition, when a nonce issued by another instance has
535 * timestamp within receive.certnonceslop seconds, we pretend
536 * as if we issued that nonce when reporting to the hook.
537 */
538
539 /* nonce is concat(<seconds-since-epoch>, "-", <hmac>) */
540 if (*nonce <= '0' || '9' < *nonce) {
541 retval = NONCE_BAD;
542 goto leave;
543 }
1aeb7e75 544 stamp = parse_timestamp(nonce, &bohmac, 10);
5732373d
JH
545 if (bohmac == nonce || bohmac[0] != '-') {
546 retval = NONCE_BAD;
547 goto leave;
548 }
549
550 expect = prepare_push_cert_nonce(service_dir, stamp);
551 if (strcmp(expect, nonce)) {
552 /* Not what we would have signed earlier */
553 retval = NONCE_BAD;
554 goto leave;
555 }
556
557 /*
558 * By how many seconds is this nonce stale? Negative value
559 * would mean it was issued by another server with its clock
560 * skewed in the future.
561 */
1aeb7e75 562 ostamp = parse_timestamp(push_cert_nonce, NULL, 10);
5732373d
JH
563 nonce_stamp_slop = (long)ostamp - (long)stamp;
564
565 if (nonce_stamp_slop_limit &&
31a8aa1e 566 labs(nonce_stamp_slop) <= nonce_stamp_slop_limit) {
5732373d
JH
567 /*
568 * Pretend as if the received nonce (which passes the
569 * HMAC check, so it is not a forged by third-party)
570 * is what we issued.
571 */
572 free((void *)push_cert_nonce);
573 push_cert_nonce = xstrdup(nonce);
574 retval = NONCE_OK;
575 } else {
576 retval = NONCE_SLOP;
577 }
b89363e4
JH
578
579leave:
580 free(nonce);
5732373d 581 free(expect);
b89363e4
JH
582 return retval;
583}
584
cbaf82cc
JT
585/*
586 * Return 1 if there is no push_cert or if the push options in push_cert are
587 * the same as those in the argument; 0 otherwise.
588 */
589static int check_cert_push_options(const struct string_list *push_options)
590{
591 const char *buf = push_cert.buf;
592 int len = push_cert.len;
593
594 char *option;
595 const char *next_line;
596 int options_seen = 0;
597
598 int retval = 1;
599
600 if (!len)
601 return 1;
602
603 while ((option = find_header(buf, len, "push-option", &next_line))) {
604 len -= (next_line - buf);
605 buf = next_line;
606 options_seen++;
607 if (options_seen > push_options->nr
608 || strcmp(option,
609 push_options->items[options_seen - 1].string)) {
610 retval = 0;
611 goto leave;
612 }
613 free(option);
614 }
615
616 if (options_seen != push_options->nr)
617 retval = 0;
618
619leave:
620 free(option);
621 return retval;
622}
623
a85b377d
JH
624static void prepare_push_cert_sha1(struct child_process *proc)
625{
626 static int already_done;
a85b377d
JH
627
628 if (!push_cert.len)
629 return;
630
631 if (!already_done) {
d05b9618
JH
632 int bogs /* beginning_of_gpg_sig */;
633
a85b377d 634 already_done = 1;
a09c985e
PO
635 if (write_object_file(push_cert.buf, push_cert.len, "blob",
636 &push_cert_oid))
637 oidclr(&push_cert_oid);
d05b9618
JH
638
639 memset(&sigcheck, '\0', sizeof(sigcheck));
d05b9618
JH
640
641 bogs = parse_signature(push_cert.buf, push_cert.len);
3b9291e1
HS
642 check_signature(push_cert.buf, bogs, push_cert.buf + bogs,
643 push_cert.len - bogs, &sigcheck);
d05b9618 644
b89363e4 645 nonce_status = check_nonce(push_cert.buf, bogs);
a85b377d 646 }
a09c985e 647 if (!is_null_oid(&push_cert_oid)) {
a9154590 648 argv_array_pushf(&proc->env_array, "GIT_PUSH_CERT=%s",
a09c985e 649 oid_to_hex(&push_cert_oid));
a9154590 650 argv_array_pushf(&proc->env_array, "GIT_PUSH_CERT_SIGNER=%s",
d05b9618 651 sigcheck.signer ? sigcheck.signer : "");
a9154590 652 argv_array_pushf(&proc->env_array, "GIT_PUSH_CERT_KEY=%s",
d05b9618 653 sigcheck.key ? sigcheck.key : "");
a9154590
RS
654 argv_array_pushf(&proc->env_array, "GIT_PUSH_CERT_STATUS=%c",
655 sigcheck.result);
b89363e4 656 if (push_cert_nonce) {
a9154590
RS
657 argv_array_pushf(&proc->env_array,
658 "GIT_PUSH_CERT_NONCE=%s",
659 push_cert_nonce);
660 argv_array_pushf(&proc->env_array,
661 "GIT_PUSH_CERT_NONCE_STATUS=%s",
662 nonce_status);
5732373d 663 if (nonce_status == NONCE_SLOP)
a9154590
RS
664 argv_array_pushf(&proc->env_array,
665 "GIT_PUSH_CERT_NONCE_SLOP=%ld",
5732373d 666 nonce_stamp_slop);
b89363e4 667 }
a85b377d
JH
668 }
669}
670
77a9745d
SB
671struct receive_hook_feed_state {
672 struct command *cmd;
673 int skip_broken;
674 struct strbuf buf;
675 const struct string_list *push_options;
676};
677
9684e44a 678typedef int (*feed_fn)(void *, const char **, size_t *);
77a9745d
SB
679static int run_and_feed_hook(const char *hook_name, feed_fn feed,
680 struct receive_hook_feed_state *feed_state)
b1bf95bb 681{
d3180279 682 struct child_process proc = CHILD_PROCESS_INIT;
6d525d38 683 struct async muxer;
f43cd49f 684 const char *argv[2];
9684e44a 685 int code;
b1bf95bb 686
5a7da2dc
AS
687 argv[0] = find_hook(hook_name);
688 if (!argv[0])
b1bf95bb 689 return 0;
c8dd2771 690
f43cd49f
SP
691 argv[1] = NULL;
692
f43cd49f
SP
693 proc.argv = argv;
694 proc.in = -1;
695 proc.stdout_to_stderr = 1;
6206286e
JH
696 proc.trace2_hook_name = hook_name;
697
77a9745d
SB
698 if (feed_state->push_options) {
699 int i;
700 for (i = 0; i < feed_state->push_options->nr; i++)
701 argv_array_pushf(&proc.env_array,
702 "GIT_PUSH_OPTION_%d=%s", i,
703 feed_state->push_options->items[i].string);
704 argv_array_pushf(&proc.env_array, "GIT_PUSH_OPTION_COUNT=%d",
705 feed_state->push_options->nr);
706 } else
707 argv_array_pushf(&proc.env_array, "GIT_PUSH_OPTION_COUNT");
f43cd49f 708
722ff7f8
JK
709 if (tmp_objdir)
710 argv_array_pushv(&proc.env_array, tmp_objdir_env(tmp_objdir));
711
6d525d38
SP
712 if (use_sideband) {
713 memset(&muxer, 0, sizeof(muxer));
714 muxer.proc = copy_to_sideband;
715 muxer.in = -1;
716 code = start_async(&muxer);
717 if (code)
718 return code;
719 proc.err = muxer.in;
720 }
721
5d222c09
RS
722 prepare_push_cert_sha1(&proc);
723
f43cd49f 724 code = start_command(&proc);
6d525d38
SP
725 if (code) {
726 if (use_sideband)
727 finish_async(&muxer);
90e41a89 728 return code;
6d525d38
SP
729 }
730
ec7dbd14
JH
731 sigchain_push(SIGPIPE, SIG_IGN);
732
9684e44a
JH
733 while (1) {
734 const char *buf;
735 size_t n;
736 if (feed(feed_state, &buf, &n))
737 break;
06f46f23 738 if (write_in_full(proc.in, buf, n) < 0)
