debian-koji/kojihub/kojihub.py
2025-05-19 09:48:20 +02:00

16482 lines
669 KiB
Python

# Python library
# kojihub - library for koji's XMLRPC interface
# Copyright (c) 2005-2014 Red Hat, Inc.
#
# Koji is free software; you can redistribute it and/or
# modify it under the terms of the GNU Lesser General Public
# License as published by the Free Software Foundation;
# version 2.1 of the License.
#
# This software is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
# Lesser General Public License for more details.
#
# You should have received a copy of the GNU Lesser General Public
# License along with this software; if not, write to the Free Software
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
#
# Authors:
# Mike McLean <mikem@redhat.com>
# Mike Bonnet <mikeb@redhat.com>
# Cristian Balint <cbalint@redhat.com>
from __future__ import absolute_import
import base64
import builtins
import calendar
import copy
import datetime
import fcntl
import filecmp
import fnmatch
import functools
import hashlib
import json
import logging
import os
import re
import secrets
import shutil
import stat
import sys
import tarfile
import tempfile
import time
import types
import traceback
from urllib.parse import parse_qs
import zipfile
from collections import defaultdict, OrderedDict
import rpm
from psycopg2._psycopg import IntegrityError
import koji
import koji.plugin
import koji.policy
import koji.rpmdiff
import koji.tasks
from koji.tasks import parse_task_params
import koji.xmlrpcplus
from koji.context import context
from koji.daemon import SCM
from koji.server import BadRequest, RequestTimeout
from koji.util import (
base64encode,
decode_bytes,
dslice,
extract_build_task,
joinpath,
md5_constructor,
move_and_symlink,
multi_fnmatch,
safer_move,
)
from . import scheduler
from . import repos
from .auth import get_user_perms, get_user_groups
from .db import ( # noqa: F401
BulkInsertProcessor,
DeleteProcessor,
InsertProcessor,
QueryProcessor,
QueryView,
Savepoint,
UpdateProcessor,
UpsertProcessor,
_applyQueryOpts,
_dml,
_fetchSingle,
_singleValue,
get_event,
nextval,
currval,
convert_timestamp,
)
logger = logging.getLogger('koji.hub')
NUMERIC_TYPES = (int, float)
def log_error(msg):
logger.error(msg)
def xform_user_krb(entry):
entry['krb_principals'] = [x for x in entry['krb_principals'] if x is not None]
return entry
def convert_value(value, cast=None, message=None,
exc_type=koji.ParameterError, none_allowed=False, check_only=False):
"""Cast to another type with tailored exception
:param any value: tested object
:param type cast: To which type value should be cast
:param type exc_type: Raise this exception
:param bool none_allowed: Is None valid value?
:param check_only: Don't convert but raise an exception if type(value) != cast
:returns any value: returns converted value
"""
if value is None:
if not none_allowed:
raise exc_type(message or f"Invalid type, expected type {cast}")
else:
return value
if check_only:
if not isinstance(value, cast):
raise exc_type(message or f"Invalid type for value '{value}': {type(value)}, "
f"expected type {cast}")
else:
try:
value = cast(value)
except (ValueError, TypeError):
raise exc_type(message or f"Invalid type for value '{value}': {type(value)}, "
f"expected type {cast}")
return value
class Task(object):
"""A task for the build hosts"""
fields = (
('task.id', 'id'),
('task.state', 'state'),
('task.create_time', 'create_time'),
("date_part('epoch', create_time)", 'create_ts'),
('task.start_time', 'start_time'),
("date_part('epoch', task.start_time)", 'start_ts'),
('task.completion_time', 'completion_time'),
("date_part('epoch', completion_time)", 'completion_ts'),
('task.channel_id', 'channel_id'),
('task.host_id', 'host_id'),
('task.parent', 'parent'),
('task.label', 'label'),
('task.waiting', 'waiting'),
('task.awaited', 'awaited'),
('task.owner', 'owner'),
('task.method', 'method'),
('task.arch', 'arch'),
('task.priority', 'priority'),
('task.weight', 'weight'))
def __init__(self, id):
self.id = convert_value(id, cast=int)
self.logger = logging.getLogger("koji.hub.Task")
def _split_fields(self, fields=None):
"""Helper function for split fields to QueryProcessor's
columns/aliases options"""
if fields is None:
fields = self.fields
columns = [f[0] for f in fields]
aliases = [f[1] for f in fields]
return columns, aliases
def verifyHost(self, host_id=None):
"""Verify that host owns task"""
if host_id is None:
host_id = context.session.host_id
if host_id is None:
return False
task_id = self.id
# getting a row lock on this task to ensure task assignment sanity
# no other concurrent transaction should be altering this row
query = QueryProcessor(tables=['task'], columns=['state', 'host_id'],
clauses=['id=%(task_id)s'], values={'task_id': task_id},
opts={'rowlock': True})
r = query.executeOne()
if not r:
raise koji.GenericError("No such task: %i" % task_id)
return (r['state'] == koji.TASK_STATES['OPEN'] and r['host_id'] == host_id)
def assertHost(self, host_id):
if not self.verifyHost(host_id):
raise koji.ActionNotAllowed("host %d does not own task %d" % (host_id, self.id))
def getOwner(self):
"""Return the owner (user_id) for this task"""
query = QueryProcessor(tables=['task'], columns=['owner'],
clauses=['id=%(id)i'], values=vars(self))
return query.singleValue()
def verifyOwner(self, user_id=None):
"""Verify that user owns task"""
if user_id is None:
user_id = context.session.user_id
if user_id is None:
return False
task_id = self.id
# getting a row lock on this task to ensure task state sanity
query = QueryProcessor(tables=['task'], columns=['owner'],
clauses=['id=%(task_id)s'], values={'task_id': task_id},
opts={'rowlock': True})
owner = query.singleValue(strict=False)
if not owner:
raise koji.GenericError("No such task: %i" % task_id)
return (owner == user_id)
def assertOwner(self, user_id=None):
if not self.verifyOwner(user_id):
raise koji.ActionNotAllowed("user %d does not own task %d" % (user_id, self.id))
def lock(self, host_id, newstate='OPEN', force=False):
"""Attempt to associate the task for host, either to assign or open
returns True if successful, False otherwise"""
info = self.getInfo(request=True)
self.runCallbacks('preTaskStateChange', info, 'state', koji.TASK_STATES[newstate])
self.runCallbacks('preTaskStateChange', info, 'host_id', host_id)
# we use row-level locks to keep things sane
# note the QueryProcessor...opts={'rowlock': True}
task_id = self.id
if not force:
query = QueryProcessor(columns=['state', 'host_id'], tables=['task'],
clauses=['id=%(task_id)s'], values={'task_id': task_id},
opts={'rowlock': True})
r = query.executeOne()
if not r:
raise koji.GenericError("No such task: %i" % task_id)
state = r['state']
otherhost = r['host_id']
if state == koji.TASK_STATES['FREE']:
if otherhost is not None:
log_error(f"Error: task {task_id} is both free "
f"and handled by host {otherhost}")
return False
elif state == koji.TASK_STATES['ASSIGNED']:
if otherhost is None:
log_error(f"Error: task {task_id} is assigned, but no host is really assigned")
return False
elif otherhost != host_id:
# task is assigned to someone else, no error just return
return False
elif newstate == 'ASSIGNED':
# double assign is a weird situation but we can return True as state doesn't
# really change
log_error(f"Error: double assign of task {task_id} and host {host_id}")
return True
# otherwise the task is assigned to host_id, so keep going
elif state == koji.TASK_STATES['CANCELED']:
# it is ok that task was canceled meanwhile
return False
elif state == koji.TASK_STATES['OPEN']:
if otherhost is None:
log_error(f"Error: task {task_id} is opened but not handled by any host")
elif otherhost == host_id:
log_error(f"Error: task {task_id} is already open and handled by "
f"{host_id} (double open/assign)")
return False
else:
# state is CLOSED or FAILED
if otherhost is None:
log_error(f"Error: task {task_id} is non-free but not handled by any host "
f"(state {koji.TASK_STATES[state]})")
return False
# if we reach here, task is either
# - free and unlocked
# - assigned to host_id
# - force option is enabled
state = koji.TASK_STATES[newstate]
update = UpdateProcessor('task', clauses=['id=%(task_id)i'], values=locals())
update.set(state=state, host_id=host_id)
if state == koji.TASK_STATES['OPEN']:
update.rawset(start_time='NOW()')
update.execute()
self.runCallbacks('postTaskStateChange', info, 'state', koji.TASK_STATES[newstate])
self.runCallbacks('postTaskStateChange', info, 'host_id', host_id)
return True
def assign(self, host_id, force=False):
"""Attempt to assign the task to host.
returns True if successful, False otherwise"""
return self.lock(host_id, 'ASSIGNED', force)
def open(self, host_id):
"""Attempt to open the task for host.
returns task data if successful, None otherwise"""
if self.lock(host_id, 'OPEN'):
# get more complete data to return
fields = self.fields + (('task.request', 'request'),)
query = QueryProcessor(tables=['task'], clauses=['id=%(id)i'], values=vars(self),
columns=[f[0] for f in fields], aliases=[f[1] for f in fields])
ret = query.executeOne()
if ret['request'].find('<?xml', 0, 10) == -1:
# handle older base64 encoded data
data = base64.b64decode(ret['request'])
# we can't return raw bytes and this /should/ be a valid string
ret['request'] = decode_bytes(data)
return ret
else:
return None
def free(self):
"""Free a task"""
info = self.getInfo(request=True)
self.runCallbacks('preTaskStateChange', info, 'state', koji.TASK_STATES['FREE'])
self.runCallbacks('preTaskStateChange', info, 'host_id', None)
# access checks should be performed by calling function
query = QueryProcessor(tables=['task'], columns=['state'], clauses=['id = %(id)i'],
values=vars(self), opts={'rowlock': True})
oldstate = query.singleValue(strict=False)
if not oldstate:
raise koji.GenericError("No such task: %i" % self.id)
if koji.TASK_STATES[oldstate] in ['CLOSED', 'CANCELED', 'FAILED']:
raise koji.GenericError("Cannot free task %i, state is %s" %
(self.id, koji.TASK_STATES[oldstate]))
newstate = koji.TASK_STATES['FREE']
newhost = None
update = UpdateProcessor('task', clauses=['id=%(task_id)s'], values={'task_id': self.id},
data={'state': newstate, 'host_id': newhost})
update.execute()
self.runCallbacks('postTaskStateChange', info, 'state', koji.TASK_STATES['FREE'])
self.runCallbacks('postTaskStateChange', info, 'host_id', None)
return True
def setWeight(self, weight):
"""Set weight for task"""
weight = convert_value(weight, cast=float)
info = self.getInfo(request=True)
self.runCallbacks('preTaskStateChange', info, 'weight', weight)
# access checks should be performed by calling function
update = UpdateProcessor('task', clauses=['id=%(task_id)s'], values={'task_id': self.id},
data={'weight': weight})
update.execute()
self.runCallbacks('postTaskStateChange', info, 'weight', weight)
def setPriority(self, priority, recurse=False):
"""Set priority for task"""
priority = convert_value(priority, cast=int)
info = self.getInfo(request=True)
self.runCallbacks('preTaskStateChange', info, 'priority', priority)
# access checks should be performed by calling function
update = UpdateProcessor('task', clauses=['id=%(task_id)s'], values={'task_id': self.id},
data={'priority': priority})
update.execute()
self.runCallbacks('postTaskStateChange', info, 'priority', priority)
if recurse:
# Change priority of child tasks
query = QueryProcessor(tables=['task'], columns=['id'],
clauses=['parent = %(task_id)s'],
values={'task_id': self.id},
opts={'asList': True})
for (child_id,) in query.execute():
Task(child_id).setPriority(priority, recurse=True)
def _close(self, result, state):
"""Mark task closed and set response
Returns True if successful, False if not"""
# access checks should be performed by calling function
# this is an approximation, and will be different than what is in the database
# the actual value should be retrieved from the 'new' value of the post callback
now = time.time()
info = self.getInfo(request=True)
info['result'] = result
self.runCallbacks('preTaskStateChange', info, 'state', state)
self.runCallbacks('preTaskStateChange', info, 'completion_ts', now)
# get the result from the info dict, so callbacks have a chance to modify it
update = UpdateProcessor('task', clauses=['id = %(task_id)d'],
values={'task_id': self.id},
data={'result': info['result'], 'state': state},
rawdata={'completion_time': 'NOW()'})
update.execute()
self.runCallbacks('postTaskStateChange', info, 'state', state)
self.runCallbacks('postTaskStateChange', info, 'completion_ts', now)
def close(self, result):
# access checks should be performed by calling function
self._close(result, koji.TASK_STATES['CLOSED'])
def fail(self, result):
# access checks should be performed by calling function
self._close(result, koji.TASK_STATES['FAILED'])
def getState(self):
query = QueryProcessor(tables=['task'], columns=['state'], clauses=['id = %(id)i'],
values=vars(self))
return query.singleValue()
def isFinished(self):
return (koji.TASK_STATES[self.getState()] in ['CLOSED', 'CANCELED', 'FAILED'])
def isCanceled(self):
return (self.getState() == koji.TASK_STATES['CANCELED'])
def isFailed(self):
return (self.getState() == koji.TASK_STATES['FAILED'])
def cancel(self, recurse=True):
"""Cancel this task.
A task can only be canceled if it is not already in the 'CLOSED' state.
If it is, no action will be taken. Return True if the task is
successfully canceled, or if it was already canceled, False if it is
closed."""
# access checks should be performed by calling function
now = time.time()
info = self.getInfo(request=True)
self.runCallbacks('preTaskStateChange', info, 'state', koji.TASK_STATES['CANCELED'])
self.runCallbacks('preTaskStateChange', info, 'completion_ts', now)
query = QueryProcessor(tables=['task'], columns=['state'], clauses=['id = %(task_id)s'],
values={'task_id': self.id}, opts={'rowlock': True})
state = query.singleValue()
st_canceled = koji.TASK_STATES['CANCELED']
st_closed = koji.TASK_STATES['CLOSED']
st_failed = koji.TASK_STATES['FAILED']
if state == st_canceled:
return True
elif state in [st_closed, st_failed]:
return False
update = UpdateProcessor('task', clauses=['id = %(task_id)i'], values={'task_id': self.id},
data={'state': st_canceled}, rawdata={'completion_time': 'NOW()'})
update.execute()
self.runCallbacks('postTaskStateChange', info, 'state', koji.TASK_STATES['CANCELED'])
self.runCallbacks('postTaskStateChange', info, 'completion_ts', now)
# cancel associated builds (only if state is 'BUILDING')
# since we check build state, we avoid loops with cancel_build on our end
b_building = koji.BUILD_STATES['BUILDING']
query = QueryProcessor(tables=['build'], columns=['id'],
clauses=['task_id = %(task_id)i', 'state = %(b_building)i'],
values={'task_id': self.id, 'b_building': b_building},
opts={'rowlock': True, 'asList': True})
for (build_id,) in query.execute():
cancel_build(build_id, cancel_task=False)
if recurse:
# also cancel child tasks
self.cancelChildren()
return True
def cancelChildren(self):
"""Cancel child tasks"""
query = QueryProcessor(tables=['task'], columns=['id'], clauses=['parent = %(task_id)i'],
values={'task_id': self.id}, opts={'asList': True})
for (id,) in query.execute():
Task(id).cancel(recurse=True)
def cancelFull(self, strict=True):
"""Cancel this task and every other task in its group
If strict is true, then this must be a top-level task
Otherwise we will follow up the chain to find the top-level task
"""
task_id = self.id
query = QueryProcessor(tables=['task'], columns=['parent'],
clauses=['id = %(task_id)i'],
values={'task_id': task_id}, opts={'rowlock': True})
parent = query.singleValue(strict=False)
if parent is not None:
if strict:
raise koji.GenericError("Task %d is not top-level (parent=%d)" % (task_id, parent))
# otherwise, find the top-level task and go from there
seen = {task_id: 1}
while parent is not None:
if parent in seen:
raise koji.GenericError("Task LOOP at task %i" % task_id)
task_id = parent
seen[task_id] = 1
query.values = {'task_id': task_id}
parent = query.singleValue()
return Task(task_id).cancelFull(strict=True)
# We handle the recursion ourselves, since self.cancel will stop at
# canceled or closed tasks.
tasklist = [task_id]
seen = {}
# query for use in loop
for task_id in tasklist:
if task_id in seen:
# shouldn't happen
raise koji.GenericError("Task LOOP at task %i" % task_id)
seen[task_id] = 1
Task(task_id).cancel(recurse=False)
query = QueryProcessor(tables=['task'], columns=['id'],
clauses=['parent = %(task_id)i'],
values={'task_id': task_id}, opts={'asList': True})
for (child_id,) in query.execute():
tasklist.append(child_id)
def getRequest(self):
query = QueryProcessor(columns=['request'], tables=['task'],
clauses=['id = %(id)i'], values={'id': self.id})
xml_request = query.singleValue()
if xml_request.find('<?xml', 0, 10) == -1:
# handle older base64 encoded data
xml_request = base64.b64decode(xml_request)
# note: loads accepts either bytes or string
params, method = koji.xmlrpcplus.loads(xml_request)
return params
def getResult(self, raise_fault=True):
query = QueryProcessor(tables=['task'], columns=['state', 'result'],
clauses=['id = %(id)i'], values={'id': self.id})
r = query.executeOne()
if not r:
raise koji.GenericError("No such task")
state = r['state']
xml_result = r['result']
if koji.TASK_STATES[state] == 'CANCELED':
raise koji.GenericError("Task %i is canceled" % self.id)
elif koji.TASK_STATES[state] not in ['CLOSED', 'FAILED']:
raise koji.GenericError("Task %i is not finished" % self.id)
if xml_result.find('<?xml', 0, 10) == -1:
# handle older base64 encoded data
xml_result = base64.b64decode(xml_result)
try:
# If the result is a Fault, then loads will raise it
# This is normally what we want to happen
result, method = koji.xmlrpcplus.loads(xml_result)
except koji.xmlrpcplus.Fault as fault:
if raise_fault:
raise
# Note that you can't really return a fault over xmlrpc, except by
# raising it. We return a dictionary in the same format that
# multiCall does.
return {'faultCode': fault.faultCode, 'faultString': fault.faultString}
return result[0]
def getInfo(self, strict=True, request=False):
"""Return information about the task in a dictionary. If "request" is True,
the request will be decoded and included in the dictionary."""
columns, aliases = self._split_fields()
query = QueryProcessor(columns=columns, aliases=aliases,
tables=['task'], clauses=['id = %(id)i'],
values={'id': self.id})
result = query.executeOne(strict=strict)
if result and request:
result['request'] = self.getRequest()
return result
def getChildren(self, request=False):
"""Return information about tasks with this task as their
parent. If there are no such Tasks, return an empty list."""
fields = self.fields
if request:
fields = fields + (('request', 'request'),)
columns, aliases = self._split_fields(fields)
query = QueryProcessor(columns=columns, aliases=aliases,
tables=['task'], clauses=['parent = %(id)i'],
values={'id': self.id})
results = query.execute()
if request:
for task in results:
if task['request'].find('<?xml', 0, 10) == -1:
# handle older base64 encoded data
task['request'] = base64.b64decode(task['request'])
# note: loads accepts either bytes or string
task['request'] = koji.xmlrpcplus.loads(task['request'])[0]
return results
def runCallbacks(self, cbtype, old_info, attr, new_val):
if cbtype.startswith('pre'):
info = old_info
elif cbtype.startswith('post'):
info = self.getInfo(request=True)
if info['state'] == koji.TASK_STATES['CLOSED']:
# if task is closed, include the result as well
info['result'] = self.getResult()
new_val = info[attr]
else:
raise koji.GenericError('No such callback type: %s' % cbtype)
old_val = old_info[attr]
if attr == 'state':
# state is passed in as an integer, but we want to use the string
old_val = koji.TASK_STATES[old_val]
new_val = koji.TASK_STATES[new_val]
koji.plugin.run_callbacks(cbtype, attribute=attr, old=old_val, new=new_val,
info=info)
def make_task(method, arglist, **opts):
"""Create a task
This call should not be directly exposed via xmlrpc
Optional args:
parent: the id of the parent task (creates a subtask)
label: (subtasks only) the label of the subtask
owner: the user_id that should own the task
channel: the channel to place the task in
arch: the arch for the task
priority: the priority of the task
assign: a host_id to assign the task to
"""
convert_value(method, cast=str, check_only=True)
if 'parent' in opts:
opts['parent'] = convert_value(opts['parent'], cast=int)
if 'label' in opts:
convert_value(opts['label'], cast=str, check_only=True)
if 'owner' in opts:
if not isinstance(opts['owner'], int):
opts['owner'] = get_user(opts['owner'], strict=True)['id']
if 'arch' in opts:
opts['arch'] = koji.parse_arches(opts['arch'], strict=True, allow_none=True)
if 'priority' in opts:
opts['priority'] = \
convert_value(opts['priority'], cast=int)
if 'assign' in opts:
if not isinstance(opts['assign'], int):
opts['assign'] = get_host(opts['assign'], strict=True)['id']
if 'parent' in opts:
# for subtasks, we use some of the parent's options as defaults
query = QueryProcessor(
tables=['task'],
columns=['state', 'owner', 'channel_id', 'priority', 'arch'],
clauses=['id = %(parent)i'],
values={'parent': opts['parent']})
pdata = query.executeOne()
if not pdata:
raise koji.GenericError("Invalid parent task: %(parent)s" % opts)
if pdata['state'] != koji.TASK_STATES['OPEN']:
raise koji.GenericError("Parent task (id %(parent)s) is not open" % opts)
# default to a higher priority than parent
opts.setdefault('priority', pdata['priority'] - 1)
for f in ('owner', 'arch'):
opts.setdefault(f, pdata[f])
opts.setdefault('label', None)
else:
opts.setdefault('priority', koji.PRIO_DEFAULT)
# calling function should enforce priority limitations, if applicable
opts.setdefault('arch', 'noarch')
if 'owner' not in opts:
if not context.session.logged_in:
raise koji.GenericError('task must have an owner')
opts['owner'] = context.session.user_id
opts['label'] = None
opts['parent'] = None
# determine channel from policy
policy_data = {}
policy_data['method'] = method
for key in 'arch', 'parent', 'label', 'owner':
policy_data[key] = opts[key]
policy_data['user_id'] = opts['owner']
if 'channel' in opts:
policy_data['req_channel'] = opts['channel']
channel_info = get_channel(opts['channel'])
if not channel_info:
raise koji.GenericError('No such channel: %s' % opts['channel'])
if channel_info['enabled']:
req_channel_id = channel_info['id']
else:
raise koji.GenericError('Channel %s is disabled.' % opts['channel'])
policy_data.update(policy_data_from_task_args(method, arglist))
ruleset = context.policy.get('channel')
result = ruleset.apply(policy_data)
if result is None:
logger.warning('Channel policy returned no result, using default')
opts['channel_id'] = get_channel_id('default', strict=True)
else:
try:
parts = result.split()
if parts[0] == "use":
channel_info = get_channel(parts[1], strict=True)
if channel_info['enabled']:
opts['channel_id'] = channel_info['id']
else:
raise koji.GenericError('Channel %s is disabled.' % parts[1])
elif parts[0] == "parent":
if not opts.get('parent'):
logger.error("Invalid channel policy result (no parent task): %s",
ruleset.last_rule())
raise koji.GenericError("invalid channel policy")
opts['channel_id'] = pdata['channel_id']
elif parts[0] == "req":
if 'channel' not in opts:
logger.error('Invalid channel policy result (no channel requested): %s',
ruleset.last_rule())
raise koji.GenericError("invalid channel policy")
opts['channel_id'] = req_channel_id
else:
logger.error("Invalid result from channel policy: %s", ruleset.last_rule())
raise koji.GenericError("invalid channel policy")
except IndexError:
logger.error("Invalid result from channel policy: %s", ruleset.last_rule())
raise koji.GenericError("invalid channel policy")
ruleset = context.policy.get('priority')
result = ruleset.apply(policy_data)
if result is None:
logger.warning('Priority policy returned no result, using default value: %s'
% opts['priority'])
else:
try:
parts = result.split()
if parts[0] == 'stay':
# dont' change priority
pass
elif parts[0] == 'set':
# fixed value
opts['priority'] = int(parts[1])
elif parts[0] == 'adjust':
# note: int() will accept our preferred "+1" representation for increments
opts['priority'] += int(parts[1])
else:
logger.error("Invalid result from priority policy: %s", ruleset.last_rule())
raise koji.GenericError("invalid priority policy")
except (IndexError, ValueError):
logger.error("Invalid result from priority policy: %s", ruleset.last_rule())
raise koji.GenericError("invalid priority policy")
# encode xmlrpc request
opts['request'] = koji.xmlrpcplus.dumps(tuple(arglist), methodname=method)
opts['state'] = koji.TASK_STATES['FREE']
opts['method'] = method
koji.plugin.run_callbacks(
'preTaskStateChange', attribute='state', old=None, new='FREE', info=opts)
# stick it in the database
idata = dslice(opts, ['state', 'owner', 'method', 'request', 'priority', 'parent', 'label',
'channel_id', 'arch'])
if opts.get('assign'):
idata['state'] = koji.TASK_STATES['ASSIGNED']
idata['host_id'] = opts['assign']
insert = InsertProcessor('task', data=idata)
insert.execute()
task_id = currval('task_id_seq')
opts['id'] = task_id
koji.plugin.run_callbacks(
'postTaskStateChange', attribute='state', old=None, new='FREE', info=opts)
scheduler.auto_arch_refuse(task_id) # temporary workaround
return task_id
def eventCondition(event, table=None):
"""return the proper WHERE condition to select data at the time specified by event. """
if not table:
table = ''
else:
table += '.'
if event is None:
return """(%(table)sactive = TRUE)""" % locals()
elif isinstance(event, int):
return "(%(table)screate_event <= %(event)d AND ( %(table)srevoke_event IS NULL OR " \
"%(event)d < %(table)srevoke_event ))" % locals()
else:
raise koji.GenericError("Invalid event: %r" % event)
def readInheritanceData(tag_id, event=None):
columns = ['parent_id', 'name', 'priority', 'maxdepth', 'intransitive', 'noconfig',
'pkg_filter']
query = QueryProcessor(tables=['tag_inheritance'], columns=columns,
joins=['tag ON parent_id = id'],
clauses=[eventCondition(event), 'tag_id = %(tag_id)i'],
values={'tag_id': tag_id}, opts={'order': 'priority'})
data = query.execute()
# include the current tag_id as child_id, so we can retrace the inheritance chain later
for datum in data:
datum['child_id'] = tag_id
return data
def readDescendantsData(tag_id, event=None):
columns = ['tag_id', 'parent_id', 'name', 'priority', 'maxdepth', 'intransitive', 'noconfig',
'pkg_filter']
query = QueryProcessor(tables=['tag_inheritance'], columns=columns,
joins=['tag ON tag_id = id'],
clauses=[eventCondition(event), 'parent_id = %(tag_id)i'],
values={'tag_id': tag_id}, opts={'order': 'priority'})
data = query.execute()
return data
def writeInheritanceData(tag_id, changes, clear=False):
"""Add or change inheritance data for a tag"""
context.session.assertPerm('tag')
_writeInheritanceData(tag_id, changes, clear)
def _writeInheritanceData(tag_id, changes, clear=False):
"""Add or change inheritance data for a tag"""
fields = ('parent_id', 'priority', 'maxdepth', 'intransitive', 'noconfig', 'pkg_filter')
if isinstance(changes, dict):
changes = [changes]
for link in changes:
check_fields = fields
if link.get('delete link'):
check_fields = ('parent_id',)
for f in check_fields:
if f not in link:
raise koji.GenericError("No value for %s" % f)
parent_id = link['parent_id']
# check existence of parent
get_tag(parent_id, strict=True)
# read current data and index
data = dict([[link['parent_id'], link] for link in readInheritanceData(tag_id)])
for link in changes:
link['is_update'] = True
parent_id = link['parent_id']
orig = data.get(parent_id)
if link.get('delete link'):
if orig:
data[parent_id] = dslice(link, ['delete link', 'is_update', 'parent_id'])
elif not orig or clear:
data[parent_id] = link
else:
# not a delete request and we have a previous link to parent
for f in fields:
if orig[f] != link[f]:
data[parent_id] = link
break
if clear:
for link in data.values():
if not link.get('is_update'):
link['delete link'] = True
link['is_update'] = True
changed = False
for link in data.values():
if link.get('is_update'):
changed = True
break
if not changed:
# nothing to do
log_error("No inheritance changes")
return
# check for duplicate priorities
pri_index = {}
for link in data.values():
if link.get('delete link'):
continue
pri_index.setdefault(link['priority'], []).append(link)
for pri, dups in pri_index.items():
if len(dups) <= 1:
continue
# oops, duplicate entries for a single priority
dup_ids = [link['parent_id'] for link in dups]
raise koji.GenericError("Multiple parent tags (%r) cannot have the "
"same priority value (%d) on child tag %d" %
(dup_ids, pri, tag_id))
for parent_id, link in data.items():
if not link.get('is_update'):
continue
# revoke old values
update = UpdateProcessor('tag_inheritance', values=locals(),
clauses=['tag_id=%(tag_id)s', 'parent_id = %(parent_id)s'])
update.make_revoke()
update.execute()
for parent_id, link in data.items():
if not link.get('is_update'):
continue
# skip rest if we are just deleting
if link.get('delete link'):
continue
# insert new value
newlink = dslice(link, fields)
newlink['tag_id'] = tag_id
# defaults ok for the rest
insert = InsertProcessor('tag_inheritance', data=newlink)
insert.make_create()
insert.execute()
def readFullInheritance(tag_id, event=None, reverse=False):
"""Returns a list representing the full, ordered inheritance from tag"""
order = []
readFullInheritanceRecurse(tag_id, event, order, {}, {}, 0, None, False, [], reverse)
return order
def readFullInheritanceRecurse(tag_id, event, order, top, hist, currdepth, maxdepth, noconfig,
pfilter, reverse):
if maxdepth is not None and maxdepth < 1:
return
# note: maxdepth is relative to where we are, but currdepth is absolute from
# the top.
currdepth += 1
top = top.copy()
top[tag_id] = 1
if reverse:
node = readDescendantsData(tag_id, event)
else:
node = readInheritanceData(tag_id, event)
for link in node:
if reverse:
id = link['tag_id']
else:
id = link['parent_id']
if id in top:
# LOOP!
if event is None:
# only log if the issue is current
log_error("Warning: INHERITANCE LOOP detected at %s -> %s, pruning" % (tag_id, id))
# auto prune
continue
if link['intransitive'] and len(top) > 1 and not reverse:
# ignore intransitive inheritance links, except at root
continue
if reverse:
# maxdepth logic is different in this case. no propagation
if link['maxdepth'] is not None and link['maxdepth'] < currdepth - 1:
continue
nextdepth = None
else:
# propagate maxdepth
nextdepth = link['maxdepth']
if nextdepth is None:
if maxdepth is not None:
nextdepth = maxdepth - 1
elif maxdepth is not None:
nextdepth = min(nextdepth, maxdepth) - 1
link['nextdepth'] = nextdepth
link['currdepth'] = currdepth
# propagate noconfig and pkg_filter controls
if link['noconfig']:
noconfig = True
filter = list(pfilter) # copy
pattern = link['pkg_filter']
if pattern:
filter.append(pattern)
link['filter'] = filter
# check history to avoid redundant entries
if id in hist:
# already been there
# BUT, options may have been different
rescan = True
# since rescans are possible, we might have to consider more than one previous hit
for previous in hist[id]:
sufficient = True # is previous sufficient?
# if last depth was less than current, then previous insufficient
lastdepth = previous['nextdepth']
if nextdepth is None:
if lastdepth is not None:
sufficient = False
elif lastdepth is not None and lastdepth < nextdepth:
sufficient = False
# if noconfig was on before, but not now, then insuffient
if previous['noconfig'] and not noconfig:
sufficient = False
# if we had a filter before, then insufficient
if len(previous['filter']) > 0:
# FIXME - we could probably be a little more precise here
sufficient = False
if sufficient:
rescan = False
if not rescan:
continue
else:
hist[id] = []
hist[id].append(link) # record history
order.append(link)
if link['intransitive'] and reverse:
# add link, but don't follow it
continue
readFullInheritanceRecurse(id, event, order, top, hist, currdepth, nextdepth, noconfig,
filter, reverse)
# tag-package operations
# add
# remove
# block
# unblock
# change owner
# list
def _pkglist_remove(tag_id, pkg_id):
clauses = ('package_id=%(pkg_id)i', 'tag_id=%(tag_id)i')
update = UpdateProcessor('tag_packages', values=locals(), clauses=clauses)
update.make_revoke() # XXX user_id?
update.execute()
def _pkglist_owner_remove(tag_id, pkg_id):
clauses = ('package_id=%(pkg_id)i', 'tag_id=%(tag_id)i')
update = UpdateProcessor('tag_package_owners', values=locals(), clauses=clauses)
update.make_revoke() # XXX user_id?
update.execute()
def _pkglist_owner_add(tag_id, pkg_id, owner):
_pkglist_owner_remove(tag_id, pkg_id)
data = {'tag_id': tag_id, 'package_id': pkg_id, 'owner': owner}
insert = InsertProcessor('tag_package_owners', data=data)
insert.make_create() # XXX user_id?
insert.execute()
def _pkglist_add(tag_id, pkg_id, owner, block, extra_arches):
# revoke old entry (if present)
_pkglist_remove(tag_id, pkg_id)
if extra_arches is not None:
extra_arches = koji.parse_arches(extra_arches, strict=True, allow_none=True)
data = {
'tag_id': tag_id,
'package_id': pkg_id,
'blocked': block,
'extra_arches': extra_arches
}
insert = InsertProcessor('tag_packages', data=data)
insert.make_create() # XXX user_id?
insert.execute()
_pkglist_owner_add(tag_id, pkg_id, owner)
def pkglist_add(taginfo, pkginfo, owner=None, block=None, extra_arches=None, force=False,
update=False):
"""Add to (or update) package list for tag"""
return _direct_pkglist_add(taginfo, pkginfo, owner, block, extra_arches,
force, update, policy=True)
def _direct_pkglist_add(taginfo, pkginfo, owner, block, extra_arches, force,
update, policy=False):
"""Like pkglist_add, but without policy or access check"""
# access control comes a little later (via an assert_policy)
# should not make any changes until after policy is checked
tag = get_tag(taginfo, strict=True)
tag_id = tag['id']
pkg = lookup_package(pkginfo, strict=False)
if not pkg:
if not isinstance(pkginfo, str):
raise koji.GenericError("No such package: %s" % pkginfo)
if owner is not None:
owner = get_user(owner, strict=True)['id']
action = 'add'
if update:
action = 'update'
elif bool(block):
action = 'block'
if policy:
context.session.assertLogin()
policy_data = {'tag': tag_id, 'action': action, 'package': pkginfo, 'force': force}
assert_policy('package_list', policy_data, force=force)
if not pkg:
pkg = lookup_package(pkginfo, create=True)
# validate arches before running callbacks
if extra_arches is not None:
extra_arches = koji.parse_arches(extra_arches, strict=True, allow_none=True)
user = get_user(context.session.user_id)
# first check to see if package is:
# already present (via inheritance)
# blocked
pkglist = readPackageList(tag_id, pkgID=pkg['id'], inherit=True)
previous = pkglist.get(pkg['id'], None)
changed = False
changed_owner = False
if previous is None:
block = bool(block)
if update and not force:
# if update flag is true, require that there be a previous entry
raise koji.GenericError("cannot update: tag %s has no data for package %s"
% (tag['name'], pkg['name']))
else:
# already there (possibly via inheritance)
if owner is None:
owner = previous['owner_id']
changed_owner = previous['owner_id'] != owner
if block is None:
block = previous['blocked']
else:
block = bool(block)
if extra_arches is None:
extra_arches = previous['extra_arches']
# see if the data is the same
for key, value in (('blocked', block),
('extra_arches', extra_arches)):
if previous[key] != value:
changed = True
break
if not changed and not changed_owner and not force:
# no point in adding it again with the same data
return
if previous['blocked'] and not block and not force:
raise koji.GenericError("package %s is blocked in tag %s" % (pkg['name'], tag['name']))
if owner is None:
if force:
owner = context.session.user_id
else:
raise koji.GenericError("owner not specified")
koji.plugin.run_callbacks('prePackageListChange', action=action,
tag=tag, package=pkg, owner=owner,
block=block, extra_arches=extra_arches,
force=force, update=update, user=user)
if not previous or changed:
_pkglist_add(tag_id, pkg['id'], owner, block, extra_arches)
elif changed_owner:
_pkglist_owner_add(tag_id, pkg['id'], owner)
koji.plugin.run_callbacks('postPackageListChange', action=action,
tag=tag, package=pkg, owner=owner,
block=block, extra_arches=extra_arches,
force=force, update=update, user=user)
def pkglist_remove(taginfo, pkginfo, force=False):
"""Remove a package from a tag's package list
One reason to remove an entry like this is to remove an override so that
the package data can be inherited from elsewhere.
Alternatively you can use the block or unblock functions.
This method always returns None, even if the package does not exist in the
tag.
:param int|str taginfo: tag id or name to remove the package
:param int|str pkginfo: package id or name to remove
:param bool force: If False (default), Koji will check this
operation against the package_list hub policy. If hub
policy does not allow the current user to remove
packages from this tag, then this method will raise
an error.
If True, then this method will bypass hub policy
settings. Only admin users can set force to True.
"""
_direct_pkglist_remove(taginfo, pkginfo, force, policy=True)
def _direct_pkglist_remove(taginfo, pkginfo, force=False, policy=False):
"""Like pkglist_remove, but without policy check"""
tag = get_tag(taginfo, strict=True)
pkg = lookup_package(pkginfo, strict=True)
if policy:
context.session.assertLogin()
policy_data = {'tag': tag['id'], 'action': 'remove', 'package': pkg['id'], 'force': force}
# don't check policy for admins using force
assert_policy('package_list', policy_data, force=force)
user = get_user(context.session.user_id)
koji.plugin.run_callbacks(
'prePackageListChange', action='remove', tag=tag, package=pkg, user=user)
_pkglist_remove(tag['id'], pkg['id'])
koji.plugin.run_callbacks(
'postPackageListChange', action='remove', tag=tag, package=pkg, user=user)
def pkglist_block(taginfo, pkginfo, force=False):
"""Block the package in tag"""
# check pkg list existence
tag = get_tag(taginfo, strict=True)
pkg = lookup_package(pkginfo, strict=True)
if not readPackageList(tag['id'], pkgID=pkg['id'], inherit=True, with_owners=False):
raise koji.GenericError("Package %s is not in tag listing for %s" %
(pkg['name'], tag['name']))
pkglist_add(taginfo, pkginfo, block=True, force=force)
def pkglist_unblock(taginfo, pkginfo, force=False):
"""Unblock the package in tag
Generally this just adds a unblocked duplicate of the blocked entry.
However, if the block is actually in tag directly (not through inheritance),
the blocking entry is simply removed"""
tag = get_tag(taginfo, strict=True)
pkg = lookup_package(pkginfo, strict=True)
context.session.assertLogin()
policy_data = {'tag': tag['id'], 'action': 'unblock', 'package': pkg['id'], 'force': force}
# don't check policy for admins using force
assert_policy('package_list', policy_data, force=force)
user = get_user(context.session.user_id)
tag_id = tag['id']
pkg_id = pkg['id']
pkglist = readPackageList(tag_id, pkgID=pkg_id, inherit=True)
previous = pkglist.get(pkg_id, None)
if previous is None:
raise koji.GenericError("no data (blocked or otherwise) for package %s in tag %s"
% (pkg['name'], tag['name']))
if not previous['blocked']:
raise koji.GenericError("package %s NOT blocked in tag %s" % (pkg['name'], tag['name']))
koji.plugin.run_callbacks(
'prePackageListChange', action='unblock', tag=tag, package=pkg, user=user)
if previous['tag_id'] != tag_id:
_pkglist_add(tag_id, pkg_id, previous['owner_id'], False, previous['extra_arches'])
else:
# just remove the blocking entry
_pkglist_remove(tag_id, pkg_id)
# it's possible this was the only entry in the inheritance or that the next entry
# back is also a blocked entry. if so, we need to add it back as unblocked
pkglist = readPackageList(tag_id, pkgID=pkg_id, inherit=True)
if pkg_id not in pkglist or pkglist[pkg_id]['blocked']:
_pkglist_add(tag_id, pkg_id, previous['owner_id'], False, previous['extra_arches'])
koji.plugin.run_callbacks(
'postPackageListChange', action='unblock', tag=tag, package=pkg, user=user)
def pkglist_setowner(taginfo, pkginfo, owner, force=False):
"""Set the owner for package in tag"""
pkglist_add(taginfo, pkginfo, owner=owner, force=force, update=True)
def pkglist_setarches(taginfo, pkginfo, arches, force=False):
"""Set extra_arches for package in tag"""
pkglist_add(taginfo, pkginfo, extra_arches=arches, force=force, update=True)
def readPackageList(tagID=None, userID=None, pkgID=None, event=None, inherit=False,
with_dups=False, with_owners=True, with_blocked=True):
"""Returns the package list for the specified tag or user.
One of (tagID,userID,pkgID) must be specified
Note that the returned data includes blocked entries
:param int tagID: filter on tag
:param int userID: filter on package owner
:param int pkgID: filter on package
:param int event: filter on event
:param bool inherit: return also inherited packages
:param bool with_dups: possible duplicates from inheritance, makes no sense
with inherit=False
:param bool with_owners: return also owner info. It needs to be set to True
if userID is not None
:returns [dict]: list of dicts with package info
"""
if tagID is None and userID is None and pkgID is None:
raise koji.GenericError('tag,user, and/or pkg must be specified')
if userID is not None and not with_owners:
raise koji.GenericError("userID and with_owners=False can't be used together")
tables = ['tag_packages']
fields = [
('package.id', 'package_id'),
('package.name', 'package_name'),
('tag.id', 'tag_id'),
('tag.name', 'tag_name'),
('extra_arches', 'extra_arches'),
('tag_packages.blocked', 'blocked'),
]
joins = ['tag ON tag.id = tag_packages.tag_id',
'package ON package.id = tag_packages.package_id']
clauses = [eventCondition(event, table='tag_packages')]
if tagID is not None:
clauses.append('tag.id = %(tagID)i')
if userID is not None:
clauses.append('users.id = %(userID)i')
if pkgID is not None:
if isinstance(pkgID, int):
clauses.append('package.id = %(pkgID)i')
else:
clauses.append('package.name = %(pkgID)s')
if with_owners:
fields += [('users.id', 'owner_id'), ('users.name', 'owner_name')]
joins += [
'tag_package_owners ON tag_packages.tag_id = tag_package_owners.tag_id AND \
tag_packages.package_id = tag_package_owners.package_id',
'users ON users.id = tag_package_owners.owner'
]
clauses.append(eventCondition(event, table='tag_package_owners'))
if not with_blocked:
clauses.append('NOT tag_packages.blocked')
fields, aliases = zip(*fields)
query = QueryProcessor(columns=fields, aliases=aliases, tables=tables, joins=joins,
clauses=clauses, values=locals())
packages = {}
for p in query.execute():
# things are simpler for the first tag
pkgid = p['package_id']
if with_dups:
packages.setdefault(pkgid, []).append(p)
else:
packages[pkgid] = p
if tagID is None or (not inherit):
return packages
order = readFullInheritance(tagID, event)
re_cache = {}
for link in order:
tagID = link['parent_id']
filter = link['filter']
# precompile filter patterns
re_list = []
for pat in filter:
prog = re_cache.get(pat, None)
if prog is None:
prog = re.compile(pat)
re_cache[pat] = prog
re_list.append(prog)
# same query as before, with different params
query.values['tagID'] = tagID
for p in query.execute():
pkgid = p['package_id']
if not with_dups and pkgid in packages:
# previous data supercedes
continue
# apply package filters
skip = False
for prog in re_list:
# the list of filters is cumulative, i.e.
# the package name must match all of them
if prog.match(p['package_name']) is None:
skip = True
break
if skip:
continue
if with_dups:
packages.setdefault(pkgid, []).append(p)
else:
packages[pkgid] = p
return packages
def list_tags(build=None, package=None, perms=True, queryOpts=None, pattern=None):
"""List tags according to filters
:param int|str build: If build is specified, only return tags associated with
the given build. Build can be either an integer ID or
a string N-V-R.
:param int|str package: If package is specified, only return tags associated with the
specified package. Package can be either an integer ID or a
string name.
In this case resulting map will have additional keys:
- owner_id
- owner_name
- blocked
- extra_arches
:param bool perms: If perms is True, perm_id and perm is added to resulting maps.
:param dict queryOpts: hash with query options for QueryProcessor
:param pattern: If glob pattern is specified, only return tags matching that pattern.
:returns list of dicts: Each map contains id, name, arches and locked keys and
additional keys as specified via package or perms options.
"""
if build is not None and package is not None:
raise koji.GenericError('only one of build and package may be specified')
tables = ['tag_config']
joins = ['tag ON tag.id = tag_config.tag_id']
fields = ['tag.id', 'tag.name', 'tag_config.arches', 'tag_config.locked',
'tag_config.maven_support', 'tag_config.maven_include_all']
aliases = ['id', 'name', 'arches', 'locked', 'maven_support', 'maven_include_all']
clauses = ['tag_config.active = true']
if perms:
joins.append('LEFT OUTER JOIN permissions ON tag_config.perm_id = permissions.id')
fields.extend(['tag_config.perm_id', 'permissions.name'])
aliases.extend(['perm_id', 'perm'])
if build is not None:
# lookup build id
buildinfo = get_build(build)
if not buildinfo:
raise koji.GenericError('No such build: %s' % build)
joins.append('tag_listing ON tag.id = tag_listing.tag_id')
clauses.append('tag_listing.active = true')
clauses.append('tag_listing.build_id = %(buildID)i')
buildID = buildinfo['id']
elif package is not None:
packageinfo = lookup_package(package)
if not packageinfo:
raise koji.GenericError('No such package: %s' % package)
fields.extend(
['users.id', 'users.name', 'tag_packages.blocked', 'tag_packages.extra_arches'])
aliases.extend(['owner_id', 'owner_name', 'blocked', 'extra_arches'])
joins.append('tag_packages ON tag.id = tag_packages.tag_id')
clauses.append('tag_packages.active = true')
clauses.append('tag_packages.package_id = %(packageID)i')
joins.append("tag_package_owners ON\n"
" tag_packages.tag_id = tag_package_owners.tag_id AND\n"
" tag_packages.package_id = tag_package_owners.package_id AND\n"
" tag_package_owners.active IS TRUE")
joins.append('users ON tag_package_owners.owner = users.id')
packageID = packageinfo['id']
if pattern is not None:
# copied from _prepareSearchTerms / glob
pattern = pattern.replace(
'\\', '\\\\').replace('_', r'\_').replace('?', '_').replace('*', '%')
clauses.append('tag.name ILIKE %(pattern)s')
query = QueryProcessor(columns=fields, aliases=aliases, tables=tables,
joins=joins, clauses=clauses, values=locals(),
opts=queryOpts)
return query.iterate()
def readTaggedBuilds(tag, event=None, inherit=False, latest=False, package=None, owner=None,
type=None, extra=False, draft=None):
"""Returns a list of builds for specified tag
:param int tag: tag ID
:param int event: query at a time in the past
:param bool inherit: follow inheritance
:param bool|int latest: True for latest build per package, N to get N latest builds per package
:param int package: filter on package name
:param str owner: filter on user name
:param str type: restrict the list to builds of the given type. Currently the supported
types are 'maven', 'win', 'image', or any custom content generator btypes.
:param bool extra: Set to "True" to get the build extra info
:param bool draft: bool or None option that indicates the filter based on draft field
- None: no filter (both draft and regular builds)
- True: draft only
- False: regular only
:returns [dict]: list of buildinfo dicts
"""
# build - id pkg_id version release epoch
# tag_listing - id build_id tag_id
if not isinstance(latest, NUMERIC_TYPES):
latest = bool(latest)
taglist = [tag]
if inherit:
taglist += [link['parent_id'] for link in readFullInheritance(tag, event)]
# regardless of inherit setting, we need to use inheritance to read the
# package list
packages = readPackageList(tagID=tag, event=event, inherit=True, pkgID=package,
with_owners=False)
st_complete = koji.BUILD_STATES['COMPLETE']
tables = ['tag_listing']
# these values are used for each iteration
fields = [('tag.id', 'tag_id'), ('tag.name', 'tag_name'), ('build.id', 'id'),
('build.id', 'build_id'), ('build.version', 'version'), ('build.release', 'release'),
('build.epoch', 'epoch'), ('build.state', 'state'),
('build.completion_time', 'completion_time'),
('build.promotion_time', 'promotion_time'),
('build.start_time', 'start_time'),
('build.task_id', 'task_id'),
('build.draft', 'draft'),
('users.id', 'owner_id'), ('users.name', 'owner_name'),
('promoter.id', 'promoter_id'), ('promoter.name', 'promoter_name'),
('events.id', 'creation_event_id'), ('events.time', 'creation_time'),
('volume.id', 'volume_id'), ('volume.name', 'volume_name'),
('package.id', 'package_id'), ('package.name', 'package_name'),
('package.name', 'name'),
("package.name || '-' || build.version || '-' || build.release", 'nvr'),
('tag_listing.create_event', 'create_event')]
joins = [
'tag ON tag.id = tag_listing.tag_id',
'build ON build.id = tag_listing.build_id',
'events ON events.id = build.create_event',
'package ON package.id = build.pkg_id',
'volume ON volume.id = build.volume_id',
'users ON users.id = build.owner',
'LEFT JOIN users AS promoter ON promoter.id = build.promoter',
]
if type is None:
pass
elif type == 'maven':
joins.append('maven_builds ON maven_builds.build_id = tag_listing.build_id')
fields.extend([('maven_builds.group_id', 'maven_group_id'),
('maven_builds.artifact_id', 'maven_artifact_id'),
('maven_builds.version', 'maven_version')])
elif type == 'win':
joins.append('win_builds ON win_builds.build_id = tag_listing.build_id')
fields.append(('win_builds.platform', 'platform'))
elif type == 'image':
joins.append('image_builds ON image_builds.build_id = tag_listing.build_id')
fields.append(('image_builds.build_id', 'build_id'))
else:
btype = lookup_name('btype', type, strict=False)
if not btype:
raise koji.GenericError('unsupported build type: %s' % type)
btype_id = btype['id']
joins += ['build_types ON build.id = build_types.build_id AND btype_id = %(btype_id)s']
clauses = [
eventCondition(event, 'tag_listing'),
'tag_id = %(tagid)s',
'build.state = %(st_complete)i'
]
if package:
clauses.append('package.name = %(package)s')
if owner:
clauses.append('users.name = %(owner)s')
if draft is not None:
clauses.append(draft_clause(draft))
queryOpts = {'order': '-create_event,-id'}
# most recently tagged first
# in a tie (e.g. two builds tagged at same event), newest build first
if extra:
fields.append(('build.extra', 'extra'))
query = QueryProcessor(columns=[x[0] for x in fields], aliases=[x[1] for x in fields],
tables=tables, joins=joins, clauses=clauses, values=locals(),
transform=_fix_extra_field, opts=queryOpts)
else:
query = QueryProcessor(columns=[x[0] for x in fields], aliases=[x[1] for x in fields],
tables=tables, joins=joins, clauses=clauses, values=locals(),
opts=queryOpts)
builds = []
seen = {} # used to enforce the 'latest' option
for tagid in taglist:
# log_error(koji.db._quoteparams(q,locals()))
query.values['tagid'] = tagid
for build in query.execute():
pkgid = build['package_id']
pinfo = packages.get(pkgid, None)
if pinfo is None or pinfo['blocked']:
# note:
# tools should endeavor to keep tag_listing sane w.r.t.
# the package list, but if there is disagreement the package
# list should take priority
continue
if latest:
if (latest is True and pkgid in seen) or seen.get(pkgid, 0) >= latest:
# only take the first N entries
# (note ordering in query above)
continue
seen[pkgid] = seen.get(pkgid, 0) + 1
builds.append(build)
return builds
def readTaggedRPMS(tag, package=None, arch=None, event=None, inherit=False, latest=True,
rpmsigs=False, owner=None, type=None, extra=True, draft=None):
"""Returns a list of rpms and builds for specified tag
:param int|str tag: The tag name or ID to search
:param str package: Filter on a package name.
:param str|list arch: Filter on an architecture (eg "x86_64") or list of
architectures.
:param int event: The event ID at which to search. If unspecified, the
default behavior is to search for the "active" tag
builds.
:param bool inherit: Follow tag inheritance (default: False)
:param bool|int latest: Set to "True" to get the single latest build. Set
to an int "N" to get the latest "N" builds. If
unspecified, the default value is "False", and
Koji will list all builds in the tag.
:param bool rpmsigs: query will return one record per rpm/signature combination
:param str owner: Filter by build owner name
:param str type: Filter by build type. Supported types are 'maven',
'win', and 'image'.
:param bool extra: Set to "False" to skip the rpm extra info
:param bool draft: bool or None option that indicates the filter based on draft field
- None: no filter (both draft and regular builds)
- True: draft only
- False: regular only
:returns: a two-element list. The first element is the list of RPMs, and
the second element is the list of builds.
"""
taglist = [tag]
if inherit:
# XXX really should cache this - it gets called several places
# (however, it is fairly quick)
taglist += [link['parent_id'] for link in readFullInheritance(tag, event)]
builds = readTaggedBuilds(tag, event=event, inherit=inherit, latest=latest, package=package,
owner=owner, type=type, draft=draft)
# index builds
build_idx = dict([(b['build_id'], b) for b in builds])
# the following query is run for each tag in the inheritance
fields = [('rpminfo.name', 'name'),
('rpminfo.version', 'version'),
('rpminfo.release', 'release'),
('rpminfo.arch', 'arch'),
('rpminfo.id', 'id'),
('rpminfo.epoch', 'epoch'),
('rpminfo.draft', 'draft'),
('rpminfo.payloadhash', 'payloadhash'),
('rpminfo.size', 'size'),
('rpminfo.buildtime', 'buildtime'),
('rpminfo.buildroot_id', 'buildroot_id'),
('rpminfo.build_id', 'build_id'),
('rpminfo.metadata_only', 'metadata_only'),
]
tables = ['rpminfo']
joins = ['tag_listing ON rpminfo.build_id = tag_listing.build_id']
clauses = [eventCondition(event, 'tag_listing'), 'tag_id=%(tagid)s']
data = {} # tagid added later
if package:
joins.append('build ON rpminfo.build_id = build.id')
joins.append('package ON package.id = build.pkg_id')
clauses.append('package.name = %(package)s')
data['package'] = package
if rpmsigs:
fields.append(('rpmsigs.sigkey', 'sigkey'))
joins.append('LEFT OUTER JOIN rpmsigs on rpminfo.id = rpmsigs.rpm_id')
if arch:
data['arch'] = arch
if isinstance(arch, str):
clauses.append('rpminfo.arch = %(arch)s')
elif isinstance(arch, (list, tuple)):
clauses.append('rpminfo.arch IN %(arch)s')
else:
raise koji.GenericError('Invalid type for arch option: %s' % builtins.type(arch))
if draft is not None:
clauses.append(draft_clause(draft, table='rpminfo'))
if extra:
fields.append(('rpminfo.extra', 'extra'))
query = QueryProcessor(tables=tables, joins=joins, clauses=clauses,
columns=[pair[0] for pair in fields],
aliases=[pair[1] for pair in fields],
values=data, transform=_fix_rpm_row)
else:
query = QueryProcessor(tables=tables, joins=joins, clauses=clauses,
columns=[pair[0] for pair in fields],
aliases=[pair[1] for pair in fields],
values=data)
# unique constraints ensure that each of these queries will not report
# duplicate rpminfo entries, BUT since we make the query multiple times,
# we can get duplicates if a package is multiply tagged.
tags_seen = {}
def _iter_rpms():
for tagid in taglist:
if tagid in tags_seen:
# certain inheritance trees can (legitimately) have the same tag
# appear more than once (perhaps once with a package filter and once
# without). The hard part of that was already done by readTaggedBuilds.
# We only need consider each tag once. Note how we use build_idx below.
# (Without this, we could report the same rpm twice)
continue
else:
tags_seen[tagid] = 1
query.values['tagid'] = tagid
for rpminfo in query.iterate():
# note: we're checking against the build list because
# it has been filtered by the package list. The tag
# tools should endeavor to keep tag_listing sane w.r.t.
# the package list, but if there is disagreement the package
# list should take priority
build = build_idx.get(rpminfo['build_id'], None)
if build is None:
continue
elif build['tag_id'] != tagid:
# wrong tag
continue
yield rpminfo
return [_iter_rpms(), builds]
def readTaggedArchives(tag, package=None, event=None, inherit=False, latest=True, type=None,
extra=True):
"""Returns a list of archives for specified tag
:param int|str tag: The tag name or ID to search
:param str package: Filter on a package name.
:param int event: set event to query at a time in the past
:param bool inherit: set to "True" to follow inheritance
:param bool|int latest: set to "False" to get all tagged archives (not just from the latest
builds), set to "N" to get only the "N" latest tagged RPMs
:param str type: Filter by build type. Supported types are 'maven' and 'win'.
:param bool extra: Set to "False" to skip the archives extra info
:returns: a two-element list. The first element is the list of archives, and
the second element is the list of builds.
If type is not None, restrict the listing to archives of the given type. Currently
the supported types are 'maven' and 'win'.
"""
taglist = [tag]
if inherit:
# XXX really should cache this - it gets called several places
# (however, it is fairly quick)
taglist += [link['parent_id'] for link in readFullInheritance(tag, event)]
# If type == 'maven', we require that both the build *and* the archive have Maven metadata
builds = readTaggedBuilds(tag, event=event, inherit=inherit, latest=latest, package=package,
type=type)
# index builds
build_idx = dict([(b['build_id'], b) for b in builds])
# the following query is run for each tag in the inheritance
fields = [('archiveinfo.id', 'id'),
('archiveinfo.type_id', 'type_id'),
('archiveinfo.btype_id', 'btype_id'),
('btype.name', 'btype'),
('archiveinfo.build_id', 'build_id'),
('archiveinfo.buildroot_id', 'buildroot_id'),
('archiveinfo.filename', 'filename'),
('archiveinfo.size', 'size'),
('archiveinfo.checksum', 'checksum'),
('archiveinfo.checksum_type', 'checksum_type'),
('archiveinfo.metadata_only', 'metadata_only'),
]
tables = ['archiveinfo']
joins = ['tag_listing ON archiveinfo.build_id = tag_listing.build_id',
'btype ON archiveinfo.btype_id = btype.id']
clauses = [eventCondition(event), 'tag_listing.tag_id = %(tagid)i']
if package:
joins.append('build ON archiveinfo.build_id = build.id')
joins.append('package ON build.pkg_id = package.id')
clauses.append('package.name = %(package)s')
if type is None:
pass
elif type == 'maven':
joins.append('maven_archives ON archiveinfo.id = maven_archives.archive_id')
fields.extend([('maven_archives.group_id', 'maven_group_id'),
('maven_archives.artifact_id', 'maven_artifact_id'),
('maven_archives.version', 'maven_version')])
elif type == 'win':
joins.append('win_archives ON archiveinfo.id = win_archives.archive_id')
fields.extend([('win_archives.relpath', 'relpath'),
('win_archives.platforms', 'platforms'),
('win_archives.flags', 'flags')])
else:
raise koji.GenericError('unsupported archive type: %s' % type)
if extra:
fields.append(('archiveinfo.extra', 'extra'))
query = QueryProcessor(tables=tables, joins=joins, clauses=clauses,
transform=_fix_archive_row,
columns=[pair[0] for pair in fields],
aliases=[pair[1] for pair in fields])
else:
query = QueryProcessor(tables=tables, joins=joins, clauses=clauses,
columns=[pair[0] for pair in fields],
aliases=[pair[1] for pair in fields])
# unique constraints ensure that each of these queries will not report
# duplicate archiveinfo entries, BUT since we make the query multiple times,
# we can get duplicates if a package is multiply tagged.
archives = []
tags_seen = {}
for tagid in taglist:
if tagid in tags_seen:
# certain inheritance trees can (legitimately) have the same tag
# appear more than once (perhaps once with a package filter and once
# without). The hard part of that was already done by readTaggedBuilds.
# We only need consider each tag once. Note how we use build_idx below.
# (Without this, we could report the same rpm twice)
continue
else:
tags_seen[tagid] = 1
query.values = {'tagid': tagid, 'package': package}
for archiveinfo in query.execute():
# note: we're checking against the build list because
# it has been filtered by the package list. The tag
# tools should endeavor to keep tag_listing sane w.r.t.
# the package list, but if there is disagreement the package
# list should take priority
build = build_idx.get(archiveinfo['build_id'], None)
if build is None:
continue
elif build['tag_id'] != tagid:
# wrong tag
continue
archives.append(archiveinfo)
return [archives, builds]
def check_tag_access(tag_id, user_id=None):
"""Determine if user has access to tag package with tag.
Returns a tuple (access, override, reason)
access: a boolean indicating whether access is allowed
override: a boolean indicating whether access may be forced
reason: the reason access is blocked
"""
if user_id is None:
user_id = context.session.user_id
if user_id is None:
raise koji.GenericError("a user_id is required")
user_id = convert_value(user_id, cast=int)
perms = get_user_perms(user_id)
override = False
if 'admin' in perms:
override = True
tag = get_tag(tag_id, strict=True)
if tag['locked']:
return (False, override, "tag is locked")
if tag['perm_id']:
needed_perm = lookup_perm(tag['perm_id'], strict=True)['name']
if needed_perm not in perms:
return (False, override, "tag requires %s permission" % needed_perm)
return (True, override, "")
def assert_tag_access(tag_id, user_id=None, force=False):
access, override, reason = check_tag_access(tag_id, user_id)
if not access and not (override and force):
raise koji.ActionNotAllowed(reason)
def _tag_build(tag, build, user_id=None, force=False):
"""Tag a build
This function makes access checks based on user_id, which defaults to the
user_id of the session.
Tagging with a locked tag is not allowed unless force is true (and even
then admin permission is required).
Retagging is not allowed unless force is true. (retagging changes the order
of entries will affect which build is the latest)
"""
tag = get_tag(tag, strict=True)
build = get_build(build, strict=True)
if user_id:
user = get_user(user_id, strict=True)
else:
# use the user associated with the current session
user = get_user(context.session.user_id, strict=True)
# access check
assert_tag_access(tag['id'], user_id=user_id, force=force)
return _direct_tag_build(tag, build, user, force)
def _direct_tag_build(tag, build, user, force=False):
"""Directly tag a build. No access check or value lookup."""
koji.plugin.run_callbacks('preTag', tag=tag, build=build, user=user, force=force)
tag_id = tag['id']
build_id = build['id']
user_id = user['id']
nvr = "%(name)s-%(version)s-%(release)s" % build
if build['state'] != koji.BUILD_STATES['COMPLETE']:
# incomplete builds may not be tagged, not even when forced
state = koji.BUILD_STATES[build['state']]
raise koji.TagError("build %s not complete: state %s" % (nvr, state))
# see if it's already tagged
retag = False
table = 'tag_listing'
clauses = ('tag_id=%(tag_id)i', 'build_id=%(build_id)i')
query = QueryProcessor(columns=['build_id'], tables=[table],
clauses=('active = TRUE',) + clauses,
values=locals(), opts={'rowlock': True})
# note: tag_listing is unique on (build_id, tag_id, active)
if query.executeOne():
# already tagged
if not force:
raise koji.TagError("build %s already tagged (%s)" % (nvr, tag['name']))
# otherwise we retag
retag = True
if retag:
# revoke the old tag first
update = UpdateProcessor(table, values=locals(), clauses=clauses)
update.make_revoke(user_id=user_id)
update.execute()
# tag the package
insert = InsertProcessor(table)
insert.set(tag_id=tag_id, build_id=build_id)
insert.make_create(user_id=user_id)
insert.execute()
koji.plugin.run_callbacks('postTag', tag=tag, build=build, user=user, force=force)
def _untag_build(tag, build, user_id=None, strict=True, force=False):
"""Untag a build
If strict is true, assert that build is actually tagged
The force option overrides a lock (if the user is an admin)
This function makes access checks based on user_id, which defaults to the
user_id of the session.
"""
tag = get_tag(tag, strict=True)
build = get_build(build, strict=True)
if user_id:
user = get_user(user_id, strict=True)
else:
# use the user associated with the current session
user = get_user(context.session.user_id, strict=True)
assert_tag_access(tag['id'], user_id=user_id, force=force)
return _direct_untag_build(tag, build, user, strict, force)
def _direct_untag_build(tag, build, user, strict=True, force=False):
"""Directly untag a build. No access check or value lookup."""
koji.plugin.run_callbacks(
'preUntag', tag=tag, build=build, user=user, force=force, strict=strict)
values = {'tag_id': tag['id'], 'build_id': build['id']}
update = UpdateProcessor('tag_listing', values=values,
clauses=['tag_id=%(tag_id)i', 'build_id=%(build_id)i'])
update.make_revoke(user_id=user['id'])
count = update.execute()
if count == 0 and strict:
nvr = "%(name)s-%(version)s-%(release)s" % build
raise koji.TagError("build %s not in tag %s" % (nvr, tag['name']))
koji.plugin.run_callbacks(
'postUntag', tag=tag, build=build, user=user, force=force, strict=strict)
# tag-group operations
# add
# remove
# block
# unblock
# list (readTagGroups)
def grplist_add(taginfo, grpinfo, block=False, force=False, **opts):
"""Add to (or update) group list for tag"""
# only admins....
context.session.assertPerm('tag')
_grplist_add(taginfo, grpinfo, block, force, **opts)
def _grplist_add(taginfo, grpinfo, block, force, **opts):
"""grplist_add without permission check"""
tag = get_tag(taginfo, strict=True)
group = lookup_group(grpinfo, create=True)
opts['blocked'] = bool(block)
# check current group status (incl inheritance)
groups = get_tag_groups(tag['id'], inherit=True, incl_pkgs=False, incl_reqs=False)
previous = groups.get(group['id'], None)
cfg_fields = ('exported', 'display_name', 'is_default', 'uservisible',
'description', 'langonly', 'biarchonly', 'blocked')
# prevent user-provided opts from doing anything strange
opts = dslice(opts, cfg_fields, strict=False)
if previous is not None:
# already there (possibly via inheritance)
if previous['blocked'] and not force:
raise koji.GenericError("group %s is blocked in tag %s" % (group['name'], tag['name']))
# check for duplication and grab old data for defaults
changed = False
for field in cfg_fields:
old = previous[field]
if field in opts:
if opts[field] != old:
changed = True
else:
opts[field] = old
if not changed:
# no point in adding it again with the same data
return
# provide available defaults and sanity check data
opts.setdefault('display_name', group['name'])
opts.setdefault('biarchonly', False)
opts.setdefault('exported', True)
opts.setdefault('uservisible', True)
# XXX ^^^
opts['tag_id'] = tag['id']
opts['group_id'] = group['id']
# revoke old entry (if present)
update = UpdateProcessor('group_config', values=opts,
clauses=['group_id=%(group_id)s', 'tag_id=%(tag_id)s'])
update.make_revoke()
update.execute()
# add new entry
insert = InsertProcessor('group_config', data=opts)
insert.make_create()
insert.execute()
def grplist_remove(taginfo, grpinfo, force=False):
"""Remove group from the list for tag
Permission required: admin
:param taginfo: tag id or name which group is removed from
:type taginfo: int or str
:param grpinfo: group id or name which is removed
:type grpinfo: int or str
:param bool force: If False(default), GenericException will be raised when
no group found in the list for tag. If True, revoking
will be force to execute, no matter if the relationship
exists.
