1 /* SPDX-License-Identifier: LGPL-2.1+ */
5 #include "alloc-util.h"
7 #include "gcrypt-util.h"
9 #include "import-util.h"
11 #include "machine-pool.h"
12 #include "parse-util.h"
13 #include "pull-common.h"
15 #include "string-util.h"
17 #include "xattr-util.h"
19 PullJob
* pull_job_unref(PullJob
*j
) {
23 curl_glue_remove_and_free(j
->glue
, j
->curl
);
24 curl_slist_free_all(j
->request_header
);
26 safe_close(j
->disk_fd
);
28 import_compress_free(&j
->compress
);
30 if (j
->checksum_context
)
31 gcry_md_close(j
->checksum_context
);
35 strv_free(j
->old_etags
);
42 static void pull_job_finish(PullJob
*j
, int ret
) {
45 if (IN_SET(j
->state
, PULL_JOB_DONE
, PULL_JOB_FAILED
))
49 j
->state
= PULL_JOB_DONE
;
50 j
->progress_percent
= 100;
51 log_info("Download of %s complete.", j
->url
);
53 j
->state
= PULL_JOB_FAILED
;
61 static int pull_job_restart(PullJob
*j
) {
63 char *chksum_url
= NULL
;
65 r
= import_url_change_last_component(j
->url
, "SHA256SUMS", &chksum_url
);
71 j
->state
= PULL_JOB_INIT
;
72 j
->payload
= mfree(j
->payload
);
74 j
->payload_allocated
= 0;
75 j
->written_compressed
= 0;
76 j
->written_uncompressed
= 0;
77 j
->written_since_last_grow
= 0;
79 r
= pull_job_begin(j
);
86 void pull_job_curl_on_finished(CurlGlue
*g
, CURL
*curl
, CURLcode result
) {
92 if (curl_easy_getinfo(curl
, CURLINFO_PRIVATE
, (char **)&j
) != CURLE_OK
)
95 if (!j
|| IN_SET(j
->state
, PULL_JOB_DONE
, PULL_JOB_FAILED
))
98 if (result
!= CURLE_OK
) {
99 log_error("Transfer failed: %s", curl_easy_strerror(result
));
104 code
= curl_easy_getinfo(curl
, CURLINFO_RESPONSE_CODE
, &status
);
105 if (code
!= CURLE_OK
) {
106 log_error("Failed to retrieve response code: %s", curl_easy_strerror(code
));
109 } else if (status
== 304) {
110 log_info("Image already downloaded. Skipping download.");
111 j
->etag_exists
= true;
114 } else if (status
>= 300) {
115 if (status
== 404 && j
->style
== VERIFICATION_PER_FILE
) {
117 /* retry pull job with SHA256SUMS file */
118 r
= pull_job_restart(j
);
122 code
= curl_easy_getinfo(j
->curl
, CURLINFO_RESPONSE_CODE
, &status
);
123 if (code
!= CURLE_OK
) {
124 log_error("Failed to retrieve response code: %s", curl_easy_strerror(code
));
130 j
->style
= VERIFICATION_PER_DIRECTORY
;
135 log_error("HTTP request to %s failed with code %li.", j
->url
, status
);
138 } else if (status
< 200) {
139 log_error("HTTP request to %s finished with unexpected code %li.", j
->url
, status
);
144 if (j
->state
!= PULL_JOB_RUNNING
) {
145 log_error("Premature connection termination.");
150 if (j
->content_length
!= (uint64_t) -1 &&
151 j
->content_length
!= j
->written_compressed
) {
152 log_error("Download truncated.");
157 if (j
->checksum_context
) {
160 k
= gcry_md_read(j
->checksum_context
, GCRY_MD_SHA256
);
162 log_error("Failed to get checksum.");
167 j
->checksum
= hexmem(k
, gcry_md_get_algo_dlen(GCRY_MD_SHA256
));
173 log_debug("SHA256 of %s is %s.", j
->url
, j
->checksum
);
176 if (j
->disk_fd
>= 0 && j
->allow_sparse
) {
177 /* Make sure the file size is right, in case the file was
178 * sparse and we just seeked for the last part */
180 if (ftruncate(j
->disk_fd
, j
->written_uncompressed
) < 0) {
181 r
= log_error_errno(errno
, "Failed to truncate file: %m");
186 (void) fsetxattr(j
->disk_fd
, "user.source_etag", j
->etag
, strlen(j
->etag
), 0);
188 (void) fsetxattr(j
->disk_fd
, "user.source_url", j
->url
, strlen(j
->url
), 0);
191 struct timespec ut
[2];
193 timespec_store(&ut
[0], j
->mtime
);
195 (void) futimens(j
->disk_fd
, ut
);
197 (void) fd_setcrtime(j
->disk_fd
, j
->mtime
);
204 pull_job_finish(j
, r
);
207 static int pull_job_write_uncompressed(const void *p
, size_t sz
