13aa4b42aSBaptiste Daroussin /*- 24d846d26SWarner Losh * SPDX-License-Identifier: BSD-2-Clause 31de7b4b8SPedro F. Giffuni * 40ad5dbacSBaptiste Daroussin * Copyright (c) 2012-2014 Baptiste Daroussin <bapt@FreeBSD.org> 5f12db248SBryan Drewery * Copyright (c) 2013 Bryan Drewery <bdrewery@FreeBSD.org> 63aa4b42aSBaptiste Daroussin * All rights reserved. 73aa4b42aSBaptiste Daroussin * 83aa4b42aSBaptiste Daroussin * Redistribution and use in source and binary forms, with or without 93aa4b42aSBaptiste Daroussin * modification, are permitted provided that the following conditions 103aa4b42aSBaptiste Daroussin * are met: 113aa4b42aSBaptiste Daroussin * 1. Redistributions of source code must retain the above copyright 123aa4b42aSBaptiste Daroussin * notice, this list of conditions and the following disclaimer. 133aa4b42aSBaptiste Daroussin * 2. Redistributions in binary form must reproduce the above copyright 143aa4b42aSBaptiste Daroussin * notice, this list of conditions and the following disclaimer in the 153aa4b42aSBaptiste Daroussin * documentation and/or other materials provided with the distribution. 163aa4b42aSBaptiste Daroussin * 173aa4b42aSBaptiste Daroussin * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 183aa4b42aSBaptiste Daroussin * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 193aa4b42aSBaptiste Daroussin * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 203aa4b42aSBaptiste Daroussin * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 213aa4b42aSBaptiste Daroussin * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 223aa4b42aSBaptiste Daroussin * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 233aa4b42aSBaptiste Daroussin * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 243aa4b42aSBaptiste Daroussin * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 253aa4b42aSBaptiste Daroussin * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 263aa4b42aSBaptiste Daroussin * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 273aa4b42aSBaptiste Daroussin * SUCH DAMAGE. 283aa4b42aSBaptiste Daroussin */ 293aa4b42aSBaptiste Daroussin 303aa4b42aSBaptiste Daroussin #include <sys/param.h> 31f12db248SBryan Drewery #include <sys/queue.h> 32f12db248SBryan Drewery #include <sys/types.h> 333b05c2a8SBaptiste Daroussin #include <sys/wait.h> 343aa4b42aSBaptiste Daroussin 353aa4b42aSBaptiste Daroussin #include <archive.h> 363aa4b42aSBaptiste Daroussin #include <archive_entry.h> 37f12db248SBryan Drewery #include <dirent.h> 383aa4b42aSBaptiste Daroussin #include <err.h> 393aa4b42aSBaptiste Daroussin #include <errno.h> 40b70213b5SBaptiste Daroussin #include <fcntl.h> 413b05c2a8SBaptiste Daroussin #include <fetch.h> 42ae994fdcSBaptiste Daroussin #include <getopt.h> 4356d11d4aSStefan Eßer #include <libutil.h> 44a6454741SBaptiste Daroussin #include <paths.h> 459950eceeSBaptiste Daroussin #include <stdbool.h> 463aa4b42aSBaptiste Daroussin #include <stdlib.h> 473aa4b42aSBaptiste Daroussin #include <stdio.h> 483aa4b42aSBaptiste Daroussin #include <string.h> 498a7d859eSBaptiste Daroussin #include <ucl.h> 50f12db248SBryan Drewery 51f12db248SBryan Drewery #include <openssl/err.h> 52f12db248SBryan Drewery #include <openssl/ssl.h> 533aa4b42aSBaptiste Daroussin 5429aaa961SBaptiste Daroussin #include "dns_utils.h" 559950eceeSBaptiste Daroussin #include "config.h" 56b2654064SBaptiste Daroussin #include "hash.h" 573aa4b42aSBaptiste Daroussin 58f12db248SBryan Drewery struct sig_cert { 59516aaf7cSBryan Drewery char *name; 60f12db248SBryan Drewery unsigned char *sig; 61f12db248SBryan Drewery int siglen; 62f12db248SBryan Drewery unsigned char *cert; 63f12db248SBryan Drewery int certlen; 64f12db248SBryan Drewery bool trusted; 65f12db248SBryan Drewery }; 66f12db248SBryan Drewery 6761acb458SBaptiste Daroussin struct pubkey { 6861acb458SBaptiste Daroussin unsigned char *sig; 6961acb458SBaptiste Daroussin int siglen; 7061acb458SBaptiste Daroussin }; 7161acb458SBaptiste Daroussin 72f12db248SBryan Drewery typedef enum { 73f12db248SBryan Drewery HASH_UNKNOWN, 74f12db248SBryan Drewery HASH_SHA256, 75f12db248SBryan Drewery } hash_t; 76f12db248SBryan Drewery 77f12db248SBryan Drewery struct fingerprint { 78f12db248SBryan Drewery hash_t type; 79516aaf7cSBryan Drewery char *name; 80f12db248SBryan Drewery char hash[BUFSIZ]; 81f12db248SBryan Drewery STAILQ_ENTRY(fingerprint) next; 82f12db248SBryan Drewery }; 83f12db248SBryan Drewery 84a2aac2f5SBaptiste Daroussin static const char *bootstrap_names [] = { 85c244b1d8SBaptiste Daroussin "pkg.pkg", 86a2aac2f5SBaptiste Daroussin "pkg.txz", 87a2aac2f5SBaptiste Daroussin NULL 88a2aac2f5SBaptiste Daroussin }; 89a2aac2f5SBaptiste Daroussin 90f12db248SBryan Drewery STAILQ_HEAD(fingerprint_list, fingerprint); 91f12db248SBryan Drewery 92e9ad2964SBrooks Davis static int debug; 93e9ad2964SBrooks Davis 943aa4b42aSBaptiste Daroussin static int 953aa4b42aSBaptiste Daroussin extract_pkg_static(int fd, char *p, int sz) 963aa4b42aSBaptiste Daroussin { 973aa4b42aSBaptiste Daroussin struct archive *a; 983aa4b42aSBaptiste Daroussin struct archive_entry *ae; 993aa4b42aSBaptiste Daroussin char *end; 1003aa4b42aSBaptiste Daroussin int ret, r; 1013aa4b42aSBaptiste Daroussin 102a6454741SBaptiste Daroussin ret = -1; 1033aa4b42aSBaptiste Daroussin a = archive_read_new(); 104a6454741SBaptiste Daroussin if (a == NULL) { 105a6454741SBaptiste Daroussin warn("archive_read_new"); 106a6454741SBaptiste Daroussin return (ret); 107a6454741SBaptiste Daroussin } 108ff75c36aSBaptiste Daroussin archive_read_support_filter_all(a); 1093aa4b42aSBaptiste Daroussin archive_read_support_format_tar(a); 1103aa4b42aSBaptiste Daroussin 111a6454741SBaptiste Daroussin if (lseek(fd, 0, 0) == -1) { 112a6454741SBaptiste Daroussin warn("lseek"); 113a6454741SBaptiste Daroussin goto cleanup; 114a6454741SBaptiste Daroussin } 1153aa4b42aSBaptiste Daroussin 1163aa4b42aSBaptiste Daroussin if (archive_read_open_fd(a, fd, 4096) != ARCHIVE_OK) { 117a6454741SBaptiste Daroussin warnx("archive_read_open_fd: %s", archive_error_string(a)); 1183aa4b42aSBaptiste Daroussin goto cleanup; 1193aa4b42aSBaptiste Daroussin } 1203aa4b42aSBaptiste Daroussin 1213aa4b42aSBaptiste Daroussin ae = NULL; 1223aa4b42aSBaptiste Daroussin while ((r = archive_read_next_header(a, &ae)) == ARCHIVE_OK) { 1233aa4b42aSBaptiste Daroussin end = strrchr(archive_entry_pathname(ae), '/'); 1243aa4b42aSBaptiste Daroussin if (end == NULL) 1253aa4b42aSBaptiste Daroussin continue; 1263aa4b42aSBaptiste Daroussin 1273aa4b42aSBaptiste Daroussin if (strcmp(end, "/pkg-static") == 0) { 1283aa4b42aSBaptiste Daroussin r = archive_read_extract(a, ae, 1293aa4b42aSBaptiste Daroussin ARCHIVE_EXTRACT_OWNER | ARCHIVE_EXTRACT_PERM | 1303aa4b42aSBaptiste Daroussin ARCHIVE_EXTRACT_TIME | ARCHIVE_EXTRACT_ACL | 1313aa4b42aSBaptiste Daroussin ARCHIVE_EXTRACT_FFLAGS | ARCHIVE_EXTRACT_XATTR); 132a6454741SBaptiste Daroussin strlcpy(p, archive_entry_pathname(ae), sz); 1333aa4b42aSBaptiste Daroussin break; 1343aa4b42aSBaptiste Daroussin } 1353aa4b42aSBaptiste Daroussin } 1363aa4b42aSBaptiste Daroussin 137a6454741SBaptiste Daroussin if (r == ARCHIVE_OK) 138a6454741SBaptiste Daroussin ret = 0; 139a6454741SBaptiste Daroussin else 1404622bc4eSGavin Atkinson warnx("failed to extract pkg-static: %s", 1414622bc4eSGavin Atkinson archive_error_string(a)); 1423aa4b42aSBaptiste Daroussin 1433aa4b42aSBaptiste Daroussin cleanup: 144ff75c36aSBaptiste Daroussin archive_read_free(a); 