py3: Switch almost all shebang lines to use `python3`.
This causes `upgrade-zulip-from-git`, as well as a no-option run of
`tools/build-release-tarball`, to produce a Zulip install running
Python 3, rather than Python 2. In particular this means that the
virtualenv we create, in which all application code runs, is Python 3.
One shebang line, on `zulip-ec2-configure-interfaces`, explicitly
keeps Python 2, and at least one external ops script, `wal-e`, also
still runs on Python 2. See discussion on the respective previous
commits that made those explicit. There may also be some other
third-party scripts we use, outside of this source tree and running
outside our virtualenv, that still run on Python 2.
2017-08-02 23:15:16 +02:00
|
|
|
|
#!/usr/bin/env python3
|
2015-08-17 06:37:14 +02:00
|
|
|
|
import os
|
2015-08-20 02:46:50 +02:00
|
|
|
|
import sys
|
2015-08-19 04:18:08 +02:00
|
|
|
|
import logging
|
2016-10-21 09:45:21 +02:00
|
|
|
|
import argparse
|
2015-08-19 04:18:08 +02:00
|
|
|
|
import platform
|
2016-04-06 20:12:32 +02:00
|
|
|
|
import subprocess
|
2017-06-15 12:13:35 +02:00
|
|
|
|
import hashlib
|
2015-08-17 06:37:14 +02:00
|
|
|
|
|
2016-04-06 17:15:31 +02:00
|
|
|
|
os.environ["PYTHONUNBUFFERED"] = "y"
|
|
|
|
|
|
2017-01-14 11:19:26 +01:00
|
|
|
|
ZULIP_PATH = os.path.dirname(os.path.dirname(os.path.dirname(os.path.abspath(__file__))))
|
2016-06-27 23:50:38 +02:00
|
|
|
|
|
|
|
|
|
sys.path.append(ZULIP_PATH)
|
2019-07-19 08:06:34 +02:00
|
|
|
|
from scripts.lib.zulip_tools import run_as_root, ENDC, WARNING, \
|
2019-08-30 00:14:43 +02:00
|
|
|
|
get_dev_uuid_var_path, FAIL, os_families, parse_os_release, \
|
2019-03-06 00:34:02 +01:00
|
|
|
|
overwrite_symlink
|
2017-11-09 16:31:57 +01:00
|
|
|
|
from scripts.lib.setup_venv import (
|
2020-03-22 21:06:37 +01:00
|
|
|
|
get_venv_dependencies, THUMBOR_VENV_DEPENDENCIES,
|
|
|
|
|
YUM_THUMBOR_VENV_DEPENDENCIES,
|
2017-11-09 16:31:57 +01:00
|
|
|
|
)
|
2017-07-22 00:51:36 +02:00
|
|
|
|
from scripts.lib.node_cache import setup_node_modules, NODE_MODULES_CACHE_PATH
|
2019-07-19 08:06:34 +02:00
|
|
|
|
from tools.setup import setup_venvs
|
2016-08-18 13:53:16 +02:00
|
|
|
|
|
2019-07-30 20:54:04 +02:00
|
|
|
|
from typing import List, TYPE_CHECKING
|
|
|
|
|
if TYPE_CHECKING:
|
2019-08-06 01:29:34 +02:00
|
|
|
|
# typing_extensions might not be installed yet
|
|
|
|
|
from typing_extensions import NoReturn
|
2015-08-17 06:37:14 +02:00
|
|
|
|
|
2016-07-09 09:08:41 +02:00
|
|
|
|
VAR_DIR_PATH = os.path.join(ZULIP_PATH, 'var')
|
2016-06-14 10:33:23 +02:00
|
|
|
|
|
2017-12-02 00:47:56 +01:00
|
|
|
|
is_travis = 'TRAVIS' in os.environ
|
|
|
|
|
is_circleci = 'CIRCLECI' in os.environ
|
|
|
|
|
|
2016-04-06 19:09:16 +02:00
|
|
|
|
if not os.path.exists(os.path.join(ZULIP_PATH, ".git")):
|
2018-01-25 13:04:58 +01:00
|
|
|
|
print(FAIL + "Error: No Zulip git repository present!" + ENDC)
|
2015-11-01 17:11:06 +01:00
|
|
|
|
print("To setup the Zulip development environment, you should clone the code")
|
|
|
|
|
print("from GitHub, rather than using a Zulip production release tarball.")
|
2015-10-14 01:18:49 +02:00
|
|
|
|
sys.exit(1)
|
|
|
|
|
|
2016-12-01 00:23:05 +01:00
|
|
|
|
# Check the RAM on the user's system, and throw an effort if <1.5GB.
|
|
|
|
|
# This avoids users getting segfaults running `pip install` that are
|
|
|
|
|
# generally more annoying to debug.
|
|
|
|
|
with open("/proc/meminfo") as meminfo:
|
|
|
|
|
ram_size = meminfo.readlines()[0].strip().split(" ")[-2]
|
|
|
|
|
ram_gb = float(ram_size) / 1024.0 / 1024.0
|
|
|
|
|
if ram_gb < 1.5:
|
|
|
|
|
print("You have insufficient RAM (%s GB) to run the Zulip development environment." % (
|
|
|
|
|
round(ram_gb, 2),))
|
|
|
|
|
print("We recommend at least 2 GB of RAM, and require at least 1.5 GB.")
