forked from cromer/pamac-classic
728 lines
22 KiB
Vala
728 lines
22 KiB
Vala
/*
|
|
* pamac-vala
|
|
*
|
|
* Copyright (C) 2014 Guillaume Benoit <guillaume@manjaro.org>
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a get of the GNU General Public License
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
using Alpm;
|
|
using Polkit;
|
|
|
|
// i18n
|
|
const string GETTEXT_PACKAGE = "pamac";
|
|
|
|
Pamac.Daemon pamac_daemon;
|
|
MainLoop loop;
|
|
|
|
namespace Pamac {
|
|
[DBus (name = "org.manjaro.pamac")]
|
|
public class Daemon : Object {
|
|
string[] syncfirst;
|
|
string[] holdpkg;
|
|
string[] ignorepkg;
|
|
Handle? handle;
|
|
public uint64 previous_percent;
|
|
int force_refresh;
|
|
bool emit_refreshed_signal;
|
|
public Cond provider_cond;
|
|
public Mutex provider_mutex;
|
|
public int? choosen_provider;
|
|
|
|
public signal void emit_event (uint event, string[] details);
|
|
public signal void emit_providers (string depend, string[] providers);
|
|
public signal void emit_progress (uint progress, string pkgname, int percent, uint n_targets, uint current_target);
|
|
public signal void emit_download (string filename, uint64 xfered, uint64 total);
|
|
public signal void emit_totaldownload (uint64 total);
|
|
public signal void emit_log (uint level, string msg);
|
|
public signal void emit_refreshed (ErrorInfos error);
|
|
public signal void emit_trans_prepared (ErrorInfos error);
|
|
public signal void emit_trans_committed (ErrorInfos error);
|
|
|
|
public Daemon () {
|
|
}
|
|
|
|
private void init_alpm_config () {
|
|
var alpm_config = new Alpm.Config ("/etc/pacman.conf");
|
|
syncfirst = alpm_config.get_syncfirst ();
|
|
holdpkg = alpm_config.get_holdpkg ();
|
|
ignorepkg = alpm_config.get_ignore_pkgs ();
|
|
handle = alpm_config.get_handle ();
|
|
if (handle == null) {
|
|
ErrorInfos err = ErrorInfos ();
|
|
err.str = _("Failed to initialize alpm library");
|
|
emit_trans_committed (err);
|
|
} else {
|
|
handle.eventcb = (EventCallBack) cb_event;
|
|
handle.progresscb = (ProgressCallBack) cb_progress;
|
|
handle.questioncb = (QuestionCallBack) cb_question;
|
|
handle.dlcb = (DownloadCallBack) cb_download;
|
|
handle.totaldlcb = (TotalDownloadCallBack) cb_totaldownload;
|
|
handle.logcb = (LogCallBack) cb_log;
|
|
}
|
|
previous_percent = 0;
|
|
}
|
|
|
|
public void write_config (HashTable<string,string> new_conf, GLib.BusName sender) {
|
|
var pamac_config = new Pamac.Config ("/etc/pamac.conf");
|
|
try {
|
|
Polkit.Authority authority = Polkit.Authority.get_sync (null);
|
|
Polkit.Subject subject = Polkit.SystemBusName.new (sender);
|
|
Polkit.AuthorizationResult result = authority.check_authorization_sync (
|
|
subject,
|
|
"org.manjaro.pamac.commit",
|
|
null,
|
|
Polkit.CheckAuthorizationFlags.ALLOW_USER_INTERACTION,
|
|
null
|
|
);
|
|
if (result.get_is_authorized ()) {
|
|
pamac_config.write (new_conf);
|
|
}
|
|
} catch (GLib.Error e) {
|
|
stderr.printf ("%s\n", e.message);
|
|
}
|
|
}
|
|
|
|
public void set_pkgreason (string pkgname, uint reason, GLib.BusName sender) {
|
|
try {
|
|
Polkit.Authority authority = Polkit.Authority.get_sync (null);
|
|
Polkit.Subject subject = Polkit.SystemBusName.new (sender);