1453b05c2a8SBaptiste Daroussin return (ret); 1463aa4b42aSBaptiste Daroussin 1473aa4b42aSBaptiste Daroussin } 1483aa4b42aSBaptiste Daroussin 1493aa4b42aSBaptiste Daroussin static int 1505212e8baSBryan Drewery install_pkg_static(const char *path, const char *pkgpath, bool force) 1513aa4b42aSBaptiste Daroussin { 1523aa4b42aSBaptiste Daroussin int pstat; 1533aa4b42aSBaptiste Daroussin pid_t pid; 1543aa4b42aSBaptiste Daroussin 1553aa4b42aSBaptiste Daroussin switch ((pid = fork())) { 1563aa4b42aSBaptiste Daroussin case -1: 1573aa4b42aSBaptiste Daroussin return (-1); 1583aa4b42aSBaptiste Daroussin case 0: 1595212e8baSBryan Drewery if (force) 1605212e8baSBryan Drewery execl(path, "pkg-static", "add", "-f", pkgpath, 1615212e8baSBryan Drewery (char *)NULL); 1625212e8baSBryan Drewery else 1635212e8baSBryan Drewery execl(path, "pkg-static", "add", pkgpath, 1645212e8baSBryan Drewery (char *)NULL); 1653b05c2a8SBaptiste Daroussin _exit(1); 1663aa4b42aSBaptiste Daroussin default: 1673aa4b42aSBaptiste Daroussin break; 1683aa4b42aSBaptiste Daroussin } 1693aa4b42aSBaptiste Daroussin 170a6454741SBaptiste Daroussin while (waitpid(pid, &pstat, 0) == -1) 1713aa4b42aSBaptiste Daroussin if (errno != EINTR) 1723aa4b42aSBaptiste Daroussin return (-1); 1733aa4b42aSBaptiste Daroussin 174a6454741SBaptiste Daroussin if (WEXITSTATUS(pstat)) 1753aa4b42aSBaptiste Daroussin return (WEXITSTATUS(pstat)); 176a6454741SBaptiste Daroussin else if (WIFSIGNALED(pstat)) 177a6454741SBaptiste Daroussin return (128 & (WTERMSIG(pstat))); 178a6454741SBaptiste Daroussin return (pstat); 1793aa4b42aSBaptiste Daroussin } 1803aa4b42aSBaptiste Daroussin 1813aa4b42aSBaptiste Daroussin static int 182ae994fdcSBaptiste Daroussin fetch_to_fd(const char *url, char *path, const char *fetchOpts) 1833aa4b42aSBaptiste Daroussin { 18429aaa961SBaptiste Daroussin struct url *u; 18529aaa961SBaptiste Daroussin struct dns_srvinfo *mirrors, *current; 186a6454741SBaptiste Daroussin struct url_stat st; 187f12db248SBryan Drewery FILE *remote; 188f12db248SBryan Drewery /* To store _https._tcp. + hostname + \0 */ 189f12db248SBryan Drewery int fd; 190f12db248SBryan Drewery int retry, max_retry; 191cc36fe49SBaptiste Daroussin ssize_t r; 192f12db248SBryan Drewery char buf[10240]; 193f12db248SBryan Drewery char zone[MAXHOSTNAMELEN + 13]; 194f12db248SBryan Drewery static const char *mirror_type = NULL; 1953aa4b42aSBaptiste Daroussin 19629aaa961SBaptiste Daroussin max_retry = 3; 19729aaa961SBaptiste Daroussin current = mirrors = NULL; 198f12db248SBryan Drewery remote = NULL; 1993aa4b42aSBaptiste Daroussin 200f12db248SBryan Drewery if (mirror_type == NULL && config_string(MIRROR_TYPE, &mirror_type) 201f12db248SBryan Drewery != 0) { 2029950eceeSBaptiste Daroussin warnx("No MIRROR_TYPE defined"); 2039950eceeSBaptiste Daroussin return (-1); 2049950eceeSBaptiste Daroussin } 20562940ea9SBryan Drewery 206f12db248SBryan Drewery if ((fd = mkstemp(path)) == -1) { 2073aa4b42aSBaptiste Daroussin warn("mkstemp()"); 2083b05c2a8SBaptiste Daroussin return (-1); 2093aa4b42aSBaptiste Daroussin } 2103aa4b42aSBaptiste Daroussin 21129aaa961SBaptiste Daroussin retry = max_retry; 21229aaa961SBaptiste Daroussin 21379fe80efSBaptiste Daroussin if ((u = fetchParseURL(url)) == NULL) { 21479fe80efSBaptiste Daroussin warn("fetchParseURL('%s')", url); 21579fe80efSBaptiste Daroussin return (-1); 21679fe80efSBaptiste Daroussin } 21779fe80efSBaptiste Daroussin 21829aaa961SBaptiste Daroussin while (remote == NULL) { 21929aaa961SBaptiste Daroussin if (retry == max_retry) { 2209950eceeSBaptiste Daroussin if (strcmp(u->scheme, "file") != 0 && 2219950eceeSBaptiste Daroussin strcasecmp(mirror_type, "srv") == 0) { 22229aaa961SBaptiste Daroussin snprintf(zone, sizeof(zone), 22329aaa961SBaptiste Daroussin "_%s._tcp.%s", u->scheme, u->host); 22429aaa961SBaptiste Daroussin mirrors = dns_getsrvinfo(zone); 22529aaa961SBaptiste Daroussin current = mirrors; 22629aaa961SBaptiste Daroussin } 22729aaa961SBaptiste Daroussin } 22829aaa961SBaptiste Daroussin 22935e07a7aSBaptiste Daroussin if (mirrors != NULL) { 23029aaa961SBaptiste Daroussin strlcpy(u->host, current->host, sizeof(u->host)); 23135e07a7aSBaptiste Daroussin u->port = current->port; 23235e07a7aSBaptiste Daroussin } 23329aaa961SBaptiste Daroussin 234ae994fdcSBaptiste Daroussin remote = fetchXGet(u, &st, fetchOpts); 23529aaa961SBaptiste Daroussin if (remote == NULL) { 23629aaa961SBaptiste Daroussin --retry; 23729aaa961SBaptiste Daroussin if (retry <= 0) 23829aaa961SBaptiste Daroussin goto fetchfail; 23960b92ba9SJohn Hood if (mirrors != NULL) { 24029aaa961SBaptiste Daroussin current = current->next; 24129aaa961SBaptiste Daroussin if (current == NULL) 24229aaa961SBaptiste Daroussin current = mirrors; 24329aaa961SBaptiste Daroussin } 24429aaa961SBaptiste Daroussin } 24529aaa961SBaptiste Daroussin } 246a6454741SBaptiste Daroussin 247cc36fe49SBaptiste Daroussin while ((r = fread(buf, 1, sizeof(buf), remote)) > 0) { 2483aa4b42aSBaptiste Daroussin if (write(fd, buf, r) != r) { 2493aa4b42aSBaptiste Daroussin warn("write()"); 250f12db248SBryan Drewery goto fetchfail; 2513aa4b42aSBaptiste Daroussin } 252cc36fe49SBaptiste Daroussin } 2533aa4b42aSBaptiste Daroussin 254cc36fe49SBaptiste Daroussin if (r != 0) { 255cc36fe49SBaptiste Daroussin warn("An error occurred while fetching pkg(8)"); 256cc36fe49SBaptiste Daroussin goto fetchfail; 2573aa4b42aSBaptiste Daroussin } 2583aa4b42aSBaptiste Daroussin 259a6454741SBaptiste Daroussin if (ferror(remote)) 260a6454741SBaptiste Daroussin goto fetchfail; 2613aa4b42aSBaptiste Daroussin 262f12db248SBryan Drewery goto cleanup; 263f12db248SBryan Drewery 264f12db248SBryan Drewery fetchfail: 265f12db248SBryan Drewery if (fd != -1) { 266f12db248SBryan Drewery close(fd); 267f12db248SBryan Drewery fd = -1; 268f12db248SBryan Drewery unlink(path); 269f12db248SBryan Drewery } 270f12db248SBryan Drewery 271f12db248SBryan Drewery cleanup: 272f12db248SBryan Drewery if (remote != NULL) 273f12db248SBryan Drewery fclose(remote); 274f12db248SBryan Drewery 275f12db248SBryan Drewery return fd; 276f12db248SBryan Drewery } 277f12db248SBryan Drewery 278f12db248SBryan Drewery static struct fingerprint * 2798a7d859eSBaptiste Daroussin parse_fingerprint(ucl_object_t *obj) 280f12db248SBryan Drewery { 281b04a7a0bSBaptiste Daroussin const ucl_object_t *cur; 2828a7d859eSBaptiste Daroussin ucl_object_iter_t it = NULL; 2838a7d859eSBaptiste Daroussin const char *function, *fp, *key; 284f12db248SBryan Drewery struct fingerprint *f; 285f12db248SBryan Drewery hash_t fct = HASH_UNKNOWN; 286f12db248SBryan Drewery 287f12db248SBryan Drewery function = fp = NULL; 288f12db248SBryan Drewery 2898a7d859eSBaptiste Daroussin while ((cur = ucl_iterate_object(obj, &it, true))) { 2908a7d859eSBaptiste Daroussin key = ucl_object_key(cur); 2918a7d859eSBaptiste Daroussin if (cur->type != UCL_STRING) 2928a7d859eSBaptiste Daroussin continue; 2938a7d859eSBaptiste Daroussin if (strcasecmp(key, "function") == 0) { 2948a7d859eSBaptiste Daroussin function = ucl_object_tostring(cur); 295f12db248SBryan Drewery continue; 296f12db248SBryan Drewery } 2978a7d859eSBaptiste Daroussin if (strcasecmp(key, "fingerprint") == 0) { 2988a7d859eSBaptiste Daroussin fp = ucl_object_tostring(cur); 299f12db248SBryan Drewery continue; 300f12db248SBryan Drewery } 301f12db248SBryan Drewery } 302f12db248SBryan Drewery 303f12db248SBryan Drewery if (fp == NULL || function == NULL) 