kiss/kiss

1867 lines
59 KiB
Plaintext
Raw Normal View History

2020-05-09 18:25:38 +00:00
#!/bin/sh
# shellcheck source=/dev/null
#
# Simple package manager written in POSIX shell for https://kisslinux.xyz
2019-08-19 17:07:50 +00:00
#
# The MIT License (MIT)
#
# Copyright (c) 2019-2021 Dylan Araps
#
# Permission is hereby granted, free of charge, to any person obtaining a copy
# of this software and associated documentation files (the "Software"), to deal
# in the Software without restriction, including without limitation the rights
# to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
# copies of the Software, and to permit persons to whom the Software is
# furnished to do so, subject to the following conditions:
#
# The above copyright notice and this permission notice shall be included in all
# copies or substantial portions of the Software.
#
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
# FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
# SOFTWARE.
2019-06-13 14:48:08 +00:00
2019-09-21 17:22:56 +00:00
log() {
printf '%b%s %b%s%b %s\n' \
2021-07-05 08:42:52 +00:00
"$c1" "${3:-->}" "${c3}${2:+$c2}" "$1" "$c3" "$2" >&2
2019-09-21 17:22:56 +00:00
}
war() {
log "$1" "$2" "${3:-WARNING}"
}
2019-06-13 14:48:08 +00:00
die() {
2020-05-07 11:46:50 +00:00
log "$1" "$2" "${3:-ERROR}"
2019-06-13 14:48:08 +00:00
exit 1
}
contains() {
# Check if a "string list" contains a word.
case " $1 " in *" $2 "*) return 0; esac; return 1
}
2020-02-18 19:28:35 +00:00
prompt() {
[ "$1" ] && log "$1"
2020-09-11 14:38:02 +00:00
2021-07-02 12:05:36 +00:00
log "Continue?: Press Enter to continue or Ctrl+C to abort"
2020-02-18 19:28:35 +00:00
# korn-shell does not exit on interrupt of read.
[ "$KISS_PROMPT" = 0 ] || read -r _ || exit 1
2019-09-22 11:35:07 +00:00
}
mkcd() {
mkdir -p "$@" && cd "$1"
}
2020-01-30 07:27:25 +00:00
as_root() {
2021-07-03 10:23:04 +00:00
case $uid/${user:=root}/${cmd_su##*/} in
0/root/*)
"$@"
;;
*/doas|*/sudo|*/ssu)
2021-07-03 10:23:04 +00:00
log "Using '$cmd_su' (to become $user)"
"$cmd_su" -u "$user" -- "$@"
2020-09-09 12:03:57 +00:00
;;
*/su)
log "Using 'su' (to become $user)"
printf 'Note: su will ask for password every time.\n%s\n' \
' Use doas, sudo or ssu for more control.'
2021-07-03 10:23:04 +00:00
"$cmd_su" -c "$* <&3" "$user" 3<&0 </dev/tty
2020-09-09 12:03:57 +00:00
;;
*)
2021-07-03 10:23:04 +00:00
die "Invalid KISS_SU value: '$cmd_su' (valid: doas, sudo, ssu, su)"
2020-09-09 12:03:57 +00:00
;;
2020-01-30 12:42:29 +00:00
esac
unset user
2020-01-27 08:06:56 +00:00
}
file_owner() {
2021-07-04 13:02:45 +00:00
# Intentional, globbing disabled.
# shellcheck disable=2046
set -- $(ls -ld "$1")
user=${3:-root}
id -u "$user" >/dev/null 2>&1 || user=root
}
2020-11-06 06:45:56 +00:00
pkg_owner() {
set +f
2021-06-28 09:55:13 +00:00
[ "$3" ] || set -- "$1" "$2" "$sys_db"/*/manifest
2020-11-06 06:45:56 +00:00
pkg_owner=$(grep "$@")
pkg_owner=${pkg_owner%/*}
pkg_owner=${pkg_owner##*/}
set -f
[ "$pkg_owner" ]
}
run_hook() {
# Run all hooks in KISS_HOOK (a colon separated
# list of absolute file paths).
IFS=:
for hook in ${KISS_HOOK:-}; do case $hook in *?*)
"$hook" "$@" || die "$1 hook failed: '$hook'"
esac done
unset IFS
}
run_hook_pkg() {
# Run a hook from the package's database files.
if [ -x "$sys_db/$2/$1" ]; then
log "$2" "Running $1 hook"
"$sys_db/$2/$1"
elif [ -f "$sys_db/$2/$1" ]; then
war "$2" "skipping $1 hook: not executable"
fi
}
decompress() {
case $1 in
2021-07-12 00:57:48 +00:00
*.tbz|*.bz2) bzip2 -d ;;
*.lzma) lzma -dc ;;
*.lz) lzip -dc ;;
*.tar) cat ;;
*.tgz|*.gz) gzip -d ;;
*.xz|*.txz) xz -dcT0 ;;
*.zst) zstd -dc ;;
esac < "$1"
}
sh256() {
# There's no standard utility to generate sha256 checksums.
# This is a simple wrapper around sha256sum, sha256, shasum,
# openssl, digest, ... which will use whatever is available.
#
# All utilities must match 'sha256sum' output.
#
# Example: '<checksum> <file>'
2021-07-06 10:16:34 +00:00
hash=
if [ ! -d "$1" ] && [ -e "$1" ]; then
hash=$(
openssl dgst -sha256 -r "$1" ||
2021-07-06 10:16:34 +00:00
sha256sum "$1" ||
sha256 -r "$1" ||
shasum -a 256 "$1" ||
digest -a sha256 "$1"
) 2>/dev/null || die "Failed to generate checksums for '$1'"
hash=${hash%% *}
printf '%s\n' "$hash"
fi
}
2019-06-29 20:38:35 +00:00
pkg_lint() {
2021-07-03 14:48:39 +00:00
pkg_find_version "$1"
2021-07-03 14:48:39 +00:00
[ "$repo_rel" ] ||
die "$1" "Release field not found in version file"
2021-07-06 17:26:47 +00:00
[ -x "$repo_dir/build" ] ||
die "$1" "Build file not found or not executable"
2021-07-06 17:26:47 +00:00
[ -f "$repo_dir/sources" ] ||
war "$1" "Sources file not found"
2019-06-18 08:05:15 +00:00
}
2021-07-03 14:48:39 +00:00
pkg_find_version() {
pkg_find_die "$1"
2021-07-03 14:48:39 +00:00
2021-07-06 18:05:03 +00:00
read -r repo_ver repo_rel 2>/dev/null < "$repo_dir/version" ||
2021-07-03 14:48:39 +00:00
die "$1" "Failed to read version file ($repo_dir/version)"
case $2 in *?*)
# Split the version on '.+-' to obtain individual components.
# Intentional, globbing disabled.
# shellcheck disable=2086
IFS=.+- read -r repo_major repo_minor repo_patch repo_ident <<EOF
$repo_ver
EOF
esac
2021-07-03 14:48:39 +00:00
}
pkg_find_die() {
pkg_find "$@" || die "Package '$1' not in any repository"
}
pkg_find() {
2020-05-21 07:38:07 +00:00
# Figure out which repository a package belongs to by searching for
# directories matching the package name in $KISS_PATH/*.
2021-07-05 09:22:52 +00:00
set -- "$1" "$2" "$3" "${4:-"$KISS_PATH"}"
IFS=:
2021-07-05 09:22:52 +00:00
# Iterate over KISS_PATH, grabbing all directories which match the query.
2021-07-04 13:02:45 +00:00
# Intentional.
# shellcheck disable=2086
for _find_path in $4 "${3:-$sys_db}"; do set +f
for _find_pkg in "$_find_path/"$1; do
test "${3:--d}" "$_find_pkg" && set -f -- "$@" "$_find_pkg"
2020-03-23 09:41:32 +00:00
done
done
2019-06-13 16:40:50 +00:00
2020-04-20 09:14:25 +00:00
unset IFS
2020-03-23 10:05:54 +00:00
# Show all search results if called from 'kiss search', else store the
2021-07-14 07:04:18 +00:00
# values in variables.
case $2-$# in
*-4)
2021-07-14 08:32:57 +00:00
# A package may also not be found due to a repository not being
2021-07-14 07:04:18 +00:00
# readable by the current user. Either way, we need to die here.
return 1
;;
-*)
2021-07-14 08:32:57 +00:00
repo_dir=$5
2021-07-14 07:04:18 +00:00
;;
*)
shift 4
printf '%s\n' "$@";
;;
esac
2019-06-13 16:40:50 +00:00
}
2020-09-12 14:35:10 +00:00
pkg_list() {
# List installed packages. As the format is files and directories, this
# just involves a simple for loop and file read.
2019-06-29 20:38:35 +00:00
# Optional arguments can be passed to check for specific packages. If no
# arguments are passed, list all.
2021-07-03 23:07:36 +00:00
[ "$1" ] || { set +f; set -f -- "$sys_db"/*; }
# Loop over each package and print its name and version.
for _list_pkg do
2021-07-03 23:07:36 +00:00
_list_pkg=$sys_db/${_list_pkg##*/}
[ -d "$_list_pkg" ] || {
2021-07-03 23:07:36 +00:00
log "${_list_pkg##*/}" "not installed"
return 1
}
2020-09-11 16:02:58 +00:00
read -r version 2>/dev/null < "$_list_pkg/version" || version=null
2021-07-03 23:07:36 +00:00
printf '%s\n' "${_list_pkg##*/} $version"
done
2020-09-12 14:35:10 +00:00
}
2019-06-13 14:48:08 +00:00
pkg_cache() {
# Find the tarball of a package using a glob. Use the user's set compression
# method if found or first match of the below glob.
2021-07-03 14:48:39 +00:00
pkg_find_version "$1"
