2005-03-14 20:51:43 -05:00
|
|
|
/*
|
|
|
|
* util.c
|
2006-10-15 15:31:03 -04:00
|
|
|
*
|
2015-01-21 01:31:20 -05:00
|
|
|
* Copyright (c) 2006-2015 Pacman Development Team <pacman-dev@archlinux.org>
|
2009-07-01 03:08:33 -04:00
|
|
|
* Copyright (c) 2002-2006 by Judd Vinet <jvinet@zeroflux.org>
|
2006-10-15 15:31:03 -04:00
|
|
|
* Copyright (c) 2005 by Aurelien Foret <orelien@chez.com>
|
|
|
|
* Copyright (c) 2005 by Christian Hamar <krics@linuxforum.hu>
|
|
|
|
* Copyright (c) 2006 by David Kimpe <dnaku@frugalware.org>
|
|
|
|
* Copyright (c) 2005, 2006 by Miklos Vajna <vmiklos@frugalware.org>
|
2007-11-16 21:18:45 -05:00
|
|
|
*
|
2005-03-14 20:51:43 -05:00
|
|
|
* This program is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
2007-12-10 23:55:22 -05:00
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
2005-03-14 20:51:43 -05:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include <stdlib.h>
|
2007-04-29 12:47:02 -04:00
|
|
|
#include <unistd.h>
|
2005-03-14 20:51:43 -05:00
|
|
|
#include <ctype.h>
|
|
|
|
#include <dirent.h>
|
|
|
|
#include <time.h>
|
|
|
|
#include <syslog.h>
|
2007-04-29 12:47:02 -04:00
|
|
|
#include <errno.h>
|
2011-04-01 18:36:08 -04:00
|
|
|
#include <limits.h>
|
2009-07-08 05:08:32 -04:00
|
|
|
#include <sys/wait.h>
|
2011-10-30 13:33:14 -04:00
|
|
|
#include <fnmatch.h>
|
2007-04-29 12:47:02 -04:00
|
|
|
|
|
|
|
/* libarchive */
|
|
|
|
#include <archive.h>
|
|
|
|
#include <archive_entry.h>
|
2006-10-15 15:31:03 -04:00
|
|
|
|
2010-09-02 13:05:23 -04:00
|
|
|
#ifdef HAVE_LIBSSL
|
|
|
|
#include <openssl/md5.h>
|
2011-08-11 16:46:18 -04:00
|
|
|
#include <openssl/sha.h>
|
2010-09-02 13:05:23 -04:00
|
|
|
#else
|
|
|
|
#include "md5.h"
|
2011-08-11 16:46:18 -04:00
|
|
|
#include "sha2.h"
|
2010-09-02 13:05:23 -04:00
|
|
|
#endif
|
|
|
|
|
2007-03-05 17:13:33 -05:00
|
|
|
/* libalpm */
|
|
|
|
#include "util.h"
|
2005-03-14 20:51:43 -05:00
|
|
|
#include "log.h"
|
2013-01-28 20:23:25 -05:00
|
|
|
#include "libarchive-compat.h"
|
2005-03-14 20:51:43 -05:00
|
|
|
#include "alpm.h"
|
2007-08-20 13:28:51 -04:00
|
|
|
#include "alpm_list.h"
|
2009-07-08 05:08:32 -04:00
|
|
|
#include "handle.h"
|
2011-06-03 17:42:41 -04:00
|
|
|
#include "trans.h"
|
2005-03-14 20:51:43 -05:00
|
|
|
|
2007-07-12 15:20:43 -04:00
|
|
|
#ifndef HAVE_STRSEP
|
2011-11-22 00:35:46 -05:00
|
|
|
/** Extracts tokens from a string.
|
|
|
|
* Replaces strset which is not portable (missing on Solaris).
|
|
|
|
* Copyright (c) 2001 by François Gouget <fgouget_at_codeweavers.com>
|
|
|
|
* Modifies str to point to the first character after the token if one is
|
|
|
|
* found, or NULL if one is not.
|
|
|
|
* @param str string containing delimited tokens to parse
|
|
|
|
* @param delim character delimiting tokens in str
|
|
|
|
* @return pointer to the first token in str if str is not NULL, NULL if
|
|
|
|
* str is NULL
|
|
|
|
*/
|
2012-08-01 11:24:34 -04:00
|
|
|
char *strsep(char **str, const char *delims)
|
2006-10-15 15:31:03 -04:00
|
|
|
{
|
2012-08-01 11:24:34 -04:00
|
|
|
char *token;
|
2006-10-15 15:31:03 -04:00
|
|
|
|
2013-01-03 16:48:51 -05:00
|
|
|
if(*str == NULL) {
|
2006-10-15 15:31:03 -04:00
|
|
|
/* No more tokens */
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2013-01-03 16:48:51 -05:00
|
|
|
token = *str;
|
|
|
|
while(**str != '\0') {
|
|
|
|
if(strchr(delims, **str) != NULL) {
|
|
|
|
**str = '\0';
|
2006-10-15 15:31:03 -04:00
|
|
|
(*str)++;
|
|
|
|
return token;
|
|
|
|
}
|
|
|
|
(*str)++;
|
|
|
|
}
|
|
|
|
/* There is no other token */
|
2013-01-03 16:48:51 -05:00
|
|
|
*str = NULL;
|
2006-10-15 15:31:03 -04:00
|
|
|
return token;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2007-03-03 03:13:59 -05:00
|
|
|
int _alpm_makepath(const char *path)
|
2008-01-13 09:06:25 -05:00
|
|
|
{
|
2011-03-20 20:45:57 -04:00
|
|
|
return _alpm_makepath_mode(path, 0755);
|
2008-01-13 09:06:25 -05:00
|
|
|
}
|
|
|
|
|
2011-11-22 00:35:46 -05:00
|
|
|
/** Creates a directory, including parents if needed, similar to 'mkdir -p'.
|
|
|
|
* @param path directory path to create
|
|
|
|
* @param mode permission mode for created directories
|
|
|
|
* @return 0 on success, 1 on error
|
|
|
|
*/
|
2008-01-13 09:06:25 -05:00
|
|
|
int _alpm_makepath_mode(const char *path, mode_t mode)
|
2005-03-14 20:51:43 -05:00
|
|
|
{
|
2012-02-15 00:02:40 -05:00
|
|
|
char *ptr, *str;
|
|
|
|
mode_t oldmask;
|
2008-05-04 19:39:22 -04:00
|
|
|
int ret = 0;
|
2005-03-14 20:51:43 -05:00
|
|
|
|
2012-02-15 00:02:40 -05:00
|
|
|
STRDUP(str, path, return 1);
|
|
|
|
|
|
|
|
oldmask = umask(0000);
|
|
|
|
|
|
|
|
for(ptr = str; *ptr; ptr++) {
|
|
|
|
/* detect mid-path condition and zero length paths */
|
|
|
|
if(*ptr != '/' || ptr == str || ptr[-1] == '/') {
|
|
|
|
continue;
|
2005-03-14 20:51:43 -05:00
|
|
|
}
|
2012-02-15 00:02:40 -05:00
|
|
|
|
|
|
|
/* temporarily mask the end of the path */
|
|
|
|
*ptr = '\0';
|
|
|
|
|
2012-02-20 18:58:56 -05:00
|
|
|
if(mkdir(str, mode) < 0 && errno != EEXIST) {
|
2012-02-15 00:02:40 -05:00
|
|
|
ret = 1;
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* restore path separator */
|
|
|
|
*ptr = '/';
|
2005-03-14 20:51:43 -05:00
|
|
|
}
|
2012-02-15 00:02:40 -05:00
|
|
|
|
|
|
|
/* end of the string. add the full path. It will already exist when the path
|
|
|
|
* passed in has a trailing slash. */
|
2012-02-20 18:58:56 -05:00
|
|
|
if(mkdir(str, mode) < 0 && errno != EEXIST) {
|
2012-02-15 00:02:40 -05:00
|
|
|
ret = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
done:
|
2005-03-14 20:51:43 -05:00
|
|
|
umask(oldmask);
|
2012-02-15 00:02:40 -05:00
|
|
|
free(str);
|
2011-03-20 20:45:57 -04:00
|
|
|
return ret;
|
2005-03-14 20:51:43 -05:00
|
|
|
}
|
|
|
|
|
2011-11-22 00:35:46 -05:00
|
|
|
/** Copies a file.
|
|
|
|
* @param src file path to copy from
|
|
|
|
* @param dest file path to copy to
|
2013-11-08 00:44:40 -05:00
|
|
|
* @return 0 on success, 1 on error
|
2011-11-22 00:35:46 -05:00
|
|
|
*/
|
2007-03-03 03:13:59 -05:00
|
|
|
int _alpm_copyfile(const char *src, const char *dest)
|
2005-03-14 20:51:43 -05:00
|
|
|
{
|
2008-04-28 23:23:31 -04:00
|
|
|
char *buf;
|
2011-10-27 17:24:30 -04:00
|
|
|
int in, out, ret = 1;
|
|
|
|
ssize_t nread;
|
|
|
|
struct stat st;
|
2005-03-14 20:51:43 -05:00
|
|
|
|
2011-10-27 17:24:30 -04:00
|
|
|
MALLOC(buf, (size_t)ALPM_BUFFER_SIZE, return 1);
|
|
|
|
|
2014-01-02 13:37:12 -05:00
|
|
|
OPEN(in, src, O_RDONLY | O_CLOEXEC);
|
2011-10-27 17:24:30 -04:00
|
|
|
do {
|
2014-01-02 13:37:12 -05:00
|
|
|
out = open(dest, O_WRONLY | O_CREAT | O_BINARY | O_CLOEXEC, 0000);
|
2011-10-27 17:24:30 -04:00
|
|
|
} while(out == -1 && errno == EINTR);
|
|
|
|
if(in < 0 || out < 0) {
|
|
|
|
goto cleanup;
|
2005-03-14 20:51:43 -05:00
|
|
|
}
|
|
|
|
|
2011-10-27 17:24:30 -04:00
|
|
|
if(fstat(in, &st) || fchmod(out, st.st_mode)) {
|
|
|
|
goto cleanup;
|
|
|
|
}
|
2008-04-28 23:23:31 -04:00
|
|
|
|
2007-06-27 19:27:26 -04:00
|
|
|
/* do the actual file copy */
|
2011-10-27 17:24:30 -04:00
|
|
|
while((nread = read(in, buf, ALPM_BUFFER_SIZE)) > 0 || errno == EINTR) {
|
|
|
|
ssize_t nwrite = 0;
|
|
|
|
if(nread < 0) {
|
|
|
|
continue;
|
2010-06-27 07:13:01 -04:00
|
|
|
}
|
2011-10-27 17:24:30 -04:00
|
|
|
do {
|
|
|
|
nwrite = write(out, buf + nwrite, nread);
|
|
|
|
if(nwrite >= 0) {
|
|
|
|
nread -= nwrite;
|
|
|
|
} else if(errno != EINTR) {
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
} while(nread > 0);
|
2005-03-14 20:51:43 -05:00
|
|
|
}
|
2011-10-27 17:24:30 -04:00
|
|
|
ret = 0;
|
2007-06-27 19:27:26 -04:00
|
|
|
|
2008-04-28 23:23:31 -04:00
|
|
|
cleanup:
|
2011-10-27 15:59:24 -04:00
|
|
|
free(buf);
|
2011-10-27 17:24:30 -04:00
|
|
|
if(in >= 0) {
|
2013-07-03 20:33:19 -04:00
|
|
|
close(in);
|
2011-10-27 17:24:30 -04:00
|
|
|
}
|
|
|
|
if(out >= 0) {
|
2013-07-03 20:33:19 -04:00
|
|
|
close(out);
|
2011-10-27 17:24:30 -04:00
|
|
|
}
|
2011-03-20 20:45:57 -04:00
|
|
|
return ret;
|
2005-03-14 20:51:43 -05:00
|
|
|
}
|
|
|
|
|
2011-11-22 00:35:46 -05:00
|
|
|
/** Trim trailing newlines from a string (if any exist).