9684e44a 739 break;
c8dd2771 740 }
e72ae288 741 close(proc.in);
6d525d38
SP
742 if (use_sideband)
743 finish_async(&muxer);
ec7dbd14
JH
744
745 sigchain_pop(SIGPIPE);
746
90e41a89 747 return finish_command(&proc);
b1bf95bb
JW
748}
749
9684e44a
JH
750static int feed_receive_hook(void *state_, const char **bufp, size_t *sizep)
751{
752 struct receive_hook_feed_state *state = state_;
753 struct command *cmd = state->cmd;
754
cdc2b2f3
JH
755 while (cmd &&
756 state->skip_broken && (cmd->error_string || cmd->did_not_exist))
9684e44a
JH
757 cmd = cmd->next;
758 if (!cmd)
759 return -1; /* EOF */
760 strbuf_reset(&state->buf);
761 strbuf_addf(&state->buf, "%s %s %s\n",
9c44ea44 762 oid_to_hex(&cmd->old_oid), oid_to_hex(&cmd->new_oid),
9684e44a
JH
763 cmd->ref_name);
764 state->cmd = cmd->next;
765 if (bufp) {
766 *bufp = state->buf.buf;
767 *sizep = state->buf.len;
768 }
769 return 0;
770}
771
77a9745d
SB
772static int run_receive_hook(struct command *commands,
773 const char *hook_name,
774 int skip_broken,
775 const struct string_list *push_options)
9684e44a
JH
776{
777 struct receive_hook_feed_state state;
778 int status;
779
780 strbuf_init(&state.buf, 0);
781 state.cmd = commands;
cdc2b2f3 782 state.skip_broken = skip_broken;
9684e44a
JH
783 if (feed_receive_hook(&state, NULL, NULL))
784 return 0;
785 state.cmd = commands;
77a9745d 786 state.push_options = push_options;
9684e44a
JH
787 status = run_and_feed_hook(hook_name, feed_receive_hook, &state);
788 strbuf_release(&state.buf);
789 return status;
790}
791
1d9e8b56
SP
792static int run_update_hook(struct command *cmd)
793{
1d9e8b56 794 const char *argv[5];
d3180279 795 struct child_process proc = CHILD_PROCESS_INIT;
6d525d38 796 int code;
1d9e8b56 797
5a7da2dc
AS
798 argv[0] = find_hook("update");
799 if (!argv[0])
1d9e8b56
SP
800 return 0;
801
1d9e8b56 802 argv[1] = cmd->ref_name;
9c44ea44 803 argv[2] = oid_to_hex(&cmd->old_oid);
804 argv[3] = oid_to_hex(&cmd->new_oid);
1d9e8b56
SP
805 argv[4] = NULL;
806
6d525d38
SP
807 proc.no_stdin = 1;
808 proc.stdout_to_stderr = 1;
809 proc.err = use_sideband ? -1 : 0;
810 proc.argv = argv;
6206286e 811 proc.trace2_hook_name = "update";
6d525d38
SP
812
813 code = start_command(&proc);
814 if (code)
815 return code;
816 if (use_sideband)
817 copy_to_sideband(proc.err, -1, NULL);
818 return finish_command(&proc);
1d9e8b56
SP
819}
820
8ba35a2d
VA
821static char *refuse_unconfigured_deny_msg =
822 N_("By default, updating the current branch in a non-bare repository\n"
823 "is denied, because it will make the index and work tree inconsistent\n"
824 "with what you pushed, and will require 'git reset --hard' to match\n"
825 "the work tree to HEAD.\n"
826 "\n"
2ddaa427
AH
827 "You can set the 'receive.denyCurrentBranch' configuration variable\n"
828 "to 'ignore' or 'warn' in the remote repository to allow pushing into\n"
8ba35a2d
VA
829 "its current branch; however, this is not recommended unless you\n"
830 "arranged to update its work tree to match what you pushed in some\n"
831 "other way.\n"
832 "\n"
833 "To squelch this message and still keep the default behaviour, set\n"
834 "'receive.denyCurrentBranch' configuration variable to 'refuse'.");
3d95d92b 835
acd2a45b 836static void refuse_unconfigured_deny(void)
3d95d92b 837{
8ba35a2d 838 rp_error("%s", _(refuse_unconfigured_deny_msg));
3d95d92b
JH
839}
840
8ba35a2d
VA
841static char *refuse_unconfigured_deny_delete_current_msg =
842 N_("By default, deleting the current branch is denied, because the next\n"
843 "'git clone' won't result in any file checked out, causing confusion.\n"
844 "\n"
845 "You can set 'receive.denyDeleteCurrent' configuration variable to\n"
846 "'warn' or 'ignore' in the remote repository to allow deleting the\n"
847 "current branch, with or without a warning message.\n"
848 "\n"
849 "To squelch this message, you can set it to 'refuse'.");
747ca245 850
375881fa 851static void refuse_unconfigured_deny_delete_current(void)
747ca245 852{
8ba35a2d 853 rp_error("%s", _(refuse_unconfigured_deny_delete_current_msg));
747ca245
JH
854}
855
6ccac9ee 856static int command_singleton_iterator(void *cb_data, struct object_id *oid);
0a1bc12b
NTND
857static int update_shallow_ref(struct command *cmd, struct shallow_info *si)
858{
b2275868 859 struct lock_file shallow_lock = LOCK_INIT;
910650d2 860 struct oid_array extra = OID_ARRAY_INIT;
7043c707 861 struct check_connected_options opt = CHECK_CONNECTED_INIT;
0a1bc12b
NTND
862 uint32_t mask = 1 << (cmd->index % 32);
863 int i;
864
6aa30857 865 trace_printf_key(&trace_shallow,
0a1bc12b
NTND
866 "shallow: update_shallow_ref %s\n", cmd->ref_name);
867 for (i = 0; i < si->shallow->nr; i++)
868 if (si->used_shallow[i] &&
869 (si->used_shallow[i][cmd->index / 32] & mask) &&
870 !delayed_reachability_test(si, i))
910650d2 871 oid_array_append(&extra, &si->shallow->oid[i]);
0a1bc12b 872
722ff7f8 873 opt.env = tmp_objdir_env(tmp_objdir);
7043c707
JK
874 setup_alternate_shallow(&shallow_lock, &opt.shallow_file, &extra);
875 if (check_connected(command_singleton_iterator, cmd, &opt)) {
37b9dcab 876 rollback_shallow_file(the_repository, &shallow_lock);
910650d2 877 oid_array_clear(&extra);
0a1bc12b
NTND
878 return -1;
879 }
880
37b9dcab 881 commit_shallow_file(the_repository, &shallow_lock);
0a1bc12b
NTND
882
883 /*
884 * Make sure setup_alternate_shallow() for the next ref does
885 * not lose these new roots..
886 */
887 for (i = 0; i < extra.nr; i++)
19143f13 888 register_shallow(the_repository, &extra.oid[i]);
0a1bc12b
NTND
889
890 si->shallow_ref[cmd->index] = 0;
910650d2 891 oid_array_clear(&extra);
0a1bc12b
NTND
892 return 0;
893}
894
1a51b524
JH
895/*
896 * NEEDSWORK: we should consolidate various implementions of "are we
897 * on an unborn branch?" test into one, and make the unified one more
898 * robust. !get_sha1() based check used here and elsewhere would not
899 * allow us to tell an unborn branch from corrupt ref, for example.
900 * For the purpose of fixing "deploy-to-update does not work when
901 * pushing into an empty repository" issue, this should suffice for
902 * now.
