1 /* SPDX-License-Identifier: LGPL-2.1+ */
7 #include "alloc-util.h"
9 #include "format-util.h"
10 #include "gcrypt-util.h"
11 #include "hexdecoct.h"
12 #include "import-util.h"
14 #include "machine-pool.h"
15 #include "parse-util.h"
16 #include "pull-common.h"
18 #include "string-util.h"
20 #include "xattr-util.h"
22 PullJob
* pull_job_unref(PullJob
*j
) {
26 curl_glue_remove_and_free(j
->glue
, j
->curl
);
27 curl_slist_free_all(j
->request_header
);
29 safe_close(j
->disk_fd
);
31 import_compress_free(&j
->compress
);
33 if (j
->checksum_context
)
34 gcry_md_close(j
->checksum_context
);
38 strv_free(j
->old_etags
);
45 static void pull_job_finish(PullJob
*j
, int ret
) {
48 if (IN_SET(j
->state
, PULL_JOB_DONE
, PULL_JOB_FAILED
))
52 j
->state
= PULL_JOB_DONE
;
53 j
->progress_percent
= 100;
54 log_info("Download of %s complete.", j
->url
);
56 j
->state
= PULL_JOB_FAILED
;
64 static int pull_job_restart(PullJob
*j
) {
66 char *chksum_url
= NULL
;
68 r
= import_url_change_last_component(j
->url
, "SHA256SUMS", &chksum_url
);
74 j
->state
= PULL_JOB_INIT
;
75 j
->payload
= mfree(j
->payload
);
77 j
->payload_allocated
= 0;
78 j
->written_compressed
= 0;
79 j
->written_uncompressed
= 0;
81 r
= pull_job_begin(j
);
88 void pull_job_curl_on_finished(CurlGlue
*g
, CURL
*curl
, CURLcode result
) {
94 if (curl_easy_getinfo(curl
, CURLINFO_PRIVATE
, (char **)&j
) != CURLE_OK
)
97 if (!j
|| IN_SET(j
->state
, PULL_JOB_DONE
, PULL_JOB_FAILED
))
100 if (result
!= CURLE_OK
) {
101 log_error("Transfer failed: %s", curl_easy_strerror(result
));
106 code
= curl_easy_getinfo(curl
, CURLINFO_RESPONSE_CODE
, &status
);
107 if (code
!= CURLE_OK
) {
108 log_error("Failed to retrieve response code: %s", curl_easy_strerror(code
));
111 } else if (status
== 304) {
112 log_info("Image already downloaded. Skipping download.");
113 j
->etag_exists
= true;
116 } else if (status
>= 300) {
117 if (status
== 404 && j
->style
== VERIFICATION_PER_FILE
) {
119 /* retry pull job with SHA256SUMS file */
120 r
= pull_job_restart(j
);
124 code
= curl_easy_getinfo(j
->curl
, CURLINFO_RESPONSE_CODE
, &status
);
125 if (code
!= CURLE_OK
) {
126 log_error("Failed to retrieve response code: %s", curl_easy_strerror(code
));
132 j
->style
= VERIFICATION_PER_DIRECTORY
;
137 log_error("HTTP request to %s failed with code %li.", j
->url
, status
);
140 } else if (status
< 200) {
141 log_error("HTTP request to %s finished with unexpected code %li.", j
->url
, status
);
146 if (j
->state
!= PULL_JOB_RUNNING
) {
147 log_error("Premature connection termination.");
152 if (j
->content_length
!= (uint64_t) -1 &&
153 j
->content_length
!= j
->written_compressed
) {
154 log_error("Download truncated.");
159 if (j
->checksum_context
) {
162 k
= gcry_md_read(j
->checksum_context
, GCRY_MD_SHA256
);
164 log_error("Failed to get checksum.");
169 j
->checksum
= hexmem(k
, gcry_md_get_algo_dlen(GCRY_MD_SHA256
));
175 log_debug("SHA256 of %s is %s.", j
->url
, j
->checksum
);
178 if (j
->disk_fd
>= 0 && j
->allow_sparse
) {
179 /* Make sure the file size is right, in case the file was
180 * sparse and we just seeked for the last part */
182 if (ftruncate(j
->disk_fd
, j
->written_uncompressed
) < 0) {
183 r
= log_error_errno(errno
, "Failed to truncate file: %m");
188 (void) fsetxattr(j
->disk_fd
, "user.source_etag", j
->etag
, strlen(j
->etag
), 0);
190 (void) fsetxattr(j
->disk_fd
, "user.source_url", j
->url
, strlen(j
->url
), 0);
193 struct timespec ut
[2];
195 timespec_store(&ut
[0], j
->mtime
);
197 (void) futimens(j
->disk_fd
, ut
);
199 (void) fd_setcrtime(j
->disk_fd
, j
->mtime
);
206 pull_job_finish(j
, r
);
209 static int pull_job_write_uncompressed(const void *p
, size_t sz
