[Rpm-maint] FSM hooks for rpm plugin

Panu Matilainen pmatilai at laiskiainen.org
Tue Feb 26 14:04:03 UTC 2013


On 02/22/2013 11:25 AM, Panu Matilainen wrote:
> On 02/20/2013 11:01 AM, Reshetova, Elena wrote:
>> I think it looks much better now and integrating hooks to it is a
>> pleasure. I
>> am attaching the new version. Hope I didn't miss any strange case, but it
>> looked very easy now after your change!
>
> I'm actually going to be mildly surprised if there aren't any strange
> cases we've missed wrt hard links or such :) Anyway, the patch looks as
> obviously-correct as it gets within fsm. Applied, thanks for the patch!

Right, no surprises: there is an issue with hard links :)

The problem is that the links are created in one go when we come to the 
final link of a set, but the hooks are getting called for all the links 
and will likely fail because the path passed to the post-hook doesn't 
exist despite fsm->action being FA_CREATE.

How to deal with it is another question though: it could be worked 
around by passing eg FA_SKIP to the hooks for these files, but then 
plugins might want to know these files *are* actually going to be 
created, only later. We could introduce FA_DELAYED or such to signal the 
condition but then the plugins still wont know when exactly they are 
going to be created. And then because hardlinks are quite special, many 
plugins would probably want to differentiate them from other cases (eg 
for selinux, it makes no sense to repeatedly set a security context when 
a hardlink set can only have one context). OTOH some other plugins might 
want to know about them. Dunno... needs more thought (and a less tired 
mind to think with :)

Regardless of how exactly the hardlinks are handled, perhaps we should 
pass a pointer to the entire stat struct instead of just st_mode to the 
hooks, that'd at least allow plugins to know they're dealing with 
hardlinks (and various other possibly useful information).

A different issue (much easier and one that we already discussed iirc) 
is that I think we must check the return code from 
rpmpluginsCallFsmFilePost() and allow it to fail, otherwise its not 
possible to preserve the current behavior where eg failure to set 
SELinux context (or other similar security thing) causes package 
installation to fail.

The good news is that other than the two above issues, the plugin API 
seems to work quite nicely for SELinux.

	- Panu -


More information about the Rpm-maint mailing list