4919 lines
156 KiB
C
4919 lines
156 KiB
C
/* -*- mode: C; c-file-style: "gnu"; indent-tabs-mode: nil; -*-
|
|
*
|
|
* Copyright (C) 2011 Colin Walters <walters@verbum.org>
|
|
* Copyright (C) 2015 Red Hat, Inc.
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2 of the License, or (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this library; if not, write to the
|
|
* Free Software Foundation, Inc., 59 Temple Place - Suite 330,
|
|
* Boston, MA 02111-1307, USA.
|
|
*
|
|
* Author: Colin Walters <walters@verbum.org>
|
|
*/
|
|
|
|
#include "config.h"
|
|
|
|
#include <glib-unix.h>
|
|
#include <gio/gunixinputstream.h>
|
|
#include <gio/gfiledescriptorbased.h>
|
|
#include "libglnx.h"
|
|
#include "otutil.h"
|
|
#include <glnx-console.h>
|
|
|
|
#include "ostree-core-private.h"
|
|
#include "ostree-repo-private.h"
|
|
#include "ostree-repo-file.h"
|
|
#include "ostree-repo-file-enumerator.h"
|
|
#include "ostree-gpg-verifier.h"
|
|
#include "ostree-repo-static-delta-private.h"
|
|
#include "ot-fs-utils.h"
|
|
#include "ostree-autocleanups.h"
|
|
|
|
#include <locale.h>
|
|
#include <glib/gstdio.h>
|
|
|
|
/**
|
|
* SECTION:ostree-repo
|
|
* @title: Content-addressed object store
|
|
* @short_description: A git-like storage system for operating system binaries
|
|
*
|
|
* The #OstreeRepo is like git, a content-addressed object store.
|
|
* Unlike git, it records uid, gid, and extended attributes.
|
|
*
|
|
* There are three possible "modes" for an #OstreeRepo;
|
|
* %OSTREE_REPO_MODE_BARE is very simple - content files are
|
|
* represented exactly as they are, and checkouts are just hardlinks.
|
|
* %OSTREE_REPO_MODE_BARE_USER is similar, except the uid/gids are not
|
|
* set on the files, and checkouts as hardlinks hardlinks work only for user checkouts.
|
|
* A %OSTREE_REPO_MODE_ARCHIVE_Z2 repository in contrast stores
|
|
* content files zlib-compressed. It is suitable for non-root-owned
|
|
* repositories that can be served via a static HTTP server.
|
|
*
|
|
* Creating an #OstreeRepo does not invoke any file I/O, and thus needs
|
|
* to be initialized, either from an existing contents or with a new
|
|
* repository. If you have an existing repo, use ostree_repo_open()
|
|
* to load it from disk and check its validity. To initialize a new
|
|
* repository in the given filepath, use ostree_repo_create() instead.
|
|
*
|
|
* To store content in the repo, first start a transaction with
|
|
* ostree_repo_prepare_transaction(). Then create a
|
|
* #OstreeMutableTree, and apply functions such as
|
|
* ostree_repo_write_directory_to_mtree() to traverse a physical
|
|
* filesystem and write content, possibly multiple times.
|
|
*
|
|
* Once the #OstreeMutableTree is complete, write all of its metadata
|
|
* with ostree_repo_write_mtree(), and finally create a commit with
|
|
* ostree_repo_write_commit().
|
|
*/
|
|
typedef struct {
|
|
GObjectClass parent_class;
|
|
|
|
void (*gpg_verify_result) (OstreeRepo *self,
|
|
const char *checksum,
|
|
OstreeGpgVerifyResult *result);
|
|
} OstreeRepoClass;
|
|
|
|
enum {
|
|
PROP_0,
|
|
|
|
PROP_PATH,
|
|
PROP_REMOTES_CONFIG_DIR,
|
|
PROP_SYSROOT_PATH
|
|
};
|
|
|
|
enum {
|
|
GPG_VERIFY_RESULT,
|
|
LAST_SIGNAL
|
|
};
|
|
|
|
static guint signals[LAST_SIGNAL] = { 0 };
|
|
|
|
G_DEFINE_TYPE (OstreeRepo, ostree_repo, G_TYPE_OBJECT)
|
|
|
|
GS_DEFINE_CLEANUP_FUNCTION0(GKeyFile*, local_keyfile_unref, g_key_file_unref)
|
|
#define local_cleanup_keyfile __attribute__ ((cleanup(local_keyfile_unref)))
|
|
|
|
#define SYSCONF_REMOTES SHORTENED_SYSCONFDIR "/ostree/remotes.d"
|
|
|
|
typedef struct {
|
|
volatile int ref_count;
|
|
char *name;
|
|
char *group; /* group name in options */
|
|
char *keyring; /* keyring name (NAME.trustedkeys.gpg) */
|
|
GFile *file; /* NULL if remote defined in repo/config */
|
|
GKeyFile *options;
|
|
} OstreeRemote;
|
|
|
|
static OstreeRemote *
|
|
ost_remote_new (void)
|
|
{
|
|
OstreeRemote *remote;
|
|
|
|
remote = g_slice_new0 (OstreeRemote);
|
|
remote->ref_count = 1;
|
|
remote->options = g_key_file_new ();
|
|
|
|
return remote;
|
|
}
|
|
|
|
static OstreeRemote *
|
|
ost_remote_new_from_keyfile (GKeyFile *keyfile,
|
|
const gchar *group)
|
|
{
|
|
g_autoptr(GMatchInfo) match = NULL;
|
|
OstreeRemote *remote;
|
|
|
|
static gsize regex_initialized;
|
|
static GRegex *regex;
|
|
|
|
if (g_once_init_enter (®ex_initialized))
|
|
{
|
|
regex = g_regex_new ("^remote \"(.+)\"$", 0, 0, NULL);
|
|
g_assert (regex);
|
|
g_once_init_leave (®ex_initialized, 1);
|
|
}
|
|
|
|
/* Sanity check */
|
|
g_return_val_if_fail (g_key_file_has_group (keyfile, group), NULL);
|
|
|
|
/* If group name doesn't fit the pattern, fail. */
|
|
if (!g_regex_match (regex, group, 0, &match))
|
|
return NULL;
|
|
|
|
remote = ost_remote_new ();
|
|
remote->name = g_match_info_fetch (match, 1);
|
|
remote->group = g_strdup (group);
|
|
remote->keyring = g_strdup_printf ("%s.trustedkeys.gpg", remote->name);
|
|
|
|
ot_keyfile_copy_group (keyfile, remote->options, group);
|
|
|
|
return remote;
|
|
}
|
|
|
|
static OstreeRemote *
|
|
ost_remote_ref (OstreeRemote *remote)
|
|
{
|
|
g_return_val_if_fail (remote != NULL, NULL);
|
|
g_return_val_if_fail (remote->ref_count > 0, NULL);
|
|
|
|
g_atomic_int_inc (&remote->ref_count);
|
|
|
|
return remote;
|
|
}
|
|
|
|
static void
|
|
ost_remote_unref (OstreeRemote *remote)
|
|
{
|
|
g_return_if_fail (remote != NULL);
|
|
g_return_if_fail (remote->ref_count > 0);
|
|
|
|
if (g_atomic_int_dec_and_test (&remote->ref_count))
|
|
{
|
|
g_clear_pointer (&remote->name, g_free);
|
|
g_clear_pointer (&remote->group, g_free);
|
|
g_clear_pointer (&remote->keyring, g_free);
|
|
g_clear_object (&remote->file);
|
|
g_clear_pointer (&remote->options, g_key_file_free);
|
|
g_slice_free (OstreeRemote, remote);
|
|
}
|
|
}
|
|
|
|
GS_DEFINE_CLEANUP_FUNCTION0(OstreeRemote*, local_remote_unref, ost_remote_unref)
|
|
#define local_cleanup_remote __attribute__ ((cleanup(local_remote_unref)))
|
|
|
|
static OstreeRemote *
|
|
ost_repo_get_remote (OstreeRepo *self,
|
|
const char *name,
|
|
GError **error)
|
|
{
|
|
OstreeRemote *remote = NULL;
|
|
|
|
g_return_val_if_fail (name != NULL, NULL);
|
|
|
|
g_mutex_lock (&self->remotes_lock);
|
|
|
|
remote = g_hash_table_lookup (self->remotes, name);
|
|
|
|
if (remote != NULL)
|
|
ost_remote_ref (remote);
|
|
else
|
|
g_set_error (error, G_IO_ERROR, G_IO_ERROR_NOT_FOUND,
|
|
"Remote \"%s\" not found", name);
|
|
|
|
g_mutex_unlock (&self->remotes_lock);
|
|
|
|
return remote;
|
|
}
|
|
|
|
static OstreeRemote *
|
|
ost_repo_get_remote_inherited (OstreeRepo *self,
|
|
const char *name,
|
|
GError **error)
|
|
{
|
|
local_cleanup_remote OstreeRemote *remote = NULL;
|
|
g_autoptr(GError) temp_error = NULL;
|
|
|
|
remote = ost_repo_get_remote (self, name, &temp_error);
|
|
if (remote == NULL)
|
|
{
|
|
if (self->parent_repo != NULL)
|
|
return ost_repo_get_remote_inherited (self->parent_repo, name, error);
|
|
|
|
g_propagate_error (error, g_steal_pointer (&temp_error));
|
|
return NULL;
|
|
}
|
|
|
|
return g_steal_pointer (&remote);
|
|
}
|
|
|
|
static void
|
|
ost_repo_add_remote (OstreeRepo *self,
|
|
OstreeRemote *remote)
|
|
{
|
|
g_return_if_fail (self != NULL);
|
|
g_return_if_fail (remote != NULL);
|
|
g_return_if_fail (remote->name != NULL);
|
|
|
|
g_mutex_lock (&self->remotes_lock);
|
|
|
|
g_hash_table_replace (self->remotes, remote->name, ost_remote_ref (remote));
|
|
|
|
g_mutex_unlock (&self->remotes_lock);
|
|
}
|
|
|
|
static gboolean
|
|
ost_repo_remove_remote (OstreeRepo *self,
|
|
OstreeRemote *remote)
|
|
{
|
|
gboolean removed;
|
|
|
|
g_return_val_if_fail (self != NULL, FALSE);
|
|
g_return_val_if_fail (remote != NULL, FALSE);
|
|
g_return_val_if_fail (remote->name != NULL, FALSE);
|
|
|
|
g_mutex_lock (&self->remotes_lock);
|
|
|
|
removed = g_hash_table_remove (self->remotes, remote->name);
|
|
|
|
g_mutex_unlock (&self->remotes_lock);
|
|
|
|
return removed;
|
|
}
|
|
|
|
gboolean
|
|
_ostree_repo_remote_name_is_file (const char *remote_name)
|
|
{
|
|
return g_str_has_prefix (remote_name, "file://");
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_get_remote_option:
|
|
* @self: A OstreeRepo
|
|
* @remote_name: Name
|
|
* @option_name: Option
|
|
* @default_value: (allow-none): Value returned if @option_name is not present
|
|
* @out_value: (out): Return location for value
|
|
* @error: Error
|
|
*
|
|
* OSTree remotes are represented by keyfile groups, formatted like:
|
|
* `[remote "remotename"]`. This function returns a value named @option_name
|
|
* underneath that group, or @default_value if the remote exists but not the
|
|
* option name.
|
|
*
|
|
* Returns: %TRUE on success, otherwise %FALSE with @error set
|
|
*/
|
|
gboolean
|
|
ostree_repo_get_remote_option (OstreeRepo *self,
|
|
const char *remote_name,
|
|
const char *option_name,
|
|
const char *default_value,
|
|
char **out_value,
|
|
GError **error)
|
|
{
|
|
local_cleanup_remote OstreeRemote *remote = NULL;
|
|
gboolean ret = FALSE;
|
|
g_autoptr(GError) temp_error = NULL;
|
|
g_autofree char *value = NULL;
|
|
|
|
if (_ostree_repo_remote_name_is_file (remote_name))
|
|
{
|
|
*out_value = g_strdup (default_value);
|
|
return TRUE;
|
|
}
|
|
|
|
remote = ost_repo_get_remote (self, remote_name, &temp_error);
|
|
if (remote != NULL)
|
|
{
|
|
value = g_key_file_get_string (remote->options, remote->group, option_name, &temp_error);
|
|
if (value == NULL)
|
|
{
|
|
if (g_error_matches (temp_error, G_KEY_FILE_ERROR, G_KEY_FILE_ERROR_KEY_NOT_FOUND))
|
|
{
|
|
/* Note: We ignore errors on the parent because the parent config may not
|
|
specify this remote, causing a "remote not found" error, but we found
|
|
the remote at some point, so we need to instead return the default */
|
|
if (self->parent_repo != NULL &&
|
|
ostree_repo_get_remote_option (self->parent_repo,
|
|
remote_name, option_name,
|
|
default_value,
|
|
out_value,
|
|
NULL))
|
|
return TRUE;
|
|
|
|
value = g_strdup (default_value);
|
|
ret = TRUE;
|
|
}
|
|
else
|
|
g_propagate_error (error, g_steal_pointer (&temp_error));
|
|
}
|
|
else
|
|
ret = TRUE;
|
|
}
|
|
else if (self->parent_repo != NULL)
|
|
return ostree_repo_get_remote_option (self->parent_repo,
|
|
remote_name, option_name,
|
|
default_value,
|
|
out_value,
|
|
error);
|
|
else
|
|
g_propagate_error (error, g_steal_pointer (&temp_error));
|
|
|
|
*out_value = g_steal_pointer (&value);
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_get_remote_list_option:
|
|
* @self: A OstreeRepo
|
|
* @remote_name: Name
|
|
* @option_name: Option
|
|
* @out_value: (out) (array zero-terminated=1): location to store the list
|
|
* of strings. The list should be freed with
|
|
* g_strfreev().
|
|
* @error: Error
|
|
*
|
|
* OSTree remotes are represented by keyfile groups, formatted like:
|
|
* `[remote "remotename"]`. This function returns a value named @option_name
|
|
* underneath that group, and returns it as an zero terminated array of strings.
|
|
* If the option is not set, @out_value will be set to %NULL.
|
|
*
|
|
* Returns: %TRUE on success, otherwise %FALSE with @error set
|
|
*/
|
|
gboolean
|
|
ostree_repo_get_remote_list_option (OstreeRepo *self,
|
|
const char *remote_name,
|
|
const char *option_name,
|
|
char ***out_value,
|
|
GError **error)
|
|
{
|
|
local_cleanup_remote OstreeRemote *remote = NULL;
|
|
gboolean ret = FALSE;
|
|
g_autoptr(GError) temp_error = NULL;
|
|
g_auto(GStrv) value = NULL;
|
|
|
|
if (_ostree_repo_remote_name_is_file (remote_name))
|
|
{
|
|
*out_value = NULL;
|
|
return TRUE;
|
|
}
|
|
|
|
remote = ost_repo_get_remote (self, remote_name, &temp_error);
|
|
if (remote != NULL)
|
|
{
|
|
value = g_key_file_get_string_list (remote->options,
|
|
remote->group,
|
|
option_name,
|
|
NULL, &temp_error);
|
|
|
|
/* Default value if key not found is always NULL. */
|
|
if (g_error_matches (temp_error, G_KEY_FILE_ERROR, G_KEY_FILE_ERROR_KEY_NOT_FOUND))
|
|
{
|
|
/* Note: We ignore errors on the parent because the parent config may not
|
|
specify this remote, causing a "remote not found" error, but we found
|
|
the remote at some point, so we need to instead return the default */
|
|
if (self->parent_repo != NULL &&
|
|
ostree_repo_get_remote_list_option (self->parent_repo,
|
|
remote_name, option_name,
|
|
out_value,
|
|
NULL))
|
|
return TRUE;
|
|
|
|
ret = TRUE;
|
|
}
|
|
else if (temp_error)
|
|
g_propagate_error (error, g_steal_pointer (&temp_error));
|
|
else
|
|
ret = TRUE;
|
|
}
|
|
else if (self->parent_repo != NULL)
|
|
return ostree_repo_get_remote_list_option (self->parent_repo,
|
|
remote_name, option_name,
|
|
out_value,
|
|
error);
|
|
else
|
|
g_propagate_error (error, g_steal_pointer (&temp_error));
|
|
|
|
*out_value = g_steal_pointer (&value);
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_get_remote_boolean_option:
|
|
* @self: A OstreeRepo
|
|
* @remote_name: Name
|
|
* @option_name: Option
|
|
* @default_value: Value returned if @option_name is not present
|
|
* @out_value: (out) : location to store the result.
|
|
* @error: Error
|
|
*
|
|
* OSTree remotes are represented by keyfile groups, formatted like:
|
|
* `[remote "remotename"]`. This function returns a value named @option_name
|
|
* underneath that group, and returns it as a boolean.
|
|
* If the option is not set, @out_value will be set to @default_value.
|
|
*
|
|
* Returns: %TRUE on success, otherwise %FALSE with @error set
|
|
*/
|
|
gboolean
|
|
ostree_repo_get_remote_boolean_option (OstreeRepo *self,
|
|
const char *remote_name,
|
|
const char *option_name,
|
|
gboolean default_value,
|
|
gboolean *out_value,
|
|
GError **error)
|
|
{
|
|
local_cleanup_remote OstreeRemote *remote = NULL;
|
|
g_autoptr(GError) temp_error = NULL;
|
|
gboolean ret = FALSE;
|
|
gboolean value = FALSE;
|
|
|
|
if (_ostree_repo_remote_name_is_file (remote_name))
|
|
{
|
|
*out_value = default_value;
|
|
return TRUE;
|
|
}
|
|
|
|
remote = ost_repo_get_remote (self, remote_name, &temp_error);
|
|
if (remote != NULL)
|
|
{
|
|
value = g_key_file_get_boolean (remote->options, remote->group, option_name, &temp_error);
|
|
if (temp_error != NULL)
|
|
{
|
|
if (g_error_matches (temp_error, G_KEY_FILE_ERROR, G_KEY_FILE_ERROR_KEY_NOT_FOUND))
|
|
{
|
|
/* Note: We ignore errors on the parent because the parent config may not
|
|
specify this remote, causing a "remote not found" error, but we found
|
|
the remote at some point, so we need to instead return the default */
|
|
if (self->parent_repo != NULL &&
|
|
ostree_repo_get_remote_boolean_option (self->parent_repo,
|
|
remote_name, option_name,
|
|
default_value,
|
|
out_value,
|
|
NULL))
|
|
return TRUE;
|
|
|
|
value = default_value;
|
|
ret = TRUE;
|
|
}
|
|
else
|
|
g_propagate_error (error, g_steal_pointer (&temp_error));
|
|
}
|
|
else
|
|
ret = TRUE;
|
|
}
|
|
else if (self->parent_repo != NULL)
|
|
return ostree_repo_get_remote_boolean_option (self->parent_repo,
|
|
remote_name, option_name,
|
|
default_value,
|
|
out_value,
|
|
error);
|
|
else
|
|
g_propagate_error (error, g_steal_pointer (&temp_error));
|
|
|
|
*out_value = value;
|
|
return ret;
|
|
}
|
|
|
|
static void
|
|
ostree_repo_finalize (GObject *object)
|
|
{
|
|
OstreeRepo *self = OSTREE_REPO (object);
|
|
|
|
g_clear_object (&self->parent_repo);
|
|
|
|
g_free (self->stagedir_prefix);
|
|
g_clear_object (&self->repodir);
|
|
if (self->repo_dir_fd != -1)
|
|
(void) close (self->repo_dir_fd);
|
|
if (self->commit_stagedir_fd != -1)
|
|
(void) close (self->commit_stagedir_fd);
|
|
g_free (self->commit_stagedir_name);
|
|
glnx_release_lock_file (&self->commit_stagedir_lock);
|
|
g_clear_object (&self->tmp_dir);
|
|
if (self->tmp_dir_fd)
|
|
(void) close (self->tmp_dir_fd);
|
|
if (self->cache_dir_fd)
|
|
(void) close (self->cache_dir_fd);
|
|
g_clear_object (&self->objects_dir);
|
|
if (self->objects_dir_fd != -1)
|
|
(void) close (self->objects_dir_fd);
|
|
g_clear_object (&self->deltas_dir);
|
|
g_clear_object (&self->state_dir);
|
|
g_clear_object (&self->uncompressed_objects_dir);
|
|
if (self->uncompressed_objects_dir_fd != -1)
|
|
(void) close (self->uncompressed_objects_dir_fd);
|
|
g_clear_object (&self->config_file);
|
|
g_clear_object (&self->sysroot_dir);
|
|
g_free (self->remotes_config_dir);
|
|
|
|
g_clear_object (&self->transaction_lock_path);
|
|
|
|
if (self->loose_object_devino_hash)
|
|
g_hash_table_destroy (self->loose_object_devino_hash);
|
|
if (self->updated_uncompressed_dirs)
|
|
g_hash_table_destroy (self->updated_uncompressed_dirs);
|
|
if (self->config)
|
|
g_key_file_free (self->config);
|
|
g_clear_pointer (&self->txn_refs, g_hash_table_destroy);
|
|
g_clear_pointer (&self->cached_meta_indexes, (GDestroyNotify) g_ptr_array_unref);
|
|
g_clear_pointer (&self->cached_content_indexes, (GDestroyNotify) g_ptr_array_unref);
|
|
g_clear_error (&self->writable_error);
|
|
g_clear_pointer (&self->object_sizes, (GDestroyNotify) g_hash_table_unref);
|
|
g_mutex_clear (&self->cache_lock);
|
|
g_mutex_clear (&self->txn_stats_lock);
|
|
|
|
g_clear_pointer (&self->remotes, g_hash_table_destroy);
|
|
g_mutex_clear (&self->remotes_lock);
|
|
|
|
G_OBJECT_CLASS (ostree_repo_parent_class)->finalize (object);
|
|
}
|
|
|
|
static void
|
|
ostree_repo_set_property(GObject *object,
|
|
guint prop_id,
|
|
const GValue *value,
|
|
GParamSpec *pspec)
|
|
{
|
|
OstreeRepo *self = OSTREE_REPO (object);
|
|
|
|
switch (prop_id)
|
|
{
|
|
case PROP_PATH:
|
|
self->repodir = g_value_dup_object (value);
|
|
break;
|
|
case PROP_SYSROOT_PATH:
|
|
self->sysroot_dir = g_value_dup_object (value);
|
|
break;
|
|
case PROP_REMOTES_CONFIG_DIR:
|
|
self->remotes_config_dir = g_value_dup_string (value);
|
|
break;
|
|
default:
|
|
G_OBJECT_WARN_INVALID_PROPERTY_ID (object, prop_id, pspec);
|
|
break;
|
|
}
|
|
}
|
|
|
|
static void
|
|
ostree_repo_get_property(GObject *object,
|
|
guint prop_id,
|
|
GValue *value,
|
|
GParamSpec *pspec)
|
|
{
|
|
OstreeRepo *self = OSTREE_REPO (object);
|
|
|
|
switch (prop_id)
|
|
{
|
|
case PROP_PATH:
|
|
g_value_set_object (value, self->repodir);
|
|
break;
|
|
case PROP_SYSROOT_PATH:
|
|
g_value_set_object (value, self->sysroot_dir);
|
|
break;
|
|
case PROP_REMOTES_CONFIG_DIR:
|
|
g_value_set_string (value, self->remotes_config_dir);
|
|
break;
|
|
default:
|
|
G_OBJECT_WARN_INVALID_PROPERTY_ID (object, prop_id, pspec);
|
|
break;
|
|
}
|
|
}
|
|
|
|
static void
|
|
ostree_repo_constructed (GObject *object)
|
|
{
|
|
OstreeRepo *self = OSTREE_REPO (object);
|
|
|
|
g_assert (self->repodir != NULL);
|
|
|
|
self->tmp_dir = g_file_resolve_relative_path (self->repodir, "tmp");
|
|
|
|
self->objects_dir = g_file_get_child (self->repodir, "objects");
|
|
self->deltas_dir = g_file_get_child (self->repodir, "deltas");
|
|
self->uncompressed_objects_dir = g_file_get_child (self->repodir, "uncompressed-objects-cache");
|
|
self->state_dir = g_file_get_child (self->repodir, "state");
|
|
self->config_file = g_file_get_child (self->repodir, "config");
|
|
|
|
/* Ensure the "sysroot-path" property is set. */
|
|
if (self->sysroot_dir == NULL)
|
|
self->sysroot_dir = g_object_ref (_ostree_get_default_sysroot_path ());
|
|
|
|
G_OBJECT_CLASS (ostree_repo_parent_class)->constructed (object);
|
|
}
|
|
|
|
static void
|
|
ostree_repo_class_init (OstreeRepoClass *klass)
|
|
{
|
|
GObjectClass *object_class = G_OBJECT_CLASS (klass);
|
|
|
|
object_class->constructed = ostree_repo_constructed;
|
|
object_class->get_property = ostree_repo_get_property;
|
|
object_class->set_property = ostree_repo_set_property;
|
|
object_class->finalize = ostree_repo_finalize;
|
|
|
|
g_object_class_install_property (object_class,
|
|
PROP_PATH,
|
|
g_param_spec_object ("path",
|
|
"",
|
|
"",
|
|
G_TYPE_FILE,
|
|
G_PARAM_READWRITE | G_PARAM_CONSTRUCT_ONLY));
|
|
|
|
g_object_class_install_property (object_class,
|
|
PROP_SYSROOT_PATH,
|
|
g_param_spec_object ("sysroot-path",
|
|
"",
|
|
"",
|
|
G_TYPE_FILE,
|
|
G_PARAM_READWRITE | G_PARAM_CONSTRUCT_ONLY));
|
|
g_object_class_install_property (object_class,
|
|
PROP_REMOTES_CONFIG_DIR,
|
|
g_param_spec_string ("remotes-config-dir",
|
|
"",
|
|
"",
|
|
NULL,
|
|
G_PARAM_READWRITE | G_PARAM_CONSTRUCT_ONLY));
|
|
|
|
/**
|
|
* OstreeRepo::gpg-verify-result:
|
|
* @self: an #OstreeRepo
|
|
* @checksum: checksum of the signed object
|
|
* @result: an #OstreeGpgVerifyResult
|
|
*
|
|
* Emitted during a pull operation upon GPG verification (if enabled).
