1 // -*- mode: cpp; mode: fold -*-
3 // $Id: acquire-item.cc,v 1.46.2.9 2004/01/16 18:51:11 mdz Exp $
4 /* ######################################################################
6 Acquire Item - Item to acquire
8 Each item can download to exactly one file at a time. This means you
9 cannot create an item that fetches two uri's to two files at the same
10 time. The pkgAcqIndex class creates a second class upon instantiation
11 to fetch the other index files because of this.
13 ##################################################################### */
15 // Include Files /*{{{*/
18 #include <apt-pkg/acquire-item.h>
19 #include <apt-pkg/configuration.h>
20 #include <apt-pkg/aptconfiguration.h>
21 #include <apt-pkg/sourcelist.h>
22 #include <apt-pkg/error.h>
23 #include <apt-pkg/strutl.h>
24 #include <apt-pkg/fileutl.h>
25 #include <apt-pkg/md5.h>
26 #include <apt-pkg/sha1.h>
27 #include <apt-pkg/tagfile.h>
28 #include <apt-pkg/indexrecords.h>
29 #include <apt-pkg/metaindex.h>
44 // Acquire::Item::Item - Constructor /*{{{*/
45 // ---------------------------------------------------------------------
47 pkgAcquire::Item::Item(pkgAcquire
*Owner
) : Owner(Owner
), FileSize(0),
48 PartialSize(0), Mode(0), ID(0), Complete(false),
49 Local(false), QueueCounter(0)
55 // Acquire::Item::~Item - Destructor /*{{{*/
56 // ---------------------------------------------------------------------
58 pkgAcquire::Item::~Item()
63 // Acquire::Item::Failed - Item failed to download /*{{{*/
64 // ---------------------------------------------------------------------
65 /* We return to an idle state if there are still other queues that could
67 void pkgAcquire::Item::Failed(string Message
,pkgAcquire::MethodConfig
*Cnf
)
70 ErrorText
= LookupTag(Message
,"Message");
71 UsedMirror
= LookupTag(Message
,"UsedMirror");
72 if (QueueCounter
<= 1)
74 /* This indicates that the file is not available right now but might
75 be sometime later. If we do a retry cycle then this should be
77 if (Cnf
->LocalOnly
== true &&
78 StringToBool(LookupTag(Message
,"Transient-Failure"),false) == true)
89 // report mirror failure back to LP if we actually use a mirror
90 string FailReason
= LookupTag(Message
, "FailReason");
91 if(FailReason
.size() != 0)
92 ReportMirrorFailure(FailReason
);
94 ReportMirrorFailure(ErrorText
);
97 // Acquire::Item::Start - Item has begun to download /*{{{*/
98 // ---------------------------------------------------------------------
99 /* Stash status and the file size. Note that setting Complete means
100 sub-phases of the acquire process such as decompresion are operating */
101 void pkgAcquire::Item::Start(string
/*Message*/,unsigned long long Size
)
103 Status
= StatFetching
;
104 if (FileSize
== 0 && Complete
== false)
108 // Acquire::Item::Done - Item downloaded OK /*{{{*/
109 // ---------------------------------------------------------------------
111 void pkgAcquire::Item::Done(string Message
,unsigned long long Size
,string Hash
,
112 pkgAcquire::MethodConfig
*Cnf
)
114 // We just downloaded something..
115 string FileName
= LookupTag(Message
,"Filename");
116 UsedMirror
= LookupTag(Message
,"UsedMirror");
117 if (Complete
== false && !Local
&& FileName
== DestFile
)
120 Owner
->Log
->Fetched(Size
,atoi(LookupTag(Message
,"Resume-Point","0").c_str()));
126 ErrorText
= string();
127 Owner
->Dequeue(this);
130 // Acquire::Item::Rename - Rename a file /*{{{*/
131 // ---------------------------------------------------------------------
132 /* This helper function is used by a lot of item methods as their final
134 void pkgAcquire::Item::Rename(string From
,string To
)
136 if (rename(From
.c_str(),To
.c_str()) != 0)
139 snprintf(S
,sizeof(S
),_("rename failed, %s (%s -> %s)."),strerror(errno
),
140 From
.c_str(),To
.c_str());
146 bool pkgAcquire::Item::RenameOnError(pkgAcquire::Item::RenameOnErrorState
const error
)/*{{{*/
148 if(FileExists(DestFile
))
149 Rename(DestFile
, DestFile
+ ".FAILED");
153 case HashSumMismatch
:
154 ErrorText
= _("Hash Sum mismatch");
155 Status
= StatAuthError
;
156 ReportMirrorFailure("HashChecksumFailure");
159 ErrorText
= _("Size mismatch");
160 Status
= StatAuthError
;
161 ReportMirrorFailure("SizeFailure");
164 ErrorText
= _("Invalid file format");
166 // do not report as usually its not the mirrors fault, but Portal/Proxy
172 // Acquire::Item::ReportMirrorFailure /*{{{*/
173 // ---------------------------------------------------------------------
174 void pkgAcquire::Item::ReportMirrorFailure(string FailCode
)
176 // we only act if a mirror was used at all
177 if(UsedMirror
.empty())
180 std::cerr
<< "\nReportMirrorFailure: "
182 << " Uri: " << DescURI()
184 << FailCode
<< std::endl
;
186 const char *Args
[40];
188 string report
= _config
->Find("Methods::Mirror::ProblemReporting",
189 "/usr/lib/apt/apt-report-mirror-failure");
190 if(!FileExists(report
))
192 Args
[i
++] = report
.c_str();
193 Args
[i
++] = UsedMirror
.c_str();
194 Args
[i
++] = DescURI().c_str();
195 Args
[i
++] = FailCode
.c_str();
197 pid_t pid
= ExecFork();
200 _error
->Error("ReportMirrorFailure Fork failed");
205 execvp(Args
[0], (char**)Args
);
206 std::cerr
<< "Could not exec " << Args
[0] << std::endl
;
209 if(!ExecWait(pid
, "report-mirror-failure"))
211 _error
->Warning("Couldn't report problem to '%s'",
212 _config
->Find("Methods::Mirror::ProblemReporting").c_str());
216 // AcqSubIndex::AcqSubIndex - Constructor /*{{{*/
217 // ---------------------------------------------------------------------
218 /* Get a sub-index file based on checksums from a 'master' file and
219 possibly query additional files */
220 pkgAcqSubIndex::pkgAcqSubIndex(pkgAcquire
*Owner
, string
const &URI
,
221 string
const &URIDesc
, string
const &ShortDesc
,
222 HashString
const &ExpectedHash
)
223 : Item(Owner
), ExpectedHash(ExpectedHash
)
225 /* XXX: Beware: Currently this class does nothing (of value) anymore ! */
226 Debug
= _config
->FindB("Debug::pkgAcquire::SubIndex",false);
228 DestFile
= _config
->FindDir("Dir::State::lists") + "partial/";
229 DestFile
+= URItoFileName(URI
);
232 Desc
.Description
= URIDesc
;
234 Desc
.ShortDesc
= ShortDesc
;
239 std::clog
<< "pkgAcqSubIndex: " << Desc
.URI
<< std::endl
;
242 // AcqSubIndex::Custom600Headers - Insert custom request headers /*{{{*/
243 // ---------------------------------------------------------------------
244 /* The only header we use is the last-modified header. */
245 string
pkgAcqSubIndex::Custom600Headers()
247 string Final
= _config
->FindDir("Dir::State::lists");
248 Final
+= URItoFileName(Desc
.URI
);
251 if (stat(Final
.c_str(),&Buf
) != 0)
252 return "\nIndex-File: true\nFail-Ignore: true\n";
253 return "\nIndex-File: true\nFail-Ignore: true\nLast-Modified: " + TimeRFC1123(Buf
.st_mtime
);
256 void pkgAcqSubIndex::Failed(string Message
,pkgAcquire::MethodConfig
*Cnf
) /*{{{*/
259 std::clog
<< "pkgAcqSubIndex failed: " << Desc
.URI
<< std::endl
;
265 // No good Index is provided
268 void pkgAcqSubIndex::Done(string Message
,unsigned long long Size
,string Md5Hash
, /*{{{*/
269 pkgAcquire::MethodConfig
*Cnf
)
272 std::clog
<< "pkgAcqSubIndex::Done(): " << Desc
.URI
<< std::endl
;
274 string FileName
= LookupTag(Message
,"Filename");
275 if (FileName
.empty() == true)
278 ErrorText
= "Method gave a blank filename";
282 if (FileName
!= DestFile
)
285 Desc
.URI
= "copy:" + FileName
;
290 Item::Done(Message
,Size
,Md5Hash
,Cnf
);
292 string FinalFile
= _config
->FindDir("Dir::State::lists")+URItoFileName(Desc
.URI
);
294 /* Downloaded invalid transindex => Error (LP: #346386) (Closes: #627642) */
295 indexRecords SubIndexParser
;
296 if (FileExists(DestFile
) == true && !SubIndexParser
.Load(DestFile
)) {
298 ErrorText
= SubIndexParser
.ErrorText
;
302 // success in downloading the index
305 std::clog
<< "Renaming: " << DestFile
<< " -> " << FinalFile
<< std::endl
;
306 Rename(DestFile
,FinalFile
);
307 chmod(FinalFile
.c_str(),0644);
308 DestFile
= FinalFile
;
310 if(ParseIndex(DestFile
) == false)
311 return Failed("", NULL
);
319 bool pkgAcqSubIndex::ParseIndex(string
const &IndexFile
) /*{{{*/
321 indexRecords SubIndexParser
;
322 if (FileExists(IndexFile
) == false || SubIndexParser
.Load(IndexFile
) == false)
324 // so something with the downloaded index
