1 // -*- mode: cpp; mode: fold -*-
3 // $Id: acquire-item.cc,v 1.46.2.9 2004/01/16 18:51:11 mdz Exp $
4 /* ######################################################################
6 Acquire Item - Item to acquire
8 Each item can download to exactly one file at a time. This means you
9 cannot create an item that fetches two uri's to two files at the same
10 time. The pkgAcqIndex class creates a second class upon instantiation
11 to fetch the other index files because of this.
13 ##################################################################### */
15 // Include Files /*{{{*/
17 #pragma implementation "apt-pkg/acquire-item.h"
19 #include <apt-pkg/acquire-item.h>
20 #include <apt-pkg/configuration.h>
21 #include <apt-pkg/sourcelist.h>
22 #include <apt-pkg/vendorlist.h>
23 #include <apt-pkg/error.h>
24 #include <apt-pkg/strutl.h>
25 #include <apt-pkg/fileutl.h>
26 #include <apt-pkg/md5.h>
39 // Acquire::Item::Item - Constructor /*{{{*/
40 // ---------------------------------------------------------------------
42 pkgAcquire::Item::Item(pkgAcquire
*Owner
) : Owner(Owner
), FileSize(0),
43 PartialSize(0), Mode(0), ID(0), Complete(false),
44 Local(false), QueueCounter(0)
50 // Acquire::Item::~Item - Destructor /*{{{*/
51 // ---------------------------------------------------------------------
53 pkgAcquire::Item::~Item()
58 // Acquire::Item::Failed - Item failed to download /*{{{*/
59 // ---------------------------------------------------------------------
60 /* We return to an idle state if there are still other queues that could
62 void pkgAcquire::Item::Failed(string Message
,pkgAcquire::MethodConfig
*Cnf
)
65 ErrorText
= LookupTag(Message
,"Message");
66 if (QueueCounter
<= 1)
68 /* This indicates that the file is not available right now but might
69 be sometime later. If we do a retry cycle then this should be
71 if (Cnf
->LocalOnly
== true &&
72 StringToBool(LookupTag(Message
,"Transient-Failure"),false) == true)
84 // Acquire::Item::Start - Item has begun to download /*{{{*/
85 // ---------------------------------------------------------------------
86 /* Stash status and the file size. Note that setting Complete means
87 sub-phases of the acquire process such as decompresion are operating */
88 void pkgAcquire::Item::Start(string
/*Message*/,unsigned long Size
)
90 Status
= StatFetching
;
91 if (FileSize
== 0 && Complete
== false)
95 // Acquire::Item::Done - Item downloaded OK /*{{{*/
96 // ---------------------------------------------------------------------
98 void pkgAcquire::Item::Done(string Message
,unsigned long Size
,string
,
99 pkgAcquire::MethodConfig
*Cnf
)
101 // We just downloaded something..
102 string FileName
= LookupTag(Message
,"Filename");
103 if (Complete
== false && FileName
== DestFile
)
106 Owner
->Log
->Fetched(Size
,atoi(LookupTag(Message
,"Resume-Point","0").c_str()));
113 ErrorText
= string();
114 Owner
->Dequeue(this);
117 // Acquire::Item::Rename - Rename a file /*{{{*/
118 // ---------------------------------------------------------------------
119 /* This helper function is used by alot of item methods as thier final
121 void pkgAcquire::Item::Rename(string From
,string To
)
123 if (rename(From
.c_str(),To
.c_str()) != 0)
126 snprintf(S
,sizeof(S
),_("rename failed, %s (%s -> %s)."),strerror(errno
