xref: /netbsd-src/external/bsd/pkg_install/dist/lib/parse-config.c (revision f46918ca2125b9b1e7ca5a22c07d1414c618e467)
1*f46918caSnia /*	$NetBSD: parse-config.c,v 1.5 2021/04/10 19:49:59 nia Exp $	*/
2d66ee6c3Sjoerg 
3d66ee6c3Sjoerg #if HAVE_CONFIG_H
4d66ee6c3Sjoerg #include "config.h"
5d66ee6c3Sjoerg #endif
6d66ee6c3Sjoerg #include <nbcompat.h>
7d66ee6c3Sjoerg #if HAVE_SYS_CDEFS_H
8d66ee6c3Sjoerg #include <sys/cdefs.h>
9d66ee6c3Sjoerg #endif
10*f46918caSnia __RCSID("$NetBSD: parse-config.c,v 1.5 2021/04/10 19:49:59 nia Exp $");
11d66ee6c3Sjoerg 
12d66ee6c3Sjoerg /*-
1312490ea4Sjoerg  * Copyright (c) 2008, 2009 Joerg Sonnenberger <joerg@NetBSD.org>.
14d66ee6c3Sjoerg  * All rights reserved.
15d66ee6c3Sjoerg  *
16d66ee6c3Sjoerg  * Redistribution and use in source and binary forms, with or without
17d66ee6c3Sjoerg  * modification, are permitted provided that the following conditions
18d66ee6c3Sjoerg  * are met:
19d66ee6c3Sjoerg  *
20d66ee6c3Sjoerg  * 1. Redistributions of source code must retain the above copyright
21d66ee6c3Sjoerg  *    notice, this list of conditions and the following disclaimer.
22d66ee6c3Sjoerg  * 2. Redistributions in binary form must reproduce the above copyright
23d66ee6c3Sjoerg  *    notice, this list of conditions and the following disclaimer in
24d66ee6c3Sjoerg  *    the documentation and/or other materials provided with the
25d66ee6c3Sjoerg  *    distribution.
26d66ee6c3Sjoerg  *
27d66ee6c3Sjoerg  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
28d66ee6c3Sjoerg  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
29d66ee6c3Sjoerg  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
30d66ee6c3Sjoerg  * FOR A PARTICULAR PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE
31d66ee6c3Sjoerg  * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
32d66ee6c3Sjoerg  * INCIDENTAL, SPECIAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES (INCLUDING,
33d66ee6c3Sjoerg  * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
34d66ee6c3Sjoerg  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
35d66ee6c3Sjoerg  * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
36d66ee6c3Sjoerg  * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
37d66ee6c3Sjoerg  * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
38d66ee6c3Sjoerg  * SUCH DAMAGE.
39d66ee6c3Sjoerg  */
40d66ee6c3Sjoerg 
41d66ee6c3Sjoerg #if HAVE_ERR_H
42d66ee6c3Sjoerg #include <err.h>
43d66ee6c3Sjoerg #endif
4412490ea4Sjoerg #include <errno.h>
45d66ee6c3Sjoerg #if HAVE_STRING_H
46d66ee6c3Sjoerg #include <string.h>
47d66ee6c3Sjoerg #endif
48d66ee6c3Sjoerg 
495ac0fc9cSjoerg #ifndef BOOTSTRAP