|
|
Polkit.AuthorizationResult result = authority.check_authorization_sync (
|
|
subject,
|
|
"org.manjaro.pamac.commit",
|
|
null,
|
|
Polkit.CheckAuthorizationFlags.ALLOW_USER_INTERACTION,
|
|
null
|
|
);
|
|
if (result.get_is_authorized ()) {
|
|
init_alpm_config ();
|
|
unowned Package? pkg = handle.localdb.get_pkg (pkgname);
|
|
if (pkg != null)
|
|
pkg.reason = (PkgReason) reason;
|
|
}
|
|
} catch (GLib.Error e) {
|
|
stderr.printf ("%s\n", e.message);
|
|
}
|
|
}
|
|
|
|
private int refresh_real () {
|
|
init_alpm_config ();
|
|
ErrorInfos err = ErrorInfos ();
|
|
string[] details = {};
|
|
int success = 0;
|
|
int ret = handle.trans_init (0);
|
|
if (ret == 0) {
|
|
foreach (var db in handle.syncdbs) {
|
|
ret = db.update (force_refresh);
|
|
if (ret >= 0) {
|
|
success++;
|
|
}
|
|
}
|
|
// We should always succeed if at least one DB was upgraded - we may possibly
|
|
// fail later with unresolved deps, but that should be rare, and would be expected
|
|
if (success == 0) {
|
|
err.str = _("Failed to synchronize any databases");
|
|
details += Alpm.strerror (handle.errno ());
|
|
err.details = details;
|
|
}
|
|
trans_release ();
|
|
} else {
|
|
err.str = _("Failed to synchronize any databases");
|
|
details += Alpm.strerror (handle.errno ());
|
|
err.details = details;
|
|
}
|
|
if (emit_refreshed_signal)
|
|
emit_refreshed (err);
|
|
return success;
|
|
}
|
|
|
|
public void refresh (int force, bool emit_signal) {
|
|
force_refresh = force;
|
|
emit_refreshed_signal = emit_signal;
|
|
try {
|
|
new Thread<int>.try ("refresh thread", (ThreadFunc) refresh_real);
|
|
} catch (GLib.Error e) {
|
|
stderr.printf ("%s\n", e.message);
|
|
}
|
|
}
|
|
|
|
public UpdatesInfos[] get_updates () {
|
|
init_alpm_config ();
|
|
var pamac_config = new Pamac.Config ("/etc/pamac.conf");
|
|
UpdatesInfos[] updates = {};
|
|
updates = get_syncfirst_updates (handle, syncfirst);
|
|
if (updates.length != 0) {
|
|
return updates;
|
|
} else {
|
|
updates = get_repos_updates (handle, ignorepkg);
|
|
if (pamac_config.enable_aur) {
|
|
UpdatesInfos[] aur_updates = get_aur_updates (handle, ignorepkg);
|
|
foreach (var infos in aur_updates)
|
|
updates += infos;
|
|
}
|
|
return updates;
|
|
}
|
|
}
|
|
|
|
public ErrorInfos trans_init (TransFlag transflags) {
|
|
init_alpm_config ();
|
|
ErrorInfos err = ErrorInfos ();
|
|
string[] details = {};
|
|
int ret = handle.trans_init (transflags);
|
|
if (ret == -1) {
|
|
err.str = _("Failed to init transaction");
|
|
details += Alpm.strerror (handle.errno ());
|
|
err.details = details;
|
|
}
|
|
return err;
|
|
}
|
|
|
|
public ErrorInfos trans_sysupgrade (int enable_downgrade) {
|
|
ErrorInfos err = ErrorInfos ();
|
|
string[] details = {};
|
|
int ret = handle.trans_sysupgrade (enable_downgrade);
|
|
if (ret == -1) {;
|
|
err.str = _("Failed to prepare transaction");
|
|
details += Alpm.strerror (handle.errno ());
|
|
err.details = details;
|
|
}
|
|
return err;
|
|
}
|
|
|
|
public ErrorInfos trans_add_pkg (string pkgname) {
|
|
ErrorInfos err = ErrorInfos ();
|
|
string[] details = {};
|
|
unowned Package? pkg = null;
|
|
pkg = handle.find_dbs_satisfier (handle.syncdbs, pkgname);