),
127 From
.c_str(),To
.c_str());
134 // AcqIndex::AcqIndex - Constructor /*{{{*/
135 // ---------------------------------------------------------------------
136 /* The package file is added to the queue and a second class is
137 instantiated to fetch the revision file */
138 pkgAcqIndex::pkgAcqIndex(pkgAcquire
*Owner
,
139 string URI
,string URIDesc
,string ShortDesc
,
140 string ExpectedMD5
, string comprExt
) :
141 Item(Owner
), RealURI(URI
), ExpectedMD5(ExpectedMD5
)
143 Decompression
= false;
146 DestFile
= _config
->FindDir("Dir::State::lists") + "partial/";
147 DestFile
+= URItoFileName(URI
);
152 if(FileExists("/usr/bin/bzip2"))
153 Desc
.URI
= URI
+ ".bz2";
155 Desc
.URI
= URI
+ ".gz";
157 Desc
.URI
= URI
+ comprExt
;
160 Desc
.Description
= URIDesc
;
162 Desc
.ShortDesc
= ShortDesc
;
167 // AcqIndex::Custom600Headers - Insert custom request headers /*{{{*/
168 // ---------------------------------------------------------------------
169 /* The only header we use is the last-modified header. */
170 string
pkgAcqIndex::Custom600Headers()
172 string Final
= _config
->FindDir("Dir::State::lists");
173 Final
+= URItoFileName(RealURI
);
176 if (stat(Final
.c_str(),&Buf
) != 0)
177 return "\nIndex-File: true";
179 return "\nIndex-File: true\nLast-Modified: " + TimeRFC1123(Buf
.st_mtime
);
183 void pkgAcqIndex::Failed(string Message
,pkgAcquire::MethodConfig
*Cnf
)
185 // no .bz2 found, retry with .gz
186 if(Desc
.URI
.substr(Desc
.URI
.size()-3,Desc
.URI
.size()-1) == "bz2") {
187 Desc
.URI
= Desc
.URI
.substr(0,Desc
.URI
.size()-3) + "gz";
189 // retry with a gzip one
190 new pkgAcqIndex(Owner
, RealURI
, Desc
.Description
,Desc
.ShortDesc
,
191 ExpectedMD5
, string(".gz"));
199 Item::Failed(Message
,Cnf
);
203 // AcqIndex::Done - Finished a fetch /*{{{*/
204 // ---------------------------------------------------------------------
205 /* This goes through a number of states.. On the initial fetch the
206 method could possibly return an alternate filename which points
207 to the uncompressed version of the file. If this is so the file
208 is copied into the partial directory. In all other cases the file
209 is decompressed with a gzip uri. */
210 void pkgAcqIndex::Done(string Message
,unsigned long Size
,string MD5
,
211 pkgAcquire::MethodConfig
*Cfg
)
213 Item::Done(Message
,Size
,MD5
,Cfg
);
215 if (Decompression
== true)
217 if (_config
->FindB("Debug::pkgAcquire::Auth", false))
219 std::cerr
<< std::endl
<< RealURI
<< ": Computed MD5: " << MD5
;
220 std::cerr
<< " Expected MD5: " << ExpectedMD5
<< std::endl
;
226 FileFd
Fd(DestFile
, FileFd::ReadOnly
);
227 sum
.AddFD(Fd
.Fd(), Fd
.Size());
229 MD5
= (string
)sum
.Result();
232 if (!ExpectedMD5
.empty() && MD5
!= ExpectedMD5
)
234 Status
= StatAuthError
;
235 ErrorText
= _("MD5Sum mismatch");
236 Rename(DestFile
,DestFile
+ ".FAILED");
239 // Done, move it into position
240 string FinalFile
= _config
->FindDir("Dir::State::lists");
241 FinalFile
+= URItoFileName(RealURI
);
242 Rename(DestFile
,FinalFile
);
243 chmod(FinalFile
.c_str(),0644);
245 /* We restore the original name to DestFile so that the clean operation
247 DestFile
= _config
->FindDir("Dir::State::lists") + "partial/";
248 DestFile
+= URItoFileName(RealURI
);
250 // Remove the compressed version.
