/* $NetBSD: parse-config.c,v 1.3.2.1 2020/12/19 13:34:42 martin Exp $ */ #if HAVE_CONFIG_H #include "config.h" #endif #include #if HAVE_SYS_CDEFS_H #include #endif __RCSID("$NetBSD: parse-config.c,v 1.3.2.1 2020/12/19 13:34:42 martin Exp $"); /*- * Copyright (c) 2008, 2009 Joerg Sonnenberger . * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in * the documentation and/or other materials provided with the * distribution. * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, * INCIDENTAL, SPECIAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES (INCLUDING, * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. */ #if HAVE_ERR_H #include #endif #include #if HAVE_STRING_H #include #endif #ifndef BOOTSTRAP #include #endif #include "lib.h" static int cache_connections = 16; static int cache_connections_host = 4; const char *config_file = SYSCONFDIR"/pkg_install.conf"; char fetch_flags[10] = ""; /* Workaround Mac OS X linker issues with BSS */ static const char *active_ftp; static const char *verbose_netio; static const char *ignore_proxy; const char *cache_index = "yes"; const char *cert_chain_file; const char *certs_packages; const char *certs_pkg_vulnerabilities; const char *check_eol = "yes"; const char *check_os_version = "yes"; const char *check_vulnerabilities; static const char *config_cache_connections; static const char *config_cache_connections_host; const char *config_pkg_dbdir; const char *config_pkg_path; const char *config_pkg_refcount_dbdir; const char *do_license_check; const char *verified_installation; const char *gpg_cmd; const char *gpg_keyring_pkgvuln; const char *gpg_keyring_sign; const char *gpg_keyring_verify; const char *gpg_sign_as; const char *pkg_vulnerabilities_dir; const char *pkg_vulnerabilities_file; const char *pkg_vulnerabilities_url; const char *ignore_advisories = NULL; const char tnf_vulnerability_base[] = "http://cdn.NetBSD.org/pub/NetBSD/packages/vulns"; const char *acceptable_licenses = NULL; static struct config_variable { const char *name; const char **var; } config_variables[] = { { "ACCEPTABLE_LICENSES", &acceptable_licenses }, { "ACTIVE_FTP", &active_ftp }, { "CACHE_INDEX", &cache_index }, { "CACHE_CONNECTIONS", &config_cache_connections }, { "CACHE_CONNECTIONS_HOST", &config_cache_connections_host }, { "CERTIFICATE_ANCHOR_PKGS", &certs_packages }, { "CERTIFICATE_ANCHOR_PKGVULN", &certs_pkg_vulnerabilities }, { "CERTIFICATE_CHAIN", &cert_chain_file }, { "CHECK_LICENSE", &do_license_check }, { "CHECK_END_OF_LIFE", &check_eol }, { "CHECK_OS_VERSION", &check_os_version }, { "CHECK_VULNERABILITIES", &check_vulnerabilities }, { "DEFAULT_ACCEPTABLE_LICENSES", &default_acceptable_licenses }, { "GPG", &gpg_cmd }, { "GPG_KEYRING_PKGVULN", &gpg_keyring_pkgvuln }, { "GPG_KEYRING_SIGN", &gpg_keyring_sign }, { "GPG_KEYRING_VERIFY", &gpg_keyring_verify }, { "GPG_SIGN_AS", &gpg_sign_as }, { "IGNORE_PROXY", &ignore_proxy }, { "IGNORE_URL", &ignore_advisories }, { "PKG_DBDIR", &config_pkg_dbdir }, { "PKG_PATH", &config_pkg_path }, { "PKG_REFCOUNT_DBDIR", &config_pkg_refcount_dbdir }, { "PKGVULNDIR", &pkg_vulnerabilities_dir }, { "PKGVULNURL", &pkg_vulnerabilities_url }, { "VERBOSE_NETIO", &verbose_netio }, { "VERIFIED_INSTALLATION", &verified_installation }, { NULL, NULL }, /* For use by pkg_install_show_variable */ { NULL, NULL } }; char *config_tmp_variables[sizeof config_variables/sizeof