2005-04-26 21:00:58 +02:00
|
|
|
#include "cache.h"
|
2009-03-21 22:35:51 +01:00
|
|
|
#include "refs.h"
|
2018-04-19 19:58:08 +02:00
|
|
|
#include "string-list.h"
|
2014-05-22 11:30:14 +02:00
|
|
|
#include "utf8.h"
|
date API: create a date.h, split from cache.h
Move the declaration of the date.c functions from cache.h, and adjust
the relevant users to include the new date.h header.
The show_ident_date() function belonged in pretty.h (it's defined in
pretty.c), its two users outside of pretty.c didn't strictly need to
include pretty.h, as they get it indirectly, but let's add it to them
anyway.
Similarly, the change to "builtin/{fast-import,show-branch,tag}.c"
isn't needed as far as the compiler is concerned, but since they all
use the "DATE_MODE()" macro we now define in date.h, let's have them
include it.
We could simply include this new header in "cache.h", but as this
change shows these functions weren't common enough to warrant
including in it in the first place. By moving them out of cache.h
changes to this API will no longer cause a (mostly) full re-build of
the project when "make" is run.
Signed-off-by: Ævar Arnfjörð Bjarmason <avarab@gmail.com>
Signed-off-by: Junio C Hamano <gitster@pobox.com>
2022-02-16 09:14:02 +01:00
|
|
|
#include "date.h"
|
2005-04-26 03:26:45 +02:00
|
|
|
|
2013-12-01 08:49:16 +01:00
|
|
|
int starts_with(const char *str, const char *prefix)
|
|
|
|
{
|
|
|
|
for (; ; str++, prefix++)
|
|
|
|
if (!*prefix)
|
|
|
|
return 1;
|
|
|
|
else if (*str != *prefix)
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2018-03-09 18:35:29 +01:00
|
|
|
int istarts_with(const char *str, const char *prefix)
|
|
|
|
{
|
|
|
|
for (; ; str++, prefix++)
|
|
|
|
if (!*prefix)
|
|
|
|
return 1;
|
|
|
|
else if (tolower(*str) != tolower(*prefix))
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2017-12-09 21:40:07 +01:00
|
|
|
int skip_to_optional_arg_default(const char *str, const char *prefix,
|
|
|
|
const char **arg, const char *def)
|
|
|
|
{
|
|
|
|
const char *p;
|
|
|
|
|
|
|
|
if (!skip_prefix(str, prefix, &p))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (!*p) {
|
|
|
|
if (arg)
|
|
|
|
*arg = def;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (*p != '=')
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (arg)
|
|
|
|
*arg = p + 1;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2007-09-27 12:58:23 +02:00
|
|
|
/*
|
|
|
|
* Used as the default ->buf value, so that people can always assume
|
|
|
|
* buf is non NULL and ->buf is NUL terminated even for a freshly
|
|
|
|
* initialized strbuf.
|
|
|
|
*/
|
|
|
|
char strbuf_slopbuf[1];
|
|
|
|
|
2007-09-15 15:56:50 +02:00
|
|
|
void strbuf_init(struct strbuf *sb, size_t hint)
|
|
|
|
{
|
2021-07-01 12:51:26 +02:00
|
|
|
struct strbuf blank = STRBUF_INIT;
|
|
|
|
memcpy(sb, &blank, sizeof(*sb));
|
strbuf_grow(): maintain nul-termination even for new buffer
In the case where sb is initialized to the slopbuf (through
strbuf_init(sb,0) or STRBUF_INIT), strbuf_grow() loses the terminating
nul: it grows the buffer, but gives ALLOC_GROW a NULL source to avoid
it being freed. So ALLOC_GROW does not copy anything to the new
memory area.
This subtly broke the call to strbuf_getline in read_next_command()
[fast-import.c:1855], which goes
strbuf_detach(&command_buf, NULL); # command_buf is now = STRBUF_INIT
stdin_eof = strbuf_getline(&command_buf, stdin, '\n');
if (stdin_eof)
return EOF;
In strbuf_getwholeline, this did
strbuf_grow(sb, 0); # loses nul-termination
if (feof(fp))
return EOF;
strbuf_reset(sb); # this would have nul-terminated!
Valgrind found this because fast-import subsequently uses prefixcmp()
on command_buf.buf, which after the EOF exit contains only
uninitialized memory.
Arguably strbuf_getwholeline is also broken, in that it touches the
buffer before deciding whether to do any work. However, it seems more
futureproof to not let the strbuf API lose the nul-termination by its
own fault.
So make sure that strbuf_grow() puts in a nul even if it has nowhere
to copy it from. This makes strbuf_grow(sb, 0) a semantic no-op as
far as readers of the buffer are concerned.
Also remove the nul-termination added by strbuf_init, which is made
redudant.
Signed-off-by: Thomas Rast <trast@student.ethz.ch>
Signed-off-by: Junio C Hamano <gitster@pobox.com>
2011-08-29 23:16:12 +02:00
|
|
|
if (hint)
|
2007-09-10 12:35:04 +02:00
|
|
|
strbuf_grow(sb, hint);
|
2005-04-26 03:26:45 +02:00
|
|
|
}
|
|
|
|
|
2007-09-15 15:56:50 +02:00
|
|
|
void strbuf_release(struct strbuf *sb)
|
|
|
|
{
|
2007-09-27 12:58:23 +02:00
|
|
|
if (sb->alloc) {
|
|
|
|
free(sb->buf);
|
|
|
|
strbuf_init(sb, 0);
|
|
|
|
}
|
2007-09-06 13:20:05 +02:00
|
|
|
}
|
|
|
|
|
2007-09-27 12:58:23 +02:00
|
|
|
char *strbuf_detach(struct strbuf *sb, size_t *sz)
|
2007-09-15 15:56:50 +02:00
|
|
|
{
|
2012-10-18 12:00:12 +02:00
|
|
|
char *res;
|
|
|
|
strbuf_grow(sb, 0);
|
|
|
|
res = sb->buf;
|
2007-09-27 12:58:23 +02:00
|
|
|
if (sz)
|
|
|
|
*sz = sb->len;
|
2007-09-10 12:35:04 +02:00
|
|
|
strbuf_init(sb, 0);
|
2007-09-06 13:20:05 +02:00
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2007-09-15 15:56:50 +02:00
|
|
|
void strbuf_attach(struct strbuf *sb, void *buf, size_t len, size_t alloc)
|
|
|
|
{
|
|
|
|
strbuf_release(sb);
|
|
|
|
sb->buf = buf;
|
|
|
|
sb->len = len;
|
|
|
|
sb->alloc = alloc;
|
|
|
|
strbuf_grow(sb, 0);
|
|
|
|
sb->buf[sb->len] = '\0';
|
|
|
|
}
|
|
|
|
|
|
|
|
void strbuf_grow(struct strbuf *sb, size_t extra)
|
|
|
|
{
|
strbuf_grow(): maintain nul-termination even for new buffer
In the case where sb is initialized to the slopbuf (through
strbuf_init(sb,0) or STRBUF_INIT), strbuf_grow() loses the terminating
nul: it grows the buffer, but gives ALLOC_GROW a NULL source to avoid
it being freed. So ALLOC_GROW does not copy anything to the new
memory area.
