1 # Copyright (c) 2003 Intel Corporation
4 # Redistribution and use in source and binary forms, with or without
5 # modification, are permitted provided that the following conditions are
8 # * Redistributions of source code must retain the above copyright
9 # notice, this list of conditions and the following disclaimer.
11 # * Redistributions in binary form must reproduce the above
12 # copyright notice, this list of conditions and the following
13 # disclaimer in the documentation and/or other materials provided
14 # with the distribution.
16 # * Neither the name of the Intel Corporation nor the names of its
17 # contributors may be used to endorse or promote products derived
18 # from this software without specific prior written permission.
20 # THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
21 # "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
22 # LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
23 # A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE INTEL OR
24 # CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
25 # EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
26 # PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
27 # PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
28 # LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
29 # NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
30 # SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
32 # EXPORT LAWS: THIS LICENSE ADDS NO RESTRICTIONS TO THE EXPORT LAWS OF
33 # YOUR JURISDICTION. It is licensee's responsibility to comply with any
34 # export regulations applicable in licensee's jurisdiction. Under
35 # CURRENT (May 2000) U.S. export regulations this software is eligible
36 # for export from the U.S. and can be downloaded by or otherwise
37 # exported or reexported worldwide EXCEPT to U.S. embargoed destinations
38 # which include Cuba, Iraq, Libya, North Korea, Iran, Syria, Sudan,
39 # Afghanistan and any other country to which the U.S. has embargoed
44 import os, sys, string
48 from Exceptions import *
50 import BootServerRequest
55 Download enough files to run rpm and yum from a chroot in
56 the system image directory
58 Expect the following variables from the store:
59 SYSIMG_PATH the path where the system image will be mounted
60 PARTITIONS dictionary of generic part. types (root/swap)
61 and their associated devices.
62 SUPPORT_FILE_DIR directory on the boot servers containing
63 scripts and support files
64 NODE_ID the id of this machine
66 Sets the following variables:
67 TEMP_BOOTCD_PATH where the boot cd is remounted in the temp
69 ROOT_MOUNTED set to 1 when the the base logical volumes
73 log.write( "\n\nStep: Install: Bootstrapping RPM.\n" )
75 # make sure we have the variables we need
77 SYSIMG_PATH= vars["SYSIMG_PATH"]
79 raise ValueError, "SYSIMG_PATH"
81 PARTITIONS= vars["PARTITIONS"]
82 if PARTITIONS == None:
83 raise ValueError, "PARTITIONS"
85 SUPPORT_FILE_DIR= vars["SUPPORT_FILE_DIR"]
86 if SUPPORT_FILE_DIR == None:
87 raise ValueError, "SUPPORT_FILE_DIR"
89 NODE_ID= vars["NODE_ID"]
91 raise ValueError, "NODE_ID"
94 raise BootManagerException, "Missing variable in vars: %s\n" % var
95 except ValueError, var:
96 raise BootManagerException, "Variable in vars, shouldn't be: %s\n" % var
100 # make sure the required partitions exist
101 val= PARTITIONS["root"]
102 val= PARTITIONS["swap"]
103 val= PARTITIONS["vservers"]
104 except KeyError, part:
105 log.write( "Missing partition in PARTITIONS: %s\n" % part )
108 bs_request= BootServerRequest.BootServerRequest()
110 log.write( "turning on swap space\n" )
111 utils.sysexec( "swapon %s" % PARTITIONS["swap"], log )
113 # make sure the sysimg dir is present
114 utils.makedirs( SYSIMG_PATH )
116 log.write( "mounting root file system\n" )
117 utils.sysexec( "mount -t ext3 %s %s" % (PARTITIONS["root"],SYSIMG_PATH), log )
119 log.write( "mounting vserver partition in root file system\n" )
120 utils.makedirs( SYSIMG_PATH + "/vservers" )
121 utils.sysexec( "mount -t ext3 %s %s/vservers" % (PARTITIONS["vservers"],
124 vars['ROOT_MOUNTED']= 1
127 # download and extract support tarball for
128 # this step, which has everything
129 # we need to successfully run
130 for step_support_file in [ "PlanetLab-Bootstrap.tar.bz2",
131 "alpina-BootstrapRPM.tar.bz2" ]:
132 source_file= "%s/%s" % (SUPPORT_FILE_DIR,step_support_file)
133 dest_file= "%s/%s" % (SYSIMG_PATH, step_support_file)
135 # 30 is the connect timeout, 7200 is the max transfer time
136 # in seconds (2 hours)
137 log.write( "downloading %s\n" % step_support_file )
138 result= bs_request.DownloadFile( source_file, None, None,
142 # New bootstrap tarball contains everything necessary to
143 # boot, no need to bootstrap further.
144 vars['SKIP_INSTALL_BASE']= (step_support_file == "PlanetLab-Bootstrap.tar.bz2")
148 raise BootManagerException, "Unable to download %s from server." % \
151 log.write( "extracting %s in %s\n" % (dest_file,SYSIMG_PATH) )
152 result= utils.sysexec( "tar -C %s -xpjf %s" % (SYSIMG_PATH,dest_file), log )
153 utils.removefile( dest_file )
155 # copy resolv.conf from the base system into our temp dir
156 # so DNS lookups work correctly while we are chrooted
157 log.write( "Copying resolv.conf to temp dir\n" )
158 utils.sysexec( "cp /etc/resolv.conf %s/etc/" % SYSIMG_PATH, log )
160 # Copy the boot server certificate(s) and GPG public key to
161 # /usr/boot in the temp dir.
162 log.write( "Copying boot server certificates and public key\n" )
164 if os.path.exists("/usr/boot"):
165 utils.makedirs(SYSIMG_PATH + "/usr")
166 shutil.copytree("/usr/boot", SYSIMG_PATH + "/usr/boot")
167 elif os.path.exists("/usr/bootme"):
168 utils.makedirs(SYSIMG_PATH + "/usr/boot")
169 boot_server = file("/usr/bootme/BOOTSERVER").readline().strip()
170 shutil.copy("/usr/bootme/cacert/" + boot_server + "/cacert.pem",
171 SYSIMG_PATH + "/usr/boot/cacert.pem")
172 file(SYSIMG_PATH + "/usr/boot/boot_server", "w").write(boot_server)
173 shutil.copy("/usr/bootme/pubring.gpg", SYSIMG_PATH + "/usr/boot/pubring.gpg")
175 # Import the GPG key into the RPM database so that RPMS can be verified
176 utils.makedirs(SYSIMG_PATH + "/etc/pki/rpm-gpg")
177 utils.sysexec("gpg --homedir=/root --export --armor" \
178 " --no-default-keyring --keyring %s/usr/boot/pubring.gpg" \
179 " >%s/etc/pki/rpm-gpg/RPM-GPG-KEY-planetlab" % (SYSIMG_PATH, SYSIMG_PATH))
180 utils.sysexec("chroot %s rpm --import /etc/pki/rpm-gpg/RPM-GPG-KEY-planetlab" % \