903 */
904static int head_has_history(void)
905{
15be4a5d 906 struct object_id oid;
1a51b524 907
15be4a5d 908 return !get_oid("HEAD", &oid);
1a51b524
JH
909}
910
21b138d0
JH
911static const char *push_to_deploy(unsigned char *sha1,
912 struct argv_array *env,
913 const char *work_tree)
1404bcbb
JS
914{
915 const char *update_refresh[] = {
916 "update-index", "-q", "--ignore-submodules", "--refresh", NULL
917 };
918 const char *diff_files[] = {
919 "diff-files", "--quiet", "--ignore-submodules", "--", NULL
920 };
921 const char *diff_index[] = {
922 "diff-index", "--quiet", "--cached", "--ignore-submodules",
1a51b524 923 NULL, "--", NULL
1404bcbb
JS
924 };
925 const char *read_tree[] = {
926 "read-tree", "-u", "-m", NULL, NULL
927 };
1404bcbb
JS
928 struct child_process child = CHILD_PROCESS_INIT;
929
1404bcbb 930 child.argv = update_refresh;
21b138d0 931 child.env = env->argv;
1404bcbb
JS
932 child.dir = work_tree;
933 child.no_stdin = 1;
934 child.stdout_to_stderr = 1;
935 child.git_cmd = 1;
21b138d0 936 if (run_command(&child))
1404bcbb 937 return "Up-to-date check failed";
1404bcbb
JS
938
939 /* run_command() does not clean up completely; reinitialize */
940 child_process_init(&child);
941 child.argv = diff_files;
21b138d0 942 child.env = env->argv;
1404bcbb
JS
943 child.dir = work_tree;
944 child.no_stdin = 1;
945 child.stdout_to_stderr = 1;
946 child.git_cmd = 1;
21b138d0 947 if (run_command(&child))
1404bcbb 948 return "Working directory has unstaged changes";
1404bcbb 949
1a51b524 950 /* diff-index with either HEAD or an empty tree */
c00866a2 951 diff_index[4] = head_has_history() ? "HEAD" : empty_tree_oid_hex();
1a51b524 952
1404bcbb
JS
953 child_process_init(&child);
954 child.argv = diff_index;
21b138d0 955 child.env = env->argv;
1404bcbb
JS
956 child.no_stdin = 1;
957 child.no_stdout = 1;
958 child.stdout_to_stderr = 0;
959 child.git_cmd = 1;
21b138d0 960 if (run_command(&child))
1404bcbb 961 return "Working directory has staged changes";
1404bcbb 962
fc06be3b 963 read_tree[3] = hash_to_hex(sha1);
1404bcbb
JS
964 child_process_init(&child);
965 child.argv = read_tree;
21b138d0 966 child.env = env->argv;
1404bcbb
JS
967 child.dir = work_tree;
968 child.no_stdin = 1;
969 child.no_stdout = 1;
970 child.stdout_to_stderr = 0;
971 child.git_cmd = 1;
21b138d0 972 if (run_command(&child))
1404bcbb 973 return "Could not update working tree to new HEAD";
1404bcbb 974
1404bcbb
JS
975 return NULL;
976}
977
08553319
JH
978static const char *push_to_checkout_hook = "push-to-checkout";
979
fc06be3b 980static const char *push_to_checkout(unsigned char *hash,
08553319
JH
981 struct argv_array *env,
982 const char *work_tree)
983{
984 argv_array_pushf(env, "GIT_WORK_TREE=%s", absolute_path(work_tree));
985 if (run_hook_le(env->argv, push_to_checkout_hook,
fc06be3b 986 hash_to_hex(hash), NULL))
08553319
JH
987 return "push-to-checkout hook declined";
988 else
989 return NULL;
990}
991
4ef34648 992static const char *update_worktree(unsigned char *sha1, const struct worktree *worktree)
21b138d0 993{
4ef34648 994 const char *retval, *work_tree, *git_dir = NULL;
21b138d0
JH
995 struct argv_array env = ARGV_ARRAY_INIT;
996
4ef34648
HV
997 if (worktree && worktree->path)
998 work_tree = worktree->path;
999 else if (git_work_tree_cfg)
1000 work_tree = git_work_tree_cfg;
1001 else
1002 work_tree = "..";
1003
21b138d0
JH
1004 if (is_bare_repository())
1005 return "denyCurrentBranch = updateInstead needs a worktree";
4ef34648
HV
1006 if (worktree)
1007 git_dir = get_worktree_git_dir(worktree);
1008 if (!git_dir)
1009 git_dir = get_git_dir();
21b138d0 1010
4ef34648 1011 argv_array_pushf(&env, "GIT_DIR=%s", absolute_path(git_dir));
21b138d0 1012
08553319
JH
1013 if (!find_hook(push_to_checkout_hook))
1014 retval = push_to_deploy(sha1, &env, work_tree);
1015 else
1016 retval = push_to_checkout(sha1, &env, work_tree);
21b138d0
JH
1017
1018 argv_array_clear(&env);
1019 return retval;
1020}
1021
0a1bc12b 1022static const char *update(struct command *cmd, struct shallow_info *si)
2eca23da 1023{
cfee10a7 1024 const char *name = cmd->ref_name;
6b01ecfe 1025 struct strbuf namespaced_name_buf = STRBUF_INIT;
bda6e828
JS
1026 static char *namespaced_name;
1027 const char *ret;
9c44ea44 1028 struct object_id *old_oid = &cmd->old_oid;
1029 struct object_id *new_oid = &cmd->new_oid;
b072a25f 1030 int do_update_worktree = 0;
4ef34648 1031 const struct worktree *worktree = is_bare_repository() ? NULL : find_shared_symref("HEAD", name);
2eca23da 1032
061d6b9a 1033 /* only refs/... are allowed */
59556548 1034 if (!starts_with(name, "refs/") || check_refname_format(name + 5, 0)) {
466dbc42 1035 rp_error("refusing to create funny ref '%s' remotely", name);
8aaf7d64 1036 return "funny refname";
cfee10a7 1037 }
d8a1deec 1038
6b01ecfe 1039 strbuf_addf(&namespaced_name_buf, "%s%s", get_git_namespace(), name);
bda6e828 1040 free(namespaced_name);
6b01ecfe
JT
1041 namespaced_name = strbuf_detach(&namespaced_name_buf, NULL);
1042
4ef34648 1043 if (worktree) {
3d95d92b
JH
1044 switch (deny_current_branch) {
1045 case DENY_IGNORE:
986e8239 1046 break;
3d95d92b 1047 case DENY_WARN:
466dbc42 1048 rp_warning("updating the current branch");
986e8239 1049 break;
3d95d92b 1050 case DENY_REFUSE:
acd2a45b 1051 case DENY_UNCONFIGURED:
466dbc42 1052 rp_error("refusing to update checked out branch: %s", name);
acd2a45b
JH
1053 if (deny_current_branch == DENY_UNCONFIGURED)
1054 refuse_unconfigured_deny();
3d95d92b 1055 return "branch is currently checked out";
1404bcbb 1056 case DENY_UPDATE_INSTEAD:
b072a25f
JH
1057 /* pass -- let other checks intervene first */
1058 do_update_worktree = 1;
1404bcbb 1059 break;
3d95d92b 1060 }
986e8239
JK
1061 }
1062
9c44ea44 1063 if (!is_null_oid(new_oid) && !has_object_file(new_oid)) {
8aaf7d64 1064 error("unpack should have generated %s, "
9c44ea44 1065 "but I can't find it!", oid_to_hex(new_oid));
8aaf7d64 1066 return "bad pack";
cfee10a7 1067 }
747ca245 1068
9c44ea44 1069 if (!is_null_oid(old_oid) && is_null_oid(new_oid)) {
59556548 1070 if (deny_deletes && starts_with(name, "refs/heads/")) {
466dbc42 1071 rp_error("denying ref deletion for %s", name);
747ca245
JH
1072 return "deletion prohibited";
1073 }
1074
4ef34648 1075 if (worktree || (head_name && !strcmp(namespaced_name, head_name))) {
747ca245
JH
1076 switch (deny_delete_current) {
1077 case DENY_IGNORE:
1078 break;
1079 case DENY_WARN:
466dbc42 1080 rp_warning("deleting the current branch");
747ca245
JH
1081 break;
1082 case DENY_REFUSE:
375881fa 1083 case DENY_UNCONFIGURED:
1404bcbb 1084 case DENY_UPDATE_INSTEAD:
375881fa
JH
1085 if (deny_delete_current == DENY_UNCONFIGURED)
1086 refuse_unconfigured_deny_delete_current();
466dbc42 1087 rp_error("refusing to delete the current branch: %s", name);
747ca245 1088 return "deletion of the current branch prohibited";
