1 /*---------------------------------------------------------------------\
3 | |__ / \ / / . \ . \ |
8 \---------------------------------------------------------------------*/
9 /** \file zypp/target/TargetImpl.cc
19 #include <sys/types.h>
22 #include "zypp/base/LogTools.h"
23 #include "zypp/base/Exception.h"
24 #include "zypp/base/Iterator.h"
25 #include "zypp/base/Gettext.h"
26 #include "zypp/base/IOStream.h"
27 #include "zypp/base/Functional.h"
28 #include "zypp/base/UserRequestException.h"
29 #include "zypp/base/Json.h"
31 #include "zypp/ZConfig.h"
32 #include "zypp/ZYppFactory.h"
33 #include "zypp/PathInfo.h"
35 #include "zypp/PoolItem.h"
36 #include "zypp/ResObjects.h"
38 #include "zypp/TmpPath.h"
39 #include "zypp/RepoStatus.h"
40 #include "zypp/ExternalProgram.h"
41 #include "zypp/Repository.h"
42 #include "zypp/ShutdownLock_p.h"
44 #include "zypp/ResFilters.h"
45 #include "zypp/HistoryLog.h"
46 #include "zypp/target/TargetImpl.h"
47 #include "zypp/target/TargetCallbackReceiver.h"
48 #include "zypp/target/rpm/librpmDb.h"
49 #include "zypp/target/CommitPackageCache.h"
50 #include "zypp/target/RpmPostTransCollector.h"
52 #include "zypp/parser/ProductFileReader.h"
53 #include "zypp/repo/SrcPackageProvider.h"
55 #include "zypp/sat/Pool.h"
56 #include "zypp/sat/detail/PoolImpl.h"
57 #include "zypp/sat/SolvableSpec.h"
58 #include "zypp/sat/Transaction.h"
60 #include "zypp/PluginExecutor.h"
64 ///////////////////////////////////////////////////////////////////
67 #include <solv/repo_rpmdb.h>
73 inline std::string rpmDbStateHash( const Pathname & root_r )
76 AutoDispose<void*> state { ::rpm_state_create( sat::Pool::instance().get(), root_r.c_str() ), ::rpm_state_free };
77 AutoDispose<Chksum*> chk { ::solv_chksum_create( REPOKEY_TYPE_SHA1 ), []( Chksum *chk ) -> void {
78 ::solv_chksum_free( chk, nullptr );
80 if ( ::rpm_hash_database_state( state, chk ) == 0 )
83 const unsigned char * md5 = ::solv_chksum_get( chk, &md5l );
84 ret = ::pool_bin2hex( sat::Pool::instance().get(), md5, md5l );
87 WAR << "rpm_hash_database_state failed" << endl;
91 inline RepoStatus rpmDbRepoStatus( const Pathname & root_r )
92 { return RepoStatus( rpmDbStateHash( root_r ), Date() ); }
96 ///////////////////////////////////////////////////////////////////
98 ///////////////////////////////////////////////////////////////////
101 /////////////////////////////////////////////////////////////////
104 // HACK for bnc#906096: let pool re-evaluate multiversion spec
105 // if target root changes. ZConfig returns data sensitive to
106 // current target root.
107 inline void sigMultiversionSpecChanged()
109 sat::detail::PoolMember::myPool().multiversionSpecChanged();
112 /////////////////////////////////////////////////////////////////
114 ///////////////////////////////////////////////////////////////////
117 // Lazy via template specialisation / should switch to overloading
120 inline std::string toJSON( const ZYppCommitResult::TransactionStepList & steps_r )
122 using sat::Transaction;
125 for ( const Transaction::Step & step : steps_r )
126 // ignore implicit deletes due to obsoletes and non-package actions
127 if ( step.stepType() != Transaction::TRANSACTION_IGNORE )
133 /** See \ref commitbegin on page \ref plugin-commit for the specs. */
135 inline std::string toJSON( const sat::Transaction::Step & step_r )
137 static const std::string strType( "type" );
138 static const std::string strStage( "stage" );
139 static const std::string strSolvable( "solvable" );
141 static const std::string strTypeDel( "-" );
142 static const std::string strTypeIns( "+" );
143 static const std::string strTypeMul( "M" );
145 static const std::string strStageDone( "ok" );
146 static const std::string strStageFailed( "err" );
148 static const std::string strSolvableN( "n" );
149 static const std::string strSolvableE( "e" );
150 static const std::string strSolvableV( "v" );
151 static const std::string strSolvableR( "r" );
152 static const std::string strSolvableA( "a" );
154 using sat::Transaction;
157 switch ( step_r.stepType() )
159 case Transaction::TRANSACTION_IGNORE: /*empty*/ break;
160 case Transaction::TRANSACTION_ERASE: ret.add( strType, strTypeDel ); break;
161 case Transaction::TRANSACTION_INSTALL: ret.add( strType, strTypeIns ); break;
162 case Transaction::TRANSACTION_MULTIINSTALL: ret.add( strType, strTypeMul ); break;
165 switch ( step_r.stepStage() )
167 case Transaction::STEP_TODO: /*empty*/ break;
168 case Transaction::STEP_DONE: ret.add( strStage, strStageDone ); break;
169 case Transaction::STEP_ERROR: ret.add( strStage, strStageFailed ); break;
176 if ( sat::Solvable solv = step_r.satSolvable() )
178 ident = solv.ident();
184 // deleted package; post mortem data stored in Transaction::Step
185 ident = step_r.ident();
186 ed = step_r.edition();
187 arch = step_r.arch();
191 { strSolvableN, ident.asString() },
192 { strSolvableV, ed.version() },
193 { strSolvableR, ed.release() },
194 { strSolvableA, arch.asString() }
196 if ( Edition::epoch_t epoch = ed.epoch() )
197 s.add( strSolvableE, epoch );
199 ret.add( strSolvable, s );
205 ///////////////////////////////////////////////////////////////////
207 ///////////////////////////////////////////////////////////////////
210 ///////////////////////////////////////////////////////////////////
213 SolvIdentFile::Data getUserInstalledFromHistory( const Pathname & historyFile_r )
215 SolvIdentFile::Data onSystemByUserList;
216 // go and parse it: 'who' must constain an '@', then it was installed by user request.
217 // 2009-09-29 07:25:19|install|lirc-remotes|0.8.5-3.2|x86_64|root@opensuse|InstallationImage|a204211eb0...