328 // AcqDiffIndex::AcqDiffIndex - Constructor /*{{{*/
329 // ---------------------------------------------------------------------
330 /* Get the DiffIndex file first and see if there are patches available
331 * If so, create a pkgAcqIndexDiffs fetcher that will get and apply the
332 * patches. If anything goes wrong in that process, it will fall back to
333 * the original packages file
335 pkgAcqDiffIndex::pkgAcqDiffIndex(pkgAcquire
*Owner
,
336 string URI
,string URIDesc
,string ShortDesc
,
337 HashString ExpectedHash
)
338 : Item(Owner
), RealURI(URI
), ExpectedHash(ExpectedHash
),
342 Debug
= _config
->FindB("Debug::pkgAcquire::Diffs",false);
344 Desc
.Description
= URIDesc
+ "/DiffIndex";
346 Desc
.ShortDesc
= ShortDesc
;
347 Desc
.URI
= URI
+ ".diff/Index";
349 DestFile
= _config
->FindDir("Dir::State::lists") + "partial/";
350 DestFile
+= URItoFileName(URI
) + string(".DiffIndex");
353 std::clog
<< "pkgAcqDiffIndex: " << Desc
.URI
<< std::endl
;
355 // look for the current package file
356 CurrentPackagesFile
= _config
->FindDir("Dir::State::lists");
357 CurrentPackagesFile
+= URItoFileName(RealURI
);
359 // FIXME: this file:/ check is a hack to prevent fetching
360 // from local sources. this is really silly, and
361 // should be fixed cleanly as soon as possible
362 if(!FileExists(CurrentPackagesFile
) ||
363 Desc
.URI
.substr(0,strlen("file:/")) == "file:/")
365 // we don't have a pkg file or we don't want to queue
367 std::clog
<< "No index file, local or canceld by user" << std::endl
;
373 std::clog
<< "pkgAcqDiffIndex::pkgAcqDiffIndex(): "
374 << CurrentPackagesFile
<< std::endl
;
380 // AcqIndex::Custom600Headers - Insert custom request headers /*{{{*/
381 // ---------------------------------------------------------------------
382 /* The only header we use is the last-modified header. */
383 string
pkgAcqDiffIndex::Custom600Headers()
385 string Final
= _config
->FindDir("Dir::State::lists");
386 Final
+= URItoFileName(RealURI
) + string(".IndexDiff");
389 std::clog
<< "Custom600Header-IMS: " << Final
<< std::endl
;
392 if (stat(Final
.c_str(),&Buf
) != 0)
393 return "\nIndex-File: true";
395 return "\nIndex-File: true\nLast-Modified: " + TimeRFC1123(Buf
.st_mtime
);
398 bool pkgAcqDiffIndex::ParseDiffIndex(string IndexDiffFile
) /*{{{*/
401 std::clog
<< "pkgAcqDiffIndex::ParseIndexDiff() " << IndexDiffFile
406 vector
<DiffInfo
> available_patches
;
408 FileFd
Fd(IndexDiffFile
,FileFd::ReadOnly
);
410 if (_error
->PendingError() == true)
413 if(TF
.Step(Tags
) == true)
419 string
const tmp
= Tags
.FindS("SHA1-Current");
420 std::stringstream
ss(tmp
);
421 ss
>> ServerSha1
>> size
;
422 unsigned long const ServerSize
= atol(size
.c_str());
424 FileFd
fd(CurrentPackagesFile
, FileFd::ReadOnly
);
427 string
const local_sha1
= SHA1
.Result();
429 if(local_sha1
== ServerSha1
)
431 // we have the same sha1 as the server so we are done here
433 std::clog
<< "Package file is up-to-date" << std::endl
;
434 // list cleanup needs to know that this file as well as the already
435 // present index is ours, so we create an empty diff to save it for us
436 new pkgAcqIndexDiffs(Owner
, RealURI
, Description
, Desc
.ShortDesc
,
437 ExpectedHash
, ServerSha1
, available_patches
);
443 std::clog
<< "SHA1-Current: " << ServerSha1
<< " and we start at "<< fd
.Name() << " " << fd
.Size() << " " << local_sha1
<< std::endl
;
445 // check the historie and see what patches we need
446 string
const history
= Tags
.FindS("SHA1-History");
447 std::stringstream
hist(history
);
448 while(hist
>> d
.sha1
>> size
>> d
.file
)
450 // read until the first match is found
451 // from that point on, we probably need all diffs
452 if(d
.sha1
== local_sha1
)
454 else if (found
== false)
458 std::clog
<< "Need to get diff: " << d
.file
<< std::endl
;
459 available_patches
.push_back(d
);
462 if (available_patches
.empty() == false)
464 // patching with too many files is rather slow compared to a fast download
465 unsigned long const fileLimit
= _config
->FindI("Acquire::PDiffs::FileLimit", 0);
466 if (fileLimit
!= 0 && fileLimit
< available_patches
.size())
469 std::clog
<< "Need " << available_patches
.size() << " diffs (Limit is " << fileLimit
470 << ") so fallback to complete download" << std::endl
;
474 // see if the patches are too big
475 found
= false; // it was true and it will be true again at the end
476 d
= *available_patches
.begin();
477 string
const firstPatch
= d
.file
;
478 unsigned long patchesSize
= 0;
479 std::stringstream
patches(Tags
.FindS("SHA1-Patches"));
480 while(patches
>> d
.sha1
>> size
>> d
.file
)
482 if (firstPatch
== d
.file
)
484 else if (found
== false)
487 patchesSize
+= atol(size
.c_str());
489 unsigned long const sizeLimit
= ServerSize
* _config
->FindI("Acquire::PDiffs::SizeLimit", 100);
490 if (sizeLimit
> 0 && (sizeLimit
/100) < patchesSize
)
493 std::clog
<< "Need " << patchesSize
<< " bytes (Limit is " << sizeLimit
/100
494 << ") so fallback to complete download" << std::endl
;
500 // we have something, queue the next diff
504 string::size_type
const last_space
= Description
.rfind(" ");
505 if(last_space
!= string::npos
)
506 Description
.erase(last_space
, Description
.size()-last_space
);
508 /* decide if we should download patches one by one or in one go:
509 The first is good if the server merges patches, but many don't so client
510 based merging can be attempt in which case the second is better.
511 "bad things" will happen if patches are merged on the server,
512 but client side merging is attempt as well */
513 bool pdiff_merge
= _config
->FindB("Acquire::PDiffs::Merge", true);
514 if (pdiff_merge
== true)
516 // reprepro adds this flag if it has merged patches on the server
517 std::string
const precedence
= Tags
.FindS("X-Patch-Precedence");
518 pdiff_merge
= (precedence
!= "merged");
521 if (pdiff_merge
== false)
522 new pkgAcqIndexDiffs(Owner
, RealURI
, Description
, Desc
.ShortDesc
,
523 ExpectedHash
, ServerSha1
, available_patches
);
526 std::vector
<pkgAcqIndexMergeDiffs
*> *diffs
= new std::vector
<pkgAcqIndexMergeDiffs
*>(available_patches
.size());
527 for(size_t i
= 0; i
< available_patches
.size(); ++i
)
528 (*diffs
)[i
] = new pkgAcqIndexMergeDiffs(Owner
, RealURI
, Description
, Desc
.ShortDesc
, ExpectedHash
,
529 available_patches
[i
], diffs
);
539 // Nothing found, report and return false
540 // Failing here is ok, if we return false later, the full
541 // IndexFile is queued
543 std::clog
<< "Can't find a patch in the index file" << std::endl
;
547 void pkgAcqDiffIndex::Failed(string Message
,pkgAcquire::MethodConfig
*Cnf
) /*{{{*/
550 std::clog
<< "pkgAcqDiffIndex failed: " << Desc
.URI
<< std::endl
551 << "Falling back to normal index file acquire" << std::endl
;
553 new pkgAcqIndex(Owner
, RealURI
, Description
, Desc
.ShortDesc
,
561 void pkgAcqDiffIndex::Done(string Message
,unsigned long long Size
,string Md5Hash
, /*{{{*/
562 pkgAcquire::MethodConfig
*Cnf
)
565 std::clog
<< "pkgAcqDiffIndex::Done(): " << Desc
.URI
<< std::endl
;
567 Item::Done(Message
,Size
,Md5Hash
,Cnf
);
570 FinalFile
= _config
->FindDir("Dir::State::lists")+URItoFileName(RealURI
);
572 // success in downloading the index
574 FinalFile
+= string(".IndexDiff");
576 std::clog
<< "Renaming: " << DestFile
<< " -> " << FinalFile
578 Rename(DestFile
,FinalFile
);
579 chmod(FinalFile
.c_str(),0644);
580 DestFile
= FinalFile
;
582 if(!ParseDiffIndex(DestFile
))
583 return Failed("", NULL
);
591 // AcqIndexDiffs::AcqIndexDiffs - Constructor /*{{{*/
592 // ---------------------------------------------------------------------
593 /* The package diff is added to the queue. one object is constructed
594 * for each diff and the index
596 pkgAcqIndexDiffs::pkgAcqIndexDiffs(pkgAcquire
*Owner
,
597 string URI
,string URIDesc
,string ShortDesc
,
598 HashString ExpectedHash
,
600 vector
<DiffInfo
> diffs
)
601 : Item(Owner
), RealURI(URI
), ExpectedHash(ExpectedHash
),
602 available_patches(diffs
), ServerSha1(ServerSha1
)
605 DestFile
= _config
->FindDir("Dir::State::lists") + "partial/";
606 DestFile
+= URItoFileName(URI
);
608 Debug
= _config
->FindB("Debug::pkgAcquire::Diffs",false);
610 Description
= URIDesc
;
612 Desc
.ShortDesc
= ShortDesc
;
614 if(available_patches
.empty() == true)
616 // we are done (yeah!)
