depot.py revision 2992
1516N/A#!/usr/bin/python2.6
290N/A#
290N/A# CDDL HEADER START
290N/A#
290N/A# The contents of this file are subject to the terms of the
290N/A# Common Development and Distribution License (the "License").
290N/A# You may not use this file except in compliance with the License.
290N/A#
290N/A# You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
290N/A# or http://www.opensolaris.org/os/licensing.
290N/A# See the License for the specific language governing permissions
290N/A# and limitations under the License.
290N/A#
290N/A# When distributing Covered Code, include this CDDL HEADER in each
290N/A# file and include the License file at usr/src/OPENSOLARIS.LICENSE.
290N/A# If applicable, add the following below this CDDL HEADER, with the
290N/A# fields enclosed by brackets "[]" replaced with your own identifying
290N/A# information: Portions Copyright [yyyy] [name of copyright owner]
290N/A#
290N/A# CDDL HEADER END
290N/A#
2339N/A# Copyright (c) 2007, 2013, Oracle and/or its affiliates. All rights reserved.
395N/A#
290N/A
883N/A# pkg.depotd - package repository daemon
454N/A
290N/A# XXX The prototype pkg.depotd combines both the version management server that
448N/A# answers to pkgsend(1) sessions and the HTTP file server that answers to the
290N/A# various GET operations that a pkg(1) client makes. This split is expected to
290N/A# be made more explicit, by constraining the pkg(1) operations such that they
290N/A# can be served as a typical HTTP/HTTPS session. Thus, pkg.depotd will reduce
383N/A# to a special purpose HTTP/HTTPS server explicitly for the version management
290N/A# operations, and must manipulate the various state files--catalogs, in
395N/A# particular--such that the pkg(1) pull client can operately accurately with
290N/A# only a basic HTTP/HTTPS server in place.
395N/A
849N/A# XXX Although we pushed the evaluation of next-version, etc. to the pull
1516N/A# client, we should probably provide a query API to do same on the server, for
290N/A# dumb clients (like a notification service).
849N/A
290N/A# The default path for static and other web content.
290N/ACONTENT_PATH_DEFAULT = "/usr/share/lib/pkg"
290N/A# cherrypy has a max_request_body_size parameter that determines whether the
290N/A# server should abort requests with REQUEST_ENTITY_TOO_LARGE when the request
383N/A# body is larger than the specified size (in bytes). The maximum size supported
290N/A# by cherrypy is 2048 * 1024 * 1024 - 1 (just short of 2048MB), but the default
290N/A# here is purposefully conservative.
2339N/AMAX_REQUEST_BODY_SIZE = 512 * 1024 * 1024
290N/A# The default host/port(s) to serve data from.
290N/AHOST_DEFAULT = "0.0.0.0"
290N/APORT_DEFAULT = 80
290N/ASSL_PORT_DEFAULT = 443
290N/A# The minimum number of threads allowed.
290N/ATHREADS_MIN = 1
1660N/A# The default number of threads to start.
1660N/ATHREADS_DEFAULT = 60
1660N/A# The maximum number of threads that can be started.
1660N/ATHREADS_MAX = 5000
1660N/A# The default server socket timeout in seconds. We want this to be longer than
1660N/A# the normal default of 10 seconds to accommodate clients with poor quality
1660N/A# connections.
1660N/ASOCKET_TIMEOUT_DEFAULT = 60
1660N/A
1660N/Aimport getopt
1660N/Aimport gettext
1660N/Aimport locale
1660N/Aimport logging
1660N/Aimport os
1660N/Aimport os.path
1660N/Aimport OpenSSL.crypto as crypto
1660N/Aimport subprocess
1660N/Aimport sys
448N/Aimport tempfile
448N/Aimport urlparse
534N/A
534N/Atry:
534N/A import cherrypy
534N/A version = cherrypy.__version__.split('.')
534N/A if map(int, version) < [3, 1, 0]:
534N/A raise ImportError
534N/A elif map(int, version) >= [3, 2, 0]:
290N/A raise ImportError
290N/Aexcept ImportError:
954N/A print >> sys.stderr, """cherrypy 3.1.0 or greater (but less than """ \
954N/A """3.2.0) is required to use this program."""
954N/A sys.exit(2)
954N/A
534N/Aimport cherrypy.process.servers
1099N/Afrom cherrypy.process.plugins import Daemonizer
290N/A
1516N/Afrom pkg.misc import msg, emsg, setlocale
290N/Afrom pkg.client.debugvalues import DebugValues
290N/A
290N/Aimport pkg
661N/Aimport pkg.client.api_errors as api_errors
290N/Aimport pkg.config as cfg
2494N/Aimport pkg.portable.util as os_util
2494N/Aimport pkg.search_errors as search_errors
2494N/Aimport pkg.server.depot as ds
290N/Aimport pkg.server.depotresponse as dr
2390N/Aimport pkg.server.repository as sr
1498N/A
1498N/A
2310N/Aclass LogSink(object):
2310N/A """This is a dummy object that we can use to discard log entries
2310N/A without relying on non-portable interfaces such as /dev/null."""
2310N/A
290N/A def write(self, *args, **kwargs):
1674N/A """Discard the bits."""
