]> git.ipfire.org Git - thirdparty/git.git/blame - builtin/receive-pack.c
run-command: use BUG() to report bugs, not die()
[thirdparty/git.git] / builtin / receive-pack.c
CommitLineData
1e4cd68c 1#include "builtin.h"
a49d2834 2#include "repository.h"
b2141fc1 3#include "config.h"
697cc8ef 4#include "lockfile.h"
fc04c412 5#include "pack.h"
8a65ff76 6#include "refs.h"
f3a3214e 7#include "pkt-line.h"
38a81b4e 8#include "sideband.h"
b1bf95bb 9#include "run-command.h"
d807c4a0 10#include "exec-cmd.h"
11031d7e
JS
11#include "commit.h"
12#include "object.h"
d79796bc 13#include "remote.h"
47a59185 14#include "connect.h"
d79796bc 15#include "transport.h"
da3efdb1 16#include "string-list.h"
cff38a5e 17#include "sha1-array.h"
52fed6e1 18#include "connected.h"
31c42bff 19#include "argv-array.h"
ff5effdf 20#include "version.h"
d05b9618
JH
21#include "tag.h"
22#include "gpg-interface.h"
ec7dbd14 23#include "sigchain.h"
5d477a33 24#include "fsck.h"
722ff7f8 25#include "tmp-objdir.h"
ab6eea6f 26#include "oidset.h"
3836d88a 27#include "packfile.h"
aa9bab29 28#include "protocol.h"
575f4974 29
1b68387e
SS
30static const char * const receive_pack_usage[] = {
31 N_("git receive-pack <git-dir>"),
32 NULL
33};
575f4974 34
986e8239 35enum deny_action {
3d95d92b 36 DENY_UNCONFIGURED,
986e8239
JK
37 DENY_IGNORE,
38 DENY_WARN,
1404bcbb
JS
39 DENY_REFUSE,
40 DENY_UPDATE_INSTEAD
986e8239
JK
41};
42
1b53a076
JH
43static int deny_deletes;
44static int deny_non_fast_forwards;
3d95d92b 45static enum deny_action deny_current_branch = DENY_UNCONFIGURED;
747ca245 46static enum deny_action deny_delete_current = DENY_UNCONFIGURED;
dab76d3a
JH
47static int receive_fsck_objects = -1;
48static int transfer_fsck_objects = -1;
5d477a33 49static struct strbuf fsck_msg_types = STRBUF_INIT;
e28714c5
JH
50static int receive_unpack_limit = -1;
51static int transfer_unpack_limit = -1;
1b70fe5d 52static int advertise_atomic_push = 1;
c714e45f 53static int advertise_push_options;
46732fae 54static int unpack_limit = 100;
c08db5a2 55static off_t max_input_size;
96f1e58f 56static int report_status;
38a81b4e 57static int use_sideband;
68deed29 58static int use_atomic;
c714e45f 59static int use_push_options;
c207e34f 60static int quiet;
b74fce16 61static int prefer_ofs_delta = 1;
77e3efbf
JH
62static int auto_update_server_info;
63static int auto_gc = 1;
1b68387e 64static int reject_thin;
5732373d
JH
65static int stateless_rpc;
66static const char *service_dir;
747ca245 67static const char *head_name;
96ec7b1e 68static void *head_name_to_free;
185c04e0 69static int sent_capabilities;
0a1bc12b 70static int shallow_update;
5dbd7676 71static const char *alt_shallow_file;
a85b377d 72static struct strbuf push_cert = STRBUF_INIT;
a09c985e 73static struct object_id push_cert_oid;
d05b9618 74static struct signature_check sigcheck;
b89363e4
JH
75static const char *push_cert_nonce;
76static const char *cert_nonce_seed;
77
78static const char *NONCE_UNSOLICITED = "UNSOLICITED";
79static const char *NONCE_BAD = "BAD";
80static const char *NONCE_MISSING = "MISSING";
81static const char *NONCE_OK = "OK";
5732373d 82static const char *NONCE_SLOP = "SLOP";
b89363e4 83static const char *nonce_status;
5732373d 84static long nonce_stamp_slop;
dddbad72 85static timestamp_t nonce_stamp_slop_limit;
222368c6 86static struct ref_transaction *transaction;
cfee10a7 87
83558686
JK
88static enum {
89 KEEPALIVE_NEVER = 0,
90 KEEPALIVE_AFTER_NUL,
91 KEEPALIVE_ALWAYS
92} use_keepalive;
93static int keepalive_in_sec = 5;
94
722ff7f8
JK
95static struct tmp_objdir *tmp_objdir;
96
986e8239
JK
97static enum deny_action parse_deny_action(const char *var, const char *value)
98{
99 if (value) {
100 if (!strcasecmp(value, "ignore"))
101 return DENY_IGNORE;
102 if (!strcasecmp(value, "warn"))
103 return DENY_WARN;
104 if (!strcasecmp(value, "refuse"))
105 return DENY_REFUSE;
1404bcbb
JS
106 if (!strcasecmp(value, "updateinstead"))
107 return DENY_UPDATE_INSTEAD;
986e8239
JK
108 }
109 if (git_config_bool(var, value))
110 return DENY_REFUSE;
111 return DENY_IGNORE;
112}
113
ef90d6d4 114static int receive_pack_config(const char *var, const char *value, void *cb)
6fb75bed 115{
daebaa78
JH
116 int status = parse_hide_refs_config(var, value, "receive");
117
118 if (status)
119 return status;
120
a240de11
JK
121 if (strcmp(var, "receive.denydeletes") == 0) {
122 deny_deletes = git_config_bool(var, value);
123 return 0;
124 }
125
e28714c5 126 if (strcmp(var, "receive.denynonfastforwards") == 0) {
6fb75bed
SP
127 deny_non_fast_forwards = git_config_bool(var, value);
128 return 0;
129 }
130
e28714c5
JH
131 if (strcmp(var, "receive.unpacklimit") == 0) {
132 receive_unpack_limit = git_config_int(var, value);
fc04c412
SP
133 return 0;
134 }
135
e28714c5
JH
136 if (strcmp(var, "transfer.unpacklimit") == 0) {
137 transfer_unpack_limit = git_config_int(var, value);
138 return 0;
139 }
140
cd94c6f9
JS
141 if (strcmp(var, "receive.fsck.skiplist") == 0) {
142 const char *path;
143
144 if (git_config_pathname(&path, var, value))
145 return 1;
146 strbuf_addf(&fsck_msg_types, "%cskiplist=%s",
147 fsck_msg_types.len ? ',' : '=', path);
148 free((char *)path);
149 return 0;
150 }
151
5d477a33
JS
152 if (skip_prefix(var, "receive.fsck.", &var)) {
153 if (is_valid_msg_type(var, value))
154 strbuf_addf(&fsck_msg_types, "%c%s=%s",
155 fsck_msg_types.len ? ',' : '=', var, value);
156 else
157 warning("Skipping unknown msg id '%s'", var);
158 return 0;
159 }
160
20dc0016
MK
161 if (strcmp(var, "receive.fsckobjects") == 0) {
162 receive_fsck_objects = git_config_bool(var, value);
163 return 0;
164 }
165
dab76d3a
JH
166 if (strcmp(var, "transfer.fsckobjects") == 0) {
167 transfer_fsck_objects = git_config_bool(var, value);
168 return 0;
169 }
170
986e8239
JK
171 if (!strcmp(var, "receive.denycurrentbranch")) {
172 deny_current_branch = parse_deny_action(var, value);
173 return 0;
174 }
175
747ca245
JH
176 if (strcmp(var, "receive.denydeletecurrent") == 0) {
177 deny_delete_current = parse_deny_action(var, value);
178 return 0;
179 }
180
b74fce16
NP
181 if (strcmp(var, "repack.usedeltabaseoffset") == 0) {
182 prefer_ofs_delta = git_config_bool(var, value);
183 return 0;
184 }
185
77e3efbf
JH
186 if (strcmp(var, "receive.updateserverinfo") == 0) {
187 auto_update_server_info = git_config_bool(var, value);
188 return 0;
189 }
190
191 if (strcmp(var, "receive.autogc") == 0) {
192 auto_gc = git_config_bool(var, value);
193 return 0;
194 }
195
0a1bc12b
NTND
196 if (strcmp(var, "receive.shallowupdate") == 0) {
197 shallow_update = git_config_bool(var, value);
198 return 0;
199 }
200
b89363e4
JH
201 if (strcmp(var, "receive.certnonceseed") == 0)
202 return git_config_string(&cert_nonce_seed, var, value);
a85b377d 203
5732373d
JH
204 if (strcmp(var, "receive.certnonceslop") == 0) {
205 nonce_stamp_slop_limit = git_config_ulong(var, value);
206 return 0;
207 }
208
1b70fe5d
RS
209 if (strcmp(var, "receive.advertiseatomic") == 0) {
210 advertise_atomic_push = git_config_bool(var, value);
211 return 0;
212 }
213
c714e45f
SB
214 if (strcmp(var, "receive.advertisepushoptions") == 0) {
215 advertise_push_options = git_config_bool(var, value);
216 return 0;
217 }
218
83558686
JK
219 if (strcmp(var, "receive.keepalive") == 0) {
220 keepalive_in_sec = git_config_int(var, value);
221 return 0;
222 }
223
c08db5a2
JK
224 if (strcmp(var, "receive.maxinputsize") == 0) {
225 max_input_size = git_config_int64(var, value);
226 return 0;
227 }
228
ef90d6d4 229 return git_default_config(var, value, cb);
6fb75bed
SP
230}
231
1b7ba794 232static void show_ref(const char *path, const struct object_id *oid)
575f4974 233{
52d2ae58 234 if (sent_capabilities) {
1b7ba794 235 packet_write_fmt(1, "%s %s\n", oid_to_hex(oid), path);
52d2ae58
JH
236 } else {
237 struct strbuf cap = STRBUF_INIT;
238
239 strbuf_addstr(&cap,
240 "report-status delete-refs side-band-64k quiet");
1b70fe5d
RS
241 if (advertise_atomic_push)
242 strbuf_addstr(&cap, " atomic");
52d2ae58
JH
243 if (prefer_ofs_delta)
244 strbuf_addstr(&cap, " ofs-delta");
b89363e4
JH
245 if (push_cert_nonce)
246 strbuf_addf(&cap, " push-cert=%s", push_cert_nonce);
c714e45f
SB
247 if (advertise_push_options)
248 strbuf_addstr(&cap, " push-options");
52d2ae58 249 strbuf_addf(&cap, " agent=%s", git_user_agent_sanitized());
81c634e9 250 packet_write_fmt(1, "%s %s%c%s\n",
1b7ba794 251 oid_to_hex(oid), path, 0, cap.buf);
52d2ae58
JH
252 strbuf_release(&cap);
253 sent_capabilities = 1;
254 }
575f4974
LT
255}
256
78a766ab 257static int show_ref_cb(const char *path_full, const struct object_id *oid,
8b24b9e7 258 int flag, void *data)
6b01ecfe 259{
8b24b9e7 260 struct oidset *seen = data;
78a766ab
LF
261 const char *path = strip_namespace(path_full);
262
263 if (ref_is_hidden(path, path_full))
264 return 0;
265
6b01ecfe
JT
266 /*
267 * Advertise refs outside our current namespace as ".have"
268 * refs, so that the client can use them to minimize data
fea6c47f 269 * transfer but will otherwise ignore them.
