# Python library # kojihub - library for koji's XMLRPC interface # Copyright (c) 2005-2014 Red Hat, Inc. # # Koji is free software; you can redistribute it and/or # modify it under the terms of the GNU Lesser General Public # License as published by the Free Software Foundation; # version 2.1 of the License. # # This software is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU # Lesser General Public License for more details. # # You should have received a copy of the GNU Lesser General Public # License along with this software; if not, write to the Free Software # Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA # # Authors: # Mike McLean # Mike Bonnet # Cristian Balint import base64 import calendar import cgi import koji import koji.auth import koji.db import koji.plugin import koji.policy import datetime import errno import logging import fcntl import fnmatch import hashlib from koji.util import md5_constructor from koji.util import sha1_constructor from koji.util import dslice import os import random import re import rpm import shutil import stat import subprocess import sys import tarfile import tempfile import time import types import xmlrpclib import zipfile from koji.context import context logger = logging.getLogger('koji.hub') def log_error(msg): logger.error(msg) class Task(object): """A task for the build hosts""" fields = ( ('task.id', 'id'), ('task.state', 'state'), ('task.create_time', 'create_time'), ('EXTRACT(EPOCH FROM create_time)','create_ts'), ('task.start_time', 'start_time'), ('EXTRACT(EPOCH FROM task.start_time)', 'start_ts'), ('task.completion_time', 'completion_time'), ('EXTRACT(EPOCH FROM completion_time)','completion_ts'), ('task.channel_id', 'channel_id'), ('task.host_id', 'host_id'), ('task.parent', 'parent'), ('task.label', 'label'), ('task.waiting', 'waiting'), ('task.awaited', 'awaited'), ('task.owner', 'owner'), ('task.method', 'method'), ('task.arch', 'arch'), ('task.priority', 'priority'), ('task.weight', 'weight')) def __init__(self,id): self.id = id self.logger = logging.getLogger("koji.hub.Task") def verifyHost(self,host_id=None): """Verify that host owns task""" if host_id is None: host_id = context.session.host_id if host_id is None: return False task_id = self.id #getting a row lock on this task to ensure task assignment sanity #no other concurrent transaction should be altering this row q = """SELECT state,host_id FROM task WHERE id=%(task_id)s FOR UPDATE""" r = _fetchSingle(q, locals()) if not r: raise koji.GenericError, "No such task: %i" % task_id state, otherhost = r return (state == koji.TASK_STATES['OPEN'] and otherhost == host_id) def assertHost(self,host_id): if not self.verifyHost(host_id): raise koji.ActionNotAllowed, "host %d does not own task %d" % (host_id,self.id) def getOwner(self): """Return the owner (user_id) for this task""" q = """SELECT owner FROM task WHERE id=%(id)i""" return _singleValue(q, vars(self)) def verifyOwner(self,user_id=None): """Verify that user owns task""" if user_id is None: user_id = context.session.user_id if user_id is None: return False task_id = self.id #getting a row lock on this task to ensure task state sanity q = """SELECT owner FROM task WHERE id=%(task_id)s FOR UPDATE""" r = _fetchSingle(q, locals()) if not r: raise koji.GenericError, "No such task: %i" % task_id (owner,) = r return (owner == user_id) def assertOwner(self,user_id=None): if not self.verifyOwner(user_id): raise koji.ActionNotAllowed, "user %d does not own task %d" % (user_id,self.id) def lock(self,host_id,newstate='OPEN',force=False): """Attempt to associate the task for host, either to assign or open returns True if successful, False otherwise""" info = self.getInfo(request=True) self.runCallbacks('preTaskStateChange', info, 'state', koji.TASK_STATES[newstate]) self.runCallbacks('preTaskStateChange', info, 'host_id', host_id) #we use row-level locks to keep things sane #note the SELECT...FOR UPDATE task_id = self.id if not force: q = """SELECT state,host_id FROM task WHERE id=%(task_id)i FOR UPDATE""" r = _fetchSingle(q,locals()) if not r: raise koji.GenericError, "No such task: %i" % task_id state, otherhost = r if state == koji.TASK_STATES['FREE']: if otherhost is not None: log_error("Error: task %i is both free and locked (host %i)" % (task_id,otherhost)) return False elif state == koji.TASK_STATES['ASSIGNED']: if otherhost is None: log_error("Error: task %i is assigned, but has no assignee" % (task_id)) return False elif otherhost != host_id: #task is assigned to someone else return False #otherwise the task is assigned to host_id, so keep going else: if otherhost is None: log_error("Error: task %i is non-free but unlocked (state %i)" % (task_id,state)) return False #if we reach here, task is either # - free and unlocked # - assigned to host_id # - force option is enabled state = koji.TASK_STATES[newstate] update = UpdateProcessor('task', clauses=['id=%(task_id)i'], values=locals()) update.set(state=state, host_id=host_id) if state == koji.TASK_STATES['OPEN']: update.rawset(start_time='NOW()') update.execute() self.runCallbacks('postTaskStateChange', info, 'state', koji.TASK_STATES[newstate]) self.runCallbacks('postTaskStateChange', info, 'host_id', host_id) return True def assign(self,host_id,force=False): """Attempt to assign the task to host. returns True if successful, False otherwise""" return self.lock(host_id,'ASSIGNED',force) def open(self,host_id): """Attempt to open the task for host. returns task data if successful, None otherwise""" if self.lock(host_id,'OPEN'): # get more complete data to return fields = self.fields + (('task.request', 'request'),) query = QueryProcessor(tables=['task'], clauses=['id=%(id)i'], values=vars(self), columns=[f[0] for f in fields], aliases=[f[1] for f in fields]) ret = query.executeOne() if ret['request'].find(' %s, pruning" % (tag_id,id)) #auto prune continue if prunes.has_key(id): # ignore pruned tags continue if link['intransitive'] and len(top) > 1 and not reverse: # ignore intransitive inheritance links, except at root continue if link['priority'] < 0: #negative priority indicates pruning, rather than inheritance prunes[id] = 1 continue if reverse: #maxdepth logic is different in this case. no propagation if link['maxdepth'] is not None and link['maxdepth'] < currdepth - 1: continue nextdepth = None else: #propagate maxdepth nextdepth = link['maxdepth'] if nextdepth is None: if maxdepth is not None: nextdepth = maxdepth - 1 elif maxdepth is not None: nextdepth = min(nextdepth,maxdepth) - 1 link['nextdepth'] = nextdepth link['currdepth'] = currdepth #propagate noconfig and pkg_filter controls if link['noconfig']: noconfig = True filter = list(pfilter) # copy pattern = link['pkg_filter'] if pattern: filter.append(pattern) link['filter'] = filter # check history to avoid redundant entries if hist.has_key(id): #already been there #BUT, options may have been different rescan = True #since rescans are possible, we might have to consider more than one previous hit for previous in hist[id]: sufficient = True # is previous sufficient? # if last depth was less than current, then previous insufficient lastdepth = previous['nextdepth'] if nextdepth is None: if lastdepth is not None: sufficient = False elif lastdepth is not None and lastdepth < nextdepth: sufficient = False # if noconfig was on before, but not now, then insuffient if previous['noconfig'] and not noconfig: sufficient = False # if we had a filter before, then insufficient if len(previous['filter']) > 0: # FIXME - we could probably be a little more precise here sufficient = False if sufficient: rescan = False if not rescan: continue else: hist[id] = [] hist[id].append(link) #record history order.append(link) if link['intransitive'] and reverse: # add link, but don't follow it continue readFullInheritanceRecurse(id,event,order,prunes,top,hist,currdepth,nextdepth,noconfig,filter,reverse,jumps) # tag-package operations # add # remove # block # unblock # change owner # list def _pkglist_remove(tag_id, pkg_id): clauses = ('package_id=%(pkg_id)i', 'tag_id=%(tag_id)i') update = UpdateProcessor('tag_packages', values=locals(), clauses=clauses) update.make_revoke() #XXX user_id? update.execute() def _pkglist_add(tag_id, pkg_id, owner, block, extra_arches): #revoke old entry (if present) _pkglist_remove(tag_id, pkg_id) data = dslice(locals(), ('tag_id', 'owner', 'extra_arches')) data['package_id'] = pkg_id data['blocked'] = block insert = InsertProcessor('tag_packages', data=data) insert.make_create() #XXX user_id? insert.execute() def pkglist_add(taginfo,pkginfo,owner=None,block=None,extra_arches=None,force=False,update=False): """Add to (or update) package list for tag""" #access control comes a little later (via an assert_policy) #should not make any changes until after policy is checked tag = get_tag(taginfo, strict=True) tag_id = tag['id'] pkg = lookup_package(pkginfo, strict=False) if not pkg: if not isinstance(pkginfo, basestring): raise koji.GenericError, "Invalid package: %s" % pkginfo if owner is not None: owner = get_user(owner,strict=True)['id'] action = 'add' if update: action = 'update' elif bool(block): action = 'block' context.session.assertLogin() policy_data = {'tag' : tag_id, 'action' : action, 'package' : pkginfo, 'force' : force} #don't check policy for admins using force if not (force and context.session.hasPerm('admin')): assert_policy('package_list', policy_data) if not pkg: pkg = lookup_package(pkginfo, create=True) koji.plugin.run_callbacks('prePackageListChange', action=action, tag=tag, package=pkg, owner=owner, block=block, extra_arches=extra_arches, force=force, update=update) # first check to see if package is: # already present (via inheritance) # blocked pkglist = readPackageList(tag_id, pkgID=pkg['id'], inherit=True) previous = pkglist.get(pkg['id'],None) if previous is None: if block is None: block = False else: block = bool(block) if update and not force: #if update flag is true, require that there be a previous entry raise koji.GenericError, "cannot update: tag %s has no data for package %s" \ % (tag['name'],pkg['name']) else: #already there (possibly via inheritance) if owner is None: owner = previous['owner_id'] if block is None: block = previous['blocked'] else: block = bool(block) if extra_arches is None: extra_arches = previous['extra_arches'] #see if the data is the same changed = False for key,value in (('owner_id',owner), ('blocked',block), ('extra_arches',extra_arches)): if previous[key] != value: changed = True break if not changed and not force: #no point in adding it again with the same data return if previous['blocked'] and not block and not force: raise koji.GenericError, "package %s is blocked in tag %s" % (pkg['name'],tag['name']) if owner is None: if force: owner = context.session.user_id else: raise koji.GenericError, "owner not specified" _pkglist_add(tag_id, pkg['id'], owner, block, extra_arches) koji.plugin.run_callbacks('postPackageListChange', action=action, tag=tag, package=pkg, owner=owner, block=block, extra_arches=extra_arches, force=force, update=update) def pkglist_remove(taginfo,pkginfo,force=False): """Remove package from the list for tag Most of the time you really want to use the block or unblock functions The main reason to remove an entry like this is to remove an override so that the package data can be inherited from elsewhere. """ tag = get_tag(taginfo, strict=True) pkg = lookup_package(pkginfo, strict=True) context.session.assertLogin() policy_data = {'tag' : tag['id'], 'action' : 'remove', 'package' : pkg['id'], 'force' : force} #don't check policy for admins using force if not (force and context.session.hasPerm('admin')): assert_policy('package_list', policy_data) koji.plugin.run_callbacks('prePackageListChange', action='remove', tag=tag, package=pkg) _pkglist_remove(tag['id'],pkg['id']) koji.plugin.run_callbacks('postPackageListChange', action='remove', tag=tag, package=pkg) def pkglist_block(taginfo,pkginfo): """Block the package in tag""" pkglist_add(taginfo,pkginfo,block=True) def pkglist_unblock(taginfo, pkginfo, force=False): """Unblock the package in tag Generally this just adds a unblocked duplicate of the blocked entry. However, if the block is actually in tag directly (not through inheritance), the blocking entry is simply removed""" tag = get_tag(taginfo, strict=True) pkg = lookup_package(pkginfo, strict=True) context.session.assertLogin() policy_data = {'tag' : tag['id'], 'action' : 'unblock', 'package' : pkg['id'], 'force' : force} #don't check policy for admins using force if not (force and context.session.hasPerm('admin')): assert_policy('package_list', policy_data) koji.plugin.run_callbacks('prePackageListChange', action='unblock', tag=tag, package=pkg) tag_id = tag['id'] pkg_id = pkg['id'] pkglist = readPackageList(tag_id, pkgID=pkg_id, inherit=True) previous = pkglist.get(pkg_id,None) if previous is None: raise koji.GenericError, "no data (blocked or otherwise) for package %s in tag %s" \ % (pkg['name'],tag['name']) if not previous['blocked']: raise koji.GenericError, "package %s NOT blocked in tag %s" % (pkg['name'],tag['name']) if previous['tag_id'] != tag_id: _pkglist_add(tag_id,pkg_id,previous['owner_id'],False,previous['extra_arches']) else: #just remove the blocking entry _pkglist_remove(tag_id, pkg_id) #it's possible this was the only entry in the inheritance or that the next entry #back is also a blocked entry. if so, we need to add it back as unblocked pkglist = readPackageList(tag_id, pkgID=pkg_id, inherit=True) if not pkglist.has_key(pkg_id) or pkglist[pkg_id]['blocked']: _pkglist_add(tag_id, pkg_id, previous['owner_id'], False, previous['extra_arches']) koji.plugin.run_callbacks('postPackageListChange', action='unblock', tag=tag, package=pkg) def pkglist_setowner(taginfo,pkginfo,owner,force=False): """Set the owner for package in tag""" pkglist_add(taginfo,pkginfo,owner=owner,force=force,update=True) def pkglist_setarches(taginfo,pkginfo,arches,force=False): """Set extra_arches for package in tag""" pkglist_add(taginfo,pkginfo,extra_arches=arches,force=force,update=True) def readPackageList(tagID=None, userID=None, pkgID=None, event=None, inherit=False, with_dups=False): """Returns the package list for the specified tag or user. One of (tagID,userID,pkgID) must be specified Note that the returned data includes blocked entries """ if tagID is None and userID is None and pkgID is None: raise koji.GenericError, 'tag,user, and/or pkg must be specified' packages = {} fields = (('package.id', 'package_id'), ('package.name', 'package_name'), ('tag.id', 'tag_id'), ('tag.name', 'tag_name'), ('users.id', 'owner_id'), ('users.name', 'owner_name'), ('extra_arches','extra_arches'), ('tag_packages.blocked', 'blocked')) flist = ', '.join([pair[0] for pair in fields]) cond = eventCondition(event) q = """ SELECT %(flist)s FROM tag_packages JOIN tag on tag.id = tag_packages.tag_id JOIN package ON package.id = tag_packages.package_id JOIN users ON users.id = tag_packages.owner WHERE %(cond)s""" if tagID != None: q += """ AND tag.id = %%(tagID)i""" if userID != None: q += """ AND users.id = %%(userID)i""" if pkgID != None: if isinstance(pkgID, int) or isinstance(pkgID, long): q += """ AND package.id = %%(pkgID)i""" else: q += """ AND package.name = %%(pkgID)s""" q = q % locals() for p in _multiRow(q, locals(), [pair[1] for pair in fields]): # things are simpler for the first tag pkgid = p['package_id'] if with_dups: packages.setdefault(pkgid,[]).append(p) else: packages[pkgid] = p if tagID is None or (not inherit): return packages order = readFullInheritance(tagID, event) re_cache = {} for link in order: tagID = link['parent_id'] filter = link['filter'] # precompile filter patterns re_list = [] for pat in filter: prog = re_cache.get(pat,None) if prog is None: prog = re.compile(pat) re_cache[pat] = prog re_list.append(prog) # same query as before, with different params for p in _multiRow(q, locals(), [pair[1] for pair in fields]): pkgid = p['package_id'] if not with_dups and packages.has_key(pkgid): #previous data supercedes continue # apply package filters skip = False for prog in re_list: # the list of filters is cumulative, i.e. # the package name must match all of them if prog.match(p['package_name']) is None: skip = True break if skip: continue if with_dups: packages.setdefault(pkgid,[]).append(p) else: packages[pkgid] = p return packages def list_tags(build=None, package=None, queryOpts=None): """List tags. If build is specified, only return tags associated with the given build. If package is specified, only return tags associated with the specified package. If neither is specified, return all tags. Build can be either an integer ID or a string N-V-R. Package can be either an integer ID or a string name. Only one of build and package may be specified. Returns a list of maps. Each map contains keys: - id - name - perm_id - perm - arches - locked If package is specified, each map will also contain: - owner_id - owner_name - blocked - extra_arches """ if build is not None and package is not None: raise koji.GenericError, 'only one of build and package may be specified' tables = ['tag_config'] joins = ['tag ON tag.id = tag_config.tag_id', 'LEFT OUTER JOIN permissions ON tag_config.perm_id = permissions.id'] fields = ['tag.id', 'tag.name', 'tag_config.perm_id', 'permissions.name', 'tag_config.arches', 'tag_config.locked', 'tag_config.maven_support', 'tag_config.maven_include_all'] aliases = ['id', 'name', 'perm_id', 'perm', 'arches', 'locked', 'maven_support', 'maven_include_all'] clauses = ['tag_config.active = true'] if build is not None: # lookup build id buildinfo = get_build(build) if not buildinfo: raise koji.GenericError, 'invalid build: %s' % build joins.append('tag_listing ON tag.id = tag_listing.tag_id') clauses.append('tag_listing.active = true') clauses.append('tag_listing.build_id = %(buildID)i') buildID = buildinfo['id'] elif package is not None: packageinfo = lookup_package(package) if not packageinfo: raise koji.GenericError, 'invalid package: %s' % package fields.extend(['users.id', 'users.name', 'tag_packages.blocked', 'tag_packages.extra_arches']) aliases.extend(['owner_id', 'owner_name', 'blocked', 'extra_arches']) joins.append('tag_packages ON tag.id = tag_packages.tag_id') clauses.append('tag_packages.active = true') clauses.append('tag_packages.package_id = %(packageID)i') joins.append('users ON tag_packages.owner = users.id') packageID = packageinfo['id'] query = QueryProcessor(columns=fields, aliases=aliases, tables=tables, joins=joins, clauses=clauses, values=locals(), opts=queryOpts) return query.iterate() def readTaggedBuilds(tag,event=None,inherit=False,latest=False,package=None,owner=None,type=None): """Returns a list of builds for specified tag set inherit=True to follow inheritance set event to query at a time in the past set latest=True to get only the latest build per package If type is not None, restrict the list to builds of the given type. Currently the supported types are 'maven', 'win', and 'image'. """ # build - id pkg_id version release epoch # tag_listing - id build_id tag_id taglist = [tag] if inherit: taglist += [link['parent_id'] for link in readFullInheritance(tag, event)] #regardless of inherit setting, we need to use inheritance to read the #package list packages = readPackageList(tagID=tag, event=event, inherit=True, pkgID=package) #these values are used for each iteration fields = [('tag.id', 'tag_id'), ('tag.name', 'tag_name'), ('build.id', 'id'), ('build.id', 'build_id'), ('build.version', 'version'), ('build.release', 'release'), ('build.epoch', 'epoch'), ('build.state', 'state'), ('build.completion_time', 'completion_time'), ('build.task_id','task_id'), ('events.id', 'creation_event_id'), ('events.time', 'creation_time'), ('volume.id', 'volume_id'), ('volume.name', 'volume_name'), ('package.id', 'package_id'), ('package.name', 'package_name'), ('package.name', 'name'), ("package.name || '-' || build.version || '-' || build.release", 'nvr'), ('users.id', 'owner_id'), ('users.name', 'owner_name')] st_complete = koji.BUILD_STATES['COMPLETE'] type_join = '' if type is None: pass elif type == 'maven': type_join = 'JOIN maven_builds ON maven_builds.build_id = tag_listing.build_id' fields.extend([('maven_builds.group_id', 'maven_group_id'), ('maven_builds.artifact_id', 'maven_artifact_id'), ('maven_builds.version', 'maven_version')]) elif type == 'win': type_join = 'JOIN win_builds ON win_builds.build_id = tag_listing.build_id' fields.append(('win_builds.platform', 'platform')) elif type == 'image': type_join = 'JOIN image_builds ON image_builds.build_id = tag_listing.build_id' fields.append(('image_builds.build_id', 'build_id')) else: raise koji.GenericError, 'unsupported build type: %s' % type q="""SELECT %s FROM tag_listing JOIN tag ON tag.id = tag_listing.tag_id JOIN build ON build.id = tag_listing.build_id %s JOIN users ON users.id = build.owner JOIN events ON events.id = build.create_event JOIN package ON package.id = build.pkg_id JOIN volume ON volume.id = build.volume_id WHERE %s AND tag_id=%%(tagid)s AND build.state=%%(st_complete)i """ % (', '.join([pair[0] for pair in fields]), type_join, eventCondition(event, 'tag_listing')) if package: q += """AND package.name = %(package)s """ if owner: q += """AND users.name = %(owner)s """ q += """ORDER BY tag_listing.create_event DESC """ # i.e. latest first builds = [] seen = {} # used to enforce the 'latest' option for tagid in taglist: #log_error(koji.db._quoteparams(q,locals())) for build in _multiRow(q, locals(), [pair[1] for pair in fields]): pkgid = build['package_id'] pinfo = packages.get(pkgid,None) if pinfo is None or pinfo['blocked']: # note: # tools should endeavor to keep tag_listing sane w.r.t. # the package list, but if there is disagreement the package # list should take priority continue if latest: if seen.has_key(pkgid): #only take the first (note ordering in query above) continue seen[pkgid] = 1 builds.append(build) return builds def readTaggedRPMS(tag, package=None, arch=None, event=None,inherit=False,latest=True,rpmsigs=False,owner=None,type=None): """Returns a list of rpms for specified tag set inherit=True to follow inheritance set event to query at a time in the past set latest=False to get all tagged RPMS (not just from the latest builds) If type is not None, restrict the list to rpms from builds of the given type. Currently the supported types are 'maven' and 'win'. """ taglist = [tag] if inherit: #XXX really should cache this - it gets called several places # (however, it is fairly quick) taglist += [link['parent_id'] for link in readFullInheritance(tag, event)] builds = readTaggedBuilds(tag, event=event, inherit=inherit, latest=latest, package=package, owner=owner, type=type) #index builds build_idx = dict([(b['build_id'],b) for b in builds]) #the following query is run for each tag in the inheritance fields = [('rpminfo.name', 'name'), ('rpminfo.version', 'version'), ('rpminfo.release', 'release'), ('rpminfo.arch', 'arch'), ('rpminfo.id', 'id'), ('rpminfo.epoch', 'epoch'), ('rpminfo.payloadhash', 'payloadhash'), ('rpminfo.size', 'size'), ('rpminfo.buildtime', 'buildtime'), ('rpminfo.buildroot_id', 'buildroot_id'), ('rpminfo.build_id', 'build_id')] tables = ['rpminfo'] joins = ['tag_listing ON rpminfo.build_id = tag_listing.build_id'] clauses = [eventCondition(event), 'tag_id=%(tagid)s'] data = {} #tagid added later if package: joins.append('build ON rpminfo.build_id = build.id') joins.append('package ON package.id = build.pkg_id') clauses.append('package.name = %(package)s') data['package'] = package if rpmsigs: fields.append(('rpmsigs.sigkey', 'sigkey')) joins.append('LEFT OUTER JOIN rpmsigs on rpminfo.id = rpmsigs.rpm_id') if arch: data['arch'] = arch if isinstance(arch, basestring): clauses.append('rpminfo.arch = %(arch)s') elif isinstance(arch, (list, tuple)): clauses.append('rpminfo.arch IN %(arch)s') else: raise koji.GenericError, 'invalid arch option: %s' % arch fields, aliases = zip(*fields) query = QueryProcessor(tables=tables, joins=joins, clauses=clauses, columns=fields, aliases=aliases, values=data) # unique constraints ensure that each of these queries will not report # duplicate rpminfo entries, BUT since we make the query multiple times, # we can get duplicates if a package is multiply tagged. rpms = [] tags_seen = {} def _iter_rpms(): for tagid in taglist: if tags_seen.has_key(tagid): #certain inheritance trees can (legitimately) have the same tag #appear more than once (perhaps once with a package filter and once #without). The hard part of that was already done by readTaggedBuilds. #We only need consider each tag once. Note how we use build_idx below. #(Without this, we could report the same rpm twice) continue else: tags_seen[tagid] = 1 query.values['tagid'] = tagid for rpminfo in query.iterate(): #note: we're checking against the build list because # it has been filtered by the package list. The tag # tools should endeavor to keep tag_listing sane w.r.t. # the package list, but if there is disagreement the package # list should take priority build = build_idx.get(rpminfo['build_id'],None) if build is None: continue elif build['tag_id'] != tagid: #wrong tag continue yield rpminfo return [_iter_rpms(), builds] def readTaggedArchives(tag, package=None, event=None, inherit=False, latest=True, type=None): """Returns a list of archives for specified tag set inherit=True to follow inheritance set event to query at a time in the past set latest=False to get all tagged archives (not just from the latest builds) If type is not None, restrict the listing to archives of the given type. Currently the supported types are 'maven' and 'win'. """ taglist = [tag] if inherit: #XXX really should cache this - it gets called several places # (however, it is fairly quick) taglist += [link['parent_id'] for link in readFullInheritance(tag, event)] # If type == 'maven', we require that both the build *and* the archive have Maven metadata builds = readTaggedBuilds(tag, event=event, inherit=inherit, latest=latest, package=package, type=type) #index builds build_idx = dict([(b['build_id'],b) for b in builds]) #the following query is run for each tag in the inheritance fields = [('archiveinfo.id', 'id'), ('archiveinfo.type_id', 'type_id'), ('archiveinfo.build_id', 'build_id'), ('archiveinfo.buildroot_id', 'buildroot_id'), ('archiveinfo.filename', 'filename'), ('archiveinfo.size', 'size'), ('archiveinfo.checksum', 'checksum'), ('archiveinfo.checksum_type', 'checksum_type'), ] tables = ['archiveinfo'] joins = ['tag_listing ON archiveinfo.build_id = tag_listing.build_id'] clauses = [eventCondition(event), 'tag_listing.tag_id = %(tagid)i'] if package: joins.append('build ON archiveinfo.build_id = build.id') joins.append('package ON build.pkg_id = package.id') clauses.append('package.name = %(package)s') if type is None: pass elif type == 'maven': joins.append('maven_archives ON archiveinfo.id = maven_archives.archive_id') fields.extend([('maven_archives.group_id', 'maven_group_id'), ('maven_archives.artifact_id', 'maven_artifact_id'), ('maven_archives.version', 'maven_version')]) elif type == 'win': joins.append('win_archives ON archiveinfo.id = win_archives.archive_id') fields.extend([('win_archives.relpath', 'relpath'), ('win_archives.platforms', 'platforms'), ('win_archives.flags', 'flags')]) else: raise koji.GenericError, 'unsupported archive type: %s' % type query = QueryProcessor(tables=tables, joins=joins, clauses=clauses, columns=[pair[0] for pair in fields], aliases=[pair[1] for pair in fields]) # unique constraints ensure that each of these queries will not report # duplicate archiveinfo entries, BUT since we make the query multiple times, # we can get duplicates if a package is multiply tagged. archives = [] tags_seen = {} for tagid in taglist: if tags_seen.has_key(tagid): #certain inheritance trees can (legitimately) have the same tag #appear more than once (perhaps once with a package filter and once #without). The hard part of that was already done by readTaggedBuilds. #We only need consider each tag once. Note how we use build_idx below. #(Without this, we could report the same rpm twice) continue else: tags_seen[tagid] = 1 query.values = {'tagid': tagid, 'package': package} for archiveinfo in query.execute(): #note: we're checking against the build list because # it has been filtered by the package list. The tag # tools should endeavor to keep tag_listing sane w.r.t. # the package list, but if there is disagreement the package # list should take priority build = build_idx.get(archiveinfo['build_id'],None) if build is None: continue elif build['tag_id'] != tagid: #wrong tag continue archives.append(archiveinfo) return [archives, builds] def check_tag_access(tag_id,user_id=None): """Determine if user has access to tag package with tag. Returns a tuple (access, override, reason) access: a boolean indicating whether access is allowed override: a boolean indicating whether access may be forced reason: the reason access is blocked """ if user_id is None: user_id = context.session.user_id if user_id is None: raise koji.GenericError, "a user_id is required" perms = koji.auth.get_user_perms(user_id) override = False if 'admin' in perms: override = True tag = get_tag(tag_id) if tag['locked']: return (False, override, "tag is locked") if tag['perm_id']: needed_perm = lookup_perm(tag['perm_id'],strict=True)['name'] if needed_perm not in perms: return (False, override, "tag requires %s permission" % needed_perm) return (True,override,"") def assert_tag_access(tag_id,user_id=None,force=False): access, override, reason = check_tag_access(tag_id,user_id) if not access and not (override and force): raise koji.ActionNotAllowed, reason def _tag_build(tag,build,user_id=None,force=False): """Tag a build This function makes access checks based on user_id, which defaults to the user_id of the session. Tagging with a locked tag is not allowed unless force is true (and even then admin permission is required). Retagging is not allowed unless force is true. (retagging changes the order of entries will affect which build is the latest) """ tag = get_tag(tag, strict=True) build = get_build(build, strict=True) if user_id: user = get_user(user_id, strict=True) else: # use the user associated with the current session user = get_user(context.session.user_id, strict=True) koji.plugin.run_callbacks('preTag', tag=tag, build=build, user=user, force=force) tag_id = tag['id'] build_id = build['id'] nvr = "%(name)s-%(version)s-%(release)s" % build if build['state'] != koji.BUILD_STATES['COMPLETE']: # incomplete builds may not be tagged, not even when forced state = koji.BUILD_STATES[build['state']] raise koji.TagError, "build %s not complete: state %s" % (nvr,state) #access check assert_tag_access(tag['id'],user_id=user_id,force=force) # see if it's already tagged retag = False table = 'tag_listing' clauses = ('tag_id=%(tag_id)i', 'build_id=%(build_id)i') query = QueryProcessor(columns=['build_id'], tables=[table], clauses=('active = TRUE',)+clauses, values=locals(), opts={'rowlock':True}) #note: tag_listing is unique on (build_id, tag_id, active) if query.executeOne(): #already tagged if not force: raise koji.TagError, "build %s already tagged (%s)" % (nvr,tag['name']) #otherwise we retag retag = True if retag: #revoke the old tag first update = UpdateProcessor(table, values=locals(), clauses=clauses) update.make_revoke(user_id=user_id) update.execute() #tag the package insert = InsertProcessor(table) insert.set(tag_id=tag_id, build_id=build_id) insert.make_create(user_id=user_id) insert.execute() koji.plugin.run_callbacks('postTag', tag=tag, build=build, user=user, force=force) def _untag_build(tag,build,user_id=None,strict=True,force=False): """Untag a build If strict is true, assert that build is actually tagged The force option overrides a lock (if the user is an admin) This function makes access checks based on user_id, which defaults to the user_id of the session. """ tag = get_tag(tag, strict=True) build = get_build(build, strict=True) if user_id: user = get_user(user_id, strict=True) else: # use the user associated with the current session user = get_user(context.session.user_id, strict=True) koji.plugin.run_callbacks('preUntag', tag=tag, build=build, user=user, force=force, strict=strict) tag_id = tag['id'] build_id = build['id'] assert_tag_access(tag_id,user_id=user_id,force=force) update = UpdateProcessor('tag_listing', values=locals(), clauses=['tag_id=%(tag_id)i', 'build_id=%(build_id)i']) update.make_revoke(user_id=user_id) count = update.execute() if count == 0 and strict: nvr = "%(name)s-%(version)s-%(release)s" % build raise koji.TagError, "build %s not in tag %s" % (nvr,tag['name']) koji.plugin.run_callbacks('postUntag', tag=tag, build=build, user=user, force=force, strict=strict) # tag-group operations # add # remove # block # unblock # list (readTagGroups) def grplist_add(taginfo,grpinfo,block=False,force=False,**opts): """Add to (or update) group list for tag""" #only admins.... context.session.assertPerm('admin') tag = get_tag(taginfo) group = lookup_group(grpinfo,create=True) block = bool(block) # check current group status (incl inheritance) groups = get_tag_groups(tag['id'], inherit=True, incl_pkgs=False,incl_reqs=False) previous = groups.get(group['id'],None) cfg_fields = ('exported','display_name','is_default','uservisible', 'description','langonly','biarchonly',) #prevent user-provided opts from doing anything strange opts = dslice(opts, cfg_fields, strict=False) if previous is not None: #already there (possibly via inheritance) if previous['blocked'] and not force: raise koji.GenericError, "group %s is blocked in tag %s" % (group['name'],tag['name']) #check for duplication and grab old data for defaults changed = False for field in cfg_fields: old = previous[field] if opts.has_key(field): if opts[field] != old: changed = True else: opts[field] = old if not changed: #no point in adding it again with the same data return #provide available defaults and sanity check data opts.setdefault('display_name',group['name']) opts.setdefault('biarchonly',False) opts.setdefault('exported',True) opts.setdefault('uservisible',True) # XXX ^^^ opts['tag_id'] = tag['id'] opts['group_id'] = group['id'] opts['blocked'] = block #revoke old entry (if present) update = UpdateProcessor('group_config', values=opts, clauses=['group_id=%(group_id)s', 'tag_id=%(tag_id)s']) update.make_revoke() update.execute() #add new entry insert = InsertProcessor('group_config', data=opts) insert.make_create() insert.execute() def grplist_remove(taginfo,grpinfo,force=False): """Remove group from the list for tag Really this shouldn't be used except in special cases Most of the time you really want to use the block or unblock functions """ #only admins.... context.session.assertPerm('admin') tag = get_tag(taginfo) group = lookup_group(grpinfo, strict=True) tag_id = tag['id'] grp_id = group['id'] clauses = ['group_id=%(grp_id)s', 'tag_id=%(tag_id)s'] update = UpdateProcessor('group_config', values=locals(), clauses=clauses) update.make_revoke() update.execute() def grplist_block(taginfo,grpinfo): """Block the group in tag""" grplist_add(taginfo,grpinfo,block=True) def grplist_unblock(taginfo,grpinfo): """Unblock the group in tag If the group is blocked in this tag, then simply remove the block. Otherwise, raise an error """ # only admins... context.session.assertPerm('admin') tag = lookup_tag(taginfo,strict=True) group = lookup_group(grpinfo,strict=True) tag_id = tag['id'] grp_id = group['id'] table = 'group_config' clauses = ('group_id=%(grp_id)s', 'tag_id=%(tag_id)s') query = QueryProcessor(columns=['blocked'], tables=[table], clauses=('active = TRUE',)+clauses, values=locals(), opts={'rowlock':True}) blocked = query.singleValue(strict=False) if not blocked: raise koji.GenericError, "group %s is NOT blocked in tag %s" % (group['name'],tag['name']) update = UpdateProcessor(table, values=locals(), clauses=clauses) update.make_revoke() update.execute() # tag-group-pkg operations # add # remove # block # unblock # list (readTagGroups) def grp_pkg_add(taginfo,grpinfo,pkg_name,block=False,force=False,**opts): """Add package to group for tag""" #only admins.... context.session.assertPerm('admin') tag = lookup_tag(taginfo, strict=True) group = lookup_group(grpinfo,strict=True) block = bool(block) # check current group status (incl inheritance) groups = get_tag_groups(tag['id'], inherit=True, incl_pkgs=True, incl_reqs=False) grp_cfg = groups.get(group['id'],None) if grp_cfg is None: raise koji.GenericError, "group %s not present in tag %s" % (group['name'],tag['name']) elif grp_cfg['blocked']: raise koji.GenericError, "group %s is blocked in tag %s" % (group['name'],tag['name']) previous = grp_cfg['packagelist'].get(pkg_name,None) cfg_fields = ('type','basearchonly','requires') #prevent user-provided opts from doing anything strange opts = dslice(opts, cfg_fields, strict=False) if previous is not None: #already there (possibly via inheritance) if previous['blocked'] and not force: raise koji.GenericError, "package %s blocked in group %s, tag %s" \ % (pkg_name,group['name'],tag['name']) #check for duplication and grab old data for defaults changed = False for field in cfg_fields: old = previous[field] if opts.has_key(field): if opts[field] != old: changed = True else: opts[field] = old if block: #from condition above, either previous is not blocked or force is on, #either way, we should add the entry changed = True if not changed and not force: #no point in adding it again with the same data (unless force is on) return opts.setdefault('type','default') opts['group_id'] = group['id'] opts['tag_id'] = tag['id'] opts['package'] = pkg_name opts['blocked'] = block #revoke old entry (if present) update = UpdateProcessor('group_package_listing', values=opts, clauses=['group_id=%(group_id)s', 'tag_id=%(tag_id)s', 'package=%(package)s']) update.make_revoke() update.execute() #add new entry insert = InsertProcessor('group_package_listing', data=opts) insert.make_create() insert.execute() def grp_pkg_remove(taginfo,grpinfo,pkg_name,force=False): """Remove package from the list for group-tag Really this shouldn't be used except in special cases Most of the time you really want to use the block or unblock functions """ #only admins.... context.session.assertPerm('admin') tag_id = get_tag_id(taginfo,strict=True) grp_id = get_group_id(grpinfo,strict=True) update = UpdateProcessor('group_package_listing', values=locals(), clauses=['package=%(pkg_name)s', 'tag_id=%(tag_id)s', 'group_id = %(grp_id)s']) update.make_revoke() update.execute() def grp_pkg_block(taginfo,grpinfo, pkg_name): """Block the package in group-tag""" grp_pkg_add(taginfo,grpinfo,pkg_name,block=True) def grp_pkg_unblock(taginfo,grpinfo,pkg_name): """Unblock the package in group-tag If blocked (directly) in this tag, then simply remove the block. Otherwise, raise an error """ # only admins... context.session.assertPerm('admin') table = 'group_package_listing' tag_id = get_tag_id(taginfo,strict=True) grp_id = get_group_id(grpinfo,strict=True) clauses = ('group_id=%(grp_id)s', 'tag_id=%(tag_id)s', 'package = %(pkg_name)s') query = QueryProcessor(columns=['blocked'], tables=[table], clauses=('active = TRUE',)+clauses, values=locals(), opts={'rowlock':True}) blocked = query.singleValue(strict=False) if not blocked: raise koji.GenericError, "package %s is NOT blocked in group %s, tag %s" \ % (pkg_name,grp_id,tag_id) update = UpdateProcessor('group_package_listing', values=locals(), clauses=clauses) update.make_revoke() update.execute() # tag-group-req operations # add # remove # block # unblock # list (readTagGroups) def grp_req_add(taginfo,grpinfo,reqinfo,block=False,force=False,**opts): """Add group requirement to group for tag""" #only admins.... context.session.assertPerm('admin') tag = lookup_tag(taginfo, strict=True) group = lookup_group(grpinfo, strict=True, create=False) req = lookup_group(reqinfo, strict=True, create=False) block = bool(block) # check current group status (incl inheritance) groups = get_tag_groups(tag['id'], inherit=True, incl_pkgs=False, incl_reqs=True) grp_cfg = groups.get(group['id'],None) if grp_cfg is None: raise koji.GenericError, "group %s not present in tag %s" % (group['name'],tag['name']) elif grp_cfg['blocked']: raise koji.GenericError, "group %s is blocked in tag %s" % (group['name'],tag['name']) previous = grp_cfg['grouplist'].get(req['id'],None) cfg_fields = ('type','is_metapkg') #prevent user-provided opts from doing anything strange opts = dslice(opts, cfg_fields, strict=False) if previous is not None: #already there (possibly via inheritance) if previous['blocked'] and not force: raise koji.GenericError, "requirement on group %s blocked in group %s, tag %s" \ % (req['name'],group['name'],tag['name']) #check for duplication and grab old data for defaults changed = False for field in cfg_fields: old = previous[field] if opts.has_key(field): if opts[field] != old: changed = True else: opts[field] = old if block: #from condition above, either previous is not blocked or force is on, #either way, we should add the entry changed = True if not changed: #no point in adding it again with the same data return opts.setdefault('type','mandatory') opts['group_id'] = group['id'] opts['tag_id'] = tag['id'] opts['req_id'] = req['id'] opts['blocked'] = block #revoke old entry (if present) update = UpdateProcessor('group_req_listing', values=opts, clauses=['group_id=%(group_id)s', 'tag_id=%(tag_id)s', 'req_id=%(req_id)s']) update.make_revoke() update.execute() #add new entry insert = InsertProcessor('group_req_listing', data=opts) insert.make_create() insert.execute() def grp_req_remove(taginfo,grpinfo,reqinfo,force=False): """Remove group requirement from the list for group-tag Really this shouldn't be used except in special cases Most of the time you really want to use the block or unblock functions """ #only admins.... context.session.assertPerm('admin') tag_id = get_tag_id(taginfo,strict=True) grp_id = get_group_id(grpinfo,strict=True) req_id = get_group_id(reqinfo,strict=True) update = UpdateProcessor('group_req_listing', values=locals(), clauses=['req_id=%(req_id)s', 'tag_id=%(tag_id)s', 'group_id = %(grp_id)s']) update.make_revoke() update.execute() def grp_req_block(taginfo,grpinfo,reqinfo): """Block the group requirement in group-tag""" grp_req_add(taginfo,grpinfo,reqinfo,block=True) def grp_req_unblock(taginfo,grpinfo,reqinfo): """Unblock the group requirement in group-tag If blocked (directly) in this tag, then simply remove the block. Otherwise, raise an error """ # only admins... context.session.assertPerm('admin') tag_id = get_tag_id(taginfo,strict=True) grp_id = get_group_id(grpinfo,strict=True) req_id = get_group_id(reqinfo,strict=True) table = 'group_req_listing' clauses = ('group_id=%(grp_id)s', 'tag_id=%(tag_id)s', 'req_id = %(req_id)s') query = QueryProcessor(columns=['blocked'], tables=[table], clauses=('active = TRUE',)+clauses, values=locals(), opts={'rowlock':True}) blocked = query.singleValue(strict=False) if not blocked: raise koji.GenericError, "group req %s is NOT blocked in group %s, tag %s" \ % (req_id,grp_id,tag_id) update = UpdateProcessor('group_req_listing', values=locals(), clauses=clauses) update.make_revoke() update.execute() def get_tag_groups(tag,event=None,inherit=True,incl_pkgs=True,incl_reqs=True): """Return group data for the tag If inherit is true, follow inheritance If event is specified, query at event If incl_pkgs is true (the default), include packagelist data If incl_reqs is true (the default), include groupreq data Note: the data returned includes some blocked entries that may need to be filtered out. """ order = None tag = get_tag_id(tag,strict=True) taglist = [tag] if inherit: order = readFullInheritance(tag,event) taglist += [link['parent_id'] for link in order] evcondition = eventCondition(event) # First get the list of groups fields = ('name','group_id','tag_id','blocked','exported','display_name', 'is_default','uservisible','description','langonly','biarchonly',) q=""" SELECT %s FROM group_config JOIN groups ON group_id = id WHERE %s AND tag_id = %%(tagid)s """ % (",".join(fields),evcondition) groups = {} for tagid in taglist: for group in _multiRow(q,locals(),fields): grp_id = group['group_id'] # we only take the first entry for group as we go through inheritance groups.setdefault(grp_id,group) if incl_pkgs: for group in groups.itervalues(): group['packagelist'] = {} fields = ('group_id','tag_id','package','blocked','type','basearchonly','requires') q = """ SELECT %s FROM group_package_listing WHERE %s AND tag_id = %%(tagid)s """ % (",".join(fields),evcondition) for tagid in taglist: for grp_pkg in _multiRow(q,locals(),fields): grp_id = grp_pkg['group_id'] if not groups.has_key(grp_id): #tag does not have this group continue group = groups[grp_id] if group['blocked']: #ignore blocked groups continue pkg_name = grp_pkg['package'] group['packagelist'].setdefault(pkg_name,grp_pkg) if incl_reqs: # and now the group reqs for group in groups.itervalues(): group['grouplist'] = {} fields = ('group_id','tag_id','req_id','blocked','type','is_metapkg','name') q = """SELECT %s FROM group_req_listing JOIN groups on req_id = id WHERE %s AND tag_id = %%(tagid)s """ % (",".join(fields),evcondition) for tagid in taglist: for grp_req in _multiRow(q,locals(),fields): grp_id = grp_req['group_id'] if not groups.has_key(grp_id): #tag does not have this group continue group = groups[grp_id] if group['blocked']: #ignore blocked groups continue req_id = grp_req['req_id'] if not groups.has_key(req_id): #tag does not have this group continue elif groups[req_id]['blocked']: #ignore blocked groups continue group['grouplist'].setdefault(req_id,grp_req) return groups def readTagGroups(tag,event=None,inherit=True,incl_pkgs=True,incl_reqs=True): """Return group data for the tag with blocked entries removed Also scrubs data into an xmlrpc-safe format (no integer keys) """ groups = get_tag_groups(tag,event,inherit,incl_pkgs,incl_reqs) for group in groups.values(): #filter blocked entries and collapse to a list if 'packagelist' in group: group['packagelist'] = filter(lambda x: not x['blocked'], group['packagelist'].values()) if 'grouplist' in group: group['grouplist'] = filter(lambda x: not x['blocked'], group['grouplist'].values()) #filter blocked entries and collapse to a list return filter(lambda x: not x['blocked'],groups.values()) def set_host_enabled(hostname, enabled=True): context.session.assertPerm('admin') if not get_host(hostname): raise koji.GenericError, 'host does not exist: %s' % hostname c = context.cnx.cursor() c.execute("""UPDATE host SET enabled = %(enabled)s WHERE name = %(hostname)s""", locals()) context.commit_pending = True def add_host_to_channel(hostname, channel_name, create=False): """Add the host to the specified channel Channel must already exist unless create option is specified """ context.session.assertPerm('admin') host = get_host(hostname) if host == None: raise koji.GenericError, 'host does not exist: %s' % hostname host_id = host['id'] channel_id = get_channel_id(channel_name, create=create) if channel_id == None: raise koji.GenericError, 'channel does not exist: %s' % channel_name channels = list_channels(host_id) for channel in channels: if channel['id'] == channel_id: raise koji.GenericError, 'host %s is already subscribed to the %s channel' % (hostname, channel_name) insert = InsertProcessor('host_channels') insert.set(host_id=host_id, channel_id=channel_id) insert.execute() def remove_host_from_channel(hostname, channel_name): context.session.assertPerm('admin') host = get_host(hostname) if host == None: raise koji.GenericError, 'host does not exist: %s' % hostname host_id = host['id'] channel_id = get_channel_id(channel_name) if channel_id == None: raise koji.GenericError, 'channel does not exist: %s' % channel_name found = False channels = list_channels(host_id) for channel in channels: if channel['id'] == channel_id: found = True break if not found: raise koji.GenericError, 'host %s is not subscribed to the %s channel' % (hostname, channel_name) c = context.cnx.cursor() c.execute("""DELETE FROM host_channels WHERE host_id = %(host_id)d and channel_id = %(channel_id)d""", locals()) context.commit_pending = True def rename_channel(old, new): """Rename a channel""" context.session.assertPerm('admin') if not isinstance(new, basestring): raise koji.GenericError, "new channel name must be a string" cinfo = get_channel(old, strict=True) dup_check = get_channel(new, strict=False) if dup_check: raise koji.GenericError, "channel %(name)s already exists (id=%(id)i)" % dup_check update = UpdateProcessor('channels', clauses=['id=%(id)i'], values=cinfo) update.set(name=new) update.execute() def remove_channel(channel_name, force=False): """Remove a channel Channel must have no hosts, unless force is set to True If a channel has associated tasks, it cannot be removed """ context.session.assertPerm('admin') channel_id = get_channel_id(channel_name, strict=True) # check for task references query = QueryProcessor(tables=['task'], clauses=['channel_id=%(channel_id)i'], values=locals(), columns=['id'], opts={'limit':1}) #XXX slow query if query.execute(): raise koji.GenericError, 'channel %s has task references' % channel_name query = QueryProcessor(tables=['host_channels'], clauses=['channel_id=%(channel_id)i'], values=locals(), columns=['host_id'], opts={'limit':1}) if query.execute(): if not force: raise koji.GenericError, 'channel %s has host references' % channel_name delete = """DELETE FROM host_channels WHERE channel_id=%(channel_id)i""" _dml(delete, locals()) delete = """DELETE FROM channels WHERE id=%(channel_id)i""" _dml(delete, locals()) def get_ready_hosts(): """Return information about hosts that are ready to build. Hosts set the ready flag themselves Note: We ignore hosts that are late checking in (even if a host is busy with tasks, it should be checking in quite often). """ c = context.cnx.cursor() fields = ('host.id','name','arches','task_load', 'capacity') aliases = ('id','name','arches','task_load', 'capacity') q = """ SELECT %s FROM host JOIN sessions USING (user_id) WHERE enabled = TRUE AND ready = TRUE AND expired = FALSE AND master IS NULL AND update_time > NOW() - '5 minutes'::interval """ % ','.join(fields) # XXX - magic number in query c.execute(q) hosts = [dict(zip(aliases,row)) for row in c.fetchall()] for host in hosts: q = """SELECT channel_id FROM host_channels WHERE host_id=%(id)s""" c.execute(q,host) host['channels'] = [row[0] for row in c.fetchall()] return hosts def get_all_arches(): """Return a list of all (canonical) arches available from hosts""" ret = {} for (arches,) in _fetchMulti('SELECT arches FROM host', {}): for arch in arches.split(): #in a perfect world, this list would only include canonical #arches, but not all admins will undertand that. ret[koji.canonArch(arch)] = 1 return ret.keys() def get_active_tasks(host=None): """Return data on tasks that are yet to be run""" fields = ['id', 'state', 'channel_id', 'host_id', 'arch', 'method', 'priority', 'create_time'] values = dslice(koji.TASK_STATES, ('FREE','ASSIGNED')) if host: values['arches'] = host['arches'].split() + ['noarch'] values['channels'] = host['channels'] values['host_id'] = host['id'] clause = '(state = %(ASSIGNED)i AND host_id = %(host_id)i)' if values['channels']: clause += ''' OR (state = %(FREE)i AND arch IN %(arches)s \ AND channel_id IN %(channels)s)''' clauses = [clause] else: clauses = ['state IN (%(FREE)i,%(ASSIGNED)i)'] queryOpts = {'limit' : 100, 'order' : 'priority,create_time'} query = QueryProcessor(columns=fields, tables=['task'], clauses=clauses, values=values, opts=queryOpts) return query.execute() def get_task_descendents(task, childMap=None, request=False): if childMap == None: childMap = {} children = task.getChildren(request=request) children.sort(lambda a, b: cmp(a['id'], b['id'])) # xmlrpclib requires dict keys to be strings childMap[str(task.id)] = children for child in children: get_task_descendents(Task(child['id']), childMap, request) return childMap def maven_tag_archives(tag_id, event_id=None, inherit=True): """ Get Maven artifacts associated with the given tag, following inheritance. For any parent tags where 'maven_include_all' is true, include all versions of a given groupId:artifactId, not just the most-recently-tagged. """ packages = readPackageList(tagID=tag_id, event=event_id, inherit=True) taglist = [tag_id] if inherit: taglist.extend([link['parent_id'] for link in readFullInheritance(tag_id, event_id)]) fields = [('tag.id', 'tag_id'), ('tag.name', 'tag_name'), ('build.pkg_id', 'pkg_id'), ('build.id', 'build_id'), ('package.name', 'build_name'), ('build.version', 'build_version'), ('build.release', 'build_release'), ('build.epoch', 'build_epoch'), ('build.state', 'state'), ('build.task_id', 'task_id'), ('build.owner', 'owner'), ('volume.id', 'volume_id'), ('volume.name', 'volume_name'), ('archiveinfo.id', 'id'), ('archiveinfo.type_id', 'type_id'), ('archiveinfo.buildroot_id', 'buildroot_id'), ('archiveinfo.filename', 'filename'), ('archiveinfo.size', 'size'), ('archiveinfo.checksum', 'checksum'), ('archiveinfo.checksum_type', 'checksum_type'), ('maven_archives.group_id', 'group_id'), ('maven_archives.artifact_id', 'artifact_id'), ('maven_archives.version', 'version'), ('tag_listing.create_event', 'tag_event')] tables = ['tag_listing'] joins = ['tag ON tag_listing.tag_id = tag.id', 'build ON tag_listing.build_id = build.id', 'volume ON build.volume_id = volume.id', 'package ON build.pkg_id = package.id', 'archiveinfo ON build.id = archiveinfo.build_id', 'maven_archives ON archiveinfo.id = maven_archives.archive_id'] clauses = [eventCondition(event_id, 'tag_listing'), 'tag_listing.tag_id = %(tag_id)i'] order = '-tag_event' query = QueryProcessor(tables=tables, joins=joins, clauses=clauses, opts={'order': order}, columns=[f[0] for f in fields], aliases=[f[1] for f in fields]) included = {} included_archives = set() # these indexes eat into the memory savings of the generator, but it's only # group_id/artifact_id/version/build_id/archive_id, which is much smaller than # the full query # ballpark estimate: 20-25% of total, less with heavy duplication of indexed values def _iter_archives(): for tag_id in taglist: taginfo = get_tag(tag_id, strict=True, event=event_id) query.values['tag_id'] = tag_id archives = query.iterate() for archive in archives: pkg = packages.get(archive['pkg_id']) if not pkg or pkg['blocked']: continue # 4 possibilities: # 1: we have never seen this group_id:artifact_id before # - yield it, and add to the included dict # 2: we have seen the group_id:artifact_id before, but a different version # - if the taginfo['maven_include_all'] is true, yield it and # append it to the included_versions dict, otherwise skip it # 3: we have seen the group_id:artifact_id before, with the same version, from # a different build # - this is a different revision of the same GAV, ignore it because a more # recently-tagged build has already been included # 4: we have seen the group_id:artifact_id before, with the same version, from # the same build # - it is another artifact from a build we're already including, so include it # as well ga = '%(group_id)s:%(artifact_id)s' % archive included_versions = included.get(ga) if not included_versions: included[ga] = {archive['version']: archive['build_id']} included_archives.add(archive['id']) yield archive continue included_build = included_versions.get(archive['version']) if not included_build: if taginfo['maven_include_all']: included_versions[archive['version']] = archive['build_id'] included_archives.add(archive['id']) yield archive continue if included_build != archive['build_id']: continue # make sure we haven't already seen this archive somewhere else in the # tag hierarchy if archive['id'] not in included_archives: included_archives.add(archive['id']) yield archive return _iter_archives() def repo_init(tag, with_src=False, with_debuginfo=False, event=None): """Create a new repo entry in the INIT state, return full repo data Returns a dictionary containing repo_id, event_id """ logger = logging.getLogger("koji.hub.repo_init") state = koji.REPO_INIT tinfo = get_tag(tag, strict=True, event=event) koji.plugin.run_callbacks('preRepoInit', tag=tinfo, with_src=with_src, with_debuginfo=with_debuginfo, event=event, repo_id=None) tag_id = tinfo['id'] repo_arches = {} if tinfo['arches']: for arch in tinfo['arches'].split(): arch = koji.canonArch(arch) if arch in ['src','noarch']: continue repo_arches[arch] = 1 repo_id = _singleValue("SELECT nextval('repo_id_seq')") if event is None: event_id = _singleValue("SELECT get_event()") else: #make sure event is valid q = "SELECT time FROM events WHERE id=%(event)s" event_time = _singleValue(q, locals(), strict=True) event_id = event insert = InsertProcessor('repo') insert.set(id=repo_id, create_event=event_id, tag_id=tag_id, state=state) insert.execute() # Need to pass event_id because even though this is a single transaction, # it is possible to see the results of other committed transactions rpms, builds = readTaggedRPMS(tag_id, event=event_id, inherit=True, latest=True) groups = readTagGroups(tag_id, event=event_id, inherit=True) blocks = [pkg for pkg in readPackageList(tag_id, event=event_id, inherit=True).values() \ if pkg['blocked']] repodir = koji.pathinfo.repo(repo_id, tinfo['name']) os.makedirs(repodir) #should not already exist #generate comps and groups.spec groupsdir = "%s/groups" % (repodir) koji.ensuredir(groupsdir) comps = koji.generate_comps(groups, expand_groups=True) fo = file("%s/comps.xml" % groupsdir,'w') fo.write(comps) fo.close() #get build dirs relpathinfo = koji.PathInfo(topdir='toplink') builddirs = {} for build in builds: relpath = relpathinfo.build(build) builddirs[build['id']] = relpath.lstrip('/') #generate pkglist files pkglist = {} for repoarch in repo_arches: archdir = os.path.join(repodir, repoarch) koji.ensuredir(archdir) # Make a symlink to our topdir top_relpath = koji.util.relpath(koji.pathinfo.topdir, archdir) top_link = os.path.join(archdir, 'toplink') os.symlink(top_relpath, top_link) pkglist[repoarch] = file(os.path.join(archdir, 'pkglist'), 'w') #NOTE - rpms is now an iterator for rpminfo in rpms: if not with_debuginfo and koji.is_debuginfo(rpminfo['name']): continue relpath = "%s/%s\n" % (builddirs[rpminfo['build_id']], relpathinfo.rpm(rpminfo)) arch = rpminfo['arch'] if arch == 'src': if with_src: for repoarch in repo_arches: pkglist[repoarch].write(relpath) elif arch == 'noarch': for repoarch in repo_arches: pkglist[repoarch].write(relpath) else: repoarch = koji.canonArch(arch) if repoarch not in repo_arches: # Do not create a repo for arches not in the arch list for this tag continue pkglist[repoarch].write(relpath) for repoarch in repo_arches: pkglist[repoarch].close() #write blocked package lists for repoarch in repo_arches: blocklist = file(os.path.join(repodir, repoarch, 'blocklist'), 'w') for pkg in blocks: blocklist.write(pkg['package_name']) blocklist.write('\n') blocklist.close() if context.opts.get('EnableMaven') and tinfo['maven_support']: artifact_dirs = {} dir_links = set() for archive in maven_tag_archives(tinfo['id'], event_id): buildinfo = {'name': archive['build_name'], 'version': archive['build_version'], 'release': archive['build_release'], 'epoch': archive['build_epoch'], 'volume_name': archive['volume_name'], } srcdir = os.path.join(koji.pathinfo.mavenbuild(buildinfo), koji.pathinfo.mavenrepo(archive)) destlink = os.path.join(repodir, 'maven', koji.pathinfo.mavenrepo(archive)) dir_links.add((srcdir, destlink)) dest_parent = os.path.dirname(destlink) artifact_dirs.setdefault(dest_parent, set()).add((archive['group_id'], archive['artifact_id'], archive['version'])) created_dirs = set() for srcdir, destlink in dir_links: dest_parent = os.path.dirname(destlink) if not dest_parent in created_dirs: koji.ensuredir(dest_parent) created_dirs.add(dest_parent) relpath = koji.util.relpath(srcdir, dest_parent) try: os.symlink(relpath, destlink) except: log_error('Error linking %s to %s' % (destlink, relpath)) for artifact_dir, artifacts in artifact_dirs.iteritems(): _write_maven_repo_metadata(artifact_dir, artifacts) koji.plugin.run_callbacks('postRepoInit', tag=tinfo, with_src=with_src, with_debuginfo=with_debuginfo, event=event, repo_id=repo_id) return [repo_id, event_id] def _write_maven_repo_metadata(destdir, artifacts): # Sort the list so that the highest version number comes last. # group_id and artifact_id should be the same for all entries, # so we're really only comparing versions. artifacts = sorted(artifacts, cmp=lambda a, b: rpm.labelCompare(a, b)) artifactinfo = dict(zip(['group_id', 'artifact_id', 'version'], artifacts[-1])) artifactinfo['timestamp'] = datetime.datetime.now().strftime('%Y%m%d%H%M%S') contents = """ %(group_id)s %(artifact_id)s %(version)s %(version)s """ % artifactinfo for artifact in artifacts: contents += """ %s """ % artifact[2] contents += """ %s """ % datetime.datetime.now().strftime('%Y%m%d%H%M%S') mdfile = file(os.path.join(destdir, 'maven-metadata.xml'), 'w') mdfile.write(contents) mdfile.close() _generate_maven_metadata(destdir) def repo_set_state(repo_id, state, check=True): """Set repo state""" if check: # The repo states are sequential, going backwards makes no sense q = """SELECT state FROM repo WHERE id = %(repo_id)s FOR UPDATE""" oldstate = _singleValue(q,locals()) if oldstate > state: raise koji.GenericError, "Invalid repo state transition %s->%s" \ % (oldstate,state) q = """UPDATE repo SET state=%(state)s WHERE id = %(repo_id)s""" _dml(q,locals()) def repo_info(repo_id, strict=False): fields = ( ('repo.id', 'id'), ('repo.state', 'state'), ('repo.create_event', 'create_event'), ('events.time','creation_time'), #for compatibility with getRepo ('EXTRACT(EPOCH FROM events.time)','create_ts'), ('repo.tag_id', 'tag_id'), ('tag.name', 'tag_name'), ) q = """SELECT %s FROM repo JOIN tag ON tag_id=tag.id JOIN events ON repo.create_event = events.id WHERE repo.id = %%(repo_id)s""" % ','.join([f[0] for f in fields]) return _singleRow(q, locals(), [f[1] for f in fields], strict=strict) def repo_ready(repo_id): """Set repo state to ready""" repo_set_state(repo_id,koji.REPO_READY) def repo_expire(repo_id): """Set repo state to expired""" repo_set_state(repo_id,koji.REPO_EXPIRED) def repo_problem(repo_id): """Set repo state to problem""" repo_set_state(repo_id,koji.REPO_PROBLEM) def repo_delete(repo_id): """Attempt to mark repo deleted, return number of references If the number of references is nonzero, no change is made""" #get a row lock on the repo q = """SELECT state FROM repo WHERE id = %(repo_id)s FOR UPDATE""" _singleValue(q,locals()) references = repo_references(repo_id) if not references: repo_set_state(repo_id,koji.REPO_DELETED) return len(references) def repo_expire_older(tag_id, event_id): """Expire repos for tag older than event""" st_ready = koji.REPO_READY st_expired = koji.REPO_EXPIRED q = """UPDATE repo SET state=%(st_expired)i WHERE tag_id = %(tag_id)i AND create_event < %(event_id)i AND state = %(st_ready)i""" _dml(q, locals()) def repo_references(repo_id): """Return a list of buildroots that reference the repo""" fields = ('id', 'host_id', 'create_event', 'state') q = """SELECT %s FROM buildroot WHERE repo_id=%%(repo_id)s AND retire_event IS NULL""" % ','.join(fields) #check results for bad states ret = [] for data in _multiRow(q, locals(), fields): if data['state'] == koji.BR_STATES['EXPIRED']: log_error("Error: buildroot %(id)s expired, but has no retire_event" % data) continue ret.append(data) return ret def get_active_repos(): """Get data on all active repos This is a list of all the repos that the repo daemon needs to worry about. """ fields = ( ('repo.id', 'id'), ('repo.state', 'state'), ('repo.create_event', 'create_event'), ('EXTRACT(EPOCH FROM events.time)','create_ts'), ('repo.tag_id', 'tag_id'), ('tag.name', 'tag_name'), ) st_deleted = koji.REPO_DELETED q = """SELECT %s FROM repo JOIN tag ON tag_id=tag.id JOIN events ON repo.create_event = events.id WHERE repo.state != %%(st_deleted)s""" % ','.join([f[0] for f in fields]) return _multiRow(q, locals(), [f[1] for f in fields]) def tag_changed_since_event(event,taglist): """Report whether any changes since event affect any of the tags in list The function is used by the repo daemon to determine which of its repos are up to date. This function does not figure inheritance, the calling function should expand the taglist to include any desired inheritance. Returns: True or False """ data = locals().copy() #first check the tag_updates table clauses = ['update_event > %(event)i', 'tag_id IN %(taglist)s'] query = QueryProcessor(tables=['tag_updates'], columns=['id'], clauses=clauses, values=data, opts={'limit': 1}) if query.execute(): return True #also check these versioned tables tables = ( 'tag_listing', 'tag_inheritance', 'tag_config', 'tag_packages', 'tag_external_repos', 'group_package_listing', 'group_req_listing', 'group_config', ) clauses = ['create_event > %(event)i OR revoke_event > %(event)i', 'tag_id IN %(taglist)s'] for table in tables: query = QueryProcessor(tables=[table], columns=['tag_id'], clauses=clauses, values=data, opts={'limit': 1}) if query.execute(): return True return False def set_tag_update(tag_id, utype, event_id=None, user_id=None): """Record a non-versioned tag update""" utype_id = koji.TAG_UPDATE_TYPES.getnum(utype) if utype_id is None: raise koji.GenericError, "Invalid update type: %s" % utype if event_id is None: event_id = get_event() if user_id is None: context.session.assertLogin() user_id = context.session.user_id data = {'tag_id': tag_id, 'update_type': utype_id, 'update_event': event_id, 'updater_id': user_id} insert = InsertProcessor('tag_updates', data=data) insert.execute() def create_build_target(name, build_tag, dest_tag): """Create a new build target""" context.session.assertPerm('admin') # Does a target with this name already exist? if get_build_targets(info=name): raise koji.GenericError("A build target with the name '%s' already exists" % name) # Does the build tag exist? build_tag_object = get_tag(build_tag) if not build_tag_object: raise koji.GenericError("build tag '%s' does not exist" % build_tag) build_tag = build_tag_object['id'] # Does the dest tag exist? dest_tag_object = get_tag(dest_tag) if not dest_tag_object: raise koji.GenericError("destination tag '%s' does not exist" % dest_tag) dest_tag = dest_tag_object['id'] #build targets are versioned, so if the target has previously been deleted, it #is possible the name is in the system id = get_build_target_id(name,create=True) insert = InsertProcessor('build_target_config') insert.set(build_target_id=id, build_tag=build_tag, dest_tag=dest_tag) insert.make_create() insert.execute() def edit_build_target(buildTargetInfo, name, build_tag, dest_tag): """Set the build_tag and dest_tag of an existing build_target to new values""" context.session.assertPerm('admin') target = lookup_build_target(buildTargetInfo) if not target: raise koji.GenericError, 'invalid build target: %s' % buildTargetInfo buildTargetID = target['id'] build_tag_object = get_tag(build_tag) if not build_tag_object: raise koji.GenericError, "build tag '%s' does not exist" % build_tag buildTagID = build_tag_object['id'] dest_tag_object = get_tag(dest_tag) if not dest_tag_object: raise koji.GenericError, "destination tag '%s' does not exist" % dest_tag destTagID = dest_tag_object['id'] if target['name'] != name: # Allow renaming, for parity with tags id = _singleValue("""SELECT id from build_target where name = %(name)s""", locals(), strict=False) if id is not None: raise koji.GenericError, 'name "%s" is already taken by build target %i' % (name, id) rename = """UPDATE build_target SET name = %(name)s WHERE id = %(buildTargetID)i""" _dml(rename, locals()) update = UpdateProcessor('build_target_config', values=locals(), clauses=["build_target_id = %(buildTargetID)i"]) update.make_revoke() insert = InsertProcessor('build_target_config') insert.set(build_target_id=buildTargetID, build_tag=buildTagID, dest_tag=destTagID) insert.make_create() update.execute() insert.execute() def delete_build_target(buildTargetInfo): """Delete the build target with the given name. If no build target exists, raise a GenericError.""" context.session.assertPerm('admin') target = lookup_build_target(buildTargetInfo) if not target: raise koji.GenericError, 'invalid build target: %s' % buildTargetInfo targetID = target['id'] #build targets are versioned, so we do not delete them from the db #instead we revoke the config entry update = UpdateProcessor('build_target_config', values=locals(), clauses=["build_target_id = %(targetID)i"]) update.make_revoke() update.execute() def get_build_targets(info=None, event=None, buildTagID=None, destTagID=None, queryOpts=None): """Return data on all the build targets provide event to query at a different time""" fields = ( ('build_target.id', 'id'), ('build_tag', 'build_tag'), ('dest_tag', 'dest_tag'), ('build_target.name', 'name'), ('tag1.name', 'build_tag_name'), ('tag2.name', 'dest_tag_name'), ) joins = ['build_target ON build_target_config.build_target_id = build_target.id', 'tag AS tag1 ON build_target_config.build_tag = tag1.id', 'tag AS tag2 ON build_target_config.dest_tag = tag2.id'] clauses = [eventCondition(event)] if info: if isinstance(info, str): clauses.append('build_target.name = %(info)s') elif isinstance(info, int) or isinstance(info, long): clauses.append('build_target.id = %(info)i') else: raise koji.GenericError, 'invalid type for lookup: %s' % type(info) if buildTagID != None: clauses.append('build_tag = %(buildTagID)i') if destTagID != None: clauses.append('dest_tag = %(destTagID)i') query = QueryProcessor(columns=[f[0] for f in fields], aliases=[f[1] for f in fields], tables=['build_target_config'], joins=joins, clauses=clauses, values=locals(), opts=queryOpts) return query.execute() def get_build_target(info, event=None, strict=False): """Return the build target with the given name or ID. If there is no matching build target, return None.""" targets = get_build_targets(info=info, event=event) if len(targets) == 1: return targets[0] elif strict: raise koji.GenericError, 'No matching build target found: %s' % info else: return None def lookup_name(table,info,strict=False,create=False): """Find the id and name in the table associated with info. Info can be the name to look up, or if create is false it can be the id. Return value is a dict with keys id and name, or None If there is no match, then the behavior depends on the options. If strict, then an error is raised. If create, then the required entry is created and returned. table should be the name of a table with (unique) fields id INTEGER name TEXT Any other fields should have default values, otherwise the create option will fail. """ fields = ('id','name') if isinstance(info, int) or isinstance(info, long): q="""SELECT id,name FROM %s WHERE id=%%(info)d""" % table elif isinstance(info, str): q="""SELECT id,name FROM %s WHERE name=%%(info)s""" % table else: raise koji.GenericError, 'invalid type for id lookup: %s' % type(info) ret = _singleRow(q,locals(),fields,strict=False) if ret is None: if strict: raise koji.GenericError, 'No such entry in table %s: %s' % (table, info) elif create: if not isinstance(info, str): raise koji.GenericError, 'Name must be a string' id = _singleValue("SELECT nextval('%s_id_seq')" % table, strict=True) q = """INSERT INTO %s(id,name) VALUES (%%(id)i,%%(info)s)""" % table _dml(q,locals()) return {'id': id, 'name': info} else: return ret return ret def get_id(table,info,strict=False,create=False): """Find the id in the table associated with info.""" data = lookup_name(table,info,strict,create) if data is None: return data else: return data['id'] def get_tag_id(info,strict=False,create=False): """Get the id for tag""" return get_id('tag',info,strict,create) def lookup_tag(info,strict=False,create=False): """Get the id,name for tag""" return lookup_name('tag',info,strict,create) def get_perm_id(info,strict=False,create=False): """Get the id for a permission""" return get_id('permissions',info,strict,create) def lookup_perm(info,strict=False,create=False): """Get the id,name for perm""" return lookup_name('permissions',info,strict,create) def get_package_id(info,strict=False,create=False): """Get the id for a package""" return get_id('package',info,strict,create) def lookup_package(info,strict=False,create=False): """Get the id,name for package""" return lookup_name('package',info,strict,create) def get_channel_id(info,strict=False,create=False): """Get the id for a channel""" return get_id('channels',info,strict,create) def lookup_channel(info,strict=False,create=False): """Get the id,name for channel""" return lookup_name('channels',info,strict,create) def get_group_id(info,strict=False,create=False): """Get the id for a group""" return get_id('groups',info,strict,create) def lookup_group(info,strict=False,create=False): """Get the id,name for group""" return lookup_name('groups',info,strict,create) def get_build_target_id(info,strict=False,create=False): """Get the id for a build target""" return get_id('build_target',info,strict,create) def lookup_build_target(info,strict=False,create=False): """Get the id,name for build target""" return lookup_name('build_target',info,strict,create) def create_tag(name, parent=None, arches=None, perm=None, locked=False, maven_support=False, maven_include_all=False): """Create a new tag""" context.session.assertPerm('admin') if not context.opts.get('EnableMaven') and (maven_support or maven_include_all): raise koji.GenericError, "Maven support not enabled" #see if there is already a tag by this name (active) if get_tag(name): raise koji.GenericError("A tag with the name '%s' already exists" % name) # Does the parent exist? if parent: parent_tag = get_tag(parent) parent_id = parent_tag['id'] if not parent_tag: raise koji.GenericError("Parent tag '%s' could not be found" % parent) else: parent_id = None #there may already be an id for a deleted tag, this will reuse it tag_id = get_tag_id(name,create=True) insert = InsertProcessor('tag_config') insert.set(tag_id=tag_id, arches=arches, perm_id=perm, locked=locked) insert.set(maven_support=maven_support, maven_include_all=maven_include_all) insert.make_create() insert.execute() if parent_id: data = {'parent_id': parent_id, 'priority': 0, 'maxdepth': None, 'intransitive': False, 'noconfig': False, 'pkg_filter': ''} writeInheritanceData(tag_id, data) return tag_id def get_tag(tagInfo, strict=False, event=None): """Get tag information based on the tagInfo. tagInfo may be either a string (the tag name) or an int (the tag ID). Returns a map containing the following keys: - id - name - perm_id (may be null) - perm (name, may be null) - arches (may be null) - locked - maven_support - maven_include_all If there is no tag matching the given tagInfo, and strict is False, return None. If strict is True, raise a GenericError. Note that in order for a tag to 'exist', it must have an active entry in tag_config. A tag whose name appears in the tag table but has no active tag_config entry is considered deleted. """ tables = ['tag_config'] joins = ['tag ON tag.id = tag_config.tag_id', 'LEFT OUTER JOIN permissions ON tag_config.perm_id = permissions.id'] fields = {'tag.id': 'id', 'tag.name': 'name', 'tag_config.perm_id': 'perm_id', 'permissions.name': 'perm', 'tag_config.arches': 'arches', 'tag_config.locked': 'locked', 'tag_config.maven_support': 'maven_support', 'tag_config.maven_include_all': 'maven_include_all' } clauses = [eventCondition(event, table='tag_config')] if isinstance(tagInfo, int): clauses.append("tag.id = %(tagInfo)i") elif isinstance(tagInfo, basestring): clauses.append("tag.name = %(tagInfo)s") else: raise koji.GenericError, 'invalid type for tagInfo: %s' % type(tagInfo) data = {'tagInfo': tagInfo} fields, aliases = zip(*fields.items()) query = QueryProcessor(columns=fields, aliases=aliases, tables=tables, joins=joins, clauses=clauses, values=data) result = query.executeOne() if not result: if strict: raise koji.GenericError, "Invalid tagInfo: %r" % tagInfo return None return result def edit_tag(tagInfo, **kwargs): """Edit information for an existing tag. tagInfo specifies the tag to edit fields changes are provided as keyword arguments: name: rename the tag arches: change the arch list locked: lock or unlock the tag perm: change the permission requirement maven_support: whether Maven repos should be generated for the tag maven_include_all: include every build in this tag (including multiple versions of the same package) in the Maven repo """ context.session.assertPerm('admin') if