218 std::ifstream infile( historyFile_r.c_str() );
219 for( iostr::EachLine in( infile ); in; in.next() )
221 const char * ch( (*in).c_str() );
223 if ( *ch < '1' || '9' < *ch )
225 const char * sep1 = ::strchr( ch, '|' ); // | after date
229 // if logs an install or delete
230 bool installs = true;
231 if ( ::strncmp( sep1, "install|", 8 ) )
233 if ( ::strncmp( sep1, "remove |", 8 ) )
234 continue; // no install and no remove
236 installs = false; // remove
238 sep1 += 8; // | after what
239 // get the package name
240 const char * sep2 = ::strchr( sep1, '|' ); // | after name
241 if ( !sep2 || sep1 == sep2 )
243 (*in)[sep2-ch] = '\0';
244 IdString pkg( sep1 );
245 // we're done, if a delete
248 onSystemByUserList.erase( pkg );
251 // now guess whether user installed or not (3rd next field contains 'user@host')
252 if ( (sep1 = ::strchr( sep2+1, '|' )) // | after version
253 && (sep1 = ::strchr( sep1+1, '|' )) // | after arch
254 && (sep2 = ::strchr( sep1+1, '|' )) ) // | after who
256 (*in)[sep2-ch] = '\0';
257 if ( ::strchr( sep1+1, '@' ) )
260 onSystemByUserList.insert( pkg );
265 MIL << "onSystemByUserList found: " << onSystemByUserList.size() << endl;
266 return onSystemByUserList;
269 ///////////////////////////////////////////////////////////////////
271 ///////////////////////////////////////////////////////////////////
274 inline PluginFrame transactionPluginFrame( const std::string & command_r, ZYppCommitResult::TransactionStepList & steps_r )
276 return PluginFrame( command_r, json::Object {
277 { "TransactionStepList", steps_r }
281 ///////////////////////////////////////////////////////////////////
283 /** \internal Manage writing a new testcase when doing an upgrade. */
284 void writeUpgradeTestcase()
286 unsigned toKeep( ZConfig::instance().solver_upgradeTestcasesToKeep() );
287 MIL << "Testcases to keep: " << toKeep << endl;
290 Target_Ptr target( getZYpp()->getTarget() );
293 WAR << "No Target no Testcase!" << endl;
297 std::string stem( "updateTestcase" );
298 Pathname dir( target->assertRootPrefix("/var/log/") );
299 Pathname next( dir / Date::now().form( stem+"-%Y-%m-%d-%H-%M-%S" ) );
302 std::list<std::string> content;
303 filesystem::readdir( content, dir, /*dots*/false );
304 std::set<std::string> cases;
305 for_( c, content.begin(), content.end() )
307 if ( str::startsWith( *c, stem ) )
310 if ( cases.size() >= toKeep )
312 unsigned toDel = cases.size() - toKeep + 1; // +1 for the new one
313 for_( c, cases.begin(), cases.end() )
315 filesystem::recursive_rmdir( dir/(*c) );
322 MIL << "Write new testcase " << next << endl;
323 getZYpp()->resolver()->createSolverTestcase( next.asString(), false/*no solving*/ );
326 ///////////////////////////////////////////////////////////////////
328 { /////////////////////////////////////////////////////////////////
330 /** Execute script and report against report_r.
331 * Return \c std::pair<bool,PatchScriptReport::Action> to indicate if
332 * execution was successfull (<tt>first = true</tt>), or the desired
333 * \c PatchScriptReport::Action in case execution failed
334 * (<tt>first = false</tt>).
336 * \note The packager is responsible for setting the correct permissions
337 * of the script. If the script is not executable it is reported as an
338 * error. We must not modify the permessions.
340 std::pair<bool,PatchScriptReport::Action> doExecuteScript( const Pathname & root_r,
341 const Pathname & script_r,
342 callback::SendReport<PatchScriptReport> & report_r )
344 MIL << "Execute script " << PathInfo(Pathname::assertprefix( root_r,script_r)) << endl;
346 HistoryLog historylog;
347 historylog.comment(script_r.asString() + _(" executed"), /*timestamp*/true);
348 ExternalProgram prog( script_r.asString(), ExternalProgram::Stderr_To_Stdout, false, -1, true, root_r );
350 for ( std::string output = prog.receiveLine(); output.length(); output = prog.receiveLine() )
352 historylog.comment(output);
353 if ( ! report_r->progress( PatchScriptReport::OUTPUT, output ) )
355 WAR << "User request to abort script " << script_r << endl;
357 // the rest is handled by exit code evaluation
358 // in case the script has meanwhile finished.
362 std::pair<bool,PatchScriptReport::Action> ret( std::make_pair( false, PatchScriptReport::ABORT ) );
364 if ( prog.close() != 0 )
366 ret.second = report_r->problem( prog.execError() );
367 WAR << "ACTION" << ret.second << "(" << prog.execError() << ")" << endl;
368 std::ostringstream sstr;
369 sstr << script_r << _(" execution failed") << " (" << prog.execError() << ")" << endl;
370 historylog.comment(sstr.str(), /*timestamp*/true);
379 /** Execute script and report against report_r.
380 * Return \c false if user requested \c ABORT.
382 bool executeScript( const Pathname & root_r,
383 const Pathname & script_r,
384 callback::SendReport<PatchScriptReport> & report_r )
386 std::pair<bool,PatchScriptReport::Action> action( std::make_pair( false, PatchScriptReport::ABORT ) );
389 action = doExecuteScript( root_r, script_r, report_r );
391 return true; // success
393 switch ( action.second )
395 case PatchScriptReport::ABORT:
396 WAR << "User request to abort at script " << script_r << endl;
397 return false; // requested abort.
400 case PatchScriptReport::IGNORE:
401 WAR << "User request to skip script " << script_r << endl;
402 return true; // requested skip.
405 case PatchScriptReport::RETRY:
408 } while ( action.second == PatchScriptReport::RETRY );
410 // THIS is not intended to be reached:
411 INT << "Abort on unknown ACTION request " << action.second << " returned" << endl;
412 return false; // abort.
415 /** Look for update scripts named 'name-version-release-*' and
416 * execute them. Return \c false if \c ABORT was requested.
418 * \see http://en.opensuse.org/Software_Management/Code11/Scripts_and_Messages
420 bool RunUpdateScripts( const Pathname & root_r,
421 const Pathname & scriptsPath_r,
422 const std::vector<sat::Solvable> & checkPackages_r,
425 if ( checkPackages_r.empty() )
426 return true; // no installed packages to check
428 MIL << "Looking for new update scripts in (" << root_r << ")" << scriptsPath_r << endl;
429 Pathname scriptsDir( Pathname::assertprefix( root_r, scriptsPath_r ) );
430 if ( ! PathInfo( scriptsDir ).isDir() )
431 return true; // no script dir
433 std::list<std::string> scripts;
434 filesystem::readdir( scripts, scriptsDir, /*dots*/false );
435 if ( scripts.empty() )
436 return true; // no scripts in script dir
438 // Now collect and execute all matching scripts.
439 // On ABORT: at least log all outstanding scripts.
440 // - "name-version-release"
441 // - "name-version-release-*"
443 std::map<std::string, Pathname> unify; // scripts <md5,path>
444 for_( it, checkPackages_r.begin(), checkPackages_r.end() )
446 std::string prefix( str::form( "%s-%s", it->name().c_str(), it->edition().c_str() ) );
447 for_( sit, scripts.begin(), scripts.end() )
449 if ( ! str::hasPrefix( *sit, prefix ) )
452 if ( (*sit)[prefix.size()] != '\0' && (*sit)[prefix.size()] != '-' )
453 continue; // if not exact match it had to continue with '-'
455 PathInfo script( scriptsDir / *sit );
456 Pathname localPath( scriptsPath_r/(*sit) ); // without root prefix
457 std::string unifytag; // must not stay empty
459 if ( script.isFile() )
461 // Assert it's set executable, unify by md5sum.
462 filesystem::addmod( script.path(), 0500 );
463 unifytag = filesystem::md5sum( script.path() );
465 else if ( ! script.isExist() )
467 // Might be a dangling symlink, might be ok if we are in
468 // instsys (absolute symlink within the system below /mnt).
469 // readlink will tell....
470 unifytag = filesystem::readlink( script.path() ).asString();
473 if ( unifytag.empty() )
477 if ( unify[unifytag].empty() )
479 unify[unifytag] = localPath;
483 // translators: We may find the same script content in files with different names.
484 // Only the first occurence is executed, subsequent ones are skipped. It's a one-line
485 // message for a log file. Preferably start translation with "%s"
486 std::string msg( str::form(_("%s already executed as %s)"), localPath.asString().c_str(), unify[unifytag].c_str() ) );
487 MIL << "Skip update script: " << msg << endl;
488 HistoryLog().comment( msg, /*timestamp*/true );
492 if ( abort || aborting_r )
494 WAR << "Aborting: Skip update script " << *sit << endl;
495 HistoryLog().comment(
496 localPath.asString() + _(" execution skipped while aborting"),
501 MIL << "Found update script " << *sit << endl;
502 callback::SendReport<PatchScriptReport> report;
503 report->start( make<Package>( *it ), script.path() );
505 if ( ! executeScript( root_r, localPath, report ) ) // script path without root prefix!