|
|
//foreach (var db in handle.syncdbs) {
|
|
//pkg = find_satisfier (db.pkgcache, pkgname);
|
|
//if (pkg != null)
|
|
//break;
|
|
//}
|
|
if (pkg == null) {
|
|
err.str = _("Failed to prepare transaction");
|
|
details += _("target not found: %s").printf (pkgname);
|
|
err.details = details;
|
|
return err;
|
|
}
|
|
int ret = handle.trans_add_pkg (pkg);
|
|
if (ret == -1) {
|
|
Alpm.Errno errno = handle.errno ();
|
|
if (errno == Errno.TRANS_DUP_TARGET || errno == Errno.PKG_IGNORED)
|
|
// just skip duplicate or ignored targets
|
|
return err;
|
|
else {
|
|
err.str = _("Failed to prepare transaction");
|
|
details += "%s: %s".printf (pkg.name, Alpm.strerror (errno));
|
|
err.details = details;
|
|
return err;
|
|
}
|
|
}
|
|
return err;
|
|
}
|
|
|
|
public ErrorInfos trans_load_pkg (string pkgpath) {
|
|
ErrorInfos err = ErrorInfos ();
|
|
string[] details = {};
|
|
Package* pkg = handle.load_file (pkgpath, 1, handle.localfilesiglevel);
|
|
if (pkg == null) {
|
|
err.str = _("Failed to prepare transaction");
|
|
details += "%s: %s".printf (pkgpath, Alpm.strerror (handle.errno ()));
|
|
err.details = details;
|
|
return err;
|
|
} else {
|
|
int ret = handle.trans_add_pkg (pkg);
|
|
if (ret == -1) {
|
|
Alpm.Errno errno = handle.errno ();
|
|
if (errno == Errno.TRANS_DUP_TARGET || errno == Errno.PKG_IGNORED)
|
|
// just skip duplicate or ignored targets
|
|
return err;
|
|
else {
|
|
err.str = _("Failed to prepare transaction");
|
|
details += "%s: %s".printf (pkg->name, Alpm.strerror (errno));
|
|
err.details = details;
|
|
return err;
|
|
}
|
|
// free the package because it will not be used
|
|
delete pkg;
|
|
}
|
|
}
|
|
return err;
|
|
}
|
|
|
|
public ErrorInfos trans_remove_pkg (string pkgname) {
|
|
ErrorInfos err = ErrorInfos ();
|
|
string[] details = {};
|
|
unowned Package? pkg = handle.localdb.get_pkg (pkgname);
|
|
if (pkg == null) {
|
|
err.str = _("Failed to prepare transaction");
|
|
details += _("target not found: %s").printf (pkgname);
|
|
err.details = details;
|
|
return err;
|
|
}
|
|
int ret = handle.trans_remove_pkg (pkg);
|
|
if (ret == -1) {
|
|
err.str = _("Failed to prepare transaction");
|
|
details += "%s: %s".printf (pkg.name, Alpm.strerror (handle.errno ()));
|
|
err.details = details;
|
|
}
|
|
return err;
|
|
}
|
|
|
|
public int trans_prepare_real () {
|
|
ErrorInfos err = ErrorInfos ();
|
|
string[] details = {};
|
|
Alpm.List<void*> err_data = null;
|
|
int ret = handle.trans_prepare (out err_data);
|
|
if (ret == -1) {
|
|
Alpm.Errno errno = handle.errno ();
|
|
err.str = _("Failed to prepare transaction");
|
|
string detail = Alpm.strerror (errno);
|
|
switch (errno) {
|
|
case Errno.PKG_INVALID_ARCH:
|
|
detail += ":";
|
|
details += detail;
|
|
foreach (void *i in err_data) {
|
|
char *pkgname = i;
|
|
details += _("package %s does not have a valid architecture").printf (pkgname);
|
|
}
|
|
break;
|
|
case Errno.UNSATISFIED_DEPS:
|
|
detail += ":";
|
|
details += detail;
|
|
foreach (void *i in err_data) {
|
|
DepMissing *miss = i;
|
|
string depstring = miss->depend.compute_string ();
|
|
details += _("%s: requires %s").printf (miss->target, depstring);
|
|
}
|
|
break;
|
|
