blob: 6736a017b2fce59608dac7318cbafac518045c3c [file] [log] [blame]
Lars Hjemli7640d902006-12-10 22:41:14 +01001/* cache.c: cache management
2 *
Lukas Fleischerf7f26f82014-01-08 15:10:49 +01003 * Copyright (C) 2006-2014 cgit Development Team <cgit@lists.zx2c4.com>
Lars Hjemli7640d902006-12-10 22:41:14 +01004 *
5 * Licensed under GNU General Public License v2
6 * (see COPYING for full license text)
Lars Hjemli939d32f2008-04-28 11:32:42 +02007 *
8 *
9 * The cache is just a directory structure where each file is a cache slot,
10 * and each filename is based on the hash of some key (e.g. the cgit url).
11 * Each file contains the full key followed by the cached content for that
12 * key.
13 *
Lars Hjemli7640d902006-12-10 22:41:14 +010014 */
15
Lars Hjemli25105d72006-12-10 22:31:36 +010016#include "cgit.h"
Lars Hjemliee4056b2008-03-27 09:22:13 +010017#include "cache.h"
John Keepingf32a2da2013-05-18 18:46:39 +010018#include "html.h"
John Keeping43620cf2015-08-13 12:14:17 +010019#ifdef HAVE_LINUX_SENDFILE
20#include <sys/sendfile.h>
21#endif
Lars Hjemli25105d72006-12-10 22:31:36 +010022
Lars Hjemli939d32f2008-04-28 11:32:42 +020023#define CACHE_BUFSIZE (1024 * 4)
Lars Hjemli25105d72006-12-10 22:31:36 +010024
Lars Hjemli939d32f2008-04-28 11:32:42 +020025struct cache_slot {
26 const char *key;
John Keeping3fbfced2016-01-16 11:03:06 +000027 size_t keylen;
Lars Hjemli939d32f2008-04-28 11:32:42 +020028 int ttl;
29 cache_fill_fn fn;
Lars Hjemli939d32f2008-04-28 11:32:42 +020030 int cache_fd;
31 int lock_fd;
32 const char *cache_name;
33 const char *lock_name;
34 int match;
35 struct stat cache_st;
Lars Hjemli939d32f2008-04-28 11:32:42 +020036 int bufsize;
37 char buf[CACHE_BUFSIZE];
38};
39
40/* Open an existing cache slot and fill the cache buffer with
41 * (part of) the content of the cache file. Return 0 on success
42 * and errno otherwise.
43 */
44static int open_slot(struct cache_slot *slot)
Lars Hjemli2c2047f2007-01-12 00:24:35 +010045{
Lars Hjemli939d32f2008-04-28 11:32:42 +020046 char *bufz;
John Keeping3fbfced2016-01-16 11:03:06 +000047 ssize_t bufkeylen = -1;
Lars Hjemli2c2047f2007-01-12 00:24:35 +010048
Lars Hjemli939d32f2008-04-28 11:32:42 +020049 slot->cache_fd = open(slot->cache_name, O_RDONLY);
50 if (slot->cache_fd == -1)
51 return errno;
Lars Hjemli72fa5c62007-05-18 03:54:15 +020052
Lars Hjemli939d32f2008-04-28 11:32:42 +020053 if (fstat(slot->cache_fd, &slot->cache_st))
54 return errno;
55
Lars Hjemlicdc6b2f2008-05-18 23:26:05 +020056 slot->bufsize = xread(slot->cache_fd, slot->buf, sizeof(slot->buf));
Lars Hjemli6102bcf2008-05-18 23:10:05 +020057 if (slot->bufsize < 0)
Lars Hjemli939d32f2008-04-28 11:32:42 +020058 return errno;
59
60 bufz = memchr(slot->buf, 0, slot->bufsize);
61 if (bufz)
62 bufkeylen = bufz - slot->buf;
63
John Keeping33bc9492016-01-16 11:03:07 +000064 if (slot->key)
65 slot->match = bufkeylen == slot->keylen &&
66 !memcmp(slot->key, slot->buf, bufkeylen + 1);
Lars Hjemli939d32f2008-04-28 11:32:42 +020067
68 return 0;
Lars Hjemli2c2047f2007-01-12 00:24:35 +010069}
70
Lars Hjemli939d32f2008-04-28 11:32:42 +020071/* Close the active cache slot */
Lars Hjemlid4028112008-05-18 23:16:50 +020072static int close_slot(struct cache_slot *slot)
Lars Hjemlif5069d82006-12-11 09:57:58 +010073{
Lars Hjemlid4028112008-05-18 23:16:50 +020074 int err = 0;