This subtly broke the call to strbuf_getline in read_next_command()
[fast-import.c:1855], which goes
strbuf_detach(&command_buf, NULL); # command_buf is now = STRBUF_INIT
stdin_eof = strbuf_getline(&command_buf, stdin, '\n');
if (stdin_eof)
return EOF;
In strbuf_getwholeline, this did
strbuf_grow(sb, 0); # loses nul-termination
if (feof(fp))
return EOF;
strbuf_reset(sb); # this would have nul-terminated!
Valgrind found this because fast-import subsequently uses prefixcmp()
on command_buf.buf, which after the EOF exit contains only
uninitialized memory.
Arguably strbuf_getwholeline is also broken, in that it touches the
buffer before deciding whether to do any work. However, it seems more
futureproof to not let the strbuf API lose the nul-termination by its
own fault.
So make sure that strbuf_grow() puts in a nul even if it has nowhere
to copy it from. This makes strbuf_grow(sb, 0) a semantic no-op as
far as readers of the buffer are concerned.
Also remove the nul-termination added by strbuf_init, which is made
redudant.
Signed-off-by: Thomas Rast <trast@student.ethz.ch>
Signed-off-by: Junio C Hamano <gitster@pobox.com>
2011-08-29 23:16:12 +02:00
|
|
|
int new_buf = !sb->alloc;
|
2010-10-11 04:59:26 +02:00
|
|
|
if (unsigned_add_overflows(extra, 1) ||
|
|
|
|
unsigned_add_overflows(sb->len, extra + 1))
|
2007-09-06 13:20:05 +02:00
|
|
|
die("you want to use way too much memory");
|
strbuf_grow(): maintain nul-termination even for new buffer
In the case where sb is initialized to the slopbuf (through
strbuf_init(sb,0) or STRBUF_INIT), strbuf_grow() loses the terminating
nul: it grows the buffer, but gives ALLOC_GROW a NULL source to avoid
it being freed. So ALLOC_GROW does not copy anything to the new
memory area.
This subtly broke the call to strbuf_getline in read_next_command()
[fast-import.c:1855], which goes
strbuf_detach(&command_buf, NULL); # command_buf is now = STRBUF_INIT
stdin_eof = strbuf_getline(&command_buf, stdin, '\n');
if (stdin_eof)
return EOF;
In strbuf_getwholeline, this did
strbuf_grow(sb, 0); # loses nul-termination
if (feof(fp))
return EOF;
strbuf_reset(sb); # this would have nul-terminated!
Valgrind found this because fast-import subsequently uses prefixcmp()
on command_buf.buf, which after the EOF exit contains only
uninitialized memory.
Arguably strbuf_getwholeline is also broken, in that it touches the
buffer before deciding whether to do any work. However, it seems more
futureproof to not let the strbuf API lose the nul-termination by its
own fault.
So make sure that strbuf_grow() puts in a nul even if it has nowhere
to copy it from. This makes strbuf_grow(sb, 0) a semantic no-op as
far as readers of the buffer are concerned.
Also remove the nul-termination added by strbuf_init, which is made
redudant.
Signed-off-by: Thomas Rast <trast@student.ethz.ch>
Signed-off-by: Junio C Hamano <gitster@pobox.com>
2011-08-29 23:16:12 +02:00
|
|
|
if (new_buf)
|
2007-09-27 12:58:23 +02:00
|
|
|
sb->buf = NULL;
|
2007-09-06 13:20:05 +02:00
|
|
|
ALLOC_GROW(sb->buf, sb->len + extra + 1, sb->alloc);
|
strbuf_grow(): maintain nul-termination even for new buffer
In the case where sb is initialized to the slopbuf (through
strbuf_init(sb,0) or STRBUF_INIT), strbuf_grow() loses the terminating
nul: it grows the buffer, but gives ALLOC_GROW a NULL source to avoid
it being freed. So ALLOC_GROW does not copy anything to the new
memory area.
This subtly broke the call to strbuf_getline in read_next_command()
[fast-import.c:1855], which goes
strbuf_detach(&command_buf, NULL); # command_buf is now = STRBUF_INIT
stdin_eof = strbuf_getline(&command_buf, stdin, '\n');
if (stdin_eof)
return EOF;
In strbuf_getwholeline, this did
strbuf_grow(sb, 0); # loses nul-termination
if (feof(fp))
return EOF;
strbuf_reset(sb); # this would have nul-terminated!
Valgrind found this because fast-import subsequently uses prefixcmp()
on command_buf.buf, which after the EOF exit contains only
uninitialized memory.
Arguably strbuf_getwholeline is also broken, in that it touches the
buffer before deciding whether to do any work. However, it seems more
futureproof to not let the strbuf API lose the nul-termination by its
own fault.
So make sure that strbuf_grow() puts in a nul even if it has nowhere
to copy it from. This makes strbuf_grow(sb, 0) a semantic no-op as
far as readers of the buffer are concerned.
Also remove the nul-termination added by strbuf_init, which is made
redudant.