505ac0fc9cSjoerg #include <fetch.h>
515ac0fc9cSjoerg #endif
525ac0fc9cSjoerg 
53d66ee6c3Sjoerg #include "lib.h"
54d66ee6c3Sjoerg 
555ac0fc9cSjoerg static int cache_connections = 16;
565ac0fc9cSjoerg static int cache_connections_host = 4;
575ac0fc9cSjoerg 
58d66ee6c3Sjoerg const char     *config_file = SYSCONFDIR"/pkg_install.conf";
59d66ee6c3Sjoerg 
60b8b994aeSjoerg char fetch_flags[10] = ""; /* Workaround Mac OS X linker issues with BSS */
61d66ee6c3Sjoerg static const char *active_ftp;
62d66ee6c3Sjoerg static const char *verbose_netio;
63d66ee6c3Sjoerg static const char *ignore_proxy;
647c4d7328Sjoerg const char *cache_index = "yes";
65d66ee6c3Sjoerg const char *cert_chain_file;
66d66ee6c3Sjoerg const char *certs_packages;
67d66ee6c3Sjoerg const char *certs_pkg_vulnerabilities;
68d0eb5eccSjoerg const char *check_eol = "yes";
69de1f604dSwiz const char *check_os_version = "yes";
70d66ee6c3Sjoerg const char *check_vulnerabilities;
715ac0fc9cSjoerg static const char *config_cache_connections;
725ac0fc9cSjoerg static const char *config_cache_connections_host;
735ac0fc9cSjoerg const char *config_pkg_dbdir;
74e50ad3d1Sjoerg const char *config_pkg_path;
755ac0fc9cSjoerg const char *config_pkg_refcount_dbdir;
760590ec0aSjoerg const char *do_license_check;
77d66ee6c3Sjoerg const char *verified_installation;
78d66ee6c3Sjoerg const char *gpg_cmd;
79d66ee6c3Sjoerg const char *gpg_keyring_pkgvuln;
80d66ee6c3Sjoerg const char *gpg_keyring_sign;
81d66ee6c3Sjoerg const char *gpg_keyring_verify;
82d66ee6c3Sjoerg const char *gpg_sign_as;
83d66ee6c3Sjoerg const char *pkg_vulnerabilities_dir;
84d66ee6c3Sjoerg const char *pkg_vulnerabilities_file;
85d66ee6c3Sjoerg const char *pkg_vulnerabilities_url;
86d66ee6c3Sjoerg const char *ignore_advisories = NULL;
87c7785e72Ssevan const char tnf_vulnerability_base[] = "http://cdn.NetBSD.org/pub/NetBSD/packages/vulns";
8851e2fd09Sjoerg const char *acceptable_licenses = NULL;
89d66ee6c3Sjoerg 
90d66ee6c3Sjoerg static struct config_variable {
91d66ee6c3Sjoerg 	const char *name;
92d66ee6c3Sjoerg 	const char **var;
93d66ee6c3Sjoerg } config_variables[] = {
9451e2fd09Sjoerg 	{ "ACCEPTABLE_LICENSES", &acceptable_licenses },
95d66ee6c3Sjoerg 	{ "ACTIVE_FTP", &active_ftp },
967c4d7328Sjoerg 	{ "CACHE_INDEX", &cache_index },
975ac0fc9cSjoerg 	{ "CACHE_CONNECTIONS", &config_cache_connections },
985ac0fc9cSjoerg 	{ "CACHE_CONNECTIONS_HOST", &config_cache_connections_host },
99d66ee6c3Sjoerg 	{ "CERTIFICATE_ANCHOR_PKGS", &certs_packages },
100d66ee6c3Sjoerg 	{ "CERTIFICATE_ANCHOR_PKGVULN", &certs_pkg_vulnerabilities },
101d66ee6c3Sjoerg 	{ "CERTIFICATE_CHAIN", &cert_chain_file },
