2009-08-17 22:37:20 +05:30
|
|
|
/*-
|
2020-04-24 15:14:19 +05:30
|
|
|
* Licensed under the SPDX BSD-2-Clause identifier.
|
|
|
|
* Use is subject to license terms, as specified in the LICENSE file.
|
2009-08-17 22:37:20 +05:30
|
|
|
*/
|
|
|
|
|
2011-01-25 17:30:23 +05:30
|
|
|
#ifdef HAVE_VASPRINTF
|
|
|
|
# define _GNU_SOURCE /* for vasprintf(3) */
|
|
|
|
#endif
|
2011-07-09 14:20:44 +05:30
|
|
|
|
2019-04-22 19:01:07 +05:30
|
|
|
#if defined(HAVE_STRLCAT) || defined(HAVE_STRLCPY)
|
|
|
|
# define _BSD_SOURCE
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#include "compat.h"
|
|
|
|
|
2011-07-09 14:20:44 +05:30
|
|
|
#include <stdio.h>
|
2009-08-17 22:37:20 +05:30
|
|
|
#include <stdbool.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <stdarg.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <errno.h>
|
2012-05-31 02:08:35 +05:30
|
|
|
#include <fnmatch.h>
|
2013-11-17 16:04:14 +05:30
|
|
|
#include <ctype.h>
|
2015-02-19 14:17:09 +05:30
|
|
|
#include <libgen.h>
|
2012-05-31 19:59:56 +05:30
|
|
|
#include <sys/utsname.h>
|
2009-08-17 22:37:20 +05:30
|
|
|
|
2010-11-13 07:48:58 +05:30
|
|
|
#include "xbps_api_impl.h"
|
2009-08-17 22:37:20 +05:30
|
|
|
|
2013-01-04 15:05:00 +05:30
|
|
|
#ifdef __clang__
|
|
|
|
#pragma clang diagnostic ignored "-Wformat-nonliteral"
|
|
|
|
#endif
|
|
|
|
|
2019-12-14 16:13:29 +05:30
|
|
|
static bool is_revision(const char *str) {
|
2019-09-27 01:57:15 +05:30
|
|
|
if (str == NULL || str[0] == '\0'){
|
|
|
|
return false;
|
|
|
|
}
|
2019-12-14 16:13:29 +05:30
|
|
|
/* allow underscore for accepting perl-Digest-1.17_01_1 etc. */
|
|
|
|
while (isdigit(str[0]) || str[0] == '_') {
|
2019-09-27 01:57:15 +05:30
|
|
|
++str;
|
|
|
|
}
|
|
|
|
return str[0] == '\0';
|
|
|
|
}
|
|
|
|
|
2010-01-21 07:40:19 +05:30
|
|
|
/**
|
|
|
|
* @file lib/util.c
|
|
|
|
* @brief Utility routines
|
|
|
|
* @defgroup util Utility functions
|
|
|
|
*/
|
|
|
|
bool
|
2012-11-30 11:41:51 +05:30
|
|
|
xbps_repository_is_remote(const char *uri)
|
2009-11-23 09:53:16 +05:30
|
|
|
{
|
|
|
|
assert(uri != NULL);
|
|
|
|
|
2013-10-07 12:53:25 +05:30
|
|
|
if ((strncmp(uri, "http://", 7) == 0) ||
|
|
|
|
(strncmp(uri, "https://", 8) == 0) ||
|
2009-11-23 09:53:16 +05:30
|
|
|
(strncmp(uri, "ftp://", 6) == 0))
|
|
|
|
return true;
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2010-01-21 07:40:19 +05:30
|
|
|
int
|
2012-11-30 11:41:51 +05:30
|
|
|
xbps_pkg_is_installed(struct xbps_handle *xhp, const char *pkg)
|
2009-08-17 22:37:20 +05:30
|
|
|
{
|
2013-06-20 13:56:12 +05:30
|
|
|
xbps_dictionary_t dict;
|
2011-01-26 23:11:57 +05:30
|
|
|
pkg_state_t state;
|
2009-08-17 22:37:20 +05:30
|
|
|
|
2012-11-30 11:41:51 +05:30
|
|
|
assert(xhp);
|
|
|
|
assert(pkg);
|
2009-08-17 22:37:20 +05:30
|
|
|
|
2012-11-30 11:41:51 +05:30
|
|
|
if (((dict = xbps_pkgdb_get_virtualpkg(xhp, pkg)) == NULL) &&
|
|
|
|
((dict = xbps_pkgdb_get_pkg(xhp, pkg)) == NULL))
|
|
|
|
return 0; /* not installed */
|
2009-08-17 22:37:20 +05:30
|
|
|
/*
|
|
|
|
* Check that package state is fully installed, not
|
|
|
|
* unpacked or something else.
