Permalink
Cannot retrieve contributors at this time
Name already in use
A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
pkg/libpkg/pkgdb.c
Go to fileThis commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
3081 lines (2660 sloc)
73.4 KB
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/*- | |
* Copyright (c) 2011-2016 Baptiste Daroussin <bapt@FreeBSD.org> | |
* Copyright (c) 2011-2012 Julien Laffaye <jlaffaye@FreeBSD.org> | |
* Copyright (c) 2011 Will Andrews <will@FreeBSD.org> | |
* Copyright (c) 2011 Philippe Pepiot <phil@philpep.org> | |
* Copyright (c) 2011-2012 Marin Atanasov Nikolov <dnaeon@gmail.com> | |
* Copyright (c) 2012-2013 Matthew Seaman <matthew@FreeBSD.org> | |
* Copyright (c) 2012 Bryan Drewery <bryan@shatow.net> | |
* Copyright (c) 2013 Gerald Pfeifer <gerald@pfeifer.com> | |
* Copyright (c) 2013-2014 Vsevolod Stakhov <vsevolod@FreeBSD.org> | |
* All rights reserved. | |
* | |
* Redistribution and use in source and binary forms, with or without | |
* modification, are permitted provided that the following conditions | |
* are met: | |
* 1. Redistributions of source code must retain the above copyright | |
* notice, this list of conditions and the following disclaimer | |
* in this position and unchanged. | |
* 2. Redistributions in binary form must reproduce the above copyright | |
* notice, this list of conditions and the following disclaimer in the | |
* documentation and/or other materials provided with the distribution. | |
* | |
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR | |
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES | |
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. | |
* IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT, | |
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | |
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, | |
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY | |
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT | |
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF | |
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | |
*/ | |
#ifdef HAVE_CONFIG_H | |
#include "pkg_config.h" | |
#endif | |
#include <bsd_compat.h> | |
#include <sys/param.h> | |
#include <sys/mount.h> | |
#include <assert.h> | |
#include <errno.h> | |
#include <regex.h> | |
#include <grp.h> | |
#ifdef HAVE_LIBUTIL_H | |
#include <libutil.h> | |
#endif | |
#include <stdlib.h> | |
#include <stdio.h> | |
#include <stdbool.h> | |
#include <string.h> | |
#include <unistd.h> | |
#include <signal.h> | |
#include <fcntl.h> | |
#include <sqlite3.h> | |
#if defined(HAVE_SYS_STATVFS_H) | |
#include <sys/statvfs.h> | |
#endif | |
#include "pkg.h" | |
#include "private/event.h" | |
#include "private/pkg.h" | |
#include "private/pkgdb.h" | |
#include "private/utils.h" | |
#include "private/pkg_deps.h" | |
#include "tllist.h" | |
#include "private/db_upgrades.h" | |
extern struct pkg_ctx ctx; | |
/* An application using a libpkg() DBVERSION is assumed to be compatible | |
with: | |
* Any lower schema version of the DB, by updating the schema to DBVERSION | |
* Any equal schema version of the DB | |
* Any greater schema version of the DB with the same DB_SCHEMA_MAJOR | |
-- In general, it is OK to add new tables, but modifying or removing old | |
tables must be avoided. If necessary, this may be achieved by creating | |
appropriate VIEWS and TRIGGERS to mimic the older structure. | |
Anyone wishing to make a schema change that necessitates incrementing | |
DB_SCHEMA_MAJOR must first present every other pkgng developer with one | |
of the Golden Apples of the Hesperides | |
*/ | |
#define DB_SCHEMA_MAJOR 0 | |
#define DB_SCHEMA_MINOR 36 | |
#define DBVERSION (DB_SCHEMA_MAJOR * 1000 + DB_SCHEMA_MINOR) | |
static int pkgdb_upgrade(struct pkgdb *); | |
static int prstmt_initialize(struct pkgdb *db); | |
/* static int run_prstmt(sql_prstmt_index s, ...); */ | |
static void prstmt_finalize(struct pkgdb *db); | |
static int pkgdb_insert_scripts(struct pkg *pkg, int64_t package_id, sqlite3 *s); | |
static int pkgdb_insert_lua_scripts(struct pkg *pkg, int64_t package_id, sqlite3 *s); | |
extern int sqlite3_shell(int, char**); | |
struct sqlite3_stmt * | |
prepare_sql(sqlite3 *s, const char *sql) | |
{ | |
int ret; | |
sqlite3_stmt *stmt; | |
ret = sqlite3_prepare_v2(s, sql, strlen(sql), &stmt, | |
NULL); | |
if (ret != SQLITE_OK) { | |
ERROR_SQLITE(s, sql); | |
return (NULL); | |
} | |
return (stmt); | |
} | |
void | |
pkgdb_regex(sqlite3_context *ctx, int argc, sqlite3_value **argv) | |
{ | |
const unsigned char *regex = NULL; | |
const unsigned char *str; | |
regex_t *re; | |
int ret; | |
if (argc != 2) { | |
sqlite3_result_error(ctx, "SQL function regex() called " | |
"with invalid number of arguments.\n", -1); | |
return; | |
} | |
if ((regex = sqlite3_value_text(argv[0])) == NULL) { | |
sqlite3_result_error(ctx, "SQL function regex() called " | |
"without a regular expression.\n", -1); | |
return; | |
} | |
re = (regex_t *)sqlite3_get_auxdata(ctx, 0); | |
if (re == NULL) { | |
int cflags; | |
if (pkgdb_case_sensitive()) | |
cflags = REG_EXTENDED | REG_NOSUB; | |
else | |
cflags = REG_EXTENDED | REG_NOSUB | REG_ICASE; | |
re = xmalloc(sizeof(regex_t)); | |
if (regcomp(re, regex, cflags) != 0) { | |
sqlite3_result_error(ctx, "Invalid regex\n", -1); | |
free(re); | |
return; | |
} | |
sqlite3_set_auxdata(ctx, 0, re, pkgdb_regex_delete); | |
} | |
if ((str = sqlite3_value_text(argv[1])) != NULL) { | |
ret = regexec(re, str, 0, NULL, 0); | |
sqlite3_result_int(ctx, (ret != REG_NOMATCH)); | |
} | |
} | |
void | |
pkgdb_regex_delete(void *p) | |
{ | |
regex_t *re = (regex_t *)p; | |
regfree(re); | |
free(re); | |
} | |
void | |
pkgdb_now(sqlite3_context *ctx, int argc, __unused sqlite3_value **argv) | |
{ | |
if (argc != 0) { | |
sqlite3_result_error(ctx, "Invalid usage of now() " | |
"no arguments expected\n", -1); | |
return; | |
} | |
sqlite3_result_int64(ctx, (int64_t)time(NULL)); | |
} | |
static void | |
pkgdb_vercmp(sqlite3_context *ctx, int argc, sqlite3_value **argv) | |
{ | |
const char *op_str, *arg1, *arg2; | |
enum pkg_dep_version_op op; | |
int cmp; | |
bool ret; | |
if (argc != 3) { | |
sqlite3_result_error(ctx, "Invalid usage of vercmp\n", -1); | |
return; | |
} | |
op_str = sqlite3_value_text(argv[0]); | |
arg1 = sqlite3_value_text(argv[1]); | |
arg2 = sqlite3_value_text(argv[2]); | |
if (op_str == NULL || arg1 == NULL || arg2 == NULL) { | |
sqlite3_result_error(ctx, "Invalid usage of vercmp\n", -1); | |
return; | |
} | |
op = pkg_deps_string_toop(op_str); | |
cmp = pkg_version_cmp(arg1, arg2); | |
switch(op) { | |
case VERSION_ANY: | |
default: | |
ret = true; | |
break; | |
case VERSION_EQ: | |
ret = (cmp == 0); | |
break; | |
case VERSION_GE: | |
ret = (cmp >= 0); | |
break; | |
case VERSION_LE: | |
ret = (cmp <= 0); | |
break; | |
case VERSION_GT: | |
ret = (cmp > 0); | |
break; | |
case VERSION_LT: | |
ret = (cmp < 0); | |
break; | |
case VERSION_NOT: | |
ret = (cmp != 0); | |
break; | |
} | |
sqlite3_result_int(ctx, ret); | |
} | |
static int | |
pkgdb_upgrade(struct pkgdb *db) | |
{ | |
int64_t db_version = -1; | |
const char *sql_upgrade; | |
int i, ret; | |
assert(db != NULL); | |
ret = get_pragma(db->sqlite, "PRAGMA user_version;", &db_version, false); | |
if (ret != EPKG_OK) | |
return (EPKG_FATAL); | |
if (db_version == DBVERSION) | |
return (EPKG_OK); | |
else if (db_version > DBVERSION) { | |
if (db_version / 1000 <= DB_SCHEMA_MAJOR) { | |
/* VIEWS and TRIGGERS used as compatibility hack */ | |
pkg_emit_error("warning: database version %" PRId64 | |
" is newer than libpkg(3) version %d, but still " | |
"compatible", db_version, DBVERSION); | |
return (EPKG_OK); | |
} else { | |
pkg_emit_error("database version %" PRId64 " is newer " | |
"than and incompatible with libpkg(3) version %d", | |
db_version, DBVERSION); | |
return (EPKG_FATAL); | |
} | |
} | |
while (db_version < DBVERSION) { | |
const char *sql_str; | |
if (sqlite3_db_readonly(db->sqlite, "main")) { | |
pkg_emit_error("The database is outdated and " | |
"opened readonly"); | |
return (EPKG_FATAL); | |
} | |
db_version++; | |
i = 0; | |
sql_upgrade = NULL; | |
while (db_upgrades[i].version != -1) { | |
if (db_upgrades[i].version == db_version) { | |
sql_upgrade = db_upgrades[i].sql; | |
break; | |
} | |
i++; | |
} | |
/* | |
* We can't find the statements to upgrade to the next version, | |
* maybe because the current version is too old and upgrade | |
* support has been removed. | |
*/ | |
if (sql_upgrade == NULL) { | |
pkg_emit_error("can not upgrade to db version %" PRId64, | |
db_version); | |
return (EPKG_FATAL); | |
} | |
if (pkgdb_transaction_begin_sqlite(db->sqlite, NULL) != EPKG_OK) | |
return (EPKG_FATAL); | |
if (sql_exec(db->sqlite, sql_upgrade) != EPKG_OK) { | |
pkgdb_transaction_rollback_sqlite(db->sqlite, NULL); | |
return (EPKG_FATAL); | |
} | |
sql_str = "PRAGMA user_version = %" PRId64 ";"; | |
ret = sql_exec(db->sqlite, sql_str, db_version); | |
if (ret != EPKG_OK) { | |
pkgdb_transaction_rollback_sqlite(db->sqlite, NULL); | |
return (EPKG_FATAL); | |
} | |
if (pkgdb_transaction_commit_sqlite(db->sqlite, NULL) != EPKG_OK) | |
return (EPKG_FATAL); | |
} | |
return (EPKG_OK); | |
} | |
/* | |
* in the database : | |
* scripts.type can be: | |
* - 0: PRE_INSTALL | |
* - 1: POST_INSTALL | |
* - 2: PRE_DEINSTALL | |
* - 3: POST_DEINSTALL | |
* - 4: PRE_UPGRADE | |
* - 5: POST_UPGRADE | |
* - 6: INSTALL | |
* - 7: DEINSTALL | |
* - 8: UPGRADE | |
*/ | |
static int | |
pkgdb_init(sqlite3 *sdb) | |
{ | |
const char sql[] = "" | |
"PRAGMA journal_mode = TRUNCATE;" | |
"PRAGMA synchronous = FULL;" | |
"BEGIN;" | |
"CREATE TABLE packages (" | |
"id INTEGER PRIMARY KEY," | |
"origin TEXT NOT NULL," | |
"name TEXT NOT NULL," | |
"version TEXT NOT NULL," | |
"comment TEXT NOT NULL," | |
"desc TEXT NOT NULL," | |
"mtree_id INTEGER, " | |
"message TEXT," | |
"arch TEXT NOT NULL," | |
"maintainer TEXT NOT NULL, " | |
"www TEXT," | |
"prefix TEXT NOT NULL," | |
"flatsize INTEGER NOT NULL," | |