622 State
= StateFetchDiff
;
627 void pkgAcqIndexDiffs::Failed(string Message
,pkgAcquire::MethodConfig
*Cnf
) /*{{{*/
630 std::clog
<< "pkgAcqIndexDiffs failed: " << Desc
.URI
<< std::endl
631 << "Falling back to normal index file acquire" << std::endl
;
632 new pkgAcqIndex(Owner
, RealURI
, Description
,Desc
.ShortDesc
,
637 // Finish - helper that cleans the item out of the fetcher queue /*{{{*/
638 void pkgAcqIndexDiffs::Finish(bool allDone
)
640 // we restore the original name, this is required, otherwise
641 // the file will be cleaned
644 DestFile
= _config
->FindDir("Dir::State::lists");
645 DestFile
+= URItoFileName(RealURI
);
647 if(!ExpectedHash
.empty() && !ExpectedHash
.VerifyFile(DestFile
))
649 RenameOnError(HashSumMismatch
);
654 // this is for the "real" finish
659 std::clog
<< "\n\nallDone: " << DestFile
<< "\n" << std::endl
;
664 std::clog
<< "Finishing: " << Desc
.URI
<< std::endl
;
671 bool pkgAcqIndexDiffs::QueueNextDiff() /*{{{*/
674 // calc sha1 of the just patched file
675 string FinalFile
= _config
->FindDir("Dir::State::lists");
676 FinalFile
+= URItoFileName(RealURI
);
678 FileFd
fd(FinalFile
, FileFd::ReadOnly
);
681 string local_sha1
= string(SHA1
.Result());
683 std::clog
<< "QueueNextDiff: "
684 << FinalFile
<< " (" << local_sha1
<< ")"<<std::endl
;
686 // final file reached before all patches are applied
687 if(local_sha1
== ServerSha1
)
693 // remove all patches until the next matching patch is found
694 // this requires the Index file to be ordered
695 for(vector
<DiffInfo
>::iterator I
=available_patches
.begin();
696 available_patches
.empty() == false &&
697 I
!= available_patches
.end() &&
698 I
->sha1
!= local_sha1
;
701 available_patches
.erase(I
);
704 // error checking and falling back if no patch was found
705 if(available_patches
.empty() == true)
711 // queue the right diff
712 Desc
.URI
= string(RealURI
) + ".diff/" + available_patches
[0].file
+ ".gz";
713 Desc
.Description
= Description
+ " " + available_patches
[0].file
+ string(".pdiff");
714 DestFile
= _config
->FindDir("Dir::State::lists") + "partial/";
715 DestFile
+= URItoFileName(RealURI
+ ".diff/" + available_patches
[0].file
);
718 std::clog
<< "pkgAcqIndexDiffs::QueueNextDiff(): " << Desc
.URI
<< std::endl
;
725 void pkgAcqIndexDiffs::Done(string Message
,unsigned long long Size
,string Md5Hash
, /*{{{*/
726 pkgAcquire::MethodConfig
*Cnf
)
729 std::clog
<< "pkgAcqIndexDiffs::Done(): " << Desc
.URI
<< std::endl
;
731 Item::Done(Message
,Size
,Md5Hash
,Cnf
);
734 FinalFile
= _config
->FindDir("Dir::State::lists")+URItoFileName(RealURI
);
736 // success in downloading a diff, enter ApplyDiff state
737 if(State
== StateFetchDiff
)
740 // rred excepts the patch as $FinalFile.ed
741 Rename(DestFile
,FinalFile
+".ed");
744 std::clog
<< "Sending to rred method: " << FinalFile
<< std::endl
;
746 State
= StateApplyDiff
;
748 Desc
.URI
= "rred:" + FinalFile
;
755 // success in download/apply a diff, queue next (if needed)
756 if(State
== StateApplyDiff
)
758 // remove the just applied patch
759 available_patches
.erase(available_patches
.begin());
760 unlink((FinalFile
+ ".ed").c_str());
765 std::clog
<< "Moving patched file in place: " << std::endl
766 << DestFile
<< " -> " << FinalFile
<< std::endl
;
768 Rename(DestFile
,FinalFile
);
769 chmod(FinalFile
.c_str(),0644);
771 // see if there is more to download
772 if(available_patches
.empty() == false) {
773 new pkgAcqIndexDiffs(Owner
, RealURI
, Description
, Desc
.ShortDesc
,
774 ExpectedHash
, ServerSha1
, available_patches
);
781 // AcqIndexMergeDiffs::AcqIndexMergeDiffs - Constructor /*{{{*/
782 pkgAcqIndexMergeDiffs::pkgAcqIndexMergeDiffs(pkgAcquire
*Owner
,
783 string
const &URI
, string
const &URIDesc
,
784 string
const &ShortDesc
, HashString
const &ExpectedHash
,
785 DiffInfo
const &patch
,
786 std::vector
<pkgAcqIndexMergeDiffs
*> const * const allPatches
)
787 : Item(Owner
), RealURI(URI
), ExpectedHash(ExpectedHash
),
788 patch(patch
),allPatches(allPatches
), State(StateFetchDiff
)
791 DestFile
= _config
->FindDir("Dir::State::lists") + "partial/";
792 DestFile
+= URItoFileName(URI
);
794 Debug
= _config
->FindB("Debug::pkgAcquire::Diffs",false);
796 Description
= URIDesc
;
798 Desc
.ShortDesc
= ShortDesc
;
800 Desc
.URI
= string(RealURI
) + ".diff/" + patch
.file
+ ".gz";
801 Desc
.Description
= Description
+ " " + patch
.file
+ string(".pdiff");
802 DestFile
= _config
->FindDir("Dir::State::lists") + "partial/";
803 DestFile
+= URItoFileName(RealURI
+ ".diff/" + patch
.file
);
806 std::clog
<< "pkgAcqIndexMergeDiffs: " << Desc
.URI
<< std::endl
;
811 void pkgAcqIndexMergeDiffs::Failed(string Message
,pkgAcquire::MethodConfig
*Cnf
)/*{{{*/
814 std::clog
<< "pkgAcqIndexMergeDiffs failed: " << Desc
.URI
<< " with " << Message
<< std::endl
;
819 // check if we are the first to fail, otherwise we are done here
820 State
= StateDoneDiff
;
821 for (std::vector
<pkgAcqIndexMergeDiffs
*>::const_iterator I
= allPatches
->begin();
822 I
!= allPatches
->end(); ++I
)
823 if ((*I
)->State
== StateErrorDiff
)
826 // first failure means we should fallback
827 State
= StateErrorDiff
;
828 std::clog
<< "Falling back to normal index file acquire" << std::endl
;
829 new pkgAcqIndex(Owner
, RealURI
, Description
,Desc
.ShortDesc
,
833 void pkgAcqIndexMergeDiffs::Done(string Message
,unsigned long long Size
,string Md5Hash
, /*{{{*/
834 pkgAcquire::MethodConfig
*Cnf
)
837 std::clog
<< "pkgAcqIndexMergeDiffs::Done(): " << Desc
.URI
<< std::endl
;
839 Item::Done(Message
,Size
,Md5Hash
,Cnf
);
841 string
const FinalFile
= _config
->FindDir("Dir::State::lists") + URItoFileName(RealURI
);
843 if (State
== StateFetchDiff
)
845 // rred expects the patch as $FinalFile.ed.$patchname.gz
846 Rename(DestFile
, FinalFile
+ ".ed." + patch
.file
+ ".gz");
848 // check if this is the last completed diff
849 State
= StateDoneDiff
;
850 for (std::vector
<pkgAcqIndexMergeDiffs
*>::const_iterator I
= allPatches
->begin();
851 I
!= allPatches
->end(); ++I
)
852 if ((*I
)->State
!= StateDoneDiff
)
855 std::clog
<< "Not the last done diff in the batch: " << Desc
.URI
<< std::endl
;
859 // this is the last completed diff, so we are ready to apply now
860 State
= StateApplyDiff
;
863 std::clog
<< "Sending to rred method: " << FinalFile
<< std::endl
;
866 Desc
.URI
= "rred:" + FinalFile
;
871 // success in download/apply all diffs, clean up
872 else if (State
== StateApplyDiff
)
874 // see if we really got the expected file
875 if(!ExpectedHash
.empty() && !ExpectedHash
.VerifyFile(DestFile
))
877 RenameOnError(HashSumMismatch
);
881 // move the result into place
883 std::clog
<< "Moving patched file in place: " << std::endl
884 << DestFile
<< " -> " << FinalFile
<< std::endl
;
885 Rename(DestFile
, FinalFile
);
886 chmod(FinalFile
.c_str(), 0644);
888 // otherwise lists cleanup will eat the file
889 DestFile
= FinalFile
;
891 // ensure the ed's are gone regardless of list-cleanup
892 for (std::vector
<pkgAcqIndexMergeDiffs
*>::const_iterator I
= allPatches
->begin();
893 I
!= allPatches
->end(); ++I
)
895 std::string patch
= FinalFile
+ ".ed." + (*I
)->patch
.file
+ ".gz";
896 unlink(patch
.c_str());
902 std::clog
<< "allDone: " << DestFile
<< "\n" << std::endl
;
906 // AcqIndex::AcqIndex - Constructor /*{{{*/
907 // ---------------------------------------------------------------------
908 /* The package file is added to the queue and a second class is
909 instantiated to fetch the revision file */
910 pkgAcqIndex::pkgAcqIndex(pkgAcquire
*Owner
,
911 string URI
,string URIDesc
,string ShortDesc
,
912 HashString ExpectedHash
, string comprExt
)
913 : Item(Owner
), RealURI(URI
), ExpectedHash(ExpectedHash
)
915 if(comprExt
.empty() == true)
917 // autoselect the compression method
918 std::vector
<std::string
> types
= APT::Configuration::getCompressionTypes();
919 for (std::vector
<std::string
>::const_iterator t
= types
.begin(); t
!= types
.end(); ++t
)
920 comprExt
.append(*t
).append(" ");
921 if (comprExt
.empty() == false)
922 comprExt
.erase(comprExt
.end()-1);
924 CompressionExtension
= comprExt
;
926 Init(URI
, URIDesc
, ShortDesc
);
928 pkgAcqIndex::pkgAcqIndex(pkgAcquire
*Owner
, IndexTarget
const *Target
,
929 HashString
const &ExpectedHash
, indexRecords
const *MetaIndexParser
)
930 : Item(Owner
), RealURI(Target
->URI
), ExpectedHash(ExpectedHash
)
932 // autoselect the compression method
933 std::vector
<std::string
> types
= APT::Configuration::getCompressionTypes();
934 CompressionExtension
= "";
935 if (ExpectedHash
.empty() == false)
937 for (std::vector
<std::string
>::const_iterator t
= types
.begin(); t
!= types
.end(); ++t
)
938 if (*t
== "uncompressed" || MetaIndexParser