Lars Hjemli939d32f2008-04-28 11:32:42 +020075 if (slot->cache_fd > 0) {
Lars Hjemlid4028112008-05-18 23:16:50 +020076 if (close(slot->cache_fd))
77 err = errno;
78 else
79 slot->cache_fd = -1;
Lars Hjemli25105d72006-12-10 22:31:36 +010080 }
Lars Hjemlid4028112008-05-18 23:16:50 +020081 return err;
Lars Hjemli25105d72006-12-10 22:31:36 +010082}
83
Lars Hjemli939d32f2008-04-28 11:32:42 +020084/* Print the content of the active cache slot (but skip the key). */
85static int print_slot(struct cache_slot *slot)
Lars Hjemli25105d72006-12-10 22:31:36 +010086{
Sebastian Andrzej Siewiord3581b52014-01-18 21:24:58 +010087#ifdef HAVE_LINUX_SENDFILE
88 off_t start_off;
89 int ret;
90
91 start_off = slot->keylen + 1;
92
93 do {
94 ret = sendfile(STDOUT_FILENO, slot->cache_fd, &start_off,
95 slot->cache_st.st_size - start_off);
96 if (ret < 0) {
97 if (errno == EAGAIN || errno == EINTR)
98 continue;
99 return errno;
100 }
101 return 0;
102 } while (1);
103#else
Lars Hjemlidd7c1722008-05-20 17:56:47 +0200104 ssize_t i, j;
Lars Hjemli25105d72006-12-10 22:31:36 +0100105
Lars Hjemli939d32f2008-04-28 11:32:42 +0200106 i = lseek(slot->cache_fd, slot->keylen + 1, SEEK_SET);
107 if (i != slot->keylen + 1)
108 return errno;
109
Lars Hjemlidd7c1722008-05-20 17:56:47 +0200110 do {
111 i = j = xread(slot->cache_fd, slot->buf, sizeof(slot->buf));
112 if (i > 0)
113 j = xwrite(STDOUT_FILENO, slot->buf, i);
114 } while (i > 0 && j == i);
Lars Hjemli939d32f2008-04-28 11:32:42 +0200115
Lars Hjemlidd7c1722008-05-20 17:56:47 +0200116 if (i < 0 || j != i)
Lars Hjemli939d32f2008-04-28 11:32:42 +0200117 return errno;
118 else
Lars Hjemli7c849d92006-12-16 13:55:58 +0100119 return 0;
Sebastian Andrzej Siewiord3581b52014-01-18 21:24:58 +0100120#endif
Lars Hjemli25105d72006-12-10 22:31:36 +0100121}
122
Lars Hjemli939d32f2008-04-28 11:32:42 +0200123/* Check if the slot has expired */
124static int is_expired(struct cache_slot *slot)
125{
126 if (slot->ttl < 0)
127 return 0;
128 else
Lukas Fleischer53bc7472013-03-03 16:04:29 +0100129 return slot->cache_st.st_mtime + slot->ttl * 60 < time(NULL);
Lars Hjemli939d32f2008-04-28 11:32:42 +0200130}
131
132/* Check if the slot has been modified since we opened it.
133 * NB: If stat() fails, we pretend the file is modified.
134 */
135static int is_modified(struct cache_slot *slot)
Lars Hjemli318d1062006-12-11 12:10:12 +0100136{
137 struct stat st;
138
Lars Hjemli939d32f2008-04-28 11:32:42 +0200139 if (stat(slot->cache_name, &st))
140 return 1;
141 return (st.st_ino != slot->cache_st.st_ino ||
142 st.st_mtime != slot->cache_st.st_mtime ||
143 st.st_size != slot->cache_st.st_size);
144}
145
146/* Close an open lockfile */
Lars Hjemlid4028112008-05-18 23:16:50 +0200147static int close_lock(struct cache_slot *slot)
Lars Hjemli939d32f2008-04-28 11:32:42 +0200148{
Lars Hjemlid4028112008-05-18 23:16:50 +0200149 int err = 0;
Lars Hjemli939d32f2008-04-28 11:32:42 +0200150 if (slot->lock_fd > 0) {
Lars Hjemlid4028112008-05-18 23:16:50 +0200151 if (close(slot->lock_fd))
152 err = errno;
153 else
154 slot->lock_fd = -1;
Lars Hjemli939d32f2008-04-28 11:32:42 +0200155 }
Lars Hjemlid4028112008-05-18 23:16:50 +0200156 return err;
Lars Hjemli939d32f2008-04-28 11:32:42 +0200157}
158
159/* Create a lockfile used to store the generated content for a cache
160 * slot, and write the slot key + \0 into it.