"automatic INTEGER NOT NULL," | |
"locked INTEGER NOT NULL DEFAULT 0," | |
"licenselogic INTEGER NOT NULL," | |
"time INTEGER, " | |
"manifestdigest TEXT NULL, " | |
"pkg_format_version INTEGER," | |
"dep_formula TEXT NULL" | |
",vital INTEGER NOT NULL DEFAULT 0" | |
");" | |
"CREATE UNIQUE INDEX packages_unique ON packages(name);" | |
"CREATE TABLE pkg_script (" | |
"package_id INTEGER REFERENCES packages(id) ON DELETE CASCADE" | |
" ON UPDATE CASCADE," | |
"type INTEGER," | |
"script_id INTEGER REFERENCES script(script_id)" | |
" ON DELETE RESTRICT ON UPDATE CASCADE," | |
"PRIMARY KEY (package_id, type)" | |
");" | |
"CREATE TABLE script (" | |
"script_id INTEGER PRIMARY KEY," | |
"script TEXT NOT NULL UNIQUE" | |
");" | |
"CREATE TABLE option (" | |
"option_id INTEGER PRIMARY KEY," | |
"option TEXT NOT NULL UNIQUE" | |
");" | |
"CREATE TABLE option_desc (" | |
"option_desc_id INTEGER PRIMARY KEY," | |
"option_desc TEXT NOT NULL UNIQUE" | |
");" | |
"CREATE TABLE pkg_option (" | |
"package_id INTEGER NOT NULL REFERENCES packages(id) " | |
"ON DELETE CASCADE ON UPDATE CASCADE," | |
"option_id INTEGER NOT NULL REFERENCES option(option_id) " | |
"ON DELETE RESTRICT ON UPDATE CASCADE," | |
"value TEXT NOT NULL," | |
"PRIMARY KEY(package_id, option_id)" | |
");" | |
"CREATE TABLE pkg_option_desc (" | |
"package_id INTEGER NOT NULL REFERENCES packages(id) " | |
"ON DELETE CASCADE ON UPDATE CASCADE," | |
"option_id INTEGER NOT NULL REFERENCES option(option_id) " | |
"ON DELETE RESTRICT ON UPDATE CASCADE," | |
"option_desc_id INTEGER NOT NULL " | |
"REFERENCES option_desc(option_desc_id) " | |
"ON DELETE RESTRICT ON UPDATE CASCADE," | |
"PRIMARY KEY(package_id, option_id)" | |
");" | |
"CREATE TABLE pkg_option_default (" | |
"package_id INTEGER NOT NULL REFERENCES packages(id) " | |
"ON DELETE CASCADE ON UPDATE CASCADE," | |
"option_id INTEGER NOT NULL REFERENCES option(option_id) " | |
"ON DELETE RESTRICT ON UPDATE CASCADE," | |
"default_value TEXT NOT NULL," | |
"PRIMARY KEY(package_id, option_id)" | |
");" | |
"CREATE TABLE deps (" | |
"origin TEXT NOT NULL," | |
"name TEXT NOT NULL," | |
"version TEXT NOT NULL," | |
"package_id INTEGER REFERENCES packages(id) ON DELETE CASCADE" | |
" ON UPDATE CASCADE" | |
");" | |
"CREATE UNIQUE INDEX deps_unique ON deps(name, version, package_id);" | |
"CREATE TABLE files (" | |
"path TEXT PRIMARY KEY," | |
"sha256 TEXT," | |
"package_id INTEGER REFERENCES packages(id) ON DELETE CASCADE" | |
" ON UPDATE CASCADE" | |
");" | |
"CREATE TABLE directories (" | |
"id INTEGER PRIMARY KEY," | |
"path TEXT NOT NULL UNIQUE" | |
");" | |
"CREATE TABLE pkg_directories (" | |
"package_id INTEGER REFERENCES packages(id) ON DELETE CASCADE" | |
" ON UPDATE CASCADE," | |
"directory_id INTEGER REFERENCES directories(id) ON DELETE RESTRICT" | |
" ON UPDATE RESTRICT," | |
"try INTEGER," | |
"PRIMARY KEY (package_id, directory_id)" | |
");" | |
"CREATE TABLE categories (" | |
"id INTEGER PRIMARY KEY," | |
"name TEXT NOT NULL UNIQUE" | |
");" | |
"CREATE TABLE pkg_categories (" | |
"package_id INTEGER REFERENCES packages(id) ON DELETE CASCADE" | |
" ON UPDATE CASCADE," | |
"category_id INTEGER REFERENCES categories(id) ON DELETE RESTRICT" | |
" ON UPDATE RESTRICT," | |
"PRIMARY KEY (package_id, category_id)" | |
");" | |
"CREATE TABLE licenses (" | |
"id INTEGER PRIMARY KEY," | |
"name TEXT NOT NULL UNIQUE" | |
");" | |
"CREATE TABLE pkg_licenses (" | |
"package_id INTEGER REFERENCES packages(id) ON DELETE CASCADE" | |
" ON UPDATE CASCADE," | |
"license_id INTEGER REFERENCES licenses(id) ON DELETE RESTRICT" | |
" ON UPDATE RESTRICT," | |
"PRIMARY KEY (package_id, license_id)" | |
");" | |
"CREATE TABLE users (" | |
"id INTEGER PRIMARY KEY," | |
"name TEXT NOT NULL UNIQUE" | |
");" | |
"CREATE TABLE pkg_users (" | |
"package_id INTEGER REFERENCES packages(id) ON DELETE CASCADE" | |
" ON UPDATE CASCADE," | |
"user_id INTEGER REFERENCES users(id) ON DELETE RESTRICT" | |
" ON UPDATE RESTRICT," | |
"UNIQUE(package_id, user_id)" | |
");" | |
"CREATE TABLE groups (" | |
"id INTEGER PRIMARY KEY," | |
"name TEXT NOT NULL UNIQUE" | |
");" | |
"CREATE TABLE pkg_groups (" | |
"package_id INTEGER REFERENCES packages(id) ON DELETE CASCADE" | |
" ON UPDATE CASCADE," | |
"group_id INTEGER REFERENCES groups(id) ON DELETE RESTRICT" | |
" ON UPDATE RESTRICT," | |
"UNIQUE(package_id, group_id)" | |
");" | |
"CREATE TABLE shlibs (" | |
"id INTEGER PRIMARY KEY," | |
"name TEXT NOT NULL UNIQUE" | |
");" | |
"CREATE TABLE pkg_shlibs_required (" | |
"package_id INTEGER NOT NULL REFERENCES packages(id)" | |
" ON DELETE CASCADE ON UPDATE CASCADE," | |
"shlib_id INTEGER NOT NULL REFERENCES shlibs(id)" | |
" ON DELETE RESTRICT ON UPDATE RESTRICT," | |
"UNIQUE (package_id, shlib_id)" | |
");" | |
"CREATE TABLE pkg_shlibs_provided (" | |
"package_id INTEGER NOT NULL REFERENCES packages(id)" | |
" ON DELETE CASCADE ON UPDATE CASCADE," | |
"shlib_id INTEGER NOT NULL REFERENCES shlibs(id)" | |
" ON DELETE RESTRICT ON UPDATE RESTRICT," | |
"UNIQUE (package_id, shlib_id)" | |
");" | |
"CREATE TABLE annotation (" | |
"annotation_id INTEGER PRIMARY KEY," | |
"annotation TEXT NOT NULL UNIQUE" | |
");" | |
"CREATE TABLE pkg_annotation (" | |
"package_id INTEGER REFERENCES packages(id)" | |
" ON DELETE CASCADE ON UPDATE RESTRICT," | |
"tag_id INTEGER NOT NULL REFERENCES annotation(annotation_id)" | |
" ON DELETE CASCADE ON UPDATE RESTRICT," | |
"value_id INTEGER NOT NULL REFERENCES annotation(annotation_id)" | |
" ON DELETE CASCADE ON UPDATE RESTRICT," | |
"UNIQUE (package_id, tag_id)" | |
");" | |
"CREATE TABLE pkg_conflicts (" | |
"package_id INTEGER NOT NULL REFERENCES packages(id)" | |
" ON DELETE CASCADE ON UPDATE CASCADE," | |
"conflict_id INTEGER NOT NULL," | |
"UNIQUE(package_id, conflict_id)" | |
");" | |
"CREATE TABLE pkg_lock (" | |
"exclusive INTEGER(1)," | |
"advisory INTEGER(1)," | |
"read INTEGER(8)" | |
");" | |
"CREATE TABLE pkg_lock_pid (" | |
"pid INTEGER PRIMARY KEY" | |
");" | |
"INSERT INTO pkg_lock VALUES(0,0,0);" | |
"CREATE TABLE provides(" | |
" id INTEGER PRIMARY KEY," | |
" provide TEXT NOT NULL" | |
");" | |
"CREATE TABLE pkg_provides (" | |
"package_id INTEGER NOT NULL REFERENCES packages(id)" | |
" ON DELETE CASCADE ON UPDATE CASCADE," | |
"provide_id INTEGER NOT NULL REFERENCES provides(id)" | |
" ON DELETE RESTRICT ON UPDATE RESTRICT," | |
"UNIQUE(package_id, provide_id)" | |
");" | |
"CREATE TABLE config_files (" | |
"path TEXT NOT NULL UNIQUE, " | |
"content TEXT, " | |
"package_id INTEGER REFERENCES packages(id) ON DELETE CASCADE" | |
" ON UPDATE CASCADE" | |
");" | |
/* Mark the end of the array */ | |
"CREATE INDEX deporigini on deps(origin);" | |
"CREATE INDEX pkg_script_package_id ON pkg_script(package_id);" | |
"CREATE INDEX deps_package_id ON deps (package_id);" | |
"CREATE INDEX files_package_id ON files (package_id);" | |
"CREATE INDEX pkg_directories_package_id ON pkg_directories (package_id);" | |
"CREATE INDEX pkg_categories_package_id ON pkg_categories (package_id);" | |
"CREATE INDEX pkg_licenses_package_id ON pkg_licenses (package_id);" | |
"CREATE INDEX pkg_users_package_id ON pkg_users (package_id);" | |
"CREATE INDEX pkg_groups_package_id ON pkg_groups (package_id);" | |
"CREATE INDEX pkg_shlibs_required_package_id ON pkg_shlibs_required (package_id);" | |
"CREATE INDEX pkg_shlibs_provided_package_id ON pkg_shlibs_provided (package_id);" | |
"CREATE INDEX pkg_directories_directory_id ON pkg_directories (directory_id);" | |
"CREATE INDEX pkg_annotation_package_id ON pkg_annotation(package_id);" | |
"CREATE INDEX pkg_digest_id ON packages(origin, manifestdigest);" | |
"CREATE INDEX pkg_conflicts_pid ON pkg_conflicts(package_id);" | |
"CREATE INDEX pkg_conflicts_cid ON pkg_conflicts(conflict_id);" | |
"CREATE INDEX pkg_provides_id ON pkg_provides(package_id);" | |
"CREATE INDEX packages_origin ON packages(origin COLLATE NOCASE);" | |
"CREATE INDEX packages_name ON packages(name COLLATE NOCASE);" | |
"CREATE TABLE requires(" | |
" id INTEGER PRIMARY KEY," | |
" require TEXT NOT NULL" | |
");" | |
"CREATE TABLE pkg_requires (" | |
"package_id INTEGER NOT NULL REFERENCES packages(id)" | |
" ON DELETE CASCADE ON UPDATE CASCADE," | |
"require_id INTEGER NOT NULL REFERENCES requires(id)" | |
" ON DELETE RESTRICT ON UPDATE RESTRICT," | |
"UNIQUE(package_id, require_id)" | |
");" | |
"CREATE TABLE lua_script(" | |
" lua_script_id INTEGER PRIMARY KEY," | |
" lua_script TEXT NOT NULL UNIQUE" | |
");" | |
"CREATE TABLE pkg_lua_script (" | |
"package_id INTEGER NOT NULL REFERENCES packages(id)" | |
" ON DELETE CASCADE ON UPDATE CASCADE," | |
"lua_script_id INTEGER NOT NULL REFERENCES lua_script(lua_script_id)" | |
" ON DELETE RESTRICT ON UPDATE RESTRICT," | |
"type INTEGER," | |
"UNIQUE(package_id, lua_script_id)" | |
");" | |
"PRAGMA user_version = %d;" | |
"COMMIT;" | |
; | |
return (sql_exec(sdb, sql, DBVERSION)); | |
} | |
static int | |
pkgdb_is_insecure_mode(int dbdirfd, const char *path, bool install_as_user) | |
{ | |
uid_t fileowner; | |
gid_t filegroup; | |
bool bad_perms = false; | |
bool wrong_owner = false; | |
struct stat sb; | |
if (dbdirfd == -1) | |
return (EPKG_ENODB); | |
if (install_as_user) { | |
fileowner = geteuid(); | |
filegroup = getegid(); | |
} else { | |
fileowner = 0; | |
filegroup = 0; | |
} | |
if (fstatat(dbdirfd, path, &sb, 0) != 0) { | |
if (errno == EACCES) | |
return (EPKG_ENOACCESS); | |
else if (errno == ENOENT) | |
return (EPKG_ENODB); | |
else | |
return (EPKG_FATAL); | |
} | |
/* if fileowner == 0, root ownership and no group or other | |
read access. if fileowner != 0, require no other read | |
access and group read access IFF the group ownership == | |
filegroup */ | |
if ( fileowner == 0 ) { | |
if ((sb.st_mode & (S_IWGRP|S_IWOTH)) != 0) | |
bad_perms = true; | |
if (sb.st_uid != fileowner) | |
wrong_owner = true; | |
} else { | |
if ((sb.st_mode & S_IWOTH) != 0) | |
bad_perms = true; | |
if (sb.st_gid != filegroup && (sb.st_mode & S_IWGRP) != 0) | |
bad_perms = true; | |
