]> git.ipfire.org Git - thirdparty/git.git/blame - lockfile.c
resolve_symlink(): take a strbuf parameter
[thirdparty/git.git] / lockfile.c
CommitLineData
021b6e45
JH
1/*
2 * Copyright (c) 2005, Junio C Hamano
3 */
021b6e45 4#include "cache.h"
4a16d072 5#include "sigchain.h"
021b6e45 6
0a06f148
MH
7/*
8 * File write-locks as used by Git.
9 *
10 * For an overview of how to use the lockfile API, please see
11 *
12 * Documentation/technical/api-lockfile.txt
13 *
14 * This module keeps track of all locked files in lock_file_list for
15 * use at cleanup. This list and the lock_file objects that comprise
16 * it must be kept in self-consistent states at all time, because the
17 * program can be interrupted any time by a signal, in which case the
18 * signal handler will walk through the list attempting to clean up
19 * any open lock files.
20 *
21 * A lockfile is owned by the process that created it. The lock_file
22 * object has an "owner" field that records its owner. This field is
23 * used to prevent a forked process from closing a lockfile created by
24 * its parent.
25 *
707103fd 26 * The possible states of a lock_file object are as follows:
0a06f148
MH
27 *
28 * - Uninitialized. In this state the object's on_list field must be
29 * zero but the rest of its contents need not be initialized. As
30 * soon as the object is used in any way, it is irrevocably
31 * registered in the lock_file_list, and on_list is set.
32 *
33 * - Locked, lockfile open (after hold_lock_file_for_update(),
34 * hold_lock_file_for_append(), or reopen_lock_file()). In this
707103fd
MH
35 * state:
36 * - the lockfile exists
37 * - active is set
38 * - filename holds the filename of the lockfile
39 * - fd holds a file descriptor open for writing to the lockfile
40 * - owner holds the PID of the process that locked the file
0a06f148 41 *
8e86c155
MH
42 * - Locked, lockfile closed (after successful close_lock_file()).
43 * Same as the previous state, except that the lockfile is closed
44 * and fd is -1.
0a06f148 45 *
8e86c155 46 * - Unlocked (after commit_lock_file(), rollback_lock_file(), a
707103fd
MH
47 * failed attempt to lock, or a failed close_lock_file()). In this
48 * state:
49 * - active is unset
cf6950d3
MH
50 * - filename is empty (usually, though there are transitory
51 * states in which this condition doesn't hold). Client code should
52 * *not* rely on the filename being empty in this state.
707103fd
MH
53 * - fd is -1
54 * - the object is left registered in the lock_file_list, and
55 * on_list is set.
0a06f148
MH
56 */
57
2091c506 58static struct lock_file *volatile lock_file_list;
021b6e45
JH
59
60static void remove_lock_file(void)
61{
5e635e39
JH
62 pid_t me = getpid();
63
021b6e45 64 while (lock_file_list) {
a1754bcc
MH
65 if (lock_file_list->owner == me)
66 rollback_lock_file(lock_file_list);
021b6e45
JH
67 lock_file_list = lock_file_list->next;
68 }
69}
70
71static void remove_lock_file_on_signal(int signo)
72{
73 remove_lock_file();
4a16d072 74 sigchain_pop(signo);
021b6e45
JH
75 raise(signo);
76}
77
5d5a7a67
BS
78/*
79 * p = absolute or relative path name
80 *
81 * Return a pointer into p showing the beginning of the last path name
82 * element. If p is empty or the root directory ("/"), just return p.
83 */
84static char *last_path_elm(char *p)
85{
86 /* r starts pointing to null at the end of the string */
87 char *r = strchr(p, '\0');
88
89 if (r == p)
90 return p; /* just return empty string */
91
92 r--; /* back up to last non-null character */
93
94 /* back up past trailing slashes, if any */
95 while (r > p && *r == '/')
96 r--;
97
98 /*
99 * then go backwards until I hit a slash, or the beginning of
100 * the string
101 */
102 while (r > p && *(r-1) != '/')
103 r--;
104 return r;
105}
106
107
108/* We allow "recursive" symbolic links. Only within reason, though */
109#define MAXDEPTH 5
110
111/*
6cad8053 112 * path contains a path that might be a symlink.
5d5a7a67 113 *
6cad8053
MH
114 * If path is a symlink, attempt to overwrite it with a path to the
115 * real file or directory (which may or may not exist), following a
116 * chain of symlinks if necessary. Otherwise, leave path unmodified.
5d5a7a67 117 *
6cad8053
MH
118 * This is a best-effort routine. If an error occurs, path will
119 * either be left unmodified or will name a different symlink in a
120 * symlink chain that started with the original path.
