]> git.ipfire.org Git - thirdparty/git.git/blame - builtin/receive-pack.c
Sync with Git 2.20.1
[thirdparty/git.git] / builtin / receive-pack.c
CommitLineData
1e4cd68c 1#include "builtin.h"
a49d2834 2#include "repository.h"
b2141fc1 3#include "config.h"
697cc8ef 4#include "lockfile.h"
fc04c412 5#include "pack.h"
8a65ff76 6#include "refs.h"
f3a3214e 7#include "pkt-line.h"
38a81b4e 8#include "sideband.h"
b1bf95bb 9#include "run-command.h"
d807c4a0 10#include "exec-cmd.h"
11031d7e
JS
11#include "commit.h"
12#include "object.h"
d79796bc 13#include "remote.h"
47a59185 14#include "connect.h"
d79796bc 15#include "transport.h"
da3efdb1 16#include "string-list.h"
cff38a5e 17#include "sha1-array.h"
52fed6e1 18#include "connected.h"
31c42bff 19#include "argv-array.h"
ff5effdf 20#include "version.h"
d05b9618
JH
21#include "tag.h"
22#include "gpg-interface.h"
ec7dbd14 23#include "sigchain.h"
5d477a33 24#include "fsck.h"
722ff7f8 25#include "tmp-objdir.h"
ab6eea6f 26#include "oidset.h"
3836d88a 27#include "packfile.h"
cbd53a21 28#include "object-store.h"
aa9bab29 29#include "protocol.h"
64043556 30#include "commit-reach.h"
575f4974 31
1b68387e
SS
32static const char * const receive_pack_usage[] = {
33 N_("git receive-pack <git-dir>"),
34 NULL
35};
575f4974 36
986e8239 37enum deny_action {
3d95d92b 38 DENY_UNCONFIGURED,
986e8239
JK
39 DENY_IGNORE,
40 DENY_WARN,
1404bcbb
JS
41 DENY_REFUSE,
42 DENY_UPDATE_INSTEAD
986e8239
JK
43};
44
1b53a076
JH
45static int deny_deletes;
46static int deny_non_fast_forwards;
3d95d92b 47static enum deny_action deny_current_branch = DENY_UNCONFIGURED;
747ca245 48static enum deny_action deny_delete_current = DENY_UNCONFIGURED;
dab76d3a
JH
49static int receive_fsck_objects = -1;
50static int transfer_fsck_objects = -1;
5d477a33 51static struct strbuf fsck_msg_types = STRBUF_INIT;
e28714c5
JH
52static int receive_unpack_limit = -1;
53static int transfer_unpack_limit = -1;
1b70fe5d 54static int advertise_atomic_push = 1;
c714e45f 55static int advertise_push_options;
46732fae 56static int unpack_limit = 100;
c08db5a2 57static off_t max_input_size;
96f1e58f 58static int report_status;
38a81b4e 59static int use_sideband;
68deed29 60static int use_atomic;
c714e45f 61static int use_push_options;
c207e34f 62static int quiet;
b74fce16 63static int prefer_ofs_delta = 1;
77e3efbf
JH
64static int auto_update_server_info;
65static int auto_gc = 1;
1b68387e 66static int reject_thin;
5732373d
JH
67static int stateless_rpc;
68static const char *service_dir;
747ca245 69static const char *head_name;
96ec7b1e 70static void *head_name_to_free;
185c04e0 71static int sent_capabilities;
0a1bc12b 72static int shallow_update;
5dbd7676 73static const char *alt_shallow_file;
a85b377d 74static struct strbuf push_cert = STRBUF_INIT;
a09c985e 75static struct object_id push_cert_oid;
d05b9618 76static struct signature_check sigcheck;
b89363e4
JH
77static const char *push_cert_nonce;
78static const char *cert_nonce_seed;
79
80static const char *NONCE_UNSOLICITED = "UNSOLICITED";
81static const char *NONCE_BAD = "BAD";
82static const char *NONCE_MISSING = "MISSING";
83static const char *NONCE_OK = "OK";
5732373d 84static const char *NONCE_SLOP = "SLOP";
b89363e4 85static const char *nonce_status;
5732373d 86static long nonce_stamp_slop;
dddbad72 87static timestamp_t nonce_stamp_slop_limit;
222368c6 88static struct ref_transaction *transaction;
cfee10a7 89
83558686
JK
90static enum {
91 KEEPALIVE_NEVER = 0,
92 KEEPALIVE_AFTER_NUL,
93 KEEPALIVE_ALWAYS
94} use_keepalive;
95static int keepalive_in_sec = 5;
96
722ff7f8
JK
97static struct tmp_objdir *tmp_objdir;
98
986e8239
JK
99static enum deny_action parse_deny_action(const char *var, const char *value)
100{
101 if (value) {
102 if (!strcasecmp(value, "ignore"))
103 return DENY_IGNORE;
104 if (!strcasecmp(value, "warn"))
105 return DENY_WARN;
106 if (!strcasecmp(value, "refuse"))
107 return DENY_REFUSE;
1404bcbb
JS
108 if (!strcasecmp(value, "updateinstead"))
109 return DENY_UPDATE_INSTEAD;
986e8239
JK
110 }
111 if (git_config_bool(var, value))
112 return DENY_REFUSE;
113 return DENY_IGNORE;
114}
115
ef90d6d4 116static int receive_pack_config(const char *var, const char *value, void *cb)
6fb75bed 117{
daebaa78
JH
118 int status = parse_hide_refs_config(var, value, "receive");
119
120 if (status)
121 return status;
122
a240de11
JK
123 if (strcmp(var, "receive.denydeletes") == 0) {
124 deny_deletes = git_config_bool(var, value);
125 return 0;
126 }
127
e28714c5 128 if (strcmp(var, "receive.denynonfastforwards") == 0) {
6fb75bed
SP
129 deny_non_fast_forwards = git_config_bool(var, value);
130 return 0;
131 }
132
e28714c5
JH
133 if (strcmp(var, "receive.unpacklimit") == 0) {
134 receive_unpack_limit = git_config_int(var, value);
fc04c412
SP
135 return 0;
136 }
137
e28714c5
JH
138 if (strcmp(var, "transfer.unpacklimit") == 0) {
139 transfer_unpack_limit = git_config_int(var, value);
140 return 0;
141 }
142
cd94c6f9
JS
143 if (strcmp(var, "receive.fsck.skiplist") == 0) {
144 const char *path;
145
146 if (git_config_pathname(&path, var, value))
147 return 1;
148 strbuf_addf(&fsck_msg_types, "%cskiplist=%s",
149 fsck_msg_types.len ? ',' : '=', path);
150 free((char *)path);
151 return 0;
152 }
153
5d477a33
JS
154 if (skip_prefix(var, "receive.fsck.", &var)) {
155 if (is_valid_msg_type(var, value))
156 strbuf_addf(&fsck_msg_types, "%c%s=%s",
157 fsck_msg_types.len ? ',' : '=', var, value);
158 else
159 warning("Skipping unknown msg id '%s'", var);
160 return 0;
161 }
162
20dc0016
MK
163 if (strcmp(var, "receive.fsckobjects") == 0) {
164 receive_fsck_objects = git_config_bool(var, value);
165 return 0;
166 }
167
dab76d3a
JH
168 if (strcmp(var, "transfer.fsckobjects") == 0) {
169 transfer_fsck_objects = git_config_bool(var, value);
170 return 0;
171 }
172
986e8239
JK
173 if (!strcmp(var, "receive.denycurrentbranch")) {
174 deny_current_branch = parse_deny_action(var, value);
175 return 0;
176 }
177
747ca245
JH
178 if (strcmp(var, "receive.denydeletecurrent") == 0) {
179 deny_delete_current = parse_deny_action(var, value);
180 return 0;
181 }
182
b74fce16
NP
183 if (strcmp(var, "repack.usedeltabaseoffset") == 0) {
184 prefer_ofs_delta = git_config_bool(var, value);
185 return 0;
186 }
187
77e3efbf
JH
188 if (strcmp(var, "receive.updateserverinfo") == 0) {
189 auto_update_server_info = git_config_bool(var, value);
190 return 0;
191 }
192
193 if (strcmp(var, "receive.autogc") == 0) {
194 auto_gc = git_config_bool(var, value);
195 return 0;
196 }
197
0a1bc12b
NTND
198 if (strcmp(var, "receive.shallowupdate") == 0) {
199 shallow_update = git_config_bool(var, value);
200 return 0;
201 }
202
b89363e4
JH
203 if (strcmp(var, "receive.certnonceseed") == 0)
204 return git_config_string(&cert_nonce_seed, var, value);
a85b377d 205
5732373d
JH
206 if (strcmp(var, "receive.certnonceslop") == 0) {
207 nonce_stamp_slop_limit = git_config_ulong(var, value);
208 return 0;
209 }
210
1b70fe5d
RS
211 if (strcmp(var, "receive.advertiseatomic") == 0) {
212 advertise_atomic_push = git_config_bool(var, value);
213 return 0;
214 }
215
c714e45f
SB
216 if (strcmp(var, "receive.advertisepushoptions") == 0) {
217 advertise_push_options = git_config_bool(var, value);
218 return 0;
219 }
220
83558686
JK
221 if (strcmp(var, "receive.keepalive") == 0) {
222 keepalive_in_sec = git_config_int(var, value);
223 return 0;
224 }
225
c08db5a2
JK
226 if (strcmp(var, "receive.maxinputsize") == 0) {
227 max_input_size = git_config_int64(var, value);
228 return 0;
229 }
230
ef90d6d4 231 return git_default_config(var, value, cb);
6fb75bed
SP
232}
233
1b7ba794 234static void show_ref(const char *path, const struct object_id *oid)
575f4974 235{
52d2ae58 236 if (sent_capabilities) {
1b7ba794 237 packet_write_fmt(1, "%s %s\n", oid_to_hex(oid), path);
52d2ae58
JH
238 } else {
239 struct strbuf cap = STRBUF_INIT;
240
241 strbuf_addstr(&cap,
242 "report-status delete-refs side-band-64k quiet");
1b70fe5d
RS
243 if (advertise_atomic_push)
244 strbuf_addstr(&cap, " atomic");
52d2ae58
JH
245 if (prefer_ofs_delta)
246 strbuf_addstr(&cap, " ofs-delta");
b89363e4
JH
247 if (push_cert_nonce)
248 strbuf_addf(&cap, " push-cert=%s", push_cert_nonce);
c714e45f
SB
249 if (advertise_push_options)
250 strbuf_addstr(&cap, " push-options");
52d2ae58 251 strbuf_addf(&cap, " agent=%s", git_user_agent_sanitized());
81c634e9 252 packet_write_fmt(1, "%s %s%c%s\n",
1b7ba794 253 oid_to_hex(oid), path, 0, cap.buf);
52d2ae58
JH
254 strbuf_release(&cap);
255 sent_capabilities = 1;
256 }
575f4974
LT
257}
258
78a766ab 259static int show_ref_cb(const char *path_full, const struct object_id *oid,
8b24b9e7 260 int flag, void *data)
6b01ecfe 261{
8b24b9e7 262 struct oidset *seen = data;
78a766ab
LF
263 const char *path = strip_namespace(path_full);
264
265 if (ref_is_hidden(path, path_full))
266 return 0;
267
6b01ecfe
JT
268 /*
269 * Advertise refs outside our current namespace as ".have"
270 * refs, so that the client can use them to minimize data
fea6c47f 271 * transfer but will otherwise ignore them.
