py3: Switch almost all shebang lines to use `python3`.
This causes `upgrade-zulip-from-git`, as well as a no-option run of
`tools/build-release-tarball`, to produce a Zulip install running
Python 3, rather than Python 2. In particular this means that the
virtualenv we create, in which all application code runs, is Python 3.
One shebang line, on `zulip-ec2-configure-interfaces`, explicitly
keeps Python 2, and at least one external ops script, `wal-e`, also
still runs on Python 2. See discussion on the respective previous
commits that made those explicit. There may also be some other
third-party scripts we use, outside of this source tree and running
outside our virtualenv, that still run on Python 2.
2017-08-02 23:15:16 +02:00
|
|
|
#!/usr/bin/env python3
|
2017-08-21 19:41:19 +02:00
|
|
|
import argparse
|
2016-01-10 20:58:11 +01:00
|
|
|
import datetime
|
2016-01-10 20:36:38 +01:00
|
|
|
import errno
|
2017-08-19 16:23:30 +02:00
|
|
|
import hashlib
|
2017-08-18 06:36:37 +02:00
|
|
|
import logging
|
2013-05-16 18:02:25 +02:00
|
|
|
import os
|
2013-11-13 21:54:30 +01:00
|
|
|
import pwd
|
2017-06-21 14:32:22 +02:00
|
|
|
import re
|
2018-07-18 23:26:44 +02:00
|
|
|
import shlex
|
2016-01-10 20:58:11 +01:00
|
|
|
import shutil
|
2016-04-06 17:15:31 +02:00
|
|
|
import subprocess
|
2016-01-10 20:58:11 +01:00
|
|
|
import sys
|
2018-07-27 01:23:27 +02:00
|
|
|
import tempfile
|
2016-01-10 20:58:11 +01:00
|
|
|
import time
|
2017-08-19 16:23:30 +02:00
|
|
|
import json
|
2017-10-18 04:14:06 +02:00
|
|
|
import uuid
|
2018-12-15 07:05:27 +01:00
|
|
|
import configparser
|
2013-02-19 02:36:59 +01:00
|
|
|
|
2016-07-12 17:08:35 +02:00
|
|
|
if False:
|
2018-12-17 19:52:08 +01:00
|
|
|
# See https://zulip.readthedocs.io/en/latest/testing/mypy.html#mypy-in-production-scripts
|
2018-12-15 07:05:27 +01:00
|
|
|
from typing import Sequence, Set, Any, Dict, List, Optional
|
2016-07-12 17:08:35 +02:00
|
|
|
|
2013-10-04 19:19:57 +02:00
|
|
|
DEPLOYMENTS_DIR = "/home/zulip/deployments"
|
2013-05-16 18:02:25 +02:00
|
|
|
LOCK_DIR = os.path.join(DEPLOYMENTS_DIR, "lock")
|
|
|
|
TIMESTAMP_FORMAT = '%Y-%m-%d-%H-%M-%S'
|
2013-06-05 00:21:47 +02:00
|
|
|
|
|
|
|
# Color codes
|
|
|
|
OKBLUE = '\033[94m'
|
|
|
|
OKGREEN = '\033[92m'
|
|
|
|
WARNING = '\033[93m'
|
|
|
|
FAIL = '\033[91m'
|
|
|
|
ENDC = '\033[0m'
|
2017-01-11 17:07:12 +01:00
|
|
|
BLACKONYELLOW = '\x1b[0;30;43m'
|
|
|
|
WHITEONRED = '\x1b[0;37;41m'
|
2017-07-06 06:09:45 +02:00
|
|
|
BOLDRED = '\x1B[1;31m'
|
|
|
|
|
|
|
|
GREEN = '\x1b[32m'
|
|
|
|
YELLOW = '\x1b[33m'
|
|
|
|
BLUE = '\x1b[34m'
|
|
|
|
MAGENTA = '\x1b[35m'
|
|
|
|
CYAN = '\x1b[36m'
|
2013-11-13 20:57:31 +01:00
|
|
|
|
2018-07-27 01:23:27 +02:00
|
|
|
def overwrite_symlink(src, dst):
|
|
|
|
# type: (str, str) -> None
|
|
|
|
while True:
|
|
|
|
tmp = tempfile.mktemp(
