2010-11-19 18:10:13 +05:30
|
|
|
/*-
|
2020-04-29 17:42:10 +05:30
|
|
|
* Copyright (c) 2011-2015 Juan Romero Pardines.
|
|
|
|
* Copyright (c) 2014 Enno Boland.
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
|
|
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
|
|
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
2010-11-19 18:10:13 +05:30
|
|
|
*/
|
|
|
|
|
2012-11-19 20:12:24 +05:30
|
|
|
#include <sys/utsname.h>
|
2010-11-19 18:10:13 +05:30
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <errno.h>
|
|
|
|
|
|
|
|
#include "xbps_api_impl.h"
|
|
|
|
|
2011-01-22 18:54:51 +05:30
|
|
|
/**
|
|
|
|
* @file lib/initend.c
|
|
|
|
* @brief Initialization and finalization routines
|
|
|
|
* @defgroup initend Initialization and finalization functions
|
|
|
|
*
|
2011-02-21 22:12:47 +05:30
|
|
|
* Use these functions to initialize some parameters before start
|
2011-01-22 18:54:51 +05:30
|
|
|
* using libxbps and finalize usage to release resources at the end.
|
|
|
|
*/
|
2015-09-15 12:56:07 +05:30
|
|
|
|
2011-06-04 17:07:53 +05:30
|
|
|
int
|
2012-06-14 11:52:11 +05:30
|
|
|
xbps_init(struct xbps_handle *xhp)
|
2010-11-19 18:10:13 +05:30
|
|
|
{
|
2020-02-14 17:51:35 +05:30
|
|
|
const char *native_arch = NULL;
|
2019-06-18 18:41:56 +05:30
|
|
|
int rv = 0;
|
2011-06-04 17:07:53 +05:30
|
|
|
|
2012-06-14 11:52:11 +05:30
|
|
|
assert(xhp != NULL);
|
2011-02-21 22:12:47 +05:30
|
|
|
|
2020-02-14 17:51:35 +05:30
|
|
|
xbps_dbg_printf(xhp, "%s\n", XBPS_RELVER);
|
|
|
|
|
2013-12-16 16:16:39 +05:30
|
|
|
/* Set rootdir */
|
|
|
|
if (xhp->rootdir[0] == '\0') {
|
2014-02-25 21:12:52 +05:30
|
|
|
xhp->rootdir[0] = '/';
|
|
|
|
xhp->rootdir[1] = '\0';
|
2013-12-16 16:16:39 +05:30
|
|
|
} else if (xhp->rootdir[0] != '/') {
|
2020-02-14 17:51:35 +05:30
|
|
|
char cwd[XBPS_MAXPATH];
|
|
|
|
|
2019-03-06 19:04:23 +05:30
|
|
|
if (getcwd(cwd, sizeof(cwd)) == NULL)
|
2020-02-14 17:51:35 +05:30
|
|
|
return ENOBUFS;
|
|
|
|
if (xbps_path_prepend(xhp->rootdir, sizeof xhp->rootdir, cwd) == -1)
|
|
|
|
return ENOBUFS;
|
2013-12-16 16:16:39 +05:30
|
|
|
}
|
2020-02-14 17:51:35 +05:30
|
|
|
if (xbps_path_clean(xhp->rootdir) == -1)
|
|
|
|
return ENOTSUP;
|
2019-03-06 19:04:23 +05:30
|
|
|
|
2014-11-06 14:28:04 +05:30
|
|
|
/* set confdir */
|
|
|
|
if (xhp->confdir[0] == '\0') {
|
2020-02-14 17:51:35 +05:30
|
|
|
if (xbps_path_join(xhp->confdir, sizeof xhp->confdir,
|
|
|
|
xhp->rootdir, XBPS_SYSCONF_PATH, (char *)NULL) == -1)
|
|
|
|
return ENOBUFS;
|
2014-11-06 14:28:04 +05:30
|
|
|
} else if (xhp->confdir[0] != '/') {
|
|
|
|
/* relative path */
|
2020-02-14 17:51:35 +05:30
|
|
|
if (xbps_path_prepend(xhp->confdir, sizeof xhp->confdir,
|
|
|
|
xhp->rootdir) == -1)
|
|
|
|
return ENOBUFS;
|
2014-11-06 14:28:04 +05:30
|
|