1020590ec0aSjoerg 	{ "CHECK_LICENSE", &do_license_check },
103d0eb5eccSjoerg 	{ "CHECK_END_OF_LIFE", &check_eol },
104de1f604dSwiz 	{ "CHECK_OS_VERSION", &check_os_version },
105d66ee6c3Sjoerg 	{ "CHECK_VULNERABILITIES", &check_vulnerabilities },
10651e2fd09Sjoerg 	{ "DEFAULT_ACCEPTABLE_LICENSES", &default_acceptable_licenses },
107d66ee6c3Sjoerg 	{ "GPG", &gpg_cmd },
108d66ee6c3Sjoerg 	{ "GPG_KEYRING_PKGVULN", &gpg_keyring_pkgvuln },
109d66ee6c3Sjoerg 	{ "GPG_KEYRING_SIGN", &gpg_keyring_sign },
110d66ee6c3Sjoerg 	{ "GPG_KEYRING_VERIFY", &gpg_keyring_verify },
111d66ee6c3Sjoerg 	{ "GPG_SIGN_AS", &gpg_sign_as },
112d66ee6c3Sjoerg 	{ "IGNORE_PROXY", &ignore_proxy },
113d66ee6c3Sjoerg 	{ "IGNORE_URL", &ignore_advisories },
1145ac0fc9cSjoerg 	{ "PKG_DBDIR", &config_pkg_dbdir },
115e50ad3d1Sjoerg 	{ "PKG_PATH", &config_pkg_path },
1165ac0fc9cSjoerg 	{ "PKG_REFCOUNT_DBDIR", &config_pkg_refcount_dbdir },
117d66ee6c3Sjoerg 	{ "PKGVULNDIR", &pkg_vulnerabilities_dir },
118d66ee6c3Sjoerg 	{ "PKGVULNURL", &pkg_vulnerabilities_url },
119d66ee6c3Sjoerg 	{ "VERBOSE_NETIO", &verbose_netio },
120d66ee6c3Sjoerg 	{ "VERIFIED_INSTALLATION", &verified_installation },
121375a5192Sjoerg 	{ NULL, NULL }, /* For use by pkg_install_show_variable */
122d66ee6c3Sjoerg 	{ NULL, NULL }
123d66ee6c3Sjoerg };
124d66ee6c3Sjoerg 
12512490ea4Sjoerg char *config_tmp_variables[sizeof config_variables/sizeof config_variables[0]];
12612490ea4Sjoerg 
12712490ea4Sjoerg static void
parse_pkg_install_conf(void)12812490ea4Sjoerg parse_pkg_install_conf(void)
12912490ea4Sjoerg {
13012490ea4Sjoerg 	struct config_variable *var;
13112490ea4Sjoerg 	FILE *fp;
13212490ea4Sjoerg 	char *line, *value;
13312490ea4Sjoerg 	size_t len, var_len, i;
13412490ea4Sjoerg 
13512490ea4Sjoerg 	fp = fopen(config_file, "r");
13612490ea4Sjoerg 	if (!fp) {
13712490ea4Sjoerg 		if (errno != ENOENT)
13812490ea4Sjoerg 			warn("Can't open '%s' for reading", config_file);
13912490ea4Sjoerg 		return;
14012490ea4Sjoerg 	}
14112490ea4Sjoerg 
14212490ea4Sjoerg 	while ((line = fgetln(fp, &len)) != (char *) NULL) {
14312490ea4Sjoerg 		if (line[len - 1] == '\n')
14412490ea4Sjoerg 			--len;
14512490ea4Sjoerg 		for (i = 0; (var = &config_variables[i])->name != NULL; ++i) {
14612490ea4Sjoerg 			var_len = strlen(var->name);
14712490ea4Sjoerg 			if (strncmp(var->name, line, var_len) != 0)
14812490ea4Sjoerg 				continue;
14912490ea4Sjoerg 			if (line[var_len] != '=')
15012490ea4Sjoerg 				continue;
15112490ea4Sjoerg 			line += var_len + 1;
15212490ea4Sjoerg 			len -= var_len + 1;
15312490ea4Sjoerg 			if (config_tmp_variables[i])
