a
    &0É_v.  ã                   @   sâ   d dl mZ d dlZd dlZd dlZd dlZd dlZddlmZ ddl	m
Z
mZmZmZmZ e dd¡Ze d¡Zd	d
„ ZG dd„ deƒZddd„Zdd„ Zdd„ ZG dd„ deƒZe ed¡rÆejZedurÒeZejZejZdS )é    )Úabsolute_importNé   )Ú_)ÚencodingÚerrorÚpolicyÚpycompatÚutilZdirstateZDirsÚparsersc                 C   s   t  |  ¡ ¡S ©N)r   ZhfsignorecleanÚlower)Ús© r   ú4/usr/lib/python3/dist-packages/mercurial/pathutil.pyÚ_lowerclean   s    r   c                   @   sB   e Zd ZdZddd„Zddd„Zd	d
„ Zdd„ Zej	dd„ ƒZ
dS )Úpathauditora^  ensure that a filesystem path contains no banned components.
    the following properties of a path are checked:

    - ends with a directory separator
    - under top-level .hg
    - starts at the root of a windows drive
    - contains ".."

    More check are also done about the file system states:
    - traverses a symlink (e.g. a/symlink_here/b)
    - inside a nested repository (a callback can be used to approve
      some nested repositories, e.g., subrepositories)

    The file system checks are only done when 'realfs' is set to True (the
    default). They should be disable then we are auditing path for operation on
    stored history.

    If 'cached' is set to True, audited paths and sub-directories are cached.
    Be careful to not keep the cache of unmanaged directories for long because
    audited paths may be replaced with symlinks.
    NTFc                 C   sV   t ƒ | _t ƒ | _|| _|| _|| _|| _tj 	|¡rHt
 |¡sHt
j| _n
dd„ | _d S )Nc                 S   s   | S r   r   )Úxr   r   r   Ú<lambda>;   ó    z&pathauditor.__init__.<locals>.<lambda>)ÚsetÚauditedÚ
auditeddirÚrootÚ_realfsÚ_cachedÚcallbackÚosÚpathÚlexistsr	   ZfscasesensitiveÚnormcase)Úselfr   r   ZrealfsÚcachedr   r   r   Ú__init__1   s    
zpathauditor.__init__c                 C   s   t  |¡}|  |¡}|| jv r"dS t  |¡r>t tdƒ| ¡‚t  |¡}t	j
 |¡d srt|d ƒdv srtj|v r„t tdƒ| ¡‚|D ]B}d|v rˆ| dd¡\}}| ¡ rˆ| ¡ dv rˆt tdƒ| ¡‚qˆd	t|ƒv r<d
d„ |D ƒ}dD ]N}||dd… v rì| |¡}	t	j
j|d|	… Ž }
t tdƒ|t |
¡f ¡‚qìt  |¡}t|ƒt|ƒks\J ‚| ¡  | ¡  tt|ƒƒD ]n}tj |d|d … ¡}tj |d|d … ¡}|| jv r¼qx| jrÐ|  ||¡ | jrx| j |¡ qx| jrü| j |¡ dS )zPCheck the relative path.
        path may contain a pattern (e.g. foodir/**.txt)Ns$   path ends in directory separator: %sr   )ó   .hgó   .hg.r   s#   path contains illegal component: %só   ~r   )s   HGs   HG8B6Cr#   c                 S   s   g | ]}t |ƒ‘qS r   )r   )Ú.0Úpr   r   r   Ú
<listcomp>X   r   z(pathauditor.__call__.<locals>.<listcomp>)r#   r$   ó"   path '%s' is inside nested repo %r)r	   Z	localpathr   r   Úendswithsepr   ÚAbortr   Z	splitpathr   r   Ú
splitdriver   r   ZospardirÚsplitÚisdigitÚupperÚindexÚjoinÚbytestrÚlenÚpopÚrangeÚossepr   r   Ú_checkfsr   Úadd)r    r   ÚmodeÚnormpathÚpartsr'   ÚfirstZlastZlpartsÚposÚbaseZ	normpartsÚiÚprefixZ
normprefixr   r   r   Ú__call__=   s^    




