2013-06-10 13:58:39 +05:30
|
|
|
/*-
|
2014-01-30 17:37:34 +05:30
|
|
|
* Copyright (c) 2012-2014 Juan Romero Pardines.
|
2013-06-10 13:58:39 +05:30
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
|
|
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
|
|
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdbool.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <errno.h>
|
2013-12-24 15:13:55 +05:30
|
|
|
#include <libgen.h>
|
2013-08-29 18:00:14 +05:30
|
|
|
#include <fcntl.h>
|
2013-06-10 13:58:39 +05:30
|
|
|
|
2013-12-24 15:13:55 +05:30
|
|
|
#include <openssl/err.h>
|
|
|
|
#include <openssl/sha.h>
|
|
|
|
#include <openssl/rsa.h>
|
|
|
|
#include <openssl/ssl.h>
|
|
|
|
#include <openssl/pem.h>
|
|
|
|
|
2013-06-10 13:58:39 +05:30
|
|
|
#include "xbps_api_impl.h"
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @file lib/repo.c
|
|
|
|
* @brief Repository functions
|
|
|
|
* @defgroup repo Repository functions
|
|
|
|
*/
|
|
|
|
char *
|
|
|
|
xbps_repo_path(struct xbps_handle *xhp, const char *url)
|
|
|
|
{
|
|
|
|
assert(xhp);
|
|
|
|
assert(url);
|
|
|
|
|
|
|
|
return xbps_xasprintf("%s/%s-repodata",
|
|
|
|
url, xhp->target_arch ? xhp->target_arch : xhp->native_arch);
|
|
|
|
}
|
|
|
|
|
2013-10-07 13:49:04 +05:30
|
|
|
static xbps_dictionary_t
|
2013-12-12 04:48:08 +05:30
|
|
|
repo_get_dict(struct xbps_repo *repo)
|
2013-10-07 13:49:04 +05:30
|
|
|
{
|
2013-12-12 04:48:08 +05:30
|
|
|
xbps_dictionary_t d = NULL;
|
2013-10-07 13:49:04 +05:30
|
|
|
struct archive_entry *entry;
|
2013-12-12 04:48:08 +05:30
|
|
|
char *adata = NULL;
|
|
|
|
const void *buf;
|
|
|
|
off_t offset;
|
|
|
|
size_t size;
|
2013-10-07 13:49:04 +05:30
|
|
|
int rv;
|
|
|
|
|
2014-01-22 16:23:08 +05:30
|
|
|
if (repo->ar == NULL)
|
|
|
|
return NULL;
|
|
|
|
|
2013-12-12 04:48:08 +05:30
|
|
|
rv = archive_read_next_header(repo->ar, &entry);
|
|
|
|
if (rv != ARCHIVE_OK) {
|
|
|
|
xbps_dbg_printf(repo->xhp,
|
|
|
|
"%s: read_next_header %s\n", repo->uri,
|
|
|
|
archive_error_string(repo->ar));
|
2013-10-07 13:49:04 +05:30
|
|
|
return NULL;
|
2013-12-12 04:48:08 +05:30
|
|
|
}
|
2013-10-07 13:49:04 +05:30
|
|
|
for (;;) {
|
2013-12-12 04:48:08 +05:30
|
|
|
rv = archive_read_data_block(repo->ar, &buf, &size, &offset);
|
|
|
|
if (rv == ARCHIVE_EOF)
|
2013-10-07 13:49:04 +05:30
|
|
|
break;
|
2013-12-12 04:48:08 +05:30
|
|
|
if (rv != ARCHIVE_OK) {
|
2014-04-19 19:37:29 +05:30
|
|
|
if (adata != NULL)
|
|
|
|
free(adata);
|
|
|
|
|
2013-12-12 04:48:08 +05:30
|
|
|
xbps_dbg_printf(repo->xhp,
|
|
|
|
"%s: read_data_block %s\n", repo->uri,
|
|
|
|
archive_error_string(repo->ar));
