]> git.saurik.com Git - apt.git/blame - apt-pkg/acquire-item.cc
Add conflicting Signed-By values to error message
[apt.git] / apt-pkg / acquire-item.cc
CommitLineData
0118833a
AL
1// -*- mode: cpp; mode: fold -*-
2// Description /*{{{*/
b3d44315 3// $Id: acquire-item.cc,v 1.46.2.9 2004/01/16 18:51:11 mdz Exp $
0118833a
AL
4/* ######################################################################
5
6 Acquire Item - Item to acquire
7
8 Each item can download to exactly one file at a time. This means you
9 cannot create an item that fetches two uri's to two files at the same
10 time. The pkgAcqIndex class creates a second class upon instantiation
11 to fetch the other index files because of this.
b185acc2 12
0118833a
AL
13 ##################################################################### */
14 /*}}}*/
15// Include Files /*{{{*/
ea542140
DK
16#include <config.h>
17
0118833a
AL
18#include <apt-pkg/acquire-item.h>
19#include <apt-pkg/configuration.h>
e878aedb 20#include <apt-pkg/aptconfiguration.h>
b2e465d6 21#include <apt-pkg/sourcelist.h>
03e39e59 22#include <apt-pkg/error.h>
cdcc6d34 23#include <apt-pkg/strutl.h>
36375005 24#include <apt-pkg/fileutl.h>
ac5b205a 25#include <apt-pkg/tagfile.h>
5ad0096a 26#include <apt-pkg/metaindex.h>
453b82a3
DK
27#include <apt-pkg/acquire.h>
28#include <apt-pkg/hashes.h>
29#include <apt-pkg/indexfile.h>
30#include <apt-pkg/pkgcache.h>
31#include <apt-pkg/cacheiterators.h>
32#include <apt-pkg/pkgrecords.h>
d56e2917 33#include <apt-pkg/gpgv.h>
453b82a3 34
d7a51997 35#include <algorithm>
453b82a3
DK
36#include <stddef.h>
37#include <stdlib.h>
38#include <string.h>
39#include <iostream>
40#include <vector>
0a8a80e5
AL
41#include <sys/stat.h>
42#include <unistd.h>
c88edf1d 43#include <errno.h>
5819a761 44#include <string>
c88edf1d 45#include <stdio.h>
1ddb8596 46#include <ctime>
ac7f8f79 47#include <sstream>
2f4e4070 48#include <numeric>
ea542140
DK
49
50#include <apti18n.h>
0118833a
AL
51 /*}}}*/
52
b3d44315 53using namespace std;
5819a761 54
8d89cda7 55static void printHashSumComparison(std::string const &URI, HashStringList const &Expected, HashStringList const &Actual) /*{{{*/
b3501edb
DK
56{
57 if (_config->FindB("Debug::Acquire::HashSumMismatch", false) == false)
58 return;
59 std::cerr << std::endl << URI << ":" << std::endl << " Expected Hash: " << std::endl;
60 for (HashStringList::const_iterator hs = Expected.begin(); hs != Expected.end(); ++hs)
61 std::cerr << "\t- " << hs->toStr() << std::endl;
62 std::cerr << " Actual Hash: " << std::endl;
63 for (HashStringList::const_iterator hs = Actual.begin(); hs != Actual.end(); ++hs)
64 std::cerr << "\t- " << hs->toStr() << std::endl;
65}
66 /*}}}*/
70b63c57 67static std::string GetPartialFileName(std::string const &file) /*{{{*/
5684f71f
DK
68{
69 std::string DestFile = _config->FindDir("Dir::State::lists") + "partial/";
70 DestFile += file;
71 return DestFile;
72}
70b63c57
DK
73 /*}}}*/
74static std::string GetPartialFileNameFromURI(std::string const &uri) /*{{{*/
5684f71f 75{
ea7682a0 76 return GetPartialFileName(URItoFileName(uri));
5684f71f 77}
70b63c57 78 /*}}}*/
295d848b
DK
79static std::string GetFinalFileNameFromURI(std::string const &uri) /*{{{*/
80{
81 return _config->FindDir("Dir::State::lists") + URItoFileName(uri);
82}
83 /*}}}*/
d7a51997
DK
84static std::string GetKeepCompressedFileName(std::string file, IndexTarget const &Target)/*{{{*/
85{
86 if (Target.KeepCompressed == false)
87 return file;
88
0179cfa8
DK
89 std::string const KeepCompressedAs = Target.Option(IndexTarget::KEEPCOMPRESSEDAS);
90 if (KeepCompressedAs.empty() == false)
d7a51997 91 {
0179cfa8 92 std::string const ext = KeepCompressedAs.substr(0, KeepCompressedAs.find(' '));
d7a51997
DK
93 if (ext != "uncompressed")
94 file.append(".").append(ext);
95 }
96 return file;
97}
98 /*}}}*/
36795154
DK
99static std::string GetMergeDiffsPatchFileName(std::string const &Final, std::string const &Patch)/*{{{*/
100{
101 // rred expects the patch as $FinalFile.ed.$patchname.gz
102 return Final + ".ed." + Patch + ".gz";
103}
104 /*}}}*/
105static std::string GetDiffsPatchFileName(std::string const &Final) /*{{{*/
106{
107 // rred expects the patch as $FinalFile.ed
108 return Final + ".ed";
109}
110 /*}}}*/
4e3c5633 111static std::string GetExistingFilename(std::string const &File) /*{{{*/
d7a51997 112{
4e3c5633
DK
113 if (RealFileExists(File))
114 return File;
115 for (auto const &type : APT::Configuration::getCompressorExtensions())
d7a51997 116 {
4e3c5633
DK
117 std::string const Final = File + type;
118 if (RealFileExists(Final))
119 return Final;
d7a51997 120 }
4e3c5633 121 return "";
d7a51997
DK
122}
123 /*}}}*/
b7a1076f
DK
124static std::string GetDiffIndexFileName(std::string const &Name) /*{{{*/
125{
126 return Name + ".diff/Index";
127}
128 /*}}}*/
129static std::string GetDiffIndexURI(IndexTarget const &Target) /*{{{*/
130{
131 return Target.URI + ".diff/Index";
132}
133 /*}}}*/
36795154 134
3383ef4d
DK
135static void ReportMirrorFailureToCentral(pkgAcquire::Item const &I, std::string const &FailCode, std::string const &Details)/*{{{*/
136{
137 // we only act if a mirror was used at all
138 if(I.UsedMirror.empty())
139 return;
140#if 0
141 std::cerr << "\nReportMirrorFailure: "
142 << UsedMirror
143 << " Uri: " << DescURI()
144 << " FailCode: "
145 << FailCode << std::endl;
146#endif
147 string const report = _config->Find("Methods::Mirror::ProblemReporting",
148 "/usr/lib/apt/apt-report-mirror-failure");
149 if(!FileExists(report))
150 return;
151
152 std::vector<char const*> const Args = {
153 report.c_str(),
154 I.UsedMirror.c_str(),
155 I.DescURI().c_str(),
156 FailCode.c_str(),
157 Details.c_str(),
158 NULL
159 };
160
161 pid_t pid = ExecFork();
162 if(pid < 0)
163 {
164 _error->Error("ReportMirrorFailure Fork failed");
165 return;
166 }
167 else if(pid == 0)
168 {
169 execvp(Args[0], (char**)Args.data());
170 std::cerr << "Could not exec " << Args[0] << std::endl;
171 _exit(100);
172 }
173 if(!ExecWait(pid, "report-mirror-failure"))
174 _error->Warning("Couldn't report problem to '%s'", report.c_str());
175}
176 /*}}}*/
177
f18f2338 178static bool MessageInsecureRepository(bool const isError, std::string const &msg)/*{{{*/
32532943 179{
f18f2338
DK
180 if (isError)
181 {
182 _error->Error("%s", msg.c_str());
83960341 183 _error->Notice("%s", _("Updating from such a repository can't be done securely, and is therefore disabled by default."));
f18f2338
DK
184 }
185 else
186 {
187 _error->Warning("%s", msg.c_str());
d04e44ac 188 _error->Notice("%s", _("Data from such a repository can't be authenticated and is therefore potentially dangerous to use."));
f18f2338 189 }
002b1bc4 190 _error->Notice("%s", _("See apt-secure(8) manpage for repository creation and user configuration details."));
f18f2338
DK
191 return false;
192}
b7ec7a80 193static bool APT_NONNULL(2) MessageInsecureRepository(bool const isError, char const * const msg, std::string const &repo)
f18f2338
DK
194{
195 std::string m;
196 strprintf(m, msg, repo.c_str());
197 return MessageInsecureRepository(isError, m);
198}
199 /*}}}*/
b7ec7a80 200static bool APT_NONNULL(1, 3, 4, 5) AllowInsecureRepositories(char const * const msg, std::string const &repo,/*{{{*/
f18f2338
DK
201 metaIndex const * const MetaIndexParser, pkgAcqMetaClearSig * const TransactionManager, pkgAcquire::Item * const I)
202{
203 if(MetaIndexParser->GetTrusted() == metaIndex::TRI_YES)
32532943
DK
204 return true;
205
f18f2338
DK
206 if (_config->FindB("Acquire::AllowInsecureRepositories") == true)
207 {
208 MessageInsecureRepository(false, msg, repo);
209 return true;
210 }
211
212 MessageInsecureRepository(true, msg, repo);
32532943
DK
213 TransactionManager->AbortTransaction();
214 I->Status = pkgAcquire::Item::StatError;
215 return false;
216}
217 /*}}}*/
5ad0096a 218static HashStringList GetExpectedHashesFromFor(metaIndex * const Parser, std::string const &MetaKey)/*{{{*/
8d041b4f
DK
219{
220 if (Parser == NULL)
221 return HashStringList();
5ad0096a 222 metaIndex::checkSum * const R = Parser->Lookup(MetaKey);
8d041b4f
DK
223 if (R == NULL)
224 return HashStringList();
225 return R->Hashes;
226}
227 /*}}}*/
32532943 228
448c38bd
DK
229// all ::HashesRequired and ::GetExpectedHashes implementations /*{{{*/
230/* ::GetExpectedHashes is abstract and has to be implemented by all subclasses.
231 It is best to implement it as broadly as possible, while ::HashesRequired defaults
232 to true and should be as restrictive as possible for false cases. Note that if
233 a hash is returned by ::GetExpectedHashes it must match. Only if it doesn't
234 ::HashesRequired is called to evaluate if its okay to have no hashes. */
235APT_CONST bool pkgAcqTransactionItem::HashesRequired() const
236{
237 /* signed repositories obviously have a parser and good hashes.
238 unsigned repositories, too, as even if we can't trust them for security,
239 we can at least trust them for integrity of the download itself.
240 Only repositories without a Release file can (obviously) not have
241 hashes – and they are very uncommon and strongly discouraged */
b7ec7a80 242 return TransactionManager->MetaIndexParser->GetLoadedSuccessfully() == metaIndex::TRI_YES;
448c38bd
DK
243}
244HashStringList pkgAcqTransactionItem::GetExpectedHashes() const
245{
246 return GetExpectedHashesFor(GetMetaKey());
247}
248
249APT_CONST bool pkgAcqMetaBase::HashesRequired() const
250{
251 // Release and co have no hashes 'by design'.
252 return false;
253}
254HashStringList pkgAcqMetaBase::GetExpectedHashes() const
255{
256 return HashStringList();
257}
258
259APT_CONST bool pkgAcqIndexDiffs::HashesRequired() const
260{
4a808dea
DK
261 /* We can't check hashes of rred result as we don't know what the
262 hash of the file will be. We just know the hash of the patch(es),
263 the hash of the file they will apply on and the hash of the resulting
264 file. */
4f51fd86 265 if (State == StateFetchDiff)
4a808dea 266 return true;
448c38bd
DK
267 return false;
268}
269HashStringList pkgAcqIndexDiffs::GetExpectedHashes() const
270{
4f51fd86
DK
271 if (State == StateFetchDiff)
272 return available_patches[0].download_hashes;
448c38bd
DK
273 return HashStringList();
274}
275
276APT_CONST bool pkgAcqIndexMergeDiffs::HashesRequired() const
277{
278 /* @see #pkgAcqIndexDiffs::HashesRequired, with the difference that
279 we can check the rred result after all patches are applied as
280 we know the expected result rather than potentially apply more patches */
4f51fd86 281 if (State == StateFetchDiff)
4a808dea 282 return true;
448c38bd
DK
283 return State == StateApplyDiff;
284}
285HashStringList pkgAcqIndexMergeDiffs::GetExpectedHashes() const
286{
4f51fd86
DK
287 if (State == StateFetchDiff)
288 return patch.download_hashes;
289 else if (State == StateApplyDiff)
dcbbb14d 290 return GetExpectedHashesFor(Target.MetaKey);
448c38bd
DK
291 return HashStringList();
292}
293
294APT_CONST bool pkgAcqArchive::HashesRequired() const
295{
296 return LocalSource == false;
297}
298HashStringList pkgAcqArchive::GetExpectedHashes() const
299{
300 // figured out while parsing the records
301 return ExpectedHashes;
302}
303
304APT_CONST bool pkgAcqFile::HashesRequired() const
305{
306 // supplied as parameter at creation time, so the caller decides
307 return ExpectedHashes.usable();
308}
309HashStringList pkgAcqFile::GetExpectedHashes() const
310{
311 return ExpectedHashes;
312}
313 /*}}}*/
314// Acquire::Item::QueueURI and specialisations from child classes /*{{{*/
315bool pkgAcquire::Item::QueueURI(pkgAcquire::ItemDesc &Item)
316{
317 Owner->Enqueue(Item);
318 return true;
319}
320/* The idea here is that an item isn't queued if it exists on disk and the
321 transition manager was a hit as this means that the files it contains
322 the checksums for can't be updated either (or they are and we are asking
323 for a hashsum mismatch to happen which helps nobody) */
324bool pkgAcqTransactionItem::QueueURI(pkgAcquire::ItemDesc &Item)
325{
38f8704e
DK
326 if (TransactionManager->State != TransactionStarted)
327 {
328 if (_config->FindB("Debug::Acquire::Transaction", false))
329 std::clog << "Skip " << Target.URI << " as transaction was already dealt with!" << std::endl;
330 return false;
331 }
448c38bd 332 std::string const FinalFile = GetFinalFilename();
b7ec7a80 333 if (TransactionManager->IMSHit == true && FileExists(FinalFile) == true)
448c38bd
DK
334 {
335 PartialFile = DestFile = FinalFile;
336 Status = StatDone;
337 return false;
338 }
9b8034a9 339 // If we got the InRelease file via a mirror, pick all indexes directly from this mirror, too
b7ec7a80 340 if (TransactionManager->BaseURI.empty() == false &&
9b8034a9
DK
341 URI::SiteOnly(Item.URI) != URI::SiteOnly(TransactionManager->BaseURI))
342 {
343 // this ensures we rewrite only once and only the first step
344 auto const OldBaseURI = Target.Option(IndexTarget::BASE_URI);
03a34b88 345 if (OldBaseURI.empty() == false && APT::String::Startswith(Item.URI, OldBaseURI))
9b8034a9
DK
346 {
347 auto const ExtraPath = Item.URI.substr(OldBaseURI.length());
348 Item.URI = flCombine(TransactionManager->BaseURI, ExtraPath);
349 UsedMirror = TransactionManager->UsedMirror;
350 if (Item.Description.find(" ") != string::npos)
351 Item.Description.replace(0, Item.Description.find(" "), UsedMirror);
352 }
353 }
448c38bd
DK
354 return pkgAcquire::Item::QueueURI(Item);
355}
356/* The transition manager InRelease itself (or its older sisters-in-law
357 Release & Release.gpg) is always queued as this allows us to rerun gpgv
358 on it to verify that we aren't stalled with old files */
359bool pkgAcqMetaBase::QueueURI(pkgAcquire::ItemDesc &Item)
360{
361 return pkgAcquire::Item::QueueURI(Item);
362}
363/* the Diff/Index needs to queue also the up-to-date complete index file
364 to ensure that the list cleaner isn't eating it */
365bool pkgAcqDiffIndex::QueueURI(pkgAcquire::ItemDesc &Item)
366{
367 if (pkgAcqTransactionItem::QueueURI(Item) == true)
368 return true;
369 QueueOnIMSHit();
370 return false;
371}
372 /*}}}*/
373// Acquire::Item::GetFinalFilename and specialisations for child classes /*{{{*/
374std::string pkgAcquire::Item::GetFinalFilename() const
375{
b7a1076f 376 // Beware: Desc.URI is modified by redirections
448c38bd
DK
377 return GetFinalFileNameFromURI(Desc.URI);
378}
379std::string pkgAcqDiffIndex::GetFinalFilename() const
380{
b7a1076f 381 return GetFinalFileNameFromURI(GetDiffIndexURI(Target));
448c38bd
DK
382}
383std::string pkgAcqIndex::GetFinalFilename() const
384{
dcbbb14d 385 std::string const FinalFile = GetFinalFileNameFromURI(Target.URI);
0179cfa8 386 return GetKeepCompressedFileName(FinalFile, Target);
448c38bd
DK
387}
388std::string pkgAcqMetaSig::GetFinalFilename() const
389{
dcbbb14d 390 return GetFinalFileNameFromURI(Target.URI);
448c38bd
DK
391}
392std::string pkgAcqBaseIndex::GetFinalFilename() const
393{
dcbbb14d 394 return GetFinalFileNameFromURI(Target.URI);
448c38bd
DK
395}
396std::string pkgAcqMetaBase::GetFinalFilename() const
397{
dcbbb14d 398 return GetFinalFileNameFromURI(Target.URI);
448c38bd
DK
399}
400std::string pkgAcqArchive::GetFinalFilename() const
401{
402 return _config->FindDir("Dir::Cache::Archives") + flNotDir(StoreFilename);
403}
404 /*}}}*/
405// pkgAcqTransactionItem::GetMetaKey and specialisations for child classes /*{{{*/
406std::string pkgAcqTransactionItem::GetMetaKey() const
407{
dcbbb14d 408 return Target.MetaKey;
448c38bd
DK
409}
410std::string pkgAcqIndex::GetMetaKey() const
411{
412 if (Stage == STAGE_DECOMPRESS_AND_VERIFY || CurrentCompressionExtension == "uncompressed")
dcbbb14d
DK
413 return Target.MetaKey;
414 return Target.MetaKey + "." + CurrentCompressionExtension;
448c38bd
DK
415}
416std::string pkgAcqDiffIndex::GetMetaKey() const
417{
b7a1076f 418 return GetDiffIndexFileName(Target.MetaKey);
448c38bd
DK
419}
420 /*}}}*/
421//pkgAcqTransactionItem::TransactionState and specialisations for child classes /*{{{*/
422bool pkgAcqTransactionItem::TransactionState(TransactionStates const state)
423{
424 bool const Debug = _config->FindB("Debug::Acquire::Transaction", false);
425 switch(state)
426 {
57f16d51 427 case TransactionStarted: _error->Fatal("Item %s changed to invalid transaction start state!", Target.URI.c_str()); break;
448c38bd
DK
428 case TransactionAbort:
429 if(Debug == true)
430 std::clog << " Cancel: " << DestFile << std::endl;
431 if (Status == pkgAcquire::Item::StatIdle)
432 {
433 Status = pkgAcquire::Item::StatDone;
434 Dequeue();
435 }
436 break;
437 case TransactionCommit:
18662401 438 if(PartialFile.empty() == false)
448c38bd 439 {
0179cfa8
DK
440 bool sameFile = (PartialFile == DestFile);
441 // we use symlinks on IMS-Hit to avoid copies
442 if (RealFileExists(DestFile))
443 {
444 struct stat Buf;
445 if (lstat(PartialFile.c_str(), &Buf) != -1)
446 {
447 if (S_ISLNK(Buf.st_mode) && Buf.st_size > 0)
448 {
449 char partial[Buf.st_size + 1];
450 ssize_t const sp = readlink(PartialFile.c_str(), partial, Buf.st_size);
451 if (sp == -1)
452 _error->Errno("pkgAcqTransactionItem::TransactionState-sp", _("Failed to readlink %s"), PartialFile.c_str());
453 else
454 {
455 partial[sp] = '\0';
456 sameFile = (DestFile == partial);
457 }
458 }
459 }
460 else
461 _error->Errno("pkgAcqTransactionItem::TransactionState-stat", _("Failed to stat %s"), PartialFile.c_str());
462 }
463 if (sameFile == false)
18662401
DK
464 {
465 // ensure that even without lists-cleanup all compressions are nuked
466 std::string FinalFile = GetFinalFileNameFromURI(Target.URI);
467 if (FileExists(FinalFile))
468 {
469 if(Debug == true)
470 std::clog << "rm " << FinalFile << " # " << DescURI() << std::endl;
471 if (RemoveFile("TransactionStates-Cleanup", FinalFile) == false)
472 return false;
473 }
474 for (auto const &ext: APT::Configuration::getCompressorExtensions())
475 {
476 auto const Final = FinalFile + ext;
477 if (FileExists(Final))
478 {
479 if(Debug == true)
480 std::clog << "rm " << Final << " # " << DescURI() << std::endl;
481 if (RemoveFile("TransactionStates-Cleanup", Final) == false)
482 return false;
483 }
484 }
485 if(Debug == true)
486 std::clog << "mv " << PartialFile << " -> "<< DestFile << " # " << DescURI() << std::endl;
487 if (Rename(PartialFile, DestFile) == false)
488 return false;
489 }
490 else if(Debug == true)
491 std::clog << "keep " << PartialFile << " # " << DescURI() << std::endl;
448c38bd 492
448c38bd
DK
493 } else {
494 if(Debug == true)
495 std::clog << "rm " << DestFile << " # " << DescURI() << std::endl;
e169fa4a 496 if (RemoveFile("TransItem::TransactionCommit", DestFile) == false)
18662401 497 return false;
448c38bd
DK
498 }
499 break;
500 }
501 return true;
502}
503bool pkgAcqMetaBase::TransactionState(TransactionStates const state)
504{
505 // Do not remove InRelease on IMSHit of Release.gpg [yes, this is very edgecasey]
506 if (TransactionManager->IMSHit == false)
507 return pkgAcqTransactionItem::TransactionState(state);
508 return true;
509}
510bool pkgAcqIndex::TransactionState(TransactionStates const state)
511{
512 if (pkgAcqTransactionItem::TransactionState(state) == false)
513 return false;
514
515 switch (state)
516 {
57f16d51 517 case TransactionStarted: _error->Fatal("AcqIndex %s changed to invalid transaction start state!", Target.URI.c_str()); break;
448c38bd
DK
518 case TransactionAbort:
519 if (Stage == STAGE_DECOMPRESS_AND_VERIFY)
520 {
521 // keep the compressed file, but drop the decompressed
522 EraseFileName.clear();
9bd2313a 523 if (PartialFile.empty() == false && flExtension(PartialFile) != CurrentCompressionExtension)
51818f26 524 RemoveFile("TransactionAbort", PartialFile);
448c38bd
DK
525 }
526 break;
527 case TransactionCommit:
528 if (EraseFileName.empty() == false)
e169fa4a 529 RemoveFile("AcqIndex::TransactionCommit", EraseFileName);
448c38bd
DK
530 break;
531 }
532 return true;
533}
534bool pkgAcqDiffIndex::TransactionState(TransactionStates const state)
535{
536 if (pkgAcqTransactionItem::TransactionState(state) == false)
537 return false;
538
539 switch (state)
540 {
57f16d51 541 case TransactionStarted: _error->Fatal("Item %s changed to invalid transaction start state!", Target.URI.c_str()); break;
448c38bd
DK
542 case TransactionCommit:
543 break;
544 case TransactionAbort:
dcbbb14d 545 std::string const Partial = GetPartialFileNameFromURI(Target.URI);
51818f26 546 RemoveFile("TransactionAbort", Partial);
448c38bd
DK
547 break;
548 }
549
550 return true;
551}
552 /*}}}*/
b3501edb 553
8d041b4f
DK
554class APT_HIDDEN NoActionItem : public pkgAcquire::Item /*{{{*/
555/* The sole purpose of this class is having an item which does nothing to
556 reach its done state to prevent cleanup deleting the mentioned file.