->Exists(string(Target
->MetaKey
).append(".").append(*t
)) == true)
939 CompressionExtension
.append(*t
).append(" ");
943 for (std::vector
<std::string
>::const_iterator t
= types
.begin(); t
!= types
.end(); ++t
)
944 CompressionExtension
.append(*t
).append(" ");
946 if (CompressionExtension
.empty() == false)
947 CompressionExtension
.erase(CompressionExtension
.end()-1);
949 // only verify non-optional targets, see acquire-item.h for a FIXME
950 // to make this more flexible
951 if (Target
->IsOptional())
956 Init(Target
->URI
, Target
->Description
, Target
->ShortDesc
);
959 // AcqIndex::Init - defered Constructor /*{{{*/
960 void pkgAcqIndex::Init(string
const &URI
, string
const &URIDesc
, string
const &ShortDesc
) {
961 Decompression
= false;
964 DestFile
= _config
->FindDir("Dir::State::lists") + "partial/";
965 DestFile
+= URItoFileName(URI
);
967 std::string
const comprExt
= CompressionExtension
.substr(0, CompressionExtension
.find(' '));
968 if (comprExt
== "uncompressed")
971 Desc
.URI
= URI
+ '.' + comprExt
;
973 Desc
.Description
= URIDesc
;
975 Desc
.ShortDesc
= ShortDesc
;
980 // AcqIndex::Custom600Headers - Insert custom request headers /*{{{*/
981 // ---------------------------------------------------------------------
982 /* The only header we use is the last-modified header. */
983 string
pkgAcqIndex::Custom600Headers()
985 string Final
= _config
->FindDir("Dir::State::lists");
986 Final
+= URItoFileName(RealURI
);
987 if (_config
->FindB("Acquire::GzipIndexes",false))
990 string msg
= "\nIndex-File: true";
991 // FIXME: this really should use "IndexTarget::IsOptional()" but that
992 // seems to be difficult without breaking ABI
993 if (ShortDesc().find("Translation") != 0)
994 msg
+= "\nFail-Ignore: true";
996 if (stat(Final
.c_str(),&Buf
) == 0)
997 msg
+= "\nLast-Modified: " + TimeRFC1123(Buf
.st_mtime
);
1002 void pkgAcqIndex::Failed(string Message
,pkgAcquire::MethodConfig
*Cnf
) /*{{{*/
1004 size_t const nextExt
= CompressionExtension
.find(' ');
1005 if (nextExt
!= std::string::npos
)
1007 CompressionExtension
= CompressionExtension
.substr(nextExt
+1);
1008 Init(RealURI
, Desc
.Description
, Desc
.ShortDesc
);
1012 // on decompression failure, remove bad versions in partial/
1013 if (Decompression
&& Erase
) {
1014 string s
= _config
->FindDir("Dir::State::lists") + "partial/";
1015 s
.append(URItoFileName(RealURI
));
1019 Item::Failed(Message
,Cnf
);
1022 // AcqIndex::Done - Finished a fetch /*{{{*/
1023 // ---------------------------------------------------------------------
1024 /* This goes through a number of states.. On the initial fetch the
1025 method could possibly return an alternate filename which points
1026 to the uncompressed version of the file. If this is so the file
1027 is copied into the partial directory. In all other cases the file
1028 is decompressed with a gzip uri. */
1029 void pkgAcqIndex::Done(string Message
,unsigned long long Size
,string Hash
,
1030 pkgAcquire::MethodConfig
*Cfg
)
1032 Item::Done(Message
,Size
,Hash
,Cfg
);
1034 if (Decompression
== true)
1036 if (_config
->FindB("Debug::pkgAcquire::Auth", false))
1038 std::cerr
<< std::endl
<< RealURI
<< ": Computed Hash: " << Hash
;
1039 std::cerr
<< " Expected Hash: " << ExpectedHash
.toStr() << std::endl
;
1042 if (!ExpectedHash
.empty() && ExpectedHash
.toStr() != Hash
)
1044 RenameOnError(HashSumMismatch
);
1048 /* Verify the index file for correctness (all indexes must
1049 * have a Package field) (LP: #346386) (Closes: #627642) */
1052 FileFd
fd(DestFile
, FileFd::ReadOnly
);
1053 // Only test for correctness if the file is not empty (empty is ok)
1054 if (fd
.FileSize() > 0)
1057 pkgTagFile
tag(&fd
);
1059 // all our current indexes have a field 'Package' in each section
1060 if (_error
->PendingError() == true || tag
.Step(sec
) == false || sec
.Exists("Package") == false)
1062 RenameOnError(InvalidFormat
);
1068 // Done, move it into position
1069 string FinalFile
= _config
->FindDir("Dir::State::lists");
1070 FinalFile
+= URItoFileName(RealURI
);
1071 Rename(DestFile
,FinalFile
);
1072 chmod(FinalFile
.c_str(),0644);
1074 /* We restore the original name to DestFile so that the clean operation
1076 DestFile
= _config
->FindDir("Dir::State::lists") + "partial/";
1077 DestFile
+= URItoFileName(RealURI
);
1079 // Remove the compressed version.
1081 unlink(DestFile
.c_str());
1088 // Handle the unzipd case
1089 string FileName
= LookupTag(Message
,"Alt-Filename");
1090 if (FileName
.empty() == false)
1092 // The files timestamp matches
1093 if (StringToBool(LookupTag(Message
,"Alt-IMS-Hit"),false) == true)
1095 Decompression
= true;
1097 DestFile
+= ".decomp";
1098 Desc
.URI
= "copy:" + FileName
;
1104 FileName
= LookupTag(Message
,"Filename");
1105 if (FileName
.empty() == true)
1108 ErrorText
= "Method gave a blank filename";
1111 std::string
const compExt
= CompressionExtension
.substr(0, CompressionExtension
.find(' '));
1113 // The files timestamp matches
1114 if (StringToBool(LookupTag(Message
,"IMS-Hit"),false) == true) {
1115 if (_config
->FindB("Acquire::GzipIndexes",false) && compExt
== "gz")
1116 // Update DestFile for .gz suffix so that the clean operation keeps it
1121 if (FileName
== DestFile
)
1128 // If we enable compressed indexes and already have gzip, keep it
1129 if (_config
->FindB("Acquire::GzipIndexes",false) && compExt
== "gz" && !Local
) {
1130 string FinalFile
= _config
->FindDir("Dir::State::lists");
1131 FinalFile
+= URItoFileName(RealURI
) + ".gz";
1132 Rename(DestFile
,FinalFile
);
1133 chmod(FinalFile
.c_str(),0644);
1135 // Update DestFile for .gz suffix so that the clean operation keeps it
1136 DestFile
= _config
->FindDir("Dir::State::lists") + "partial/";
1137 DestFile
+= URItoFileName(RealURI
) + ".gz";
1141 // get the binary name for your used compression type
1142 decompProg
= _config
->Find(string("Acquire::CompressionTypes::").append(compExt
),"");
1143 if(decompProg
.empty() == false);
1144 else if(compExt
== "uncompressed")
1145 decompProg
= "copy";
1147 _error
->Error("Unsupported extension: %s", compExt
.c_str());
1151 Decompression
= true;
1152 DestFile
+= ".decomp";
1153 Desc
.URI
= decompProg
+ ":" + FileName
;
1156 // FIXME: this points to a c++ string that goes out of scope
1157 Mode
= decompProg
.c_str();
1160 // AcqIndexTrans::pkgAcqIndexTrans - Constructor /*{{{*/
1161 // ---------------------------------------------------------------------
1162 /* The Translation file is added to the queue */
1163 pkgAcqIndexTrans::pkgAcqIndexTrans(pkgAcquire
*Owner
,
1164 string URI
,string URIDesc
,string ShortDesc
)
1165 : pkgAcqIndex(Owner
, URI
, URIDesc
, ShortDesc
, HashString(), "")
1168 pkgAcqIndexTrans::pkgAcqIndexTrans(pkgAcquire
*Owner
, IndexTarget
const *Target
,
1169 HashString
const &ExpectedHash
, indexRecords
const *MetaIndexParser
)
1170 : pkgAcqIndex(Owner
, Target
, ExpectedHash
, MetaIndexParser
)
1174 // AcqIndexTrans::Custom600Headers - Insert custom request headers /*{{{*/
1175 // ---------------------------------------------------------------------
1176 string
pkgAcqIndexTrans::Custom600Headers()
1178 string Final
= _config
->FindDir("Dir::State::lists");
1179 Final
+= URItoFileName(RealURI
);
1182 if (stat(Final
.c_str(),&Buf
) != 0)
1183 return "\nFail-Ignore: true\nIndex-File: true";
1184 return "\nFail-Ignore: true\nIndex-File: true\nLast-Modified: " + TimeRFC1123(Buf
.st_mtime
);
1187 // AcqIndexTrans::Failed - Silence failure messages for missing files /*{{{*/
1188 // ---------------------------------------------------------------------
1190 void pkgAcqIndexTrans::Failed(string Message
,pkgAcquire::MethodConfig
*Cnf
)
1192 size_t const nextExt
= CompressionExtension
.find(' ');
1193 if (nextExt
!= std::string::npos
)
1195 CompressionExtension
= CompressionExtension
.substr(nextExt
+1);
1196 Init(RealURI
, Desc
.Description
, Desc
.ShortDesc
);
1201 if (Cnf
->LocalOnly
== true ||
1202 StringToBool(LookupTag(Message
,"Transient-Failure"),false) == false)
1211 Item::Failed(Message
,Cnf
);
1214 pkgAcqMetaSig::pkgAcqMetaSig(pkgAcquire
*Owner
, /*{{{*/
1215 string URI
,string URIDesc
,string ShortDesc
,
1216 string MetaIndexURI
, string MetaIndexURIDesc
,
1217 string MetaIndexShortDesc
,
1218 const vector
<IndexTarget
*>* IndexTargets
,
1219 indexRecords
* MetaIndexParser
) :
1220 Item(Owner
), RealURI(URI
), MetaIndexURI(MetaIndexURI
),
1221 MetaIndexURIDesc(MetaIndexURIDesc
), MetaIndexShortDesc(MetaIndexShortDesc
),
1222 MetaIndexParser(MetaIndexParser
), IndexTargets(IndexTargets
)
1224 DestFile
= _config
->FindDir("Dir::State::lists") + "partial/";
1225 DestFile
+= URItoFileName(URI
);
1227 // remove any partial downloaded sig-file in partial/.