Really this shouldn't be used except in special cases
Most of the time you really want to use the block or unblock functions
"""
# only admins....
context.session.assertPerm('tag')
_grplist_remove(taginfo, grpinfo, force)
def _grplist_remove(taginfo, grpinfo, force=False):
"""grplist_remove without permission check"""
tag = get_tag(taginfo, strict=True)
group = lookup_group(grpinfo, strict=True)
tag_id = tag['id']
grp_id = group['id']
clauses = ['group_id=%(grp_id)s', 'tag_id=%(tag_id)s']
if not force:
query = QueryProcessor(columns=['group_id', 'tag_id', 'active'],
tables=['group_config'],
values=locals(),
clauses=clauses + [eventCondition(None)])
old_grp_conf = query.executeOne()
if not old_grp_conf:
raise koji.GenericError("No group: %s found for tag: %s"
% (group['name'], tag['name']))
update = UpdateProcessor('group_config', values=locals(), clauses=clauses)
update.make_revoke()
update.execute()
def grplist_block(taginfo, grpinfo):
"""Block the group in tag"""
grplist_add(taginfo, grpinfo, block=True)
def grplist_unblock(taginfo, grpinfo):
"""Unblock the group in tag
If the group is blocked in this tag, then simply remove the block.
Otherwise, raise an error
"""
# only admins...
context.session.assertPerm('tag')
_grplist_unblock(taginfo, grpinfo)
def _grplist_unblock(taginfo, grpinfo):
"""grplist_unblock without permssion check"""
tag = lookup_tag(taginfo, strict=True)
group = lookup_group(grpinfo, strict=True)
tag_id = tag['id']
grp_id = group['id']
table = 'group_config'
clauses = ('group_id=%(grp_id)s', 'tag_id=%(tag_id)s')
query = QueryProcessor(columns=['blocked'], tables=[table],
clauses=('active = TRUE',) + clauses,
values=locals(), opts={'rowlock': True})
blocked = query.singleValue(strict=False)
if not blocked:
raise koji.GenericError("group %s is NOT blocked in tag %s" % (group['name'], tag['name']))
update = UpdateProcessor(table, values=locals(), clauses=clauses)
update.make_revoke()
update.execute()
# tag-group-pkg operations
# add
# remove
# block
# unblock
# list (readTagGroups)
def grp_pkg_add(taginfo, grpinfo, pkg_name, block=False, force=False, **opts):
"""Add package to group for tag"""
# only admins....
context.session.assertPerm('tag')
_grp_pkg_add(taginfo, grpinfo, pkg_name, block, force, **opts)
def _grp_pkg_add(taginfo, grpinfo, pkg_name, block, force, **opts):
"""grp_pkg_add without permssion checks"""
tag = lookup_tag(taginfo, strict=True)
group = lookup_group(grpinfo, strict=True)
block = bool(block)
# check current group status (incl inheritance)
groups = get_tag_groups(tag['id'], inherit=True, incl_pkgs=True, incl_reqs=False)
grp_cfg = groups.get(group['id'], None)
if grp_cfg is None:
raise koji.GenericError("group %s not present in tag %s" % (group['name'], tag['name']))
elif grp_cfg['blocked']:
raise koji.GenericError("group %s is blocked in tag %s" % (group['name'], tag['name']))
previous = grp_cfg['packagelist'].get(pkg_name, None)
cfg_fields = ('type', 'basearchonly', 'requires')
# prevent user-provided opts from doing anything strange
opts = dslice(opts, cfg_fields, strict=False)
if previous is not None:
# already there (possibly via inheritance)
if previous['blocked'] and not force:
raise koji.GenericError("package %s blocked in group %s, tag %s"
% (pkg_name, group['name'], tag['name']))
# check for duplication and grab old data for defaults
changed = False
for field in cfg_fields:
old = previous[field]
if field in opts:
if opts[field] != old:
changed = True
else:
opts[field] = old
if block:
# from condition above, either previous is not blocked or force is on,
# either way, we should add the entry
changed = True
if not changed and not force:
# no point in adding it again with the same data (unless force is on)
return
opts.setdefault('type', 'mandatory')
opts['group_id'] = group['id']
opts['tag_id'] = tag['id']
opts['package'] = pkg_name
opts['blocked'] = block
# revoke old entry (if present)
update = UpdateProcessor('group_package_listing', values=opts,
clauses=['group_id=%(group_id)s',
'tag_id=%(tag_id)s',
'package=%(package)s'])
update.make_revoke()
update.execute()
# add new entry
insert = InsertProcessor('group_package_listing', data=opts)
insert.make_create()
insert.execute()
def grp_pkg_remove(taginfo, grpinfo, pkg_name):
"""Remove package from the list for group-tag
Really this shouldn't be used except in special cases
Most of the time you really want to use the block or unblock functions
"""
# only admins....
context.session.assertPerm('tag')
_grp_pkg_remove(taginfo, grpinfo, pkg_name)
def _grp_pkg_remove(taginfo, grpinfo, pkg_name):
"""grp_pkg_remove without permission checks"""
tag_id = get_tag_id(taginfo, strict=True)
grp_id = get_group_id(grpinfo, strict=True)
update = UpdateProcessor('group_package_listing', values=locals(),
clauses=['package=%(pkg_name)s',
'tag_id=%(tag_id)s',
'group_id = %(grp_id)s'])
update.make_revoke()
update.execute()
def grp_pkg_block(taginfo, grpinfo, pkg_name):
"""Block the package in group-tag"""
grp_pkg_add(taginfo, grpinfo, pkg_name, block=True)
def grp_pkg_unblock(taginfo, grpinfo, pkg_name):
"""Unblock the package in group-tag
If blocked (directly) in this tag, then simply remove the block.
Otherwise, raise an error
"""
# only admins...
context.session.assertPerm('tag')
_grp_pkg_unblock(taginfo, grpinfo, pkg_name)
def _grp_pkg_unblock(taginfo, grpinfo, pkg_name):
"""grp_pkg_unblock without permission checks"""
table = 'group_package_listing'
tag_id = get_tag_id(taginfo, strict=True)
grp_id = get_group_id(grpinfo, strict=True)
clauses = ('group_id=%(grp_id)s', 'tag_id=%(tag_id)s', 'package = %(pkg_name)s')
query = QueryProcessor(columns=['blocked'], tables=[table],
clauses=('active = TRUE',) + clauses,
values=locals(), opts={'rowlock': True})
blocked = query.singleValue(strict=False)
if not blocked:
raise koji.GenericError("package %s is NOT blocked in group %s, tag %s"
% (pkg_name, grp_id, tag_id))
update = UpdateProcessor('group_package_listing', values=locals(), clauses=clauses)
update.make_revoke()
update.execute()
# tag-group-req operations
# add
# remove
# block
# unblock
# list (readTagGroups)
def grp_req_add(taginfo, grpinfo, reqinfo, block=False, force=False, **opts):
"""Add group requirement to group for tag"""
# only admins....
context.session.assertPerm('tag')
_grp_req_add(taginfo, grpinfo, reqinfo, block, force, **opts)
def _grp_req_add(taginfo, grpinfo, reqinfo, block, force, **opts):
"""grp_req_add without permssion checks"""
tag = lookup_tag(taginfo, strict=True)
group = lookup_group(grpinfo, strict=True, create=False)
req = lookup_group(reqinfo, strict=True, create=False)
block = bool(block)
# check current group status (incl inheritance)
groups = get_tag_groups(tag['id'], inherit=True, incl_pkgs=False, incl_reqs=True)
grp_cfg = groups.get(group['id'], None)
if grp_cfg is None:
raise koji.GenericError("group %s not present in tag %s" % (group['name'], tag['name']))
elif grp_cfg['blocked']:
raise koji.GenericError("group %s is blocked in tag %s" % (group['name'], tag['name']))
previous = grp_cfg['grouplist'].get(req['id'], None)
cfg_fields = ('type', 'is_metapkg')
# prevent user-provided opts from doing anything strange
opts = dslice(opts, cfg_fields, strict=False)
if previous is not None:
# already there (possibly via inheritance)
if previous['blocked'] and not force:
raise koji.GenericError("requirement on group %s blocked in group %s, tag %s"
% (req['name'], group['name'], tag['name']))
# check for duplication and grab old data for defaults
changed = False
for field in cfg_fields:
old = previous[field]
if field in opts:
if opts[field] != old:
changed = True
else:
opts[field] = old
if block:
# from condition above, either previous is not blocked or force is on,
# either way, we should add the entry
changed = True
if not changed:
# no point in adding it again with the same data
return
opts.setdefault('type', 'mandatory')
opts['group_id'] = group['id']
opts['tag_id'] = tag['id']
opts['req_id'] = req['id']
opts['blocked'] = block
# revoke old entry (if present)
update = UpdateProcessor('group_req_listing', values=opts,
clauses=['group_id=%(group_id)s',
'tag_id=%(tag_id)s',
'req_id=%(req_id)s'])
update.make_revoke()
update.execute()
# add new entry
insert = InsertProcessor('group_req_listing', data=opts)
insert.make_create()
insert.execute()
def grp_req_remove(taginfo, grpinfo, reqinfo, force=None):
"""Remove group requirement from the list for group-tag
Really this shouldn't be used except in special cases
Most of the time you really want to use the block or unblock functions
"""
# only admins....
context.session.assertPerm('tag')
_grp_req_remove(taginfo, grpinfo, reqinfo, force)
def _grp_req_remove(taginfo, grpinfo, reqinfo, force):
"""grp_req_remove without permission checks"""
if force is not None:
logger.warning("force option in groupReqListRemove call is deprecated")
tag_id = get_tag_id(taginfo, strict=True)
grp_id = get_group_id(grpinfo, strict=True)
req_id = get_group_id(reqinfo, strict=True)
update = UpdateProcessor('group_req_listing', values=locals(),
clauses=['req_id=%(req_id)s',
'tag_id=%(tag_id)s',
'group_id = %(grp_id)s'])
update.make_revoke()
update.execute()
def grp_req_block(taginfo, grpinfo, reqinfo):
"""Block the group requirement in group-tag"""
grp_req_add(taginfo, grpinfo, reqinfo, block=True)
def grp_req_unblock(taginfo, grpinfo, reqinfo):
"""Unblock the group requirement in group-tag
If blocked (directly) in this tag, then simply remove the block.
Otherwise, raise an error
"""
# only admins...
context.session.assertPerm('tag')
_grp_req_unblock(taginfo, grpinfo, reqinfo)
def _grp_req_unblock(taginfo, grpinfo, reqinfo):
"""grp_req_unblock without permssion checks"""
tag_id = get_tag_id(taginfo, strict=True)
grp_id = get_group_id(grpinfo, strict=True)
req_id = get_group_id(reqinfo, strict=True)
table = 'group_req_listing'
clauses = ('group_id=%(grp_id)s', 'tag_id=%(tag_id)s', 'req_id = %(req_id)s')
query = QueryProcessor(columns=['blocked'], tables=[table],
clauses=('active = TRUE',) + clauses,
values=locals(), opts={'rowlock': True})
blocked = query.singleValue(strict=False)
if not blocked:
raise koji.GenericError("group req %s is NOT blocked in group %s, tag %s"
% (req_id, grp_id, tag_id))
update = UpdateProcessor('group_req_listing', values=locals(), clauses=clauses)
update.make_revoke()
update.execute()
def get_tag_groups(tag, event=None, inherit=True, incl_pkgs=True, incl_reqs=True):
"""Return group data for the tag
If inherit is true, follow inheritance
If event is specified, query at event
If incl_pkgs is true (the default), include packagelist data
If incl_reqs is true (the default), include groupreq data
Note: the data returned includes some blocked entries that may need to be
filtered out.
"""
order = None
tag = get_tag_id(tag, strict=True)
taglist = [tag]
if inherit:
order = readFullInheritance(tag, event)
taglist += [link['parent_id'] for link in order]
evcondition = eventCondition(event)
# First get the list of groups
columns = ['name', 'group_id', 'tag_id', 'blocked', 'exported', 'display_name',
'is_default', 'uservisible', 'description', 'langonly', 'biarchonly']
groups = {}
for tagid in taglist:
query = QueryProcessor(tables=['group_config'], columns=columns,
joins=['groups ON group_id = id'],
clauses=[evcondition, 'tag_id = %(tagid)s'],
values={'tagid': tagid})
for group in query.execute():
grp_id = group['group_id']
# we only take the first entry for group as we go through inheritance
groups.setdefault(grp_id, group)
if incl_pkgs:
for group in groups.values():
group['packagelist'] = {}
columns = ['group_id', 'tag_id', 'package', 'blocked', 'type', 'basearchonly', 'requires']
for tagid in taglist:
query = QueryProcessor(tables=['group_package_listing'], columns=columns,
clauses=[evcondition, 'tag_id = %(tagid)s'],
values={'tagid': tagid})
for grp_pkg in query.execute():
grp_id = grp_pkg['group_id']
if grp_id not in groups:
# tag does not have this group
continue
group = groups[grp_id]
if group['blocked']:
# ignore blocked groups
continue
pkg_name = grp_pkg['package']
group['packagelist'].setdefault(pkg_name, grp_pkg)
if incl_reqs:
# and now the group reqs
for group in groups.values():
group['grouplist'] = {}
columns = ['group_id', 'tag_id', 'req_id', 'blocked', 'type', 'is_metapkg', 'name']
for tagid in taglist:
query = QueryProcessor(tables=['group_req_listing'], columns=columns,
joins=['groups on req_id = id'],
clauses=[evcondition, 'tag_id = %(tagid)s'],
values={'tagid': tagid})
for grp_req in query.execute():
grp_id = grp_req['group_id']
if grp_id not in groups:
# tag does not have this group
continue
group = groups[grp_id]
if group['blocked']:
# ignore blocked groups
continue
req_id = grp_req['req_id']
if req_id not in groups:
# tag does not have this group
continue
elif groups[req_id]['blocked']:
# ignore blocked groups
continue
group['grouplist'].setdefault(req_id, grp_req)
return groups
def readTagGroups(tag, event=None, inherit=True, incl_pkgs=True, incl_reqs=True,
incl_blocked=False):
"""Return group data for the tag with blocked entries removed
Also scrubs data into an xmlrpc-safe format (no integer keys)
Blocked packages/groups can alternatively also be listed if incl_blocked is set to True
"""
groups = get_tag_groups(tag, event, inherit, incl_pkgs, incl_reqs)
groups = list(groups.values())
for group in groups:
# filter blocked entries and collapse to a list
if 'packagelist' in group:
if incl_blocked:
group['packagelist'] = list(group['packagelist'].values())
else:
group['packagelist'] = [x for x in group['packagelist'].values()
if not x['blocked']]
if 'grouplist' in group:
if incl_blocked:
group['grouplist'] = list(group['grouplist'].values())
else:
group['grouplist'] = [x for x in group['grouplist'].values()
if not x['blocked']]
# filter blocked entries and collapse to a list
if incl_blocked:
return groups
else:
return [x for x in groups if not x['blocked']]
def set_host_enabled(hostname, enabled=True):
context.session.assertPerm('host')
host = get_host(hostname)
if not host:
raise koji.GenericError('host does not exist: %s' % hostname)
update = UpdateProcessor('host_config', values=host, clauses=['host_id = %(id)i'])
update.make_revoke()
update.execute()
fields = ('arches', 'capacity', 'description', 'comment', 'enabled')
insert = InsertProcessor('host_config', data=dslice(host, fields))
insert.set(host_id=host['id'], enabled=enabled)
insert.make_create()
insert.execute()
def add_host_to_channel(hostname, channel_name, create=False, force=False):
"""Add the host to the specified channel
Channel must already exist unless create option is specified
"""
context.session.assertPerm('host')
host = get_host(hostname)
if host is None:
raise koji.GenericError('host does not exist: %s' % hostname)
host_id = host['id']
if create:
verify_name_internal(channel_name)
channel_id = get_channel_id(channel_name, create=create)
if channel_id is None:
raise koji.GenericError('channel does not exist: %s' % channel_name)
if not force:
if not get_channel(channel_id)['enabled']:
raise koji.GenericError('channel %s is disabled' % channel_name)
channels = list_channels(host_id)
for channel in channels:
if channel['id'] == channel_id:
raise koji.GenericError('host %s is already subscribed to the %s channel' %
(hostname, channel_name))
insert = InsertProcessor('host_channels')
insert.set(host_id=host_id, channel_id=channel_id)
insert.make_create()
insert.execute()
def remove_host_from_channel(hostname, channel_name):
"""Remove the host from the specified channel
:param str hostname: host name
:param str channel_name: channel name
"""
context.session.assertPerm('host')
host = get_host(hostname)
if host is None:
raise koji.GenericError('host does not exist: %s' % hostname)
host_id = host['id']
channel_id = get_channel_id(channel_name)
if channel_id is None:
raise koji.GenericError('channel does not exist: %s' % channel_name)
found = False
channels = list_channels(host_id)
for channel in channels:
if channel['id'] == channel_id:
found = True
break
if not found:
raise koji.GenericError('host %s is not subscribed to the %s channel' %
(hostname, channel_name))
values = {'host_id': host_id, 'channel_id': channel_id}
clauses = ['host_id = %(host_id)i AND channel_id = %(channel_id)i']
update = UpdateProcessor('host_channels', values=values, clauses=clauses)
update.make_revoke()
update.execute()
def rename_channel(old, new):
"""Rename a channel"""
edit_channel(old, name=new)
def edit_channel(channelInfo, **kw):
"""Edit information for an existing channel.
:param str/int channelInfo: channel name or ID
:param str name: new channel name
:param str description: description of channel
:param str comment: comment about channel
"""
context.session.assertPerm('admin')
channel = get_channel(channelInfo, strict=True)
fields = ('description', 'comment', 'name')
changes = []
for field in fields:
if field in kw and kw[field] != channel[field]:
changes.append(field)
if not changes:
return False
if kw.get('name'):
verify_name_internal(kw['name'])
dup_check = get_channel(kw['name'], strict=False)
if dup_check:
raise koji.GenericError("channel %(name)s already exists (id=%(id)i)" % dup_check)
if 'description' in kw:
convert_value(kw['description'], cast=str, check_only=True)
if 'comment' in kw:
convert_value(kw['comment'], cast=str, check_only=True)
update = UpdateProcessor('channels',
values={'channelID': channel['id']},
clauses=['id = %(channelID)i'])
for change in changes:
update.set(**{change: kw[change]})
update.execute()
return True
def add_channel(channel_name, description=None):
"""Add a channel.
:param str channel_name: channel name
:param str description: description of channel
"""
context.session.assertPerm('admin')
verify_name_internal(channel_name)
convert_value(description, cast=str, none_allowed=True,
message="Channel description must be a string")
dup_check = get_channel(channel_name, strict=False)
if dup_check:
raise koji.GenericError("channel %(name)s already exists (id=%(id)i)" % dup_check)
table = 'channels'
channel_id = nextval(f'{table}_id_seq')
insert = InsertProcessor(table)
insert.set(id=channel_id, name=channel_name, description=description)
insert.execute()
return channel_id
def set_channel_enabled(channelname, enabled=True, comment=None):
context.session.assertPerm('host')
convert_value(comment, cast=str, none_allowed=True, check_only=True)
channel = get_channel(channelname)
if not channel:
raise koji.GenericError('No such channel: %s' % channelname)
update = UpdateProcessor('channels', values=channel, clauses=['id = %(id)i'])
update.set(enabled=enabled)
if comment is not None:
update.set(comment=comment)
update.execute()
def get_all_arches():
"""Return a list of all (canonical) arches available from hosts"""
ret = {}
query = QueryProcessor(tables=['host_config'], columns=['arches'], clauses=['active IS TRUE'],
opts={'asList': True})
for (arches,) in query.execute():
if arches is None:
continue
for arch in arches.split():
# in a perfect world, this list would only include canonical
# arches, but not all admins will undertand that.
ret[koji.canonArch(arch)] = 1
return list(ret.keys())
def get_task_descendents(task, childMap=None, request=False):
if childMap is None:
childMap = {}
children = task.getChildren(request=request)
children.sort(key=lambda x: x['id'])
# xmlrpclib requires dict keys to be strings
childMap[str(task.id)] = children
for child in children:
get_task_descendents(Task(child['id']), childMap, request)
return childMap
def maven_tag_archives(tag_id, event_id=None, inherit=True):
"""
Get Maven artifacts associated with the given tag, following inheritance.
For any parent tags where 'maven_include_all' is true, include all versions
of a given groupId:artifactId, not just the most-recently-tagged.
"""
packages = readPackageList(tagID=tag_id, event=event_id, inherit=True, with_owners=False)
taglist = [tag_id]
if inherit:
taglist.extend([link['parent_id'] for link in readFullInheritance(tag_id, event_id)])
fields = [('tag.id', 'tag_id'), ('tag.name', 'tag_name'),
('build.pkg_id', 'pkg_id'), ('build.id', 'build_id'),
('package.name', 'build_name'), ('build.version', 'build_version'),
('build.release', 'build_release'), ('build.epoch', 'build_epoch'),
('build.state', 'state'), ('build.task_id', 'task_id'),
('build.owner', 'owner'),
('volume.id', 'volume_id'), ('volume.name', 'volume_name'),
('archiveinfo.id', 'id'), ('archiveinfo.type_id', 'type_id'),
('archiveinfo.buildroot_id', 'buildroot_id'),
('archiveinfo.filename', 'filename'), ('archiveinfo.size', 'size'),
('archiveinfo.checksum', 'checksum'),
('archiveinfo.checksum_type', 'checksum_type'),
('archiveinfo.metadata_only', 'metadata_only'),
('archiveinfo.extra', 'extra'),
('maven_archives.group_id', 'group_id'),
('maven_archives.artifact_id', 'artifact_id'),
('maven_archives.version', 'version'),
('tag_listing.create_event', 'tag_event')]
tables = ['tag_listing']
joins = ['tag ON tag_listing.tag_id = tag.id',
'build ON tag_listing.build_id = build.id',
'volume ON build.volume_id = volume.id',
'package ON build.pkg_id = package.id',
'archiveinfo ON build.id = archiveinfo.build_id',
'maven_archives ON archiveinfo.id = maven_archives.archive_id']
clauses = [eventCondition(event_id, 'tag_listing'), 'tag_listing.tag_id = %(tag_id)i']
order = '-tag_event'
query = QueryProcessor(tables=tables, joins=joins,
clauses=clauses, opts={'order': order},
transform=_fix_archive_row,
columns=[f[0] for f in fields],
aliases=[f[1] for f in fields])
included = {}
included_archives = set()
# these indexes eat into the memory savings of the generator, but it's only
# group_id/artifact_id/version/build_id/archive_id, which is much smaller than
# the full query
# ballpark estimate: 20-25% of total, less with heavy duplication of indexed values
def _iter_archives():
for tag_id in taglist:
taginfo = get_tag(tag_id, strict=True, event=event_id)
query.values['tag_id'] = tag_id
archives = query.iterate()
for archive in archives:
pkg = packages.get(archive['pkg_id'])
if not pkg or pkg['blocked']:
continue
# 4 possibilities:
# 1: we have never seen this group_id:artifact_id before
# - yield it, and add to the included dict
# 2: we have seen the group_id:artifact_id before, but a different version
# - if the taginfo['maven_include_all'] is true, yield it and
# append it to the included_versions dict, otherwise skip it
# 3: we have seen the group_id:artifact_id before, with the same version, from
# a different build
# - this is a different revision of the same GAV, ignore it because a more
# recently-tagged build has already been included
# 4: we have seen the group_id:artifact_id before, with the same version, from
# the same build
# - it is another artifact from a build we're already including, so include it
# as well
ga = '%(group_id)s:%(artifact_id)s' % archive
included_versions = included.get(ga)
if not included_versions:
included[ga] = {archive['version']: archive['build_id']}
included_archives.add(archive['id'])
yield archive
continue
included_build = included_versions.get(archive['version'])
if not included_build:
if taginfo['maven_include_all']:
included_versions[archive['version']] = archive['build_id']
included_archives.add(archive['id'])
yield archive
continue
if included_build != archive['build_id']:
continue
# make sure we haven't already seen this archive somewhere else in the
# tag hierarchy
if archive['id'] not in included_archives:
included_archives.add(archive['id'])
yield archive
return _iter_archives()
def repo_init(tag, task_id=None, event=None, opts=None):
"""Create a new repo entry in the INIT state
:param int|None task_id: (optional) the task that is creating the repo
:param int|None event: (optional) specify the event to create the repo from
:param dict|None opts: (optional) repo options (None for default settings)
Returns a dictionary containing
repo_id, event_id
"""
task_id = convert_value(task_id, cast=int, none_allowed=True)
event = convert_value(event, cast=int, none_allowed=True)
state = koji.REPO_INIT
tinfo = get_tag(tag, strict=True, event=event)
opts, custom = repos.get_repo_opts(tinfo, override=opts)
# TODO: do we need to provide old callback opt params for compatibility?
koji.plugin.run_callbacks('preRepoInit', tag=tinfo, event=event, repo_id=None, task_id=task_id,
opts=opts)
tag_id = tinfo['id']
repo_arches = {}
if opts['separate_src']:
repo_arches['src'] = 1
if tinfo['arches']:
for arch in tinfo['arches'].split():
arch = koji.canonArch(arch)
if arch in ['src', 'noarch']:
continue
repo_arches[arch] = 1
repo_id = nextval('repo_id_seq')
if event is None:
event_id = _singleValue("SELECT get_event()")
else:
# make sure event is valid
query = QueryProcessor(tables=['events'], columns=['time'],
clauses=['id=%(event)s'], values={'event': event})
query.singleValue(strict=True)
event_id = event
# do the insert
data = {
'id': repo_id,
'create_event': event_id,
'begin_event': tag_last_change_event(tag_id, before=event_id) or event_id,
'end_event': tag_first_change_event(tag_id, after=event_id), # None if unchanged
'tag_id': tag_id,
'state': state,
'task_id': task_id,
'opts': json.dumps(opts),
'custom_opts': json.dumps(custom),
}
insert = InsertProcessor('repo', data=data)
insert.execute()
# Need to pass event_id because even though this is a single transaction,
# it is possible to see the results of other committed transactions
latest = not tinfo['extra'].get('repo_include_all', False)
# Note: the repo_include_all option is not recommended for common use
# see https://pagure.io/koji/issue/588 for background
rpms, builds = readTaggedRPMS(tag_id, event=event_id, inherit=True, latest=latest)
groups = readTagGroups(tag_id, event=event_id, inherit=True)
blocks = [pkg for pkg in readPackageList(tag_id, event=event_id, inherit=True,
with_owners=False).values()
if pkg['blocked']]
repodir = koji.pathinfo.repo(repo_id, tinfo['name'])
os.makedirs(repodir) # should not already exist
# generate comps and groups.spec
groupsdir = "%s/groups" % (repodir)
koji.ensuredir(groupsdir)
comps = koji.generate_comps(groups, expand_groups=True)
with open("%s/comps.xml" % groupsdir, 'wt', encoding='utf-8') as fo:
fo.write(comps)
# write repo info to disk
repo_info = {
'id': repo_id,
'tag': tinfo['name'],
'tag_id': tinfo['id'],
'task_id': task_id,
'event_id': event_id,
'opts': opts,
'custom_opts': custom,
# also include these for compat:
'with_src': opts['src'],
'with_separate_src': opts['separate_src'],
'with_debuginfo': opts['debuginfo'],
}
with open('%s/repo.json' % repodir, 'wt', encoding='utf-8') as fp:
json.dump(repo_info, fp, indent=2)
# get build dirs
relpathinfo = koji.PathInfo(topdir='toplink')
builddirs = {}
for build in builds:
relpath = relpathinfo.build(build)
builddirs[build['id']] = relpath.lstrip('/')
# generate pkglist and rpmlist files
pkglist = {}
rpmlist = {}
for repoarch in repo_arches:
archdir = joinpath(repodir, repoarch)
koji.ensuredir(archdir)
# Make a symlink to our topdir
top_relpath = os.path.relpath(koji.pathinfo.topdir, archdir)
top_link = joinpath(archdir, 'toplink')
os.symlink(top_relpath, top_link)
pkglist[repoarch] = open(joinpath(archdir, 'pkglist'), 'wt', encoding='utf-8')
rpmlist[repoarch] = open(joinpath(archdir, 'rpmlist.jsonl'), 'wt', encoding='utf-8')
# NOTE - rpms is a generator
for rpminfo in rpms:
if not opts['debuginfo'] and koji.is_debuginfo(rpminfo['name']):
continue
relpath = "%s/%s\n" % (builddirs[rpminfo['build_id']], relpathinfo.rpm(rpminfo))
rpm_json = json.dumps(rpminfo, indent=None)
# must be one line for nl-delimited json
arch = rpminfo['arch']
if arch == 'src':
if opts['src']:
for repoarch in repo_arches:
pkglist[repoarch].write(relpath)
rpmlist[repoarch].write(rpm_json)
rpmlist[repoarch].write('\n')
if opts['separate_src']:
pkglist[arch].write(relpath)
rpmlist[arch].write(rpm_json)
rpmlist[arch].write('\n')
elif arch == 'noarch':
for repoarch in repo_arches:
if repoarch == 'src':
continue
pkglist[repoarch].write(relpath)
rpmlist[repoarch].write(rpm_json)
rpmlist[repoarch].write('\n')
else:
repoarch = koji.canonArch(arch)
if repoarch not in repo_arches:
# Do not create a repo for arches not in the arch list for this tag
continue
pkglist[repoarch].write(relpath)
rpmlist[repoarch].write(rpm_json)
rpmlist[repoarch].write('\n')
for repoarch in repo_arches:
pkglist[repoarch].close()
rpmlist[repoarch].close()
# write blocked package lists
for repoarch in repo_arches:
blocklist = open(joinpath(repodir, repoarch, 'blocklist'), 'wt', encoding='utf-8')
for pkg in blocks:
blocklist.write(pkg['package_name'])
blocklist.write('\n')
blocklist.close()
if opts['maven']:
if not context.opts.get('EnableMaven'):
# either option override or recently disabled
raise koji.GenericError("Maven support not enabled")
artifact_dirs = {}
dir_links = set()
for archive in maven_tag_archives(tinfo['id'], event_id):
buildinfo = {'name': archive['build_name'],
'version': archive['build_version'],
'release': archive['build_release'],
'epoch': archive['build_epoch'],
'volume_name': archive['volume_name'],
}
srcdir = joinpath(koji.pathinfo.mavenbuild(buildinfo),
koji.pathinfo.mavenrepo(archive))
destlink = joinpath(repodir, 'maven',
koji.pathinfo.mavenrepo(archive))
dir_links.add((srcdir, destlink))
dest_parent = os.path.dirname(destlink)
artifact_dirs.setdefault(dest_parent, set()).add((archive['group_id'],
archive['artifact_id'],
archive['version']))
created_dirs = set()
for srcdir, destlink in dir_links:
dest_parent = os.path.dirname(destlink)
if dest_parent not in created_dirs:
koji.ensuredir(dest_parent)
created_dirs.add(dest_parent)
relpath = os.path.relpath(srcdir, dest_parent)
try:
os.symlink(relpath, destlink)
except Exception:
log_error('Error linking %s to %s' % (destlink, relpath))
for artifact_dir, artifacts in artifact_dirs.items():
_write_maven_repo_metadata(artifact_dir, artifacts)
koji.plugin.run_callbacks('postRepoInit', tag=tinfo, event=event, repo_id=repo_id,
task_id=task_id, opts=opts)
return [repo_id, event_id]
def _write_maven_repo_metadata(destdir, artifacts):
# Sort the list so that the highest version number comes last.
# group_id and artifact_id should be the same for all entries,
# so we're really only comparing versions.
sort_param = {'key': functools.cmp_to_key(rpm.labelCompare)}
artifacts = sorted(artifacts, **sort_param)
artifactinfo = dict(zip(['group_id', 'artifact_id', 'version'], artifacts[-1]))
artifactinfo['timestamp'] = datetime.datetime.now().strftime('%Y%m%d%H%M%S')
contents = """<?xml version="1.0"?>
<metadata>
<groupId>%(group_id)s</groupId>
<artifactId>%(artifact_id)s</artifactId>
<versioning>
<latest>%(version)s</latest>
<release>%(version)s</release>
<versions>
""" % artifactinfo
for artifact in artifacts:
contents += """ <version>%s</version>
""" % artifact[2]
contents += """ </versions>
<lastUpdated>%s</lastUpdated>
</versioning>
</metadata>
""" % datetime.datetime.now().strftime('%Y%m%d%H%M%S')
with open(joinpath(destdir, 'maven-metadata.xml'), 'wt', encoding='utf-8') as mdfile:
mdfile.write(contents)
_generate_maven_metadata(destdir)
def dist_repo_init(tag, keys, task_opts):
"""Create a new repo entry in the INIT state, return full repo data"""
state = koji.REPO_INIT
convert_value(keys, cast=list, check_only=True)
tinfo = get_tag(tag, strict=True)
tag_id = tinfo['id']
convert_value(task_opts, cast=dict, check_only=True)
event = task_opts.get('event')
event = convert_value(event, cast=int, none_allowed=True)
volume = task_opts.get('volume')
if volume is not None:
volume = lookup_name('volume', volume, strict=True)['name']
arches = list(set([koji.canonArch(a) for a in task_opts['arch']]))
# note: we need to match args from the other preRepoInit callback
koji.plugin.run_callbacks('preRepoInit', tag=tinfo, with_src=False,
with_debuginfo=False, event=event, repo_id=None,
dist=True, keys=keys, arches=arches, task_opts=task_opts,
with_separate_src=False)
if not event:
event = get_event()
repo_id = nextval('repo_id_seq')
insert = InsertProcessor('repo')
insert.set(id=repo_id, create_event=event, tag_id=tag_id,
state=state, dist=True)
insert.execute()
repodir = koji.pathinfo.distrepo(repo_id, tinfo['name'], volume=volume)
for arch in arches:
koji.ensuredir(joinpath(repodir, arch))
if volume and volume != 'DEFAULT':
# symlink from main volume to this one
basedir = koji.pathinfo.distrepo(repo_id, tinfo['name'])
relpath = os.path.relpath(repodir, os.path.dirname(basedir))
koji.ensuredir(os.path.dirname(basedir))
os.symlink(relpath, basedir)
# handle comps
if task_opts.get('comps'):
convert_value(task_opts['comps'], cast=str, check_only=True)
groupsdir = joinpath(repodir, 'groups')
koji.ensuredir(groupsdir)
shutil.copyfile(joinpath(koji.pathinfo.work(),
task_opts['comps']), groupsdir + '/comps.xml')
# write repo info to disk
repo_info = {
'id': repo_id,
'tag': tinfo['name'],
'tag_id': tinfo['id'],
'keys': keys,
'volume': volume,
'task_opts': task_opts,
}
koji.dump_json('%s/repo.json' % repodir, repo_info, indent=2)
# note: we need to match args from the other postRepoInit callback
koji.plugin.run_callbacks('postRepoInit', tag=tinfo, with_src=False,
with_debuginfo=False, event=event, repo_id=repo_id,
dist=True, keys=keys, arches=arches, task_opts=task_opts,
repodir=repodir, with_separate_src=False)
return repo_id, event
def repo_set_state(repo_id, state, check=True):
"""Set repo state
:param int repo_id: repo id to change
:param int state: the repo state to change to (from koji.REPO_STATES)
:param bool check: deprecated
"""
repo_id = convert_value(repo_id, cast=int)
try:
name = koji.REPO_STATES[state]
except IndexError:
raise koji.ParameterError(f'Unknown repo state: {state}')
# we are always called with check=True
if check:
# sanity check the state transition
query = QueryProcessor(
tables=['repo'], columns=['state'], clauses=['id = %(repo_id)i'],
values={'repo_id': repo_id}, opts={'rowlock': True})
oldstate = query.singleValue()
oldname = koji.REPO_STATES[oldstate]
# for the most part states should progress upward
if oldstate > state and state != koji.REPO_DELETED:
raise koji.GenericError(f'Invalid repo state transition for repo {repo_id}: '
f'{oldname} -> {name}')
elif oldstate == state:
# historically we have allowed this no-op
logger.warning(f'Repo {repo_id} is already in state {name}')
return
elif oldstate == koji.REPO_DELETED:
# DELETED is a terminal state
raise koji.GenericError(f'Repo {repo_id} is deleted')
update = UpdateProcessor('repo', clauses=['id=%(repo_id)s'],
values={'repo_id': repo_id},
data={'state': state},
rawdata={'state_time': 'NOW()'})
update.execute()
if state == koji.REPO_READY:
repos.repo_done_hook(repo_id)
def repo_info(repo_id, strict=False):
"""Get repo information
:param int repo_id: repo ID
:param bool strict: raise an error on non-existent repo
:returns: dict (id, state, create_event, creation_time, tag_id, tag_name,
dist)
"""
repo_id = convert_value(repo_id, cast=int, none_allowed=True)
clauses = [['id', '=', repo_id]]
return repos.RepoQuery(clauses, fields='**').executeOne(strict=strict)
def repo_ready(repo_id):
"""Set repo state to ready"""
repo_set_state(repo_id, koji.REPO_READY)
def repo_expire(repo_id):
"""Set repo state to expired"""
repo_set_state(repo_id, koji.REPO_EXPIRED)
def repo_problem(repo_id):
"""Set repo state to problem"""
repo_set_state(repo_id, koji.REPO_PROBLEM)
def repo_delete(repo_id):
"""Attempt to mark repo deleted, return number of references
If the number of references is nonzero, no change is made"""
repo_id = convert_value(repo_id, cast=int)
# get a row lock on the repo
query = QueryProcessor(tables=['repo'], columns=['state'], clauses=['id = %(repo_id)i'],
values={'repo_id': repo_id}, opts={'rowlock': True})
query.execute()
references = repo_references(repo_id)
if not references:
repo_set_state(repo_id, koji.REPO_DELETED)
return len(references)
def repo_expire_older(tag_id, event_id, dist=None):
"""Expire repos for tag older than event
If dist is not None, then only expire repos with the given dist value
"""
# this function is no longer used
logger.warning("repo_expire_older is deprecated")
st_ready = koji.REPO_READY
clauses = ['tag_id = %(tag_id)s',
'create_event < %(event_id)s',
'state = %(st_ready)s']
if dist is not None:
dist = bool(dist)
clauses.append('dist = %(dist)s')
update = UpdateProcessor('repo', values=locals(), clauses=clauses)
update.set(state=koji.REPO_EXPIRED)
update.execute()
def repo_references(repo_id):
"""Return a list of buildroots that reference the repo"""
fields = [
('buildroot_id', 'id'),
('host_id', 'host_id'),
('task_id', 'task_id'),
('create_event', 'create_event'),
('state', 'state'),
]
fields, aliases = zip(*fields)
query = QueryProcessor(
tables=['standard_buildroot'],
columns=fields, aliases=aliases,
clauses=['repo_id=%(repo_id)s', 'retire_event IS NULL'],
values={'repo_id': repo_id})
# check results for bad states
ret = []
for data in query.execute():
if data['state'] == koji.BR_STATES['EXPIRED']:
log_error("Error: buildroot %(id)s expired, but has no retire_event" % data)
continue
ret.append(data)
return ret
def get_active_repos():
"""Get data on all active repos
This is a list of all the repos that the repo daemon needs to worry about.
"""
clauses = [['state', '!=', koji.REPO_DELETED]]
fields = ('id', 'tag_id', 'create_event', 'create_ts', 'state', 'dist', 'task_id', 'tag_name',
'creation_ts', 'state_ts', 'end_event', 'opts')
return repos.RepoQuery(clauses, fields).execute()
def tag_changed_since_event(event, taglist):
"""Report whether any changes since event affect any of the tags in list
The function is used by the repo daemon to determine which of its repos
are up to date.
This function does not figure inheritance, the calling function should
expand the taglist to include any desired inheritance.
Returns: True or False
"""
data = locals().copy()
# first check the tag_updates table
query = QueryProcessor(tables=['tag_updates'], columns=['id'],
clauses=['update_event > %(event)i', 'tag_id IN %(taglist)s'],
values=data, opts={'limit': 1})
if query.execute():
return True
# also check these versioned tables
tables = (
'tag_listing',
'tag_inheritance',
'tag_config',
'tag_extra',
'tag_packages',
'tag_external_repos',
'group_package_listing',
'group_req_listing',
'group_config',
)
for table in tables:
query = QueryProcessor(tables=[table], columns=['tag_id'], values=data,
clauses=['create_event > %(event)i OR revoke_event > %(event)i',
'tag_id IN %(taglist)s'], opts={'limit': 1})
if query.execute():
return True
return False
def tag_last_change_event(tag, before=None, inherit=True):
"""Report the most recent event that changed the tag, or None
:param tag: tag to consider
:type tag: int or str
:param before: only consider events before this value
:type before: int, optional
:param inherit: follow inheritance
:type inherit: bool
:returns: event id or None
:rtype: int or NoneType
"""
taginfo = get_tag(tag, strict=True, event="auto")
tag_id = taginfo['id']
before = convert_value(before, int, none_allowed=True)
tag_delete = taginfo.get('revoke_event')
if before is None and tag_delete:
return tag_delete
# get inheritance at the event
tags = [tag_id]
if inherit:
tags += [link['parent_id'] for link in readFullInheritance(tag_id, event=before)]
data = {
'before': before,
'tags': tags,
}
# first check the tag_updates table
tag_clause = 'tag_id IN %(tags)s'
clauses = [tag_clause]
if before is not None:
clauses.append('update_event < %(before)s')
query = QueryProcessor(tables=['tag_updates'], clauses=clauses,
columns=['max(update_event)'], values=data)
update_event = query.singleValue()
logger.debug('tag_update event %s', update_event)
events = [update_event]
# check for changes in versioned tables
tables = (
'tag_listing',
'tag_inheritance',
'tag_config',
'tag_packages',
'tag_external_repos',
'tag_extra',
'group_package_listing',
'group_req_listing',
'group_config',
)
for table in tables:
# create events
clauses = [tag_clause]
if before is not None:
clauses.append('create_event < %(before)s')
query = QueryProcessor(tables=[table], columns=['max(create_event)'],
clauses=clauses, values=data)
events.append(query.singleValue())
logger.debug('%s create event %s', table, events[-1])
# revoke events
clauses = [tag_clause]
if before is not None:
clauses.append('revoke_event < %(before)s')
query = QueryProcessor(tables=[table], columns=['max(revoke_event)'],
clauses=clauses, values=data)
events.append(query.singleValue())
logger.debug('%s revoke event %s', table, events[-1])
# also check external repo changes
repos = set()
for tag_id in tags:
for tag_repo in get_tag_external_repos(tag_info=tag_id, event=before):
repos.add(tag_repo['external_repo_id'])
if repos:
repos = list(repos)
repos.sort()
repo_clause = 'external_repo_id IN %(repos)s'
data['repos'] = repos
tables = (
'external_repo_config',
'external_repo_data',
)
for table in tables:
# create events
clauses = [repo_clause]
if before is not None:
clauses.append('create_event < %(before)s')
query = QueryProcessor(tables=[table], columns=['max(create_event)'],
clauses=clauses, values=data)
events.append(query.singleValue())
logger.debug('%s create event %s', table, events[-1])
# revoke events
clauses = [repo_clause]
if before is not None:
clauses.append('revoke_event < %(before)s')
query = QueryProcessor(tables=[table], columns=['max(revoke_event)'],
clauses=clauses, values=data)
events.append(query.singleValue())
logger.debug('%s revoke event %s', table, events[-1])
# return the most recent event
events = [ev for ev in events if ev is not None]
if not events:
# this could happen if our before value is before the tag existed
return None
elif tag_delete:
return min(tag_delete, max(events))
else:
return max(events)
def tag_first_change_event(tag, after=None, inherit=True):
"""Report the earliest event that changed the tag, or None if unchanged
:param tag: tag to consider
:type tag: int or str
:param after: only consider events after this value
:type after: int, optional
:param inherit: follow inheritance
:type inherit: bool
:returns: event id or None
:rtype: int or NoneType
"""
tag_id = get_tag_id(tag, strict=True)
after = convert_value(after, int, none_allowed=True)
query = QueryProcessor(tables=['tag_config'], columns=['min(create_event)'],
clauses=['tag_id = %(tag_id)s'], values={'tag_id': tag_id})
tag_create = query.singleValue()
if after is None:
return tag_create
# get tag list
tags = [tag_id]
if inherit:
tags += [link['parent_id'] for link in readFullInheritance(tag_id, event=after)]
data = {
'after': after,
'tags': tags,
}
# first check the tag_updates table
tag_clause = 'tag_id IN %(tags)s'
clauses = [tag_clause]
if after:
clauses.append('update_event > %(after)s')
query = QueryProcessor(tables=['tag_updates'], clauses=clauses,
columns=['min(update_event)'], values=data)
update_event = query.singleValue()
logger.debug('tag_update event %s', update_event)
events = [update_event]
# check for changes in versioned tables
tables = (
'tag_listing',
'tag_inheritance',
'tag_config',
'tag_packages',
'tag_external_repos',
'tag_extra',
'group_package_listing',
'group_req_listing',
'group_config',
)
for table in tables:
clauses = [tag_clause]
if after is not None:
clauses.append('create_event > %(after)s')
query = QueryProcessor(tables=[table], columns=['min(create_event)'],
clauses=clauses, values=data)
events.append(query.singleValue())
logger.debug('%s create event %s', table, events[-1])
clauses = [tag_clause]
if after is not None:
clauses.append('revoke_event > %(after)s')
query = QueryProcessor(tables=[table], columns=['min(revoke_event)'],
clauses=clauses, values=data)
events.append(query.singleValue())
logger.debug('%s revoke event %s', table, events[-1])
# also check external repo changes
repos = set()
for tag_id in tags:
for tag_repo in get_tag_external_repos(tag_info=tag_id, event=after):
repos.add(tag_repo['external_repo_id'])
if repos:
repos = list(repos)
repos.sort()
repo_clause = 'external_repo_id IN %(repos)s'
data['repos'] = repos
tables = (
'external_repo_config',
'external_repo_data',
)
for table in tables:
# create events
clauses = [repo_clause]
if after is not None:
clauses.append('create_event > %(after)s')
query = QueryProcessor(tables=[table], columns=['min(create_event)'],
clauses=clauses, values=data)
events.append(query.singleValue())
logger.debug('%s create event %s', table, events[-1])
# revoke events
clauses = [repo_clause]
if after is not None:
clauses.append('revoke_event > %(after)s')
query = QueryProcessor(tables=[table], columns=['min(revoke_event)'],
clauses=clauses, values=data)
events.append(query.singleValue())
logger.debug('%s revoke event %s', table, events[-1])
# return the most recent event
events = [ev for ev in events if ev is not None]
if not events:
# no subsequent changes found
return None
else:
return max(min(events), tag_create)
def set_tag_update(tag_id, utype, event_id=None, user_id=None):
"""Record a non-versioned tag update"""
utype_id = koji.TAG_UPDATE_TYPES.getnum(utype)
if utype_id is None:
raise koji.GenericError("No such update type: %s" % utype)
if event_id is None:
event_id = get_event()
if user_id is None:
context.session.assertLogin()
user_id = context.session.user_id
data = {'tag_id': tag_id, 'update_type': utype_id, 'update_event': event_id,
'updater_id': user_id}
insert = InsertProcessor('tag_updates', data=data)
insert.execute()
def create_build_target(name, build_tag, dest_tag):
"""Create a new build target"""
context.session.assertPerm('target')
return _create_build_target(name, build_tag, dest_tag)
def _create_build_target(name, build_tag, dest_tag):
"""Create a new build target(no access check)"""
verify_name_internal(name)
# Does a target with this name already exist?
if get_build_targets(info=name):
raise koji.GenericError("A build target with the name '%s' already exists" % name)
# Does the build tag exist?
build_tag_object = get_tag(build_tag)
if not build_tag_object:
raise koji.GenericError("build tag '%s' does not exist" % build_tag)
build_tag = build_tag_object['id']
# Does the dest tag exist?
dest_tag_object = get_tag(dest_tag)
if not dest_tag_object:
raise koji.GenericError("destination tag '%s' does not exist" % dest_tag)
dest_tag = dest_tag_object['id']
# build targets are versioned, so if the target has previously been deleted, it
# is possible the name is in the system
id = get_build_target_id(name, create=True)
insert = InsertProcessor('build_target_config')
insert.set(build_target_id=id, build_tag=build_tag, dest_tag=dest_tag)
insert.make_create()
insert.execute()
def edit_build_target(buildTargetInfo, name, build_tag, dest_tag):
"""Set the build_tag and dest_tag of an existing build_target to new values"""
context.session.assertPerm('target')
_edit_build_target(buildTargetInfo, name, build_tag, dest_tag)
def _edit_build_target(buildTargetInfo, name, build_tag, dest_tag):
"""Edit build target parameters, w/ no access checks"""
verify_name_internal(name)
target = lookup_build_target(buildTargetInfo)
if not target:
raise koji.GenericError('No such build target: %s' % buildTargetInfo)
buildTargetID = target['id']
build_tag_object = get_tag(build_tag)
if not build_tag_object:
raise koji.GenericError("build tag '%s' does not exist" % build_tag)
buildTagID = build_tag_object['id']
dest_tag_object = get_tag(dest_tag)
if not dest_tag_object:
raise koji.GenericError("destination tag '%s' does not exist" % dest_tag)
destTagID = dest_tag_object['id']
values = {'buildTargetID': buildTargetID}
if target['name'] != name:
# Allow renaming, for parity with tags
query = QueryProcessor(tables=['build_target'], columns=['id'],
clauses=['name = %(name)s'], values={'name': name})
id = query.singleValue(strict=False)
if id is not None:
raise koji.GenericError('name "%s" is already taken by build target %i' % (name, id))
update = UpdateProcessor('build_target', clauses=['id = %(buildTargetID)i'],
values=values, data={'name': name})
update.execute()
update = UpdateProcessor('build_target_config', values=values,
clauses=["build_target_id = %(buildTargetID)i"])
update.make_revoke()
insert = InsertProcessor('build_target_config')
insert.set(build_target_id=buildTargetID, build_tag=buildTagID, dest_tag=destTagID)
insert.make_create()
update.execute()
insert.execute()
def delete_build_target(buildTargetInfo):
"""Delete the build target with the given name. If no build target
exists, raise a GenericError."""
context.session.assertPerm('target')
_delete_build_target(buildTargetInfo)
def _delete_build_target(buildTargetInfo):
"""Delete build target, no access checks"""
target = lookup_build_target(buildTargetInfo)
if not target:
raise koji.GenericError('No such build target: %s' % buildTargetInfo)
targetID = target['id']
# build targets are versioned, so we do not delete them from the db
# instead we revoke the config entry
update = UpdateProcessor('build_target_config', values=locals(),
clauses=["build_target_id = %(targetID)i"])
update.make_revoke()
update.execute()
def get_build_targets(info=None, event=None, buildTagID=None, destTagID=None, queryOpts=None):
"""Return data on all the build targets
:param int, str, dist info: build target name, ID or dict
:param int event: provide event to query at a different time
:param int, str, dict buildTagID: build tag name, ID or dict
:param int, str, dict destTagID: destination tag name, ID or dict
:param dict queryOpts: additional options for this query.
"""
fields = (
('build_target.id', 'id'),
('build_tag', 'build_tag'),
('dest_tag', 'dest_tag'),
('build_target.name', 'name'),
('tag1.name', 'build_tag_name'),
('tag2.name', 'dest_tag_name'),
)
joins = ['build_target ON build_target_config.build_target_id = build_target.id',
'tag AS tag1 ON build_target_config.build_tag = tag1.id',
'tag AS tag2 ON build_target_config.dest_tag = tag2.id']
clauses = [eventCondition(event)]
values = {}
if info:
clause, c_values = name_or_id_clause('build_target', info)
clauses.append(clause)
values.update(c_values)
if buildTagID is not None:
if isinstance(buildTagID, (str, dict)):
buildTagID = get_tag_id(buildTagID)
clauses.append('build_tag = %(buildTagID)i')
values['buildTagID'] = buildTagID
if destTagID is not None:
if isinstance(destTagID, str) or isinstance(destTagID, dict):
destTagID = get_tag_id(destTagID)
clauses.append('dest_tag = %(destTagID)i')
values['destTagID'] = destTagID
query = QueryProcessor(columns=[f[0] for f in fields], aliases=[f[1] for f in fields],
tables=['build_target_config'], joins=joins, clauses=clauses,
values=values, opts=queryOpts)
return query.execute()
def get_build_target(info, event=None, strict=False):
"""Return the build target with the given name or ID.
If there is no matching build target, return None."""
targets = get_build_targets(info=info, event=event)
if len(targets) == 1:
return targets[0]
elif strict:
raise koji.GenericError('No such build target: %s' % info)
else:
return None
def name_or_id_clause(table, info):
"""Return query clause and values for lookup by name or id
:param str table: table name
:param info: the name or id to look up
:type info: int or str or dict
:returns: a pair (clause, values)
If info is an int, we are looking up by id
If info is a string, we are looking up by name
If info is a dict, we look for 'id' or 'name' fields to decide
"""
if isinstance(info, dict):
if 'id' in info:
info = convert_value(info['id'], cast=int,
message=fr"Invalid name or id value: {info}")
elif 'name' in info:
info = info['name']
else:
raise koji.ParameterError(fr'Invalid name or id value: {info}')
if isinstance(info, int):
clause = f"({table}.id = %({table}_id)s)"
values = {f"{table}_id": info}
elif isinstance(info, str):
clause = f"({table}.name = %({table}_name)s)"
values = {f"{table}_name": info}
else:
raise koji.ParameterError(fr"Invalid name or id value: {info}")
return clause, values
def lookup_name(table, info, strict=False, create=False):
"""Find the id and name in the table associated with info.
Info can be the name to look up, or if create is false it can
be the id.
Return value is a dict with keys id and name, or None
If there is no match, then the behavior depends on the options. If strict,
then an error is raised. If create, then the required entry is created and
returned.
table should be the name of a table with (unique) fields
id INTEGER
name TEXT
Any other fields should have default values, otherwise the
create option will fail.
"""
clause, values = name_or_id_clause(table, info)
query = QueryProcessor(columns=['id', 'name'], tables=[table],
clauses=[clause], values=values)
ret = query.executeOne()
if ret is not None:
return ret
elif strict:
raise koji.GenericError('No such entry in table %s: %s' % (table, info))
elif create:
if not isinstance(info, str):
raise koji.GenericError('Name must be a string')
new_id = nextval(f'{table}_id_seq')
insert = InsertProcessor(table)
insert.set(id=new_id, name=info)
insert.execute()
return {'id': new_id, 'name': info}
else:
# no match and not strict
return None
def get_id(table, info, strict=False, create=False):
"""Find the id in the table associated with info."""
data = lookup_name(table, info, strict, create)
if data is None:
return data
else:
return data['id']
def get_tag_id(info, strict=False, create=False):
"""Get the id for tag"""
return get_id('tag', info, strict, create)
def lookup_tag(info, strict=False, create=False):
"""Get the id,name for tag"""
return lookup_name('tag', info, strict, create)
def get_perm_id(info, strict=False, create=False):
"""Get the id for a permission"""
return get_id('permissions', info, strict, create)
def lookup_perm(info, strict=False, create=False):
"""Get the id,name for perm"""
return lookup_name('permissions', info, strict, create)
def get_package_id(info, strict=False, create=False):
"""Get the id for a package"""
return get_id('package', info, strict, create)
def lookup_package(info, strict=False, create=False):
"""Get the id,name for package"""
return lookup_name('package', info, strict, create)
def get_channel_id(info, strict=False, create=False):
"""Get the id for a channel"""
return get_id('channels', info, strict, create)
def lookup_channel(info, strict=False, create=False):
"""Get the id,name for channel"""
return lookup_name('channels', info, strict, create)
def get_group_id(info, strict=False, create=False):
"""Get the id for a group"""
return get_id('groups', info, strict, create)
def lookup_group(info, strict=False, create=False):
"""Get the id,name for group"""
return lookup_name('groups', info, strict, create)
def get_build_target_id(info, strict=False, create=False):
"""Get the id for a build target"""
return get_id('build_target', info, strict, create)
def lookup_build_target(info, strict=False, create=False):
"""Get the id,name for build target"""
return lookup_name('build_target', info, strict, create)
def create_tag(name, parent=None, arches=None, perm=None, locked=False, maven_support=False,
maven_include_all=False, extra=None):
"""Create a new tag"""
context.session.assertPerm('tag')
return _create_tag(name, parent, arches, perm, locked, maven_support, maven_include_all, extra)
def _create_tag(name, parent=None, arches=None, perm=None, locked=False, maven_support=False,
maven_include_all=False, extra=None):
"""Create a new tag, without access check"""
verify_name_internal(name)
arches = koji.parse_arches(arches, strict=True, allow_none=True)
if not context.opts.get('EnableMaven') and (maven_support or maven_include_all):
raise koji.GenericError("Maven support not enabled")
# see if there is already a tag by this name (active)
if get_tag(name):
raise koji.GenericError("A tag with the name '%s' already exists" % name)
# Does the parent exist?
if parent:
parent_tag = get_tag(parent)
if not parent_tag:
raise koji.GenericError("Parent tag '%s' could not be found" % parent)
parent_id = parent_tag['id']
else:
parent_id = None
if perm is not None:
perm = get_perm_id(perm, strict=True)
# there may already be an id for a deleted tag, this will reuse it
tag_id = get_tag_id(name, create=True)
insert = InsertProcessor('tag_config')
insert.set(tag_id=tag_id, arches=arches, perm_id=perm, locked=locked)
insert.set(maven_support=maven_support, maven_include_all=maven_include_all)
insert.make_create()
insert.execute()
# add extra data
if extra is not None:
for key, value in extra.items():
data = {
'tag_id': tag_id,
'key': key,
'value': json.dumps(value),
}
insert = InsertProcessor('tag_extra', data=data)
insert.make_create()
insert.execute()
if parent_id:
data = {'parent_id': parent_id,
'priority': 0,
'maxdepth': None,
'intransitive': False,
'noconfig': False,
'pkg_filter': ''}
_writeInheritanceData(tag_id, data)
return tag_id
def get_tag(tagInfo, strict=False, event=None, blocked=False):
"""Get tag information based on the tagInfo. tagInfo may be either
a string (the tag name) or an int (the tag ID).
Returns a map containing the following keys:
- id : unique id for the tag
- name : name of the tag
- perm_id : permission id (may be null)
- perm : permission name (may be null)
- arches : tag arches (string, may be null)
- locked : lock setting (boolean)
- maven_support : maven support flag (boolean)
- maven_include_all : maven include all flag (boolean)
- extra : extra tag parameters (dictionary)
- query_event : return "event" parameter for current call
if something was passed in
If there is no tag matching the given tagInfo, and strict is False,
return None. If strict is True, raise a GenericError.
Note that in order for a tag to 'exist', it must have an active entry
in tag_config. A tag whose name appears in the tag table but has no
active tag_config entry is considered deleted.
event option can be either event_id or "auto" which will pick last
recorded create_event (option for getting deleted tags)
"""
tables = ['tag_config']
joins = ['tag ON tag.id = tag_config.tag_id',
'LEFT OUTER JOIN permissions ON tag_config.perm_id = permissions.id']
fields = [
('tag.id', 'id'),
('tag.name', 'name'),
('tag_config.perm_id', 'perm_id'),
('permissions.name', 'perm'),
('tag_config.arches', 'arches'),
('tag_config.locked', 'locked'),
('tag_config.maven_support', 'maven_support'),
('tag_config.maven_include_all', 'maven_include_all')
]
clause, values = name_or_id_clause('tag', tagInfo)
clauses = [clause]
if event == "auto":
# find active event or latest create_event
opts = {'order': '-create_event', 'limit': 1}
query = QueryProcessor(tables=['tag_config'], columns=['create_event', 'revoke_event'],
joins=['tag on tag.id = tag_config.tag_id'],
clauses=clauses, values=values, opts=opts)
try:
event = query.executeOne(strict=True)['revoke_event']
except koji.GenericError:
event = None
if event is not None:
# query point instantly before the revoke_event
# (to get latest tag_config before deletion)
event -= 1
fields.append(('tag_config.revoke_event', 'revoke_event'))
else:
# if tag is not deleted, query event=None
pass
clauses.append(eventCondition(event, table='tag_config'))
fields, aliases = zip(*fields)
query = QueryProcessor(columns=fields, aliases=aliases, tables=tables,
joins=joins, clauses=clauses, values=values)
result = query.executeOne()
if not result:
if strict:
raise koji.GenericError("No such tagInfo: %r" % tagInfo)
return None
result['extra'] = get_tag_extra(result, event, blocked=blocked)
if event is not None:
result['query_event'] = event
return result
def get_tag_extra(tagInfo, event=None, blocked=False):
""" Get tag extra info (no inheritance) """
fields = ['key', 'value', 'CASE WHEN value IS NULL THEN TRUE ELSE FALSE END']
aliases = ['key', 'value', 'blocked']
clauses = [eventCondition(event, table='tag_extra'), "tag_id = %(id)i"]
if not blocked:
clauses.append("value IS NOT NULL")
query = QueryProcessor(tables=['tag_extra'], columns=fields, clauses=clauses, values=tagInfo,
aliases=aliases)
result = {}
for h in query.execute():
if h['value'] is not None:
h['value'] = parse_json(h['value'], errstr="No such tag extra data: %s" % h['key'])
if blocked:
result[h['key']] = (h['blocked'], h['value'])
else:
result[h['key']] = h['value']
return result
def edit_tag(tagInfo, **kwargs):
"""Edit information for an existing tag.
The tagInfo argument is the only required argument. After the tagInfo
argument, specify any tag changes with additional keyword arguments.
:param tagInfo: koji tag ID or name to edit (required).
:type tagInfo: int or str
:param str name: rename the tag.
:param str arches: a space-separated list of arches for this tag.
:param bool locked: whether this tag is locked or not.
:param perm: the permission ID or name for this tag.
:type perm: int, str, or None
:param bool maven_support: whether Maven repos should be generated for the
tag.
:param bool maven_include_all: include every build in this tag (including
multiple versions of the same package) in
the Maven repo.
:param dict extra: add or update extra tag parameters.
:param list remove_extra: remove extra tag parameters.
:param list block_extra: block inherited extra tag parameters.
"""
context.session.assertPerm('tag')
_edit_tag(tagInfo, **kwargs)
def _edit_tag(tagInfo, **kwargs):
"""Edit information for an existing tag."""
if not context.opts.get('EnableMaven') \
and dslice(kwargs, ['maven_support', 'maven_include_all'], strict=False):
raise koji.GenericError("Maven support not enabled")
if kwargs.get('remove_extra'):
convert_value(kwargs['remove_extra'], cast=list, none_allowed=True, check_only=True)
if kwargs.get('block_extra'):
convert_value(kwargs['block_extra'], cast=list, none_allowed=True, check_only=True)
tag = get_tag(tagInfo, strict=True)
if 'perm' in kwargs and 'perm_id' not in kwargs:
# for compatibility, perm and perm_id are aliases
# if both are given, perm_id takes precedence
kwargs['perm_id'] = kwargs['perm']
if 'perm_id' in kwargs:
if kwargs['perm_id'] is not None:
kwargs['perm_id'] = get_perm_id(kwargs['perm_id'], strict=True)
name = kwargs.get('name')
if name and tag['name'] != name:
verify_name_internal(name)
# attempt to update tag name
# XXX - I'm not sure we should allow this sort of renaming anyway.
# while I can see the convenience, it is an untracked change (granted
# a cosmetic one). The more versioning-friendly way would be to create
# a new tag with duplicate data and revoke the old tag. This is more
# of a pain of course :-/ -mikem
query = QueryProcessor(tables=['tag'], columns=['id'],
clauses=['name = %(name)s'], values={'name': name})
id = query.singleValue(strict=False)
if id is not None:
# new name is taken
raise koji.GenericError("Name %s already taken by tag %s" % (name, id))
update = UpdateProcessor('tag', values={'tagID': tag['id']}, clauses=['id = %(tagID)i'],
data={'name': name})
update.execute()
# sanitize architecture names (space-separated string)
arches = kwargs.get('arches')
if arches and tag['arches'] != arches:
kwargs['arches'] = koji.parse_arches(arches, strict=True, allow_none=True)
# check for changes
data = tag.copy()
changed = False
for key in ('perm_id', 'arches', 'locked', 'maven_support', 'maven_include_all'):
if key in kwargs and data[key] != kwargs[key]:
changed = True
data[key] = kwargs[key]
if changed:
update = UpdateProcessor('tag_config', values=data, clauses=['tag_id = %(id)i'])
update.make_revoke()
update.execute()
insert = InsertProcessor('tag_config', data=dslice(data, ('arches', 'perm_id', 'locked')))
insert.set(tag_id=data['id'])
insert.set(**dslice(data, ('maven_support', 'maven_include_all')))
insert.make_create()
insert.execute()
# handle extra data
if 'extra' in kwargs:
removed = set(kwargs.get('block_extra', [])) | set(kwargs.get('remove_extra', []))
# check whether one key is both in extra and remove_extra
conflicts = removed.intersection(set(kwargs['extra']))
if conflicts:
raise koji.GenericError("Can not both add/update and remove tag-extra: '%s'" %
conflicts.pop())
for key in kwargs['extra']:
value = kwargs['extra'][key]
if key not in tag['extra'] or tag['extra'][key] != value:
if value is None:
value = 'null'
else:
value = json.dumps(value)
data = {
'tag_id': tag['id'],
'key': key,
'value': value,
}
# revoke old entry, if any
update = UpdateProcessor('tag_extra', values=data, clauses=['tag_id = %(tag_id)i',
'key=%(key)s'])
update.make_revoke()
update.execute()
# add new entry
insert = InsertProcessor('tag_extra', data=data)
insert.make_create()
insert.execute()
if 'block_extra' in kwargs:
for key in kwargs['block_extra']:
data = {
'tag_id': tag['id'],
'key': key,
'value': None,
}
# revoke old entry, if any
update = UpdateProcessor('tag_extra', values=data, clauses=['tag_id = %(tag_id)i',
'key=%(key)s'])
update.make_revoke()
update.execute()
# add new entry
insert = InsertProcessor('tag_extra', data=data)
insert.make_create()
insert.execute()
# handle remove_extra data
if 'remove_extra' in kwargs:
ne = [e for e in kwargs['remove_extra'] if e not in tag['extra']]
if ne:
raise koji.GenericError("Tag: %s doesn't have extra: %s" %
(tag['name'], ', '.join(ne)))
for key in kwargs['remove_extra']:
data = {
'tag_id': tag['id'],
'key': key,
}
# revoke old entry
update = UpdateProcessor('tag_extra', values=data, clauses=['tag_id = %(tag_id)i',
'key=%(key)s'])
update.make_revoke()
update.execute()
def old_edit_tag(tagInfo, name, arches, locked, permissionID, extra=None):
"""Edit information for an existing tag."""
return edit_tag(tagInfo, name=name, arches=arches, locked=locked,
perm_id=permissionID, extra=extra)
def delete_tag(tagInfo):
"""Delete the specified tag."""
context.session.assertPerm('tag')
_delete_tag(tagInfo)
def _delete_tag(tagInfo):
"""Delete the specified tag."""
# We do not ever DELETE tag data. It is versioned -- we revoke it instead.
def _tagDelete(tableName, value, columnName='tag_id'):
update = UpdateProcessor(tableName, clauses=["%s = %%(value)i" % columnName],
values={'value': value})
update.make_revoke()
update.execute()
tag = get_tag(tagInfo, strict=True)
tagID = tag['id']
_tagDelete('tag_config', tagID)
# technically, to 'delete' the tag we only have to revoke the tag_config entry
# these remaining revocations are more for cleanup.
_tagDelete('tag_extra', tagID)
_tagDelete('tag_inheritance', tagID)
_tagDelete('tag_inheritance', tagID, 'parent_id')
_tagDelete('build_target_config', tagID, 'build_tag')
_tagDelete('build_target_config', tagID, 'dest_tag')
_tagDelete('tag_listing', tagID)
_tagDelete('tag_packages', tagID)
_tagDelete('tag_package_owners', tagID)
_tagDelete('tag_external_repos', tagID)
_tagDelete('group_config', tagID)
_tagDelete('group_req_listing', tagID)
_tagDelete('group_package_listing', tagID)
# note: we do not delete the entry in the tag table (we can't actually, it
# is still referenced by the revoked rows).
# note: there is no need to do anything with the repo entries that reference tagID
def get_external_repo_id(info, strict=False, create=False):
"""Get the id for a build target"""
return get_id('external_repo', info, strict, create)
def create_external_repo(name, url):
"""Create a new external repo with the given name and url.
Return a map containing the id, name, and url
of the new repo."""
context.session.assertPerm('admin')
verify_name_internal(name)
if get_external_repos(info=name):
raise koji.GenericError('An external repo named "%s" already exists' % name)
id = get_external_repo_id(name, create=True)
if not url.endswith('/'):
# Ensure the url always ends with /
url += '/'
values = {'id': id, 'name': name, 'url': url}
insert = InsertProcessor('external_repo_config')
insert.set(external_repo_id=id, url=url)
insert.make_create()
insert.execute()
return values
def get_external_repos(info=None, url=None, event=None, queryOpts=None):
"""Get a list of external repos. If info is not None it may be a
string (name) or an integer (id).