|
|
|
|
|
sys.exit(1)
|
|
|
|
|
|
2016-11-09 00:10:46 +01:00
|
|
|
|
try:
|
2017-10-18 04:14:06 +02:00
|
|
|
|
UUID_VAR_PATH = get_dev_uuid_var_path(create_if_missing=True)
|
2018-07-18 23:50:16 +02:00
|
|
|
|
os.makedirs(UUID_VAR_PATH, exist_ok=True)
|
2016-11-09 00:10:46 +01:00
|
|
|
|
if os.path.exists(os.path.join(VAR_DIR_PATH, 'zulip-test-symlink')):
|
|
|
|
|
os.remove(os.path.join(VAR_DIR_PATH, 'zulip-test-symlink'))
|
|
|
|
|
os.symlink(
|
|
|
|
|
os.path.join(ZULIP_PATH, 'README.md'),
|
|
|
|
|
os.path.join(VAR_DIR_PATH, 'zulip-test-symlink')
|
|
|
|
|
)
|
|
|
|
|
os.remove(os.path.join(VAR_DIR_PATH, 'zulip-test-symlink'))
|
2018-05-24 16:41:34 +02:00
|
|
|
|
except OSError:
|
2018-01-25 13:04:58 +01:00
|
|
|
|
print(FAIL + "Error: Unable to create symlinks."
|
|
|
|
|
"Make sure you have permission to create symbolic links." + ENDC)
|
2016-11-09 00:10:46 +01:00
|
|
|
|
print("See this page for more information:")
|
2017-11-16 19:54:24 +01:00
|
|
|
|
print(" https://zulip.readthedocs.io/en/latest/development/setup-vagrant.html#os-symlink-error")
|
2016-11-09 00:10:46 +01:00
|
|
|
|
sys.exit(1)
|
|
|
|
|
|
2016-04-06 19:27:42 +02:00
|
|
|
|
if platform.architecture()[0] == '64bit':
|
|
|
|
|
arch = 'amd64'
|
|
|
|
|
elif platform.architecture()[0] == '32bit':
|
|
|
|
|
arch = "i386"
|
|
|
|
|
else:
|
2017-11-08 03:47:28 +01:00
|
|
|
|
logging.critical("Only x86 is supported;"
|
2019-05-21 00:23:40 +02:00
|
|
|
|
" ask on chat.zulip.org if you want another architecture.")
|
|
|
|
|
# Note: It's probably actually not hard to add additional
|
2019-08-28 23:13:59 +02:00
|
|
|
|
# architectures.
|
2016-04-06 19:27:42 +02:00
|
|
|
|
sys.exit(1)
|
|
|
|
|
|
2019-08-25 01:23:14 +02:00
|
|
|
|
distro_info = parse_os_release()
|
|
|
|
|
vendor = distro_info['ID']
|
|
|
|
|
os_version = distro_info['VERSION_ID']
|
2020-04-17 19:50:22 +02:00
|
|
|
|
if vendor == "debian" and os_version == "10": # buster
|
2019-08-30 00:14:43 +02:00
|
|
|
|
POSTGRES_VERSION = "11"
|
|
|
|
|
elif vendor == "ubuntu" and os_version in ["18.04", "18.10"]: # bionic, cosmic
|
|
|
|
|
POSTGRES_VERSION = "10"
|
2020-02-12 18:56:42 +01:00
|
|
|
|
elif vendor == "ubuntu" and os_version in ["19.04", "19.10"]: # disco, eoan
|
2019-08-30 00:14:43 +02:00
|
|
|
|
POSTGRES_VERSION = "11"
|
2020-03-17 20:41:41 +01:00
|
|
|
|
elif vendor == "ubuntu" and os_version == "20.04": # focal
|
|
|
|
|
POSTGRES_VERSION = "12"
|
2019-08-30 00:14:43 +02:00
|
|
|
|
elif vendor == "fedora" and os_version == "29":
|
|
|
|
|
POSTGRES_VERSION = "10"
|
|
|
|
|
elif vendor == "rhel" and os_version.startswith("7."):
|
|
|
|
|
POSTGRES_VERSION = "10"
|
|
|
|
|
elif vendor == "centos" and os_version == "7":
|
|
|
|
|
POSTGRES_VERSION = "10"
|
|
|
|
|
else:
|
2019-08-25 01:23:14 +02:00
|
|
|
|
logging.critical("Unsupported platform: {} {}".format(vendor, os_version))
|
|
|
|
|
if vendor == 'ubuntu' and os_version == '14.04':
|
2019-07-01 21:07:56 +02:00
|
|
|
|
print()
|
|
|
|
|
print("Ubuntu Trusty reached end-of-life upstream and is no longer a supported platform for Zulip")
|
|
|
|
|
if os.path.exists('/home/vagrant'):
|
|
|
|
|
print("To upgrade, run `vagrant destroy`, and then recreate the Vagrant guest.\n")
|
|
|
|
|
print("See: https://zulip.readthedocs.io/en/latest/development/setup-vagrant.html")
|
2016-04-06 19:27:42 +02:00
|
|
|
|
sys.exit(1)
|
|
|
|
|
|
2020-03-17 20:27:35 +01:00
|
|
|
|
VENV_DEPENDENCIES = get_venv_dependencies(vendor, os_version)
|
|
|
|
|
|
2018-12-08 22:53:46 +01:00
|
|
|
|
COMMON_DEPENDENCIES = [
|
2016-04-04 23:22:14 +02:00
|
|
|
|
"memcached",
|
|
|
|
|
"rabbitmq-server",
|
|
|
|
|
"supervisor",
|
|
|
|
|
"git",
|
|
|
|
|
"wget",
|
|
|
|
|
"ca-certificates", # Explicit dependency in case e.g. wget is already installed
|
2018-12-06 20:12:52 +01:00
|
|
|
|
"puppet", # Used by lint (`puppet parser validate`)
|
2016-04-04 23:22:14 +02:00
|
|
|
|
"gettext", # Used by makemessages i18n
|
2020-03-26 21:46:55 +01:00
|
|
|
|
"transifex-client", # Needed to sync translations from transifex
|
2016-04-04 23:22:14 +02:00
|
|
|
|
"curl", # Used for fetching PhantomJS as wget occasionally fails on redirects
|
2017-09-22 23:04:57 +02:00
|
|
|
|
"moreutils", # Used for sponge command
|
2019-08-08 19:22:25 +02:00
|
|
|
|
"unzip", # Needed for Slack import
|
2020-03-12 15:46:09 +01:00
|
|
|
|
|
|
|
|
|
# Puppeteer dependencies from here
|
|
|
|
|
"gconf-service",
|
|
|
|
|
"libgconf-2-4",
|
|
|
|
|
"libgtk-3-0",
|
|
|
|
|
"libatk-bridge2.0-0",
|
|
|
|
|
"libx11-xcb1",
|
2020-04-20 19:01:53 +02:00
|
|
|
|
"libxcb-dri3-0",
|
|
|
|
|
"libgbm1",
|
2020-03-12 15:46:09 +01:00
|
|
|
|
"libxss1",
|
|
|
|
|
"fonts-liberation",
|
|
|
|
|
"libappindicator1",
|
|
|
|
|
"xdg-utils"