|
|
|
|
*/
|
2012-06-16 12:32:07 +05:30
|
|
|
if (xbps_pkg_state_dictionary(dict, &state) != 0)
|
2011-01-26 23:11:57 +05:30
|
|
|
return -1; /* error */
|
2014-08-23 19:24:24 +05:30
|
|
|
if (state == XBPS_PKG_STATE_INSTALLED || state == XBPS_PKG_STATE_UNPACKED)
|
|
|
|
return 1;
|
2009-08-17 22:37:20 +05:30
|
|
|
|
2014-08-23 19:24:24 +05:30
|
|
|
return 0; /* not fully installed */
|
2009-08-17 22:37:20 +05:30
|
|
|
}
|
|
|
|
|
2019-03-05 21:15:29 +05:30
|
|
|
bool
|
|
|
|
xbps_pkg_is_ignored(struct xbps_handle *xhp, const char *pkg)
|
|
|
|
{
|
2020-02-09 00:01:29 +05:30
|
|
|
char pkgname[XBPS_NAME_SIZE];
|
2019-03-05 21:15:29 +05:30
|
|
|
bool rv = false;
|
|
|
|
|
|
|
|
assert(xhp);
|
|
|
|
assert(pkg);
|
|
|
|
|
|
|
|
if (!xhp->ignored_pkgs)
|
|
|
|
return false;
|
|
|
|
|
2020-02-09 00:01:29 +05:30
|
|
|
if (xbps_pkgpattern_name(pkgname, XBPS_NAME_SIZE, pkg) ||
|
|
|
|
xbps_pkg_name(pkgname, XBPS_NAME_SIZE, pkg)) {
|
2019-03-05 21:15:29 +05:30
|
|
|
rv = xbps_match_string_in_array(xhp->ignored_pkgs, pkgname);
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
return xbps_match_string_in_array(xhp->ignored_pkgs, pkg);
|
|
|
|
}
|
|
|
|
|
2010-01-21 07:40:19 +05:30
|
|
|
const char *
|
2011-06-01 13:07:32 +05:30
|
|
|
xbps_pkg_version(const char *pkg)
|
2009-08-17 22:37:20 +05:30
|
|
|
{
|
2019-09-27 01:57:15 +05:30
|
|
|
const char *p, *r;
|
|
|
|
size_t p_len;
|
2009-08-17 22:37:20 +05:30
|
|
|
|
2020-02-09 00:30:56 +05:30
|
|
|
assert(pkg);
|
|
|
|
|
2012-06-05 14:28:39 +05:30
|
|
|
if ((p = strrchr(pkg, '-')) == NULL)
|
|
|
|
return NULL;
|
2009-08-17 22:37:20 +05:30
|
|
|
|
2019-09-27 01:57:15 +05:30
|
|
|
++p; /* skip first '-' */
|
|
|
|
p_len = strlen(p);
|
|
|
|
for (unsigned int i = 0; i < p_len; i++) {
|
2013-11-17 16:55:02 +05:30
|
|
|
if (p[i] == '_')
|
|
|
|
break;
|
2019-09-27 01:57:15 +05:30
|
|
|
if (isdigit((unsigned char)p[i]) && (r = strchr(p + i + 1, '_'))) {
|
2019-12-14 16:13:29 +05:30
|
|
|
if (!is_revision(r + 1)) {
|
2019-09-27 01:57:15 +05:30
|
|
|
break;
|
|
|
|
}
|
|
|
|
return p;
|
2013-11-17 16:55:02 +05:30
|
|
|
}
|
|
|
|
}
|
2014-11-18 20:41:43 +05:30
|
|
|
return NULL;
|
2014-09-06 00:29:00 +05:30
|
|
|
}
|
|
|
|
|
|
|
|
char *
|
|
|
|
xbps_binpkg_pkgver(const char *pkg)
|
|
|
|
{
|
|
|
|
const char *fname;
|
2014-11-19 16:26:16 +05:30
|
|
|
char *p, *p1, *res;
|
2014-11-19 15:44:37 +05:30
|
|
|
unsigned int len;
|
2014-09-06 00:29:00 +05:30
|
|
|
|
2020-02-09 00:30:56 +05:30
|
|
|
assert(pkg);
|
|
|
|
|
2014-09-06 00:29:00 +05:30
|
|
|
/* skip path if found, only interested in filename */
|
|
|
|
if ((fname = strrchr(pkg, '/')))
|
|
|
|
fname++;
|
|
|
|
else
|
|
|
|
fname = pkg;
|
|
|
|
|
2014-11-19 15:44:37 +05:30
|
|
|
/* 5 == .xbps */
|
2019-01-15 15:18:34 +05:30
|
|
|
if ((len = strlen(fname)) < 5)
|
|
|
|
return NULL;
|
|
|
|
len -= 5;
|
|
|
|
|
2014-11-19 15:44:37 +05:30
|
|
|
p = malloc(len+1);
|
|
|
|
assert(p);
|
|
|
|
(void)memcpy(p, fname, len);
|
|
|
|
p[len] = '\0';
|
2019-01-15 15:18:34 +05:30
|
|
|
if (!(p1 = strrchr(p, '.'))) {
|
|
|
|
free(p);
|
|
|
|
return NULL;
|
|
|
|
}
|
2014-11-19 15:44:37 +05:30
|
|
|
p[strlen(p)-strlen(p1)] = '\0';
|
|
|
|
|
|
|
|
/* sanity check it's a proper pkgver string */
|
|
|
|
if (xbps_pkg_version(p) == NULL) {
|
|
|
|
free(p);
|