557 Handy in cases in which we know we have the file already, like IMS-Hits. */
558{
dcbbb14d 559 IndexTarget const Target;
8d041b4f 560 public:
3b302846
DK
561 virtual std::string DescURI() const APT_OVERRIDE {return Target.URI;};
562 virtual HashStringList GetExpectedHashes() const APT_OVERRIDE {return HashStringList();};
8d041b4f 563
e8afd168 564 NoActionItem(pkgAcquire * const Owner, IndexTarget const &Target) :
8d041b4f
DK
565 pkgAcquire::Item(Owner), Target(Target)
566 {
567 Status = StatDone;
dcbbb14d 568 DestFile = GetFinalFileNameFromURI(Target.URI);
8d041b4f 569 }
d7a51997
DK
570 NoActionItem(pkgAcquire * const Owner, IndexTarget const &Target, std::string const &FinalFile) :
571 pkgAcquire::Item(Owner), Target(Target)
572 {
573 Status = StatDone;
574 DestFile = FinalFile;
575 }
8d041b4f
DK
576};
577 /*}}}*/
b58047e0
DK
578class APT_HIDDEN CleanupItem : public pkgAcqTransactionItem /*{{{*/
579/* This class ensures that a file which was configured but isn't downloaded
580 for various reasons isn't kept in an old version in the lists directory.
581 In a way its the reverse of NoActionItem as it helps with removing files
582 even if the lists-cleanup is deactivated. */
583{
584 public:
585 virtual std::string DescURI() const APT_OVERRIDE {return Target.URI;};
586 virtual HashStringList GetExpectedHashes() const APT_OVERRIDE {return HashStringList();};
587
588 CleanupItem(pkgAcquire * const Owner, pkgAcqMetaClearSig * const TransactionManager, IndexTarget const &Target) :
589 pkgAcqTransactionItem(Owner, TransactionManager, Target)
590 {
591 Status = StatDone;
592 DestFile = GetFinalFileNameFromURI(Target.URI);
593 }
594 bool TransactionState(TransactionStates const state) APT_OVERRIDE
595 {
596 switch (state)
597 {
598 case TransactionStarted:
599 break;
600 case TransactionAbort:
601 break;
602 case TransactionCommit:
603 if (_config->FindB("Debug::Acquire::Transaction", false) == true)
604 std::clog << "rm " << DestFile << " # " << DescURI() << std::endl;
605 if (RemoveFile("TransItem::TransactionCommit", DestFile) == false)
606 return false;
607 break;
608 }
609 return true;
610 }
611};
612 /*}}}*/
8d041b4f 613
0118833a 614// Acquire::Item::Item - Constructor /*{{{*/
586d8704 615APT_IGNORE_DEPRECATED_PUSH
e8afd168 616pkgAcquire::Item::Item(pkgAcquire * const owner) :
1eb1836f 617 FileSize(0), PartialSize(0), Mode(0), ID(0), Complete(false), Local(false),
6c55f07a 618 QueueCounter(0), ExpectedAdditionalItems(0), Owner(owner), d(NULL)
0118833a
AL
619{
620 Owner->Add(this);
c88edf1d 621 Status = StatIdle;
0118833a 622}
586d8704 623APT_IGNORE_DEPRECATED_POP
0118833a
AL
624 /*}}}*/
625// Acquire::Item::~Item - Destructor /*{{{*/
0118833a
AL
626pkgAcquire::Item::~Item()
627{
628 Owner->Remove(this);
629}
630 /*}}}*/
448c38bd
DK
631std::string pkgAcquire::Item::Custom600Headers() const /*{{{*/
632{
633 return std::string();
634}
635 /*}}}*/
636std::string pkgAcquire::Item::ShortDesc() const /*{{{*/
637{
638 return DescURI();
639}
640 /*}}}*/
641APT_CONST void pkgAcquire::Item::Finished() /*{{{*/
642{
643}
644 /*}}}*/
645APT_PURE pkgAcquire * pkgAcquire::Item::GetOwner() const /*{{{*/
646{
647 return Owner;
648}
649 /*}}}*/
c8a4ce6c 650APT_CONST pkgAcquire::ItemDesc &pkgAcquire::Item::GetItemDesc() /*{{{*/
08ea7806
DK
651{
652 return Desc;
653}
654 /*}}}*/
448c38bd
DK
655APT_CONST bool pkgAcquire::Item::IsTrusted() const /*{{{*/
656{
657 return false;
658}
659 /*}}}*/
c88edf1d
AL
660// Acquire::Item::Failed - Item failed to download /*{{{*/
661// ---------------------------------------------------------------------
93bf083d
AL
662/* We return to an idle state if there are still other queues that could
663 fetch this object */
448c38bd 664void pkgAcquire::Item::Failed(string const &Message,pkgAcquire::MethodConfig const * const Cnf)
c88edf1d 665{
c88edf1d 666 if (QueueCounter <= 1)
93bf083d 667 {
a72ace20 668 /* This indicates that the file is not available right now but might
7d8afa39 669 be sometime later. If we do a retry cycle then this should be
17caf1b1 670 retried [CDROMs] */
4dbfe436 671 if (Cnf != NULL && Cnf->LocalOnly == true &&
7d8afa39 672 StringToBool(LookupTag(Message,"Transient-Failure"),false) == true)
a72ace20
AL
673 {
674 Status = StatIdle;
681d76d0 675 Dequeue();
a72ace20
AL
676 return;
677 }
7e5f33eb 678
58702f85
DK
679 switch (Status)
680 {
681 case StatIdle:
682 case StatFetching:
683 case StatDone:
684 Status = StatError;
685 break;
686 case StatAuthError:
687 case StatError:
688 case StatTransientNetworkError:
689 break;
690 }
4dbfe436 691 Complete = false;
681d76d0 692 Dequeue();
4dbfe436 693 }
23c5897c 694
30979dd7
DK
695 string const FailReason = LookupTag(Message, "FailReason");
696 enum { MAXIMUM_SIZE_EXCEEDED, HASHSUM_MISMATCH, OTHER } failreason = OTHER;
697 if ( FailReason == "MaximumSizeExceeded")
698 failreason = MAXIMUM_SIZE_EXCEEDED;
699 else if (Status == StatAuthError)
700 failreason = HASHSUM_MISMATCH;
701
0340069c
DK
702 if(ErrorText.empty())
703 {
704 if (Status == StatAuthError)
705 {
706 std::ostringstream out;
30979dd7
DK
707 switch (failreason)
708 {
709 case HASHSUM_MISMATCH:
710 out << _("Hash Sum mismatch") << std::endl;
711 break;
712 case MAXIMUM_SIZE_EXCEEDED:
713 case OTHER:
714 out << LookupTag(Message, "Message") << std::endl;
715 break;
716 }
717 auto const ExpectedHashes = GetExpectedHashes();
718 if (ExpectedHashes.empty() == false)
0340069c 719 {
30979dd7
DK
720 out << "Hashes of expected file:" << std::endl;
721 for (auto const &hs: ExpectedHashes)
722 out << " - " << hs.toStr() << std::endl;
723 }
724 if (failreason == HASHSUM_MISMATCH)
725 {
726 out << "Hashes of received file:" << std::endl;
727 for (char const * const * type = HashString::SupportedHashes(); *type != NULL; ++type)
728 {
729 std::string const tagname = std::string(*type) + "-Hash";
730 std::string const hashsum = LookupTag(Message, tagname.c_str());
731 if (hashsum.empty() == false)
732 out << " - " << HashString(*type, hashsum).toStr() << std::endl;
733 }
734 out << "Last modification reported: " << LookupTag(Message, "Last-Modified", "<none>") << std::endl;
0340069c 735 }
0340069c
DK
736 ErrorText = out.str();
737 }
738 else
739 ErrorText = LookupTag(Message,"Message");
740 }
741
30979dd7
DK
742 switch (failreason)
743 {
744 case MAXIMUM_SIZE_EXCEEDED: RenameOnError(MaximumSizeExceeded); break;
745 case HASHSUM_MISMATCH: RenameOnError(HashSumMismatch); break;
746 case OTHER: break;
747 }
0340069c
DK
748
749 if (FailReason.empty() == false)
3383ef4d 750 ReportMirrorFailureToCentral(*this, FailReason, ErrorText);
f0b509cd 751 else
3383ef4d 752 ReportMirrorFailureToCentral(*this, ErrorText, ErrorText);
146f7715 753
448c38bd
DK
754 if (QueueCounter > 1)
755 Status = StatIdle;
146f7715
DK
756}
757 /*}}}*/
8267fe24
AL
758// Acquire::Item::Start - Item has begun to download /*{{{*/
759// ---------------------------------------------------------------------
448c38bd 760/* Stash status and the file size. Note that setting Complete means
17caf1b1 761 sub-phases of the acquire process such as decompresion are operating */
448c38bd 762void pkgAcquire::Item::Start(string const &/*Message*/, unsigned long long const Size)
8267fe24
AL
763{
764 Status = StatFetching;
03aa0847 765 ErrorText.clear();
8267fe24
AL
766 if (FileSize == 0 && Complete == false)
767 FileSize = Size;
768}
769 /*}}}*/
dd676dc7
DK
770// Acquire::Item::VerifyDone - check if Item was downloaded OK /*{{{*/
771/* Note that hash-verification is 'hardcoded' in acquire-worker and has
772 * already passed if this method is called. */
773bool pkgAcquire::Item::VerifyDone(std::string const &Message,
774 pkgAcquire::MethodConfig const * const /*Cnf*/)
775{
776 std::string const FileName = LookupTag(Message,"Filename");
777 if (FileName.empty() == true)
778 {
779 Status = StatError;
780 ErrorText = "Method gave a blank filename";
781 return false;
782 }
783
784 return true;
785}
786 /*}}}*/
c88edf1d 787// Acquire::Item::Done - Item downloaded OK /*{{{*/
a4b8112b 788void pkgAcquire::Item::Done(string const &/*Message*/, HashStringList const &Hashes,
448c38bd 789 pkgAcquire::MethodConfig const * const /*Cnf*/)
c88edf1d 790{
b98f2859 791 // We just downloaded something..
ff86d7df 792 if (FileSize == 0)
b98f2859 793 {
ff86d7df
DK
794 unsigned long long const downloadedSize = Hashes.FileSize();
795 if (downloadedSize != 0)
448c38bd 796 {
ff86d7df 797 FileSize = downloadedSize;
448c38bd 798 }
448c38bd 799 }
c88edf1d
AL
800 Status = StatDone;
801 ErrorText = string();
802 Owner->Dequeue(this);
803}
804 /*}}}*/
8b89e57f
AL
805// Acquire::Item::Rename - Rename a file /*{{{*/
806// ---------------------------------------------------------------------
1e3f4083 807/* This helper function is used by a lot of item methods as their final
8b89e57f 808 step */
448c38bd 809bool pkgAcquire::Item::Rename(string const &From,string const &To)
8b89e57f 810{
ba6b79bd 811 if (From == To || rename(From.c_str(),To.c_str()) == 0)
cecc5532
DK
812 return true;
813
814 std::string S;
815 strprintf(S, _("rename failed, %s (%s -> %s)."), strerror(errno),
816 From.c_str(),To.c_str());
817 Status = StatError;
8eafc759
DK
818 if (ErrorText.empty())
819 ErrorText = S;
820 else
821 ErrorText = ErrorText + ": " + S;
cecc5532 822 return false;
8b89e57f
AL
823}
824 /*}}}*/
448c38bd 825void pkgAcquire::Item::Dequeue() /*{{{*/
5684f71f 826{
448c38bd 827 Owner->Dequeue(this);
ba6b79bd 828}
448c38bd
DK
829 /*}}}*/
830bool pkgAcquire::Item::RenameOnError(pkgAcquire::Item::RenameOnErrorState const error)/*{{{*/
3c8030a4 831{
03aa0847 832 if (RealFileExists(DestFile))
3c8030a4
DK
833 Rename(DestFile, DestFile + ".FAILED");
834
448c38bd 835 std::string errtext;
3c8030a4
DK
836 switch (error)
837 {
838 case HashSumMismatch:
448c38bd 839 errtext = _("Hash Sum mismatch");
3c8030a4
DK
840 break;
841 case SizeMismatch:
448c38bd 842 errtext = _("Size mismatch");
3c8030a4 843 Status = StatAuthError;
3c8030a4
DK
844 break;
845 case InvalidFormat:
448c38bd 846 errtext = _("Invalid file format");
3c8030a4
DK
847 Status = StatError;
848 // do not report as usually its not the mirrors fault, but Portal/Proxy
849 break;
631a7dc7 850 case SignatureError:
448c38bd 851 errtext = _("Signature error");
631a7dc7
MV
852 Status = StatError;
853 break;
854 case NotClearsigned:
dd676dc7
DK
855 strprintf(errtext, _("Clearsigned file isn't valid, got '%s' (does the network require authentication?)"), "NOSPLIT");
856 Status = StatAuthError;
03aa0847
DK
857 break;
858 case MaximumSizeExceeded:
859 // the method is expected to report a good error for this
631a7dc7 860 break;
146f7715
DK
861 case PDiffError:
862 // no handling here, done by callers
863 break;
3c8030a4 864 }
448c38bd
DK
865 if (ErrorText.empty())
866 ErrorText = errtext;
3c8030a4
DK
867 return false;
868}
869 /*}}}*/
8267fbd9 870void pkgAcquire::Item::SetActiveSubprocess(const std::string &subprocess)/*{{{*/
eeac6897
MV
871{
872 ActiveSubprocess = subprocess;
586d8704 873 APT_IGNORE_DEPRECATED(Mode = ActiveSubprocess.c_str();)
eeac6897 874}
8267fbd9 875 /*}}}*/
c91d9a63 876// Acquire::Item::ReportMirrorFailure /*{{{*/
3383ef4d 877void pkgAcquire::Item::ReportMirrorFailure(std::string const &FailCode)
36280399 878{
3383ef4d 879 ReportMirrorFailureToCentral(*this, FailCode, FailCode);
36280399 880}
c91d9a63 881 /*}}}*/
448c38bd 882std::string pkgAcquire::Item::HashSum() const /*{{{*/
ac5b205a 883{
448c38bd
DK
884 HashStringList const hashes = GetExpectedHashes();
885 HashString const * const hs = hashes.find(NULL);
886 return hs != NULL ? hs->toStr() : "";
887}
888 /*}}}*/
2237bd01 889
448c38bd 890pkgAcqTransactionItem::pkgAcqTransactionItem(pkgAcquire * const Owner, /*{{{*/
3d8232bf 891 pkgAcqMetaClearSig * const transactionManager, IndexTarget const &target) :
6c55f07a 892 pkgAcquire::Item(Owner), d(NULL), Target(target), TransactionManager(transactionManager)
448c38bd
DK
893{
894 if (TransactionManager != this)
895 TransactionManager->Add(this);
896}
897 /*}}}*/
898pkgAcqTransactionItem::~pkgAcqTransactionItem() /*{{{*/
899{
900}
901 /*}}}*/
e8afd168 902HashStringList pkgAcqTransactionItem::GetExpectedHashesFor(std::string const &MetaKey) const /*{{{*/
448c38bd 903{
8d041b4f 904 return GetExpectedHashesFromFor(TransactionManager->MetaIndexParser, MetaKey);
448c38bd
DK
905}
906 /*}}}*/
ac5b205a 907
d3222349
DK
908static void LoadLastMetaIndexParser(pkgAcqMetaClearSig * const TransactionManager, std::string const &FinalRelease, std::string const &FinalInRelease)/*{{{*/
909{
910 if (TransactionManager->IMSHit == true)
911 return;
912 if (RealFileExists(FinalInRelease) || RealFileExists(FinalRelease))
913 {
914 TransactionManager->LastMetaIndexParser = TransactionManager->MetaIndexParser->UnloadedClone();
915 if (TransactionManager->LastMetaIndexParser != NULL)
916 {
917 _error->PushToStack();
918 if (RealFileExists(FinalInRelease))
919 TransactionManager->LastMetaIndexParser->Load(FinalInRelease, NULL);
920 else
921 TransactionManager->LastMetaIndexParser->Load(FinalRelease, NULL);
922 // its unlikely to happen, but if what we have is bad ignore it
923 if (_error->PendingError())
924 {
925 delete TransactionManager->LastMetaIndexParser;
926 TransactionManager->LastMetaIndexParser = NULL;
927 }
928 _error->RevertToStack();
929 }
930 }
931}
932 /*}}}*/
933
448c38bd
DK
934// AcqMetaBase - Constructor /*{{{*/
935pkgAcqMetaBase::pkgAcqMetaBase(pkgAcquire * const Owner,
3d8232bf 936 pkgAcqMetaClearSig * const TransactionManager,
3d8232bf 937 IndexTarget const &DataTarget)
6c55f07a 938: pkgAcqTransactionItem(Owner, TransactionManager, DataTarget), d(NULL),
57f16d51 939 AuthPass(false), IMSHit(false), State(TransactionStarted)
448c38bd
DK
940{
941}
942 /*}}}*/
943// AcqMetaBase::Add - Add a item to the current Transaction /*{{{*/
944void pkgAcqMetaBase::Add(pkgAcqTransactionItem * const I)
945{
946 Transaction.push_back(I);
947}
948 /*}}}*/
949// AcqMetaBase::AbortTransaction - Abort the current Transaction /*{{{*/
950void pkgAcqMetaBase::AbortTransaction()
951{
952 if(_config->FindB("Debug::Acquire::Transaction", false) == true)
953 std::clog << "AbortTransaction: " << TransactionManager << std::endl;
ac5b205a 954
57f16d51
DK
955 switch (TransactionManager->State)
956 {
957 case TransactionStarted: break;
958 case TransactionAbort: _error->Fatal("Transaction %s was already aborted and is aborted again", TransactionManager->Target.URI.c_str()); return;
959 case TransactionCommit: _error->Fatal("Transaction %s was already aborted and is now commited", TransactionManager->Target.URI.c_str()); return;
960 }
961 TransactionManager->State = TransactionAbort;
962
448c38bd
DK
963 // ensure the toplevel is in error state too
964 for (std::vector<pkgAcqTransactionItem*>::iterator I = Transaction.begin();
965 I != Transaction.end(); ++I)
2ac3eeb6 966 {
38f8704e
DK
967 if ((*I)->Status != pkgAcquire::Item::StatFetching)
968 Owner->Dequeue(*I);
448c38bd 969 (*I)->TransactionState(TransactionAbort);
ac5b205a 970 }
448c38bd
DK
971 Transaction.clear();
972}
973 /*}}}*/
974// AcqMetaBase::TransactionHasError - Check for errors in Transaction /*{{{*/
975APT_PURE bool pkgAcqMetaBase::TransactionHasError() const
976{
977 for (std::vector<pkgAcqTransactionItem*>::const_iterator I = Transaction.begin();
978 I != Transaction.end(); ++I)
979 {
980 switch((*I)->Status) {
981 case StatDone: break;
982 case StatIdle: break;
983 case StatAuthError: return true;
984 case StatError: return true;
985 case StatTransientNetworkError: return true;
986 case StatFetching: break;
987 }
988 }
989 return false;
990}
991 /*}}}*/
992// AcqMetaBase::CommitTransaction - Commit a transaction /*{{{*/
993void pkgAcqMetaBase::CommitTransaction()
994{
995 if(_config->FindB("Debug::Acquire::Transaction", false) == true)
996 std::clog << "CommitTransaction: " << this << std::endl;
ac5b205a 997
57f16d51
DK
998 switch (TransactionManager->State)
999 {
1000 case TransactionStarted: break;
1001 case TransactionAbort: _error->Fatal("Transaction %s was already commited and is now aborted", TransactionManager->Target.URI.c_str()); return;
1002 case TransactionCommit: _error->Fatal("Transaction %s was already commited and is again commited", TransactionManager->Target.URI.c_str()); return;
1003 }
1004 TransactionManager->State = TransactionCommit;
1005
448c38bd
DK
1006 // move new files into place *and* remove files that are not
1007 // part of the transaction but are still on disk
1008 for (std::vector<pkgAcqTransactionItem*>::iterator I = Transaction.begin();
1009 I != Transaction.end(); ++I)
1010 {
1011 (*I)->TransactionState(TransactionCommit);
1012 }
1013 Transaction.clear();
295d848b
DK
1014}
1015 /*}}}*/
448c38bd
DK
1016// AcqMetaBase::TransactionStageCopy - Stage a file for copying /*{{{*/
1017void pkgAcqMetaBase::TransactionStageCopy(pkgAcqTransactionItem * const I,
1018 const std::string &From,
1019 const std::string &To)
295d848b 1020{
448c38bd
DK
1021 I->PartialFile = From;
1022 I->DestFile = To;
ac5b205a 1023}
92fcbfc1 1024 /*}}}*/
448c38bd
DK
1025// AcqMetaBase::TransactionStageRemoval - Stage a file for removal /*{{{*/
1026void pkgAcqMetaBase::TransactionStageRemoval(pkgAcqTransactionItem * const I,
1027 const std::string &FinalFile)
1028{
1029 I->PartialFile = "";
1030 I->DestFile = FinalFile;
1031}
1032 /*}}}*/
