db_manage.py
536 lines
| 17.4 KiB
| text/x-python
|
PythonLexer
r835 | # -*- coding: utf-8 -*- | |||
""" | ||||
rhodecode.lib.db_manage | ||||
~~~~~~~~~~~~~~~~~~~~~~~ | ||||
r838 | Database creation, and setup module for RhodeCode. Used for creation | |||
of database as well as for migration operations | ||||
r835 | ||||
:created_on: Apr 10, 2010 | ||||
:author: marcink | ||||
r902 | :copyright: (C) 2009-2011 Marcin Kuzminski <marcin@python-works.com> | |||
r835 | :license: GPLv3, see COPYING for more details. | |||
""" | ||||
r547 | # This program is free software; you can redistribute it and/or | |||
# modify it under the terms of the GNU General Public License | ||||
# as published by the Free Software Foundation; version 2 | ||||
# of the License or (at your opinion) any later version of the license. | ||||
# | ||||
# This program is distributed in the hope that it will be useful, | ||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of | ||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | ||||
# GNU General Public License for more details. | ||||
# | ||||
# You should have received a copy of the GNU General Public License | ||||
# along with this program; if not, write to the Free Software | ||||
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, | ||||
# MA 02110-1301, USA. | ||||
import os | ||||
import sys | ||||
import uuid | ||||
r835 | import logging | |||
from os.path import dirname as dn, join as jn | ||||
from rhodecode import __dbversion__ | ||||
from rhodecode.model import meta | ||||
r547 | ||||
r1116 | from rhodecode.lib.auth import get_crypt_password, generate_api_key | |||
r547 | from rhodecode.lib.utils import ask_ok | |||
from rhodecode.model import init_model | ||||
r549 | from rhodecode.model.db import User, Permission, RhodeCodeUi, RhodeCodeSettings, \ | |||
r835 | UserToPerm, DbMigrateVersion | |||
r547 | from sqlalchemy.engine import create_engine | |||
r835 | ||||
r547 | log = logging.getLogger(__name__) | |||
class DbManage(object): | ||||
r781 | def __init__(self, log_sql, dbconf, root, tests=False): | |||
self.dbname = dbconf.split('/')[-1] | ||||
r547 | self.tests = tests | |||
r552 | self.root = root | |||
r781 | self.dburi = dbconf | |||
r907 | self.log_sql = log_sql | |||
self.db_exists = False | ||||
self.init_db() | ||||
def init_db(self): | ||||
engine = create_engine(self.dburi, echo=self.log_sql) | ||||
r547 | init_model(engine) | |||
r629 | self.sa = meta.Session() | |||
r547 | def check_for_db(self, override): | |||
r552 | db_path = jn(self.root, self.dbname) | |||
r781 | if self.dburi.startswith('sqlite'): | |||
log.info('checking for existing db in %s', db_path) | ||||
if os.path.isfile(db_path): | ||||
self.db_exists = True | ||||
if not override: | ||||
raise Exception('database already exists') | ||||
r964 | return 'sqlite' | |||
if self.dburi.startswith('postgresql'): | ||||
self.db_exists = True | ||||
return 'postgresql' | ||||
r547 | ||||
def create_tables(self, override=False): | ||||
r837 | """Create a auth database | |||
r547 | """ | |||
r837 | ||||
r964 | db_type = self.check_for_db(override) | |||
r597 | if self.db_exists: | |||
r552 | log.info("database exist and it's going to be destroyed") | |||
r547 | if self.tests: | |||
destroy = True | ||||
else: | ||||
destroy = ask_ok('Are you sure to destroy old database ? [y/n]') | ||||
if not destroy: | ||||
sys.exit() | ||||
if self.db_exists and destroy: | ||||
r964 | if db_type == 'sqlite': | |||
os.remove(jn(self.root, self.dbname)) | ||||