252 unlink(DestFile
.c_str());
259 // Handle the unzipd case
260 string FileName
= LookupTag(Message
,"Alt-Filename");
261 if (FileName
.empty() == false)
263 // The files timestamp matches
264 if (StringToBool(LookupTag(Message
,"Alt-IMS-Hit"),false) == true)
267 Decompression
= true;
269 DestFile
+= ".decomp";
270 Desc
.URI
= "copy:" + FileName
;
276 FileName
= LookupTag(Message
,"Filename");
277 if (FileName
.empty() == true)
280 ErrorText
= "Method gave a blank filename";
283 // The files timestamp matches
284 if (StringToBool(LookupTag(Message
,"IMS-Hit"),false) == true)
287 if (FileName
== DestFile
)
292 string compExt
= Desc
.URI
.substr(Desc
.URI
.size()-3,Desc
.URI
.size()-1);
295 decompProg
= "bzip2";
296 else if(compExt
== ".gz")
299 _error
->Error("Unsupported extension: %s", compExt
.c_str());
303 Decompression
= true;
304 DestFile
+= ".decomp";
305 Desc
.URI
= string(decompProg
) + ":" + FileName
;
310 // AcqIndexTrans::pkgAcqIndexTrans - Constructor /*{{{*/
311 // ---------------------------------------------------------------------
312 /* The Translation file is added to the queue */
313 pkgAcqIndexTrans::pkgAcqIndexTrans(pkgAcquire
*Owner
,
314 string URI
,string URIDesc
,string ShortDesc
) :
315 pkgAcqIndex(Owner
, URI
, URIDesc
, ShortDesc
, "", "")
320 // AcqIndexTrans::Failed - Silence failure messages for missing files /*{{{*/
321 // ---------------------------------------------------------------------
323 void pkgAcqIndexTrans::Failed(string Message
,pkgAcquire::MethodConfig
*Cnf
)
325 if (Cnf
->LocalOnly
== true ||
326 StringToBool(LookupTag(Message
,"Transient-Failure"),false) == false)
335 Item::Failed(Message
,Cnf
);
339 pkgAcqMetaSig::pkgAcqMetaSig(pkgAcquire
*Owner
,
340 string URI
,string URIDesc
,string ShortDesc
,
341 string MetaIndexURI
, string MetaIndexURIDesc
,
342 string MetaIndexShortDesc
,
343 const vector
<IndexTarget
*>* IndexTargets
,
344 indexRecords
* MetaIndexParser
) :
345 Item(Owner
), RealURI(URI
), MetaIndexURI(MetaIndexURI
),
346 MetaIndexURIDesc(MetaIndexURIDesc
), MetaIndexShortDesc(MetaIndexShortDesc
)
348 this->MetaIndexParser
= MetaIndexParser
;
349 this->IndexTargets
= IndexTargets
;
350 DestFile
= _config
->FindDir("Dir::State::lists") + "partial/";
351 DestFile
+= URItoFileName(URI
);
353 // remove any partial downloaded sig-file. it may confuse proxies
354 // and is too small to warrant a partial download anyway
355 unlink(DestFile
.c_str());
358 Desc
.Description
= URIDesc
;
360 Desc
.ShortDesc
= ShortDesc
;
364 string Final
= _config
->FindDir("Dir::State::lists");
365 Final
+= URItoFileName(RealURI
);
367 if (stat(Final
.c_str(),&Buf
) == 0)
369 // File was already in place. It needs to be re-verified
370 // because Release might have changed, so Move it into partial
371 Rename(Final
,DestFile
);
377 // pkgAcqMetaSig::Custom600Headers - Insert custom request headers /*{{{*/
378 // ---------------------------------------------------------------------
379 /* The only header we use is the last-modified header. */
380 string
pkgAcqMetaSig::Custom600Headers()
383 if (stat(DestFile
.c_str(),&Buf
) != 0)
384 return "\nIndex-File: true";
386 return "\nIndex-File: true\nLast-Modified: " + TimeRFC1123(Buf
.st_mtime
);
389 void pkgAcqMetaSig::Done(string Message
,unsigned long Size
