4 # Copyright (C) 2000, 2001, 2002, 2003, 2004, 2006 James Troup <james@nocrew.org>
6 # This program is free software; you can redistribute it and/or modify
7 # it under the terms of the GNU General Public License as published by
8 # the Free Software Foundation; either version 2 of the License, or
9 # (at your option) any later version.
11 # This program is distributed in the hope that it will be useful,
12 # but WITHOUT ANY WARRANTY; without even the implied warranty of
13 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 # GNU General Public License for more details.
16 # You should have received a copy of the GNU General Public License
17 # along with this program; if not, write to the Free Software
18 # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
20 ###############################################################################
22 # 04:36|<aj> elmo: you're making me waste 5 seconds per architecture!!!!!! YOU BASTARD!!!!!
24 ###############################################################################
26 # This code is a horrible mess for two reasons:
28 # (o) For Debian's usage, it's doing something like 160k INSERTs,
29 # even on auric, that makes the program unusable unless we get
30 # involed in sorts of silly optimization games (local dicts to avoid
31 # redundant SELECTS, using COPY FROM rather than INSERTS etc.)
33 # (o) It's very site specific, because I don't expect to use this
34 # script again in a hurry, and I don't want to spend any more time
35 # on it than absolutely necessary.
37 ###############################################################################
39 import commands, os, pg, re, sys, time
41 from daklib import database
42 from daklib import utils
43 from daklib.dak_exceptions import *
45 ###############################################################################
47 re_arch_from_filename = re.compile(r"binary-[^/]+")
49 ###############################################################################
57 location_path_cache = {}
61 src_associations_id_serial = 0
62 dsc_files_id_serial = 0
63 files_query_cache = None
64 source_query_cache = None
65 src_associations_query_cache = None
66 dsc_files_query_cache = None
67 orig_tar_gz_cache = {}
69 binaries_id_serial = 0
70 binaries_query_cache = None
71 bin_associations_id_serial = 0
72 bin_associations_query_cache = None
74 source_cache_for_binaries = {}
77 ################################################################################
79 def usage(exit_code=0):
80 print """Usage: dak import-archive
81 Initializes a projectB database from an existing archive
83 -a, --action actually perform the initalization
84 -h, --help show this help and exit."""
87 ###############################################################################
89 def reject (str, prefix="Rejected: "):
92 reject_message += prefix + str + "\n"
94 ###############################################################################
96 def check_signature (filename):
97 if not utils.re_taint_free.match(os.path.basename(filename)):
98 reject("!!WARNING!! tainted filename: '%s'." % (filename))
101 status_read, status_write = os.pipe()
102 cmd = "gpgv --status-fd %s %s %s" \
103 % (status_write, utils.gpg_keyring_args(), filename)
104 (output, status, exit_status) = utils.gpgv_get_status_output(cmd, status_read, status_write)
106 # Process the status-fd output
108 bad = internal_error = ""
109 for line in status.split('\n'):
115 internal_error += "gpgv status line is malformed (< 2 atoms) ['%s'].\n" % (line)
117 (gnupg, keyword) = split[:2]
118 if gnupg != "[GNUPG:]":
119 internal_error += "gpgv status line is malformed (incorrect prefix '%s').\n" % (gnupg)
122 if keywords.has_key(keyword) and keyword != "NODATA" and keyword != "SIGEXPIRED":
123 internal_error += "found duplicate status token ('%s').\n" % (keyword)
