depot.py revision 3171
1516N/A#!/usr/bin/python2.6
290N/A#
290N/A# CDDL HEADER START
290N/A#
290N/A# The contents of this file are subject to the terms of the
290N/A# Common Development and Distribution License (the "License").
290N/A# You may not use this file except in compliance with the License.
290N/A#
290N/A# You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
290N/A# or http://www.opensolaris.org/os/licensing.
290N/A# See the License for the specific language governing permissions
290N/A# and limitations under the License.
290N/A#
290N/A# When distributing Covered Code, include this CDDL HEADER in each
290N/A# file and include the License file at usr/src/OPENSOLARIS.LICENSE.
290N/A# If applicable, add the following below this CDDL HEADER, with the
290N/A# fields enclosed by brackets "[]" replaced with your own identifying
290N/A# information: Portions Copyright [yyyy] [name of copyright owner]
290N/A#
290N/A# CDDL HEADER END
290N/A#
2223N/A# Copyright (c) 2007, 2015, Oracle and/or its affiliates. All rights reserved.
395N/A#
290N/A
883N/Afrom __future__ import print_function
454N/A
290N/A# pkg.depotd - package repository daemon
448N/A
290N/A# XXX The prototype pkg.depotd combines both the version management server that
290N/A# answers to pkgsend(1) sessions and the HTTP file server that answers to the
290N/A# various GET operations that a pkg(1) client makes. This split is expected to
383N/A# be made more explicit, by constraining the pkg(1) operations such that they
290N/A# can be served as a typical HTTP/HTTPS session. Thus, pkg.depotd will reduce
395N/A# to a special purpose HTTP/HTTPS server explicitly for the version management
290N/A# operations, and must manipulate the various state files--catalogs, in
395N/A# particular--such that the pkg(1) pull client can operately accurately with
849N/A# only a basic HTTP/HTTPS server in place.
1516N/A
290N/A# XXX Although we pushed the evaluation of next-version, etc. to the pull
849N/A# client, we should probably provide a query API to do same on the server, for
290N/A# dumb clients (like a notification service).
290N/A
290N/A# The default path for static and other web content.
290N/ACONTENT_PATH_DEFAULT = "/usr/share/lib/pkg"
383N/A# cherrypy has a max_request_body_size parameter that determines whether the
290N/A# server should abort requests with REQUEST_ENTITY_TOO_LARGE when the request
290N/A# body is larger than the specified size (in bytes). The maximum size supported
290N/A# by cherrypy is 2048 * 1024 * 1024 - 1 (just short of 2048MB), but the default
290N/A# here is purposefully conservative.
290N/AMAX_REQUEST_BODY_SIZE = 512 * 1024 * 1024
290N/A# The default host/port(s) to serve data from.
290N/AHOST_DEFAULT = "0.0.0.0"
290N/APORT_DEFAULT = 80
1660N/ASSL_PORT_DEFAULT = 443
1660N/A# The minimum number of threads allowed.
1660N/ATHREADS_MIN = 1
1660N/A# The default number of threads to start.
1660N/ATHREADS_DEFAULT = 60
1660N/A# The maximum number of threads that can be started.
1660N/ATHREADS_MAX = 5000
1660N/A# The default server socket timeout in seconds. We want this to be longer than
1660N/A# the normal default of 10 seconds to accommodate clients with poor quality
1660N/A# connections.
1660N/ASOCKET_TIMEOUT_DEFAULT = 60
1660N/A
1660N/Aimport getopt
1660N/Aimport gettext
1660N/Aimport locale
1660N/Aimport logging
1660N/Aimport os
1660N/Aimport os.path
465N/Aimport OpenSSL.crypto as crypto
465N/Aimport subprocess
465N/Aimport sys
1516N/Aimport tempfile
465N/Aimport urlparse
465N/A
465N/Atry:
1516N/A import cherrypy
465N/A version = cherrypy.__version__.split('.')
465N/A if map(int, version) < [3, 1, 0]:
465N/A raise ImportError
465N/A elif map(int, version) >= [3, 2, 0]:
465N/A raise ImportError
465N/Aexcept ImportError:
465N/A print("""cherrypy 3.1.0 or greater (but less than """
1099N/A """3.2.0) is required to use this program.""", file=sys.stderr)
465N/A sys.exit(2)
1513N/A
1513N/Aimport cherrypy.process.servers
2075N/Afrom cherrypy.process.plugins import Daemonizer
2180N/A
2075N/Afrom pkg.misc import msg, emsg, setlocale
2075N/Afrom pkg.client.debugvalues import DebugValues
2075N/A
2075N/Aimport pkg
708N/Aimport pkg.client.api_errors as api_errors
1391N/Aimport pkg.config as cfg
1391N/Aimport pkg.portable.util as os_util
1391N/Aimport pkg.search_errors as search_errors
1391N/Aimport pkg.server.depot as ds
1391N/Aimport pkg.server.depotresponse as dr
1391N/Aimport pkg.server.repository as sr
1391N/A
1391N/A
1391N/Aclass LogSink(object):
1391N/A """This is a dummy object that we can use to discard log entries
1391N/A without relying on non-portable interfaces such as /dev/null."""
742N/A
742N/A def write(self, *args, **kwargs):
742N/A """Discard the bits."""
742N/A pass
742N/A
742N/A def flush(self, *args, **kwargs):
1099N/A """Discard the bits."""