if db_type == 'postgresql': | ||||
meta.Base.metadata.drop_all() | ||||
r547 | checkfirst = not override | |||
meta.Base.metadata.create_all(checkfirst=checkfirst) | ||||
log.info('Created tables for %s', self.dbname) | ||||
r629 | ||||
r834 | ||||
def set_db_version(self): | ||||
try: | ||||
ver = DbMigrateVersion() | ||||
ver.version = __dbversion__ | ||||
ver.repository_id = 'rhodecode_db_migrations' | ||||
ver.repository_path = 'versions' | ||||
self.sa.add(ver) | ||||
self.sa.commit() | ||||
except: | ||||
self.sa.rollback() | ||||
raise | ||||
log.info('db version set to: %s', __dbversion__) | ||||
r839 | ||||
def upgrade(self): | ||||
"""Upgrades given database schema to given revision following | ||||
r900 | all needed steps, to perform the upgrade | |||
r839 | ||||
""" | ||||
r841 | ||||
from rhodecode.lib.dbmigrate.migrate.versioning import api | ||||
from rhodecode.lib.dbmigrate.migrate.exceptions import \ | ||||
DatabaseNotControlledError | ||||
r839 | upgrade = ask_ok('You are about to perform database upgrade, make ' | |||
'sure You backed up your database before. ' | ||||
'Continue ? [y/n]') | ||||
if not upgrade: | ||||
sys.exit('Nothing done') | ||||
r843 | repository_path = jn(dn(dn(dn(os.path.realpath(__file__)))), | |||
'rhodecode/lib/dbmigrate') | ||||
r839 | db_uri = self.dburi | |||
try: | ||||
curr_version = api.db_version(db_uri, repository_path) | ||||
msg = ('Found current database under version' | ||||
' control with version %s' % curr_version) | ||||
except (RuntimeError, DatabaseNotControlledError), e: | ||||
curr_version = 1 | ||||
msg = ('Current database is not under version control. Setting' | ||||
' as version %s' % curr_version) | ||||
api.version_control(db_uri, repository_path, curr_version) | ||||
print (msg) | ||||
if curr_version == __dbversion__: | ||||
sys.exit('This database is already at the newest version') | ||||
#====================================================================== | ||||
# UPGRADE STEPS | ||||
#====================================================================== | ||||
class UpgradeSteps(object): | ||||
r900 | """Those steps follow schema versions so for example schema | |||
for example schema with seq 002 == step_2 and so on. | ||||
""" | ||||
r839 | ||||
def __init__(self, klass): | ||||
self.klass = klass | ||||
def step_0(self): | ||||
#step 0 is the schema upgrade, and than follow proper upgrades | ||||
print ('attempting to do database upgrade to version %s' \ | ||||
% __dbversion__) | ||||
api.upgrade(db_uri, repository_path, __dbversion__) | ||||
print ('Schema upgrade completed') | ||||
def step_1(self): | ||||
pass | ||||
def step_2(self): | ||||
print ('Patching repo paths for newer version of RhodeCode') | ||||
self.klass.fix_repo_paths() | ||||
print ('Patching default user of RhodeCode') | ||||
self.klass.fix_default_user() | ||||
log.info('Changing ui settings') | ||||
self.klass.create_ui_settings() | ||||
r890 | def step_3(self): | |||
print ('Adding additional settings into RhodeCode db') | ||||
self.klass.fix_settings() | ||||
r839 | ||||
upgrade_steps = [0] + range(curr_version + 1, __dbversion__ + 1) | ||||
#CALL THE PROPER ORDER OF STEPS TO PERFORM FULL UPGRADE | ||||
for step in upgrade_steps: | ||||
print ('performing upgrade step %s' % step) | ||||
callable = getattr(UpgradeSteps(self), 'step_%s' % step)() | ||||
r837 | def fix_repo_paths(self): | |||
"""Fixes a old rhodecode version path into new one without a '*' | ||||
""" | ||||
paths = self.sa.query(RhodeCodeUi)\ | ||||
