package lib import ( "bufio" "bytes" "errors" "io" "os" "strconv" "strings" "time" "archive/tar" "crypto/ed25519" "encoding/binary" "encoding/hex" "encoding/json" "net/http" "net/url" "os/exec" "path/filepath" "github.com/Masterminds/semver" "github.com/cespare/xxhash/v2" "github.com/dustin/go-humanize" "github.com/klauspost/compress/zstd" ) // RemoteEPK is a struct that contains the metadata of an EPK from a remote repository type RemoteEPK struct { Repository Repository Name string Author string Description string Version semver.Version Architecture string CompressedSize uint64 Dependencies []string Path string Arch string EPKHash uint64 } // Repository is a struct that contains the repository information type Repository struct { Name string URL string Owner string Description string } // SpecialFiles is a struct that contains the special files that are not to be deleted or replaced type SpecialFiles struct { NoDelete []string NoReplace []string } // Metadata is a struct that contains the metadata of the package type Metadata struct { Name string Description string LongDescription string Version semver.Version Author string License string Architecture string Dependencies []string SpecialFiles SpecialFiles Size uint64 DecompressedSize uint64 } // EPKPreMap is a struct that contains the metadata of the EPK type EPKPreMap struct { DisplayData DisplayData MetadataMap map[string]interface{} IsLittleEndian bool IsUpgrade bool TarOffset uint64 } // DisplayData is a struct that contains the display data of the EPK type DisplayData struct { Name string Author string Architecture string Description string Version semver.Version Size uint64 DecompressedSize uint64 Dependencies []string IsDependency bool } // PotentiallyNullEPKPreMap is a EPKPreMap that can be nil type PotentiallyNullEPKPreMap struct { EPKPreMap *EPKPreMap Null bool } // Log is a struct that contains the log information type Log struct { Level string Content string Prompt bool PlaySound bool Progress uint64 Total uint64 Overwrite bool } // StreamOrBytes is a struct that contains either a stream or bytes, allowing optimising for memory or speed type StreamOrBytes struct { FileStream *os.File RepositoryName string URL string Bytes []byte IsURL bool IsRemote bool IsFileStream bool } // Logger is a struct that contains the functions and properties of the logger type Logger struct { LogFunc func(Log) string PromptSupported bool ProgressSupported bool } // Epk is a struct that contains the metadata and the tar archive of the EPK type Epk struct { Metadata Metadata TarArchive []byte } // interfaceToStringSlice converts an interface slice to a string slice func interfaceToStringSlice(interfaceSlice []interface{}, interfaceName string) ([]string, error) { // Yes, it's meant to be empty and not nil: JSON arrays are empty, not nil //goland:noinspection GoPreferNilSlice stringSlice := []string{} for _, interfaceValue := range interfaceSlice { stringValue, ok := interfaceValue.(string) if !ok { return nil, errors.New(interfaceName + " are not strings") } stringSlice = append(stringSlice, stringValue) } return stringSlice, nil } // ByteToFingerprint converts a byte slice to an Eon fingerprint, which is similar to a legacy-style OpenSSH fingerprint func ByteToFingerprint(input []byte) string { xxHashWriter := xxhash.New() _, _ = xxHashWriter.Write(input) inputString := hex.EncodeToString(xxhash.New().Sum(nil)) var result []string var previousChar rune for index, char := range inputString { if index%2 == 0 && index != 0 { result = append(result, string(previousChar)+string(char)) } else { previousChar = char } } return strings.Join(result, ":") } // MkdirAllWithPaths mimics os.MkdirAll but returns the created directories func MkdirAllWithPaths(path string, perm os.FileMode) ([]string, error) { // Make sure to return absolute paths absPath, err := filepath.Abs(path) if err != nil { return nil, err } // Split the path into individual directories var dirs []string currentPath := absPath for currentPath != "/" { dirs = append([]string{currentPath}, dirs...) currentPath = filepath.Dir(currentPath) } // Slice to hold the created directory paths var createdDirs []string // Iterate through each directory and create if not exists for _, dir := range dirs { _, err := os.Stat(dir) if errors.Is(err, os.ErrNotExist) { // Directory doesn't exist, create it err := os.Mkdir(dir, perm) if err != nil { return createdDirs, err } // Append created directory's absolute path createdDirs = append(createdDirs, dir) } } return createdDirs, nil } func preMapEpkFromBytes(metaDataBytes []byte, littleEndian bool, size uint64, offset uint64) (EPKPreMap, error) { // Unmarshal the JSON var displayDataMap map[string]interface{} decoder := json.NewDecoder(bytes.NewReader(metaDataBytes)) decoder.UseNumber() err := decoder.Decode(&displayDataMap) if err != nil { return EPKPreMap{}, errors.New("metadata is not valid JSON") } // Declare the parsedDisplayData object var parsedDisplayData EPKPreMap // Add some of our data so that the full EPK can be mapped with less effort parsedDisplayData.MetadataMap = displayDataMap parsedDisplayData.IsLittleEndian = littleEndian parsedDisplayData.TarOffset = offset parsedDisplayData.DisplayData.Size = size // Map the display data var ok bool // Set the size sizeJSON, ok := displayDataMap["size"].(json.Number) if !ok { return EPKPreMap{}, errors.New("size is not a number") } parsedDisplayData.DisplayData.DecompressedSize, err = strconv.ParseUint(sizeJSON.String(), 10, 64) if err != nil { return EPKPreMap{}, err } // Set the name, author, version, arch, and dependencies parsedDisplayData.DisplayData.Name, ok = displayDataMap["name"].(string) if !ok { return EPKPreMap{}, errors.New("name is not a string") } parsedDisplayData.DisplayData.Author, ok = displayDataMap["author"].(string) if !ok { return EPKPreMap{}, errors.New("author is not a string") } versionString, ok := displayDataMap["version"].(string) if !ok { return EPKPreMap{}, errors.New("version is not a string") } versionPointer, err := semver.NewVersion(versionString) if err != nil { return EPKPreMap{}, err } parsedDisplayData.DisplayData.Version = *versionPointer parsedDisplayData.DisplayData.Architecture, ok = displayDataMap["arch"].(string) if !ok { return EPKPreMap{}, errors.New("arch is not a string") } dependencies, ok := displayDataMap["deps"].