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
if (adata == NULL) {
|
|
|
|
adata = malloc(size);
|
|
|
|
} else {
|
2013-12-16 12:15:51 +05:30
|
|
|
adata = realloc(adata, size+offset);
|
2013-12-12 04:48:08 +05:30
|
|
|
if (adata == NULL) {
|
|
|
|
free(adata);
|
2013-10-07 13:49:04 +05:30
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
}
|
2013-12-12 04:48:08 +05:30
|
|
|
memcpy(adata+offset, buf, size);
|
2013-10-07 13:49:04 +05:30
|
|
|
}
|
2013-12-12 04:48:08 +05:30
|
|
|
if (adata != NULL) {
|
|
|
|
d = xbps_dictionary_internalize(adata);
|
|
|
|
free(adata);
|
|
|
|
}
|
|
|
|
return d;
|
2013-10-07 13:49:04 +05:30
|
|
|
}
|
|
|
|
|
2013-06-10 13:58:39 +05:30
|
|
|
struct xbps_repo *
|
2014-09-05 15:56:42 +05:30
|
|
|
xbps_repo_open(struct xbps_handle *xhp, const char *url, bool lock)
|
2013-06-10 13:58:39 +05:30
|
|
|
{
|
2013-12-24 15:13:55 +05:30
|
|
|
struct xbps_repo *repo;
|
2013-08-29 18:00:14 +05:30
|
|
|
struct stat st;
|
2013-06-10 13:58:39 +05:30
|
|
|
const char *arch;
|
|
|
|
char *repofile;
|
|
|
|
|
|
|
|
assert(xhp);
|
|
|
|
assert(url);
|
|
|
|
|
|
|
|
if (xhp->target_arch)
|
|
|
|
arch = xhp->target_arch;
|
|
|
|
else
|
|
|
|
arch = xhp->native_arch;
|
|
|
|
|
2013-12-24 15:13:55 +05:30
|
|
|
repo = calloc(1, sizeof(struct xbps_repo));
|
|
|
|
assert(repo);
|
|
|
|
repo->xhp = xhp;
|
|
|
|
repo->uri = url;
|
|
|
|
|
2013-06-10 13:58:39 +05:30
|
|
|
if (xbps_repository_is_remote(url)) {
|
|
|
|
/* remote repository */
|
|
|
|
char *rpath;
|
|
|
|
|
2014-04-19 19:37:29 +05:30
|
|
|
if ((rpath = xbps_get_remote_repo_string(url)) == NULL) {
|
|
|
|
free(repo);
|
2013-06-10 13:58:39 +05:30
|
|
|
return NULL;
|
2014-04-19 19:37:29 +05:30
|
|
|
}
|
2013-06-10 13:58:39 +05:30
|
|
|
repofile = xbps_xasprintf("%s/%s/%s-repodata", xhp->metadir, rpath, arch);
|
|
|
|
free(rpath);
|
2013-12-24 15:13:55 +05:30
|
|
|
repo->is_remote = true;
|
2013-06-10 13:58:39 +05:30
|
|
|
} else {
|
|
|
|
/* local repository */
|
|
|
|
repofile = xbps_repo_path(xhp, url);
|
|
|
|
}
|
2014-09-05 15:56:42 +05:30
|
|
|
/*
|
|
|
|
* Open or create the repository archive.
|
|
|
|
*/
|
2014-09-05 16:09:53 +05:30
|
|
|
if (lock)
|
2014-11-06 16:08:55 +05:30
|
|
|
repo->fd = open(repofile, O_RDWR);
|
2014-09-05 16:09:53 +05:30
|
|
|
else
|
|
|
|
repo->fd = open(repofile, O_RDONLY);
|
|
|
|
|
2014-09-05 15:56:42 +05:30
|
|
|
if (repo->fd == -1) {
|
|
|
|
xbps_dbg_printf(xhp, "[repo] `%s' open repodata %s\n",
|
|
|
|
repofile, strerror(errno));
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* Acquire a POSIX file lock on the archive; wait if the lock is
|
|
|
|
* already taken.