|
}
|
2020-02-14 17:51:35 +05:30
|
|
|
if (xbps_path_clean(xhp->confdir) == -1)
|
|
|
|
return ENOTSUP;
|
2019-03-06 19:04:23 +05:30
|
|
|
|
2014-11-06 14:28:04 +05:30
|
|
|
/* set sysconfdir */
|
2019-03-06 19:04:23 +05:30
|
|
|
if (xhp->sysconfdir[0] == '\0') {
|
2020-02-14 17:51:35 +05:30
|
|
|
if (xbps_path_join(xhp->sysconfdir, sizeof xhp->sysconfdir,
|
|
|
|
xhp->rootdir, XBPS_SYSDEFCONF_PATH, (char *)NULL) == -1)
|
|
|
|
return ENOBUFS;
|
2019-03-06 19:04:23 +05:30
|
|
|
}
|
2020-02-14 17:51:35 +05:30
|
|
|
if (xbps_path_clean(xhp->sysconfdir) == -1)
|
|
|
|
return ENOTSUP;
|
2014-05-31 10:14:07 +05:30
|
|
|
|
2021-02-05 03:57:06 +05:30
|
|
|
xbps_fetch_set_cache_connection(XBPS_FETCH_CACHECONN, XBPS_FETCH_CACHECONN_HOST);
|
|
|
|
|
2021-06-26 18:56:18 +05:30
|
|
|
xhp->vpkgd = xbps_dictionary_create();
|
|
|
|
if (xhp->vpkgd == NULL)
|
|
|
|
return errno ? errno : ENOMEM;
|
|
|
|
xhp->vpkgd_conf = xbps_dictionary_create();
|
|
|
|
if (xhp->vpkgd_conf == NULL)
|
|
|
|
return errno ? errno : ENOMEM;
|
|
|
|
|
2021-02-05 03:57:06 +05:30
|
|
|
/* process xbps.d directories */
|
|
|
|
if ((rv = xbps_conf_init(xhp)) != 0)
|
|
|
|
return rv;
|
|
|
|
|
|
|
|
/* target arch only through env var */
|
2013-03-07 22:38:12 +05:30
|
|
|
xhp->target_arch = getenv("XBPS_TARGET_ARCH");
|
2020-02-14 17:51:35 +05:30
|
|
|
if (xhp->target_arch && *xhp->target_arch == '\0')
|
|
|
|
xhp->target_arch = NULL;
|
|
|
|
|
2021-02-05 03:57:06 +05:30
|
|
|
/* allow to overwrite uname(3) and conf file with env variable */
|
2020-02-14 17:51:35 +05:30
|
|
|
if ((native_arch = getenv("XBPS_ARCH")) && *native_arch != '\0') {
|
|
|
|
if (xbps_strlcpy(xhp->native_arch, native_arch,
|
|
|
|
sizeof xhp->native_arch) >= sizeof xhp->native_arch)
|
2021-02-05 04:05:48 +05:30
|
|
|
return ENOBUFS;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (*xhp->native_arch == '\0') {
|
|
|
|
struct utsname un;
|
|
|
|
if (uname(&un) == -1)
|
|
|
|
return ENOTSUP;
|
|
|
|
if (xbps_strlcpy(xhp->native_arch, un.machine,
|
|
|
|
sizeof xhp->native_arch) >= sizeof xhp->native_arch)
|
2020-02-14 17:51:35 +05:30
|
|
|
return ENOBUFS;
|
2014-01-09 16:11:25 +05:30
|
|
|
}
|
2020-02-14 17:51:35 +05:30
|
|
|
assert(*xhp->native_arch);
|
2012-06-15 19:03:11 +05:30
|
|
|
|
2015-09-15 12:56:07 +05:30
|
|
|
/* Set cachedir */
|
|
|
|
if (xhp->cachedir[0] == '\0') {
|
2020-02-14 17:51:35 +05:30
|
|
|
if (xbps_path_join(xhp->cachedir, sizeof xhp->cachedir,
|
|
|
|
xhp->rootdir, XBPS_CACHE_PATH, (char *)NULL) == -1)
|
|
|
|
return ENOBUFS;
|
2015-09-15 12:56:07 +05:30
|
|
|
} else if (xhp->cachedir[0] != '/') {
|
|
|
|
/* relative path */
|
2020-02-14 17:51:35 +05:30
|
|
|
if (xbps_path_prepend(xhp->cachedir, sizeof xhp->cachedir,
|
|
|
|
xhp->rootdir) == -1)
|
|
|
|
return ENOBUFS;
