1 /* SPDX-License-Identifier: LGPL-2.1+ */
3 This file is part of systemd.
5 Copyright 2014 Lennart Poettering
7 systemd is free software; you can redistribute it and/or modify it
8 under the terms of the GNU Lesser General Public License as published by
9 the Free Software Foundation; either version 2.1 of the License, or
10 (at your option) any later version.
12 systemd is distributed in the hope that it will be useful, but
13 WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 Lesser General Public License for more details.
17 You should have received a copy of the GNU Lesser General Public License
18 along with systemd; If not, see <http://www.gnu.org/licenses/>.
25 #include "alloc-util.h"
26 #include "hostname-util.h"
27 #include "import-util.h"
28 #include "machine-image.h"
29 #include "parse-util.h"
32 #include "signal-util.h"
33 #include "string-util.h"
37 static bool arg_force
= false;
38 static const char *arg_image_root
= "/var/lib/machines";
39 static ImportVerify arg_verify
= IMPORT_VERIFY_SIGNATURE
;
40 static bool arg_settings
= true;
41 static bool arg_roothash
= true;
43 static int interrupt_signal_handler(sd_event_source
*s
, const struct signalfd_siginfo
*si
, void *userdata
) {
44 log_notice("Transfer aborted.");
45 sd_event_exit(sd_event_source_get_event(s
), EINTR
);
49 static void on_tar_finished(TarPull
*pull
, int error
, void *userdata
) {
50 sd_event
*event
= userdata
;
54 log_info("Operation completed successfully.");
56 sd_event_exit(event
, abs(error
));
59 static int pull_tar(int argc
, char *argv
[], void *userdata
) {
60 _cleanup_(tar_pull_unrefp
) TarPull
*pull
= NULL
;
61 _cleanup_(sd_event_unrefp
) sd_event
*event
= NULL
;
62 const char *url
, *local
;
63 _cleanup_free_
char *l
= NULL
, *ll
= NULL
;
67 if (!http_url_is_valid(url
)) {
68 log_error("URL '%s' is not valid.", url
);
75 r
= import_url_last_component(url
, &l
);
77 return log_error_errno(r
, "Failed get final component of URL: %m");
82 if (isempty(local
) || streq(local
, "-"))
86 r
= tar_strip_suffixes(local
, &ll
);
92 if (!machine_name_is_valid(local
)) {
93 log_error("Local image name '%s' is not valid.", local
);
98 r
= image_find(local
, NULL
);
100 return log_error_errno(r
, "Failed to check whether image '%s' exists: %m", local
);
102 log_error("Image '%s' already exists.", local
);
107 log_info("Pulling '%s', saving as '%s'.", url
, local
);
109 log_info("Pulling '%s'.", url
);
111 r
= sd_event_default(&event
);
113 return log_error_errno(r
, "Failed to allocate event loop: %m");
115 assert_se(sigprocmask_many(SIG_BLOCK
, NULL
, SIGTERM
, SIGINT
, -1) >= 0);
116 (void) sd_event_add_signal(event
, NULL
, SIGTERM
, interrupt_signal_handler
, NULL
);
117 (void) sd_event_add_signal(event
, NULL
, SIGINT
, interrupt_signal_handler
, NULL
);
119 r
= tar_pull_new(&pull
, event
, arg_image_root
, on_tar_finished
, event
);
121 return log_error_errno(r
, "Failed to allocate puller: %m");
123 r
= tar_pull_start(pull
, url
, local
, arg_force
, arg_verify
, arg_settings
);
125 return log_error_errno(r
, "Failed to pull image: %m");
127 r
= sd_event_loop(event
);
129 return log_error_errno(r
, "Failed to run event loop: %m");
131 log_info("Exiting.");
135 static void on_raw_finished(RawPull
*pull
, int error
, void *userdata
) {
136 sd_event
*event
= userdata
;
140 log_info("Operation completed successfully.");
142 sd_event_exit(event
, abs(error
));
145 static int pull_raw(int argc
, char *argv
[], void *userdata
) {
146 _cleanup_(raw_pull_unrefp
) RawPull
*pull
= NULL
;
147 _cleanup_(sd_event_unrefp
) sd_event
*event
= NULL
;
148 const char *url
, *local
;
149 _cleanup_free_
char *l
= NULL
, *ll
= NULL
;