|
|
|
|
prefix='.' + os.path.basename(dst) + '.',
|
|
|
|
dir=os.path.dirname(dst))
|
|
|
|
try:
|
|
|
|
os.symlink(src, tmp)
|
|
|
|
except FileExistsError:
|
|
|
|
continue
|
|
|
|
break
|
|
|
|
try:
|
|
|
|
os.rename(tmp, dst)
|
|
|
|
except Exception:
|
|
|
|
os.remove(tmp)
|
|
|
|
raise
|
|
|
|
|
2017-09-23 20:42:53 +02:00
|
|
|
def parse_cache_script_args(description):
|
2018-05-10 18:54:59 +02:00
|
|
|
# type: (str) -> argparse.Namespace
|
2017-09-23 20:42:53 +02:00
|
|
|
parser = argparse.ArgumentParser(description=description)
|
|
|
|
|
|
|
|
parser.add_argument(
|
|
|
|
"--threshold", dest="threshold_days", type=int, default=14,
|
|
|
|
nargs="?", metavar="<days>", help="Any cache which is not in "
|
|
|
|
"use by a deployment not older than threshold days(current "
|
|
|
|
"installation in dev) and older than threshold days will be "
|
|
|
|
"deleted. (defaults to 14)")
|
|
|
|
parser.add_argument(
|
|
|
|
"--dry-run", dest="dry_run", action="store_true",
|
|
|
|
help="If specified then script will only print the caches "
|
|
|
|
"that it will delete/keep back. It will not delete any cache.")
|
|
|
|
parser.add_argument(
|
|
|
|
"--verbose", dest="verbose", action="store_true",
|
|
|
|
help="If specified then script will print a detailed report "
|
|
|
|
"of what is being will deleted/kept back.")
|
|
|
|
|
|
|
|
args = parser.parse_args()
|
|
|
|
args.verbose |= args.dry_run # Always print a detailed report in case of dry run.
|
|
|
|
return args
|
|
|
|
|
2017-06-21 14:32:22 +02:00
|
|
|
def get_deployment_version(extract_path):
|
|
|
|
# type: (str) -> str
|
|
|
|
version = '0.0.0'
|
|
|
|
for item in os.listdir(extract_path):
|
|
|
|
item_path = os.path.join(extract_path, item)
|
|
|
|
if item.startswith('zulip-server') and os.path.isdir(item_path):
|
|
|
|
with open(os.path.join(item_path, 'version.py')) as f:
|
|
|
|
result = re.search('ZULIP_VERSION = "(.*)"', f.read())
|
|
|
|
if result:
|
|
|
|
version = result.groups()[0]
|
|
|
|
break
|
|
|
|
return version
|
|
|
|
|
|
|
|
def is_invalid_upgrade(current_version, new_version):
|
|
|
|
# type: (str, str) -> bool
|
|
|
|
if new_version > '1.4.3' and current_version <= '1.3.10':
|
|
|
|
return True
|
|
|
|
return False
|
|
|
|
|
2016-07-12 16:55:20 +02:00
|
|
|
def subprocess_text_output(args):
|
2016-07-12 17:08:35 +02:00
|
|
|
# type: (Sequence[str]) -> str
|
2016-07-12 16:55:20 +02:00
|
|
|
return subprocess.check_output(args, universal_newlines=True).strip()
|
|
|
|
|
2013-11-13 21:54:30 +01:00
|
|
|
def su_to_zulip():
|
2016-07-12 17:08:35 +02:00
|
|
|
# type: () -> None
|
2013-11-13 21:54:30 +01:00
|
|
|
pwent = pwd.getpwnam("zulip")
|
|
|
|
os.setgid(pwent.pw_gid)
|
|
|
|
os.setuid(pwent.pw_uid)
|
2016-07-29 22:35:07 +02:00
|
|
|
os.environ['HOME'] = os.path.abspath(os.path.join(DEPLOYMENTS_DIR, '..'))
