1 # Copyright (c) 2003 Intel Corporation
4 # Redistribution and use in source and binary forms, with or without
5 # modification, are permitted provided that the following conditions are
8 # * Redistributions of source code must retain the above copyright
9 # notice, this list of conditions and the following disclaimer.
11 # * Redistributions in binary form must reproduce the above
12 # copyright notice, this list of conditions and the following
13 # disclaimer in the documentation and/or other materials provided
14 # with the distribution.
16 # * Neither the name of the Intel Corporation nor the names of its
17 # contributors may be used to endorse or promote products derived
18 # from this software without specific prior written permission.
20 # THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
21 # "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
22 # LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
23 # A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE INTEL OR
24 # CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
25 # EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
26 # PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
27 # PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
28 # LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
29 # NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
30 # SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
32 # EXPORT LAWS: THIS LICENSE ADDS NO RESTRICTIONS TO THE EXPORT LAWS OF
33 # YOUR JURISDICTION. It is licensee's responsibility to comply with any
34 # export regulations applicable in licensee's jurisdiction. Under
35 # CURRENT (May 2000) U.S. export regulations this software is eligible
36 # for export from the U.S. and can be downloaded by or otherwise
37 # exported or reexported worldwide EXCEPT to U.S. embargoed destinations
38 # which include Cuba, Iraq, Libya, North Korea, Iran, Syria, Sudan,
39 # Afghanistan and any other country to which the U.S. has embargoed
44 import os, sys, string
47 from Exceptions import *
49 import BootServerRequest
54 Download enough files to run rpm and yum from a chroot in
55 the system image directory
57 Expect the following variables from the store:
58 SYSIMG_PATH the path where the system image will be mounted
59 PARTITIONS dictionary of generic part. types (root/swap)
60 and their associated devices.
61 ALPINA_SERVER_DIR directory on the boot servers containing alpina
62 scripts and support files
63 INSTALL_LANGS languages for install (used by rpm)
64 NODE_ID the id of this machine
66 Sets the following variables:
67 TEMP_BOOTCD_PATH where the boot cd is remounted in the temp
71 log.write( "\n\nStep: Install: Bootstrapping RPM.\n" )
73 # make sure we have the variables we need
75 SYSIMG_PATH= vars["SYSIMG_PATH"]
77 raise ValueError, "SYSIMG_PATH"
79 PARTITIONS= vars["PARTITIONS"]
80 if PARTITIONS == None:
81 raise ValueError, "PARTITIONS"
83 ALPINA_SERVER_DIR= vars["ALPINA_SERVER_DIR"]
84 if ALPINA_SERVER_DIR == None:
85 raise ValueError, "ALPINA_SERVER_DIR"
87 INSTALL_LANGS= vars["INSTALL_LANGS"]
88 if INSTALL_LANGS == "":
89 raise ValueError, "INSTALL_LANGS"
91 NODE_ID= vars["NODE_ID"]
93 raise ValueError, "NODE_ID"
96 raise BootManagerException, "Missing variable in vars: %s\n" % var
97 except ValueError, var:
98 raise BootManagerException, "Variable in vars, shouldn't be: %s\n" % var
102 # make sure the required partitions exist
103 val= PARTITIONS["root"]
104 val= PARTITIONS["swap"]
105 val= PARTITIONS["vservers"]
106 except KeyError, part:
107 log.write( "Missing partition in PARTITIONS: %s\n" % part )
110 bs_request= BootServerRequest.BootServerRequest()
112 log.write( "turning on swap space\n" )
113 utils.sysexec( "swapon %s" % PARTITIONS["swap"], log )
115 # make sure the sysimg dir is present
116 utils.makedirs( SYSIMG_PATH )
118 log.write( "mounting root file system\n" )
119 utils.sysexec( "mount -t ext3 %s %s" % (PARTITIONS["root"],SYSIMG_PATH), log )
121 log.write( "mounting vserver partition in root file system\n" )
122 utils.makedirs( SYSIMG_PATH + "/vservers" )
123 utils.sysexec( "mount -t ext3 %s %s/vservers" % (PARTITIONS["vservers"],
126 # download and extract support tarball for
127 # this step, which has everything
128 # we need to successfully run
129 step_support_file= "alpina-BootstrapRPM.tar.bz2"
130 source_file= "%s/%s" % (ALPINA_SERVER_DIR,step_support_file)
131 dest_file= "%s/%s" % (SYSIMG_PATH, step_support_file)
133 # 30 is the connect timeout, 7200 is the max transfer time
134 # in seconds (2 hours)
135 log.write( "downloading %s\n" % step_support_file )
136 result= bs_request.DownloadFile( source_file, None, None,
140 raise BootManagerException, "Unable to download %s from server." % \
143 log.write( "extracting %s in %s\n" % (dest_file,SYSIMG_PATH) )
144 result= utils.sysexec( "tar -C %s -xpjf %s" % (SYSIMG_PATH,dest_file), log )
145 utils.removefile( dest_file )
147 # get the yum configuration file for this node (yum.conf).
148 # this needs to come from the configuration file service,
149 # so, if its a beta node, it'll install the beta rpms from
150 # the beginning. The configuration file service will return
151 # the url for the file we need to request to get the actual
152 # conf file, so two requests need to be made.
154 # the only changes we will need to make to it are to change
155 # the cache and log directories, so when we run yum from
156 # the chrooted tempfs mount, it'll cache the rpms on the
159 log.write( "Fetching URL for yum.conf from configuration file service\n" )
161 postVars= {"node_id" : NODE_ID,
162 "file" : "/etc/yum.conf"}
164 yum_conf_url_file= "/tmp/yumconf.url"
166 result= bs_request.DownloadFile(
167 "/db/plnodeconf/getsinglefile.php",
168 None, postVars, 1, 1, yum_conf_url_file)
171 log.write( "Unable to make request to get url for yum.conf\n" )
175 yum_conf_url= file(yum_conf_url_file,"r").read()
176 yum_conf_url= string.strip(yum_conf_url)
177 if yum_conf_url == "":
178 raise BootManagerException, \
179 "Downloaded yum configuration file URL is empty."
181 raise BootManagerException, \
182 "Unable to open downloaded yum configuration file URL."
184 # now, get the actual contents of yum.conf for this node
185 log.write( "Fetching yum.conf contents from configuration file service\n" )
188 download_file_loc= "%s/etc/yum.conf" % SYSIMG_PATH
190 result= bs_request.DownloadFile( yum_conf_url,
191 None, postVars, 1, 1,
195 log.write( "Unable to make request to get yum.conf\n" )
198 # copy resolv.conf from the base system into our temp dir
199 # so DNS lookups work correctly while we are chrooted
200 log.write( "Copying resolv.conf to temp dir\n" )
201 utils.sysexec( "cp /etc/resolv.conf %s/etc/" % SYSIMG_PATH, log )
203 # mount the boot cd in the temp path, under /mnt/cdrom. this way,
204 # we can use the certs when programs are running
205 # chrooted in the temp path
206 cdrom_mount_point= "%s/mnt/cdrom" % SYSIMG_PATH
207 utils.makedirs( cdrom_mount_point )
208 log.write( "Copying contents of /usr/bootme to /mnt/cdrom\n" )
209 utils.sysexec( "cp -r /usr/bootme %s/mnt/cdrom/" % SYSIMG_PATH, log )