, void *userdata
) {
210 PullJob
*j
= userdata
;
219 if (j
->written_uncompressed
+ sz
< j
->written_uncompressed
)
220 return log_error_errno(SYNTHETIC_ERRNO(EOVERFLOW
),
221 "File too large, overflow");
223 if (j
->written_uncompressed
+ sz
> j
->uncompressed_max
)
224 return log_error_errno(SYNTHETIC_ERRNO(EFBIG
),
225 "File overly large, refusing");
227 if (j
->disk_fd
>= 0) {
230 n
= sparse_write(j
->disk_fd
, p
, sz
, 64);
232 n
= write(j
->disk_fd
, p
, sz
);
237 return log_error_errno((int) n
, "Failed to write file: %m");
239 return log_error_errno(SYNTHETIC_ERRNO(EIO
), "Short write");
242 if (!GREEDY_REALLOC(j
->payload
, j
->payload_allocated
, j
->payload_size
+ sz
))
245 memcpy(j
->payload
+ j
->payload_size
, p
, sz
);
246 j
->payload_size
+= sz
;
249 j
->written_uncompressed
+= sz
;
254 static int pull_job_write_compressed(PullJob
*j
, void *p
, size_t sz
) {
263 if (j
->written_compressed
+ sz
< j
->written_compressed
)
264 return log_error_errno(SYNTHETIC_ERRNO(EOVERFLOW
), "File too large, overflow");
266 if (j
->written_compressed
+ sz
> j
->compressed_max
)
267 return log_error_errno(SYNTHETIC_ERRNO(EFBIG
), "File overly large, refusing.");
269 if (j
->content_length
!= (uint64_t) -1 &&
270 j
->written_compressed
+ sz
> j
->content_length
)
271 return log_error_errno(SYNTHETIC_ERRNO(EFBIG
),
272 "Content length incorrect.");
274 if (j
->checksum_context
)
275 gcry_md_write(j
->checksum_context
, p
, sz
);
277 r
= import_uncompress(&j
->compress
, p
, sz
, pull_job_write_uncompressed
, j
);
281 j
->written_compressed
+= sz
;
286 static int pull_job_open_disk(PullJob
*j
) {
291 if (j
->on_open_disk
) {
292 r
= j
->on_open_disk(j
);
297 if (j
->disk_fd
>= 0) {
298 /* Check if we can do sparse files */
300 if (lseek(j
->disk_fd
, SEEK_SET
, 0) == 0)
301 j
->allow_sparse
= true;
304 return log_error_errno(errno
, "Failed to seek on file descriptor: %m");
306 j
->allow_sparse
= false;
310 if (j
->calc_checksum
) {
311 initialize_libgcrypt(false);
313 if (gcry_md_open(&j
->checksum_context
, GCRY_MD_SHA256
, 0) != 0)
314 return log_error_errno(SYNTHETIC_ERRNO(EIO
),
315 "Failed to initialize hash context.");
321 static int pull_job_detect_compression(PullJob
*j
) {
322 _cleanup_free_
uint8_t *stub
= NULL
;
329 r
= import_uncompress_detect(&j
->compress
, j
->payload
, j
->payload_size
);
331 return log_error_errno(r
, "Failed to initialize compressor: %m");
335 log_debug("Stream is compressed: %s", import_compress_type_to_string(j
->compress
.type
));
337 r
= pull_job_open_disk(j
);
341 /* Now, take the payload we read so far, and decompress it */
343 stub_size
= j
->payload_size
;
347 j
->payload_allocated
= 0;
349 j
->state
= PULL_JOB_RUNNING
;
351 r
= pull_job_write_compressed(j
, stub
, stub_size
);
358 static size_t pull_job_write_callback(void *contents
, size_t size
, size_t nmemb
, void *userdata
) {
359 PullJob
*j
= userdata
;
360 size_t sz
= size
* nmemb
;
368 case PULL_JOB_ANALYZING
:
369 /* Let's first check what it actually is */
371 if (!GREEDY_REALLOC(j
->payload
, j
->payload_allocated
, j
->payload_size
+ sz
)) {
376 memcpy(j
->payload
+ j
->payload_size
, contents
, sz
);
377 j
->payload_size
+= sz
;
379 r
= pull_job_detect_compression(j
);
385 case PULL_JOB_RUNNING
:
387 r
= pull_job_write_compressed(j
, contents
, sz
);
394 case PULL_JOB_FAILED
:
399 assert_not_reached("Impossible state.");
405 pull_job_finish(j
, r
);
409 static size_t pull_job_header_callback(void *contents
, size_t size
, size_t nmemb
, void *userdata
) {
410 PullJob
*j
= userdata
;
411 size_t sz
= size
* nmemb
;
412 _cleanup_free_
char *length
= NULL
, *last_modified
= NULL
;
419 if (IN_SET(j
->state
, PULL_JOB_DONE