1674N/A pass
2262N/A
1674N/A def flush(self, *args, **kwargs):
395N/A """Discard the bits."""
430N/A pass
395N/A
1544N/A
1968N/Adef usage(text=None, retcode=2, full=False):
1557N/A """Optionally emit a usage message and then exit using the specified
1903N/A exit code."""
2046N/A
2240N/A if text:
1506N/A emsg(text)
395N/A
395N/A if not full:
2026N/A # The full usage message isn't desired.
424N/A emsg(_("Try `pkg.depotd --help or -?' for more "
1024N/A "information."))
395N/A sys.exit(retcode)
395N/A
395N/A print """\
2078N/AUsage: /usr/lib/pkg.depotd [-a address] [-d inst_root] [-p port] [-s threads]
578N/A [-t socket_timeout] [--cfg] [--content-root]
1172N/A [--disable-ops op[/1][,...]] [--debug feature_list]
2310N/A [--image-root dir] [--log-access dest] [--log-errors dest]
395N/A [--mirror] [--nasty] [--nasty-sleep] [--proxy-base url]
661N/A [--readonly] [--ssl-cert-file] [--ssl-dialog] [--ssl-key-file]
1099N/A [--sort-file-max-size size] [--writable-root dir]
1902N/A
2310N/A -a address The IP address on which to listen for connections. The
661N/A default value is 0.0.0.0 (INADDR_ANY) which will listen
395N/A on all active interfaces. To listen on all active IPv6
849N/A interfaces, use '::'.
290N/A -d inst_root The file system path at which the server should find its
395N/A repository data. Required unless PKG_REPO has been set
395N/A in the environment.
1968N/A -p port The port number on which the instance should listen for
395N/A incoming package requests. The default value is 80 if
395N/A ssl certificate and key information has not been
395N/A provided; otherwise, the default value is 443.
395N/A -s threads The number of threads that will be started to serve
395N/A requests. The default value is 10.
395N/A -t timeout The maximum number of seconds the server should wait for
395N/A a response from a client before closing a connection.
395N/A The default value is 60.
395N/A --cfg The pathname of the file to use when reading and writing
395N/A depot configuration data, or a fully qualified service
395N/A fault management resource identifier (FMRI) of the SMF
290N/A service or instance to read configuration data from.
290N/A --content-root The file system path to the directory containing the
395N/A the static and other web content used by the depot's
395N/A browser user interface. The default value is
1231N/A '/usr/share/lib/pkg'.
1557N/A --disable-ops A comma separated list of operations that the depot
1903N/A should not configure. If, for example, you wanted
1557N/A to omit loading search v1, 'search/1' should be
395N/A provided as an argument, or to disable all search
395N/A operations, simply 'search'.
395N/A --debug The name of a debug feature to enable; or a whitespace
395N/A or comma separated list of features to enable.
395N/A Possible values are: headers, hash=sha1+sha256,
395N/A hash=sha256
395N/A --image-root The path to the image whose file information will be
395N/A used as a cache for file data.
395N/A --log-access The destination for any access related information
395N/A logged by the depot process. Possible values are:
395N/A stderr, stdout, none, or an absolute pathname. The
290N/A default value is stdout if stdout is a tty; otherwise
290N/A the default value is none.
430N/A --log-errors The destination for any errors or other information
395N/A logged by the depot process. Possible values are:
395N/A stderr, stdout, none, or an absolute pathname. The
395N/A default value is stderr.
395N/A --mirror Package mirror mode; publishing and metadata operations
1302N/A disallowed. Cannot be used with --readonly or
395N/A --rebuild.
395N/A --nasty Instruct the server to misbehave. At random intervals
290N/A it will time-out, send bad responses, hang up on
395N/A clients, and generally be hostile. The option
1024N/A takes a value (1 to 100) for how nasty the server
413N/A should be.
1544N/A --nasty-sleep In nasty mode (see --nasty), how many seconds to
1557N/A randomly sleep when a random sleep occurs.
1903N/A --proxy-base The url to use as the base for generating internal
2046N/A redirects and content.
2240N/A --readonly Read-only operation; modifying operations disallowed.
1506N/A Cannot be used with --mirror or --rebuild.
413N/A --ssl-cert-file The absolute pathname to a PEM-encoded Certificate file.
2026N/A This option must be used with --ssl-key-file. Usage of
413N/A this option will cause the depot to only respond to SSL
1978N/A requests on the provided port.
1024N/A --ssl-dialog Specifies what method should be used to obtain the
395N/A passphrase needed to decrypt the file specified by
395N/A --ssl-key-file. Supported values are: builtin,
2310N/A exec:/path/to/program, smf, or an SMF FMRI. The
2310N/A default value is builtin. If smf is specified, an
395N/A SMF FMRI must be provided using the --cfg option.
395N/A --ssl-key-file The absolute pathname to a PEM-encoded Private Key file.
413N/A This option must be used with --ssl-cert-file. Usage of
395N/A this option will cause the depot to only respond to SSL
395N/A requests on the provided port.
395N/A --sort-file-max-size
395N/A The maximum size of the indexer sort file. Used to
395N/A limit the amount of RAM the depot uses for indexing,
395N/A or increase it for speed.