2020-11-06 06:34:36 +00:00
set +f
set -f -- \
2021-07-08 08:15:31 +00:00
"$bin_dir/$1@$repo_ver-$repo_rel.tar.$KISS_COMPRESS" \
"$bin_dir/$1@$repo_ver-$repo_rel.tar."*
tar_file=$1
# Found tarball matching KISS_COMPRESS.
! [ -f "$1" ] || return 0
tar_file=$2
# Use result of glob.
[ -f "$2" ]
}
source_resolve_vars() {
2021-07-14 17:06:41 +00:00
# Replace all occurrences of markers with their respective values
# if found in the source string.
_src_sub() { _src_res=${_src_res%"$1"*}${2}${_src_res##*"$1"}; }
_src_res=$1
# Loop until no identifiers are found and all have been removed.
# This works backwards replacing each identifier with its value.
while :; do case $_src_res in
*VERSION*) _src_sub VERSION "$repo_ver" ;;
*MAJOR*) _src_sub MAJOR "$repo_major" ;;
*MINOR*) _src_sub MINOR "$repo_minor" ;;
*PATCH*) _src_sub PATCH "$repo_patch" ;;
*IDENT*) _src_sub IDENT "$repo_ident" ;;
*PKG*) _src_sub PKG "${repo_dir##*/}" ;;
*) break
esac done
}
pkg_source_resolve() {
# Given a line of input from the sources file, return an absolute
# path to the source if it already exists, error if not.
source_resolve_vars "${2%"${2##*[!/]}"}"
set -- "$1" "$_src_res" "${3%"${3##*[!/]}"}" "$4"
if [ -z "${2##\#*}" ]; then
_res=
2021-07-11 08:14:01 +00:00
return
# Git repository.
elif [ -z "${2##git+*}" ]; then
_res=$2
# Remote source (cached).
elif [ -f "$src_dir/$1/${3:+"$3/"}${2##*/}" ]; then
_res=$src_dir/$1/${3:+"$3/"}${2##*/}
# Remote source.
elif [ -z "${2##*://*}" ]; then
_res=url+$2
_des=$src_dir/$1/${3:+"$3/"}${2##*/}
# Local relative dir.
elif [ -d "$repo_dir/$2" ]; then
_res=$repo_dir/$2/.
# Local absolute dir.
elif [ -d "/${2##/}" ]; then
_res=/${2##/}/.
# Local relative file.
elif [ -f "$repo_dir/$2" ]; then
_res=$repo_dir/$2
# Local absolute file.
elif [ -f "/${2##/}" ]; then
_res=/${2##/}
else
2021-07-05 08:23:10 +00:00
die "$1" "No local file '$src'"
fi
[ "$4" ] || printf 'found %s\n' "$_res"
}
pkg_source() {
2020-05-21 07:38:07 +00:00
# Download any remote package sources. The existence of local files is
# also checked.
pkg_find_version "$1" 1
# Support packages without sources. Simply do nothing.
[ -f "$repo_dir/sources" ] || return 0
log "$1" "Checking sources"
mkcd "$src_dir/$1"
2020-02-14 16:06:47 +00:00
while read -r src dest || [ "$src" ]; do
2021-07-05 08:23:10 +00:00
pkg_source_resolve "$1" "$src" "$dest" "$2"
2019-09-23 06:30:34 +00:00
case $_res in url+*)
log "$1" "Downloading $src"
mkdir -p "$PWD/$dest"
2020-02-11 15:33:38 +00:00
2021-07-05 11:07:54 +00:00
curl -fLo "$_des" "$src" || {
rm -f "$_des"
die "$1" "Failed to download $src"
2019-09-23 06:30:34 +00:00
}
esac
done < "$repo_dir/sources"
2019-06-13 14:48:08 +00:00
}
2021-07-05 08:37:00 +00:00
pkg_extract_tar_hack() {
# This is a portable shell implementation of GNU tar's
# '--strip-components 1'. Use of this function denotes a
# performance penalty.
decompress "$2" > "$tmp_dir/ktar" ||
die "$1" "Failed to decompress $2"
tar xf "$tmp_dir/ktar" ||
die "$1" "Failed to extract $2"
# Iterate over all directories in the first level of the
# tarball's manifest.
tar tf "$tmp_dir/ktar" | while IFS=/ read -r dir _; do
# Skip the directory if seen before.
! contains "$_seen" "$dir" || continue && _seen="$_seen $dir"
2021-07-05 08:37:00 +00:00
# Some tarballs contain './' as the top-level directory,
# we need to skip these occurances.
[ -d "${dir#.}" ] || continue
# Move the directory to prevent naming conflicts between
# the child and parent.
mv -f "$dir" "$pid-$dir"
# First attempt to move all files up a directory level,
# if any files/directories fail (due to mv's lack of
# directory merge capability), simply do the exercise
# again and copy-merge the remaining files/directories.
#
# We can't use '-exec {} +' with any arguments between
# the '{}' and '+' as this is not POSIX. We must also
# use '$0' and '$@' to reference all arguments.
#
# Using only '$@' causes a single file from each
# invocation to be left out of the list. Weird, right?
find "$pid-$dir/." ! -name . -prune \
-exec sh -c 'mv -f "$0" "$@" .' {} + 2>/dev/null ||
find "$pid-$dir/." ! -name . -prune \
-exec sh -c 'cp -fRp "$0" "$@" .' {} +
# Remove the directory now that all files have been
# transferred out of it. This can't be a simple 'rmdir'
# as we may leave files in here if any were copied.
rm -rf "$pid-$dir"
done
}
2019-06-13 14:48:08 +00:00
pkg_extract() {
2020-05-21 07:38:07 +00:00
# Extract all source archives to the build directory and copy over any
2021-07-05 10:52:54 +00:00
# local repository files.
#
# NOTE: repo_dir comes from caller.
# Support packages without sources. Simply do nothing.
[ -f "$repo_dir/sources" ] || return 0
log "$1" "Extracting sources"
2019-06-29 20:38:35 +00:00
2019-11-16 19:53:41 +00:00
while read -r src dest || [ "$src" ]; do
2021-07-05 08:23:10 +00:00
pkg_source_resolve "$1" "$src" "$dest" >/dev/null
# Create the source's directories if not null.
case $_res in *?*)
mkcd "$mak_dir/$1/$dest"
esac
case $_res in
git+*)
# Split the source into URL + OBJECT (branch or commit).
url=${src##git+} com=${url##*[@#]} com=${com#${url%[#@]*}}
# This magic will shallow clone branches, commits or the
# regular repository. It correctly handles cases where a
# shallow clone is not possible.
log "$1" "Cloning ${url%[#@]*}"
git init
git remote add origin "${url%[#@]*}"
git fetch -t --filter=tree:0 origin "$com" || git fetch -t
git -c advice.detachedHead=0 checkout "${com:-FETCH_HEAD}"
;;
2020-01-16 21:45:12 +00:00
*.tar|*.tar.??|*.tar.???|*.tar.????|*.t?z)
2021-07-05 08:37:00 +00:00
pkg_extract_tar_hack "$1" "$_res"
;;
2019-09-23 06:30:34 +00:00
*.zip)
unzip "$_res"
2020-04-14 14:52:39 +00:00
;;
'')
# Blank lines / Comments.
;;
*)
cp -Rf "$_res" .
;;
esac
done < "$repo_dir/sources" || die "$1" "Failed to extract $_res"
2019-06-13 14:48:08 +00:00
}
2019-06-29 20:38:35 +00:00
pkg_depends() {
2020-07-07 21:51:40 +00:00
# Resolve all dependencies and generate an ordered list. The deepest
# dependencies are listed first and then the parents in reverse order.
contains "$deps" "$1" || {
2021-07-06 16:53:49 +00:00
# Filter out non-explicit, already installed packages.
[ -z "$3" ] || [ "$2" ] || contains "$explicit" "$1" ||
! pkg_list "$1" >/dev/null 2>&1 || return
# Detect circular dependencies and bail out.
# Looks for multiple repeating patterns of (dep dep_parent) (5 is max).
case " $4 " in
*" ${4##* } "*" $1 "\
*" ${4##* } "*" $1 "\
*" ${4##* } "*" $1 "\
*" ${4##* } "*" $1 "\
*" ${4##* } "*" $1 "\
*)
die "Circular dependency detected $1 <> ${4##* }"
esac
! "${6:-pkg_find}" "$1" || ! [ -e "$repo_dir/depends" ] ||
2021-06-30 13:49:27 +00:00
# Recurse through the dependencies of the child packages.
while read -r dep dep_type || [ "$dep" ]; do
[ "${dep##\#*}" ] || continue
pkg_depends "$dep" '' "$3" "$4 $1" "$dep_type" "$6"
done < "$repo_dir/depends" || :
# Add parent to dependencies list.
if [ "$2" != expl ] || { [ "$5" = make ] && ! pkg_cache "$1"; }; then
deps="$deps $1"
fi
}
2019-06-29 20:38:35 +00:00
}
pkg_order() {
# Order a list of packages based on dependence and take into account
# pre-built tarballs if this is to be called from 'kiss i'.
unset order redro deps
for pkg do case $pkg in
2021-07-06 19:10:23 +00:00
/*@*.tar.*) deps="$deps $pkg" ;;
*@*.tar.*) deps="$deps $ppwd/$pkg" ;;
*/*) die "Not a package' ($pkg)" ;;
*) pkg_depends "$pkg" raw
esac done
# Filter the list, only keeping explicit packages. The purpose of these
# two loops is to order the argument list based on dependence.
for pkg in $deps; do case " $* " in *" $pkg "* | *" ${pkg##"$ppwd/"} "*)
order="$order $pkg"
redro="$pkg $redro"
esac done
unset deps
}
2019-06-13 14:48:08 +00:00
pkg_strip() {
2020-05-21 07:38:07 +00:00
# Strip package binaries and libraries. This saves space on the system as
# well as on the tarballs we ship for installation.
2020-08-15 07:27:35 +00:00
[ -f "$mak_dir/$pkg/nostrip" ] || [ "$KISS_STRIP" = 0 ] && return
2019-06-13 14:48:08 +00:00
log "$1" "Stripping binaries and libraries"