([]interface{}) if !ok { return EPKPreMap{}, errors.New("dependencies is not an array") } parsedDisplayData.DisplayData.Dependencies, err = interfaceToStringSlice(dependencies, "dependencies") if err != nil { return EPKPreMap{}, err } return parsedDisplayData, nil } // ConstMapEPKMetadataOffset is the offset of the metadata in the EPK: 3 magic bytes, 1 endian byte, 8 offset bytes, 64 signature bytes, and 32 public key bytes var ConstMapEPKMetadataOffset uint64 = 108 var ErrPreMapEPKCouldNotRead = errors.New("could not read EPK") var ErrPreMapEPKHasNetworkStream = errors.New("network streams are not supported") var ErrPreMapEPKHasNotGotEPK = errors.New("has not got an EPK") var ErrPreMapEPKHasInvalidEndian = errors.New("has invalid endian") var ErrPreMapEPKCouldNotMapJSON = errors.New("could not map metadata") // PreMapEPK maps enough data to create the display summary of an EPK func PreMapEPK(epkBytes StreamOrBytes, epkSize uint64) (EPKPreMap, error, error) { // Say that we don't support network streams if epkBytes.IsURL { return EPKPreMap{}, nil, ErrPreMapEPKHasNetworkStream } // First, we need to check if it even is a EPK by checking the first 3 magic bytes if epkBytes.IsFileStream { var magicBytes = make([]byte, 3) _, err := epkBytes.FileStream.ReadAt(magicBytes, 0) if err != nil { return EPKPreMap{}, err, ErrPreMapEPKCouldNotRead } if string(magicBytes) != "epk" { return EPKPreMap{}, nil, ErrPreMapEPKHasNotGotEPK } } else { if string(epkBytes.Bytes[0:3]) != "epk" { return EPKPreMap{}, nil, ErrPreMapEPKHasNotGotEPK } } // Let's determine the endian-ness of the EPK via the 3rd byte var littleEndian bool if epkBytes.IsFileStream { var littleEndianByte = make([]byte, 1) _, err := epkBytes.FileStream.ReadAt(littleEndianByte, 3) if err != nil { return EPKPreMap{}, err, ErrPreMapEPKCouldNotRead } if littleEndianByte[0] == 0x6C { littleEndian = true } else if littleEndianByte[0] == 0x62 { littleEndian = false } else { return EPKPreMap{}, nil, ErrPreMapEPKHasInvalidEndian } } else { if epkBytes.Bytes[3] == 0x6C { littleEndian = true } else if epkBytes.Bytes[3] == 0x62 { littleEndian = false } else { return EPKPreMap{}, nil, ErrPreMapEPKHasInvalidEndian } } // Now we can get the offsets of the tar archive var tarArchiveOffset uint64 if epkBytes.IsFileStream { var tarArchiveOffsetBytes = make([]byte, 8) _, err := epkBytes.FileStream.ReadAt(tarArchiveOffsetBytes, 4) if err != nil { return EPKPreMap{}, err, ErrPreMapEPKCouldNotRead } if littleEndian { tarArchiveOffset = binary.LittleEndian.Uint64(tarArchiveOffsetBytes) } else { tarArchiveOffset = binary.BigEndian.Uint64(tarArchiveOffsetBytes) } } else { if littleEndian { tarArchiveOffset = binary.LittleEndian.Uint64(epkBytes.Bytes[4:12]) } else { tarArchiveOffset = binary.BigEndian.Uint64(epkBytes.Bytes[4:12]) } } // We don't need to validate the signature yet. We will do that when we map the full EPK, because it means // we have to read the entire thing, which is a waste of resources, since we only need the metadata. var preMapEpk EPKPreMap if epkBytes.IsFileStream { var metadataBuffer = make([]byte, tarArchiveOffset-ConstMapEPKMetadataOffset) _, err := epkBytes.FileStream.ReadAt(metadataBuffer, int64(ConstMapEPKMetadataOffset)) if err != nil { return EPKPreMap{}, err, ErrPreMapEPKCouldNotRead } preMapEpk, err = preMapEpkFromBytes(metadataBuffer, littleEndian, epkSize, tarArchiveOffset) if err != nil { return EPKPreMap{}, err, ErrPreMapEPKCouldNotMapJSON } } else { var err error preMapEpk, err = preMapEpkFromBytes(epkBytes.Bytes[ConstMapEPKMetadataOffset:tarArchiveOffset], littleEndian, epkSize, tarArchiveOffset) if err != nil { return EPKPreMap{}, err, ErrPreMapEPKCouldNotMapJSON } } return preMapEpk, nil, nil } var ErrPreMapRemoteEPKCouldNotCreateURL = errors.New("could not create URL") var ErrPreMapRemoteEPKCouldNotCreateRequest = errors.New("could not create request") var ErrPreMapRemoteEPKCouldNotSendRequest = errors.New("could not send request") var ErrPreMapRemoteEPKCouldNotRead = errors.New("could not read EPK") var ErrPreMapRemoteEPKCouldNotCloseConnection = errors.New("could not close connection") var ErrPreMapRemoteEPKUnexpectedStatusCode = errors.New("unexpected status code") var ErrPreMapEPKHasNotGotEPKMagic = errors.New("not an EPK") var ErrPreMapRemoteEPKInvalidEndian = errors.New("invalid endian") var ErrPreMapRemoteEPKCouldNotMapJSON = errors.New("error mapping metadata") func PreMapRemoteEPK(remoteEPK RemoteEPK, logger *Logger) (EPKPreMap, error, error) { // Fetch the first 12 bytes of the EPK - this contains the magic, endian, and offset // We use the range header to only fetch the first 12 bytes packageUrl, err := url.JoinPath(remoteEPK.Repository.URL, remoteEPK.Path) if err != nil { return EPKPreMap{}, err, ErrPreMapRemoteEPKCouldNotCreateURL } req, err := http.NewRequest("GET", packageUrl, nil) if err != nil { return EPKPreMap{}, err, ErrPreMapRemoteEPKCouldNotCreateRequest } req.Header.Set("Range", "bytes=0-12") resp, err := http.DefaultClient.Do(req) if err != nil { return EPKPreMap{}, err, ErrPreMapRemoteEPKCouldNotSendRequest } // Check if the status code is 206 (partial content) var epkHeaderBytes = make([]byte, 12) var rangeSupported bool if resp.StatusCode == 200 { // We have the entire file. Not great, not terrible. // We'll have to cut off the connection early later. To optimise things slightly, we'll reuse this connection // to read the metadata later. // I'm deadly serious about the radiation. It could cause a bit flip causing the Range header to be malformed. // It's amazing how many times I error handled for this, and I hope I can save someone from cancer one day. logger.LogFunc(Log{ Level: "INFO", Content: "The server does not support range requests. The installation process will be significantly slower." + "Is the repository owner using python3's SimpleHTTPServer or similar? If so, please use a proper web " + "server like Nginx, Ailur HTTP Server, or Apache. If not, please report this to the repository owner or " + "check for sources of radiation around your computer.", }) _, err := resp.Body.Read(epkHeaderBytes) if err != nil { return EPKPreMap{}, err, ErrPreMapRemoteEPKCouldNotRead } rangeSupported = false } else if resp.StatusCode == 206 { // Great, everything is working as expected. _, err := io.ReadFull(resp.Body, epkHeaderBytes) if err != nil { return EPKPreMap{}, err, ErrPreMapRemoteEPKCouldNotRead } rangeSupported = true // Close the connection err = resp.Body.Close() if err != nil { return EPKPreMap{}, err, ErrPreMapRemoteEPKCouldNotCloseConnection } } else if resp.StatusCode == 404 { // Repository not found return EPKPreMap{}, errors.New("repository not found: " + strconv.Itoa(resp.StatusCode)), ErrPreMapRemoteEPKUnexpectedStatusCode } else { // Something went wrong return EPKPreMap{}, errors.New("unexpected status code: " + strconv.Itoa(resp.StatusCode)), ErrPreMapRemoteEPKUnexpectedStatusCode } // Now we verify the magic bytes if string(epkHeaderBytes[0:3]) != "epk" { return EPKPreMap{}, nil, ErrPreMapEPKHasNotGotEPKMagic } // Let's determine the endian-ness of the EPK via the 3rd