7aebea684b
libfetch from NetBSD's pkgsrc has been imported into lib/fetch, but the objects are embedded into libxbps. Only a public function to fetch files has been implemented: xbps_fetch_file(). The library now is built with -fvisibility=hidden by default, and exported symbols are the ones that use the SYMEXPORT macro. The code works well enough, but will need many more cleanups. --HG-- extra : convert_revision : xtraeme%40gmail.com-20091027004600-0lq9aao67lisbzxv
480 lines
12 KiB
C
480 lines
12 KiB
C
/*-
|
|
* Copyright (c) 2008-2009 Juan Romero Pardines.
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <stdbool.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <errno.h>
|
|
#include <fcntl.h>
|
|
|
|
#include <xbps_api.h>
|
|
|
|
static int unpack_archive_fini(struct archive *, prop_dictionary_t, bool);
|
|
static void set_extract_flags(int *);
|
|
|
|
int SYMEXPORT
|
|
xbps_unpack_binary_pkg(prop_dictionary_t pkg, bool essential)
|
|
{
|
|
prop_string_t filename, repoloc, arch;
|
|
struct archive *ar;
|
|
const char *pkgname;
|
|
char *binfile;
|
|
int pkg_fd, rv = 0;
|
|
|
|
assert(pkg != NULL);
|
|
|
|
/*
|
|
* Append filename to the full path for binary pkg.
|
|
*/
|
|
prop_dictionary_get_cstring_nocopy(pkg, "pkgname", &pkgname);
|
|
filename = prop_dictionary_get(pkg, "filename");
|
|
arch = prop_dictionary_get(pkg, "architecture");
|
|
repoloc = prop_dictionary_get(pkg, "repository");
|
|
if (filename == NULL || arch == NULL || repoloc == NULL)
|
|
return ENOTSUP;
|
|
|
|
binfile = xbps_xasprintf("%s/%s/%s",
|
|
prop_string_cstring_nocopy(repoloc),
|
|
prop_string_cstring_nocopy(arch),
|
|
prop_string_cstring_nocopy(filename));
|
|
if (binfile == NULL)
|
|
return EINVAL;
|
|
|
|
if ((pkg_fd = open(binfile, O_RDONLY)) == -1) {
|
|
rv = errno;
|
|
goto out;
|
|
}
|
|
|
|
ar = archive_read_new();
|
|
if (ar == NULL) {
|
|
rv = ENOMEM;
|
|
goto out2;
|
|
}
|
|
|
|
/*
|
|
* Enable support for tar format and all compression methods.
|
|
*/
|
|
archive_read_support_compression_all(ar);
|
|
archive_read_support_format_tar(ar);
|
|
|
|
if ((rv = archive_read_open_fd(ar, pkg_fd,
|
|
ARCHIVE_READ_BLOCKSIZE)) != 0)
|
|
goto out3;
|
|
|
|
rv = unpack_archive_fini(ar, pkg, essential);
|
|
/*
|
|
* If installation of package was successful, make sure the package
|
|
* is really on storage (if possible).
|
|
*/
|
|
if (rv == 0) {
|
|
if (fsync(pkg_fd) == -1) {
|
|
rv = errno;
|
|
goto out3;
|
|
}
|
|
/*
|
|
* Set package state to unpacked.
|
|
*/
|
|
rv = xbps_set_pkg_state_installed(pkgname,
|
|
XBPS_PKG_STATE_UNPACKED);
|
|
}
|
|
out3:
|
|
archive_read_finish(ar);
|
|
out2:
|
|
(void)close(pkg_fd);
|
|
out:
|
|
free(binfile);
|
|
|
|
return rv;
|
|
}
|
|
|
|
/*
|
|
* Flags for extracting files in binary packages. If a package
|
|
* is marked as "essential", its files will be overwritten and then
|
|
* the old and new dictionaries are compared to find out if there
|
|
* are some files that were in the old package that should be removed.