2014-09-06 00:29:00 +05:30
|
|
|
return NULL;
|
|
|
|
}
|
2014-11-19 16:26:16 +05:30
|
|
|
res = strdup(p);
|
|
|
|
assert(res);
|
2019-01-15 15:18:34 +05:30
|
|
|
|
2014-11-19 16:26:16 +05:30
|
|
|
free(p);
|
|
|
|
return res;
|
2014-09-06 00:29:00 +05:30
|
|
|
}
|
|
|
|
|
|
|
|
char *
|
|
|
|
xbps_binpkg_arch(const char *pkg)
|
|
|
|
{
|
2014-11-19 15:44:37 +05:30
|
|
|
const char *fname;
|
2014-11-19 16:26:16 +05:30
|
|
|
char *p, *p1, *res;
|
2014-11-19 15:44:37 +05:30
|
|
|
unsigned int len;
|
2014-09-06 00:29:00 +05:30
|
|
|
|
2020-02-09 00:30:56 +05:30
|
|
|
assert(pkg);
|
|
|
|
|
2014-09-06 00:29:00 +05:30
|
|
|
/* skip path if found, only interested in filename */
|
|
|
|
if ((fname = strrchr(pkg, '/')))
|
|
|
|
fname++;
|
|
|
|
else
|
|
|
|
fname = pkg;
|
|
|
|
|
2014-11-19 15:44:37 +05:30
|
|
|
/* 5 == .xbps */
|
2019-01-15 15:18:34 +05:30
|
|
|
if ((len = strlen(fname)) < 5)
|
|
|
|
return NULL;
|
|
|
|
len -= 5;
|
|
|
|
|
2014-11-19 15:44:37 +05:30
|
|
|
p = malloc(len+1);
|
2014-10-07 11:46:45 +05:30
|
|
|
assert(p);
|
2014-11-19 15:44:37 +05:30
|
|
|
(void)memcpy(p, fname, len);
|
|
|
|
p[len] = '\0';
|
2019-01-15 15:18:34 +05:30
|
|
|
if (!(p1 = strrchr(p, '.'))) {
|
|
|
|
free(p);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
res = strdup(p1 + 1);
|
|
|
|
assert(res);
|
|
|
|
|
2014-11-19 16:26:16 +05:30
|
|
|
free(p);
|
|
|
|
return res;
|
2009-08-17 22:37:20 +05:30
|
|
|
}
|
|
|
|
|
2010-01-21 07:40:19 +05:30
|
|
|
const char *
|
2011-06-01 13:07:32 +05:30
|
|
|
xbps_pkg_revision(const char *pkg)
|
2009-08-17 22:37:20 +05:30
|
|
|
{
|
2019-09-27 01:57:15 +05:30
|
|
|
const char *p, *r;
|
|
|
|
size_t p_len;
|
2009-08-17 22:37:20 +05:30
|
|
|
|
2020-02-09 00:30:56 +05:30
|
|
|
assert(pkg);
|
|
|
|
|
2019-09-27 01:57:15 +05:30
|
|
|
if ((p = strrchr(pkg, '-')) == NULL)
|
2013-11-17 16:04:14 +05:30
|
|
|
return NULL;
|
|
|
|
|
2019-09-27 01:57:15 +05:30
|
|
|
++p; /* skip first '-' */
|
|
|
|
p_len = strlen(p);
|
|
|
|
for (unsigned int i = 0; i < p_len; i++) {
|
|
|
|
if (p[i] == '_')
|
|
|
|
break;
|
|
|
|
if (isdigit((unsigned char)p[i]) && (r = strchr(p + i + 1, '_'))) {
|
2019-12-14 16:13:29 +05:30
|
|
|
if (!is_revision(r + 1)) {
|
2019-09-27 01:57:15 +05:30
|
|
|
break;
|
|
|
|
}
|
2019-12-14 16:13:29 +05:30
|
|
|
return strrchr(r, '_') + 1;
|
2019-09-27 01:57:15 +05:30
|
|
|
}
|
|
|
|
}
|
|
|
|
return NULL;
|
2009-08-17 22:37:20 +05:30
|
|
|
}
|
|
|
|
|
2020-02-09 00:01:29 +05:30
|
|
|
bool
|
|
|
|
xbps_pkg_name(char *dst, size_t len, const char *pkg)
|
2009-08-17 22:37:20 +05:30
|
|
|
{
|
2019-09-27 01:57:15 +05:30
|
|
|
const char *p, *r;
|
2020-02-09 00:01:29 +05:30
|
|
|
size_t plen;
|
2013-11-17 16:55:02 +05:30
|
|
|
bool valid = false;
|
2009-08-17 22:37:20 +05:30
|
|
|
|
2020-02-09 00:01:29 +05:30
|
|
|
assert(dst);
|
|
|
|
assert(pkg);
|
|
|
|
|
2012-06-05 14:28:39 +05:30
|
|
|
if ((p = strrchr(pkg, '-')) == NULL)
|
2020-02-09 00:01:29 +05:30
|
|
|
return false;
|
2009-08-17 22:37:20 +05:30
|
|
|
|
2020-02-09 00:01:29 +05:30
|
|
|
plen = strlen(p);
|
2019-09-27 01:57:15 +05:30
|
|
|
/* i = 1 skips first '-' */
|
2020-02-09 00:01:29 +05:30
|
|
|
for (unsigned int i = 1; i < plen; i++) {
|
2013-11-17 16:55:02 +05:30
|
|
|
if (p[i] == '_')
|
|
|
|
break;
|
2019-09-27 01:57:15 +05:30
|
|
|