|
|
|
|
*/
|
|
|
|
if (lock && lockf(repo->fd, F_LOCK, 0) == -1) {
|
|
|
|
xbps_dbg_printf(xhp, "[repo] failed to lock %s: %s\n", repo->uri, strerror(errno));
|
|
|
|
goto out;
|
|
|
|
}
|
2014-10-08 13:30:17 +05:30
|
|
|
if (fstat(repo->fd, &st) == -1) {
|
|
|
|
xbps_dbg_printf(xhp, "[repo] `%s' fstat repodata %s\n",
|
|
|
|
repofile, strerror(errno));
|
|
|
|
goto out;
|
|
|
|
}
|
2013-12-12 04:48:08 +05:30
|
|
|
|
2013-12-24 15:13:55 +05:30
|
|
|
repo->ar = archive_read_new();
|
|
|
|
archive_read_support_compression_gzip(repo->ar);
|
|
|
|
archive_read_support_format_tar(repo->ar);
|
2013-12-12 04:48:08 +05:30
|
|
|
|
2014-09-05 15:56:42 +05:30
|
|
|
if (archive_read_open_fd(repo->ar, repo->fd, st.st_blksize) == ARCHIVE_FATAL) {
|
2013-10-05 15:08:04 +05:30
|
|
|
xbps_dbg_printf(xhp,
|
2013-12-12 04:48:08 +05:30
|
|
|
"[repo] `%s' failed to open repodata archive %s\n",
|
|
|
|
repofile, strerror(archive_errno(repo->ar)));
|
2013-10-07 13:49:04 +05:30
|
|
|
goto out;
|
|
|
|
}
|
2013-12-12 04:48:08 +05:30
|
|
|
if ((repo->idx = repo_get_dict(repo)) == NULL) {
|
2013-10-07 13:49:04 +05:30
|
|
|
xbps_dbg_printf(xhp,
|
|
|
|
"[repo] `%s' failed to internalize index on archive %s: %s\n",
|
|
|
|
url, repofile, strerror(archive_errno(repo->ar)));
|
|
|
|
goto out;
|
2013-06-10 13:58:39 +05:30
|
|
|
}
|
2014-01-30 17:37:34 +05:30
|
|
|
repo->idxmeta = repo_get_dict(repo);
|
|
|
|
if (repo->idxmeta != NULL)
|
|
|
|
repo->is_signed = true;
|
2013-10-07 13:49:04 +05:30
|
|
|
|
2013-06-10 13:58:39 +05:30
|
|
|
free(repofile);
|
|
|
|
return repo;
|
2014-09-05 15:56:42 +05:30
|
|
|
|
|
|
|
out:
|
|
|
|
if (repo->ar)
|
|
|
|
archive_read_free(repo->ar);
|
2014-10-07 10:57:45 +05:30
|
|
|
if (repo->fd != -1)
|
2014-09-05 15:56:42 +05:30
|
|
|
close(repo->fd);
|
|
|
|
free(repofile);
|
|
|
|
free(repo);
|
|
|
|
return NULL;
|
2013-06-10 13:58:39 +05:30
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2014-09-05 15:56:42 +05:30
|
|
|
xbps_repo_close(struct xbps_repo *repo, bool lock)
|
2013-06-10 13:58:39 +05:30
|
|
|
{
|
|
|
|
assert(repo);
|
|
|
|
|
2013-10-05 15:08:04 +05:30
|
|
|
if (repo->ar != NULL)
|
|
|
|
archive_read_finish(repo->ar);
|
2013-07-26 15:12:52 +05:30
|
|
|
|
2013-10-05 15:08:04 +05:30
|
|
|
if (repo->idx != NULL) {
|
2013-06-20 13:56:12 +05:30
|
|
|
xbps_object_release(repo->idx);
|
2013-10-05 15:08:04 +05:30
|
|
|
repo->idx = NULL;
|
|
|
|
}
|
2014-01-30 17:37:34 +05:30
|
|
|
if (repo->idxmeta != NULL) {
|
|
|
|
xbps_object_release(repo->idxmeta);
|
|
|
|
repo->idxmeta = NULL;
|
|
|
|
}
|
2014-09-05 15:56:42 +05:30
|
|
|
if (lock && lockf(repo->fd, F_ULOCK, 0) == -1)
|
|
|
|
xbps_dbg_printf(repo->xhp, "[repo] failed to unlock %s: %s\n", repo->uri, strerror(errno));
