xref: /freebsd/usr.sbin/freebsd-update/freebsd-update.sh (revision 55141f2c8991b2a6adbf30bb0fe3e6cbc303f06d)
1#!/bin/sh
2
3#-
4# SPDX-License-Identifier: BSD-2-Clause
5#
6# Copyright 2004-2007 Colin Percival
7# All rights reserved
8#
9# Redistribution and use in source and binary forms, with or without
10# modification, are permitted providing that the following conditions
11# are met:
12# 1. Redistributions of source code must retain the above copyright
13#    notice, this list of conditions and the following disclaimer.
14# 2. Redistributions in binary form must reproduce the above copyright
15#    notice, this list of conditions and the following disclaimer in the
16#    documentation and/or other materials provided with the distribution.
17#
18# THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
19# IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
20# WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21# ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
22# DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
23# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
24# OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
25# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
26# STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
27# IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
28# POSSIBILITY OF SUCH DAMAGE.
29
30#### Usage function -- called from command-line handling code.
31
32# Usage instructions.  Options not listed:
33# --debug	-- don't filter output from utilities
34# --no-stats	-- don't show progress statistics while fetching files
35usage () {
36	cat <<EOF
37usage: `basename $0` [options] command ...
38
39Options:
40  -b basedir   -- Operate on a system mounted at basedir
41                  (default: /)
42  -d workdir   -- Store working files in workdir
43                  (default: /var/db/freebsd-update/)
44  -f conffile  -- Read configuration options from conffile
45                  (default: /etc/freebsd-update.conf)
46  -F           -- Force a fetch operation to proceed in the
47                  case of an unfinished upgrade
48  -j jail      -- Operate on the given jail specified by jid or name
49  -k KEY       -- Trust an RSA key with SHA256 hash of KEY
50  -r release   -- Target for upgrade (e.g., 13.2-RELEASE)
51  -s server    -- Server from which to fetch updates
52                  (default: update.FreeBSD.org)
53  -t address   -- Mail output of cron command, if any, to address
54                  (default: root)
55  --not-running-from-cron
56               -- Run without a tty, for use by automated tools
57  --currently-running release
58               -- Update as if currently running this release
59Commands:
60  fetch        -- Fetch updates from server
61  cron         -- Sleep rand(3600) seconds, fetch updates, and send an
62                  email if updates were found
63  upgrade      -- Fetch upgrades to FreeBSD version specified via -r option
64  updatesready -- Check if there are fetched updates ready to install
65  install      -- Install downloaded updates or upgrades
66  rollback     -- Uninstall most recently installed updates
67  IDS          -- Compare the system against an index of "known good" files
68  showconfig   -- Show configuration
69EOF
70	exit 0
71}
72
73#### Configuration processing functions
74
75#-
76# Configuration options are set in the following order of priority:
77# 1. Command line options
78# 2. Configuration file options
79# 3. Default options
80# In addition, certain options (e.g., IgnorePaths) can be specified multiple
81# times and (as long as these are all in the same place, e.g., inside the
82# configuration file) they will accumulate.  Finally, because the path to the
83# configuration file can be specified at the command line, the entire command
84# line must be processed before we start reading the configuration file.
85#
86# Sound like a mess?  It is.  Here's how we handle this:
87# 1. Initialize CONFFILE and all the options to "".
88# 2. Process the command line.  Throw an error if a non-accumulating option
89#    is specified twice.
90# 3. If CONFFILE is "", set CONFFILE to /etc/freebsd-update.conf .
91# 4. For all the configuration options X, set X_saved to X.
92# 5. Initialize all the options to "".
93# 6. Read CONFFILE line by line, parsing options.
94# 7. For each configuration option X, set X to X_saved iff X_saved is not "".
95# 8. Repeat steps 4-7, except setting options to their default values at (6).
96
97CONFIGOPTIONS="KEYPRINT WORKDIR SERVERNAME MAILTO ALLOWADD ALLOWDELETE
98    KEEPMODIFIEDMETADATA COMPONENTS IGNOREPATHS UPDATEIFUNMODIFIED
99    BASEDIR VERBOSELEVEL TARGETRELEASE STRICTCOMPONENTS MERGECHANGES
100    IDSIGNOREPATHS BACKUPKERNEL BACKUPKERNELDIR BACKUPKERNELSYMBOLFILES"
101
102# Set all the configuration options to "".
103nullconfig () {
104	for X in ${CONFIGOPTIONS}; do
105		eval ${X}=""
106	done
107}
108
109# For each configuration option X, set X_saved to X.
110saveconfig () {
111	for X in ${CONFIGOPTIONS}; do
112		eval ${X}_saved=\$${X}
113	done
114}
115
116# For each configuration option X, set X to X_saved if X_saved is not "".
117mergeconfig () {
118	for X in ${CONFIGOPTIONS}; do
119		eval _=\$${X}_saved
120		if ! [ -z "${_}" ]; then
121			eval ${X}=\$${X}_saved
122		fi
123	done
124}
125
126# Set the trusted keyprint.
127config_KeyPrint () {
128	if [ -z ${KEYPRINT} ]; then
129		KEYPRINT=$1
130	else
131		return 1
132	fi
133}
134
135# Set the working directory.
136config_WorkDir () {
137	if [ -z ${WORKDIR} ]; then
138		WORKDIR=$1
139	else
140		return 1
141	fi
142}
143
144# Set the name of the server (pool) from which to fetch updates
145config_ServerName () {
146	if [ -z ${SERVERNAME} ]; then
147		SERVERNAME=$1
148	else
149		return 1
150	fi
151}
152
153# Set the address to which 'cron' output will be mailed.
154config_MailTo () {
155	if [ -z ${MAILTO} ]; then
156		MAILTO=$1
157	else
158		return 1
159	fi
160}
161
162# Set whether FreeBSD Update is allowed to add files (or directories, or
163# symlinks) which did not previously exist.
164config_AllowAdd () {
165	if [ -z ${ALLOWADD} ]; then
166		case $1 in
167		[Yy][Ee][Ss])
168			ALLOWADD=yes
169			;;
170		[Nn][Oo])
171			ALLOWADD=no
172			;;
173		*)
174			return 1
175			;;
176		esac
177	else
178		return 1
179	fi
180}
181
182# Set whether FreeBSD Update is allowed to remove files/directories/symlinks.
183config_AllowDelete () {
184	if [ -z ${ALLOWDELETE} ]; then
185		case $1 in
186		[Yy][Ee][Ss])
187			ALLOWDELETE=yes
188			;;
189		[Nn][Oo])
190			ALLOWDELETE=no
191			;;
192		*)
193			return 1
194			;;
195		esac
196	else
197		return 1
198	fi
199}
200
201# Set whether FreeBSD Update should keep existing inode ownership,
202# permissions, and flags, in the event that they have been modified locally
203# after the release.
204config_KeepModifiedMetadata () {
205	if [ -z ${KEEPMODIFIEDMETADATA} ]; then
206		case $1 in
207		[Yy][Ee][Ss])
208			KEEPMODIFIEDMETADATA=yes
209			;;
210		[Nn][Oo])
211			KEEPMODIFIEDMETADATA=no
212			;;
213		*)
214			return 1
215			;;
216		esac
217	else
218		return 1
219	fi
220}
221
222# Add to the list of components which should be kept updated.
223config_Components () {
224	for C in $@; do
225		COMPONENTS="${COMPONENTS} ${C}"
226	done
227}
228
229# Remove src component from list if it isn't installed
230finalize_components_config () {
231	COMPONENTS=""
232	for C in $@; do
233		if [ "$C" = "src" ]; then
234			if [ -e "${BASEDIR}/usr/src/COPYRIGHT" ]; then
235				COMPONENTS="${COMPONENTS} ${C}"
236			else
237				echo "src component not installed, skipped"
238			fi
239		else
240			COMPONENTS="${COMPONENTS} ${C}"
241		fi
242	done
243}
244
245# Add to the list of paths under which updates will be ignored.
246config_IgnorePaths () {
247	for C in $@; do
248		IGNOREPATHS="${IGNOREPATHS} ${C}"
249	done
250}
251
252# Add to the list of paths which IDS should ignore.
253config_IDSIgnorePaths () {
254	for C in $@; do
255		IDSIGNOREPATHS="${IDSIGNOREPATHS} ${C}"
256	done
257}
258
259# Add to the list of paths within which updates will be performed only if the
260# file on disk has not been modified locally.
261config_UpdateIfUnmodified () {
262	for C in $@; do
263		UPDATEIFUNMODIFIED="${UPDATEIFUNMODIFIED} ${C}"
264	done
265}
266
267# Add to the list of paths within which updates to text files will be merged
268# instead of overwritten.
269config_MergeChanges () {
270	for C in $@; do
271		MERGECHANGES="${MERGECHANGES} ${C}"
272	done
273}
274
275# Work on a FreeBSD installation mounted under $1
276config_BaseDir () {
277	if [ -z ${BASEDIR} ]; then
278		BASEDIR=$1
279	else
280		return 1
281	fi
282}
283
284# When fetching upgrades, should we assume the user wants exactly the
285# components listed in COMPONENTS, rather than trying to guess based on
286# what's currently installed?
287config_StrictComponents () {
288	if [ -z ${STRICTCOMPONENTS} ]; then
289		case $1 in
290		[Yy][Ee][Ss])
291			STRICTCOMPONENTS=yes
292			;;
293		[Nn][Oo])
294			STRICTCOMPONENTS=no
295			;;
296		*)
297			return 1
298			;;
299		esac
300	else
301		return 1
302	fi
303}
304
305# Upgrade to FreeBSD $1
306config_TargetRelease () {
307	if [ -z ${TARGETRELEASE} ]; then
308		TARGETRELEASE=$1
309	else
310		return 1
311	fi
312	if echo ${TARGETRELEASE} | grep -qE '^[0-9.]+$'; then
313		TARGETRELEASE="${TARGETRELEASE}-RELEASE"
314	fi
315}
316
317# Pretend current release is FreeBSD $1
318config_SourceRelease () {
319	UNAME_r=$1
320	if echo ${UNAME_r} | grep -qE '^[0-9.]+$'; then
321		UNAME_r="${UNAME_r}-RELEASE"
322	fi
323	export UNAME_r
324}
325
326# Get the Jail's path and the version of its installed userland
327config_TargetJail () {
328	JAIL=$1
329	UNAME_r=$(freebsd-version -j ${JAIL})
330	BASEDIR=$(jls -j ${JAIL} -h path | awk 'NR == 2 {print}')
331	if [ -z ${BASEDIR} ] || [ -z ${UNAME_r} ]; then
332		echo "The specified jail either doesn't exist or" \
333		      "does not have freebsd-version."
334		exit 1
335	fi
336	export UNAME_r
337}
338
339# Define what happens to output of utilities
340config_VerboseLevel () {
341	if [ -z ${VERBOSELEVEL} ]; then
342		case $1 in
343		[Dd][Ee][Bb][Uu][Gg])
344			VERBOSELEVEL=debug
345			;;
346		[Nn][Oo][Ss][Tt][Aa][Tt][Ss])
347			VERBOSELEVEL=nostats
348			;;
349		[Ss][Tt][Aa][Tt][Ss])
350			VERBOSELEVEL=stats
351			;;
352		*)
353			return 1
354			;;
355		esac
356	else
357		return 1
358	fi
359}
360
361config_BackupKernel () {
362	if [ -z ${BACKUPKERNEL} ]; then
363		case $1 in
364		[Yy][Ee][Ss])
365			BACKUPKERNEL=yes
366			;;
367		[Nn][Oo])
368			BACKUPKERNEL=no
369			;;
370		*)
371			return 1
372			;;
373		esac
374	else
375		return 1
376	fi
377}
378
379config_BackupKernelDir () {
380	if [ -z ${BACKUPKERNELDIR} ]; then
381		if [ -z "$1" ]; then
382			echo "BackupKernelDir set to empty dir"
383			return 1
384		fi
385
386		# We check for some paths which would be extremely odd
387		# to use, but which could cause a lot of problems if
388		# used.
389		case $1 in
390		/|/bin|/boot|/etc|/lib|/libexec|/sbin|/usr|/var)
391			echo "BackupKernelDir set to invalid path $1"
392			return 1
393			;;
394		/*)
395			BACKUPKERNELDIR=$1
396			;;
397		*)
398			echo "BackupKernelDir ($1) is not an absolute path"
399			return 1
400			;;
401		esac
402	else
403		return 1
404	fi
405}
406
407config_BackupKernelSymbolFiles () {
408	if [ -z ${BACKUPKERNELSYMBOLFILES} ]; then
409		case $1 in
410		[Yy][Ee][Ss])
411			BACKUPKERNELSYMBOLFILES=yes
412			;;
413		[Nn][Oo])
414			BACKUPKERNELSYMBOLFILES=no
415			;;
416		*)
417			return 1
418			;;
419		esac
420	else
421		return 1
422	fi
423}
424
425config_CreateBootEnv () {
426	if [ -z ${BOOTENV} ]; then
427		case $1 in
428		[Yy][Ee][Ss])
429			BOOTENV=yes
430			;;
431		[Nn][Oo])
432			BOOTENV=no
433			;;
434		*)
435			return 1
436			;;
437		esac
438	else
439		return 1
440	fi
441}
442# Handle one line of configuration
443configline () {
444	if [ $# -eq 0 ]; then
445		return
446	fi
447
448	OPT=$1
449	shift
450	config_${OPT} $@
451}
452
453#### Parameter handling functions.
454
455# Initialize parameters to null, just in case they're
456# set in the environment.
457init_params () {
458	# Configration settings
459	nullconfig
460
461	# No configuration file set yet
462	CONFFILE=""
463
464	# No commands specified yet
465	COMMANDS=""
466
467	# Force fetch to proceed
468	FORCEFETCH=0
469
470	# Run without a TTY
471	NOTTYOK=0
472
473	# Fetched first in a chain of commands
474	ISFETCHED=0
475}
476
477# Parse the command line
478parse_cmdline () {
479	while [ $# -gt 0 ]; do
480		case "$1" in
481		# Location of configuration file
482		-f)
483			if [ $# -eq 1 ]; then usage; fi
484			if [ ! -z "${CONFFILE}" ]; then usage; fi
485			shift; CONFFILE="$1"
486			;;
487		-F)
488			FORCEFETCH=1
489			;;
490		--not-running-from-cron)
491			NOTTYOK=1
492			;;
493		--currently-running)
494			shift
495			config_SourceRelease $1 || usage
496			;;
497
498		# Configuration file equivalents
499		-b)
500			if [ $# -eq 1 ]; then usage; fi; shift
501			config_BaseDir $1 || usage
502			;;
503		-d)
504			if [ $# -eq 1 ]; then usage; fi; shift
505			config_WorkDir $1 || usage
506			;;
507		-j)
508			if [ $# -eq 1 ]; then usage; fi; shift
509			config_TargetJail $1 || usage
510			;;
511		-k)
512			if [ $# -eq 1 ]; then usage; fi; shift
513			config_KeyPrint $1 || usage
514			;;
515		-s)
516			if [ $# -eq 1 ]; then usage; fi; shift
517			config_ServerName $1 || usage
518			;;
519		-r)
520			if [ $# -eq 1 ]; then usage; fi; shift
521			config_TargetRelease $1 || usage
522			;;
523		-t)
524			if [ $# -eq 1 ]; then usage; fi; shift
525			config_MailTo $1 || usage
526			;;
527		-v)
528			if [ $# -eq 1 ]; then usage; fi; shift
529			config_VerboseLevel $1 || usage
530			;;
531
532		# Aliases for "-v debug" and "-v nostats"
533		--debug)
534			config_VerboseLevel debug || usage
535			;;
536		--no-stats)
537			config_VerboseLevel nostats || usage
538			;;
539
540		# Commands
541		cron | fetch | upgrade | updatesready | install | rollback |\
542		IDS | showconfig)
543			COMMANDS="${COMMANDS} $1"
544			;;
545
546		# Anything else is an error
547		*)
548			usage
549			;;
550		esac
551		shift
552	done
553
554	# Make sure we have at least one command
555	if [ -z "${COMMANDS}" ]; then
556		usage
557	fi
558}
559
560# Parse the configuration file
561parse_conffile () {
562	# If a configuration file was specified on the command line, check
563	# that it exists and is readable.
564	if [ ! -z "${CONFFILE}" ] && [ ! -r "${CONFFILE}" ]; then
565		echo -n "File does not exist "
566		echo -n "or is not readable: "
567		echo ${CONFFILE}
568		exit 1
569	fi
570
571	# If a configuration file was not specified on the command line,
572	# use the default configuration file path.  If that default does
573	# not exist, give up looking for any configuration.
574	if [ -z "${CONFFILE}" ]; then
575		CONFFILE="/etc/freebsd-update.conf"
576		if [ ! -r "${CONFFILE}" ]; then
577			return
578		fi
579	fi
580
581	# Save the configuration options specified on the command line, and
582	# clear all the options in preparation for reading the config file.