,string MD5
,
390 pkgAcquire::MethodConfig
*Cfg
)
392 Item::Done(Message
,Size
,MD5
,Cfg
);
394 string FileName
= LookupTag(Message
,"Filename");
395 if (FileName
.empty() == true)
398 ErrorText
= "Method gave a blank filename";
402 if (FileName
!= DestFile
)
404 // We have to copy it into place
406 Desc
.URI
= "copy:" + FileName
;
413 // queue a pkgAcqMetaIndex to be verified against the sig we just retrieved
414 new pkgAcqMetaIndex(Owner
, MetaIndexURI
, MetaIndexURIDesc
, MetaIndexShortDesc
,
415 DestFile
, IndexTargets
, MetaIndexParser
);
419 void pkgAcqMetaSig::Failed(string Message
,pkgAcquire::MethodConfig
*Cnf
)
421 // Delete any existing sigfile, so that this source isn't
422 // mistakenly trusted
423 string Final
= _config
->FindDir("Dir::State::lists") + URItoFileName(RealURI
);
424 unlink(Final
.c_str());
426 // queue a pkgAcqMetaIndex with no sigfile
427 new pkgAcqMetaIndex(Owner
, MetaIndexURI
, MetaIndexURIDesc
, MetaIndexShortDesc
,
428 "", IndexTargets
, MetaIndexParser
);
430 if (Cnf
->LocalOnly
== true ||
431 StringToBool(LookupTag(Message
,"Transient-Failure"),false) == false)
440 Item::Failed(Message
,Cnf
);
443 pkgAcqMetaIndex::pkgAcqMetaIndex(pkgAcquire
*Owner
,
444 string URI
,string URIDesc
,string ShortDesc
,
446 const vector
<struct IndexTarget
*>* IndexTargets
,
447 indexRecords
* MetaIndexParser
) :
448 Item(Owner
), RealURI(URI
), SigFile(SigFile
)
450 this->AuthPass
= false;
451 this->MetaIndexParser
= MetaIndexParser
;
452 this->IndexTargets
= IndexTargets
;
453 DestFile
= _config
->FindDir("Dir::State::lists") + "partial/";
454 DestFile
+= URItoFileName(URI
);
457 Desc
.Description
= URIDesc
;
459 Desc
.ShortDesc
= ShortDesc
;
466 // pkgAcqMetaIndex::Custom600Headers - Insert custom request headers /*{{{*/
467 // ---------------------------------------------------------------------
468 /* The only header we use is the last-modified header. */
469 string
pkgAcqMetaIndex::Custom600Headers()
471 string Final
= _config
->FindDir("Dir::State::lists");
472 Final
+= URItoFileName(RealURI
);
475 if (stat(Final
.c_str(),&Buf
) != 0)
476 return "\nIndex-File: true";
478 return "\nIndex-File: true\nLast-Modified: " + TimeRFC1123(Buf
.st_mtime
);
481 void pkgAcqMetaIndex::Done(string Message
,unsigned long Size
,string MD5
,
482 pkgAcquire::MethodConfig
*Cfg
)
484 Item::Done(Message
,Size
,MD5
,Cfg
);
486 // MetaIndexes are done in two passes: one to download the
487 // metaindex with an appropriate method, and a second to verify it
488 // with the gpgv method
490 if (AuthPass
== true)
496 RetrievalDone(Message
);
498 // Still more retrieving to do
503 // There was no signature file, so we are finished. Download
504 // the indexes without verification.
509 // There was a signature file, so pass it to gpgv for
512 if (_config
->FindB("Debug::pkgAcquire::Auth", false))
513 std::cerr
<< "Metaindex acquired, queueing gpg verification ("
514 << SigFile
<< "," << DestFile
<< ")\n";
516 Desc
.URI
= "gpgv:" + SigFile
;
523 void pkgAcqMetaIndex::RetrievalDone(string Message
)
525 // We have just finished downloading a Release file (it is not
528 string FileName
= LookupTag(Message
,"Filename");
529 if (FileName
.empty() == true)
532 ErrorText
= "Method gave a blank filename";
536 if (FileName
!= DestFile
)
539 Desc
.URI
= "copy:" + FileName