If url is not None, filter the list of repos to those matching the
given url."""
fields = ['id', 'name', 'url']
tables = ['external_repo']
joins = ['external_repo_config ON external_repo_id = id']
clauses = [eventCondition(event)]
values = {}
if info is not None:
clause, c_values = name_or_id_clause('external_repo', info)
clauses.append(clause)
values.update(c_values)
if url:
clauses.append('url = %(url)s')
values['url'] = url
query = QueryProcessor(columns=fields, tables=tables,
joins=joins, clauses=clauses,
values=values, opts=queryOpts)
return query.execute()
def get_external_repo(info, strict=False, event=None):
"""
Get information about a single external repository.
:param info: a string (name) or an integer (id).
:param bool strict: If True, raise an error if we found no matching
repository. If False, simply return None if we found
no matching repository. If unspecified, the default
value is False.
:param int event: The event ID at which to search. If unspecified, the
default behavior is to search for the "active" repo
settings.
:returns: a map containing the id, name, and url of the repository.
"""
repos = get_external_repos(info, event=event)
if len(repos) == 1:
return repos[0]
elif len(repos) > 1:
# a very defective situation which should never occur
# (name/id should be exact identification)
raise koji.GenericError('More than one repo in the result.')
else:
if strict:
raise koji.GenericError('No such repo: %s' % info)
else:
return None
def edit_external_repo(info, name=None, url=None):
"""Edit an existing external repo"""
context.session.assertPerm('admin')
repo = get_external_repo(info, strict=True)
repo_id = repo['id']
if name and name != repo['name']:
verify_name_internal(name)
query = QueryProcessor(tables=['external_repo'], columns=['id'],
clauses=['name = %(name)s'], values={'name': name})
existing_id = query.singleValue(strict=False)
if existing_id is not None:
raise koji.GenericError('name "%s" is already taken by external repo %i' %
(name, existing_id))
update = UpdateProcessor('external_repo', clauses=['id = %(repo_id)i'],
values={'repo_id': repo_id}, data={'name': name})
update.execute()
if url and url != repo['url']:
if not url.endswith('/'):
# Ensure the url always ends with /
url += '/'
update = UpdateProcessor('external_repo_config', values=locals(),
clauses=['external_repo_id = %(repo_id)i'])
update.make_revoke()
insert = InsertProcessor('external_repo_config')
insert.set(external_repo_id=repo_id, url=url)
insert.make_create()
update.execute()
insert.execute()
def delete_external_repo(info):
"""
Remove an external repository for any tags and delete it.
:param info: external repository name or ID number
:raises: GenericError if the repository does not exist.
"""
context.session.assertPerm('admin')
repo = get_external_repo(info, strict=True)
repo_id = repo['id']
for tag_repo in get_tag_external_repos(repo_info=repo['id']):
remove_external_repo_from_tag(tag_info=tag_repo['tag_id'],
repo_info=repo_id)
update = UpdateProcessor('external_repo_config', values=locals(),
clauses=['external_repo_id = %(repo_id)i'])
update.make_revoke()
update.execute()
def add_external_repo_to_tag(tag_info, repo_info, priority, merge_mode='koji', arches=None):
"""Add an external repo to a tag"""
context.session.assertPerm('tag')
# sanity check for None value, which may happen if DB schema isn't updated to 1.21+
if merge_mode is None:
merge_mode = 'koji'
if merge_mode not in koji.REPO_MERGE_MODES:
raise koji.GenericError('No such merge mode: %s' % merge_mode)
tag = get_tag(tag_info, strict=True)
tag_id = tag['id']
repo = get_external_repo(repo_info, strict=True)
repo_id = repo['id']
if arches is not None:
arches = koji.parse_arches(arches, strict=False)
priority = convert_value(priority, cast=int)
tag_repos = get_tag_external_repos(tag_info=tag_id)
if [tr for tr in tag_repos if tr['external_repo_id'] == repo_id]:
raise koji.GenericError('tag %s already associated with external repo %s' %
(tag['name'], repo['name']))
if [tr for tr in tag_repos if tr['priority'] == priority]:
raise koji.GenericError('tag %s already associated with an external repo at priority %i' %
(tag['name'], priority))
insert = InsertProcessor('tag_external_repos')
insert.set(tag_id=tag_id, external_repo_id=repo_id, priority=priority,
merge_mode=merge_mode, arches=arches)
insert.make_create()
insert.execute()
def remove_external_repo_from_tag(tag_info, repo_info):
"""Remove an external repo from a tag"""
context.session.assertPerm('tag')
tag = get_tag(tag_info, strict=True)
tag_id = tag['id']
repo = get_external_repo(repo_info, strict=True)
repo_id = repo['id']
if not get_tag_external_repos(tag_info=tag_id, repo_info=repo_id):
raise koji.GenericError('external repo %s not associated with tag %s' %
(repo['name'], tag['name']))
update = UpdateProcessor('tag_external_repos', values=locals(),
clauses=["tag_id = %(tag_id)i", "external_repo_id = %(repo_id)i"])
update.make_revoke()
update.execute()
def edit_tag_external_repo(tag_info, repo_info, priority=None, merge_mode=None, arches=None):
"""Edit a tag<->external repo association
This allows you to update the priority and merge_mode without removing/adding the repo.
Note that None value of priority and merge_mode means no change on it
"""
context.session.assertPerm('tag')
tag = get_tag(tag_info, strict=True)
tag_id = tag['id']
repo = get_external_repo(repo_info, strict=True)
repo_id = repo['id']
tag_repos = get_tag_external_repos(tag_info=tag_id, repo_info=repo_id)
if not tag_repos:
raise koji.GenericError('external repo %s not associated with tag %s' %
(repo['name'], tag['name']))
tag_repo = tag_repos[0]
if arches is not None:
arches = koji.parse_arches(arches, strict=True)
data = {}
for k in ('priority', 'merge_mode', 'arches'):
val = locals().get(k)
# None value means no change
if val is not None and val != tag_repo[k]:
data[k] = val
if not data:
return False
else:
for k in ('priority', 'merge_mode', 'arches'):
data.setdefault(k, tag_repo[k])
remove_external_repo_from_tag(tag_id, repo_id)
add_external_repo_to_tag(tag_id, repo_id, **data)
return True
def get_tag_external_repos(tag_info=None, repo_info=None, event=None):
"""
Get a list of tag<->external repo associations.
The list of associations is ordered by the priority field.
Each map containing the following fields:
tag_id
tag_name
external_repo_id
external_repo_name
url
merge_mode
priority
:param tag_info: Tag name or ID number. This field is optional. If you
specify a value here, Koji will only return
repo association information for this single tag.
:param repo_info: External repository name or ID number. This field is
optional. If you specify a value here, Koji will only
return tag association information for this single
repository.
:param int event: The event ID at which to search. If unspecified, the
default behavior is to search for the "active" tag and
repo settings.
"""
tables = ['tag_external_repos']
joins = ['tag ON tag_external_repos.tag_id = tag.id',
'external_repo ON tag_external_repos.external_repo_id = external_repo.id',
'external_repo_config ON external_repo.id = external_repo_config.external_repo_id']
fields = [
('external_repo.id', 'external_repo_id'),
('external_repo.name', 'external_repo_name'),
('priority', 'priority'),
('tag.id', 'tag_id'),
('tag.name', 'tag_name'),
('url', 'url'),
('merge_mode', 'merge_mode'),
('arches', 'arches'),
]
columns, aliases = zip(*fields)
clauses = [eventCondition(event, table='tag_external_repos'),
eventCondition(event, table='external_repo_config')]
if tag_info:
tag_id = get_tag_id(tag_info, strict=True)
clauses.append('tag.id = %(tag_id)i')
if repo_info:
repo = get_external_repo(repo_info, strict=True, event=event)
repo_id = repo['id']
clauses.append('external_repo.id = %(repo_id)i')
opts = {'order': 'priority'}
query = QueryProcessor(tables=tables, joins=joins,
columns=columns, aliases=aliases,
clauses=clauses, values=locals(),
opts=opts)
return query.execute()
def get_external_repo_list(tag_info, event=None):
"""
Get an ordered list of all external repos associated with the tags in the
hierarchy rooted at the specified tag. External repos will be returned
depth-first, and ordered by priority for each tag. Duplicates will be
removed. Returns a list of maps containing the following fields:
tag_id
tag_name
external_repo_id
external_repo_name
url
merge_mode
priority
"""
tag = get_tag(tag_info, strict=True, event=event)
tag_list = [tag['id']]
for parent in readFullInheritance(tag['id'], event):
tag_list.append(parent['parent_id'])
seen_repos = {}
repos = []
for tag_id in tag_list:
for tag_repo in get_tag_external_repos(tag_info=tag_id, event=event):
if tag_repo['external_repo_id'] not in seen_repos:
repos.append(tag_repo)
seen_repos[tag_repo['external_repo_id']] = 1
return repos
def get_user(userInfo=None, strict=False, krb_princs=True, groups=False):
"""Return information about a user.
:param userInfo: a str (Kerberos principal or name) or an int (user id)
or a dict:
- id: User's ID
- name: User's name
- krb_principal: Kerberos principal
:param bool strict: whether raising Error when no user found
:param bool krb_princs: whether show krb_principals in result
:return: a dict as user's information:
id: user id
name: user name
status: user status (int), may be null
usertype: user type (int), 0 person, 1 for host, may be null
krb_principals: the user's Kerberos principals (list)
"""
krb5_join = False
clauses = []
if userInfo is None:
userInfo = context.session.user_id
if userInfo is None:
# not logged in
raise koji.GenericError("No user provided")
fields = ['id', 'name', 'status', 'usertype']
if isinstance(userInfo, dict):
data = userInfo
elif isinstance(userInfo, int):
data = {'id': userInfo}
elif isinstance(userInfo, str):
data = {'info': userInfo}
clauses.append('krb_principal = %(info)s OR name = %(info)s')
krb5_join = True
else:
raise koji.GenericError('Invalid type for userInfo: %s' % type(userInfo))
if isinstance(data, dict) and not data.get('info'):
uid = data.get('id')
if uid is not None:
if isinstance(uid, int):
clauses.append('users.id = %(id)i')
else:
raise koji.GenericError('Invalid type for userid: %s' % type(uid))
username = data.get('name')
if username:
if isinstance(username, str):
clauses.append('users.name = %(name)s')
else:
raise koji.GenericError('Invalid type for username: %s' % type(username))
krb_principal = data.get('krb_principal')
if krb_principal:
if isinstance(krb_principal, str):
clauses.append('user_krb_principals.krb_principal'
' = %(krb_principal)s')
krb5_join = True
else:
raise koji.GenericError('Invalid type for krb_principal: %s' % type(krb_principal))
joins = []
if krb5_join:
joins.append('LEFT JOIN user_krb_principals ON users.id = user_krb_principals.user_id')
query = QueryProcessor(tables=['users'], columns=fields, joins=joins,
clauses=clauses, values=data)
user = query.executeOne()
if not user and strict:
raise koji.GenericError("No such user: %r" % userInfo)
if user:
if krb_princs:
user['krb_principals'] = list_user_krb_principals(user['id'])
if groups:
user['groups'] = [x for x in get_user_groups(user['id']).values()]
return user
def edit_user(userInfo, name=None, krb_principal_mappings=None):
"""Edit information for an existing user.
Use this method to rename a user, or to add/remove/modify Kerberos
principal(s) for this account.
Example krb_principal_mappings values:
To add a new Kerberos principal to a user account:
[{'old': None, 'new': 'myuser@NEW.EXAMPLE.COM'}]
To remove an old Kerberos principal from a user account:
[{'old': 'myuser@OLD.EXAMPLE.COM', 'new': None}]
To modify a user's old Kerberos principal to a new one:
[{'old': 'myuser@OLD.EXAMPLE.NET', 'new': 'myuser@NEW.EXAMPLE.NET'}]
:param userInfo: username (str) or ID (int)
:param str name: new name for this user account
:param list krb_principal_mappings: List of changes to make for this
user's Kerberos principal. Each change
is a dict of "old" and "new"
Kerberos principals.
:raises: GenericError if the user does not exist, or if there were
problems in the krb_principal_mappings.
"""
context.session.assertPerm('admin')
_edit_user(userInfo, name=name,
krb_principal_mappings=krb_principal_mappings)
def _edit_user(userInfo, name=None, krb_principal_mappings=None):
"""Edit information for an existing user."""
user = get_user(userInfo, strict=True)
if name and user['name'] != name:
verify_name_user(name=name)
# attempt to update user name
values = {
'name': name,
'userID': user['id']
}
query = QueryProcessor(tables=['users'], columns=['id'],
clauses=['name = %(name)s'], values=values)
id = query.singleValue(strict=False)
if id is not None:
# new name is taken
raise koji.GenericError("Name %s already taken by user %s" % (name, id))
update = UpdateProcessor('users', values=values, clauses=['id = %(userID)i'],
data={'name': name})
update.execute()
if krb_principal_mappings:
added = set()
removed = set()
for pairs in krb_principal_mappings:
old = pairs.get('old')
new = pairs.get('new')
if old:
removed.add(old)
if new:
verify_name_user(krb=new)
added.add(new)
dups = added & removed
if dups:
raise koji.GenericError("There are some conflicts between added"
" and removed Kerberos principals: %s"
% ', '.join(dups))
currents = set(user.get('krb_principals'))
dups = added & currents
if dups:
raise koji.GenericError("Cannot add existing Kerberos"
" principals: %s" % ', '.join(dups))
unable_removed = removed - currents
if unable_removed:
raise koji.GenericError("Cannot remove non-existent Kerberos"
" principals: %s"
% ', '.join(unable_removed))
# attempt to update kerberos principal
for r in removed:
context.session.removeKrbPrincipal(user['id'], krb_principal=r)
for a in added:
context.session.setKrbPrincipal(user['id'], krb_principal=a)
def list_user_krb_principals(user_info=None):
"""Return kerberos principal list of a user.
:param user_info: either a str (username) or an int (user id)
:return: user's kerberos principals (list)
"""
if user_info is None:
user_info = context.session.user_id
if user_info is None:
# not logged in
raise koji.GenericError("No user provided")
fields = ['krb_principal']
data = {'info': user_info}
if isinstance(user_info, int):
joins = []
clauses = ['user_id = %(info)i']
elif isinstance(user_info, str):
joins = ['users ON users.id = user_krb_principals.user_id']
clauses = ['name = %(info)s']
else:
raise koji.GenericError('Invalid type for user_info: %s' % type(user_info))
query = QueryProcessor(tables=['user_krb_principals'],
columns=fields, joins=joins,
clauses=clauses, values=data,
transform=lambda row: row['krb_principal'])
return query.execute() or []
def get_user_by_krb_principal(krb_principal, strict=False, krb_princs=True):
"""get information about a user by kerberos principal.
:param str krb_principal: full user kerberos principals
:param bool strict: whether raising Error when no user found
:param bool krb_princs: whether show krb_principals in result
:return: a dict as user's information:
id: user id
name: user name
status: user status (int), may be null
usertype: user type (int), 0 person, 1 for host, may be null
krb_principals: the user's Kerberos principals (list)
"""
if krb_principal is None:
raise koji.GenericError("No kerberos principal provided")
if not isinstance(krb_principal, str):
raise koji.GenericError("Invalid type for krb_principal: %s" % type(krb_principal))
return get_user({'krb_principal': krb_principal}, strict=strict,
krb_princs=krb_princs)
def find_build_id(X, strict=False):
"""gets build ID for various inputs
:param int|str|dict X: build ID | NVR | dict with name, version and release values
:returns int: build ID
"""
if isinstance(X, int):
return X
elif isinstance(X, str):
data = koji.parse_NVR(X)
elif isinstance(X, dict):
data = X
else:
raise koji.GenericError("Invalid type for argument: %r" % type(X))
if not ('name' in data and 'version' in data and 'release' in data):
raise koji.GenericError('did not provide name, version, and release')
query = QueryProcessor(tables=['build'], columns=['build.id'],
clauses=['package.name=%(name)s',
'build.version=%(version)s',
'build.release=%(release)s'],
joins=['package ON build.pkg_id=package.id'],
values=data)
r = query.singleValue(strict=False)
# log_error("%r" % r )
if not r:
if strict:
raise koji.GenericError('No such build: %r' % X)
else:
return None
return r
def get_build(buildInfo, strict=False):
"""Return information about a build.
buildInfo may be either a int ID, a string NVR, or a map containing
'name', 'version' and 'release'.
A map will be returned containing the following keys*:
id: build ID
package_id: ID of the package built
package_name: name of the package built
name: same as package_name
version
release
epoch
nvr
draft: Whether the build is draft or not
state
task_id: ID of the task that kicked off the build
owner_id: ID of the user who kicked off the build
owner_name: name of the user who kicked off the build
volume_id: ID of the storage volume
volume_name: name of the storage volume
creation_event_id: id of the create_event
creation_time: time the build was created (text)
creation_ts: time the build was created (epoch)
start_time: time the build was started (may be null)
start_ts: time the build was started (epoch, may be null)
completion_time: time the build was completed (may be null)
completion_ts: time the build was completed (epoch, may be null)
source: the SCM URL of the sources used in the build -
dereferenced git hash is stored here
extra: dictionary with extra data about the build
- source:
- original_url: while build.source contains concrete
SCM hash, this field can contain SCM url which was
used when launching build (e.g. git_url#master)
cg_id: ID of CG which reserved or imported this build
cg_name: name of CG which reserved or imported this build
If there is no build matching the buildInfo given, and strict is specified,
raise an error. Otherwise return None.
[*] Not every build will have data for all keys. E.g. not all builds will
associated task ids, and not all import methods provide source info.
"""
buildID = find_build_id(buildInfo, strict=strict)
if buildID is None:
return None
fields = (('build.id', 'id'), ('build.version', 'version'), ('build.release', 'release'),
('build.id', 'build_id'),
('build.epoch', 'epoch'),
('build.draft', 'draft'),
('build.state', 'state'),
('build.completion_time', 'completion_time'),
('build.promotion_time', 'promotion_time'),
('build.start_time', 'start_time'),
('build.task_id', 'task_id'),
('events.id', 'creation_event_id'), ('events.time', 'creation_time'),
('package.id', 'package_id'), ('package.name', 'package_name'),
('package.name', 'name'),
('volume.id', 'volume_id'), ('volume.name', 'volume_name'),
("package.name || '-' || build.version || '-' || build.release", 'nvr'),
("date_part('epoch', events.time)", 'creation_ts'),
("date_part('epoch', build.start_time)", 'start_ts'),
("date_part('epoch', build.completion_time)", 'completion_ts'),
("date_part('epoch', build.promotion_time)", 'promotion_ts'),
('users.id', 'owner_id'), ('users.name', 'owner_name'),
('promoter.id', 'promoter_id'), ('promoter.name', 'promoter_name'),
('build.cg_id', 'cg_id'),
('build.source', 'source'),
('build.extra', 'extra'))
fields, aliases = zip(*fields)
joins = ['events ON build.create_event = events.id',
'package on build.pkg_id = package.id',
'volume on build.volume_id = volume.id',
'users on build.owner = users.id',
'LEFT JOIN users AS promoter ON build.promoter = promoter.id',
]
clauses = ['build.id = %(buildID)i']
query = QueryProcessor(columns=fields, aliases=aliases, values=locals(),
transform=_fix_extra_field,
tables=['build'], joins=joins, clauses=clauses)
result = query.executeOne()
if not result:
if strict:
raise koji.GenericError('No such build: %s' % buildInfo)
else:
return None
if result['cg_id']:
result['cg_name'] = lookup_name('content_generator', result['cg_id'], strict=True)['name']
else:
result['cg_name'] = None
return result
def get_build_logs(build):
"""Return a list of log files for the given build
This method will only return logs for builds that are complete.
If a build is in progress, failed, or canceled, you must look at the
build's task logs instead (see listTaskOutput).
:param build: A build ID (int), a NVR (string), or a dict containing
"name", "version" and "release".
:returns: a possibly-empty list of log file entries. Each entry is a dict
with three keys:
"name" (log file name)
"dir" (immediate parent subdirectory)
"path" (the full path under koji's topdir)
"""
buildinfo = get_build(build, strict=True)
logdir = koji.pathinfo.build_logs(buildinfo)
logreldir = os.path.relpath(logdir, koji.pathinfo.topdir)
if not os.path.exists(logdir):
return []
if not os.path.isdir(logdir):
raise koji.GenericError("Not a directory: %s" % logdir)
logs = []
for dirpath, dirs, files in os.walk(logdir):
subdir = os.path.relpath(dirpath, logdir)
for fn in files:
filepath = joinpath(dirpath, fn)
if os.path.islink(filepath):
logger.warning("Symlink under logdir: %s", filepath)
continue
if not os.path.isfile(filepath):
logger.warning("Non-regular file under logdir: %s", filepath)
continue
loginfo = {
'name': fn,
'dir': subdir,
'path': "%s/%s/%s" % (logreldir, subdir, fn)
}
logs.append(loginfo)
return logs
def get_next_release(build_info, incr=1):
"""
Find the next release for a package's version.
This method searches the latest building, successful, or deleted build and
returns the "next" release value for that version.
Note that draft builds are excluded while getting that latest build.
Examples:
None becomes "1"
"123" becomes "124"
"123.el8" becomes "124.el8"
"123.snapshot.456" becomes "123.snapshot.457"
All other formats will raise koji.BuildError.
:param dict build_info: a dict with two keys: a package "name" and
"version" of the builds to search. For example,
{"name": "bash", "version": "4.4.19"}
:param int incr: value which should be added to latest found release
(it is used for solving race-condition conflicts)
:returns: a release string for this package, for example "15.el8".
:raises: BuildError if the latest build uses a release value that Koji
does not know how to increment.
"""
incr = convert_value(incr, cast=int, message='incr parameter must be an integer')
values = {
'name': build_info['name'],
'version': build_info['version'],
'states': (
koji.BUILD_STATES['COMPLETE'],
koji.BUILD_STATES['DELETED'],
koji.BUILD_STATES['BUILDING']
)
}
query = QueryProcessor(tables=['build'], joins=['package ON build.pkg_id = package.id'],
columns=['build.id', 'release'],
clauses=['name = %(name)s', 'version = %(version)s',
'state in %(states)s', 'NOT draft'],
values=values,
opts={'order': '-build.id', 'limit': 1})
result = query.executeOne()
release = None
if result:
release = result['release']
if not release:
release = str(incr)
elif release.isdigit():
release = str(int(release) + incr)
elif len(release.split('.')) == 2 and release.split('.')[0].isdigit():
# Handle the N.%{dist} case
r_split = release.split('.')
r_split[0] = str(int(r_split[0]) + incr)
release = '.'.join(r_split)
elif len(release.split('.')) == 3 and release.split('.')[2].isdigit():
# Handle the {date}.nightly.%{id} case
r_split = release.split('.')
r_split[2] = str(int(r_split[2]) + incr)
release = '.'.join(r_split)
else:
raise koji.BuildError('Unable to increment release value: %s' % release)
return release
def get_next_build(build_info):
"""
Returns a new build entry with automatic release incrementing
:param dict build_info: data for the build to be created
:returns: build id for the created build
If data includes a non-None release value, then this function is
equivalent to new_build. Otherwise, it will use get_next_release()
to choose the release value.
To limit race conditions, this function will try a series of release
increments.
"""
if build_info.get('release') is not None:
return new_build(build_info)
build_info['release'] = get_next_release(build_info)
for try_no in range(2, 10):
try:
return new_build(build_info)
except IntegrityError:
build_info['release'] = get_next_release(build_info, try_no)
# otherwise
raise koji.GenericError("Can't find available release")
def _fix_rpm_row(row):
if 'extra' in row:
row['extra'] = parse_json(row['extra'], desc='rpm extra')
return row
# alias for now, may change in the future
_fix_archive_row = _fix_rpm_row
def get_rpm(rpminfo, strict=False, multi=False):
"""Get information about the specified RPM
rpminfo may be any one of the following:
- the rpm id as an int
- the rpm id as a string
- a string N-V-R.A
- a string N-V-R.A@location
- a map containing 'name', 'version', 'release', and 'arch'
(and optionally 'location')
If specified, location should match the name of an external repo
A map will be returned, with the following keys:
- id
- name
- version
- release
- arch
- draft
- epoch
- payloadhash
- size
- buildtime
- build_id
- buildroot_id
- external_repo_id
- external_repo_name
- metadata_only
- extra
If there is no RPM with the given ID, None is returned, unless strict
is True in which case an exception is raised
This function is normally expected to return a single rpm. However, there
are cases where the given rpminfo could refer to multiple rpms. This is
because of nvra overlap involving:
* draft rpms
* external rpms
If more than one RPM matches, then in the default case (multi=False), this function
will choose the best option in order of preference:
1. internal non-draft rpms (nvras are unique within this subset)
2. internal draft rpms (highest rpm id)
3. external rpms (highest rpm id)
OTOH if multi is True, then all matching results are returned as a list
"""
# we can look up by id or NVRA
data = None
if isinstance(rpminfo, int):
data = {'id': rpminfo}
elif isinstance(rpminfo, str):
# either nvra or id as a string
try:
data = {'id': int(rpminfo)}
except ValueError:
data = koji.parse_NVRA(rpminfo)
elif isinstance(rpminfo, dict):
data = rpminfo.copy()
else:
raise koji.GenericError("Invalid type for rpminfo: %r" % type(rpminfo))
rpms = _get_rpms(data)
if multi:
return rpms
# otherwise make sure we have a single rpm
if not rpms:
if strict:
raise koji.GenericError("No such rpm: %r" % data)
return None
elif len(rpms) == 1:
return rpms[0]
else:
# pick our preferred, as described above
nondraft = None
draft = None
external = None
for rinfo in rpms:
if rinfo['external_repo_id']:
if external is None or rinfo['id'] > external['id']:
external = rinfo
elif rinfo['draft']:
if draft is None or rinfo['id'] > draft['id']:
draft = rinfo
else:
# rinfo is internal and nondraft
if nondraft:
# should not happen
# none of our selection options should result in more than one nondraft build
raise koji.GenericError("Multiple nondraft rpm matches for: %r" % data)
else:
nondraft = rinfo
return nondraft or draft or external
def _get_rpms(data):
"""Helper function for get_rpm"""
fields = (
('rpminfo.id', 'id'),
('build_id', 'build_id'),
('buildroot_id', 'buildroot_id'),
('rpminfo.name', 'name'),
('version', 'version'),
('release', 'release'),
('epoch', 'epoch'),
('arch', 'arch'),
('draft', 'draft'),
('external_repo_id', 'external_repo_id'),
('external_repo.name', 'external_repo_name'),
('payloadhash', 'payloadhash'),
('size', 'size'),
('buildtime', 'buildtime'),
('metadata_only', 'metadata_only'),
('extra', 'extra'),
)
clauses = []
if 'id' in data:
clauses.append("rpminfo.id=%(id)s")
else:
clauses.append("rpminfo.name=%(name)s AND version=%(version)s "
"AND release=%(release)s AND arch=%(arch)s")
if 'location' in data:
data['external_repo_id'] = get_external_repo_id(data['location'], strict=True)
clauses.append("""external_repo_id = %(external_repo_id)s""")
joins = ['external_repo ON rpminfo.external_repo_id = external_repo.id']
query = QueryProcessor(columns=[f[0] for f in fields], aliases=[f[1] for f in fields],
tables=['rpminfo'], joins=joins, clauses=clauses,
values=data, transform=_fix_rpm_row)
return query.execute()
def list_rpms(buildID=None, buildrootID=None, imageID=None, componentBuildrootID=None, hostID=None,
arches=None, queryOpts=None, draft=None):
"""List RPMS. If buildID, imageID and/or buildrootID are specified,
restrict the list of RPMs to only those RPMs that are part of that
build, or were built in that buildroot. If componentBuildrootID is specified,
restrict the list to only those RPMs that will get pulled into that buildroot
when it is used to build another package. A list of maps is returned, each map
containing the following keys:
- id
- name
- version
- release
- nvr (synthesized for sorting purposes)
- arch
- epoch
- draft
- payloadhash
- size
- buildtime
- build_id
- buildroot_id
- external_repo_id
- external_repo_name
- metadata_only
- extra
If componentBuildrootID is specified, two additional keys will be included:
- component_buildroot_id
- is_update
If no build has the given ID, or the build generated no RPMs,
an empty list is returned.
The option draft with a bool/None value is to filter rpm by that
rpm belongs to a draft build, a regular build or both (default). It stands for:
- None: no filter (both draft and regular builds)
- True: draft only
- False: regular only
"""
fields = [('rpminfo.id', 'id'), ('rpminfo.name', 'name'), ('rpminfo.version', 'version'),
('rpminfo.release', 'release'),
("rpminfo.name || '-' || rpminfo.version || '-' || rpminfo.release", 'nvr'),
('rpminfo.arch', 'arch'),
('rpminfo.epoch', 'epoch'),
('rpminfo.draft', 'draft'),
('rpminfo.payloadhash', 'payloadhash'),
('rpminfo.size', 'size'), ('rpminfo.buildtime', 'buildtime'),
('rpminfo.build_id', 'build_id'), ('rpminfo.buildroot_id', 'buildroot_id'),
('rpminfo.external_repo_id', 'external_repo_id'),
('external_repo.name', 'external_repo_name'),
('rpminfo.metadata_only', 'metadata_only'),
('rpminfo.extra', 'extra'),
]
joins = ['LEFT JOIN external_repo ON rpminfo.external_repo_id = external_repo.id']
clauses = []
if buildID is not None:
clauses.append('rpminfo.build_id = %(buildID)i')
if buildrootID is not None:
clauses.append('rpminfo.buildroot_id = %(buildrootID)i')
if componentBuildrootID is not None:
fields.append(('buildroot_listing.buildroot_id as component_buildroot_id',
'component_buildroot_id'))
fields.append(('buildroot_listing.is_update', 'is_update'))
joins.append('buildroot_listing ON rpminfo.id = buildroot_listing.rpm_id')
clauses.append('buildroot_listing.buildroot_id = %(componentBuildrootID)i')
# image specific constraints
if imageID is not None:
clauses.append('archive_rpm_components.archive_id = %(imageID)i')
joins.append('archive_rpm_components ON rpminfo.id = archive_rpm_components.rpm_id')
if hostID is not None:
joins.append(
'standard_buildroot ON rpminfo.buildroot_id = standard_buildroot.buildroot_id')
clauses.append('standard_buildroot.host_id = %(hostID)i')
if arches is not None:
if isinstance(arches, (list, tuple)):
clauses.append('rpminfo.arch IN %(arches)s')
elif isinstance(arches, str):
clauses.append('rpminfo.arch = %(arches)s')
else:
raise koji.GenericError('Invalid type for "arches" parameter: %s' % type(arches))
if draft is not None:
clauses.append(draft_clause(draft))
fields, aliases = zip(*fields)
query = QueryProcessor(columns=fields, aliases=aliases,
tables=['rpminfo'], joins=joins, clauses=clauses,
values=locals(), transform=_fix_rpm_row, opts=queryOpts)
data = query.execute()
return data
def get_maven_build(buildInfo, strict=False):
"""
Retrieve Maven-specific information about a build.
buildInfo can be either a string (n-v-r) or an integer
(build ID).
Returns a map containing the following keys:
build_id: id of the build (integer)
group_id: Maven groupId (string)
artifact_id: Maven artifact_Id (string)
version: Maven version (string)
"""
build_id = find_build_id(buildInfo, strict=strict)
if not build_id:
return None
query = QueryProcessor(tables=['maven_builds'],
columns=['build_id', 'group_id', 'artifact_id', 'version'],
clauses=['build_id = %(build_id)i'],
values={'build_id': build_id})
result = query.executeOne()
if strict and not result:
raise koji.GenericError('no such maven build: %s' % buildInfo)
return result
def get_win_build(buildInfo, strict=False):
"""
Retrieve Windows-specific information about a build.
buildInfo can be either a string (n-v-r) or an integer
(build ID).
Returns a map containing the following keys:
build_id: id of the build (integer)
platform: the platform the build was performed on (string)
"""
build_id = find_build_id(buildInfo, strict=strict)
if not build_id:
return None
query = QueryProcessor(tables=['win_builds'], columns=['build_id', 'platform'],
clauses=['build_id = %(build_id)i'], values={'build_id': build_id})
result = query.executeOne()
if strict and not result:
raise koji.GenericError('no such Windows build: %s' % buildInfo)
return result
def get_image_build(buildInfo, strict=False):
"""
Retrieve image-specific information about a build.
buildInfo can be either a string (n-v-r) or an integer
(build ID). This function really only exists to verify a build
is an image build; there is no additional data.
Returns a map containing the following keys:
build_id: id of the build
"""
build_id = find_build_id(buildInfo, strict=strict)
if not build_id:
return None
query = QueryProcessor(tables=['image_builds'], columns=['build_id'],
clauses=['build_id = %(build_id)i'],
values={'build_id': build_id})
result = query.executeOne()
if strict and not result:
raise koji.GenericError('no such image build: %s' % buildInfo)
return result
def get_build_type(buildInfo, strict=False):
"""Return type info about the build
buildInfo should be a valid build specification
Returns a dictionary whose keys are type names and whose values are
the type info corresponding to that type
"""
if not isinstance(buildInfo, dict) or 'extra' not in buildInfo or 'id' not in buildInfo:
binfo = get_build(buildInfo, strict=strict)
if not binfo:
return None
else:
binfo = buildInfo
query = QueryProcessor(
tables=['btype'],
columns=['name'],
joins=['build_types ON btype_id=btype.id'],
clauses=['build_id = %(id)i'],
values=binfo,
opts={'asList': True},
)
ret = {}
extra = binfo['extra'] or {}
for (btype,) in query.execute():
ret[btype] = extra.get('typeinfo', {}).get(btype)
# deal with legacy types
l_funcs = [['maven', get_maven_build], ['win', get_win_build],
['image', get_image_build]]
for ltype, func in l_funcs:
# For now, we let the legacy data take precedence, but at some point
# we will want to change that
ltinfo = func(binfo['id'], strict=False)
if ltinfo:
ret[ltype] = ltinfo
return ret
def list_btypes(query=None, queryOpts=None):
"""List btypes matching query
:param dict query: Select a particular btype by "name" or "id".
Example: {"name": "image"}.
If this parameter is None (default), Koji returns all
btypes.
:param dict queryOpts: additional options for this query.
:returns: a list of btype dicts. If you specify a query parameter for a
btype name or id that does not exist, Koji will return an empty
list.
"""
if query is None:
query = {}
qparams = {'tables': ['btype'],
'columns': ['id', 'name'],
'opts': queryOpts}
clauses = []
values = query.copy()
if 'name' in query:
clauses.append('btype.name = %(name)s')
if 'id' in query:
clauses.append('btype.id = %(id)s')
qparams['clauses'] = clauses
qparams['values'] = values
return QueryProcessor(**qparams).execute()
def add_btype(name):
"""Add a new btype with the given name"""
context.session.assertPerm('admin')
verify_name_internal(name)
data = {'name': name}
if list_btypes(data):
raise koji.GenericError("btype already exists")
insert = InsertProcessor('btype', data=data)
insert.execute()
def list_archives(buildID=None, buildrootID=None, componentBuildrootID=None, hostID=None,
type=None, filename=None, size=None, checksum=None, checksum_type=None,
typeInfo=None, queryOpts=None, imageID=None, archiveID=None, strict=False):
"""
Retrieve information about archives.
If buildID is not null it will restrict the list to archives built by the build with that ID.
If buildrootID is not null it will restrict the list to archives built in the buildroot with
that ID.
If componentBuildrootID is not null it will restrict the list to archives that were present in
the buildroot with that ID.
If hostID is not null it will restrict the list to archives built on the host with that ID.
If filename, size, checksum and/or checksum_type are not null it will filter
the results to entries matching the provided values.
Returns a list of maps containing the following keys:
id: unique id of the archive file (integer)
type_id: id of the archive type (Java jar, Solaris pkg, Windows exe, etc.) (integer)
type_name: name of the archive type
type_description: description of the archive
type_extensions: valid extensions for the type
build_id: id of the build that generated this archive (integer)
buildroot_id: id of the buildroot where this archive was built (integer)
filename: name of the archive (string)
size: size of the archive (integer)
checksum: checksum of the archive (string)
checksum_type: the checksum type (integer)
Koji only stores one checksum type per archive. Some content generators
store md5 checksums in Koji, and others store sha256 checksums, and this may
change for older and newer archives as different content generators upgrade
to sha256.
If you search for an archive by its sha256 checksum, and Koji has only
stored an md5 checksum record for that archive, then Koji will not return a
result for that archive. You may need to call listArchives multiple times,
once for each checksum_type you want to search.
If componentBuildrootID is specified, then the map will also contain the following key:
project: whether the archive was pulled in as a project dependency, or as part of the
build environment setup (boolean)
If 'type' is specified, then the archives listed will be limited
those associated with additional metadata of the given type.
Supported types are "maven", "win", "image", or the btype name of any
other content generator (eg. "remote-sources").
If 'maven' is specified as a type, each returned map will contain
these additional keys:
group_id: Maven groupId (string)
artifact_id: Maven artifactId (string)
version: Maven version (string)
if 'win' is specified as a type, each returned map will contain
these additional keys:
relpath: the relative path where the file is located (string)
platforms: space-separated list of platforms the file is suitable for use on (string)
flags: space-separated list of flags used when building the file (fre, chk) (string)
if 'image' is specified as a type, each returned map will contain an
additional key:
arch: The architecture if the image itself, which may be different from the
task that generated it
typeInfo is a dict that can be used to filter the output by type-specific info.
For the 'maven' type, this dict may contain one or more of group_id, artifact_id, or version,
and the output will be restricted to archives with matching attributes.
If there are no archives matching the selection criteria, if strict is False,
an empty list is returned, otherwise GenericError is raised.
"""
values = {}
tables = ['archiveinfo']
joins = ['archivetypes on archiveinfo.type_id = archivetypes.id',
'btype ON archiveinfo.btype_id = btype.id']
fields = [('archiveinfo.id', 'id'),
('archiveinfo.type_id', 'type_id'),
('archiveinfo.btype_id', 'btype_id'),
('btype.name', 'btype'),
('archiveinfo.build_id', 'build_id'),
('archiveinfo.buildroot_id', 'buildroot_id'),
('archiveinfo.filename', 'filename'),
('archiveinfo.size', 'size'),
('archiveinfo.checksum', 'checksum'),
('archiveinfo.checksum_type', 'checksum_type'),
('archiveinfo.metadata_only', 'metadata_only'),
('archiveinfo.extra', 'extra'),
('archivetypes.name', 'type_name'),
('archivetypes.description', 'type_description'),
('archivetypes.extensions', 'type_extensions'),
('archivetypes.compression_type', 'compression_type')
]
clauses = []
if buildID is not None:
clauses.append('build_id = %(build_id)i')
values['build_id'] = buildID
if buildrootID is not None:
clauses.append('buildroot_id = %(buildroot_id)i')
values['buildroot_id'] = buildrootID
if componentBuildrootID is not None:
joins.append('buildroot_archives on archiveinfo.id = buildroot_archives.archive_id')
clauses.append('buildroot_archives.buildroot_id = %(component_buildroot_id)i')
values['component_buildroot_id'] = componentBuildrootID
fields.append(['buildroot_archives.buildroot_id', 'component_buildroot_id'])
fields.append(['buildroot_archives.project_dep', 'project'])
if imageID is not None:
# TODO: arg name is now a misnomer, could be any archive
clauses.append('archive_components.archive_id = %(imageID)i')
values['imageID'] = imageID
joins.append('archive_components ON archiveinfo.id = archive_components.component_id')
if hostID is not None:
joins.append(
'standard_buildroot on archiveinfo.buildroot_id = standard_buildroot.buildroot_id')
clauses.append('standard_buildroot.host_id = %(host_id)i')
values['host_id'] = hostID
fields.append(['standard_buildroot.host_id', 'host_id'])
if filename is not None:
clauses.append('filename = %(filename)s')
values['filename'] = filename
if size is not None:
clauses.append('size = %(size)i')
values['size'] = size
if checksum is not None:
clauses.append('checksum = %(checksum)s')
values['checksum'] = checksum
if checksum_type is not None:
clauses.append('checksum_type = %(checksum_type)s')
values['checksum_type'] = checksum_type
if archiveID is not None:
clauses.append('archiveinfo.id = %(archive_id)s')
values['archive_id'] = archiveID
if type is None:
pass
elif type == 'maven':
joins.append('maven_archives ON archiveinfo.id = maven_archives.archive_id')
fields.extend([
('maven_archives.group_id', 'group_id'),
('maven_archives.artifact_id', 'artifact_id'),
('maven_archives.version', 'version'),
])
if typeInfo:
for key in ('group_id', 'artifact_id', 'version'):
if key in typeInfo:
clauses.append('maven_archives.%s = %%(%s)s' % (key, key))
values[key] = typeInfo[key]
elif type == 'win':
joins.append('win_archives ON archiveinfo.id = win_archives.archive_id')
fields.extend([
('win_archives.relpath', 'relpath'),
('win_archives.platforms', 'platforms'),
('win_archives.flags', 'flags'),
])
if typeInfo:
if 'relpath' in typeInfo:
clauses.append('win_archives.relpath = %(relpath)s')
values['relpath'] = typeInfo['relpath']
for key in ('platforms', 'flags'):
if key in typeInfo:
val = typeInfo[key]
if not isinstance(val, (list, tuple)):
val = [val]
for i, v in enumerate(val):
pkey = '%s_pattern_%i' % (key, i)
values[pkey] = r'\m%s\M' % v
clauses.append('%s ~ %%(%s)s' % (key, pkey))
elif type == 'image':
joins.append('image_archives ON archiveinfo.id = image_archives.archive_id')
fields.append(['image_archives.arch', 'arch'])
if typeInfo and typeInfo.get('arch'):
key = 'arch'
clauses.append('image_archives.%s = %%(%s)s' % (key, key))
values[key] = typeInfo[key]
else:
btype = lookup_name('btype', type, strict=False)
if not btype:
raise koji.GenericError('unsupported archive type: %s' % type)
if typeInfo:
raise koji.GenericError('typeInfo queries not supported for type '
'%(name)s' % btype)
clauses.append('archiveinfo.btype_id = %(btype_id)s')
values['btype_id'] = btype['id']
columns, aliases = zip(*fields)
ret = QueryProcessor(tables=tables, columns=columns, aliases=aliases, joins=joins,
transform=_fix_archive_row,
clauses=clauses, values=values, opts=queryOpts).execute()
if strict and not ret:
raise koji.GenericError('No archives found.')
return ret
def get_archive(archive_id, strict=False):
"""
Get information about the archive with the given ID. Returns a map
containing the following keys:
id: unique id of the archive file (integer)
type_id: id of the archive type (Java jar, Solaris pkg, Windows exe, etc.) (integer)
build_id: id of the build that generated this archive (integer)
buildroot_id: id of the buildroot where this archive was built (integer)
filename: name of the archive (string)
size: size of the archive (integer)
checksum: checksum of the archive (string)
checksum_type: type of the checksum (integer)
If the archive is part of a Maven build, the following keys will be included:
group_id
artifact_id
version
If the archive is part of a Windows builds, the following keys will be included:
relpath
platforms
flags
If the archive is part of an image build, and it is the image file that
contains the root partitioning ('/'), there will be a additional fields:
rootid
arch
"""
data = list_archives(archiveID=archive_id)
if not data:
if strict:
raise koji.GenericError('No such archive: %s' % archive_id)
else:
return None
archive = data[0]
maven_info = get_maven_archive(archive_id)
if maven_info:
del maven_info['archive_id']
archive.update(maven_info)
win_info = get_win_archive(archive_id)
if win_info:
del win_info['archive_id']
archive.update(win_info)
image_info = get_image_archive(archive_id)
if image_info:
del image_info['archive_id']
archive.update(image_info)
return archive
def get_maven_archive(archive_id, strict=False):
"""
Retrieve Maven-specific information about an archive.
Returns a map containing the following keys:
archive_id: id of the build (integer)
group_id: Maven groupId (string)
artifact_id: Maven artifact_Id (string)
version: Maven version (string)
"""
query = QueryProcessor(tables=['maven_archives'],
columns=['archive_id', 'group_id', 'artifact_id', 'version'],
clauses=['archive_id = %(archive_id)i'],
values={'archive_id': archive_id})
return query.executeOne(strict=strict)
def get_win_archive(archive_id, strict=False):
"""
Retrieve Windows-specific information about an archive.
Returns a map containing the following keys:
archive_id: id of the build (integer)
relpath: the relative path where the file is located (string)
platforms: space-separated list of platforms the file is suitable for use on (string)
flags: space-separated list of flags used when building the file (fre, chk) (string)
"""
query = QueryProcessor(tables=['win_archives'],
columns=['archive_id', 'relpath', 'platforms', 'flags'],
clauses=['archive_id = %(archive_id)i'],
values={'archive_id': archive_id})
return query.executeOne(strict=strict)
def get_image_archive(archive_id, strict=False):
"""
Retrieve image-specific information about an archive.
Returns a map containing the following keys:
archive_id: id of the build (integer)
arch: the architecture of the image
rootid: True if this image has the root '/' partition
"""
query = QueryProcessor(tables=['image_archives'],
columns=['archive_id', 'arch'],
clauses=['archive_id = %(archive_id)i'],
values={'archive_id': archive_id})
results = query.executeOne(strict=strict)
if not results:
return None
results['rootid'] = False
query = QueryProcessor(tables=['archive_rpm_components'],
columns=['rpm_id'],
clauses=['archive_id = %(archive_id)i'],
values={'archive_id': archive_id})
rpms = query.executeOne()
if rpms:
results['rootid'] = True
return results
def _get_zipfile_list(archive_id, zippath):
"""
Get a list of the entries in the zipfile located at zippath.
Return a list of dicts, one per entry in the zipfile. Each dict contains:
- archive_id
- name
- size
If the file does not exist, return an empty list.
"""
result = []
if not os.path.exists(zippath):
return result
with zipfile.ZipFile(zippath, 'r') as archive:
for entry in archive.infolist():
filename = koji.fixEncoding(entry.filename)
result.append({'archive_id': archive_id,
'name': filename,
'size': entry.file_size,
'mtime': int(time.mktime(entry.date_time + (0, 0, -1)))})
return result
def _get_tarball_list(archive_id, tarpath):
"""
Get a list of the entries in the tarball located at tarpath.
Return a list of dicts, one per entry in the tarball. Each dict contains:
- archive_id
- name
- size
- mtime
- mode
- user
- group
If the file does not exist, return an empty list.
"""
result = []
if not os.path.exists(tarpath):
return result
with tarfile.open(tarpath, 'r') as archive:
for entry in archive:
filename = koji.fixEncoding(entry.name)
result.append({'archive_id': archive_id,
'name': filename,
'size': entry.size,
'mtime': entry.mtime,
'mode': entry.mode,
'user': entry.uname,
'group': entry.gname})
return result
def list_archive_files(archive_id, queryOpts=None, strict=False):
"""
Get information about the files contained in the archive with the given ID.
Returns a list of maps with with following keys:
archive_id: id of the archive the file is contained in (integer)
name: name of the file (string)
size: uncompressed size of the file (integer)
If strict is True, raise GenericError if archive_type is not one that we
are able to expand
Regardless of strict, an error will be raised if the archive_id is invalid
"""
archive_info = get_archive(archive_id, strict=True)
archive_type = get_archive_type(type_id=archive_info['type_id'], strict=True)
build_info = get_build(archive_info['build_id'], strict=True)
btype = archive_info['btype']
if btype == 'maven':
maven_archive = get_maven_archive(archive_info['id'], strict=True)
archive_info.update(maven_archive)
file_path = joinpath(koji.pathinfo.mavenbuild(build_info),
koji.pathinfo.mavenfile(archive_info))
elif btype == 'win':
win_archive = get_win_archive(archive_info['id'], strict=True)
archive_info.update(win_archive)
file_path = joinpath(koji.pathinfo.winbuild(build_info),
koji.pathinfo.winfile(archive_info))
elif btype == 'image':
image_archive = get_image_archive(archive_info['id'], strict=True)
archive_info.update(image_archive)
file_path = joinpath(koji.pathinfo.imagebuild(build_info),
archive_info['filename'])
elif btype:
# for non-legacy types, btype info is in the 'extra' field
file_path = joinpath(koji.pathinfo.typedir(build_info, btype),
archive_info['filename'])
else:
# should not happen
raise koji.GenericError("Missing build type info for archive %s" % archive_id)
if archive_type['compression_type'] == 'zip':
filelist = _get_zipfile_list(archive_id, file_path)
elif archive_type['compression_type'] == 'tar':
filelist = _get_tarball_list(archive_id, file_path)
else:
# TODO: support other archive types
if strict:
raise koji.GenericError(
"Unsupported archive type: %s" % archive_type['name'])
filelist = []
return _applyQueryOpts(filelist, queryOpts)
def get_archive_file(archive_id, filename, strict=False):
"""
Get information about a file with the given filename
contained in the archive with the given ID.
Returns a map with with following keys:
archive_id: id of the archive the file is contained in (integer)
name: name of the file (string)
size: uncompressed size of the file (integer)
If strict is True, raise GenericError if:
- this file is not found in the archive
- build btype of this archive belong to is not maven, win or image
- archive_type is not that we are able to expand
Regardless of strict, an error will be raised if the archive_id is invalid
"""
files = list_archive_files(archive_id, strict=strict)
for file_info in files:
if file_info['name'] == filename:
return file_info
if strict:
raise koji.GenericError('No such file: %s in archive#%s' % (filename, archive_id))
return None
def list_task_output(taskID, stat=False, all_volumes=False, strict=False):
"""List the files generated by the task with the given ID. This
will usually include one or more RPMs, and one or more log files.
If the task did not generate any files, or the output directory
for the task no longer exists, return an empty list.
If stat is True, return a map of filename -> stat_info where stat_info
is a map containing the values of the st_* attributes returned by
os.stat().
If all_volumes is set, results are extended to deal with files in same
relative paths on different volumes.
With all_volumes=True, stat=False, return a map of filename -> list_of_volumes,
{'stdout.log': ['DEFAULT']}
With all_volumes=True, stat=True, return a map of
filename -> map_of_volumes -> stat_info,
{'stdout.log':
{'DEFAULT': {
{
'st_atime': 1488902587.2141163,
'st_ctime': 1488902588.2281106,
'st_mtime': 1488902588.2281106,
'st_size': '526'
}
}
}
If strict is set, function will raise a GenericError if task doesn't
exist. Allows user to distinguish between empty output and non-existent task.
"""
if strict:
# raise error if task doesn't exist
try:
Task(taskID).getInfo(strict=True)
except Exception:
raise koji.GenericError("Task doesn't exist")
if stat or all_volumes:
result = {}
else:
result = []
if all_volumes:
volumes = [x['name'] for x in list_volumes()]
else:
volumes = ['DEFAULT']
for volume in volumes:
taskDir = '%s/%s' % (koji.pathinfo.work(volume=volume), koji.pathinfo.taskrelpath(taskID))
if not os.path.isdir(taskDir):
continue
for path, dirs, files in os.walk(taskDir):
for filename in files:
relpath = path[len(taskDir) + 1:]
relfilename = joinpath(relpath, filename)
if stat:
stat_info = os.stat(joinpath(path, filename))
stat_map = {}
for attr in dir(stat_info):
if attr == 'st_size':
stat_map[attr] = str(getattr(stat_info, attr))
elif attr in ('st_atime', 'st_mtime', 'st_ctime'):
stat_map[attr] = getattr(stat_info, attr)
if all_volumes:
result.setdefault(relfilename, {})[volume] = stat_map
else:
result[relfilename] = stat_map
else:
if all_volumes:
result.setdefault(relfilename, []).append(volume)
else:
result.append(relfilename)
return result
def get_host(hostInfo, strict=False, event=None):
"""Get information about the given host. hostInfo may be
either a string (hostname) or int (host id). A map will be returned
containing the following data:
- id
- user_id
- name
- update_ts
- arches
- task_load
- capacity
- description
- comment
- ready
- enabled
"""
tables = ['host_config']
joins = ['host ON host.id = host_config.host_id']
fields = [
('host.id', 'id'),
('host.user_id', 'user_id'),
('host.name', 'name'),
("date_part('epoch', host.update_time)", 'update_ts'),
('host.ready', 'ready'),
('host.task_load', 'task_load'),
('host_config.arches', 'arches'),
('host_config.capacity', 'capacity'),
('host_config.description', 'description'),
('host_config.comment', 'comment'),
('host_config.enabled', 'enabled'),
]
clauses = [eventCondition(event, table='host_config')]
clause, values = name_or_id_clause('host', hostInfo)
clauses.append(clause)
fields, aliases = zip(*fields)
query = QueryProcessor(columns=fields, aliases=aliases, tables=tables,
joins=joins, clauses=clauses, values=values)
result = query.executeOne()
if not result:
if strict:
raise koji.GenericError('Invalid hostInfo: %s' % hostInfo)
return None
return result
def edit_host(hostInfo, **kw):
"""Edit information for an existing host.
hostInfo specifies the host to edit, either as an integer (id)
or a string (name).
fields to be changed are specified as keyword parameters:
- arches (a space-separated string)
- capacity (float or int)
- description (string)
- comment (string)
Returns True if changes are made to the database, False otherwise.
"""
context.session.assertPerm('host')
host = get_host(hostInfo, strict=True)
fields = ('arches', 'capacity', 'description', 'comment')
changes = []
for field in fields:
if field in kw and kw[field] != host[field]:
changes.append(field)
if not changes:
return False
for change in changes:
if change in ['description', 'comment', 'arches']:
convert_value(kw[change], cast=str, check_only=True)
update = UpdateProcessor('host_config', values=host, clauses=['host_id = %(id)i'])
update.make_revoke()
update.execute()
insert = InsertProcessor('host_config',
data=dslice(host,
('arches', 'capacity', 'description', 'comment',
'enabled')))
insert.set(host_id=host['id'])
for change in changes:
insert.set(**{change: kw[change]})
insert.make_create()
insert.execute()
return True
def get_channel(channelInfo, strict=False):
"""
Look up the ID number and name for a channel.
:param channelInfo: channel ID or name
:type channelInfo: int or str
:param bool strict: If True, raise an error if we found no matching
channel. If False, simply return None if we found no
matching channel. If unspecified, the default value is
False.
:returns: dict of the channel ID and name, or None.
For example, {'id': 20, 'name': 'container'}
"""
clause, values = name_or_id_clause('channels', channelInfo)
query = QueryProcessor(tables=['channels'],
columns=['id', 'name', 'description', 'enabled', 'comment'],
clauses=[clause], values=values)
return query.executeOne(strict=strict)
def query_buildroots(hostID=None, tagID=None, state=None, rpmID=None, archiveID=None, taskID=None,
buildrootID=None, repoID=None, queryOpts=None):
"""Return a list of matching buildroots
Optional args:
hostID - only buildroots on host.
tagID - only buildroots for tag.
state - only buildroots in state (may be a list)
rpmID - only buildroots the specified rpm was used in
archiveID - only buildroots the specified archive was used in
taskID - only buildroots associated with task.
buildrootID - only the specified buildroot
queryOpts - query options
"""
fields = [('buildroot.id', 'id'),
('buildroot.br_type', 'br_type'),
('buildroot.cg_id', 'cg_id'),
('content_generator.name', 'cg_name'),
('buildroot.cg_version', 'cg_version'),
('buildroot.container_arch', 'container_arch'),
('buildroot.container_arch', 'arch'), # alias for back compat
('buildroot.container_type', 'container_type'),
('buildroot.host_os', 'host_os'),
('buildroot.host_arch', 'host_arch'),
('buildroot.extra', 'extra'),
('standard_buildroot.state', 'state'),
('standard_buildroot.task_id', 'task_id'),
('host.id', 'host_id'), ('host.name', 'host_name'),
('repo.id', 'repo_id'), ('repo.state', 'repo_state'),
('tag.id', 'tag_id'), ('tag.name', 'tag_name'),
('create_events.id', 'create_event_id'), ('create_events.time', 'create_event_time'),
("date_part('epoch', create_events.time)", 'create_ts'),
('retire_events.id', 'retire_event_id'), ('retire_events.time', 'retire_event_time'),
("date_part('epoch', retire_events.time)", 'retire_ts'),
('repo_create.id', 'repo_create_event_id'),
('repo_create.time', 'repo_create_event_time')]
tables = ['buildroot']
joins = ['LEFT OUTER JOIN standard_buildroot '
'ON standard_buildroot.buildroot_id = buildroot.id',
'LEFT OUTER JOIN content_generator '
'ON buildroot.cg_id = content_generator.id',
'LEFT OUTER JOIN host ON host.id = standard_buildroot.host_id',
'LEFT OUTER JOIN repo ON repo.id = standard_buildroot.repo_id',
'LEFT OUTER JOIN tag ON tag.id = repo.tag_id',
'LEFT OUTER JOIN events AS create_events ON '
'create_events.id = standard_buildroot.create_event',
'LEFT OUTER JOIN events AS retire_events ON '
'standard_buildroot.retire_event = retire_events.id',
'LEFT OUTER JOIN events AS repo_create ON repo_create.id = repo.create_event']
clauses = []
if buildrootID is not None:
if isinstance(buildrootID, (list, tuple)):
clauses.append('buildroot.id IN %(buildrootID)s')
else:
clauses.append('buildroot.id = %(buildrootID)i')
if hostID is not None:
clauses.append('host.id = %(hostID)i')
if tagID is not None:
clauses.append('tag.id = %(tagID)i')
if state is not None:
if isinstance(state, (list, tuple)):
clauses.append('standard_buildroot.state IN %(state)s')
else:
clauses.append('standard_buildroot.state = %(state)i')
# following filters can dramatically limit overall query size
# run separate queries for picking smallest candidate set
candidate_buildroot_ids = set()
if rpmID is not None:
query = QueryProcessor(columns=['buildroot_id'], tables=['buildroot_listing'],
clauses=['rpm_id = %(rpmID)i'], opts={'asList': True},
values=locals())
result = set(query.execute())
candidate_buildroot_ids = result
if not candidate_buildroot_ids:
return _applyQueryOpts([], queryOpts)
if archiveID is not None:
query = QueryProcessor(columns=['buildroot_id'], tables=['buildroot_archives'],
clauses=['archive_id = %(archiveID)i'], opts={'asList': True},
values=locals())
result = set(query.execute())
if candidate_buildroot_ids:
candidate_buildroot_ids &= result
else:
candidate_buildroot_ids = result
if not candidate_buildroot_ids:
return _applyQueryOpts([], queryOpts)
if taskID is not None:
query = QueryProcessor(columns=['buildroot_id'], tables=['standard_buildroot'],
clauses=['task_id = %(taskID)i'], opts={'asList': True},
values=locals())
result = set(query.execute())
if candidate_buildroot_ids:
candidate_buildroot_ids &= result
else:
candidate_buildroot_ids = result
if not candidate_buildroot_ids:
return _applyQueryOpts([], queryOpts)
if repoID:
query = QueryProcessor(columns=['buildroot_id'], tables=['standard_buildroot'],
clauses=['repo_id = %(repoID)i'], opts={'asList': True},
values=locals())
result = set(query.execute())
if candidate_buildroot_ids:
candidate_buildroot_ids &= result
else:
candidate_buildroot_ids = result
if not candidate_buildroot_ids:
return _applyQueryOpts([], queryOpts)
if candidate_buildroot_ids:
candidate_buildroot_ids = list(candidate_buildroot_ids)
clauses.append('buildroot.id IN %(candidate_buildroot_ids)s')
query = QueryProcessor(columns=[f[0] for f in fields], aliases=[f[1] for f in fields],
tables=tables, joins=joins, clauses=clauses, values=locals(),
transform=_fix_extra_field,
opts=queryOpts)
return query.execute()
def get_buildroot(buildrootID, strict=False):
"""Return information about a buildroot. buildrootID must be an int ID."""
buildrootID = convert_value(buildrootID, cast=int)
result = query_buildroots(buildrootID=buildrootID)
if len(result) == 0:
if strict:
raise koji.GenericError("No such buildroot: %r" % buildrootID)
else:
return None
if len(result) > 1:
# this should be impossible
raise koji.GenericError("More that one buildroot with id: %i" % buildrootID)
return result[0]
def list_channels(hostID=None, event=None, enabled=None):
"""
List builder channels.
:param hostID: Koji builder host ID or hostname. If specified, Koji will
return only the channels associated with this builder host.
If unspecified, Koji will return all channels.
:type hostID: int or str
:param int event: The event ID at which to search. If unspecified, the
default behavior is to search for the "active" host
settings. You must specify a hostID parameter with this
option.
:param bool enabled: Enabled/disabled list of channels
:returns: list of dicts, one per channel. For example,
[{'comment': 'test channel', 'description': 'container channel',
'enabled': True, 'id': 20, 'name': 'container', 'container channel' }]
"""
fields = [
('channels.id', 'id'),
('channels.name', 'name'),
('channels.description', 'description'),
('channels.enabled', 'enabled'),
('channels.comment', 'comment'),
]
columns, aliases = zip(*fields)
if enabled is not None:
if enabled:
enable_clause = 'enabled IS TRUE'
else:
enable_clause = 'enabled IS FALSE'
if hostID:
if isinstance(hostID, str):
hostID = get_host(hostID, strict=True)['id']
tables = ['host_channels']
joins = ['channels ON channels.id = host_channels.channel_id']
clauses = [
eventCondition(event, table='host_channels'),
'host_channels.host_id = %(host_id)s']
if enabled is not None:
clauses.append(enable_clause)
values = {'host_id': hostID}
query = QueryProcessor(tables=tables, aliases=aliases,
columns=columns, joins=joins,
clauses=clauses, values=values)
elif event:
raise koji.GenericError('list_channels with event and '
'not host is not allowed.')
else:
if enabled is not None:
clauses = [enable_clause]
else:
clauses = None
query = QueryProcessor(tables=['channels'], aliases=aliases,
columns=columns, clauses=clauses)
return query.execute()
def new_package(name, strict=True):
verify_name_internal(name)
# TODO - table lock?
# check for existing
query = QueryProcessor(tables=['package'], columns=['id'],
clauses=['name=%(name)s'], values={'name': name})
pkg_id = query.singleValue(strict=False)
if pkg_id:
if strict:
raise koji.GenericError("Package already exists [id %d]" % pkg_id)
else:
pkg_id = nextval('package_id_seq')
insert = InsertProcessor('package', data={'id': pkg_id, 'name': name})
insert.execute()
context.commit_pending = True
return pkg_id
def add_volume(name, strict=True):
"""Add a new storage volume in the database"""
context.session.assertPerm('admin')
verify_name_internal(name)
voldir = koji.pathinfo.volumedir(name)
if not os.path.isdir(voldir):
raise koji.GenericError('please create the volume directory first')
if strict:
volinfo = lookup_name('volume', name, strict=False)
if volinfo:
raise koji.GenericError('volume %s already exists' % name)
volinfo = lookup_name('volume', name, strict=False, create=True)
return volinfo
def remove_volume(volume):
"""Remove unused storage volume from the database"""
context.session.assertPerm('admin')
volinfo = lookup_name('volume', volume, strict=True)
query = QueryProcessor(tables=['build'], clauses=['volume_id=%(id)i'],
values=volinfo, columns=['id'], opts={'limit': 1})
if query.execute():
raise koji.GenericError('volume %(name)s has build references' % volinfo)
delete = DeleteProcessor(table='volume', clauses=['id=%(id)i'], values=volinfo)
delete.execute()
def list_volumes():
"""List storage volumes"""
return QueryProcessor(tables=['volume'], columns=['id', 'name']).execute()
def change_build_volume(build, volume, strict=True):
"""Move a build to a different storage volume"""
context.session.assertPerm('admin')
volinfo = lookup_name('volume', volume, strict=True)
binfo = get_build(build, strict=True)
_set_build_volume(binfo, volinfo, strict)
def _set_build_volume(binfo, volinfo, strict=True):
"""Move a build to a different storage volume"""
if binfo['volume_id'] == volinfo['id']:
if strict:
raise koji.GenericError("Build %(nvr)s already on volume %(volume_name)s" % binfo)
else:
# nothing to do
return
state = koji.BUILD_STATES[binfo['state']]
if state not in ['COMPLETE', 'DELETED']:
raise koji.GenericError("Build %s is %s" % (binfo['nvr'], state))
voldir = koji.pathinfo.volumedir(volinfo['name'])
if not os.path.isdir(voldir):
raise koji.GenericError("Directory entry missing for volume %(name)s" % volinfo)
# more sanity checks
for check_vol in list_volumes():
check_binfo = binfo.copy()
check_binfo['volume_id'] = check_vol['id']
check_binfo['volume_name'] = check_vol['name']
checkdir = koji.pathinfo.build(check_binfo)
if check_vol['id'] == binfo['volume_id']:
# the volume we are moving from
pass
elif check_vol['name'] == 'DEFAULT' and os.path.islink(checkdir):
# old convenience symlink
pass
elif check_vol['id'] == volinfo['id']:
# the volume we are moving to
if os.path.lexists(checkdir):
raise koji.GenericError("Destination directory exists: %s" % checkdir)
elif os.path.lexists(checkdir):
raise koji.GenericError("Unexpected cross-volume content: %s" % checkdir)
# First copy the build dir(s)
old_binfo = binfo.copy()
binfo['volume_id'] = volinfo['id']
binfo['volume_name'] = volinfo['name']
olddir = koji.pathinfo.build(old_binfo)
newdir = koji.pathinfo.build(binfo)
if not os.path.exists(olddir):
raise koji.GenericError(f"Build directory missing: {olddir}")
if not os.path.isdir(olddir):
raise koji.GenericError(f"Not a directory: {olddir}")
# Remove old symlink if copying to base volume
if volinfo['name'] == 'DEFAULT' or volinfo['name'] is None:
if os.path.islink(newdir):
os.unlink(newdir)
koji.ensuredir(os.path.dirname(newdir))
shutil.copytree(olddir, newdir, symlinks=True)
# Second, update the db
koji.plugin.run_callbacks('preBuildStateChange', attribute='volume_id',
old=old_binfo['volume_id'], new=volinfo['id'], info=binfo)
update = UpdateProcessor('build', clauses=['id=%(id)i'], values=binfo)
update.set(volume_id=volinfo['id'])
update.execute()
for tag in list_tags(build=binfo['id']):
set_tag_update(tag['id'], 'VOLUME_CHANGE')
# Third, delete the old content
koji.util.rmtree(olddir)
# Fourth, maintain a symlink if appropriate
if volinfo['name'] and volinfo['name'] != 'DEFAULT':
base_vol = lookup_name('volume', 'DEFAULT', strict=True)
base_binfo = binfo.copy()
base_binfo['volume_id'] = base_vol['id']
base_binfo['volume_name'] = base_vol['name']
basedir = koji.pathinfo.build(base_binfo)
if os.path.islink(basedir):
os.unlink(basedir)
relpath = os.path.relpath(newdir, os.path.dirname(basedir))
os.symlink(relpath, basedir)
koji.plugin.run_callbacks('postBuildStateChange', attribute='volume_id',
old=old_binfo['volume_id'], new=volinfo['id'], info=binfo)
def ensure_volume_symlink(binfo):
"""Ensure that a build has a symlink on the default volume if needed"""
# basic checks
volname = binfo.get('volume_name')
if volname is None:
logger.warning('buildinfo has no volume data, cannot create symlink')
return
if volname == 'DEFAULT':
# nothing to do
return
# get the actual build dir
build_dir = koji.pathinfo.build(binfo)
# get the default volume location for the symlink
base_vol = lookup_name('volume', 'DEFAULT', strict=True)
base_binfo = binfo.copy()
base_binfo['volume_id'] = base_vol['id']
base_binfo['volume_name'] = base_vol['name']
basedir = koji.pathinfo.build(base_binfo)
# check/make the symlink
relpath = os.path.relpath(build_dir, os.path.dirname(basedir))
if os.path.islink(basedir):
if os.readlink(basedir) == relpath:
# already correct
return
os.unlink(basedir)
elif os.path.exists(basedir):
raise koji.GenericError('Unexpected build content: %s' % basedir)
else:
# parent dir might not exist
koji.ensuredir(os.path.dirname(basedir))
os.symlink(relpath, basedir)
def check_volume_policy(data, strict=False, default=None):
"""Check volume policy for the given data
If strict is True, raises exception when a volume cannot be determined.