|
2011-07-29 19:49:38 -04:00
|
|
|
* @param str a single line of text
|
2012-05-28 17:32:11 -04:00
|
|
|
* @param len size of str, if known, else 0
|
2011-07-29 19:49:38 -04:00
|
|
|
* @return the length of the trimmed string
|
|
|
|
*/
|
2012-05-28 17:32:11 -04:00
|
|
|
size_t _alpm_strip_newline(char *str, size_t len)
|
2011-07-29 19:49:38 -04:00
|
|
|
{
|
2011-11-01 20:17:26 -04:00
|
|
|
if(*str == '\0') {
|
2011-07-29 19:49:38 -04:00
|
|
|
return 0;
|
|
|
|
}
|
2012-05-28 17:32:11 -04:00
|
|
|
if(len == 0) {
|
|
|
|
len = strlen(str);
|
|
|
|
}
|
2011-08-09 03:34:11 -04:00
|
|
|
while(len > 0 && str[len - 1] == '\n') {
|
2011-07-29 19:49:38 -04:00
|
|
|
len--;
|
|
|
|
}
|
|
|
|
str[len] = '\0';
|
|
|
|
|
|
|
|
return len;
|
|
|
|
}
|
|
|
|
|
2007-06-27 23:25:04 -04:00
|
|
|
/* Compression functions */
|
2006-10-15 15:31:03 -04:00
|
|
|
|
2011-11-22 00:35:46 -05:00
|
|
|
/** Open an archive for reading and perform the necessary boilerplate.
|
2011-11-14 00:45:55 -05:00
|
|
|
* This takes care of creating the libarchive 'archive' struct, setting up
|
|
|
|
* compression and format options, opening a file descriptor, setting up the
|
|
|
|
* buffer size, and performing a stat on the path once opened.
|
2012-01-08 12:53:22 -05:00
|
|
|
* On error, no file descriptor is opened, and the archive pointer returned
|
|
|
|
* will be set to NULL.
|
2011-11-14 00:45:55 -05:00
|
|
|
* @param handle the context handle
|
|
|
|
* @param path the path of the archive to open
|
|
|
|
* @param buf space for a stat buffer for the given path
|
|
|
|
* @param archive pointer to place the created archive object
|
|
|
|
* @param error error code to set on failure to open archive
|
|
|
|
* @return -1 on failure, >=0 file descriptor on success
|
|
|
|
*/
|
|
|
|
int _alpm_open_archive(alpm_handle_t *handle, const char *path,
|
|
|
|
struct stat *buf, struct archive **archive, alpm_errno_t error)
|
|
|
|
{
|
|
|
|
int fd;
|
|
|
|
size_t bufsize = ALPM_BUFFER_SIZE;
|
2012-02-11 01:17:59 -05:00
|
|
|
errno = 0;
|
2011-11-14 00:45:55 -05:00
|
|
|
|
|
|
|
if((*archive = archive_read_new()) == NULL) {
|
|
|
|
RET_ERR(handle, ALPM_ERR_LIBARCHIVE, -1);
|
|
|
|
}
|
|
|
|
|
2013-01-28 20:23:25 -05:00
|
|
|
_alpm_archive_read_support_filter_all(*archive);
|
2011-11-14 00:45:55 -05:00
|
|
|
archive_read_support_format_all(*archive);
|
|
|
|
|
|
|
|
_alpm_log(handle, ALPM_LOG_DEBUG, "opening archive %s\n", path);
|
2014-01-02 13:37:12 -05:00
|
|
|
OPEN(fd, path, O_RDONLY | O_CLOEXEC);
|
2011-11-14 00:45:55 -05:00
|
|
|
if(fd < 0) {
|
|
|
|
_alpm_log(handle, ALPM_LOG_ERROR,
|
|
|
|
_("could not open file %s: %s\n"), path, strerror(errno));
|
2012-01-08 12:53:22 -05:00
|
|
|
goto error;
|
2011-11-14 00:45:55 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
if(fstat(fd, buf) != 0) {
|
|
|
|
_alpm_log(handle, ALPM_LOG_ERROR,
|
|
|
|
_("could not stat file %s: %s\n"), path, strerror(errno));
|
2012-01-08 12:53:22 -05:00
|
|
|
goto error;
|
2011-11-14 00:45:55 -05:00
|
|
|
}
|
|
|
|
#ifdef HAVE_STRUCT_STAT_ST_BLKSIZE
|
|
|
|
if(buf->st_blksize > ALPM_BUFFER_SIZE) {
|
|
|
|
bufsize = buf->st_blksize;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
if(archive_read_open_fd(*archive, fd, bufsize) != ARCHIVE_OK) {
|
|
|
|
_alpm_log(handle, ALPM_LOG_ERROR, _("could not open file %s: %s\n"),
|
|
|
|
path, archive_error_string(*archive));
|
2012-01-08 12:53:22 -05:00
|
|
|
goto error;
|
2011-11-14 00:45:55 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
return fd;
|
2012-01-08 12:53:22 -05:00
|
|
|
|
|
|
|
error:
|
2013-01-28 20:23:25 -05:00
|
|
|
_alpm_archive_read_free(*archive);
|
2012-01-08 12:53:22 -05:00
|
|
|
*archive = NULL;
|
|
|
|
if(fd >= 0) {
|
2013-07-03 20:33:19 -04:00
|
|
|
close(fd);
|
2012-01-08 12:53:22 -05:00
|
|
|
}
|
|
|
|
RET_ERR(handle, error, -1);
|
2011-11-14 00:45:55 -05:00
|
|
|
}
|
|
|
|
|
2011-11-22 00:35:46 -05:00
|
|
|
/** Unpack a specific file in an archive.
|
2011-06-07 17:06:16 -04:00
|
|
|
* @param handle the context handle
|
|
|
|
* @param archive the archive to unpack
|
|
|
|
* @param prefix where to extract the files
|
|
|
|
* @param filename a file within the archive to unpack
|
2009-01-18 08:01:24 -05:00
|
|
|
* @return 0 on success, 1 on failure
|
2008-04-08 23:30:46 -04:00
|
|
|
*/
|
2011-06-28 00:04:00 -04:00
|
|
|
int _alpm_unpack_single(alpm_handle_t *handle, const char *archive,
|
2011-06-07 17:06:16 -04:00
|
|
|
const char *prefix, const char *filename)
|
2009-10-10 16:49:24 -04:00
|
|
|
{
|
|
|
|
alpm_list_t *list = NULL;
|
|
|
|
int ret = 0;
|
2011-06-07 17:06:16 -04:00
|
|
|
if(filename == NULL) {
|
2011-03-20 20:45:57 -04:00
|
|
|
return 1;
|
2009-10-10 16:49:24 -04:00
|
|
|
}
|
2011-06-07 17:06:16 -04:00
|
|
|
list = alpm_list_add(list, (void *)filename);
|
|
|
|
ret = _alpm_unpack(handle, archive, prefix, list, 1);
|
2009-10-10 16:49:24 -04:00
|
|
|
alpm_list_free(list);
|
2011-03-20 20:45:57 -04:00
|
|
|
return ret;
|
2009-10-10 16:49:24 -04:00
|
|
|
}
|
|
|
|
|
2011-11-22 00:35:46 -05:00
|
|
|
/** Unpack a list of files in an archive.
