Juan RP
35718e676c
Document alternatives in the API.
2015-10-30 13:18:32 +01:00
Juan RP
3ae197f94a
xbps_pkgdb_unlock: there's no need to call xbps_pkgdb_update().
...
Users should call xbps_end() instead; this will flush pkgdb automatically.
2015-10-30 13:17:21 +01:00
Juan RP
cb857dfc27
Alternatives framework for xbps (2/2).
...
See xbps-alternatives(1) for more information.
Thanks to all who helped to design this and for fixing grammar in
the manual page.
2015-10-30 12:24:46 +01:00
Juan RP
f4cb178f6c
libfetch: use default CA path rather than default CA file.
...
The default CA file set by FreeBSD is only available when using the
LibreSSL provided CA file, and we've decided to use the CA path
by default.
Discussed with @dominikh.
2015-10-28 07:31:26 +01:00
Juan RP
c4bce18734
Merge pull request #122 from GiedriusS/fix_1
...
libxbps: remove unused variable `pkgdepname'
2015-10-28 05:24:48 +01:00
Juan RP
a13a7fa896
Implemented reverse conflicts for pkgs in pkgdb and transaction.
2015-10-28 05:23:42 +01:00
Juan RP
2c81984f48
repo: fix 29608b0
correctly.
...
In 29608b0
local repos were simply ignored.
2015-10-27 14:22:30 +01:00
Juan RP
29608b0d8b
repo: with XBPS_FLAG_REPOS_MEMSYNC only process remote repos.
2015-10-27 12:47:24 +01:00
Giedrius Statkevičius
5595bf95f1
libxbps: remove unused variable `pkgdepname'
2015-10-25 20:03:02 +02:00
Juan RP
90eb1d9433
libfetch: merge some features from FreeBSD:
...
- Supports HTTP/1.1 308 redirect.
- SSLv[23] HTTPS connections are forbidden by default.
- TLS client certificate validation thru OpenSSL.
- Fixes for user/password encoding, misc.
2015-10-24 07:52:30 +02:00
Juan RP
47c05047ea
Merge pull request #108 from datenwolf/master
...
set umask for pkgdb creation/access
2015-10-21 09:11:55 +02:00
Juan RP
103caf0694
libxbps: extend the fix for #116 even more for the expected case.
...
This now catches both test cases correctly.
2015-10-19 18:19:24 +02:00
Juan RP
b069eb14ae
libxbps: fixed issue #116 (vpkg does not replace pkg with update in trans).
...
Thanks to @dominikh for the test case.
2015-10-19 18:01:43 +02:00
Juan RP
4e446968c5
alternatives: do not ignore symlink(2) return value.
...
This fixes the travisci warning seen with gcc.
2015-10-19 17:11:34 +02:00
Juan RP
240d87af92
rpool: if pkg wasn't found set errno to ENOENT.
...
This is to return a proper error to the callers (i.e xbps-query(1)).
2015-10-19 17:05:55 +02:00
Juan RP
faeff38ca2
Alternatives framework (1/2) (WIP).
2015-10-18 10:38:35 +02:00
Juan RP
c457b594aa
libxbps: fix eudev-libgudev -> libgudev fallout.
...
Packages to be replaced must be collected *before* checking for
broken reverse dependencies, otherwise them will always be detected
as broken.
2015-10-14 11:46:56 +02:00
Juan RP
d8fc08eb50
libxbps: make relative cachedir set via xbps.d(5) work again.
...
Close #117
2015-09-15 09:26:07 +02:00
Juan RP
782ec10111
xbps-create(1): timestamps of metadata files are now set to epoch.
...
Thanks to @Gottox for finding the real issue.
2015-09-03 11:12:49 +02:00
Juan RP
8081751f86
libxbps: print in verbose mode what pkgs are added to the transaction.
...
Useful to know why a transaction cannot be completed when there are
unresolved reverse dependencies.
Requested by @chris2.
2015-09-02 18:56:20 +02:00
Juan RP
0f2543a650
Fixed and improved msg when revdeps cannot be resolved in a transaction.
...
After:
$ xbps-install -un
re2-2015.07.01_1 (update) breaks installed pkg `chromium-44.0.2403.155_1'
Transaction aborted due to unresolved dependencies.
$
Before:
$ xbps-install -un
chromium-44.0.2403.155_1 broken, needs `re2-2015.07.01_1'
Transaction aborted due to unresolved dependencies.
$
2015-09-02 11:20:18 +02:00
Wolfgang Draxinger
bd8ea8133f
fixed umask value
2015-08-19 15:42:48 +02:00
Wolfgang Draxinger
13f73ef41a
Merge branch 'master' of github.com:voidlinux/xbps
2015-08-11 18:29:30 +02:00
Juan RP
8acc375487
portableproplib/prop_object: fix tyops in previous.