1228 // it may confuse proxies and is too small to warrant a
1229 // partial download anyway
1230 unlink(DestFile
.c_str());
1233 Desc
.Description
= URIDesc
;
1235 Desc
.ShortDesc
= ShortDesc
;
1238 string Final
= _config
->FindDir("Dir::State::lists");
1239 Final
+= URItoFileName(RealURI
);
1240 if (RealFileExists(Final
) == true)
1242 // File was already in place. It needs to be re-downloaded/verified
1243 // because Release might have changed, we do give it a different
1244 // name than DestFile because otherwise the http method will
1245 // send If-Range requests and there are too many broken servers
1246 // out there that do not understand them
1247 LastGoodSig
= DestFile
+".reverify";
1248 Rename(Final
,LastGoodSig
);
1254 pkgAcqMetaSig::~pkgAcqMetaSig() /*{{{*/
1256 // if the file was never queued undo file-changes done in the constructor
1257 if (QueueCounter
== 1 && Status
== StatIdle
&& FileSize
== 0 && Complete
== false &&
1258 LastGoodSig
.empty() == false)
1260 string
const Final
= _config
->FindDir("Dir::State::lists") + URItoFileName(RealURI
);
1261 if (RealFileExists(Final
) == false && RealFileExists(LastGoodSig
) == true)
1262 Rename(LastGoodSig
, Final
);
1267 // pkgAcqMetaSig::Custom600Headers - Insert custom request headers /*{{{*/
1268 // ---------------------------------------------------------------------
1269 /* The only header we use is the last-modified header. */
1270 string
pkgAcqMetaSig::Custom600Headers()
1273 if (stat(LastGoodSig
.c_str(),&Buf
) != 0)
1274 return "\nIndex-File: true";
1276 return "\nIndex-File: true\nLast-Modified: " + TimeRFC1123(Buf
.st_mtime
);
1279 void pkgAcqMetaSig::Done(string Message
,unsigned long long Size
,string MD5
,
1280 pkgAcquire::MethodConfig
*Cfg
)
1282 Item::Done(Message
,Size
,MD5
,Cfg
);
1284 string FileName
= LookupTag(Message
,"Filename");
1285 if (FileName
.empty() == true)
1288 ErrorText
= "Method gave a blank filename";
1292 if (FileName
!= DestFile
)
1294 // We have to copy it into place
1296 Desc
.URI
= "copy:" + FileName
;
1303 // put the last known good file back on i-m-s hit (it will
1304 // be re-verified again)
1305 // Else do nothing, we have the new file in DestFile then
1306 if(StringToBool(LookupTag(Message
,"IMS-Hit"),false) == true)
1307 Rename(LastGoodSig
, DestFile
);
1309 // queue a pkgAcqMetaIndex to be verified against the sig we just retrieved
1310 new pkgAcqMetaIndex(Owner
, MetaIndexURI
, MetaIndexURIDesc
,
1311 MetaIndexShortDesc
, DestFile
, IndexTargets
,
1316 void pkgAcqMetaSig::Failed(string Message
,pkgAcquire::MethodConfig
*Cnf
)/*{{{*/
1318 string Final
= _config
->FindDir("Dir::State::lists") + URItoFileName(RealURI
);
1320 // if we get a network error we fail gracefully
1321 if(Status
== StatTransientNetworkError
)
1323 Item::Failed(Message
,Cnf
);
1324 // move the sigfile back on transient network failures
1325 if(FileExists(LastGoodSig
))
1326 Rename(LastGoodSig
,Final
);
1328 // set the status back to , Item::Failed likes to reset it
1329 Status
= pkgAcquire::Item::StatTransientNetworkError
;
1333 // Delete any existing sigfile when the acquire failed
1334 unlink(Final
.c_str());
1336 // queue a pkgAcqMetaIndex with no sigfile
1337 new pkgAcqMetaIndex(Owner
, MetaIndexURI
, MetaIndexURIDesc
, MetaIndexShortDesc
,
1338 "", IndexTargets
, MetaIndexParser
);
1340 if (Cnf
->LocalOnly
== true ||
1341 StringToBool(LookupTag(Message
,"Transient-Failure"),false) == false)
1350 Item::Failed(Message
,Cnf
);
1353 pkgAcqMetaIndex::pkgAcqMetaIndex(pkgAcquire
*Owner
, /*{{{*/
1354 string URI
,string URIDesc
,string ShortDesc
,
1356 const vector
<struct IndexTarget
*>* IndexTargets
,
1357 indexRecords
* MetaIndexParser
) :
1358 Item(Owner
), RealURI(URI
), SigFile(SigFile
), IndexTargets(IndexTargets
),
1359 MetaIndexParser(MetaIndexParser
), AuthPass(false), IMSHit(false)
1361 DestFile
= _config
->FindDir("Dir::State::lists") + "partial/";
1362 DestFile
+= URItoFileName(URI
);
1365 Desc
.Description
= URIDesc
;
1367 Desc
.ShortDesc
= ShortDesc
;
1373 // pkgAcqMetaIndex::Custom600Headers - Insert custom request headers /*{{{*/
1374 // ---------------------------------------------------------------------
1375 /* The only header we use is the last-modified header. */
1376 string
pkgAcqMetaIndex::Custom600Headers()
1378 string Final
= _config
->FindDir("Dir::State::lists");
1379 Final
+= URItoFileName(RealURI
);
1382 if (stat(Final
.c_str(),&Buf
) != 0)
1383 return "\nIndex-File: true";
1385 return "\nIndex-File: true\nLast-Modified: " + TimeRFC1123(Buf
.st_mtime
);
1388 void pkgAcqMetaIndex::Done(string Message
,unsigned long long Size
,string Hash
, /*{{{*/
1389 pkgAcquire::MethodConfig
*Cfg
)
1391 Item::Done(Message
,Size
,Hash
,Cfg
);
1393 // MetaIndexes are done in two passes: one to download the
1394 // metaindex with an appropriate method, and a second to verify it
1395 // with the gpgv method
1397 if (AuthPass
== true)
1401 // all cool, move Release file into place
1406 RetrievalDone(Message
);
1408 // Still more retrieving to do
1413 // There was no signature file, so we are finished. Download
1414 // the indexes and do only hashsum verification if possible
1415 MetaIndexParser
->Load(DestFile
);
1416 QueueIndexes(false);
1420 // There was a signature file, so pass it to gpgv for
1423 if (_config
->FindB("Debug::pkgAcquire::Auth", false))
1424 std::cerr
<< "Metaindex acquired, queueing gpg verification ("
1425 << SigFile
<< "," << DestFile
<< ")\n";
1427 Desc
.URI
= "gpgv:" + SigFile
;
1434 if (Complete
== true)
1436 string FinalFile
= _config
->FindDir("Dir::State::lists");
1437 FinalFile
+= URItoFileName(RealURI
);
1438 if (SigFile
== DestFile
)
1439 SigFile
= FinalFile
;
1440 Rename(DestFile
,FinalFile
);
1441 chmod(FinalFile
.c_str(),0644);
1442 DestFile
= FinalFile
;
1446 void pkgAcqMetaIndex::RetrievalDone(string Message
) /*{{{*/
1448 // We have just finished downloading a Release file (it is not
1451 string FileName
= LookupTag(Message
,"Filename");
1452 if (FileName
.empty() == true)
1455 ErrorText
= "Method gave a blank filename";
1459 if (FileName
!= DestFile
)
1462 Desc
.URI
= "copy:" + FileName
;
1467 // make sure to verify against the right file on I-M-S hit
1468 IMSHit
= StringToBool(LookupTag(Message
,"IMS-Hit"),false);
1471 string FinalFile
= _config
->FindDir("Dir::State::lists");
1472 FinalFile
+= URItoFileName(RealURI
);
1473 if (SigFile
== DestFile
)
1475 SigFile
= FinalFile
;
1476 // constructor of pkgAcqMetaClearSig moved it out of the way,
1477 // now move it back in on IMS hit for the 'old' file
1478 string
const OldClearSig
= DestFile
+ ".reverify";
1479 if (RealFileExists(OldClearSig
) == true)
1480 Rename(OldClearSig
, FinalFile
);
1482 DestFile
= FinalFile
;
1487 void pkgAcqMetaIndex::AuthDone(string Message
) /*{{{*/
1489 // At this point, the gpgv method has succeeded, so there is a
1490 // valid signature from a key in the trusted keyring. We
1491 // perform additional verification of its contents, and use them
1492 // to verify the indexes we are about to download
1494 if (!MetaIndexParser
->Load(DestFile
))
1496 Status
= StatAuthError
;
1497 ErrorText
= MetaIndexParser
->ErrorText
;
1501 if (!VerifyVendor(Message
))
1506 if (_config
->FindB("Debug::pkgAcquire::Auth", false))
1507 std::cerr
<< "Signature verification succeeded: "
1508 << DestFile
<< std::endl
;
1510 // Download further indexes with verification
1513 // is it a clearsigned MetaIndex file?
