]> git.proxmox.com Git - pve-manager.git/blob - PVE/APLInfo.pm
APLInfo: support proxying http traffic
[pve-manager.git] / PVE / APLInfo.pm
1 package PVE::APLInfo;
2
3 use strict;
4 use IO::File;
5 use PVE::SafeSyslog;
6 use LWP::UserAgent;
7 use POSIX qw(strftime);
8
9 my $logfile = "/var/log/pveam.log";
10 my $aplinfodir = "/var/lib/pve-manager/apl-info";
11
12 # Default list of GPG keys allowed to sign aplinfo
13 #
14 #pub 1024D/5CAC72FE 2004-06-24
15 # Key fingerprint = 9ABD 7E02 AD24 3AD3 C2FB BCCC B0C1 CC22 5CAC 72FE
16 #uid Proxmox Support Team <support@proxmox.com>
17 #pub 2048R/A16EB94D 2008-08-15 [expires: 2023-08-12]
18 # Key fingerprint = 694C FF26 795A 29BA E07B 4EB5 85C2 5E95 A16E B94D
19 #uid Turnkey Linux Release Key <release@turnkeylinux.com>
20
21 my $valid_keys = {
22 '9ABD7E02AD243AD3C2FBBCCCB0C1CC225CAC72FE' => 1, # fingerprint support@proxmox.com
23 '25CAC72FE' => 1, # keyid support@proxmox.com
24 '694CFF26795A29BAE07B4EB585C25E95A16EB94D' => 1, # fingerprint release@turnkeylinux.com
25 'A16EB94D' => 1, # keyid release@turnkeylinux.com
26 };
27
28 sub import_gpg_keys {
29
30 my @keyfiles = ('support@proxmox.com.pubkey', 'release@turnkeylinux.com.pubkey');
31
32 foreach my $key (@keyfiles) {
33 my $fn = "/usr/share/doc/pve-manager/$key";
34 system ("/usr/bin/gpg --batch --no-tty --status-fd=1 -q " .
35 "--logger-fd=1 --import $fn >>$logfile");
36 }
37 }
38
39 sub logmsg {
40 my ($logfd, $msg) = @_;
41
42 chomp $msg;
43
44 my $tstr = strftime ("%b %d %H:%M:%S", localtime);
45
46 foreach my $line (split (/\n/, $msg)) {
47 print $logfd "$tstr $line\n";
48 }
49 }
50
51 sub read_aplinfo_from_fh {
52 my ($fh, $list, $source, $update) = @_;
53
54 local $/ = "";
55
56 while (my $rec = <$fh>) {
57 chomp $rec;
58
59 my $res = {};
60
61 while ($rec) {
62
63 if ($rec =~ s/^Description:\s*([^\n]*)(\n\s+.*)*$//si) {
64 $res->{headline} = $1;
65 my $long = $2 || '';
66 $long =~ s/\n\s+/ /g;
67 $long =~ s/^\s+//g;
68 $long =~ s/\s+$//g;
69 $res->{description} = $long;
70 } elsif ($rec =~ s/^Version:\s*(.*\S)\s*\n//i) {
71 my $version = $1;
72 if ($version =~ m/^(\d[a-zA-Z0-9\.\+\-\:\~]*)(-(\d+))?$/) {
73 $res->{version} = $version;
74 } else {
75 my $msg = "unable to parse appliance record: version = '$version'\n";
76 $update ? die $msg : warn $msg;
77 }
78 } elsif ($rec =~ s/^Type:\s*(.*\S)\s*\n//i) {
79 my $type = $1;
80 if ($type =~ m/^(openvz|lxc)$/) {
81 $res->{type} = $type;
82 } else {
83 my $msg = "unable to parse appliance record: unknown type '$type'\n";
84 $update ? die $msg : warn $msg;
85 }
86 } elsif ($rec =~ s/^([^:]+):\s*(.*\S)\s*\n//) {
87 $res->{lc $1} = $2;
88 } else {
89 my $msg = "unable to parse appliance record: $rec\n";
90 $update ? die $msg : warn $msg;
91 $res = {};
92 last;
93 }
94 }
95
96 if ($res->{'package'} eq 'pve-web-news' && $res->{description}) {
97 $list->{'all'}->{$res->{'package'}} = $res;
98 next;
99 }
100
101 $res->{section} = 'unknown' if !$res->{section};
102
103 if ($res->{'package'} && $res->{type} && $res->{os} && $res->{version} &&
104 $res->{infopage}) {
105 my $template;
106 if ($res->{location}) {
107 $template = $res->{location};
108 $template =~ s|.*/([^/]+.tar.[gx]z)$|$1|;
109 if ($res->{location} !~ m|^([a-zA-Z]+)\://|) {
110 # relative localtion (no http:// prefix)
111 $res->{location} = "$source/$res->{location}";
112 }
113 } else {
114 my $arch = $res->{architecture} || 'i386';
115 $template = "$res->{os}-$res->{package}_$res->{version}_$arch.tar.gz";
116 $template =~ s/$res->{os}-$res->{os}-/$res->{os}-/;
117 $res->{location} = "$source/$res->{section}/$template";
118 }
119 $res->{source} = $source;
120 $res->{template} = $template;
121 $list->{$res->{section}}->{$template} = $res;
122 $list->{'all'}->{$template} = $res;
123 } else {
124 my $msg = "found incomplete appliance records\n";
125 $update ? die $msg : warn $msg;
126 }
127 }
128 }
129
130 sub read_aplinfo {
131 my ($filename, $list, $source, $update) = @_;
132
133 my $fh = IO::File->new("<$filename") ||
134 die "unable to open file '$filename' - $!\n";
135