|
|
*/
|
|
#define EXTRACT_FLAGS ARCHIVE_EXTRACT_SECURE_NODOTDOT | \
|
|
ARCHIVE_EXTRACT_SECURE_SYMLINKS | \
|
|
ARCHIVE_EXTRACT_NO_OVERWRITE | \
|
|
ARCHIVE_EXTRACT_NO_OVERWRITE_NEWER
|
|
#define FEXTRACT_FLAGS ARCHIVE_EXTRACT_OWNER | ARCHIVE_EXTRACT_PERM | \
|
|
ARCHIVE_EXTRACT_TIME | EXTRACT_FLAGS
|
|
|
|
static void
|
|
set_extract_flags(int *flags)
|
|
{
|
|
*flags = 0;
|
|
if (getuid() == 0)
|
|
*flags = FEXTRACT_FLAGS;
|
|
else
|
|
*flags = EXTRACT_FLAGS;
|
|
}
|
|
|
|
static int
|
|
install_config_file(prop_dictionary_t d, struct archive_entry *entry,
|
|
const char *pkgname, int *flags, bool *skip)
|
|
{
|
|
prop_dictionary_t forigd;
|
|
prop_object_t obj, obj2;
|
|
prop_object_iterator_t iter, iter2;
|
|
const char *cffile, *sha256_new = NULL;
|
|
char *buf, *sha256_cur = NULL, *sha256_orig = NULL;
|
|
int rv = 0;
|
|
bool install_new = false;
|
|
|
|
if (d == NULL)
|
|
return 0;
|
|
|
|
iter = xbps_get_array_iter_from_dict(d, "conf_files");
|
|
if (iter == NULL)
|
|
return 0;
|
|
|
|
/*
|
|
* Get original hash for the file from current
|
|
* installed package.
|
|
*/
|
|
buf = xbps_xasprintf(".%s/metadata/%s/%s", XBPS_META_PATH,
|
|
pkgname, XBPS_PKGFILES);
|
|
if (buf == NULL)
|
|
return errno;
|
|
|
|
forigd = prop_dictionary_internalize_from_file(buf);
|
|
free(buf);
|
|
if (forigd == NULL) {
|
|
install_new = true;
|
|
goto out;
|
|
}
|
|
|
|
iter2 = xbps_get_array_iter_from_dict(forigd, "conf_files");
|
|
if (iter2 != NULL) {
|
|
while ((obj2 = prop_object_iterator_next(iter2))) {
|
|
prop_dictionary_get_cstring_nocopy(obj2,
|
|
"file", &cffile);
|
|
buf = xbps_xasprintf(".%s", cffile);
|
|
if (buf == NULL) {
|
|
prop_object_iterator_release(iter2);
|
|
rv = errno;
|
|
goto out;
|
|
}
|
|
if (strcmp(archive_entry_pathname(entry), buf) == 0) {
|
|
prop_dictionary_get_cstring(obj2, "sha256",
|
|
&sha256_orig);
|
|
free(buf);
|
|
break;
|
|
}
|
|
free(buf);
|
|
buf = NULL;
|
|
}
|
|
prop_object_iterator_release(iter2);
|
|
}
|
|
prop_object_release(forigd);
|
|
/*
|
|
* First case: original hash not found, install new file.
|
|
*/
|
|
if (sha256_orig == NULL) {
|
|
install_new = true;
|
|
goto out;
|
|
}
|
|
|
|
/*
|
|
* Compare original, installed and new hash for current file.
|
|
*/
|
|
while ((obj = prop_object_iterator_next(iter))) {
|
|
prop_dictionary_get_cstring_nocopy(obj, "file", &cffile);
|
|
buf = xbps_xasprintf(".%s", cffile);
|
|
if (buf == NULL) {
|
|
prop_object_iterator_release(iter);
|
|
return errno;
|
|
}
|
|
if (strcmp(archive_entry_pathname(entry), buf)) {
|
|
free(buf);
|
|
buf = NULL;
|
|
continue;
|
|
}
|
|
sha256_cur = xbps_get_file_hash(buf);
|
|
free(buf);
|
|
prop_dictionary_get_cstring_nocopy(obj, "sha256", &sha256_new);
|
|
if (sha256_new == NULL) {
|
|
rv = EINVAL;
|
|
break;
|
|
}
|
|
if (sha256_cur == NULL) {
|
|
if (errno == ENOENT) {
|
|
/*
|
|
* File not installed, install new one.
|
|
*/
|
|
install_new = true;
|
|
break;
|
|
} else {
|
|
rv = errno;
|
|
break;
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Orig = X, Curr = X, New = X
|
|
*
|
|
* Install new file.
|
|
*/
|
|
if ((strcmp(sha256_orig, sha256_cur) == 0) &&
|
|
(strcmp(sha256_orig, sha256_new) == 0) &&
|
|
(strcmp(sha256_cur, sha256_new) == 0)) {
|
|
install_new = true;
|
|
break;
|
|
/*
|
|
* Orig = X, Curr = X, New = Y
|
|
*
|
|
* Install new file.
