]> git.ipfire.org Git - thirdparty/git.git/blame - builtin/receive-pack.c
object-store: close all packs upon clearing the object store
[thirdparty/git.git] / builtin / receive-pack.c
CommitLineData
1e4cd68c 1#include "builtin.h"
b2141fc1 2#include "config.h"
697cc8ef 3#include "lockfile.h"
fc04c412 4#include "pack.h"
8a65ff76 5#include "refs.h"
f3a3214e 6#include "pkt-line.h"
38a81b4e 7#include "sideband.h"
b1bf95bb 8#include "run-command.h"
576162a4 9#include "exec_cmd.h"
11031d7e
JS
10#include "commit.h"
11#include "object.h"
d79796bc 12#include "remote.h"
47a59185 13#include "connect.h"
d79796bc 14#include "transport.h"
da3efdb1 15#include "string-list.h"
cff38a5e 16#include "sha1-array.h"
52fed6e1 17#include "connected.h"
31c42bff 18#include "argv-array.h"
ff5effdf 19#include "version.h"
d05b9618
JH
20#include "tag.h"
21#include "gpg-interface.h"
ec7dbd14 22#include "sigchain.h"
5d477a33 23#include "fsck.h"
722ff7f8 24#include "tmp-objdir.h"
ab6eea6f 25#include "oidset.h"
3836d88a 26#include "packfile.h"
aa9bab29 27#include "protocol.h"
575f4974 28
1b68387e
SS
29static const char * const receive_pack_usage[] = {
30 N_("git receive-pack <git-dir>"),
31 NULL
32};
575f4974 33
986e8239 34enum deny_action {
3d95d92b 35 DENY_UNCONFIGURED,
986e8239
JK
36 DENY_IGNORE,
37 DENY_WARN,
1404bcbb
JS
38 DENY_REFUSE,
39 DENY_UPDATE_INSTEAD
986e8239
JK
40};
41
1b53a076
JH
42static int deny_deletes;
43static int deny_non_fast_forwards;
3d95d92b 44static enum deny_action deny_current_branch = DENY_UNCONFIGURED;
747ca245 45static enum deny_action deny_delete_current = DENY_UNCONFIGURED;
dab76d3a
JH
46static int receive_fsck_objects = -1;
47static int transfer_fsck_objects = -1;
5d477a33 48static struct strbuf fsck_msg_types = STRBUF_INIT;
e28714c5
JH
49static int receive_unpack_limit = -1;
50static int transfer_unpack_limit = -1;
1b70fe5d 51static int advertise_atomic_push = 1;
c714e45f 52static int advertise_push_options;
46732fae 53static int unpack_limit = 100;
c08db5a2 54static off_t max_input_size;
96f1e58f 55static int report_status;
38a81b4e 56static int use_sideband;
68deed29 57static int use_atomic;
c714e45f 58static int use_push_options;
c207e34f 59static int quiet;
b74fce16 60static int prefer_ofs_delta = 1;
77e3efbf
JH
61static int auto_update_server_info;
62static int auto_gc = 1;
1b68387e 63static int reject_thin;
5732373d
JH
64static int stateless_rpc;
65static const char *service_dir;
747ca245 66static const char *head_name;
96ec7b1e 67static void *head_name_to_free;
185c04e0 68static int sent_capabilities;
0a1bc12b 69static int shallow_update;
5dbd7676 70static const char *alt_shallow_file;
a85b377d
JH
71static struct strbuf push_cert = STRBUF_INIT;
72static unsigned char push_cert_sha1[20];
d05b9618 73static struct signature_check sigcheck;
b89363e4
JH
74static const char *push_cert_nonce;
75static const char *cert_nonce_seed;
76
77static const char *NONCE_UNSOLICITED = "UNSOLICITED";
78static const char *NONCE_BAD = "BAD";
79static const char *NONCE_MISSING = "MISSING";
80static const char *NONCE_OK = "OK";
5732373d 81static const char *NONCE_SLOP = "SLOP";
b89363e4 82static const char *nonce_status;
5732373d 83static long nonce_stamp_slop;
dddbad72 84static timestamp_t nonce_stamp_slop_limit;
222368c6 85static struct ref_transaction *transaction;
cfee10a7 86
83558686
JK
87static enum {
88 KEEPALIVE_NEVER = 0,
89 KEEPALIVE_AFTER_NUL,
90 KEEPALIVE_ALWAYS
91} use_keepalive;
92static int keepalive_in_sec = 5;
93
722ff7f8
JK
94static struct tmp_objdir *tmp_objdir;
95
986e8239
JK
96static enum deny_action parse_deny_action(const char *var, const char *value)
97{
98 if (value) {
99 if (!strcasecmp(value, "ignore"))
100 return DENY_IGNORE;
101 if (!strcasecmp(value, "warn"))
102 return DENY_WARN;
103 if (!strcasecmp(value, "refuse"))
104 return DENY_REFUSE;
1404bcbb
JS
105 if (!strcasecmp(value, "updateinstead"))
106 return DENY_UPDATE_INSTEAD;
986e8239
JK
107 }
108 if (git_config_bool(var, value))
109 return DENY_REFUSE;
110 return DENY_IGNORE;
111}
112
ef90d6d4 113static int receive_pack_config(const char *var, const char *value, void *cb)
6fb75bed 114{
daebaa78
JH
115 int status = parse_hide_refs_config(var, value, "receive");
116
117 if (status)
118 return status;
119
a240de11
JK
120 if (strcmp(var, "receive.denydeletes") == 0) {
121 deny_deletes = git_config_bool(var, value);
122 return 0;
123 }
124
e28714c5 125 if (strcmp(var, "receive.denynonfastforwards") == 0) {
6fb75bed
SP
126 deny_non_fast_forwards = git_config_bool(var, value);
127 return 0;
128 }
129
e28714c5
JH
130 if (strcmp(var, "receive.unpacklimit") == 0) {
131 receive_unpack_limit = git_config_int(var, value);
fc04c412
SP
132 return 0;
133 }
134
e28714c5
JH
135 if (strcmp(var, "transfer.unpacklimit") == 0) {
136 transfer_unpack_limit = git_config_int(var, value);
137 return 0;
138 }
139
cd94c6f9
JS
140 if (strcmp(var, "receive.fsck.skiplist") == 0) {
141 const char *path;
142
143 if (git_config_pathname(&path, var, value))
144 return 1;
145 strbuf_addf(&fsck_msg_types, "%cskiplist=%s",
146 fsck_msg_types.len ? ',' : '=', path);
147 free((char *)path);
148 return 0;
149 }
150
5d477a33
JS
151 if (skip_prefix(var, "receive.fsck.", &var)) {
152 if (is_valid_msg_type(var, value))
153 strbuf_addf(&fsck_msg_types, "%c%s=%s",
154 fsck_msg_types.len ? ',' : '=', var, value);
155 else
156 warning("Skipping unknown msg id '%s'", var);
157 return 0;
158 }
159
20dc0016
MK
160 if (strcmp(var, "receive.fsckobjects") == 0) {
161 receive_fsck_objects = git_config_bool(var, value);
162 return 0;
163 }
164
dab76d3a
JH
165 if (strcmp(var, "transfer.fsckobjects") == 0) {
166 transfer_fsck_objects = git_config_bool(var, value);
167 return 0;
168 }
169
986e8239
JK
170 if (!strcmp(var, "receive.denycurrentbranch")) {
171 deny_current_branch = parse_deny_action(var, value);
172 return 0;
173 }
174
747ca245
JH
175 if (strcmp(var, "receive.denydeletecurrent") == 0) {
176 deny_delete_current = parse_deny_action(var, value);
177 return 0;
178 }
179
b74fce16
NP
180 if (strcmp(var, "repack.usedeltabaseoffset") == 0) {
181 prefer_ofs_delta = git_config_bool(var, value);
182 return 0;
183 }
184
77e3efbf
JH
185 if (strcmp(var, "receive.updateserverinfo") == 0) {
186 auto_update_server_info = git_config_bool(var, value);
187 return 0;
188 }
189
190 if (strcmp(var, "receive.autogc") == 0) {
191 auto_gc = git_config_bool(var, value);
192 return 0;
193 }
194
0a1bc12b
NTND
195 if (strcmp(var, "receive.shallowupdate") == 0) {
196 shallow_update = git_config_bool(var, value);
197 return 0;
198 }
199
b89363e4
JH
200 if (strcmp(var, "receive.certnonceseed") == 0)
201 return git_config_string(&cert_nonce_seed, var, value);
a85b377d 202
5732373d
JH
203 if (strcmp(var, "receive.certnonceslop") == 0) {
204 nonce_stamp_slop_limit = git_config_ulong(var, value);
205 return 0;
206 }
207
1b70fe5d
RS
208 if (strcmp(var, "receive.advertiseatomic") == 0) {
209 advertise_atomic_push = git_config_bool(var, value);
210 return 0;
211 }
212
c714e45f
SB
213 if (strcmp(var, "receive.advertisepushoptions") == 0) {
214 advertise_push_options = git_config_bool(var, value);
215 return 0;
216 }
217
83558686
JK
218 if (strcmp(var, "receive.keepalive") == 0) {
219 keepalive_in_sec = git_config_int(var, value);
220 return 0;
221 }
222
c08db5a2
JK
223 if (strcmp(var, "receive.maxinputsize") == 0) {
224 max_input_size = git_config_int64(var, value);
225 return 0;
226 }
227
ef90d6d4 228 return git_default_config(var, value, cb);
6fb75bed
SP
229}
230
1b7ba794 231static void show_ref(const char *path, const struct object_id *oid)
575f4974 232{
52d2ae58 233 if (sent_capabilities) {
1b7ba794 234 packet_write_fmt(1, "%s %s\n", oid_to_hex(oid), path);
52d2ae58
JH
235 } else {
236 struct strbuf cap = STRBUF_INIT;
237
238 strbuf_addstr(&cap,
239 "report-status delete-refs side-band-64k quiet");
1b70fe5d
RS
240 if (advertise_atomic_push)
241 strbuf_addstr(&cap, " atomic");
52d2ae58
JH
242 if (prefer_ofs_delta)
243 strbuf_addstr(&cap, " ofs-delta");
b89363e4
JH
244 if (push_cert_nonce)
245 strbuf_addf(&cap, " push-cert=%s", push_cert_nonce);
c714e45f
SB
246 if (advertise_push_options)
247 strbuf_addstr(&cap, " push-options");
52d2ae58 248 strbuf_addf(&cap, " agent=%s", git_user_agent_sanitized());
81c634e9 249 packet_write_fmt(1, "%s %s%c%s\n",
1b7ba794 250 oid_to_hex(oid), path, 0, cap.buf);
52d2ae58
JH
251 strbuf_release(&cap);
252 sent_capabilities = 1;
253 }
575f4974
LT
254}
255
78a766ab 256static int show_ref_cb(const char *path_full, const struct object_id *oid,
8b24b9e7 257 int flag, void *data)
6b01ecfe 258{
8b24b9e7 259 struct oidset *seen = data;
78a766ab
LF
260 const char *path = strip_namespace(path_full);
261
262 if (ref_is_hidden(path, path_full))
263 return 0;
264
6b01ecfe
JT
265 /*
266 * Advertise refs outside our current namespace as ".have"
267 * refs, so that the client can use them to minimize data
fea6c47f 268 * transfer but will otherwise ignore them.