|
|
* Applications can connect to this signal to output the verification
|
|
* results if desired.
|
|
*
|
|
* The signal will be emitted from whichever #GMainContext is the
|
|
* thread-default at the point when ostree_repo_pull_with_options()
|
|
* is called.
|
|
*/
|
|
signals[GPG_VERIFY_RESULT] = g_signal_new ("gpg-verify-result",
|
|
OSTREE_TYPE_REPO,
|
|
G_SIGNAL_RUN_LAST,
|
|
G_STRUCT_OFFSET (OstreeRepoClass, gpg_verify_result),
|
|
NULL, NULL, NULL,
|
|
G_TYPE_NONE, 2,
|
|
G_TYPE_STRING,
|
|
OSTREE_TYPE_GPG_VERIFY_RESULT);
|
|
}
|
|
|
|
static void
|
|
ostree_repo_init (OstreeRepo *self)
|
|
{
|
|
static gsize gpgme_initialized;
|
|
GLnxLockFile empty_lockfile = GLNX_LOCK_FILE_INIT;
|
|
const GDebugKey test_error_keys[] = {
|
|
{ "pre-commit", OSTREE_REPO_TEST_ERROR_PRE_COMMIT },
|
|
};
|
|
|
|
if (g_once_init_enter (&gpgme_initialized))
|
|
{
|
|
gpgme_check_version (NULL);
|
|
gpgme_set_locale (NULL, LC_CTYPE, setlocale (LC_CTYPE, NULL));
|
|
g_once_init_leave (&gpgme_initialized, 1);
|
|
}
|
|
|
|
self->test_error_flags = g_parse_debug_string (g_getenv ("OSTREE_REPO_TEST_ERROR"),
|
|
test_error_keys, G_N_ELEMENTS (test_error_keys));
|
|
|
|
g_mutex_init (&self->cache_lock);
|
|
g_mutex_init (&self->txn_stats_lock);
|
|
|
|
self->remotes = g_hash_table_new_full (g_str_hash, g_str_equal,
|
|
(GDestroyNotify) NULL,
|
|
(GDestroyNotify) ost_remote_unref);
|
|
g_mutex_init (&self->remotes_lock);
|
|
|
|
self->repo_dir_fd = -1;
|
|
self->cache_dir_fd = -1;
|
|
self->commit_stagedir_fd = -1;
|
|
self->objects_dir_fd = -1;
|
|
self->uncompressed_objects_dir_fd = -1;
|
|
self->commit_stagedir_lock = empty_lockfile;
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_new:
|
|
* @path: Path to a repository
|
|
*
|
|
* Returns: (transfer full): An accessor object for an OSTree repository located at @path
|
|
*/
|
|
OstreeRepo*
|
|
ostree_repo_new (GFile *path)
|
|
{
|
|
return g_object_new (OSTREE_TYPE_REPO, "path", path, NULL);
|
|
}
|
|
|
|
static GFile *
|
|
get_default_repo_path (GFile *sysroot_path)
|
|
{
|
|
if (sysroot_path == NULL)
|
|
sysroot_path = _ostree_get_default_sysroot_path ();
|
|
|
|
return g_file_resolve_relative_path (sysroot_path, "ostree/repo");
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_new_for_sysroot_path:
|
|
* @repo_path: Path to a repository
|
|
* @sysroot_path: Path to the system root
|
|
*
|
|
* Creates a new #OstreeRepo instance, taking the system root path explicitly
|
|
* instead of assuming "/".
|
|
*
|
|
* Returns: (transfer full): An accessor object for the OSTree repository located at @repo_path.
|
|
*/
|
|
OstreeRepo *
|
|
ostree_repo_new_for_sysroot_path (GFile *repo_path,
|
|
GFile *sysroot_path)
|
|
{
|
|
return g_object_new (OSTREE_TYPE_REPO, "path", repo_path, "sysroot-path", sysroot_path, NULL);
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_new_default:
|
|
*
|
|
* If the current working directory appears to be an OSTree
|
|
* repository, create a new #OstreeRepo object for accessing it.
|
|
* Otherwise use the path in the OSTREE_REPO environment variable
|
|
* (if defined) or else the default system repository located at
|
|
* /ostree/repo.
|
|
*
|
|
* Returns: (transfer full): An accessor object for an OSTree repository located at /ostree/repo
|
|
*/
|
|
OstreeRepo*
|
|
ostree_repo_new_default (void)
|
|
{
|
|
if (g_file_test ("objects", G_FILE_TEST_IS_DIR)
|
|
&& g_file_test ("config", G_FILE_TEST_IS_REGULAR))
|
|
{
|
|
g_autoptr(GFile) cwd = g_file_new_for_path (".");
|
|
return ostree_repo_new (cwd);
|
|
}
|
|
else
|
|
{
|
|
const char *envvar = g_getenv ("OSTREE_REPO");
|
|
g_autoptr(GFile) repo_path = NULL;
|
|
|
|
if (envvar == NULL || *envvar == '\0')
|
|
repo_path = get_default_repo_path (NULL);
|
|
else
|
|
repo_path = g_file_new_for_path (envvar);
|
|
|
|
return ostree_repo_new (repo_path);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_is_system:
|
|
* @repo: Repository
|
|
*
|
|
* Returns: %TRUE if this repository is the root-owned system global repository
|
|
*/
|
|
gboolean
|
|
ostree_repo_is_system (OstreeRepo *repo)
|
|
{
|
|
g_autoptr(GFile) default_repo_path = NULL;
|
|
|
|
g_return_val_if_fail (OSTREE_IS_REPO (repo), FALSE);
|
|
|
|
default_repo_path = get_default_repo_path (repo->sysroot_dir);
|
|
|
|
return g_file_equal (repo->repodir, default_repo_path);
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_is_writable:
|
|
* @self: Repo
|
|
* @error: a #GError
|
|
*
|
|
* Returns whether the repository is writable by the current user.
|
|
* If the repository is not writable, the @error indicates why.
|
|
*
|
|
* Returns: %TRUE if this repository is writable
|
|
*/
|
|
gboolean
|
|
ostree_repo_is_writable (OstreeRepo *self,
|
|
GError **error)
|
|
{
|
|
g_return_val_if_fail (self->inited, FALSE);
|
|
|
|
if (error != NULL && self->writable_error != NULL)
|
|
*error = g_error_copy (self->writable_error);
|
|
|
|
return self->writable;
|
|
}
|
|
|
|
/**
|
|
* _ostree_repo_update_mtime:
|
|
* @self: Repo
|
|
* @error: a #GError
|
|
*
|
|
* Bump the mtime of the repository so that programs
|
|
* can detect that the refs have updated.
|
|
*/
|
|
gboolean
|
|
_ostree_repo_update_mtime (OstreeRepo *self,
|
|
GError **error)
|
|
{
|
|
if (futimens (self->repo_dir_fd, NULL) != 0)
|
|
{
|
|
glnx_set_prefix_error_from_errno (error, "%s", "futimens");
|
|
return FALSE;
|
|
}
|
|
return TRUE;
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_get_config:
|
|
* @self:
|
|
*
|
|
* Returns: (transfer none): The repository configuration; do not modify
|
|
*/
|
|
GKeyFile *
|
|
ostree_repo_get_config (OstreeRepo *self)
|
|
{
|
|
g_return_val_if_fail (self->inited, NULL);
|
|
|
|
return self->config;
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_copy_config:
|
|
* @self:
|
|
*
|
|
* Returns: (transfer full): A newly-allocated copy of the repository config
|
|
*/
|
|
GKeyFile *
|
|
ostree_repo_copy_config (OstreeRepo *self)
|
|
{
|
|
GKeyFile *copy;
|
|
char *data;
|
|
gsize len;
|
|
|
|
g_return_val_if_fail (self->inited, NULL);
|
|
|
|
copy = g_key_file_new ();
|
|
data = g_key_file_to_data (self->config, &len, NULL);
|
|
if (!g_key_file_load_from_data (copy, data, len, 0, NULL))
|
|
g_assert_not_reached ();
|
|
g_free (data);
|
|
return copy;
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_write_config:
|
|
* @self: Repo
|
|
* @new_config: Overwrite the config file with this data. Do not change later!
|
|
* @error: a #GError
|
|
*
|
|
* Save @new_config in place of this repository's config file. Note
|
|
* that @new_config should not be modified after - this function
|
|
* simply adds a reference.
|
|
*/
|
|
gboolean
|
|
ostree_repo_write_config (OstreeRepo *self,
|
|
GKeyFile *new_config,
|
|
GError **error)
|
|
{
|
|
gboolean ret = FALSE;
|
|
g_autofree char *data = NULL;
|
|
gsize len;
|
|
|
|
g_return_val_if_fail (self->inited, FALSE);
|
|
|
|
data = g_key_file_to_data (new_config, &len, error);
|
|
if (!g_file_replace_contents (self->config_file, data, len, NULL, FALSE, 0, NULL,
|
|
NULL, error))
|
|
goto out;
|
|
|
|
g_key_file_free (self->config);
|
|
self->config = g_key_file_new ();
|
|
if (!g_key_file_load_from_data (self->config, data, len, 0, error))
|
|
goto out;
|
|
|
|
ret = TRUE;
|
|
out:
|
|
return ret;
|
|
}
|
|
|
|
/* Bind a subset of an a{sv} to options in a given GKeyfile section */
|
|
static void
|
|
keyfile_set_from_vardict (GKeyFile *keyfile,
|
|
const char *section,
|
|
GVariant *vardict)
|
|
{
|
|
GVariantIter viter;
|
|
const char *key;
|
|
GVariant *val;
|
|
|
|
g_variant_iter_init (&viter, vardict);
|
|
while (g_variant_iter_loop (&viter, "{&s@v}", &key, &val))
|
|
{
|
|
g_autoptr(GVariant) child = g_variant_get_variant (val);
|
|
if (g_variant_is_of_type (child, G_VARIANT_TYPE_STRING))
|
|
g_key_file_set_string (keyfile, section, key, g_variant_get_string (child, NULL));
|
|
else if (g_variant_is_of_type (child, G_VARIANT_TYPE_BOOLEAN))
|
|
g_key_file_set_boolean (keyfile, section, key, g_variant_get_boolean (child));
|
|
else if (g_variant_is_of_type (child, G_VARIANT_TYPE_STRING_ARRAY))
|
|
{
|
|
gsize len;
|
|
const char *const*strv_child = g_variant_get_strv (child, &len);
|
|
g_key_file_set_string_list (keyfile, section, key, strv_child, len);
|
|
}
|
|
else
|
|
g_critical ("Unhandled type '%s' in " G_GNUC_FUNCTION,
|
|
(char*)g_variant_get_type (child));
|
|
}
|
|
}
|
|
|
|
static gboolean
|
|
impl_repo_remote_add (OstreeRepo *self,
|
|
GFile *sysroot,
|
|
gboolean if_not_exists,
|
|
const char *name,
|
|
const char *url,
|
|
GVariant *options,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
local_cleanup_remote OstreeRemote *remote = NULL;
|
|
gboolean different_sysroot = FALSE;
|
|
gboolean ret = FALSE;
|
|
|
|
g_return_val_if_fail (name != NULL, FALSE);
|
|
g_return_val_if_fail (url != NULL, FALSE);
|
|
g_return_val_if_fail (options == NULL || g_variant_is_of_type (options, G_VARIANT_TYPE ("a{sv}")), FALSE);
|
|
|
|
if (strchr (name, '/') != NULL)
|
|
{
|
|
g_set_error (error, G_IO_ERROR, G_IO_ERROR_FAILED,
|
|
"Invalid character '/' in remote name: %s",
|
|
name);
|
|
goto out;
|
|
}
|
|
|
|
remote = ost_repo_get_remote (self, name, NULL);
|
|
if (remote != NULL && if_not_exists)
|
|
{
|
|
ret = TRUE;
|
|
goto out;
|
|
}
|
|
else if (remote != NULL)
|
|
{
|
|
GFile *file;
|
|
|
|
if (remote->file != NULL)
|
|
file = remote->file;
|
|
else
|
|
file = self->config_file;
|
|
|
|
g_set_error (error, G_IO_ERROR, G_IO_ERROR_FAILED,
|
|
"Remote configuration for \"%s\" already exists: %s",
|
|
name, gs_file_get_path_cached (file));
|
|
|
|
goto out;
|
|
}
|
|
|
|
remote = ost_remote_new ();
|
|
remote->name = g_strdup (name);
|
|
remote->group = g_strdup_printf ("remote \"%s\"", name);
|
|
remote->keyring = g_strdup_printf ("%s.trustedkeys.gpg", name);
|
|
|
|
/* The OstreeRepo maintains its own internal system root path,
|
|
* so we need to not only check if a "sysroot" argument was given
|
|
* but also whether it's actually different from OstreeRepo's.
|
|
*
|
|
* XXX Having API regret about the "sysroot" argument now.
|
|
*/
|
|
if (sysroot != NULL)
|
|
different_sysroot = !g_file_equal (sysroot, self->sysroot_dir);
|
|
|
|
if (different_sysroot || ostree_repo_is_system (self))
|
|
{
|
|
g_autofree char *basename = g_strconcat (name, ".conf", NULL);
|
|
g_autoptr(GFile) etc_ostree_remotes_d = NULL;
|
|
GError *local_error = NULL;
|
|
|
|
if (sysroot == NULL)
|
|
sysroot = self->sysroot_dir;
|
|
|
|
etc_ostree_remotes_d = g_file_resolve_relative_path (sysroot, SYSCONF_REMOTES);
|
|
|
|
if (!g_file_make_directory_with_parents (etc_ostree_remotes_d,
|
|
cancellable, &local_error))
|
|
{
|
|
if (g_error_matches (local_error, G_IO_ERROR, G_IO_ERROR_EXISTS))
|
|
{
|
|
g_clear_error (&local_error);
|
|
}
|
|
else
|
|
{
|
|
g_propagate_error (error, local_error);
|
|
goto out;
|
|
}
|
|
}
|
|
|
|
remote->file = g_file_get_child (etc_ostree_remotes_d, basename);
|
|
}
|
|
|
|
if (g_str_has_prefix (url, "metalink="))
|
|
g_key_file_set_string (remote->options, remote->group, "metalink", url + strlen ("metalink="));
|
|
else
|
|
g_key_file_set_string (remote->options, remote->group, "url", url);
|
|
|
|
if (options)
|
|
keyfile_set_from_vardict (remote->options, remote->group, options);
|
|
|
|
if (remote->file != NULL)
|
|
{
|
|
g_autofree char *data = NULL;
|
|
gsize length;
|
|
|
|
data = g_key_file_to_data (remote->options, &length, NULL);
|
|
|
|
if (!g_file_replace_contents (remote->file,
|
|
data, length,
|
|
NULL, FALSE, 0, NULL,
|
|
cancellable, error))
|
|
goto out;
|
|
}
|
|
else
|
|
{
|
|
local_cleanup_keyfile GKeyFile *config = NULL;
|
|
|
|
config = ostree_repo_copy_config (self);
|
|
ot_keyfile_copy_group (remote->options, config, remote->group);
|
|
|
|
if (!ostree_repo_write_config (self, config, error))
|
|
goto out;
|
|
}
|
|
|
|
ost_repo_add_remote (self, remote);
|
|
|
|
ret = TRUE;
|
|
|
|
out:
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_remote_add:
|
|
* @self: Repo
|
|
* @name: Name of remote
|
|
* @url: URL for remote (if URL begins with metalink=, it will be used as such)
|
|
* @options: (allow-none): GVariant of type a{sv}
|
|
* @cancellable: Cancellable
|
|
* @error: Error
|
|
*
|
|
* Create a new remote named @name pointing to @url. If @options is
|
|
* provided, then it will be mapped to #GKeyFile entries, where the
|
|
* GVariant dictionary key is an option string, and the value is
|
|
* mapped as follows:
|
|
* * s: g_key_file_set_string()
|
|
* * b: g_key_file_set_boolean()
|
|
* * as: g_key_file_set_string_list()
|
|
*
|
|
*/
|
|
gboolean
|
|
ostree_repo_remote_add (OstreeRepo *self,
|
|
const char *name,
|
|
const char *url,
|
|
GVariant *options,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
return impl_repo_remote_add (self, NULL, FALSE, name, url, options,
|
|
cancellable, error);
|
|
}
|
|
|
|
static gboolean
|
|
impl_repo_remote_delete (OstreeRepo *self,
|
|
GFile *sysroot,
|
|
gboolean if_exists,
|
|
const char *name,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
local_cleanup_remote OstreeRemote *remote = NULL;
|
|
gboolean ret = FALSE;
|
|
|
|
g_return_val_if_fail (name != NULL, FALSE);
|
|
|
|
if (strchr (name, '/') != NULL)
|
|
{
|
|
g_set_error (error, G_IO_ERROR, G_IO_ERROR_FAILED,
|
|
"Invalid character '/' in remote name: %s",
|
|
name);
|
|
goto out;
|
|
}
|
|
|
|
if (if_exists)
|
|
{
|
|
remote = ost_repo_get_remote (self, name, NULL);
|
|
if (!remote)
|
|
{
|
|
ret = TRUE;
|
|
goto out;
|
|
}
|
|
}
|
|
else
|
|
remote = ost_repo_get_remote (self, name, error);
|
|
|
|
if (remote == NULL)
|
|
goto out;
|
|
|
|
if (remote->file != NULL)
|
|
{
|
|
if (unlink (gs_file_get_path_cached (remote->file)) != 0)
|
|
{
|
|
glnx_set_error_from_errno (error);
|
|
goto out;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
local_cleanup_keyfile GKeyFile *config = NULL;
|
|
|
|
config = ostree_repo_copy_config (self);
|
|
|
|
/* XXX Not sure it's worth failing if the group to remove
|
|
* isn't found. It's the end result we want, after all. */
|
|
if (g_key_file_remove_group (config, remote->group, NULL))
|
|
{
|
|
if (!ostree_repo_write_config (self, config, error))
|
|
goto out;
|
|
}
|
|
}
|
|
|
|
/* Delete the remote's keyring file, if it exists. */
|
|
if (!ot_ensure_unlinked_at (self->repo_dir_fd, remote->keyring, error))
|
|
goto out;
|
|
|
|
ost_repo_remove_remote (self, remote);
|
|
|
|
ret = TRUE;
|
|
|
|
out:
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_remote_delete:
|
|
* @self: Repo
|
|
* @name: Name of remote
|
|
* @cancellable: Cancellable
|
|
* @error: Error
|
|
*
|
|
* Delete the remote named @name. It is an error if the provided
|
|
* remote does not exist.
|
|
*
|
|
*/
|
|
gboolean
|
|
ostree_repo_remote_delete (OstreeRepo *self,
|
|
const char *name,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
return impl_repo_remote_delete (self, NULL, FALSE, name, cancellable, error);
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_remote_change:
|
|
* @self: Repo
|
|
* @sysroot: (allow-none): System root
|
|
* @changeop: Operation to perform
|
|
* @name: Name of remote
|
|
* @url: URL for remote (if URL begins with metalink=, it will be used as such)
|
|
* @options: (allow-none): GVariant of type a{sv}
|
|
* @cancellable: Cancellable
|
|
* @error: Error
|
|
*
|
|
* A combined function handling the equivalent of
|
|
* ostree_repo_remote_add(), ostree_repo_remote_delete(), with more
|
|
* options.