|
|
|
|
|
# Puppeteer dependencies end here.
|
2018-12-08 22:53:46 +01:00
|
|
|
|
]
|
|
|
|
|
|
|
|
|
|
UBUNTU_COMMON_APT_DEPENDENCIES = COMMON_DEPENDENCIES + [
|
|
|
|
|
"redis-server",
|
|
|
|
|
"hunspell-en-us",
|
|
|
|
|
"puppet-lint",
|
|
|
|
|
"netcat", # Used for flushing memcached
|
2018-05-23 03:44:29 +02:00
|
|
|
|
"libfontconfig1", # Required by phantomjs
|
2019-08-09 01:06:42 +02:00
|
|
|
|
"default-jre-headless", # Required by vnu-jar
|
2020-03-22 21:06:37 +01:00
|
|
|
|
] + THUMBOR_VENV_DEPENDENCIES
|
2016-04-04 23:22:14 +02:00
|
|
|
|
|
2018-12-08 22:53:46 +01:00
|
|
|
|
COMMON_YUM_DEPENDENCIES = COMMON_DEPENDENCIES + [
|
|
|
|
|
"redis",
|
|
|
|
|
"hunspell-en-US",
|
|
|
|
|
"rubygem-puppet-lint",
|
|
|
|
|
"nmap-ncat",
|
|
|
|
|
"fontconfig", # phantomjs dependencies from here until libstdc++
|
|
|
|
|
"freetype",
|
|
|
|
|
"freetype-devel",
|
|
|
|
|
"fontconfig-devel",
|
|
|
|
|
"libstdc++"
|
2018-12-19 02:45:32 +01:00
|
|
|
|
] + YUM_THUMBOR_VENV_DEPENDENCIES
|
2018-12-08 22:53:46 +01:00
|
|
|
|
|
2019-03-06 00:27:45 +01:00
|
|
|
|
BUILD_PGROONGA_FROM_SOURCE = False
|
2020-03-31 20:05:18 +02:00
|
|
|
|
if vendor == 'debian' and os_version in [] or vendor == 'ubuntu' and os_version in []:
|
2019-08-28 11:58:53 +02:00
|
|
|
|
# For platforms without a pgroonga release, we need to build it
|
2019-08-25 01:23:14 +02:00
|
|
|
|
# from source.
|
|
|
|
|
BUILD_PGROONGA_FROM_SOURCE = True
|
|
|
|
|
SYSTEM_DEPENDENCIES = UBUNTU_COMMON_APT_DEPENDENCIES + [
|
|
|
|
|
pkg.format(POSTGRES_VERSION) for pkg in [
|
|
|
|
|
"postgresql-{0}",
|
|
|
|
|
# Dependency for building pgroonga from source
|
2019-08-28 11:58:53 +02:00
|
|
|
|
"postgresql-server-dev-{0}",
|
2019-08-25 01:23:14 +02:00
|
|
|
|
"libgroonga-dev",
|
|
|
|
|
"libmsgpack-dev",
|
2020-03-24 18:40:49 +01:00
|
|
|
|
"clang-9",
|
|
|
|
|
"llvm-9-dev"
|
2019-04-26 00:07:24 +02:00
|
|
|
|
]
|
2020-03-22 21:06:37 +01:00
|
|
|
|
] + VENV_DEPENDENCIES
|
2019-08-30 00:14:43 +02:00
|
|
|
|
elif "debian" in os_families():
|
2019-08-25 01:23:14 +02:00
|
|
|
|
SYSTEM_DEPENDENCIES = UBUNTU_COMMON_APT_DEPENDENCIES + [
|
|
|
|
|
pkg.format(POSTGRES_VERSION) for pkg in [
|
|
|
|
|
"postgresql-{0}",
|
|
|
|
|
"postgresql-{0}-pgroonga",
|
2018-12-17 20:14:09 +01:00
|
|
|
|
]
|
2020-03-22 21:06:37 +01:00
|
|
|
|
] + VENV_DEPENDENCIES
|
2019-08-30 00:14:43 +02:00
|
|
|
|
elif "rhel" in os_families():
|
2018-12-17 20:14:09 +01:00
|
|
|
|
SYSTEM_DEPENDENCIES = COMMON_YUM_DEPENDENCIES + [
|
2018-12-16 20:30:06 +01:00
|
|
|
|
pkg.format(POSTGRES_VERSION) for pkg in [
|
|
|
|
|
"postgresql{0}-server",
|
|
|
|
|
"postgresql{0}",
|
2019-12-18 12:11:18 +01:00
|
|
|
|
"postgresql{0}-devel",
|
2018-12-16 20:30:06 +01:00
|
|
|
|
"postgresql{0}-pgroonga",
|
|
|
|
|
]
|
2020-03-22 21:06:37 +01:00
|
|
|
|
] + VENV_DEPENDENCIES
|
2019-08-30 00:14:43 +02:00
|
|
|
|
elif "fedora" in os_families():
|
2018-12-17 20:14:09 +01:00
|
|
|
|
SYSTEM_DEPENDENCIES = COMMON_YUM_DEPENDENCIES + [
|
2018-12-17 19:41:03 +01:00
|
|
|
|
pkg.format(POSTGRES_VERSION) for pkg in [
|
|
|
|
|
"postgresql{0}-server",
|
|
|
|
|
"postgresql{0}",
|
|
|
|
|
"postgresql{0}-devel",
|
2019-03-06 00:42:17 +01:00
|
|
