restructure of verify module for better code organizations

master
Chris Punches 2025-03-30 22:56:13 -04:00
parent 25f9afd1c8
commit 045294aeb6
8 changed files with 204 additions and 123 deletions

View File

@ -13,8 +13,10 @@ endif()
# Create shared library - add CommonModuleAPI.cpp to the sources
add_library(verify MODULE
verify.cpp
src/verify_commands.cpp
${DPM_ROOT_DIR}/dpmdk/src/CommonModuleAPI.cpp # Add this line
src/commands.cpp
${DPM_ROOT_DIR}/dpmdk/src/CommonModuleAPI.cpp
src/cli_parsers.cpp
src/verification.cpp
)
# Set output properties
@ -28,7 +30,7 @@ set_target_properties(
target_include_directories(verify PRIVATE
${CMAKE_CURRENT_SOURCE_DIR}/include
${DPM_ROOT_DIR}
${DPM_ROOT_DIR}/dpmdk/include # Add this line
${DPM_ROOT_DIR}/dpmdk/include
)
# Link with required libraries
@ -37,8 +39,10 @@ target_link_libraries(verify dl)
# Standalone version - used for debugging
add_executable(verify_standalone
verify.cpp
src/verify_commands.cpp
${DPM_ROOT_DIR}/dpmdk/src/CommonModuleAPI.cpp # Add this line
src/commands.cpp
${DPM_ROOT_DIR}/dpmdk/src/CommonModuleAPI.cpp
src/cli_parsers.cpp
src/verification.cpp
)
# Define the BUILD_STANDALONE macro for the standalone build
@ -48,7 +52,7 @@ target_compile_definitions(verify_standalone PRIVATE BUILD_STANDALONE)
target_include_directories(verify_standalone PRIVATE
${CMAKE_CURRENT_SOURCE_DIR}/include
${DPM_ROOT_DIR}
${DPM_ROOT_DIR}/dpmdk/include # Add this line
${DPM_ROOT_DIR}/dpmdk/include
)
# Link with required libraries for standalone too
@ -58,4 +62,4 @@ target_link_libraries(verify_standalone dl)
set_target_properties(
verify_standalone PROPERTIES
OUTPUT_NAME "verify_debug"
)
)

View File

@ -0,0 +1,27 @@
#pragma once
#include <string>
#include <cstring>
/**
* @enum Command
* @brief Enumeration of supported commands for the verify module
*/
enum Command {
CMD_UNKNOWN, /**< Unknown or unsupported command */
CMD_HELP, /**< Display help information */
CMD_CHECKSUM, /**< Verify package checksums */
CMD_SIGNATURE, /**< Verify package signatures */
CMD_CHECK /**< Check build module integration */
};
/**
* @brief Parses a command string into a Command enum value
*
* Converts a command string to the appropriate Command enum value
* for internal routing.
*
* @param cmd_str The command string to parse
* @return The corresponding Command enum value
*/
Command parse_command(const char* cmd_str);

View File

@ -1,5 +1,5 @@
/**
* @file verify_commands.hpp
* @file commands.hpp
* @brief Header file for the verify module command handlers
*
* Defines functions and enumerations for the verify module which verifies
@ -19,18 +19,6 @@
#include <sys/stat.h>
#include <filesystem>
/**
* @enum Command
* @brief Enumeration of supported commands for the verify module
*/
enum Command {
CMD_UNKNOWN, /**< Unknown or unsupported command */
CMD_HELP, /**< Display help information */
CMD_CHECKSUM, /**< Verify package checksums */
CMD_SIGNATURE, /**< Verify package signatures */
CMD_CHECK /**< Check build module integration */
};
/**
* @brief Handler for the checksum command
*
@ -121,17 +109,6 @@ int cmd_check_help(int argc, char** argv);
*/
int cmd_unknown(const char* command, int argc, char** argv);
/**
* @brief Parses a command string into a Command enum value
*
* Converts a command string to the appropriate Command enum value
* for internal routing.
*
* @param cmd_str The command string to parse
* @return The corresponding Command enum value
*/
Command parse_command(const char* cmd_str);
/**
* @brief Helper function to check and load the build module
*