|
|
|
|
|
|
|
|
close(repo->fd);
|
|
|
|
free(repo);
|
2013-06-10 13:58:39 +05:30
|
|
|
}
|
|
|
|
|
2013-06-20 13:56:12 +05:30
|
|
|
xbps_dictionary_t
|
2013-06-10 13:58:39 +05:30
|
|
|
xbps_repo_get_virtualpkg(struct xbps_repo *repo, const char *pkg)
|
|
|
|
{
|
2013-06-20 13:56:12 +05:30
|
|
|
xbps_dictionary_t pkgd;
|
2013-06-10 13:58:39 +05:30
|
|
|
|
|
|
|
assert(repo);
|
|
|
|
assert(pkg);
|
|
|
|
|
2013-12-24 15:13:55 +05:30
|
|
|
if (repo->idx == NULL)
|
2013-07-26 15:12:52 +05:30
|
|
|
return NULL;
|
|
|
|
|
2013-06-10 13:58:39 +05:30
|
|
|
pkgd = xbps_find_virtualpkg_in_dict(repo->xhp, repo->idx, pkg);
|
|
|
|
if (pkgd) {
|
2013-06-20 13:56:12 +05:30
|
|
|
xbps_dictionary_set_cstring_nocopy(pkgd,
|
2013-06-10 13:58:39 +05:30
|
|
|
"repository", repo->uri);
|
|
|
|
return pkgd;
|
|
|
|
}
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2013-06-20 13:56:12 +05:30
|
|
|
xbps_dictionary_t
|
2013-06-10 13:58:39 +05:30
|
|
|
xbps_repo_get_pkg(struct xbps_repo *repo, const char *pkg)
|
|
|
|
{
|
2013-06-20 13:56:12 +05:30
|
|
|
xbps_dictionary_t pkgd;
|
2013-06-10 13:58:39 +05:30
|
|
|
|
|
|
|
assert(repo);
|
|
|
|
assert(pkg);
|
|
|
|
|
2013-12-24 15:13:55 +05:30
|
|
|
if (repo->idx == NULL)
|
2013-07-26 15:12:52 +05:30
|
|
|
return NULL;
|
|
|
|
|
2013-06-10 13:58:39 +05:30
|
|
|
pkgd = xbps_find_pkg_in_dict(repo->idx, pkg);
|
|
|
|
if (pkgd) {
|
2013-06-20 13:56:12 +05:30
|
|
|
xbps_dictionary_set_cstring_nocopy(pkgd,
|
2013-06-10 13:58:39 +05:30
|
|
|
"repository", repo->uri);
|
|
|
|
return pkgd;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
2013-06-14 11:43:51 +05:30
|
|
|
|
2013-06-20 13:56:12 +05:30
|
|
|
xbps_dictionary_t
|
|
|
|
xbps_repo_get_pkg_plist(struct xbps_handle *xhp, xbps_dictionary_t pkgd,
|
2013-06-14 13:52:10 +05:30
|
|
|
const char *plist)
|
|
|
|
{
|
2013-06-20 13:56:12 +05:30
|
|
|
xbps_dictionary_t bpkgd;
|
2013-06-14 13:52:10 +05:30
|
|
|
char *url;
|
|
|
|
|
|
|
|
url = xbps_repository_pkg_path(xhp, pkgd);
|
|
|
|
if (url == NULL)
|
|
|
|
return NULL;
|
|
|
|
|
2014-11-21 14:21:57 +05:30
|
|
|
bpkgd = xbps_archive_fetch_plist(url, plist);
|
2013-06-14 13:52:10 +05:30
|
|
|
free(url);
|
|
|
|
return bpkgd;
|
|
|
|
}
|
|
|
|
|
2013-06-20 13:56:12 +05:30
|
|
|
static xbps_array_t
|
|
|
|
revdeps_match(struct xbps_repo *repo, xbps_dictionary_t tpkgd, const char *str)
|
2013-06-14 11:43:51 +05:30
|
|
|
{
|
2013-06-20 13:56:12 +05:30
|
|
|
xbps_dictionary_t pkgd;
|
|
|
|
xbps_array_t revdeps = NULL, pkgdeps, provides;
|
|
|
|
xbps_object_iterator_t iter;
|
|
|
|
xbps_object_t obj;
|
2013-06-14 11:43:51 +05:30
|
|
|
const char *pkgver, *tpkgver, *arch, *vpkg;
|
|
|
|
char *buf;
|
|
|
|
|
2013-06-20 13:56:12 +05:30
|
|
|