6b01ecfe 269 */
8b24b9e7
JK
270 if (!path) {
271 if (oidset_insert(seen, oid))
272 return 0;
6b01ecfe 273 path = ".have";
63d428e6
JK
274 } else {
275 oidset_insert(seen, oid);
8b24b9e7 276 }
1b7ba794 277 show_ref(path, oid);
bc98201d 278 return 0;
6b01ecfe
JT
279}
280
ab6eea6f
JK
281static void show_one_alternate_ref(const char *refname,
282 const struct object_id *oid,
283 void *data)
b7a025d9 284{
ab6eea6f 285 struct oidset *seen = data;
b7a025d9 286
ab6eea6f
JK
287 if (oidset_insert(seen, oid))
288 return;
289
1b7ba794 290 show_ref(".have", oid);
6b01ecfe
JT
291}
292
8a65ff76 293static void write_head_info(void)
575f4974 294{
ab6eea6f 295 static struct oidset seen = OIDSET_INIT;
2b2a5be3 296
63d428e6 297 for_each_ref(show_ref_cb, &seen);
ab6eea6f
JK
298 for_each_alternate_ref(show_one_alternate_ref, &seen);
299 oidset_clear(&seen);
185c04e0 300 if (!sent_capabilities)
1b7ba794 301 show_ref("capabilities^{}", &null_oid);
cfee10a7 302
ad491366
NTND
303 advertise_shallow_grafts(1);
304
b7a025d9
MH
305 /* EOF */
306 packet_flush(1);
575f4974
LT
307}
308
eb1af2df
LT
309struct command {
310 struct command *next;
cfee10a7 311 const char *error_string;
160b81ed
PYH
312 unsigned int skip_update:1,
313 did_not_exist:1;
5dbd7676 314 int index;
9c44ea44 315 struct object_id old_oid;
316 struct object_id new_oid;
8f1d2e6f 317 char ref_name[FLEX_ARRAY]; /* more */
575f4974
LT
318};
319
466dbc42
SP
320static void rp_error(const char *err, ...) __attribute__((format (printf, 1, 2)));
321static void rp_warning(const char *err, ...) __attribute__((format (printf, 1, 2)));
322
323static void report_message(const char *prefix, const char *err, va_list params)
324{
b7115a35 325 int sz;
466dbc42
SP
326 char msg[4096];
327
b7115a35 328 sz = xsnprintf(msg, sizeof(msg), "%s", prefix);
466dbc42
SP
329 sz += vsnprintf(msg + sz, sizeof(msg) - sz, err, params);
330 if (sz > (sizeof(msg) - 1))
331 sz = sizeof(msg) - 1;
332 msg[sz++] = '\n';
333
334 if (use_sideband)
335 send_sideband(1, 2, msg, sz, use_sideband);
336 else
337 xwrite(2, msg, sz);
338}
339
340static void rp_warning(const char *err, ...)
341{
342 va_list params;
343 va_start(params, err);
344 report_message("warning: ", err, params);
345 va_end(params);
346}
347
348static void rp_error(const char *err, ...)
349{
350 va_list params;
351 va_start(params, err);
352 report_message("error: ", err, params);
353 va_end(params);
354}
355
6d525d38
SP
356static int copy_to_sideband(int in, int out, void *arg)
357{
358 char data[128];
83558686
JK
359 int keepalive_active = 0;
360
361 if (keepalive_in_sec <= 0)
362 use_keepalive = KEEPALIVE_NEVER;
363 if (use_keepalive == KEEPALIVE_ALWAYS)
364 keepalive_active = 1;
365
6d525d38 366 while (1) {
83558686
JK
367 ssize_t sz;
368
369 if (keepalive_active) {
370 struct pollfd pfd;
371 int ret;
372
373 pfd.fd = in;
374 pfd.events = POLLIN;
375 ret = poll(&pfd, 1, 1000 * keepalive_in_sec);
376
377 if (ret < 0) {
378 if (errno == EINTR)
379 continue;
380 else
381 break;
382 } else if (ret == 0) {
383 /* no data; send a keepalive packet */
384 static const char buf[] = "0005\1";
385 write_or_die(1, buf, sizeof(buf) - 1);
386 continue;
387 } /* else there is actual data to read */
388 }
389
390 sz = xread(in, data, sizeof(data));
6d525d38
SP
391 if (sz <= 0)
392 break;
83558686
JK
393
394 if (use_keepalive == KEEPALIVE_AFTER_NUL && !keepalive_active) {
395 const char *p = memchr(data, '\0', sz);
396 if (p) {
397 /*
398 * The NUL tells us to start sending keepalives. Make
399 * sure we send any other data we read along
400 * with it.
401 */
402 keepalive_active = 1;
403 send_sideband(1, 2, data, p - data, use_sideband);
404 send_sideband(1, 2, p + 1, sz - (p - data + 1), use_sideband);
405 continue;
406 }
407 }
408
409 /*
410 * Either we're not looking for a NUL signal, or we didn't see
411 * it yet; just pass along the data.
412 */
6d525d38
SP
413 send_sideband(1, 2, data, sz, use_sideband);
414 }
415 close(in);
416 return 0;
417}
418
b89363e4
JH
419#define HMAC_BLOCK_SIZE 64
420
6f5ef44e 421static void hmac_sha1(unsigned char *out,
b89363e4
JH
422 const char *key_in, size_t key_len,
423 const char *text, size_t text_len)
424{
425 unsigned char key[HMAC_BLOCK_SIZE];
426 unsigned char k_ipad[HMAC_BLOCK_SIZE];
427 unsigned char k_opad[HMAC_BLOCK_SIZE];
428 int i;
429 git_SHA_CTX ctx;
430
431 /* RFC 2104 2. (1) */
432 memset(key, '\0', HMAC_BLOCK_SIZE);
433 if (HMAC_BLOCK_SIZE < key_len) {
434 git_SHA1_Init(&ctx);
435 git_SHA1_Update(&ctx, key_in, key_len);
436 git_SHA1_Final(key, &ctx);
437 } else {
438 memcpy(key, key_in, key_len);
439 }
440
441 /* RFC 2104 2. (2) & (5) */
442 for (i = 0; i < sizeof(key); i++) {
443 k_ipad[i] = key[i] ^ 0x36;
444 k_opad[i] = key[i] ^ 0x5c;
445 }
446
447 /* RFC 2104 2. (3) & (4) */
448 git_SHA1_Init(&ctx);
449 git_SHA1_Update(&ctx, k_ipad, sizeof(k_ipad));
450 git_SHA1_Update(&ctx, text, text_len);
451 git_SHA1_Final(out, &ctx);
452
453 /* RFC 2104 2. (6) & (7) */
454 git_SHA1_Init(&ctx);
455 git_SHA1_Update(&ctx, k_opad, sizeof(k_opad));
6f5ef44e 456 git_SHA1_Update(&ctx, out, 20);
b89363e4
JH
457 git_SHA1_Final(out, &ctx);
458}
459
dddbad72 460static char *prepare_push_cert_nonce(const char *path, timestamp_t stamp)
b89363e4
JH
461{
462 struct strbuf buf = STRBUF_INIT;
463 unsigned char sha1[20];
464
cb71f8bd 465 strbuf_addf(&buf, "%s:%"PRItime, path, stamp);
b89363e4
JH
466 hmac_sha1(sha1, buf.buf, buf.len, cert_nonce_seed, strlen(cert_nonce_seed));;
467 strbuf_release(&buf);
468
469 /* RFC 2104 5. HMAC-SHA1-80 */
cb71f8bd 470 strbuf_addf(&buf, "%"PRItime"-%.*s", stamp, 20, sha1_to_hex(sha1));
b89363e4
JH
471 return strbuf_detach(&buf, NULL);
472}
473
474/*
475 * NEEDSWORK: reuse find_commit_header() from jk/commit-author-parsing
476 * after dropping "_commit" from its name and possibly moving it out
477 * of commit.c
478 */
cbaf82cc
JT
479static char *find_header(const char *msg, size_t len, const char *key,
480 const char **next_line)
b89363e4
JH
481{
482 int key_len = strlen(key);
483 const char *line = msg;
484
485 while (line && line < msg + len) {
486 const char *eol = strchrnul(line, '\n');
487
488 if ((msg + len <= eol) || line == eol)
489 return NULL;
490 if (line + key_len < eol &&
491 !memcmp(line, key, key_len) && line[key_len] == ' ') {
492 int offset = key_len + 1;
cbaf82cc
JT
493 if (next_line)
494 *next_line = *eol ? eol + 1 : eol;
b89363e4
JH
495 return xmemdupz(line + offset, (eol - line) - offset);
496 }
497 line = *eol ? eol + 1 : NULL;
498 }
499 return NULL;
500}
501
502static const char *check_nonce(const char *buf, size_t len)
503{
cbaf82cc 504 char *nonce = find_header(buf, len, "nonce", NULL);
dddbad72 505 timestamp_t stamp, ostamp;
5732373d 506 char *bohmac, *expect = NULL;
b89363e4
JH
507 const char *retval = NONCE_BAD;
508
509 if (!nonce) {
510 retval = NONCE_MISSING;
511 goto leave;
512 } else if (!push_cert_nonce) {
513 retval = NONCE_UNSOLICITED;
514 goto leave;
515 } else if (!strcmp(push_cert_nonce, nonce)) {
516 retval = NONCE_OK;
517 goto leave;
518 }
519
5732373d
JH
520 if (!stateless_rpc) {
521 /* returned nonce MUST match what we gave out earlier */
522 retval = NONCE_BAD;
523 goto leave;
524 }
525
526 /*
527 * In stateless mode, we may be receiving a nonce issued by
528 * another instance of the server that serving the same
529 * repository, and the timestamps may not match, but the
530 * nonce-seed and dir should match, so we can recompute and
531 * report the time slop.
532 *
533 * In addition, when a nonce issued by another instance has
534 * timestamp within receive.certnonceslop seconds, we pretend
535 * as if we issued that nonce when reporting to the hook.