, PULL_JOB_FAILED
)) {
424 assert(j
->state
== PULL_JOB_ANALYZING
);
426 r
= curl_header_strdup(contents
, sz
, "ETag:", &etag
);
435 if (strv_contains(j
->old_etags
, j
->etag
)) {
436 log_info("Image already downloaded. Skipping download.");
437 j
->etag_exists
= true;
438 pull_job_finish(j
, 0);
445 r
= curl_header_strdup(contents
, sz
, "Content-Length:", &length
);
451 (void) safe_atou64(length
, &j
->content_length
);
453 if (j
->content_length
!= (uint64_t) -1) {
454 char bytes
[FORMAT_BYTES_MAX
];
456 if (j
->content_length
> j
->compressed_max
) {
457 log_error("Content too large.");
462 log_info("Downloading %s for %s.", format_bytes(bytes
, sizeof(bytes
), j
->content_length
), j
->url
);
468 r
= curl_header_strdup(contents
, sz
, "Last-Modified:", &last_modified
);
474 (void) curl_parse_http_time(last_modified
, &j
->mtime
);
479 r
= j
->on_header(j
, contents
, sz
);
487 pull_job_finish(j
, r
);
491 static int pull_job_progress_callback(void *userdata
, curl_off_t dltotal
, curl_off_t dlnow
, curl_off_t ultotal
, curl_off_t ulnow
) {
492 PullJob
*j
= userdata
;
501 percent
= ((100 * dlnow
) / dltotal
);
502 n
= now(CLOCK_MONOTONIC
);
504 if (n
> j
->last_status_usec
+ USEC_PER_SEC
&&
505 percent
!= j
->progress_percent
&&
507 char buf
[FORMAT_TIMESPAN_MAX
];
509 if (n
- j
->start_usec
> USEC_PER_SEC
&& dlnow
> 0) {
510 char y
[FORMAT_BYTES_MAX
];
513 done
= n
- j
->start_usec
;
514 left
= (usec_t
) (((double) done
* (double) dltotal
) / dlnow
) - done
;
516 log_info("Got %u%% of %s. %s left at %s/s.",
519 format_timespan(buf
, sizeof(buf
), left
, USEC_PER_SEC
),
520 format_bytes(y
, sizeof(y
), (uint64_t) ((double) dlnow
/ ((double) done
/ (double) USEC_PER_SEC
))));
522 log_info("Got %u%% of %s.", percent
, j
->url
);
524 j
->progress_percent
= percent
;
525 j
->last_status_usec
= n
;
534 int pull_job_new(PullJob
**ret
, const char *url
, CurlGlue
*glue
, void *userdata
) {
535 _cleanup_(pull_job_unrefp
) PullJob
*j
= NULL
;
536 _cleanup_free_
char *u
= NULL
;
551 .state
= PULL_JOB_INIT
,
553 .userdata
= userdata
,
555 .content_length
= (uint64_t) -1,
556 .start_usec
= now(CLOCK_MONOTONIC
),
557 .compressed_max
= 64LLU * 1024LLU * 1024LLU * 1024LLU, /* 64GB safety limit */
558 .uncompressed_max
= 64LLU * 1024LLU * 1024LLU * 1024LLU, /* 64GB safety limit */
559 .style
= VERIFICATION_STYLE_UNSET
,
568 int pull_job_begin(PullJob
*j
) {
573 if (j
->state
!= PULL_JOB_INIT
)
576 r
= curl_glue_make(&j
->curl
, j
->url
, j
);
580 if (!strv_isempty(j
->old_etags
)) {
581 _cleanup_free_
char *cc
= NULL
, *hdr
= NULL
;
583 cc
= strv_join(j
->old_etags
, ", ");
587 hdr
= strappend("If-None-Match: ", cc
);
591 if (!j
->request_header
) {
592 j
->request_header
= curl_slist_new(hdr
, NULL
);
593 if (!j
->request_header
)
596 struct curl_slist
*l
;
598 l
= curl_slist_append(j
->request_header
, hdr
);
602 j
->request_header
= l
;
606 if (j
->request_header
) {
607 if (curl_easy_setopt(j
->curl
, CURLOPT_HTTPHEADER
, j
->request_header
) != CURLE_OK
)
611 if (curl_easy_setopt(j
->curl
, CURLOPT_WRITEFUNCTION
, pull_job_write_callback
) != CURLE_OK
)
614 if (curl_easy_setopt(j
->curl
, CURLOPT_WRITEDATA
, j
) != CURLE_OK
)
617 if (curl_easy_setopt(j
->curl
, CURLOPT_HEADERFUNCTION
, pull_job_header_callback
) != CURLE_OK
)
620 if (curl_easy_setopt(j
->curl
, CURLOPT_HEADERDATA
, j
) != CURLE_OK
)
623 if (curl_easy_setopt(j
->curl
, CURLOPT_XFERINFOFUNCTION
, pull_job_progress_callback
) != CURLE_OK
)
626 if (curl_easy_setopt(j
->curl
, CURLOPT_XFERINFODATA
, j
) != CURLE_OK
)
629 if (curl_easy_setopt(j
->curl
, CURLOPT_NOPROGRESS
, 0) != CURLE_OK
)
632 r
= curl_glue_add(j
->glue
, j
->curl
);
636 j
->state
= PULL_JOB_ANALYZING
;