if (isdigit((unsigned char)p[i]) && (r = strchr(p + i + 1, '_'))) {
|
2019-12-14 16:13:29 +05:30
|
|
|
valid = is_revision(r + 1);
|
2013-11-17 16:55:02 +05:30
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (!valid)
|
2020-02-09 00:01:29 +05:30
|
|
|
return false;
|
2010-05-20 02:08:27 +05:30
|
|
|
|
2020-02-09 00:01:29 +05:30
|
|
|
plen = strlen(pkg) - strlen(p) + 1;
|
|
|
|
if (plen > len)
|
|
|
|
return false;
|
2012-06-18 14:13:05 +05:30
|
|
|
|
2020-02-09 00:01:29 +05:30
|
|
|
memcpy(dst, pkg, plen-1);
|
|
|
|
dst[plen-1] = '\0';
|
2009-08-17 22:37:20 +05:30
|
|
|
|
2020-02-09 00:01:29 +05:30
|
|
|
return true;
|
2009-08-17 22:37:20 +05:30
|
|
|
}
|
|
|
|
|
2020-02-09 00:01:29 +05:30
|
|
|
bool
|
|
|
|
xbps_pkgpattern_name(char *dst, size_t len, const char *pkg)
|
2009-11-07 09:26:20 +05:30
|
|
|
{
|
2020-02-09 00:01:29 +05:30
|
|
|
const char *res;
|
|
|
|
size_t plen;
|
2009-11-07 09:26:20 +05:30
|
|
|
|
2020-02-09 00:01:29 +05:30
|
|
|
assert(dst);
|
|
|
|
assert(pkg);
|
2009-11-07 09:26:20 +05:30
|
|
|
|
2012-06-05 14:28:39 +05:30
|
|
|
if ((res = strpbrk(pkg, "><*?[]")) == NULL)
|
2020-02-09 00:01:29 +05:30
|
|
|
return false;
|
2009-11-07 09:26:20 +05:30
|
|
|
|
2020-02-09 00:01:29 +05:30
|
|
|
plen = strlen(pkg) - strlen(res) + 1;
|
|
|
|
if (strlen(pkg) < plen-2)
|
|
|
|
return false;
|
2014-02-15 05:56:42 +05:30
|
|
|
|
2020-02-09 00:01:29 +05:30
|
|
|
if (pkg[plen-2] == '-')
|
|
|
|
plen--;
|
2011-10-24 13:33:45 +05:30
|
|
|
|
2020-02-09 00:01:29 +05:30
|
|
|
if (plen > len)
|
|
|
|
return false;
|
2012-06-18 14:13:05 +05:30
|
|
|
|
2020-02-09 00:01:29 +05:30
|
|
|
memcpy(dst, pkg, plen-1);
|
|
|
|
dst[plen-1] = '\0';
|
2009-11-07 09:26:20 +05:30
|
|
|
|
2020-02-09 00:01:29 +05:30
|
|
|
return true;
|
2009-11-07 09:26:20 +05:30
|
|
|
}
|
|
|
|
|
2010-01-21 07:40:19 +05:30
|
|
|
const char *
|
2011-06-01 13:07:32 +05:30
|
|
|
xbps_pkgpattern_version(const char *pkg)
|
2009-11-07 09:26:20 +05:30
|
|
|
{
|
|
|
|
assert(pkg != NULL);
|
|
|
|
|
2012-06-05 14:28:39 +05:30
|
|
|
return strpbrk(pkg, "><*?[]");
|
2009-11-07 09:26:20 +05:30
|
|
|
}
|
|
|
|
|
2014-11-13 21:39:43 +05:30
|
|
|
char *
|
2013-06-20 13:56:12 +05:30
|
|
|
xbps_repository_pkg_path(struct xbps_handle *xhp, xbps_dictionary_t pkg_repod)
|
2009-11-28 07:08:41 +05:30
|
|
|
{
|
2013-03-05 08:38:42 +05:30
|
|
|
const char *pkgver, *arch, *repoloc;
|
2011-01-18 22:51:55 +05:30
|
|
|
char *lbinpkg = NULL;
|
|
|
|
|
2012-11-30 11:41:51 +05:30
|
|
|
assert(xhp);
|
2013-06-20 13:56:12 +05:30
|
|
|
assert(xbps_object_type(pkg_repod) == XBPS_TYPE_DICTIONARY);
|
2011-01-25 08:44:33 +05:30
|
|
|
|
2013-06-20 13:56:12 +05:30
|
|
|
if (!xbps_dictionary_get_cstring_nocopy(pkg_repod,
|
2013-03-05 08:38:42 +05:30
|
|
|
"pkgver", &pkgver))
|
|
|
|
return NULL;
|
2013-06-20 13:56:12 +05:30
|
|
|
if (!xbps_dictionary_get_cstring_nocopy(pkg_repod,
|
2013-03-05 08:38:42 +05:30
|
|
|
"architecture", &arch))
|
2011-01-20 21:11:49 +05:30
|
|
|
return NULL;
|
2013-06-20 13:56:12 +05:30
|
|
|
if (!xbps_dictionary_get_cstring_nocopy(pkg_repod,
|
2012-11-30 11:41:51 +05:30
|
|
|
"repository", &repoloc))
|
|
|
|
return NULL;
|
2009-11-28 07:08:41 +05:30
|
|
|
|
2012-11-30 11:41:51 +05:30
|
|
|
if (xbps_repository_is_remote(repoloc)) {
|
|
|
|
/*
|
|
|
|
* First check if binpkg is available in cachedir.