6b01ecfe 270 */
8b24b9e7
JK
271 if (!path) {
272 if (oidset_insert(seen, oid))
273 return 0;
6b01ecfe 274 path = ".have";
63d428e6
JK
275 } else {
276 oidset_insert(seen, oid);
8b24b9e7 277 }
1b7ba794 278 show_ref(path, oid);
bc98201d 279 return 0;
6b01ecfe
JT
280}
281
ab6eea6f
JK
282static void show_one_alternate_ref(const char *refname,
283 const struct object_id *oid,
284 void *data)
b7a025d9 285{
ab6eea6f 286 struct oidset *seen = data;
b7a025d9 287
ab6eea6f
JK
288 if (oidset_insert(seen, oid))
289 return;
290
1b7ba794 291 show_ref(".have", oid);
6b01ecfe
JT
292}
293
8a65ff76 294static void write_head_info(void)
575f4974 295{
ab6eea6f 296 static struct oidset seen = OIDSET_INIT;
2b2a5be3 297
63d428e6 298 for_each_ref(show_ref_cb, &seen);
ab6eea6f
JK
299 for_each_alternate_ref(show_one_alternate_ref, &seen);
300 oidset_clear(&seen);
185c04e0 301 if (!sent_capabilities)
1b7ba794 302 show_ref("capabilities^{}", &null_oid);
cfee10a7 303
ad491366
NTND
304 advertise_shallow_grafts(1);
305
b7a025d9
MH
306 /* EOF */
307 packet_flush(1);
575f4974
LT
308}
309
eb1af2df
LT
310struct command {
311 struct command *next;
cfee10a7 312 const char *error_string;
160b81ed
PYH
313 unsigned int skip_update:1,
314 did_not_exist:1;
5dbd7676 315 int index;
9c44ea44 316 struct object_id old_oid;
317 struct object_id new_oid;
8f1d2e6f 318 char ref_name[FLEX_ARRAY]; /* more */
575f4974
LT
319};
320
466dbc42
SP
321static void rp_error(const char *err, ...) __attribute__((format (printf, 1, 2)));
322static void rp_warning(const char *err, ...) __attribute__((format (printf, 1, 2)));
323
324static void report_message(const char *prefix, const char *err, va_list params)
325{
b7115a35 326 int sz;
466dbc42
SP
327 char msg[4096];
328
b7115a35 329 sz = xsnprintf(msg, sizeof(msg), "%s", prefix);
466dbc42
SP
330 sz += vsnprintf(msg + sz, sizeof(msg) - sz, err, params);
331 if (sz > (sizeof(msg) - 1))
332 sz = sizeof(msg) - 1;
333 msg[sz++] = '\n';
334
335 if (use_sideband)
336 send_sideband(1, 2, msg, sz, use_sideband);
337 else
338 xwrite(2, msg, sz);
339}
340
341static void rp_warning(const char *err, ...)
342{
343 va_list params;
344 va_start(params, err);
345 report_message("warning: ", err, params);
346 va_end(params);
347}
348
349static void rp_error(const char *err, ...)
350{
351 va_list params;
352 va_start(params, err);
353 report_message("error: ", err, params);
354 va_end(params);
355}
356
6d525d38
SP
357static int copy_to_sideband(int in, int out, void *arg)
358{
359 char data[128];
83558686
JK
360 int keepalive_active = 0;
361
362 if (keepalive_in_sec <= 0)
363 use_keepalive = KEEPALIVE_NEVER;
364 if (use_keepalive == KEEPALIVE_ALWAYS)
365 keepalive_active = 1;
366
6d525d38 367 while (1) {
83558686
JK
368 ssize_t sz;
369
370 if (keepalive_active) {
371 struct pollfd pfd;
372 int ret;
373
374 pfd.fd = in;
375 pfd.events = POLLIN;
376 ret = poll(&pfd, 1, 1000 * keepalive_in_sec);
377
378 if (ret < 0) {
379 if (errno == EINTR)
380 continue;
381 else
382 break;
383 } else if (ret == 0) {
384 /* no data; send a keepalive packet */
385 static const char buf[] = "0005\1";
386 write_or_die(1, buf, sizeof(buf) - 1);
387 continue;
388 } /* else there is actual data to read */
389 }
390
391 sz = xread(in, data, sizeof(data));
6d525d38
SP
392 if (sz <= 0)
393 break;
83558686
JK
394
395 if (use_keepalive == KEEPALIVE_AFTER_NUL && !keepalive_active) {
396 const char *p = memchr(data, '\0', sz);
397 if (p) {
398 /*
399 * The NUL tells us to start sending keepalives. Make
400 * sure we send any other data we read along
401 * with it.
402 */
403 keepalive_active = 1;
404 send_sideband(1, 2, data, p - data, use_sideband);
405 send_sideband(1, 2, p + 1, sz - (p - data + 1), use_sideband);
406 continue;
407 }
408 }
409
410 /*
411 * Either we're not looking for a NUL signal, or we didn't see
412 * it yet; just pass along the data.
413 */
6d525d38
SP
414 send_sideband(1, 2, data, sz, use_sideband);
415 }
416 close(in);
417 return 0;
418}
419
b89363e4
JH
420#define HMAC_BLOCK_SIZE 64
421
6f5ef44e 422static void hmac_sha1(unsigned char *out,
b89363e4
JH
423 const char *key_in, size_t key_len,
424 const char *text, size_t text_len)
425{
426 unsigned char key[HMAC_BLOCK_SIZE];
427 unsigned char k_ipad[HMAC_BLOCK_SIZE];
428 unsigned char k_opad[HMAC_BLOCK_SIZE];
429 int i;
430 git_SHA_CTX ctx;
431
432 /* RFC 2104 2. (1) */
433 memset(key, '\0', HMAC_BLOCK_SIZE);
434 if (HMAC_BLOCK_SIZE < key_len) {
435 git_SHA1_Init(&ctx);
436 git_SHA1_Update(&ctx, key_in, key_len);
437 git_SHA1_Final(key, &ctx);
438 } else {
439 memcpy(key, key_in, key_len);
440 }
441
442 /* RFC 2104 2. (2) & (5) */
443 for (i = 0; i < sizeof(key); i++) {
444 k_ipad[i] = key[i] ^ 0x36;
445 k_opad[i] = key[i] ^ 0x5c;
446 }
447
448 /* RFC 2104 2. (3) & (4) */
449 git_SHA1_Init(&ctx);
450 git_SHA1_Update(&ctx, k_ipad, sizeof(k_ipad));
451 git_SHA1_Update(&ctx, text, text_len);
452 git_SHA1_Final(out, &ctx);
453
454 /* RFC 2104 2. (6) & (7) */
455 git_SHA1_Init(&ctx);
456 git_SHA1_Update(&ctx, k_opad, sizeof(k_opad));
6f5ef44e 457 git_SHA1_Update(&ctx, out, 20);
b89363e4
JH
458 git_SHA1_Final(out, &ctx);
459}
460
dddbad72 461static char *prepare_push_cert_nonce(const char *path, timestamp_t stamp)
b89363e4
JH
462{
463 struct strbuf buf = STRBUF_INIT;
464 unsigned char sha1[20];
465
cb71f8bd 466 strbuf_addf(&buf, "%s:%"PRItime, path, stamp);
b89363e4
JH
467 hmac_sha1(sha1, buf.buf, buf.len, cert_nonce_seed, strlen(cert_nonce_seed));;
468 strbuf_release(&buf);
469
470 /* RFC 2104 5. HMAC-SHA1-80 */
cb71f8bd 471 strbuf_addf(&buf, "%"PRItime"-%.*s", stamp, 20, sha1_to_hex(sha1));
b89363e4
JH
472 return strbuf_detach(&buf, NULL);
473}
474
475/*
476 * NEEDSWORK: reuse find_commit_header() from jk/commit-author-parsing
477 * after dropping "_commit" from its name and possibly moving it out
478 * of commit.c
479 */
cbaf82cc
JT
480static char *find_header(const char *msg, size_t len, const char *key,
481 const char **next_line)
b89363e4
JH
482{
483 int key_len = strlen(key);
484 const char *line = msg;
485
486 while (line && line < msg + len) {
487 const char *eol = strchrnul(line, '\n');
488
489 if ((msg + len <= eol) || line == eol)
490 return NULL;
491 if (line + key_len < eol &&
492 !memcmp(line, key, key_len) && line[key_len] == ' ') {
493 int offset = key_len + 1;
cbaf82cc
JT
494 if (next_line)
495 *next_line = *eol ? eol + 1 : eol;
b89363e4
JH
496 return xmemdupz(line + offset, (eol - line) - offset);
497 }
498 line = *eol ? eol + 1 : NULL;
499 }
500 return NULL;
501}
502
503static const char *check_nonce(const char *buf, size_t len)
504{
cbaf82cc 505 char *nonce = find_header(buf, len, "nonce", NULL);
dddbad72 506 timestamp_t stamp, ostamp;
5732373d 507 char *bohmac, *expect = NULL;
b89363e4
JH
508 const char *retval = NONCE_BAD;
509
510 if (!nonce) {
511 retval = NONCE_MISSING;
512 goto leave;
513 } else if (!push_cert_nonce) {
514 retval = NONCE_UNSOLICITED;
515 goto leave;
516 } else if (!strcmp(push_cert_nonce, nonce)) {
517 retval = NONCE_OK;
518 goto leave;
519 }
520
5732373d
JH
521 if (!stateless_rpc) {
522 /* returned nonce MUST match what we gave out earlier */
523 retval = NONCE_BAD;
524 goto leave;
525 }
526
527 /*
528 * In stateless mode, we may be receiving a nonce issued by
529 * another instance of the server that serving the same
530 * repository, and the timestamps may not match, but the
531 * nonce-seed and dir should match, so we can recompute and
532 * report the time slop.
533 *
534 * In addition, when a nonce issued by another instance has
535 * timestamp within receive.certnonceslop seconds, we pretend
536 * as if we issued that nonce when reporting to the hook.