1033// AcqMetaBase::GenerateAuthWarning - Check gpg authentication error /*{{{*/
3383ef4d
DK
1034/* This method is called from ::Failed handlers. If it returns true,
1035 no fallback to other files or modi is performed */
448c38bd
DK
1036bool pkgAcqMetaBase::CheckStopAuthentication(pkgAcquire::Item * const I, const std::string &Message)
1037{
448c38bd 1038 string const Final = I->GetFinalFilename();
3383ef4d
DK
1039 std::string const GPGError = LookupTag(Message, "Message");
1040 if (FileExists(Final))
448c38bd
DK
1041 {
1042 I->Status = StatTransientNetworkError;
3383ef4d
DK
1043 _error->Warning(_("An error occurred during the signature verification. "
1044 "The repository is not updated and the previous index files will be used. "
1045 "GPG error: %s: %s"),
1046 Desc.Description.c_str(),
1047 GPGError.c_str());
448c38bd
DK
1048 RunScripts("APT::Update::Auth-Failure");
1049 return true;
1050 } else if (LookupTag(Message,"Message").find("NODATA") != string::npos) {
1051 /* Invalid signature file, reject (LP: #346386) (Closes: #627642) */
1052 _error->Error(_("GPG error: %s: %s"),
3383ef4d
DK
1053 Desc.Description.c_str(),
1054 GPGError.c_str());
dd676dc7 1055 I->Status = StatAuthError;
448c38bd
DK
1056 return true;
1057 } else {
1058 _error->Warning(_("GPG error: %s: %s"),
3383ef4d
DK
1059 Desc.Description.c_str(),
1060 GPGError.c_str());
448c38bd
DK
1061 }
1062 // gpgv method failed
3383ef4d 1063 ReportMirrorFailureToCentral(*this, "GPGFailure", GPGError);
448c38bd
DK
1064 return false;
1065}
1066 /*}}}*/
1067// AcqMetaBase::Custom600Headers - Get header for AcqMetaBase /*{{{*/
6cb30d01 1068// ---------------------------------------------------------------------
448c38bd 1069string pkgAcqMetaBase::Custom600Headers() const
6cb30d01 1070{
448c38bd
DK
1071 std::string Header = "\nIndex-File: true";
1072 std::string MaximumSize;
1073 strprintf(MaximumSize, "\nMaximum-Size: %i",
1074 _config->FindI("Acquire::MaxReleaseFileSize", 10*1000*1000));
1075 Header += MaximumSize;
4d0818cc 1076
448c38bd 1077 string const FinalFile = GetFinalFilename();
6cb30d01 1078 struct stat Buf;
448c38bd
DK
1079 if (stat(FinalFile.c_str(),&Buf) == 0)
1080 Header += "\nLast-Modified: " + TimeRFC1123(Buf.st_mtime);
1081
1082 return Header;
6cb30d01 1083}
92fcbfc1 1084 /*}}}*/
448c38bd
DK
1085// AcqMetaBase::QueueForSignatureVerify /*{{{*/
1086void pkgAcqMetaBase::QueueForSignatureVerify(pkgAcqTransactionItem * const I, std::string const &File, std::string const &Signature)
ba6b79bd 1087{
448c38bd
DK
1088 AuthPass = true;
1089 I->Desc.URI = "gpgv:" + Signature;
1090 I->DestFile = File;
1091 QueueURI(I->Desc);
1092 I->SetActiveSubprocess("gpgv");
ba6b79bd
DK
1093}
1094 /*}}}*/
448c38bd
DK
1095// AcqMetaBase::CheckDownloadDone /*{{{*/
1096bool pkgAcqMetaBase::CheckDownloadDone(pkgAcqTransactionItem * const I, const std::string &Message, HashStringList const &Hashes) const
2237bd01 1097{
448c38bd
DK
1098 // We have just finished downloading a Release file (it is not
1099 // verified yet)
f6d4ab9a 1100
9b8034a9
DK
1101 // Save the final base URI we got this Release file from
1102 if (I->UsedMirror.empty() == false && _config->FindB("Acquire::SameMirrorForAllIndexes", true))
1103 {
1104 if (APT::String::Endswith(I->Desc.URI, "InRelease"))
1105 TransactionManager->BaseURI = I->Desc.URI.substr(0, I->Desc.URI.length() - strlen("InRelease"));
03a34b88 1106 else if (APT::String::Endswith(I->Desc.URI, "Release"))
9b8034a9
DK
1107 TransactionManager->BaseURI = I->Desc.URI.substr(0, I->Desc.URI.length() - strlen("Release"));
1108 }
1109
dd676dc7 1110 std::string const FileName = LookupTag(Message,"Filename");
08ea7806 1111 if (FileName != I->DestFile && RealFileExists(I->DestFile) == false)
f6d4ab9a 1112 {
448c38bd
DK
1113 I->Local = true;
1114 I->Desc.URI = "copy:" + FileName;
1115 I->QueueURI(I->Desc);
f6d4ab9a
DK
1116 return false;
1117 }
2237bd01 1118
448c38bd
DK
1119 // make sure to verify against the right file on I-M-S hit
1120 bool IMSHit = StringToBool(LookupTag(Message,"IMS-Hit"), false);
1121 if (IMSHit == false && Hashes.usable())
f6d4ab9a 1122 {
448c38bd
DK
1123 // detect IMS-Hits servers haven't detected by Hash comparison
1124 std::string const FinalFile = I->GetFinalFilename();
1125 if (RealFileExists(FinalFile) && Hashes.VerifyFile(FinalFile) == true)
2ac3eeb6 1126 {
448c38bd 1127 IMSHit = true;
51818f26 1128 RemoveFile("CheckDownloadDone", I->DestFile);
5e1ed088 1129 }
f6d4ab9a
DK
1130 }
1131
448c38bd 1132 if(IMSHit == true)
f6d4ab9a 1133 {
448c38bd
DK
1134 // for simplicity, the transaction manager is always InRelease
1135 // even if it doesn't exist.
b7ec7a80 1136 TransactionManager->IMSHit = true;
448c38bd 1137 I->PartialFile = I->DestFile = I->GetFinalFilename();
f6d4ab9a
DK
1138 }
1139
448c38bd
DK
1140 // set Item to complete as the remaining work is all local (verify etc)
1141 I->Complete = true;
f6d4ab9a 1142
448c38bd
DK
1143 return true;
1144}
1145 /*}}}*/
1146bool pkgAcqMetaBase::CheckAuthDone(string const &Message) /*{{{*/
1147{
1148 // At this point, the gpgv method has succeeded, so there is a
1149 // valid signature from a key in the trusted keyring. We
1150 // perform additional verification of its contents, and use them
1151 // to verify the indexes we are about to download
f6d4ab9a 1152
448c38bd 1153 if (TransactionManager->IMSHit == false)
f6d4ab9a 1154 {
448c38bd
DK
1155 // open the last (In)Release if we have it
1156 std::string const FinalFile = GetFinalFilename();
1157 std::string FinalRelease;
1158 std::string FinalInRelease;
1159 if (APT::String::Endswith(FinalFile, "InRelease"))
2ac3eeb6 1160 {
448c38bd
DK
1161 FinalInRelease = FinalFile;
1162 FinalRelease = FinalFile.substr(0, FinalFile.length() - strlen("InRelease")) + "Release";
1163 }
1164 else
1165 {
1166 FinalInRelease = FinalFile.substr(0, FinalFile.length() - strlen("Release")) + "InRelease";
1167 FinalRelease = FinalFile;
1168 }
d3222349 1169 LoadLastMetaIndexParser(TransactionManager, FinalRelease, FinalInRelease);
f6d4ab9a
DK
1170 }
1171
5ad0096a 1172 if (TransactionManager->MetaIndexParser->Load(DestFile, &ErrorText) == false)
f6d4ab9a 1173 {
448c38bd 1174 Status = StatAuthError;
f6d4ab9a
DK
1175 return false;
1176 }
1177
448c38bd 1178 if (!VerifyVendor(Message))
f6d4ab9a 1179 {
448c38bd
DK
1180 Status = StatAuthError;
1181 return false;
1182 }
f6d4ab9a 1183
448c38bd
DK
1184 if (_config->FindB("Debug::pkgAcquire::Auth", false))
1185 std::cerr << "Signature verification succeeded: "
1186 << DestFile << std::endl;
2237bd01 1187
448c38bd 1188 // Download further indexes with verification
1eba782f 1189 TransactionManager->QueueIndexes(true);
2237bd01 1190
448c38bd
DK
1191 return true;
1192}
1193 /*}}}*/
1eba782f 1194void pkgAcqMetaClearSig::QueueIndexes(bool const verify) /*{{{*/
448c38bd
DK
1195{
1196 // at this point the real Items are loaded in the fetcher
1197 ExpectedAdditionalItems = 0;
1198
7f2d1eef 1199 std::set<std::string> targetsSeen;
b7ec7a80 1200 bool const metaBaseSupportsByHash = TransactionManager->MetaIndexParser->GetSupportsAcquireByHash();
7f2d1eef 1201 for (auto &Target: TransactionManager->MetaIndexParser->GetIndexTargets())
448c38bd 1202 {
7f2d1eef
DK
1203 // if we have seen a target which is created-by a target this one here is declared a
1204 // fallback to, we skip acquiring the fallback (but we make sure we clean up)
1205 if (targetsSeen.find(Target.Option(IndexTarget::FALLBACK_OF)) != targetsSeen.end())
1206 {
1207 targetsSeen.emplace(Target.Option(IndexTarget::CREATED_BY));
1208 new CleanupItem(Owner, TransactionManager, Target);
1209 continue;
1210 }
1dd20368
DK
1211 // all is an implementation detail. Users shouldn't use this as arch
1212 // We need this support trickery here as e.g. Debian has binary-all files already,
1213 // but arch:all packages are still in the arch:any files, so we would waste precious
1214 // download time, bandwidth and diskspace for nothing, BUT Debian doesn't feature all
1215 // in the set of supported architectures, so we can filter based on this property rather
1216 // than invent an entirely new flag we would need to carry for all of eternity.
a8f565d3 1217 if (Target.Option(IndexTarget::ARCHITECTURE) == "all")
a628ca52 1218 {
b58047e0 1219 if (TransactionManager->MetaIndexParser->IsArchitectureSupported("all") == false ||
a8f565d3 1220 TransactionManager->MetaIndexParser->IsArchitectureAllSupportedFor(Target) == false)
b58047e0 1221 {
a8f565d3 1222 new CleanupItem(Owner, TransactionManager, Target);
a628ca52 1223 continue;
b58047e0 1224 }
a628ca52 1225 }
1dd20368 1226
a8f565d3 1227 bool trypdiff = Target.OptionBool(IndexTarget::PDIFFS);
9b8c28f4 1228 if (verify == true)
2ac3eeb6 1229 {
a8f565d3 1230 if (TransactionManager->MetaIndexParser->Exists(Target.MetaKey) == false)
9b8c28f4
DK
1231 {
1232 // optional targets that we do not have in the Release file are skipped
a8f565d3 1233 if (Target.IsOptional)
b58047e0 1234 {
a8f565d3 1235 new CleanupItem(Owner, TransactionManager, Target);
9b8c28f4 1236 continue;
b58047e0 1237 }
47d2bc78 1238
a8f565d3 1239 std::string const &arch = Target.Option(IndexTarget::ARCHITECTURE);
1dd20368
DK
1240 if (arch.empty() == false)
1241 {
1242 if (TransactionManager->MetaIndexParser->IsArchitectureSupported(arch) == false)
1243 {
a8f565d3 1244 new CleanupItem(Owner, TransactionManager, Target);
1dd20368 1245 _error->Notice(_("Skipping acquire of configured file '%s' as repository '%s' doesn't support architecture '%s'"),
a8f565d3 1246 Target.MetaKey.c_str(), TransactionManager->Target.Description.c_str(), arch.c_str());
1dd20368
DK
1247 continue;
1248 }
1249 // if the architecture is officially supported but currently no packages for it available,
1250 // ignore silently as this is pretty much the same as just shipping an empty file.
1251 // if we don't know which architectures are supported, we do NOT ignore it to notify user about this
1252 if (TransactionManager->MetaIndexParser->IsArchitectureSupported("*undefined*") == false)
b58047e0 1253 {
a8f565d3 1254 new CleanupItem(Owner, TransactionManager, Target);
1dd20368 1255 continue;
b58047e0 1256 }
1dd20368
DK
1257 }
1258
9b8c28f4 1259 Status = StatAuthError;
a8f565d3 1260 strprintf(ErrorText, _("Unable to find expected entry '%s' in Release file (Wrong sources.list entry or malformed file)"), Target.MetaKey.c_str());
9b8c28f4
DK
1261 return;
1262 }
bd4a8f51
DK
1263 else
1264 {
a8f565d3 1265 auto const hashes = GetExpectedHashesFor(Target.MetaKey);
b2fd8524 1266 if (hashes.empty() == false)
bd4a8f51 1267 {
b2fd8524
DK
1268 if (hashes.usable() == false)
1269 {
a8f565d3 1270 new CleanupItem(Owner, TransactionManager, Target);
b2fd8524 1271 _error->Warning(_("Skipping acquire of configured file '%s' as repository '%s' provides only weak security information for it"),
a8f565d3 1272 Target.MetaKey.c_str(), TransactionManager->Target.Description.c_str());
b2fd8524
DK
1273 continue;
1274 }
1275 // empty files are skipped as acquiring the very small compressed files is a waste of time
1276 else if (hashes.FileSize() == 0)
b58047e0 1277 {
a8f565d3 1278 new CleanupItem(Owner, TransactionManager, Target);
7f2d1eef 1279 targetsSeen.emplace(Target.Option(IndexTarget::CREATED_BY));
b2fd8524 1280 continue;
b58047e0 1281 }
bd4a8f51
DK
1282 }
1283 }
9b8c28f4 1284
d7a51997 1285 // autoselect the compression method
a8f565d3 1286 std::vector<std::string> types = VectorizeString(Target.Option(IndexTarget::COMPRESSIONTYPES), ' ');
d7a51997
DK
1287 types.erase(std::remove_if(types.begin(), types.end(), [&](std::string const &t) {
1288 if (t == "uncompressed")
a8f565d3
DK
1289 return TransactionManager->MetaIndexParser->Exists(Target.MetaKey) == false;
1290 std::string const MetaKey = Target.MetaKey + "." + t;
d7a51997
DK
1291 return TransactionManager->MetaIndexParser->Exists(MetaKey) == false;
1292 }), types.end());
1293 if (types.empty() == false)
8d041b4f 1294 {
d7a51997 1295 std::ostringstream os;
af81ab90 1296 // add the special compressiontype byhash first if supported
a8f565d3 1297 std::string const useByHashConf = Target.Option(IndexTarget::BY_HASH);
af81ab90
DK
1298 bool useByHash = false;
1299 if(useByHashConf == "force")
1300 useByHash = true;
1301 else
1302 useByHash = StringToBool(useByHashConf) == true && metaBaseSupportsByHash;
1303 if (useByHash == true)
1304 os << "by-hash ";
d7a51997
DK
1305 std::copy(types.begin(), types.end()-1, std::ostream_iterator<std::string>(os, " "));
1306 os << *types.rbegin();
a8f565d3 1307 Target.Options["COMPRESSIONTYPES"] = os.str();
d7a51997
DK
1308 }
1309 else
a8f565d3 1310 Target.Options["COMPRESSIONTYPES"].clear();
d7a51997 1311
a8f565d3 1312 std::string filename = GetExistingFilename(GetFinalFileNameFromURI(Target.URI));
d7a51997
DK
1313 if (filename.empty() == false)
1314 {
1315 // if the Release file is a hit and we have an index it must be the current one
1316 if (TransactionManager->IMSHit == true)
1317 ;
1318 else if (TransactionManager->LastMetaIndexParser != NULL)
1196da2e 1319 {
d7a51997
DK
1320 // see if the file changed since the last Release file
1321 // we use the uncompressed files as we might compress differently compared to the server,
1322 // so the hashes might not match, even if they contain the same data.
a8f565d3
DK
1323 HashStringList const newFile = GetExpectedHashesFromFor(TransactionManager->MetaIndexParser, Target.MetaKey);
1324 HashStringList const oldFile = GetExpectedHashesFromFor(TransactionManager->LastMetaIndexParser, Target.MetaKey);
d7a51997
DK
1325 if (newFile != oldFile)
1326 filename.clear();
1196da2e 1327 }
d7a51997
DK
1328 else
1329 filename.clear();
8d041b4f
DK
1330 }
1331 else
1332 trypdiff = false; // no file to patch
1333
d7a51997
DK
1334 if (filename.empty() == false)
1335 {
a8f565d3
DK
1336 new NoActionItem(Owner, Target, filename);
1337 std::string const idxfilename = GetFinalFileNameFromURI(GetDiffIndexURI(Target));
3d1e34b0 1338 if (FileExists(idxfilename))
a8f565d3 1339 new NoActionItem(Owner, Target, idxfilename);
7f2d1eef 1340 targetsSeen.emplace(Target.Option(IndexTarget::CREATED_BY));
d7a51997
DK
1341 continue;
1342 }
1343
9b8c28f4 1344 // check if we have patches available
a8f565d3 1345 trypdiff &= TransactionManager->MetaIndexParser->Exists(GetDiffIndexFileName(Target.MetaKey));
2237bd01 1346 }
d7a51997
DK
1347 else
1348 {
1349 // if we have no file to patch, no point in trying
a8f565d3 1350 trypdiff &= (GetExistingFilename(GetFinalFileNameFromURI(Target.URI)).empty() == false);
d7a51997 1351 }
448c38bd 1352
9b8c28f4
DK
1353 // no point in patching from local sources
1354 if (trypdiff)
1355 {
a8f565d3 1356 std::string const proto = Target.URI.substr(0, strlen("file:/"));
9b8c28f4
DK
1357 if (proto == "file:/" || proto == "copy:/" || proto == "cdrom:")
1358 trypdiff = false;
1359 }
1360
1361 // Queue the Index file (Packages, Sources, Translation-$foo, …)
7f2d1eef 1362 targetsSeen.emplace(Target.Option(IndexTarget::CREATED_BY));
9b8c28f4 1363 if (trypdiff)
a8f565d3 1364 new pkgAcqDiffIndex(Owner, TransactionManager, Target);
448c38bd 1365 else
a8f565d3 1366 new pkgAcqIndex(Owner, TransactionManager, Target);
2237bd01 1367 }
448c38bd
DK
1368}
1369 /*}}}*/
fb7b11eb 1370bool pkgAcqMetaBase::VerifyVendor(string const &) /*{{{*/
448c38bd 1371{
448c38bd
DK
1372 string Transformed = TransactionManager->MetaIndexParser->GetExpectedDist();
1373
1374 if (Transformed == "../project/experimental")
f6d4ab9a 1375 {
448c38bd 1376 Transformed = "experimental";
f6d4ab9a
DK
1377 }
1378
fb7b11eb 1379 auto pos = Transformed.rfind('/');
448c38bd 1380 if (pos != string::npos)
f6d4ab9a 1381 {
448c38bd 1382 Transformed = Transformed.substr(0, pos);
f6d4ab9a
DK
1383 }
1384
448c38bd 1385 if (Transformed == ".")
f6d4ab9a 1386 {
448c38bd 1387 Transformed = "";
f6d4ab9a
DK
1388 }
1389
0741daeb
DK
1390 if (TransactionManager->MetaIndexParser->GetValidUntil() > 0)
1391 {
448c38bd
DK
1392 time_t const invalid_since = time(NULL) - TransactionManager->MetaIndexParser->GetValidUntil();
1393 if (invalid_since > 0)
1394 {
1395 std::string errmsg;
1396 strprintf(errmsg,
1397 // TRANSLATOR: The first %s is the URL of the bad Release file, the second is
3d8232bf 1398 // the time since then the file is invalid - formatted in the same way as in
448c38bd
DK
1399 // the download progress display (e.g. 7d 3h 42min 1s)
1400 _("Release file for %s is expired (invalid since %s). "
1401 "Updates for this repository will not be applied."),
dcbbb14d 1402 Target.URI.c_str(), TimeToStr(invalid_since).c_str());
448c38bd
DK
1403 if (ErrorText.empty())
1404 ErrorText = errmsg;
1405 return _error->Error("%s", errmsg.c_str());
1406 }
1407 }
f6d4ab9a 1408
448c38bd
DK
1409 /* Did we get a file older than what we have? This is a last minute IMS hit and doubles
1410 as a prevention of downgrading us to older (still valid) files */
1411 if (TransactionManager->IMSHit == false && TransactionManager->LastMetaIndexParser != NULL &&
1412 TransactionManager->LastMetaIndexParser->GetDate() > TransactionManager->MetaIndexParser->GetDate())
f6d4ab9a 1413 {
448c38bd 1414 TransactionManager->IMSHit = true;
51818f26 1415 RemoveFile("VerifyVendor", DestFile);
448c38bd 1416 PartialFile = DestFile = GetFinalFilename();
5ad0096a
DK
1417 // load the 'old' file in the 'new' one instead of flipping pointers as
1418 // the new one isn't owned by us, while the old one is so cleanup would be confused.