|
|
|
|
*/
|
2013-03-05 08:38:42 +05:30
|
|
|
lbinpkg = xbps_xasprintf("%s/%s.%s.xbps", xhp->cachedir,
|
|
|
|
pkgver, arch);
|
2012-11-30 11:41:51 +05:30
|
|
|
if (access(lbinpkg, R_OK) == 0)
|
|
|
|
return lbinpkg;
|
2011-01-18 22:51:55 +05:30
|
|
|
|
2012-11-30 11:41:51 +05:30
|
|
|
free(lbinpkg);
|
|
|
|
}
|
2011-01-18 22:51:55 +05:30
|
|
|
/*
|
|
|
|
* Local and remote repositories use the same path.
|
|
|
|
*/
|
2013-03-05 08:38:42 +05:30
|
|
|
return xbps_xasprintf("%s/%s.%s.xbps", repoloc, pkgver, arch);
|
2009-11-28 07:08:41 +05:30
|
|
|
}
|
|
|
|
|
2014-07-13 13:26:06 +05:30
|
|
|
bool
|
|
|
|
xbps_binpkg_exists(struct xbps_handle *xhp, xbps_dictionary_t pkgd)
|
|
|
|
{
|
2019-06-15 02:49:59 +05:30
|
|
|
char path[PATH_MAX];
|
|
|
|
const char *pkgver, *arch, *repoloc;
|
2014-07-13 13:26:06 +05:30
|
|
|
|
2019-06-15 02:49:59 +05:30
|
|
|
assert(xhp);
|
|
|
|
assert(xbps_object_type(pkgd) == XBPS_TYPE_DICTIONARY);
|
|
|
|
|
|
|
|
if (!xbps_dictionary_get_cstring_nocopy(pkgd,
|
|
|
|
"pkgver", &pkgver))
|
|
|
|
return NULL;
|
|
|
|
if (!xbps_dictionary_get_cstring_nocopy(pkgd,
|
|
|
|
"architecture", &arch))
|
|
|
|
return NULL;
|
|
|
|
if (!xbps_dictionary_get_cstring_nocopy(pkgd,
|
|
|
|
"repository", &repoloc))
|
|
|
|
return NULL;
|
2014-07-13 13:26:06 +05:30
|
|
|
|
2019-06-15 02:49:59 +05:30
|
|
|
snprintf(path, sizeof(path), "%s/%s.%s.xbps",
|
|
|
|
xbps_repository_is_remote(repoloc) ? xhp->cachedir : repoloc,
|
|
|
|
pkgver, arch);
|
2014-07-13 13:26:06 +05:30
|
|
|
|
2019-06-15 02:49:59 +05:30
|
|
|
return access(path, R_OK) == 0;
|
2014-07-13 13:26:06 +05:30
|
|
|
}
|
|
|
|
|
2019-07-07 17:38:55 +05:30
|
|
|
bool
|
|
|
|
xbps_remote_binpkg_exists(struct xbps_handle *xhp, xbps_dictionary_t pkgd)
|
|
|
|
{
|
|
|
|
char path[PATH_MAX];
|
|
|
|
const char *pkgver, *arch;
|
|
|
|
|
|
|
|
assert(xhp);
|
|
|
|
assert(xbps_object_type(pkgd) == XBPS_TYPE_DICTIONARY);
|
|
|
|
|
|
|
|
if (!xbps_dictionary_get_cstring_nocopy(pkgd,
|
|
|
|
"pkgver", &pkgver))
|
|
|
|
return NULL;
|
|
|
|
if (!xbps_dictionary_get_cstring_nocopy(pkgd,
|
|
|
|
"architecture", &arch))
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
snprintf(path, sizeof(path), "%s/%s.%s.xbps.sig", xhp->cachedir,
|
|
|
|
pkgver, arch);
|
|
|
|
|
|
|
|
/* check if the signature file exists */
|
|
|
|
if (access(path, R_OK) != 0)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
/* strip the .sig suffix and check if binpkg file exists */
|
|
|
|
path[strlen(path)-sizeof (".sig")+1] = '\0';
|
|
|
|
|
|
|
|
return access(path, R_OK) == 0;
|
|
|
|
}
|
|
|
|
|
2010-01-21 07:40:19 +05:30
|
|
|
bool
|
2013-06-20 13:56:12 +05:30
|
|
|
xbps_pkg_has_rundeps(xbps_dictionary_t pkgd)
|
2009-08-17 22:37:20 +05:30
|
|
|
{
|
2013-06-20 13:56:12 +05:30
|
|
|
xbps_array_t array;
|
2009-08-17 22:37:20 +05:30
|
|
|
|
2013-06-20 13:56:12 +05:30
|
|
|
assert(xbps_object_type(pkgd) == XBPS_TYPE_DICTIONARY);
|
2011-01-25 08:44:33 +05:30
|
|
|
|
2013-06-20 13:56:12 +05:30
|
|
|
array = xbps_dictionary_get(pkgd, "run_depends");
|
|
|
|
if (xbps_array_count(array))
|
2009-08-17 22:37:20 +05:30
|
|
|
return true;
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2012-05-31 19:59:56 +05:30
|
|
|
bool
|
2015-02-19 14:17:09 +05:30
|
|
|
xbps_pkg_arch_match(struct xbps_handle *xhp, const char *orig,
|
|
|
|
const char *target)
|
2012-05-31 19:59:56 +05:30
|
|
|
{
|
2013-03-07 22:38:12 +05:30