|
|
*/
|
|
} else if ((strcmp(sha256_orig, sha256_cur) == 0) &&
|
|
(strcmp(sha256_orig, sha256_new)) &&
|
|
(strcmp(sha256_cur, sha256_new))) {
|
|
printf("Updating %s file with new version.\n",
|
|
cffile);
|
|
install_new = true;
|
|
break;
|
|
/*
|
|
* Orig = X, Curr = Y, New = X
|
|
*
|
|
* Keep current file as is.
|
|
*/
|
|
} else if ((strcmp(sha256_orig, sha256_new) == 0) &&
|
|
(strcmp(sha256_cur, sha256_new)) &&
|
|
(strcmp(sha256_orig, sha256_cur))) {
|
|
printf("Keeping modified file %s.\n", cffile);
|
|
*skip = true;
|
|
break;
|
|
/*
|
|
* Orig = X, Curr = Y, New = Y
|
|
*
|
|
* Install new file.
|
|
*/
|
|
} else if ((strcmp(sha256_cur, sha256_new) == 0) &&
|
|
(strcmp(sha256_orig, sha256_new)) &&
|
|
(strcmp(sha256_orig, sha256_cur))) {
|
|
install_new = true;
|
|
break;
|
|
/*
|
|
* Orig = X, Curr = Y, New = Z
|
|
*
|
|
* Install new file as file.new.
|
|
*/
|
|
} else if ((strcmp(sha256_orig, sha256_cur)) &&
|
|
(strcmp(sha256_cur, sha256_new)) &&
|
|
(strcmp(sha256_orig, sha256_new))) {
|
|
buf = xbps_xasprintf(".%s.new", cffile);
|
|
if (buf == NULL) {
|
|
rv = errno;
|
|
break;
|
|
}
|
|
printf("Keeping modified file %s.\n", cffile);
|
|
printf("Installing new version as %s.new.\n", cffile);
|
|
install_new = true;
|
|
archive_entry_set_pathname(entry, buf);
|
|
free(buf);
|
|
break;
|
|
}
|
|
}
|
|
|
|
out:
|
|
if (install_new) {
|
|
*flags &= ~ARCHIVE_EXTRACT_NO_OVERWRITE;
|
|
*flags &= ~ARCHIVE_EXTRACT_NO_OVERWRITE_NEWER;
|
|
}
|
|
if (sha256_orig)
|
|
free(sha256_orig);
|
|
if (sha256_cur)
|
|
free(sha256_cur);
|
|
|
|
prop_object_iterator_release(iter);
|
|
|
|
return rv;
|
|
}
|
|
|
|
/*
|
|
* TODO: remove printfs and return appropiate errors to be interpreted by
|
|
* the consumer.
|
|
*/
|
|
static int
|
|
unpack_archive_fini(struct archive *ar, prop_dictionary_t pkg,
|
|
bool essential)
|
|
{
|
|
prop_dictionary_t filesd;
|
|
struct archive_entry *entry;
|
|
const char *pkgname, *version, *rootdir, *entry_str;
|
|
char *buf, *buf2;
|
|
int rv = 0, flags, lflags;
|
|
bool actgt = false, skip_entry = false;
|
|
|
|
assert(ar != NULL);
|
|
assert(pkg != NULL);
|
|
rootdir = xbps_get_rootdir();
|
|
flags = xbps_get_flags();
|
|
|
|
if (strcmp(rootdir, "") == 0)
|
|
rootdir = "/";
|
|
|
|
if (chdir(rootdir) == -1)
|
|
return errno;
|
|
|
|
prop_dictionary_get_cstring_nocopy(pkg, "pkgname", &pkgname);
|
|
prop_dictionary_get_cstring_nocopy(pkg, "version", &version);
|
|
|
|
while (archive_read_next_header(ar, &entry) == ARCHIVE_OK) {
|
|
entry_str = archive_entry_pathname(entry);
|
|
set_extract_flags(&lflags);
|
|
if (((strcmp("./INSTALL", entry_str)) == 0) ||
|
|
((strcmp("./REMOVE", entry_str)) == 0) ||
|
|
((strcmp("./files.plist", entry_str)) == 0) ||
|
|
((strcmp("./props.plist", entry_str)) == 0) || essential) {
|
|
/*
|
|
* Always overwrite files in essential packages,
|
|
* and metadata files.