if (sb.st_uid != 0 && sb.st_uid != fileowner && sb.st_gid != filegroup) | |
wrong_owner = true; | |
} | |
if (bad_perms) { | |
pkg_emit_error("%s permissions (%#o) too lax", path, | |
(sb.st_mode & (S_IRWXU|S_IRWXG|S_IRWXO))); | |
return (EPKG_INSECURE); | |
} | |
if (wrong_owner) { | |
pkg_emit_error("%s wrong user or group ownership" | |
" (expected %d/%d versus actual %d/%d)", | |
path, fileowner, filegroup, sb.st_uid, sb.st_gid); | |
return (EPKG_INSECURE); | |
} | |
return (EPKG_OK); | |
} | |
int | |
pkgdb_check_access(unsigned mode, const char *dbname) | |
{ | |
const char *dbpath = "."; | |
int retval; | |
bool database_exists; | |
bool install_as_user; | |
int dbdirfd = pkg_get_dbdirfd(); | |
if (dbname != NULL) | |
dbpath = dbname; | |
install_as_user = (getenv("INSTALL_AS_USER") != NULL); | |
retval = pkgdb_is_insecure_mode(dbdirfd, dbpath, install_as_user); | |
database_exists = (retval != EPKG_ENODB); | |
if (database_exists && retval != EPKG_OK) | |
return (retval); | |
if (!database_exists && (mode & PKGDB_MODE_CREATE) != 0) | |
return (EPKG_OK); | |
retval = -1; | |
switch(mode & (PKGDB_MODE_READ|PKGDB_MODE_WRITE)) { | |
case 0: /* Existence test */ | |
if (dbdirfd == -1) | |
goto out; | |
retval = faccessat(dbdirfd, dbpath, F_OK, AT_EACCESS); | |
break; | |
case PKGDB_MODE_READ: | |
if (dbdirfd == -1) | |
goto out; | |
retval = faccessat(dbdirfd, dbpath, R_OK, AT_EACCESS); | |
break; | |
case PKGDB_MODE_WRITE: | |
if (dbdirfd == -1) { | |
mkdirs(ctx.dbdir); | |
dbdirfd = pkg_get_dbdirfd(); | |
if (dbdirfd == -1) | |
goto out; | |
} | |
retval = faccessat(dbdirfd, dbpath, W_OK, AT_EACCESS); | |
break; | |
case PKGDB_MODE_READ|PKGDB_MODE_WRITE: | |
if (dbdirfd == -1) { | |
mkdirs(ctx.dbdir); | |
dbdirfd = pkg_get_dbdirfd(); | |
if (dbdirfd == -1) | |
goto out; | |
} | |
retval = faccessat(dbdirfd, dbpath, R_OK|W_OK, AT_EACCESS); | |
break; | |
} | |
out: | |
if (retval != 0) { | |
if (errno == ENOENT) | |
return (EPKG_ENODB); | |
else if (errno == EACCES || errno == EROFS) | |
return (EPKG_ENOACCESS); | |
else | |
return (EPKG_FATAL); | |
} | |
return (EPKG_OK); | |
} | |
int | |
pkgdb_access(unsigned mode, unsigned database) | |
{ | |
int retval = EPKG_OK; | |
/* | |
* This will return one of: | |
* | |
* EPKG_ENODB: a database doesn't exist and we don't want to create | |
* it, or dbdir doesn't exist | |
* | |
* EPKG_INSECURE: the dbfile or one of the directories in the | |
* path to it are writable by other than root or | |
* (if $INSTALL_AS_USER is set) the current euid | |
* and egid | |
* | |
* EPKG_ENOACCESS: we don't have privileges to read or write | |
* | |
* EPKG_FATAL: Couldn't determine the answer for other reason, | |
* like configuration screwed up, invalid argument values, | |
* read-only filesystem, etc. | |
* | |
* EPKG_OK: We can go ahead | |
*/ | |
if ((mode & ~(PKGDB_MODE_READ|PKGDB_MODE_WRITE|PKGDB_MODE_CREATE)) | |
!= 0) | |
return (EPKG_FATAL); /* EINVAL */ | |
if ((database & ~(PKGDB_DB_LOCAL|PKGDB_DB_REPO)) != 0) | |
return (EPKG_FATAL); /* EINVAL */ | |
/* Test the enclosing directory: if we're going to create the | |
DB, then we need read and write permissions on the dir. | |
Otherwise, just test for read access */ | |
if ((mode & PKGDB_MODE_CREATE) != 0) { | |
retval = pkgdb_check_access(PKGDB_MODE_READ|PKGDB_MODE_WRITE, | |
NULL); | |
} else | |
retval = pkgdb_check_access(PKGDB_MODE_READ, NULL); | |
if (retval != EPKG_OK) | |
return (retval); | |
/* Test local.sqlite, if required */ | |
if ((database & PKGDB_DB_LOCAL) != 0) { | |
retval = pkgdb_check_access(mode, "local.sqlite"); | |
if (retval != EPKG_OK) | |
return (retval); | |
} | |
if ((database & PKGDB_DB_REPO) != 0) { | |
struct pkg_repo *r = NULL; | |
while (pkg_repos(&r) == EPKG_OK) { | |
/* Ignore any repos marked as inactive */ | |
if (!pkg_repo_enabled(r)) | |
continue; | |
retval = r->ops->access(r, mode); | |
if (retval != EPKG_OK) { | |
if (retval == EPKG_ENODB && | |
mode == PKGDB_MODE_READ) | |
pkg_emit_error("Repository %s missing." | |
" 'pkg update' required", r->name); | |
return (retval); | |
} | |
} | |
} | |
return (retval); | |
} | |
static int | |
pkgdb_profile_callback(unsigned type __unused, void *ud __unused, | |
void *stmt, void *X) | |
{ | |
sqlite3_uint64 nsec = *((sqlite3_uint64*)X); | |
const char *req = sqlite3_sql((sqlite3_stmt *)stmt); | |
/* According to sqlite3 documentation, nsec has milliseconds accuracy */ | |
nsec /= 1000000LLU; | |
if (nsec > 0) | |
pkg_debug(1, "Sqlite request %s was executed in %lu milliseconds", | |
req, (unsigned long)nsec); | |
return (0); | |
} | |
int | |
pkgdb_open(struct pkgdb **db_p, pkgdb_t type) | |
{ | |
return (pkgdb_open_all(db_p, type, NULL)); | |
} | |
static int | |
pkgdb_open_repos(struct pkgdb *db, const char *reponame) | |
{ | |
struct pkg_repo *r = NULL; | |
while (pkg_repos(&r) == EPKG_OK) { | |
if (!r->enable) { | |
continue; | |
} | |
if (reponame == NULL || strcasecmp(r->name, reponame) == 0) { | |
/* We need read only access here */ | |
if (r->ops->open(r, R_OK) == EPKG_OK) { | |
r->ops->init(r); | |
tll_push_front(db->repos, r); | |
} else | |
pkg_emit_error("Repository %s cannot be opened." | |
" 'pkg update' required", r->name); | |
} | |
} | |
return (EPKG_OK); | |
} | |
static const char* | |
_dbdir_trim_path(const char*path) | |
{ | |
const char *p = strrchr(path, '/'); | |
if(p == NULL) | |
return (path); | |
return (p + 1); | |
} | |
static int | |
_dbdir_open(const char *path, int flags, int mode) | |
{ | |
int dfd = pkg_get_dbdirfd(); | |
return (openat(dfd, _dbdir_trim_path(path), flags, mode)); | |
} | |
static int | |
_dbdir_access(const char *path, int mode) | |
{ | |
int dfd = pkg_get_dbdirfd(); | |
return (faccessat(dfd, _dbdir_trim_path(path), mode, 0)); | |
} | |
static int | |
_dbdir_stat(const char * path, struct stat * sb) | |
{ | |
int dfd = pkg_get_dbdirfd(); | |
return (fstatat(dfd, _dbdir_trim_path(path), sb, 0)); | |
} | |
static int | |
_dbdir_lstat(const char * path, struct stat * sb) | |
{ | |
int dfd = pkg_get_dbdirfd(); | |
return (fstatat(dfd, _dbdir_trim_path(path), sb, AT_SYMLINK_NOFOLLOW)); | |
} | |
static int | |
_dbdir_unlink(const char *path) | |
{ | |
int dfd = pkg_get_dbdirfd(); | |
return (unlinkat(dfd, _dbdir_trim_path(path), 0)); | |
} | |
static int | |
_dbdir_mkdir(const char *path, mode_t mode) | |
{ | |
int dfd = pkg_get_dbdirfd(); | |
return (mkdirat(dfd, _dbdir_trim_path(path), mode)); | |
} | |
static int | |
_dbdir_getcwd(char *path, size_t sz) | |
{ | |
return (snprintf(path, sz, "/")); | |
} | |
void | |
pkgdb_syscall_overload(void) | |
{ | |
sqlite3_vfs *vfs; | |
vfs = sqlite3_vfs_find(NULL); | |
vfs->xSetSystemCall(vfs, "open", (sqlite3_syscall_ptr)_dbdir_open); | |
vfs->xSetSystemCall(vfs, "access", (sqlite3_syscall_ptr)_dbdir_access); | |
vfs->xSetSystemCall(vfs, "stat", (sqlite3_syscall_ptr)_dbdir_stat); | |
vfs->xSetSystemCall(vfs, "lstat", (sqlite3_syscall_ptr)_dbdir_lstat); | |
vfs->xSetSystemCall(vfs, "unlink", (sqlite3_syscall_ptr)_dbdir_unlink); | |
vfs->xSetSystemCall(vfs, "mkdir", (sqlite3_syscall_ptr)_dbdir_mkdir); | |
vfs->xSetSystemCall(vfs, "getcwd", (sqlite3_syscall_ptr)_dbdir_getcwd); | |
} | |
void | |
pkgdb_nfs_corruption(sqlite3 *db) | |
{ | |
if (sqlite3_errcode(db) != SQLITE_CORRUPT) | |
return; | |
/* | |
* Fall back on unix-dotfile locking strategy if on a network filesystem | |
*/ | |
#if defined(HAVE_SYS_STATVFS_H) && defined(ST_LOCAL) | |
int dbdirfd = pkg_get_dbdirfd(); | |
struct statvfs stfs; | |
if (fstatvfs(dbdirfd, &stfs) == 0) { | |
if ((stfs.f_flag & ST_LOCAL) != ST_LOCAL) | |
pkg_emit_error("You are running on a remote filesystem," | |
" please make sure, the locking mechanism is " | |
" properly setup\n"); | |
} | |
#elif defined(HAVE_FSTATFS) && defined(MNT_LOCAL) | |
int dbdirfd = pkg_get_dbdirfd(); | |
struct statfs stfs; | |
if (fstatfs(dbdirfd, &stfs) == 0) { | |
if ((stfs.f_flags & MNT_LOCAL) != MNT_LOCAL) | |
pkg_emit_error("You are running on a remote filesystem," | |
" please make sure, the locking mechanism is " | |
" properly setup\n"); | |
} | |
#endif | |
} | |
int | |
pkgdb_open_all(struct pkgdb **db_p, pkgdb_t type, const char *reponame) | |
{ | |
struct pkgdb *db = NULL; | |
bool reopen = false; | |
bool profile = false; | |
bool create = false; | |
int ret; | |
int dbdirfd; | |
if (*db_p != NULL) { | |
reopen = true; | |
db = *db_p; | |
} | |
if (!reopen) | |
db = xcalloc(1, sizeof(struct pkgdb)); | |
db->prstmt_initialized = false; | |
if (!reopen) { | |
retry: | |
dbdirfd = pkg_get_dbdirfd(); | |
if (dbdirfd == -1) { | |
if (errno == ENOENT) { | |
if (mkdirs(ctx.dbdir) != EPKG_OK) { | |
pkgdb_close(db); | |
return (EPKG_FATAL); | |
} | |
goto retry; | |
} | |
} | |
if (faccessat(dbdirfd, "local.sqlite", R_OK, AT_EACCESS) != 0) { | |
if (errno != ENOENT) { | |
pkg_emit_nolocaldb(); | |
pkgdb_close(db); | |
return (EPKG_ENODB); | |
} else if ((faccessat(dbdirfd, ".", W_OK, AT_EACCESS) != 0)) { | |
/* | |
* If we need to create the db but cannot | |
* write to it, fail early | |
*/ | |
pkg_emit_nolocaldb(); | |
pkgdb_close(db); | |
return (EPKG_ENODB); | |
} else { | |
create = true; | |
} | |
} | |
sqlite3_initialize(); | |
pkgdb_syscall_overload(); | |
if (sqlite3_open("/local.sqlite", &db->sqlite) != SQLITE_OK) { | |
ERROR_SQLITE(db->sqlite, "sqlite open"); | |
pkgdb_nfs_corruption(db->sqlite); | |
pkgdb_close(db); | |
return (EPKG_FATAL); | |
} | |
/* Wait up to 5 seconds if database is busy */ | |
sqlite3_busy_timeout(db->sqlite, 5000); | |
/* If the database is missing we have to initialize it */ | |
if (create && pkgdb_init(db->sqlite) != EPKG_OK) { | |
pkgdb_close(db); | |
return (EPKG_FATAL); | |
} | |
/* Create our functions */ | |
pkgdb_sqlcmd_init(db->sqlite, NULL, NULL); | |
if (pkgdb_upgrade(db) != EPKG_OK) { | |
pkgdb_close(db); | |
return (EPKG_FATAL); | |
} | |
/* | |
* allow foreign key option which will allow to have | |
* clean support for reinstalling | |
*/ | |
ret = sql_exec(db->sqlite, "PRAGMA foreign_keys = ON;"); | |
if (ret != EPKG_OK) { | |