583	saveconfig
584	nullconfig
585
586	# Read the configuration file.  Anything after the first '#' is
587	# ignored, and any blank lines are ignored.
588	L=0
589	while read LINE; do
590		L=$(($L + 1))
591		LINEX=`echo "${LINE}" | cut -f 1 -d '#'`
592		if ! configline ${LINEX}; then
593			echo "Error processing configuration file, line $L:"
594			echo "==> ${LINE}"
595			exit 1
596		fi
597	done < ${CONFFILE}
598
599	# Merge the settings read from the configuration file with those
600	# provided at the command line.
601	mergeconfig
602}
603
604# Provide some default parameters
605default_params () {
606	# Save any parameters already configured, and clear the slate
607	saveconfig
608	nullconfig
609
610	# Default configurations
611	config_WorkDir /var/db/freebsd-update
612	config_MailTo root
613	config_AllowAdd yes
614	config_AllowDelete yes
615	config_KeepModifiedMetadata yes
616	config_BaseDir /
617	config_VerboseLevel stats
618	config_StrictComponents no
619	config_BackupKernel yes
620	config_BackupKernelDir /boot/kernel.old
621	config_BackupKernelSymbolFiles no
622	config_CreateBootEnv yes
623
624	# Merge these defaults into the earlier-configured settings
625	mergeconfig
626}
627
628# Set utility output filtering options, based on ${VERBOSELEVEL}
629fetch_setup_verboselevel () {
630	case ${VERBOSELEVEL} in
631	debug)
632		QUIETREDIR="/dev/stderr"
633		QUIETFLAG=" "
634		STATSREDIR="/dev/stderr"
635		DDSTATS=".."
636		XARGST="-t"
637		NDEBUG=" "
638		;;
639	nostats)
640		QUIETREDIR=""
641		QUIETFLAG=""
642		STATSREDIR="/dev/null"
643		DDSTATS=".."
644		XARGST=""
645		NDEBUG=""
646		;;
647	stats)
648		QUIETREDIR="/dev/null"
649		QUIETFLAG="-q"
650		STATSREDIR="/dev/stdout"
651		DDSTATS=""
652		XARGST=""
653		NDEBUG="-n"
654		;;
655	esac
656}
657
658# Perform sanity checks and set some final parameters
659# in preparation for fetching files.  Figure out which
660# set of updates should be downloaded: If the user is
661# running *-p[0-9]+, strip off the last part; if the
662# user is running -SECURITY, call it -RELEASE.  Chdir
663# into the working directory.
664fetchupgrade_check_params () {
665	export HTTP_USER_AGENT="freebsd-update (${COMMAND}, `uname -r`)"
666
667	_SERVERNAME_z=\
668"SERVERNAME must be given via command line or configuration file."
669	_KEYPRINT_z="Key must be given via -k option or configuration file."
670	_KEYPRINT_bad="Invalid key fingerprint: "
671	_WORKDIR_bad="Directory does not exist or is not writable: "
672	_WORKDIR_bad2="Directory is not on a persistent filesystem: "
673
674	if [ -z "${SERVERNAME}" ]; then
675		echo -n "`basename $0`: "
676		echo "${_SERVERNAME_z}"
677		exit 1
678	fi
679	if [ -z "${KEYPRINT}" ]; then
680		echo -n "`basename $0`: "
681		echo "${_KEYPRINT_z}"
682		exit 1
683	fi
684	if ! echo "${KEYPRINT}" | grep -qE "^[0-9a-f]{64}$"; then
685		echo -n "`basename $0`: "
686		echo -n "${_KEYPRINT_bad}"
687		echo ${KEYPRINT}
688		exit 1
689	fi
690	if ! [ -d "${WORKDIR}" -a -w "${WORKDIR}" ]; then
691		echo -n "`basename $0`: "
692		echo -n "${_WORKDIR_bad}"
693		echo ${WORKDIR}
694		exit 1
695	fi
696	case `df -T ${WORKDIR}` in */dev/md[0-9]* | *tmpfs*)
697		echo -n "`basename $0`: "
698		echo -n "${_WORKDIR_bad2}"
699		echo ${WORKDIR}
700		exit 1
701		;;
702	esac
703	chmod 700 ${WORKDIR}
704	cd ${WORKDIR} || exit 1
705
706	# Generate release number.  The s/SECURITY/RELEASE/ bit exists
707	# to provide an upgrade path for FreeBSD Update 1.x users, since
708	# the kernels provided by FreeBSD Update 1.x are always labelled
709	# as X.Y-SECURITY.
710	RELNUM=`uname -r |
711	    sed -E 's,-p[0-9]+,,' |
712	    sed -E 's,-SECURITY,-RELEASE,'`
713	ARCH=`uname -m`
714	FETCHDIR=${RELNUM}/${ARCH}
715	PATCHDIR=${RELNUM}/${ARCH}/bp
716
717	# Disallow upgrade from a version that is not a release
718	case ${RELNUM} in
719	*-RELEASE | *-ALPHA*  | *-BETA* | *-RC*)
720		;;
721	*)
722		echo -n "`basename $0`: "
723		cat <<- EOF
724			Cannot upgrade from a version that is not a release
725			(including alpha, beta and release candidates)
726			using `basename $0`. Instead, FreeBSD can be directly
727			upgraded by source or upgraded to a RELEASE/RELENG version
728			prior to running `basename $0`.
729			Currently running: ${RELNUM}
730		EOF
731		exit 1
732		;;
733	esac
734
735	# Figure out what directory contains the running kernel
736	BOOTFILE=`sysctl -n kern.bootfile`
737	KERNELDIR=${BOOTFILE%/kernel}
738	if ! [ -d ${KERNELDIR} ]; then
739		echo "Cannot identify running kernel"
740		exit 1
741	fi
742
743	# Figure out what kernel configuration is running.  We start with
744	# the output of `uname -i`, and then make the following adjustments:
745	# 1. Replace "SMP-GENERIC" with "SMP".  Why the SMP kernel config
746	# file says "ident SMP-GENERIC", I don't know...
747	# 2. If the kernel claims to be GENERIC _and_ ${ARCH} is "amd64"
748	# _and_ `sysctl kern.version` contains a line which ends "/SMP", then
749	# we're running an SMP kernel.  This mis-identification is a bug
750	# which was fixed in 6.2-STABLE.
751	KERNCONF=`uname -i`
752	if [ ${KERNCONF} = "SMP-GENERIC" ]; then
753		KERNCONF=SMP
754	fi
755	if [ ${KERNCONF} = "GENERIC" ] && [ ${ARCH} = "amd64" ]; then
756		if sysctl kern.version | grep -qE '/SMP$'; then
757			KERNCONF=SMP
758		fi
759	fi
760
761	# Define some paths
762	BSPATCH=/usr/bin/bspatch
763	SHA256=/sbin/sha256
764	PHTTPGET=/usr/libexec/phttpget
765
766	# Set up variables relating to VERBOSELEVEL
767	fetch_setup_verboselevel
768
769	# Construct a unique name from ${BASEDIR}
770	BDHASH=`echo ${BASEDIR} | sha256 -q`
771}
772
773# Perform sanity checks etc. before fetching updates.
774fetch_check_params () {
775	fetchupgrade_check_params
776
777	if ! [ -z "${TARGETRELEASE}" ]; then
778		echo -n "`basename $0`: "
779		echo -n "-r option is meaningless with 'fetch' command.  "
780		echo "(Did you mean 'upgrade' instead?)"
781		exit 1
782	fi
783
784	# Check that we have updates ready to install
785	if [ -f ${BDHASH}-install/kerneldone -a $FORCEFETCH -eq 0 ]; then
786		echo "You have a partially completed upgrade pending"
787		echo "Run '$0 install' first."
788		echo "Run '$0 fetch -F' to proceed anyway."
789		exit 1
790	fi
791}
792
793# Perform sanity checks etc. before fetching upgrades.
794upgrade_check_params () {
795	fetchupgrade_check_params
796
797	# Unless set otherwise, we're upgrading to the same kernel config.
798	NKERNCONF=${KERNCONF}
799
800	# We need TARGETRELEASE set
801	_TARGETRELEASE_z="Release target must be specified via -r option."
802	if [ -z "${TARGETRELEASE}" ]; then
803		echo -n "`basename $0`: "
804		echo "${_TARGETRELEASE_z}"
805		exit 1
806	fi
807
808	# The target release should be != the current release.
809	if [ "${TARGETRELEASE}" = "${RELNUM}" ]; then
810		echo -n "`basename $0`: "
811		echo "Cannot upgrade from ${RELNUM} to itself"
812		exit 1
813	fi
814
815	# Turning off AllowAdd or AllowDelete is a bad idea for upgrades.
816	if [ "${ALLOWADD}" = "no" ]; then
817		echo -n "`basename $0`: "
818		echo -n "WARNING: \"AllowAdd no\" is a bad idea "
819		echo "when upgrading between releases."
820		echo
821	fi
822	if [ "${ALLOWDELETE}" = "no" ]; then
823		echo -n "`basename $0`: "
824		echo -n "WARNING: \"AllowDelete no\" is a bad idea "
825		echo "when upgrading between releases."
826		echo
827	fi
828
829	# Set EDITOR to /usr/bin/vi if it isn't already set
830	: ${EDITOR:='/usr/bin/vi'}
831}
832
833# Perform sanity checks and set some final parameters in
834# preparation for installing updates.
835install_check_params () {
836	# Check that we are root.  All sorts of things won't work otherwise.
837	if [ `id -u` != 0 ]; then
838		echo "You must be root to run this."
839		exit 1
840	fi
841
842	# Check that securelevel <= 0.  Otherwise we can't update schg files.
843	if [ `sysctl -n kern.securelevel` -gt 0 ]; then
844		echo "Updates cannot be installed when the system securelevel"
845		echo "is greater than zero."
846		exit 1
847	fi
848
849	# Check that we have a working directory
850	_WORKDIR_bad="Directory does not exist or is not writable: "
851	if ! [ -d "${WORKDIR}" -a -w "${WORKDIR}" ]; then
852		echo -n "`basename $0`: "
853		echo -n "${_WORKDIR_bad}"
854		echo ${WORKDIR}
855		exit 1
856	fi
857	cd ${WORKDIR} || exit 1
858
859	# Construct a unique name from ${BASEDIR}
860	BDHASH=`echo ${BASEDIR} | sha256 -q`
861
862	# Check that we have updates ready to install
863	if ! [ -L ${BDHASH}-install ]; then
864		echo "No updates are available to install."
865		if [ $ISFETCHED -eq 0 ]; then
866			echo "Run '$0 fetch' first."
867			exit 2
868		fi
869		exit 0
870	fi
871	if ! [ -f ${BDHASH}-install/INDEX-OLD ] ||
872	    ! [ -f ${BDHASH}-install/INDEX-NEW ]; then
873		echo "Update manifest is corrupt -- this should never happen."
874		echo "Re-run '$0 fetch'."
875		exit 1
876	fi
877
878	# Figure out what directory contains the running kernel
879	BOOTFILE=`sysctl -n kern.bootfile`
880	KERNELDIR=${BOOTFILE%/kernel}
881	if ! [ -d ${KERNELDIR} ]; then
882		echo "Cannot identify running kernel"
883		exit 1
884	fi
885}
886
887# Creates a new boot environment
888install_create_be () {
889	# Figure out if we're running in a jail and return if we are
890	if [ `sysctl -n security.jail.jailed` = 1 ]; then
891		return 1
892	fi
893	# Operating on roots that aren't located at / will, more often than not,
894	# not touch the boot environment.
895	if [ "$BASEDIR" != "/" ]; then
896		return 1
897	fi
898	# Create a boot environment if enabled
899	if [ ${BOOTENV} = yes ]; then
900		bectl check 2>/dev/null
901		case $? in
902			0)
903				# Boot environment are supported
904				CREATEBE=yes
905				;;
906			255)
907				# Boot environments are not supported
908				CREATEBE=no
909				;;
910			*)
911				# If bectl returns an unexpected exit code, don't create a BE
912				CREATEBE=no
913				;;
914		esac
915		if [ ${CREATEBE} = yes ]; then
916			echo -n "Creating snapshot of existing boot environment... "
917			VERSION=`freebsd-version -ku | sort -V | tail -n 1`
918			TIMESTAMP=`date +"%Y-%m-%d_%H%M%S"`
919			bectl create -r ${VERSION}_${TIMESTAMP}
920			if [ $? -eq 0 ]; then
921				echo "done.";
922			else
923				echo "failed."
924				exit 1
925			fi
926		fi
927	fi
928}
929
930# Perform sanity checks and set some final parameters in
931# preparation for UNinstalling updates.
932rollback_check_params () {
933	# Check that we are root.  All sorts of things won't work otherwise.
934	if [ `id -u` != 0 ]; then
935		echo "You must be root to run this."
936		exit 1
937	fi
938
939	# Check that we have a working directory
940	_WORKDIR_bad="Directory does not exist or is not writable: "
941	if ! [ -d "${WORKDIR}" -a -w "${WORKDIR}" ]; then
942		echo -n "`basename $0`: "
943		echo -n "${_WORKDIR_bad}"
944		echo ${WORKDIR}
945		exit 1
946	fi
947	cd ${WORKDIR} || exit 1
948
949	# Construct a unique name from ${BASEDIR}
950	BDHASH=`echo ${BASEDIR} | sha256 -q`
951
952	# Check that we have updates ready to rollback
953	if ! [ -L ${BDHASH}-rollback ]; then
954		echo "No rollback directory found."
955		exit 1
956	fi
957	if ! [ -f ${BDHASH}-rollback/INDEX-OLD ] ||
958	    ! [ -f ${BDHASH}-rollback/INDEX-NEW ]; then
959		echo "Update manifest is corrupt -- this should never happen."
960		exit 1
961	fi
962}
963
964# Perform sanity checks and set some final parameters
965# in preparation for comparing the system against the
966# published index.  Figure out which index we should
967# compare against: If the user is running *-p[0-9]+,
968# strip off the last part; if the user is running
969# -SECURITY, call it -RELEASE.  Chdir into the working
970# directory.
971IDS_check_params () {
972	export HTTP_USER_AGENT="freebsd-update (${COMMAND}, `uname -r`)"
973
974	_SERVERNAME_z=\
975"SERVERNAME must be given via command line or configuration file."
976	_KEYPRINT_z="Key must be given via -k option or configuration file."
977	_KEYPRINT_bad="Invalid key fingerprint: "
978	_WORKDIR_bad="Directory does not exist or is not writable: "
979
980	if [ -z "${SERVERNAME}" ]; then
981		echo -n "`basename $0`: "
982		echo "${_SERVERNAME_z}"
983		exit 1
984	fi
985	if [ -z "${KEYPRINT}" ]; then
986		echo -n "`basename $0`: "
987		echo "${_KEYPRINT_z}"
988		exit 1
989	fi
990	if ! echo "${KEYPRINT}" | grep -qE "^[0-9a-f]{64}$"; then
991		echo -n "`basename $0`: "
992		echo -n "${_KEYPRINT_bad}"
993		echo ${KEYPRINT}
994		exit 1
995	fi
996	if ! [ -d "${WORKDIR}" -a -w "${WORKDIR}" ]; then
997		echo -n "`basename $0`: "
998		echo -n "${_WORKDIR_bad}"
999		echo ${WORKDIR}
1000		exit 1
1001	fi
1002	cd ${WORKDIR} || exit 1
1003
1004	# Generate release number.  The s/SECURITY/RELEASE/ bit exists
1005	# to provide an upgrade path for FreeBSD Update 1.x users, since
1006	# the kernels provided by FreeBSD Update 1.x are always labelled
1007	# as X.Y-SECURITY.
1008	RELNUM=`uname -r |
1009	    sed -E 's,-p[0-9]+,,' |
1010	    sed -E 's,-SECURITY,-RELEASE,'`
1011	ARCH=`uname -m`
1012	FETCHDIR=${RELNUM}/${ARCH}
1013	PATCHDIR=${RELNUM}/${ARCH}/bp
1014
1015	# Figure out what directory contains the running kernel
1016	BOOTFILE=`sysctl -n kern.bootfile`
1017	KERNELDIR=${BOOTFILE%/kernel}
1018	if ! [ -d ${KERNELDIR} ]; then
1019		echo "Cannot identify running kernel"
1020		exit 1
1021	fi
1022
1023	# Figure out what kernel configuration is running.  We start with
1024	# the output of `uname -i`, and then make the following adjustments:
1025	# 1. Replace "SMP-GENERIC" with "SMP".  Why the SMP kernel config
1026	# file says "ident SMP-GENERIC", I don't know...
1027	# 2. If the kernel claims to be GENERIC _and_ ${ARCH} is "amd64"
1028	# _and_ `sysctl kern.version` contains a line which ends "/SMP", then
1029	# we're running an SMP kernel.  This mis-identification is a bug
1030	# which was fixed in 6.2-STABLE.