506 abort = true; // requested abort.
513 ///////////////////////////////////////////////////////////////////
515 ///////////////////////////////////////////////////////////////////
517 inline void copyTo( std::ostream & out_r, const Pathname & file_r )
519 std::ifstream infile( file_r.c_str() );
520 for( iostr::EachLine in( infile ); in; in.next() )
522 out_r << *in << endl;
526 inline std::string notificationCmdSubst( const std::string & cmd_r, const UpdateNotificationFile & notification_r )
528 std::string ret( cmd_r );
529 #define SUBST_IF(PAT,VAL) if ( ret.find( PAT ) != std::string::npos ) ret = str::gsub( ret, PAT, VAL )
530 SUBST_IF( "%p", notification_r.solvable().asString() );
531 SUBST_IF( "%P", notification_r.file().asString() );
536 void sendNotification( const Pathname & root_r,
537 const UpdateNotifications & notifications_r )
539 if ( notifications_r.empty() )
542 std::string cmdspec( ZConfig::instance().updateMessagesNotify() );
543 MIL << "Notification command is '" << cmdspec << "'" << endl;
544 if ( cmdspec.empty() )
547 std::string::size_type pos( cmdspec.find( '|' ) );
548 if ( pos == std::string::npos )
550 ERR << "Can't send Notification: Missing 'format |' in command spec." << endl;
551 HistoryLog().comment( str::Str() << _("Error sending update message notification."), /*timestamp*/true );
555 std::string formatStr( str::toLower( str::trim( cmdspec.substr( 0, pos ) ) ) );
556 std::string commandStr( str::trim( cmdspec.substr( pos + 1 ) ) );
558 enum Format { UNKNOWN, NONE, SINGLE, DIGEST, BULK };
559 Format format = UNKNOWN;
560 if ( formatStr == "none" )
562 else if ( formatStr == "single" )
564 else if ( formatStr == "digest" )
566 else if ( formatStr == "bulk" )
570 ERR << "Can't send Notification: Unknown format '" << formatStr << " |' in command spec." << endl;
571 HistoryLog().comment( str::Str() << _("Error sending update message notification."), /*timestamp*/true );
575 // Take care: commands are ececuted chroot(root_r). The message file
576 // pathnames in notifications_r are local to root_r. For physical access
577 // to the file they need to be prefixed.
579 if ( format == NONE || format == SINGLE )
581 for_( it, notifications_r.begin(), notifications_r.end() )
583 std::vector<std::string> command;
584 if ( format == SINGLE )
585 command.push_back( "<"+Pathname::assertprefix( root_r, it->file() ).asString() );
586 str::splitEscaped( notificationCmdSubst( commandStr, *it ), std::back_inserter( command ) );
588 ExternalProgram prog( command, ExternalProgram::Stderr_To_Stdout, false, -1, true, root_r );
589 if ( true ) // Wait for feedback
591 for( std::string line = prog.receiveLine(); ! line.empty(); line = prog.receiveLine() )
595 int ret = prog.close();
598 ERR << "Notification command returned with error (" << ret << ")." << endl;
599 HistoryLog().comment( str::Str() << _("Error sending update message notification."), /*timestamp*/true );
605 else if ( format == DIGEST || format == BULK )
607 filesystem::TmpFile tmpfile;
608 ofstream out( tmpfile.path().c_str() );
609 for_( it, notifications_r.begin(), notifications_r.end() )
611 if ( format == DIGEST )
613 out << it->file() << endl;
615 else if ( format == BULK )
617 copyTo( out << '\f', Pathname::assertprefix( root_r, it->file() ) );
621 std::vector<std::string> command;
622 command.push_back( "<"+tmpfile.path().asString() ); // redirect input
623 str::splitEscaped( notificationCmdSubst( commandStr, *notifications_r.begin() ), std::back_inserter( command ) );
625 ExternalProgram prog( command, ExternalProgram::Stderr_To_Stdout, false, -1, true, root_r );
626 if ( true ) // Wait for feedback otherwise the TmpFile goes out of scope.
628 for( std::string line = prog.receiveLine(); ! line.empty(); line = prog.receiveLine() )
632 int ret = prog.close();
635 ERR << "Notification command returned with error (" << ret << ")." << endl;
636 HistoryLog().comment( str::Str() << _("Error sending update message notification."), /*timestamp*/true );
643 INT << "Can't send Notification: Missing handler for 'format |' in command spec." << endl;
644 HistoryLog().comment( str::Str() << _("Error sending update message notification."), /*timestamp*/true );
650 /** Look for update messages named 'name-version-release-*' and
651 * send notification according to \ref ZConfig::updateMessagesNotify.
653 * \see http://en.opensuse.org/Software_Management/Code11/Scripts_and_Messages
655 void RunUpdateMessages( const Pathname & root_r,
656 const Pathname & messagesPath_r,
657 const std::vector<sat::Solvable> & checkPackages_r,
658 ZYppCommitResult & result_r )
660 if ( checkPackages_r.empty() )
661 return; // no installed packages to check
663 MIL << "Looking for new update messages in (" << root_r << ")" << messagesPath_r << endl;
664 Pathname messagesDir( Pathname::assertprefix( root_r, messagesPath_r ) );
665 if ( ! PathInfo( messagesDir ).isDir() )
666 return; // no messages dir
668 std::list<std::string> messages;
669 filesystem::readdir( messages, messagesDir, /*dots*/false );
670 if ( messages.empty() )
671 return; // no messages in message dir
673 // Now collect all matching messages in result and send them
674 // - "name-version-release"
675 // - "name-version-release-*"
676 HistoryLog historylog;
677 for_( it, checkPackages_r.begin(), checkPackages_r.end() )
679 std::string prefix( str::form( "%s-%s", it->name().c_str(), it->edition().c_str() ) );
680 for_( sit, messages.begin(), messages.end() )
682 if ( ! str::hasPrefix( *sit, prefix ) )
685 if ( (*sit)[prefix.size()] != '\0' && (*sit)[prefix.size()] != '-' )
686 continue; // if not exact match it had to continue with '-'
688 PathInfo message( messagesDir / *sit );
689 if ( ! message.isFile() || message.size() == 0 )
692 MIL << "Found update message " << *sit << endl;
693 Pathname localPath( messagesPath_r/(*sit) ); // without root prefix
694 result_r.rUpdateMessages().push_back( UpdateNotificationFile( *it, localPath ) );
695 historylog.comment( str::Str() << _("New update message") << " " << localPath, /*timestamp*/true );
698 sendNotification( root_r, result_r.updateMessages() );
701 /** jsc#SLE-5116: Log patch status changes to history.
702 * Adjust precomputed set if transaction is incomplete.
704 void logPatchStatusChanges( const sat::Transaction & transaction_r, TargetImpl & target_r )
706 ResPool::ChangedPseudoInstalled changedPseudoInstalled { ResPool::instance().changedPseudoInstalled() };
707 if ( changedPseudoInstalled.empty() )
710 if ( ! transaction_r.actionEmpty( ~sat::Transaction::STEP_DONE ) )
712 // Need to recompute the patch list if commit is incomplete!
713 // We remember the initially established status, then reload the
714 // Target to get the current patch status. Then compare.