The default option can either be None, or a valid volume id or name, and
is used when the policy rules do not return a match.
Returns volume info or None
"""
result = None
try:
ruleset = context.policy.get('volume')
result = ruleset.apply(data)
except Exception:
logger.error('Volume policy error')
if strict:
raise
tb_str = ''.join(traceback.format_exception(*sys.exc_info()))
logger.debug(tb_str)
logger.debug('Volume policy returned %s', result)
if result is not None:
vol = lookup_name('volume', result)
if vol:
return vol
# otherwise
if strict:
raise koji.GenericError("Policy returned no such volume: %s" % result)
logger.error('Volume policy returned no such volume %s', result)
# fall back to default
if default is not None:
vol = lookup_name('volume', default)
if vol:
return vol
if strict:
raise koji.GenericError("Invalid default volume: %s" % default)
logger.error('Invalid default volume: %s', default)
if strict:
raise koji.GenericError('No volume policy match')
logger.warning('No volume policy match')
return None
def apply_volume_policy(build, strict=False, dry_run=False):
"""Apply volume policy, moving build as needed
build should be the buildinfo returned by get_build()
The strict options determines what happens in the case of a bad policy.
If strict is True, an exception will be raised. Otherwise, the existing
volume we be retained.
If dry_run is True, return the volume instead of doing the actual moving.
"""
policy_data = {'build': build}
task_id = extract_build_task(build)
if task_id:
policy_data.update(policy_data_from_task(task_id))
volume = check_volume_policy(policy_data, strict=strict)
if dry_run:
return volume
if volume is None:
# just leave the build where it is
return
if build['volume_id'] == volume['id']:
# nothing to do
return
_set_build_volume(build, volume, strict=True)
def new_build(data, strict=False):
"""insert a new build entry
If the build to create is a draft, the release field is the target release
rather than its actual release with draft suffix. The draft suffix will be
generated here as ",draft_<buildid>".
If strict is specified, raise an exception, if build already exists.
"""
data = data.copy()
# basic sanity checks
if 'pkg_id' in data:
data['name'] = lookup_package(data['pkg_id'], strict=True)['name']
else:
# see if there's a package name
name = data.get('name')
if not name:
raise koji.GenericError("No name or package id provided for build")
data['pkg_id'] = new_package(name, strict=False)
if data.get('owner'):
# check, that user exists (and convert name to id)
data['owner'] = get_user(data['owner'], strict=True)['id']
for f in ('version', 'release', 'epoch'):
if f not in data:
raise koji.GenericError("No %s value for build" % f)
if 'extra' in data:
try:
# backwards compatible for data in callback
data['extra'] = json.dumps(data['extra'])
except Exception:
raise koji.GenericError("No such build extra data: %(extra)r" % data)
else:
data['extra'] = None
if 'draft' in data:
data['draft'] = bool(data['draft'])
# provide a few default values
data.setdefault('state', koji.BUILD_STATES['COMPLETE'])
data.setdefault('start_time', 'NOW')
data.setdefault('completion_time', 'NOW')
data.setdefault('source', None)
data.setdefault('owner', context.session.user_id)
data.setdefault('task_id', None)
data.setdefault('volume_id', 0)
data.setdefault('draft', False)
# check for existing build
old_binfo = get_build(data)
if old_binfo:
old_str = '%(nvr)s (id=%(id)s)' % old_binfo
if data['draft']:
raise koji.GenericError(f'Target build already exists: {old_str}')
elif strict:
raise koji.GenericError(f'Existing build found: {old_str}')
recycle_build(old_binfo, data)
# Raises exception if there is a problem
return old_binfo['id']
koji.plugin.run_callbacks('preBuildStateChange', attribute='state', old=None,
new=data['state'], info=data)
# insert the new data
insert_data = dslice(data, ['pkg_id', 'version', 'release', 'epoch', 'draft', 'state',
'volume_id', 'task_id', 'owner', 'start_time', 'completion_time',
'source', 'extra'])
if 'cg_id' in data:
insert_data['cg_id'] = data['cg_id']
data['id'] = insert_data['id'] = nextval('build_id_seq')
# handle draft suffix in release
if data.get('draft'):
data['release'] = insert_data['release'] = koji.gen_draft_release(
data['release'], data['id']
)
# it's still possible to already have a build with the same nvr
draft_nvr = dslice(data, ['name', 'version', 'release'])
if find_build_id(draft_nvr):
raise koji.GenericError(
f"The build already exists: {draft_nvr}"
)
insert = InsertProcessor('build', data=insert_data)
insert.execute()
new_binfo = get_build(data['id'], strict=True)
koji.plugin.run_callbacks('postBuildStateChange', attribute='state', old=None,
new=data['state'], info=new_binfo)
# return build_id
return data['id']
def recycle_build(old, data):
"""Check to see if a build can by recycled and if so, update it"""
st_desc = koji.BUILD_STATES[old['state']]
if st_desc == 'BUILDING':
# check to see if this is the controlling task
if data['state'] == old['state'] and data.get('task_id', '') == old['task_id']:
# the controlling task must have restarted (and called initBuild again)
return
raise koji.GenericError("Build already in progress (task %(task_id)d)"
% old)
# TODO? - reclaim 'stale' builds (state=BUILDING and task_id inactive)
if st_desc not in ('FAILED', 'CANCELED'):
raise koji.GenericError("Build already exists (id=%d, state=%s): %r"
% (old['id'], st_desc, data))
# check for evidence of tag activity
query = QueryProcessor(columns=['tag_id'], tables=['tag_listing'],
clauses=['build_id = %(id)s'], values=old)
if query.execute():
raise koji.GenericError("Build already exists. Unable to recycle, "
"has tag history")
# check for rpms or archives
query = QueryProcessor(columns=['id'], tables=['rpminfo'],
clauses=['build_id = %(id)s'], values=old)
if query.execute():
raise koji.GenericError("Build already exists. Unable to recycle, "
"has rpm data")
query = QueryProcessor(columns=['id'], tables=['archiveinfo'],
clauses=['build_id = %(id)s'], values=old)
if query.execute():
raise koji.GenericError("Build already exists. Unable to recycle, "
"has archive data")
# If we reach here, should be ok to replace
koji.plugin.run_callbacks('preBuildStateChange', attribute='state',
old=old['state'], new=data['state'], info=data)
# If there is any old build type info, clear it
delete = DeleteProcessor(table='maven_builds', clauses=['build_id = %(id)i'], values=old)
delete.execute()
delete = DeleteProcessor(table='win_builds', clauses=['build_id = %(id)i'], values=old)
delete.execute()
delete = DeleteProcessor(table='image_builds', clauses=['build_id = %(id)i'], values=old)
delete.execute()
delete = DeleteProcessor(table='build_types', clauses=['build_id = %(id)i'], values=old)
delete.execute()
data['id'] = old['id']
update = UpdateProcessor('build', clauses=['id=%(id)s'], values=data)
update.set(**dslice(data,
['state', 'task_id', 'owner', 'start_time', 'completion_time',
'epoch', 'source', 'extra', 'volume_id']))
if 'cg_id' in data:
update.set(cg_id=data['cg_id'])
update.rawset(create_event='get_event()')
update.execute()
# delete stray files
for check_vol in list_volumes():
check_binfo = data.copy()
check_binfo['volume_id'] = check_vol['id']
check_binfo['volume_name'] = check_vol['name']
checkdir = koji.pathinfo.build(check_binfo)
if os.path.islink(checkdir):
logger.warning(f'Removing stray build symlink: {checkdir}')
os.unlink(checkdir)
elif os.path.exists(checkdir):
logger.warning(f'Removing stray build directory: {checkdir}')
koji.util.rmtree(checkdir)
buildinfo = get_build(data['id'], strict=True)
koji.plugin.run_callbacks('postBuildStateChange', attribute='state',
old=old['state'], new=data['state'], info=buildinfo)
def check_noarch_rpms(basepath, rpms, logs=None):
"""
If rpms contains any noarch rpms with identical names,
run rpmdiff against the duplicate rpms.
Return the list of rpms with any duplicate entries removed (only
the first entry will be retained).
"""
result = []
noarch_rpms = {}
if logs is None:
logs = {}
for relpath in rpms:
if relpath.endswith('.noarch.rpm'):
filename = os.path.basename(relpath)
if filename in noarch_rpms:
# duplicate found, add it to the duplicate list
# but not the result list
noarch_rpms[filename].append(relpath)
else:
noarch_rpms[filename] = [relpath]
result.append(relpath)
else:
result.append(relpath)
hashes = {}
for arch in logs:
for log in logs[arch]:
if os.path.basename(log) == 'noarch_rpmdiff.json':
task_hash = koji.load_json(joinpath(basepath, log))
for task_id in task_hash:
hashes[task_id] = task_hash[task_id]
for noarch_list in noarch_rpms.values():
if len(noarch_list) < 2:
continue
rpmdiff(basepath, noarch_list, hashes=hashes)
return result
def import_build(srpm, rpms, brmap=None, task_id=None, build_id=None, logs=None):
"""Import a build into the database (single transaction)
Files must be uploaded and specified with path relative to the workdir
Args:
srpm - relative path of srpm
rpms - list of rpms (relative paths)
brmap - dictionary mapping [s]rpms to buildroot ids
task_id - associate the build with a task
build_id - build is a finalization of existing entry
"""
if brmap is None:
brmap = {}
else:
convert_value(brmap, cast=dict, check_only=True)
convert_value(srpm, cast=str, check_only=True)
convert_value(rpms, cast=list, check_only=True)
koji.plugin.run_callbacks('preImport', type='build', srpm=srpm, rpms=rpms, brmap=brmap,
task_id=task_id, build_id=build_id, build=None, logs=logs)
uploadpath = koji.pathinfo.work()
# verify files exist
for relpath in [srpm] + rpms:
fn = "%s/%s" % (uploadpath, relpath)
if not os.path.exists(fn):
raise koji.GenericError("No such file: %s" % fn)
rpms = check_noarch_rpms(uploadpath, rpms, logs=logs)
# verify buildroot ids from brmap
found = {}
for br_id in brmap.values():
if br_id in found:
continue
found[br_id] = 1
# this will raise an exception if the buildroot id is invalid
BuildRoot(br_id)
# get build informaton
fn = "%s/%s" % (uploadpath, srpm)
build = koji.get_header_fields(fn, ('name', 'version', 'release', 'epoch',
'sourcepackage'))
if build['sourcepackage'] != 1:
raise koji.GenericError("not a source package: %s" % fn)
build['task_id'] = task_id
policy_data = {
'package': build['name'],
'version': build['version'],
'release': build['release'],
'buildroots': list(brmap.values()),
'import': True,
'import_type': 'rpm',
}
if task_id is not None:
policy_data.update(policy_data_from_task(task_id))
vol = check_volume_policy(policy_data, strict=False, default='DEFAULT')
build['volume_id'] = vol['id']
build['volume_name'] = vol['name']
if build_id is None:
# This should not be possible
logger.error('Calling import_build without a build_id is deprecated')
build_id = new_build(build)
binfo = get_build(build_id, strict=True)
new_typed_build(binfo, 'rpm')
else:
# build_id was passed in - sanity check
build['id'] = build_id
binfo = get_build(build_id, strict=True)
st_complete = koji.BUILD_STATES['COMPLETE']
st_old = binfo['state']
koji.plugin.run_callbacks('preBuildStateChange', attribute='state', old=st_old,
new=st_complete, info=binfo)
if binfo.get('draft'):
build['release'] = koji.gen_draft_release(build['release'], build['id'])
for key in ('name', 'version', 'release', 'epoch', 'task_id'):
if build[key] != binfo[key]:
raise koji.GenericError(
"Unable to complete build: %s mismatch (build: %s, rpm: %s)" %
(key, binfo[key], build[key]))
if binfo['state'] != koji.BUILD_STATES['BUILDING']:
raise koji.GenericError("Unable to complete build: state is %s"
% koji.BUILD_STATES[binfo['state']])
# update build state
update = UpdateProcessor('build', clauses=['id=%(id)s'], values=binfo)
update.set(state=st_complete)
update.rawset(completion_time='NOW()')
update.set(volume_id=build['volume_id'])
update.execute()
binfo = get_build(build_id, strict=True)
koji.plugin.run_callbacks('postBuildStateChange', attribute='state', old=st_old,
new=st_complete, info=binfo)
# now to handle the individual rpms
for relpath in [srpm] + rpms:
fn = "%s/%s" % (uploadpath, relpath)
rpminfo = import_rpm(fn, binfo, brmap.get(relpath))
import_rpm_file(fn, binfo, rpminfo)
add_rpm_sig(rpminfo['id'], koji.rip_rpm_sighdr(fn))
if logs:
for key, files in logs.items():
if not key:
key = None
for relpath in files:
fn = "%s/%s" % (uploadpath, relpath)
import_build_log(fn, binfo, subdir=key)
ensure_volume_symlink(binfo)
koji.plugin.run_callbacks('postImport', type='build', srpm=srpm, rpms=rpms, brmap=brmap,
task_id=task_id, build_id=build_id, build=binfo, logs=logs)
return binfo
def import_rpm(fn, buildinfo=None, brootid=None, wrapper=False, fileinfo=None):
"""Import a single rpm into the database
Designed to be called from import_build.
"""
if not os.path.exists(fn):
raise koji.GenericError("No such file: %s" % fn)
# read rpm info
hdr = koji.get_rpm_header(fn)
rpminfo = koji.get_header_fields(hdr, ['name', 'version', 'release', 'epoch',
'sourcepackage', 'arch', 'buildtime', 'sourcerpm'])
draft = True if buildinfo and buildinfo.get('draft') else False
rpminfo['draft'] = draft
if rpminfo['sourcepackage'] == 1:
rpminfo['arch'] = "src"
# sanity check basename
basename = os.path.basename(fn)
expected = "%(name)s-%(version)s-%(release)s.%(arch)s.rpm" % rpminfo
if basename != expected:
raise koji.GenericError("bad filename: %s (expected %s)" % (basename, expected))
if buildinfo is None:
# This only happens when we're called from importRPM
if draft:
# shouldn't happen with current code
raise koji.GenericError('rpm import is not supported for draft builds')
# the existing build got by rpminfo below should never be draft,
# because "," is an invalid char for rpm "release"
if rpminfo['sourcepackage'] == 1:
buildinfo = get_build(rpminfo, strict=False)
if not buildinfo:
# create a new build
build_id = new_build(rpminfo)
# we add the rpm build type below
buildinfo = get_build(build_id, strict=True)
else:
# figure it out from sourcerpm string
buildinfo = get_build(koji.parse_NVRA(rpminfo['sourcerpm']))
if buildinfo is None:
# XXX - handle case where package is not a source rpm
# and we still need to create a new build
raise koji.GenericError('No such build')
elif not wrapper:
# only enforce the srpm name matching the build for non-wrapper rpms
nvrinfo = buildinfo.copy()
if draft:
# for draft build, change release to target_release
nvrinfo['release'] = koji.parse_target_release(buildinfo['release'])
srpmname = "%(name)s-%(version)s-%(release)s.src.rpm" % nvrinfo
# either the sourcerpm field should match the build, or the filename
# itself (for the srpm)
if rpminfo['sourcepackage'] != 1:
if rpminfo['sourcerpm'] != srpmname:
raise koji.GenericError("srpm mismatch for %s: %s (expected %s)"
% (fn, rpminfo['sourcerpm'], srpmname))
elif basename != srpmname:
raise koji.GenericError("srpm mismatch for %s: %s (expected %s)"
% (fn, basename, srpmname))
state = koji.BUILD_STATES[buildinfo['state']]
if state in ('FAILED', 'CANCELED', 'DELETED'):
nvr = "%(name)s-%(version)s-%(release)s" % buildinfo
raise koji.GenericError("Build is %s: %s" % (state, nvr))
# if we're adding an rpm to it, then this build is of rpm type
# harmless if build already has this type
new_typed_build(buildinfo, 'rpm')
# add rpminfo entry
rpminfo['id'] = nextval('rpminfo_id_seq')
rpminfo['build_id'] = buildinfo['id']
rpminfo['size'] = os.path.getsize(fn)
rpminfo['payloadhash'] = koji.hex_string(koji.get_header_field(hdr, 'sigmd5'))
rpminfo['buildroot_id'] = brootid
rpminfo['external_repo_id'] = 0
# handle cg extra info
if fileinfo is not None:
extra = fileinfo.get('extra')
if extra is not None:
rpminfo['extra'] = json.dumps(extra)
koji.plugin.run_callbacks('preImport', type='rpm', rpm=rpminfo, build=buildinfo,
filepath=fn, fileinfo=fileinfo)
data = rpminfo.copy()
del data['sourcepackage']
del data['sourcerpm']
insert = InsertProcessor('rpminfo', data=data)
insert.execute()
koji.plugin.run_callbacks('postImport', type='rpm', rpm=rpminfo, build=buildinfo,
filepath=fn, fileinfo=fileinfo)
# extra fields for return
rpminfo['build'] = buildinfo
rpminfo['brootid'] = brootid
return rpminfo
def generate_token(nbytes=32):
"""
Generate random hex-string token of length 2 * nbytes
"""
return secrets.token_hex(nbytes=nbytes)
def get_reservation_token(build_id):
query = QueryProcessor(
tables=['build_reservations'],
columns=['build_id', 'token'],
clauses=['build_id = %(build_id)d'],
values=locals(),
)
return query.executeOne()
def clear_reservation(build_id):
'''Remove reservation entry for build'''
delete = DeleteProcessor(table='build_reservations', clauses=['build_id = %(build_id)i'],
values={'build_id': build_id})
delete.execute()
def cg_init_build(cg, data):
"""Create (reserve) a build_id for given data.
If build or reservation already exists, init_build will raise GenericError
:param str cg: content generator name
:param dict data: build data same as for new_build, for given usecase
only name,version,release,epoch keys make sense. Some
other values will be ignored anyway (owner, state, ...)
:return: dict with build_id and token
"""
assert_cg(cg)
cg_id = lookup_name('content_generator', cg, strict=True)['id']
data['owner'] = context.session.user_id
data['state'] = koji.BUILD_STATES['BUILDING']
data['completion_time'] = None
data['cg_id'] = cg_id
# CGs shouldn't have to worry about epoch
data.setdefault('epoch', None)
koji.check_NVR(data, strict=True)
build_id = new_build(data, strict=False)
# check potentially existing token
if get_reservation_token(build_id):
raise koji.GenericError("Build is already reserved")
# store token
token = generate_token()
insert = InsertProcessor(table='build_reservations')
insert.set(build_id=build_id, token=token)
insert.rawset(created='NOW()')
insert.execute()
return {'build_id': build_id, 'token': token}
def cg_refund_build(cg, build_id, token, state=koji.BUILD_STATES['FAILED']):
"""If build is reserved and not finished yet, there is an option
to release reservation and mark build either FAILED or CANCELED.
For this calling CG needs to know build_id and reservation token.
Refunded build behaves like any other failed/canceled build. So,
its nvr can be reclaimed again and get_next_release can return
this nvr.
:param str cg: content generator name
:param int build_id: build id
:param str token: token from CGInitBuild
:param int state: new state (koji.BUILD_STATES)
:return: None, on error raises exception
"""
if state not in (koji.BUILD_STATES['FAILED'], koji.BUILD_STATES['CANCELED']):
raise koji.GenericError("Only FAILED/CANCELED build states are allowed")
assert_cg(cg)
binfo = get_build(build_id, strict=True)
if binfo['state'] != koji.BUILD_STATES['BUILDING']:
raise koji.GenericError('Build ID %s is not in BUILDING state' % build_id)
build_token = get_reservation_token(build_id)
if not build_token or build_token['token'] != token:
raise koji.GenericError("Token doesn't match build ID %s" % build_id)
cg_id = lookup_name('content_generator', cg, strict=True)['id']
if binfo['cg_id'] != cg_id:
raise koji.GenericError('Build ID %s is not reserved by this CG' % build_id)
koji.plugin.run_callbacks('preBuildStateChange', attribute='state',
old=koji.BUILD_STATES['BUILDING'], new=state, info=binfo)
update = UpdateProcessor('build', values={'id': build_id}, clauses=["id = %(id)s"])
update.set(state=state)
update.rawset(completion_time='NOW()')
update.execute()
binfo = get_build(build_id, strict=True)
koji.plugin.run_callbacks('postBuildStateChange', attribute='state',
old=koji.BUILD_STATES['BUILDING'], new=state, info=binfo)
clear_reservation(build_id)
def cg_import(metadata, directory, token=None):
"""Import build from a content generator
metadata can be one of the following
- json encoded string representing the metadata
- a dictionary (parsed metadata)
- a filename containing the metadata
:param metadata: describes the content for this build.
:param str directory: directory on the hub where files are located
:param str token: (optional) a reservation token for this build.
You obtain a token from the CGInitBuild method.
If you specify a token, you must also specify a build_id
in the metadata.
:returns: buildinfo dict
"""
importer = CG_Importer()
return importer.do_import(metadata, directory, token)
class CG_Importer(object):
def __init__(self):
self.buildinfo = None
self.metadata_only = False
self._cg_log_file = None
def do_import(self, metadata, directory, token=None):
metadata = self.get_metadata(metadata, directory)
self.directory = directory
metaver = metadata['metadata_version']
if metaver != 0:
raise koji.GenericError("No such metadata version: %r" % metaver)
# TODO: basic metadata sanity check (use jsonschema?)
self.assert_cg_access()
# prepare data for import
self.prep_build(token)
self.prep_brs()
self.prep_outputs()
self.assert_policy()
self.set_volume()
self.check_build_dir()
koji.plugin.run_callbacks('preImport', type='cg', metadata=metadata,
directory=directory)
# finalize import
self.get_build(token)
self.import_brs()
try:
self.import_outputs()
self.import_metadata()
except Exception:
self.check_build_dir(delete=True)
raise
self.move_cg_log_file()
koji.plugin.run_callbacks('postImport', type='cg', metadata=metadata,
directory=directory, build=self.buildinfo)
return self.buildinfo
def move_cg_log_file(self):
if self._cg_log_file is not None:
logsdir = joinpath(koji.pathinfo.build(self.buildinfo), 'data/logs/')
koji.ensuredir(logsdir)
path = joinpath(logsdir, 'cg_import.log')
self.log('CG import was SUCCESSFUL.')
safer_move(self._cg_log_path, path)
def get_metadata(self, metadata, directory):
"""Get the metadata from the args"""
if isinstance(metadata, dict):
self.metadata = metadata
try:
self.raw_metadata = json.dumps(metadata, indent=2)
except Exception:
logger.exception("Cannot encode supplied metadata")
raise koji.GenericError("Invalid metadata, cannot encode: %r" % metadata)
return metadata
if metadata is None:
# default to looking for uploaded file
metadata = 'metadata.json'
convert_value(metadata, cast=str, check_only=True)
if metadata.endswith('.json'):
# handle uploaded metadata
workdir = koji.pathinfo.work()
path = joinpath(workdir, directory, metadata)
if not os.path.exists(path):
raise koji.GenericError("No such file: %s" % metadata)
with open(path, 'rt', encoding='utf-8') as fo:
metadata = fo.read()
self.raw_metadata = metadata
self.metadata = parse_json(metadata, desc='metadata')
return self.metadata
def assert_cg_access(self):
"""Check that user has access for all referenced content generators"""
cg_id = None
for brdata in self.metadata['buildroots']:
cginfo = brdata['content_generator']
cg = lookup_name('content_generator', cginfo['name'], strict=True)
if cg_id is None:
cg_id = cg['id']
elif cg_id != cg['id']:
raise koji.GenericError("Koji now support only one content-generator per import")
brdata['cg_id'] = cg_id
assert_cg(cg_id)
self.cg = cg_id
def assert_policy(self):
policy_data = {
'package': self.buildinfo['name'],
'version': self.buildinfo['version'],
'release': self.buildinfo['release'],
'btypes': list(self.typeinfo),
'source': self.buildinfo.get('source'),
'draft': self.buildinfo.get('draft'),
'metadata_only': self.metadata_only,
'cg_list': [self.cg],
# TODO: provide more data
}
assert_policy('cg_import', policy_data)
def set_volume(self):
"""Use policy to determine what the volume should be"""
# we have to be careful and provide sufficient data
policy_data = {
'package': self.buildinfo['name'],
'version': self.buildinfo['version'],
'release': self.buildinfo['release'],
'source': self.buildinfo['source'],
'cg_list': [self.cg],
'import': True,
'import_type': 'cg',
}
vol = check_volume_policy(policy_data, strict=False)
if vol:
self.buildinfo['volume_id'] = vol['id']
self.buildinfo['volume_name'] = vol['name']
def check_build_dir(self, delete=False):
"""Check that the import directory does not already exist"""
path = koji.pathinfo.build(self.buildinfo)
if os.path.lexists(path):
if delete:
self.log_warning("Deleting build directory: %s" % path)
koji.util.rmtree(path)
else:
raise koji.GenericError("Destination directory already exists: %s" % path)
@classmethod
def get_task_id_from_metadata(cls, metadata):
"""Extract task_id from metadata"""
binfo = metadata['build']
task_id = None
if 'task_id' in binfo:
task_id = convert_value(binfo['task_id'], cast=int)
if 'container_koji_task_id' in binfo.get('extra', {}):
task_id2 = convert_value(binfo['extra']['container_koji_task_id'], cast=int)
if task_id is not None and task_id != task_id2:
raise koji.GenericError(f"CG provided non-matching task_id {task_id} "
f"and container_koji_task_id {task_id2}")
return task_id2
return task_id
def prep_build(self, token=None):
metadata = self.metadata
if metadata['build'].get('build_id'):
cg_id = self.cg
build_id = metadata['build']['build_id']
buildinfo = get_build(build_id, strict=True)
build_token = get_reservation_token(build_id)
task_id = self.get_task_id_from_metadata(metadata)
if not build_token or build_token['token'] != token:
raise koji.GenericError("Token doesn't match build ID %s" % build_id)
if buildinfo['cg_id'] != cg_id:
raise koji.GenericError('Build ID %s is not reserved by this CG' % build_id)
if buildinfo['task_id'] and buildinfo['task_id'] != task_id:
raise koji.GenericError('Build is owned by task %(task_id)s' % buildinfo)
if buildinfo['state'] != koji.BUILD_STATES['BUILDING']:
raise koji.GenericError('Build ID %s is not in BUILDING state' % build_id)
if buildinfo['draft'] != metadata['build'].get('draft', False):
raise koji.GenericError("Draft field does not match reservation (build id = %s)"
% build_id)
if (buildinfo['name'] != metadata['build']['name'] or
buildinfo['version'] != metadata['build']['version']):
raise koji.GenericError("Build (%i) NVR is different" % build_id)
# release is complicated by draft field
if buildinfo['draft']:
# metadata should have the target release, convert it before we check
release = koji.gen_draft_release(metadata['build']['release'], build_id)
else:
release = metadata['build']['release']
if buildinfo['release'] != release:
raise koji.GenericError("Build (%i) NVR is different" % build_id)
if ('epoch' in metadata['build'] and
buildinfo['epoch'] != metadata['build']['epoch']):
raise koji.GenericError("Build (%i) epoch is different"
% build_id)
elif token is not None:
raise koji.GenericError('Reservation token given, but no build_id '
'in metadata')
else:
# no build reservation
buildinfo = get_build(metadata['build'], strict=False)
if buildinfo:
if (koji.BUILD_STATES[buildinfo['state']] not in ('CANCELED', 'FAILED')):
raise koji.GenericError("Build already exists: %(nvr)s (id=%(id)s)"
% buildinfo)
# note: the checks in recycle_build will also apply when we call new_build later
# our state check is stricter than the one in recycle_build
# gather needed data
buildinfo = dslice(metadata['build'], ['name', 'version', 'release', 'extra', 'source'])
if 'build_id' in metadata['build']:
buildinfo['build_id'] = metadata['build']['build_id']
# epoch is not in the metadata spec, but we allow it to be specified
buildinfo['epoch'] = metadata['build'].get('epoch', None)
buildinfo['draft'] = metadata['build'].get('draft', False)
buildinfo['start_time'] = convert_timestamp(float(metadata['build']['start_time']))
buildinfo['completion_time'] = convert_timestamp(float(metadata['build']['end_time']))
owner = metadata['build'].get('owner', None)
# get task id from OSBS or from standard place
buildinfo['task_id'] = self.get_task_id_from_metadata(metadata)
if owner:
if not isinstance(owner, str):
raise koji.GenericError("Invalid owner format (expected username): %s" % owner)
buildinfo['owner'] = get_user(owner, strict=True)['id']
buildinfo['cg_id'] = self.cg
self.buildinfo = buildinfo
koji.check_NVR(buildinfo, strict=True)
# get typeinfo
buildinfo.setdefault('extra', {})
b_extra = buildinfo['extra']
b_extra.setdefault('typeinfo', {})
typeinfo = b_extra['typeinfo']
# legacy types can be at top level of extra
for btype in ['maven', 'win', 'image']:
if btype not in b_extra:
continue
if btype in typeinfo:
# he says they've already got one
raise koji.GenericError('Duplicate typeinfo for %r' % btype)
typeinfo[btype] = b_extra[btype]
# sanity check
for btype in typeinfo:
lookup_name('btype', btype, strict=True)
self.typeinfo = typeinfo
return buildinfo
def get_build(self, token=None):
if token:
# token and reservation were already checked in prep_build
buildinfo = self.update_build()
build_id = buildinfo['build_id']
else:
# no reservation, we need create a new build entry
build_id = new_build(self.buildinfo)
buildinfo = get_build(build_id, strict=True)
# handle special build types
for btype in self.typeinfo:
tinfo = self.typeinfo[btype]
if btype == 'maven':
new_maven_build(buildinfo, tinfo)
elif btype == 'win':
new_win_build(buildinfo, tinfo)
elif btype == 'image':
# no extra info tracked at build level
new_image_build(buildinfo)
else:
new_typed_build(buildinfo, btype)
# rpm builds not required to have typeinfo
if 'rpm' not in self.typeinfo:
# if the build contains rpms then it has the rpm type
if [o for o in self.prepped_outputs if o['type'] == 'rpm']:
new_typed_build(buildinfo, 'rpm')
self.buildinfo = buildinfo
return buildinfo
def update_build(self):
"""Update a reserved build"""
# sanity checks performed by prep_build
build_id = self.buildinfo['build_id']
old_info = get_build(build_id, strict=True)
if self.buildinfo.get('extra'):
extra = json.dumps(self.buildinfo['extra'])
else:
extra = None
owner = self.buildinfo.get('owner', context.session.user_id)
source = self.buildinfo.get('source')
task_id = self.buildinfo['task_id']
st_complete = koji.BUILD_STATES['COMPLETE']
st_old = old_info['state']
koji.plugin.run_callbacks('preBuildStateChange', attribute='state', old=st_old,
new=st_complete, info=old_info)
update = UpdateProcessor(
'build',
clauses=['id=%(build_id)s'],
values=self.buildinfo,
data={
'state': st_complete,
'extra': extra,
'owner': owner,
'source': source,
'task_id': task_id,
},
rawdata={'completion_time': 'NOW()'},
)
if self.buildinfo.get('volume_id'):
# reserved builds have reapplied volume policy now
update.set(volume_id=self.buildinfo['volume_id'])
update.execute()
buildinfo = get_build(build_id, strict=True)
clear_reservation(build_id)
koji.plugin.run_callbacks('postBuildStateChange', attribute='state', old=st_old,
new=st_complete, info=buildinfo)
return buildinfo
def import_metadata(self):
"""Import the raw metadata"""
# TODO - eventually, import this as an archive, but for now we just write it to disk
# because there are complications
# - no buildroot (could confuse policies checking that builds were built sanely
# - doesn't fit with current major archive categories
builddir = koji.pathinfo.build(self.buildinfo)
koji.ensuredir(builddir)
path = joinpath(builddir, 'metadata.json')
with open(path, 'wt', encoding='utf-8') as fo:
fo.write(self.raw_metadata)
def prep_brs(self):
metadata = self.metadata
br_used = set([f['buildroot_id'] for f in metadata['output']])
br_idx = {}
for brdata in metadata['buildroots']:
brfakeid = brdata['id']
if brfakeid not in br_used:
raise koji.GenericError("Buildroot id not used in output: %r" % brfakeid)
if brfakeid in br_idx:
raise koji.GenericError("Duplicate buildroot id in metadata: %r" % brfakeid)
br_idx[brfakeid] = self.prep_buildroot(brdata)
self.br_prep = br_idx
def import_brs(self):
brmap = {}
for brfakeid in self.br_prep:
entry = self.br_prep[brfakeid]
brmap[brfakeid] = self.import_buildroot(entry)
self.brmap = brmap
def prep_buildroot(self, brdata):
ret = {}
brinfo = {
'cg_id': brdata['cg_id'],
'cg_version': brdata['content_generator']['version'],
'container_type': brdata['container']['type'],
'container_arch': brdata['container']['arch'],
'host_os': brdata['host']['os'],
'host_arch': brdata['host']['arch'],
'extra': brdata.get('extra'),
}
rpmlist, archives = self.match_components(brdata['components'])
ret = {
'brinfo': brinfo,
'rpmlist': rpmlist,
'archives': archives,
'tools': brdata['tools'],
}
return ret
def import_buildroot(self, entry):
"""Import the prepared buildroot data"""
# buildroot entry
br = BuildRoot()
br.cg_new(entry['brinfo'])
# buildroot components
br.setList(entry['rpmlist'])
br.updateArchiveList(entry['archives'])
# buildroot_tools_info
br.setTools(entry['tools'])
return br
def match_components(self, components):
rpms = []
files = []
for comp in components:
if comp['type'] == 'rpm':
match = self.match_rpm(comp)
if match:
rpms.append(match)
elif comp['type'] == 'file':
match = self.match_file(comp)
if match:
files.append(match)
elif comp['type'] == 'kojifile':
match = self.match_kojifile(comp)
if match:
files.append(match)
else:
raise koji.GenericError("No such component type: %(type)s" % comp)
return rpms, files
def log(self, msg, level=logging.WARNING):
if self._cg_log_file is None:
log_dir = joinpath(koji.pathinfo.work(), 'cg_import_logs')
koji.ensuredir(log_dir)
fd, fpath = tempfile.mkstemp(dir=log_dir, suffix="-cg_import.log", text=True)
self._cg_log_path = fpath
self._cg_log_file = os.fdopen(fd, 'wt')
logger.log(level=level, msg=msg)
self._cg_log_file.write(msg + '\n')
self._cg_log_file.flush()
log_info = functools.partialmethod(log, level=logging.INFO)
log_warning = functools.partialmethod(log, level=logging.WARNING)
log_error = functools.partialmethod(log, level=logging.ERROR)
def match_rpm(self, comp):
# TODO: do we allow inclusion of external rpms?
if 'location' in comp:
raise koji.GenericError("External rpms not allowed")
if 'id' in comp:
# not in metadata spec, and will confuse get_rpm
raise koji.GenericError("Unexpected 'id' field in component")
# rpm is no more unique with NVRA as draft build is introduced
rinfo = get_rpm(comp, strict=False)
if not rinfo:
# XXX - this is a temporary workaround until we can better track external refs
self.log_warning("IGNORING unmatched rpm component: %r" % comp)
return None
# TODO: we should consider how to handle them once draft build is enabled for CG
reject_draft(rinfo, is_rpm=True)
if rinfo['payloadhash'] != comp['sigmd5']:
# XXX - this is a temporary workaround until we can better track external refs
self.log_warning("IGNORING rpm component (md5 mismatch): %r" % comp)
# nvr = "%(name)s-%(version)s-%(release)s" % rinfo
# raise koji.GenericError("md5sum mismatch for %s: %s != %s"
# % (nvr, comp['sigmd5'], rinfo['payloadhash']))
# TODO - should we check the signature field?
return rinfo
def match_file(self, comp):
# hmm, how do we look up archives?
# updateMavenBuildRootList does seriously wild stuff
# only unique field in archiveinfo is id
# checksum/checksum_type only works if type matches
# at the moment, we only have md5 entries in archiveinfo
type_mismatches = 0
for archive in list_archives(filename=comp['filename'], size=comp['filesize']):
if archive['checksum_type'] != koji.CHECKSUM_TYPES[comp['checksum_type']]:
type_mismatches += 1
continue
if archive['checksum'] == comp['checksum']:
return archive
# else
self.log_error("Failed to match archive %(filename)s (size %(filesize)s, "
"sum %(checksum)s" % comp)
if type_mismatches:
self.log_error("Match failed with %i type mismatches" % type_mismatches)
# TODO: allow external archives
# XXX - this is a temporary workaround until we can better track external refs
self.log_warning("IGNORING unmatched archive: %r" % comp)
return None
# raise koji.GenericError("No match: %(filename)s (size %(filesize)s, sum %(checksum)s" %
# comp)
def match_kojifile(self, comp):
"""Look up the file by archive id and sanity check the other data"""
assert (comp['type'] == 'kojifile')
archive = get_archive(comp['archive_id'], strict=True)
build = get_build(archive['build_id'], strict=True)
for key in ['nvr', 'filename']:
if key not in comp:
raise koji.GenericError('%s field missing for component, '
'archive_id=%s' % (key, archive['id']))
expected = {
'nvr': build['nvr'],
'filename': archive['filename'],
'filesize': int(archive['size']),
'checksum': archive['checksum'],
'checksum_type': koji.CHECKSUM_TYPES[archive['checksum_type']],
}
for key in expected:
if key in comp and expected[key] != comp[key]:
raise koji.GenericError('Component field %s does not match for '
'archive_id=%s: %s != %s' % (key, archive['id'],
expected[key], comp[key]))
return archive
def prep_outputs(self):
metadata = self.metadata
outputs = []
for fileinfo in metadata['output']:
fileinfo = fileinfo.copy() # [!]
if fileinfo.get('metadata_only', False):
self.metadata_only = True
workdir = koji.pathinfo.work()
path = joinpath(workdir, self.directory, fileinfo.get('relpath', ''),
fileinfo['filename'])
fileinfo['hub.path'] = path
filesize = os.path.getsize(path)
if filesize != fileinfo['filesize']:
raise koji.GenericError(
"File size %s for %s (expected %s) doesn't match. Corrupted upload?" %
(filesize, fileinfo['filename'], fileinfo['filesize']))
# checksum
with open(path, 'rb') as fp:
chksum = get_verify_class(fileinfo['checksum_type'])()
while True:
contents = fp.read(8192)
if not contents:
break
chksum.update(contents)
if fileinfo['checksum'] != chksum.hexdigest():
raise koji.GenericError("File checksum mismatch for %s: %s != %s" %
(fileinfo['filename'], fileinfo['checksum'],
chksum.hexdigest()))
fileinfo['hub.checked_hash'] = True
if fileinfo['buildroot_id'] not in self.br_prep:
raise koji.GenericError("Missing buildroot metadata for id %(buildroot_id)r" %
fileinfo)
if fileinfo['type'] not in ['rpm', 'log']:
self.prep_archive(fileinfo)
if fileinfo['type'] == 'rpm':
if fileinfo.get('subdir'):
raise koji.GenericError("subdir field not allowed for rpm outputs")
koji.check_NVRA(fileinfo['filename'], strict=True)
outputs.append(fileinfo)
self.prepped_outputs = outputs
def import_outputs(self):
for fileinfo in self.prepped_outputs:
brinfo = self.brmap.get(fileinfo['buildroot_id'])
if not brinfo:
# should not happen
logger.error("No buildroot mapping for file: %r", fileinfo)
raise koji.GenericError("Unable to map buildroot %(buildroot_id)s" % fileinfo)
if fileinfo['type'] == 'rpm':
self.import_rpm(self.buildinfo, brinfo, fileinfo)
elif fileinfo['type'] == 'log':
self.import_log(self.buildinfo, fileinfo)
else:
self.import_archive(self.buildinfo, brinfo, fileinfo)
ensure_volume_symlink(self.buildinfo)
def prep_archive(self, fileinfo):
# determine archive import type
extra = fileinfo.get('extra', {})
legacy_types = ['maven', 'win', 'image']
btype = None
type_info = None
for key in extra:
if key not in legacy_types:
continue
if btype is not None:
raise koji.GenericError("Output file has multiple types: "
"%(filename)s" % fileinfo)
btype = key
type_info = extra[key]
if fileinfo.get('subdir'):
raise koji.GenericError("subdir field not allowed for legacy btypes")
for key in extra.get('typeinfo', {}):
if btype == key:
raise koji.GenericError("Duplicate typeinfo for: %r" % btype)
elif btype is not None:
raise koji.GenericError("Output file has multiple types: "
"%(filename)s" % fileinfo)
btype = key
type_info = extra['typeinfo'][key]
if btype is None:
raise koji.GenericError("No typeinfo for: %(filename)s" % fileinfo)
if btype not in self.typeinfo:
raise koji.GenericError('Output type %s not listed in build '
'types' % btype)
fileinfo['hub.btype'] = btype
fileinfo['hub.type_info'] = type_info
if 'components' in fileinfo:
if btype in ('maven', 'win'):
raise koji.GenericError("Component list not allowed for "
"archives of type %s" % btype)
# for new types, we trust the metadata
components = fileinfo['components']
rpmlist, archives = self.match_components(components)
# TODO - note presence of external components
fileinfo['hub.rpmlist'] = rpmlist
fileinfo['hub.archives'] = archives
def import_rpm(self, buildinfo, brinfo, fileinfo):
if fileinfo.get('metadata_only', False):
raise koji.GenericError('Metadata-only imports are not supported for rpms')
# TODO - support for rpms too
fn = fileinfo['hub.path']
rpminfo = import_rpm(fn, buildinfo, brinfo.id, fileinfo=fileinfo)
import_rpm_file(fn, buildinfo, rpminfo)
add_rpm_sig(rpminfo['id'], koji.rip_rpm_sighdr(fn))
def import_log(self, buildinfo, fileinfo):
if fileinfo.get('metadata_only', False):
# logs are not currently tracked, so this is a no op
return
subdir = fileinfo.get('subdir')
fn = fileinfo['hub.path']
import_build_log(fn, buildinfo, subdir=subdir)
def import_archive(self, buildinfo, brinfo, fileinfo):
fn = fileinfo['hub.path']
btype = fileinfo['hub.btype']
type_info = fileinfo['hub.type_info']
archiveinfo = import_archive_internal(fn, buildinfo, btype, type_info, brinfo.id, fileinfo)
if 'components' in fileinfo:
self.import_components(archiveinfo['id'], fileinfo)
def import_components(self, archive_id, fileinfo):
rpmlist = fileinfo['hub.rpmlist']
archives = fileinfo['hub.archives']
if rpmlist:
insert = BulkInsertProcessor('archive_rpm_components')
for rpminfo in rpmlist:
insert.add_record(archive_id=archive_id, rpm_id=rpminfo['id'])
insert.execute()
if archives:
insert = BulkInsertProcessor('archive_components')
for archiveinfo in archives:
insert.add_record(archive_id=archive_id, component_id=archiveinfo['id'])
insert.execute()
def add_external_rpm(rpminfo, external_repo, strict=True):
"""Add an external rpm entry to the rpminfo table
Differences from import_rpm:
- entry will have non-zero external_repo_id
- entry will not reference a build
- rpm not available to us -- the necessary data is passed in
The rpminfo arg should contain the following fields:
- name, version, release, epoch, arch, payloadhash, size, buildtime
Returns info as get_rpm
"""
# [!] Calling function should perform access checks
# sanity check rpminfo
dtypes = (
('name', str),
('version', str),
('release', str),
('epoch', (int, type(None))),
('arch', str),
('payloadhash', str),
('size', int),
('buildtime', int))
for field, allowed in dtypes:
if field not in rpminfo:
raise koji.GenericError("%s field missing: %r" % (field, rpminfo))
if not isinstance(rpminfo[field], allowed):
# this will catch unwanted NULLs
raise koji.GenericError("Invalid value for %s: %r" % (field, rpminfo[field]))
# strip extra fields
rpminfo = dslice(rpminfo, [x[0] for x in dtypes])
# TODO: more sanity checks for payloadhash
def check_dup():
# Check to see if we have it
data = rpminfo.copy()
data['location'] = external_repo
previous = get_rpm(data, strict=False)
if previous:
disp = "%(name)s-%(version)s-%(release)s.%(arch)s@%(external_repo_name)s" % previous
if strict:
raise koji.GenericError("external rpm already exists: %s" % disp)
elif data['payloadhash'] != previous['payloadhash']:
raise koji.GenericError("hash changed for external rpm: %s (%s -> %s)"
% (disp, previous['payloadhash'], data['payloadhash']))
else:
return previous
previous = check_dup()
if previous:
return previous
# add rpminfo entry
data = rpminfo.copy()
data['external_repo_id'] = get_external_repo_id(external_repo, strict=True)
data['id'] = nextval('rpminfo_id_seq')
data['build_id'] = None
data['buildroot_id'] = None
insert = InsertProcessor('rpminfo', data=data)
savepoint = Savepoint('pre_insert')
try:
insert.execute()
except Exception:
# if this failed, it likely duplicates one just inserted
# see: https://pagure.io/koji/issue/788
savepoint.rollback()
previous = check_dup()
if previous:
return previous
raise
return get_rpm(data['id'])
def import_build_log(fn, buildinfo, subdir=None):
"""Move a logfile related to a build to the right place"""
logdir = koji.pathinfo.build_logs(buildinfo)
if subdir:
logdir = joinpath(logdir, subdir)
koji.ensuredir(logdir)
final_path = joinpath(logdir, os.path.basename(fn))
if os.path.exists(final_path):
raise koji.GenericError("Error importing build log. %s already exists." % final_path)
if os.path.islink(fn) or not os.path.isfile(fn):
raise koji.GenericError("Error importing build log. %s is not a regular file." % fn)
move_and_symlink(fn, final_path)
def import_rpm_file(fn, buildinfo, rpminfo):
"""Move the rpm file into the proper place
Generally this is done after the db import
"""
final_path = "%s/%s" % (koji.pathinfo.build(buildinfo), koji.pathinfo.rpm(rpminfo))
_import_archive_file(fn, os.path.dirname(final_path))
def _import_wrapper(task_id, build_info, rpm_results):
"""Helper function to import wrapper rpms for a Maven build"""
rpm_buildroot_id = rpm_results['buildroot_id']
rpm_task_dir = koji.pathinfo.task(task_id)
for rpm_path in [rpm_results['srpm']] + rpm_results['rpms']:
rpm_path = joinpath(rpm_task_dir, rpm_path)
rpm_info = import_rpm(rpm_path, build_info, rpm_buildroot_id, wrapper=True)
import_rpm_file(rpm_path, build_info, rpm_info)
add_rpm_sig(rpm_info['id'], koji.rip_rpm_sighdr(rpm_path))
for log in rpm_results['logs']:
# assume we're only importing noarch packages
import_build_log(joinpath(rpm_task_dir, log),
build_info, subdir='noarch')
def merge_scratch(task_id):
"""Import rpms from a scratch build into an existing build, retaining
buildroot metadata and build logs."""
task = Task(task_id)
try:
task_info = task.getInfo(request=True)
except koji.GenericError:
raise koji.ImportError('No such task: %s' % task_id)
task_params = koji.tasks.parse_task_params(task_info['method'], task_info['request'])
if task_info['state'] != koji.TASK_STATES['CLOSED']:
raise koji.ImportError('task %s did not complete successfully' % task_id)
if task_info['method'] != 'build':
raise koji.ImportError('task %s is not a build task' % task_id)
if not task_params.get('opts', {}).get('scratch'):
raise koji.ImportError('task %s is not a scratch build' % task_id)
# sanity check the task, and extract data required for import
srpm = None
tasks = {}
for child in task.getChildren():
if child['method'] != 'buildArch':
continue
info = {'rpms': [],
'logs': []}
for output in list_task_output(child['id']):
if output.endswith('.src.rpm'):
srpm_name = os.path.basename(output)
if not srpm:
srpm = srpm_name
else:
if srpm != srpm_name:
raise koji.ImportError('task srpm names do not match: %s, %s' %
(srpm, srpm_name))
elif output.endswith('.noarch.rpm'):
continue
elif output.endswith('.rpm'):
rpminfo = koji.parse_NVRA(os.path.basename(output))
if 'arch' not in info:
info['arch'] = rpminfo['arch']
elif info['arch'] != rpminfo['arch']:
raise koji.ImportError('multiple arches generated by task %s: %s, %s' %
(child['id'], info['arch'], rpminfo['arch']))
info['rpms'].append(output)
elif output.endswith('.log'):
info['logs'].append(output)
if not info['rpms']:
continue
if not info['logs']:
raise koji.ImportError('task %s is missing logs' % child['id'])
buildroots = query_buildroots(taskID=child['id'],
queryOpts={'order': '-id', 'limit': 1})
if not buildroots:
raise koji.ImportError('no buildroot associated with task %s' % child['id'])
info['buildroot_id'] = buildroots[0]['id']
tasks[child['id']] = info
if not tasks:
raise koji.ImportError('nothing to do for task %s' % task_id)
# sanity check the build
build_nvr = koji.parse_NVRA(srpm)
build = get_build(build_nvr)
if not build:
raise koji.ImportError('no such build: %(name)s-%(version)s-%(release)s' %
build_nvr)
reject_draft(build, koji.ImportError(f"build to import is a draft build: {build['nvr']}"))
if build['state'] != koji.BUILD_STATES['COMPLETE']:
raise koji.ImportError('%s did not complete successfully' % build['nvr'])
if not build['task_id']:
raise koji.ImportError('no task for %s' % build['nvr'])
# Intentionally skip checking the build task state.
# There are cases where the build can be valid even though the task has failed,
# e.g. tagging failures.
# Compare SCM URLs only if build from an SCM
build_task_info = Task(build['task_id']).getInfo(request=True)
build_task_params = koji.tasks.parse_task_params(build_task_info['method'],
build_task_info['request'])
if 'src' in task_params and SCM.is_scm_url(task_params['src']):
# compare the task and build and make sure they are compatible with importing
if task_params['src'] != build_task_params['src']:
raise koji.ImportError('SCM URLs for the task and build do not match: %s, %s' %
(task_params['src'], build_task_params['src']))
build_arches = set()
for rpminfo in list_rpms(buildID=build['id']):
if rpminfo['arch'] == 'src':
build_srpm = '%s.src.rpm' % rpminfo['nvr']
if srpm != build_srpm:
raise koji.ImportError('task and build srpm names do not match: %s, %s' %
(srpm, build_srpm))
elif rpminfo['arch'] == 'noarch':
continue
else:
build_arches.add(rpminfo['arch'])
if not build_arches:
raise koji.ImportError('no arch-specific rpms found for %s' % build['nvr'])
task_arches = set([t['arch'] for t in tasks.values()])
overlapping_arches = task_arches.intersection(build_arches)
if overlapping_arches:
raise koji.ImportError('task %s and %s produce rpms with the same arches: %s' %
(task_info['id'], build['nvr'], ', '.join(overlapping_arches)))
# everything looks good, do the import
for task_id, info in tasks.items():
taskpath = koji.pathinfo.task(task_id)
for filename in info['rpms']:
filepath = os.path.realpath(joinpath(taskpath, filename))
rpminfo = import_rpm(filepath, build, info['buildroot_id'])
import_rpm_file(filepath, build, rpminfo)
add_rpm_sig(rpminfo['id'], koji.rip_rpm_sighdr(filepath))
for logname in info['logs']:
logpath = os.path.realpath(joinpath(taskpath, logname))
import_build_log(logpath, build, subdir=info['arch'])
# flag tags whose content has changed, so relevant repos can be regen'ed
for tag in list_tags(build=build['id']):
set_tag_update(tag['id'], 'IMPORT')
return build['id']
def get_archive_types():
"""Return a list of all supported archive types."""
query = QueryProcessor(tables=['archivetypes'],
columns=['id', 'name', 'description', 'extensions', 'compression_type'],
opts={'order': 'id'})
return query.execute()
def _get_archive_type_by_name(name, strict=True):
query = QueryProcessor(tables=['archivetypes'],
columns=['id', 'name', 'description', 'extensions', 'compression_type'],
clauses=['name = %(name)s'],
values={'name': name})
return query.executeOne(strict=strict)
def _get_archive_type_by_id(type_id, strict=False):
query = QueryProcessor(tables=['archivetypes'],
columns=['id', 'name', 'description', 'extensions', 'compression_type'],
clauses=['id = %(type_id)i'],
values={'type_id': type_id})
return query.executeOne(strict=strict)
def get_archive_type(filename=None, type_name=None, type_id=None, strict=False):
"""
Get the archive type for the given filename, type_name, or type_id.
"""
if type_id:
return _get_archive_type_by_id(type_id, strict)
elif type_name:
return _get_archive_type_by_name(type_name, strict)
elif filename:
convert_value(filename, cast=str, check_only=True)
else:
raise koji.GenericError('one of filename, type_name, or type_id must be specified')
# otherwise match the filename
query = QueryProcessor(
tables=['archivetypes'],
columns=['id', 'name', 'description', 'extensions', 'compression_type'],
clauses=[r"%(ext)s IN (SELECT lower(s)"
r" FROM unnest(regexp_split_to_array(extensions, '\s+')) AS s)"],
)
# match longest extension first. e.g. .tar.gz before .gz
parts = filename.lower().split('.')
for start in range(len(parts)):
ext = '.'.join(parts[start:])
query.values['ext'] = ext
results = query.execute()
if len(results) == 1:
return results[0]
elif len(results) > 1:
# this should never happen, and is a misconfiguration in the database
raise koji.GenericError('multiple matches for file extension: %s' % ext)
# otherwise
if strict:
raise koji.GenericError('unsupported file extension: %s' % filename)
else:
return None
def add_archive_type(name, description, extensions, compression_type=None):
"""
Add new archive type.
Use this to tell Koji about new builds' files' extensions before
importing the files.
:param str name: archive type name, eg. "yaml"
:param str description: eg. "YAML Ain't Markup Language"
:param str extensions: space-separated list of descriptions, eg. "yaml yml"
"""
context.session.assertPerm('admin')
verify_name_internal(name)
convert_value(description, cast=str, check_only=True)
convert_value(extensions, cast=str, check_only=True)
convert_value(compression_type, cast=str, none_allowed=True, check_only=True)
if compression_type not in ['zip', 'tar', None]:
raise koji.GenericError(f"Unsupported compression type {compression_type}")
data = {'name': name,
'description': description,
'extensions': extensions,
'compression_type': compression_type,
}
if get_archive_type(type_name=name):
raise koji.GenericError(f"archivetype {name} already exists")
# No invalid or duplicate extensions
for ext in extensions.split(' '):
if not ext.replace('.', '').isalnum():
raise koji.GenericError(f'No such {ext} file extension')
query = QueryProcessor(tables=['archivetypes'], columns=['id'],
clauses=[f"extensions ~* E'(\\s|^){ext}(\\s|$)'"], values={})
results = query.execute()
if len(results) > 0:
raise koji.GenericError(f'file extension {ext} already exists')
insert = InsertProcessor('archivetypes', data=data)
insert.execute()
def new_maven_build(build, maven_info):
"""
Add Maven metadata to an existing build.
maven_info must contain the 'group_id',
'artifact_id', and 'version' keys.
"""
if not isinstance(maven_info, dict):
raise koji.GenericError('Invalid type for maven_info: %s' % type(maven_info))
maven_info = maven_info.copy()
current_maven_info = get_maven_build(build)
if current_maven_info:
# already exists, verify that it matches
for field in ('group_id', 'artifact_id', 'version'):
if current_maven_info[field] != maven_info[field]:
raise koji.BuildError('%s mismatch (current: %s, new: %s)' %
(field, current_maven_info[field], maven_info[field]))
else:
if maven_info == {}:
raise koji.GenericError("Maven info is empty")
maven_info['build_id'] = build['id']
try:
data = dslice(maven_info, ['build_id', 'group_id', 'artifact_id', 'version'])
except KeyError as cm:
raise koji.GenericError("Maven info doesn't have mandatory %s key" % cm)
insert = InsertProcessor('maven_builds', data=data)
insert.execute()
# also add build_types entry
new_typed_build(build, 'maven')
def new_win_build(build_info, win_info):
"""
Add Windows metadata to an existing build.
win_info must contain a 'platform' key.
"""
build_id = build_info['id']
if not isinstance(win_info, dict):
raise koji.GenericError('Invalid type for win_info: %s' % type(win_info))
if win_info == {}:
raise koji.GenericError("Windows info is empty")
if 'platform' not in win_info.keys():
raise koji.GenericError("Windows info doesn't have mandatory platform key")
current = get_win_build(build_id, strict=False)
if current:
if current['platform'] != win_info['platform']:
update = UpdateProcessor('win_builds', clauses=['build_id=%(build_id)i'],
values={'build_id': build_id})
update.set(platform=win_info['platform'])
update.execute()
else:
insert = InsertProcessor('win_builds')
insert.set(build_id=build_id)
insert.set(platform=win_info['platform'])
insert.execute()
# also add build_types entry
new_typed_build(build_info, 'win')
def new_image_build(build_info):
"""
Added Image metadata to an existing build. This is just the buildid so that
we can distinguish image builds from other types.
"""
# We don't have to worry about updating an image build because the id is
# the only thing we care about, and that should never change if a build
# fails first and succeeds later on a resubmission.
query = QueryProcessor(tables=['image_builds'], columns=['build_id'],
clauses=['build_id = %(build_id)i'],
values={'build_id': build_info['id']})
result = query.executeOne()
if not result:
insert = InsertProcessor('image_builds')
insert.set(build_id=build_info['id'])
insert.execute()
# also add build_types entry
new_typed_build(build_info, 'image')
def new_typed_build(build_info, btype):
"""Mark build as a given btype"""
btype_id = lookup_name('btype', btype, strict=True)['id']
query = QueryProcessor(tables=['build_types'], columns=['build_id'],
clauses=['build_id = %(build_id)i', 'btype_id = %(btype_id)i'],
values={'build_id': build_info['id'], 'btype_id': btype_id})
result = query.executeOne()
if not result:
insert = InsertProcessor('build_types')
insert.set(build_id=build_info['id'])
insert.set(btype_id=btype_id)
insert.execute()
def import_archive(filepath, buildinfo, type, typeInfo, buildroot_id=None):
"""
Import an archive file and associate it with a build. The archive can
be any non-rpm filetype supported by Koji.
This wraps import_archive_internal and limits options
"""
return import_archive_internal(filepath, buildinfo, type, typeInfo, buildroot_id=None)
def import_archive_internal(filepath, buildinfo, type, typeInfo, buildroot_id=None, fileinfo=None):
"""
Import an archive file and associate it with a build. The archive can
be any non-rpm filetype supported by Koji.
filepath: full path to the archive file
buildinfo: dict of information about the build to associate the archive with
(as returned by getBuild())
type: type of the archive being imported. Currently supported archive types: maven, win, image
typeInfo: dict of type-specific information
buildroot_id: the id of the buildroot the archive was built in (may be None)
fileinfo: content generator metadata for file (may be None)
"""
reject_draft(buildinfo)
if fileinfo is None:
fileinfo = {}
metadata_only = fileinfo.get('metadata_only', False)
if metadata_only:
filepath = None
elif not os.path.exists(filepath):
raise koji.GenericError('No such file: %s' % filepath)
archiveinfo = {'buildroot_id': buildroot_id}
archiveinfo['build_id'] = buildinfo['id']
if metadata_only:
filename = koji.fixEncoding(fileinfo['filename'])
archiveinfo['filename'] = filename
archiveinfo['size'] = fileinfo['filesize']
archiveinfo['checksum'] = fileinfo['checksum']
if fileinfo['checksum_type'] not in ('md5', 'sha256'):
raise koji.GenericError("Unsupported checksum type: %(checksum_type)s" % fileinfo)
archiveinfo['checksum_type'] = koji.CHECKSUM_TYPES[fileinfo['checksum_type']]
archiveinfo['metadata_only'] = True
else:
filename = koji.fixEncoding(os.path.basename(filepath))
archiveinfo['filename'] = filename
archiveinfo['size'] = os.path.getsize(filepath)
# trust values computed on hub (CG_Importer.prep_outputs)
if not fileinfo or not fileinfo.get('hub.checked_hash'):
with open(filepath, 'rb') as archivefp:
chksum = get_verify_class('sha256')()
while True:
contents = archivefp.read(8192)
if not contents:
break
chksum.update(contents)
archiveinfo['checksum'] = chksum.hexdigest()
archiveinfo['checksum_type'] = koji.CHECKSUM_TYPES['sha256']
else:
archiveinfo['checksum'] = fileinfo['checksum']
archiveinfo['checksum_type'] = koji.CHECKSUM_TYPES[fileinfo['checksum_type']]
if fileinfo:
# check against metadata
if archiveinfo['size'] != fileinfo['filesize']:
raise koji.GenericError("File size mismatch for %s: %s != %s" %
(filename, archiveinfo['size'], fileinfo['filesize']))
if (archiveinfo['checksum'] != fileinfo['checksum'] or
archiveinfo['checksum_type'] != koji.CHECKSUM_TYPES[
fileinfo['checksum_type']]):
raise koji.GenericError("File checksum mismatch for %s: %s != %s" %
(filename, archiveinfo['checksum'], fileinfo['checksum']))
archivetype = get_archive_type(filename, strict=True)
archiveinfo['type_id'] = archivetype['id']
btype = lookup_name('btype', type, strict=False)
if btype is None:
raise koji.BuildError('unsupported build type: %s' % type)
if btype['name'] not in get_build_type(buildinfo, strict=True):
raise koji.ImportError('Build does not have type %s' % btype['name'])
archiveinfo['btype_id'] = btype['id']
# cg extra data
extra = fileinfo.get('extra', None)
if extra is not None:
archiveinfo['extra'] = json.dumps(extra)
koji.plugin.run_callbacks('preImport', type='archive', archive=archiveinfo, build=buildinfo,
build_type=type, filepath=filepath, fileinfo=fileinfo)
# XXX verify that the buildroot is associated with a task that's associated with the build
archive_id = nextval('archiveinfo_id_seq')
archiveinfo['id'] = archive_id
insert = InsertProcessor('archiveinfo', data=archiveinfo)
insert.execute()
if type == 'maven':
get_maven_build(buildinfo, strict=True) # raise exception if not found
if archivetype['name'] == 'pom' and not metadata_only:
pom_info = koji.parse_pom(filepath)
pom_maveninfo = koji.pom_to_maven_info(pom_info)
# sanity check: Maven info from pom must match the user-supplied typeInfo
if koji.mavenLabel(pom_maveninfo) != koji.mavenLabel(typeInfo):
raise koji.BuildError(
'Maven info from .pom file (%s) does not match user-supplied typeInfo (%s)' %
(koji.mavenLabel(pom_maveninfo), koji.mavenLabel(typeInfo)))
# sanity check: the filename of the pom file must match <artifactId>-<version>.pom
if filename != '%(artifact_id)s-%(version)s.pom' % typeInfo:
raise koji.BuildError('Maven info (%s) is not consistent with pom filename (%s)' %
(koji.mavenLabel(typeInfo), filename))
insert = InsertProcessor('maven_archives',
data=dslice(typeInfo, ('group_id', 'artifact_id', 'version')))
insert.set(archive_id=archive_id)
insert.execute()
if not metadata_only:
# move the file to its final destination
mavendir = joinpath(koji.pathinfo.mavenbuild(buildinfo),
koji.pathinfo.mavenrepo(typeInfo))
_import_archive_file(filepath, mavendir)
_generate_maven_metadata(mavendir)
elif type == 'win':
get_win_build(buildinfo, strict=True) # raise exception if not found
insert = InsertProcessor('win_archives')
insert.set(archive_id=archive_id)
relpath = typeInfo['relpath'].strip('/')
insert.set(relpath=relpath)
if not typeInfo['platforms']:
raise koji.BuildError('no value for platforms')
insert.set(platforms=' '.join(typeInfo['platforms']))
if typeInfo['flags']:
insert.set(flags=' '.join(typeInfo['flags']))
insert.execute()
if not metadata_only:
destdir = koji.pathinfo.winbuild(buildinfo)
if relpath:
destdir = joinpath(destdir, relpath)
_import_archive_file(filepath, destdir)
elif type == 'image':
insert = InsertProcessor('image_archives')
insert.set(archive_id=archive_id)
insert.set(arch=typeInfo['arch'])
insert.execute()
if not metadata_only:
imgdir = joinpath(koji.pathinfo.imagebuild(buildinfo))
_import_archive_file(filepath, imgdir)
# import log files?
else:
# new style type, no supplementary table
if not metadata_only:
destdir = koji.pathinfo.typedir(buildinfo, btype['name'])
subdir = fileinfo.get('subdir')
if subdir:
destdir = joinpath(destdir, subdir)
_import_archive_file(filepath, destdir)
archiveinfo = get_archive(archive_id, strict=True)
koji.plugin.run_callbacks('postImport', type='archive', archive=archiveinfo, build=buildinfo,
build_type=type, filepath=filepath, fileinfo=fileinfo)
return archiveinfo
def _import_archive_file(filepath, destdir):
"""
Move the file to its final location on the filesystem.
filepath must exist, destdir will be created if it does not exist.
A symlink pointing from the old location to the new location will
be created.
"""
fname = os.path.basename(filepath)
fname = koji.fixEncoding(fname)
final_path = "%s/%s" % (destdir, fname)
if os.path.exists(final_path):
raise koji.GenericError("Error importing archive file, %s already exists" % final_path)
if os.path.islink(filepath) or not os.path.isfile(filepath):
raise koji.GenericError("Error importing archive file, %s is not a regular file" %
filepath)
move_and_symlink(filepath, final_path, create_dir=True)
def _generate_maven_metadata(mavendir):
"""
Generate md5 and sha1 sums for every file in mavendir, if it doesn't already exist.
Checksum files will be named <filename>.md5 and <filename>.sha1.
"""
mavenfiles = os.listdir(mavendir)
for mavenfile in mavenfiles:
if os.path.splitext(mavenfile)[1] in ('.md5', '.sha1'):
continue
if not os.path.isfile('%s/%s' % (mavendir, mavenfile)):
continue
for ext, sum_constr in (('.md5', md5_constructor), ('.sha1', hashlib.sha1)):
sumfile = mavenfile + ext
if sumfile not in mavenfiles:
sum = sum_constr()
with open('%s/%s' % (mavendir, mavenfile), 'rb') as fobj:
while True:
content = fobj.read(8192)
if not content:
break
sum.update(content)
with open('%s/%s' % (mavendir, sumfile), 'wt') as sumobj:
sumobj.write(sum.hexdigest())
def add_rpm_sig(an_rpm, sighdr):
"""Store a signature header for an rpm"""
# calling function should perform permission checks, if applicable
rinfo = get_rpm(an_rpm, strict=True)
if rinfo['external_repo_id']:
raise koji.GenericError("Not an internal rpm: %s (from %s)"
% (an_rpm, rinfo['external_repo_name']))
binfo = get_build(rinfo['build_id'])
builddir = koji.pathinfo.build(binfo)
if not os.path.isdir(builddir):
raise koji.GenericError("No such directory: %s" % builddir)
rawhdr = koji.RawHeader(sighdr)
sigmd5 = koji.hex_string(rawhdr.get(koji.RPM_SIGTAG_MD5))
if sigmd5 == rinfo['payloadhash']:
# note: payloadhash is a misnomer, that field is populated with sigmd5.
sigkey = rawhdr.get(koji.RPM_SIGTAG_GPG)
if not sigkey:
sigkey = rawhdr.get(koji.RPM_SIGTAG_PGP)
if not sigkey:
sigkey = rawhdr.get(koji.RPM_SIGTAG_DSA)
if not sigkey:
sigkey = rawhdr.get(koji.RPM_SIGTAG_RSA)
else:
# Double check using rpm in case we have somehow misread
rpm_path = "%s/%s" % (builddir, koji.pathinfo.rpm(rinfo))
sigmd5, sigkey = _scan_sighdr(sighdr, rpm_path)
sigmd5 = koji.hex_string(sigmd5)
if sigmd5 != rinfo['payloadhash']:
nvra = "%(name)s-%(version)s-%(release)s.%(arch)s" % rinfo
raise koji.GenericError("wrong md5 for %s: %s" % (nvra, sigmd5))
if not sigkey:
sigkey = ''
# we use the sigkey='' to represent unsigned in the db (so that uniqueness works)
else:
sigkey = koji.get_sigpacket_key_id(sigkey)
sighash = md5_constructor(sighdr).hexdigest()
rpm_id = rinfo['id']
koji.plugin.run_callbacks('preRPMSign', sigkey=sigkey, sighash=sighash, build=binfo, rpm=rinfo)
insert = InsertProcessor('rpmsigs')
insert.set(rpm_id=rpm_id, sigkey=sigkey, sighash=sighash)
try:
insert.execute()
except IntegrityError:
nvra = "%(name)s-%(version)s-%(release)s.%(arch)s" % rinfo
raise koji.GenericError("Signature already exists for package %s, key %s" % (nvra, sigkey))
# - write to fs
sigpath = "%s/%s" % (builddir, koji.pathinfo.sighdr(rinfo, sigkey))
koji.ensuredir(os.path.dirname(sigpath))
with open(sigpath, 'wb') as fo:
fo.write(sighdr)
koji.plugin.run_callbacks('postRPMSign',
sigkey=sigkey, sighash=sighash, build=binfo, rpm=rinfo)
def delete_rpm_sig(rpminfo, sigkey=None, all_sigs=False):
"""Delete rpm signature
Only use this method in extreme situations, because it goes against
Koji's design of immutable, auditable data.
