fwupd/libfwupd/fwupd-remote.c
Richard Hughes 89d45a0d91 trivial: Standardize on introspection for @error and @cancellable
Also standarize on `Returns:` for the result.
2021-04-28 16:19:50 +01:00

1634 lines
44 KiB
C

/*
* Copyright (C) 2017 Richard Hughes <richard@hughsie.com>
*
* SPDX-License-Identifier: LGPL-2.1+
*/
#include "config.h"
#ifdef HAVE_LIBCURL
#include <curl/curl.h>
#endif
#include <jcat.h>
#include "fwupd-deprecated.h"
#include "fwupd-enums-private.h"
#include "fwupd-error.h"
#include "fwupd-remote-private.h"
/**
* SECTION:fwupd-remote
* @short_description: a source of firmware
*
* An object that represents a source of metadata that provides firmware.
*
* See also: #FwupdClient
*/
static void fwupd_remote_finalize (GObject *obj);
typedef struct {
GObject parent_instance;
FwupdRemoteKind kind;
FwupdKeyringKind keyring_kind;
gchar *id;
gchar *firmware_base_uri;
gchar *report_uri;
gchar *security_report_uri;
gchar *metadata_uri;
gchar *metadata_uri_sig;
gchar *username;
gchar *password;
gchar *title;
gchar *agreement;
gchar *checksum;
gchar *filename_cache;
gchar *filename_cache_sig;
gchar *filename_source;
gboolean enabled;
gboolean approval_required;
gint priority;
guint64 mtime;
gchar **order_after;
gchar **order_before;
gchar *remotes_dir;
gboolean automatic_reports;
gboolean automatic_security_reports;
} FwupdRemotePrivate;
enum {
PROP_0,
PROP_ID,
PROP_ENABLED,
PROP_APPROVAL_REQUIRED,
PROP_AUTOMATIC_REPORTS,
PROP_AUTOMATIC_SECURITY_REPORTS,
PROP_LAST
};
G_DEFINE_TYPE_WITH_PRIVATE (FwupdRemote, fwupd_remote, G_TYPE_OBJECT)
#define GET_PRIVATE(o) (fwupd_remote_get_instance_private (o))
#ifdef HAVE_LIBCURL_7_62_0
typedef gchar curlptr;
G_DEFINE_AUTOPTR_CLEANUP_FUNC(curlptr, curl_free)
G_DEFINE_AUTOPTR_CLEANUP_FUNC(CURLU, curl_url_cleanup)
#endif
static void
fwupd_remote_set_username (FwupdRemote *self, const gchar *username)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
if (username != NULL && username[0] == '\0')
username = NULL;
priv->username = g_strdup (username);
}
static void
fwupd_remote_set_title (FwupdRemote *self, const gchar *title)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
/* not changed */
if (g_strcmp0 (priv->title, title) == 0)
return;
g_free (priv->title);
priv->title = g_strdup (title);
}
/**
* fwupd_remote_set_agreement:
* @self: A #FwupdRemote
* @agreement: Agreement markup
*
* Sets the remote agreement in AppStream markup format
*
* Since: 1.0.7
**/
void
fwupd_remote_set_agreement (FwupdRemote *self, const gchar *agreement)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
/* not changed */
if (g_strcmp0 (priv->agreement, agreement) == 0)
return;
g_free (priv->agreement);
priv->agreement = g_strdup (agreement);
}
static void
fwupd_remote_set_checksum (FwupdRemote *self, const gchar *checksum)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
/* not changed */
if (g_strcmp0 (priv->checksum, checksum) == 0)
return;
g_free (priv->checksum);
priv->checksum = g_strdup (checksum);
}
static void
fwupd_remote_set_password (FwupdRemote *self, const gchar *password)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
/* not changed */
if (g_strcmp0 (priv->password, password) == 0)
return;
if (password != NULL && password[0] == '\0')
password = NULL;
g_free (priv->password);
priv->password = g_strdup (password);
}
static void
fwupd_remote_set_kind (FwupdRemote *self, FwupdRemoteKind kind)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
priv->kind = kind;
}
/**
* fwupd_remote_set_keyring_kind:
* @self: A #FwupdRemote
* @keyring_kind: #FwupdKeyringKind e.g. #FWUPD_KEYRING_KIND_PKCS7
*
* Sets the keyring kind
*
* Since: 1.5.3
**/
void
fwupd_remote_set_keyring_kind (FwupdRemote *self, FwupdKeyringKind keyring_kind)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
priv->keyring_kind = keyring_kind;
}
/* note, this has to be set before url */
static void
fwupd_remote_set_id (FwupdRemote *self, const gchar *id)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
/* not changed */
if (g_strcmp0 (priv->id, id) == 0)
return;
g_free (priv->id);
priv->id = g_strdup (id);
g_strdelimit (priv->id, ".", '\0');
}
static void
fwupd_remote_set_filename_source (FwupdRemote *self, const gchar *filename_source)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
if (priv->filename_source == filename_source)
return;
g_free (priv->filename_source);
priv->filename_source = g_strdup (filename_source);
}
static const gchar *
fwupd_remote_get_suffix_for_keyring_kind (FwupdKeyringKind keyring_kind)
{
if (keyring_kind == FWUPD_KEYRING_KIND_JCAT)
return ".jcat";
if (keyring_kind == FWUPD_KEYRING_KIND_GPG)
return ".asc";
if (keyring_kind == FWUPD_KEYRING_KIND_PKCS7)
return ".p7b";
return NULL;
}
static gchar *
fwupd_remote_build_uri (FwupdRemote *self, const gchar *url, GError **error)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
#ifdef HAVE_LIBCURL_7_62_0
g_autoptr(curlptr) tmp_uri = NULL;
g_autoptr(CURLU) uri = curl_url ();
/* create URI, substituting if required */
if (priv->firmware_base_uri != NULL) {
g_autofree gchar *basename = NULL;