not context.opts.get('EnableMaven') \ and dslice(kwargs, ['maven_support','maven_include_all'], strict=False): raise koji.GenericError, "Maven support not enabled" tag = get_tag(tagInfo, strict=True) if kwargs.has_key('perm'): if kwargs['perm'] is None: kwargs['perm_id'] = None else: kwargs['perm_id'] = get_perm_id(kwargs['perm'],strict=True) name = kwargs.get('name') if name and tag['name'] != name: #attempt to update tag name #XXX - I'm not sure we should allow this sort of renaming anyway. # while I can see the convenience, it is an untracked change (granted # a cosmetic one). The more versioning-friendly way would be to create # a new tag with duplicate data and revoke the old tag. This is more # of a pain of course :-/ -mikem values = { 'name': name, 'tagID': tag['id'] } q = """SELECT id FROM tag WHERE name=%(name)s""" id = _singleValue(q,values,strict=False) if id is not None: #new name is taken raise koji.GenericError, "Name %s already taken by tag %s" % (name,id) update = """UPDATE tag SET name = %(name)s WHERE id = %(tagID)i""" _dml(update, values) #check for changes data = tag.copy() changed = False for key in ('perm_id','arches','locked','maven_support','maven_include_all'): if kwargs.has_key(key) and data[key] != kwargs[key]: changed = True data[key] = kwargs[key] if not changed: return update = UpdateProcessor('tag_config', values=data, clauses=['tag_id = %(id)i']) update.make_revoke() update.execute() insert = InsertProcessor('tag_config', data=dslice(data, ('arches', 'perm_id', 'locked'))) insert.set(tag_id=data['id']) insert.set(**dslice(data, ('maven_support', 'maven_include_all'))) insert.make_create() insert.execute() def old_edit_tag(tagInfo, name, arches, locked, permissionID): """Edit information for an existing tag.""" return edit_tag(tagInfo, name=name, arches=arches, locked=locked, perm_id=permissionID) def delete_tag(tagInfo): """Delete the specified tag.""" context.session.assertPerm('admin') #We do not ever DELETE tag data. It is versioned -- we revoke it instead. def _tagDelete(tableName, value, columnName='tag_id'): update = UpdateProcessor(tableName, clauses=["%s = %%(value)i" % columnName], values={'value':value}) update.make_revoke() update.execute() tag = get_tag(tagInfo) tagID = tag['id'] _tagDelete('tag_config', tagID) #technically, to 'delete' the tag we only have to revoke the tag_config entry #these remaining revocations are more for cleanup. _tagDelete('tag_inheritance', tagID) _tagDelete('tag_inheritance', tagID, 'parent_id') _tagDelete('build_target_config', tagID, 'build_tag') _tagDelete('build_target_config', tagID, 'dest_tag') _tagDelete('tag_listing', tagID) _tagDelete('tag_packages', tagID) _tagDelete('tag_external_repos', tagID) _tagDelete('group_config', tagID) _tagDelete('group_req_listing', tagID) _tagDelete('group_package_listing', tagID) # note: we do not delete the entry in the tag table (we can't actually, it # is still referenced by the revoked rows). # note: there is no need to do anything with the repo entries that reference tagID def get_external_repo_id(info, strict=False, create=False): """Get the id for a build target""" return get_id('external_repo', info, strict, create) def create_external_repo(name, url): """Create a new external repo with the given name and url. Return a map containing the id, name, and url of the new repo.""" context.session.assertPerm('admin') if get_external_repos(info=name): raise koji.GenericError, 'An external repo named "%s" already exists' % name id = get_external_repo_id(name, create=True) if not url.endswith('/'): # Ensure the url always ends with / url += '/' values = {'id': id, 'name': name, 'url': url} insert = InsertProcessor('external_repo_config') insert.set(external_repo_id = id, url=url) insert.make_create() insert.execute() return values def get_external_repos(info=None, url=None, event=None, queryOpts=None): """Get a list of external repos. If info is not None it may be a string (name) or an integer (id). If url is not None, filter the list of repos to those matching the given url.""" fields = ['id', 'name', 'url'] tables = ['external_repo'] joins = ['external_repo_config ON external_repo_id = id'] clauses = [eventCondition(event)] if info is not None: if isinstance(info, str): clauses.append('name = %(info)s') elif isinstance(info, (int, long)): clauses.append('id = %(info)i') else: raise koji.GenericError, 'invalid type for lookup: %s' % type(info) if url: clauses.append('url = %(url)s') query = QueryProcessor(columns=fields, tables=tables, joins=joins, clauses=clauses, values=locals(), opts=queryOpts) return query.execute() def get_external_repo(info, strict=False, event=None): """Get information about a single external repo. info can either be a string (name) or an integer (id). Returns a map containing the id, name, and url of the repo. If strict is True and no external repo has the given name or id, raise an error.""" repos = get_external_repos(info, event=event) if repos: return repos[0] else: if strict: raise koji.GenericError, 'invalid repo info: %s' % info else: return None def edit_external_repo(info, name=None, url=None): """Edit an existing external repo""" context.session.assertPerm('admin') repo = get_external_repo(info, strict=True) repo_id = repo['id'] if name and name != repo['name']: existing_id = _singleValue("""SELECT id FROM external_repo WHERE name = %(name)s""", locals(), strict=False) if existing_id is not None: raise koji.GenericError, 'name "%s" is already taken by external repo %i' % (name, existing_id) rename = """UPDATE external_repo SET name = %(name)s WHERE id = %(repo_id)i""" _dml(rename, locals()) if url and url != repo['url']: if not url.endswith('/'): # Ensure the url always ends with / url += '/' update = UpdateProcessor('external_repo_config', values=locals(), clauses=['external_repo_id = %(repo_id)i']) update.make_revoke() insert = InsertProcessor('external_repo_config') insert.set(external_repo_id=repo_id, url=url) insert.make_create() update.execute() insert.execute() def delete_external_repo(info): """Delete an external repo""" context.session.assertPerm('admin') repo = get_external_repo(info, strict=True) repo_id = repo['id'] for tag_repo in get_tag_external_repos(repo_info=repo['id']): remove_external_repo_from_tag(tag_info=tag_repo['tag_id'], repo_info=repo_id) update = UpdateProcessor('external_repo_config', values=locals(), clauses=['external_repo_id = %(repo_id)i']) update.make_revoke() update.execute() def add_external_repo_to_tag(tag_info, repo_info, priority): """Add an external repo to a tag""" context.session.assertPerm('admin') tag = get_tag(tag_info, strict=True) tag_id = tag['id'] repo = get_external_repo(repo_info, strict=True) repo_id = repo['id'] tag_repos = get_tag_external_repos(tag_info=tag_id) if [tr for tr in tag_repos if tr['external_repo_id'] == repo_id]: raise koji.GenericError, 'tag %s already associated with external repo %s' % \ (tag['name'], repo['name']) if [tr for tr in tag_repos if tr['priority'] == priority]: raise koji.GenericError, 'tag %s already associated with an external repo at priority %i' % \ (tag['name'], priority) insert = InsertProcessor('tag_external_repos') insert.set(tag_id=tag_id, external_repo_id=repo_id, priority=priority) insert.make_create() insert.execute() def remove_external_repo_from_tag(tag_info, repo_info): """Remove an external repo from a tag""" context.session.assertPerm('admin') tag = get_tag(tag_info, strict=True) tag_id = tag['id'] repo = get_external_repo(repo_info, strict=True) repo_id = repo['id'] if not get_tag_external_repos(tag_info=tag_id, repo_info=repo_id): raise koji.GenericError, 'external repo %s not associated with tag %s' % \ (repo['name'], tag['name']) update = UpdateProcessor('tag_external_repos', values=locals(), clauses=["tag_id = %(tag_id)i", "external_repo_id = %(repo_id)i"]) update.make_revoke() update.execute() def edit_tag_external_repo(tag_info, repo_info, priority): """Edit a tag<->external repo association This allows you to update the priority without removing/adding the repo.""" context.session.assertPerm('admin') tag = get_tag(tag_info, strict=True) tag_id = tag['id'] repo = get_external_repo(repo_info, strict=True) repo_id = repo['id'] tag_repos = get_tag_external_repos(tag_info=tag_id, repo_info=repo_id) if not tag_repos: raise koji.GenericError, 'external repo %s not associated with tag %s' % \ (repo['name'], tag['name']) tag_repo = tag_repos[0] if priority != tag_repo['priority']: remove_external_repo_from_tag(tag_id, repo_id) add_external_repo_to_tag(tag_id, repo_id, priority) def get_tag_external_repos(tag_info=None, repo_info=None, event=None): """ Get a list of tag<->external repo associations. Returns a map containing the following fields: tag_id tag_name external_repo_id external_repo_name url priority """ tables = ['tag_external_repos'] joins = ['tag ON tag_external_repos.tag_id = tag.id', 'external_repo ON tag_external_repos.external_repo_id = external_repo.id', 'external_repo_config ON external_repo.id = external_repo_config.external_repo_id'] columns = ['tag.id', 'tag.name', 'external_repo.id', 'external_repo.name', 'url', 'priority'] aliases = ['tag_id', 'tag_name', 'external_repo_id', 'external_repo_name', 'url', 'priority'] clauses = [eventCondition(event, table='tag_external_repos'), eventCondition(event, table='external_repo_config')] if tag_info: tag = get_tag(tag_info, strict=True, event=event) tag_id = tag['id'] clauses.append('tag.id = %(tag_id)i') if repo_info: repo = get_external_repo(repo_info, strict=True, event=event) repo_id = repo['id'] clauses.append('external_repo.id = %(repo_id)i') opts = {'order': 'priority'} query = QueryProcessor(tables=tables, joins=joins, columns=columns, aliases=aliases, clauses=clauses, values=locals(), opts=opts) return query.execute() def get_external_repo_list(tag_info, event=None): """ Get an ordered list of all external repos associated with the tags in the hierarchy rooted at the specified tag. External repos will be returned depth-first, and ordered by priority for each tag. Duplicates will be removed. Returns a list of maps containing the following fields: tag_id tag_name external_repo_id external_repo_name url priority """ tag = get_tag(tag_info, strict=True, event=event) tag_list = [tag['id']] for parent in readFullInheritance(tag['id'], event): tag_list.append(parent['parent_id']) seen_repos = {} repos = [] for tag_id in tag_list: for tag_repo in get_tag_external_repos(tag_info=tag_id, event=event): if not seen_repos.has_key(tag_repo['external_repo_id']): repos.append(tag_repo) seen_repos[tag_repo['external_repo_id']] = 1 return repos def get_user(userInfo=None,strict=False): """Return information about a user. userInfo may be either a str (Kerberos principal) or an int (user id). A map will be returned with the following keys: id: user id name: user name status: user status (int), may be null usertype: user type (int), 0 person, 1 for host, may be null krb_principal: the user's Kerberos principal""" if userInfo is None: userInfo = context.session.user_id #will still be None if not logged in fields = ('id', 'name', 'status', 'usertype', 'krb_principal') q = """SELECT %s FROM users WHERE""" % ', '.join(fields) if isinstance(userInfo, int) or isinstance(userInfo, long): q += """ id = %(userInfo)i""" elif isinstance(userInfo, str): q += """ (krb_principal = %(userInfo)s or name = %(userInfo)s)""" else: raise koji.GenericError, 'invalid type for userInfo: %s' % type(userInfo) return _singleRow(q,locals(),fields,strict=strict) def find_build_id(X): if isinstance(X,int) or isinstance(X,long): return X elif isinstance(X,str): data = koji.parse_NVR(X) elif isinstance(X,dict): data = X else: raise koji.GenericError, "Invalid argument: %r" % X if not (data.has_key('name') and data.has_key('version') and data.has_key('release')): raise koji.GenericError, 'did not provide name, version, and release' c=context.cnx.cursor() q="""SELECT build.id FROM build JOIN package ON build.pkg_id=package.id WHERE package.name=%(name)s AND build.version=%(version)s AND build.release=%(release)s """ # contraints should ensure this is unique #log_error(koji.db._quoteparams(q,data)) c.execute(q,data) r=c.fetchone() #log_error("%r" % r ) if not r: return None return r[0] def get_build(buildInfo, strict=False): """Return information about a build. buildID may be either a int ID, a string NVR, or a map containing 'name', 'version' and 'release. A map will be returned containing the following keys: id: build ID package_id: ID of the package built package_name: name of the package built version release epoch nvr state task_id: ID of the task that kicked off the build owner_id: ID of the user who kicked off the build owner_name: name of the user who kicked off the build volume_id: ID of the storage volume volume_name: name of the storage volume creation_event_id: id of the create_event creation_time: time the build was created (text) creation_ts: time the build was created (epoch) completion_time: time the build was completed (may be null) completion_ts: time the build was completed (epoch, may be null) If there is no build matching the buildInfo given, and strict is specified, raise an error. Otherwise return None. """ buildID = find_build_id(buildInfo) if buildID == None: if strict: raise koji.GenericError, 'No matching build found: %s' % buildInfo else: return None fields = (('build.id', 'id'), ('build.version', 'version'), ('build.release', 'release'), ('build.epoch', 'epoch'), ('build.state', 'state'), ('build.completion_time', 'completion_time'), ('build.task_id', 'task_id'), ('events.id', 'creation_event_id'), ('events.time', 'creation_time'), ('package.id', 'package_id'), ('package.name', 'package_name'), ('package.name', 'name'), ('volume.id', 'volume_id'), ('volume.name', 'volume_name'), ("package.name || '-' || build.version || '-' || build.release", 'nvr'), ('EXTRACT(EPOCH FROM events.time)','creation_ts'), ('EXTRACT(EPOCH FROM build.completion_time)','completion_ts'), ('users.id', 'owner_id'), ('users.name', 'owner_name')) query = """SELECT %s FROM build JOIN events ON build.create_event = events.id JOIN package on build.pkg_id = package.id JOIN volume on build.volume_id = volume.id JOIN users on build.owner = users.id WHERE build.id = %%(buildID)i""" % ', '.join([pair[0] for pair in fields]) c = context.cnx.cursor() c.execute(query, locals()) result = c.fetchone() if not result: if strict: raise koji.GenericError, 'No matching build found: %s' % buildInfo else: return None else: ret = dict(zip([pair[1] for pair in fields], result)) return ret def get_next_release(build_info): """find the last successful or deleted build of this N-V""" values = {'name': build_info['name'], 'version': build_info['version'], 'states': (koji.BUILD_STATES['COMPLETE'], koji.BUILD_STATES['DELETED'])} query = QueryProcessor(tables=['build'], joins=['package ON build.pkg_id = package.id'], columns=['build.id', 'release'], clauses=['name = %(name)s', 'version = %(version)s', 'state in %(states)s'], values=values, opts={'order': '-build.id', 'limit': 1}) result = query.executeOne() release = None if result: release = result['release'] if not release: release = '1' elif release.isdigit(): release = str(int(release) + 1) else: raise koji.BuildError, 'Unable to increment release value: %s' % release return release def get_rpm(rpminfo, strict=False, multi=False): """Get information about the specified RPM rpminfo may be any one of the following: - a int ID - a string N-V-R.A - a string N-V-R.A@location - a map containing 'name', 'version', 'release', and 'arch' (and optionally 'location') If specified, location should match the name of an external repo A map will be returned, with the following keys: - id - name - version - release - arch - epoch - payloadhash - size - buildtime - build_id - buildroot_id - external_repo_id - external_repo_name If there is no RPM with the given ID, None is returned, unless strict is True in which case an exception is raised If more than one RPM matches, and multi is True, then a list of results is returned. If multi is False, a single match is returned (an internal one if possible). """ fields = ( ('rpminfo.id', 'id'), ('build_id', 'build_id'), ('buildroot_id', 'buildroot_id'), ('rpminfo.name', 'name'), ('version', 'version'), ('release', 'release'), ('epoch', 'epoch'), ('arch', 'arch'), ('external_repo_id', 'external_repo_id'), ('external_repo.name', 'external_repo_name'), ('payloadhash', 'payloadhash'), ('size', 'size'), ('buildtime', 'buildtime'), ) # we can look up by id or NVRA data = None if isinstance(rpminfo,(int,long)): data = {'id': rpminfo} elif isinstance(rpminfo,str): data = koji.parse_NVRA(rpminfo) elif isinstance(rpminfo,dict): data = rpminfo.copy() else: raise koji.GenericError, "Invalid argument: %r" % rpminfo clauses = [] if data.has_key('id'): clauses.append("rpminfo.id=%(id)s") else: clauses.append("""rpminfo.name=%(name)s AND version=%(version)s AND release=%(release)s AND arch=%(arch)s""") retry = False if data.has_key('location'): data['external_repo_id'] = get_external_repo_id(data['location'], strict=True) clauses.append("""external_repo_id = %(external_repo_id)i""") elif not multi: #try to match internal first, otherwise first matching external retry = True #if no internal match orig_clauses = list(clauses) #copy clauses.append("""external_repo_id = 0""") joins = ['external_repo ON rpminfo.external_repo_id = external_repo.id'] query = QueryProcessor(columns=[f[0] for f in fields], aliases=[f[1] for f in fields], tables=['rpminfo'], joins=joins, clauses=clauses, values=data) if multi: return query.execute() ret = query.executeOne() if ret: return ret if retry: #at this point we have just an NVRA with no internal match. Open it up to externals query.clauses = orig_clauses ret = query.executeOne() if not ret: if strict: raise koji.GenericError, "No such rpm: %r" % data return None return ret def list_rpms(buildID=None, buildrootID=None, imageID=None, componentBuildrootID=None, hostID=None, arches=None, queryOpts=None): """List RPMS. If buildID, imageID and/or buildrootID are specified, restrict the list of RPMs to only those RPMs that are part of that build, or were built in that buildroot. If componentBuildrootID is specified, restrict the list to only those RPMs that will get pulled into that buildroot when it is used to build another package. A list of maps is returned, each map containing the following keys: - id - name - version - release - nvr (synthesized for sorting purposes) - arch - epoch - payloadhash - size - buildtime - build_id - buildroot_id - external_repo_id - external_repo_name If componentBuildrootID is specified, two additional keys will be included: - component_buildroot_id - is_update If no build has the given ID, or the build generated no RPMs, an empty list is returned.""" fields = [('rpminfo.id', 'id'), ('rpminfo.name', 'name'), ('rpminfo.version', 'version'), ('rpminfo.release', 'release'), ("rpminfo.name || '-' || rpminfo.version || '-' || rpminfo.release", 'nvr'), ('rpminfo.arch', 'arch'), ('rpminfo.epoch', 'epoch'), ('rpminfo.payloadhash', 'payloadhash'), ('rpminfo.size', 'size'), ('rpminfo.buildtime', 'buildtime'), ('rpminfo.build_id', 'build_id'), ('rpminfo.buildroot_id', 'buildroot_id'), ('rpminfo.external_repo_id', 'external_repo_id'), ('external_repo.name', 'external_repo_name'), ] joins = ['external_repo ON rpminfo.external_repo_id = external_repo.id'] clauses = [] if buildID != None: clauses.append('rpminfo.build_id = %(buildID)i') if buildrootID != None: clauses.append('rpminfo.buildroot_id = %(buildrootID)i') if componentBuildrootID != None: fields.append(('buildroot_listing.buildroot_id as component_buildroot_id', 'component_buildroot_id')) fields.append(('buildroot_listing.is_update', 'is_update')) joins.append('buildroot_listing ON rpminfo.id = buildroot_listing.rpm_id') clauses.append('buildroot_listing.buildroot_id = %(componentBuildrootID)i') # image specific constraints if imageID != None: clauses.append('image_listing.image_id = %(imageID)i') joins.append('image_listing ON rpminfo.id = image_listing.rpm_id') if hostID != None: joins.append('buildroot ON rpminfo.buildroot_id = buildroot.id') clauses.append('buildroot.host_id = %(hostID)i') if arches != None: if isinstance(arches, list) or isinstance(arches, tuple): clauses.append('rpminfo.arch IN %(arches)s') elif isinstance(arches, str): clauses.append('rpminfo.arch = %(arches)s') else: raise koji.GenericError, 'invalid type for "arches" parameter: %s' % type(arches) query = QueryProcessor(columns=[f[0] for f in fields], aliases=[f[1] for f in fields], tables=['rpminfo'], joins=joins, clauses=clauses, values=locals(), opts=queryOpts) return query.execute() def get_maven_build(buildInfo, strict=False): """ Retrieve Maven-specific information about a build. buildInfo can be either a string (n-v-r) or an integer (build ID). Returns a map containing the following keys: build_id: id of the build (integer) group_id: Maven groupId (string) artifact_id: Maven artifact_Id (string) version: Maven version (string) """ fields = ('build_id', 'group_id', 'artifact_id', 'version') build_id = find_build_id(buildInfo) if not build_id: if strict: raise koji.GenericError, 'No matching build found: %s' % buildInfo else: return None query = """SELECT %s FROM maven_builds WHERE build_id = %%(build_id)i""" % ', '.join(fields) return _singleRow(query, locals(), fields, strict) def get_win_build(buildInfo, strict=False): """ Retrieve Windows-specific information about a build. buildInfo can be either a string (n-v-r) or an integer (build ID). Returns a map containing the following keys: build_id: id of the build (integer) platform: the platform the build was performed on (string) """ fields = ('build_id', 'platform') build_id = find_build_id(buildInfo) if not build_id: if strict: raise koji.GenericError, 'No matching build found: %s' % buildInfo else: return None query = QueryProcessor(tables=('win_builds',), columns=fields, clauses=('build_id = %(build_id)i',), values={'build_id': build_id}) result = query.executeOne() if strict and not result: raise koji.GenericError, 'no such Windows build: %s' % buildInfo return result def get_image_build(buildInfo, strict=False): """ Retrieve image-specific information about a build. buildInfo can be either a string (n-v-r) or an integer (build ID). This function really only exists to verify a build is an image build; there is no additional data. Returns a map containing the following keys: build_id: id of the build """ build_id = find_build_id(buildInfo) if not build_id: if strict: raise koji.GenericError, 'No matching build found: %s' % buildInfo else: return None query = QueryProcessor(tables=('image_builds',), columns=('build_id',), clauses=('build_id = %(build_id)i',), values={'build_id': build_id}) result = query.executeOne() if strict and not result: raise koji.GenericError, 'no such image build: %s' % buildInfo return result def list_archives(buildID=None, buildrootID=None, componentBuildrootID=None, hostID=None, type=None, filename=None, size=None, checksum=None, typeInfo=None, queryOpts=None): """ Retrieve information about archives. If buildID is not null it will restrict the list to archives built by the build with that ID. If buildrootID is not null it will restrict the list to archives built in the buildroot with that ID. If componentBuildrootID is not null it will restrict the list to archives that were present in the buildroot with that ID. If hostID is not null it will restrict the list to archives built on the host with that ID. If filename, size, and/or checksum are not null it will filter the results to entries matching the provided values. Returns a list of maps containing the following keys: id: unique id of the archive file (integer) type_id: id of the archive type (Java jar, Solaris pkg, Windows exe, etc.) (integer) type_name: name of the archive type type_description: description of the archive type_extensions: valid extensions for the type build_id: id of the build that generated this archive (integer) buildroot_id: id of the buildroot where this archive was built (integer) filename: name of the archive (string) size: size of the archive (integer) checksum: checksum of the archive (string) checksum_type: the checksum type (integer) If componentBuildrootID is specified, then the map will also contain the following key: project: whether the archive was pulled in as a project dependency, or as part of the build environment setup (boolean) If 'type' is specified, then the archives listed will be limited those associated with additional metadata of the given type. Currently supported types are: maven, win, image If 'maven' is specified as a type, each returned map will contain these additional keys: group_id: Maven groupId (string) artifact_id: Maven artifactId (string) version: Maven version (string) if 'win' is specified as a type, each returned map will contain these additional keys: relpath: the relative path where the file is located (string) platforms: space-separated list of platforms the file is suitable for use on (string) flags: space-separated list of flags used when building the file (fre, chk) (string) if 'image' is specified as a type, each returned map will contain an additional key: arch: The architecture if the image itself, which may be different from the task that generated it typeInfo is a dict that can be used to filter the output by type-specific info. For the 'maven' type, this dict may contain one or more of group_id, artifact_id, or version, and the output will be restricted to archives with matching attributes. If there are no archives matching the selection criteria, an empty list is returned. """ values = {} tables = ['archiveinfo'] joins = ['archivetypes on archiveinfo.type_id = archivetypes.id'] fields = [('archiveinfo.id', 'id'), ('archiveinfo.type_id', 'type_id'), ('archiveinfo.build_id', 'build_id'), ('archiveinfo.buildroot_id', 'buildroot_id'), ('archiveinfo.filename', 'filename'), ('archiveinfo.size', 'size'), ('archiveinfo.checksum', 'checksum'), ('archiveinfo.checksum_type', 'checksum_type'), ('archivetypes.name', 'type_name'), ('archivetypes.description', 'type_description'), ('archivetypes.extensions', 'type_extensions'), ] clauses = [] if buildID is not None: clauses.append('build_id = %(build_id)i') values['build_id'] = buildID if buildrootID is not None: clauses.append('buildroot_id = %(buildroot_id)i') values['buildroot_id'] = buildrootID if componentBuildrootID is not None: joins.append('buildroot_archives on archiveinfo.id = buildroot_archives.archive_id') clauses.append('buildroot_archives.buildroot_id = %(component_buildroot_id)i') values['component_buildroot_id'] = componentBuildrootID fields.append(['buildroot_archives.buildroot_id', 'component_buildroot_id']) fields.append(['buildroot_archives.project_dep', 'project']) if hostID is not None: joins.append('buildroot on archiveinfo.buildroot_id = buildroot.id') clauses.append('buildroot.host_id = %(host_id)i') values['host_id'] = hostID fields.append(['buildroot.host_id', 'host_id']) if filename is not None: clauses.append('filename = %(filename)s') values['filename'] = filename if size is not None: clauses.append('size = %(size)i') values['size'] = size if checksum is not None: clauses.append('checksum = %(checksum)s') values['checksum'] = checksum if type is None: pass elif type == 'maven': joins.append('maven_archives ON archiveinfo.id = maven_archives.archive_id') fields.extend([ ('maven_archives.group_id', 'group_id'), ('maven_archives.artifact_id', 'artifact_id'), ('maven_archives.version', 'version'), ]) if typeInfo: for key in ('group_id', 'artifact_id', 'version'): if typeInfo.has_key(key): clauses.append('maven_archives.%s = %%(%s)s' % (key, key)) values[key] = typeInfo[key] elif type == 'win': joins.append('win_archives ON archiveinfo.id = win_archives.archive_id') fields.extend([ ('win_archives.relpath', 'relpath'), ('win_archives.platforms', 'platforms'), ('win_archives.flags', 'flags'), ]) if typeInfo: if 'relpath' in typeInfo: clauses.append('win_archives.relpath = %(relpath)s') values['relpath'] = typeInfo['relpath'] for key in ('platforms', 'flags'): if key in typeInfo: val = typeInfo[key] if not isinstance(val, (list, tuple)): val = [val] for v in val: clauses.append(r"""%s ~ E'\\m%s\\M'""" % (key, v)) elif type == 'image': joins.append('image_archives ON archiveinfo.id = image_archives.archive_id') fields.append(['image_archives.arch', 'arch']) if typeInfo and typeInfo.get('arch'): clauses.append('image_archives.%s = %%(%s)s' % (key, key)) values[key] = typeInfo[key] else: raise koji.GenericError, 'unsupported archive type: %s' % type columns, aliases = zip(*fields) ret = QueryProcessor(tables=tables, columns=columns, aliases=aliases, joins=joins, clauses=clauses, values=values, opts=queryOpts).execute() if not (queryOpts and queryOpts.get('countOnly')): if queryOpts and 'asList' in queryOpts: key = aliases.index('size') else: key = 'size' for row in ret: row[key] = koji.encode_int(row[key]) return ret def get_archive(archive_id, strict=False): """ Get information about the archive with the given ID. Returns a map containing the following keys: id: unique id of the archive file (integer) type_id: id of the archive type (Java jar, Solaris pkg, Windows exe, etc.) (integer) build_id: id of the build that generated this archive (integer) buildroot_id: id of the buildroot where this archive was built (integer) filename: name of the archive (string) size: size of the archive (integer) checksum: checksum of the archive (string) checksum_type: type of the checksum (integer) If the archive is part of a Maven build, the following keys will be included: group_id artifact_id version If the archive is part of a Windows builds, the following keys will be included: relpath platforms flags If the archive is part of an image build, and it is the image file that contains the root partitioning ('/'), there will be a additional fields: rootid arch """ fields = ('id', 'type_id', 'build_id', 'buildroot_id', 'filename', 'size', 'checksum', 'checksum_type') select = """SELECT %s FROM archiveinfo WHERE id = %%(archive_id)i""" % ', '.join(fields) archive = _singleRow(select, locals(), fields, strict=strict) if not archive: # strict is taken care of by _singleRow() return None maven_info = get_maven_archive(archive_id) if maven_info: del maven_info['archive_id'] archive.update(maven_info) win_info = get_win_archive(archive_id) if win_info: del win_info['archive_id'] archive.update(win_info) image_info = get_image_archive(archive_id) if image_info: del image_info['archive_id'] archive.update(image_info) archive['size'] = koji.encode_int(archive['size']) return archive def get_maven_archive(archive_id, strict=False): """ Retrieve Maven-specific information about an archive. Returns a map containing the following keys: archive_id: id of the build (integer) group_id: Maven groupId (string) artifact_id: Maven artifact_Id (string) version: Maven version (string) """ fields = ('archive_id', 'group_id', 'artifact_id', 'version') select = """SELECT %s FROM maven_archives WHERE archive_id = %%(archive_id)i""" % ', '.join(fields) return _singleRow(select, locals(), fields, strict=strict) def get_win_archive(archive_id, strict=False): """ Retrieve Windows-specific information about an archive. Returns a map containing the following keys: archive_id: id of the build (integer) relpath: the relative path where the file is located (string) platforms: space-separated list of platforms the file is suitable for use on (string) flags: space-separated list of flags used when building the file (fre, chk) (string) """ fields = ('archive_id', 'relpath', 'platforms', 'flags') select = """SELECT %s FROM win_archives WHERE archive_id = %%(archive_id)i""" % ', '.join(fields) return _singleRow(select, locals(), fields, strict=strict) def get_image_archive(archive_id, strict=False): """ Retrieve image-specific information about an archive. Returns a map containing the following keys: archive_id: id of the build (integer) arch: the architecture of the image rootid: True if this image has the root '/' partition """ fields = ('archive_id', 'arch') select = """SELECT %s FROM image_archives WHERE archive_id = %%(archive_id)i""" % ', '.join(fields) results = _singleRow(select, locals(), fields, strict=strict) if not results: return None results['rootid'] = False fields = ('image_id', 'rpm_id') select = """SELECT %s FROM image_listing WHERE image_id = %%(archive_id)i""" % ', '.join(fields) rpms = _singleRow(select, locals(), fields, strict=strict) if rpms: results['rootid'] = True return results def _get_zipfile_list(archive_id, zippath): """ Get a list of the entries in the zipfile located at zippath. Return a list of dicts, one per entry in the zipfile. Each dict contains: - archive_id - name - size If the file does not exist, return an empty list. """ result = [] if not os.path.exists(zippath): return result archive = zipfile.ZipFile(zippath, 'r') for entry in archive.infolist(): filename = koji.fixEncoding(entry.filename) result.append({'archive_id': archive_id, 'name': filename, 'size': entry.file_size, 'mtime': int(time.mktime(entry.date_time + (0, 0, -1)))}) archive.close() return result def _get_tarball_list(archive_id, tarpath): """ Get a list of the entries in the tarball located at tarpath. Return a list of dicts, one per entry in the tarball. Each dict contains: - archive_id - name - size - mtime - mode - user - group If the file does not exist, return an empty list. """ result = [] if not os.path.exists(tarpath): return result archive = tarfile.open(tarpath, 'r') for entry in archive: filename = koji.fixEncoding(entry.name) result.append({'archive_id': archive_id, 'name': filename, 'size': entry.size, 'mtime': entry.mtime, 'mode': entry.mode, 'user': entry.uname, 'group': entry.gname}) archive.close() return result def list_archive_files(archive_id, queryOpts=None): """ Get information about the files contained in the archive with the given ID. Returns a list of maps with with following keys: archive_id: id of the archive the file is contained in (integer) name: name of the file (string) size: uncompressed size of the file (integer) """ archive_info = get_archive(archive_id, strict=True) archive_type = get_archive_type(type_id=archive_info['type_id'], strict=True) build_info = get_build(archive_info['build_id'], strict=True) maven_info = get_maven_build(build_info['id']) win_info = get_win_build(build_info['id']) if maven_info: maven_archive = get_maven_archive(archive_info['id'], strict=True) archive_info.update(maven_archive) file_path = os.path.join(koji.pathinfo.mavenbuild(build_info), koji.pathinfo.mavenfile(archive_info)) elif win_info: win_archive = get_win_archive(archive_info['id'], strict=True) archive_info.update(win_archive) file_path = os.path.join(koji.pathinfo.winbuild(build_info), koji.pathinfo.winfile(archive_info)) else: return _applyQueryOpts([], queryOpts) if archive_type['name'] in ('zip', 'jar'): return _applyQueryOpts(_get_zipfile_list(archive_id, file_path), queryOpts) elif archive_type['name'] == 'tar': return _applyQueryOpts(_get_tarball_list(archive_id, file_path), queryOpts) else: # XXX support other archive types return _applyQueryOpts([], queryOpts) def get_archive_file(archive_id, filename): """ Get information about a file with the given filename contained in the archive with the given ID. Returns a map with with following keys: archive_id: id of the archive the file is contained in (integer) name: name of the file (string) size: uncompressed size of the file (integer) """ files = list_archive_files(archive_id) for file_info in files: if file_info['name'] == filename: return file_info else: return None def list_task_output(taskID, stat=False): """List the files generated by the task with the given ID. This will usually include one or more RPMs, and one or more log files. If the task did not generate any files, or the output directory for the task no longer exists, return an empty list. If stat is True, return a map of filename -> stat_info where stat_info is a map containing the values of the st_* attributes returned by os.stat().""" taskDir = '%s/%s' % (koji.pathinfo.work(), koji.pathinfo.taskrelpath(taskID)) if stat: result = {} else: result = [] if not os.path.isdir(taskDir): return result for path, dirs, files in os.walk(taskDir): relpath = path[len(taskDir) + 1:] for filename in files: relfilename = os.path.join(relpath, filename) if stat: stat_info = os.stat(os.path.join(path, filename)) stat_map = {} for attr in dir(stat_info): if attr == 'st_size': stat_map[attr] = str(getattr(stat_info, attr)) elif attr in ('st_atime', 'st_mtime', 'st_ctime'): stat_map[attr] = getattr(stat_info, attr) result[relfilename] = stat_map else: result.append(relfilename) return result def _fetchMulti(query, values): """Run the query and return all rows""" c = context.cnx.cursor() c.execute(query, values) results = c.fetchall() c.close() return results def _fetchSingle(query, values, strict=False): """Run the query and return a single row If strict is true, raise an error if the query returns more or less than one row.""" results = _fetchMulti(query, values) numRows = len(results) if numRows == 0: if strict: raise koji.GenericError, 'query returned no rows' else: return None elif strict and numRows > 1: raise koji.GenericError, 'multiple rows returned for a single row query' else: return results[0] def _multiRow(query, values, fields): """Return all rows from "query". Named query parameters can be specified using the "values" map. Results will be returned as a list of maps. Each map in the list will have a key for each element in the "fields" list. If there are no results, an empty list will be returned.""" return [dict(zip(fields, row)) for row in _fetchMulti(query, values)] def _singleRow(query, values, fields, strict=False): """Return a single row from "query". Named parameters can be specified using the "values" map. The result will be returned as as map. The map will have a key for each element in the "fields" list. If more than one row is returned and "strict" is true, a GenericError will be raised. If no rows are returned, and "strict" is True, a GenericError will be raised. Otherwise None will be returned.""" row = _fetchSingle(query, values, strict) if row: return