742N/A pass
941N/A
941N/A
941N/Adef usage(text=None, retcode=2, full=False):
941N/A """Optionally emit a usage message and then exit using the specified
941N/A exit code."""
941N/A
1099N/A if text:
941N/A emsg(text)
2023N/A
2023N/A if not full:
2023N/A # The full usage message isn't desired.
2023N/A emsg(_("Try `pkg.depotd --help or -?' for more "
2023N/A "information."))
2023N/A sys.exit(retcode)
2023N/A
2023N/A print("""\
1191N/AUsage: /usr/lib/pkg.depotd [-a address] [-d inst_root] [-p port] [-s threads]
1513N/A [-t socket_timeout] [--cfg] [--content-root]
1191N/A [--disable-ops op[/1][,...]] [--debug feature_list]
2180N/A [--image-root dir] [--log-access dest] [--log-errors dest]
1191N/A [--mirror] [--nasty] [--nasty-sleep] [--proxy-base url]
1191N/A [--readonly] [--ssl-cert-file] [--ssl-dialog] [--ssl-key-file]
1191N/A [--sort-file-max-size size] [--writable-root dir]
1191N/A
1660N/A -a address The IP address on which to listen for connections. The
1660N/A default value is 0.0.0.0 (INADDR_ANY) which will listen
1660N/A on all active interfaces. To listen on all active IPv6
290N/A interfaces, use '::'.
2026N/A -d inst_root The file system path at which the server should find its
2026N/A repository data. Required unless PKG_REPO has been set
2026N/A in the environment.
2026N/A -p port The port number on which the instance should listen for
2026N/A incoming package requests. The default value is 80 if
2026N/A ssl certificate and key information has not been
2026N/A provided; otherwise, the default value is 443.
2026N/A -s threads The number of threads that will be started to serve
448N/A requests. The default value is 10.
448N/A -t timeout The maximum number of seconds the server should wait for
534N/A a response from a client before closing a connection.
534N/A The default value is 60.
534N/A --cfg The pathname of the file to use when reading and writing
534N/A depot configuration data, or a fully qualified service
534N/A fault management resource identifier (FMRI) of the SMF
534N/A service or instance to read configuration data from.
534N/A --content-root The file system path to the directory containing the
290N/A the static and other web content used by the depot's
290N/A browser user interface. The default value is
954N/A '/usr/share/lib/pkg'.
954N/A --disable-ops A comma separated list of operations that the depot
954N/A should not configure. If, for example, you wanted
954N/A to omit loading search v1, 'search/1' should be
534N/A provided as an argument, or to disable all search
1099N/A operations, simply 'search'.
290N/A --debug The name of a debug feature to enable; or a whitespace
1516N/A or comma separated list of features to enable.
290N/A Possible values are: headers, hash=sha1+sha256,
290N/A hash=sha256, hash=sha1+sha512_256, hash=sha512_256
290N/A --image-root The path to the image whose file information will be
661N/A used as a cache for file data.
290N/A --log-access The destination for any access related information
290N/A logged by the depot process. Possible values are:
290N/A stderr, stdout, none, or an absolute pathname. The
395N/A default value is stdout if stdout is a tty; otherwise
290N/A the default value is none.
2125N/A --log-errors The destination for any errors or other information
290N/A logged by the depot process. Possible values are:
1483N/A stderr, stdout, none, or an absolute pathname. The
290N/A default value is stderr.
1498N/A --mirror Package mirror mode; publishing and metadata operations
1498N/A disallowed. Cannot be used with --readonly or
290N/A --rebuild.
1674N/A --nasty Instruct the server to misbehave. At random intervals
1674N/A it will time-out, send bad responses, hang up on
1674N/A clients, and generally be hostile. The option
1674N/A takes a value (1 to 100) for how nasty the server
1674N/A should be.
1674N/A --nasty-sleep In nasty mode (see --nasty), how many seconds to
1674N/A randomly sleep when a random sleep occurs.
395N/A --proxy-base The url to use as the base for generating internal
430N/A redirects and content.
395N/A --readonly Read-only operation; modifying operations disallowed.
1544N/A Cannot be used with --mirror or --rebuild.
1968N/A --ssl-cert-file The absolute pathname to a PEM-encoded Certificate file.
1557N/A This option must be used with --ssl-key-file. Usage of
1903N/A this option will cause the depot to only respond to SSL
2046N/A requests on the provided port.
1506N/A --ssl-dialog Specifies what method should be used to obtain the
395N/A passphrase needed to decrypt the file specified by
395N/A --ssl-key-file. Supported values are: builtin,
2026N/A exec:/path/to/program, smf, or an SMF FMRI. The
424N/A default value is builtin. If smf is specified, an
1024N/A SMF FMRI must be provided using the --cfg option.
395N/A --ssl-key-file The absolute pathname to a PEM-encoded Private Key file.
395N/A This option must be used with --ssl-cert-file. Usage of
395N/A this option will cause the depot to only respond to SSL
2078N/A requests on the provided port.
578N/A --sort-file-max-size
1172N/A The maximum size of the indexer sort file. Used to
395N/A limit the amount of RAM the depot uses for indexing,
661N/A or increase it for speed.
1099N/A --writable-root The path to a directory to which the program has write
1902N/A access. Used with --readonly to allow server to
661N/A create needed files, such as search indices, without
395N/A needing write access to the package information.
849N/AOptions:
290N/A --help or -?
