59123d25babfa2d05cf373ead8ac04ec857af95a
1 /* vi: set noexpandtab sw=4 sts=4: */
2 /* opkg_download.c - the opkg package management system
6 Copyright (C) 2001 University of Southern California
7 Copyright (C) 2008 OpenMoko Inc
9 This program is free software; you can redistribute it and/or
10 modify it under the terms of the GNU General Public License as
11 published by the Free Software Foundation; either version 2, or (at
12 your option) any later version.
14 This program is distributed in the hope that it will be useful, but
15 WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
17 General Public License for more details.
24 #include "opkg_download.h"
25 #include "opkg_message.h"
27 #include "sprintf_alloc.h"
29 #include "file_util.h"
30 #include "opkg_defines.h"
31 #include "libbb/libbb.h"
33 static int str_starts_with(const char *str
, const char *prefix
)
35 return (strncmp(str
, prefix
, strlen(prefix
)) == 0);
38 int opkg_verify_integrity(pkg_t
*pkg
, const char *filename
)
41 char *file_md5
, *pkg_md5
;
42 char *file_sha256
, *pkg_sha256
;
44 long long int pkg_expected_size
;
47 err
= lstat(filename
, &pkg_stat
);
50 opkg_msg(ERROR
, "Failed to stat %s: %s\n",
51 filename
, strerror(errno
));
55 pkg_expected_size
= pkg_get_int(pkg
, PKG_SIZE
);
57 if (pkg_expected_size
> 0 && pkg_stat
.st_size
!= pkg_expected_size
) {
58 if (!conf
->force_checksum
) {
60 "Package size mismatch: %s is %lld bytes, expecting %lld bytes\n",
61 pkg
->name
, (long long int)pkg_stat
.st_size
, pkg_expected_size
);
65 "Ignored %s size mismatch.\n",
70 /* Check for md5 values */
71 pkg_md5
= pkg_get_md5(pkg
);
73 file_md5
= file_md5sum_alloc(filename
);
74 if (file_md5
&& strcmp(file_md5
, pkg_md5
)) {
75 if (!conf
->force_checksum
) {
76 opkg_msg(ERROR
, "Package %s md5sum mismatch. "
77 "Either the opkg or the package index are corrupt. "
78 "Try 'opkg update'.\n", pkg
->name
);
83 "Ignored %s md5sum mismatch.\n",
91 /* Check for sha256 value */
92 pkg_sha256
= pkg_get_sha256(pkg
);
94 file_sha256
= file_sha256sum_alloc(filename
);
95 if (file_sha256
&& strcmp(file_sha256
, pkg_sha256
)) {
96 if (!conf
->force_checksum
) {
98 "Package %s sha256sum mismatch. "
99 "Either the opkg or the package index are corrupt. "
100 "Try 'opkg update'.\n", pkg
->name
);
105 "Ignored %s sha256sum mismatch.\n",
117 opkg_download(const char *src
, const char *dest_file_name
,
118 const short hide_error
)
122 char *src_basec
= xstrdup(src
);
123 char *src_base
= basename(src_basec
);
124 char *tmp_file_location
;
126 opkg_msg(NOTICE
, "Downloading %s\n", src
);
128 if (str_starts_with(src
, "file:")) {
129 char *file_src
= urldecode_path(src
+ 5);
130 opkg_msg(INFO
, "Copying %s to %s...", file_src
, dest_file_name
);
131 err
= file_copy(file_src
, dest_file_name
);
132 opkg_msg(INFO
, "Done.\n");
138 sprintf_alloc(&tmp_file_location
, "%s/%s", conf
->tmp_dir
, src_base
);
140 err
= unlink(tmp_file_location
);
141 if (err
&& errno
!= ENOENT
) {
142 opkg_perror(ERROR
, "Failed to unlink %s", tmp_file_location
);
143 free(tmp_file_location
);
147 if (conf
->http_proxy
) {
149 "Setting environment variable: http_proxy = %s.\n",
151 setenv("http_proxy", conf
->http_proxy
, 1);
153 if (conf
->ftp_proxy
) {
155 "Setting environment variable: ftp_proxy = %s.\n",
157 setenv("ftp_proxy", conf
->ftp_proxy
, 1);
159 if (conf
->no_proxy
) {
161 "Setting environment variable: no_proxy = %s.\n",
163 setenv("no_proxy", conf
->no_proxy
, 1);
168 const char *argv
[11];
173 if (conf
->no_check_certificate
) {
174 argv
[i
++] = "--no-check-certificate";
176 if (conf
->http_timeout
) {
177 argv
[i
++] = "--timeout";
178 argv
[i
++] = conf
->http_timeout
;
180 if (conf
->http_proxy
|| conf
->ftp_proxy
) {
185 argv
[i
++] = tmp_file_location
;
192 "Failed to download %s, wget returned %d.\n",
196 "Check your network settings and connectivity.\n\n");
197 free(tmp_file_location
);
202 err
= file_move(tmp_file_location
, dest_file_name
);
204 free(tmp_file_location