:param dict/str/id rpm: map containing 'name', 'version', 'release', and 'arch'
string N-V-R.A
int ID
:param str sigkey: Signature key.
:param bool all_sigs: Delete all signed copies for specified RPM.
"""
if all_sigs:
sigkey = None
elif not sigkey:
raise koji.GenericError("No signature specified")
rinfo = get_rpm(rpminfo, strict=True)
nvra = "%(name)s-%(version)s-%(release)s.%(arch)s" % rinfo
if rinfo['external_repo_id']:
raise koji.GenericError("Not an internal rpm: %s (from %s)"
% (rpminfo, rinfo['external_repo_name']))
# Determine what signature we have
rpm_query_result = query_rpm_sigs(rpm_id=rinfo['id'], sigkey=sigkey)
if not rpm_query_result:
raise koji.GenericError("%s has no matching signatures to delete" % nvra)
found_keys = [r['sigkey'] for r in rpm_query_result]
# Delete signature entries from db
clauses = ["rpm_id=%(rpm_id)s", "sigkey IN %(found_keys)s"]
rpm_id = rinfo['id']
delete = DeleteProcessor(table='rpmsigs', clauses=clauses, values=locals())
delete.execute()
delete = DeleteProcessor(table='rpm_checksum', clauses=clauses, values=locals())
delete.execute()
# Get the base build dir for our paths
binfo = get_build(rinfo['build_id'], strict=True)
builddir = koji.pathinfo.build(binfo)
# Check header files
hdr_renames = []
hdr_deletes = []
for rpmsig in rpm_query_result:
hdr_path = joinpath(builddir, koji.pathinfo.sighdr(rinfo, rpmsig['sigkey']))
backup_path = hdr_path + f".{rpmsig['sighash']}.save"
if not os.path.exists(hdr_path):
logger.error(f'Missing signature header file: {hdr_path}')
# this doesn't prevent us from deleting the signature
# it just means we have nothing to back up
continue
if not os.path.isfile(hdr_path):
# this should not happen and requires human intervention
raise koji.GenericError(f"Not a regular file: {hdr_path}")
if os.path.exists(backup_path):
# Likely residue of previous failed deletion
if filecmp.cmp(hdr_path, backup_path, shallow=False):
# same file contents, so we're already backed up
logger.warning(f"Signature header already backed up: {backup_path}")
hdr_deletes.append([rpmsig, hdr_path])
else:
# this shouldn't happen
raise koji.GenericError(f"Stray header backup file: {backup_path}")
else:
hdr_renames.append([rpmsig, hdr_path, backup_path])
# Delete signed copies
# We do these first since they are the lowest risk
for rpmsig in rpm_query_result:
signed_path = joinpath(builddir, koji.pathinfo.signed(rinfo, rpmsig['sigkey']))
if not os.path.exists(signed_path):
# signed copies might not exist
continue
try:
os.remove(signed_path)
logger.warning(f"Deleted signed copy {signed_path}")
except Exception:
logger.error(f"Failed to delete {signed_path}", exc_info=True)
raise koji.GenericError(f"Failed to delete {signed_path}")
# Backup header files
for rpmsig, hdr_path, backup_path in hdr_renames:
# sanity checked above
try:
os.rename(hdr_path, backup_path)
logger.warning(f"Signature header saved to {backup_path}")
except Exception:
logger.error(f"Failed to rename {hdr_path} to {backup_path}", exc_info=True)
# Delete already backed-up headers
for rpmsig, hdr_path in hdr_deletes:
# verified backup above
try:
os.remove(hdr_path)
logger.warning(f"Deleted signature header {hdr_path}")
except Exception:
logger.error(f"Failed to delete {hdr_path}", exc_info=True)
raise koji.GenericError(f"Failed to delete {hdr_path}")
# Note: we do not delete any empty parent dirs as the primary use case for deleting these
# signatures is to allow the import of new, overlapping ones
logger.warning("Deleted signatures %s for rpm %s", found_keys, rinfo['id'])
def _scan_sighdr(sighdr, fn):
"""Splices sighdr with other headers from fn and queries (no payload)"""
# This is hackish, but it works
if not os.path.exists(fn):
raise koji.GenericError("No such path: %s" % fn)
if not os.path.isfile(fn):
raise koji.GenericError("Not a regular file: %s" % fn)
# XXX should probably add an option to splice_rpm_sighdr to handle this instead
sig_start, sigsize = koji.find_rpm_sighdr(fn)
hdr_start = sig_start + sigsize
hdrsize = koji.rpm_hdr_size(fn, hdr_start)
inp = open(fn, 'rb')
outp = tempfile.TemporaryFile(mode='w+b')
# before signature
outp.write(inp.read(sig_start))
# signature
outp.write(sighdr)
inp.seek(sigsize, 1)
# main header
outp.write(inp.read(hdrsize))
inp.close()
outp.seek(0, 0)
ts = rpm.TransactionSet()
ts.setVSFlags(rpm._RPMVSF_NOSIGNATURES | rpm._RPMVSF_NODIGESTS)
# (we have no payload, so verifies would fail otherwise)
hdr = ts.hdrFromFdno(outp.fileno())
outp.close()
sig = koji.get_header_field(hdr, 'siggpg')
if not sig:
sig = koji.get_header_field(hdr, 'sigpgp')
if not sig:
sig = koji.get_header_field(hdr, 'dsaheader')
if not sig:
sig = koji.get_header_field(hdr, 'rsaheader')
return koji.get_header_field(hdr, 'sigmd5'), sig
def check_rpm_sig(an_rpm, sigkey, sighdr):
# verify that the provided signature header matches the key and rpm
rinfo = get_rpm(an_rpm, strict=True)
binfo = get_build(rinfo['build_id'])
builddir = koji.pathinfo.build(binfo)
rpm_path = "%s/%s" % (builddir, koji.pathinfo.rpm(rinfo))
if not os.path.exists(rpm_path):
raise koji.GenericError("No such path: %s" % rpm_path)
if not os.path.isfile(rpm_path):
raise koji.GenericError("Not a regular file: %s" % rpm_path)
fd, temp = tempfile.mkstemp()
os.close(fd)
try:
koji.splice_rpm_sighdr(sighdr, rpm_path, dst=temp)
ts = rpm.TransactionSet()
ts.setVSFlags(0) # full verify
with open(temp, 'rb') as fo:
hdr = ts.hdrFromFdno(fo.fileno())
except Exception:
try:
os.unlink(temp)
except Exception:
pass
raise
raw_key = koji.get_header_field(hdr, 'siggpg')
if not raw_key:
raw_key = koji.get_header_field(hdr, 'sigpgp')
if not raw_key:
raw_key = koji.get_header_field(hdr, 'dsaheader')
if not raw_key:
raw_key = koji.get_header_field(hdr, 'rsaheader')
if not raw_key:
found_key = None
else:
found_key = koji.get_sigpacket_key_id(raw_key)
if sigkey.lower() != found_key:
raise koji.GenericError("Signature key mismatch: got %s, expected %s"
% (found_key, sigkey))
os.unlink(temp)
def query_rpm_sigs(rpm_id=None, sigkey=None, queryOpts=None):
"""Queries db for rpm signatures
:param rpm_id: a int RPM ID,
a string N-V-R.A,
a map containing 'name', 'version', 'release', and 'arch'
:param int sigkey: signature key hash
:param queryOpts: query options used by the QueryProcessor.
:returns: list of dicts (rpm_id, sigkey, sighash)
"""
clauses = []
if rpm_id is not None and not isinstance(rpm_id, int):
rpminfo = get_rpm(rpm_id)
if rpminfo:
rpm_id = rpminfo['id']
else:
return []
if rpm_id is not None:
clauses.append("rpm_id=%(rpm_id)s")
if sigkey is not None:
sigkey = sigkey.lower()
clauses.append("sigkey=%(sigkey)s")
query = QueryProcessor(tables=['rpmsigs'],
columns=['rpm_id', 'sigkey', 'sighash'],
clauses=clauses,
values={'rpm_id': rpm_id, 'sigkey': sigkey},
opts=queryOpts)
return query.execute()
class MultiSum(object):
def __init__(self, checksum_types):
self.checksums = {name: getattr(hashlib, name)() for name in checksum_types}
def update(self, buf):
for name, checksum in self.checksums.items():
checksum.update(buf)
def to_hexdigest(self):
checksums_hex = {}
for name, checksum in self.checksums.items():
checksums_hex[name] = checksum.hexdigest()
return checksums_hex
def calculate_chsum(path, checksum_types):
"""Calculate checksum for specific checksum_types
:param path: a string path to file
a BufferedReader object
:param list checksum_types: list of checksum types
"""
msum = MultiSum(checksum_types)
if isinstance(path, str):
try:
f = open(path, 'rb')
except IOError as e:
raise koji.GenericError(f"File {path} cannot be read -- {e}")
else:
f = path
while 1:
chunk = f.read(1024 ** 2)
if not chunk:
break
msum.update(chunk)
f.close()
return msum.to_hexdigest()
def write_signed_rpm(an_rpm, sigkey, force=False):
"""Write a signed copy of the rpm"""
checksum_types = context.opts.get('RPMDefaultChecksums').split()
for ch_type in checksum_types:
if ch_type not in koji.CHECKSUM_TYPES:
raise koji.GenericError(f"Checksum_type {ch_type} isn't supported")
sigkey = sigkey.lower()
rinfo = get_rpm(an_rpm, strict=True)
if rinfo['external_repo_id']:
raise koji.GenericError("Not an internal rpm: %s (from %s)"
% (an_rpm, rinfo['external_repo_name']))
binfo = get_build(rinfo['build_id'])
nvra = "%(name)s-%(version)s-%(release)s.%(arch)s" % rinfo
builddir = koji.pathinfo.build(binfo)
rpm_path = "%s/%s" % (builddir, koji.pathinfo.rpm(rinfo))
if not os.path.exists(rpm_path):
raise koji.GenericError("No such path: %s" % rpm_path)
if not os.path.isfile(rpm_path):
raise koji.GenericError("Not a regular file: %s" % rpm_path)
# make sure we have it in the db
rpm_id = rinfo['id']
query = QueryProcessor(tables=['rpmsigs'], columns=['sighash'],
clauses=['rpm_id=%(rpm_id)s', 'sigkey=%(sigkey)s'],
values={'rpm_id': rpm_id, 'sigkey': sigkey})
sighash = query.singleValue(strict=False)
if not sighash:
raise koji.GenericError("No cached signature for package %s, key %s" % (nvra, sigkey))
signedpath = "%s/%s" % (builddir, koji.pathinfo.signed(rinfo, sigkey))
if os.path.exists(signedpath):
if not force:
# already present
chsum_dict = calculate_chsum(signedpath, checksum_types)
create_rpm_checksum(rpm_id, sigkey, chsum_dict)
return
else:
os.unlink(signedpath)
sigpath = "%s/%s" % (builddir, koji.pathinfo.sighdr(rinfo, sigkey))
with open(sigpath, 'rb') as fo:
sighdr = fo.read()
koji.ensuredir(os.path.dirname(signedpath))
msum = MultiSum(checksum_types)
koji.splice_rpm_sighdr(sighdr, rpm_path, dst=signedpath, callback=msum.update)
create_rpm_checksum(rpm_id, sigkey, msum.to_hexdigest())
def query_history(tables=None, **kwargs):
"""Returns history data from various tables that support it
tables: list of versioned tables to search, no value implies all tables
valid entries: user_perms, user_groups, tag_inheritance, tag_config,
build_target_config, external_repo_config, tag_external_repos,
tag_listing, tag_packages, tag_package_owners, group_config,
group_req_listing, group_package_listing
- Time options -
times are specified as an integer event or a string timestamp
time options are valid for all record types
before: either created or revoked before timestamp
after: either created or revoked after timestamp
beforeEvent: either created or revoked before event id
afterEvent: either created or revoked after event id
- other versioning options-
active: select by active status
editor: record created or revoked by user
- table-specific search options -
use of these options will implicitly limit the search to applicable tables
package: only for given package
build: only for given build
tag: only for given tag
user: only affecting a given user
permission: only relating to a given permission
external_repo: only relateing to an external repo
build_target: only relating to a build target
group: only relating to a (comps) group
cg: only relating to a content generator
- query
queryOpts: for final query (countOnly/order/offset/limit)
"""
common_fields = {
# fields:aliases common to all versioned tables
'active': 'active',
'create_event': 'create_event',
'revoke_event': 'revoke_event',
'creator_id': 'creator_id',
'revoker_id': 'revoker_id',
}
common_joins = [
"events AS ev1 ON ev1.id = create_event",
"LEFT OUTER JOIN events AS ev2 ON ev2.id = revoke_event",
"users AS creator ON creator.id = creator_id",
"LEFT OUTER JOIN users AS revoker ON revoker.id = revoker_id",
]
common_joined_fields = {
'creator.name': 'creator_name',
'revoker.name': 'revoker_name',
"date_part('epoch', ev1.time) AS create_ts": 'create_ts',
"date_part('epoch', ev2.time) AS revoke_ts": 'revoke_ts',
}
table_fields = {
'user_perms': ['user_id', 'perm_id'],
'user_groups': ['user_id', 'group_id'],
'cg_users': ['user_id', 'cg_id'],
'tag_inheritance': ['tag_id', 'parent_id', 'priority', 'maxdepth', 'intransitive',
'noconfig', 'pkg_filter'],
'tag_config': ['tag_id', 'arches', 'perm_id', 'locked', 'maven_support',
'maven_include_all'],
'tag_extra': ['tag_id', 'key', 'value'],
'build_target_config': ['build_target_id', 'build_tag', 'dest_tag'],
'external_repo_config': ['external_repo_id', 'url'],
'external_repo_data': ['external_repo_id', 'data'],
'host_config': ['host_id', 'arches', 'capacity', 'description', 'comment', 'enabled'],
'host_channels': ['host_id', 'channel_id'],
'tag_external_repos': ['tag_id', 'external_repo_id', 'priority', 'merge_mode', 'arches'],
'tag_listing': ['build_id', 'tag_id'],
'tag_packages': ['package_id', 'tag_id', 'blocked', 'extra_arches'],
'tag_package_owners': ['package_id', 'tag_id', 'owner'],
'group_config': ['group_id', 'tag_id', 'blocked', 'exported', 'display_name', 'is_default',
'uservisible', 'description', 'langonly', 'biarchonly'],
'group_req_listing': ['group_id', 'tag_id', 'req_id', 'blocked', 'type', 'is_metapkg'],
'group_package_listing': ['group_id', 'tag_id', 'package', 'blocked', 'type',
'basearchonly', 'requires'],
}
name_joins = {
# joins triggered by table fields for name lookup
# field : [table, join-alias, alias]
'user_id': ['users', 'users', 'user'],
'perm_id': ['permissions', 'permission'],
'cg_id': ['content_generator'],
# group_id is overloaded (special case below)
'tag_id': ['tag'],
'host_id': ['host'],
'channel_id': ['channels'],
'parent_id': ['tag', 'parent'],
'build_target_id': ['build_target'],
'build_tag': ['tag', 'build_tag'],
'dest_tag': ['tag', 'dest_tag'],
'external_repo_id': ['external_repo'],
# build_id is special cased
'package_id': ['package'],
'owner': ['users', 'owner'],
'req_id': ['groups', 'req'],
}
if tables is None:
tables = sorted(table_fields.keys())
else:
for table in tables:
if table not in table_fields:
raise koji.GenericError("No such history table: %s" % table)
ret = {}
if 'queryOpts' in kwargs:
queryOpts = kwargs.pop('queryOpts')
else:
queryOpts = None
for table in tables:
fields = {}
for field in common_fields:
fullname = "%s.%s" % (table, field)
fields[fullname] = common_fields[field]
joins = list(common_joins)
fields.update(common_joined_fields)
joined = {}
for field in table_fields[table]:
fullname = "%s.%s" % (table, field)
fields[fullname] = field
name_join = name_joins.get(field)
if name_join:
tbl = join_as = name_join[0]
if len(name_join) > 1:
join_as = name_join[1]
joined[tbl] = join_as
fullname = "%s.name" % join_as
if len(name_join) > 2:
# apply alias
fields[fullname] = "%s.name" % name_join[2]
else:
fields[fullname] = fullname
if join_as == tbl:
joins.append('LEFT OUTER JOIN %s ON %s = %s.id' % (tbl, field, tbl))
else:
joins.append('LEFT OUTER JOIN %s AS %s ON %s = %s.id' %
(tbl, join_as, field, join_as))
elif field == 'build_id':
# special case
fields.update({
'package.name': 'name', # XXX?
'build.version': 'version',
'build.release': 'release',
'build.epoch': 'epoch',
'build.state': 'build.state',
})
joins.extend([
'build ON build_id = build.id',
'package ON build.pkg_id = package.id',
])
joined['build'] = 'build'
joined['package'] = 'package'
elif field == 'group_id':
if table.startswith('group_'):
fields['groups.name'] = 'group.name'
joins.append('groups ON group_id = groups.id')
joined['groups'] = 'groups'
elif table == 'user_groups':
fields['usergroup.name'] = 'group.name'
joins.append('users AS usergroup ON group_id = usergroup.id')
joined['users'] = 'usergroup'
clauses = []
skip = False
data = {}
for arg in kwargs:
value = kwargs[arg]
if arg == 'tag':
if 'tag' not in joined:
skip = True
break
data['tag_id'] = get_tag_id(value, strict=True)
if table == 'tag_inheritance':
# special cased because there are two tag columns
clauses.append("tag_id = %(tag_id)i OR parent_id = %(tag_id)i")
else:
clauses.append("%s.id = %%(tag_id)i" % joined['tag'])
elif arg == 'build':
if 'build' not in joined:
skip = True
break
data['build_id'] = get_build(value, strict=True)['id']
clauses.append("build.id = %(build_id)i")
elif arg == 'host':
if 'host' not in joined:
skip = True
break
data['host_id'] = get_id('host', value, strict=False)
clauses.append("host.id = %(host_id)i")
elif arg == 'channel':
if 'channels' not in joined:
skip = True
break
data['channel_id'] = get_id('channels', value, strict=False)
clauses.append("channels.id = %(channel_id)i")
elif arg == 'package':
pkg_field_name = "%s.package" % table
if 'package' in joined:
data['pkg_id'] = get_package_id(value, strict=True)
clauses.append("package.id = %(pkg_id)i")
elif pkg_field_name in fields:
# e.g. group_package_listing
data['group_package'] = str(value)
clauses.append("%s = %%(group_package)s" % pkg_field_name)
else:
skip = True
break
elif arg == 'user':
if 'users' not in joined:
skip = True
break
data['affected_user_id'] = get_user(value, strict=True)['id']
clauses.append("%s.id = %%(affected_user_id)i" % joined['users'])
elif arg == 'permission':
if 'permissions' not in joined:
skip = True
break
data['perm_id'] = get_perm_id(value, strict=True)
clauses.append("%s.id = %%(perm_id)i" % joined['permissions'])
elif arg == 'cg':
if 'content_generator' not in joined:
skip = True
break
data['cg_id'] = lookup_name('content_generator', value, strict=True)['id']
clauses.append("%s.id = %%(cg_id)i" % joined['content_generator'])
elif arg == 'external_repo':
if 'external_repo' not in joined:
skip = True
break
data['external_repo_id'] = get_external_repo_id(value, strict=True)
clauses.append("%s.id = %%(external_repo_id)i" % joined['external_repo'])
elif arg == 'build_target':
if 'build_target' not in joined:
skip = True
break
data['build_target_id'] = get_build_target_id(value, strict=True)
clauses.append("%s.id = %%(build_target_id)i" % joined['build_target'])
elif arg == 'group':
if 'groups' not in joined:
skip = True
break
data['group_id'] = get_group_id(value, strict=True)
clauses.append("%s.id = %%(group_id)i" % joined['groups'])
elif arg == 'active':
if value:
clauses.append('active = TRUE')
elif value is not None:
clauses.append('active IS NULL')
elif arg == 'editor':
data['editor'] = get_user(value, strict=True)['id']
clauses.append('creator.id = %(editor)i OR revoker.id = %(editor)i')
fields['creator.id = %(editor)i'] = '_created_by'
fields['revoker.id = %(editor)i'] = '_revoked_by'
elif arg == 'after':
if not isinstance(value, str):
value = convert_timestamp(value)
data['after'] = value
clauses.append('ev1.time > %(after)s OR ev2.time > %(after)s')
fields['ev1.time > %(after)s'] = '_created_after'
fields['ev2.time > %(after)s'] = '_revoked_after'
# clauses.append("date_part('epoch', ev1.time) > %(after)s OR "
# "date_part('epoch', ev2.time) > %(after)s")
elif arg == 'afterEvent':
data['afterEvent'] = value
c_test = '%s.create_event > %%(afterEvent)i' % table
r_test = '%s.revoke_event > %%(afterEvent)i' % table
clauses.append(' OR '.join([c_test, r_test]))
fields[c_test] = '_created_after_event'
fields[r_test] = '_revoked_after_event'
elif arg == 'before':
if not isinstance(value, str):
value = convert_timestamp(value)
data['before'] = value
clauses.append('ev1.time < %(before)s OR ev2.time < %(before)s')
# clauses.append("date_part('epoch', ev1.time) < %(before)s OR "
# "date_part('epoch', ev2.time) < %(before)s")
fields['ev1.time < %(before)s'] = '_created_before'
fields['ev2.time < %(before)s'] = '_revoked_before'
elif arg == 'beforeEvent':
data['beforeEvent'] = value
c_test = '%s.create_event < %%(beforeEvent)i' % table
r_test = '%s.revoke_event < %%(beforeEvent)i' % table
clauses.append(' OR '.join([c_test, r_test]))
fields[c_test] = '_created_before_event'
fields[r_test] = '_revoked_before_event'
elif arg == 'xkey':
if 'key' not in table_fields[table]:
skip = True
break
data['key'] = str(value)
clauses.append("%s.key = %%(key)s" % table)
if skip:
continue
fields, aliases = zip(*fields.items())
query = QueryProcessor(columns=fields, aliases=aliases, tables=[table],
joins=joins, clauses=clauses, values=data,
opts=queryOpts)
ret[table] = query.iterate()
return ret
def untagged_builds(name=None, queryOpts=None, draft=None):
"""Returns the list of untagged builds"""
st_complete = koji.BUILD_STATES['COMPLETE']
# following can be achieved with simple query but with
# linear complexity while this one will be parallelized to
# full number of workers giving at least 2x speedup
clauses = [
"""NOT EXISTS
(SELECT 1 FROM tag_listing
WHERE tag_listing.build_id = build.id
AND tag_listing.active IS TRUE)""",
"package.id = build.pkg_id",
"build.state = %(st_complete)i",
]
if name is not None:
clauses.append('package.name = %(name)s')
if draft is not None:
clauses.append(draft_clause(draft))
query = QueryProcessor(tables=['build', 'package'],
columns=['build.id', 'package.name', 'build.version', 'build.release'],
aliases=['id', 'name', 'version', 'release'],
clauses=clauses, values=locals(),
opts=queryOpts)
return query.iterate()
def build_references(build_id, limit=None, lazy=False):
"""Returns references to a build
This call is used to determine whether a build can be deleted
:param int build_id: numeric build id
:param int limit: If given, only return up to N results of each ref type
:param bool lazy: If true, stop when any reference is found
:returns: dict of reference results for each reference type
"""
ret = {}
# find tags
fields = [
('tag_id', 'tag_id'),
('tag.name', 'name')
]
columns, aliases = zip(*fields)
query = QueryProcessor(tables=['tag_listing'], columns=columns, aliases=aliases,
joins=['tag on tag_id = tag.id'],
clauses=['build_id = %(build_id)i', 'active = TRUE'],
values={'build_id': build_id})
ret['tags'] = query.execute()
if lazy and ret['tags']:
return ret
# we'll need the component rpm and archive ids for the rest
query = QueryProcessor(tables=['rpminfo'], columns=['id'],
clauses=['build_id=%(build_id)i'],
values={'build_id': build_id}, opts={'asList': True})
build_rpm_ids = [(i,) for i in query.execute()]
query = QueryProcessor(tables=['archiveinfo'], columns=['id'],
clauses=['build_id=%(build_id)i'],
values={'build_id': build_id}, opts={'asList': True})
build_archive_ids = [(i,) for i in query.execute()]
if not build_archive_ids:
build_archive_ids = []
# find rpms whose buildroots we were in
st_complete = koji.BUILD_STATES['COMPLETE']
fields = [
('rpminfo.id', 'id'),
('rpminfo.name', 'name'),
('rpminfo.version', 'version'),
('rpminfo.release', 'release'),
('rpminfo.arch', 'arch'),
('rpminfo.build_id', 'build_id')
]
columns, aliases = zip(*fields)
idx = {}
if limit is not None:
queryOpts = {'limit': limit}
else:
queryOpts = {}
for rpm_id in build_rpm_ids:
query = QueryProcessor(tables=['rpminfo', 'build'],
columns=columns,
aliases=aliases,
clauses=['rpminfo.buildroot_id IN (SELECT DISTINCT buildroot_id '
'FROM buildroot_listing WHERE rpm_id = %(rpm_id)s)',
'rpminfo.build_id = build.id',
'build.state = %(st_complete)i'],
values={'rpm_id': rpm_id, 'st_complete': st_complete},
opts=queryOpts
)
for row in query.execute():
idx.setdefault(row['id'], row)
if limit is not None and len(idx) > limit:
break
ret['rpms'] = list(idx.values())
if lazy and ret['rpms']:
return ret
ret['component_of'] = []
# find images/archives that contain the build rpms
fields = ['archive_id']
joins = ['archiveinfo on archiveinfo.id = archive_id',
'build on archiveinfo.build_id = build.id']
clauses = ['archive_rpm_components.rpm_id = %(rpm_id)s',
'build.state = %(st_complete)s']
values = {'st_complete': koji.BUILD_STATES['COMPLETE']}
qopts = {'asList': True}
if limit:
qopts['limit'] = limit
query = QueryProcessor(columns=fields, tables=['archive_rpm_components'],
clauses=clauses, joins=joins, values=values, opts=qopts)
for rpm_id in build_rpm_ids:
query.values['rpm_id'] = rpm_id
archive_ids = [i[0] for i in query.execute()]
ret['component_of'].extend(archive_ids)
if lazy and ret['component_of']:
return ret
# find archives whose buildroots we were in
fields = [
('archiveinfo.id', 'id'),
('archiveinfo.type_id', 'type_id'),
('archivetypes.name', 'type_name'),
('archiveinfo.build_id', 'build_id'),
('archiveinfo.filename', 'filename')
]
columns, aliases = zip(*fields)
idx = {}
opts = {}
if limit is not None:
opts = {'limit': limit}
for archive_id in build_archive_ids:
query = QueryProcessor(tables=['buildroot_archives'], columns=columns, aliases=aliases,
joins=['archiveinfo ON archiveinfo.buildroot_id = '
'buildroot_archives.buildroot_id',
'build ON archiveinfo.build_id = build.id',
'archivetypes ON archivetypes.id = archiveinfo.type_id'],
clauses=['buildroot_archives.archive_id = %(archive_id)i',
'build.state = %(st_complete)i'],
values={'archive_id': archive_id, 'st_complete': st_complete},
opts=opts)
for row in query.execute():
idx.setdefault(row['id'], row)
if limit is not None and len(idx) > limit:
break
ret['archives'] = list(idx.values())
if lazy and ret['archives']:
return ret
# find images/archives that contain the build archives
fields = ['archive_id']
joins = ['archiveinfo on archiveinfo.id = archive_id',
'build on archiveinfo.build_id = build.id']
clauses = ['archive_components.component_id = %(archive_id)s',
'build.state = %(st_complete)s']
values = {'st_complete': koji.BUILD_STATES['COMPLETE']}
qopts = {'asList': True}
if limit:
qopts['limit'] = limit
query = QueryProcessor(columns=fields, tables=['archive_components'],
clauses=clauses, joins=joins, values=values, opts=qopts)
for archive_id in build_archive_ids:
query.values['archive_id'] = archive_id
archive_ids = [i[0] for i in query.execute()]
ret['component_of'].extend(archive_ids)
if lazy and ret['component_of']:
return ret
# find timestamp of most recent use in a buildroot
event_id = 0
if build_rpm_ids:
# psql planner gots confused if buildroot table is large (>trillion)
# and len(rpm_ids) > ~500. In such case it switched to looped sequential scans
# using "SET enabled_hashjoin=off" improved it for some cases. CTE could be slower for
# simple cases but would improve complicated ones.
q = """WITH buildroot_ids as (
SELECT DISTINCT buildroot_id
FROM buildroot_listing
WHERE rpm_id IN %(rpm_ids)s
)
SELECT MAX(create_event)
FROM standard_buildroot
WHERE buildroot_id IN (
SELECT buildroot_id FROM buildroot_ids
)"""
event_id = (_fetchSingle(q, {'rpm_ids': build_rpm_ids}) or (0,))[0] or 0
if build_archive_ids:
q = """WITH buildroot_ids as (
SELECT DISTINCT buildroot_id
FROM buildroot_archives
WHERE archive_id IN %(archive_ids)s
)
SELECT MAX(create_event)
FROM standard_buildroot
WHERE buildroot_id IN (
SELECT buildroot_id FROM buildroot_ids
)"""
event_id2 = (_fetchSingle(q, {'archive_ids': build_archive_ids}) or (0,))[0] or 0
event_id = max(event_id, event_id2)
if event_id:
q = """SELECT date_part('epoch', get_event_time(%(event_id)i))"""
ret['last_used'] = _singleValue(q, locals())
else:
ret['last_used'] = None
# set 'images' field for backwards compat
ret['images'] = ret['component_of']
return ret
def delete_build(build, strict=True, min_ref_age=604800):
"""delete a build, if possible
Attempts to delete a build. A build can only be deleted if it is
unreferenced.
If strict is true (default), an exception is raised if the build cannot
be deleted.
Note that a deleted build is not completely gone. It is marked deleted and some
data remains in the database. Mainly, the rpms are removed.
Note in particular that deleting a build DOES NOT free any NVRs (or NVRAs) for
reuse.
Returns True if successful, False otherwise
"""
context.session.assertPerm('admin')
binfo = get_build(build, strict=True)
if binfo['state'] == koji.BUILD_STATES['DELETED']:
# silently return on already deleted build
return
refs = build_references(binfo['id'], limit=10, lazy=True)
if refs.get('tags'):
if strict:
raise koji.GenericError("Cannot delete build, tagged: %s" % refs['tags'])
return False
if refs.get('rpms'):
if strict:
raise koji.GenericError("Cannot delete build, used in buildroots: %s" % refs['rpms'])
return False
if refs.get('archives'):
if strict:
raise koji.GenericError("Cannot delete build, used in archive buildroots: %s" %
refs['archives'])
return False
if refs.get('component_of'):
if strict:
raise koji.GenericError("Cannot delete build, used as component of: %r" %
refs['component_of'])
return False
if refs.get('last_used'):
age = time.time() - refs['last_used']
if age < min_ref_age:
if strict:
raise koji.GenericError("Cannot delete build, used in recent buildroot")
return False
# otherwise we can delete it
_delete_build(binfo)
logged_user = get_user(context.session.user_id)
logger.warning("Build %s is deleted by %s", binfo['nvr'], logged_user['name'])
return True
def _delete_build(binfo):
"""Delete a build (no reference checks)
Please consider calling delete_build instead
"""
# build-related data:
# build KEEP (marked deleted)
# maven_builds KEEP
# win_builds KEEP
# image_builds KEEP
# build_types KEEP
# task ??
# tag_listing REVOKE (versioned) (but should ideally be empty anyway)
# rpminfo KEEP
# buildroot_listing KEEP (but should ideally be empty anyway)
# rpmsigs DELETE
# archiveinfo KEEP
# buildroot_archives KEEP (but should ideally be empty anyway)
# files on disk: DELETE
st_deleted = koji.BUILD_STATES['DELETED']
st_old = binfo['state']
koji.plugin.run_callbacks('preBuildStateChange',
attribute='state', old=st_old, new=st_deleted, info=binfo)
build_id = binfo['id']
query = QueryProcessor(tables=['rpminfo'], columns=['id'], clauses=['build_id=%(build_id)i'],
values={'build_id': build_id}, opts={'asList': True})
for (rpm_id,) in query.execute():
delete = DeleteProcessor(table='rpmsigs', clauses=['rpm_id=%(rpm_id)i'],
values={'rpm_id': rpm_id})
delete.execute()
delete = DeleteProcessor(table='rpm_checksum', clauses=['rpm_id=%(rpm_id)i'],
values={'rpm_id': rpm_id})
delete.execute()
values = {'build_id': build_id}
update = UpdateProcessor('tag_listing', clauses=["build_id=%(build_id)i"], values=values)
update.make_revoke()
update.execute()
update = UpdateProcessor('build', values=values, clauses=['id=%(build_id)i'],
data={'state': st_deleted})
update.execute()
_delete_build_symlinks(binfo)
# now clear the build dir
builddir = koji.pathinfo.build(binfo)
if os.path.exists(builddir):
koji.util.rmtree(builddir)
binfo = get_build(build_id, strict=True)
koji.plugin.run_callbacks('postBuildStateChange',
attribute='state', old=st_old, new=st_deleted, info=binfo)
def _delete_build_symlinks(binfo):
"""Remove symlinks pointing to the build
These include the symlink created by ensure_volume_symlink and the
symlink created when draft builds are promoted.
"""
base_vol = lookup_name('volume', 'DEFAULT', strict=True)
if binfo['volume_id'] != base_vol['id']:
# remove the link created by ensure_volume_symlinks
base_binfo = binfo.copy()
base_binfo['volume_id'] = base_vol['id']
base_binfo['volume_name'] = base_vol['name']
basedir = koji.pathinfo.build(base_binfo)
if os.path.islink(basedir):
os.unlink(basedir)
if not binfo['draft']:
# if the build isn't a draft, it may once have been
draft_release = koji.gen_draft_release(binfo['release'], binfo['id'])
for check_vol in list_volumes():
# the build could have been on any volume when promoted
check_binfo = binfo.copy()
check_binfo['volume_id'] = check_vol['id']
check_binfo['volume_name'] = check_vol['name']
check_binfo['release'] = draft_release
checkdir = koji.pathinfo.build(check_binfo)
if os.path.islink(checkdir):
os.unlink(checkdir)
def reset_build(build):
"""Reset a build so that it can be reimported
WARNING: this function is highly destructive. use with care.
nulls task_id
sets state to CANCELED
sets volume to DEFAULT
clears all referenced data in other tables, including buildroot and
archive component tables
draft and extra are kept
after reset, only the build table entry is left
"""
# Only an admin may do this
context.session.assertPerm('admin')
binfo = get_build(build)
if not binfo:
# nothing to do
return
st_old = binfo['state']
koji.plugin.run_callbacks('preBuildStateChange',
attribute='state', old=st_old, new=koji.BUILD_STATES['CANCELED'],
info=binfo)
query = QueryProcessor(tables=['rpminfo'], columns=['id'], clauses=['build_id=%(id)i'],
values={'id': binfo['build_id']}, opts={'asList': True})
for (rpm_id,) in query.execute():
delete = DeleteProcessor(table='rpmsigs', clauses=['rpm_id=%(rpm_id)i'],
values={'rpm_id': rpm_id})
delete.execute()
delete = DeleteProcessor(table='buildroot_listing', clauses=['rpm_id=%(rpm_id)i'],
values={'rpm_id': rpm_id})
delete.execute()
delete = DeleteProcessor(table='archive_rpm_components', clauses=['rpm_id=%(rpm_id)i'],
values={'rpm_id': rpm_id})
delete.execute()
delete = DeleteProcessor(table='rpm_checksum', clauses=['rpm_id=%(rpm_id)i'],
values={'rpm_id': rpm_id})
delete.execute()
delete = DeleteProcessor(table='rpminfo', clauses=['build_id=%(id)i'],
values={'id': binfo['build_id']})
delete.execute()
query = QueryProcessor(tables=['archiveinfo'], columns=['id'], clauses=['build_id=%(id)i'],
values={'id': binfo['build_id']}, opts={'asList': True})
for (archive_id,) in query.execute():
delete = DeleteProcessor(table='maven_archives', clauses=['archive_id=%(archive_id)i'],
values={'archive_id': archive_id})
delete.execute()
delete = DeleteProcessor(table='win_archives', clauses=['archive_id=%(archive_id)i'],
values={'archive_id': archive_id})
delete.execute()
delete = DeleteProcessor(table='image_archives', clauses=['archive_id=%(archive_id)i'],
values={'archive_id': archive_id})
delete.execute()
delete = DeleteProcessor(table='buildroot_archives', clauses=['archive_id=%(archive_id)i'],
values={'archive_id': archive_id})
delete.execute()
delete = DeleteProcessor(table='archive_rpm_components',
clauses=['archive_id=%(archive_id)i'],
values={'archive_id': archive_id})
delete.execute()
delete = DeleteProcessor(table='archive_components', clauses=['archive_id=%(archive_id)i'],
values={'archive_id': archive_id})
delete.execute()
delete = DeleteProcessor(table='archive_components',
clauses=['component_id=%(archive_id)i'],
values={'archive_id': archive_id})
delete.execute()
delete = DeleteProcessor(table='archiveinfo', clauses=['build_id=%(id)i'],
values={'id': binfo['build_id']})
delete.execute()
delete = DeleteProcessor(table='maven_builds', clauses=['build_id=%(id)i'],
values={'id': binfo['build_id']})
delete.execute()
delete = DeleteProcessor(table='win_builds', clauses=['build_id=%(id)i'],
values={'id': binfo['build_id']})
delete.execute()
delete = DeleteProcessor(table='image_builds', clauses=['build_id=%(id)i'],
values={'id': binfo['build_id']})
delete.execute()
delete = DeleteProcessor(table='build_types', clauses=['build_id=%(id)i'],
values={'id': binfo['build_id']})
delete.execute()
delete = DeleteProcessor(table='tag_listing', clauses=['build_id=%(id)i'],
values={'id': binfo['build_id']})
delete.execute()
binfo['state'] = koji.BUILD_STATES['CANCELED']
update = UpdateProcessor('build', clauses=['id=%(id)s'], values={'id': binfo['id']},
data={'state': binfo['state'], 'task_id': None, 'volume_id': 0})
update.execute()
_delete_build_symlinks(binfo)
# now clear the build dir
builddir = koji.pathinfo.build(binfo)
if os.path.exists(builddir):
koji.util.rmtree(builddir)
binfo = get_build(build, strict=True)
koji.plugin.run_callbacks('postBuildStateChange',
attribute='state', old=st_old, new=koji.BUILD_STATES['CANCELED'],
info=binfo)
def cancel_build(build_id, cancel_task=True):
"""Cancel a build
Calling function should perform permission checks.
If the build is associated with a task, cancel the task as well (unless
cancel_task is False).
Return True if the build was successfully canceled, False if not.
The cancel_task option is used to prevent loops between task- and build-
cancellation.
"""
st_canceled = koji.BUILD_STATES['CANCELED']
st_building = koji.BUILD_STATES['BUILDING']
build = get_build(build_id, strict=True)
if build['state'] != st_building:
return False
st_old = build['state']
koji.plugin.run_callbacks('preBuildStateChange',
attribute='state', old=st_old, new=st_canceled, info=build)
update = UpdateProcessor('build',
clauses=['id = %(build_id)i', 'state = %(st_building)i'],
values={'build_id': build_id, 'st_building': st_building},
data={'state': st_canceled}, rawdata={'completion_time': 'NOW()'})
update.execute()
build = get_build(build_id)
if build['state'] != st_canceled:
return False
task_id = build['task_id']
if task_id is not None:
build_notification(task_id, build_id)
if cancel_task:
Task(task_id).cancelFull(strict=False)
# remove possible CG reservations
delete = DeleteProcessor(table='build_reservations', clauses=['build_id = %(build_id)i'],
values={'build_id': build_id})
delete.execute()
build = get_build(build_id, strict=True)
koji.plugin.run_callbacks('postBuildStateChange',
attribute='state', old=st_old, new=st_canceled, info=build)
return True
def _get_build_target(task_id):
# XXX Should we be storing a reference to the build target
# in the build table for reproducibility?
task = Task(task_id)
info = task.getInfo(request=True)
request = info['request']
if info['method'] in ('build', 'maven'):
# request is (source-url, build-target, map-of-other-options)
if request[1]:
return get_build_target(request[1])
elif info['method'] == 'winbuild':
# request is (vm-name, source-url, build-target, map-of-other-options)
if request[2]:
return get_build_target(request[2])
return None
def get_notification_recipients(build, tag_id, state):
"""
Return the list of email addresses that should be notified about events
involving the given build and tag. This could be the build into that tag
succeeding or failing, or the build being manually tagged or untagged from
that tag.
The list will contain email addresss for all users who have registered for
notifications on the package or tag (or both), as well as the package owner
for this tag and the user who submitted the build. The list will not contain
duplicates.
Only active 'human' users will be in this list.
"""
joins = ['JOIN users ON build_notifications.user_id = users.id']
users_status = koji.USER_STATUS['NORMAL']
users_usertypes = [koji.USERTYPES['NORMAL'], koji.USERTYPES['GROUP']]
clauses = [
'status = %(users_status)i',
'usertype IN %(users_usertypes)s',
]
if not build and tag_id:
raise koji.GenericError('Invalid call')
if build:
package_id = build['package_id']
clauses.append('package_id = %(package_id)i OR package_id IS NULL')
else:
clauses.append('package_id IS NULL')
if tag_id:
clauses.append('tag_id = %(tag_id)i OR tag_id IS NULL')
else:
clauses.append('tag_id IS NULL')
if state != koji.BUILD_STATES['COMPLETE']:
clauses.append('success_only = FALSE')
query = QueryProcessor(columns=('user_id', 'email'), tables=['build_notifications'],
joins=joins, clauses=clauses, values=locals())
recipients = query.execute()
email_domain = context.opts['EmailDomain']
notify_on_success = context.opts['NotifyOnSuccess']
if build and (notify_on_success is True or state != koji.BUILD_STATES['COMPLETE']):
# user who submitted the build
recipients.append({
'user_id': build['owner_id'],
'email': '%s@%s' % (build['owner_name'], email_domain)
})
if tag_id:
packages = readPackageList(pkgID=package_id, tagID=tag_id, inherit=True)
# owner of the package in this tag, following inheritance
pkgdata = packages.get(package_id)
# If the package list has changed very recently it is possible we
# will get no result.
if pkgdata and not pkgdata['blocked']:
owner = get_user(pkgdata['owner_id'], strict=True)
if owner['status'] == koji.USER_STATUS['NORMAL'] and \
owner['usertype'] == koji.USERTYPES['NORMAL']:
recipients.append({
'user_id': owner['id'],
'email': '%s@%s' % (owner['name'], email_domain)
})
# FIXME - if tag_id is None, we don't have a good way to get the package owner.
# using all package owners from all tags would be way overkill.
if not recipients:
return []
# apply the opt-outs
user_ids = list(set([r['user_id'] for r in recipients]))
if user_ids:
clauses = ['user_id IN %(user_ids)s']
if build:
package_id = build['package_id']
clauses.append('package_id = %(package_id)i OR package_id IS NULL')
else:
clauses.append('package_id IS NULL')
if tag_id:
clauses.append('tag_id = %(tag_id)i OR tag_id IS NULL')
else:
clauses.append('tag_id IS NULL')
query = QueryProcessor(columns=['user_id'], clauses=clauses,
tables=['build_notifications_block'], values=locals())
optouts = [r['user_id'] for r in query.execute()]
optouts = set(optouts)
else:
optouts = set()
emails = [r['email'] for r in recipients if r['user_id'] not in optouts]
return list(set(emails))
def tag_notification(is_successful, tag_id, from_id, build_id, user_id, ignore_success=False,
failure_msg=''):
if context.opts.get('DisableNotifications'):
return
if user_id:
if not isinstance(user_id, int):
user_id = get_user(user_id, strict=True)['id']
if is_successful:
state = koji.BUILD_STATES['COMPLETE']
else:
state = koji.BUILD_STATES['FAILED']
recipients = {}
build = get_build(build_id)
if not build:
# the build doesn't exist, so there's nothing to send a notification about
return None
if tag_id:
tag = get_tag(tag_id)
if tag:
for email in get_notification_recipients(build, tag['id'], state):
recipients[email] = 1
if from_id:
from_tag = get_tag(from_id)
if from_tag:
for email in get_notification_recipients(build, from_tag['id'], state):
recipients[email] = 1
recipients_uniq = list(recipients.keys())
if len(recipients_uniq) > 0 and not (is_successful and ignore_success):
task_id = make_task('tagNotification',
[recipients_uniq, is_successful, tag_id, from_id, build_id, user_id,
ignore_success, failure_msg])
return task_id
return None
def build_notification(task_id, build_id):
if context.opts.get('DisableNotifications'):
return
build = get_build(build_id)
target = _get_build_target(task_id)
dest_tag = None
if target:
dest_tag = target['dest_tag']
if build['state'] == koji.BUILD_STATES['BUILDING']:
raise koji.GenericError('never send notifications for incomplete builds')
web_url = context.opts.get('KojiWebURL', 'http://localhost/koji')
recipients = get_notification_recipients(build, dest_tag, build['state'])
if recipients:
make_task('buildNotification', [recipients, build, target, web_url])
def get_build_notifications(user_id):
query = QueryProcessor(tables=['build_notifications'],
columns=('id', 'user_id', 'package_id', 'tag_id',
'success_only', 'email'),
clauses=['user_id = %(user_id)i'],
values={'user_id': user_id})
return query.execute()
def get_build_notification_blocks(user_id):
query = QueryProcessor(tables=['build_notifications_block'],
columns=['id', 'user_id', 'package_id', 'tag_id'],
clauses=['user_id = %(user_id)i'],
values={'user_id': user_id})
return query.execute()
def new_group(name):
"""Add a user group to the database"""
context.session.assertPerm('admin')
verify_name_internal(name)
if get_user(name):
raise koji.GenericError('user/group already exists: %s' % name)
return context.session.createUser(name, usertype=koji.USERTYPES['GROUP'])
def add_group_member(group, user, strict=True):
"""Add user to group"""
context.session.assertPerm('admin')
ginfo = get_user(group)
uinfo = get_user(user)
if not ginfo or ginfo['usertype'] != koji.USERTYPES['GROUP']:
raise koji.GenericError("Not a group: %s" % group)
if not uinfo:
raise koji.GenericError("Not a user: %s" % user)
if uinfo['usertype'] == koji.USERTYPES['GROUP']:
raise koji.GenericError("Groups cannot be members of other groups")
# check to see if user is already a member
data = {'user_id': uinfo['id'], 'group_id': ginfo['id']}
table = 'user_groups'
query = QueryProcessor(columns=['user_id'], tables=[table],
clauses=['active = TRUE', 'user_id = %(user_id)i',
'group_id = %(group_id)s'],
values=data, opts={'rowlock': True})
row = query.executeOne()
if row:
if not strict:
return
raise koji.GenericError("User already in group")
insert = InsertProcessor(table, data)
insert.make_create()
insert.execute()
def drop_group_member(group, user):
"""Drop user from group"""
context.session.assertPerm('admin')
user = get_user(user, strict=True)
ginfo = get_user(group)
if not ginfo or ginfo['usertype'] != koji.USERTYPES['GROUP']:
raise koji.GenericError("Not a group: %s" % group)
if user['id'] not in [u['id'] for u in get_group_members(group)]:
raise koji.GenericError("No such user in group: %s" % group)
data = {'user_id': user['id'], 'group_id': ginfo['id']}
clauses = ["user_id = %(user_id)i", "group_id = %(group_id)i"]
update = UpdateProcessor('user_groups', values=data, clauses=clauses)
update.make_revoke()
update.execute()
def get_group_members(group):
"""Get the members of a group"""
ginfo = get_user(group)
if not ginfo or ginfo['usertype'] != koji.USERTYPES['GROUP']:
raise koji.GenericError("No such group: %s" % group)
query = QueryProcessor(tables=['user_groups'],
columns=['id', 'name', 'usertype', 'array_agg(krb_principal)'],
aliases=['id', 'name', 'usertype', 'krb_principals'],
joins=['JOIN users ON user_groups.user_id = users.id',
'LEFT JOIN user_krb_principals'
' ON users.id = user_krb_principals.user_id'],
clauses=[eventCondition(None), 'group_id = %(group_id)i'],
values={'group_id': ginfo['id']},
opts={'group': 'users.id'},
enable_group=True,
transform=xform_user_krb)
return query.iterate()
def set_user_status(user, status):
context.session.assertPerm('admin')
if not koji.USER_STATUS.get(status):
raise koji.GenericError('No such status: %s' % status)
if user['status'] == status:
# nothing to do
return
user_id = user['id']
update = UpdateProcessor('users', clauses=['id = %(user_id)i'],
values={'user_id': user_id}, data={'status': status})
rows = update.execute()
# sanity check
if rows == 0:
raise koji.GenericError('No such user ID: %i' % user_id)
def list_cgs():
"""List all available content generators in the system
:returns: A map of content generators, like {"name": data}. The data map
for each content generator has an "id" key for the content
generator ID, and a "users" key for the a list usernames who
are permitted to import for this content generator.
"""
fields = [
('content_generator.id', 'id'),
('content_generator.name', 'name'),
('users.name', 'user_name'),
]
columns, aliases = zip(*fields)
tables = ['cg_users']
joins = ['content_generator ON content_generator.id = cg_users.cg_id',
'users ON users.id = cg_users.user_id']
clauses = ['cg_users.active = TRUE']
query = QueryProcessor(tables=tables, aliases=aliases, columns=columns,
joins=joins, clauses=clauses)
cgs = {}
for result in query.iterate():
cg_id = result['id']
cg_name = result['name']
user_name = result['user_name']
if cg_name not in cgs:
cgs[cg_name] = {'id': cg_id, 'users': []}
cgs[cg_name]['users'].append(user_name)
return cgs
def grant_cg_access(user, cg, create=False):
"""
Grant user access to act as the given content generator
:param user: koji userid or username
:type user: int or str
:param cg: content generator id or name
:type cg: int or str
:param bool create: If True, and the requested cg name entry does not
already exist, then Koji will create the content
generator entry. In such a case, the cg parameter
must be a string. The default is False.
"""
context.session.assertPerm('admin')
user = get_user(user, strict=True)
if create:
cg = lookup_name('content_generator', cg, create=True)
else:
cg = lookup_name('content_generator', cg, strict=True)
ins = InsertProcessor('cg_users')
ins.set(cg_id=cg['id'], user_id=user['id'])
ins.make_create()
if ins.dup_check():
raise koji.GenericError("User already has access to content generator %(name)s" % cg)
ins.execute()
def revoke_cg_access(user, cg):
"""
Revoke a user's access to act as the given content generator
:param user: koji userid or username
:type user: int or str
:param cg: content generator id or name
:type cg: int or str
"""
context.session.assertPerm('admin')
user = get_user(user, strict=True)
cg = lookup_name('content_generator', cg, strict=True)
data = {'user_id': user['id'], 'cg_id': cg['id']}
update = UpdateProcessor('cg_users', values=data,
clauses=["user_id = %(user_id)i", "cg_id = %(cg_id)i"])
update.make_revoke()
update.execute()
def assert_cg(cg, user=None):
cg = lookup_name('content_generator', cg, strict=True)
if user is None:
if not context.session.logged_in:
raise koji.AuthError("Not logged-in")
user = context.session.user_id
user = get_user(user, strict=True)
clauses = ['active = TRUE', 'user_id = %(user_id)s', 'cg_id = %(cg_id)s']
data = {'user_id': user['id'], 'cg_id': cg['id']}
query = QueryProcessor(tables=['cg_users'], columns=['cg_id'], clauses=clauses, values=data)
if not query.execute():
raise koji.AuthError("Content generator access required (%s)" % cg['name'])
def parse_json(value, desc=None, errstr=None):
if value is None:
return value
try:
return koji.fixEncodingRecurse(json.loads(value))
except Exception:
if errstr is None:
if desc is None:
errstr = "Invalid json data for %s" % desc
else:
errstr = "Invalid json data"
raise koji.GenericError("%s: %r" % (errstr, value))
def _fix_extra_field(row):
row['extra'] = parse_json(row['extra'], errstr='Invalid extra data')
return row
#
# Policy Test Handlers
class OperationTest(koji.policy.MatchTest):
"""Checks operation against glob patterns"""
name = 'operation'
field = 'operation'
def policy_get_user(data):
"""Determine user from policy data (default to logged-in user)"""
if 'user_id' in data:
return get_user(data['user_id'])
elif context.session.logged_in:
return get_user(context.session.user_id)
return None
def policy_get_pkg(data):
"""Determine package from policy data (default to logged-in user)
returns dict as lookup_package
if package does not exist yet, the id field will be None
"""
if 'package' in data:
pkginfo = lookup_package(data['package'], strict=False)
if not pkginfo:
# for some operations (e.g. adding a new package), the package
# entry may not exist yet
if isinstance(data['package'], str):
return {'id': None, 'name': data['package']}
else:
raise koji.GenericError("No such package: %s" % data['package'])
return pkginfo
if 'build' in data:
binfo = get_build(data['build'], strict=True)
return {'id': binfo['package_id'], 'name': binfo['name']}
# else
raise koji.GenericError("policy requires package data")
def policy_get_version(data):
"""Determine version from policy data
returns version as string
"""
if 'version' in data:
return data['version']
if 'build' in data:
return get_build(data['build'], strict=True)['version']
# else
raise koji.GenericError("policy requires version data")
def policy_get_release(data):
"""Determine release from policy data
returns release as string
"""
if 'release' in data:
return data['release']
if 'build' in data:
return get_build(data['build'], strict=True)['release']
# else
raise koji.GenericError("policy requires release data")
def policy_get_brs(data):
"""Determine content generators from policy data"""
if 'buildroots' in data:
return set(data['buildroots'])
elif 'build' in data:
binfo = get_build(data['build'], strict=True)
rpm_brs = [r['buildroot_id'] for r in list_rpms(buildID=binfo['id'])]
archive_brs = [a['buildroot_id'] for a in list_archives(buildID=binfo['id'])]
return set(rpm_brs + archive_brs)
else:
return set()
def policy_get_cgs(data):
# pull cg info out
# note that br_id will be None if a component had no buildroot
if 'cg_list' in data:
cgs = [lookup_name('content_generator', cg, strict=True)['name']
for cg in data['cg_list']]
return set(cgs)
# otherwise try buildroot data
cgs = set()
for br_id in policy_get_brs(data):
if br_id is None:
cgs.add(None)
else:
cgs.add(get_buildroot(br_id, strict=True)['cg_name'])
return cgs
def policy_get_build_tags(data, taginfo=False):
"""If taginfo is set, return list of taginfos, else list of names only"""
tags = {}
if 'build_tag' in data:
buildtag = get_tag(data['build_tag'], strict=True, event="auto")
tags[buildtag['name']] = buildtag
elif 'build_tags' in data:
build_tags = [get_tag(t, strict=True, event="auto") for t in data['build_tags']]
for tag in build_tags:
tags[tag['name']] = tag
if not tags:
# see if we have a target
target = data.get('target')
if target:
target = get_build_target(target, strict=False)
if target:
tags[target['build_tag_name']] = get_tag(target['build_tag'], strict=True,
event="auto")
if not tags:
# otherwise look at buildroots
for br_id in policy_get_brs(data):
if br_id is None:
tags[None] = None
else:
tinfo = get_buildroot(br_id, strict=True)
# CG don't need to have buildroots based on tags
if tinfo['tag_name']:
tags[tinfo['tag_name']] = get_tag(tinfo['tag_name'], strict=True,
event=tinfo['repo_create_event_id'])
if taginfo:
tags = tags.values()
else:
tags = tags.keys()
return tags
def policy_get_build_types(data):
if 'btypes' in data:
# btypes can be already populated by caller
return set(data['btypes'])
if 'build' in data:
binfo = get_build(data['build'], strict=True)
return set(get_build_type(binfo).keys())
return set()
class NewPackageTest(koji.policy.BaseSimpleTest):
"""Checks to see if a package exists yet"""
name = 'is_new_package'
def run(self, data):
return (policy_get_pkg(data)['id'] is None)
class PackageTest(koji.policy.MatchTest):
"""Checks package against glob patterns"""
name = 'package'
field = '_package'
def run(self, data):
# we need to find the package name from the base data
data[self.field] = policy_get_pkg(data)['name']
return super(PackageTest, self).run(data)
class VersionTest(koji.policy.MatchTest):
"""Checks version against glob patterns"""
name = 'version'
field = '_version'
def run(self, data):
data[self.field] = policy_get_version(data)
return super(VersionTest, self).run(data)
class ReleaseTest(koji.policy.MatchTest):
"""Checks release against glob patterns"""
name = 'release'
field = '_release'
def run(self, data):
# we need to find the build NVR from the base data
data[self.field] = policy_get_release(data)
return super(ReleaseTest, self).run(data)
class VolumeTest(koji.policy.MatchTest):
"""Checks storage volume against glob patterns"""
name = 'volume'
field = '_volume'
def run(self, data):
# we need to find the volume name from the base data
volinfo = None
if 'volume' in data:
volinfo = lookup_name('volume', data['volume'], strict=False)
elif 'build' in data:
build = get_build(data['build'])
volinfo = {'id': build['volume_id'], 'name': build['volume_name']}
if not volinfo:
return False
data[self.field] = volinfo['name']
return super(VolumeTest, self).run(data)
class CGMatchAnyTest(koji.policy.BaseSimpleTest):
"""Checks content generator against glob patterns
The 'any' means that if any of the cgs for the build (there can be more
than one) match the pattern list, then the result is True
"""
name = 'cg_match_any'
def run(self, data):
# we need to find the volume name from the base data
cgs = policy_get_cgs(data)
patterns = self.str.split()[1:]
for cg_name in cgs:
if cg_name is None:
# component with no br, or br with no cg
continue
if multi_fnmatch(cg_name, patterns):
return True
# else
return False
class CGMatchAllTest(koji.policy.BaseSimpleTest):
"""Checks content generator against glob patterns
The 'all' means that all of the cgs for the build (there can be more
than one) must match the pattern list for the result to be true.
"""
name = 'cg_match_all'
def run(self, data):
# we need to find the volume name from the base data
cgs = policy_get_cgs(data)
if not cgs:
return False
patterns = self.str.split()[1:]
for cg_name in cgs:
if cg_name is None:
return False
if not multi_fnmatch(cg_name, patterns):
return False
# else
return True
class TagTest(koji.policy.MatchTest):
name = 'tag'
field = '_tagname'
def get_tag(self, data):
"""extract the tag to test against from the data
return None if there is no tag to test
"""
tag = data.get('tag')
if tag is None:
return None
return get_tag(tag, strict=False)
def run(self, data):
# we need to find the tag name from the base data
tinfo = self.get_tag(data)
if tinfo is None:
return False
data[self.field] = tinfo['name']
return super(TagTest, self).run(data)
class FromTagTest(TagTest):
name = 'fromtag'
def get_tag(self, data):
tag = data.get('fromtag')
if tag is None:
return None
return get_tag(tag, strict=False)
class HasTagTest(koji.policy.BaseSimpleTest):
"""Check to see if build (currently) has a given tag"""
name = 'hastag'
def run(self, data):
if 'build' not in data:
return False
tags = list_tags(build=data['build'])
# True if any of these tags match any of the patterns
args = self.str.split()[1:]
for tag in tags:
for pattern in args:
if fnmatch.fnmatch(tag['name'], pattern):
return True
# otherwise...
return False
class SkipTagTest(koji.policy.BaseSimpleTest):
"""Check for the skip_tag option
For policies regarding build tasks (e.g. build_from_srpm)
"""
name = 'skip_tag'
def run(self, data):
return bool(data.get('skip_tag'))
class BuildTagTest(koji.policy.BaseSimpleTest):
"""Check the build tag(s) of the build
If build_tag is not provided in policy data, it is determined by the
buildroots of the component rpms
"""
name = 'buildtag'
def run(self, data):
args = self.str.split()[1:]
for tagname in policy_get_build_tags(data):
if tagname is None:
# content generator buildroots might not have tag info
continue
if multi_fnmatch(tagname, args):
return True
# otherwise...
return False
class BuildTagInheritsFromTest(koji.policy.BaseSimpleTest):
"""Check all parents of buildtag (without child tag)"""
name = 'buildtag_inherits_from'
def run(self, data):
test_name, *args = self.str.split()
assert (test_name == self.name)
for tinfo in policy_get_build_tags(data, taginfo=True):
if tinfo is None:
# content generator buildroots might not have tag info
continue
for tag in readFullInheritance(tinfo['id'], event=tinfo.get('query_event')):
if multi_fnmatch(tag['name'], args):
return True
# otherwise...
return False
class BuildTypeTest(koji.policy.BaseSimpleTest):
"""Check the build type(s) of the build"""
name = 'buildtype'
def run(self, data):
args = self.str.split()[1:]
for btype in policy_get_build_types(data):
if multi_fnmatch(btype, args):
return True
return False
class ImportedTest(koji.policy.BaseSimpleTest):
"""Check if any part of a build was imported
This is determined by checking the buildroots of the rpms and archives
True if any of them lack a buildroot (strict)"""
name = 'imported'
def run(self, data):
build_info = data.get('build')
if not build_info:
raise koji.GenericError('policy data must contain a build')
build_id = get_build(build_info, strict=True)['id']
# no test args
for rpminfo in list_rpms(buildID=build_id):
if rpminfo['buildroot_id'] is None:
return True
for archive in list_archives(buildID=build_id):
if archive['buildroot_id'] is None:
return True
# otherwise...
return False
class ChildTaskTest(koji.policy.BoolTest):
name = 'is_child_task'
field = 'parent'
class MethodTest(koji.policy.MatchTest):
name = 'method'
field = 'method'
class UserTest(koji.policy.MatchTest):
"""Checks username against glob patterns"""
name = 'user'
field = '_username'
def run(self, data):
user = policy_get_user(data)
if not user:
return False
data[self.field] = user['name']
return super(UserTest, self).run(data)
class VMTest(koji.policy.MatchTest):
"""Checks a VM name against glob patterns"""
name = 'vm_name'
field = 'vm_name'
class IsBuildOwnerTest(koji.policy.BaseSimpleTest):
"""Check if user owns the build"""
name = "is_build_owner"
def run(self, data):
build = get_build(data['build'])
owner = get_user(build['owner_id'])
user = policy_get_user(data)
if not user:
return False
if owner['id'] == user['id']:
return True
if owner['usertype'] == koji.USERTYPES['GROUP']:
# owner is a group, check to see if user is a member
if owner['id'] in get_user_groups(user['id']):
return True
# otherwise...
return False
class IsDraftTest(koji.policy.BaseSimpleTest):
"""Check if the build is a draft build"""
name = "is_draft"
def run(self, data):
if 'draft' in data:
return bool(data['draft'])
if 'build' in data:
build = get_build(data['build'])
return build.get('draft', False)
# default...
return False
class UserInGroupTest(koji.policy.BaseSimpleTest):
"""Check if user is in group(s)
args are treated as patterns and matched against group name
true if user is in /any/ matching group
"""
name = "user_in_group"
def run(self, data):
user = policy_get_user(data)
if not user:
return False
groups = get_user_groups(user['id'])
args = self.str.split()[1:]
for group_id, group in groups.items():
for pattern in args:
if fnmatch.fnmatch(group, pattern):
return True
# otherwise...
return False
class HasPermTest(koji.policy.BaseSimpleTest):
"""Check if user has permission(s)
args are treated as patterns and matched against permission name
true if user has /any/ matching permission
"""
name = "has_perm"
def run(self, data):
user = policy_get_user(data)
if not user:
return False
perms = get_user_perms(user['id'])
args = self.str.split()[1:]
for perm in perms:
for pattern in args:
if fnmatch.fnmatch(perm, pattern):
return True
# otherwise...
return False
class SourceTest(koji.policy.MatchTest):
"""Match build source
This is not the cleanest, since we have to crack open the task parameters
True if build source matches any of the supplied patterns
"""
name = "source"
field = '_source'
def run(self, data):
if 'source' in data:
data[self.field] = data['source']
elif 'build' in data:
build = get_build(data['build'])
task_id = extract_build_task(build)
if build['source'] is not None:
data[self.field] = build['source']
elif task_id is None:
# no source to match against
return False
else:
# crack open the build task
task = Task(task_id)
info = task.getInfo(request=True)
method = info['method']
request = info['request']
params = parse_task_params(method, request)
# signatures:
# build - (src, target, opts=None)
# maven - (url, target, opts=None)
# winbuild - (name, source_url, target, opts=None)
# wrapperRPM - (spec_url, build_target, build, task, opts=None)
if info['method'] == 'winbuild':
data[self.field] = params['source_url']
elif info['method'] == 'indirectionimage':
return False
elif info['method'] == 'wrapperRPM':
data[self.field] = params['spec_url']
elif 'src' in params:
data[self.field] = params['src']
elif 'url' in params:
data[self.field] = params['url']
else:
print("Unable to determine source from task '{}'".format(task_id))
return False
else:
return False
return super(SourceTest, self).run(data)
class PolicyTest(koji.policy.BaseSimpleTest):
"""Test named policy
The named policy must exist
Returns True is the policy results in an action of:
yes, true, allow
Otherwise returns False
(Also returns False if there are no matches in the policy)
Watch out for loops
"""
name = 'policy'
def __init__(self, str):
super(PolicyTest, self).__init__(str)
def run(self, data):
args = self.str.split()[1:]
# we store some instance-specific state in context for loop detection
# note that context is thread local and cleared after each call
# note that this instance represents a specific test in the policy
# i.e. each occurrence of 'policy foo' is a separate instance
key = 'policy_test_state_%s_running' % id(self)
if hasattr(context, key):
# LOOP!
raise koji.GenericError("encountered policy loop at %s" % self.str)
ruleset = context.policy.get(args[0])
if not ruleset:
raise koji.GenericError("no such policy: %s" % args[0])
setattr(context, key, True)
try:
result = ruleset.apply(data)
finally:
delattr(context, key)
if result is None:
return False
else:
return result.lower() in ('yes', 'true', 'allow')
def check_policy(name, data, default='deny', strict=False, force=False):
"""Check data against the named policy
This assumes the policy actions consist of:
allow
deny
Returns a pair (access, reason)
access: True if the policy result is allow, false otherwise
reason: reason for the access
If strict is True, will raise ActionNotAllowed if the action is not 'allow'
If force is True, policy will pass (under admin), but action will be logged
"""
ruleset = context.policy.get(name)
if not ruleset:
if context.opts.get('MissingPolicyOk'):
# for backwards compatibility, this is the default
result = "allow"
else:
result = "deny"
reason = "missing policy"
lastrule = ''
else:
result = ruleset.apply(data)
if result is None:
result = default
reason = 'not covered by policy'
else:
parts = result.split(None, 1)
parts.extend(['', ''])
result, reason = parts[:2]
result = result.lower()
lastrule = ruleset.last_rule()
if context.opts.get('KojiDebug', False):
logger.error(
"policy %(name)s gave %(result)s, reason: %(reason)s, last rule: %(lastrule)s",
locals())
if result == 'allow':
return True, reason
if result != 'deny':
reason = 'error in policy'
logger.error("Invalid action in policy %s, rule: %s", name, lastrule)
if force:
user = policy_get_user(data)
if user and 'admin' in get_user_perms(user['id']):
msg = "Policy %s overriden by force: %s" % (name, user["name"])
if reason:
msg += ": %s" % reason
logger.info(msg)
return True, "overriden by force"
if not strict:
return False, reason
err_str = "policy violation (%s)" % name
if reason:
err_str += ": %s" % reason
if context.opts.get('KojiDebug') or context.opts.get('VerbosePolicy'):
err_str += " [rule: %s]" % lastrule
raise koji.ActionNotAllowed(err_str)
def eval_policy(name, data):
"""Evaluate named policy with given data and return the result
:param str name: the policy name
:param dict data: the policy data
:returns the action as a string
:raises koji.GenericError if the policy is empty or not found
"""
ruleset = context.policy.get(name)
if not ruleset:
raise koji.GenericError("no such policy: %s" % name)
return ruleset.apply(data)
def policy_data_from_task(task_id):
"""Calculate policy data from task id
:param int task_id: the task id
:returns: dict with policy data
"""
task = Task(task_id)
taskinfo = task.getInfo(strict=True, request=True)
return policy_data_from_task_args(taskinfo['method'], taskinfo['request'])
def policy_data_from_task_args(method, arglist):
"""Calculate policy data from task arguments
:param str method: task method
:param list arglist: raw task params
:returns: dict with policy data
"""
params = {}
policy_data = {}
try:
params = koji.tasks.parse_task_params(method, arglist)
except TypeError:
logger.warning("%s is not a standard koji task", method)
except koji.ParameterError:
logger.warning("Cannot parse parameters: %s of %s task", arglist, method)
except Exception:
logger.warning("Unexcepted error occurs when parsing parameters: %s of %s task",
arglist, method, exc_info=True)
if not params:
return {}
if method == 'indirectionimage':
# this handler buries all its arguments in a single 'opts' parameter
opts = params.get('opts') or {}
params = dict(**opts)
params['opts'] = opts
# parameters that indicate source for build
for k in ('src', 'spec_url', 'url'):
if method == 'newRepo':
# newRepo has a 'src' parameter that means something else
break
if k in params:
convert_value(params[k], cast=str, check_only=True)
policy_data['source'] = params.get(k)
break
# parameters that indicate build target
hastarget = False
for k in ('target', 'build_target', 'target_info'):
if k in params:
target = params.get(k)
hastarget = True
break
if hastarget:
if isinstance(target, dict):
if 'name' not in target:
logger.warning("Bad build target parameter: %r", target)
target = None
else:
target = target.get('name')
if target is not None:
tinfo = lookup_build_target(target, strict=False)
if tinfo is None:
logger.warning("No such build target: %s", target)
target = None
else:
target = tinfo['name']
policy_data['target'] = target
# parameters that indicate a tag
hastag = False
for k in ('tag', 'tag_id', 'tag_info'):
if k in params:
tag = params.get(k)
hastag = True
break
if hastag:
try:
policy_data['tag'] = lookup_tag(tag, strict=True)['name']
except Exception:
logger.warning("Bad tag parameter: %r", tag)
if 'build_tag' in params:
try:
policy_data['build_tag'] = lookup_tag(params['build_tag'], strict=True)['name']
except Exception:
logger.warning("Bad tag parameter: %(build_tag)r", params)
# provide scratch opt if given
# we may have param['opts'] that is explicitly None
t_opts = params.get('opts') or {}
if 'scratch' in t_opts:
policy_data['scratch'] = t_opts['scratch']
return policy_data
def assert_policy(name, data, default='deny', force=False):
"""Enforce the named policy
This assumes the policy actions consist of:
allow
deny
Raises ActionNotAllowed if policy result is not allow
"""
check_policy(name, data, default=default, strict=True, force=force)
def rpmdiff(basepath, rpmlist, hashes):
"Diff the first rpm in the list against the rest of the rpms."
if len(rpmlist) < 2:
return
first_rpm = rpmlist[0]
task_id = first_rpm.split('/')[1]
first_hash = hashes.get(task_id, {}).get(os.path.basename(first_rpm), False)
for other_rpm in rpmlist[1:]:
if first_hash:
task_id = other_rpm.split('/')[1]
other_hash = hashes[task_id][os.path.basename(other_rpm)]
if first_hash == other_hash:
logger.debug("Skipping noarch rpmdiff for %s vs %s" % (first_rpm, other_rpm))
continue
# ignore differences in file size, md5sum, and mtime
# (files may have been generated at build time and contain
# embedded dates or other insignificant differences)
d = koji.rpmdiff.Rpmdiff(joinpath(basepath, first_rpm),
joinpath(basepath, other_rpm), ignore='S5TN')
if d.differs():
raise koji.BuildError(
'The following noarch package built differently on different architectures: %s\n'
'rpmdiff output was:\n%s' % (os.path.basename(first_rpm), d.textdiff()))
def importImageInternal(task_id, build_info, imgdata):
"""
Import image info and the listing into the database, and move an image
to the final resting place. The filesize may be reported as a string if it
exceeds the 32-bit signed integer limit. This function will convert it if
need be. This is the completeBuild for images; it should not be called for
scratch images.
imgdata is:
arch - the arch if the image
task_id - the task that created the image
files - files associated with the image (appliances have multiple files)
rpmlist - the list of RPM NVRs installed into the image
"""
host = Host()
host.verify()
task = Task(task_id)
task.assertHost(host.id)
tinfo = task.getInfo()
koji.plugin.run_callbacks('preImport', type='image', image=imgdata)
# import the build output
workpath = koji.pathinfo.task(imgdata['task_id'])
imgdata['relpath'] = koji.pathinfo.taskrelpath(imgdata['task_id'])
archives = []
for imgfile in imgdata['files']:
fullpath = joinpath(workpath, imgfile)
archivetype = get_archive_type(imgfile)
if not archivetype:
raise koji.BuildError('Unsupported file type: %s' % imgfile)
archives.append(import_archive(fullpath, build_info, 'image', imgdata))
# get uploaded logs
logs = [f for f in os.listdir(workpath) if f.endswith('.log')]
logdir = joinpath(koji.pathinfo.build(build_info), 'data/logs/image')
for logfile in logs:
logsrc = joinpath(workpath, logfile)
# figure out destination dir
final_path = joinpath(logdir, os.path.basename(logfile))
add_arch = False
if tinfo['method'] not in ('appliance', 'image', 'indirectionimage', 'livecd'):
add_arch = True
if add_arch or os.path.exists(final_path):
# add arch for uniqueness
final_path = joinpath(logdir, imgdata['arch'], os.path.basename(logfile))
# sanity checks
if os.path.exists(final_path):
raise koji.GenericError("Error importing build log. %s already exists." % final_path)
if os.path.islink(logsrc) or not os.path.isfile(logsrc):
raise koji.GenericError("Error importing build log. %s is not a regular file." %
logsrc)
# move the logs
koji.ensuredir(logdir)
move_and_symlink(logsrc, final_path, create_dir=True)
# record all of the RPMs installed in the image(s)
# verify they were built in Koji or in an external repo
rpm_ids = []
for an_rpm in imgdata['rpmlist']:
location = an_rpm.get('location')
if location:
data = add_external_rpm(an_rpm, location, strict=False)
else:
data = get_rpm(an_rpm, strict=True)
# unlike buildroot, we simply reject draft rpms as rpm components
# because we probably don't want to keep the nvra uniqueness here.
reject_draft(data, is_rpm=True)
rpm_ids.append(data['id'])
# we sort to try to avoid deadlock issues
rpm_ids.sort()
# associate those RPMs with the image
insert = BulkInsertProcessor('archive_rpm_components')
for archive in archives:
logger.info('working on archive %s', archive)
if archive['filename'].endswith('xml'):
continue
logger.info('associating installed rpms with %s', archive['id'])
for rpm_id in rpm_ids:
insert.add_record(archive_id=archive['id'], rpm_id=rpm_id)
if insert.data:
insert.execute()
koji.plugin.run_callbacks('postImport', type='image', image=imgdata,
build=build_info, fullpath=fullpath)
def _promote_build(build, force=False):
"""Promote a draft build to a regular build.