iter = xbps_dictionary_iterator(repo->idx);
|
2013-06-14 11:43:51 +05:30
|
|
|
assert(iter);
|
|
|
|
|
2013-06-20 13:56:12 +05:30
|
|
|
while ((obj = xbps_object_iterator_next(iter))) {
|
|
|
|
pkgd = xbps_dictionary_get_keysym(repo->idx, obj);
|
|
|
|
if (xbps_dictionary_equals(pkgd, tpkgd))
|
2013-06-14 11:43:51 +05:30
|
|
|
continue;
|
|
|
|
|
2013-06-20 13:56:12 +05:30
|
|
|
pkgdeps = xbps_dictionary_get(pkgd, "run_depends");
|
|
|
|
if (!xbps_array_count(pkgdeps))
|
2013-06-14 11:43:51 +05:30
|
|
|
continue;
|
|
|
|
/*
|
|
|
|
* Try to match passed in string.
|
|
|
|
*/
|
|
|
|
if (str) {
|
|
|
|
if (!xbps_match_pkgdep_in_array(pkgdeps, str))
|
|
|
|
continue;
|
2013-06-20 13:56:12 +05:30
|
|
|
xbps_dictionary_get_cstring_nocopy(pkgd,
|
2013-06-14 11:43:51 +05:30
|
|
|
"architecture", &arch);
|
|
|
|
if (!xbps_pkg_arch_match(repo->xhp, arch, NULL))
|
|
|
|
continue;
|
|
|
|
|
2013-06-20 13:56:12 +05:30
|
|
|
xbps_dictionary_get_cstring_nocopy(pkgd,
|
2013-06-14 11:43:51 +05:30
|
|
|
"pkgver", &tpkgver);
|
|
|
|
/* match */
|
|
|
|
if (revdeps == NULL)
|
2013-06-20 13:56:12 +05:30
|
|
|
revdeps = xbps_array_create();
|
2013-06-14 11:43:51 +05:30
|
|
|
|
|
|
|
if (!xbps_match_string_in_array(revdeps, tpkgver))
|
2013-06-20 13:56:12 +05:30
|
|
|
xbps_array_add_cstring_nocopy(revdeps, tpkgver);
|
2013-06-14 11:43:51 +05:30
|
|
|
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* Try to match any virtual package.
|
|
|
|
*/
|
2013-06-20 13:56:12 +05:30
|
|
|
provides = xbps_dictionary_get(tpkgd, "provides");
|
2013-09-15 13:36:49 +05:30
|
|
|
for (unsigned int i = 0; i < xbps_array_count(provides); i++) {
|
2013-06-20 13:56:12 +05:30
|
|
|
xbps_array_get_cstring_nocopy(provides, i, &vpkg);
|
2013-06-14 11:43:51 +05:30
|
|
|
if (strchr(vpkg, '_') == NULL)
|
|
|
|
buf = xbps_xasprintf("%s_1", vpkg);
|
|
|
|
else
|
|
|
|
buf = strdup(vpkg);
|
|
|
|
|
|
|
|
if (!xbps_match_pkgdep_in_array(pkgdeps, buf)) {
|
|
|
|
free(buf);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
free(buf);
|
2013-06-20 13:56:12 +05:30
|
|
|
xbps_dictionary_get_cstring_nocopy(pkgd,
|
2013-06-14 11:43:51 +05:30
|
|
|
"architecture", &arch);
|
|
|
|
if (!xbps_pkg_arch_match(repo->xhp, arch, NULL))
|
|
|
|
continue;
|
|
|
|
|
2013-06-20 13:56:12 +05:30
|
|
|
xbps_dictionary_get_cstring_nocopy(pkgd, "pkgver",
|
2013-06-14 11:43:51 +05:30
|
|
|
&tpkgver);
|
|
|
|
/* match */
|
|
|
|
if (revdeps == NULL)
|
2013-06-20 13:56:12 +05:30
|
|
|
revdeps = xbps_array_create();
|
2013-06-14 11:43:51 +05:30
|
|
|
|
|
|
|
if (!xbps_match_string_in_array(revdeps, tpkgver))
|
2013-06-20 13:56:12 +05:30
|
|
|
xbps_array_add_cstring_nocopy(revdeps, tpkgver);
|
2013-06-14 11:43:51 +05:30
|
|
|
}
|
|
|
|
/*
|
|
|
|
* Try to match by pkgver.