pkgdb_close(db); | |
return (EPKG_FATAL); | |
} | |
sql_exec(db->sqlite, "PRAGMA mmap_size=268435456;"); | |
} | |
if (type == PKGDB_REMOTE || type == PKGDB_MAYBE_REMOTE) { | |
if (reponame != NULL || pkg_repos_activated_count() > 0) { | |
ret = pkgdb_open_repos(db, reponame); | |
if (ret != EPKG_OK) { | |
pkgdb_close(db); | |
return (ret); | |
} | |
} else if (type == PKGDB_REMOTE) { | |
if (*db_p == NULL) | |
pkgdb_close(db); | |
pkg_emit_error("No active remote repositories configured"); | |
return (EPKG_FATAL); | |
} | |
} | |
if (prstmt_initialize(db) != EPKG_OK) { | |
pkgdb_close(db); | |
return (EPKG_FATAL); | |
} | |
profile = pkg_object_bool(pkg_config_get("SQLITE_PROFILE")); | |
if (profile) { | |
pkg_debug(1, "pkgdb profiling is enabled"); | |
sqlite3_trace_v2(db->sqlite, SQLITE_TRACE_PROFILE, | |
pkgdb_profile_callback, NULL); | |
} | |
*db_p = db; | |
return (EPKG_OK); | |
} | |
static void | |
pkgdb_free_repo(struct pkg_repo *repo) | |
{ | |
repo->ops->close(repo, false); | |
} | |
void | |
pkgdb_close(struct pkgdb *db) | |
{ | |
if (db == NULL) | |
return; | |
if (db->prstmt_initialized) | |
prstmt_finalize(db); | |
if (db->sqlite != NULL) { | |
tll_free_and_free(db->repos, pkgdb_free_repo); | |
if (!sqlite3_db_readonly(db->sqlite, "main")) | |
pkg_plugins_hook_run(PKG_PLUGIN_HOOK_PKGDB_CLOSE_RW, NULL, db); | |
sqlite3_close(db->sqlite); | |
} | |
sqlite3_shutdown(); | |
free(db); | |
} | |
/* How many times to try COMMIT or ROLLBACK if the DB is busy */ | |
#define BUSY_RETRIES 6 | |
#define BUSY_SLEEP 200 | |
/* This is a MACRO instead of a function as any sqlite3_* function that | |
* queries the DB can return SQLITE_BUSY. We would need a function to | |
* wrap all sqlite3_* API since we cannot pass anonymous functions/blocks | |
* in C. This can be used to wrap existing code. */ | |
#define PKGDB_SQLITE_RETRY_ON_BUSY(ret) \ | |
ret = SQLITE_BUSY; \ | |
for (int _sqlite_busy_retries = 0; \ | |
_sqlite_busy_retries < BUSY_RETRIES && ret == SQLITE_BUSY; \ | |
++_sqlite_busy_retries, ret == SQLITE_BUSY && \ | |
sqlite3_sleep(BUSY_SLEEP)) | |
static int | |
run_transaction(sqlite3 *sqlite, const char *query, const char *savepoint) | |
{ | |
int ret; | |
sqlite3_stmt *stmt; | |
char *sql = NULL; | |
assert(sqlite != NULL); | |
xasprintf(&sql, "%s %s", query, savepoint != NULL ? savepoint : ""); | |
pkg_debug(4, "Pkgdb: running '%s'", sql); | |
ret = sqlite3_prepare_v2(sqlite, sql, strlen(sql) + 1, &stmt, NULL); | |
if (ret == SQLITE_OK) { | |
PKGDB_SQLITE_RETRY_ON_BUSY(ret) | |
ret = sqlite3_step(stmt); | |
} | |
if (ret != SQLITE_OK && ret != SQLITE_DONE) { | |
ERROR_STMT_SQLITE(sqlite, stmt); | |
} | |
sqlite3_finalize(stmt); | |
free(sql); | |
return (ret == SQLITE_OK || ret == SQLITE_DONE ? EPKG_OK : EPKG_FATAL); | |
} | |
int | |
pkgdb_transaction_begin_sqlite(sqlite3 *sqlite, const char *savepoint) | |
{ | |
if (savepoint == NULL || savepoint[0] == '\0') { | |
return (run_transaction(sqlite, "BEGIN IMMEDIATE TRANSACTION", | |
NULL)); | |
} | |
return (run_transaction(sqlite, "SAVEPOINT", savepoint)); | |
} | |
int | |
pkgdb_transaction_commit_sqlite(sqlite3 *sqlite, const char *savepoint) | |
{ | |
if (savepoint == NULL || savepoint[0] == '\0') { | |
return (run_transaction(sqlite, "COMMIT TRANSACTION", NULL)); | |
} | |
return (run_transaction(sqlite, "RELEASE SAVEPOINT", savepoint)); | |
} | |
int | |
pkgdb_transaction_rollback_sqlite(sqlite3 *sqlite, const char *savepoint) | |
{ | |
if (savepoint == NULL || savepoint[0] == '\0') { | |
return (run_transaction(sqlite, "ROLLBACK TRANSACTION", NULL)); | |
} | |
return (run_transaction(sqlite, "ROLLBACK TO SAVEPOINT", savepoint)); | |
} | |
/* | |
* Public API | |
*/ | |
int | |
pkgdb_transaction_begin(struct pkgdb *db, const char *savepoint) | |
{ | |
return (pkgdb_transaction_begin_sqlite(db->sqlite, savepoint)); | |
} | |
int | |
pkgdb_transaction_commit(struct pkgdb *db, const char *savepoint) | |
{ | |
return (pkgdb_transaction_commit_sqlite(db->sqlite, savepoint)); | |
} | |
int | |
pkgdb_transaction_rollback(struct pkgdb *db, const char *savepoint) | |
{ | |
return (pkgdb_transaction_rollback_sqlite(db->sqlite, savepoint)); | |
} | |
/* By default, MATCH_EXACT and MATCH_REGEX are case sensitive. This | |
* is modified in many actions according to the value of | |
* CASE_SENSITIVE_MATCH in pkg.conf and then possbily reset again in | |
* pkg search et al according to command line flags */ | |
static bool _case_sensitive_flag = false; | |
void | |
pkgdb_set_case_sensitivity(bool case_sensitive) | |
{ | |
_case_sensitive_flag = case_sensitive; | |
return; | |
} | |
bool | |
pkgdb_case_sensitive(void) | |
{ | |
return (_case_sensitive_flag); | |
} | |
typedef enum _sql_prstmt_index { | |
MTREE = 0, | |
PKG, | |
DEPS_UPDATE, | |
DEPS, | |
FILES, | |
FILES_REPLACE, | |
DIRS1, | |
DIRS2, | |
CATEGORY1, | |
CATEGORY2, | |
LICENSES1, | |
LICENSES2, | |
USERS1, | |
USERS2, | |
GROUPS1, | |
GROUPS2, | |
SCRIPT1, | |
SCRIPT2, | |
OPTION1, | |
OPTION2, | |
SHLIBS1, | |
SHLIBS_REQD, | |
SHLIBS_PROV, | |
ANNOTATE1, | |
ANNOTATE2, | |
ANNOTATE_ADD1, | |
ANNOTATE_MOD1, | |
ANNOTATE_DEL1, | |
ANNOTATE_DEL2, | |
CONFLICT, | |
PKG_PROVIDE, | |
PROVIDE, | |
UPDATE_DIGEST, | |
CONFIG_FILES, | |
UPDATE_CONFIG_FILE, | |
PKG_REQUIRE, | |
REQUIRE, | |
LUASCRIPT1, | |
LUASCRIPT2, | |
PRSTMT_LAST, | |
} sql_prstmt_index; | |
static sql_prstmt sql_prepared_statements[PRSTMT_LAST] = { | |
[MTREE] = { | |
NULL, | |
NULL, | |
"T", | |
}, | |
[PKG] = { | |
NULL, | |
"INSERT OR REPLACE INTO packages( " | |
"origin, name, version, comment, desc, message, arch, " | |
"maintainer, www, prefix, flatsize, automatic, " | |
"licenselogic, time, manifestdigest, dep_formula, vital)" | |
"VALUES( ?1, ?2, ?3, ?4, ?5, ?6, ?7, ?8, ?9, ?10, ?11, ?12, " | |
"?13, NOW(), ?14, ?15, ?16 )", | |
"TTTTTTTTTTIIITTI", | |
}, | |
[DEPS_UPDATE] = { | |
NULL, | |
"UPDATE deps SET origin=?1, version=?2 WHERE name=?3;", | |
"TTT", | |
}, | |
[DEPS] = { | |
NULL, | |
"INSERT INTO deps (origin, name, version, package_id) " | |
"VALUES (?1, ?2, ?3, ?4)", | |
"TTTI", | |
}, | |
[FILES] = { | |
NULL, | |
"INSERT INTO files (path, sha256, package_id) " | |
"VALUES (?1, ?2, ?3)", | |
"TTI", | |
}, | |
[FILES_REPLACE] = { | |
NULL, | |
"INSERT OR REPLACE INTO files (path, sha256, package_id) " | |
"VALUES (?1, ?2, ?3)", | |
"TTI", | |
}, | |
[DIRS1] = { | |
NULL, | |
"INSERT OR IGNORE INTO directories(path) VALUES(?1)", | |
"T", | |
}, | |
[DIRS2] = { | |
NULL, | |
"INSERT INTO pkg_directories(package_id, directory_id, try) " | |
"VALUES (?1, " | |
"(SELECT id FROM directories WHERE path = ?2), ?3)", | |
"ITI", | |
}, | |
[CATEGORY1] = { | |
NULL, | |
"INSERT OR IGNORE INTO categories(name) VALUES(?1)", | |
"T", | |
}, | |
[CATEGORY2] = { | |
NULL, | |
"INSERT INTO pkg_categories(package_id, category_id) " | |
"VALUES (?1, (SELECT id FROM categories WHERE name = ?2))", | |
"IT", | |
}, | |
[LICENSES1] = { | |
NULL, | |
"INSERT OR IGNORE INTO licenses(name) VALUES(?1)", | |
"T", | |
}, | |
[LICENSES2] = { | |
NULL, | |
"INSERT INTO pkg_licenses(package_id, license_id) " | |
"VALUES (?1, (SELECT id FROM licenses WHERE name = ?2))", | |
"IT", | |
}, | |
[USERS1] = { | |
NULL, | |
"INSERT OR IGNORE INTO users(name) VALUES(?1)", | |
"T", | |
}, | |
[USERS2] = { | |
NULL, | |
"INSERT INTO pkg_users(package_id, user_id) " | |
"VALUES (?1, (SELECT id FROM users WHERE name = ?2))", | |
"IT", | |
}, | |
[GROUPS1] = { | |
NULL, | |
"INSERT OR IGNORE INTO groups(name) VALUES(?1)", | |
"T", | |
}, | |
[GROUPS2] = { | |
NULL, | |
"INSERT INTO pkg_groups(package_id, group_id) " | |
"VALUES (?1, (SELECT id FROM groups WHERE name = ?2))", | |
"IT", | |
}, | |
[SCRIPT1] = { | |
NULL, | |
"INSERT OR IGNORE INTO script(script) VALUES (?1)", | |
"T", | |
}, | |
[SCRIPT2] = { | |
NULL, | |
"INSERT INTO pkg_script(script_id, package_id, type) " | |
"VALUES ((SELECT script_id FROM script WHERE script = ?1), " | |
"?2, ?3)", | |
"TII", | |
}, | |
[OPTION1] = { | |
NULL, | |
"INSERT OR IGNORE INTO option (option) " | |
"VALUES (?1)", | |
"T", | |
}, | |
[OPTION2] = { | |
NULL, | |
"INSERT INTO pkg_option(package_id, option_id, value) " | |
"VALUES (?1, " | |
"(SELECT option_id FROM option WHERE option = ?2)," | |
"?3)", | |
"ITT", | |
}, | |
[SHLIBS1] = { | |
NULL, | |
"INSERT OR IGNORE INTO shlibs(name) VALUES(?1)", | |
"T", | |
}, | |
[SHLIBS_REQD] = { | |
NULL, | |
"INSERT OR IGNORE INTO pkg_shlibs_required(package_id, shlib_id) " | |
"VALUES (?1, (SELECT id FROM shlibs WHERE name = ?2))", | |
"IT", | |
}, | |
[SHLIBS_PROV] = { | |
NULL, | |
"INSERT OR IGNORE INTO pkg_shlibs_provided(package_id, shlib_id) " | |
"VALUES (?1, (SELECT id FROM shlibs WHERE name = ?2))", | |
"IT", | |
}, | |
[ANNOTATE1] = { | |
NULL, | |
"INSERT OR IGNORE INTO annotation(annotation) " | |
"VALUES (?1)", | |
"T", | |
}, | |
[ANNOTATE2] = { | |
NULL, | |
"INSERT OR ROLLBACK INTO pkg_annotation(package_id, tag_id, value_id) " | |
"VALUES (?1," | |
" (SELECT annotation_id FROM annotation WHERE annotation = ?2)," | |
" (SELECT annotation_id FROM annotation WHERE annotation = ?3))", | |
"ITT", | |
}, | |
[ANNOTATE_ADD1] = { | |
NULL, | |
"INSERT OR IGNORE INTO pkg_annotation(package_id, tag_id, value_id) " | |
"VALUES (" | |
" (SELECT id FROM packages WHERE name = ?1 )," | |
" (SELECT annotation_id FROM annotation WHERE annotation = ?2)," | |
" (SELECT annotation_id FROM annotation WHERE annotation = ?3))", | |
"TTTT", // "TTT"??? | |
}, | |
[ANNOTATE_MOD1] = { | |
NULL, | |
"INSERT OR REPLACE INTO pkg_annotation(package_id, tag_id, value_id) " | |
"VALUES (" | |
" (SELECT id FROM packages WHERE name = ?1 )," | |
" (SELECT annotation_id FROM annotation WHERE annotation = ?2)," | |
" (SELECT annotation_id FROM annotation WHERE annotation = ?3))", | |
"TTTT", // "TTT"??? | |
}, | |
[ANNOTATE_DEL1] = { | |
NULL, | |
"DELETE FROM pkg_annotation WHERE " | |
"package_id IN" | |
" (SELECT id FROM packages WHERE name = ?1) " | |
"AND tag_id IN" | |
" (SELECT annotation_id FROM annotation WHERE annotation = ?2)", | |