15412490ea4Sjoerg 				value = xasprintf("%s\n%.*s",
15512490ea4Sjoerg 				    config_tmp_variables[i], (int)len, line);
15612490ea4Sjoerg 			else
15712490ea4Sjoerg 				value = xasprintf("%.*s", (int)len, line);
15812490ea4Sjoerg 			free(config_tmp_variables[i]);
15912490ea4Sjoerg 			config_tmp_variables[i] = value;
16012490ea4Sjoerg 			break;
16112490ea4Sjoerg 		}
16212490ea4Sjoerg 	}
16312490ea4Sjoerg 
16412490ea4Sjoerg 	for (i = 0; (var = &config_variables[i])->name != NULL; ++i) {
16512490ea4Sjoerg 		if (config_tmp_variables[i] == NULL)
16612490ea4Sjoerg 			continue;
16712490ea4Sjoerg 		*var->var = config_tmp_variables[i];
16812490ea4Sjoerg 		config_tmp_variables[i] = NULL;
16912490ea4Sjoerg 	}
17012490ea4Sjoerg 
17112490ea4Sjoerg 	fclose(fp);
17212490ea4Sjoerg }
17312490ea4Sjoerg 
174d66ee6c3Sjoerg void
pkg_install_config(void)175d66ee6c3Sjoerg pkg_install_config(void)
176d66ee6c3Sjoerg {
1777c4d7328Sjoerg 	int do_cache_index;
178d66ee6c3Sjoerg 	char *value;
1795ac0fc9cSjoerg 
18012490ea4Sjoerg 	parse_pkg_install_conf();
181d66ee6c3Sjoerg 
1825ac0fc9cSjoerg 	if ((value = getenv("PKG_DBDIR")) != NULL)
1835ac0fc9cSjoerg 		pkgdb_set_dir(value, 2);
1845ac0fc9cSjoerg 	else if (config_pkg_dbdir != NULL)
1855ac0fc9cSjoerg 		pkgdb_set_dir(config_pkg_dbdir, 1);
1865ac0fc9cSjoerg 	config_pkg_dbdir = xstrdup(pkgdb_get_dir());
1875ac0fc9cSjoerg 
1885ac0fc9cSjoerg 	if ((value = getenv("PKG_REFCOUNT_DBDIR")) != NULL)
1895ac0fc9cSjoerg 		config_pkg_refcount_dbdir = value;
1905ac0fc9cSjoerg 	else if (config_pkg_refcount_dbdir == NULL)
1915ac0fc9cSjoerg 		config_pkg_refcount_dbdir = xasprintf("%s.refcount",
1925ac0fc9cSjoerg 		    pkgdb_get_dir());
1935ac0fc9cSjoerg 
194d66ee6c3Sjoerg 	if (pkg_vulnerabilities_dir == NULL)
1955ac0fc9cSjoerg 		pkg_vulnerabilities_dir = pkgdb_get_dir();
196d66ee6c3Sjoerg 	pkg_vulnerabilities_file = xasprintf("%s/pkg-vulnerabilities",
197d66ee6c3Sjoerg 	    pkg_vulnerabilities_dir);
198d66ee6c3Sjoerg 	if (pkg_vulnerabilities_url == NULL) {
199d66ee6c3Sjoerg 		pkg_vulnerabilities_url = xasprintf("%s/pkg-vulnerabilities.gz",
200d66ee6c3Sjoerg 		    tnf_vulnerability_base);
201d66ee6c3Sjoerg 	}
202d66ee6c3Sjoerg 	if (verified_installation == NULL)
203d66ee6c3Sjoerg 		verified_installation = "never";
204d66ee6c3Sjoerg 
205d66ee6c3Sjoerg 	if (check_vulnerabilities == NULL)
206d66ee6c3Sjoerg 		check_vulnerabilities = "never";
207d66ee6c3Sjoerg 
2080590ec0aSjoerg 	if (do_license_check == NULL)
2090590ec0aSjoerg 		do_license_check = "no";
2100590ec0aSjoerg 
211e50ad3d1Sjoerg 	if ((value = getenv("PKG_PATH")) != NULL)
212e50ad3d1Sjoerg 		config_pkg_path = value;
213e50ad3d1Sjoerg 