|
2013-11-13 21:54:30 +01:00
|
|
|
|
2013-11-13 20:57:31 +01:00
|
|
|
def make_deploy_path():
|
2016-07-12 17:08:35 +02:00
|
|
|
# type: () -> str
|
2013-11-13 20:57:31 +01:00
|
|
|
timestamp = datetime.datetime.now().strftime(TIMESTAMP_FORMAT)
|
|
|
|
return os.path.join(DEPLOYMENTS_DIR, timestamp)
|
|
|
|
|
|
|
|
if __name__ == '__main__':
|
|
|
|
cmd = sys.argv[1]
|
|
|
|
if cmd == 'make_deploy_path':
|
2015-11-01 17:11:06 +01:00
|
|
|
print(make_deploy_path())
|
2016-01-10 20:36:38 +01:00
|
|
|
|
2017-10-18 04:14:06 +02:00
|
|
|
def get_dev_uuid_var_path(create_if_missing=False):
|
|
|
|
# type: (bool) -> str
|
2017-11-08 03:40:04 +01:00
|
|
|
zulip_path = os.path.realpath(os.path.dirname(os.path.dirname(
|
|
|
|
os.path.dirname(os.path.realpath(__file__)))))
|
2017-10-18 04:14:06 +02:00
|
|
|
uuid_path = os.path.join(os.path.realpath(os.path.dirname(zulip_path)), ".zulip-dev-uuid")
|
|
|
|
if os.path.exists(uuid_path):
|
|
|
|
with open(uuid_path) as f:
|
|
|
|
zulip_uuid = f.read().strip()
|
|
|
|
else:
|
|
|
|
if create_if_missing:
|
|
|
|
zulip_uuid = str(uuid.uuid4())
|
|
|
|
# We need sudo here, since the path will be under /srv/ in the
|
|
|
|
# development environment.
|
|
|
|
subprocess.check_call(["sudo", "/bin/bash", "-c",
|
|
|
|
"echo %s > %s" % (zulip_uuid, uuid_path)])
|
|
|
|
else:
|
|
|
|
raise AssertionError("Missing UUID file; please run tools/provision!")
|
|
|
|
|
|
|
|
result_path = os.path.join(zulip_path, "var", zulip_uuid)
|
2017-10-25 20:06:11 +02:00
|
|
|
os.makedirs(result_path, exist_ok=True)
|
2017-10-18 04:14:06 +02:00
|
|
|
return result_path
|
|
|
|
|
2016-01-10 20:58:11 +01:00
|
|
|
def get_deployment_lock(error_rerun_script):
|
2016-07-12 17:08:35 +02:00
|
|
|
# type: (str) -> None
|
2016-01-10 20:58:11 +01:00
|
|
|
start_time = time.time()
|
|
|
|
got_lock = False
|
|
|
|
while time.time() - start_time < 300:
|
|
|
|
try:
|
|
|
|
os.mkdir(LOCK_DIR)
|
|
|
|
got_lock = True
|
|
|
|
break
|
|
|
|
except OSError:
|
2017-01-24 05:50:04 +01:00
|
|
|
print(WARNING + "Another deployment in progress; waiting for lock... " +
|
|
|
|
"(If no deployment is running, rmdir %s)" % (LOCK_DIR,) + ENDC)
|
2016-01-10 21:03:02 +01:00
|
|
|
sys.stdout.flush()
|
2016-01-10 20:58:11 +01:00
|
|
|
time.sleep(3)
|
|
|
|
|
|
|
|
if not got_lock:
|
2017-01-24 05:50:04 +01:00
|
|
|
print(FAIL + "Deployment already in progress. Please run\n" +
