summaryrefslogtreecommitdiffstats
path: root/lib/dpkg/db-fsys-digest.c
diff options
context:
space:
mode:
Diffstat (limited to '')
-rw-r--r--lib/dpkg/db-fsys-digest.c151
1 files changed, 151 insertions, 0 deletions
diff --git a/lib/dpkg/db-fsys-digest.c b/lib/dpkg/db-fsys-digest.c
new file mode 100644
index 0000000..5b32d91
--- /dev/null
+++ b/lib/dpkg/db-fsys-digest.c
@@ -0,0 +1,151 @@
+/*
+ * libdpkg - Debian packaging suite library routines
+ * db-fsys-digest.c - management of filesystem digests database
+ *
+ * Copyright © 2012-2014 Guillem Jover <guillem@debian.org>
+ *
+ * This is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 2 of the License, or
+ * (at your option) any later version.
+ *
+ * This is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see <https://www.gnu.org/licenses/>.
+ */
+
+#include <config.h>
+#include <compat.h>
+
+#include <sys/stat.h>
+
+#include <errno.h>
+#include <string.h>
+#include <stdio.h>
+#include <fcntl.h>
+#include <unistd.h>
+
+#include <dpkg/i18n.h>
+#include <dpkg/dpkg.h>
+#include <dpkg/dpkg-db.h>
+#include <dpkg/debug.h>
+#include <dpkg/fdio.h>
+#include <dpkg/dir.h>
+#include <dpkg/db-ctrl.h>
+#include <dpkg/db-fsys.h>
+
+/*
+ * If mask is nonzero, will not write any file whose fsys_namenode
+ * has any flag bits set in mask.
+ */
+void
+write_filehash_except(struct pkginfo *pkg, struct pkgbin *pkgbin,
+ struct fsys_namenode_list *list, enum fsys_namenode_flags mask)
+{
+ struct atomic_file *file;
+ const char *hashfile;
+
+ debug(dbg_general, "generating infodb hashfile");
+
+ if (pkg_infodb_has_file(pkg, &pkg->available, HASHFILE))
+ return;
+
+ hashfile = pkg_infodb_get_file(pkg, pkgbin, HASHFILE);
+
+ file = atomic_file_new(hashfile, 0);
+ atomic_file_open(file);
+
+ for (; list; list = list->next) {
+ struct fsys_namenode *namenode = list->namenode;
+
+ if (mask && (namenode->flags & mask))
+ continue;
+ if (strcmp(namenode->newhash, EMPTYHASHFLAG) == 0)
+ continue;
+
+ fprintf(file->fp, "%s %s\n",
+ namenode->newhash, namenode->name + 1);
+ }
+
+ atomic_file_sync(file);
+ atomic_file_close(file);
+ atomic_file_commit(file);
+ atomic_file_free(file);
+
+ dir_sync_path(pkg_infodb_get_dir());
+}
+
+static void
+parse_filehash_buffer(struct varbuf *buf,
+ struct pkginfo *pkg, struct pkgbin *pkgbin)
+{
+ char *thisline, *nextline;
+ const char *pkgname = pkg_name(pkg, pnaw_nonambig);
+ const char *buf_end = buf->buf + buf->used;
+
+ for (thisline = buf->buf; thisline < buf_end; thisline = nextline) {
+ struct fsys_namenode *namenode;
+ char *endline, *hash_end, *filename;
+
+ endline = memchr(thisline, '\n', buf_end - thisline);
+ if (endline == NULL)
+ ohshit(_("control file '%s' for package '%s' is "
+ "missing final newline"), HASHFILE, pkgname);
+
+ /* The md5sum hash has a constant length. */
+ hash_end = thisline + MD5HASHLEN;
+
+ filename = hash_end + 2;
+ if (filename + 1 > endline)
+ ohshit(_("control file '%s' for package '%s' is "
+ "missing value"), HASHFILE, pkgname);
+
+ if (hash_end[0] != ' ' || hash_end[1] != ' ')
+ ohshit(_("control file '%s' for package '%s' is "
+ "missing value separator"), HASHFILE, pkgname);
+ hash_end[0] = '\0';
+
+ /* Where to start next time around. */
+ nextline = endline + 1;
+
+ /* Strip trailing ‘/’. */
+ if (endline > thisline && endline[-1] == '/')
+ endline--;
+ *endline = '\0';
+
+ if (endline == thisline)
+ ohshit(_("control file '%s' for package '%s' "
+ "contains empty filename"), HASHFILE, pkgname);
+
+ debug(dbg_eachfiledetail, "load hash '%s' for filename '%s'",
+ thisline, filename);
+
+ /* Add the file to the list. */
+ namenode = fsys_hash_find_node(filename, 0);
+ namenode->newhash = nfstrsave(thisline);
+ }
+}
+
+void
+parse_filehash(struct pkginfo *pkg, struct pkgbin *pkgbin)
+{
+ const char *hashfile;
+ struct varbuf buf = VARBUF_INIT;
+ struct dpkg_error err = DPKG_ERROR_INIT;
+
+ hashfile = pkg_infodb_get_file(pkg, pkgbin, HASHFILE);
+
+ if (file_slurp(hashfile, &buf, &err) < 0 && err.syserrno != ENOENT)
+ dpkg_error_print(&err,
+ _("loading control file '%s' for package '%s'"),
+ HASHFILE, pkg_name(pkg, pnaw_nonambig));
+
+ if (buf.used > 0)
+ parse_filehash_buffer(&buf, pkg, pkgbin);
+
+ varbuf_destroy(&buf);
+}