537 */
538
539 /* nonce is concat(<seconds-since-epoch>, "-", <hmac>) */
540 if (*nonce <= '0' || '9' < *nonce) {
541 retval = NONCE_BAD;
542 goto leave;
543 }
1aeb7e75 544 stamp = parse_timestamp(nonce, &bohmac, 10);
5732373d
JH
545 if (bohmac == nonce || bohmac[0] != '-') {
546 retval = NONCE_BAD;
547 goto leave;
548 }
549
550 expect = prepare_push_cert_nonce(service_dir, stamp);
551 if (strcmp(expect, nonce)) {
552 /* Not what we would have signed earlier */
553 retval = NONCE_BAD;
554 goto leave;
555 }
556
557 /*
558 * By how many seconds is this nonce stale? Negative value
559 * would mean it was issued by another server with its clock
560 * skewed in the future.
561 */
1aeb7e75 562 ostamp = parse_timestamp(push_cert_nonce, NULL, 10);
5732373d
JH
563 nonce_stamp_slop = (long)ostamp - (long)stamp;
564
565 if (nonce_stamp_slop_limit &&
31a8aa1e 566 labs(nonce_stamp_slop) <= nonce_stamp_slop_limit) {
5732373d
JH
567 /*
568 * Pretend as if the received nonce (which passes the
569 * HMAC check, so it is not a forged by third-party)
570 * is what we issued.
571 */
572 free((void *)push_cert_nonce);
573 push_cert_nonce = xstrdup(nonce);
574 retval = NONCE_OK;
575 } else {
576 retval = NONCE_SLOP;
577 }
b89363e4
JH
578
579leave:
580 free(nonce);
5732373d 581 free(expect);
b89363e4
JH
582 return retval;
583}
584
cbaf82cc
JT
585/*
586 * Return 1 if there is no push_cert or if the push options in push_cert are
587 * the same as those in the argument; 0 otherwise.
588 */
589static int check_cert_push_options(const struct string_list *push_options)
590{
591 const char *buf = push_cert.buf;
592 int len = push_cert.len;
593
594 char *option;
595 const char *next_line;
596 int options_seen = 0;
597
598 int retval = 1;
599
600 if (!len)
601 return 1;
602
603 while ((option = find_header(buf, len, "push-option", &next_line))) {
604 len -= (next_line - buf);
605 buf = next_line;
606 options_seen++;
607 if (options_seen > push_options->nr
608 || strcmp(option,
609 push_options->items[options_seen - 1].string)) {
610 retval = 0;
611 goto leave;
612 }
613 free(option);
614 }
615
616 if (options_seen != push_options->nr)
617 retval = 0;
618
619leave:
620 free(option);
621 return retval;
622}
623
a85b377d
JH
624static void prepare_push_cert_sha1(struct child_process *proc)
625{
626 static int already_done;
a85b377d
JH
627
628 if (!push_cert.len)
629 return;
630
631 if (!already_done) {
d05b9618
JH
632 struct strbuf gpg_output = STRBUF_INIT;
633 struct strbuf gpg_status = STRBUF_INIT;
634 int bogs /* beginning_of_gpg_sig */;
635
a85b377d 636 already_done = 1;
a09c985e
PO
637 if (write_object_file(push_cert.buf, push_cert.len, "blob",
638 &push_cert_oid))
639 oidclr(&push_cert_oid);
d05b9618
JH
640
641 memset(&sigcheck, '\0', sizeof(sigcheck));
642 sigcheck.result = 'N';
643
644 bogs = parse_signature(push_cert.buf, push_cert.len);
645 if (verify_signed_buffer(push_cert.buf, bogs,
646 push_cert.buf + bogs, push_cert.len - bogs,
647 &gpg_output, &gpg_status) < 0) {
648 ; /* error running gpg */
649 } else {
650 sigcheck.payload = push_cert.buf;
651 sigcheck.gpg_output = gpg_output.buf;
652 sigcheck.gpg_status = gpg_status.buf;
653 parse_gpg_output(&sigcheck);
654 }
655
656 strbuf_release(&gpg_output);
657 strbuf_release(&gpg_status);
b89363e4 658 nonce_status = check_nonce(push_cert.buf, bogs);
a85b377d 659 }
a09c985e 660 if (!is_null_oid(&push_cert_oid)) {
a9154590 661 argv_array_pushf(&proc->env_array, "GIT_PUSH_CERT=%s",
a09c985e 662 oid_to_hex(&push_cert_oid));
a9154590 663 argv_array_pushf(&proc->env_array, "GIT_PUSH_CERT_SIGNER=%s",
d05b9618 664 sigcheck.signer ? sigcheck.signer : "");
a9154590 665 argv_array_pushf(&proc->env_array, "GIT_PUSH_CERT_KEY=%s",
d05b9618 666 sigcheck.key ? sigcheck.key : "");
a9154590
RS
667 argv_array_pushf(&proc->env_array, "GIT_PUSH_CERT_STATUS=%c",
668 sigcheck.result);
b89363e4 669 if (push_cert_nonce) {
a9154590
RS
670 argv_array_pushf(&proc->env_array,
671 "GIT_PUSH_CERT_NONCE=%s",
672 push_cert_nonce);
673 argv_array_pushf(&proc->env_array,
674 "GIT_PUSH_CERT_NONCE_STATUS=%s",
675 nonce_status);
5732373d 676 if (nonce_status == NONCE_SLOP)
a9154590
RS
677 argv_array_pushf(&proc->env_array,
678 "GIT_PUSH_CERT_NONCE_SLOP=%ld",
5732373d 679 nonce_stamp_slop);
b89363e4 680 }
a85b377d
JH
681 }
682}
683
77a9745d
SB
684struct receive_hook_feed_state {
685 struct command *cmd;
686 int skip_broken;
687 struct strbuf buf;
688 const struct string_list *push_options;
689};
690
9684e44a 691typedef int (*feed_fn)(void *, const char **, size_t *);
77a9745d
SB
692static int run_and_feed_hook(const char *hook_name, feed_fn feed,
693 struct receive_hook_feed_state *feed_state)
b1bf95bb 694{
d3180279 695 struct child_process proc = CHILD_PROCESS_INIT;
6d525d38 696 struct async muxer;
f43cd49f 697 const char *argv[2];
9684e44a 698 int code;
b1bf95bb 699
5a7da2dc
AS
700 argv[0] = find_hook(hook_name);
701 if (!argv[0])
b1bf95bb 702 return 0;
c8dd2771 703
f43cd49f
SP
704 argv[1] = NULL;
705
f43cd49f
SP
706 proc.argv = argv;
707 proc.in = -1;
708 proc.stdout_to_stderr = 1;
77a9745d
SB
709 if (feed_state->push_options) {
710 int i;
711 for (i = 0; i < feed_state->push_options->nr; i++)
712 argv_array_pushf(&proc.env_array,
713 "GIT_PUSH_OPTION_%d=%s", i,
714 feed_state->push_options->items[i].string);
715 argv_array_pushf(&proc.env_array, "GIT_PUSH_OPTION_COUNT=%d",
716 feed_state->push_options->nr);
717 } else
718 argv_array_pushf(&proc.env_array, "GIT_PUSH_OPTION_COUNT");
f43cd49f 719
722ff7f8
JK
720 if (tmp_objdir)
721 argv_array_pushv(&proc.env_array, tmp_objdir_env(tmp_objdir));
722
6d525d38
SP
723 if (use_sideband) {
724 memset(&muxer, 0, sizeof(muxer));
725 muxer.proc = copy_to_sideband;
726 muxer.in = -1;
727 code = start_async(&muxer);
728 if (code)
729 return code;
730 proc.err = muxer.in;
731 }
732
5d222c09
RS
733 prepare_push_cert_sha1(&proc);
734
f43cd49f 735 code = start_command(&proc);
6d525d38
SP
736 if (code) {
737 if (use_sideband)
738 finish_async(&muxer);
90e41a89 739 return code;
6d525d38
SP
740 }
741
ec7dbd14
JH
742 sigchain_push(SIGPIPE, SIG_IGN);
743
9684e44a
JH
744 while (1) {
745 const char *buf;
746 size_t n;
747 if (feed(feed_state, &buf, &n))
748 break;
06f46f23 749 if (write_in_full(proc.in, buf, n) < 0)
9684e44a 750 break;
c8dd2771 751 }
e72ae288 752 close(proc.in);
6d525d38
SP
753 if (use_sideband)
754 finish_async(&muxer);
ec7dbd14
JH
755
756 sigchain_pop(SIGPIPE);
757
90e41a89 758 return finish_command(&proc);
b1bf95bb
JW
759}
760
9684e44a
JH
761static int feed_receive_hook(void *state_, const char **bufp, size_t *sizep)
762{
763 struct receive_hook_feed_state *state = state_;
764 struct command *cmd = state->cmd;
765
cdc2b2f3
JH
766 while (cmd &&
767 state->skip_broken && (cmd->error_string || cmd->did_not_exist))
9684e44a
JH
768 cmd = cmd->next;
769 if (!cmd)
770 return -1; /* EOF */
771 strbuf_reset(&state->buf);
772 strbuf_addf(&state->buf, "%s %s %s\n",
9c44ea44 773 oid_to_hex(&cmd->old_oid), oid_to_hex(&cmd->new_oid),
9684e44a
JH
774 cmd->ref_name);
775 state->cmd = cmd->next;
776 if (bufp) {
777 *bufp = state->buf.buf;
778 *sizep = state->buf.len;
779 }
780 return 0;
781}
782
77a9745d
SB
783static int run_receive_hook(struct command *commands,
784 const char *hook_name,
785 int skip_broken,
786 const struct string_list *push_options)
9684e44a
JH
787{
788 struct receive_hook_feed_state state;
789 int status;
790
791 strbuf_init(&state.buf, 0);
792 state.cmd = commands;
cdc2b2f3 793 state.skip_broken = skip_broken;
9684e44a
JH
794 if (feed_receive_hook(&state, NULL, NULL))
795 return 0;
796 state.cmd = commands;
77a9745d 797 state.push_options = push_options;
9684e44a
JH
798 status = run_and_feed_hook(hook_name, feed_receive_hook, &state);
799 strbuf_release(&state.buf);
800 return status;
801}
802
1d9e8b56
SP
803static int run_update_hook(struct command *cmd)
804{
1d9e8b56 805 const char *argv[5];
d3180279 806 struct child_process proc = CHILD_PROCESS_INIT;
6d525d38 807 int code;