|
|
|
const char *arch;
|
|
|
|
|
2020-02-09 00:30:56 +05:30
|
|
|
assert(xhp);
|
|
|
|
assert(orig);
|
|
|
|
|
2013-03-07 22:38:12 +05:30
|
|
|
if (xhp->target_arch)
|
|
|
|
arch = xhp->target_arch;
|
|
|
|
else
|
|
|
|
arch = xhp->native_arch;
|
|
|
|
|
2012-05-31 19:59:56 +05:30
|
|
|
if (target == NULL) {
|
2012-07-22 01:19:37 +05:30
|
|
|
if ((strcmp(orig, "noarch") == 0) ||
|
2013-03-07 22:38:12 +05:30
|
|
|
(strcmp(orig, arch) == 0))
|
2012-07-22 01:19:37 +05:30
|
|
|
return true;
|
2012-05-31 19:59:56 +05:30
|
|
|
} else {
|
2012-07-22 01:19:37 +05:30
|
|
|
if ((strcmp(orig, "noarch") == 0) ||
|
|
|
|
(strcmp(orig, target) == 0))
|
|
|
|
return true;
|
2012-05-31 19:59:56 +05:30
|
|
|
}
|
2012-07-22 01:19:37 +05:30
|
|
|
return false;
|
2012-05-31 19:59:56 +05:30
|
|
|
}
|
|
|
|
|
2010-01-21 07:40:19 +05:30
|
|
|
char *
|
2009-08-17 22:37:20 +05:30
|
|
|
xbps_xasprintf(const char *fmt, ...)
|
|
|
|
{
|
|
|
|
va_list ap;
|
2012-11-11 14:07:27 +05:30
|
|
|
char *buf = NULL;
|
2009-08-17 22:37:20 +05:30
|
|
|
|
|
|
|
va_start(ap, fmt);
|
2011-01-25 17:09:05 +05:30
|
|
|
if (vasprintf(&buf, fmt, ap) == -1) {
|
|
|
|
va_end(ap);
|
2012-11-11 14:07:27 +05:30
|
|
|
assert(buf);
|
2011-01-25 17:09:05 +05:30
|
|
|
}
|
2009-08-17 22:37:20 +05:30
|
|
|
va_end(ap);
|
2012-11-11 14:07:27 +05:30
|
|
|
assert(buf);
|
2009-08-17 22:37:20 +05:30
|
|
|
|
|
|
|
return buf;
|
|
|
|
}
|
2012-05-31 02:08:35 +05:30
|
|
|
|
|
|
|
/*
|
|
|
|
* Match pkg against pattern, return 1 if matching, 0 otherwise or -1 on error.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
xbps_pkgpattern_match(const char *pkg, const char *pattern)
|
|
|
|
{
|
2019-06-27 20:39:43 +05:30
|
|
|
assert(pkg);
|
|
|
|
assert(pattern);
|
|
|
|
|
2012-09-30 13:43:06 +05:30
|
|
|
/* simple match on "pkg" against "pattern" */
|
2012-05-31 02:08:35 +05:30
|
|
|
if (strcmp(pattern, pkg) == 0)
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
/* perform relational dewey match on version number */
|
|
|
|
if (strpbrk(pattern, "<>") != NULL)
|
|
|
|
return dewey_match(pattern, pkg);
|
|
|
|
|
|
|
|
/* glob match */
|
|
|
|
if (strpbrk(pattern, "*?[]") != NULL)
|
|
|
|
if (fnmatch(pattern, pkg, FNM_PERIOD) == 0)
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
/* no match */
|
|
|
|
return 0;
|
|
|
|
}
|
2012-12-06 17:28:17 +05:30
|
|
|
|
|
|
|
/*
|
|
|
|
* Small wrapper for NetBSD's humanize_number(3) with some
|
|
|
|
* defaults set that we care about.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
xbps_humanize_number(char *buf, int64_t bytes)
|
|
|
|
{
|
|
|
|
assert(buf != NULL);
|
|
|
|
|
|
|
|
return humanize_number(buf, 7, bytes, "B",
|
|
|
|
HN_AUTOSCALE, HN_DECIMAL|HN_NOSPACE);
|
|
|
|
}
|
2014-09-23 00:52:05 +05:30
|
|
|
|
2014-11-06 14:28:04 +05:30
|
|
|
size_t
|
|
|
|
xbps_strlcat(char *dest, const char *src, size_t siz)
|
|
|
|
{
|
2020-02-09 00:30:56 +05:30
|
|
|
assert(dest);
|
|
|
|
assert(src);
|
|
|
|
|
2014-11-06 14:28:04 +05:30
|
|
|
return strlcat(dest, src, siz);
|
|
|
|
}
|
|
|
|
|
|
|
|
size_t
|
|
|
|
xbps_strlcpy(char *dest, const char *src, size_t siz)
|
|
|
|
{
|
2020-02-09 00:30:56 +05:30
|
|
|
assert(dest);
|
|
|
|
assert(src);
|
|
|
|
|
2014-11-06 14:28:04 +05:30
|
|
|
return strlcpy(dest, src, siz);
|
|
|
|
}
|
|
|
|
|
2014-09-23 00:52:05 +05:30
|
|
|
/*
|
|
|
|
* Check if pkg is explicitly marked to replace a specific installed version.