byte var littleEndian bool if epkHeaderBytes[3] == 0x6C { littleEndian = true } else if epkHeaderBytes[3] == 0x62 { littleEndian = false } else { return EPKPreMap{}, nil, ErrPreMapRemoteEPKInvalidEndian } // Now we can get the offsets of the tar archive var tarArchiveOffset uint64 if littleEndian { tarArchiveOffset = binary.LittleEndian.Uint64(epkHeaderBytes[4:12]) } else { tarArchiveOffset = binary.BigEndian.Uint64(epkHeaderBytes[4:12]) } // No signature verification for you // Let's fetch the display data bytes displayDataBytes := make([]byte, tarArchiveOffset-ConstMapEPKMetadataOffset) if rangeSupported { // Send another request to fetch the display data req.Header.Set("Range", "bytes=108-"+strconv.FormatUint(tarArchiveOffset-1, 10)) resp, err = http.DefaultClient.Do(req) if err != nil { return EPKPreMap{}, err, ErrPreMapRemoteEPKCouldNotSendRequest } // Read the display data _, err = io.ReadFull(resp.Body, displayDataBytes) if err != nil { return EPKPreMap{}, err, ErrPreMapRemoteEPKCouldNotRead } // Close the connection err = resp.Body.Close() if err != nil { return EPKPreMap{}, err, ErrPreMapRemoteEPKCouldNotCloseConnection } } else { // Re-use the connection to read the display data // The offset will move automatically because we are reading from the same connection, therefore // meaning that the web server will have already iterated past the header _, err = io.ReadFull(resp.Body, displayDataBytes) if err != nil { return EPKPreMap{}, err, ErrPreMapRemoteEPKCouldNotRead } // You didn't have to cut me off, make out like it never happened and that we were nothing // All I wanted was a header part, but you just had to go and give me the whole thing // Now you're just some obscure web server that I used to know err = resp.Body.Close() if err != nil { return EPKPreMap{}, err, ErrPreMapRemoteEPKCouldNotCloseConnection } } // Now we can map the display data var preMapEpk EPKPreMap preMapEpk, err = preMapEpkFromBytes(displayDataBytes, littleEndian, remoteEPK.CompressedSize, tarArchiveOffset) if err != nil { return EPKPreMap{}, err, ErrPreMapRemoteEPKCouldNotMapJSON } return preMapEpk, nil, nil } func handlePublicKeyCheck(exists bool, matchingAuthor bool, matchingFingerprint bool, publicKey []byte, author string, addFingerprintToDB func([]byte, string, bool) error, logger *Logger) error { if !exists { if logger.PromptSupported { response := logger.LogFunc(Log{ Level: "WARN", Content: "Public key not found in database.\nthe public key fingerprint is: " + author + " " + ByteToFingerprint(publicKey) + "\nWould you like to trust this key (y/n)?", Prompt: true, }) if strings.ToLower(response) == "y" { err := addFingerprintToDB(publicKey, author, false) if err != nil { return err } else { logger.LogFunc(Log{ Level: "INFO", Content: "Public key added to database.", }) } } else { logger.LogFunc(Log{ Level: "INFO", Content: "Installation cancelled.", }) } } else { logger.LogFunc(Log{ Level: "FATAL", Content: "Public key not found in database.\nthe public key fingerprint is:" + author + " " + ByteToFingerprint(publicKey) + "\nSince non-interactive mode is enabled, the installation will not proceed.", }) } } else if !matchingAuthor { if logger.PromptSupported { response := logger.LogFunc(Log{ Level: "WARN", Content: "Public key does not match the author.\nthe public key fingerprint is: " + author + " " + ByteToFingerprint(publicKey) + "\nWould you like to replace the key (y/n)?", Prompt: true, }) if strings.ToLower(response) == "y" { err := addFingerprintToDB(publicKey, author, true) if err != nil { return err } else { logger.LogFunc(Log{ Level: "INFO", Content: "Public key replaced in database.", }) } } else { logger.LogFunc(Log{ Level: "FATAL", Content: "Installation cancelled.", }) } } else { logger.LogFunc(Log{ Level: "FATAL", Content: "Public key does not match the author.\nThe public key is :" + author + " " + ByteToFingerprint(publicKey) + "\nSince non-interactive mode is enabled, the installation will not proceed.", }) } } else if !matchingFingerprint { if logger.PromptSupported { response := logger.LogFunc(Log{ Level: "WARN", Content: "Public key fingerprint does not match the author.\nThe public key is :" + author + " " + ByteToFingerprint(publicKey) + "\nThis may be a security risk. To replace the key, type \"Yes, do as I say!\". Otherwise, type anything else.", Prompt: true, }) if response == "Yes, do as I say!" { err := addFingerprintToDB(publicKey, author, true) if err != nil { return err } else { logger.LogFunc(Log{ Level: "INFO", Content: "Public key replaced in database.", }) } } else { logger.LogFunc(Log{ Level: "FATAL", Content: "Installation cancelled.", }) } } else { logger.LogFunc(Log{ Level: "FATAL", Content: "Public key fingerprint does not match the author.\nthe public key fingerprint is: " + author + " " + ByteToFingerprint(publicKey) + "\nSince non-interactive mode is enabled, the installation will not proceed.", }) } } return nil } var ErrFullyMapMetadataCouldNotRead = errors.New("could not read EPK") var ErrFullyMapMetadataCouldNotJump = errors.New("could not jump to offset") var ErrFullyMapMetadataCouldNotAddFingerprint = errors.New("could not add fingerprint") var ErrFullyMapMetadataCouldNotGetFingerprint = errors.New("could not get fingerprint") var ErrFullyMapMetadataHasInvalidSignature = errors.New("invalid signature") var ErrFullyMapMetadataCouldNotMapJSON = errors.New("error mapping metadata") // FullyMapMetadata maps an EPK file, but is significantly slower than PreMapEPK. Use PreMapEPK if you only need the display data. // it pulls data from PreMapEPK to reduce the amount of work needed to map the EPK. func FullyMapMetadata(epkBytes StreamOrBytes, preMap *EPKPreMap, checkFingerprintInDB func([]byte, string) (bool, bool, bool, error), addFingerprintToDB func([]byte, string, bool) error, warnUserAboutNoRange func(*Logger), logger *Logger) (*Metadata, error, error) { // We define the signature and public key bytes here so that we can read them later signature := make([]byte, 64) publicKey := make([]byte, 32) var connection io.ReadCloser if epkBytes.IsFileStream { // Before we continue, check if the signature is valid // To get the signature, we read from the 12th byte to the 76th byte _, err := epkBytes.FileStream.ReadAt(signature, 12) if err != nil { return &Metadata{}, err, ErrFullyMapMetadataCouldNotRead } // To get the public key, we read from the 76th byte to the 108th byte _, err = epkBytes.FileStream.ReadAt(publicKey, 76) if err != nil { return &Metadata{}, err, ErrFullyMapMetadataCouldNotRead } } else if epkBytes.IsURL { // Before we continue, check if the signature is valid // Fetch range 12 - EOF and read them in req, err := http.NewRequest("GET", epkBytes.URL, nil) if err != nil { return &Metadata{}, err, ErrFullyMapMetadataCouldNotRead } req.Header.Set("Range", "bytes=12-") resp, err := http.DefaultClient.Do(req) if err != nil { return &Metadata{}, err, ErrFullyMapMetadataCouldNotRead } // Set the connection connection = resp.Body // Check the status code if resp.StatusCode == 200 { // Not great, not terrible. // We'll have to cut off the connection early later. // Warn the user warnUserAboutNoRange(logger) // Discard the first 12 bytes _, err := io.CopyN(io.Discard, connection, 12) if err != nil { return &Metadata{}, err, ErrFullyMapMetadataCouldNotRead } } else if resp.StatusCode != 206 { return &Metadata{}, errors.New("unexpected status code: " + strconv.Itoa(resp.StatusCode)), ErrFullyMapMetadataCouldNotRead } // Read the signature _, err = io.ReadFull(connection, signature) if err != nil { return &Metadata{}, err, ErrFullyMapMetadataCouldNotRead } // Read the public key _, err = io.ReadFull(connection, publicKey) if err != nil { return &Metadata{}, err, ErrFullyMapMetadataCouldNotRead } } else { // Make signature and public key the optimised bytes signature = epkBytes.Bytes[12:76] publicKey = epkBytes.Bytes[76:108] } // Let's check for the public key in the database exists, matchingAuthor, matchingFingerprint, err := checkFingerprintInDB(publicKey, preMap.DisplayData.Author) if err != nil { return &Metadata{}, err, ErrFullyMapMetadataCouldNotGetFingerprint } else { err := handlePublicKeyCheck(exists, matchingAuthor, matchingFingerprint, publicKey, preMap.DisplayData.Author, addFingerprintToDB, logger) if err != nil { return &Metadata{}, err, ErrFullyMapMetadataCouldNotAddFingerprint } } // We need to create a new xxHash instance xxHash := xxhash.New() if epkBytes.IsFileStream { // Now we can verify the signature. First, we need to take the checksum of the metadata // Seeking is better than using ReadAt because it allows us to not have to load the entire file into memory _, err = epkBytes.FileStream.Seek(int64(ConstMapEPKMetadataOffset), io.SeekStart) if err != nil { return &Metadata{}, err, ErrFullyMapMetadataCouldNotJump } // Streaming bytes to the hash is more memory efficient _, err = epkBytes.FileStream.WriteTo(xxHash) if err != nil { return &Metadata{}, err, ErrFullyMapMetadataCouldNotRead } // Verify the signature (we verify the hash because it's cheaper than verifying the entire EPK) if !ed25519.Verify(publicKey, xxHash.Sum(nil), signature) { return &Metadata{}, nil, ErrFullyMapMetadataHasInvalidSignature } } else if epkBytes.IsURL { // Now we can verify the signature. We can just stream the rest of the EPK to the hash _, err = io.Copy(xxHash, connection) if err != nil { return &Metadata{}, err, ErrFullyMapMetadataCouldNotRead } // You didn't have to cut me off... // Don't worry, we are reading to EOF anyway, no matter if we do have a non-range supported server, so we // (probably) won't upset the server owner. err = connection.Close() if err != nil { return &Metadata{}, err, ErrFullyMapMetadataCouldNotRead } // Verify the signature (we verify the hash because it's cheaper than verifying the entire EPK) if !ed25519.Verify(publicKey, xxHash.Sum(nil), signature) { return &Metadata{}, nil, ErrFullyMapMetadataHasInvalidSignature } } else { // We now verify the signature in one go without streaming _, err := xxHash.Write(epkBytes.Bytes[ConstMapEPKMetadataOffset:]) if err != nil { return &Metadata{}, err, ErrFullyMapMetadataCouldNotRead } if !ed25519.Verify(publicKey, xxHash.Sum(nil), signature) { return &Metadata{}, nil, ErrFullyMapMetadataHasInvalidSignature } } // Great, the EPK is valid. Let's map the metadata. // We use the metadata map provided by PreMapEPK to reduce the amount of work needed to map the EPK // First, map SpecialFiles var parsedSpecialFiles SpecialFiles specialFilesMap, ok := preMap.MetadataMap["specialFiles"].(map[string]interface{}) if !ok { return &Metadata{}, errors.New("specialFiles is not an object"), ErrFullyMapMetadataCouldNotMapJSON } noDelete, ok := specialFilesMap["noDelete"].([]interface{}) if !ok { return &Metadata{}, errors.New("noDelete is not an array"), ErrFullyMapMetadataCouldNotMapJSON } parsedSpecialFiles.NoDelete, err = interfaceToStringSlice(noDelete, "noDelete") if err != nil { return &Metadata{}, err, ErrFullyMapMetadataCouldNotMapJSON } noReplace, ok := specialFilesMap["noReplace"].([]interface{}) if !ok { return &Metadata{}, errors.New("noReplace is not an array"), ErrFullyMapMetadataCouldNotMapJSON } parsedSpecialFiles.NoReplace, err = interfaceToStringSlice(noReplace, "noReplace") if err != nil { return &Metadata{}, err, ErrFullyMapMetadataCouldNotMapJSON } // Declare the parsedMetadata object var parsedMetadata Metadata // Append parsedSpecialFiles to parsedMetadata parsedMetadata.SpecialFiles = parsedSpecialFiles // Steal some data from the PreMapEPK object parsedMetadata.Name = preMap.DisplayData.Name parsedMetadata.Version = preMap.DisplayData.Version parsedMetadata.Architecture = preMap.DisplayData.Architecture parsedMetadata.Size = preMap.DisplayData.Size parsedMetadata.Dependencies = preMap.DisplayData.Dependencies // Map the metadata parsedMetadata.Description, ok = preMap.MetadataMap["desc"].(string) if !ok { return &Metadata{}, errors.New("description is not a string"), ErrFullyMapMetadataCouldNotMapJSON } parsedMetadata.LongDescription, ok = preMap.MetadataMap["longDesc"].(string) if !ok { return &Metadata{}, errors.New("longDesc is not a string"), ErrFullyMapMetadataCouldNotMapJSON } parsedMetadata.Author, ok = preMap.MetadataMap["author"].(string) if !ok { return &Metadata{}, errors.New("author is not a string"), ErrFullyMapMetadataCouldNotMapJSON } parsedMetadata.License, ok = preMap.MetadataMap["license"].(string) if !ok { return &Metadata{}, errors.New("license is not a string"), ErrFullyMapMetadataCouldNotMapJSON } decompressedSizeJSON, ok := preMap.MetadataMap["size"].