|
2011-06-07 17:06:16 -04:00
|
|
|
* @param handle the context handle
|
2011-11-14 00:45:55 -05:00
|
|
|
* @param path the archive to unpack
|
2011-06-07 17:06:16 -04:00
|
|
|
* @param prefix where to extract the files
|
|
|
|
* @param list a list of files within the archive to unpack or NULL for all
|
2009-10-10 16:49:24 -04:00
|
|
|
* @param breakfirst break after the first entry found
|
|
|
|
* @return 0 on success, 1 on failure
|
|
|
|
*/
|
2011-11-14 00:45:55 -05:00
|
|
|
int _alpm_unpack(alpm_handle_t *handle, const char *path, const char *prefix,
|
2011-06-07 17:06:16 -04:00
|
|
|
alpm_list_t *list, int breakfirst)
|
2005-03-14 20:51:43 -05:00
|
|
|
{
|
2009-01-18 08:01:24 -05:00
|
|
|
int ret = 0;
|
2007-11-14 20:22:06 -05:00
|
|
|
mode_t oldmask;
|
2011-11-14 00:45:55 -05:00
|
|
|
struct archive *archive;
|
2006-09-28 16:51:33 -04:00
|
|
|
struct archive_entry *entry;
|
2011-11-14 00:45:55 -05:00
|
|
|
struct stat buf;
|
|
|
|
int fd, cwdfd;
|
2006-10-15 15:31:03 -04:00
|
|
|
|
2011-11-14 00:45:55 -05:00
|
|
|
fd = _alpm_open_archive(handle, path, &buf, &archive, ALPM_ERR_PKG_OPEN);
|
|
|
|
if(fd < 0) {
|
|
|
|
return 1;
|
2006-11-16 12:24:41 -05:00
|
|
|
}
|
2006-10-15 15:31:03 -04:00
|
|
|
|
2007-11-14 20:22:06 -05:00
|
|
|
oldmask = umask(0022);
|
2009-01-18 08:01:24 -05:00
|
|
|
|
|
|
|
/* save the cwd so we can restore it later */
|
2014-01-02 13:37:12 -05:00
|
|
|
OPEN(cwdfd, ".", O_RDONLY | O_CLOEXEC);
|
2011-09-19 15:08:14 -04:00
|
|
|
if(cwdfd < 0) {
|
2011-07-01 12:01:38 -04:00
|
|
|
_alpm_log(handle, ALPM_LOG_ERROR, _("could not get current working directory\n"));
|
2009-01-18 08:01:24 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/* just in case our cwd was removed in the upgrade operation */
|
|
|
|
if(chdir(prefix) != 0) {
|
2011-07-01 12:01:38 -04:00
|
|
|
_alpm_log(handle, ALPM_LOG_ERROR, _("could not change directory to %s (%s)\n"),
|
2011-06-07 17:06:16 -04:00
|
|
|
prefix, strerror(errno));
|
2009-01-18 08:01:24 -05:00
|
|
|
ret = 1;
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
2011-11-14 00:45:55 -05:00
|
|
|
while(archive_read_next_header(archive, &entry) == ARCHIVE_OK) {
|
2011-10-26 15:55:50 -04:00
|
|
|
const char *entryname;
|
|
|
|
mode_t mode;
|
2007-11-14 20:22:06 -05:00
|
|
|
|
2007-07-01 20:12:36 -04:00
|
|
|
entryname = archive_entry_pathname(entry);
|
2009-11-12 18:59:34 -05:00
|
|
|
|
2009-10-10 16:49:24 -04:00
|
|
|
/* If specific files were requested, skip entries that don't match. */
|
|
|
|
if(list) {
|
2011-06-27 11:10:08 -04:00
|
|
|
char *entry_prefix = strdup(entryname);
|
2011-06-29 09:22:24 -04:00
|
|
|
char *p = strstr(entry_prefix,"/");
|
2009-10-10 16:49:24 -04:00
|
|
|
if(p) {
|
2013-01-03 16:48:51 -05:00
|
|
|
*(p + 1) = '\0';
|
2009-10-10 16:49:24 -04:00
|
|
|
}
|
2011-06-27 11:10:08 -04:00
|
|
|
char *found = alpm_list_find_str(list, entry_prefix);
|
|
|
|
free(entry_prefix);
|
2009-10-10 16:49:24 -04:00
|
|
|
if(!found) {
|
2011-11-14 00:45:55 -05:00
|
|
|
if(archive_read_data_skip(archive) != ARCHIVE_OK) {
|
2009-10-10 16:49:24 -04:00
|
|
|
ret = 1;
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
continue;
|
2009-10-09 13:11:27 -04:00
|
|
|
} else {
|
2011-07-01 12:01:38 -04:00
|
|
|
_alpm_log(handle, ALPM_LOG_DEBUG, "extracting: %s\n", entryname);
|
2007-11-14 20:22:06 -05:00
|
|
|
}
|
2005-03-14 20:51:43 -05:00
|
|
|
}
|
2008-04-08 23:30:46 -04:00
|
|
|
|
2011-10-26 15:55:50 -04:00
|
|
|
mode = archive_entry_mode(entry);
|
|
|
|
if(S_ISREG(mode)) {
|
|
|
|
archive_entry_set_perm(entry, 0644);
|
|
|
|
} else if(S_ISDIR(mode)) {
|
|
|
|
archive_entry_set_perm(entry, 0755);
|
|
|
|
}
|
|
|
|
|
2008-04-08 23:30:46 -04:00
|
|
|
/* Extract the archive entry. */
|
2011-11-14 00:45:55 -05:00
|
|
|
int readret = archive_read_extract(archive, entry, 0);
|
2007-11-14 20:22:06 -05:00
|
|
|
if(readret == ARCHIVE_WARN) {
|
2007-07-01 20:12:36 -04:00
|
|
|
/* operation succeeded but a non-critical error was encountered */
|
2011-07-01 12:01:38 -04:00
|
|
|
_alpm_log(handle, ALPM_LOG_WARNING, _("warning given when extracting %s (%s)\n"),
|
2011-11-14 00:45:55 -05:00
|
|
|
entryname, archive_error_string(archive));
|
2007-11-14 20:22:06 -05:00
|
|
|
} else if(readret != ARCHIVE_OK) {
|
2011-07-01 12:01:38 -04:00
|
|
|
_alpm_log(handle, ALPM_LOG_ERROR, _("could not extract %s (%s)\n"),
|
2011-11-14 00:45:55 -05:00
|
|
|
entryname, archive_error_string(archive));
|
2007-11-14 20:22:06 -05:00
|
|
|
ret = 1;
|
|
|
|
goto cleanup;
|
2005-03-14 20:51:43 -05:00
|
|
|
}
|
|
|
|
|
2009-10-10 16:49:24 -04:00
|
|
|
if(breakfirst) {
|
2006-10-15 15:31:03 -04:00
|
|
|
break;
|
2006-11-14 02:58:42 -05:00
|
|
|
}
|
2006-09-28 16:51:33 -04:00
|
|
|
}
|
2007-05-18 02:24:59 -04:00
|
|
|
|
2007-11-14 20:22:06 -05:00
|
|
|
cleanup:
|
|
|
|
umask(oldmask);
|
2013-01-28 20:23:25 -05:00
|
|
|
_alpm_archive_read_free(archive);
|
2013-07-03 20:33:19 -04:00
|
|
|
close(fd);
|
2011-09-19 15:08:14 -04:00
|
|
|
if(cwdfd >= 0) {
|
|
|
|
if(fchdir(cwdfd) != 0) {
|
|
|
|
_alpm_log(handle, ALPM_LOG_ERROR,
|
|
|
|
_("could not restore working directory (%s)\n"), strerror(errno));
|
|
|
|
}
|
2013-07-03 20:33:19 -04:00
|
|
|
close(cwdfd);
|
2009-01-18 08:01:24 -05:00
|
|
|
}
|
2011-09-19 15:08:14 -04:00
|
|
|
|
2011-03-20 20:45:57 -04:00
|
|
|
return ret;
|
2006-09-28 16:51:33 -04:00
|
|
|
}
|
|
|
|
|
2011-11-22 00:35:46 -05:00
|
|
|
/** Determine if there are files in a directory.
|
2011-07-16 11:07:25 -04:00
|
|
|
* @param handle the context handle
|
|
|
|
* @param path the full absolute directory path
|
|
|
|
* @param full_count whether to return an exact count of files
|
|
|
|
* @return a file count if full_count is != 0, else >0 if directory has
|
|
|
|
* contents, 0 if no contents, and -1 on error
|
|
|
|
*/
|
|
|
|
ssize_t _alpm_files_in_directory(alpm_handle_t *handle, const char *path,
|
|
|
|
int full_count)
|
|
|
|
{
|
|
|
|
ssize_t files = 0;
|
|
|
|
struct dirent *ent;
|
|
|
|
DIR *dir = opendir(path);
|
|
|
|
|
|
|
|
if(!dir) {
|
|
|
|
if(errno == ENOTDIR) {
|
|
|
|
_alpm_log(handle, ALPM_LOG_DEBUG, "%s was not a directory\n", path);
|
|
|
|
} else {
|
|
|
|
_alpm_log(handle, ALPM_LOG_DEBUG, "could not read directory %s\n",
|
|
|
|
path);
|
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
while((ent = readdir(dir)) != NULL) {
|
|
|
|
const char *name = ent->d_name;
|
|
|
|
|
|
|
|
if(strcmp(name, ".") == 0 || strcmp(name, "..") == 0) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
files++;
|
|
|
|
|
|
|
|
if(!full_count) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
closedir(dir);
|
|
|
|
return files;
|
|
|
|
}
|
|
|
|
|
2011-11-22 00:35:46 -05:00
|
|
|
/** Write formatted message to log.
|
|
|
|
* @param handle the context handle
|
|
|
|
* @param format formatted string to write out
|
|
|
|
* @param args formatting arguments
|
|
|
|
* @return 0 or number of characters written on success, vfprintf return value
|
|
|
|
* on error
|
|
|
|
*/
|
2013-01-18 20:42:21 -05:00
|
|
|
int _alpm_logaction(alpm_handle_t *handle, const char *prefix,
|
|
|
|
const char *fmt, va_list args)
|
2005-03-14 20:51:43 -05:00
|
|
|
{
|
2007-06-07 20:55:13 -04:00
|
|
|
int ret = 0;
|
2005-03-14 20:51:43 -05:00
|
|
|
|
2013-01-18 20:42:21 -05:00
|
|
|
if(!(prefix && *prefix)) {
|
|
|
|
prefix = "UNKNOWN";
|
|
|
|
}
|
|
|
|
|
2011-06-07 13:41:33 -04:00
|
|
|
if(handle->usesyslog) {
|
2008-08-08 23:18:00 -04:00
|
|
|
/* we can't use a va_list more than once, so we need to copy it
|
|
|
|
* so we can use the original when calling vfprintf below. */
|
|
|
|
va_list args_syslog;
|
|
|
|
va_copy(args_syslog, args);
|
|
|
|
vsyslog(LOG_WARNING, fmt, args_syslog);
|
|
|
|
va_end(args_syslog);
|
2005-03-14 20:51:43 -05:00
|
|
|
}
|
|
|
|
|
2011-06-07 13:41:33 -04:00
|
|
|
if(handle->logstream) {
|
2005-03-14 20:51:43 -05:00
|
|
|
time_t t;
|
|
|
|
struct tm *tm;
|
|
|
|
|
|
|
|
t = time(NULL);
|
|
|
|
tm = localtime(&t);
|
|
|
|
|
2007-01-25 20:33:03 -05:00
|
|
|
/* Use ISO-8601 date format */
|
2013-01-18 20:42:21 -05:00
|
|
|
fprintf(handle->logstream, "[%04d-%02d-%02d %02d:%02d] [%s] ",
|
2013-01-03 16:48:51 -05:00
|
|
|
tm->tm_year + 1900, tm->tm_mon + 1, tm->tm_mday,
|
2013-01-18 20:42:21 -05:00
|
|
|
tm->tm_hour, tm->tm_min, prefix);
|
2011-06-07 13:41:33 -04:00
|
|
|
ret = vfprintf(handle->logstream, fmt, args);
|
|
|
|
fflush(handle->logstream);
|
2005-03-14 20:51:43 -05:00
|
|
|
}
|
|
|
|
|
2011-03-20 20:45:57 -04:00
|
|
|
return ret;
|
2005-03-14 20:51:43 -05:00
|
|
|
}
|
|
|
|
|
2011-11-22 00:35:46 -05:00
|
|
|
/** Execute a command with arguments in a chroot.