536 */
537
538 /* nonce is concat(<seconds-since-epoch>, "-", <hmac>) */
539 if (*nonce <= '0' || '9' < *nonce) {
540 retval = NONCE_BAD;
541 goto leave;
542 }
1aeb7e75 543 stamp = parse_timestamp(nonce, &bohmac, 10);
5732373d
JH
544 if (bohmac == nonce || bohmac[0] != '-') {
545 retval = NONCE_BAD;
546 goto leave;
547 }
548
549 expect = prepare_push_cert_nonce(service_dir, stamp);
550 if (strcmp(expect, nonce)) {
551 /* Not what we would have signed earlier */
552 retval = NONCE_BAD;
553 goto leave;
554 }
555
556 /*
557 * By how many seconds is this nonce stale? Negative value
558 * would mean it was issued by another server with its clock
559 * skewed in the future.
560 */
1aeb7e75 561 ostamp = parse_timestamp(push_cert_nonce, NULL, 10);
5732373d
JH
562 nonce_stamp_slop = (long)ostamp - (long)stamp;
563
564 if (nonce_stamp_slop_limit &&
31a8aa1e 565 labs(nonce_stamp_slop) <= nonce_stamp_slop_limit) {
5732373d
JH
566 /*
567 * Pretend as if the received nonce (which passes the
568 * HMAC check, so it is not a forged by third-party)
569 * is what we issued.
570 */
571 free((void *)push_cert_nonce);
572 push_cert_nonce = xstrdup(nonce);
573 retval = NONCE_OK;
574 } else {
575 retval = NONCE_SLOP;
576 }
b89363e4
JH
577
578leave:
579 free(nonce);
5732373d 580 free(expect);
b89363e4
JH
581 return retval;
582}
583
cbaf82cc
JT
584/*
585 * Return 1 if there is no push_cert or if the push options in push_cert are
586 * the same as those in the argument; 0 otherwise.
587 */
588static int check_cert_push_options(const struct string_list *push_options)
589{
590 const char *buf = push_cert.buf;
591 int len = push_cert.len;
592
593 char *option;
594 const char *next_line;
595 int options_seen = 0;
596
597 int retval = 1;
598
599 if (!len)
600 return 1;
601
602 while ((option = find_header(buf, len, "push-option", &next_line))) {
603 len -= (next_line - buf);
604 buf = next_line;
605 options_seen++;
606 if (options_seen > push_options->nr
607 || strcmp(option,
608 push_options->items[options_seen - 1].string)) {
609 retval = 0;
610 goto leave;
611 }
612 free(option);
613 }
614
615 if (options_seen != push_options->nr)
616 retval = 0;
617
618leave:
619 free(option);
620 return retval;
621}
622
a85b377d
JH
623static void prepare_push_cert_sha1(struct child_process *proc)
624{
625 static int already_done;
a85b377d
JH
626
627 if (!push_cert.len)
628 return;
629
630 if (!already_done) {
d05b9618
JH
631 struct strbuf gpg_output = STRBUF_INIT;
632 struct strbuf gpg_status = STRBUF_INIT;
633 int bogs /* beginning_of_gpg_sig */;
634
a85b377d
JH
635 already_done = 1;
636 if (write_sha1_file(push_cert.buf, push_cert.len, "blob", push_cert_sha1))
637 hashclr(push_cert_sha1);
d05b9618
JH
638
639 memset(&sigcheck, '\0', sizeof(sigcheck));
640 sigcheck.result = 'N';
641
642 bogs = parse_signature(push_cert.buf, push_cert.len);
643 if (verify_signed_buffer(push_cert.buf, bogs,
644 push_cert.buf + bogs, push_cert.len - bogs,
645 &gpg_output, &gpg_status) < 0) {
646 ; /* error running gpg */
647 } else {
648 sigcheck.payload = push_cert.buf;
649 sigcheck.gpg_output = gpg_output.buf;
650 sigcheck.gpg_status = gpg_status.buf;
651 parse_gpg_output(&sigcheck);
652 }
653
654 strbuf_release(&gpg_output);
655 strbuf_release(&gpg_status);
b89363e4 656 nonce_status = check_nonce(push_cert.buf, bogs);
a85b377d
JH
657 }
658 if (!is_null_sha1(push_cert_sha1)) {
a9154590
RS
659 argv_array_pushf(&proc->env_array, "GIT_PUSH_CERT=%s",
660 sha1_to_hex(push_cert_sha1));
661 argv_array_pushf(&proc->env_array, "GIT_PUSH_CERT_SIGNER=%s",
d05b9618 662 sigcheck.signer ? sigcheck.signer : "");
a9154590 663 argv_array_pushf(&proc->env_array, "GIT_PUSH_CERT_KEY=%s",
d05b9618 664 sigcheck.key ? sigcheck.key : "");
a9154590
RS
665 argv_array_pushf(&proc->env_array, "GIT_PUSH_CERT_STATUS=%c",
666 sigcheck.result);
b89363e4 667 if (push_cert_nonce) {
a9154590
RS
668 argv_array_pushf(&proc->env_array,
669 "GIT_PUSH_CERT_NONCE=%s",
670 push_cert_nonce);
671 argv_array_pushf(&proc->env_array,
672 "GIT_PUSH_CERT_NONCE_STATUS=%s",
673 nonce_status);
5732373d 674 if (nonce_status == NONCE_SLOP)
a9154590
RS
675 argv_array_pushf(&proc->env_array,
676 "GIT_PUSH_CERT_NONCE_SLOP=%ld",
5732373d 677 nonce_stamp_slop);
b89363e4 678 }
a85b377d
JH
679 }
680}
681
77a9745d
SB
682struct receive_hook_feed_state {
683 struct command *cmd;
684 int skip_broken;
685 struct strbuf buf;
686 const struct string_list *push_options;
687};
688
9684e44a 689typedef int (*feed_fn)(void *, const char **, size_t *);
77a9745d
SB
690static int run_and_feed_hook(const char *hook_name, feed_fn feed,
691 struct receive_hook_feed_state *feed_state)
b1bf95bb 692{
d3180279 693 struct child_process proc = CHILD_PROCESS_INIT;
6d525d38 694 struct async muxer;
f43cd49f 695 const char *argv[2];
9684e44a 696 int code;
b1bf95bb 697
5a7da2dc
AS
698 argv[0] = find_hook(hook_name);
699 if (!argv[0])
b1bf95bb 700 return 0;
c8dd2771 701
f43cd49f
SP
702 argv[1] = NULL;
703
f43cd49f
SP
704 proc.argv = argv;
705 proc.in = -1;
706 proc.stdout_to_stderr = 1;
77a9745d
SB
707 if (feed_state->push_options) {
708 int i;
709 for (i = 0; i < feed_state->push_options->nr; i++)
710 argv_array_pushf(&proc.env_array,
711 "GIT_PUSH_OPTION_%d=%s", i,
712 feed_state->push_options->items[i].string);
713 argv_array_pushf(&proc.env_array, "GIT_PUSH_OPTION_COUNT=%d",
714 feed_state->push_options->nr);
715 } else
716 argv_array_pushf(&proc.env_array, "GIT_PUSH_OPTION_COUNT");
f43cd49f 717
722ff7f8
JK
718 if (tmp_objdir)
719 argv_array_pushv(&proc.env_array, tmp_objdir_env(tmp_objdir));
720
6d525d38
SP
721 if (use_sideband) {
722 memset(&muxer, 0, sizeof(muxer));
723 muxer.proc = copy_to_sideband;
724 muxer.in = -1;
725 code = start_async(&muxer);
726 if (code)
727 return code;
728 proc.err = muxer.in;
729 }
730
5d222c09
RS
731 prepare_push_cert_sha1(&proc);
732
f43cd49f 733 code = start_command(&proc);
6d525d38
SP
734 if (code) {
735 if (use_sideband)
736 finish_async(&muxer);
90e41a89 737 return code;
6d525d38
SP
738 }
739
ec7dbd14
JH
740 sigchain_push(SIGPIPE, SIG_IGN);
741
9684e44a
JH
742 while (1) {
743 const char *buf;
744 size_t n;
745 if (feed(feed_state, &buf, &n))
746 break;
06f46f23 747 if (write_in_full(proc.in, buf, n) < 0)
9684e44a 748 break;
c8dd2771 749 }
e72ae288 750 close(proc.in);
6d525d38
SP
751 if (use_sideband)
752 finish_async(&muxer);
ec7dbd14
JH
753
754 sigchain_pop(SIGPIPE);
755
90e41a89 756 return finish_command(&proc);
b1bf95bb
JW
757}
758
9684e44a
JH
759static int feed_receive_hook(void *state_, const char **bufp, size_t *sizep)
760{
761 struct receive_hook_feed_state *state = state_;
762 struct command *cmd = state->cmd;
763
cdc2b2f3
JH
764 while (cmd &&
765 state->skip_broken && (cmd->error_string || cmd->did_not_exist))
9684e44a
JH
766 cmd = cmd->next;
767 if (!cmd)
768 return -1; /* EOF */
769 strbuf_reset(&state->buf);
770 strbuf_addf(&state->buf, "%s %s %s\n",
9c44ea44 771 oid_to_hex(&cmd->old_oid), oid_to_hex(&cmd->new_oid),
9684e44a
JH
772 cmd->ref_name);
773 state->cmd = cmd->next;
774 if (bufp) {
775 *bufp = state->buf.buf;
776 *sizep = state->buf.len;
777 }
778 return 0;
779}
780
77a9745d
SB
781static int run_receive_hook(struct command *commands,
782 const char *hook_name,
783 int skip_broken,
784 const struct string_list *push_options)
9684e44a
JH
785{
786 struct receive_hook_feed_state state;
787 int status;
788
789 strbuf_init(&state.buf, 0);
790 state.cmd = commands;
cdc2b2f3 791 state.skip_broken = skip_broken;
9684e44a
JH
792 if (feed_receive_hook(&state, NULL, NULL))
793 return 0;
794 state.cmd = commands;
77a9745d 795 state.push_options = push_options;
9684e44a
JH
796 status = run_and_feed_hook(hook_name, feed_receive_hook, &state);
797 strbuf_release(&state.buf);
798 return status;
799}
800
1d9e8b56
SP
801static int run_update_hook(struct command *cmd)
802{
1d9e8b56 803 const char *argv[5];
d3180279 804 struct child_process proc = CHILD_PROCESS_INIT;
6d525d38 805 int code;
1d9e8b56 806
5a7da2dc
AS