715 WAR << "Need to recompute the patch status changes as commit is incomplete!" << endl;
716 ResPool::EstablishedStates establishedStates{ ResPool::instance().establishedStates() };
718 changedPseudoInstalled = establishedStates.changedPseudoInstalled();
721 HistoryLog historylog;
722 for ( const auto & el : changedPseudoInstalled )
723 historylog.patchStateChange( el.first, el.second );
726 /////////////////////////////////////////////////////////////////
728 ///////////////////////////////////////////////////////////////////
730 void XRunUpdateMessages( const Pathname & root_r,
731 const Pathname & messagesPath_r,
732 const std::vector<sat::Solvable> & checkPackages_r,
733 ZYppCommitResult & result_r )
734 { RunUpdateMessages( root_r, messagesPath_r, checkPackages_r, result_r ); }
736 ///////////////////////////////////////////////////////////////////
738 IMPL_PTR_TYPE(TargetImpl);
740 ///////////////////////////////////////////////////////////////////
742 // METHOD NAME : TargetImpl::TargetImpl
743 // METHOD TYPE : Ctor
745 TargetImpl::TargetImpl( const Pathname & root_r, bool doRebuild_r )
747 , _requestedLocalesFile( home() / "RequestedLocales" )
748 , _autoInstalledFile( home() / "AutoInstalled" )
749 , _hardLocksFile( Pathname::assertprefix( _root, ZConfig::instance().locksFile() ) )
751 _rpm.initDatabase( root_r, doRebuild_r );
753 HistoryLog::setRoot(_root);
756 sigMultiversionSpecChanged(); // HACK: see sigMultiversionSpecChanged
757 MIL << "Initialized target on " << _root << endl;
761 * generates a random id using uuidgen
763 static std::string generateRandomId()
765 std::ifstream uuidprovider( "/proc/sys/kernel/random/uuid" );
766 return iostr::getline( uuidprovider );
770 * updates the content of \p filename
771 * if \p condition is true, setting the content
772 * the the value returned by \p value
774 void updateFileContent( const Pathname &filename,
775 boost::function<bool ()> condition,
776 boost::function<string ()> value )
778 string val = value();
779 // if the value is empty, then just dont
780 // do anything, regardless of the condition
786 MIL << "updating '" << filename << "' content." << endl;
788 // if the file does not exist we need to generate the uuid file
790 std::ofstream filestr;
791 // make sure the path exists
792 filesystem::assert_dir( filename.dirname() );
793 filestr.open( filename.c_str() );
795 if ( filestr.good() )
802 // FIXME, should we ignore the error?
803 ZYPP_THROW(Exception("Can't openfile '" + filename.asString() + "' for writing"));
808 /** helper functor */
809 static bool fileMissing( const Pathname &pathname )
811 return ! PathInfo(pathname).isExist();
814 void TargetImpl::createAnonymousId() const
816 // bsc#1024741: Omit creating a new uid for chrooted systems (if it already has one, fine)
820 // Create the anonymous unique id, used for download statistics
821 Pathname idpath( home() / "AnonymousUniqueId");
825 updateFileContent( idpath,
826 boost::bind(fileMissing, idpath),
829 catch ( const Exception &e )
831 WAR << "Can't create anonymous id file" << endl;
836 void TargetImpl::createLastDistributionFlavorCache() const
838 // create the anonymous unique id
839 // this value is used for statistics
840 Pathname flavorpath( home() / "LastDistributionFlavor");
842 // is there a product
843 Product::constPtr p = baseProduct();
846 WAR << "No base product, I won't create flavor cache" << endl;
850 string flavor = p->flavor();
855 updateFileContent( flavorpath,
856 // only if flavor is not empty
857 functor::Constant<bool>( ! flavor.empty() ),
858 functor::Constant<string>(flavor) );
860 catch ( const Exception &e )
862 WAR << "Can't create flavor cache" << endl;
867 ///////////////////////////////////////////////////////////////////
869 // METHOD NAME : TargetImpl::~TargetImpl
870 // METHOD TYPE : Dtor
872 TargetImpl::~TargetImpl()
874 _rpm.closeDatabase();
875 sigMultiversionSpecChanged(); // HACK: see sigMultiversionSpecChanged
876 MIL << "Targets closed" << endl;
879 ///////////////////////////////////////////////////////////////////
881 // solv file handling
883 ///////////////////////////////////////////////////////////////////
885 Pathname TargetImpl::defaultSolvfilesPath() const
887 return Pathname::assertprefix( _root, ZConfig::instance().repoSolvfilesPath() / sat::Pool::instance().systemRepoAlias() );
890 void TargetImpl::clearCache()
892 Pathname base = solvfilesPath();
893 filesystem::recursive_rmdir( base );
896 bool TargetImpl::buildCache()
898 Pathname base = solvfilesPath();
899 Pathname rpmsolv = base/"solv";
900 Pathname rpmsolvcookie = base/"cookie";
902 bool build_rpm_solv = true;
903 // lets see if the rpm solv cache exists
905 RepoStatus rpmstatus( rpmDbRepoStatus(_root) && RepoStatus(_root/"etc/products.d") );
907 bool solvexisted = PathInfo(rpmsolv).isExist();
910 // see the status of the cache
911 PathInfo cookie( rpmsolvcookie );
912 MIL << "Read cookie: " << cookie << endl;
913 if ( cookie.isExist() )
915 RepoStatus status = RepoStatus::fromCookieFile(rpmsolvcookie);
916 // now compare it with the rpm database
917 if ( status == rpmstatus )
918 build_rpm_solv = false;
919 MIL << "Read cookie: " << rpmsolvcookie << " says: "
920 << (build_rpm_solv ? "outdated" : "uptodate") << endl;
924 if ( build_rpm_solv )
926 // if the solvfile dir does not exist yet, we better create it
927 filesystem::assert_dir( base );
929 Pathname oldSolvFile( solvexisted ? rpmsolv : Pathname() ); // to speedup rpmdb2solv
931 filesystem::TmpFile tmpsolv( filesystem::TmpFile::makeSibling( rpmsolv ) );
934 // Can't create temporary solv file, usually due to insufficient permission
935 // (user query while @System solv needs refresh). If so, try switching
936 // to a location within zypps temp. space (will be cleaned at application end).
938 bool switchingToTmpSolvfile = false;
939 Exception ex("Failed to cache rpm database.");
940 ex.remember(str::form("Cannot create temporary file under %s.", base.c_str()));
942 if ( ! solvfilesPathIsTemp() )
944 base = getZYpp()->tmpPath() / sat::Pool::instance().systemRepoAlias();
945 rpmsolv = base/"solv";
946 rpmsolvcookie = base/"cookie";
948 filesystem::assert_dir( base );
949 tmpsolv = filesystem::TmpFile::makeSibling( rpmsolv );
953 WAR << "Using a temporary solv file at " << base << endl;
954 switchingToTmpSolvfile = true;
955 _tmpSolvfilesPath = base;
959 ex.remember(str::form("Cannot create temporary file under %s.", base.c_str()));
963 if ( ! switchingToTmpSolvfile )
969 // Take care we unlink the solvfile on exception
970 ManagedFile guard( base, filesystem::recursive_rmdir );
972 ExternalProgram::Arguments cmd;
973 cmd.push_back( "rpmdb2solv" );
974 if ( ! _root.empty() ) {
975 cmd.push_back( "-r" );
976 cmd.push_back( _root.asString() );
978 cmd.push_back( "-X" ); // autogenerate pattern/product/... from -package
979 // bsc#1104415: no more application support // cmd.push_back( "-A" ); // autogenerate application pseudo packages
980 cmd.push_back( "-p" );
981 cmd.push_back( Pathname::assertprefix( _root, "/etc/products.d" ).asString() );
983 if ( ! oldSolvFile.empty() )
984 cmd.push_back( oldSolvFile.asString() );
986 cmd.push_back( "-o" );
987 cmd.push_back( tmpsolv.path().asString() );
989 ExternalProgram prog( cmd, ExternalProgram::Stderr_To_Stdout );
990 std::string errdetail;
992 for ( std::string output( prog.receiveLine() ); output.length(); output = prog.receiveLine() ) {
993 WAR << " " << output;
994 if ( errdetail.empty() ) {
995 errdetail = prog.command();
1001 int ret = prog.close();
1004 Exception ex(str::form("Failed to cache rpm database (%d).", ret));
1005 ex.remember( errdetail );
1009 ret = filesystem::rename( tmpsolv, rpmsolv );
1011 ZYPP_THROW(Exception("Failed to move cache to final destination"));
1012 // if this fails, don't bother throwing exceptions
1013 filesystem::chmod( rpmsolv, 0644 );
1015 rpmstatus.saveToCookieFile(rpmsolvcookie);
1018 guard.resetDispose();
1019 sat::updateSolvFileIndex( rpmsolv ); // content digest for zypper bash completion
1021 // system-hook: Finally send notification to plugins
1022 if ( root() == "/" )
1024 PluginExecutor plugins;
1025 plugins.load( ZConfig::instance().pluginsPath()/"system" );
1027 plugins.send( PluginFrame( "PACKAGESETCHANGED" ) );
1032 // On the fly add missing solv.idx files for bash completion.