|
|
|
|
* @param handle the context handle
|
|
|
|
* @param cmd command to execute
|
|
|
|
* @param argv arguments to pass to cmd
|
|
|
|
* @return 0 on success, 1 on error
|
|
|
|
*/
|
|
|
|
int _alpm_run_chroot(alpm_handle_t *handle, const char *cmd, char *const argv[])
|
2009-07-08 05:08:32 -04:00
|
|
|
{
|
|
|
|
pid_t pid;
|
2011-09-19 15:08:14 -04:00
|
|
|
int pipefd[2], cwdfd;
|
2009-07-08 05:08:32 -04:00
|
|
|
int retval = 0;
|
|
|
|
|
|
|
|
/* save the cwd so we can restore it later */
|
2014-01-02 13:37:12 -05:00
|
|
|
OPEN(cwdfd, ".", O_RDONLY | O_CLOEXEC);
|
2011-09-19 15:08:14 -04:00
|
|
|
if(cwdfd < 0) {
|
2011-07-01 12:01:38 -04:00
|
|
|
_alpm_log(handle, ALPM_LOG_ERROR, _("could not get current working directory\n"));
|
2009-07-08 05:08:32 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
/* just in case our cwd was removed in the upgrade operation */
|
2011-06-03 13:33:18 -04:00
|
|
|
if(chdir(handle->root) != 0) {
|
2011-07-01 12:01:38 -04:00
|
|
|
_alpm_log(handle, ALPM_LOG_ERROR, _("could not change directory to %s (%s)\n"),
|
2011-06-03 13:33:18 -04:00
|
|
|
handle->root, strerror(errno));
|
2009-07-08 05:08:32 -04:00
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
2011-07-01 12:01:38 -04:00
|
|
|
_alpm_log(handle, ALPM_LOG_DEBUG, "executing \"%s\" under chroot \"%s\"\n",
|
2011-11-22 00:35:46 -05:00
|
|
|
cmd, handle->root);
|
2009-07-08 05:08:32 -04:00
|
|
|
|
|
|
|
/* Flush open fds before fork() to avoid cloning buffers */
|
|
|
|
fflush(NULL);
|
|
|
|
|
2010-08-18 08:07:18 -04:00
|
|
|
if(pipe(pipefd) == -1) {
|
2011-07-01 12:01:38 -04:00
|
|
|
_alpm_log(handle, ALPM_LOG_ERROR, _("could not create pipe (%s)\n"), strerror(errno));
|
2010-08-18 08:07:18 -04:00
|
|
|
retval = 1;
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
2013-04-14 22:33:46 -04:00
|
|
|
/* fork- parent and child each have separate code blocks below */
|
2009-07-08 05:08:32 -04:00
|
|
|
pid = fork();
|
|
|
|
if(pid == -1) {
|
2011-07-01 12:01:38 -04:00
|
|
|
_alpm_log(handle, ALPM_LOG_ERROR, _("could not fork a new process (%s)\n"), strerror(errno));
|
2009-07-08 05:08:32 -04:00
|
|
|
retval = 1;
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(pid == 0) {
|
|
|
|
/* this code runs for the child only (the actual chroot/exec) */
|
2013-07-03 20:33:19 -04:00
|
|
|
close(1);
|
|
|
|
close(2);
|
2010-08-18 08:07:18 -04:00
|
|
|
while(dup2(pipefd[1], 1) == -1 && errno == EINTR);
|
|
|
|
while(dup2(pipefd[1], 2) == -1 && errno == EINTR);
|
2013-07-03 20:33:19 -04:00
|
|
|
close(pipefd[0]);
|
|
|
|
close(pipefd[1]);
|
2014-12-23 21:57:38 -05:00
|
|
|
if(cwdfd >= 0) {
|
|
|
|
close(cwdfd);
|
|
|
|
}
|
2010-08-18 08:07:18 -04:00
|
|
|
|
|
|
|
/* use fprintf instead of _alpm_log to send output through the parent */
|
2011-06-03 13:33:18 -04:00
|
|
|
if(chroot(handle->root) != 0) {
|
2010-08-18 08:07:18 -04:00
|
|
|
fprintf(stderr, _("could not change the root directory (%s)\n"), strerror(errno));
|
2009-07-08 05:08:32 -04:00
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
if(chdir("/") != 0) {
|
2011-02-28 18:50:23 -05:00
|
|
|
fprintf(stderr, _("could not change directory to %s (%s)\n"),
|
|
|
|
"/", strerror(errno));
|
2009-07-08 05:08:32 -04:00
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
umask(0022);
|
2013-01-19 19:32:11 -05:00
|
|
|
execv(cmd, argv);
|
|
|
|
/* execv only returns if there was an error */
|
|
|
|
fprintf(stderr, _("call to execv failed (%s)\n"), strerror(errno));
|
2010-08-18 08:07:18 -04:00
|
|
|
exit(1);
|
2009-07-08 05:08:32 -04:00
|
|
|
} else {
|
|
|
|
/* this code runs for the parent only (wait on the child) */
|
|
|
|
int status;
|
2011-06-27 11:10:08 -04:00
|
|
|
FILE *pipe_file;
|
2010-08-18 08:07:18 -04:00
|
|
|
|
2013-07-03 20:33:19 -04:00
|
|
|
close(pipefd[1]);
|
2011-06-27 11:10:08 -04:00
|
|
|
pipe_file = fdopen(pipefd[0], "r");
|
|
|
|
if(pipe_file == NULL) {
|
2013-07-03 20:33:19 -04:00
|
|
|
close(pipefd[0]);
|
2009-07-08 05:08:32 -04:00
|
|
|
retval = 1;
|
|
|
|
} else {
|
2011-06-27 11:10:08 -04:00
|
|
|
while(!feof(pipe_file)) {
|
2010-08-18 08:07:18 -04:00
|
|
|
char line[PATH_MAX];
|
2014-01-10 10:25:14 -05:00
|
|
|
alpm_event_scriptlet_info_t event = {
|
|
|
|
.type = ALPM_EVENT_SCRIPTLET_INFO,
|
|
|
|
.line = line
|
|
|
|
};
|
2014-08-06 16:36:00 -04:00
|
|
|
if(safe_fgets(line, PATH_MAX, pipe_file) == NULL) {
|
2010-08-18 08:07:18 -04:00
|
|
|
break;
|
2014-08-06 16:36:00 -04:00
|
|
|
}
|
2013-01-18 20:42:21 -05:00
|
|
|
alpm_logaction(handle, "ALPM-SCRIPTLET", "%s", line);
|
2014-01-10 10:25:14 -05:00
|
|
|
EVENT(handle, &event);
|
2010-08-18 08:07:18 -04:00
|
|
|
}
|
2011-06-27 11:10:08 -04:00
|
|
|
fclose(pipe_file);
|
2010-08-18 08:07:18 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
while(waitpid(pid, &status, 0) == -1) {
|
|
|
|
if(errno != EINTR) {
|
2011-07-01 12:01:38 -04:00
|
|
|
_alpm_log(handle, ALPM_LOG_ERROR, _("call to waitpid failed (%s)\n"), strerror(errno));
|
2010-08-18 08:07:18 -04:00
|
|
|
retval = 1;
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* report error from above after the child has exited */
|
|
|
|
if(retval != 0) {
|
2011-07-01 12:01:38 -04:00
|
|
|
_alpm_log(handle, ALPM_LOG_ERROR, _("could not open pipe (%s)\n"), strerror(errno));
|
2010-08-18 08:07:18 -04:00
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
/* check the return status, make sure it is 0 (success) */
|
|
|
|
if(WIFEXITED(status)) {
|
2011-07-01 12:01:38 -04:00
|
|
|
_alpm_log(handle, ALPM_LOG_DEBUG, "call to waitpid succeeded\n");
|
2010-08-18 08:07:18 -04:00
|
|
|
if(WEXITSTATUS(status) != 0) {
|
2011-07-01 12:01:38 -04:00
|
|
|
_alpm_log(handle, ALPM_LOG_ERROR, _("command failed to execute correctly\n"));
|
2010-08-18 08:07:18 -04:00
|
|
|
retval = 1;
|
2009-07-08 05:08:32 -04:00
|
|
|
}
|
2013-08-20 22:00:10 -04:00
|
|
|
} else if(WIFSIGNALED(status) != 0) {
|
|
|
|
char *signal_description = strsignal(WTERMSIG(status));
|
|
|
|
/* strsignal can return NULL on some (non-Linux) platforms */
|
|
|
|
if(signal_description == NULL) {
|
|
|
|
signal_description = _("Unknown signal");
|
|
|
|
}
|
|
|
|
_alpm_log(handle, ALPM_LOG_ERROR, _("command terminated by signal %d: %s\n"),
|
|
|
|
WTERMSIG(status), signal_description);
|
|
|
|
retval = 1;
|
2009-07-08 05:08:32 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
cleanup:
|
2011-09-19 15:08:14 -04:00
|
|
|
if(cwdfd >= 0) {
|
|
|
|
if(fchdir(cwdfd) != 0) {
|
|
|
|
_alpm_log(handle, ALPM_LOG_ERROR,
|
|
|
|
_("could not restore working directory (%s)\n"), strerror(errno));
|
|
|
|
}
|
2013-07-03 20:33:19 -04:00
|
|
|
close(cwdfd);
|
2009-07-08 05:08:32 -04:00
|
|
|
}
|
|
|
|
|
2011-03-20 20:45:57 -04:00
|
|
|
return retval;
|
2009-07-08 05:08:32 -04:00
|
|
|
}
|
|
|
|
|
2011-11-22 00:35:46 -05:00
|
|
|
/** Run ldconfig in a chroot.
|
|
|
|
* @param handle the context handle
|
|
|
|
* @return 0 on success, 1 on error
|
|
|
|
*/
|
2011-06-28 00:04:00 -04:00
|
|
|
int _alpm_ldconfig(alpm_handle_t *handle)
|
2005-03-14 20:51:43 -05:00
|
|
|
{
|
|
|
|
char line[PATH_MAX];
|
|
|
|
|
2011-07-01 12:01:38 -04:00
|
|
|
_alpm_log(handle, ALPM_LOG_DEBUG, "running ldconfig\n");
|
2009-07-08 05:08:32 -04:00
|
|
|
|
2011-06-03 13:33:18 -04:00
|
|
|
snprintf(line, PATH_MAX, "%setc/ld.so.conf", handle->root);
|
2008-06-15 20:15:36 -04:00
|
|
|
if(access(line, F_OK) == 0) {
|
2013-01-20 06:56:57 -05:00
|
|
|
snprintf(line, PATH_MAX, "%s%s", handle->root, LDCONFIG);
|
2013-01-19 19:32:11 -05:00
|
|
|
if(access(line, X_OK) == 0) {
|
|
|
|
char arg0[32];
|
|
|
|
char *argv[] = { arg0, NULL };
|
|
|
|
strcpy(arg0, "ldconfig");
|
2013-01-20 06:56:57 -05:00
|
|
|
return _alpm_run_chroot(handle, LDCONFIG, argv);
|
2013-01-19 19:32:11 -05:00
|
|
|
}
|
2005-03-14 20:51:43 -05:00
|
|
|
}
|
|
|
|
|
2011-03-20 20:45:57 -04:00
|
|
|
return 0;
|
2005-03-14 20:51:43 -05:00
|
|
|
}
|
|
|
|
|
2011-11-22 00:35:46 -05:00
|
|
|
/** Helper function for comparing strings using the alpm "compare func"
|
|
|
|
* signature.