1404bcbb
JS
1089 default:
1090 return "Invalid denyDeleteCurrent setting";
747ca245
JH
1091 }
1092 }
a240de11 1093 }
747ca245 1094
9c44ea44 1095 if (deny_non_fast_forwards && !is_null_oid(new_oid) &&
1096 !is_null_oid(old_oid) &&
59556548 1097 starts_with(name, "refs/heads/")) {
eab82707 1098 struct object *old_object, *new_object;
11031d7e 1099 struct commit *old_commit, *new_commit;
11031d7e 1100
109cd76d
SB
1101 old_object = parse_object(the_repository, old_oid);
1102 new_object = parse_object(the_repository, new_oid);
eab82707
MK
1103
1104 if (!old_object || !new_object ||
1105 old_object->type != OBJ_COMMIT ||
1106 new_object->type != OBJ_COMMIT) {
1107 error("bad sha1 objects for %s", name);
1108 return "bad ref";
1109 }
1110 old_commit = (struct commit *)old_object;
1111 new_commit = (struct commit *)new_object;
5d55915c 1112 if (!in_merge_bases(old_commit, new_commit)) {
466dbc42
SP
1113 rp_error("denying non-fast-forward %s"
1114 " (you should pull first)", name);
a75d7b54 1115 return "non-fast-forward";
8aaf7d64 1116 }
11031d7e 1117 }
1d9e8b56 1118 if (run_update_hook(cmd)) {
466dbc42 1119 rp_error("hook declined to update %s", name);
8aaf7d64 1120 return "hook declined";
b1bf95bb 1121 }
3159c8dc 1122
b072a25f 1123 if (do_update_worktree) {
4ef34648 1124 ret = update_worktree(new_oid->hash, find_shared_symref("HEAD", name));
b072a25f
JH
1125 if (ret)
1126 return ret;
1127 }
1128
9c44ea44 1129 if (is_null_oid(new_oid)) {
222368c6 1130 struct strbuf err = STRBUF_INIT;
109cd76d 1131 if (!parse_object(the_repository, old_oid)) {
9c44ea44 1132 old_oid = NULL;
160b81ed
PYH
1133 if (ref_exists(name)) {
1134 rp_warning("Allowing deletion of corrupt ref.");
1135 } else {
1136 rp_warning("Deleting a non-existent ref.");
1137 cmd->did_not_exist = 1;
1138 }
28391a80 1139 }
222368c6
SB
1140 if (ref_transaction_delete(transaction,
1141 namespaced_name,
89f3bbdd 1142 old_oid,
fb5a6bb6 1143 0, "push", &err)) {
222368c6
SB
1144 rp_error("%s", err.buf);
1145 strbuf_release(&err);
8aaf7d64 1146 return "failed to delete";
d4f694ba 1147 }
222368c6 1148 strbuf_release(&err);
8aaf7d64 1149 return NULL; /* good */
d4f694ba
JH
1150 }
1151 else {
6629ea2d 1152 struct strbuf err = STRBUF_INIT;
0a1bc12b
NTND
1153 if (shallow_update && si->shallow_ref[cmd->index] &&
1154 update_shallow_ref(cmd, si))
1155 return "shallow error";
1156
222368c6
SB
1157 if (ref_transaction_update(transaction,
1158 namespaced_name,
89f3bbdd 1159 new_oid, old_oid,
1d147bdf 1160 0, "push",
222368c6 1161 &err)) {
6629ea2d
RS
1162 rp_error("%s", err.buf);
1163 strbuf_release(&err);
222368c6 1164
6629ea2d 1165 return "failed to update ref";
ef203f08 1166 }
6629ea2d 1167 strbuf_release(&err);
222368c6 1168
8aaf7d64 1169 return NULL; /* good */
19614330 1170 }
2eca23da
LT
1171}
1172
5e1c71fd 1173static void run_update_post_hook(struct command *commands)
19614330 1174{
5e1c71fd 1175 struct command *cmd;
d3180279 1176 struct child_process proc = CHILD_PROCESS_INIT;
dcf69262 1177 const char *hook;
19614330 1178
5a7da2dc 1179 hook = find_hook("post-update");
dce96c41 1180 if (!hook)
3e6e152c 1181 return;
5a7da2dc 1182
850d2fec 1183 for (cmd = commands; cmd; cmd = cmd->next) {
160b81ed 1184 if (cmd->error_string || cmd->did_not_exist)
19614330 1185 continue;
dce96c41
RS
1186 if (!proc.args.argc)
1187 argv_array_push(&proc.args, hook);
850d2fec 1188 argv_array_push(&proc.args, cmd->ref_name);
19614330 1189 }
dce96c41
RS
1190 if (!proc.args.argc)
1191 return;
6d525d38 1192
6d525d38
SP
1193 proc.no_stdin = 1;
1194 proc.stdout_to_stderr = 1;
1195 proc.err = use_sideband ? -1 : 0;
6206286e 1196 proc.trace2_hook_name = "post-update";
6d525d38
SP
1197
1198 if (!start_command(&proc)) {
1199 if (use_sideband)
1200 copy_to_sideband(proc.err, -1, NULL);
1201 finish_command(&proc);
1202 }
19614330 1203}
2eca23da 1204
99036237
ÆAB
1205static void check_aliased_update_internal(struct command *cmd,
1206 struct string_list *list,
1207 const char *dst_name, int flag)
da3efdb1
JS
1208{
1209 struct string_list_item *item;
1210 struct command *dst_cmd;
da3efdb1
JS
1211
1212 if (!(flag & REF_ISSYMREF))
1213 return;
1214
6b01ecfe
JT
1215 if (!dst_name) {
1216 rp_error("refusing update to broken symref '%s'", cmd->ref_name);
1217 cmd->skip_update = 1;
1218 cmd->error_string = "broken symref";
1219 return;
1220 }
ded83936 1221 dst_name = strip_namespace(dst_name);
6b01ecfe 1222
e8c8b713 1223 if ((item = string_list_lookup(list, dst_name)) == NULL)
da3efdb1
JS
1224 return;
1225
1226 cmd->skip_update = 1;
1227
1228 dst_cmd = (struct command *) item->util;
1229
4a7e27e9
JK
1230 if (oideq(&cmd->old_oid, &dst_cmd->old_oid) &&
1231 oideq(&cmd->new_oid, &dst_cmd->new_oid))
da3efdb1
JS
1232 return;
1233
1234 dst_cmd->skip_update = 1;
1235
da3efdb1
JS
1236 rp_error("refusing inconsistent update between symref '%s' (%s..%s) and"
1237 " its target '%s' (%s..%s)",
ef2ed501 1238 cmd->ref_name,
aab9583f 1239 find_unique_abbrev(&cmd->old_oid, DEFAULT_ABBREV),
1240 find_unique_abbrev(&cmd->new_oid, DEFAULT_ABBREV),
ef2ed501 1241 dst_cmd->ref_name,
aab9583f 1242 find_unique_abbrev(&dst_cmd->old_oid, DEFAULT_ABBREV),
1243 find_unique_abbrev(&dst_cmd->new_oid, DEFAULT_ABBREV));
da3efdb1
JS
1244
1245 cmd->error_string = dst_cmd->error_string =
1246 "inconsistent aliased update";
1247}
1248
99036237
ÆAB
1249static void check_aliased_update(struct command *cmd, struct string_list *list)
1250{
1251 struct strbuf buf = STRBUF_INIT;
1252 const char *dst_name;
1253 int flag;
1254
1255 strbuf_addf(&buf, "%s%s", get_git_namespace(), cmd->ref_name);
1256 dst_name = resolve_ref_unsafe(buf.buf, 0, NULL, &flag);
1257 check_aliased_update_internal(cmd, list, dst_name, flag);
1258 strbuf_release(&buf);
1259}
1260
da3efdb1
JS
1261static void check_aliased_updates(struct command *commands)
1262{
1263 struct command *cmd;
183113a5 1264 struct string_list ref_list = STRING_LIST_INIT_NODUP;
da3efdb1
JS
1265
1266 for (cmd = commands; cmd; cmd = cmd->next) {
1267 struct string_list_item *item =
1d2f80fa 1268 string_list_append(&ref_list, cmd->ref_name);
da3efdb1
JS
1269 item->util = (void *)cmd;
1270 }
3383e199 1271 string_list_sort(&ref_list);
da3efdb1 1272
ef7e93d9
CB
1273 for (cmd = commands; cmd; cmd = cmd->next) {
1274 if (!cmd->error_string)
1275 check_aliased_update(cmd, &ref_list);
1276 }
da3efdb1
JS
1277
1278 string_list_clear(&ref_list, 0);
1279}
1280
6ccac9ee 1281static int command_singleton_iterator(void *cb_data, struct object_id *oid)
52fed6e1
JH
1282{
1283 struct command **cmd_list = cb_data;
1284 struct command *cmd = *cmd_list;
1285
9c44ea44 1286 if (!cmd || is_null_oid(&cmd->new_oid))
52fed6e1
JH
1287 return -1; /* end of list */
1288 *cmd_list = NULL; /* this returns only one */
6ccac9ee 1289 oidcpy(oid, &cmd->new_oid);
52fed6e1
JH
1290 return 0;
1291}
1292
0a1bc12b
NTND
1293static void set_connectivity_errors(struct command *commands,