;
546 string FinalFile
= _config
->FindDir("Dir::State::lists");
547 FinalFile
+= URItoFileName(RealURI
);
549 // The files timestamp matches
550 if (StringToBool(LookupTag(Message
,"IMS-Hit"),false) == false)
552 // Move it into position
553 Rename(DestFile
,FinalFile
);
555 DestFile
= FinalFile
;
558 void pkgAcqMetaIndex::AuthDone(string Message
)
560 // At this point, the gpgv method has succeeded, so there is a
561 // valid signature from a key in the trusted keyring. We
562 // perform additional verification of its contents, and use them
563 // to verify the indexes we are about to download
565 if (!MetaIndexParser
->Load(DestFile
))
567 Status
= StatAuthError
;
568 ErrorText
= MetaIndexParser
->ErrorText
;
577 if (_config
->FindB("Debug::pkgAcquire::Auth", false))
578 std::cerr
<< "Signature verification succeeded: "
579 << DestFile
<< std::endl
;
581 // Download further indexes with verification
584 // Done, move signature file into position
586 string VerifiedSigFile
= _config
->FindDir("Dir::State::lists") +
587 URItoFileName(RealURI
) + ".gpg";
588 Rename(SigFile
,VerifiedSigFile
);
589 chmod(VerifiedSigFile
.c_str(),0644);
592 void pkgAcqMetaIndex::QueueIndexes(bool verify
)
594 for (vector
<struct IndexTarget
*>::const_iterator Target
= IndexTargets
->begin();
595 Target
!= IndexTargets
->end();
598 string ExpectedIndexMD5
;
601 const indexRecords::checkSum
*Record
= MetaIndexParser
->Lookup((*Target
)->MetaKey
);
604 Status
= StatAuthError
;
605 ErrorText
= "Unable to find expected entry "
606 + (*Target
)->MetaKey
+ " in Meta-index file (malformed Release file?)";
609 ExpectedIndexMD5
= Record
->MD5Hash
;
610 if (_config
->FindB("Debug::pkgAcquire::Auth", false))
612 std::cerr
<< "Queueing: " << (*Target
)->URI
<< std::endl
;
613 std::cerr
<< "Expected MD5: " << ExpectedIndexMD5
<< std::endl
;
615 if (ExpectedIndexMD5
.empty())
617 Status
= StatAuthError
;
618 ErrorText
= "Unable to find MD5 sum for "
619 + (*Target
)->MetaKey
+ " in Meta-index file";
624 // Queue Packages file
625 new pkgAcqIndex(Owner
, (*Target
)->URI
, (*Target
)->Description
,
626 (*Target
)->ShortDesc
, ExpectedIndexMD5
);
630 bool pkgAcqMetaIndex::VerifyVendor()
632 // // Maybe this should be made available from above so we don't have
633 // // to read and parse it every time?
634 // pkgVendorList List;
635 // List.ReadMainList();
637 // const Vendor* Vndr = NULL;
638 // for (std::vector<string>::const_iterator I = GPGVOutput.begin(); I != GPGVOutput.end(); I++)
640 // string::size_type pos = (*I).find("VALIDSIG ");
641 // if (_config->FindB("Debug::Vendor", false))
642 // std::cerr << "Looking for VALIDSIG in \"" << (*I) << "\": pos " << pos
644 // if (pos != std::string::npos)
646 // string Fingerprint = (*I).substr(pos+sizeof("VALIDSIG"));
647 // if (_config->FindB("Debug::Vendor", false))
648 // std::cerr << "Looking for \"" << Fingerprint << "\" in vendor..." <<
650 // Vndr = List.FindVendor(Fingerprint) != "";
651 // if (Vndr != NULL);
656 string Transformed
= MetaIndexParser
->GetExpectedDist();
658 if (Transformed
== "../project/experimental")
660 Transformed
= "experimental";
663 string::size_type pos
= Transformed
.rfind('/');
664 if (pos
!= string::npos
)
666 Transformed
= Transformed
.substr(0, pos
);
669 if (Transformed
== ".")