ÿþý
ÿ
ÿÿ
zpathauditor.__call__c              
   C   sæ   t j | j|¡}zt  |¡}W n< tyZ } z$|jtjtjtj	fvrF‚ W Y d}~nd}~0 0 t
 |j¡rtdƒt |¡t |¡f }t |¡‚nRt
 |j¡rât j t j |d¡¡râ| jrÂ|  |¡sâtdƒ}t ||t |¡f ¡‚dS )z3raise exception if a file system backed check failsNs"   path %r traverses symbolic link %rr#   r)   )r   r   r1   r   ÚlstatÚOSErrorÚerrnoZENOENTZENOTDIRZEINVALÚstatÚS_ISLNKÚst_moder   r   r2   r   r+   ÚS_ISDIRÚisdirr   )r    r@   r   ZcurpathÚstÚerrÚmsgr   r   r   r7   y   s$    þÿzpathauditor._checkfsc              	   C   s.   z| |ƒ W dS  t tjfy(   Y dS 0 d S ©NTF)rC   r   r+   )r    r   r   r   r   Úcheck‘   s
    zpathauditor.checkc                 c   sZ   | j rd V  nHz*d| _ d V  W | j ¡  | j ¡  d| _ n| j ¡  | j ¡  d| _ 0 d S rM   )r   r   Úclearr   ©r    r   r   r   r!   ˜   s    

þ

zpathauditor.cached)NTF)N)Ú__name__Ú
__module__Ú__qualname__Ú__doc__r"   rA   r7   rN   Ú
contextlibÚcontextmanagerr!   r   r   r   r   r      s   

<r   c                 C   sª  t  | ¡r| }n
| tj }|}tj |¡s:tj | ||¡}tj |¡}|du rVt	| ƒ}||krŠ| 
|¡rŠ|t|ƒd… }||ƒ t  |¡S || kr–dS g }zt  || ¡}W n tyÀ   d}Y n0 |rô|sÎdS | ¡  tjj|Ž }||ƒ t  |¡S t  |¡\}}	| |	¡ ||krq |}qšd}
zP|| krrt| | ||ƒ t  | |d¡}| tj¡rf|dd… }tdƒ| }
W n tjyŠ   Y n0 tjtdƒ|| f |
d‚dS )aì  return the canonical path of myname, given cwd and root

    >>> def check(root, cwd, myname):
    ...     a = pathauditor(root, realfs=False)
    ...     try:
    ...         return canonpath(root, cwd, myname, a)
    ...     except error.Abort:
    ...         return 'aborted'
    >>> def unixonly(root, cwd, myname, expected='aborted'):
    ...     if pycompat.iswindows:
    ...         return expected
    ...     return check(root, cwd, myname)
    >>> def winonly(root, cwd, myname, expected='aborted'):
    ...     if not pycompat.iswindows:
    ...         return expected
    ...     return check(root, cwd, myname)
    >>> winonly(b'd:\\repo', b'c:\\dir', b'filename')
    'aborted'
    >>> winonly(b'c:\\repo', b'c:\\dir', b'filename')
    'aborted'
    >>> winonly(b'c:\\repo', b'c:\\', b'filename')
    'aborted'
    >>> winonly(b'c:\\repo', b'c:\\', b'repo\\filename',
    ...         b'filename')
    'filename'
    >>> winonly(b'c:\\repo', b'c:\\repo', b'filename', b'filename')
    'filename'
    >>> winonly(b'c:\\repo', b'c:\\repo\\subdir', b'filename',
    ...         b'subdir/filename')
    'subdir/filename'
    >>> unixonly(b'/repo', b'/dir', b'filename')
    'aborted'
    >>> unixonly(b'/repo', b'/', b'filename')
    'aborted'
    >>> unixonly(b'/repo', b'/', b'repo/filename', b'filename')
    'filename'
    >>> unixonly(b'/repo', b'/repo', b'filename', b'filename')
    'filename'
    >>> unixonly(b'/repo', b'/repo/subdir', b'filename', b'subdir/filename')
    'subdir/filename'
    Nr   Féÿÿÿÿs   consider using '--cwd %s's   %s not under root '%s')Úhint)r	   r*   r   r6   r   r   Úisabsr1   r:   r   Ú
startswithr3   ZpconvertÚsamefilerC   Úreverser-   ÚappendÚ	canonpathZpathtoÚendswithr   r   r+   )r   ÚcwdZmynameZauditorZrootsepÚnameZrelr   ÚdirnameÚbasenamerX   Úrelpathr   r   r   r^   ¦   sZ    *