2339N/A --writable-root The path to a directory to which the program has write
1191N/A access. Used with --readonly to allow server to
1452N/A create needed files, such as search indices, without
1231N/A needing write access to the package information.
2046N/AOptions:
395N/A --help or -?
395N/A
424N/AEnvironment:
395N/A PKG_REPO Used as default inst_root if -d not provided.
742N/A PKG_DEPOT_CONTENT Used as default content_root if --content-root
2339N/A not provided."""
2339N/A sys.exit(retcode)
2339N/A
2339N/Aclass OptionError(Exception):
2339N/A """Option exception. """
2339N/A
742N/A def __init__(self, *args):
742N/A Exception.__init__(self, *args)
742N/A
742N/Aif __name__ == "__main__":
742N/A
742N/A setlocale(locale.LC_ALL, "")
742N/A gettext.install("pkg", "/usr/share/locale",
742N/A codeset=locale.getpreferredencoding())
742N/A
742N/A add_content = False
2310N/A exit_ready = False
1902N/A rebuild = False
1099N/A reindex = False
2390N/A nasty = False
2335N/A
2338N/A # Track initial configuration values.
2338N/A ivalues = { "pkg": {}, "nasty": {} }
2310N/A if "PKG_REPO" in os.environ:
2046N/A ivalues["pkg"]["inst_root"] = os.environ["PKG_REPO"]
2223N/A
2046N/A try:
2046N/A content_root = os.environ["PKG_DEPOT_CONTENT"]
2310N/A ivalues["pkg"]["content_root"] = content_root
2310N/A except KeyError:
2310N/A try:
2310N/A content_root = os.path.join(os.environ['PKG_HOME'],
2310N/A 'share/lib/pkg')
2310N/A ivalues["pkg"]["content_root"] = content_root
2310N/A except KeyError:
2310N/A pass
2345N/A
2345N/A opt = None
1498N/A addresses = set()
2339N/A debug_features = []
2339N/A disable_ops = []
2339N/A repo_props = {}
691N/A socket_path = ""
691N/A user_cfg = None
691N/A try:
395N/A long_opts = ["add-content", "cfg=", "cfg-file=",
395N/A "content-root=", "debug=", "disable-ops=", "exit-ready",
395N/A "help", "image-root=", "log-access=", "log-errors=",
395N/A "llmirror", "mirror", "nasty=", "nasty-sleep=",
395N/A "proxy-base=", "readonly", "rebuild", "refresh-index",
290N/A "set-property=", "ssl-cert-file=", "ssl-dialog=",
395N/A "ssl-key-file=", "sort-file-max-size=", "writable-root="]
395N/A
591N/A opts, pargs = getopt.getopt(sys.argv[1:], "a:d:np:s:t:?",
591N/A long_opts)
591N/A
1505N/A show_usage = False
1505N/A for opt, arg in opts:
1505N/A if opt == "-a":
1505N/A addresses.add(arg)
1632N/A elif opt == "-n":
1632N/A sys.exit(0)
1632N/A elif opt == "-d":
1632N/A ivalues["pkg"]["inst_root"] = arg
2339N/A elif opt == "-p":
2339N/A ivalues["pkg"]["port"] = arg
2339N/A elif opt == "-s":
2339N/A threads = int(arg)
2339N/A if threads < THREADS_MIN:
2339N/A raise OptionError, \
2339N/A "minimum value is %d" % THREADS_MIN
2339N/A if threads > THREADS_MAX:
2339N/A raise OptionError, \
2339N/A "maximum value is %d" % THREADS_MAX
2339N/A ivalues["pkg"]["threads"] = threads
2339N/A elif opt == "-t":
2339N/A ivalues["pkg"]["socket_timeout"] = arg
2339N/A elif opt == "--add-content":
2339N/A add_content = True
2339N/A elif opt == "--cfg":
2364N/A user_cfg = arg
2339N/A elif opt == "--cfg-file":
2339N/A ivalues["pkg"]["cfg_file"] = arg
2339N/A elif opt == "--content-root":
2339N/A ivalues["pkg"]["content_root"] = arg
2339N/A elif opt == "--debug":
2339N/A if arg is None or arg == "":
2339N/A continue
2339N/A
2339N/A # A list of features can be specified using a
2339N/A # "," or any whitespace character as separators.
2339N/A if "," in arg:
2339N/A features = arg.split(",")
2339N/A else:
2339N/A features = arg.split()
2339N/A debug_features.extend(features)
2339N/A
2339N/A # We also allow key=value debug flags, which
2339N/A # get set in pkg.client.debugvalues
2339N/A for feature in features:
2339N/A try:
2364N/A key, val = feature.split("=", 1)
2364N/A DebugValues.set_value(key, val)
2364N/A except (AttributeError, ValueError):
2364N/A pass
2364N/A
2364N/A elif opt == "--disable-ops":
2364N/A if arg is None or arg == "":
2364N/A raise OptionError, \
2364N/A "An argument must be specified."