|
2015-09-15 12:56:07 +05:30
|
|
|
}
|
2020-02-14 17:51:35 +05:30
|
|
|
if (xbps_path_clean(xhp->cachedir) == -1)
|
|
|
|
return ENOTSUP;
|
|
|
|
|
2015-09-15 12:56:07 +05:30
|
|
|
/* Set metadir */
|
|
|
|
if (xhp->metadir[0] == '\0') {
|
2020-02-14 17:51:35 +05:30
|
|
|
if (xbps_path_join(xhp->metadir, sizeof xhp->metadir,
|
|
|
|
xhp->rootdir, XBPS_META_PATH, (char *)NULL) == -1)
|
|
|
|
return ENOBUFS;
|
2015-09-15 12:56:07 +05:30
|
|
|
} else if (xhp->metadir[0] != '/') {
|
|
|
|
/* relative path */
|
2020-02-14 17:51:35 +05:30
|
|
|
if (xbps_path_prepend(xhp->metadir, sizeof xhp->metadir,
|
|
|
|
xhp->rootdir) == -1)
|
|
|
|
return ENOBUFS;
|
2015-09-15 12:56:07 +05:30
|
|
|
}
|
2020-02-14 17:51:35 +05:30
|
|
|
if (xbps_path_clean(xhp->metadir) == -1)
|
|
|
|
return ENOTSUP;
|
2015-09-15 12:56:07 +05:30
|
|
|
|
2014-02-25 21:12:52 +05:30
|
|
|
xbps_dbg_printf(xhp, "rootdir=%s\n", xhp->rootdir);
|
|
|
|
xbps_dbg_printf(xhp, "metadir=%s\n", xhp->metadir);
|
|
|
|
xbps_dbg_printf(xhp, "cachedir=%s\n", xhp->cachedir);
|
2014-11-06 14:28:04 +05:30
|
|
|
xbps_dbg_printf(xhp, "confdir=%s\n", xhp->confdir);
|
2019-03-06 19:04:23 +05:30
|
|
|
xbps_dbg_printf(xhp, "sysconfdir=%s\n", xhp->sysconfdir);
|
2014-06-04 13:09:02 +05:30
|
|
|
xbps_dbg_printf(xhp, "syslog=%s\n", xhp->flags & XBPS_FLAG_DISABLE_SYSLOG ? "false" : "true");
|
2014-11-07 14:48:01 +05:30
|
|
|
xbps_dbg_printf(xhp, "bestmatching=%s\n", xhp->flags & XBPS_FLAG_BESTMATCH ? "true" : "false");
|
2020-01-25 03:39:12 +05:30
|
|
|
xbps_dbg_printf(xhp, "keepconf=%s\n", xhp->flags & XBPS_FLAG_KEEP_CONFIG ? "true" : "false");
|
2013-03-07 22:38:12 +05:30
|
|
|
xbps_dbg_printf(xhp, "Architecture: %s\n", xhp->native_arch);
|
2020-04-20 23:50:29 +05:30
|
|
|
xbps_dbg_printf(xhp, "Target Architecture: %s\n", xhp->target_arch ? xhp->target_arch : "(null)");
|
2011-10-17 17:54:30 +05:30
|
|
|
|
2013-09-18 20:15:05 +05:30
|
|
|
if (xhp->flags & XBPS_FLAG_DEBUG) {
|
2020-02-14 17:51:35 +05:30
|
|
|
const char *repodir;
|
2013-09-18 20:15:05 +05:30
|
|
|
for (unsigned int i = 0; i < xbps_array_count(xhp->repositories); i++) {
|
2020-02-14 17:51:35 +05:30
|
|
|
if (!xbps_array_get_cstring_nocopy(xhp->repositories, i, &repodir))
|
|
|
|
return errno;
|
2013-09-18 20:15:05 +05:30
|
|
|
xbps_dbg_printf(xhp, "Repository[%u]=%s\n", i, repodir);
|
|
|
|
}
|
|
|
|
}
|
2019-03-06 19:04:23 +05:30
|
|
|
|
2011-06-04 17:07:53 +05:30
|
|
|
return 0;
|
2010-11-19 18:10:13 +05:30
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2012-06-14 11:52:11 +05:30
|
|
|
xbps_end(struct xbps_handle *xhp)
|
2010-11-19 18:10:13 +05:30
|
|
|
{
|
2012-09-24 14:20:23 +05:30
|
|
|
assert(xhp);
|
|
|
|
|
2012-01-20 15:40:52 +05:30
|
|
|
xbps_pkgdb_release(xhp);
|
2011-02-21 18:08:44 +05:30
|
|
|
}
|