807 argv[0] = find_hook("update");
808 if (!argv[0])
1d9e8b56
SP
809 return 0;
810
1d9e8b56 811 argv[1] = cmd->ref_name;
9c44ea44 812 argv[2] = oid_to_hex(&cmd->old_oid);
813 argv[3] = oid_to_hex(&cmd->new_oid);
1d9e8b56
SP
814 argv[4] = NULL;
815
6d525d38
SP
816 proc.no_stdin = 1;
817 proc.stdout_to_stderr = 1;
818 proc.err = use_sideband ? -1 : 0;
819 proc.argv = argv;
820
821 code = start_command(&proc);
822 if (code)
823 return code;
824 if (use_sideband)
825 copy_to_sideband(proc.err, -1, NULL);
826 return finish_command(&proc);
1d9e8b56
SP
827}
828
986e8239
JK
829static int is_ref_checked_out(const char *ref)
830{
986e8239
JK
831 if (is_bare_repository())
832 return 0;
833
747ca245 834 if (!head_name)
986e8239 835 return 0;
747ca245 836 return !strcmp(head_name, ref);
986e8239
JK
837}
838
8ba35a2d
VA
839static char *refuse_unconfigured_deny_msg =
840 N_("By default, updating the current branch in a non-bare repository\n"
841 "is denied, because it will make the index and work tree inconsistent\n"
842 "with what you pushed, and will require 'git reset --hard' to match\n"
843 "the work tree to HEAD.\n"
844 "\n"
2ddaa427
AH
845 "You can set the 'receive.denyCurrentBranch' configuration variable\n"
846 "to 'ignore' or 'warn' in the remote repository to allow pushing into\n"
8ba35a2d
VA
847 "its current branch; however, this is not recommended unless you\n"
848 "arranged to update its work tree to match what you pushed in some\n"
849 "other way.\n"
850 "\n"
851 "To squelch this message and still keep the default behaviour, set\n"
852 "'receive.denyCurrentBranch' configuration variable to 'refuse'.");
3d95d92b 853
acd2a45b 854static void refuse_unconfigured_deny(void)
3d95d92b 855{
8ba35a2d 856 rp_error("%s", _(refuse_unconfigured_deny_msg));
3d95d92b
JH
857}
858
8ba35a2d
VA
859static char *refuse_unconfigured_deny_delete_current_msg =
860 N_("By default, deleting the current branch is denied, because the next\n"
861 "'git clone' won't result in any file checked out, causing confusion.\n"
862 "\n"
863 "You can set 'receive.denyDeleteCurrent' configuration variable to\n"
864 "'warn' or 'ignore' in the remote repository to allow deleting the\n"
865 "current branch, with or without a warning message.\n"
866 "\n"
867 "To squelch this message, you can set it to 'refuse'.");
747ca245 868
375881fa 869static void refuse_unconfigured_deny_delete_current(void)
747ca245 870{
8ba35a2d 871 rp_error("%s", _(refuse_unconfigured_deny_delete_current_msg));
747ca245
JH
872}
873
6ccac9ee 874static int command_singleton_iterator(void *cb_data, struct object_id *oid);
0a1bc12b
NTND
875static int update_shallow_ref(struct command *cmd, struct shallow_info *si)
876{
877 static struct lock_file shallow_lock;
910650d2 878 struct oid_array extra = OID_ARRAY_INIT;
7043c707 879 struct check_connected_options opt = CHECK_CONNECTED_INIT;
0a1bc12b
NTND
880 uint32_t mask = 1 << (cmd->index % 32);
881 int i;
882
6aa30857 883 trace_printf_key(&trace_shallow,
0a1bc12b
NTND
884 "shallow: update_shallow_ref %s\n", cmd->ref_name);
885 for (i = 0; i < si->shallow->nr; i++)
886 if (si->used_shallow[i] &&
887 (si->used_shallow[i][cmd->index / 32] & mask) &&
888 !delayed_reachability_test(si, i))
910650d2 889 oid_array_append(&extra, &si->shallow->oid[i]);
0a1bc12b 890
722ff7f8 891 opt.env = tmp_objdir_env(tmp_objdir);
7043c707
JK
892 setup_alternate_shallow(&shallow_lock, &opt.shallow_file, &extra);
893 if (check_connected(command_singleton_iterator, cmd, &opt)) {
0a1bc12b 894 rollback_lock_file(&shallow_lock);
910650d2 895 oid_array_clear(&extra);
0a1bc12b
NTND
896 return -1;
897 }
898
899 commit_lock_file(&shallow_lock);
900
901 /*
902 * Make sure setup_alternate_shallow() for the next ref does
903 * not lose these new roots..
904 */
905 for (i = 0; i < extra.nr; i++)
e92b848c 906 register_shallow(&extra.oid[i]);
0a1bc12b
NTND
907
908 si->shallow_ref[cmd->index] = 0;
910650d2 909 oid_array_clear(&extra);
0a1bc12b
NTND
910 return 0;
911}
912
1a51b524
JH
913/*
914 * NEEDSWORK: we should consolidate various implementions of "are we
915 * on an unborn branch?" test into one, and make the unified one more
916 * robust. !get_sha1() based check used here and elsewhere would not
917 * allow us to tell an unborn branch from corrupt ref, for example.
918 * For the purpose of fixing "deploy-to-update does not work when
919 * pushing into an empty repository" issue, this should suffice for
920 * now.
921 */
922static int head_has_history(void)
923{
15be4a5d 924 struct object_id oid;
1a51b524 925
15be4a5d 926 return !get_oid("HEAD", &oid);
1a51b524
JH
927}
928
21b138d0
JH
929static const char *push_to_deploy(unsigned char *sha1,
930 struct argv_array *env,
931 const char *work_tree)
1404bcbb
JS
932{
933 const char *update_refresh[] = {
934 "update-index", "-q", "--ignore-submodules", "--refresh", NULL
935 };
936 const char *diff_files[] = {
937 "diff-files", "--quiet", "--ignore-submodules", "--", NULL
938 };
939 const char *diff_index[] = {
940 "diff-index", "--quiet", "--cached", "--ignore-submodules",
1a51b524 941 NULL, "--", NULL
1404bcbb
JS
942 };
943 const char *read_tree[] = {
944 "read-tree", "-u", "-m", NULL, NULL
945 };
1404bcbb
JS
946 struct child_process child = CHILD_PROCESS_INIT;
947
1404bcbb 948 child.argv = update_refresh;
21b138d0 949 child.env = env->argv;
1404bcbb
JS
950 child.dir = work_tree;
951 child.no_stdin = 1;
952 child.stdout_to_stderr = 1;
953 child.git_cmd = 1;
21b138d0 954 if (run_command(&child))
1404bcbb 955 return "Up-to-date check failed";
1404bcbb
JS
956
957 /* run_command() does not clean up completely; reinitialize */
958 child_process_init(&child);
959 child.argv = diff_files;
21b138d0 960 child.env = env->argv;
1404bcbb
JS
961 child.dir = work_tree;
962 child.no_stdin = 1;
963 child.stdout_to_stderr = 1;
964 child.git_cmd = 1;
21b138d0 965 if (run_command(&child))
1404bcbb 966 return "Working directory has unstaged changes";
1404bcbb 967
1a51b524
JH
968 /* diff-index with either HEAD or an empty tree */
969 diff_index[4] = head_has_history() ? "HEAD" : EMPTY_TREE_SHA1_HEX;
970
1404bcbb
JS
971 child_process_init(&child);
972 child.argv = diff_index;
21b138d0 973 child.env = env->argv;
1404bcbb
JS
974 child.no_stdin = 1;
975 child.no_stdout = 1;
976 child.stdout_to_stderr = 0;
977 child.git_cmd = 1;
21b138d0 978 if (run_command(&child))
1404bcbb 979 return "Working directory has staged changes";
1404bcbb
JS
980
981 read_tree[3] = sha1_to_hex(sha1);
982 child_process_init(&child);
983 child.argv = read_tree;
21b138d0 984 child.env = env->argv;
1404bcbb
JS
985 child.dir = work_tree;
986 child.no_stdin = 1;
987 child.no_stdout = 1;
988 child.stdout_to_stderr = 0;
989 child.git_cmd = 1;
21b138d0 990 if (run_command(&child))
1404bcbb 991 return "Could not update working tree to new HEAD";
1404bcbb 992
1404bcbb
JS
993 return NULL;
994}
995
08553319
JH
996static const char *push_to_checkout_hook = "push-to-checkout";
997
998static const char *push_to_checkout(unsigned char *sha1,
999 struct argv_array *env,
1000 const char *work_tree)
1001{
1002 argv_array_pushf(env, "GIT_WORK_TREE=%s", absolute_path(work_tree));
1003 if (run_hook_le(env->argv, push_to_checkout_hook,
1004 sha1_to_hex(sha1), NULL))
1005 return "push-to-checkout hook declined";
1006 else
1007 return NULL;
1008}
1009
21b138d0
JH
1010static const char *update_worktree(unsigned char *sha1)
1011{
1012 const char *retval;
1013 const char *work_tree = git_work_tree_cfg ? git_work_tree_cfg : "..";
1014 struct argv_array env = ARGV_ARRAY_INIT;
1015
1016 if (is_bare_repository())
1017 return "denyCurrentBranch = updateInstead needs a worktree";
1018
1019 argv_array_pushf(&env, "GIT_DIR=%s", absolute_path(get_git_dir()));
1020
08553319
JH
1021 if (!find_hook(push_to_checkout_hook))
1022 retval = push_to_deploy(sha1, &env, work_tree);
1023 else
1024 retval = push_to_checkout(sha1, &env, work_tree);
21b138d0
JH
1025
1026 argv_array_clear(&env);
1027 return retval;
1028}
1029