1031	KERNCONF=`uname -i`
1032	if [ ${KERNCONF} = "SMP-GENERIC" ]; then
1033		KERNCONF=SMP
1034	fi
1035	if [ ${KERNCONF} = "GENERIC" ] && [ ${ARCH} = "amd64" ]; then
1036		if sysctl kern.version | grep -qE '/SMP$'; then
1037			KERNCONF=SMP
1038		fi
1039	fi
1040
1041	# Define some paths
1042	SHA256=/sbin/sha256
1043	PHTTPGET=/usr/libexec/phttpget
1044
1045	# Set up variables relating to VERBOSELEVEL
1046	fetch_setup_verboselevel
1047}
1048
1049#### Core functionality -- the actual work gets done here
1050
1051# Use an SRV query to pick a server.  If the SRV query doesn't provide
1052# a useful answer, use the server name specified by the user.
1053# Put another way... look up _http._tcp.${SERVERNAME} and pick a server
1054# from that; or if no servers are returned, use ${SERVERNAME}.
1055# This allows a user to specify "portsnap.freebsd.org" (in which case
1056# portsnap will select one of the mirrors) or "portsnap5.tld.freebsd.org"
1057# (in which case portsnap will use that particular server, since there
1058# won't be an SRV entry for that name).
1059#
1060# We ignore the Port field, since we are always going to use port 80.
1061
1062# Fetch the mirror list, but do not pick a mirror yet.  Returns 1 if
1063# no mirrors are available for any reason.
1064fetch_pick_server_init () {
1065	: > serverlist_tried
1066
1067# Check that host(1) exists (i.e., that the system wasn't built with the
1068# WITHOUT_BIND set) and don't try to find a mirror if it doesn't exist.
1069	if ! which -s host; then
1070		: > serverlist_full
1071		return 1
1072	fi
1073
1074	echo -n "Looking up ${SERVERNAME} mirrors... "
1075
1076# Issue the SRV query and pull out the Priority, Weight, and Target fields.
1077# BIND 9 prints "$name has SRV record ..." while BIND 8 prints
1078# "$name server selection ..."; we allow either format.
1079	MLIST="_http._tcp.${SERVERNAME}"
1080	host -t srv "${MLIST}" |
1081	    sed -nE "s/${MLIST} (has SRV record|server selection) //Ip" |
1082	    cut -f 1,2,4 -d ' ' |
1083	    sed -e 's/\.$//' |
1084	    sort > serverlist_full
1085
1086# If no records, give up -- we'll just use the server name we were given.
1087	if [ `wc -l < serverlist_full` -eq 0 ]; then
1088		echo "none found."
1089		return 1
1090	fi
1091
1092# Report how many mirrors we found.
1093	echo `wc -l < serverlist_full` "mirrors found."
1094
1095# Generate a random seed for use in picking mirrors.  If HTTP_PROXY
1096# is set, this will be used to generate the seed; otherwise, the seed
1097# will be random.
1098	if [ -n "${HTTP_PROXY}${http_proxy}" ]; then
1099		RANDVALUE=`sha256 -qs "${HTTP_PROXY}${http_proxy}" |
1100		    tr -d 'a-f' |
1101		    cut -c 1-9`
1102	else
1103		RANDVALUE=`jot -r 1 0 999999999`
1104	fi
1105}
1106
1107# Pick a mirror.  Returns 1 if we have run out of mirrors to try.
1108fetch_pick_server () {
1109# Generate a list of not-yet-tried mirrors
1110	sort serverlist_tried |
1111	    comm -23 serverlist_full - > serverlist
1112
1113# Have we run out of mirrors?
1114	if [ `wc -l < serverlist` -eq 0 ]; then
1115		cat <<- EOF
1116			No mirrors remaining, giving up.
1117
1118			This may be because upgrading from this platform (${ARCH})
1119			or release (${RELNUM}) is unsupported by `basename $0`. Only
1120			platforms with Tier 1 support can be upgraded by `basename $0`.
1121			See https://www.freebsd.org/platforms/ for more info.
1122
1123			If unsupported, FreeBSD must be upgraded by source.
1124		EOF
1125		return 1
1126	fi
1127
1128# Find the highest priority level (lowest numeric value).
1129	SRV_PRIORITY=`cut -f 1 -d ' ' serverlist | sort -n | head -1`
1130
1131# Add up the weights of the response lines at that priority level.
1132	SRV_WSUM=0;
1133	while read X; do
1134		case "$X" in
1135		${SRV_PRIORITY}\ *)
1136			SRV_W=`echo $X | cut -f 2 -d ' '`
1137			SRV_WSUM=$(($SRV_WSUM + $SRV_W))
1138			;;
1139		esac
1140	done < serverlist
1141
1142# If all the weights are 0, pretend that they are all 1 instead.
1143	if [ ${SRV_WSUM} -eq 0 ]; then
1144		SRV_WSUM=`grep -E "^${SRV_PRIORITY} " serverlist | wc -l`
1145		SRV_W_ADD=1
1146	else
1147		SRV_W_ADD=0
1148	fi
1149
1150# Pick a value between 0 and the sum of the weights - 1
1151	SRV_RND=`expr ${RANDVALUE} % ${SRV_WSUM}`
1152
1153# Read through the list of mirrors and set SERVERNAME.  Write the line
1154# corresponding to the mirror we selected into serverlist_tried so that
1155# we won't try it again.
1156	while read X; do
1157		case "$X" in
1158		${SRV_PRIORITY}\ *)
1159			SRV_W=`echo $X | cut -f 2 -d ' '`
1160			SRV_W=$(($SRV_W + $SRV_W_ADD))
1161			if [ $SRV_RND -lt $SRV_W ]; then
1162				SERVERNAME=`echo $X | cut -f 3 -d ' '`
1163				echo "$X" >> serverlist_tried
1164				break
1165			else
1166				SRV_RND=$(($SRV_RND - $SRV_W))
1167			fi
1168			;;
1169		esac
1170	done < serverlist
1171}
1172
1173# Take a list of ${oldhash}|${newhash} and output a list of needed patches,
1174# i.e., those for which we have ${oldhash} and don't have ${newhash}.
1175fetch_make_patchlist () {
1176	grep -vE "^([0-9a-f]{64})\|\1$" |
1177	    tr '|' ' ' |
1178		while read X Y; do
1179			if [ -f "files/${Y}.gz" ] ||
1180			    [ ! -f "files/${X}.gz" ]; then
1181				continue
1182			fi
1183			echo "${X}|${Y}"
1184		done | sort -u
1185}
1186
1187# Print user-friendly progress statistics
1188fetch_progress () {
1189	LNC=0
1190	while read x; do
1191		LNC=$(($LNC + 1))
1192		if [ $(($LNC % 10)) = 0 ]; then
1193			echo -n $LNC
1194		elif [ $(($LNC % 2)) = 0 ]; then
1195			echo -n .
1196		fi
1197	done
1198	echo -n " "
1199}
1200
1201# Function for asking the user if everything is ok
1202continuep () {
1203	while read -p "Does this look reasonable (y/n)? " CONTINUE; do
1204		case "${CONTINUE}" in
1205		[yY]*)
1206			return 0
1207			;;
1208		[nN]*)
1209			return 1
1210			;;
1211		esac
1212	done
1213}
1214
1215# Initialize the working directory
1216workdir_init () {
1217	mkdir -p files
1218	touch tINDEX.present
1219}
1220
1221# Check that we have a public key with an appropriate hash, or
1222# fetch the key if it doesn't exist.  Returns 1 if the key has
1223# not yet been fetched.
1224fetch_key () {
1225	if [ -r pub.ssl ] && [ `${SHA256} -q pub.ssl` = ${KEYPRINT} ]; then
1226		return 0
1227	fi
1228
1229	echo -n "Fetching public key from ${SERVERNAME}... "
1230	rm -f pub.ssl
1231	fetch ${QUIETFLAG} http://${SERVERNAME}/${FETCHDIR}/pub.ssl \
1232	    2>${QUIETREDIR} || true
1233	if ! [ -r pub.ssl ]; then
1234		echo "failed."
1235		return 1
1236	fi
1237	if ! [ `${SHA256} -q pub.ssl` = ${KEYPRINT} ]; then
1238		echo "key has incorrect hash."
1239		rm -f pub.ssl
1240		return 1
1241	fi
1242	echo "done."
1243}
1244
1245# Fetch metadata signature, aka "tag".
1246fetch_tag () {
1247	echo -n "Fetching metadata signature "
1248	echo ${NDEBUG} "for ${RELNUM} from ${SERVERNAME}... "
1249	rm -f latest.ssl
1250	fetch ${QUIETFLAG} http://${SERVERNAME}/${FETCHDIR}/latest.ssl	\
1251	    2>${QUIETREDIR} || true
1252	if ! [ -r latest.ssl ]; then
1253		echo "failed."
1254		return 1
1255	fi
1256
1257	openssl rsautl -pubin -inkey pub.ssl -verify		\
1258	    < latest.ssl > tag.new 2>${QUIETREDIR} || true
1259	rm latest.ssl
1260
1261	if ! [ `wc -l < tag.new` = 1 ] ||
1262	    ! grep -qE	\
1263    "^freebsd-update\|${ARCH}\|${RELNUM}\|[0-9]+\|[0-9a-f]{64}\|[0-9]{10}" \
1264		tag.new; then
1265		echo "invalid signature."
1266		return 1
1267	fi
1268
1269	echo "done."
1270
1271	RELPATCHNUM=`cut -f 4 -d '|' < tag.new`
1272	TINDEXHASH=`cut -f 5 -d '|' < tag.new`
1273	EOLTIME=`cut -f 6 -d '|' < tag.new`
1274}
1275
1276# Sanity-check the patch number in a tag, to make sure that we're not
1277# going to "update" backwards and to prevent replay attacks.
1278fetch_tagsanity () {
1279	# Check that we're not going to move from -pX to -pY with Y < X.
1280	RELPX=`uname -r | sed -E 's,.*-,,'`
1281	if echo ${RELPX} | grep -qE '^p[0-9]+$'; then
1282		RELPX=`echo ${RELPX} | cut -c 2-`
1283	else
1284		RELPX=0
1285	fi
1286	if [ "${RELPATCHNUM}" -lt "${RELPX}" ]; then
1287		echo
1288		echo -n "Files on mirror (${RELNUM}-p${RELPATCHNUM})"
1289		echo " appear older than what"
1290		echo "we are currently running (`uname -r`)!"
1291		echo "Cowardly refusing to proceed any further."
1292		return 1
1293	fi
1294
1295	# If "tag" exists and corresponds to ${RELNUM}, make sure that
1296	# it contains a patch number <= RELPATCHNUM, in order to protect
1297	# against rollback (replay) attacks.
1298	if [ -f tag ] &&
1299	    grep -qE	\
1300    "^freebsd-update\|${ARCH}\|${RELNUM}\|[0-9]+\|[0-9a-f]{64}\|[0-9]{10}" \
1301		tag; then
1302		LASTRELPATCHNUM=`cut -f 4 -d '|' < tag`
1303
1304		if [ "${RELPATCHNUM}" -lt "${LASTRELPATCHNUM}" ]; then
1305			echo
1306			echo -n "Files on mirror (${RELNUM}-p${RELPATCHNUM})"
1307			echo " are older than the"
1308			echo -n "most recently seen updates"
1309			echo " (${RELNUM}-p${LASTRELPATCHNUM})."
1310			echo "Cowardly refusing to proceed any further."
1311			return 1
1312		fi
1313	fi
1314}
1315
1316# Fetch metadata index file
1317fetch_metadata_index () {
1318	echo ${NDEBUG} "Fetching metadata index... "
1319	rm -f ${TINDEXHASH}
1320	fetch ${QUIETFLAG} http://${SERVERNAME}/${FETCHDIR}/t/${TINDEXHASH}
1321	    2>${QUIETREDIR}
1322	if ! [ -f ${TINDEXHASH} ]; then
1323		echo "failed."
1324		return 1
1325	fi
1326	if [ `${SHA256} -q ${TINDEXHASH}` != ${TINDEXHASH} ]; then
1327		echo "update metadata index corrupt."
1328		return 1
1329	fi
1330	echo "done."
1331}
1332
1333# Print an error message about signed metadata being bogus.
1334fetch_metadata_bogus () {
1335	echo
1336	echo "The update metadata$1 is correctly signed, but"
1337	echo "failed an integrity check."
1338	echo "Cowardly refusing to proceed any further."
1339	return 1
1340}
1341
1342# Construct tINDEX.new by merging the lines named in $1 from ${TINDEXHASH}
1343# with the lines not named in $@ from tINDEX.present (if that file exists).
1344fetch_metadata_index_merge () {
1345	for METAFILE in $@; do
1346		if [ `grep -E "^${METAFILE}\|" ${TINDEXHASH} | wc -l`	\
1347		    -ne 1 ]; then
1348			fetch_metadata_bogus " index"
1349			return 1
1350		fi
1351
1352		grep -E "${METAFILE}\|" ${TINDEXHASH}
1353	done |
1354	    sort > tINDEX.wanted
1355
1356	if [ -f tINDEX.present ]; then
1357		join -t '|' -v 2 tINDEX.wanted tINDEX.present |
1358		    sort -m - tINDEX.wanted > tINDEX.new
1359		rm tINDEX.wanted
1360	else
1361		mv tINDEX.wanted tINDEX.new
1362	fi
1363}
1364
1365# Sanity check all the lines of tINDEX.new.  Even if more metadata lines
1366# are added by future versions of the server, this won't cause problems,
1367# since the only lines which appear in tINDEX.new are the ones which we
1368# specifically grepped out of ${TINDEXHASH}.
1369fetch_metadata_index_sanity () {
1370	if grep -qvE '^[0-9A-Z.-]+\|[0-9a-f]{64}$' tINDEX.new; then
1371		fetch_metadata_bogus " index"
1372		return 1
1373	fi
1374}
1375
1376# Sanity check the metadata file $1.
1377fetch_metadata_sanity () {
1378	# Some aliases to save space later: ${P} is a character which can
1379	# appear in a path; ${M} is the four numeric metadata fields; and
1380	# ${H} is a sha256 hash.
1381	P="[-+./:=,%@_[~[:alnum:]]"
1382	M="[0-9]+\|[0-9]+\|[0-9]+\|[0-9]+"
1383	H="[0-9a-f]{64}"
1384
1385	# Check that the first four fields make sense.
1386	if gunzip -c < files/$1.gz |
1387	    grep -qvE "^[a-z]+\|[0-9a-z-]+\|${P}+\|[fdL-]\|"; then
1388		fetch_metadata_bogus ""
1389		return 1
1390	fi
1391
1392	# Remove the first three fields.
1393	gunzip -c < files/$1.gz |
1394	    cut -f 4- -d '|' > sanitycheck.tmp
1395
1396	# Sanity check entries with type 'f'
1397	if grep -E '^f' sanitycheck.tmp |
1398	    grep -qvE "^f\|${M}\|${H}\|${P}*\$"; then
1399		fetch_metadata_bogus ""
1400		return 1
1401	fi
1402
1403	# Sanity check entries with type 'd'
1404	if grep -E '^d' sanitycheck.tmp |
1405	    grep -qvE "^d\|${M}\|\|\$"; then
1406		fetch_metadata_bogus ""
1407		return 1
1408	fi
1409
1410	# Sanity check entries with type 'L'
1411	if grep -E '^L' sanitycheck.tmp |
1412	    grep -qvE "^L\|${M}\|${P}*\|\$"; then
1413		fetch_metadata_bogus ""
1414		return 1
1415	fi
1416
1417	# Sanity check entries with type '-'
1418	if grep -E '^-' sanitycheck.tmp |
1419	    grep -qvE "^-\|\|\|\|\|\|"; then
1420		fetch_metadata_bogus ""
1421		return 1
1422	fi
1423
1424	# Clean up
1425	rm sanitycheck.tmp
1426}
1427
1428# Fetch the metadata index and metadata files listed in $@,
1429# taking advantage of metadata patches where possible.
1430fetch_metadata () {
1431	fetch_metadata_index || return 1
1432	fetch_metadata_index_merge $@ || return 1
1433	fetch_metadata_index_sanity || return 1
1434
1435	# Generate a list of wanted metadata patches
1436	join -t '|' -o 1.2,2.2 tINDEX.present tINDEX.new |
1437	    fetch_make_patchlist > patchlist
1438
1439	if [ -s patchlist ]; then
1440		# Attempt to fetch metadata patches
1441		echo -n "Fetching `wc -l < patchlist | tr -d ' '` "
1442		echo ${NDEBUG} "metadata patches.${DDSTATS}"
1443		tr '|' '-' < patchlist |
1444		    lam -s "${FETCHDIR}/tp/" - -s ".gz" |
1445		    xargs ${XARGST} ${PHTTPGET} ${SERVERNAME}	\
1446			2>${STATSREDIR} | fetch_progress
1447		echo "done."