395N/A
395N/AEnvironment:
1968N/A PKG_REPO Used as default inst_root if -d not provided.
395N/A PKG_DEPOT_CONTENT Used as default content_root if --content-root
395N/A not provided.""")
395N/A sys.exit(retcode)
395N/A
395N/Aclass OptionError(Exception):
395N/A """Option exception. """
395N/A
395N/A def __init__(self, *args):
395N/A Exception.__init__(self, *args)
395N/A
395N/Aif __name__ == "__main__":
290N/A
290N/A setlocale(locale.LC_ALL, "")
395N/A gettext.install("pkg", "/usr/share/locale",
395N/A codeset=locale.getpreferredencoding())
1231N/A
1557N/A add_content = False
1903N/A exit_ready = False
1557N/A rebuild = False
395N/A reindex = False
395N/A nasty = False
395N/A
395N/A # Track initial configuration values.
395N/A ivalues = { "pkg": {}, "nasty": {} }
395N/A if "PKG_REPO" in os.environ:
395N/A ivalues["pkg"]["inst_root"] = os.environ["PKG_REPO"]
395N/A
395N/A try:
395N/A content_root = os.environ["PKG_DEPOT_CONTENT"]
395N/A ivalues["pkg"]["content_root"] = content_root
290N/A except KeyError:
290N/A try:
430N/A content_root = os.path.join(os.environ['PKG_HOME'],
395N/A 'share/lib/pkg')
395N/A ivalues["pkg"]["content_root"] = content_root
395N/A except KeyError:
395N/A pass
1302N/A
395N/A opt = None
395N/A addresses = set()
290N/A debug_features = []
395N/A disable_ops = []
1024N/A repo_props = {}
413N/A socket_path = ""
1544N/A user_cfg = None
1557N/A try:
1903N/A long_opts = ["add-content", "cfg=", "cfg-file=",
2046N/A "content-root=", "debug=", "disable-ops=", "exit-ready",
1506N/A "help", "image-root=", "log-access=", "log-errors=",
413N/A "llmirror", "mirror", "nasty=", "nasty-sleep=",
2026N/A "proxy-base=", "readonly", "rebuild", "refresh-index",
413N/A "set-property=", "ssl-cert-file=", "ssl-dialog=",
1978N/A "ssl-key-file=", "sort-file-max-size=", "writable-root="]
1024N/A
395N/A opts, pargs = getopt.getopt(sys.argv[1:], "a:d:np:s:t:?",
395N/A long_opts)
413N/A
395N/A show_usage = False
395N/A for opt, arg in opts:
413N/A if opt == "-a":
395N/A addresses.add(arg)
395N/A elif opt == "-n":
395N/A sys.exit(0)
395N/A elif opt == "-d":
395N/A ivalues["pkg"]["inst_root"] = arg
395N/A elif opt == "-p":
1191N/A ivalues["pkg"]["port"] = arg
1452N/A elif opt == "-s":
1231N/A threads = int(arg)
2046N/A if threads < THREADS_MIN:
395N/A raise OptionError, \
395N/A "minimum value is {0:d}".format(
424N/A THREADS_MIN)
395N/A if threads > THREADS_MAX:
742N/A raise OptionError, \
742N/A "maximum value is {0:d}".format(
742N/A THREADS_MAX)
742N/A ivalues["pkg"]["threads"] = threads
742N/A elif opt == "-t":
742N/A ivalues["pkg"]["socket_timeout"] = arg
742N/A elif opt == "--add-content":
742N/A add_content = True
742N/A elif opt == "--cfg":
742N/A user_cfg = arg
742N/A elif opt == "--cfg-file":
395N/A ivalues["pkg"]["cfg_file"] = arg
395N/A elif opt == "--content-root":
395N/A ivalues["pkg"]["content_root"] = arg
395N/A elif opt == "--debug":
395N/A if arg is None or arg == "":
954N/A continue
954N/A
954N/A # A list of features can be specified using a
954N/A # "," or any whitespace character as separators.
954N/A if "," in arg:
954N/A features = arg.split(",")
954N/A else:
395N/A features = arg.split()
1483N/A debug_features.extend(features)
1483N/A
1483N/A # We also allow key=value debug flags, which
1483N/A # get set in pkg.client.debugvalues
395N/A for feature in features:
1902N/A try:
1099N/A key, val = feature.split("=", 1)
1099N/A DebugValues.set_value(key, val)
395N/A except (AttributeError, ValueError):
2046N/A pass
2223N/A
2046N/A elif opt == "--disable-ops":
2046N/A if arg is None or arg == "":
1498N/A raise OptionError, \
1498N/A "An argument must be specified."
691N/A
691N/A disableops = arg.split(",")
691N/A for s in disableops:
395N/A if "/" in s:
395N/A op, ver = s.rsplit("/", 1)
395N/A else:
395N/A op = s
395N/A ver = "*"
290N/A
395N/A if op not in \
395N/A ds.DepotHTTP.REPO_OPS_DEFAULT:
591N/A raise OptionError(
591N/A "Invalid operation "
591N/A "'{0}'.".format(s))
1505N/A disable_ops.append(s)
1505N/A elif opt == "--exit-ready":
1505N/A exit_ready = True
1505N/A elif opt == "--image-root":
1632N/A ivalues["pkg"]["image_root"] = arg
1632N/A elif opt.startswith("--log-"):
1632N/A prop = "log_{0}".format(opt.lstrip("--log-"))
1632N/A ivalues["pkg"][prop] = arg
395N/A elif opt in ("--help", "-?"):
395N/A show_usage = True
290N/A elif opt == "--mirror":
290N/A ivalues["pkg"]["mirror"] = True
290N/A elif opt == "--llmirror":
290N/A ivalues["pkg"]["mirror"] = True
290N/A ivalues["pkg"]["ll_mirror"] = True
290N/A ivalues["pkg"]["readonly"] = True
290N/A elif opt == "--nasty":
290N/A # ValueError is caught by caller.