1033 if ( ! PathInfo(base/"solv.idx").isExist() )
1034 sat::updateSolvFileIndex( rpmsolv );
1036 return build_rpm_solv;
1039 void TargetImpl::reload()
1044 void TargetImpl::unload()
1046 Repository system( sat::Pool::instance().findSystemRepo() );
1048 system.eraseFromPool();
1051 void TargetImpl::load( bool force )
1053 bool newCache = buildCache();
1054 MIL << "New cache built: " << (newCache?"true":"false") <<
1055 ", force loading: " << (force?"true":"false") << endl;
1057 // now add the repos to the pool
1058 sat::Pool satpool( sat::Pool::instance() );
1059 Pathname rpmsolv( solvfilesPath() / "solv" );
1060 MIL << "adding " << rpmsolv << " to pool(" << satpool.systemRepoAlias() << ")" << endl;
1062 // Providing an empty system repo, unload any old content
1063 Repository system( sat::Pool::instance().findSystemRepo() );
1065 if ( system && ! system.solvablesEmpty() )
1067 if ( newCache || force )
1069 system.eraseFromPool(); // invalidates system
1073 return; // nothing to do
1079 system = satpool.systemRepo();
1084 MIL << "adding " << rpmsolv << " to system" << endl;
1085 system.addSolv( rpmsolv );
1087 catch ( const Exception & exp )
1090 MIL << "Try to handle exception by rebuilding the solv-file" << endl;
1094 system.addSolv( rpmsolv );
1096 satpool.rootDir( _root );
1098 // (Re)Load the requested locales et al.
1099 // If the requested locales are empty, we leave the pool untouched
1100 // to avoid undoing changes the application applied. We expect this
1101 // to happen on a bare metal installation only. An already existing
1102 // target should be loaded before its settings are changed.
1104 const LocaleSet & requestedLocales( _requestedLocalesFile.locales() );
1105 if ( ! requestedLocales.empty() )
1107 satpool.initRequestedLocales( requestedLocales );
1111 if ( ! PathInfo( _autoInstalledFile.file() ).isExist() )
1113 // Initialize from history, if it does not exist
1114 Pathname historyFile( Pathname::assertprefix( _root, ZConfig::instance().historyLogFile() ) );
1115 if ( PathInfo( historyFile ).isExist() )
1117 SolvIdentFile::Data onSystemByUser( getUserInstalledFromHistory( historyFile ) );
1118 SolvIdentFile::Data onSystemByAuto;
1119 for_( it, system.solvablesBegin(), system.solvablesEnd() )
1121 IdString ident( (*it).ident() );
1122 if ( onSystemByUser.find( ident ) == onSystemByUser.end() )
1123 onSystemByAuto.insert( ident );
1125 _autoInstalledFile.setData( onSystemByAuto );
1127 // on the fly removed any obsolete SoftLocks file
1128 filesystem::unlink( home() / "SoftLocks" );
1130 // read from AutoInstalled file
1132 for ( const auto & idstr : _autoInstalledFile.data() )
1133 q.push( idstr.id() );
1134 satpool.setAutoInstalled( q );
1137 // Load the needreboot package specs
1139 sat::SolvableSpec needrebootSpec;
1141 Pathname needrebootFile { Pathname::assertprefix( root(), ZConfig::instance().needrebootFile() ) };
1142 if ( PathInfo( needrebootFile ).isFile() )
1143 needrebootSpec.parseFrom( needrebootFile );
1145 Pathname needrebootDir { Pathname::assertprefix( root(), ZConfig::instance().needrebootPath() ) };
1146 if ( PathInfo( needrebootDir ).isDir() )
1148 static const StrMatcher isRpmConfigBackup( "\\.rpm(new|save|orig)$", Match::REGEX );
1150 filesystem::dirForEach( needrebootDir, filesystem::matchNoDots(),
1151 [&]( const Pathname & dir_r, const char *const str_r )->bool
1153 if ( ! isRpmConfigBackup( str_r ) )
1155 Pathname needrebootFile { needrebootDir / str_r };
1156 if ( PathInfo( needrebootFile ).isFile() )
1157 needrebootSpec.parseFrom( needrebootFile );
1162 satpool.setNeedrebootSpec( std::move(needrebootSpec) );
1165 if ( ZConfig::instance().apply_locks_file() )
1167 const HardLocksFile::Data & hardLocks( _hardLocksFile.data() );
1168 if ( ! hardLocks.empty() )
1170 ResPool::instance().setHardLockQueries( hardLocks );
1174 // now that the target is loaded, we can cache the flavor
1175 createLastDistributionFlavorCache();
1177 MIL << "Target loaded: " << system.solvablesSize() << " resolvables" << endl;
1180 ///////////////////////////////////////////////////////////////////
1184 ///////////////////////////////////////////////////////////////////
1185 ZYppCommitResult TargetImpl::commit( ResPool pool_r, const ZYppCommitPolicy & policy_rX )
1187 // ----------------------------------------------------------------- //
1188 ZYppCommitPolicy policy_r( policy_rX );
1189 bool explicitDryRun = policy_r.dryRun(); // explicit dry run will trigger a fileconflict check, implicit (download-only) not.
1191 ShutdownLock lck("Zypp commit running.");
1193 // Fake outstanding YCP fix: Honour restriction to media 1
1194 // at installation, but install all remaining packages if post-boot.
1195 if ( policy_r.restrictToMedia() > 1 )
1196 policy_r.allMedia();
1198 if ( policy_r.downloadMode() == DownloadDefault ) {
1199 if ( root() == "/" )
1200 policy_r.downloadMode(DownloadInHeaps);
1202 policy_r.downloadMode(DownloadAsNeeded);
1204 // DownloadOnly implies dry-run.
1205 else if ( policy_r.downloadMode() == DownloadOnly )
1206 policy_r.dryRun( true );
1207 // ----------------------------------------------------------------- //
1209 MIL << "TargetImpl::commit(<pool>, " << policy_r << ")" << endl;
1211 ///////////////////////////////////////////////////////////////////
1212 // Compute transaction:
1213 ///////////////////////////////////////////////////////////////////
1214 ZYppCommitResult result( root() );
1215 result.rTransaction() = pool_r.resolver().getTransaction();
1216 result.rTransaction().order();
1217 // steps: this is our todo-list
1218 ZYppCommitResult::TransactionStepList & steps( result.rTransactionStepList() );
1219 if ( policy_r.restrictToMedia() )
1221 // Collect until the 1st package from an unwanted media occurs.
1222 // Further collection could violate install order.