1448
1449		# Attempt to apply metadata patches
1450		echo -n "Applying metadata patches... "
1451		tr '|' ' ' < patchlist |
1452		    while read X Y; do
1453			if [ ! -f "${X}-${Y}.gz" ]; then continue; fi
1454			gunzip -c < ${X}-${Y}.gz > diff
1455			gunzip -c < files/${X}.gz > diff-OLD
1456
1457			# Figure out which lines are being added and removed
1458			grep -E '^-' diff |
1459			    cut -c 2- |
1460			    while read PREFIX; do
1461				look "${PREFIX}" diff-OLD
1462			    done |
1463			    sort > diff-rm
1464			grep -E '^\+' diff |
1465			    cut -c 2- > diff-add
1466
1467			# Generate the new file
1468			comm -23 diff-OLD diff-rm |
1469			    sort - diff-add > diff-NEW
1470
1471			if [ `${SHA256} -q diff-NEW` = ${Y} ]; then
1472				mv diff-NEW files/${Y}
1473				gzip -n files/${Y}
1474			else
1475				mv diff-NEW ${Y}.bad
1476			fi
1477			rm -f ${X}-${Y}.gz diff
1478			rm -f diff-OLD diff-NEW diff-add diff-rm
1479		done 2>${QUIETREDIR}
1480		echo "done."
1481	fi
1482
1483	# Update metadata without patches
1484	cut -f 2 -d '|' < tINDEX.new |
1485	    while read Y; do
1486		if [ ! -f "files/${Y}.gz" ]; then
1487			echo ${Y};
1488		fi
1489	    done |
1490	    sort -u > filelist
1491
1492	if [ -s filelist ]; then
1493		echo -n "Fetching `wc -l < filelist | tr -d ' '` "
1494		echo ${NDEBUG} "metadata files... "
1495		lam -s "${FETCHDIR}/m/" - -s ".gz" < filelist |
1496		    xargs ${XARGST} ${PHTTPGET} ${SERVERNAME}	\
1497		    2>${QUIETREDIR}
1498
1499		while read Y; do
1500			if ! [ -f ${Y}.gz ]; then
1501				echo "failed."
1502				return 1
1503			fi
1504			if [ `gunzip -c < ${Y}.gz |
1505			    ${SHA256} -q` = ${Y} ]; then
1506				mv ${Y}.gz files/${Y}.gz
1507			else
1508				echo "metadata is corrupt."
1509				return 1
1510			fi
1511		done < filelist
1512		echo "done."
1513	fi
1514
1515# Sanity-check the metadata files.
1516	cut -f 2 -d '|' tINDEX.new > filelist
1517	while read X; do
1518		fetch_metadata_sanity ${X} || return 1
1519	done < filelist
1520
1521# Remove files which are no longer needed
1522	cut -f 2 -d '|' tINDEX.present |
1523	    sort > oldfiles
1524	cut -f 2 -d '|' tINDEX.new |
1525	    sort |
1526	    comm -13 - oldfiles |
1527	    lam -s "files/" - -s ".gz" |
1528	    xargs rm -f
1529	rm patchlist filelist oldfiles
1530	rm ${TINDEXHASH}
1531
1532# We're done!
1533	mv tINDEX.new tINDEX.present
1534	mv tag.new tag
1535
1536	return 0
1537}
1538
1539# Extract a subset of a downloaded metadata file containing only the parts
1540# which are listed in COMPONENTS.
1541fetch_filter_metadata_components () {
1542	METAHASH=`look "$1|" tINDEX.present | cut -f 2 -d '|'`
1543	gunzip -c < files/${METAHASH}.gz > $1.all
1544
1545	# Fish out the lines belonging to components we care about.
1546	for C in ${COMPONENTS}; do
1547		look "`echo ${C} | tr '/' '|'`|" $1.all
1548	done > $1
1549
1550	# Remove temporary file.
1551	rm $1.all
1552}
1553
1554# Generate a filtered version of the metadata file $1 from the downloaded
1555# file, by fishing out the lines corresponding to components we're trying
1556# to keep updated, and then removing lines corresponding to paths we want
1557# to ignore.
1558fetch_filter_metadata () {
1559	# Fish out the lines belonging to components we care about.
1560	fetch_filter_metadata_components $1
1561
1562	# Canonicalize directory names by removing any trailing / in
1563	# order to avoid listing directories multiple times if they
1564	# belong to multiple components.  Turning "/" into "" doesn't
1565	# matter, since we add a leading "/" when we use paths later.
1566	cut -f 3- -d '|' $1 |
1567	    sed -e 's,/|d|,|d|,' |
1568	    sed -e 's,/|-|,|-|,' |
1569	    sort -u > $1.tmp
1570
1571	# Figure out which lines to ignore and remove them.
1572	for X in ${IGNOREPATHS}; do
1573		grep -E "^${X}" $1.tmp
1574	done |
1575	    sort -u |
1576	    comm -13 - $1.tmp > $1
1577
1578	# Remove temporary files.
1579	rm $1.tmp
1580}
1581
1582# Filter the metadata file $1 by adding lines with "/boot/$2"
1583# replaced by ${KERNELDIR} (which is `sysctl -n kern.bootfile` minus the
1584# trailing "/kernel"); and if "/boot/$2" does not exist, remove
1585# the original lines which start with that.
1586# Put another way: Deal with the fact that the FOO kernel is sometimes
1587# installed in /boot/FOO/ and is sometimes installed elsewhere.
1588fetch_filter_kernel_names () {
1589	grep ^/boot/$2 $1 |
1590	    sed -e "s,/boot/$2,${KERNELDIR},g" |
1591	    sort - $1 > $1.tmp
1592	mv $1.tmp $1
1593
1594	if ! [ -d /boot/$2 ]; then
1595		grep -v ^/boot/$2 $1 > $1.tmp
1596		mv $1.tmp $1
1597	fi
1598}
1599
1600# For all paths appearing in $1 or $3, inspect the system
1601# and generate $2 describing what is currently installed.
1602fetch_inspect_system () {
1603	# No errors yet...
1604	rm -f .err
1605
1606	# Tell the user why his disk is suddenly making lots of noise
1607	echo -n "Inspecting system... "
1608
1609	# Generate list of files to inspect
1610	cat $1 $3 |
1611	    cut -f 1 -d '|' |
1612	    sort -u > filelist
1613
1614	# Examine each file and output lines of the form
1615	# /path/to/file|type|device-inum|user|group|perm|flags|value
1616	# sorted by device and inode number.
1617	while read F; do
1618		# If the symlink/file/directory does not exist, record this.
1619		if ! [ -e ${BASEDIR}/${F} ]; then
1620			echo "${F}|-||||||"
1621			continue
1622		fi
1623		if ! [ -r ${BASEDIR}/${F} ]; then
1624			echo "Cannot read file: ${BASEDIR}/${F}"	\
1625			    >/dev/stderr
1626			touch .err
1627			return 1
1628		fi
1629
1630		# Otherwise, output an index line.
1631		if [ -L ${BASEDIR}/${F} ]; then
1632			echo -n "${F}|L|"
1633			stat -n -f '%d-%i|%u|%g|%Mp%Lp|%Of|' ${BASEDIR}/${F};
1634			readlink ${BASEDIR}/${F};
1635		elif [ -f ${BASEDIR}/${F} ]; then
1636			echo -n "${F}|f|"
1637			stat -n -f '%d-%i|%u|%g|%Mp%Lp|%Of|' ${BASEDIR}/${F};
1638			sha256 -q ${BASEDIR}/${F};
1639		elif [ -d ${BASEDIR}/${F} ]; then
1640			echo -n "${F}|d|"
1641			stat -f '%d-%i|%u|%g|%Mp%Lp|%Of|' ${BASEDIR}/${F};
1642		else
1643			echo "Unknown file type: ${BASEDIR}/${F}"	\
1644			    >/dev/stderr
1645			touch .err
1646			return 1
1647		fi
1648	done < filelist |
1649	    sort -k 3,3 -t '|' > $2.tmp
1650	rm filelist
1651
1652	# Check if an error occurred during system inspection
1653	if [ -f .err ]; then
1654		return 1
1655	fi
1656
1657	# Convert to the form
1658	# /path/to/file|type|user|group|perm|flags|value|hlink
1659	# by resolving identical device and inode numbers into hard links.
1660	cut -f 1,3 -d '|' $2.tmp |
1661	    sort -k 1,1 -t '|' |
1662	    sort -s -u -k 2,2 -t '|' |
1663	    join -1 2 -2 3 -t '|' - $2.tmp |
1664	    awk -F \| -v OFS=\|		\
1665		'{
1666		    if (($2 == $3) || ($4 == "-"))
1667			print $3,$4,$5,$6,$7,$8,$9,""
1668		    else
1669			print $3,$4,$5,$6,$7,$8,$9,$2
1670		}' |
1671	    sort > $2
1672	rm $2.tmp
1673
1674	# We're finished looking around
1675	echo "done."
1676}
1677
1678# For any paths matching ${MERGECHANGES}, compare $2 against $1 and $3 and
1679# find any files with values unique to $2; generate $4 containing these paths
1680# and their corresponding hashes from $1.
1681fetch_filter_mergechanges () {
1682	# Pull out the paths and hashes of the files matching ${MERGECHANGES}.
1683	for F in $1 $2 $3; do
1684		for X in ${MERGECHANGES}; do
1685			grep -E "^${X}" ${F}
1686		done |
1687		    cut -f 1,2,7 -d '|' |
1688		    sort > ${F}-values
1689	done
1690
1691	# Any line in $2-values which doesn't appear in $1-values or $3-values
1692	# and is a file means that we should list the path in $3.
1693	sort $1-values $3-values |
1694	    comm -13 - $2-values |
1695	    fgrep '|f|' |
1696	    cut -f 1 -d '|' > $2-paths
1697
1698	# For each path, pull out one (and only one!) entry from $1-values.
1699	# Note that we cannot distinguish which "old" version the user made
1700	# changes to; but hopefully any changes which occur due to security
1701	# updates will exist in both the "new" version and the version which
1702	# the user has installed, so the merging will still work.
1703	while read X; do
1704		look "${X}|" $1-values |
1705		    head -1
1706	done < $2-paths > $4
1707
1708	# Clean up
1709	rm $1-values $2-values $3-values $2-paths
1710}
1711
1712# For any paths matching ${UPDATEIFUNMODIFIED}, remove lines from $[123]
1713# which correspond to lines in $2 with hashes not matching $1 or $3, unless
1714# the paths are listed in $4.  For entries in $2 marked "not present"
1715# (aka. type -), remove lines from $[123] unless there is a corresponding
1716# entry in $1.
1717fetch_filter_unmodified_notpresent () {
1718	# Figure out which lines of $1 and $3 correspond to bits which
1719	# should only be updated if they haven't changed, and fish out
1720	# the (path, type, value) tuples.
1721	# NOTE: We don't consider a file to be "modified" if it matches
1722	# the hash from $3.
1723	for X in ${UPDATEIFUNMODIFIED}; do
1724		grep -E "^${X}" $1
1725		grep -E "^${X}" $3
1726	done |
1727	    cut -f 1,2,7 -d '|' |
1728	    sort > $1-values
1729
1730	# Do the same for $2.
1731	for X in ${UPDATEIFUNMODIFIED}; do
1732		grep -E "^${X}" $2
1733	done |
1734	    cut -f 1,2,7 -d '|' |
1735	    sort > $2-values
1736
1737	# Any entry in $2-values which is not in $1-values corresponds to
1738	# a path which we need to remove from $1, $2, and $3, unless it
1739	# that path appears in $4.
1740	comm -13 $1-values $2-values |
1741	    sort -t '|' -k 1,1 > mlines.tmp
1742	cut -f 1 -d '|' $4 |
1743	    sort |
1744	    join -v 2 -t '|' - mlines.tmp |
1745	    sort > mlines
1746	rm $1-values $2-values mlines.tmp
1747
1748	# Any lines in $2 which are not in $1 AND are "not present" lines
1749	# also belong in mlines.
1750	comm -13 $1 $2 |
1751	    cut -f 1,2,7 -d '|' |
1752	    fgrep '|-|' >> mlines
1753
1754	# Remove lines from $1, $2, and $3
1755	for X in $1 $2 $3; do
1756		sort -t '|' -k 1,1 ${X} > ${X}.tmp
1757		cut -f 1 -d '|' < mlines |
1758		    sort |
1759		    join -v 2 -t '|' - ${X}.tmp |
1760		    sort > ${X}
1761		rm ${X}.tmp
1762	done
1763
1764	# Store a list of the modified files, for future reference
1765	fgrep -v '|-|' mlines |
1766	    cut -f 1 -d '|' > modifiedfiles
1767	rm mlines
1768}
1769
1770# For each entry in $1 of type -, remove any corresponding
1771# entry from $2 if ${ALLOWADD} != "yes".  Remove all entries
1772# of type - from $1.
1773fetch_filter_allowadd () {
1774	cut -f 1,2 -d '|' < $1 |
1775	    fgrep '|-' |
1776	    cut -f 1 -d '|' > filesnotpresent
1777
1778	if [ ${ALLOWADD} != "yes" ]; then
1779		sort < $2 |
1780		    join -v 1 -t '|' - filesnotpresent |
1781		    sort > $2.tmp
1782		mv $2.tmp $2
1783	fi
1784
1785	sort < $1 |
1786	    join -v 1 -t '|' - filesnotpresent |
1787	    sort > $1.tmp
1788	mv $1.tmp $1
1789	rm filesnotpresent
1790}
1791
1792# If ${ALLOWDELETE} != "yes", then remove any entries from $1
1793# which don't correspond to entries in $2.
1794fetch_filter_allowdelete () {
1795	# Produce a lists ${PATH}|${TYPE}
1796	for X in $1 $2; do
1797		cut -f 1-2 -d '|' < ${X} |
1798		    sort -u > ${X}.nodes
1799	done
1800
1801	# Figure out which lines need to be removed from $1.
1802	if [ ${ALLOWDELETE} != "yes" ]; then
1803		comm -23 $1.nodes $2.nodes > $1.badnodes
1804	else
1805		: > $1.badnodes
1806	fi
1807
1808	# Remove the relevant lines from $1
1809	while read X; do
1810		look "${X}|" $1
1811	done < $1.badnodes |
1812	    comm -13 - $1 > $1.tmp
1813	mv $1.tmp $1
1814
1815	rm $1.badnodes $1.nodes $2.nodes
1816}
1817
1818# If ${KEEPMODIFIEDMETADATA} == "yes", then for each entry in $2
1819# with metadata not matching any entry in $1, replace the corresponding
1820# line of $3 with one having the same metadata as the entry in $2.
1821fetch_filter_modified_metadata () {
1822	# Fish out the metadata from $1 and $2
1823	for X in $1 $2; do
1824		cut -f 1-6 -d '|' < ${X} > ${X}.metadata
1825	done
1826
1827	# Find the metadata we need to keep
1828	if [ ${KEEPMODIFIEDMETADATA} = "yes" ]; then
1829		comm -13 $1.metadata $2.metadata > keepmeta
1830	else
1831		: > keepmeta
1832	fi
1833
1834	# Extract the lines which we need to remove from $3, and
1835	# construct the lines which we need to add to $3.
1836	: > $3.remove
1837	: > $3.add
1838	while read LINE; do
1839		NODE=`echo "${LINE}" | cut -f 1-2 -d '|'`
1840		look "${NODE}|" $3 >> $3.remove
1841		look "${NODE}|" $3 |
1842		    cut -f 7- -d '|' |
1843		    lam -s "${LINE}|" - >> $3.add
1844	done < keepmeta
1845
1846	# Remove the specified lines and add the new lines.
1847	sort $3.remove |
1848	    comm -13 - $3 |
1849	    sort -u - $3.add > $3.tmp
1850	mv $3.tmp $3
1851
1852	rm keepmeta $1.metadata $2.metadata $3.add $3.remove
1853}
1854
1855# Remove lines from $1 and $2 which are identical;
1856# no need to update a file if it isn't changing.
1857fetch_filter_uptodate () {
1858	comm -23 $1 $2 > $1.tmp
1859	comm -13 $1 $2 > $2.tmp
1860
1861	mv $1.tmp $1
1862	mv $2.tmp $2
1863}
1864
1865# Fetch any "clean" old versions of files we need for merging changes.
1866fetch_files_premerge () {
1867	# We only need to do anything if $1 is non-empty.
1868	if [ -s $1 ]; then
1869		# Tell the user what we're doing
1870		echo -n "Fetching files from ${OLDRELNUM} for merging... "
1871
1872		# List of files wanted
1873		fgrep '|f|' < $1 |
1874		    cut -f 3 -d '|' |
1875		    sort -u > files.wanted
1876
1877		# Only fetch the files we don't already have
1878		while read Y; do
1879			if [ ! -f "files/${Y}.gz" ]; then
1880				echo ${Y};
1881			fi
1882		done < files.wanted > filelist
1883
1884		# Actually fetch them
1885		lam -s "${OLDFETCHDIR}/f/" - -s ".gz" < filelist |
1886		    xargs ${XARGST} ${PHTTPGET} ${SERVERNAME}	\
1887		    2>${QUIETREDIR}
1888
1889		# Make sure we got them all, and move them into /files/
1890		while read Y; do
1891			if ! [ -f ${Y}.gz ]; then
1892				echo "failed."