2364N/A
2364N/A disableops = arg.split(",")
2364N/A for s in disableops:
2364N/A if "/" in s:
2339N/A op, ver = s.rsplit("/", 1)
395N/A else:
395N/A op = s
290N/A ver = "*"
290N/A
2339N/A if op not in \
2339N/A ds.DepotHTTP.REPO_OPS_DEFAULT:
290N/A raise OptionError(
290N/A "Invalid operation "
290N/A "'%s'." % s)
290N/A disable_ops.append(s)
290N/A elif opt == "--exit-ready":
290N/A exit_ready = True
290N/A elif opt == "--image-root":
290N/A ivalues["pkg"]["image_root"] = arg
290N/A elif opt.startswith("--log-"):
290N/A prop = "log_%s" % opt.lstrip("--log-")
395N/A ivalues["pkg"][prop] = arg
395N/A elif opt in ("--help", "-?"):
290N/A show_usage = True
290N/A elif opt == "--mirror":
290N/A ivalues["pkg"]["mirror"] = True
290N/A elif opt == "--llmirror":
290N/A ivalues["pkg"]["mirror"] = True
395N/A ivalues["pkg"]["ll_mirror"] = True
395N/A ivalues["pkg"]["readonly"] = True
395N/A elif opt == "--nasty":
290N/A # ValueError is caught by caller.
395N/A nasty_value = int(arg)
395N/A if (nasty_value > 100 or nasty_value < 1):
395N/A raise OptionError, "Invalid value " \
395N/A "for nasty option.\n Please " \
591N/A "choose a value between 1 and 100."
591N/A nasty = True
591N/A ivalues["nasty"]["nasty_level"] = nasty_value
591N/A elif opt == "--nasty-sleep":
691N/A # ValueError is caught by caller.
691N/A sleep_value = int(arg)
691N/A ivalues["nasty"]["nasty_sleep"] = sleep_value
691N/A elif opt == "--proxy-base":
2339N/A # Attempt to decompose the url provided into
2339N/A # its base parts. This is done so we can
2339N/A # remove any scheme information since we
2339N/A # don't need it.
290N/A scheme, netloc, path, params, query, \
290N/A fragment = urlparse.urlparse(arg,
290N/A "http", allow_fragments=0)
290N/A
290N/A if not netloc:
591N/A raise OptionError, "Unable to " \
591N/A "determine the hostname from " \
691N/A "the provided URL; please use a " \
691N/A "fully qualified URL."
2339N/A
2339N/A scheme = scheme.lower()
290N/A if scheme not in ("http", "https"):
290N/A raise OptionError, "Invalid URL; http " \
2339N/A "and https are the only supported " \
2339N/A "schemes."
2339N/A
2339N/A # Rebuild the url with the sanitized components.
2339N/A ivalues["pkg"]["proxy_base"] = \
2339N/A urlparse.urlunparse((scheme, netloc, path,
2339N/A params, query, fragment))
290N/A elif opt == "--readonly":
2339N/A ivalues["pkg"]["readonly"] = True
2339N/A elif opt == "--rebuild":
290N/A rebuild = True
2339N/A elif opt == "--refresh-index":
2339N/A # Note: This argument is for internal use
2339N/A # only.
2339N/A #
2339N/A # This flag is purposefully omitted in usage.
2339N/A # The supported way to forcefully reindex is to
2339N/A # kill any pkg.depot using that directory,
2339N/A # remove the index directory, and restart the
290N/A # pkg.depot process. The index will be rebuilt
395N/A # automatically on startup.
290N/A reindex = True
395N/A exit_ready = True
506N/A elif opt == "--set-property":
506N/A try:
506N/A prop, p_value = arg.split("=", 1)
506N/A p_sec, p_name = prop.split(".", 1)
506N/A except ValueError:
506N/A usage(_("property arguments must be of "
506N/A "the form '<section.property>="
506N/A "<value>'."))
834N/A repo_props.setdefault(p_sec, {})
506N/A repo_props[p_sec][p_name] = p_value
506N/A elif opt == "--ssl-cert-file":
506N/A if arg == "none" or arg == "":
513N/A # Assume this is an override to clear
506N/A # the value.
506N/A arg = ""
506N/A elif not os.path.isabs(arg):
506N/A raise OptionError, "The path to " \
290N/A "the Certificate file must be " \
290N/A "absolute."
395N/A elif not os.path.exists(arg):
395N/A raise OptionError, "The specified " \
849N/A "file does not exist."
849N/A elif not os.path.isfile(arg):
883N/A raise OptionError, "The specified " \
883N/A "pathname is not a file."
395N/A ivalues["pkg"]["ssl_cert_file"] = arg
413N/A elif opt == "--ssl-key-file":
395N/A if arg == "none" or arg == "":
290N/A # Assume this is an override to clear
1674N/A # the value.
1674N/A arg = ""
1674N/A elif not os.path.isabs(arg):
1674N/A raise OptionError, "The path to " \
1674N/A "the Private Key file must be " \
1674N/A "absolute."
1674N/A elif not os.path.exists(arg):
1674N/A raise OptionError, "The specified " \
1674N/A "file does not exist."
1674N/A elif not os.path.isfile(arg):
1674N/A raise OptionError, "The specified " \
1674N/A "pathname is not a file."
1674N/A ivalues["pkg"]["ssl_key_file"] = arg
1674N/A elif opt == "--ssl-dialog":
1674N/A if arg != "builtin" and \
395N/A arg != "smf" and not \
395N/A arg.startswith("exec:/") and not \
506N/A arg.startswith("svc:"):
506N/A raise OptionError, "Invalid value " \
395N/A "specified. Expected: builtin, " \
395N/A "exec:/path/to/program, smf, or " \
395N/A "an SMF FMRI."