1419 TransactionManager->MetaIndexParser->swapLoad(TransactionManager->LastMetaIndexParser);
1420 delete TransactionManager->LastMetaIndexParser;
448c38bd 1421 TransactionManager->LastMetaIndexParser = NULL;
f6d4ab9a
DK
1422 }
1423
448c38bd 1424 if (_config->FindB("Debug::pkgAcquire::Auth", false))
f6d4ab9a 1425 {
5ad0096a 1426 std::cerr << "Got Codename: " << TransactionManager->MetaIndexParser->GetCodename() << std::endl;
448c38bd
DK
1427 std::cerr << "Expecting Dist: " << TransactionManager->MetaIndexParser->GetExpectedDist() << std::endl;
1428 std::cerr << "Transformed Dist: " << Transformed << std::endl;
f6d4ab9a 1429 }
448c38bd
DK
1430
1431 if (TransactionManager->MetaIndexParser->CheckDist(Transformed) == false)
f6d4ab9a 1432 {
448c38bd
DK
1433 // This might become fatal one day
1434// Status = StatAuthError;
1435// ErrorText = "Conflicting distribution; expected "
1436// + MetaIndexParser->GetExpectedDist() + " but got "
5ad0096a 1437// + MetaIndexParser->GetCodename();
448c38bd
DK
1438// return false;
1439 if (!Transformed.empty())
1440 {
1441 _error->Warning(_("Conflicting distribution: %s (expected %s but got %s)"),
1442 Desc.Description.c_str(),
1443 Transformed.c_str(),
5ad0096a 1444 TransactionManager->MetaIndexParser->GetCodename().c_str());
448c38bd 1445 }
f6d4ab9a
DK
1446 }
1447
f6d4ab9a 1448 return true;
2237bd01 1449}
92fcbfc1 1450 /*}}}*/
3d8232bf
DK
1451pkgAcqMetaBase::~pkgAcqMetaBase()
1452{
1453}
2237bd01 1454
448c38bd
DK
1455pkgAcqMetaClearSig::pkgAcqMetaClearSig(pkgAcquire * const Owner, /*{{{*/
1456 IndexTarget const &ClearsignedTarget,
1457 IndexTarget const &DetachedDataTarget, IndexTarget const &DetachedSigTarget,
5ad0096a 1458 metaIndex * const MetaIndexParser) :
a8f565d3 1459 pkgAcqMetaIndex(Owner, this, ClearsignedTarget, DetachedSigTarget),
6c55f07a 1460 d(NULL), ClearsignedTarget(ClearsignedTarget),
3d8232bf
DK
1461 DetachedDataTarget(DetachedDataTarget),
1462 MetaIndexParser(MetaIndexParser), LastMetaIndexParser(NULL)
448c38bd
DK
1463{
1464 // index targets + (worst case:) Release/Release.gpg
1eba782f 1465 ExpectedAdditionalItems = std::numeric_limits<decltype(ExpectedAdditionalItems)>::max();
448c38bd 1466 TransactionManager->Add(this);
2237bd01 1467}
92fcbfc1 1468 /*}}}*/
448c38bd 1469pkgAcqMetaClearSig::~pkgAcqMetaClearSig() /*{{{*/
146f7715 1470{
3d8232bf
DK
1471 if (LastMetaIndexParser != NULL)
1472 delete LastMetaIndexParser;
146f7715
DK
1473}
1474 /*}}}*/
448c38bd
DK
1475// pkgAcqMetaClearSig::Custom600Headers - Insert custom request headers /*{{{*/
1476string pkgAcqMetaClearSig::Custom600Headers() const
2237bd01 1477{
448c38bd
DK
1478 string Header = pkgAcqMetaBase::Custom600Headers();
1479 Header += "\nFail-Ignore: true";
b0d40854
DK
1480 std::string const key = TransactionManager->MetaIndexParser->GetSignedBy();
1481 if (key.empty() == false)
1482 Header += "\nSigned-By: " + key;
1483
448c38bd
DK
1484 return Header;
1485}
1486 /*}}}*/
57f16d51
DK
1487void pkgAcqMetaClearSig::Finished() /*{{{*/
1488{
1489 if(_config->FindB("Debug::Acquire::Transaction", false) == true)
1490 std::clog << "Finished: " << DestFile <<std::endl;
b7ec7a80 1491 if(TransactionManager->State == TransactionStarted &&
57f16d51
DK
1492 TransactionManager->TransactionHasError() == false)
1493 TransactionManager->CommitTransaction();
1494}
1495 /*}}}*/
24e8f24e 1496bool pkgAcqMetaClearSig::VerifyDone(std::string const &Message, /*{{{*/
dd676dc7
DK
1497 pkgAcquire::MethodConfig const * const Cnf)
1498{
1499 Item::VerifyDone(Message, Cnf);
1500
1501 if (FileExists(DestFile) && !StartsWithGPGClearTextSignature(DestFile))
1502 return RenameOnError(NotClearsigned);
1503
1504 return true;
1505}
24e8f24e 1506 /*}}}*/
448c38bd 1507// pkgAcqMetaClearSig::Done - We got a file /*{{{*/
448c38bd
DK
1508void pkgAcqMetaClearSig::Done(std::string const &Message,
1509 HashStringList const &Hashes,
1510 pkgAcquire::MethodConfig const * const Cnf)
1511{
1512 Item::Done(Message, Hashes, Cnf);
8d266656 1513
448c38bd
DK
1514 if(AuthPass == false)
1515 {
1516 if(CheckDownloadDone(this, Message, Hashes) == true)
1517 QueueForSignatureVerify(this, DestFile, DestFile);
1518 return;
1519 }
1520 else if(CheckAuthDone(Message) == true)
1521 {
1522 if (TransactionManager->IMSHit == false)
1523 TransactionManager->TransactionStageCopy(this, DestFile, GetFinalFilename());
1524 else if (RealFileExists(GetFinalFilename()) == false)
1525 {
1526 // We got an InRelease file IMSHit, but we haven't one, which means
1527 // we had a valid Release/Release.gpg combo stepping in, which we have
1528 // to 'acquire' now to ensure list cleanup isn't removing them
dcbbb14d
DK
1529 new NoActionItem(Owner, DetachedDataTarget);
1530 new NoActionItem(Owner, DetachedSigTarget);
448c38bd
DK
1531 }
1532 }
2237bd01 1533}
92fcbfc1 1534 /*}}}*/
448c38bd 1535void pkgAcqMetaClearSig::Failed(string const &Message,pkgAcquire::MethodConfig const * const Cnf) /*{{{*/
2237bd01 1536{
448c38bd 1537 Item::Failed(Message, Cnf);
2237bd01 1538
448c38bd 1539 if (AuthPass == false)
2ac3eeb6 1540 {
f18f2338 1541 if (Status == StatAuthError || Status == StatTransientNetworkError)
dd676dc7 1542 {
f18f2338
DK
1543 // if we expected a ClearTextSignature (InRelease) but got a network
1544 // error or got a file, but it wasn't valid, we end up here (see VerifyDone).
dd676dc7
DK
1545 // As these is usually called by web-portals we do not try Release/Release.gpg
1546 // as this is gonna fail anyway and instead abort our try (LP#346386)
1547 TransactionManager->AbortTransaction();
1548 return;
1549 }
1550
448c38bd
DK
1551 // Queue the 'old' InRelease file for removal if we try Release.gpg
1552 // as otherwise the file will stay around and gives a false-auth
1553 // impression (CVE-2012-0214)
1554 TransactionManager->TransactionStageRemoval(this, GetFinalFilename());
1555 Status = StatDone;
1556
a8f565d3 1557 new pkgAcqMetaIndex(Owner, TransactionManager, DetachedDataTarget, DetachedSigTarget);
2ac3eeb6
MV
1558 }
1559 else
1560 {
448c38bd
DK
1561 if(CheckStopAuthentication(this, Message))
1562 return;
1563
448c38bd
DK
1564 // No Release file was present, or verification failed, so fall
1565 // back to queueing Packages files without verification
d04e44ac 1566 // only allow going further if the user explicitly wants it
f18f2338 1567 if(AllowInsecureRepositories(_("The repository '%s' is not signed."), ClearsignedTarget.Description, TransactionManager->MetaIndexParser, TransactionManager, this) == true)
146f7715 1568 {
448c38bd
DK
1569 Status = StatDone;
1570
1571 /* InRelease files become Release files, otherwise
1572 * they would be considered as trusted later on */
1573 string const FinalRelease = GetFinalFileNameFromURI(DetachedDataTarget.URI);
1574 string const PartialRelease = GetPartialFileNameFromURI(DetachedDataTarget.URI);
1575 string const FinalReleasegpg = GetFinalFileNameFromURI(DetachedSigTarget.URI);
1576 string const FinalInRelease = GetFinalFilename();
1577 Rename(DestFile, PartialRelease);
1578 TransactionManager->TransactionStageCopy(this, PartialRelease, FinalRelease);
d3222349 1579 LoadLastMetaIndexParser(TransactionManager, FinalRelease, FinalInRelease);
146f7715 1580
448c38bd
DK
1581 // we parse the indexes here because at this point the user wanted
1582 // a repository that may potentially harm him
5ad0096a 1583 if (TransactionManager->MetaIndexParser->Load(PartialRelease, &ErrorText) == false || VerifyVendor(Message) == false)
448c38bd
DK
1584 /* expired Release files are still a problem you need extra force for */;
1585 else
1eba782f 1586 TransactionManager->QueueIndexes(true);
448c38bd 1587 }
2237bd01
MV
1588 }
1589}
92fcbfc1 1590 /*}}}*/
03aa0847 1591
448c38bd 1592pkgAcqMetaIndex::pkgAcqMetaIndex(pkgAcquire * const Owner, /*{{{*/
3d8232bf 1593 pkgAcqMetaClearSig * const TransactionManager,
448c38bd 1594 IndexTarget const &DataTarget,
a8f565d3
DK
1595 IndexTarget const &DetachedSigTarget) :
1596 pkgAcqMetaBase(Owner, TransactionManager, DataTarget), d(NULL),
448c38bd 1597 DetachedSigTarget(DetachedSigTarget)
ac5b205a 1598{
448c38bd
DK
1599 if(_config->FindB("Debug::Acquire::Transaction", false) == true)
1600 std::clog << "New pkgAcqMetaIndex with TransactionManager "
1601 << this->TransactionManager << std::endl;
2d4722e2 1602
448c38bd 1603 DestFile = GetPartialFileNameFromURI(DataTarget.URI);
fa3a96a1 1604
448c38bd
DK
1605 // Create the item
1606 Desc.Description = DataTarget.Description;
1607 Desc.Owner = this;
1608 Desc.ShortDesc = DataTarget.ShortDesc;
1609 Desc.URI = DataTarget.URI;
448c38bd 1610 QueueURI(Desc);
ac5b205a 1611}
92fcbfc1 1612 /*}}}*/
448c38bd
DK
1613void pkgAcqMetaIndex::Done(string const &Message, /*{{{*/
1614 HashStringList const &Hashes,
1615 pkgAcquire::MethodConfig const * const Cfg)
ac5b205a 1616{
448c38bd 1617 Item::Done(Message,Hashes,Cfg);
03bfbc96 1618
448c38bd 1619 if(CheckDownloadDone(this, Message, Hashes))
03bfbc96 1620 {
448c38bd
DK
1621 // we have a Release file, now download the Signature, all further
1622 // verify/queue for additional downloads will be done in the
1623 // pkgAcqMetaSig::Done() code
dcbbb14d 1624 new pkgAcqMetaSig(Owner, TransactionManager, DetachedSigTarget, this);
03bfbc96 1625 }
448c38bd
DK
1626}
1627 /*}}}*/
1628// pkgAcqMetaIndex::Failed - no Release file present /*{{{*/
1629void pkgAcqMetaIndex::Failed(string const &Message,
1630 pkgAcquire::MethodConfig const * const Cnf)
1631{
1632 pkgAcquire::Item::Failed(Message, Cnf);
1633 Status = StatDone;
94dc9d7d 1634
448c38bd
DK
1635 // No Release file was present so fall
1636 // back to queueing Packages files without verification
d04e44ac 1637 // only allow going further if the user explicitly wants it
f18f2338 1638 if(AllowInsecureRepositories(_("The repository '%s' does not have a Release file."), Target.Description, TransactionManager->MetaIndexParser, TransactionManager, this) == true)
f6d4ab9a 1639 {
448c38bd
DK
1640 // ensure old Release files are removed
1641 TransactionManager->TransactionStageRemoval(this, GetFinalFilename());
03bfbc96 1642
448c38bd 1643 // queue without any kind of hashsum support
1eba782f 1644 TransactionManager->QueueIndexes(false);
59a704f0 1645 }
448c38bd
DK
1646}
1647 /*}}}*/
448c38bd
DK
1648std::string pkgAcqMetaIndex::DescURI() const /*{{{*/
1649{
dcbbb14d 1650 return Target.URI;
448c38bd
DK
1651}
1652 /*}}}*/
c8a4ce6c 1653pkgAcqMetaIndex::~pkgAcqMetaIndex() {}
94dc9d7d 1654
448c38bd
DK
1655// AcqMetaSig::AcqMetaSig - Constructor /*{{{*/
1656pkgAcqMetaSig::pkgAcqMetaSig(pkgAcquire * const Owner,
3d8232bf 1657 pkgAcqMetaClearSig * const TransactionManager,
e8afd168 1658 IndexTarget const &Target,
448c38bd 1659 pkgAcqMetaIndex * const MetaIndex) :
6c55f07a 1660 pkgAcqTransactionItem(Owner, TransactionManager, Target), d(NULL), MetaIndex(MetaIndex)
448c38bd 1661{
dcbbb14d 1662 DestFile = GetPartialFileNameFromURI(Target.URI);
6cb30d01 1663
448c38bd
DK
1664 // remove any partial downloaded sig-file in partial/.
1665 // it may confuse proxies and is too small to warrant a
1666 // partial download anyway
51818f26 1667 RemoveFile("pkgAcqMetaSig", DestFile);
ac5b205a 1668
448c38bd
DK
1669 // set the TransactionManager
1670 if(_config->FindB("Debug::Acquire::Transaction", false) == true)
1671 std::clog << "New pkgAcqMetaSig with TransactionManager "
1672 << TransactionManager << std::endl;
f6d4ab9a 1673
448c38bd 1674 // Create the item
dcbbb14d 1675 Desc.Description = Target.Description;
448c38bd 1676 Desc.Owner = this;
dcbbb14d
DK
1677 Desc.ShortDesc = Target.ShortDesc;
1678 Desc.URI = Target.URI;
ac5b205a 1679
448c38bd
DK
1680 // If we got a hit for Release, we will get one for Release.gpg too (or obscure errors),
1681 // so we skip the download step and go instantly to verification
1682 if (TransactionManager->IMSHit == true && RealFileExists(GetFinalFilename()))
1683 {
1684 Complete = true;
1685 Status = StatDone;
1686 PartialFile = DestFile = GetFinalFilename();
1687 MetaIndexFileSignature = DestFile;
1688 MetaIndex->QueueForSignatureVerify(this, MetaIndex->DestFile, DestFile);
1689 }
1690 else
1691 QueueURI(Desc);
ac5b205a 1692}
92fcbfc1 1693 /*}}}*/
448c38bd 1694pkgAcqMetaSig::~pkgAcqMetaSig() /*{{{*/
ac5b205a 1695{
b0d40854
DK
1696}
1697 /*}}}*/
1698// pkgAcqMetaSig::Custom600Headers - Insert custom request headers /*{{{*/
1699std::string pkgAcqMetaSig::Custom600Headers() const
1700{
1701 std::string Header = pkgAcqTransactionItem::Custom600Headers();
1702 std::string const key = TransactionManager->MetaIndexParser->GetSignedBy();
1703 if (key.empty() == false)
1704 Header += "\nSigned-By: " + key;
1705 return Header;
448c38bd
DK
1706}
1707 /*}}}*/
1708// AcqMetaSig::Done - The signature was downloaded/verified /*{{{*/
1709void pkgAcqMetaSig::Done(string const &Message, HashStringList const &Hashes,
1710 pkgAcquire::MethodConfig const * const Cfg)
1711{
1712 if (MetaIndexFileSignature.empty() == false)
4a0a786f 1713 {
448c38bd
DK
1714 DestFile = MetaIndexFileSignature;
1715 MetaIndexFileSignature.clear();
1716 }
1717 Item::Done(Message, Hashes, Cfg);
f6d4ab9a 1718
448c38bd
DK
1719 if(MetaIndex->AuthPass == false)
1720 {
1721 if(MetaIndex->CheckDownloadDone(this, Message, Hashes) == true)
f6d4ab9a 1722 {
448c38bd
DK
1723 // destfile will be modified to point to MetaIndexFile for the
1724 // gpgv method, so we need to save it here
1725 MetaIndexFileSignature = DestFile;
1726 MetaIndex->QueueForSignatureVerify(this, MetaIndex->DestFile, DestFile);
1727 }
1728 return;
1729 }
1730 else if(MetaIndex->CheckAuthDone(Message) == true)
1731 {
1732 if (TransactionManager->IMSHit == false)
1733 {
1734 TransactionManager->TransactionStageCopy(this, DestFile, GetFinalFilename());
1735 TransactionManager->TransactionStageCopy(MetaIndex, MetaIndex->DestFile, MetaIndex->GetFinalFilename());
f6d4ab9a 1736 }
448c38bd
DK
1737 }
1738}
1739 /*}}}*/
1740void pkgAcqMetaSig::Failed(string const &Message,pkgAcquire::MethodConfig const * const Cnf)/*{{{*/
1741{
1742 Item::Failed(Message,Cnf);
4a0a786f 1743
448c38bd
DK
1744 // check if we need to fail at this point
1745 if (MetaIndex->AuthPass == true && MetaIndex->CheckStopAuthentication(this, Message))
1746 return;
4a0a786f 1747
448c38bd
DK
1748 string const FinalRelease = MetaIndex->GetFinalFilename();
1749 string const FinalReleasegpg = GetFinalFilename();
1750 string const FinalInRelease = TransactionManager->GetFinalFilename();
4a0a786f 1751
448c38bd
DK
1752 if (RealFileExists(FinalReleasegpg) || RealFileExists(FinalInRelease))
1753 {
1754 std::string downgrade_msg;
1755 strprintf(downgrade_msg, _("The repository '%s' is no longer signed."),
dcbbb14d 1756 MetaIndex->Target.Description.c_str());
448c38bd
DK
1757 if(_config->FindB("Acquire::AllowDowngradeToInsecureRepositories"))
1758 {
1759 // meh, the users wants to take risks (we still mark the packages
1760 // from this repository as unauthenticated)
1761 _error->Warning("%s", downgrade_msg.c_str());
1762 _error->Warning(_("This is normally not allowed, but the option "
1763 "Acquire::AllowDowngradeToInsecureRepositories was "
1764 "given to override it."));
1765 Status = StatDone;
1766 } else {
f18f2338 1767 MessageInsecureRepository(true, downgrade_msg);
448c38bd
DK
1768 if (TransactionManager->IMSHit == false)
1769 Rename(MetaIndex->DestFile, MetaIndex->DestFile + ".FAILED");
1770 Item::Failed("Message: " + downgrade_msg, Cnf);
1771 TransactionManager->AbortTransaction();
1772 return;
1773 }
1774 }
4a0a786f 1775
448c38bd
DK
1776 // ensures that a Release.gpg file in the lists/ is removed by the transaction
1777 TransactionManager->TransactionStageRemoval(this, DestFile);
4a0a786f 1778
d04e44ac 1779 // only allow going further if the user explicitly wants it
f18f2338 1780 if (AllowInsecureRepositories(_("The repository '%s' is not signed."), MetaIndex->Target.Description, TransactionManager->MetaIndexParser, TransactionManager, this) == true)
4a0a786f 1781 {
d3222349 1782 LoadLastMetaIndexParser(TransactionManager, FinalRelease, FinalInRelease);
4a0a786f 1783
448c38bd
DK
1784 // we parse the indexes here because at this point the user wanted
1785 // a repository that may potentially harm him
f01f5d91
DK
1786 bool const GoodLoad = TransactionManager->MetaIndexParser->Load(MetaIndex->DestFile, &ErrorText);
1787 if (MetaIndex->VerifyVendor(Message) == false)
448c38bd
DK
1788 /* expired Release files are still a problem you need extra force for */;
1789 else
1eba782f 1790 TransactionManager->QueueIndexes(GoodLoad);
448c38bd
DK
1791
1792 TransactionManager->TransactionStageCopy(MetaIndex, MetaIndex->DestFile, MetaIndex->GetFinalFilename());
1793 }
1794
1795 // FIXME: this is used often (e.g. in pkgAcqIndexTrans) so refactor
1796 if (Cnf->LocalOnly == true ||
1797 StringToBool(LookupTag(Message,"Transient-Failure"),false) == false)
1798 {
1799 // Ignore this
1800 Status = StatDone;
ac5b205a 1801 }
ac5b205a 1802}
92fcbfc1 1803 /*}}}*/
448c38bd
DK
1804
1805
1806// AcqBaseIndex - Constructor /*{{{*/
1807pkgAcqBaseIndex::pkgAcqBaseIndex(pkgAcquire * const Owner,
3d8232bf 1808 pkgAcqMetaClearSig * const TransactionManager,
e8afd168 1809 IndexTarget const &Target)
6c55f07a 1810: pkgAcqTransactionItem(Owner, TransactionManager, Target), d(NULL)
448c38bd 1811{
0340069c
DK
1812}
1813 /*}}}*/
1814void pkgAcqBaseIndex::Failed(std::string const &Message,pkgAcquire::MethodConfig const * const Cnf)/*{{{*/
1815{
1816 pkgAcquire::Item::Failed(Message, Cnf);
b7ec7a80 1817 if (Status != StatAuthError)
0340069c
DK
1818 return;
1819
1820 ErrorText.append("Release file created at: ");
1821 auto const timespec = TransactionManager->MetaIndexParser->GetDate();
1822 if (timespec == 0)
1823 ErrorText.append("<unknown>");
1824 else
1825 ErrorText.append(TimeRFC1123(timespec));
1826 ErrorText.append("\n");
448c38bd
DK
1827}
1828 /*}}}*/
c8a4ce6c 1829pkgAcqBaseIndex::~pkgAcqBaseIndex() {}
448c38bd
DK
1830
1831// AcqDiffIndex::AcqDiffIndex - Constructor /*{{{*/
1832// ---------------------------------------------------------------------
1833/* Get the DiffIndex file first and see if there are patches available
1834 * If so, create a pkgAcqIndexDiffs fetcher that will get and apply the