|
|
*
|
|
*
|
|
*/
|
|
gboolean
|
|
ostree_repo_remote_change (OstreeRepo *self,
|
|
GFile *sysroot,
|
|
OstreeRepoRemoteChange changeop,
|
|
const char *name,
|
|
const char *url,
|
|
GVariant *options,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
switch (changeop)
|
|
{
|
|
case OSTREE_REPO_REMOTE_CHANGE_ADD:
|
|
return impl_repo_remote_add (self, sysroot, FALSE, name, url, options,
|
|
cancellable, error);
|
|
case OSTREE_REPO_REMOTE_CHANGE_ADD_IF_NOT_EXISTS:
|
|
return impl_repo_remote_add (self, sysroot, TRUE, name, url, options,
|
|
cancellable, error);
|
|
case OSTREE_REPO_REMOTE_CHANGE_DELETE:
|
|
return impl_repo_remote_delete (self, sysroot, FALSE, name,
|
|
cancellable, error);
|
|
case OSTREE_REPO_REMOTE_CHANGE_DELETE_IF_EXISTS:
|
|
return impl_repo_remote_delete (self, sysroot, TRUE, name,
|
|
cancellable, error);
|
|
}
|
|
g_assert_not_reached ();
|
|
}
|
|
|
|
static void
|
|
_ostree_repo_remote_list (OstreeRepo *self,
|
|
GHashTable *out)
|
|
{
|
|
GHashTableIter iter;
|
|
gpointer key, value;
|
|
|
|
g_mutex_lock (&self->remotes_lock);
|
|
|
|
g_hash_table_iter_init (&iter, self->remotes);
|
|
while (g_hash_table_iter_next (&iter, &key, &value))
|
|
g_hash_table_insert (out, g_strdup (key), NULL);
|
|
|
|
g_mutex_unlock (&self->remotes_lock);
|
|
|
|
if (self->parent_repo)
|
|
_ostree_repo_remote_list (self, out);
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_remote_list:
|
|
* @self: Repo
|
|
* @out_n_remotes: (out) (allow-none): Number of remotes available
|
|
*
|
|
* List available remote names in an #OstreeRepo. Remote names are sorted
|
|
* alphabetically. If no remotes are available the function returns %NULL.
|
|
*
|
|
* Returns: (array length=out_n_remotes) (transfer full): a %NULL-terminated
|
|
* array of remote names
|
|
**/
|
|
char **
|
|
ostree_repo_remote_list (OstreeRepo *self,
|
|
guint *out_n_remotes)
|
|
{
|
|
char **remotes = NULL;
|
|
guint n_remotes;
|
|
g_autoptr(GHashTable) remotes_ht = NULL;
|
|
|
|
remotes_ht = g_hash_table_new_full (g_str_hash, g_str_equal,
|
|
(GDestroyNotify) g_free,
|
|
(GDestroyNotify) NULL);
|
|
|
|
_ostree_repo_remote_list (self, remotes_ht);
|
|
|
|
n_remotes = g_hash_table_size (remotes_ht);
|
|
|
|
if (n_remotes > 0)
|
|
{
|
|
GList *list, *link;
|
|
guint ii = 0;
|
|
|
|
remotes = g_new (char *, n_remotes + 1);
|
|
|
|
list = g_hash_table_get_keys (remotes_ht);
|
|
list = g_list_sort (list, (GCompareFunc) strcmp);
|
|
|
|
for (link = list; link != NULL; link = link->next)
|
|
remotes[ii++] = g_strdup (link->data);
|
|
|
|
g_list_free (list);
|
|
|
|
remotes[ii] = NULL;
|
|
}
|
|
|
|
if (out_n_remotes)
|
|
*out_n_remotes = n_remotes;
|
|
|
|
return remotes;
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_remote_get_url:
|
|
* @self: Repo
|
|
* @name: Name of remote
|
|
* @out_url: (out) (allow-none): Remote's URL
|
|
* @error: Error
|
|
*
|
|
* Return the URL of the remote named @name through @out_url. It is an
|
|
* error if the provided remote does not exist.
|
|
*
|
|
* Returns: %TRUE on success, %FALSE on failure
|
|
*/
|
|
gboolean
|
|
ostree_repo_remote_get_url (OstreeRepo *self,
|
|
const char *name,
|
|
char **out_url,
|
|
GError **error)
|
|
{
|
|
g_autofree char *url = NULL;
|
|
gboolean ret = FALSE;
|
|
|
|
g_return_val_if_fail (name != NULL, FALSE);
|
|
|
|
if (_ostree_repo_remote_name_is_file (name))
|
|
{
|
|
url = g_strdup (name);
|
|
}
|
|
else
|
|
{
|
|
if (!ostree_repo_get_remote_option (self, name, "url", NULL, &url, error))
|
|
goto out;
|
|
|
|
if (url == NULL)
|
|
{
|
|
g_set_error (error, G_IO_ERROR, G_IO_ERROR_NOT_FOUND,
|
|
"No \"url\" option in remote \"%s\"", name);
|
|
goto out;
|
|
}
|
|
}
|
|
|
|
if (out_url != NULL)
|
|
*out_url = g_steal_pointer (&url);
|
|
|
|
ret = TRUE;
|
|
|
|
out:
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_remote_get_gpg_verify:
|
|
* @self: Repo
|
|
* @name: Name of remote
|
|
* @out_gpg_verify: (out) (allow-none): Remote's GPG option
|
|
* @error: Error
|
|
*
|
|
* Return whether GPG verification is enabled for the remote named @name
|
|
* through @out_gpg_verify. It is an error if the provided remote does
|
|
* not exist.
|
|
*
|
|
* Returns: %TRUE on success, %FALSE on failure
|
|
*/
|
|
gboolean
|
|
ostree_repo_remote_get_gpg_verify (OstreeRepo *self,
|
|
const char *name,
|
|
gboolean *out_gpg_verify,
|
|
GError **error)
|
|
{
|
|
g_return_val_if_fail (OSTREE_IS_REPO (self), FALSE);
|
|
g_return_val_if_fail (name != NULL, FALSE);
|
|
|
|
/* For compatibility with pull-local, don't GPG verify file:// URIs. */
|
|
if (_ostree_repo_remote_name_is_file (name))
|
|
{
|
|
if (out_gpg_verify != NULL)
|
|
*out_gpg_verify = FALSE;
|
|
return TRUE;
|
|
}
|
|
|
|
return ostree_repo_get_remote_boolean_option (self, name, "gpg-verify",
|
|
TRUE, out_gpg_verify, error);
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_remote_get_gpg_verify_summary:
|
|
* @self: Repo
|
|
* @name: Name of remote
|
|
* @out_gpg_verify_summary: (out) (allow-none): Remote's GPG option
|
|
* @error: Error
|
|
*
|
|
* Return whether GPG verification of the summary is enabled for the remote
|
|
* named @name through @out_gpg_verify_summary. It is an error if the provided
|
|
* remote does not exist.
|
|
*
|
|
* Returns: %TRUE on success, %FALSE on failure
|
|
*/
|
|
gboolean
|
|
ostree_repo_remote_get_gpg_verify_summary (OstreeRepo *self,
|
|
const char *name,
|
|
gboolean *out_gpg_verify_summary,
|
|
GError **error)
|
|
{
|
|
return ostree_repo_get_remote_boolean_option (self, name, "gpg-verify-summary",
|
|
FALSE, out_gpg_verify_summary, error);
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_remote_gpg_import:
|
|
* @self: Self
|
|
* @name: name of a remote
|
|
* @source_stream: (allow-none): a #GInputStream, or %NULL
|
|
* @key_ids: (array zero-terminated=1) (element-type utf8) (allow-none): a %NULL-terminated array of GPG key IDs, or %NULL
|
|
* @out_imported: (allow-none): return location for the number of imported
|
|
* keys, or %NULL
|
|
* @cancellable: a #GCancellable
|
|
* @error: a #GError
|
|
*
|
|
* Imports one or more GPG keys from the open @source_stream, or from the
|
|
* user's personal keyring if @source_stream is %NULL. The @key_ids array
|
|
* can optionally restrict which keys are imported. If @key_ids is %NULL,
|
|
* then all keys are imported.
|
|
*
|
|
* The imported keys will be used to conduct GPG verification when pulling
|
|
* from the remote named @name.
|
|
*
|
|
* Returns: %TRUE on success, %FALSE on failure
|
|
*/
|
|
gboolean
|
|
ostree_repo_remote_gpg_import (OstreeRepo *self,
|
|
const char *name,
|
|
GInputStream *source_stream,
|
|
const char * const *key_ids,
|
|
guint *out_imported,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
OstreeRemote *remote;
|
|
gpgme_ctx_t source_context = NULL;
|
|
gpgme_ctx_t target_context = NULL;
|
|
gpgme_data_t data_buffer = NULL;
|
|
gpgme_import_result_t import_result;
|
|
gpgme_import_status_t import_status;
|
|
const char *tmp_dir = NULL;
|
|
g_autofree char *source_tmp_dir = NULL;
|
|
g_autofree char *target_tmp_dir = NULL;
|
|
glnx_fd_close int target_temp_fd = -1;
|
|
g_autoptr(GPtrArray) keys = NULL;
|
|
struct stat stbuf;
|
|
gpgme_error_t gpg_error;
|
|
gboolean ret = FALSE;
|
|
|
|
g_return_val_if_fail (OSTREE_IS_REPO (self), FALSE);
|
|
g_return_val_if_fail (name != NULL, FALSE);
|
|
|
|
/* First make sure the remote name is valid. */
|
|
|
|
remote = ost_repo_get_remote_inherited (self, name, error);
|
|
if (remote == NULL)
|
|
goto out;
|
|
|
|
/* Use OstreeRepo's "tmp" directory so the keyring files remain
|
|
* under one mount point. Necessary for renameat() below. */
|
|
|
|
/* XXX This produces a path under "/proc/self/fd/" which won't
|
|
* work in a child process so I had to resort to the GFile.
|
|
* I was trying to avoid the GFile so we can get rid of it.
|
|
*
|
|
* tmp_dir = glnx_fdrel_abspath (self->repo_dir_fd, "tmp");
|
|
*/
|
|
tmp_dir = gs_file_get_path_cached (self->tmp_dir);
|
|
|
|
/* Prepare the source GPGME context. If reading GPG keys from an input
|
|
* stream, point the OpenPGP engine at a temporary directory and import
|
|
* the keys to a new pubring.gpg file. If the key data format is ASCII
|
|
* armored, this step will convert them to binary. */
|
|
|
|
gpg_error = gpgme_new (&source_context);
|
|
if (gpg_error != GPG_ERR_NO_ERROR)
|
|
{
|
|
ot_gpgme_error_to_gio_error (gpg_error, error);
|
|
g_prefix_error (error, "Unable to create context: ");
|
|
goto out;
|
|
}
|
|
|
|
if (source_stream != NULL)
|
|
{
|
|
data_buffer = ot_gpgme_data_input (source_stream);
|
|
|
|
if (!ot_gpgme_ctx_tmp_home_dir (source_context, tmp_dir, &source_tmp_dir,
|
|
NULL, cancellable, error))
|
|
{
|
|
g_prefix_error (error, "Unable to configure context: ");
|
|
goto out;
|
|
}
|
|
|
|
gpg_error = gpgme_op_import (source_context, data_buffer);
|
|
if (gpg_error != GPG_ERR_NO_ERROR)
|
|
{
|
|
ot_gpgme_error_to_gio_error (gpg_error, error);
|
|
g_prefix_error (error, "Unable to import keys: ");
|
|
goto out;
|
|
}
|
|
|
|
g_clear_pointer (&data_buffer, (GDestroyNotify) gpgme_data_release);
|
|
}
|
|
|
|
/* Retrieve all keys or specific keys from the source GPGME context.
|
|
* Assemble a NULL-terminated array of gpgme_key_t structs to import. */
|
|
|
|
/* The keys array will contain a NULL terminator, but it turns out,
|
|
* although not documented, gpgme_key_unref() gracefully handles it. */
|
|
keys = g_ptr_array_new_with_free_func ((GDestroyNotify) gpgme_key_unref);
|
|
|
|
if (key_ids != NULL)
|
|
{
|
|
guint ii;
|
|
|
|
for (ii = 0; key_ids[ii] != NULL; ii++)
|
|
{
|
|
gpgme_key_t key = NULL;
|
|
|
|
gpg_error = gpgme_get_key (source_context, key_ids[ii], &key, 0);
|
|
if (gpg_error != GPG_ERR_NO_ERROR)
|
|
{
|
|
ot_gpgme_error_to_gio_error (gpg_error, error);
|
|
g_prefix_error (error, "Unable to find key \"%s\": ", key_ids[ii]);
|
|
goto out;
|
|
}
|
|
|
|
/* Transfer ownership. */
|
|
g_ptr_array_add (keys, key);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
gpg_error = gpgme_op_keylist_start (source_context, NULL, 0);
|
|
|
|
while (gpg_error == GPG_ERR_NO_ERROR)
|
|
{
|
|
gpgme_key_t key = NULL;
|
|
|
|
gpg_error = gpgme_op_keylist_next (source_context, &key);
|
|
|
|
if (gpg_error != GPG_ERR_NO_ERROR)
|
|
break;
|
|
|
|
/* Transfer ownership. */
|
|
g_ptr_array_add (keys, key);
|
|
}
|
|
|
|
if (gpgme_err_code (gpg_error) != GPG_ERR_EOF)
|
|
{
|
|
ot_gpgme_error_to_gio_error (gpg_error, error);
|
|
g_prefix_error (error, "Unable to list keys: ");
|
|
goto out;
|
|
}
|
|
}
|
|
|
|
/* Add the NULL terminator. */
|
|
g_ptr_array_add (keys, NULL);
|
|
|
|
/* Prepare the target GPGME context to serve as the import destination.
|
|
* Here the pubring.gpg file in a second temporary directory is a copy
|
|
* of the remote's keyring file. We'll let the import operation alter
|
|
* the pubring.gpg file, then rename it back to its permanent home. */
|
|
|
|
gpg_error = gpgme_new (&target_context);
|
|
if (gpg_error != GPG_ERR_NO_ERROR)
|
|
{
|
|
ot_gpgme_error_to_gio_error (gpg_error, error);
|
|
g_prefix_error (error, "Unable to create context: ");
|
|
goto out;
|
|
}
|
|
|
|
/* No need for an output stream since we copy in a pubring.gpg. */
|
|
if (!ot_gpgme_ctx_tmp_home_dir (target_context, tmp_dir, &target_tmp_dir,
|
|
NULL, cancellable, error))
|
|
{
|
|
g_prefix_error (error, "Unable to configure context: ");
|
|
goto out;
|
|
}
|
|
|
|
if (!glnx_opendirat (AT_FDCWD, target_tmp_dir, FALSE, &target_temp_fd, error))
|
|
{
|
|
g_prefix_error (error, "Unable to open directory: ");
|
|
goto out;
|
|
}
|
|
|
|
if (fstatat (self->repo_dir_fd, remote->keyring, &stbuf, AT_SYMLINK_NOFOLLOW) == 0)
|
|
{
|
|
if (!glnx_file_copy_at (self->repo_dir_fd, remote->keyring,
|
|
&stbuf, target_temp_fd, "pubring.gpg", 0,
|
|
cancellable, error))
|
|
{
|
|
g_prefix_error (error, "Unable to copy remote's keyring: ");
|
|
goto out;
|
|
}
|
|
}
|
|
else if (errno == ENOENT)
|
|
{
|
|
glnx_fd_close int fd = -1;
|
|
|
|
/* Create an empty pubring.gpg file prior to importing keys. This
|
|
* prevents gpg2 from creating a pubring.kbx file in the new keybox
|
|
* format [1]. We want to stay with the older keyring format since
|
|
* its performance issues are not relevant here.
|
|
*
|
|
* [1] https://gnupg.org/faq/whats-new-in-2.1.html#keybox
|
|
*/
|
|
fd = openat (target_temp_fd, "pubring.gpg",
|
|
O_WRONLY | O_CREAT | O_CLOEXEC | O_NOCTTY, 0644);
|
|
if (fd == -1)
|
|
{
|
|
glnx_set_prefix_error_from_errno (error, "%s", "Unable to create pubring.gpg");
|
|
goto out;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
glnx_set_prefix_error_from_errno (error, "%s", "Unable to copy remote's keyring");
|
|
goto out;
|
|
}
|
|
|
|
/* Export the selected keys from the source context and import them into
|
|
* the target context. */
|
|
|
|
gpg_error = gpgme_data_new (&data_buffer);
|
|
if (gpg_error != GPG_ERR_NO_ERROR)
|
|
{
|
|
ot_gpgme_error_to_gio_error (gpg_error, error);
|
|
g_prefix_error (error, "Unable to create data buffer: ");
|
|
goto out;
|
|
}
|
|
|
|
gpg_error = gpgme_op_export_keys (source_context,
|
|
(gpgme_key_t *) keys->pdata, 0,
|
|
data_buffer);
|
|
if (gpg_error != GPG_ERR_NO_ERROR)
|
|
{
|
|
ot_gpgme_error_to_gio_error (gpg_error, error);
|
|
g_prefix_error (error, "Unable to export keys: ");
|
|
goto out;
|
|
}
|
|
|
|
(void) gpgme_data_seek (data_buffer, 0, SEEK_SET);
|
|
|
|
gpg_error = gpgme_op_import (target_context, data_buffer);
|
|
if (gpg_error != GPG_ERR_NO_ERROR)
|
|
{
|
|
ot_gpgme_error_to_gio_error (gpg_error, error);
|
|
g_prefix_error (error, "Unable to import keys: ");
|
|
goto out;
|
|
}
|
|
|
|
import_result = gpgme_op_import_result (target_context);
|
|
g_return_val_if_fail (import_result != NULL, FALSE);
|
|
|
|
/* Check the status of each import and fail on the first error.
|
|
* All imports must be successful to update the remote's keyring. */
|
|
for (import_status = import_result->imports;
|
|
import_status != NULL;
|
|
import_status = import_status->next)
|
|
{
|
|
if (import_status->result != GPG_ERR_NO_ERROR)
|
|
{
|
|
ot_gpgme_error_to_gio_error (gpg_error, error);
|
|
g_prefix_error (error, "Unable to import key \"%s\": ",
|
|
import_status->fpr);
|
|
goto out;
|
|
}
|
|
}
|
|
|
|
/* Import successful; replace the remote's old keyring with the
|
|
* updated keyring in the target context's temporary directory. */
|
|
|
|
if (renameat (target_temp_fd, "pubring.gpg",
|
|
self->repo_dir_fd, remote->keyring) == -1)
|
|
{
|
|
glnx_set_prefix_error_from_errno (error, "%s", "Unable to rename keyring");
|
|
goto out;
|
|
}
|
|
|
|
if (out_imported != NULL)
|
|
*out_imported = (guint) import_result->imported;
|
|
|
|
ret = TRUE;
|
|
|
|
out:
|
|
if (remote != NULL)
|
|
ost_remote_unref (remote);
|
|
|
|
if (source_tmp_dir != NULL)
|
|
(void) glnx_shutil_rm_rf_at (AT_FDCWD, source_tmp_dir, NULL, NULL);
|
|
|
|
if (target_tmp_dir != NULL)
|
|
(void) glnx_shutil_rm_rf_at (AT_FDCWD, target_tmp_dir, NULL, NULL);
|
|
|
|
if (source_context != NULL)
|
|
gpgme_release (source_context);
|
|
|
|
if (target_context != NULL)
|
|
gpgme_release (target_context);
|
|
|
|
if (data_buffer != NULL)
|
|
gpgme_data_release (data_buffer);
|
|
|
|
g_prefix_error (error, "GPG: ");
|
|
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_remote_fetch_summary:
|
|
* @self: Self
|
|
* @name: name of a remote
|
|
* @out_summary: (nullable): return location for raw summary data, or %NULL
|
|
* @out_signatures: (nullable): return location for raw summary signature
|
|
* data, or %NULL
|
|
* @cancellable: a #GCancellable
|
|
* @error: a #GError
|
|
*
|
|
* Tries to fetch the summary file and any GPG signatures on the summary file
|
|
* over HTTP, and returns the binary data in @out_summary and @out_signatures
|
|
* respectively.
|
|
*
|
|
* If no summary file exists on the remote server, @out_summary is set to
|
|
* @NULL. Likewise if the summary file is not signed, @out_signatures is
|
|
* set to @NULL. In either case the function still returns %TRUE.
|
|
*
|
|
* Parse the summary data into a #GVariant using g_variant_new_from_bytes()
|
|
* with #OSTREE_SUMMARY_GVARIANT_FORMAT as the format string.
|
|
*
|
|
* Returns: %TRUE on success, %FALSE on failure
|
|
*/
|
|
gboolean
|
|
ostree_repo_remote_fetch_summary (OstreeRepo *self,
|
|
const char *name,
|
|
GBytes **out_summary,
|
|
GBytes **out_signatures,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
return ostree_repo_remote_fetch_summary_with_options (self,
|
|
name,
|
|
NULL,
|
|
out_summary,
|
|
out_signatures,
|
|
cancellable,
|
|
error);
|
|
}
|
|
|
|
static gboolean
|
|
ostree_repo_mode_to_string (OstreeRepoMode mode,
|
|
const char **out_mode,
|
|
GError **error)
|
|
{
|
|
gboolean ret = FALSE;
|
|
const char *ret_mode;
|
|
|
|
switch (mode)
|
|
{
|
|
case OSTREE_REPO_MODE_BARE:
|
|
ret_mode = "bare";
|
|
break;
|
|
case OSTREE_REPO_MODE_BARE_USER:
|
|
ret_mode = "bare-user";
|
|
break;
|
|
case OSTREE_REPO_MODE_ARCHIVE_Z2:
|
|
ret_mode ="archive-z2";
|
|
break;
|
|
default:
|
|
g_set_error (error, G_IO_ERROR, G_IO_ERROR_FAILED,
|
|
"Invalid mode '%d'", mode);
|
|
goto out;
|
|
}
|
|
|
|
ret = TRUE;
|
|
*out_mode = ret_mode;
|
|
out:
|
|
return ret;
|
|
}
|
|
|
|
gboolean
|
|
ostree_repo_mode_from_string (const char *mode,
|
|
OstreeRepoMode *out_mode,
|
|
GError **error)
|
|
{
|
|
gboolean ret = FALSE;
|
|
OstreeRepoMode ret_mode;
|
|
|
|
if (strcmp (mode, "bare") == 0)
|
|
ret_mode = OSTREE_REPO_MODE_BARE;
|
|
else if (strcmp (mode, "bare-user") == 0)
|
|
ret_mode = OSTREE_REPO_MODE_BARE_USER;
|
|
else if (strcmp (mode, "archive-z2") == 0 ||
|
|
strcmp (mode, "archive") == 0)
|
|
ret_mode = OSTREE_REPO_MODE_ARCHIVE_Z2;
|
|
else
|
|
{
|
|
g_set_error (error, G_IO_ERROR, G_IO_ERROR_FAILED,
|
|
"Invalid mode '%s' in repository configuration", mode);
|
|
goto out;
|
|
}
|
|
|
|
ret = TRUE;
|
|
*out_mode = ret_mode;
|
|
out:
|
|
return ret;
|
|
}
|
|
|
|
#define DEFAULT_CONFIG_CONTENTS ("[core]\n" \
|
|
"repo_version=1\n")
|
|
|
|
/**
|
|
* ostree_repo_create:
|
|
* @self: An #OstreeRepo
|
|
* @mode: The mode to store the repository in
|
|
* @cancellable: Cancellable
|
|
* @error: Error
|
|
*
|
|
* Create the underlying structure on disk for the
|
|
* repository.