126 keywords[keyword] = args
128 # If we failed to parse the status-fd output, let's just whine and bail now
130 reject("internal error while performing signature check on %s." % (filename))
131 reject(internal_error, "")
132 reject("Please report the above errors to the Archive maintainers by replying to this mail.", "")
135 # Now check for obviously bad things in the processed output
136 if keywords.has_key("SIGEXPIRED"):
137 utils.warn("%s: signing key has expired." % (filename))
138 if keywords.has_key("KEYREVOKED"):
139 reject("key used to sign %s has been revoked." % (filename))
141 if keywords.has_key("BADSIG"):
142 reject("bad signature on %s." % (filename))
144 if keywords.has_key("ERRSIG") and not keywords.has_key("NO_PUBKEY"):
145 reject("failed to check signature on %s." % (filename))
147 if keywords.has_key("NO_PUBKEY"):
148 args = keywords["NO_PUBKEY"]
150 reject("internal error while checking signature on %s." % (filename))
153 fingerprint = args[0]
154 if keywords.has_key("BADARMOR"):
155 reject("ascii armour of signature was corrupt in %s." % (filename))
157 if keywords.has_key("NODATA"):
158 utils.warn("no signature found for %s." % (filename))
160 #reject("no signature found in %s." % (filename))
166 # Next check gpgv exited with a zero return code
167 if exit_status and not keywords.has_key("NO_PUBKEY"):
168 reject("gpgv failed while checking %s." % (filename))
170 reject(utils.prefix_multi_line_string(status, " [GPG status-fd output:] "), "")
172 reject(utils.prefix_multi_line_string(output, " [GPG output:] "), "")
175 # Sanity check the good stuff we expect
176 if not keywords.has_key("VALIDSIG"):
177 if not keywords.has_key("NO_PUBKEY"):
178 reject("signature on %s does not appear to be valid [No VALIDSIG]." % (filename))
181 args = keywords["VALIDSIG"]
183 reject("internal error while checking signature on %s." % (filename))
186 fingerprint = args[0]
187 if not keywords.has_key("GOODSIG") and not keywords.has_key("NO_PUBKEY"):
188 reject("signature on %s does not appear to be valid [No GOODSIG]." % (filename))
190 if not keywords.has_key("SIG_ID") and not keywords.has_key("NO_PUBKEY"):
191 reject("signature on %s does not appear to be valid [No SIG_ID]." % (filename))
194 # Finally ensure there's not something we don't recognise
195 known_keywords = utils.Dict(VALIDSIG="",SIG_ID="",GOODSIG="",BADSIG="",ERRSIG="",
196 SIGEXPIRED="",KEYREVOKED="",NO_PUBKEY="",BADARMOR="",
199 for keyword in keywords.keys():
200 if not known_keywords.has_key(keyword):
201 reject("found unknown status token '%s' from gpgv with args '%r' in %s." % (keyword, keywords[keyword], filename))
209 ################################################################################
211 # Prepares a filename or directory (s) to be file.filename by stripping any part of the location (sub) from it.
212 def poolify (s, sub):
213 for i in xrange(len(sub)):
214 if sub[i:] == s[0:len(sub)-i]:
215 return s[len(sub)-i:]
218 def update_archives ():
219 projectB.query("DELETE FROM archive")
220 for archive in Cnf.SubTree("Archive").List():
221 SubSec = Cnf.SubTree("Archive::%s" % (archive))
222 projectB.query("INSERT INTO archive (name, origin_server, description) VALUES ('%s', '%s', '%s')"
223 % (archive, SubSec["OriginServer"], SubSec["Description"]))
225 def update_components ():
226 projectB.query("DELETE FROM component")
227 for component in Cnf.SubTree("Component").List():
228 SubSec = Cnf.SubTree("Component::%s" % (component))
229 projectB.query("INSERT INTO component (name, description, meets_dfsg) VALUES ('%s', '%s', '%s')" %
230 (component, SubSec["Description"], SubSec["MeetsDFSG"]))
232 def update_locations ():
233 projectB.query("DELETE FROM location")
234 for location in Cnf.SubTree("Location").List():
235 SubSec = Cnf.SubTree("Location::%s" % (location))
236 archive_id = database.get_archive_id(SubSec["archive"])