, void *userdata
) {
208 PullJob
*j
= userdata
;
217 if (j
->written_uncompressed
+ sz
< j
->written_uncompressed
) {
218 log_error("File too large, overflow");
222 if (j
->written_uncompressed
+ sz
> j
->uncompressed_max
) {
223 log_error("File overly large, refusing");
227 if (j
->disk_fd
>= 0) {
229 if (j
->grow_machine_directory
&& j
->written_since_last_grow
>= GROW_INTERVAL_BYTES
) {
230 j
->written_since_last_grow
= 0;
231 grow_machine_directory();
235 n
= sparse_write(j
->disk_fd
, p
, sz
, 64);
237 n
= write(j
->disk_fd
, p
, sz
);
242 return log_error_errno((int) n
, "Failed to write file: %m");
243 if ((size_t) n
< sz
) {
244 log_error("Short write");
249 if (!GREEDY_REALLOC(j
->payload
, j
->payload_allocated
, j
->payload_size
+ sz
))
252 memcpy(j
->payload
+ j
->payload_size
, p
, sz
);
253 j
->payload_size
+= sz
;
256 j
->written_uncompressed
+= sz
;
257 j
->written_since_last_grow
+= sz
;
262 static int pull_job_write_compressed(PullJob
*j
, void *p
, size_t sz
) {
271 if (j
->written_compressed
+ sz
< j
->written_compressed
) {
272 log_error("File too large, overflow");
276 if (j
->written_compressed
+ sz
> j
->compressed_max
) {
277 log_error("File overly large, refusing.");
281 if (j
->content_length
!= (uint64_t) -1 &&
282 j
->written_compressed
+ sz
> j
->content_length
) {
283 log_error("Content length incorrect.");
287 if (j
->checksum_context
)
288 gcry_md_write(j
->checksum_context
, p
, sz
);
290 r
= import_uncompress(&j
->compress
, p
, sz
, pull_job_write_uncompressed
, j
);
294 j
->written_compressed
+= sz
;
299 static int pull_job_open_disk(PullJob
*j
) {
304 if (j
->on_open_disk
) {
305 r
= j
->on_open_disk(j
);
310 if (j
->disk_fd
>= 0) {
311 /* Check if we can do sparse files */
313 if (lseek(j
->disk_fd
, SEEK_SET
, 0) == 0)
314 j
->allow_sparse
= true;
317 return log_error_errno(errno
, "Failed to seek on file descriptor: %m");
319 j
->allow_sparse
= false;
323 if (j
->calc_checksum
) {
324 initialize_libgcrypt(false);
326 if (gcry_md_open(&j
->checksum_context
, GCRY_MD_SHA256
, 0) != 0) {
327 log_error("Failed to initialize hash context.");
335 static int pull_job_detect_compression(PullJob
*j
) {
336 _cleanup_free_
uint8_t *stub
= NULL
;
343 r
= import_uncompress_detect(&j
->compress
, j
->payload
, j
->payload_size
);
345 return log_error_errno(r
, "Failed to initialize compressor: %m");
349 log_debug("Stream is compressed: %s", import_compress_type_to_string(j
->compress
.type
));
351 r
= pull_job_open_disk(j
);
355 /* Now, take the payload we read so far, and decompress it */
357 stub_size
= j
->payload_size
;
361 j
->payload_allocated
= 0;
363 j
->state
= PULL_JOB_RUNNING
;
365 r
= pull_job_write_compressed(j
, stub
, stub_size
);
372 static size_t pull_job_write_callback(void *contents
, size_t size
, size_t nmemb
, void *userdata
) {
373 PullJob
*j
= userdata
;
374 size_t sz
= size
* nmemb
;
382 case PULL_JOB_ANALYZING
:
383 /* Let's first check what it actually is */
385 if (!GREEDY_REALLOC(j
->payload
, j
->payload_allocated
, j
->payload_size
+ sz
)) {
390 memcpy(j
->payload
+ j
->payload_size
, contents
, sz
);
391 j
->payload_size
+= sz
;
393 r
= pull_job_detect_compression(j
);
399 case PULL_JOB_RUNNING
:
401 r
= pull_job_write_compressed(j
, contents
, sz
);
408 case PULL_JOB_FAILED
:
413 assert_not_reached("Impossible state.");
419 pull_job_finish(j
, r
);
423 static size_t pull_job_header_callback(void *contents
, size_t size
, size_t nmemb
, void *userdata
) {
424 PullJob
*j
= userdata
;
425 size_t sz
= size
* nmemb
;
426 _cleanup_free_
char *length
= NULL
, *last_modified
= NULL
;
433 if (IN_SET(j
->state
, PULL_JOB_DONE
, PULL_JOB_FAILED
)) {
438 assert(j
->state