case Errno.CONFLICTING_DEPS:
|
|
detail += ":";
|
|
details += detail;
|
|
foreach (void *i in err_data) {
|
|
Conflict *conflict = i;
|
|
detail = _("%s and %s are in conflict").printf (conflict->package1, conflict->package2);
|
|
// only print reason if it contains new information
|
|
if (conflict->reason.mod != DepMod.ANY) {
|
|
detail += " (%s)".printf (conflict->reason.compute_string ());
|
|
}
|
|
details += detail;
|
|
}
|
|
break;
|
|
default:
|
|
details += detail;
|
|
break;
|
|
}
|
|
err.details = details;
|
|
trans_release ();
|
|
} else {
|
|
// Search for holdpkg in target list
|
|
bool found_locked_pkg = false;
|
|
foreach (var pkg in handle.trans_to_remove ()) {
|
|
if (pkg.name in holdpkg) {
|
|
details += _("%s needs to be removed but it is a locked package").printf (pkg.name);
|
|
found_locked_pkg = true;
|
|
break;
|
|
}
|
|
}
|
|
if (found_locked_pkg) {
|
|
err.str = _("Failed to prepare transaction");
|
|
err.details = details;
|
|
trans_release ();
|
|
}
|
|
}
|
|
emit_trans_prepared (err);
|
|
return ret;
|
|
}
|
|
|
|
public void trans_prepare () {
|
|
try {
|
|
new Thread<int>.try ("prepare thread", (ThreadFunc) trans_prepare_real);
|
|
} catch (GLib.Error e) {
|
|
stderr.printf ("%s\n", e.message);
|
|
}
|
|
}
|
|
|
|
public void choose_provider (int provider) {
|
|
provider_mutex.lock ();
|
|
choosen_provider = provider;
|
|
provider_cond.signal ();
|
|
provider_mutex.unlock ();
|
|
}
|
|
|
|
public UpdatesInfos[] trans_to_add () {
|
|
UpdatesInfos info = UpdatesInfos ();
|
|
UpdatesInfos[] infos = {};
|
|
foreach (var pkg in handle.trans_to_add ()) {
|
|
info.name = pkg.name;
|
|
info.version = pkg.version;
|
|
// if pkg was load from a file, pkg.db is null
|
|
if (pkg.db != null)
|
|
info.db_name = pkg.db.name;
|
|
else
|
|
info.db_name = "";
|
|
info.tarpath = "";
|
|
info.download_size = pkg.download_size;
|
|
infos += info;
|
|
}
|
|
return infos;
|
|
}
|
|
|
|
public UpdatesInfos[] trans_to_remove () {
|
|
UpdatesInfos info = UpdatesInfos ();
|
|
UpdatesInfos[] infos = {};
|
|
foreach (var pkg in handle.trans_to_remove ()) {
|
|
info.name = pkg.name;
|
|
info.version = pkg.version;
|
|
info.db_name = pkg.db.name;
|
|
info.tarpath = "";
|
|
info.download_size = pkg.download_size;
|
|
infos += info;
|
|
}
|
|
return infos;
|
|
}
|
|
|
|
private int trans_commit_real () {
|
|
ErrorInfos err = ErrorInfos ();
|
|
string[] details = {};
|
|
Alpm.List<void*> err_data = null;
|
|
int ret = handle.trans_commit (out err_data);
|
|
if (ret == -1) {
|
|
Alpm.Errno errno = handle.errno ();
|
|
err.str = _("Failed to commit transaction");
|
|
string detail = Alpm.strerror (errno);
|
|
switch (errno) {
|
|
case Alpm.Errno.FILE_CONFLICTS:
|
|
detail += ":";
|
|
details += detail;
|
|
//TransFlag flags = handle.trans_get_flags ();
|
|
//if ((flags & TransFlag.FORCE) != 0) {
|
|
//details += _("unable to %s directory-file conflicts").printf ("--force");
|
|
//}
|
|
foreach (void *i in err_data) {
|
|
FileConflict *conflict = i;
|
|
switch (conflict->type) {
|
|
case FileConflictType.TARGET:
|
|
details += _("%s exists in both %s and %s").printf (conflict->file, conflict->target, conflict->ctarget);
|
|
break;
|
|