|
|
*/
|
|
gboolean
|
|
ostree_repo_create (OstreeRepo *self,
|
|
OstreeRepoMode mode,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
gboolean ret = FALSE;
|
|
GString *config_data = NULL;
|
|
g_autoptr(GFile) child = NULL;
|
|
g_autoptr(GFile) grandchild = NULL;
|
|
const char *mode_str;
|
|
|
|
if (!ostree_repo_mode_to_string (mode, &mode_str, error))
|
|
goto out;
|
|
|
|
if (mkdir (gs_file_get_path_cached (self->repodir), 0755) != 0)
|
|
{
|
|
if (errno != EEXIST)
|
|
{
|
|
glnx_set_error_from_errno (error);
|
|
goto out;
|
|
}
|
|
}
|
|
|
|
config_data = g_string_new (DEFAULT_CONFIG_CONTENTS);
|
|
g_string_append_printf (config_data, "mode=%s\n", mode_str);
|
|
|
|
if (!g_file_replace_contents (self->config_file,
|
|
config_data->str,
|
|
config_data->len,
|
|
NULL, FALSE, 0, NULL,
|
|
cancellable, error))
|
|
goto out;
|
|
|
|
if (!g_file_make_directory (self->objects_dir, cancellable, error))
|
|
goto out;
|
|
|
|
if (!g_file_make_directory (self->tmp_dir, cancellable, error))
|
|
goto out;
|
|
|
|
{
|
|
g_autoptr(GFile) extensions_dir =
|
|
g_file_resolve_relative_path (self->repodir, "extensions");
|
|
if (!g_file_make_directory (extensions_dir, cancellable, error))
|
|
goto out;
|
|
}
|
|
|
|
g_clear_object (&child);
|
|
child = g_file_get_child (self->repodir, "refs");
|
|
if (!g_file_make_directory (child, cancellable, error))
|
|
goto out;
|
|
|
|
g_clear_object (&grandchild);
|
|
grandchild = g_file_get_child (child, "heads");
|
|
if (!g_file_make_directory (grandchild, cancellable, error))
|
|
goto out;
|
|
|
|
g_clear_object (&grandchild);
|
|
grandchild = g_file_get_child (child, "remotes");
|
|
if (!g_file_make_directory (grandchild, cancellable, error))
|
|
goto out;
|
|
|
|
g_clear_object (&child);
|
|
child = g_file_get_child (self->repodir, "state");
|
|
if (!g_file_make_directory (child, cancellable, error))
|
|
goto out;
|
|
|
|
if (!ostree_repo_open (self, cancellable, error))
|
|
goto out;
|
|
|
|
ret = TRUE;
|
|
|
|
out:
|
|
if (config_data)
|
|
g_string_free (config_data, TRUE);
|
|
return ret;
|
|
}
|
|
|
|
static gboolean
|
|
enumerate_directory_allow_noent (GFile *dirpath,
|
|
const char *queryargs,
|
|
GFileQueryInfoFlags queryflags,
|
|
GFileEnumerator **out_direnum,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
gboolean ret = FALSE;
|
|
GError *temp_error = NULL;
|
|
g_autoptr(GFileEnumerator) ret_direnum = NULL;
|
|
|
|
ret_direnum = g_file_enumerate_children (dirpath, queryargs, queryflags,
|
|
cancellable, &temp_error);
|
|
if (!ret_direnum)
|
|
{
|
|
if (g_error_matches (temp_error, G_IO_ERROR, G_IO_ERROR_NOT_FOUND))
|
|
{
|
|
g_clear_error (&temp_error);
|
|
ret = TRUE;
|
|
}
|
|
else
|
|
g_propagate_error (error, temp_error);
|
|
|
|
goto out;
|
|
}
|
|
|
|
ret = TRUE;
|
|
if (out_direnum)
|
|
*out_direnum = g_steal_pointer (&ret_direnum);
|
|
out:
|
|
return ret;
|
|
}
|
|
|
|
static gboolean
|
|
add_remotes_from_keyfile (OstreeRepo *self,
|
|
GKeyFile *keyfile,
|
|
GFile *file,
|
|
GError **error)
|
|
{
|
|
GQueue queue = G_QUEUE_INIT;
|
|
g_auto(GStrv) groups = NULL;
|
|
gsize length, ii;
|
|
gboolean ret = FALSE;
|
|
|
|
g_mutex_lock (&self->remotes_lock);
|
|
|
|
groups = g_key_file_get_groups (keyfile, &length);
|
|
|
|
for (ii = 0; ii < length; ii++)
|
|
{
|
|
OstreeRemote *remote;
|
|
|
|
remote = ost_remote_new_from_keyfile (keyfile, groups[ii]);
|
|
|
|
if (remote != NULL)
|
|
{
|
|
/* Make sure all the remotes in the key file are
|
|
* acceptable before adding any to the OstreeRepo. */
|
|
g_queue_push_tail (&queue, remote);
|
|
|
|
if (g_hash_table_contains (self->remotes, remote->name))
|
|
{
|
|
g_set_error (error, G_IO_ERROR, G_IO_ERROR_FAILED,
|
|
"Multiple specifications found for remote \"%s\"",
|
|
remote->name);
|
|
goto out;
|
|
}
|
|
|
|
if (file != NULL)
|
|
remote->file = g_object_ref (file);
|
|
}
|
|
}
|
|
|
|
while (!g_queue_is_empty (&queue))
|
|
{
|
|
OstreeRemote *remote = g_queue_pop_head (&queue);
|
|
g_hash_table_replace (self->remotes, remote->name, remote);
|
|
}
|
|
|
|
ret = TRUE;
|
|
|
|
out:
|
|
while (!g_queue_is_empty (&queue))
|
|
ost_remote_unref (g_queue_pop_head (&queue));
|
|
|
|
g_mutex_unlock (&self->remotes_lock);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static gboolean
|
|
append_one_remote_config (OstreeRepo *self,
|
|
GFile *path,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
gboolean ret = FALSE;
|
|
local_cleanup_keyfile GKeyFile *remotedata = g_key_file_new ();
|
|
|
|
if (!g_key_file_load_from_file (remotedata, gs_file_get_path_cached (path),
|
|
0, error))
|
|
goto out;
|
|
|
|
ret = add_remotes_from_keyfile (self, remotedata, path, error);
|
|
|
|
out:
|
|
return ret;
|
|
}
|
|
|
|
static GFile *
|
|
get_remotes_d_dir (OstreeRepo *self)
|
|
{
|
|
if (self->remotes_config_dir != NULL)
|
|
return g_file_resolve_relative_path (self->sysroot_dir, self->remotes_config_dir);
|
|
else if (ostree_repo_is_system (self))
|
|
return g_file_resolve_relative_path (self->sysroot_dir, SYSCONF_REMOTES);
|
|
|
|
return NULL;
|
|
}
|
|
|
|
static gboolean
|
|
append_remotes_d (OstreeRepo *self,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
gboolean ret = FALSE;
|
|
g_autoptr(GFile) remotes_d = NULL;
|
|
g_autoptr(GFileEnumerator) direnum = NULL;
|
|
|
|
remotes_d = get_remotes_d_dir (self);
|
|
if (remotes_d == NULL)
|
|
return TRUE;
|
|
|
|
if (!enumerate_directory_allow_noent (remotes_d, OSTREE_GIO_FAST_QUERYINFO, 0,
|
|
&direnum,
|
|
cancellable, error))
|
|
goto out;
|
|
if (direnum)
|
|
{
|
|
while (TRUE)
|
|
{
|
|
GFileInfo *file_info;
|
|
GFile *path;
|
|
const char *name;
|
|
guint32 type;
|
|
|
|
if (!g_file_enumerator_iterate (direnum, &file_info, &path,
|
|
NULL, error))
|
|
goto out;
|
|
if (file_info == NULL)
|
|
break;
|
|
|
|
name = g_file_info_get_attribute_byte_string (file_info, "standard::name");
|
|
type = g_file_info_get_attribute_uint32 (file_info, "standard::type");
|
|
|
|
if (type == G_FILE_TYPE_REGULAR &&
|
|
g_str_has_suffix (name, ".conf"))
|
|
{
|
|
if (!append_one_remote_config (self, path, cancellable, error))
|
|
goto out;
|
|
}
|
|
}
|
|
}
|
|
|
|
ret = TRUE;
|
|
out:
|
|
return ret;
|
|
}
|
|
|
|
gboolean
|
|
ostree_repo_open (OstreeRepo *self,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
gboolean ret = FALSE;
|
|
gboolean is_archive;
|
|
struct stat stbuf;
|
|
g_autofree char *version = NULL;
|
|
g_autofree char *mode = NULL;
|
|
g_autofree char *parent_repo_path = NULL;
|
|
|
|
g_return_val_if_fail (error == NULL || *error == NULL, FALSE);
|
|
|
|
if (self->inited)
|
|
return TRUE;
|
|
|
|
/* We use a directory of the form `staging-${BOOT_ID}-${RANDOM}`
|
|
* where if the ${BOOT_ID} doesn't match, we know file contents
|
|
* possibly haven't been sync'd to disk and need to be discarded.
|
|
*/
|
|
{ const char *env_bootid = getenv ("OSTREE_BOOTID");
|
|
g_autofree char *boot_id = NULL;
|
|
|
|
if (env_bootid != NULL)
|
|
boot_id = g_strdup (env_bootid);
|
|
else
|
|
{
|
|
if (!g_file_get_contents ("/proc/sys/kernel/random/boot_id",
|
|
&boot_id,
|
|
NULL,
|
|
error))
|
|
goto out;
|
|
g_strdelimit (boot_id, "\n", '\0');
|
|
}
|
|
|
|
self->stagedir_prefix = g_strconcat (OSTREE_REPO_TMPDIR_STAGING, boot_id, "-", NULL);
|
|
}
|
|
|
|
if (!glnx_opendirat (AT_FDCWD, gs_file_get_path_cached (self->repodir), TRUE,
|
|
&self->repo_dir_fd, error))
|
|
{
|
|
g_prefix_error (error, "%s: ", gs_file_get_path_cached (self->repodir));
|
|
goto out;
|
|
}
|
|
|
|
if (!glnx_opendirat (self->repo_dir_fd, "objects", TRUE,
|
|
&self->objects_dir_fd, error))
|
|
{
|
|
g_prefix_error (error, "Opening objects/ directory: ");
|
|
goto out;
|
|
}
|
|
|
|
self->writable = faccessat (self->objects_dir_fd, ".", W_OK, 0) == 0;
|
|
if (!self->writable)
|
|
{
|
|
/* This is returned through ostree_repo_is_writable(). */
|
|
glnx_set_error_from_errno (&self->writable_error);
|
|
}
|
|
|
|
if (fstat (self->objects_dir_fd, &stbuf) != 0)
|
|
{
|
|
glnx_set_error_from_errno (error);
|
|
goto out;
|
|
}
|
|
|
|
if (stbuf.st_uid != getuid () || stbuf.st_gid != getgid ())
|
|
{
|
|
self->target_owner_uid = stbuf.st_uid;
|
|
self->target_owner_gid = stbuf.st_gid;
|
|
}
|
|
else
|
|
{
|
|
self->target_owner_uid = self->target_owner_gid = -1;
|
|
}
|
|
|
|
self->config = g_key_file_new ();
|
|
if (!g_key_file_load_from_file (self->config, gs_file_get_path_cached (self->config_file), 0, error))
|
|
{
|
|
g_prefix_error (error, "Couldn't parse config file: ");
|
|
goto out;
|
|
}
|
|
if (!add_remotes_from_keyfile (self, self->config, NULL, error))
|
|
goto out;
|
|
|
|
version = g_key_file_get_value (self->config, "core", "repo_version", error);
|
|
if (!version)
|
|
goto out;
|
|
|
|
if (strcmp (version, "1") != 0)
|
|
{
|
|
g_set_error (error, G_IO_ERROR, G_IO_ERROR_FAILED,
|
|
"Invalid repository version '%s'", version);
|
|
goto out;
|
|
}
|
|
|
|
if (!ot_keyfile_get_boolean_with_default (self->config, "core", "archive",
|
|
FALSE, &is_archive, error))
|
|
goto out;
|
|
if (is_archive)
|
|
{
|
|
g_set_error (error, G_IO_ERROR, G_IO_ERROR_NOT_SUPPORTED,
|
|
"This version of OSTree no longer supports \"archive\" repositories; use archive-z2 instead");
|
|
goto out;
|
|
}
|
|
|
|
if (!ot_keyfile_get_value_with_default (self->config, "core", "mode",
|
|
"bare", &mode, error))
|
|
goto out;
|
|
if (!ostree_repo_mode_from_string (mode, &self->mode, error))
|
|
goto out;
|
|
|
|
if (!ot_keyfile_get_value_with_default (self->config, "core", "parent",
|
|
NULL, &parent_repo_path, error))
|
|
goto out;
|
|
|
|
if (parent_repo_path && parent_repo_path[0])
|
|
{
|
|
g_autoptr(GFile) parent_repo_f = g_file_new_for_path (parent_repo_path);
|
|
|
|
self->parent_repo = ostree_repo_new (parent_repo_f);
|
|
|
|
if (!ostree_repo_open (self->parent_repo, cancellable, error))
|
|
{
|
|
g_prefix_error (error, "While checking parent repository '%s': ",
|
|
gs_file_get_path_cached (parent_repo_f));
|
|
goto out;
|
|
}
|
|
}
|
|
|
|
if (self->writable)
|
|
{
|
|
if (!ot_keyfile_get_boolean_with_default (self->config, "core", "enable-uncompressed-cache",
|
|
TRUE, &self->enable_uncompressed_cache, error))
|
|
goto out;
|
|
}
|
|
else
|
|
self->enable_uncompressed_cache = FALSE;
|
|
|
|
{
|
|
gboolean do_fsync;
|
|
|
|
if (!ot_keyfile_get_boolean_with_default (self->config, "core", "fsync",
|
|
TRUE, &do_fsync, error))
|
|
goto out;
|
|
|
|
if (!do_fsync)
|
|
ostree_repo_set_disable_fsync (self, TRUE);
|
|
}
|
|
|
|
{ g_autofree char *tmp_expiry_seconds = NULL;
|
|
|
|
/* 86400 secs = one day */
|
|
if (!ot_keyfile_get_value_with_default (self->config, "core", "tmp-expiry-secs", "86400",
|
|
&tmp_expiry_seconds, error))
|
|
goto out;
|
|
|
|
self->tmp_expiry_seconds = g_ascii_strtoull (tmp_expiry_seconds, NULL, 10);
|
|
}
|
|
|
|
if (!append_remotes_d (self, cancellable, error))
|
|
goto out;
|
|
|
|
if (!glnx_opendirat (self->repo_dir_fd, "tmp", TRUE, &self->tmp_dir_fd, error))
|
|
goto out;
|
|
|
|
if (self->writable)
|
|
{
|
|
if (!glnx_shutil_mkdir_p_at (self->tmp_dir_fd, _OSTREE_CACHE_DIR, 0775, cancellable, error))
|
|
goto out;
|
|
|
|
if (!glnx_opendirat (self->tmp_dir_fd, _OSTREE_CACHE_DIR, TRUE, &self->cache_dir_fd, error))
|
|
goto out;
|
|
}
|
|
|
|
if (self->mode == OSTREE_REPO_MODE_ARCHIVE_Z2 && self->enable_uncompressed_cache)
|
|
{
|
|
if (!glnx_shutil_mkdir_p_at (self->repo_dir_fd, "uncompressed-objects-cache", 0755,
|
|
cancellable, error))
|
|
goto out;
|
|
if (!glnx_opendirat (self->repo_dir_fd, "uncompressed-objects-cache", TRUE,
|
|
&self->uncompressed_objects_dir_fd,
|
|
error))
|
|
goto out;
|
|
}
|
|
|
|
self->inited = TRUE;
|
|
|
|
ret = TRUE;
|
|
out:
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_set_disable_fsync:
|
|
* @self: An #OstreeRepo
|
|
* @disable_fsync: If %TRUE, do not fsync
|
|
*
|
|
* Disable requests to fsync() to stable storage during commits. This
|
|
* option should only be used by build system tools which are creating
|
|
* disposable virtual machines, or have higher level mechanisms for
|
|
* ensuring data consistency.
|
|
*/
|
|
void
|
|
ostree_repo_set_disable_fsync (OstreeRepo *self,
|
|
gboolean disable_fsync)
|
|
{
|
|
self->disable_fsync = disable_fsync;
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_set_cache_dir:
|
|
* @self: An #OstreeRepo
|
|
* @dfd: directory fd
|
|
* @path: subpath in @dfd
|
|
* @cancellable: a #GCancellable
|
|
* @error: a #GError
|
|
*
|
|
* Set a custom location for the cache directory used for e.g.
|
|
* per-remote summary caches. Setting this manually is useful when
|
|
* doing operations on a system repo as a user because you don't have
|
|
* write permissions in the repo, where the cache is normally stored.
|
|
*/
|
|
gboolean
|
|
ostree_repo_set_cache_dir (OstreeRepo *self,
|
|
int dfd,
|
|
const char *path,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
int fd;
|
|
|
|
if (!glnx_opendirat (dfd, path, TRUE, &fd, error))
|
|
return FALSE;
|
|
|
|
if (self->cache_dir_fd != -1)
|
|
close (self->cache_dir_fd);
|
|
self->cache_dir_fd = fd;
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_get_disable_fsync:
|
|
* @self: An #OstreeRepo
|
|
*
|
|
* For more information see ostree_repo_set_disable_fsync().
|
|
*
|
|
* Returns: Whether or not fsync() is enabled for this repo.
|
|
*/
|
|
gboolean
|
|
ostree_repo_get_disable_fsync (OstreeRepo *self)
|
|
{
|
|
return self->disable_fsync;
|
|
}
|
|
|
|
/* Replace the contents of a file, honoring the repository's fsync
|
|
* policy.
|
|
*/
|
|
gboolean
|
|
_ostree_repo_file_replace_contents (OstreeRepo *self,
|
|
int dfd,
|
|
const char *path,
|
|
const guint8 *buf,
|
|
gsize len,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
return glnx_file_replace_contents_at (dfd, path, buf, len,
|
|
self->disable_fsync ? GLNX_FILE_REPLACE_NODATASYNC : GLNX_FILE_REPLACE_DATASYNC_NEW,
|
|
cancellable, error);
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_get_path:
|
|
* @self:
|
|
*
|
|
* Returns: (transfer none): Path to repo
|
|
*/
|
|
GFile *
|
|
ostree_repo_get_path (OstreeRepo *self)
|
|
{
|
|
return self->repodir;
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_get_dfd:
|
|
* @self: Repo
|
|
*
|
|
* In some cases it's useful for applications to access the repository
|
|
* directly; for example, writing content into `repo/tmp` ensures it's
|
|
* on the same filesystem. Another case is detecting the mtime on the
|
|
* repository (to see whether a ref was written).
|
|
*
|
|
* Returns: File descriptor for repository root - owned by @self
|
|
*/
|
|
int
|
|
ostree_repo_get_dfd (OstreeRepo *self)
|
|
{
|
|
g_return_val_if_fail (self->repo_dir_fd != -1, -1);
|
|
return self->repo_dir_fd;
|
|
}
|
|
|
|
OstreeRepoMode
|
|
ostree_repo_get_mode (OstreeRepo *self)
|
|
{
|
|
g_return_val_if_fail (self->inited, FALSE);
|
|
|
|
return self->mode;
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_get_parent:
|
|
* @self: Repo
|
|
*
|
|
* Before this function can be used, ostree_repo_init() must have been
|
|
* called.