2019-06-29 20:38:35 +00:00
2020-05-24 13:56:30 +00:00
# Strip only files matching the below ELF types. This uses 'od' to print
2020-05-24 16:42:44 +00:00
# the first 18 bytes of the file. This is the location of the ELF header
# (up to the ELF type) and contains the type information we need.
2020-05-24 13:56:30 +00:00
#
# Static libraries (.a) are in reality AR archives which contain ELF
2020-05-24 16:42:44 +00:00
# objects. We simply read from the same 18 bytes and assume that the AR
# header equates to an archive containing objects (.o).
2020-05-24 16:22:13 +00:00
#
2020-05-24 16:42:44 +00:00
# Example ELF output ('003' is ELF type):
2020-05-24 16:22:13 +00:00
# 0000000 177 E L F 002 001 001 \0 \0 \0 \0 \0 \0 \0 \0 \0
# 0000020 003 \0
# 0000022
#
# Example AR output (.a):
# 0000000 ! < a r c h > \n /
# 0000020
# 0000022
2020-05-21 15:06:32 +00:00
find "$pkg_dir/$1" -type f | while read -r file; do
2020-05-25 15:37:57 +00:00
case $(od -A o -t c -N 18 "$file") in
2020-05-24 14:50:28 +00:00
# REL (object files (.o), static libraries (.a)).
*177*E*L*F*0000020\ 001\ *|*\!*\<*a*r*c*h*\>*)
2020-05-24 16:22:13 +00:00
strip -g -R .comment -R .note "$file"
;;
# EXEC (binaries), DYN (shared libraries).
# Shared libraries keep global symbols in a separate ELF section
# called '.dynsym'. '--strip-all/-s' does not touch the dynamic
# symbol entries which makes this safe to do.
2020-05-24 16:34:05 +00:00
*177*E*L*F*0000020\ 00[23]\ *)
2020-05-24 16:22:13 +00:00
strip -s -R .comment -R .note "$file"
;;
2020-05-24 13:56:30 +00:00
esac
2021-07-03 22:20:19 +00:00
done 2>/dev/null || :
2019-06-13 14:48:08 +00:00
}
2020-11-06 06:45:56 +00:00
pkg_fix_deps() {
2020-05-21 07:38:07 +00:00
# Dynamically look for missing runtime dependencies by checking each
# binary and library with 'ldd'. This catches any extra libraries and or
# dependencies pulled in by the package's build suite.
2021-07-03 10:48:14 +00:00
log "$1" "looking for dependencies (using ${cmd_elf##*/})"
cd "$pkg_dir/$1/$pkg_db/$1"
2020-11-06 06:45:56 +00:00
set +f
set -f -- "$sys_db/"*/manifest
2020-03-23 10:40:38 +00:00
2020-05-25 04:43:33 +00:00
: >> depends
2020-01-12 17:55:12 +00:00
2020-03-23 10:40:38 +00:00
find "$pkg_dir/${PWD##*/}/" -type f 2>/dev/null |
2020-01-12 17:55:12 +00:00
while read -r _fix_file; do
ldd_buf=$(ldd -- "$_fix_file" 2>/dev/null) || continue
elf_buf=$("$cmd_elf" -d "$_fix_file" 2>/dev/null) || elf_buf=$ldd_buf
while read -r line || [ "$line" ]; do
2021-07-05 10:16:37 +00:00
case $line in *NEEDED*\[*\] | *'=>'*)
# readelf: 0x0000 (NEEDED) Shared library: [libjson-c.so.5]
line=${line##*\[}
line=${line%%\]*}
# Resolve library path.
# ldd: libjson-c.so.5 => /lib/libjson-c.so.5 ...
case $cmd_elf in
*readelf) line=${ldd_buf#*" $line => "} ;;
*) line=${line##*=> } ;;
esac
line=${line%% *}
# Skip files owned by libc and POSIX.
case ${line##*/} in
ld-* |\
lib[cm].so* |\
libcrypt.so* |\
2021-07-05 10:16:37 +00:00
libdl.so* |\
libmvec.so* |\
2021-07-05 10:16:37 +00:00
libpthread.so* |\
libresolv.so* |\
2021-07-05 10:16:37 +00:00
librt.so* |\
libtrace.so* |\
libutil.so* |\
2021-07-05 10:16:37 +00:00
libxnet.so* |\
ldd)
continue
;;
*)
# Skip file if owned by current package
pkg_owner -l "/${line#/}\$" "$PWD/manifest" &&
2020-11-06 06:45:56 +00:00
continue
2021-07-05 10:16:37 +00:00
pkg_owner -l "/${line#/}\$" "$@" &&
printf '%s\n' "$pkg_owner"
;;
esac
2020-09-25 19:38:05 +00:00
esac
done <<EOF || :
$elf_buf
EOF
done | sort -uk1,1 depends - > "$tmp_dir/.fixdeps"
# If the depends file was modified, show a diff and replace it.
if [ -s "$tmp_dir/.fixdeps" ]; then
diff -U 3 depends - < "$tmp_dir/.fixdeps" 2>/dev/null || :
mv -f "$tmp_dir/.fixdeps" depends
2020-11-06 06:45:56 +00:00
pkg_manifest "${PWD##*/}"
else
rm -f depends
fi
}
2021-07-05 10:26:16 +00:00
pkg_manifest() {
# Generate the package's manifest file. This is a list of each file
# and directory inside the package. The file is used when uninstalling
# packages, checking for package conflicts and for general debugging.
log "$1" "Generating manifest"
cd "${2:-$pkg_dir}/$1"
2019-06-29 20:38:35 +00:00
2019-09-21 16:03:11 +00:00
# find: Print all files and directories and append '/' to directories.
2020-11-23 05:21:02 +00:00
{
find . -type d -exec printf '%s/\n' {} +
find . ! -type d -print
2021-07-03 14:34:13 +00:00
} |
2020-11-23 05:21:02 +00:00
2021-07-03 14:34:13 +00:00
# sort: Sort the output in *reverse*. Directories appear *after* their
# contents.
# sed: Remove the first character in each line (./dir -> /dir) and
# remove all lines which only contain '.'.
sort -r | sed '/^\.\/$/d;ss.ss' > "$PWD/$pkg_db/$1/manifest"
2021-07-05 10:26:16 +00:00
cd "$OLDPWD"
}
2019-06-13 14:48:08 +00:00
pkg_manifest_validate() {
log "$1" "Checking if manifest valid"
while read -r line; do
2021-07-03 23:39:40 +00:00
[ -h "./$line" ] || [ -e "./$line" ] || {
printf '%s\n' "$line"
set -- "$@" "$line"
}
done < "$pkg_db/$1/manifest"
2021-07-03 23:39:40 +00:00
case $# in [2-9]|[1-9][0-9]*)
die "$1" "manifest contains $(($# - 1)) non-existent files"
esac
}
pkg_etcsums() {
# Generate checksums for each configuration file in the package's /etc/
# directory for use in "smart" handling of these files.
log "$1" "Generating etcsums"
! [ -d "$pkg_dir/$1/etc" ] ||
2020-02-05 08:56:25 +00:00
2020-05-30 10:18:29 +00:00
# This can't be a simple 'find -exec' as 'sh256' is a shell function
# and not a real command of any kind. This is the shell equivalent.
find "$pkg_dir/$1/etc" ! -type d | sort | while read -r line; do
2021-07-06 10:16:34 +00:00
sh256 "$line"
done > "$pkg_dir/$1/$pkg_db/$1/etcsums"
}
2020-02-05 08:56:25 +00:00
kiss: Various portability fixes. - Added POSIX shell implementation of the 'readlink' utility for use _only_ when the 'readlink' utility is not available. - Made tar usage more portable. All that is left now is the removal of --strip-components 1 for full (presumed) portability. - Swapped from sha256sum to shasum as it's more portable. This is still not a full solution. Here's a checklist of where we currently are: POSIX Core utilities (depends coreutils) - [x] sh (POSIX) - [x] find (POSIX) -type f, -type d, -exec {} [+;], -o, -print, ! - [x] ls (POSIX) -l, -d - [x] sed (POSIX) -n, s/<search>/<replace>/g, /<delete>/d - [x] grep (POSIX) -l, -F, -x, -f, -q, -v - [x] sort (POSIX) -r, -u, -k - [x] tee (POSIX) - [x] date (POSIX) - [x] mkdir (POSIX) -p - [x] rm (POSIX) -f, -r - [x] rmdir (POSIX) - [x] cp (POSIX) -f, -P, -p, -L, -R - [x] mv (POSIX) -f - [x] chown (POSIX) -h - [x] diff (POSIX) -U BSD utilities - [x] install (BSD, not POSIX) (still portable) -o, -g, -m, -d Misc - [x] readlink (NOT POSIX) (fallback shell implementation) - [x] su* (sudo, doas, su) (in order, optional) - [x] git (downloads from git) (must link to curl) Compiler/libc utilities (depends cc & libc) - [x] readelf (Part of compiler toolchain) (GNU, LLVM or elfutils) - [x] strip (Part of compiler toolchain) (GNU, LLVM or elfutils) - [x] ldd (Part of libc) Tarball compression - [ ] tar (must have --strip-components) (busybox, GNU, libarchive)) - [x] bzip2 (widely used) -d, -z - [x] xz (widely used) -d, -z, -c, -T - [x] gzip (widely used) -d, -6 - [x] zstd (optional) -d, -z, -c - [x] unzip (optional) - [ ] shasum (checksums) (NO standard. Portable across Linux/BSD)