|
|
# Needed to build pgroonga from source
|
|
|
|
|
"groonga-devel",
|
|
|
|
|
"msgpack-devel",
|
2018-12-17 19:41:03 +01:00
|
|
|
|
]
|
2020-03-22 21:06:37 +01:00
|
|
|
|
] + VENV_DEPENDENCIES
|
2019-03-06 00:27:45 +01:00
|
|
|
|
BUILD_PGROONGA_FROM_SOURCE = True
|
2016-04-04 23:22:14 +02:00
|
|
|
|
|
2019-08-30 00:14:43 +02:00
|
|
|
|
if "fedora" in os_families():
|
2018-12-16 20:30:06 +01:00
|
|
|
|
TSEARCH_STOPWORDS_PATH = "/usr/pgsql-%s/share/tsearch_data/" % (POSTGRES_VERSION,)
|
2018-12-15 04:24:14 +01:00
|
|
|
|
else:
|
|
|
|
|
TSEARCH_STOPWORDS_PATH = "/usr/share/postgresql/%s/tsearch_data/" % (POSTGRES_VERSION,)
|
2015-08-17 06:37:14 +02:00
|
|
|
|
REPO_STOPWORDS_PATH = os.path.join(
|
|
|
|
|
ZULIP_PATH,
|
|
|
|
|
"puppet",
|
|
|
|
|
"zulip",
|
|
|
|
|
"files",
|
|
|
|
|
"postgresql",
|
|
|
|
|
"zulip_english.stop",
|
|
|
|
|
)
|
|
|
|
|
|
python: Convert function type annotations to Python 3 style.
Generated by com2ann (slightly patched to avoid also converting
assignment type annotations, which require Python 3.6), followed by
some manual whitespace adjustment, and six fixes for runtime issues:
- def __init__(self, token: Token, parent: Optional[Node]) -> None:
+ def __init__(self, token: Token, parent: "Optional[Node]") -> None:
-def main(options: argparse.Namespace) -> NoReturn:
+def main(options: argparse.Namespace) -> "NoReturn":
-def fetch_request(url: str, callback: Any, **kwargs: Any) -> Generator[Callable[..., Any], Any, None]:
+def fetch_request(url: str, callback: Any, **kwargs: Any) -> "Generator[Callable[..., Any], Any, None]":
-def assert_server_running(server: subprocess.Popen[bytes], log_file: Optional[str]) -> None:
+def assert_server_running(server: "subprocess.Popen[bytes]", log_file: Optional[str]) -> None:
-def server_is_up(server: subprocess.Popen[bytes], log_file: Optional[str]) -> bool:
+def server_is_up(server: "subprocess.Popen[bytes]", log_file: Optional[str]) -> bool:
- method_kwarg_pairs: List[FuncKwargPair],
+ method_kwarg_pairs: "List[FuncKwargPair]",
Signed-off-by: Anders Kaseorg <anders@zulipchat.com>
2020-04-19 03:48:37 +02:00
|
|
|
|
def install_system_deps() -> None:
|
2018-12-16 22:32:01 +01:00
|
|
|
|
|
|
|
|
|
# By doing list -> set -> list conversion, we remove duplicates.
|
2019-07-01 23:53:23 +02:00
|
|
|
|
deps_to_install = sorted(set(SYSTEM_DEPENDENCIES))
|
2018-12-16 22:32:01 +01:00
|
|
|
|
|
2019-08-30 00:14:43 +02:00
|
|
|
|
if "fedora" in os_families():
|
2019-05-25 01:09:00 +02:00
|
|
|
|
install_yum_deps(deps_to_install)
|
2019-08-30 00:14:43 +02:00
|
|
|
|
elif "debian" in os_families():
|
2019-05-25 01:09:00 +02:00
|
|
|
|
install_apt_deps(deps_to_install)
|
2019-03-06 00:27:45 +01:00
|
|
|
|
else:
|
|
|
|
|
raise AssertionError("Invalid vendor")
|
2018-12-16 22:32:01 +01:00
|
|
|
|
|
2019-08-28 11:58:53 +02:00
|
|
|
|
# For some platforms, there aren't published pgroonga
|
|
|
|
|
# packages available, so we build them from source.
|
2019-03-06 00:27:45 +01:00
|
|
|
|
if BUILD_PGROONGA_FROM_SOURCE:
|
|
|
|
|
run_as_root(["./scripts/lib/build-pgroonga"])
|
2018-12-16 22:32:01 +01:00
|
|
|
|
|
python: Convert function type annotations to Python 3 style.