237 type = SubSec.Find("type")
238 if type == "legacy-mixed":
239 projectB.query("INSERT INTO location (path, archive, type) VALUES ('%s', %d, '%s')" % (location, archive_id, SubSec["type"]))
241 for component in Cnf.SubTree("Component").List():
242 component_id = database.get_component_id(component)
243 projectB.query("INSERT INTO location (path, component, archive, type) VALUES ('%s', %d, %d, '%s')" %
244 (location, component_id, archive_id, SubSec["type"]))
246 def update_architectures ():
247 projectB.query("DELETE FROM architecture")
248 for arch in Cnf.SubTree("Architectures").List():
249 projectB.query("INSERT INTO architecture (arch_string, description) VALUES ('%s', '%s')" % (arch, Cnf["Architectures::%s" % (arch)]))
251 def update_suites ():
252 projectB.query("DELETE FROM suite")
253 for suite in Cnf.SubTree("Suite").List():
254 SubSec = Cnf.SubTree("Suite::%s" %(suite))
255 projectB.query("INSERT INTO suite (suite_name) VALUES ('%s')" % suite.lower())
256 for i in ("Version", "Origin", "Description"):
257 if SubSec.has_key(i):
258 projectB.query("UPDATE suite SET %s = '%s' WHERE suite_name = '%s'" % (i.lower(), SubSec[i], suite.lower()))
259 for architecture in Cnf.ValueList("Suite::%s::Architectures" % (suite)):
260 architecture_id = database.get_architecture_id (architecture)
261 projectB.query("INSERT INTO suite_architectures (suite, architecture) VALUES (currval('suite_id_seq'), %d)" % (architecture_id))
263 def update_override_type():
264 projectB.query("DELETE FROM override_type")
265 for type in Cnf.ValueList("OverrideType"):
266 projectB.query("INSERT INTO override_type (type) VALUES ('%s')" % (type))
268 def update_priority():
269 projectB.query("DELETE FROM priority")
270 for priority in Cnf.SubTree("Priority").List():
271 projectB.query("INSERT INTO priority (priority, level) VALUES ('%s', %s)" % (priority, Cnf["Priority::%s" % (priority)]))
273 def update_section():
274 projectB.query("DELETE FROM section")
275 for component in Cnf.SubTree("Component").List():
276 if Cnf["Control-Overrides::ComponentPosition"] == "prefix":
278 if component != 'main':
279 prefix = component + '/'
284 if component != 'main':
285 suffix = '/' + component
288 for section in Cnf.ValueList("Section"):
289 projectB.query("INSERT INTO section (section) VALUES ('%s%s%s')" % (prefix, section, suffix))
291 def get_location_path(directory):
292 global location_path_cache
294 if location_path_cache.has_key(directory):
295 return location_path_cache[directory]
297 q = projectB.query("SELECT DISTINCT path FROM location WHERE path ~ '%s'" % (directory))
299 path = q.getresult()[0][0]
301 utils.fubar("[import-archive] get_location_path(): Couldn't get path for %s" % (directory))
302 location_path_cache[directory] = path
305 ################################################################################
307 def get_or_set_files_id (filename, size, md5sum, location_id):
308 global files_id_cache, files_id_serial, files_query_cache
310 cache_key = "_".join((filename, size, md5sum, repr(location_id)))
311 if not files_id_cache.has_key(cache_key):
313 files_query_cache.write("%d\t%s\t%s\t%s\t%d\t\\N\n" % (files_id_serial, filename, size, md5sum, location_id))
314 files_id_cache[cache_key] = files_id_serial
316 return files_id_cache[cache_key]
318 ###############################################################################
320 def process_sources (filename, suite, component, archive):
321 global source_cache, source_query_cache, src_associations_query_cache, dsc_files_query_cache, source_id_serial, src_associations_id_serial, dsc_files_id_serial, source_cache_for_binaries, orig_tar_gz_cache, reject_message
323 suite = suite.lower()
324 suite_id = database.get_suite_id(suite)
326 file = utils.open_file (filename)
327 except CantOpenError:
328 utils.warn("can't open '%s'" % (filename))