|
|
|
|
* @param s1 first string to be compared
|
|
|
|
* @param s2 second string to be compared
|
|
|
|
* @return 0 if strings are equal, positive int if first unequal character
|
|
|
|
* has a greater value in s1, negative if it has a greater value in s2
|
|
|
|
*/
|
2007-02-13 03:15:38 -05:00
|
|
|
int _alpm_str_cmp(const void *s1, const void *s2)
|
|
|
|
{
|
2011-03-20 20:45:57 -04:00
|
|
|
return strcmp(s1, s2);
|
2007-02-13 03:15:38 -05:00
|
|
|
}
|
|
|
|
|
2008-02-16 11:47:22 -05:00
|
|
|
/** Find a filename in a registered alpm cachedir.
|
2011-06-07 14:15:43 -04:00
|
|
|
* @param handle the context handle
|
2008-02-16 11:47:22 -05:00
|
|
|
* @param filename name of file to find
|
2007-08-20 13:28:51 -04:00
|
|
|
* @return malloced path of file, NULL if not found
|
|
|
|
*/
|
2011-06-28 00:04:00 -04:00
|
|
|
char *_alpm_filecache_find(alpm_handle_t *handle, const char *filename)
|
2007-08-20 13:28:51 -04:00
|
|
|
{
|
|
|
|
char path[PATH_MAX];
|
|
|
|
char *retpath;
|
|
|
|
alpm_list_t *i;
|
2011-02-04 09:42:52 -05:00
|
|
|
struct stat buf;
|
2007-08-20 13:28:51 -04:00
|
|
|
|
|
|
|
/* Loop through the cache dirs until we find a matching file */
|
2011-08-19 14:10:17 -04:00
|
|
|
for(i = handle->cachedirs; i; i = i->next) {
|
2011-09-19 15:32:53 -04:00
|
|
|
snprintf(path, PATH_MAX, "%s%s", (char *)i->data,
|
2007-08-20 13:28:51 -04:00
|
|
|
filename);
|
2011-02-04 09:42:52 -05:00
|
|
|
if(stat(path, &buf) == 0 && S_ISREG(buf.st_mode)) {
|
2007-08-20 13:28:51 -04:00
|
|
|
retpath = strdup(path);
|
2011-07-01 12:01:38 -04:00
|
|
|
_alpm_log(handle, ALPM_LOG_DEBUG, "found cached pkg: %s\n", retpath);
|
2011-03-20 20:45:57 -04:00
|
|
|
return retpath;
|
2007-08-20 13:28:51 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
/* package wasn't found in any cachedir */
|
2011-06-07 17:06:16 -04:00
|
|
|
return NULL;
|
2007-08-20 13:28:51 -04:00
|
|
|
}
|
|
|
|
|
2013-04-14 22:33:46 -04:00
|
|
|
/** Check the alpm cachedirs for existence and find a writable one.
|
2007-08-20 13:28:51 -04:00
|
|
|
* If no valid cache directory can be found, use /tmp.
|
2011-06-07 14:15:43 -04:00
|
|
|
* @param handle the context handle
|
2007-08-20 13:28:51 -04:00
|
|
|
* @return pointer to a writable cache directory.
|
|
|
|
*/
|
2011-06-28 00:04:00 -04:00
|
|
|
const char *_alpm_filecache_setup(alpm_handle_t *handle)
|
2007-08-20 13:28:51 -04:00
|
|
|
{
|
|
|
|
struct stat buf;
|
2011-08-19 14:10:17 -04:00
|
|
|
alpm_list_t *i;
|
2012-04-07 14:01:13 -04:00
|
|
|
char *cachedir;
|
|
|
|
const char *tmpdir;
|
2007-08-20 13:28:51 -04:00
|
|
|
|
2011-08-19 14:10:17 -04:00
|
|
|
/* Loop through the cache dirs until we find a usable directory */
|
|
|
|
for(i = handle->cachedirs; i; i = i->next) {
|
2011-09-19 15:32:53 -04:00
|
|
|
cachedir = i->data;
|
2007-08-20 13:28:51 -04:00
|
|
|
if(stat(cachedir, &buf) != 0) {
|
|
|
|
/* cache directory does not exist.... try creating it */
|
2011-07-01 12:01:38 -04:00
|
|
|
_alpm_log(handle, ALPM_LOG_WARNING, _("no %s cache exists, creating...\n"),
|
2007-08-20 13:28:51 -04:00
|
|
|
cachedir);
|
|
|
|
if(_alpm_makepath(cachedir) == 0) {
|
2011-07-01 12:01:38 -04:00
|
|
|
_alpm_log(handle, ALPM_LOG_DEBUG, "using cachedir: %s\n", cachedir);
|
2011-03-20 20:45:57 -04:00
|
|
|
return cachedir;
|
2007-08-20 13:28:51 -04:00
|
|
|
}
|
2011-08-19 14:10:17 -04:00
|
|
|
} else if(!S_ISDIR(buf.st_mode)) {
|
|
|
|
_alpm_log(handle, ALPM_LOG_DEBUG,
|
|
|
|
"skipping cachedir, not a directory: %s\n", cachedir);
|
2012-02-07 12:43:59 -05:00
|
|
|
} else if(_alpm_access(handle, NULL, cachedir, W_OK) != 0) {
|
2011-08-19 14:10:17 -04:00
|
|
|
_alpm_log(handle, ALPM_LOG_DEBUG,
|
|
|
|
"skipping cachedir, not writable: %s\n", cachedir);
|
|
|
|
} else if(!(buf.st_mode & (S_IWUSR | S_IWGRP | S_IWOTH))) {
|
|
|
|
_alpm_log(handle, ALPM_LOG_DEBUG,
|
|
|
|
"skipping cachedir, no write bits set: %s\n", cachedir);
|
|
|
|
} else {
|
2011-07-01 12:01:38 -04:00
|
|
|
_alpm_log(handle, ALPM_LOG_DEBUG, "using cachedir: %s\n", cachedir);
|
2011-03-20 20:45:57 -04:00
|
|
|
return cachedir;
|
2007-08-20 13:28:51 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-08-19 14:10:17 -04:00
|
|
|
/* we didn't find a valid cache directory. use TMPDIR or /tmp. */
|
|
|
|
if((tmpdir = getenv("TMPDIR")) && stat(tmpdir, &buf) && S_ISDIR(buf.st_mode)) {
|
|
|
|
/* TMPDIR was good, we can use it */
|
|
|
|
} else {
|
|
|
|
tmpdir = "/tmp";
|
|
|
|
}
|
2011-09-04 14:59:17 -04:00
|
|
|
alpm_option_add_cachedir(handle, tmpdir);
|
|
|
|
cachedir = handle->cachedirs->prev->data;
|
2011-08-19 14:10:17 -04:00
|
|
|
_alpm_log(handle, ALPM_LOG_DEBUG, "using cachedir: %s\n", cachedir);
|
|
|
|
_alpm_log(handle, ALPM_LOG_WARNING,
|
|
|
|
_("couldn't find or create package cache, using %s instead\n"), cachedir);
|
|
|
|
return cachedir;
|
2007-08-20 13:28:51 -04:00
|
|
|
}
|
|
|
|
|
2010-09-02 13:05:23 -04:00
|
|
|
#ifdef HAVE_LIBSSL
|
2011-11-22 00:35:46 -05:00
|
|
|
/** Compute the MD5 message digest of a file.
|
|
|
|
* @param path file path of file to compute MD5 digest of
|
|
|
|
* @param output string to hold computed MD5 digest
|
|
|
|
* @return 0 on success, 1 on file open error, 2 on file read error
|
|
|
|
*/
|
2010-09-02 13:05:23 -04:00
|
|
|
static int md5_file(const char *path, unsigned char output[16])
|
|
|
|
{
|
2011-01-02 13:25:33 -05:00
|
|
|
MD5_CTX ctx;
|
|
|
|
unsigned char *buf;
|
2011-10-27 17:24:30 -04:00
|
|
|
ssize_t n;
|
|
|
|
int fd;
|
2010-09-02 13:05:23 -04:00
|
|
|
|
2011-10-27 17:24:30 -04:00
|
|
|
MALLOC(buf, (size_t)ALPM_BUFFER_SIZE, return 1);
|
2010-09-02 13:05:23 -04:00
|
|
|
|
2014-01-02 13:37:12 -05:00
|
|
|
OPEN(fd, path, O_RDONLY | O_CLOEXEC);
|
2011-10-27 17:24:30 -04:00
|
|
|
if(fd < 0) {
|
2011-01-02 13:25:33 -05:00
|
|
|
free(buf);
|
2011-03-20 20:45:57 -04:00
|
|
|
return 1;
|
2011-01-02 13:25:33 -05:00
|
|
|
}
|
2010-09-02 13:05:23 -04:00
|
|
|
|
2011-01-02 13:25:33 -05:00
|
|
|
MD5_Init(&ctx);
|
2010-09-02 13:05:23 -04:00
|
|
|
|
2011-10-27 17:24:30 -04:00
|
|
|
while((n = read(fd, buf, ALPM_BUFFER_SIZE)) > 0 || errno == EINTR) {
|
|
|
|
if(n < 0) {
|
|
|
|
continue;
|
|
|
|
}
|
2011-01-02 13:25:33 -05:00
|
|
|
MD5_Update(&ctx, buf, n);
|
|
|
|
}
|
2010-09-02 13:05:23 -04:00
|
|
|
|
2013-07-03 20:33:19 -04:00
|
|
|
close(fd);
|
2011-01-02 13:25:33 -05:00
|
|
|
free(buf);
|
2010-09-02 13:05:23 -04:00
|
|
|
|
2011-10-27 17:24:30 -04:00
|
|
|
if(n < 0) {
|
2011-03-20 20:45:57 -04:00
|
|
|
return 2;
|
2011-01-02 13:25:33 -05:00
|
|
|
}
|
2010-09-02 13:05:23 -04:00
|
|
|
|
2011-10-27 17:24:30 -04:00
|
|
|
MD5_Final(output, &ctx);
|
2011-03-20 20:45:57 -04:00
|
|
|
return 0;
|
2010-09-02 13:05:23 -04:00
|
|
|
}
|
2011-08-11 16:46:18 -04:00
|
|
|
|
|
|
|
/* third param is so we match the PolarSSL definition */
|
2011-11-22 00:35:46 -05:00
|
|
|
/** Compute the SHA-224 or SHA-256 message digest of a file.