161 * Returns 0 on success and errno otherwise.
162 */
163static int lock_slot(struct cache_slot *slot)
164{
John Keepingdb9a70b2015-03-03 19:22:31 +0000165 struct flock lock = {
166 .l_type = F_WRLCK,
167 .l_whence = SEEK_SET,
168 .l_start = 0,
169 .l_len = 0,
170 };
171
172 slot->lock_fd = open(slot->lock_name, O_RDWR | O_CREAT,
Lukas Fleischer53bc7472013-03-03 16:04:29 +0100173 S_IRUSR | S_IWUSR);
Lars Hjemli939d32f2008-04-28 11:32:42 +0200174 if (slot->lock_fd == -1)
175 return errno;
John Keepingdb9a70b2015-03-03 19:22:31 +0000176 if (fcntl(slot->lock_fd, F_SETLK, &lock) < 0) {
177 int saved_errno = errno;
178 close(slot->lock_fd);
179 slot->lock_fd = -1;
180 return saved_errno;
181 }
Lars Hjemlicdc6b2f2008-05-18 23:26:05 +0200182 if (xwrite(slot->lock_fd, slot->key, slot->keylen + 1) < 0)
Lars Hjemlid4028112008-05-18 23:16:50 +0200183 return errno;
Lars Hjemli939d32f2008-04-28 11:32:42 +0200184 return 0;
185}
186
187/* Release the current lockfile. If `replace_old_slot` is set the
188 * lockfile replaces the old cache slot, otherwise the lockfile is
189 * just deleted.
190 */
191static int unlock_slot(struct cache_slot *slot, int replace_old_slot)
192{
193 int err;
194
195 if (replace_old_slot)
196 err = rename(slot->lock_name, slot->cache_name);
Lars Hjemli318d1062006-12-11 12:10:12 +0100197 else
Lars Hjemli939d32f2008-04-28 11:32:42 +0200198 err = unlink(slot->lock_name);
Lars Hjemlid4028112008-05-18 23:16:50 +0200199
200 if (err)
201 return errno;
202
203 return 0;
Lars Hjemli318d1062006-12-11 12:10:12 +0100204}
205
Lars Hjemli939d32f2008-04-28 11:32:42 +0200206/* Generate the content for the current cache slot by redirecting
207 * stdout to the lock-fd and invoking the callback function
208 */
209static int fill_slot(struct cache_slot *slot)
Lars Hjemli25105d72006-12-10 22:31:36 +0100210{
Lars Hjemli939d32f2008-04-28 11:32:42 +0200211 int tmp;
Lars Hjemli25105d72006-12-10 22:31:36 +0100212
Lars Hjemli939d32f2008-04-28 11:32:42 +0200213 /* Preserve stdout */
214 tmp = dup(STDOUT_FILENO);
215 if (tmp == -1)
216 return errno;
Lars Hjemli318d1062006-12-11 12:10:12 +0100217
Lars Hjemli939d32f2008-04-28 11:32:42 +0200218 /* Redirect stdout to lockfile */
Christian Hesse76dc7a32015-10-10 16:56:28 +0200219 if (dup2(slot->lock_fd, STDOUT_FILENO) == -1) {
220 close(tmp);
Lars Hjemli939d32f2008-04-28 11:32:42 +0200221 return errno;
Christian Hesse76dc7a32015-10-10 16:56:28 +0200222 }
Lars Hjemli318d1062006-12-11 12:10:12 +0100223
Lars Hjemli939d32f2008-04-28 11:32:42 +0200224 /* Generate cache content */
Lukas Fleischerf60ffa12014-01-15 21:53:15 +0100225 slot->fn();
Lars Hjemli318d1062006-12-11 12:10:12 +0100226
Sebastian Andrzej Siewiord3581b52014-01-18 21:24:58 +0100227 /* update stat info */
Christian Hesse76dc7a32015-10-10 16:56:28 +0200228 if (fstat(slot->lock_fd, &slot->cache_st)) {
229 close(tmp);
Sebastian Andrzej Siewiord3581b52014-01-18 21:24:58 +0100230 return errno;
Christian Hesse76dc7a32015-10-10 16:56:28 +0200231 }
Sebastian Andrzej Siewiord3581b52014-01-18 21:24:58 +0100232
Lars Hjemli939d32f2008-04-28 11:32:42 +0200233 /* Restore stdout */
Christian Hesse76dc7a32015-10-10 16:56:28 +0200234 if (dup2(tmp, STDOUT_FILENO) == -1) {