330 Scanner = apt_pkg.ParseTagFile(file)
331 while Scanner.Step() != 0:
332 package = Scanner.Section["package"]
333 version = Scanner.Section["version"]
334 directory = Scanner.Section["directory"]
335 dsc_file = os.path.join(Cnf["Dir::Root"], directory, "%s_%s.dsc" % (package, utils.re_no_epoch.sub('', version)))
336 # Sometimes the Directory path is a lie; check in the pool
337 if not os.path.exists(dsc_file):
338 if directory.split('/')[0] == "dists":
339 directory = Cnf["Dir::PoolRoot"] + utils.poolify(package, component)
340 dsc_file = os.path.join(Cnf["Dir::Root"], directory, "%s_%s.dsc" % (package, utils.re_no_epoch.sub('', version)))
341 if not os.path.exists(dsc_file):
342 utils.fubar("%s not found." % (dsc_file))
343 install_date = time.strftime("%Y-%m-%d", time.localtime(os.path.getmtime(dsc_file)))
344 fingerprint = check_signature(dsc_file)
345 fingerprint_id = database.get_or_set_fingerprint_id(fingerprint)
347 utils.fubar("%s: %s" % (dsc_file, reject_message))
348 maintainer = Scanner.Section["maintainer"]
349 maintainer = maintainer.replace("'", "\\'")
350 maintainer_id = database.get_or_set_maintainer_id(maintainer)
351 location = get_location_path(directory.split('/')[0])
352 location_id = database.get_location_id (location, component, archive)
353 if not directory.endswith("/"):
355 directory = poolify (directory, location)
356 if directory != "" and not directory.endswith("/"):
358 no_epoch_version = utils.re_no_epoch.sub('', version)
359 # Add all files referenced by the .dsc to the files table
361 for line in Scanner.Section["files"].split('\n'):
363 (md5sum, size, filename) = line.strip().split()
364 # Don't duplicate .orig.tar.gz's
365 if filename.endswith(".orig.tar.gz"):
366 cache_key = "%s_%s_%s" % (filename, size, md5sum)
367 if orig_tar_gz_cache.has_key(cache_key):
368 id = orig_tar_gz_cache[cache_key]
370 id = get_or_set_files_id (directory + filename, size, md5sum, location_id)
371 orig_tar_gz_cache[cache_key] = id
373 id = get_or_set_files_id (directory + filename, size, md5sum, location_id)
375 # If this is the .dsc itself; save the ID for later.
376 if filename.endswith(".dsc"):
378 filename = directory + package + '_' + no_epoch_version + '.dsc'
379 cache_key = "%s_%s" % (package, version)
380 if not source_cache.has_key(cache_key):
381 nasty_key = "%s_%s" % (package, version)
382 source_id_serial += 1
383 if not source_cache_for_binaries.has_key(nasty_key):
384 source_cache_for_binaries[nasty_key] = source_id_serial
385 tmp_source_id = source_id_serial
386 source_cache[cache_key] = source_id_serial
387 source_query_cache.write("%d\t%s\t%s\t%d\t%d\t%s\t%s\n" % (source_id_serial, package, version, maintainer_id, files_id, install_date, fingerprint_id))
389 dsc_files_id_serial += 1
390 dsc_files_query_cache.write("%d\t%d\t%d\n" % (dsc_files_id_serial, tmp_source_id,id))
392 tmp_source_id = source_cache[cache_key]
394 src_associations_id_serial += 1
395 src_associations_query_cache.write("%d\t%d\t%d\n" % (src_associations_id_serial, suite_id, tmp_source_id))
399 ###############################################################################
401 def process_packages (filename, suite, component, archive):
402 global arch_all_cache, binary_cache, binaries_id_serial, binaries_query_cache, bin_associations_id_serial, bin_associations_query_cache, reject_message
406 suite = suite.lower()
407 suite_id = database.get_suite_id(suite)
409 file = utils.open_file (filename)
410 except CantOpenError:
411 utils.warn("can't open '%s'" % (filename))
413 Scanner = apt_pkg.ParseTagFile(file)
414 while Scanner.Step() != 0:
415 package = Scanner.Section["package"]
416 version = Scanner.Section["version"]
417 maintainer = Scanner.Section["maintainer"]
418 maintainer = maintainer.replace("'", "\\'")
419 maintainer_id = database.get_or_set_maintainer_id(maintainer)