6b01ecfe 272 */
8b24b9e7
JK
273 if (!path) {
274 if (oidset_insert(seen, oid))
275 return 0;
6b01ecfe 276 path = ".have";
63d428e6
JK
277 } else {
278 oidset_insert(seen, oid);
8b24b9e7 279 }
1b7ba794 280 show_ref(path, oid);
bc98201d 281 return 0;
6b01ecfe
JT
282}
283
bdf4276c 284static void show_one_alternate_ref(const struct object_id *oid,
ab6eea6f 285 void *data)
b7a025d9 286{
ab6eea6f 287 struct oidset *seen = data;
b7a025d9 288
ab6eea6f
JK
289 if (oidset_insert(seen, oid))
290 return;
291
1b7ba794 292 show_ref(".have", oid);
6b01ecfe
JT
293}
294
8a65ff76 295static void write_head_info(void)
575f4974 296{
ab6eea6f 297 static struct oidset seen = OIDSET_INIT;
2b2a5be3 298
63d428e6 299 for_each_ref(show_ref_cb, &seen);
ab6eea6f
JK
300 for_each_alternate_ref(show_one_alternate_ref, &seen);
301 oidset_clear(&seen);
185c04e0 302 if (!sent_capabilities)
1b7ba794 303 show_ref("capabilities^{}", &null_oid);
cfee10a7 304
ad491366
NTND
305 advertise_shallow_grafts(1);
306
b7a025d9
MH
307 /* EOF */
308 packet_flush(1);
575f4974
LT
309}
310
eb1af2df
LT
311struct command {
312 struct command *next;
cfee10a7 313 const char *error_string;
160b81ed
PYH
314 unsigned int skip_update:1,
315 did_not_exist:1;
5dbd7676 316 int index;
9c44ea44 317 struct object_id old_oid;
318 struct object_id new_oid;
8f1d2e6f 319 char ref_name[FLEX_ARRAY]; /* more */
575f4974
LT
320};
321
466dbc42
SP
322static void rp_error(const char *err, ...) __attribute__((format (printf, 1, 2)));
323static void rp_warning(const char *err, ...) __attribute__((format (printf, 1, 2)));
324
325static void report_message(const char *prefix, const char *err, va_list params)
326{
b7115a35 327 int sz;
466dbc42
SP
328 char msg[4096];
329
b7115a35 330 sz = xsnprintf(msg, sizeof(msg), "%s", prefix);
466dbc42
SP
331 sz += vsnprintf(msg + sz, sizeof(msg) - sz, err, params);
332 if (sz > (sizeof(msg) - 1))
333 sz = sizeof(msg) - 1;
334 msg[sz++] = '\n';
335
336 if (use_sideband)
337 send_sideband(1, 2, msg, sz, use_sideband);
338 else
339 xwrite(2, msg, sz);
340}
341
342static void rp_warning(const char *err, ...)
343{
344 va_list params;
345 va_start(params, err);
346 report_message("warning: ", err, params);
347 va_end(params);
348}
349
350static void rp_error(const char *err, ...)
351{
352 va_list params;
353 va_start(params, err);
354 report_message("error: ", err, params);
355 va_end(params);
356}
357
6d525d38
SP
358static int copy_to_sideband(int in, int out, void *arg)
359{
360 char data[128];
83558686
JK
361 int keepalive_active = 0;
362
363 if (keepalive_in_sec <= 0)
364 use_keepalive = KEEPALIVE_NEVER;
365 if (use_keepalive == KEEPALIVE_ALWAYS)
366 keepalive_active = 1;
367
6d525d38 368 while (1) {
83558686
JK
369 ssize_t sz;
370
371 if (keepalive_active) {
372 struct pollfd pfd;
373 int ret;
374
375 pfd.fd = in;
376 pfd.events = POLLIN;
377 ret = poll(&pfd, 1, 1000 * keepalive_in_sec);
378
379 if (ret < 0) {
380 if (errno == EINTR)
381 continue;
382 else
383 break;
384 } else if (ret == 0) {
385 /* no data; send a keepalive packet */
386 static const char buf[] = "0005\1";
387 write_or_die(1, buf, sizeof(buf) - 1);
388 continue;
389 } /* else there is actual data to read */
390 }
391
392 sz = xread(in, data, sizeof(data));
6d525d38
SP
393 if (sz <= 0)
394 break;
83558686
JK
395
396 if (use_keepalive == KEEPALIVE_AFTER_NUL && !keepalive_active) {
397 const char *p = memchr(data, '\0', sz);
398 if (p) {
399 /*
400 * The NUL tells us to start sending keepalives. Make
401 * sure we send any other data we read along
402 * with it.
403 */
404 keepalive_active = 1;
405 send_sideband(1, 2, data, p - data, use_sideband);
406 send_sideband(1, 2, p + 1, sz - (p - data + 1), use_sideband);
407 continue;
408 }
409 }
410
411 /*
412 * Either we're not looking for a NUL signal, or we didn't see
413 * it yet; just pass along the data.
414 */
6d525d38
SP
415 send_sideband(1, 2, data, sz, use_sideband);
416 }
417 close(in);
418 return 0;
419}
420
b89363e4
JH
421#define HMAC_BLOCK_SIZE 64
422
6f5ef44e 423static void hmac_sha1(unsigned char *out,
b89363e4
JH
424 const char *key_in, size_t key_len,
425 const char *text, size_t text_len)
426{
427 unsigned char key[HMAC_BLOCK_SIZE];
428 unsigned char k_ipad[HMAC_BLOCK_SIZE];
429 unsigned char k_opad[HMAC_BLOCK_SIZE];
430 int i;
431 git_SHA_CTX ctx;
432
433 /* RFC 2104 2. (1) */
434 memset(key, '\0', HMAC_BLOCK_SIZE);
435 if (HMAC_BLOCK_SIZE < key_len) {
436 git_SHA1_Init(&ctx);
437 git_SHA1_Update(&ctx, key_in, key_len);
438 git_SHA1_Final(key, &ctx);
439 } else {
440 memcpy(key, key_in, key_len);
441 }
442
443 /* RFC 2104 2. (2) & (5) */
444 for (i = 0; i < sizeof(key); i++) {
445 k_ipad[i] = key[i] ^ 0x36;
446 k_opad[i] = key[i] ^ 0x5c;
447 }
448
449 /* RFC 2104 2. (3) & (4) */
450 git_SHA1_Init(&ctx);
451 git_SHA1_Update(&ctx, k_ipad, sizeof(k_ipad));
452 git_SHA1_Update(&ctx, text, text_len);
453 git_SHA1_Final(out, &ctx);
454
455 /* RFC 2104 2. (6) & (7) */
456 git_SHA1_Init(&ctx);
457 git_SHA1_Update(&ctx, k_opad, sizeof(k_opad));
f6d27d24 458 git_SHA1_Update(&ctx, out, GIT_SHA1_RAWSZ);
b89363e4
JH
459 git_SHA1_Final(out, &ctx);
460}
461
dddbad72 462static char *prepare_push_cert_nonce(const char *path, timestamp_t stamp)
b89363e4
JH
463{
464 struct strbuf buf = STRBUF_INIT;
f6d27d24 465 unsigned char sha1[GIT_SHA1_RAWSZ];
b89363e4 466
cb71f8bd 467 strbuf_addf(&buf, "%s:%"PRItime, path, stamp);
c3b9bc94 468 hmac_sha1(sha1, buf.buf, buf.len, cert_nonce_seed, strlen(cert_nonce_seed));
b89363e4
JH
469 strbuf_release(&buf);
470
471 /* RFC 2104 5. HMAC-SHA1-80 */
f6d27d24 472 strbuf_addf(&buf, "%"PRItime"-%.*s", stamp, GIT_SHA1_HEXSZ, sha1_to_hex(sha1));
b89363e4
JH
473 return strbuf_detach(&buf, NULL);
474}
475
476/*
477 * NEEDSWORK: reuse find_commit_header() from jk/commit-author-parsing
478 * after dropping "_commit" from its name and possibly moving it out
479 * of commit.c
480 */
cbaf82cc
JT
481static char *find_header(const char *msg, size_t len, const char *key,
482 const char **next_line)
b89363e4
JH
483{
484 int key_len = strlen(key);
485 const char *line = msg;
486
487 while (line && line < msg + len) {
488 const char *eol = strchrnul(line, '\n');
489
490 if ((msg + len <= eol) || line == eol)
491 return NULL;
492 if (line + key_len < eol &&
493 !memcmp(line, key, key_len) && line[key_len] == ' ') {
494 int offset = key_len + 1;
cbaf82cc
JT
495 if (next_line)
496 *next_line = *eol ? eol + 1 : eol;
b89363e4
JH
497 return xmemdupz(line + offset, (eol - line) - offset);
498 }
499 line = *eol ? eol + 1 : NULL;
500 }
501 return NULL;
502}
503
504static const char *check_nonce(const char *buf, size_t len)
505{
cbaf82cc 506 char *nonce = find_header(buf, len, "nonce", NULL);
dddbad72 507 timestamp_t stamp, ostamp;
5732373d 508 char *bohmac, *expect = NULL;
b89363e4
JH
509 const char *retval = NONCE_BAD;
510
511 if (!nonce) {
512 retval = NONCE_MISSING;
513 goto leave;
514 } else if (!push_cert_nonce) {
515 retval = NONCE_UNSOLICITED;
516 goto leave;
517 } else if (!strcmp(push_cert_nonce, nonce)) {
518 retval = NONCE_OK;
519 goto leave;
520 }
521
5732373d
JH
522 if (!stateless_rpc) {
523 /* returned nonce MUST match what we gave out earlier */
524 retval = NONCE_BAD;
525 goto leave;
526 }
527
528 /*
529 * In stateless mode, we may be receiving a nonce issued by
530 * another instance of the server that serving the same
531 * repository, and the timestamps may not match, but the
532 * nonce-seed and dir should match, so we can recompute and
533 * report the time slop.
534 *
535 * In addition, when a nonce issued by another instance has
536 * timestamp within receive.certnonceslop seconds, we pretend
537 * as if we issued that nonce when reporting to the hook.