dict(zip(fields, row)) else: #strict enforced by _fetchSingle return None def _singleValue(query, values=None, strict=True): """Perform a query that returns a single value. Note that unless strict is True a return value of None could mean either a single NULL value or zero rows returned.""" if values is None: values = {} row = _fetchSingle(query, values, strict) if row: if strict and len(row) > 1: raise koji.GenericError, 'multiple fields returned for a single value query' return row[0] else: # don't need to check strict here, since that was already handled by _singleRow() return None def _dml(operation, values): """Run an insert, update, or delete. Return number of rows affected""" c = context.cnx.cursor() c.execute(operation, values) ret = c.rowcount logger.debug("Operation affected %s row(s)", ret) c.close() context.commit_pending = True return ret def get_host(hostInfo, strict=False): """Get information about the given host. hostInfo may be either a string (hostname) or int (host id). A map will be returned containign the following data: - id - user_id - name - arches - task_load - capacity - description - comment - ready - enabled """ fields = ('id', 'user_id', 'name', 'arches', 'task_load', 'capacity', 'description', 'comment', 'ready', 'enabled') query = """SELECT %s FROM host WHERE """ % ', '.join(fields) if isinstance(hostInfo, int) or isinstance(hostInfo, long): query += """id = %(hostInfo)i""" elif isinstance(hostInfo, str): query += """name = %(hostInfo)s""" else: raise koji.GenericError, 'invalid type for hostInfo: %s' % type(hostInfo) return _singleRow(query, locals(), fields, strict) def edit_host(hostInfo, **kw): """Edit information for an existing host. hostInfo specifies the host to edit, either as an integer (id) or a string (name). fields to be changed are specified as keyword parameters: - arches - capacity - description - comment Returns True if changes are made to the database, False otherwise. """ context.session.assertPerm('admin') host = get_host(hostInfo, strict=True) fields = ('arches', 'capacity', 'description', 'comment') changes = [] for field in fields: if field in kw and kw[field] != host[field]: changed = True if field == 'capacity': # capacity is a float, so set the substitution format appropriately changes.append('%s = %%(%s)f' % (field, field)) else: changes.append('%s = %%(%s)s' % (field, field)) if not changes: return False update = 'UPDATE host set ' + ', '.join(changes) + ' where id = %(id)i' data = kw.copy() data['id'] = host['id'] _dml(update, data) return True def get_channel(channelInfo, strict=False): """Return information about a channel.""" fields = ('id', 'name') query = """SELECT %s FROM channels WHERE """ % ', '.join(fields) if isinstance(channelInfo, int) or isinstance(channelInfo, long): query += """id = %(channelInfo)i""" elif isinstance(channelInfo, str): query += """name = %(channelInfo)s""" else: raise koji.GenericError, 'invalid type for channelInfo: %s' % type(channelInfo) return _singleRow(query, locals(), fields, strict) def query_buildroots(hostID=None, tagID=None, state=None, rpmID=None, archiveID=None, taskID=None, buildrootID=None, queryOpts=None): """Return a list of matching buildroots Optional args: hostID - only buildroots on host. tagID - only buildroots for tag. state - only buildroots in state (may be a list) rpmID - only buildroots the specified rpm was used in archiveID - only buildroots the specified archive was used in taskID - only buildroots associated with task. buildrootID - only the specified buildroot queryOpts - query options """ fields = [('buildroot.id', 'id'), ('buildroot.arch', 'arch'), ('buildroot.state', 'state'), ('buildroot.dirtyness', 'dirtyness'), ('buildroot.task_id', 'task_id'), ('host.id', 'host_id'), ('host.name', 'host_name'), ('repo.id', 'repo_id'), ('repo.state', 'repo_state'), ('tag.id', 'tag_id'), ('tag.name', 'tag_name'), ('create_events.id', 'create_event_id'), ('create_events.time', 'create_event_time'), ('EXTRACT(EPOCH FROM create_events.time)','create_ts'), ('retire_events.id', 'retire_event_id'), ('retire_events.time', 'retire_event_time'), ('EXTRACT(EPOCH FROM retire_events.time)','retire_ts'), ('repo_create.id', 'repo_create_event_id'), ('repo_create.time', 'repo_create_event_time')] tables = ['buildroot'] joins=['host ON host.id = buildroot.host_id', 'repo ON repo.id = buildroot.repo_id', 'tag ON tag.id = repo.tag_id', 'events AS create_events ON create_events.id = buildroot.create_event', 'LEFT OUTER JOIN events AS retire_events ON buildroot.retire_event = retire_events.id', 'events AS repo_create ON repo_create.id = repo.create_event'] clauses = [] if buildrootID != None: if isinstance(buildrootID, list) or isinstance(buildrootID, tuple): clauses.append('buildroot.id IN %(buildrootID)s') else: clauses.append('buildroot.id = %(buildrootID)i') if hostID != None: clauses.append('host.id = %(hostID)i') if tagID != None: clauses.append('tag.id = %(tagID)i') if state != None: if isinstance(state, list) or isinstance(state, tuple): clauses.append('buildroot.state IN %(state)s') else: clauses.append('buildroot.state = %(state)i') if rpmID != None: joins.insert(0, 'buildroot_listing ON buildroot.id = buildroot_listing.buildroot_id') fields.append(('buildroot_listing.is_update', 'is_update')) clauses.append('buildroot_listing.rpm_id = %(rpmID)i') if archiveID != None: joins.append('buildroot_archives ON buildroot.id = buildroot_archives.buildroot_id') clauses.append('buildroot_archives.archive_id = %(archiveID)i') if taskID != None: clauses.append('buildroot.task_id = %(taskID)i') query = QueryProcessor(columns=[f[0] for f in fields], aliases=[f[1] for f in fields], tables=tables, joins=joins, clauses=clauses, values=locals(), opts=queryOpts) return query.execute() def get_buildroot(buildrootID, strict=False): """Return information about a buildroot. buildrootID must be an int ID.""" result = query_buildroots(buildrootID=buildrootID) if len(result) == 0: if strict: raise koji.GenericError, "No such buildroot: %r" % buildrootID else: return None if len(result) > 1: #this should be impossible raise koji.GenericError, "More that one buildroot with id: %i" % buildrootID return result[0] def list_channels(hostID=None): """List channels. If hostID is specified, only list channels associated with the host with that ID.""" fields = ('id', 'name') query = """SELECT %s FROM channels """ % ', '.join(fields) if hostID != None: query += """JOIN host_channels ON channels.id = host_channels.channel_id WHERE host_channels.host_id = %(hostID)i""" return _multiRow(query, locals(), fields) def new_package(name,strict=True): c = context.cnx.cursor() # TODO - table lock? # check for existing q = """SELECT id FROM package WHERE name=%(name)s""" c.execute(q,locals()) row = c.fetchone() if row: (pkg_id,) = row if strict: raise koji.GenericError, "Package already exists [id %d]" % pkg_id else: q = """SELECT nextval('package_id_seq')""" c.execute(q) (pkg_id,) = c.fetchone() q = """INSERT INTO package (id,name) VALUES (%(pkg_id)s,%(name)s)""" context.commit_pending = True c.execute(q,locals()) return pkg_id def add_volume(name, strict=True): """Add a new storage volume in the database""" context.session.assertPerm('admin') voldir = koji.pathinfo.volumedir(name) if not os.path.isdir(voldir): raise koji.GenericError, 'please create the volume directory first' if strict: volinfo = lookup_name('volume', name, strict=False) if volinfo: raise koji.GenericError, 'volume %s already exists' % name volinfo = lookup_name('volume', name, strict=False, create=True) return volinfo def remove_volume(volume): """Remove unused storage volume from the database""" context.session.assertPerm('admin') volinfo = lookup_name('volume', volume, strict=True) query = QueryProcessor(tables=['build'], clauses=['volume_id=%(id)i'], values=volinfo, columns=['id'], opts={'limit':1}) if query.execute(): raise koji.GenericError, 'volume %(name)s has build references' % volinfo delete = """DELETE FROM volume WHERE id=%(id)i""" _dml(delete, volinfo) def list_volumes(): """List storage volumes""" return QueryProcessor(tables=['volume'], columns=['id', 'name']).execute() def change_build_volume(build, volume, strict=True): """Move a build to a different storage volume""" context.session.assertPerm('admin') volinfo = lookup_name('volume', volume, strict=True) binfo = get_build(build, strict=True) if binfo['volume_id'] == volinfo['id']: if strict: raise koji.GenericError, "Build %(nvr)s already on volume %(volume_name)s" % binfo else: #nothing to do return state = koji.BUILD_STATES[binfo['state']] if state not in ['COMPLETE', 'DELETED']: raise koji.GenericError, "Build %s is %s" % (binfo['nvr'], state) voldir = koji.pathinfo.volumedir(volinfo['name']) if not os.path.isdir(voldir): raise koji.GenericError, "Directory entry missing for volume %(name)s" % volinfo #more sanity checks for check_vol in list_volumes(): check_binfo = binfo.copy() check_binfo['volume_id'] = check_vol['id'] check_binfo['volume_name'] = check_vol['name'] checkdir = koji.pathinfo.build(check_binfo) if check_vol['id'] == binfo['volume_id']: # the volume we are moving from pass elif check_vol['name'] == 'DEFAULT' and os.path.islink(checkdir): # old convenience symlink pass elif check_vol['id'] == volinfo['id']: # the volume we are moving to if os.path.lexists(checkdir): raise koji.GenericError, "Destination directory exists: %s" % checkdir elif os.path.lexists(checkdir): raise koji.GenericError, "Unexpected cross-volume content: %s" % checkdir # First copy the build dir(s) dir_moves = [] old_binfo = binfo.copy() binfo['volume_id'] = volinfo['id'] binfo['volume_name'] = volinfo['name'] olddir = koji.pathinfo.build(old_binfo) if os.path.exists(olddir): newdir = koji.pathinfo.build(binfo) dir_moves.append([olddir, newdir]) for olddir, newdir in dir_moves: # Remove old symlink if copying to base volume if volinfo['name'] == 'DEFAULT' or volinfo['name'] is None: if os.path.islink(newdir): os.unlink(newdir) koji.ensuredir(os.path.dirname(newdir)) shutil.copytree(olddir, newdir, symlinks=True) # Second, update the db koji.plugin.run_callbacks('preBuildStateChange', attribute='volume_id', old=old_binfo['volume_id'], new=volinfo['id'], info=binfo) update = UpdateProcessor('build', clauses=['id=%(id)i'], values=binfo) update.set(volume_id=volinfo['id']) update.execute() for tag in list_tags(build=binfo['id']): set_tag_update(tag['id'], 'VOLUME_CHANGE') # Third, delete the old content for olddir, newdir in dir_moves: koji.util.rmtree(olddir) #Fourth, maintain a symlink if appropriate if volinfo['name'] and volinfo['name'] != 'DEFAULT': base_vol = lookup_name('volume', 'DEFAULT', strict=True) base_binfo = binfo.copy() base_binfo['volume_id'] = base_vol['id'] base_binfo['volume_name'] = base_vol['name'] basedir = koji.pathinfo.build(base_binfo) if os.path.islink(basedir): os.unlink(basedir) relpath = koji.util.relpath(newdir, os.path.dirname(basedir)) os.symlink(relpath, basedir) koji.plugin.run_callbacks('postBuildStateChange', attribute='volume_id', old=old_binfo['volume_id'], new=volinfo['id'], info=binfo) def new_build(data): """insert a new build entry""" data = data.copy() if 'pkg_id' in data: data['name'] = lookup_package(data['pkg_id'], strict=True)['name'] else: #see if there's a package name name = data.get('name') if not name: raise koji.GenericError, "No name or package id provided for build" data['pkg_id'] = new_package(name,strict=False) for f in ('version','release','epoch'): if not data.has_key(f): raise koji.GenericError, "No %s value for build" % f #provide a few default values data.setdefault('state',koji.BUILD_STATES['COMPLETE']) data.setdefault('completion_time', 'NOW') data.setdefault('owner',context.session.user_id) data.setdefault('task_id',None) data.setdefault('volume_id', 0) #check for existing build # TODO - table lock? q="""SELECT id,state,task_id FROM build WHERE pkg_id=%(pkg_id)d AND version=%(version)s AND release=%(release)s FOR UPDATE""" row = _fetchSingle(q, data) if row: id, state, task_id = row data['id'] = id koji.plugin.run_callbacks('preBuildStateChange', attribute='state', old=state, new=data['state'], info=data) st_desc = koji.BUILD_STATES[state] if st_desc == 'BUILDING': # check to see if this is the controlling task if data['state'] == state and data.get('task_id','') == task_id: #the controlling task must have restarted (and called initBuild again) return id raise koji.GenericError, "Build already in progress (task %d)" % task_id # TODO? - reclaim 'stale' builds (state=BUILDING and task_id inactive) if st_desc in ('FAILED','CANCELED'): #should be ok to replace update = """UPDATE build SET state=%(state)i,task_id=%(task_id)s, owner=%(owner)s,completion_time=%(completion_time)s,create_event=get_event() WHERE id = %(id)i""" _dml(update, data) koji.plugin.run_callbacks('postBuildStateChange', attribute='state', old=state, new=data['state'], info=data) return id raise koji.GenericError, "Build already exists (id=%d, state=%s): %r" \ % (id, st_desc, data) else: koji.plugin.run_callbacks('preBuildStateChange', attribute='state', old=None, new=data['state'], info=data) #insert the new data insert_data = dslice(data, ['pkg_id', 'version', 'release', 'epoch', 'state', 'volume_id', 'task_id', 'owner', 'completion_time']) data['id'] = insert_data['id'] = _singleValue("SELECT nextval('build_id_seq')") insert = InsertProcessor('build', data=insert_data) insert.execute() koji.plugin.run_callbacks('postBuildStateChange', attribute='state', old=None, new=data['state'], info=data) #return build_id return data['id'] def check_noarch_rpms(basepath, rpms): """ If rpms contains any noarch rpms with identical names, run rpmdiff against the duplicate rpms. Return the list of rpms with any duplicate entries removed (only the first entry will be retained). """ result = [] noarch_rpms = {} for relpath in rpms: if relpath.endswith('.noarch.rpm'): filename = os.path.basename(relpath) if noarch_rpms.has_key(filename): # duplicate found, add it to the duplicate list # but not the result list noarch_rpms[filename].append(relpath) else: noarch_rpms[filename] = [relpath] result.append(relpath) else: result.append(relpath) for noarch_list in noarch_rpms.values(): rpmdiff(basepath, noarch_list) return result def import_build(srpm, rpms, brmap=None, task_id=None, build_id=None, logs=None): """Import a build into the database (single transaction) Files must be uploaded and specified with path relative to the workdir Args: srpm - relative path of srpm rpms - list of rpms (relative paths) brmap - dictionary mapping [s]rpms to buildroot ids task_id - associate the build with a task build_id - build is a finalization of existing entry """ if brmap is None: brmap = {} koji.plugin.run_callbacks('preImport', type='build', srpm=srpm, rpms=rpms, brmap=brmap, task_id=task_id, build_id=build_id, build=None, logs=logs) uploadpath = koji.pathinfo.work() #verify files exist for relpath in [srpm] + rpms: fn = "%s/%s" % (uploadpath,relpath) if not os.path.exists(fn): raise koji.GenericError, "no such file: %s" % fn rpms = check_noarch_rpms(uploadpath, rpms) #verify buildroot ids from brmap found = {} for br_id in brmap.values(): if found.has_key(br_id): continue found[br_id] = 1 #this will raise an exception if the buildroot id is invalid BuildRoot(br_id) #read srpm info fn = "%s/%s" % (uploadpath,srpm) build = koji.get_header_fields(fn,('name','version','release','epoch', 'sourcepackage')) if build['sourcepackage'] != 1: raise koji.GenericError, "not a source package: %s" % fn build['task_id'] = task_id if build_id is None: build_id = new_build(build) binfo = get_build(build_id, strict=True) else: #build_id was passed in - sanity check binfo = get_build(build_id, strict=True) st_complete = koji.BUILD_STATES['COMPLETE'] koji.plugin.run_callbacks('preBuildStateChange', attribute='state', old=binfo['state'], new=st_complete, info=binfo) for key in ('name','version','release','epoch','task_id'): if build[key] != binfo[key]: raise koji.GenericError, "Unable to complete build: %s mismatch (build: %s, rpm: %s)" % (key, binfo[key], build[key]) if binfo['state'] != koji.BUILD_STATES['BUILDING']: raise koji.GenericError, "Unable to complete build: state is %s" \ % koji.BUILD_STATES[binfo['state']] #update build state update = """UPDATE build SET state=%(st_complete)i,completion_time=NOW() WHERE id=%(build_id)i""" _dml(update,locals()) koji.plugin.run_callbacks('postBuildStateChange', attribute='state', old=binfo['state'], new=st_complete, info=binfo) # now to handle the individual rpms for relpath in [srpm] + rpms: fn = "%s/%s" % (uploadpath,relpath) rpminfo = import_rpm(fn, binfo, brmap.get(relpath)) import_rpm_file(fn, binfo, rpminfo) add_rpm_sig(rpminfo['id'], koji.rip_rpm_sighdr(fn)) if logs: for key, files in logs.iteritems(): if not key: key = None for relpath in files: fn = "%s/%s" % (uploadpath,relpath) import_build_log(fn, binfo, subdir=key) koji.plugin.run_callbacks('postImport', type='build', srpm=srpm, rpms=rpms, brmap=brmap, task_id=task_id, build_id=build_id, build=binfo, logs=logs) return binfo def import_rpm(fn,buildinfo=None,brootid=None,wrapper=False): """Import a single rpm into the database Designed to be called from import_build. """ if not os.path.exists(fn): raise koji.GenericError, "no such file: %s" % fn #read rpm info hdr = koji.get_rpm_header(fn) rpminfo = koji.get_header_fields(hdr,['name','version','release','epoch', 'sourcepackage','arch','buildtime','sourcerpm']) if rpminfo['sourcepackage'] == 1: rpminfo['arch'] = "src" #sanity check basename basename = os.path.basename(fn) expected = "%(name)s-%(version)s-%(release)s.%(arch)s.rpm" % rpminfo if basename != expected: raise koji.GenericError, "bad filename: %s (expected %s)" % (basename,expected) if buildinfo is None: #figure it out for ourselves if rpminfo['sourcepackage'] == 1: buildinfo = get_build(rpminfo, strict=False) if not buildinfo: # create a new build build_id = new_build(rpminfo) buildinfo = get_build(build_id, strict=True) else: #figure it out from sourcerpm string buildinfo = get_build(koji.parse_NVRA(rpminfo['sourcerpm'])) if buildinfo is None: #XXX - handle case where package is not a source rpm # and we still need to create a new build raise koji.GenericError, 'No matching build' state = koji.BUILD_STATES[buildinfo['state']] if state in ('FAILED', 'CANCELED', 'DELETED'): nvr = "%(name)s-%(version)s-%(release)s" % buildinfo raise koji.GenericError, "Build is %s: %s" % (state, nvr) elif not wrapper: # only enforce the srpm name matching the build for non-wrapper rpms srpmname = "%(name)s-%(version)s-%(release)s.src.rpm" % buildinfo #either the sourcerpm field should match the build, or the filename #itself (for the srpm) if rpminfo['sourcepackage'] != 1: if rpminfo['sourcerpm'] != srpmname: raise koji.GenericError, "srpm mismatch for %s: %s (expected %s)" \ % (fn,rpminfo['sourcerpm'],srpmname) elif basename != srpmname: raise koji.GenericError, "srpm mismatch for %s: %s (expected %s)" \ % (fn,basename,srpmname) #add rpminfo entry rpminfo['id'] = _singleValue("""SELECT nextval('rpminfo_id_seq')""") rpminfo['build_id'] = buildinfo['id'] rpminfo['size'] = os.path.getsize(fn) rpminfo['payloadhash'] = koji.hex_string(hdr[rpm.RPMTAG_SIGMD5]) rpminfo['buildroot_id'] = brootid rpminfo['external_repo_id'] = 0 koji.plugin.run_callbacks('preImport', type='rpm', rpm=rpminfo, build=buildinfo, filepath=fn) data = rpminfo.copy() del data['sourcepackage'] del data['sourcerpm'] insert = InsertProcessor('rpminfo', data=data) insert.execute() koji.plugin.run_callbacks('postImport', type='rpm', rpm=rpminfo, build=buildinfo, filepath=fn) #extra fields for return rpminfo['build'] = buildinfo rpminfo['brootid'] = brootid return rpminfo def add_external_rpm(rpminfo, external_repo, strict=True): """Add an external rpm entry to the rpminfo table Differences from import_rpm: - entry will have non-zero external_repo_id - entry will not reference a build - rpm not available to us -- the necessary data is passed in The rpminfo arg should contain the following fields: - name, version, release, epoch, arch, payloadhash, size, buildtime Returns info as get_rpm """ # [!] Calling function should perform access checks #sanity check rpminfo dtypes = ( ('name', basestring), ('version', basestring), ('release', basestring), ('epoch', (int, types.NoneType)), ('arch', basestring), ('payloadhash', str), ('size', int), ('buildtime', (int, long))) for field, allowed in dtypes: if not rpminfo.has_key(field): raise koji.GenericError, "%s field missing: %r" % (field, rpminfo) if not isinstance(rpminfo[field], allowed): #this will catch unwanted NULLs raise koji.GenericError, "Invalid value for %s: %r" % (field, rpminfo[field]) #TODO: more sanity checks for payloadhash #Check to see if we have it data = rpminfo.copy() data['location'] = external_repo previous = get_rpm(data, strict=False) if previous: disp = "%(name)s-%(version)s-%(release)s.%(arch)s@%(external_repo_name)s" % previous if strict: raise koji.GenericError, "external rpm already exists: %s" % disp elif data['payloadhash'] != previous['payloadhash']: raise koji.GenericError, "hash changed for external rpm: %s (%s -> %s)" \ % (disp, previous['payloadhash'], data['payloadhash']) else: return previous #add rpminfo entry rpminfo['external_repo_id'] = get_external_repo_id(external_repo, strict=True) rpminfo['id'] = _singleValue("""SELECT nextval('rpminfo_id_seq')""") q = """INSERT INTO rpminfo (id, build_id, buildroot_id, name, version, release, epoch, arch, external_repo_id, payloadhash, size, buildtime) VALUES (%(id)i, NULL, NULL, %(name)s, %(version)s, %(release)s, %(epoch)s, %(arch)s, %(external_repo_id)i, %(payloadhash)s, %(size)i, %(buildtime)i) """ _dml(q, rpminfo) return get_rpm(rpminfo['id']) def import_build_log(fn, buildinfo, subdir=None): """Move a logfile related to a build to the right place""" logdir = koji.pathinfo.build_logs(buildinfo) if subdir: logdir = "%s/%s" % (logdir, subdir) koji.ensuredir(logdir) final_path = "%s/%s" % (logdir, os.path.basename(fn)) if os.path.exists(final_path): raise koji.GenericError("Error importing build log. %s already exists." % final_path) if os.path.islink(fn) or not os.path.isfile(fn): raise koji.GenericError("Error importing build log. %s is not a regular file." % fn) os.rename(fn,final_path) os.symlink(final_path,fn) def import_rpm_file(fn,buildinfo,rpminfo): """Move the rpm file into the proper place Generally this is done after the db import """ final_path = "%s/%s" % (koji.pathinfo.build(buildinfo),koji.pathinfo.rpm(rpminfo)) _import_archive_file(fn, os.path.dirname(final_path)) def import_build_in_place(build): """Import a package already in the packages directory This is used for bootstrapping the database Parameters: build: a dictionary with fields: name, version, release """ # Only an admin may do this context.session.assertPerm('admin') prev = get_build(build) if prev is not None: state = koji.BUILD_STATES[prev['state']] if state == 'COMPLETE': log_error("Skipping build %r, already in db" % build) # TODO - check contents against db return prev['id'] elif state not in ('FAILED', 'CANCELED'): raise koji.GenericError, "build already exists (%s): %r" % (state, build) #otherwise try to reimport bdir = koji.pathinfo.build(build) srpm = None rpms = [] srpmname = "%(name)s-%(version)s-%(release)s.src.rpm" % build # look for srpm first srcdir = bdir + "/src" if os.path.isdir(srcdir): for basename in os.listdir(srcdir): if basename != srpmname: raise koji.GenericError, "unexpected file: %s" % basename srpm = "%s/%s" % (srcdir,basename) for arch in os.listdir(bdir): if arch == 'src': #already done that continue if arch == "data": continue adir = "%s/%s" % (bdir,arch) if not os.path.isdir(adir): raise koji.GenericError, "out of place file: %s" % adir for basename in os.listdir(adir): fn = "%s/%s" % (adir,basename) if not os.path.isfile(fn): raise koji.GenericError, "unexpected non-regular file: %s" % fn if fn[-4:] != '.rpm': raise koji.GenericError, "out of place file: %s" % adir #check sourcerpm field hdr = koji.get_rpm_header(fn) sourcerpm = hdr[rpm.RPMTAG_SOURCERPM] if sourcerpm != srpmname: raise koji.GenericError, "srpm mismatch for %s: %s (expected %s)" \ % (fn,sourcerpm,srpmname) rpms.append(fn) koji.plugin.run_callbacks('preImport', type='build', in_place=True, srpm=srpm, rpms=rpms) # actually import buildinfo = None if srpm is not None: rpminfo = import_rpm(srpm) add_rpm_sig(rpminfo['id'], koji.rip_rpm_sighdr(srpm)) buildinfo = rpminfo['build'] # file already in place for fn in rpms: rpminfo = import_rpm(fn,buildinfo) add_rpm_sig(rpminfo['id'], koji.rip_rpm_sighdr(fn)) #update build state build_id = buildinfo['id'] st_complete = koji.BUILD_STATES['COMPLETE'] koji.plugin.run_callbacks('preBuildStateChange', attribute='state', old=buildinfo['state'], new=st_complete, info=buildinfo) update = """UPDATE build SET state=%(st_complete)i,completion_time=NOW() WHERE id=%(build_id)i""" _dml(update,locals()) koji.plugin.run_callbacks('postBuildStateChange', attribute='state', old=buildinfo['state'], new=st_complete, info=buildinfo) koji.plugin.run_callbacks('postImport', type='build', in_place=True, srpm=srpm, rpms=rpms) return build_id def _import_wrapper(task_id, build_info, rpm_results): """Helper function to import wrapper rpms for a Maven build""" rpm_buildroot_id = rpm_results['buildroot_id'] rpm_task_dir = koji.pathinfo.task(task_id) for rpm_path in [rpm_results['srpm']] + rpm_results['rpms']: rpm_path = os.path.join(rpm_task_dir, rpm_path) rpm_info = import_rpm(rpm_path, build_info, rpm_buildroot_id, wrapper=True) import_rpm_file(rpm_path, build_info, rpm_info) add_rpm_sig(rpm_info['id'], koji.rip_rpm_sighdr(rpm_path)) for log in rpm_results['logs']: # assume we're only importing noarch packages import_build_log(os.path.join(rpm_task_dir, log), build_info, subdir='noarch') def get_archive_types(): """Return a list of all supported archivetypes""" select = """SELECT id, name, description, extensions FROM archivetypes ORDER BY id""" return _multiRow(select, {}, ('id', 'name', 'description', 'extensions')) def _get_archive_type_by_name(name, strict=True): select = """SELECT id, name, description, extensions FROM archivetypes WHERE name = %(name)s""" return _singleRow(select, locals(), ('id', 'name', 'description', 'extensions'), strict) def _get_archive_type_by_id(type_id, strict=False): select = """SELECT id, name, description, extensions FROM archivetypes WHERE id = %(type_id)i""" return _singleRow(select, locals(), ('id', 'name', 'description', 'extensions'), strict) def get_archive_type(filename=None, type_name=None, type_id=None, strict=False): """ Get the archive type for the given filename, type_name, or type_id. """ if type_id: return _get_archive_type_by_id(type_id, strict) elif type_name: return _get_archive_type_by_name(type_name, strict) elif filename: # we handle that below pass else: raise koji.GenericError, 'one of filename, type_name, or type_id must be specified' parts = filename.split('.') for start in range(len(parts)-1, -1, -1): ext = '.'.join(parts[start:]) select = r"""SELECT id, name, description, extensions FROM archivetypes WHERE extensions ~ E'\\m%s\\M'""" % ext results = _multiRow(select, locals(), ('id', 'name', 'description', 'extensions')) if len(results) == 1: return results[0] elif len(results) > 1: # this should never happen, and is a misconfiguration in the database raise koji.GenericError, 'multiple matches for file extension: %s' % ext else: if strict: raise koji.GenericError, 'unsupported file extension: %s' % ext else: return None def new_maven_build(build, maven_info): """ Add Maven metadata to an existing build. maven_info must contain the 'group_id', 'artifact_id', and 'version' keys. """ maven_info = maven_info.copy() current_maven_info = get_maven_build(build) if current_maven_info: # already exists, verify that it matches for field in ('group_id', 'artifact_id', 'version'): if current_maven_info[field] != maven_info[field]: raise koji.BuildError, '%s mismatch (current: %s, new: %s)' % \ (field, current_maven_info[field], maven_info[field]) else: maven_info['build_id'] = build['id'] insert = """INSERT INTO maven_builds (build_id, group_id, artifact_id, version) VALUES (%(build_id)i, %(group_id)s, %(artifact_id)s, %(version)s)""" _dml(insert, maven_info) def new_win_build(build_info, win_info): """ Add Windows metadata to an existing build. win_info must contain a 'platform' key. """ build_id = build_info['id'] current = get_win_build(build_id, strict=False) if current: if current['platform'] != win_info['platform']: update = UpdateProcessor('win_builds', clauses=['build_id=%(build_id)i'], values={'build_id': build_id}) update.set(platform=win_info['platform']) update.execute() else: insert = InsertProcessor('win_builds') insert.set(build_id=build_id) insert.set(platform=win_info['platform']) insert.execute() def new_image_build(build_info): """ Added Image metadata to an existing build. This is just the buildid so that we can distinguish image builds from other types. """ # We don't have to worry about updating an image build because the id is # the only thing we care about, and that should never change if a build # fails first and succeeds later on a resubmission. query = QueryProcessor(tables=('image_builds',), columns=('build_id',), clauses=('build_id = %(build_id)i',), values={'build_id': build_info['id']}) result = query.executeOne() if not result: insert = InsertProcessor('image_builds') insert.set(build_id=build_info['id']) insert.execute() def old_image_data(old_image_id): """Return old image data for given id""" values = dict(img_id = old_image_id) tables = ['imageinfo'] fields = ['id', 'task_id', 'filename', 'filesize', 'arch', 'hash', 'mediatype'] clauses = ['imageinfo.id = %(img_id)i'] query = QueryProcessor(columns=fields, tables=tables, clauses=clauses, values=values) ret = query.executeOne() if not ret: raise koji.GenericError, 'no old image with ID: %i' % imageID return ret def check_old_image_files(old): """Check for existence of files for old image data""" parts = [koji.pathinfo.topdir, 'images'] if old['mediatype'] == 'LiveCD ISO': parts.append('livecd') else: parts.append('appliance') parts.extend([str(old['id'] % 10000), str(old['id'])]) img_dir = os.path.join(*parts) img_path = os.path.join(img_dir, old['filename']) if not os.path.exists(img_path): raise koji.GenericError, "Image file is missing: %s" % img_path if os.path.islink(img_path): raise koji.GenericError, "Image file is a symlink: %s" % img_path if not os.path.isfile(img_path): raise koji.GenericError, "Not a regular file: %s" % img_path img_size = os.path.getsize(img_path) if img_size != old['filesize']: raise koji.GenericError, "Size mismatch for %s (%i != %i)" % \ (img_path, img_size, old['filesize']) # old images always used sha256 hashes sha256sum = hashlib.sha256() image_fo = file(img_path, 'r') while True: data = image_fo.read(1048576) sha256sum.update(data) if not len(data): break img_hash = sha256sum.hexdigest() if img_hash != old['hash']: raise koji.GenericError, "Hash mismatch for %s (%i != %i)" % \ (img_path, img_hash, old['hash']) # file looks ok old['path'] = img_path old['dir'] = img_dir # check for extra files, noting accompanying xml file expected = [old['filename'], 'data'] extra = [] for out_file in os.listdir(img_dir): if out_file in expected: pass elif out_file.endswith('.xml') and old['mediatype'] != 'LiveCD ISO': if 'xmlfile' in old: extra.append(out_file) else: old['xmlfile'] = out_file else: extra.append(out_file) if extra: raise koji.GenericError, "Unexpected files under %s: %r" % (img_dir, extra) def import_old_image(old, name, version): """Import old image data into the new data model""" # note: since this is a one-time migration tool, we are not triggering callbacks # ^ XXX: except that some functions we call do # build entry task = Task(old['task_id']) binfo = dict(name=name, version=version) binfo['release'] = get_next_release(binfo) binfo['epoch'] = 0 binfo['task_id'] = old['task_id'] binfo['owner'] = task.getOwner() binfo['state'] = koji.BUILD_STATES['COMPLETE'] build_id = new_build(binfo) binfo['id'] = build_id new_image_build(binfo) # figure out buildroot id # the old schema did not track buildroot directly, so we have to infer # by task id. # If the task had multiple buildroots, we chose the latest query = QueryProcessor(columns=['id'], tables=['buildroot'], clauses=['task_id=%(task_id)i'], values=old, opts={'order': '-id', 'limit': 1}) br_id = query.singleValue(strict=False) # archives archives = [] for fn in [old['filename'], old.get('xmlfile')]: if not fn: continue fullpath = os.path.join(old['dir'], fn) archivetype = get_archive_type(filename=fn) logger.debug('image type we are migrating is: %s' % archivetype) if not archivetype: raise koji.BuildError, 'Unsupported image type' imgdata = dict(arch=old['arch']) archives.append(import_archive(fullpath, binfo, 'image', imgdata, buildroot_id=br_id)) # deal with contents listing archive_id = archives[0]['id'] logger.debug('root archive id is %s' % archive_id) query = QueryProcessor(columns=['rpm_id'], tables=['imageinfo_listing'], clauses=['image_id=%(id)i'], values=old, opts={'asList': True}) rpm_ids = [r[0] for r in query.execute()] insert = InsertProcessor('image_listing') insert.set(image_id=archive_id) for rpm_id in rpm_ids: insert.set(rpm_id=rpm_id) insert.execute() logger.info('updated image_listing') # grab old logs old_log_dir = os.path.join(old['dir'], 'data', 'logs', old['arch']) logdir = os.path.join(koji.pathinfo.build(binfo), 'data/logs/image') for logfile in os.listdir(old_log_dir): logsrc = os.path.join(old_log_dir, logfile) koji.ensuredir(logdir) final_path = os.path.join(logdir, logfile) if os.path.exists(final_path): raise koji.GenericError("Error importing build log. %s already exists." % final_path) if os.path.islink(logsrc) or not os.path.isfile(logsrc): raise koji.GenericError("Error importing build log. %s is not a regular file." % logsrc) os.rename(logsrc, final_path) os.symlink(final_path, logsrc) return binfo def import_archive(filepath, buildinfo, type, typeInfo, buildroot_id=None): """ Import an archive file and associate it with a build. The archive can be any non-rpm filetype supported by Koji. filepath: full path to the archive file buildinfo: dict of information about the build to associate the archive with (as returned by getBuild()) type: type of the archive being imported. Currently supported archive types: maven, win, image typeInfo: dict of type-specific information buildroot_id: the id of the buildroot the archive was built in (may be null) """ if not os.path.exists(filepath): raise koji.GenericError, 'no such file: %s' % filepath archiveinfo = {'buildroot_id': buildroot_id} filename = koji.fixEncoding(os.path.basename(filepath)) archiveinfo['filename'] = filename archivetype = get_archive_type(filename, strict=True) archiveinfo['type_id'] = archivetype['id'] archiveinfo['build_id'] = buildinfo['id'] archiveinfo['size'] = os.path.getsize(filepath) archivefp = file(filepath) m = md5_constructor() while True: contents = archivefp.read(8192) if not contents: break m.update(contents) archivefp.close() archiveinfo['checksum'] = m.hexdigest() archiveinfo['checksum_type'] = koji.CHECKSUM_TYPES['md5'] koji.plugin.run_callbacks('preImport', type='archive', archive=archiveinfo, build=buildinfo, build_type=type, filepath=filepath) # XXX verify that the buildroot is associated with a task that's associated with the build archive_id = _singleValue("SELECT nextval('archiveinfo_id_seq')", strict=True) archiveinfo['id'] = archive_id insert = InsertProcessor('archiveinfo', data=archiveinfo) insert.execute() if type == 'maven': maveninfo = get_maven_build(buildinfo, strict=True) if archivetype['name'] == 'pom': pom_info = koji.parse_pom(filepath) pom_maveninfo = koji.pom_to_maven_info(pom_info) # sanity check: Maven info from pom must match the user-supplied typeInfo if koji.mavenLabel(pom_maveninfo) != koji.mavenLabel(typeInfo): raise koji.BuildError, 'Maven info from .pom file (%s) does not match user-supplied typeInfo (%s)' % \ (koji.mavenLabel(pom_maveninfo), koji.mavenLabel(typeInfo)) # sanity check: the filename of the pom file must match -.pom if filename != '%(artifact_id)s-%(version)s.pom' % typeInfo: raise koji.BuildError, 'Maven info (%s) is not consistent with pom filename (%s)' % \ (koji.mavenLabel(typeInfo), filename) insert = InsertProcessor('maven_archives', data=dslice(typeInfo, ('group_id', 'artifact_id', 'version'))) insert.set(archive_id=archive_id) insert.execute() # move the file to it's final destination mavendir = os.path.join(koji.pathinfo.mavenbuild(buildinfo), koji.pathinfo.mavenrepo(typeInfo)) _import_archive_file(filepath, mavendir) _generate_maven_metadata(mavendir) elif type == 'win': wininfo = get_win_build(buildinfo, strict=True) insert = InsertProcessor('win_archives') insert.set(archive_id=archive_id) relpath = typeInfo['relpath'].strip('/') insert.set(relpath=relpath) if not typeInfo['platforms']: raise koji.BuildError, 'no value for platforms' insert.set(platforms=' '.join(typeInfo['platforms'])) if typeInfo['flags']: insert.set(flags=' '.join(typeInfo['flags'])) insert.execute() destdir = koji.pathinfo.winbuild(buildinfo) if relpath: destdir = os.path.join(destdir, relpath) _import_archive_file(filepath, destdir) elif type == 'image': insert = InsertProcessor('image_archives') insert.set(archive_id=archive_id) insert.set(arch=typeInfo['arch']) insert.execute() imgdir = os.path.join(koji.pathinfo.imagebuild(buildinfo)) _import_archive_file(filepath, imgdir) # import log files? else: raise koji.BuildError, 'unsupported archive type: %s' % type archiveinfo = get_archive(archive_id, strict=True) koji.plugin.run_callbacks('postImport', type='archive', archive=archiveinfo, build=buildinfo, build_type=type, filepath=filepath) return archiveinfo def _import_archive_file(filepath, destdir): """ Move the file to it's final location on the filesystem. filepath must exist, destdir will be created if it doesn not exist. A symlink pointing from the old location to the new location will be created. """ final_path = "%s/%s" % (destdir, koji.fixEncoding(os.path.basename(filepath))) if os.path.exists(final_path): raise koji.GenericError("Error importing archive file, %s already exists" % final_path) if os.path.islink(filepath) or not os.path.isfile(filepath): raise koji.GenericError("Error importing archive file, %s is not a regular file" % filepath) koji.ensuredir(destdir) os.rename(filepath, final_path) os.symlink(final_path, filepath) def _generate_maven_metadata(mavendir): """ Generate md5 and sha1 sums for every file in mavendir, if it doesn't already exist. Checksum files will be named .md5 and .sha1. """ mavenfiles = os.listdir(mavendir) for mavenfile in mavenfiles: if os.path.splitext(mavenfile)[1] in ('.md5', '.sha1'): continue if not os.path.isfile('%s/%s' % (mavendir, mavenfile)): continue for ext, sum_constr in (('.md5', md5_constructor), ('.sha1', sha1_constructor)): sumfile = mavenfile + ext if sumfile not in mavenfiles: sum = sum_constr() fobj = file('%s/%s' % (mavendir, mavenfile)) while True: content = fobj.read(8192) if not content: break sum.update(content) fobj.close() sumobj = file('%s/%s' % (mavendir, sumfile), 'w') sumobj.write(sum.hexdigest()) sumobj.close() def add_rpm_sig(an_rpm, sighdr): """Store a signature header for an rpm""" #calling function should perform permission checks, if applicable rinfo = get_rpm(an_rpm, strict=True) if rinfo['external_repo_id']: raise koji.GenericError, "Not an internal rpm: %s (from %s)" \ % (an_rpm, rinfo['external_repo_name']) binfo = get_build(rinfo['build_id']) builddir = koji.pathinfo.build(binfo) if not os.path.isdir(builddir): raise koji.GenericError, "No such directory: %s" % builddir rawhdr = koji.RawHeader(sighdr) sigmd5 = koji.hex_string(rawhdr.get(koji.RPM_SIGTAG_MD5)) if sigmd5 == rinfo['payloadhash']: # note: payloadhash is a misnomer, that field is populated with sigmd5. sigkey = rawhdr.get(koji.RPM_SIGTAG_GPG) if not sigkey: sigkey = rawhdr.get(koji.RPM_SIGTAG_PGP) else: # In older rpms, this field in the signature header does not actually match # sigmd5 (I think rpmlib pulls it from SIGTAG_GPG). Anyway, this # sanity check fails incorrectly for those rpms, so we fall back to # a somewhat more expensive check. # ALSO, for these older rpms, the layout of SIGTAG_GPG is different too, so # we need to pull that differently as well rpm_path = "%s/%s" % (builddir, koji.pathinfo.rpm(rinfo)) sigmd5, sigkey = _scan_sighdr(sighdr, rpm_path) sigmd5 = koji.hex_string(sigmd5) if sigmd5 != rinfo['payloadhash']: nvra = "%(name)s-%(version)s-%(release)s.