420 architecture = Scanner.Section["architecture"]
421 architecture_id = database.get_architecture_id (architecture)
422 fingerprint = "NOSIG"
423 fingerprint_id = database.get_or_set_fingerprint_id(fingerprint)
424 if not Scanner.Section.has_key("source"):
427 source = Scanner.Section["source"]
429 if source.find("(") != -1:
430 m = utils.re_extract_src_version.match(source)
432 source_version = m.group(2)
433 if not source_version:
434 source_version = version
435 filename = Scanner.Section["filename"]
436 if filename.endswith(".deb"):
440 location = get_location_path(filename.split('/')[0])
441 location_id = database.get_location_id (location, component.replace("/debian-installer", ""), archive)
442 filename = poolify (filename, location)
443 if architecture == "all":
444 filename = re_arch_from_filename.sub("binary-all", filename)
445 cache_key = "%s_%s" % (source, source_version)
446 source_id = source_cache_for_binaries.get(cache_key, None)
447 size = Scanner.Section["size"]
448 md5sum = Scanner.Section["md5sum"]
449 files_id = get_or_set_files_id (filename, size, md5sum, location_id)
450 cache_key = "%s_%s_%s_%d_%d_%d_%d" % (package, version, repr(source_id), architecture_id, location_id, files_id, suite_id)
451 if not arch_all_cache.has_key(cache_key):
452 arch_all_cache[cache_key] = 1
453 cache_key = "%s_%s_%s_%d" % (package, version, repr(source_id), architecture_id)
454 if not binary_cache.has_key(cache_key):
459 source_id = repr(source_id)
460 binaries_id_serial += 1
461 binaries_query_cache.write("%d\t%s\t%s\t%d\t%s\t%d\t%d\t%s\t%s\n" % (binaries_id_serial, package, version, maintainer_id, source_id, architecture_id, files_id, type, fingerprint_id))
462 binary_cache[cache_key] = binaries_id_serial
463 tmp_binaries_id = binaries_id_serial
465 tmp_binaries_id = binary_cache[cache_key]
467 bin_associations_id_serial += 1
468 bin_associations_query_cache.write("%d\t%d\t%d\n" % (bin_associations_id_serial, suite_id, tmp_binaries_id))
473 print "%d binary packages processed; %d with no source match which is %.2f%%" % (count_total, count_bad, (float(count_bad)/count_total)*100)
475 print "%d binary packages processed; 0 with no source match which is 0%%" % (count_total)
477 ###############################################################################
479 def do_sources(sources, suite, component, server):
480 temp_filename = utils.temp_filename()
481 (result, output) = commands.getstatusoutput("gunzip -c %s > %s" % (sources, temp_filename))
483 utils.fubar("Gunzip invocation failed!\n%s" % (output), result)
484 print 'Processing '+sources+'...'
485 process_sources (temp_filename, suite, component, server)
486 os.unlink(temp_filename)
488 ###############################################################################
491 global Cnf, projectB, query_cache, files_query_cache, source_query_cache, src_associations_query_cache, dsc_files_query_cache, bin_associations_query_cache, binaries_query_cache
493 Cnf = utils.get_conf()
494 Arguments = [('a', "action", "Import-Archive::Options::Action"),
495 ('h', "help", "Import-Archive::Options::Help")]
496 for i in [ "action", "help" ]:
497 if not Cnf.has_key("Import-Archive::Options::%s" % (i)):
498 Cnf["Import-Archive::Options::%s" % (i)] = ""
500 apt_pkg.ParseCommandLine(Cnf, Arguments, sys.argv)
502 Options = Cnf.SubTree("Import-Archive::Options")
506 if not Options["Action"]:
507 utils.warn("""no -a/--action given; not doing anything.
508 Please read the documentation before running this script.
512 print "Re-Creating DB..."
513 (result, output) = commands.getstatusoutput("psql -f init_pool.sql template1")
515 utils.fubar("psql invocation failed!\n", result)
518 projectB = pg.connect(Cnf["DB::Name"], Cnf["DB::Host"], int(Cnf["DB::Port"]))
520 database.init (Cnf, projectB)
522 print "Adding static tables from conf file..."