538 */
539
540 /* nonce is concat(<seconds-since-epoch>, "-", <hmac>) */
541 if (*nonce <= '0' || '9' < *nonce) {
542 retval = NONCE_BAD;
543 goto leave;
544 }
1aeb7e75 545 stamp = parse_timestamp(nonce, &bohmac, 10);
5732373d
JH
546 if (bohmac == nonce || bohmac[0] != '-') {
547 retval = NONCE_BAD;
548 goto leave;
549 }
550
551 expect = prepare_push_cert_nonce(service_dir, stamp);
552 if (strcmp(expect, nonce)) {
553 /* Not what we would have signed earlier */
554 retval = NONCE_BAD;
555 goto leave;
556 }
557
558 /*
559 * By how many seconds is this nonce stale? Negative value
560 * would mean it was issued by another server with its clock
561 * skewed in the future.
562 */
1aeb7e75 563 ostamp = parse_timestamp(push_cert_nonce, NULL, 10);
5732373d
JH
564 nonce_stamp_slop = (long)ostamp - (long)stamp;
565
566 if (nonce_stamp_slop_limit &&
31a8aa1e 567 labs(nonce_stamp_slop) <= nonce_stamp_slop_limit) {
5732373d
JH
568 /*
569 * Pretend as if the received nonce (which passes the
570 * HMAC check, so it is not a forged by third-party)
571 * is what we issued.
572 */
573 free((void *)push_cert_nonce);
574 push_cert_nonce = xstrdup(nonce);
575 retval = NONCE_OK;
576 } else {
577 retval = NONCE_SLOP;
578 }
b89363e4
JH
579
580leave:
581 free(nonce);
5732373d 582 free(expect);
b89363e4
JH
583 return retval;
584}
585
cbaf82cc
JT
586/*
587 * Return 1 if there is no push_cert or if the push options in push_cert are
588 * the same as those in the argument; 0 otherwise.
589 */
590static int check_cert_push_options(const struct string_list *push_options)
591{
592 const char *buf = push_cert.buf;
593 int len = push_cert.len;
594
595 char *option;
596 const char *next_line;
597 int options_seen = 0;
598
599 int retval = 1;
600
601 if (!len)
602 return 1;
603
604 while ((option = find_header(buf, len, "push-option", &next_line))) {
605 len -= (next_line - buf);
606 buf = next_line;
607 options_seen++;
608 if (options_seen > push_options->nr
609 || strcmp(option,
610 push_options->items[options_seen - 1].string)) {
611 retval = 0;
612 goto leave;
613 }
614 free(option);
615 }
616
617 if (options_seen != push_options->nr)
618 retval = 0;
619
620leave:
621 free(option);
622 return retval;
623}
624
a85b377d
JH
625static void prepare_push_cert_sha1(struct child_process *proc)
626{
627 static int already_done;
a85b377d
JH
628
629 if (!push_cert.len)
630 return;
631
632 if (!already_done) {
d05b9618
JH
633 int bogs /* beginning_of_gpg_sig */;
634
a85b377d 635 already_done = 1;
a09c985e
PO
636 if (write_object_file(push_cert.buf, push_cert.len, "blob",
637 &push_cert_oid))
638 oidclr(&push_cert_oid);
d05b9618
JH
639
640 memset(&sigcheck, '\0', sizeof(sigcheck));
d05b9618
JH
641
642 bogs = parse_signature(push_cert.buf, push_cert.len);
3b9291e1
HS
643 check_signature(push_cert.buf, bogs, push_cert.buf + bogs,
644 push_cert.len - bogs, &sigcheck);
d05b9618 645
b89363e4 646 nonce_status = check_nonce(push_cert.buf, bogs);
a85b377d 647 }
a09c985e 648 if (!is_null_oid(&push_cert_oid)) {
a9154590 649 argv_array_pushf(&proc->env_array, "GIT_PUSH_CERT=%s",
a09c985e 650 oid_to_hex(&push_cert_oid));
a9154590 651 argv_array_pushf(&proc->env_array, "GIT_PUSH_CERT_SIGNER=%s",
d05b9618 652 sigcheck.signer ? sigcheck.signer : "");
a9154590 653 argv_array_pushf(&proc->env_array, "GIT_PUSH_CERT_KEY=%s",
d05b9618 654 sigcheck.key ? sigcheck.key : "");
a9154590
RS
655 argv_array_pushf(&proc->env_array, "GIT_PUSH_CERT_STATUS=%c",
656 sigcheck.result);
b89363e4 657 if (push_cert_nonce) {
a9154590
RS
658 argv_array_pushf(&proc->env_array,
659 "GIT_PUSH_CERT_NONCE=%s",
660 push_cert_nonce);
661 argv_array_pushf(&proc->env_array,
662 "GIT_PUSH_CERT_NONCE_STATUS=%s",
663 nonce_status);
5732373d 664 if (nonce_status == NONCE_SLOP)
a9154590
RS
665 argv_array_pushf(&proc->env_array,
666 "GIT_PUSH_CERT_NONCE_SLOP=%ld",
5732373d 667 nonce_stamp_slop);
b89363e4 668 }
a85b377d
JH
669 }
670}
671
77a9745d
SB
672struct receive_hook_feed_state {
673 struct command *cmd;
674 int skip_broken;
675 struct strbuf buf;
676 const struct string_list *push_options;
677};
678
9684e44a 679typedef int (*feed_fn)(void *, const char **, size_t *);
77a9745d
SB
680static int run_and_feed_hook(const char *hook_name, feed_fn feed,
681 struct receive_hook_feed_state *feed_state)
b1bf95bb 682{
d3180279 683 struct child_process proc = CHILD_PROCESS_INIT;
6d525d38 684 struct async muxer;
f43cd49f 685 const char *argv[2];
9684e44a 686 int code;
b1bf95bb 687
5a7da2dc
AS
688 argv[0] = find_hook(hook_name);
689 if (!argv[0])
b1bf95bb 690 return 0;
c8dd2771 691
f43cd49f
SP
692 argv[1] = NULL;
693
f43cd49f
SP
694 proc.argv = argv;
695 proc.in = -1;
696 proc.stdout_to_stderr = 1;
77a9745d
SB
697 if (feed_state->push_options) {
698 int i;
699 for (i = 0; i < feed_state->push_options->nr; i++)
700 argv_array_pushf(&proc.env_array,
701 "GIT_PUSH_OPTION_%d=%s", i,
702 feed_state->push_options->items[i].string);
703 argv_array_pushf(&proc.env_array, "GIT_PUSH_OPTION_COUNT=%d",
704 feed_state->push_options->nr);
705 } else
706 argv_array_pushf(&proc.env_array, "GIT_PUSH_OPTION_COUNT");
f43cd49f 707
722ff7f8
JK
708 if (tmp_objdir)
709 argv_array_pushv(&proc.env_array, tmp_objdir_env(tmp_objdir));
710
6d525d38
SP
711 if (use_sideband) {
712 memset(&muxer, 0, sizeof(muxer));
713 muxer.proc = copy_to_sideband;
714 muxer.in = -1;
715 code = start_async(&muxer);
716 if (code)
717 return code;
718 proc.err = muxer.in;
719 }
720
5d222c09
RS
721 prepare_push_cert_sha1(&proc);
722
f43cd49f 723 code = start_command(&proc);
6d525d38
SP
724 if (code) {
725 if (use_sideband)
726 finish_async(&muxer);
90e41a89 727 return code;
6d525d38
SP
728 }
729
ec7dbd14
JH
730 sigchain_push(SIGPIPE, SIG_IGN);
731
9684e44a
JH
732 while (1) {
733 const char *buf;
734 size_t n;
735 if (feed(feed_state, &buf, &n))
736 break;
06f46f23 737 if (write_in_full(proc.in, buf, n) < 0)
9684e44a 738 break;
c8dd2771 739 }
e72ae288 740 close(proc.in);
6d525d38
SP
741 if (use_sideband)
742 finish_async(&muxer);
ec7dbd14
JH
743
744 sigchain_pop(SIGPIPE);
745
90e41a89 746 return finish_command(&proc);
b1bf95bb
JW
747}
748
9684e44a
JH
749static int feed_receive_hook(void *state_, const char **bufp, size_t *sizep)
750{
751 struct receive_hook_feed_state *state = state_;
752 struct command *cmd = state->cmd;
753
cdc2b2f3
JH
754 while (cmd &&
755 state->skip_broken && (cmd->error_string || cmd->did_not_exist))
9684e44a
JH
756 cmd = cmd->next;
757 if (!cmd)
758 return -1; /* EOF */
759 strbuf_reset(&state->buf);
760 strbuf_addf(&state->buf, "%s %s %s\n",
9c44ea44 761 oid_to_hex(&cmd->old_oid), oid_to_hex(&cmd->new_oid),
9684e44a
JH
762 cmd->ref_name);
763 state->cmd = cmd->next;
764 if (bufp) {
765 *bufp = state->buf.buf;
766 *sizep = state->buf.len;
767 }
768 return 0;
769}
770
77a9745d
SB
771static int run_receive_hook(struct command *commands,
772 const char *hook_name,
773 int skip_broken,
774 const struct string_list *push_options)
9684e44a
JH
775{
776 struct receive_hook_feed_state state;
777 int status;
778
779 strbuf_init(&state.buf, 0);
780 state.cmd = commands;
cdc2b2f3 781 state.skip_broken = skip_broken;
9684e44a
JH
782 if (feed_receive_hook(&state, NULL, NULL))
783 return 0;
784 state.cmd = commands;
77a9745d 785 state.push_options = push_options;
9684e44a
JH
786 status = run_and_feed_hook(hook_name, feed_receive_hook, &state);
787 strbuf_release(&state.buf);
788 return status;
789}
790
1d9e8b56
SP
791static int run_update_hook(struct command *cmd)
792{
1d9e8b56 793 const char *argv[5];
d3180279 794 struct child_process proc = CHILD_PROCESS_INIT;
6d525d38 795 int code;
1d9e8b56 796
5a7da2dc
AS
797 argv[0] = find_hook("update");
798 if (!argv[0])
1d9e8b56
SP
799 return 0;
800
1d9e8b56 801 argv[1] = cmd->ref_name;
9c44ea44 802 argv[2] = oid_to_hex(&cmd->old_oid);
803 argv[3] = oid_to_hex(&cmd->new_oid);
1d9e8b56
SP
804 argv[4] = NULL;
805
6d525d38
SP
806 proc.no_stdin = 1;
807 proc.stdout_to_stderr = 1;