304f12db248SBryan Drewery return (NULL); 305f12db248SBryan Drewery 306f12db248SBryan Drewery if (strcasecmp(function, "sha256") == 0) 307f12db248SBryan Drewery fct = HASH_SHA256; 308f12db248SBryan Drewery 309f12db248SBryan Drewery if (fct == HASH_UNKNOWN) { 310d8cfb943SBaptiste Daroussin warnx("Unsupported hashing function: %s", function); 311f12db248SBryan Drewery return (NULL); 312f12db248SBryan Drewery } 313f12db248SBryan Drewery 314f12db248SBryan Drewery f = calloc(1, sizeof(struct fingerprint)); 315f12db248SBryan Drewery f->type = fct; 316f12db248SBryan Drewery strlcpy(f->hash, fp, sizeof(f->hash)); 317f12db248SBryan Drewery 318f12db248SBryan Drewery return (f); 319f12db248SBryan Drewery } 320f12db248SBryan Drewery 321516aaf7cSBryan Drewery static void 322516aaf7cSBryan Drewery free_fingerprint_list(struct fingerprint_list* list) 323516aaf7cSBryan Drewery { 324d2201d13SGleb Smirnoff struct fingerprint *fingerprint, *tmp; 325516aaf7cSBryan Drewery 326d2201d13SGleb Smirnoff STAILQ_FOREACH_SAFE(fingerprint, list, next, tmp) { 327516aaf7cSBryan Drewery free(fingerprint->name); 328516aaf7cSBryan Drewery free(fingerprint); 329516aaf7cSBryan Drewery } 330516aaf7cSBryan Drewery free(list); 331516aaf7cSBryan Drewery } 332516aaf7cSBryan Drewery 333f12db248SBryan Drewery static struct fingerprint * 334f12db248SBryan Drewery load_fingerprint(const char *dir, const char *filename) 335f12db248SBryan Drewery { 3368a7d859eSBaptiste Daroussin ucl_object_t *obj = NULL; 3378a7d859eSBaptiste Daroussin struct ucl_parser *p = NULL; 338f12db248SBryan Drewery struct fingerprint *f; 339f12db248SBryan Drewery char path[MAXPATHLEN]; 340f12db248SBryan Drewery 341f12db248SBryan Drewery f = NULL; 342f12db248SBryan Drewery 343f12db248SBryan Drewery snprintf(path, MAXPATHLEN, "%s/%s", dir, filename); 344f12db248SBryan Drewery 3458a7d859eSBaptiste Daroussin p = ucl_parser_new(0); 3468a7d859eSBaptiste Daroussin if (!ucl_parser_add_file(p, path)) { 3478a7d859eSBaptiste Daroussin warnx("%s: %s", path, ucl_parser_get_error(p)); 3488a7d859eSBaptiste Daroussin ucl_parser_free(p); 349f12db248SBryan Drewery return (NULL); 3508a7d859eSBaptiste Daroussin } 351f12db248SBryan Drewery 3528a7d859eSBaptiste Daroussin obj = ucl_parser_get_object(p); 353f12db248SBryan Drewery 3548a7d859eSBaptiste Daroussin if (obj->type == UCL_OBJECT) 3558a7d859eSBaptiste Daroussin f = parse_fingerprint(obj); 356f12db248SBryan Drewery 3578a7d859eSBaptiste Daroussin if (f != NULL) 358516aaf7cSBryan Drewery f->name = strdup(filename); 359f12db248SBryan Drewery 360b04a7a0bSBaptiste Daroussin ucl_object_unref(obj); 3618a7d859eSBaptiste Daroussin ucl_parser_free(p); 362f12db248SBryan Drewery 363f12db248SBryan Drewery return (f); 364f12db248SBryan Drewery } 365f12db248SBryan Drewery 366f12db248SBryan Drewery static struct fingerprint_list * 367f12db248SBryan Drewery load_fingerprints(const char *path, int *count) 368f12db248SBryan Drewery { 369f12db248SBryan Drewery DIR *d; 370f12db248SBryan Drewery struct dirent *ent; 371f12db248SBryan Drewery struct fingerprint *finger; 372f12db248SBryan Drewery struct fingerprint_list *fingerprints; 373f12db248SBryan Drewery 374f12db248SBryan Drewery *count = 0; 375f12db248SBryan Drewery 376f12db248SBryan Drewery fingerprints = calloc(1, sizeof(struct fingerprint_list)); 377f12db248SBryan Drewery if (fingerprints == NULL) 378f12db248SBryan Drewery return (NULL); 379f12db248SBryan Drewery STAILQ_INIT(fingerprints); 380f12db248SBryan Drewery 38192947daaSBaptiste Daroussin if ((d = opendir(path)) == NULL) { 38292947daaSBaptiste Daroussin free(fingerprints); 38392947daaSBaptiste Daroussin 384f12db248SBryan Drewery return (NULL); 38592947daaSBaptiste Daroussin } 386f12db248SBryan Drewery 387f12db248SBryan Drewery while ((ent = readdir(d))) { 388f12db248SBryan Drewery if (strcmp(ent->d_name, ".") == 0 || 389f12db248SBryan Drewery strcmp(ent->d_name, "..") == 0) 390f12db248SBryan Drewery continue; 391f12db248SBryan Drewery finger = load_fingerprint(path, ent->d_name); 392f12db248SBryan Drewery if (finger != NULL) { 393f12db248SBryan Drewery STAILQ_INSERT_TAIL(fingerprints, finger, next); 394f12db248SBryan Drewery ++(*count); 395f12db248SBryan Drewery } 396f12db248SBryan Drewery } 397f12db248SBryan Drewery 398f12db248SBryan Drewery closedir(d); 399f12db248SBryan Drewery 400f12db248SBryan Drewery return (fingerprints); 401f12db248SBryan Drewery } 402f12db248SBryan Drewery 403f12db248SBryan Drewery static EVP_PKEY * 40461acb458SBaptiste Daroussin load_public_key_file(const char *file) 40561acb458SBaptiste Daroussin { 40661acb458SBaptiste Daroussin EVP_PKEY *pkey; 40761acb458SBaptiste Daroussin BIO *bp; 40861acb458SBaptiste Daroussin char errbuf[1024]; 40961acb458SBaptiste Daroussin 41061acb458SBaptiste Daroussin bp = BIO_new_file(file, "r"); 41161acb458SBaptiste Daroussin if (!bp) 41261acb458SBaptiste Daroussin errx(EXIT_FAILURE, "Unable to read %s", file); 41361acb458SBaptiste Daroussin 41461acb458SBaptiste Daroussin if ((pkey = PEM_read_bio_PUBKEY(bp, NULL, NULL, NULL)) == NULL) 41561acb458SBaptiste Daroussin warnx("ici: %s", ERR_error_string(ERR_get_error(), errbuf)); 41661acb458SBaptiste Daroussin 41761acb458SBaptiste Daroussin BIO_free(bp); 41861acb458SBaptiste Daroussin 41961acb458SBaptiste Daroussin return (pkey); 42061acb458SBaptiste Daroussin } 42161acb458SBaptiste Daroussin 42261acb458SBaptiste Daroussin static EVP_PKEY * 423f12db248SBryan Drewery load_public_key_buf(const unsigned char *cert, int certlen) 424f12db248SBryan Drewery { 425f12db248SBryan Drewery EVP_PKEY *pkey; 426f12db248SBryan Drewery BIO *bp; 427f12db248SBryan Drewery char errbuf[1024]; 428f12db248SBryan Drewery 429c2788c07SBryan Drewery bp = BIO_new_mem_buf(__DECONST(void *, cert), certlen); 430f12db248SBryan Drewery 431f12db248SBryan Drewery if ((pkey = PEM_read_bio_PUBKEY(bp, NULL, NULL, NULL)) == NULL) 432f12db248SBryan Drewery warnx("%s", ERR_error_string(ERR_get_error(), errbuf)); 433f12db248SBryan Drewery 434f12db248SBryan Drewery BIO_free(bp); 435f12db248SBryan Drewery 436f12db248SBryan Drewery return (pkey); 437f12db248SBryan Drewery } 438f12db248SBryan Drewery 439f12db248SBryan Drewery static bool 44061acb458SBaptiste Daroussin rsa_verify_cert(int fd, const char *sigfile, const unsigned char *key, 44161acb458SBaptiste Daroussin int keylen, unsigned char *sig, int siglen) 442f12db248SBryan Drewery { 443f12db248SBryan Drewery EVP_MD_CTX *mdctx; 444f12db248SBryan Drewery EVP_PKEY *pkey; 445e5dd5bfaSBaptiste Daroussin char *sha256; 446f12db248SBryan Drewery char errbuf[1024]; 447f12db248SBryan Drewery bool ret; 448f12db248SBryan Drewery 449e5dd5bfaSBaptiste Daroussin sha256 = NULL; 450f12db248SBryan Drewery pkey = NULL; 451f12db248SBryan Drewery mdctx = NULL; 452f12db248SBryan Drewery ret = false; 453f12db248SBryan Drewery 45461acb458SBaptiste Daroussin SSL_load_error_strings(); 45561acb458SBaptiste Daroussin 456f12db248SBryan Drewery /* Compute SHA256 of the package. */ 457f12db248SBryan Drewery if (lseek(fd, 0, 0) == -1) { 458f12db248SBryan Drewery warn("lseek"); 459f12db248SBryan Drewery goto cleanup; 460f12db248SBryan Drewery } 461e5dd5bfaSBaptiste Daroussin if ((sha256 = sha256_fd(fd)) == NULL) { 462f12db248SBryan Drewery warnx("Error creating SHA256 hash for package"); 463f12db248SBryan Drewery goto cleanup; 464f12db248SBryan Drewery } 465f12db248SBryan Drewery 46661acb458SBaptiste Daroussin if (sigfile != NULL) { 