235 close(tmp);
Lars Hjemli939d32f2008-04-28 11:32:42 +0200236 return errno;
Christian Hesse76dc7a32015-10-10 16:56:28 +0200237 }
Lars Hjemli318d1062006-12-11 12:10:12 +0100238
Lars Hjemli939d32f2008-04-28 11:32:42 +0200239 /* Close the temporary filedescriptor */
Lars Hjemlid4028112008-05-18 23:16:50 +0200240 if (close(tmp))
241 return errno;
242
Lars Hjemli939d32f2008-04-28 11:32:42 +0200243 return 0;
Lars Hjemli25105d72006-12-10 22:31:36 +0100244}
245
Lars Hjemli939d32f2008-04-28 11:32:42 +0200246/* Crude implementation of 32-bit FNV-1 hash algorithm,
247 * see http://www.isthe.com/chongo/tech/comp/fnv/ for details
248 * about the magic numbers.
249 */
250#define FNV_OFFSET 0x811c9dc5
251#define FNV_PRIME 0x01000193
252
253unsigned long hash_str(const char *str)
Lars Hjemli25105d72006-12-10 22:31:36 +0100254{
Lars Hjemli939d32f2008-04-28 11:32:42 +0200255 unsigned long h = FNV_OFFSET;
256 unsigned char *s = (unsigned char *)str;
257
258 if (!s)
259 return h;
260
Jason A. Donenfeldbdae1d82013-03-03 23:21:33 -0500261 while (*s) {
Lars Hjemli939d32f2008-04-28 11:32:42 +0200262 h *= FNV_PRIME;
263 h ^= *s++;
264 }
265 return h;
Lars Hjemli25105d72006-12-10 22:31:36 +0100266}
267
Lars Hjemli939d32f2008-04-28 11:32:42 +0200268static int process_slot(struct cache_slot *slot)
Lars Hjemlifbaf1172006-12-11 22:53:50 +0100269{
Lars Hjemli939d32f2008-04-28 11:32:42 +0200270 int err;
Lars Hjemlifbaf1172006-12-11 22:53:50 +0100271
Lars Hjemli939d32f2008-04-28 11:32:42 +0200272 err = open_slot(slot);
273 if (!err && slot->match) {
274 if (is_expired(slot)) {
275 if (!lock_slot(slot)) {
276 /* If the cachefile has been replaced between
277 * `open_slot` and `lock_slot`, we'll just
278 * serve the stale content from the original
279 * cachefile. This way we avoid pruning the
280 * newly generated slot. The same code-path
281 * is chosen if fill_slot() fails for some
282 * reason.
283 *
284 * TODO? check if the new slot contains the
285 * same key as the old one, since we would
286 * prefer to serve the newest content.
287 * This will require us to open yet another
288 * file-descriptor and read and compare the
289 * key from the new file, so for now we're
290 * lazy and just ignore the new file.
291 */
292 if (is_modified(slot) || fill_slot(slot)) {
293 unlock_slot(slot, 0);
294 close_lock(slot);
295 } else {
296 close_slot(slot);
297 unlock_slot(slot, 1);
298 slot->cache_fd = slot->lock_fd;
299 }
300 }
301 }
Lars Hjemliaf2e7562008-05-18 23:59:11 +0200302 if ((err = print_slot(slot)) != 0) {
303 cache_log("[cgit] error printing cache %s: %s (%d)\n",
304 slot->cache_name,
305 strerror(err),
306 err);
307 }
Lars Hjemli939d32f2008-04-28 11:32:42 +0200308 close_slot(slot);
Lars Hjemliaf2e7562008-05-18 23:59:11 +0200309 return err;
Lars Hjemli939d32f2008-04-28 11:32:42 +0200310 }
311
312 /* If the cache slot does not exist (or its key doesn't match the
313 * current key), lets try to create a new cache slot for this
314 * request. If this fails (for whatever reason), lets just generate
315 * the content without caching it and fool the caller to belive
316 * everything worked out (but print a warning on stdout).