== PULL_JOB_ANALYZING
);
440 r
= curl_header_strdup(contents
, sz
, "ETag:", &etag
);
449 if (strv_contains(j
->old_etags
, j
->etag
)) {
450 log_info("Image already downloaded. Skipping download.");
451 j
->etag_exists
= true;
452 pull_job_finish(j
, 0);
459 r
= curl_header_strdup(contents
, sz
, "Content-Length:", &length
);
465 (void) safe_atou64(length
, &j
->content_length
);
467 if (j
->content_length
!= (uint64_t) -1) {
468 char bytes
[FORMAT_BYTES_MAX
];
470 if (j
->content_length
> j
->compressed_max
) {
471 log_error("Content too large.");
476 log_info("Downloading %s for %s.", format_bytes(bytes
, sizeof(bytes
), j
->content_length
), j
->url
);
482 r
= curl_header_strdup(contents
, sz
, "Last-Modified:", &last_modified
);
488 (void) curl_parse_http_time(last_modified
, &j
->mtime
);
493 r
= j
->on_header(j
, contents
, sz
);
501 pull_job_finish(j
, r
);
505 static int pull_job_progress_callback(void *userdata
, curl_off_t dltotal
, curl_off_t dlnow
, curl_off_t ultotal
, curl_off_t ulnow
) {
506 PullJob
*j
= userdata
;
515 percent
= ((100 * dlnow
) / dltotal
);
516 n
= now(CLOCK_MONOTONIC
);
518 if (n
> j
->last_status_usec
+ USEC_PER_SEC
&&
519 percent
!= j
->progress_percent
&&
521 char buf
[FORMAT_TIMESPAN_MAX
];
523 if (n
- j
->start_usec
> USEC_PER_SEC
&& dlnow
> 0) {
524 char y
[FORMAT_BYTES_MAX
];
527 done
= n
- j
->start_usec
;
528 left
= (usec_t
) (((double) done
* (double) dltotal
) / dlnow
) - done
;
530 log_info("Got %u%% of %s. %s left at %s/s.",
533 format_timespan(buf
, sizeof(buf
), left
, USEC_PER_SEC
),
534 format_bytes(y
, sizeof(y
), (uint64_t) ((double) dlnow
/ ((double) done
/ (double) USEC_PER_SEC
))));
536 log_info("Got %u%% of %s.", percent
, j
->url
);
538 j
->progress_percent
= percent
;
539 j
->last_status_usec
= n
;
548 int pull_job_new(PullJob
**ret
, const char *url
, CurlGlue
*glue
, void *userdata
) {
549 _cleanup_(pull_job_unrefp
) PullJob
*j
= NULL
;
555 j
= new0(PullJob
, 1);
559 j
->state
= PULL_JOB_INIT
;
561 j
->userdata
= userdata
;
563 j
->content_length
= (uint64_t) -1;
564 j
->start_usec
= now(CLOCK_MONOTONIC
);
565 j
->compressed_max
= j
->uncompressed_max
= 64LLU * 1024LLU * 1024LLU * 1024LLU; /* 64GB safety limit */
566 j
->style
= VERIFICATION_STYLE_UNSET
;
568 j
->url
= strdup(url
);
577 int pull_job_begin(PullJob
*j
) {
582 if (j
->state
!= PULL_JOB_INIT
)
585 if (j
->grow_machine_directory
)
586 grow_machine_directory();
588 r
= curl_glue_make(&j
->curl
, j
->url
, j
);
592 if (!strv_isempty(j
->old_etags
)) {
593 _cleanup_free_
char *cc
= NULL
, *hdr
= NULL
;
595 cc
= strv_join(j
->old_etags
, ", ");
599 hdr
= strappend("If-None-Match: ", cc
);
603 if (!j
->request_header
) {
604 j
->request_header
= curl_slist_new(hdr
, NULL
);
605 if (!j
->request_header
)
608 struct curl_slist
*l
;
610 l
= curl_slist_append(j
->request_header
, hdr
);
614 j
->request_header
= l
;
618 if (j
->request_header
) {
619 if (curl_easy_setopt(j
->curl
, CURLOPT_HTTPHEADER
, j
->request_header
) != CURLE_OK
)
623 if (curl_easy_setopt(j
->curl
, CURLOPT_WRITEFUNCTION
, pull_job_write_callback
) != CURLE_OK
)
626 if (curl_easy_setopt(j
->curl
, CURLOPT_WRITEDATA
, j
) != CURLE_OK
)
629 if (curl_easy_setopt(j
->curl
, CURLOPT_HEADERFUNCTION
, pull_job_header_callback
) != CURLE_OK
)
632 if (curl_easy_setopt(j
->curl
, CURLOPT_HEADERDATA
, j
) != CURLE_OK
)
635 if (curl_easy_setopt(j
->curl
, CURLOPT_XFERINFOFUNCTION
, pull_job_progress_callback
) != CURLE_OK
)
638 if (curl_easy_setopt(j
->curl
, CURLOPT_XFERINFODATA
, j
) != CURLE_OK
)
641 if (curl_easy_setopt(j
->curl
, CURLOPT_NOPROGRESS
, 0) != CURLE_OK
)
644 r
= curl_glue_add(j
->glue
, j
->curl
);
648 j
->state
= PULL_JOB_ANALYZING
;