|
|
*
|
|
* Returns: (transfer none): Parent repository, or %NULL if none
|
|
*/
|
|
OstreeRepo *
|
|
ostree_repo_get_parent (OstreeRepo *self)
|
|
{
|
|
return self->parent_repo;
|
|
}
|
|
|
|
static gboolean
|
|
list_loose_objects_at (OstreeRepo *self,
|
|
GHashTable *inout_objects,
|
|
const char *prefix,
|
|
int dfd,
|
|
const char *commit_starting_with,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
gboolean ret = FALSE;
|
|
DIR *d = NULL;
|
|
struct dirent *dent;
|
|
GVariant *key, *value;
|
|
|
|
d = fdopendir (dfd);
|
|
if (!d)
|
|
{
|
|
glnx_set_error_from_errno (error);
|
|
goto out;
|
|
}
|
|
|
|
while ((dent = readdir (d)) != NULL)
|
|
{
|
|
const char *name = dent->d_name;
|
|
const char *dot;
|
|
OstreeObjectType objtype;
|
|
char buf[65];
|
|
|
|
if (strcmp (name, ".") == 0 ||
|
|
strcmp (name, "..") == 0)
|
|
continue;
|
|
|
|
dot = strrchr (name, '.');
|
|
if (!dot)
|
|
continue;
|
|
|
|
if ((self->mode == OSTREE_REPO_MODE_ARCHIVE_Z2
|
|
&& strcmp (dot, ".filez") == 0) ||
|
|
((self->mode == OSTREE_REPO_MODE_BARE || self->mode == OSTREE_REPO_MODE_BARE_USER)
|
|
&& strcmp (dot, ".file") == 0))
|
|
objtype = OSTREE_OBJECT_TYPE_FILE;
|
|
else if (strcmp (dot, ".dirtree") == 0)
|
|
objtype = OSTREE_OBJECT_TYPE_DIR_TREE;
|
|
else if (strcmp (dot, ".dirmeta") == 0)
|
|
objtype = OSTREE_OBJECT_TYPE_DIR_META;
|
|
else if (strcmp (dot, ".commit") == 0)
|
|
objtype = OSTREE_OBJECT_TYPE_COMMIT;
|
|
else
|
|
continue;
|
|
|
|
if ((dot - name) != 62)
|
|
continue;
|
|
|
|
memcpy (buf, prefix, 2);
|
|
memcpy (buf + 2, name, 62);
|
|
buf[sizeof(buf)-1] = '\0';
|
|
|
|
/* if we passed in a "starting with" argument, then
|
|
we only want to return .commit objects with a checksum
|
|
that matches the commit_starting_with argument */
|
|
if (commit_starting_with)
|
|
{
|
|
/* object is not a commit, do not add to array */
|
|
if (objtype != OSTREE_OBJECT_TYPE_COMMIT)
|
|
continue;
|
|
|
|
/* commit checksum does not match "starting with", do not add to array */
|
|
if (!g_str_has_prefix (buf, commit_starting_with))
|
|
continue;
|
|
}
|
|
|
|
key = ostree_object_name_serialize (buf, objtype);
|
|
value = g_variant_new ("(b@as)",
|
|
TRUE, g_variant_new_strv (NULL, 0));
|
|
/* transfer ownership */
|
|
g_hash_table_replace (inout_objects, key,
|
|
g_variant_ref_sink (value));
|
|
}
|
|
|
|
ret = TRUE;
|
|
out:
|
|
if (d)
|
|
(void) closedir (d);
|
|
return ret;
|
|
}
|
|
|
|
static gboolean
|
|
list_loose_objects (OstreeRepo *self,
|
|
GHashTable *inout_objects,
|
|
const char *commit_starting_with,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
gboolean ret = FALSE;
|
|
guint c;
|
|
int dfd = -1;
|
|
static const gchar hexchars[] = "0123456789abcdef";
|
|
|
|
for (c = 0; c < 256; c++)
|
|
{
|
|
char buf[3];
|
|
buf[0] = hexchars[c >> 4];
|
|
buf[1] = hexchars[c & 0xF];
|
|
buf[2] = '\0';
|
|
dfd = ot_opendirat (self->objects_dir_fd, buf, FALSE);
|
|
if (dfd == -1)
|
|
{
|
|
if (errno == ENOENT)
|
|
continue;
|
|
else
|
|
{
|
|
glnx_set_error_from_errno (error);
|
|
goto out;
|
|
}
|
|
}
|
|
/* Takes ownership of dfd */
|
|
if (!list_loose_objects_at (self, inout_objects, buf, dfd,
|
|
commit_starting_with,
|
|
cancellable, error))
|
|
goto out;
|
|
}
|
|
|
|
ret = TRUE;
|
|
out:
|
|
return ret;
|
|
}
|
|
|
|
static gboolean
|
|
load_metadata_internal (OstreeRepo *self,
|
|
OstreeObjectType objtype,
|
|
const char *sha256,
|
|
gboolean error_if_not_found,
|
|
GVariant **out_variant,
|
|
GInputStream **out_stream,
|
|
guint64 *out_size,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
gboolean ret = FALSE;
|
|
char loose_path_buf[_OSTREE_LOOSE_PATH_MAX];
|
|
glnx_fd_close int fd = -1;
|
|
g_autoptr(GInputStream) ret_stream = NULL;
|
|
g_autoptr(GVariant) ret_variant = NULL;
|
|
|
|
g_return_val_if_fail (OSTREE_OBJECT_TYPE_IS_META (objtype), FALSE);
|
|
|
|
_ostree_loose_path (loose_path_buf, sha256, objtype, self->mode);
|
|
|
|
if (!ot_openat_ignore_enoent (self->objects_dir_fd, loose_path_buf, &fd,
|
|
error))
|
|
goto out;
|
|
|
|
if (fd < 0 && self->commit_stagedir_fd != -1)
|
|
{
|
|
if (!ot_openat_ignore_enoent (self->commit_stagedir_fd, loose_path_buf, &fd,
|
|
error))
|
|
goto out;
|
|
}
|
|
|
|
if (fd != -1)
|
|
{
|
|
if (out_variant)
|
|
{
|
|
GMappedFile *mfile;
|
|
|
|
mfile = g_mapped_file_new_from_fd (fd, FALSE, error);
|
|
if (!mfile)
|
|
goto out;
|
|
ret_variant = g_variant_new_from_data (ostree_metadata_variant_type (objtype),
|
|
g_mapped_file_get_contents (mfile),
|
|
g_mapped_file_get_length (mfile),
|
|
TRUE,
|
|
(GDestroyNotify) g_mapped_file_unref,
|
|
mfile);
|
|
g_variant_ref_sink (ret_variant);
|
|
|
|
if (out_size)
|
|
*out_size = g_variant_get_size (ret_variant);
|
|
}
|
|
else if (out_stream)
|
|
{
|
|
ret_stream = g_unix_input_stream_new (fd, TRUE);
|
|
if (!ret_stream)
|
|
goto out;
|
|
fd = -1; /* Transfer ownership */
|
|
if (out_size)
|
|
{
|
|
struct stat stbuf;
|
|
|
|
if (!glnx_stream_fstat ((GFileDescriptorBased*)ret_stream, &stbuf, error))
|
|
goto out;
|
|
*out_size = stbuf.st_size;
|
|
}
|
|
}
|
|
}
|
|
else if (self->parent_repo)
|
|
{
|
|
if (!ostree_repo_load_variant (self->parent_repo, objtype, sha256, &ret_variant, error))
|
|
goto out;
|
|
}
|
|
else if (error_if_not_found)
|
|
{
|
|
g_set_error (error, G_IO_ERROR, G_IO_ERROR_NOT_FOUND,
|
|
"No such metadata object %s.%s",
|
|
sha256, ostree_object_type_to_string (objtype));
|
|
goto out;
|
|
}
|
|
|
|
ret = TRUE;
|
|
ot_transfer_out_value (out_variant, &ret_variant);
|
|
ot_transfer_out_value (out_stream, &ret_stream);
|
|
out:
|
|
return ret;
|
|
}
|
|
|
|
static gboolean
|
|
query_info_for_bare_content_object (OstreeRepo *self,
|
|
const char *loose_path_buf,
|
|
GFileInfo **out_info,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
gboolean ret = FALSE;
|
|
struct stat stbuf;
|
|
int res;
|
|
g_autoptr(GFileInfo) ret_info = NULL;
|
|
|
|
do
|
|
res = fstatat (self->objects_dir_fd, loose_path_buf, &stbuf, AT_SYMLINK_NOFOLLOW);
|
|
while (G_UNLIKELY (res == -1 && errno == EINTR));
|
|
if (res == -1)
|
|
{
|
|
if (errno == ENOENT)
|
|
{
|
|
*out_info = NULL;
|
|
ret = TRUE;
|
|
goto out;
|
|
}
|
|
glnx_set_error_from_errno (error);
|
|
goto out;
|
|
}
|
|
|
|
ret_info = _ostree_header_gfile_info_new (stbuf.st_mode, stbuf.st_uid, stbuf.st_gid);
|
|
|
|
if (S_ISREG (stbuf.st_mode))
|
|
{
|
|
g_file_info_set_size (ret_info, stbuf.st_size);
|
|
}
|
|
else if (S_ISLNK (stbuf.st_mode))
|
|
{
|
|
if (!ot_readlinkat_gfile_info (self->objects_dir_fd, loose_path_buf,
|
|
ret_info, cancellable, error))
|
|
goto out;
|
|
}
|
|
else
|
|
{
|
|
g_set_error (error, G_IO_ERROR, G_IO_ERROR_FAILED,
|
|
"Not a regular file or symlink: %s", loose_path_buf);
|
|
goto out;
|
|
}
|
|
|
|
ret = TRUE;
|
|
if (out_info)
|
|
*out_info = g_steal_pointer (&ret_info);
|
|
out:
|
|
return ret;
|
|
}
|
|
|
|
static GVariant *
|
|
set_info_from_filemeta (GFileInfo *info,
|
|
GVariant *metadata)
|
|
{
|
|
guint32 uid, gid, mode;
|
|
GVariant *xattrs;
|
|
|
|
g_variant_get (metadata, "(uuu@a(ayay))",
|
|
&uid, &gid, &mode, &xattrs);
|
|
uid = GUINT32_FROM_BE (uid);
|
|
gid = GUINT32_FROM_BE (gid);
|
|
mode = GUINT32_FROM_BE (mode);
|
|
|
|
g_file_info_set_attribute_uint32 (info, "unix::uid", uid);
|
|
g_file_info_set_attribute_uint32 (info, "unix::gid", gid);
|
|
g_file_info_set_attribute_uint32 (info, "unix::mode", mode);
|
|
|
|
return xattrs;
|
|
}
|
|
|
|
gboolean
|
|
_ostree_repo_read_bare_fd (OstreeRepo *self,
|
|
const char *checksum,
|
|
int *out_fd,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
char loose_path_buf[_OSTREE_LOOSE_PATH_MAX];
|
|
|
|
g_assert (self->mode == OSTREE_REPO_MODE_BARE ||
|
|
self->mode == OSTREE_REPO_MODE_BARE_USER);
|
|
|
|
_ostree_loose_path (loose_path_buf, checksum, OSTREE_OBJECT_TYPE_FILE, self->mode);
|
|
|
|
*out_fd = openat (self->objects_dir_fd, loose_path_buf, O_RDONLY | O_CLOEXEC);
|
|
if (*out_fd < 0)
|
|
{
|
|
glnx_set_error_from_errno (error);
|
|
return FALSE;
|
|
}
|
|
return TRUE;
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_load_file:
|
|
* @self: Repo
|
|
* @checksum: ASCII SHA256 checksum
|
|
* @out_input: (out) (allow-none): File content
|
|
* @out_file_info: (out) (allow-none): File information
|
|
* @out_xattrs: (out) (allow-none): Extended attributes
|
|
* @cancellable: Cancellable
|
|
* @error: Error
|
|
*
|
|
* Load content object, decomposing it into three parts: the actual
|
|
* content (for regular files), the metadata, and extended attributes.
|
|
*/
|
|
gboolean
|
|
ostree_repo_load_file (OstreeRepo *self,
|
|
const char *checksum,
|
|
GInputStream **out_input,
|
|
GFileInfo **out_file_info,
|
|
GVariant **out_xattrs,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
gboolean ret = FALSE;
|
|
gboolean found = FALSE;
|
|
OstreeRepoMode repo_mode;
|
|
g_autoptr(GInputStream) ret_input = NULL;
|
|
g_autoptr(GFileInfo) ret_file_info = NULL;
|
|
g_autoptr(GVariant) ret_xattrs = NULL;
|
|
char loose_path_buf[_OSTREE_LOOSE_PATH_MAX];
|
|
|
|
repo_mode = ostree_repo_get_mode (self);
|
|
|
|
_ostree_loose_path (loose_path_buf, checksum, OSTREE_OBJECT_TYPE_FILE, repo_mode);
|
|
|
|
if (repo_mode == OSTREE_REPO_MODE_ARCHIVE_Z2)
|
|
{
|
|
int fd = -1;
|
|
struct stat stbuf;
|
|
g_autoptr(GInputStream) tmp_stream = NULL;
|
|
|
|
if (!ot_openat_ignore_enoent (self->objects_dir_fd, loose_path_buf, &fd,
|
|
error))
|
|
goto out;
|
|
|
|
if (fd < 0 && self->commit_stagedir_fd != -1)
|
|
{
|
|
if (!ot_openat_ignore_enoent (self->commit_stagedir_fd, loose_path_buf, &fd,
|
|
error))
|
|
goto out;
|
|
}
|
|
|
|
if (fd != -1)
|
|
{
|
|
tmp_stream = g_unix_input_stream_new (fd, TRUE);
|
|
fd = -1; /* Transfer ownership */
|
|
|
|
if (!glnx_stream_fstat ((GFileDescriptorBased*) tmp_stream, &stbuf,
|
|
error))
|
|
goto out;
|
|
|
|
if (!ostree_content_stream_parse (TRUE, tmp_stream, stbuf.st_size, TRUE,
|
|
out_input ? &ret_input : NULL,
|
|
&ret_file_info, &ret_xattrs,
|
|
cancellable, error))
|
|
goto out;
|
|
|
|
found = TRUE;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
if (!query_info_for_bare_content_object (self, loose_path_buf,
|
|
&ret_file_info,
|
|
cancellable, error))
|
|
goto out;
|
|
|
|
if (ret_file_info)
|
|
{
|
|
found = TRUE;
|
|
|
|
if (repo_mode == OSTREE_REPO_MODE_BARE_USER)
|
|
{
|
|
guint32 mode;
|
|
g_autoptr(GVariant) metadata = NULL;
|
|
g_autoptr(GBytes) bytes = NULL;
|
|
glnx_fd_close int fd = -1;
|
|
|
|
bytes = ot_lgetxattrat (self->objects_dir_fd, loose_path_buf,
|
|
"user.ostreemeta", error);
|
|
if (bytes == NULL)
|
|
goto out;
|
|
|
|
metadata = g_variant_new_from_bytes (OSTREE_FILEMETA_GVARIANT_FORMAT,
|
|
bytes, FALSE);
|
|
g_variant_ref_sink (metadata);
|
|
|
|
ret_xattrs = set_info_from_filemeta (ret_file_info, metadata);
|
|
|
|
mode = g_file_info_get_attribute_uint32 (ret_file_info, "unix::mode");
|
|
|
|
/* Optimize this so that we only open the file if we
|
|
* need to; symlinks contain their content, and we only
|
|
* open regular files if the caller has requested an
|
|
* input stream.
|
|
*/
|
|
if (S_ISLNK (mode) || out_input)
|
|
{
|
|
if (!gs_file_openat_noatime (self->objects_dir_fd, loose_path_buf, &fd,
|
|
cancellable, error))
|
|
goto out;
|
|
}
|
|
|
|
if (S_ISREG (mode) && out_input)
|
|
{
|
|
g_assert (fd != -1);
|
|
ret_input = g_unix_input_stream_new (fd, TRUE);
|
|
fd = -1; /* Transfer ownership */
|
|
}
|
|
else if (S_ISLNK (mode))
|
|
{
|
|
g_autoptr(GInputStream) target_input = NULL;
|
|
char targetbuf[PATH_MAX+1];
|
|
gsize target_size;
|
|
|
|
g_file_info_set_file_type (ret_file_info, G_FILE_TYPE_SYMBOLIC_LINK);
|
|
g_file_info_set_size (ret_file_info, 0);
|
|
|
|
target_input = g_unix_input_stream_new (fd, TRUE);
|
|
fd = -1; /* Transfer ownership */
|
|
|
|
if (!g_input_stream_read_all (target_input, targetbuf, sizeof (targetbuf),
|
|
&target_size, cancellable, error))
|
|
goto out;
|
|
|
|
g_file_info_set_symlink_target (ret_file_info, targetbuf);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
g_assert (repo_mode == OSTREE_REPO_MODE_BARE);
|
|
|
|
if (g_file_info_get_file_type (ret_file_info) == G_FILE_TYPE_REGULAR
|
|
&& (out_input || out_xattrs))
|
|
{
|
|
glnx_fd_close int fd = -1;
|
|
|
|
if (!gs_file_openat_noatime (self->objects_dir_fd, loose_path_buf, &fd,
|
|
cancellable, error))
|
|
goto out;
|
|
|
|
if (out_xattrs)
|
|
{
|
|
if (!glnx_fd_get_all_xattrs (fd, &ret_xattrs,
|
|
cancellable, error))
|
|
goto out;
|
|
}
|
|
|
|
if (out_input)
|
|
{
|
|
ret_input = g_unix_input_stream_new (fd, TRUE);
|
|
fd = -1; /* Transfer ownership */
|
|
}
|
|
}
|
|
else if (g_file_info_get_file_type (ret_file_info) == G_FILE_TYPE_SYMBOLIC_LINK
|
|
&& out_xattrs)
|
|
{
|
|
if (!glnx_dfd_name_get_all_xattrs (self->objects_dir_fd, loose_path_buf,
|
|
&ret_xattrs,
|
|
cancellable, error))
|
|
goto out;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if (!found)
|
|
{
|
|
if (self->parent_repo)
|
|
{
|
|
if (!ostree_repo_load_file (self->parent_repo, checksum,
|
|
out_input ? &ret_input : NULL,
|
|
out_file_info ? &ret_file_info : NULL,
|
|
out_xattrs ? &ret_xattrs : NULL,
|
|
cancellable, error))
|
|
goto out;
|
|
}
|
|
else
|
|
{
|
|
g_set_error (error, G_IO_ERROR, G_IO_ERROR_NOT_FOUND,
|
|
"Couldn't find file object '%s'", checksum);
|
|
goto out;
|
|
}
|
|
}
|
|
|
|
ret = TRUE;
|
|
ot_transfer_out_value (out_input, &ret_input);
|
|
ot_transfer_out_value (out_file_info, &ret_file_info);
|
|
ot_transfer_out_value (out_xattrs, &ret_xattrs);
|
|
out:
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_load_object_stream:
|
|
* @self: Repo
|
|
* @objtype: Object type
|
|
* @checksum: ASCII SHA256 checksum
|
|
* @out_input: (out): Stream for object
|
|
* @out_size: (out): Length of @out_input
|
|
* @cancellable: Cancellable
|
|
* @error: Error
|
|
*
|
|
* Load object as a stream; useful when copying objects between
|
|
* repositories.
|
|
*/
|
|
gboolean
|
|
ostree_repo_load_object_stream (OstreeRepo *self,
|
|
OstreeObjectType objtype,
|
|
const char *checksum,
|
|
GInputStream **out_input,
|
|
guint64 *out_size,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
gboolean ret = FALSE;
|
|
guint64 size;
|
|
g_autoptr(GInputStream) ret_input = NULL;
|
|
|
|
if (OSTREE_OBJECT_TYPE_IS_META (objtype))
|
|
{
|
|
if (!load_metadata_internal (self, objtype, checksum, TRUE, NULL,
|
|
&ret_input, &size,
|
|
cancellable, error))
|
|
goto out;
|
|
}
|
|
else
|
|
{
|
|
g_autoptr(GInputStream) input = NULL;
|
|
g_autoptr(GFileInfo) finfo = NULL;
|
|
g_autoptr(GVariant) xattrs = NULL;
|
|
|
|
if (!ostree_repo_load_file (self, checksum, &input, &finfo, &xattrs,
|
|
cancellable, error))
|
|
goto out;
|
|
|
|
if (!ostree_raw_file_to_content_stream (input, finfo, xattrs,
|
|
&ret_input, &size,
|
|
cancellable, error))
|
|
goto out;
|
|
}
|
|
|
|
ret = TRUE;
|
|
ot_transfer_out_value (out_input, &ret_input);
|
|
*out_size = size;
|
|
out:
|
|
return ret;
|
|
}
|
|
|
|
/*
|
|
* _ostree_repo_has_loose_object:
|
|
* @loose_path_buf: Buffer of size _OSTREE_LOOSE_PATH_MAX
|
|
*
|
|
* Locate object in repository; if it exists, @out_is_stored will be
|
|
* set to TRUE. @loose_path_buf is always set to the loose path.
|
|
*/
|
|
gboolean
|
|
_ostree_repo_has_loose_object (OstreeRepo *self,
|
|
const char *checksum,
|
|
OstreeObjectType objtype,
|
|
gboolean *out_is_stored,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
gboolean ret = FALSE;
|
|
struct stat stbuf;
|
|
int res = -1;
|
|
char loose_path_buf[_OSTREE_LOOSE_PATH_MAX];
|
|
|
|
_ostree_loose_path (loose_path_buf, checksum, objtype, self->mode);
|
|
|
|
if (self->commit_stagedir_fd != -1)
|
|
{
|
|
do
|
|
res = fstatat (self->commit_stagedir_fd, loose_path_buf, &stbuf, AT_SYMLINK_NOFOLLOW);
|
|
while (G_UNLIKELY (res == -1 && errno == EINTR));
|
|
if (res == -1 && errno != ENOENT)
|
|
{
|
|
glnx_set_error_from_errno (error);
|
|
goto out;
|
|
}
|
|
}
|
|
|
|
if (res < 0)
|
|
{
|
|
do
|
|
res = fstatat (self->objects_dir_fd, loose_path_buf, &stbuf, AT_SYMLINK_NOFOLLOW);
|
|
while (G_UNLIKELY (res == -1 && errno == EINTR));
|
|
if (res == -1 && errno != ENOENT)
|
|
{
|
|
glnx_set_error_from_errno (error);
|
|
goto out;
|
|
}
|
|
}
|
|
|
|
ret = TRUE;
|
|
*out_is_stored = (res != -1);
|
|
out:
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_has_object:
|
|
* @self: Repo
|
|
* @objtype: Object type
|
|
* @checksum: ASCII SHA256 checksum
|
|
* @out_have_object: (out): %TRUE if repository contains object
|
|
* @cancellable: Cancellable
|
|
* @error: Error
|
|
*
|
|
* Set @out_have_object to %TRUE if @self contains the given object;
|
|
* %FALSE otherwise.
|
|
*
|
|
* Returns: %FALSE if an unexpected error occurred, %TRUE otherwise
|
|
*/
|
|
gboolean
|
|
ostree_repo_has_object (OstreeRepo *self,
|
|
OstreeObjectType objtype,
|
|
const char *checksum,
|
|
gboolean *out_have_object,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
gboolean ret = FALSE;
|
|
gboolean ret_have_object;
|
|
|
|
if (!_ostree_repo_has_loose_object (self, checksum, objtype, &ret_have_object,
|
|
cancellable, error))
|
|
goto out;
|
|
|
|
/* In the future, here is where we would also look up in metadata pack files */
|
|
|
|
if (!ret_have_object && self->parent_repo)
|
|
{
|
|
if (!ostree_repo_has_object (self->parent_repo, objtype, checksum,
|
|
&ret_have_object, cancellable, error))
|
|
goto out;
|
|
}
|
|
|
|
ret = TRUE;
|
|
if (out_have_object)
|
|
*out_have_object = ret_have_object;
|
|
out:
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_delete_object:
|
|
* @self: Repo
|
|
* @objtype: Object type
|
|
* @sha256: Checksum
|
|
* @cancellable: Cancellable
|
|
* @error: Error
|
|
*
|
|
* Remove the object of type @objtype with checksum @sha256
|
|
* from the repository. An error of type %G_IO_ERROR_NOT_FOUND
|
|
* is thrown if the object does not exist.