395N/A
430N/A if arg.startswith("exec:"):
849N/A if os_util.get_canonical_os_type() != \
834N/A "unix":
290N/A # Don't allow a somewhat
1099N/A # insecure authentication method
1099N/A # on some platforms.
1099N/A raise OptionError, "exec is " \
1099N/A "not a supported dialog " \
1099N/A "type for this operating " \
1516N/A "system."
1265N/A
1099N/A f = os.path.abspath(arg.split(
1099N/A "exec:")[1])
1099N/A if not os.path.isfile(f):
1099N/A raise OptionError, "Invalid " \
1099N/A "file path specified for " \
1099N/A "exec."
1099N/A ivalues["pkg"]["ssl_dialog"] = arg
1099N/A elif opt == "--sort-file-max-size":
1099N/A ivalues["pkg"]["sort_file_max_size"] = arg
1099N/A elif opt == "--writable-root":
1208N/A ivalues["pkg"]["writable_root"] = arg
1208N/A
1099N/A # Set accumulated values.
1099N/A if debug_features:
1391N/A ivalues["pkg"]["debug"] = debug_features
1099N/A if disable_ops:
1099N/A ivalues["pkg"]["disable_ops"] = disable_ops
1099N/A if addresses:
1099N/A ivalues["pkg"]["address"] = list(addresses)
1099N/A
465N/A if DebugValues:
465N/A reload(pkg.digest)
395N/A
465N/A # Build configuration object.
395N/A dconf = ds.DepotConfig(target=user_cfg, overrides=ivalues)
395N/A except getopt.GetoptError, _e:
2176N/A usage("pkg.depotd: %s" % _e.msg)
1208N/A except api_errors.ApiException, _e:
1208N/A usage("pkg.depotd: %s" % str(_e))
465N/A except OptionError, _e:
395N/A usage("pkg.depotd: option: %s -- %s" % (opt, _e))
465N/A except (ArithmeticError, ValueError):
395N/A usage("pkg.depotd: illegal option value: %s specified " \
465N/A "for option: %s" % (arg, opt))
1099N/A
1099N/A if show_usage:
1099N/A usage(retcode=0, full=True)
465N/A
465N/A if not dconf.get_property("pkg", "log_errors"):
395N/A dconf.set_property("pkg", "log_errors", "stderr")
395N/A
1099N/A # If stdout is a tty, then send access output there by default instead
395N/A # of discarding it.
1191N/A if not dconf.get_property("pkg", "log_access"):
1191N/A if os.isatty(sys.stdout.fileno()):
1191N/A dconf.set_property("pkg", "log_access", "stdout")
1191N/A else:
1191N/A dconf.set_property("pkg", "log_access", "none")
1191N/A
1191N/A # Check for invalid option combinations.
1191N/A image_root = dconf.get_property("pkg", "image_root")
1191N/A inst_root = dconf.get_property("pkg", "inst_root")
1191N/A mirror = dconf.get_property("pkg", "mirror")
1265N/A ll_mirror = dconf.get_property("pkg", "ll_mirror")
1265N/A readonly = dconf.get_property("pkg", "readonly")
1265N/A writable_root = dconf.get_property("pkg", "writable_root")
1208N/A if rebuild and add_content:
1208N/A usage("--add-content cannot be used with --rebuild")
1208N/A if rebuild and reindex:
1208N/A usage("--refresh-index cannot be used with --rebuild")
1208N/A if (rebuild or add_content) and (readonly or mirror):
1208N/A usage("--readonly and --mirror cannot be used with --rebuild "
1208N/A "or --add-content")
1191N/A if reindex and mirror:
1191N/A usage("--mirror cannot be used with --refresh-index")
1660N/A if reindex and readonly and not writable_root:
1660N/A usage("--readonly can only be used with --refresh-index if "
1660N/A "--writable-root is used")
1660N/A if image_root and not ll_mirror:
849N/A usage("--image-root can only be used with --llmirror.")
1208N/A if image_root and writable_root:
1208N/A usage("--image_root and --writable-root cannot be used "
1208N/A "together.")
1208N/A if image_root and inst_root:
849N/A usage("--image-root and -d cannot be used together.")
290N/A
465N/A # If the image format changes this may need to be reexamined.
465N/A if image_root:
1099N/A inst_root = os.path.join(image_root, "var", "pkg")
465N/A
1099N/A # Set any values using defaults if they weren't provided.
1099N/A
1099N/A # Only use the first value for now; multiple bind addresses may be
454N/A # supported later.