46761acb458SBaptiste Daroussin if ((pkey = load_public_key_file(sigfile)) == NULL) { 46861acb458SBaptiste Daroussin warnx("Error reading public key"); 46961acb458SBaptiste Daroussin goto cleanup; 47061acb458SBaptiste Daroussin } 47161acb458SBaptiste Daroussin } else { 472f12db248SBryan Drewery if ((pkey = load_public_key_buf(key, keylen)) == NULL) { 473f12db248SBryan Drewery warnx("Error reading public key"); 474f12db248SBryan Drewery goto cleanup; 475f12db248SBryan Drewery } 47661acb458SBaptiste Daroussin } 477f12db248SBryan Drewery 478f12db248SBryan Drewery /* Verify signature of the SHA256(pkg) is valid. */ 479f12db248SBryan Drewery if ((mdctx = EVP_MD_CTX_create()) == NULL) { 480f12db248SBryan Drewery warnx("%s", ERR_error_string(ERR_get_error(), errbuf)); 481f12db248SBryan Drewery goto error; 482f12db248SBryan Drewery } 483f12db248SBryan Drewery 484f12db248SBryan Drewery if (EVP_DigestVerifyInit(mdctx, NULL, EVP_sha256(), NULL, pkey) != 1) { 4854c79e0d6SBaptiste Daroussin warnx("%s", ERR_error_string(ERR_get_error(), errbuf)); 486f12db248SBryan Drewery goto error; 487f12db248SBryan Drewery } 488f12db248SBryan Drewery if (EVP_DigestVerifyUpdate(mdctx, sha256, strlen(sha256)) != 1) { 4894c79e0d6SBaptiste Daroussin warnx("%s", ERR_error_string(ERR_get_error(), errbuf)); 490f12db248SBryan Drewery goto error; 491f12db248SBryan Drewery } 492f12db248SBryan Drewery 493f12db248SBryan Drewery if (EVP_DigestVerifyFinal(mdctx, sig, siglen) != 1) { 4944c79e0d6SBaptiste Daroussin warnx("%s", ERR_error_string(ERR_get_error(), errbuf)); 495f12db248SBryan Drewery goto error; 496f12db248SBryan Drewery } 497f12db248SBryan Drewery 498f12db248SBryan Drewery ret = true; 499f12db248SBryan Drewery printf("done\n"); 500f12db248SBryan Drewery goto cleanup; 501f12db248SBryan Drewery 502f12db248SBryan Drewery error: 503f12db248SBryan Drewery printf("failed\n"); 504f12db248SBryan Drewery 505f12db248SBryan Drewery cleanup: 506e5dd5bfaSBaptiste Daroussin free(sha256); 507f12db248SBryan Drewery if (pkey) 508f12db248SBryan Drewery EVP_PKEY_free(pkey); 509f12db248SBryan Drewery if (mdctx) 510f12db248SBryan Drewery EVP_MD_CTX_destroy(mdctx); 511f12db248SBryan Drewery ERR_free_strings(); 512f12db248SBryan Drewery 513f12db248SBryan Drewery return (ret); 514f12db248SBryan Drewery } 515f12db248SBryan Drewery 51661acb458SBaptiste Daroussin static struct pubkey * 51761acb458SBaptiste Daroussin read_pubkey(int fd) 51861acb458SBaptiste Daroussin { 51961acb458SBaptiste Daroussin struct pubkey *pk; 520cc9a8a11SBaptiste Daroussin char *sigb; 521cc9a8a11SBaptiste Daroussin size_t sigsz; 522cc9a8a11SBaptiste Daroussin FILE *sig; 52361acb458SBaptiste Daroussin char buf[4096]; 52461acb458SBaptiste Daroussin int r; 52561acb458SBaptiste Daroussin 52661acb458SBaptiste Daroussin if (lseek(fd, 0, 0) == -1) { 52761acb458SBaptiste Daroussin warn("lseek"); 52861acb458SBaptiste Daroussin return (NULL); 52961acb458SBaptiste Daroussin } 53061acb458SBaptiste Daroussin 531cc9a8a11SBaptiste Daroussin sigsz = 0; 532cc9a8a11SBaptiste Daroussin sigb = NULL; 533cc9a8a11SBaptiste Daroussin sig = open_memstream(&sigb, &sigsz); 534cc9a8a11SBaptiste Daroussin if (sig == NULL) 535cc9a8a11SBaptiste Daroussin err(EXIT_FAILURE, "open_memstream()"); 53661acb458SBaptiste Daroussin 53761acb458SBaptiste Daroussin while ((r = read(fd, buf, sizeof(buf))) >0) { 538cc9a8a11SBaptiste Daroussin fwrite(buf, 1, r, sig); 53961acb458SBaptiste Daroussin } 54061acb458SBaptiste Daroussin 541cc9a8a11SBaptiste Daroussin fclose(sig); 54261acb458SBaptiste Daroussin pk = calloc(1, sizeof(struct pubkey)); 543cc9a8a11SBaptiste Daroussin pk->siglen = sigsz; 54461acb458SBaptiste Daroussin pk->sig = calloc(1, pk->siglen); 545cc9a8a11SBaptiste Daroussin memcpy(pk->sig, sigb, pk->siglen); 546cc9a8a11SBaptiste Daroussin free(sigb); 54761acb458SBaptiste Daroussin 54861acb458SBaptiste Daroussin return (pk); 54961acb458SBaptiste Daroussin } 55061acb458SBaptiste Daroussin 551f12db248SBryan Drewery static struct sig_cert * 552f12db248SBryan Drewery parse_cert(int fd) { 553f12db248SBryan Drewery int my_fd; 554f12db248SBryan Drewery struct sig_cert *sc; 555cc9a8a11SBaptiste Daroussin FILE *fp, *sigfp, *certfp, *tmpfp; 556f12db248SBryan Drewery char *line; 557cc9a8a11SBaptiste Daroussin char *sig, *cert; 558cc9a8a11SBaptiste Daroussin size_t linecap, sigsz, certsz; 559f12db248SBryan Drewery ssize_t linelen; 560f12db248SBryan Drewery 561f12db248SBryan Drewery sc = NULL; 562f12db248SBryan Drewery line = NULL; 563f12db248SBryan Drewery linecap = 0; 564cc9a8a11SBaptiste Daroussin sig = cert = NULL; 565cc9a8a11SBaptiste Daroussin sigfp = certfp = tmpfp = NULL; 566f12db248SBryan Drewery 567f12db248SBryan Drewery if (lseek(fd, 0, 0) == -1) { 568f12db248SBryan Drewery warn("lseek"); 569f12db248SBryan Drewery return (NULL); 570f12db248SBryan Drewery } 571f12db248SBryan Drewery 572f12db248SBryan Drewery /* Duplicate the fd so that fclose(3) does not close it. */ 573f12db248SBryan Drewery if ((my_fd = dup(fd)) == -1) { 574f12db248SBryan Drewery warnx("dup"); 575f12db248SBryan Drewery return (NULL); 576f12db248SBryan Drewery } 577f12db248SBryan Drewery 578f12db248SBryan Drewery if ((fp = fdopen(my_fd, "rb")) == NULL) { 579f12db248SBryan Drewery warn("fdopen"); 580f12db248SBryan Drewery close(my_fd); 581f12db248SBryan Drewery return (NULL); 582f12db248SBryan Drewery } 583f12db248SBryan Drewery 584cc9a8a11SBaptiste Daroussin sigsz = certsz = 0; 585cc9a8a11SBaptiste Daroussin sigfp = open_memstream(&sig, &sigsz); 586cc9a8a11SBaptiste Daroussin if (sigfp == NULL) 587cc9a8a11SBaptiste Daroussin err(EXIT_FAILURE, "open_memstream()"); 588cc9a8a11SBaptiste Daroussin certfp = open_memstream(&cert, &certsz); 589cc9a8a11SBaptiste Daroussin if (certfp == NULL) 590cc9a8a11SBaptiste Daroussin err(EXIT_FAILURE, "open_memstream()"); 591f12db248SBryan Drewery 592f12db248SBryan Drewery while ((linelen = getline(&line, &linecap, fp)) > 0) { 593f12db248SBryan Drewery if (strcmp(line, "SIGNATURE\n") == 0) { 594cc9a8a11SBaptiste Daroussin tmpfp = sigfp; 595f12db248SBryan Drewery continue; 596f12db248SBryan Drewery } else if (strcmp(line, "CERT\n") == 0) { 597cc9a8a11SBaptiste Daroussin tmpfp = certfp; 598f12db248SBryan Drewery continue; 599f12db248SBryan Drewery } else if (strcmp(line, "END\n") == 0) { 600f12db248SBryan Drewery break; 601f12db248SBryan Drewery } 602cc9a8a11SBaptiste Daroussin if (tmpfp != NULL) 603cc9a8a11SBaptiste Daroussin fwrite(line, 1, linelen, tmpfp); 604f12db248SBryan Drewery } 605f12db248SBryan Drewery 606f12db248SBryan Drewery fclose(fp); 607cc9a8a11SBaptiste Daroussin fclose(sigfp); 608cc9a8a11SBaptiste Daroussin fclose(certfp); 609f12db248SBryan Drewery 610f12db248SBryan Drewery sc = calloc(1, sizeof(struct sig_cert)); 611cc9a8a11SBaptiste Daroussin sc->siglen = sigsz -1; /* Trim out unrelated trailing newline */ 612cc9a8a11SBaptiste Daroussin sc->sig = sig; 613f12db248SBryan Drewery 614cc9a8a11SBaptiste Daroussin sc->certlen = certsz; 615cc9a8a11SBaptiste Daroussin sc->cert = cert; 616f12db248SBryan Drewery 617f12db248SBryan Drewery return (sc); 618f12db248SBryan Drewery } 619f12db248SBryan Drewery 620f12db248SBryan Drewery static bool 62161acb458SBaptiste Daroussin verify_pubsignature(int fd_pkg, int fd_sig) 62261acb458SBaptiste Daroussin { 62361acb458SBaptiste Daroussin struct pubkey *pk; 62461acb458SBaptiste Daroussin const char *pubkey; 62561acb458SBaptiste Daroussin