|
|
*/
|
|
lflags &= ~ARCHIVE_EXTRACT_NO_OVERWRITE;
|
|
lflags &= ~ARCHIVE_EXTRACT_NO_OVERWRITE_NEWER;
|
|
}
|
|
|
|
/*
|
|
* Run the pre INSTALL action if the file is there.
|
|
*/
|
|
if (strcmp("./INSTALL", entry_str) == 0) {
|
|
buf = xbps_xasprintf(".%s/metadata/%s/INSTALL",
|
|
XBPS_META_PATH, pkgname);
|
|
if (buf == NULL)
|
|
return errno;
|
|
|
|
actgt = true;
|
|
archive_entry_set_pathname(entry, buf);
|
|
|
|
if (archive_read_extract(ar, entry, lflags) != 0) {
|
|
if ((rv = archive_errno(ar)) != EEXIST) {
|
|
free(buf);
|
|
return rv;
|
|
}
|
|
}
|
|
|
|
if ((rv = xbps_file_chdir_exec(rootdir, buf, "pre",
|
|
pkgname, version, NULL)) != 0) {
|
|
free(buf);
|
|
printf("%s: preinst action target error %s\n",
|
|
pkgname, strerror(errno));
|
|
return rv;
|
|
}
|
|
/* pass to the next entry if successful */
|
|
free(buf);
|
|
continue;
|
|
|
|
/*
|
|
* Unpack metadata files in final directory.
|
|
*/
|
|
} else if (strcmp("./REMOVE", entry_str) == 0) {
|
|
buf2 = xbps_xasprintf(".%s/metadata/%s/REMOVE",
|
|
XBPS_META_PATH, pkgname);
|
|
if (buf2 == NULL)
|
|
return errno;
|
|
archive_entry_set_pathname(entry, buf2);
|
|
free(buf2);
|
|
buf2 = NULL;
|
|
} else if (strcmp("./files.plist", entry_str) == 0) {
|
|
/*
|
|
* Now we have a dictionary from the entry
|
|
* in memory. Will be written to disk later, when
|
|
* all files are extracted.
|
|
*/
|
|
filesd = xbps_read_dict_from_archive_entry(ar, entry);
|
|
if (filesd == NULL)
|
|
return errno;
|
|
|
|
/* Pass to next entry */
|
|
continue;
|
|
|
|
} else if (strcmp("./props.plist", entry_str) == 0) {
|
|
buf2 = xbps_xasprintf(".%s/metadata/%s/props.plist",
|
|
XBPS_META_PATH, pkgname);
|
|
if (buf2 == NULL)
|
|
return errno;
|
|
archive_entry_set_pathname(entry, buf2);
|
|
free(buf2);
|
|
} else {
|
|
/*
|
|
* Handle configuration files.
|
|
*/
|
|
if ((rv = install_config_file(filesd, entry, pkgname,
|
|
&lflags, &skip_entry)) != 0) {
|
|
prop_object_release(filesd);
|
|
return rv;
|
|
}
|
|
if (skip_entry) {
|
|
archive_read_data_skip(ar);
|
|
skip_entry = false;
|
|
continue;
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Extract entry from archive.
|
|
*/
|
|
if (archive_read_extract(ar, entry, lflags) != 0) {
|
|
rv = archive_errno(ar);
|
|
if (rv != EEXIST) {
|
|
printf("ERROR: %s...exiting!\n",
|
|
archive_error_string(ar));
|
|
return rv;;
|
|
} else if (rv == EEXIST) {
|
|
if (flags & XBPS_FLAG_VERBOSE) {
|
|
printf("WARNING: ignoring existent "
|
|
"path: %s\n",
|
|
archive_entry_pathname(entry));
|
|
}
|
|
rv = 0;
|
|
continue;
|
|
}
|
|
}
|
|
if (flags & XBPS_FLAG_VERBOSE)
|
|
printf(" %s\n", archive_entry_pathname(entry));
|
|
}
|
|
|
|
if ((rv = archive_errno(ar)) == 0) {
|
|
/*
|
|
* Now that all files were successfully unpacked, we
|
|
* can safely externalize files.plist because the path
|
|
* is reachable.
|
|
*/
|
|
buf2 = xbps_xasprintf(".%s/metadata/%s/files.plist",
|
|
XBPS_META_PATH, pkgname);
|
|
if (!prop_dictionary_externalize_to_file(filesd, buf2)) {
|
|
prop_object_release(filesd);
|
|
free(buf2);
|
|
return errno;
|
|
}
|
|
free(buf2);
|
|
}
|
|
prop_object_release(filesd);
|
|
|
|
return rv;
|
|
}
|