1d9e8b56 808
5a7da2dc
AS
809 argv[0] = find_hook("update");
810 if (!argv[0])
1d9e8b56
SP
811 return 0;
812
1d9e8b56 813 argv[1] = cmd->ref_name;
9c44ea44 814 argv[2] = oid_to_hex(&cmd->old_oid);
815 argv[3] = oid_to_hex(&cmd->new_oid);
1d9e8b56
SP
816 argv[4] = NULL;
817
6d525d38
SP
818 proc.no_stdin = 1;
819 proc.stdout_to_stderr = 1;
820 proc.err = use_sideband ? -1 : 0;
821 proc.argv = argv;
822
823 code = start_command(&proc);
824 if (code)
825 return code;
826 if (use_sideband)
827 copy_to_sideband(proc.err, -1, NULL);
828 return finish_command(&proc);
1d9e8b56
SP
829}
830
986e8239
JK
831static int is_ref_checked_out(const char *ref)
832{
986e8239
JK
833 if (is_bare_repository())
834 return 0;
835
747ca245 836 if (!head_name)
986e8239 837 return 0;
747ca245 838 return !strcmp(head_name, ref);
986e8239
JK
839}
840
8ba35a2d
VA
841static char *refuse_unconfigured_deny_msg =
842 N_("By default, updating the current branch in a non-bare repository\n"
843 "is denied, because it will make the index and work tree inconsistent\n"
844 "with what you pushed, and will require 'git reset --hard' to match\n"
845 "the work tree to HEAD.\n"
846 "\n"
2ddaa427
AH
847 "You can set the 'receive.denyCurrentBranch' configuration variable\n"
848 "to 'ignore' or 'warn' in the remote repository to allow pushing into\n"
8ba35a2d
VA
849 "its current branch; however, this is not recommended unless you\n"
850 "arranged to update its work tree to match what you pushed in some\n"
851 "other way.\n"
852 "\n"
853 "To squelch this message and still keep the default behaviour, set\n"
854 "'receive.denyCurrentBranch' configuration variable to 'refuse'.");
3d95d92b 855
acd2a45b 856static void refuse_unconfigured_deny(void)
3d95d92b 857{
8ba35a2d 858 rp_error("%s", _(refuse_unconfigured_deny_msg));
3d95d92b
JH
859}
860
8ba35a2d
VA
861static char *refuse_unconfigured_deny_delete_current_msg =
862 N_("By default, deleting the current branch is denied, because the next\n"
863 "'git clone' won't result in any file checked out, causing confusion.\n"
864 "\n"
865 "You can set 'receive.denyDeleteCurrent' configuration variable to\n"
866 "'warn' or 'ignore' in the remote repository to allow deleting the\n"
867 "current branch, with or without a warning message.\n"
868 "\n"
869 "To squelch this message, you can set it to 'refuse'.");
747ca245 870
375881fa 871static void refuse_unconfigured_deny_delete_current(void)
747ca245 872{
8ba35a2d 873 rp_error("%s", _(refuse_unconfigured_deny_delete_current_msg));
747ca245
JH
874}
875
6ccac9ee 876static int command_singleton_iterator(void *cb_data, struct object_id *oid);
0a1bc12b
NTND
877static int update_shallow_ref(struct command *cmd, struct shallow_info *si)
878{
879 static struct lock_file shallow_lock;
910650d2 880 struct oid_array extra = OID_ARRAY_INIT;
7043c707 881 struct check_connected_options opt = CHECK_CONNECTED_INIT;
0a1bc12b
NTND
882 uint32_t mask = 1 << (cmd->index % 32);
883 int i;
884
6aa30857 885 trace_printf_key(&trace_shallow,
0a1bc12b
NTND
886 "shallow: update_shallow_ref %s\n", cmd->ref_name);
887 for (i = 0; i < si->shallow->nr; i++)
888 if (si->used_shallow[i] &&
889 (si->used_shallow[i][cmd->index / 32] & mask) &&
890 !delayed_reachability_test(si, i))
910650d2 891 oid_array_append(&extra, &si->shallow->oid[i]);
0a1bc12b 892
722ff7f8 893 opt.env = tmp_objdir_env(tmp_objdir);
7043c707
JK
894 setup_alternate_shallow(&shallow_lock, &opt.shallow_file, &extra);
895 if (check_connected(command_singleton_iterator, cmd, &opt)) {
0a1bc12b 896 rollback_lock_file(&shallow_lock);
910650d2 897 oid_array_clear(&extra);
0a1bc12b
NTND
898 return -1;
899 }
900
901 commit_lock_file(&shallow_lock);
902
903 /*
904 * Make sure setup_alternate_shallow() for the next ref does
905 * not lose these new roots..
906 */
907 for (i = 0; i < extra.nr; i++)
e92b848c 908 register_shallow(&extra.oid[i]);
0a1bc12b
NTND
909
910 si->shallow_ref[cmd->index] = 0;
910650d2 911 oid_array_clear(&extra);
0a1bc12b
NTND
912 return 0;
913}
914
1a51b524
JH
915/*
916 * NEEDSWORK: we should consolidate various implementions of "are we
917 * on an unborn branch?" test into one, and make the unified one more
918 * robust. !get_sha1() based check used here and elsewhere would not
919 * allow us to tell an unborn branch from corrupt ref, for example.
920 * For the purpose of fixing "deploy-to-update does not work when
921 * pushing into an empty repository" issue, this should suffice for
922 * now.
923 */
924static int head_has_history(void)
925{
15be4a5d 926 struct object_id oid;
1a51b524 927
15be4a5d 928 return !get_oid("HEAD", &oid);
1a51b524
JH
929}
930
21b138d0
JH
931static const char *push_to_deploy(unsigned char *sha1,
932 struct argv_array *env,
933 const char *work_tree)
1404bcbb
JS
934{
935 const char *update_refresh[] = {
936 "update-index", "-q", "--ignore-submodules", "--refresh", NULL
937 };
938 const char *diff_files[] = {
939 "diff-files", "--quiet", "--ignore-submodules", "--", NULL
940 };
941 const char *diff_index[] = {
942 "diff-index", "--quiet", "--cached", "--ignore-submodules",
1a51b524 943 NULL, "--", NULL
1404bcbb
JS
944 };
945 const char *read_tree[] = {
946 "read-tree", "-u", "-m", NULL, NULL
947 };
1404bcbb
JS
948 struct child_process child = CHILD_PROCESS_INIT;
949
1404bcbb 950 child.argv = update_refresh;
21b138d0 951 child.env = env->argv;
1404bcbb
JS
952 child.dir = work_tree;
953 child.no_stdin = 1;
954 child.stdout_to_stderr = 1;
955 child.git_cmd = 1;
21b138d0 956 if (run_command(&child))
1404bcbb 957 return "Up-to-date check failed";
1404bcbb
JS
958
959 /* run_command() does not clean up completely; reinitialize */
960 child_process_init(&child);
961 child.argv = diff_files;
21b138d0 962 child.env = env->argv;
1404bcbb
JS
963 child.dir = work_tree;
964 child.no_stdin = 1;
965 child.stdout_to_stderr = 1;
966 child.git_cmd = 1;
21b138d0 967 if (run_command(&child))
1404bcbb 968 return "Working directory has unstaged changes";
1404bcbb 969
1a51b524
JH
970 /* diff-index with either HEAD or an empty tree */
971 diff_index[4] = head_has_history() ? "HEAD" : EMPTY_TREE_SHA1_HEX;
972
1404bcbb
JS
973 child_process_init(&child);
974 child.argv = diff_index;
21b138d0 975 child.env = env->argv;
1404bcbb
JS
976 child.no_stdin = 1;
977 child.no_stdout = 1;
978 child.stdout_to_stderr = 0;
979 child.git_cmd = 1;
21b138d0 980 if (run_command(&child))
1404bcbb 981 return "Working directory has staged changes";
1404bcbb
JS
982
983 read_tree[3] = sha1_to_hex(sha1);
984 child_process_init(&child);
985 child.argv = read_tree;
21b138d0 986 child.env = env->argv;
1404bcbb
JS
987 child.dir = work_tree;
988 child.no_stdin = 1;
989 child.no_stdout = 1;
990 child.stdout_to_stderr = 0;
991 child.git_cmd = 1;
21b138d0 992 if (run_command(&child))
1404bcbb 993 return "Could not update working tree to new HEAD";
1404bcbb 994
1404bcbb
JS
995 return NULL;
996}
997
08553319
JH
998static const char *push_to_checkout_hook = "push-to-checkout";
999
1000static const char *push_to_checkout(unsigned char *sha1,
1001 struct argv_array *env,
1002 const char *work_tree)
1003{
1004 argv_array_pushf(env, "GIT_WORK_TREE=%s", absolute_path(work_tree));
1005 if (run_hook_le(env->argv, push_to_checkout_hook,
1006 sha1_to_hex(sha1), NULL))
1007 return "push-to-checkout hook declined";
1008 else
1009 return NULL;
1010}
1011
21b138d0
JH
1012static const char *update_worktree(unsigned char *sha1)
1013{
1014 const char *retval;
1015 const char *work_tree = git_work_tree_cfg ? git_work_tree_cfg : "..";
1016 struct argv_array env = ARGV_ARRAY_INIT;
1017
1018 if (is_bare_repository())
1019 return "denyCurrentBranch = updateInstead needs a worktree";
1020
1021 argv_array_pushf(&env, "GIT_DIR=%s", absolute_path(get_git_dir()));
1022
08553319
JH
1023 if (!find_hook(push_to_checkout_hook))
1024 retval = push_to_deploy(sha1, &env, work_tree);
1025 else
1026 retval = push_to_checkout(sha1, &env, work_tree);
21b138d0
JH
1027
1028 argv_array_clear(&env);
1029 return retval;