|
|
*/
|
|
gboolean
|
|
ostree_repo_delete_object (OstreeRepo *self,
|
|
OstreeObjectType objtype,
|
|
const char *sha256,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
gboolean ret = FALSE;
|
|
int res;
|
|
char loose_path[_OSTREE_LOOSE_PATH_MAX];
|
|
|
|
_ostree_loose_path (loose_path, sha256, objtype, self->mode);
|
|
|
|
if (objtype == OSTREE_OBJECT_TYPE_COMMIT)
|
|
{
|
|
char meta_loose[_OSTREE_LOOSE_PATH_MAX];
|
|
|
|
_ostree_loose_path_with_suffix (meta_loose, sha256,
|
|
OSTREE_OBJECT_TYPE_COMMIT, self->mode, "meta");
|
|
|
|
do
|
|
res = unlinkat (self->objects_dir_fd, meta_loose, 0);
|
|
while (G_UNLIKELY (res == -1 && errno == EINTR));
|
|
if (res == -1)
|
|
{
|
|
if (G_UNLIKELY (errno != ENOENT))
|
|
{
|
|
glnx_set_error_from_errno (error);
|
|
goto out;
|
|
}
|
|
}
|
|
}
|
|
|
|
do
|
|
res = unlinkat (self->objects_dir_fd, loose_path, 0);
|
|
while (G_UNLIKELY (res == -1 && errno == EINTR));
|
|
if (G_UNLIKELY (res == -1))
|
|
{
|
|
glnx_set_error_from_errno (error);
|
|
goto out;
|
|
}
|
|
|
|
/* If the repository is configured to use tombstone commits, create one when deleting a commit. */
|
|
if (objtype == OSTREE_OBJECT_TYPE_COMMIT)
|
|
{
|
|
gboolean tombstone_commits = FALSE;
|
|
GKeyFile *readonly_config = ostree_repo_get_config (self);
|
|
if (!ot_keyfile_get_boolean_with_default (readonly_config, "core", "tombstone-commits", FALSE,
|
|
&tombstone_commits, error))
|
|
goto out;
|
|
|
|
if (tombstone_commits)
|
|
{
|
|
g_auto(GVariantBuilder) builder = {{0,}};
|
|
g_autoptr(GVariant) variant = NULL;
|
|
|
|
g_variant_builder_init (&builder, G_VARIANT_TYPE ("a{sv}"));
|
|
g_variant_builder_add (&builder, "{sv}", "commit", g_variant_new_bytestring (sha256));
|
|
variant = g_variant_ref_sink (g_variant_builder_end (&builder));
|
|
if (!ostree_repo_write_metadata_trusted (self,
|
|
OSTREE_OBJECT_TYPE_TOMBSTONE_COMMIT,
|
|
sha256,
|
|
variant,
|
|
cancellable,
|
|
error))
|
|
goto out;
|
|
}
|
|
}
|
|
|
|
ret = TRUE;
|
|
out:
|
|
return ret;
|
|
}
|
|
|
|
static gboolean
|
|
copy_detached_metadata (OstreeRepo *self,
|
|
OstreeRepo *source,
|
|
const char *checksum,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
gboolean ret = FALSE;
|
|
g_autoptr(GVariant) detached_meta = NULL;
|
|
|
|
if (!ostree_repo_read_commit_detached_metadata (source,
|
|
checksum, &detached_meta,
|
|
cancellable, error))
|
|
goto out;
|
|
|
|
if (detached_meta)
|
|
{
|
|
if (!ostree_repo_write_commit_detached_metadata (self,
|
|
checksum, detached_meta,
|
|
cancellable, error))
|
|
goto out;
|
|
}
|
|
|
|
ret = TRUE;
|
|
out:
|
|
return ret;
|
|
}
|
|
|
|
static gboolean
|
|
import_one_object_copy (OstreeRepo *self,
|
|
OstreeRepo *source,
|
|
const char *checksum,
|
|
OstreeObjectType objtype,
|
|
gboolean trusted,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
gboolean ret = FALSE;
|
|
guint64 length;
|
|
g_autoptr(GInputStream) object_stream = NULL;
|
|
|
|
if (!ostree_repo_load_object_stream (source, objtype, checksum,
|
|
&object_stream, &length,
|
|
cancellable, error))
|
|
goto out;
|
|
|
|
if (objtype == OSTREE_OBJECT_TYPE_FILE)
|
|
{
|
|
if (trusted)
|
|
{
|
|
if (!ostree_repo_write_content_trusted (self, checksum,
|
|
object_stream, length,
|
|
cancellable, error))
|
|
goto out;
|
|
}
|
|
else
|
|
{
|
|
g_autofree guchar *real_csum = NULL;
|
|
if (!ostree_repo_write_content (self, checksum,
|
|
object_stream, length,
|
|
&real_csum,
|
|
cancellable, error))
|
|
goto out;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
if (objtype == OSTREE_OBJECT_TYPE_COMMIT)
|
|
{
|
|
if (!copy_detached_metadata (self, source, checksum, cancellable, error))
|
|
goto out;
|
|
}
|
|
|
|
if (trusted)
|
|
{
|
|
if (!ostree_repo_write_metadata_stream_trusted (self, objtype,
|
|
checksum, object_stream, length,
|
|
cancellable, error))
|
|
goto out;
|
|
}
|
|
else
|
|
{
|
|
g_autofree guchar *real_csum = NULL;
|
|
g_autoptr(GVariant) variant = NULL;
|
|
|
|
if (!ostree_repo_load_variant (source, objtype, checksum,
|
|
&variant, error))
|
|
goto out;
|
|
|
|
if (!ostree_repo_write_metadata (self, objtype,
|
|
checksum, variant,
|
|
&real_csum,
|
|
cancellable, error))
|
|
goto out;
|
|
}
|
|
}
|
|
|
|
ret = TRUE;
|
|
out:
|
|
return ret;
|
|
}
|
|
|
|
static gboolean
|
|
import_one_object_link (OstreeRepo *self,
|
|
OstreeRepo *source,
|
|
const char *checksum,
|
|
OstreeObjectType objtype,
|
|
gboolean *out_was_supported,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
gboolean ret = FALSE;
|
|
char loose_path_buf[_OSTREE_LOOSE_PATH_MAX];
|
|
|
|
_ostree_loose_path (loose_path_buf, checksum, objtype, self->mode);
|
|
|
|
if (!_ostree_repo_ensure_loose_objdir_at (self->objects_dir_fd, loose_path_buf, cancellable, error))
|
|
goto out;
|
|
|
|
*out_was_supported = TRUE;
|
|
if (linkat (source->objects_dir_fd, loose_path_buf, self->objects_dir_fd, loose_path_buf, 0) != 0)
|
|
{
|
|
if (errno == EEXIST)
|
|
{
|
|
ret = TRUE;
|
|
}
|
|
else if (errno == EMLINK || errno == EXDEV || errno == EPERM)
|
|
{
|
|
/* EMLINK, EXDEV and EPERM shouldn't be fatal; we just can't do the
|
|
* optimization of hardlinking instead of copying.
|
|
*/
|
|
*out_was_supported = FALSE;
|
|
ret = TRUE;
|
|
}
|
|
else
|
|
glnx_set_error_from_errno (error);
|
|
|
|
goto out;
|
|
}
|
|
|
|
if (objtype == OSTREE_OBJECT_TYPE_COMMIT)
|
|
{
|
|
if (!copy_detached_metadata (self, source, checksum, cancellable, error))
|
|
goto out;
|
|
}
|
|
|
|
ret = TRUE;
|
|
out:
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_import_object_from:
|
|
* @self: Destination repo
|
|
* @source: Source repo
|
|
* @objtype: Object type
|
|
* @checksum: checksum
|
|
* @cancellable: Cancellable
|
|
* @error: Error
|
|
*
|
|
* Copy object named by @objtype and @checksum into @self from the
|
|
* source repository @source. If both repositories are of the same
|
|
* type and on the same filesystem, this will simply be a fast Unix
|
|
* hard link operation.
|
|
*
|
|
* Otherwise, a copy will be performed.
|
|
*/
|
|
gboolean
|
|
ostree_repo_import_object_from (OstreeRepo *self,
|
|
OstreeRepo *source,
|
|
OstreeObjectType objtype,
|
|
const char *checksum,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
return
|
|
ostree_repo_import_object_from_with_trust (self, source, objtype,
|
|
checksum, TRUE, cancellable, error);
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_import_object_from_with_trust:
|
|
* @self: Destination repo
|
|
* @source: Source repo
|
|
* @objtype: Object type
|
|
* @checksum: checksum
|
|
* @trusted: If %TRUE, assume the source repo is valid and trusted
|
|
* @cancellable: Cancellable
|
|
* @error: Error
|
|
*
|
|
* Copy object named by @objtype and @checksum into @self from the
|
|
* source repository @source. If both repositories are of the same
|
|
* type and on the same filesystem, this will simply be a fast Unix
|
|
* hard link operation.
|
|
*
|
|
* Otherwise, a copy will be performed.
|
|
*/
|
|
gboolean
|
|
ostree_repo_import_object_from_with_trust (OstreeRepo *self,
|
|
OstreeRepo *source,
|
|
OstreeObjectType objtype,
|
|
const char *checksum,
|
|
gboolean trusted,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
gboolean ret = FALSE;
|
|
gboolean hardlink_was_supported = FALSE;
|
|
|
|
if (trusted && /* Don't hardlink into untrusted remotes */
|
|
self->mode == source->mode)
|
|
{
|
|
if (!import_one_object_link (self, source, checksum, objtype,
|
|
&hardlink_was_supported,
|
|
cancellable, error))
|
|
goto out;
|
|
}
|
|
|
|
if (!hardlink_was_supported)
|
|
{
|
|
gboolean has_object;
|
|
|
|
if (!ostree_repo_has_object (self, objtype, checksum, &has_object,
|
|
cancellable, error))
|
|
goto out;
|
|
|
|
if (!has_object)
|
|
{
|
|
if (!import_one_object_copy (self, source, checksum, objtype, trusted,
|
|
cancellable, error))
|
|
goto out;
|
|
}
|
|
}
|
|
|
|
ret = TRUE;
|
|
out:
|
|
return ret;
|
|
}
|
|
|
|
|
|
/**
|
|
* ostree_repo_query_object_storage_size:
|
|
* @self: Repo
|
|
* @objtype: Object type
|
|
* @sha256: Checksum
|
|
* @out_size: (out): Size in bytes object occupies physically
|
|
* @cancellable: Cancellable
|
|
* @error: Error
|
|
*
|
|
* Return the size in bytes of object with checksum @sha256, after any
|
|
* compression has been applied.
|
|
*/
|
|
gboolean
|
|
ostree_repo_query_object_storage_size (OstreeRepo *self,
|
|
OstreeObjectType objtype,
|
|
const char *sha256,
|
|
guint64 *out_size,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
gboolean ret = FALSE;
|
|
char loose_path[_OSTREE_LOOSE_PATH_MAX];
|
|
int res;
|
|
struct stat stbuf;
|
|
|
|
_ostree_loose_path (loose_path, sha256, objtype, self->mode);
|
|
|
|
do
|
|
res = fstatat (self->objects_dir_fd, loose_path, &stbuf, AT_SYMLINK_NOFOLLOW);
|
|
while (G_UNLIKELY (res == -1 && errno == EINTR));
|
|
if (G_UNLIKELY (res == -1))
|
|
{
|
|
glnx_set_error_from_errno (error);
|
|
goto out;
|
|
}
|
|
|
|
*out_size = stbuf.st_size;
|
|
ret = TRUE;
|
|
out:
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_load_variant_if_exists:
|
|
* @self: Repo
|
|
* @objtype: Object type
|
|
* @sha256: ASCII checksum
|
|
* @out_variant: (out) (transfer full): Metadata
|
|
* @error: Error
|
|
*
|
|
* Attempt to load the metadata object @sha256 of type @objtype if it
|
|
* exists, storing the result in @out_variant. If it doesn't exist,
|
|
* %NULL is returned.
|
|
*/
|
|
gboolean
|
|
ostree_repo_load_variant_if_exists (OstreeRepo *self,
|
|
OstreeObjectType objtype,
|
|
const char *sha256,
|
|
GVariant **out_variant,
|
|
GError **error)
|
|
{
|
|
return load_metadata_internal (self, objtype, sha256, FALSE,
|
|
out_variant, NULL, NULL, NULL, error);
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_load_variant:
|
|
* @self: Repo
|
|
* @objtype: Expected object type
|
|
* @sha256: Checksum string
|
|
* @out_variant: (out) (transfer full): Metadata object
|
|
* @error: Error
|
|
*
|
|
* Load the metadata object @sha256 of type @objtype, storing the
|
|
* result in @out_variant.
|
|
*/
|
|
gboolean
|
|
ostree_repo_load_variant (OstreeRepo *self,
|
|
OstreeObjectType objtype,
|
|
const char *sha256,
|
|
GVariant **out_variant,
|
|
GError **error)
|
|
{
|
|
return load_metadata_internal (self, objtype, sha256, TRUE,
|
|
out_variant, NULL, NULL, NULL, error);
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_load_commit:
|
|
* @self: Repo
|
|
* @checksum: Commit checksum
|
|
* @out_commit: (out) (allow-none): Commit
|
|
* @out_state: (out) (allow-none): Commit state
|
|
* @error: Error
|
|
*
|
|
* A version of ostree_repo_load_variant() specialized to commits,
|
|
* capable of returning extended state information. Currently
|
|
* the only extended state is %OSTREE_REPO_COMMIT_STATE_PARTIAL, which
|
|
* means that only a sub-path of the commit is available.
|
|
*/
|
|
gboolean
|
|
ostree_repo_load_commit (OstreeRepo *self,
|
|
const char *checksum,
|
|
GVariant **out_variant,
|
|
OstreeRepoCommitState *out_state,
|
|
GError **error)
|
|
{
|
|
gboolean ret = FALSE;
|
|
|
|
if (out_variant)
|
|
{
|
|
if (!load_metadata_internal (self, OSTREE_OBJECT_TYPE_COMMIT, checksum, TRUE,
|
|
out_variant, NULL, NULL, NULL, error))
|
|
goto out;
|
|
}
|
|
|
|
if (out_state)
|
|
{
|
|
g_autofree char *commitpartial_path = _ostree_get_commitpartial_path (checksum);
|
|
struct stat stbuf;
|
|
|
|
*out_state = 0;
|
|
|
|
if (fstatat (self->repo_dir_fd, commitpartial_path, &stbuf, 0) == 0)
|
|
{
|
|
*out_state |= OSTREE_REPO_COMMIT_STATE_PARTIAL;
|
|
}
|
|
else if (errno != ENOENT)
|
|
{
|
|
glnx_set_error_from_errno (error);
|
|
goto out;
|
|
}
|
|
}
|
|
|
|
ret = TRUE;
|
|
out:
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_list_objects:
|
|
* @self: Repo
|
|
* @flags: Flags controlling enumeration
|
|
* @out_objects: (out): Map of serialized object name to variant data
|
|
* @cancellable: Cancellable
|
|
* @error: Error
|
|
*
|
|
* This function synchronously enumerates all objects in the
|
|
* repository, returning data in @out_objects. @out_objects
|
|
* maps from keys returned by ostree_object_name_serialize()
|
|
* to #GVariant values of type %OSTREE_REPO_LIST_OBJECTS_VARIANT_TYPE.
|
|
*
|
|
* Returns: %TRUE on success, %FALSE on error, and @error will be set
|
|
*/
|
|
gboolean
|
|
ostree_repo_list_objects (OstreeRepo *self,
|
|
OstreeRepoListObjectsFlags flags,
|
|
GHashTable **out_objects,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
gboolean ret = FALSE;
|
|
g_autoptr(GHashTable) ret_objects = NULL;
|
|
|
|
g_return_val_if_fail (error == NULL || *error == NULL, FALSE);
|
|
g_return_val_if_fail (self->inited, FALSE);
|
|
|
|
ret_objects = g_hash_table_new_full (ostree_hash_object_name, g_variant_equal,
|
|
(GDestroyNotify) g_variant_unref,
|
|
(GDestroyNotify) g_variant_unref);
|
|
|
|
if (flags & OSTREE_REPO_LIST_OBJECTS_ALL)
|
|
flags |= (OSTREE_REPO_LIST_OBJECTS_LOOSE | OSTREE_REPO_LIST_OBJECTS_PACKED);
|
|
|
|
if (flags & OSTREE_REPO_LIST_OBJECTS_LOOSE)
|
|
{
|
|
if (!list_loose_objects (self, ret_objects, NULL, cancellable, error))
|
|
goto out;
|
|
if (self->parent_repo)
|
|
{
|
|
if (!list_loose_objects (self->parent_repo, ret_objects, NULL, cancellable, error))
|
|
goto out;
|
|
}
|
|
}
|
|
|
|
if (flags & OSTREE_REPO_LIST_OBJECTS_PACKED)
|
|
{
|
|
/* Nothing for now... */
|
|
}
|
|
|
|
ret = TRUE;
|
|
ot_transfer_out_value (out_objects, &ret_objects);
|
|
out:
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_list_commit_objects_starting_with:
|
|
* @self: Repo
|
|
* @start: List commits starting with this checksum
|
|
* @out_commits: Array of GVariants
|
|
* @cancellable: Cancellable
|
|
* @error: Error
|
|
*
|
|
* This function synchronously enumerates all commit objects starting
|
|
* with @start, returning data in @out_commits.
|
|
*
|
|
* Returns: %TRUE on success, %FALSE on error, and @error will be set
|
|
*/
|
|
gboolean
|
|
ostree_repo_list_commit_objects_starting_with (OstreeRepo *self,
|
|
const char *start,
|
|
GHashTable **out_commits,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
gboolean ret = FALSE;
|
|
g_autoptr(GHashTable) ret_commits = NULL;
|
|
|
|
g_return_val_if_fail (error == NULL || *error == NULL, FALSE);
|
|
g_return_val_if_fail (self->inited, FALSE);
|
|
|
|
ret_commits = g_hash_table_new_full (ostree_hash_object_name, g_variant_equal,
|
|
(GDestroyNotify) g_variant_unref,
|
|
(GDestroyNotify) g_variant_unref);
|
|
|
|
if (!list_loose_objects (self, ret_commits, start, cancellable, error))
|
|
goto out;
|
|
|
|
|
|
if (self->parent_repo)
|
|
{
|
|
if (!list_loose_objects (self->parent_repo, ret_commits, start,
|
|
cancellable, error))
|
|
goto out;
|
|
}
|
|
|
|
ret = TRUE;
|
|
ot_transfer_out_value (out_commits, &ret_commits);
|
|
out:
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_read_commit:
|
|
* @self: Repo
|
|
* @ref: Ref or ASCII checksum
|
|
* @out_root: (out): An #OstreeRepoFile corresponding to the root
|
|
* @out_commit: (out): The resolved commit checksum
|
|
* @cancellable: Cancellable
|
|
* @error: Error
|
|
*
|
|
* Load the content for @rev into @out_root.
|
|
*/
|
|
gboolean
|
|
ostree_repo_read_commit (OstreeRepo *self,
|
|
const char *ref,
|
|
GFile **out_root,
|
|
char **out_commit,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
gboolean ret = FALSE;
|
|
g_autoptr(GFile) ret_root = NULL;
|
|
g_autofree char *resolved_commit = NULL;
|
|
|
|
if (!ostree_repo_resolve_rev (self, ref, FALSE, &resolved_commit, error))
|
|
goto out;
|
|
|
|
ret_root = (GFile*) _ostree_repo_file_new_for_commit (self, resolved_commit, error);
|
|
if (!ret_root)
|
|
goto out;
|
|
|
|
if (!ostree_repo_file_ensure_resolved ((OstreeRepoFile*)ret_root, error))
|
|
goto out;
|
|
|
|
ret = TRUE;
|
|
ot_transfer_out_value(out_root, &ret_root);
|
|
ot_transfer_out_value(out_commit, &resolved_commit);
|
|
out:
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_pull:
|
|
* @self: Repo
|
|
* @remote_name: Name of remote
|
|
* @refs_to_fetch: (array zero-terminated=1) (element-type utf8) (allow-none): Optional list of refs; if %NULL, fetch all configured refs
|
|
* @flags: Options controlling fetch behavior
|
|
* @progress: (allow-none): Progress
|
|
* @cancellable: Cancellable
|
|
* @error: Error
|
|
*
|
|
* Connect to the remote repository, fetching the specified set of
|
|
* refs @refs_to_fetch. For each ref that is changed, download the
|
|
* commit, all metadata, and all content objects, storing them safely
|
|
* on disk in @self.
|
|
*
|
|
* If @flags contains %OSTREE_REPO_PULL_FLAGS_MIRROR, and
|
|
* the @refs_to_fetch is %NULL, and the remote repository contains a
|
|
* summary file, then all refs will be fetched.
|
|
*
|
|
* If @flags contains %OSTREE_REPO_PULL_FLAGS_COMMIT_ONLY, then only the
|
|
* metadata for the commits in @refs_to_fetch is pulled.
|
|
*
|
|
* Warning: This API will iterate the thread default main context,
|
|
* which is a bug, but kept for compatibility reasons. If you want to
|
|
* avoid this, use g_main_context_push_thread_default() to push a new
|
|
* one around this call.
|
|
*/
|
|
gboolean
|
|
ostree_repo_pull (OstreeRepo *self,
|
|
const char *remote_name,
|
|
char **refs_to_fetch,
|
|
OstreeRepoPullFlags flags,
|
|
OstreeAsyncProgress *progress,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
return ostree_repo_pull_one_dir (self, remote_name, NULL, refs_to_fetch, flags, progress, cancellable, error);
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_pull_one_dir:
|
|
* @self: Repo
|
|
* @remote_name: Name of remote
|
|
* @dir_to_pull: Subdirectory path
|
|
* @refs_to_fetch: (array zero-terminated=1) (element-type utf8) (allow-none): Optional list of refs; if %NULL, fetch all configured refs
|
|
* @flags: Options controlling fetch behavior
|
|
* @progress: (allow-none): Progress
|
|
* @cancellable: Cancellable
|
|
* @error: Error
|
|
*
|
|
* This is similar to ostree_repo_pull(), but only fetches a single
|
|
* subpath.
|
|
*/
|
|
gboolean
|
|
ostree_repo_pull_one_dir (OstreeRepo *self,
|
|
const char *remote_name,
|
|
const char *dir_to_pull,
|
|
char **refs_to_fetch,
|
|
OstreeRepoPullFlags flags,
|
|
OstreeAsyncProgress *progress,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
GVariantBuilder builder;
|
|
g_autoptr(GVariant) options = NULL;
|
|
|
|
g_variant_builder_init (&builder, G_VARIANT_TYPE ("a{sv}"));
|
|
|
|
if (dir_to_pull)
|
|
g_variant_builder_add (&builder, "{s@v}", "subdir",
|
|
g_variant_new_variant (g_variant_new_string (dir_to_pull)));
|
|
g_variant_builder_add (&builder, "{s@v}", "flags",
|
|
g_variant_new_variant (g_variant_new_int32 (flags)));
|
|
if (refs_to_fetch)
|
|
g_variant_builder_add (&builder, "{s@v}", "refs",
|
|
g_variant_new_variant (g_variant_new_strv ((const char *const*) refs_to_fetch, -1)));
|
|
|
|
options = g_variant_ref_sink (g_variant_builder_end (&builder));
|
|
return ostree_repo_pull_with_options (self, remote_name, options,
|
|
progress, cancellable, error);
|
|
}
|
|
|
|
/**
|
|
* _formatted_time_remaining_from_seconds
|
|
* @seconds_remaining: Estimated number of seconds remaining.