Generated by com2ann (slightly patched to avoid also converting
assignment type annotations, which require Python 3.6), followed by
some manual whitespace adjustment, and six fixes for runtime issues:
- def __init__(self, token: Token, parent: Optional[Node]) -> None:
+ def __init__(self, token: Token, parent: "Optional[Node]") -> None:
-def main(options: argparse.Namespace) -> NoReturn:
+def main(options: argparse.Namespace) -> "NoReturn":
-def fetch_request(url: str, callback: Any, **kwargs: Any) -> Generator[Callable[..., Any], Any, None]:
+def fetch_request(url: str, callback: Any, **kwargs: Any) -> "Generator[Callable[..., Any], Any, None]":
-def assert_server_running(server: subprocess.Popen[bytes], log_file: Optional[str]) -> None:
+def assert_server_running(server: "subprocess.Popen[bytes]", log_file: Optional[str]) -> None:
-def server_is_up(server: subprocess.Popen[bytes], log_file: Optional[str]) -> bool:
+def server_is_up(server: "subprocess.Popen[bytes]", log_file: Optional[str]) -> bool:
- method_kwarg_pairs: List[FuncKwargPair],
+ method_kwarg_pairs: "List[FuncKwargPair]",
Signed-off-by: Anders Kaseorg <anders@zulipchat.com>
2020-04-19 03:48:37 +02:00
|
|
|
|
def install_apt_deps(deps_to_install: List[str]) -> None:
|
2020-03-23 21:45:49 +01:00
|
|
|
|
# setup-apt-repo does an `apt-get update` if the sources.list files changed.
|
2019-02-26 20:20:46 +01:00
|
|
|
|
run_as_root(["./scripts/lib/setup-apt-repo"])
|
2020-03-23 21:45:49 +01:00
|
|
|
|
|
|
|
|
|
# But we still need to do our own to make sure we have up-to-date
|
|
|
|
|
# data before installing new packages, as the system might not have
|
|
|
|
|
# done an apt update in weeks otherwise, which could result in 404s
|
|
|
|
|
# trying to download old versions that were already removed from mirrors.
|
|
|
|
|
run_as_root(["apt-get", "update"])
|
2019-05-20 06:07:25 +02:00
|
|
|
|
run_as_root(
|
|
|
|
|
[
|
|
|
|
|
"env", "DEBIAN_FRONTEND=noninteractive",
|
|
|
|
|
"apt-get", "-y", "install", "--no-install-recommends",
|
|
|
|
|
]
|
|
|
|
|
+ deps_to_install
|
|
|
|
|
)
|
2018-12-16 22:32:01 +01:00
|
|
|
|
|
python: Convert function type annotations to Python 3 style.
Generated by com2ann (slightly patched to avoid also converting
assignment type annotations, which require Python 3.6), followed by
some manual whitespace adjustment, and six fixes for runtime issues:
- def __init__(self, token: Token, parent: Optional[Node]) -> None:
+ def __init__(self, token: Token, parent: "Optional[Node]") -> None:
-def main(options: argparse.Namespace) -> NoReturn:
+def main(options: argparse.Namespace) -> "NoReturn":
-def fetch_request(url: str, callback: Any, **kwargs: Any) -> Generator[Callable[..., Any], Any, None]:
+def fetch_request(url: str, callback: Any, **kwargs: Any) -> "Generator[Callable[..., Any], Any, None]":
-def assert_server_running(server: subprocess.Popen[bytes], log_file: Optional[str]) -> None:
+def assert_server_running(server: "subprocess.Popen[bytes]", log_file: Optional[str]) -> None:
-def server_is_up(server: subprocess.Popen[bytes], log_file: Optional[str]) -> bool:
+def server_is_up(server: "subprocess.Popen[bytes]", log_file: Optional[str]) -> bool:
- method_kwarg_pairs: List[FuncKwargPair],
+ method_kwarg_pairs: "List[FuncKwargPair]",
Signed-off-by: Anders Kaseorg <anders@zulipchat.com>
2020-04-19 03:48:37 +02:00
|
|
|
|
def install_yum_deps(deps_to_install: List[str]) -> None:
|
2018-12-17 19:41:03 +01:00
|
|
|
|
print(WARNING + "RedHat support is still experimental.")
|
2019-02-26 20:20:46 +01:00
|
|
|
|
run_as_root(["./scripts/lib/setup-yum-repo"])