g_autofree gchar *path_new = NULL;
g_autoptr(curlptr) path = NULL;
g_autoptr(CURLU) uri_tmp = curl_url ();
if (curl_url_set (uri_tmp, CURLUPART_URL, url, 0) != CURLUE_OK) {
g_set_error (error,
FWUPD_ERROR,
FWUPD_ERROR_INVALID_FILE,
"Failed to parse url '%s'", url);
return NULL;
}
curl_url_get (uri_tmp, CURLUPART_PATH, &path, 0);
basename = g_path_get_basename (path);
path_new = g_build_filename (priv->firmware_base_uri, basename, NULL);
curl_url_set (uri, CURLUPART_URL, path_new, 0);
/* use the base URI of the metadata to build the full path */
} else if (g_strstr_len (url, -1, "/") == NULL) {
g_autofree gchar *basename = NULL;
g_autofree gchar *path_new = NULL;
g_autoptr(curlptr) path = NULL;
if (curl_url_set (uri, CURLUPART_URL, priv->metadata_uri, 0) != CURLUE_OK) {
g_set_error (error,
FWUPD_ERROR,
FWUPD_ERROR_INVALID_FILE,
"Failed to parse url '%s'",
priv->metadata_uri);
return NULL;
}
curl_url_get (uri, CURLUPART_PATH, &path, 0);
basename = g_path_get_dirname (path);
path_new = g_build_filename (basename, url, NULL);
curl_url_set (uri, CURLUPART_URL, path_new, 0);
/* a normal URI */
} else {
if (curl_url_set (uri, CURLUPART_URL, url, 0) != CURLUE_OK) {
g_set_error (error,
FWUPD_ERROR,
FWUPD_ERROR_INVALID_FILE,
"Failed to parse URI '%s'", url);
return NULL;
}
}
/* set the username and password */
if (priv->username != NULL)
curl_url_set (uri, CURLUPART_USER, priv->username, 0);
if (priv->password != NULL)
curl_url_set (uri, CURLUPART_PASSWORD, priv->password, 0);
curl_url_get (uri, CURLUPART_URL, &tmp_uri, 0);
return g_strdup (tmp_uri);
#else
if (priv->firmware_base_uri != NULL) {
g_autofree gchar *basename = g_path_get_basename (url);
return g_build_filename (priv->firmware_base_uri, basename, NULL);
}
if (g_strstr_len (url, -1, "/") == NULL) {
g_autofree gchar *basename = g_path_get_dirname (priv->metadata_uri);
return g_build_filename (basename, url, NULL);
}
return g_strdup (url);
#endif
}
/* note, this has to be set before username and password */
static void
fwupd_remote_set_metadata_uri (FwupdRemote *self, const gchar *metadata_uri)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
const gchar *suffix;
/* save this so we can export the object as a GVariant */
priv->metadata_uri = g_strdup (metadata_uri);
/* generate the signature URI too */
suffix = fwupd_remote_get_suffix_for_keyring_kind (priv->keyring_kind);
if (suffix != NULL)
priv->metadata_uri_sig = g_strconcat (metadata_uri, suffix, NULL);
}
/* note, this has to be set after MetadataURI */
static void
fwupd_remote_set_firmware_base_uri (FwupdRemote *self, const gchar *firmware_base_uri)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
priv->firmware_base_uri = g_strdup (firmware_base_uri);
}
static void
fwupd_remote_set_report_uri (FwupdRemote *self, const gchar *report_uri)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
priv->report_uri = g_strdup (report_uri);
}
static void
fwupd_remote_set_security_report_uri (FwupdRemote *self, const gchar *security_report_uri)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
priv->security_report_uri = g_strdup (security_report_uri);
}
/**
* fwupd_remote_kind_from_string:
* @kind: a string, e.g. `download`
*
* Converts an printable string to an enumerated type.
*
* Returns: a #FwupdRemoteKind, e.g. %FWUPD_REMOTE_KIND_DOWNLOAD
*
* Since: 0.9.6
**/
FwupdRemoteKind
fwupd_remote_kind_from_string (const gchar *kind)
{
if (g_strcmp0 (kind, "download") == 0)
return FWUPD_REMOTE_KIND_DOWNLOAD;
if (g_strcmp0 (kind, "local") == 0)
return FWUPD_REMOTE_KIND_LOCAL;
if (g_strcmp0 (kind, "directory") == 0)
return FWUPD_REMOTE_KIND_DIRECTORY;
return FWUPD_REMOTE_KIND_UNKNOWN;
}
/**
* fwupd_remote_kind_to_string:
* @kind: a #FwupdRemoteKind, e.g. %FWUPD_REMOTE_KIND_DOWNLOAD
*
* Converts an enumerated type to a printable string.
*
* Returns: a string, e.g. `download`
*
* Since: 0.9.6
**/
const gchar *
fwupd_remote_kind_to_string (FwupdRemoteKind kind)
{
if (kind == FWUPD_REMOTE_KIND_DOWNLOAD)
return "download";
if (kind == FWUPD_REMOTE_KIND_LOCAL)
return "local";
if (kind == FWUPD_REMOTE_KIND_DIRECTORY)
return "directory";
return NULL;
}
static void
fwupd_remote_set_filename_cache (FwupdRemote *self, const gchar *filename)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
const gchar *suffix;
g_return_if_fail (FWUPD_IS_REMOTE (self));
/* not changed */
if (g_strcmp0 (priv->filename_cache, filename) == 0)
return;
g_free (priv->filename_cache);
priv->filename_cache = g_strdup (filename);
/* create for all remote types */
suffix = fwupd_remote_get_suffix_for_keyring_kind (priv->keyring_kind);
if (suffix != NULL) {
g_free (priv->filename_cache_sig);
priv->filename_cache_sig = g_strconcat (filename, suffix, NULL);
}
}
/**
* fwupd_remote_load_from_filename:
* @self: A #FwupdRemote
* @filename: A filename
* @cancellable: (nullable): optional #GCancellable
* @error: (nullable): optional return location for an error
*
* Sets up the remote ready for use. Most other methods call this
* for you, and do you only need to call this if you are just watching
* the self.