ÿr^   c                 C   s4   t j | ¡\}}t|ƒttjƒkr,| tj S | S dS )aì  normalize the specified path as path prefix

    Returned value can be used safely for "p.startswith(prefix)",
    "p[len(prefix):]", and so on.

    For efficiency, this expects "path" argument to be already
    normalized by "os.path.normpath", "os.path.realpath", and so on.

    See also issue3033 for detail about need of this function.

    >>> normasprefix(b'/foo/bar').replace(pycompat.ossep, b'/')
    '/foo/bar/'
    >>> normasprefix(b'/').replace(pycompat.ossep, b'/')
    '/'
    N)r   r   r,   r3   r   r6   )r   Údr'   r   r   r   Únormasprefix  s    
rf   c                 c   s:   |   d¡}|dkr0| d |… V  |   dd|¡}q
dV  d S )Nó   /rW   r   r   )Úrfind)r   r=   r   r   r   Úfinddirs#  s
    
ri   c                   @   s:   e Zd ZdZddd„Zdd„ Zdd„ Zd	d
„ Zdd„ ZdS )Údirsz6a multiset of directory names from a set of file pathsNc                 C   sr   i | _ | j}t|tƒrH|durHt |¡D ]\}}|d |kr(||ƒ q(n&|dur\t d¡‚n|D ]}||ƒ q`dS )zS
        a dict map indicates a dirstate while a list indicates a manifest
        Nr   s3   skip character is only supported with a dict source)Ú_dirsÚaddpathÚ
isinstanceÚdictr   Z	iteritemsr   ZProgrammingError)r    ÚmapÚskiprl   Úfr   r   r   r   r"   .  s    ÿzdirs.__init__c                 C   sT   | j }t|ƒD ]@}| d¡r(td| ƒ‚||v rF||  d7  <  d S d||< qd S )Nrg   z-found invalid consecutive slashes in path: %rr   )rk   ri   r_   Ú
ValueError©r    r   rj   r>   r   r   r   rl   @  s    
ÿzdirs.addpathc                 C   s@   | j }t|ƒD ],}|| dkr4||  d8  <  d S ||= qd S )Nr   )rk   ri   rs   r   r   r   ÚdelpathL  s    zdirs.delpathc                 C   s
   t | jƒS r   )Úiterrk   rP   r   r   r   Ú__iter__T  s    zdirs.__iter__c                 C   s
   || j v S r   )rk   )r    re   r   r   r   Ú__contains__W  s    zdirs.__contains__)N)	rQ   rR   rS   rT   r"   rl   rt   rv   rw   r   r   r   r   rj   +  s   
rj   )N)Z
__future__r   rU   rD   r   Ú	posixpathrE   Zi18nr   Ú r   r   r   r   r	   Z
importrustZrustdirsZ	importmodr
   r   Úobjectr   r^   rf   ri   rj   Zsafehasattrr1   rb   r   r   r   r   Ú<module>   s,   
 
f0