Signed-off-by: Thomas Rast <trast@student.ethz.ch>
Signed-off-by: Junio C Hamano <gitster@pobox.com>
2011-08-29 23:16:12 +02:00
|
|
|
if (new_buf)
|
|
|
|
sb->buf[0] = '\0';
|
2007-09-06 13:20:05 +02:00
|
|
|
}
|
|
|
|
|
2008-07-13 20:29:18 +02:00
|
|
|
void strbuf_trim(struct strbuf *sb)
|
|
|
|
{
|
2014-04-30 10:58:06 +02:00
|
|
|
strbuf_rtrim(sb);
|
|
|
|
strbuf_ltrim(sb);
|
2008-07-13 20:29:18 +02:00
|
|
|
}
|
2018-02-12 10:49:37 +01:00
|
|
|
|
2007-09-10 12:35:04 +02:00
|
|
|
void strbuf_rtrim(struct strbuf *sb)
|
|
|
|
{
|
|
|
|
while (sb->len > 0 && isspace((unsigned char)sb->buf[sb->len - 1]))
|
|
|
|
sb->len--;
|
|
|
|
sb->buf[sb->len] = '\0';
|
|
|
|
}
|
|
|
|
|
2018-02-12 10:49:37 +01:00
|
|
|
void strbuf_trim_trailing_dir_sep(struct strbuf *sb)
|
|
|
|
{
|
|
|
|
while (sb->len > 0 && is_dir_sep((unsigned char)sb->buf[sb->len - 1]))
|
|
|
|
sb->len--;
|
|
|
|
sb->buf[sb->len] = '\0';
|
|
|
|
}
|
|
|
|
|
2018-08-08 17:06:16 +02:00
|
|
|
void strbuf_trim_trailing_newline(struct strbuf *sb)
|
|
|
|
{
|
|
|
|
if (sb->len > 0 && sb->buf[sb->len - 1] == '\n') {
|
|
|
|
if (--sb->len > 0 && sb->buf[sb->len - 1] == '\r')
|
|
|
|
--sb->len;
|
|
|
|
sb->buf[sb->len] = '\0';
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2008-07-13 20:29:18 +02:00
|
|
|
void strbuf_ltrim(struct strbuf *sb)
|
|
|
|
{
|
|
|
|
char *b = sb->buf;
|
|
|
|
while (sb->len > 0 && isspace(*b)) {
|
|
|
|
b++;
|
|
|
|
sb->len--;
|
|
|
|
}
|
|
|
|
memmove(sb->buf, b, sb->len);
|
|
|
|
sb->buf[sb->len] = '\0';
|
|
|
|
}
|
|
|
|
|
2014-05-22 11:30:14 +02:00
|
|
|
int strbuf_reencode(struct strbuf *sb, const char *from, const char *to)
|
|
|
|
{
|
|
|
|
char *out;
|
2018-07-24 12:50:33 +02:00
|
|
|
size_t len;
|
2014-05-22 11:30:14 +02:00
|
|
|
|
|
|
|
if (same_encoding(from, to))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
out = reencode_string_len(sb->buf, sb->len, to, from, &len);
|
|
|
|
if (!out)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
strbuf_attach(sb, out, len, len);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-05-23 22:03:47 +02:00
|
|
|
void strbuf_tolower(struct strbuf *sb)
|
|
|
|
{
|
|
|
|
char *p = sb->buf, *end = sb->buf + sb->len;
|
|
|
|
for (; p < end; p++)
|
|
|
|
*p = tolower(*p);
|
|
|
|
}
|
|
|
|
|
2012-11-04 07:46:53 +01:00
|
|
|
struct strbuf **strbuf_split_buf(const char *str, size_t slen,
|
|
|
|
int terminator, int max)
|
2008-07-13 20:29:18 +02:00
|
|
|
{
|
2012-11-04 07:46:51 +01:00
|
|
|
struct strbuf **ret = NULL;
|
|
|
|
size_t nr = 0, alloc = 0;
|
2008-07-13 20:29:18 +02:00
|
|
|
struct strbuf *t;
|
|
|
|
|
2012-11-04 07:46:52 +01:00
|
|
|
while (slen) {
|
|
|
|
int len = slen;
|
|
|
|
if (max <= 0 || nr + 1 < max) {
|
2012-11-04 07:46:53 +01:00
|
|
|
const char *end = memchr(str, terminator, slen);
|
2012-11-04 07:46:52 +01:00
|
|
|
if (end)
|
|
|
|
len = end - str + 1;
|
|
|
|
}
|
2008-07-13 20:29:18 +02:00
|
|
|
t = xmalloc(sizeof(struct strbuf));
|
|
|
|
strbuf_init(t, len);
|
2012-11-04 07:46:52 +01:00
|
|
|
strbuf_add(t, str, len);
|
2012-11-04 07:46:51 +01:00
|
|
|
ALLOC_GROW(ret, nr + 2, alloc);
|
|
|
|
ret[nr++] = t;
|
2012-11-04 07:46:52 +01:00
|
|
|
str += len;
|
|
|
|
slen -= len;
|
2008-07-13 20:29:18 +02:00
|
|
|
}
|
2012-11-04 07:46:51 +01:00
|
|
|
ALLOC_GROW(ret, nr + 1, alloc); /* In case string was empty */
|
|
|
|
ret[nr] = NULL;
|
2008-07-13 20:29:18 +02:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2018-04-19 19:58:08 +02:00
|
|
|
void strbuf_add_separated_string_list(struct strbuf *str,
|
|
|
|
const char *sep,
|
|
|
|
struct string_list *slist)
|
|
|
|
{
|
|
|
|
struct string_list_item *item;
|
|
|
|
int sep_needed = 0;
|
|
|
|
|
|
|
|
for_each_string_list_item(item, slist) {
|
|
|
|
if (sep_needed)
|
|
|
|
strbuf_addstr(str, sep);
|
|
|
|
strbuf_addstr(str, item->string);
|
|
|
|
sep_needed = 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2008-07-13 20:29:18 +02:00
|
|
|
void strbuf_list_free(struct strbuf **sbs)
|
|
|
|
{
|
|
|
|
struct strbuf **s = sbs;
|
|
|
|
|
2021-04-25 16:16:16 +02:00
|
|
|
if (!s)
|
|
|
|
return;
|
2008-07-13 20:29:18 +02:00
|
|
|
while (*s) {
|
|
|
|
strbuf_release(*s);
|
|
|
|
free(*s++);
|
|
|
|
}
|
|
|
|