1893				return 1
1894			fi
1895			if [ `gunzip -c < ${Y}.gz |
1896			    ${SHA256} -q` = ${Y} ]; then
1897				mv ${Y}.gz files/${Y}.gz
1898			else
1899				echo "${Y} has incorrect hash."
1900				return 1
1901			fi
1902		done < filelist
1903		echo "done."
1904
1905		# Clean up
1906		rm filelist files.wanted
1907	fi
1908}
1909
1910# Prepare to fetch files: Generate a list of the files we need,
1911# copy the unmodified files we have into /files/, and generate
1912# a list of patches to download.
1913fetch_files_prepare () {
1914	# Tell the user why his disk is suddenly making lots of noise
1915	echo -n "Preparing to download files... "
1916
1917	# Reduce indices to ${PATH}|${HASH} pairs
1918	for X in $1 $2 $3; do
1919		cut -f 1,2,7 -d '|' < ${X} |
1920		    fgrep '|f|' |
1921		    cut -f 1,3 -d '|' |
1922		    sort > ${X}.hashes
1923	done
1924
1925	# List of files wanted
1926	cut -f 2 -d '|' < $3.hashes |
1927	    sort -u |
1928	    while read HASH; do
1929		if ! [ -f files/${HASH}.gz ]; then
1930			echo ${HASH}
1931		fi
1932	done > files.wanted
1933
1934	# Generate a list of unmodified files
1935	comm -12 $1.hashes $2.hashes |
1936	    sort -k 1,1 -t '|' > unmodified.files
1937
1938	# Copy all files into /files/.  We only need the unmodified files
1939	# for use in patching; but we'll want all of them if the user asks
1940	# to rollback the updates later.
1941	while read LINE; do
1942		F=`echo "${LINE}" | cut -f 1 -d '|'`
1943		HASH=`echo "${LINE}" | cut -f 2 -d '|'`
1944
1945		# Skip files we already have.
1946		if [ -f files/${HASH}.gz ]; then
1947			continue
1948		fi
1949
1950		# Make sure the file hasn't changed.
1951		cp "${BASEDIR}/${F}" tmpfile
1952		if [ `sha256 -q tmpfile` != ${HASH} ]; then
1953			echo
1954			echo "File changed while FreeBSD Update running: ${F}"
1955			return 1
1956		fi
1957
1958		# Place the file into storage.
1959		gzip -c < tmpfile > files/${HASH}.gz
1960		rm tmpfile
1961	done < $2.hashes
1962
1963	# Produce a list of patches to download
1964	sort -k 1,1 -t '|' $3.hashes |
1965	    join -t '|' -o 2.2,1.2 - unmodified.files |
1966	    fetch_make_patchlist > patchlist
1967
1968	# Garbage collect
1969	rm unmodified.files $1.hashes $2.hashes $3.hashes
1970
1971	# We don't need the list of possible old files any more.
1972	rm $1
1973
1974	# We're finished making noise
1975	echo "done."
1976}
1977
1978# Fetch files.
1979fetch_files () {
1980	# Attempt to fetch patches
1981	if [ -s patchlist ]; then
1982		echo -n "Fetching `wc -l < patchlist | tr -d ' '` "
1983		echo ${NDEBUG} "patches.${DDSTATS}"
1984		tr '|' '-' < patchlist |
1985		    lam -s "${PATCHDIR}/" - |
1986		    xargs ${XARGST} ${PHTTPGET} ${SERVERNAME}	\
1987			2>${STATSREDIR} | fetch_progress
1988		echo "done."
1989
1990		# Attempt to apply patches
1991		echo -n "Applying patches... "
1992		tr '|' ' ' < patchlist |
1993		    while read X Y; do
1994			if [ ! -f "${X}-${Y}" ]; then continue; fi
1995			gunzip -c < files/${X}.gz > OLD
1996
1997			bspatch OLD NEW ${X}-${Y}
1998
1999			if [ `${SHA256} -q NEW` = ${Y} ]; then
2000				mv NEW files/${Y}
2001				gzip -n files/${Y}
2002			fi
2003			rm -f diff OLD NEW ${X}-${Y}
2004		done 2>${QUIETREDIR}
2005		echo "done."
2006	fi
2007
2008	# Download files which couldn't be generate via patching
2009	while read Y; do
2010		if [ ! -f "files/${Y}.gz" ]; then
2011			echo ${Y};
2012		fi
2013	done < files.wanted > filelist
2014
2015	if [ -s filelist ]; then
2016		echo -n "Fetching `wc -l < filelist | tr -d ' '` "
2017		echo ${NDEBUG} "files... "
2018		lam -s "${FETCHDIR}/f/" - -s ".gz" < filelist |
2019		    xargs ${XARGST} ${PHTTPGET} ${SERVERNAME}	\
2020			2>${STATSREDIR} | fetch_progress
2021
2022		while read Y; do
2023			if ! [ -f ${Y}.gz ]; then
2024				echo "failed."
2025				return 1
2026			fi
2027			if [ `gunzip -c < ${Y}.gz |
2028			    ${SHA256} -q` = ${Y} ]; then
2029				mv ${Y}.gz files/${Y}.gz
2030			else
2031				echo "${Y} has incorrect hash."
2032				return 1
2033			fi
2034		done < filelist
2035		echo "done."
2036	fi
2037
2038	# Clean up
2039	rm files.wanted filelist patchlist
2040}
2041
2042# Create and populate install manifest directory; and report what updates
2043# are available.
2044fetch_create_manifest () {
2045	# If we have an existing install manifest, nuke it.
2046	if [ -L "${BDHASH}-install" ]; then
2047		rm -r ${BDHASH}-install/
2048		rm ${BDHASH}-install
2049	fi
2050
2051	# Report to the user if any updates were avoided due to local changes
2052	if [ -s modifiedfiles ]; then
2053		cat - modifiedfiles <<- EOF | ${PAGER}
2054			The following files are affected by updates. No changes have
2055			been downloaded, however, because the files have been modified
2056			locally:
2057		EOF
2058	fi
2059	rm modifiedfiles
2060
2061	# If no files will be updated, tell the user and exit
2062	if ! [ -s INDEX-PRESENT ] &&
2063	    ! [ -s INDEX-NEW ]; then
2064		rm INDEX-PRESENT INDEX-NEW
2065		echo
2066		echo -n "No updates needed to update system to "
2067		echo "${RELNUM}-p${RELPATCHNUM}."
2068		return
2069	fi
2070
2071	# Divide files into (a) removed files, (b) added files, and
2072	# (c) updated files.
2073	cut -f 1 -d '|' < INDEX-PRESENT |
2074	    sort > INDEX-PRESENT.flist
2075	cut -f 1 -d '|' < INDEX-NEW |
2076	    sort > INDEX-NEW.flist
2077	comm -23 INDEX-PRESENT.flist INDEX-NEW.flist > files.removed
2078	comm -13 INDEX-PRESENT.flist INDEX-NEW.flist > files.added
2079	comm -12 INDEX-PRESENT.flist INDEX-NEW.flist > files.updated
2080	rm INDEX-PRESENT.flist INDEX-NEW.flist
2081
2082	# Report removed files, if any
2083	if [ -s files.removed ]; then
2084		cat - files.removed <<- EOF | ${PAGER}
2085			The following files will be removed as part of updating to
2086			${RELNUM}-p${RELPATCHNUM}:
2087		EOF
2088	fi
2089	rm files.removed
2090
2091	# Report added files, if any
2092	if [ -s files.added ]; then
2093		cat - files.added <<- EOF | ${PAGER}
2094			The following files will be added as part of updating to
2095			${RELNUM}-p${RELPATCHNUM}:
2096		EOF
2097	fi
2098	rm files.added
2099
2100	# Report updated files, if any
2101	if [ -s files.updated ]; then
2102		cat - files.updated <<- EOF | ${PAGER}
2103			The following files will be updated as part of updating to
2104			${RELNUM}-p${RELPATCHNUM}:
2105		EOF
2106	fi
2107	rm files.updated
2108
2109	# Create a directory for the install manifest.
2110	MDIR=`mktemp -d install.XXXXXX` || return 1
2111
2112	# Populate it
2113	mv INDEX-PRESENT ${MDIR}/INDEX-OLD
2114	mv INDEX-NEW ${MDIR}/INDEX-NEW
2115
2116	# Link it into place
2117	ln -s ${MDIR} ${BDHASH}-install
2118}
2119
2120# Warn about any upcoming EoL
2121fetch_warn_eol () {
2122	# What's the current time?
2123	NOWTIME=`date "+%s"`
2124
2125	# When did we last warn about the EoL date?
2126	if [ -f lasteolwarn ]; then
2127		LASTWARN=`cat lasteolwarn`
2128	else
2129		LASTWARN=`expr ${NOWTIME} - 63072000`
2130	fi
2131
2132	# If the EoL time is past, warn.
2133	if [ ${EOLTIME} -lt ${NOWTIME} ]; then
2134		echo
2135		cat <<-EOF
2136		WARNING: `uname -sr` HAS PASSED ITS END-OF-LIFE DATE.
2137		Any security issues discovered after `date -r ${EOLTIME}`
2138		will not have been corrected.
2139		EOF
2140		return 1
2141	fi
2142
2143	# Figure out how long it has been since we last warned about the
2144	# upcoming EoL, and how much longer we have left.
2145	SINCEWARN=`expr ${NOWTIME} - ${LASTWARN}`
2146	TIMELEFT=`expr ${EOLTIME} - ${NOWTIME}`
2147
2148	# Don't warn if the EoL is more than 3 months away
2149	if [ ${TIMELEFT} -gt 7884000 ]; then
2150		return 0
2151	fi
2152
2153	# Don't warn if the time remaining is more than 3 times the time
2154	# since the last warning.
2155	if [ ${TIMELEFT} -gt `expr ${SINCEWARN} \* 3` ]; then
2156		return 0
2157	fi
2158
2159	# Figure out what time units to use.
2160	if [ ${TIMELEFT} -lt 604800 ]; then
2161		UNIT="day"
2162		SIZE=86400
2163	elif [ ${TIMELEFT} -lt 2678400 ]; then
2164		UNIT="week"
2165		SIZE=604800
2166	else
2167		UNIT="month"
2168		SIZE=2678400
2169	fi
2170
2171	# Compute the right number of units
2172	NUM=`expr ${TIMELEFT} / ${SIZE}`
2173	if [ ${NUM} != 1 ]; then
2174		UNIT="${UNIT}s"
2175	fi
2176
2177	# Print the warning
2178	echo
2179	cat <<-EOF
2180		WARNING: `uname -sr` is approaching its End-of-Life date.
2181		It is strongly recommended that you upgrade to a newer
2182		release within the next ${NUM} ${UNIT}.
2183	EOF
2184
2185	# Update the stored time of last warning
2186	echo ${NOWTIME} > lasteolwarn
2187}
2188
2189# Do the actual work involved in "fetch" / "cron".
2190fetch_run () {
2191	workdir_init || return 1
2192
2193	# Prepare the mirror list.
2194	fetch_pick_server_init && fetch_pick_server
2195
2196	# Try to fetch the public key until we run out of servers.
2197	while ! fetch_key; do
2198		fetch_pick_server || return 1
2199	done
2200
2201	# Try to fetch the metadata index signature ("tag") until we run
2202	# out of available servers; and sanity check the downloaded tag.
2203	while ! fetch_tag; do
2204		fetch_pick_server || return 1
2205	done
2206	fetch_tagsanity || return 1
2207
2208	# Fetch the latest INDEX-NEW and INDEX-OLD files.
2209	fetch_metadata INDEX-NEW INDEX-OLD || return 1
2210
2211	# Generate filtered INDEX-NEW and INDEX-OLD files containing only
2212	# the lines which (a) belong to components we care about, and (b)
2213	# don't correspond to paths we're explicitly ignoring.
2214	fetch_filter_metadata INDEX-NEW || return 1
2215	fetch_filter_metadata INDEX-OLD || return 1
2216
2217	# Translate /boot/${KERNCONF} into ${KERNELDIR}
2218	fetch_filter_kernel_names INDEX-NEW ${KERNCONF}
2219	fetch_filter_kernel_names INDEX-OLD ${KERNCONF}
2220
2221	# For all paths appearing in INDEX-OLD or INDEX-NEW, inspect the
2222	# system and generate an INDEX-PRESENT file.
2223	fetch_inspect_system INDEX-OLD INDEX-PRESENT INDEX-NEW || return 1
2224
2225	# Based on ${UPDATEIFUNMODIFIED}, remove lines from INDEX-* which
2226	# correspond to lines in INDEX-PRESENT with hashes not appearing
2227	# in INDEX-OLD or INDEX-NEW.  Also remove lines where the entry in
2228	# INDEX-PRESENT has type - and there isn't a corresponding entry in
2229	# INDEX-OLD with type -.
2230	fetch_filter_unmodified_notpresent	\
2231	    INDEX-OLD INDEX-PRESENT INDEX-NEW /dev/null
2232
2233	# For each entry in INDEX-PRESENT of type -, remove any corresponding
2234	# entry from INDEX-NEW if ${ALLOWADD} != "yes".  Remove all entries
2235	# of type - from INDEX-PRESENT.
2236	fetch_filter_allowadd INDEX-PRESENT INDEX-NEW
2237
2238	# If ${ALLOWDELETE} != "yes", then remove any entries from
2239	# INDEX-PRESENT which don't correspond to entries in INDEX-NEW.
2240	fetch_filter_allowdelete INDEX-PRESENT INDEX-NEW
2241
2242	# If ${KEEPMODIFIEDMETADATA} == "yes", then for each entry in
2243	# INDEX-PRESENT with metadata not matching any entry in INDEX-OLD,
2244	# replace the corresponding line of INDEX-NEW with one having the
2245	# same metadata as the entry in INDEX-PRESENT.
2246	fetch_filter_modified_metadata INDEX-OLD INDEX-PRESENT INDEX-NEW
2247
2248	# Remove lines from INDEX-PRESENT and INDEX-NEW which are identical;
2249	# no need to update a file if it isn't changing.
2250	fetch_filter_uptodate INDEX-PRESENT INDEX-NEW
2251
2252	# Prepare to fetch files: Generate a list of the files we need,
2253	# copy the unmodified files we have into /files/, and generate
2254	# a list of patches to download.
2255	fetch_files_prepare INDEX-OLD INDEX-PRESENT INDEX-NEW || return 1
2256
2257	# Fetch files.
2258	fetch_files || return 1
2259
2260	# Create and populate install manifest directory; and report what
2261	# updates are available.
2262	fetch_create_manifest || return 1
2263
2264	# Warn about any upcoming EoL
2265	fetch_warn_eol || return 1
2266}
2267
2268# If StrictComponents is not "yes", generate a new components list
2269# with only the components which appear to be installed.
2270upgrade_guess_components () {
2271	if [ "${STRICTCOMPONENTS}" = "no" ]; then
2272		# Generate filtered INDEX-ALL with only the components listed
2273		# in COMPONENTS.
2274		fetch_filter_metadata_components $1 || return 1
2275
2276		# Tell the user why his disk is suddenly making lots of noise
2277		echo -n "Inspecting system... "
2278
2279		# Look at the files on disk, and assume that a component is
2280		# supposed to be present if it is more than half-present.
2281		cut -f 1-3 -d '|' < INDEX-ALL |
2282		    tr '|' ' ' |
2283		    while read C S F; do
2284			if [ -e ${BASEDIR}/${F} ]; then
2285				echo "+ ${C}|${S}"
2286			fi
2287			echo "= ${C}|${S}"
2288		    done |
2289		    sort |
2290		    uniq -c |
2291		    sed -E 's,^ +,,' > compfreq
2292		grep ' = ' compfreq |
2293		    cut -f 1,3 -d ' ' |
2294		    sort -k 2,2 -t ' ' > compfreq.total
2295		grep ' + ' compfreq |
2296		    cut -f 1,3 -d ' ' |
2297		    sort -k 2,2 -t ' ' > compfreq.present
2298		join -t ' ' -1 2 -2 2 compfreq.present compfreq.total |
2299		    while read S P T; do
2300			if [ ${T} -ne 0 -a ${P} -gt `expr ${T} / 2` ]; then
2301				echo ${S}
2302			fi
2303		    done > comp.present
2304		cut -f 2 -d ' ' < compfreq.total > comp.total
2305		rm INDEX-ALL compfreq compfreq.total compfreq.present
2306
2307		# We're done making noise.
2308		echo "done."
2309
2310		# Sometimes the kernel isn't installed where INDEX-ALL
2311		# thinks that it should be: In particular, it is often in
2312		# /boot/kernel instead of /boot/GENERIC or /boot/SMP.  To
2313		# deal with this, if "kernel|X" is listed in comp.total
2314		# (i.e., is a component which would be upgraded if it is
2315		# found to be present) we will add it to comp.present.