1294 struct shallow_info *si)
52fed6e1
JH
1295{
1296 struct command *cmd;
1297
1298 for (cmd = commands; cmd; cmd = cmd->next) {
1299 struct command *singleton = cmd;
722ff7f8
JK
1300 struct check_connected_options opt = CHECK_CONNECTED_INIT;
1301
0a1bc12b
NTND
1302 if (shallow_update && si->shallow_ref[cmd->index])
1303 /* to be checked in update_shallow_ref() */
1304 continue;
722ff7f8
JK
1305
1306 opt.env = tmp_objdir_env(tmp_objdir);
7043c707 1307 if (!check_connected(command_singleton_iterator, &singleton,
722ff7f8 1308 &opt))
52fed6e1 1309 continue;
722ff7f8 1310
52fed6e1
JH
1311 cmd->error_string = "missing necessary objects";
1312 }
1313}
1314
0a1bc12b
NTND
1315struct iterate_data {
1316 struct command *cmds;
1317 struct shallow_info *si;
1318};
1319
6ccac9ee 1320static int iterate_receive_command_list(void *cb_data, struct object_id *oid)
52fed6e1 1321{
0a1bc12b
NTND
1322 struct iterate_data *data = cb_data;
1323 struct command **cmd_list = &data->cmds;
52fed6e1
JH
1324 struct command *cmd = *cmd_list;
1325
0a1bc12b
NTND
1326 for (; cmd; cmd = cmd->next) {
1327 if (shallow_update && data->si->shallow_ref[cmd->index])
1328 /* to be checked in update_shallow_ref() */
1329 continue;
9c44ea44 1330 if (!is_null_oid(&cmd->new_oid) && !cmd->skip_update) {
6ccac9ee 1331 oidcpy(oid, &cmd->new_oid);
ee6dfb2d
JH
1332 *cmd_list = cmd->next;
1333 return 0;
1334 }
ee6dfb2d
JH
1335 }
1336 *cmd_list = NULL;
1337 return -1; /* end of list */
52fed6e1
JH
1338}
1339
daebaa78
JH
1340static void reject_updates_to_hidden(struct command *commands)
1341{
78a766ab
LF
1342 struct strbuf refname_full = STRBUF_INIT;
1343 size_t prefix_len;
daebaa78
JH
1344 struct command *cmd;
1345
78a766ab
LF
1346 strbuf_addstr(&refname_full, get_git_namespace());
1347 prefix_len = refname_full.len;
1348
daebaa78 1349 for (cmd = commands; cmd; cmd = cmd->next) {
78a766ab
LF
1350 if (cmd->error_string)
1351 continue;
1352
1353 strbuf_setlen(&refname_full, prefix_len);
1354 strbuf_addstr(&refname_full, cmd->ref_name);
1355
1356 if (!ref_is_hidden(cmd->ref_name, refname_full.buf))
daebaa78 1357 continue;
9c44ea44 1358 if (is_null_oid(&cmd->new_oid))
daebaa78
JH
1359 cmd->error_string = "deny deleting a hidden ref";
1360 else
1361 cmd->error_string = "deny updating a hidden ref";
1362 }
78a766ab
LF
1363
1364 strbuf_release(&refname_full);
daebaa78
JH
1365}
1366
a6a84319
SB
1367static int should_process_cmd(struct command *cmd)
1368{
1369 return !cmd->error_string && !cmd->skip_update;
1370}
1371
1372static void warn_if_skipped_connectivity_check(struct command *commands,
1373 struct shallow_info *si)
1374{
1375 struct command *cmd;
1376 int checked_connectivity = 1;
1377
1378 for (cmd = commands; cmd; cmd = cmd->next) {
1379 if (should_process_cmd(cmd) && si->shallow_ref[cmd->index]) {
1380 error("BUG: connectivity check has not been run on ref %s",
1381 cmd->ref_name);
1382 checked_connectivity = 0;
1383 }
1384 }
1385 if (!checked_connectivity)
033abf97 1386 BUG("connectivity check skipped???");
a6a84319
SB
1387}
1388
a1a26145
SB
1389static void execute_commands_non_atomic(struct command *commands,
1390 struct shallow_info *si)
1391{
1392 struct command *cmd;
222368c6
SB
1393 struct strbuf err = STRBUF_INIT;
1394
a1a26145
SB
1395 for (cmd = commands; cmd; cmd = cmd->next) {
1396 if (!should_process_cmd(cmd))
1397 continue;
1398
222368c6
SB
1399 transaction = ref_transaction_begin(&err);
1400 if (!transaction) {
1401 rp_error("%s", err.buf);
1402 strbuf_reset(&err);
1403 cmd->error_string = "transaction failed to start";
1404 continue;
1405 }
1406
a1a26145 1407 cmd->error_string = update(cmd, si);
222368c6
SB
1408
1409 if (!cmd->error_string
1410 && ref_transaction_commit(transaction, &err)) {
1411 rp_error("%s", err.buf);
1412 strbuf_reset(&err);
1413 cmd->error_string = "failed to update ref";
1414 }
1415 ref_transaction_free(transaction);
a1a26145 1416 }
68deed29
SB
1417 strbuf_release(&err);
1418}
222368c6 1419
68deed29
SB
1420static void execute_commands_atomic(struct command *commands,
1421 struct shallow_info *si)
1422{
1423 struct command *cmd;
1424 struct strbuf err = STRBUF_INIT;
1425 const char *reported_error = "atomic push failure";
1426
1427 transaction = ref_transaction_begin(&err);
1428 if (!transaction) {
1429 rp_error("%s", err.buf);
1430 strbuf_reset(&err);
1431 reported_error = "transaction failed to start";
1432 goto failure;
1433 }
1434
1435 for (cmd = commands; cmd; cmd = cmd->next) {
1436 if (!should_process_cmd(cmd))
1437 continue;
1438
1439 cmd->error_string = update(cmd, si);
1440
1441 if (cmd->error_string)
1442 goto failure;
1443 }
1444
1445 if (ref_transaction_commit(transaction, &err)) {
1446 rp_error("%s", err.buf);
1447 reported_error = "atomic transaction failed";
1448 goto failure;
1449 }
1450 goto cleanup;
1451
1452failure:
1453 for (cmd = commands; cmd; cmd = cmd->next)
1454 if (!cmd->error_string)
1455 cmd->error_string = reported_error;
1456
1457cleanup:
1458 ref_transaction_free(transaction);
222368c6 1459 strbuf_release(&err);
a1a26145
SB
1460}
1461
0a1bc12b
NTND
1462static void execute_commands(struct command *commands,
1463 const char *unpacker_error,
77a9745d
SB
1464 struct shallow_info *si,
1465 const struct string_list *push_options)
575f4974 1466{
d415092a 1467 struct check_connected_options opt = CHECK_CONNECTED_INIT;
5e1c71fd 1468 struct command *cmd;
0a1bc12b 1469 struct iterate_data data;
d415092a
JK
1470 struct async muxer;
1471 int err_fd = 0;
8aaf7d64
SP
1472
1473 if (unpacker_error) {
5e1c71fd 1474 for (cmd = commands; cmd; cmd = cmd->next)
74eb32d3 1475 cmd->error_string = "unpacker error";
8aaf7d64
SP
1476 return;
1477 }
1478
d415092a
JK
1479 if (use_sideband) {
1480 memset(&muxer, 0, sizeof(muxer));
1481 muxer.proc = copy_to_sideband;
1482 muxer.in = -1;
1483 if (!start_async(&muxer))
1484 err_fd = muxer.in;
1485 /* ...else, continue without relaying sideband */
1486 }
1487
0a1bc12b
NTND
1488 data.cmds = commands;
1489 data.si = si;
d415092a 1490 opt.err_fd = err_fd;
6b4cd2f8 1491 opt.progress = err_fd && !quiet;
722ff7f8 1492 opt.env = tmp_objdir_env(tmp_objdir);
d415092a 1493 if (check_connected(iterate_receive_command_list, &data, &opt))
0a1bc12b 1494 set_connectivity_errors(commands, si);
52fed6e1 1495
d415092a
JK
1496 if (use_sideband)
1497 finish_async(&muxer);
1498
daebaa78
JH
1499 reject_updates_to_hidden(commands);
1500
77a9745d 1501 if (run_receive_hook(commands, "pre-receive", 0, push_options)) {
ef7e93d9
CB
1502 for (cmd = commands; cmd; cmd = cmd->next) {
1503 if (!cmd->error_string)
1504 cmd->error_string = "pre-receive hook declined";
1505 }
05ef58ec
SP
1506 return;
1507 }
1508
722ff7f8
JK
1509 /*
1510 * Now we'll start writing out refs, which means the objects need
1511 * to be in their final positions so that other processes can see them.