2020-04-30 16:38:37 +00:00
pkg_tar() (
# Create a tarball from the built package's files. This tarball also
# contains the package's database entry.
2021-07-05 10:52:54 +00:00
#
# NOTE: repo_ comes from caller.
log "$1" "Creating tarball"
# Use 'cd' to avoid needing tar's '-C' flag which may not be portable
# across implementations.
kiss: Various portability fixes. - Added POSIX shell implementation of the 'readlink' utility for use _only_ when the 'readlink' utility is not available. - Made tar usage more portable. All that is left now is the removal of --strip-components 1 for full (presumed) portability. - Swapped from sha256sum to shasum as it's more portable. This is still not a full solution. Here's a checklist of where we currently are: POSIX Core utilities (depends coreutils) - [x] sh (POSIX) - [x] find (POSIX) -type f, -type d, -exec {} [+;], -o, -print, ! - [x] ls (POSIX) -l, -d - [x] sed (POSIX) -n, s/<search>/<replace>/g, /<delete>/d - [x] grep (POSIX) -l, -F, -x, -f, -q, -v - [x] sort (POSIX) -r, -u, -k - [x] tee (POSIX) - [x] date (POSIX) - [x] mkdir (POSIX) -p - [x] rm (POSIX) -f, -r - [x] rmdir (POSIX) - [x] cp (POSIX) -f, -P, -p, -L, -R - [x] mv (POSIX) -f - [x] chown (POSIX) -h - [x] diff (POSIX) -U BSD utilities - [x] install (BSD, not POSIX) (still portable) -o, -g, -m, -d Misc - [x] readlink (NOT POSIX) (fallback shell implementation) - [x] su* (sudo, doas, su) (in order, optional) - [x] git (downloads from git) (must link to curl) Compiler/libc utilities (depends cc & libc) - [x] readelf (Part of compiler toolchain) (GNU, LLVM or elfutils) - [x] strip (Part of compiler toolchain) (GNU, LLVM or elfutils) - [x] ldd (Part of libc) Tarball compression - [ ] tar (must have --strip-components) (busybox, GNU, libarchive)) - [x] bzip2 (widely used) -d, -z - [x] xz (widely used) -d, -z, -c, -T - [x] gzip (widely used) -d, -6 - [x] zstd (optional) -d, -z, -c - [x] unzip (optional) - [ ] shasum (checksums) (NO standard. Portable across Linux/BSD)
2020-04-30 16:38:37 +00:00
cd "$pkg_dir/$1"
2020-04-24 08:04:05 +00:00
# Create a tarball from the contents of the built package.
2021-07-08 08:15:31 +00:00
tar cf - . | case $KISS_COMPRESS in
bz2) bzip2 -z ;;
gz) gzip -6 ;;
lzma) lzma -z ;;
lz) lzip -z ;;
2021-07-05 08:44:48 +00:00
xz) xz -zT0 ;;
zst) zstd -z ;;
2021-07-08 08:15:31 +00:00
esac > "$bin_dir/$1@$repo_ver-$repo_rel.tar.$KISS_COMPRESS"
log "$1" "Successfully created tarball"
run_hook post-package "$1"
kiss: Various portability fixes. - Added POSIX shell implementation of the 'readlink' utility for use _only_ when the 'readlink' utility is not available. - Made tar usage more portable. All that is left now is the removal of --strip-components 1 for full (presumed) portability. - Swapped from sha256sum to shasum as it's more portable. This is still not a full solution. Here's a checklist of where we currently are: POSIX Core utilities (depends coreutils) - [x] sh (POSIX) - [x] find (POSIX) -type f, -type d, -exec {} [+;], -o, -print, ! - [x] ls (POSIX) -l, -d - [x] sed (POSIX) -n, s/<search>/<replace>/g, /<delete>/d - [x] grep (POSIX) -l, -F, -x, -f, -q, -v - [x] sort (POSIX) -r, -u, -k - [x] tee (POSIX) - [x] date (POSIX) - [x] mkdir (POSIX) -p - [x] rm (POSIX) -f, -r - [x] rmdir (POSIX) - [x] cp (POSIX) -f, -P, -p, -L, -R - [x] mv (POSIX) -f - [x] chown (POSIX) -h - [x] diff (POSIX) -U BSD utilities - [x] install (BSD, not POSIX) (still portable) -o, -g, -m, -d Misc - [x] readlink (NOT POSIX) (fallback shell implementation) - [x] su* (sudo, doas, su) (in order, optional) - [x] git (downloads from git) (must link to curl) Compiler/libc utilities (depends cc & libc) - [x] readelf (Part of compiler toolchain) (GNU, LLVM or elfutils) - [x] strip (Part of compiler toolchain) (GNU, LLVM or elfutils) - [x] ldd (Part of libc) Tarball compression - [ ] tar (must have --strip-components) (busybox, GNU, libarchive)) - [x] bzip2 (widely used) -d, -z - [x] xz (widely used) -d, -z, -c, -T - [x] gzip (widely used) -d, -6 - [x] zstd (optional) -d, -z, -c - [x] unzip (optional) - [ ] shasum (checksums) (NO standard. Portable across Linux/BSD)
2020-04-30 16:38:37 +00:00
)
2019-06-13 14:48:08 +00:00
pkg_build_all() {
# Build packages and turn them into packaged tarballs.
# Order the argument list and filter out duplicates.
log "Resolving dependencies"
2021-07-06 18:41:30 +00:00
# Mark packages passed on the command-line explicit.
# Also resolve dependencies for all explicit packages.
2020-09-09 13:52:18 +00:00
for pkg do
pkg_depends "$pkg" expl filter '' '' pkg_lint
explicit="$explicit $pkg "
2020-09-09 13:52:18 +00:00
done
2019-09-13 18:25:33 +00:00
# If this is an update, don't always build explicitly passsed packages
# and instead install pre-built binaries if they exist.
2020-01-11 12:07:21 +00:00
[ "$pkg_update" ] || explicit_build=$explicit
2019-09-13 20:52:15 +00:00
set --
2020-05-16 06:26:34 +00:00
# If an explicit package is a dependency of another explicit package,
2021-07-06 18:41:30 +00:00
# remove it from the explicit list.
2021-06-29 15:28:50 +00:00
for pkg in $explicit; do
contains "$deps" "$pkg" || set -- "$@" "$pkg"
2019-09-13 18:25:33 +00:00
done
explicit_cnt=$#
2021-07-06 16:53:49 +00:00
explicit=$*
log "Building: explicit: $*${deps:+, implicit: ${deps## }}"
2021-07-04 13:02:45 +00:00
# Intentional, globbing disabled.
2019-09-20 14:54:12 +00:00
# shellcheck disable=2046,2086
set -- $deps "$@"
# Ask for confirmation if extra packages need to be built.
[ "$#" -ne "$explicit_cnt" ] || [ "$pkg_update" ] && prompt
2019-07-11 06:14:17 +00:00
log "Checking for pre-built dependencies"
# Install any pre-built dependencies if they exist in the binary
# directory and are up to date.
2021-06-30 09:14:31 +00:00
for pkg in "$@"; do
if ! contains "$explicit_build" "$pkg" && pkg_cache "$pkg"; then
2021-07-07 20:10:07 +00:00
log "$pkg" "Found pre-built binary"
2021-07-03 15:23:51 +00:00
# Intended behavior.
# shellcheck disable=2030,2031
2021-07-03 15:12:40 +00:00
(export KISS_FORCE=1; args i "$tar_file")
2021-06-30 09:14:31 +00:00
else
set -- "$@" "$pkg"
fi
2020-03-21 11:54:48 +00:00
2021-06-30 09:14:31 +00:00
shift
2020-09-09 13:52:18 +00:00
done
2019-06-29 20:38:35 +00:00
for pkg do
pkg_source "$pkg"
pkg_verify "$pkg"
done
2019-06-13 14:48:08 +00:00
2019-07-03 13:35:14 +00:00
# Finally build and create tarballs for all passed packages and
# dependencies.
2020-06-11 08:06:43 +00:00
for pkg do
log "$pkg" "Building package ($((_build_cur+=1))/${_build_tot:=$#})"
2020-01-03 07:10:41 +00:00
2021-07-03 14:48:39 +00:00
pkg_find_version "$pkg"
2021-07-06 15:32:36 +00:00
run_hook pre-extract "$pkg" "$pkg_dir/$pkg"
2020-02-05 08:56:25 +00:00
pkg_extract "$pkg"
pkg_build "$pkg"
pkg_strip "$pkg"
pkg_manifest "$pkg"
2020-11-06 07:00:23 +00:00
pkg_fix_deps "$pkg"
pkg_etcsums "$pkg"
pkg_tar "$pkg"
2019-06-26 16:27:36 +00:00
if [ "$pkg_update" ] || ! contains "$explicit" "$pkg"; then
log "$pkg" "Needed as a dependency or has an update, installing"
2021-07-03 15:23:51 +00:00
# Intended behavior.
# shellcheck disable=2030,2031
2021-07-03 15:12:40 +00:00
(export KISS_FORCE=1; args i "$pkg")
fi
done
2019-06-29 20:38:35 +00:00
[ "$pkg_update" ] || {
# Intentional, globbing disabled.
# shellcheck disable=2046,2086
set -- $explicit
! prompt "Install built packages? [$*]" || (args i "$@")
}
2019-06-29 20:38:35 +00:00
}
pkg_build() {
# Install built packages to a directory under the package name to
# avoid collisions with other packages.
mkcd "$mak_dir/$1" "$pkg_dir/$1/$pkg_db"
log "$1" "Starting build"
run_hook pre-build "$1" "$pkg_dir/$1"
# Attempt to create the log file early so any permissions errors are caught
# before the build starts. 'tee' is run in a pipe and POSIX shell has no
# pipe-fail causing confusing behavior when tee fails.
: > "$log_dir/$1-$time-$pid"
# Call the build script, log the output to the terminal and to a file.
# There's no PIPEFAIL in POSIX shell so we must resort to tricks like kill.
{
# Give the script a modified environment. Define CC and CXX giving them
# the generic values cc and c++. Define KISS_ROOT sanitized to ensure
# safe path joining in build files.
2021-07-14 20:46:43 +00:00
AR="${AR:-ar}" \
CC="${CC:-cc}" \
CXX="${CXX:-c++}" \
2021-07-14 20:46:43 +00:00
NM="${NM:-nm}" \
RANLIB="${RANLIB:-ranlib}" \
DESTDIR="$pkg_dir/$1" \
2021-07-14 20:46:43 +00:00
GOPATH="$PWD/go" \
KISS_ROOT="$KISS_ROOT" \
2021-07-14 20:46:43 +00:00
PREFIX=/usr \
\
"$repo_dir/build" "$pkg_dir/$1" "$repo_ver" 2>&1 || {
log "$1" "Build failed"
log "$1" "Log stored to $log_dir/$1-$time-$pid"
run_hook build-fail "$pkg" "$pkg_dir/$1"
pkg_clean
kill 0
}
} | tee "$log_dir/$1-$time-$pid"
# Delete the log file if the build succeeded to prevent the directory
# from filling very quickly with useless logs.
[ "$KISS_KEEPLOG" = 1 ] || rm -f "$log_dir/$1-$time-$pid"
# Copy the repository files to the package directory.
cp -LRf "$repo_dir" "$pkg_dir/$1/$pkg_db/"
log "$1" "Successfully built package"
run_hook post-build "$1" "$pkg_dir/$1"
# Remove all .la files from package.
find "$pkg_dir/$1/usr/lib" \
-name \*.la -exec rm -f {} + 2>/dev/null || :
# Remove unneeded file from all packages.
rm -f "$pkg_dir/$1/usr/lib/charset.alias"
# Ensure manifest is added to manfiest.
: > "$pkg_dir/$1/$pkg_db/$1/manifest"
# Ensure etcsums is added to manifest if /etc/ exists in package.
! [ -d "$pkg_dir/$1/etc" ] || : > "$pkg_dir/$1/$pkg_db/$1/etcsums"
}
2019-06-29 20:38:35 +00:00
pkg_checksums() {
# Generate checksums for packages.
#
# NOTE: repo_dir comes from caller.
while read -r src dest || [ "$src" ]; do
2021-07-05 08:23:10 +00:00
pkg_source_resolve "$1" "$src" "$dest" >/dev/null
case $_res in */*[!.])