View File

@ -0,0 +1,57 @@
/**
* @file verification.hpp
* @brief Functions for verifying package integrity and signatures
*
* Defines functions for verifying checksums and signatures of DPM packages
* and package stage directories.
*
* @copyright Copyright (c) 2025 SILO GROUP LLC
* @author Chris Punches <chris.punches@silogroup.org>
*
* Part of the Dark Horse Linux Package Manager (DPM)
*/
#pragma once
#include <string>
#include <filesystem>
#include <dpmdk/include/CommonModuleAPI.hpp>
/**
* @brief Verifies checksums for a package file
*
* Checks the integrity of a package file by verifying its checksums.
*
* @param package_path Path to the package file
* @return 0 on success, non-zero on failure
*/
int verify_checksums_package(const std::string& package_path);
/**
* @brief Verifies checksums for a package stage directory
*
* Checks the integrity of a package stage directory by verifying its checksums.
*
* @param stage_dir Path to the stage directory
* @return 0 on success, non-zero on failure
*/
int verify_checksums_stage(const std::string& stage_dir);
/**
* @brief Verifies signatures for a package file
*
* Checks the signatures of a package file.
*
* @param package_path Path to the package file
* @return 0 on success, non-zero on failure
*/
int verify_signature_package(const std::string& package_path);
/**
* @brief Verifies signatures for a package stage directory
*
* Checks the signatures of a package stage directory.
*
* @param stage_dir Path to the stage directory
* @return 0 on success, non-zero on failure
*/
int verify_signature_stage(const std::string& stage_dir);

View File

@ -0,0 +1,22 @@
#include "../include/cli_parsers.hpp"
Command parse_command(const char* cmd_str) {
if (cmd_str == nullptr || strlen(cmd_str) == 0) {
return CMD_HELP;
}
if (strcmp(cmd_str, "help") == 0) {
return CMD_HELP;
}
else if (strcmp(cmd_str, "checksum") == 0) {
return CMD_CHECKSUM;
}
else if (strcmp(cmd_str, "signature") == 0) {
return CMD_SIGNATURE;
}
else if (strcmp(cmd_str, "check") == 0) {
return CMD_CHECK;
}
return CMD_UNKNOWN;
}

View File

@ -1,5 +1,5 @@
/**
* @file verify_commands.cpp
* @file commands.cpp
* @brief Implementation of command handlers for the verify module
*
* Implements the command handlers for verifying package checksums and signatures.
@ -10,7 +10,7 @@
* Part of the Dark Horse Linux Package Manager (DPM)
*/
#include "verify_commands.hpp"
#include "commands.hpp"
int check_and_load_build_module(void*& module_handle) {
// Check if build module exists
@ -29,74 +29,6 @@ int check_and_load_build_module(void*& module_handle) {
return 0;
}
int verify_checksums_package(const std::string& package_path) {
// Check if the package file exists
if (!std::filesystem::exists(package_path)) {
dpm_log(LOG_ERROR, ("Package file not found: " + package_path).c_str());
return 1;
}
// Placeholder implementation
dpm_log(LOG_INFO, ("Verifying checksums for package: " + package_path).c_str());
dpm_log(LOG_INFO, "Package checksum verification not yet implemented");
return 0;
}
int verify_checksums_stage(const std::string& stage_dir) {
// Check if the stage directory exists
if (!std::filesystem::exists(stage_dir)) {
dpm_log(LOG_ERROR, ("Stage directory not found: " + stage_dir).c_str());
return 1;
}
// Check if it's actually a directory
if (!std::filesystem::is_directory(stage_dir)) {
dpm_log(LOG_ERROR, ("Path is not a directory: " + stage_dir).c_str());
return 1;
}
// Placeholder implementation
dpm_log(LOG_INFO, ("Verifying checksums for stage directory: " + stage_dir).c_str());
dpm_log(LOG_INFO, "Stage directory checksum verification not yet implemented");
return 0;
}
int verify_signature_package(const std::string& package_path) {
// Check if the package file exists
if (!std::filesystem::exists(package_path)) {
dpm_log(LOG_ERROR, ("Package file not found: " + package_path).c_str());
return 1;
}
// Placeholder implementation
dpm_log(LOG_INFO, ("Verifying signatures for package: " + package_path).c_str());
dpm_log(LOG_INFO, "Package signature verification not yet implemented");
return 0;
}
int verify_signature_stage(const std::string& stage_dir) {
// Check if the stage directory exists
if (!std::filesystem::exists(stage_dir)) {
dpm_log(LOG_ERROR, ("Stage directory not found: " + stage_dir).c_str());
return 1;
}
// Check if it's actually a directory
if (!std::filesystem::is_directory(stage_dir)) {
dpm_log(LOG_ERROR, ("Path is not a directory: " + stage_dir).c_str());
return 1;
}
// Placeholder implementation
dpm_log(LOG_INFO, ("Verifying signatures for stage directory: " + stage_dir).c_str());
dpm_log(LOG_INFO, "Stage directory signature verification not yet implemented");
return 0;
}
int cmd_checksum_help(int argc, char** argv) {
dpm_con(LOG_INFO, "Usage: dpm verify checksum [options]");
dpm_con(LOG_INFO, "");
@ -285,27 +217,6 @@ int cmd_unknown(const char* command, int argc, char** argv) {
return 1;
}
Command parse_command(const char* cmd_str) {
if (cmd_str == nullptr || strlen(cmd_str) == 0) {
return CMD_HELP;
}
if (strcmp(cmd_str, "help") == 0) {
return CMD_HELP;
}
else if (strcmp(cmd_str, "checksum") == 0) {
return CMD_CHECKSUM;
}
else if (strcmp(cmd_str, "signature") == 0) {
return CMD_SIGNATURE;
}
else if (strcmp(cmd_str, "check") == 0) {
return CMD_CHECK;
}
return CMD_UNKNOWN;
}
int cmd_check(int argc, char** argv) {
// Parse command line arguments
bool verbose = false;