free(sbs);
|
|
|
|
}
|
|
|
|
|
2008-07-13 20:28:24 +02:00
|
|
|
int strbuf_cmp(const struct strbuf *a, const struct strbuf *b)
|
2007-09-24 11:25:03 +02:00
|
|
|
{
|
2018-07-24 12:51:08 +02:00
|
|
|
size_t len = a->len < b->len ? a->len: b->len;
|
2009-03-19 23:27:32 +01:00
|
|
|
int cmp = memcmp(a->buf, b->buf, len);
|
|
|
|
if (cmp)
|
|
|
|
return cmp;
|
|
|
|
return a->len < b->len ? -1: a->len != b->len;
|
2007-09-24 11:25:03 +02:00
|
|
|
}
|
|
|
|
|
2007-09-15 15:56:50 +02:00
|
|
|
void strbuf_splice(struct strbuf *sb, size_t pos, size_t len,
|
|
|
|
const void *data, size_t dlen)
|
|
|
|
{
|
2010-10-11 04:59:26 +02:00
|
|
|
if (unsigned_add_overflows(pos, len))
|
2007-09-15 15:56:50 +02:00
|
|
|
die("you want to use way too much memory");
|
|
|
|
if (pos > sb->len)
|
|
|
|
die("`pos' is too far after the end of the buffer");
|
|
|
|
if (pos + len > sb->len)
|
|
|
|
die("`pos + len' is too far after the end of the buffer");
|
|
|
|
|
|
|
|
if (dlen >= len)
|
|
|
|
strbuf_grow(sb, dlen - len);
|
|
|
|
memmove(sb->buf + pos + dlen,
|
|
|
|
sb->buf + pos + len,
|
|
|
|
sb->len - pos - len);
|
|
|
|
memcpy(sb->buf + pos, data, dlen);
|
|
|
|
strbuf_setlen(sb, sb->len + dlen - len);
|
|
|
|
}
|
|
|
|
|
2007-09-20 00:42:12 +02:00
|
|
|
void strbuf_insert(struct strbuf *sb, size_t pos, const void *data, size_t len)
|
|
|
|
{
|
|
|
|
strbuf_splice(sb, pos, 0, data, len);
|
|
|
|
}
|
|
|
|
|
2019-02-26 00:16:07 +01:00
|
|
|
void strbuf_vinsertf(struct strbuf *sb, size_t pos, const char *fmt, va_list ap)
|
|
|
|
{
|
|
|
|
int len, len2;
|
|
|
|
char save;
|
|
|
|
va_list cp;
|
|
|
|
|
|
|
|
if (pos > sb->len)
|
|
|
|
die("`pos' is too far after the end of the buffer");
|
|
|
|
va_copy(cp, ap);
|
|
|
|
len = vsnprintf(sb->buf + sb->len, 0, fmt, cp);
|
|
|
|
va_end(cp);
|
|
|
|
if (len < 0)
|
|
|
|
BUG("your vsnprintf is broken (returned %d)", len);
|
|
|
|
if (!len)
|
|
|
|
return; /* nothing to do */
|
|
|
|
if (unsigned_add_overflows(sb->len, len))
|
|
|
|
die("you want to use way too much memory");
|
|
|
|
strbuf_grow(sb, len);
|
|
|
|
memmove(sb->buf + pos + len, sb->buf + pos, sb->len - pos);
|
|
|
|
/* vsnprintf() will append a NUL, overwriting one of our characters */
|
|
|
|
save = sb->buf[pos + len];
|
|
|
|
len2 = vsnprintf(sb->buf + pos, len + 1, fmt, ap);
|
|
|
|
sb->buf[pos + len] = save;
|
|
|
|
if (len2 != len)
|
|
|
|
BUG("your vsnprintf is broken (returns inconsistent lengths)");
|
|
|
|
strbuf_setlen(sb, sb->len + len);
|
|
|
|
}
|
|
|
|
|
|
|
|
void strbuf_insertf(struct strbuf *sb, size_t pos, const char *fmt, ...)
|
|
|
|
{
|
|
|
|
va_list ap;
|
|
|
|
va_start(ap, fmt);
|
|
|
|
strbuf_vinsertf(sb, pos, fmt, ap);
|
|
|
|
va_end(ap);
|
|
|
|
}
|
|
|
|
|
2007-09-20 00:42:12 +02:00
|
|
|
void strbuf_remove(struct strbuf *sb, size_t pos, size_t len)
|
|
|
|
{
|
2016-09-13 18:40:22 +02:00
|
|
|
strbuf_splice(sb, pos, len, "", 0);
|
2007-09-20 00:42:12 +02:00
|
|
|
}
|
|
|
|
|
2007-09-15 15:56:50 +02:00
|
|
|
void strbuf_add(struct strbuf *sb, const void *data, size_t len)
|
|
|
|
{
|
2007-09-06 13:20:05 +02:00
|
|
|
strbuf_grow(sb, len);
|
|
|
|
memcpy(sb->buf + sb->len, data, len);
|
|
|
|
strbuf_setlen(sb, sb->len + len);
|
|
|
|
}
|
|
|
|
|
2016-07-21 18:46:44 +02:00
|
|
|
void strbuf_addbuf(struct strbuf *sb, const struct strbuf *sb2)
|
|
|
|
{
|
|
|
|
strbuf_grow(sb, sb2->len);
|
|
|
|
memcpy(sb->buf + sb->len, sb2->buf, sb2->len);
|
|
|
|
strbuf_setlen(sb, sb->len + sb2->len);
|
|
|
|
}
|
|
|
|
|
2019-02-26 00:16:06 +01:00
|
|
|
const char *strbuf_join_argv(struct strbuf *buf,
|
|
|
|
int argc, const char **argv, char delim)
|
|
|
|
{
|
|
|
|
if (!argc)
|
|
|
|
return buf->buf;
|
|
|
|
|
|
|
|
strbuf_addstr(buf, *argv);
|
|
|
|
while (--argc) {
|
|
|
|
strbuf_addch(buf, delim);
|
|
|
|
strbuf_addstr(buf, *(++argv));
|
|
|
|
}
|
|
|
|
|
|
|
|
return buf->buf;
|
|
|
|
}
|
|
|
|
|
2014-09-07 09:03:32 +02:00
|
|
|
void strbuf_addchars(struct strbuf *sb, int c, size_t n)
|
|
|
|
{
|
|
|
|
strbuf_grow(sb, n);
|
|
|
|
memset(sb->buf + sb->len, c, n);
|
|
|
|
strbuf_setlen(sb, sb->len + n);
|
|
|
|
}
|
|
|
|
|
2007-09-15 15:56:50 +02:00
|
|
|
void strbuf_addf(struct strbuf *sb, const char *fmt, ...)