1030}
1031
0a1bc12b 1032static const char *update(struct command *cmd, struct shallow_info *si)
2eca23da 1033{
cfee10a7 1034 const char *name = cmd->ref_name;
6b01ecfe 1035 struct strbuf namespaced_name_buf = STRBUF_INIT;
bda6e828
JS
1036 static char *namespaced_name;
1037 const char *ret;
9c44ea44 1038 struct object_id *old_oid = &cmd->old_oid;
1039 struct object_id *new_oid = &cmd->new_oid;
2eca23da 1040
061d6b9a 1041 /* only refs/... are allowed */
59556548 1042 if (!starts_with(name, "refs/") || check_refname_format(name + 5, 0)) {
466dbc42 1043 rp_error("refusing to create funny ref '%s' remotely", name);
8aaf7d64 1044 return "funny refname";
cfee10a7 1045 }
d8a1deec 1046
6b01ecfe 1047 strbuf_addf(&namespaced_name_buf, "%s%s", get_git_namespace(), name);
bda6e828 1048 free(namespaced_name);
6b01ecfe
JT
1049 namespaced_name = strbuf_detach(&namespaced_name_buf, NULL);
1050
1051 if (is_ref_checked_out(namespaced_name)) {
3d95d92b
JH
1052 switch (deny_current_branch) {
1053 case DENY_IGNORE:
986e8239 1054 break;
3d95d92b 1055 case DENY_WARN:
466dbc42 1056 rp_warning("updating the current branch");
986e8239 1057 break;
3d95d92b 1058 case DENY_REFUSE:
acd2a45b 1059 case DENY_UNCONFIGURED:
466dbc42 1060 rp_error("refusing to update checked out branch: %s", name);
acd2a45b
JH
1061 if (deny_current_branch == DENY_UNCONFIGURED)
1062 refuse_unconfigured_deny();
3d95d92b 1063 return "branch is currently checked out";
1404bcbb 1064 case DENY_UPDATE_INSTEAD:
9c44ea44 1065 ret = update_worktree(new_oid->hash);
1404bcbb
JS
1066 if (ret)
1067 return ret;
1068 break;
3d95d92b 1069 }
986e8239
JK
1070 }
1071
9c44ea44 1072 if (!is_null_oid(new_oid) && !has_object_file(new_oid)) {
8aaf7d64 1073 error("unpack should have generated %s, "
9c44ea44 1074 "but I can't find it!", oid_to_hex(new_oid));
8aaf7d64 1075 return "bad pack";
cfee10a7 1076 }
747ca245 1077
9c44ea44 1078 if (!is_null_oid(old_oid) && is_null_oid(new_oid)) {
59556548 1079 if (deny_deletes && starts_with(name, "refs/heads/")) {
466dbc42 1080 rp_error("denying ref deletion for %s", name);
747ca245
JH
1081 return "deletion prohibited";
1082 }
1083
b112b14d 1084 if (head_name && !strcmp(namespaced_name, head_name)) {
747ca245
JH
1085 switch (deny_delete_current) {
1086 case DENY_IGNORE:
1087 break;
1088 case DENY_WARN:
466dbc42 1089 rp_warning("deleting the current branch");
747ca245
JH
1090 break;
1091 case DENY_REFUSE:
375881fa 1092 case DENY_UNCONFIGURED:
1404bcbb 1093 case DENY_UPDATE_INSTEAD:
375881fa
JH
1094 if (deny_delete_current == DENY_UNCONFIGURED)
1095 refuse_unconfigured_deny_delete_current();
466dbc42 1096 rp_error("refusing to delete the current branch: %s", name);
747ca245 1097 return "deletion of the current branch prohibited";
1404bcbb
JS
1098 default:
1099 return "Invalid denyDeleteCurrent setting";
747ca245
JH
1100 }
1101 }
a240de11 1102 }
747ca245 1103
9c44ea44 1104 if (deny_non_fast_forwards && !is_null_oid(new_oid) &&
1105 !is_null_oid(old_oid) &&
59556548 1106 starts_with(name, "refs/heads/")) {
eab82707 1107 struct object *old_object, *new_object;
11031d7e 1108 struct commit *old_commit, *new_commit;
11031d7e 1109
c251c83d 1110 old_object = parse_object(old_oid);
1111 new_object = parse_object(new_oid);
eab82707
MK
1112
1113 if (!old_object || !new_object ||
1114 old_object->type != OBJ_COMMIT ||
1115 new_object->type != OBJ_COMMIT) {
1116 error("bad sha1 objects for %s", name);
1117 return "bad ref";
1118 }
1119 old_commit = (struct commit *)old_object;
1120 new_commit = (struct commit *)new_object;
5d55915c 1121 if (!in_merge_bases(old_commit, new_commit)) {
466dbc42
SP
1122 rp_error("denying non-fast-forward %s"
1123 " (you should pull first)", name);
a75d7b54 1124 return "non-fast-forward";
8aaf7d64 1125 }
11031d7e 1126 }
1d9e8b56 1127 if (run_update_hook(cmd)) {
466dbc42 1128 rp_error("hook declined to update %s", name);
8aaf7d64 1129 return "hook declined";
b1bf95bb 1130 }
3159c8dc 1131
9c44ea44 1132 if (is_null_oid(new_oid)) {
222368c6 1133 struct strbuf err = STRBUF_INIT;
c251c83d 1134 if (!parse_object(old_oid)) {
9c44ea44 1135 old_oid = NULL;
160b81ed
PYH
1136 if (ref_exists(name)) {
1137 rp_warning("Allowing deletion of corrupt ref.");
1138 } else {
1139 rp_warning("Deleting a non-existent ref.");
1140 cmd->did_not_exist = 1;
1141 }
28391a80 1142 }
222368c6
SB
1143 if (ref_transaction_delete(transaction,
1144 namespaced_name,
89f3bbdd 1145 old_oid,
fb5a6bb6 1146 0, "push", &err)) {
222368c6
SB
1147 rp_error("%s", err.buf);
1148 strbuf_release(&err);
8aaf7d64 1149 return "failed to delete";
d4f694ba 1150 }
222368c6 1151 strbuf_release(&err);
8aaf7d64 1152 return NULL; /* good */
d4f694ba
JH
1153 }
1154 else {
6629ea2d 1155 struct strbuf err = STRBUF_INIT;
0a1bc12b
NTND
1156 if (shallow_update && si->shallow_ref[cmd->index] &&
1157 update_shallow_ref(cmd, si))
1158 return "shallow error";
1159
222368c6
SB
1160 if (ref_transaction_update(transaction,
1161 namespaced_name,
89f3bbdd 1162 new_oid, old_oid,
1d147bdf 1163 0, "push",
222368c6 1164 &err)) {
6629ea2d
RS
1165 rp_error("%s", err.buf);
1166 strbuf_release(&err);
222368c6 1167
6629ea2d 1168 return "failed to update ref";
ef203f08 1169 }
6629ea2d 1170 strbuf_release(&err);
222368c6 1171
8aaf7d64 1172 return NULL; /* good */
19614330 1173 }
2eca23da
LT
1174}
1175
5e1c71fd 1176static void run_update_post_hook(struct command *commands)
19614330 1177{
5e1c71fd 1178 struct command *cmd;
d3180279 1179 struct child_process proc = CHILD_PROCESS_INIT;
dcf69262 1180 const char *hook;
19614330 1181
5a7da2dc 1182 hook = find_hook("post-update");
dce96c41 1183 if (!hook)
3e6e152c 1184 return;
5a7da2dc 1185
850d2fec 1186 for (cmd = commands; cmd; cmd = cmd->next) {
160b81ed 1187 if (cmd->error_string || cmd->did_not_exist)
19614330 1188 continue;
dce96c41
RS
1189 if (!proc.args.argc)
1190 argv_array_push(&proc.args, hook);
850d2fec 1191 argv_array_push(&proc.args, cmd->ref_name);
19614330 1192 }
dce96c41
RS
1193 if (!proc.args.argc)
1194 return;
6d525d38 1195
6d525d38
SP
1196 proc.no_stdin = 1;
1197 proc.stdout_to_stderr = 1;
1198 proc.err = use_sideband ? -1 : 0;
6d525d38
SP
1199
1200 if (!start_command(&proc)) {
1201 if (use_sideband)
1202 copy_to_sideband(proc.err, -1, NULL);
1203 finish_command(&proc);
1204 }
19614330 1205}
2eca23da 1206
da3efdb1
JS
1207static void check_aliased_update(struct command *cmd, struct string_list *list)
1208{
6b01ecfe
JT
1209 struct strbuf buf = STRBUF_INIT;
1210 const char *dst_name;
da3efdb1
JS
1211 struct string_list_item *item;
1212 struct command *dst_cmd;
da3efdb1
JS
1213 int flag;
1214
6b01ecfe 1215 strbuf_addf(&buf, "%s%s", get_git_namespace(), cmd->ref_name);
744c040b 1216 dst_name = resolve_ref_unsafe(buf.buf, 0, NULL, &flag);
6b01ecfe 1217 strbuf_release(&buf);
da3efdb1
JS
1218
1219 if (!(flag & REF_ISSYMREF))
1220 return;
1221
6b01ecfe
JT
1222 if (!dst_name) {
1223 rp_error("refusing update to broken symref '%s'", cmd->ref_name);
1224 cmd->skip_update = 1;
1225 cmd->error_string = "broken symref";
1226 return;
1227 }
ded83936 1228 dst_name = strip_namespace(dst_name);
6b01ecfe 1229
e8c8b713 1230 if ((item = string_list_lookup(list, dst_name)) == NULL)
da3efdb1
JS
1231 return;
1232
1233 cmd->skip_update = 1;
1234
1235 dst_cmd = (struct command *) item->util;
1236
9c44ea44 1237 if (!oidcmp(&cmd->old_oid, &dst_cmd->old_oid) &&
1238 !oidcmp(&cmd->new_oid, &dst_cmd->new_oid))
da3efdb1
JS
1239 return;
1240
1241 dst_cmd->skip_update = 1;
1242
da3efdb1
JS
1243 rp_error("refusing inconsistent update between symref '%s' (%s..%s) and"
1244 " its target '%s' (%s..%s)",
ef2ed501 1245 cmd->ref_name,
aab9583f 1246 find_unique_abbrev(&cmd->old_oid, DEFAULT_ABBREV),
1247 find_unique_abbrev(&cmd->new_oid, DEFAULT_ABBREV),
ef2ed501 1248 dst_cmd->ref_name,
aab9583f 1249 find_unique_abbrev(&dst_cmd->old_oid, DEFAULT_ABBREV),
1250 find_unique_abbrev(&dst_cmd->new_oid, DEFAULT_ABBREV));
da3efdb1
JS
1251
1252 cmd->error_string = dst_cmd->error_string =
1253 "inconsistent aliased update";