case FileConflictType.FILESYSTEM:
|
|
details += _("%s: %s already exists in filesystem").printf (conflict->target, conflict->file);
|
|
break;
|
|
}
|
|
}
|
|
break;
|
|
case Alpm.Errno.PKG_INVALID:
|
|
case Alpm.Errno.PKG_INVALID_CHECKSUM:
|
|
case Alpm.Errno.PKG_INVALID_SIG:
|
|
case Alpm.Errno.DLT_INVALID:
|
|
detail += ":";
|
|
details += detail;
|
|
foreach (void *i in err_data) {
|
|
char *filename = i;
|
|
details += _("%s is invalid or corrupted").printf (filename);
|
|
}
|
|
break;
|
|
default:
|
|
details += detail;
|
|
break;
|
|
}
|
|
err.details = details;
|
|
}
|
|
trans_release ();
|
|
emit_trans_committed (err);
|
|
return ret;
|
|
}
|
|
|
|
public void trans_commit (GLib.BusName sender) {
|
|
try {
|
|
Polkit.Authority authority = Polkit.Authority.get_sync (null);
|
|
Polkit.Subject subject = Polkit.SystemBusName.new (sender);
|
|
var result = new Polkit.AuthorizationResult (false, false, null);
|
|
authority.check_authorization.begin (
|
|
subject,
|
|
"org.manjaro.pamac.commit",
|
|
null,
|
|
Polkit.CheckAuthorizationFlags.ALLOW_USER_INTERACTION,
|
|
null,
|
|
(obj, res) => {
|
|
try {
|
|
result = authority.check_authorization.end (res);
|
|
if (result.get_is_authorized ()) {
|
|
new Thread<int>.try ("commit thread", (ThreadFunc) trans_commit_real);
|
|
} else {
|
|
ErrorInfos err = ErrorInfos ();
|
|
err.str = _("Authentication failed");
|
|
emit_trans_committed (err);
|
|
trans_release ();
|
|
}
|
|
} catch (GLib.Error e) {
|
|
stderr.printf ("Polkit Error: %s\n", e.message);
|
|
}
|
|
}
|
|
);
|
|
} catch (GLib.Error e) {
|
|
stderr.printf ("Polkit Error: %s\n", e.message);
|
|
}
|
|
}
|
|
|
|
public int trans_release () {
|
|
return handle.trans_release ();
|
|
}
|
|
|
|
public void trans_cancel () {
|
|
handle.trans_interrupt ();
|
|
handle.trans_release ();
|
|
init_alpm_config ();
|
|
}
|
|
|
|
public void quit () {
|
|
GLib.File lockfile = GLib.File.new_for_path ("/var/lib/pacman/db.lck");
|
|
if (lockfile.query_exists () == false)
|
|
loop.quit ();
|
|
}
|
|
// End of Daemon Object
|
|
}
|
|
}
|
|
|
|
private void write_log_file (string event) {
|
|
var now = new DateTime.now_local ();
|
|
string log = "%s %s".printf (now.format ("[%Y-%m-%d %H:%M]"), event);
|
|
var file = GLib.File.new_for_path ("/var/log/pamac.log");
|
|
try {
|
|
// creating a DataOutputStream to the file
|
|
var dos = new DataOutputStream (file.append_to (FileCreateFlags.NONE));
|
|
// writing a short string to the stream
|
|
dos.put_string (log);
|
|
} catch (GLib.Error e) {
|
|
stderr.printf("%s\n", e.message);
|
|
}
|
|
}
|
|
|
|
private void cb_event (Event event, void *data1, void *data2) {
|
|
string[] details = {};
|
|
switch (event) {
|
|
case Event.ADD_START:
|
|
case Event.REMOVE_START:
|
|
case Event.REINSTALL_START:
|
|
unowned Package pkg = (Package) data1;
|
|
details += pkg.name;
|
|
details += pkg.version;
|
|
break;
|
|
case Event.ADD_DONE:
|
|
unowned Package pkg = (Package) data1;
|
|
string log = "Installed %s (%s)\n".printf (pkg.name, pkg.version);
|
|
write_log_file (log);
|
|
break;
|
|
case Event.REMOVE_DONE:
|
|
unowned Package pkg = (Package) data1;
|
|
string log = "Removed %s (%s)\n".printf (pkg.name, pkg.version);