sh256 "$_res"
esac
done < "$repo_dir/sources" || die "$1" "Failed to generate checksums"
2020-09-14 19:26:58 +00:00
}
2020-02-08 18:36:58 +00:00
pkg_verify() {
2020-05-21 07:38:07 +00:00
# Verify all package checksums. This is achieved by generating a new set
# of checksums and then comparing those with the old set.
2021-07-07 08:16:25 +00:00
#
# NOTE: repo_dir comes from caller.
log "$1" "Checking sources"
[ -f "$repo_dir/sources" ] || return 0
# Read the repository checksums into a list.
while read -r chk _ || [ "$chk" ]; do
set -- "$@" "$chk"
2021-07-10 21:27:32 +00:00
done 2>/dev/null < "$repo_dir/checksums"
2020-02-08 18:36:58 +00:00
# Generate a new set of checksums to compare against.
pkg_checksums "$1" > "$mak_dir/v"
2020-05-16 06:26:34 +00:00
# Check that the first column (separated by whitespace) match in both
# checksum files. If any part of either file differs, mismatch. Abort.
while read -r new _; do shift
printf 'old %s\nnew %s\n' "${1:-missing}" "$new"
case $new-${1:-null} in
"$1-$new"|"$new-SKIP") ;;
*) die "${repo_dir##*/}" "Checksum mismatch"
esac
done < "$mak_dir/v"
2020-02-08 18:36:58 +00:00
}
2019-06-29 20:38:35 +00:00
pkg_conflicts() {
# Check to see if a package conflicts with another.
log "$1" "Checking for package conflicts"
2020-05-16 06:26:34 +00:00
# Filter the tarball's manifest and select only files. Resolve all
# symlinks in file paths as well.
2020-09-09 13:52:18 +00:00
while read -r file; do
# Skip all directories.
case $file in */) continue; esac
2021-07-07 07:17:19 +00:00
file=$KISS_ROOT/${file#/}
# Attempt to resolve symlinks by using 'cd'.
# If this fails, fallback to the file's parent
# directory.
cd -P "${file%/*}" 2>/dev/null || PWD=${file%/*}
# Print the file with all symlinks in its path
# resolved to their real locations.
printf '%s\n' "${PWD#"$KISS_ROOT"}/${file##*/}"
done < "$tar_dir/$1/$pkg_db/$1/manifest" > "$mak_dir/cf_m"
2020-01-06 05:49:52 +00:00
cd "$tar_dir/$1"
p_name=$1
2020-05-16 06:26:34 +00:00
set +f
set -f "$sys_db"/*/manifest
2020-01-06 05:49:52 +00:00
2020-05-16 06:26:34 +00:00
# Generate a list of all installed package manifests and remove the
# current package from the list. This is the simplest method of
# dropping an item from the argument list. The one downside is that
# it cannot live in a function due to scoping of arguments.
2020-09-09 13:52:18 +00:00
for manifest do
shift
2021-07-07 07:11:23 +00:00
case $manifest in "$sys_db/$p_name/manifest")
continue
esac
2020-05-16 06:26:34 +00:00
set -- "$@" "$manifest"
done
2020-01-28 15:00:29 +00:00
# Return here if there is nothing to check conflicts against.
[ "$#" != 0 ] || return 0
# Store the list of found conflicts in a file as we'll be using the
# information multiple times. Storing things in the cache dir allows
# us to be lazy as they'll be automatically removed on script end.
2021-07-03 22:20:19 +00:00
grep -Fxf "$mak_dir/cf_m" -- "$@" 2>/dev/null > "$mak_dir/cf" || :
# Enable alternatives automatically if it is safe to do so.
# This checks to see that the package that is about to be installed
# doesn't overwrite anything it shouldn't in '/var/db/kiss/installed'.
grep -q ":/var/db/kiss/installed/" "$mak_dir/cf" || choice_auto=1
if [ "$KISS_CHOICE" != 0 ] &&
[ "$choice_auto" = 1 ] &&
[ -s "$mak_dir/cf" ]; then
# This is a novel way of offering an "alternatives" system.
# It is entirely dynamic and all "choices" are created and
# destroyed on the fly.
#
# When a conflict is found between two packages, the file
# is moved to a directory called "choices" and its name
# changed to store its parent package and its intended
# location.
#
# The package's manifest is then updated to reflect this
# new location.
2020-01-28 12:07:08 +00:00
#
# The 'kiss alternatives' command parses this directory and
# offers you the CHOICE of *swapping* entries in this
# directory for those on the filesystem.
2020-01-28 12:07:08 +00:00
#
# The alternatives command does the same thing we do here,
# it rewrites manifests and moves files around to make
# this work.
#
# Pretty nifty huh?
2020-03-11 17:36:31 +00:00
while IFS=: read -r _ con; do
printf '%s\n' "Found conflict $con"
2020-01-28 12:07:08 +00:00
# Create the "choices" directory inside of the tarball.
# This directory will store the conflicting file.
mkdir -p "$tar_dir/$p_name/${cho_dir:=var/db/kiss/choices}"
2020-01-28 12:07:08 +00:00
# Construct the file name of the "db" entry of the
# conflicting file. (pkg_name>usr>bin>ls)
con_name=$(printf %s "$con" | sed 's|/|>|g')
2020-01-28 12:07:08 +00:00
# Move the conflicting file to the choices directory
# and name it according to the format above.
mv -f "$tar_dir/$p_name/$con" \
"$tar_dir/$p_name/$cho_dir/$p_name$con_name" 2>/dev/null || {
2020-02-11 10:04:44 +00:00
log "File must be in ${con%/*} and not a symlink to it"
log "This usually occurs when a binary is installed to"
2020-02-11 10:04:44 +00:00
log "/sbin instead of /usr/bin (example)"
log "Before this package can be used as an alternative,"
log "this must be fixed in $p_name. Contact the maintainer"
die "by finding their details via 'kiss-maintainer'" "" "!>"
2020-02-11 10:04:44 +00:00
}
done < "$mak_dir/cf"
log "$p_name" "Converted all conflicts to choices (kiss a)"
2020-02-06 12:24:21 +00:00
# Rewrite the package's manifest to update its location
# to its new spot (and name) in the choices directory.
pkg_manifest "$p_name" "$tar_dir" 2>/dev/null
elif [ -s "$mak_dir/cf" ]; then
log "Package '$p_name' conflicts with another package" "" "!>"
log "Run 'KISS_CHOICE=1 kiss i $p_name' to add conflicts" "" "!>"
2020-05-07 11:46:50 +00:00
die "as alternatives." "" "!>"
2020-01-28 15:00:29 +00:00
fi
2019-06-13 14:48:08 +00:00
}
2020-01-28 13:07:11 +00:00
pkg_swap() {
# Swap between package alternatives.
2020-01-28 13:07:11 +00:00
pkg_list "$1" >/dev/null
2020-10-05 06:15:21 +00:00
alt=$(printf %s "$1$2" | sed 's|/|>|g')
cd "$sys_db/../choices"
2020-01-28 13:07:11 +00:00
[ -f "$alt" ] || [ -h "$alt" ] ||
die "Alternative '$1 $2' doesn't exist"
if [ -f "$2" ]; then
# Figure out which package owns the file we are going to swap for
# another package's. Print the full path to the manifest file which
# contains the match to our search.
2021-07-03 22:20:19 +00:00
pkg_owns=$(set +f; grep -lFx "$2" "$sys_db/"*/manifest) || :
2020-10-05 06:15:21 +00:00
# Extract the package name from the path above.
pkg_owns=${pkg_owns%/*}
pkg_owns=${pkg_owns##*/}
# Ensure that the file we're going to swap is actually owned by a
# package. If it is not, we have to die here.
[ "$pkg_owns" ] || die "File '$2' exists on filesystem but isn't owned"
2020-09-26 05:08:10 +00:00
log "Swapping '$2' from '$pkg_owns' to '$1'"
2020-09-26 05:08:10 +00:00
# Convert the current owner to an alternative and rewrite its manifest
# file to reflect this.
cp -Pf "$KISS_ROOT/$2" "$pkg_owns>${alt#*>}"
# Replace the matching line in the manifest with the desired replacement.
# This used to be a 'sed' call which turned out to be a little
# error-prone in some cases. This new method is a tad slower but ensures
# we never wipe the file due to a command error.
while read -r line; do
case $line in
"$2") printf '%s\n' "${PWD#"$KISS_ROOT"}/$pkg_owns>${alt#*>}" ;;
*) printf '%s\n' "$line" ;;
esac
done < "../installed/$pkg_owns/manifest" | sort -r > "$mak_dir/.$1"
mv -f "$mak_dir/.$1" "../installed/$pkg_owns/manifest"
fi
# Convert the desired alternative to a real file and rewrite the manifest
# file to reflect this. The reverse of above.
mv -f "$alt" "$KISS_ROOT/$2"