|
|
|
|
{
|
2007-09-06 13:20:05 +02:00
|
|
|
va_list ap;
|
2011-02-26 06:08:53 +01:00
|
|
|
va_start(ap, fmt);
|
|
|
|
strbuf_vaddf(sb, fmt, ap);
|
|
|
|
va_end(ap);
|
|
|
|
}
|
|
|
|
|
2013-01-16 20:18:48 +01:00
|
|
|
static void add_lines(struct strbuf *out,
|
|
|
|
const char *prefix1,
|
|
|
|
const char *prefix2,
|
|
|
|
const char *buf, size_t size)
|
|
|
|
{
|
|
|
|
while (size) {
|
|
|
|
const char *prefix;
|
|
|
|
const char *next = memchr(buf, '\n', size);
|
|
|
|
next = next ? (next + 1) : (buf + size);
|
|
|
|
|
2014-10-27 22:13:15 +01:00
|
|
|
prefix = ((prefix2 && (buf[0] == '\n' || buf[0] == '\t'))
|
|
|
|
? prefix2 : prefix1);
|
2013-01-16 20:18:48 +01:00
|
|
|
strbuf_addstr(out, prefix);
|
|
|
|
strbuf_add(out, buf, next - buf);
|
|
|
|
size -= next - buf;
|
|
|
|
buf = next;
|
|
|
|
}
|
|
|
|
strbuf_complete_line(out);
|
|
|
|
}
|
|
|
|
|
|
|
|
void strbuf_add_commented_lines(struct strbuf *out, const char *buf, size_t size)
|
|
|
|
{
|
|
|
|
static char prefix1[3];
|
|
|
|
static char prefix2[2];
|
|
|
|
|
|
|
|
if (prefix1[0] != comment_line_char) {
|
2015-09-24 23:06:08 +02:00
|
|
|
xsnprintf(prefix1, sizeof(prefix1), "%c ", comment_line_char);
|
|
|
|
xsnprintf(prefix2, sizeof(prefix2), "%c", comment_line_char);
|
2013-01-16 20:18:48 +01:00
|
|
|
}
|
|
|
|
add_lines(out, prefix1, prefix2, buf, size);
|
|
|
|
}
|
|
|
|
|
|
|
|
void strbuf_commented_addf(struct strbuf *sb, const char *fmt, ...)
|
|
|
|
{
|
|
|
|
va_list params;
|
|
|
|
struct strbuf buf = STRBUF_INIT;
|
|
|
|
int incomplete_line = sb->len && sb->buf[sb->len - 1] != '\n';
|
|
|
|
|
|
|
|
va_start(params, fmt);
|
|
|
|
strbuf_vaddf(&buf, fmt, params);
|
|
|
|
va_end(params);
|
|
|
|
|
|
|
|
strbuf_add_commented_lines(sb, buf.buf, buf.len);
|
|
|
|
if (incomplete_line)
|
|
|
|
sb->buf[--sb->len] = '\0';
|
|
|
|
|
|
|
|
strbuf_release(&buf);
|
|
|
|
}
|
|
|
|
|
2011-02-26 06:08:53 +01:00
|
|
|
void strbuf_vaddf(struct strbuf *sb, const char *fmt, va_list ap)
|
|
|
|
{
|
|
|
|
int len;
|
|
|
|
va_list cp;
|
2007-09-06 13:20:05 +02:00
|
|
|
|
2007-11-13 09:22:44 +01:00
|
|
|
if (!strbuf_avail(sb))
|
|
|
|
strbuf_grow(sb, 64);
|
2011-02-26 06:08:53 +01:00
|
|
|
va_copy(cp, ap);
|
|
|
|
len = vsnprintf(sb->buf + sb->len, sb->alloc - sb->len, fmt, cp);
|
|
|
|
va_end(cp);
|
2007-11-13 09:22:44 +01:00
|
|
|
if (len < 0)
|
2018-05-02 11:38:39 +02:00
|
|
|
BUG("your vsnprintf is broken (returned %d)", len);
|
2007-09-10 12:35:04 +02:00
|
|
|
if (len > strbuf_avail(sb)) {
|
2007-09-06 13:20:05 +02:00
|
|
|
strbuf_grow(sb, len);
|
|
|
|
len = vsnprintf(sb->buf + sb->len, sb->alloc - sb->len, fmt, ap);
|
2011-02-26 06:08:53 +01:00
|
|
|
if (len > strbuf_avail(sb))
|
2018-05-02 11:38:39 +02:00
|
|
|
BUG("your vsnprintf is broken (insatiable)");
|
2007-09-06 13:20:05 +02:00
|
|
|
}
|
|
|
|
strbuf_setlen(sb, sb->len + len);
|
2005-04-26 03:26:45 +02:00
|
|
|
}
|
|
|
|
|
2008-02-09 15:40:19 +01:00
|
|
|
void strbuf_expand(struct strbuf *sb, const char *format, expand_fn_t fn,
|
|
|
|
void *context)
|
2007-11-09 01:49:42 +01:00
|
|
|
{
|
|
|
|
for (;;) {
|
2008-02-09 15:40:19 +01:00
|
|
|
const char *percent;
|
|
|
|
size_t consumed;
|
2007-11-09 01:49:42 +01:00
|
|
|
|
|
|
|
percent = strchrnul(format, '%');
|
|
|
|
strbuf_add(sb, format, percent - format);
|
|
|
|
if (!*percent)
|
|
|
|
break;
|
|
|
|
format = percent + 1;
|
|
|
|
|
2010-01-13 18:35:31 +01:00
|
|
|
if (*format == '%') {
|
|
|
|
strbuf_addch(sb, '%');
|
|
|
|
format++;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2008-02-09 15:40:19 +01:00
|
|
|
consumed = fn(sb, format, context);
|
|
|
|
if (consumed)
|
|
|
|
format += consumed;
|
|
|
|
else
|
2007-11-09 01:49:42 +01:00
|
|
|
strbuf_addch(sb, '%');
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-01-28 22:33:36 +01:00
|
|
|
size_t strbuf_expand_literal_cb(struct strbuf *sb,
|
|
|
|
const char *placeholder,
|
|
|
|
void *context)
|
|
|
|
{
|
|
|
|
int ch;
|
|
|
|
|
|
|
|
switch (placeholder[0]) {
|
|
|
|
case 'n': /* newline */
|
|
|
|
strbuf_addch(sb, '\n');
|
|
|
|
return 1;
|
|
|
|
case 'x':
|
|
|
|
/* %x00 == NUL, %x0a == LF, etc. */
|
|
|
|
ch = hex2chr(placeholder + 1);
|
|
|
|
if (ch < 0)
|
|
|
|
return 0;
|
|
|
|
strbuf_addch(sb, ch);
|
|
|
|
return 3;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2008-11-23 00:09:30 +01:00
|
|
|
size_t strbuf_expand_dict_cb(struct strbuf *sb, const char *placeholder,
|
|
|
|
void *context)
|
|
|
|
{
|
|
|
|
struct strbuf_expand_dict_entry *e = context;
|
|
|
|
size_t len;
|
|
|
|
|
|
|
|
for (; e->placeholder && (len = strlen(e->placeholder)); e++) {
|
|
|
|
if (!strncmp(placeholder, e->placeholder, len)) {
|
|
|
|
if (e->value)
|
|
|
|
strbuf_addstr(sb, e->value);