*
* Returns: %TRUE for success
*
* Since: 0.9.3
**/
gboolean
fwupd_remote_load_from_filename (FwupdRemote *self,
const gchar *filename,
GCancellable *cancellable,
GError **error)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
const gchar *group = "fwupd Remote";
g_autofree gchar *firmware_base_uri = NULL;
g_autofree gchar *id = NULL;
g_autofree gchar *keyring_kind = NULL;
g_autofree gchar *metadata_uri = NULL;
g_autofree gchar *order_after = NULL;
g_autofree gchar *order_before = NULL;
g_autofree gchar *report_uri = NULL;
g_autofree gchar *security_report_uri = NULL;
g_autoptr(GKeyFile) kf = NULL;
g_return_val_if_fail (FWUPD_IS_REMOTE (self), FALSE);
g_return_val_if_fail (filename != NULL, FALSE);
g_return_val_if_fail (cancellable == NULL || G_IS_CANCELLABLE (cancellable), FALSE);
g_return_val_if_fail (error == NULL || *error == NULL, FALSE);
/* set ID */
id = g_path_get_basename (filename);
fwupd_remote_set_id (self, id);
/* load file */
kf = g_key_file_new ();
if (!g_key_file_load_from_file (kf, filename, G_KEY_FILE_NONE, error))
return FALSE;
/* get verification type, falling back to GPG */
keyring_kind = g_key_file_get_string (kf, group, "Keyring", NULL);
if (keyring_kind == NULL) {
priv->keyring_kind = FWUPD_KEYRING_KIND_JCAT;
} else {
priv->keyring_kind = fwupd_keyring_kind_from_string (keyring_kind);
if (priv->keyring_kind == FWUPD_KEYRING_KIND_UNKNOWN) {
g_set_error (error,
FWUPD_ERROR,
FWUPD_ERROR_INVALID_FILE,
"Failed to parse type '%s'",
keyring_kind);
return FALSE;
}
}
/* all remotes need a URI, even if it's file:// to the cache */
metadata_uri = g_key_file_get_string (kf, group, "MetadataURI", error);
if (metadata_uri == NULL)
return FALSE;
if (g_str_has_prefix (metadata_uri, "file://")) {
const gchar *filename_cache = metadata_uri;
if (g_str_has_prefix (filename_cache, "file://"))
filename_cache += 7;
fwupd_remote_set_filename_cache (self, filename_cache);
if (g_file_test (filename_cache, G_FILE_TEST_IS_DIR))
priv->kind = FWUPD_REMOTE_KIND_DIRECTORY;
else
priv->kind = FWUPD_REMOTE_KIND_LOCAL;
} else if (g_str_has_prefix (metadata_uri, "http://") ||
g_str_has_prefix (metadata_uri, "https://") ||
g_str_has_prefix (metadata_uri, "ipfs://") ||
g_str_has_prefix (metadata_uri, "ipns://")) {
priv->kind = FWUPD_REMOTE_KIND_DOWNLOAD;
} else {
g_set_error (error,
FWUPD_ERROR,
FWUPD_ERROR_INVALID_FILE,
"Failed to parse MetadataURI type '%s'",
metadata_uri);
return FALSE;
}
/* extract data */
priv->enabled = g_key_file_get_boolean (kf, group, "Enabled", NULL);
priv->approval_required = g_key_file_get_boolean (kf, group, "ApprovalRequired", NULL);
priv->title = g_key_file_get_string (kf, group, "Title", NULL);
/* reporting is optional */
report_uri = g_key_file_get_string (kf, group, "ReportURI", NULL);
if (report_uri != NULL && report_uri[0] != '\0')
fwupd_remote_set_report_uri (self, report_uri);
/* security reporting is optional */
security_report_uri = g_key_file_get_string (kf, group, "SecurityReportURI", NULL);
if (security_report_uri != NULL && security_report_uri[0] != '\0')
fwupd_remote_set_security_report_uri (self, security_report_uri);
/* automatic report uploading */
priv->automatic_reports = g_key_file_get_boolean (kf, group, "AutomaticReports", NULL);
priv->automatic_security_reports = g_key_file_get_boolean (kf, group, "AutomaticSecurityReports", NULL);
/* DOWNLOAD-type remotes */
if (priv->kind == FWUPD_REMOTE_KIND_DOWNLOAD) {
g_autofree gchar *filename_cache = NULL;
g_autofree gchar *username = NULL;
g_autofree gchar *password = NULL;
/* the client has to download this and the signature */
fwupd_remote_set_metadata_uri (self, metadata_uri);
/* check the URI was valid */
if (priv->metadata_uri == NULL) {
g_set_error (error,
FWUPD_ERROR,
FWUPD_ERROR_INVALID_FILE,
"Failed to parse URI '%s' in %s",
metadata_uri, filename);
return FALSE;
}
/* username and password are optional */
username = g_key_file_get_string (kf, group, "Username", NULL);
if (username != NULL)
fwupd_remote_set_username (self, username);
password = g_key_file_get_string (kf, group, "Password", NULL);
if (password != NULL)
fwupd_remote_set_password (self, password);
if (priv->remotes_dir == NULL) {
g_set_error_literal (error,
FWUPD_ERROR,
FWUPD_ERROR_INTERNAL,
"Remotes directory not set");
return FALSE;
}
/* set cache to /var/lib... */
filename_cache = g_build_filename (priv->remotes_dir,
priv->id,
"metadata.xml.gz",
NULL);
fwupd_remote_set_filename_cache (self, filename_cache);
}
/* load the checksum */
if (priv->filename_cache_sig != NULL &&
g_file_test (priv->filename_cache_sig, G_FILE_TEST_EXISTS)) {
gsize sz = 0;
g_autofree gchar *buf = NULL;
g_autoptr(GChecksum) checksum = g_checksum_new (G_CHECKSUM_SHA256);
if (!g_file_get_contents (priv->filename_cache_sig, &buf, &sz, error)) {
g_prefix_error (error, "failed to get checksum: ");
return FALSE;
}
g_checksum_update (checksum, (guchar *) buf, (gssize) sz);
fwupd_remote_set_checksum (self, g_checksum_get_string (checksum));
} else {
fwupd_remote_set_checksum (self, NULL);
}
/* the base URI is optional */
firmware_base_uri = g_key_file_get_string (kf, group, "FirmwareBaseURI", NULL);
if (firmware_base_uri != NULL)
fwupd_remote_set_firmware_base_uri (self, firmware_base_uri);
/* some validation around DIRECTORY types */
if (priv->kind == FWUPD_REMOTE_KIND_DIRECTORY) {
if (priv->keyring_kind != FWUPD_KEYRING_KIND_NONE) {
g_set_error (error,
FWUPD_ERROR,
FWUPD_ERROR_INVALID_FILE,
"Keyring kind %s is not supported with directory remote",
fwupd_keyring_kind_to_string (priv->keyring_kind));
return FALSE;
}
if (firmware_base_uri != NULL) {
g_set_error_literal (error,
FWUPD_ERROR,
FWUPD_ERROR_INVALID_FILE,
"Directory remotes don't support firmware base URI");
return FALSE;
}
}
/* dep logic */
order_before = g_key_file_get_string (kf, group, "OrderBefore", NULL);
if (order_before != NULL)
priv->order_before = g_strsplit_set (order_before, ",:;", -1);
order_after = g_key_file_get_string (kf, group, "OrderAfter", NULL);
if (order_after != NULL)
priv->order_after = g_strsplit_set (order_after, ",:;", -1);
/* success */
fwupd_remote_set_filename_source (self, filename);
return TRUE;
}
/**
* fwupd_remote_get_order_after:
* @self: A #FwupdRemote
*
* Gets the list of remotes this plugin should be ordered after.