|
|
write_log_file (log);
|
|
break;
|
|
case Event.REINSTALL_DONE:
|
|
unowned Package pkg = (Package) data1;
|
|
string log = "Reinstalled %s (%s)\n".printf (pkg.name, pkg.version);
|
|
write_log_file (log);
|
|
break;
|
|
case Event.UPGRADE_START:
|
|
case Event.DOWNGRADE_START:
|
|
unowned Package new_pkg = (Package) data1;
|
|
unowned Package old_pkg = (Package) data2;
|
|
details += old_pkg.name;
|
|
details += old_pkg.version;
|
|
details += new_pkg.version;
|
|
break;
|
|
case Event.UPGRADE_DONE:
|
|
unowned Package new_pkg = (Package) data1;
|
|
unowned Package old_pkg = (Package) data2;
|
|
string log = "Upgraded %s (%s -> %s)\n".printf (old_pkg.name, old_pkg.version, new_pkg.version);
|
|
write_log_file (log);
|
|
break;
|
|
case Event.DOWNGRADE_DONE:
|
|
unowned Package new_pkg = (Package) data1;
|
|
unowned Package old_pkg = (Package) data2;
|
|
string log = "Downgraded %s (%s -> %s)\n".printf (old_pkg.name, old_pkg.version, new_pkg.version);
|
|
write_log_file (log);
|
|
break;
|
|
case Event.DELTA_PATCH_START:
|
|
unowned string string1 = (string) data1;
|
|
unowned string string2 = (string) data2;
|
|
details += string1;
|
|
details += string2;
|
|
break;
|
|
case Event.SCRIPTLET_INFO:
|
|
unowned string info = (string) data1;
|
|
details += info;
|
|
write_log_file (info);
|
|
break;
|
|
case Event.OPTDEP_REQUIRED:
|
|
unowned Package pkg = (Package) data1;
|
|
Depend *depend = data2;
|
|
details += pkg.name;
|
|
details += depend->compute_string ();
|
|
break;
|
|
case Event.DATABASE_MISSING:
|
|
unowned string db_name = (string) data1;
|
|
details += db_name;
|
|
break;
|
|
//~ case Event.CHECKDEPS_START:
|
|
//~ case Event.CHECKDEPS_DONE:
|
|
//~ case Event.FILECONFLICTS_START:
|
|
//~ case Event.FILECONFLICTS_DONE:
|
|
//~ case Event.RESOLVEDEPS_START:
|
|
//~ case Event.RESOLVEDEPS_DONE:
|
|
//~ case Event.INTERCONFLICTS_START:
|
|
//~ case Event.INTERCONFLICTS_DONE:
|
|
//~ case Event.INTEGRITY_START:
|
|
//~ case Event.INTEGRITY_DONE:
|
|
//~ case Event.KEYRING_START:
|
|
//~ case Event.KEYRING_DONE:
|
|
//~ case Event.KEY_DOWNLOAD_START:
|
|
//~ case Event.KEY_DOWNLOAD_DONE:
|
|
//~ case Event.LOAD_START:
|
|
//~ case Event.LOAD_DONE:
|
|
//~ case Event.DELTA_INTEGRITY_START:
|
|
//~ case Event.DELTA_INTEGRITY_DONE:
|
|
//~ case Event.DELTA_PATCHES_START:
|
|
//~ case Event.DELTA_PATCHES_DONE:
|
|
//~ case Event.DELTA_PATCH_DONE:
|
|
//~ case Event.DELTA_PATCH_FAILED:
|
|
//~ case Event.RETRIEVE_START:
|
|
//~ case Event.DISKSPACE_START:
|
|
//~ case Event.DISKSPACE_DONE:
|
|
default:
|
|
break;
|
|
}
|
|
pamac_daemon.emit_event ((uint) event, details);
|
|
}
|
|
|
|
private void cb_question (Question question, void *data1, void *data2, void *data3, out int response) {
|
|
switch (question) {
|
|
case Question.INSTALL_IGNOREPKG:
|
|
// Do not install package in IgnorePkg/IgnoreGroup
|
|
response = 0;
|
|
break;
|
|
case Question.REPLACE_PKG:
|
|
// Auto-remove conflicts in case of replaces
|
|
response = 1;
|
|
break;
|
|
case Question.CONFLICT_PKG:
|
|
// Auto-remove conflicts
|
|
response = 1;
|
|
break;
|
|
case Question.REMOVE_PKGS:
|
|
// Do not upgrade packages which have unresolvable dependencies