1099N/A address = dconf.get_property("pkg", "address")
849N/A if address:
290N/A address = address[0]
430N/A elif not address:
395N/A dconf.set_property("pkg", "address", [HOST_DEFAULT])
395N/A address = dconf.get_property("pkg", "address")[0]
290N/A
383N/A if not inst_root:
383N/A usage("Either PKG_REPO or -d must be provided")
395N/A
383N/A content_root = dconf.get_property("pkg", "content_root")
383N/A if not content_root:
384N/A dconf.set_property("pkg", "content_root", CONTENT_PATH_DEFAULT)
383N/A content_root = dconf.get_property("pkg", "content_root")
849N/A
849N/A port = dconf.get_property("pkg", "port")
849N/A ssl_cert_file = dconf.get_property("pkg", "ssl_cert_file")
849N/A ssl_key_file = dconf.get_property("pkg", "ssl_key_file")
849N/A if (ssl_cert_file and not ssl_key_file) or (ssl_key_file and not
849N/A ssl_cert_file):
849N/A usage("The --ssl-cert-file and --ssl-key-file options must "
849N/A "must both be provided when using either option.")
849N/A elif not port:
2242N/A if ssl_cert_file and ssl_key_file:
2242N/A dconf.set_property("pkg", "port", SSL_PORT_DEFAULT)
2242N/A else:
2242N/A dconf.set_property("pkg", "port", PORT_DEFAULT)
2242N/A port = dconf.get_property("pkg", "port")
2242N/A
2242N/A socket_timeout = dconf.get_property("pkg", "socket_timeout")
2242N/A if not socket_timeout:
2337N/A dconf.set_property("pkg", "socket_timeout",
2337N/A SOCKET_TIMEOUT_DEFAULT)
2242N/A socket_timeout = dconf.get_property("pkg", "socket_timeout")
2242N/A
849N/A threads = dconf.get_property("pkg", "threads")
849N/A if not threads:
383N/A dconf.set_property("pkg", "threads", THREADS_DEFAULT)
383N/A threads = dconf.get_property("pkg", "threads")
383N/A
849N/A # If the program is going to reindex, the port is irrelevant since
383N/A # the program will not bind to a port.
422N/A if not exit_ready:
422N/A try:
422N/A cherrypy.process.servers.check_port(address, port)
422N/A except Exception, e:
422N/A emsg("pkg.depotd: unable to bind to the specified "
422N/A "port: %d. Reason: %s" % (port, e))
422N/A sys.exit(1)
422N/A else:
422N/A # Not applicable if we're not going to serve content
422N/A dconf.set_property("pkg", "content_root", "")
422N/A
422N/A # Any relative paths should be made absolute using pkg_root. 'pkg_root'
422N/A # is a special property that was added to enable internal deployment of
422N/A # multiple disparate versions of the pkg.depotd software.
422N/A pkg_root = dconf.get_property("pkg", "pkg_root")
422N/A
422N/A repo_config_file = dconf.get_property("pkg", "cfg_file")
383N/A if repo_config_file and not os.path.isabs(repo_config_file):
422N/A repo_config_file = os.path.join(pkg_root, repo_config_file)
383N/A
383N/A if content_root and not os.path.isabs(content_root):
383N/A content_root = os.path.join(pkg_root, content_root)
383N/A
383N/A if inst_root and not os.path.isabs(inst_root):
383N/A inst_root = os.path.join(pkg_root, inst_root)
383N/A
422N/A if ssl_cert_file:
849N/A if ssl_cert_file == "none":
849N/A ssl_cert_file = None
849N/A elif not os.path.isabs(ssl_cert_file):
383N/A ssl_cert_file = os.path.join(pkg_root, ssl_cert_file)
383N/A
290N/A if ssl_key_file:
430N/A if ssl_key_file == "none":
395N/A ssl_key_file = None
395N/A elif not os.path.isabs(ssl_key_file):
290N/A ssl_key_file = os.path.join(pkg_root, ssl_key_file)
290N/A
290N/A if writable_root and not os.path.isabs(writable_root):
290N/A writable_root = os.path.join(pkg_root, writable_root)
290N/A
290N/A # Setup SSL if requested.
290N/A key_data = None
290N/A ssl_dialog = dconf.get_property("pkg", "ssl_dialog")
290N/A if not exit_ready and ssl_cert_file and ssl_key_file and \
290N/A ssl_dialog != "builtin":
290N/A cmdline = None
395N/A def get_ssl_passphrase(*ignored):
290N/A p = None
395N/A try:
290N/A p = subprocess.Popen(cmdline, shell=True,
395N/A stdout=subprocess.PIPE,
290N/A stderr=None)
534N/A p.wait()
534N/A except Exception, __e:
1099N/A emsg("pkg.depotd: an error occurred while "
1099N/A "executing [%s]; unable to obtain the "
290N/A "passphrase needed to decrypt the SSL "
290N/A "private key file: %s" % (cmdline, __e))
1101N/A sys.exit(1)
1101N/A return p.stdout.read().strip("\n")
1101N/A
1513N/A if ssl_dialog.startswith("exec:"):
1715N/A exec_path = ssl_dialog.split("exec:")[1]
1513N/A if not os.path.isabs(exec_path):
1513N/A exec_path = os.path.join(pkg_root, exec_path)
448N/A cmdline = "%s %s %d" % (exec_path, "''", port)
1513N/A elif ssl_dialog == "smf" or ssl_dialog.startswith("svc:"):
448N/A if ssl_dialog == "smf":
2272N/A # Assume the configuration target was an SMF
1101N/A # FMRI and let svcprop fail with an error if
1513N/A # it wasn't.