674 if (_config
->FindB("Debug::pkgAcquire::Auth", false))
676 std::cerr
<< "Got Codename: " << MetaIndexParser
->GetDist() << std::endl
;
677 std::cerr
<< "Expecting Dist: " << MetaIndexParser
->GetExpectedDist() << std::endl
;
678 std::cerr
<< "Transformed Dist: " << Transformed
<< std::endl
;
681 if (MetaIndexParser
->CheckDist(Transformed
) == false)
683 // This might become fatal one day
684 // Status = StatAuthError;
685 // ErrorText = "Conflicting distribution; expected "
686 // + MetaIndexParser->GetExpectedDist() + " but got "
687 // + MetaIndexParser->GetDist();
689 if (!Transformed
.empty())
691 _error
->Warning("Conflicting distribution: %s (expected %s but got %s)",
692 Desc
.Description
.c_str(),
694 MetaIndexParser
->GetDist().c_str());
701 // pkgAcqMetaIndex::Failed - no Release file present or no signature
702 // file present /*{{{*/
703 // ---------------------------------------------------------------------
705 void pkgAcqMetaIndex::Failed(string Message
,pkgAcquire::MethodConfig
*Cnf
)
707 if (AuthPass
== true)
709 // gpgv method failed
710 _error
->Warning("GPG error: %s: %s",
711 Desc
.Description
.c_str(),
712 LookupTag(Message
,"Message").c_str());
715 // No Release file was present, or verification failed, so fall
716 // back to queueing Packages files without verification
722 // AcqArchive::AcqArchive - Constructor /*{{{*/
723 // ---------------------------------------------------------------------
724 /* This just sets up the initial fetch environment and queues the first
726 pkgAcqArchive::pkgAcqArchive(pkgAcquire
*Owner
,pkgSourceList
*Sources
,
727 pkgRecords
*Recs
,pkgCache::VerIterator
const &Version
,
728 string
&StoreFilename
) :
729 Item(Owner
), Version(Version
), Sources(Sources
), Recs(Recs
),
730 StoreFilename(StoreFilename
), Vf(Version
.FileList()),
733 Retries
= _config
->FindI("Acquire::Retries",0);
735 if (Version
.Arch() == 0)
737 _error
->Error(_("I wasn't able to locate a file for the %s package. "
738 "This might mean you need to manually fix this package. "
739 "(due to missing arch)"),
740 Version
.ParentPkg().Name());
744 /* We need to find a filename to determine the extension. We make the
745 assumption here that all the available sources for this version share
746 the same extension.. */
747 // Skip not source sources, they do not have file fields.
748 for (; Vf
.end() == false; Vf
++)
750 if ((Vf
.File()->Flags
& pkgCache::Flag::NotSource
) != 0)
755 // Does not really matter here.. we are going to fail out below
756 if (Vf
.end() != true)
758 // If this fails to get a file name we will bomb out below.
759 pkgRecords::Parser
&Parse
= Recs
->Lookup(Vf
);
760 if (_error
->PendingError() == true)
763 // Generate the final file name as: package_version_arch.foo
764 StoreFilename
= QuoteString(Version
.ParentPkg().Name(),"_:") + '_' +
765 QuoteString(Version
.VerStr(),"_:") + '_' +
766 QuoteString(Version
.Arch(),"_:.") +
767 "." + flExtension(Parse
.FileName());
770 // check if we have one trusted source for the package. if so, switch
771 // to "TrustedOnly" mode
772 for (pkgCache::VerFileIterator i
= Version
.FileList(); i
.end() == false; i
++)
775 if (Sources
->FindIndex(i
.File(),Index
) == false)
777 if (_config
->FindB("Debug::pkgAcquire::Auth", false))
779 std::cerr
<< "Checking index: " << Index
->Describe()
780 << "(Trusted=" << Index
->IsTrusted() << ")\n";
782 if (Index
->IsTrusted()) {
789 if (QueueNext() == false && _error
->PendingError() == false)
790 _error
->Error(_("I wasn't able to locate file for the %s package. "
791 "This might mean you need to manually fix this package."),
792 Version
.ParentPkg().Name());
795 // AcqArchive::QueueNext - Queue the next file source /*{{{*/