|
|
|
|
* @param path file path of file to compute SHA2 digest of
|
|
|
|
* @param output string to hold computed SHA2 digest
|
|
|
|
* @param is224 use SHA-224 instead of SHA-256
|
|
|
|
* @return 0 on success, 1 on file open error, 2 on file read error
|
|
|
|
*/
|
2011-08-11 16:46:18 -04:00
|
|
|
static int sha2_file(const char *path, unsigned char output[32], int is224)
|
|
|
|
{
|
|
|
|
SHA256_CTX ctx;
|
|
|
|
unsigned char *buf;
|
2011-10-27 17:24:30 -04:00
|
|
|
ssize_t n;
|
|
|
|
int fd;
|
2011-08-11 16:46:18 -04:00
|
|
|
|
2011-10-27 17:24:30 -04:00
|
|
|
MALLOC(buf, (size_t)ALPM_BUFFER_SIZE, return 1);
|
2011-08-11 16:46:18 -04:00
|
|
|
|
2014-01-02 13:37:12 -05:00
|
|
|
OPEN(fd, path, O_RDONLY | O_CLOEXEC);
|
2011-10-27 17:24:30 -04:00
|
|
|
if(fd < 0) {
|
2011-08-11 16:46:18 -04:00
|
|
|
free(buf);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(is224) {
|
|
|
|
SHA224_Init(&ctx);
|
|
|
|
} else {
|
|
|
|
SHA256_Init(&ctx);
|
|
|
|
}
|
|
|
|
|
2011-10-27 17:24:30 -04:00
|
|
|
while((n = read(fd, buf, ALPM_BUFFER_SIZE)) > 0 || errno == EINTR) {
|
|
|
|
if(n < 0) {
|
|
|
|
continue;
|
|
|
|
}
|
2011-08-11 16:46:18 -04:00
|
|
|
if(is224) {
|
|
|
|
SHA224_Update(&ctx, buf, n);
|
|
|
|
} else {
|
|
|
|
SHA256_Update(&ctx, buf, n);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-07-03 20:33:19 -04:00
|
|
|
close(fd);
|
2011-08-11 16:46:18 -04:00
|
|
|
free(buf);
|
|
|
|
|
2011-10-27 17:24:30 -04:00
|
|
|
if(n < 0) {
|
2011-08-11 16:46:18 -04:00
|
|
|
return 2;
|
|
|
|
}
|
|
|
|
|
2011-10-27 17:24:30 -04:00
|
|
|
if(is224) {
|
|
|
|
SHA224_Final(output, &ctx);
|
|
|
|
} else {
|
|
|
|
SHA256_Final(output, &ctx);
|
|
|
|
}
|
2011-08-11 16:46:18 -04:00
|
|
|
return 0;
|
|
|
|
}
|
2010-09-02 13:05:23 -04:00
|
|
|
#endif
|
|
|
|
|
2011-12-21 18:31:55 -05:00
|
|
|
/** Create a string representing bytes in hexadecimal.
|
|
|
|
* @param bytes the bytes to represent in hexadecimal
|
|
|
|
* @param size number of bytes to consider
|
|
|
|
* @return a NULL terminated string with the hexadecimal representation of
|
|
|
|
* bytes or NULL on error. This string must be freed.
|
|
|
|
*/
|
|
|
|
static char *hex_representation(unsigned char *bytes, size_t size)
|
|
|
|
{
|
|
|
|
static const char *hex_digits = "0123456789abcdef";
|
|
|
|
char *str;
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
MALLOC(str, 2 * size + 1, return NULL);
|
|
|
|
|
2013-01-03 16:48:53 -05:00
|
|
|
for(i = 0; i < size; i++) {
|
2011-12-21 18:31:55 -05:00
|
|
|
str[2 * i] = hex_digits[bytes[i] >> 4];
|
|
|
|
str[2 * i + 1] = hex_digits[bytes[i] & 0x0f];
|
|
|
|
}
|
|
|
|
|
|
|
|
str[2 * size] = '\0';
|
|
|
|
|
|
|
|
return str;
|
|
|
|
}
|
2011-10-27 18:23:12 -04:00
|
|
|
|
2007-07-25 17:49:32 -04:00
|
|
|
/** Get the md5 sum of file.
|
|
|
|
* @param filename name of the file
|
|
|
|
* @return the checksum on success, NULL on error
|
|
|
|
* @addtogroup alpm_misc
|
|
|
|
*/
|
2008-08-26 06:57:08 -04:00
|
|
|
char SYMEXPORT *alpm_compute_md5sum(const char *filename)
|
2007-07-25 17:49:32 -04:00
|
|
|
{
|
|
|
|
unsigned char output[16];
|
|
|
|
|
2011-03-20 20:45:57 -04:00
|
|
|
ASSERT(filename != NULL, return NULL);
|
2007-07-25 17:49:32 -04:00
|
|
|
|
2010-09-02 13:05:23 -04:00
|
|
|
/* defined above for OpenSSL, otherwise defined in md5.h */
|
2011-12-21 18:31:55 -05:00
|
|
|
if(md5_file(filename, output) > 0) {
|
2011-06-07 17:06:16 -04:00
|
|
|
return NULL;
|
2007-07-25 17:49:32 -04:00
|
|
|
}
|
|
|
|
|
2011-12-21 18:31:55 -05:00
|
|
|
return hex_representation(output, 16);
|
2007-07-25 17:49:32 -04:00
|
|
|
}
|
|
|
|
|
2011-08-11 16:46:18 -04:00
|
|
|
/** Get the sha256 sum of file.
|
|
|
|
* @param filename name of the file
|
|
|
|
* @return the checksum on success, NULL on error
|
|
|
|
* @addtogroup alpm_misc
|
|
|
|
*/
|
|
|
|
char SYMEXPORT *alpm_compute_sha256sum(const char *filename)
|
|
|
|
{
|
|
|
|
unsigned char output[32];
|
|
|
|
|
|
|
|
ASSERT(filename != NULL, return NULL);
|
|
|
|
|
|
|
|
/* defined above for OpenSSL, otherwise defined in sha2.h */
|
2011-12-21 18:31:55 -05:00
|
|
|
if(sha2_file(filename, output, 0) > 0) {
|
2011-08-11 16:46:18 -04:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2011-12-21 18:31:55 -05:00
|
|
|
return hex_representation(output, 32);
|
2011-08-11 16:46:18 -04:00
|
|
|
}
|
|
|
|
|
2013-11-08 00:44:40 -05:00
|
|
|
/** Calculates a file's MD5 or SHA-2 digest and compares it to an expected value.
|
2011-11-22 00:35:46 -05:00
|
|
|
* @param filepath path of the file to check
|
|
|
|
* @param expected hash value to compare against
|
|
|
|
* @param type digest type to use
|
|
|
|
* @return 0 if file matches the expected hash, 1 if they do not match, -1 on
|
|
|
|
* error
|
|
|
|
*/
|
2011-08-11 21:16:42 -04:00
|
|
|
int _alpm_test_checksum(const char *filepath, const char *expected,
|
2012-02-19 23:24:35 -05:00
|
|
|
alpm_pkgvalidation_t type)
|
2011-08-11 21:16:42 -04:00
|
|
|
{
|
|
|
|
char *computed;
|
|
|
|
int ret;
|
|
|
|
|
2012-02-19 23:24:35 -05:00
|
|
|
if(type == ALPM_PKG_VALIDATION_MD5SUM) {
|
2011-08-11 21:16:42 -04:00
|
|
|
computed = alpm_compute_md5sum(filepath);
|
2012-02-19 23:24:35 -05:00
|
|
|
} else if(type == ALPM_PKG_VALIDATION_SHA256SUM) {
|
2011-08-11 21:16:42 -04:00
|
|
|
computed = alpm_compute_sha256sum(filepath);
|
|
|
|
} else {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(expected == NULL || computed == NULL) {
|
|
|
|
ret = -1;
|
|
|
|
} else if(strcmp(expected, computed) != 0) {
|
|
|
|
ret = 1;
|
|
|
|
} else {
|
|
|
|
ret = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
FREE(computed);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2010-12-14 23:26:23 -05:00
|
|
|
/* Note: does NOT handle sparse files on purpose for speed. */
|
2011-11-22 00:35:46 -05:00
|
|
|
/** TODO.
|
|
|
|
* Does not handle sparse files on purpose for speed.