|
|
|
|
*/
|
2013-06-20 13:56:12 +05:30
|
|
|
xbps_dictionary_get_cstring_nocopy(tpkgd, "pkgver", &pkgver);
|
2013-06-14 11:43:51 +05:30
|
|
|
if (!xbps_match_pkgdep_in_array(pkgdeps, pkgver))
|
|
|
|
continue;
|
|
|
|
|
2013-06-20 13:56:12 +05:30
|
|
|
xbps_dictionary_get_cstring_nocopy(pkgd,
|
2013-06-14 11:43:51 +05:30
|
|
|
"architecture", &arch);
|
|
|
|
if (!xbps_pkg_arch_match(repo->xhp, arch, NULL))
|
|
|
|
continue;
|
|
|
|
|
2013-06-20 13:56:12 +05:30
|
|
|
xbps_dictionary_get_cstring_nocopy(pkgd, "pkgver", &tpkgver);
|
2013-06-14 11:43:51 +05:30
|
|
|
/* match */
|
|
|
|
if (revdeps == NULL)
|
2013-06-20 13:56:12 +05:30
|
|
|
revdeps = xbps_array_create();
|
2013-06-14 11:43:51 +05:30
|
|
|
|
|
|
|
if (!xbps_match_string_in_array(revdeps, tpkgver))
|
2013-06-20 13:56:12 +05:30
|
|
|
xbps_array_add_cstring_nocopy(revdeps, tpkgver);
|
2013-06-14 11:43:51 +05:30
|
|
|
}
|
2013-06-20 13:56:12 +05:30
|
|
|
xbps_object_iterator_release(iter);
|
2013-06-14 11:43:51 +05:30
|
|
|
return revdeps;
|
|
|
|
}
|
|
|
|
|
2013-06-20 13:56:12 +05:30
|
|
|
xbps_array_t
|
2013-06-14 11:43:51 +05:30
|
|
|
xbps_repo_get_pkg_revdeps(struct xbps_repo *repo, const char *pkg)
|
|
|
|
{
|
2013-06-20 13:56:12 +05:30
|
|
|
xbps_array_t revdeps = NULL, vdeps = NULL;
|
|
|
|
xbps_dictionary_t pkgd;
|
2013-06-14 11:43:51 +05:30
|
|
|
const char *vpkg;
|
|
|
|
char *buf = NULL;
|
2013-06-27 21:44:38 +05:30
|
|
|
bool match = false;
|
2013-06-14 11:43:51 +05:30
|
|
|
|
2013-10-05 15:08:04 +05:30
|
|
|
if (repo->idx == NULL)
|
|
|
|
return NULL;
|
|
|
|
|
2013-06-14 11:43:51 +05:30
|
|
|
if (((pkgd = xbps_rpool_get_pkg(repo->xhp, pkg)) == NULL) &&
|
|
|
|
((pkgd = xbps_rpool_get_virtualpkg(repo->xhp, pkg)) == NULL)) {
|
|
|
|
errno = ENOENT;
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* If pkg is a virtual pkg let's match it instead of the real pkgver.