"TTT", // "TT"??? | |
}, | |
[ANNOTATE_DEL2] = { | |
NULL, | |
"DELETE FROM annotation WHERE" | |
" annotation_id NOT IN (SELECT tag_id FROM pkg_annotation) AND" | |
" annotation_id NOT IN (SELECT value_id FROM pkg_annotation)", | |
"", | |
}, | |
[CONFLICT] = { | |
NULL, | |
"INSERT INTO pkg_conflicts(package_id, conflict_id) " | |
"VALUES (?1, (SELECT id FROM packages WHERE name = ?2))", | |
"IT", | |
}, | |
[PKG_PROVIDE] = { | |
NULL, | |
"INSERT INTO pkg_provides(package_id, provide_id) " | |
"VALUES (?1, (SELECT id FROM provides WHERE provide = ?2))", | |
"IT", | |
}, | |
[PROVIDE] = { | |
NULL, | |
"INSERT OR IGNORE INTO provides(provide) VALUES(?1)", | |
"T", | |
}, | |
[UPDATE_DIGEST] = { | |
NULL, | |
"UPDATE packages SET manifestdigest=?1 WHERE id=?2;", | |
"TI" | |
}, | |
[CONFIG_FILES] = { | |
NULL, | |
"INSERT INTO config_files(path, content, package_id) " | |
"VALUES (?1, ?2, ?3);", | |
"TTI" | |
}, | |
[UPDATE_CONFIG_FILE] = { | |
NULL, | |
"UPDATE config_files SET content=?1 WHERE path=?2;", | |
"TT" | |
}, | |
[PKG_REQUIRE] = { | |
NULL, | |
"INSERT INTO pkg_requires(package_id, require_id) " | |
"VALUES (?1, (SELECT id FROM requires WHERE require = ?2))", | |
"IT", | |
}, | |
[REQUIRE] = { | |
NULL, | |
"INSERT OR IGNORE INTO requires(require) VALUES(?1)", | |
"T" | |
}, | |
[LUASCRIPT1] = { | |
NULL, | |
"INSERT OR IGNORE INTO lua_script(lua_script) VALUES (?1)", | |
"T", | |
}, | |
[LUASCRIPT2] = { | |
NULL, | |
"INSERT INTO pkg_lua_script(lua_script_id, package_id, type) " | |
"VALUES ((SELECT lua_script_id FROM lua_script WHERE " | |
"lua_script = ?1), ?2, ?3)", | |
"TII", | |
}, | |
/* PRSTMT_LAST */ | |
}; | |
static int | |
prstmt_initialize(struct pkgdb *db) | |
{ | |
sql_prstmt_index i; | |
sqlite3 *sqlite; | |
assert(db != NULL); | |
if (!db->prstmt_initialized) { | |
sqlite = db->sqlite; | |
for (i = 0; i < PRSTMT_LAST; i++) { | |
if (SQL(i) == NULL) | |
continue; | |
STMT(i) = prepare_sql(sqlite, SQL(i)); | |
if (STMT(i) == NULL) | |
return (EPKG_FATAL); | |
} | |
db->prstmt_initialized = true; | |
} | |
return (EPKG_OK); | |
} | |
static int | |
run_prstmt(sql_prstmt_index s, ...) | |
{ | |
int retcode; /* Returns SQLITE error code */ | |
va_list ap; | |
sqlite3_stmt *stmt; | |
int i; | |
const char *argtypes; | |
stmt = STMT(s); | |
argtypes = sql_prepared_statements[s].argtypes; | |
sqlite3_reset(stmt); | |
va_start(ap, s); | |
for (i = 0; argtypes[i] != '\0'; i++) | |
{ | |
switch (argtypes[i]) { | |
case 'T': | |
sqlite3_bind_text(stmt, i + 1, va_arg(ap, const char*), | |
-1, SQLITE_STATIC); | |
break; | |
case 'I': | |
sqlite3_bind_int64(stmt, i + 1, va_arg(ap, int64_t)); | |
break; | |
} | |
} | |
va_end(ap); | |
pkg_debug(4, "Pkgdb, running '%s'", sqlite3_expanded_sql(stmt)); | |
retcode = sqlite3_step(stmt); | |
return (retcode); | |
} | |
static void | |
prstmt_finalize(struct pkgdb *db) | |
{ | |
sql_prstmt_index i; | |
for (i = 0; i < PRSTMT_LAST; i++) | |
{ | |
if (STMT(i) != NULL) { | |
sqlite3_finalize(STMT(i)); | |
STMT(i) = NULL; | |
} | |
} | |
db->prstmt_initialized = false; | |
return; | |
} | |
int | |
pkgdb_register_pkg(struct pkgdb *db, struct pkg *pkg, int forced, | |
const char *savepoint) | |
{ | |
struct pkg *pkg2 = NULL; | |
struct pkg_dep *dep = NULL; | |
struct pkg_file *file = NULL; | |
struct pkg_dir *dir = NULL; | |
struct pkg_option *option = NULL; | |
struct pkg_conflict *conflict = NULL; | |
struct pkg_config_file *cf = NULL; | |
struct pkgdb_it *it = NULL; | |
char *msg = NULL; | |
sqlite3 *s; | |
int ret; | |
int retcode = EPKG_FATAL; | |
int64_t package_id; | |
const char *arch; | |
assert(db != NULL); | |
if (pkg_is_valid(pkg) != EPKG_OK) { | |
pkg_emit_error("the package is not valid"); | |
return (EPKG_FATAL); | |
} | |
s = db->sqlite; | |
if (pkgdb_transaction_begin_sqlite(s, savepoint) != EPKG_OK) | |
return (EPKG_FATAL); | |
/* Prefer new ABI over old one */ | |
arch = pkg->abi != NULL ? pkg->abi : pkg->arch; | |
/* | |
* Insert package record | |
*/ | |
msg = pkg_message_to_str(pkg); | |
ret = run_prstmt(PKG, pkg->origin, pkg->name, pkg->version, | |
pkg->comment, pkg->desc, msg, arch, pkg->maintainer, | |
pkg->www, pkg->prefix, pkg->flatsize, (int64_t)pkg->automatic, | |
(int64_t)pkg->licenselogic, pkg->digest, pkg->dep_formula, (int64_t)pkg->vital); | |
if (ret != SQLITE_DONE) { | |
ERROR_STMT_SQLITE(s, STMT(PKG)); | |
goto cleanup; | |
} | |
package_id = sqlite3_last_insert_rowid(s); | |
/* | |
* Update dep information on packages that depend on the inserted | |
* package | |
*/ | |
if (run_prstmt(DEPS_UPDATE, pkg->origin, | |
pkg->version ? pkg->version : "", pkg->name) | |
!= SQLITE_DONE) { | |
ERROR_STMT_SQLITE(s, STMT(DEPS_UPDATE)); | |
goto cleanup; | |
} | |
/* | |
* Insert dependencies list | |
*/ | |
while (pkg_deps(pkg, &dep) == EPKG_OK) { | |
if (run_prstmt(DEPS, dep->origin, dep->name, | |
dep->version ? dep->version : "", | |
package_id) != SQLITE_DONE) { | |
ERROR_STMT_SQLITE(s, STMT(DEPS)); | |
goto cleanup; | |
} | |
} | |
/* | |
* Insert files. | |
*/ | |
while (pkg_files(pkg, &file) == EPKG_OK) { | |
bool permissive = false; | |
if (match_ucl_lists(file->path, | |
pkg_config_get("FILES_IGNORE_GLOB"), | |
pkg_config_get("FILES_IGNORE_REGEX"))) { | |
continue; | |
printf("matched\n"); | |
} | |
ret = run_prstmt(FILES, file->path, file->sum, package_id); | |
if (ret == SQLITE_DONE) | |
continue; | |
if (ret != SQLITE_CONSTRAINT) { | |
ERROR_STMT_SQLITE(s, STMT(FILES)); | |
goto cleanup; | |
} | |
it = pkgdb_query_which(db, file->path, false); | |
if (it == NULL) { | |
ERROR_SQLITE(s, "pkg which"); | |
goto cleanup; | |
} | |
pkg2 = NULL; | |
ret = pkgdb_it_next(it, &pkg2, PKG_LOAD_BASIC); | |
if (ret == EPKG_END) { | |
/* Stray entry in the files table not related to | |
any known package: overwrite this */ | |
ret = run_prstmt(FILES_REPLACE, file->path, file->sum, | |
package_id); | |
pkgdb_it_free(it); | |
if (ret == SQLITE_DONE) | |
continue; | |
else { | |
ERROR_STMT_SQLITE(s, STMT(FILES_REPLACE)); | |
goto cleanup; | |
} | |
} | |
if (ret != EPKG_OK && ret != EPKG_END) { | |
pkgdb_it_free(it); | |
ERROR_STMT_SQLITE(s, STMT(FILES_REPLACE)); | |
goto cleanup; | |
} | |
if (!forced) { | |
if (!ctx.developer_mode) | |
permissive = pkg_object_bool(pkg_config_get("PERMISSIVE")); | |
pkg_emit_error("%s-%s conflicts with %s-%s" | |
" (installs files into the same place). " | |
" Problematic file: %s%s", | |
pkg->name, pkg->version, pkg2->name, pkg2->version, file->path, | |
permissive ? " ignored by permissive mode" : ""); | |
pkg_free(pkg2); | |
if (!permissive) { | |
pkgdb_it_free(it); | |
goto cleanup; | |
} | |
} else { | |
pkg_emit_error("%s-%s conflicts with %s-%s" | |
" (installs files into the same place). " | |
" Problematic file: %s ignored by forced mode", | |
pkg->name, pkg->version, pkg2->name, pkg2->version, file->path); | |
pkg_free(pkg2); | |
} | |
pkgdb_it_free(it); | |
} | |
/* | |
* Insert config files | |
*/ | |
while (pkg_config_files(pkg, &cf) == EPKG_OK) { | |
if ((ret = run_prstmt(CONFIG_FILES, cf->path, cf->content, package_id) | |
!= SQLITE_DONE)) { | |
if (ret == SQLITE_CONSTRAINT) { | |
pkg_emit_error("Another package already owns :%s", | |
cf->path); | |
} else | |
ERROR_STMT_SQLITE(s, STMT(CONFIG_FILES)); | |
goto cleanup; | |
} | |
} | |
/* | |
* Insert dirs. | |
*/ | |
while (pkg_dirs(pkg, &dir) == EPKG_OK) { | |
if (run_prstmt(DIRS1, dir->path) != SQLITE_DONE) { | |
ERROR_STMT_SQLITE(s, STMT(DIRS1)); | |
goto cleanup; | |
} | |
if ((ret = run_prstmt(DIRS2, package_id, dir->path, | |
true)) != SQLITE_DONE) { | |
if (ret == SQLITE_CONSTRAINT) { | |
pkg_emit_error("Another package is already " | |
"providing directory: %s", | |
dir->path); | |
} else | |
ERROR_STMT_SQLITE(s, STMT(DIRS2)); | |
goto cleanup; | |
} | |
} | |
/* | |
* Insert categories | |
*/ | |
tll_foreach(pkg->categories, c) { | |
ret = run_prstmt(CATEGORY1, c->item); | |
if (ret == SQLITE_DONE) | |
ret = run_prstmt(CATEGORY2, package_id, c->item); | |
if (ret != SQLITE_DONE) { | |
ERROR_STMT_SQLITE(s, STMT(CATEGORY2)); | |
goto cleanup; | |
} | |
} | |
/* | |
* Insert licenses | |
*/ | |
tll_foreach(pkg->licenses, l) { | |
if (run_prstmt(LICENSES1, l->item) | |
!= SQLITE_DONE | |
|| | |
run_prstmt(LICENSES2, package_id, l->item) | |
!= SQLITE_DONE) { | |
ERROR_STMT_SQLITE(s, STMT(LICENSES2)); | |
goto cleanup; | |
} | |
} | |
/* | |
* Insert users | |
*/ | |
tll_foreach(pkg->users, u) { | |
if (run_prstmt(USERS1, u->item) | |
!= SQLITE_DONE | |
|| | |
run_prstmt(USERS2, package_id, u->item) | |
!= SQLITE_DONE) { | |
ERROR_STMT_SQLITE(s, STMT(USERS2)); | |
goto cleanup; | |
} | |
} | |
/* | |
* Insert groups | |
*/ | |
tll_foreach(pkg->groups, g) { | |
if (run_prstmt(GROUPS1, g->item) | |
!= SQLITE_DONE | |
|| | |
run_prstmt(GROUPS2, package_id, g->item) | |
!= SQLITE_DONE) { | |
ERROR_STMT_SQLITE(s, STMT(GROUPS2)); | |
goto cleanup; | |
} | |
} | |
/* | |
* Insert scripts | |
*/ | |
if (pkgdb_insert_scripts(pkg, package_id, s) != EPKG_OK) | |
goto cleanup; | |
/* | |
* Insert lua scripts | |
*/ | |
if (pkgdb_insert_lua_scripts(pkg, package_id, s) != EPKG_OK) | |
goto cleanup; | |
/* | |
* Insert options | |
*/ | |
while (pkg_options(pkg, &option) == EPKG_OK) { | |
if (run_prstmt(OPTION1, option->key) != SQLITE_DONE | |
|| | |
run_prstmt(OPTION2, package_id, option->key, option->value) | |
!= SQLITE_DONE) { | |
ERROR_STMT_SQLITE(s, STMT(OPTION2)); | |
goto cleanup; | |
} | |
} | |
/* | |
* Insert shlibs | |
*/ | |
if (pkgdb_update_shlibs_required(pkg, package_id, s) != EPKG_OK) | |
goto cleanup; | |
if (pkgdb_update_shlibs_provided(pkg, package_id, s) != EPKG_OK) | |
goto cleanup; | |
/* | |
* Insert annotation | |
*/ | |
if (pkgdb_insert_annotations(pkg, package_id, s) != EPKG_OK) | |
goto cleanup; | |
/* | |
* Insert conflicts | |
*/ | |
while (pkg_conflicts(pkg, &conflict) == EPKG_OK) { | |
if (run_prstmt(CONFLICT, package_id, conflict->uid) | |
!= SQLITE_DONE) { | |
ERROR_STMT_SQLITE(s, STMT(CONFLICT)); | |
goto cleanup; | |
} | |
} | |