2316		# If "kernel|<anything>" is in comp.total but "kernel|X" is
2317		# not, we print a warning -- the user is running a kernel
2318		# which isn't part of the release.
2319		KCOMP=`echo ${KERNCONF} | tr 'A-Z' 'a-z'`
2320		grep -E "^kernel\|${KCOMP}\$" comp.total >> comp.present
2321
2322		if grep -qE "^kernel\|" comp.total &&
2323		    ! grep -qE "^kernel\|${KCOMP}\$" comp.total; then
2324			cat <<-EOF
2325
2326WARNING: This system is running a "${KCOMP}" kernel, which is not a
2327kernel configuration distributed as part of FreeBSD ${RELNUM}.
2328This kernel will not be updated: you MUST update the kernel manually
2329before running "$0 install".
2330			EOF
2331		fi
2332
2333		# Re-sort the list of installed components and generate
2334		# the list of non-installed components.
2335		sort -u < comp.present > comp.present.tmp
2336		mv comp.present.tmp comp.present
2337		comm -13 comp.present comp.total > comp.absent
2338
2339		# Ask the user to confirm that what we have is correct.  To
2340		# reduce user confusion, translate "X|Y" back to "X/Y" (as
2341		# subcomponents must be listed in the configuration file).
2342		echo
2343		echo -n "The following components of FreeBSD "
2344		echo "seem to be installed:"
2345		tr '|' '/' < comp.present |
2346		    fmt -72
2347		echo
2348		echo -n "The following components of FreeBSD "
2349		echo "do not seem to be installed:"
2350		tr '|' '/' < comp.absent |
2351		    fmt -72
2352		echo
2353		continuep || return 1
2354		echo
2355
2356		# Suck the generated list of components into ${COMPONENTS}.
2357		# Note that comp.present.tmp is used due to issues with
2358		# pipelines and setting variables.
2359		COMPONENTS=""
2360		tr '|' '/' < comp.present > comp.present.tmp
2361		while read C; do
2362			COMPONENTS="${COMPONENTS} ${C}"
2363		done < comp.present.tmp
2364
2365		# Delete temporary files
2366		rm comp.present comp.present.tmp comp.absent comp.total
2367	fi
2368}
2369
2370# If StrictComponents is not "yes", COMPONENTS contains an entry
2371# corresponding to the currently running kernel, and said kernel
2372# does not exist in the new release, add "kernel/generic" to the
2373# list of components.
2374upgrade_guess_new_kernel () {
2375	if [ "${STRICTCOMPONENTS}" = "no" ]; then
2376		# Grab the unfiltered metadata file.
2377		METAHASH=`look "$1|" tINDEX.present | cut -f 2 -d '|'`
2378		gunzip -c < files/${METAHASH}.gz > $1.all
2379
2380		# If "kernel/${KCOMP}" is in ${COMPONENTS} and that component
2381		# isn't in $1.all, we need to add kernel/generic.
2382		for C in ${COMPONENTS}; do
2383			if [ ${C} = "kernel/${KCOMP}" ] &&
2384			    ! grep -qE "^kernel\|${KCOMP}\|" $1.all; then
2385				COMPONENTS="${COMPONENTS} kernel/generic"
2386				NKERNCONF="GENERIC"
2387				cat <<-EOF
2388
2389WARNING: This system is running a "${KCOMP}" kernel, which is not a
2390kernel configuration distributed as part of FreeBSD ${RELNUM}.
2391As part of upgrading to FreeBSD ${RELNUM}, this kernel will be
2392replaced with a "generic" kernel.
2393				EOF
2394				continuep || return 1
2395			fi
2396		done
2397
2398		# Don't need this any more...
2399		rm $1.all
2400	fi
2401}
2402
2403# Convert INDEX-OLD (last release) and INDEX-ALL (new release) into
2404# INDEX-OLD and INDEX-NEW files (in the sense of normal upgrades).
2405upgrade_oldall_to_oldnew () {
2406	# For each ${F}|... which appears in INDEX-ALL but does not appear
2407	# in INDEX-OLD, add ${F}|-|||||| to INDEX-OLD.
2408	cut -f 1 -d '|' < $1 |
2409	    sort -u > $1.paths
2410	cut -f 1 -d '|' < $2 |
2411	    sort -u |
2412	    comm -13 $1.paths - |
2413	    lam - -s "|-||||||" |
2414	    sort - $1 > $1.tmp
2415	mv $1.tmp $1
2416
2417	# Remove lines from INDEX-OLD which also appear in INDEX-ALL
2418	comm -23 $1 $2 > $1.tmp
2419	mv $1.tmp $1
2420
2421	# Remove lines from INDEX-ALL which have a file name not appearing
2422	# anywhere in INDEX-OLD (since these must be files which haven't
2423	# changed -- if they were new, there would be an entry of type "-").
2424	cut -f 1 -d '|' < $1 |
2425	    sort -u > $1.paths
2426	sort -k 1,1 -t '|' < $2 |
2427	    join -t '|' - $1.paths |
2428	    sort > $2.tmp
2429	rm $1.paths
2430	mv $2.tmp $2
2431
2432	# Rename INDEX-ALL to INDEX-NEW.
2433	mv $2 $3
2434}
2435
2436# Helper for upgrade_merge: Return zero true iff the two files differ only
2437# in the contents of their RCS tags.
2438samef () {
2439	X=`sed -E 's/\\$FreeBSD.*\\$/\$FreeBSD\$/' < $1 | ${SHA256}`
2440	Y=`sed -E 's/\\$FreeBSD.*\\$/\$FreeBSD\$/' < $2 | ${SHA256}`
2441
2442	if [ $X = $Y ]; then
2443		return 0;
2444	else
2445		return 1;
2446	fi
2447}
2448
2449# From the list of "old" files in $1, merge changes in $2 with those in $3,
2450# and update $3 to reflect the hashes of merged files.
2451upgrade_merge () {
2452	# We only need to do anything if $1 is non-empty.
2453	if [ -s $1 ]; then
2454		cut -f 1 -d '|' $1 |
2455		    sort > $1-paths
2456
2457		# Create staging area for merging files
2458		rm -rf merge/
2459		while read F; do
2460			D=`dirname ${F}`
2461			mkdir -p merge/old/${D}
2462			mkdir -p merge/${OLDRELNUM}/${D}
2463			mkdir -p merge/${RELNUM}/${D}
2464			mkdir -p merge/new/${D}
2465		done < $1-paths
2466
2467		# Copy in files
2468		while read F; do
2469			# Currently installed file
2470			V=`look "${F}|" $2 | cut -f 7 -d '|'`
2471			gunzip < files/${V}.gz > merge/old/${F}
2472
2473			# Old release
2474			if look "${F}|" $1 | fgrep -q "|f|"; then
2475				V=`look "${F}|" $1 | cut -f 3 -d '|'`
2476				gunzip < files/${V}.gz		\
2477				    > merge/${OLDRELNUM}/${F}
2478			fi
2479
2480			# New release
2481			if look "${F}|" $3 | cut -f 1,2,7 -d '|' |
2482			    fgrep -q "|f|"; then
2483				V=`look "${F}|" $3 | cut -f 7 -d '|'`
2484				gunzip < files/${V}.gz		\
2485				    > merge/${RELNUM}/${F}
2486			fi
2487		done < $1-paths
2488
2489		# Attempt to automatically merge changes
2490		echo -n "Attempting to automatically merge "
2491		echo -n "changes in files..."
2492		: > failed.merges
2493		while read F; do
2494			# If the file doesn't exist in the new release,
2495			# the result of "merging changes" is having the file
2496			# not exist.
2497			if ! [ -f merge/${RELNUM}/${F} ]; then
2498				continue
2499			fi
2500
2501			# If the file didn't exist in the old release, we're
2502			# going to throw away the existing file and hope that
2503			# the version from the new release is what we want.
2504			if ! [ -f merge/${OLDRELNUM}/${F} ]; then
2505				cp merge/${RELNUM}/${F} merge/new/${F}
2506				continue
2507			fi
2508
2509			# Some files need special treatment.
2510			case ${F} in
2511			/etc/spwd.db | /etc/pwd.db | /etc/login.conf.db)
2512				# Don't merge these -- we're rebuild them
2513				# after updates are installed.
2514				cp merge/old/${F} merge/new/${F}
2515				;;
2516			*)
2517				if ! diff3 -E -m -L "current version"	\
2518				    -L "${OLDRELNUM}" -L "${RELNUM}"	\
2519				    merge/old/${F}			\
2520				    merge/${OLDRELNUM}/${F}		\
2521				    merge/${RELNUM}/${F}		\
2522				    > merge/new/${F} 2>/dev/null; then
2523					echo ${F} >> failed.merges
2524				fi
2525				;;
2526			esac
2527		done < $1-paths
2528		echo " done."
2529
2530		# Ask the user to handle any files which didn't merge.
2531		while read F; do
2532			# If the installed file differs from the version in
2533			# the old release only due to RCS tag expansion
2534			# then just use the version in the new release.
2535			if samef merge/old/${F} merge/${OLDRELNUM}/${F}; then
2536				cp merge/${RELNUM}/${F} merge/new/${F}
2537				continue
2538			fi
2539
2540			cat <<-EOF
2541
2542The following file could not be merged automatically: ${F}
2543Press Enter to edit this file in ${EDITOR} and resolve the conflicts
2544manually...
2545			EOF
2546			while true; do
2547				read response </dev/tty
2548				if expr "${response}" : '[Aa][Cc][Cc][Ee][Pp][Tt]' > /dev/null; then
2549					echo
2550					break
2551				fi
2552				${EDITOR} `pwd`/merge/new/${F} < /dev/tty
2553
2554				if ! grep -qE '^(<<<<<<<|=======|>>>>>>>)([[:space:]].*)?$' $(pwd)/merge/new/${F} ; then
2555					break
2556				fi
2557				cat <<-EOF
2558
2559Merge conflict markers remain in: ${F}
2560These must be resolved for the system to be functional.
2561
2562Press Enter to return to editing this file, or type "ACCEPT" to carry on with
2563these lines remaining in the file.
2564				EOF
2565			done
2566		done < failed.merges
2567		rm failed.merges
2568
2569		# Ask the user to confirm that he likes how the result
2570		# of merging files.
2571		while read F; do
2572			# Skip files which haven't changed except possibly
2573			# in their RCS tags.
2574			if [ -f merge/old/${F} ] && [ -f merge/new/${F} ] &&
2575			    samef merge/old/${F} merge/new/${F}; then
2576				continue
2577			fi
2578
2579			# Skip files where the installed file differs from
2580			# the old file only due to RCS tags.
2581			if [ -f merge/old/${F} ] &&
2582			    [ -f merge/${OLDRELNUM}/${F} ] &&
2583			    samef merge/old/${F} merge/${OLDRELNUM}/${F}; then
2584				continue
2585			fi
2586
2587			# Warn about files which are ceasing to exist.
2588			if ! [ -f merge/new/${F} ]; then
2589				cat <<-EOF
2590
2591The following file will be removed, as it no longer exists in
2592FreeBSD ${RELNUM}: ${F}
2593				EOF
2594				continuep < /dev/tty || return 1
2595				continue
2596			fi
2597
2598			# Print changes for the user's approval.
2599			cat <<-EOF
2600
2601The following changes, which occurred between FreeBSD ${OLDRELNUM} and
2602FreeBSD ${RELNUM} have been merged into ${F}:
2603EOF
2604			diff -U 5 -L "current version" -L "new version"	\
2605			    merge/old/${F} merge/new/${F} || true
2606			continuep < /dev/tty || return 1
2607		done < $1-paths
2608
2609		# Store merged files.
2610		while read F; do
2611			if [ -f merge/new/${F} ]; then
2612				V=`${SHA256} -q merge/new/${F}`
2613
2614				gzip -c < merge/new/${F} > files/${V}.gz
2615				echo "${F}|${V}"
2616			fi
2617		done < $1-paths > newhashes
2618
2619		# Pull lines out from $3 which need to be updated to
2620		# reflect merged files.
2621		while read F; do
2622			look "${F}|" $3
2623		done < $1-paths > $3-oldlines
2624
2625		# Update lines to reflect merged files
2626		join -t '|' -o 1.1,1.2,1.3,1.4,1.5,1.6,2.2,1.8		\
2627		    $3-oldlines newhashes > $3-newlines
2628
2629		# Remove old lines from $3 and add new lines.
2630		sort $3-oldlines |
2631		    comm -13 - $3 |
2632		    sort - $3-newlines > $3.tmp
2633		mv $3.tmp $3
2634
2635		# Clean up
2636		rm $1-paths newhashes $3-oldlines $3-newlines
2637		rm -rf merge/
2638	fi
2639
2640	# We're done with merging files.
2641	rm $1
2642}
2643
2644# Do the work involved in fetching upgrades to a new release
2645upgrade_run () {
2646	workdir_init || return 1
2647
2648	# Prepare the mirror list.
2649	fetch_pick_server_init && fetch_pick_server
2650
2651	# Try to fetch the public key until we run out of servers.
2652	while ! fetch_key; do
2653		fetch_pick_server || return 1
2654	done
2655
2656	# Try to fetch the metadata index signature ("tag") until we run
2657	# out of available servers; and sanity check the downloaded tag.
2658	while ! fetch_tag; do
2659		fetch_pick_server || return 1
2660	done
2661	fetch_tagsanity || return 1
2662
2663	# Fetch the INDEX-OLD and INDEX-ALL.
2664	fetch_metadata INDEX-OLD INDEX-ALL || return 1
2665
2666	# If StrictComponents is not "yes", generate a new components list
2667	# with only the components which appear to be installed.
2668	upgrade_guess_components INDEX-ALL || return 1
2669
2670	# Generate filtered INDEX-OLD and INDEX-ALL files containing only
2671	# the components we want and without anything marked as "Ignore".
2672	fetch_filter_metadata INDEX-OLD || return 1
2673	fetch_filter_metadata INDEX-ALL || return 1
2674
2675	# Merge the INDEX-OLD and INDEX-ALL files into INDEX-OLD.
2676	sort INDEX-OLD INDEX-ALL > INDEX-OLD.tmp
2677	mv INDEX-OLD.tmp INDEX-OLD
2678	rm INDEX-ALL
2679
2680	# Adjust variables for fetching files from the new release.
2681	OLDRELNUM=${RELNUM}
2682	RELNUM=${TARGETRELEASE}
2683	OLDFETCHDIR=${FETCHDIR}
2684	FETCHDIR=${RELNUM}/${ARCH}
2685
2686	# Try to fetch the NEW metadata index signature ("tag") until we run
2687	# out of available servers; and sanity check the downloaded tag.
2688	while ! fetch_tag; do
2689		fetch_pick_server || return 1
2690	done
2691
2692	# Fetch the new INDEX-ALL.
2693	fetch_metadata INDEX-ALL || return 1
2694
2695	# If StrictComponents is not "yes", COMPONENTS contains an entry
2696	# corresponding to the currently running kernel, and said kernel
2697	# does not exist in the new release, add "kernel/generic" to the
2698	# list of components.
2699	upgrade_guess_new_kernel INDEX-ALL || return 1
2700
2701	# Filter INDEX-ALL to contain only the components we want and without
2702	# anything marked as "Ignore".
2703	fetch_filter_metadata INDEX-ALL || return 1
2704
2705	# Convert INDEX-OLD (last release) and INDEX-ALL (new release) into
2706	# INDEX-OLD and INDEX-NEW files (in the sense of normal upgrades).
2707	upgrade_oldall_to_oldnew INDEX-OLD INDEX-ALL INDEX-NEW
2708
2709	# Translate /boot/${KERNCONF} or /boot/${NKERNCONF} into ${KERNELDIR}
2710	fetch_filter_kernel_names INDEX-NEW ${NKERNCONF}
2711	fetch_filter_kernel_names INDEX-OLD ${KERNCONF}
2712
2713	# For all paths appearing in INDEX-OLD or INDEX-NEW, inspect the
2714	# system and generate an INDEX-PRESENT file.
2715	fetch_inspect_system INDEX-OLD INDEX-PRESENT INDEX-NEW || return 1
2716
2717	# Based on ${MERGECHANGES}, generate a file tomerge-old with the
2718	# paths and hashes of old versions of files to merge.
2719	fetch_filter_mergechanges INDEX-OLD INDEX-PRESENT INDEX-NEW tomerge-old
2720
2721	# Based on ${UPDATEIFUNMODIFIED}, remove lines from INDEX-* which
2722	# correspond to lines in INDEX-PRESENT with hashes not appearing
2723	# in INDEX-OLD or INDEX-NEW.  Also remove lines where the entry in
2724	# INDEX-PRESENT has type - and there isn't a corresponding entry in
2725	# INDEX-OLD with type -.