.filter(RhodeCodeUi.ui_key == '/')\ | ||||
.scalar() | ||||
paths.ui_value = paths.ui_value.replace('*', '') | ||||
try: | ||||
self.sa.add(paths) | ||||
self.sa.commit() | ||||
except: | ||||
self.sa.rollback() | ||||
raise | ||||
r838 | def fix_default_user(self): | |||
"""Fixes a old default user with some 'nicer' default values, | ||||
used mostly for anonymous access | ||||
""" | ||||
def_user = self.sa.query(User)\ | ||||
.filter(User.username == 'default')\ | ||||
.one() | ||||
def_user.name = 'Anonymous' | ||||
def_user.lastname = 'User' | ||||
def_user.email = 'anonymous@rhodecode.org' | ||||
try: | ||||
self.sa.add(def_user) | ||||
self.sa.commit() | ||||
except: | ||||
self.sa.rollback() | ||||
raise | ||||
r890 | def fix_settings(self): | |||
"""Fixes rhodecode settings adds ga_code key for google analytics | ||||
""" | ||||
r837 | ||||
r890 | hgsettings3 = RhodeCodeSettings('ga_code', '') | |||
r907 | ||||
r890 | try: | |||
self.sa.add(hgsettings3) | ||||
self.sa.commit() | ||||
except: | ||||
self.sa.rollback() | ||||
raise | ||||
r837 | ||||
r597 | def admin_prompt(self, second=False): | |||
r547 | if not self.tests: | |||
import getpass | ||||
r629 | ||||
r597 | def get_password(): | |||
password = getpass.getpass('Specify admin password (min 6 chars):') | ||||
confirm = getpass.getpass('Confirm password:') | ||||
r629 | ||||
r597 | if password != confirm: | |||
log.error('passwords mismatch') | ||||
return False | ||||
if len(password) < 6: | ||||
log.error('password is to short use at least 6 characters') | ||||
return False | ||||
r629 | ||||
r597 | return password | |||
r629 | ||||
r547 | username = raw_input('Specify admin username:') | |||
r629 | ||||
r597 | password = get_password() | |||
if not password: | ||||
#second try | ||||
password = get_password() | ||||
if not password: | ||||
sys.exit() | ||||
r629 | ||||
r547 | email = raw_input('Specify admin email:') | |||
self.create_user(username, password, email, True) | ||||
else: | ||||
log.info('creating admin and regular test users') | ||||
self.create_user('test_admin', 'test12', 'test_admin@mail.com', True) | ||||
self.create_user('test_regular', 'test12', 'test_regular@mail.com', False) | ||||
self.create_user('test_regular2', 'test12', 'test_regular2@mail.com', False) | ||||
r629 | ||||
r837 | def create_ui_settings(self): | |||
"""Creates ui settings, fills out hooks | ||||
and disables dotencode | ||||
""" | ||||
#HOOKS | ||||
hooks1_key = 'changegroup.update' | ||||
hooks1_ = self.sa.query(RhodeCodeUi)\ | ||||
.filter(RhodeCodeUi.ui_key == hooks1_key).scalar() | ||||
r629 | ||||
r837 | hooks1 = RhodeCodeUi() if hooks1_ is None else hooks1_ | |||
hooks1.ui_section = 'hooks' | ||||
hooks1.ui_key = hooks1_key | ||||
hooks1.ui_value = 'hg update >&2' | ||||
hooks1.ui_active = False | ||||
hooks2_key = 'changegroup.repo_size' | ||||
hooks2_ = self.sa.query(RhodeCodeUi)\ | ||||
.filter(RhodeCodeUi.ui_key == hooks2_key).scalar() | ||||
hooks2 = RhodeCodeUi() if hooks2_ is None else hooks2_ | ||||
hooks2.ui_section = 'hooks' | ||||
hooks2.ui_key = hooks2_key | ||||
hooks2.ui_value = 'python:rhodecode.lib.hooks.repo_size' | ||||
hooks3 = RhodeCodeUi() | ||||
hooks3.ui_section = 'hooks' | ||||
hooks3.ui_key = 'pretxnchangegroup.push_logger' | ||||
hooks3.ui_value = 'python:rhodecode.lib.hooks.log_push_action' | ||||
hooks4 = RhodeCodeUi() | ||||
hooks4.ui_section = 'hooks' | ||||
hooks4.ui_key = 'preoutgoing.pull_logger' | ||||
hooks4.ui_value = 'python:rhodecode.lib.hooks.log_pull_action' | ||||