|
2018-12-18 15:40:05 +01:00
|
|
|
|
|
|
|
|
|
# Hack specific to unregistered RHEL system. The moreutils
|
|
|
|
|
# package requires a perl module package, which isn't available in
|
|
|
|
|
# the unregistered RHEL repositories.
|
|
|
|
|
#
|
|
|
|
|
# Error: Package: moreutils-0.49-2.el7.x86_64 (epel)
|
|
|
|
|
# Requires: perl(IPC::Run)
|
|
|
|
|
yum_extra_flags = [] # type: List[str]
|
2019-08-30 00:14:43 +02:00
|
|
|
|
if vendor == "rhel":
|
2018-12-18 15:40:05 +01:00
|
|
|
|
exitcode, subs_status = subprocess.getstatusoutput("sudo subscription-manager status")
|
|
|
|
|
if exitcode == 1:
|
|
|
|
|
# TODO this might overkill since `subscription-manager` is already
|
|
|
|
|
# called in setup-yum-repo
|
|
|
|
|
if 'Status' in subs_status:
|
|
|
|
|
# The output is well-formed
|
|
|
|
|
yum_extra_flags = ["--skip-broken"]
|
|
|
|
|
else:
|
|
|
|
|
print("Unrecognized output. `subscription-manager` might not be available")
|
|
|
|
|
|
2019-02-26 20:20:46 +01:00
|
|
|
|
run_as_root(["yum", "install", "-y"] + yum_extra_flags + deps_to_install)
|
2019-08-30 00:14:43 +02:00
|
|
|
|
if "rhel" in os_families():
|
2018-12-17 22:04:18 +01:00
|
|
|
|
# This is how a pip3 is installed to /usr/bin in CentOS/RHEL
|
|
|
|
|
# for python35 and later.
|
2019-02-26 20:20:46 +01:00
|
|
|
|
run_as_root(["python36", "-m", "ensurepip"])
|
2019-01-04 21:29:52 +01:00
|
|
|
|
# `python36` is not aliased to `python3` by default
|
2019-02-26 20:20:46 +01:00
|
|
|
|
run_as_root(["ln", "-nsf", "/usr/bin/python36", "/usr/bin/python3"])
|
2018-12-16 20:43:27 +01:00
|
|
|
|
postgres_dir = 'pgsql-%s' % (POSTGRES_VERSION,)
|
|
|
|
|
for cmd in ['pg_config', 'pg_isready', 'psql']:
|
|
|
|
|
# Our tooling expects these postgres scripts to be at
|
|
|
|
|
# well-known paths. There's an argument for eventually
|
|
|
|
|
# making our tooling auto-detect, but this is simpler.
|
2019-02-26 20:20:46 +01:00
|
|
|
|
run_as_root(["ln", "-nsf", "/usr/%s/bin/%s" % (postgres_dir, cmd),
|
|
|
|
|
"/usr/bin/%s" % (cmd,)])
|
2018-12-17 21:30:55 +01:00
|
|
|
|
|
|
|
|
|
# From here, we do the first-time setup/initialization for the postgres database.
|
|
|
|
|
pg_datadir = "/var/lib/pgsql/%s/data" % (POSTGRES_VERSION,)
|
2018-12-18 16:17:11 +01:00
|
|
|
|
pg_hba_conf = os.path.join(pg_datadir, "pg_hba.conf")
|
2018-12-17 21:30:55 +01:00
|
|
|
|
|
|
|
|
|
# We can't just check if the file exists with os.path, since the
|
|
|
|
|
# current user likely doesn't have permission to read the
|
|
|
|
|
# pg_datadir directory.
|
2018-12-18 16:17:11 +01:00
|
|
|
|
if subprocess.call(["sudo", "test", "-e", pg_hba_conf]) == 0:
|
2018-12-17 21:30:55 +01:00
|
|
|
|
# Skip setup if it has been applied previously
|
|
|
|
|
return
|
|
|
|
|
|
2019-02-26 20:20:46 +01:00
|
|
|
|
run_as_root(["/usr/%s/bin/postgresql-%s-setup" % (postgres_dir, POSTGRES_VERSION), "initdb"],
|
|
|
|
|
sudo_args = ['-H'])
|
2018-12-17 21:30:55 +01:00
|
|
|
|
# Use vendored pg_hba.conf, which enables password authentication.
|
2019-02-26 20:20:46 +01:00
|
|
|
|
run_as_root(["cp", "-a", "puppet/zulip/files/postgresql/centos_pg_hba.conf", pg_hba_conf])
|
2018-12-17 21:30:55 +01:00
|
|
|
|
# Later steps will ensure postgres is started
|
2018-12-16 20:43:27 +01:00
|
|
|
|
|
2019-03-06 00:34:02 +01:00
|
|
|
|
# Link in tsearch data files
|
|
|
|
|
overwrite_symlink("/usr/share/myspell/en_US.dic", "/usr/pgsql-%s/share/tsearch_data/en_us.dict"
|
|
|
|
|
% (POSTGRES_VERSION,))
|
|
|
|
|
overwrite_symlink("/usr/share/myspell/en_US.aff", "/usr/pgsql-%s/share/tsearch_data/en_us.affix"
|
|
|
|
|
% (POSTGRES_VERSION,))
|
|
|
|
|
|
python: Convert function type annotations to Python 3 style.
Generated by com2ann (slightly patched to avoid also converting
assignment type annotations, which require Python 3.6), followed by
some manual whitespace adjustment, and six fixes for runtime issues:
- def __init__(self, token: Token, parent: Optional[Node]) -> None:
+ def __init__(self, token: Token, parent: "Optional[Node]") -> None:
-def main(options: argparse.Namespace) -> NoReturn:
+def main(options: argparse.Namespace) -> "NoReturn":
-def fetch_request(url: str, callback: Any, **kwargs: Any) -> Generator[Callable[..., Any], Any, None]:
+def fetch_request(url: str, callback: Any, **kwargs: Any) -> "Generator[Callable[..., Any], Any, None]":
-def assert_server_running(server: subprocess.Popen[bytes], log_file: Optional[str]) -> None:
+def assert_server_running(server: "subprocess.Popen[bytes]", log_file: Optional[str]) -> None:
-def server_is_up(server: subprocess.Popen[bytes], log_file: Optional[str]) -> bool:
+def server_is_up(server: "subprocess.Popen[bytes]", log_file: Optional[str]) -> bool:
- method_kwarg_pairs: List[FuncKwargPair],
+ method_kwarg_pairs: "List[FuncKwargPair]",
Signed-off-by: Anders Kaseorg <anders@zulipchat.com>
2020-04-19 03:48:37 +02:00
|
|
|
|
def main(options: argparse.Namespace) -> "NoReturn":