|
|
|
|
*/
|
2014-09-24 00:20:34 +05:30
|
|
|
bool
|
2014-09-27 14:58:29 +05:30
|
|
|
xbps_pkg_reverts(xbps_dictionary_t pkg, const char *pkgver)
|
|
|
|
{
|
2014-09-23 00:52:05 +05:30
|
|
|
unsigned int i;
|
|
|
|
xbps_array_t reverts;
|
2014-09-23 21:52:57 +05:30
|
|
|
const char *version = xbps_pkg_version(pkgver);
|
2019-06-27 20:39:43 +05:30
|
|
|
const char *revertver = NULL;
|
2014-09-23 00:52:05 +05:30
|
|
|
|
2020-02-09 00:30:56 +05:30
|
|
|
assert(pkg);
|
|
|
|
assert(pkgver);
|
|
|
|
|
2014-09-23 00:52:05 +05:30
|
|
|
if ((reverts = xbps_dictionary_get(pkg, "reverts")) == NULL)
|
2014-09-24 00:20:34 +05:30
|
|
|
return false;
|
2014-09-23 00:52:05 +05:30
|
|
|
|
|
|
|
for (i = 0; i < xbps_array_count(reverts); i++) {
|
|
|
|
xbps_array_get_cstring_nocopy(reverts, i, &revertver);
|
2014-09-23 21:52:57 +05:30
|
|
|
if (strcmp(version, revertver) == 0) {
|
2014-09-24 00:48:47 +05:30
|
|
|
return true;
|
2014-09-23 00:52:05 +05:30
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-09-24 00:20:34 +05:30
|
|
|
return false;
|
2014-09-23 00:52:05 +05:30
|
|
|
}
|
2015-02-18 19:42:39 +05:30
|
|
|
|
|
|
|
char *
|
|
|
|
xbps_sanitize_path(const char *src)
|
|
|
|
{
|
|
|
|
const char *s = src;
|
|
|
|
char *d, *dest;
|
|
|
|
size_t len;
|
|
|
|
|
|
|
|
assert(src);
|
|
|
|
len = strlen(src);
|
|
|
|
assert(len != 0);
|
|
|
|
|
2015-07-26 11:31:29 +05:30
|
|
|
dest = malloc(len+1);
|
2015-02-18 19:42:39 +05:30
|
|
|
assert(dest);
|
|
|
|
d = dest;
|
|
|
|
|
|
|
|
while ((*d = *s)) {
|
|
|
|
if (*s == '/' && *(s+1) == '/') {
|
|
|
|
s++;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
d++, s++;
|
|
|
|
}
|
|
|
|
*d = '\0';
|
|
|
|
|
|
|
|
return dest;
|
|
|
|
}
|
2015-02-19 14:17:09 +05:30
|
|
|
|
|
|
|
char *
|
2015-02-19 15:41:58 +05:30
|
|
|
xbps_symlink_target(struct xbps_handle *xhp, const char *path, const char *tgt)
|
2015-02-19 14:17:09 +05:30
|
|
|
{
|
|
|
|
struct stat sb;
|
2019-05-17 13:23:06 +05:30
|
|
|
char *res = NULL, *lnk = NULL, *p = NULL, *p1 = NULL, *dname = NULL;
|
|
|
|
char *rootdir = NULL;
|
2015-02-19 14:17:09 +05:30
|
|
|
ssize_t r;
|
|
|
|
|
2020-02-09 00:30:56 +05:30
|
|
|
assert(xhp);
|
|
|
|
assert(path);
|
|
|
|
assert(tgt);
|
|
|
|
|
2015-02-19 14:17:09 +05:30
|
|
|
if (lstat(path, &sb) == -1)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
lnk = malloc(sb.st_size + 1);
|
|
|
|
assert(lnk);
|
|
|
|
|
|
|
|
r = readlink(path, lnk, sb.st_size + 1);
|
|
|
|
if (r < 0 || r > sb.st_size) {
|
|
|
|
free(lnk);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
lnk[sb.st_size] = '\0';
|
2015-02-19 15:41:58 +05:30
|
|
|
|
|
|
|
if (tgt[0] != '/') {
|
|
|
|
/*
|
|
|
|
* target file is relative and wasn't converted to absolute by
|
|
|
|
* xbps-create(8), just compare it as is.