/* | |
* Insert provides | |
*/ | |
if (pkgdb_update_provides(pkg, package_id, s) != EPKG_OK) | |
goto cleanup; | |
if (pkgdb_update_requires(pkg, package_id, s) != EPKG_OK) | |
goto cleanup; | |
retcode = EPKG_OK; | |
cleanup: | |
free(msg); | |
return (retcode); | |
} | |
static int | |
pkgdb_insert_scripts(struct pkg *pkg, int64_t package_id, sqlite3 *s) | |
{ | |
const char *script; | |
int64_t i; | |
for (i = 0; i < PKG_NUM_SCRIPTS; i++) { | |
script = pkg_script_get(pkg, i); | |
if (script == NULL) | |
continue; | |
if (run_prstmt(SCRIPT1, script) != SQLITE_DONE | |
|| | |
run_prstmt(SCRIPT2, script, package_id, i) != SQLITE_DONE) { | |
ERROR_STMT_SQLITE(s, STMT(SCRIPT2)); | |
return (EPKG_FATAL); | |
} | |
} | |
return (EPKG_OK); | |
} | |
static int | |
pkgdb_insert_lua_scripts(struct pkg *pkg, int64_t package_id, sqlite3 *s) | |
{ | |
int64_t i; | |
for (i = 0; i < PKG_NUM_LUA_SCRIPTS; i++) { | |
tll_foreach(pkg->lua_scripts[i], script) { | |
if (run_prstmt(LUASCRIPT1, script->item) != SQLITE_DONE | |
|| | |
run_prstmt(LUASCRIPT2, script->item, package_id, i) != SQLITE_DONE) { | |
ERROR_STMT_SQLITE(s, STMT(LUASCRIPT2)); | |
return (EPKG_FATAL); | |
} | |
} | |
} | |
return (EPKG_OK); | |
} | |
int | |
pkgdb_update_shlibs_required(struct pkg *pkg, int64_t package_id, sqlite3 *s) | |
{ | |
tll_foreach(pkg->shlibs_required, r) { | |
if (run_prstmt(SHLIBS1, r->item) | |
!= SQLITE_DONE | |
|| | |
run_prstmt(SHLIBS_REQD, package_id, r->item) | |
!= SQLITE_DONE) { | |
ERROR_STMT_SQLITE(s, STMT(SHLIBS_REQD)); | |
return (EPKG_FATAL); | |
} | |
} | |
return (EPKG_OK); | |
} | |
int | |
pkgdb_update_config_file_content(struct pkg *p, sqlite3 *s) | |
{ | |
struct pkg_config_file *cf = NULL; | |
while (pkg_config_files(p, &cf) == EPKG_OK) { | |
if (run_prstmt(UPDATE_CONFIG_FILE, cf->content, cf->path) | |
!= SQLITE_DONE) { | |
ERROR_STMT_SQLITE(s, STMT(SHLIBS_REQD)); | |
return (EPKG_FATAL); | |
} | |
} | |
return (EPKG_OK); | |
} | |
int | |
pkgdb_update_shlibs_provided(struct pkg *pkg, int64_t package_id, sqlite3 *s) | |
{ | |
tll_foreach(pkg->shlibs_provided, r) { | |
if (run_prstmt(SHLIBS1, r->item) | |
!= SQLITE_DONE | |
|| | |
run_prstmt(SHLIBS_PROV, package_id, r->item) | |
!= SQLITE_DONE) { | |
ERROR_STMT_SQLITE(s, STMT(SHLIBS_PROV)); | |
return (EPKG_FATAL); | |
} | |
} | |
return (EPKG_OK); | |
} | |
int | |
pkgdb_update_requires(struct pkg *pkg, int64_t package_id, sqlite3 *s) | |
{ | |
tll_foreach(pkg->requires, r) { | |
if (run_prstmt(REQUIRE, r->item) | |
!= SQLITE_DONE | |
|| | |
run_prstmt(PKG_REQUIRE, package_id, r->item) | |
!= SQLITE_DONE) { | |
ERROR_STMT_SQLITE(s, STMT(PKG_REQUIRE)); | |
return (EPKG_FATAL); | |
} | |
} | |
return (EPKG_OK); | |
} | |
int | |
pkgdb_update_provides(struct pkg *pkg, int64_t package_id, sqlite3 *s) | |
{ | |
tll_foreach(pkg->provides, p) { | |
if (run_prstmt(PROVIDE, p->item) | |
!= SQLITE_DONE | |
|| | |
run_prstmt(PKG_PROVIDE, package_id, p->item) | |
!= SQLITE_DONE) { | |
ERROR_STMT_SQLITE(s, STMT(PKG_PROVIDE)); | |
return (EPKG_FATAL); | |
} | |
} | |
return (EPKG_OK); | |
} | |
int | |
pkgdb_insert_annotations(struct pkg *pkg, int64_t package_id, sqlite3 *s) | |
{ | |
struct pkg_kv *kv; | |
tll_foreach(pkg->annotations, k) { | |
kv = k->item; | |
if (run_prstmt(ANNOTATE1, kv->key) | |
!= SQLITE_DONE | |
|| | |
run_prstmt(ANNOTATE1,kv->value) | |
!= SQLITE_DONE | |
|| | |
run_prstmt(ANNOTATE2, package_id, | |
kv->key, kv->value) | |
!= SQLITE_DONE) { | |
ERROR_STMT_SQLITE(s, STMT(ANNOTATE2)); | |
return (EPKG_FATAL); | |
} | |
} | |
return (EPKG_OK); | |
} | |
int | |
pkgdb_reanalyse_shlibs(struct pkgdb *db, struct pkg *pkg) | |
{ | |
sqlite3 *s; | |
int64_t package_id; | |
int ret = EPKG_OK; | |
int i; | |
const char *sql[] = { | |
"DELETE FROM pkg_shlibs_required WHERE package_id = ?1", | |
"DELETE FROM pkg_shlibs_provided WHERE package_id = ?1", | |
"DELETE FROM shlibs " | |
"WHERE id NOT IN " | |
"(SELECT DISTINCT shlib_id FROM pkg_shlibs_required)" | |
"AND id NOT IN " | |
"(SELECT DISTINCT shlib_id FROM pkg_shlibs_provided)", | |
}; | |
sqlite3_stmt *stmt_del; | |
assert(db != NULL); | |
if (pkg_is_valid(pkg) != EPKG_OK) { | |
pkg_emit_error("the package is not valid"); | |
return (EPKG_FATAL); | |
} | |
if ((ret = pkg_analyse_files(db, pkg, NULL)) == EPKG_OK) { | |
s = db->sqlite; | |
package_id = pkg->id; | |
for (i = 0; i < 2; i++) { | |
/* Clean out old shlibs first */ | |
stmt_del = prepare_sql(db->sqlite, sql[i]); | |
if (stmt_del == NULL) | |
return (EPKG_FATAL); | |
sqlite3_bind_int64(stmt_del, 1, package_id); | |
pkg_debug(4, "Pkgdb: running '%s'", sqlite3_expanded_sql(stmt_del)); | |
ret = sqlite3_step(stmt_del); | |
if (ret != SQLITE_DONE) { | |
ERROR_STMT_SQLITE(db->sqlite, stmt_del); | |
sqlite3_finalize(stmt_del); | |
return (EPKG_FATAL); | |
} | |
sqlite3_finalize(stmt_del); | |
} | |
if (sql_exec(db->sqlite, sql[2]) != EPKG_OK) | |
return (EPKG_FATAL); | |
/* Save shlibs */ | |
ret = pkgdb_update_shlibs_required(pkg, package_id, s); | |
if (ret == EPKG_OK) | |
ret = pkgdb_update_shlibs_provided(pkg, package_id, s); | |
} | |
return (ret); | |
} | |
int | |
pkgdb_add_annotation(struct pkgdb *db, struct pkg *pkg, const char *tag, | |
const char *value) | |
{ | |
int rows_changed; | |
assert(pkg != NULL); | |
assert(tag != NULL); | |
assert(value != NULL); | |
if (run_prstmt(ANNOTATE1, tag) != SQLITE_DONE | |
|| | |
run_prstmt(ANNOTATE1, value) != SQLITE_DONE | |
|| | |
run_prstmt(ANNOTATE_ADD1, pkg->uid, tag, value) | |
!= SQLITE_DONE) { | |
ERROR_STMT_SQLITE(db->sqlite, STMT(ANNOTATE_ADD1)); | |
pkgdb_transaction_rollback_sqlite(db->sqlite, NULL); | |
return (EPKG_FATAL); | |
} | |
/* Expect rows_changed == 1 unless there's already an | |
annotation using the given tag */ | |
rows_changed = sqlite3_changes(db->sqlite); | |
return (rows_changed == 1 ? EPKG_OK : EPKG_WARN); | |
} | |
int | |
pkgdb_set_pkg_digest(struct pkgdb *db, struct pkg *pkg) | |
{ | |
assert(pkg != NULL); | |
assert(db != NULL); | |
if (run_prstmt(UPDATE_DIGEST, pkg->digest, pkg->id) != SQLITE_DONE) { | |
ERROR_STMT_SQLITE(db->sqlite, STMT(UPDATE_DIGEST)); | |
return (EPKG_FATAL); | |
} | |
return (EPKG_OK); | |
} | |
int | |
pkgdb_modify_annotation(struct pkgdb *db, struct pkg *pkg, const char *tag, | |
const char *value) | |
{ | |
int rows_changed; | |
assert(pkg!= NULL); | |
assert(tag != NULL); | |
assert(value != NULL); | |
if (pkgdb_transaction_begin_sqlite(db->sqlite, NULL) != EPKG_OK) | |
return (EPKG_FATAL); | |
if (run_prstmt(ANNOTATE1, tag) != SQLITE_DONE | |
|| | |
run_prstmt(ANNOTATE1, value) != SQLITE_DONE | |
|| | |
run_prstmt(ANNOTATE_MOD1, pkg->uid, tag, value) != | |
SQLITE_DONE) { | |
ERROR_STMT_SQLITE(db->sqlite, STMT(ANNOTATE_MOD1)); | |
pkgdb_transaction_rollback_sqlite(db->sqlite, NULL); | |
return (EPKG_FATAL); | |
} | |
rows_changed = sqlite3_changes(db->sqlite); | |
if (run_prstmt(ANNOTATE_DEL2) != SQLITE_DONE) { | |
ERROR_STMT_SQLITE(db->sqlite, STMT(ANNOTATE_DEL2)); | |
pkgdb_transaction_rollback_sqlite(db->sqlite, NULL); | |
return (EPKG_FATAL); | |
} | |
if (pkgdb_transaction_commit_sqlite(db->sqlite, NULL) != EPKG_OK) | |
return (EPKG_FATAL); | |
/* Something has gone very wrong if rows_changed != 1 here */ | |
return (rows_changed == 1 ? EPKG_OK : EPKG_WARN); | |
} | |
int | |
pkgdb_delete_annotation(struct pkgdb *db, struct pkg *pkg, const char *tag) | |
{ | |
int rows_changed; | |
bool result; | |
assert(pkg != NULL); | |
assert(tag != NULL); | |
if (pkgdb_transaction_begin_sqlite(db->sqlite, NULL) != EPKG_OK) | |
return (EPKG_FATAL); | |
result = (run_prstmt(ANNOTATE_DEL1, pkg->uid, tag) | |
== SQLITE_DONE); | |
rows_changed = sqlite3_changes(db->sqlite); | |
if (!result | |
|| | |
run_prstmt(ANNOTATE_DEL2) != SQLITE_DONE) { | |
ERROR_STMT_SQLITE(db->sqlite, STMT(ANNOTATE_DEL2)); | |
pkgdb_transaction_rollback_sqlite(db->sqlite, NULL); | |
return (EPKG_FATAL); | |
} | |
if (pkgdb_transaction_commit_sqlite(db->sqlite, NULL) != EPKG_OK) | |
return (EPKG_FATAL); | |
return (rows_changed == 1 ? EPKG_OK : EPKG_WARN); | |
} | |
int | |
pkgdb_register_finale(struct pkgdb *db, int retcode, const char *savepoint) | |
{ | |
int ret = EPKG_OK; | |
assert(db != NULL); | |
if (retcode == EPKG_OK) | |
ret = pkgdb_transaction_commit_sqlite(db->sqlite, savepoint); | |
else | |
ret = pkgdb_transaction_rollback_sqlite(db->sqlite, savepoint); | |
return (ret); | |
} | |
int | |
pkgdb_register_ports(struct pkgdb *db, struct pkg *pkg) | |
{ | |
int ret; | |
pkg_emit_install_begin(pkg); | |
ret = pkgdb_register_pkg(db, pkg, 0, NULL); | |
if (ret == EPKG_OK) | |
pkg_emit_install_finished(pkg, NULL); | |
pkgdb_register_finale(db, ret, NULL); | |
return (ret); | |
} | |
int | |
pkgdb_unregister_pkg(struct pkgdb *db, int64_t id) | |
{ | |
sqlite3_stmt *stmt_del; | |
unsigned int obj; | |
int ret; | |
const char sql[] = "" | |
"DELETE FROM packages WHERE id = ?1;"; | |
const char *deletions[] = { | |
"directories WHERE id NOT IN " | |
"(SELECT DISTINCT directory_id FROM pkg_directories)", | |
"categories WHERE id NOT IN " | |
"(SELECT DISTINCT category_id FROM pkg_categories)", | |
"licenses WHERE id NOT IN " | |
"(SELECT DISTINCT license_id FROM pkg_licenses)", | |
/* TODO print the users that are not used anymore */ | |
"users WHERE id NOT IN " | |
"(SELECT DISTINCT user_id FROM pkg_users)", | |
/* TODO print the groups trhat are not used anymore */ | |
"groups WHERE id NOT IN " | |
"(SELECT DISTINCT group_id FROM pkg_groups)", | |
"shlibs WHERE id NOT IN " | |
"(SELECT DISTINCT shlib_id FROM pkg_shlibs_required)" | |
"AND id NOT IN " | |
"(SELECT DISTINCT shlib_id FROM pkg_shlibs_provided)", | |
"script WHERE script_id NOT IN " | |
"(SELECT DISTINCT script_id FROM pkg_script)", | |
"lua_script WHERE lua_script_id NOT IN " | |
"(SELECT DISTINCT lua_script_id FROM pkg_lua_script)", | |
}; | |
assert(db != NULL); | |
stmt_del = prepare_sql(db->sqlite, sql); | |
if (stmt_del == NULL) | |
return (EPKG_FATAL); | |
sqlite3_bind_int64(stmt_del, 1, id); | |
pkg_debug(4, "Pkgdb: running '%s'", sqlite3_expanded_sql(stmt_del)); | |