2726	fetch_filter_unmodified_notpresent	\
2727	    INDEX-OLD INDEX-PRESENT INDEX-NEW tomerge-old
2728
2729	# For each entry in INDEX-PRESENT of type -, remove any corresponding
2730	# entry from INDEX-NEW if ${ALLOWADD} != "yes".  Remove all entries
2731	# of type - from INDEX-PRESENT.
2732	fetch_filter_allowadd INDEX-PRESENT INDEX-NEW
2733
2734	# If ${ALLOWDELETE} != "yes", then remove any entries from
2735	# INDEX-PRESENT which don't correspond to entries in INDEX-NEW.
2736	fetch_filter_allowdelete INDEX-PRESENT INDEX-NEW
2737
2738	# If ${KEEPMODIFIEDMETADATA} == "yes", then for each entry in
2739	# INDEX-PRESENT with metadata not matching any entry in INDEX-OLD,
2740	# replace the corresponding line of INDEX-NEW with one having the
2741	# same metadata as the entry in INDEX-PRESENT.
2742	fetch_filter_modified_metadata INDEX-OLD INDEX-PRESENT INDEX-NEW
2743
2744	# Remove lines from INDEX-PRESENT and INDEX-NEW which are identical;
2745	# no need to update a file if it isn't changing.
2746	fetch_filter_uptodate INDEX-PRESENT INDEX-NEW
2747
2748	# Fetch "clean" files from the old release for merging changes.
2749	fetch_files_premerge tomerge-old
2750
2751	# Prepare to fetch files: Generate a list of the files we need,
2752	# copy the unmodified files we have into /files/, and generate
2753	# a list of patches to download.
2754	fetch_files_prepare INDEX-OLD INDEX-PRESENT INDEX-NEW || return 1
2755
2756	# Fetch patches from to-${RELNUM}/${ARCH}/bp/
2757	PATCHDIR=to-${RELNUM}/${ARCH}/bp
2758	fetch_files || return 1
2759
2760	# Merge configuration file changes.
2761	upgrade_merge tomerge-old INDEX-PRESENT INDEX-NEW || return 1
2762
2763	# Create and populate install manifest directory; and report what
2764	# updates are available.
2765	fetch_create_manifest || return 1
2766
2767	# Leave a note behind to tell the "install" command that the kernel
2768	# needs to be installed before the world.
2769	touch ${BDHASH}-install/kernelfirst
2770
2771	# Remind the user that they need to run "freebsd-update install"
2772	# to install the downloaded bits, in case they didn't RTFM.
2773	echo "To install the downloaded upgrades, run \"$0 install\"."
2774}
2775
2776# Make sure that all the file hashes mentioned in $@ have corresponding
2777# gzipped files stored in /files/.
2778install_verify () {
2779	# Generate a list of hashes
2780	cat $@ |
2781	    cut -f 2,7 -d '|' |
2782	    grep -E '^f' |
2783	    cut -f 2 -d '|' |
2784	    sort -u > filelist
2785
2786	# Make sure all the hashes exist
2787	while read HASH; do
2788		if ! [ -f files/${HASH}.gz ]; then
2789			echo -n "Update files missing -- "
2790			echo "this should never happen."
2791			echo "Re-run '$0 fetch'."
2792			return 1
2793		fi
2794	done < filelist
2795
2796	# Clean up
2797	rm filelist
2798}
2799
2800# Remove the system immutable flag from files
2801install_unschg () {
2802	# Generate file list
2803	cat $@ |
2804	    cut -f 1 -d '|' > filelist
2805
2806	# Remove flags
2807	while read F; do
2808		if ! [ -e ${BASEDIR}/${F} ]; then
2809			continue
2810		else
2811			echo ${BASEDIR}/${F}
2812		fi
2813	done < filelist | xargs chflags noschg || return 1
2814
2815	# Clean up
2816	rm filelist
2817}
2818
2819# Decide which directory name to use for kernel backups.
2820backup_kernel_finddir () {
2821	CNT=0
2822	while true ; do
2823		# Pathname does not exist, so it is OK use that name
2824		# for backup directory.
2825		if [ ! -e $BASEDIR/$BACKUPKERNELDIR ]; then
2826			return 0
2827		fi
2828
2829		# If directory do exist, we only use if it has our
2830		# marker file.
2831		if [ -d $BASEDIR/$BACKUPKERNELDIR -a \
2832			-e $BASEDIR/$BACKUPKERNELDIR/.freebsd-update ]; then
2833			return 0
2834		fi
2835
2836		# We could not use current directory name, so add counter to
2837		# the end and try again.
2838		CNT=$((CNT + 1))
2839		if [ $CNT -gt 9 ]; then
2840			echo "Could not find valid backup dir ($BASEDIR/$BACKUPKERNELDIR)"
2841			exit 1
2842		fi
2843		BACKUPKERNELDIR="`echo $BACKUPKERNELDIR | sed -Ee 's/[0-9]\$//'`"
2844		BACKUPKERNELDIR="${BACKUPKERNELDIR}${CNT}"
2845	done
2846}
2847
2848# Backup the current kernel using hardlinks, if not disabled by user.
2849# Since we delete all files in the directory used for previous backups
2850# we create a marker file called ".freebsd-update" in the directory so
2851# we can determine on the next run that the directory was created by
2852# freebsd-update and we then do not accidentally remove user files in
2853# the unlikely case that the user has created a directory with a
2854# conflicting name.
2855backup_kernel () {
2856	# Only make kernel backup is so configured.
2857	if [ $BACKUPKERNEL != yes ]; then
2858		return 0
2859	fi
2860
2861	# Decide which directory name to use for kernel backups.
2862	backup_kernel_finddir
2863
2864	# Remove old kernel backup files.  If $BACKUPKERNELDIR was
2865	# "not ours", backup_kernel_finddir would have exited, so
2866	# deleting the directory content is as safe as we can make it.
2867	if [ -d $BASEDIR/$BACKUPKERNELDIR ]; then
2868		rm -fr $BASEDIR/$BACKUPKERNELDIR
2869	fi
2870
2871	# Create directories for backup.
2872	mkdir -p $BASEDIR/$BACKUPKERNELDIR
2873	mtree -cdn -p "${BASEDIR}/${KERNELDIR}" | \
2874	    mtree -Ue -p "${BASEDIR}/${BACKUPKERNELDIR}" > /dev/null
2875
2876	# Mark the directory as having been created by freebsd-update.
2877	touch $BASEDIR/$BACKUPKERNELDIR/.freebsd-update
2878	if [ $? -ne 0 ]; then
2879		echo "Could not create kernel backup directory"
2880		exit 1
2881	fi
2882
2883	# Disable pathname expansion to be sure *.symbols is not
2884	# expanded.
2885	set -f
2886
2887	# Use find to ignore symbol files, unless disabled by user.
2888	if [ $BACKUPKERNELSYMBOLFILES = yes ]; then
2889		FINDFILTER=""
2890	else
2891		FINDFILTER="-a ! -name *.debug -a ! -name *.symbols"
2892	fi
2893
2894	# Backup all the kernel files using hardlinks.
2895	(cd ${BASEDIR}/${KERNELDIR} && find . -type f $FINDFILTER -exec \
2896	    cp -pl '{}' ${BASEDIR}/${BACKUPKERNELDIR}/'{}' \;)
2897
2898	# Re-enable patchname expansion.
2899	set +f
2900}
2901
2902# Check for and remove an existing directory that conflicts with the file or
2903# symlink that we are going to install.
2904dir_conflict () {
2905	if [ -d "$1" ]; then
2906		echo "Removing conflicting directory $1"
2907		rm -rf -- "$1"
2908	fi
2909}
2910
2911# Install new files
2912install_from_index () {
2913	# First pass: Do everything apart from setting file flags.  We
2914	# can't set flags yet, because schg inhibits hard linking.
2915	sort -k 1,1 -t '|' $1 |
2916	    tr '|' ' ' |
2917	    while read FPATH TYPE OWNER GROUP PERM FLAGS HASH LINK; do
2918		case ${TYPE} in
2919		d)
2920			# Create a directory.  A file may change to a directory
2921			# on upgrade (PR273661).  If that happens, remove the
2922			# file first.
2923			if [ -e "${BASEDIR}/${FPATH}" ] && \
2924			    ! [ -d "${BASEDIR}/${FPATH}" ]; then
2925				rm -f -- "${BASEDIR}/${FPATH}"
2926			fi
2927			install -d -o ${OWNER} -g ${GROUP}		\
2928			    -m ${PERM} ${BASEDIR}/${FPATH}
2929			;;
2930		f)
2931			dir_conflict "${BASEDIR}/${FPATH}"
2932			if [ -z "${LINK}" ]; then
2933				# Create a file, without setting flags.
2934				gunzip < files/${HASH}.gz > ${HASH}
2935				install -S -o ${OWNER} -g ${GROUP}	\
2936				    -m ${PERM} ${HASH} ${BASEDIR}/${FPATH}
2937				rm ${HASH}
2938			else
2939				# Create a hard link.
2940				ln -f ${BASEDIR}/${LINK} ${BASEDIR}/${FPATH}
2941			fi
2942			;;
2943		L)
2944			dir_conflict "${BASEDIR}/${FPATH}"
2945			# Create a symlink
2946			ln -sfh ${HASH} ${BASEDIR}/${FPATH}
2947			;;
2948		esac
2949	    done
2950
2951	# Perform a second pass, adding file flags.
2952	tr '|' ' ' < $1 |
2953	    while read FPATH TYPE OWNER GROUP PERM FLAGS HASH LINK; do
2954		if [ ${TYPE} = "f" ] &&
2955		    ! [ ${FLAGS} = "0" ]; then
2956			chflags ${FLAGS} ${BASEDIR}/${FPATH}
2957		fi
2958	    done
2959}
2960
2961# Remove files which we want to delete
2962install_delete () {
2963	# Generate list of new files
2964	cut -f 1 -d '|' < $2 |
2965	    sort > newfiles
2966
2967	# Generate subindex of old files we want to nuke
2968	sort -k 1,1 -t '|' $1 |
2969	    join -t '|' -v 1 - newfiles |
2970	    sort -r -k 1,1 -t '|' |
2971	    cut -f 1,2 -d '|' |
2972	    tr '|' ' ' > killfiles
2973
2974	# Remove the offending bits
2975	while read FPATH TYPE; do
2976		case ${TYPE} in
2977		d)
2978			rmdir ${BASEDIR}/${FPATH}
2979			;;
2980		f)
2981			if [ -f "${BASEDIR}/${FPATH}" ]; then
2982				rm "${BASEDIR}/${FPATH}"
2983			fi
2984			;;
2985		L)
2986			if [ -L "${BASEDIR}/${FPATH}" ]; then
2987				rm "${BASEDIR}/${FPATH}"
2988			fi
2989			;;
2990		esac
2991	done < killfiles
2992
2993	# Clean up
2994	rm newfiles killfiles
2995}
2996
2997# Install new files, delete old files, and update generated files
2998install_files () {
2999	# If we haven't already dealt with the kernel, deal with it.
3000	if ! [ -f $1/kerneldone ]; then
3001		grep -E '^/boot/' $1/INDEX-OLD > INDEX-OLD
3002		grep -E '^/boot/' $1/INDEX-NEW > INDEX-NEW
3003
3004		# Backup current kernel before installing a new one
3005		backup_kernel || return 1
3006
3007		# Install new files
3008		install_from_index INDEX-NEW || return 1
3009
3010		# Remove files which need to be deleted
3011		install_delete INDEX-OLD INDEX-NEW || return 1
3012
3013		# Update linker.hints if necessary
3014		if [ -s INDEX-OLD -o -s INDEX-NEW ]; then
3015			kldxref -R ${BASEDIR}/boot/ 2>/dev/null
3016		fi
3017
3018		# We've finished updating the kernel.
3019		touch $1/kerneldone
3020
3021		# Do we need to ask for a reboot now?
3022		if [ -f $1/kernelfirst ] &&
3023		    [ -s INDEX-OLD -o -s INDEX-NEW ]; then
3024			cat <<-EOF
3025
3026Kernel updates have been installed.  Please reboot and run
3027"$0 install" again to finish installing updates.
3028			EOF
3029			exit 0
3030		fi
3031	fi
3032
3033	# If we haven't already dealt with the world, deal with it.
3034	if ! [ -f $1/worlddone ]; then
3035		# Create any necessary directories first
3036		grep -vE '^/boot/' $1/INDEX-NEW |
3037		    grep -E '^[^|]+\|d\|' > INDEX-NEW
3038		install_from_index INDEX-NEW || return 1
3039
3040		# Install new runtime linker
3041		grep -vE '^/boot/' $1/INDEX-NEW |
3042		    grep -vE '^[^|]+\|d\|' |
3043		    grep -E '^/libexec/ld-elf[^|]*\.so\.[0-9]+\|' > INDEX-NEW
3044		install_from_index INDEX-NEW || return 1
3045
3046		# Install new shared libraries next
3047		grep -vE '^/boot/' $1/INDEX-NEW |
3048		    grep -vE '^[^|]+\|d\|' |
3049		    grep -vE '^/libexec/ld-elf[^|]*\.so\.[0-9]+\|' |
3050		    grep -E '^[^|]*/lib/[^|]*\.so\.[0-9]+\|' > INDEX-NEW
3051		install_from_index INDEX-NEW || return 1
3052
3053		# Deal with everything else
3054		grep -vE '^/boot/' $1/INDEX-OLD |
3055		    grep -vE '^[^|]+\|d\|' |
3056		    grep -vE '^/libexec/ld-elf[^|]*\.so\.[0-9]+\|' |
3057		    grep -vE '^[^|]*/lib/[^|]*\.so\.[0-9]+\|' > INDEX-OLD
3058		grep -vE '^/boot/' $1/INDEX-NEW |
3059		    grep -vE '^[^|]+\|d\|' |
3060		    grep -vE '^/libexec/ld-elf[^|]*\.so\.[0-9]+\|' |
3061		    grep -vE '^[^|]*/lib/[^|]*\.so\.[0-9]+\|' > INDEX-NEW
3062		install_from_index INDEX-NEW || return 1
3063		install_delete INDEX-OLD INDEX-NEW || return 1
3064
3065		# Restart host sshd if running (PR263489).  Note that this does
3066		# not affect child sshd processes handling existing sessions.
3067		if [ "$BASEDIR" = / ] && \
3068		    service sshd status >/dev/null 2>/dev/null; then
3069			echo
3070			echo "Restarting sshd after upgrade"
3071			service sshd restart
3072		fi
3073
3074		# Rehash certs if we actually have certctl installed.
3075		if which certctl>/dev/null; then
3076			env DESTDIR=${BASEDIR} certctl rehash
3077		fi
3078
3079		# Rebuild generated pwd files and /etc/login.conf.db.
3080		pwd_mkdb -d ${BASEDIR}/etc -p ${BASEDIR}/etc/master.passwd
3081		cap_mkdb ${BASEDIR}/etc/login.conf
3082
3083		# Rebuild man page databases, if necessary.
3084		for D in /usr/share/man /usr/share/openssl/man; do
3085			if [ ! -d ${BASEDIR}/$D ]; then
3086				continue
3087			fi
3088			if [ -f ${BASEDIR}/$D/mandoc.db ] && \
3089			    [ -z "$(find ${BASEDIR}/$D -type f -newer ${BASEDIR}/$D/mandoc.db)" ]; then
3090				continue;
3091			fi
3092			makewhatis ${BASEDIR}/$D
3093		done
3094
3095		# We've finished installing the world and deleting old files
3096		# which are not shared libraries.
3097		touch $1/worlddone
3098
3099		# Do we need to ask the user to portupgrade now?
3100		grep -vE '^/boot/' $1/INDEX-NEW |
3101		    grep -E '^[^|]*/lib/[^|]*\.so\.[0-9]+\|' |
3102		    cut -f 1 -d '|' |
3103		    sort > newfiles
3104		if grep -vE '^/boot/' $1/INDEX-OLD |
3105		    grep -E '^[^|]*/lib/[^|]*\.so\.[0-9]+\|' |
3106		    cut -f 1 -d '|' |
3107		    sort |
3108		    join -v 1 - newfiles |
3109		    grep -q .; then
3110			cat <<-EOF
3111
3112Completing this upgrade requires removing old shared object files.
3113Please rebuild all installed 3rd party software (e.g., programs
3114installed from the ports tree) and then run "$0 install"
3115again to finish installing updates.