|
|
*
|
|
* Returns a strings showing the number of days, hours, minutes
|
|
* and seconds remaining.
|
|
**/
|
|
static char *
|
|
_formatted_time_remaining_from_seconds (guint64 seconds_remaining)
|
|
{
|
|
guint64 minutes_remaining = seconds_remaining / 60;
|
|
guint64 hours_remaining = minutes_remaining / 60;
|
|
guint64 days_remaining = hours_remaining / 24;
|
|
|
|
GString *description = g_string_new (NULL);
|
|
|
|
if (days_remaining)
|
|
g_string_append_printf (description, "%" G_GUINT64_FORMAT " days ", days_remaining);
|
|
|
|
if (hours_remaining)
|
|
g_string_append_printf (description, "%" G_GUINT64_FORMAT " hours ", hours_remaining % 24);
|
|
|
|
if (minutes_remaining)
|
|
g_string_append_printf (description, "%" G_GUINT64_FORMAT " minutes ", minutes_remaining % 60);
|
|
|
|
if (seconds_remaining)
|
|
g_string_append_printf (description, "%" G_GUINT64_FORMAT " seconds ", seconds_remaining % 60);
|
|
|
|
return g_string_free (description, FALSE);
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_pull_default_console_progress_changed:
|
|
* @progress: Async progress
|
|
* @user_data: (allow-none): User data
|
|
*
|
|
* Convenient "changed" callback for use with
|
|
* ostree_async_progress_new_and_connect() when pulling from a remote
|
|
* repository.
|
|
*
|
|
* Depending on the state of the #OstreeAsyncProgress, either displays a
|
|
* custom status message, or else outstanding fetch progress in bytes/sec,
|
|
* or else outstanding content or metadata writes to the repository in
|
|
* number of objects.
|
|
*
|
|
* Compatibility note: this function previously assumed that @user_data
|
|
* was a pointer to a #GSConsole instance. This is no longer the case,
|
|
* and @user_data is ignored.
|
|
**/
|
|
void
|
|
ostree_repo_pull_default_console_progress_changed (OstreeAsyncProgress *progress,
|
|
gpointer user_data)
|
|
{
|
|
GString *buf;
|
|
g_autofree char *status = NULL;
|
|
guint outstanding_fetches;
|
|
guint outstanding_metadata_fetches;
|
|
guint outstanding_writes;
|
|
guint n_scanned_metadata;
|
|
guint fetched_delta_parts;
|
|
guint total_delta_parts;
|
|
|
|
/* Historical note; we used to treat this as a GSConsole instance */
|
|
if (user_data == NULL)
|
|
return;
|
|
|
|
buf = g_string_new ("");
|
|
|
|
status = ostree_async_progress_get_status (progress);
|
|
outstanding_fetches = ostree_async_progress_get_uint (progress, "outstanding-fetches");
|
|
outstanding_metadata_fetches = ostree_async_progress_get_uint (progress, "outstanding-metadata-fetches");
|
|
outstanding_writes = ostree_async_progress_get_uint (progress, "outstanding-writes");
|
|
n_scanned_metadata = ostree_async_progress_get_uint (progress, "scanned-metadata");
|
|
fetched_delta_parts = ostree_async_progress_get_uint (progress, "fetched-delta-parts");
|
|
total_delta_parts = ostree_async_progress_get_uint (progress, "total-delta-parts");
|
|
|
|
if (status)
|
|
{
|
|
g_string_append (buf, status);
|
|
}
|
|
else if (outstanding_fetches)
|
|
{
|
|
guint64 bytes_transferred = ostree_async_progress_get_uint64 (progress, "bytes-transferred");
|
|
guint fetched = ostree_async_progress_get_uint (progress, "fetched");
|
|
guint metadata_fetched = ostree_async_progress_get_uint (progress, "metadata-fetched");
|
|
guint requested = ostree_async_progress_get_uint (progress, "requested");
|
|
guint64 start_time = ostree_async_progress_get_uint64 (progress, "start-time");
|
|
guint64 total_delta_part_size = ostree_async_progress_get_uint64 (progress, "total-delta-part-size");
|
|
guint64 current_time = g_get_monotonic_time ();
|
|
g_autofree char *formatted_bytes_transferred =
|
|
g_format_size_full (bytes_transferred, 0);
|
|
g_autofree char *formatted_bytes_sec = NULL;
|
|
g_autofree char *formatted_est_time_remaining = NULL;
|
|
|
|
/* Ignore the first second, or when we haven't transferred any
|
|
* data, since those could cause divide by zero below.
|
|
*/
|
|
if ((current_time - start_time) < G_USEC_PER_SEC || bytes_transferred == 0)
|
|
{
|
|
formatted_bytes_sec = g_strdup ("-");
|
|
formatted_est_time_remaining = g_strdup ("- ");
|
|
}
|
|
else
|
|
{
|
|
guint64 bytes_sec = bytes_transferred / ((current_time - start_time) / G_USEC_PER_SEC);
|
|
guint64 est_time_remaining = (total_delta_part_size - bytes_transferred) / bytes_sec;
|
|
formatted_bytes_sec = g_format_size (bytes_sec);
|
|
formatted_est_time_remaining = _formatted_time_remaining_from_seconds (est_time_remaining);
|
|
}
|
|
|
|
if (total_delta_parts > 0)
|
|
{
|
|
g_autofree char *formatted_total =
|
|
g_format_size (total_delta_part_size);
|
|
/* No space between %s and remaining, since formatted_est_time_remaining has a trailing space */
|
|
g_string_append_printf (buf, "Receiving delta parts: %u/%u %s/s %s/%s %sremaining",
|
|
fetched_delta_parts, total_delta_parts,
|
|
formatted_bytes_sec, formatted_bytes_transferred,
|
|
formatted_total, formatted_est_time_remaining);
|
|
}
|
|
else if (outstanding_metadata_fetches)
|
|
{
|
|
g_string_append_printf (buf, "Receiving metadata objects: %u/(estimating) %s/s %s",
|
|
metadata_fetched, formatted_bytes_sec, formatted_bytes_transferred);
|
|
}
|
|
else
|
|
{
|
|
g_string_append_printf (buf, "Receiving objects: %u%% (%u/%u) %s/s %s",
|
|
(guint)((((double)fetched) / requested) * 100),
|
|
fetched, requested, formatted_bytes_sec, formatted_bytes_transferred);
|
|
}
|
|
}
|
|
else if (outstanding_writes)
|
|
{
|
|
g_string_append_printf (buf, "Writing objects: %u", outstanding_writes);
|
|
}
|
|
else
|
|
{
|
|
g_string_append_printf (buf, "Scanning metadata: %u", n_scanned_metadata);
|
|
}
|
|
|
|
glnx_console_text (buf->str);
|
|
|
|
g_string_free (buf, TRUE);
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_append_gpg_signature:
|
|
* @self: Self
|
|
* @commit_checksum: SHA256 of given commit to sign
|
|
* @signature_bytes: Signature data
|
|
* @cancellable: A #GCancellable
|
|
* @error: a #GError
|
|
*
|
|
* Append a GPG signature to a commit.
|
|
*/
|
|
gboolean
|
|
ostree_repo_append_gpg_signature (OstreeRepo *self,
|
|
const gchar *commit_checksum,
|
|
GBytes *signature_bytes,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
gboolean ret = FALSE;
|
|
g_autoptr(GVariant) metadata = NULL;
|
|
g_autoptr(GVariant) new_metadata = NULL;
|
|
|
|
if (!ostree_repo_read_commit_detached_metadata (self,
|
|
commit_checksum,
|
|
&metadata,
|
|
cancellable,
|
|
error))
|
|
goto out;
|
|
|
|
new_metadata = _ostree_detached_metadata_append_gpg_sig (metadata, signature_bytes);
|
|
|
|
if (!ostree_repo_write_commit_detached_metadata (self,
|
|
commit_checksum,
|
|
new_metadata,
|
|
cancellable,
|
|
error))
|
|
goto out;
|
|
|
|
ret = TRUE;
|
|
out:
|
|
return ret;
|
|
}
|
|
|
|
static gboolean
|
|
sign_data (OstreeRepo *self,
|
|
GBytes *input_data,
|
|
const gchar *key_id,
|
|
const gchar *homedir,
|
|
GBytes **out_signature,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
gboolean ret = FALSE;
|
|
g_autoptr(GFile) tmp_signature_file = NULL;
|
|
g_autoptr(GOutputStream) tmp_signature_output = NULL;
|
|
gpgme_ctx_t context = NULL;
|
|
g_autoptr(GBytes) ret_signature = NULL;
|
|
gpgme_engine_info_t info;
|
|
gpgme_error_t err;
|
|
gpgme_key_t key = NULL;
|
|
gpgme_data_t commit_buffer = NULL;
|
|
gpgme_data_t signature_buffer = NULL;
|
|
GMappedFile *signature_file = NULL;
|
|
|
|
if (!gs_file_open_in_tmpdir (self->tmp_dir, 0644,
|
|
&tmp_signature_file, &tmp_signature_output,
|
|
cancellable, error))
|
|
goto out;
|
|
|
|
if ((err = gpgme_new (&context)) != GPG_ERR_NO_ERROR)
|
|
{
|
|
ot_gpgme_error_to_gio_error (err, error);
|
|
g_prefix_error (error, "Unable to create gpg context: ");
|
|
goto out;
|
|
}
|
|
|
|
info = gpgme_ctx_get_engine_info (context);
|
|
|
|
if ((err = gpgme_set_protocol (context, GPGME_PROTOCOL_OpenPGP)) !=
|
|
GPG_ERR_NO_ERROR)
|
|
{
|
|
ot_gpgme_error_to_gio_error (err, error);
|
|
g_prefix_error (error, "Unable to set gpg protocol: ");
|
|
goto out;
|
|
}
|
|
|
|
if (homedir != NULL)
|
|
{
|
|
if ((err = gpgme_ctx_set_engine_info (context, info->protocol, NULL, homedir))
|
|
!= GPG_ERR_NO_ERROR)
|
|
{
|
|
ot_gpgme_error_to_gio_error (err, error);
|
|
g_prefix_error (error, "Unable to set gpg homedir to '%s': ",
|
|
homedir);
|
|
goto out;
|
|
}
|
|
}
|
|
|
|
/* Get the secret keys with the given key id */
|
|
err = gpgme_get_key (context, key_id, &key, 1);
|
|
if (gpgme_err_code (err) == GPG_ERR_EOF)
|
|
{
|
|
g_set_error (error, G_IO_ERROR, G_IO_ERROR_FAILED,
|
|
"No gpg key found with ID %s (homedir: %s)", key_id,
|
|
homedir ? homedir : "<default>");
|
|
goto out;
|
|
}
|
|
else if (err != GPG_ERR_NO_ERROR)
|
|
{
|
|
ot_gpgme_error_to_gio_error (err, error);
|
|
g_prefix_error (error, "Unable to lookup key ID %s: ", key_id);
|
|
goto out;
|
|
}
|
|
|
|
/* Add the key to the context as a signer */
|
|
if ((err = gpgme_signers_add (context, key)) != GPG_ERR_NO_ERROR)
|
|
{
|
|
ot_gpgme_error_to_gio_error (err, error);
|
|
g_prefix_error (error, "Error signing commit: ");
|
|
goto out;
|
|
}
|
|
|
|
{
|
|
gsize len;
|
|
const char *buf = g_bytes_get_data (input_data, &len);
|
|
if ((err = gpgme_data_new_from_mem (&commit_buffer, buf, len, FALSE)) != GPG_ERR_NO_ERROR)
|
|
{
|
|
ot_gpgme_error_to_gio_error (err, error);
|
|
g_prefix_error (error, "Failed to create buffer from commit file: ");
|
|
goto out;
|
|
}
|
|
}
|
|
|
|
signature_buffer = ot_gpgme_data_output (tmp_signature_output);
|
|
|
|
if ((err = gpgme_op_sign (context, commit_buffer, signature_buffer, GPGME_SIG_MODE_DETACH))
|
|
!= GPG_ERR_NO_ERROR)
|
|
{
|
|
ot_gpgme_error_to_gio_error (err, error);
|
|
g_prefix_error (error, "Failure signing commit file: ");
|
|
goto out;
|
|
}
|
|
|
|
if (!g_output_stream_close (tmp_signature_output, cancellable, error))
|
|
goto out;
|
|
|
|
signature_file = g_mapped_file_new (gs_file_get_path_cached (tmp_signature_file), FALSE, error);
|
|
if (!signature_file)
|
|
goto out;
|
|
ret_signature = g_mapped_file_get_bytes (signature_file);
|
|
|
|
ret = TRUE;
|
|
if (out_signature)
|
|
*out_signature = g_steal_pointer (&ret_signature);
|
|
out:
|
|
if (commit_buffer)
|
|
gpgme_data_release (commit_buffer);
|
|
if (signature_buffer)
|
|
gpgme_data_release (signature_buffer);
|
|
if (key)
|
|
gpgme_key_release (key);
|
|
if (context)
|
|
gpgme_release (context);
|
|
if (signature_file)
|
|
g_mapped_file_unref (signature_file);
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_sign_commit:
|
|
* @self: Self
|
|
* @commit_checksum: SHA256 of given commit to sign
|
|
* @key_id: Use this GPG key id
|
|
* @homedir: (allow-none): GPG home directory, or %NULL
|
|
* @cancellable: A #GCancellable
|
|
* @error: a #GError
|
|
*
|
|
* Add a GPG signature to a commit.
|
|
*/
|
|
gboolean
|
|
ostree_repo_sign_commit (OstreeRepo *self,
|
|
const gchar *commit_checksum,
|
|
const gchar *key_id,
|
|
const gchar *homedir,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
gboolean ret = FALSE;
|
|
g_autoptr(GBytes) commit_data = NULL;
|
|
g_autoptr(GBytes) signature = NULL;
|
|
g_autoptr(GVariant) commit_variant = NULL;
|
|
g_autoptr(GVariant) old_metadata = NULL;
|
|
g_autoptr(GVariant) new_metadata = NULL;
|
|
glnx_unref_object OstreeGpgVerifyResult *result = NULL;
|
|
GError *local_error = NULL;
|
|
|
|
if (!ostree_repo_load_variant (self, OSTREE_OBJECT_TYPE_COMMIT,
|
|
commit_checksum, &commit_variant, error))
|
|
{
|
|
g_prefix_error (error, "Failed to read commit: ");
|
|
goto out;
|
|
}
|
|
|
|
if (!ostree_repo_read_commit_detached_metadata (self,
|
|
commit_checksum,
|
|
&old_metadata,
|
|
cancellable,
|
|
error))
|
|
{
|
|
g_prefix_error (error, "Failed to read detached metadata: ");
|
|
goto out;
|
|
}
|
|
|
|
commit_data = g_variant_get_data_as_bytes (commit_variant);
|
|
|
|
/* The verify operation is merely to parse any existing signatures to
|
|
* check if the commit has already been signed with the given key ID.
|
|
* We want to avoid storing duplicate signatures in the metadata. */
|
|
result = _ostree_repo_gpg_verify_with_metadata (self,
|
|
commit_data,
|
|
old_metadata,
|
|
NULL, NULL, NULL,
|
|
cancellable,
|
|
&local_error);
|
|
|
|
/* "Not found" just means the commit is not yet signed. That's okay. */
|
|
if (g_error_matches (local_error, G_IO_ERROR, G_IO_ERROR_NOT_FOUND))
|
|
{
|
|
g_clear_error (&local_error);
|
|
}
|
|
else if (local_error != NULL)
|
|
{
|
|
g_propagate_error (error, local_error);
|
|
goto out;
|
|
}
|
|
else if (ostree_gpg_verify_result_lookup (result, key_id, NULL))
|
|
{
|
|
g_set_error (error, G_IO_ERROR, G_IO_ERROR_EXISTS,
|
|
"Commit is already signed with GPG key %s", key_id);
|
|
goto out;
|
|
}
|
|
|
|
if (!sign_data (self, commit_data, key_id, homedir,
|
|
&signature, cancellable, error))
|
|
goto out;
|
|
|
|
new_metadata = _ostree_detached_metadata_append_gpg_sig (old_metadata, signature);
|
|
|
|
if (!ostree_repo_write_commit_detached_metadata (self,
|
|
commit_checksum,
|
|
new_metadata,
|
|
cancellable,
|
|
error))
|
|
goto out;
|
|
|
|
ret = TRUE;
|
|
out:
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_sign_delta:
|
|
*
|
|
* This function is deprecated, sign the summary file instead.
|
|
* Add a GPG signature to a static delta.
|
|
*/
|
|
gboolean
|
|
ostree_repo_sign_delta (OstreeRepo *self,
|
|
const gchar *from_commit,
|
|
const gchar *to_commit,
|
|
const gchar *key_id,
|
|
const gchar *homedir,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{ g_set_error (error, G_IO_ERROR, G_IO_ERROR_NOT_SUPPORTED,
|
|
"ostree_repo_sign_delta is deprecated");
|
|
return FALSE;
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_add_gpg_signature_summary:
|
|
* @self: Self
|
|
* @key_id: NULL-terminated array of GPG keys.
|
|
* @homedir: (allow-none): GPG home directory, or %NULL
|
|
* @cancellable: A #GCancellable
|
|
* @error: a #GError
|
|
*
|
|
* Add a GPG signature to a static delta.
|
|
*/
|
|
gboolean
|
|
ostree_repo_add_gpg_signature_summary (OstreeRepo *self,
|
|
const gchar **key_id,
|
|
const gchar *homedir,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
gboolean ret = FALSE;
|
|
g_autoptr(GBytes) summary_data = NULL;
|
|
g_autoptr(GVariant) existing_signatures = NULL;
|
|
g_autoptr(GVariant) new_metadata = NULL;
|
|
g_autoptr(GVariant) normalized = NULL;
|
|
guint i;
|
|
|
|
summary_data = ot_file_mapat_bytes (self->repo_dir_fd, "summary", error);
|
|
if (!summary_data)
|
|
goto out;
|
|
|
|
if (!ot_util_variant_map_at (self->repo_dir_fd, "summary.sig",
|
|
G_VARIANT_TYPE (OSTREE_SUMMARY_SIG_GVARIANT_STRING),
|
|
OT_VARIANT_MAP_ALLOW_NOENT, &existing_signatures, error))
|
|
goto out;
|
|
|
|
for (i = 0; key_id[i]; i++)
|
|
{
|
|
g_autoptr(GBytes) signature_data = NULL;
|
|
if (!sign_data (self, summary_data, key_id[i], homedir,
|
|
&signature_data,
|
|
cancellable, error))
|
|
goto out;
|
|
|
|
new_metadata = _ostree_detached_metadata_append_gpg_sig (existing_signatures, signature_data);
|
|
}
|
|
|
|
normalized = g_variant_get_normal_form (new_metadata);
|
|
|
|
if (!_ostree_repo_file_replace_contents (self,
|
|
self->repo_dir_fd,
|
|
"summary.sig",
|
|
g_variant_get_data (normalized),
|
|
g_variant_get_size (normalized),
|
|
cancellable, error))
|
|
goto out;
|
|
|
|
ret = TRUE;
|
|
out:
|
|
return ret;
|
|
}
|
|
|
|
/* Special remote for _ostree_repo_gpg_verify_with_metadata() */
|
|
static const char *OSTREE_ALL_REMOTES = "__OSTREE_ALL_REMOTES__";
|
|
|
|
static GFile *
|
|
find_keyring (OstreeRepo *self,
|
|
OstreeRemote *remote,
|
|
GCancellable *cancellable)
|
|
{
|
|
g_autoptr(GFile) remotes_d = NULL;
|
|
g_autoptr(GFile) file = NULL;
|
|
file = g_file_get_child (self->repodir, remote->keyring);
|
|
|
|
if (g_file_query_exists (file, cancellable))
|
|
{
|
|
return g_steal_pointer (&file);
|
|
}
|
|
|
|
remotes_d = get_remotes_d_dir (self);
|
|
if (remotes_d)
|
|
{
|
|
g_autoptr(GFile) file2 = g_file_get_child (remotes_d, remote->keyring);
|
|
|
|
if (g_file_query_exists (file2, cancellable))
|
|
return g_steal_pointer (&file2);
|
|
}
|
|
|
|
if (self->parent_repo)
|
|
return find_keyring (self->parent_repo, remote, cancellable);
|
|
|
|
return NULL;
|
|
}
|
|
|
|
static OstreeGpgVerifyResult *
|
|
_ostree_repo_gpg_verify_data_internal (OstreeRepo *self,
|
|
const gchar *remote_name,
|
|
GBytes *data,
|
|
GBytes *signatures,
|
|
GFile *keyringdir,
|
|
GFile *extra_keyring,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
glnx_unref_object OstreeGpgVerifier *verifier = NULL;
|
|
gboolean add_global_keyring_dir = TRUE;
|
|
|
|
verifier = _ostree_gpg_verifier_new ();
|
|
|
|
if (remote_name == OSTREE_ALL_REMOTES)
|
|
{
|
|
/* Add all available remote keyring files. */
|
|
|
|
if (!_ostree_gpg_verifier_add_keyring_dir (verifier, self->repodir,
|
|
cancellable, error))
|
|
return NULL;
|
|
}
|
|
else if (remote_name != NULL)
|
|
{
|
|
/* Add the remote's keyring file if it exists. */
|
|
|
|
OstreeRemote *remote;
|
|
g_autoptr(GFile) file = NULL;
|
|
|
|
remote = ost_repo_get_remote_inherited (self, remote_name, error);
|
|
if (remote == NULL)
|
|
return NULL;
|
|
|
|
file = find_keyring (self, remote, cancellable);
|
|
|
|
if (file != NULL)
|
|
{
|
|
_ostree_gpg_verifier_add_keyring (verifier, file);
|
|
add_global_keyring_dir = FALSE;
|
|
}
|
|
|
|
ost_remote_unref (remote);
|
|
}
|
|
|
|
if (add_global_keyring_dir)
|
|
{
|
|
/* Use the deprecated global keyring directory. */
|
|
if (!_ostree_gpg_verifier_add_global_keyring_dir (verifier, cancellable, error))
|
|
return NULL;
|
|
}
|
|
|
|
if (keyringdir)
|
|
{
|
|
if (!_ostree_gpg_verifier_add_keyring_dir (verifier, keyringdir,
|
|
cancellable, error))
|
|
return NULL;
|
|
}
|
|
if (extra_keyring != NULL)
|
|
{
|
|
_ostree_gpg_verifier_add_keyring (verifier, extra_keyring);
|
|
}
|
|
|
|
return _ostree_gpg_verifier_check_signature (verifier,
|
|
data,
|
|
signatures,
|
|
cancellable,
|
|
error);
|
|
}
|
|
|
|
OstreeGpgVerifyResult *
|
|
_ostree_repo_gpg_verify_with_metadata (OstreeRepo *self,
|
|
GBytes *signed_data,
|
|
GVariant *metadata,
|
|
const char *remote_name,
|
|
GFile *keyringdir,
|
|
GFile *extra_keyring,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
g_autoptr(GVariant) signaturedata = NULL;
|
|
GByteArray *buffer;
|
|
GVariantIter iter;
|
|
GVariant *child;
|
|
g_autoptr (GBytes) signatures = NULL;
|
|
|
|
if (metadata)
|
|
signaturedata = g_variant_lookup_value (metadata,
|
|
_OSTREE_METADATA_GPGSIGS_NAME,
|
|
_OSTREE_METADATA_GPGSIGS_TYPE);
|
|
if (!signaturedata)
|
|
{
|
|
g_set_error (error, G_IO_ERROR, G_IO_ERROR_NOT_FOUND,
|
|
"GPG verification enabled, but no signatures found (use gpg-verify=false in remote config to disable)");
|
|
return NULL;
|
|
}
|
|
|
|
/* OpenPGP data is organized into binary records called packets. RFC 4880
|
|
* defines a packet as a chunk of data that has a tag specifying its meaning,
|
|
* and consists of a packet header followed by a packet body. Each packet
|
|
* encodes its own length, and so packets can be concatenated to construct
|
|
* OpenPGP messages, keyrings, or in this case, detached signatures.