2020-04-29 07:12:09 +00:00
# Replace the matching line in the manifest with the desired replacement.
# This used to be a 'sed' call which turned out to be a little error-prone
# in some cases. This new method is a tad slower but ensures we never wipe
# the file due to a command error.
while read -r line; do
case $line in
"${PWD#"$KISS_ROOT"}/$alt") printf '%s\n' "$2" ;;
*) printf '%s\n' "$line" ;;
esac
done < "../installed/$1/manifest" | sort -r > "$mak_dir/.$1"
2020-04-29 07:12:09 +00:00
mv -f "$mak_dir/.$1" "../installed/$1/manifest"
2020-01-28 13:07:11 +00:00
}
file_rwx() {
2021-07-14 17:13:30 +00:00
# Grab the octal permissions from 'ls -l' so that we can retain
# directory permissions and strip setuid/setgid if found.
rwx=$(ls -ld "$1") oct='' o=0
# Convert the output of 'ls' (rwxrwx---) to octal. This is simply
# a 1-9 loop with the second digit being the value of the field.
for c in 14 22 31 44 52 61 74 82 91; do
rwx=${rwx#?}
case $rwx in
[rwx]*): "$((o+=${c#?}))" ;;
[st]*): "$((o+=1))" ;;
[ST]*) ;;
esac
2020-04-28 04:43:54 +00:00
2021-07-13 20:48:03 +00:00
case $((${c%?} % 3)) in 0)
oct=$oct$o o=0
esac
done
}
pkg_install_files() {
while read -r file; do
2021-07-14 07:22:28 +00:00
_file=$KISS_ROOT$file
# Copy files and create directories (preserving permissions),
# skipping anything located in /etc/.
#
# The 'test' will run with '-e' for no-overwrite and '-z'
# for overwrite.
case $file in /etc/*) ;;
2020-05-01 16:26:36 +00:00
*/)
# Skip directories if they already exist in the file system.
# (Think /usr/bin, /usr/lib, etc).
[ -d "$_file" ] || {
file_rwx "$2/${file#/}"
mkdir -m "$oct" "$_file"
}
2020-04-26 08:00:28 +00:00
;;
2020-04-22 06:37:46 +00:00
*)
2021-07-14 08:12:36 +00:00
if [ -d "$_file" ] || test "$1" "$_file"; then
# Skip directories as they're likely symlinks in this case.
# Pure directories in manifests have a suffix of '/'.
continue
2021-07-14 08:12:36 +00:00
elif [ -h "$_file" ]; then
# Copy the file to the destination directory overwriting
# any existing file.
cp -fP "$2$file" "${_file%/*}/."
else
# Construct a temporary filename which is a) unique and
# b) identifiable as related to the package manager.
2021-07-14 07:22:28 +00:00
__tmp=${_file%/*}/__kiss-tmp-$pkg_name-${file##*/}-$pid
# Copy the file to the destination directory with the
# temporary name created above.
cp -fP "$2$file" "$__tmp" &&
# Atomically move the temporary file to its final
# destination. The running processes will either get
# the old file or the new one.
mv -f "$__tmp" "$_file"
fi
esac || return 1
done
2020-04-22 06:18:12 +00:00
}
2020-05-21 07:55:29 +00:00
pkg_remove_files() {
# Remove a file list from the system. This function runs during package
# installation and package removal. Combining the removals in these two
# functions allows us to stop duplicating code.
while read -r file; do
case $file in /etc/?*[!/])
2021-07-05 12:10:48 +00:00
sh256 "$KISS_ROOT/$file" >/dev/null
2021-07-06 10:18:28 +00:00
sum_old=$(grep -F "${hash:-null}" "$mak_dir/c")
2021-07-06 10:18:28 +00:00
[ "${hash:-null}" = "$sum_old" ] || {
printf 'Skipping %s (modified)\n' "$file"
continue
}
2021-07-03 22:20:19 +00:00
esac 2>/dev/null || :
_file=${KISS_ROOT:+"$KISS_ROOT/"}${file%%/}
2020-05-21 07:55:29 +00:00
# Queue all directory symlinks for later removal.
if [ -h "$_file" ] && [ -d "$_file" ]; then
case $file in /*/*/)
set -- "$@" "$_file"
esac
2020-05-21 07:55:29 +00:00
# Remove empty directories.
elif [ -d "$_file" ]; then
2021-07-03 22:20:19 +00:00
rmdir "$_file" 2>/dev/null || :
2020-05-21 07:55:29 +00:00
# Remove everything else.
else
rm -f "$_file"
2020-05-21 07:55:29 +00:00
fi
done
# Remove all broken directory symlinks.
for sym do
[ -e "$sym" ] || rm -f "$sym"
done
2020-05-21 07:55:29 +00:00
}
pkg_etc() (
[ -d "$tar_dir/$pkg_name/etc" ] || return 0
2020-03-25 10:21:10 +00:00
cd "$tar_dir/$pkg_name"
# Create all directories beforehand.
find etc -type d | while read -r dir; do
mkdir -p "$KISS_ROOT/$dir"
done
2020-03-25 10:21:10 +00:00
# Handle files in /etc/ based on a 3-way checksum check.
find etc ! -type d | sort | while read -r file; do
i=$((i + 1))
2021-07-05 12:10:48 +00:00
{ sh256 "$file"; sum_new=$hash
sh256 "$KISS_ROOT/$file"; sum_sys=$hash
2021-07-05 12:13:06 +00:00
sum_old=$(awk "NR == $i" "$mak_dir/c"); } >/dev/null 2>&1 || :
log "$pkg_name" "Doing 3-way handshake for $file"
printf '%s\n' "Previous: ${sum_old:-null}"
printf '%s\n' "System: ${sum_sys:-null}"
printf '%s\n' "New: ${sum_new:-null}"
# Use a case statement to easily compare three strings at
# the same time. Pretty nifty.
case ${sum_old:-null}${sum_sys:-null}${sum_new} in
# old = Y, sys = X, new = Y
"${sum_new}${sum_sys}${sum_old}")
log "Skipping $file"
continue
;;
2020-03-25 10:21:10 +00:00
# old = X, sys = X, new = X
# old = X, sys = Y, new = Y
# old = X, sys = X, new = Y
"${sum_old}${sum_old}${sum_old}"|\
"${sum_old:-null}${sum_sys}${sum_sys}"|\
"${sum_sys}${sum_old}"*)
log "Installing $file"
new=
;;
# All other cases.
*)
war "$pkg_name" "saving /$file as /$file.new"
new=.new
;;
esac
cp -fPp "$file" "$KISS_ROOT/${file}${new}"
chown root:root "$KISS_ROOT/${file}${new}" 2>/dev/null
2021-07-03 22:20:19 +00:00
done || :
)
2020-03-25 10:21:10 +00:00
pkg_removable() {
# Check if a package is removable and die if it is not.
# A package is removable when it has no dependents.
log "$1" "Checking if package removable"
2021-07-03 15:23:51 +00:00
cd "$sys_db"
set +f
! grep -lFx -- "$1" */depends ||
die "$1" "Not removable, has dependents"
set -f
cd "$OLDPWD"
}
2019-06-13 14:48:08 +00:00
pkg_remove() {
2020-05-21 07:38:07 +00:00
# Remove a package and all of its files. The '/etc' directory is handled
# differently and configuration files are *not* overwritten.
pkg_list "$1" >/dev/null || return
# Intended behavior.
# shellcheck disable=2030,2031
[ "${KISS_FORCE:=0}" = 1 ] || pkg_removable "$1"
2019-07-26 16:21:44 +00:00
# Block being able to abort the script with 'Ctrl+C' during removal.
2020-05-21 07:38:07 +00:00
# Removes all risk of the user aborting a package removal leaving an
# incomplete package installed.
2019-07-04 15:32:53 +00:00
trap '' INT
run_hook_pkg pre-remove "$1"
run_hook pre-remove "$1" "$sys_db/$1"
# Make a backup of the etcsums file (if it exists).
cp -f "$sys_db/$1/etcsums" "$mak_dir/c" 2>/dev/null || : > "$mak_dir/c"
2020-07-29 16:03:02 +00:00
log "$1" "Removing package"
2020-05-21 07:55:29 +00:00
pkg_remove_files < "$sys_db/$1/manifest"
2019-07-26 16:21:44 +00:00
# Reset 'trap' to its original value. Removal is done so
2019-07-04 15:32:53 +00:00
# we no longer need to block 'Ctrl+C'.
trap pkg_clean EXIT INT
log "$1" "Removed successfully"
2019-06-13 14:48:08 +00:00
}
pkg_installable() {
# Check if a package is removable and die if it is not.
# A package is removable when all of its dependencies
# are satisfied.
log "$1" "Checking if package installable"
2021-07-03 23:42:23 +00:00
# False positive.
# shellcheck disable=2094
! [ -f "$2" ] ||
while read -r dep dep_type || [ "$dep" ]; do
case $dep-$dep_type in
\#*-*)
continue
;;
*-)
pkg_list "$dep" >/dev/null 2>&1 || {
printf '%s %s\n' "$dep" "$dep_type"
set -- "$1" "$2" "$(($3 + 1))"
}
;;
esac
done < "$2"
case ${3:-0} in [1-9]*)
die "$1" "Package not installable, missing $3 package(s)"