0a1bc12b 1030static const char *update(struct command *cmd, struct shallow_info *si)
2eca23da 1031{
cfee10a7 1032 const char *name = cmd->ref_name;
6b01ecfe 1033 struct strbuf namespaced_name_buf = STRBUF_INIT;
bda6e828
JS
1034 static char *namespaced_name;
1035 const char *ret;
9c44ea44 1036 struct object_id *old_oid = &cmd->old_oid;
1037 struct object_id *new_oid = &cmd->new_oid;
2eca23da 1038
061d6b9a 1039 /* only refs/... are allowed */
59556548 1040 if (!starts_with(name, "refs/") || check_refname_format(name + 5, 0)) {
466dbc42 1041 rp_error("refusing to create funny ref '%s' remotely", name);
8aaf7d64 1042 return "funny refname";
cfee10a7 1043 }
d8a1deec 1044
6b01ecfe 1045 strbuf_addf(&namespaced_name_buf, "%s%s", get_git_namespace(), name);
bda6e828 1046 free(namespaced_name);
6b01ecfe
JT
1047 namespaced_name = strbuf_detach(&namespaced_name_buf, NULL);
1048
1049 if (is_ref_checked_out(namespaced_name)) {
3d95d92b
JH
1050 switch (deny_current_branch) {
1051 case DENY_IGNORE:
986e8239 1052 break;
3d95d92b 1053 case DENY_WARN:
466dbc42 1054 rp_warning("updating the current branch");
986e8239 1055 break;
3d95d92b 1056 case DENY_REFUSE:
acd2a45b 1057 case DENY_UNCONFIGURED:
466dbc42 1058 rp_error("refusing to update checked out branch: %s", name);
acd2a45b
JH
1059 if (deny_current_branch == DENY_UNCONFIGURED)
1060 refuse_unconfigured_deny();
3d95d92b 1061 return "branch is currently checked out";
1404bcbb 1062 case DENY_UPDATE_INSTEAD:
9c44ea44 1063 ret = update_worktree(new_oid->hash);
1404bcbb
JS
1064 if (ret)
1065 return ret;
1066 break;
3d95d92b 1067 }
986e8239
JK
1068 }
1069
9c44ea44 1070 if (!is_null_oid(new_oid) && !has_object_file(new_oid)) {
8aaf7d64 1071 error("unpack should have generated %s, "
9c44ea44 1072 "but I can't find it!", oid_to_hex(new_oid));
8aaf7d64 1073 return "bad pack";
cfee10a7 1074 }
747ca245 1075
9c44ea44 1076 if (!is_null_oid(old_oid) && is_null_oid(new_oid)) {
59556548 1077 if (deny_deletes && starts_with(name, "refs/heads/")) {
466dbc42 1078 rp_error("denying ref deletion for %s", name);
747ca245
JH
1079 return "deletion prohibited";
1080 }
1081
b112b14d 1082 if (head_name && !strcmp(namespaced_name, head_name)) {
747ca245
JH
1083 switch (deny_delete_current) {
1084 case DENY_IGNORE:
1085 break;
1086 case DENY_WARN:
466dbc42 1087 rp_warning("deleting the current branch");
747ca245
JH
1088 break;
1089 case DENY_REFUSE:
375881fa 1090 case DENY_UNCONFIGURED:
1404bcbb 1091 case DENY_UPDATE_INSTEAD:
375881fa
JH
1092 if (deny_delete_current == DENY_UNCONFIGURED)
1093 refuse_unconfigured_deny_delete_current();
466dbc42 1094 rp_error("refusing to delete the current branch: %s", name);
747ca245 1095 return "deletion of the current branch prohibited";
1404bcbb
JS
1096 default:
1097 return "Invalid denyDeleteCurrent setting";
747ca245
JH
1098 }
1099 }
a240de11 1100 }
747ca245 1101
9c44ea44 1102 if (deny_non_fast_forwards && !is_null_oid(new_oid) &&
1103 !is_null_oid(old_oid) &&
59556548 1104 starts_with(name, "refs/heads/")) {
eab82707 1105 struct object *old_object, *new_object;
11031d7e 1106 struct commit *old_commit, *new_commit;
11031d7e 1107
c251c83d 1108 old_object = parse_object(old_oid);
1109 new_object = parse_object(new_oid);
eab82707
MK
1110
1111 if (!old_object || !new_object ||
1112 old_object->type != OBJ_COMMIT ||
1113 new_object->type != OBJ_COMMIT) {
1114 error("bad sha1 objects for %s", name);
1115 return "bad ref";
1116 }
1117 old_commit = (struct commit *)old_object;
1118 new_commit = (struct commit *)new_object;
5d55915c 1119 if (!in_merge_bases(old_commit, new_commit)) {
466dbc42
SP
1120 rp_error("denying non-fast-forward %s"
1121 " (you should pull first)", name);
a75d7b54 1122 return "non-fast-forward";
8aaf7d64 1123 }
11031d7e 1124 }
1d9e8b56 1125 if (run_update_hook(cmd)) {
466dbc42 1126 rp_error("hook declined to update %s", name);
8aaf7d64 1127 return "hook declined";
b1bf95bb 1128 }
3159c8dc 1129
9c44ea44 1130 if (is_null_oid(new_oid)) {
222368c6 1131 struct strbuf err = STRBUF_INIT;
c251c83d 1132 if (!parse_object(old_oid)) {
9c44ea44 1133 old_oid = NULL;
160b81ed
PYH
1134 if (ref_exists(name)) {
1135 rp_warning("Allowing deletion of corrupt ref.");
1136 } else {
1137 rp_warning("Deleting a non-existent ref.");
1138 cmd->did_not_exist = 1;
1139 }
28391a80 1140 }
222368c6
SB
1141 if (ref_transaction_delete(transaction,
1142 namespaced_name,
89f3bbdd 1143 old_oid,
fb5a6bb6 1144 0, "push", &err)) {
222368c6
SB
1145 rp_error("%s", err.buf);
1146 strbuf_release(&err);
8aaf7d64 1147 return "failed to delete";
d4f694ba 1148 }
222368c6 1149 strbuf_release(&err);
8aaf7d64 1150 return NULL; /* good */
d4f694ba
JH
1151 }
1152 else {
6629ea2d 1153 struct strbuf err = STRBUF_INIT;
0a1bc12b
NTND
1154 if (shallow_update && si->shallow_ref[cmd->index] &&
1155 update_shallow_ref(cmd, si))
1156 return "shallow error";
1157
222368c6
SB
1158 if (ref_transaction_update(transaction,
1159 namespaced_name,
89f3bbdd 1160 new_oid, old_oid,
1d147bdf 1161 0, "push",
222368c6 1162 &err)) {
6629ea2d
RS
1163 rp_error("%s", err.buf);
1164 strbuf_release(&err);
222368c6 1165
6629ea2d 1166 return "failed to update ref";
ef203f08 1167 }
6629ea2d 1168 strbuf_release(&err);
222368c6 1169
8aaf7d64 1170 return NULL; /* good */
19614330 1171 }
2eca23da
LT
1172}
1173
5e1c71fd 1174static void run_update_post_hook(struct command *commands)
19614330 1175{
5e1c71fd 1176 struct command *cmd;
d3180279 1177 struct child_process proc = CHILD_PROCESS_INIT;
dcf69262 1178 const char *hook;
19614330 1179
5a7da2dc 1180 hook = find_hook("post-update");
dce96c41 1181 if (!hook)
3e6e152c 1182 return;
5a7da2dc 1183
850d2fec 1184 for (cmd = commands; cmd; cmd = cmd->next) {
160b81ed 1185 if (cmd->error_string || cmd->did_not_exist)
19614330 1186 continue;
dce96c41
RS
1187 if (!proc.args.argc)
1188 argv_array_push(&proc.args, hook);
850d2fec 1189 argv_array_push(&proc.args, cmd->ref_name);
19614330 1190 }
dce96c41
RS
1191 if (!proc.args.argc)
1192 return;
6d525d38 1193
6d525d38
SP
1194 proc.no_stdin = 1;
1195 proc.stdout_to_stderr = 1;
1196 proc.err = use_sideband ? -1 : 0;
6d525d38
SP
1197
1198 if (!start_command(&proc)) {
1199 if (use_sideband)
1200 copy_to_sideband(proc.err, -1, NULL);
1201 finish_command(&proc);
1202 }
19614330 1203}
2eca23da 1204
da3efdb1
JS
1205static void check_aliased_update(struct command *cmd, struct string_list *list)
1206{
6b01ecfe
JT
1207 struct strbuf buf = STRBUF_INIT;
1208 const char *dst_name;
da3efdb1
JS
1209 struct string_list_item *item;
1210 struct command *dst_cmd;
da3efdb1
JS
1211 int flag;
1212
6b01ecfe 1213 strbuf_addf(&buf, "%s%s", get_git_namespace(), cmd->ref_name);
744c040b 1214 dst_name = resolve_ref_unsafe(buf.buf, 0, NULL, &flag);
6b01ecfe 1215 strbuf_release(&buf);
da3efdb1
JS
1216
1217 if (!(flag & REF_ISSYMREF))
1218 return;
1219
6b01ecfe
JT
1220 if (!dst_name) {
1221 rp_error("refusing update to broken symref '%s'", cmd->ref_name);
1222 cmd->skip_update = 1;
1223 cmd->error_string = "broken symref";
1224 return;
1225 }
ded83936 1226 dst_name = strip_namespace(dst_name);
6b01ecfe 1227
e8c8b713 1228 if ((item = string_list_lookup(list, dst_name)) == NULL)
da3efdb1
JS
1229 return;
1230
1231 cmd->skip_update = 1;
1232
1233 dst_cmd = (struct command *) item->util;
1234
9c44ea44 1235 if (!oidcmp(&cmd->old_oid, &dst_cmd->old_oid) &&
1236 !oidcmp(&cmd->new_oid, &dst_cmd->new_oid))
da3efdb1
JS
1237 return;
1238
1239 dst_cmd->skip_update = 1;
1240
da3efdb1
JS
1241 rp_error("refusing inconsistent update between symref '%s' (%s..%s) and"
1242 " its target '%s' (%s..%s)",
ef2ed501 1243 cmd->ref_name,
9c44ea44 1244 find_unique_abbrev(cmd->old_oid.hash, DEFAULT_ABBREV),
1245 find_unique_abbrev(cmd->new_oid.hash, DEFAULT_ABBREV),
ef2ed501 1246 dst_cmd->ref_name,
9c44ea44 1247 find_unique_abbrev(dst_cmd->old_oid.hash, DEFAULT_ABBREV),
1248 find_unique_abbrev(dst_cmd->new_oid.hash, DEFAULT_ABBREV));
da3efdb1
JS
1249
1250 cmd->error_string = dst_cmd->error_string =
1251 "inconsistent aliased update";