);
209 static char* get_cache_filename(const char *dest_file_name
)
212 char *filename
= strrchr(dest_file_name
, '/');
214 cache_name
= xstrdup(filename
+ 1); // strip leading '/'
216 cache_name
= xstrdup(dest_file_name
);
221 opkg_download_cache(const char *src
, const char *dest_file_name
)
223 char *cache_name
, *cache_location
;
226 if (!conf
->cache
|| str_starts_with(src
, "file:")) {
227 err
= opkg_download(src
, dest_file_name
, 0);
231 if (!file_is_dir(conf
->cache
)) {
232 opkg_msg(ERROR
, "%s is not a directory.\n", conf
->cache
);
237 cache_name
= get_cache_filename(dest_file_name
);
238 sprintf_alloc(&cache_location
, "%s/%s", conf
->cache
, cache_name
);
239 if (file_exists(cache_location
))
240 opkg_msg(NOTICE
, "Copying %s.\n", cache_location
);
242 err
= opkg_download(src
, cache_location
, 0);
244 (void)unlink(cache_location
);
249 err
= file_copy(cache_location
, dest_file_name
);
252 free(cache_location
);
258 int opkg_download_pkg(pkg_t
* pkg
, const char *dir
)
262 char *local_filename
;
263 char *stripped_filename
;
264 char *urlencoded_path
;
267 char *cache_location
;
269 if (pkg
->src
== NULL
) {
271 "Package %s is not available from any configured src.\n",
276 filename
= pkg_get_string(pkg
, PKG_FILENAME
);
278 if (filename
== NULL
) {
280 "Package %s does not have a valid filename field.\n",
285 urlencoded_path
= urlencode_path(filename
);
286 sprintf_alloc(&url
, "%s/%s", pkg
->src
->value
, urlencoded_path
);
287 free(urlencoded_path
);
289 /* The filename might be something like
290 "../../foo.opk". While this is correct, and exactly what we
291 want to use to construct url above, here we actually need to
292 use just the filename part, without any directory. */
294 stripped_filename
= strrchr(filename
, '/');
295 if (!stripped_filename
)
296 stripped_filename
= filename
;
298 sprintf_alloc(&local_filename
, "%s/%s", dir
, stripped_filename
);
299 pkg_set_string(pkg
, PKG_LOCAL_FILENAME
, local_filename
);
301 /* Invalidate/remove cached package if it has an incorrect checksum. */
303 cache_name
= get_cache_filename(local_filename
);
304 sprintf_alloc(&cache_location
, "%s/%s", conf
->cache
, cache_name
);
306 if (file_exists(cache_location
)) {
307 err
= opkg_verify_integrity(pkg
, cache_location
);
310 "Removing %s from cache because it has incorrect checksum.\n",
312 unlink(cache_location
);
315 free(cache_location
);
318 err
= opkg_download_cache(url
, local_filename
);
325 * Downloads file from url, installs in package database, return package name.
327 int opkg_prepare_url_for_install(const char *url
, char **namep
)
331 abstract_pkg_t
*ab_pkg
;
335 if (str_starts_with(url
, "http://")
336 || str_starts_with(url
, "ftp://")) {
338 char *file_basec
= xstrdup(url
);
339 char *file_base
= basename(file_basec
);
341 sprintf_alloc(&tmp_file
, "%s/%s", conf
->tmp_dir
, file_base
);
342 err
= opkg_download(url
, tmp_file
, 0);
346 err
= pkg_init_from_file(pkg
, tmp_file
);
353 } else if (strcmp(&url
[strlen(url
) - 4], OPKG_PKG_EXTENSION
) == 0
354 || strcmp(&url
[strlen(url
) - 4], IPKG_PKG_EXTENSION
) == 0
355 || strcmp(&url
[strlen(url
) - 4], DPKG_PKG_EXTENSION
) == 0) {
357 err
= pkg_init_from_file(pkg
, url
);
360 opkg_msg(DEBUG2
, "Package %s provided by hand (%s).\n",
361 pkg
->name
, pkg_get_string(pkg
, PKG_LOCAL_FILENAME
));
362 pkg
->provided_by_hand
= 1;
365 ab_pkg
= ensure_abstract_pkg_by_name(url
);
367 if (!(ab_pkg
->state_flag
& SF_NEED_DETAIL
)) {
368 opkg_msg(DEBUG
, "applying abpkg flag to %s\n", ab_pkg
->name
);
369 ab_pkg
->state_flag
|= SF_NEED_DETAIL
;
377 pkg
->dest
= conf
->default_dest
;
378 pkg
->state_want
= SW_INSTALL
;
379 pkg
->state_flag
|= SF_PREFER
;
380 hash_insert_pkg(pkg
, 1);
383 *namep
= xstrdup(pkg
->name
);
388 int opkg_verify_file(char *text_file
, char *sig_file
)
390 #if defined HAVE_USIGN
391 const char *argv
[] = { conf
->verify_program
, "verify", sig_file
,
394 return xsystem(argv
) ? -1 : 0;
396 /* mute `unused variable' warnings. */