*
* Returns: (transfer none): an array
*
* Since: 0.9.5
**/
gchar **
fwupd_remote_get_order_after (FwupdRemote *self)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
g_return_val_if_fail (FWUPD_IS_REMOTE (self), NULL);
return priv->order_after;
}
/**
* fwupd_remote_get_order_before:
* @self: A #FwupdRemote
*
* Gets the list of remotes this plugin should be ordered before.
*
* Returns: (transfer none): an array
*
* Since: 0.9.5
**/
gchar **
fwupd_remote_get_order_before (FwupdRemote *self)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
g_return_val_if_fail (FWUPD_IS_REMOTE (self), NULL);
return priv->order_before;
}
/**
* fwupd_remote_get_filename_cache:
* @self: A #FwupdRemote
*
* Gets the path and filename that the remote is using for a cache.
*
* Returns: a string, or %NULL for unset
*
* Since: 0.9.6
**/
const gchar *
fwupd_remote_get_filename_cache (FwupdRemote *self)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
g_return_val_if_fail (FWUPD_IS_REMOTE (self), NULL);
return priv->filename_cache;
}
/**
* fwupd_remote_get_filename_cache_sig:
* @self: A #FwupdRemote
*
* Gets the path and filename that the remote is using for a signature cache.
*
* Returns: a string, or %NULL for unset
*
* Since: 0.9.7
**/
const gchar *
fwupd_remote_get_filename_cache_sig (FwupdRemote *self)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
g_return_val_if_fail (FWUPD_IS_REMOTE (self), NULL);
return priv->filename_cache_sig;
}
/**
* fwupd_remote_get_filename_source:
* @self: A #FwupdRemote
*
* Gets the path and filename of the remote itself, typically a `.conf` file.
*
* Returns: a string, or %NULL for unset
*
* Since: 0.9.8
**/
const gchar *
fwupd_remote_get_filename_source (FwupdRemote *self)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
g_return_val_if_fail (FWUPD_IS_REMOTE (self), NULL);
return priv->filename_source;
}
/**
* fwupd_remote_get_priority:
* @self: A #FwupdRemote
*
* Gets the priority of the remote, where bigger numbers are better.
*
* Returns: a priority, or 0 for the default value
*
* Since: 0.9.5
**/
gint
fwupd_remote_get_priority (FwupdRemote *self)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
g_return_val_if_fail (FWUPD_IS_REMOTE (self), 0);
return priv->priority;
}
/**
* fwupd_remote_get_kind:
* @self: A #FwupdRemote
*
* Gets the kind of the remote.
*
* Returns: a #FwupdRemoteKind, e.g. #FWUPD_REMOTE_KIND_LOCAL
*
* Since: 0.9.6
**/
FwupdRemoteKind
fwupd_remote_get_kind (FwupdRemote *self)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
g_return_val_if_fail (FWUPD_IS_REMOTE (self), 0);
return priv->kind;
}
/**
* fwupd_remote_get_keyring_kind:
* @self: A #FwupdRemote
*
* Gets the keyring kind of the remote.
*
* Returns: a #FwupdKeyringKind, e.g. #FWUPD_KEYRING_KIND_GPG
*
* Since: 0.9.7
**/
FwupdKeyringKind
fwupd_remote_get_keyring_kind (FwupdRemote *self)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
g_return_val_if_fail (FWUPD_IS_REMOTE (self), 0);
return priv->keyring_kind;
}
/**
* fwupd_remote_get_age:
* @self: A #FwupdRemote
*
* Gets the age of the remote in seconds.
*
* Returns: a age, or %G_MAXUINT64 for unavailable
*
* Since: 0.9.5
**/
guint64
fwupd_remote_get_age (FwupdRemote *self)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
guint64 now;
g_return_val_if_fail (FWUPD_IS_REMOTE (self), 0);
now = (guint64) g_get_real_time () / G_USEC_PER_SEC;
if (priv->mtime > now)
return G_MAXUINT64;
return now - priv->mtime;
}
/**
* fwupd_remote_set_remotes_dir:
* @self: A #FwupdRemote
* @directory: Remotes directory
*
* Sets the directory to store remote data
*
* Since: 1.3.1
**/
void
fwupd_remote_set_remotes_dir (FwupdRemote *self, const gchar *directory)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
g_return_if_fail (FWUPD_IS_REMOTE (self));
/* not changed */
if (g_strcmp0 (priv->remotes_dir, directory) == 0)
return;
g_free (priv->remotes_dir);
priv->remotes_dir = g_strdup (directory);
}
/**
* fwupd_remote_set_priority:
* @self: A #FwupdRemote
* @priority: an integer, where 1 is better
*
* Sets the plugin priority.
*
* Since: 0.9.5
**/
void
fwupd_remote_set_priority (FwupdRemote *self, gint priority)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
g_return_if_fail (FWUPD_IS_REMOTE (self));
priv->priority = priority;
}
/**
* fwupd_remote_set_mtime:
* @self: A #FwupdRemote
* @mtime: a UNIX itmestamp
*
* Sets the plugin modification time.
*
* Since: 0.9.5
**/
void
fwupd_remote_set_mtime (FwupdRemote *self, guint64 mtime)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
g_return_if_fail (FWUPD_IS_REMOTE (self));
priv->mtime = mtime;
}
/**
* fwupd_remote_get_username:
* @self: A #FwupdRemote
*
* Gets the username configured for the remote.
*
* Returns: a string, or %NULL for unset
*
* Since: 0.9.5
**/
const gchar *
fwupd_remote_get_username (FwupdRemote *self)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
g_return_val_if_fail (FWUPD_IS_REMOTE (self), NULL);
return priv->username;
}
/**
* fwupd_remote_get_password:
* @self: A #FwupdRemote
*
* Gets the password configured for the remote.
*
* Returns: a string, or %NULL for unset
*
* Since: 0.9.5
**/
const gchar *
fwupd_remote_get_password (FwupdRemote *self)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
g_return_val_if_fail (FWUPD_IS_REMOTE (self), NULL);
return priv->password;
}
/**
* fwupd_remote_get_title:
* @self: A #FwupdRemote
*
* Gets the remote title, e.g. `Linux Vendor Firmware Service`.