808 proc.err = use_sideband ? -1 : 0;
809 proc.argv = argv;
810
811 code = start_command(&proc);
812 if (code)
813 return code;
814 if (use_sideband)
815 copy_to_sideband(proc.err, -1, NULL);
816 return finish_command(&proc);
1d9e8b56
SP
817}
818
986e8239
JK
819static int is_ref_checked_out(const char *ref)
820{
986e8239
JK
821 if (is_bare_repository())
822 return 0;
823
747ca245 824 if (!head_name)
986e8239 825 return 0;
747ca245 826 return !strcmp(head_name, ref);
986e8239
JK
827}
828
8ba35a2d
VA
829static char *refuse_unconfigured_deny_msg =
830 N_("By default, updating the current branch in a non-bare repository\n"
831 "is denied, because it will make the index and work tree inconsistent\n"
832 "with what you pushed, and will require 'git reset --hard' to match\n"
833 "the work tree to HEAD.\n"
834 "\n"
2ddaa427
AH
835 "You can set the 'receive.denyCurrentBranch' configuration variable\n"
836 "to 'ignore' or 'warn' in the remote repository to allow pushing into\n"
8ba35a2d
VA
837 "its current branch; however, this is not recommended unless you\n"
838 "arranged to update its work tree to match what you pushed in some\n"
839 "other way.\n"
840 "\n"
841 "To squelch this message and still keep the default behaviour, set\n"
842 "'receive.denyCurrentBranch' configuration variable to 'refuse'.");
3d95d92b 843
acd2a45b 844static void refuse_unconfigured_deny(void)
3d95d92b 845{
8ba35a2d 846 rp_error("%s", _(refuse_unconfigured_deny_msg));
3d95d92b
JH
847}
848
8ba35a2d
VA
849static char *refuse_unconfigured_deny_delete_current_msg =
850 N_("By default, deleting the current branch is denied, because the next\n"
851 "'git clone' won't result in any file checked out, causing confusion.\n"
852 "\n"
853 "You can set 'receive.denyDeleteCurrent' configuration variable to\n"
854 "'warn' or 'ignore' in the remote repository to allow deleting the\n"
855 "current branch, with or without a warning message.\n"
856 "\n"
857 "To squelch this message, you can set it to 'refuse'.");
747ca245 858
375881fa 859static void refuse_unconfigured_deny_delete_current(void)
747ca245 860{
8ba35a2d 861 rp_error("%s", _(refuse_unconfigured_deny_delete_current_msg));
747ca245
JH
862}
863
6ccac9ee 864static int command_singleton_iterator(void *cb_data, struct object_id *oid);
0a1bc12b
NTND
865static int update_shallow_ref(struct command *cmd, struct shallow_info *si)
866{
b2275868 867 struct lock_file shallow_lock = LOCK_INIT;
910650d2 868 struct oid_array extra = OID_ARRAY_INIT;
7043c707 869 struct check_connected_options opt = CHECK_CONNECTED_INIT;
0a1bc12b
NTND
870 uint32_t mask = 1 << (cmd->index % 32);
871 int i;
872
6aa30857 873 trace_printf_key(&trace_shallow,
0a1bc12b
NTND
874 "shallow: update_shallow_ref %s\n", cmd->ref_name);
875 for (i = 0; i < si->shallow->nr; i++)
876 if (si->used_shallow[i] &&
877 (si->used_shallow[i][cmd->index / 32] & mask) &&
878 !delayed_reachability_test(si, i))
910650d2 879 oid_array_append(&extra, &si->shallow->oid[i]);
0a1bc12b 880
722ff7f8 881 opt.env = tmp_objdir_env(tmp_objdir);
7043c707
JK
882 setup_alternate_shallow(&shallow_lock, &opt.shallow_file, &extra);
883 if (check_connected(command_singleton_iterator, cmd, &opt)) {
0a1bc12b 884 rollback_lock_file(&shallow_lock);
910650d2 885 oid_array_clear(&extra);
0a1bc12b
NTND
886 return -1;
887 }
888
889 commit_lock_file(&shallow_lock);
890
891 /*
892 * Make sure setup_alternate_shallow() for the next ref does
893 * not lose these new roots..
894 */
895 for (i = 0; i < extra.nr; i++)
19143f13 896 register_shallow(the_repository, &extra.oid[i]);
0a1bc12b
NTND
897
898 si->shallow_ref[cmd->index] = 0;
910650d2 899 oid_array_clear(&extra);
0a1bc12b
NTND
900 return 0;
901}
902
1a51b524
JH
903/*
904 * NEEDSWORK: we should consolidate various implementions of "are we
905 * on an unborn branch?" test into one, and make the unified one more
906 * robust. !get_sha1() based check used here and elsewhere would not
907 * allow us to tell an unborn branch from corrupt ref, for example.
908 * For the purpose of fixing "deploy-to-update does not work when
909 * pushing into an empty repository" issue, this should suffice for
910 * now.
911 */
912static int head_has_history(void)
913{
15be4a5d 914 struct object_id oid;
1a51b524 915
15be4a5d 916 return !get_oid("HEAD", &oid);
1a51b524
JH
917}
918
21b138d0
JH
919static const char *push_to_deploy(unsigned char *sha1,
920 struct argv_array *env,
921 const char *work_tree)
1404bcbb
JS
922{
923 const char *update_refresh[] = {
924 "update-index", "-q", "--ignore-submodules", "--refresh", NULL
925 };
926 const char *diff_files[] = {
927 "diff-files", "--quiet", "--ignore-submodules", "--", NULL
928 };
929 const char *diff_index[] = {
930 "diff-index", "--quiet", "--cached", "--ignore-submodules",
1a51b524 931 NULL, "--", NULL
1404bcbb
JS
932 };
933 const char *read_tree[] = {
934 "read-tree", "-u", "-m", NULL, NULL
935 };
1404bcbb
JS
936 struct child_process child = CHILD_PROCESS_INIT;
937
1404bcbb 938 child.argv = update_refresh;
21b138d0 939 child.env = env->argv;
1404bcbb
JS
940 child.dir = work_tree;
941 child.no_stdin = 1;
942 child.stdout_to_stderr = 1;
943 child.git_cmd = 1;
21b138d0 944 if (run_command(&child))
1404bcbb 945 return "Up-to-date check failed";
1404bcbb
JS
946
947 /* run_command() does not clean up completely; reinitialize */
948 child_process_init(&child);
949 child.argv = diff_files;
21b138d0 950 child.env = env->argv;
1404bcbb
JS
951 child.dir = work_tree;
952 child.no_stdin = 1;
953 child.stdout_to_stderr = 1;
954 child.git_cmd = 1;
21b138d0 955 if (run_command(&child))
1404bcbb 956 return "Working directory has unstaged changes";
1404bcbb 957
1a51b524 958 /* diff-index with either HEAD or an empty tree */
c00866a2 959 diff_index[4] = head_has_history() ? "HEAD" : empty_tree_oid_hex();
1a51b524 960
1404bcbb
JS
961 child_process_init(&child);
962 child.argv = diff_index;
21b138d0 963 child.env = env->argv;
1404bcbb
JS
964 child.no_stdin = 1;
965 child.no_stdout = 1;
966 child.stdout_to_stderr = 0;
967 child.git_cmd = 1;
21b138d0 968 if (run_command(&child))
1404bcbb 969 return "Working directory has staged changes";
1404bcbb
JS
970
971 read_tree[3] = sha1_to_hex(sha1);
972 child_process_init(&child);
973 child.argv = read_tree;
21b138d0 974 child.env = env->argv;
1404bcbb
JS
975 child.dir = work_tree;
976 child.no_stdin = 1;
977 child.no_stdout = 1;
978 child.stdout_to_stderr = 0;
979 child.git_cmd = 1;
21b138d0 980 if (run_command(&child))
1404bcbb 981 return "Could not update working tree to new HEAD";
1404bcbb 982
1404bcbb
JS
983 return NULL;
984}
985
08553319
JH
986static const char *push_to_checkout_hook = "push-to-checkout";
987
988static const char *push_to_checkout(unsigned char *sha1,
989 struct argv_array *env,
990 const char *work_tree)
991{
992 argv_array_pushf(env, "GIT_WORK_TREE=%s", absolute_path(work_tree));
993 if (run_hook_le(env->argv, push_to_checkout_hook,
994 sha1_to_hex(sha1), NULL))
995 return "push-to-checkout hook declined";
996 else
997 return NULL;
998}
999
21b138d0
JH
1000static const char *update_worktree(unsigned char *sha1)
1001{
1002 const char *retval;
1003 const char *work_tree = git_work_tree_cfg ? git_work_tree_cfg : "..";
1004 struct argv_array env = ARGV_ARRAY_INIT;
1005
1006 if (is_bare_repository())
1007 return "denyCurrentBranch = updateInstead needs a worktree";
1008
1009 argv_array_pushf(&env, "GIT_DIR=%s", absolute_path(get_git_dir()));
1010
08553319
JH
1011 if (!find_hook(push_to_checkout_hook))
1012 retval = push_to_deploy(sha1, &env, work_tree);
1013 else
1014 retval = push_to_checkout(sha1, &env, work_tree);
21b138d0
JH
1015
1016 argv_array_clear(&env);
1017 return retval;
1018}
1019
0a1bc12b 1020static const char *update(struct command *cmd, struct shallow_info *si)
2eca23da 1021{
cfee10a7 1022 const char *name = cmd->ref_name;
6b01ecfe 1023 struct strbuf namespaced_name_buf = STRBUF_INIT;
bda6e828
JS
1024 static char *namespaced_name;
1025 const char *ret;