290N/A nasty_value = int(arg)
290N/A if (nasty_value > 100 or nasty_value < 1):
290N/A raise OptionError, "Invalid value " \
290N/A "for nasty option.\n Please " \
290N/A "choose a value between 1 and 100."
290N/A nasty = True
395N/A ivalues["nasty"]["nasty_level"] = nasty_value
395N/A elif opt == "--nasty-sleep":
290N/A # ValueError is caught by caller.
290N/A sleep_value = int(arg)
290N/A ivalues["nasty"]["nasty_sleep"] = sleep_value
290N/A elif opt == "--proxy-base":
290N/A # Attempt to decompose the url provided into
395N/A # its base parts. This is done so we can
395N/A # remove any scheme information since we
395N/A # don't need it.
290N/A scheme, netloc, path, params, query, \
395N/A fragment = urlparse.urlparse(arg,
395N/A "http", allow_fragments=0)
395N/A
395N/A if not netloc:
591N/A raise OptionError, "Unable to " \
591N/A "determine the hostname from " \
591N/A "the provided URL; please use a " \
591N/A "fully qualified URL."
691N/A
691N/A scheme = scheme.lower()
691N/A if scheme not in ("http", "https"):
691N/A raise OptionError, "Invalid URL; http " \
290N/A "and https are the only supported " \
290N/A "schemes."
290N/A
290N/A # Rebuild the url with the sanitized components.
290N/A ivalues["pkg"]["proxy_base"] = \
591N/A urlparse.urlunparse((scheme, netloc, path,
591N/A params, query, fragment))
691N/A elif opt == "--readonly":
691N/A ivalues["pkg"]["readonly"] = True
290N/A elif opt == "--rebuild":
395N/A rebuild = True
395N/A elif opt == "--refresh-index":
290N/A # Note: This argument is for internal use
395N/A # only.
395N/A #
395N/A # This flag is purposefully omitted in usage.
395N/A # The supported way to forcefully reindex is to
290N/A # kill any pkg.depot using that directory,
290N/A # remove the index directory, and restart the
290N/A # pkg.depot process. The index will be rebuilt
395N/A # automatically on startup.
395N/A reindex = True
395N/A exit_ready = True
395N/A elif opt == "--set-property":
395N/A try:
395N/A prop, p_value = arg.split("=", 1)
290N/A p_sec, p_name = prop.split(".", 1)
290N/A except ValueError:
290N/A usage(_("property arguments must be of "
290N/A "the form '<section.property>="
290N/A "<value>'."))
430N/A repo_props.setdefault(p_sec, {})
290N/A repo_props[p_sec][p_name] = p_value
290N/A elif opt == "--ssl-cert-file":
395N/A if arg == "none" or arg == "":
290N/A # Assume this is an override to clear
395N/A # the value.
506N/A arg = ""
506N/A elif not os.path.isabs(arg):
506N/A raise OptionError, "The path to " \
506N/A "the Certificate file must be " \
506N/A "absolute."
506N/A elif not os.path.exists(arg):
506N/A raise OptionError, "The specified " \
506N/A "file does not exist."
834N/A elif not os.path.isfile(arg):
506N/A raise OptionError, "The specified " \
506N/A "pathname is not a file."
506N/A ivalues["pkg"]["ssl_cert_file"] = arg
513N/A elif opt == "--ssl-key-file":
506N/A if arg == "none" or arg == "":
506N/A # Assume this is an override to clear
506N/A # the value.
506N/A arg = ""
290N/A elif not os.path.isabs(arg):
290N/A raise OptionError, "The path to " \
395N/A "the Private Key file must be " \
395N/A "absolute."
849N/A elif not os.path.exists(arg):
849N/A raise OptionError, "The specified " \
883N/A "file does not exist."
883N/A elif not os.path.isfile(arg):
395N/A raise OptionError, "The specified " \
413N/A "pathname is not a file."
413N/A ivalues["pkg"]["ssl_key_file"] = arg
413N/A elif opt == "--ssl-dialog":
395N/A if arg != "builtin" and \
290N/A arg != "smf" and not \
1674N/A arg.startswith("exec:/") and not \
1674N/A arg.startswith("svc:"):
1674N/A raise OptionError, "Invalid value " \
1674N/A "specified. Expected: builtin, " \
1674N/A "exec:/path/to/program, smf, or " \
1674N/A "an SMF FMRI."
1674N/A
1674N/A if arg.startswith("exec:"):
1674N/A if os_util.get_canonical_os_type() != \
1674N/A "unix":
1674N/A # Don't allow a somewhat
1674N/A # insecure authentication method
1674N/A # on some platforms.
1674N/A raise OptionError, "exec is " \
1674N/A "not a supported dialog " \
395N/A "type for this operating " \
395N/A "system."
506N/A
506N/A f = os.path.abspath(arg.split(
395N/A "exec:")[1])
395N/A if not os.path.isfile(f):
395N/A raise OptionError, "Invalid " \
395N/A "file path specified for " \
430N/A "exec."