|
|
response = 1;
|
|
break;
|
|
case Question.SELECT_PROVIDER:
|
|
unowned Alpm.List<Package?> providers = (Alpm.List<Package?>) data1;
|
|
Depend *depend = data2;
|
|
string depend_str = depend->compute_string ();
|
|
string[] providers_str = {};
|
|
foreach (var pkg in providers) {
|
|
providers_str += pkg.name;
|
|
}
|
|
pamac_daemon.provider_cond = Cond ();
|
|
pamac_daemon.provider_mutex = Mutex ();
|
|
pamac_daemon.choosen_provider = null;
|
|
pamac_daemon.emit_providers (depend_str, providers_str);
|
|
pamac_daemon.provider_mutex.lock ();
|
|
while (pamac_daemon.choosen_provider == null) {
|
|
pamac_daemon.provider_cond.wait (pamac_daemon.provider_mutex);
|
|
}
|
|
response = pamac_daemon.choosen_provider;
|
|
pamac_daemon.provider_mutex.unlock ();
|
|
break;
|
|
case Question.CORRUPTED_PKG:
|
|
// Auto-remove corrupted pkgs in cache
|
|
response = 1;
|
|
break;
|
|
case Question.IMPORT_KEY:
|
|
PGPKey *key = data1;
|
|
// Do not get revoked key
|
|
if (key->revoked == 1) response = 0;
|
|
// Auto get not revoked key
|
|
else response = 1;
|
|
break;
|
|
default:
|
|
response = 0;
|
|
break;
|
|
}
|
|
}
|
|
|
|
private void cb_progress (Progress progress, string pkgname, int percent, uint n_targets, uint current_target) {
|
|
//~ switch (progress) {
|
|
//~ case Progress.ADD_START:
|
|
//~ case Progress.UPGRADE_START:
|
|
//~ case Progress.DOWNGRADE_START:
|
|
//~ case Progress.REINSTALL_START:
|
|
//~ case Progress.REMOVE_START:
|
|
//~ case Progress.CONFLICTS_START:
|
|
//~ case Progress.DISKSPACE_START:
|
|
//~ case Progress.INTEGRITY_START:
|
|
//~ case Progress.KEYRING_START:
|
|
//~ case Progress.LOAD_START:
|
|
//~ default:
|
|
//~ break;
|
|
//~ }
|
|
if ((uint64) percent != pamac_daemon.previous_percent) {
|
|
pamac_daemon.previous_percent = (uint64) percent;
|
|
pamac_daemon.emit_progress ((uint) progress, pkgname, percent, n_targets, current_target);
|
|
}
|
|
}
|
|
|
|
private void cb_download (string filename, uint64 xfered, uint64 total) {
|
|
if (xfered != pamac_daemon.previous_percent) {
|
|
pamac_daemon.previous_percent = xfered;
|
|
pamac_daemon.emit_download (filename, xfered, total);
|
|
}
|
|
}
|
|
|
|
private void cb_totaldownload (uint64 total) {
|
|
pamac_daemon.emit_totaldownload (total);
|
|
}
|
|
|
|
private void cb_log (LogLevel level, string fmt, va_list args) {
|
|
LogLevel logmask = LogLevel.ERROR | LogLevel.WARNING;
|
|
if ((level & logmask) == 0)
|
|
return;
|
|
string? log = null;
|
|
log = fmt.vprintf (args);
|
|
if (log != null)
|
|
pamac_daemon.emit_log ((uint) level, log);
|
|
}
|
|
|
|
void on_bus_acquired (DBusConnection conn) {
|
|
pamac_daemon = new Pamac.Daemon ();
|
|
try {
|
|
conn.register_object ("/org/manjaro/pamac", pamac_daemon);
|
|
}
|
|
catch (IOError e) {
|
|
stderr.printf ("Could not register service\n");
|
|
}
|
|
}
|
|
|
|
void main () {
|
|
// i18n
|
|
Intl.setlocale (LocaleCategory.ALL, "");
|
|
Intl.textdomain (GETTEXT_PACKAGE);
|
|
|
|
Bus.own_name (BusType.SYSTEM, "org.manjaro.pamac", BusNameOwnerFlags.NONE,
|
|
on_bus_acquired,
|
|
() => {},
|
|
() => stderr.printf("Could not acquire name\n"));
|
|
|
|
loop = new MainLoop ();
|
|
loop.run ();
|
|
}
|