|
|
|
|
return len;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2010-01-13 18:36:42 +01:00
|
|
|
void strbuf_addbuf_percentquote(struct strbuf *dst, const struct strbuf *src)
|
|
|
|
{
|
2018-07-24 12:51:08 +02:00
|
|
|
size_t i, len = src->len;
|
2010-01-13 18:36:42 +01:00
|
|
|
|
|
|
|
for (i = 0; i < len; i++) {
|
|
|
|
if (src->buf[i] == '%')
|
|
|
|
strbuf_addch(dst, '%');
|
|
|
|
strbuf_addch(dst, src->buf[i]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
credential: fix matching URLs with multiple levels in path
46fd7b3900 ("credential: allow wildcard patterns when matching config",
2020-02-20) introduced support for matching credential helpers using
urlmatch. In doing so, it introduced code to percent-encode the paths
we get from the credential helper so that they could be effectively
matched by the urlmatch code.
Unfortunately, that code had a bug: it percent-encoded the slashes in
the path, resulting in any URL path that contained multiple levels
(i.e., a directory component) not matching.
We are currently the only caller of the percent-encoding code and could
simply change it not to encode slashes. However, we still want to
encode slashes in the username component, so we need to have both
behaviors available.
So instead, let's add a flag to control encoding slashes, which is the
behavior we want here, and use it when calling the code in this case.
Add a test for credential helper URLs using multiple slashes in the
path, which our test suite previously lacked, as well as one ensuring
that we handle usernames with slashes gracefully. Since we're testing
other percent-encoding handling, let's add one for non-ASCII UTF-8
characters as well.
Reported-by: Ilya Tretyakov <it@it3xl.ru>
Signed-off-by: Carlo Marcelo Arenas Belón <carenas@gmail.com>
Signed-off-by: brian m. carlson <sandals@crustytoothpaste.net>
Signed-off-by: Junio C Hamano <gitster@pobox.com>
2020-04-27 03:18:08 +02:00
|
|
|
#define URL_UNSAFE_CHARS " <>\"%{}|\\^`:?#[]@!$&'()*+,;="
|
credential: allow wildcard patterns when matching config
In some cases, a user will want to use a specific credential helper for
a wildcard pattern, such as https://*.corp.example.com. We have code
that handles this already with the urlmatch code, so let's use that
instead of our custom code.
Since the urlmatch code is a superset of our current matching in terms
of capabilities, there shouldn't be any cases of things that matched
previously that don't match now. However, in addition to wildcard
matching, we now use partial path matching, which can cause slightly
different behavior in the case that a helper applies to the prefix
(considering path components) of the remote URL. While different, this
is probably the behavior people were wanting anyway.
Since we're using the urlmatch code, we need to encode the components
we've gotten into a URL to match, so add a function to percent-encode
data and format the URL with it. We now also no longer need to the
custom code to match URLs, so let's remove it.
Additionally, the urlmatch code always looks for the best match, whereas
we want all matches for credential helpers to preserve existing
behavior. Let's add an optional field, select_fn, that lets us control
which items we want (in this case, all of them) and default it to the
best-match code that already exists for other users.
Signed-off-by: brian m. carlson <bk2204@github.com>
Signed-off-by: Junio C Hamano <gitster@pobox.com>
2020-02-20 03:24:13 +01:00
|
|
|
|
credential: fix matching URLs with multiple levels in path
46fd7b3900 ("credential: allow wildcard patterns when matching config",
2020-02-20) introduced support for matching credential helpers using
urlmatch. In doing so, it introduced code to percent-encode the paths
we get from the credential helper so that they could be effectively
matched by the urlmatch code.
Unfortunately, that code had a bug: it percent-encoded the slashes in
the path, resulting in any URL path that contained multiple levels
(i.e., a directory component) not matching.
We are currently the only caller of the percent-encoding code and could
simply change it not to encode slashes. However, we still want to
encode slashes in the username component, so we need to have both
behaviors available.
So instead, let's add a flag to control encoding slashes, which is the
behavior we want here, and use it when calling the code in this case.
Add a test for credential helper URLs using multiple slashes in the
path, which our test suite previously lacked, as well as one ensuring
that we handle usernames with slashes gracefully. Since we're testing
other percent-encoding handling, let's add one for non-ASCII UTF-8
characters as well.