796 // ---------------------------------------------------------------------
797 /* This queues the next available file version for download. It checks if
798 the archive is already available in the cache and stashs the MD5 for
800 bool pkgAcqArchive::QueueNext()
802 for (; Vf
.end() == false; Vf
++)
804 // Ignore not source sources
805 if ((Vf
.File()->Flags
& pkgCache::Flag::NotSource
) != 0)
808 // Try to cross match against the source list
810 if (Sources
->FindIndex(Vf
.File(),Index
) == false)
813 // only try to get a trusted package from another source if that source
815 if(Trusted
&& !Index
->IsTrusted())
818 // Grab the text package record
819 pkgRecords::Parser
&Parse
= Recs
->Lookup(Vf
);
820 if (_error
->PendingError() == true)
823 string PkgFile
= Parse
.FileName();
824 MD5
= Parse
.MD5Hash();
825 if (PkgFile
.empty() == true)
826 return _error
->Error(_("The package index files are corrupted. No Filename: "
827 "field for package %s."),
828 Version
.ParentPkg().Name());
830 Desc
.URI
= Index
->ArchiveURI(PkgFile
);
831 Desc
.Description
= Index
->ArchiveInfo(Version
);
833 Desc
.ShortDesc
= Version
.ParentPkg().Name();
835 // See if we already have the file. (Legacy filenames)
836 FileSize
= Version
->Size
;
837 string FinalFile
= _config
->FindDir("Dir::Cache::Archives") + flNotDir(PkgFile
);
839 if (stat(FinalFile
.c_str(),&Buf
) == 0)
841 // Make sure the size matches
842 if ((unsigned)Buf
.st_size
== Version
->Size
)
847 StoreFilename
= DestFile
= FinalFile
;
851 /* Hmm, we have a file and its size does not match, this means it is
852 an old style mismatched arch */
853 unlink(FinalFile
.c_str());
856 // Check it again using the new style output filenames
857 FinalFile
= _config
->FindDir("Dir::Cache::Archives") + flNotDir(StoreFilename
);
858 if (stat(FinalFile
.c_str(),&Buf
) == 0)
860 // Make sure the size matches
861 if ((unsigned)Buf
.st_size
== Version
->Size
)
866 StoreFilename
= DestFile
= FinalFile
;
870 /* Hmm, we have a file and its size does not match, this shouldnt
872 unlink(FinalFile
.c_str());
875 DestFile
= _config
->FindDir("Dir::Cache::Archives") + "partial/" + flNotDir(StoreFilename
);
877 // Check the destination file
878 if (stat(DestFile
.c_str(),&Buf
) == 0)
880 // Hmm, the partial file is too big, erase it
881 if ((unsigned)Buf
.st_size
> Version
->Size
)
882 unlink(DestFile
.c_str());
884 PartialSize
= Buf
.st_size
;
889 Desc
.URI
= Index
->ArchiveURI(PkgFile
);
890 Desc
.Description
= Index
->ArchiveInfo(Version
);
892 Desc
.ShortDesc
= Version
.ParentPkg().Name();
901 // AcqArchive::Done - Finished fetching /*{{{*/
902 // ---------------------------------------------------------------------
904 void pkgAcqArchive::Done(string Message
,unsigned long Size
,string Md5Hash
,
905 pkgAcquire::MethodConfig
*Cfg
)
907 Item::Done(Message
,Size
,Md5Hash
,Cfg
);
910 if (Size
!= Version
->Size
)
913 ErrorText
= _("Size mismatch");
918 if (Md5Hash
.empty() == false && MD5
.empty() == false)
923 ErrorText
= _("MD5Sum mismatch");
924 Rename(DestFile
,DestFile
+ ".FAILED");
929 // Grab the output filename
930 string FileName
= LookupTag(Message
,"Filename");
931 if (FileName
.empty() == true)
934 ErrorText
= "Method gave a blank filename";
940 // Reference filename
941 if (FileName
!= DestFile
)
943 StoreFilename
= DestFile
= FileName
;
948 // Done, move it into position
949 string FinalFile
= _config
->FindDir("Dir::Cache::Archives");
950 FinalFile
+= flNotDir(StoreFilename
);
951 Rename(DestFile
,FinalFile
);
953 StoreFilename
= DestFile
= FinalFile
;
957 // AcqArchive::Failed - Failure handler /*{{{*/
958 // ---------------------------------------------------------------------
959 /* Here we try other sources */