1835 * patches. If anything goes wrong in that process, it will fall back to
1836 * the original packages file
1837 */
1838pkgAcqDiffIndex::pkgAcqDiffIndex(pkgAcquire * const Owner,
3d8232bf 1839 pkgAcqMetaClearSig * const TransactionManager,
e8afd168 1840 IndexTarget const &Target)
3d8232bf 1841 : pkgAcqBaseIndex(Owner, TransactionManager, Target), d(NULL), diffs(NULL)
47d2bc78 1842{
1eba782f
DK
1843 // FIXME: Magic number as an upper bound on pdiffs we will reasonably acquire
1844 ExpectedAdditionalItems = 40;
1845
47d2bc78
DK
1846 Debug = _config->FindB("Debug::pkgAcquire::Diffs",false);
1847
47d2bc78 1848 Desc.Owner = this;
b7a1076f 1849 Desc.Description = GetDiffIndexFileName(Target.Description);
dcbbb14d 1850 Desc.ShortDesc = Target.ShortDesc;
b7a1076f 1851 Desc.URI = GetDiffIndexURI(Target);
47d2bc78 1852
448c38bd
DK
1853 DestFile = GetPartialFileNameFromURI(Desc.URI);
1854
1855 if(Debug)
1856 std::clog << "pkgAcqDiffIndex: " << Desc.URI << std::endl;
5684f71f 1857
47d2bc78
DK
1858 QueueURI(Desc);
1859}
1860 /*}}}*/
448c38bd
DK
1861// AcqIndex::Custom600Headers - Insert custom request headers /*{{{*/
1862// ---------------------------------------------------------------------
1863/* The only header we use is the last-modified header. */
1864string pkgAcqDiffIndex::Custom600Headers() const
47d2bc78 1865{
abd6af5a
DK
1866 if (TransactionManager->LastMetaIndexParser != NULL)
1867 return "\nIndex-File: true";
1868
448c38bd 1869 string const Final = GetFinalFilename();
47d2bc78 1870
448c38bd
DK
1871 if(Debug)
1872 std::clog << "Custom600Header-IMS: " << Final << std::endl;
47d2bc78 1873
448c38bd
DK
1874 struct stat Buf;
1875 if (stat(Final.c_str(),&Buf) != 0)
1876 return "\nIndex-File: true";
1877
1878 return "\nIndex-File: true\nLast-Modified: " + TimeRFC1123(Buf.st_mtime);
1879}
1880 /*}}}*/
1881void pkgAcqDiffIndex::QueueOnIMSHit() const /*{{{*/
1882{
1883 // list cleanup needs to know that this file as well as the already
1884 // present index is ours, so we create an empty diff to save it for us
1885 new pkgAcqIndexDiffs(Owner, TransactionManager, Target);
47d2bc78
DK
1886}
1887 /*}}}*/
448c38bd 1888bool pkgAcqDiffIndex::ParseDiffIndex(string const &IndexDiffFile) /*{{{*/
47d2bc78 1889{
1eba782f 1890 ExpectedAdditionalItems = 0;
448c38bd
DK
1891 // failing here is fine: our caller will take care of trying to
1892 // get the complete file if patching fails
47d2bc78 1893 if(Debug)
448c38bd
DK
1894 std::clog << "pkgAcqDiffIndex::ParseIndexDiff() " << IndexDiffFile
1895 << std::endl;
f6d4ab9a 1896
448c38bd
DK
1897 FileFd Fd(IndexDiffFile,FileFd::ReadOnly);
1898 pkgTagFile TF(&Fd);
95278287 1899 if (Fd.IsOpen() == false || Fd.Failed())
448c38bd 1900 return false;
47d2bc78 1901
448c38bd
DK
1902 pkgTagSection Tags;
1903 if(unlikely(TF.Step(Tags) == false))
1904 return false;
47d2bc78 1905
448c38bd
DK
1906 HashStringList ServerHashes;
1907 unsigned long long ServerSize = 0;
47d2bc78 1908
448c38bd
DK
1909 for (char const * const * type = HashString::SupportedHashes(); *type != NULL; ++type)
1910 {
1911 std::string tagname = *type;
1912 tagname.append("-Current");
1913 std::string const tmp = Tags.FindS(tagname.c_str());
1914 if (tmp.empty() == true)
1915 continue;
146f7715 1916
448c38bd
DK
1917 string hash;
1918 unsigned long long size;
1919 std::stringstream ss(tmp);
1920 ss >> hash >> size;
1921 if (unlikely(hash.empty() == true))
1922 continue;
1923 if (unlikely(ServerSize != 0 && ServerSize != size))
1924 continue;
1925 ServerHashes.push_back(HashString(*type, hash));
1926 ServerSize = size;
1927 }
47d2bc78 1928
448c38bd
DK
1929 if (ServerHashes.usable() == false)
1930 {
1931 if (Debug == true)
1932 std::clog << "pkgAcqDiffIndex: " << IndexDiffFile << ": Did not find a good hashsum in the index" << std::endl;
1933 return false;
47d2bc78 1934 }
448c38bd 1935
dcbbb14d
DK
1936 std::string const CurrentPackagesFile = GetFinalFileNameFromURI(Target.URI);
1937 HashStringList const TargetFileHashes = GetExpectedHashesFor(Target.MetaKey);
448c38bd 1938 if (TargetFileHashes.usable() == false || ServerHashes != TargetFileHashes)
47d2bc78 1939 {
448c38bd 1940 if (Debug == true)
47d2bc78 1941 {
448c38bd 1942 std::clog << "pkgAcqDiffIndex: " << IndexDiffFile << ": Index has different hashes than parser, probably older, so fail pdiffing" << std::endl;
8d89cda7 1943 printHashSumComparison(CurrentPackagesFile, ServerHashes, TargetFileHashes);
47d2bc78 1944 }
448c38bd
DK
1945 return false;
1946 }
47d2bc78 1947
9b8c28f4
DK
1948 HashStringList LocalHashes;
1949 // try avoiding calculating the hash here as this is costly
1950 if (TransactionManager->LastMetaIndexParser != NULL)
dcbbb14d 1951 LocalHashes = GetExpectedHashesFromFor(TransactionManager->LastMetaIndexParser, Target.MetaKey);
9b8c28f4
DK
1952 if (LocalHashes.usable() == false)
1953 {
d7a51997 1954 FileFd fd(CurrentPackagesFile, FileFd::ReadOnly, FileFd::Auto);
9b8c28f4
DK
1955 Hashes LocalHashesCalc(ServerHashes);
1956 LocalHashesCalc.AddFD(fd);
1957 LocalHashes = LocalHashesCalc.GetHashStringList();
1958 }
1959
1960 if (ServerHashes == LocalHashes)
448c38bd
DK
1961 {
1962 // we have the same sha1 as the server so we are done here
47d2bc78 1963 if(Debug)
448c38bd
DK
1964 std::clog << "pkgAcqDiffIndex: Package file " << CurrentPackagesFile << " is up-to-date" << std::endl;
1965 QueueOnIMSHit();
1966 return true;
1967 }
47d2bc78 1968
448c38bd
DK
1969 if(Debug)
1970 std::clog << "Server-Current: " << ServerHashes.find(NULL)->toStr() << " and we start at "
9b8c28f4 1971 << CurrentPackagesFile << " " << LocalHashes.FileSize() << " " << LocalHashes.find(NULL)->toStr() << std::endl;
34d6ece7 1972
37141fe4
DK
1973 // historically, older hashes have more info than newer ones, so start
1974 // collecting with older ones first to avoid implementing complicated
1975 // information merging techniques… a failure is after all always
1976 // recoverable with a complete file and hashes aren't changed that often.
1977 std::vector<char const *> types;
1978 for (char const * const * type = HashString::SupportedHashes(); *type != NULL; ++type)
1979 types.push_back(*type);
1980
448c38bd
DK
1981 // parse all of (provided) history
1982 vector<DiffInfo> available_patches;
1983 bool firstAcceptedHashes = true;
37141fe4 1984 for (auto type = types.crbegin(); type != types.crend(); ++type)
651bddad 1985 {
448c38bd
DK
1986 if (LocalHashes.find(*type) == NULL)
1987 continue;
21638c3a 1988
448c38bd
DK
1989 std::string tagname = *type;
1990 tagname.append("-History");
1991 std::string const tmp = Tags.FindS(tagname.c_str());
1992 if (tmp.empty() == true)
1993 continue;
a64bf0eb 1994
448c38bd
DK
1995 string hash, filename;
1996 unsigned long long size;
1997 std::stringstream ss(tmp);
56472095 1998
448c38bd 1999 while (ss >> hash >> size >> filename)
651bddad 2000 {
448c38bd
DK
2001 if (unlikely(hash.empty() == true || filename.empty() == true))
2002 continue;
2003
2004 // see if we have a record for this file already
2005 std::vector<DiffInfo>::iterator cur = available_patches.begin();
2006 for (; cur != available_patches.end(); ++cur)
2007 {
4f51fd86 2008 if (cur->file != filename)
448c38bd
DK
2009 continue;
2010 cur->result_hashes.push_back(HashString(*type, hash));
2011 break;
2012 }
2013 if (cur != available_patches.end())
2014 continue;
2015 if (firstAcceptedHashes == true)
2016 {
2017 DiffInfo next;
2018 next.file = filename;
2019 next.result_hashes.push_back(HashString(*type, hash));
4f51fd86 2020 next.result_hashes.FileSize(size);
448c38bd
DK
2021 available_patches.push_back(next);
2022 }
2023 else
2024 {
2025 if (Debug == true)
2026 std::clog << "pkgAcqDiffIndex: " << IndexDiffFile << ": File " << filename
2027 << " wasn't in the list for the first parsed hash! (history)" << std::endl;
2028 break;
2029 }
651bddad 2030 }
448c38bd 2031 firstAcceptedHashes = false;
5d885723 2032 }
448c38bd
DK
2033
2034 if (unlikely(available_patches.empty() == true))
5d885723 2035 {
448c38bd
DK
2036 if (Debug)
2037 std::clog << "pkgAcqDiffIndex: " << IndexDiffFile << ": "
2038 << "Couldn't find any patches for the patch series." << std::endl;
2039 return false;
5d885723 2040 }
8267fe24 2041
37141fe4 2042 for (auto type = types.crbegin(); type != types.crend(); ++type)
b11f9599 2043 {
448c38bd
DK
2044 if (LocalHashes.find(*type) == NULL)
2045 continue;
97b65b10 2046
448c38bd
DK
2047 std::string tagname = *type;
2048 tagname.append("-Patches");
2049 std::string const tmp = Tags.FindS(tagname.c_str());
2050 if (tmp.empty() == true)
2051 continue;
18593cf7 2052
448c38bd
DK
2053 string hash, filename;
2054 unsigned long long size;
2055 std::stringstream ss(tmp);
03aa0847 2056
448c38bd 2057 while (ss >> hash >> size >> filename)
58702f85 2058 {
448c38bd
DK
2059 if (unlikely(hash.empty() == true || filename.empty() == true))
2060 continue;
146f7715 2061
448c38bd
DK
2062 // see if we have a record for this file already
2063 std::vector<DiffInfo>::iterator cur = available_patches.begin();
2064 for (; cur != available_patches.end(); ++cur)
146f7715 2065 {
448c38bd
DK
2066 if (cur->file != filename)
2067 continue;
4f51fd86
DK
2068 if (cur->patch_hashes.empty())
2069 cur->patch_hashes.FileSize(size);
448c38bd 2070 cur->patch_hashes.push_back(HashString(*type, hash));
448c38bd 2071 break;
146f7715 2072 }
448c38bd
DK
2073 if (cur != available_patches.end())
2074 continue;
2075 if (Debug == true)
2076 std::clog << "pkgAcqDiffIndex: " << IndexDiffFile << ": File " << filename
2077 << " wasn't in the list for the first parsed hash! (patches)" << std::endl;
146f7715 2078 break;
146f7715
DK
2079 }
2080 }
2d0a7bb4 2081
37141fe4 2082 for (auto type = types.crbegin(); type != types.crend(); ++type)
4f51fd86
DK
2083 {
2084 std::string tagname = *type;
2085 tagname.append("-Download");
2086 std::string const tmp = Tags.FindS(tagname.c_str());
2087 if (tmp.empty() == true)
2088 continue;
2089
2090 string hash, filename;
2091 unsigned long long size;
2092 std::stringstream ss(tmp);
2093
2094 // FIXME: all of pdiff supports only .gz compressed patches
2095 while (ss >> hash >> size >> filename)
2096 {
2097 if (unlikely(hash.empty() == true || filename.empty() == true))
2098 continue;
2099 if (unlikely(APT::String::Endswith(filename, ".gz") == false))
2100 continue;
2101 filename.erase(filename.length() - 3);
2102
2103 // see if we have a record for this file already
2104 std::vector<DiffInfo>::iterator cur = available_patches.begin();
2105 for (; cur != available_patches.end(); ++cur)
2106 {
2107 if (cur->file != filename)
2108 continue;
2109 if (cur->download_hashes.empty())
2110 cur->download_hashes.FileSize(size);
2111 cur->download_hashes.push_back(HashString(*type, hash));
2112 break;
2113 }
2114 if (cur != available_patches.end())
2115 continue;
2116 if (Debug == true)
2117 std::clog << "pkgAcqDiffIndex: " << IndexDiffFile << ": File " << filename
2118 << " wasn't in the list for the first parsed hash! (download)" << std::endl;
2119 break;
2120 }
2121 }
2122
2123
448c38bd
DK
2124 bool foundStart = false;
2125 for (std::vector<DiffInfo>::iterator cur = available_patches.begin();
2126 cur != available_patches.end(); ++cur)
2127 {
2128 if (LocalHashes != cur->result_hashes)
2129 continue;
2130
2131 available_patches.erase(available_patches.begin(), cur);
2132 foundStart = true;
2133 break;
e6e89390 2134 }
b3d44315 2135
448c38bd
DK
2136 if (foundStart == false || unlikely(available_patches.empty() == true))
2137 {
2138 if (Debug)
2139 std::clog << "pkgAcqDiffIndex: " << IndexDiffFile << ": "
2140 << "Couldn't find the start of the patch series." << std::endl;
2141 return false;
2142 }
f6237efd 2143
4a808dea
DK
2144 for (auto const &patch: available_patches)
2145 if (patch.result_hashes.usable() == false ||
2146 patch.patch_hashes.usable() == false ||
2147 patch.download_hashes.usable() == false)
2148 {
2149 if (Debug)
2150 std::clog << "pkgAcqDiffIndex: " << IndexDiffFile << ": provides no usable hashes for " << patch.file
2151 << " so fallback to complete download" << std::endl;
2152 return false;
2153 }
2154
448c38bd
DK
2155 // patching with too many files is rather slow compared to a fast download
2156 unsigned long const fileLimit = _config->FindI("Acquire::PDiffs::FileLimit", 0);
2157 if (fileLimit != 0 && fileLimit < available_patches.size())
2158 {
2159 if (Debug)
2160 std::clog << "Need " << available_patches.size() << " diffs (Limit is " << fileLimit
2161 << ") so fallback to complete download" << std::endl;
2162 return false;
2163 }
1f4dd8fd 2164
448c38bd 2165 // calculate the size of all patches we have to get
4e6219da 2166 unsigned short const sizeLimitPercent = _config->FindI("Acquire::PDiffs::SizeLimit", 100);
b7ec7a80 2167 if (sizeLimitPercent > 0)
4e6219da 2168 {
4e6219da
DK
2169 unsigned long long downloadSize = std::accumulate(available_patches.begin(),
2170 available_patches.end(), 0llu, [](unsigned long long const T, DiffInfo const &I) {
2171 return T + I.download_hashes.FileSize();
2172 });
2173 if (downloadSize != 0)
2174 {
2175 unsigned long long downloadSizeIdx = 0;
2176 auto const types = VectorizeString(Target.Option(IndexTarget::COMPRESSIONTYPES), ' ');
2177 for (auto const &t : types)
2178 {
2179 std::string MetaKey = Target.MetaKey;
2180 if (t != "uncompressed")
2181 MetaKey += '.' + t;
2182 HashStringList const hsl = GetExpectedHashesFor(MetaKey);
2183 if (unlikely(hsl.usable() == false))
2184 continue;
2185 downloadSizeIdx = hsl.FileSize();
2186 break;
2187 }
2188 unsigned long long const sizeLimit = downloadSizeIdx * sizeLimitPercent;
2189 if ((sizeLimit/100) < downloadSize)
2190 {
2191 if (Debug)
2192 std::clog << "Need " << downloadSize << " compressed bytes (Limit is " << (sizeLimit/100) << ", "
2193 << "original is " << downloadSizeIdx << ") so fallback to complete download" << std::endl;
2194 return false;
2195 }
2196 }
448c38bd 2197 }
2737f28a 2198
448c38bd
DK
2199 // we have something, queue the diffs
2200 string::size_type const last_space = Description.rfind(" ");
2201 if(last_space != string::npos)
2202 Description.erase(last_space, Description.size()-last_space);
2203
2204 /* decide if we should download patches one by one or in one go:
2205 The first is good if the server merges patches, but many don't so client
2206 based merging can be attempt in which case the second is better.
2207 "bad things" will happen if patches are merged on the server,
2208 but client side merging is attempt as well */
2209 bool pdiff_merge = _config->FindB("Acquire::PDiffs::Merge", true);
2210 if (pdiff_merge == true)
6bf93605 2211 {
448c38bd
DK
2212 // reprepro adds this flag if it has merged patches on the server
2213 std::string const precedence = Tags.FindS("X-Patch-Precedence");
2214 pdiff_merge = (precedence != "merged");
6bf93605 2215 }
448c38bd 2216
4e3c5633
DK
2217 // clean the plate
2218 {
ef3c549e
DK
2219 std::string const Final = GetExistingFilename(CurrentPackagesFile);
2220 if (unlikely(Final.empty())) // because we wouldn't be called in such a case
2221 return false;
4e3c5633 2222 std::string const PartialFile = GetPartialFileNameFromURI(Target.URI);
ef3c549e
DK
2223 if (FileExists(PartialFile) && RemoveFile("Bootstrap-linking", PartialFile) == false)
2224 {
2225 if (Debug)
2226 std::clog << "Bootstrap-linking for patching " << CurrentPackagesFile
2227 << " by removing stale " << PartialFile << " failed!" << std::endl;
2228 return false;
2229 }
2230 for (auto const &ext : APT::Configuration::getCompressorExtensions())
4e3c5633
DK
2231 {
2232 std::string const Partial = PartialFile + ext;
ef3c549e
DK
2233 if (FileExists(Partial) && RemoveFile("Bootstrap-linking", Partial) == false)
2234 {
2235 if (Debug)
2236 std::clog << "Bootstrap-linking for patching " << CurrentPackagesFile
2237 << " by removing stale " << Partial << " failed!" << std::endl;
2238 return false;
2239 }
4e3c5633 2240 }
4e3c5633
DK
2241 std::string const Ext = Final.substr(CurrentPackagesFile.length());
2242 std::string const Partial = PartialFile + Ext;
2243 if (symlink(Final.c_str(), Partial.c_str()) != 0)
2244 {
ef3c549e
DK
2245 if (Debug)
2246 std::clog << "Bootstrap-linking for patching " << CurrentPackagesFile
2247 << " by linking " << Final << " to " << Partial << " failed!" << std::endl;
4e3c5633
DK
2248 return false;
2249 }
2250 }
2251
448c38bd
DK
2252 if (pdiff_merge == false)
2253 new pkgAcqIndexDiffs(Owner, TransactionManager, Target, available_patches);
6bf93605 2254 else
448c38bd 2255 {
3d8232bf 2256 diffs = new std::vector<pkgAcqIndexMergeDiffs*>(available_patches.size());
448c38bd
DK
2257 for(size_t i = 0; i < available_patches.size(); ++i)
2258 (*diffs)[i] = new pkgAcqIndexMergeDiffs(Owner, TransactionManager,
2259 Target,
2260 available_patches[i],
2261 diffs);
2262 }
2263
2264 Complete = false;
2265 Status = StatDone;
2266 Dequeue();
2267 return true;
6bf93605
DK
2268}
2269 /*}}}*/
448c38bd 2270void pkgAcqDiffIndex::Failed(string const &Message,pkgAcquire::MethodConfig const * const Cnf)/*{{{*/
6bf93605 2271{
0340069c 2272 pkgAcqBaseIndex::Failed(Message,Cnf);
448c38bd 2273 Status = StatDone;
1eba782f 2274 ExpectedAdditionalItems = 0;
448c38bd
DK
2275
2276 if(Debug)
2277 std::clog << "pkgAcqDiffIndex failed: " << Desc.URI << " with " << Message << std::endl
2278 << "Falling back to normal index file acquire" << std::endl;
2279
2280 new pkgAcqIndex(Owner, TransactionManager, Target);
0118833a 2281}
61aea84d 2282 /*}}}*/
448c38bd
DK
2283void pkgAcqDiffIndex::Done(string const &Message,HashStringList const &Hashes, /*{{{*/
2284 pkgAcquire::MethodConfig const * const Cnf)
c88edf1d 2285{
448c38bd
DK
2286 if(Debug)
2287 std::clog << "pkgAcqDiffIndex::Done(): " << Desc.URI << std::endl;
c88edf1d 2288
448c38bd
DK
2289 Item::Done(Message, Hashes, Cnf);
2290
2291 string const FinalFile = GetFinalFilename();
2292 if(StringToBool(LookupTag(Message,"IMS-Hit"),false))
2293 DestFile = FinalFile;
2294
2295 if(ParseDiffIndex(DestFile) == false)
c88edf1d 2296 {
448c38bd
DK
2297 Failed("Message: Couldn't parse pdiff index", Cnf);
2298 // queue for final move - this should happen even if we fail
2299 // while parsing (e.g. on sizelimit) and download the complete file.
