Comments
Patch
@@ -38,7 +38,7 @@
$ chmod u+w $CACHEDIR/master/11/f6ad8ec52a2984abaafd7c3b516503785c2072/1406e74118627694268417491f018a4a883152f0
$ echo x > $CACHEDIR/master/11/f6ad8ec52a2984abaafd7c3b516503785c2072/1406e74118627694268417491f018a4a883152f0
$ hg up tip 2>&1 | egrep "^[^ ].*unexpected remotefilelog"
- RuntimeError: unexpected remotefilelog header: illegal format
+ hgext.remotefilelog.shallowutil.BadRemotefilelogHeader: unexpected remotefilelog header: illegal format
Verify detection and remediation when remotefilelog.validatecachelog is set
@@ -233,6 +233,10 @@
return x
+class BadRemotefilelogHeader(error.StorageError):
+ """Exception raised when parsing a remotefilelog blob header fails."""
+
+
def parsesizeflags(raw):
"""given a remotefilelog blob, return (headersize, rawtextsize, flags)
@@ -253,16 +257,20 @@
elif s.startswith(constants.METAKEYFLAG):
flags = int(s[len(constants.METAKEYFLAG) :])
else:
- raise RuntimeError(
+ raise BadRemotefilelogHeader(
b'unsupported remotefilelog header: %s' % header
)
else:
# v0, str(int(size)) is the header
size = int(header)
except ValueError:
- raise RuntimeError("unexpected remotefilelog header: illegal format")
+ raise BadRemotefilelogHeader(
+ "unexpected remotefilelog header: illegal format"
+ )
if size is None:
- raise RuntimeError("unexpected remotefilelog header: no size found")
+ raise BadRemotefilelogHeader(
+ "unexpected remotefilelog header: no size found"
+ )
return index + 1, size, flags
@@ -308,7 +308,7 @@
# Content matches the intended path
return True
return False
- except (ValueError, RuntimeError):
+ except (ValueError, shallowutil.BadRemotefilelogHeader):
pass
return False