9c44ea44 1026 struct object_id *old_oid = &cmd->old_oid;
1027 struct object_id *new_oid = &cmd->new_oid;
b072a25f 1028 int do_update_worktree = 0;
2eca23da 1029
061d6b9a 1030 /* only refs/... are allowed */
59556548 1031 if (!starts_with(name, "refs/") || check_refname_format(name + 5, 0)) {
466dbc42 1032 rp_error("refusing to create funny ref '%s' remotely", name);
8aaf7d64 1033 return "funny refname";
cfee10a7 1034 }
d8a1deec 1035
6b01ecfe 1036 strbuf_addf(&namespaced_name_buf, "%s%s", get_git_namespace(), name);
bda6e828 1037 free(namespaced_name);
6b01ecfe
JT
1038 namespaced_name = strbuf_detach(&namespaced_name_buf, NULL);
1039
1040 if (is_ref_checked_out(namespaced_name)) {
3d95d92b
JH
1041 switch (deny_current_branch) {
1042 case DENY_IGNORE:
986e8239 1043 break;
3d95d92b 1044 case DENY_WARN:
466dbc42 1045 rp_warning("updating the current branch");
986e8239 1046 break;
3d95d92b 1047 case DENY_REFUSE:
acd2a45b 1048 case DENY_UNCONFIGURED:
466dbc42 1049 rp_error("refusing to update checked out branch: %s", name);
acd2a45b
JH
1050 if (deny_current_branch == DENY_UNCONFIGURED)
1051 refuse_unconfigured_deny();
3d95d92b 1052 return "branch is currently checked out";
1404bcbb 1053 case DENY_UPDATE_INSTEAD:
b072a25f
JH
1054 /* pass -- let other checks intervene first */
1055 do_update_worktree = 1;
1404bcbb 1056 break;
3d95d92b 1057 }
986e8239
JK
1058 }
1059
9c44ea44 1060 if (!is_null_oid(new_oid) && !has_object_file(new_oid)) {
8aaf7d64 1061 error("unpack should have generated %s, "
9c44ea44 1062 "but I can't find it!", oid_to_hex(new_oid));
8aaf7d64 1063 return "bad pack";
cfee10a7 1064 }
747ca245 1065
9c44ea44 1066 if (!is_null_oid(old_oid) && is_null_oid(new_oid)) {
59556548 1067 if (deny_deletes && starts_with(name, "refs/heads/")) {
466dbc42 1068 rp_error("denying ref deletion for %s", name);
747ca245
JH
1069 return "deletion prohibited";
1070 }
1071
b112b14d 1072 if (head_name && !strcmp(namespaced_name, head_name)) {
747ca245
JH
1073 switch (deny_delete_current) {
1074 case DENY_IGNORE:
1075 break;
1076 case DENY_WARN:
466dbc42 1077 rp_warning("deleting the current branch");
747ca245
JH
1078 break;
1079 case DENY_REFUSE:
375881fa 1080 case DENY_UNCONFIGURED:
1404bcbb 1081 case DENY_UPDATE_INSTEAD:
375881fa
JH
1082 if (deny_delete_current == DENY_UNCONFIGURED)
1083 refuse_unconfigured_deny_delete_current();
466dbc42 1084 rp_error("refusing to delete the current branch: %s", name);
747ca245 1085 return "deletion of the current branch prohibited";
1404bcbb
JS
1086 default:
1087 return "Invalid denyDeleteCurrent setting";
747ca245
JH
1088 }
1089 }
a240de11 1090 }
747ca245 1091
9c44ea44 1092 if (deny_non_fast_forwards && !is_null_oid(new_oid) &&
1093 !is_null_oid(old_oid) &&
59556548 1094 starts_with(name, "refs/heads/")) {
eab82707 1095 struct object *old_object, *new_object;
11031d7e 1096 struct commit *old_commit, *new_commit;
11031d7e 1097
109cd76d
SB
1098 old_object = parse_object(the_repository, old_oid);
1099 new_object = parse_object(the_repository, new_oid);
eab82707
MK
1100
1101 if (!old_object || !new_object ||
1102 old_object->type != OBJ_COMMIT ||
1103 new_object->type != OBJ_COMMIT) {
1104 error("bad sha1 objects for %s", name);
1105 return "bad ref";
1106 }
1107 old_commit = (struct commit *)old_object;
1108 new_commit = (struct commit *)new_object;
5d55915c 1109 if (!in_merge_bases(old_commit, new_commit)) {
466dbc42
SP
1110 rp_error("denying non-fast-forward %s"
1111 " (you should pull first)", name);
a75d7b54 1112 return "non-fast-forward";
8aaf7d64 1113 }
11031d7e 1114 }
1d9e8b56 1115 if (run_update_hook(cmd)) {
466dbc42 1116 rp_error("hook declined to update %s", name);
8aaf7d64 1117 return "hook declined";
b1bf95bb 1118 }
3159c8dc 1119
b072a25f
JH
1120 if (do_update_worktree) {
1121 ret = update_worktree(new_oid->hash);
1122 if (ret)
1123 return ret;
1124 }
1125
9c44ea44 1126 if (is_null_oid(new_oid)) {
222368c6 1127 struct strbuf err = STRBUF_INIT;
109cd76d 1128 if (!parse_object(the_repository, old_oid)) {
9c44ea44 1129 old_oid = NULL;
160b81ed
PYH
1130 if (ref_exists(name)) {
1131 rp_warning("Allowing deletion of corrupt ref.");
1132 } else {
1133 rp_warning("Deleting a non-existent ref.");
1134 cmd->did_not_exist = 1;
1135 }
28391a80 1136 }
222368c6
SB
1137 if (ref_transaction_delete(transaction,
1138 namespaced_name,
89f3bbdd 1139 old_oid,
fb5a6bb6 1140 0, "push", &err)) {
222368c6
SB
1141 rp_error("%s", err.buf);
1142 strbuf_release(&err);
8aaf7d64 1143 return "failed to delete";
d4f694ba 1144 }
222368c6 1145 strbuf_release(&err);
8aaf7d64 1146 return NULL; /* good */
d4f694ba
JH
1147 }
1148 else {
6629ea2d 1149 struct strbuf err = STRBUF_INIT;
0a1bc12b
NTND
1150 if (shallow_update && si->shallow_ref[cmd->index] &&
1151 update_shallow_ref(cmd, si))
1152 return "shallow error";
1153
222368c6
SB
1154 if (ref_transaction_update(transaction,
1155 namespaced_name,
89f3bbdd 1156 new_oid, old_oid,
1d147bdf 1157 0, "push",
222368c6 1158 &err)) {
6629ea2d
RS
1159 rp_error("%s", err.buf);
1160 strbuf_release(&err);
222368c6 1161
6629ea2d 1162 return "failed to update ref";
ef203f08 1163 }
6629ea2d 1164 strbuf_release(&err);
222368c6 1165
8aaf7d64 1166 return NULL; /* good */
19614330 1167 }
2eca23da
LT
1168}
1169
5e1c71fd 1170static void run_update_post_hook(struct command *commands)
19614330 1171{
5e1c71fd 1172 struct command *cmd;
d3180279 1173 struct child_process proc = CHILD_PROCESS_INIT;
dcf69262 1174 const char *hook;
19614330 1175
5a7da2dc 1176 hook = find_hook("post-update");
dce96c41 1177 if (!hook)
3e6e152c 1178 return;
5a7da2dc 1179
850d2fec 1180 for (cmd = commands; cmd; cmd = cmd->next) {
160b81ed 1181 if (cmd->error_string || cmd->did_not_exist)
19614330 1182 continue;
dce96c41
RS
1183 if (!proc.args.argc)
1184 argv_array_push(&proc.args, hook);
850d2fec 1185 argv_array_push(&proc.args, cmd->ref_name);
19614330 1186 }
dce96c41
RS
1187 if (!proc.args.argc)
1188 return;
6d525d38 1189
6d525d38
SP
1190 proc.no_stdin = 1;
1191 proc.stdout_to_stderr = 1;
1192 proc.err = use_sideband ? -1 : 0;
6d525d38
SP
1193
1194 if (!start_command(&proc)) {
1195 if (use_sideband)
1196 copy_to_sideband(proc.err, -1, NULL);
1197 finish_command(&proc);
1198 }
19614330 1199}
2eca23da 1200
da3efdb1
JS
1201static void check_aliased_update(struct command *cmd, struct string_list *list)
1202{
6b01ecfe
JT
1203 struct strbuf buf = STRBUF_INIT;
1204 const char *dst_name;
da3efdb1
JS
1205 struct string_list_item *item;
1206 struct command *dst_cmd;
da3efdb1
JS
1207 int flag;
1208
6b01ecfe 1209 strbuf_addf(&buf, "%s%s", get_git_namespace(), cmd->ref_name);
744c040b 1210 dst_name = resolve_ref_unsafe(buf.buf, 0, NULL, &flag);
6b01ecfe 1211 strbuf_release(&buf);
da3efdb1
JS
1212
1213 if (!(flag & REF_ISSYMREF))
1214 return;
1215
6b01ecfe
JT
1216 if (!dst_name) {
1217 rp_error("refusing update to broken symref '%s'", cmd->ref_name);
1218 cmd->skip_update = 1;
1219 cmd->error_string = "broken symref";
1220 return;
1221 }
ded83936 1222 dst_name = strip_namespace(dst_name);
6b01ecfe 1223
e8c8b713 1224 if ((item = string_list_lookup(list, dst_name)) == NULL)
da3efdb1
JS
1225 return;
1226
1227 cmd->skip_update = 1;
1228
1229 dst_cmd = (struct command *) item->util;
1230
4a7e27e9
JK
1231 if (oideq(&cmd->old_oid, &dst_cmd->old_oid) &&
1232 oideq(&cmd->new_oid, &dst_cmd->new_oid))
da3efdb1
JS
1233 return;
1234
1235 dst_cmd->skip_update = 1;
1236
da3efdb1
JS
1237 rp_error("refusing inconsistent update between symref '%s' (%s..%s) and"
1238 " its target '%s' (%s..%s)",
ef2ed501 1239 cmd->ref_name,
aab9583f 1240 find_unique_abbrev(&cmd->old_oid, DEFAULT_ABBREV),
1241 find_unique_abbrev(&cmd->new_oid, DEFAULT_ABBREV),
ef2ed501 1242 dst_cmd->ref_name,
aab9583f 1243 find_unique_abbrev(&dst_cmd->old_oid, DEFAULT_ABBREV),
1244 find_unique_abbrev(&dst_cmd->new_oid, DEFAULT_ABBREV));
da3efdb1
JS
1245
1246 cmd->error_string = dst_cmd->error_string =
1247 "inconsistent aliased update";
1248}
1249