|
|
|
|
* @param a
|
|
|
|
* @param b
|
2013-11-08 00:44:40 -05:00
|
|
|
* @return
|
2011-11-22 00:35:46 -05:00
|
|
|
*/
|
2010-12-14 23:26:23 -05:00
|
|
|
int _alpm_archive_fgets(struct archive *a, struct archive_read_buffer *b)
|
2008-03-25 22:23:14 -04:00
|
|
|
{
|
2011-03-21 09:52:24 -04:00
|
|
|
/* ensure we start populating our line buffer at the beginning */
|
|
|
|
b->line_offset = b->line;
|
|
|
|
|
2010-12-14 23:26:23 -05:00
|
|
|
while(1) {
|
2011-09-27 18:37:27 -04:00
|
|
|
size_t block_remaining;
|
|
|
|
char *eol;
|
|
|
|
|
2010-12-14 23:26:23 -05:00
|
|
|
/* have we processed this entire block? */
|
|
|
|
if(b->block + b->block_size == b->block_offset) {
|
2011-09-27 18:37:27 -04:00
|
|
|
int64_t offset;
|
2010-12-14 23:26:23 -05:00
|
|
|
if(b->ret == ARCHIVE_EOF) {
|
|
|
|
/* reached end of archive on the last read, now we are out of data */
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* zero-copy - this is the entire next block of data. */
|
2011-03-25 11:57:20 -04:00
|
|
|
b->ret = archive_read_data_block(a, (void *)&b->block,
|
2010-12-14 23:26:23 -05:00
|
|
|
&b->block_size, &offset);
|
|
|
|
b->block_offset = b->block;
|
2011-09-27 18:37:27 -04:00
|
|
|
block_remaining = b->block_size;
|
2010-12-14 23:26:23 -05:00
|
|
|
|
2011-06-22 19:17:38 -04:00
|
|
|
/* error, cleanup */
|
|
|
|
if(b->ret < ARCHIVE_OK) {
|
2010-12-14 23:26:23 -05:00
|
|
|
goto cleanup;
|
|
|
|
}
|
2011-09-27 18:37:27 -04:00
|
|
|
} else {
|
|
|
|
block_remaining = b->block + b->block_size - b->block_offset;
|
2008-03-25 22:23:14 -04:00
|
|
|
}
|
2010-12-14 23:26:23 -05:00
|
|
|
|
2011-09-27 18:37:27 -04:00
|
|
|
/* look through the block looking for EOL characters */
|
|
|
|
eol = memchr(b->block_offset, '\n', block_remaining);
|
|
|
|
if(!eol) {
|
|
|
|
eol = memchr(b->block_offset, '\0', block_remaining);
|
2008-03-25 22:23:14 -04:00
|
|
|
}
|
|
|
|
|
2010-12-14 23:26:23 -05:00
|
|
|
/* allocate our buffer, or ensure our existing one is big enough */
|
|
|
|
if(!b->line) {
|
|
|
|
/* set the initial buffer to the read block_size */
|
2011-06-22 19:17:38 -04:00
|
|
|
CALLOC(b->line, b->block_size + 1, sizeof(char), b->ret = -ENOMEM; goto cleanup);
|
2010-12-14 23:26:23 -05:00
|
|
|
b->line_size = b->block_size + 1;
|
|
|
|
b->line_offset = b->line;
|
|
|
|
} else {
|
2011-10-13 17:25:21 -04:00
|
|
|
/* note: we know eol > b->block_offset and b->line_offset > b->line,
|
|
|
|
* so we know the result is unsigned and can fit in size_t */
|
|
|
|
size_t new = eol ? (size_t)(eol - b->block_offset) : block_remaining;
|
2011-09-27 18:37:27 -04:00
|
|
|
size_t needed = (size_t)((b->line_offset - b->line) + new + 1);
|
2010-12-14 23:26:23 -05:00
|
|
|
if(needed > b->max_line_size) {
|
2011-06-22 19:17:38 -04:00
|
|
|
b->ret = -ERANGE;
|
|
|
|
goto cleanup;
|
2010-12-14 23:26:23 -05:00
|
|
|
}
|
|
|
|
if(needed > b->line_size) {
|
|
|
|
/* need to realloc + copy data to fit total length */
|
2012-04-07 14:01:13 -04:00
|
|
|
char *new_line;
|
|
|
|
CALLOC(new_line, needed, sizeof(char), b->ret = -ENOMEM; goto cleanup);
|
|
|
|
memcpy(new_line, b->line, b->line_size);
|
2010-12-14 23:26:23 -05:00
|
|
|
b->line_size = needed;
|
2012-04-07 14:01:13 -04:00
|
|
|
b->line_offset = new_line + (b->line_offset - b->line);
|
2010-12-14 23:26:23 -05:00
|
|
|
free(b->line);
|
2012-04-07 14:01:13 -04:00
|
|
|
b->line = new_line;
|
2010-12-14 23:26:23 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-09-27 18:37:27 -04:00
|
|
|
if(eol) {
|
2012-07-19 10:37:56 -04:00
|
|
|
size_t len = (size_t)(eol - b->block_offset);
|
2010-12-14 23:26:23 -05:00
|
|
|
memcpy(b->line_offset, b->block_offset, len);
|
|
|
|
b->line_offset[len] = '\0';
|
2011-09-27 18:37:27 -04:00
|
|
|
b->block_offset = eol + 1;
|
2012-07-19 10:37:56 -04:00
|
|
|
b->real_line_size = b->line_offset + len - b->line;
|
2010-12-14 23:26:23 -05:00
|
|
|
/* this is the main return point; from here you can read b->line */
|
2011-03-20 20:45:57 -04:00
|
|
|
return ARCHIVE_OK;
|
2010-12-14 23:26:23 -05:00
|
|
|
} else {
|
|
|
|
/* we've looked through the whole block but no newline, copy it */
|
2012-07-19 10:37:56 -04:00
|
|
|
size_t len = (size_t)(b->block + b->block_size - b->block_offset);
|
2010-12-14 23:26:23 -05:00
|
|
|
memcpy(b->line_offset, b->block_offset, len);
|
|
|
|
b->line_offset += len;
|
2011-09-27 18:37:27 -04:00
|
|
|
b->block_offset = b->block + b->block_size;
|
2011-06-22 19:17:38 -04:00
|
|
|
/* there was no new data, return what is left; saved ARCHIVE_EOF will be
|
|
|
|
* returned on next call */
|
|
|
|
if(len == 0) {
|
|
|
|
b->line_offset[0] = '\0';
|
2012-07-19 10:37:56 -04:00
|
|
|
b->real_line_size = b->line_offset - b->line;
|
2011-06-22 19:17:38 -04:00
|
|
|
return ARCHIVE_OK;
|
|
|
|
}
|
2010-12-14 23:26:23 -05:00
|
|
|
}
|
|
|
|
}
|
2008-03-25 22:23:14 -04:00
|
|
|
|
2010-12-14 23:26:23 -05:00
|
|
|
cleanup:
|
|
|
|
{
|
|
|
|
int ret = b->ret;
|
|
|
|
FREE(b->line);
|
2011-12-06 00:20:08 -05:00
|
|
|
memset(b, 0, sizeof(struct archive_read_buffer));
|
2011-03-20 20:45:57 -04:00
|
|
|
return ret;
|
2010-12-14 23:26:23 -05:00
|
|
|
}
|
2008-03-25 22:23:14 -04:00
|
|
|
}
|
|
|
|
|
2011-11-22 00:35:46 -05:00
|
|
|
/** Parse a full package specifier.
|
|
|
|
* @param target package specifier to parse, such as: "pacman-4.0.1-2",
|
|
|
|
* "pacman-4.01-2/", or "pacman-4.0.1-2/desc"
|
|
|
|
* @param name to hold package name
|
|
|
|
* @param version to hold package version
|
|
|
|
* @param name_hash to hold package name hash
|
|
|
|
* @return 0 on success, -1 on error
|
|
|
|
*/
|
2010-10-27 02:41:01 -04:00
|
|
|
int _alpm_splitname(const char *target, char **name, char **version,
|
|
|
|
unsigned long *name_hash)
|
2010-10-11 00:05:07 -04:00
|
|
|
{
|
|
|
|
/* the format of a db entry is as follows:
|
|
|
|
* package-version-rel/
|
2010-10-27 02:41:01 -04:00
|
|
|
* package-version-rel/desc (we ignore the filename portion)
|
2010-10-11 00:05:07 -04:00
|
|
|
* package name can contain hyphens, so parse from the back- go back
|
|
|
|
* two hyphens and we have split the version from the name.
|
|
|
|
*/
|
2010-10-27 02:41:01 -04:00
|
|
|
const char *pkgver, *end;
|
2010-10-11 00:05:07 -04:00
|
|
|
|
2010-10-27 02:41:01 -04:00
|
|
|
if(target == NULL) {
|
2011-03-20 20:45:57 -04:00
|
|
|
return -1;
|
2010-10-11 00:05:07 -04:00
|
|
|
}
|
|
|
|
|
2010-10-27 02:41:01 -04:00
|
|
|
/* remove anything trailing a '/' */
|
|
|
|
end = strchr(target, '/');
|
|
|
|
if(!end) {
|
|
|
|
end = target + strlen(target);
|
2010-10-11 00:05:07 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
/* do the magic parsing- find the beginning of the version string
|
|
|
|
* by doing two iterations of same loop to lop off two hyphens */
|
2010-10-27 02:41:01 -04:00
|
|
|
for(pkgver = end - 1; *pkgver && *pkgver != '-'; pkgver--);
|
|
|
|
for(pkgver = pkgver - 1; *pkgver && *pkgver != '-'; pkgver--);
|
|
|
|
if(*pkgver != '-' || pkgver == target) {
|
2011-03-20 20:45:57 -04:00
|
|
|
return -1;
|
2010-10-11 00:05:07 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
/* copy into fields and return */
|
2010-10-27 02:41:01 -04:00
|
|
|
if(version) {
|
|
|
|
if(*version) {
|
|
|
|
FREE(*version);
|
|
|
|
}
|
|
|
|
/* version actually points to the dash, so need to increment 1 and account
|
|
|
|
* for potential end character */
|
|
|
|
STRNDUP(*version, pkgver + 1, end - pkgver - 1, return -1);
|
2010-10-11 00:05:07 -04:00
|
|
|
}
|
2011-01-19 13:20:32 -05:00
|
|
|
|
2010-10-27 02:41:01 -04:00
|
|
|
if(name) {
|
|
|
|
if(*name) {
|
|
|
|
FREE(*name);
|
|
|
|
}
|
|
|
|
STRNDUP(*name, target, pkgver - target, return -1);
|
|
|
|
if(name_hash) {
|
|
|
|
*name_hash = _alpm_hash_sdbm(*name);
|
|
|
|
}
|
2010-10-11 00:05:07 -04:00
|
|
|
}
|
|
|
|
|
2011-03-20 20:45:57 -04:00
|
|
|
return 0;
|
2010-10-11 00:05:07 -04:00
|
|
|
}
|
|
|
|
|
2011-11-22 00:35:46 -05:00
|
|
|
/** Hash the given string to an unsigned long value.
|
2010-12-14 12:56:32 -05:00
|
|
|
* This is the standard sdbm hashing algorithm.
|
|
|
|
* @param str string to hash
|
|
|
|
* @return the hash value of the given string
|
|
|
|
*/
|
|
|
|
unsigned long _alpm_hash_sdbm(const char *str)
|
|
|
|
{
|
|
|
|
unsigned long hash = 0;
|
|
|
|
int c;
|
|
|
|
|
|
|
|
if(!str) {
|
2011-03-20 20:45:57 -04:00
|
|
|
return hash;
|
2010-12-14 12:56:32 -05:00
|
|
|
}
|
|
|
|
while((c = *str++)) {
|
2011-12-29 12:24:38 -05:00
|
|
|
hash = c + hash * 65599;
|
2010-12-14 12:56:32 -05:00
|
|
|
}
|
|
|
|
|
2011-03-20 20:45:57 -04:00
|
|
|
return hash;
|
2010-12-14 12:56:32 -05:00
|
|
|
}
|
|
|
|
|
2011-11-22 00:35:46 -05:00
|
|
|
/** Convert a string to a file offset.
|
|
|
|
* This parses bare positive integers only.