849N/A ivalues["pkg"]["ssl_dialog"] = arg
834N/A elif opt == "--sort-file-max-size":
290N/A ivalues["pkg"]["sort_file_max_size"] = arg
1391N/A elif opt == "--writable-root":
1391N/A ivalues["pkg"]["writable_root"] = arg
1401N/A
1391N/A # Set accumulated values.
1391N/A if debug_features:
1391N/A ivalues["pkg"]["debug"] = debug_features
1391N/A if disable_ops:
1391N/A ivalues["pkg"]["disable_ops"] = disable_ops
1391N/A if addresses:
1391N/A ivalues["pkg"]["address"] = list(addresses)
1391N/A
836N/A if DebugValues:
836N/A reload(pkg.digest)
849N/A
849N/A # Build configuration object.
849N/A dconf = ds.DepotConfig(target=user_cfg, overrides=ivalues)
849N/A except getopt.GetoptError as _e:
849N/A usage("pkg.depotd: {0}".format(_e.msg))
849N/A except api_errors.ApiException as _e:
849N/A usage("pkg.depotd: {0}".format(str(_e)))
849N/A except OptionError as _e:
849N/A usage("pkg.depotd: option: {0} -- {1}".format(opt, _e))
849N/A except (ArithmeticError, ValueError):
849N/A usage("pkg.depotd: illegal option value: {0} specified " \
849N/A "for option: {1}".format(arg, opt))
1513N/A
1391N/A if show_usage:
849N/A usage(retcode=0, full=True)
2026N/A
2026N/A if not dconf.get_property("pkg", "log_errors"):
1513N/A dconf.set_property("pkg", "log_errors", "stderr")
1391N/A
1513N/A # If stdout is a tty, then send access output there by default instead
1391N/A # of discarding it.
1391N/A if not dconf.get_property("pkg", "log_access"):
1660N/A if os.isatty(sys.stdout.fileno()):
1513N/A dconf.set_property("pkg", "log_access", "stdout")
1513N/A else:
2023N/A dconf.set_property("pkg", "log_access", "none")
2023N/A
290N/A # Check for invalid option combinations.
883N/A image_root = dconf.get_property("pkg", "image_root")
883N/A inst_root = dconf.get_property("pkg", "inst_root")
883N/A mirror = dconf.get_property("pkg", "mirror")
883N/A ll_mirror = dconf.get_property("pkg", "ll_mirror")
883N/A readonly = dconf.get_property("pkg", "readonly")
883N/A writable_root = dconf.get_property("pkg", "writable_root")
883N/A if rebuild and add_content:
883N/A usage("--add-content cannot be used with --rebuild")
883N/A if rebuild and reindex:
883N/A usage("--refresh-index cannot be used with --rebuild")
883N/A if (rebuild or add_content) and (readonly or mirror):
883N/A usage("--readonly and --mirror cannot be used with --rebuild "
883N/A "or --add-content")
883N/A if reindex and mirror:
883N/A usage("--mirror cannot be used with --refresh-index")
883N/A if reindex and readonly and not writable_root:
1099N/A usage("--readonly can only be used with --refresh-index if "
1099N/A "--writable-root is used")
1099N/A if image_root and not ll_mirror:
1099N/A usage("--image-root can only be used with --llmirror.")
1099N/A if image_root and writable_root:
1516N/A usage("--image_root and --writable-root cannot be used "
1265N/A "together.")
1099N/A if image_root and inst_root:
1099N/A usage("--image-root and -d cannot be used together.")
1099N/A
1099N/A # If the image format changes this may need to be reexamined.
1099N/A if image_root:
1099N/A inst_root = os.path.join(image_root, "var", "pkg")
1099N/A
1099N/A # Set any values using defaults if they weren't provided.
1099N/A
1099N/A # Only use the first value for now; multiple bind addresses may be
1208N/A # supported later.
1208N/A address = dconf.get_property("pkg", "address")
1099N/A if address:
1099N/A address = address[0]
1391N/A elif not address:
1099N/A dconf.set_property("pkg", "address", [HOST_DEFAULT])
1099N/A address = dconf.get_property("pkg", "address")[0]
1099N/A
1099N/A if not inst_root:
1099N/A usage("Either PKG_REPO or -d must be provided")
465N/A
465N/A content_root = dconf.get_property("pkg", "content_root")
395N/A if not content_root:
465N/A dconf.set_property("pkg", "content_root", CONTENT_PATH_DEFAULT)
395N/A content_root = dconf.get_property("pkg", "content_root")
395N/A
2176N/A port = dconf.get_property("pkg", "port")
1208N/A ssl_cert_file = dconf.get_property("pkg", "ssl_cert_file")
1208N/A ssl_key_file = dconf.get_property("pkg", "ssl_key_file")
465N/A if (ssl_cert_file and not ssl_key_file) or (ssl_key_file and not
395N/A ssl_cert_file):
465N/A usage("The --ssl-cert-file and --ssl-key-file options must "
395N/A "must both be provided when using either option.")
