]>
git.proxmox.com Git - pve-manager.git/blob - PVE/APLInfo.pm
5d260a38d1a988736ef9d93887e00374a1d39f3d
7 use POSIX
qw(strftime);
9 my $logfile = "/var/log/pveam.log";
10 my $aplinfodir = "/var/lib/pve-manager/apl-info";
12 # Default list of GPG keys allowed to sign aplinfo
14 #pub 1024D/5CAC72FE 2004-06-24
15 # Key fingerprint = 9ABD 7E02 AD24 3AD3 C2FB BCCC B0C1 CC22 5CAC 72FE
16 #uid Proxmox Support Team <support@proxmox.com>
17 #pub 2048R/A16EB94D 2008-08-15 [expires: 2023-08-12]
18 # Key fingerprint = 694C FF26 795A 29BA E07B 4EB5 85C2 5E95 A16E B94D
19 #uid Turnkey Linux Release Key <release@turnkeylinux.com>
22 '9ABD7E02AD243AD3C2FBBCCCB0C1CC225CAC72FE' => 1, # fingerprint support@proxmox.com
23 '25CAC72FE' => 1, # keyid support@proxmox.com
24 '694CFF26795A29BAE07B4EB585C25E95A16EB94D' => 1, # fingerprint release@turnkeylinux.com
25 'A16EB94D' => 1, # keyid release@turnkeylinux.com
30 my @keyfiles = ('support@proxmox.com.pubkey', 'release@turnkeylinux.com.pubkey');
32 foreach my $key (@keyfiles) {
33 my $fn = "/usr/share/doc/pve-manager/$key";
34 system ("/usr/bin/gpg --batch --no-tty --status-fd=1 -q " .
35 "--logger-fd=1 --import $fn >>$logfile");
40 my ($logfd, $msg) = @_;
44 my $tstr = strftime
("%b %d %H:%M:%S", localtime);
46 foreach my $line (split (/\n/, $msg)) {
47 print $logfd "$tstr $line\n";
52 my ($filename, $list, $source, $update) = @_;
54 my $fh = IO
::File-
>new("<$filename") ||
55 die "unable to open file '$filename' - $!\n";
60 while (my $rec = <$fh>) {
67 if ($rec =~ s/^Description:\s*([^\n]*)(\n\s+.*)*$//si) {
68 $res->{headline
} = $1;
73 $res->{description
} = $long;
74 } elsif ($rec =~ s/^Version:\s*(.*\S)\s*\n//i) {
76 if ($version =~ m/^(\d[a-zA-Z0-9\.\+\-\:\~]*)-(\d+)$/) {
77 $res->{version
} = $version;
79 my $msg = "unable to parse appliance record: version = '$version'\n";
80 $update ?
die $msg : warn $msg;
82 } elsif ($rec =~ s/^Type:\s*(.*\S)\s*\n//i) {
84 if ($type =~ m/^(openvz)$/) {
87 my $msg = "unable to parse appliance record: unknown type '$type'\n";
88 $update ?
die $msg : warn $msg;
90 } elsif ($rec =~ s/^([^:]+):\s*(.*\S)\s*\n//) {
93 my $msg = "unable to parse appliance record: $rec\n";
94 $update ?
die $msg : warn $msg;
100 if ($res->{'package'} eq 'pve-web-news' && $res->{description
}) {
101 $list->{'all'}->{$res->{'package'}} = $res;
105 $res->{section
} = 'unknown' if !$res->{section
};
107 if ($res->{'package'} && $res->{type
} && $res->{os
} && $res->{version
} &&
110 if ($res->{location
}) {
111 $template = $res->{location
};
112 $template =~ s
|.*/([^/]+.tar
.gz
)|$1|;
114 $template = "$res->{os}-$res->{package}_$res->{version}_i386.tar.gz";
115 $template =~ s/$res->{os}-$res->{os}-/$res->{os}-/;
117 $res->{source
} = $source;
118 $res->{template
} = $template;
119 $list->{$res->{section
}}->{$template} = $res;
120 $list->{'all'}->{$template} = $res;
122 my $msg = "found incomplete appliance records\n";
123 $update ?