|
2016-07-27 22:27:13 +02:00
|
|
|
|
|
2017-07-27 23:22:52 +02:00
|
|
|
|
# yarn and management commands expect to be run from the root of the
|
2016-07-27 22:27:13 +02:00
|
|
|
|
# project.
|
|
|
|
|
os.chdir(ZULIP_PATH)
|
|
|
|
|
|
2017-06-15 12:13:35 +02:00
|
|
|
|
# hash the apt dependencies
|
|
|
|
|
sha_sum = hashlib.sha1()
|
|
|
|
|
|
2018-12-17 20:14:09 +01:00
|
|
|
|
for apt_depedency in SYSTEM_DEPENDENCIES:
|
2017-06-15 12:13:35 +02:00
|
|
|
|
sha_sum.update(apt_depedency.encode('utf8'))
|
2019-08-30 00:14:43 +02:00
|
|
|
|
if "debian" in os_families():
|
2018-12-17 20:20:02 +01:00
|
|
|
|
sha_sum.update(open('scripts/lib/setup-apt-repo', 'rb').read())
|
|
|
|
|
else:
|
2020-03-17 19:09:38 +01:00
|
|
|
|
# hash the content of setup-yum-repo*
|
2018-12-17 20:20:02 +01:00
|
|
|
|
sha_sum.update(open('scripts/lib/setup-yum-repo', 'rb').read())
|
2020-03-17 19:09:38 +01:00
|
|
|
|
|
|
|
|
|
# hash the content of build-pgroonga if pgroonga is built from source
|
|
|
|
|
if BUILD_PGROONGA_FROM_SOURCE:
|
|
|
|
|
sha_sum.update(open('scripts/lib/build-pgroonga', 'rb').read())
|
2017-06-15 12:13:35 +02:00
|
|
|
|
|
|
|
|
|
new_apt_dependencies_hash = sha_sum.hexdigest()
|
|
|
|
|
last_apt_dependencies_hash = None
|
2017-10-18 04:14:06 +02:00
|
|
|
|
apt_hash_file_path = os.path.join(UUID_VAR_PATH, "apt_dependencies_hash")
|
2018-07-18 23:50:16 +02:00
|
|
|
|
with open(apt_hash_file_path, 'a+') as hash_file:
|
|
|
|
|
hash_file.seek(0)
|
|
|
|
|
last_apt_dependencies_hash = hash_file.read()
|
2017-06-15 12:13:35 +02:00
|
|
|
|
|
|
|
|
|
if (new_apt_dependencies_hash != last_apt_dependencies_hash):
|
|
|
|
|
try:
|
2018-12-16 20:45:29 +01:00
|
|
|
|
install_system_deps()
|
2017-06-15 12:13:35 +02:00
|
|
|
|
except subprocess.CalledProcessError:
|
|
|
|
|
# Might be a failure due to network connection issues. Retrying...
|
2019-05-25 01:09:00 +02:00
|
|
|
|
print(WARNING + "Installing system dependencies failed; retrying..." + ENDC)
|
|
|
|
|
install_system_deps()
|
2018-06-08 18:51:24 +02:00
|
|
|
|
with open(apt_hash_file_path, 'w') as hash_file:
|
|
|
|
|
hash_file.write(new_apt_dependencies_hash)
|
2017-06-15 12:13:35 +02:00
|
|
|
|
else:
|
2017-09-25 23:47:18 +02:00
|
|
|
|
print("No changes to apt dependencies, so skipping apt operations.")
|
2015-08-17 06:37:14 +02:00
|
|
|
|
|
2017-07-27 23:22:52 +02:00
|
|
|
|
# Here we install node.
|
2018-09-12 21:04:29 +02:00
|
|
|
|
proxy_env = [
|
|
|
|
|
"env",
|
|
|
|
|
"http_proxy=" + os.environ.get("http_proxy", ""),
|
|
|
|
|
"https_proxy=" + os.environ.get("https_proxy", ""),
|
|
|
|
|
"no_proxy=" + os.environ.get("no_proxy", ""),
|
|
|
|
|
]
|
2019-02-26 20:20:46 +01:00
|
|
|
|
run_as_root(proxy_env + ["scripts/lib/install-node"], sudo_args = ['-H'])
|
2017-07-08 21:27:25 +02:00
|
|
|
|
|
2019-08-13 06:54:51 +02:00
|
|
|
|
if not os.access(NODE_MODULES_CACHE_PATH, os.W_OK):
|
|
|
|
|
run_as_root(["mkdir", "-p", NODE_MODULES_CACHE_PATH])
|
2019-08-14 23:58:26 +02:00
|
|
|
|
run_as_root(["chown", "%s:%s" % (os.getuid(), os.getgid()), NODE_MODULES_CACHE_PATH])
|
2019-08-13 06:54:51 +02:00
|
|
|
|
|
2017-07-27 23:22:52 +02:00
|
|
|
|
# This is a wrapper around `yarn`, which we run last since
|
|
|
|
|
# it can often fail due to network issues beyond our control.
|
2017-07-08 21:27:25 +02:00
|
|
|
|
try:
|
2017-07-27 23:22:52 +02:00
|
|
|
|
setup_node_modules(prefer_offline=True)
|
2017-07-08 21:27:25 +02:00
|
|
|
|
except subprocess.CalledProcessError:
|
2017-07-27 23:22:52 +02:00
|
|
|
|
print(WARNING + "`yarn install` failed; retrying..." + ENDC)
|
2019-07-03 02:52:56 +02:00
|
|
|
|
try:
|
|
|
|
|
setup_node_modules()
|
|
|
|
|
except subprocess.CalledProcessError:
|
|
|
|
|
print(FAIL +
|
|
|
|
|
"`yarn install` is failing; check your network connection (and proxy settings)."
