/* * Copyright (c) 2011-2015 Juan Romero Pardines. * Copyright (c) 2014 Enno Boland. * Copyright (c) 2019 Duncan Overbruck . * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ #include #ifdef __FreeBSD__ #define _WITH_GETLINE /* getline() */ #endif #include #include #include #include #include #include #include #include #include #include #include "xbps_api_impl.h" /** * @file lib/conf.c * @brief Configuration parsing * @defgroup conf Configuration parsing * * Functions for parsing xbps configuration files. */ static void store_vars(struct xbps_handle *xhp, xbps_dictionary_t *d, const char *key, const char *path, size_t line, char *buf) { char *lp, *rp, *tc; size_t len; if (*d == NULL) *d = xbps_dictionary_create(); if (xhp->vpkgd_conf) xhp->vpkgd_conf = xbps_dictionary_create(); /* * Parse strings delimited by ':' i.e * : */ lp = buf; rp = strchr(buf, ':'); if (rp == NULL || *rp == '\0') { xbps_dbg_printf(xhp, "%s: ignoring invalid " "%s option at line %zu\n", path, key, line); return; } tc = strchr(buf, ':'); len = strlen(buf) - strlen(tc); lp[len] = '\0'; rp++; xbps_dictionary_set_cstring(*d, lp, rp); xbps_dictionary_set_cstring(xhp->vpkgd_conf, lp, rp); xbps_dbg_printf(xhp, "%s: added %s %s for %s\n", path, key, lp, rp); } static void store_preserved_file(struct xbps_handle *xhp, const char *file) { glob_t globbuf; char *p = NULL, *rfile = NULL; size_t len; int rv = 0; if (xhp->preserved_files == NULL) { xhp->preserved_files = xbps_array_create(); assert(xhp->preserved_files); } rfile = xbps_xasprintf("%s%s", xhp->rootdir, file); rv = glob(rfile, 0, NULL, &globbuf); if (rv == GLOB_NOMATCH) { if (xbps_match_string_in_array(xhp->preserved_files, file)) goto out; xbps_array_add_cstring(xhp->preserved_files, file); xbps_dbg_printf(xhp, "Added preserved file: %s\n", file); goto out; } else if (rv != 0) { goto out; } for (size_t i = 0; i < globbuf.gl_pathc; i++) { if (xbps_match_string_in_array(xhp->preserved_files, globbuf.gl_pathv[i])) continue; len = strlen(globbuf.gl_pathv[i]) - strlen(xhp->rootdir) + 1; p = malloc(len); assert(p); xbps_strlcpy(p, globbuf.gl_pathv[i] + strlen(xhp->rootdir), len); xbps_array_add_cstring(xhp->preserved_files, p); xbps_dbg_printf(xhp, "Added preserved file: %s (expanded from %s)\n", p, file); free(p); } out: globfree(&globbuf); free(rfile); } static bool store_repo(struct xbps_handle *xhp, const char *repo) { if (xhp->flags & XBPS_FLAG_IGNORE_CONF_REPOS) return false; return xbps_repo_store(xhp, repo); } static void store_ignored_pkg(struct xbps_handle *xhp, const char *pkgname) { if (xhp->ignored_pkgs == NULL) { xhp->ignored_pkgs = xbps_array_create(); assert(xhp->ignored_pkgs); } xbps_array_add_cstring(xhp->ignored_pkgs, pkgname); xbps_dbg_printf(xhp, "Added ignored package: %s\n", pkgname); } enum { KEY_ERROR = 0, KEY_ARCHITECTURE, KEY_BESTMATCHING, KEY_CACHEDIR, KEY_IGNOREPKG, KEY_INCLUDE, KEY_PRESERVE, KEY_REPOSITORY, KEY_ROOTDIR, KEY_SYSLOG, KEY_VIRTUALPKG, }; static const struct key { const char *str; size_t len; int key; } keys[] = { { "architecture", 12, KEY_ARCHITECTURE }, { "bestmatching", 12, KEY_BESTMATCHING }, { "cachedir", 8, KEY_CACHEDIR }, { "ignorepkg", 9, KEY_IGNOREPKG }, { "include", 7, KEY_INCLUDE }, { "preserve", 8, KEY_PRESERVE }, { "repository", 10, KEY_REPOSITORY }, { "rootdir", 7, KEY_ROOTDIR }, { "syslog", 6, KEY_SYSLOG }, { "virtualpkg", 10, KEY_VIRTUALPKG }, }; static int parse_option(char *buf, const char **keyp, char **valp) { size_t klen; const char *key; char *value; int k = 0; for (unsigned int i = 0; i < __arraycount(keys); i++) { key = keys[i].str; klen = keys[i].len; if (strncmp(buf, key, klen) == 0) { k = keys[i].key; break; } } /* non matching option */ if (k == 0) return 0; /* check if next char is the equal sign */ if (buf[klen] != '=') return 0; /* skip equal sign */ value = buf + klen + 1; /* eat blanks */ while (isblank((unsigned char)*value)) value++; /* eat final newline */ value[strlen(value)-1] = '\0'; /* option processed successfully */ *keyp = key; *valp = value; return k; } static int parse_file(struct