2340N/A svc_fmri = dconf.target
1715N/A else:
1715N/A svc_fmri = ssl_dialog
1716N/A cmdline = "/usr/bin/svcprop -p " \
1715N/A "pkg_secure/ssl_key_passphrase %s" % svc_fmri
1715N/A
1513N/A # The key file requires decryption, but the user has requested
290N/A # exec-based authentication, so it will have to be decoded first
290N/A # to an un-named temporary file.
290N/A try:
448N/A with file(ssl_key_file, "rb") as key_file:
448N/A pkey = crypto.load_privatekey(
430N/A crypto.FILETYPE_PEM, key_file.read(),
448N/A get_ssl_passphrase)
430N/A
1101N/A key_data = tempfile.TemporaryFile()
1513N/A key_data.write(crypto.dump_privatekey(
1715N/A crypto.FILETYPE_PEM, pkey))
1715N/A key_data.seek(0)
1716N/A except EnvironmentError, _e:
1715N/A emsg("pkg.depotd: unable to read the SSL private key "
1715N/A "file: %s" % _e)
2272N/A sys.exit(1)
1101N/A except crypto.Error, _e:
290N/A emsg("pkg.depotd: authentication or cryptography "
290N/A "failure while attempting to decode\nthe SSL "
1101N/A "private key file: %s" % _e)
290N/A sys.exit(1)
1101N/A else:
290N/A # Redirect the server to the decrypted key file.
290N/A ssl_key_file = "/dev/fd/%d" % key_data.fileno()
290N/A
448N/A # Setup our global configuration.
448N/A gconf = {
448N/A "checker.on": True,
448N/A "environment": "production",
448N/A "log.screen": False,
430N/A "server.max_request_body_size": MAX_REQUEST_BODY_SIZE,
448N/A "server.shutdown_timeout": 0,
290N/A "server.socket_host": address,
290N/A "server.socket_port": port,
290N/A "server.socket_timeout": socket_timeout,
430N/A "server.ssl_certificate": ssl_cert_file,
395N/A "server.ssl_private_key": ssl_key_file,
290N/A "server.thread_pool": threads,
290N/A "tools.log_headers.on": True,
290N/A "tools.encode.on": True
1637N/A }
1637N/A
290N/A if "headers" in dconf.get_property("pkg", "debug"):
613N/A # Despite its name, this only logs headers when there is an
613N/A # error; it's redundant with the debug feature enabled.
613N/A gconf["tools.log_headers.on"] = False
613N/A
613N/A # Causes the headers of every request to be logged to the error
613N/A # log; even if an exception occurs.
613N/A gconf["tools.log_headers_always.on"] = True
613N/A cherrypy.tools.log_headers_always = cherrypy.Tool(
1632N/A "on_start_resource",
1632N/A cherrypy.lib.cptools.log_request_headers)
1632N/A
1632N/A log_cfg = {
1632N/A "access": dconf.get_property("pkg", "log_access"),
1632N/A "errors": dconf.get_property("pkg", "log_errors")
1632N/A }
1632N/A
613N/A # If stdin is not a tty and the pkgdepot controller isn't being used,
290N/A # then assume process will be daemonized and redirect output.
742N/A if not os.environ.get("PKGDEPOT_CONTROLLER") and \
395N/A not os.isatty(sys.stdin.fileno()):
395N/A # Ensure log handlers are setup to use the file descriptors for
395N/A # stdout and stderr as the Daemonizer (used for test suite and
395N/A # SMF service) requires this.
395N/A if log_cfg["access"] == "stdout":
395N/A log_cfg["access"] = "/dev/fd/%d" % sys.stdout.fileno()
2339N/A elif log_cfg["access"] == "stderr":
2339N/A log_cfg["access"] = "/dev/fd/%d" % sys.stderr.fileno()
2364N/A elif log_cfg["access"] == "none":
395N/A log_cfg["access"] = "/dev/null"
395N/A
395N/A if log_cfg["errors"] == "stderr":
395N/A log_cfg["errors"] = "/dev/fd/%d" % sys.stderr.fileno()
290N/A elif log_cfg["errors"] == "stdout":
383N/A log_cfg["errors"] = "/dev/fd/%d" % sys.stdout.fileno()
395N/A elif log_cfg["errors"] == "none":
395N/A log_cfg["errors"] = "/dev/null"
395N/A
395N/A log_type_map = {
2046N/A "errors": {
395N/A "param": "log.error_file",
290N/A "attr": "error_log"
290N/A },
395N/A "access": {
395N/A "param": "log.access_file",
2310N/A "attr": "access_log"
1498N/A }
1498N/A }
2310N/A
2310N/A for log_type in log_type_map:
2310N/A dest = log_cfg[log_type]
395N/A if dest in ("stdout", "stderr", "none"):
290N/A if dest == "none":
290N/A h = logging.StreamHandler(LogSink())
395N/A else:
395N/A h = logging.StreamHandler(eval("sys.%s" % \
395N/A dest))
613N/A
290N/A h.setLevel(logging.DEBUG)
395N/A h.setFormatter(cherrypy._cplogging.logfmt)
395N/A log_obj = eval("cherrypy.log.%s" % \
395N/A log_type_map[log_type]["attr"])
395N/A log_obj.addHandler(h)
395N/A # Since we've replaced cherrypy's log handler with our
395N/A # own, we don't want the output directed to a file.