|
|
|
|
" %s\n" % (error_rerun_script,) +
|
|
|
|
"manually when the previous deployment finishes, or run\n" +
|
|
|
|
" rmdir %s\n" % (LOCK_DIR,) +
|
|
|
|
"if the previous deployment crashed." +
|
|
|
|
ENDC)
|
2016-01-10 20:58:11 +01:00
|
|
|
sys.exit(1)
|
|
|
|
|
|
|
|
def release_deployment_lock():
|
2016-07-12 17:08:35 +02:00
|
|
|
# type: () -> None
|
2016-01-10 20:58:11 +01:00
|
|
|
shutil.rmtree(LOCK_DIR)
|
2016-04-06 17:15:31 +02:00
|
|
|
|
2016-08-18 13:50:36 +02:00
|
|
|
def run(args, **kwargs):
|
2017-03-03 20:30:49 +01:00
|
|
|
# type: (Sequence[str], **Any) -> None
|
2016-04-06 17:15:31 +02:00
|
|
|
# Output what we're doing in the `set -x` style
|
2018-07-18 23:26:44 +02:00
|
|
|
print("+ %s" % (" ".join(map(shlex.quote, args)),))
|
2016-09-23 11:27:14 +02:00
|
|
|
|
2016-10-27 21:07:55 +02:00
|
|
|
try:
|
|
|
|
subprocess.check_call(args, **kwargs)
|
|
|
|
except subprocess.CalledProcessError:
|
2017-01-11 17:07:12 +01:00
|
|
|
print()
|
2018-07-18 23:26:44 +02:00
|
|
|
print(WHITEONRED + "Error running a subcommand of %s: %s" %
|
|
|
|
(sys.argv[0], " ".join(map(shlex.quote, args))) +
|
2017-01-24 05:50:04 +01:00
|
|
|
ENDC)
|
|
|
|
print(WHITEONRED + "Actual error output for the subcommand is just above this." +
|
|
|
|
ENDC)
|
2017-01-11 17:07:12 +01:00
|
|
|
print()
|
2016-10-27 21:07:55 +02:00
|
|
|
raise
|
2017-08-18 06:36:37 +02:00
|
|
|
|
|
|
|
def log_management_command(cmd, log_path):
|
2018-05-10 18:54:59 +02:00
|
|
|
# type: (str, str) -> None
|
2017-08-18 06:36:37 +02:00
|
|
|
log_dir = os.path.dirname(log_path)
|
|
|
|
if not os.path.exists(log_dir):
|
|
|
|
os.makedirs(log_dir)
|
|
|
|
|
|
|
|
formatter = logging.Formatter("%(asctime)s: %(message)s")
|
|
|
|
file_handler = logging.FileHandler(log_path)
|
|
|
|
file_handler.setFormatter(formatter)
|
|
|
|
logger = logging.getLogger("zulip.management")
|
|
|
|
logger.addHandler(file_handler)
|
|
|
|
logger.setLevel(logging.INFO)
|
|
|
|
|
|
|
|
logger.info("Ran '%s'" % (cmd,))
|
2017-08-18 19:14:09 +02:00
|
|
|
|
|
|
|
def get_environment():
|
2018-05-10 18:54:59 +02:00
|
|
|
# type: () -> str
|
2017-08-18 19:14:09 +02:00
|
|
|
if os.path.exists(DEPLOYMENTS_DIR):
|
|
|
|
return "prod"
|
|
|
|
if os.environ.get("TRAVIS"):
|
|
|
|
return "travis"
|
|
|
|
return "dev"
|
2017-08-18 20:34:00 +02:00
|
|
|
|
|
|
|
def get_recent_deployments(threshold_days):