523 projectB.query("BEGIN WORK")
524 update_architectures()
529 update_override_type()
532 projectB.query("COMMIT WORK")
534 files_query_cache = utils.open_file(Cnf["Import-Archive::ExportDir"]+"files","w")
535 source_query_cache = utils.open_file(Cnf["Import-Archive::ExportDir"]+"source","w")
536 src_associations_query_cache = utils.open_file(Cnf["Import-Archive::ExportDir"]+"src_associations","w")
537 dsc_files_query_cache = utils.open_file(Cnf["Import-Archive::ExportDir"]+"dsc_files","w")
538 binaries_query_cache = utils.open_file(Cnf["Import-Archive::ExportDir"]+"binaries","w")
539 bin_associations_query_cache = utils.open_file(Cnf["Import-Archive::ExportDir"]+"bin_associations","w")
541 projectB.query("BEGIN WORK")
542 # Process Sources files to popoulate `source' and friends
543 for location in Cnf.SubTree("Location").List():
544 SubSec = Cnf.SubTree("Location::%s" % (location))
545 server = SubSec["Archive"]
546 type = Cnf.Find("Location::%s::Type" % (location))
547 if type == "legacy-mixed":
548 sources = location + 'Sources.gz'
549 suite = Cnf.Find("Location::%s::Suite" % (location))
550 do_sources(sources, suite, "", server)
551 elif type == "legacy" or type == "pool":
552 for suite in Cnf.ValueList("Location::%s::Suites" % (location)):
553 for component in Cnf.SubTree("Component").List():
554 sources = Cnf["Dir::Root"] + "dists/" + Cnf["Suite::%s::CodeName" % (suite)] + '/' + component + '/source/' + 'Sources.gz'
555 do_sources(sources, suite, component, server)
557 utils.fubar("Unknown location type ('%s')." % (type))
559 # Process Packages files to populate `binaries' and friends
561 for location in Cnf.SubTree("Location").List():
562 SubSec = Cnf.SubTree("Location::%s" % (location))
563 server = SubSec["Archive"]
564 type = Cnf.Find("Location::%s::Type" % (location))
565 if type == "legacy-mixed":
566 packages = location + 'Packages'
567 suite = Cnf.Find("Location::%s::Suite" % (location))
568 print 'Processing '+location+'...'
569 process_packages (packages, suite, "", server)
570 elif type == "legacy" or type == "pool":
571 for suite in Cnf.ValueList("Location::%s::Suites" % (location)):
572 udeb_components = map(lambda x: x+"/debian-installer",
573 Cnf.ValueList("Suite::%s::UdebComponents" % suite))
574 for component in Cnf.SubTree("Component").List() + udeb_components:
575 architectures = filter(utils.real_arch,
576 Cnf.ValueList("Suite::%s::Architectures" % (suite)))
577 for architecture in architectures:
578 packages = Cnf["Dir::Root"] + "dists/" + Cnf["Suite::%s::CodeName" % (suite)] + '/' + component + '/binary-' + architecture + '/Packages'
579 print 'Processing '+packages+'...'
580 process_packages (packages, suite, component, server)
582 files_query_cache.close()
583 source_query_cache.close()
584 src_associations_query_cache.close()
585 dsc_files_query_cache.close()
586 binaries_query_cache.close()
587 bin_associations_query_cache.close()
588 print "Writing data to `files' table..."
589 projectB.query("COPY files FROM '%s'" % (Cnf["Import-Archive::ExportDir"]+"files"))
590 print "Writing data to `source' table..."
591 projectB.query("COPY source FROM '%s'" % (Cnf["Import-Archive::ExportDir"]+"source"))
592 print "Writing data to `src_associations' table..."
593 projectB.query("COPY src_associations FROM '%s'" % (Cnf["Import-Archive::ExportDir"]+"src_associations"))
594 print "Writing data to `dsc_files' table..."
595 projectB.query("COPY dsc_files FROM '%s'" % (Cnf["Import-Archive::ExportDir"]+"dsc_files"))
596 print "Writing data to `binaries' table..."
597 projectB.query("COPY binaries FROM '%s'" % (Cnf["Import-Archive::ExportDir"]+"binaries"))
598 print "Writing data to `bin_associations' table..."
599 projectB.query("COPY bin_associations FROM '%s'" % (Cnf["Import-Archive::ExportDir"]+"bin_associations"))
600 print "Committing..."
601 projectB.query("COMMIT WORK")
603 # Add the constraints and otherwise generally clean up the database.
604 # See add_constraints.sql for more details...
606 print "Running add_constraints.sql..."
607 (result, output) = commands.getstatusoutput("psql %s < add_constraints.sql" % (Cnf["DB::Name"]))
610 utils.fubar("psql invocation failed!\n%s" % (output), result)
614 ################################################################################
617 utils.try_with_debug(do_da_do_da)
619 ################################################################################
621 if __name__ == '__main__':