2300 TransactionManager->TransactionStageCopy(this, DestFile, FinalFile);
2737f28a
MV
2301 return;
2302 }
448c38bd
DK
2303
2304 TransactionManager->TransactionStageCopy(this, DestFile, FinalFile);
2305
2306 Complete = true;
2307 Status = StatDone;
2308 Dequeue();
2309
2310 return;
c88edf1d
AL
2311}
2312 /*}}}*/
3d8232bf
DK
2313pkgAcqDiffIndex::~pkgAcqDiffIndex()
2314{
2315 if (diffs != NULL)
2316 delete diffs;
2317}
448c38bd
DK
2318
2319// AcqIndexDiffs::AcqIndexDiffs - Constructor /*{{{*/
2320// ---------------------------------------------------------------------
2321/* The package diff is added to the queue. one object is constructed
2322 * for each diff and the index
2323 */
2324pkgAcqIndexDiffs::pkgAcqIndexDiffs(pkgAcquire * const Owner,
3d8232bf 2325 pkgAcqMetaClearSig * const TransactionManager,
e8afd168 2326 IndexTarget const &Target,
448c38bd 2327 vector<DiffInfo> const &diffs)
6c55f07a 2328 : pkgAcqBaseIndex(Owner, TransactionManager, Target), d(NULL),
448c38bd 2329 available_patches(diffs)
681d76d0 2330{
d7a51997 2331 DestFile = GetKeepCompressedFileName(GetPartialFileNameFromURI(Target.URI), Target);
e8b1db38 2332
448c38bd 2333 Debug = _config->FindB("Debug::pkgAcquire::Diffs",false);
e8b1db38 2334
448c38bd 2335 Desc.Owner = this;
dcbbb14d
DK
2336 Description = Target.Description;
2337 Desc.ShortDesc = Target.ShortDesc;
631a7dc7 2338
448c38bd 2339 if(available_patches.empty() == true)
631a7dc7 2340 {
448c38bd 2341 // we are done (yeah!), check hashes against the final file
d7a51997 2342 DestFile = GetKeepCompressedFileName(GetFinalFileNameFromURI(Target.URI), Target);
448c38bd 2343 Finish(true);
631a7dc7 2344 }
9d653a6d 2345 else
631a7dc7 2346 {
448c38bd
DK
2347 State = StateFetchDiff;
2348 QueueNextDiff();
631a7dc7 2349 }
448c38bd
DK
2350}
2351 /*}}}*/
2352void pkgAcqIndexDiffs::Failed(string const &Message,pkgAcquire::MethodConfig const * const Cnf)/*{{{*/
2353{
0340069c 2354 pkgAcqBaseIndex::Failed(Message,Cnf);
448c38bd 2355 Status = StatDone;
631a7dc7 2356
d7a51997 2357 DestFile = GetKeepCompressedFileName(GetPartialFileNameFromURI(Target.URI), Target);
448c38bd
DK
2358 if(Debug)
2359 std::clog << "pkgAcqIndexDiffs failed: " << Desc.URI << " with " << Message << std::endl
d7a51997 2360 << "Falling back to normal index file acquire " << std::endl;
448c38bd 2361 RenameOnError(PDiffError);
36795154
DK
2362 std::string const patchname = GetDiffsPatchFileName(DestFile);
2363 if (RealFileExists(patchname))
4e3c5633
DK
2364 Rename(patchname, patchname + ".FAILED");
2365 std::string const UnpatchedFile = GetExistingFilename(GetPartialFileNameFromURI(Target.URI));
2366 if (UnpatchedFile.empty() == false && FileExists(UnpatchedFile))
2367 Rename(UnpatchedFile, UnpatchedFile + ".FAILED");
448c38bd
DK
2368 new pkgAcqIndex(Owner, TransactionManager, Target);
2369 Finish();
2370}
2371 /*}}}*/
2372// Finish - helper that cleans the item out of the fetcher queue /*{{{*/
2373void pkgAcqIndexDiffs::Finish(bool allDone)
2374{
2375 if(Debug)
2376 std::clog << "pkgAcqIndexDiffs::Finish(): "
2377 << allDone << " "
2378 << Desc.URI << std::endl;
2379
2380 // we restore the original name, this is required, otherwise
2381 // the file will be cleaned
2382 if(allDone)
4dbfe436 2383 {
4e3c5633 2384 std::string const Final = GetKeepCompressedFileName(GetFinalFilename(), Target);
d7a51997 2385 TransactionManager->TransactionStageCopy(this, DestFile, Final);
448c38bd
DK
2386
2387 // this is for the "real" finish
2388 Complete = true;
e05672e8 2389 Status = StatDone;
448c38bd
DK
2390 Dequeue();
2391 if(Debug)
2392 std::clog << "\n\nallDone: " << DestFile << "\n" << std::endl;
2393 return;
e05672e8 2394 }
d7a51997
DK
2395 else
2396 DestFile.clear();
448c38bd
DK
2397
2398 if(Debug)
2399 std::clog << "Finishing: " << Desc.URI << std::endl;
2400 Complete = false;
2401 Status = StatDone;
2402 Dequeue();
2403 return;
681d76d0 2404}
92fcbfc1 2405 /*}}}*/
448c38bd 2406bool pkgAcqIndexDiffs::QueueNextDiff() /*{{{*/
b3d44315 2407{
448c38bd 2408 // calc sha1 of the just patched file
4e3c5633
DK
2409 std::string const PartialFile = GetExistingFilename(GetPartialFileNameFromURI(Target.URI));
2410 if(unlikely(PartialFile.empty()))
715c65de 2411 {
4e3c5633 2412 Failed("Message: The file " + GetPartialFileNameFromURI(Target.URI) + " isn't available", NULL);
448c38bd 2413 return false;
715c65de 2414 }
e05672e8 2415
4e3c5633 2416 FileFd fd(PartialFile, FileFd::ReadOnly, FileFd::Extension);
448c38bd
DK
2417 Hashes LocalHashesCalc;
2418 LocalHashesCalc.AddFD(fd);
2419 HashStringList const LocalHashes = LocalHashesCalc.GetHashStringList();
b3d44315 2420
448c38bd 2421 if(Debug)
4e3c5633 2422 std::clog << "QueueNextDiff: " << PartialFile << " (" << LocalHashes.find(NULL)->toStr() << ")" << std::endl;
b3d44315 2423
dcbbb14d 2424 HashStringList const TargetFileHashes = GetExpectedHashesFor(Target.MetaKey);
448c38bd 2425 if (unlikely(LocalHashes.usable() == false || TargetFileHashes.usable() == false))
b3d44315 2426 {
4e3c5633 2427 Failed("Local/Expected hashes are not usable for " + PartialFile, NULL);
448c38bd 2428 return false;
b3d44315 2429 }
b3d44315 2430
448c38bd
DK
2431 // final file reached before all patches are applied
2432 if(LocalHashes == TargetFileHashes)
6bf93605 2433 {
448c38bd
DK
2434 Finish(true);
2435 return true;
6bf93605
DK
2436 }
2437
448c38bd
DK
2438 // remove all patches until the next matching patch is found
2439 // this requires the Index file to be ordered
258b9e51
DK
2440 available_patches.erase(available_patches.begin(),
2441 std::find_if(available_patches.begin(), available_patches.end(), [&](DiffInfo const &I) {
2442 return I.result_hashes == LocalHashes;
2443 }));
56bc3358 2444
448c38bd
DK
2445 // error checking and falling back if no patch was found
2446 if(available_patches.empty() == true)
56bc3358 2447 {
4e3c5633 2448 Failed("No patches left to reach target for " + PartialFile, NULL);
f3097647 2449 return false;
56bc3358 2450 }
f3097647 2451
448c38bd 2452 // queue the right diff
dcbbb14d 2453 Desc.URI = Target.URI + ".diff/" + available_patches[0].file + ".gz";
448c38bd 2454 Desc.Description = Description + " " + available_patches[0].file + string(".pdiff");
d7a51997 2455 DestFile = GetKeepCompressedFileName(GetPartialFileNameFromURI(Target.URI + ".diff/" + available_patches[0].file), Target);
f3097647 2456
448c38bd
DK
2457 if(Debug)
2458 std::clog << "pkgAcqIndexDiffs::QueueNextDiff(): " << Desc.URI << std::endl;
2459
2460 QueueURI(Desc);
f3097647
MV
2461
2462 return true;
2463}
2464 /*}}}*/
448c38bd
DK
2465void pkgAcqIndexDiffs::Done(string const &Message, HashStringList const &Hashes, /*{{{*/
2466 pkgAcquire::MethodConfig const * const Cnf)
27e6c17a 2467{
4e3c5633 2468 if (Debug)
448c38bd 2469 std::clog << "pkgAcqIndexDiffs::Done(): " << Desc.URI << std::endl;
27e6c17a 2470
448c38bd 2471 Item::Done(Message, Hashes, Cnf);
27e6c17a 2472
4e3c5633
DK
2473 std::string const UncompressedUnpatchedFile = GetPartialFileNameFromURI(Target.URI);
2474 std::string const UnpatchedFile = GetExistingFilename(UncompressedUnpatchedFile);
2475 std::string const PatchFile = GetDiffsPatchFileName(UnpatchedFile);
2476 std::string const PatchedFile = GetKeepCompressedFileName(UncompressedUnpatchedFile, Target);
2477
2478 switch (State)
2479 {
2480 // success in downloading a diff, enter ApplyDiff state
2481 case StateFetchDiff:
2482 Rename(DestFile, PatchFile);
2483 DestFile = GetKeepCompressedFileName(UncompressedUnpatchedFile + "-patched", Target);
2484 if(Debug)
2485 std::clog << "Sending to rred method: " << UnpatchedFile << std::endl;
2486 State = StateApplyDiff;
2487 Local = true;
2488 Desc.URI = "rred:" + UnpatchedFile;
2489 QueueURI(Desc);
2490 SetActiveSubprocess("rred");
2491 return;
2492 // success in download/apply a diff, queue next (if needed)
2493 case StateApplyDiff:
2494 // remove the just applied patch and base file
2495 available_patches.erase(available_patches.begin());
2496 RemoveFile("pkgAcqIndexDiffs::Done", PatchFile);
2497 RemoveFile("pkgAcqIndexDiffs::Done", UnpatchedFile);
2498 if(Debug)
2499 std::clog << "Moving patched file in place: " << std::endl
2500 << DestFile << " -> " << PatchedFile << std::endl;
2501 Rename(DestFile, PatchedFile);
2502
2503 // see if there is more to download
2504 if(available_patches.empty() == false)
2505 {
2506 new pkgAcqIndexDiffs(Owner, TransactionManager, Target, available_patches);
2507 Finish();
2508 } else {
2509 DestFile = PatchedFile;
2510 Finish(true);
2511 }
2512 return;
ba6b79bd 2513 }
448c38bd
DK
2514}
2515 /*}}}*/
36795154
DK
2516std::string pkgAcqIndexDiffs::Custom600Headers() const /*{{{*/
2517{
2518 if(State != StateApplyDiff)
2519 return pkgAcqBaseIndex::Custom600Headers();
2520 std::ostringstream patchhashes;
2521 HashStringList const ExpectedHashes = available_patches[0].patch_hashes;
2522 for (HashStringList::const_iterator hs = ExpectedHashes.begin(); hs != ExpectedHashes.end(); ++hs)
2523 patchhashes << "\nPatch-0-" << hs->HashType() << "-Hash: " << hs->HashValue();
2524 patchhashes << pkgAcqBaseIndex::Custom600Headers();
2525 return patchhashes.str();
2526}
2527 /*}}}*/
c8a4ce6c 2528pkgAcqIndexDiffs::~pkgAcqIndexDiffs() {}
448c38bd
DK
2529
2530// AcqIndexMergeDiffs::AcqIndexMergeDiffs - Constructor /*{{{*/
2531pkgAcqIndexMergeDiffs::pkgAcqIndexMergeDiffs(pkgAcquire * const Owner,
3d8232bf 2532 pkgAcqMetaClearSig * const TransactionManager,
e8afd168 2533 IndexTarget const &Target,
448c38bd
DK
2534 DiffInfo const &patch,
2535 std::vector<pkgAcqIndexMergeDiffs*> const * const allPatches)
6c55f07a 2536 : pkgAcqBaseIndex(Owner, TransactionManager, Target), d(NULL),
448c38bd
DK
2537 patch(patch), allPatches(allPatches), State(StateFetchDiff)
2538{
2539 Debug = _config->FindB("Debug::pkgAcquire::Diffs",false);
2540
2541 Desc.Owner = this;
dcbbb14d
DK
2542 Description = Target.Description;
2543 Desc.ShortDesc = Target.ShortDesc;
dcbbb14d 2544 Desc.URI = Target.URI + ".diff/" + patch.file + ".gz";
4e3c5633
DK
2545 Desc.Description = Description + " " + patch.file + ".pdiff";
2546 DestFile = GetPartialFileNameFromURI(Desc.URI);
448c38bd
DK
2547
2548 if(Debug)
2549 std::clog << "pkgAcqIndexMergeDiffs: " << Desc.URI << std::endl;
2550
2551 QueueURI(Desc);
2552}
2553 /*}}}*/
2554void pkgAcqIndexMergeDiffs::Failed(string const &Message,pkgAcquire::MethodConfig const * const Cnf)/*{{{*/
2555{
2556 if(Debug)
2557 std::clog << "pkgAcqIndexMergeDiffs failed: " << Desc.URI << " with " << Message << std::endl;
2737f28a 2558
0340069c 2559 pkgAcqBaseIndex::Failed(Message,Cnf);
448c38bd 2560 Status = StatDone;
b3d44315 2561
448c38bd
DK
2562 // check if we are the first to fail, otherwise we are done here
2563 State = StateDoneDiff;
2564 for (std::vector<pkgAcqIndexMergeDiffs *>::const_iterator I = allPatches->begin();
2565 I != allPatches->end(); ++I)
2566 if ((*I)->State == StateErrorDiff)
b7a1076f
DK
2567 {
2568 State = StateErrorDiff;
448c38bd 2569 return;
b7a1076f 2570 }
448c38bd
DK
2571
2572 // first failure means we should fallback
2573 State = StateErrorDiff;
2574 if (Debug)
2575 std::clog << "Falling back to normal index file acquire" << std::endl;
448c38bd 2576 RenameOnError(PDiffError);
b7a1076f
DK
2577 if (RealFileExists(DestFile))
2578 Rename(DestFile, DestFile + ".FAILED");
4e3c5633
DK
2579 std::string const UnpatchedFile = GetExistingFilename(GetPartialFileNameFromURI(Target.URI));
2580 if (UnpatchedFile.empty() == false && FileExists(UnpatchedFile))
2581 Rename(UnpatchedFile, UnpatchedFile + ".FAILED");
d7a51997 2582 DestFile.clear();
4e3c5633 2583 new pkgAcqIndex(Owner, TransactionManager, Target);
b3d44315 2584}
92fcbfc1 2585 /*}}}*/
448c38bd
DK
2586void pkgAcqIndexMergeDiffs::Done(string const &Message, HashStringList const &Hashes, /*{{{*/
2587 pkgAcquire::MethodConfig const * const Cnf)
b3d44315 2588{
448c38bd
DK
2589 if(Debug)
2590 std::clog << "pkgAcqIndexMergeDiffs::Done(): " << Desc.URI << std::endl;
18593cf7 2591
448c38bd 2592 Item::Done(Message, Hashes, Cnf);
18593cf7 2593
dfcf7f35
DK
2594 if (std::any_of(allPatches->begin(), allPatches->end(),
2595 [](pkgAcqIndexMergeDiffs const * const P) { return P->State == StateErrorDiff; }))
2596 {
2597 if(Debug)
2598 std::clog << "Another patch failed already, no point in processing this one." << std::endl;
b7a1076f 2599 State = StateErrorDiff;
dfcf7f35
DK
2600 return;
2601 }
2602
4e3c5633
DK
2603 std::string const UncompressedUnpatchedFile = GetPartialFileNameFromURI(Target.URI);
2604 std::string const UnpatchedFile = GetExistingFilename(UncompressedUnpatchedFile);
dfcf7f35
DK
2605 if (UnpatchedFile.empty())
2606 {
b7a1076f
DK
2607 _error->Fatal("Unpatched file %s doesn't exist (anymore)!", UncompressedUnpatchedFile.c_str());
2608 State = StateErrorDiff;
dfcf7f35
DK
2609 return;
2610 }
4e3c5633
DK
2611 std::string const PatchFile = GetMergeDiffsPatchFileName(UnpatchedFile, patch.file);
2612 std::string const PatchedFile = GetKeepCompressedFileName(UncompressedUnpatchedFile, Target);
ab53c018 2613
4e3c5633 2614 switch (State)
448c38bd 2615 {
4e3c5633
DK
2616 case StateFetchDiff:
2617 Rename(DestFile, PatchFile);
448c38bd 2618
4e3c5633
DK
2619 // check if this is the last completed diff
2620 State = StateDoneDiff;
2621 for (std::vector<pkgAcqIndexMergeDiffs *>::const_iterator I = allPatches->begin();
2622 I != allPatches->end(); ++I)
2623 if ((*I)->State != StateDoneDiff)
2624 {
2625 if(Debug)
2626 std::clog << "Not the last done diff in the batch: " << Desc.URI << std::endl;
2627 return;
2628 }
2629 // this is the last completed diff, so we are ready to apply now
2630 DestFile = GetKeepCompressedFileName(UncompressedUnpatchedFile + "-patched", Target);
2631 if(Debug)
2632 std::clog << "Sending to rred method: " << UnpatchedFile << std::endl;
2633 State = StateApplyDiff;
2634 Local = true;
2635 Desc.URI = "rred:" + UnpatchedFile;
2636 QueueURI(Desc);
2637 SetActiveSubprocess("rred");
2638 return;
2639 case StateApplyDiff:
2640 // success in download & apply all diffs, finialize and clean up
2641 if(Debug)
2642 std::clog << "Queue patched file in place: " << std::endl
2643 << DestFile << " -> " << PatchedFile << std::endl;
2644
2645 // queue for copy by the transaction manager
2646 TransactionManager->TransactionStageCopy(this, DestFile, GetKeepCompressedFileName(GetFinalFilename(), Target));
2647
2648 // ensure the ed's are gone regardless of list-cleanup
2649 for (std::vector<pkgAcqIndexMergeDiffs *>::const_iterator I = allPatches->begin();
2650 I != allPatches->end(); ++I)
2651 RemoveFile("pkgAcqIndexMergeDiffs::Done", GetMergeDiffsPatchFileName(UnpatchedFile, (*I)->patch.file));
2652 RemoveFile("pkgAcqIndexMergeDiffs::Done", UnpatchedFile);
2653
2654 // all set and done
2655 Complete = true;
2656 if(Debug)
2657 std::clog << "allDone: " << DestFile << "\n" << std::endl;
2658 return;
2659 case StateDoneDiff: _error->Fatal("Done called for %s which is in an invalid Done state", PatchFile.c_str()); break;
2660 case StateErrorDiff: _error->Fatal("Done called for %s which is in an invalid Error state", PatchFile.c_str()); break;
b3d44315
MV
2661 }
2662}
92fcbfc1 2663 /*}}}*/
36795154
DK
2664std::string pkgAcqIndexMergeDiffs::Custom600Headers() const /*{{{*/
2665{
2666 if(State != StateApplyDiff)
2667 return pkgAcqBaseIndex::Custom600Headers();
2668 std::ostringstream patchhashes;
2669 unsigned int seen_patches = 0;
2670 for (std::vector<pkgAcqIndexMergeDiffs *>::const_iterator I = allPatches->begin();
2671 I != allPatches->end(); ++I)
2672 {
2673 HashStringList const ExpectedHashes = (*I)->patch.patch_hashes;
2674 for (HashStringList::const_iterator hs = ExpectedHashes.begin(); hs != ExpectedHashes.end(); ++hs)
2675 patchhashes << "\nPatch-" << seen_patches << "-" << hs->HashType() << "-Hash: " << hs->HashValue();
2676 ++seen_patches;
2677 }
2678 patchhashes << pkgAcqBaseIndex::Custom600Headers();
2679 return patchhashes.str();
2680}
2681 /*}}}*/
c8a4ce6c 2682pkgAcqIndexMergeDiffs::~pkgAcqIndexMergeDiffs() {}
448c38bd
DK
2683
2684// AcqIndex::AcqIndex - Constructor /*{{{*/
2685pkgAcqIndex::pkgAcqIndex(pkgAcquire * const Owner,
3d8232bf 2686 pkgAcqMetaClearSig * const TransactionManager,
e8afd168 2687 IndexTarget const &Target)
d7a51997
DK
2688 : pkgAcqBaseIndex(Owner, TransactionManager, Target), d(NULL), Stage(STAGE_DOWNLOAD),
2689 CompressionExtensions(Target.Option(IndexTarget::COMPRESSIONTYPES))
b3d44315 2690{
dcbbb14d 2691 Init(Target.URI, Target.Description, Target.ShortDesc);
ce424cd4 2692
448c38bd
DK
2693 if(_config->FindB("Debug::Acquire::Transaction", false) == true)
2694 std::clog << "New pkgIndex with TransactionManager "
2695 << TransactionManager << std::endl;
2696}
2697 /*}}}*/
448c38bd 2698// AcqIndex::Init - defered Constructor /*{{{*/
af81ab90 2699static void NextCompressionExtension(std::string &CurrentCompressionExtension, std::string &CompressionExtensions, bool const preview)
448c38bd 2700{
448c38bd