1514 if (DestFile
== SigFile
)
1517 // Done, move signature file into position
1518 string VerifiedSigFile
= _config
->FindDir("Dir::State::lists") +
1519 URItoFileName(RealURI
) + ".gpg";
1520 Rename(SigFile
,VerifiedSigFile
);
1521 chmod(VerifiedSigFile
.c_str(),0644);
1524 void pkgAcqMetaIndex::QueueIndexes(bool verify
) /*{{{*/
1527 /* Reject invalid, existing Release files (LP: #346386) (Closes: #627642)
1528 * FIXME: Disabled; it breaks unsigned repositories without hashes */
1529 if (!verify
&& FileExists(DestFile
) && !MetaIndexParser
->Load(DestFile
))
1532 ErrorText
= MetaIndexParser
->ErrorText
;
1536 bool transInRelease
= false;
1538 std::vector
<std::string
> const keys
= MetaIndexParser
->MetaKeys();
1539 for (std::vector
<std::string
>::const_iterator k
= keys
.begin(); k
!= keys
.end(); ++k
)
1540 // FIXME: Feels wrong to check for hardcoded string here, but what should we do else…
1541 if (k
->find("Translation-") != std::string::npos
)
1543 transInRelease
= true;
1548 for (vector
<struct IndexTarget
*>::const_iterator Target
= IndexTargets
->begin();
1549 Target
!= IndexTargets
->end();
1552 HashString ExpectedIndexHash
;
1553 const indexRecords::checkSum
*Record
= MetaIndexParser
->Lookup((*Target
)->MetaKey
);
1554 bool compressedAvailable
= false;
1557 if ((*Target
)->IsOptional() == true)
1559 std::vector
<std::string
> types
= APT::Configuration::getCompressionTypes();
1560 for (std::vector
<std::string
>::const_iterator t
= types
.begin(); t
!= types
.end(); ++t
)
1561 if (MetaIndexParser
->Exists(string((*Target
)->MetaKey
).append(".").append(*t
)) == true)
1563 compressedAvailable
= true;
1567 else if (verify
== true)
1569 Status
= StatAuthError
;
1570 strprintf(ErrorText
, _("Unable to find expected entry '%s' in Release file (Wrong sources.list entry or malformed file)"), (*Target
)->MetaKey
.c_str());
1576 ExpectedIndexHash
= Record
->Hash
;
1577 if (_config
->FindB("Debug::pkgAcquire::Auth", false))
1579 std::cerr
<< "Queueing: " << (*Target
)->URI
<< std::endl
;
1580 std::cerr
<< "Expected Hash: " << ExpectedIndexHash
.toStr() << std::endl
;
1581 std::cerr
<< "For: " << Record
->MetaKeyFilename
<< std::endl
;
1583 if (verify
== true && ExpectedIndexHash
.empty() == true && (*Target
)->IsOptional() == false)
1585 Status
= StatAuthError
;
1586 strprintf(ErrorText
, _("Unable to find hash sum for '%s' in Release file"), (*Target
)->MetaKey
.c_str());
1591 if ((*Target
)->IsOptional() == true)
1593 if ((*Target
)->IsSubIndex() == true)
1594 new pkgAcqSubIndex(Owner
, (*Target
)->URI
, (*Target
)->Description
,
1595 (*Target
)->ShortDesc
, ExpectedIndexHash
);
1596 else if (transInRelease
== false || Record
!= NULL
|| compressedAvailable
== true)
1598 if (_config
->FindB("Acquire::PDiffs",true) == true && transInRelease
== true &&
1599 MetaIndexParser
->Exists(string((*Target
)->MetaKey
).append(".diff/Index")) == true)
1600 new pkgAcqDiffIndex(Owner
, (*Target
)->URI
, (*Target
)->Description
,
1601 (*Target
)->ShortDesc
, ExpectedIndexHash
);
1603 new pkgAcqIndexTrans(Owner
, *Target
, ExpectedIndexHash
, MetaIndexParser
);
1608 /* Queue Packages file (either diff or full packages files, depending
1609 on the users option) - we also check if the PDiff Index file is listed
1610 in the Meta-Index file. Ideal would be if pkgAcqDiffIndex would test this
1611 instead, but passing the required info to it is to much hassle */
1612 if(_config
->FindB("Acquire::PDiffs",true) == true && (verify
== false ||
1613 MetaIndexParser
->Exists(string((*Target
)->MetaKey
).append(".diff/Index")) == true))
1614 new pkgAcqDiffIndex(Owner
, (*Target
)->URI
, (*Target
)->Description
,
1615 (*Target
)->ShortDesc
, ExpectedIndexHash
);
1617 new pkgAcqIndex(Owner
, *Target
, ExpectedIndexHash
, MetaIndexParser
);
1621 bool pkgAcqMetaIndex::VerifyVendor(string Message
) /*{{{*/
1623 string::size_type pos
;
1625 // check for missing sigs (that where not fatal because otherwise we had
1628 string msg
= _("There is no public key available for the "
1629 "following key IDs:\n");
1630 pos
= Message
.find("NO_PUBKEY ");
1631 if (pos
!= std::string::npos
)
1633 string::size_type start
= pos
+strlen("NO_PUBKEY ");
1634 string Fingerprint
= Message
.substr(start
, Message
.find("\n")-start
);
1635 missingkeys
+= (Fingerprint
);
1637 if(!missingkeys
.empty())
1638 _error
->Warning("%s", string(msg
+missingkeys
).c_str());
1640 string Transformed
= MetaIndexParser
->GetExpectedDist();
1642 if (Transformed
== "../project/experimental")
1644 Transformed
= "experimental";
1647 pos
= Transformed
.rfind('/');
1648 if (pos
!= string::npos
)
1650 Transformed
= Transformed
.substr(0, pos
);
1653 if (Transformed
== ".")
1658 if (_config
->FindB("Acquire::Check-Valid-Until", true) == true &&
1659 MetaIndexParser
->GetValidUntil() > 0) {
1660 time_t const invalid_since
= time(NULL
) - MetaIndexParser
->GetValidUntil();
1661 if (invalid_since
> 0)
1662 // TRANSLATOR: The first %s is the URL of the bad Release file, the second is
1663 // the time since then the file is invalid - formated in the same way as in
1664 // the download progress display (e.g. 7d 3h 42min 1s)
1665 return _error
->Error(
1666 _("Release file for %s is expired (invalid since %s). "
1667 "Updates for this repository will not be applied."),
1668 RealURI
.c_str(), TimeToStr(invalid_since
).c_str());
1671 if (_config
->FindB("Debug::pkgAcquire::Auth", false))
1673 std::cerr
<< "Got Codename: " << MetaIndexParser
->GetDist() << std::endl
;
1674 std::cerr
<< "Expecting Dist: " << MetaIndexParser
->GetExpectedDist() << std::endl
;
1675 std::cerr
<< "Transformed Dist: " << Transformed
<< std::endl
;
1678 if (MetaIndexParser
->CheckDist(Transformed
) == false)
1680 // This might become fatal one day
1681 // Status = StatAuthError;
1682 // ErrorText = "Conflicting distribution; expected "
1683 // + MetaIndexParser->GetExpectedDist() + " but got "
1684 // + MetaIndexParser->GetDist();
1686 if (!Transformed
.empty())
1688 _error
->Warning(_("Conflicting distribution: %s (expected %s but got %s)"),
1689 Desc
.Description
.c_str(),
1690 Transformed
.c_str(),
1691 MetaIndexParser
->GetDist().c_str());
1698 // pkgAcqMetaIndex::Failed - no Release file present or no signature file present /*{{{*/
1699 // ---------------------------------------------------------------------
1701 void pkgAcqMetaIndex::Failed(string Message
,pkgAcquire::MethodConfig
*Cnf
)
1703 if (AuthPass
== true)
1705 // gpgv method failed, if we have a good signature
1706 string LastGoodSigFile
= _config
->FindDir("Dir::State::lists").append("partial/").append(URItoFileName(RealURI
));
1707 if (DestFile
!= SigFile
)
1708 LastGoodSigFile
.append(".gpg");
1709 LastGoodSigFile
.append(".reverify");
1711 if(FileExists(LastGoodSigFile
))
1713 string VerifiedSigFile
= _config
->FindDir("Dir::State::lists") + URItoFileName(RealURI
);
1714 if (DestFile
!= SigFile
)
1715 VerifiedSigFile
.append(".gpg");
1716 Rename(LastGoodSigFile
, VerifiedSigFile
);
1717 Status
= StatTransientNetworkError
;
1718 _error
->Warning(_("An error occurred during the signature "
1719 "verification. The repository is not updated "
1720 "and the previous index files will be used. "
1721 "GPG error: %s: %s\n"),
1722 Desc
.Description
.c_str(),
1723 LookupTag(Message
,"Message").c_str());
1724 RunScripts("APT::Update::Auth-Failure");
1726 } else if (LookupTag(Message
,"Message").find("NODATA") != string::npos
) {
1727 /* Invalid signature file, reject (LP: #346386) (Closes: #627642) */
1728 _error
->Error(_("GPG error: %s: %s"),
1729 Desc
.Description
.c_str(),
1730 LookupTag(Message
,"Message").c_str());
1733 _error
->Warning(_("GPG error: %s: %s"),
1734 Desc
.Description
.c_str(),
1735 LookupTag(Message
,"Message").c_str());
1737 // gpgv method failed
1738 ReportMirrorFailure("GPGFailure");
1741 /* Always move the meta index, even if gpgv failed. This ensures
1742 * that PackageFile objects are correctly filled in */