1250static void check_aliased_updates(struct command *commands)
1251{
1252 struct command *cmd;
183113a5 1253 struct string_list ref_list = STRING_LIST_INIT_NODUP;
da3efdb1
JS
1254
1255 for (cmd = commands; cmd; cmd = cmd->next) {
1256 struct string_list_item *item =
1d2f80fa 1257 string_list_append(&ref_list, cmd->ref_name);
da3efdb1
JS
1258 item->util = (void *)cmd;
1259 }
3383e199 1260 string_list_sort(&ref_list);
da3efdb1 1261
ef7e93d9
CB
1262 for (cmd = commands; cmd; cmd = cmd->next) {
1263 if (!cmd->error_string)
1264 check_aliased_update(cmd, &ref_list);
1265 }
da3efdb1
JS
1266
1267 string_list_clear(&ref_list, 0);
1268}
1269
6ccac9ee 1270static int command_singleton_iterator(void *cb_data, struct object_id *oid)
52fed6e1
JH
1271{
1272 struct command **cmd_list = cb_data;
1273 struct command *cmd = *cmd_list;
1274
9c44ea44 1275 if (!cmd || is_null_oid(&cmd->new_oid))
52fed6e1
JH
1276 return -1; /* end of list */
1277 *cmd_list = NULL; /* this returns only one */
6ccac9ee 1278 oidcpy(oid, &cmd->new_oid);
52fed6e1
JH
1279 return 0;
1280}
1281
0a1bc12b
NTND
1282static void set_connectivity_errors(struct command *commands,
1283 struct shallow_info *si)
52fed6e1
JH
1284{
1285 struct command *cmd;
1286
1287 for (cmd = commands; cmd; cmd = cmd->next) {
1288 struct command *singleton = cmd;
722ff7f8
JK
1289 struct check_connected_options opt = CHECK_CONNECTED_INIT;
1290
0a1bc12b
NTND
1291 if (shallow_update && si->shallow_ref[cmd->index])
1292 /* to be checked in update_shallow_ref() */
1293 continue;
722ff7f8
JK
1294
1295 opt.env = tmp_objdir_env(tmp_objdir);
7043c707 1296 if (!check_connected(command_singleton_iterator, &singleton,
722ff7f8 1297 &opt))
52fed6e1 1298 continue;
722ff7f8 1299
52fed6e1
JH
1300 cmd->error_string = "missing necessary objects";
1301 }
1302}
1303
0a1bc12b
NTND
1304struct iterate_data {
1305 struct command *cmds;
1306 struct shallow_info *si;
1307};
1308
6ccac9ee 1309static int iterate_receive_command_list(void *cb_data, struct object_id *oid)
52fed6e1 1310{
0a1bc12b
NTND
1311 struct iterate_data *data = cb_data;
1312 struct command **cmd_list = &data->cmds;
52fed6e1
JH
1313 struct command *cmd = *cmd_list;
1314
0a1bc12b
NTND
1315 for (; cmd; cmd = cmd->next) {
1316 if (shallow_update && data->si->shallow_ref[cmd->index])
1317 /* to be checked in update_shallow_ref() */
1318 continue;
9c44ea44 1319 if (!is_null_oid(&cmd->new_oid) && !cmd->skip_update) {
6ccac9ee 1320 oidcpy(oid, &cmd->new_oid);
ee6dfb2d
JH
1321 *cmd_list = cmd->next;
1322 return 0;
1323 }
ee6dfb2d
JH
1324 }
1325 *cmd_list = NULL;
1326 return -1; /* end of list */
52fed6e1
JH
1327}
1328
daebaa78
JH
1329static void reject_updates_to_hidden(struct command *commands)
1330{
78a766ab
LF
1331 struct strbuf refname_full = STRBUF_INIT;
1332 size_t prefix_len;
daebaa78
JH
1333 struct command *cmd;
1334
78a766ab
LF
1335 strbuf_addstr(&refname_full, get_git_namespace());
1336 prefix_len = refname_full.len;
1337
daebaa78 1338 for (cmd = commands; cmd; cmd = cmd->next) {
78a766ab
LF
1339 if (cmd->error_string)
1340 continue;
1341
1342 strbuf_setlen(&refname_full, prefix_len);
1343 strbuf_addstr(&refname_full, cmd->ref_name);
1344
1345 if (!ref_is_hidden(cmd->ref_name, refname_full.buf))
daebaa78 1346 continue;
9c44ea44 1347 if (is_null_oid(&cmd->new_oid))
daebaa78
JH
1348 cmd->error_string = "deny deleting a hidden ref";
1349 else
1350 cmd->error_string = "deny updating a hidden ref";
1351 }
78a766ab
LF
1352
1353 strbuf_release(&refname_full);
daebaa78
JH
1354}
1355
a6a84319
SB
1356static int should_process_cmd(struct command *cmd)
1357{
1358 return !cmd->error_string && !cmd->skip_update;
1359}
1360
1361static void warn_if_skipped_connectivity_check(struct command *commands,
1362 struct shallow_info *si)
1363{
1364 struct command *cmd;
1365 int checked_connectivity = 1;
1366
1367 for (cmd = commands; cmd; cmd = cmd->next) {
1368 if (should_process_cmd(cmd) && si->shallow_ref[cmd->index]) {
1369 error("BUG: connectivity check has not been run on ref %s",
1370 cmd->ref_name);
1371 checked_connectivity = 0;
1372 }
1373 }
1374 if (!checked_connectivity)
033abf97 1375 BUG("connectivity check skipped???");
a6a84319
SB
1376}
1377
a1a26145
SB
1378static void execute_commands_non_atomic(struct command *commands,
1379 struct shallow_info *si)
1380{
1381 struct command *cmd;
222368c6
SB
1382 struct strbuf err = STRBUF_INIT;
1383
a1a26145
SB
1384 for (cmd = commands; cmd; cmd = cmd->next) {
1385 if (!should_process_cmd(cmd))
1386 continue;
1387
222368c6
SB
1388 transaction = ref_transaction_begin(&err);
1389 if (!transaction) {
1390 rp_error("%s", err.buf);
1391 strbuf_reset(&err);
1392 cmd->error_string = "transaction failed to start";
1393 continue;
1394 }
1395
a1a26145 1396 cmd->error_string = update(cmd, si);
222368c6
SB
1397
1398 if (!cmd->error_string
1399 && ref_transaction_commit(transaction, &err)) {
1400 rp_error("%s", err.buf);
1401 strbuf_reset(&err);
1402 cmd->error_string = "failed to update ref";
1403 }
1404 ref_transaction_free(transaction);
a1a26145 1405 }
68deed29
SB
1406 strbuf_release(&err);
1407}
222368c6 1408
68deed29
SB
1409static void execute_commands_atomic(struct command *commands,
1410 struct shallow_info *si)
1411{
1412 struct command *cmd;
1413 struct strbuf err = STRBUF_INIT;
1414 const char *reported_error = "atomic push failure";
1415
1416 transaction = ref_transaction_begin(&err);
1417 if (!transaction) {
1418 rp_error("%s", err.buf);
1419 strbuf_reset(&err);
1420 reported_error = "transaction failed to start";
1421 goto failure;
1422 }
1423
1424 for (cmd = commands; cmd; cmd = cmd->next) {
1425 if (!should_process_cmd(cmd))
1426 continue;
1427
1428 cmd->error_string = update(cmd, si);
1429
1430 if (cmd->error_string)
1431 goto failure;
1432 }
1433
1434 if (ref_transaction_commit(transaction, &err)) {
1435 rp_error("%s", err.buf);
1436 reported_error = "atomic transaction failed";
1437 goto failure;
1438 }
1439 goto cleanup;
1440
1441failure:
1442 for (cmd = commands; cmd; cmd = cmd->next)
1443 if (!cmd->error_string)
1444 cmd->error_string = reported_error;
1445
1446cleanup:
1447 ref_transaction_free(transaction);
222368c6 1448 strbuf_release(&err);
a1a26145
SB
1449}
1450
0a1bc12b
NTND
1451static void execute_commands(struct command *commands,
1452 const char *unpacker_error,
77a9745d
SB
1453 struct shallow_info *si,
1454 const struct string_list *push_options)
575f4974 1455{
d415092a 1456 struct check_connected_options opt = CHECK_CONNECTED_INIT;
5e1c71fd 1457 struct command *cmd;
0a1bc12b 1458 struct iterate_data data;
d415092a
JK
1459 struct async muxer;
1460 int err_fd = 0;
8aaf7d64
SP
1461
1462 if (unpacker_error) {
5e1c71fd 1463 for (cmd = commands; cmd; cmd = cmd->next)
74eb32d3 1464 cmd->error_string = "unpacker error";
8aaf7d64
SP
1465 return;
1466 }
1467
d415092a
JK
1468 if (use_sideband) {
1469 memset(&muxer, 0, sizeof(muxer));
1470 muxer.proc = copy_to_sideband;
1471 muxer.in = -1;
1472 if (!start_async(&muxer))
1473 err_fd = muxer.in;
1474 /* ...else, continue without relaying sideband */
1475 }
1476
0a1bc12b
NTND
1477 data.cmds = commands;
1478 data.si = si;
d415092a 1479 opt.err_fd = err_fd;
6b4cd2f8 1480 opt.progress = err_fd && !quiet;
722ff7f8 1481 opt.env = tmp_objdir_env(tmp_objdir);
d415092a 1482 if (check_connected(iterate_receive_command_list, &data, &opt))
0a1bc12b 1483 set_connectivity_errors(commands, si);
52fed6e1 1484
d415092a
JK
1485 if (use_sideband)
1486 finish_async(&muxer);
1487
daebaa78
JH
1488 reject_updates_to_hidden(commands);
1489
77a9745d 1490 if (run_receive_hook(commands, "pre-receive", 0, push_options)) {
ef7e93d9
CB
1491 for (cmd = commands; cmd; cmd = cmd->next) {
1492 if (!cmd->error_string)
1493 cmd->error_string = "pre-receive hook declined";
1494 }
05ef58ec
SP
1495 return;
1496 }
1497
722ff7f8
JK
1498 /*
1499 * Now we'll start writing out refs, which means the objects need
1500 * to be in their final positions so that other processes can see them.