xbps_handle *, const char *, bool); static int parse_files_glob(struct xbps_handle *xhp, xbps_dictionary_t seen, const char *cwd, const char *pat, bool nested) { char tmppath[PATH_MAX]; glob_t globbuf; int rs, rv = 0; rs = snprintf(tmppath, PATH_MAX, "%s/%s", pat[0] == '/' ? xhp->rootdir : cwd, pat); if (rs < 0 || rs >= PATH_MAX) return ENOMEM; switch (glob(tmppath, 0, NULL, &globbuf)) { case GLOB_ABORTED: return ENOMEM; case GLOB_NOSPACE: return EIO; case GLOB_NOMATCH: return 0; } for (size_t i = 0; i < globbuf.gl_pathc; i++) { if (seen != NULL) { const char *fname; bool mask = false; fname = basename(globbuf.gl_pathv[i]); if (xbps_dictionary_get_bool(seen, fname, &mask) && mask) continue; xbps_dictionary_set_bool(seen, fname, true); } if ((rv = parse_file(xhp, globbuf.gl_pathv[i], nested)) != 0) break; } globfree(&globbuf); return rv; } static int parse_file(struct xbps_handle *xhp, const char *path, bool nested) { FILE *fp; size_t len, nlines = 0; ssize_t nread; char *line = NULL; int rv = 0; int size, rs; char *dir; if ((fp = fopen(path, "r")) == NULL) { rv = errno; xbps_dbg_printf(xhp, "cannot read configuration file %s: %s\n", path, strerror(rv)); return rv; } xbps_dbg_printf(xhp, "Parsing configuration file: %s\n", path); while (rv == 0 && (nread = getline(&line, &len, fp)) != -1) { const char *key; char *p, *val; nlines++; p = line; /* eat blanks */ while (isblank((unsigned char)*p)) p++; /* ignore comments or empty lines */ if (*p == '#' || *p == '\n') continue; switch (parse_option(p, &key, &val)) { case KEY_ERROR: xbps_dbg_printf(xhp, "%s: ignoring invalid option at " "line %zu\n", path, nlines); continue; case KEY_ROOTDIR: size = sizeof xhp->rootdir; rs = snprintf(xhp->rootdir, size, "%s", val); if (rs < 0 || rs >= size) { rv = ENOMEM; break; } xbps_dbg_printf(xhp, "%s: rootdir set to %s\n", path, val); break; case KEY_CACHEDIR: size = sizeof xhp->cachedir; rs = snprintf(xhp->cachedir, size, "%s", val); if (rs < 0 || rs >= size) { rv = ENOMEM; break; } xbps_dbg_printf(xhp, "%s: cachedir set to %s\n", path, val); break; case KEY_ARCHITECTURE: size = sizeof xhp->native_arch; rs = snprintf(xhp->native_arch, size, "%s", val); if (rs < 0 || rs >= size) { rv = ENOMEM; break; } xbps_dbg_printf(xhp, "%s: native architecture set to %s\n", path, val); break; case KEY_SYSLOG: if (strcasecmp(val, "true") == 0) { xhp->flags &= ~XBPS_FLAG_DISABLE_SYSLOG; xbps_dbg_printf(xhp, "%s: syslog enabled\n", path); } else { xhp->flags |= XBPS_FLAG_DISABLE_SYSLOG; xbps_dbg_printf(xhp, "%s: syslog disabled\n", path); } break; case KEY_REPOSITORY: if (store_repo(xhp, val)) xbps_dbg_printf(xhp, "%s: added repository %s\n", path, val); break; case KEY_VIRTUALPKG: store_vars(xhp, &xhp->vpkgd, key, path, nlines, val); break; case KEY_PRESERVE: store_preserved_file(xhp, val); break; case KEY_BESTMATCHING: if (strcasecmp(val, "true") == 0) { xhp->flags |= XBPS_FLAG_BESTMATCH; xbps_dbg_printf(xhp, "%s: pkg best matching enabled\n", path); } else { xhp->flags &= ~XBPS_FLAG_BESTMATCH; xbps_dbg_printf(xhp, "%s: pkg best matching disabled\n", path); } break; case KEY_IGNOREPKG: store_ignored_pkg(xhp, val); break; case KEY_INCLUDE: /* Avoid double-nested parsing, only allow it once */ if (nested) { xbps_dbg_printf(xhp, "%s: ignoring nested include\n", path); continue; } dir = strdup(path); if ((rv = parse_files_glob(xhp, NULL, dirname(dir), val, true)) != 0) { free(dir); break; } free(dir); break; } } free(line); fclose(fp); return rv; } int HIDDEN xbps_conf_init(struct xbps_handle *xhp) { xbps_dictionary_t seen; int rv = 0; assert(xhp); seen = xbps_dictionary_create(); assert(seen); if (*xhp->confdir) { xbps_dbg_printf(xhp, "Processing configuration directory: %s\n", xhp->confdir); if ((rv = parse_files_glob(xhp, seen, xhp->confdir, "*.conf", false))) goto out; } if (*xhp->sysconfdir) { xbps_dbg_printf(xhp, "Processing system configuration directory: %s\n", xhp->sysconfdir); if ((rv = parse_files_glob(xhp, seen, xhp->sysconfdir, "*.conf", false))) goto out; } out: xbps_object_release(seen); return rv; }