View File

@ -0,0 +1,82 @@
/**
* @file verification.cpp
* @brief Implementation of package verification functions
*
* Implements functions for verifying checksums and signatures of DPM packages
* and package stage directories.
*
* @copyright Copyright (c) 2025 SILO GROUP LLC
* @author Chris Punches <chris.punches@silogroup.org>
*
* Part of the Dark Horse Linux Package Manager (DPM)
*/
#include "verification.hpp"
int verify_checksums_package(const std::string& package_path) {
// Check if the package file exists
if (!std::filesystem::exists(package_path)) {
dpm_log(LOG_ERROR, ("Package file not found: " + package_path).c_str());
return 1;
}
// Placeholder implementation
dpm_log(LOG_INFO, ("Verifying checksums for package: " + package_path).c_str());
dpm_log(LOG_INFO, "Package checksum verification not yet implemented");
return 0;
}
int verify_checksums_stage(const std::string& stage_dir) {
// Check if the stage directory exists
if (!std::filesystem::exists(stage_dir)) {
dpm_log(LOG_ERROR, ("Stage directory not found: " + stage_dir).c_str());
return 1;
}
// Check if it's actually a directory
if (!std::filesystem::is_directory(stage_dir)) {
dpm_log(LOG_ERROR, ("Path is not a directory: " + stage_dir).c_str());
return 1;
}
// Placeholder implementation
dpm_log(LOG_INFO, ("Verifying checksums for stage directory: " + stage_dir).c_str());
dpm_log(LOG_INFO, "Stage directory checksum verification not yet implemented");
return 0;
}
int verify_signature_package(const std::string& package_path) {
// Check if the package file exists
if (!std::filesystem::exists(package_path)) {
dpm_log(LOG_ERROR, ("Package file not found: " + package_path).c_str());
return 1;
}
// Placeholder implementation
dpm_log(LOG_INFO, ("Verifying signatures for package: " + package_path).c_str());
dpm_log(LOG_INFO, "Package signature verification not yet implemented");
return 0;
}
int verify_signature_stage(const std::string& stage_dir) {
// Check if the stage directory exists
if (!std::filesystem::exists(stage_dir)) {
dpm_log(LOG_ERROR, ("Stage directory not found: " + stage_dir).c_str());
return 1;
}
// Check if it's actually a directory
if (!std::filesystem::is_directory(stage_dir)) {
dpm_log(LOG_ERROR, ("Path is not a directory: " + stage_dir).c_str());
return 1;
}
// Placeholder implementation
dpm_log(LOG_INFO, ("Verifying signatures for stage directory: " + stage_dir).c_str());
dpm_log(LOG_INFO, "Stage directory signature verification not yet implemented");
return 0;
}

View File

@ -27,7 +27,8 @@
* mailing list at: https://lists.darkhorselinux.org/mailman/listinfo/dhlp-contributors
*/
#include "include/verify_commands.hpp"
#include "include/commands.hpp"
#include "include/cli_parsers.hpp"
/**
* @def MODULE_VERSION