%(arch)s" % rinfo raise koji.GenericError, "wrong md5 for %s: %s" % (nvra, sigmd5) if not sigkey: sigkey = '' #we use the sigkey='' to represent unsigned in the db (so that uniqueness works) else: sigkey = koji.get_sigpacket_key_id(sigkey) sighash = md5_constructor(sighdr).hexdigest() rpm_id = rinfo['id'] # - db entry q = """SELECT sighash FROM rpmsigs WHERE rpm_id=%(rpm_id)i AND sigkey=%(sigkey)s""" rows = _fetchMulti(q, locals()) if rows: #TODO[?] - if sighash is the same, handle more gracefully nvra = "%(name)s-%(version)s-%(release)s.%(arch)s" % rinfo raise koji.GenericError, "Signature already exists for package %s, key %s" % (nvra, sigkey) insert = """INSERT INTO rpmsigs(rpm_id, sigkey, sighash) VALUES (%(rpm_id)s, %(sigkey)s, %(sighash)s)""" _dml(insert, locals()) # - write to fs sigpath = "%s/%s" % (builddir, koji.pathinfo.sighdr(rinfo, sigkey)) koji.ensuredir(os.path.dirname(sigpath)) fo = file(sigpath, 'wb') fo.write(sighdr) fo.close() def _scan_sighdr(sighdr, fn): """Splices sighdr with other headers from fn and queries (no payload)""" # This is hackish, but it works if not os.path.exists(fn): raise koji.GenericError, "No such path: %s" % fn if not os.path.isfile(fn): raise koji.GenericError, "Not a regular file: %s" % fn #XXX should probably add an option to splice_rpm_sighdr to handle this instead sig_start, sigsize = koji.find_rpm_sighdr(fn) hdr_start = sig_start + sigsize hdrsize = koji.rpm_hdr_size(fn, hdr_start) inp = file(fn, 'rb') outp = tempfile.TemporaryFile(mode='w+b') #before signature outp.write(inp.read(sig_start)) #signature outp.write(sighdr) inp.seek(sigsize, 1) #main header outp.write(inp.read(hdrsize)) inp.close() outp.seek(0,0) ts = rpm.TransactionSet() ts.setVSFlags(rpm._RPMVSF_NOSIGNATURES|rpm._RPMVSF_NODIGESTS) #(we have no payload, so verifies would fail otherwise) hdr = ts.hdrFromFdno(outp.fileno()) outp.close() sig = hdr[rpm.RPMTAG_SIGGPG] if not sig: sig = hdr[rpm.RPMTAG_SIGPGP] return hdr[rpm.RPMTAG_SIGMD5], sig def check_rpm_sig(an_rpm, sigkey, sighdr): #verify that the provided signature header matches the key and rpm rinfo = get_rpm(an_rpm, strict=True) binfo = get_build(rinfo['build_id']) builddir = koji.pathinfo.build(binfo) rpm_path = "%s/%s" % (builddir, koji.pathinfo.rpm(rinfo)) if not os.path.exists(rpm_path): raise koji.GenericError, "No such path: %s" % rpm_path if not os.path.isfile(rpm_path): raise koji.GenericError, "Not a regular file: %s" % rpm_path fd, temp = tempfile.mkstemp() os.close(fd) try: koji.splice_rpm_sighdr(sighdr, rpm_path, temp) ts = rpm.TransactionSet() ts.setVSFlags(0) #full verify fo = file(temp, 'rb') hdr = ts.hdrFromFdno(fo.fileno()) fo.close() except: try: os.unlink(temp) except: pass raise raw_key = hdr[rpm.RPMTAG_SIGGPG] if not raw_key: raw_key = hdr[rpm.RPMTAG_SIGPGP] if not raw_key: found_key = None else: found_key = koji.get_sigpacket_key_id(raw_key) if sigkey != found_key: raise koji.GenericError, "Signature key mismatch: got %s, expected %s" \ % (found_key, sigkey) os.unlink(temp) def query_rpm_sigs(rpm_id=None, sigkey=None, queryOpts=None): fields = ('rpm_id', 'sigkey', 'sighash') clauses = [] if rpm_id is not None: clauses.append("rpm_id=%(rpm_id)s") if sigkey is not None: clauses.append("sigkey=%(sigkey)s") query = QueryProcessor(columns=fields, tables=('rpmsigs',), clauses=clauses, values=locals(), opts=queryOpts) return query.execute() def write_signed_rpm(an_rpm, sigkey, force=False): """Write a signed copy of the rpm""" rinfo = get_rpm(an_rpm, strict=True) if rinfo['external_repo_id']: raise koji.GenericError, "Not an internal rpm: %s (from %s)" \ % (an_rpm, rinfo['external_repo_name']) binfo = get_build(rinfo['build_id']) nvra = "%(name)s-%(version)s-%(release)s.%(arch)s" % rinfo builddir = koji.pathinfo.build(binfo) rpm_path = "%s/%s" % (builddir, koji.pathinfo.rpm(rinfo)) if not os.path.exists(rpm_path): raise koji.GenericError, "No such path: %s" % rpm_path if not os.path.isfile(rpm_path): raise koji.GenericError, "Not a regular file: %s" % rpm_path #make sure we have it in the db rpm_id = rinfo['id'] q = """SELECT sighash FROM rpmsigs WHERE rpm_id=%(rpm_id)i AND sigkey=%(sigkey)s""" row = _fetchSingle(q, locals()) if not row: raise koji.GenericError, "No cached signature for package %s, key %s" % (nvra, sigkey) (sighash,) = row signedpath = "%s/%s" % (builddir, koji.pathinfo.signed(rinfo, sigkey)) if os.path.exists(signedpath): if not force: #already present return else: os.unlink(signedpath) sigpath = "%s/%s" % (builddir, koji.pathinfo.sighdr(rinfo, sigkey)) fo = file(sigpath, 'rb') sighdr = fo.read() fo.close() koji.ensuredir(os.path.dirname(signedpath)) koji.splice_rpm_sighdr(sighdr, rpm_path, signedpath) def query_history(tables=None, **kwargs): """Returns history data from various tables that support it tables: list of versioned tables to search, no value implies all tables valid entries: user_perms, user_groups, tag_inheritance, tag_config, build_target_config, external_repo_config, tag_external_repos, tag_listing, tag_packages, group_config, group_req_listing, group_package_listing - Time options - times are specified as an integer event or a string timestamp time options are valid for all record types before: either created or revoked before timestamp after: either created or revoked after timestamp beforeEvent: either created or revoked before event id afterEvent: either created or revoked after event id - other versioning options- active: select by active status editor: record created or revoked by user - table-specific search options - use of these options will implicitly limit the search to applicable tables package: only for given package build: only for given build tag: only for given tag user: only affecting a given user permission: only relating to a given permission external_repo: only relateing to an external repo build_target: only relating to a build target group: only relating to a (comps) group) """ common_fields = { #fields:aliases common to all versioned tables 'active' : 'active', 'create_event' : 'create_event', 'revoke_event' : 'revoke_event', 'creator_id' : 'creator_id', 'revoker_id' : 'revoker_id', } common_joins = [ "events AS ev1 ON ev1.id = create_event", "LEFT OUTER JOIN events AS ev2 ON ev2.id = revoke_event", "users AS creator ON creator.id = creator_id", "LEFT OUTER JOIN users AS revoker ON revoker.id = revoker_id", ] common_joined_fields = { 'creator.name' : 'creator_name', 'revoker.name' : 'revoker_name', 'EXTRACT(EPOCH FROM ev1.time) AS create_ts' : 'create_ts', 'EXTRACT(EPOCH FROM ev2.time) AS revoke_ts' : 'revoke_ts', } table_fields = { 'user_perms' : ['user_id', 'perm_id'], 'user_groups' : ['user_id', 'group_id'], 'tag_inheritance' : ['tag_id', 'parent_id', 'priority', 'maxdepth', 'intransitive', 'noconfig', 'pkg_filter'], 'tag_config' : ['tag_id', 'arches', 'perm_id', 'locked', 'maven_support', 'maven_include_all'], 'build_target_config' : ['build_target_id', 'build_tag', 'dest_tag'], 'external_repo_config' : ['external_repo_id', 'url'], 'tag_external_repos' : ['tag_id', 'external_repo_id', 'priority'], 'tag_listing' : ['build_id', 'tag_id'], 'tag_packages' : ['package_id', 'tag_id', 'owner', 'blocked', 'extra_arches'], 'group_config' : ['group_id', 'tag_id', 'blocked', 'exported', 'display_name', 'is_default', 'uservisible', 'description', 'langonly', 'biarchonly'], 'group_req_listing' : ['group_id', 'tag_id', 'req_id', 'blocked', 'type', 'is_metapkg'], 'group_package_listing' : ['group_id', 'tag_id', 'package', 'blocked', 'type', 'basearchonly', 'requires'], } name_joins = { #joins triggered by table fields for name lookup #field : [table, join-alias, alias] 'user_id' : ['users', 'users', 'user'], 'perm_id' : ['permissions', 'permission'], #group_id is overloaded (special case below) 'tag_id' : ['tag'], 'parent_id' : ['tag', 'parent'], 'build_target_id' : ['build_target'], 'build_tag' : ['tag', 'build_tag'], 'dest_tag' : ['tag', 'dest_tag'], 'external_repo_id' : ['external_repo'], # build_id is special cased 'package_id' : ['package'], 'owner' : ['users', 'owner'], 'req_id' : ['groups', 'req'], } if tables is None: tables = table_fields.keys() tables.sort() else: for table in tables: if table not in table_fields: raise koji.GenericError, "Unknown history table: %s" % table ret = {} for table in tables: fields = {} for field in common_fields: fullname = "%s.%s" % (table, field) fields[fullname] = common_fields[field] joins = list(common_joins) fields.update(common_joined_fields) joined = {} for field in table_fields[table]: fullname = "%s.%s" % (table,field) fields[fullname] = field name_join = name_joins.get(field) if name_join: tbl = join_as = name_join[0] if len(name_join) > 1: join_as = name_join[1] joined[tbl] = join_as fullname = "%s.name" % join_as if len(name_join) > 2: #apply alias fields[fullname] = "%s.name" % name_join[2] else: fields[fullname] = fullname if join_as == tbl: joins.append('LEFT OUTER JOIN %s ON %s = %s.id' % (tbl, field, tbl)) else: joins.append('LEFT OUTER JOIN %s AS %s ON %s = %s.id' % (tbl, join_as, field, join_as)) elif field == 'build_id': #special case fields.update({ 'package.name' : 'name', #XXX? 'build.version' : 'version', 'build.release' : 'release', 'build.epoch' : 'epoch', 'build.state' : 'build.state', }) joins.extend([ 'build ON build_id = build.id', 'package ON build.pkg_id = package.id', ]) joined['build'] = 'build' joined['package'] = 'package' elif field == 'group_id': if table.startswith('group_'): fields['groups.name'] = 'group.name' joins.append('groups ON group_id = groups.id') joined['groups'] = 'groups' elif table == 'user_groups': fields['usergroup.name'] = 'group.name' joins.append('users AS usergroup ON group_id = usergroup.id') joined['users'] = 'usergroup' clauses = [] skip = False data = {} for arg in kwargs: value = kwargs[arg] if arg == 'tag': if 'tag' not in joined: skip = True break data['tag_id'] = get_tag_id(value, strict=True) if table == 'tag_inheritance': #special cased because there are two tag columns clauses.append("tag_id = %(tag_id)i OR parent_id = %(tag_id)i") else: clauses.append("%s.id = %%(tag_id)i" % joined['tag']) elif arg == 'build': if 'build' not in joined: skip = True break data['build_id'] = get_build(value, strict=True)['id'] clauses.append("build.id = %(build_id)i") elif arg == 'package': if 'package' not in joined: skip = True break data['pkg_id'] = get_package_id(value, strict=True) clauses.append("package.id = %(pkg_id)i") elif arg == 'user': if 'users' not in joined: skip = True break data['affected_user_id'] = get_user(value, strict=True)['id'] clauses.append("%s.id = %%(affected_user_id)i" % joined['users']) elif arg == 'permission': if 'permissions' not in joined: skip = True break data['perm_id'] = get_perm_id(value, strict=True) clauses.append("%s.id = %%(perm_id)i" % joined['permissions']) elif arg == 'external_repo': if 'external_repo' not in joined: skip = True break data['external_repo_id'] = get_external_repo_id(value, strict=True) clauses.append("%s.id = %%(external_repo_id)i" % joined['external_repo']) elif arg == 'build_target': if 'build_target' not in joined: skip = True break data['build_target_id'] = get_build_target_id(value, strict=True) clauses.append("%s.id = %%(build_target_id)i" % joined['build_target']) elif arg == 'group': if 'groups' not in joined: skip = True break data['group_id'] = get_group_id(value, strict=True) clauses.append("%s.id = %%(group_id)i" % joined['groups']) elif arg == 'active': if value: clauses.append('active = TRUE') elif value is not None: clauses.append('active IS NULL') elif arg == 'editor': data['editor'] = get_user(value, strict=True)['id'] clauses.append('creator.id = %(editor)i OR revoker.id = %(editor)i') fields['creator.id = %(editor)i'] = '_created_by' fields['revoker.id = %(editor)i'] = '_revoked_by' elif arg == 'after': if not isinstance(value, basestring): value = datetime.datetime.fromtimestamp(value).isoformat(' ') data['after'] = value clauses.append('ev1.time > %(after)s OR ev2.time > %(after)s') fields['ev1.time > %(after)s'] = '_created_after' fields['ev2.time > %(after)s'] = '_revoked_after' #clauses.append('EXTRACT(EPOCH FROM ev1.time) > %(after)s OR EXTRACT(EPOCH FROM ev2.time) > %(after)s') elif arg == 'afterEvent': data['afterEvent'] = value c_test = '%s.create_event > %%(afterEvent)i' % table r_test = '%s.revoke_event > %%(afterEvent)i' % table clauses.append(' OR '.join([c_test, r_test])) fields[c_test] = '_created_after_event' fields[r_test] = '_revoked_after_event' elif arg == 'before': if not isinstance(value, basestring): value = datetime.datetime.fromtimestamp(value).isoformat(' ') data['before'] = value clauses.append('ev1.time < %(before)s OR ev2.time < %(before)s') #clauses.append('EXTRACT(EPOCH FROM ev1.time) < %(before)s OR EXTRACT(EPOCH FROM ev2.time) < %(before)s') fields['ev1.time < %(before)s'] = '_created_before' fields['ev2.time < %(before)s'] = '_revoked_before' elif arg == 'beforeEvent': data['beforeEvent'] = value c_test = '%s.create_event < %%(beforeEvent)i' % table r_test = '%s.revoke_event < %%(beforeEvent)i' % table clauses.append(' OR '.join([c_test, r_test])) fields[c_test] = '_created_before_event' fields[r_test] = '_revoked_before_event' if skip: continue fields, aliases = zip(*fields.items()) query = QueryProcessor(columns=fields, aliases=aliases, tables=[table], joins=joins, clauses=clauses, values=data) ret[table] = query.iterate() return ret def tag_history(build=None, tag=None, package=None, active=None, queryOpts=None): """Returns historical tag data package: only for given package build: only for given build tag: only for given tag """ fields = ('build.id', 'package.name', 'build.version', 'build.release', 'tag.id', 'tag.name', 'tag_listing.active', 'tag_listing.create_event', 'tag_listing.revoke_event', 'tag_listing.creator_id', 'tag_listing.revoker_id', 'creator.name', 'revoker.name', 'EXTRACT(EPOCH FROM ev1.time)', 'EXTRACT(EPOCH FROM ev2.time)', 'maven_builds.build_id', 'win_builds.build_id') aliases = ('build_id', 'name', 'version', 'release', 'tag_id', 'tag_name', 'active', 'create_event', 'revoke_event', 'creator_id', 'revoker_id', 'creator_name', 'revoker_name', 'create_ts', 'revoke_ts', 'maven_build_id', 'win_build_id') st_complete = koji.BUILD_STATES['COMPLETE'] tables = ['tag_listing'] joins = ["tag ON tag.id = tag_listing.tag_id", "build ON build.id = tag_listing.build_id", "package ON package.id = build.pkg_id", "events AS ev1 ON ev1.id = tag_listing.create_event", "LEFT OUTER JOIN events AS ev2 ON ev2.id = tag_listing.revoke_event", "users AS creator ON creator.id = tag_listing.creator_id", "LEFT OUTER JOIN users AS revoker ON revoker.id = tag_listing.revoker_id", "LEFT OUTER JOIN maven_builds ON maven_builds.build_id = build.id", "LEFT OUTER JOIN win_builds ON win_builds.build_id = build.id"] clauses = [] if tag is not None: tag_id = get_tag_id(tag, strict=True) clauses.append("tag.id = %(tag_id)i") if build is not None: build_id = get_build(build, strict=True)['id'] clauses.append("build.id = %(build_id)i") if package is not None: pkg_id = get_package_id(package, strict=True) clauses.append("package.id = %(pkg_id)i") if active is True: clauses.append("tag_listing.active is true") elif active is False: clauses.append("tag_listing.active is not true") query = QueryProcessor(columns=fields, aliases=aliases, tables=tables, joins=joins, clauses=clauses, values=locals(), opts=queryOpts) return query.iterate() def untagged_builds(name=None, queryOpts=None): """Returns the list of untagged builds""" fields = ('build.id', 'package.name', 'build.version', 'build.release') aliases = ('id', 'name', 'version', 'release') st_complete = koji.BUILD_STATES['COMPLETE'] tables = ('build',) joins = [] if name is None: joins.append("""package ON package.id = build.pkg_id""") else: joins.append("""package ON package.name=%(name)s AND package.id = build.pkg_id""") joins.append("""LEFT OUTER JOIN tag_listing ON tag_listing.build_id = build.id AND tag_listing.active = TRUE""") clauses = ["tag_listing.tag_id IS NULL", "build.state = %(st_complete)i"] #q = """SELECT build.id, package.name, build.version, build.release #FROM build # JOIN package on package.id = build.pkg_id # LEFT OUTER JOIN tag_listing ON tag_listing.build_id = build.id # AND tag_listing.active IS TRUE #WHERE tag_listing.tag_id IS NULL AND build.state = %(st_complete)i""" #return _multiRow(q, locals(), aliases) query = QueryProcessor(columns=fields, aliases=aliases, tables=tables, joins=joins, clauses=clauses, values=locals(), opts=queryOpts) return query.iterate() def build_map(): """Map which builds were used in the buildroots of other builds To be used for garbage collection """ # find rpms whose buildroots we were in st_complete = koji.BUILD_STATES['COMPLETE'] fields = ('used', 'built') q = """SELECT DISTINCT used.id, built.id FROM buildroot_listing JOIN rpminfo AS r_used ON r_used.id = buildroot_listing.rpm_id JOIN rpminfo AS r_built ON r_built.buildroot_id = buildroot_listing.buildroot_id JOIN build AS used ON used.id = r_used.build_id JOIN build AS built ON built.id = r_built.build_id WHERE built.state = %(st_complete)i AND used.state =%(st_complete)i""" return _multiRow(q, locals(), fields) def build_references(build_id, limit=None): """Returns references to a build This call is used to determine whether a build can be deleted The optional limit arg is used to limit the size of the buildroot references. """ #references (that matter): # tag_listing # buildroot_listing (via rpminfo) # buildroot_archives (via archiveinfo) # ?? rpmsigs (via rpminfo) ret = {} # find tags q = """SELECT tag_id, tag.name FROM tag_listing JOIN tag on tag_id = tag.id WHERE build_id = %(build_id)i AND active = TRUE""" ret['tags'] = _multiRow(q, locals(), ('id', 'name')) #we'll need the component rpm ids for the rest q = """SELECT id FROM rpminfo WHERE build_id=%(build_id)i""" rpm_ids = _fetchMulti(q, locals()) # find rpms whose buildroots we were in st_complete = koji.BUILD_STATES['COMPLETE'] fields = ('id', 'name', 'version', 'release', 'arch', 'build_id') idx = {} q = """SELECT rpminfo.id, rpminfo.name, rpminfo.version, rpminfo.release, rpminfo.arch, rpminfo.build_id FROM buildroot_listing JOIN rpminfo ON rpminfo.buildroot_id = buildroot_listing.buildroot_id JOIN build on rpminfo.build_id = build.id WHERE buildroot_listing.rpm_id = %(rpm_id)s AND build.state = %(st_complete)i""" if limit is not None: q += "\nLIMIT %(limit)i" for (rpm_id,) in rpm_ids: for row in _multiRow(q, locals(), fields): idx.setdefault(row['id'], row) if limit is not None and len(idx) > limit: break ret['rpms'] = idx.values() # find archives whose buildroots we were in q = """SELECT id FROM archiveinfo WHERE build_id = %(build_id)i""" archive_ids = _fetchMulti(q, locals()) fields = ('id', 'type_id', 'type_name', 'build_id', 'filename') idx = {} q = """SELECT archiveinfo.id, archiveinfo.type_id, archivetypes.name, archiveinfo.build_id, archiveinfo.filename FROM buildroot_archives JOIN archiveinfo ON archiveinfo.buildroot_id = buildroot_archives.buildroot_id JOIN build ON archiveinfo.build_id = build.id JOIN archivetypes ON archivetypes.id = archiveinfo.type_id WHERE buildroot_archives.archive_id = %(archive_id)i AND build.state = %(st_complete)i""" if limit is not None: q += "\nLIMIT %(limit)i" for (archive_id,) in archive_ids: for row in _multiRow(q, locals(), fields): idx.setdefault(row['id'], row) if limit is not None and len(idx) > limit: break ret['archives'] = idx.values() # find timestamp of most recent use in a buildroot q = """SELECT buildroot.create_event FROM buildroot_listing JOIN buildroot ON buildroot_listing.buildroot_id = buildroot.id WHERE buildroot_listing.rpm_id = %(rpm_id)s ORDER BY buildroot.create_event DESC LIMIT 1""" event_id = -1 for (rpm_id,) in rpm_ids: tmp_id = _singleValue(q, locals(), strict=False) if tmp_id is not None and tmp_id > event_id: event_id = tmp_id if event_id == -1: ret['last_used'] = None else: q = """SELECT EXTRACT(EPOCH FROM get_event_time(%(event_id)i))""" ret['last_used'] = _singleValue(q, locals()) q = """SELECT buildroot.create_event FROM buildroot_archives JOIN buildroot ON buildroot_archives.buildroot_id = buildroot.id WHERE buildroot_archives.archive_id = %(archive_id)i ORDER BY buildroot.create_event DESC LIMIT 1""" event_id = -1 for (archive_id,) in archive_ids: tmp_id = _singleValue(q, locals(), strict=False) if tmp_id is not None and tmp_id > event_id: event_id = tmp_id if event_id == -1: pass else: q = """SELECT EXTRACT(EPOCH FROM get_event_time(%(event_id)i))""" last_archive_use = _singleValue(q, locals()) if ret['last_used'] is None or last_archive_use > ret['last_used']: ret['last_used'] = last_archive_use return ret def delete_build(build, strict=True, min_ref_age=604800): """delete a build, if possible Attempts to delete a build. A build can only be deleted if it is unreferenced. If strict is true (default), an exception is raised if the build cannot be deleted. Note that a deleted build is not completely gone. It is marked deleted and some data remains in the database. Mainly, the rpms are removed. Note in particular that deleting a build DOES NOT free any NVRs (or NVRAs) for reuse. Returns True if successful, False otherwise """ context.session.assertPerm('admin') binfo = get_build(build, strict=True) refs = build_references(binfo['id'], limit=10) if refs['tags']: if strict: raise koji.GenericError, "Cannot delete build, tagged: %s" % refs['tags'] return False if refs['rpms']: if strict: raise koji.GenericError, "Cannot delete build, used in buildroots: %s" % refs['rpms'] return False if refs['archives']: if strict: raise koji.GenericError, "Cannot delete build, used in archive buildroots: %s" % refs['archives'] return False if refs['last_used']: age = time.time() - refs['last_used'] if age < min_ref_age: if strict: raise koji.GenericError, "Cannot delete build, used in recent buildroot" return False #otherwise we can delete it _delete_build(binfo) return True def _delete_build(binfo): """Delete a build (no reference checks) Please consider calling delete_build instead """ # build-related data: # build KEEP (marked deleted) # maven_builds KEEP # task ?? # tag_listing REVOKE (versioned) (but should ideally be empty anyway) # rpminfo KEEP # buildroot_listing KEEP (but should ideally be empty anyway) # rpmsigs DELETE # archiveinfo KEEP # buildroot_archives KEEP (but should ideally be empty anyway) # files on disk: DELETE st_deleted = koji.BUILD_STATES['DELETED'] koji.plugin.run_callbacks('preBuildStateChange', attribute='state', old=binfo['state'], new=st_deleted, info=binfo) build_id = binfo['id'] q = """SELECT id FROM rpminfo WHERE build_id=%(build_id)i""" rpm_ids = _fetchMulti(q, locals()) for (rpm_id,) in rpm_ids: delete = """DELETE FROM rpmsigs WHERE rpm_id=%(rpm_id)i""" _dml(delete, locals()) update = UpdateProcessor('tag_listing', clauses=["build_id=%(build_id)i"], values=locals()) update.make_revoke() update.execute() update = """UPDATE build SET state=%(st_deleted)i WHERE id=%(build_id)i""" _dml(update, locals()) #now clear the build dirs dirs_to_clear = [] builddir = koji.pathinfo.build(binfo) if os.path.exists(builddir): dirs_to_clear.append(builddir) for filedir in dirs_to_clear: rv = os.system(r"find '%s' -xdev \! -type d -print0 |xargs -0 rm -f" % filedir) if rv != 0: raise koji.GenericError, 'file removal failed (code %r) for %s' % (rv, filedir) #and clear out the emptied dirs rv = os.system(r"find '%s' -xdev -depth -type d -print0 |xargs -0 rmdir" % filedir) if rv != 0: raise koji.GenericError, 'directory removal failed (code %r) for %s' % (rv, filedir) koji.plugin.run_callbacks('postBuildStateChange', attribute='state', old=binfo['state'], new=st_deleted, info=binfo) def reset_build(build): """Reset a build so that it can be reimported WARNING: this function is potentially destructive. use with care. nulls task_id sets state to CANCELED clears data in rpminfo removes rpminfo entries from any buildroot_listings [!] clears data in archiveinfo, maven_info removes archiveinfo entries from buildroot_archives remove files related to the build note, we don't actually delete the build data, so tags remain intact """ # Only an admin may do this context.session.assertPerm('admin') binfo = get_build(build) if not binfo: #nothing to do return koji.plugin.run_callbacks('preBuildStateChange', attribute='state', old=binfo['state'], new=koji.BUILD_STATES['CANCELED'], info=binfo) q = """SELECT id FROM rpminfo WHERE build_id=%(id)i""" ids = _fetchMulti(q, binfo) for (rpm_id,) in ids: delete = """DELETE FROM rpmsigs WHERE rpm_id=%(rpm_id)i""" _dml(delete, locals()) delete = """DELETE FROM buildroot_listing WHERE rpm_id=%(rpm_id)i""" _dml(delete, locals()) delete = """DELETE FROM rpminfo WHERE build_id=%(id)i""" _dml(delete, binfo) q = """SELECT id FROM archiveinfo WHERE build_id=%(id)i""" ids = _fetchMulti(q, binfo) for (archive_id,) in ids: delete = """DELETE FROM maven_archives WHERE archive_id=%(archive_id)i""" _dml(delete, locals()) delete = """DELETE FROM win_archives WHERE archive_id=%(archive_id)i""" _dml(delete, locals()) delete = """DELETE FROM buildroot_archives WHERE archive_id=%(archive_id)i""" _dml(delete, locals()) delete = """DELETE FROM archiveinfo WHERE build_id=%(id)i""" _dml(delete, binfo) delete = """DELETE FROM maven_builds WHERE build_id = %(id)i""" _dml(delete, binfo) delete = """DELETE FROM win_builds WHERE build_id = %(id)i""" _dml(delete, binfo) binfo['state'] = koji.BUILD_STATES['CANCELED'] update = """UPDATE build SET state=%(state)i, task_id=NULL WHERE id=%(id)i""" _dml(update, binfo) #now clear the build dirs dirs_to_clear = [] builddir = koji.pathinfo.build(binfo) if os.path.exists(builddir): dirs_to_clear.append(builddir) for filedir in dirs_to_clear: rv = os.system(r"find '%s' -xdev \! -type d -print0 |xargs -0 rm -f" % filedir) if rv != 0: raise koji.GenericError, 'file removal failed (code %r) for %s' % (rv, filedir) #and clear out the emptied dirs rv = os.system(r"find '%s' -xdev -depth -type d -print0 |xargs -0 rmdir" % filedir) if rv != 0: raise koji.GenericError, 'directory removal failed (code %r) for %s' % (rv, filedir) koji.plugin.run_callbacks('postBuildStateChange', attribute='state', old=binfo['state'], new=koji.BUILD_STATES['CANCELED'], info=binfo) def cancel_build(build_id, cancel_task=True): """Cancel a build Calling function should perform permission checks. If the build is associated with a task, cancel the task as well (unless cancel_task is False). Return True if the build was successfully canceled, False if not. The cancel_task option is used to prevent loops between task- and build- cancellation. """ st_canceled = koji.BUILD_STATES['CANCELED'] st_building = koji.BUILD_STATES['BUILDING'] build = get_build(build_id, strict=True) if build['state'] != st_building: return False koji.plugin.run_callbacks('preBuildStateChange', attribute='state', old=build['state'], new=st_canceled, info=build) update = """UPDATE build SET state = %(st_canceled)i, completion_time = NOW() WHERE id = %(build_id)i AND state = %(st_building)i""" _dml(update, locals()) build = get_build(build_id) if build['state'] != st_canceled: return False task_id = build['task_id'] if task_id != None: build_notification(task_id, build_id) if cancel_task: Task(task_id).cancelFull(strict=False) koji.plugin.run_callbacks('postBuildStateChange', attribute='state', old=build['state'], new=st_canceled, info=build) return True def _get_build_target(task_id): # XXX Should we be storing a reference to the build target # in the build table for reproducibility? task = Task(task_id) info = task.getInfo(request=True) request = info['request'] if info['method'] in ('build', 'maven'): # request is (source-url, build-target, map-of-other-options) if request[1]: return get_build_target(request[1]) elif info['method'] == 'winbuild': # request is (vm-name, source-url, build-target, map-of-other-options) if request[2]: return get_build_target(request[2]) return None def get_notification_recipients(build, tag_id, state): """ Return the list of email addresses that should be notified about events involving the given build and tag. This could be the build into that tag succeeding or failing, or the build being manually tagged or untagged from that tag. The list will contain email addresss for all users who have registered for notifications on the package or tag (or both), as well as the package owner for this tag and the user who submitted the build. The list will not contain duplicates. """ clauses = [] if build: package_id = build['package_id'] clauses.append('package_id = %(package_id)i OR package_id IS NULL') else: clauses.append('package_id IS NULL') if tag_id: clauses.append('tag_id = %(tag_id)i OR tag_id IS NULL') else: clauses.append('tag_id IS NULL') if state != koji.BUILD_STATES['COMPLETE']: clauses.append('success_only = FALSE') query = QueryProcessor(columns=('email',), tables=['build_notifications'], clauses=clauses, values=locals(), opts={'asList':True}) emails = [result[0] for result in query.execute()] email_domain = context.opts['EmailDomain'] notify_on_success = context.opts['NotifyOnSuccess'] if notify_on_success is True or state != koji.BUILD_STATES['COMPLETE']: # user who submitted the build emails.append('%s@%s' % (build['owner_name'], email_domain)) if tag_id: packages = readPackageList(pkgID=package_id, tagID=tag_id, inherit=True) # owner of the package in this tag, following inheritance pkgdata = packages.get(package_id) # If the package list has changed very recently it is possible we # will get no result. if pkgdata and not pkgdata['blocked']: emails.append('%s@%s' % (pkgdata['owner_name'], email_domain)) #FIXME - if tag_id is None, we don't have a good way to get the package owner. # using all package owners from all tags would be way overkill. emails_uniq = dict([(x,1) for x in emails]).keys() return emails_uniq def tag_notification(is_successful, tag_id, from_id, build_id, user_id, ignore_success=False, failure_msg=''): if context.opts.get('DisableNotifications'): return if is_successful: state = koji.BUILD_STATES['COMPLETE'] else: state = koji.BUILD_STATES['FAILED'] recipients = {} build = get_build(build_id) if not build: # the build doesn't exist, so there's nothing to send a notification about return None if tag_id: tag = get_tag(tag_id) for email in get_notification_recipients(build, tag['id'], state): recipients[email] = 1 if from_id: from_tag = get_tag(from_id) for email in get_notification_recipients(build, from_tag['id'], state): recipients[email] = 1 recipients_uniq = recipients.keys() if len(recipients_uniq) > 0 and not (is_successful and ignore_success): task_id = make_task('tagNotification', [recipients_uniq, is_successful, tag_id, from_id, build_id, user_id, ignore_success, failure_msg]) return task_id return None def build_notification(task_id, build_id): if context.opts.get('DisableNotifications'): return build = get_build(build_id) target = _get_build_target(task_id) dest_tag = None if target: dest_tag = target['dest_tag'] if build['state'] == koji.BUILD_STATES['BUILDING']: raise koji.GenericError, 'never send notifications for incomplete builds' web_url = context.opts.get('KojiWebURL', 'http://localhost/koji') recipients = get_notification_recipients(build, dest_tag, build['state']) if len(recipients) > 0: make_task('buildNotification', [recipients, build, target, web_url]) def get_build_notifications(user_id): fields = ('id', 'user_id', 'package_id', 'tag_id', 'success_only', 'email') query = """SELECT %s FROM build_notifications WHERE user_id = %%(user_id)i """ % ', '.join(fields) return _multiRow(query, locals(), fields) def new_group(name): """Add a user group to the database""" context.session.assertPerm('admin') if get_user(name): raise koji.GenericError, 'user/group already exists: %s' % name return context.session.createUser(name, usertype=koji.USERTYPES['GROUP']) def add_group_member(group, user, strict=True): """Add user to group""" context.session.assertPerm('admin') group = get_user(group) user = get_user(user) if group['usertype'] != koji.USERTYPES['GROUP']: raise koji.GenericError, "Not a group: %(name)s" % group if user['usertype'] == koji.USERTYPES['GROUP']: raise koji.GenericError, "Groups cannot be members of other groups" #check to see if user is already a member data = {'user_id' : user['id'], 'group_id' : group['id']} table = 'user_groups' clauses = ('user_id = %(user_id)i', 'group_id = %(group_id)s') query = QueryProcessor(columns=['user_id'], tables=[table], clauses=('active = TRUE',)+clauses, values=data, opts={'rowlock':True}) row = query.executeOne() if row: if not strict: return raise koji.GenericError, "User already in group" insert = InsertProcessor(table, data) insert.make_create() insert.execute() def drop_group_member(group, user): """Drop user from group""" context.session.assertPerm('admin') user = get_user(user, strict=True) ginfo = get_user(group) if not ginfo or ginfo['usertype'] != koji.USERTYPES['GROUP']: raise koji.GenericError, "No such group: %s" % group data = {'user_id' : user['id'], 'group_id' : ginfo['id']} clauses=["user_id = %(user_id)i", "group_id = %(group_id)i"] update = UpdateProcessor('user_groups', values=data, clauses=clauses) update.make_revoke() update.execute() def get_group_members(group): """Get the members of a group""" context.session.assertPerm('admin') group = get_user(group) if group['usertype'] != koji.USERTYPES['GROUP']: raise koji.GenericError, "Not a group: %(name)s" % group group_id = group['id'] fields = ('id','name','usertype','krb_principal') q = """SELECT %s FROM user_groups JOIN users ON user_id = users.id WHERE active = TRUE AND group_id = %%(group_id)i""" % ','.join(fields) return _multiRow(q, locals(), fields) def set_user_status(user, status): context.session.assertPerm('admin') if not koji.USER_STATUS.get(status): raise koji.GenericError, 'invalid status: %s' % status if user['status'] == status: # nothing to do return update = """UPDATE users SET status = %(status)i WHERE id = %(user_id)i""" user_id = user['id'] rows = _dml(update, locals()) # sanity check if rows == 0: raise koji.GenericError, 'invalid user ID: %i' % user_id def get_event(): """Get an event id for this transaction We cache the result in context, so subsequent calls in the same transaction will get the same event. Note that this will persist across calls in a multiCall, which is fine because it is all one transaction. """ if hasattr(context, 'event_id'): return context.event_id event_id = _singleValue("SELECT get_event()") context.event_id = event_id return event_id class InsertProcessor(object): """Build an insert statement table - the table to insert into data - a dictionary of data to insert (keys = row names) rawdata - data to insert specified as sql expressions rather than python values does not support query inserts of "DEFAULT VALUES" """ def __init__(self, table, data=None, rawdata=None): self.table = table self.data = {} if data: self.data.update(data) self.rawdata = {} if rawdata: self.rawdata.update(rawdata) def __str__(self): if not self.data and not self.rawdata: return "-- incomplete update: no assigns" parts = ['INSERT INTO %s ' % self.table] columns = self.data.keys() columns.extend(self.rawdata.keys()) parts.append("(%s) " % ', '.join(columns)) values = [] for key in columns: if self.data.has_key(key): values.append("%%(%s)s" % key) else: values.append("(%s)" % self.rawdata[key]) parts.append("VALUES (%s)" % ', '.join(values)) return ''.join(parts) def __repr__(self): return "" % vars(self) def set(self, **kwargs): """Set data via keyword args""" self.data.update(kwargs) def rawset(self, **kwargs): """Set rawdata via keyword args""" self.rawdata.update(kwargs) def make_create(self, event_id=None, user_id=None): if event_id is None: event_id = get_event() if user_id is None: context.session.assertLogin() user_id = context.session.user_id self.data['create_event'] = event_id self.data['creator_id'] = user_id def execute(self): return _dml(str(self), self.data) class UpdateProcessor(object): """Build an update statement table - the table to insert into data - a dictionary of data to insert (keys = row names) rawdata - data to insert specified as sql expressions rather than python values clauses - a list of where clauses which will be ANDed together values - dict of values used in clauses does not support the FROM clause """ def __init__(self, table, data=None, rawdata=None, clauses=None, values=None): self.table = table self.data = {} if data: self.data.update(data) self.rawdata = {} if rawdata: self.rawdata.update(rawdata) self.clauses = [] if clauses: self.clauses.extend(clauses) self.values = {} if values: self.values.update(values) def __str__(self): if not self.data and not self.rawdata: return "-- incomplete update: no assigns" parts = ['UPDATE %s SET ' % self.table] assigns = ["%s = %%(data.