1254}
1255
1256static void check_aliased_updates(struct command *commands)
1257{
1258 struct command *cmd;
183113a5 1259 struct string_list ref_list = STRING_LIST_INIT_NODUP;
da3efdb1
JS
1260
1261 for (cmd = commands; cmd; cmd = cmd->next) {
1262 struct string_list_item *item =
1d2f80fa 1263 string_list_append(&ref_list, cmd->ref_name);
da3efdb1
JS
1264 item->util = (void *)cmd;
1265 }
3383e199 1266 string_list_sort(&ref_list);
da3efdb1 1267
ef7e93d9
CB
1268 for (cmd = commands; cmd; cmd = cmd->next) {
1269 if (!cmd->error_string)
1270 check_aliased_update(cmd, &ref_list);
1271 }
da3efdb1
JS
1272
1273 string_list_clear(&ref_list, 0);
1274}
1275
6ccac9ee 1276static int command_singleton_iterator(void *cb_data, struct object_id *oid)
52fed6e1
JH
1277{
1278 struct command **cmd_list = cb_data;
1279 struct command *cmd = *cmd_list;
1280
9c44ea44 1281 if (!cmd || is_null_oid(&cmd->new_oid))
52fed6e1
JH
1282 return -1; /* end of list */
1283 *cmd_list = NULL; /* this returns only one */
6ccac9ee 1284 oidcpy(oid, &cmd->new_oid);
52fed6e1
JH
1285 return 0;
1286}
1287
0a1bc12b
NTND
1288static void set_connectivity_errors(struct command *commands,
1289 struct shallow_info *si)
52fed6e1
JH
1290{
1291 struct command *cmd;
1292
1293 for (cmd = commands; cmd; cmd = cmd->next) {
1294 struct command *singleton = cmd;
722ff7f8
JK
1295 struct check_connected_options opt = CHECK_CONNECTED_INIT;
1296
0a1bc12b
NTND
1297 if (shallow_update && si->shallow_ref[cmd->index])
1298 /* to be checked in update_shallow_ref() */
1299 continue;
722ff7f8
JK
1300
1301 opt.env = tmp_objdir_env(tmp_objdir);
7043c707 1302 if (!check_connected(command_singleton_iterator, &singleton,
722ff7f8 1303 &opt))
52fed6e1 1304 continue;
722ff7f8 1305
52fed6e1
JH
1306 cmd->error_string = "missing necessary objects";
1307 }
1308}
1309
0a1bc12b
NTND
1310struct iterate_data {
1311 struct command *cmds;
1312 struct shallow_info *si;
1313};
1314
6ccac9ee 1315static int iterate_receive_command_list(void *cb_data, struct object_id *oid)
52fed6e1 1316{
0a1bc12b
NTND
1317 struct iterate_data *data = cb_data;
1318 struct command **cmd_list = &data->cmds;
52fed6e1
JH
1319 struct command *cmd = *cmd_list;
1320
0a1bc12b
NTND
1321 for (; cmd; cmd = cmd->next) {
1322 if (shallow_update && data->si->shallow_ref[cmd->index])
1323 /* to be checked in update_shallow_ref() */
1324 continue;
9c44ea44 1325 if (!is_null_oid(&cmd->new_oid) && !cmd->skip_update) {
6ccac9ee 1326 oidcpy(oid, &cmd->new_oid);
ee6dfb2d
JH
1327 *cmd_list = cmd->next;
1328 return 0;
1329 }
ee6dfb2d
JH
1330 }
1331 *cmd_list = NULL;
1332 return -1; /* end of list */
52fed6e1
JH
1333}
1334
daebaa78
JH
1335static void reject_updates_to_hidden(struct command *commands)
1336{
78a766ab
LF
1337 struct strbuf refname_full = STRBUF_INIT;
1338 size_t prefix_len;
daebaa78
JH
1339 struct command *cmd;
1340
78a766ab
LF
1341 strbuf_addstr(&refname_full, get_git_namespace());
1342 prefix_len = refname_full.len;
1343
daebaa78 1344 for (cmd = commands; cmd; cmd = cmd->next) {
78a766ab
LF
1345 if (cmd->error_string)
1346 continue;
1347
1348 strbuf_setlen(&refname_full, prefix_len);
1349 strbuf_addstr(&refname_full, cmd->ref_name);
1350
1351 if (!ref_is_hidden(cmd->ref_name, refname_full.buf))
daebaa78 1352 continue;
9c44ea44 1353 if (is_null_oid(&cmd->new_oid))
daebaa78
JH
1354 cmd->error_string = "deny deleting a hidden ref";
1355 else
1356 cmd->error_string = "deny updating a hidden ref";
1357 }
78a766ab
LF
1358
1359 strbuf_release(&refname_full);
daebaa78
JH
1360}
1361
a6a84319
SB
1362static int should_process_cmd(struct command *cmd)
1363{
1364 return !cmd->error_string && !cmd->skip_update;
1365}
1366
1367static void warn_if_skipped_connectivity_check(struct command *commands,
1368 struct shallow_info *si)
1369{
1370 struct command *cmd;
1371 int checked_connectivity = 1;
1372
1373 for (cmd = commands; cmd; cmd = cmd->next) {
1374 if (should_process_cmd(cmd) && si->shallow_ref[cmd->index]) {
1375 error("BUG: connectivity check has not been run on ref %s",
1376 cmd->ref_name);
1377 checked_connectivity = 0;
1378 }
1379 }
1380 if (!checked_connectivity)
b6a47885 1381 die("BUG: connectivity check skipped???");
a6a84319
SB
1382}
1383
a1a26145
SB
1384static void execute_commands_non_atomic(struct command *commands,
1385 struct shallow_info *si)
1386{
1387 struct command *cmd;
222368c6
SB
1388 struct strbuf err = STRBUF_INIT;
1389
a1a26145
SB
1390 for (cmd = commands; cmd; cmd = cmd->next) {
1391 if (!should_process_cmd(cmd))
1392 continue;
1393
222368c6
SB
1394 transaction = ref_transaction_begin(&err);
1395 if (!transaction) {
1396 rp_error("%s", err.buf);
1397 strbuf_reset(&err);
1398 cmd->error_string = "transaction failed to start";
1399 continue;
1400 }
1401
a1a26145 1402 cmd->error_string = update(cmd, si);
222368c6
SB
1403
1404 if (!cmd->error_string
1405 && ref_transaction_commit(transaction, &err)) {
1406 rp_error("%s", err.buf);
1407 strbuf_reset(&err);
1408 cmd->error_string = "failed to update ref";
1409 }
1410 ref_transaction_free(transaction);
a1a26145 1411 }
68deed29
SB
1412 strbuf_release(&err);
1413}
222368c6 1414
68deed29
SB
1415static void execute_commands_atomic(struct command *commands,
1416 struct shallow_info *si)
1417{
1418 struct command *cmd;
1419 struct strbuf err = STRBUF_INIT;
1420 const char *reported_error = "atomic push failure";
1421
1422 transaction = ref_transaction_begin(&err);
1423 if (!transaction) {
1424 rp_error("%s", err.buf);
1425 strbuf_reset(&err);
1426 reported_error = "transaction failed to start";
1427 goto failure;
1428 }
1429
1430 for (cmd = commands; cmd; cmd = cmd->next) {
1431 if (!should_process_cmd(cmd))
1432 continue;
1433
1434 cmd->error_string = update(cmd, si);
1435
1436 if (cmd->error_string)
1437 goto failure;
1438 }
1439
1440 if (ref_transaction_commit(transaction, &err)) {
1441 rp_error("%s", err.buf);
1442 reported_error = "atomic transaction failed";
1443 goto failure;
1444 }
1445 goto cleanup;
1446
1447failure:
1448 for (cmd = commands; cmd; cmd = cmd->next)
1449 if (!cmd->error_string)
1450 cmd->error_string = reported_error;
1451
1452cleanup:
1453 ref_transaction_free(transaction);
222368c6 1454 strbuf_release(&err);
a1a26145
SB
1455}
1456
0a1bc12b
NTND
1457static void execute_commands(struct command *commands,
1458 const char *unpacker_error,
77a9745d
SB
1459 struct shallow_info *si,
1460 const struct string_list *push_options)
575f4974 1461{
d415092a 1462 struct check_connected_options opt = CHECK_CONNECTED_INIT;
5e1c71fd 1463 struct command *cmd;
0a1bc12b 1464 struct iterate_data data;
d415092a
JK
1465 struct async muxer;
1466 int err_fd = 0;
8aaf7d64
SP
1467
1468 if (unpacker_error) {
5e1c71fd 1469 for (cmd = commands; cmd; cmd = cmd->next)
74eb32d3 1470 cmd->error_string = "unpacker error";
8aaf7d64
SP
1471 return;
1472 }
1473
d415092a
JK
1474 if (use_sideband) {
1475 memset(&muxer, 0, sizeof(muxer));
1476 muxer.proc = copy_to_sideband;
1477 muxer.in = -1;
1478 if (!start_async(&muxer))
1479 err_fd = muxer.in;
1480 /* ...else, continue without relaying sideband */
1481 }
1482
0a1bc12b
NTND
1483 data.cmds = commands;
1484 data.si = si;
d415092a 1485 opt.err_fd = err_fd;
6b4cd2f8 1486 opt.progress = err_fd && !quiet;
722ff7f8 1487 opt.env = tmp_objdir_env(tmp_objdir);
d415092a 1488 if (check_connected(iterate_receive_command_list, &data, &opt))
0a1bc12b 1489 set_connectivity_errors(commands, si);
52fed6e1 1490
d415092a
JK
1491 if (use_sideband)
1492 finish_async(&muxer);
1493
daebaa78
JH
1494 reject_updates_to_hidden(commands);
1495
77a9745d 1496 if (run_receive_hook(commands, "pre-receive", 0, push_options)) {
ef7e93d9
CB
1497 for (cmd = commands; cmd; cmd = cmd->next) {
1498 if (!cmd->error_string)
1499 cmd->error_string = "pre-receive hook declined";
1500 }
05ef58ec
SP
1501 return;
1502 }
1503
722ff7f8
JK
1504 /*
1505 * Now we'll start writing out refs, which means the objects need
1506 * to be in their final positions so that other processes can see them.