- The build type is limited to rpm so far.
- The promoting action cannot be revoked.
- The release wil be changed to the target one, so build_id isn't changed
- buildpath will be changed as well and the old build path will symlink
to the new one, so both paths still will be existing until deleted.
:param build: A build ID (int), a NVR (string), or a dict containing
"name", "version" and "release" of a draft build
:type build: int, str, dict
:param bool force: If False (default), Koji will check this
operation against the draft_promotion hub policy. If hub
policy does not allow the current user to promote the draft build,
then this method will raise an error.
If True, then this method will bypass hub policy settings.
Only admin users can set force to True.
:returns: latest build info
:rtype: dict
"""
context.session.assertLogin()
user = get_user(context.session.user_id)
binfo = get_build(build, strict=True)
err_fmt = f"Cannot promote build {binfo['nvr']}. Reason: {{}}"
if not binfo.get('draft'):
raise koji.GenericError(err_fmt.format("Not a draft build"))
state = koji.BUILD_STATES[binfo['state']]
if state != 'COMPLETE':
raise koji.GenericError(err_fmt.format(f'state ({state}) is not COMPLETE.'))
old_release = binfo['release']
target_release = koji.parse_target_release(old_release)
# drop id to get build by NVR
target_build = dslice(binfo, ['name', 'version'])
target_build['release'] = target_release
old_build = get_build(target_build, strict=False)
if old_build:
raise koji.GenericError(err_fmt.format(
f"Target build exists: {old_build['nvr']}(#{old_build['id']})"
))
# policy checks
policy_data = {
'build': binfo['id'],
'target_release': target_release,
'user_id': user['id']
}
assert_policy('draft_promotion', policy_data, force=force)
koji.plugin.run_callbacks(
'preBuildPromote',
draft_release=old_release,
target_release=target_release,
build=binfo,
user=user
)
update = UpdateProcessor('build', clauses=['id=%(id)i'], values=binfo)
update.set(draft=False, release=target_release, promoter=user['id'])
update.rawset(promotion_time='now()')
update.execute()
# Note: changing build.draft will implicitly update corresponding rpminfo.draft fields
# due to the ON UPDATE CASCADE foreign key constraint
new_binfo = get_build(binfo['id'], strict=True)
oldpath = koji.pathinfo.build(binfo)
newpath = koji.pathinfo.build(new_binfo)
safer_move(oldpath, newpath)
ensure_volume_symlink(new_binfo)
# provide a symlink at original draft location
# we point to the default volume in case the build moves in the future
base_vol = lookup_name('volume', 'DEFAULT', strict=True)
base_binfo = new_binfo.copy()
base_binfo['volume_id'] = base_vol['id']
base_binfo['volume_name'] = base_vol['name']
basedir = koji.pathinfo.build(base_binfo)
relpath = os.path.relpath(basedir, os.path.dirname(oldpath))
os.symlink(relpath, oldpath)
# apply volume policy in case it's changed by release update.
apply_volume_policy(new_binfo, strict=False)
# adding DRAFT_PROMOTION for kojira,
# as the latest promoted build should be that latest one.
for tag in list_tags(build=binfo['id']):
set_tag_update(tag['id'], 'DRAFT_PROMOTION')
koji.plugin.run_callbacks(
'postBuildPromote',
draft_release=old_release,
target_release=target_release,
build=new_binfo,
user=user
)
return new_binfo
def _delete_event_id():
"""Helper function to bump event"""
try:
del context.event_id
except AttributeError:
pass
#
# XMLRPC Methods
#
class RootExports(object):
'''Contains functions that are made available via XMLRPC'''
def restartHosts(self, priority=5, options=None):
"""Spawns restartHosts task
:param int priority: task priority
:param dict options: additional task arguments (see restartHosts task)
:returns: task ID
"""
context.session.assertPerm('host')
if options is None:
args = []
elif isinstance(options, dict):
args = [options]
else:
raise koji.ParameterError('Invalid type of options: %s' % type(options))
return make_task('restartHosts', args, priority=priority)
def build(self, src, target, opts=None, priority=None, channel=None):
"""Create a build task
priority: the amount to increase (or decrease) the task priority, relative
to the default priority; higher values mean lower priority; only
admins have the right to specify a negative priority here
channel: the channel to allocate the task to
Returns the task id
"""
context.session.assertLogin()
if not opts:
opts = {}
taskOpts = {}
convert_value(src, cast=str, check_only=True)
if priority:
if priority < 0:
if not context.session.hasPerm('admin'):
raise koji.ActionNotAllowed('only admins may create high-priority tasks')
taskOpts['priority'] = koji.PRIO_DEFAULT + priority
if channel:
taskOpts['channel'] = channel
return make_task('build', [src, target, opts], **taskOpts)
def chainBuild(self, srcs, target, opts=None, priority=None, channel=None):
"""Create a chained build task for building sets of packages in order
srcs: list of pkg lists, ie [[src00, src01, src03],[src20],[src30,src31],...]
where each of the top-level lists gets built and a new repo is created
before the next list is built.
target: build target
priority: the amount to increase (or decrease) the task priority, relative
to the default priority; higher values mean lower priority; only
admins have the right to specify a negative priority here
channel: the channel to allocate the task to
:returns int: Task ID
"""
context.session.assertLogin()
convert_value(srcs, cast=list, check_only=True)
if not opts:
opts = {}
taskOpts = {}
if priority:
if priority < 0:
if not context.session.hasPerm('admin'):
raise koji.ActionNotAllowed('only admins may create high-priority tasks')
taskOpts['priority'] = koji.PRIO_DEFAULT + priority
if channel:
taskOpts['channel'] = channel
return make_task('chainbuild', [srcs, target, opts], **taskOpts)
def mavenBuild(self, url, target, opts=None, priority=None, channel='maven'):
"""Create a Maven build task
url: The url to checkout the source from. May be a CVS, SVN, or GIT repository.
target: the build target
priority: the amount to increase (or decrease) the task priority, relative
to the default priority; higher values mean lower priority; only
admins have the right to specify a negative priority here
channel: the channel to allocate the task to (defaults to the "maven" channel)
Returns the task ID
"""
context.session.assertLogin()
if not context.opts.get('EnableMaven'):
raise koji.GenericError("Maven support not enabled")
convert_value(url, cast=str, check_only=True)
if not opts:
opts = {}
taskOpts = {}
if priority:
if priority < 0:
if not context.session.hasPerm('admin'):
raise koji.ActionNotAllowed('only admins may create high-priority tasks')
taskOpts['priority'] = koji.PRIO_DEFAULT + priority
if channel:
taskOpts['channel'] = channel
return make_task('maven', [url, target, opts], **taskOpts)
def wrapperRPM(self, build, url, target, priority=None, channel='maven', opts=None):
"""Create a top-level wrapperRPM task
build: The build to generate wrapper rpms for. Must be in the COMPLETE state and have no
rpms already associated with it.
url: SCM URL to a specfile fragment
target: The build target to use when building the wrapper rpm.
The build_tag of the target will be used to populate the buildroot in which the
rpms are built.
priority: the amount to increase (or decrease) the task priority, relative
to the default priority; higher values mean lower priority; only
admins have the right to specify a negative priority here
channel: the channel to allocate the task to (defaults to the "maven" channel)
returns the task ID
"""
context.session.assertLogin()
if not context.opts.get('EnableMaven'):
raise koji.GenericError("Maven support not enabled")
if not opts:
opts = {}
convert_value(url, cast=str, check_only=True)
build = self.getBuild(build, strict=True)
if list_rpms(build['id']) and not (opts.get('scratch') or opts.get('create_build')):
raise koji.PreBuildError('wrapper rpms for %s have already been built' %
koji.buildLabel(build))
build_target = self.getBuildTarget(target, strict=True)
if 'repo_id' in opts:
# we ignore this opt for backwards compatibility
logger.warning('The wrapperRPM call ignores repo_id options')
del opts['repo_id']
taskOpts = {}
if priority:
if priority < 0:
if not context.session.hasPerm('admin'):
raise koji.ActionNotAllowed('only admins may create high-priority tasks')
taskOpts['priority'] = koji.PRIO_DEFAULT + priority
convert_value(channel, cast=str, check_only=True)
taskOpts['channel'] = channel
return make_task('wrapperRPM', [url, build_target, build, None, opts], **taskOpts)
def chainMaven(self, builds, target, opts=None, priority=None, channel='maven'):
"""Create a Maven chain-build task
builds: a list of maps defining the parameters for the sequence of builds
target: the build target
priority: the amount to increase (or decrease) the task priority, relative
to the default priority; higher values mean lower priority; only
admins have the right to specify a negative priority here
channel: the channel to allocate the task to (defaults to the "maven" channel)
Returns the task ID
"""
context.session.assertLogin()
if not context.opts.get('EnableMaven'):
raise koji.GenericError("Maven support not enabled")
convert_value(builds, cast=dict, check_only=True)
taskOpts = {}
if priority:
if priority < 0:
if not context.session.hasPerm('admin'):
raise koji.ActionNotAllowed('only admins may create high-priority tasks')
taskOpts['priority'] = koji.PRIO_DEFAULT + priority
if channel:
taskOpts['channel'] = channel
return make_task('chainmaven', [builds, target, opts], **taskOpts)
def winBuild(self, vm, url, target, opts=None, priority=None, channel='vm'):
"""
Create a Windows build task
vm: the name of the VM to run the build in
url: The url to checkout the source from. May be a CVS, SVN, or GIT repository.
opts: task options
target: the build target
priority: the amount to increase (or decrease) the task priority, relative
to the default priority; higher values mean lower priority; only
admins have the right to specify a negative priority here
channel: the channel to allocate the task to (defaults to the "vm" channel)
Returns the task ID
"""
context.session.assertLogin()
if not context.opts.get('EnableWin'):
raise koji.GenericError("Windows support not enabled")
convert_value(vm, cast=str, check_only=True)
convert_value(url, cast=str, check_only=True)
targ_info = get_build_target(target, strict=True)
policy_data = {'vm_name': vm,
'tag': targ_info['dest_tag']}
assert_policy('vm', policy_data)
if not opts:
opts = {}
taskOpts = {}
if priority:
if priority < 0:
if not context.session.hasPerm('admin'):
raise koji.ActionNotAllowed('only admins may create high-priority tasks')
taskOpts['priority'] = koji.PRIO_DEFAULT + priority
if channel:
taskOpts['channel'] = channel
return make_task('winbuild', [vm, url, target, opts], **taskOpts)
# Create the image task. Called from _build_image in the client.
#
def buildImage(self, name, version, arch, target, ksfile, img_type, opts=None, priority=None):
"""
Create an image using a kickstart file and group package list.
"""
if img_type not in ('livecd', 'appliance', 'livemedia'):
raise koji.GenericError('Unrecognized image type: %s' % img_type)
for i in [name, ksfile, version]:
convert_value(i, cast=str, check_only=True)
context.session.assertPerm(img_type)
taskOpts = {'channel': img_type}
if img_type == 'livemedia':
taskOpts['arch'] = 'noarch'
else:
taskOpts['arch'] = arch
if priority:
if priority < 0:
if not context.session.hasPerm('admin'):
raise koji.ActionNotAllowed(
'only admins may create high-priority tasks')
taskOpts['priority'] = koji.PRIO_DEFAULT + priority
return make_task(img_type, [name, version, arch, target, ksfile, opts], **taskOpts)
# Create the image task. Called from _build_image_oz in the client.
#
def buildImageIndirection(self, opts=None, priority=None):
"""
Create an image using two other images and an indirection template
"""
context.session.assertPerm('image')
taskOpts = {'channel': 'image'}
if priority:
if priority < 0:
if not context.session.hasPerm('admin'):
raise koji.ActionNotAllowed(
'only admins may create high-priority tasks')
taskOpts['priority'] = koji.PRIO_DEFAULT + priority
if 'scratch' not in opts and 'indirection_template_url' not in opts:
raise koji.ActionNotAllowed(
'Non-scratch builds must provide url for the indirection template')
if 'arch' in opts:
taskOpts['arch'] = opts['arch']
return make_task('indirectionimage', [opts], **taskOpts)
# Create the image task. Called from _build_image_oz in the client.
#
def buildImageOz(self, name, version, arches, target, inst_tree, opts=None, priority=None):
"""
Create an image using a kickstart file and group package list.
"""
for i in [name, inst_tree, version]:
convert_value(i, cast=str, check_only=True)
context.session.assertPerm('image')
taskOpts = {'channel': 'image'}
if priority:
if priority < 0:
if not context.session.hasPerm('admin'):
raise koji.ActionNotAllowed(
'only admins may create high-priority tasks')
taskOpts['priority'] = koji.PRIO_DEFAULT + priority
return make_task('image', [name, version, arches, target, inst_tree, opts], **taskOpts)
def hello(self, *args):
"""Simple testing call returning a string"""
return "Hello World"
def fault(self):
"debugging. raise an error"
raise Exception("test exception")
def error(self):
"debugging. raise an error"
raise koji.GenericError("test error")
def echo(self, *args):
return args
def getKojiVersion(self):
return koji.__version__
def getAPIVersion(self):
return koji.API_VERSION
def mavenEnabled(self):
"""Get status of maven support"""
return bool(context.opts.get('EnableMaven'))
def winEnabled(self):
"""Get status of windows support"""
return bool(context.opts.get('EnableWin'))
def showSession(self):
"""Return string representation of session for current user"""
return "%s" % context.session
def getSessionInfo(self, details=False, user_id=None):
"""Return session info for current user or all not expired sessions to specific user
:param boolean details: add session ID and hostip to result
:param str user_id: show all not expired sessions related to specific user
:returns: dict or list of dicts session data
"""
if not context.session.logged_in:
return None
clauses = ['expired is FALSE']
fields = [
('user_id', 'user_id'),
('expired', 'expired'),
('master', 'master'),
('authtype', 'authtype'),
('callnum', 'callnum'),
('start_time', 'start_time'),
("date_part('epoch', start_time)", 'start_ts'),
('update_time', 'update_time'),
("date_part('epoch', update_time)", 'update_ts'),
('renew_time', 'renew_time'),
("date_part('epoch', renew_time)", 'renew_ts'),
('exclusive', 'exclusive'),
]
columns, aliases = zip(*fields)
if details:
columns += ('hostip', 'id')
aliases += ('hostip', 'id')
if user_id:
user_id = get_user(user_id, strict=True)['id']
logged_user_id = self.getLoggedInUser()['id']
if not context.session.hasPerm('admin') and user_id != logged_user_id:
raise koji.ActionNotAllowed('only admins or owners may see all active sessions')
clauses.append('user_id = %(user_id)i')
else:
result = context.session.session_data
if details:
id = context.session.id
clauses.append('id = %(id)i')
else:
return result
query = QueryProcessor(tables=['sessions'],
columns=columns, aliases=aliases,
clauses=clauses,
values=locals())
if details and not user_id:
result_query = query.executeOne()
result['hostip'] = result_query['hostip']
result['id'] = result_query['id']
else:
result = query.execute()
return result
def showOpts(self, as_string=True):
"""Returns hub options
:param bool as_string: if True (default) returns hub options as raw string,
if False, returns hub options as dict
"""
context.session.assertPerm('admin')
if as_string:
return "%r" % context.opts
else:
return context.opts
def getEvent(self, id, strict=True):
"""
Get information about the event with the given id.
:param int id: the event id
:param bool strict: if True (the default), error on invalid event
:returns: dict or None
A map will be returned with the following keys:
- id (integer): id of the event
- ts (float): timestamp the event was created, in
seconds since the epoch
If the event is not in the database, an error will be raised in the strict
case, otherwise the call will return None.
"""
event_id = convert_value(id, cast=int)
strict = convert_value(strict, cast=bool)
fields = [
('id', 'id'),
("date_part('epoch', time)", 'ts')
]
columns, aliases = zip(*fields)
query = QueryProcessor(tables=['events'], columns=columns, aliases=aliases,
clauses=['id = %(id)s'], values={'id': event_id})
return query.executeOne(strict=strict)
def getLastEvent(self, before=None, strict=True):
"""
Get the id and timestamp of the last event recorded in the system.
Events are usually created as the result of a configuration change
in the database.
If "before" (int or float) is specified, return the last event
that occurred before that time (in seconds since the epoch).
If there is no event before the given time, an error will be raised.
Note that due to differences in precision between the database and python,
this method can return an event with a timestamp the same or slightly higher
(by a few microseconds) than the value of "before" provided. Code using this
method should check that the timestamp returned is in fact lower than the parameter.
When trying to find information about a specific event, the getEvent() method
should be used.
"""
strict = convert_value(strict, cast=bool)
fields = [
('id', 'id'),
("date_part('epoch', time)", 'ts')
]
columns, aliases = zip(*fields)
values = {}
clauses = []
if before is not None:
if not isinstance(before, NUMERIC_TYPES):
raise koji.GenericError('Invalid type for before: %s' % type(before))
# use the repr() conversion because it retains more precision than the
# string conversion
clauses = ["date_part('epoch', time) < %(before)r"]
values['before'] = before
opts = {'order': '-id', 'limit': 1}
query = QueryProcessor(tables=['events'], columns=columns, aliases=aliases,
clauses=clauses, values=values, opts=opts)
return query.executeOne(strict=strict)
evalPolicy = staticmethod(eval_policy)
def makeTask(self, *args, **opts):
"""Creates task manually. This is mainly for debugging, only an admin
can make arbitrary tasks. You need to supply all *args and **opts
accordingly to the task."""
context.session.assertPerm('admin')
if 'owner' in opts:
raise koji.ActionNotAllowed('The owner option is not allowed here')
return make_task(*args, **opts)
def uploadFile(self, path, name, size, md5sum, offset, data, volume=None, checksum=None):
"""upload file to the hub
Files can be uploaded in chunks, if so the hash and size describe the
chunk rather than the whole file.
:param str path: the relative path to upload to
:param str name: the name of the file
:param int size: size of contents (bytes)
:param checksum: MD5 hex digest (see md5sum) or a tuple (hash_type, digest) of contents
:type checksum: str or tuple
:param str data: base64 encoded file contents
:param int offset: The offset indicates where the chunk belongs.
The special offset -1 is used to indicate the final
chunk.
:param str md5sum: legacy param name of checksum. md5sum name is misleading,
but it is here for backwards compatibility
:returns: True
"""
context.session.assertLogin()
contents = base64.b64decode(data)
del data
# we will accept offset and size as strings to work around xmlrpc limits
offset = koji.decode_int(offset)
size = koji.decode_int(size)
if checksum is None and md5sum is not None:
checksum = md5sum
if isinstance(checksum, str):
# this case is for backwards compatibility
verify = "md5"
digest = checksum
elif checksum is None:
verify = None
else:
verify, digest = checksum
sum_cls = get_verify_class(verify)
if offset != -1:
if size is not None:
if size != len(contents):
return False
if verify is not None:
if digest != sum_cls(contents).hexdigest():
return False
fn = get_upload_path(path, name, create=True, volume=volume)
try:
st = os.lstat(fn)
except FileNotFoundError:
pass
else:
if not stat.S_ISREG(st.st_mode):
raise koji.GenericError("destination not a file: %s" % fn)
elif offset == 0:
# first chunk, so file should not exist yet
if not fn.endswith('.log'):
# but we allow .log files to be uploaded multiple times to support
# realtime log-file viewing
raise koji.GenericError("file already exists: %s" % fn)
fd = os.open(fn, os.O_RDWR | os.O_CREAT, 0o666)
# log_error("fd=%r" %fd)
try:
if offset == 0 or (offset == -1 and size == len(contents)):
# truncate file
fcntl.lockf(fd, fcntl.LOCK_EX | fcntl.LOCK_NB)
try:
os.ftruncate(fd, 0)
# log_error("truncating fd %r to 0" %fd)
finally:
fcntl.lockf(fd, fcntl.LOCK_UN)
if offset == -1:
os.lseek(fd, 0, 2)
else:
os.lseek(fd, offset, 0)
# write contents
fcntl.lockf(fd, fcntl.LOCK_EX | fcntl.LOCK_NB, len(contents), 0, 2)
try:
os.write(fd, contents)
# log_error("wrote contents")
finally:
fcntl.lockf(fd, fcntl.LOCK_UN, len(contents), 0, 2)
if offset == -1:
if size is not None:
# truncate file
fcntl.lockf(fd, fcntl.LOCK_EX | fcntl.LOCK_NB)
try:
os.ftruncate(fd, size)
# log_error("truncating fd %r to size %r" % (fd,size))
finally:
fcntl.lockf(fd, fcntl.LOCK_UN)
if verify is not None:
# check final digest
chksum = sum_cls()
fcntl.lockf(fd, fcntl.LOCK_SH | fcntl.LOCK_NB)
try:
os.lseek(fd, 0, 0)
while True:
block = os.read(fd, 819200)
if not block:
break
chksum.update(block)
if digest != chksum.hexdigest():
return False
finally:
fcntl.lockf(fd, fcntl.LOCK_UN)
finally:
os.close(fd)
return True
def checkUpload(self, path, name, verify=None, tail=None, volume=None):
"""Return basic information about an uploaded file"""
fn = get_upload_path(path, name, volume=volume)
data = {}
try:
fd = os.open(fn, os.O_RDONLY)
except FileNotFoundError:
return None
try:
try:
fcntl.lockf(fd, fcntl.LOCK_SH | fcntl.LOCK_NB)
except IOError as e:
raise koji.LockError(e)
st = os.fstat(fd)
if not stat.S_ISREG(st.st_mode):
raise koji.GenericError("Not a regular file: %s" % fn)
data['size'] = st.st_size
data['mtime'] = st.st_mtime
if verify:
chksum = get_verify_class(verify)()
if tail is not None:
if tail < 0:
raise koji.GenericError("Invalid tail value: %r" % tail)
offset = max(st.st_size - tail, 0)
os.lseek(fd, offset, 0)
length = 0
chunk = os.read(fd, 8192)
while chunk:
length += len(chunk)
chksum.update(chunk)
chunk = os.read(fd, 8192)
data['sumlength'] = length
data['hexdigest'] = chksum.hexdigest()
return data
finally:
# this will also free our lock
os.close(fd)
def downloadTaskOutput(self, taskID, fileName, offset=0, size=-1, volume=None):
"""Download the file with the given name, generated by the task with the
given ID."""
size = convert_value(size, cast=int)
if volume:
volume = self.getVolume(volume, strict=True)['name']
if '..' in fileName:
raise koji.GenericError('Invalid file name: %s' % fileName)
filePath = '%s/%s/%s' % (koji.pathinfo.work(volume),
koji.pathinfo.taskrelpath(taskID),
fileName)
filePath = os.path.normpath(filePath)
if not os.path.isfile(filePath):
raise koji.GenericError('no file "%s" output by task %i' % (fileName, taskID))
# Let the caller handler any IO or permission errors
with open(filePath, 'rb') as f:
if isinstance(offset, str):
offset = int(offset)
if offset is not None and offset > 0:
f.seek(offset, 0)
elif offset is not None and offset < 0:
f.seek(offset, 2)
contents = f.read(size)
return base64encode(contents)
listTaskOutput = staticmethod(list_task_output)
createTag = staticmethod(create_tag)
editTag = staticmethod(old_edit_tag)
editTag2 = staticmethod(edit_tag)
deleteTag = staticmethod(delete_tag)
createExternalRepo = staticmethod(create_external_repo)
listExternalRepos = staticmethod(get_external_repos)
getExternalRepo = staticmethod(get_external_repo)
editExternalRepo = staticmethod(edit_external_repo)
deleteExternalRepo = staticmethod(delete_external_repo)
def addExternalRepoToTag(self, tag_info, repo_info, priority,
merge_mode='koji', arches=None):
"""Add an external repo to a tag.
:param tag_info: Tag name or ID number
:param repo_info: External repository name or ID number
:param int priority: Priority of this repository for this tag
:param str merge_mode: This must be one of the values of the
koji.REPO_MERGE_MODES set. If unspecified,
the default is "koji".
:param str arches: space-separated list of arches handled by the repo.
"""
# wrap the local method so we don't expose the event parameter
add_external_repo_to_tag(tag_info, repo_info, priority,
merge_mode=merge_mode, arches=arches)
def removeExternalRepoFromTag(self, tag_info, repo_info):
"""
Remove an external repo from a tag
:param tag_info: Tag name or ID number
:param repo_info: External repository name or ID number
:raises: GenericError if this external repo is not associated
with this tag.
"""
# wrap the local method so we don't expose the event parameter
remove_external_repo_from_tag(tag_info, repo_info)
editTagExternalRepo = staticmethod(edit_tag_external_repo)
getTagExternalRepos = staticmethod(get_tag_external_repos)
getExternalRepoList = staticmethod(get_external_repo_list)
resetBuild = staticmethod(reset_build)
def importArchive(self, filepath, buildinfo, type, typeInfo):
"""
Import an archive file and associate it with a build. The archive can
be any non-rpm filetype supported by Koji.
filepath: path to the archive file (relative to the Koji workdir)
buildinfo: information about the build to associate the archive with
May be a string (NVR), integer (buildID), or dict (containing keys: name,
version, release)
type: type of the archive being imported. Currently supported archive types: maven, win
typeInfo: dict of type-specific information
"""
if type == 'maven':
if not context.opts.get('EnableMaven'):
raise koji.GenericError('Maven support not enabled')
context.session.assertPerm('maven-import')
elif type == 'win':
if not context.opts.get('EnableWin'):
raise koji.GenericError('Windows support not enabled')
context.session.assertPerm('win-import')
elif type == 'image':
context.session.assertPerm('image-import')
else:
raise koji.GenericError('unsupported archive type: %s' % type)
buildinfo = get_build(buildinfo, strict=True)
fullpath = '%s/%s' % (koji.pathinfo.work(), filepath)
import_archive(fullpath, buildinfo, type, typeInfo)
CGInitBuild = staticmethod(cg_init_build)
CGRefundBuild = staticmethod(cg_refund_build)
CGImport = staticmethod(cg_import)
untaggedBuilds = staticmethod(untagged_builds)
queryHistory = staticmethod(query_history)
deleteBuild = staticmethod(delete_build)
def buildReferences(self, build, limit=None, lazy=False):
return build_references(get_build(build, strict=True)['id'], limit, lazy)
buildReferences.__doc__ = build_references.__doc__
addVolume = staticmethod(add_volume)
removeVolume = staticmethod(remove_volume)
listVolumes = staticmethod(list_volumes)
changeBuildVolume = staticmethod(change_build_volume)
def getVolume(self, volume, strict=False):
"""Lookup the given volume
Returns a dictionary containing the name and id of the matching
volume, or None if no match.
If strict is true, raises an error if no match.
"""
result = lookup_name('volume', volume)
if not result and strict:
raise koji.GenericError("No such volume: %s" % volume)
return result
def applyVolumePolicy(self, build, strict=False):
"""Apply the volume policy to a given build
The volume policy is normally applied at import time, but it can
also be applied with this call.
Parameters:
build: the build to apply the policy to
strict: if True, raises on exception on policy issues
"""
context.session.assertPerm('admin')
build = get_build(build, strict=True)
return apply_volume_policy(build, strict)
def createEmptyBuild(self, name, version, release, epoch, owner=None, draft=False):
"""Creates empty build entry
:param str name: build name
:param str version: build version
:param str release: release version
:param str epoch: epoch version
:param owner: a str (Kerberos principal or name) or an int (user id)
or a dict:
- id: User's ID
- name: User's name
- krb_principal: Kerberos principal
:param bool draft: create a draft build or not
:return: int build ID
"""
context.session.assertPerm('admin')
data = {'name': name, 'version': version, 'release': release,
'epoch': epoch, 'draft': draft}
if owner is not None:
data['owner'] = owner
return new_build(data)
def createMavenBuild(self, build_info, maven_info):
"""
Associate Maven metadata with an existing build. When build isn`t existing, creates a
build. The build must not already have associated Maven metadata. maven_info must be
a dict containing group_id, artifact_id, and version entries.
:param build_info: a str (build name) if build is existing
or a dict:
- name: build name
- version: build version
- release: build release
- epoch: build epoch
:param dict maven_info:
- group_id: Group's ID
- artifact_id: Artifact's ID
- version: version
:raises: GenericError if type for build_info is not dict, when build isn`t existing.
:raises: GenericError if draft: True in buildinfo, when build isn't existing.
:raises: GenericError if build info doesn't have mandatory keys.
:raises: GenericError if build is a draft, when it's existing.
"""
context.session.assertPerm('maven-import')
if not context.opts.get('EnableMaven'):
raise koji.GenericError("Maven support not enabled")
build = get_build(build_info)
if not build:
if not isinstance(build_info, dict):
raise koji.GenericError('Invalid type for build_info: %s' % type(build_info))
reject_draft(build_info)
try:
build_id = new_build(dslice(build_info, ('name', 'version', 'release', 'epoch')))
except KeyError as cm:
raise koji.GenericError("Build info doesn't have mandatory %s key" % cm)
build = get_build(build_id, strict=True)
reject_draft(build)
new_maven_build(build, maven_info)
def createWinBuild(self, build_info, win_info):
"""
Associate Windows metadata with an existing build. When build isn`t existing, creates
a build. The build must not already have associated Windows metadata. win_info must be
a dict containing a platform entry.
:param build_info: a str (build name) if build is existing
or a dict:
- name: build name
- version: build version
- release: build release
- epoch: build epoch
:param dict win_info:
- platform: build platform
:raises: GenericError if type for build_info is not dict, when build isn`t existing.
:raises: GenericError if draft: True in buildinfo, when build isn't existing.
:raises: GenericError if build info doesn't have mandatory keys.
:raises: GenericError if build is a draft, when it's existing.
"""
context.session.assertPerm('win-import')
if not context.opts.get('EnableWin'):
raise koji.GenericError("Windows support not enabled")
build = get_build(build_info)
if not build:
if not isinstance(build_info, dict):
raise koji.GenericError('Invalid type for build_info: %s' % type(build_info))
reject_draft(build_info)
try:
build_id = new_build(dslice(build_info, ('name', 'version', 'release', 'epoch')))
except KeyError as cm:
raise koji.GenericError("Build info doesn't have mandatory %s key" % cm)
build = get_build(build_id, strict=True)
reject_draft(build)
new_win_build(build, win_info)
def createImageBuild(self, build_info):
"""
Associate image metadata with an existing build. When build isn`t existing, creates a
build. The build must not already have associated image metadata.
:param build_info: int (build ID) if build exists
str (in N-V-R format)
or a dict:
- name: build name
- version: build version
- release: build release
- epoch: build epoch
:raises: GenericError if type for build_info is not dict, when build isn`t existing.
:raises: GenericError if draft: True in buildinfo, when build isn't existing.
:raises: GenericError if build info doesn't have mandatory keys.
:raises: GenericError if build is a draft, when it's existing.
"""
context.session.assertPerm('image-import')
build = get_build(build_info)
if not build:
if not isinstance(build_info, dict):
raise koji.GenericError('Invalid type for build_info: %s' % type(build_info))
reject_draft(build_info)
try:
build_id = new_build(dslice(build_info, ('name', 'version', 'release', 'epoch')))
except KeyError as cm:
raise koji.GenericError("Build info doesn't have mandatory %s key" % cm)
build = get_build(build_id, strict=True)
reject_draft(build)
new_image_build(build)
def importRPM(self, path, basename):
"""Import an RPM into the database.
The file must be uploaded first.
"""
context.session.assertPerm('admin')
uploadpath = koji.pathinfo.work()
fn = "%s/%s/%s" % (uploadpath, path, basename)
if not os.path.exists(fn):
raise koji.GenericError("No such file: %s" % fn)
rpminfo = import_rpm(fn)
import_rpm_file(fn, rpminfo['build'], rpminfo)
add_rpm_sig(rpminfo['id'], koji.rip_rpm_sighdr(fn))
for tag in list_tags(build=rpminfo['build_id']):
set_tag_update(tag['id'], 'IMPORT')
return rpminfo
def mergeScratch(self, task_id):
"""Import the rpms generated by a scratch build, and associate
them with an existing build.
To be eligible for import, the build must:
- be successfully completed
- contain at least one arch-specific rpm
The task must:
- be a 'build' task
- be successfully completed
- use the exact same SCM URL as the build
- contain at least one arch-specific rpm
- have no overlap between the arches of the rpms it contains and
the rpms contained by the build
- contain a .src.rpm whose filename exactly matches the .src.rpm
of the build
Only arch-specific rpms will be imported. noarch rpms and the src
rpm will be skipped. Build logs and buildroot metadata from the
scratch build will be imported along with the rpms.
This is useful for bootstrapping a new arch. RPMs can be built
for the new arch using a scratch build and then merged into an
existing build, incrementally expanding arch coverage and avoiding
the need for a mass-rebuild to support the new arch.
"""
context.session.assertPerm('admin')
return merge_scratch(task_id)
def addExternalRPM(self, rpminfo, external_repo, strict=True):
"""Import an external RPM
This call is mainly for testing. Normal access will be through
a host call"""
context.session.assertPerm('admin')
add_external_rpm(rpminfo, external_repo, strict=strict)
def tagBuildBypass(self, tag, build, force=False, notify=False):
"""Tag a build without running post checks
This is a short circuit function for imports.
Admin or tag permission required.
Tagging with a locked tag is not allowed unless force is true.
Retagging is not allowed unless force is true. (retagging changes the order
of entries will affect which build is the latest)
"""
context.session.assertPerm('tag')
tag_id = get_tag(tag, strict=True)['id']
build_id = get_build(build, strict=True)['id']
policy_data = {'tag': tag_id, 'build': build_id, 'fromtag': None, 'operation': 'tag'}
assert_policy('tag', policy_data, force=force)
_tag_build(tag, build, force=force)
if notify:
tag_notification(True, tag, None, build, context.session.user_id)
def tagBuild(self, tag, build, force=False, fromtag=None):
"""Request that a build be tagged
The force option will attempt to force the action in the event of:
- tag locked
- missing permission
- package not in list for tag
- policy violation
The force option is really only effective for admins
If fromtag is specified, this becomes a move operation.
This call creates a task that was originally intended to perform more
extensive checks, but never has. We're stuck with this task system until
we're ready to break the api.
The return value is the task id
"""
context.session.assertLogin()
# first some lookups and basic sanity checks
build = get_build(build, strict=True)
tag = get_tag(tag, strict=True)
if fromtag:
fromtag_id = get_tag_id(fromtag, strict=True)
else:
fromtag_id = None
pkg_id = build['package_id']
tag_id = tag['id']
build_id = build['id']
# build state check
if build['state'] != koji.BUILD_STATES['COMPLETE']:
state = koji.BUILD_STATES[build['state']]
raise koji.TagError("build %s not complete: state %s" % (build['nvr'], state))
# basic tag access check
assert_tag_access(tag_id, user_id=None, force=force)
if fromtag:
assert_tag_access(fromtag_id, user_id=None, force=force)
# package list check
pkgs = readPackageList(tagID=tag_id, pkgID=pkg_id, inherit=True, with_owners=False)
pkg_error = None
if pkg_id not in pkgs:
pkg_error = "Package %s not in list for %s" % (build['name'], tag['name'])
elif pkgs[pkg_id]['blocked']:
pkg_error = "Package %s blocked in %s" % (build['name'], tag['name'])
if pkg_error:
if force and context.session.hasPerm('admin'):
pkglist_add(tag_id, pkg_id, force=True, block=False)
logger.info("Package add policy %s/%s overriden by %s" % (
tag['name'], build['nvr'], context.session.user_data['name']))
else:
raise koji.TagError(pkg_error)
# tag policy check
policy_data = {'tag': tag_id, 'build': build_id, 'fromtag': fromtag_id}
if fromtag is None:
policy_data['operation'] = 'tag'
else:
policy_data['operation'] = 'move'
# don't check policy for admins using force
# XXX - we're running this check twice, here and in host.tagBuild (called by the task)
assert_policy('tag', policy_data, force=force)
# spawn the tagging task
return make_task('tagBuild', [tag_id, build_id, force, fromtag_id], priority=10)
def untagBuild(self, tag, build, strict=True, force=False):
"""Untag a build
Unlike tagBuild, this does not create a task.
:param int|str tag: tag name or ID
:param int|str build: build name or ID
:param bool strict: If True (default), Koji will raise a TagError if
this build is not in the tag. If False, Koji will
not raise TagError when the build is not in the
tag.
:param bool force: If False (default), Koji will check this operation
against the tag hub policy. If hub policy does not
allow the current user to untag packages from this
tag, then this method will raise an error.
If True, then this method will bypass hub policy
settings. Only admin users can set force to True.
:returns: None
"""
# we can't staticmethod this one -- we're limiting the options
context.session.assertLogin()
user_id = context.session.user_id
tag_id = get_tag(tag, strict=True)['id']
build_id = get_build(build, strict=True)['id']
policy_data = {'tag': None, 'build': build_id, 'fromtag': tag_id}
policy_data['operation'] = 'untag'
try:
# don't check policy for admins using force
assert_policy('tag', policy_data, force=force)
_untag_build(tag, build, strict=strict, force=force)
tag_notification(True, None, tag, build, user_id)
except Exception:
exctype, value = sys.exc_info()[:2]
tag_notification(False, None, tag, build, user_id, False, "%s: %s" % (exctype, value))
raise
def untagBuildBypass(self, tag, build, strict=True, force=False, notify=False):
"""Untag a build without any checks
Admin and tag permission only. Intended for syncs/imports.
Unlike tagBuild, this does not create a task
No return value"""
context.session.assertPerm('tag')
tag_id = get_tag(tag, strict=True)['id']
build_id = get_build(build, strict=True)['id']
policy_data = {'tag': None, 'build': build_id, 'fromtag': tag_id, 'operation': 'untag'}
assert_policy('tag', policy_data, force=force)
_untag_build(tag, build, strict=strict, force=force)
if notify:
tag_notification(True, None, tag, build, context.session.user_id)
def massTag(self, tag, builds):
"""
Substitute for tagBuildBypass - this call ignores every check, so special
'tag' permission is needed. It bypass all tag access checks and policies.
On error it will raise concrete exception
:param builds: list of build NVRs
:type builds: [str]
:returns: None
"""
context.session.assertPerm('tag')
tag = get_tag(tag, strict=True)
user = get_user(context.session.user_id, strict=True)
logger.debug("Tagging %d builds to %s on behalf of %s",
len(builds), tag['name'], user['name'])
start = time.time()
for build in builds:
binfo = get_build(build, strict=True)
_direct_tag_build(tag, binfo, user, force=True)
# ensure tagging order by updating event id
_delete_event_id()
length = time.time() - start
logger.debug("Tagged %d builds to %s in %.2f seconds", len(builds), tag['name'], length)
def snapshotTag(self, src, dst, config=True, pkgs=True, builds=True, groups=True,
latest_only=True, inherit_builds=True, event=None, force=False):
"""
Copy the tag and its current (or event) contents to new one. It doesn't copy inheritance.
Suitable for creating snapshots of tags. External repos are not linked.
Destination tag must not exist. For updating existing tags use snapshotTagModify
Calling user needs to have 'admin' or 'tag' permission.
:param [inst|str] src: source tag
:param [int|str] dst: destination tag
:param [bool] config: copy basic config (arches, permission, lock, maven_support,
maven_include_all, extra)
:param [bool] pkgs: copy package lists
:param [bool] builds: copy tagged builds
:param [bool] latest_only: copy only latest builds instead of all
:param [bool] inherit_builds: use inherited builds, not only explicitly tagged
:param [int] event: copy state of tag in given event id
:param [bool] force: use force for all underlying operations
:returns: None
"""
context.session.assertPerm('tag')
if builds and not pkgs:
raise koji.ParameterError("builds can't be used without pkgs in snapshotTag")
if get_tag(dst):
raise koji.GenericError("Target tag already exists")
src = get_tag(src, event=event, strict=True)
if src['locked'] and not force:
raise koji.GenericError("Source tag is locked, use force to copy")
if config:
dsttag = _create_tag(
dst,
parent=None, # should clone parent?
arches=src['arches'],
perm=src['perm_id'],
locked=src['locked'],
maven_support=src['maven_support'],
maven_include_all=src['maven_include_all'],
extra=src['extra'])
else:
dsttag = _create_tag(dst, parent=None)
# all update operations will reset event_id, so we've clear order of operations
_delete_event_id()
dst = get_tag(dsttag, strict=True)
logger.debug("Cloning %s to %s", src['name'], dst['name'])
# package lists
if pkgs:
logger.debug("Cloning package list to %s", dst['name'])
start = time.time()
for pkg in self.listPackages(tagID=src['id'], event=event, inherited=True):
_direct_pkglist_add(
taginfo=dst['id'],
pkginfo=pkg['package_name'],
owner=pkg['owner_name'],
block=pkg['blocked'],
extra_arches=pkg['extra_arches'],
force=True,
update=False)
_delete_event_id()
length = time.time() - start
logger.debug("Cloned packages to %s in %.2f seconds", dst['name'], length)
# builds
if builds:
builds = readTaggedBuilds(tag=src['id'], inherit=inherit_builds,
event=event, latest=latest_only)
self.massTag(dst['id'], list(reversed(builds)))
# groups
if groups:
logger.debug("Cloning groups to %s", dst['name'])
start = time.time()
for group in readTagGroups(tag=src['id'], event=event):
_grplist_add(dst['id'], group['name'], block=group['blocked'], force=True)
_delete_event_id()
for pkg in group['packagelist']:
_grp_pkg_add(dst['id'], group['name'], pkg['package'],
block=pkg['blocked'], force=True)
_delete_event_id()
for group_req in group['grouplist']:
_grp_req_add(dst['id'], group['name'], group_req['name'],
block=group_req['blocked'], force=True)
_delete_event_id()
length = time.time() - start
logger.debug("Cloned groups to %s in %.2f seconds", dst['name'], length)
_delete_event_id()
def snapshotTagModify(self, src, dst, config=True, pkgs=True, builds=True, groups=True,
latest_only=True, inherit_builds=True, event=None, force=False,
remove=False):
"""
Copy the tag and its current (or event) contents to existing one. It doesn't copy
inheritance. Suitable for creating snapshots of tags. External repos are not linked.
Destination tag must already exist. For creating new snapshots use snapshotTag
Calling user needs to have 'admin' or 'tag' permission.
:param [int|str] src: source tag
:param [int|str] dst: destination tag
:param bool config: copy basic config (arches, permission, lock, maven_support,
maven_include_all, extra)
:param bool pkgs: copy package lists
:param bool builds: copy tagged builds
:param bool latest_only: copy only latest builds instead of all
:param bool inherit_builds: use inherited builds, not only explicitly tagged
:param int event: copy state of tag in given event id
:param bool force: use force for all underlying operations
:param remove: remove builds/groups/
:returns: None
"""
context.session.assertPerm('tag')
if builds and not pkgs:
# It is necessarily not true (current pkgs can already cover all new builds),
# but it seems to be more consistent to require it anyway.
raise koji.ParameterError("builds can't be used without pkgs in snapshotTag")
src = get_tag(src, event=event, strict=True)
dst = get_tag(dst, strict=True)
if (src['locked'] or dst['locked']) and not force:
raise koji.GenericError("Source or destination tag is locked, use force to copy")
user = get_user(context.session.user_id, strict=True)
if config:
if dst['extra']:
remove_extra = list(set(dst['extra'].keys()) - set(src['extra'].keys()))
else:
remove_extra = []
edit_tag(dst['id'], parent=None, arches=src['arches'],
perm=src['perm_id'], locked=src['locked'],
maven_support=src['maven_support'],
maven_include_all=src['maven_include_all'],
extra=src['extra'],
remove_extra=remove_extra)
_delete_event_id()
dst = get_tag(dst['id'], strict=True)
if pkgs:
srcpkgs = {}
dstpkgs = {}
for pkg in self.listPackages(tagID=src['id'], event=event, inherited=True):
srcpkgs[pkg['package_name']] = pkg
for pkg in self.listPackages(tagID=dst['id'], inherited=True):
dstpkgs[pkg['package_name']] = pkg
for pkg_name in set(dstpkgs.keys()) - set(srcpkgs.keys()):
pkg = dstpkgs[pkg_name]
_direct_pkglist_add(dst,
pkg_name,
owner=pkg['owner_name'],
block=True,
force=True,
update=True,
extra_arches=pkg['extra_arches'])
_delete_event_id()
for pkg_name in set(srcpkgs.keys()) - set(dstpkgs.keys()):
pkg = srcpkgs[pkg_name]
_direct_pkglist_add(dst,
pkg_name,
owner=pkg['owner_name'],
block=pkg['blocked'],
update=False,
force=True,
extra_arches=pkg['extra_arches'])
_delete_event_id()
if builds:
srcbldsbypkg = defaultdict(OrderedDict)
dstbldsbypkg = defaultdict(OrderedDict)
# listTagged orders builds latest-first
# so reversing that gives us oldest-first
for build in reversed(readTaggedBuilds(src['id'], event=event, inherit=inherit_builds,
latest=latest_only)):
srcbldsbypkg[build['package_name']][build['nvr']] = build
# get builds in dst without inheritance.
# latest=False to get all builds even when latest_only = True,
# so that only the *latest* build per tag will live in.
for build in reversed(readTaggedBuilds(dst['id'], inherit=False, latest=False)):
dstbldsbypkg[build['package_name']][build['nvr']] = build
if remove:
for (pkg, dstblds) in dstbldsbypkg.items():
if pkg not in srcbldsbypkg:
# untag all builds for packages which are not in dst
for build in dstblds:
# don't untag inherited builds
if build['tag_name'] == dst['name']:
_direct_untag_build(dst, build, user, force=force)
_delete_event_id()
# add and/or remove builds from dst to match src contents and order
for (pkg, srcblds) in srcbldsbypkg.items():
dstblds = dstbldsbypkg[pkg]
# firstly, deal with extra builds in dst
removed_nvrs = set(dstblds.keys()) - set(srcblds.keys())
bld_order = srcblds.copy()
if remove:
# mark the extra builds for deletion
dnvrs = []
for (dstnvr, dstbld) in dstblds.items():
if dstnvr in removed_nvrs:
dnvrs.append(dstnvr)
if dstbld['tag_name'] == dst['name']:
_untag_build(dst['name'], dstbld, force=force)
_delete_event_id()
# we also remove them from dstblds now so that they do not
# interfere with the order comparison below
for dnvr in dnvrs:
del dstblds[dnvr]
else:
# in the no-removal case, the extra builds should be forced
# to last in the tag
bld_order = OrderedDict()
for (dstnvr, dstbld) in dstblds.items():
if dstnvr in removed_nvrs:
bld_order[dstnvr] = dstbld
for (nvr, srcbld) in srcblds.items():
bld_order[nvr] = srcbld
# secondly, add builds from src tag and adjust the order
for (nvr, srcbld) in bld_order.items():
found = False
out_of_order = []
# note that dstblds is trimmed as we go, so we are only
# considering the tail corresponding to where we are at
# in the srcblds loop
for (dstnvr, dstbld) in dstblds.items():
if nvr == dstnvr:
found = True
break
else:
out_of_order.append(dstnvr)
if dstbld['tag_name'] == dst['name']:
_untag_build(dst['name'], dstbld, force=force)
_delete_event_id()
for dnvr in out_of_order:
del dstblds[dnvr]
# these will be re-added in the proper order later
if found:
# remove it for next pass so we stay aligned with outer
# loop
del dstblds[nvr]
else:
# missing from dst, so we need to add it
_direct_tag_build(dst, srcbld, user, force=force)
_delete_event_id()
if groups:
srcgroups = OrderedDict()
dstgroups = OrderedDict()
for group in readTagGroups(src['name'], event=event, incl_blocked=True):
srcgroups[group['name']] = group
for group in readTagGroups(dst['name'], incl_blocked=True):
dstgroups[group['name']] = group
for (grpname, group) in srcgroups.items():
if grpname not in dstgroups or group['blocked'] != dstgroups[grpname]['blocked']:
_grplist_add(dst['id'], group['name'], block=group['blocked'], force=force)
_delete_event_id()
if remove:
for (grpname, group) in dstgroups.items():
if grpname not in srcgroups:
if group['tag_id'] == dst['id']:
# not inherited
_grplist_remove(dst['id'], group['id'], force=force)
else:
# block inherited groups
_grplist_add(dst['id'], group['name'], block=True, force=force)
_delete_event_id()
for (grpname, group) in srcgroups.items():
if grpname in dstgroups:
srcgrppkglist = {}
dstgrppkglist = {}
for pkg in group['packagelist']:
srcgrppkglist[pkg['package']] = pkg
for pkg in dstgroups[grpname]['packagelist']:
dstgrppkglist[pkg['package']] = pkg
for pkg in srcgrppkglist.values():
if pkg['package'] not in dstgrppkglist:
_grp_pkg_add(dst['name'], grpname, pkg['package'],
force=force, block=False)
_delete_event_id()
srcgrpreqlist = {}
dstgrpreqlist = {}
for grp in group['grouplist']:
srcgrpreqlist[grp['name']] = grp
for grp in dstgroups[grpname]['grouplist']:
dstgrpreqlist[grp['name']] = grp
for grp in srcgrpreqlist.values():
if grp['name'] not in dstgrpreqlist:
_grp_req_add(dst['name'], grpname, grp['name'],
force=force, block=grp['blocked'])
_delete_event_id()
if remove:
for pkgname, pkg in dstgrppkglist.items():
if pkg['blocked']:
continue
if srcgrppkglist.get(pkgname, {}).get('blocked'):
_grp_pkg_add(dst['id'], grpname, pkg['package'],
block=True, force=force)
_delete_event_id()
elif pkgname not in srcgrppkglist and pkg['tag_id'] == dst['id']:
_grp_pkg_remove(dst['name'], grpname, pkg['package'], force=force)
_delete_event_id()
for grp in dstgrpreqlist.values():
if grp['blocked']:
continue
if grp['name'] not in srcgrpreqlist:
if grp['group_id'] == dst['id']:
_grp_req_remove(dst['name'], grpname, grp['name'], force=force)
else:
_grp_req_add(dst['name'], grpname, grp['name'],
block=True, force=force)
_delete_event_id()
def moveBuild(self, tag1, tag2, build, force=False):
"""Move a build from tag1 to tag2
Returns the task id of the task performing the move"""
return self.tagBuild(tag2, build, force=force, fromtag=tag1)
def moveAllBuilds(self, tag1, tag2, package, force=False):
"""Move all builds of a package from tag1 to tag2 in the correct order
Returns the task id of the task performing the move"""
context.session.assertLogin()
# lookups and basic sanity checks
pkg_id = get_package_id(package, strict=True)
tag1_id = get_tag_id(tag1, strict=True)
tag2_id = get_tag_id(tag2, strict=True)
# note: we're just running the quick checks now so we can fail
# early if appropriate, rather then waiting for the task
# Make sure package is on the list for the tag we're adding it to
pkgs = readPackageList(tagID=tag2_id, pkgID=pkg_id, inherit=True, with_owners=False)
pkg_error = None
if pkg_id not in pkgs:
pkg_error = "Package %s not in list for tag %s" % (package, tag2)
elif pkgs[pkg_id]['blocked']:
pkg_error = "Package %s blocked in tag %s" % (package, tag2)
if pkg_error:
if force and context.session.hasPerm('admin'):
pkglist_add(tag2_id, pkg_id, force=True, block=False)
logger.info("Package list policy %s/%s overriden by %s" % (
tag2, package, context.session.user_data['name']))
else:
raise koji.TagError(pkg_error)
# access check
assert_tag_access(tag1_id, user_id=None, force=force)
assert_tag_access(tag2_id, user_id=None, force=force)
build_list = readTaggedBuilds(tag1_id, package=package)
# we want 'ORDER BY tag_listing.create_event ASC' not DESC so reverse
build_list.reverse()
# policy check
policy_data = {'tag': tag2, 'fromtag': tag1, 'operation': 'move'}
# don't check policy for admins using force
for build in build_list:
policy_data['build'] = build['id']
assert_policy('tag', policy_data)
# XXX - we're running this check twice, here and in host.tagBuild (called by the
# task)
wait_on = []
tasklist = []
for build in build_list:
task_id = make_task('dependantTask',
[wait_on, [['tagBuild',
[tag2_id, build['id'], force, tag1_id],
{'priority': 15}]]])
wait_on = [task_id]
log_error("\nMade Task: %s\n" % task_id)
tasklist.append(task_id)
return tasklist
listTags = staticmethod(list_tags)
getBuild = staticmethod(get_build)
getBuildLogs = staticmethod(get_build_logs)
getNextRelease = staticmethod(get_next_release)
getMavenBuild = staticmethod(get_maven_build)
getWinBuild = staticmethod(get_win_build)
getImageBuild = staticmethod(get_image_build)
getBuildType = staticmethod(get_build_type)
getArchiveTypes = staticmethod(get_archive_types)
getArchiveType = staticmethod(get_archive_type)
listArchives = staticmethod(list_archives)
getArchive = staticmethod(get_archive)
getMavenArchive = staticmethod(get_maven_archive)
getWinArchive = staticmethod(get_win_archive)
getImageArchive = staticmethod(get_image_archive)
listArchiveFiles = staticmethod(list_archive_files)
getArchiveFile = staticmethod(get_archive_file)
listBTypes = staticmethod(list_btypes)
addBType = staticmethod(add_btype)
addArchiveType = staticmethod(add_archive_type)
def getChangelogEntries(self, buildID=None, taskID=None, filepath=None, author=None,
before=None, after=None, queryOpts=None, strict=False):
"""Get changelog entries for the build with the given ID,
or for the rpm generated by the given task at the given path
- author: only return changelogs with a matching author
- before: only return changelogs from before the given date (in UTC)
(a datetime object, a string in the 'YYYY-MM-DD HH24:MI:SS format, or integer
seconds since the epoch)
- after: only return changelogs from after the given date (in UTC)
(a datetime object, a string in the 'YYYY-MM-DD HH24:MI:SS format, or integer
seconds since the epoch)
- queryOpts: query options used by the QueryProcessor
- strict: if srpm doesn't exist raise an error, otherwise return empty list
If "order" is not specified in queryOpts, results will be returned in reverse chronological
order.
Results will be returned as a list of maps with 'date', 'author', and 'text' keys.
If there are no results, an empty list will be returned.
"""
if queryOpts is None:
queryOpts = {}
if queryOpts.get('order') in ('date', '-date'):
# use a numeric sort on the timestamp instead of an alphabetic sort on the
# date string
queryOpts['order'] = queryOpts['order'].replace('date', 'date_ts')
if buildID:
build_info = get_build(buildID)
if not build_info:
if strict:
raise koji.GenericError("No such build: %s" % buildID)
return _applyQueryOpts([], queryOpts)
srpms = self.listRPMs(buildID=build_info['id'], arches='src')
if not srpms:
if strict:
raise koji.GenericError("Build %s doesn't have srpms" % buildID)
return _applyQueryOpts([], queryOpts)
srpm_info = srpms[0]
srpm_path = joinpath(koji.pathinfo.build(build_info), koji.pathinfo.rpm(srpm_info))
elif taskID:
if not filepath:
raise koji.GenericError('filepath must be specified with taskID')
if filepath.startswith('/') or '../' in filepath:
raise koji.GenericError('Invalid filepath: %s' % filepath)
srpm_path = joinpath(koji.pathinfo.work(),
koji.pathinfo.taskrelpath(taskID),
filepath)
else:
raise koji.GenericError('either buildID or taskID and filepath must be specified')
if not os.path.exists(srpm_path):
if strict:
raise koji.GenericError("SRPM %s doesn't exist" % srpm_path)
else:
return _applyQueryOpts([], queryOpts)
if before:
if isinstance(before, datetime.datetime):
before = calendar.timegm(before.utctimetuple())
elif isinstance(before, str):
before = koji.util.parseTime(before)
elif isinstance(before, int):
pass
else:
raise koji.GenericError('Invalid type for before: %s' % type(before))
if after:
if isinstance(after, datetime.datetime):
after = calendar.timegm(after.utctimetuple())
elif isinstance(after, str):
after = koji.util.parseTime(after)
elif isinstance(after, int):
pass
else:
raise koji.GenericError('Invalid type for after: %s' % type(after))
results = []
fields = koji.get_header_fields(srpm_path,
['changelogtime', 'changelogname', 'changelogtext'])
for (cltime, clname, cltext) in zip(fields['changelogtime'], fields['changelogname'],
fields['changelogtext']):
cldate = datetime.datetime.fromtimestamp(cltime).isoformat(' ')
clname = koji.fixEncoding(clname)
cltext = koji.fixEncoding(cltext)
if author and author != clname:
continue
if before and not cltime < before:
continue
if after and not cltime > after:
continue
if queryOpts.get('asList'):
results.append([cldate, clname, cltext])
else:
results.append({'date': cldate,
'date_ts': cltime,
'author': clname,
'text': cltext})
results = _applyQueryOpts(results, queryOpts)
return koji.fixEncodingRecurse(results, remove_nonprintable=True)
def cancelBuild(self, buildID, strict=False):
"""Cancel the build with the given buildID
:param int|str|dict buildID: int ID, a string NVR, or
a map containing 'name', 'version' and 'release'.
:param bool strict: if strict is True and build is not existing, an exception is raised,
if strict is False and build is not existing, returns False
If the build is associated with a task, cancel the task as well.
Return True if the build was successfully canceled, False if not."""
context.session.assertLogin()
build = get_build(buildID, strict)
if build is None:
return False
if build['owner_id'] != context.session.user_id:
if not context.session.hasPerm('admin'):
raise koji.ActionNotAllowed('Cannot cancel build, not owner')
return cancel_build(build['id'])
assignTask = staticmethod(scheduler.do_assign)
def freeTask(self, task_id):
"""Free a task"""
context.session.assertPerm('admin')
task = Task(task_id)
task.free()
def cancelTask(self, task_id, recurse=True):
"""Cancel a task"""
task = Task(task_id)
if not task.verifyOwner() and not task.verifyHost():
if not context.session.hasPerm('admin'):
raise koji.ActionNotAllowed('Cannot cancel task, not owner')
# non-admins can also use cancelBuild
task.cancel(recurse=recurse)
def cancelTaskFull(self, task_id, strict=True):
"""Cancel a task and all tasks in its group"""
context.session.assertPerm('admin')
# non-admins can use cancelBuild or cancelTask
Task(task_id).cancelFull(strict=strict)
def cancelTaskChildren(self, task_id):
"""Cancel a task's children, but not the task itself"""
context.session.assertLogin()
task = Task(task_id)
if not task.verifyOwner() and not task.verifyHost():
if not context.session.hasPerm('admin'):
raise koji.ActionNotAllowed('Cannot cancel task, not owner')
task.cancelChildren()
def setTaskPriority(self, task_id, priority, recurse=True):
"""Set task priority"""
context.session.assertPerm('admin')
task = Task(task_id)
if task.isFinished():
raise koji.GenericError("Finished task's priority can't be updated")
task.setPriority(priority, recurse=recurse)
def listTagged(self, tag, event=None, inherit=False, prefix=None, latest=False, package=None,
owner=None, type=None, strict=True, extra=False, draft=None):
"""List builds tagged with tag.
:param int|str tag: tag name or ID number
:param int event: event ID
:param bool inherit: If inherit is True, follow the tag hierarchy and return
a list of tagged builds for all tags in the tree
:param str prefix: only builds whose package name starts with that prefix
:param bool|int latest: True for latest build per package,
N to get N latest builds per package.
:param str package: only builds of the specified package
:param owner: only builds of the specified owner
:param str type: only builds of the given btype (such as maven or image)
:param bool strict: If tag doesn't exist, an exception is raised,
unless strict is False in which case returns an empty list.
:param bool extra: Set to "True" to get the build extra info
:param bool draft: bool or None option that indicates the filter based on draft field
- None: no filter (both draft and regular builds)
- True: draft only
- False: regular only
"""
# lookup tag id
tag = get_tag(tag, strict=strict, event=event)
if not tag:
return []
results = readTaggedBuilds(tag['id'], event, inherit=inherit, latest=latest,
package=package, owner=owner, type=type, extra=extra,
draft=draft)
if prefix:
prefix = prefix.lower()
results = [build for build in results
if build['package_name'].lower().startswith(prefix)]
return results
def listTaggedRPMS(self, tag, event=None, inherit=False, latest=False, package=None, arch=None,
rpmsigs=False, owner=None, type=None, strict=True, extra=True,
draft=None):
"""List rpms and builds within tag.
:param int|str tag: tag name or ID number
:param int event: event ID
:param bool inherit: If inherit is True, follow the tag hierarchy and return
a list of tagged RPMs for all tags in the tree
:param bool|int latest: Set to "True" to get the single latest tagged build. Set
to an int "N" to get the "N" latest tagged builds. If
unspecified, the default value is "False", and
Koji will list all builds in the tag.