|
|
|
|
*/
|
2013-06-20 13:56:12 +05:30
|
|
|
if ((vdeps = xbps_dictionary_get(pkgd, "provides"))) {
|
2013-09-15 13:36:49 +05:30
|
|
|
for (unsigned int i = 0; i < xbps_array_count(vdeps); i++) {
|
2013-06-14 11:43:51 +05:30
|
|
|
char *vpkgn;
|
|
|
|
|
2013-06-20 13:56:12 +05:30
|
|
|
xbps_array_get_cstring_nocopy(vdeps, i, &vpkg);
|
2013-06-14 11:43:51 +05:30
|
|
|
if (strchr(vpkg, '_') == NULL)
|
|
|
|
buf = xbps_xasprintf("%s_1", vpkg);
|
|
|
|
else
|
|
|
|
buf = strdup(vpkg);
|
|
|
|
|
|
|
|
vpkgn = xbps_pkg_name(buf);
|
|
|
|
assert(vpkgn);
|
|
|
|
if (strcmp(vpkgn, pkg) == 0) {
|
|
|
|
free(vpkgn);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
free(vpkgn);
|
|
|
|
free(buf);
|
|
|
|
buf = NULL;
|
|
|
|
}
|
|
|
|
if (buf) {
|
2013-06-27 21:44:38 +05:30
|
|
|
match = true;
|
2013-06-14 11:43:51 +05:30
|
|
|
revdeps = revdeps_match(repo, pkgd, buf);
|
|
|
|
free(buf);
|
|
|
|
}
|
|
|
|
}
|
2013-06-27 21:44:38 +05:30
|
|
|
if (!match)
|
2013-06-14 11:43:51 +05:30
|
|
|
revdeps = revdeps_match(repo, pkgd, NULL);
|
|
|
|
|
|
|
|
return revdeps;
|
|
|
|
}
|
2013-12-24 15:13:55 +05:30
|
|
|
|
|
|
|
int
|
|
|
|
xbps_repo_key_import(struct xbps_repo *repo)
|
|
|
|
{
|
|
|
|
xbps_dictionary_t repokeyd = NULL;
|
2014-01-30 17:37:34 +05:30
|
|
|
xbps_data_t pubkey = NULL;
|
|
|
|
uint16_t pubkey_size = 0;
|
2014-10-05 11:08:14 +05:30
|
|
|
const char *signedby = NULL;
|
|
|
|
char *hexfp = NULL;
|
2013-12-24 15:13:55 +05:30
|
|
|
char *p, *dbkeyd, *rkeyfile = NULL;
|
|
|
|
int import, rv = 0;
|
|
|
|
|
|
|
|
assert(repo);
|
|
|
|
/*
|
|
|
|
* If repository does not have required metadata plist, ignore it.
|
|
|
|
*/
|
2014-01-30 17:37:34 +05:30
|
|
|
if (!xbps_dictionary_count(repo->idxmeta)) {
|
2013-12-24 15:13:55 +05:30
|
|
|
xbps_dbg_printf(repo->xhp,
|
|
|
|
"[repo] `%s' unsigned repository!\n", repo->uri);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
/*
|
2014-01-30 17:37:34 +05:30
|
|
|
* Check for required objects in index-meta:
|
|
|
|
* - signature-by (string)
|
|
|
|
* - public-key (data)
|
|
|
|
* - public-key-size (number)
|
2013-12-24 15:13:55 +05:30
|
|
|
*/
|
2014-01-30 17:37:34 +05:30
|
|
|
xbps_dictionary_get_cstring_nocopy(repo->idxmeta, "signature-by", &signedby);
|
|
|
|
xbps_dictionary_get_uint16(repo->idxmeta, "public-key-size", &pubkey_size);
|
|
|
|
pubkey = xbps_dictionary_get(repo->idxmeta, "public-key");
|
|
|
|
|
|
|
|
if (signedby == NULL || pubkey_size == 0 ||
|
|
|
|
xbps_object_type(pubkey) != XBPS_TYPE_DATA) {
|
2013-12-24 15:13:55 +05:30
|
|
|
xbps_dbg_printf(repo->xhp,
|
2014-01-30 17:37:34 +05:30
|
|
|
"[repo] `%s': incomplete signed repository "
|
|
|
|
"(missing objs)\n", repo->uri);
|
2013-12-24 15:13:55 +05:30
|
|
|
rv = EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
2014-01-30 17:37:34 +05:30
|
|
|
hexfp = xbps_pubkey2fp(repo->xhp, pubkey);
|
2013-12-24 15:13:55 +05:30
|
|
|
/*
|
|
|
|
* Check if the public key is alredy stored.