317 */
318
319 close_slot(slot);
320 if ((err = lock_slot(slot)) != 0) {
321 cache_log("[cgit] Unable to lock slot %s: %s (%d)\n",
322 slot->lock_name, strerror(err), err);
Lukas Fleischerf60ffa12014-01-15 21:53:15 +0100323 slot->fn();
Lars Hjemli939d32f2008-04-28 11:32:42 +0200324 return 0;
325 }
326
327 if ((err = fill_slot(slot)) != 0) {
328 cache_log("[cgit] Unable to fill slot %s: %s (%d)\n",
329 slot->lock_name, strerror(err), err);
330 unlock_slot(slot, 0);
331 close_lock(slot);
Lukas Fleischerf60ffa12014-01-15 21:53:15 +0100332 slot->fn();
Lars Hjemli939d32f2008-04-28 11:32:42 +0200333 return 0;
334 }
335 // We've got a valid cache slot in the lock file, which
336 // is about to replace the old cache slot. But if we
337 // release the lockfile and then try to open the new cache
338 // slot, we might get a race condition with a concurrent
339 // writer for the same cache slot (with a different key).
340 // Lets avoid such a race by just printing the content of
341 // the lock file.
342 slot->cache_fd = slot->lock_fd;
343 unlock_slot(slot, 1);
Lars Hjemliaf2e7562008-05-18 23:59:11 +0200344 if ((err = print_slot(slot)) != 0) {
345 cache_log("[cgit] error printing cache %s: %s (%d)\n",
346 slot->cache_name,
347 strerror(err),
348 err);
349 }
Lars Hjemli939d32f2008-04-28 11:32:42 +0200350 close_slot(slot);
351 return err;
Lars Hjemli25105d72006-12-10 22:31:36 +0100352}
Lars Hjemli939d32f2008-04-28 11:32:42 +0200353
354/* Print cached content to stdout, generate the content if necessary. */
355int cache_process(int size, const char *path, const char *key, int ttl,
Lukas Fleischerf60ffa12014-01-15 21:53:15 +0100356 cache_fill_fn fn)
Lars Hjemli939d32f2008-04-28 11:32:42 +0200357{
358 unsigned long hash;
John Keepingfb3655d2013-04-06 10:28:57 +0100359 int i;
360 struct strbuf filename = STRBUF_INIT;
361 struct strbuf lockname = STRBUF_INIT;
Lars Hjemli939d32f2008-04-28 11:32:42 +0200362 struct cache_slot slot;
John Keepingf75900b2013-05-18 18:28:14 +0100363 int result;
Lars Hjemli939d32f2008-04-28 11:32:42 +0200364
365 /* If the cache is disabled, just generate the content */
Lukas Fleischer6ceba452014-02-20 20:59:22 +0100366 if (size <= 0 || ttl == 0) {
Lukas Fleischerf60ffa12014-01-15 21:53:15 +0100367 fn();
Lars Hjemli939d32f2008-04-28 11:32:42 +0200368 return 0;
369 }
370
371 /* Verify input, calculate filenames */
372 if (!path) {
373 cache_log("[cgit] Cache path not specified, caching is disabled\n");
Lukas Fleischerf60ffa12014-01-15 21:53:15 +0100374 fn();
Lars Hjemli939d32f2008-04-28 11:32:42 +0200375 return 0;
376 }
Lars Hjemli939d32f2008-04-28 11:32:42 +0200377 if (!key)
378 key = "";
379 hash = hash_str(key) % size;
John Keepingfb3655d2013-04-06 10:28:57 +0100380 strbuf_addstr(&filename, path);
381 strbuf_ensure_end(&filename, '/');
Jason A. Donenfeldbdae1d82013-03-03 23:21:33 -0500382 for (i = 0; i < 8; i++) {
John Keepingfb3655d2013-04-06 10:28:57 +0100383 strbuf_addf(&filename, "%x", (unsigned char)(hash & 0xf));
Lars Hjemli939d32f2008-04-28 11:32:42 +0200384 hash >>= 4;
385 }
John Keepingfb3655d2013-04-06 10:28:57 +0100386 strbuf_addbuf(&lockname, &filename);
387 strbuf_addstr(&lockname, ".lock");