esac
}
2019-06-29 20:38:35 +00:00
pkg_install() {
2020-04-24 08:04:05 +00:00
# Install a built package tarball.
#
# Package installation works similarly to the method used by Slackware in
# some of their tooling. It's not the obvious solution to the problem,
# however it is the best solution at this given time.
#
# When an installation is an update to an existing package, instead of
# removing the old version first we do something different.
#
# The new version is installed overwriting any files which it has in
# common with the previously installed version of the package.
#
# A "diff" is then generated between the old and new versions and contains
# any files existing in the old version but not the new version.
#
# The package manager then goes and removes these files which leaves us
# with the new package version in the file system and all traces of the
# old version gone.
#
# For good measure the package manager will then install the new package
# an additional time. This is to ensure that the above diff didn't contain
# anything incorrect.
#
# This is the better method as it is "seamless". An update to busybox won't
2021-07-07 08:45:21 +00:00
# create a window in which there is no access to all of its utilities.
2019-06-14 05:58:09 +00:00
# Install can also take the full path to a tarball. We don't need to check
# the repository if this is the case.
2021-07-06 19:07:12 +00:00
case $1 in
*.tar.*)
[ -f "$1" ] || die "File '$1' does not exist"
2020-09-27 08:57:52 +00:00
2021-07-06 19:07:12 +00:00
tar_file=$1
pkg_name=${1##*/}
pkg_name=${pkg_name%@*}
;;
2019-06-29 20:38:35 +00:00
2021-07-06 19:07:12 +00:00
*)
pkg_cache "$1" || die "$1" "Not yet built"
pkg_name=$1
;;
esac
2019-06-29 20:38:35 +00:00
mkcd "$tar_dir/$pkg_name"
2019-06-29 20:38:35 +00:00
# The tarball is extracted to a temporary directory where its contents are
# then "installed" to the filesystem. Running this step as soon as possible
# allows us to also check the validity of the tarball and bail out early
# if needed.
2020-06-10 08:23:34 +00:00
decompress "$tar_file" | tar xf -
2019-07-04 14:43:10 +00:00
# Naively assume that the existence of a manifest file is all that
# determines a valid KISS package from an invalid one. This should be a
# fine assumption to make in 99.99% of cases.
[ -f "./$pkg_db/$pkg_name/manifest" ] || die "Not a valid KISS package"
[ "$KISS_FORCE" = 1 ] || {
pkg_manifest_validate "$pkg_name"
pkg_installable "$pkg_name" "$tar_dir/$pkg_name/$pkg_db/$pkg_name/depends"
2020-03-26 13:00:29 +00:00
}
2019-07-05 06:34:06 +00:00
run_hook pre-install "$pkg_name" "$tar_dir/$pkg_name"
pkg_conflicts "$pkg_name"
2020-09-27 08:57:52 +00:00
2021-07-07 20:07:47 +00:00
log "$pkg_name" "Installing package (${tar_file##*/})"
2020-01-28 12:07:08 +00:00
# If the package is already installed (and this is an upgrade) make a
# backup of the manifest and etcsums files.
cp -f "$sys_db/$pkg_name/manifest" "$mak_dir/m" 2>/dev/null ||
: > "$mak_dir/m"
cp -f "$sys_db/$pkg_name/etcsums" "$mak_dir/c" 2>/dev/null ||
: > "$mak_dir/c"
tar_man=$tar_dir/$pkg_name/$pkg_db/$pkg_name/manifest
# Reverse the manifest file so that we start shallow and go deeper as we
# iterate over each item. This is needed so that directories are created
# going down the tree.
sort "$tar_man" > "$mak_dir/if"
# Generate a list of files which exist in the currently installed manifest
# but not in the newer (to be installed) manifest.
2021-07-14 08:46:43 +00:00
grep -vFxf "$tar_man" "$mak_dir/m" > "$mak_dir/rm" 2>/dev/null ||:
# Block being able to abort the script with Ctrl+C during installation.
# Removes all risk of the user aborting a package installation leaving
# an incomplete package installed.
trap '' INT
2021-07-14 08:32:57 +00:00
if
# Install the package's files by iterating over its manifest.
pkg_install_files -z "$tar_dir/$pkg_name" < "$mak_dir/if" &&
2019-06-29 20:38:35 +00:00
2021-07-14 08:32:57 +00:00
# Handle /etc/ files in a special way (via a 3-way checksum) to
# determine how these files should be installed. Do we overwrite the
# existing file? Do we install it as $file.new to avoid deleting user
# configuration? etc.
#
2021-07-14 08:32:57 +00:00
# This is more or less similar to Arch Linux's Pacman with the user
# manually handling the .new files when and if they appear.
pkg_etc &&
2021-07-14 08:32:57 +00:00
# This is the aforementioned step removing any files from the old
# version of the package if the installation is an update. Each file
# type has to be specially handled to ensure no system breakage occurs.
pkg_remove_files < "$mak_dir/rm" &&
2021-07-14 08:32:57 +00:00
# Install the package's files a second time to fix any mess caused by
# the above removal of the previous version of the package.
pkg_install_files -e "$tar_dir/$pkg_name" < "$mak_dir/if"
then
# Reset 'trap' to its original value. Installation is done so we no longer
# need to block 'Ctrl+C'.
trap pkg_clean EXIT INT
run_hook_pkg post-install "$pkg_name"
run_hook post-install "$pkg_name" "$sys_db/$pkg_name"
log "$pkg_name" "Installed successfully"
else
pkg_clean
log "$pkg_name" "Failed to install package." ERROR
die "$pkg_name" "Filesystem now dirty, manual repair needed."
fi
2019-06-13 14:48:08 +00:00
}
2021-07-12 09:44:27 +00:00
pkg_update() {
2019-06-29 20:38:35 +00:00
# Check all installed packages for updates. So long as the installed
# version and the version in the repositories differ, it's considered
# an update.
log "Updating repositories"
# Create a list of all repositories.
2021-07-04 13:02:45 +00:00
# Intentional, globbing disabled.
# shellcheck disable=2046,2086
{ IFS=:; set -- $KISS_PATH; unset IFS; }
2020-05-21 07:38:07 +00:00
# Update each repository in '$KISS_PATH'.
2020-03-21 11:48:05 +00:00
for repo do
2021-07-02 12:19:23 +00:00
# Handle null repositories (KISS_PATH=repo:::::repo).
[ "$repo" ] || continue
[ -d "$repo" ] || {
log "$repo" " "
printf 'Skipping repository, not a directory\n'
continue
}
2021-07-02 12:32:30 +00:00
2020-02-06 12:06:51 +00:00
cd "$repo"
2019-08-14 09:58:14 +00:00
2021-07-02 12:32:30 +00:00
git remote >/dev/null 2>&1 || {
log "$repo" " "
printf 'Skipping git pull, not a repository\n'
continue
}
2019-08-14 09:58:14 +00:00
2021-07-02 12:32:30 +00:00
# Go to the repository's root directory.
git_root=$(git rev-parse --show-toplevel)
cd "${git_root:?"failed to find git root for '$PWD'"}"
2021-07-02 12:32:30 +00:00
# Go to the real root directory if this is a submodule.
git_root=$(git rev-parse --show-superproject-working-tree)
cd "${git_root:-"$PWD"}"
2021-07-02 12:32:30 +00:00
contains "$repos" "$PWD" || {
repos="$repos $PWD "
run_hook pre-update
2021-07-02 12:32:30 +00:00
# Display a tick if signing is enabled for this repository.
case $(git config merge.verifySignatures) in
true) log "$PWD" "[signed] " ;;
*) log "$PWD" " " ;;
esac
2021-07-02 12:32:30 +00:00
if [ -w "$PWD" ] && [ "$uid" != 0 ]; then
git pull
git submodule update --remote --init -f
2021-07-02 12:32:30 +00:00
else
[ "$uid" = 0 ] || log "$PWD" "Need root to update"
2021-07-02 12:32:30 +00:00
# Find out the owner of the repository and spawn
# git as this user below.
#
# This prevents 'git' from changing the original
# ownership of files and directories in the rare
# case that the repository is owned by a 3rd user.
file_owner "$PWD"
2021-07-02 12:32:30 +00:00
# We're in a repository which is owned by a 3rd
# user. Not root or the current user.
[ "$user" = root ] || log "Dropping to $user for pull"
2021-07-02 12:32:30 +00:00
as_root git pull
as_root git submodule update --remote --init -f
fi
run_hook post-update
2021-07-02 12:32:30 +00:00
}
done
log "Checking for new package versions"
2020-05-16 05:10:37 +00:00
set +f --
for pkg in "$sys_db/"*; do
2021-07-02 12:22:16 +00:00
read -r db_ver db_rel < "$pkg/version" ||
die "${pkg##*/}" "Failed to read installed version"
2021-07-03 14:48:39 +00:00
pkg_find_version "${pkg##*/}"
2019-06-29 20:38:35 +00:00
# Detect repository orphans (installed packages with no
# associated repository).
case $repo_dir in */var/db/kiss/installed/*)
2021-07-14 08:32:57 +00:00
_repo_orp="$_repo_orp ${pkg##*/}"
esac
# Compare installed packages to repository packages.
2021-07-03 14:48:39 +00:00
[ "$db_ver-$db_rel" = "$repo_ver-$repo_rel" ] || {
printf '%s\n' "${pkg##*/} $db_ver-$db_rel ==> $repo_ver-$repo_rel"
set -- "$@" "${pkg##*/}"
2019-07-11 06:14:17 +00:00
}
2019-06-13 14:48:08 +00:00
done
2019-07-11 06:14:17 +00:00
log "Checking for orphaned repository packages"
case $_repo_orp in *?*)
war "Packages without repository:$_repo_orp"
esac
2020-02-06 11:55:01 +00:00
set -f
case " $* " in
*" kiss "*)
log "Detected package manager update"
log "The package manager will be updated first"
prompt
pkg_build_all kiss
args i kiss
log "Updated the package manager"
log "Re-run 'kiss update' to update your system"
;;
" ")
log "Everything is up to date"
;;
*)
log "Packages to update: $*"
pkg_update=1
pkg_order "$@"
# Intentional, globbing disabled.
# shellcheck disable=2046,2086
pkg_build_all $order
log "Updated all packages"
;;
esac
2019-06-13 14:48:08 +00:00
}
2019-06-29 20:38:35 +00:00
pkg_clean() {
2020-05-21 07:38:07 +00:00
# Clean up on exit or error. This removes everything related to the build.
2020-11-06 07:06:04 +00:00
[ "$KISS_DEBUG" = 1 ] || rm -rf "$tmp_dir"
2019-06-29 20:38:35 +00:00
}
2019-06-15 06:19:20 +00:00
2019-06-29 20:38:35 +00:00
args() {
2020-05-21 07:38:07 +00:00
# Parse script arguments manually. This is rather easy to do in our case
# since the first argument is always an "action" and the arguments that
# follow are all package names.
2019-08-19 18:45:19 +00:00
action=$1
2020-05-24 18:05:13 +00:00
shift "$(($# != 0))"
2019-08-19 18:45:19 +00:00
2021-07-03 15:46:09 +00:00
# Ensure that arguments do not contain invalid characters. Wildcards can
# not be used here as they would conflict with kiss extensions.
case $action in
a|alternatives)
case $1 in *\**|*\!*|*\[*|*\]*|*/*)
die "Invalid argument: '!*[]/' ($1)"
2021-07-03 15:46:09 +00:00
esac
;;
b|build|c|checksum|d|download|i|install|l|list|r|remove)
2021-07-06 17:41:25 +00:00
case ${action%%"${action#?}"}-$* in
i-*\!*|i-*\**|i-*\[*|i-*\]*)
die "Arguments contain invalid characters: '!*[]' ($*)"
2021-07-06 17:41:25 +00:00
;;
[!i]-*\!*|[!i]-*\**|[!i]-*\[*|[!i]-*\]*|[!i]-*/*)
die "Arguments contain invalid characters: '!*[]/' ($*)"
2021-07-06 17:41:25 +00:00
;;
[!l]-)