1501 */
1502 if (tmp_objdir_migrate(tmp_objdir) < 0) {
1503 for (cmd = commands; cmd; cmd = cmd->next) {
1504 if (!cmd->error_string)
1505 cmd->error_string = "unable to migrate objects to permanent storage";
1506 }
1507 return;
1508 }
1509 tmp_objdir = NULL;
1510
da3efdb1
JS
1511 check_aliased_updates(commands);
1512
96ec7b1e 1513 free(head_name_to_free);
efbd4fdf 1514 head_name = head_name_to_free = resolve_refdup("HEAD", 0, NULL, NULL);
747ca245 1515
68deed29
SB
1516 if (use_atomic)
1517 execute_commands_atomic(commands, si);
1518 else
1519 execute_commands_non_atomic(commands, si);
0a1bc12b 1520
a6a84319
SB
1521 if (shallow_update)
1522 warn_if_skipped_connectivity_check(commands, si);
575f4974
LT
1523}
1524
39895c74
JH
1525static struct command **queue_command(struct command **tail,
1526 const char *line,
1527 int linelen)
1528{
9c44ea44 1529 struct object_id old_oid, new_oid;
39895c74
JH
1530 struct command *cmd;
1531 const char *refname;
1532 int reflen;
9c44ea44 1533 const char *p;
39895c74 1534
9c44ea44 1535 if (parse_oid_hex(line, &old_oid, &p) ||
1536 *p++ != ' ' ||
1537 parse_oid_hex(p, &new_oid, &p) ||
1538 *p++ != ' ')
39895c74
JH
1539 die("protocol error: expected old/new/ref, got '%s'", line);
1540
9c44ea44 1541 refname = p;
1542 reflen = linelen - (p - line);
ddd0bfac 1543 FLEX_ALLOC_MEM(cmd, ref_name, refname, reflen);
9c44ea44 1544 oidcpy(&cmd->old_oid, &old_oid);
1545 oidcpy(&cmd->new_oid, &new_oid);
39895c74
JH
1546 *tail = cmd;
1547 return &cmd->next;
1548}
1549
4adf569d
JH
1550static void queue_commands_from_cert(struct command **tail,
1551 struct strbuf *push_cert)
1552{
1553 const char *boc, *eoc;
1554
1555 if (*tail)
1556 die("protocol error: got both push certificate and unsigned commands");
1557
1558 boc = strstr(push_cert->buf, "\n\n");
1559 if (!boc)
1560 die("malformed push certificate %.*s", 100, push_cert->buf);
1561 else
1562 boc += 2;
1563 eoc = push_cert->buf + parse_signature(push_cert->buf, push_cert->len);
1564
1565 while (boc < eoc) {
1566 const char *eol = memchr(boc, '\n', eoc - boc);
f2214ded 1567 tail = queue_command(tail, boc, eol ? eol - boc : eoc - boc);
4adf569d
JH
1568 boc = eol ? eol + 1 : eoc;
1569 }
1570}
1571
910650d2 1572static struct command *read_head_info(struct oid_array *shallow)
575f4974 1573{
5e1c71fd 1574 struct command *commands = NULL;
eb1af2df 1575 struct command **p = &commands;
575f4974 1576 for (;;) {
74543a04 1577 char *line;
39895c74 1578 int len, linelen;
eb1af2df 1579
74543a04
JK
1580 line = packet_read_line(0, &len);
1581 if (!line)
575f4974 1582 break;
5dbd7676 1583
9c44ea44 1584 if (len > 8 && starts_with(line, "shallow ")) {
1585 struct object_id oid;
1586 if (get_oid_hex(line + 8, &oid))
c09b71cc
JH
1587 die("protocol error: expected shallow sha, got '%s'",
1588 line + 8);
910650d2 1589 oid_array_append(shallow, &oid);
5dbd7676
NTND
1590 continue;
1591 }
1592
0e3c339b
JH
1593 linelen = strlen(line);
1594 if (linelen < len) {
1595 const char *feature_list = line + linelen + 1;
f47182c8 1596 if (parse_feature_request(feature_list, "report-status"))
cfee10a7 1597 report_status = 1;
f47182c8 1598 if (parse_feature_request(feature_list, "side-band-64k"))
38a81b4e 1599 use_sideband = LARGE_PACKET_MAX;
c207e34f
CB
1600 if (parse_feature_request(feature_list, "quiet"))
1601 quiet = 1;
1b70fe5d
RS
1602 if (advertise_atomic_push
1603 && parse_feature_request(feature_list, "atomic"))
1604 use_atomic = 1;
c714e45f
SB
1605 if (advertise_push_options
1606 && parse_feature_request(feature_list, "push-options"))
1607 use_push_options = 1;
cfee10a7 1608 }
0e3c339b 1609
a85b377d
JH
1610 if (!strcmp(line, "push-cert")) {
1611 int true_flush = 0;
1612 char certbuf[1024];
1613
1614 for (;;) {
1615 len = packet_read(0, NULL, NULL,
1616 certbuf, sizeof(certbuf), 0);
1617 if (!len) {
1618 true_flush = 1;
1619 break;
1620 }
1621 if (!strcmp(certbuf, "push-cert-end\n"))
1622 break; /* end of cert */
1623 strbuf_addstr(&push_cert, certbuf);
1624 }
1625
1626 if (true_flush)
1627 break;
1628 continue;
1629 }
1630
39895c74 1631 p = queue_command(p, line, linelen);
575f4974 1632 }
4adf569d
JH
1633
1634 if (push_cert.len)
1635 queue_commands_from_cert(p, &push_cert);
1636
5e1c71fd 1637 return commands;
575f4974
LT
1638}
1639
c714e45f
SB
1640static void read_push_options(struct string_list *options)
1641{
1642 while (1) {
1643 char *line;
1644 int len;
1645
1646 line = packet_read_line(0, &len);
1647
1648 if (!line)
1649 break;
1650
1651 string_list_append(options, line);
1652 }
1653}
1654
fc04c412
SP
1655static const char *parse_pack_header(struct pack_header *hdr)
1656{
a69e5429
JH
1657 switch (read_pack_header(0, hdr)) {
1658 case PH_ERROR_EOF:
1659 return "eof before pack header was fully read";
1660
1661 case PH_ERROR_PACK_SIGNATURE:
fc04c412 1662 return "protocol error (pack signature mismatch detected)";
a69e5429
JH
1663
1664 case PH_ERROR_PROTOCOL:
fc04c412 1665 return "protocol error (pack version unsupported)";
a69e5429
JH
1666
1667 default:
1668 return "unknown error in parse_pack_header";
1669
1670 case 0:
1671 return NULL;
1672 }
fc04c412
SP
1673}
1674
576162a4
NP
1675static const char *pack_lockfile;
1676
446d5d91
JK
1677static void push_header_arg(struct argv_array *args, struct pack_header *hdr)
1678{
1679 argv_array_pushf(args, "--pack_header=%"PRIu32",%"PRIu32,
1680 ntohl(hdr->hdr_version), ntohl(hdr->hdr_entries));
1681}
1682
5dbd7676 1683static const char *unpack(int err_fd, struct shallow_info *si)
575f4974 1684{
fc04c412
SP
1685 struct pack_header hdr;
1686 const char *hdr_err;
31c42bff 1687 int status;
d3180279 1688 struct child_process child = CHILD_PROCESS_INIT;
dab76d3a
JH
1689 int fsck_objects = (receive_fsck_objects >= 0
1690 ? receive_fsck_objects
1691 : transfer_fsck_objects >= 0
1692 ? transfer_fsck_objects
1693 : 0);
fc04c412
SP
1694
1695 hdr_err = parse_pack_header(&hdr);
49ecfa13
JK
1696 if (hdr_err) {
1697 if (err_fd > 0)
1698 close(err_fd);
fc04c412 1699 return hdr_err;
49ecfa13 1700 }
fc04c412 1701
5dbd7676
NTND
1702 if (si->nr_ours || si->nr_theirs) {
1703 alt_shallow_file = setup_temporary_shallow(si->shallow);
64a7e92f
RS
1704 argv_array_push(&child.args, "--shallow-file");
1705 argv_array_push(&child.args, alt_shallow_file);
5dbd7676
NTND
1706 }
1707
722ff7f8 1708 tmp_objdir = tmp_objdir_create();
6cdad1f1
JK
1709 if (!tmp_objdir) {
1710 if (err_fd > 0)
1711 close(err_fd);
722ff7f8 1712 return "unable to create temporary object directory";
6cdad1f1 1713 }
722ff7f8
JK
1714 child.env = tmp_objdir_env(tmp_objdir);
1715
1716 /*
1717 * Normally we just pass the tmp_objdir environment to the child
1718 * processes that do the heavy lifting, but we may need to see these
1719 * objects ourselves to set up shallow information.
1720 */
1721 tmp_objdir_add_as_alternate(tmp_objdir);
1722
fc04c412 1723 if (ntohl(hdr.hdr_entries) < unpack_limit) {
446d5d91
JK
1724 argv_array_push(&child.args, "unpack-objects");
1725 push_header_arg(&child.args, &hdr);
c207e34f 1726 if (quiet)
64a7e92f 1727 argv_array_push(&child.args, "-q");
dab76d3a 1728 if (fsck_objects)
5d477a33
JS
1729 argv_array_pushf(&child.args, "--strict%s",
1730 fsck_msg_types.buf);
c08db5a2
JK
1731 if (max_input_size)
1732 argv_array_pushf(&child.args, "--max-input-size=%"PRIuMAX,
1733 (uintmax_t)max_input_size);
59bfdfb8 1734 child.no_stdout = 1;
a22e6f85 1735 child.err = err_fd;
59bfdfb8 1736 child.git_cmd = 1;
31c42bff
NTND
1737 status = run_command(&child);
1738 if (status)
1739 return "unpack-objects abnormal exit";
576162a4 1740 } else {
da25bdb7 1741 char hostname[HOST_NAME_MAX + 1];
576162a4 1742
446d5d91
JK
1743 argv_array_pushl(&child.args, "index-pack", "--stdin", NULL);
1744 push_header_arg(&child.args, &hdr);
b26cb7c7 1745
5781a9a2 1746 if (xgethostname(hostname, sizeof(hostname)))
b26cb7c7
JK
1747 xsnprintf(hostname, sizeof(hostname), "localhost");
1748 argv_array_pushf(&child.args,
1749 "--keep=receive-pack %"PRIuMAX" on %s",
1750 (uintmax_t)getpid(),
1751 hostname);
1752
d06303bb
JK
1753 if (!quiet && err_fd)
1754 argv_array_push(&child.args, "--show-resolving-progress");
83558686
JK
1755 if (use_sideband)
1756 argv_array_push(&child.args, "--report-end-of-input");
dab76d3a 1757 if (fsck_objects)
5d477a33
JS
1758 argv_array_pushf(&child.args, "--strict%s",
1759 fsck_msg_types.buf);
1b68387e 1760 if (!reject_thin)
64a7e92f 1761 argv_array_push(&child.args, "--fix-thin");
c08db5a2
JK
1762 if (max_input_size)
1763 argv_array_pushf(&child.args, "--max-input-size=%"PRIuMAX,
1764 (uintmax_t)max_input_size);
31c42bff
NTND
1765 child.out = -1;
1766 child.err = err_fd;
1767 child.git_cmd = 1;
1768 status = start_command(&child);
1769 if (status)
576162a4 1770 return "index-pack fork failed";
31c42bff
NTND
1771 pack_lockfile = index_pack_lockfile(child.out);
1772 close(child.out);
1773 status = finish_command(&child);
1774 if (status)
1775 return "index-pack abnormal exit";
a49d2834 1776 reprepare_packed_git(the_repository);
cfee10a7 1777 }
31c42bff 1778 return NULL;
cfee10a7
JH
1779}
1780
5dbd7676 1781static const char *unpack_with_sideband(struct shallow_info *si)
a22e6f85
JK
1782{
1783 struct async muxer;
1784 const char *ret;
1785
1786 if (!use_sideband)
5dbd7676 1787 return unpack(0, si);
a22e6f85 1788
83558686 1789 use_keepalive = KEEPALIVE_AFTER_NUL;
a22e6f85
JK
1790 memset(&muxer, 0, sizeof(muxer));
1791 muxer.proc = copy_to_sideband;
1792 muxer.in = -1;
1793 if (start_async(&muxer))
1794 return NULL;
1795
5dbd7676 1796 ret = unpack(muxer.in, si);
a22e6f85
JK
1797
1798 finish_async(&muxer);
1799 return ret;
1800}
1801
0a1bc12b
NTND
1802static void prepare_shallow_update(struct command *commands,
1803 struct shallow_info *si)
1804{
42c78a21 1805 int i, j, k, bitmap_size = DIV_ROUND_UP(si->ref->nr, 32);
0a1bc12b 1806
b32fa95f 1807 ALLOC_ARRAY(si->used_shallow, si->shallow->nr);
0a1bc12b
NTND
1808 assign_shallow_commits_to_refs(si, si->used_shallow, NULL);
1809
1810 si->need_reachability_test =
1811 xcalloc(si->shallow->nr, sizeof(*si->need_reachability_test));
1812 si->reachable =
1813 xcalloc(si->shallow->nr, sizeof(*si->reachable));
1814 si->shallow_ref = xcalloc(si->ref->nr, sizeof(*si->shallow_ref));
1815
1816 for (i = 0; i < si->nr_ours; i++)
1817 si->need_reachability_test[si->ours[i]] = 1;
1818
1819 for (i = 0; i < si->shallow->nr; i++) {
1820 if (!si->used_shallow[i])
1821 continue;
1822 for (j = 0; j < bitmap_size; j++) {
1823 if (!si->used_shallow[i][j])
1824 continue;
1825 si->need_reachability_test[i]++;
1826 for (k = 0; k < 32; k++)
9a93c668 1827 if (si->used_shallow[i][j] & (1U << k))
0a1bc12b
NTND
1828 si->shallow_ref[j * 32 + k]++;
1829 }
1830
1831 /*
1832 * true for those associated with some refs and belong
1833 * in "ours" list aka "step 7 not done yet"
1834 */
1835 si->need_reachability_test[i] =
1836 si->need_reachability_test[i] > 1;
1837 }
1838
1839 /*
1840 * keep hooks happy by forcing a temporary shallow file via
1841 * env variable because we can't add --shallow-file to every
7987d223 1842 * command. check_connected() will be done with
0a1bc12b
NTND
1843 * true .git/shallow though.