:param str package: only rpms of the specified package
:param str arch: only rpms of the specified arch
:param bool rpmsigs: query will return one record per rpm/signature combination
:param str owner: only rpms of the specified owner
:param str type: only rpms of the given btype (such as maven or image)
:param bool strict: If tag doesn't exist, an exception is raised,
unless strict is False in which case returns an empty list.
:param bool extra: Set to "False" to skip the rpms extra info
:param bool draft: bool or None option that indicates the filter based on draft field
- None: no filter (both draft and regular builds)
- True: draft only
- False: regular only
"""
# lookup tag id
tag = get_tag(tag, strict=strict, event=event)
if not tag:
return []
return readTaggedRPMS(tag['id'], event=event, inherit=inherit, latest=latest,
package=package, arch=arch, rpmsigs=rpmsigs, owner=owner,
type=type, extra=extra, draft=draft)
def listTaggedArchives(self, tag, event=None, inherit=False, latest=False, package=None,
type=None, strict=True, extra=True):
"""List archives and builds within a tag.
:param int|str tag: tag name or ID number
:param int event: event ID
:param bool inherit: If inherit is True, follow the tag hierarchy and return
a list of tagged archives for all tags in the tree
:param bool|int latest: Set to "True" to get tagged archives just from latest build.
Set latest=N to get only the N latest tagged RPMs.
:param str package: only archives of the specified package
:param str type: only archives of the given btype (such as maven or image)
:param bool strict: If tag doesn't exist, an exception is raised,
unless strict is False in which case returns an empty list.
:param bool extra: Set to "False" to skip the archive extra info
"""
# lookup tag id
tag = get_tag(tag, strict=strict, event=event)
if not tag:
return []
return readTaggedArchives(tag['id'], event=event, inherit=inherit, latest=latest,
package=package, type=type, extra=extra)
def listBuilds(self, packageID=None, userID=None, taskID=None, prefix=None, state=None,
volumeID=None, source=None, createdBefore=None, createdAfter=None,
completeBefore=None, completeAfter=None, type=None, typeInfo=None,
queryOpts=None, pattern=None, cgID=None, draft=None):
"""
Return a list of builds that match the given parameters
Filter parameters
:param int|str packageID: only builds of the specified package
:param int|str userID: only builds owned by the given user
:param int taskID: only builds with the given task ID
If taskID is -1, only builds with a non-null task id
:param int volumeID: only builds stored on the given volume
:param str source: only builds where the source field matches (glob pattern)
:param str prefix: only builds whose package name starts with that prefix
:param str pattern: only builds whose nvr matches the glob pattern
:param int state: only builds in the given state
:param int|str cgID: only build from given content generator
Timestamp filter parameters
- these limit the results to builds where the corresponding
timestamp is before or after the given time
- the time value may be specified as seconds since the epoch or
in ISO format ('YYYY-MM-DD HH24:MI:SS')
:param str|timestamp createdBefore: filter for creation_time
:param str|timestamp createdAfter: filter for creation_time
:param str|timestamp completeBefore: filter for completion_time
:param str|timestamp completeAfter: filter for completion_time
Build type parameters:
:param str type: only builds of the given btype (such as maven or image)
:param dict typeInfo: only builds with matching type-specific info (given
as a dictionary). Can only be used in conjunction with the
type parameter. Only limited types are supported.
For type=maven, the provided group_id, artifact_id, and/or version
fields are matched
For type=win, the provided platform fields are matched
:param bool draft: bool or None option that indicates the filter based on draft field
- None: no filter (both draft and regular builds)
- True: draft only
- False: regular only
:returns: Returns a list of maps. Each map contains the following keys:
- build_id
- version
- release
- epoch
- draft
- state
- package_id
- package_name
- name (same as package_name)
- nvr (synthesized for sorting purposes)
- owner_id
- owner_name
- promoter_id
- promoter_name
- volume_id
- volume_name
- source
- creation_event_id
- creation_time
- creation_ts
- start_time
- start_ts
- completion_time
- completion_ts
- promotion_time
- promotion_ts
- task_id
- extra
If type == 'maven', each map will also contain the following keys:
- maven_group_id
- maven_artifact_id
- maven_version
If type == 'win', each map will also contain the following key:
- platform
If no builds match, an empty list is returned.
"""
fields = [('build.id', 'build_id'), ('build.version', 'version'),
('build.release', 'release'),
('build.epoch', 'epoch'),
('build.draft', 'draft'),
('build.state', 'state'),
('build.completion_time', 'completion_time'),
('build.promotion_time', 'promotion_time'),
('build.start_time', 'start_time'),
('build.source', 'source'),
('build.extra', 'extra'),
('events.id', 'creation_event_id'), ('events.time', 'creation_time'),
('build.task_id', 'task_id'),
("date_part('epoch', events.time)", 'creation_ts'),
("date_part('epoch', build.start_time)", 'start_ts'),
("date_part('epoch', build.completion_time)", 'completion_ts'),
("date_part('epoch', build.promotion_time)", 'promotion_ts'),
('package.id', 'package_id'), ('package.name', 'package_name'),
('package.name', 'name'),
('volume.id', 'volume_id'), ('volume.name', 'volume_name'),
("package.name || '-' || build.version || '-' || build.release", 'nvr'),
('users.id', 'owner_id'), ('users.name', 'owner_name'),
('promoter.id', 'promoter_id'), ('promoter.name', 'promoter_name'),
]
tables = ['build']
joins = ['LEFT JOIN events ON build.create_event = events.id',
'LEFT JOIN package ON build.pkg_id = package.id',
'LEFT JOIN volume ON build.volume_id = volume.id',
'LEFT JOIN users ON build.owner = users.id',
'LEFT JOIN users AS promoter ON build.promoter = promoter.id',
]
clauses = []
if packageID is not None:
packageID = get_package_id(packageID)
if not packageID:
return []
clauses.append('package.id = %(packageID)i')
if userID is not None:
userinfo = get_user(userID)
if not userinfo:
return []
userID = userinfo['id']
clauses.append('users.id = %(userID)i')
if volumeID is not None:
clauses.append('volume.id = %(volumeID)i')
if taskID is not None:
if taskID == -1:
clauses.append('build.task_id IS NOT NULL')
else:
clauses.append('build.task_id = %(taskID)i')
if source is not None:
source = self._prepareSearchTerms(source, 'glob')
clauses.append('build.source ilike %(source)s')
if prefix:
clauses.append("package.name ilike %(prefix)s || '%%'")
if pattern:
pattern = self._prepareSearchTerms(pattern, 'glob')
clauses.append("package.name || '-' || build.version || '-' || build.release"
" ilike %(pattern)s")
if state is not None:
clauses.append('build.state = %(state)i')
if createdBefore:
if not isinstance(createdBefore, str):
createdBefore = convert_timestamp(createdBefore)
clauses.append('events.time < %(createdBefore)s')
if createdAfter:
if not isinstance(createdAfter, str):
createdAfter = convert_timestamp(createdAfter)
clauses.append('events.time > %(createdAfter)s')
if completeBefore:
if not isinstance(completeBefore, str):
completeBefore = convert_timestamp(completeBefore)
clauses.append('build.completion_time < %(completeBefore)s')
if completeAfter:
if not isinstance(completeAfter, str):
completeAfter = convert_timestamp(completeAfter)
clauses.append('build.completion_time > %(completeAfter)s')
if cgID:
cgID = lookup_name('content_generator', cgID, strict=False)
if not cgID:
return []
cgID = cgID['id']
clauses.append('build.cg_id = %(cgID)s')
if type is None:
pass
elif type == 'maven':
joins.append('maven_builds ON build.id = maven_builds.build_id')
fields.extend([('maven_builds.group_id', 'maven_group_id'),
('maven_builds.artifact_id', 'maven_artifact_id'),
('maven_builds.version', 'maven_version')])
if typeInfo:
if 'group_id' in typeInfo:
clauses.append('maven_builds.group_id = %(group_id)s')
group_id = typeInfo['group_id']
if 'artifact_id' in typeInfo:
clauses.append('maven_builds.artifact_id = %(artifact_id)s')
artifact_id = typeInfo['artifact_id']
if 'version' in typeInfo:
clauses.append('maven_builds.version = %(version)s')
version = typeInfo['version']
elif type == 'win':
joins.append('win_builds ON build.id = win_builds.build_id')
fields.append(('win_builds.platform', 'platform'))
if typeInfo:
clauses.append('win_builds.platform = %(platform)s')
platform = typeInfo['platform']
elif type == 'image':
joins.append('image_builds ON build.id = image_builds.build_id')
fields.append(('image_builds.build_id', 'build_id'))
else:
btype = lookup_name('btype', type, strict=False)
if not btype:
raise koji.GenericError('unsupported build type: %s' % type)
btype_id = btype['id']
joins.append('build_types ON build.id = build_types.build_id '
'AND btype_id = %(btype_id)s')
if draft is not None:
clauses.append(draft_clause(draft))
query = QueryProcessor(columns=[pair[0] for pair in fields],
aliases=[pair[1] for pair in fields],
tables=tables, joins=joins, clauses=clauses,
transform=_fix_extra_field,
values=locals(), opts=queryOpts)
return query.iterate()
def getLatestBuilds(self, tag, event=None, package=None, type=None, draft=None):
"""List latest builds for tag (inheritance enabled, wrapper of readTaggedBuilds)
:param int tag: tag ID
:param int event: query at a time in the past
:param int package: filter on package name
:param str type: restrict the list to builds of the given type. Currently the supported
types are 'maven', 'win', 'image', or any custom content generator btypes.
:param bool draft: bool or None option that indicates the filter based on draft field
- None: no filter (both draft and regular builds)
- True: draft only
- False: regular only
:returns [dict]: list of buildinfo dicts
"""
if not isinstance(tag, int):
# lookup tag id
tag = get_tag_id(tag, strict=True)
return readTaggedBuilds(tag, event, inherit=True, latest=True, package=package, type=type,
draft=draft)
def getLatestRPMS(self, tag, package=None, arch=None, event=None, rpmsigs=False, type=None,
draft=None):
"""List latest RPMS for tag (inheritance enabled, wrapper of readTaggedBuilds)
:param int|str tag: The tag name or ID to search
:param str package: Filter on a package name.
:param str|list arch: Filter on an architecture (eg "x86_64") or list of
architectures.
:param int event: The event ID at which to search. If unspecified, the
default behavior is to search for the "active" tag
builds.
:param bool rpmsigs: query will return one record per rpm/signature combination
:param str type: Filter by build type. Supported types are 'maven',
'win', and 'image'.
:param bool draft: bool or None option that indicates the filter based on draft field
- None: no filter (both draft and regular builds)
- True: draft only
- False: regular only
:returns: a two-element list. The first element is the list of RPMs, and
the second element is the list of builds.
"""
if not isinstance(tag, int):
# lookup tag id
tag = get_tag_id(tag, strict=True)
return readTaggedRPMS(tag, package=package, arch=arch, event=event, inherit=True,
latest=True, rpmsigs=rpmsigs, type=type, draft=draft)
def getLatestMavenArchives(self, tag, event=None, inherit=True):
"""Return a list of the latest Maven archives in the tag, as of the given event
(or now if event is None). If inherit is True, follow the tag hierarchy
and return a list of the latest archives for all tags in the tree."""
tag_id = get_tag_id(tag, strict=True)
return maven_tag_archives(tag_id, event_id=event, inherit=inherit)
def getAverageBuildDuration(self, package, age=None):
"""Get the average duration of a build of the given package.
:param int|str package: Package name or id
:param int age: length of history in months
:return float|None: average number of seconds - If package wasn't built
during past age months (or never), None is returned
"""
packageID = get_package_id(package)
if not packageID:
return None
st_complete = koji.BUILD_STATES['COMPLETE']
# we need to filter out builds without tasks (imports) as they'll reduce
# time average. CG imported builds often contain *_koji_task_id instead.
clauses = ['build.pkg_id = %(packageID)i', 'build.state = %(st_complete)i',
"build.task_id IS NOT NULL OR build.extra LIKE '%%' || 'koji_task_id' || '%%'"]
if age is not None:
clauses.append(f"build.completion_time > NOW() - '{int(age)} months'::interval")
query = QueryProcessor(tables=['build'],
columns=["date_part('epoch', "
"avg(build.completion_time - events.time))"],
joins=['events ON build.create_event = events.id'],
clauses=clauses,
values={'packageID': packageID, 'st_complete': st_complete})
return query.singleValue()
packageListAdd = staticmethod(pkglist_add)
packageListRemove = staticmethod(pkglist_remove)
packageListBlock = staticmethod(pkglist_block)
packageListUnblock = staticmethod(pkglist_unblock)
packageListSetOwner = staticmethod(pkglist_setowner)
packageListSetArches = staticmethod(pkglist_setarches)
groupListAdd = staticmethod(grplist_add)
groupListRemove = staticmethod(grplist_remove)
groupListBlock = staticmethod(grplist_block)
groupListUnblock = staticmethod(grplist_unblock)
groupPackageListAdd = staticmethod(grp_pkg_add)
groupPackageListRemove = staticmethod(grp_pkg_remove)
groupPackageListBlock = staticmethod(grp_pkg_block)
groupPackageListUnblock = staticmethod(grp_pkg_unblock)
groupReqListAdd = staticmethod(grp_req_add)
groupReqListRemove = staticmethod(grp_req_remove)
groupReqListBlock = staticmethod(grp_req_block)
groupReqListUnblock = staticmethod(grp_req_unblock)
getTagGroups = staticmethod(readTagGroups)
checkTagAccess = staticmethod(check_tag_access)
def getInheritanceData(self, tag, event=None):
"""Return inheritance data for tag"""
tag = get_tag_id(tag, strict=True)
return readInheritanceData(tag, event)
def setInheritanceData(self, tag, data, clear=False):
"""
Set inheritance relationships for a tag.
This tag will be the "child" that inherits from a list of "parents".
:param tag: The koji tag that will inherit from parent tags.
:type tag: int or str
:param list data: Inheritance rules to set for this child tag. This is
a list of rules (dicts) for parent tags and
priorities. If any rule dict in the list has a
special "delete link": True key and value, Koji will
remove this inheritance rule instead of adding it.
:param bool clear: Wipe out all existing inheritance rules and only
apply the ones you submit here. If unspecified,
this defaults to False.
"""
# verify existence of tag and/or convert name to id
tag = get_tag_id(tag, strict=True)
context.session.assertPerm('tag')
return writeInheritanceData(tag, data, clear=clear)
def getFullInheritance(self, tag, event=None, reverse=False, **kwargs):
"""
:param int|str tag: tag ID | name
:param int event: event ID
:param bool reverse: return reversed tree (descendants instead of
parents)
:param dict stops: SHOULD NOT BE USED, BACKWARDS COMPATIBLE ONLY
:param dict jumps: SHOULD NOT BE USED, BACKWARDS COMPATIBLE ONLY
:returns: list of node dicts
"""
# Backwards-compatible with the removed options
for k, v in kwargs.items():
if k in ('stops', 'jumps'):
if v:
raise koji.ParameterError("%s option has been removed since 1.26" % k)
else:
raise koji.ParameterError(
"getFullInheritance() got an unexpected keyword argument '%s'" % k)
if not isinstance(tag, int):
# lookup tag id
tag = get_tag_id(tag, strict=True)
return readFullInheritance(tag, event, reverse)
listRPMs = staticmethod(list_rpms)
def listBuildRPMs(self, build):
"""Get information about all the RPMs generated by the build with the given
ID. A list of maps is returned, each map containing the following keys:
- id
- name
- version
- release
- arch
- epoch
- draft
- payloadhash
- size
- buildtime
- build_id
- buildroot_id
If no build has the given ID, or the build generated no RPMs, an empty list is returned."""
if not isinstance(build, int):
# lookup build id
build = self.findBuildID(build, strict=True)
return self.listRPMs(buildID=build)
getRPM = staticmethod(get_rpm)
def getRPMDeps(self, rpmID, depType=None, queryOpts=None, strict=False):
"""Return dependency information about the RPM with the given ID.
If depType is specified, restrict results to dependencies of the given type.
Otherwise, return all dependency information. A list of maps will be returned,
each with the following keys:
- name
- version
- flags
- type
If there is no *internal* RPM with the given ID, or no RPM file found,
an empty list will be returned, unless strict is True in which case a
GenericError is raised.
If the RPM has no dependency information, an empty list will be returned.
"""
if queryOpts is None:
queryOpts = {}
rpm_info = get_rpm(rpmID, strict=strict)
if not rpm_info:
return _applyQueryOpts([], queryOpts)
if rpm_info and not rpm_info['build_id']:
if strict:
raise koji.GenericError("Can not get dependencies,"
" because RPM: %s is not internal" % rpmID)
return _applyQueryOpts([], queryOpts)
build_info = get_build(rpm_info['build_id'])
rpm_path = joinpath(koji.pathinfo.build(build_info),
koji.pathinfo.rpm(rpm_info))
if not os.path.exists(rpm_path):
if strict:
raise koji.GenericError("RPM file of %s doesn't exist" % rpmID)
return _applyQueryOpts([], queryOpts)
results = []
for dep_name in ['REQUIRE', 'PROVIDE', 'CONFLICT', 'OBSOLETE', 'SUGGEST', 'ENHANCE',
'SUPPLEMENT', 'RECOMMEND']:
dep_id = getattr(koji, 'DEP_' + dep_name)
if depType is None or depType == dep_id:
fields = koji.get_header_fields(rpm_path, [dep_name + 'NAME',
dep_name + 'VERSION',
dep_name + 'FLAGS'])
for (name, version, flags) in zip(fields[dep_name + 'NAME'],
fields[dep_name + 'VERSION'],
fields[dep_name + 'FLAGS']):
if queryOpts.get('asList'):
results.append([name, version, flags, dep_id])
else:
results.append(
{'name': name, 'version': version, 'flags': flags, 'type': dep_id})
return _applyQueryOpts(results, queryOpts)
def listRPMFiles(self, rpmID, queryOpts=None):
"""List files associated with the RPM with the given ID. A list of maps
will be returned, each with the following keys:
- name
- digest
- md5 (alias for digest)
- digest_algo
- size
- flags
If there is no RPM with the given ID, or that RPM contains no files,
an empty list will be returned."""
if queryOpts is None:
queryOpts = {}
rpm_info = get_rpm(rpmID)
if not rpm_info or not rpm_info['build_id']:
return _applyQueryOpts([], queryOpts)
build_info = get_build(rpm_info['build_id'])
rpm_path = joinpath(koji.pathinfo.build(build_info), koji.pathinfo.rpm(rpm_info))
if not os.path.exists(rpm_path):
return _applyQueryOpts([], queryOpts)
results = []
hdr = koji.get_rpm_header(rpm_path)
fields = koji.get_header_fields(hdr, ['filenames', 'filemd5s', 'filesizes', 'fileflags',
'fileusername', 'filegroupname', 'filemtimes',
'filemodes'])
digest_algo = koji.util.filedigestAlgo(hdr)
for (name, digest, size, flags, user, group, mtime, mode) \
in zip(fields['filenames'], fields['filemd5s'],
fields['filesizes'], fields['fileflags'],
fields['fileusername'], fields['filegroupname'],
fields['filemtimes'], fields['filemodes']):
if queryOpts.get('asList'):
results.append([name, digest, size, flags, digest_algo, user, group, mtime, mode])
else:
results.append({'name': name, 'digest': digest, 'digest_algo': digest_algo,
'md5': digest, 'size': size, 'flags': flags,
'user': user, 'group': group, 'mtime': mtime, 'mode': mode})
return _applyQueryOpts(results, queryOpts)
def getRPMFile(self, rpmID, filename, strict=False):
"""
Get info about the file in the given RPM with the given filename.
A map will be returned with the following keys:
- rpm_id
- name
- digest
- md5 (alias for digest)
- digest_algo
- size
- flags
- user
- group
- mtime
- mode
If there is no *internal* RPM with the given ID, or no RPM file found,
an empty map will be returned, unless strict is True in which case a
GenericError is raised.
If no such file exists, an empty map will be returned, unless strict is
True in which case a GenericError is raised.
"""
rpm_info = get_rpm(rpmID, strict=strict)
if not rpm_info:
return {}
if rpm_info and not rpm_info['build_id']:
if strict:
raise koji.GenericError("Can not get RPM file,"
" because RPM: %s is not internal" % rpmID)
return {}
build_info = get_build(rpm_info['build_id'])
rpm_path = joinpath(koji.pathinfo.build(build_info), koji.pathinfo.rpm(rpm_info))
if not os.path.exists(rpm_path):
if strict:
raise koji.GenericError(
"RPM package file of %s doesn't exist" % rpmID)
return {}
hdr = koji.get_rpm_header(rpm_path)
# use filemd5s for backward compatibility
fields = koji.get_header_fields(hdr, ['filenames', 'filemd5s', 'filesizes', 'fileflags',
'fileusername', 'filegroupname', 'filemtimes',
'filemodes'])
digest_algo = koji.util.filedigestAlgo(hdr)
i = 0
for name in fields['filenames']:
if name == filename:
return {'rpm_id': rpm_info['id'], 'name': name, 'digest': fields['filemd5s'][i],
'digest_algo': digest_algo, 'md5': fields['filemd5s'][i],
'size': fields['filesizes'][i], 'flags': fields['fileflags'][i],
'user': fields['fileusername'][i], 'group': fields['filegroupname'][i],
'mtime': fields['filemtimes'][i], 'mode': fields['filemodes'][i]}
i += 1
if strict:
raise koji.GenericError(
"No file: %s found in RPM: %s" % (filename, rpmID))
return {}
def getRPMHeaders(self, rpmID=None, taskID=None, filepath=None, headers=None, strict=False):
"""
Get the requested headers from the rpm, specified either by rpmID or taskID + filepath
If the specified ID is not valid or the rpm does not exist on the file system an empty
map will be returned, unless strict=True is given.
Header names are case-insensitive. If a header is requested that does not exist an
exception will be raised (regardless of strict option).
:param int|str rpmID: query the specified rpm
:param int taskID: query a file from the specified task (filepath must also be passed)
:param str filepath: the rpm path relative to the task directory
:param list headers: a list of rpm header names (as strings)
:param bool strict: raise an exception for invalid or missing rpms/paths
:returns dict: a map of header names to values
"""
if rpmID:
rpm_info = get_rpm(rpmID, strict=strict)
if not rpm_info:
# can only happen if not strict
return {}
if rpm_info['external_repo_id'] != 0:
if strict:
raise koji.GenericError('External rpm: %(id)s' % rpm_info)
else:
return {}
# get_build should be strict regardless since this is an internal rpm
build_info = get_build(rpm_info['build_id'], strict=True)
build_state = koji.BUILD_STATES[build_info['state']]
if build_state == 'DELETED':
if strict:
raise koji.GenericError('Build %(nvr)s is deleted' % build_info)
else:
return {}
rpm_path = joinpath(koji.pathinfo.build(build_info), koji.pathinfo.rpm(rpm_info))
if not os.path.exists(rpm_path):
if strict:
raise koji.GenericError('Missing rpm file: %s' % rpm_path)
else:
# strict or not, this is still unexpected
logger.error('Missing rpm file: %s' % rpm_path)
return {}
elif taskID:
if not filepath:
raise koji.GenericError('filepath must be specified with taskID')
if filepath.startswith('/') or '../' in filepath:
raise koji.GenericError('Invalid filepath: %s' % filepath)
rpm_path = joinpath(koji.pathinfo.work(),
koji.pathinfo.taskrelpath(taskID),
filepath)
if not os.path.exists(rpm_path):
if strict:
raise koji.GenericError('Missing rpm file: %s' % rpm_path)
else:
return {}
else:
raise koji.GenericError('either rpmID or taskID and filepath must be specified')
headers = koji.get_header_fields(rpm_path, headers)
return koji.fixEncodingRecurse(headers, remove_nonprintable=True)
queryRPMSigs = staticmethod(query_rpm_sigs)
def getRPMChecksums(self, rpm_id, checksum_types=None, cacheonly=False):
"""Returns RPM checksums for specific rpm.
:param int rpm_id: RPM id
:param list checksum_type: List of checksum types. Default sha256 checksum type
:param bool cacheonly: when False, checksum is created for missing checksum type
when True, checksum is returned as None when checksum is missing
for specific checksum type
:returns: A dict of specific checksum types and checksums
"""
if not isinstance(rpm_id, int):
raise koji.GenericError('rpm_id must be an integer')
rpm_info = get_rpm(rpm_id, strict=True)
if not checksum_types:
checksum_types = context.opts.get('RPMDefaultChecksums').split()
if not isinstance(checksum_types, list):
raise koji.GenericError('checksum_type must be a list')
for ch_type in checksum_types:
if ch_type not in koji.CHECKSUM_TYPES:
raise koji.GenericError(f"Checksum_type {ch_type} isn't supported")
query = QueryProcessor(tables=['rpmsigs'], columns=['sigkey'],
clauses=['rpm_id=%(rpm_id)i'], values={'rpm_id': rpm_id})
sigkeys = [r['sigkey'] for r in query.execute()]
if not sigkeys:
return {}
list_checksums_sigkeys = {s: set(checksum_types) for s in sigkeys}
checksum_type_int = [koji.CHECKSUM_TYPES[chsum] for chsum in checksum_types]
query_checksum = QueryProcessor(tables=['rpm_checksum'],
columns=['checksum', 'checksum_type', 'sigkey'],
clauses={'rpm_id=%(rpm_id)i',
'checksum_type IN %(checksum_type)s'},
values={'rpm_id': rpm_id,
'checksum_type': checksum_type_int})
query_result = query_checksum.execute()
if (len(query_result) == (len(checksum_type_int) * len(sigkeys))) or cacheonly:
return create_rpm_checksums_output(query_result, list_checksums_sigkeys)
else:
missing_chsum_sigkeys = copy.deepcopy(list_checksums_sigkeys)
for r in query_result:
if r['checksum_type'] in checksum_type_int and r['sigkey'] in sigkeys:
missing_chsum_sigkeys[r['sigkey']].remove(
koji.CHECKSUM_TYPES[r['checksum_type']])
# delete key if everything was removed
if not missing_chsum_sigkeys[r['sigkey']]:
del missing_chsum_sigkeys[r['sigkey']]
if missing_chsum_sigkeys:
binfo = get_build(rpm_info['build_id'])
builddir = koji.pathinfo.build(binfo)
rpm_path = joinpath(builddir, koji.pathinfo.rpm(rpm_info))
for sigkey, chsums in missing_chsum_sigkeys.items():
signedpath = joinpath(builddir, koji.pathinfo.signed(rpm_info, sigkey))
if os.path.exists(signedpath):
with open(signedpath, 'rb') as fo:
chsums_dict = calculate_chsum(fo, chsums)
else:
sig_path = joinpath(builddir, koji.pathinfo.sighdr(rpm_info, sigkey))
with open(sig_path, 'rb') as fo:
sighdr = fo.read()
with koji.spliced_sig_reader(rpm_path, sighdr) as fo:
chsums_dict = calculate_chsum(fo, chsums)
create_rpm_checksum(rpm_id, sigkey, chsums_dict)
query_result = query_checksum.execute()
return create_rpm_checksums_output(query_result, list_checksums_sigkeys)
def writeSignedRPM(self, an_rpm, sigkey, force=False):
"""Write a signed copy of the rpm"""
context.session.assertPerm('sign')
# XXX - still not sure if this is the right restriction
return write_signed_rpm(an_rpm, sigkey, force)
def addRPMSig(self, an_rpm, data):
"""Store a signature header for an rpm
data: the signature header encoded as base64
"""
context.session.assertPerm('sign')
return add_rpm_sig(an_rpm, base64.b64decode(data))
def deleteRPMSig(self, rpminfo, sigkey=None, all_sigs=False):
"""Delete rpm signature
Only use this method in extreme situations, because it goes against
Koji's design of immutable, auditable data.
This call requires ``admin`` permission (``sign`` is not sufficient).
:param dict/str/id rpm: map containing 'name', 'version', 'release', and 'arch'
string N-V-R.A
int ID
:param str sigkey: Signature key.
:param bool all_sigs: Delete all signed copies for specified RPM.
"""
context.session.assertPerm('admin')
return delete_rpm_sig(rpminfo, sigkey=sigkey, all_sigs=all_sigs)
findBuildID = staticmethod(find_build_id)
getTagID = staticmethod(get_tag_id)
getTag = staticmethod(get_tag)
def getPackageID(self, name, strict=False):
"""Get package ID by name.
If package doesn't exist, return None, unless strict is True in which
case an exception is raised."""
query = QueryProcessor(tables=['package'],
columns=['id'],
clauses=['name=%(name)s'],
values=locals())
r = query.executeOne()
if not r:
if strict:
raise koji.GenericError('No such package name: %s' % name)
return None
return r['id']
getPackage = staticmethod(lookup_package)
def listPackages(self, tagID=None, userID=None, pkgID=None, prefix=None, inherited=False,
with_dups=False, event=None, queryOpts=None, with_owners=True,
with_blocked=True):
"""
Returns a list of packages in Koji.
All parameters are optional.
Note that the returned data includes blocked entries
In the simple case (no tagID, userID, or pkgID option), the call simply queries
the package table. This will show all packages in the system. However, when any
of these options are given, the call will query the tag_packages table, showing
only packages that are included in some tag.
This can lead to the confusing situation where a call to listPackages() shows
a particular package, but a call to listPackages(pkgID=N) for said package reports
no results.
:param int|str tag: filter on tag ID or name
:param int|str userID: filter on package owner
:param int|str pkgID: filter on package
:param str prefix: filter package names that start with a
case-insensitive string.
:param bool inherited: return also inherited packages
:param bool with_dups: possible duplicates from inheritance, makes no
sense with inherited=False
:param int event: filter on event
:param dict queryOpts: Options to order or filter the results. For
example: {'order': 'name'}, or {'limit': 5}.
Valid query options are "countOnly", "order",
"offset", and "limit".
:param bool with_owners: Return owner_id and owner_name in the list of
packages. Default is True. This cannot be
False if userID is not None.
:returns [dict]: List of dicts with "package_id" and "package_name"
keys. If tagID, userID, or pkgID are specified, the
dicts will also contain the following keys.
- tag_id
- tag_name
- owner_id
- owner_name
- extra_arches
- blocked
"""
if tagID is None and userID is None and pkgID is None:
return self.listPackagesSimple(prefix, queryOpts)
else:
if tagID is not None:
tagID = get_tag_id(tagID, strict=True)
if userID is not None:
userID = get_user(userID, strict=True)['id']
if pkgID is not None:
pkgID = get_package_id(pkgID, strict=True)
result_list = list(readPackageList(tagID=tagID, userID=userID, pkgID=pkgID,
inherit=inherited, with_dups=with_dups,
event=event, with_owners=with_owners,
with_blocked=with_blocked).values())
if with_dups:
# when with_dups=True, readPackageList returns a list of list of dicts
# convert it to a list of dicts for consistency
results = []
for result in result_list:
results.extend(result)
else:
results = result_list
if prefix:
prefix = prefix.lower()
results = [package for package in results
if package['package_name'].lower().startswith(prefix)]
return _applyQueryOpts(results, queryOpts)
def listPackagesSimple(self, prefix=None, queryOpts=None):
"""list packages that starts with prefix and are filted
and ordered by queryOpts.
Args:
prefix: default is None. If is not None will filter out
packages which name doesn't start with the prefix.
queryOpts: query options used by the QueryProcessor.
Returns:
A list of maps is returned, and each map contains key
'package_name' and 'package_id'.
"""
fields = (('package.id', 'package_id'),
('package.name', 'package_name'))
if prefix is None:
clauses = None
else:
clauses = ["""package.name ILIKE %(prefix)s || '%%'"""]
query = QueryProcessor(
tables=['package'], clauses=clauses, values=locals(),
columns=[f[0] for f in fields], aliases=[f[1] for f in fields],
opts=queryOpts)
return query.execute()
def checkTagPackage(self, tag, pkg):
"""Check that pkg is in the list for tag. Returns true/false"""
tag_id = get_tag_id(tag, strict=False)
pkg_id = get_package_id(pkg, strict=False)
if pkg_id is None or tag_id is None:
return False
pkgs = readPackageList(tagID=tag_id, pkgID=pkg_id, inherit=True, with_owners=False)
if pkg_id not in pkgs:
return False
else:
# still might be blocked
return not pkgs[pkg_id]['blocked']
def getPackageConfig(self, tag, pkg, event=None):
"""Get config for package in tag"""
tag_id = get_tag_id(tag, strict=False)
pkg_id = get_package_id(pkg, strict=False)
if pkg_id is None or tag_id is None:
return None
pkgs = readPackageList(tagID=tag_id, pkgID=pkg_id, inherit=True, event=event)
return pkgs.get(pkg_id, None)
getUser = staticmethod(get_user)
editUser = staticmethod(edit_user)
def grantPermission(self, userinfo, permission, create=False, description=None):
"""Grant a permission to a user"""
context.session.assertPerm('admin')
if create:
verify_name_internal(permission)
if description is not None and not create:
raise koji.GenericError('Description should be specified only with create.')
convert_value(description, cast=str, none_allowed=True, check_only=True)
user_id = get_user(userinfo, strict=True)['id']
perm = lookup_perm(permission, strict=(not create), create=create)
perm_id = perm['id']
if create and description is not None:
update = UpdateProcessor('permissions', clauses=['id=%(perm_id)i'],
values={'perm_id': perm_id})
update.set(description=description)
update.execute()
if perm['name'] in get_user_perms(user_id, with_groups=False):
raise koji.GenericError('user %s already has permission: %s' %
(userinfo, perm['name']))
insert = InsertProcessor('user_perms')
insert.set(user_id=user_id, perm_id=perm_id)
insert.make_create()
insert.execute()
def revokePermission(self, userinfo, permission):
"""Revoke a permission from a user"""
context.session.assertPerm('admin')
user_id = get_user(userinfo, strict=True)['id']
perm = lookup_perm(permission, strict=True)
perm_id = perm['id']
if perm['name'] not in get_user_perms(user_id, with_groups=False):
raise koji.GenericError('user %s does not have permission: %s' %
(userinfo, perm['name']))
update = UpdateProcessor('user_perms', values=locals(),
clauses=["user_id = %(user_id)i", "perm_id = %(perm_id)i"])
update.make_revoke()
update.execute()
def editPermission(self, permission, description):
"""Edit a permission description"""
context.session.assertPerm('admin')
convert_value(description, cast=str, check_only=True)
perm = lookup_perm(permission, strict=True)
perm_id = perm['id']
update = UpdateProcessor('permissions', clauses=['id=%(perm_id)i'],
values={'perm_id': perm_id})
update.set(description=description)
update.execute()
def createUser(self, username, status=None, krb_principal=None):
"""Add a user to the database
:param str username: The username for this Koji user.
:param int status: This must be one of the values of the
koji.USER_STATUS enum. If unspecified,
the default is koji.USER_STATUS['NORMAL'].
:param str krb_principal: a custom Kerberos principal, or None.
:raises: GenericError if the user or Kerberos principal already
exists.
"""
context.session.assertPerm('admin')
verify_name_user(username, krb_principal)
if get_user(username):
raise koji.GenericError('user already exists: %s' % username)
if krb_principal and get_user_by_krb_principal(krb_principal):
raise koji.GenericError(
f'user with this Kerberos principal already exists: {krb_principal}')
return context.session.createUser(username, status=status, krb_principal=krb_principal)
def addUserKrbPrincipal(self, user, krb_principal):
"""Add a Kerberos principal for user"""
context.session.assertPerm('admin')
userinfo = get_user(user, strict=True)
verify_name_user(krb=krb_principal)
if get_user_by_krb_principal(krb_principal):
raise koji.GenericError(
f'user with this Kerberos principal already exists: {krb_principal}')
return context.session.setKrbPrincipal(userinfo['name'], krb_principal)
def removeUserKrbPrincipal(self, user, krb_principal):
"""remove a Kerberos principal for user"""
context.session.assertPerm('admin')
userinfo = get_user(user, strict=True)
if not krb_principal:
raise koji.GenericError('krb_principal must be specified')
return context.session.removeKrbPrincipal(userinfo['name'],
krb_principal)
def enableUser(self, username):
"""Enable logins by the specified user"""
user = get_user(username)
if not user:
raise koji.GenericError('No such user: %s' % username)
set_user_status(user, koji.USER_STATUS['NORMAL'])
def disableUser(self, username):
"""Disable logins by the specified user"""
user = get_user(username)
if not user:
raise koji.GenericError('No such user: %s' % username)
set_user_status(user, koji.USER_STATUS['BLOCKED'])
listCGs = staticmethod(list_cgs)
grantCGAccess = staticmethod(grant_cg_access)
revokeCGAccess = staticmethod(revoke_cg_access)
# group management calls
newGroup = staticmethod(new_group)
addGroupMember = staticmethod(add_group_member)
dropGroupMember = staticmethod(drop_group_member)
getGroupMembers = staticmethod(get_group_members)
def getUserGroups(self, user):
"""
The groups associated with the given user
:param user: a str (Kerberos principal or name) or an int (user id)
or a dict:
- id: User's ID
- name: User's name
- krb_principal: Kerberos principal
:returns: a list of dicts, each containing the id and name of
a group
:raises: GenericError if the specified user is not found
"""
uinfo = get_user(user, strict=True)
return [{'id': key, 'name': val} for key, val in
get_user_groups(uinfo["id"]).items()]
def listUsers(self, userType=koji.USERTYPES['NORMAL'], prefix=None, queryOpts=None, perm=None,
inherited_perm=False):
"""List users in the system
:param int|list|None userType: filter by type, defaults to normal users
:param str prefix: only users whose name starts with prefix. optional
:param dict queryOpts: query options. optional
:param str perm: only users that have this permission. optional
:param bool inherited_perm: consider inherited permissions. default: False
:returns: a list of matching user entries
The userType option can either by a single integer or a list. These integer values
correspond to the values from koji.USERTYPES (defaults to 0, i.e. normal users).
The entries in the returned list have the following keys:
- id
- name
- status
- usertype
- krb_principals
If no users match, the list will be empty.
"""
if inherited_perm and not perm:
raise koji.GenericError('inherited_perm option must be used with perm option')
joins = []
clauses = []
if userType is not None:
if isinstance(userType, int):
userType = [userType]
else:
raise koji.ParameterError("userType must be integer or None")
clauses.append('usertype IN %(userType)s')
fields = [
('users.id', 'id'),
('users.name', 'name'),
('status', 'status'),
('usertype', 'usertype'),
('array_agg(krb_principal)', 'krb_principals'),
]
if perm:
perm_id = get_perm_id(perm, strict=True)
clauses.extend(['user_perms.active AND user_perms.perm_id = %(perm_id)s'])
if inherited_perm:
joins.extend([
'LEFT JOIN user_groups ON user_id = users.id AND user_groups.active IS TRUE',
# the active condition for user_groups must be in the join, otherwise we will
# filter out users that never had a group
'LEFT JOIN user_perms ON users.id = user_perms.user_id '
'OR group_id = user_perms.user_id'])
else:
joins.append('LEFT JOIN user_perms ON users.id = user_perms.user_id')
joins.append('LEFT JOIN user_krb_principals ON users.id = user_krb_principals.user_id')
if prefix:
clauses.append("users.name ilike %(prefix)s || '%%'")
if queryOpts is None:
queryOpts = {}
if not queryOpts.get('group'):
if perm:
queryOpts['group'] = 'users.id,user_perms.perm_id'
else:
queryOpts['group'] = 'users.id'
else:
raise koji.GenericError('queryOpts.group is not available for this API')
fields, aliases = zip(*fields)
query = QueryProcessor(columns=fields, aliases=aliases,
tables=['users'], joins=joins, clauses=clauses,
values=locals(), opts=queryOpts,
enable_group=True, transform=xform_user_krb)
return query.execute()
def getBuildConfig(self, tag, event=None):
"""Return build configuration associated with a tag"""
taginfo = get_tag(tag, strict=True, event=event, blocked=True)
taginfo['config_inheritance'] = {'extra': {}, 'arches': None}
order = readFullInheritance(taginfo['id'], event=event)
# follow inheritance for arches and extra
for link in order:
if link['noconfig']:
continue
ancestor = get_tag(link['parent_id'], strict=True, event=event, blocked=True)
if taginfo['arches'] is None and ancestor['arches'] is not None:
taginfo['arches'] = ancestor['arches']
taginfo['config_inheritance']['arches'] = dslice(ancestor, ('id', 'name'))
for key in ancestor['extra']:
if key not in taginfo['extra']:
taginfo['extra'][key] = ancestor['extra'][key]
taginfo['config_inheritance']['extra'][key] = dslice(ancestor, ('id', 'name'))
# cleanup extras by blocked
for k, v in list(taginfo['extra'].items()):
if v[0]:
del taginfo['extra'][k]
else:
taginfo['extra'][k] = v[1]
return taginfo
getRepo = staticmethod(repos.old_get_repo)
repoInfo = staticmethod(repo_info)
getActiveRepos = staticmethod(get_active_repos)
def distRepo(self, tag, keys, **task_opts):
"""Create a dist-repo task. returns task id"""
if not context.session.hasPerm('dist-repo') and not context.session.hasPerm('admin'):
assert_policy('dist_repo', {'tag': tag})
repo_id, event_id = dist_repo_init(tag, keys, task_opts)
task_opts['event'] = event_id
# cancel potentially running distRepos
build_config = self.getBuildConfig(tag)
if build_config['extra'].get('distrepo.cancel_others', False):
tasks = self.listTasks(opts={
'state': [koji.TASK_STATES['FREE'],
koji.TASK_STATES['OPEN'],
koji.TASK_STATES['ASSIGNED']],
'method': 'distRepo',
'decode': True})
# filter only for this tag
task_ids = [t['id'] for t in tasks if t['request'][0] == tag]
for task_id in task_ids:
logger.debug("Cancelling distRepo task %d" % task_id)
Task(task_id).cancel(recurse=True)
return make_task('distRepo', [tag, repo_id, keys, task_opts],
priority=15, channel='createrepo')
def newRepo(self, tag, event=None, src=False, debuginfo=False, separate_src=False):
"""Create a newRepo task. returns task id"""
if not context.opts.get('AllowNewRepo', False):
raise koji.ActionNotAllowed('newRepo api call is disabled')
if context.session.hasPerm('repo'):
pass
else:
context.session.assertPerm('regen-repo')
# raise error when tag does not exist
get_tag(tag, strict=True, event=event)
# make sure repos dir exists, otherwise hosts will reject task
repos_dir = joinpath(koji.pathinfo.topdir, 'repos')
koji.ensuredir(repos_dir)
opts = {}
if event is not None:
opts['event'] = event
if src:
opts['src'] = True
if separate_src:
opts['separate_src'] = True
if debuginfo:
opts['debuginfo'] = True
args = koji.encode_args(tag, **opts)
return make_task('newRepo', args, priority=15, channel='createrepo')
def repoExpire(self, repo_id):
"""mark repo expired"""
context.session.assertPerm('repo')
repo_expire(repo_id)
def repoDelete(self, repo_id):
"""Attempt to mark repo deleted, return number of references
If the number of references is nonzero, no change is made
Does not remove from disk"""
context.session.assertPerm('repo')
return repo_delete(repo_id)
def repoProblem(self, repo_id):
"""mark repo as broken"""
context.session.assertPerm('repo')
repo_problem(repo_id)
tagChangedSinceEvent = staticmethod(tag_changed_since_event)
tagLastChangeEvent = staticmethod(tag_last_change_event)
tagFirstChangeEvent = staticmethod(tag_first_change_event)
createBuildTarget = staticmethod(create_build_target)
editBuildTarget = staticmethod(edit_build_target)
deleteBuildTarget = staticmethod(delete_build_target)
getBuildTargets = staticmethod(get_build_targets)
getBuildTarget = staticmethod(get_build_target)
def taskFinished(self, taskId):
"""Returns True if task is finished
:param int task: id of task queried
:returns bool: task not/finished
"""
task = Task(taskId)
return task.isFinished()
def getTaskRequest(self, taskId):
"""Return original task request as a list. Content depends on task type
:param int taskId: id of task queried
:returns list: request
"""
task = Task(taskId)
return task.getRequest()
def getTaskResult(self, taskId, raise_fault=True):
"""Returns task results depending on task type. For buildArch it is a dict with build info,
for newRepo list with two items, etc.
:param int taskId: id of task queried
:param bool raise_fault: if task's result is a fault, raise it also here, otherwise
just get dict with error code/message
:returns any: dict/list/etc. with task result"""
task = Task(taskId)
return task.getResult(raise_fault=raise_fault)
def getTaskInfo(self, task_id, request=False, strict=False):
"""Get information about a task
:param int task_id: Task id (or list of ids)
:param bool request: if True, return also task's request
:param bool strict: raise exception, if task is not found
:returns dict: task info (or list of dicts)"""
single = True
if isinstance(task_id, (list, tuple)):
single = False
else:
task_id = [task_id]
ret = [Task(id).getInfo(strict, request) for id in task_id]
if single:
return ret[0]
else:
return ret
def getTaskChildren(self, task_id, request=False, strict=False):
"""Return a list of the children
of the Task with the given ID."""
task = Task(task_id)
if strict:
# check, that task_id is real
task.getInfo(strict=True)
return task.getChildren(request=request)
def getTaskDescendents(self, task_id, request=False):
"""Get all descendents of the task with the given ID.
Return a map of task_id -> list of child tasks. If the given
task has no descendents, the map will contain a single elements
mapping the given task ID to an empty list. Map keys will be strings
representing integers, due to limitations in xmlrpclib. If "request"
is true, the parameters sent with the xmlrpc request will be decoded and
included in the map."""
task = Task(task_id)
return get_task_descendents(task, request=request)
def listTasks(self, opts=None, queryOpts=None):
"""Return list of tasks filtered by options
Options(dictionary):
option[type]: meaning
arch[list]: limit to tasks for given arches
not_arch[list]: limit to tasks without the given arches
state[list]: limit to tasks of given state
not_state[list]: limit to tasks not of the given state
owner[int|list]: limit to tasks owned by the user with the given ID
not_owner[int|list]: limit to tasks not owned by the user with the given ID
host_id[int|list]: limit to tasks running on the host with the given ID
not_host_id[int|list]: limit to tasks running on the hosts with IDs other than the
given ID
channel_id[int|list]: limit to tasks in the specified channel
not_channel_id[int|list]: limit to tasks not in the specified channel
parent[int|list]: limit to tasks with the given parent
not_parent[int|list]: limit to tasks without the given parent
decode[bool]: whether or not xmlrpc data in the 'request' and 'result'
fields should be decoded; defaults to False
method[str]: limit to tasks of the given method
createdBefore[float or str]: limit to tasks whose create_time is before the
given date, in either float (seconds since the epoch)
or str (ISO) format
createdAfter[float or str]: limit to tasks whose create_time is after the
given date, in either float (seconds since the epoch)
or str (ISO) format
startedBefore[float or str]: limit to tasks whose start_time is before the
given date, in either float (seconds since the epoch)
or str (ISO) format
startedAfter[float or str]: limit to tasks whose start_time is after the
given date, in either float (seconds since the epoch)
or str (ISO) format
completeBefore[float or str]: limit to tasks whose completion_time is before
the given date, in either float (seconds since the epoch)
or str (ISO) format
completeAfter[float or str]: limit to tasks whose completion_time is after
the given date, in either float (seconds since the epoch)
or str (ISO) format
"""
if not opts:
opts = {}
if not queryOpts:
queryOpts = {}
countOnly = queryOpts.get('countOnly', False)
tables = ['task']
if countOnly:
joins = []
else:
joins = ['LEFT JOIN users ON task.owner = users.id']
flist = Task.fields + (
('task.request', 'request'),
('task.result', 'result'),
)
if not countOnly:
flist += (
('users.name', 'owner_name'),
('users.usertype', 'owner_type'),
)
fields = [f[0] for f in flist]
aliases = [f[1] for f in flist]
conditions = []
for f in ['arch', 'state']:
# Include list types
if f in opts:
conditions.append('%s IN %%(%s)s' % (f, f))
# Exclude list types
if ('not_' + f) in opts:
conditions.append('%s NOT IN %%(not_%s)s' % (f, f))
for f in ['owner', 'host_id', 'channel_id', 'parent']:
# Include int types
if f in opts:
if opts[f] is None:
conditions.append('%s IS NULL' % f)
elif isinstance(opts[f], list):
conditions.append('%s IN %%(%s)s' % (f, f))
else:
conditions.append('%s = %%(%s)i' % (f, f))
# Exclude int types
if ('not_' + f) in opts:
if opts['not_' + f] is None:
conditions.append('%s IS NOT NULL' % f)
elif isinstance(opts['not_' + f], list):
conditions.append('%s NOT IN %%(not_%s)s' % (f, f))
else:
conditions.append('%s != %%(not_%s)i' % (f, f))
if 'method' in opts:
conditions.append('method = %(method)s')
time_opts = [
['createdBefore', 'create_time', '<'],
['createdAfter', 'create_time', '>'],
['startedBefore', 'start_time', '<'],
['startedAfter', 'start_time', '>'],
['completeBefore', 'completion_time', '<'],
['completeAfter', 'completion_time', '>'],
# and a couple aliases for api compat:
['completedBefore', 'completion_time', '<'],
['completedAfter', 'completion_time', '>'],
]
for key, field, cmp in time_opts:
if opts.get(key) is not None:
value = opts[key]
if not isinstance(value, str):
opts[key] = convert_timestamp(value)
conditions.append('%(field)s %(cmp)s %%(%(key)s)s' % locals())
query = QueryProcessor(columns=fields, aliases=aliases, tables=tables, joins=joins,
clauses=conditions, values=opts, opts=queryOpts)
tasks = query.iterate()
if queryOpts and (queryOpts.get('countOnly') or queryOpts.get('asList')):
# Either of the above options makes us unable to easily the decode
# the xmlrpc data
return tasks
if opts.get('decode') and not queryOpts.get('countOnly'):
if queryOpts.get('asList'):
keys = []
for n, f in aliases:
if f in ('request', 'result'):
keys.append(n)
else:
keys = ('request', 'result')
tasks = self._decode_tasks(tasks, keys)
return tasks
def _decode_tasks(self, tasks, keys):
for task in tasks:
# decode xmlrpc data
for f in keys:
val = task[f]
if val:
try:
if val.find('<?xml', 0, 10) == -1:
# handle older base64 encoded data
val = base64.b64decode(val)
# note: loads accepts either bytes or string
data, method = koji.xmlrpcplus.loads(val)
except koji.xmlrpcplus.Fault as fault:
data = fault
task[f] = data
yield task
def resubmitTask(self, taskID):
"""Retry a canceled or failed task, using the same parameter as the original task.
The logged-in user must be the owner of the original task or an admin."""
context.session.assertLogin()
task = Task(taskID)
if not (task.isCanceled() or task.isFailed()):
raise koji.GenericError('only canceled or failed tasks may be resubmitted')
taskInfo = task.getInfo()
if taskInfo['parent'] is not None:
raise koji.GenericError('only top-level tasks may be resubmitted')
if not (context.session.user_id == taskInfo['owner'] or self.hasPerm('admin')):
raise koji.GenericError('only the task owner or an admin may resubmit a task')
args = task.getRequest()
channel = get_channel(taskInfo['channel_id'], strict=True)
return make_task(taskInfo['method'], args,
arch=taskInfo['arch'], channel=channel['name'],
priority=taskInfo['priority'])
def addHost(self, hostname, arches, krb_principal=None, force=False):
"""
Add a builder host to the database.
:param str hostname: name for the host entry (fqdn recommended).
:param list arches: list of architectures this builder supports.
:param str krb_principal: (optional) a non-default kerberos principal
for the host.
:param bool force: override user type
:returns: new host id
If krb_principal is not given then that field will be generated
from the HostPrincipalFormat setting (if available).
"""
context.session.assertPerm('host')
verify_host_name(hostname)
# validate arches
arches = " ".join(arches)
arches = koji.parse_arches(arches, strict=True)
if get_host(hostname):
raise koji.GenericError('host already exists: %s' % hostname)
query = QueryProcessor(tables=['channels'], columns=['id'], clauses=["name = 'default'"])
default_channel = query.singleValue(strict=True)
# builder user can already exist, if host tried to log in before adding into db
userinfo = {'name': hostname}
if krb_principal:
convert_value(krb_principal, cast=str, check_only=True)
userinfo['krb_principal'] = krb_principal
user = get_user(userInfo=userinfo)
if user:
if user['usertype'] != koji.USERTYPES['HOST']:
if force and user['usertype'] == koji.USERTYPES['NORMAL']:
# override usertype in this special case
update = UpdateProcessor('users',
values={'userID': user['id']},
clauses=['id = %(userID)i'])
update.set(usertype=koji.USERTYPES['HOST'])
update.execute()
else:
raise koji.GenericError(
'user %s already exists and it is not a host' % hostname)
userID = user['id']
else:
if krb_principal is None:
fmt = context.opts.get('HostPrincipalFormat')
if fmt:
krb_principal = fmt % hostname
userID = context.session.createUser(hostname, usertype=koji.USERTYPES['HOST'],
krb_principal=krb_principal)
# host entry
hostID = nextval('host_id_seq')
insert = InsertProcessor('host', data={'id': hostID, 'user_id': userID, 'name': hostname})
insert.execute()
insert = InsertProcessor('host_config')
insert.set(host_id=hostID, arches=arches)
insert.make_create()
insert.execute()
# host_channels entry
insert = InsertProcessor('host_channels')
insert.set(host_id=hostID, channel_id=default_channel)
insert.make_create()
insert.execute()
return hostID
def enableHost(self, hostname):
"""Mark a host as enabled"""
set_host_enabled(hostname, True)
def disableHost(self, hostname):
"""Mark a host as disabled"""
set_host_enabled(hostname, False)
def enableChannel(self, channelname, comment=None):
"""Mark a channel as enabled"""
set_channel_enabled(channelname, enabled=True, comment=comment)
def disableChannel(self, channelname, comment=None):
"""Mark a channel as disabled"""
set_channel_enabled(channelname, enabled=False, comment=comment)
getHost = staticmethod(get_host)
editHost = staticmethod(edit_host)
addHostToChannel = staticmethod(add_host_to_channel)
removeHostFromChannel = staticmethod(remove_host_from_channel)
renameChannel = staticmethod(rename_channel)
editChannel = staticmethod(edit_channel)
addChannel = staticmethod(add_channel)
def listHosts(self, arches=None, channelID=None, ready=None, enabled=None, userID=None,
queryOpts=None):
"""List builder hosts.
All parameters are optional.
:param list arches: a list of string architecture names, e.g.
['x86_64', 'ppc64le']. If one of the arches
associated with a given host appears in the list,
it will be included in the results.
:param int|str channelID: Channel name or ID to search. If specified,
Koji will return only the builder hosts
associated with this channel.
:param bool ready: If specified, only include hosts that are ready
(True) or not ready (False).
:param bool enabled: If specified, only include hosts that are enabled
(True) or not enabled (False).
:param int|str userID: If specified, only include hosts corresponding
to a builder "user" account name or ID number.
:param queryOpts: query options used by the QueryProcessor.
:returns: A list of maps containing information about each builder
host. If no matches are found, this method returns an empty
list.
"""
clauses = ['host_config.active IS TRUE']
joins = ['host ON host.id = host_config.host_id']
if arches is not None:
if not arches:
raise koji.GenericError('arches option cannot be empty')
# include the regex constraints below so we can match 'ppc' without
# matching 'ppc64'
if not isinstance(arches, (list, tuple)):
arches = [arches]
archPattern = r'\m(%s)\M' % '|'.join(arches)
clauses.append('arches ~ %(archPattern)s')
if channelID is not None:
channelID = get_channel_id(channelID, strict=True)
joins.append('host_channels ON host.id = host_channels.host_id')
clauses.append('host_channels.channel_id = %(channelID)i')
clauses.append('host_channels.active IS TRUE')
if ready is not None:
if ready:
clauses.append('ready IS TRUE')
else:
clauses.append('ready IS FALSE')
if enabled is not None:
if enabled:
clauses.append('enabled IS TRUE')
else:
clauses.append('enabled IS FALSE')
if userID is not None:
userID = get_user(userID, strict=True)['id']
clauses.append('user_id = %(userID)i')
fields = [
('host.id', 'id'),
('host.user_id', 'user_id'),
('host.name', 'name'),
("date_part('epoch', host.update_time)", 'update_ts'),
('host.ready', 'ready'),
('host.task_load', 'task_load'),
('host_config.arches', 'arches'),
('host_config.capacity', 'capacity'),
('host_config.description', 'description'),
('host_config.comment', 'comment'),
('host_config.enabled', 'enabled'),
]
tables = ['host_config']
fields, aliases = zip(*fields)
query = QueryProcessor(columns=fields, aliases=aliases,
tables=tables, joins=joins, clauses=clauses, values=locals())
return query.execute()
def getLastHostUpdate(self, hostID, ts=False):
"""Return the latest update timestamp for the host
The timestamp represents the last time the host with the given
ID contacted the hub. Returns None if the host has never contacted
the hub.
The timestamp returned here may be different than the newer
update_ts field now returned by the getHost and listHosts calls.
"""
opts = {'order': '-update_time', 'limit': 1}
query = QueryProcessor(tables=['sessions'], columns=['sessions.update_time'],
aliases=['update_time'],
joins=['host ON sessions.user_id = host.user_id'],
clauses=['host.id = %(hostID)i'], values={'hostID': hostID},
opts=opts)
date = query.singleValue(strict=False)
if ts and date is not None:
return date.timestamp()
else:
return date
getAllArches = staticmethod(get_all_arches)
getChannel = staticmethod(get_channel)
listChannels = staticmethod(list_channels)
getBuildroot = staticmethod(get_buildroot)
def getBuildrootListing(self, id):
"""Return a list of packages in the buildroot"""
br = BuildRoot(id)
return br.getList()
listBuildroots = staticmethod(query_buildroots)
def hasPerm(self, perm, strict=False):
"""Check if the logged-in user has the given permission. Return False if
they do not have the permission, or if they are not logged-in."""
if strict and not lookup_perm(perm):
raise koji.GenericError('No such permission %s defined' % perm)
return context.session.hasPerm(perm)
def getPerms(self):
"""Get a list of the permissions granted to the currently logged-in user."""
return context.session.getPerms()
def getUserPerms(self, userID=None, with_groups=True):
"""Get a list of the permissions granted to the user with the given ID/name.
Options:
- userID: User ID or username. If no userID provided, current login user's
permissions will be listed."""
user_info = get_user(userID, strict=True)
return get_user_perms(user_info['id'], with_groups=with_groups, inheritance_data=False)
def getUserPermsInheritance(self, userID):
"""Get a dict of the permissions granted directly to user or inherited from groups
with the sources.
:param int userID: User id
:returns dict[str, list[str]]: list of permissions with source (None/group)
"""
user_info = get_user(userID, strict=True)
return get_user_perms(user_info['id'], inheritance_data=True)
def getAllPerms(self):
"""Get a list of all permissions in the system. Returns a list of maps. Each
map contains the following keys:
- id
- name
- description
"""
query = QueryProcessor(tables=['permissions'],
columns=['id', 'name', 'description'],
opts={'order': 'id'})
return query.execute()
def getLoggedInUser(self):
"""Return information about the currently logged-in user. Returns data
in the same format as getUser(), plus the authtype. If there is no
currently logged-in user, return None."""
if context.session.logged_in:
me = self.getUser(context.session.user_id)
me['authtype'] = context.session.authtype
# backward compatible for cli moshimoshi, but it's not real
if me.get('krb_principals'):
me['krb_principal'] = me['krb_principals'][0]
else:
me['krb_principal'] = None
return me
else:
return None
def setBuildOwner(self, build, user):
"""Sets owner of a build
:param int|str|dict build: build ID, NVR or dict with name, version and release
:param user: a str (Kerberos principal or name) or an int (user id)
or a dict:
- id: User's ID
- name: User's name
- krb_principal: Kerberos principal
:returns: None
"""
context.session.assertPerm('admin')
buildinfo = get_build(build, strict=True)
userinfo = get_user(user, strict=True)
userid = userinfo['id']
owner_id_old = buildinfo['owner_id']
koji.plugin.run_callbacks('preBuildStateChange',
attribute='owner_id', old=owner_id_old, new=userid,
info=buildinfo)
update = UpdateProcessor('build',
clauses=['id=%(buildid)i'],
values={'buildid': buildinfo['id']},
data={'owner': userid})
update.execute()
koji.plugin.run_callbacks('postBuildStateChange',
attribute='owner_id', old=owner_id_old, new=userid,
info=buildinfo)
def setBuildTimestamp(self, build, ts):
"""Set the completion time for a build
build should a valid nvr or build id
ts should be # of seconds since epoch or optionally an
xmlrpc DateTime value"""
context.session.assertPerm('admin')
buildinfo = get_build(build, strict=True)
if isinstance(ts, koji.xmlrpcplus.DateTime):
# not recommended
# the xmlrpclib.DateTime class is almost useless
try:
ts = time.mktime(time.strptime(str(ts), '%Y%m%dT%H:%M:%S'))
except ValueError:
raise koji.GenericError("Invalid time: %s" % ts)
elif not isinstance(ts, NUMERIC_TYPES):
raise koji.GenericError("Invalid type for timestamp")
ts_old = buildinfo['completion_ts']
koji.plugin.run_callbacks('preBuildStateChange',
attribute='completion_ts', old=ts_old, new=ts, info=buildinfo)
buildid = buildinfo['id']
update = UpdateProcessor('build',
clauses=['id = %(buildid)i'], values={'buildid': buildid})
update.rawset(completion_time=f"TIMESTAMP 'epoch' AT TIME ZONE 'utc' + "
f"'{ts:f} seconds'::interval")
update.execute()
buildinfo = get_build(build, strict=True)
koji.plugin.run_callbacks('postBuildStateChange',
attribute='completion_ts', old=ts_old, new=ts, info=buildinfo)
promoteBuild = staticmethod(_promote_build)
def count(self, methodName, *args, **kw):
"""Execute the XML-RPC method with the given name and count the results.
A method return value of None will return O, a return value of type "list", "tuple", or
"dict" will return len(value), and a return value of any other type will return 1. An
invalid methodName will raise GenericError."""
handler = context.handlers.get(methodName)
if not handler:
raise koji.GenericError("method %s doesn't exist" % methodName)
result = handler(*args, **kw)
if result is None:
return 0
elif isinstance(result, (list, tuple, dict)):
return len(result)
elif isinstance(result, types.GeneratorType):
return sum(1 for r in result)
else:
return 1
@staticmethod
def _sortByKeyFuncNoneGreatest(key):
"""Return a function to sort a list of maps by the given key.
None will sort higher than all other values (instead of lower).
"""
def internal_key(obj):
v = obj[key]
# Nones has priority, others are second
return (v is None, v)
return internal_key
def filterResults(self, methodName, *args, **kw):
"""Execute the XML-RPC method with the given name and filter the results
based on the options specified in the keywork option "filterOpts". The method
must return a list of maps. Any other return type will result in a GenericError.
Currently supported options are:
- offset: the number of elements to trim off the front of the list
- limit: the maximum number of results to return
- order: the map key to use to sort the list; the list will be sorted before
offset or limit are applied
- noneGreatest: when sorting, consider 'None' to be greater than all other values;
python considers None less than all other values, but Postgres sorts
NULL higher than all other values; default to True for consistency
with database sorts
"""
return self.countAndFilterResults(methodName, *args, **kw)[1]
def countAndFilterResults(self, methodName, *args, **kw):
"""Filter results by a given name and count total results account.
Execute the XML-RPC method with the given name and filter the results
based on the options specified in the keywork option "filterOpts".
The method must return a list of maps. Any other return type will
result in a GenericError.
Args:
offset: the number of elements to trim off the front of the list
limit: the maximum number of results to return
order: the map key to use to sort the list; the list will be sorted
before offset or limit are applied
noneGreatest: when sorting, consider 'None' to be greater than all
other values; python considers None less than all other values,
but Postgres sorts NULL higher than all other values; default
to True for consistency with database sorts
Returns:
Tuple of total results amount and the filtered results.
"""
filterOpts = kw.pop('filterOpts', {})
handler = context.handlers.get(methodName)
if not handler:
raise koji.GenericError("method %s doesn't exist" % methodName)
try:
results = handler(*args, **kw)
except Exception as ex:
raise koji.GenericError("method %s raised an exception (%s)" % (methodName, str(ex)))
if isinstance(results, types.GeneratorType):
# unfortunately due to the nature of the return, we have to generate the full list
results = list(results)
if results is None:
return 0, None
elif isinstance(results, list):
_count = len(results)
else:
_count = 1
if not isinstance(results, list):
raise koji.GenericError('%s() did not return a list' % methodName)
order = filterOpts.get('order')
if order:
if order.startswith('-'):
reverse = True
order = order[1:]
else:
reverse = False
if filterOpts.get('noneGreatest', True):
results.sort(key=self._sortByKeyFuncNoneGreatest(order), reverse=reverse)
else:
results.sort(key=order, reverse=reverse)
offset = filterOpts.get('offset')
if offset is not None:
results = results[offset:]
limit = filterOpts.get('limit')
if limit is not None:
results = results[:limit]
return _count, results
def getBuildNotifications(self, userID=None):
"""Get build notifications for the user with the given ID, name or
Kerberos principal. If no user is specified, get the notifications for
the currently logged-in user. If there is no currently logged-in user,
raise a GenericError."""
userID = get_user(userID, strict=True)['id']
return get_build_notifications(userID)
def getBuildNotification(self, id, strict=False):
"""Get the build notification with the given ID.
If there is no notification with the given ID, when strict is True,
raise GenericError, else return None.
"""
query = QueryProcessor(tables=['build_notifications'],
columns=('id', 'user_id', 'package_id', 'tag_id',
'success_only', 'email'),
clauses=['id = %(id)i'],
values={'id': id})
result = query.executeOne()
if strict and not result:
raise koji.GenericError("No notification with ID %i found" % id)
return result
def getBuildNotificationBlocks(self, userID=None):
"""Get build notifications for the user with the given ID, name or
Kerberos principal. If no user is specified, get the notifications for
the currently logged-in user. If there is no currently logged-in user,
raise a GenericError."""
userID = get_user(userID, strict=True)['id']
return get_build_notification_blocks(userID)
def getBuildNotificationBlock(self, id, strict=False):
"""Get the build notification with the given ID.
If there is no notification with the given ID, when strict is True,
raise GenericError, else return None.