1252}
1253
1254static void check_aliased_updates(struct command *commands)
1255{
1256 struct command *cmd;
183113a5 1257 struct string_list ref_list = STRING_LIST_INIT_NODUP;
da3efdb1
JS
1258
1259 for (cmd = commands; cmd; cmd = cmd->next) {
1260 struct string_list_item *item =
1d2f80fa 1261 string_list_append(&ref_list, cmd->ref_name);
da3efdb1
JS
1262 item->util = (void *)cmd;
1263 }
3383e199 1264 string_list_sort(&ref_list);
da3efdb1 1265
ef7e93d9
CB
1266 for (cmd = commands; cmd; cmd = cmd->next) {
1267 if (!cmd->error_string)
1268 check_aliased_update(cmd, &ref_list);
1269 }
da3efdb1
JS
1270
1271 string_list_clear(&ref_list, 0);
1272}
1273
6ccac9ee 1274static int command_singleton_iterator(void *cb_data, struct object_id *oid)
52fed6e1
JH
1275{
1276 struct command **cmd_list = cb_data;
1277 struct command *cmd = *cmd_list;
1278
9c44ea44 1279 if (!cmd || is_null_oid(&cmd->new_oid))
52fed6e1
JH
1280 return -1; /* end of list */
1281 *cmd_list = NULL; /* this returns only one */
6ccac9ee 1282 oidcpy(oid, &cmd->new_oid);
52fed6e1
JH
1283 return 0;
1284}
1285
0a1bc12b
NTND
1286static void set_connectivity_errors(struct command *commands,
1287 struct shallow_info *si)
52fed6e1
JH
1288{
1289 struct command *cmd;
1290
1291 for (cmd = commands; cmd; cmd = cmd->next) {
1292 struct command *singleton = cmd;
722ff7f8
JK
1293 struct check_connected_options opt = CHECK_CONNECTED_INIT;
1294
0a1bc12b
NTND
1295 if (shallow_update && si->shallow_ref[cmd->index])
1296 /* to be checked in update_shallow_ref() */
1297 continue;
722ff7f8
JK
1298
1299 opt.env = tmp_objdir_env(tmp_objdir);
7043c707 1300 if (!check_connected(command_singleton_iterator, &singleton,
722ff7f8 1301 &opt))
52fed6e1 1302 continue;
722ff7f8 1303
52fed6e1
JH
1304 cmd->error_string = "missing necessary objects";
1305 }
1306}
1307
0a1bc12b
NTND
1308struct iterate_data {
1309 struct command *cmds;
1310 struct shallow_info *si;
1311};
1312
6ccac9ee 1313static int iterate_receive_command_list(void *cb_data, struct object_id *oid)
52fed6e1 1314{
0a1bc12b
NTND
1315 struct iterate_data *data = cb_data;
1316 struct command **cmd_list = &data->cmds;
52fed6e1
JH
1317 struct command *cmd = *cmd_list;
1318
0a1bc12b
NTND
1319 for (; cmd; cmd = cmd->next) {
1320 if (shallow_update && data->si->shallow_ref[cmd->index])
1321 /* to be checked in update_shallow_ref() */
1322 continue;
9c44ea44 1323 if (!is_null_oid(&cmd->new_oid) && !cmd->skip_update) {
6ccac9ee 1324 oidcpy(oid, &cmd->new_oid);
ee6dfb2d
JH
1325 *cmd_list = cmd->next;
1326 return 0;
1327 }
ee6dfb2d
JH
1328 }
1329 *cmd_list = NULL;
1330 return -1; /* end of list */
52fed6e1
JH
1331}
1332
daebaa78
JH
1333static void reject_updates_to_hidden(struct command *commands)
1334{
78a766ab
LF
1335 struct strbuf refname_full = STRBUF_INIT;
1336 size_t prefix_len;
daebaa78
JH
1337 struct command *cmd;
1338
78a766ab
LF
1339 strbuf_addstr(&refname_full, get_git_namespace());
1340 prefix_len = refname_full.len;
1341
daebaa78 1342 for (cmd = commands; cmd; cmd = cmd->next) {
78a766ab
LF
1343 if (cmd->error_string)
1344 continue;
1345
1346 strbuf_setlen(&refname_full, prefix_len);
1347 strbuf_addstr(&refname_full, cmd->ref_name);
1348
1349 if (!ref_is_hidden(cmd->ref_name, refname_full.buf))
daebaa78 1350 continue;
9c44ea44 1351 if (is_null_oid(&cmd->new_oid))
daebaa78
JH
1352 cmd->error_string = "deny deleting a hidden ref";
1353 else
1354 cmd->error_string = "deny updating a hidden ref";
1355 }
78a766ab
LF
1356
1357 strbuf_release(&refname_full);
daebaa78
JH
1358}
1359
a6a84319
SB
1360static int should_process_cmd(struct command *cmd)
1361{
1362 return !cmd->error_string && !cmd->skip_update;
1363}
1364
1365static void warn_if_skipped_connectivity_check(struct command *commands,
1366 struct shallow_info *si)
1367{
1368 struct command *cmd;
1369 int checked_connectivity = 1;
1370
1371 for (cmd = commands; cmd; cmd = cmd->next) {
1372 if (should_process_cmd(cmd) && si->shallow_ref[cmd->index]) {
1373 error("BUG: connectivity check has not been run on ref %s",
1374 cmd->ref_name);
1375 checked_connectivity = 0;
1376 }
1377 }
1378 if (!checked_connectivity)
b6a47885 1379 die("BUG: connectivity check skipped???");
a6a84319
SB
1380}
1381
a1a26145
SB
1382static void execute_commands_non_atomic(struct command *commands,
1383 struct shallow_info *si)
1384{
1385 struct command *cmd;
222368c6
SB
1386 struct strbuf err = STRBUF_INIT;
1387
a1a26145
SB
1388 for (cmd = commands; cmd; cmd = cmd->next) {
1389 if (!should_process_cmd(cmd))
1390 continue;
1391
222368c6
SB
1392 transaction = ref_transaction_begin(&err);
1393 if (!transaction) {
1394 rp_error("%s", err.buf);
1395 strbuf_reset(&err);
1396 cmd->error_string = "transaction failed to start";
1397 continue;
1398 }
1399
a1a26145 1400 cmd->error_string = update(cmd, si);
222368c6
SB
1401
1402 if (!cmd->error_string
1403 && ref_transaction_commit(transaction, &err)) {
1404 rp_error("%s", err.buf);
1405 strbuf_reset(&err);
1406 cmd->error_string = "failed to update ref";
1407 }
1408 ref_transaction_free(transaction);
a1a26145 1409 }
68deed29
SB
1410 strbuf_release(&err);
1411}
222368c6 1412
68deed29
SB
1413static void execute_commands_atomic(struct command *commands,
1414 struct shallow_info *si)
1415{
1416 struct command *cmd;
1417 struct strbuf err = STRBUF_INIT;
1418 const char *reported_error = "atomic push failure";
1419
1420 transaction = ref_transaction_begin(&err);
1421 if (!transaction) {
1422 rp_error("%s", err.buf);
1423 strbuf_reset(&err);
1424 reported_error = "transaction failed to start";
1425 goto failure;
1426 }
1427
1428 for (cmd = commands; cmd; cmd = cmd->next) {
1429 if (!should_process_cmd(cmd))
1430 continue;
1431
1432 cmd->error_string = update(cmd, si);
1433
1434 if (cmd->error_string)
1435 goto failure;
1436 }
1437
1438 if (ref_transaction_commit(transaction, &err)) {
1439 rp_error("%s", err.buf);
1440 reported_error = "atomic transaction failed";
1441 goto failure;
1442 }
1443 goto cleanup;
1444
1445failure:
1446 for (cmd = commands; cmd; cmd = cmd->next)
1447 if (!cmd->error_string)
1448 cmd->error_string = reported_error;
1449
1450cleanup:
1451 ref_transaction_free(transaction);
222368c6 1452 strbuf_release(&err);
a1a26145
SB
1453}
1454
0a1bc12b
NTND
1455static void execute_commands(struct command *commands,
1456 const char *unpacker_error,
77a9745d
SB
1457 struct shallow_info *si,
1458 const struct string_list *push_options)
575f4974 1459{
d415092a 1460 struct check_connected_options opt = CHECK_CONNECTED_INIT;
5e1c71fd 1461 struct command *cmd;
0a1bc12b 1462 struct iterate_data data;
d415092a
JK
1463 struct async muxer;
1464 int err_fd = 0;
8aaf7d64
SP
1465
1466 if (unpacker_error) {
5e1c71fd 1467 for (cmd = commands; cmd; cmd = cmd->next)
74eb32d3 1468 cmd->error_string = "unpacker error";
8aaf7d64
SP
1469 return;
1470 }
1471
d415092a
JK
1472 if (use_sideband) {
1473 memset(&muxer, 0, sizeof(muxer));
1474 muxer.proc = copy_to_sideband;
1475 muxer.in = -1;
1476 if (!start_async(&muxer))
1477 err_fd = muxer.in;
1478 /* ...else, continue without relaying sideband */
1479 }
1480
0a1bc12b
NTND
1481 data.cmds = commands;
1482 data.si = si;
d415092a 1483 opt.err_fd = err_fd;
6b4cd2f8 1484 opt.progress = err_fd && !quiet;
722ff7f8 1485 opt.env = tmp_objdir_env(tmp_objdir);
d415092a 1486 if (check_connected(iterate_receive_command_list, &data, &opt))
0a1bc12b 1487 set_connectivity_errors(commands, si);
52fed6e1 1488
d415092a
JK
1489 if (use_sideband)
1490 finish_async(&muxer);
1491
daebaa78
JH
1492 reject_updates_to_hidden(commands);
1493
77a9745d 1494 if (run_receive_hook(commands, "pre-receive", 0, push_options)) {
ef7e93d9
CB
1495 for (cmd = commands; cmd; cmd = cmd->next) {
1496 if (!cmd->error_string)
1497 cmd->error_string = "pre-receive hook declined";
1498 }
05ef58ec
SP
1499 return;
1500 }
1501
722ff7f8
JK
1502 /*
1503 * Now we'll start writing out refs, which means the objects need
1504 * to be in their final positions so that other processes can see them.