#For mercurial 1.7 set backward comapatibility with format | ||||
dotencode_disable = RhodeCodeUi() | ||||
dotencode_disable.ui_section = 'format' | ||||
dotencode_disable.ui_key = 'dotencode' | ||||
dotencode_disable.ui_value = 'false' | ||||
try: | ||||
self.sa.add(hooks1) | ||||
self.sa.add(hooks2) | ||||
self.sa.add(hooks3) | ||||
self.sa.add(hooks4) | ||||
self.sa.add(dotencode_disable) | ||||
self.sa.commit() | ||||
except: | ||||
self.sa.rollback() | ||||
raise | ||||
def create_ldap_options(self): | ||||
"""Creates ldap settings""" | ||||
try: | ||||
for k in ['ldap_active', 'ldap_host', 'ldap_port', 'ldap_ldaps', | ||||
Thayne Harbaugh
|
r991 | 'ldap_tls_reqcert', 'ldap_dn_user', 'ldap_dn_pass', | ||
'ldap_base_dn', 'ldap_filter', 'ldap_search_scope', | ||||
'ldap_attr_login', 'ldap_attr_firstname', 'ldap_attr_lastname', | ||||
'ldap_attr_email']: | ||||
r837 | ||||
setting = RhodeCodeSettings(k, '') | ||||
self.sa.add(setting) | ||||
self.sa.commit() | ||||
except: | ||||
self.sa.rollback() | ||||
raise | ||||
r629 | ||||
r1094 | def config_prompt(self, test_repo_path='', retries=3): | |||
if retries == 3: | ||||
log.info('Setting up repositories config') | ||||
r629 | ||||
r547 | if not self.tests and not test_repo_path: | |||
path = raw_input('Specify valid full path to your repositories' | ||||
' you can change this later in application settings:') | ||||
else: | ||||
path = test_repo_path | ||||
r1094 | path_ok = True | |||
r629 | ||||
r1094 | #check proper dir | |||
r547 | if not os.path.isdir(path): | |||
r1094 | path_ok = False | |||
log.error('Entered path is not a valid directory: %s [%s/3]', | ||||
path, retries) | ||||
#check write access | ||||
if not os.access(path, os.W_OK): | ||||
path_ok = False | ||||
log.error('No write permission to given path: %s [%s/3]', | ||||
path, retries) | ||||
if retries == 0: | ||||
r547 | sys.exit() | |||
r1094 | if path_ok is False: | |||
retries -= 1 | ||||
return self.config_prompt(test_repo_path, retries) | ||||
return path | ||||
def create_settings(self, path): | ||||
r629 | ||||
r837 | self.create_ui_settings() | |||
r673 | ||||
r837 | #HG UI OPTIONS | |||
r549 | web1 = RhodeCodeUi() | |||
r547 | web1.ui_section = 'web' | |||
web1.ui_key = 'push_ssl' | ||||
web1.ui_value = 'false' | ||||
r629 | ||||
r549 | web2 = RhodeCodeUi() | |||
r547 | web2.ui_section = 'web' | |||
web2.ui_key = 'allow_archive' | ||||
web2.ui_value = 'gz zip bz2' | ||||
r629 | ||||
r549 | web3 = RhodeCodeUi() | |||
r547 | web3.ui_section = 'web' | |||
web3.ui_key = 'allow_push' | ||||
web3.ui_value = '*' | ||||
r629 | ||||
r549 | web4 = RhodeCodeUi() | |||
r547 | web4.ui_section = 'web' | |||
web4.ui_key = 'baseurl' | ||||
r629 | web4.ui_value = '/' | |||
r549 | paths = RhodeCodeUi() | |||
r547 | paths.ui_section = 'paths' | |||
paths.ui_key = '/' | ||||
r631 | paths.ui_value = path | |||
r629 | ||||
r704 | hgsettings1 = RhodeCodeSettings('realm', 'RhodeCode authentication') | |||
hgsettings2 = RhodeCodeSettings('title', 'RhodeCode') | ||||
r890 | hgsettings3 = RhodeCodeSettings('ga_code', '') | |||
r629 | ||||
r547 | try: | |||
self.sa.add(web1) | ||||
self.sa.add(web2) | ||||
self.sa.add(web3) | ||||
self.sa.add(web4) | ||||
self.sa.add(paths) | ||||
self.sa.add(hgsettings1) | ||||
self.sa.add(hgsettings2) | ||||
r890 | self.sa.add(hgsettings3) | |||
r704 | ||||
r547 | self.sa.commit() | |||
except: | ||||
self.sa.rollback() | ||||
r629 | raise | |||
r837 | ||||
self.create_ldap_options() | ||||