DK
2701 size_t const nextExt = CompressionExtensions.find(' ');
2702 if (nextExt == std::string::npos)
b3d44315 2703 {
448c38bd 2704 CurrentCompressionExtension = CompressionExtensions;
af81ab90
DK
2705 if (preview == false)
2706 CompressionExtensions.clear();
b3d44315 2707 }
448c38bd
DK
2708 else
2709 {
2710 CurrentCompressionExtension = CompressionExtensions.substr(0, nextExt);
af81ab90
DK
2711 if (preview == false)
2712 CompressionExtensions = CompressionExtensions.substr(nextExt+1);
1ddb8596 2713 }
af81ab90
DK
2714}
2715void pkgAcqIndex::Init(string const &URI, string const &URIDesc,
2716 string const &ShortDesc)
2717{
2718 Stage = STAGE_DOWNLOAD;
2719
2720 DestFile = GetPartialFileNameFromURI(URI);
2721 NextCompressionExtension(CurrentCompressionExtension, CompressionExtensions, false);
1ddb8596 2722
fb193b1c
MV
2723 // store file size of the download to ensure the fetcher gives
2724 // accurate progress reporting
2725 FileSize = GetExpectedHashes().FileSize();
2726
448c38bd 2727 if (CurrentCompressionExtension == "uncompressed")
6bf93605 2728 {
448c38bd 2729 Desc.URI = URI;
6bf93605 2730 }
af81ab90
DK
2731 else if (CurrentCompressionExtension == "by-hash")
2732 {
2733 NextCompressionExtension(CurrentCompressionExtension, CompressionExtensions, true);
b7ec7a80 2734 if(unlikely(CurrentCompressionExtension.empty()))
af81ab90
DK
2735 return;
2736 if (CurrentCompressionExtension != "uncompressed")
2737 {
2738 Desc.URI = URI + '.' + CurrentCompressionExtension;
2739 DestFile = DestFile + '.' + CurrentCompressionExtension;
2740 }
2741
2742 HashStringList const Hashes = GetExpectedHashes();
2743 HashString const * const TargetHash = Hashes.find(NULL);
2744 if (unlikely(TargetHash == nullptr))
2745 return;
2746 std::string const ByHash = "/by-hash/" + TargetHash->HashType() + "/" + TargetHash->HashValue();
2747 size_t const trailing_slash = Desc.URI.find_last_of("/");
2748 if (unlikely(trailing_slash == std::string::npos))
2749 return;
2750 Desc.URI = Desc.URI.replace(
2751 trailing_slash,
2752 Desc.URI.substr(trailing_slash+1).size()+1,
2753 ByHash);
2754 }
448c38bd
DK
2755 else if (unlikely(CurrentCompressionExtension.empty()))
2756 return;
2757 else
b3d44315 2758 {
448c38bd
DK
2759 Desc.URI = URI + '.' + CurrentCompressionExtension;
2760 DestFile = DestFile + '.' + CurrentCompressionExtension;
b3d44315
MV
2761 }
2762
448c38bd
DK
2763
2764 Desc.Description = URIDesc;
2765 Desc.Owner = this;
2766 Desc.ShortDesc = ShortDesc;
2767
2768 QueueURI(Desc);
2769}
2770 /*}}}*/
448c38bd
DK
2771// AcqIndex::Custom600Headers - Insert custom request headers /*{{{*/
2772// ---------------------------------------------------------------------
2773/* The only header we use is the last-modified header. */
2774string pkgAcqIndex::Custom600Headers() const
b3d44315 2775{
c5fced38 2776
448c38bd 2777 string msg = "\nIndex-File: true";
abd6af5a
DK
2778
2779 if (TransactionManager->LastMetaIndexParser == NULL)
2780 {
2781 std::string const Final = GetFinalFilename();
2782
2783 struct stat Buf;
2784 if (stat(Final.c_str(),&Buf) == 0)
2785 msg += "\nLast-Modified: " + TimeRFC1123(Buf.st_mtime);
2786 }
1d970e6c 2787
dcbbb14d 2788 if(Target.IsOptional)
448c38bd
DK
2789 msg += "\nFail-Ignore: true";
2790
2791 return msg;
b3d44315 2792}
681d76d0 2793 /*}}}*/
448c38bd
DK
2794// AcqIndex::Failed - getting the indexfile failed /*{{{*/
2795void pkgAcqIndex::Failed(string const &Message,pkgAcquire::MethodConfig const * const Cnf)
56472095 2796{
0340069c 2797 pkgAcqBaseIndex::Failed(Message,Cnf);
448c38bd
DK
2798
2799 // authorisation matches will not be fixed by other compression types
2800 if (Status != StatAuthError)
2801 {
2802 if (CompressionExtensions.empty() == false)
2803 {
dcbbb14d 2804 Init(Target.URI, Desc.Description, Desc.ShortDesc);
448c38bd
DK
2805 Status = StatIdle;
2806 return;
2807 }
2808 }
2809
dcbbb14d 2810 if(Target.IsOptional && GetExpectedHashes().empty() && Stage == STAGE_DOWNLOAD)
448c38bd
DK
2811 Status = StatDone;
2812 else
2813 TransactionManager->AbortTransaction();
56472095 2814}
8267fbd9 2815 /*}}}*/
448c38bd
DK
2816// AcqIndex::Done - Finished a fetch /*{{{*/
2817// ---------------------------------------------------------------------
2818/* This goes through a number of states.. On the initial fetch the
2819 method could possibly return an alternate filename which points
2820 to the uncompressed version of the file. If this is so the file
2821 is copied into the partial directory. In all other cases the file
2822 is decompressed with a compressed uri. */
2823void pkgAcqIndex::Done(string const &Message,
2824 HashStringList const &Hashes,
2825 pkgAcquire::MethodConfig const * const Cfg)
8d6c5839 2826{
448c38bd
DK
2827 Item::Done(Message,Hashes,Cfg);
2828
2829 switch(Stage)
2830 {
2831 case STAGE_DOWNLOAD:
0179cfa8 2832 StageDownloadDone(Message);
448c38bd
DK
2833 break;
2834 case STAGE_DECOMPRESS_AND_VERIFY:
0179cfa8 2835 StageDecompressDone();
448c38bd
DK
2836 break;
2837 }
8d6c5839
MV
2838}
2839 /*}}}*/
448c38bd 2840// AcqIndex::StageDownloadDone - Queue for decompress and verify /*{{{*/
0179cfa8 2841void pkgAcqIndex::StageDownloadDone(string const &Message)
6bf93605 2842{
0179cfa8 2843 Local = true;
448c38bd 2844 Complete = true;
6bf93605 2845
0179cfa8
DK
2846 std::string const AltFilename = LookupTag(Message,"Alt-Filename");
2847 std::string Filename = LookupTag(Message,"Filename");
2848
2849 // we need to verify the file against the current Release file again
2850 // on if-modfied-since hit to avoid a stale attack against us
2851 if(StringToBool(LookupTag(Message,"IMS-Hit"),false) == true)
6bf93605 2852 {
0179cfa8
DK
2853 // copy FinalFile into partial/ so that we check the hash again
2854 string const FinalFile = GetExistingFilename(GetFinalFileNameFromURI(Target.URI));
2855 if (symlink(FinalFile.c_str(), DestFile.c_str()) != 0)
2856 _error->WarningE("pkgAcqIndex::StageDownloadDone", "Symlinking final file %s back to %s failed", FinalFile.c_str(), DestFile.c_str());
2857 else
2858 {
2859 EraseFileName = DestFile;
2860 Filename = DestFile;
2861 }
448c38bd 2862 Stage = STAGE_DECOMPRESS_AND_VERIFY;
0179cfa8 2863 Desc.URI = "store:" + Filename;
448c38bd 2864 QueueURI(Desc);
0179cfa8 2865 SetActiveSubprocess(::URI(Desc.URI).Access);
448c38bd 2866 return;
6bf93605 2867 }
0179cfa8
DK
2868 // methods like file:// give us an alternative (uncompressed) file
2869 else if (Target.KeepCompressed == false && AltFilename.empty() == false)
2870 {
0179cfa8 2871 Filename = AltFilename;
e169fa4a 2872 EraseFileName.clear();
0179cfa8 2873 }
448c38bd
DK
2874 // Methods like e.g. "file:" will give us a (compressed) FileName that is
2875 // not the "DestFile" we set, in this case we uncompress from the local file
0179cfa8 2876 else if (Filename != DestFile && RealFileExists(DestFile) == false)
af9e40c9 2877 {
0179cfa8
DK
2878 // symlinking ensures that the filename can be used for compression detection
2879 // that is e.g. needed for by-hash which has no extension over file
2880 if (symlink(Filename.c_str(),DestFile.c_str()) != 0)
2881 _error->WarningE("pkgAcqIndex::StageDownloadDone", "Symlinking file %s to %s failed", Filename.c_str(), DestFile.c_str());
9bd2313a
DK
2882 else
2883 {
0179cfa8
DK
2884 EraseFileName = DestFile;
2885 Filename = DestFile;
9bd2313a 2886 }
af9e40c9 2887 }
448c38bd 2888
0179cfa8
DK
2889 Stage = STAGE_DECOMPRESS_AND_VERIFY;
2890 DestFile = GetKeepCompressedFileName(GetPartialFileNameFromURI(Target.URI), Target);
2891 if (Filename != DestFile && flExtension(Filename) == flExtension(DestFile))
2892 Desc.URI = "copy:" + Filename;
af9e40c9 2893 else
0179cfa8
DK
2894 Desc.URI = "store:" + Filename;
2895 if (DestFile == Filename)
9bd2313a
DK
2896 {
2897 if (CurrentCompressionExtension == "uncompressed")
0179cfa8
DK
2898 return StageDecompressDone();
2899 DestFile = "/dev/null";
9bd2313a 2900 }
af9e40c9 2901
e169fa4a 2902 if (EraseFileName.empty() && Filename != AltFilename)
0179cfa8
DK
2903 EraseFileName = Filename;
2904
448c38bd 2905 // queue uri for the next stage
448c38bd 2906 QueueURI(Desc);
0179cfa8 2907 SetActiveSubprocess(::URI(Desc.URI).Access);
a9bb651a
MV
2908}
2909 /*}}}*/
448c38bd 2910// AcqIndex::StageDecompressDone - Final verification /*{{{*/
0179cfa8 2911void pkgAcqIndex::StageDecompressDone()
a9bb651a 2912{
0179cfa8
DK
2913 if (DestFile == "/dev/null")
2914 DestFile = GetKeepCompressedFileName(GetPartialFileNameFromURI(Target.URI), Target);
af9e40c9 2915
448c38bd
DK
2916 // Done, queue for rename on transaction finished
2917 TransactionManager->TransactionStageCopy(this, DestFile, GetFinalFilename());
fe0f7911
DK
2918}
2919 /*}}}*/
c8a4ce6c 2920pkgAcqIndex::~pkgAcqIndex() {}
448c38bd
DK
2921
2922
03e39e59
AL
2923// AcqArchive::AcqArchive - Constructor /*{{{*/
2924// ---------------------------------------------------------------------
17caf1b1
AL
2925/* This just sets up the initial fetch environment and queues the first
2926 possibilitiy */
448c38bd
DK
2927pkgAcqArchive::pkgAcqArchive(pkgAcquire * const Owner,pkgSourceList * const Sources,
2928 pkgRecords * const Recs,pkgCache::VerIterator const &Version,
30e1eab5 2929 string &StoreFilename) :
6c55f07a 2930 Item(Owner), d(NULL), LocalSource(false), Version(Version), Sources(Sources), Recs(Recs),
448c38bd 2931 StoreFilename(StoreFilename), Vf(Version.FileList()),
b3d44315 2932 Trusted(false)
03e39e59 2933{
7d8afa39 2934 Retries = _config->FindI("Acquire::Retries",0);
813c8eea
AL
2935
2936 if (Version.Arch() == 0)
bdae53f1 2937 {
d1f1f6a8 2938 _error->Error(_("I wasn't able to locate a file for the %s package. "
7a3c2ab0
AL
2939 "This might mean you need to manually fix this package. "
2940 "(due to missing arch)"),
40f8a8ba 2941 Version.ParentPkg().FullName().c_str());
bdae53f1
AL
2942 return;
2943 }
813c8eea 2944
b2e465d6
AL
2945 /* We need to find a filename to determine the extension. We make the
2946 assumption here that all the available sources for this version share
2947 the same extension.. */
2948 // Skip not source sources, they do not have file fields.
69c2ecbd 2949 for (; Vf.end() == false; ++Vf)
b2e465d6 2950 {
b07aeb1a 2951 if (Vf.File().Flagged(pkgCache::Flag::NotSource))
b2e465d6
AL
2952 continue;
2953 break;
2954 }
2955
2956 // Does not really matter here.. we are going to fail out below
2957 if (Vf.end() != true)
2958 {
2959 // If this fails to get a file name we will bomb out below.
2960 pkgRecords::Parser &Parse = Recs->Lookup(Vf);
2961 if (_error->PendingError() == true)
2962 return;
2963
2964 // Generate the final file name as: package_version_arch.foo
2965 StoreFilename = QuoteString(Version.ParentPkg().Name(),"_:") + '_' +
2966 QuoteString(Version.VerStr(),"_:") + '_' +
2967 QuoteString(Version.Arch(),"_:.") +
2968 "." + flExtension(Parse.FileName());
2969 }
b3d44315
MV
2970
2971 // check if we have one trusted source for the package. if so, switch
6c34ccca
DK
2972 // to "TrustedOnly" mode - but only if not in AllowUnauthenticated mode
2973 bool const allowUnauth = _config->FindB("APT::Get::AllowUnauthenticated", false);
2974 bool const debugAuth = _config->FindB("Debug::pkgAcquire::Auth", false);
2975 bool seenUntrusted = false;
f7f0d6c7 2976 for (pkgCache::VerFileIterator i = Version.FileList(); i.end() == false; ++i)
b3d44315
MV
2977 {
2978 pkgIndexFile *Index;
2979 if (Sources->FindIndex(i.File(),Index) == false)
2980 continue;
6c34ccca
DK
2981
2982 if (debugAuth == true)
b3d44315 2983 std::cerr << "Checking index: " << Index->Describe()
6c34ccca
DK
2984 << "(Trusted=" << Index->IsTrusted() << ")" << std::endl;
2985
2986 if (Index->IsTrusted() == true)
2987 {
b3d44315 2988 Trusted = true;
6c34ccca
DK
2989 if (allowUnauth == false)
2990 break;
b3d44315 2991 }
6c34ccca
DK
2992 else
2993 seenUntrusted = true;
b3d44315
MV
2994 }
2995
a3371852
MV
2996 // "allow-unauthenticated" restores apts old fetching behaviour
2997 // that means that e.g. unauthenticated file:// uris are higher
2998 // priority than authenticated http:// uris
6c34ccca 2999 if (allowUnauth == true && seenUntrusted == true)
a3371852
MV
3000 Trusted = false;
3001
03e39e59 3002 // Select a source
b185acc2 3003 if (QueueNext() == false && _error->PendingError() == false)
d57f6084
DK
3004 _error->Error(_("Can't find a source to download version '%s' of '%s'"),
3005 Version.VerStr(), Version.ParentPkg().FullName(false).c_str());
b185acc2
AL
3006}
3007 /*}}}*/
3008// AcqArchive::QueueNext - Queue the next file source /*{{{*/
3009// ---------------------------------------------------------------------
17caf1b1
AL
3010/* This queues the next available file version for download. It checks if
3011 the archive is already available in the cache and stashs the MD5 for
3012 checking later. */
b185acc2 3013bool pkgAcqArchive::QueueNext()
a722b2c5 3014{
f7f0d6c7 3015 for (; Vf.end() == false; ++Vf)
03e39e59 3016 {
448c38bd 3017 pkgCache::PkgFileIterator const PkgF = Vf.File();
03e39e59 3018 // Ignore not source sources
b07aeb1a 3019 if (PkgF.Flagged(pkgCache::Flag::NotSource))
03e39e59
AL
3020 continue;
3021
3022 // Try to cross match against the source list
b2e465d6 3023 pkgIndexFile *Index;
448c38bd 3024 if (Sources->FindIndex(PkgF, Index) == false)
b2e465d6 3025 continue;
b07aeb1a 3026 LocalSource = PkgF.Flagged(pkgCache::Flag::LocalSource);
448c38bd 3027
b3d44315
MV
3028 // only try to get a trusted package from another source if that source
3029 // is also trusted
3030 if(Trusted && !Index->IsTrusted())
3031 continue;
3032
03e39e59
AL
3033 // Grab the text package record
3034 pkgRecords::Parser &Parse = Recs->Lookup(Vf);
3035 if (_error->PendingError() == true)
b185acc2 3036 return false;
b3501edb 3037
b2e465d6 3038 string PkgFile = Parse.FileName();
b3501edb
DK
3039 ExpectedHashes = Parse.Hashes();
3040
03e39e59 3041 if (PkgFile.empty() == true)
b2e465d6
AL
3042 return _error->Error(_("The package index files are corrupted. No Filename: "
3043 "field for package %s."),
3044 Version.ParentPkg().Name());
a6568219 3045
b3d44315
MV
3046 Desc.URI = Index->ArchiveURI(PkgFile);
3047 Desc.Description = Index->ArchiveInfo(Version);
3048 Desc.Owner = this;
40f8a8ba 3049 Desc.ShortDesc = Version.ParentPkg().FullName(true);
b3d44315 3050
17caf1b1 3051 // See if we already have the file. (Legacy filenames)
a6568219
AL
3052 FileSize = Version->Size;
3053 string FinalFile = _config->FindDir("Dir::Cache::Archives") + flNotDir(PkgFile);
3054 struct stat Buf;
3055 if (stat(FinalFile.c_str(),&Buf) == 0)
3056 {
3057 // Make sure the size matches
73da43e9 3058 if ((unsigned long long)Buf.st_size == Version->Size)
a6568219
AL
3059 {
3060 Complete = true;
3061 Local = true;
3062 Status = StatDone;
30e1eab5 3063 StoreFilename = DestFile = FinalFile;
b185acc2 3064 return true;
a6568219
AL
3065 }
3066
6b1ff003
AL
3067 /* Hmm, we have a file and its size does not match, this means it is
3068 an old style mismatched arch */
51818f26 3069 RemoveFile("pkgAcqArchive::QueueNext", FinalFile);
a6568219 3070 }
17caf1b1
AL
3071
3072 // Check it again using the new style output filenames
3073 FinalFile = _config->FindDir("Dir::Cache::Archives") + flNotDir(StoreFilename);
3074 if (stat(FinalFile.c_str(),&Buf) == 0)
3075 {
3076 // Make sure the size matches
73da43e9 3077 if ((unsigned long long)Buf.st_size == Version->Size)
17caf1b1
AL
3078 {
3079 Complete = true;
3080 Local = true;
3081 Status = StatDone;
3082 StoreFilename = DestFile = FinalFile;
3083 return true;
3084 }
3085
1e3f4083 3086 /* Hmm, we have a file and its size does not match, this shouldn't
17caf1b1 3087 happen.. */
51818f26 3088 RemoveFile("pkgAcqArchive::QueueNext", FinalFile);
17caf1b1
AL
3089 }
3090
3091 DestFile = _config->FindDir("Dir::Cache::Archives") + "partial/" + flNotDir(StoreFilename);
6b1ff003
AL
3092
3093 // Check the destination file
3094 if (stat(DestFile.c_str(),&Buf) == 0)
3095 {
3096 // Hmm, the partial file is too big, erase it
73da43e9 3097 if ((unsigned long long)Buf.st_size > Version->Size)
51818f26 3098 RemoveFile("pkgAcqArchive::QueueNext", DestFile);
6b1ff003
AL
3099 else
3100 PartialSize = Buf.st_size;
3101 }
de31189f
DK
3102
3103 // Disables download of archives - useful if no real installation follows,
3104 // e.g. if we are just interested in proposed installation order
3105 if (_config->FindB("Debug::pkgAcqArchive::NoQueue", false) == true)
3106 {
3107 Complete = true;
3108 Local = true;
3109 Status = StatDone;
3110 StoreFilename = DestFile = FinalFile;
3111 return true;
3112 }
3113
03e39e59 3114 // Create the item
b2e465d6 3115 Local = false;
03e39e59 3116 QueueURI(Desc);
b185acc2 3117
f7f0d6c7 3118 ++Vf;
b185acc2 3119 return true;
03e39e59 3120 }
b185acc2
AL
3121 return false;
3122}
03e39e59
AL
3123 /*}}}*/
3124// AcqArchive::Done - Finished fetching /*{{{*/
3125// ---------------------------------------------------------------------
3126/* */
448c38bd
DK
3127void pkgAcqArchive::Done(string const &Message, HashStringList const &Hashes,