1844 */
1845 setenv(GIT_SHALLOW_FILE_ENVIRONMENT, alt_shallow_file, 1);
1846}
1847
5dbd7676
NTND
1848static void update_shallow_info(struct command *commands,
1849 struct shallow_info *si,
910650d2 1850 struct oid_array *ref)
5dbd7676
NTND
1851{
1852 struct command *cmd;
1853 int *ref_status;
1854 remove_nonexistent_theirs_shallow(si);
0a1bc12b
NTND
1855 if (!si->nr_ours && !si->nr_theirs) {
1856 shallow_update = 0;
5dbd7676 1857 return;
0a1bc12b 1858 }
5dbd7676
NTND
1859
1860 for (cmd = commands; cmd; cmd = cmd->next) {
9c44ea44 1861 if (is_null_oid(&cmd->new_oid))
5dbd7676 1862 continue;
910650d2 1863 oid_array_append(ref, &cmd->new_oid);
5dbd7676
NTND
1864 cmd->index = ref->nr - 1;
1865 }
1866 si->ref = ref;
1867
0a1bc12b
NTND
1868 if (shallow_update) {
1869 prepare_shallow_update(commands, si);
1870 return;
1871 }
1872
b32fa95f 1873 ALLOC_ARRAY(ref_status, ref->nr);
5dbd7676
NTND
1874 assign_shallow_commits_to_refs(si, NULL, ref_status);
1875 for (cmd = commands; cmd; cmd = cmd->next) {
9c44ea44 1876 if (is_null_oid(&cmd->new_oid))
5dbd7676
NTND
1877 continue;
1878 if (ref_status[cmd->index]) {
1879 cmd->error_string = "shallow update not allowed";
1880 cmd->skip_update = 1;
1881 }
1882 }
5dbd7676
NTND
1883 free(ref_status);
1884}
1885
5e1c71fd 1886static void report(struct command *commands, const char *unpack_status)
cfee10a7
JH
1887{
1888 struct command *cmd;
38a81b4e
SP
1889 struct strbuf buf = STRBUF_INIT;
1890
1891 packet_buf_write(&buf, "unpack %s\n",
1892 unpack_status ? unpack_status : "ok");
cfee10a7
JH
1893 for (cmd = commands; cmd; cmd = cmd->next) {
1894 if (!cmd->error_string)
38a81b4e
SP
1895 packet_buf_write(&buf, "ok %s\n",
1896 cmd->ref_name);
cfee10a7 1897 else
38a81b4e
SP
1898 packet_buf_write(&buf, "ng %s %s\n",
1899 cmd->ref_name, cmd->error_string);
575f4974 1900 }
38a81b4e
SP
1901 packet_buf_flush(&buf);
1902
1903 if (use_sideband)
1904 send_sideband(1, 1, buf.buf, buf.len, use_sideband);
1905 else
cdf4fb8e 1906 write_or_die(1, buf.buf, buf.len);
38a81b4e 1907 strbuf_release(&buf);
575f4974
LT
1908}
1909
5e1c71fd 1910static int delete_only(struct command *commands)
d4f694ba 1911{
5e1c71fd
JS
1912 struct command *cmd;
1913 for (cmd = commands; cmd; cmd = cmd->next) {
9c44ea44 1914 if (!is_null_oid(&cmd->new_oid))
d4f694ba 1915 return 0;
d4f694ba
JH
1916 }
1917 return 1;
1918}
1919
be5908ae 1920int cmd_receive_pack(int argc, const char **argv, const char *prefix)
575f4974 1921{
42526b47 1922 int advertise_refs = 0;
5e1c71fd 1923 struct command *commands;
910650d2 1924 struct oid_array shallow = OID_ARRAY_INIT;
1925 struct oid_array ref = OID_ARRAY_INIT;
5dbd7676 1926 struct shallow_info si;
575f4974 1927
1b68387e
SS
1928 struct option options[] = {
1929 OPT__QUIET(&quiet, N_("quiet")),
1930 OPT_HIDDEN_BOOL(0, "stateless-rpc", &stateless_rpc, NULL),
1931 OPT_HIDDEN_BOOL(0, "advertise-refs", &advertise_refs, NULL),
1932 OPT_HIDDEN_BOOL(0, "reject-thin-pack-for-testing", &reject_thin, NULL),
1933 OPT_END()
1934 };
bbc30f99 1935
1b68387e 1936 packet_trace_identity("receive-pack");
575f4974 1937
1b68387e 1938 argc = parse_options(argc, argv, prefix, options, receive_pack_usage, 0);
c207e34f 1939
1b68387e
SS
1940 if (argc > 1)
1941 usage_msg_opt(_("Too many arguments."), receive_pack_usage, options);
1942 if (argc == 0)
1943 usage_msg_opt(_("You must specify a directory."), receive_pack_usage, options);
42526b47 1944
1b68387e 1945 service_dir = argv[0];
575f4974 1946
e1464ca7 1947 setup_path();
5c09f321 1948
5732373d
JH
1949 if (!enter_repo(service_dir, 0))
1950 die("'%s' does not appear to be a git repository", service_dir);
575f4974 1951
ef90d6d4 1952 git_config(receive_pack_config, NULL);
b89363e4 1953 if (cert_nonce_seed)
5732373d 1954 push_cert_nonce = prepare_push_cert_nonce(service_dir, time(NULL));
6fb75bed 1955
e28714c5
JH
1956 if (0 <= transfer_unpack_limit)
1957 unpack_limit = transfer_unpack_limit;
1958 else if (0 <= receive_unpack_limit)
1959 unpack_limit = receive_unpack_limit;
1960
aa9bab29 1961 switch (determine_protocol_version_server()) {
8f6982b4
BW
1962 case protocol_v2:
1963 /*
1964 * push support for protocol v2 has not been implemented yet,
1965 * so ignore the request to use v2 and fallback to using v0.
1966 */
1967 break;
aa9bab29
BW
1968 case protocol_v1:
1969 /*
1970 * v1 is just the original protocol with a version string,
1971 * so just fall through after writing the version string.
1972 */
1973 if (advertise_refs || !stateless_rpc)
1974 packet_write_fmt(1, "version 1\n");
1975
1976 /* fallthrough */
1977 case protocol_v0:
1978 break;
1979 case protocol_unknown_version:
1980 BUG("unknown protocol version");
1981 }
1982
42526b47 1983 if (advertise_refs || !stateless_rpc) {
42526b47 1984 write_head_info();
42526b47
SP
1985 }
1986 if (advertise_refs)
1987 return 0;
575f4974 1988
5dbd7676 1989 if ((commands = read_head_info(&shallow)) != NULL) {
d4f694ba 1990 const char *unpack_status = NULL;
77a9745d 1991 struct string_list push_options = STRING_LIST_INIT_DUP;
d4f694ba 1992
c714e45f
SB
1993 if (use_push_options)
1994 read_push_options(&push_options);
cbaf82cc
JT
1995 if (!check_cert_push_options(&push_options)) {
1996 struct command *cmd;
1997 for (cmd = commands; cmd; cmd = cmd->next)
1998 cmd->error_string = "inconsistent push options";
1999 }
c714e45f 2000
5dbd7676 2001 prepare_shallow_info(&si, &shallow);
0a1bc12b
NTND
2002 if (!si.nr_ours && !si.nr_theirs)
2003 shallow_update = 0;
5dbd7676
NTND
2004 if (!delete_only(commands)) {
2005 unpack_status = unpack_with_sideband(&si);
2006 update_shallow_info(commands, &si, &ref);
2007 }
83558686 2008 use_keepalive = KEEPALIVE_ALWAYS;
77a9745d
SB
2009 execute_commands(commands, unpack_status, &si,
2010 &push_options);
576162a4 2011 if (pack_lockfile)
691f1a28 2012 unlink_or_warn(pack_lockfile);
cfee10a7 2013 if (report_status)
5e1c71fd 2014 report(commands, unpack_status);
77a9745d
SB
2015 run_receive_hook(commands, "post-receive", 1,
2016 &push_options);
8e663d9e 2017 run_update_post_hook(commands);
4432dd6b 2018 string_list_clear(&push_options, 0);
77e3efbf
JH
2019 if (auto_gc) {
2020 const char *argv_gc_auto[] = {
2021 "gc", "--auto", "--quiet", NULL,
2022 };
860a2ebe
LF
2023 struct child_process proc = CHILD_PROCESS_INIT;
2024
2025 proc.no_stdin = 1;
2026 proc.stdout_to_stderr = 1;
2027 proc.err = use_sideband ? -1 : 0;
2028 proc.git_cmd = 1;
2029 proc.argv = argv_gc_auto;
2030
d0b59866 2031 close_all_packs(the_repository->objects);
860a2ebe
LF
2032 if (!start_command(&proc)) {
2033 if (use_sideband)
2034 copy_to_sideband(proc.err, -1, NULL);
2035 finish_command(&proc);
2036 }
77e3efbf
JH
2037 }
2038 if (auto_update_server_info)
2039 update_server_info(0);
5dbd7676 2040 clear_shallow_info(&si);
7f8e9828 2041 }
38a81b4e
SP
2042 if (use_sideband)
2043 packet_flush(1);
910650d2 2044 oid_array_clear(&shallow);
2045 oid_array_clear(&ref);
b89363e4 2046 free((void *)push_cert_nonce);
575f4974
LT
2047 return 0;
2048}