1512 */
1513 if (tmp_objdir_migrate(tmp_objdir) < 0) {
1514 for (cmd = commands; cmd; cmd = cmd->next) {
1515 if (!cmd->error_string)
1516 cmd->error_string = "unable to migrate objects to permanent storage";
1517 }
1518 return;
1519 }
1520 tmp_objdir = NULL;
1521
da3efdb1
JS
1522 check_aliased_updates(commands);
1523
96ec7b1e 1524 free(head_name_to_free);
efbd4fdf 1525 head_name = head_name_to_free = resolve_refdup("HEAD", 0, NULL, NULL);
747ca245 1526
68deed29
SB
1527 if (use_atomic)
1528 execute_commands_atomic(commands, si);
1529 else
1530 execute_commands_non_atomic(commands, si);
0a1bc12b 1531
a6a84319
SB
1532 if (shallow_update)
1533 warn_if_skipped_connectivity_check(commands, si);
575f4974
LT
1534}
1535
39895c74
JH
1536static struct command **queue_command(struct command **tail,
1537 const char *line,
1538 int linelen)
1539{
9c44ea44 1540 struct object_id old_oid, new_oid;
39895c74
JH
1541 struct command *cmd;
1542 const char *refname;
1543 int reflen;
9c44ea44 1544 const char *p;
39895c74 1545
9c44ea44 1546 if (parse_oid_hex(line, &old_oid, &p) ||
1547 *p++ != ' ' ||
1548 parse_oid_hex(p, &new_oid, &p) ||
1549 *p++ != ' ')
39895c74
JH
1550 die("protocol error: expected old/new/ref, got '%s'", line);
1551
9c44ea44 1552 refname = p;
1553 reflen = linelen - (p - line);
ddd0bfac 1554 FLEX_ALLOC_MEM(cmd, ref_name, refname, reflen);
9c44ea44 1555 oidcpy(&cmd->old_oid, &old_oid);
1556 oidcpy(&cmd->new_oid, &new_oid);
39895c74
JH
1557 *tail = cmd;
1558 return &cmd->next;
1559}
1560
4adf569d
JH
1561static void queue_commands_from_cert(struct command **tail,
1562 struct strbuf *push_cert)
1563{
1564 const char *boc, *eoc;
1565
1566 if (*tail)
1567 die("protocol error: got both push certificate and unsigned commands");
1568
1569 boc = strstr(push_cert->buf, "\n\n");
1570 if (!boc)
1571 die("malformed push certificate %.*s", 100, push_cert->buf);
1572 else
1573 boc += 2;
1574 eoc = push_cert->buf + parse_signature(push_cert->buf, push_cert->len);
1575
1576 while (boc < eoc) {
1577 const char *eol = memchr(boc, '\n', eoc - boc);
f2214ded 1578 tail = queue_command(tail, boc, eol ? eol - boc : eoc - boc);
4adf569d
JH
1579 boc = eol ? eol + 1 : eoc;
1580 }
1581}
1582
01f9ec64
MS
1583static struct command *read_head_info(struct packet_reader *reader,
1584 struct oid_array *shallow)
575f4974 1585{
5e1c71fd 1586 struct command *commands = NULL;
eb1af2df 1587 struct command **p = &commands;
575f4974 1588 for (;;) {
01f9ec64 1589 int linelen;
eb1af2df 1590
01f9ec64 1591 if (packet_reader_read(reader) != PACKET_READ_NORMAL)
575f4974 1592 break;
5dbd7676 1593
01f9ec64 1594 if (reader->pktlen > 8 && starts_with(reader->line, "shallow ")) {
9c44ea44 1595 struct object_id oid;
01f9ec64 1596 if (get_oid_hex(reader->line + 8, &oid))
c09b71cc 1597 die("protocol error: expected shallow sha, got '%s'",
01f9ec64 1598 reader->line + 8);
910650d2 1599 oid_array_append(shallow, &oid);
5dbd7676
NTND
1600 continue;
1601 }
1602
01f9ec64
MS
1603 linelen = strlen(reader->line);
1604 if (linelen < reader->pktlen) {
1605 const char *feature_list = reader->line + linelen + 1;
f47182c8 1606 if (parse_feature_request(feature_list, "report-status"))
cfee10a7 1607 report_status = 1;
f47182c8 1608 if (parse_feature_request(feature_list, "side-band-64k"))
38a81b4e 1609 use_sideband = LARGE_PACKET_MAX;
c207e34f
CB
1610 if (parse_feature_request(feature_list, "quiet"))
1611 quiet = 1;
1b70fe5d
RS
1612 if (advertise_atomic_push
1613 && parse_feature_request(feature_list, "atomic"))
1614 use_atomic = 1;
c714e45f
SB
1615 if (advertise_push_options
1616 && parse_feature_request(feature_list, "push-options"))
1617 use_push_options = 1;
cfee10a7 1618 }
0e3c339b 1619
01f9ec64 1620 if (!strcmp(reader->line, "push-cert")) {
a85b377d 1621 int true_flush = 0;
01f9ec64
MS
1622 int saved_options = reader->options;
1623 reader->options &= ~PACKET_READ_CHOMP_NEWLINE;
a85b377d
JH
1624
1625 for (;;) {
01f9ec64
MS
1626 packet_reader_read(reader);
1627 if (reader->status == PACKET_READ_FLUSH) {
a85b377d
JH
1628 true_flush = 1;
1629 break;
1630 }
01f9ec64
MS
1631 if (reader->status != PACKET_READ_NORMAL) {
1632 die("protocol error: got an unexpected packet");
1633 }
1634 if (!strcmp(reader->line, "push-cert-end\n"))
a85b377d 1635 break; /* end of cert */
01f9ec64 1636 strbuf_addstr(&push_cert, reader->line);
a85b377d 1637 }
01f9ec64 1638 reader->options = saved_options;
a85b377d
JH
1639
1640 if (true_flush)
1641 break;
1642 continue;
1643 }
1644
01f9ec64 1645 p = queue_command(p, reader->line, linelen);
575f4974 1646 }
4adf569d
JH
1647
1648 if (push_cert.len)
1649 queue_commands_from_cert(p, &push_cert);
1650
5e1c71fd 1651 return commands;
575f4974
LT
1652}
1653
01f9ec64
MS
1654static void read_push_options(struct packet_reader *reader,
1655 struct string_list *options)
c714e45f
SB
1656{
1657 while (1) {
01f9ec64 1658 if (packet_reader_read(reader) != PACKET_READ_NORMAL)
c714e45f
SB
1659 break;
1660
01f9ec64 1661 string_list_append(options, reader->line);
c714e45f
SB
1662 }
1663}
1664
fc04c412
SP
1665static const char *parse_pack_header(struct pack_header *hdr)
1666{
a69e5429
JH
1667 switch (read_pack_header(0, hdr)) {
1668 case PH_ERROR_EOF:
1669 return "eof before pack header was fully read";
1670
1671 case PH_ERROR_PACK_SIGNATURE:
fc04c412 1672 return "protocol error (pack signature mismatch detected)";
a69e5429
JH
1673
1674 case PH_ERROR_PROTOCOL:
fc04c412 1675 return "protocol error (pack version unsupported)";
a69e5429
JH
1676
1677 default:
1678 return "unknown error in parse_pack_header";
1679
1680 case 0:
1681 return NULL;
1682 }
fc04c412
SP
1683}
1684
576162a4
NP
1685static const char *pack_lockfile;
1686
446d5d91
JK
1687static void push_header_arg(struct argv_array *args, struct pack_header *hdr)
1688{
1689 argv_array_pushf(args, "--pack_header=%"PRIu32",%"PRIu32,
1690 ntohl(hdr->hdr_version), ntohl(hdr->hdr_entries));
1691}
1692
5dbd7676 1693static const char *unpack(int err_fd, struct shallow_info *si)
575f4974 1694{
fc04c412
SP
1695 struct pack_header hdr;
1696 const char *hdr_err;
31c42bff 1697 int status;
d3180279 1698 struct child_process child = CHILD_PROCESS_INIT;
dab76d3a
JH
1699 int fsck_objects = (receive_fsck_objects >= 0
1700 ? receive_fsck_objects
1701 : transfer_fsck_objects >= 0
1702 ? transfer_fsck_objects
1703 : 0);
fc04c412
SP
1704
1705 hdr_err = parse_pack_header(&hdr);
49ecfa13
JK
1706 if (hdr_err) {
1707 if (err_fd > 0)
1708 close(err_fd);
fc04c412 1709 return hdr_err;
49ecfa13 1710 }
fc04c412 1711
5dbd7676
NTND
1712 if (si->nr_ours || si->nr_theirs) {
1713 alt_shallow_file = setup_temporary_shallow(si->shallow);
64a7e92f
RS
1714 argv_array_push(&child.args, "--shallow-file");
1715 argv_array_push(&child.args, alt_shallow_file);
5dbd7676
NTND
1716 }
1717
722ff7f8 1718 tmp_objdir = tmp_objdir_create();
6cdad1f1
JK
1719 if (!tmp_objdir) {
1720 if (err_fd > 0)
1721 close(err_fd);
722ff7f8 1722 return "unable to create temporary object directory";
6cdad1f1 1723 }
722ff7f8
JK
1724 child.env = tmp_objdir_env(tmp_objdir);
1725
1726 /*
1727 * Normally we just pass the tmp_objdir environment to the child
1728 * processes that do the heavy lifting, but we may need to see these
1729 * objects ourselves to set up shallow information.
