4 Do whatever is needed to get a security upload released
6 @contact: Debian FTP Master <ftpmaster@debian.org>
7 @copyright: 2010 Joerg Jaspert <joerg@debian.org>
8 @license: GNU General Public License version 2 or later
11 # This program is free software; you can redistribute it and/or modify
12 # it under the terms of the GNU General Public License as published by
13 # the Free Software Foundation; either version 2 of the License, or
14 # (at your option) any later version.
16 # This program is distributed in the hope that it will be useful,
17 # but WITHOUT ANY WARRANTY; without even the implied warranty of
18 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 # GNU General Public License for more details.
21 # You should have received a copy of the GNU General Public License
22 # along with this program; if not, write to the Free Software
23 # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
25 ################################################################################
28 ################################################################################
36 from daklib import queue
37 from daklib import daklog
38 from daklib import utils
39 from daklib.dbconn import *
40 from daklib.regexes import re_taint_free
41 from daklib.config import Config
49 print """Usage: dak security-install [OPTIONS] changesfiles
50 Do whatever there is to do for a security release
52 -h, --help show this help and exit
53 -n, --no-action don't commit changes
54 -s, --sudo dont bother, used internally
61 if not re_taint_free.match(command):
62 utils.fubar("Invalid character in \"%s\"." % (command))
64 if Options["No-Action"]:
65 print "[%s]" % (command)
67 (result, output) = commands.getstatusoutput(command)
69 utils.fubar("Invocation of '%s' failed:\n%s\n" % (command, output), result)
71 ##################### ! ! ! N O T E ! ! ! #####################
73 # These functions will be reinvoked by semi-priveleged users, be careful not
74 # to invoke external programs that will escalate privileges, etc.
76 ##################### ! ! ! N O T E ! ! ! #####################
78 def sudo(arg, fn, exit):
80 os.spawnl(os.P_WAIT, "/usr/bin/sudo", "/usr/bin/sudo", "-u", "dak", "-H",
81 "/usr/local/bin/dak", "new-security-install", "-"+arg)
87 def do_Approve(): sudo("A", _do_Approve, True)
89 # 1. use process-policy to go through the COMMENTS dir
90 spawn("dak process-policy embargo")
91 spawn("dak process-policy disembargo")
92 newstage=get_policy_queue('newstage')
94 # 2. sync the stuff to ftpmaster
95 print "Sync stuff for upload to ftpmaster"
96 spawn("rsync -a -q %s/. /srv/queued/ftpmaster/." % (newstage.path))
98 # 3. Now run process-upload in the newstage dir
99 print "Now put it into the security archive"
100 spawn("dak process-upload -a -d %s" % (newstage.path))
102 # 4. Run all the steps that are needed to publish the changed archive
104 spawn("dak dominate")
105 print "Generating filelist for apt-ftparchive"
106 spawn("dak generate-filelist")
107 print "Updating Packages and Sources files... This may take a while, be patient"
108 spawn("/srv/security-master.debian.org/dak/config/debian-security/map.sh")
109 spawn("apt-ftparchive generate %s" % (utils.which_apt_conf_file()))
110 print "Updating Release files..."
111 spawn("dak generate-releases")
112 print "Triggering security mirrors... (this may take a while)"
113 spawn("/srv/security-master.debian.org/dak/config/debian-security/make-mirror.sh")
114 spawn("sudo -u archvsync -H /home/archvsync/signal_security")
115 print "Triggering metadata export for packages.d.o and other consumers"
116 spawn("/srv/security-master.debian.org/dak/config/debian-security/export.sh")
118 ########################################################################
119 ########################################################################
122 global Options, Logger, Queue, changes
125 Arguments = [('h', "Help", "Security::Options::Help"),
126 ('n', "No-Action", "Security::Options::No-Action"),
127 ('c', 'Changesfile', "Security::Options::Changesfile"),
128 ('s', "Sudo", "Security::Options::Sudo"),
129 ('A', "Approve", "Security::Options::Approve")
132 for i in ["Help", "No-Action", "Changesfile", "Sudo", "Approve"]:
133 if not cnf.has_key("Security::Options::%s" % (i)):
134 cnf["Security::Options::%s" % (i)] = ""
136 changes_files = apt_pkg.ParseCommandLine(cnf.Cnf, Arguments, sys.argv)
138 Options = cnf.SubTree("Security::Options")
143 for a in changes_files:
144 if not a.endswith(".changes"):
145 utils.fubar("not a .changes file: %s" % (a))
147 changes = changesfiles.keys()
149 username = utils.getusername()
150 if username != "dak":
151 print "Non-dak user: %s" % username
152 Options["Sudo"] = "y"
154 if Options["No-Action"]:
157 if not Options["Sudo"] and not Options["No-Action"]:
158 Logger = daklog.Logger("security-install")
160 session = DBConn().session()
162 # If we call ourselve to approve, we do just that and exit
163 if Options["Approve"]:
167 if len(changes) == 0:
168 utils.fubar("Need changes files as arguments")
170 # Yes, we could do this inside do_Approve too. But this way we see who exactly
171 # called it (ownership of the file)
174 for change in changes:
175 dbchange=get_dbchange(os.path.basename(change), session)
176 # strip epoch from version
177 version=dbchange.version
178 version=version[(version.find(':')+1):]
179 acceptfilename="%s/COMMENTS/ACCEPT.%s_%s" % (os.path.dirname(os.path.abspath(changes[0])), dbchange.source, version)
180 acceptfiles[acceptfilename]=1
182 if Options["No-Action"]:
183 print "Would create %s now and then go on to accept this package, but No-Action is set" % (acceptfiles.keys())
186 for acceptfilename in acceptfiles.keys():
187 accept_file = file(acceptfilename, "w")
188 accept_file.write("OK\n")
194 if __name__ == '__main__':