ret = sqlite3_step(stmt_del); | |
if (ret != SQLITE_DONE) { | |
ERROR_STMT_SQLITE(db->sqlite, stmt_del); | |
sqlite3_finalize(stmt_del); | |
return (EPKG_FATAL); | |
} | |
sqlite3_finalize(stmt_del); | |
for (obj = 0 ;obj < NELEM(deletions); obj++) { | |
ret = sql_exec(db->sqlite, "DELETE FROM %s;", deletions[obj]); | |
if (ret != EPKG_OK) | |
return (EPKG_FATAL); | |
} | |
return (EPKG_OK); | |
} | |
int | |
sql_exec(sqlite3 *s, const char *sql, ...) | |
{ | |
va_list ap; | |
const char *sql_to_exec; | |
char *sqlbuf = NULL; | |
char *errmsg; | |
int ret = EPKG_FATAL; | |
assert(s != NULL); | |
assert(sql != NULL); | |
if (strchr(sql, '%') != NULL) { | |
va_start(ap, sql); | |
sqlbuf = sqlite3_vmprintf(sql, ap); | |
va_end(ap); | |
sql_to_exec = sqlbuf; | |
} else { | |
sql_to_exec = sql; | |
} | |
pkg_debug(4, "Pkgdb: executing '%s'", sql_to_exec); | |
if (sqlite3_exec(s, sql_to_exec, NULL, NULL, &errmsg) != SQLITE_OK) { | |
ERROR_SQLITE(s, sql_to_exec); | |
sqlite3_free(errmsg); | |
goto cleanup; | |
} | |
ret = EPKG_OK; | |
cleanup: | |
if (sqlbuf != NULL) | |
sqlite3_free(sqlbuf); | |
return (ret); | |
} | |
int | |
get_pragma(sqlite3 *s, const char *sql, int64_t *res, bool silence) | |
{ | |
sqlite3_stmt *stmt; | |
int ret; | |
assert(s != NULL && sql != NULL); | |
pkg_debug(4, "Pkgdb: running '%s'", sql); | |
if (sqlite3_prepare_v2(s, sql, -1, &stmt, NULL) != SQLITE_OK) { | |
if (!silence) | |
ERROR_SQLITE(s, sql); | |
return (EPKG_OK); | |
} | |
PKGDB_SQLITE_RETRY_ON_BUSY(ret) | |
ret = sqlite3_step(stmt); | |
if (ret == SQLITE_ROW) | |
*res = sqlite3_column_int64(stmt, 0); | |
if (ret != SQLITE_ROW && !silence) | |
ERROR_STMT_SQLITE(s, stmt); | |
sqlite3_finalize(stmt); | |
return (ret == SQLITE_ROW ? EPKG_OK : EPKG_FATAL); | |
} | |
int | |
pkgdb_compact(struct pkgdb *db) | |
{ | |
int64_t page_count = 0; | |
int64_t freelist_count = 0; | |
int ret; | |
assert(db != NULL); | |
ret = get_pragma(db->sqlite, "PRAGMA page_count;", &page_count, false); | |
if (ret != EPKG_OK) | |
return (EPKG_FATAL); | |
ret = get_pragma(db->sqlite, "PRAGMA freelist_count;", | |
&freelist_count, false); | |
if (ret != EPKG_OK) | |
return (EPKG_FATAL); | |
/* | |
* Only compact if we will save 25% (or more) of the current | |
* used space. | |
*/ | |
if (freelist_count > 0 && freelist_count / (float)page_count < 0.25) | |
return (EPKG_OK); | |
return (sql_exec(db->sqlite, "VACUUM;")); | |
} | |
static int | |
pkgdb_vset(struct pkgdb *db, int64_t id, va_list ap) | |
{ | |
int attr; | |
sqlite3_stmt *stmt; | |
int64_t flatsize; | |
bool automatic, locked, vital; | |
char *oldval; | |
char *newval; | |
/* Ensure there is an entry for each of the pkg_set_attr enum values */ | |
const char *sql[PKG_SET_MAX] = { | |
[PKG_SET_FLATSIZE] = | |
"UPDATE packages SET flatsize = ?1 WHERE id = ?2", | |
[PKG_SET_AUTOMATIC] = | |
"UPDATE packages SET automatic = ?1 WHERE id = ?2", | |
[PKG_SET_LOCKED] = | |
"UPDATE packages SET locked = ?1 WHERE id = ?2", | |
[PKG_SET_DEPORIGIN] = | |
"UPDATE deps SET origin = ?1, " | |
"name=(SELECT name FROM packages WHERE origin = ?1), " | |
"version=(SELECT version FROM packages WHERE origin = ?1) " | |
"WHERE package_id = ?2 AND origin = ?3", | |
[PKG_SET_ORIGIN] = | |
"UPDATE packages SET origin=?1 WHERE id=?2", | |
[PKG_SET_DEPNAME] = | |
"UPDATE deps SET name = ?1, " | |
"version=(SELECT version FROM packages WHERE name = ?1) " | |
"WHERE package_id = ?2 AND name = ?3", | |
[PKG_SET_NAME] = | |
"UPDATE packages SET name=?1 WHERE id=?2", | |
[PKG_SET_VITAL] = | |
"UPDATE packages SET vital = ?1 WHERE id = ?2", | |
}; | |
while ((attr = va_arg(ap, int)) > 0) { | |
stmt = prepare_sql(db->sqlite, sql[attr]); | |
if (stmt == NULL) | |
return (EPKG_FATAL); | |
switch (attr) { | |
case PKG_SET_FLATSIZE: | |
flatsize = va_arg(ap, int64_t); | |
sqlite3_bind_int64(stmt, 1, flatsize); | |
sqlite3_bind_int64(stmt, 2, id); | |
break; | |
case PKG_SET_AUTOMATIC: | |
automatic = (bool)va_arg(ap, int); | |
sqlite3_bind_int64(stmt, 1, automatic); | |
sqlite3_bind_int64(stmt, 2, id); | |
break; | |
case PKG_SET_LOCKED: | |
locked = (bool)va_arg(ap, int); | |
sqlite3_bind_int64(stmt, 1, locked); | |
sqlite3_bind_int64(stmt, 2, id); | |
break; | |
case PKG_SET_DEPORIGIN: | |
case PKG_SET_DEPNAME: | |
oldval = va_arg(ap, char *); | |
newval = va_arg(ap, char *); | |
sqlite3_bind_text(stmt, 1, newval, -1, SQLITE_STATIC); | |
sqlite3_bind_int64(stmt, 2, id); | |
sqlite3_bind_text(stmt, 3, oldval, -1, SQLITE_STATIC); | |
break; | |
case PKG_SET_ORIGIN: | |
case PKG_SET_NAME: | |
newval = va_arg(ap, char *); | |
sqlite3_bind_text(stmt, 1, newval, -1, SQLITE_STATIC); | |
sqlite3_bind_int64(stmt, 2, id); | |
break; | |
case PKG_SET_VITAL: | |
vital = (bool)va_arg(ap, int); | |
sqlite3_bind_int64(stmt, 1, vital); | |
sqlite3_bind_int64(stmt, 2, id); | |
break; | |
} | |
pkg_debug(4, "Pkgdb: running '%s'", sqlite3_expanded_sql(stmt)); | |
if (sqlite3_step(stmt) != SQLITE_DONE) { | |
ERROR_STMT_SQLITE(db->sqlite, stmt); | |
sqlite3_finalize(stmt); | |
return (EPKG_FATAL); | |
} | |
sqlite3_finalize(stmt); | |
} | |
return (EPKG_OK); | |
} | |
int | |
pkgdb_set2(struct pkgdb *db, struct pkg *pkg, ...) | |
{ | |
int ret = EPKG_OK; | |
va_list ap; | |
assert(pkg != NULL); | |
va_start(ap, pkg); | |
ret = pkgdb_vset(db, pkg->id, ap); | |
va_end(ap); | |
return (ret); | |
} | |
int | |
pkgdb_file_set_cksum(struct pkgdb *db, struct pkg_file *file, | |
const char *sum) | |
{ | |
sqlite3_stmt *stmt = NULL; | |
const char sql_file_update[] = "" | |
"UPDATE files SET sha256 = ?1 WHERE path = ?2"; | |
stmt = prepare_sql(db->sqlite, sql_file_update); | |
if (stmt == NULL) | |
return (EPKG_FATAL); | |
sqlite3_bind_text(stmt, 1, sum, -1, SQLITE_STATIC); | |
sqlite3_bind_text(stmt, 2, file->path, -1, SQLITE_STATIC); | |
pkg_debug(4, "Pkgdb: running '%s'", sqlite3_expanded_sql(stmt)); | |
if (sqlite3_step(stmt) != SQLITE_DONE) { | |
ERROR_STMT_SQLITE(db->sqlite, stmt); | |
sqlite3_finalize(stmt); | |
return (EPKG_FATAL); | |
} | |
sqlite3_finalize(stmt); | |
file->sum = xstrdup(sum); | |
return (EPKG_OK); | |
} | |
/* | |
* create our custom functions in the sqlite3 connection. | |
* Used both in the shell and pkgdb_open | |
*/ | |
int | |
pkgdb_sqlcmd_init(sqlite3 *db, __unused const char **err, | |
__unused const void *noused) | |
{ | |
sqlite3_create_function(db, "now", 0, SQLITE_ANY|SQLITE_DETERMINISTIC, NULL, | |
pkgdb_now, NULL, NULL); | |
sqlite3_create_function(db, "regexp", 2, SQLITE_ANY|SQLITE_DETERMINISTIC, NULL, | |
pkgdb_regex, NULL, NULL); | |
sqlite3_create_function(db, "vercmp", 3, SQLITE_ANY|SQLITE_DETERMINISTIC, NULL, | |
pkgdb_vercmp, NULL, NULL); | |
return SQLITE_OK; | |
} | |
void | |
pkgdb_cmd(int argc, char **argv) | |
{ | |
sqlite3_shell(argc, argv); | |
} | |
void | |
pkgdb_init_proc(void) | |
{ | |
sqlite3_initialize(); | |
sqlite3_auto_extension((void(*)(void))pkgdb_sqlcmd_init); | |
} | |
void | |
pkgshell_opendb(const char **reponame) | |
{ | |
char localpath[MAXPATHLEN]; | |
snprintf(localpath, sizeof(localpath), "%s/local.sqlite", ctx.dbdir); | |
*reponame = xstrdup(localpath); | |
} | |
static int | |
pkgdb_write_lock_pid(struct pkgdb *db) | |
{ | |
const char lock_pid_sql[] = "" | |
"INSERT INTO pkg_lock_pid VALUES (?1);"; | |
sqlite3_stmt *stmt = NULL; | |
stmt = prepare_sql(db->sqlite, lock_pid_sql); | |
if (stmt == NULL) | |
return (EPKG_FATAL); | |
sqlite3_bind_int64(stmt, 1, (int64_t)getpid()); | |
if (sqlite3_step(stmt) != SQLITE_DONE) { | |
ERROR_SQLITE(db->sqlite, lock_pid_sql); | |
sqlite3_finalize(stmt); | |
return (EPKG_FATAL); | |
} | |
sqlite3_finalize(stmt); | |
return (EPKG_OK); | |
} | |
static int | |
pkgdb_remove_lock_pid(struct pkgdb *db, int64_t pid) | |
{ | |
const char lock_pid_sql[] = "" | |
"DELETE FROM pkg_lock_pid WHERE pid = ?1;"; | |
sqlite3_stmt *stmt = NULL; | |
stmt = prepare_sql(db->sqlite, lock_pid_sql); | |
if (stmt == NULL) | |
return (EPKG_FATAL); | |
sqlite3_bind_int64(stmt, 1, pid); | |
if (sqlite3_step(stmt) != SQLITE_DONE) { | |
ERROR_STMT_SQLITE(db->sqlite, stmt); | |
sqlite3_finalize(stmt); | |
return (EPKG_FATAL); | |
} | |
sqlite3_finalize(stmt); | |
return (EPKG_OK); | |
} | |
static int | |
pkgdb_check_lock_pid(struct pkgdb *db) | |
{ | |
sqlite3_stmt *stmt = NULL; | |
int found = 0; | |
int64_t pid, lpid; | |
const char query[] = "SELECT pid FROM pkg_lock_pid;"; | |
stmt = prepare_sql(db->sqlite, query); | |
if (stmt == NULL) | |
return (EPKG_FATAL); | |
lpid = getpid(); | |
while (sqlite3_step(stmt) != SQLITE_DONE) { | |
pid = sqlite3_column_int64(stmt, 0); | |
if (pid != lpid) { | |
if (kill((pid_t)pid, 0) == -1) { | |
pkg_debug(1, "found stale pid %lld in lock database, my pid is: %lld", | |
(long long)pid, (long long)lpid); | |
if (pkgdb_remove_lock_pid(db, pid) != EPKG_OK){ | |
sqlite3_finalize(stmt); | |
return (EPKG_FATAL); | |
} | |
} | |
else { | |
pkg_emit_notice("process with pid %lld still holds the lock", | |
(long long int)pid); | |
found ++; | |
} | |
} | |
} | |
if (found == 0) | |
return (EPKG_END); | |
return (EPKG_OK); | |
} | |
static int | |
pkgdb_reset_lock(struct pkgdb *db) | |
{ | |
const char init_sql[] = "" | |
"UPDATE pkg_lock SET exclusive=0, advisory=0, read=0;"; | |
int ret; | |
ret = sqlite3_exec(db->sqlite, init_sql, NULL, NULL, NULL); | |
if (ret == SQLITE_OK) | |
return (EPKG_OK); | |
return (EPKG_FATAL); | |
} | |
static int | |
pkgdb_try_lock(struct pkgdb *db, const char *lock_sql, pkgdb_lock_t type, | |
bool upgrade) | |
{ | |
unsigned int tries = 0; | |
struct timespec ts; | |
int ret = EPKG_END; | |
const pkg_object *timeout, *max_tries; | |
double num_timeout = 1.0; | |
int64_t num_maxtries = 1; | |
const char reset_lock_sql[] = "" | |
"DELETE FROM pkg_lock; INSERT INTO pkg_lock VALUES (0,0,0);"; | |
timeout = pkg_config_get("LOCK_WAIT"); | |
max_tries = pkg_config_get("LOCK_RETRIES"); | |
if (timeout) | |
num_timeout = pkg_object_int(timeout); | |
if (max_tries) | |
num_maxtries = pkg_object_int(max_tries); | |