bool ret; 62661acb458SBaptiste Daroussin 62761acb458SBaptiste Daroussin pk = NULL; 62861acb458SBaptiste Daroussin pubkey = NULL; 62961acb458SBaptiste Daroussin ret = false; 63061acb458SBaptiste Daroussin if (config_string(PUBKEY, &pubkey) != 0) { 63161acb458SBaptiste Daroussin warnx("No CONFIG_PUBKEY defined"); 63261acb458SBaptiste Daroussin goto cleanup; 63361acb458SBaptiste Daroussin } 63461acb458SBaptiste Daroussin 63561acb458SBaptiste Daroussin if ((pk = read_pubkey(fd_sig)) == NULL) { 63661acb458SBaptiste Daroussin warnx("Error reading signature"); 63761acb458SBaptiste Daroussin goto cleanup; 63861acb458SBaptiste Daroussin } 63961acb458SBaptiste Daroussin 64061acb458SBaptiste Daroussin /* Verify the signature. */ 64161acb458SBaptiste Daroussin printf("Verifying signature with public key %s... ", pubkey); 64261acb458SBaptiste Daroussin if (rsa_verify_cert(fd_pkg, pubkey, NULL, 0, pk->sig, 64361acb458SBaptiste Daroussin pk->siglen) == false) { 64461acb458SBaptiste Daroussin fprintf(stderr, "Signature is not valid\n"); 64561acb458SBaptiste Daroussin goto cleanup; 64661acb458SBaptiste Daroussin } 64761acb458SBaptiste Daroussin 64861acb458SBaptiste Daroussin ret = true; 64961acb458SBaptiste Daroussin 65061acb458SBaptiste Daroussin cleanup: 65161acb458SBaptiste Daroussin if (pk) { 65261acb458SBaptiste Daroussin free(pk->sig); 65361acb458SBaptiste Daroussin free(pk); 65461acb458SBaptiste Daroussin } 65561acb458SBaptiste Daroussin 65661acb458SBaptiste Daroussin return (ret); 65761acb458SBaptiste Daroussin } 65861acb458SBaptiste Daroussin 65961acb458SBaptiste Daroussin static bool 660f12db248SBryan Drewery verify_signature(int fd_pkg, int fd_sig) 661f12db248SBryan Drewery { 662f12db248SBryan Drewery struct fingerprint_list *trusted, *revoked; 663f12db248SBryan Drewery struct fingerprint *fingerprint; 664f12db248SBryan Drewery struct sig_cert *sc; 665f12db248SBryan Drewery bool ret; 666f12db248SBryan Drewery int trusted_count, revoked_count; 667f12db248SBryan Drewery const char *fingerprints; 668f12db248SBryan Drewery char path[MAXPATHLEN]; 669e5dd5bfaSBaptiste Daroussin char *hash; 670f12db248SBryan Drewery 671e5dd5bfaSBaptiste Daroussin hash = NULL; 672516aaf7cSBryan Drewery sc = NULL; 673f12db248SBryan Drewery trusted = revoked = NULL; 674f12db248SBryan Drewery ret = false; 675f12db248SBryan Drewery 676f12db248SBryan Drewery /* Read and parse fingerprints. */ 677f12db248SBryan Drewery if (config_string(FINGERPRINTS, &fingerprints) != 0) { 678f12db248SBryan Drewery warnx("No CONFIG_FINGERPRINTS defined"); 679f12db248SBryan Drewery goto cleanup; 680f12db248SBryan Drewery } 681f12db248SBryan Drewery 682f12db248SBryan Drewery snprintf(path, MAXPATHLEN, "%s/trusted", fingerprints); 683f12db248SBryan Drewery if ((trusted = load_fingerprints(path, &trusted_count)) == NULL) { 684f12db248SBryan Drewery warnx("Error loading trusted certificates"); 685f12db248SBryan Drewery goto cleanup; 686f12db248SBryan Drewery } 687f12db248SBryan Drewery 688f12db248SBryan Drewery if (trusted_count == 0 || trusted == NULL) { 689f12db248SBryan Drewery fprintf(stderr, "No trusted certificates found.\n"); 690f12db248SBryan Drewery goto cleanup; 691f12db248SBryan Drewery } 692f12db248SBryan Drewery 693f12db248SBryan Drewery snprintf(path, MAXPATHLEN, "%s/revoked", fingerprints); 694f12db248SBryan Drewery if ((revoked = load_fingerprints(path, &revoked_count)) == NULL) { 695f12db248SBryan Drewery warnx("Error loading revoked certificates"); 696f12db248SBryan Drewery goto cleanup; 697f12db248SBryan Drewery } 698f12db248SBryan Drewery 699f12db248SBryan Drewery /* Read certificate and signature in. */ 700f12db248SBryan Drewery if ((sc = parse_cert(fd_sig)) == NULL) { 701f12db248SBryan Drewery warnx("Error parsing certificate"); 702f12db248SBryan Drewery goto cleanup; 703f12db248SBryan Drewery } 704f12db248SBryan Drewery /* Explicitly mark as non-trusted until proven otherwise. */ 705f12db248SBryan Drewery sc->trusted = false; 706f12db248SBryan Drewery 707f12db248SBryan Drewery /* Parse signature and pubkey out of the certificate */ 708e5dd5bfaSBaptiste Daroussin hash = sha256_buf(sc->cert, sc->certlen); 709f12db248SBryan Drewery 710f12db248SBryan Drewery /* Check if this hash is revoked */ 711f12db248SBryan Drewery if (revoked != NULL) { 712f12db248SBryan Drewery STAILQ_FOREACH(fingerprint, revoked, next) { 713f12db248SBryan Drewery if (strcasecmp(fingerprint->hash, hash) == 0) { 714516aaf7cSBryan Drewery fprintf(stderr, "The package was signed with " 715516aaf7cSBryan Drewery "revoked certificate %s\n", 716516aaf7cSBryan Drewery fingerprint->name); 717f12db248SBryan Drewery goto cleanup; 718f12db248SBryan Drewery } 719f12db248SBryan Drewery } 720f12db248SBryan Drewery } 721f12db248SBryan Drewery 722f12db248SBryan Drewery STAILQ_FOREACH(fingerprint, trusted, next) { 723f12db248SBryan Drewery if (strcasecmp(fingerprint->hash, hash) == 0) { 724f12db248SBryan Drewery sc->trusted = true; 725516aaf7cSBryan Drewery sc->name = strdup(fingerprint->name); 726f12db248SBryan Drewery break; 727f12db248SBryan Drewery } 728f12db248SBryan Drewery } 729f12db248SBryan Drewery 730f12db248SBryan Drewery if (sc->trusted == false) { 731516aaf7cSBryan Drewery fprintf(stderr, "No trusted fingerprint found matching " 732f12db248SBryan Drewery "package's certificate\n"); 733f12db248SBryan Drewery goto cleanup; 734f12db248SBryan Drewery } 735f12db248SBryan Drewery 736f12db248SBryan Drewery /* Verify the signature. */ 737516aaf7cSBryan Drewery printf("Verifying signature with trusted certificate %s... ", sc->name); 73861acb458SBaptiste Daroussin if (rsa_verify_cert(fd_pkg, NULL, sc->cert, sc->certlen, sc->sig, 739f12db248SBryan Drewery sc->siglen) == false) { 740f12db248SBryan Drewery fprintf(stderr, "Signature is not valid\n"); 741f12db248SBryan Drewery goto cleanup; 742f12db248SBryan Drewery } 743f12db248SBryan Drewery 744f12db248SBryan Drewery ret = true; 745f12db248SBryan Drewery 746f12db248SBryan Drewery cleanup: 747e5dd5bfaSBaptiste Daroussin free(hash); 748516aaf7cSBryan Drewery if (trusted) 749516aaf7cSBryan Drewery free_fingerprint_list(trusted); 750516aaf7cSBryan Drewery if (revoked) 751516aaf7cSBryan Drewery free_fingerprint_list(revoked); 752f12db248SBryan Drewery if (sc) { 753f12db248SBryan Drewery free(sc->cert); 754f12db248SBryan Drewery free(sc->sig); 755516aaf7cSBryan Drewery free(sc->name); 756f12db248SBryan Drewery free(sc); 757f12db248SBryan Drewery } 758f12db248SBryan Drewery 759f12db248SBryan Drewery return (ret); 760f12db248SBryan Drewery } 761f12db248SBryan Drewery 762f12db248SBryan Drewery static int 763ae994fdcSBaptiste Daroussin bootstrap_pkg(bool force, const char *fetchOpts) 764f12db248SBryan Drewery { 765f12db248SBryan Drewery int fd_pkg, fd_sig; 766f12db248SBryan Drewery int ret; 767f12db248SBryan Drewery char url[MAXPATHLEN]; 768f12db248SBryan Drewery char tmppkg[MAXPATHLEN]; 769f12db248SBryan Drewery char tmpsig[MAXPATHLEN]; 770f12db248SBryan Drewery const char *packagesite; 771f12db248SBryan Drewery const char *signature_type; 772f12db248SBryan Drewery char pkgstatic[MAXPATHLEN]; 773a2aac2f5SBaptiste Daroussin const char *bootstrap_name; 774f12db248SBryan Drewery 775f12db248SBryan Drewery fd_sig = -1; 776f12db248SBryan Drewery ret = -1; 777f12db248SBryan Drewery 778f12db248SBryan Drewery if (config_string(PACKAGESITE, &packagesite) != 0) { 779f12db248SBryan Drewery warnx("No PACKAGESITE defined"); 780f12db248SBryan Drewery return (-1); 781f12db248SBryan Drewery } 782f12db248SBryan Drewery 783f12db248SBryan Drewery if (config_string(SIGNATURE_TYPE, &signature_type) != 0) { 784f12db248SBryan Drewery warnx("Error looking up SIGNATURE_TYPE"); 785f12db248SBryan Drewery return (-1); 786f12db248SBryan Drewery } 787f12db248SBryan Drewery 788f12db248SBryan Drewery printf("Bootstrapping pkg from %s, please wait...