Reported-by: Ilya Tretyakov <it@it3xl.ru>
Signed-off-by: Carlo Marcelo Arenas Belón <carenas@gmail.com>
Signed-off-by: brian m. carlson <sandals@crustytoothpaste.net>
Signed-off-by: Junio C Hamano <gitster@pobox.com>
2020-04-27 03:18:08 +02:00
|
|
|
void strbuf_add_percentencode(struct strbuf *dst, const char *src, int flags)
|
credential: allow wildcard patterns when matching config
In some cases, a user will want to use a specific credential helper for
a wildcard pattern, such as https://*.corp.example.com. We have code
that handles this already with the urlmatch code, so let's use that
instead of our custom code.
Since the urlmatch code is a superset of our current matching in terms
of capabilities, there shouldn't be any cases of things that matched
previously that don't match now. However, in addition to wildcard
matching, we now use partial path matching, which can cause slightly
different behavior in the case that a helper applies to the prefix
(considering path components) of the remote URL. While different, this
is probably the behavior people were wanting anyway.
Since we're using the urlmatch code, we need to encode the components
we've gotten into a URL to match, so add a function to percent-encode
data and format the URL with it. We now also no longer need to the
custom code to match URLs, so let's remove it.
Additionally, the urlmatch code always looks for the best match, whereas
we want all matches for credential helpers to preserve existing
behavior. Let's add an optional field, select_fn, that lets us control
which items we want (in this case, all of them) and default it to the
best-match code that already exists for other users.
Signed-off-by: brian m. carlson <bk2204@github.com>
Signed-off-by: Junio C Hamano <gitster@pobox.com>
2020-02-20 03:24:13 +01:00
|
|
|
{
|
|
|
|
size_t i, len = strlen(src);
|
|
|
|
|
|
|
|
for (i = 0; i < len; i++) {
|
|
|
|
unsigned char ch = src[i];
|
credential: fix matching URLs with multiple levels in path
46fd7b3900 ("credential: allow wildcard patterns when matching config",
2020-02-20) introduced support for matching credential helpers using
urlmatch. In doing so, it introduced code to percent-encode the paths
we get from the credential helper so that they could be effectively
matched by the urlmatch code.
Unfortunately, that code had a bug: it percent-encoded the slashes in
the path, resulting in any URL path that contained multiple levels
(i.e., a directory component) not matching.
We are currently the only caller of the percent-encoding code and could
simply change it not to encode slashes. However, we still want to
encode slashes in the username component, so we need to have both
behaviors available.
So instead, let's add a flag to control encoding slashes, which is the
behavior we want here, and use it when calling the code in this case.
Add a test for credential helper URLs using multiple slashes in the
path, which our test suite previously lacked, as well as one ensuring
that we handle usernames with slashes gracefully. Since we're testing
other percent-encoding handling, let's add one for non-ASCII UTF-8
characters as well.
Reported-by: Ilya Tretyakov <it@it3xl.ru>
Signed-off-by: Carlo Marcelo Arenas Belón <carenas@gmail.com>
Signed-off-by: brian m. carlson <sandals@crustytoothpaste.net>
Signed-off-by: Junio C Hamano <gitster@pobox.com>
2020-04-27 03:18:08 +02:00
|
|
|
if (ch <= 0x1F || ch >= 0x7F ||
|
|
|
|
(ch == '/' && (flags & STRBUF_ENCODE_SLASH)) ||
|
|
|
|
strchr(URL_UNSAFE_CHARS, ch))
|
credential: allow wildcard patterns when matching config
In some cases, a user will want to use a specific credential helper for
a wildcard pattern, such as https://*.corp.example.com. We have code
that handles this already with the urlmatch code, so let's use that
instead of our custom code.
Since the urlmatch code is a superset of our current matching in terms
of capabilities, there shouldn't be any cases of things that matched
previously that don't match now. However, in addition to wildcard
matching, we now use partial path matching, which can cause slightly
different behavior in the case that a helper applies to the prefix
(considering path components) of the remote URL. While different, this
is probably the behavior people were wanting anyway.
Since we're using the urlmatch code, we need to encode the components
we've gotten into a URL to match, so add a function to percent-encode
data and format the URL with it. We now also no longer need to the
custom code to match URLs, so let's remove it.
Additionally, the urlmatch code always looks for the best match, whereas
we want all matches for credential helpers to preserve existing
behavior. Let's add an optional field, select_fn, that lets us control
which items we want (in this case, all of them) and default it to the
best-match code that already exists for other users.