1507 */
1508 if (tmp_objdir_migrate(tmp_objdir) < 0) {
1509 for (cmd = commands; cmd; cmd = cmd->next) {
1510 if (!cmd->error_string)
1511 cmd->error_string = "unable to migrate objects to permanent storage";
1512 }
1513 return;
1514 }
1515 tmp_objdir = NULL;
1516
da3efdb1
JS
1517 check_aliased_updates(commands);
1518
96ec7b1e 1519 free(head_name_to_free);
efbd4fdf 1520 head_name = head_name_to_free = resolve_refdup("HEAD", 0, NULL, NULL);
747ca245 1521
68deed29
SB
1522 if (use_atomic)
1523 execute_commands_atomic(commands, si);
1524 else
1525 execute_commands_non_atomic(commands, si);
0a1bc12b 1526
a6a84319
SB
1527 if (shallow_update)
1528 warn_if_skipped_connectivity_check(commands, si);
575f4974
LT
1529}
1530
39895c74
JH
1531static struct command **queue_command(struct command **tail,
1532 const char *line,
1533 int linelen)
1534{
9c44ea44 1535 struct object_id old_oid, new_oid;
39895c74
JH
1536 struct command *cmd;
1537 const char *refname;
1538 int reflen;
9c44ea44 1539 const char *p;
39895c74 1540
9c44ea44 1541 if (parse_oid_hex(line, &old_oid, &p) ||
1542 *p++ != ' ' ||
1543 parse_oid_hex(p, &new_oid, &p) ||
1544 *p++ != ' ')
39895c74
JH
1545 die("protocol error: expected old/new/ref, got '%s'", line);
1546
9c44ea44 1547 refname = p;
1548 reflen = linelen - (p - line);
ddd0bfac 1549 FLEX_ALLOC_MEM(cmd, ref_name, refname, reflen);
9c44ea44 1550 oidcpy(&cmd->old_oid, &old_oid);
1551 oidcpy(&cmd->new_oid, &new_oid);
39895c74
JH
1552 *tail = cmd;
1553 return &cmd->next;
1554}
1555
4adf569d
JH
1556static void queue_commands_from_cert(struct command **tail,
1557 struct strbuf *push_cert)
1558{
1559 const char *boc, *eoc;
1560
1561 if (*tail)
1562 die("protocol error: got both push certificate and unsigned commands");
1563
1564 boc = strstr(push_cert->buf, "\n\n");
1565 if (!boc)
1566 die("malformed push certificate %.*s", 100, push_cert->buf);
1567 else
1568 boc += 2;
1569 eoc = push_cert->buf + parse_signature(push_cert->buf, push_cert->len);
1570
1571 while (boc < eoc) {
1572 const char *eol = memchr(boc, '\n', eoc - boc);
f2214ded 1573 tail = queue_command(tail, boc, eol ? eol - boc : eoc - boc);
4adf569d
JH
1574 boc = eol ? eol + 1 : eoc;
1575 }
1576}
1577
910650d2 1578static struct command *read_head_info(struct oid_array *shallow)
575f4974 1579{
5e1c71fd 1580 struct command *commands = NULL;
eb1af2df 1581 struct command **p = &commands;
575f4974 1582 for (;;) {
74543a04 1583 char *line;
39895c74 1584 int len, linelen;
eb1af2df 1585
74543a04
JK
1586 line = packet_read_line(0, &len);
1587 if (!line)
575f4974 1588 break;
5dbd7676 1589
9c44ea44 1590 if (len > 8 && starts_with(line, "shallow ")) {
1591 struct object_id oid;
1592 if (get_oid_hex(line + 8, &oid))
c09b71cc
JH
1593 die("protocol error: expected shallow sha, got '%s'",
1594 line + 8);
910650d2 1595 oid_array_append(shallow, &oid);
5dbd7676
NTND
1596 continue;
1597 }
1598
0e3c339b
JH
1599 linelen = strlen(line);
1600 if (linelen < len) {
1601 const char *feature_list = line + linelen + 1;
f47182c8 1602 if (parse_feature_request(feature_list, "report-status"))
cfee10a7 1603 report_status = 1;
f47182c8 1604 if (parse_feature_request(feature_list, "side-band-64k"))
38a81b4e 1605 use_sideband = LARGE_PACKET_MAX;
c207e34f
CB
1606 if (parse_feature_request(feature_list, "quiet"))
1607 quiet = 1;
1b70fe5d
RS
1608 if (advertise_atomic_push
1609 && parse_feature_request(feature_list, "atomic"))
1610 use_atomic = 1;
c714e45f
SB
1611 if (advertise_push_options
1612 && parse_feature_request(feature_list, "push-options"))
1613 use_push_options = 1;
cfee10a7 1614 }
0e3c339b 1615
a85b377d
JH
1616 if (!strcmp(line, "push-cert")) {
1617 int true_flush = 0;
1618 char certbuf[1024];
1619
1620 for (;;) {
1621 len = packet_read(0, NULL, NULL,
1622 certbuf, sizeof(certbuf), 0);
1623 if (!len) {
1624 true_flush = 1;
1625 break;
1626 }
1627 if (!strcmp(certbuf, "push-cert-end\n"))
1628 break; /* end of cert */
1629 strbuf_addstr(&push_cert, certbuf);
1630 }
1631
1632 if (true_flush)
1633 break;
1634 continue;
1635 }
1636
39895c74 1637 p = queue_command(p, line, linelen);
575f4974 1638 }
4adf569d
JH
1639
1640 if (push_cert.len)
1641 queue_commands_from_cert(p, &push_cert);
1642
5e1c71fd 1643 return commands;
575f4974
LT
1644}
1645
c714e45f
SB
1646static void read_push_options(struct string_list *options)
1647{
1648 while (1) {
1649 char *line;
1650 int len;
1651
1652 line = packet_read_line(0, &len);
1653
1654 if (!line)
1655 break;
1656
1657 string_list_append(options, line);
1658 }
1659}
1660
fc04c412
SP
1661static const char *parse_pack_header(struct pack_header *hdr)
1662{
a69e5429
JH
1663 switch (read_pack_header(0, hdr)) {
1664 case PH_ERROR_EOF:
1665 return "eof before pack header was fully read";
1666
1667 case PH_ERROR_PACK_SIGNATURE:
fc04c412 1668 return "protocol error (pack signature mismatch detected)";
a69e5429
JH
1669
1670 case PH_ERROR_PROTOCOL:
fc04c412 1671 return "protocol error (pack version unsupported)";
a69e5429
JH
1672
1673 default:
1674 return "unknown error in parse_pack_header";
1675
1676 case 0:
1677 return NULL;
1678 }
fc04c412
SP
1679}
1680
576162a4
NP
1681static const char *pack_lockfile;
1682
446d5d91
JK
1683static void push_header_arg(struct argv_array *args, struct pack_header *hdr)
1684{
1685 argv_array_pushf(args, "--pack_header=%"PRIu32",%"PRIu32,
1686 ntohl(hdr->hdr_version), ntohl(hdr->hdr_entries));
1687}
1688
5dbd7676 1689static const char *unpack(int err_fd, struct shallow_info *si)
575f4974 1690{
fc04c412
SP
1691 struct pack_header hdr;
1692 const char *hdr_err;
31c42bff 1693 int status;
d3180279 1694 struct child_process child = CHILD_PROCESS_INIT;
dab76d3a
JH
1695 int fsck_objects = (receive_fsck_objects >= 0
1696 ? receive_fsck_objects
1697 : transfer_fsck_objects >= 0
1698 ? transfer_fsck_objects
1699 : 0);
fc04c412
SP
1700
1701 hdr_err = parse_pack_header(&hdr);
49ecfa13
JK
1702 if (hdr_err) {
1703 if (err_fd > 0)
1704 close(err_fd);
fc04c412 1705 return hdr_err;
49ecfa13 1706 }
fc04c412 1707
5dbd7676
NTND
1708 if (si->nr_ours || si->nr_theirs) {
1709 alt_shallow_file = setup_temporary_shallow(si->shallow);
64a7e92f
RS
1710 argv_array_push(&child.args, "--shallow-file");
1711 argv_array_push(&child.args, alt_shallow_file);
5dbd7676
NTND
1712 }
1713
722ff7f8 1714 tmp_objdir = tmp_objdir_create();
6cdad1f1
JK
1715 if (!tmp_objdir) {
1716 if (err_fd > 0)
1717 close(err_fd);
722ff7f8 1718 return "unable to create temporary object directory";
6cdad1f1 1719 }
722ff7f8
JK
1720 child.env = tmp_objdir_env(tmp_objdir);
1721
1722 /*
1723 * Normally we just pass the tmp_objdir environment to the child
1724 * processes that do the heavy lifting, but we may need to see these
1725 * objects ourselves to set up shallow information.
1726 */
1727 tmp_objdir_add_as_alternate(tmp_objdir);
1728
fc04c412 1729 if (ntohl(hdr.hdr_entries) < unpack_limit) {
446d5d91
JK
1730 argv_array_push(&child.args, "unpack-objects");
1731 push_header_arg(&child.args, &hdr);
c207e34f 1732 if (quiet)
64a7e92f 1733 argv_array_push(&child.args, "-q");
dab76d3a 1734 if (fsck_objects)
5d477a33
JS
1735 argv_array_pushf(&child.args, "--strict%s",
1736 fsck_msg_types.buf);
c08db5a2
JK
1737 if (max_input_size)
1738 argv_array_pushf(&child.args, "--max-input-size=%"PRIuMAX,
1739 (uintmax_t)max_input_size);
59bfdfb8 1740 child.no_stdout = 1;
a22e6f85 1741 child.err = err_fd;
59bfdfb8 1742 child.git_cmd = 1;
31c42bff
NTND
1743 status = run_command(&child);
1744 if (status)
1745 return "unpack-objects abnormal exit";
576162a4 1746 } else {
da25bdb7 1747 char hostname[HOST_NAME_MAX + 1];
576162a4 1748
446d5d91
JK
1749 argv_array_pushl(&child.args, "index-pack", "--stdin", NULL);
1750 push_header_arg(&child.args, &hdr);
b26cb7c7 1751
5781a9a2 1752 if (xgethostname(hostname, sizeof(hostname)))
b26cb7c7
JK
1753 xsnprintf(hostname, sizeof(hostname), "localhost");
1754 argv_array_pushf(&child.args,
1755 "--keep=receive-pack %"PRIuMAX" on %s",
1756 (uintmax_t)getpid(),
1757 hostname);
1758
d06303bb
JK
1759 if (!quiet && err_fd)
1760 argv_array_push(&child.args, "--show-resolving-progress");
83558686
JK
1761 if (use_sideband)
1762 argv_array_push(&child.args, "--report-end-of-input");
dab76d3a 1763 if (fsck_objects)
5d477a33
JS
1764 argv_array_pushf(&child.args, "--strict%s",
1765 fsck_msg_types.buf);
1b68387e 1766 if (!reject_thin)
64a7e92f 1767 argv_array_push(&child.args, "--fix-thin");
c08db5a2
JK
1768 if (max_input_size)
1769 argv_array_pushf(&child.args, "--max-input-size=%"PRIuMAX,
1770 (uintmax_t)max_input_size);
31c42bff
NTND
1771 child.out = -1;
1772 child.err = err_fd;
1773 child.git_cmd = 1;
1774 status = start_command(&child);
1775 if (status)
576162a4 1776 return "index-pack fork failed";
31c42bff
NTND
1777 pack_lockfile = index_pack_lockfile(child.out);
1778 close(child.out);
1779 status = finish_command(&child);
1780 if (status)
1781 return "index-pack abnormal exit";
a49d2834 1782 reprepare_packed_git(the_repository);
cfee10a7 1783 }
31c42bff 1784 return NULL;
cfee10a7
JH
1785}
1786
5dbd7676 1787static const char *unpack_with_sideband(struct shallow_info *si)
a22e6f85
JK
1788{
1789 struct async muxer;
1790 const char *ret;
1791
1792 if (!use_sideband)
5dbd7676 1793 return unpack(0, si);
a22e6f85 1794
83558686 1795 use_keepalive = KEEPALIVE_AFTER_NUL;
a22e6f85
JK
1796 memset(&muxer, 0, sizeof(muxer));
1797 muxer.proc = copy_to_sideband;
1798 muxer.in = -1;
1799 if (start_async(&muxer))
1800 return NULL;
1801
5dbd7676 1802 ret = unpack(muxer.in, si);
a22e6f85
JK
1803
1804 finish_async(&muxer);
1805 return ret;
1806}
1807
0a1bc12b
NTND
1808static void prepare_shallow_update(struct command *commands,
1809 struct shallow_info *si)
1810{
42c78a21 1811 int i, j, k, bitmap_size = DIV_ROUND_UP(si->ref->nr, 32);
0a1bc12b 1812
b32fa95f 1813 ALLOC_ARRAY(si->used_shallow, si->shallow->nr);
0a1bc12b
NTND
1814 assign_shallow_commits_to_refs(si, si->used_shallow, NULL);
1815
1816 si->need_reachability_test =
1817 xcalloc(si->shallow->nr, sizeof(*si->need_reachability_test));
1818 si->reachable =
1819 xcalloc(si->shallow->nr, sizeof(*si->reachable));
1820 si->shallow_ref = xcalloc(si->ref->nr, sizeof(*si->shallow_ref));
1821
1822 for (i = 0; i < si->nr_ours; i++)
1823 si->need_reachability_test[si->ours[i]] = 1;
1824
1825 for (i = 0; i < si->shallow->nr; i++) {
1826 if (!si->used_shallow[i])
1827 continue;
1828 for (j = 0; j < bitmap_size; j++) {
1829 if (!si->used_shallow[i][j])
1830 continue;
1831 si->need_reachability_test[i]++;
1832 for (k = 0; k < 32; k++)
9a93c668 1833 if (si->used_shallow[i][j] & (1U << k))
0a1bc12b
NTND
1834 si->shallow_ref[j * 32 + k]++;
1835 }
1836
1837 /*
1838 * true for those associated with some refs and belong
1839 * in "ours" list aka "step 7 not done yet"
1840 */
1841 si->need_reachability_test[i] =
1842 si->need_reachability_test[i] > 1;
1843 }
1844
1845 /*
1846 * keep hooks happy by forcing a temporary shallow file via
1847 * env variable because we can't add --shallow-file to every
1848 * command. check_everything_connected() will be done with
1849 * true .git/shallow though.