(json.Number) if !ok { return &Metadata{}, errors.New("size is not a number"), ErrFullyMapMetadataCouldNotMapJSON } parsedMetadata.DecompressedSize, err = strconv.ParseUint(decompressedSizeJSON.String(), 10, 64) if err != nil { return &Metadata{}, err, ErrFullyMapMetadataCouldNotMapJSON } return &parsedMetadata, nil, nil } var ErrInstallEPKCouldNotCreateTempDir = errors.New("could not create temporary directory") var ErrInstallEPKCouldNotCreateZStandardReader = errors.New("could not create ZStandard reader") var ErrInstallEPKCouldNotDecompressTarArchive = errors.New("could not decompress tar archive") var ErrInstallEPKCouldNotCreateDir = errors.New("could not create directory") var ErrInstallEPKCouldNotStatDir = errors.New("could not stat directory") var ErrInstallEPKCouldNotStatFile = errors.New("could not stat file") var ErrInstallEPKCouldNotCreateFile = errors.New("could not create file") var ErrInstallEPKCouldNotCloseTarReader = errors.New("could not close tar reader") var ErrInstallEPKCouldNotStatHook = errors.New("could not stat hook") var ErrInstallEPKCouldNotRunHook = errors.New("could not run hook") var ErrInstallEPKCouldNotAddEPKToDB = errors.New("could not add EPK to database") var ErrInstallEPKCouldNotRemoveTempDir = errors.New("could not remove temporary directory") // ProgressWriter implements a writer that intercepts writes in order to log progress type ProgressWriter struct { Logger *Logger Total uint64 Writer io.Writer } // Write writes to the ProgressWriter func (writer *ProgressWriter) Write(p []byte) (n int, err error) { var byteCount uint64 for range p { byteCount++ } if writer.Logger.ProgressSupported { writer.Logger.LogFunc(Log{ Level: "PROGRESS", Progress: byteCount, Total: writer.Total, Overwrite: true, }) } else { writer.Logger.LogFunc(Log{ Level: "INFO", Content: "Written " + humanize.Bytes(byteCount) + " out of " + humanize.Bytes(writer.Total), Prompt: false, }) } written, err := writer.Writer.Write(p) if err != nil { return written, err } return written, nil } // InstallEPK installs an EPK file func InstallEPK(epkBytes StreamOrBytes, metadata *Metadata, preMap *EPKPreMap, addEPKToDB func(*Metadata, []string, []byte, bool, bool, uint64, uint64, string) error, logger *Logger) (string, error, error) { // Create the temporary directory tempDir, err := os.MkdirTemp("/tmp", "eon-install-") if err != nil { return tempDir, err, ErrInstallEPKCouldNotCreateTempDir } var zStandardReader *zstd.Decoder var connection io.ReadCloser if epkBytes.IsFileStream { // Seek to the correct position in the EPK _, err = epkBytes.FileStream.Seek(int64(preMap.TarOffset), io.SeekStart) if err != nil { return "", err, nil } // Create a ZStandard reader reading from the EPK zStandardReader, err = zstd.NewReader(epkBytes.FileStream) if err != nil { return tempDir, err, ErrInstallEPKCouldNotCreateZStandardReader } } else if epkBytes.IsURL { // Range header to the tar offset req, err := http.NewRequest("GET", epkBytes.URL, nil) if err != nil { return tempDir, err, ErrInstallEPKCouldNotCreateZStandardReader } // Set the range header req.Header.Set("Range", "bytes="+strconv.FormatUint(preMap.TarOffset, 10)+"-") // Send the request resp, err := http.DefaultClient.Do(req) if err != nil { return tempDir, err, ErrInstallEPKCouldNotCreateZStandardReader } // Set connection to the response body connection = resp.Body // Check the status code if resp.StatusCode == 200 { // Not great, is terrible in this case, we have to keep reading bytes and discarding them until we reach the offset // The user will have already been warned about 300 times, so we don't need to warn them again // God this is painful. Let's give the user a progress bar to make it less painful _, err := io.CopyN(&ProgressWriter{ Logger: logger, Total: preMap.TarOffset, Writer: io.Discard, }, connection, int64(preMap.TarOffset)) if err != nil { return tempDir, err, ErrInstallEPKCouldNotDecompressTarArchive } } else if resp.StatusCode != 206 { // Something went wrong return tempDir, errors.New("unexpected status code: " + strconv.Itoa(resp.StatusCode)), ErrInstallEPKCouldNotCreateZStandardReader } // Create a ZStandard reader reading from the EPK zStandardReader, err = zstd.NewReader(connection) if err != nil { return tempDir, err, ErrInstallEPKCouldNotCreateZStandardReader } } else { // Create a ZStandard reader reading from the EPKs in-memory bytes zStandardReader, err = zstd.NewReader(bytes.NewReader(epkBytes.Bytes[preMap.TarOffset:])) if err != nil { return tempDir, err, ErrInstallEPKCouldNotCreateZStandardReader } } // Create a tar reader reading from the ZStandard reader tarReader := tar.NewReader(zStandardReader) // Create a goroutine to see how much of the decompressed size we have decompressed var written uint64 stop := make(chan bool) go func() { for { select { case <-stop: return default: if logger.ProgressSupported { logger.LogFunc(Log{ Level: "PROGRESS", Progress: written, Total: metadata.DecompressedSize, Overwrite: true, }) } else { logger.LogFunc(Log{ Level: "INFO", Content: "Decompressed " + humanize.Bytes(written) + " of " + humanize.Bytes(metadata.DecompressedSize), Prompt: false, }) time.Sleep(1 * time.Second) } } } }() // Create a slice of the installed files var installedFiles []string // Iterate through the tar archive for { // Read the next header header, err := tarReader.Next() if err != nil { break } switch { // If we are done, break case err == io.EOF: break // If there was an error, return the error case err != nil: return tempDir, err, ErrInstallEPKCouldNotDecompressTarArchive // This should never happen, but if it does, we should just continue case header == nil: continue } // Get the target path var target string var isHook bool if strings.HasPrefix(header.Name, "root") { target = strings.TrimPrefix(header.Name, "root") } else if strings.HasPrefix(header.Name, "hooks") { target = filepath.Join(tempDir, header.Name) isHook = true } else { return tempDir, errors.New("invalid path in EPK: " + header.Name), ErrInstallEPKCouldNotDecompressTarArchive } switch header.Typeflag { case tar.TypeDir: // Check if the directory exists _, err := os.Stat(target) if err != nil { // If the directory does not exist, create it if errors.Is(err, os.ErrNotExist) { // All directories are 0755 paths, err := MkdirAllWithPaths(target, 0755) if err != nil { return tempDir, err, ErrInstallEPKCouldNotCreateDir } else { // Check if the files are in noDelete for _, file := range metadata.SpecialFiles.NoDelete { if strings.TrimSuffix(target, "/") == strings.TrimSuffix(file, "/") { // This file is a special file and should not be deleted continue } } if !isHook { // Add the directory to the installed files installedFiles = append(installedFiles, target) // Add the paths to the installed files if paths != nil { installedFiles = append(installedFiles, paths...) } } } } else { return tempDir, err, ErrInstallEPKCouldNotStatDir } } else { // If it does exist, don't touch it continue } case tar.TypeReg: // Check if the file has anywhere to go _, err := os.Stat(filepath.Dir(target)) if err != nil { // No, it doesn't. Create the directory if errors.Is(err, os.ErrNotExist) { // We assume 0755 for directories paths, err := MkdirAllWithPaths(filepath.Dir(target), 0755) if err != nil { return tempDir, err, ErrInstallEPKCouldNotCreateDir } else { // Check if the files are in noDelete for _, file := range metadata.SpecialFiles.NoDelete { if strings.TrimSuffix(target, "/") == strings.TrimSuffix(file, "/") { // This file is a special file and should not be deleted continue } } if !isHook { // Add the directory to the