|
2018-05-10 18:54:59 +02:00
|
|
|
# type: (int) -> Set[str]
|
2017-08-18 20:34:00 +02:00
|
|
|
# Returns a list of deployments not older than threshold days
|
|
|
|
# including `/root/zulip` directory if it exists.
|
|
|
|
recent = set()
|
|
|
|
threshold_date = datetime.datetime.now() - datetime.timedelta(days=threshold_days)
|
|
|
|
for dir_name in os.listdir(DEPLOYMENTS_DIR):
|
2017-10-29 21:06:30 +01:00
|
|
|
target_dir = os.path.join(DEPLOYMENTS_DIR, dir_name)
|
|
|
|
if not os.path.isdir(target_dir):
|
2017-09-26 00:11:18 +02:00
|
|
|
# Skip things like uwsgi sockets, symlinks, etc.
|
|
|
|
continue
|
2017-10-29 21:06:30 +01:00
|
|
|
if not os.path.exists(os.path.join(target_dir, "zerver")):
|
2017-09-26 00:11:18 +02:00
|
|
|
# Skip things like "lock" that aren't actually a deployment directory
|
2017-08-28 03:16:15 +02:00
|
|
|
continue
|
2017-08-18 20:34:00 +02:00
|
|
|
try:
|
|
|
|
date = datetime.datetime.strptime(dir_name, TIMESTAMP_FORMAT)
|
|
|
|
if date >= threshold_date:
|
2017-10-29 21:06:30 +01:00
|
|
|
recent.add(target_dir)
|
2017-08-18 20:34:00 +02:00
|
|
|
except ValueError:
|
|
|
|
# Always include deployments whose name is not in the format of a timestamp.
|
2017-10-29 21:06:30 +01:00
|
|
|
recent.add(target_dir)
|
2017-10-29 21:07:41 +01:00
|
|
|
# If it is a symlink then include the target as well.
|
|
|
|
if os.path.islink(target_dir):
|
|
|
|
recent.add(os.path.realpath(target_dir))
|
2017-08-18 20:34:00 +02:00
|
|
|
if os.path.exists("/root/zulip"):
|
|
|
|
recent.add("/root/zulip")
|
|
|
|
return recent
|
2017-08-19 20:13:44 +02:00
|
|
|
|
|
|
|
def get_threshold_timestamp(threshold_days):
|
|
|
|
# type: (int) -> int
|
|
|
|
# Given number of days, this function returns timestamp corresponding
|
|
|
|
# to the time prior to given number of days.
|
|
|
|
threshold = datetime.datetime.now() - datetime.timedelta(days=threshold_days)
|
|
|
|
threshold_timestamp = int(time.mktime(threshold.utctimetuple()))
|
|
|
|
return threshold_timestamp
|
2017-08-20 00:07:31 +02:00
|
|
|
|
|
|
|
def get_caches_to_be_purged(caches_dir, caches_in_use, threshold_days):
|
2018-05-10 18:54:59 +02:00
|
|
|
# type: (str, Set[str], int) -> Set[str]
|
2017-08-20 00:07:31 +02:00
|
|
|
# Given a directory containing caches, a list of caches in use
|
|
|
|
# and threshold days, this function return a list of caches
|
|
|
|
# which can be purged. Remove the cache only if it is:
|
|
|
|
# 1: Not in use by the current installation(in dev as well as in prod).
|
|
|
|
# 2: Not in use by a deployment not older than `threshold_days`(in prod).
|
|
|
|
# 3: Not in use by '/root/zulip'.
|
|
|
|
# 4: Not older than `threshold_days`.
|
|
|
|
caches_to_purge = set()
|
|
|
|
threshold_timestamp = get_threshold_timestamp(threshold_days)
|
|
|
|
for cache_dir_base in os.listdir(caches_dir):
|
|
|
|
cache_dir = os.path.join(caches_dir, cache_dir_base)
|
|
|
|
if cache_dir in caches_in_use:
|
|
|
|
# Never purge a cache which is in use.
|
|
|
|
continue
|
|
|
|
if os.path.getctime(cache_dir) < threshold_timestamp:
|
|
|
|
caches_to_purge.add(cache_dir)
|
|
|
|
return caches_to_purge
|
2017-08-23 22:44:28 +02:00
|
|
|
|
2017-09-23 21:21:55 +02:00
|
|
|
def purge_unused_caches(caches_dir, caches_in_use, cache_type, args):
|
2018-05-10 18:54:59 +02:00
|
|
|
# type: (str, Set[str], str, argparse.Namespace) -> None
|
2017-08-23 22:44:28 +02:00
|
|
|
all_caches = set([os.path.join(caches_dir, cache) for cache in os.listdir(caches_dir)])
|
2017-09-23 20:25:26 +02:00
|
|
|
caches_to_purge = get_caches_to_be_purged(caches_dir, caches_in_use, args.threshold_days)
|
2017-08-23 22:44:28 +02:00
|
|
|
caches_to_keep = all_caches - caches_to_purge
|
|
|
|
|
2017-09-23 21:15:13 +02:00
|
|
|
may_be_perform_purging(
|
|
|
|
caches_to_purge, caches_to_keep, cache_type, args.dry_run, args.verbose)
|
2017-09-26 01:12:29 +02:00
|
|
|
if args.verbose:
|
|
|
|
print("Done!")
|
2017-08-19 16:23:30 +02:00
|
|
|
|
|
|
|
def generate_sha1sum_emoji(zulip_path):
|
2018-05-10 18:54:59 +02:00
|
|
|
# type: (str) -> str
|
2017-08-19 16:23:30 +02:00
|
|
|
ZULIP_EMOJI_DIR = os.path.join(zulip_path, 'tools', 'setup', 'emoji')
|
|
|
|
sha = hashlib.sha1()
|
|
|
|
|
2017-11-08 19:40:43 +01:00
|
|
|
filenames = ['emoji_map.json', 'build_emoji', 'emoji_setup_utils.py', 'emoji_names.py']
|
2017-08-19 16:23:30 +02:00
|
|
|
|
|
|
|
for filename in filenames:
|
|
|
|
file_path = os.path.join(ZULIP_EMOJI_DIR, filename)
|
|
|
|
with open(file_path, 'rb') as reader:
|
|
|
|
sha.update(reader.read())
|
|
|
|
|
2018-03-13 20:34:31 +01:00
|
|
|
# Take into account the version of `emoji-datasource-google` package
|
|
|
|
# while generating success stamp.
|
2017-08-19 16:23:30 +02:00
|
|
|
PACKAGE_FILE_PATH = os.path.join(zulip_path, 'package.json')
|
|
|
|
with open(PACKAGE_FILE_PATH, 'r') as fp:
|
|
|
|
parsed_package_file = json.load(fp)
|
2017-09-26 02:01:56 +02:00
|
|
|
dependency_data = parsed_package_file['dependencies']
|
|
|
|
|
2018-03-13 20:34:31 +01:00
|
|
|
if 'emoji-datasource-google' in dependency_data:
|
|
|
|
emoji_datasource_version = dependency_data['emoji-datasource-google'].encode('utf-8')
|
2017-09-26 02:01:56 +02:00
|
|
|
else:
|
|
|
|
emoji_datasource_version = b"0"
|
2017-08-19 16:23:30 +02:00
|
|
|
sha.update(emoji_datasource_version)
|
|
|
|
|
|
|
|
return sha.hexdigest()
|
2017-08-30 23:58:00 +02:00
|
|
|
|
2017-09-23 21:15:13 +02:00
|
|
|
def may_be_perform_purging(dirs_to_purge, dirs_to_keep, dir_type, dry_run, verbose):
|
2018-05-10 18:54:59 +02:00
|
|
|
# type: (Set[str], Set[str], str, bool, bool) -> None
|
2017-08-30 23:58:00 +02:00
|
|
|
if dry_run:
|
|
|
|
print("Performing a dry run...")