465N/A elif not port:
1099N/A if ssl_cert_file and ssl_key_file:
1099N/A dconf.set_property("pkg", "port", SSL_PORT_DEFAULT)
1099N/A else:
465N/A dconf.set_property("pkg", "port", PORT_DEFAULT)
465N/A port = dconf.get_property("pkg", "port")
395N/A
395N/A socket_timeout = dconf.get_property("pkg", "socket_timeout")
1099N/A if not socket_timeout:
395N/A dconf.set_property("pkg", "socket_timeout",
1191N/A SOCKET_TIMEOUT_DEFAULT)
1191N/A socket_timeout = dconf.get_property("pkg", "socket_timeout")
1191N/A
1191N/A threads = dconf.get_property("pkg", "threads")
1191N/A if not threads:
1191N/A dconf.set_property("pkg", "threads", THREADS_DEFAULT)
1191N/A threads = dconf.get_property("pkg", "threads")
1191N/A
1191N/A # If the program is going to reindex, the port is irrelevant since
1191N/A # the program will not bind to a port.
1265N/A if not exit_ready:
1265N/A try:
1265N/A cherrypy.process.servers.check_port(address, port)
1208N/A except Exception as e:
1208N/A emsg("pkg.depotd: unable to bind to the specified "
1208N/A "port: {0:d}. Reason: {1}".format(port, e))
1208N/A sys.exit(1)
1208N/A else:
1208N/A # Not applicable if we're not going to serve content
1208N/A dconf.set_property("pkg", "content_root", "")
1191N/A
1191N/A # Any relative paths should be made absolute using pkg_root. 'pkg_root'
1391N/A # is a special property that was added to enable internal deployment of
1391N/A # multiple disparate versions of the pkg.depotd software.
1391N/A pkg_root = dconf.get_property("pkg", "pkg_root")
1391N/A
1391N/A repo_config_file = dconf.get_property("pkg", "cfg_file")
1391N/A if repo_config_file and not os.path.isabs(repo_config_file):
1391N/A repo_config_file = os.path.join(pkg_root, repo_config_file)
1394N/A
1394N/A if content_root and not os.path.isabs(content_root):
1391N/A content_root = os.path.join(pkg_root, content_root)
1391N/A
1391N/A if inst_root and not os.path.isabs(inst_root):
1391N/A inst_root = os.path.join(pkg_root, inst_root)
1391N/A
1391N/A if ssl_cert_file:
1391N/A if ssl_cert_file == "none":
1660N/A ssl_cert_file = None
1391N/A elif not os.path.isabs(ssl_cert_file):
465N/A ssl_cert_file = os.path.join(pkg_root, ssl_cert_file)
1660N/A
1660N/A if ssl_key_file:
1660N/A if ssl_key_file == "none":
1660N/A ssl_key_file = None
465N/A elif not os.path.isabs(ssl_key_file):
465N/A ssl_key_file = os.path.join(pkg_root, ssl_key_file)
1516N/A
498N/A if writable_root and not os.path.isabs(writable_root):
498N/A writable_root = os.path.join(pkg_root, writable_root)
849N/A
1660N/A # Setup SSL if requested.
1391N/A key_data = None
1660N/A ssl_dialog = dconf.get_property("pkg", "ssl_dialog")
1660N/A if not exit_ready and ssl_cert_file and ssl_key_file and \
1660N/A ssl_dialog != "builtin":
1660N/A cmdline = None
849N/A def get_ssl_passphrase(*ignored):
1208N/A p = None
1208N/A try:
1208N/A p = subprocess.Popen(cmdline, shell=True,
1208N/A stdout=subprocess.PIPE,
849N/A stderr=None)
290N/A p.wait()
465N/A except Exception as __e:
465N/A emsg("pkg.depotd: an error occurred while "
1099N/A "executing [{0}]; unable to obtain the "
465N/A "passphrase needed to decrypt the SSL "
1099N/A "private key file: {1}".format(cmdline,
1099N/A __e))
1099N/A sys.exit(1)
454N/A return p.stdout.read().strip("\n")
1099N/A
849N/A if ssl_dialog.startswith("exec:"):
290N/A exec_path = ssl_dialog.split("exec:")[1]
430N/A if not os.path.isabs(exec_path):
395N/A exec_path = os.path.join(pkg_root, exec_path)
395N/A cmdline = "{0} {1} {2:d}".format(exec_path, "''", port)
290N/A elif ssl_dialog == "smf" or ssl_dialog.startswith("svc:"):
383N/A if ssl_dialog == "smf":
383N/A # Assume the configuration target was an SMF
395N/A # FMRI and let svcprop fail with an error if
383N/A # it wasn't.
383N/A svc_fmri = dconf.target
384N/A else:
383N/A svc_fmri = ssl_dialog
849N/A cmdline = "/usr/bin/svcprop -p " \
849N/A "pkg_secure/ssl_key_passphrase {0}".format(svc_fmri)
849N/A
849N/A # The key file requires decryption, but the user has requested
849N/A # exec-based authentication, so it will have to be decoded first
849N/A # to an un-named temporary file.
849N/A try:
849N/A with file(ssl_key_file, "rb") as key_file:
849N/A pkey = crypto.load_privatekey(
849N/A crypto.FILETYPE_PEM, key_file.read(),
849N/A get_ssl_passphrase)
849N/A
849N/A key_data = tempfile.TemporaryFile()
383N/A key_data.write(crypto.dump_privatekey(
383N/A crypto.FILETYPE_PEM, pkey))
383N/A key_data.seek(0)
849N/A except EnvironmentError as _e:
383N/A emsg("pkg.depotd: unable to read the SSL private key "
422N/A "file: {0}".format(_e))
422N/A sys.exit(1)
422N/A except crypto.Error as _e:
422N/A emsg("pkg.depotd: authentication or cryptography "
422N/A "failure while attempting to decode\nthe SSL "
422N/A "private key file: {0}".format(_e))
422N/A sys.exit(1)
422N/A else:
422N/A # Redirect the server to the decrypted key file.