136 eval { read_aplinfo_from_fh($fh, $list, $source, $update); };
137 my $err = $@;
138
139 close($fh);
140
141 die $err if $err;
142
143 return $list;
144 }
145
146 sub url_get {
147 my ($ua, $url, $file, $logfh) = @_;
148
149 my $req = HTTP::Request->new(GET => $url);
150
151 logmsg ($logfh, "start download $url");
152 my $res = $ua->request($req, $file);
153
154 if ($res->is_success) {
155 logmsg ($logfh, "download finished: " . $res->status_line);
156 return 0;
157 }
158
159 logmsg ($logfh, "download failed: " . $res->status_line);
160
161 return 1;
162 }
163
164 sub download_aplinfo {
165 my ($ua, $aplurl, $host, $logfd) = @_;
166
167 my $aplsrcurl = "$aplurl/aplinfo.dat.gz";
168 my $aplsigurl = "$aplurl/aplinfo.dat.asc";
169
170 my $tmp = "$aplinfodir/pveam-${host}.tmp.$$";
171 my $tmpgz = "$tmp.gz";
172 my $sigfn = "$tmp.asc";
173
174 eval {
175
176 if (url_get($ua, $aplsigurl, $sigfn, $logfd) != 0) {
177 die "update failed - no signature file '$sigfn'\n";
178 }
179
180 if (url_get($ua, $aplsrcurl, $tmpgz, $logfd) != 0) {
181 die "update failed - no data file '$aplsrcurl'\n";
182 }
183
184 if (system("zcat -f $tmpgz >$tmp 2>/dev/null") != 0) {
185 die "update failed: unable to unpack '$tmpgz'\n";
186 }
187
188 # verify signature
189
190 my $cmd = "/usr/bin/gpg --verify --trust-model always --batch --no-tty --status-fd=1 -q " .
191 "--logger-fd=1 $sigfn $tmp";
192
193 open(CMD, "$cmd|") ||
194 die "unable to execute '$cmd': $!\n";
195
196 my $line;
197 my $signer = '';
198 while (defined($line = <CMD>)) {
199 chomp $line;
200 logmsg($logfd, $line);
201
202 # code borrowed from SA
203 next if $line !~ /^\Q[GNUPG:]\E (?:VALID|GOOD)SIG (\S{8,40})/;
204 my $key = $1;
205
206 # we want either a keyid (8) or a fingerprint (40)
207 if (length $key > 8 && length $key < 40) {
208 substr($key, 8) = '';
209 }
210 # use the longest match we can find
211 $signer = $key if (length $key > length $signer) && $valid_keys->{$key};
212 }
213
214 close(CMD);
215
216 die "unable to verify signature\n" if !$signer;
217
218 logmsg($logfd, "signature valid: $signer");
219
220 # test syntax
221 eval {
222 my $fh = IO::File->new("<$tmp") ||
223 die "unable to open file '$tmp' - $!\n";
224 read_aplinfo($tmp, {}, $aplurl, 1);
225 close($fh);
226 };
227 die "update failed: $@" if $@;
228
229 if (system("mv $tmp $aplinfodir/$host 2>/dev/null") != 0) {
230 die "update failed: unable to store data\n";
231 }
232
233 logmsg($logfd, "update sucessful");
234 };
235
236 my $err = $@;
237
238 unlink $tmp;
239 unlink $tmpgz;
240 unlink $sigfn;
241
242 die $err if $err;
243 }
244
245 sub get_apl_sources {
246
247 my $urls = [];
248 push @$urls, "http://download.proxmox.com/images";
249 push @$urls, "http://releases.turnkeylinux.org/pve";
250
251 return $urls;
252 }
253
254 sub update {
255 my ($proxy) = @_;
256
257 my $size;
258 if (($size = (-s $logfile) || 0) > (1024*50)) {
259 system ("mv $logfile $logfile.0");
260 }
261 my $logfd = IO::File->new (">>$logfile");
262 logmsg($logfd, "starting update");
263
264 import_gpg_keys();
265
266 # this code works for ftp and http
267 # always use passive ftp
268 local $ENV{FTP_PASSIVE} = 1;
269 my $ua = LWP::UserAgent->new;
270 $ua->agent("PVE/1.0");
271
272 if ($proxy) {
273 $ua->proxy(['http', 'https'], $proxy);
274 } else {
275 $ua->env_proxy;
276 }
277
278 my $urls = get_apl_sources();
279
280 mkdir $aplinfodir;
281
282 my @dlerr = ();
283 foreach my $aplurl (@$urls) {
284 eval {
285 my $uri = URI->new($aplurl);
286 my $host = $uri->host();
287 download_aplinfo($ua, $aplurl, $host, $logfd);
288 };
289 if (my $err = $@) {
290 logmsg ($logfd, $err);
291 push @dlerr, $aplurl;
292 }
293 }
294
295 close($logfd);
296
297 return 0 if scalar(@dlerr);
298
299 return 1;
300 }
301
302 sub load_data {
303
304 my $urls = get_apl_sources();
305
306 my $list = {};
307
308 foreach my $aplurl (@$urls) {
309
310 eval {
311
312 my $uri = URI->new($aplurl);
313 my $host = $uri->host();
314 read_aplinfo("$aplinfodir/$host", $list, $aplurl);
315 };
316 warn $@ if $@;
317 }
318
319 return $list;
320 }
321
322 1;
323