config_variables[0]]; static void parse_pkg_install_conf(void) { struct config_variable *var; FILE *fp; char *line, *value; size_t len, var_len, i; fp = fopen(config_file, "r"); if (!fp) { if (errno != ENOENT) warn("Can't open '%s' for reading", config_file); return; } while ((line = fgetln(fp, &len)) != (char *) NULL) { if (line[len - 1] == '\n') --len; for (i = 0; (var = &config_variables[i])->name != NULL; ++i) { var_len = strlen(var->name); if (strncmp(var->name, line, var_len) != 0) continue; if (line[var_len] != '=') continue; line += var_len + 1; len -= var_len + 1; if (config_tmp_variables[i]) value = xasprintf("%s\n%.*s", config_tmp_variables[i], (int)len, line); else value = xasprintf("%.*s", (int)len, line); free(config_tmp_variables[i]); config_tmp_variables[i] = value; break; } } for (i = 0; (var = &config_variables[i])->name != NULL; ++i) { if (config_tmp_variables[i] == NULL) continue; *var->var = config_tmp_variables[i]; config_tmp_variables[i] = NULL; } fclose(fp); } void pkg_install_config(void) { int do_cache_index; char *value; parse_pkg_install_conf(); if ((value = getenv("PKG_DBDIR")) != NULL) pkgdb_set_dir(value, 2); else if (config_pkg_dbdir != NULL) pkgdb_set_dir(config_pkg_dbdir, 1); config_pkg_dbdir = xstrdup(pkgdb_get_dir()); if ((value = getenv("PKG_REFCOUNT_DBDIR")) != NULL) config_pkg_refcount_dbdir = value; else if (config_pkg_refcount_dbdir == NULL) config_pkg_refcount_dbdir = xasprintf("%s.refcount", pkgdb_get_dir()); if (pkg_vulnerabilities_dir == NULL) pkg_vulnerabilities_dir = pkgdb_get_dir(); pkg_vulnerabilities_file = xasprintf("%s/pkg-vulnerabilities", pkg_vulnerabilities_dir); if (pkg_vulnerabilities_url == NULL) { pkg_vulnerabilities_url = xasprintf("%s/pkg-vulnerabilities.gz", tnf_vulnerability_base); } if (verified_installation == NULL) verified_installation = "never"; if (check_vulnerabilities == NULL) check_vulnerabilities = "never"; if (do_license_check == NULL) do_license_check = "no"; if ((value = getenv("PKG_PATH")) != NULL) config_pkg_path = value; if (strcasecmp(cache_index, "yes") == 0) do_cache_index = 1; else { if (strcasecmp(cache_index, "no")) warnx("Invalid value for configuration option " "CACHE_INDEX"); do_cache_index = 0; } if (config_cache_connections && *config_cache_connections) { long v = strtol(config_cache_connections, &value, 10); if (*value == '\0') { if (v >= INT_MAX || v < 0) v = -1; cache_connections = v; } } config_cache_connections = xasprintf("%d", cache_connections); if (config_cache_connections_host) { long v = strtol(config_cache_connections_host, &value, 10); if (*value == '\0') { if (v >= INT_MAX || v < 0) v = -1; cache_connections_host = v; } } config_cache_connections_host = xasprintf("%d", cache_connections_host); #ifndef BOOTSTRAP fetchConnectionCacheInit(cache_connections, cache_connections_host); #endif snprintf(fetch_flags, sizeof(fetch_flags), "%s%s%s%s", (do_cache_index) ? "c" : "", (verbose_netio && *verbose_netio) ? "v" : "", (active_ftp && *active_ftp) ? "a" : "", (ignore_proxy && *ignore_proxy) ? "d" : ""); } void pkg_install_show_variable(const char *var_name) { struct config_variable *var; const char *tmp_value = NULL; for (var = config_variables; var->name != NULL; ++var) { if (strcmp(var->name, var_name) == 0) break; } if (var->name == NULL) { var->name = var_name; var->var = &tmp_value; } pkg_install_config(); if (*var->var != NULL) puts(*var->var); }