1730 */
1731 tmp_objdir_add_as_alternate(tmp_objdir);
1732
fc04c412 1733 if (ntohl(hdr.hdr_entries) < unpack_limit) {
446d5d91
JK
1734 argv_array_push(&child.args, "unpack-objects");
1735 push_header_arg(&child.args, &hdr);
c207e34f 1736 if (quiet)
64a7e92f 1737 argv_array_push(&child.args, "-q");
dab76d3a 1738 if (fsck_objects)
5d477a33
JS
1739 argv_array_pushf(&child.args, "--strict%s",
1740 fsck_msg_types.buf);
c08db5a2
JK
1741 if (max_input_size)
1742 argv_array_pushf(&child.args, "--max-input-size=%"PRIuMAX,
1743 (uintmax_t)max_input_size);
59bfdfb8 1744 child.no_stdout = 1;
a22e6f85 1745 child.err = err_fd;
59bfdfb8 1746 child.git_cmd = 1;
31c42bff
NTND
1747 status = run_command(&child);
1748 if (status)
1749 return "unpack-objects abnormal exit";
576162a4 1750 } else {
da25bdb7 1751 char hostname[HOST_NAME_MAX + 1];
576162a4 1752
446d5d91
JK
1753 argv_array_pushl(&child.args, "index-pack", "--stdin", NULL);
1754 push_header_arg(&child.args, &hdr);
b26cb7c7 1755
5781a9a2 1756 if (xgethostname(hostname, sizeof(hostname)))
b26cb7c7
JK
1757 xsnprintf(hostname, sizeof(hostname), "localhost");
1758 argv_array_pushf(&child.args,
1759 "--keep=receive-pack %"PRIuMAX" on %s",
1760 (uintmax_t)getpid(),
1761 hostname);
1762
d06303bb
JK
1763 if (!quiet && err_fd)
1764 argv_array_push(&child.args, "--show-resolving-progress");
83558686
JK
1765 if (use_sideband)
1766 argv_array_push(&child.args, "--report-end-of-input");
dab76d3a 1767 if (fsck_objects)
5d477a33
JS
1768 argv_array_pushf(&child.args, "--strict%s",
1769 fsck_msg_types.buf);
1b68387e 1770 if (!reject_thin)
64a7e92f 1771 argv_array_push(&child.args, "--fix-thin");
c08db5a2
JK
1772 if (max_input_size)
1773 argv_array_pushf(&child.args, "--max-input-size=%"PRIuMAX,
1774 (uintmax_t)max_input_size);
31c42bff
NTND
1775 child.out = -1;
1776 child.err = err_fd;
1777 child.git_cmd = 1;
1778 status = start_command(&child);
1779 if (status)
576162a4 1780 return "index-pack fork failed";
31c42bff
NTND
1781 pack_lockfile = index_pack_lockfile(child.out);
1782 close(child.out);
1783 status = finish_command(&child);
1784 if (status)
1785 return "index-pack abnormal exit";
a49d2834 1786 reprepare_packed_git(the_repository);
cfee10a7 1787 }
31c42bff 1788 return NULL;
cfee10a7
JH
1789}
1790
5dbd7676 1791static const char *unpack_with_sideband(struct shallow_info *si)
a22e6f85
JK
1792{
1793 struct async muxer;
1794 const char *ret;
1795
1796 if (!use_sideband)
5dbd7676 1797 return unpack(0, si);
a22e6f85 1798
83558686 1799 use_keepalive = KEEPALIVE_AFTER_NUL;
a22e6f85
JK
1800 memset(&muxer, 0, sizeof(muxer));
1801 muxer.proc = copy_to_sideband;
1802 muxer.in = -1;
1803 if (start_async(&muxer))
1804 return NULL;
1805
5dbd7676 1806 ret = unpack(muxer.in, si);
a22e6f85
JK
1807
1808 finish_async(&muxer);
1809 return ret;
1810}
1811
c95fc72f 1812static void prepare_shallow_update(struct shallow_info *si)
0a1bc12b 1813{
42c78a21 1814 int i, j, k, bitmap_size = DIV_ROUND_UP(si->ref->nr, 32);
0a1bc12b 1815
b32fa95f 1816 ALLOC_ARRAY(si->used_shallow, si->shallow->nr);
0a1bc12b
NTND
1817 assign_shallow_commits_to_refs(si, si->used_shallow, NULL);
1818
1819 si->need_reachability_test =
1820 xcalloc(si->shallow->nr, sizeof(*si->need_reachability_test));
1821 si->reachable =
1822 xcalloc(si->shallow->nr, sizeof(*si->reachable));
1823 si->shallow_ref = xcalloc(si->ref->nr, sizeof(*si->shallow_ref));
1824
1825 for (i = 0; i < si->nr_ours; i++)
1826 si->need_reachability_test[si->ours[i]] = 1;
1827
1828 for (i = 0; i < si->shallow->nr; i++) {
1829 if (!si->used_shallow[i])
1830 continue;
1831 for (j = 0; j < bitmap_size; j++) {
1832 if (!si->used_shallow[i][j])
1833 continue;
1834 si->need_reachability_test[i]++;
1835 for (k = 0; k < 32; k++)
9a93c668 1836 if (si->used_shallow[i][j] & (1U << k))
0a1bc12b
NTND
1837 si->shallow_ref[j * 32 + k]++;
1838 }
1839
1840 /*
1841 * true for those associated with some refs and belong
1842 * in "ours" list aka "step 7 not done yet"
1843 */
1844 si->need_reachability_test[i] =
1845 si->need_reachability_test[i] > 1;
1846 }
1847
1848 /*
1849 * keep hooks happy by forcing a temporary shallow file via
1850 * env variable because we can't add --shallow-file to every
7987d223 1851 * command. check_connected() will be done with
0a1bc12b
NTND
1852 * true .git/shallow though.