|
|
|
|
|
+ ENDC)
|
|
|
|
|
sys.exit(1)
|
2017-07-08 21:27:25 +02:00
|
|
|
|
|
2018-08-03 02:09:42 +02:00
|
|
|
|
# Install shellcheck.
|
2019-09-24 21:54:33 +02:00
|
|
|
|
run_as_root(["tools/setup/install-shellcheck"])
|
2018-08-03 02:09:42 +02:00
|
|
|
|
|
2020-03-19 00:32:26 +01:00
|
|
|
|
# Install sgrep.
|
|
|
|
|
run_as_root(["tools/setup/install-sgrep"])
|
|
|
|
|
|
2017-12-19 06:49:51 +01:00
|
|
|
|
setup_venvs.main()
|
2015-08-17 06:37:14 +02:00
|
|
|
|
|
2019-02-26 20:20:46 +01:00
|
|
|
|
run_as_root(["cp", REPO_STOPWORDS_PATH, TSEARCH_STOPWORDS_PATH])
|
2015-08-20 22:40:06 +02:00
|
|
|
|
|
2020-04-20 16:54:20 +02:00
|
|
|
|
if is_circleci and not options.is_production_test_suite:
|
2019-02-26 20:20:46 +01:00
|
|
|
|
run_as_root(["service", "redis-server", "restart"])
|
|
|
|
|
run_as_root(["service", "memcached", "restart"])
|
2020-04-20 18:06:41 +02:00
|
|
|
|
if is_circleci:
|
|
|
|
|
run_as_root(["service", "rabbitmq-server", "restart"])
|
2019-02-26 20:20:46 +01:00
|
|
|
|
run_as_root(["service", "postgresql", "restart"])
|
2019-08-30 00:14:43 +02:00
|
|
|
|
elif "fedora" in os_families():
|
|
|
|
|
# These platforms don't enable and start services on
|
|
|
|
|
# installing their package, so we do that here.
|
2018-12-17 22:23:09 +01:00
|
|
|
|
for service in ["postgresql-%s" % (POSTGRES_VERSION,), "rabbitmq-server", "memcached", "redis"]:
|
2019-02-26 20:20:46 +01:00
|
|
|
|
run_as_root(["systemctl", "enable", service], sudo_args = ['-H'])
|
|
|
|
|
run_as_root(["systemctl", "start", service], sudo_args = ['-H'])
|
2019-06-10 03:00:04 +02:00
|
|
|
|
|
2019-07-19 08:06:34 +02:00
|
|
|
|
# If we imported modules after activating the virtualenv in this
|
|
|
|
|
# Python process, they could end up mismatching with modules we’ve
|
|
|
|
|
# already imported from outside the virtualenv. That seems like a
|
|
|
|
|
# bad idea, and empirically it can cause Python to segfault on
|
|
|
|
|
# certain cffi-related imports. Instead, start a new Python
|
|
|
|
|
# process inside the virtualenv.
|
|
|
|
|
activate_this = "/srv/zulip-py3-venv/bin/activate_this.py"
|
|
|
|
|
provision_inner = os.path.join(ZULIP_PATH, "tools", "lib", "provision_inner.py")
|
|
|
|
|
exec(open(activate_this).read(), dict(__file__=activate_this))
|
|
|
|
|
os.execvp(
|
|
|
|
|
provision_inner,
|
|
|
|
|
[
|
|
|
|
|
provision_inner,
|
|
|
|
|
*(["--force"] if options.is_force else []),
|
2020-04-20 16:54:20 +02:00
|
|
|
|
*(["--production-test-suite"] if options.is_production_test_suite else []),
|
2019-07-19 08:06:34 +02:00
|
|
|
|
]
|
|
|
|
|
)
|
2015-08-17 06:37:14 +02:00
|
|
|
|
|
2015-08-20 02:46:50 +02:00
|
|
|
|
if __name__ == "__main__":
|
2016-10-21 09:45:21 +02:00
|
|
|
|
description = ("Provision script to install Zulip")
|
|
|
|
|
parser = argparse.ArgumentParser(description=description)
|
|
|
|
|
parser.add_argument('--force', action='store_true', dest='is_force',
|
|
|
|
|
default=False,
|
|
|
|
|
help="Ignore all provisioning optimizations.")
|
|
|
|
|
|
2020-04-20 16:54:20 +02:00
|
|
|
|
parser.add_argument('--production-test-suite', action='store_true',
|
|
|
|
|
dest='is_production_test_suite',
|
2016-10-21 09:45:21 +02:00
|
|
|
|
default=False,
|
2020-04-20 16:54:20 +02:00
|
|
|
|
help="Provision for test suite with production settings.")
|
2016-10-21 09:45:21 +02:00
|
|
|
|
|
|
|
|
|
options = parser.parse_args()
|
2019-07-19 08:06:34 +02:00
|
|
|
|
main(options)
|