|
|
|
|
else:
|
|
|
|
print("Cleaning unused %ss..." % (dir_type,))
|
|
|
|
|
|
|
|
for directory in dirs_to_purge:
|
2017-09-23 21:15:13 +02:00
|
|
|
if verbose:
|
|
|
|
print("Cleaning unused %s: %s" % (dir_type, directory))
|
2017-08-30 23:58:00 +02:00
|
|
|
if not dry_run:
|
|
|
|
subprocess.check_call(["sudo", "rm", "-rf", directory])
|
|
|
|
|
|
|
|
for directory in dirs_to_keep:
|
2017-09-23 21:15:13 +02:00
|
|
|
if verbose:
|
|
|
|
print("Keeping used %s: %s" % (dir_type, directory))
|
2018-05-28 21:55:07 +02:00
|
|
|
|
|
|
|
def parse_lsb_release():
|
|
|
|
# type: () -> Dict[str, str]
|
2018-12-10 15:11:08 +01:00
|
|
|
distro_info = {} # type: Dict[str, str]
|
|
|
|
if os.path.exists("/etc/redhat-release"):
|
|
|
|
with open('/etc/redhat-release', 'r') as fp:
|
|
|
|
info = fp.read().strip().split(' ')
|
|
|
|
vendor = info[0]
|
2018-12-18 15:40:05 +01:00
|
|
|
if vendor == 'Centos':
|
2018-12-17 19:41:03 +01:00
|
|
|
# E.g. "CentOS Linux release 7.5.1804 (Core)"
|
|
|
|
codename = vendor.lower() + info[3][0]
|
2018-12-18 15:40:05 +01:00
|
|
|
elif vendor == 'Fedora':
|
2018-12-17 19:41:03 +01:00
|
|
|
# E.g. "Fedora release 29 (Twenty Nine)"
|
|
|
|
codename = vendor.lower() + info[2]
|
2018-12-18 15:40:05 +01:00
|
|
|
elif vendor == 'Red':
|
|
|
|
# E.g. "Red Hat Enterprise Linux Server release 7.6 (Maipo)"
|
|
|
|
vendor = 'RedHat'
|
|
|
|
codename = 'rhel' + info[6][0] # 7
|
2018-12-10 15:11:08 +01:00
|
|
|
distro_info = dict(
|
|
|
|
DISTRIB_CODENAME=codename,
|
|
|
|
DISTRIB_ID=vendor
|
|
|
|
)
|
|
|
|
return distro_info
|
2018-07-13 13:41:08 +02:00
|
|
|
try:
|
|
|
|
# For performance reasons, we read /etc/lsb-release directly,
|
|
|
|
# rather than using the lsb_release command; this saves ~50ms
|
|
|
|
# in several places in provisioning and the installer
|
|
|
|
with open('/etc/lsb-release', 'r') as fp:
|
|
|
|
data = [line.strip().split('=') for line in fp]
|
|
|
|
for k, v in data:
|
|
|
|
if k not in ['DISTRIB_CODENAME', 'DISTRIB_ID']:
|
|
|
|
# We only return to the caller the values that we get
|
|
|
|
# from lsb_release in the exception code path.
|
|
|
|
continue
|
|
|
|
distro_info[k] = v
|
|
|
|
except FileNotFoundError:
|
|
|
|
# Unfortunately, Debian stretch doesn't yet have an
|
|
|
|
# /etc/lsb-release, so we instead fetch the pieces of data
|
|
|
|
# that we use from the `lsb_release` command directly.
|
|
|
|
vendor = subprocess_text_output(["lsb_release", "-is"])
|
|
|
|
codename = subprocess_text_output(["lsb_release", "-cs"])
|
|
|
|
distro_info = dict(
|
|
|
|
DISTRIB_CODENAME=codename,
|
|
|
|
DISTRIB_ID=vendor
|
|
|
|
)
|
2018-05-28 21:55:07 +02:00
|
|
|
return distro_info
|
2018-06-14 14:19:27 +02:00
|
|
|
|
2018-06-22 12:56:25 +02:00
|
|
|
def file_or_package_hash_updated(paths, hash_name, is_force, package_versions=[]):