153 if (!http_url_is_valid(url
)) {
154 log_error("URL '%s' is not valid.", url
);
161 r
= import_url_last_component(url
, &l
);
163 return log_error_errno(r
, "Failed get final component of URL: %m");
168 if (isempty(local
) || streq(local
, "-"))
172 r
= raw_strip_suffixes(local
, &ll
);
178 if (!machine_name_is_valid(local
)) {
179 log_error("Local image name '%s' is not valid.", local
);
184 r
= image_find(local
, NULL
);
186 return log_error_errno(r
, "Failed to check whether image '%s' exists: %m", local
);
188 log_error("Image '%s' already exists.", local
);
193 log_info("Pulling '%s', saving as '%s'.", url
, local
);
195 log_info("Pulling '%s'.", url
);
197 r
= sd_event_default(&event
);
199 return log_error_errno(r
, "Failed to allocate event loop: %m");
201 assert_se(sigprocmask_many(SIG_BLOCK
, NULL
, SIGTERM
, SIGINT
, -1) >= 0);
202 (void) sd_event_add_signal(event
, NULL
, SIGTERM
, interrupt_signal_handler
, NULL
);
203 (void) sd_event_add_signal(event
, NULL
, SIGINT
, interrupt_signal_handler
, NULL
);
205 r
= raw_pull_new(&pull
, event
, arg_image_root
, on_raw_finished
, event
);
207 return log_error_errno(r
, "Failed to allocate puller: %m");
209 r
= raw_pull_start(pull
, url
, local
, arg_force
, arg_verify
, arg_settings
, arg_roothash
);
211 return log_error_errno(r
, "Failed to pull image: %m");
213 r
= sd_event_loop(event
);
215 return log_error_errno(r
, "Failed to run event loop: %m");
217 log_info("Exiting.");
221 static int help(int argc
, char *argv
[], void *userdata
) {
223 printf("%s [OPTIONS...] {COMMAND} ...\n\n"
224 "Download container or virtual machine images.\n\n"
225 " -h --help Show this help\n"
226 " --version Show package version\n"
227 " --force Force creation of image\n"
228 " --verify=MODE Verify downloaded image, one of: 'no',\n"
229 " 'checksum', 'signature'\n"
230 " --settings=BOOL Download settings file with image\n"
231 " --roothash=BOOL Download root hash file with image\n"
232 " --image-root=PATH Image root directory\n\n"
234 " tar URL [NAME] Download a TAR image\n"
235 " raw URL [NAME] Download a RAW image\n",
236 program_invocation_short_name
);
241 static int parse_argv(int argc
, char *argv
[]) {
252 static const struct option options
[] = {
253 { "help", no_argument
, NULL
, 'h' },
254 { "version", no_argument
, NULL
, ARG_VERSION
},
255 { "force", no_argument
, NULL
, ARG_FORCE
},
256 { "image-root", required_argument
, NULL
, ARG_IMAGE_ROOT
},
257 { "verify", required_argument
, NULL
, ARG_VERIFY
},
258 { "settings", required_argument
, NULL
, ARG_SETTINGS
},
259 { "roothash", required_argument
, NULL
, ARG_ROOTHASH
},
268 while ((c
= getopt_long(argc
, argv
, "h", options
, NULL
)) >= 0)
273 return help(0, NULL
, NULL
);
283 arg_image_root
= optarg
;
287 arg_verify
= import_verify_from_string(optarg
);
288 if (arg_verify
< 0) {
289 log_error("Invalid verification setting '%s'", optarg
);
296 r
= parse_boolean(optarg
);
298 return log_error_errno(r
, "Failed to parse --settings= parameter '%s'", optarg
);
304 r
= parse_boolean(optarg
);
306 return log_error_errno(r
, "Failed to parse --roothash= parameter '%s'", optarg
);
315 assert_not_reached("Unhandled option");
321 static int pull_main(int argc
, char *argv
[]) {
323 static const Verb verbs
[] = {
324 { "help", VERB_ANY
, VERB_ANY
, 0, help
},
325 { "tar", 2, 3, 0, pull_tar
},
326 { "raw", 2, 3, 0, pull_raw
},
330 return dispatch_verb(argc
, argv
, verbs
, NULL
);
333 int main(int argc
, char *argv
[]) {
336 setlocale(LC_ALL
, "");
337 log_parse_environment();
340 r
= parse_argv(argc
, argv
);
344 (void) ignore_signals(SIGPIPE
, -1);
346 r
= pull_main(argc
, argv
);
349 return r
< 0 ? EXIT_FAILURE
: EXIT_SUCCESS
;