1853 */
1854 setenv(GIT_SHALLOW_FILE_ENVIRONMENT, alt_shallow_file, 1);
1855}
1856
5dbd7676
NTND
1857static void update_shallow_info(struct command *commands,
1858 struct shallow_info *si,
910650d2 1859 struct oid_array *ref)
5dbd7676
NTND
1860{
1861 struct command *cmd;
1862 int *ref_status;
1863 remove_nonexistent_theirs_shallow(si);
0a1bc12b
NTND
1864 if (!si->nr_ours && !si->nr_theirs) {
1865 shallow_update = 0;
5dbd7676 1866 return;
0a1bc12b 1867 }
5dbd7676
NTND
1868
1869 for (cmd = commands; cmd; cmd = cmd->next) {
9c44ea44 1870 if (is_null_oid(&cmd->new_oid))
5dbd7676 1871 continue;
910650d2 1872 oid_array_append(ref, &cmd->new_oid);
5dbd7676
NTND
1873 cmd->index = ref->nr - 1;
1874 }
1875 si->ref = ref;
1876
0a1bc12b 1877 if (shallow_update) {
c95fc72f 1878 prepare_shallow_update(si);
0a1bc12b
NTND
1879 return;
1880 }
1881
b32fa95f 1882 ALLOC_ARRAY(ref_status, ref->nr);
5dbd7676
NTND
1883 assign_shallow_commits_to_refs(si, NULL, ref_status);
1884 for (cmd = commands; cmd; cmd = cmd->next) {
9c44ea44 1885 if (is_null_oid(&cmd->new_oid))
5dbd7676
NTND
1886 continue;
1887 if (ref_status[cmd->index]) {
1888 cmd->error_string = "shallow update not allowed";
1889 cmd->skip_update = 1;
1890 }
1891 }
5dbd7676
NTND
1892 free(ref_status);
1893}
1894
5e1c71fd 1895static void report(struct command *commands, const char *unpack_status)
cfee10a7
JH
1896{
1897 struct command *cmd;
38a81b4e
SP
1898 struct strbuf buf = STRBUF_INIT;
1899
1900 packet_buf_write(&buf, "unpack %s\n",
1901 unpack_status ? unpack_status : "ok");
cfee10a7
JH
1902 for (cmd = commands; cmd; cmd = cmd->next) {
1903 if (!cmd->error_string)
38a81b4e
SP
1904 packet_buf_write(&buf, "ok %s\n",
1905 cmd->ref_name);
cfee10a7 1906 else
38a81b4e
SP
1907 packet_buf_write(&buf, "ng %s %s\n",
1908 cmd->ref_name, cmd->error_string);
575f4974 1909 }
38a81b4e
SP
1910 packet_buf_flush(&buf);
1911
1912 if (use_sideband)
1913 send_sideband(1, 1, buf.buf, buf.len, use_sideband);
1914 else
cdf4fb8e 1915 write_or_die(1, buf.buf, buf.len);
38a81b4e 1916 strbuf_release(&buf);
575f4974
LT
1917}
1918
5e1c71fd 1919static int delete_only(struct command *commands)
d4f694ba 1920{
5e1c71fd
JS
1921 struct command *cmd;
1922 for (cmd = commands; cmd; cmd = cmd->next) {
9c44ea44 1923 if (!is_null_oid(&cmd->new_oid))
d4f694ba 1924 return 0;
d4f694ba
JH
1925 }
1926 return 1;
1927}
1928
be5908ae 1929int cmd_receive_pack(int argc, const char **argv, const char *prefix)
575f4974 1930{
42526b47 1931 int advertise_refs = 0;
5e1c71fd 1932 struct command *commands;
910650d2 1933 struct oid_array shallow = OID_ARRAY_INIT;
1934 struct oid_array ref = OID_ARRAY_INIT;
5dbd7676 1935 struct shallow_info si;
01f9ec64 1936 struct packet_reader reader;
575f4974 1937
1b68387e
SS
1938 struct option options[] = {
1939 OPT__QUIET(&quiet, N_("quiet")),
1940 OPT_HIDDEN_BOOL(0, "stateless-rpc", &stateless_rpc, NULL),
1941 OPT_HIDDEN_BOOL(0, "advertise-refs", &advertise_refs, NULL),
1942 OPT_HIDDEN_BOOL(0, "reject-thin-pack-for-testing", &reject_thin, NULL),
1943 OPT_END()
1944 };
bbc30f99 1945
1b68387e 1946 packet_trace_identity("receive-pack");
575f4974 1947
1b68387e 1948 argc = parse_options(argc, argv, prefix, options, receive_pack_usage, 0);
c207e34f 1949
1b68387e
SS
1950 if (argc > 1)
1951 usage_msg_opt(_("Too many arguments."), receive_pack_usage, options);
1952 if (argc == 0)
1953 usage_msg_opt(_("You must specify a directory."), receive_pack_usage, options);
42526b47 1954
1b68387e 1955 service_dir = argv[0];
575f4974 1956
e1464ca7 1957 setup_path();
5c09f321 1958
5732373d
JH
1959 if (!enter_repo(service_dir, 0))
1960 die("'%s' does not appear to be a git repository", service_dir);
575f4974 1961
ef90d6d4 1962 git_config(receive_pack_config, NULL);
b89363e4 1963 if (cert_nonce_seed)
5732373d 1964 push_cert_nonce = prepare_push_cert_nonce(service_dir, time(NULL));
6fb75bed 1965
e28714c5
JH
1966 if (0 <= transfer_unpack_limit)
1967 unpack_limit = transfer_unpack_limit;
1968 else if (0 <= receive_unpack_limit)
1969 unpack_limit = receive_unpack_limit;
1970
aa9bab29 1971 switch (determine_protocol_version_server()) {
8f6982b4
BW
1972 case protocol_v2:
1973 /*
1974 * push support for protocol v2 has not been implemented yet,
1975 * so ignore the request to use v2 and fallback to using v0.
1976 */
1977 break;
aa9bab29
BW
1978 case protocol_v1:
1979 /*
1980 * v1 is just the original protocol with a version string,
1981 * so just fall through after writing the version string.
1982 */
1983 if (advertise_refs || !stateless_rpc)
1984 packet_write_fmt(1, "version 1\n");
1985
1986 /* fallthrough */
1987 case protocol_v0:
1988 break;
1989 case protocol_unknown_version:
1990 BUG("unknown protocol version");
1991 }
1992
42526b47 1993 if (advertise_refs || !stateless_rpc) {
42526b47 1994 write_head_info();
42526b47
SP
1995 }
1996 if (advertise_refs)
1997 return 0;
575f4974 1998
2d103c31
MS
1999 packet_reader_init(&reader, 0, NULL, 0,
2000 PACKET_READ_CHOMP_NEWLINE |
2001 PACKET_READ_DIE_ON_ERR_PACKET);
01f9ec64
MS
2002
2003 if ((commands = read_head_info(&reader, &shallow)) != NULL) {
d4f694ba 2004 const char *unpack_status = NULL;
77a9745d 2005 struct string_list push_options = STRING_LIST_INIT_DUP;
d4f694ba 2006
c714e45f 2007 if (use_push_options)
01f9ec64 2008 read_push_options(&reader, &push_options);
cbaf82cc
JT
2009 if (!check_cert_push_options(&push_options)) {
2010 struct command *cmd;
2011 for (cmd = commands; cmd; cmd = cmd->next)
2012 cmd->error_string = "inconsistent push options";
2013 }
c714e45f 2014
5dbd7676 2015 prepare_shallow_info(&si, &shallow);
0a1bc12b
NTND
2016 if (!si.nr_ours && !si.nr_theirs)
2017 shallow_update = 0;
5dbd7676
NTND
2018 if (!delete_only(commands)) {
2019 unpack_status = unpack_with_sideband(&si);
2020 update_shallow_info(commands, &si, &ref);
2021 }
83558686 2022 use_keepalive = KEEPALIVE_ALWAYS;
77a9745d
SB
2023 execute_commands(commands, unpack_status, &si,
2024 &push_options);
576162a4 2025 if (pack_lockfile)
691f1a28 2026 unlink_or_warn(pack_lockfile);
cfee10a7 2027 if (report_status)
5e1c71fd 2028 report(commands, unpack_status);
77a9745d
SB
2029 run_receive_hook(commands, "post-receive", 1,
2030 &push_options);
8e663d9e 2031 run_update_post_hook(commands);
4432dd6b 2032 string_list_clear(&push_options, 0);
77e3efbf
JH
2033 if (auto_gc) {
2034 const char *argv_gc_auto[] = {
2035 "gc", "--auto", "--quiet", NULL,
2036 };
860a2ebe
LF
2037 struct child_process proc = CHILD_PROCESS_INIT;
2038
2039 proc.no_stdin = 1;
2040 proc.stdout_to_stderr = 1;
2041 proc.err = use_sideband ? -1 : 0;
2042 proc.git_cmd = 1;
2043 proc.argv = argv_gc_auto;
2044
2d511cfc 2045 close_object_store(the_repository->objects);
860a2ebe
LF
2046 if (!start_command(&proc)) {
2047 if (use_sideband)
2048 copy_to_sideband(proc.err, -1, NULL);
2049 finish_command(&proc);
2050 }
77e3efbf
JH
2051 }
2052 if (auto_update_server_info)
2053 update_server_info(0);
5dbd7676 2054 clear_shallow_info(&si);
7f8e9828 2055 }
38a81b4e
SP
2056 if (use_sideband)
2057 packet_flush(1);
910650d2 2058 oid_array_clear(&shallow);
2059 oid_array_clear(&ref);
b89363e4 2060 free((void *)push_cert_nonce);
575f4974
LT
2061 return 0;
2062}