|
|
*
|
|
* Each binary blob in the GVariant list is a complete signature packet, so
|
|
* we can concatenate them together to verify all the signatures at once. */
|
|
buffer = g_byte_array_new ();
|
|
g_variant_iter_init (&iter, signaturedata);
|
|
while ((child = g_variant_iter_next_value (&iter)) != NULL)
|
|
{
|
|
g_byte_array_append (buffer,
|
|
g_variant_get_data (child),
|
|
g_variant_get_size (child));
|
|
g_variant_unref (child);
|
|
}
|
|
signatures = g_byte_array_free_to_bytes (buffer);
|
|
|
|
return _ostree_repo_gpg_verify_data_internal (self,
|
|
remote_name,
|
|
signed_data,
|
|
signatures,
|
|
keyringdir,
|
|
extra_keyring,
|
|
cancellable,
|
|
error);
|
|
}
|
|
|
|
/* Needed an internal version for the remote_name parameter. */
|
|
OstreeGpgVerifyResult *
|
|
_ostree_repo_verify_commit_internal (OstreeRepo *self,
|
|
const char *commit_checksum,
|
|
const char *remote_name,
|
|
GFile *keyringdir,
|
|
GFile *extra_keyring,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
OstreeGpgVerifyResult *result = NULL;
|
|
g_autoptr(GVariant) commit_variant = NULL;
|
|
g_autoptr(GVariant) metadata = NULL;
|
|
g_autoptr(GBytes) signed_data = NULL;
|
|
|
|
/* Load the commit */
|
|
if (!ostree_repo_load_variant (self, OSTREE_OBJECT_TYPE_COMMIT,
|
|
commit_checksum, &commit_variant,
|
|
error))
|
|
{
|
|
g_prefix_error (error, "Failed to read commit: ");
|
|
goto out;
|
|
}
|
|
|
|
/* Load the metadata */
|
|
if (!ostree_repo_read_commit_detached_metadata (self,
|
|
commit_checksum,
|
|
&metadata,
|
|
cancellable,
|
|
error))
|
|
{
|
|
g_prefix_error (error, "Failed to read detached metadata: ");
|
|
goto out;
|
|
}
|
|
|
|
signed_data = g_variant_get_data_as_bytes (commit_variant);
|
|
|
|
/* XXX This is a hackish way to indicate to use ALL remote-specific
|
|
* keyrings in the signature verification. We want this when
|
|
* verifying a signed commit that's already been pulled. */
|
|
if (remote_name == NULL)
|
|
remote_name = OSTREE_ALL_REMOTES;
|
|
|
|
result = _ostree_repo_gpg_verify_with_metadata (self,
|
|
signed_data,
|
|
metadata,
|
|
remote_name,
|
|
keyringdir,
|
|
extra_keyring,
|
|
cancellable,
|
|
error);
|
|
|
|
out:
|
|
return result;
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_verify_commit:
|
|
* @self: Repository
|
|
* @commit_checksum: ASCII SHA256 checksum
|
|
* @keyringdir: (allow-none): Path to directory GPG keyrings; overrides built-in default if given
|
|
* @extra_keyring: (allow-none): Path to additional keyring file (not a directory)
|
|
* @cancellable: Cancellable
|
|
* @error: Error
|
|
*
|
|
* Check for a valid GPG signature on commit named by the ASCII
|
|
* checksum @commit_checksum.
|
|
*
|
|
* Returns: %TRUE if there was a GPG signature from a trusted keyring, otherwise %FALSE
|
|
*/
|
|
gboolean
|
|
ostree_repo_verify_commit (OstreeRepo *self,
|
|
const gchar *commit_checksum,
|
|
GFile *keyringdir,
|
|
GFile *extra_keyring,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
glnx_unref_object OstreeGpgVerifyResult *result = NULL;
|
|
|
|
result = ostree_repo_verify_commit_ext (self, commit_checksum,
|
|
keyringdir, extra_keyring,
|
|
cancellable, error);
|
|
|
|
return ostree_gpg_verify_result_require_valid_signature (result, error);
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_verify_commit_ext:
|
|
* @self: Repository
|
|
* @commit_checksum: ASCII SHA256 checksum
|
|
* @keyringdir: (allow-none): Path to directory GPG keyrings; overrides built-in default if given
|
|
* @extra_keyring: (allow-none): Path to additional keyring file (not a directory)
|
|
* @cancellable: Cancellable
|
|
* @error: Error
|
|
*
|
|
* Read GPG signature(s) on the commit named by the ASCII checksum
|
|
* @commit_checksum and return detailed results.
|
|
*
|
|
* Returns: (transfer full): an #OstreeGpgVerifyResult, or %NULL on error
|
|
*/
|
|
OstreeGpgVerifyResult *
|
|
ostree_repo_verify_commit_ext (OstreeRepo *self,
|
|
const gchar *commit_checksum,
|
|
GFile *keyringdir,
|
|
GFile *extra_keyring,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
return _ostree_repo_verify_commit_internal (self,
|
|
commit_checksum,
|
|
NULL,
|
|
keyringdir,
|
|
extra_keyring,
|
|
cancellable,
|
|
error);
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_gpg_verify_data:
|
|
* @self: Repository
|
|
* @remote_name: (nullable): Name of remote
|
|
* @data: Data as a #GBytes
|
|
* @signatures: Signatures as a #GBytes
|
|
* @keyringdir: (nullable): Path to directory GPG keyrings; overrides built-in default if given
|
|
* @extra_keyring: (nullable): Path to additional keyring file (not a directory)
|
|
* @cancellable: Cancellable
|
|
* @error: Error
|
|
*
|
|
* Verify @signatures for @data using GPG keys in the keyring for
|
|
* @remote_name, and return an #OstreeGpgVerifyResult.
|
|
*
|
|
* The @remote_name parameter can be %NULL. In that case it will do
|
|
* the verifications using GPG keys in the keyrings of all remotes.
|
|
*
|
|
* Returns: (transfer full): an #OstreeGpgVerifyResult, or %NULL on error
|
|
*/
|
|
OstreeGpgVerifyResult *
|
|
ostree_repo_gpg_verify_data (OstreeRepo *self,
|
|
const gchar *remote_name,
|
|
GBytes *data,
|
|
GBytes *signatures,
|
|
GFile *keyringdir,
|
|
GFile *extra_keyring,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
g_return_val_if_fail (OSTREE_IS_REPO (self), NULL);
|
|
g_return_val_if_fail (data != NULL, NULL);
|
|
g_return_val_if_fail (signatures != NULL, NULL);
|
|
|
|
return _ostree_repo_gpg_verify_data_internal (self,
|
|
(remote_name != NULL) ? remote_name : OSTREE_ALL_REMOTES,
|
|
data,
|
|
signatures,
|
|
keyringdir,
|
|
extra_keyring,
|
|
cancellable,
|
|
error);
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_verify_summary:
|
|
* @self: Repo
|
|
* @remote_name: Name of remote
|
|
* @summary: Summary data as a #GBytes
|
|
* @signatures: Summary signatures as a #GBytes
|
|
* @cancellable: Cancellable
|
|
* @error: Error
|
|
*
|
|
* Verify @signatures for @summary data using GPG keys in the keyring for
|
|
* @remote_name, and return an #OstreeGpgVerifyResult.
|
|
*
|
|
* Returns: (transfer full): an #OstreeGpgVerifyResult, or %NULL on error
|
|
*/
|
|
OstreeGpgVerifyResult *
|
|
ostree_repo_verify_summary (OstreeRepo *self,
|
|
const char *remote_name,
|
|
GBytes *summary,
|
|
GBytes *signatures,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
g_autoptr(GVariant) signatures_variant = NULL;
|
|
|
|
g_return_val_if_fail (OSTREE_IS_REPO (self), NULL);
|
|
g_return_val_if_fail (remote_name != NULL, NULL);
|
|
g_return_val_if_fail (summary != NULL, NULL);
|
|
g_return_val_if_fail (signatures != NULL, NULL);
|
|
|
|
signatures_variant = g_variant_new_from_bytes (OSTREE_SUMMARY_SIG_GVARIANT_FORMAT,
|
|
signatures, FALSE);
|
|
|
|
return _ostree_repo_gpg_verify_with_metadata (self,
|
|
summary,
|
|
signatures_variant,
|
|
remote_name,
|
|
NULL, NULL,
|
|
cancellable,
|
|
error);
|
|
}
|
|
|
|
/**
|
|
* ostree_repo_regenerate_summary:
|
|
* @self: Repo
|
|
* @additional_metadata: (allow-none): A GVariant of type a{sv}, or %NULL
|
|
* @cancellable: Cancellable
|
|
* @error: Error
|
|
*
|
|
* An OSTree repository can contain a high level "summary" file that
|
|
* describes the available branches and other metadata.
|
|
*
|
|
* It is regenerated automatically after a commit if
|
|
* `core/commit-update-summary` is set.
|
|
*/
|
|
gboolean
|
|
ostree_repo_regenerate_summary (OstreeRepo *self,
|
|
GVariant *additional_metadata,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
gboolean ret = FALSE;
|
|
g_autoptr(GHashTable) refs = NULL;
|
|
g_autoptr(GVariantBuilder) refs_builder = NULL;
|
|
g_autoptr(GVariant) summary = NULL;
|
|
GList *ordered_keys = NULL;
|
|
GList *iter = NULL;
|
|
g_auto(GVariantDict) additional_metadata_builder = {{0,}};
|
|
|
|
if (!ostree_repo_list_refs (self, NULL, &refs, cancellable, error))
|
|
goto out;
|
|
|
|
g_variant_dict_init (&additional_metadata_builder, additional_metadata);
|
|
refs_builder = g_variant_builder_new (G_VARIANT_TYPE ("a(s(taya{sv}))"));
|
|
|
|
ordered_keys = g_hash_table_get_keys (refs);
|
|
ordered_keys = g_list_sort (ordered_keys, (GCompareFunc)strcmp);
|
|
|
|
for (iter = ordered_keys; iter; iter = iter->next)
|
|
{
|
|
const char *ref = iter->data;
|
|
const char *commit = g_hash_table_lookup (refs, ref);
|
|
g_autoptr(GVariant) commit_obj = NULL;
|
|
|
|
g_assert (commit);
|
|
|
|
if (!ostree_repo_load_variant (self, OSTREE_OBJECT_TYPE_COMMIT, commit, &commit_obj, error))
|
|
goto out;
|
|
|
|
g_variant_builder_add_value (refs_builder,
|
|
g_variant_new ("(s(t@ay@a{sv}))", ref,
|
|
(guint64) g_variant_get_size (commit_obj),
|
|
ostree_checksum_to_bytes_v (commit),
|
|
ot_gvariant_new_empty_string_dict ()));
|
|
}
|
|
|
|
|
|
{
|
|
guint i;
|
|
g_autoptr(GPtrArray) delta_names = NULL;
|
|
g_auto(GVariantDict) deltas_builder = {{0,}};
|
|
g_autoptr(GVariant) deltas = NULL;
|
|
|
|
if (!ostree_repo_list_static_delta_names (self, &delta_names, cancellable, error))
|
|
goto out;
|
|
|
|
g_variant_dict_init (&deltas_builder, NULL);
|
|
for (i = 0; i < delta_names->len; i++)
|
|
{
|
|
g_autofree char *from = NULL;
|
|
g_autofree char *to = NULL;
|
|
g_autofree guchar *csum = NULL;
|
|
g_autofree char *superblock = NULL;
|
|
glnx_fd_close int superblock_file_fd = -1;
|
|
g_autoptr(GInputStream) in_stream = NULL;
|
|
|
|
_ostree_parse_delta_name (delta_names->pdata[i], &from, &to);
|
|
superblock = _ostree_get_relative_static_delta_superblock_path ((from && from[0]) ? from : NULL, to);
|
|
superblock_file_fd = openat (self->repo_dir_fd, superblock, O_RDONLY | O_CLOEXEC);
|
|
if (superblock_file_fd == -1)
|
|
{
|
|
glnx_set_error_from_errno (error);
|
|
goto out;
|
|
}
|
|
|
|
in_stream = g_unix_input_stream_new (superblock_file_fd, TRUE);
|
|
if (!in_stream)
|
|
goto out;
|
|
|
|
if (!ot_gio_checksum_stream (in_stream,
|
|
&csum,
|
|
cancellable,
|
|
error))
|
|
goto out;
|
|
|
|
g_variant_dict_insert_value (&deltas_builder, delta_names->pdata[i], ot_gvariant_new_bytearray (csum, 32));
|
|
}
|
|
|
|
g_variant_dict_insert_value (&additional_metadata_builder, OSTREE_SUMMARY_STATIC_DELTAS, g_variant_dict_end (&deltas_builder));
|
|
}
|
|
|
|
{
|
|
g_autoptr(GVariantBuilder) summary_builder =
|
|
g_variant_builder_new (OSTREE_SUMMARY_GVARIANT_FORMAT);
|
|
|
|
g_variant_builder_add_value (summary_builder, g_variant_builder_end (refs_builder));
|
|
g_variant_builder_add_value (summary_builder, g_variant_dict_end (&additional_metadata_builder));
|
|
summary = g_variant_builder_end (summary_builder);
|
|
g_variant_ref_sink (summary);
|
|
}
|
|
|
|
if (!_ostree_repo_file_replace_contents (self,
|
|
self->repo_dir_fd,
|
|
"summary",
|
|
g_variant_get_data (summary),
|
|
g_variant_get_size (summary),
|
|
cancellable,
|
|
error))
|
|
goto out;
|
|
|
|
if (unlinkat (self->repo_dir_fd, "summary.sig", 0) < 0)
|
|
{
|
|
if (errno != ENOENT)
|
|
{
|
|
glnx_set_error_from_errno (error);
|
|
goto out;
|
|
}
|
|
}
|
|
|
|
ret = TRUE;
|
|
out:
|
|
if (ordered_keys)
|
|
g_list_free (ordered_keys);
|
|
return ret;
|
|
}
|
|
|
|
gboolean
|
|
_ostree_repo_is_locked_tmpdir (const char *filename)
|
|
{
|
|
return g_str_has_prefix (filename, OSTREE_REPO_TMPDIR_STAGING) ||
|
|
g_str_has_prefix (filename, OSTREE_REPO_TMPDIR_FETCHER);
|
|
}
|
|
|
|
gboolean
|
|
_ostree_repo_try_lock_tmpdir (int tmpdir_dfd,
|
|
const char *tmpdir_name,
|
|
GLnxLockFile *file_lock_out,
|
|
gboolean *out_did_lock,
|
|
GError **error)
|
|
{
|
|
gboolean ret = FALSE;
|
|
g_autofree char *lock_name = g_strconcat (tmpdir_name, "-lock", NULL);
|
|
gboolean did_lock = FALSE;
|
|
g_autoptr(GError) local_error = NULL;
|
|
|
|
/* We put the lock outside the dir, so we can hold the lock
|
|
* until the directory is fully removed */
|
|
if (!glnx_make_lock_file (tmpdir_dfd, lock_name, LOCK_EX | LOCK_NB,
|
|
file_lock_out, &local_error))
|
|
{
|
|
if (g_error_matches (local_error, G_IO_ERROR, G_IO_ERROR_WOULD_BLOCK))
|
|
{
|
|
did_lock = FALSE;
|
|
}
|
|
else
|
|
{
|
|
g_propagate_error (error, g_steal_pointer (&local_error));
|
|
goto out;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
did_lock = TRUE;
|
|
}
|
|
|
|
ret = TRUE;
|
|
*out_did_lock = did_lock;
|
|
out:
|
|
return ret;
|
|
}
|
|
|
|
/* This allocates and locks a subdir of the repo tmp dir, using an existing
|
|
* one with the same prefix if it is not in use already. */
|
|
gboolean
|
|
_ostree_repo_allocate_tmpdir (int tmpdir_dfd,
|
|
const char *tmpdir_prefix,
|
|
char **tmpdir_name_out,
|
|
int *tmpdir_fd_out,
|
|
GLnxLockFile *file_lock_out,
|
|
gboolean *reusing_dir_out,
|
|
GCancellable *cancellable,
|
|
GError **error)
|
|
{
|
|
gboolean ret = FALSE;
|
|
gboolean reusing_dir = FALSE;
|
|
gboolean did_lock;
|
|
g_autofree char *tmpdir_name = NULL;
|
|
glnx_fd_close int tmpdir_fd = -1;
|
|
g_auto(GLnxDirFdIterator) dfd_iter = { 0, };
|
|
|
|
g_return_val_if_fail (_ostree_repo_is_locked_tmpdir (tmpdir_prefix), FALSE);
|
|
|
|
/* Look for existing tmpdir (with same prefix) to reuse */
|
|
if (!glnx_dirfd_iterator_init_at (tmpdir_dfd, ".", FALSE, &dfd_iter, error))
|
|
goto out;
|
|
|
|
while (tmpdir_name == NULL)
|
|
{
|
|
struct dirent *dent;
|
|
glnx_fd_close int existing_tmpdir_fd = -1;
|
|
g_autoptr(GError) local_error = NULL;
|
|
|
|
if (!glnx_dirfd_iterator_next_dent (&dfd_iter, &dent, cancellable, error))
|
|
goto out;
|
|
|
|
if (dent == NULL)
|
|
break;
|
|
|
|
if (!g_str_has_prefix (dent->d_name, tmpdir_prefix))
|
|
continue;
|
|
|
|
/* Quickly skip non-dirs, if unknown we ignore ENOTDIR when opening instead */
|
|
if (dent->d_type != DT_UNKNOWN &&
|
|
dent->d_type != DT_DIR)
|
|
continue;
|
|
|
|
if (!glnx_opendirat (dfd_iter.fd, dent->d_name, FALSE,
|
|
&existing_tmpdir_fd, &local_error))
|
|
{
|
|
if (g_error_matches (local_error, G_IO_ERROR, G_IO_ERROR_NOT_DIRECTORY))
|
|
continue;
|
|
else
|
|
{
|
|
g_propagate_error (error, g_steal_pointer (&local_error));
|
|
goto out;
|
|
}
|
|
}
|
|
|
|
/* We put the lock outside the dir, so we can hold the lock
|
|
* until the directory is fully removed */
|
|
if (!_ostree_repo_try_lock_tmpdir (dfd_iter.fd, dent->d_name,
|
|
file_lock_out, &did_lock,
|
|
error))
|
|
goto out;
|
|
if (!did_lock)
|
|
continue;
|
|
|
|
/* Touch the reused directory so that we don't accidentally
|
|
* remove it due to being old when cleaning up the tmpdir
|
|
*/
|
|
(void)futimens (existing_tmpdir_fd, NULL);
|
|
|
|
/* We found an existing tmpdir which we managed to lock */
|
|
tmpdir_name = g_strdup (dent->d_name);
|
|
tmpdir_fd = glnx_steal_fd (&existing_tmpdir_fd);
|
|
reusing_dir = TRUE;
|
|
}
|
|
|
|
while (tmpdir_name == NULL)
|
|
{
|
|
g_autofree char *tmpdir_name_template = g_strconcat (tmpdir_prefix, "XXXXXX", NULL);
|
|
glnx_fd_close int new_tmpdir_fd = -1;
|
|
g_autoptr(GError) local_error = NULL;
|
|
|
|
/* No existing tmpdir found, create a new */
|
|
|
|
if (!glnx_mkdtempat (tmpdir_dfd, tmpdir_name_template, 0777, error))
|
|
goto out;
|
|
|
|
if (!glnx_opendirat (tmpdir_dfd, tmpdir_name_template, FALSE,
|
|
&new_tmpdir_fd, error))
|
|
goto out;
|
|
|
|
/* Note, at this point we can race with another process that picks up this
|
|
* new directory. If that happens we need to retry, making a new directory. */
|
|
if (!_ostree_repo_try_lock_tmpdir (tmpdir_dfd, tmpdir_name_template,
|
|
file_lock_out, &did_lock,
|
|
error))
|
|
goto out;
|
|
if (!did_lock)
|
|
continue;
|
|
|
|
tmpdir_name = g_steal_pointer (&tmpdir_name_template);
|
|
tmpdir_fd = glnx_steal_fd (&new_tmpdir_fd);
|
|
}
|
|
|
|
if (tmpdir_name_out)
|
|
*tmpdir_name_out = g_steal_pointer (&tmpdir_name);
|
|
|
|
if (tmpdir_fd_out)
|
|
*tmpdir_fd_out = glnx_steal_fd (&tmpdir_fd);
|
|
|
|
if (reusing_dir_out)
|
|
*reusing_dir_out = reusing_dir;
|
|
|
|
ret = TRUE;
|
|
out:
|
|
return ret;
|
|
}
|