\n", packagesite); 789f12db248SBryan Drewery 790f12db248SBryan Drewery /* Support pkg+http:// for PACKAGESITE which is the new format 791f12db248SBryan Drewery in 1.2 to avoid confusion on why http://pkg.FreeBSD.org has 792f12db248SBryan Drewery no A record. */ 793f12db248SBryan Drewery if (strncmp(URL_SCHEME_PREFIX, packagesite, 794f12db248SBryan Drewery strlen(URL_SCHEME_PREFIX)) == 0) 795f12db248SBryan Drewery packagesite += strlen(URL_SCHEME_PREFIX); 796a2aac2f5SBaptiste Daroussin for (int j = 0; bootstrap_names[j] != NULL; j++) { 797a2aac2f5SBaptiste Daroussin bootstrap_name = bootstrap_names[j]; 798f12db248SBryan Drewery 799a2aac2f5SBaptiste Daroussin snprintf(url, MAXPATHLEN, "%s/Latest/%s", packagesite, bootstrap_name); 800a2aac2f5SBaptiste Daroussin snprintf(tmppkg, MAXPATHLEN, "%s/%s.XXXXXX", 801a2aac2f5SBaptiste Daroussin getenv("TMPDIR") ? getenv("TMPDIR") : _PATH_TMP, 802a2aac2f5SBaptiste Daroussin bootstrap_name); 803a2aac2f5SBaptiste Daroussin if ((fd_pkg = fetch_to_fd(url, tmppkg, fetchOpts)) != -1) 804a2aac2f5SBaptiste Daroussin break; 805a2aac2f5SBaptiste Daroussin bootstrap_name = NULL; 806a2aac2f5SBaptiste Daroussin } 807a2aac2f5SBaptiste Daroussin if (bootstrap_name == NULL) 808f12db248SBryan Drewery goto fetchfail; 809f12db248SBryan Drewery 810f12db248SBryan Drewery if (signature_type != NULL && 81148f92706SXin LI strcasecmp(signature_type, "NONE") != 0) { 81261acb458SBaptiste Daroussin if (strcasecmp(signature_type, "FINGERPRINTS") == 0) { 81348f92706SXin LI 814a2aac2f5SBaptiste Daroussin snprintf(tmpsig, MAXPATHLEN, "%s/%s.sig.XXXXXX", 815a2aac2f5SBaptiste Daroussin getenv("TMPDIR") ? getenv("TMPDIR") : _PATH_TMP, 816a2aac2f5SBaptiste Daroussin bootstrap_name); 817a2aac2f5SBaptiste Daroussin snprintf(url, MAXPATHLEN, "%s/Latest/%s.sig", 818a2aac2f5SBaptiste Daroussin packagesite, bootstrap_name); 819f12db248SBryan Drewery 820ae994fdcSBaptiste Daroussin if ((fd_sig = fetch_to_fd(url, tmpsig, fetchOpts)) == -1) { 82161acb458SBaptiste Daroussin fprintf(stderr, "Signature for pkg not " 82261acb458SBaptiste Daroussin "available.\n"); 823f12db248SBryan Drewery goto fetchfail; 824f12db248SBryan Drewery } 825f12db248SBryan Drewery 826f12db248SBryan Drewery if (verify_signature(fd_pkg, fd_sig) == false) 827f12db248SBryan Drewery goto cleanup; 82861acb458SBaptiste Daroussin } else if (strcasecmp(signature_type, "PUBKEY") == 0) { 82961acb458SBaptiste Daroussin 83061acb458SBaptiste Daroussin snprintf(tmpsig, MAXPATHLEN, 831a2aac2f5SBaptiste Daroussin "%s/%s.pubkeysig.XXXXXX", 832a2aac2f5SBaptiste Daroussin getenv("TMPDIR") ? getenv("TMPDIR") : _PATH_TMP, 833a2aac2f5SBaptiste Daroussin bootstrap_name); 834a2aac2f5SBaptiste Daroussin snprintf(url, MAXPATHLEN, "%s/Latest/%s.pubkeysig", 835a2aac2f5SBaptiste Daroussin packagesite, bootstrap_name); 83661acb458SBaptiste Daroussin 837ae994fdcSBaptiste Daroussin if ((fd_sig = fetch_to_fd(url, tmpsig, fetchOpts)) == -1) { 83861acb458SBaptiste Daroussin fprintf(stderr, "Signature for pkg not " 83961acb458SBaptiste Daroussin "available.\n"); 84061acb458SBaptiste Daroussin goto fetchfail; 84161acb458SBaptiste Daroussin } 84261acb458SBaptiste Daroussin 84361acb458SBaptiste Daroussin if (verify_pubsignature(fd_pkg, fd_sig) == false) 84461acb458SBaptiste Daroussin goto cleanup; 84561acb458SBaptiste Daroussin } else { 84661acb458SBaptiste Daroussin warnx("Signature type %s is not supported for " 84761acb458SBaptiste Daroussin "bootstrapping.", signature_type); 84861acb458SBaptiste Daroussin goto cleanup; 84961acb458SBaptiste Daroussin } 850f12db248SBryan Drewery } 851f12db248SBryan Drewery 852f12db248SBryan Drewery if ((ret = extract_pkg_static(fd_pkg, pkgstatic, MAXPATHLEN)) == 0) 8535212e8baSBryan Drewery ret = install_pkg_static(pkgstatic, tmppkg, force); 8543aa4b42aSBaptiste Daroussin 855a6454741SBaptiste Daroussin goto cleanup; 856a6454741SBaptiste Daroussin 857a6454741SBaptiste Daroussin fetchfail: 858a6454741SBaptiste Daroussin warnx("Error fetching %s: %s", url, fetchLastErrString); 859a10f71c5STom Jones if (fetchLastErrCode == FETCH_RESOLV) { 860a10f71c5STom Jones fprintf(stderr, "Address resolution failed for %s.\n", packagesite); 861a10f71c5STom Jones fprintf(stderr, "Consider changing PACKAGESITE.\n"); 862a10f71c5STom Jones } else { 8634ff9a7efSBryan Drewery fprintf(stderr, "A pre-built version of pkg could not be found for " 8644ff9a7efSBryan Drewery "your system.\n"); 8654ff9a7efSBryan Drewery fprintf(stderr, "Consider changing PACKAGESITE or installing it from " 8664ff9a7efSBryan Drewery "ports: 'ports-mgmt/pkg'.\n"); 867a10f71c5STom Jones } 868a6454741SBaptiste Daroussin 8693aa4b42aSBaptiste Daroussin cleanup: 870f12db248SBryan Drewery if (fd_sig != -1) { 871f12db248SBryan Drewery close(fd_sig); 872f12db248SBryan Drewery unlink(tmpsig); 873f12db248SBryan Drewery } 87492947daaSBaptiste Daroussin 87592947daaSBaptiste Daroussin if (fd_pkg != -1) { 876f12db248SBryan Drewery close(fd_pkg); 8773aa4b42aSBaptiste Daroussin unlink(tmppkg); 87892947daaSBaptiste Daroussin } 8793aa4b42aSBaptiste Daroussin 880a6454741SBaptiste Daroussin return (ret); 8813aa4b42aSBaptiste Daroussin } 8823aa4b42aSBaptiste Daroussin 883e18ad51cSAlexander Kabaev static const char confirmation_message[] = 884e18ad51cSAlexander Kabaev "The package management tool is not yet installed on your system.\n" 885e18ad51cSAlexander Kabaev "Do you want to fetch and install it now? [y/N]: "; 886e18ad51cSAlexander Kabaev 887e9d9ee52SBaptiste Daroussin static const char non_interactive_message[] = 888575c4095SBaptiste Daroussin "The package management tool is not yet installed on your system.\n" 8891efc8970SBaptiste Daroussin "Please set ASSUME_ALWAYS_YES=yes environment variable to be able to bootstrap " 890e9d9ee52SBaptiste Daroussin "in non-interactive (stdin not being a tty)\n"; 891575c4095SBaptiste Daroussin 892ae994fdcSBaptiste Daroussin static const char args_bootstrap_message[] = 893ae994fdcSBaptiste Daroussin "Too many arguments\n" 894ae994fdcSBaptiste Daroussin "Usage: pkg [-4|-6] bootstrap [-f] [-y]\n"; 895ae994fdcSBaptiste Daroussin 896ae994fdcSBaptiste Daroussin static const char args_add_message[] = 897ae994fdcSBaptiste Daroussin "Too many arguments\n" 898*f5c847aeSEd Maste "Usage: pkg add [-f] [-y] {pkg.pkg}\n"; 899ae994fdcSBaptiste Daroussin 900e18ad51cSAlexander Kabaev static int 901e18ad51cSAlexander Kabaev pkg_query_yes_no(void) 902e18ad51cSAlexander Kabaev { 903e18ad51cSAlexander Kabaev int ret, c; 904e18ad51cSAlexander Kabaev 90567c9f60eSPoul-Henning Kamp fflush(stdout); 906e18ad51cSAlexander Kabaev c = getchar(); 907e18ad51cSAlexander Kabaev 908e18ad51cSAlexander Kabaev if (c == 'y' || c == 'Y') 909e18ad51cSAlexander Kabaev ret = 1; 910e18ad51cSAlexander Kabaev else 911e18ad51cSAlexander Kabaev ret = 0; 912e18ad51cSAlexander Kabaev 913e18ad51cSAlexander Kabaev while (c != '\n' && c != EOF) 914e18ad51cSAlexander Kabaev c = getchar(); 915e18ad51cSAlexander Kabaev 916e18ad51cSAlexander Kabaev return (ret); 