*
* Returns: a string, or %NULL if unset
*
* Since: 0.9.8
**/
const gchar *
fwupd_remote_get_title (FwupdRemote *self)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
g_return_val_if_fail (FWUPD_IS_REMOTE (self), NULL);
return priv->title;
}
/**
* fwupd_remote_get_agreement:
* @self: A #FwupdRemote
*
* Gets the remote agreement in AppStream markup format
*
* Returns: a string, or %NULL if unset
*
* Since: 1.0.7
**/
const gchar *
fwupd_remote_get_agreement (FwupdRemote *self)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
g_return_val_if_fail (FWUPD_IS_REMOTE (self), NULL);
return priv->agreement;
}
/**
* fwupd_remote_get_remotes_dir:
* @self: A #FwupdRemote
*
* Gets the base directory for storing remote metadata
*
* Returns: a string, or %NULL if unset
*
* Since: 1.3.1
**/
const gchar *
fwupd_remote_get_remotes_dir (FwupdRemote *self)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
g_return_val_if_fail (FWUPD_IS_REMOTE (self), NULL);
return priv->remotes_dir;
}
/**
* fwupd_remote_get_checksum:
* @self: A #FwupdRemote
*
* Gets the remote checksum.
*
* Returns: a string, or %NULL if unset
*
* Since: 1.0.0
**/
const gchar *
fwupd_remote_get_checksum (FwupdRemote *self)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
g_return_val_if_fail (FWUPD_IS_REMOTE (self), NULL);
return priv->checksum;
}
/**
* fwupd_remote_build_firmware_uri:
* @self: A #FwupdRemote
* @url: the URL to use
* @error: (nullable): optional return location for an error
*
* Builds a URI for the URL using the username and password set for the remote,
* including any basename URI substitution.
*
* Returns: (transfer full): a URI, or %NULL for error
*
* Since: 0.9.7
**/
gchar *
fwupd_remote_build_firmware_uri (FwupdRemote *self, const gchar *url, GError **error)
{
g_return_val_if_fail (FWUPD_IS_REMOTE (self), NULL);
g_return_val_if_fail (url != NULL, NULL);
g_return_val_if_fail (error == NULL || *error == NULL, NULL);
return fwupd_remote_build_uri (self, url, error);
}
/**
* fwupd_remote_get_report_uri:
* @self: A #FwupdRemote
*
* Gets the URI for the remote reporting.
*
* Returns: (transfer none): a URI, or %NULL for invalid.
*
* Since: 1.0.4
**/
const gchar *
fwupd_remote_get_report_uri (FwupdRemote *self)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
g_return_val_if_fail (FWUPD_IS_REMOTE (self), NULL);
return priv->report_uri;
}
/**
* fwupd_remote_get_security_report_uri:
* @self: A #FwupdRemote
*
* Gets the URI for the security report.
*
* Returns: (transfer none): a URI, or %NULL for invalid.
*
* Since: 1.5.0
**/
const gchar *
fwupd_remote_get_security_report_uri (FwupdRemote *self)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
g_return_val_if_fail (FWUPD_IS_REMOTE (self), NULL);
return priv->security_report_uri;
}
/**
* fwupd_remote_get_metadata_uri:
* @self: A #FwupdRemote
*
* Gets the URI for the remote metadata.
*
* Returns: (transfer none): a URI, or %NULL for invalid.
*
* Since: 0.9.7
**/
const gchar *
fwupd_remote_get_metadata_uri (FwupdRemote *self)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
g_return_val_if_fail (FWUPD_IS_REMOTE (self), NULL);
return priv->metadata_uri;
}
static gboolean
fwupd_remote_load_signature_jcat (FwupdRemote *self, JcatFile *jcat_file, GError **error)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
const gchar *id;
g_autofree gchar *basename = NULL;
g_autofree gchar *baseuri = NULL;
g_autofree gchar *metadata_uri = NULL;
g_autoptr(JcatItem) jcat_item = NULL;
/* this seems pointless to get the item by ID then just read the ID,
* but _get_item_by_id() uses the AliasIds as a fallback */
basename = g_path_get_basename (priv->metadata_uri);
jcat_item = jcat_file_get_item_by_id (jcat_file, basename, NULL);
if (jcat_item == NULL) {
/* if we're using libjcat 0.1.0 just get the default item */
jcat_item = jcat_file_get_item_default (jcat_file, error);
if (jcat_item == NULL)
return FALSE;
}
id = jcat_item_get_id (jcat_item);
if (id == NULL) {
g_set_error_literal (error,
FWUPD_ERROR,
FWUPD_ERROR_INVALID_FILE,
"No ID for JCat item");
return FALSE;
}
/* replace the URI if required */
baseuri = g_path_get_dirname (priv->metadata_uri);
metadata_uri = g_build_filename (baseuri, id, NULL);
if (g_strcmp0 (metadata_uri, priv->metadata_uri) != 0) {
g_debug ("changing metadata URI from %s to %s",
priv->metadata_uri, metadata_uri);
g_free (priv->metadata_uri);
priv->metadata_uri = g_steal_pointer (&metadata_uri);
}
/* success */
return TRUE;
}
/**
* fwupd_remote_load_signature_bytes:
* @self: A #FwupdRemote
* @bytes: A #GBytes
* @error: (nullable): optional return location for an error
*
* Parses the signature, updating the metadata URI as appropriate.
*
* This can only be called for remotes with `Keyring=jcat` which is
* the default for most remotes.
*
* Returns: %TRUE for success
*
* Since: 1.4.5
**/
gboolean
fwupd_remote_load_signature_bytes (FwupdRemote *self, GBytes *bytes, GError **error)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
g_autoptr(GInputStream) istr = NULL;
g_autoptr(JcatFile) jcat_file = jcat_file_new ();
g_return_val_if_fail (FWUPD_IS_REMOTE (self), FALSE);
g_return_val_if_fail (bytes != NULL, FALSE);
g_return_val_if_fail (error == NULL || *error == NULL, FALSE);
/* sanity check */
if (priv->keyring_kind != FWUPD_KEYRING_KIND_JCAT) {
g_set_error_literal (error,
FWUPD_ERROR,
FWUPD_ERROR_NOT_SUPPORTED,
"only supported for JCat remotes");
return FALSE;
}
istr = g_memory_input_stream_new_from_bytes (bytes);
if (!jcat_file_import_stream (jcat_file, istr, JCAT_IMPORT_FLAG_NONE, NULL, error))
return FALSE;
return fwupd_remote_load_signature_jcat (self, jcat_file, error);
}
/**
* fwupd_remote_load_signature:
* @self: A #FwupdRemote
* @filename: A filename
* @error: (nullable): optional return location for an error
*
* Parses the signature, updating the metadata URI as appropriate.