1223 MIL << "Restrict to media number " << policy_r.restrictToMedia() << endl;
1224 for_( it, result.transaction().begin(), result.transaction().end() )
1226 if ( makeResObject( *it )->mediaNr() > 1 )
1228 steps.push_back( *it );
1233 result.rTransactionStepList().insert( steps.end(), result.transaction().begin(), result.transaction().end() );
1235 MIL << "Todo: " << result << endl;
1237 ///////////////////////////////////////////////////////////////////
1238 // Prepare execution of commit plugins:
1239 ///////////////////////////////////////////////////////////////////
1240 PluginExecutor commitPlugins;
1241 if ( root() == "/" && ! policy_r.dryRun() )
1243 commitPlugins.load( ZConfig::instance().pluginsPath()/"commit" );
1245 if ( commitPlugins )
1246 commitPlugins.send( transactionPluginFrame( "COMMITBEGIN", steps ) );
1248 ///////////////////////////////////////////////////////////////////
1249 // Write out a testcase if we're in dist upgrade mode.
1250 ///////////////////////////////////////////////////////////////////
1251 if ( pool_r.resolver().upgradeMode() || pool_r.resolver().upgradingRepos() )
1253 if ( ! policy_r.dryRun() )
1255 writeUpgradeTestcase();
1259 DBG << "dryRun: Not writing upgrade testcase." << endl;
1263 ///////////////////////////////////////////////////////////////////
1264 // Store non-package data:
1265 ///////////////////////////////////////////////////////////////////
1266 if ( ! policy_r.dryRun() )
1268 filesystem::assert_dir( home() );
1269 // requested locales
1270 _requestedLocalesFile.setLocales( pool_r.getRequestedLocales() );
1273 SolvIdentFile::Data newdata;
1274 for ( sat::Queue::value_type id : result.rTransaction().autoInstalled() )
1275 newdata.insert( IdString(id) );
1276 _autoInstalledFile.setData( newdata );
1279 if ( ZConfig::instance().apply_locks_file() )
1281 HardLocksFile::Data newdata;
1282 pool_r.getHardLockQueries( newdata );
1283 _hardLocksFile.setData( newdata );
1288 DBG << "dryRun: Not stroring non-package data." << endl;
1291 ///////////////////////////////////////////////////////////////////
1292 // First collect and display all messages
1293 // associated with patches to be installed.
1294 ///////////////////////////////////////////////////////////////////
1295 if ( ! policy_r.dryRun() )
1297 for_( it, steps.begin(), steps.end() )
1299 if ( ! it->satSolvable().isKind<Patch>() )
1303 if ( ! pi.status().isToBeInstalled() )
1306 Patch::constPtr patch( asKind<Patch>(pi.resolvable()) );
1307 if ( ! patch ||patch->message().empty() )
1310 MIL << "Show message for " << patch << endl;
1311 callback::SendReport<target::PatchMessageReport> report;
1312 if ( ! report->show( patch ) )
1314 WAR << "commit aborted by the user" << endl;
1315 ZYPP_THROW( TargetAbortedException( ) );
1321 DBG << "dryRun: Not checking patch messages." << endl;
1324 ///////////////////////////////////////////////////////////////////
1325 // Remove/install packages.
1326 ///////////////////////////////////////////////////////////////////
1327 DBG << "commit log file is set to: " << HistoryLog::fname() << endl;
1328 if ( ! policy_r.dryRun() || policy_r.downloadMode() == DownloadOnly )
1330 // Prepare the package cache. Pass all items requiring download.
1331 CommitPackageCache packageCache;
1332 packageCache.setCommitList( steps.begin(), steps.end() );
1335 if ( policy_r.downloadMode() != DownloadAsNeeded )
1337 // Preload the cache. Until now this means pre-loading all packages.
1338 // Once DownloadInHeaps is fully implemented, this will change and
1339 // we may actually have more than one heap.
1340 for_( it, steps.begin(), steps.end() )
1342 switch ( it->stepType() )
1344 case sat::Transaction::TRANSACTION_INSTALL:
1345 case sat::Transaction::TRANSACTION_MULTIINSTALL:
1346 // proceed: only install actionas may require download.
1350 // next: no download for or non-packages and delete actions.
1356 if ( pi->isKind<Package>() || pi->isKind<SrcPackage>() )
1358 ManagedFile localfile;
1361 localfile = packageCache.get( pi );
1362 localfile.resetDispose(); // keep the package file in the cache
1364 catch ( const AbortRequestException & exp )
1366 it->stepStage( sat::Transaction::STEP_ERROR );
1368 WAR << "commit cache preload aborted by the user" << endl;
1369 ZYPP_THROW( TargetAbortedException( ) );
1372 catch ( const SkipRequestException & exp )
1375 it->stepStage( sat::Transaction::STEP_ERROR );
1377 WAR << "Skipping cache preload package " << pi->asKind<Package>() << " in commit" << endl;
1380 catch ( const Exception & exp )
1382 // bnc #395704: missing catch causes abort.
1383 // TODO see if packageCache fails to handle errors correctly.
1385 it->stepStage( sat::Transaction::STEP_ERROR );
1387 INT << "Unexpected Error: Skipping cache preload package " << pi->asKind<Package>() << " in commit" << endl;
1392 packageCache.preloaded( true ); // try to avoid duplicate infoInCache CBs in commit
1397 ERR << "Some packages could not be provided. Aborting commit."<< endl;
1401 if ( ! policy_r.dryRun() )
1403 // if cache is preloaded, check for file conflicts
1404 commitFindFileConflicts( policy_r, result );
1405 commit( policy_r, packageCache, result );
1409 DBG << "dryRun/downloadOnly: Not installing/deleting anything." << endl;
1410 if ( explicitDryRun ) {
1411 // if cache is preloaded, check for file conflicts
1412 commitFindFileConflicts( policy_r, result );
1419 DBG << "dryRun: Not downloading/installing/deleting anything." << endl;
1420 if ( explicitDryRun ) {
1421 // if cache is preloaded, check for file conflicts
1422 commitFindFileConflicts( policy_r, result );
1426 ///////////////////////////////////////////////////////////////////
1427 // Send result to commit plugins:
1428 ///////////////////////////////////////////////////////////////////
1429 if ( commitPlugins )
1430 commitPlugins.send( transactionPluginFrame( "COMMITEND", steps ) );
1432 ///////////////////////////////////////////////////////////////////
1433 // Try to rebuild solv file while rpm database is still in cache
1434 ///////////////////////////////////////////////////////////////////
1435 if ( ! policy_r.dryRun() )
1440 MIL << "TargetImpl::commit(<pool>, " << policy_r << ") returns: " << result << endl;
1444 ///////////////////////////////////////////////////////////////////
1448 ///////////////////////////////////////////////////////////////////
1451 struct NotifyAttemptToModify
1453 NotifyAttemptToModify( ZYppCommitResult & result_r ) : _result( result_r ) {}
1456 { if ( _guard ) { _result.attemptToModify( true ); _guard = false; } }
1459 ZYppCommitResult & _result;
1463 void TargetImpl::commit( const ZYppCommitPolicy & policy_r,
1464 CommitPackageCache & packageCache_r,
1465 ZYppCommitResult & result_r )
1467 // steps: this is our todo-list
1468 ZYppCommitResult::TransactionStepList & steps( result_r.rTransactionStepList() );
1469 MIL << "TargetImpl::commit(<list>" << policy_r << ")" << steps.size() << endl;
1471 HistoryLog().stampCommand();
1473 // Send notification once upon 1st call to rpm
1474 NotifyAttemptToModify attemptToModify( result_r );
1478 RpmPostTransCollector postTransCollector( _root );
1479 std::vector<sat::Solvable> successfullyInstalledPackages;
1480 TargetImpl::PoolItemList remaining;
1482 for_( step, steps.begin(), steps.end() )
1484 PoolItem citem( *step );
1485 if ( step->stepType() == sat::Transaction::TRANSACTION_IGNORE )
1487 if ( citem->isKind<Package>() )
1489 // for packages this means being obsoleted (by rpm)
1490 // thius no additional action is needed.