die $msg : warn $msg;
137 my ($ua, $url, $file, $logfh) = @_;
139 my $req = HTTP
::Request-
>new(GET
=> $url);
141 logmsg
($logfh, "start download $url");
142 my $res = $ua->request($req, $file);
144 if ($res->is_success) {
145 logmsg
($logfh, "download finished: " . $res->status_line);
149 logmsg
($logfh, "download failed: " . $res->status_line);
154 sub download_aplinfo
{
155 my ($ua, $aplurl, $host, $logfd) = @_;
157 my $aplsrcurl = "$aplurl/aplinfo.dat.gz";
158 my $aplsigurl = "$aplurl/aplinfo.dat.asc";
160 my $tmp = "$aplinfodir/pveam-${host}.tmp.$$";
161 my $tmpgz = "$tmp.gz";
162 my $sigfn = "$tmp.asc";
166 if (url_get
($ua, $aplsigurl, $sigfn, $logfd) != 0) {
167 die "update failed - no signature file '$sigfn'\n";
170 if (url_get
($ua, $aplsrcurl, $tmpgz, $logfd) != 0) {
171 die "update failed - no data file '$aplsrcurl'\n";
174 if (system("zcat -f $tmpgz >$tmp 2>/dev/null") != 0) {
175 die "update failed: unable to unpack '$tmpgz'\n";
180 my $cmd = "/usr/bin/gpg --verify --trust-model always --batch --no-tty --status-fd=1 -q " .
181 "--logger-fd=1 $sigfn $tmp";
183 open(CMD
, "$cmd|") ||
184 die "unable to execute '$cmd': $!\n";
188 while (defined($line = <CMD
>)) {
190 logmsg
($logfd, $line);
192 # code borrowed from SA
193 next if $line !~ /^\Q[GNUPG:]\E (?:VALID|GOOD)SIG (\S{8,40})/;
196 # we want either a keyid (8) or a fingerprint (40)
197 if (length $key > 8 && length $key < 40) {
198 substr($key, 8) = '';
200 # use the longest match we can find
201 $signer = $key if (length $key > length $signer) && $valid_keys->{$key};
206 die "unable to verify signature\n" if !$signer;
208 logmsg
($logfd, "signature valid: $signer");
212 my $fh = IO
::File-
>new("<$tmp") ||
213 die "unable to open file '$tmp' - $!\n";
214 read_aplinfo
($tmp, {}, $aplurl, 1);
217 die "update failed: $@" if $@;
219 if (system("mv $tmp $aplinfodir/$host 2>/dev/null") != 0) {
220 die "update failed: unable to store data\n";
223 logmsg
($logfd, "update sucessful");
235 sub get_apl_sources
{
238 push @$urls, "http://download.proxmox.com/appliances";
239 push @$urls, "http://releases.turnkeylinux.org/pve";
248 if (($size = (-s
$logfile) || 0) > (1024*50)) {
249 system ("mv $logfile $logfile.0");
251 my $logfd = IO
::File-
>new (">>$logfile");
252 logmsg
($logfd, "starting update");
256 # this code works for ftp and http
257 # always use passive ftp
258 local $ENV{FTP_PASSIVE
} = 1;
259 my $ua = LWP
::UserAgent-
>new;
260 $ua->agent("PVE/1.0");
263 $ua->proxy(['http'], $proxy);
268 my $urls = get_apl_sources
();
273 foreach my $aplurl (@$urls) {
275 my $uri = URI-
>new($aplurl);
276 my $host = $uri->host();
277 download_aplinfo
($ua, $aplurl, $host, $logfd);
280 logmsg
($logfd, $err);
281 push @dlerr, $aplurl;
287 return 0 if scalar(@dlerr);
294 my $filename = "$aplinfodir/download.proxmox.com";
295 if (! -f
$filename) {
297 system("cp /usr/share/doc/pve-manager/aplinfo.dat $filename");
300 my $urls = get_apl_sources
();
304 foreach my $aplurl (@$urls) {
308 my $uri = URI-
>new($aplurl);
309 my $host = $uri->host();
310 read_aplinfo
("$aplinfodir/$host", $list, $aplurl);