395N/A dest = ""
395N/A elif dest:
290N/A if not os.path.isabs(dest):
395N/A dest = os.path.join(pkg_root, dest)
395N/A gconf[log_type_map[log_type]["param"]] = dest
395N/A
395N/A cherrypy.config.update(gconf)
395N/A
395N/A # Now that our logging, etc. has been setup, it's safe to perform any
430N/A # remaining preparation.
395N/A
395N/A # Initialize repository state.
395N/A if not readonly:
395N/A # Not readonly, so assume a new repository should be created.
395N/A try:
395N/A sr.repository_create(inst_root, properties=repo_props)
691N/A except sr.RepositoryExistsError:
691N/A # Already exists, nothing to do.
691N/A pass
691N/A except (api_errors.ApiException, sr.RepositoryError), _e:
691N/A emsg("pkg.depotd: %s" % _e)
691N/A sys.exit(1)
691N/A
691N/A try:
2339N/A sort_file_max_size = dconf.get_property("pkg",
2339N/A "sort_file_max_size")
2339N/A
2339N/A repo = sr.Repository(cfgpathname=repo_config_file,
2339N/A log_obj=cherrypy, mirror=mirror, properties=repo_props,
2339N/A read_only=readonly, root=inst_root,
2339N/A sort_file_max_size=sort_file_max_size,
2339N/A writable_root=writable_root)
395N/A except (RuntimeError, sr.RepositoryError), _e:
395N/A emsg("pkg.depotd: %s" % _e)
395N/A sys.exit(1)
395N/A except search_errors.IndexingException, _e:
395N/A emsg("pkg.depotd: %s" % str(_e), "INDEX")
1516N/A sys.exit(1)
1516N/A except api_errors.ApiException, _e:
395N/A emsg("pkg.depotd: %s" % str(_e))
395N/A sys.exit(1)
395N/A
395N/A if not rebuild and not add_content and not repo.mirror and \
395N/A not (repo.read_only and not repo.writable_root):
395N/A # Automatically update search indexes on startup if not already
# told to, and not in readonly/mirror mode.
reindex = True
if reindex:
try:
# Only execute a index refresh here if --exit-ready was
# requested; it will be handled later in the setup
# process for other cases.
if repo.root and exit_ready:
repo.refresh_index()
except (sr.RepositoryError, search_errors.IndexingException,
api_errors.ApiException), e:
emsg(str(e), "INDEX")
sys.exit(1)
elif rebuild:
try:
repo.rebuild(build_index=True)
except sr.RepositoryError, e:
emsg(str(e), "REBUILD")
sys.exit(1)
except (search_errors.IndexingException,
api_errors.UnknownErrors,
api_errors.PermissionsException), e:
emsg(str(e), "INDEX")
sys.exit(1)
elif add_content:
try:
repo.add_content()
repo.refresh_index()
except sr.RepositoryError, e:
emsg(str(e), "ADD_CONTENT")
sys.exit(1)
except (search_errors.IndexingException,
api_errors.UnknownErrors,
api_errors.PermissionsException), e:
emsg(str(e), "INDEX")
sys.exit(1)
# Ready to start depot; exit now if requested.
if exit_ready:
sys.exit(0)
# Next, initialize depot.
if nasty:
depot = ds.NastyDepotHTTP(repo, dconf)
else:
depot = ds.DepotHTTP(repo, dconf)
# Now build our site configuration.
conf = {
"/": {
# We have to override cherrypy's default response_class so that
# we have access to the write() callable to stream data
# directly to the client.
"wsgi.response_class": dr.DepotResponse,
},
"/robots.txt": {
"tools.staticfile.on": True,
"tools.staticfile.filename": os.path.join(depot.web_root,
"robots.txt")
},
}
proxy_base = dconf.get_property("pkg", "proxy_base")
if proxy_base:
# This changes the base URL for our server, and is primarily
# intended to allow our depot process to operate behind Apache
# or some other webserver process.
#
# Visit the following URL for more information:
# http://cherrypy.org/wiki/BuiltinTools#tools.proxy
proxy_conf = {
"tools.proxy.on": True,
"tools.proxy.local": "",
"tools.proxy.base": proxy_base
}
# Now merge or add our proxy configuration information into the
# existing configuration.
for entry in proxy_conf:
conf["/"][entry] = proxy_conf[entry]
if ll_mirror:
ds.DNSSD_Plugin(cherrypy.engine, gconf).subscribe()
if reindex:
# Tell depot to update search indexes when possible;
# this is done as a background task so that packages
# can be served immediately while search indexes are
# still being updated.
depot._queue_refresh_index()
# If stdin is not a tty and the pkgdepot controller isn't being used,
# then assume process should be daemonized.
if not os.environ.get("PKGDEPOT_CONTROLLER") and \
not os.isatty(sys.stdin.fileno()):
# Translate the values in log_cfg into paths.
Daemonizer(cherrypy.engine, stderr=log_cfg["errors"],
stdout=log_cfg["access"]).subscribe()
try:
root = cherrypy.Application(depot)
cherrypy.quickstart(root, config=conf)
except Exception, _e:
emsg("pkg.depotd: unknown error starting depot server, " \
"illegal option value specified?")
emsg(_e)
sys.exit(1)