917e18ad51cSAlexander Kabaev } 918e18ad51cSAlexander Kabaev 91952cb76feSBryan Drewery static int 9205212e8baSBryan Drewery bootstrap_pkg_local(const char *pkgpath, bool force) 92152cb76feSBryan Drewery { 92252cb76feSBryan Drewery char path[MAXPATHLEN]; 92352cb76feSBryan Drewery char pkgstatic[MAXPATHLEN]; 92452cb76feSBryan Drewery const char *signature_type; 92552cb76feSBryan Drewery int fd_pkg, fd_sig, ret; 92652cb76feSBryan Drewery 92752cb76feSBryan Drewery fd_sig = -1; 92852cb76feSBryan Drewery ret = -1; 92952cb76feSBryan Drewery 93052cb76feSBryan Drewery fd_pkg = open(pkgpath, O_RDONLY); 93152cb76feSBryan Drewery if (fd_pkg == -1) 93252cb76feSBryan Drewery err(EXIT_FAILURE, "Unable to open %s", pkgpath); 93352cb76feSBryan Drewery 93452cb76feSBryan Drewery if (config_string(SIGNATURE_TYPE, &signature_type) != 0) { 93552cb76feSBryan Drewery warnx("Error looking up SIGNATURE_TYPE"); 93692947daaSBaptiste Daroussin goto cleanup; 93752cb76feSBryan Drewery } 93852cb76feSBryan Drewery if (signature_type != NULL && 93948f92706SXin LI strcasecmp(signature_type, "NONE") != 0) { 94061acb458SBaptiste Daroussin if (strcasecmp(signature_type, "FINGERPRINTS") == 0) { 94148f92706SXin LI 94252cb76feSBryan Drewery snprintf(path, sizeof(path), "%s.sig", pkgpath); 94352cb76feSBryan Drewery 94452cb76feSBryan Drewery if ((fd_sig = open(path, O_RDONLY)) == -1) { 94561acb458SBaptiste Daroussin fprintf(stderr, "Signature for pkg not " 94661acb458SBaptiste Daroussin "available.\n"); 94752cb76feSBryan Drewery goto cleanup; 94852cb76feSBryan Drewery } 94952cb76feSBryan Drewery 95052cb76feSBryan Drewery if (verify_signature(fd_pkg, fd_sig) == false) 95152cb76feSBryan Drewery goto cleanup; 95261acb458SBaptiste Daroussin 95361acb458SBaptiste Daroussin } else if (strcasecmp(signature_type, "PUBKEY") == 0) { 95461acb458SBaptiste Daroussin 95561acb458SBaptiste Daroussin snprintf(path, sizeof(path), "%s.pubkeysig", pkgpath); 95661acb458SBaptiste Daroussin 95761acb458SBaptiste Daroussin if ((fd_sig = open(path, O_RDONLY)) == -1) { 95861acb458SBaptiste Daroussin fprintf(stderr, "Signature for pkg not " 95961acb458SBaptiste Daroussin "available.\n"); 96061acb458SBaptiste Daroussin goto cleanup; 96161acb458SBaptiste Daroussin } 96261acb458SBaptiste Daroussin 96361acb458SBaptiste Daroussin if (verify_pubsignature(fd_pkg, fd_sig) == false) 96461acb458SBaptiste Daroussin goto cleanup; 96561acb458SBaptiste Daroussin 96661acb458SBaptiste Daroussin } else { 96761acb458SBaptiste Daroussin warnx("Signature type %s is not supported for " 96861acb458SBaptiste Daroussin "bootstrapping.", signature_type); 96961acb458SBaptiste Daroussin goto cleanup; 97061acb458SBaptiste Daroussin } 97152cb76feSBryan Drewery } 97252cb76feSBryan Drewery 97352cb76feSBryan Drewery if ((ret = extract_pkg_static(fd_pkg, pkgstatic, MAXPATHLEN)) == 0) 9745212e8baSBryan Drewery ret = install_pkg_static(pkgstatic, pkgpath, force); 97552cb76feSBryan Drewery 97652cb76feSBryan Drewery cleanup: 97752cb76feSBryan Drewery close(fd_pkg); 97852cb76feSBryan Drewery if (fd_sig != -1) 97952cb76feSBryan Drewery close(fd_sig); 98052cb76feSBryan Drewery 98152cb76feSBryan Drewery return (ret); 98252cb76feSBryan Drewery } 98352cb76feSBryan Drewery 98440b9f924SKyle Evans #define PKG_NAME "pkg" 98540b9f924SKyle Evans #define PKG_DEVEL_NAME PKG_NAME "-devel" 98640b9f924SKyle Evans #define PKG_PKG PKG_NAME "." 98740b9f924SKyle Evans 98840b9f924SKyle Evans static bool 98940b9f924SKyle Evans pkg_is_pkg_pkg(const char *pkg) 99040b9f924SKyle Evans { 991c96b4d87SGleb Smirnoff char *vstart, *basename; 99240b9f924SKyle Evans size_t namelen; 99340b9f924SKyle Evans 994c96b4d87SGleb Smirnoff /* Strip path. */ 995c96b4d87SGleb Smirnoff if ((basename = strrchr(pkg, '/')) != NULL) 996c96b4d87SGleb Smirnoff pkg = basename + 1; 997c96b4d87SGleb Smirnoff 99840b9f924SKyle Evans /* 99940b9f924SKyle Evans * Chop off the final "-" (version delimiter) and check the name that 100040b9f924SKyle Evans * precedes it. If we didn't have a version delimiter, it must be the 100140b9f924SKyle Evans * pkg.$archive short form but we'll check it anyways. pkg-devel short 100240b9f924SKyle Evans * form will look like a pkg archive with 'devel' version, but that's 100340b9f924SKyle Evans * OK. We otherwise assumed that non-pkg packages will always have a 100440b9f924SKyle Evans * version component. 100540b9f924SKyle Evans */ 100640b9f924SKyle Evans vstart = strrchr(pkg, '-'); 100740b9f924SKyle Evans if (vstart == NULL) { 100840b9f924SKyle Evans return (strlen(pkg) > sizeof(PKG_PKG) - 1 && 100940b9f924SKyle Evans strncmp(pkg, PKG_PKG, sizeof(PKG_PKG) - 1) == 0); 101040b9f924SKyle Evans } 101140b9f924SKyle Evans 101240b9f924SKyle Evans namelen = vstart - pkg; 101340b9f924SKyle Evans if (namelen == sizeof(PKG_NAME) - 1 && 101440b9f924SKyle Evans strncmp(pkg, PKG_NAME, sizeof(PKG_NAME) - 1) == 0) 101540b9f924SKyle Evans return (true); 101640b9f924SKyle Evans if (namelen == sizeof(PKG_DEVEL_NAME) - 1 && 101740b9f924SKyle Evans strncmp(pkg, PKG_DEVEL_NAME, sizeof(PKG_DEVEL_NAME) - 1) == 0) 101840b9f924SKyle Evans return (true); 101940b9f924SKyle Evans return (false); 102040b9f924SKyle Evans } 102140b9f924SKyle Evans 10223aa4b42aSBaptiste Daroussin int 102346b67edeSBaptiste Daroussin main(int argc, char *argv[]) 10243aa4b42aSBaptiste Daroussin { 10253aa4b42aSBaptiste Daroussin char pkgpath[MAXPATHLEN]; 102618418e19SKyle Evans const char *pkgarg, *repo_name; 1027ae994fdcSBaptiste Daroussin bool activation_test, add_pkg, bootstrap_only, force, yes; 1028ae994fdcSBaptiste Daroussin signed char ch; 1029ae994fdcSBaptiste Daroussin const char *fetchOpts; 1030ae994fdcSBaptiste Daroussin char *command; 10315212e8baSBryan Drewery 1032ae994fdcSBaptiste Daroussin activation_test = false; 1033ae994fdcSBaptiste Daroussin add_pkg = false; 10345212e8baSBryan Drewery bootstrap_only = false; 1035ae994fdcSBaptiste Daroussin command = NULL; 1036ae994fdcSBaptiste Daroussin fetchOpts = ""; 10375212e8baSBryan Drewery force = false; 10385212e8baSBryan Drewery pkgarg = NULL; 103918418e19SKyle Evans repo_name = NULL; 10405212e8baSBryan Drewery yes = false; 10413aa4b42aSBaptiste Daroussin 1042ae994fdcSBaptiste Daroussin struct option longopts[] = { 1043e9ad2964SBrooks Davis { "debug", no_argument, NULL, 'd' }, 1044ae994fdcSBaptiste Daroussin { "force", no_argument, NULL, 'f' }, 1045ae994fdcSBaptiste Daroussin { "only-ipv4", no_argument, NULL, '4' }, 1046ae994fdcSBaptiste Daroussin { "only-ipv6", no_argument, NULL, '6' }, 1047ae994fdcSBaptiste Daroussin { "yes", no_argument, NULL, 'y' }, 1048ae994fdcSBaptiste Daroussin { NULL, 0, NULL, 0 }, 1049ae994fdcSBaptiste Daroussin }; 1050ae994fdcSBaptiste Daroussin 105156d11d4aSStefan Eßer snprintf(pkgpath, MAXPATHLEN, "%s/sbin/pkg", getlocalbase()); 10523aa4b42aSBaptiste Daroussin 1053e9ad2964SBrooks Davis while ((ch = getopt_long(argc, argv, "-:dfr::yN46", longopts, NULL)) != -1) { 1054ae994fdcSBaptiste Daroussin switch (ch) { 1055e9ad2964SBrooks Davis case 'd': 1056e9ad2964SBrooks Davis debug++; 1057e9ad2964SBrooks Davis break; 1058ae994fdcSBaptiste Daroussin case 'f': 1059ae994fdcSBaptiste Daroussin force = true; 1060ae994fdcSBaptiste Daroussin break; 1061ae994fdcSBaptiste Daroussin case 'N': 1062ae994fdcSBaptiste Daroussin activation_test = true; 1063ae994fdcSBaptiste Daroussin break; 1064ae994fdcSBaptiste Daroussin case 'y': 1065ae994fdcSBaptiste Daroussin yes = true; 1066ae994fdcSBaptiste Daroussin break; 1067ae994fdcSBaptiste Daroussin case '4': 1068ae994fdcSBaptiste Daroussin fetchOpts = "4"; 1069ae994fdcSBaptiste Daroussin break; 1070ae994fdcSBaptiste Daroussin case '6': 1071ae994fdcSBaptiste Daroussin fetchOpts = "6"; 1072ae994fdcSBaptiste Daroussin break; 107318418e19SKyle Evans case 'r': 107418418e19SKyle Evans /* 107518418e19SKyle Evans * The repository can only be specified for an explicit 107618418e19SKyle Evans * bootstrap request at this time, so that we don't 107718418e19SKyle Evans * confuse the user if they're trying to use a verb that 107818418e19SKyle Evans * has some other conflicting meaning but we need to 107918418e19SKyle Evans * bootstrap. 