2147c4d7328Sjoerg 	if (strcasecmp(cache_index, "yes") == 0)
2157c4d7328Sjoerg 		do_cache_index = 1;
2167c4d7328Sjoerg 	else {
2177c4d7328Sjoerg 		if (strcasecmp(cache_index, "no"))
2187c4d7328Sjoerg 			warnx("Invalid value for configuration option "
2197c4d7328Sjoerg 			    "CACHE_INDEX");
2207c4d7328Sjoerg 		do_cache_index = 0;
2217c4d7328Sjoerg 	}
2227c4d7328Sjoerg 
2235ac0fc9cSjoerg 	if (config_cache_connections && *config_cache_connections) {
2245ac0fc9cSjoerg 		long v = strtol(config_cache_connections, &value, 10);
2255ac0fc9cSjoerg 		if (*value == '\0') {
2265ac0fc9cSjoerg 			if (v >= INT_MAX || v < 0)
2275ac0fc9cSjoerg 				v = -1;
2285ac0fc9cSjoerg 			cache_connections = v;
2295ac0fc9cSjoerg 		}
2305ac0fc9cSjoerg 	}
2315ac0fc9cSjoerg 	config_cache_connections = xasprintf("%d", cache_connections);
2325ac0fc9cSjoerg 
2335ac0fc9cSjoerg 	if (config_cache_connections_host) {
2345ac0fc9cSjoerg 		long v = strtol(config_cache_connections_host, &value, 10);
2355ac0fc9cSjoerg 		if (*value == '\0') {
2365ac0fc9cSjoerg 			if (v >= INT_MAX || v < 0)
2375ac0fc9cSjoerg 				v = -1;
2385ac0fc9cSjoerg 			cache_connections_host = v;
2395ac0fc9cSjoerg 		}
2405ac0fc9cSjoerg 	}
2415ac0fc9cSjoerg 	config_cache_connections_host = xasprintf("%d", cache_connections_host);
2425ac0fc9cSjoerg 
2435ac0fc9cSjoerg #ifndef BOOTSTRAP
2445ac0fc9cSjoerg 	fetchConnectionCacheInit(cache_connections, cache_connections_host);
2455ac0fc9cSjoerg #endif
2465ac0fc9cSjoerg 
2477c4d7328Sjoerg 	snprintf(fetch_flags, sizeof(fetch_flags), "%s%s%s%s",
2487c4d7328Sjoerg 	    (do_cache_index) ? "c" : "",
249d66ee6c3Sjoerg 	    (verbose_netio && *verbose_netio) ? "v" : "",
25012490ea4Sjoerg 	    (active_ftp && *active_ftp) ? "a" : "",
251d66ee6c3Sjoerg 	    (ignore_proxy && *ignore_proxy) ? "d" : "");
252d66ee6c3Sjoerg }
253d66ee6c3Sjoerg 
254d66ee6c3Sjoerg void
pkg_install_show_variable(const char * var_name)255d66ee6c3Sjoerg pkg_install_show_variable(const char *var_name)
256d66ee6c3Sjoerg {
257d66ee6c3Sjoerg 	struct config_variable *var;
258375a5192Sjoerg 	const char *tmp_value = NULL;
259d66ee6c3Sjoerg 
260d66ee6c3Sjoerg 	for (var = config_variables; var->name != NULL; ++var) {
261375a5192Sjoerg 		if (strcmp(var->name, var_name) == 0)
262375a5192Sjoerg 			break;
263375a5192Sjoerg 	}
264375a5192Sjoerg 	if (var->name == NULL) {
265375a5192Sjoerg 		var->name = var_name;
266375a5192Sjoerg 		var->var = &tmp_value;
267375a5192Sjoerg 	}
268375a5192Sjoerg 
269375a5192Sjoerg 	pkg_install_config();
270375a5192Sjoerg 
271d66ee6c3Sjoerg 	if (*var->var != NULL)
272d66ee6c3Sjoerg 		puts(*var->var);
273d66ee6c3Sjoerg }
274