1743 if (FileExists(DestFile
)) {
1744 string FinalFile
= _config
->FindDir("Dir::State::lists");
1745 FinalFile
+= URItoFileName(RealURI
);
1746 /* InRelease files become Release files, otherwise
1747 * they would be considered as trusted later on */
1748 if (SigFile
== DestFile
) {
1749 RealURI
= RealURI
.replace(RealURI
.rfind("InRelease"), 9,
1751 FinalFile
= FinalFile
.replace(FinalFile
.rfind("InRelease"), 9,
1753 SigFile
= FinalFile
;
1755 Rename(DestFile
,FinalFile
);
1756 chmod(FinalFile
.c_str(),0644);
1758 DestFile
= FinalFile
;
1761 // No Release file was present, or verification failed, so fall
1762 // back to queueing Packages files without verification
1763 QueueIndexes(false);
1766 pkgAcqMetaClearSig::pkgAcqMetaClearSig(pkgAcquire
*Owner
, /*{{{*/
1767 string
const &URI
, string
const &URIDesc
, string
const &ShortDesc
,
1768 string
const &MetaIndexURI
, string
const &MetaIndexURIDesc
, string
const &MetaIndexShortDesc
,
1769 string
const &MetaSigURI
, string
const &MetaSigURIDesc
, string
const &MetaSigShortDesc
,
1770 const vector
<struct IndexTarget
*>* IndexTargets
,
1771 indexRecords
* MetaIndexParser
) :
1772 pkgAcqMetaIndex(Owner
, URI
, URIDesc
, ShortDesc
, "", IndexTargets
, MetaIndexParser
),
1773 MetaIndexURI(MetaIndexURI
), MetaIndexURIDesc(MetaIndexURIDesc
), MetaIndexShortDesc(MetaIndexShortDesc
),
1774 MetaSigURI(MetaSigURI
), MetaSigURIDesc(MetaSigURIDesc
), MetaSigShortDesc(MetaSigShortDesc
)
1778 // keep the old InRelease around in case of transistent network errors
1779 string
const Final
= _config
->FindDir("Dir::State::lists") + URItoFileName(RealURI
);
1780 if (RealFileExists(Final
) == true)
1782 string
const LastGoodSig
= DestFile
+ ".reverify";
1783 Rename(Final
,LastGoodSig
);
1787 pkgAcqMetaClearSig::~pkgAcqMetaClearSig() /*{{{*/
1789 // if the file was never queued undo file-changes done in the constructor
1790 if (QueueCounter
== 1 && Status
== StatIdle
&& FileSize
== 0 && Complete
== false)
1792 string
const Final
= _config
->FindDir("Dir::State::lists") + URItoFileName(RealURI
);
1793 string
const LastGoodSig
= DestFile
+ ".reverify";
1794 if (RealFileExists(Final
) == false && RealFileExists(LastGoodSig
) == true)
1795 Rename(LastGoodSig
, Final
);
1799 // pkgAcqMetaClearSig::Custom600Headers - Insert custom request headers /*{{{*/
1800 // ---------------------------------------------------------------------
1801 // FIXME: this can go away once the InRelease file is used widely
1802 string
pkgAcqMetaClearSig::Custom600Headers()
1804 string Final
= _config
->FindDir("Dir::State::lists");
1805 Final
+= URItoFileName(RealURI
);
1808 if (stat(Final
.c_str(),&Buf
) != 0)
1810 Final
= DestFile
+ ".reverify";
1811 if (stat(Final
.c_str(),&Buf
) != 0)
1812 return "\nIndex-File: true\nFail-Ignore: true\n";
1815 return "\nIndex-File: true\nFail-Ignore: true\nLast-Modified: " + TimeRFC1123(Buf
.st_mtime
);
1818 void pkgAcqMetaClearSig::Failed(string Message
,pkgAcquire::MethodConfig
*Cnf
) /*{{{*/
1820 if (AuthPass
== false)
1822 // Remove the 'old' InRelease file if we try Release.gpg now as otherwise
1823 // the file will stay around and gives a false-auth impression (CVE-2012-0214)
1824 string FinalFile
= _config
->FindDir("Dir::State::lists");
1825 FinalFile
.append(URItoFileName(RealURI
));
1826 if (FileExists(FinalFile
))
1827 unlink(FinalFile
.c_str());
1829 new pkgAcqMetaSig(Owner
,
1830 MetaSigURI
, MetaSigURIDesc
, MetaSigShortDesc
,
1831 MetaIndexURI
, MetaIndexURIDesc
, MetaIndexShortDesc
,
1832 IndexTargets
, MetaIndexParser
);
1833 if (Cnf
->LocalOnly
== true ||
1834 StringToBool(LookupTag(Message
, "Transient-Failure"), false) == false)
1838 pkgAcqMetaIndex::Failed(Message
, Cnf
);
1841 // AcqArchive::AcqArchive - Constructor /*{{{*/
1842 // ---------------------------------------------------------------------
1843 /* This just sets up the initial fetch environment and queues the first
1845 pkgAcqArchive::pkgAcqArchive(pkgAcquire
*Owner
,pkgSourceList
*Sources
,
1846 pkgRecords
*Recs
,pkgCache::VerIterator
const &Version
,
1847 string
&StoreFilename
) :
1848 Item(Owner
), Version(Version
), Sources(Sources
), Recs(Recs
),
1849 StoreFilename(StoreFilename
), Vf(Version
.FileList()),
1852 Retries
= _config
->FindI("Acquire::Retries",0);
1854 if (Version
.Arch() == 0)
1856 _error
->Error(_("I wasn't able to locate a file for the %s package. "
1857 "This might mean you need to manually fix this package. "
1858 "(due to missing arch)"),
1859 Version
.ParentPkg().Name());
1863 /* We need to find a filename to determine the extension. We make the
1864 assumption here that all the available sources for this version share
1865 the same extension.. */
1866 // Skip not source sources, they do not have file fields.
1867 for (; Vf
.end() == false; ++Vf
)
1869 if ((Vf
.File()->Flags
& pkgCache::Flag::NotSource
) != 0)
1874 // Does not really matter here.. we are going to fail out below
1875 if (Vf
.end() != true)
1877 // If this fails to get a file name we will bomb out below.
1878 pkgRecords::Parser
&Parse
= Recs
->Lookup(Vf
);
1879 if (_error
->PendingError() == true)
1882 // Generate the final file name as: package_version_arch.foo
1883 StoreFilename
= QuoteString(Version
.ParentPkg().Name(),"_:") + '_' +
1884 QuoteString(Version
.VerStr(),"_:") + '_' +
1885 QuoteString(Version
.Arch(),"_:.") +
1886 "." + flExtension(Parse
.FileName());
1889 // check if we have one trusted source for the package. if so, switch
1890 // to "TrustedOnly" mode - but only if not in AllowUnauthenticated mode
1891 bool const allowUnauth
= _config
->FindB("APT::Get::AllowUnauthenticated", false);
1892 bool const debugAuth
= _config
->FindB("Debug::pkgAcquire::Auth", false);
1893 bool seenUntrusted
= false;
1894 for (pkgCache::VerFileIterator i
= Version
.FileList(); i
.end() == false; ++i
)
1896 pkgIndexFile
*Index
;
1897 if (Sources
->FindIndex(i
.File(),Index
) == false)
1900 if (debugAuth
== true)
1901 std::cerr
<< "Checking index: " << Index
->Describe()
1902 << "(Trusted=" << Index
->IsTrusted() << ")" << std::endl
;
1904 if (Index
->IsTrusted() == true)
1907 if (allowUnauth
== false)
1911 seenUntrusted
= true;
1914 // "allow-unauthenticated" restores apts old fetching behaviour
1915 // that means that e.g. unauthenticated file:// uris are higher
1916 // priority than authenticated http:// uris
1917 if (allowUnauth
== true && seenUntrusted
== true)
1921 if (QueueNext() == false && _error
->PendingError() == false)
1922 _error
->Error(_("Can't find a source to download version '%s' of '%s'"),
1923 Version
.VerStr(), Version
.ParentPkg().FullName(false).c_str());
1926 // AcqArchive::QueueNext - Queue the next file source /*{{{*/
1927 // ---------------------------------------------------------------------
1928 /* This queues the next available file version for download. It checks if
1929 the archive is already available in the cache and stashs the MD5 for
1931 bool pkgAcqArchive::QueueNext()
1933 string
const ForceHash
= _config
->Find("Acquire::ForceHash");
1934 for (; Vf
.end() == false; ++Vf
)
1936 // Ignore not source sources
1937 if ((Vf
.File()->Flags
& pkgCache::Flag::NotSource
) != 0)
1940 // Try to cross match against the source list
1941 pkgIndexFile
*Index
;
1942 if (Sources
->FindIndex(Vf
.File(),Index
) == false)
1945 // only try to get a trusted package from another source if that source
1947 if(Trusted
&& !Index
->IsTrusted())
1950 // Grab the text package record
1951 pkgRecords::Parser
&Parse
= Recs
->Lookup(Vf
);
1952 if (_error
->PendingError() == true)
1955 string PkgFile
= Parse
.FileName();
1956 if (ForceHash
.empty() == false)
1958 if(stringcasecmp(ForceHash
, "sha512") == 0)
1959 ExpectedHash
= HashString("SHA512", Parse
.SHA512Hash());
1960 else if(stringcasecmp(ForceHash
, "sha256") == 0)
1961 ExpectedHash
= HashString("SHA256", Parse
.SHA256Hash());
1962 else if (stringcasecmp(ForceHash
, "sha1") == 0)
1963 ExpectedHash
