Honour an external definition of SOURCE_DATE_EPOCH when updating the embedded modification date in TTF/TTC files. --- a/lib/tatime.c +++ b/lib/tatime.c @@ -15,6 +15,8 @@ #include #include +#include +#include #include "ta.h" @@ -27,12 +29,51 @@ TA_get_current_time(FT_ULong* high, { /* there have been 24107 days between January 1st, 1904 (the epoch of */ /* OpenType), and January 1st, 1970 (the epoch of the `time' function) */ - TA_ULongLong seconds_to_1970 = 24107 * 24 * 60 * 60; - TA_ULongLong seconds_to_today = seconds_to_1970 + (TA_ULongLong)time(NULL); + const TA_ULongLong seconds_to_1970 = 24107 * 24 * 60 * 60; + TA_ULongLong seconds_to_build; + time_t now; + char *source_date_epoch, *endptr; + TA_ULongLong epoch; + source_date_epoch = getenv("SOURCE_DATE_EPOCH"); + if (source_date_epoch) { + errno = 0; + epoch = strtoull(source_date_epoch, &endptr, 10); + if ((errno == ERANGE && (epoch == ULLONG_MAX || epoch == 0)) + || (errno != 0 && epoch == 0)) { + fprintf(stderr, + "Environment variable $SOURCE_DATE_EPOCH: strtoull: %s\n", + strerror(errno)); + exit(EXIT_FAILURE); + } + if (endptr == source_date_epoch) { + fprintf(stderr, + "Environment variable $SOURCE_DATE_EPOCH: No digits were found: %s\n", + endptr); + exit(EXIT_FAILURE); + } + if (*endptr != '\0') { + fprintf(stderr, + "Environment variable $SOURCE_DATE_EPOCH: Trailing garbage: %s\n", + endptr); + exit(EXIT_FAILURE); + } + if (epoch > ULONG_MAX) { + fprintf(stderr, + "Environment variable $SOURCE_DATE_EPOCH: value must be smaller " + "than or equal to: %lu but was found to be: %llu \n", + ULONG_MAX, epoch); + exit(EXIT_FAILURE); + } + now = epoch; + } else { + now = time(NULL); + } - *high = (FT_ULong)(seconds_to_today >> 32); - *low = (FT_ULong)seconds_to_today; + seconds_to_build = seconds_to_1970 + (TA_ULongLong)now; + + *high = (FT_ULong)(seconds_to_build >> 32); + *low = (FT_ULong)seconds_to_build; } /* end of tatime.c */ 566e'>root/tests/guix-git-authenticate.sh
AgeCommit message (Expand)Author
2022-02-14git-authenticate: Ensure the target is a descendant of the introductory commit....Fixes a bug whereby authentication of a commit *not* descending from the introductory commit could succeed, provided the commit verifies the authorization invariant. In the example below, A is a common ancestor of the introductory commit I and of commit X. Authentication of X would succeed, even though it is not a descendant of I, as long as X is authorized according to the '.guix-authorizations' in A: X I \ / A This is because, 'authenticate-repository' would not check whether X descends from I, and the call (commit-difference X I) would return X. In practice that only affects forks because it means that ancestors of the introductory commit already contain a '.guix-authorizations' file. * guix/git-authenticate.scm (authenticate-repository): Add call to 'commit-descendant?'. * tests/channels.scm ("authenticate-channel, not a descendant of introductory commit"): New test. * tests/git-authenticate.scm ("authenticate-repository, target not a descendant of intro"): New test. * tests/guix-git-authenticate.sh: Expect earlier test to fail since 9549f0283a78fe36f2d4ff2a04ef8ad6b0c02604 is not a descendant of $intro_commit. Add new test targeting an ancestor of the introductory commit, and another test targeting the v1.2.0 commit. * doc/guix.texi (Specifying Channel Authorizations): Add a sentence. Ludovic Courtès