2015-07-26 09:16:32 +02:00
Juan RP
0d3c07cdee
portableproplib/prop_object: fix an insecure temporary file (CID #62739 ).
2015-07-26 09:11:20 +02:00
Juan RP
36026451ce
Fix some insecure temporary files reported by Coverity.
2015-07-26 09:02:04 +02:00
Juan RP
78f9a97980
lib/package_unpack: ignore remove(2) return value (CID #98681 ).
2015-07-26 08:22:27 +02:00
Juan RP
28f01b3836
xbps_transaction_package_replace: fix a resource leak (CID #98688 ).
2015-07-26 08:15:07 +02:00
Juan RP
0b7093e108
portableproplib/prop_object: handle possible NULL pointer deref (CID #62722 ).
2015-07-26 08:10:26 +02:00
Juan RP
a8d2b1d742
pkgdb: handle possible NULL pointer derefs (CID #98684 ).
2015-07-26 08:08:05 +02:00
Juan RP
7edabe907f
xbps_rpool_release: fix a double free (CID #98695 ).
2015-07-26 08:03:16 +02:00
Juan RP
090464e4b2
xbps_sanitize_path: fix an out-of-bounds access (CID #98686 ).
2015-07-26 08:01:29 +02:00
Wolfgang Draxinger
47b5eea0f6
set umask for pkgdb creation/access so that pkgdb remains readable for world, even if xbps tools have been called with a very restrictive umask
2015-07-19 11:47:09 +02:00
Juan RP
a7378f70de
fetch: fix regression introduced in 791e683e
.
...
us->size and us->{a,m}time must be set after there's real data.
2015-06-30 21:48:21 +02:00
Juan RP
22ffc14026
Override and use a sane umask when performing pkg configuration.
...
Close #106
2015-06-28 05:14:02 +02:00
Juan RP
791e683e01
fetch: handle GET with offset == length.
...
While xbps_fetch_file() creates the .part file and for whatever reason
it did not finish properly to rename the file, it could request the server
to restart the download with offset set to file size, resulting in HTTP 416
return code.
Handle this case by checking if the server returns 416 and then checking
if the returned file size matches the requested offset and just rename
the file.
Thanks to @beefcurtains for the test case.
2015-06-28 04:28:55 +02:00
Juan RP
00149d0f37
xbps_transaction_prepare: if ENOSPC, keep the transaction dictionary.
...
... we need this in xbps-install to print required/free space on rootfs.
Close #101
2015-06-20 09:48:21 +02:00
Juan RP
1774d17e40
Keep /usr/sbin if found as obsolete, it's a symlink in void.
2015-06-05 08:29:05 +02:00
Juan RP
87fcc7d6a8
If pkg signature verification files, remove pkg archive and its signature file.
2015-06-04 09:59:52 +02:00
Juan RP
92c07c126f
xbps_repo_lock: sleep() for a second if the lock is already taken.
...
... rather than looping continuously.
2015-06-04 08:08:40 +02:00
Juan RP
07e8330936
xbps-install(1): added -U --unpack-only to only unpack pkgs, skips configuration.
2015-06-03 11:15:11 +02:00
Juan RP
c464874c1e
unpack: make sure the xucd callbacks don't get a dangling pointer.
...
If the current entry filename has been changed, the pointer must be updated
to point to the updated string.
2015-05-28 10:39:39 +02:00
Juan RP
769a997afb
Introduce xbps_plist_{array,dictionary}_from_file().
...
Those are a wrapper around xbps_{array,dictionary}_internalize_from_zfile()
that prints a debugging msg when the plist file cannot be internalized.
Update xbps to use these wrappers.
2015-05-28 10:15:05 +02:00
Juan RP
2ba31e048a
proplib: check for EOF a bit early on the internalized plist.
2015-05-28 09:34:03 +02:00
Juan RP
fd30a00cb4
proplib: fix a NULL pointer dereference when internalizing empty blobs.
...
_prop_object_internalize_context_alloc: make sure that passed xml string
is not NULL before derefering it a bit later.
2015-05-28 09:14:28 +02:00
Juan RP
4fdc8de9d6
repo: make index and index-meta dicts immutable.
...
For clients that want to modify its content they will need to copy a mutable
dictionary instead. This will avoid unwanted modifications.
2015-05-22 12:19:48 +02:00
Juan RP
5e97a1eb39
xbps_pkgdb_update: return EINVAL if pkgdb cannot be internalized.
2015-05-22 12:18:54 +02:00
Juan RP
da74e3dd9e
libxbps: stop and error out if pkg signature is not valid.
2015-05-09 06:27:03 +02:00
Juan RP
c5d6556c50
xbps-remove: fix #95 (xbps-remove -R pkg lists/removes orphans)
2015-05-06 17:21:13 +02:00
Juan RP
ea364affc8
libxbps: open fds with O_CLOEXEC to avoid warnings of leaked fds.
2015-04-15 21:02:38 +02:00