# Add parent directory to repository list.
2021-07-06 17:41:25 +00:00
export KISS_PATH=${PWD%/*}:$KISS_PATH
# Use basename of current directory as package.
2021-07-06 17:41:25 +00:00
set -- "${PWD##*/}"
;;
esac
# Order the argument list based on dependence.
pkg_order "$@"
# Intentional, globbing disabled.
# shellcheck disable=2046,2086
set -- $order
2021-07-03 15:46:09 +00:00
;;
2020-05-18 08:44:24 +00:00
esac
# Rerun the script as root with a fixed environment if needed. We sadly
# can't run singular functions as root so this is needed.
case $action in a|alternatives|i|install|r|remove)
[ -z "$1" ] || [ -w "$KISS_ROOT/" ] || [ "$uid" = 0 ] || {
as_root env \
HOME="$HOME" \
XDG_CACHE_HOME="$XDG_CACHE_HOME" \
KISS_COMPRESS="$KISS_COMPRESS" \
KISS_PATH="$KISS_PATH" \
KISS_FORCE="$KISS_FORCE" \
KISS_ROOT="$KISS_ROOT" \
KISS_CHOICE="$KISS_CHOICE" \
KISS_COLOR="$KISS_COLOR" \
KISS_TMPDIR="$KISS_TMPDIR" \
"$0" "$action" "$@"
return
}
2019-08-19 18:45:19 +00:00
esac
2019-06-29 20:38:35 +00:00
2020-05-21 07:38:07 +00:00
# Actions can be abbreviated to their first letter. This saves keystrokes
# once you memorize the commands.
2019-08-19 18:45:19 +00:00
case $action in
2020-01-28 12:16:01 +00:00
a|alternatives)
if [ "$1" = - ]; then
while read -r pkg path; do
pkg_swap "$pkg" "$path"
done
elif [ "$1" ]; then
pkg_swap "$@"
else
# Go over each alternative and format the file
# name for listing. (pkg_name>usr>bin>ls)
set +f; for pkg in "$sys_db/../choices"/*; do
printf '%s\n' "${pkg##*/}"
done | sed 's|>| /|; s|>|/|g; /\*/d'
fi
2020-09-14 19:26:58 +00:00
;;
2020-09-14 19:26:58 +00:00
c|checksum)
for pkg do pkg_source "$pkg" c; done
2020-09-14 19:26:58 +00:00
for pkg do
pkg_find_die "$pkg"
2020-04-28 03:26:36 +00:00
[ -f "$repo_dir/sources" ] || {
log "$pkg" "No sources file, skipping checksums"
continue
}
2019-06-29 20:38:35 +00:00
sums=$(pkg_checksums "$pkg")
2019-06-29 20:38:35 +00:00
[ "$sums" ] || {
log "$pkg" "No sources needing checksums"
continue
}
printf '%s\n' "$sums"
printf '%s\n' "$sums" > "$repo_dir/checksums"
log "$pkg" "Generated checksums"
2020-09-12 14:40:05 +00:00
done
2019-06-29 20:38:35 +00:00
;;
2021-07-06 18:35:37 +00:00
i|install) for pkg do pkg_install "$pkg"; done ;;
b|build) pkg_build_all "${@:?No packages installed}" ;;
d|download) for pkg do pkg_source "$pkg"; done ;;
l|list) pkg_list "$@" ;;
r|remove) for pkg in $redro; do pkg_remove "$pkg"; done ;;
s|search) for pkg do pkg_find_die "$pkg" all; done ;;
2021-07-12 09:44:27 +00:00
u|update) pkg_update ;;
2021-07-11 12:40:35 +00:00
v|version) printf '5.4.11\n' ;;
2019-06-29 20:38:35 +00:00
2020-09-08 14:07:55 +00:00
'')
log 'kiss [a|b|c|d|i|l|r|s|u|v] [pkg]...'
log 'alternatives List and swap to alternatives'
log 'build Build a package'
log 'checksum Generate checksums'
2020-06-10 07:18:47 +00:00
log 'download Pre-download all sources'
log 'install Install a package'
log 'list List installed packages'
log 'remove Remove a package'
log 'search Search for a package'
2020-05-16 16:00:44 +00:00
log 'update Update the system'
2020-09-08 14:07:55 +00:00
log 'version Package manager version'
printf '\nRun "kiss help-ext" to see all actions\n'
;;
help-ext)
log 'Installed extensions (kiss-* in PATH)'
2021-07-04 13:02:45 +00:00
# Intentional, globbing disabled.
# shellcheck disable=2046,2030,2031
2021-07-03 10:15:06 +00:00
set -- $(pkg_find kiss-\* all -x "$PATH")
# To align descriptions figure out which extension has the longest
# name by doing a simple 'name > max ? name : max' on the basename
# of the path with 'kiss-' stripped as well.
#
# This also removes any duplicates found in '$PATH', picking the
# first match.
for path do p=${path#*/kiss-}
case " $seen " in
*" $p "*) shift ;;
*) seen=" $seen $p " max=$((${#p} > max ? ${#p}+1 : max))
esac
2020-09-23 18:48:08 +00:00
done
# Print each extension, grab its description from the second line
# in the file and align the output based on the above max.
for path do
2021-07-05 08:42:52 +00:00
printf "%b->%b %-${max}s " "$c1" "$c3" "${path#*/kiss-}"
sed -n 's/^# *//;2p' "$path"
done >&2
2019-06-29 20:38:35 +00:00
;;
2019-07-24 22:33:12 +00:00
*)
pkg_find_die "kiss-$action*" "" -x "$PATH"
2021-07-03 10:15:06 +00:00
"$repo_dir" "$@"
;;
2019-06-13 14:48:08 +00:00
esac
}
create_tmp_dirs() {
# Root directory.
KISS_ROOT=${KISS_ROOT%"${KISS_ROOT##*[!/]}"}
# This allows for automatic setup of a KISS chroot and will
# do nothing on a normal system.
2021-07-03 22:20:19 +00:00
mkdir -p "$KISS_ROOT/" 2>/dev/null || :
# System package database.
sys_db=$KISS_ROOT/${pkg_db:=var/db/kiss/installed}
# Top-level cache directory.
cac_dir=${XDG_CACHE_HOME:-"${HOME%"${HOME##*[!/]}"}/.cache"}
cac_dir=${cac_dir%"${cac_dir##*[!/]}"}/kiss
# Persistent cache directories.
src_dir=$cac_dir/sources
log_dir=$cac_dir/logs/${time%-*}
bin_dir=$cac_dir/bin
# Top-level Temporary cache directory.
tmp_dir=${KISS_TMPDIR:="$cac_dir/proc"}
2021-07-01 12:59:22 +00:00
tmp_dir=${tmp_dir%"${tmp_dir##*[!/]}"}/$pid
# Temporary cache directories.
mak_dir=$tmp_dir/build
pkg_dir=$tmp_dir/pkg
tar_dir=$tmp_dir/extract
mkdir -p "$src_dir" "$log_dir" "$bin_dir" \
"$mak_dir" "$pkg_dir" "$tar_dir"
}
2019-06-13 14:48:08 +00:00
main() {
2020-05-09 18:25:38 +00:00
# Globally disable globbing and enable exit-on-error.
set -ef
2021-07-05 08:42:52 +00:00
# Color can be disabled via the environment variable KISS_COLOR. Colors are
# also automatically disabled if output is being used in a pipe/redirection.
[ "$KISS_COLOR" = 0 ] || ! [ -t 2 ] ||
c1='\033[1;33m' c2='\033[1;34m' c3='\033[m'
# Store the original working directory to ensure that relative paths
# passed by the user on the command-line properly resolve to locations
# in the filesystem.
ppwd=$PWD
2019-06-29 20:38:35 +00:00
# The PID of the current shell process is used to isolate directories
# to each specific KISS instance. This allows multiple package manager
# instances to be run at once. Store the value in another variable so
# that it doesn't change beneath us.
pid=$$
2019-06-13 15:11:59 +00:00
2019-06-29 20:38:35 +00:00
# Catch errors and ensure that build files and directories are cleaned
# up before we die. This occurs on 'Ctrl+C' as well as success and error.
2019-06-29 20:38:35 +00:00
trap pkg_clean EXIT INT
2019-06-13 14:48:08 +00:00
2021-07-08 08:15:31 +00:00
# Default compression method.
: "${KISS_COMPRESS:=gz}"
2020-05-21 07:38:07 +00:00
# Figure out which 'sudo' command to use based on the user's choice or what
# is available on the system.
2021-07-03 10:23:04 +00:00
cmd_su=${KISS_SU:-"$(
command -v sudo ||
command -v doas ||
command -v ssu ||
command -v su
2021-07-03 10:23:04 +00:00
)"} || cmd_su=su
2020-09-25 19:38:05 +00:00
2020-11-06 06:45:56 +00:00
# Figure out which utility is available to dump elf information.
cmd_elf=${KISS_ELF:-"$(
2020-11-06 06:45:56 +00:00
command -v readelf ||
command -v eu-readelf ||
command -v llvm-readelf
2021-07-03 10:23:04 +00:00
)"} || cmd_elf=ldd
2020-11-06 06:45:56 +00:00
2020-05-21 07:38:07 +00:00
# Store the date and time of script invocation to be used as the name of
# the log files the package manager creates uring builds.
time=$(date +%Y-%m-%d-%H:%M)
2020-01-28 08:08:15 +00:00
# Make note of the user's current ID to do root checks later on.
# This is used enough to warrant a place here.
2020-02-10 18:02:45 +00:00
uid=$(id -u)
create_tmp_dirs
2019-06-13 14:48:08 +00:00
args "$@"
}
main "$@"