installed files installedFiles = append(installedFiles, filepath.Dir(target)) // Add the paths to the installed files if paths != nil { installedFiles = append(installedFiles, paths...) } } } } else { return tempDir, err, ErrInstallEPKCouldNotStatDir } } // Check if the file already exists _, err = os.Stat(target) if err != nil { if errors.Is(err, os.ErrNotExist) { // Great, the file does not exist. Let's create it. file, err := os.OpenFile(target, os.O_CREATE|os.O_RDWR|os.O_TRUNC, os.FileMode(header.Mode)) if err != nil { return tempDir, err, ErrInstallEPKCouldNotCreateFile } writtenFile, err := io.Copy(file, tarReader) if err != nil { return tempDir, err, ErrInstallEPKCouldNotDecompressTarArchive } written += uint64(writtenFile) err = file.Close() if err != nil { return tempDir, err, ErrInstallEPKCouldNotCloseTarReader } else { if !isHook { // Add the file to the installed files installedFiles = append(installedFiles, target) } } } else { return tempDir, err, ErrInstallEPKCouldNotStatFile } } else { // See if it's an upgrade or not if preMap.IsUpgrade { // Check if it's a special file for _, file := range metadata.SpecialFiles.NoReplace { if strings.TrimSuffix(target, "/") == strings.TrimSuffix(file, "/") { // This file is a special file and should not be replaced continue } } } // It's not special, so we can replace it file, err := os.OpenFile(target, os.O_CREATE|os.O_RDWR|os.O_TRUNC, os.FileMode(header.Mode)) if err != nil { return tempDir, err, ErrInstallEPKCouldNotCreateFile } writtenFile, err := io.Copy(file, tarReader) if err != nil { return tempDir, err, ErrInstallEPKCouldNotDecompressTarArchive } written += uint64(writtenFile) err = file.Close() if err != nil { return tempDir, err, ErrInstallEPKCouldNotCloseTarReader } else { if !isHook { // Add the file to the installed files installedFiles = append(installedFiles, target) } } } case tar.TypeSymlink: // Check if the symlink has anywhere to go _, err := os.Stat(filepath.Dir(target)) if err != nil { // No, it doesn't. Create the directory if errors.Is(err, os.ErrNotExist) { // We assume 0755 for directories paths, err := MkdirAllWithPaths(filepath.Dir(target), 0755) if err != nil { return tempDir, err, ErrInstallEPKCouldNotCreateDir } else { // Check if the files are in noDelete for _, file := range metadata.SpecialFiles.NoDelete { if strings.TrimSuffix(target, "/") == strings.TrimSuffix(file, "/") { // This file is a special file and should not be deleted continue } } if !isHook { // Add the directory to the installed files installedFiles = append(installedFiles, filepath.Dir(target)) // Add the paths to the installed files if paths != nil { installedFiles = append(installedFiles, paths...) } } } } else { return tempDir, err, ErrInstallEPKCouldNotStatDir } } // Check if the symlink already exists _, err = os.Lstat(target) if err != nil { if errors.Is(err, os.ErrNotExist) { // Great, the symlink does not exist. Let's create it. err = os.Symlink(header.Linkname, target) if err != nil { return tempDir, err, ErrInstallEPKCouldNotCreateFile } else { if !isHook { // Add the symlink to the installed files installedFiles = append(installedFiles, target) } } } else { return tempDir, err, ErrInstallEPKCouldNotStatFile } } else { // See if it's an upgrade or not if preMap.IsUpgrade { // Check if it's a special file for _, file := range metadata.SpecialFiles.NoReplace { if strings.TrimSuffix(target, "/") == strings.TrimSuffix(file, "/") { // This file is a special file and should not be replaced continue } } } // It's not special, so we can replace it err = os.Remove(target) if err != nil { return tempDir, err, ErrInstallEPKCouldNotCreateFile } err = os.Symlink(header.Linkname, target) if err != nil { return tempDir, err, ErrInstallEPKCouldNotCreateFile } else { if !isHook { // Add the symlink to the installed files installedFiles = append(installedFiles, target) } } } } } zStandardReader.Close() // Close the connection if it's a URL if epkBytes.IsURL { err = connection.Close() if err != nil { return tempDir, err, ErrInstallEPKCouldNotCloseTarReader } } // Now let's run the hooks if preMap.IsUpgrade { _, err := os.Stat(filepath.Join(tempDir, "hooks", "upgrade.sh")) if err != nil { if !errors.Is(err, os.ErrNotExist) { return tempDir, err, ErrInstallEPKCouldNotStatHook } } else { cmd := exec.Command("/bin/sh", filepath.Join(tempDir, "hooks", "upgrade.sh"), metadata.Version.String()) stderr, err := cmd.StderrPipe() if err != nil { return tempDir, err, ErrInstallEPKCouldNotRunHook } err = cmd.Start() if err != nil { return tempDir, err, ErrInstallEPKCouldNotRunHook } scanner := bufio.NewScanner(stderr) scanner.Split(bufio.ScanWords) for scanner.Scan() { message := scanner.Text() logger.LogFunc(Log{ Level: "INFO", Content: message, }) } err = cmd.Wait() if err != nil { return tempDir, err, ErrInstallEPKCouldNotRunHook } } } else { _, err := os.Stat(filepath.Join(tempDir, "hooks", "install.sh")) if err != nil { if !errors.Is(err, os.ErrNotExist) { return tempDir, err, ErrInstallEPKCouldNotStatHook } } else { cmd := exec.Command("/bin/sh", filepath.Join(tempDir, "hooks", "install.sh"), metadata.Version.String()) stderr, err := cmd.StderrPipe() if err != nil { return tempDir, err, ErrInstallEPKCouldNotRunHook } err = cmd.Start() if err != nil { return tempDir, err, ErrInstallEPKCouldNotRunHook } scanner := bufio.NewScanner(stderr) scanner.Split(bufio.ScanWords) for scanner.Scan() { message := scanner.Text() logger.LogFunc(Log{ Level: "INFO", Content: message, }) } err = cmd.Wait() if err != nil { return tempDir, err, ErrInstallEPKCouldNotRunHook } } } // Do one more double-check to make sure nothing in installedFiles is in noDelete for _, file := range metadata.SpecialFiles.NoDelete { for index, installedFile := range installedFiles { if strings.TrimSuffix(installedFile, "/") == strings.TrimSuffix(file, "/") { // Remove the file from the installed files installedFiles = append(installedFiles[:index], installedFiles[index+1:]...) } } } // Finally, add the EPK and remove script to the database file, err := os.ReadFile(filepath.Join(tempDir, "hooks", "remove.sh")) if err != nil { if !errors.Is(err, os.ErrNotExist) { return tempDir, err, ErrInstallEPKCouldNotAddEPKToDB } else { var err error if !epkBytes.IsRemote { err = addEPKToDB(metadata, installedFiles, []byte{}, preMap.DisplayData.IsDependency, false, metadata.Size, metadata.DecompressedSize, "Local file") } else { err = addEPKToDB(metadata, installedFiles, []byte{}, preMap.DisplayData.IsDependency, false, metadata.Size, metadata.DecompressedSize, epkBytes.RepositoryName) } if err != nil { return tempDir, err, ErrInstallEPKCouldNotAddEPKToDB } } } else { var err error if !epkBytes.IsRemote { err = addEPKToDB(metadata, installedFiles, file, preMap.DisplayData.IsDependency, true, metadata.Size, metadata.DecompressedSize, "Local file") } else { err = addEPKToDB(metadata, installedFiles, file, preMap.DisplayData.IsDependency, true, metadata.Size, metadata.DecompressedSize, epkBytes.RepositoryName) } if err != nil { return tempDir, err, ErrInstallEPKCouldNotAddEPKToDB } } // Remove the temporary directory err = os.RemoveAll(tempDir) if err != nil { return tempDir, err, ErrInstallEPKCouldNotRemoveTempDir } stop <- true logger.LogFunc(Log{ Level: "PROGRESS", Progress: 1, Total: 1, Overwrite: true, }) return "", nil, nil } var ErrAddRepositoryCouldNotCreateRequest = errors.New("could not create request") var ErrAddRepositoryCouldNotSendRequest = errors.New("could not send request") var ErrAddRepositoryHasUnexpectedStatusCode = errors.New("unexpected status code") var ErrAddRepositoryCouldNotReadResponse = errors.New("could not read response") var ErrAddRepositoryHasInvalidMagic = errors.New("invalid magic") var ErrAddRepositoryCouldNotHash = errors.New("could not write to hash") var ErrAddRepositoryCouldNotUnmarshalMetadata = errors.New("could not unmarshal metadata") var ErrAddRepositoryCouldNotGetFingerprint = errors.New("could not get fingerprint") var ErrAddRepositoryCouldNotAddFingerprint = errors.New("could not add fingerprint") var ErrAddRepositoryHasInvalidMetadata = errors.New("invalid metadata") var ErrAddRepositoryCouldNotAddPackage = errors.New("could not add package to database") var ErrAddRepositoryHasRepositoryExists = errors.New("repository already exists") var ErrAddRepositoryCouldNotAddRepository = errors.New("could not add repository to database") // AddRepository adds a repository to the database func AddRepository(url string, addRepositoryToDB func(Repository, bool) error, getFingerprintFromDB func([]byte, string) (bool, bool, bool, error), addFingerprintToDB func([]byte, string, bool) error, addRemotePackageToDB func(RemoteEPK) error, checkRepositoryInDB func(string) (bool, error), forceReplace bool, logger *Logger) (string, error, error) { // First, fetch range 0-3 of /repository.erf // Then, check if the first 3 bytes are "eon" // Create the request magicRequest, err := http.NewRequest("GET", url+"/repository.erf", nil) if err != nil { return "", err, ErrAddRepositoryCouldNotCreateRequest } // Add the range header magicRequest.Header.Add("Range", "bytes=0-3") // Send the request magicResponse, err := http.DefaultClient.Do(magicRequest) if err != nil { return "", err, ErrAddRepositoryCouldNotSendRequest } // Check if the status code is 206 var hasEntireFile bool if magicResponse.StatusCode != 206 { if magicResponse.StatusCode == 200 { // This web server does not support range requests, meaning we now have the entire file. // Mark it as such. hasEntireFile = true } else { return "", errors.New("status code " + strconv.Itoa(magicResponse.StatusCode)), ErrAddRepositoryHasUnexpectedStatusCode } } // Check the magic bytes var magicBytes = make([]byte, 3) _, err = magicResponse.Body.Read(magicBytes) if err != nil { return "", err, ErrAddRepositoryCouldNotReadResponse } // Check if the magic bytes are "eon" if string(magicBytes) != "eon" { return "", nil, ErrAddRepositoryHasInvalidMagic } // Great. We either confirmed the repository is an Eon repository or we have the entire file. var fullFetch *http.Response if !hasEntireFile { // Download the rest of the file var err error fullFetch, err = http.Get(url + "/repository.erf") if err != nil { return "", err, ErrAddRepositoryCouldNotSendRequest } } else { fullFetch = magicResponse } // Now we get the contents of the file contents, err := io.ReadAll(fullFetch.Body) if err != nil { return "", err, ErrAddRepositoryCouldNotReadResponse } // Verify the file's signature // Unmarshal the repository metadata, which is NOT the same as the EPK metadata var repositoryMetadata map[string]interface{} // We use a decoder instead of unmarshal here because we need to use JSON numbers: float64 is not enough var jsonDecoder = json.NewDecoder(bytes.NewReader(contents[99:])) jsonDecoder.UseNumber() err = jsonDecoder.Decode(&repositoryMetadata) if err != nil { return "", err, ErrAddRepositoryCouldNotUnmarshalMetadata } // Get the public key and signature signature := contents[3:67] publicKey := contents[67:99] // Look for the public key in the database exists, matchingAuthor, matchingFingerprint, err := getFingerprintFromDB(publicKey, repositoryMetadata["author"].(string)) if err != nil { return "", err, ErrAddRepositoryCouldNotGetFingerprint } else { err := handlePublicKeyCheck(exists, matchingAuthor, matchingFingerprint, publicKey, repositoryMetadata["author"].(string), addFingerprintToDB, logger) if err != nil { return "", err, ErrAddRepositoryCouldNotAddFingerprint } } // We need to create a new xxHash instance xxHash := xxhash.New() _, err = xxHash.Write(contents[99:]) if err != nil { return "", err, ErrAddRepositoryCouldNotHash } // Verify the signature if !ed25519.Verify(publicKey, xxHash.Sum(nil), signature) { return "", errors.New("invalid signature"), ErrAddRepositoryHasInvalidMetadata } // Now we can create the repository object var repository Repository var ok bool repository.URL = url repository.Name, ok = repositoryMetadata["name"].(string) if !ok { return "", errors.New("name is not a string"), ErrAddRepositoryHasInvalidMetadata } // In force replace mode, we don't check if the repository already exists and just replace it if !forceReplace { // Side quest: check if the repository already exists repoExists, err := checkRepositoryInDB(repository.Name) if err != nil { return "", err, ErrAddRepositoryCouldNotAddRepository } else if repoExists { return "", nil, ErrAddRepositoryHasRepositoryExists } } repository.Description, ok = repositoryMetadata["desc"].(string) if !ok { return "", errors.New("desc is not a string"), ErrAddRepositoryHasInvalidMetadata } repository.Owner, ok = repositoryMetadata["author"].(string) if !ok { return "", errors.New("author is not a string"), ErrAddRepositoryHasInvalidMetadata } // Write the contents of the repository to the database packageList, ok := repositoryMetadata["packages"].([]interface{}) if !ok { return "", errors.New("packages is not an array"), ErrAddRepositoryHasInvalidMetadata } var remoteEPKs []RemoteEPK for _, epk := range packageList { epk, ok := epk.(map[string]interface{}) if !ok { return "", errors.New("package is not an object"), ErrAddRepositoryHasInvalidMetadata } name, ok := epk["name"].(string) if !ok { return "", errors.New("package name is not a string"), ErrAddRepositoryHasInvalidMetadata } author, ok := epk["author"].(string) if !ok { return "", errors.New("package author is not a string"), ErrAddRepositoryHasInvalidMetadata } arch, ok := epk["arch"].