*
* Returns: %TRUE for success
*
* Since: 1.4.0
**/
gboolean
fwupd_remote_load_signature (FwupdRemote *self, const gchar *filename, GError **error)
{
g_autoptr(GFile) gfile = NULL;
g_autoptr(JcatFile) jcat_file = jcat_file_new ();
g_return_val_if_fail (FWUPD_IS_REMOTE (self), FALSE);
g_return_val_if_fail (filename != NULL, FALSE);
g_return_val_if_fail (error == NULL || *error == NULL, FALSE);
/* load JCat file */
gfile = g_file_new_for_path (filename);
if (!jcat_file_import_file (jcat_file, gfile, JCAT_IMPORT_FLAG_NONE, NULL, error))
return FALSE;
return fwupd_remote_load_signature_jcat (self, jcat_file, error);
}
/**
* fwupd_remote_get_metadata_uri_sig:
* @self: A #FwupdRemote
*
* Gets the URI for the remote metadata signature.
*
* Returns: (transfer none): a URI, or %NULL for invalid.
*
* Since: 0.9.7
**/
const gchar *
fwupd_remote_get_metadata_uri_sig (FwupdRemote *self)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
g_return_val_if_fail (FWUPD_IS_REMOTE (self), NULL);
return priv->metadata_uri_sig;
}
/**
* fwupd_remote_get_firmware_base_uri:
* @self: A #FwupdRemote
*
* Gets the base URI for firmware.
*
* Returns: (transfer none): a URI, or %NULL for unset.
*
* Since: 0.9.7
**/
const gchar *
fwupd_remote_get_firmware_base_uri (FwupdRemote *self)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
g_return_val_if_fail (FWUPD_IS_REMOTE (self), NULL);
return priv->firmware_base_uri;
}
/**
* fwupd_remote_get_enabled:
* @self: A #FwupdRemote
*
* Gets if the remote is enabled and should be used.
*
* Returns: a #TRUE if the remote is enabled
*
* Since: 0.9.3
**/
gboolean
fwupd_remote_get_enabled (FwupdRemote *self)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
g_return_val_if_fail (FWUPD_IS_REMOTE (self), FALSE);
return priv->enabled;
}
/**
* fwupd_remote_get_automatic_reports:
* @self: A #FwupdRemote
*
* Gets if reports should be automatically uploaded to this remote
*
* Returns: a #TRUE if the remote should have reports uploaded automatically
*
* Since: 1.3.3
**/
gboolean
fwupd_remote_get_automatic_reports (FwupdRemote *self)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
g_return_val_if_fail (FWUPD_IS_REMOTE (self), FALSE);
return priv->automatic_reports;
}
/**
* fwupd_remote_get_automatic_security_reports:
* @self: A #FwupdRemote
*
* Gets if security reports should be automatically uploaded to this remote
*
* Returns: a #TRUE if the remote should have reports uploaded automatically
*
* Since: 1.5.0
**/
gboolean
fwupd_remote_get_automatic_security_reports (FwupdRemote *self)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
g_return_val_if_fail (FWUPD_IS_REMOTE (self), FALSE);
return priv->automatic_security_reports;
}
/**
* fwupd_remote_get_approval_required:
* @self: A #FwupdRemote
*
* Gets if firmware from the remote should be checked against the list
* of a approved checksums.
*
* Returns: a #TRUE if the remote is restricted
*
* Since: 1.2.6
**/
gboolean
fwupd_remote_get_approval_required (FwupdRemote *self)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
g_return_val_if_fail (FWUPD_IS_REMOTE (self), FALSE);
return priv->approval_required;
}
/**
* fwupd_remote_get_id:
* @self: A #FwupdRemote
*
* Gets the remote ID, e.g. `lvfs-testing`.
*
* Returns: a string, or %NULL if unset
*
* Since: 0.9.3
**/
const gchar *
fwupd_remote_get_id (FwupdRemote *self)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
g_return_val_if_fail (FWUPD_IS_REMOTE (self), NULL);
return priv->id;
}
static void
fwupd_remote_set_from_variant_iter (FwupdRemote *self, GVariantIter *iter)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
GVariant *value;
const gchar *key;
g_autoptr(GVariantIter) iter2 = g_variant_iter_copy (iter);
g_autoptr(GVariantIter) iter3 = g_variant_iter_copy (iter);
/* three passes, as we have to construct Id -> Url -> * */
while (g_variant_iter_loop (iter, "{sv}", &key, &value)) {
if (g_strcmp0 (key, FWUPD_RESULT_KEY_REMOTE_ID) == 0)
fwupd_remote_set_id (self, g_variant_get_string (value, NULL));
if (g_strcmp0 (key, "Type") == 0)
fwupd_remote_set_kind (self, g_variant_get_uint32 (value));
if (g_strcmp0 (key, "Keyring") == 0)
fwupd_remote_set_keyring_kind (self, g_variant_get_uint32 (value));
}
while (g_variant_iter_loop (iter2, "{sv}", &key, &value)) {
if (g_strcmp0 (key, FWUPD_RESULT_KEY_URI) == 0)
fwupd_remote_set_metadata_uri (self, g_variant_get_string (value, NULL));
if (g_strcmp0 (key, "FilenameCache") == 0)
fwupd_remote_set_filename_cache (self, g_variant_get_string (value, NULL));
if (g_strcmp0 (key, "FilenameSource") == 0)
fwupd_remote_set_filename_source (self, g_variant_get_string (value, NULL));
if (g_strcmp0 (key, "ReportUri") == 0)
fwupd_remote_set_report_uri (self, g_variant_get_string (value, NULL));
if (g_strcmp0 (key, "SecurityReportUri") == 0)
fwupd_remote_set_security_report_uri (self, g_variant_get_string (value, NULL));
}
while (g_variant_iter_loop (iter3, "{sv}", &key, &value)) {
if (g_strcmp0 (key, "Username") == 0) {
fwupd_remote_set_username (self, g_variant_get_string (value, NULL));
} else if (g_strcmp0 (key, "Password") == 0) {
fwupd_remote_set_password (self, g_variant_get_string (value, NULL));
} else if (g_strcmp0 (key, "Title") == 0) {
fwupd_remote_set_title (self, g_variant_get_string (value, NULL));
} else if (g_strcmp0 (key, "Agreement") == 0) {
fwupd_remote_set_agreement (self, g_variant_get_string (value, NULL));
} else if (g_strcmp0 (key, FWUPD_RESULT_KEY_CHECKSUM) == 0) {
fwupd_remote_set_checksum (self, g_variant_get_string (value, NULL));
} else if (g_strcmp0 (key, "Enabled") == 0) {
priv->enabled = g_variant_get_boolean (value);
} else if (g_strcmp0 (key, "ApprovalRequired") == 0) {
priv->approval_required = g_variant_get_boolean (value);
} else if (g_strcmp0 (key, "Priority") == 0) {
priv->priority = g_variant_get_int32 (value);
} else if (g_strcmp0 (key, "ModificationTime") == 0) {
priv->mtime = g_variant_get_uint64 (value);
} else if (g_strcmp0 (key, "FirmwareBaseUri") == 0) {
fwupd_remote_set_firmware_base_uri (self, g_variant_get_string (value, NULL));
} else if (g_strcmp0 (key, "AutomaticReports") == 0) {
priv->automatic_reports = g_variant_get_boolean (value);
} else if (g_strcmp0 (key, "AutomaticSecurityReports") == 0) {
priv->automatic_security_reports = g_variant_get_boolean (value);
}
}
}
/**
* fwupd_remote_to_variant:
* @self: A #FwupdRemote
*
* Creates a GVariant from the remote data.