|
|
|
|
*/
|
2014-01-30 17:37:34 +05:30
|
|
|
rkeyfile = xbps_xasprintf("%s/keys/%s.plist", repo->xhp->metadir, hexfp);
|
2013-12-24 15:13:55 +05:30
|
|
|
repokeyd = xbps_dictionary_internalize_from_zfile(rkeyfile);
|
|
|
|
if (xbps_object_type(repokeyd) == XBPS_TYPE_DICTIONARY) {
|
|
|
|
xbps_dbg_printf(repo->xhp,
|
|
|
|
"[repo] `%s' public key already stored.\n", repo->uri);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* Notify the client and take appropiate action to import
|
|
|
|
* the repository public key. Pass back the public key openssh fingerprint
|
|
|
|
* to the client.
|
|
|
|
*/
|
|
|
|
import = xbps_set_cb_state(repo->xhp, XBPS_STATE_REPO_KEY_IMPORT, 0,
|
2014-01-30 17:37:34 +05:30
|
|
|
hexfp, "`%s' repository has been RSA signed by \"%s\"",
|
|
|
|
repo->uri, signedby);
|
2013-12-24 15:13:55 +05:30
|
|
|
if (import <= 0) {
|
|
|
|
rv = EAGAIN;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
p = strdup(rkeyfile);
|
|
|
|
dbkeyd = dirname(p);
|
|
|
|
assert(dbkeyd);
|
|
|
|
if (access(dbkeyd, R_OK|W_OK) == -1) {
|
2014-10-05 15:52:18 +05:30
|
|
|
rv = errno;
|
|
|
|
if (rv == ENOENT)
|
|
|
|
rv = xbps_mkpath(dbkeyd, 0755);
|
|
|
|
if (rv != 0) {
|
2014-10-05 16:41:59 +05:30
|
|
|
rv = errno;
|
2013-12-24 15:13:55 +05:30
|
|
|
xbps_dbg_printf(repo->xhp,
|
|
|
|
"[repo] `%s' cannot create %s: %s\n",
|
|
|
|
repo->uri, dbkeyd, strerror(errno));
|
|
|
|
free(p);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
free(p);
|
|
|
|
|
|
|
|
repokeyd = xbps_dictionary_create();
|
2014-01-30 17:37:34 +05:30
|
|
|
xbps_dictionary_set(repokeyd, "public-key", pubkey);
|
|
|
|
xbps_dictionary_set_uint16(repokeyd, "public-key-size", pubkey_size);
|
|
|
|
xbps_dictionary_set_cstring_nocopy(repokeyd, "signature-by", signedby);
|
2013-12-24 15:13:55 +05:30
|
|
|
|
2014-10-24 13:45:41 +05:30
|
|
|
if (!xbps_dictionary_externalize_to_file(repokeyd, rkeyfile)) {
|
2013-12-24 15:13:55 +05:30
|
|
|
rv = errno;
|
|
|
|
xbps_dbg_printf(repo->xhp,
|
|
|
|
"[repo] `%s' failed to externalize %s: %s\n",
|
|
|
|
repo->uri, rkeyfile, strerror(rv));
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
2014-10-05 11:02:43 +05:30
|
|
|
if (hexfp)
|
|
|
|
free(hexfp);
|
2013-12-24 15:13:55 +05:30
|
|
|
if (repokeyd)
|
|
|
|
xbps_object_release(repokeyd);
|
|
|
|
if (rkeyfile)
|
|
|
|
free(rkeyfile);
|
|
|
|
return rv;
|
|
|
|
}
|