(string) if !ok { return "", errors.New("package arch is not a string"), ErrAddRepositoryHasInvalidMetadata } versionString, ok := epk["version"].(string) if !ok { return "", errors.New("package version is not a string"), ErrAddRepositoryHasInvalidMetadata } versionPointer, err := semver.NewVersion(versionString) if err != nil { return "", errors.New("package version is not a valid semver version"), ErrAddRepositoryHasInvalidMetadata } sizeString, ok := epk["size"].(json.Number) if !ok { return "", errors.New("package size is not a number"), ErrAddRepositoryHasInvalidMetadata } size, err := strconv.ParseUint(sizeString.String(), 10, 64) if err != nil { return "", errors.New("package size is not a number"), ErrAddRepositoryHasInvalidMetadata } dependenciesInterface, ok := epk["deps"].([]interface{}) if !ok { return "", errors.New("package dependencies is not an array"), ErrAddRepositoryHasInvalidMetadata } dependencies, err := interfaceToStringSlice(dependenciesInterface, "dependencies") if err != nil { return "", err, ErrAddRepositoryHasInvalidMetadata } hashJsonNumber, ok := epk["hash"].(json.Number) if !ok { return "", errors.New("package hash is not a number"), ErrAddRepositoryHasInvalidMetadata } var hash uint64 hash, err = strconv.ParseUint(hashJsonNumber.String(), 10, 64) if err != nil { return "", errors.New("package hash is not a valid number"), ErrAddRepositoryHasInvalidMetadata } path, ok := epk["path"].(string) if !ok { return "", errors.New("package path is not a string"), ErrAddRepositoryHasInvalidMetadata } description, ok := epk["desc"].(string) if !ok { return "", errors.New("package description is not a string"), ErrAddRepositoryHasInvalidMetadata } remoteEPKs = append(remoteEPKs, RemoteEPK{ Name: name, Author: author, Description: description, Version: *versionPointer, Architecture: arch, CompressedSize: size, Dependencies: dependencies, Path: path, Arch: arch, EPKHash: hash, Repository: repository, }) if err != nil { return "", err, ErrAddRepositoryCouldNotAddPackage } } // We add packages afterward so that if there is an error, we don't have to remove the packages for _, epk := range remoteEPKs { err := addRemotePackageToDB(epk) if err != nil { return "", err, ErrAddRepositoryCouldNotAddPackage } } // Add the repository to the database err = addRepositoryToDB(repository, forceReplace) if err != nil { return "", err, ErrAddRepositoryCouldNotAddRepository } return repository.Name, nil, nil } var ErrRemoveRepositoryDoesNotExist = errors.New("repository does not exist") var ErrRemoveRepositoryCouldNotFindRepository = errors.New("could not check for repository") var ErrRemoveRepositoryCouldNotRemoveRepository = errors.New("could not remove repository") var ErrRemoveRepositoryCouldNotRemoveRepositoryFromDB = errors.New("could not remove repository from database") func RemoveRepository(repository string, removeRepositoryFromDB func(string) error, checkRepositoryInDB func(string) (bool, error), logger *Logger) (error, error) { // First check if the repository exists exists, err := checkRepositoryInDB(repository) if err != nil { return err, ErrRemoveRepositoryCouldNotFindRepository } if !exists { return nil, ErrRemoveRepositoryDoesNotExist } // Purge the download cache err = os.RemoveAll(filepath.Join("/var/cache/eon/repositories/", repository)) if err != nil { return err, ErrRemoveRepositoryCouldNotRemoveRepository } // Remove the repository from the database err = removeRepositoryFromDB(repository) if err != nil { return err, ErrRemoveRepositoryCouldNotRemoveRepositoryFromDB } // Alright, we're done here. logger.LogFunc(Log{ Level: "INFO", Content: "Removed repository " + repository + " from the database.", }) return nil, nil } var ErrRemoveEPKCouldNotFindEPK = errors.New("could not get EPK from database") var ErrRemoveEPKCouldNotCreateTempFile = errors.New("could not create temporary file") var ErrRemoveEPKCouldNotWriteTempFile = errors.New("could not write to temporary file") var ErrRemoveEPKCouldNotRunRemoveHook = errors.New("could not run remove hook") var ErrRemoveEPKCouldNotRemoveEPKFromDB = errors.New("could not remove EPK from database") var ErrRemoveEPKCouldNotRemoveFiles = errors.New("could not remove files") func RemoveEPK(name string, removeEPKFromDB func(string) error, getEPKRemoveInfoFromDB func(name string) (string, []string, error), logger *Logger) (error, error) { // Try to fetch the EPK from the database removeScript, installedPaths, err := getEPKRemoveInfoFromDB(name) if err != nil { return err, ErrRemoveEPKCouldNotFindEPK } // Save the remove script to a temporary file removeScriptFile, err := os.CreateTemp("", "eon-remove-*.sh") if err != nil { return err, ErrRemoveEPKCouldNotCreateTempFile } // Write the remove script to the file _, err = removeScriptFile.Write([]byte(removeScript)) if err != nil { return err, ErrRemoveEPKCouldNotWriteTempFile } // Run the remove script cmd := exec.Command("/bin/sh", removeScriptFile.Name()) stderr, err := cmd.StderrPipe() if err != nil { return err, ErrRemoveEPKCouldNotRunRemoveHook } // Start the command err = cmd.Start() if err != nil { return err, ErrRemoveEPKCouldNotRunRemoveHook } // Read the output scanner := bufio.NewScanner(stderr) scanner.Split(bufio.ScanWords) for scanner.Scan() { message := scanner.Text() logger.LogFunc(Log{ Level: "INFO", Content: message, }) } // Close the file err = removeScriptFile.Close() if err != nil { return err, ErrRemoveEPKCouldNotRunRemoveHook } // Remove the EPK from the database err = removeEPKFromDB(name) if err != nil { return err, ErrRemoveEPKCouldNotRemoveEPKFromDB } // Remove the installed files for _, path := range installedPaths { // Check if there is anything in the paths not in installedPaths // If there is, we should not remove the directory err := filepath.Walk(path, func(path string, info os.FileInfo, err error) error { if err != nil { return err } // Check if the path is in installedPaths for _, installedPath := range installedPaths { if path == installedPath { return nil } } // If it's not, return an error return errors.New("path is not in installedPaths") }) if err != nil { if errors.Is(err, errors.New("path is not in installedPaths")) { // The path is not in installedPaths, so we should not remove it continue } else if !errors.Is(err, os.ErrNotExist) { // Something else went wrong return err, ErrRemoveEPKCouldNotRemoveFiles } } else { // The path is in installedPaths, so we should remove it err := os.RemoveAll(path) if err != nil { if !errors.Is(err, os.ErrNotExist) { return err, ErrRemoveEPKCouldNotRemoveFiles } else { // The file does not exist - we must have deleted its parent directory or the user has done our job for us continue } } } } return nil, nil }