*
* Returns: the GVariant, or %NULL for error
*
* Since: 1.0.0
**/
GVariant *
fwupd_remote_to_variant (FwupdRemote *self)
{
FwupdRemotePrivate *priv = GET_PRIVATE (self);
GVariantBuilder builder;
g_return_val_if_fail (FWUPD_IS_REMOTE (self), NULL);
/* create an array with all the metadata in */
g_variant_builder_init (&builder, G_VARIANT_TYPE_VARDICT);
if (priv->id != NULL) {
g_variant_builder_add (&builder, "{sv}", FWUPD_RESULT_KEY_REMOTE_ID,
g_variant_new_string (priv->id));
}
if (priv->username != NULL) {
g_variant_builder_add (&builder, "{sv}", "Username",
g_variant_new_string (priv->username));
}
if (priv->password != NULL) {
g_variant_builder_add (&builder, "{sv}", "Password",
g_variant_new_string (priv->password));
}
if (priv->title != NULL) {
g_variant_builder_add (&builder, "{sv}", "Title",
g_variant_new_string (priv->title));
}
if (priv->agreement != NULL) {
g_variant_builder_add (&builder, "{sv}", "Agreement",
g_variant_new_string (priv->agreement));
}
if (priv->checksum != NULL) {
g_variant_builder_add (&builder, "{sv}", FWUPD_RESULT_KEY_CHECKSUM,
g_variant_new_string (priv->checksum));
}
if (priv->metadata_uri != NULL) {
g_variant_builder_add (&builder, "{sv}", FWUPD_RESULT_KEY_URI,
g_variant_new_string (priv->metadata_uri));
}
if (priv->report_uri != NULL) {
g_variant_builder_add (&builder, "{sv}", "ReportUri",
g_variant_new_string (priv->report_uri));
}
if (priv->security_report_uri != NULL) {
g_variant_builder_add (&builder, "{sv}", "SecurityReportUri",
g_variant_new_string (priv->security_report_uri));
}
if (priv->firmware_base_uri != NULL) {
g_variant_builder_add (&builder, "{sv}", "FirmwareBaseUri",
g_variant_new_string (priv->firmware_base_uri));
}
if (priv->priority != 0) {
g_variant_builder_add (&builder, "{sv}", "Priority",
g_variant_new_int32 (priv->priority));
}
if (priv->kind != FWUPD_REMOTE_KIND_UNKNOWN) {
g_variant_builder_add (&builder, "{sv}", "Type",
g_variant_new_uint32 (priv->kind));
}
if (priv->keyring_kind != FWUPD_KEYRING_KIND_UNKNOWN) {
g_variant_builder_add (&builder, "{sv}", "Keyring",
g_variant_new_uint32 (priv->keyring_kind));
}
if (priv->mtime != 0) {
g_variant_builder_add (&builder, "{sv}", "ModificationTime",
g_variant_new_uint64 (priv->mtime));
}
if (priv->filename_cache != NULL) {
g_variant_builder_add (&builder, "{sv}", "FilenameCache",
g_variant_new_string (priv->filename_cache));
}
if (priv->filename_source != NULL) {
g_variant_builder_add (&builder, "{sv}", "FilenameSource",
g_variant_new_string (priv->filename_source));
}
if (priv->remotes_dir != NULL) {
g_variant_builder_add (&builder, "{sv}", "RemotesDir",
g_variant_new_string (priv->remotes_dir));
}
g_variant_builder_add (&builder, "{sv}", "Enabled",
g_variant_new_boolean (priv->enabled));
g_variant_builder_add (&builder, "{sv}", "ApprovalRequired",
g_variant_new_boolean (priv->approval_required));
g_variant_builder_add (&builder, "{sv}", "AutomaticReports",
g_variant_new_boolean (priv->automatic_reports));
g_variant_builder_add (&builder, "{sv}", "AutomaticSecurityReports",
g_variant_new_boolean (priv->automatic_security_reports));
return g_variant_new ("a{sv}", &builder);
}
static void
fwupd_remote_get_property (GObject *obj, guint prop_id,
GValue *value, GParamSpec *pspec)
{
FwupdRemote *self = FWUPD_REMOTE (obj);
FwupdRemotePrivate *priv = GET_PRIVATE (self);
switch (prop_id) {
case PROP_ENABLED:
g_value_set_boolean (value, priv->enabled);
break;
case PROP_APPROVAL_REQUIRED:
g_value_set_boolean (value, priv->approval_required);
break;
case PROP_ID:
g_value_set_string (value, priv->id);
break;
case PROP_AUTOMATIC_REPORTS:
g_value_set_boolean (value, priv->automatic_reports);
break;
case PROP_AUTOMATIC_SECURITY_REPORTS:
g_value_set_boolean (value, priv->automatic_security_reports);
break;
default:
G_OBJECT_WARN_INVALID_PROPERTY_ID (obj, prop_id, pspec);
break;
}
}
static void
fwupd_remote_set_property (GObject *obj, guint prop_id,
const GValue *value, GParamSpec *pspec)
{
FwupdRemote *self = FWUPD_REMOTE (obj);
FwupdRemotePrivate *priv = GET_PRIVATE (self);
switch (prop_id) {
case PROP_ENABLED:
priv->enabled = g_value_get_boolean (value);
break;
case PROP_APPROVAL_REQUIRED:
priv->approval_required = g_value_get_boolean (value);
break;
case PROP_ID:
fwupd_remote_set_id (self, g_value_get_string (value));
break;
case PROP_AUTOMATIC_REPORTS:
priv->automatic_reports = g_value_get_boolean (value);
break;
case PROP_AUTOMATIC_SECURITY_REPORTS:
priv->automatic_security_reports = g_value_get_boolean (value);
break;
default:
G_OBJECT_WARN_INVALID_PROPERTY_ID (obj, prop_id, pspec);
break;
}
}
static void
fwupd_remote_class_init (FwupdRemoteClass *klass)
{
GParamSpec *pspec;
GObjectClass *object_class = G_OBJECT_CLASS (klass);
object_class->finalize = fwupd_remote_finalize;
object_class->get_property = fwupd_remote_get_property;
object_class->set_property = fwupd_remote_set_property;
/**
* FwupdRemote:id:
*
* The remote ID.