5d5a7a67 121 */
6cad8053 122static void resolve_symlink(struct strbuf *path)
5d5a7a67
BS
123{
124 int depth = MAXDEPTH;
5025d845 125 static struct strbuf link = STRBUF_INIT;
5d5a7a67
BS
126
127 while (depth--) {
6cad8053 128 if (strbuf_readlink(&link, path->buf, path->len) < 0)
5025d845 129 break;
5d5a7a67 130
6cad8053 131 if (is_absolute_path(link.buf))
5d5a7a67 132 /* absolute path simply replaces p */
6cad8053
MH
133 strbuf_reset(path);
134 else {
5d5a7a67 135 /*
5025d845 136 * link is a relative path, so replace the
5d5a7a67
BS
137 * last element of p with it.
138 */
6cad8053
MH
139 char *r = last_path_elm(path->buf);
140 strbuf_setlen(path, r - path->buf);
5d5a7a67 141 }
6cad8053
MH
142
143 strbuf_addbuf(path, &link);
5d5a7a67 144 }
5025d845 145 strbuf_reset(&link);
5d5a7a67
BS
146}
147
447ff1bf 148/* Make sure errno contains a meaningful value on error */
acd3b9ec 149static int lock_file(struct lock_file *lk, const char *path, int flags)
021b6e45 150{
6cad8053
MH
151 size_t pathlen = strlen(path);
152
04e57d4d
MH
153 if (!lock_file_list) {
154 /* One-time initialization */
155 sigchain_push_common(remove_lock_file_on_signal);
156 atexit(remove_lock_file);
157 }
158
707103fd
MH
159 if (lk->active)
160 die("BUG: cannot lock_file(\"%s\") using active struct lock_file",
161 path);
04e57d4d
MH
162 if (!lk->on_list) {
163 /* Initialize *lk and add it to lock_file_list: */
164 lk->fd = -1;
707103fd 165 lk->active = 0;
04e57d4d 166 lk->owner = 0;
6cad8053 167 strbuf_init(&lk->filename, pathlen + LOCK_SUFFIX_LEN);
04e57d4d
MH
168 lk->next = lock_file_list;
169 lock_file_list = lk;
170 lk->on_list = 1;
cf6950d3
MH
171 } else if (lk->filename.len) {
172 /* This shouldn't happen, but better safe than sorry. */
173 die("BUG: lock_file(\"%s\") called with improperly-reset lock_file object",
174 path);
04e57d4d
MH
175 }
176
6cad8053
MH
177 strbuf_add(&lk->filename, path, pathlen);
178 if (!(flags & LOCK_NODEREF))
179 resolve_symlink(&lk->filename);
cf6950d3
MH
180 strbuf_addstr(&lk->filename, LOCK_SUFFIX);
181 lk->fd = open(lk->filename.buf, O_RDWR | O_CREAT | O_EXCL, 0666);
e31e949b 182 if (lk->fd < 0) {
cf6950d3 183 strbuf_reset(&lk->filename);
e31e949b
MH
184 return -1;
185 }
186 lk->owner = getpid();
707103fd 187 lk->active = 1;
cf6950d3 188 if (adjust_shared_perm(lk->filename.buf)) {
e31e949b 189 int save_errno = errno;
cf6950d3 190 error("cannot fix permission bits on %s", lk->filename.buf);
e31e949b
MH
191 rollback_lock_file(lk);
192 errno = save_errno;
193 return -1;
194 }
4723ee99 195 return lk->fd;
021b6e45
JH
196}
197
6af926e8 198void unable_to_lock_message(const char *path, int err, struct strbuf *buf)
e43a6fd3 199{
bdfd739d 200 if (err == EEXIST) {
6af926e8 201 strbuf_addf(buf, "Unable to create '%s.lock': %s.\n\n"
e43a6fd3
MM
202 "If no other git process is currently running, this probably means a\n"
203 "git process crashed in this repository earlier. Make sure no other git\n"
204 "process is running and remove the file manually to continue.",
e2a57aac 205 absolute_path(path), strerror(err));
1b018fd9 206 } else
6af926e8 207 strbuf_addf(buf, "Unable to create '%s.lock': %s",
e2a57aac 208 absolute_path(path), strerror(err));
1b018fd9
MV
209}
210
211int unable_to_lock_error(const char *path, int err)
212{
6af926e8
RS
213 struct strbuf buf = STRBUF_INIT;
214
215 unable_to_lock_message(path, err, &buf);
216 error("%s", buf.buf);
217 strbuf_release(&buf);
1b018fd9
MV
218 return -1;
219}