960 void pkgAcqArchive::Failed(string Message
,pkgAcquire::MethodConfig
*Cnf
)
962 ErrorText
= LookupTag(Message
,"Message");
964 /* We don't really want to retry on failed media swaps, this prevents
965 that. An interesting observation is that permanent failures are not
967 if (Cnf
->Removable
== true &&
968 StringToBool(LookupTag(Message
,"Transient-Failure"),false) == true)
970 // Vf = Version.FileList();
971 while (Vf
.end() == false) Vf
++;
972 StoreFilename
= string();
973 Item::Failed(Message
,Cnf
);
977 if (QueueNext() == false)
979 // This is the retry counter
981 Cnf
->LocalOnly
== false &&
982 StringToBool(LookupTag(Message
,"Transient-Failure"),false) == true)
985 Vf
= Version
.FileList();
986 if (QueueNext() == true)
990 StoreFilename
= string();
991 Item::Failed(Message
,Cnf
);
995 // AcqArchive::IsTrusted - Determine whether this archive comes from a
996 // trusted source /*{{{*/
997 // ---------------------------------------------------------------------
998 bool pkgAcqArchive::IsTrusted()
1003 // AcqArchive::Finished - Fetching has finished, tidy up /*{{{*/
1004 // ---------------------------------------------------------------------
1006 void pkgAcqArchive::Finished()
1008 if (Status
== pkgAcquire::Item::StatDone
&&
1011 StoreFilename
= string();
1015 // AcqFile::pkgAcqFile - Constructor /*{{{*/
1016 // ---------------------------------------------------------------------
1017 /* The file is added to the queue */
1018 pkgAcqFile::pkgAcqFile(pkgAcquire
*Owner
,string URI
,string MD5
,
1019 unsigned long Size
,string Dsc
,string ShortDesc
) :
1020 Item(Owner
), Md5Hash(MD5
)
1022 Retries
= _config
->FindI("Acquire::Retries",0);
1024 DestFile
= flNotDir(URI
);
1028 Desc
.Description
= Dsc
;
1031 // Set the short description to the archive component
1032 Desc
.ShortDesc
= ShortDesc
;
1034 // Get the transfer sizes
1037 if (stat(DestFile
.c_str(),&Buf
) == 0)
1039 // Hmm, the partial file is too big, erase it
1040 if ((unsigned)Buf
.st_size
> Size
)
1041 unlink(DestFile
.c_str());
1043 PartialSize
= Buf
.st_size
;
1049 // AcqFile::Done - Item downloaded OK /*{{{*/
1050 // ---------------------------------------------------------------------
1052 void pkgAcqFile::Done(string Message
,unsigned long Size
,string MD5
,
1053 pkgAcquire::MethodConfig
*Cnf
)
1056 if (Md5Hash
.empty() == false && MD5
.empty() == false)
1061 ErrorText
= "MD5Sum mismatch";
1062 Rename(DestFile
,DestFile
+ ".FAILED");
1067 Item::Done(Message
,Size
,MD5
,Cnf
);
1069 string FileName
= LookupTag(Message
,"Filename");
1070 if (FileName
.empty() == true)
1073 ErrorText
= "Method gave a blank filename";
1079 // The files timestamp matches
1080 if (StringToBool(LookupTag(Message
,"IMS-Hit"),false) == true)
1083 // We have to copy it into place
1084 if (FileName
!= DestFile
)
1087 if (_config
->FindB("Acquire::Source-Symlinks",true) == false ||
1088 Cnf
->Removable
== true)
1090 Desc
.URI
= "copy:" + FileName
;
1095 // Erase the file if it is a symlink so we can overwrite it
1097 if (lstat(DestFile
.c_str(),&St
) == 0)
1099 if (S_ISLNK(St
.st_mode
) != 0)
1100 unlink(DestFile
.c_str());
1104 if (symlink(FileName
.c_str(),DestFile
.c_str()) != 0)
1106 ErrorText
= "Link to " + DestFile
+ " failure ";
1113 // AcqFile::Failed - Failure handler /*{{{*/
1114 // ---------------------------------------------------------------------
1115 /* Here we try other sources */
1116 void pkgAcqFile::Failed(string Message
,pkgAcquire::MethodConfig
*Cnf
)
1118 ErrorText
= LookupTag(Message
,"Message");
1120 // This is the retry counter
1122 Cnf
->LocalOnly
== false &&
1123 StringToBool(LookupTag(Message
,"Transient-Failure"),false) == true)
1130 Item::Failed(Message
,Cnf
);