422N/A ssl_key_file = "/dev/fd/{0:d}".format(key_data.fileno())
422N/A
422N/A # Setup our global configuration.
422N/A gconf = {
422N/A "checker.on": True,
422N/A "environment": "production",
422N/A "log.screen": False,
422N/A "server.max_request_body_size": MAX_REQUEST_BODY_SIZE,
383N/A "server.shutdown_timeout": 0,
422N/A "server.socket_host": address,
383N/A "server.socket_port": port,
383N/A "server.socket_timeout": socket_timeout,
383N/A "server.ssl_certificate": ssl_cert_file,
383N/A "server.ssl_private_key": ssl_key_file,
383N/A "server.thread_pool": threads,
383N/A "tools.log_headers.on": True,
383N/A "tools.encode.on": True
422N/A }
849N/A
849N/A if "headers" in dconf.get_property("pkg", "debug"):
849N/A # Despite its name, this only logs headers when there is an
383N/A # error; it's redundant with the debug feature enabled.
383N/A gconf["tools.log_headers.on"] = False
290N/A
430N/A # Causes the headers of every request to be logged to the error
395N/A # log; even if an exception occurs.
395N/A gconf["tools.log_headers_always.on"] = True
290N/A cherrypy.tools.log_headers_always = cherrypy.Tool(
290N/A "on_start_resource",
290N/A cherrypy.lib.cptools.log_request_headers)
290N/A
290N/A log_cfg = {
290N/A "access": dconf.get_property("pkg", "log_access"),
290N/A "errors": dconf.get_property("pkg", "log_errors")
290N/A }
290N/A
290N/A # If stdin is not a tty and the pkgdepot controller isn't being used,
290N/A # then assume process will be daemonized and redirect output.
395N/A if not os.environ.get("PKGDEPOT_CONTROLLER") and \
290N/A not os.isatty(sys.stdin.fileno()):
395N/A # Ensure log handlers are setup to use the file descriptors for
290N/A # stdout and stderr as the Daemonizer (used for test suite and
395N/A # SMF service) requires this.
290N/A if log_cfg["access"] == "stdout":
534N/A log_cfg["access"] = "/dev/fd/{0:d}".format(
534N/A sys.stdout.fileno())
1099N/A elif log_cfg["access"] == "stderr":
1099N/A log_cfg["access"] = "/dev/fd/{0:d}".format(
290N/A sys.stderr.fileno())
290N/A elif log_cfg["access"] == "none":
1101N/A log_cfg["access"] = "/dev/null"
1101N/A
1101N/A if log_cfg["errors"] == "stderr":
1513N/A log_cfg["errors"] = "/dev/fd/{0:d}".format(
1715N/A sys.stderr.fileno())
1513N/A elif log_cfg["errors"] == "stdout":
1513N/A log_cfg["errors"] = "/dev/fd/{0:d}".format(
448N/A sys.stdout.fileno())
1513N/A elif log_cfg["errors"] == "none":
448N/A log_cfg["errors"] = "/dev/null"
1101N/A
1513N/A log_type_map = {
1715N/A "errors": {
1715N/A "param": "log.error_file",
1716N/A "attr": "error_log"
1715N/A },
1715N/A "access": {
1513N/A "param": "log.access_file",
290N/A "attr": "access_log"
290N/A }
290N/A }
448N/A
448N/A for log_type in log_type_map:
430N/A dest = log_cfg[log_type]
448N/A if dest in ("stdout", "stderr", "none"):
430N/A if dest == "none":
1101N/A h = logging.StreamHandler(LogSink())
1513N/A else:
1715N/A h = logging.StreamHandler(eval("sys.{0}".format(
1715N/A dest)))
1716N/A
1715N/A h.setLevel(logging.DEBUG)
1715N/A h.setFormatter(cherrypy._cplogging.logfmt)
1101N/A log_obj = eval("cherrypy.log.{0}".format(
290N/A log_type_map[log_type]["attr"]))
290N/A log_obj.addHandler(h)
1101N/A # Since we've replaced cherrypy's log handler with our
290N/A # own, we don't want the output directed to a file.
1101N/A dest = ""
290N/A elif dest:
290N/A if not os.path.isabs(dest):
290N/A dest = os.path.join(pkg_root, dest)
448N/A gconf[log_type_map[log_type]["param"]] = dest
448N/A
448N/A cherrypy.config.update(gconf)
448N/A
448N/A # Now that our logging, etc. has been setup, it's safe to perform any
430N/A # remaining preparation.
448N/A
290N/A # Initialize repository state.
290N/A if not readonly:
290N/A # Not readonly, so assume a new repository should be created.
430N/A try:
395N/A sr.repository_create(inst_root, properties=repo_props)
290N/A except sr.RepositoryExistsError:
2180N/A # Already exists, nothing to do.