1505 */
1506 if (tmp_objdir_migrate(tmp_objdir) < 0) {
1507 for (cmd = commands; cmd; cmd = cmd->next) {
1508 if (!cmd->error_string)
1509 cmd->error_string = "unable to migrate objects to permanent storage";
1510 }
1511 return;
1512 }
1513 tmp_objdir = NULL;
1514
da3efdb1
JS
1515 check_aliased_updates(commands);
1516
96ec7b1e 1517 free(head_name_to_free);
efbd4fdf 1518 head_name = head_name_to_free = resolve_refdup("HEAD", 0, NULL, NULL);
747ca245 1519
68deed29
SB
1520 if (use_atomic)
1521 execute_commands_atomic(commands, si);
1522 else
1523 execute_commands_non_atomic(commands, si);
0a1bc12b 1524
a6a84319
SB
1525 if (shallow_update)
1526 warn_if_skipped_connectivity_check(commands, si);
575f4974
LT
1527}
1528
39895c74
JH
1529static struct command **queue_command(struct command **tail,
1530 const char *line,
1531 int linelen)
1532{
9c44ea44 1533 struct object_id old_oid, new_oid;
39895c74
JH
1534 struct command *cmd;
1535 const char *refname;
1536 int reflen;
9c44ea44 1537 const char *p;
39895c74 1538
9c44ea44 1539 if (parse_oid_hex(line, &old_oid, &p) ||
1540 *p++ != ' ' ||
1541 parse_oid_hex(p, &new_oid, &p) ||
1542 *p++ != ' ')
39895c74
JH
1543 die("protocol error: expected old/new/ref, got '%s'", line);
1544
9c44ea44 1545 refname = p;
1546 reflen = linelen - (p - line);
ddd0bfac 1547 FLEX_ALLOC_MEM(cmd, ref_name, refname, reflen);
9c44ea44 1548 oidcpy(&cmd->old_oid, &old_oid);
1549 oidcpy(&cmd->new_oid, &new_oid);
39895c74
JH
1550 *tail = cmd;
1551 return &cmd->next;
1552}
1553
4adf569d
JH
1554static void queue_commands_from_cert(struct command **tail,
1555 struct strbuf *push_cert)
1556{
1557 const char *boc, *eoc;
1558
1559 if (*tail)
1560 die("protocol error: got both push certificate and unsigned commands");
1561
1562 boc = strstr(push_cert->buf, "\n\n");
1563 if (!boc)
1564 die("malformed push certificate %.*s", 100, push_cert->buf);
1565 else
1566 boc += 2;
1567 eoc = push_cert->buf + parse_signature(push_cert->buf, push_cert->len);
1568
1569 while (boc < eoc) {
1570 const char *eol = memchr(boc, '\n', eoc - boc);
f2214ded 1571 tail = queue_command(tail, boc, eol ? eol - boc : eoc - boc);
4adf569d
JH
1572 boc = eol ? eol + 1 : eoc;
1573 }
1574}
1575
910650d2 1576static struct command *read_head_info(struct oid_array *shallow)
575f4974 1577{
5e1c71fd 1578 struct command *commands = NULL;
eb1af2df 1579 struct command **p = &commands;
575f4974 1580 for (;;) {
74543a04 1581 char *line;
39895c74 1582 int len, linelen;
eb1af2df 1583
74543a04
JK
1584 line = packet_read_line(0, &len);
1585 if (!line)
575f4974 1586 break;
5dbd7676 1587
9c44ea44 1588 if (len > 8 && starts_with(line, "shallow ")) {
1589 struct object_id oid;
1590 if (get_oid_hex(line + 8, &oid))
c09b71cc
JH
1591 die("protocol error: expected shallow sha, got '%s'",
1592 line + 8);
910650d2 1593 oid_array_append(shallow, &oid);
5dbd7676
NTND
1594 continue;
1595 }
1596
0e3c339b
JH
1597 linelen = strlen(line);
1598 if (linelen < len) {
1599 const char *feature_list = line + linelen + 1;
f47182c8 1600 if (parse_feature_request(feature_list, "report-status"))
cfee10a7 1601 report_status = 1;
f47182c8 1602 if (parse_feature_request(feature_list, "side-band-64k"))
38a81b4e 1603 use_sideband = LARGE_PACKET_MAX;
c207e34f
CB
1604 if (parse_feature_request(feature_list, "quiet"))
1605 quiet = 1;
1b70fe5d
RS
1606 if (advertise_atomic_push
1607 && parse_feature_request(feature_list, "atomic"))
1608 use_atomic = 1;
c714e45f
SB
1609 if (advertise_push_options
1610 && parse_feature_request(feature_list, "push-options"))
1611 use_push_options = 1;
cfee10a7 1612 }
0e3c339b 1613
a85b377d
JH
1614 if (!strcmp(line, "push-cert")) {
1615 int true_flush = 0;
1616 char certbuf[1024];
1617
1618 for (;;) {
1619 len = packet_read(0, NULL, NULL,
1620 certbuf, sizeof(certbuf), 0);
1621 if (!len) {
1622 true_flush = 1;
1623 break;
1624 }
1625 if (!strcmp(certbuf, "push-cert-end\n"))
1626 break; /* end of cert */
1627 strbuf_addstr(&push_cert, certbuf);
1628 }
1629
1630 if (true_flush)
1631 break;
1632 continue;
1633 }
1634
39895c74 1635 p = queue_command(p, line, linelen);
575f4974 1636 }
4adf569d
JH
1637
1638 if (push_cert.len)
1639 queue_commands_from_cert(p, &push_cert);
1640
5e1c71fd 1641 return commands;
575f4974
LT
1642}
1643
c714e45f
SB
1644static void read_push_options(struct string_list *options)
1645{
1646 while (1) {
1647 char *line;
1648 int len;
1649
1650 line = packet_read_line(0, &len);
1651
1652 if (!line)
1653 break;
1654
1655 string_list_append(options, line);
1656 }
1657}
1658
fc04c412
SP
1659static const char *parse_pack_header(struct pack_header *hdr)
1660{
a69e5429
JH
1661 switch (read_pack_header(0, hdr)) {
1662 case PH_ERROR_EOF:
1663 return "eof before pack header was fully read";
1664
1665 case PH_ERROR_PACK_SIGNATURE:
fc04c412 1666 return "protocol error (pack signature mismatch detected)";
a69e5429
JH
1667
1668 case PH_ERROR_PROTOCOL:
fc04c412 1669 return "protocol error (pack version unsupported)";
a69e5429
JH
1670
1671 default:
1672 return "unknown error in parse_pack_header";
1673
1674 case 0:
1675 return NULL;
1676 }
fc04c412
SP
1677}
1678
576162a4
NP
1679static const char *pack_lockfile;
1680
446d5d91
JK
1681static void push_header_arg(struct argv_array *args, struct pack_header *hdr)
1682{
1683 argv_array_pushf(args, "--pack_header=%"PRIu32",%"PRIu32,
1684 ntohl(hdr->hdr_version), ntohl(hdr->hdr_entries));
1685}
1686
5dbd7676 1687static const char *unpack(int err_fd, struct shallow_info *si)
575f4974 1688{
fc04c412
SP
1689 struct pack_header hdr;
1690 const char *hdr_err;
31c42bff 1691 int status;
d3180279 1692 struct child_process child = CHILD_PROCESS_INIT;
dab76d3a
JH
1693 int fsck_objects = (receive_fsck_objects >= 0
1694 ? receive_fsck_objects
1695 : transfer_fsck_objects >= 0
1696 ? transfer_fsck_objects
1697 : 0);
fc04c412
SP
1698
1699 hdr_err = parse_pack_header(&hdr);
49ecfa13
JK
1700 if (hdr_err) {
1701 if (err_fd > 0)
1702 close(err_fd);
fc04c412 1703 return hdr_err;
49ecfa13 1704 }
fc04c412 1705
5dbd7676
NTND
1706 if (si->nr_ours || si->nr_theirs) {
1707 alt_shallow_file = setup_temporary_shallow(si->shallow);
64a7e92f
RS
1708 argv_array_push(&child.args, "--shallow-file");
1709 argv_array_push(&child.args, alt_shallow_file);
5dbd7676
NTND
1710 }
1711
722ff7f8 1712 tmp_objdir = tmp_objdir_create();
6cdad1f1
JK
1713 if (!tmp_objdir) {
1714 if (err_fd > 0)
1715 close(err_fd);
722ff7f8 1716 return "unable to create temporary object directory";
6cdad1f1 1717 }
722ff7f8
JK
1718 child.env = tmp_objdir_env(tmp_objdir);
1719
1720 /*
1721 * Normally we just pass the tmp_objdir environment to the child
1722 * processes that do the heavy lifting, but we may need to see these
1723 * objects ourselves to set up shallow information.
1724 */
1725 tmp_objdir_add_as_alternate(tmp_objdir);
1726
fc04c412 1727 if (ntohl(hdr.hdr_entries) < unpack_limit) {
446d5d91
JK
1728 argv_array_push(&child.args, "unpack-objects");
1729 push_header_arg(&child.args, &hdr);
c207e34f 1730 if (quiet)
64a7e92f 1731 argv_array_push(&child.args, "-q");
dab76d3a 1732 if (fsck_objects)
5d477a33
JS
1733 argv_array_pushf(&child.args, "--strict%s",
1734 fsck_msg_types.buf);
c08db5a2
JK
1735 if (max_input_size)
1736 argv_array_pushf(&child.args, "--max-input-size=%"PRIuMAX,
1737 (uintmax_t)max_input_size);
59bfdfb8 1738 child.no_stdout = 1;
a22e6f85 1739 child.err = err_fd;
59bfdfb8 1740 child.git_cmd = 1;
31c42bff
NTND
1741 status = run_command(&child);
1742 if (status)
1743 return "unpack-objects abnormal exit";
576162a4 1744 } else {
da25bdb7 1745 char hostname[HOST_NAME_MAX + 1];
576162a4 1746
446d5d91
JK
1747 argv_array_pushl(&child.args, "index-pack", "--stdin", NULL);
1748 push_header_arg(&child.args, &hdr);
b26cb7c7 1749
5781a9a2 1750 if (xgethostname(hostname, sizeof(hostname)))
b26cb7c7
JK
1751 xsnprintf(hostname, sizeof(hostname), "localhost");
1752 argv_array_pushf(&child.args,
1753 "--keep=receive-pack %"PRIuMAX" on %s",
1754 (uintmax_t)getpid(),
1755 hostname);
1756
d06303bb
JK
1757 if (!quiet && err_fd)
1758 argv_array_push(&child.args, "--show-resolving-progress");
83558686
JK
1759 if (use_sideband)
1760 argv_array_push(&child.args, "--report-end-of-input");
dab76d3a 1761 if (fsck_objects)
5d477a33
JS
1762 argv_array_pushf(&child.args, "--strict%s",
1763 fsck_msg_types.buf);
1b68387e 1764 if (!reject_thin)
64a7e92f 1765 argv_array_push(&child.args, "--fix-thin");
c08db5a2
JK
1766 if (max_input_size)
1767 argv_array_pushf(&child.args, "--max-input-size=%"PRIuMAX,
1768 (uintmax_t)max_input_size);
31c42bff
NTND
1769 child.out = -1;
1770 child.err = err_fd;
1771 child.git_cmd = 1;
1772 status = start_command(&child);
1773 if (status)
576162a4 1774 return "index-pack fork failed";
31c42bff
NTND
1775 pack_lockfile = index_pack_lockfile(child.out);
1776 close(child.out);
1777 status = finish_command(&child);
1778 if (status)
1779 return "index-pack abnormal exit";
1780 reprepare_packed_git();
cfee10a7 1781 }
31c42bff 1782 return NULL;
cfee10a7
JH
1783}
1784
5dbd7676 1785static const char *unpack_with_sideband(struct shallow_info *si)
a22e6f85
JK
1786{
1787 struct async muxer;
1788 const char *ret;
1789
1790 if (!use_sideband)
5dbd7676 1791 return unpack(0, si);
a22e6f85 1792
83558686 1793 use_keepalive = KEEPALIVE_AFTER_NUL;
a22e6f85
JK
1794 memset(&muxer, 0, sizeof(muxer));
1795 muxer.proc = copy_to_sideband;
1796 muxer.in = -1;
1797 if (start_async(&muxer))
1798 return NULL;
1799
5dbd7676 1800 ret = unpack(muxer.in, si);
a22e6f85
JK
1801
1802 finish_async(&muxer);
1803 return ret;
1804}
1805
0a1bc12b
NTND
1806static void prepare_shallow_update(struct command *commands,
1807 struct shallow_info *si)
1808{
42c78a21 1809 int i, j, k, bitmap_size = DIV_ROUND_UP(si->ref->nr, 32);
0a1bc12b 1810
b32fa95f 1811 ALLOC_ARRAY(si->used_shallow, si->shallow->nr);
0a1bc12b
NTND
1812 assign_shallow_commits_to_refs(si, si->used_shallow, NULL);
1813
1814 si->need_reachability_test =
1815 xcalloc(si->shallow->nr, sizeof(*si->need_reachability_test));
1816 si->reachable =
1817 xcalloc(si->shallow->nr, sizeof(*si->reachable));
1818 si->shallow_ref = xcalloc(si->ref->nr, sizeof(*si->shallow_ref));
1819
1820 for (i = 0; i < si->nr_ours; i++)
1821 si->need_reachability_test[si->ours[i]] = 1;
1822
1823 for (i = 0; i < si->shallow->nr; i++) {
1824 if (!si->used_shallow[i])
1825 continue;
1826 for (j = 0; j < bitmap_size; j++) {
1827 if (!si->used_shallow[i][j])
1828 continue;
1829 si->need_reachability_test[i]++;
1830 for (k = 0; k < 32; k++)
9a93c668 1831 if (si->used_shallow[i][j] & (1U << k))
0a1bc12b
NTND
1832 si->shallow_ref[j * 32 + k]++;
1833 }
1834
1835 /*
1836 * true for those associated with some refs and belong
1837 * in "ours" list aka "step 7 not done yet"
1838 */
1839 si->need_reachability_test[i] =
1840 si->need_reachability_test[i] > 1;
1841 }
1842
1843 /*
1844 * keep hooks happy by forcing a temporary shallow file via
1845 * env variable because we can't add --shallow-file to every
1846 * command. check_everything_connected() will be done with
1847 * true .git/shallow though.