*
* Since: 0.9.3
*/
pspec = g_param_spec_string ("id", NULL, NULL,
NULL, G_PARAM_READWRITE | G_PARAM_STATIC_NAME);
g_object_class_install_property (object_class, PROP_ID, pspec);
/**
* FwupdRemote:enabled:
*
* If the remote is enabled and should be used.
*
* Since: 0.9.3
*/
pspec = g_param_spec_boolean ("enabled", NULL, NULL,
FALSE, G_PARAM_READWRITE | G_PARAM_STATIC_NAME);
g_object_class_install_property (object_class, PROP_ENABLED, pspec);
/**
* FwupdRemote:approval-required:
*
* If firmware from the remote should be checked against the system
* list of approved firmware.
*
* Since: 1.2.6
*/
pspec = g_param_spec_boolean ("approval-required", NULL, NULL,
FALSE, G_PARAM_READWRITE | G_PARAM_STATIC_NAME);
g_object_class_install_property (object_class, PROP_APPROVAL_REQUIRED, pspec);
/**
* FwupdRemote:automatic-reports:
*
* The behavior for auto-uploading reports.
*
* Since: 1.3.3
*/
pspec = g_param_spec_boolean ("automatic-reports", NULL, NULL,
FALSE, G_PARAM_READWRITE | G_PARAM_STATIC_NAME);
g_object_class_install_property (object_class, PROP_AUTOMATIC_REPORTS, pspec);
/**
* FwupdRemote:automatic-security-reports:
*
* The behavior for auto-uploading security reports.
*
* Since: 1.5.0
*/
pspec = g_param_spec_boolean ("automatic-security-reports", NULL, NULL,
FALSE, G_PARAM_READWRITE | G_PARAM_STATIC_NAME);
g_object_class_install_property (object_class, PROP_AUTOMATIC_SECURITY_REPORTS, pspec);
}
static void
fwupd_remote_init (FwupdRemote *self)
{
}
static void
fwupd_remote_finalize (GObject *obj)
{
FwupdRemote *self = FWUPD_REMOTE (obj);
FwupdRemotePrivate *priv = GET_PRIVATE (self);
g_free (priv->id);
g_free (priv->metadata_uri);
g_free (priv->metadata_uri_sig);
g_free (priv->firmware_base_uri);
g_free (priv->report_uri);
g_free (priv->security_report_uri);
g_free (priv->username);
g_free (priv->password);
g_free (priv->title);
g_free (priv->agreement);
g_free (priv->remotes_dir);
g_free (priv->checksum);
g_free (priv->filename_cache);
g_free (priv->filename_cache_sig);
g_free (priv->filename_source);
g_strfreev (priv->order_after);
g_strfreev (priv->order_before);
G_OBJECT_CLASS (fwupd_remote_parent_class)->finalize (obj);
}
/**
* fwupd_remote_from_variant:
* @value: a #GVariant
*
* Creates a new remote using packed data.
*
* Returns: (transfer full): a new #FwupdRemote, or %NULL if @value was invalid
*
* Since: 1.0.0
**/
FwupdRemote *
fwupd_remote_from_variant (GVariant *value)
{
FwupdRemote *rel = NULL;
const gchar *type_string;
g_autoptr(GVariantIter) iter = NULL;
type_string = g_variant_get_type_string (value);
if (g_strcmp0 (type_string, "(a{sv})") == 0) {
rel = fwupd_remote_new ();
g_variant_get (value, "(a{sv})", &iter);
fwupd_remote_set_from_variant_iter (rel, iter);
fwupd_remote_set_from_variant_iter (rel, iter);
} else if (g_strcmp0 (type_string, "a{sv}") == 0) {
rel = fwupd_remote_new ();
g_variant_get (value, "a{sv}", &iter);
fwupd_remote_set_from_variant_iter (rel, iter);
} else {
g_warning ("type %s not known", type_string);
}
return rel;
}
/**
* fwupd_remote_array_from_variant:
* @value: a #GVariant
*
* Creates an array of new devices using packed data.
*
* Returns: (transfer container) (element-type FwupdRemote): remotes, or %NULL if @value was invalid
*
* Since: 1.2.10
**/
GPtrArray *
fwupd_remote_array_from_variant (GVariant *value)
{
GPtrArray *remotes = NULL;
gsize sz;
g_autoptr(GVariant) untuple = NULL;
remotes = g_ptr_array_new_with_free_func ((GDestroyNotify) g_object_unref);
untuple = g_variant_get_child_value (value, 0);
sz = g_variant_n_children (untuple);
for (guint i = 0; i < sz; i++) {
g_autoptr(GVariant) data = g_variant_get_child_value (untuple, i);
FwupdRemote *remote = fwupd_remote_from_variant (data);
g_ptr_array_add (remotes, remote);
}
return remotes;
}
/**
* fwupd_remote_new:
*
* Creates a new fwupd remote.
*
* Returns: a new #FwupdRemote
*
* Since: 0.9.3
**/
FwupdRemote *
fwupd_remote_new (void)
{
FwupdRemote *self;
self = g_object_new (FWUPD_TYPE_REMOTE, NULL);
return FWUPD_REMOTE (self);
}