|
|
|
|
*/
|
|
|
|
return lnk;
|
|
|
|
}
|
|
|
|
|
2019-05-17 13:23:06 +05:30
|
|
|
rootdir = realpath(xhp->rootdir, NULL);
|
|
|
|
if (rootdir == NULL) {
|
|
|
|
free(lnk);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2019-05-17 11:49:21 +05:30
|
|
|
if (strstr(lnk, "./")) {
|
|
|
|
/* contains references to relative paths */
|
|
|
|
p = realpath(path, NULL);
|
|
|
|
if (p == NULL) {
|
|
|
|
/* dangling symlink, use target */
|
2019-05-17 13:23:06 +05:30
|
|
|
free(rootdir);
|
2019-06-18 18:09:27 +05:30
|
|
|
free(lnk);
|
2019-05-17 11:49:21 +05:30
|
|
|
return strdup(tgt);
|
|
|
|
}
|
2019-05-17 13:23:06 +05:30
|
|
|
if (strcmp(rootdir, "/") == 0) {
|
|
|
|
res = strdup(p);
|
2019-05-17 11:49:21 +05:30
|
|
|
} else {
|
2019-05-17 13:23:06 +05:30
|
|
|
p1 = strdup(p + strlen(rootdir));
|
|
|
|
assert(p1);
|
|
|
|
res = xbps_sanitize_path(p1);
|
|
|
|
free(p1);
|
2019-05-17 11:49:21 +05:30
|
|
|
}
|
|
|
|
free(lnk);
|
2019-05-17 13:23:06 +05:30
|
|
|
free(p);
|
2019-05-17 11:49:21 +05:30
|
|
|
} else if (lnk[0] != '/') {
|
|
|
|
/* relative path */
|
2015-02-19 15:41:58 +05:30
|
|
|
p = strdup(path);
|
|
|
|
assert(p);
|
|
|
|
dname = dirname(p);
|
|
|
|
assert(dname);
|
2019-05-17 13:23:06 +05:30
|
|
|
if (strcmp(rootdir, "/") == 0) {
|
|
|
|
p1 = xbps_xasprintf("%s/%s", dname, lnk);
|
|
|
|
assert(p1);
|
|
|
|
res = xbps_sanitize_path(p1);
|
|
|
|
free(p1);
|
2019-06-18 18:09:27 +05:30
|
|
|
free(p);
|
2016-02-03 16:22:07 +05:30
|
|
|
} else {
|
2019-05-17 13:23:06 +05:30
|
|
|
p1 = strdup(dname + strlen(rootdir));
|
2019-05-17 11:49:21 +05:30
|
|
|
assert(p1);
|
2019-05-17 13:23:06 +05:30
|
|
|
free(p);
|
|
|
|
p = xbps_xasprintf("%s/%s", p1, lnk);
|
2019-05-17 11:49:21 +05:30
|
|
|
free(p1);
|
2019-05-17 13:23:06 +05:30
|
|
|
res = xbps_sanitize_path(p);
|
|
|
|
free(p);
|
2015-02-19 15:41:58 +05:30
|
|
|
}
|
|
|
|
free(lnk);
|
|
|
|
} else {
|
|
|
|
/* absolute */
|
|
|
|
res = lnk;
|
|
|
|
}
|
2019-05-17 11:49:21 +05:30
|
|
|
assert(res);
|
2019-05-17 13:23:06 +05:30
|
|
|
free(rootdir);
|
2015-02-19 15:41:58 +05:30
|
|
|
|
|
|
|
return res;
|
2015-02-19 14:17:09 +05:30
|
|
|
}
|
2020-01-18 19:19:59 +05:30
|
|
|
|
|
|
|
bool
|
|
|
|
xbps_patterns_match(xbps_array_t patterns, const char *path)
|
|
|
|
{
|
|
|
|
bool match = false;
|
|
|
|
|
2020-02-09 00:30:56 +05:30
|
|
|
assert(path);
|
|
|
|
|
2020-01-18 19:19:59 +05:30
|
|
|
if (patterns == NULL)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
for (unsigned int i = 0; i < xbps_array_count(patterns); i++) {
|
|
|
|
const char *pattern = NULL;
|
|
|
|
bool negate = false;
|
|
|
|
if (!xbps_array_get_cstring_nocopy(patterns, i, &pattern))
|
|
|
|
continue;
|
|
|
|
if (pattern == NULL)
|
|
|
|
continue;
|
|
|
|
if ((negate = *pattern == '!') || *pattern == '\\')
|
|
|
|
pattern++;
|
|
|
|
if (fnmatch(pattern, path, 0) == 0)
|
|
|
|
match = !negate;
|
|
|
|
}
|
|
|
|
|
|
|
|
return match;
|
|
|
|
}
|