3128 pkgAcquire::MethodConfig const * const Cfg)
03e39e59 3129{
448c38bd 3130 Item::Done(Message, Hashes, Cfg);
a6568219
AL
3131
3132 // Grab the output filename
dd676dc7 3133 std::string const FileName = LookupTag(Message,"Filename");
08ea7806 3134 if (DestFile != FileName && RealFileExists(DestFile) == false)
a6568219 3135 {
30e1eab5 3136 StoreFilename = DestFile = FileName;
a6568219 3137 Local = true;
5684f71f 3138 Complete = true;
a6568219
AL
3139 return;
3140 }
5684f71f 3141
a6568219 3142 // Done, move it into position
295d848b 3143 string const FinalFile = GetFinalFilename();
a6568219 3144 Rename(DestFile,FinalFile);
30e1eab5 3145 StoreFilename = DestFile = FinalFile;
03e39e59
AL
3146 Complete = true;
3147}
3148 /*}}}*/
db890fdb
AL
3149// AcqArchive::Failed - Failure handler /*{{{*/
3150// ---------------------------------------------------------------------
3151/* Here we try other sources */
448c38bd 3152void pkgAcqArchive::Failed(string const &Message,pkgAcquire::MethodConfig const * const Cnf)
db890fdb 3153{
03aa0847
DK
3154 Item::Failed(Message,Cnf);
3155
448c38bd 3156 /* We don't really want to retry on failed media swaps, this prevents
b2e465d6
AL
3157 that. An interesting observation is that permanent failures are not
3158 recorded. */
448c38bd 3159 if (Cnf->Removable == true &&
b2e465d6
AL
3160 StringToBool(LookupTag(Message,"Transient-Failure"),false) == true)
3161 {
3162 // Vf = Version.FileList();
f7f0d6c7 3163 while (Vf.end() == false) ++Vf;
b2e465d6 3164 StoreFilename = string();
b2e465d6
AL
3165 return;
3166 }
03aa0847
DK
3167
3168 Status = StatIdle;
db890fdb 3169 if (QueueNext() == false)
7d8afa39
AL
3170 {
3171 // This is the retry counter
3172 if (Retries != 0 &&
3173 Cnf->LocalOnly == false &&
3174 StringToBool(LookupTag(Message,"Transient-Failure"),false) == true)
3175 {
3176 Retries--;
3177 Vf = Version.FileList();
3178 if (QueueNext() == true)
3179 return;
3180 }
03aa0847 3181
9dbb421f 3182 StoreFilename = string();
03aa0847 3183 Status = StatError;
7d8afa39 3184 }
db890fdb
AL
3185}
3186 /*}}}*/
448c38bd 3187APT_PURE bool pkgAcqArchive::IsTrusted() const /*{{{*/
b3d44315
MV
3188{
3189 return Trusted;
3190}
92fcbfc1 3191 /*}}}*/
448c38bd 3192void pkgAcqArchive::Finished() /*{{{*/
ab559b35
AL
3193{
3194 if (Status == pkgAcquire::Item::StatDone &&
3195 Complete == true)
3196 return;
3197 StoreFilename = string();
3198}
3199 /*}}}*/
448c38bd
DK
3200std::string pkgAcqArchive::DescURI() const /*{{{*/
3201{
3202 return Desc.URI;
3203}
3204 /*}}}*/
3205std::string pkgAcqArchive::ShortDesc() const /*{{{*/
3206{
3207 return Desc.ShortDesc;
3208}
3209 /*}}}*/
c8a4ce6c 3210pkgAcqArchive::~pkgAcqArchive() {}
448c38bd 3211
d56e2917 3212// AcqChangelog::pkgAcqChangelog - Constructors /*{{{*/
6fd4b4c0
DK
3213class pkgAcqChangelog::Private
3214{
3215 public:
3216 std::string FinalFile;
3217};
d56e2917
DK
3218pkgAcqChangelog::pkgAcqChangelog(pkgAcquire * const Owner, pkgCache::VerIterator const &Ver,
3219 std::string const &DestDir, std::string const &DestFilename) :
6fd4b4c0 3220 pkgAcquire::Item(Owner), d(new pkgAcqChangelog::Private()), SrcName(Ver.SourcePkgName()), SrcVersion(Ver.SourceVerStr())
d56e2917
DK
3221{
3222 Desc.URI = URI(Ver);
3223 Init(DestDir, DestFilename);
3224}
3225// some parameters are char* here as they come likely from char* interfaces – which can also return NULL
3226pkgAcqChangelog::pkgAcqChangelog(pkgAcquire * const Owner, pkgCache::RlsFileIterator const &RlsFile,
3227 char const * const Component, char const * const SrcName, char const * const SrcVersion,
3228 const string &DestDir, const string &DestFilename) :
6fd4b4c0 3229 pkgAcquire::Item(Owner), d(new pkgAcqChangelog::Private()), SrcName(SrcName), SrcVersion(SrcVersion)
d56e2917
DK
3230{
3231 Desc.URI = URI(RlsFile, Component, SrcName, SrcVersion);
3232 Init(DestDir, DestFilename);
3233}
3234pkgAcqChangelog::pkgAcqChangelog(pkgAcquire * const Owner,
3235 std::string const &URI, char const * const SrcName, char const * const SrcVersion,
3236 const string &DestDir, const string &DestFilename) :
6fd4b4c0 3237 pkgAcquire::Item(Owner), d(new pkgAcqChangelog::Private()), SrcName(SrcName), SrcVersion(SrcVersion)
d56e2917
DK
3238{
3239 Desc.URI = URI;
3240 Init(DestDir, DestFilename);
3241}
3242void pkgAcqChangelog::Init(std::string const &DestDir, std::string const &DestFilename)
3243{
3244 if (Desc.URI.empty())
3245 {
3246 Status = StatError;
3247 // TRANSLATOR: %s=%s is sourcename=sourceversion, e.g. apt=1.1
3248 strprintf(ErrorText, _("Changelog unavailable for %s=%s"), SrcName.c_str(), SrcVersion.c_str());
3249 // Let the error message print something sensible rather than "Failed to fetch /"
3250 if (DestFilename.empty())
3251 DestFile = SrcName + ".changelog";
3252 else
3253 DestFile = DestFilename;
3254 Desc.URI = "changelog:/" + DestFile;
3255 return;
3256 }
3257
6fd4b4c0
DK
3258 std::string DestFileName;
3259 if (DestFilename.empty())
3260 DestFileName = flCombine(DestFile, SrcName + ".changelog");
3261 else
3262 DestFileName = flCombine(DestFile, DestFilename);
d1256170 3263
6fd4b4c0
DK
3264 std::string const SandboxUser = _config->Find("APT::Sandbox::User");
3265 std::string const systemTemp = GetTempDir(SandboxUser);
3266 char tmpname[1000];
3267 snprintf(tmpname, sizeof(tmpname), "%s/apt-changelog-XXXXXX", systemTemp.c_str());
3268 if (NULL == mkdtemp(tmpname))
3269 {
3270 _error->Errno("mkdtemp", "mkdtemp failed in changelog acquire of %s %s", SrcName.c_str(), SrcVersion.c_str());
3271 Status = StatError;
3272 return;
d56e2917 3273 }
6fd4b4c0 3274 TemporaryDirectory = tmpname;
d56e2917 3275
6fd4b4c0
DK
3276 ChangeOwnerAndPermissionOfFile("Item::QueueURI", TemporaryDirectory.c_str(),
3277 SandboxUser.c_str(), "root", 0700);
3278
3279 DestFile = flCombine(TemporaryDirectory, DestFileName);
3280 if (DestDir.empty() == false)
872bd447 3281 {
6fd4b4c0 3282 d->FinalFile = flCombine(DestDir, DestFileName);
872bd447
DK
3283 if (RealFileExists(d->FinalFile))
3284 {
3285 FileFd file1, file2;
3286 if (file1.Open(DestFile, FileFd::WriteOnly | FileFd::Create | FileFd::Exclusive) &&
3287 file2.Open(d->FinalFile, FileFd::ReadOnly) && CopyFile(file2, file1))
3288 {
3289 struct timeval times[2];
3290 times[0].tv_sec = times[1].tv_sec = file2.ModificationTime();
3291 times[0].tv_usec = times[1].tv_usec = 0;
3292 utimes(DestFile.c_str(), times);
3293 }
3294 }
3295 }
d56e2917
DK
3296
3297 Desc.ShortDesc = "Changelog";
3298 strprintf(Desc.Description, "%s %s %s Changelog", URI::SiteOnly(Desc.URI).c_str(), SrcName.c_str(), SrcVersion.c_str());
3299 Desc.Owner = this;
3300 QueueURI(Desc);
d56e2917
DK
3301}
3302 /*}}}*/
3303std::string pkgAcqChangelog::URI(pkgCache::VerIterator const &Ver) /*{{{*/
3304{
b5aba909
DK
3305 std::string const confOnline = "Acquire::Changelogs::AlwaysOnline";
3306 bool AlwaysOnline = _config->FindB(confOnline, false);
3307 if (AlwaysOnline == false)
3308 for (pkgCache::VerFileIterator VF = Ver.FileList(); VF.end() == false; ++VF)
3309 {
3310 pkgCache::PkgFileIterator const PF = VF.File();
3311 if (PF.Flagged(pkgCache::Flag::NotSource) || PF->Release == 0)
3312 continue;
3313 pkgCache::RlsFileIterator const RF = PF.ReleaseFile();
3314 if (RF->Origin != 0 && _config->FindB(confOnline + "::Origin::" + RF.Origin(), false))
3315 {
3316 AlwaysOnline = true;
3317 break;
3318 }
3319 }
3320 if (AlwaysOnline == false)
3321 {
3322 pkgCache::PkgIterator const Pkg = Ver.ParentPkg();
3323 if (Pkg->CurrentVer != 0 && Pkg.CurrentVer() == Ver)
3324 {
3325 std::string const basename = std::string("/usr/share/doc/") + Pkg.Name() + "/changelog";
3326 std::string const debianname = basename + ".Debian";
3327 if (FileExists(debianname))
3328 return "copy://" + debianname;
3329 else if (FileExists(debianname + ".gz"))
3330 return "gzip://" + debianname + ".gz";
3331 else if (FileExists(basename))
3332 return "copy://" + basename;
3333 else if (FileExists(basename + ".gz"))
3334 return "gzip://" + basename + ".gz";
3335 }
3336 }
3337
d56e2917
DK
3338 char const * const SrcName = Ver.SourcePkgName();
3339 char const * const SrcVersion = Ver.SourceVerStr();
d56e2917
DK
3340 // find the first source for this version which promises a changelog
3341 for (pkgCache::VerFileIterator VF = Ver.FileList(); VF.end() == false; ++VF)
3342 {
3343 pkgCache::PkgFileIterator const PF = VF.File();
3344 if (PF.Flagged(pkgCache::Flag::NotSource) || PF->Release == 0)
3345 continue;
d56e2917
DK
3346 pkgCache::RlsFileIterator const RF = PF.ReleaseFile();
3347 std::string const uri = URI(RF, PF.Component(), SrcName, SrcVersion);
3348 if (uri.empty())
3349 continue;
3350 return uri;
3351 }
3352 return "";
3353}
3354std::string pkgAcqChangelog::URITemplate(pkgCache::RlsFileIterator const &Rls)
3355{
3356 if (Rls.end() == true || (Rls->Label == 0 && Rls->Origin == 0))
3357 return "";
3358 std::string const serverConfig = "Acquire::Changelogs::URI";
3359 std::string server;
3360#define APT_EMPTY_SERVER \
3361 if (server.empty() == false) \
3362 { \
3363 if (server != "no") \
3364 return server; \
3365 return ""; \
3366 }
3367#define APT_CHECK_SERVER(X, Y) \
3368 if (Rls->X != 0) \
3369 { \
3370 std::string const specialServerConfig = serverConfig + "::" + Y + #X + "::" + Rls.X(); \
3371 server = _config->Find(specialServerConfig); \
3372 APT_EMPTY_SERVER \
3373 }
3374 // this way e.g. Debian-Security can fallback to Debian
3375 APT_CHECK_SERVER(Label, "Override::")
3376 APT_CHECK_SERVER(Origin, "Override::")
3377
3378 if (RealFileExists(Rls.FileName()))
3379 {
3380 _error->PushToStack();
3381 FileFd rf;
3382 /* This can be costly. A caller wanting to get millions of URIs might
3383 want to do this on its own once and use Override settings.
3384 We don't do this here as Origin/Label are not as unique as they
3385 should be so this could produce request order-dependent anomalies */
3386 if (OpenMaybeClearSignedFile(Rls.FileName(), rf) == true)
3387 {
3388 pkgTagFile TagFile(&rf, rf.Size());
3389 pkgTagSection Section;
3390 if (TagFile.Step(Section) == true)
3391 server = Section.FindS("Changelogs");
3392 }
3393 _error->RevertToStack();
3394 APT_EMPTY_SERVER
3395 }
3396
3397 APT_CHECK_SERVER(Label, "")
3398 APT_CHECK_SERVER(Origin, "")
3399#undef APT_CHECK_SERVER
3400#undef APT_EMPTY_SERVER
3401 return "";
3402}
3403std::string pkgAcqChangelog::URI(pkgCache::RlsFileIterator const &Rls,
3404 char const * const Component, char const * const SrcName,
3405 char const * const SrcVersion)
3406{
3407 return URI(URITemplate(Rls), Component, SrcName, SrcVersion);
3408}
3409std::string pkgAcqChangelog::URI(std::string const &Template,
3410 char const * const Component, char const * const SrcName,
3411 char const * const SrcVersion)
3412{
430481e7 3413 if (Template.find("@CHANGEPATH@") == std::string::npos)
d56e2917
DK
3414 return "";
3415
3416 // the path is: COMPONENT/SRC/SRCNAME/SRCNAME_SRCVER, e.g. main/a/apt/1.1 or contrib/liba/libapt/2.0
3417 std::string Src = SrcName;
3418 std::string path = APT::String::Startswith(SrcName, "lib") ? Src.substr(0, 4) : Src.substr(0,1);
3419 path.append("/").append(Src).append("/");
3420 path.append(Src).append("_").append(StripEpoch(SrcVersion));
3421 // we omit component for releases without one (= flat-style repositories)
3422 if (Component != NULL && strlen(Component) != 0)
3423 path = std::string(Component) + "/" + path;
3424
430481e7 3425 return SubstVar(Template, "@CHANGEPATH@", path);
d56e2917
DK
3426}
3427 /*}}}*/
3428// AcqChangelog::Failed - Failure handler /*{{{*/
3429void pkgAcqChangelog::Failed(string const &Message, pkgAcquire::MethodConfig const * const Cnf)
3430{
3431 Item::Failed(Message,Cnf);
3432
3433 std::string errText;
3434 // TRANSLATOR: %s=%s is sourcename=sourceversion, e.g. apt=1.1
3435 strprintf(errText, _("Changelog unavailable for %s=%s"), SrcName.c_str(), SrcVersion.c_str());
3436
3437 // Error is probably something techy like 404 Not Found
3438 if (ErrorText.empty())
3439 ErrorText = errText;
3440 else
3441 ErrorText = errText + " (" + ErrorText + ")";
d56e2917
DK
3442}
3443 /*}}}*/
3444// AcqChangelog::Done - Item downloaded OK /*{{{*/
3445void pkgAcqChangelog::Done(string const &Message,HashStringList const &CalcHashes,
3446 pkgAcquire::MethodConfig const * const Cnf)
3447{
3448 Item::Done(Message,CalcHashes,Cnf);
6fd4b4c0 3449 if (d->FinalFile.empty() == false)
872bd447
DK
3450 {
3451 if (RemoveFile("pkgAcqChangelog::Done", d->FinalFile) == false ||
3452 Rename(DestFile, d->FinalFile) == false)
3453 Status = StatError;
3454 }
d56e2917
DK
3455
3456 Complete = true;
3457}
3458 /*}}}*/
3459pkgAcqChangelog::~pkgAcqChangelog() /*{{{*/
3460{
3461 if (TemporaryDirectory.empty() == false)
3462 {
51818f26 3463 RemoveFile("~pkgAcqChangelog", DestFile);
d56e2917
DK
3464 rmdir(TemporaryDirectory.c_str());
3465 }
6fd4b4c0 3466 delete d;
d56e2917
DK
3467}
3468 /*}}}*/
3469
36375005 3470// AcqFile::pkgAcqFile - Constructor /*{{{*/
448c38bd
DK
3471pkgAcqFile::pkgAcqFile(pkgAcquire * const Owner,string const &URI, HashStringList const &Hashes,
3472 unsigned long long const Size,string const &Dsc,string const &ShortDesc,
77278c2b 3473 const string &DestDir, const string &DestFilename,
448c38bd 3474 bool const IsIndexFile) :
6c55f07a 3475 Item(Owner), d(NULL), IsIndexFile(IsIndexFile), ExpectedHashes(Hashes)
36375005 3476{
08cfc005 3477 Retries = _config->FindI("Acquire::Retries",0);
448c38bd 3478
46e00f9d
MV
3479 if(!DestFilename.empty())
3480 DestFile = DestFilename;
3481 else if(!DestDir.empty())
3482 DestFile = DestDir + "/" + flNotDir(URI);
3483 else
3484 DestFile = flNotDir(URI);
3485
36375005
AL
3486 // Create the item
3487 Desc.URI = URI;
3488 Desc.Description = Dsc;
3489 Desc.Owner = this;
3490
3491 // Set the short description to the archive component
3492 Desc.ShortDesc = ShortDesc;
448c38bd 3493
36375005
AL
3494 // Get the transfer sizes
3495 FileSize = Size;
3496 struct stat Buf;
3497 if (stat(DestFile.c_str(),&Buf) == 0)
3498 {
3499 // Hmm, the partial file is too big, erase it
ed9665ae 3500 if ((Size > 0) && (unsigned long long)Buf.st_size > Size)
51818f26 3501 RemoveFile("pkgAcqFile", DestFile);
36375005
AL
3502 else
3503 PartialSize = Buf.st_size;
3504 }
092ae175 3505
36375005
AL
3506 QueueURI(Desc);
3507}
3508 /*}}}*/
3509// AcqFile::Done - Item downloaded OK /*{{{*/
448c38bd
DK
3510void pkgAcqFile::Done(string const &Message,HashStringList const &CalcHashes,
3511 pkgAcquire::MethodConfig const * const Cnf)
36375005 3512{
448c38bd 3513 Item::Done(Message,CalcHashes,Cnf);
495e5cb2 3514
dd676dc7 3515 std::string const FileName = LookupTag(Message,"Filename");
36375005 3516 Complete = true;
448c38bd 3517
36375005
AL
3518 // The files timestamp matches
3519 if (StringToBool(LookupTag(Message,"IMS-Hit"),false) == true)
3520 return;
448c38bd 3521
36375005 3522 // We have to copy it into place
08ea7806 3523 if (RealFileExists(DestFile.c_str()) == false)
36375005
AL
3524 {
3525 Local = true;
459681d3
AL
3526 if (_config->FindB("Acquire::Source-Symlinks",true) == false ||
3527 Cnf->Removable == true)
917ae805
AL
3528 {
3529 Desc.URI = "copy:" + FileName;
3530 QueueURI(Desc);
3531 return;
3532 }
448c38bd 3533
83ab33fc
AL
3534 // Erase the file if it is a symlink so we can overwrite it
3535 struct stat St;
3536 if (lstat(DestFile.c_str(),&St) == 0)
3537 {
3538 if (S_ISLNK(St.st_mode) != 0)
51818f26 3539 RemoveFile("pkgAcqFile::Done", DestFile);
83ab33fc 3540 }
448c38bd 3541
83ab33fc 3542 // Symlink the file
917ae805
AL
3543 if (symlink(FileName.c_str(),DestFile.c_str()) != 0)
3544 {
03aa0847
DK
3545 _error->PushToStack();
3546 _error->Errno("pkgAcqFile::Done", "Symlinking file %s failed", DestFile.c_str());
3547 std::stringstream msg;
95278287 3548 _error->DumpErrors(msg, GlobalError::DEBUG, false);
03aa0847
DK
3549 _error->RevertToStack();
3550 ErrorText = msg.str();
917ae805
AL
3551 Status = StatError;
3552 Complete = false;
448c38bd 3553 }
36375005
AL
3554 }
3555}
3556 /*}}}*/
08cfc005
AL
3557// AcqFile::Failed - Failure handler /*{{{*/
3558// ---------------------------------------------------------------------
3559/* Here we try other sources */
448c38bd 3560void pkgAcqFile::Failed(string const &Message, pkgAcquire::MethodConfig const * const Cnf)
08cfc005 3561{
03aa0847
DK
3562 Item::Failed(Message,Cnf);
3563
08cfc005
AL
3564 // This is the retry counter
3565 if (Retries != 0 &&
3566 Cnf->LocalOnly == false &&
3567 StringToBool(LookupTag(Message,"Transient-Failure"),false) == true)
3568 {
03aa0847 3569 --Retries;
08cfc005 3570 QueueURI(Desc);
03aa0847 3571 Status = StatIdle;
08cfc005
AL
3572 return;
3573 }
03aa0847 3574
08cfc005
AL
3575}
3576 /*}}}*/
448c38bd 3577string pkgAcqFile::Custom600Headers() const /*{{{*/
77278c2b
MV
3578{
3579 if (IsIndexFile)
3580 return "\nIndex-File: true";
61a07c57 3581 return "";
77278c2b
MV
3582}
3583 /*}}}*/
c8a4ce6c 3584pkgAcqFile::~pkgAcqFile() {}