|
|
|
|
* @param line string to convert
|
|
|
|
* @return off_t on success, -1 on error
|
|
|
|
*/
|
2011-08-29 13:12:54 -04:00
|
|
|
off_t _alpm_strtoofft(const char *line)
|
|
|
|
{
|
|
|
|
char *end;
|
|
|
|
unsigned long long result;
|
|
|
|
errno = 0;
|
|
|
|
|
|
|
|
/* we are trying to parse bare numbers only, no leading anything */
|
2012-01-18 16:32:48 -05:00
|
|
|
if(!isdigit((unsigned char)line[0])) {
|
2011-08-29 13:12:54 -04:00
|
|
|
return (off_t)-1;
|
|
|
|
}
|
|
|
|
result = strtoull(line, &end, 10);
|
2011-12-06 23:37:32 -05:00
|
|
|
if(result == 0 && end == line) {
|
2011-08-29 13:12:54 -04:00
|
|
|
/* line was not a number */
|
|
|
|
return (off_t)-1;
|
2011-12-06 23:37:32 -05:00
|
|
|
} else if(result == ULLONG_MAX && errno == ERANGE) {
|
2011-08-29 13:12:54 -04:00
|
|
|
/* line does not fit in unsigned long long */
|
|
|
|
return (off_t)-1;
|
2011-12-06 23:37:32 -05:00
|
|
|
} else if(*end) {
|
2011-08-29 13:12:54 -04:00
|
|
|
/* line began with a number but has junk left over at the end */
|
|
|
|
return (off_t)-1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return (off_t)result;
|
|
|
|
}
|
|
|
|
|
2011-11-22 00:35:46 -05:00
|
|
|
/** Parses a date into an alpm_time_t struct.
|
|
|
|
* @param line date to parse
|
|
|
|
* @return time struct on success, 0 on error
|
|
|
|
*/
|
2011-09-07 11:21:47 -04:00
|
|
|
alpm_time_t _alpm_parsedate(const char *line)
|
2011-01-07 21:35:43 -05:00
|
|
|
{
|
2011-09-07 10:32:23 -04:00
|
|
|
char *end;
|
|
|
|
long long result;
|
|
|
|
errno = 0;
|
|
|
|
|
|
|
|
result = strtoll(line, &end, 10);
|
2011-12-06 23:37:32 -05:00
|
|
|
if(result == 0 && end == line) {
|
2011-09-07 10:32:23 -04:00
|
|
|
/* line was not a number */
|
|
|
|
errno = EINVAL;
|
2011-09-07 11:21:47 -04:00
|
|
|
return 0;
|
2011-12-06 23:37:32 -05:00
|
|
|
} else if(errno == ERANGE) {
|
2011-09-07 10:32:23 -04:00
|
|
|
/* line does not fit in long long */
|
2011-09-07 11:21:47 -04:00
|
|
|
return 0;
|
2011-12-06 23:37:32 -05:00
|
|
|
} else if(*end) {
|
2011-09-07 10:32:23 -04:00
|
|
|
/* line began with a number but has junk left over at the end */
|
|
|
|
errno = EINVAL;
|
2011-09-07 11:21:47 -04:00
|
|
|
return 0;
|
2011-09-07 10:32:23 -04:00
|
|
|
}
|
|
|
|
|
2011-09-07 11:21:47 -04:00
|
|
|
return (alpm_time_t)result;
|
2011-01-07 21:35:43 -05:00
|
|
|
}
|
|
|
|
|
2011-11-22 00:35:46 -05:00
|
|
|
/** Wrapper around access() which takes a dir and file argument
|
2011-07-06 11:22:59 -04:00
|
|
|
* separately and generates an appropriate error message.
|
|
|
|
* If dir is NULL file will be treated as the whole path.
|
|
|
|
* @param handle an alpm handle
|
|
|
|
* @param dir directory path ending with and slash
|
|
|
|
* @param file filename
|
|
|
|
* @param amode access mode as described in access()
|
|
|
|
* @return int value returned by access()
|
|
|
|
*/
|
|
|
|
int _alpm_access(alpm_handle_t *handle, const char *dir, const char *file, int amode)
|
|
|
|
{
|
|
|
|
size_t len = 0;
|
|
|
|
int ret = 0;
|
|
|
|
|
2011-12-06 23:37:32 -05:00
|
|
|
if(dir) {
|
2011-07-06 11:22:59 -04:00
|
|
|
char *check_path;
|
|
|
|
|
|
|
|
len = strlen(dir) + strlen(file) + 1;
|
|
|
|
CALLOC(check_path, len, sizeof(char), RET_ERR(handle, ALPM_ERR_MEMORY, -1));
|
|
|
|
snprintf(check_path, len, "%s%s", dir, file);
|
|
|
|
|
|
|
|
ret = access(check_path, amode);
|
|
|
|
free(check_path);
|
|
|
|
} else {
|
|
|
|
dir = "";
|
|
|
|
ret = access(file, amode);
|
|
|
|
}
|
|
|
|
|
|
|
|
if(ret != 0) {
|
2011-12-06 23:37:32 -05:00
|
|
|
if(amode & R_OK) {
|
2011-08-08 18:11:14 -04:00
|
|
|
_alpm_log(handle, ALPM_LOG_DEBUG, "\"%s%s\" is not readable: %s\n",
|
|
|
|
dir, file, strerror(errno));
|
2011-07-06 11:22:59 -04:00
|
|
|
}
|
2011-12-06 23:37:32 -05:00
|
|
|
if(amode & W_OK) {
|
2011-08-08 18:11:14 -04:00
|
|
|
_alpm_log(handle, ALPM_LOG_DEBUG, "\"%s%s\" is not writable: %s\n",
|
|
|
|
dir, file, strerror(errno));
|
2011-07-06 11:22:59 -04:00
|
|
|
}
|
2011-12-06 23:37:32 -05:00
|
|
|
if(amode & X_OK) {
|
2011-08-08 18:11:14 -04:00
|
|
|
_alpm_log(handle, ALPM_LOG_DEBUG, "\"%s%s\" is not executable: %s\n",
|
|
|
|
dir, file, strerror(errno));
|
2011-07-06 11:22:59 -04:00
|
|
|
}
|
2011-12-06 23:37:32 -05:00
|
|
|
if(amode == F_OK) {
|
2011-08-08 18:11:14 -04:00
|
|
|
_alpm_log(handle, ALPM_LOG_DEBUG, "\"%s%s\" does not exist: %s\n",
|
|
|
|
dir, file, strerror(errno));
|
2011-07-06 11:22:59 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2013-06-18 11:44:15 -04:00
|
|
|
/** Checks whether a string matches at least one shell wildcard pattern.
|
|
|
|
* Checks for matches with fnmatch. Matches are inverted by prepending
|
|
|
|
* patterns with an exclamation mark. Preceding exclamation marks may be
|
|
|
|
* escaped. Subsequent matches override previous ones.
|
|
|
|
* @param patterns patterns to match against
|
|
|
|
* @param string string to check against pattern
|
|
|
|
* @return 0 if string matches pattern, negative if they don't match and
|
|
|
|
* positive if the last match was inverted
|
|
|
|
*/
|
|
|
|
int _alpm_fnmatch_patterns(alpm_list_t *patterns, const char *string)
|
|
|
|
{
|
|
|
|
alpm_list_t *i;
|
|
|
|
char *pattern;
|
|
|
|
short inverted;
|
|
|
|
|
|
|
|
for(i = alpm_list_last(patterns); i; i = alpm_list_previous(i)) {
|
|
|
|
pattern = i->data;
|
|
|
|
|
|
|
|
inverted = pattern[0] == '!';
|
|
|
|
if(inverted || pattern[0] == '\\') {
|
|
|
|
pattern++;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(_alpm_fnmatch(pattern, string) == 0) {
|
|
|
|
return inverted;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2011-11-22 00:35:46 -05:00
|
|
|
/** Checks whether a string matches a shell wildcard pattern.
|
|
|
|
* Wrapper around fnmatch.
|
2013-04-14 22:33:46 -04:00
|
|
|
* @param pattern pattern to match against
|
2011-11-22 00:35:46 -05:00
|
|
|
* @param string string to check against pattern
|
|
|
|
* @return 0 if string matches pattern, non-zero if they don't match and on
|
|
|
|
* error
|
|
|
|
*/
|
2011-10-30 13:33:14 -04:00
|
|
|
int _alpm_fnmatch(const void *pattern, const void *string)
|
|
|
|
{
|
|
|
|
return fnmatch(pattern, string, 0);
|
|
|
|
}
|
|
|
|
|
2014-01-27 17:38:49 -05:00
|
|
|
/** Think of this as realloc with error handling. If realloc fails NULL will be
|
|
|
|
* returned and data will not be changed.
|
|
|
|
*
|
|
|
|
* Newly created memory will be zeroed.
|
|
|
|
*
|
|
|
|
* @param data source memory space
|
|
|
|
* @param current size of the space pointed to by data
|
|
|
|
* @param required size you want
|
|
|
|
* @return new memory; NULL on error
|
|
|
|
*/
|
|
|
|
void *_alpm_realloc(void **data, size_t *current, const size_t required)
|
|
|
|
{
|
|
|
|
char *newdata;
|
|
|
|
|
|
|
|
newdata = realloc(*data, required);
|
|
|
|
if(!newdata) {
|
|
|
|
_alpm_alloc_fail(required);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (*current < required) {
|
|
|
|
/* ensure all new memory is zeroed out, in both the initial
|
|
|
|
* allocation and later reallocs */
|
|
|
|
memset(newdata + *current, 0, required - *current);
|
|
|
|
}
|
|
|
|
*current = required;
|
|
|
|
*data = newdata;
|
|
|
|
return newdata;
|
|
|
|
}
|
|
|
|
|
|
|
|
/** This automatically grows data based on current/required.
|
|
|
|
*
|
|
|
|
* The memory space will be initialised to required bytes and doubled in size when required.
|
|
|
|
*
|
|
|
|
* Newly created memory will be zeroed.
|
|
|
|
* @param data source memory space
|
|
|
|
* @param current size of the space pointed to by data
|
|
|
|
* @param required size you want
|
|
|
|
* @return new memory if grown; old memory otherwise; NULL on error
|
|
|
|
*/
|
|
|
|
void *_alpm_greedy_grow(void **data, size_t *current, const size_t required)
|
|
|
|
{
|
|
|
|
size_t newsize = 0;
|
|
|
|
|
|
|
|
if(*current >= required) {
|
|
|
|
return data;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(*current == 0) {
|
|
|
|
newsize = required;
|
|
|
|
} else {
|
|
|
|
newsize = *current * 2;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* check for overflows */
|
|
|
|
if (newsize < required) {
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2015-01-14 07:27:41 -05:00
|
|
|
return _alpm_realloc(data, current, newsize);
|
2014-01-27 17:38:49 -05:00
|
|
|
}
|
|
|
|
|
2012-04-30 00:40:06 -04:00
|
|
|
void _alpm_alloc_fail(size_t size)
|
|
|
|
{
|
|
|
|
fprintf(stderr, "alloc failure: could not allocate %zd bytes\n", size);
|
|
|
|
}
|
|
|
|
|
2014-01-22 18:06:11 -05:00
|
|
|
/* vim: set noet: */
|