r547 | log.info('created ui config') | |||
r629 | ||||
r547 | def create_user(self, username, password, email='', admin=False): | |||
log.info('creating administrator user %s', username) | ||||
new_user = User() | ||||
new_user.username = username | ||||
new_user.password = get_crypt_password(password) | ||||
r1116 | new_user.api_key = generate_api_key(username) | |||
r555 | new_user.name = 'RhodeCode' | |||
r547 | new_user.lastname = 'Admin' | |||
new_user.email = email | ||||
new_user.admin = admin | ||||
new_user.active = True | ||||
r629 | ||||
r547 | try: | |||
self.sa.add(new_user) | ||||
self.sa.commit() | ||||
except: | ||||
self.sa.rollback() | ||||
raise | ||||
def create_default_user(self): | ||||
log.info('creating default user') | ||||
#create default user for handling default permissions. | ||||
def_user = User() | ||||
def_user.username = 'default' | ||||
def_user.password = get_crypt_password(str(uuid.uuid1())[:8]) | ||||
r1116 | def_user.api_key = generate_api_key('default') | |||
r673 | def_user.name = 'Anonymous' | |||
def_user.lastname = 'User' | ||||
def_user.email = 'anonymous@rhodecode.org' | ||||
r547 | def_user.admin = False | |||
def_user.active = False | ||||
try: | ||||
self.sa.add(def_user) | ||||
self.sa.commit() | ||||
except: | ||||
self.sa.rollback() | ||||
raise | ||||
r629 | ||||
r547 | def create_permissions(self): | |||
#module.(access|create|change|delete)_[name] | ||||
#module.(read|write|owner) | ||||
perms = [('repository.none', 'Repository no access'), | ||||
('repository.read', 'Repository read access'), | ||||
('repository.write', 'Repository write access'), | ||||
('repository.admin', 'Repository admin access'), | ||||
('hg.admin', 'Hg Administrator'), | ||||
('hg.create.repository', 'Repository create'), | ||||
('hg.create.none', 'Repository creation disabled'), | ||||
('hg.register.none', 'Register disabled'), | ||||
r1116 | ('hg.register.manual_activate', 'Register new user with RhodeCode without manual activation'), | |||
('hg.register.auto_activate', 'Register new user with RhodeCode without auto activation'), | ||||
r547 | ] | |||
r629 | ||||
r547 | for p in perms: | |||
new_perm = Permission() | ||||
new_perm.permission_name = p[0] | ||||
new_perm.permission_longname = p[1] | ||||
try: | ||||
self.sa.add(new_perm) | ||||
self.sa.commit() | ||||
except: | ||||
self.sa.rollback() | ||||
raise | ||||
def populate_default_permissions(self): | ||||
log.info('creating default user permissions') | ||||
r629 | ||||
r547 | default_user = self.sa.query(User)\ | |||
.filter(User.username == 'default').scalar() | ||||
r629 | ||||
r547 | reg_perm = UserToPerm() | |||
reg_perm.user = default_user | ||||
reg_perm.permission = self.sa.query(Permission)\ | ||||
.filter(Permission.permission_name == 'hg.register.manual_activate')\ | ||||
r629 | .scalar() | |||
r547 | create_repo_perm = UserToPerm() | |||
create_repo_perm.user = default_user | ||||
create_repo_perm.permission = self.sa.query(Permission)\ | ||||
.filter(Permission.permission_name == 'hg.create.repository')\ | ||||
r629 | .scalar() | |||
r547 | default_repo_perm = UserToPerm() | |||
default_repo_perm.user = default_user | ||||
default_repo_perm.permission = self.sa.query(Permission)\ | ||||
.filter(Permission.permission_name == 'repository.read')\ | ||||
r629 | .scalar() | |||
r547 | try: | |||
self.sa.add(reg_perm) | ||||
self.sa.add(create_repo_perm) | ||||
self.sa.add(default_repo_perm) | ||||
self.sa.commit() | ||||
except: | ||||
self.sa.rollback() | ||||
r629 | raise | |||