3116			EOF
3117			rm newfiles
3118			exit 0
3119		fi
3120		rm newfiles
3121	fi
3122
3123	# Remove old shared libraries
3124	grep -vE '^/boot/' $1/INDEX-NEW |
3125	    grep -vE '^[^|]+\|d\|' |
3126	    grep -E '^[^|]*/lib/[^|]*\.so\.[0-9]+\|' > INDEX-NEW
3127	grep -vE '^/boot/' $1/INDEX-OLD |
3128	    grep -vE '^[^|]+\|d\|' |
3129	    grep -E '^[^|]*/lib/[^|]*\.so\.[0-9]+\|' > INDEX-OLD
3130	install_delete INDEX-OLD INDEX-NEW || return 1
3131
3132	# Remove old directories
3133	grep -vE '^/boot/' $1/INDEX-NEW |
3134	    grep -E '^[^|]+\|d\|' > INDEX-NEW
3135	grep -vE '^/boot/' $1/INDEX-OLD |
3136	    grep -E '^[^|]+\|d\|' > INDEX-OLD
3137	install_delete INDEX-OLD INDEX-NEW || return 1
3138
3139	# Remove temporary files
3140	rm INDEX-OLD INDEX-NEW
3141}
3142
3143# Rearrange bits to allow the installed updates to be rolled back
3144install_setup_rollback () {
3145	# Remove the "reboot after installing kernel", "kernel updated", and
3146	# "finished installing the world" flags if present -- they are
3147	# irrelevant when rolling back updates.
3148	if [ -f ${BDHASH}-install/kernelfirst ]; then
3149		rm ${BDHASH}-install/kernelfirst
3150		rm ${BDHASH}-install/kerneldone
3151	fi
3152	if [ -f ${BDHASH}-install/worlddone ]; then
3153		rm ${BDHASH}-install/worlddone
3154	fi
3155
3156	if [ -L ${BDHASH}-rollback ]; then
3157		mv ${BDHASH}-rollback ${BDHASH}-install/rollback
3158	fi
3159
3160	mv ${BDHASH}-install ${BDHASH}-rollback
3161}
3162
3163# Actually install updates
3164install_run () {
3165	echo -n "Installing updates..."
3166
3167	# Make sure we have all the files we should have
3168	install_verify ${BDHASH}-install/INDEX-OLD	\
3169	    ${BDHASH}-install/INDEX-NEW || return 1
3170
3171	# Remove system immutable flag from files
3172	install_unschg ${BDHASH}-install/INDEX-OLD	\
3173	    ${BDHASH}-install/INDEX-NEW || return 1
3174
3175	# Install new files, delete old files, and update linker.hints
3176	install_files ${BDHASH}-install || return 1
3177
3178	# Rearrange bits to allow the installed updates to be rolled back
3179	install_setup_rollback
3180
3181	echo " done."
3182}
3183
3184# Rearrange bits to allow the previous set of updates to be rolled back next.
3185rollback_setup_rollback () {
3186	if [ -L ${BDHASH}-rollback/rollback ]; then
3187		mv ${BDHASH}-rollback/rollback rollback-tmp
3188		rm -r ${BDHASH}-rollback/
3189		rm ${BDHASH}-rollback
3190		mv rollback-tmp ${BDHASH}-rollback
3191	else
3192		rm -r ${BDHASH}-rollback/
3193		rm ${BDHASH}-rollback
3194	fi
3195}
3196
3197# Install old files, delete new files, and update linker.hints
3198rollback_files () {
3199	# Create directories first.  They may be needed by files we will
3200	# install in subsequent steps (PR273950).
3201	awk -F \| '{if ($2 == "d") print }' $1/INDEX-OLD > INDEX-OLD
3202	install_from_index INDEX-OLD || return 1
3203
3204	# Install old shared library files which don't have the same path as
3205	# a new shared library file.
3206	grep -vE '^/boot/' $1/INDEX-NEW |
3207	    grep -E '/lib/.*\.so\.[0-9]+\|' |
3208	    cut -f 1 -d '|' |
3209	    sort > INDEX-NEW.libs.flist
3210	grep -vE '^/boot/' $1/INDEX-OLD |
3211	    grep -E '/lib/.*\.so\.[0-9]+\|' |
3212	    sort -k 1,1 -t '|' - |
3213	    join -t '|' -v 1 - INDEX-NEW.libs.flist > INDEX-OLD
3214	install_from_index INDEX-OLD || return 1
3215
3216	# Deal with files which are neither kernel nor shared library
3217	grep -vE '^/boot/' $1/INDEX-OLD |
3218	    grep -vE '/lib/.*\.so\.[0-9]+\|' > INDEX-OLD
3219	grep -vE '^/boot/' $1/INDEX-NEW |
3220	    grep -vE '/lib/.*\.so\.[0-9]+\|' > INDEX-NEW
3221	install_from_index INDEX-OLD || return 1
3222	install_delete INDEX-NEW INDEX-OLD || return 1
3223
3224	# Install any old shared library files which we didn't install above.
3225	grep -vE '^/boot/' $1/INDEX-OLD |
3226	    grep -E '/lib/.*\.so\.[0-9]+\|' |
3227	    sort -k 1,1 -t '|' - |
3228	    join -t '|' - INDEX-NEW.libs.flist > INDEX-OLD
3229	install_from_index INDEX-OLD || return 1
3230
3231	# Delete unneeded shared library files
3232	grep -vE '^/boot/' $1/INDEX-OLD |
3233	    grep -E '/lib/.*\.so\.[0-9]+\|' > INDEX-OLD
3234	grep -vE '^/boot/' $1/INDEX-NEW |
3235	    grep -E '/lib/.*\.so\.[0-9]+\|' > INDEX-NEW
3236	install_delete INDEX-NEW INDEX-OLD || return 1
3237
3238	# Deal with kernel files
3239	grep -E '^/boot/' $1/INDEX-OLD > INDEX-OLD
3240	grep -E '^/boot/' $1/INDEX-NEW > INDEX-NEW
3241	install_from_index INDEX-OLD || return 1
3242	install_delete INDEX-NEW INDEX-OLD || return 1
3243	if [ -s INDEX-OLD -o -s INDEX-NEW ]; then
3244		kldxref -R /boot/ 2>/dev/null
3245	fi
3246
3247	# Remove temporary files
3248	rm INDEX-OLD INDEX-NEW INDEX-NEW.libs.flist
3249}
3250
3251# Actually rollback updates
3252rollback_run () {
3253	echo -n "Uninstalling updates..."
3254
3255	# If there are updates waiting to be installed, remove them; we
3256	# want the user to re-run 'fetch' after rolling back updates.
3257	if [ -L ${BDHASH}-install ]; then
3258		rm -r ${BDHASH}-install/
3259		rm ${BDHASH}-install
3260	fi
3261
3262	# Make sure we have all the files we should have
3263	install_verify ${BDHASH}-rollback/INDEX-NEW	\
3264	    ${BDHASH}-rollback/INDEX-OLD || return 1
3265
3266	# Remove system immutable flag from files
3267	install_unschg ${BDHASH}-rollback/INDEX-NEW	\
3268	    ${BDHASH}-rollback/INDEX-OLD || return 1
3269
3270	# Install old files, delete new files, and update linker.hints
3271	rollback_files ${BDHASH}-rollback || return 1
3272
3273	# Remove the rollback directory and the symlink pointing to it; and
3274	# rearrange bits to allow the previous set of updates to be rolled
3275	# back next.
3276	rollback_setup_rollback
3277
3278	echo " done."
3279}
3280
3281# Compare INDEX-ALL and INDEX-PRESENT and print warnings about differences.
3282IDS_compare () {
3283	# Get all the lines which mismatch in something other than file
3284	# flags.  We ignore file flags because sysinstall doesn't seem to
3285	# set them when it installs FreeBSD; warning about these adds a
3286	# very large amount of noise.
3287	cut -f 1-5,7-8 -d '|' $1 > $1.noflags
3288	sort -k 1,1 -t '|' $1.noflags > $1.sorted
3289	cut -f 1-5,7-8 -d '|' $2 |
3290	    comm -13 $1.noflags - |
3291	    fgrep -v '|-|||||' |
3292	    sort -k 1,1 -t '|' |
3293	    join -t '|' $1.sorted - > INDEX-NOTMATCHING
3294
3295	# Ignore files which match IDSIGNOREPATHS.
3296	for X in ${IDSIGNOREPATHS}; do
3297		grep -E "^${X}" INDEX-NOTMATCHING
3298	done |
3299	    sort -u |
3300	    comm -13 - INDEX-NOTMATCHING > INDEX-NOTMATCHING.tmp
3301	mv INDEX-NOTMATCHING.tmp INDEX-NOTMATCHING
3302
3303	# Go through the lines and print warnings.
3304	local IFS='|'
3305	while read FPATH TYPE OWNER GROUP PERM HASH LINK P_TYPE P_OWNER P_GROUP P_PERM P_HASH P_LINK; do
3306		# Warn about different object types.
3307		if ! [ "${TYPE}" = "${P_TYPE}" ]; then
3308			echo -n "${FPATH} is a "
3309			case "${P_TYPE}" in
3310			f)	echo -n "regular file, "
3311				;;
3312			d)	echo -n "directory, "
3313				;;
3314			L)	echo -n "symlink, "
3315				;;
3316			esac
3317			echo -n "but should be a "
3318			case "${TYPE}" in
3319			f)	echo -n "regular file."
3320				;;
3321			d)	echo -n "directory."
3322				;;
3323			L)	echo -n "symlink."
3324				;;
3325			esac
3326			echo
3327
3328			# Skip other tests, since they don't make sense if
3329			# we're comparing different object types.
3330			continue
3331		fi
3332
3333		# Warn about different owners.
3334		if ! [ "${OWNER}" = "${P_OWNER}" ]; then
3335			echo -n "${FPATH} is owned by user id ${P_OWNER}, "
3336			echo "but should be owned by user id ${OWNER}."
3337		fi
3338
3339		# Warn about different groups.
3340		if ! [ "${GROUP}" = "${P_GROUP}" ]; then
3341			echo -n "${FPATH} is owned by group id ${P_GROUP}, "
3342			echo "but should be owned by group id ${GROUP}."
3343		fi
3344
3345		# Warn about different permissions.  We do not warn about
3346		# different permissions on symlinks, since some archivers
3347		# don't extract symlink permissions correctly and they are
3348		# ignored anyway.
3349		if ! [ "${PERM}" = "${P_PERM}" ] &&
3350		    ! [ "${TYPE}" = "L" ]; then
3351			echo -n "${FPATH} has ${P_PERM} permissions, "
3352			echo "but should have ${PERM} permissions."
3353		fi
3354
3355		# Warn about different file hashes / symlink destinations.
3356		if ! [ "${HASH}" = "${P_HASH}" ]; then
3357			if [ "${TYPE}" = "L" ]; then
3358				echo -n "${FPATH} is a symlink to ${P_HASH}, "
3359				echo "but should be a symlink to ${HASH}."
3360			fi
3361			if [ "${TYPE}" = "f" ]; then
3362				echo -n "${FPATH} has SHA256 hash ${P_HASH}, "
3363				echo "but should have SHA256 hash ${HASH}."
3364			fi
3365		fi
3366
3367		# We don't warn about different hard links, since some
3368		# some archivers break hard links, and as long as the
3369		# underlying data is correct they really don't matter.
3370	done < INDEX-NOTMATCHING
3371
3372	# Clean up
3373	rm $1 $1.noflags $1.sorted $2 INDEX-NOTMATCHING
3374}
3375
3376# Do the work involved in comparing the system to a "known good" index
3377IDS_run () {
3378	workdir_init || return 1
3379
3380	# Prepare the mirror list.
3381	fetch_pick_server_init && fetch_pick_server
3382
3383	# Try to fetch the public key until we run out of servers.
3384	while ! fetch_key; do
3385		fetch_pick_server || return 1
3386	done
3387
3388	# Try to fetch the metadata index signature ("tag") until we run
3389	# out of available servers; and sanity check the downloaded tag.
3390	while ! fetch_tag; do
3391		fetch_pick_server || return 1
3392	done
3393	fetch_tagsanity || return 1
3394
3395	# Fetch INDEX-OLD and INDEX-ALL.
3396	fetch_metadata INDEX-OLD INDEX-ALL || return 1
3397
3398	# Generate filtered INDEX-OLD and INDEX-ALL files containing only
3399	# the components we want and without anything marked as "Ignore".
3400	fetch_filter_metadata INDEX-OLD || return 1
3401	fetch_filter_metadata INDEX-ALL || return 1
3402
3403	# Merge the INDEX-OLD and INDEX-ALL files into INDEX-ALL.
3404	sort INDEX-OLD INDEX-ALL > INDEX-ALL.tmp
3405	mv INDEX-ALL.tmp INDEX-ALL
3406	rm INDEX-OLD
3407
3408	# Translate /boot/${KERNCONF} to ${KERNELDIR}
3409	fetch_filter_kernel_names INDEX-ALL ${KERNCONF}
3410
3411	# Inspect the system and generate an INDEX-PRESENT file.
3412	fetch_inspect_system INDEX-ALL INDEX-PRESENT /dev/null || return 1
3413
3414	# Compare INDEX-ALL and INDEX-PRESENT and print warnings about any
3415	# differences.
3416	IDS_compare INDEX-ALL INDEX-PRESENT
3417}
3418
3419#### Main functions -- call parameter-handling and core functions
3420
3421# Using the command line, configuration file, and defaults,
3422# set all the parameters which are needed later.
3423get_params () {
3424	init_params
3425	parse_cmdline $@
3426	parse_conffile
3427	default_params
3428}
3429
3430# Fetch command.  Make sure that we're being called
3431# interactively, then run fetch_check_params and fetch_run
3432cmd_fetch () {
3433	finalize_components_config ${COMPONENTS}
3434	if [ ! -t 0 -a $NOTTYOK -eq 0 ]; then
3435		echo -n "`basename $0` fetch should not "
3436		echo "be run non-interactively."
3437		echo "Run `basename $0` cron instead."
3438		exit 1
3439	fi
3440	fetch_check_params
3441	fetch_run || exit 1
3442	ISFETCHED=1
3443}
3444
3445# Cron command.  Make sure the parameters are sensible; wait
3446# rand(3600) seconds; then fetch updates.  While fetching updates,
3447# send output to a temporary file; only print that file if the
3448# fetching failed.
3449cmd_cron () {
3450	fetch_check_params
3451	sleep `jot -r 1 0 3600`
3452
3453	TMPFILE=`mktemp /tmp/freebsd-update.XXXXXX` || exit 1
3454	finalize_components_config ${COMPONENTS} >> ${TMPFILE}
3455	if ! fetch_run >> ${TMPFILE} ||
3456	    ! grep -q "No updates needed" ${TMPFILE} ||
3457	    [ ${VERBOSELEVEL} = "debug" ]; then
3458		mail -s "`hostname` security updates" ${MAILTO} < ${TMPFILE}
3459	fi
3460
3461	rm ${TMPFILE}
3462}
3463
3464# Fetch files for upgrading to a new release.
3465cmd_upgrade () {
3466	finalize_components_config ${COMPONENTS}
3467	upgrade_check_params
3468	upgrade_run || exit 1
3469}
3470
3471# Check if there are fetched updates ready to install.
3472# Chdir into the working directory.
3473cmd_updatesready () {
3474	finalize_components_config ${COMPONENTS}
3475	# Check if working directory exists (if not, no updates pending)
3476	if ! [ -e "${WORKDIR}" ]; then
3477		echo "No updates are available to install."
3478		exit 2
3479	fi
3480
3481	# Change into working directory (fail if no permission/directory etc.)
3482	cd ${WORKDIR} || exit 1
3483
3484	# Construct a unique name from ${BASEDIR}
3485	BDHASH=`echo ${BASEDIR} | sha256 -q`
3486
3487	# Check that we have updates ready to install
3488	if ! [ -L ${BDHASH}-install ]; then
3489		echo "No updates are available to install."
3490		exit 2
3491	fi
3492
3493	echo "There are updates available to install."
3494	echo "Run '$0 install' to proceed."
3495}
3496
3497# Install downloaded updates.
3498cmd_install () {
3499	finalize_components_config ${COMPONENTS}
3500	install_check_params
3501	install_create_be
3502	install_run || exit 1
3503}
3504
3505# Rollback most recently installed updates.
3506cmd_rollback () {
3507	finalize_components_config ${COMPONENTS}
3508	rollback_check_params
3509	rollback_run || exit 1
3510}
3511
3512# Compare system against a "known good" index.
3513cmd_IDS () {
3514	finalize_components_config ${COMPONENTS}
3515	IDS_check_params
3516	IDS_run || exit 1
3517}
3518
3519# Output configuration.
3520cmd_showconfig () {
3521	finalize_components_config ${COMPONENTS}
3522	for X in ${CONFIGOPTIONS}; do
3523		echo $X=$(eval echo \$${X})
3524	done
3525}
3526
3527#### Entry point
3528
3529# Make sure we find utilities from the base system
3530export PATH=/sbin:/bin:/usr/sbin:/usr/bin:${PATH}
3531
3532# Set a pager if the user doesn't
3533if [ -z "$PAGER" ]; then
3534	PAGER=/usr/bin/less
3535fi
3536
3537# Set LC_ALL in order to avoid problems with character ranges like [A-Z].
3538export LC_ALL=C
3539
3540# Clear environment variables that may affect operation of tools that we use.
3541unset GREP_OPTIONS
3542
3543get_params $@
3544for COMMAND in ${COMMANDS}; do
3545	cmd_${COMMAND}
3546done
3547