while (tries <= num_maxtries) { | |
ret = sqlite3_exec(db->sqlite, lock_sql, NULL, NULL, NULL); | |
if (ret != SQLITE_OK) { | |
if (ret == SQLITE_READONLY && type == PKGDB_LOCK_READONLY) { | |
pkg_debug(1, "want read lock but cannot write to database, " | |
"slightly ignore this error for now"); | |
return (EPKG_OK); | |
} | |
return (EPKG_FATAL); | |
} | |
ret = EPKG_END; | |
if (sqlite3_changes(db->sqlite) == 0) { | |
if (pkgdb_check_lock_pid(db) == EPKG_END) { | |
/* No live processes found, so we can safely reset lock */ | |
pkg_debug(1, "no concurrent processes found, cleanup the lock"); | |
pkgdb_reset_lock(db); | |
if (upgrade) { | |
/* | |
* In case of upgrade we should obtain a lock from the beginning, | |
* hence switch upgrade to retain | |
*/ | |
pkgdb_remove_lock_pid(db, (int64_t)getpid()); | |
return pkgdb_obtain_lock(db, type); | |
} | |
else { | |
/* | |
* We might have inconsistent db, or some strange issue, so | |
* just insert new record and go forward | |
*/ | |
pkgdb_remove_lock_pid(db, (int64_t)getpid()); | |
sqlite3_exec(db->sqlite, reset_lock_sql, NULL, NULL, NULL); | |
return pkgdb_obtain_lock(db, type); | |
} | |
} | |
else if (num_timeout > 0) { | |
ts.tv_sec = (int)num_timeout; | |
ts.tv_nsec = (num_timeout - (int)num_timeout) * 1000000000.; | |
pkg_debug(1, "waiting for database lock for %d times, " | |
"next try in %.2f seconds", tries, num_timeout); | |
(void)nanosleep(&ts, NULL); | |
} | |
else { | |
break; | |
} | |
} | |
else if (!upgrade) { | |
ret = pkgdb_write_lock_pid(db); | |
break; | |
} | |
else { | |
ret = EPKG_OK; | |
break; | |
} | |
tries ++; | |
} | |
return (ret); | |
} | |
int | |
pkgdb_obtain_lock(struct pkgdb *db, pkgdb_lock_t type) | |
{ | |
int ret; | |
const char readonly_lock_sql[] = "" | |
"UPDATE pkg_lock SET read=read+1 WHERE exclusive=0;"; | |
const char advisory_lock_sql[] = "" | |
"UPDATE pkg_lock SET advisory=1 WHERE exclusive=0 AND advisory=0;"; | |
const char exclusive_lock_sql[] = "" | |
"UPDATE pkg_lock SET exclusive=1 WHERE exclusive=0 AND advisory=0 AND read=0;"; | |
const char *lock_sql = NULL; | |
assert(db != NULL); | |
switch (type) { | |
case PKGDB_LOCK_READONLY: | |
if (!ucl_object_toboolean(pkg_config_get("READ_LOCK"))) | |
return (EPKG_OK); | |
lock_sql = readonly_lock_sql; | |
pkg_debug(1, "want to get a read only lock on a database"); | |
break; | |
case PKGDB_LOCK_ADVISORY: | |
lock_sql = advisory_lock_sql; | |
pkg_debug(1, "want to get an advisory lock on a database"); | |
break; | |
case PKGDB_LOCK_EXCLUSIVE: | |
pkg_debug(1, "want to get an exclusive lock on a database"); | |
lock_sql = exclusive_lock_sql; | |
break; | |
} | |
ret = pkgdb_try_lock(db, lock_sql, type, false); | |
if (ret != EPKG_OK) | |
pkg_debug(1, "failed to obtain the lock: %s", | |
sqlite3_errmsg(db->sqlite)); | |
return (ret); | |
} | |
int | |
pkgdb_upgrade_lock(struct pkgdb *db, pkgdb_lock_t old_type, pkgdb_lock_t new_type) | |
{ | |
const char advisory_exclusive_lock_sql[] = "" | |
"UPDATE pkg_lock SET exclusive=1,advisory=1 WHERE exclusive=0 AND advisory=1 AND read=0;"; | |
int ret = EPKG_FATAL; | |
assert(db != NULL); | |
if (old_type == PKGDB_LOCK_ADVISORY && new_type == PKGDB_LOCK_EXCLUSIVE) { | |
pkg_debug(1, "want to upgrade advisory to exclusive lock"); | |
ret = pkgdb_try_lock(db, advisory_exclusive_lock_sql, | |
new_type, true); | |
} | |
return (ret); | |
} | |
int | |
pkgdb_downgrade_lock(struct pkgdb *db, pkgdb_lock_t old_type, | |
pkgdb_lock_t new_type) | |
{ | |
const char downgrade_exclusive_lock_sql[] = "" | |
"UPDATE pkg_lock SET exclusive=0,advisory=1 WHERE exclusive=1 " | |
"AND advisory=1 AND read=0;"; | |
int ret = EPKG_FATAL; | |
assert(db != NULL); | |
if (old_type == PKGDB_LOCK_EXCLUSIVE && | |
new_type == PKGDB_LOCK_ADVISORY) { | |
pkg_debug(1, "want to downgrade exclusive to advisory lock"); | |
ret = pkgdb_try_lock(db, downgrade_exclusive_lock_sql, | |
new_type, true); | |
} | |
return (ret); | |
} | |
int | |
pkgdb_release_lock(struct pkgdb *db, pkgdb_lock_t type) | |
{ | |
const char readonly_unlock_sql[] = "" | |
"UPDATE pkg_lock SET read=read-1 WHERE read>0;"; | |
const char advisory_unlock_sql[] = "" | |
"UPDATE pkg_lock SET advisory=0 WHERE advisory=1;"; | |
const char exclusive_unlock_sql[] = "" | |
"UPDATE pkg_lock SET exclusive=0 WHERE exclusive=1;"; | |
const char *unlock_sql = NULL; | |
int ret = EPKG_FATAL; | |
if (db == NULL) | |
return (EPKG_OK); | |
switch (type) { | |
case PKGDB_LOCK_READONLY: | |
if (!ucl_object_toboolean(pkg_config_get("READ_LOCK"))) | |
return (EPKG_OK); | |
unlock_sql = readonly_unlock_sql; | |
pkg_debug(1, "release a read only lock on a database"); | |
break; | |
case PKGDB_LOCK_ADVISORY: | |
unlock_sql = advisory_unlock_sql; | |
pkg_debug(1, "release an advisory lock on a database"); | |
break; | |
case PKGDB_LOCK_EXCLUSIVE: | |
pkg_debug(1, "release an exclusive lock on a database"); | |
unlock_sql = exclusive_unlock_sql; | |
break; | |
} | |
ret = sqlite3_exec(db->sqlite, unlock_sql, NULL, NULL, NULL); | |
if (ret != SQLITE_OK) | |
return (EPKG_FATAL); | |
if (sqlite3_changes(db->sqlite) == 0) | |
return (EPKG_END); | |
return pkgdb_remove_lock_pid(db, (int64_t)getpid()); | |
} | |
int64_t | |
pkgdb_stats(struct pkgdb *db, pkg_stats_t type) | |
{ | |
sqlite3_stmt *stmt = NULL; | |
int64_t stats = 0; | |
const char *sql = NULL; | |
assert(db != NULL); | |
switch(type) { | |
case PKG_STATS_LOCAL_COUNT: | |
sql = "SELECT COUNT(id) FROM main.packages;"; | |
break; | |
case PKG_STATS_LOCAL_SIZE: | |
sql = "SELECT SUM(flatsize) FROM main.packages;"; | |
break; | |
case PKG_STATS_REMOTE_UNIQUE: | |
case PKG_STATS_REMOTE_COUNT: | |
case PKG_STATS_REMOTE_SIZE: | |
tll_foreach(db->repos, rit) { | |
if (rit->item->ops->stat != NULL) | |
stats += rit->item->ops->stat(rit->item, type); | |
} | |
return (stats); | |
break; | |
case PKG_STATS_REMOTE_REPOS: | |
return (tll_length(db->repos)); | |
break; | |
} | |
stmt = prepare_sql(db->sqlite, sql); | |
if (stmt == NULL) | |
return (-1); | |
while (sqlite3_step(stmt) != SQLITE_DONE) { | |
stats = sqlite3_column_int64(stmt, 0); | |
pkg_debug(4, "Pkgdb: running '%s'", sqlite3_expanded_sql(stmt)); | |
} | |
sqlite3_finalize(stmt); | |
return (stats); | |
} | |
int | |
pkgdb_begin_solver(struct pkgdb *db) | |
{ | |
const char solver_sql[] = "" | |
"BEGIN TRANSACTION;"; | |
const char update_digests_sql[] = "" | |
"DROP INDEX IF EXISTS pkg_digest_id;" | |
"BEGIN TRANSACTION;"; | |
const char end_update_sql[] = "" | |
"END TRANSACTION;" | |
"CREATE INDEX pkg_digest_id ON packages(name, manifestdigest);"; | |
struct pkgdb_it *it; | |
struct pkg *p = NULL; | |
tll(struct pkg *) pkglist = tll_init(); | |
int rc = EPKG_OK; | |
int64_t cnt = 0, cur = 0; | |
it = pkgdb_query_cond(db, " WHERE manifestdigest IS NULL OR manifestdigest==''", | |
NULL, MATCH_ALL); | |
if (it != NULL) { | |
while (pkgdb_it_next(it, &p, PKG_LOAD_BASIC|PKG_LOAD_OPTIONS) == EPKG_OK) { | |
pkg_checksum_calculate(p, NULL, false, true, false); | |
tll_push_front(pkglist, p); | |
p = NULL; | |
cnt ++; | |
} | |
pkgdb_it_free(it); | |
if (tll_length(pkglist) > 0) { | |
rc = sql_exec(db->sqlite, update_digests_sql); | |
if (rc != EPKG_OK) { | |
ERROR_SQLITE(db->sqlite, update_digests_sql); | |
} | |
else { | |
pkg_emit_progress_start("Updating database digests format"); | |
tll_foreach(pkglist, pit) { | |
p = pit->item; | |
pkg_emit_progress_tick(cur++, cnt); | |
rc = run_prstmt(UPDATE_DIGEST, p->digest, p->id); | |
if (rc != SQLITE_DONE) { | |
assert(0); | |
ERROR_STMT_SQLITE(db->sqlite, STMT(UPDATE_DIGEST)); | |
} | |
} | |
pkg_emit_progress_tick(cnt, cnt); | |
if (rc == SQLITE_DONE) | |
rc = sql_exec(db->sqlite, end_update_sql); | |
if (rc != SQLITE_OK) | |
ERROR_SQLITE(db->sqlite, end_update_sql); | |
} | |
} | |
if (rc == EPKG_OK) | |
rc = sql_exec(db->sqlite, solver_sql); | |
tll_free_and_free(pkglist, pkg_free); | |
} else { | |
rc = sql_exec(db->sqlite, solver_sql); | |
} | |
return (rc); | |
} | |
int | |
pkgdb_end_solver(struct pkgdb *db) | |
{ | |
const char solver_sql[] = "" | |
"END TRANSACTION;"; | |
return (sql_exec(db->sqlite, solver_sql)); | |
} | |
int | |
pkgdb_is_dir_used(struct pkgdb *db, struct pkg *p, const char *dir, int64_t *res) | |
{ | |
sqlite3_stmt *stmt; | |
int ret; | |
const char sql[] = "" | |
"SELECT count(package_id) FROM pkg_directories, directories " | |
"WHERE directory_id = directories.id AND directories.path = ?1 " | |
"AND package_id != ?2;"; | |
stmt = prepare_sql(db->sqlite, sql); | |
if (stmt == NULL) | |
return (EPKG_FATAL); | |
sqlite3_bind_text(stmt, 1, dir, -1, SQLITE_TRANSIENT); | |
sqlite3_bind_int64(stmt, 2, p->id); | |
ret = sqlite3_step(stmt); | |
if (ret == SQLITE_ROW) | |
*res = sqlite3_column_int64(stmt, 0); | |
sqlite3_finalize(stmt); | |
if (ret != SQLITE_ROW) { | |
ERROR_SQLITE(db->sqlite, sql); | |
return (EPKG_FATAL); | |
} | |
return (EPKG_OK); | |
} | |
bool | |
pkgdb_is_shlib_provided(struct pkgdb *db, const char *req) | |
{ | |
sqlite3_stmt *stmt; | |
int ret; | |
bool found = false; | |
const char *sql = "" | |
"select package_id from pkg_shlibs_provided INNER JOIN shlibs " | |
"on pkg_shlibs_provided.shlib_id = shlibs.id " | |
"where shlibs.name=?1" ; | |
stmt = prepare_sql(db->sqlite, sql); | |
if (stmt == NULL) | |
return (false); | |
sqlite3_bind_text(stmt, 1, req, -1, SQLITE_TRANSIENT); | |
ret = sqlite3_step(stmt); | |
if (ret == SQLITE_ROW) | |
found = true; | |
sqlite3_finalize(stmt); | |
return (found); | |
} | |
bool | |
pkgdb_is_provided(struct pkgdb *db, const char *req) | |
{ | |
sqlite3_stmt *stmt; | |
int ret; | |
bool found = false; | |
const char *sql = "" | |
"select package_id from pkg_provides INNER JOIN provides " | |
"on pkg_provides.provide_id = provides.id " | |
"where provides.provide = ?1" ; | |
stmt = prepare_sql(db->sqlite, sql); | |
if (stmt == NULL) | |
return (false); | |
sqlite3_bind_text(stmt, 1, req, -1, SQLITE_TRANSIENT); | |
ret = sqlite3_step(stmt); | |
if (ret == SQLITE_ROW) | |
found = true; | |
sqlite3_finalize(stmt); | |
return (found); | |
} |