1491 step->stepStage( sat::Transaction::STEP_DONE );
1496 if ( citem->isKind<Package>() )
1498 Package::constPtr p = citem->asKind<Package>();
1499 if ( citem.status().isToBeInstalled() )
1501 ManagedFile localfile;
1504 localfile = packageCache_r.get( citem );
1506 catch ( const AbortRequestException &e )
1508 WAR << "commit aborted by the user" << endl;
1510 step->stepStage( sat::Transaction::STEP_ERROR );
1513 catch ( const SkipRequestException &e )
1516 WAR << "Skipping package " << p << " in commit" << endl;
1517 step->stepStage( sat::Transaction::STEP_ERROR );
1520 catch ( const Exception &e )
1522 // bnc #395704: missing catch causes abort.
1523 // TODO see if packageCache fails to handle errors correctly.
1525 INT << "Unexpected Error: Skipping package " << p << " in commit" << endl;
1526 step->stepStage( sat::Transaction::STEP_ERROR );
1530 #warning Exception handling
1531 // create a installation progress report proxy
1532 RpmInstallPackageReceiver progress( citem.resolvable() );
1533 progress.connect(); // disconnected on destruction.
1535 bool success = false;
1536 rpm::RpmInstFlags flags( policy_r.rpmInstFlags() & rpm::RPMINST_JUSTDB );
1537 // Why force and nodeps?
1539 // Because zypp builds the transaction and the resolver asserts that
1540 // everything is fine.
1541 // We use rpm just to unpack and register the package in the database.
1542 // We do this step by step, so rpm is not aware of the bigger context.
1543 // So we turn off rpms internal checks, because we do it inside zypp.
1544 flags |= rpm::RPMINST_NODEPS;
1545 flags |= rpm::RPMINST_FORCE;
1547 if (p->multiversionInstall()) flags |= rpm::RPMINST_NOUPGRADE;
1548 if (policy_r.dryRun()) flags |= rpm::RPMINST_TEST;
1549 if (policy_r.rpmExcludeDocs()) flags |= rpm::RPMINST_EXCLUDEDOCS;
1550 if (policy_r.rpmNoSignature()) flags |= rpm::RPMINST_NOSIGNATURE;
1555 progress.tryLevel( target::rpm::InstallResolvableReport::RPM_NODEPS_FORCE );
1556 if ( postTransCollector.collectScriptFromPackage( localfile ) )
1557 flags |= rpm::RPMINST_NOPOSTTRANS;
1558 rpm().installPackage( localfile, flags );
1559 HistoryLog().install(citem);
1561 if ( progress.aborted() )
1563 WAR << "commit aborted by the user" << endl;
1564 localfile.resetDispose(); // keep the package file in the cache
1566 step->stepStage( sat::Transaction::STEP_ERROR );
1571 if ( citem.isNeedreboot() ) {
1572 auto rebootNeededFile = root() / "/var/run/reboot-needed";
1573 if ( filesystem::assert_file( rebootNeededFile ) == EEXIST)
1574 filesystem::touch( rebootNeededFile );
1578 step->stepStage( sat::Transaction::STEP_DONE );
1581 catch ( Exception & excpt_r )
1583 ZYPP_CAUGHT(excpt_r);
1584 localfile.resetDispose(); // keep the package file in the cache
1586 if ( policy_r.dryRun() )
1588 WAR << "dry run failed" << endl;
1589 step->stepStage( sat::Transaction::STEP_ERROR );
1593 if ( progress.aborted() )
1595 WAR << "commit aborted by the user" << endl;
1600 WAR << "Install failed" << endl;
1602 step->stepStage( sat::Transaction::STEP_ERROR );
1606 if ( success && !policy_r.dryRun() )
1608 citem.status().resetTransact( ResStatus::USER );
1609 successfullyInstalledPackages.push_back( citem.satSolvable() );
1610 step->stepStage( sat::Transaction::STEP_DONE );
1615 RpmRemovePackageReceiver progress( citem.resolvable() );
1616 progress.connect(); // disconnected on destruction.
1618 bool success = false;
1619 rpm::RpmInstFlags flags( policy_r.rpmInstFlags() & rpm::RPMINST_JUSTDB );
1620 flags |= rpm::RPMINST_NODEPS;
1621 if (policy_r.dryRun()) flags |= rpm::RPMINST_TEST;
1626 rpm().removePackage( p, flags );
1627 HistoryLog().remove(citem);
1629 if ( progress.aborted() )
1631 WAR << "commit aborted by the user" << endl;
1633 step->stepStage( sat::Transaction::STEP_ERROR );
1639 step->stepStage( sat::Transaction::STEP_DONE );
1642 catch (Exception & excpt_r)
1644 ZYPP_CAUGHT( excpt_r );
1645 if ( progress.aborted() )
1647 WAR << "commit aborted by the user" << endl;
1649 step->stepStage( sat::Transaction::STEP_ERROR );
1653 WAR << "removal of " << p << " failed";
1654 step->stepStage( sat::Transaction::STEP_ERROR );
1656 if ( success && !policy_r.dryRun() )
1658 citem.status().resetTransact( ResStatus::USER );
1659 step->stepStage( sat::Transaction::STEP_DONE );
1663 else if ( ! policy_r.dryRun() ) // other resolvables (non-Package)
1665 // Status is changed as the buddy package buddy
1666 // gets installed/deleted. Handle non-buddies only.
1667 if ( ! citem.buddy() )
1669 if ( citem->isKind<Product>() )
1671 Product::constPtr p = citem->asKind<Product>();
1672 if ( citem.status().isToBeInstalled() )
1674 ERR << "Can't install orphan product without release-package! " << citem << endl;
1678 // Deleting the corresponding product entry is all we con do.
1679 // So the product will no longer be visible as installed.
1680 std::string referenceFilename( p->referenceFilename() );
1681 if ( referenceFilename.empty() )
1683 ERR << "Can't remove orphan product without 'referenceFilename'! " << citem << endl;
1687 Pathname referencePath { Pathname("/etc/products.d") / referenceFilename }; // no root prefix for rpmdb lookup!
1688 if ( ! rpm().hasFile( referencePath.asString() ) )
1690 // If it's not owned by a package, we can delete it.
1691 referencePath = Pathname::assertprefix( _root, referencePath ); // now add a root prefix
1692 if ( filesystem::unlink( referencePath ) != 0 )
1693 ERR << "Delete orphan product failed: " << referencePath << endl;
1697 WAR << "Won't remove orphan product: '/etc/products.d/" << referenceFilename << "' is owned by a package." << endl;
1702 else if ( citem->isKind<SrcPackage>() && citem.status().isToBeInstalled() )
1704 // SrcPackage is install-only
1705 SrcPackage::constPtr p = citem->asKind<SrcPackage>();
1706 installSrcPackage( p );
1709 citem.status().resetTransact( ResStatus::USER );
1710 step->stepStage( sat::Transaction::STEP_DONE );
1713 } // other resolvables
1717 // process all remembered posttrans scripts. If aborting,
1718 // at least log omitted scripts.
1719 if ( abort || (abort = !postTransCollector.executeScripts()) )
1720 postTransCollector.discardScripts();
1722 // Check presence of update scripts/messages. If aborting,
1723 // at least log omitted scripts.
1724 if ( ! successfullyInstalledPackages.empty() )
1726 if ( ! RunUpdateScripts( _root, ZConfig::instance().update_scriptsPath(),
1727 successfullyInstalledPackages, abort ) )
1729 WAR << "Commit aborted by the user" << endl;
1732 // send messages after scripts in case some script generates output,
1733 // that should be kept in t %ghost message file.
1734 RunUpdateMessages( _root, ZConfig::instance().update_messagesPath(),
1735 successfullyInstalledPackages,
1739 // jsc#SLE-5116: Log patch status changes to history
1740 // NOTE: Should be the last action as it may need to reload
1741 // the Target in case of an incomplete transaction.