1848 */
1849 setenv(GIT_SHALLOW_FILE_ENVIRONMENT, alt_shallow_file, 1);
1850}
1851
5dbd7676
NTND
1852static void update_shallow_info(struct command *commands,
1853 struct shallow_info *si,
910650d2 1854 struct oid_array *ref)
5dbd7676
NTND
1855{
1856 struct command *cmd;
1857 int *ref_status;
1858 remove_nonexistent_theirs_shallow(si);
0a1bc12b
NTND
1859 if (!si->nr_ours && !si->nr_theirs) {
1860 shallow_update = 0;
5dbd7676 1861 return;
0a1bc12b 1862 }
5dbd7676
NTND
1863
1864 for (cmd = commands; cmd; cmd = cmd->next) {
9c44ea44 1865 if (is_null_oid(&cmd->new_oid))
5dbd7676 1866 continue;
910650d2 1867 oid_array_append(ref, &cmd->new_oid);
5dbd7676
NTND
1868 cmd->index = ref->nr - 1;
1869 }
1870 si->ref = ref;
1871
0a1bc12b
NTND
1872 if (shallow_update) {
1873 prepare_shallow_update(commands, si);
1874 return;
1875 }
1876
b32fa95f 1877 ALLOC_ARRAY(ref_status, ref->nr);
5dbd7676
NTND
1878 assign_shallow_commits_to_refs(si, NULL, ref_status);
1879 for (cmd = commands; cmd; cmd = cmd->next) {
9c44ea44 1880 if (is_null_oid(&cmd->new_oid))
5dbd7676
NTND
1881 continue;
1882 if (ref_status[cmd->index]) {
1883 cmd->error_string = "shallow update not allowed";
1884 cmd->skip_update = 1;
1885 }
1886 }
5dbd7676
NTND
1887 free(ref_status);
1888}
1889
5e1c71fd 1890static void report(struct command *commands, const char *unpack_status)
cfee10a7
JH
1891{
1892 struct command *cmd;
38a81b4e
SP
1893 struct strbuf buf = STRBUF_INIT;
1894
1895 packet_buf_write(&buf, "unpack %s\n",
1896 unpack_status ? unpack_status : "ok");
cfee10a7
JH
1897 for (cmd = commands; cmd; cmd = cmd->next) {
1898 if (!cmd->error_string)
38a81b4e
SP
1899 packet_buf_write(&buf, "ok %s\n",
1900 cmd->ref_name);
cfee10a7 1901 else
38a81b4e
SP
1902 packet_buf_write(&buf, "ng %s %s\n",
1903 cmd->ref_name, cmd->error_string);
575f4974 1904 }
38a81b4e
SP
1905 packet_buf_flush(&buf);
1906
1907 if (use_sideband)
1908 send_sideband(1, 1, buf.buf, buf.len, use_sideband);
1909 else
cdf4fb8e 1910 write_or_die(1, buf.buf, buf.len);
38a81b4e 1911 strbuf_release(&buf);
575f4974
LT
1912}
1913
5e1c71fd 1914static int delete_only(struct command *commands)
d4f694ba 1915{
5e1c71fd
JS
1916 struct command *cmd;
1917 for (cmd = commands; cmd; cmd = cmd->next) {
9c44ea44 1918 if (!is_null_oid(&cmd->new_oid))
d4f694ba 1919 return 0;
d4f694ba
JH
1920 }
1921 return 1;
1922}
1923
be5908ae 1924int cmd_receive_pack(int argc, const char **argv, const char *prefix)
575f4974 1925{
42526b47 1926 int advertise_refs = 0;
5e1c71fd 1927 struct command *commands;
910650d2 1928 struct oid_array shallow = OID_ARRAY_INIT;
1929 struct oid_array ref = OID_ARRAY_INIT;
5dbd7676 1930 struct shallow_info si;
575f4974 1931
1b68387e
SS
1932 struct option options[] = {
1933 OPT__QUIET(&quiet, N_("quiet")),
1934 OPT_HIDDEN_BOOL(0, "stateless-rpc", &stateless_rpc, NULL),
1935 OPT_HIDDEN_BOOL(0, "advertise-refs", &advertise_refs, NULL),
1936 OPT_HIDDEN_BOOL(0, "reject-thin-pack-for-testing", &reject_thin, NULL),
1937 OPT_END()
1938 };
bbc30f99 1939
1b68387e 1940 packet_trace_identity("receive-pack");
575f4974 1941
1b68387e 1942 argc = parse_options(argc, argv, prefix, options, receive_pack_usage, 0);
c207e34f 1943
1b68387e
SS
1944 if (argc > 1)
1945 usage_msg_opt(_("Too many arguments."), receive_pack_usage, options);
1946 if (argc == 0)
1947 usage_msg_opt(_("You must specify a directory."), receive_pack_usage, options);
42526b47 1948
1b68387e 1949 service_dir = argv[0];
575f4974 1950
e1464ca7 1951 setup_path();
5c09f321 1952
5732373d
JH
1953 if (!enter_repo(service_dir, 0))
1954 die("'%s' does not appear to be a git repository", service_dir);
575f4974 1955
ef90d6d4 1956 git_config(receive_pack_config, NULL);
b89363e4 1957 if (cert_nonce_seed)
5732373d 1958 push_cert_nonce = prepare_push_cert_nonce(service_dir, time(NULL));
6fb75bed 1959
e28714c5
JH
1960 if (0 <= transfer_unpack_limit)
1961 unpack_limit = transfer_unpack_limit;
1962 else if (0 <= receive_unpack_limit)
1963 unpack_limit = receive_unpack_limit;
1964
aa9bab29
BW
1965 switch (determine_protocol_version_server()) {
1966 case protocol_v1:
1967 /*
1968 * v1 is just the original protocol with a version string,
1969 * so just fall through after writing the version string.
1970 */
1971 if (advertise_refs || !stateless_rpc)
1972 packet_write_fmt(1, "version 1\n");
1973
1974 /* fallthrough */
1975 case protocol_v0:
1976 break;
1977 case protocol_unknown_version:
1978 BUG("unknown protocol version");
1979 }
1980
42526b47 1981 if (advertise_refs || !stateless_rpc) {
42526b47 1982 write_head_info();
42526b47
SP
1983 }
1984 if (advertise_refs)
1985 return 0;
575f4974 1986
5dbd7676 1987 if ((commands = read_head_info(&shallow)) != NULL) {
d4f694ba 1988 const char *unpack_status = NULL;
77a9745d 1989 struct string_list push_options = STRING_LIST_INIT_DUP;
d4f694ba 1990
c714e45f
SB
1991 if (use_push_options)
1992 read_push_options(&push_options);
cbaf82cc
JT
1993 if (!check_cert_push_options(&push_options)) {
1994 struct command *cmd;
1995 for (cmd = commands; cmd; cmd = cmd->next)
1996 cmd->error_string = "inconsistent push options";
1997 }
c714e45f 1998
5dbd7676 1999 prepare_shallow_info(&si, &shallow);
0a1bc12b
NTND
2000 if (!si.nr_ours && !si.nr_theirs)
2001 shallow_update = 0;
5dbd7676
NTND
2002 if (!delete_only(commands)) {
2003 unpack_status = unpack_with_sideband(&si);
2004 update_shallow_info(commands, &si, &ref);
2005 }
83558686 2006 use_keepalive = KEEPALIVE_ALWAYS;
77a9745d
SB
2007 execute_commands(commands, unpack_status, &si,
2008 &push_options);
576162a4 2009 if (pack_lockfile)
691f1a28 2010 unlink_or_warn(pack_lockfile);
cfee10a7 2011 if (report_status)
5e1c71fd 2012 report(commands, unpack_status);
77a9745d
SB
2013 run_receive_hook(commands, "post-receive", 1,
2014 &push_options);
8e663d9e 2015 run_update_post_hook(commands);
4432dd6b 2016 string_list_clear(&push_options, 0);
77e3efbf
JH
2017 if (auto_gc) {
2018 const char *argv_gc_auto[] = {
2019 "gc", "--auto", "--quiet", NULL,
2020 };
860a2ebe
LF
2021 struct child_process proc = CHILD_PROCESS_INIT;
2022
2023 proc.no_stdin = 1;
2024 proc.stdout_to_stderr = 1;
2025 proc.err = use_sideband ? -1 : 0;
2026 proc.git_cmd = 1;
2027 proc.argv = argv_gc_auto;
2028
d0b59866 2029 close_all_packs(the_repository->objects);
860a2ebe
LF
2030 if (!start_command(&proc)) {
2031 if (use_sideband)
2032 copy_to_sideband(proc.err, -1, NULL);
2033 finish_command(&proc);
2034 }
77e3efbf
JH
2035 }
2036 if (auto_update_server_info)
2037 update_server_info(0);
5dbd7676 2038 clear_shallow_info(&si);
7f8e9828 2039 }
38a81b4e
SP
2040 if (use_sideband)
2041 packet_flush(1);
910650d2 2042 oid_array_clear(&shallow);
2043 oid_array_clear(&ref);
b89363e4 2044 free((void *)push_cert_nonce);
575f4974
LT
2045 return 0;
2046}