On 14/6/21 10:15 pm, morganamilo wrote:
> Github and other sites redirect their downloads to a cdn. So the
> download http://foo.org/myrepo.db may redirect to something like
> https://cdn.foo.org/83749327439.
> 
> This then causes pacman to try and download the sig as
> https://cdn.foo.org/83749327439.sig which is incorrect. In this case
> pacman should append .sig to the original url.
> 
> However urls like 
> https://archlinux.org/packages/community/x86_64/0ad/download/
> Redirect to the mirror, so .sig has to appended after the redirects and
> not before.
> 
> So we decide if we should append .sig on the original or effective url
> based on if the effective url has .db or .pkg in it.
> 

Added this to the commit message:
In addition, strip everything beyond "?" when considering a redirected
URL.

> Fixes FS#71148
> ---
>  lib/libalpm/dload.c | 21 +++++++++++++++++++--
>  1 file changed, 19 insertions(+), 2 deletions(-)
> 
> diff --git a/lib/libalpm/dload.c b/lib/libalpm/dload.c
> index 2c14841f..72e9cfcd 100644
> --- a/lib/libalpm/dload.c
> +++ b/lib/libalpm/dload.c
> @@ -613,11 +613,28 @@ static int curl_check_finished_download(CURLM *curlm, 
> CURLMsg *msg,
>       /* Let's check if client requested downloading accompanion *.sig file */
>       if(!payload->signature && payload->download_signature && curlerr == 
> CURLE_OK && payload->respcode < 400) {
>               struct dload_payload *sig = NULL;
> +             char *url = payload->fileurl;
> +             char *_effective_filename;
>  
> -             int len = strlen(effective_url) + 5;
> +             STRDUP(_effective_filename, effective_url, GOTO_ERR(handle, 
> ALPM_ERR_MEMORY, cleanup));
> +             const char *effective_filename = 
> get_filename(_effective_filename);
> +             char *query = strrchr(effective_filename, '?');

Lots of variables being declared beyond the start of the block.

> +
> +             if(query) {
> +                     query[0] = '\0';
> +             }
> +
> +             /* Only use the effective url for sig downloads if the 
> effective_url contains .db or .pkg */
> +             if(strstr(effective_filename, ".db") || 
> strstr(effective_filename, ".pkg")) {
> +                     url = effective_url;
> +             }
> +
> +             free(_effective_filename);
> +
> +             int len = strlen(url) + 5;
>               CALLOC(sig, 1, sizeof(*sig), GOTO_ERR(handle, ALPM_ERR_MEMORY, 
> cleanup));
>               MALLOC(sig->fileurl, len, FREE(sig); GOTO_ERR(handle, 
> ALPM_ERR_MEMORY, cleanup));
> -             snprintf(sig->fileurl, len, "%s.sig", effective_url);
> +             snprintf(sig->fileurl, len, "%s.sig", url);
>  
>               if(payload->trust_remote_name) {
>                       /* In this case server might provide a new name for the 
> main payload.
> 

Reply via email to