220
e197c218 221NORETURN void unable_to_lock_die(const char *path, int err)
1b018fd9 222{
6af926e8
RS
223 struct strbuf buf = STRBUF_INIT;
224
225 unable_to_lock_message(path, err, &buf);
226 die("%s", buf.buf);
e43a6fd3
MM
227}
228
447ff1bf 229/* This should return a meaningful errno on failure */
acd3b9ec 230int hold_lock_file_for_update(struct lock_file *lk, const char *path, int flags)
40aaae88 231{
acd3b9ec
JH
232 int fd = lock_file(lk, path, flags);
233 if (fd < 0 && (flags & LOCK_DIE_ON_ERROR))
e197c218 234 unable_to_lock_die(path, errno);
40aaae88
JH
235 return fd;
236}
237
acd3b9ec 238int hold_lock_file_for_append(struct lock_file *lk, const char *path, int flags)
ea3cd5c7
DB
239{
240 int fd, orig_fd;
241
acd3b9ec 242 fd = lock_file(lk, path, flags);
ea3cd5c7 243 if (fd < 0) {
acd3b9ec 244 if (flags & LOCK_DIE_ON_ERROR)
e197c218 245 unable_to_lock_die(path, errno);
ea3cd5c7
DB
246 return fd;
247 }
248
249 orig_fd = open(path, O_RDONLY);
250 if (orig_fd < 0) {
251 if (errno != ENOENT) {
acd3b9ec 252 if (flags & LOCK_DIE_ON_ERROR)
ea3cd5c7 253 die("cannot open '%s' for copying", path);
ebb8e380 254 rollback_lock_file(lk);
ea3cd5c7
DB
255 return error("cannot open '%s' for copying", path);
256 }
257 } else if (copy_fd(orig_fd, fd)) {
acd3b9ec 258 if (flags & LOCK_DIE_ON_ERROR)
ea3cd5c7 259 exit(128);
ebb8e380 260 rollback_lock_file(lk);
ea3cd5c7
DB
261 return -1;
262 }
263 return fd;
264}
265
d6cf61bf
BC
266int close_lock_file(struct lock_file *lk)
267{
268 int fd = lk->fd;
419f0c0f
MH
269
270 if (fd < 0)
271 return 0;
272
d6cf61bf 273 lk->fd = -1;
8e86c155
MH
274 if (close(fd)) {
275 int save_errno = errno;
276 rollback_lock_file(lk);
277 errno = save_errno;
278 return -1;
279 }
280 return 0;
d6cf61bf
BC
281}
282
93dcaea2
JH
283int reopen_lock_file(struct lock_file *lk)
284{
285 if (0 <= lk->fd)
286 die(_("BUG: reopen a lockfile that is still open"));
707103fd 287 if (!lk->active)
93dcaea2 288 die(_("BUG: reopen a lockfile that has been committed"));
cf6950d3 289 lk->fd = open(lk->filename.buf, O_WRONLY);
93dcaea2
JH
290 return lk->fd;
291}
292
021b6e45
JH
293int commit_lock_file(struct lock_file *lk)
294{
3e88e8fc
MH
295 static struct strbuf result_file = STRBUF_INIT;
296 int err;
4f4713df 297
707103fd 298 if (!lk->active)
8a1c7533
MH
299 die("BUG: attempt to commit unlocked object");
300
419f0c0f 301 if (close_lock_file(lk))
d6cf61bf 302 return -1;
4f4713df 303
4f4713df 304 /* remove ".lock": */
cf6950d3
MH
305 strbuf_add(&result_file, lk->filename.buf,
306 lk->filename.len - LOCK_SUFFIX_LEN);
307 err = rename(lk->filename.buf, result_file.buf);
3e88e8fc
MH
308 strbuf_reset(&result_file);
309 if (err) {
1b1648f4
MH
310 int save_errno = errno;
311 rollback_lock_file(lk);
312 errno = save_errno;
d6cf61bf 313 return -1;
1b1648f4
MH
314 }
315
707103fd 316 lk->active = 0;
cf6950d3 317 strbuf_reset(&lk->filename);
d6cf61bf 318 return 0;
021b6e45
JH
319}
320
30ca07a2
JH
321int hold_locked_index(struct lock_file *lk, int die_on_error)
322{
acd3b9ec
JH
323 return hold_lock_file_for_update(lk, get_index_file(),
324 die_on_error
325 ? LOCK_DIE_ON_ERROR
326 : 0);
30ca07a2
JH
327}
328
021b6e45
JH
329void rollback_lock_file(struct lock_file *lk)
330{
707103fd 331 if (!lk->active)
9085f8e2
MH
332 return;
333
8e86c155 334 if (!close_lock_file(lk)) {
cf6950d3 335 unlink_or_warn(lk->filename.buf);
707103fd 336 lk->active = 0;
cf6950d3 337 strbuf_reset(&lk->filename);
8e86c155 338 }
021b6e45 339}