= HashString("SHA1", Parse
.SHA1Hash());
1965 ExpectedHash
= HashString("MD5Sum", Parse
.MD5Hash());
1970 if ((Hash
= Parse
.SHA512Hash()).empty() == false)
1971 ExpectedHash
= HashString("SHA512", Hash
);
1972 else if ((Hash
= Parse
.SHA256Hash()).empty() == false)
1973 ExpectedHash
= HashString("SHA256", Hash
);
1974 else if ((Hash
= Parse
.SHA1Hash()).empty() == false)
1975 ExpectedHash
= HashString("SHA1", Hash
);
1977 ExpectedHash
= HashString("MD5Sum", Parse
.MD5Hash());
1979 if (PkgFile
.empty() == true)
1980 return _error
->Error(_("The package index files are corrupted. No Filename: "
1981 "field for package %s."),
1982 Version
.ParentPkg().Name());
1984 Desc
.URI
= Index
->ArchiveURI(PkgFile
);
1985 Desc
.Description
= Index
->ArchiveInfo(Version
);
1987 Desc
.ShortDesc
= Version
.ParentPkg().Name();
1989 // See if we already have the file. (Legacy filenames)
1990 FileSize
= Version
->Size
;
1991 string FinalFile
= _config
->FindDir("Dir::Cache::Archives") + flNotDir(PkgFile
);
1993 if (stat(FinalFile
.c_str(),&Buf
) == 0)
1995 // Make sure the size matches
1996 if ((unsigned long long)Buf
.st_size
== Version
->Size
)
2001 StoreFilename
= DestFile
= FinalFile
;
2005 /* Hmm, we have a file and its size does not match, this means it is
2006 an old style mismatched arch */
2007 unlink(FinalFile
.c_str());
2010 // Check it again using the new style output filenames
2011 FinalFile
= _config
->FindDir("Dir::Cache::Archives") + flNotDir(StoreFilename
);
2012 if (stat(FinalFile
.c_str(),&Buf
) == 0)
2014 // Make sure the size matches
2015 if ((unsigned long long)Buf
.st_size
== Version
->Size
)
2020 StoreFilename
= DestFile
= FinalFile
;
2024 /* Hmm, we have a file and its size does not match, this shouldn't
2026 unlink(FinalFile
.c_str());
2029 DestFile
= _config
->FindDir("Dir::Cache::Archives") + "partial/" + flNotDir(StoreFilename
);
2031 // Check the destination file
2032 if (stat(DestFile
.c_str(),&Buf
) == 0)
2034 // Hmm, the partial file is too big, erase it
2035 if ((unsigned long long)Buf
.st_size
> Version
->Size
)
2036 unlink(DestFile
.c_str());
2038 PartialSize
= Buf
.st_size
;
2041 // Disables download of archives - useful if no real installation follows,
2042 // e.g. if we are just interested in proposed installation order
2043 if (_config
->FindB("Debug::pkgAcqArchive::NoQueue", false) == true)
2048 StoreFilename
= DestFile
= FinalFile
;
2054 Desc
.URI
= Index
->ArchiveURI(PkgFile
);
2055 Desc
.Description
= Index
->ArchiveInfo(Version
);
2057 Desc
.ShortDesc
= Version
.ParentPkg().Name();
2066 // AcqArchive::Done - Finished fetching /*{{{*/
2067 // ---------------------------------------------------------------------
2069 void pkgAcqArchive::Done(string Message
,unsigned long long Size
,string CalcHash
,
2070 pkgAcquire::MethodConfig
*Cfg
)
2072 Item::Done(Message
,Size
,CalcHash
,Cfg
);
2075 if (Size
!= Version
->Size
)
2077 RenameOnError(SizeMismatch
);
2082 if(ExpectedHash
.toStr() != CalcHash
)
2084 RenameOnError(HashSumMismatch
);
2088 // Grab the output filename
2089 string FileName
= LookupTag(Message
,"Filename");
2090 if (FileName
.empty() == true)
2093 ErrorText
= "Method gave a blank filename";
2099 // Reference filename
2100 if (FileName
!= DestFile
)
2102 StoreFilename
= DestFile
= FileName
;
2107 // Done, move it into position
2108 string FinalFile
= _config
->FindDir("Dir::Cache::Archives");
2109 FinalFile
+= flNotDir(StoreFilename
);
2110 Rename(DestFile
,FinalFile
);
2112 StoreFilename
= DestFile
= FinalFile
;
2116 // AcqArchive::Failed - Failure handler /*{{{*/
2117 // ---------------------------------------------------------------------
2118 /* Here we try other sources */
2119 void pkgAcqArchive::Failed(string Message
,pkgAcquire::MethodConfig
*Cnf
)
2121 ErrorText
= LookupTag(Message
,"Message");
2123 /* We don't really want to retry on failed media swaps, this prevents
2124 that. An interesting observation is that permanent failures are not
2126 if (Cnf
->Removable
== true &&
2127 StringToBool(LookupTag(Message
,"Transient-Failure"),false) == true)
2129 // Vf = Version.FileList();
2130 while (Vf
.end() == false) ++Vf
;
2131 StoreFilename
= string();
2132 Item::Failed(Message
,Cnf
);
2136 if (QueueNext() == false)
2138 // This is the retry counter
2140 Cnf
->LocalOnly
== false &&
2141 StringToBool(LookupTag(Message
,"Transient-Failure"),false) == true)
2144 Vf
= Version
.FileList();
2145 if (QueueNext() == true)
2149 StoreFilename
= string();
2150 Item::Failed(Message
,Cnf
);
2154 // AcqArchive::IsTrusted - Determine whether this archive comes from a trusted source /*{{{*/
2155 // ---------------------------------------------------------------------
2156 bool pkgAcqArchive::IsTrusted()
2161 // AcqArchive::Finished - Fetching has finished, tidy up /*{{{*/
2162 // ---------------------------------------------------------------------
2164 void pkgAcqArchive::Finished()
2166 if (Status
== pkgAcquire::Item::StatDone
&&
2169 StoreFilename
= string();
2172 // AcqFile::pkgAcqFile - Constructor /*{{{*/
2173 // ---------------------------------------------------------------------
2174 /* The file is added to the queue */
2175 pkgAcqFile::pkgAcqFile(pkgAcquire
*Owner
,string URI
,string Hash
,
2176 unsigned long long Size
,string Dsc
,string ShortDesc
,
2177 const string
&DestDir
, const string
&DestFilename
,
2179 Item(Owner
), ExpectedHash(Hash
), IsIndexFile(IsIndexFile
)
2181 Retries
= _config
->FindI("Acquire::Retries",0);
2183 if(!DestFilename
.empty())
2184 DestFile
= DestFilename
;
2185 else if(!DestDir
.empty())
2186 DestFile
= DestDir
+ "/" + flNotDir(URI
);
2188 DestFile
= flNotDir(URI
);
2192 Desc
.Description
= Dsc
;
2195 // Set the short description to the archive component
2196 Desc
.ShortDesc
= ShortDesc
;
2198 // Get the transfer sizes
2201 if (stat(DestFile
.c_str(),&Buf
) == 0)
2203 // Hmm, the partial file is too big, erase it
2204 if ((Size
> 0) && (unsigned long long)Buf
.st_size
> Size
)
2205 unlink(DestFile
.c_str());
2207 PartialSize
= Buf
.st_size
;
2213 // AcqFile::Done - Item downloaded OK /*{{{*/
2214 // ---------------------------------------------------------------------
2216 void pkgAcqFile::Done(string Message
,unsigned long long Size
,string CalcHash
,
2217 pkgAcquire::MethodConfig
*Cnf
)
2219 Item::Done(Message
,Size
,CalcHash
,Cnf
);
2222 if(!ExpectedHash
.empty() && ExpectedHash
.toStr() != CalcHash
)
2224 RenameOnError(HashSumMismatch
);
2228 string FileName
= LookupTag(Message
,"Filename");
2229 if (FileName
.empty() == true)
2232 ErrorText
= "Method gave a blank filename";
2238 // The files timestamp matches
2239 if (StringToBool(LookupTag(Message
,"IMS-Hit"),false) == true)
2242 // We have to copy it into place
2243 if (FileName
!= DestFile
)
2246 if (_config
->FindB("Acquire::Source-Symlinks",true) == false ||
2247 Cnf
->Removable
== true)
2249 Desc
.URI
= "copy:" + FileName
;
2254 // Erase the file if it is a symlink so we can overwrite it
2256 if (lstat(DestFile
.c_str(),&St
) == 0)
2258 if (S_ISLNK(St
.st_mode
) != 0)
2259 unlink(DestFile
.c_str());
2263 if (symlink(FileName
.c_str(),DestFile
.c_str()) != 0)
2265 ErrorText
= "Link to " + DestFile
+ " failure ";
2272 // AcqFile::Failed - Failure handler /*{{{*/
2273 // ---------------------------------------------------------------------
2274 /* Here we try other sources */
2275 void pkgAcqFile::Failed(string Message
,pkgAcquire::MethodConfig
*Cnf
)
2277 ErrorText
= LookupTag(Message
,"Message");
2279 // This is the retry counter
2281 Cnf
->LocalOnly
== false &&
2282 StringToBool(LookupTag(Message
,"Transient-Failure"),false) == true)
2289 Item::Failed(Message
,Cnf
);
2292 // AcqIndex::Custom600Headers - Insert custom request headers /*{{{*/
2293 // ---------------------------------------------------------------------
2294 /* The only header we use is the last-modified header. */
2295 string
pkgAcqFile::Custom600Headers()
2298 return "\nIndex-File: true";