"""
query = QueryProcessor(tables=['build_notifications_block'],
columns=('id', 'user_id', 'package_id', 'tag_id'),
clauses=['id = %(id)i'],
values={'id': id})
result = query.executeOne()
if strict and not result:
raise koji.GenericError("No notification block with ID %i found" % id)
return result
def updateNotification(self, id, package_id, tag_id, success_only):
"""Update an existing build notification with new data. If the notification
with the given ID doesn't exist, or the currently logged-in user is not the
owner or the notification or an admin, raise a GenericError."""
currentUser = self.getLoggedInUser()
if not currentUser:
raise koji.GenericError('Not logged-in')
orig_notif = self.getBuildNotification(id, strict=True)
if not (orig_notif['user_id'] == currentUser['id'] or self.hasPerm('admin')):
raise koji.GenericError('user %i cannot update notifications for user %i' %
(currentUser['id'], orig_notif['user_id']))
# sanitize input
if package_id is not None:
package_id = get_package_id(package_id, strict=True)
if tag_id is not None:
tag_id = get_tag_id(tag_id, strict=True)
success_only = bool(success_only)
# check existing notifications to not have same twice
for notification in get_build_notifications(orig_notif['user_id']):
if (notification['package_id'] == package_id and
notification['tag_id'] == tag_id and
notification['success_only'] == success_only):
raise koji.GenericError('notification already exists')
update = UpdateProcessor('build_notifications',
clauses=['id = %(id)i'], values=locals())
update.set(package_id=package_id, tag_id=tag_id, success_only=success_only)
update.execute()
def createNotification(self, user_id, package_id, tag_id, success_only):
"""Create a new notification. If the user_id does not match the currently logged-in user
and the currently logged-in user is not an admin, raise a GenericError."""
currentUser = self.getLoggedInUser()
if not currentUser:
raise koji.GenericError('Not logged-in')
notificationUser = self.getUser(user_id)
if not notificationUser:
raise koji.GenericError('No such user ID: %s' % user_id)
if not (notificationUser['id'] == currentUser['id'] or self.hasPerm('admin')):
raise koji.GenericError('user %s cannot create notifications for user %s' %
(currentUser['name'], notificationUser['name']))
# sanitize input
user_id = notificationUser['id']
if package_id is not None:
package_id = get_package_id(package_id, strict=True)
if tag_id is not None:
tag_id = get_tag_id(tag_id, strict=True)
success_only = bool(success_only)
email = '%s@%s' % (notificationUser['name'], context.opts['EmailDomain'])
# check existing notifications to not have same twice
for notification in get_build_notifications(user_id):
if (notification['package_id'] == package_id and
notification['tag_id'] == tag_id and
notification['success_only'] == success_only):
raise koji.GenericError('notification already exists')
insert = InsertProcessor('build_notifications')
insert.set(user_id=user_id, package_id=package_id, tag_id=tag_id,
success_only=success_only, email=email)
insert.execute()
def deleteNotification(self, id):
"""Delete the notification with the given ID. If the currently logged-in
user is not the owner of the notification or an admin, raise a GenericError."""
notification = self.getBuildNotification(id, strict=True)
currentUser = self.getLoggedInUser()
if not currentUser:
raise koji.GenericError('Not logged-in')
if not (notification['user_id'] == currentUser['id'] or
self.hasPerm('admin')):
raise koji.GenericError('user %i cannot delete notifications for user %i' %
(currentUser['id'], notification['user_id']))
delete = DeleteProcessor(table='build_notifications', clauses=['id=%(id)i'],
values={'id': id})
delete.execute()
def createNotificationBlock(self, user_id, package_id=None, tag_id=None):
"""Create notification block. If the user_id does not match the
currently logged-in user and the currently logged-in user is not an
admin, raise a GenericError."""
currentUser = self.getLoggedInUser()
if not currentUser:
raise koji.GenericError('Not logged-in')
notificationUser = self.getUser(user_id)
if not notificationUser:
raise koji.GenericError('No such user ID: %s' % user_id)
if not (notificationUser['id'] == currentUser['id'] or self.hasPerm('admin')):
raise koji.GenericError('user %s cannot create notification blocks for user %s' %
(currentUser['name'], notificationUser['name']))
# sanitize input
user_id = notificationUser['id']
if package_id is not None:
package_id = get_package_id(package_id, strict=True)
if tag_id is not None:
tag_id = get_tag_id(tag_id, strict=True)
# check existing notifications to not have same twice
for block in get_build_notification_blocks(user_id):
if (block['package_id'] == package_id and block['tag_id'] == tag_id):
raise koji.GenericError('notification already exists')
insert = InsertProcessor('build_notifications_block')
insert.set(user_id=user_id, package_id=package_id, tag_id=tag_id)
insert.execute()
def deleteNotificationBlock(self, id):
"""Delete the notification block with the given ID. If the currently logged-in
user is not the owner of the notification or an admin, raise a GenericError."""
block = self.getBuildNotificationBlock(id, strict=True)
currentUser = self.getLoggedInUser()
if not currentUser:
raise koji.GenericError('Not logged-in')
if not (block['user_id'] == currentUser['id'] or
self.hasPerm('admin')):
raise koji.GenericError('user %i cannot delete notification blocks for user %i' %
(currentUser['id'], block['user_id']))
delete = DeleteProcessor(table='build_notifications_block', clauses=['id=%(id)i'],
values={'id': id})
delete.execute()
def _prepareSearchTerms(self, terms, matchType):
r"""Process the search terms before passing them to the database.
If matchType is "glob", "_" will be replaced with "\_" (to match literal
underscores), "?" will be replaced with "_", and "*" will
be replaced with "%". If matchType is "regexp", no changes will be
made."""
if matchType == 'glob':
return terms.replace(
'\\', '\\\\').replace('_', r'\_').replace('?', '_').replace('*', '%')
else:
return terms
_searchTables = {'package': 'package',
'build': 'build',
'tag': 'tag',
'target': 'build_target',
'user': 'users',
'host': 'host',
'rpm': 'rpminfo',
'maven': 'archiveinfo',
'win': 'archiveinfo'}
def search(self, terms, type, matchType, queryOpts=None):
"""Search for an item in the database matching "terms".
:param str terms: Search for items in the database that match this
value.
:param str type: What object type to search for. Must be one of
"package", "build", "tag", "target", "user", "host",
"rpm", "maven", or "win".
:param str matchType: The type of search to perform:
- If you specify "glob", Koji will treat "terms"
as a case-insensitive glob.
- If you specify "regexp", Koji will treat
"terms" as a case-insensitive regular
expression.
- Any other value here will cause to Koji to
search for an exact string match for "terms".
:param dict queryOpts: Options to pass into the database query. Use
this to limit or order the results of the
search. For example: {'order': 'name'},
or {'limit': 5, 'order': '-build_id'}, etc.
:returns: A list of maps containing "id" and "name". If no matches
are found, this method returns an empty list.
"""
if not terms:
raise koji.GenericError('empty search terms')
if type == 'file':
# searching by filename is no longer supported
return _applyQueryOpts([], queryOpts)
table = self._searchTables.get(type)
if not table:
raise koji.GenericError('No such search type: %s' % type)
if matchType == 'glob':
oper = 'ilike'
elif matchType == 'regexp':
oper = '~*'
else:
oper = '='
terms = self._prepareSearchTerms(terms, matchType)
cols = ('id', 'name')
aliases = cols
joins = []
if type == 'build':
joins.append('package ON build.pkg_id = package.id')
clause = "package.name || '-' || build.version || '-' || build.release %s %%(terms)s" \
% oper
cols = ('build.id', "package.name || '-' || build.version || '-' || build.release")
elif type == 'rpm':
clause = "name || '-' || version || '-' || release || '.' || arch || '.rpm' %s " \
"%%(terms)s" % oper
cols = ('id', "name || '-' || version || '-' || release || '.' || arch || '.rpm'")
elif type == 'tag':
joins.append('tag_config ON tag.id = tag_config.tag_id')
clause = 'tag_config.active = TRUE and name %s %%(terms)s' % oper
elif type == 'target':
joins.append('build_target_config '
'ON build_target.id = build_target_config.build_target_id')
clause = 'build_target_config.active = TRUE and name %s %%(terms)s' % oper
elif type == 'maven':
cols = ('id', 'filename')
joins.append('maven_archives ON archiveinfo.id = maven_archives.archive_id')
clause = "archiveinfo.filename %s %%(terms)s or maven_archives.group_id || '-' || " \
"maven_archives.artifact_id || '-' || maven_archives.version %s %%(terms)s" \
% (oper, oper)
elif type == 'win':
cols = ('id',
"trim(leading '/' from win_archives.relpath || '/' || archiveinfo.filename)")
joins.append('win_archives ON archiveinfo.id = win_archives.archive_id')
clause = "archiveinfo.filename %s %%(terms)s or win_archives.relpath || '/' || " \
"archiveinfo.filename %s %%(terms)s" % (oper, oper)
else:
clause = 'name %s %%(terms)s' % oper
query = QueryProcessor(columns=cols,
aliases=aliases, tables=(table,),
joins=joins, clauses=(clause,),
values=locals(), opts=queryOpts)
return query.iterate()
class BuildRoot(object):
def __init__(self, id=None):
if id is None:
# db entry has yet to be created
self.id = None
else:
logging.getLogger("koji.hub").debug("BuildRoot id: %s" % id)
# load buildroot data
self.load(id)
def load(self, id):
fields = [
'id',
'br_type',
'cg_id',
'cg_version',
'container_type',
'container_arch',
'host_os',
'host_arch',
'extra',
]
query = QueryProcessor(columns=fields, tables=['buildroot'],
transform=_fix_extra_field,
values={'id': id}, clauses=['id=%(id)s'])
data = query.executeOne()
if not data:
raise koji.GenericError('no buildroot with ID: %i' % id)
self.id = id
self.data = data
if data['br_type'] == koji.BR_TYPES['STANDARD']:
self._load_standard()
else:
self.is_standard = False
def _load_standard(self):
fields = [
'host_id',
'repo_id',
'task_id',
'create_event',
'retire_event',
'state',
]
query = QueryProcessor(columns=fields, tables=['standard_buildroot'],
values={'id': self.id}, clauses=['buildroot_id=%(id)s'])
data = query.executeOne()
if not data:
raise koji.GenericError('Not a standard buildroot: %i' % self.id)
self.data.update(data)
# arch for compat
self.data['arch'] = self.data['container_arch']
self.is_standard = True
def new(self, host, repo, arch, task_id=None, ctype='chroot'):
arch = koji.parse_arches(arch, strict=True, allow_none=True)
state = koji.BR_STATES['INIT']
br_id = nextval('buildroot_id_seq')
insert = InsertProcessor('buildroot', data={'id': br_id})
insert.set(container_arch=arch, container_type=ctype)
insert.set(br_type=koji.BR_TYPES['STANDARD'])
insert.execute()
# and now the other table
insert = InsertProcessor('standard_buildroot')
insert.set(buildroot_id=br_id)
insert.set(host_id=host, repo_id=repo, task_id=task_id, state=state)
insert.execute()
self.load(br_id)
return self.id
def cg_new(self, data):
"""New content generator buildroot"""
fields = [
'br_type',
'cg_id',
'cg_version',
'container_type',
'container_arch',
'host_os',
'host_arch',
'extra',
]
data.setdefault('br_type', koji.BR_TYPES['EXTERNAL'])
data = dslice(data, fields)
for key in fields:
if key not in data:
raise koji.GenericError("Buildroot field %s not specified" % key)
if data['extra'] is not None:
data['extra'] = json.dumps(data['extra']),
br_id = nextval('buildroot_id_seq')
insert = InsertProcessor('buildroot')
insert.set(id=br_id, **data)
insert.execute()
self.load(br_id)
return self.id
def assertStandard(self):
if self.id is None:
raise koji.GenericError("buildroot not specified")
if not self.is_standard:
raise koji.GenericError('Not a standard buildroot: %s' % self.id)
def verifyTask(self, task_id):
self.assertStandard()
return (task_id == self.data['task_id'])
def assertTask(self, task_id):
self.assertStandard()
if not self.verifyTask(task_id):
raise koji.ActionNotAllowed('Task %s does not have lock on buildroot %s'
% (task_id, self.id))
def verifyHost(self, host_id):
self.assertStandard()
return (host_id == self.data['host_id'])
def assertHost(self, host_id):
self.assertStandard()
if not self.verifyHost(host_id):
raise koji.ActionNotAllowed("Host %s not owner of buildroot %s"
% (host_id, self.id))
def setState(self, state):
self.assertStandard()
if isinstance(state, str):
state = koji.BR_STATES[state]
# sanity checks
if state == koji.BR_STATES['INIT']:
# we do not re-init buildroots
raise koji.GenericError("Cannot change buildroot state to INIT")
query = QueryProcessor(columns=['state', 'retire_event'], values=self.data,
tables=['standard_buildroot'], clauses=['buildroot_id=%(id)s'],
opts={'rowlock': True})
row = query.executeOne()
if not row:
raise koji.GenericError("Unable to get state for buildroot %s" % self.id)
if koji.BR_STATES[row['state']] == 'EXPIRED':
# we will quietly ignore a request to expire an expired buildroot
# otherwise this is an error
if koji.BR_STATES[state] == 'EXPIRED':
return
else:
raise koji.GenericError("buildroot %i is EXPIRED" % self.id)
update = UpdateProcessor('standard_buildroot', clauses=['buildroot_id=%(id)s'],
values=self.data)
update.set(state=state)
if koji.BR_STATES[state] == 'EXPIRED':
update.rawset(retire_event='get_event()')
update.execute()
self.data['state'] = state
def getList(self):
if self.id is None:
raise koji.GenericError("buildroot not specified")
brootid = self.id
fields = (
('rpm_id', 'rpm_id'),
('is_update', 'is_update'),
('rpminfo.name', 'name'),
('version', 'version'),
('release', 'release'),
('epoch', 'epoch'),
('arch', 'arch'),
('build_id', 'build_id'),
('draft', 'draft'),
('external_repo_id', 'external_repo_id'),
('external_repo.name', 'external_repo_name'),
)
query = QueryProcessor(columns=[f[0] for f in fields], aliases=[f[1] for f in fields],
tables=['buildroot_listing'],
joins=["rpminfo ON rpm_id = rpminfo.id",
"external_repo ON external_repo_id = external_repo.id"],
clauses=["buildroot_listing.buildroot_id = %(brootid)i"],
values={'brootid': brootid})
return query.execute()
def _setList(self, rpmlist, update=False):
"""Set or update the list of rpms in a buildroot"""
update = bool(update)
if self.id is None:
raise koji.GenericError("buildroot not specified")
if update:
current = set([r['rpm_id'] for r in self.getList()])
rpm_ids = []
for an_rpm in rpmlist:
location = an_rpm.get('location')
if location:
data = add_external_rpm(an_rpm, location, strict=False)
# will add if missing, compare if not
else:
data = get_rpm(an_rpm, strict=True)
rpm_id = data['id']
if update and rpm_id in current:
# ignore duplicate packages for updates
continue
rpm_ids.append(rpm_id)
# we sort to try to avoid deadlock issues
rpm_ids.sort()
# actually do the inserts (in bulk)
if rpm_ids:
insert = BulkInsertProcessor(table='buildroot_listing')
for rpm_id in rpm_ids:
insert.add_record(buildroot_id=self.id, rpm_id=rpm_id, is_update=update)
insert.execute()
def setList(self, rpmlist):
"""Set the initial list of rpms in a buildroot"""
if self.is_standard and self.data['state'] != koji.BR_STATES['INIT']:
raise koji.GenericError("buildroot %(id)s in wrong state %(state)s" % self.data)
self._setList(rpmlist, update=False)
def updateList(self, rpmlist):
"""Update the list of packages in a buildroot"""
if self.is_standard and self.data['state'] != koji.BR_STATES['BUILDING']:
raise koji.GenericError("buildroot %(id)s in wrong state %(state)s" % self.data)
self._setList(rpmlist, update=True)
def getArchiveList(self, queryOpts=None):
"""Get the list of archives in the buildroot"""
fields = [('id', 'id'),
('type_id', 'type_id'),
('build_id', 'build_id'),
('archiveinfo.buildroot_id', 'buildroot_id'),
('filename', 'filename'),
('size', 'size'),
('checksum', 'checksum'),
('checksum_type', 'checksum_type'),
('project_dep', 'project_dep'),
]
columns, aliases = zip(*fields)
query = QueryProcessor(tables=['archiveinfo'], columns=columns,
joins=['buildroot_archives ON archiveinfo.id = '
'buildroot_archives.archive_id'],
clauses=['buildroot_archives.buildroot_id = %(id)i'],
values=self.data,
opts=queryOpts)
return query.execute()
def updateArchiveList(self, archives, project=False):
"""Update the list of archives in a buildroot.
If project is True, the archives are project dependencies.
If False, they dependencies required to setup the build environment.
"""
project = bool(project)
if self.is_standard:
if not (context.opts.get('EnableMaven') or context.opts.get('EnableWin')):
raise koji.GenericError("non-rpm support is not enabled")
if self.data['state'] != koji.BR_STATES['BUILDING']:
raise koji.GenericError("buildroot %(id)s in wrong state %(state)s" % self.data)
archives = set([r['id'] for r in archives])
current = set([r['id'] for r in self.getArchiveList()])
new_archives = archives.difference(current)
if new_archives:
insert = BulkInsertProcessor('buildroot_archives')
for archive_id in sorted(new_archives):
insert.add_record(buildroot_id=self.id,
project_dep=project,
archive_id=archive_id)
insert.execute()
def setTools(self, tools):
"""Set tools info for buildroot"""
if not tools:
return
insert = BulkInsertProcessor('buildroot_tools_info')
for tool in tools:
insert.add_record(buildroot_id=self.id, tool=tool['name'], version=tool['version'])
insert.execute()
class Host(object):
def __init__(self, id=None):
remote_id = context.session.getHostId()
if id is None:
id = remote_id
if id is None:
if context.session.logged_in:
raise koji.AuthError("User %i is not a host" % context.session.user_id)
else:
raise koji.AuthError("Not logged-in")
self.id = id
self.same_host = (id == remote_id)
def verify(self):
"""Verify that the remote host matches and has the lock"""
if not self.same_host:
raise koji.AuthError("Host mismatch")
if not context.session.exclusive:
raise koji.AuthError("This method requires an exclusive session")
return True
def taskUnwait(self, parent):
"""Clear wait data for task"""
# unwait the task
update = UpdateProcessor('task', clauses=['id=%(parent)s'], values=locals())
update.set(waiting=False)
update.execute()
# ...and un-await its subtasks
update = UpdateProcessor('task', clauses=['parent=%(parent)s'], values=locals())
update.set(awaited=False)
update.execute()
def taskSetWait(self, parent, tasks):
"""Mark task waiting and subtasks awaited"""
convert_value(tasks, cast=list, none_allowed=True, check_only=True)
# mark parent as waiting
update = UpdateProcessor('task', clauses=['id=%(parent)s'], values=locals())
update.set(waiting=True)
update.execute()
# mark children awaited
if tasks is None:
# wait on all subtasks
update = UpdateProcessor('task', clauses=['parent=%(parent)s'], values=locals())
update.set(awaited=True)
update.execute()
elif tasks:
# wait on specified subtasks
update = UpdateProcessor('task', clauses=['id IN %(tasks)s', 'parent=%(parent)s'],
values=locals())
update.set(awaited=True)
update.execute()
# clear awaited flag on any other child tasks
update = UpdateProcessor('task', values=locals(),
clauses=['id NOT IN %(tasks)s',
'parent=%(parent)s',
'awaited=true'])
update.set(awaited=False)
update.execute()
else:
logger.warning('taskSetWait called on empty task list by parent: %s', parent)
def taskWaitCheck(self, parent):
"""Return status of awaited subtask
The return value is [finished, unfinished] where each entry
is a list of task ids."""
# check to see if any of the tasks have finished
query = QueryProcessor(tables=['task'], columns=['id', 'state'],
clauses=['parent=%(parent)s', 'awaited IS TRUE'],
values={'parent': parent})
result = query.execute()
canceled = koji.TASK_STATES['CANCELED']
closed = koji.TASK_STATES['CLOSED']
failed = koji.TASK_STATES['FAILED']
finished = []
unfinished = []
for r in result:
if r['state'] in (canceled, closed, failed):
finished.append(r['id'])
else:
unfinished.append(r['id'])
return finished, unfinished
def taskWait(self, parent):
"""Return task results or mark tasks as waited upon"""
finished, unfinished = self.taskWaitCheck(parent)
# un-await finished tasks
if finished:
finished.sort() # update in predictable order
for task_id in finished:
update = UpdateProcessor('task', clauses=['id=%(id)s'],
values={'id': task_id}, data={'awaited': False})
update.execute()
return [finished, unfinished]
def taskWaitResults(self, parent, tasks, canfail=None):
if canfail is None:
canfail = []
# If we're getting results, we're done waiting
self.taskUnwait(parent)
if tasks is None:
# Query all finished subtasks
states = tuple([koji.TASK_STATES[s]
for s in ['CLOSED', 'FAILED', 'CANCELED']])
query = QueryProcessor(tables=['task'], columns=['id'],
clauses=['parent=%(parent)s', 'state in %(states)s'],
values=locals(), opts={'asList': True})
tasks = [r[0] for r in query.execute()]
# Would use a dict, but xmlrpc requires the keys to be strings
results = []
for task_id in tasks:
task = Task(task_id)
raise_fault = (task_id not in canfail)
try:
results.append([task_id, task.getResult(raise_fault=raise_fault)])
except koji.GenericError as e:
# Asking for result of canceled task raises an error
# For canfail tasks, return error in neutral form
if not raise_fault and task.isCanceled():
f_info = {'faultCode': e.faultCode,
'faultString': str(e)}
results.append([task_id, f_info])
continue
raise
return results
def getHostTasks(self):
"""get status of open tasks assigned to host"""
host_id = self.id
# query tasks
st_open = koji.TASK_STATES['OPEN']
query = QueryProcessor(tables=['task'], columns=['id', 'waiting', 'weight'],
clauses=['host_id = %(host_id)s', 'state = %(st_open)s'],
values={'host_id': host_id, 'st_open': st_open})
tasks = query.execute()
for task in tasks:
id = task['id']
if task['waiting']:
finished, _ = self.taskWaitCheck(id)
if finished:
task['alert'] = True
return tasks
def updateHost(self, task_load, ready):
task_load = float(task_load)
update = UpdateProcessor(
'host',
data={'task_load': task_load, 'ready': ready},
rawdata={'update_time': 'NOW()'},
clauses=['id=%(id)i'],
values={'id': self.id},
)
update.execute()
def getLoadData(self):
"""Get load balancing data
This call is here for backwards compatibility.
Originally, it returned broad information about all hosts and tasks so that individual
hosts could make informed decisions about which task to take.
Now it presents only data for the calling host and the tasks that have been assigned to
it"""
host = get_host(self.id)
host['channels'] = [c['id'] for c in list_channels(hostID=self.id)]
tasks = scheduler.get_tasks_for_host(hostID=self.id, retry=True)
return [[host], tasks]
def isEnabled(self):
"""Return whether this host is enabled or not."""
query = QueryProcessor(tables=['host_config'], columns=['enabled'],
clauses=['host_id = %(id)i', 'active IS TRUE'],
values={'id': self.id})
return query.singleValue(strict=True)
class HostExports(object):
'''Contains functions that are made available via XMLRPC'''
def getID(self):
host = Host()
host.verify()
return host.id
def updateHost(self, task_load, ready, data=None):
"""Update host data
:param float task_load: current task load
:param bool ready: whether the host is ready to take a task
:param dict data: data for the scheduler
"""
host = Host()
host.verify()
host.updateHost(task_load, ready)
if data is not None:
scheduler.set_host_data(host.id, data)
def getLoadData(self):
host = Host()
host.verify()
return host.getLoadData()
def getHost(self):
"""Return information about this host"""
host = Host()
host.verify()
return get_host(host.id)
def openTask(self, task_id):
host = Host()
host.verify()
task = Task(task_id)
return task.open(host.id)
def closeTask(self, task_id, response):
host = Host()
host.verify()
task = Task(task_id)
task.assertHost(host.id)
return task.close(response)
def failTask(self, task_id, response):
host = Host()
host.verify()
task = Task(task_id)
task.assertHost(host.id)
return task.fail(response)
def freeTasks(self, tasks):
host = Host()
host.verify()
for task_id in tasks:
task = Task(task_id)
if not task.verifyHost(host.id):
# it's possible that a task was freed/reassigned since the host
# last checked, so we should not raise an error
continue
task.free()
# XXX - unfinished
# remove any files related to task
def setTaskWeight(self, task_id, weight):
host = Host()
host.verify()
task = Task(task_id)
task.assertHost(host.id)
return task.setWeight(weight)
def setHostData(self, hostdata):
"""Provide host data for the scheduler
:param dict hostdata: host data
For backwards compatibility, we also accept hostdata as a string containing a
json-encoded dictionary.
"""
host = Host()
host.verify()
if isinstance(hostdata, str):
# for backwards compatibility
hostdata = json.loads(hostdata)
scheduler.set_host_data(host.id, hostdata)
def getTasks(self):
host = Host()
host.verify()
return scheduler.get_tasks_for_host(hostID=host.id, retry=True)
def refuseTask(self, task_id, soft=True, msg=''):
soft = convert_value(soft, cast=bool)
msg = convert_value(msg, cast=str)
host = Host()
host.verify()
task = Task(task_id)
tinfo = task.getInfo(strict=True)
if tinfo['host_id'] != host.id:
logger.warning('Host %s refused unrelated task: %s', host.id, tinfo['id'])
return
scheduler.set_refusal(host.id, tinfo['id'], soft=soft, msg=msg, by_host=True)
# also free the task
task.free()
def getHostTasks(self):
host = Host()
host.verify()
return host.getHostTasks()
def taskSetWait(self, parent, tasks):
host = Host()
host.verify()
return host.taskSetWait(parent, tasks)
def taskWait(self, parent):
host = Host()
host.verify()
return host.taskWait(parent)
def taskWaitResults(self, parent, tasks, canfail=None):
host = Host()
host.verify()
return host.taskWaitResults(parent, tasks, canfail)
def subtask(self, method, arglist, parent, **opts):
host = Host()
host.verify()
ptask = Task(parent)
ptask.assertHost(host.id)
opts['parent'] = parent
if 'owner' in opts:
raise koji.ActionNotAllowed('The owner option is not allowed here')
if 'label' in opts:
# first check for existing task with this parent/label
query = QueryProcessor(tables=['task'], columns=['id'],
clauses=['parent = %(parent)s', 'label = %(label)s'],
values=opts)
task_id = query.singleValue(strict=False)
if task_id:
# return task id
return task_id
if 'kwargs' in opts:
arglist = koji.encode_args(*arglist, **opts['kwargs'])
del opts['kwargs']
return make_task(method, arglist, **opts)
def subtask2(self, __parent, __taskopts, __method, *args, **opts):
"""A wrapper around subtask with optional signature
Parameters:
__parent: task id of the parent task
__taskopts: dictionary of task options
__method: the method to be invoked
Remaining args are passed on to the subtask
"""
# self.subtask will verify the host
args = koji.encode_args(*args, **opts)
return self.subtask(__method, args, __parent, **__taskopts)
def moveBuildToScratch(self, task_id, srpm, rpms, logs=None):
"Move a completed scratch build into place (not imported)"
host = Host()
host.verify()
task = Task(task_id)
task.assertHost(host.id)
uploadpath = koji.pathinfo.work()
# verify files exist
for relpath in [srpm] + rpms:
fn = "%s/%s" % (uploadpath, relpath)
if not os.path.exists(fn):
raise koji.GenericError("No such file: %s" % fn)
rpms = check_noarch_rpms(uploadpath, rpms, logs=logs)
# figure out storage location
# <scratchdir>/<username>/task_<id>
scratchdir = koji.pathinfo.scratch()
username = get_user(task.getOwner())['name']
dir = "%s/%s/task_%s" % (scratchdir, username, task_id)
koji.ensuredir(dir)
for relpath in [srpm] + rpms:
fn = "%s/%s" % (uploadpath, relpath)
dest = "%s/%s" % (dir, os.path.basename(fn))
move_and_symlink(fn, dest)
if logs:
for key, files in logs.items():
if key:
logdir = "%s/logs/%s" % (dir, key)
else:
logdir = "%s/logs" % dir
koji.ensuredir(logdir)
for relpath in files:
fn = "%s/%s" % (uploadpath, relpath)
dest = "%s/%s" % (logdir, os.path.basename(fn))
move_and_symlink(fn, dest)
def moveMavenBuildToScratch(self, task_id, results, rpm_results):
"Move a completed Maven scratch build into place (not imported)"
if not context.opts.get('EnableMaven'):
raise koji.GenericError('Maven support not enabled')
host = Host()
host.verify()
task = Task(task_id)
task.assertHost(host.id)
scratchdir = koji.pathinfo.scratch()
username = get_user(task.getOwner())['name']
destdir = joinpath(scratchdir, username, 'task_%s' % task_id)
for reldir, files in list(results['files'].items()) + [('', results['logs'])]:
for filename in files:
if reldir:
relpath = joinpath(reldir, filename)
else:
relpath = filename
src = joinpath(koji.pathinfo.task(results['task_id']), relpath)
dest = joinpath(destdir, relpath)
move_and_symlink(src, dest, create_dir=True)
if rpm_results:
for relpath in [rpm_results['srpm']] + rpm_results['rpms'] + \
rpm_results['logs']:
src = joinpath(koji.pathinfo.task(rpm_results['task_id']),
relpath)
dest = joinpath(destdir, 'rpms', relpath)
move_and_symlink(src, dest, create_dir=True)
def moveWinBuildToScratch(self, task_id, results, rpm_results):
"Move a completed Windows scratch build into place (not imported)"
if not context.opts.get('EnableWin'):
raise koji.GenericError('Windows support not enabled')
host = Host()
host.verify()
task = Task(task_id)
task.assertHost(host.id)
scratchdir = koji.pathinfo.scratch()
username = get_user(task.getOwner())['name']
destdir = joinpath(scratchdir, username, 'task_%s' % task_id)
for relpath in list(results['output'].keys()) + results['logs']:
filename = joinpath(koji.pathinfo.task(results['task_id']), relpath)
dest = joinpath(destdir, relpath)
move_and_symlink(filename, dest, create_dir=True)
if rpm_results:
for relpath in [rpm_results['srpm']] + rpm_results['rpms'] + \
rpm_results['logs']:
filename = joinpath(koji.pathinfo.task(rpm_results['task_id']),
relpath)
dest = joinpath(destdir, 'rpms', relpath)
move_and_symlink(filename, dest, create_dir=True)
def moveImageBuildToScratch(self, task_id, results):
"""move a completed image scratch build into place"""
convert_value(results, cast=dict, check_only=True)
host = Host()
host.verify()
task = Task(task_id)
task.assertHost(host.id)
logger.debug('scratch image results: %s' % results)
for sub_results in results.values():
if 'task_id' not in sub_results:
logger.warning('Task %s failed, no image available' % task_id)
continue
workdir = koji.pathinfo.task(sub_results['task_id'])
scratchdir = koji.pathinfo.scratch()
username = get_user(task.getOwner())['name']
destdir = joinpath(scratchdir, username,
'task_%s' % sub_results['task_id'])
for img in sub_results['files'] + sub_results['logs']:
src = joinpath(workdir, img)
dest = joinpath(destdir, img)
logger.debug('renaming %s to %s' % (src, dest))
move_and_symlink(src, dest, create_dir=True)
if 'rpmresults' in sub_results:
rpm_results = sub_results['rpmresults']
for relpath in [rpm_results['srpm']] + rpm_results['rpms'] + \
rpm_results['logs']:
src = joinpath(koji.pathinfo.task(
rpm_results['task_id']), relpath)
dest = joinpath(destdir, 'rpms', relpath)
move_and_symlink(src, dest, create_dir=True)
def initBuild(self, data):
"""Create a stub (rpm) build entry.
This is done at the very beginning of the build to inform the
system the build is underway.
This function is only called for rpm builds, other build types
have their own init function
"""
host = Host()
host.verify()
# sanity checks
task = Task(data['task_id'])
task.assertHost(host.id)
# prep the data
data['owner'] = task.getOwner()
data['state'] = koji.BUILD_STATES['BUILDING']
data['completion_time'] = None
build_id = new_build(data)
binfo = get_build(build_id, strict=True)
new_typed_build(binfo, 'rpm')
return build_id
def completeBuild(self, task_id, build_id, srpm, rpms, brmap=None, logs=None):
"""Import final build contents into the database"""
# sanity checks
host = Host()
host.verify()
task = Task(task_id)
task.assertHost(host.id)
result = import_build(srpm, rpms, brmap, task_id, build_id, logs=logs)
build_notification(task_id, build_id)
return result
def completeImageBuild(self, task_id, build_id, results):
"""Set an image build to the COMPLETE state"""
host = Host()
host.verify()
task = Task(task_id)
task.assertHost(host.id)
build_info = get_build(build_id, strict=True)
# check volume policy
policy_data = {
'build': build_info,
'package': build_info['name'],
'import': True,
'import_type': 'image',
}
policy_data.update(policy_data_from_task(task_id))
vol = check_volume_policy(policy_data, strict=False, default='DEFAULT')
if vol['id'] != build_info['volume_id']:
build_info['volume_id'] = vol['id']
build_info['volume_name'] = vol['name']
update = UpdateProcessor('build', clauses=['id=%(build_id)i'],
values={'build_id': build_id})
update.set(volume_id=build_info['volume_id'])
update.execute()
self.importImage(task_id, build_info, results)
ensure_volume_symlink(build_info)
st_old = build_info['state']
st_complete = koji.BUILD_STATES['COMPLETE']
koji.plugin.run_callbacks('preBuildStateChange',
attribute='state', old=st_old, new=st_complete, info=build_info)
update = UpdateProcessor('build', clauses=['id=%(build_id)i'],
values={'build_id': build_id})
update.set(id=build_id, state=st_complete)
update.rawset(completion_time='now()')
update.execute()
build_info = get_build(build_id, strict=True)
koji.plugin.run_callbacks('postBuildStateChange',
attribute='state', old=st_old, new=st_complete, info=build_info)
# send email
build_notification(task_id, build_id)
def initMavenBuild(self, task_id, build_info, maven_info):
"""Create a new in-progress Maven build
Synthesize the release number by taking the (integer) release of the
last successful build and incrementing it."""
if not context.opts.get('EnableMaven'):
raise koji.GenericError("Maven support not enabled")
host = Host()
host.verify()
task = Task(task_id)
task.assertHost(host.id)
# ensure release is None so get_next_build will handle incrementing
build_info['release'] = None
data = build_info.copy()
data['task_id'] = task_id
data['owner'] = task.getOwner()
data['state'] = koji.BUILD_STATES['BUILDING']
data['completion_time'] = None
build_id = get_next_build(data)
data['id'] = build_id
new_maven_build(data, maven_info)
return data
def createMavenBuild(self, build_info, maven_info):
"""
Associate Maven metadata with an existing build. Used
by the rpm2maven plugin.
"""
host = Host()
host.verify()
if not context.opts.get('EnableMaven'):
raise koji.GenericError("Maven support not enabled")
new_maven_build(build_info, maven_info)
def completeMavenBuild(self, task_id, build_id, maven_results, rpm_results):
"""Complete the Maven build."""
if not context.opts.get('EnableMaven'):
raise koji.GenericError("Maven support not enabled")
host = Host()
host.verify()
task = Task(task_id)
task.assertHost(host.id)
build_info = get_build(build_id, strict=True)
maven_info = get_maven_build(build_id, strict=True)
# check volume policy
vol_update = False
policy_data = {
'build': build_info,
'package': build_info['name'],
'import': True,
'import_type': 'maven',
}
policy_data.update(policy_data_from_task(task_id))
vol = check_volume_policy(policy_data, strict=False, default='DEFAULT')
if vol['id'] != build_info['volume_id']:
build_info['volume_id'] = vol['id']
build_info['volume_name'] = vol['name']
vol_update = True
# import the build output
maven_task_id = maven_results['task_id']
maven_buildroot_id = maven_results['buildroot_id']
maven_task_dir = koji.pathinfo.task(maven_task_id)
for relpath, files in maven_results['files'].items():
dir_maven_info = maven_info
poms = [f for f in files if f.endswith('.pom')]
if len(poms) == 0:
pass
elif len(poms) == 1:
# This directory has a .pom file, so get the Maven group_id,
# artifact_id, and version from it and associate those with
# the artifacts in this directory
pom_path = joinpath(maven_task_dir, relpath, poms[0])
pom_info = koji.parse_pom(pom_path)
dir_maven_info = koji.pom_to_maven_info(pom_info)
else:
raise koji.BuildError('multiple .pom files in %s: %s' % (relpath, ', '.join(poms)))
for filename in files:
if os.path.splitext(filename)[1] in ('.md5', '.sha1'):
# metadata, we'll recreate that ourselves
continue
filepath = joinpath(maven_task_dir, relpath, filename)
if filename == 'maven-metadata.xml':
# We want the maven-metadata.xml to be present in the build dir
# so that it's a valid Maven repo, but we don't want to track it
# in the database because we regenerate it when creating tag repos.
# So we special-case it here.
destdir = joinpath(koji.pathinfo.mavenbuild(build_info),
relpath)
_import_archive_file(filepath, destdir)
_generate_maven_metadata(destdir)
continue
archivetype = get_archive_type(filename)
if not archivetype:
# Unknown archive type, fail the build
raise koji.BuildError('unsupported file type: %s' % filename)
import_archive(filepath, build_info, 'maven', dir_maven_info, maven_buildroot_id)
# move the logs to their final destination
for log_path in maven_results['logs']:
import_build_log(joinpath(maven_task_dir, log_path),
build_info, subdir='maven')
ensure_volume_symlink(build_info)
if rpm_results:
_import_wrapper(rpm_results['task_id'], build_info, rpm_results)
# update build state
st_complete = koji.BUILD_STATES['COMPLETE']
st_old = build_info['state']
koji.plugin.run_callbacks('preBuildStateChange',
attribute='state', old=st_old, new=st_complete, info=build_info)
update = UpdateProcessor('build', clauses=['id=%(build_id)i'],
values={'build_id': build_id})
update.set(state=st_complete)
if vol_update:
update.set(volume_id=build_info['volume_id'])
update.rawset(completion_time='now()')
update.execute()
build_info = get_build(build_id, strict=True)
koji.plugin.run_callbacks('postBuildStateChange',
attribute='state', old=st_old, new=st_complete, info=build_info)
# send email
build_notification(task_id, build_id)
def importArchive(self, filepath, buildinfo, type, typeInfo):
"""
Import an archive file and associate it with a build. The archive can
be any non-rpm filetype supported by Koji. Used by the rpm2maven plugin.
"""
host = Host()
host.verify()
if type == 'maven':
if not context.opts.get('EnableMaven'):
raise koji.GenericError('Maven support not enabled')
elif type == 'win':
if not context.opts.get('EnableWin'):
raise koji.GenericError('Windows support not enabled')
else:
raise koji.GenericError('unsupported archive type: %s' % type)
import_archive(filepath, buildinfo, type, typeInfo)
def importWrapperRPMs(self, task_id, build_id, rpm_results):
"""Import the wrapper rpms and associate them with the given build. The build
must not have any existing rpms associated with it."""
if not context.opts.get('EnableMaven'):
raise koji.GenericError("Maven support not enabled")
host = Host()
host.verify()
task = Task(task_id)
task.assertHost(host.id)
build_info = get_build(build_id, strict=True)
if build_info['state'] != koji.BUILD_STATES['COMPLETE']:
raise koji.GenericError(
'cannot import wrapper rpms for %s: build state is %s, not complete' %
(koji.buildLabel(build_info), koji.BUILD_STATES[build_info['state']].lower()))
if list_rpms(buildID=build_info['id']):
# don't allow overwriting of already-imported wrapper RPMs
raise koji.GenericError('wrapper rpms for %s have already been imported' %
koji.buildLabel(build_info))
_import_wrapper(task.id, build_info, rpm_results)
def initImageBuild(self, task_id, build_info):
"""create a new in-progress image build"""
host = Host()
host.verify()
task = Task(task_id)
task.assertHost(host.id)
data = build_info.copy()
data['task_id'] = task_id
data['owner'] = task.getOwner()
data['state'] = koji.BUILD_STATES['BUILDING']
data['completion_time'] = None
build_id = get_next_build(data)
data['id'] = build_id
new_image_build(data)
return data
def initWinBuild(self, task_id, build_info, win_info):
"""
Create a new in-progress Windows build.
"""
if not context.opts.get('EnableWin'):
raise koji.GenericError('Windows support not enabled')
host = Host()
host.verify()
# sanity checks
task = Task(task_id)
task.assertHost(host.id)
# build_info must contain name, version, and release
data = build_info.copy()
data['task_id'] = task_id
data['owner'] = task.getOwner()
data['state'] = koji.BUILD_STATES['BUILDING']
data['completion_time'] = None
build_id = new_build(data)
data['id'] = build_id
new_win_build(data, win_info)
return data
def completeWinBuild(self, task_id, build_id, results, rpm_results):
"""Complete a Windows build"""
if not context.opts.get('EnableWin'):
raise koji.GenericError('Windows support not enabled')
host = Host()
host.verify()
task = Task(task_id)
task.assertHost(host.id)
build_info = get_build(build_id, strict=True)
get_win_build(build_id, strict=True) # raise exception if not found.
# check volume policy
vol_update = False
policy_data = {
'build': build_info,
'package': build_info['name'],
'import': True,
'import_type': 'win',
}
policy_data.update(policy_data_from_task(task_id))
vol = check_volume_policy(policy_data, strict=False, default='DEFAULT')
if vol['id'] != build_info['volume_id']:
build_info['volume_id'] = vol['id']
build_info['volume_name'] = vol['name']
vol_update = True
task_dir = koji.pathinfo.task(results['task_id'])
# import the build output
for relpath, metadata in results['output'].items():
archivetype = get_archive_type(relpath)
if not archivetype:
# Unknown archive type, fail the build
raise koji.BuildError('unsupported file type: %s' % relpath)
filepath = joinpath(task_dir, relpath)
metadata['relpath'] = os.path.dirname(relpath)
import_archive(filepath, build_info, 'win', metadata,
buildroot_id=results['buildroot_id'])
# move the logs to their final destination
for relpath in results['logs']:
subdir = 'win'
reldir = os.path.dirname(relpath)
if reldir:
subdir = joinpath(subdir, reldir)
import_build_log(joinpath(task_dir, relpath),
build_info, subdir=subdir)
ensure_volume_symlink(build_info)
if rpm_results:
_import_wrapper(rpm_results['task_id'], build_info, rpm_results)
# update build state
st_old = build_info['state']
st_complete = koji.BUILD_STATES['COMPLETE']
koji.plugin.run_callbacks('preBuildStateChange',
attribute='state', old=st_old, new=st_complete, info=build_info)
update = UpdateProcessor('build', clauses=['id=%(build_id)i'],
values={'build_id': build_id})
update.set(state=st_complete)
if vol_update:
update.set(volume_id=build_info['volume_id'])
update.rawset(completion_time='now()')
update.execute()
build_info = get_build(build_id, strict=True)
koji.plugin.run_callbacks('postBuildStateChange',
attribute='state', old=st_old, new=st_complete, info=build_info)
# send email
build_notification(task_id, build_id)
def failBuild(self, task_id, build_id):
"""Mark the build as failed. If the current state is not
'BUILDING', or the current completion_time is not null, a
GenericError will be raised."""
host = Host()
host.verify()
task = Task(task_id)
task.assertHost(host.id)
st_failed = koji.BUILD_STATES['FAILED']
buildinfo = get_build(build_id, strict=True)
st_old = buildinfo['state']
koji.plugin.run_callbacks('preBuildStateChange',
attribute='state', old=st_old, new=st_failed, info=buildinfo)
query = QueryProcessor(tables=['build'], columns=['state', 'completion_time'],
clauses=['id = %(build_id)i'], values={'build_id': build_id},
opts={'rowlock': True})
result = query.executeOne()
if result['state'] != koji.BUILD_STATES['BUILDING']:
raise koji.GenericError('cannot update build %i, state: %s' %
(build_id, koji.BUILD_STATES[result['state']]))
elif result['completion_time'] is not None:
raise koji.GenericError('cannot update build %i, completed at %s' %
(build_id, result['completion_time']))
update = UpdateProcessor('build', values={'build_id': build_id},
clauses=['id = %(build_id)i'],
data={'state': st_failed},
rawdata={'completion_time': 'NOW()'})
update.execute()
buildinfo = get_build(build_id, strict=True)
koji.plugin.run_callbacks('postBuildStateChange',
attribute='state', old=st_old, new=st_failed, info=buildinfo)
build_notification(task_id, build_id)
def tagBuild(self, task_id, tag, build, force=False, fromtag=None):
"""Tag a build (host version)
This tags as the user who owns the task
If fromtag is specified, also untag the package (i.e. move in a single
transaction)
No return value
"""
host = Host()
host.verify()
task = Task(task_id)
task.assertHost(host.id)
build = get_build(build, strict=True)
pkg_id = build['package_id']
tag_id = get_tag(tag, strict=True)['id']
user_id = task.getOwner()
if fromtag and not isinstance(fromtag, str):
fromtag = get_tag(fromtag, strict=True)['name']
policy_data = {'tag': tag, 'build': build, 'fromtag': fromtag}
policy_data['user_id'] = user_id
if fromtag is None:
policy_data['operation'] = 'tag'
else:
policy_data['operation'] = 'move'
# don't check policy for admins using force
assert_policy('tag', policy_data, force=force)
# package list check
pkgs = readPackageList(tagID=tag_id, pkgID=pkg_id, inherit=True, with_owners=False)
pkg_error = None
if pkg_id not in pkgs:
pkg_error = "Package %s not in list for %s" % (build['name'], tag)
elif pkgs[pkg_id]['blocked']:
pkg_error = "Package %s blocked in %s" % (build['name'], tag)
if pkg_error:
if force and context.session.hasPerm('admin'):
pkglist_add(tag_id, pkg_id, force=True, block=False)
logger.info("Package added %s/%s by %s by force" % (
tag, build['nvr'], context.session.user_data['name']))
else:
raise koji.TagError(pkg_error)
# do the actual work now
if fromtag:
_untag_build(fromtag, build, user_id=user_id, force=force, strict=True)
_tag_build(tag, build, user_id=user_id, force=force)
def importImage(self, task_id, build_info, results):
"""
Import a built image, populating the database with metadata and
moving the image to its final location.
"""
for sub_results in results.values():
if 'task_id' not in sub_results:
logger.warning('Task %s failed, no image available' % task_id)
continue
importImageInternal(task_id, build_info, sub_results)
if 'rpmresults' in sub_results:
rpm_results = sub_results['rpmresults']
# draft will be rejected
_import_wrapper(rpm_results['task_id'],
get_build(build_info['id'], strict=True), rpm_results)
def tagNotification(self, is_successful, tag_id, from_id, build_id, user_id,
ignore_success=False, failure_msg=''):
"""Create a tag notification message.
Handles creation of tagNotification tasks for hosts."""
host = Host()
host.verify()
tag_notification(is_successful, tag_id, from_id, build_id, user_id, ignore_success,
failure_msg)
def checkPolicy(self, name, data, default='deny', strict=False):
host = Host()
host.verify()
return check_policy(name, data, default=default, strict=strict)
def assertPolicy(self, name, data, default='deny'):
host = Host()
host.verify()
check_policy(name, data, default=default, strict=True)
def evalPolicy(self, name, data):
"""Evaluate named policy with given data and return the result"""
host = Host()
host.verify()
return eval_policy(name, data)
def newBuildRoot(self, repo, arch, task_id=None):
host = Host()
host.verify()
if task_id is not None:
Task(task_id).assertHost(host.id)
br = BuildRoot()
return br.new(host.id, repo, arch, task_id=task_id)
def setBuildRootState(self, brootid, state, task_id=None):
host = Host()
host.verify()
if task_id is not None:
Task(task_id).assertHost(host.id)
br = BuildRoot(brootid)
br.assertHost(host.id)
if task_id is not None:
br.assertTask(task_id)
return br.setState(state)
def setBuildRootList(self, brootid, rpmlist, task_id=None):
host = Host()
host.verify()
if task_id is not None:
Task(task_id).assertHost(host.id)
br = BuildRoot(brootid)
br.assertHost(host.id)
if task_id is not None:
br.assertTask(task_id)
return br.setList(rpmlist)
def updateBuildRootList(self, brootid, rpmlist, task_id=None):
host = Host()
host.verify()
if task_id is not None:
Task(task_id).assertHost(host.id)
br = BuildRoot(brootid)
br.assertHost(host.id)
if task_id is not None:
br.assertTask(task_id)
return br.updateList(rpmlist)
def updateBuildrootArchives(self, brootid, task_id, archives, project=False):
host = Host()
host.verify()
Task(task_id).assertHost(host.id)
br = BuildRoot(brootid)
br.assertHost(host.id)
br.assertTask(task_id)
return br.updateArchiveList(archives, project)
def updateMavenBuildRootList(self, brootid, task_id, mavenlist, ignore=None, project=False,
ignore_unknown=False, extra_deps=None):
if not context.opts.get('EnableMaven'):
raise koji.GenericError("Maven support not enabled")
host = Host()
host.verify()
Task(task_id).assertHost(host.id)
br = BuildRoot(brootid)
br.assertHost(host.id)
br.assertTask(task_id)
repo = repo_info(br.data['repo_id'], strict=True)
tag = get_tag(repo['tag_id'], strict=True)
maven_build_index = {}
# Index the maven_tag_archives result by group_id:artifact_id:version
# The function ensures that each g:a:v maps to a single build id.
# The generator returned by maven_tag_archives can create a lot of data,
# but this index will only consume a fraction of that.
for archive in maven_tag_archives(tag['id'], event_id=repo['create_event']):
# unfortunately pgdb does not appear to intern strings, but still
# better not to create any new ones
idx_build = \
maven_build_index.setdefault(
archive['group_id'], {}).setdefault(
archive['artifact_id'], {}).setdefault(
archive['version'], archive['build_id'])
if idx_build != archive['build_id']:
logger.error(
"Found multiple builds for %(group_id)s:%(artifact_id)s:%(version)s. "
"Current build: %(build_id)i", archive)
logger.error("Indexed build id was %i", idx_build)
if not ignore:
ignore = []
if not extra_deps:
extra_deps = []
task_deps = {}
for dep in extra_deps:
if isinstance(dep, int):
task_output = list_task_output(dep, stat=True)
for filepath, filestats in task_output.items():
if os.path.splitext(filepath)[1] in ['.log', '.md5', '.sha1']:
continue
tokens = filepath.split('/')
if len(tokens) < 4:
# should never happen in a Maven repo
continue
filename = tokens.pop()
maven_info = {}
maven_info['version'] = tokens.pop()
maven_info['artifact_id'] = tokens.pop()
maven_info['group_id'] = '.'.join(tokens)
maven_label = koji.mavenLabel(maven_info)
fileinfo = {'filename': filename,
'size': int(filestats['st_size'])}
if maven_label in task_deps:
task_deps[maven_label]['files'].append(fileinfo)
else:
task_deps[maven_label] = {'maven_info': maven_info,
'files': [fileinfo]}
else:
build = get_build(dep, strict=True)
for archive in list_archives(buildID=build['id'], type='maven'):
idx_build = \
maven_build_index.setdefault(
archive['group_id'], {}).setdefault(
archive['artifact_id'], {}).setdefault(
archive['version'], archive['build_id'])
if idx_build != archive['build_id']:
logger.error(
"Overriding build for %(group_id)s:%(artifact_id)s:%(version)s.",
archive)
logger.error(
"Current build is %s, new build is %s.",
idx_build, archive['build_id'])
maven_build_index[
archive['group_id']
][
archive['artifact_id']
][
archive['version']
] = archive['build_id']
ignore.extend(task_deps.values())
SNAPSHOT_RE = re.compile(r'-\d{8}\.\d{6}-\d+')
ignore_by_label = {}
for entry in ignore:
ignore_info = entry['maven_info']
ignore_label = koji.mavenLabel(ignore_info)
if ignore_label not in ignore_by_label:
ignore_by_label[ignore_label] = {}
for fileinfo in entry['files']:
filename = fileinfo['filename']
ignore_by_label[ignore_label][filename] = fileinfo
if SNAPSHOT_RE.search(filename):
# the task output snapshot versions, which means the
# local repo will contain the same file with both
# -SNAPSHOT and -{timestamp} in the name
snapname = SNAPSHOT_RE.sub('-SNAPSHOT', filename)
ignore_by_label[ignore_label][snapname] = fileinfo
archives = []
for entry in mavenlist:
maven_info = entry['maven_info']
maven_label = koji.mavenLabel(maven_info)
ignore_archives = ignore_by_label.get(maven_label, {})
build_id = maven_build_index.get(
maven_info['group_id'], {}).get(
maven_info['artifact_id'], {}).get(
maven_info['version'])
if not build_id:
if not ignore_unknown:
# just warn for now. might be in ignore list. the loop below will check.
logger.warning('Unmatched maven g:a:v in build environment: '
'%(group_id)s:%(artifact_id)s:%(version)s', maven_info)
build_archives = {}
else:
tinfo = dslice(maven_info, ['group_id', 'artifact_id', 'version'])
build_archives = list_archives(buildID=build_id, type='maven', typeInfo=tinfo)
# index by filename
build_archives = dict([(a['filename'], a) for a in build_archives])
for fileinfo in entry['files']:
ignore_archive = ignore_archives.get(fileinfo['filename'])
tag_archive = build_archives.get(fileinfo['filename'])
if tag_archive and fileinfo['size'] == tag_archive['size']:
archives.append(tag_archive)
elif ignore_archive and fileinfo['size'] == ignore_archive['size']:
pass
else:
if not ignore_unknown:
logger.error("No such file for %(group_id)s:%(artifact_id)s:%(version)s",
maven_info)
if build_id:
build = get_build(build_id)
logger.error("g:a:v supplied by build %(nvr)s", build)
logger.error("Build supplies %i archives: %r",
len(build_archives), list(build_archives.keys()))
if tag_archive:
logger.error("Size mismatch, br: %i, db: %i",
fileinfo['size'], tag_archive['size'])
raise koji.BuildrootError(
'No such file in build environment: %s, size: %s' %
('%s/%s' % (fileinfo['path'], fileinfo['filename']), fileinfo['size']))
return br.updateArchiveList(archives, project)
def repoInit(self, tag, task_id=None, event=None, opts=None):
"""Initialize a new repo for tag"""
host = Host()
host.verify()
return repo_init(tag, task_id=task_id, event=event, opts=opts)
def repoDone(self, repo_id, data, expire=False, repo_json_updates=None):
"""Finalize a repo
:param int repo_id: the id of the repo
:param dict data: a dictionary of repo files in the form:
:param bool expire: (legacy) if true, mark repo expired
:param dict repo_json_updates: updates for repo.json file
The data parameter should be of the form:
{ arch: [uploadpath, [file1, file2, ...]], ...}
Actions:
* Move uploaded repo files into place
* Mark repo ready (or expired)
* Move/create 'latest' symlink if appropriate
For dist repos, the move step is skipped (that is handled in
distRepoMove).
"""
host = Host()
host.verify()
rinfo = repo_info(repo_id, strict=True)
convert_value(data, cast=dict, check_only=True)
koji.plugin.run_callbacks('preRepoDone', repo=rinfo, data=data, expire=expire)
if rinfo['state'] != koji.REPO_INIT:
raise koji.GenericError("Repo %(id)s not in INIT state (got %(state)s)" % rinfo)
repodir = koji.pathinfo.repo(repo_id, rinfo['tag_name'])
workdir = koji.pathinfo.work()
if repo_json_updates:
repo_json = koji.load_json(f'{repodir}/repo.json')
repo_json.update(repo_json_updates)
koji.dump_json(f'{repodir}/repo.json', repo_json, indent=2)
if not rinfo['dist']:
for arch, (uploadpath, files) in data.items():
archdir = "%s/%s" % (repodir, koji.canonArch(arch))
if not os.path.isdir(archdir):
raise koji.GenericError("Repo arch directory missing: %s" % archdir)
datadir = "%s/repodata" % archdir
koji.ensuredir(datadir)
for fn in files:
src = "%s/%s/%s" % (workdir, uploadpath, fn)
if fn.endswith('pkglist'):
dst = '%s/%s' % (archdir, fn)
else:
dst = "%s/%s" % (datadir, fn)
if not os.path.exists(src):
raise koji.GenericError("uploaded file missing: %s" % src)
safer_move(src, dst)
if expire:
logger.warning("expire option for repoDone call is deprecated")
repo_expire(repo_id)
koji.plugin.run_callbacks('postRepoDone', repo=rinfo, data=data, expire=expire)
return
repo_ready(repo_id)
repos.symlink_if_latest(rinfo)
koji.plugin.run_callbacks('postRepoDone', repo=rinfo, data=data, expire=expire)
def distRepoMove(self, repo_id, uploadpath, arch):
"""
Move one arch of a dist repo into its final location
Unlike normal repos, dist repos have all their content linked (or
copied) into place.
repo_id - the repo to move
uploadpath - where the uploaded files are
arch - the arch of the repo
uploadpath should contain a repo_manifest file
The uploaded files should include:
- kojipkgs: json file with information about the component rpms
- repo metadata files
"""
host = Host()
host.verify()
workdir = koji.pathinfo.work()
rinfo = repo_info(repo_id, strict=True)
repodir = koji.pathinfo.distrepo(repo_id, rinfo['tag_name'])
# Note: if repo is on a different volume then repodir should be a
# valid symlink and this function should still do the right thing
archdir = "%s/%s" % (repodir, koji.canonArch(arch))
if not os.path.isdir(archdir):
raise koji.GenericError("Repo arch directory missing: %s" % archdir)
repo_state = koji.REPO_STATES[rinfo['state']]
if repo_state != 'INIT':
raise koji.GenericError('Repo is in state: %s' % repo_state)
# read manifest
fn = '%s/%s/repo_manifest' % (workdir, uploadpath)
if not os.path.isfile(fn):
raise koji.GenericError('Missing repo manifest')
files = koji.load_json(fn)
# Read package data
fn = '%s/%s/kojipkgs' % (workdir, uploadpath)
if not os.path.isfile(fn):
raise koji.GenericError('Missing kojipkgs file')
kojipkgs = koji.load_json(fn)
# Figure out where to send the uploaded files
file_moves = []
for relpath in files:
src = "%s/%s/%s" % (workdir, uploadpath, relpath)
dst = "%s/%s" % (archdir, relpath)
if not os.path.exists(src):
raise koji.GenericError("uploaded file missing: %s" % src)
file_moves.append([src, dst])
# get rpms
build_dirs = {}
rpmdata = {}
rpm_check_keys = ['name', 'version', 'release', 'arch', 'epoch',
'size', 'payloadhash', 'build_id']
for bnp in kojipkgs:
rpminfo = kojipkgs[bnp]
rpm_id = rpminfo['id']
sigkey = rpminfo['sigkey']
_rpminfo = get_rpm(rpm_id, strict=True)
for key in rpm_check_keys:
if key not in rpminfo or rpminfo[key] != _rpminfo[key]:
raise koji.GenericError(
'kojipkgs entry does not match db: file %s, key %s'
% (bnp, key))
if sigkey is None or sigkey == '':
relpath = koji.pathinfo.rpm(rpminfo)
else:
relpath = koji.pathinfo.signed(rpminfo, sigkey)
rpminfo['_relpath'] = relpath
if rpminfo['build_id'] in build_dirs:
builddir = build_dirs[rpminfo['build_id']]
else:
binfo = get_build(rpminfo['build_id'])
builddir = koji.pathinfo.build(binfo)
build_dirs[rpminfo['build_id']] = builddir
rpminfo['_fullpath'] = joinpath(builddir, relpath)
rpmdata[bnp] = rpminfo
# move the uploaded files
dirnames = set([os.path.dirname(fm[1]) for fm in file_moves])
for dirname in dirnames:
koji.ensuredir(dirname)
for src, dst in file_moves:
safer_move(src, dst)
# hardlink or copy the rpms into the final repodir
# TODO: properly consider split-volume functionality
for fn in rpmdata:
rpminfo = rpmdata[fn]
rpmpath = rpminfo['_fullpath']
bnp = fn
bnplet = bnp[0].lower()
ddir = joinpath(archdir, 'Packages', bnplet)
koji.ensuredir(ddir)
l_dst = joinpath(ddir, bnp)
if os.path.exists(l_dst):
raise koji.GenericError("File already in repo: %s", l_dst)
logger.debug("os.link(%r, %r)", rpmpath, l_dst)
try:
os.link(rpmpath, l_dst)
except OSError as ose:
if ose.errno == 18:
shutil.copy2(rpmpath, l_dst)
else:
raise
def isEnabled(self):
host = Host()
host.verify()
return host.isEnabled()
def writeSignedRPM(self, an_rpm, sigkey, force=False):
"""Write a signed copy of the rpm"""
return write_signed_rpm(an_rpm, sigkey, force)
def get_upload_path(reldir, name, create=False, volume=None):
orig_reldir = reldir
orig_name = name
# lots of sanity checks
d, name = os.path.split(name)
if d or name.startswith('.'):
raise koji.GenericError("Invalid upload filename: %s" % orig_name)
reldir = os.path.normpath(reldir)
if not reldir or reldir.startswith('..'):
raise koji.GenericError("Invalid upload directory: %s" % orig_reldir)
if volume is not None:
# make sure the volume is valid
lookup_name('volume', volume, strict=True)
parts = reldir.split('/')
check_user = True
if create and parts[0] == "tasks":
if len(parts) < 3:
raise koji.GenericError("Invalid task upload directory: %s" % orig_reldir)
try:
task_id = int(parts[2])
except ValueError:
raise koji.GenericError("Invalid task upload directory: %s" % orig_reldir)
# only the host running this task may write here
host = Host()
host.verify()
Task(task_id).assertHost(host.id)
check_user = False
udir = joinpath(koji.pathinfo.work(volume=volume), reldir)
if create:
koji.ensuredir(udir)
if check_user:
# assuming login was asserted earlier
u_fn = joinpath(udir, '.user')
if os.path.exists(u_fn):
user_id = int(open(u_fn, 'rt').read())
if context.session.user_id != user_id:
raise koji.GenericError("Invalid upload directory, not owner: %s" %
orig_reldir)
else:
with open(u_fn, 'wt') as fo:
fo.write(str(context.session.user_id))
return joinpath(udir, name)
def get_verify_class(verify):
if verify == 'md5':
return md5_constructor
elif verify == 'adler32':
return koji.util.adler32_constructor
elif verify == 'sha256':
return hashlib.sha256
elif verify:
raise koji.GenericError("Unsupported verify type: %s" % verify)
else:
return None
def handle_upload(environ):
"""Handle file upload via POST request"""
logger = logging.getLogger('koji.upload')
start = time.time()
if not context.session.logged_in:
raise koji.ActionNotAllowed('you must be logged-in to upload a file')
args = parse_qs(environ.get('QUERY_STRING', ''), strict_parsing=True)
# XXX - already parsed by auth
name = args['filename'][0]
path = args.get('filepath', ('',))[0]
verify = args.get('fileverify', ('',))[0]
overwrite = args.get('overwrite', ('',))[0]
offset = args.get('offset', ('0',))[0]
offset = int(offset)
volume = args.get('volume', ('DEFAULT',))[0]
fn = get_upload_path(path, name, create=True, volume=volume)
if os.path.exists(fn):
if not os.path.isfile(fn):
raise koji.GenericError("destination not a file: %s" % fn)
if offset == 0 and not overwrite:
raise koji.GenericError("upload path exists: %s" % fn)
chksum = get_verify_class(verify)()
size = 0
inf = environ['wsgi.input']
fd = os.open(fn, os.O_RDWR | os.O_CREAT, 0o666)
try:
try:
fcntl.lockf(fd, fcntl.LOCK_EX | fcntl.LOCK_NB)
except IOError as e:
raise koji.LockError(e)
if offset == -1:
offset = os.lseek(fd, 0, 2)
else:
os.ftruncate(fd, offset)
os.lseek(fd, offset, 0)
while True:
try:
chunk = inf.read(65536)
except OSError as e:
str_e = str(e)
logger.error(f"Error reading upload. Offset {offset}+{size}, path {fn}")
if 'timeout' in str_e:
logger.exception("Timed out reading input stream. "
f"Content-Length: {context.environ.get('CONTENT_LENGTH')}")
raise RequestTimeout(str_e)
else:
logger.exception("Error reading input stream. "
f"Content-Length: {context.environ.get('CONTENT_LENGTH')}")
raise BadRequest(str_e)
if not chunk:
break
size += len(chunk)
if verify:
chksum.update(chunk)
os.write(fd, chunk)
finally:
# this will also remove our lock
os.close(fd)
ret = {
'size': size,
'fileverify': verify,
'offset': offset,
}
if verify:
# unsigned 32bit - could be too big for xmlrpc
ret['hexdigest'] = chksum.hexdigest()
logger.debug("Upload result: %r", ret)
logger.info("Completed upload for session %s (#%s): %f seconds, %i bytes, %s",
context.session.id, context.session.callnum,
time.time() - start, size, fn)
return ret
def verify_name_internal(name):
if not isinstance(name, str):
raise koji.GenericError("Name should be string")
max_name_length_internal = context.opts['MaxNameLengthInternal']
if max_name_length_internal != 0 and len(name) > max_name_length_internal:
raise koji.GenericError("Name %s is too long. Max length is %s characters"
% (name, max_name_length_internal))
if context.opts.get('RegexNameInternal.compiled'):
regex_name_internal_compiled = context.opts['RegexNameInternal.compiled']
if not regex_name_internal_compiled.match(name):
raise koji.GenericError("Name %s does not match RegexNameInternal value" % name)
def verify_name_user(name=None, krb=None):
if name and not isinstance(name, str):
raise koji.GenericError("Name should be string")
if krb and not isinstance(krb, str):
raise koji.GenericError("Kerberos principal should be string")
max_name_length_internal = context.opts['MaxNameLengthInternal']
if max_name_length_internal != 0:
if name and len(name) > max_name_length_internal:
raise koji.GenericError("Name %s is too long. Max length is %s characters"
% (name, max_name_length_internal))
if krb and len(krb) > max_name_length_internal:
raise koji.GenericError("Kerberos principal %s is too long. Max length is "
"%s characters" % (krb, max_name_length_internal))
if context.opts.get('RegexUserName.compiled'):
regex_user_name_compiled = context.opts['RegexUserName.compiled']
if (name is not None) and (not regex_user_name_compiled.match(name)):
raise koji.GenericError("Name %s does not match RegexUserName value" % name)
if (krb is not None) and (not regex_user_name_compiled.match(krb)):
raise koji.GenericError("Kerberos principal %s does not match RegexUserName "
"value" % krb)
def verify_host_name(name):
verify_name_internal(name)
verify_name_user(name)
def create_rpm_checksums_output(query_result, list_chsum_sigkeys):
"""Creates RPM checksum human-friendly dict.
:param dict query_result: Result of QueryProcessor
:param list checksum_type: List of checksum types
:return result: Human-friendly dict of checksums
"""
result = {}
for sigkey, chsums in list_chsum_sigkeys.items():
result.setdefault(sigkey, dict(zip(chsums, [None] * len(chsums))))
for r in query_result:
result[r['sigkey']][koji.CHECKSUM_TYPES[r['checksum_type']]] = r['checksum']
return result
def create_rpm_checksum(rpm_id, sigkey, chsum_dict):
"""Creates RPM checksum.
:param int rpm_id: RPM id
:param string sigkey: Sigkey for specific RPM
:param dict chsum_dict: Dict of checksum type and hash.
"""
chsum_dict = chsum_dict.copy()
checksum_type_int = [koji.CHECKSUM_TYPES[func] for func, _ in chsum_dict.items()]
query = QueryProcessor(tables=['rpm_checksum'],
columns=['checksum_type', 'checksum', 'sigkey', 'rpm_id'],
clauses=["checksum_type IN %(checksum_types)s", 'sigkey=%(sigkey)s',
'rpm_id = %(rpm_id)d'],
values={'checksum_types': checksum_type_int, 'sigkey': sigkey,
'rpm_id': rpm_id})
rows = query.execute()
if len(rows) == len(checksum_type_int):
return None
else:
for r in rows:
if r['checksum_type'] in checksum_type_int:
if r['checksum'] == chsum_dict[koji.CHECKSUM_TYPES[r['checksum_type']]]:
del chsum_dict[koji.CHECKSUM_TYPES[r['checksum_type']]]
else:
raise koji.GenericError(
f"Calculate checksum is different than checksum in DB for "
f"rpm ID {r['rpm_id']}, sigkey {r['sigkey']} and "
f"checksum type {koji.CHECKSUM_TYPES[r['checksum_type']]}.")
if chsum_dict:
for func, chsum in sorted(chsum_dict.items()):
data = {'rpm_id': rpm_id,
'sigkey': sigkey,
'checksum': chsum,
'checksum_type': koji.CHECKSUM_TYPES[func]}
upsert = UpsertProcessor(table='rpm_checksum', data=data, skip_dup=True)
upsert.execute()
def reject_draft(data, is_rpm=False, error=None):
"""block draft build/rpm
TODO: remove this once draft build is open for all build types
:param dict data: buildinfo dict or rpminfo dict if is_rpm is true
:param bool is_rpm: indicates data is rpm or build (true/false) in default error msg
:param koji.GenericError error: the error raised if not a draft build,
defaults to None to raise the default "unsupported" error
:raises error: default or specified by input error when draft==True in data
"""
if data.get('draft'):
if error is None:
entry_type = 'rpm' if is_rpm else 'build'
error = koji.GenericError(f"Draft {entry_type} not supported")
raise error
def draft_clause(draft, table=None):
"""get proper clause in build/rpm query for draft option
:param bool draft: draft option:
True: "draft IS True"
False: "draft IS NOT True"
:param str table: the table(alias) the draft belongs to
:return: the generated clause.
:rtype: str or None
:raises: GenericError if draft is None
"""
if draft is None:
raise koji.GenericError('draft cannot be None')
if not table:
table = ''
else:
table += '.'
if draft:
return f'{table}draft IS TRUE'
else:
# null is included
return f'{table}draft IS NOT TRUE'