Lars Hjemli939d32f2008-04-28 11:32:42 +0200388 slot.fn = fn;
Lars Hjemli939d32f2008-04-28 11:32:42 +0200389 slot.ttl = ttl;
John Keepingf75900b2013-05-18 18:28:14 +0100390 slot.cache_name = filename.buf;
391 slot.lock_name = lockname.buf;
Lars Hjemli939d32f2008-04-28 11:32:42 +0200392 slot.key = key;
393 slot.keylen = strlen(key);
John Keepingf75900b2013-05-18 18:28:14 +0100394 result = process_slot(&slot);
395
396 strbuf_release(&filename);
397 strbuf_release(&lockname);
398 return result;
Lars Hjemli939d32f2008-04-28 11:32:42 +0200399}
400
Lars Hjemli9000bbf2008-04-28 12:10:13 +0200401/* Return a strftime formatted date/time
402 * NB: the result from this function is to shared memory
403 */
Lukas Fleischerbafab422013-03-04 08:52:33 +0100404static char *sprintftime(const char *format, time_t time)
Lars Hjemli9000bbf2008-04-28 12:10:13 +0200405{
406 static char buf[64];
407 struct tm *tm;
408
409 if (!time)
410 return NULL;
411 tm = gmtime(&time);
412 strftime(buf, sizeof(buf)-1, format, tm);
413 return buf;
414}
415
416int cache_ls(const char *path)
417{
418 DIR *dir;
419 struct dirent *ent;
420 int err = 0;
John Keeping80d52072015-03-08 16:32:26 +0000421 struct cache_slot slot = { NULL };
John Keepingfb3655d2013-04-06 10:28:57 +0100422 struct strbuf fullname = STRBUF_INIT;
423 size_t prefixlen;
Lars Hjemli9000bbf2008-04-28 12:10:13 +0200424
425 if (!path) {
426 cache_log("[cgit] cache path not specified\n");
427 return -1;
428 }
Lars Hjemli9000bbf2008-04-28 12:10:13 +0200429 dir = opendir(path);
430 if (!dir) {
431 err = errno;
432 cache_log("[cgit] unable to open path %s: %s (%d)\n",
433 path, strerror(err), err);
434 return err;
435 }
John Keepingfb3655d2013-04-06 10:28:57 +0100436 strbuf_addstr(&fullname, path);
437 strbuf_ensure_end(&fullname, '/');
438 prefixlen = fullname.len;
Jason A. Donenfeldbdae1d82013-03-03 23:21:33 -0500439 while ((ent = readdir(dir)) != NULL) {
Lars Hjemli9000bbf2008-04-28 12:10:13 +0200440 if (strlen(ent->d_name) != 8)
441 continue;
John Keepingfb3655d2013-04-06 10:28:57 +0100442 strbuf_setlen(&fullname, prefixlen);
443 strbuf_addstr(&fullname, ent->d_name);
John Keepingf75900b2013-05-18 18:28:14 +0100444 slot.cache_name = fullname.buf;
Lars Hjemli9000bbf2008-04-28 12:10:13 +0200445 if ((err = open_slot(&slot)) != 0) {
446 cache_log("[cgit] unable to open path %s: %s (%d)\n",
John Keepingfb3655d2013-04-06 10:28:57 +0100447 fullname.buf, strerror(err), err);
Lars Hjemli9000bbf2008-04-28 12:10:13 +0200448 continue;
449 }
John Keepingf32a2da2013-05-18 18:46:39 +0100450 htmlf("%s %s %10"PRIuMAX" %s\n",
451 fullname.buf,
452 sprintftime("%Y-%m-%d %H:%M:%S",
453 slot.cache_st.st_mtime),
454 (uintmax_t)slot.cache_st.st_size,
455 slot.buf);
Lars Hjemli9000bbf2008-04-28 12:10:13 +0200456 close_slot(&slot);
457 }
458 closedir(dir);
John Keepingf75900b2013-05-18 18:28:14 +0100459 strbuf_release(&fullname);
Lars Hjemli9000bbf2008-04-28 12:10:13 +0200460 return 0;
461}
462
Lars Hjemli939d32f2008-04-28 11:32:42 +0200463/* Print a message to stdout */
464void cache_log(const char *format, ...)
465{
466 va_list args;
467 va_start(args, format);
468 vfprintf(stderr, format, args);
469 va_end(args);
470}
471