3 # Copyright (c) 2003 Intel Corporation
6 # Copyright (c) 2004-2007 The Trustees of Princeton University
8 # expected /proc/partitions format
10 import os, sys, string
16 from Exceptions import *
18 import BootServerRequest
24 Download core + extensions bootstrapfs tarballs and install on the hard drive
26 Expect the following variables from the store:
27 SYSIMG_PATH the path where the system image will be mounted
28 PARTITIONS dictionary of generic part. types (root/swap)
29 and their associated devices.
30 NODE_ID the id of this machine
32 Sets the following variables:
33 TEMP_BOOTCD_PATH where the boot cd is remounted in the temp
35 ROOT_MOUNTED set to 1 when the the base logical volumes
39 log.write( "\n\nStep: Install: bootstrapfs tarball.\n" )
41 # make sure we have the variables we need
43 SYSIMG_PATH= vars["SYSIMG_PATH"]
45 raise ValueError, "SYSIMG_PATH"
47 PARTITIONS= vars["PARTITIONS"]
48 if PARTITIONS == None:
49 raise ValueError, "PARTITIONS"
51 NODE_ID= vars["NODE_ID"]
53 raise ValueError, "NODE_ID"
55 VERSION=vars['VERSION'] or 'unknown'
58 raise BootManagerException, "Missing variable in vars: %s\n" % var
59 except ValueError, var:
60 raise BootManagerException, "Variable in vars, shouldn't be: %s\n" % var
64 # make sure the required partitions exist
65 val= PARTITIONS["root"]
66 val= PARTITIONS["swap"]
67 val= PARTITIONS["vservers"]
68 except KeyError, part:
69 log.write( "Missing partition in PARTITIONS: %s\n" % part )
72 bs_request= BootServerRequest.BootServerRequest(vars)
74 log.write( "turning on swap space\n" )
75 utils.sysexec( "swapon %s" % PARTITIONS["swap"], log )
77 # make sure the sysimg dir is present
78 utils.makedirs( SYSIMG_PATH )
80 log.write( "mounting root file system\n" )
81 utils.sysexec( "mount -t ext3 %s %s" % (PARTITIONS["root"],SYSIMG_PATH), log )
83 log.write( "mounting vserver partition in root file system\n" )
84 utils.makedirs( SYSIMG_PATH + "/vservers" )
85 utils.sysexec( "mount -t ext3 %s %s/vservers" % (PARTITIONS["vservers"],
88 vars['ROOT_MOUNTED']= 1
92 node_flavour = BootAPI.call_api_function(vars, "GetNodeFlavour", (NODE_ID,) )
93 nodefamily = node_flavour['nodefamily']
94 extensions = node_flavour['extensions']
95 plain = node_flavour['plain']
97 raise BootManagerException ("Could not call GetNodeFlavour - need PLCAPI-5.0")
99 # the 'plain' option is for tests mostly
101 download_suffix=".tar"
103 log.write("Using plain bootstrapfs images\n")
105 download_suffix=".tar.bz2"
106 uncompress_option="-j"
107 log.write("Using compressed bootstrapfs images\n")
109 log.write ("Using nodefamily=%s\n"%(nodefamily))
111 log.write("Installing only core software\n")
113 log.write("Requested extensions %r" % extensions)
115 bootstrapfs_names = [ nodefamily ] + extensions
117 for name in bootstrapfs_names:
118 tarball = "bootstrapfs-%s%s"%(name,download_suffix)
119 source_file= "/boot/%s" % (tarball)
120 dest_file= "%s/%s" % (SYSIMG_PATH, tarball)
122 source_hash_file= "/boot/%s.sha1sum" % (tarball)
123 dest_hash_file= "%s/%s.sha1sum" % (SYSIMG_PATH, tarball)
125 # 30 is the connect timeout, 14400 is the max transfer time in
127 log.write( "downloading %s\n" % source_file )
128 result = bs_request.DownloadFile( source_file, None, None,
133 # Download SHA1 checksum file
134 log.write( "downloading sha1sum for %s\n"%source_file)
135 result = bs_request.DownloadFile( source_hash_file, None, None,
136 1, 1, dest_hash_file,
139 log.write( "verifying sha1sum for %s\n"%source_file)
140 if not utils.check_file_hash(dest_file, dest_hash_file):
141 raise BootManagerException, "FATAL: SHA1 checksum does not match between %s and %s" % (source_file, source_hash_file)
143 log.write( "extracting %s in %s\n" % (dest_file,SYSIMG_PATH) )
144 result = utils.sysexec( "tar -C %s -xpf %s %s" % (SYSIMG_PATH,dest_file,uncompress_option), log )
146 utils.removefile( dest_file )
148 # the main tarball is required
149 if name == nodefamily:
150 raise BootManagerException, "FATAL: Unable to download main tarball %s from server." % \
152 # for extensions, just print a warning
154 log.write("WARNING: tarball for extension %s not found\n"%(name))
156 # copy resolv.conf from the base system into our temp dir
157 # so DNS lookups work correctly while we are chrooted
158 log.write( "Copying resolv.conf to temp dir\n" )
159 utils.sysexec( "cp /etc/resolv.conf %s/etc/" % SYSIMG_PATH, log )
161 # Copy the boot server certificate(s) and GPG public key to
162 # /usr/boot in the temp dir.
163 log.write( "Copying boot server certificates and public key\n" )
165 if os.path.exists("/usr/boot"):
166 utils.makedirs(SYSIMG_PATH + "/usr")
167 shutil.copytree("/usr/boot", SYSIMG_PATH + "/usr/boot")
168 elif os.path.exists("/usr/bootme"):
169 utils.makedirs(SYSIMG_PATH + "/usr/boot")
170 boot_server = file("/usr/bootme/BOOTSERVER").readline().strip()
171 shutil.copy("/usr/bootme/cacert/" + boot_server + "/cacert.pem",
172 SYSIMG_PATH + "/usr/boot/cacert.pem")
173 file(SYSIMG_PATH + "/usr/boot/boot_server", "w").write(boot_server)
174 shutil.copy("/usr/bootme/pubring.gpg", SYSIMG_PATH + "/usr/boot/pubring.gpg")
176 # For backward compatibility
177 if os.path.exists("/usr/bootme"):
178 utils.makedirs(SYSIMG_PATH + "/mnt/cdrom")
179 shutil.copytree("/usr/bootme", SYSIMG_PATH + "/mnt/cdrom/bootme")
181 # Import the GPG key into the RPM database so that RPMS can be verified
182 utils.makedirs(SYSIMG_PATH + "/etc/pki/rpm-gpg")
183 utils.sysexec("gpg --homedir=/root --export --armor" \
184 " --no-default-keyring --keyring %s/usr/boot/pubring.gpg" \
185 " >%s/etc/pki/rpm-gpg/RPM-GPG-KEY-planetlab" % (SYSIMG_PATH, SYSIMG_PATH), log)
186 utils.sysexec_chroot(SYSIMG_PATH, "rpm --import /etc/pki/rpm-gpg/RPM-GPG-KEY-planetlab", log)
188 # keep a log on the installed hdd
189 stamp=file(SYSIMG_PATH + "/bm-install.txt",'w')
190 now=time.strftime("%Y-%b-%d @ %H:%M %Z", time.gmtime())
191 stamp.write("Hard drive installed by BootManager %s\n"%VERSION)
192 stamp.write("Finished extraction of bootstrapfs on %s\n"%now)
193 stamp.write("Using nodefamily %s\n"%nodefamily)