1742 logPatchStatusChanges( result_r.transaction(), *this );
1746 HistoryLog().comment( "Commit was aborted." );
1747 ZYPP_THROW( TargetAbortedException( ) );
1751 ///////////////////////////////////////////////////////////////////
1753 rpm::RpmDb & TargetImpl::rpm()
1758 bool TargetImpl::providesFile (const std::string & path_str, const std::string & name_str) const
1760 return _rpm.hasFile(path_str, name_str);
1763 ///////////////////////////////////////////////////////////////////
1766 parser::ProductFileData baseproductdata( const Pathname & root_r )
1768 parser::ProductFileData ret;
1769 PathInfo baseproduct( Pathname::assertprefix( root_r, "/etc/products.d/baseproduct" ) );
1771 if ( baseproduct.isFile() )
1775 ret = parser::ProductFileReader::scanFile( baseproduct.path() );
1777 catch ( const Exception & excpt )
1779 ZYPP_CAUGHT( excpt );
1782 else if ( PathInfo( Pathname::assertprefix( root_r, "/etc/products.d" ) ).isDir() )
1784 ERR << "baseproduct symlink is dangling or missing: " << baseproduct << endl;
1789 inline Pathname staticGuessRoot( const Pathname & root_r )
1791 if ( root_r.empty() )
1793 // empty root: use existing Target or assume "/"
1794 Pathname ret ( ZConfig::instance().systemRoot() );
1796 return Pathname("/");
1802 inline std::string firstNonEmptyLineIn( const Pathname & file_r )
1804 std::ifstream idfile( file_r.c_str() );
1805 for( iostr::EachLine in( idfile ); in; in.next() )
1807 std::string line( str::trim( *in ) );
1808 if ( ! line.empty() )
1811 return std::string();
1814 ///////////////////////////////////////////////////////////////////
1816 Product::constPtr TargetImpl::baseProduct() const
1818 ResPool pool(ResPool::instance());
1819 for_( it, pool.byKindBegin<Product>(), pool.byKindEnd<Product>() )
1821 Product::constPtr p = (*it)->asKind<Product>();
1822 if ( p->isTargetDistribution() )
1828 LocaleSet TargetImpl::requestedLocales( const Pathname & root_r )
1830 const Pathname needroot( staticGuessRoot(root_r) );
1831 const Target_constPtr target( getZYpp()->getTarget() );
1832 if ( target && target->root() == needroot )
1833 return target->requestedLocales();
1834 return RequestedLocalesFile( home(needroot) / "RequestedLocales" ).locales();
1837 void TargetImpl::updateAutoInstalled()
1839 MIL << "updateAutoInstalled if changed..." << endl;
1840 SolvIdentFile::Data newdata;
1841 for ( auto id : sat::Pool::instance().autoInstalled() )
1842 newdata.insert( IdString(id) ); // explicit ctor!
1843 _autoInstalledFile.setData( std::move(newdata) );
1846 std::string TargetImpl::targetDistribution() const
1847 { return baseproductdata( _root ).registerTarget(); }
1849 std::string TargetImpl::targetDistribution( const Pathname & root_r )
1850 { return baseproductdata( staticGuessRoot(root_r) ).registerTarget(); }
1852 std::string TargetImpl::targetDistributionRelease() const
1853 { return baseproductdata( _root ).registerRelease(); }
1855 std::string TargetImpl::targetDistributionRelease( const Pathname & root_r )
1856 { return baseproductdata( staticGuessRoot(root_r) ).registerRelease();}
1858 std::string TargetImpl::targetDistributionFlavor() const
1859 { return baseproductdata( _root ).registerFlavor(); }
1861 std::string TargetImpl::targetDistributionFlavor( const Pathname & root_r )
1862 { return baseproductdata( staticGuessRoot(root_r) ).registerFlavor();}
1864 Target::DistributionLabel TargetImpl::distributionLabel() const
1866 Target::DistributionLabel ret;
1867 parser::ProductFileData pdata( baseproductdata( _root ) );
1868 ret.shortName = pdata.shortName();
1869 ret.summary = pdata.summary();
1873 Target::DistributionLabel TargetImpl::distributionLabel( const Pathname & root_r )
1875 Target::DistributionLabel ret;
1876 parser::ProductFileData pdata( baseproductdata( staticGuessRoot(root_r) ) );
1877 ret.shortName = pdata.shortName();
1878 ret.summary = pdata.summary();
1882 std::string TargetImpl::distributionVersion() const
1884 if ( _distributionVersion.empty() )
1886 _distributionVersion = TargetImpl::distributionVersion(root());
1887 if ( !_distributionVersion.empty() )
1888 MIL << "Remember distributionVersion = '" << _distributionVersion << "'" << endl;
1890 return _distributionVersion;
1893 std::string TargetImpl::distributionVersion( const Pathname & root_r )
1895 std::string distributionVersion = baseproductdata( staticGuessRoot(root_r) ).edition().version();
1896 if ( distributionVersion.empty() )
1898 // ...But the baseproduct method is not expected to work on RedHat derivatives.
1899 // On RHEL, Fedora and others the "product version" is determined by the first package
1900 // providing 'system-release'. This value is not hardcoded in YUM and can be configured
1901 // with the $distroverpkg variable.
1902 scoped_ptr<rpm::RpmDb> tmprpmdb;
1903 if ( ZConfig::instance().systemRoot() == Pathname() )
1907 tmprpmdb.reset( new rpm::RpmDb );
1908 tmprpmdb->initDatabase( /*default ctor uses / but no additional keyring exports */ );
1915 rpm::librpmDb::db_const_iterator it;
1916 if ( it.findByProvides( ZConfig::instance().distroverpkg() ) )
1917 distributionVersion = it->tag_version();
1919 return distributionVersion;
1923 std::string TargetImpl::distributionFlavor() const
1925 return firstNonEmptyLineIn( home() / "LastDistributionFlavor" );
1928 std::string TargetImpl::distributionFlavor( const Pathname & root_r )
1930 return firstNonEmptyLineIn( staticGuessRoot(root_r) / "/var/lib/zypp/LastDistributionFlavor" );
1933 ///////////////////////////////////////////////////////////////////
1936 std::string guessAnonymousUniqueId( const Pathname & root_r )
1938 // bsc#1024741: Omit creating a new uid for chrooted systems (if it already has one, fine)
1939 std::string ret( firstNonEmptyLineIn( root_r / "/var/lib/zypp/AnonymousUniqueId" ) );
1940 if ( ret.empty() && root_r != "/" )
1942 // if it has nonoe, use the outer systems one
1943 ret = firstNonEmptyLineIn( "/var/lib/zypp/AnonymousUniqueId" );
1949 std::string TargetImpl::anonymousUniqueId() const
1951 return guessAnonymousUniqueId( root() );
1954 std::string TargetImpl::anonymousUniqueId( const Pathname & root_r )
1956 return guessAnonymousUniqueId( staticGuessRoot(root_r) );
1959 ///////////////////////////////////////////////////////////////////
1961 void TargetImpl::installSrcPackage( const SrcPackage_constPtr & srcPackage_r )
1963 // provide on local disk
1964 ManagedFile localfile = provideSrcPackage(srcPackage_r);
1965 // create a installation progress report proxy
1966 RpmInstallPackageReceiver progress( srcPackage_r );
1967 progress.connect(); // disconnected on destruction.
1969 rpm().installPackage ( localfile );
1972 ManagedFile TargetImpl::provideSrcPackage( const SrcPackage_constPtr & srcPackage_r )
1974 // provide on local disk
1975 repo::RepoMediaAccess access_r;
1976 repo::SrcPackageProvider prov( access_r );
1977 return prov.provideSrcPackage( srcPackage_r );
1979 ////////////////////////////////////////////////////////////////
1980 } // namespace target
1981 ///////////////////////////////////////////////////////////////////
1982 /////////////////////////////////////////////////////////////////
1984 ///////////////////////////////////////////////////////////////////