|
|
|
|
# type: (List[str], str, bool, List[str]) -> bool
|
|
|
|
# Check whether the files or package_versions passed as arguments
|
|
|
|
# changed compared to the last execution.
|
2018-06-14 14:19:27 +02:00
|
|
|
sha1sum = hashlib.sha1()
|
|
|
|
for path in paths:
|
|
|
|
with open(path, 'rb') as file_to_hash:
|
|
|
|
sha1sum.update(file_to_hash.read())
|
|
|
|
|
2018-06-22 12:56:25 +02:00
|
|
|
# The ouput of tools like build_pygments_data depends
|
|
|
|
# on the version of some pip packages as well.
|
|
|
|
for package_version in package_versions:
|
|
|
|
sha1sum.update(package_version.encode("utf-8"))
|
|
|
|
|
2018-06-14 14:19:27 +02:00
|
|
|
hash_path = os.path.join(get_dev_uuid_var_path(), hash_name)
|
|
|
|
new_hash = sha1sum.hexdigest()
|
2018-07-18 23:50:15 +02:00
|
|
|
with open(hash_path, 'a+') as hash_file:
|
|
|
|
hash_file.seek(0)
|
2018-06-14 14:19:27 +02:00
|
|
|
last_hash = hash_file.read()
|
|
|
|
|
2018-07-18 23:50:15 +02:00
|
|
|
if is_force or (new_hash != last_hash):
|
|
|
|
hash_file.seek(0)
|
|
|
|
hash_file.truncate()
|
2018-06-14 14:19:27 +02:00
|
|
|
hash_file.write(new_hash)
|
2018-07-18 23:50:15 +02:00
|
|
|
return True
|
2018-06-14 14:19:27 +02:00
|
|
|
return False
|
2018-11-15 10:53:34 +01:00
|
|
|
|
|
|
|
def is_root() -> bool:
|
|
|
|
if 'posix' in os.name and os.geteuid() == 0:
|
|
|
|
return True
|
|
|
|
return False
|
|
|
|
|
2018-11-19 19:50:25 +01:00
|
|
|
def assert_not_running_as_root() -> None:
|
2018-11-15 10:53:34 +01:00
|
|
|
script_name = os.path.abspath(sys.argv[0])
|
|
|
|
if is_root():
|
|
|
|
msg = ("{shortname} should not be run as root. Use `su zulip` to switch to the 'zulip'\n"
|
|
|
|
"user before rerunning this, or use \n su zulip -c '{name} ...'\n"
|
|
|
|
"to switch users and run this as a single command.").format(
|
|
|
|
name=script_name,
|
|
|
|
shortname=os.path.basename(script_name))
|
|
|
|
print(msg)
|
|
|
|
sys.exit(1)
|
|
|
|
|
2018-11-19 19:50:25 +01:00
|
|
|
def assert_running_as_root(strip_lib_from_paths: bool=False) -> None:
|
2018-11-15 10:53:34 +01:00
|
|
|
script_name = os.path.abspath(sys.argv[0])
|
|
|
|
# Since these Python scripts are run inside a thin shell wrapper,
|
|
|
|
# we need to replace the paths in order to ensure we instruct
|
|
|
|
# users to (re)run the right command.
|
|
|
|
if strip_lib_from_paths:
|
|
|
|
script_name = script_name.replace("scripts/lib/upgrade", "scripts/upgrade")
|
|
|
|
if not is_root():
|
|
|
|
print("{} must be run as root.".format(script_name))
|
|
|
|
sys.exit(1)
|
2018-12-15 07:05:27 +01:00
|
|
|
|
|
|
|
def get_config(config_file, section, key, default_value=""):
|
|
|
|
# type: (configparser.RawConfigParser, str, str, str) -> str
|
|
|
|
if config_file.has_option(section, key):
|
|
|
|
return config_file.get(section, key)
|
|
|
|
return default_value
|
|
|
|
|
|
|
|
def get_config_file() -> configparser.RawConfigParser:
|
|
|
|
config_file = configparser.RawConfigParser()
|
|
|
|
config_file.read("/etc/zulip/zulip.conf")
|
|
|
|
return config_file
|
|
|
|
|
|
|
|
def get_deploy_options(config_file):
|
|
|
|
# type: (configparser.RawConfigParser) -> List[str]
|
|
|
|
return get_config(config_file, 'deployment', 'deploy_options', "").strip().split()
|