%s)s" % (key, key) for key in self.data] assigns.extend(["%s = (%s)" % (key, self.rawdata[key]) for key in self.rawdata]) parts.append(', '.join(assigns)) if self.clauses: parts.append('\nWHERE ') parts.append(' AND '.join(["( %s )" % c for c in self.clauses])) return ''.join(parts) def __repr__(self): return "" % vars(self) def get_values(self): """Returns unified values dict, including data""" ret = {} ret.update(self.values) for key in self.data: ret["data."+key] = self.data[key] return ret def set(self, **kwargs): """Set data via keyword args""" self.data.update(kwargs) def rawset(self, **kwargs): """Set rawdata via keyword args""" self.rawdata.update(kwargs) def make_revoke(self, event_id=None, user_id=None): """Add standard revoke options to the update""" if event_id is None: event_id = get_event() if user_id is None: context.session.assertLogin() user_id = context.session.user_id self.data['revoke_event'] = event_id self.data['revoker_id'] = user_id self.rawdata['active'] = 'NULL' self.clauses.append('active = TRUE') def execute(self): return _dml(str(self), self.get_values()) class QueryProcessor(object): """ Build a query from its components. - columns, aliases, tables: lists of the column names to retrieve, the tables to retrieve them from, and the key names to use when returning values as a map, respectively - joins: a list of joins in the form 'table1 ON table1.col1 = table2.col2', 'JOIN' will be prepended automatically; if extended join syntax (LEFT, OUTER, etc.) is required, it can be specified, and 'JOIN' will not be prepended - clauses: a list of where clauses in the form 'table1.col1 OPER table2.col2-or-variable'; each clause will be surrounded by parentheses and all will be AND'ed together - values: the map that will be used to replace any substitution expressions in the query - opts: a map of query options; currently supported options are: countOnly: if True, return an integer indicating how many results would have been returned, rather than the actual query results order: a column or alias name to use in the 'ORDER BY' clause offset: an integer to use in the 'OFFSET' clause limit: an integer to use in the 'LIMIT' clause asList: if True, return results as a list of lists, where each list contains the column values in query order, rather than the usual list of maps rowlock: if True, use "FOR UPDATE" to lock the queried rows """ iterchunksize = 1000 def __init__(self, columns=None, aliases=None, tables=None, joins=None, clauses=None, values=None, opts=None): self.columns = columns self.aliases = aliases if columns and aliases: if len(columns) != len(aliases): raise StandardError, 'column and alias lists must be the same length' self.colsByAlias = dict(zip(aliases, columns)) else: self.colsByAlias = {} self.tables = tables self.joins = joins self.clauses = clauses self.cursors = 0 if values: self.values = values else: self.values = {} if opts: self.opts = opts else: self.opts = {} def countOnly(self, count): self.opts['countOnly'] = count def __str__(self): query = \ """ SELECT %(col_str)s FROM %(table_str)s %(join_str)s %(clause_str)s %(order_str)s %(offset_str)s %(limit_str)s """ if self.opts.get('countOnly'): if self.opts.get('offset') or self.opts.get('limit'): # If we're counting with an offset and/or limit, we need # to wrap the offset/limited query and then count the results, # rather than trying to offset/limit the single row returned # by count(*). Because we're wrapping the query, we don't care # about the column values. col_str = '1' else: col_str = 'count(*)' else: col_str = self._seqtostr(self.columns) table_str = self._seqtostr(self.tables) join_str = self._joinstr() clause_str = self._seqtostr(self.clauses, sep=')\n AND (') if clause_str: clause_str = ' WHERE (' + clause_str + ')' order_str = self._order() offset_str = self._optstr('offset') limit_str = self._optstr('limit') query = query % locals() if self.opts.get('countOnly') and \ (self.opts.get('offset') or self.opts.get('limit')): query = 'SELECT count(*)\nFROM (' + query + ') numrows' if self.opts.get('rowlock'): query += '\n FOR UPDATE' return query def __repr__(self): return '' % \ (self.columns, self.aliases, self.tables, self.joins, self.clauses, self.values, self.opts) def _seqtostr(self, seq, sep=', '): if seq: return sep.join(seq) else: return '' def _joinstr(self): if not self.joins: return '' result = '' for join in self.joins: if result: result += '\n' if re.search(r'\bjoin\b', join, re.IGNORECASE): # The join clause already contains the word 'join', # so don't prepend 'JOIN' to it result += ' ' + join else: result += ' JOIN ' + join return result def _order(self): # Don't bother sorting if we're just counting if self.opts.get('countOnly'): return '' order_opt = self.opts.get('order') if order_opt: order_exprs = [] for order in order_opt.split(','): if order.startswith('-'): order = order[1:] direction = ' DESC' else: direction = '' # Check if we're ordering by alias first orderCol = self.colsByAlias.get(order) if orderCol: pass elif order in self.columns: orderCol = order else: raise StandardError, 'invalid order: ' + order order_exprs.append(orderCol + direction) return 'ORDER BY ' + ', '.join(order_exprs) else: return '' def _optstr(self, optname): optval = self.opts.get(optname) if optval: return '%s %i' % (optname.upper(), optval) else: return '' def singleValue(self, strict=True): return _singleValue(str(self), self.values, strict=strict) def execute(self): query = str(self) if self.opts.get('countOnly'): return _singleValue(query, self.values, strict=True) elif self.opts.get('asList'): return _fetchMulti(query, self.values) else: return _multiRow(query, self.values, (self.aliases or self.columns)) def iterate(self): if self.opts.get('countOnly'): return self.execute() elif self.opts.get('limit') and self.opts['limit'] < self.iterchunksize: return self.execute() else: fields = self.aliases or self.columns fields = list(fields) cname = "qp_cursor_%s_%i_%i" % (id(self), os.getpid(), self.cursors) self.cursors += 1 logger.debug('Setting up query iterator. cname=%r', cname) return self._iterate(cname, str(self), self.values.copy(), fields, self.iterchunksize, self.opts.get('asList')) def _iterate(self, cname, query, values, fields, chunksize, as_list=False): # We pass all this data into the generator so that the iterator works # from the snapshot when it was generated. Otherwise reuse of the processor # for similar queries could have unpredictable results. query = "DECLARE %s NO SCROLL CURSOR FOR %s" % (cname, query) c = context.cnx.cursor() c.execute(query, values) c.close() query = "FETCH %i FROM %s" % (chunksize, cname) while True: if as_list: buf = _fetchMulti(query, {}) else: buf = _multiRow(query, {}, fields) if not buf: break for row in buf: yield row c = context.cnx.cursor() c.execute("CLOSE %s" % cname) c.close() def executeOne(self): results = self.execute() if isinstance(results, list): if len(results) > 0: return results[0] else: return None return results def _applyQueryOpts(results, queryOpts): """ Apply queryOpts to results in the same way QueryProcessor would. results is a list of maps. queryOpts is a map which may contain the following fields: countOnly order offset limit Note: asList is supported by QueryProcessor but not by this method. We don't know the original query order, and so don't have a way to return a useful list. asList should be handled by the caller. """ if queryOpts is None: queryOpts = {} if queryOpts.get('order'): order = queryOpts['order'] reverse = False if order.startswith('-'): order = order[1:] reverse = True results.sort(key=lambda o: o[order]) if reverse: results.reverse() if queryOpts.get('offset'): results = results[queryOpts['offset']:] if queryOpts.get('limit'): results = results[:queryOpts['limit']] if queryOpts.get('countOnly'): return len(results) else: return results # # Policy Test Handlers class OperationTest(koji.policy.MatchTest): """Checks operation against glob patterns""" name = 'operation' field = 'operation' def policy_get_user(data): """Determine user from policy data (default to logged-in user)""" if data.has_key('user_id'): return get_user(data['user_id']) elif context.session.logged_in: return get_user(context.session.user_id) return None def policy_get_pkg(data): """Determine package from policy data (default to logged-in user) returns dict as lookup_package if package does not exist yet, the id field will be None """ if data.has_key('package'): pkginfo = lookup_package(data['package'], strict=False) if not pkginfo: #for some operations (e.g. adding a new package), the package #entry may not exist yet if isinstance(data['package'], basestring): return {'id' : None, 'name' : data['package']} else: raise koji.GenericError, "Invalid package: %s" % data['package'] return pkginfo if data.has_key('build'): binfo = get_build(data['build'], strict=True) return {'id' : binfo['package_id'], 'name' : binfo['name']} #else raise koji.GenericError, "policy requires package data" class NewPackageTest(koji.policy.BaseSimpleTest): """Checks to see if a package exists yet""" name = 'is_new_package' def run(self, data): return (policy_get_pkg(data)['id'] is None) class PackageTest(koji.policy.MatchTest): """Checks package against glob patterns""" name = 'package' field = '_package' def run(self, data): #we need to find the package name from the base data data[self.field] = policy_get_pkg(data)['name'] return super(PackageTest, self).run(data) class VolumeTest(koji.policy.MatchTest): """Checks storage volume against glob patterns""" name = 'volume' field = '_volume' def run(self, data): #we need to find the volume name from the base data volinfo = None if 'volume' in data: volinfo = lookup_name('volume', data['volume'], strict=False) elif 'build' in data: build = get_build(data['build']) volinfo = {'id': build['volume_id'], 'name': build['volume_name']} if not volinfo: return False data[self.field] = volinfo['name'] return super(VolumeTest, self).run(data) class TagTest(koji.policy.MatchTest): name = 'tag' field = '_tagname' def get_tag(self, data): """extract the tag to test against from the data return None if there is no tag to test """ tag = data.get('tag') if tag is None: return None return get_tag(tag, strict=False) def run(self, data): #we need to find the tag name from the base data tinfo = self.get_tag(data) if tinfo is None: return False data[self.field] = tinfo['name'] return super(TagTest, self).run(data) class FromTagTest(TagTest): name = 'fromtag' def get_tag(self, data): tag = data.get('fromtag') if tag is None: return None return get_tag(tag, strict=False) class HasTagTest(koji.policy.BaseSimpleTest): """Check to see if build (currently) has a given tag""" name = 'hastag' def run(self, data): tags = list_tags(build=data['build']) #True if any of these tags match any of the patterns args = self.str.split()[1:] for tag in tags: for pattern in args: if fnmatch.fnmatch(tag['name'], pattern): return True #otherwise... return False class SkipTagTest(koji.policy.BaseSimpleTest): """Check for the skip_tag option For policies regarding build tasks (e.g. build_from_srpm) """ name = 'skip_tag' def run(self, data): return bool(data.get('skip_tag')) class BuildTagTest(koji.policy.BaseSimpleTest): """Check the build tag of the build If build_tag is not provided in policy data, it is determined by the buildroots of the component rpms """ name = 'buildtag' def run(self, data): args = self.str.split()[1:] if data.has_key('build_tag'): tagname = get_tag(data['build_tag'], strict=True)['name'] for pattern in args: if fnmatch.fnmatch(tagname, pattern): return True #else return False elif data.has_key('build'): #determine build tag from buildroots #in theory, we should find only one unique build tag #it is possible that some rpms could have been imported later and hence #not have a buildroot. #or if the entire build was imported, there will be no buildroots rpms = context.handlers.call('listRPMs', buildID=data['build']) archives = list_archives(buildID=data['build']) br_list = [r['buildroot_id'] for r in rpms] br_list.extend([a['buildroot_id'] for a in archives]) for br_id in br_list: if br_id is None: continue tagname = get_buildroot(br_id)['tag_name'] for pattern in args: if fnmatch.fnmatch(tagname, pattern): return True #otherwise... return False else: return False class ImportedTest(koji.policy.BaseSimpleTest): """Check if any part of a build was imported This is determined by checking the buildroots of the rpms and archives True if any of them lack a buildroot (strict)""" name = 'imported' def run(self, data): rpms = context.handlers.call('listRPMs', buildID=data['build']) #no test args for rpminfo in rpms: if rpminfo['buildroot_id'] is None: return True for archive in list_archives(buildID=data['build']): if archive['buildroot_id'] is None: return True #otherwise... return False class ChildTaskTest(koji.policy.BoolTest): name = 'is_child_task' field = 'parent' class MethodTest(koji.policy.MatchTest): name = 'method' field = 'method' class UserTest(koji.policy.MatchTest): """Checks username against glob patterns""" name = 'user' field = '_username' def run(self, data): user = policy_get_user(data) if not user: return False data[self.field] = user['name'] return super(UserTest, self).run(data) class VMTest(koji.policy.MatchTest): """Checks a VM name against glob patterns""" name = 'vm_name' field = 'vm_name' class IsBuildOwnerTest(koji.policy.BaseSimpleTest): """Check if user owns the build""" name = "is_build_owner" def run(self, data): build = get_build(data['build']) owner = get_user(build['owner_id']) user = policy_get_user(data) if not user: return False if owner['id'] == user['id']: return True if owner['usertype'] == koji.USERTYPES['GROUP']: # owner is a group, check to see if user is a member if owner['id'] in koji.auth.get_user_groups(user['id']): return True #otherwise... return False class UserInGroupTest(koji.policy.BaseSimpleTest): """Check if user is in group(s) args are treated as patterns and matched against group name true if user is in /any/ matching group """ name = "user_in_group" def run(self, data): user = policy_get_user(data) if not user: return False groups = koji.auth.get_user_groups(user['id']) args = self.str.split()[1:] for group_id, group in groups.iteritems(): for pattern in args: if fnmatch.fnmatch(group, pattern): return True #otherwise... return False class HasPermTest(koji.policy.BaseSimpleTest): """Check if user has permission(s) args are treated as patterns and matched against permission name true if user has /any/ matching permission """ name = "has_perm" def run(self, data): user = policy_get_user(data) if not user: return False perms = koji.auth.get_user_perms(user['id']) args = self.str.split()[1:] for perm in perms: for pattern in args: if fnmatch.fnmatch(perm, pattern): return True #otherwise... return False class SourceTest(koji.policy.MatchTest): """Match build source This is not the cleanest, since we have to crack open the task parameters True if build source matches any of the supplied patterns """ name = "source" field = '_source' def run(self, data): if data.has_key('source'): data[self.field] = data['source'] elif data.has_key('build'): #crack open the build task build = get_build(data['build']) if build['task_id'] is None: #imported, no source to match against return False task = Task(build['task_id']) info = task.getInfo() params = task.getRequest() #signatures: # build - (src, target, opts=None) # maven - (url, target, opts=None) # winbuild - (name, source_url, target, opts=None) if info['method'] == 'winbuild': data[self.field] = params[1] elif info['method'] == 'indirectionimage': return False else: data[self.field] = params[0] else: return False return super(SourceTest, self).run(data) class PolicyTest(koji.policy.BaseSimpleTest): """Test named policy The named policy must exist Returns True is the policy results in an action of: yes, true, allow Otherwise returns False (Also returns False if there are no matches in the policy) Watch out for loops """ name = 'policy' def __init__(self, str): super(PolicyTest, self).__init__(str) self.depth = 0 # this is used to detect loops. Note that each test in a ruleset is # a distinct instance of its test class. So this value is particular # to a given appearance of a policy check in a ruleset. def run(self, data): args = self.str.split()[1:] if self.depth != 0: #LOOP! raise koji.GenericError, "encountered policy loop at %s" % self.str ruleset = context.policy.get(args[0]) if not ruleset: raise koji.GenericError, "no such policy: %s" % args[0] self.depth += 1 result = ruleset.apply(data) self.depth -= 1 if result is None: return False else: return result.lower() in ('yes', 'true', 'allow') def check_policy(name, data, default='deny', strict=False): """Check data against the named policy This assumes the policy actions consist of: allow deny Returns a pair (access, reason) access: True if the policy result is allow, false otherwise reason: reason for the access If strict is True, will raise ActionNotAllowed if the action is not 'allow' """ ruleset = context.policy.get(name) if not ruleset: if context.opts.get('MissingPolicyOk'): # for backwards compatibility, this is the default result = "allow" else: result = "deny" reason = "missing policy" lastrule = '' else: result = ruleset.apply(data) if result is None: result = default reason = 'not covered by policy' else: parts = result.split(None, 1) parts.extend(['','']) result, reason = parts[:2] reason = reason.lower() lastrule = ruleset.last_rule() if context.opts.get('KojiDebug', False): logger.error("policy %(name)s gave %(result)s, reason: %(reason)s, last rule: %(lastrule)s", locals()) if result == 'allow': return True, reason if result != 'deny': reason = 'error in policy' logger.error("Invalid action in policy %s, rule: %s", name, lastrule) if not strict: return False, reason err_str = "policy violation (%s)" % name if reason: err_str += ": %s" % reason if context.opts.get('KojiDebug') or context.opts.get('VerbosePolicy'): err_str += " [rule: %s]" % lastrule raise koji.ActionNotAllowed, err_str def assert_policy(name, data, default='deny'): """Enforce the named policy This assumes the policy actions consist of: allow deny Raises ActionNotAllowed if policy result is not allow """ check_policy(name, data, default=default, strict=True) def rpmdiff(basepath, rpmlist): "Diff the first rpm in the list against the rest of the rpms." if len(rpmlist) < 2: return first_rpm = rpmlist[0] for other_rpm in rpmlist[1:]: # ignore differences in file size, md5sum, and mtime # (files may have been generated at build time and contain # embedded dates or other insignificant differences) args = ['/usr/libexec/koji-hub/rpmdiff', '--ignore', 'S', '--ignore', '5', '--ignore', 'T', os.path.join(basepath, first_rpm), os.path.join(basepath, other_rpm)] proc = subprocess.Popen(args, stdout=subprocess.PIPE, stderr=subprocess.STDOUT, close_fds=True) output = proc.communicate()[0] status = proc.wait() if os.WIFSIGNALED(status) or \ (os.WEXITSTATUS(status) != 0): raise koji.BuildError, 'mismatch when analyzing %s, rpmdiff output was:\n%s' % \ (os.path.basename(first_rpm), output) def importImageInternal(task_id, build_id, imgdata): """ Import image info and the listing into the database, and move an image to the final resting place. The filesize may be reported as a string if it exceeds the 32-bit signed integer limit. This function will convert it if need be. This is the completeBuild for images; it should not be called for scratch images. imgdata is: arch - the arch if the image files - files associated with the image (appliances have multiple files) rpmlist - the list of RPM NVRs installed into the image """ host = Host() host.verify() task = Task(task_id) task.assertHost(host.id) koji.plugin.run_callbacks('preImport', type='image', image=imgdata) # import the build output build_info = get_build(build_id, strict=True) workpath = koji.pathinfo.task(imgdata['task_id']) imgdata['relpath'] = koji.pathinfo.taskrelpath(imgdata['task_id']) archives = [] for imgfile in imgdata['files']: fullpath = os.path.join(workpath, imgfile) archivetype = get_archive_type(imgfile) logger.debug('image type we are importing is: %s' % archivetype) if not archivetype: raise koji.BuildError, 'Unsupported image type' archives.append(import_archive(fullpath, build_info, 'image', imgdata)) # upload logs logs = [f for f in os.listdir(workpath) if f.endswith('.log')] for logfile in logs: logsrc = os.path.join(workpath, logfile) logdir = os.path.join(koji.pathinfo.build(build_info), 'data/logs/image') koji.ensuredir(logdir) final_path = os.path.join(logdir, os.path.basename(logfile)) if os.path.exists(final_path): raise koji.GenericError("Error importing build log. %s already exists." % final_path) if os.path.islink(logsrc) or not os.path.isfile(logsrc): raise koji.GenericError("Error importing build log. %s is not a regular file." % logsrc) os.rename(logsrc, final_path) os.symlink(final_path, logsrc) # record all of the RPMs installed in the image(s) # verify they were built in Koji or in an external repo rpm_ids = [] for an_rpm in imgdata['rpmlist']: location = an_rpm.get('location') if location: data = add_external_rpm(an_rpm, location, strict=False) else: data = get_rpm(an_rpm, strict=True) rpm_ids.append(data['id']) # associate those RPMs with the image q = """INSERT INTO image_listing (image_id,rpm_id) VALUES (%(image_id)i,%(rpm_id)i)""" for archive in archives: sys.stderr.write('working on archive %s' % archive) if archive['filename'].endswith('xml'): continue sys.stderr.write('associating installed rpms with %s' % archive['id']) for rpm_id in rpm_ids: _dml(q, {'image_id': archive['id'], 'rpm_id': rpm_id}) koji.plugin.run_callbacks('postImport', type='image', image=imgdata, fullpath=fullpath) # # XMLRPC Methods # class RootExports(object): '''Contains functions that are made available via XMLRPC''' def buildFromCVS(self, url, tag): raise koji.FunctionDeprecated #return make_task('buildFromCVS',[url, tag]) def restartHosts(self, priority=5): context.session.assertPerm('admin') return make_task('restartHosts', [], priority=priority) def build(self, src, target, opts=None, priority=None, channel=None): """Create a build task priority: the amount to increase (or decrease) the task priority, relative to the default priority; higher values mean lower priority; only admins have the right to specify a negative priority here channel: the channel to allocate the task to Returns the task id """ if not opts: opts = {} taskOpts = {} if priority: if priority < 0: if not context.session.hasPerm('admin'): raise koji.ActionNotAllowed, 'only admins may create high-priority tasks' taskOpts['priority'] = koji.PRIO_DEFAULT + priority if channel: taskOpts['channel'] = channel return make_task('build',[src, target, opts],**taskOpts) def chainBuild(self, srcs, target, opts=None, priority=None, channel=None): """Create a chained build task for building sets of packages in order srcs: list of pkg lists, ie [[src00, src01, src03],[src20],[src30,src31],...] where each of the top-level lists gets built and a new repo is created before the next list is built. target: build target priority: the amount to increase (or decrease) the task priority, relative to the default priority; higher values mean lower priority; only admins have the right to specify a negative priority here channel: the channel to allocate the task to Returns a list of all the dependent task ids """ if not opts: opts = {} taskOpts = {} if priority: if priority < 0: if not context.session.hasPerm('admin'): raise koji.ActionNotAllowed, 'only admins may create high-priority tasks' taskOpts['priority'] = koji.PRIO_DEFAULT + priority if channel: taskOpts['channel'] = channel return make_task('chainbuild',[srcs,target,opts],**taskOpts) def mavenBuild(self, url, target, opts=None, priority=None, channel='maven'): """Create a Maven build task url: The url to checkout the source from. May be a CVS, SVN, or GIT repository. target: the build target priority: the amount to increase (or decrease) the task priority, relative to the default priority; higher values mean lower priority; only admins have the right to specify a negative priority here channel: the channel to allocate the task to (defaults to the "maven" channel) Returns the task ID """ if not context.opts.get('EnableMaven'): raise koji.GenericError, "Maven support not enabled" if not opts: opts = {} taskOpts = {} if priority: if priority < 0: if not context.session.hasPerm('admin'): raise koji.ActionNotAllowed, 'only admins may create high-priority tasks' taskOpts['priority'] = koji.PRIO_DEFAULT + priority if channel: taskOpts['channel'] = channel return make_task('maven', [url, target, opts], **taskOpts) def wrapperRPM(self, build, url, target, priority=None, channel='maven', opts=None): """Create a top-level wrapperRPM task build: The build to generate wrapper rpms for. Must be in the COMPLETE state and have no rpms already associated with it. url: SCM URL to a specfile fragment target: The build target to use when building the wrapper rpm. The build_tag of the target will be used to populate the buildroot in which the rpms are built. priority: the amount to increase (or decrease) the task priority, relative to the default priority; higher values mean lower priority; only admins have the right to specify a negative priority here channel: the channel to allocate the task to (defaults to the "maven" channel) returns the task ID """ if not context.opts.get('EnableMaven'): raise koji.GenericError, "Maven support not enabled" if not opts: opts = {} build = self.getBuild(build, strict=True) if list_rpms(build['id']) and not (opts.get('scratch') or opts.get('create_build')): raise koji.PreBuildError, 'wrapper rpms for %s have already been built' % koji.buildLabel(build) build_target = self.getBuildTarget(target) if not build_target: raise koji.PreBuildError, 'no such build target: %s' % target build_tag = self.getTag(build_target['build_tag'], strict=True) repo_info = self.getRepo(build_tag['id']) if not repo_info: raise koji.PreBuildError, 'no repo for tag: %s' % build_tag['name'] opts['repo_id'] = repo_info['id'] taskOpts = {} if priority: taskOpts['priority'] = koji.PRIO_DEFAULT + priority taskOpts['channel'] = channel return make_task('wrapperRPM', [url, build_target, build, None, opts], **taskOpts) def chainMaven(self, builds, target, opts=None, priority=None, channel='maven'): """Create a Maven chain-build task builds: a list of maps defining the parameters for the sequence of builds target: the build target priority: the amount to increase (or decrease) the task priority, relative to the default priority; higher values mean lower priority; only admins have the right to specify a negative priority here channel: the channel to allocate the task to (defaults to the "maven" channel) Returns the task ID """ if not context.opts.get('EnableMaven'): raise koji.GenericError, "Maven support not enabled" taskOpts = {} if priority: if priority < 0: if not context.session.hasPerm('admin'): raise koji.ActionNotAllowed, 'only admins may create high-priority tasks' taskOpts['priority'] = koji.PRIO_DEFAULT + priority if channel: taskOpts['channel'] = channel return make_task('chainmaven', [builds, target, opts], **taskOpts) def winBuild(self, vm, url, target, opts=None, priority=None, channel='vm'): """ Create a Windows build task vm: the name of the VM to run the build in url: The url to checkout the source from. May be a CVS, SVN, or GIT repository. opts: task options target: the build target priority: the amount to increase (or decrease) the task priority, relative to the default priority; higher values mean lower priority; only admins have the right to specify a negative priority here channel: the channel to allocate the task to (defaults to the "vm" channel) Returns the task ID """ if not context.opts.get('EnableWin'): raise koji.GenericError, "Windows support not enabled" targ_info = self.getBuildTarget(target) policy_data = {'vm_name': vm, 'tag': targ_info['dest_tag']} assert_policy('vm', policy_data) if not opts: opts = {} taskOpts = {} if priority: if priority < 0: if not context.session.hasPerm('admin'): raise koji.ActionNotAllowed, 'only admins may create high-priority tasks' taskOpts['priority'] = koji.PRIO_DEFAULT + priority if channel: taskOpts['channel'] = channel return make_task('winbuild', [vm, url, target, opts], **taskOpts) # Create the image task. Called from _build_image in the client. # def buildImage(self, name, version, arch, target, ksfile, img_type, opts=None, priority=None): """ Create an image using a kickstart file and group package list. """ if img_type not in ('livecd', 'appliance'): raise koji.GenericError, 'Unrecognized image type: %s' % img_type context.session.assertPerm(img_type) taskOpts = {'channel': img_type} taskOpts['arch'] = arch if priority: if priority < 0: if not context.session.hasPerm('admin'): raise koji.ActionNotAllowed, \ 'only admins may create high-priority tasks' taskOpts['priority'] = koji.PRIO_DEFAULT + priority return make_task(img_type, [name, version, arch, target, ksfile, opts], **taskOpts) # Create the image task. Called from _build_image_oz in the client. # def buildImageIndirection(self, opts=None, priority=None): """ Create an image using two other images and an indirection template """ context.session.assertPerm('image') taskOpts = {'channel': 'image'} if priority: if priority < 0: if not context.session.hasPerm('admin'): raise koji.ActionNotAllowed, \ 'only admins may create high-priority tasks' taskOpts['priority'] = koji.PRIO_DEFAULT + priority if not opts.has_key('scratch') and not opts.has_key('indirection_template_url'): raise koji.ActionNotAllowed, 'Non-scratch builds must provide url for the indirection template' return make_task('indirectionimage', [ opts ], **taskOpts) # Create the image task. Called from _build_image_oz in the client. # def buildImageOz(self, name, version, arches, target, inst_tree, opts=None, priority=None): """ Create an image using a kickstart file and group package list. """ context.session.assertPerm('image') taskOpts = {'channel': 'image'} if priority: if priority < 0: if not context.session.hasPerm('admin'): raise koji.ActionNotAllowed, \ 'only admins may create high-priority tasks' taskOpts['priority'] = koji.PRIO_DEFAULT + priority if not opts.has_key('scratch') and not opts.has_key('ksurl'): raise koji.ActionNotAllowed, 'Non-scratch builds must provide ksurl' return make_task('image', [name, version, arches, target, inst_tree, opts], **taskOpts) def migrateImage(self, old_image_id, name, version): """Migrate an old image to the new schema This call must be enabled via hub.conf (the EnableImageMigration setting) """ context.session.assertPerm('admin') if not context.opts.get('EnableImageMigration'): raise koji.GenericError, 'Image migration not enabled' old = old_image_data(old_image_id) check_old_image_files(old) return import_old_image(old, name, version) def hello(self,*args): return "Hello World" def fault(self): "debugging. raise an error" raise Exception, "test exception" def error(self): "debugging. raise an error" raise koji.GenericError, "test error" def echo(self,*args): return args def getAPIVersion(self): return koji.API_VERSION def mavenEnabled(self): return bool(context.opts.get('EnableMaven')) def winEnabled(self): return bool(context.opts.get('EnableWin')) def imageMigrationEnabled(self): return bool(context.opts.get('EnableImageMigration')) def showSession(self): return "%s" % context.session def getSessionInfo(self): if not context.session.logged_in: return None return context.session.session_data def showOpts(self): context.session.assertPerm('admin') return "%r" % context.opts def getEvent(self, id): """ Get information about the event with the given id. A map will be returned with the following keys: - id (integer): id of the event - ts (float): timestamp the event was created, in seconds since the epoch If no event with the given id exists, an error will be raised. """ fields = ('id', 'ts') values = {'id': id} q = """SELECT id, EXTRACT(EPOCH FROM time) FROM events WHERE id = %(id)i""" return _singleRow(q, values, fields, strict=True) def getLastEvent(self, before=None): """ Get the id and timestamp of the last event recorded in the system. Events are usually created as the result of a configuration change in the database. If "before" (int or float) is specified, return the last event that occurred before that time (in seconds since the epoch). If there is no event before the given time, an error will be raised. Note that due to differences in precision between the database and python, this method can return an event with a timestamp the same or slightly higher (by a few microseconds) than the value of "before" provided. Code using this method should check that the timestamp returned is in fact lower than the parameter. When trying to find information about a specific event, the getEvent() method should be used. """ fields = ('id', 'ts') values = {} q = """SELECT id, EXTRACT(EPOCH FROM time) FROM events""" if before is not None: if not isinstance(before, (int, long, float)): raise koji.GenericError, 'invalid type for before: %s' % type(before) # use the repr() conversion because it retains more precision than the # string conversion q += """ WHERE EXTRACT(EPOCH FROM time) < %(before)r""" values['before'] = before q += """ ORDER BY id DESC LIMIT 1""" return _singleRow(q, values, fields, strict=True) def makeTask(self,*args,**opts): #this is mainly for debugging #only an admin can make arbitrary tasks context.session.assertPerm('admin') return make_task(*args,**opts) def uploadFile(self, path, name, size, md5sum, offset, data): #path: the relative path to upload to #name: the name of the file #size: size of contents (bytes) #md5: md5sum (hex digest) of contents #data: base64 encoded file contents #offset: the offset of the chunk # files can be uploaded in chunks, if so the md5 and size describe # the chunk rather than the whole file. the offset indicates where # the chunk belongs # the special offset -1 is used to indicate the final chunk context.session.assertLogin() contents = base64.decodestring(data) del data # we will accept offset and size as strings to work around xmlrpc limits offset = koji.decode_int(offset) size = koji.decode_int(size) if isinstance(md5sum, basestring): # this case is for backwards compatibility verify = "md5" digest = md5sum elif md5sum is None: verify = None else: verify, digest = info sum_cls = get_verify_class(verify) if offset != -1: if size is not None: if size != len(contents): return False if verify is not None: if digest != sum_cls(contents).hexdigest(): return False fn = get_upload_path(path, name, create=True) try: st = os.lstat(fn) except OSError, e: if e.errno == errno.ENOENT: pass else: raise else: if not stat.S_ISREG(st.st_mode): raise koji.GenericError, "destination not a file: %s" % fn elif offset == 0: #first chunk, so file should not exist yet if not fn.endswith('.log'): # but we allow .log files to be uploaded multiple times to support # realtime log-file viewing raise koji.GenericError, "file already exists: %s" % fn fd = os.open(fn, os.O_RDWR | os.O_CREAT, 0666) # log_error("fd=%r" %fd) try: if offset == 0 or (offset == -1 and size == len(contents)): #truncate file fcntl.lockf(fd, fcntl.LOCK_EX|fcntl.LOCK_NB) try: os.ftruncate(fd, 0) # log_error("truncating fd %r to 0" %fd) finally: fcntl.lockf(fd, fcntl.LOCK_UN) if offset == -1: os.lseek(fd,0,2) else: os.lseek(fd,offset,0) #write contents fcntl.lockf(fd, fcntl.LOCK_EX|fcntl.LOCK_NB, len(contents), 0, 2) try: os.write(fd, contents) # log_error("wrote contents") finally: fcntl.lockf(fd, fcntl.LOCK_UN, len(contents), 0, 2) if offset == -1: if size is not None: #truncate file fcntl.lockf(fd, fcntl.LOCK_EX|fcntl.LOCK_NB) try: os.ftruncate(fd, size) # log_error("truncating fd %r to size %r" % (fd,size)) finally: fcntl.lockf(fd, fcntl.LOCK_UN) if verify is not None: #check final digest chksum = sum_cls() fcntl.lockf(fd, fcntl.LOCK_SH|fcntl.LOCK_NB) try: os.lseek(fd,0,0) while True: block = os.read(fd, 819200) if not block: break chksum.update(block) if digest != chksum.hexdigest(): return False finally: fcntl.lockf(fd, fcntl.LOCK_UN) finally: os.close(fd) return True def checkUpload(self, path, name, verify=None, tail=None): """Return basic information about an uploaded file""" fn = get_upload_path(path, name) data = {} try: fd = os.open(fn, os.O_RDONLY) except OSError, e: if e.errno == errno.ENOENT: return None else: raise try: try: fcntl.lockf(fd, fcntl.LOCK_SH|fcntl.LOCK_NB) except IOError, e: raise koji.LockError, e st = os.fstat(fd) if not stat.S_ISREG(st.st_mode): raise koji.GenericError, "Not a regular file: %s" % fn data['size'] = koji.encode_int(st.st_size) data['mtime'] = st.st_mtime if verify: sum_cls = get_verify_class(verify) if tail is not None: if tail < 0: raise koji.GenericError, "invalid tail value: %r" % tail offset = max(st.st_size - tail, 0) os.lseek(fd, offset, 0) length = 0 chksum = sum_cls() chunk = os.read(fd, 8192) while chunk: length += len(chunk) chksum.update(chunk) chunk = os.read(fd, 8192) data['sumlength'] = koji.encode_int(length) data['hexdigest'] = chksum.hexdigest() return data finally: # this will also free our lock os.close(fd) def downloadTaskOutput(self, taskID, fileName, offset=0, size=-1): """Download the file with the given name, generated by the task with the given ID.""" if '..' in fileName: raise koji.GenericError, 'Invalid file name: %s' % fileName filePath = '%s/%s/%s' % (koji.pathinfo.work(), koji.pathinfo.taskrelpath(taskID), fileName) filePath = os.path.normpath(filePath) if not os.path.isfile(filePath): raise koji.GenericError, 'no file "%s" output by task %i' % (fileName, taskID) # Let the caller handler any IO or permission errors f = file(filePath, 'r') if isinstance(offset, str): offset = int(offset) if offset != None and offset > 0: f.seek(offset, 0) elif offset != None and offset < 0: f.seek(offset, 2) contents = f.read(size) f.close() return base64.encodestring(contents) listTaskOutput = staticmethod(list_task_output) createTag = staticmethod(create_tag) editTag = staticmethod(old_edit_tag) editTag2 = staticmethod(edit_tag) deleteTag = staticmethod(delete_tag) createExternalRepo = staticmethod(create_external_repo) listExternalRepos = staticmethod(get_external_repos) getExternalRepo = staticmethod(get_external_repo) editExternalRepo = staticmethod(edit_external_repo) deleteExternalRepo = staticmethod(delete_external_repo) def addExternalRepoToTag(self, tag_info, repo_info, priority): """Add an external repo to a tag""" # wrap the local method so we don't expose the event parameter add_external_repo_to_tag(tag_info, repo_info, priority) def removeExternalRepoFromTag(self, tag_info, repo_info): """Remove an external repo from a tag""" # wrap the local method so we don't expose the event parameter remove_external_repo_from_tag(tag_info, repo_info) editTagExternalRepo = staticmethod(edit_tag_external_repo) getTagExternalRepos = staticmethod(get_tag_external_repos) getExternalRepoList = staticmethod(get_external_repo_list) importBuildInPlace = staticmethod(import_build_in_place) resetBuild = staticmethod(reset_build) def importArchive(self, filepath, buildinfo, type, typeInfo): """ Import an archive file and associate it with a build. The archive can be any non-rpm filetype supported by Koji. filepath: path to the archive file (relative to the Koji workdir) buildinfo: information about the build to associate the archive with May be a string (NVR), integer (buildID), or dict (containing keys: name, version, release) type: type of the archive being imported. Currently supported archive types: maven, win typeInfo: dict of type-specific information """ if type == 'maven': if not context.opts.get('EnableMaven'): raise koji.GenericError, 'Maven support not enabled' context.session.assertPerm('maven-import') elif type == 'win': if not context.opts.get('EnableWin'): raise koji.GenericError, 'Windows support not enabled' context.session.assertPerm('win-import') elif type == 'image': context.session.assertPerm('image-import') else: koji.GenericError, 'unsupported archive type: %s' % type buildinfo = get_build(buildinfo, strict=True) fullpath = '%s/%s' % (koji.pathinfo.work(), filepath) import_archive(fullpath, buildinfo, type, typeInfo) untaggedBuilds = staticmethod(untagged_builds) tagHistory = staticmethod(tag_history) queryHistory = staticmethod(query_history) buildMap = staticmethod(build_map) deleteBuild = staticmethod(delete_build) def buildReferences(self, build, limit=None): return build_references(get_build(build, strict=True)['id'], limit) addVolume = staticmethod(add_volume) removeVolume = staticmethod(remove_volume) listVolumes = staticmethod(list_volumes) changeBuildVolume = staticmethod(change_build_volume) def getVolume(self, volume, strict=False): return lookup_name('volume', volume, strict=strict) def createEmptyBuild(self, name, version, release, epoch, owner=None): context.session.assertPerm('admin') data = { 'name' : name, 'version' : version, 'release' : release, 'epoch' : epoch } if owner is not None: data['owner'] = owner return new_build(data) def createMavenBuild(self, build_info, maven_info): """ Associate Maven metadata with an existing build. The build must not already have associated Maven metadata. maven_info must be a dict containing group_id, artifact_id, and version entries. """ context.session.assertPerm('maven-import') if not context.opts.get('EnableMaven'): raise koji.GenericError, "Maven support not enabled" build = get_build(build_info) if not build: build_id = new_build(dslice(build_info, ('name', 'version', 'release', 'epoch'))) build = get_build(build_id, strict=True) new_maven_build(build, maven_info) def createWinBuild(self, build_info, win_info): """ Associate Windows metadata with an existing build. The build must not already have associated Windows metadata. win_info must be a dict containing a platform entry. """ context.session.assertPerm('win-import') if not context.opts.get('EnableWin'): raise koji.GenericError, "Windows support not enabled" build = get_build(build_info) if not build: build_id = new_build(dslice(build_info, ('name', 'version', 'release', 'epoch'))) build = get_build(build_id, strict=True) new_win_build(build, win_info) def createImageBuild(self, build_info): """ Associate image metadata with an existing build. The build must not already have associated image metadata. """ context.session.assertPerm('image-import') build = get_build(build_info) if not build: build_id = new_build(dslice(build_info, ('name', 'version', 'release', 'epoch'))) build = get_build(build_id, strict=True) new_image_build(build) def importRPM(self, path, basename): """Import an RPM into the database. The file must be uploaded first. """ context.session.assertPerm('admin') uploadpath = koji.pathinfo.work() fn = "%s/%s/%s" %(uploadpath,path,basename) if not os.path.exists(fn): raise koji.GenericError, "No such file: %s" % fn rpminfo = import_rpm(fn) import_rpm_file(fn,rpminfo['build'],rpminfo) add_rpm_sig(rpminfo['id'], koji.rip_rpm_sighdr(fn)) for tag in list_tags(build=rpminfo['build_id']): set_tag_update(tag['id'], 'IMPORT') def addExternalRPM(self, rpminfo, external_repo, strict=True): """Import an external RPM This call is mainly for testing. Normal access will be through a host call""" context.session.assertPerm('admin') add_external_rpm(rpminfo, external_repo, strict=strict) def tagBuildBypass(self,tag,build,force=False): """Tag a build without running post checks or notifications This is a short circuit function for imports. Admin permission required. Tagging with a locked tag is not allowed unless force is true. Retagging is not allowed unless force is true. (retagging changes the order of entries will affect which build is the latest) """ context.session.assertPerm('admin') _tag_build(tag, build, force=force) def tagBuild(self,tag,build,force=False,fromtag=None): """Request that a build be tagged The force option will attempt to force the action in the event of: - tag locked - missing permission - package not in list for tag - policy violation The force option is really only effective for admins If fromtag is specified, this becomes a move operation. This call creates a task that was originally intended to perform more extensive checks, but never has. We're stuck with this task system until we're ready to break the api. The return value is the task id """ #first some lookups and basic sanity checks build = get_build(build, strict=True) tag = get_tag(tag, strict=True) if fromtag: fromtag_id = get_tag_id(fromtag, strict=True) else: fromtag_id = None pkg_id = build['package_id'] tag_id = tag['id'] build_id = build['id'] # build state check if build['state'] != koji.BUILD_STATES['COMPLETE']: state = koji.BUILD_STATES[build['state']] raise koji.TagError, "build %s not complete: state %s" % (build['nvr'], state) # basic tag access check assert_tag_access(tag_id,user_id=None,force=force) if fromtag: assert_tag_access(fromtag_id,user_id=None,force=force) # package list check pkgs = readPackageList(tagID=tag_id, pkgID=pkg_id, inherit=True) pkg_error = None if not pkgs.has_key(pkg_id): pkg_error = "Package %s not in list for %s" % (build['name'], tag['name']) elif pkgs[pkg_id]['blocked']: pkg_error = "Package %s blocked in %s" % (build['name'], tag['name']) if pkg_error: if force and context.session.hasPerm('admin'): pkglist_add(tag_id,pkg_id,force=True,block=False) else: raise koji.TagError, pkg_error # tag policy check policy_data = {'tag' : tag_id, 'build' : build_id, 'fromtag' : fromtag_id} if fromtag is None: policy_data['operation'] = 'tag' else: policy_data['operation'] = 'move' #don't check policy for admins using force if not (force and context.session.hasPerm('admin')): assert_policy('tag', policy_data) #XXX - we're running this check twice, here and in host.tagBuild (called by the task) #spawn the tagging task return make_task('tagBuild', [tag_id, build_id, force, fromtag_id], priority=10) def untagBuild(self,tag,build,strict=True,force=False): """Untag a build Unlike tagBuild, this does not create a task No return value""" #we can't staticmethod this one -- we're limiting the options user_id = context.session.user_id tag_id = get_tag(tag, strict=True)['id'] build_id = get_build(build, strict=True)['id'] policy_data = {'tag' : None, 'build' : build_id, 'fromtag' : tag_id} policy_data['operation'] = 'untag' try: #don't check policy for admins using force if not (force and context.session.hasPerm('admin')): assert_policy('tag', policy_data) _untag_build(tag,build,strict=strict,force=force) tag_notification(True, None, tag, build, user_id) except Exception, e: exctype, value = sys.exc_info()[:2] tag_notification(False, None, tag, build, user_id, False, "%s: %s" % (exctype, value)) raise def untagBuildBypass(self, tag, build, strict=True, force=False): """Untag a build without any checks or notifications Admins only. Intended for syncs/imports. Unlike tagBuild, this does not create a task No return value""" context.session.assertPerm('admin') _untag_build(tag, build, strict=strict, force=force) def moveBuild(self,tag1,tag2,build,force=False): """Move a build from tag1 to tag2 Returns the task id of the task performing the move""" return self.tagBuild(tag2,build,force=force,fromtag=tag1) def moveAllBuilds(self, tag1, tag2, package, force=False): """Move all builds of a package from tag1 to tag2 in the correct order Returns the task id of the task performing the move""" #lookups and basic sanity checks pkg_id = get_package_id(package, strict=True) tag1_id = get_tag_id(tag1, strict=True) tag2_id = get_tag_id(tag2, strict=True) # note: we're just running the quick checks now so we can fail # early if appropriate, rather then waiting for the task # Make sure package is on the list for the tag we're adding it to pkgs = readPackageList(tagID=tag2_id, pkgID=pkg_id, inherit=True) pkg_error = None if not pkgs.has_key(pkg_id): pkg_error = "Package %s not in list for tag %s" % (package, tag2) elif pkgs[pkg_id]['blocked']: pkg_error = "Package %s blocked in tag %s" % (package, tag2) if pkg_error: if force and context.session.hasPerm('admin'): pkglist_add(tag2_id,pkg_id,force=True,block=False) else: raise koji.TagError, pkg_error #access check assert_tag_access(tag1_id,user_id=None,force=force) assert_tag_access(tag2_id,user_id=None,force=force) build_list = readTaggedBuilds(tag1_id, package=package) # we want 'ORDER BY tag_listing.create_event ASC' not DESC so reverse build_list.reverse() #policy check policy_data = {'tag' : tag2, 'fromtag' : tag1, 'operation' : 'move'} #don't check policy for admins using force if not (force and context.session.hasPerm('admin')): for build in build_list: policy_data['build'] = build['id'] assert_policy('tag', policy_data) #XXX - we're running this check twice, here and in host.tagBuild (called by the task) wait_on = [] tasklist = [] for build in build_list: task_id = make_task('dependantTask', [wait_on, [['tagBuild', [tag2_id, build['id'], force, tag1_id], {'priority':15}]]]) wait_on = [task_id] log_error("\nMade Task: %s\n" % task_id) tasklist.append(task_id) return tasklist listTags = staticmethod(list_tags) getBuild = staticmethod(get_build) getNextRelease = staticmethod(get_next_release) getMavenBuild = staticmethod(get_maven_build) getWinBuild = staticmethod(get_win_build) getImageBuild = staticmethod(get_image_build) getArchiveTypes = staticmethod(get_archive_types) getArchiveType = staticmethod(get_archive_type) listArchives = staticmethod(list_archives) getArchive = staticmethod(get_archive) getMavenArchive = staticmethod(get_maven_archive) getWinArchive = staticmethod(get_win_archive) getImageArchive = staticmethod(get_image_archive) listArchiveFiles = staticmethod(list_archive_files) getArchiveFile = staticmethod(get_archive_file) def getChangelogEntries(self, buildID=None, taskID=None, filepath=None, author=None, before=None, after=None, queryOpts=None): """Get changelog entries for the build with the given ID, or for the rpm generated by the given task at the given path - author: only return changelogs with a matching author - before: only return changelogs from before the given date (in UTC) (a datetime object, a string in the 'YYYY-MM-DD HH24:MI:SS format, or integer seconds since the epoch) - after: only return changelogs from after the given date (in UTC) (a datetime object, a string in the 'YYYY-MM-DD HH24:MI:SS format, or integer seconds since the epoch) - queryOpts: query options used by the QueryProcessor If "order" is not specified in queryOpts, results will be returned in reverse chronological order. Results will be returned as a list of maps with 'date', 'author', and 'text' keys. If there are no results, an empty list will be returned. """ if queryOpts is None: queryOpts = {} if queryOpts.get('order') in ('date', '-date'): # use a numeric sort on the timestamp instead of an alphabetic sort on the # date string queryOpts['order'] = queryOpts['order'].replace('date', 'date_ts') if buildID: build_info = get_build(buildID) if not build_info: return _applyQueryOpts([], queryOpts) srpms = self.listRPMs(buildID=build_info['id'], arches='src') if not srpms: return _applyQueryOpts([], queryOpts) srpm_info = srpms[0] srpm_path = os.path.join(koji.pathinfo.build(build_info), koji.pathinfo.rpm(srpm_info)) elif taskID: if not filepath: raise koji.GenericError, 'filepath must be spcified with taskID' if filepath.startswith('/') or '../' in filepath: raise koji.GenericError, 'invalid filepath: %s' % filepath srpm_path = os.path.join(koji.pathinfo.work(), koji.pathinfo.taskrelpath(taskID), filepath) else: raise koji.GenericError, 'either buildID or taskID and filepath must be specified' if not os.path.exists(srpm_path): return _applyQueryOpts([], queryOpts) if before: if isinstance(before, datetime.datetime): before = calendar.timegm(before.utctimetuple()) elif isinstance(before, (str, unicode)): before = koji.util.parseTime(before) elif isinstance(before, (int, long)): pass else: raise koji.GenericError, 'invalid type for before: %s' % type(before) if after: if isinstance(after, datetime.datetime): after = calendar.timegm(after.utctimetuple()) elif isinstance(after, (str, unicode)): after = koji.util.parseTime(after) elif isinstance(after, (int, long)): pass else: raise koji.GenericError, 'invalid type for after: %s' % type(after) results = [] fields = koji.get_header_fields(srpm_path, ['changelogtime', 'changelogname', 'changelogtext']) for (cltime, clname, cltext) in zip(fields['changelogtime'], fields['changelogname'], fields['changelogtext']): cldate = datetime.datetime.fromtimestamp(cltime).isoformat(' ') clname = koji.fixEncoding(clname) cltext = koji.fixEncoding(cltext) if author and author != clname: continue if before and not cltime < before: continue if after and not cltime > after: continue if queryOpts.get('asList'): results.append([cldate, clname, cltext]) else: results.append({'date': cldate, 'date_ts': cltime, 'author': clname, 'text': cltext}) return _applyQueryOpts(results, queryOpts) def cancelBuild(self, buildID): """Cancel the build with the given buildID If the build is associated with a task, cancel the task as well. Return True if the build was successfully canceled, False if not.""" build = get_build(buildID) if build == None: return False if build['owner_id'] != context.session.user_id: if not context.session.hasPerm('admin'): raise koji.ActionNotAllowed, 'Cannot cancel build, not owner' return cancel_build(build['id']) def assignTask(self,task_id,host,force=False): """Assign a task to a host Specify force=True to assign a non-free task """ context.session.assertPerm('admin') task = Task(task_id) host = get_host(host,strict=True) task.assign(host['id'],force) def freeTask(self,task_id): """Free a task""" context.session.assertPerm('admin') task = Task(task_id) task.free() def cancelTask(self,task_id,recurse=True): """Cancel a task""" task = Task(task_id) if not task.verifyOwner() and not task.verifyHost(): if not context.session.hasPerm('admin'): raise koji.ActionNotAllowed, 'Cannot cancel task, not owner' #non-admins can also use cancelBuild task.cancel(recurse=recurse) def cancelTaskFull(self,task_id,strict=True): """Cancel a task and all tasks in its group""" context.session.assertPerm('admin') #non-admins can use cancelBuild or cancelTask Task(task_id).cancelFull(strict=strict) def cancelTaskChildren(self,task_id): """Cancel a task's children, but not the task itself""" task = Task(task_id) if not task.verifyOwner() and not task.verifyHost(): if not context.session.hasPerm('admin'): raise koji.ActionNotAllowed, 'Cannot cancel task, not owner' task.cancelChildren() def setTaskPriority(self, task_id, priority, recurse=True): """Set task priority""" context.session.assertPerm('admin') task = Task(task_id) task.setPriority(priority, recurse=recurse) def listTagged(self,tag,event=None,inherit=False,prefix=None,latest=False,package=None,owner=None,type=None): """List builds tagged with tag""" if not isinstance(tag,int): #lookup tag id tag = get_tag_id(tag,strict=True) results = readTaggedBuilds(tag,event,inherit=inherit,latest=latest,package=package,owner=owner,type=type) if prefix: prefix = prefix.lower() results = [build for build in results if build['package_name'].lower().startswith(prefix)] return results def listTaggedRPMS(self,tag,event=None,inherit=False,latest=False,package=None,arch=None,rpmsigs=False,owner=None,type=None): """List rpms and builds within tag""" if not isinstance(tag,int): #lookup tag id tag = get_tag_id(tag,strict=True) return readTaggedRPMS(tag,event=event,inherit=inherit,latest=latest,package=package,arch=arch,rpmsigs=rpmsigs,owner=owner,type=type) def listTaggedArchives(self, tag, event=None, inherit=False, latest=False, package=None, type=None): """List archives and builds within a tag""" if not isinstance(tag, int): tag = get_tag_id(tag,strict=True) return readTaggedArchives(tag, event=event, inherit=inherit, latest=latest, package=package, type=type) def listBuilds(self, packageID=None, userID=None, taskID=None, prefix=None, state=None, volumeID=None, createdBefore=None, createdAfter=None, completeBefore=None, completeAfter=None, type=None, typeInfo=None, queryOpts=None): """List package builds. If packageID is specified, restrict the results to builds of the specified package. If userID is specified, restrict the results to builds owned by the given user. If taskID is specfied, restrict the results to builds with the given task ID. If taskID is -1, restrict the results to builds with a non-null taskID. If volumeID is specified, restrict the results to builds stored on that volume One or more of packageID, userID, volumeID, and taskID may be specified. If prefix is specified, restrict the results to builds whose package name starts with that prefix. If createdBefore and/or createdAfter are specified, restrict the results to builds whose creation_time is before and/or after the given time. If completeBefore and/or completeAfter are specified, restrict the results to builds whose completion_time is before and/or after the given time. The time may be specified as a floating point value indicating seconds since the Epoch (as returned by time.time()) or as a string in ISO format ('YYYY-MM-DD HH24:MI:SS'). If type is not None, only list builds of the associated type. Currently the supported types are 'maven' and 'win'. if typeInfo is not None, only list builds with matching type-specific info. Must be used in conjunction with the type parameter. Currently the only supported type is 'maven', and typeInfo is a dict containing one or more of group_id, artifact_id, and/or version. Output will be restricted to builds with matching Maven metadata. Returns a list of maps. Each map contains the following keys: - build_id - version - release - epoch - state - package_id - package_name - name (same as package_name) - nvr (synthesized for sorting purposes) - owner_id - owner_name - volume_id - volume_name - creation_event_id - creation_time - creation_ts - completion_time - completion_ts - task_id If type == 'maven', each map will also contain the following keys: - maven_group_id - maven_artifact_id - maven_version If no builds match, an empty list is returned. """ fields = [('build.id', 'build_id'), ('build.version', 'version'), ('build.release', 'release'), ('build.epoch', 'epoch'), ('build.state', 'state'), ('build.completion_time', 'completion_time'), ('events.id', 'creation_event_id'), ('events.time', 'creation_time'), ('build.task_id', 'task_id'), ('EXTRACT(EPOCH FROM events.time)','creation_ts'), ('EXTRACT(EPOCH FROM build.completion_time)','completion_ts'), ('package.id', 'package_id'), ('package.name', 'package_name'), ('package.name', 'name'), ('volume.id', 'volume_id'), ('volume.name', 'volume_name'), ("package.name || '-' || build.version || '-' || build.release", 'nvr'), ('users.id', 'owner_id'), ('users.name', 'owner_name')] tables = ['build'] joins = ['events ON build.create_event = events.id', 'package ON build.pkg_id = package.id', 'volume ON build.volume_id = volume.id', 'users ON build.owner = users.id'] clauses = [] if packageID != None: clauses.append('package.id = %(packageID)i') if userID != None: clauses.append('users.id = %(userID)i') if volumeID != None: clauses.append('volume.id = %(volumeID)i') if taskID != None: if taskID == -1: clauses.append('build.task_id IS NOT NULL') else: clauses.append('build.task_id = %(taskID)i') if prefix: clauses.append("package.name ilike %(prefix)s || '%%'") if state != None: clauses.append('build.state = %(state)i') if createdBefore: if not isinstance(createdBefore, str): createdBefore = datetime.datetime.fromtimestamp(createdBefore).isoformat(' ') clauses.append('events.time < %(createdBefore)s') if createdAfter: if not isinstance(createdAfter, str): createdAfter = datetime.datetime.fromtimestamp(createdAfter).isoformat(' ') clauses.append('events.time > %(createdAfter)s') if completeBefore: if not isinstance(completeBefore, str): completeBefore = datetime.datetime.fromtimestamp(completeBefore).isoformat(' ') clauses.append('build.completion_time < %(completeBefore)s') if completeAfter: if not isinstance(completeAfter, str): completeAfter = datetime.datetime.fromtimestamp(completeAfter).isoformat(' ') clauses.append('build.completion_time > %(completeAfter)s') if type is None: pass elif type == 'maven': joins.append('maven_builds ON build.id = maven_builds.build_id') fields.extend([('maven_builds.group_id', 'maven_group_id'), ('maven_builds.artifact_id', 'maven_artifact_id'), ('maven_builds.version', 'maven_version')]) if typeInfo: if typeInfo.has_key('group_id'): clauses.append('maven_builds.group_id = %(group_id)s') group_id = typeInfo['group_id'] if typeInfo.has_key('artifact_id'): clauses.append('maven_builds.artifact_id = %(artifact_id)s') artifact_id = typeInfo['artifact_id'] if typeInfo.has_key('version'): clauses.append('maven_builds.version = %(version)s') version = typeInfo['version'] elif type == 'win': joins.append('win_builds ON build.id = win_builds.build_id') fields.append(('win_builds.platform', 'platform')) if typeInfo: clauses.append('win_builds.platform = %(platform)s') platform = typeInfo['platform'] elif type == 'image': joins.append('image_builds ON build.id = image_builds.build_id') fields.append(('image_builds.build_id', 'build_id')) else: raise koji.GenericError, 'unsupported build type: %s' % type query = QueryProcessor(columns=[pair[0] for pair in fields], aliases=[pair[1] for pair in fields], tables=tables, joins=joins, clauses=clauses, values=locals(), opts=queryOpts) return query.iterate() def getLatestBuilds(self,tag,event=None,package=None,type=None): """List latest builds for tag (inheritance enabled)""" if not isinstance(tag,int): #lookup tag id tag = get_tag_id(tag,strict=True) return readTaggedBuilds(tag,event,inherit=True,latest=True,package=package,type=type) def getLatestRPMS(self, tag, package=None, arch=None, event=None, rpmsigs=False, type=None): """List latest RPMS for tag (inheritance enabled)""" if not isinstance(tag,int): #lookup tag id tag = get_tag_id(tag,strict=True) return readTaggedRPMS(tag, package=package, arch=arch, event=event, inherit=True, latest=True, rpmsigs=rpmsigs, type=type) def getLatestMavenArchives(self, tag, event=None, inherit=True): """Return a list of the latest Maven archives in the tag, as of the given event (or now if event is None). If inherit is True, follow the tag hierarchy and return a list of the latest archives for all tags in the tree.""" tag_id = get_tag_id(tag, strict=True) return maven_tag_archives(tag_id, event_id=event, inherit=inherit) def getAverageBuildDuration(self, package): """Get the average duration of a build of the given package. Returns a floating-point value indicating the average number of seconds the package took to build. If the package has never been built, return None.""" packageID = get_package_id(package) if not packageID: return None st_complete = koji.BUILD_STATES['COMPLETE'] query = """SELECT EXTRACT(epoch FROM avg(build.completion_time - events.time)) FROM build JOIN events ON build.create_event = events.id WHERE build.pkg_id = %(packageID)i AND build.state = %(st_complete)i AND build.task_id IS NOT NULL""" return _singleValue(query, locals()) packageListAdd = staticmethod(pkglist_add) packageListRemove = staticmethod(pkglist_remove) packageListBlock = staticmethod(pkglist_block) packageListUnblock = staticmethod(pkglist_unblock) packageListSetOwner = staticmethod(pkglist_setowner) packageListSetArches = staticmethod(pkglist_setarches) groupListAdd = staticmethod(grplist_add) groupListRemove = staticmethod(grplist_remove) groupListBlock = staticmethod(grplist_block) groupListUnblock = staticmethod(grplist_unblock) groupPackageListAdd = staticmethod(grp_pkg_add) groupPackageListRemove = staticmethod(grp_pkg_remove) groupPackageListBlock = staticmethod(grp_pkg_block) groupPackageListUnblock = staticmethod(grp_pkg_unblock) groupReqListAdd = staticmethod(grp_req_add) groupReqListRemove = staticmethod(grp_req_remove) groupReqListBlock = staticmethod(grp_req_block) groupReqListUnblock = staticmethod(grp_req_unblock) getTagGroups = staticmethod(readTagGroups) checkTagAccess = staticmethod(check_tag_access) getGlobalInheritance = staticmethod(readGlobalInheritance) def getInheritanceData(self,tag,event=None): """Return inheritance data for tag""" if not isinstance(tag,int): #lookup tag id tag = get_tag_id(tag,strict=True) return readInheritanceData(tag,event) def setInheritanceData(self,tag,data,clear=False): if not isinstance(tag,int): #lookup tag id tag = get_tag_id(tag,strict=True) context.session.assertPerm('admin') return writeInheritanceData(tag,data,clear=clear) def getFullInheritance(self,tag,event=None,reverse=False,stops={},jumps={}): if not isinstance(tag,int): #lookup tag id tag = get_tag_id(tag,strict=True) for mapping in [stops, jumps]: for key in mapping.keys(): mapping[int(key)] = mapping[key] return readFullInheritance(tag,event,reverse,stops,jumps) listRPMs = staticmethod(list_rpms) def listBuildRPMs(self,build): """Get information about all the RPMs generated by the build with the given ID. A list of maps is returned, each map containing the following keys: - id - name - version - release - arch - epoch - payloadhash - size - buildtime - build_id - buildroot_id If no build has the given ID, or the build generated no RPMs, an empty list is returned.""" if not isinstance(build, int): #lookup build id build = self.findBuildID(build) return self.listRPMs(buildID=build) getRPM = staticmethod(get_rpm) def getRPMDeps(self, rpmID, depType=None, queryOpts=None): """Return dependency information about the RPM with the given ID. If depType is specified, restrict results to dependencies of the given type. Otherwise, return all dependency information. A list of maps will be returned, each with the following keys: - name - version - flags - type If there is no RPM with the given ID, or the RPM has no dependency information, an empty list will be returned. """ if queryOpts is None: queryOpts = {} rpm_info = get_rpm(rpmID) if not rpm_info or not rpm_info['build_id']: return _applyQueryOpts([], queryOpts) build_info = get_build(rpm_info['build_id']) rpm_path = os.path.join(koji.pathinfo.build(build_info), koji.pathinfo.rpm(rpm_info)) if not os.path.exists(rpm_path): return _applyQueryOpts([], queryOpts) results = [] for dep_name in ['REQUIRE','PROVIDE','CONFLICT','OBSOLETE']: dep_id = getattr(koji, 'DEP_' + dep_name) if depType is None or depType == dep_id: fields = koji.get_header_fields(rpm_path, [dep_name + 'NAME', dep_name + 'VERSION', dep_name + 'FLAGS']) for (name, version, flags) in zip(fields[dep_name + 'NAME'], fields[dep_name + 'VERSION'], fields[dep_name + 'FLAGS']): if queryOpts.get('asList'): results.append([name, version, flags, dep_id]) else: results.append({'name': name, 'version': version, 'flags': flags, 'type': dep_id}) return _applyQueryOpts(results, queryOpts) def listRPMFiles(self, rpmID, queryOpts=None): """List files associated with the RPM with the given ID. A list of maps will be returned, each with the following keys: - name - digest - md5 (alias for digest) - digest_algo - size - flags If there is no RPM with the given ID, or that RPM contains no files, an empty list will be returned.""" if queryOpts is None: queryOpts = {} rpm_info = get_rpm(rpmID) if not rpm_info or not rpm_info['build_id']: return _applyQueryOpts([], queryOpts) build_info = get_build(rpm_info['build_id']) rpm_path = os.path.join(koji.pathinfo.build(build_info), koji.pathinfo.rpm(rpm_info)) if not os.path.exists(rpm_path): return _applyQueryOpts([], queryOpts) results = [] hdr = koji.get_rpm_header(rpm_path) fields = koji.get_header_fields(hdr, ['filenames', 'filemd5s', 'filesizes', 'fileflags', 'fileusername', 'filegroupname', 'filemtimes', 'filemodes']) digest_algo = koji.util.filedigestAlgo(hdr) for (name, digest, size, flags, user, group, mtime, mode) in zip(fields['filenames'], fields['filemd5s'], fields['filesizes'], fields['fileflags'], fields['fileusername'], fields['filegroupname'], fields['filemtimes'], fields['filemodes']): if queryOpts.get('asList'): results.append([name, digest, size, flags, digest_algo, user, group, mtime, mode]) else: results.append({'name': name, 'digest': digest, 'digest_algo': digest_algo, 'md5': digest, 'size': size, 'flags': flags, 'user': user, 'group': group, 'mtime': mtime, 'mode': mode}) return _applyQueryOpts(results, queryOpts) def getRPMFile(self, rpmID, filename): """ Get info about the file in the given RPM with the given filename. A map will be returned with the following keys: - rpm_id - name - digest - md5 (alias for digest) - digest_algo - size - flags If no such file exists, an empty map will be returned. """ rpm_info = get_rpm(rpmID) if not rpm_info or not rpm_info['build_id']: return {} build_info = get_build(rpm_info['build_id']) rpm_path = os.path.join(koji.pathinfo.build(build_info), koji.pathinfo.rpm(rpm_info)) if not os.path.exists(rpm_path): return {} hdr = koji.get_rpm_header(rpm_path) # use filemd5s for backward compatibility fields = koji.get_header_fields(hdr, ['filenames', 'filemd5s', 'filesizes', 'fileflags', 'fileusername', 'filegroupname', 'filemtimes', 'filemodes']) digest_algo = koji.util.filedigestAlgo(hdr) i = 0 for name in fields['filenames']: if name == filename: return {'rpm_id': rpm_info['id'], 'name': name, 'digest': fields['filemd5s'][i], 'digest_algo': digest_algo, 'md5': fields['filemd5s'][i], 'size': fields['filesizes'][i], 'flags': fields['fileflags'][i], 'user': fields['fileusername'][i], 'group': fields['filegroupname'][i], 'mtime': fields['filemtimes'][i], 'mode': fields['filemodes'][i]} i += 1 return {} def getRPMHeaders(self, rpmID=None, taskID=None, filepath=None, headers=None): """ Get the requested headers from the rpm. Header names are case-insensitive. If a header is requested that does not exist an exception will be raised. Returns a map of header names to values. If the specified ID is not valid or the rpm does not exist on the file system, an empty map will be returned. """ if not headers: headers = [] if rpmID: rpm_info = get_rpm(rpmID) if not rpm_info or not rpm_info['build_id']: return {} build_info = get_build(rpm_info['build_id']) rpm_path = os.path.join(koji.pathinfo.build(build_info), koji.pathinfo.rpm(rpm_info)) if not os.path.exists(rpm_path): return {} elif taskID: if not filepath: raise koji.GenericError, 'filepath must be specified with taskID' if filepath.startswith('/') or '../' in filepath: raise koji.GenericError, 'invalid filepath: %s' % filepath rpm_path = os.path.join(koji.pathinfo.work(), koji.pathinfo.taskrelpath(taskID), filepath) else: raise koji.GenericError, 'either rpmID or taskID and filepath must be specified' headers = koji.get_header_fields(rpm_path, headers) for key, value in headers.items(): if isinstance(value, basestring): headers[key] = koji.fixEncoding(value) return headers queryRPMSigs = staticmethod(query_rpm_sigs) def writeSignedRPM(self, an_rpm, sigkey, force=False): """Write a signed copy of the rpm""" context.session.assertPerm('sign') #XXX - still not sure if this is the right restriction return write_signed_rpm(an_rpm, sigkey, force) def addRPMSig(self, an_rpm, data): """Store a signature header for an rpm data: the signature header encoded as base64 """ context.session.assertPerm('sign') return add_rpm_sig(an_rpm, base64.decodestring(data)) findBuildID = staticmethod(find_build_id) getTagID = staticmethod(get_tag_id) getTag = staticmethod(get_tag) def getPackageID(self,name): c=context.cnx.cursor() q="""SELECT id FROM package WHERE name=%(name)s""" c.execute(q,locals()) r=c.fetchone() if not r: return None return r[0] getPackage = staticmethod(lookup_package) def listPackages(self, tagID=None, userID=None, pkgID=None, prefix=None, inherited=False, with_dups=False, event=None): """List if tagID and/or userID is specified, limit the list to packages belonging to the given user or with the given tag. A list of maps is returned. Each map contains the following keys: - package_id - package_name If tagID, userID, or pkgID are specified, the maps will also contain the following keys. - tag_id - tag_name - owner_id - owner_name - extra_arches - blocked """ if tagID is None and userID is None and pkgID is None: query = """SELECT id, name from package""" results = _multiRow(query,{},('package_id', 'package_name')) else: if tagID is not None: tagID = get_tag_id(tagID,strict=True) if userID is not None: userID = get_user(userID,strict=True)['id'] if pkgID is not None: pkgID = get_package_id(pkgID,strict=True) result_list = readPackageList(tagID=tagID, userID=userID, pkgID=pkgID, inherit=inherited, with_dups=with_dups, event=event).values() if with_dups: # when with_dups=True, readPackageList returns a list of list of dicts # convert it to a list of dicts for consistency results = [] for result in result_list: results.extend(result) else: results = result_list if prefix: prefix = prefix.lower() results = [package for package in results if package['package_name'].lower().startswith(prefix)] return results def checkTagPackage(self,tag,pkg): """Check that pkg is in the list for tag. Returns true/false""" tag_id = get_tag_id(tag,strict=False) pkg_id = get_package_id(pkg,strict=False) if pkg_id is None or tag_id is None: return False pkgs = readPackageList(tagID=tag_id, pkgID=pkg_id, inherit=True) if not pkgs.has_key(pkg_id): return False else: #still might be blocked return not pkgs[pkg_id]['blocked'] def getPackageConfig(self,tag,pkg,event=None): """Get config for package in tag""" tag_id = get_tag_id(tag,strict=False) pkg_id = get_package_id(pkg,strict=False) if pkg_id is None or tag_id is None: return None pkgs = readPackageList(tagID=tag_id, pkgID=pkg_id, inherit=True, event=event) return pkgs.get(pkg_id,None) getUser = staticmethod(get_user) def grantPermission(self, userinfo, permission, create=False): """Grant a permission to a user""" context.session.assertPerm('admin') user_id = get_user(userinfo,strict=True)['id'] perm = lookup_perm(permission, strict=(not create), create=create) perm_id = perm['id'] if perm['name'] in koji.auth.get_user_perms(user_id): raise koji.GenericError, 'user %s already has permission: %s' % (userinfo, perm['name']) insert = InsertProcessor('user_perms') insert.set(user_id=user_id, perm_id=perm_id) insert.make_create() insert.execute() def revokePermission(self, userinfo, permission): """Revoke a permission from a user""" context.session.assertPerm('admin') user_id = get_user(userinfo, strict=True)['id'] perm = lookup_perm(permission, strict=True) perm_id = perm['id'] if perm['name'] not in koji.auth.get_user_perms(user_id): raise koji.GenericError, 'user %s does not have permission: %s' % (userinfo, perm['name']) update = UpdateProcessor('user_perms', values=locals(), clauses=["user_id = %(user_id)i", "perm_id = %(perm_id)i"]) update.make_revoke() update.execute() def createUser(self, username, status=None, krb_principal=None): """Add a user to the database""" context.session.assertPerm('admin') if get_user(username): raise koji.GenericError, 'user already exists: %s' % username if krb_principal and get_user(krb_principal): raise koji.GenericError, 'user with this Kerberos principal already exists: %s' % krb_principal return context.session.createUser(username, status=status, krb_principal=krb_principal) def enableUser(self, username): """Enable logins by the specified user""" user = get_user(username) if not user: raise koji.GenericError, 'unknown user: %s' % username set_user_status(user, koji.USER_STATUS['NORMAL']) def disableUser(self, username): """Disable logins by the specified user""" user = get_user(username) if not user: raise koji.GenericError, 'unknown user: %s' % username set_user_status(user, koji.USER_STATUS['BLOCKED']) #group management calls newGroup = staticmethod(new_group) addGroupMember = staticmethod(add_group_member) dropGroupMember = staticmethod(drop_group_member) getGroupMembers = staticmethod(get_group_members) def listUsers(self, userType=koji.USERTYPES['NORMAL'], prefix=None, queryOpts=None): """List all users in the system. type can be either koji.USERTYPES['NORMAL'] or koji.USERTYPES['HOST']. Returns a list of maps with the following keys: - id - name - status - usertype - krb_principal If no users of the specified type exist, return an empty list.""" fields = ('id', 'name', 'status', 'usertype', 'krb_principal') clauses = ['usertype = %(userType)i'] if prefix: clauses.append("name ilike %(prefix)s || '%%'") query = QueryProcessor(columns=fields, tables=('users',), clauses=clauses, values=locals(), opts=queryOpts) return query.execute() def getBuildConfig(self,tag,event=None): """Return build configuration associated with a tag""" taginfo = get_tag(tag,strict=True,event=event) arches = taginfo['arches'] if arches is None: #follow inheritance for arches order = readFullInheritance(taginfo['id'],event=event) for link in order: if link['noconfig']: continue arches = get_tag(link['parent_id'],strict=True,event=event)['arches'] if arches is not None: taginfo['arches'] = arches break return taginfo def getRepo(self,tag,state=None,event=None): if isinstance(tag,int): id = tag else: id = get_tag_id(tag,strict=True) fields = ['repo.id', 'repo.state', 'repo.create_event', 'events.time', 'EXTRACT(EPOCH FROM events.time)'] aliases = ['id', 'state', 'create_event', 'creation_time', 'create_ts'] joins = ['events ON repo.create_event = events.id'] clauses = ['repo.tag_id = %(id)i'] if event: # the repo table doesn't have all the fields of a _config table, just create_event clauses.append('create_event <= %(event)i') else: if state is None: state = koji.REPO_READY clauses.append('repo.state = %(state)s' ) query = QueryProcessor(columns=fields, aliases=aliases, tables=['repo'], joins=joins, clauses=clauses, values=locals(), opts={'order': '-creation_time', 'limit': 1}) return query.executeOne() repoInfo = staticmethod(repo_info) getActiveRepos = staticmethod(get_active_repos) def newRepo(self, tag, event=None, src=False, debuginfo=False): """Create a newRepo task. returns task id""" if context.session.hasPerm('regen-repo'): pass else: context.session.assertPerm('repo') opts = {} if event is not None: opts['event'] = event if src: opts['src'] = True if debuginfo: opts['debuginfo'] = True args = koji.encode_args(tag, **opts) return make_task('newRepo', args, priority=15, channel='createrepo') def repoExpire(self, repo_id): """mark repo expired""" context.session.assertPerm('repo') repo_expire(repo_id) def repoDelete(self, repo_id): """Attempt to mark repo deleted, return number of references If the number of references is nonzero, no change is made Does not remove from disk""" context.session.assertPerm('repo') return repo_delete(repo_id) def repoProblem(self, repo_id): """mark repo as broken""" context.session.assertPerm('repo') repo_problem(repo_id) def debugFunction(self, name, *args, **kwargs): # This is potentially dangerous, so it must be explicitly enabled allowed = context.opts.get('EnableFunctionDebug', False) if not allowed: raise koji.ActionNotAllowed, 'This call is not enabled' context.session.assertPerm('admin') func = globals().get(name) if callable(func): return func(*args, **kwargs) else: raise koji.GenericError, 'Unable to find function: %s' % name tagChangedSinceEvent = staticmethod(tag_changed_since_event) createBuildTarget = staticmethod(create_build_target) editBuildTarget = staticmethod(edit_build_target) deleteBuildTarget = staticmethod(delete_build_target) getBuildTargets = staticmethod(get_build_targets) getBuildTarget = staticmethod(get_build_target) def taskFinished(self,taskId): task = Task(taskId) return task.isFinished() def getTaskRequest(self, taskId): task = Task(taskId) return task.getRequest() def getTaskResult(self, taskId): task = Task(taskId) return task.getResult() def getTaskInfo(self, task_id, request=False): """Get information about a task""" single = True if isinstance(task_id, list) or isinstance(task_id, tuple): single = False else: task_id = [task_id] ret = [Task(id).getInfo(False, request) for id in task_id] if single: return ret[0] else: return ret def getTaskChildren(self, task_id, request=False): """Return a list of the children of the Task with the given ID.""" task = Task(task_id) return task.getChildren(request=request) def getTaskDescendents(self, task_id, request=False): """Get all descendents of the task with the given ID. Return a map of task_id -> list of child tasks. If the given task has no descendents, the map will contain a single elements mapping the given task ID to an empty list. Map keys will be strings representing integers, due to limitations in xmlrpclib. If "request" is true, the parameters sent with the xmlrpc request will be decoded and included in the map.""" task = Task(task_id) return get_task_descendents(task, request=request) def listTasks(self, opts=None, queryOpts=None): """Return list of tasks filtered by options Options(dictionary): option[type]: meaning arch[list]: limit to tasks for given arches state[list]: limit to tasks of given state owner[int]: limit to tasks owned by the user with the given ID host_id[int]: limit to tasks running on the host with the given ID channel_id[int]: limit to tasks in the specified channel parent[int]: limit to tasks with the given parent decode[bool]: whether or not xmlrpc data in the 'request' and 'result' fields should be decoded; defaults to False method[str]: limit to tasks of the given method createdBefore[float or str]: limit to tasks whose create_time is before the given date, in either float (seconds since the epoch) or str (ISO) format createdAfter[float or str]: limit to tasks whose create_time is after the given date, in either float (seconds since the epoch) or str (ISO) format startedBefore[float or str]: limit to tasks whose start_time is before the given date, in either float (seconds since the epoch) or str (ISO) format startedAfter[float or str]: limit to tasks whose start_time is after the given date, in either float (seconds since the epoch) or str (ISO) format completeBefore[float or str]: limit to tasks whose completion_time is before the given date, in either float (seconds since the epoch) or str (ISO) format completeAfter[float or str]: limit to tasks whose completion_time is after the given date, in either float (seconds since the epoch) or str (ISO) format """ if not opts: opts = {} if not queryOpts: queryOpts = {} tables = ['task'] joins = ['users ON task.owner = users.id'] flist = Task.fields + ( ('task.request', 'request'), ('task.result', 'result'), ('users.name', 'owner_name'), ('users.usertype', 'owner_type'), ) fields = [f[0] for f in flist] aliases = [f[1] for f in flist] conditions = [] for f in ['arch','state']: if opts.has_key(f): conditions.append('%s IN %%(%s)s' % (f, f)) for f in ['owner', 'host_id', 'channel_id', 'parent']: if opts.has_key(f): if opts[f] is None: conditions.append('%s IS NULL' % f) else: conditions.append('%s = %%(%s)i' % (f, f)) if opts.has_key('method'): conditions.append('method = %(method)s') time_opts = [ ['createdBefore', 'create_time', '<'], ['createdAfter', 'create_time', '>'], ['startedBefore', 'start_time', '<'], ['startedAfter', 'start_time', '>'], ['completeBefore', 'completion_time', '<'], ['completeAfter', 'completion_time', '>'], # and a couple aliases for api compat: ['completedBefore', 'completion_time', '<'], ['completedAfter', 'completion_time', '>'], ] for key, field, cmp in time_opts: if opts.get(key) != None: value = opts[key] if not isinstance(value, str): opts[key] = datetime.datetime.fromtimestamp(value).isoformat(' ') conditions.append('%(field)s %(cmp)s %%(%(key)s)s' % locals()) query = QueryProcessor(columns=fields, aliases=aliases, tables=tables, joins=joins, clauses=conditions, values=opts, opts=queryOpts) tasks = query.iterate() if queryOpts and (queryOpts.get('countOnly') or queryOpts.get('asList')): # Either of the above options makes us unable to easily the decode # the xmlrpc data return tasks if opts.get('decode') and not queryOpts.get('countOnly'): if queryOpts.get('asList'): keys = [] for n, f in aliases: if f in ('request','result'): keys.append(n) else: keys = ('request','result') tasks = self._decode_tasks(tasks, keys) return tasks def _decode_tasks(self, tasks, keys): for task in tasks: # decode xmlrpc data for f in keys: val = task[f] if val: try: if val.find('//task_ scratchdir = koji.pathinfo.scratch() username = get_user(task.getOwner())['name'] dir = "%s/%s/task_%s" % (scratchdir, username, task_id) koji.ensuredir(dir) for relpath in [srpm] + rpms: fn = "%s/%s" % (uploadpath,relpath) dest = "%s/%s" % (dir,os.path.basename(fn)) os.rename(fn,dest) os.symlink(dest,fn) if logs: for key, files in logs.iteritems(): if key: logdir = "%s/logs/%s" % (dir, key) else: logdir = "%s/logs" % dir koji.ensuredir(logdir) for relpath in files: fn = "%s/%s" % (uploadpath,relpath) dest = "%s/%s" % (logdir,os.path.basename(fn)) os.rename(fn,dest) os.symlink(dest,fn) def moveMavenBuildToScratch(self, task_id, results, rpm_results): "Move a completed Maven scratch build into place (not imported)" if not context.opts.get('EnableMaven'): raise koji.GenericError, 'Maven support not enabled' host = Host() host.verify() task = Task(task_id) task.assertHost(host.id) scratchdir = koji.pathinfo.scratch() username = get_user(task.getOwner())['name'] destdir = os.path.join(scratchdir, username, 'task_%s' % task_id) for reldir, files in results['files'].items() + [('', results['logs'])]: for filename in files: if reldir: relpath = os.path.join(reldir, filename) else: relpath = filename src = os.path.join(koji.pathinfo.task(results['task_id']), relpath) dest = os.path.join(destdir, relpath) koji.ensuredir(os.path.dirname(dest)) os.rename(src, dest) os.symlink(dest, src) if rpm_results: for relpath in [rpm_results['srpm']] + rpm_results['rpms'] + \ rpm_results['logs']: src = os.path.join(koji.pathinfo.task(rpm_results['task_id']), relpath) dest = os.path.join(destdir, 'rpms', relpath) koji.ensuredir(os.path.dirname(dest)) os.rename(src, dest) os.symlink(dest, src) def moveWinBuildToScratch(self, task_id, results, rpm_results): "Move a completed Windows scratch build into place (not imported)" if not context.opts.get('EnableWin'): raise koji.GenericError, 'Windows support not enabled' host = Host() host.verify() task = Task(task_id) task.assertHost(host.id) scratchdir = koji.pathinfo.scratch() username = get_user(task.getOwner())['name'] destdir = os.path.join(scratchdir, username, 'task_%s' % task_id) for relpath in results['output'].keys() + results['logs']: filename = os.path.join(koji.pathinfo.task(results['task_id']), relpath) dest = os.path.join(destdir, relpath) koji.ensuredir(os.path.dirname(dest)) os.rename(filename, dest) os.symlink(dest, filename) if rpm_results: for relpath in [rpm_results['srpm']] + rpm_results['rpms'] + \ rpm_results['logs']: filename = os.path.join(koji.pathinfo.task(rpm_results['task_id']), relpath) dest = os.path.join(destdir, 'rpms', relpath) koji.ensuredir(os.path.dirname(dest)) os.rename(filename, dest) os.symlink(dest, filename) def moveImageBuildToScratch(self, task_id, results): """move a completed image scratch build into place""" host = Host() host.verify() task = Task(task_id) task.assertHost(host.id) logger.debug('scratch image results: %s' % results) for sub_results in results.values(): workdir = koji.pathinfo.task(sub_results['task_id']) scratchdir = koji.pathinfo.scratch() username = get_user(task.getOwner())['name'] destdir = os.path.join(scratchdir, username, 'task_%s' % sub_results['task_id']) for img in sub_results['files'] + sub_results['logs']: src = os.path.join(workdir, img) dest = os.path.join(destdir, img) koji.ensuredir(destdir) logger.debug('renaming %s to %s' % (src, dest)) os.rename(src, dest) os.symlink(dest, src) if sub_results.has_key('rpmresults'): rpm_results = sub_results['rpmresults'] for relpath in [rpm_results['srpm']] + rpm_results['rpms'] + \ rpm_results['logs']: src = os.path.join(koji.pathinfo.task( rpm_results['task_id']), relpath) dest = os.path.join(destdir, 'rpms', relpath) koji.ensuredir(os.path.dirname(dest)) os.rename(src, dest) os.symlink(dest, src) def initBuild(self,data): """Create a stub build entry. This is done at the very beginning of the build to inform the system the build is underway. """ host = Host() host.verify() #sanity checks task = Task(data['task_id']) task.assertHost(host.id) #prep the data data['owner'] = task.getOwner() data['state'] = koji.BUILD_STATES['BUILDING'] data['completion_time'] = None return new_build(data) def completeBuild(self, task_id, build_id, srpm, rpms, brmap=None, logs=None): """Import final build contents into the database""" #sanity checks host = Host() host.verify() task = Task(task_id) task.assertHost(host.id) result = import_build(srpm, rpms, brmap, task_id, build_id, logs=logs) build_notification(task_id, build_id) return result def completeImageBuild(self, task_id, build_id, results): """Set an image build to the COMPLETE state""" host = Host() host.verify() task = Task(task_id) task.assertHost(host.id) self.importImage(task_id, build_id, results) st_complete = koji.BUILD_STATES['COMPLETE'] update = UpdateProcessor('build', clauses=['id=%(build_id)i'], values={'build_id': build_id}) update.set(id=build_id, state=st_complete) update.rawset(completion_time='now()') update.execute() # send email build_notification(task_id, build_id) def initMavenBuild(self, task_id, build_info, maven_info): """Create a new in-progress Maven build Synthesize the release number by taking the (integer) release of the last successful build and incrementing it.""" if not context.opts.get('EnableMaven'): raise koji.GenericError, "Maven support not enabled" host = Host() host.verify() task = Task(task_id) task.assertHost(host.id) build_info['release'] = get_next_release(build_info) data = build_info.copy() data['task_id'] = task_id data['owner'] = task.getOwner() data['state'] = koji.BUILD_STATES['BUILDING'] data['completion_time'] = None build_id = new_build(data) data['id'] = build_id new_maven_build(data, maven_info) return data def createMavenBuild(self, build_info, maven_info): """ Associate Maven metadata with an existing build. Used by the rpm2maven plugin. """ host = Host() host.verify() if not context.opts.get('EnableMaven'): raise koji.GenericError, "Maven support not enabled" new_maven_build(build_info, maven_info) def completeMavenBuild(self, task_id, build_id, maven_results, rpm_results): """Complete the Maven build.""" if not context.opts.get('EnableMaven'): raise koji.GenericError, "Maven support not enabled" host = Host() host.verify() task = Task(task_id) task.assertHost(host.id) build_info = get_build(build_id, strict=True) maven_info = get_maven_build(build_id, strict=True) maven_task_id = maven_results['task_id'] maven_buildroot_id = maven_results['buildroot_id'] maven_task_dir = koji.pathinfo.task(maven_task_id) # import the build output for relpath, files in maven_results['files'].iteritems(): dir_maven_info = maven_info poms = [f for f in files if f.endswith('.pom')] if len(poms) == 0: pass elif len(poms) == 1: # This directory has a .pom file, so get the Maven group_id, # artifact_id, and version from it and associate those with # the artifacts in this directory pom_path = os.path.join(maven_task_dir, relpath, poms[0]) pom_info = koji.parse_pom(pom_path) dir_maven_info = koji.pom_to_maven_info(pom_info) else: raise koji.BuildError, 'multiple .pom files in %s: %s' % (relpath, ', '.join(poms)) for filename in files: if os.path.splitext(filename)[1] in ('.md5', '.sha1'): # metadata, we'll recreate that ourselves continue filepath = os.path.join(maven_task_dir, relpath, filename) if filename == 'maven-metadata.xml': # We want the maven-metadata.xml to be present in the build dir # so that it's a valid Maven repo, but we don't want to track it # in the database because we regenerate it when creating tag repos. # So we special-case it here. destdir = os.path.join(koji.pathinfo.mavenbuild(build_info), relpath) _import_archive_file(filepath, destdir) _generate_maven_metadata(destdir) continue archivetype = get_archive_type(filename) if not archivetype: # Unknown archive type, skip it continue import_archive(filepath, build_info, 'maven', dir_maven_info, maven_buildroot_id) # move the logs to their final destination for log_path in maven_results['logs']: import_build_log(os.path.join(maven_task_dir, log_path), build_info, subdir='maven') if rpm_results: _import_wrapper(rpm_results['task_id'], build_info, rpm_results) # update build state st_complete = koji.BUILD_STATES['COMPLETE'] koji.plugin.run_callbacks('preBuildStateChange', attribute='state', old=build_info['state'], new=st_complete, info=build_info) update = UpdateProcessor('build', clauses=['id=%(build_id)i'], values={'build_id': build_id}) update.set(state=st_complete) update.rawset(completion_time='now()') update.execute() koji.plugin.run_callbacks('postBuildStateChange', attribute='state', old=build_info['state'], new=st_complete, info=build_info) # send email build_notification(task_id, build_id) def importArchive(self, filepath, buildinfo, type, typeInfo): """ Import an archive file and associate it with a build. The archive can be any non-rpm filetype supported by Koji. Used by the rpm2maven plugin. """ host = Host() host.verify() if type == 'maven': if not context.opts.get('EnableMaven'): raise koji.GenericError, 'Maven support not enabled' elif type == 'win': if not context.opts.get('EnableWin'): raise koji.GenericError, 'Windows support not enabled' else: koji.GenericError, 'unsupported archive type: %s' % type import_archive(filepath, buildinfo, type, typeInfo) def importWrapperRPMs(self, task_id, build_id, rpm_results): """Import the wrapper rpms and associate them with the given build. The build must not have any existing rpms associated with it.""" if not context.opts.get('EnableMaven'): raise koji.GenericError, "Maven support not enabled" host = Host() host.verify() task = Task(task_id) task.assertHost(host.id) build_info = get_build(build_id, strict=True) if build_info['state'] != koji.BUILD_STATES['COMPLETE']: raise koji.GenericError, 'cannot import wrapper rpms for %s: build state is %s, not complete' % \ (koji.buildLabel(build_info), koji.BUILD_STATES[build_info['state']].lower()) if list_rpms(buildID=build_info['id']): # don't allow overwriting of already-imported wrapper RPMs raise koji.GenericError, 'wrapper rpms for %s have already been imported' % koji.buildLabel(build_info) _import_wrapper(task.id, build_info, rpm_results) def initImageBuild(self, task_id, build_info): """create a new in-progress image build""" host = Host() host.verify() task = Task(task_id) task.assertHost(host.id) data = build_info.copy() data['task_id'] = task_id data['owner'] = task.getOwner() data['state'] = koji.BUILD_STATES['BUILDING'] data['completion_time'] = None build_id = new_build(data) data['id'] = build_id new_image_build(data) return data def initWinBuild(self, task_id, build_info, win_info): """ Create a new in-progress Windows build. """ if not context.opts.get('EnableWin'): raise koji.GenericError, 'Windows support not enabled' host = Host() host.verify() #sanity checks task = Task(task_id) task.assertHost(host.id) # build_info must contain name, version, and release data = build_info.copy() data['task_id'] = task_id data['owner'] = task.getOwner() data['state'] = koji.BUILD_STATES['BUILDING'] data['completion_time'] = None build_id = new_build(data) data['id'] = build_id new_win_build(data, win_info) return data def completeWinBuild(self, task_id, build_id, results, rpm_results): """Complete a Windows build""" if not context.opts.get('EnableWin'): raise koji.GenericError, 'Windows support not enabled' host = Host() host.verify() task = Task(task_id) task.assertHost(host.id) build_info = get_build(build_id, strict=True) win_info = get_win_build(build_id, strict=True) task_dir = koji.pathinfo.task(results['task_id']) # import the build output for relpath, metadata in results['output'].iteritems(): archivetype = get_archive_type(relpath) if not archivetype: # Unknown archive type, skip it continue filepath = os.path.join(task_dir, relpath) metadata['relpath'] = os.path.dirname(relpath) import_archive(filepath, build_info, 'win', metadata, buildroot_id=results['buildroot_id']) # move the logs to their final destination for relpath in results['logs']: subdir = 'win' reldir = os.path.dirname(relpath) if reldir: subdir = os.path.join(subdir, reldir) import_build_log(os.path.join(task_dir, relpath), build_info, subdir=subdir) if rpm_results: _import_wrapper(rpm_results['task_id'], build_info, rpm_results) # update build state st_complete = koji.BUILD_STATES['COMPLETE'] koji.plugin.run_callbacks('preBuildStateChange', attribute='state', old=build_info['state'], new=st_complete, info=build_info) update = UpdateProcessor('build', clauses=['id=%(build_id)i'], values={'build_id': build_id}) update.set(state=st_complete) update.rawset(completion_time='now()') update.execute() koji.plugin.run_callbacks('postBuildStateChange', attribute='state', old=build_info['state'], new=st_complete, info=build_info) # send email build_notification(task_id, build_id) def failBuild(self, task_id, build_id): """Mark the build as failed. If the current state is not 'BUILDING', or the current competion_time is not null, a GenericError will be raised.""" host = Host() host.verify() task = Task(task_id) task.assertHost(host.id) st_failed = koji.BUILD_STATES['FAILED'] buildinfo = get_build(build_id, strict=True) koji.plugin.run_callbacks('preBuildStateChange', attribute='state', old=buildinfo['state'], new=st_failed, info=buildinfo) query = """SELECT state, completion_time FROM build WHERE id = %(build_id)i FOR UPDATE""" result = _singleRow(query, locals(), ('state', 'completion_time')) if result['state'] != koji.BUILD_STATES['BUILDING']: raise koji.GenericError, 'cannot update build %i, state: %s' % \ (build_id, koji.BUILD_STATES[result['state']]) elif result['completion_time'] is not None: raise koji.GenericError, 'cannot update build %i, completed at %s' % \ (build_id, result['completion_time']) update = """UPDATE build SET state = %(st_failed)i, completion_time = NOW() WHERE id = %(build_id)i""" _dml(update, locals()) build_notification(task_id, build_id) koji.plugin.run_callbacks('postBuildStateChange', attribute='state', old=buildinfo['state'], new=st_failed, info=buildinfo) def tagBuild(self,task_id,tag,build,force=False,fromtag=None): """Tag a build (host version) This tags as the user who owns the task If fromtag is specified, also untag the package (i.e. move in a single transaction) No return value """ host = Host() host.verify() task = Task(task_id) task.assertHost(host.id) user_id = task.getOwner() policy_data = {'tag' : tag, 'build' : build, 'fromtag' : fromtag} policy_data['user_id'] = user_id if fromtag is None: policy_data['operation'] = 'tag' else: policy_data['operation'] = 'move' #don't check policy for admins using force perms = koji.auth.get_user_perms(user_id) if not force or 'admin' not in perms: assert_policy('tag', policy_data) if fromtag: _untag_build(fromtag,build,user_id=user_id,force=force,strict=True) _tag_build(tag,build,user_id=user_id,force=force) def importImage(self, task_id, build_id, results): """ Import a built image, populating the database with metadata and moving the image to its final location. """ for sub_results in results.values(): importImageInternal(task_id, build_id, sub_results) if sub_results.has_key('rpmresults'): rpm_results = sub_results['rpmresults'] _import_wrapper(rpm_results['task_id'], get_build(build_id, strict=True), rpm_results) def tagNotification(self, is_successful, tag_id, from_id, build_id, user_id, ignore_success=False, failure_msg=''): """Create a tag notification message. Handles creation of tagNotification tasks for hosts.""" host = Host() host.verify() tag_notification(is_successful, tag_id, from_id, build_id, user_id, ignore_success, failure_msg) def checkPolicy(self, name, data, default='deny', strict=False): host = Host() host.verify() return check_policy(name, data, default=default, strict=strict) def assertPolicy(self, name, data, default='deny'): host = Host() host.verify() check_policy(name, data, default=default, strict=True) def evalPolicy(self, name, data): """Evaluate named policy with given data and return the result""" host = Host() host.verify() ruleset = context.policy.get(name) if not ruleset: raise koji.GenericError, "no such policy: %s" % name return ruleset.apply(data) def newBuildRoot(self, repo, arch, task_id=None): host = Host() host.verify() if task_id is not None: Task(task_id).assertHost(host.id) br = BuildRoot() return br.new(host.id,repo,arch,task_id=task_id) def setBuildRootState(self,brootid,state,task_id=None): host = Host() host.verify() if task_id is not None: Task(task_id).assertHost(host.id) br = BuildRoot(brootid) br.assertHost(host.id) if task_id is not None: br.assertTask(task_id) return br.setState(state) def setBuildRootList(self,brootid,rpmlist,task_id=None): host = Host() host.verify() if task_id is not None: Task(task_id).assertHost(host.id) br = BuildRoot(brootid) br.assertHost(host.id) if task_id is not None: br.assertTask(task_id) return br.setList(rpmlist) def updateBuildRootList(self,brootid,rpmlist,task_id=None): host = Host() host.verify() if task_id is not None: Task(task_id).assertHost(host.id) br = BuildRoot(brootid) br.assertHost(host.id) if task_id is not None: br.assertTask(task_id) return br.updateList(rpmlist) def updateBuildrootArchives(self, brootid, task_id, archives, project=False): host = Host() host.verify() Task(task_id).assertHost(host.id) br = BuildRoot(brootid) br.assertHost(host.id) br.assertTask(task_id) return br.updateArchiveList(archives, project) def updateMavenBuildRootList(self, brootid, task_id, mavenlist, ignore=None, project=False, ignore_unknown=False, extra_deps=None): if not context.opts.get('EnableMaven'): raise koji.GenericError, "Maven support not enabled" host = Host() host.verify() Task(task_id).assertHost(host.id) br = BuildRoot(brootid) br.assertHost(host.id) br.assertTask(task_id) repo = repo_info(br.data['repo_id'], strict=True) tag = get_tag(repo['tag_id'], strict=True) maven_build_index = {} # Index the maven_tag_archives result by group_id:artifact_id:version # The function ensures that each g:a:v maps to a single build id. # The generator returned by maven_tag_archives can create a lot of data, # but this index will only consume a fraction of that. for archive in maven_tag_archives(tag['id'], event_id=repo['create_event']): # unfortunately pgdb does not appear to intern strings, but still # better not to create any new ones idx_build = \ maven_build_index.setdefault( archive['group_id'], {}).setdefault( archive['artifact_id'], {}).setdefault( archive['version'], archive['build_id']) if idx_build != archive['build_id']: logger.error("Found multiple builds for %(group_id)s:%(artifact_id)s:%(version)s. Current build: %(build_id)i", archive) logger.error("Indexed build id was %i", idx_build) if not ignore: ignore = [] if not extra_deps: extra_deps = [] task_deps = {} for dep in extra_deps: if isinstance(dep, (int, long)): task_output = list_task_output(dep, stat=True) for filepath, filestats in task_output.iteritems(): if os.path.splitext(filepath)[1] in ['.log', '.md5', '.sha1']: continue tokens = filepath.split('/') if len(tokens) < 4: # should never happen in a Maven repo continue filename = tokens.pop() maven_info = {} maven_info['version'] = tokens.pop() maven_info['artifact_id'] = tokens.pop() maven_info['group_id'] = '.'.join(tokens) maven_label = koji.mavenLabel(maven_info) fileinfo = {'filename': filename, 'size': int(filestats['st_size'])} if maven_label in task_deps: task_deps[maven_label]['files'].append(fileinfo) else: task_deps[maven_label] = {'maven_info': maven_info, 'files': [fileinfo]} else: build = get_build(dep, strict=True) for archive in list_archives(buildID=build['id'], type='maven'): idx_build = \ maven_build_index.setdefault( archive['group_id'], {}).setdefault( archive['artifact_id'], {}).setdefault( archive['version'], archive['build_id']) if idx_build != archive['build_id']: logger.error("Overriding build for %(group_id)s:%(artifact_id)s:%(version)s.", archive) logger.error("Current build is %s, new build is %s.", idx_build, archive['build_id']) maven_build_index[archive['group_id']][archive['artifact_id']][archive['version']] = archive['build_id'] ignore.extend(task_deps.values()) SNAPSHOT_RE = re.compile(r'-\d{8}\.\d{6}-\d+') ignore_by_label = {} for entry in ignore: ignore_info = entry['maven_info'] ignore_label = koji.mavenLabel(ignore_info) if not ignore_by_label.has_key(ignore_label): ignore_by_label[ignore_label] = {} for fileinfo in entry['files']: filename = fileinfo['filename'] ignore_by_label[ignore_label][filename] = fileinfo if SNAPSHOT_RE.search(filename): # the task output snapshot versions, which means the # local repo will contain the same file with both # -SNAPSHOT and -{timestamp} in the name snapname = SNAPSHOT_RE.sub('-SNAPSHOT', filename) ignore_by_label[ignore_label][snapname] = fileinfo archives = [] for entry in mavenlist: maven_info = entry['maven_info'] maven_label = koji.mavenLabel(maven_info) ignore_archives = ignore_by_label.get(maven_label, {}) build_id = maven_build_index.get( maven_info['group_id'], {}).get( maven_info['artifact_id'], {}).get( maven_info['version']) if not build_id: if not ignore_unknown: # just warn for now. might be in ignore list. the loop below will check. logger.warning('Unmatched maven g:a:v in build environment: ' '%(group_id)s:%(artifact_id)s:%(version)s', maven_info) build_archives = {} else: tinfo = dslice(maven_info, ['group_id', 'artifact_id', 'version']) build_archives = list_archives(buildID=build_id, type='maven', typeInfo=tinfo) # index by filename build_archives = dict([(a['filename'], a) for a in build_archives]) for fileinfo in entry['files']: ignore_archive = ignore_archives.get(fileinfo['filename']) tag_archive = build_archives.get(fileinfo['filename']) if tag_archive and fileinfo['size'] == tag_archive['size']: archives.append(tag_archive) elif ignore_archive and fileinfo['size'] == ignore_archive['size']: pass else: if not ignore_unknown: logger.error("Unknown file for %(group_id)s:%(artifact_id)s:%(version)s", maven_info) if build_id: build = get_build(build_id) logger.error("g:a:v supplied by build %(nvr)s", build) logger.error("Build supplies %i archives: %r", len(build_archives), build_archives.keys()) if tag_archive: logger.error("Size mismatch, br: %i, db: %i", fileinfo['size'], tag_archive['size']) raise koji.BuildrootError, 'Unknown file in build environment: %s, size: %s' % \ ('%s/%s' % (fileinfo['path'], fileinfo['filename']), fileinfo['size']) return br.updateArchiveList(archives, project) def repoInit(self, tag, with_src=False, with_debuginfo=False, event=None): """Initialize a new repo for tag""" host = Host() host.verify() return repo_init(tag, with_src=with_src, with_debuginfo=with_debuginfo, event=event) def repoAddRPM(self, repo_id, path): """Add an uploaded rpm to a repo""" host = Host() host.verify() rinfo = repo_info(repo_id, strict=True) repodir = koji.pathinfo.repo(repo_id, rinfo['tag_name']) if rinfo['state'] != koji.REPO_INIT: raise koji.GenericError, "Repo %(id)s not in INIT state (got %(state)s)" % rinfo #verify file exists uploadpath = koji.pathinfo.work() filepath = "%s/%s" % (uploadpath, path) if not os.path.exists(filepath): raise koji.GenericError, "no such file: %s" % filepath rpminfo = koji.get_header_fields(filepath, ('arch','sourcepackage')) dirs = [] if not rpminfo['sourcepackage'] and rpminfo['arch'] != 'noarch': arch = koji.canonArch(rpminfo['arch']) dir = "%s/%s/RPMS" % (repodir, arch) if os.path.isdir(dir): dirs.append(dir) else: #noarch and srpms linked for all arches for fn in os.listdir(repodir): if fn == 'groups': continue if rpminfo['sourcepackage']: dir = "%s/%s/SRPMS" % (repodir, fn) else: dir = "%s/%s/RPMS" % (repodir, fn) if os.path.isdir(dir): dirs.append(dir) for dir in dirs: fn = os.path.basename(filepath) dst = "%s/%s" % (dir, fn) if os.path.exists(dst): s_st = os.stat(filepath) d_st = os.stat(dst) if s_st.st_ino != d_st.st_ino: raise koji.GenericError, "File already in repo: %s" % dst #otherwise the desired hardlink already exists else: os.link(filepath, dst) def repoDone(self, repo_id, data, expire=False): """Move repo data into place, mark as ready, and expire earlier repos repo_id: the id of the repo data: a dictionary of the form { arch: (uploadpath, files), ...} expire(optional): if set to true, mark the repo expired immediately* * This is used when a repo from an older event is generated """ host = Host() host.verify() rinfo = repo_info(repo_id, strict=True) koji.plugin.run_callbacks('preRepoDone', repo=rinfo, data=data, expire=expire) if rinfo['state'] != koji.REPO_INIT: raise koji.GenericError, "Repo %(id)s not in INIT state (got %(state)s)" % rinfo repodir = koji.pathinfo.repo(repo_id, rinfo['tag_name']) workdir = koji.pathinfo.work() for arch, (uploadpath, files) in data.iteritems(): archdir = "%s/%s" % (repodir, arch) if not os.path.isdir(archdir): raise koji.GenericError, "Repo arch directory missing: %s" % archdir datadir = "%s/repodata" % archdir koji.ensuredir(datadir) for fn in files: src = "%s/%s/%s" % (workdir,uploadpath, fn) dst = "%s/%s" % (datadir, fn) if not os.path.exists(src): raise koji.GenericError, "uploaded file missing: %s" % src os.link(src, dst) os.unlink(src) if expire: repo_expire(repo_id) koji.plugin.run_callbacks('postRepoDone', repo=rinfo, data=data, expire=expire) return #else: repo_ready(repo_id) repo_expire_older(rinfo['tag_id'], rinfo['create_event']) #make a latest link latestrepolink = koji.pathinfo.repo('latest', rinfo['tag_name']) #XXX - this is a slight abuse of pathinfo try: if os.path.lexists(latestrepolink): os.unlink(latestrepolink) os.symlink(str(repo_id), latestrepolink) except OSError: #making this link is nonessential log_error("Unable to create latest link for repo: %s" % repodir) koji.plugin.run_callbacks('postRepoDone', repo=rinfo, data=data, expire=expire) def isEnabled(self): host = Host() host.verify() return host.isEnabled() def get_upload_path(reldir, name, create=False): orig_reldir = reldir orig_name = name # lots of sanity checks d, name = os.path.split(name) if d or name.startswith('.'): raise koji.GenericError, "Invalid upload filename: %s" % orig_name reldir = os.path.normpath(reldir) if not reldir or reldir.startswith('..'): raise koji.GenericError, "Invalid upload directory: %s" % orig_reldir parts = reldir.split('/') check_user = True if create and parts[0] == "tasks": if len(parts) < 3: raise koji.GenericError, "Invalid task upload directory: %s" % orig_reldir try: task_id = int(parts[2]) except ValueError: raise koji.GenericError, "Invalid task upload directory: %s" % orig_reldir # only the host running this task may write here host = Host() host.verify() Task(task_id).assertHost(host.id) check_user = False udir = os.path.join(koji.pathinfo.work(), reldir) if create: koji.ensuredir(udir) if check_user: # assuming login was asserted earlier u_fn = os.path.join(udir, '.user') if os.path.exists(u_fn): user_id = int(file(u_fn, 'r').read()) if context.session.user_id != user_id: raise koji.GenericError, "Invalid upload directory, not owner: %s" % orig_reldir else: fo = file(u_fn, 'w') fo.write(str(context.session.user_id)) fo.close() return os.path.join(udir, name) def get_verify_class(verify): if verify == 'md5': return md5_constructor elif verify == 'adler32': return koji.util.adler32_constructor elif verify: raise koji.GenericError, "Unsupported verify type: %s" % verify else: return None def handle_upload(environ): """Handle file upload via POST request""" logger = logging.getLogger('koji.upload') start = time.time() if not context.session.logged_in: raise koji.ActionNotAllowed, 'you must be logged-in to upload a file' args = cgi.parse_qs(environ.get('QUERY_STRING', ''), strict_parsing=True) #XXX - already parsed by auth name = args['filename'][0] path = args.get('filepath', ('',))[0] verify = args.get('fileverify', ('',))[0] overwrite = args.get('overwrite', ('',))[0] offset = args.get('offset', ('0',))[0] offset = int(offset) fn = get_upload_path(path, name, create=True) if os.path.exists(fn): if not os.path.isfile(fn): raise koji.GenericError, "destination not a file: %s" % fn if offset == 0 and not overwrite: raise koji.GenericError, "upload path exists: %s" % fn sum_cls = get_verify_class(verify) size = 0 chksum = sum_cls() inf = environ['wsgi.input'] fd = os.open(fn, os.O_RDWR | os.O_CREAT, 0666) try: try: fcntl.lockf(fd, fcntl.LOCK_EX|fcntl.LOCK_NB) except IOError, e: raise koji.LockError, e if offset == -1: offset = os.lseek(fd, 0, 2) else: os.ftruncate(fd, offset) os.lseek(fd, offset, 0) while True: chunk = inf.read(65536) if not chunk: break size += len(chunk) if verify: chksum.update(chunk) os.write(fd, chunk) finally: # this will also remove our lock os.close(fd) ret = { 'size' : koji.encode_int(size), 'fileverify' : verify, 'offset' : koji.encode_int(offset), } if verify: # unsigned 32bit - could be too big for xmlrpc ret['hexdigest'] = chksum.hexdigest() logger.debug("Upload result: %r", ret) logger.info("Completed upload for session %s (#%s): %f seconds, %i bytes, %s", context.session.id, context.session.callnum, time.time()-start, size, fn) return ret #koji.add_sys_logger("koji") if __name__ == "__main__": # XXX - testing defaults print "Connecting to DB" koji.db.setDBopts( database = "test", user = "test") context.cnx = koji.db.connect() context.req = {} print "Creating a session" context.session = koji.auth.Session(None,hostip="127.0.0.1") print context.session test_user = "host/1" pw = "foobar" print "Logging in as %s" % test_user session_info = context.session.login(test_user,pw,{'hostip':'127.0.0.1'}) for k in session_info.keys(): session_info[k] = [session_info[k]] s2=koji.auth.Session(session_info,'127.0.0.1') print s2 print s2.getHostId() context.session = s2 print "Associating host" Host() #context.cnx.commit() context.session.perms['admin'] = 1 #XXX