Signed-off-by: brian m. carlson <bk2204@github.com>
Signed-off-by: Junio C Hamano <gitster@pobox.com>
2020-02-20 03:24:13 +01:00
|
|
|
strbuf_addf(dst, "%%%02X", (unsigned char)ch);
|
|
|
|
else
|
|
|
|
strbuf_addch(dst, ch);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2007-09-15 15:56:50 +02:00
|
|
|
size_t strbuf_fread(struct strbuf *sb, size_t size, FILE *f)
|
|
|
|
{
|
2007-09-06 13:20:05 +02:00
|
|
|
size_t res;
|
2009-01-06 21:41:14 +01:00
|
|
|
size_t oldalloc = sb->alloc;
|
2007-09-06 13:20:05 +02:00
|
|
|
|
|
|
|
strbuf_grow(sb, size);
|
|
|
|
res = fread(sb->buf + sb->len, 1, size, f);
|
2009-01-06 21:41:14 +01:00
|
|
|
if (res > 0)
|
2007-09-06 13:20:05 +02:00
|
|
|
strbuf_setlen(sb, sb->len + res);
|
2009-06-22 18:42:33 +02:00
|
|
|
else if (oldalloc == 0)
|
2009-01-06 21:41:14 +01:00
|
|
|
strbuf_release(sb);
|
2007-09-06 13:20:05 +02:00
|
|
|
return res;
|
2005-04-26 03:26:45 +02:00
|
|
|
}
|
|
|
|
|
2007-09-10 12:35:04 +02:00
|
|
|
ssize_t strbuf_read(struct strbuf *sb, int fd, size_t hint)
|
2007-09-06 13:20:05 +02:00
|
|
|
{
|
|
|
|
size_t oldlen = sb->len;
|
2009-01-06 21:41:14 +01:00
|
|
|
size_t oldalloc = sb->alloc;
|
2007-09-06 13:20:05 +02:00
|
|
|
|
2007-09-10 12:35:04 +02:00
|
|
|
strbuf_grow(sb, hint ? hint : 8192);
|
2007-09-06 13:20:05 +02:00
|
|
|
for (;;) {
|
2015-05-31 20:16:45 +02:00
|
|
|
ssize_t want = sb->alloc - sb->len - 1;
|
|
|
|
ssize_t got = read_in_full(fd, sb->buf + sb->len, want);
|
2007-09-06 13:20:05 +02:00
|
|
|
|
2015-05-31 20:16:45 +02:00
|
|
|
if (got < 0) {
|
2009-01-06 21:41:14 +01:00
|
|
|
if (oldalloc == 0)
|
|
|
|
strbuf_release(sb);
|
|
|
|
else
|
|
|
|
strbuf_setlen(sb, oldlen);
|
2007-09-06 13:20:05 +02:00
|
|
|
return -1;
|
|
|
|
}
|
2015-05-31 20:16:45 +02:00
|
|
|
sb->len += got;
|
|
|
|
if (got < want)
|
2007-09-06 13:20:05 +02:00
|
|
|
break;
|
2007-09-10 12:35:04 +02:00
|
|
|
strbuf_grow(sb, 8192);
|
2007-09-06 13:20:05 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
sb->buf[sb->len] = '\0';
|
|
|
|
return sb->len - oldlen;
|
2005-04-26 03:26:45 +02:00
|
|
|
}
|
|
|
|
|
2015-12-16 01:04:08 +01:00
|
|
|
ssize_t strbuf_read_once(struct strbuf *sb, int fd, size_t hint)
|
|
|
|
{
|
2017-12-07 21:51:26 +01:00
|
|
|
size_t oldalloc = sb->alloc;
|
2015-12-16 01:04:08 +01:00
|
|
|
ssize_t cnt;
|
|
|
|
|
|
|
|
strbuf_grow(sb, hint ? hint : 8192);
|
|
|
|
cnt = xread(fd, sb->buf + sb->len, sb->alloc - sb->len - 1);
|
|
|
|
if (cnt > 0)
|
|
|
|
strbuf_setlen(sb, sb->len + cnt);
|
2017-12-07 21:51:26 +01:00
|
|
|
else if (oldalloc == 0)
|
|
|
|
strbuf_release(sb);
|
2015-12-16 01:04:08 +01:00
|
|
|
return cnt;
|
|
|
|
}
|
|
|
|
|
2016-03-01 03:07:15 +01:00
|
|
|
ssize_t strbuf_write(struct strbuf *sb, FILE *f)
|
|
|
|
{
|
|
|
|
return sb->len ? fwrite(sb->buf, 1, sb->len, f) : 0;
|
|
|
|
}
|
|
|
|
|
2008-12-17 18:36:40 +01:00
|
|
|
#define STRBUF_MAXLINK (2*PATH_MAX)
|
|
|
|
|
|
|
|
int strbuf_readlink(struct strbuf *sb, const char *path, size_t hint)
|
|
|
|
{
|
2009-01-06 21:41:14 +01:00
|
|
|
size_t oldalloc = sb->alloc;
|
|
|
|
|
2008-12-17 18:36:40 +01:00
|
|
|
if (hint < 32)
|
|
|
|
hint = 32;
|
|
|
|
|
|
|
|
while (hint < STRBUF_MAXLINK) {
|
2018-07-24 12:51:25 +02:00
|
|
|
ssize_t len;
|
2008-12-17 18:36:40 +01:00
|
|
|
|
|
|
|
strbuf_grow(sb, hint);
|
|
|
|
len = readlink(path, sb->buf, hint);
|
|
|
|
if (len < 0) {
|
|
|
|
if (errno != ERANGE)
|
|
|
|
break;
|
|
|
|
} else if (len < hint) {
|
|
|
|
strbuf_setlen(sb, len);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* .. the buffer was too small - try again */
|
|
|
|
hint *= 2;
|
|
|
|
}
|
2009-01-06 21:41:14 +01:00
|
|
|
if (oldalloc == 0)
|
|
|
|
strbuf_release(sb);
|
2008-12-17 18:36:40 +01:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2014-07-28 20:24:29 +02:00
|
|
|
int strbuf_getcwd(struct strbuf *sb)
|
|
|
|
{
|
|
|
|
size_t oldalloc = sb->alloc;
|
|
|
|
size_t guessed_len = 128;
|
|
|
|
|
|
|
|
for (;; guessed_len *= 2) {
|
|
|
|
strbuf_grow(sb, guessed_len);
|
|
|
|
if (getcwd(sb->buf, sb->alloc)) {
|
|
|
|
strbuf_setlen(sb, strlen(sb->buf));
|
|
|
|
return 0;
|
|
|
|
}
|
2017-03-26 15:43:50 +02:00
|
|
|
|
|
|
|
/*
|
|
|
|
* If getcwd(3) is implemented as a syscall that falls
|
|
|
|
* back to a regular lookup using readdir(3) etc. then
|
|
|
|
* we may be able to avoid EACCES by providing enough
|
|
|
|
* space to the syscall as it's not necessarily bound
|
|
|
|
* to the same restrictions as the fallback.
|
|
|
|
*/
|
|
|
|
if (errno == EACCES && guessed_len < PATH_MAX)
|
|
|
|
continue;
|
|
|
|
|
2014-07-28 20:24:29 +02:00
|
|
|
if (errno != ERANGE)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (oldalloc == 0)
|
|
|
|
strbuf_release(sb);
|
|
|
|
else
|
|
|
|
strbuf_reset(sb);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2015-04-16 11:01:38 +02:00
|
|
|
#ifdef HAVE_GETDELIM
|
|
|
|
int strbuf_getwholeline(struct strbuf *sb, FILE *fp, int term)
|
|
|
|
{
|
|
|
|
ssize_t r;
|
|
|
|
|
|
|
|
if (feof(fp))
|
|
|
|
return EOF;
|
|
|
|
|
|
|
|
strbuf_reset(sb);
|
|
|
|
|
|
|
|
/* Translate slopbuf to NULL, as we cannot call realloc on it */
|
|
|