108018418e19SKyle Evans * 108118418e19SKyle Evans * For that reason, we specify that -r has an optional 108218418e19SKyle Evans * argument above and process the next index ourselves. 108318418e19SKyle Evans * This is mostly significant because getopt(3) will 108418418e19SKyle Evans * otherwise eat the next argument, which could be 108518418e19SKyle Evans * something we need to try and make sense of. 108618418e19SKyle Evans * 108718418e19SKyle Evans * At worst this gets us false positives that we ignore 108818418e19SKyle Evans * in other contexts, and we have to do a little fudging 108918418e19SKyle Evans * in order to support separating -r from the reponame 109018418e19SKyle Evans * with a space since it's not actually optional in 109118418e19SKyle Evans * the bootstrap/add sense. 109218418e19SKyle Evans */ 109318418e19SKyle Evans if (add_pkg || bootstrap_only) { 109418418e19SKyle Evans if (optarg != NULL) { 109518418e19SKyle Evans repo_name = optarg; 109618418e19SKyle Evans } else if (optind < argc) { 109718418e19SKyle Evans repo_name = argv[optind]; 109818418e19SKyle Evans } 109918418e19SKyle Evans 110018418e19SKyle Evans if (repo_name == NULL || *repo_name == '\0') { 110118418e19SKyle Evans fprintf(stderr, 110218418e19SKyle Evans "Must specify a repository with -r!\n"); 110318418e19SKyle Evans exit(EXIT_FAILURE); 110418418e19SKyle Evans } 110518418e19SKyle Evans 110618418e19SKyle Evans if (optarg == NULL) { 110718418e19SKyle Evans /* Advance past repo name. */ 110818418e19SKyle Evans optreset = 1; 110918418e19SKyle Evans optind++; 111018418e19SKyle Evans } 111118418e19SKyle Evans } 111218418e19SKyle Evans break; 1113ae994fdcSBaptiste Daroussin case 1: 1114ae994fdcSBaptiste Daroussin // Non-option arguments, first one is the command 1115ae994fdcSBaptiste Daroussin if (command == NULL) { 1116ae994fdcSBaptiste Daroussin command = argv[optind-1]; 1117ae994fdcSBaptiste Daroussin if (strcmp(command, "add") == 0) { 1118ae994fdcSBaptiste Daroussin add_pkg = true; 1119ae994fdcSBaptiste Daroussin } 1120ae994fdcSBaptiste Daroussin else if (strcmp(command, "bootstrap") == 0) { 11215212e8baSBryan Drewery bootstrap_only = true; 1122ae994fdcSBaptiste Daroussin } 1123ae994fdcSBaptiste Daroussin } 1124ae994fdcSBaptiste Daroussin // bootstrap doesn't accept other arguments 1125ae994fdcSBaptiste Daroussin else if (bootstrap_only) { 1126ae994fdcSBaptiste Daroussin fprintf(stderr, args_bootstrap_message); 1127ca7f7593SKyle Evans exit(EXIT_FAILURE); 1128ca7f7593SKyle Evans } 1129ae994fdcSBaptiste Daroussin else if (add_pkg && pkgarg != NULL) { 113040b9f924SKyle Evans /* 113140b9f924SKyle Evans * Additional arguments also means it's not a 113240b9f924SKyle Evans * local bootstrap request. 113340b9f924SKyle Evans */ 113440b9f924SKyle Evans add_pkg = false; 1135ca7f7593SKyle Evans } 1136ae994fdcSBaptiste Daroussin else if (add_pkg) { 113740b9f924SKyle Evans /* 113840b9f924SKyle Evans * If it's not a request for pkg or pkg-devel, 113940b9f924SKyle Evans * then we must assume they were trying to 114040b9f924SKyle Evans * install some other local package and we 114140b9f924SKyle Evans * should try to bootstrap from the repo. 114240b9f924SKyle Evans */ 114340b9f924SKyle Evans if (!pkg_is_pkg_pkg(argv[optind-1])) { 114440b9f924SKyle Evans add_pkg = false; 114540b9f924SKyle Evans } else { 1146ae994fdcSBaptiste Daroussin pkgarg = argv[optind-1]; 1147ae994fdcSBaptiste Daroussin } 114840b9f924SKyle Evans } 1149ae994fdcSBaptiste Daroussin break; 1150ae994fdcSBaptiste Daroussin default: 1151ae994fdcSBaptiste Daroussin break; 1152ae994fdcSBaptiste Daroussin } 11535212e8baSBryan Drewery } 1154e9ad2964SBrooks Davis if (debug > 1) 1155e9ad2964SBrooks Davis fetchDebug = 1; 11565212e8baSBryan Drewery 11575212e8baSBryan Drewery if ((bootstrap_only && force) || access(pkgpath, X_OK) == -1) { 1158e18ad51cSAlexander Kabaev /* 1159d482e1f4SMatthew Seaman * To allow 'pkg -N' to be used as a reliable test for whether 1160ecfed9f2SMatthew Seaman * a system is configured to use pkg, don't bootstrap pkg 1161990878b0SGordon Bergling * when that option is passed. 1162ecfed9f2SMatthew Seaman */ 1163ae994fdcSBaptiste Daroussin if (activation_test) 1164e41b8acbSMatthew Seaman errx(EXIT_FAILURE, "pkg is not installed"); 1165ecfed9f2SMatthew Seaman 116618418e19SKyle Evans config_init(repo_name); 116752cb76feSBryan Drewery 1168ae994fdcSBaptiste Daroussin if (add_pkg) { 11695212e8baSBryan Drewery if (pkgarg == NULL) { 1170*f5c847aeSEd Maste fprintf(stderr, "Path to pkg.pkg required\n"); 11715212e8baSBryan Drewery exit(EXIT_FAILURE); 11725212e8baSBryan Drewery } 11735212e8baSBryan Drewery if (access(pkgarg, R_OK) == -1) { 11745212e8baSBryan Drewery fprintf(stderr, "No such file: %s\n", pkgarg); 11755212e8baSBryan Drewery exit(EXIT_FAILURE); 11765212e8baSBryan Drewery } 11775212e8baSBryan Drewery if (bootstrap_pkg_local(pkgarg, force) != 0) 1178b70213b5SBaptiste Daroussin exit(EXIT_FAILURE); 1179b70213b5SBaptiste Daroussin exit(EXIT_SUCCESS); 1180b70213b5SBaptiste Daroussin } 1181ecfed9f2SMatthew Seaman /* 1182e18ad51cSAlexander Kabaev * Do not ask for confirmation if either of stdin or stdout is 1183e18ad51cSAlexander Kabaev * not tty. Check the environment to see if user has answer 1184e18ad51cSAlexander Kabaev * tucked in there already. 1185e18ad51cSAlexander Kabaev */ 1186ae994fdcSBaptiste Daroussin if (!yes) 11879950eceeSBaptiste Daroussin config_bool(ASSUME_ALWAYS_YES, &yes); 11889950eceeSBaptiste Daroussin if (!yes) { 1189575c4095SBaptiste Daroussin if (!isatty(fileno(stdin))) { 1190e9d9ee52SBaptiste Daroussin fprintf(stderr, non_interactive_message); 11913a480126SBaptiste Daroussin exit(EXIT_FAILURE); 1192575c4095SBaptiste Daroussin } 1193204ea792SBaptiste Daroussin 1194575c4095SBaptiste Daroussin printf("%s", confirmation_message); 1195204ea792SBaptiste Daroussin if (pkg_query_yes_no() == 0) 1196e18ad51cSAlexander Kabaev exit(EXIT_FAILURE); 1197e18ad51cSAlexander Kabaev } 1198ae994fdcSBaptiste Daroussin if (bootstrap_pkg(force, fetchOpts) != 0) 1199a6454741SBaptiste Daroussin exit(EXIT_FAILURE); 12009950eceeSBaptiste Daroussin config_finish(); 1201c3e8a27aSBryan Drewery 12025212e8baSBryan Drewery if (bootstrap_only) 1203c3e8a27aSBryan Drewery exit(EXIT_SUCCESS); 12045212e8baSBryan Drewery } else if (bootstrap_only) { 12055212e8baSBryan Drewery printf("pkg already bootstrapped at %s\n", pkgpath); 1206c3e8a27aSBryan Drewery exit(EXIT_SUCCESS); 1207c3e8a27aSBryan Drewery } 12083aa4b42aSBaptiste Daroussin 12093aa4b42aSBaptiste Daroussin execv(pkgpath, argv); 12103aa4b42aSBaptiste Daroussin 1211a6454741SBaptiste Daroussin /* NOT REACHED */ 12123b05c2a8SBaptiste Daroussin return (EXIT_FAILURE); 12133aa4b42aSBaptiste Daroussin } 1214