1850 */
1851 setenv(GIT_SHALLOW_FILE_ENVIRONMENT, alt_shallow_file, 1);
1852}
1853
5dbd7676
NTND
1854static void update_shallow_info(struct command *commands,
1855 struct shallow_info *si,
910650d2 1856 struct oid_array *ref)
5dbd7676
NTND
1857{
1858 struct command *cmd;
1859 int *ref_status;
1860 remove_nonexistent_theirs_shallow(si);
0a1bc12b
NTND
1861 if (!si->nr_ours && !si->nr_theirs) {
1862 shallow_update = 0;
5dbd7676 1863 return;
0a1bc12b 1864 }
5dbd7676
NTND
1865
1866 for (cmd = commands; cmd; cmd = cmd->next) {
9c44ea44 1867 if (is_null_oid(&cmd->new_oid))
5dbd7676 1868 continue;
910650d2 1869 oid_array_append(ref, &cmd->new_oid);
5dbd7676
NTND
1870 cmd->index = ref->nr - 1;
1871 }
1872 si->ref = ref;
1873
0a1bc12b
NTND
1874 if (shallow_update) {
1875 prepare_shallow_update(commands, si);
1876 return;
1877 }
1878
b32fa95f 1879 ALLOC_ARRAY(ref_status, ref->nr);
5dbd7676
NTND
1880 assign_shallow_commits_to_refs(si, NULL, ref_status);
1881 for (cmd = commands; cmd; cmd = cmd->next) {
9c44ea44 1882 if (is_null_oid(&cmd->new_oid))
5dbd7676
NTND
1883 continue;
1884 if (ref_status[cmd->index]) {
1885 cmd->error_string = "shallow update not allowed";
1886 cmd->skip_update = 1;
1887 }
1888 }
5dbd7676
NTND
1889 free(ref_status);
1890}
1891
5e1c71fd 1892static void report(struct command *commands, const char *unpack_status)
cfee10a7
JH
1893{
1894 struct command *cmd;
38a81b4e
SP
1895 struct strbuf buf = STRBUF_INIT;
1896
1897 packet_buf_write(&buf, "unpack %s\n",
1898 unpack_status ? unpack_status : "ok");
cfee10a7
JH
1899 for (cmd = commands; cmd; cmd = cmd->next) {
1900 if (!cmd->error_string)
38a81b4e
SP
1901 packet_buf_write(&buf, "ok %s\n",
1902 cmd->ref_name);
cfee10a7 1903 else
38a81b4e
SP
1904 packet_buf_write(&buf, "ng %s %s\n",
1905 cmd->ref_name, cmd->error_string);
575f4974 1906 }
38a81b4e
SP
1907 packet_buf_flush(&buf);
1908
1909 if (use_sideband)
1910 send_sideband(1, 1, buf.buf, buf.len, use_sideband);
1911 else
cdf4fb8e 1912 write_or_die(1, buf.buf, buf.len);
38a81b4e 1913 strbuf_release(&buf);
575f4974
LT
1914}
1915
5e1c71fd 1916static int delete_only(struct command *commands)
d4f694ba 1917{
5e1c71fd
JS
1918 struct command *cmd;
1919 for (cmd = commands; cmd; cmd = cmd->next) {
9c44ea44 1920 if (!is_null_oid(&cmd->new_oid))
d4f694ba 1921 return 0;
d4f694ba
JH
1922 }
1923 return 1;
1924}
1925
be5908ae 1926int cmd_receive_pack(int argc, const char **argv, const char *prefix)
575f4974 1927{
42526b47 1928 int advertise_refs = 0;
5e1c71fd 1929 struct command *commands;
910650d2 1930 struct oid_array shallow = OID_ARRAY_INIT;
1931 struct oid_array ref = OID_ARRAY_INIT;
5dbd7676 1932 struct shallow_info si;
575f4974 1933
1b68387e
SS
1934 struct option options[] = {
1935 OPT__QUIET(&quiet, N_("quiet")),
1936 OPT_HIDDEN_BOOL(0, "stateless-rpc", &stateless_rpc, NULL),
1937 OPT_HIDDEN_BOOL(0, "advertise-refs", &advertise_refs, NULL),
1938 OPT_HIDDEN_BOOL(0, "reject-thin-pack-for-testing", &reject_thin, NULL),
1939 OPT_END()
1940 };
bbc30f99 1941
1b68387e 1942 packet_trace_identity("receive-pack");
575f4974 1943
1b68387e 1944 argc = parse_options(argc, argv, prefix, options, receive_pack_usage, 0);
c207e34f 1945
1b68387e
SS
1946 if (argc > 1)
1947 usage_msg_opt(_("Too many arguments."), receive_pack_usage, options);
1948 if (argc == 0)
1949 usage_msg_opt(_("You must specify a directory."), receive_pack_usage, options);
42526b47 1950
1b68387e 1951 service_dir = argv[0];
575f4974 1952
e1464ca7 1953 setup_path();
5c09f321 1954
5732373d
JH
1955 if (!enter_repo(service_dir, 0))
1956 die("'%s' does not appear to be a git repository", service_dir);
575f4974 1957
ef90d6d4 1958 git_config(receive_pack_config, NULL);
b89363e4 1959 if (cert_nonce_seed)
5732373d 1960 push_cert_nonce = prepare_push_cert_nonce(service_dir, time(NULL));
6fb75bed 1961
e28714c5
JH
1962 if (0 <= transfer_unpack_limit)
1963 unpack_limit = transfer_unpack_limit;
1964 else if (0 <= receive_unpack_limit)
1965 unpack_limit = receive_unpack_limit;
1966
aa9bab29
BW
1967 switch (determine_protocol_version_server()) {
1968 case protocol_v1:
1969 /*
1970 * v1 is just the original protocol with a version string,
1971 * so just fall through after writing the version string.
1972 */
1973 if (advertise_refs || !stateless_rpc)
1974 packet_write_fmt(1, "version 1\n");
1975
1976 /* fallthrough */
1977 case protocol_v0:
1978 break;
1979 case protocol_unknown_version:
1980 BUG("unknown protocol version");
1981 }
1982
42526b47 1983 if (advertise_refs || !stateless_rpc) {
42526b47 1984 write_head_info();
42526b47
SP
1985 }
1986 if (advertise_refs)
1987 return 0;
575f4974 1988
5dbd7676 1989 if ((commands = read_head_info(&shallow)) != NULL) {
d4f694ba 1990 const char *unpack_status = NULL;
77a9745d 1991 struct string_list push_options = STRING_LIST_INIT_DUP;
d4f694ba 1992
c714e45f
SB
1993 if (use_push_options)
1994 read_push_options(&push_options);
cbaf82cc
JT
1995 if (!check_cert_push_options(&push_options)) {
1996 struct command *cmd;
1997 for (cmd = commands; cmd; cmd = cmd->next)
1998 cmd->error_string = "inconsistent push options";
1999 }
c714e45f 2000
5dbd7676 2001 prepare_shallow_info(&si, &shallow);
0a1bc12b
NTND
2002 if (!si.nr_ours && !si.nr_theirs)
2003 shallow_update = 0;
5dbd7676
NTND
2004 if (!delete_only(commands)) {
2005 unpack_status = unpack_with_sideband(&si);
2006 update_shallow_info(commands, &si, &ref);
2007 }
83558686 2008 use_keepalive = KEEPALIVE_ALWAYS;
77a9745d
SB
2009 execute_commands(commands, unpack_status, &si,
2010 &push_options);
576162a4 2011 if (pack_lockfile)
691f1a28 2012 unlink_or_warn(pack_lockfile);
cfee10a7 2013 if (report_status)
5e1c71fd 2014 report(commands, unpack_status);
77a9745d
SB
2015 run_receive_hook(commands, "post-receive", 1,
2016 &push_options);
8e663d9e 2017 run_update_post_hook(commands);
4432dd6b 2018 string_list_clear(&push_options, 0);
77e3efbf
JH
2019 if (auto_gc) {
2020 const char *argv_gc_auto[] = {
2021 "gc", "--auto", "--quiet", NULL,
2022 };
860a2ebe
LF
2023 struct child_process proc = CHILD_PROCESS_INIT;
2024
2025 proc.no_stdin = 1;
2026 proc.stdout_to_stderr = 1;
2027 proc.err = use_sideband ? -1 : 0;
2028 proc.git_cmd = 1;
2029 proc.argv = argv_gc_auto;
2030
d0b59866 2031 close_all_packs(the_repository->objects);
860a2ebe
LF
2032 if (!start_command(&proc)) {
2033 if (use_sideband)
2034 copy_to_sideband(proc.err, -1, NULL);
2035 finish_command(&proc);
2036 }
77e3efbf
JH
2037 }
2038 if (auto_update_server_info)
2039 update_server_info(0);
5dbd7676 2040 clear_shallow_info(&si);
7f8e9828 2041 }
38a81b4e
SP
2042 if (use_sideband)
2043 packet_flush(1);
910650d2 2044 oid_array_clear(&shallow);
2045 oid_array_clear(&ref);
b89363e4 2046 free((void *)push_cert_nonce);
575f4974
LT
2047 return 0;
2048}