2180N/A pass
2180N/A except (api_errors.ApiException, sr.RepositoryError) as _e:
2180N/A emsg("pkg.depotd: {0}".format(_e))
2180N/A sys.exit(1)
2180N/A
2180N/A try:
2180N/A sort_file_max_size = dconf.get_property("pkg",
2180N/A "sort_file_max_size")
2180N/A
2180N/A repo = sr.Repository(cfgpathname=repo_config_file,
2180N/A log_obj=cherrypy, mirror=mirror, properties=repo_props,
2180N/A read_only=readonly, root=inst_root,
2180N/A sort_file_max_size=sort_file_max_size,
2180N/A writable_root=writable_root)
2180N/A except (RuntimeError, sr.RepositoryError) as _e:
2180N/A emsg("pkg.depotd: {0}".format(_e))
2180N/A sys.exit(1)
2180N/A except search_errors.IndexingException as _e:
2180N/A emsg("pkg.depotd: {0}".format(str(_e)), "INDEX")
2180N/A sys.exit(1)
2180N/A except api_errors.ApiException as _e:
2180N/A emsg("pkg.depotd: {0}".format(str(_e)))
2180N/A sys.exit(1)
2180N/A
2180N/A if not rebuild and not add_content and not repo.mirror and \
2180N/A not (repo.read_only and not repo.writable_root):
2180N/A # Automatically update search indexes on startup if not already
290N/A # told to, and not in readonly/mirror mode.
290N/A reindex = True
290N/A
1637N/A if reindex:
1637N/A try:
290N/A # Only execute a index refresh here if --exit-ready was
613N/A # requested; it will be handled later in the setup
613N/A # process for other cases.
613N/A if repo.root and exit_ready:
613N/A repo.refresh_index()
613N/A except (sr.RepositoryError, search_errors.IndexingException,
613N/A api_errors.ApiException) as e:
613N/A emsg(str(e), "INDEX")
613N/A sys.exit(1)
1632N/A elif rebuild:
1632N/A try:
1632N/A repo.rebuild(build_index=True)
1632N/A except sr.RepositoryError as e:
1632N/A emsg(str(e), "REBUILD")
1632N/A sys.exit(1)
1632N/A except (search_errors.IndexingException,
1632N/A api_errors.UnknownErrors,
613N/A api_errors.PermissionsException) as e:
290N/A emsg(str(e), "INDEX")
742N/A sys.exit(1)
395N/A elif add_content:
395N/A try:
395N/A repo.add_content()
395N/A repo.refresh_index()
395N/A except sr.RepositoryError as e:
395N/A emsg(str(e), "ADD_CONTENT")
395N/A sys.exit(1)
395N/A except (search_errors.IndexingException,
395N/A api_errors.UnknownErrors,
2180N/A api_errors.PermissionsException) as e:
395N/A emsg(str(e), "INDEX")
290N/A sys.exit(1)
383N/A
395N/A # Ready to start depot; exit now if requested.
395N/A if exit_ready:
395N/A sys.exit(0)
395N/A
2046N/A # Next, initialize depot.
395N/A if nasty:
290N/A depot = ds.NastyDepotHTTP(repo, dconf)
290N/A else:
395N/A depot = ds.DepotHTTP(repo, dconf)
395N/A
395N/A # Now build our site configuration.
395N/A conf = {
1483N/A "/": {
395N/A # We have to override cherrypy's default response_class so that
1498N/A # we have access to the write() callable to stream data
1498N/A # directly to the client.
395N/A "wsgi.response_class": dr.DepotResponse,
290N/A },
290N/A "/robots.txt": {
395N/A "tools.staticfile.on": True,
395N/A "tools.staticfile.filename": os.path.join(depot.web_root,
395N/A "robots.txt")
613N/A },
290N/A }
395N/A
395N/A proxy_base = dconf.get_property("pkg", "proxy_base")
395N/A if proxy_base:
395N/A # This changes the base URL for our server, and is primarily
395N/A # intended to allow our depot process to operate behind Apache
395N/A # or some other webserver process.
395N/A #
395N/A # Visit the following URL for more information:
290N/A # http://cherrypy.org/wiki/BuiltinTools#tools.proxy
395N/A proxy_conf = {
395N/A "tools.proxy.on": True,
395N/A "tools.proxy.local": "",
395N/A "tools.proxy.base": proxy_base
395N/A }
395N/A
430N/A # Now merge or add our proxy configuration information into the
395N/A # existing configuration.
395N/A for entry in proxy_conf:
395N/A conf["/"][entry] = proxy_conf[entry]
395N/A
395N/A if ll_mirror:
395N/A ds.DNSSD_Plugin(cherrypy.engine, gconf).subscribe()
691N/A
691N/A if reindex:
691N/A # Tell depot to update search indexes when possible;
691N/A # this is done as a background task so that packages
691N/A # can be served immediately while search indexes are
691N/A # still being updated.
691N/A depot._queue_refresh_index()
691N/A
395N/A # If stdin is not a tty and the pkgdepot controller isn't being used,
395N/A # then assume process should be daemonized.
395N/A if not os.environ.get("PKGDEPOT_CONTROLLER") and \
395N/A not os.isatty(sys.stdin.fileno()):
395N/A # Translate the values in log_cfg into paths.
1516N/A Daemonizer(cherrypy.engine, stderr=log_cfg["errors"],
1516N/A stdout=log_cfg["access"]).subscribe()
395N/A
395N/A try:
395N/A root = cherrypy.Application(depot)
395N/A cherrypy.quickstart(root, config=conf)
395N/A except Exception as _e:
395N/A emsg("pkg.depotd: unknown error starting depot server, " \
"illegal option value specified?")
emsg(_e)
sys.exit(1)