mirror of
https://github.com/f-droid/fdroidserver.git
synced 2025-11-04 22:40:29 +03:00
There are so many possible installation paths for Python modules, it has been very hard to even find and test them all. This adds a fallback option if the examples dir cannot be found. A repo can work without an icon or the example config.py. This removes the fake assumption that the icon can be a full path in the config.py. While the path was being properly passed through to the index file, the file was never copied properly into place nor rsynced to the web server.
337 lines
16 KiB
Python
337 lines
16 KiB
Python
#!/usr/bin/env python3
|
|
#
|
|
# nightly.py - part of the FDroid server tools
|
|
# Copyright (C) 2017 Hans-Christoph Steiner <hans@eds.org>
|
|
#
|
|
# This program is free software: you can redistribute it and/or modify
|
|
# it under the terms of the GNU Affero General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU Affero General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU Affero General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
import base64
|
|
import datetime
|
|
import git
|
|
import hashlib
|
|
import logging
|
|
import os
|
|
import paramiko
|
|
import platform
|
|
import shutil
|
|
import subprocess
|
|
import sys
|
|
import tempfile
|
|
import yaml
|
|
from urllib.parse import urlparse
|
|
from argparse import ArgumentParser
|
|
|
|
from . import _
|
|
from . import common
|
|
|
|
|
|
# hard coded defaults for Android ~/.android/debug.keystore files
|
|
# https://developers.google.com/android/guides/client-auth
|
|
KEYSTORE_FILE = os.path.join(os.getenv('HOME'), '.android', 'debug.keystore')
|
|
PASSWORD = 'android' # nosec B105 standard hardcoded password for debug keystores
|
|
KEY_ALIAS = 'androiddebugkey'
|
|
DISTINGUISHED_NAME = 'CN=Android Debug,O=Android,C=US'
|
|
|
|
# standard suffix for naming fdroid git repos
|
|
NIGHTLY = '-nightly'
|
|
|
|
|
|
def _ssh_key_from_debug_keystore(keystore=KEYSTORE_FILE):
|
|
tmp_dir = tempfile.mkdtemp(prefix='.')
|
|
privkey = os.path.join(tmp_dir, '.privkey')
|
|
key_pem = os.path.join(tmp_dir, '.key.pem')
|
|
p12 = os.path.join(tmp_dir, '.keystore.p12')
|
|
_config = dict()
|
|
common.fill_config_defaults(_config)
|
|
subprocess.check_call([_config['keytool'], '-importkeystore',
|
|
'-srckeystore', keystore, '-srcalias', KEY_ALIAS,
|
|
'-srcstorepass', PASSWORD, '-srckeypass', PASSWORD,
|
|
'-destkeystore', p12, '-destalias', KEY_ALIAS,
|
|
'-deststorepass', PASSWORD, '-destkeypass', PASSWORD,
|
|
'-deststoretype', 'PKCS12'],
|
|
env={'LC_ALL': 'C.UTF-8'})
|
|
subprocess.check_call(['openssl', 'pkcs12', '-in', p12, '-out', key_pem,
|
|
'-passin', 'pass:' + PASSWORD, '-passout', 'pass:' + PASSWORD],
|
|
env={'LC_ALL': 'C.UTF-8'})
|
|
subprocess.check_call(['openssl', 'rsa', '-in', key_pem, '-out', privkey,
|
|
'-passin', 'pass:' + PASSWORD],
|
|
env={'LC_ALL': 'C.UTF-8'})
|
|
os.remove(key_pem)
|
|
os.remove(p12)
|
|
os.chmod(privkey, 0o600) # os.umask() should cover this, but just in case
|
|
|
|
rsakey = paramiko.RSAKey.from_private_key_file(privkey)
|
|
fingerprint = base64.b64encode(hashlib.sha256(rsakey.asbytes()).digest()).decode('ascii').rstrip('=')
|
|
ssh_private_key_file = os.path.join(tmp_dir, 'debug_keystore_'
|
|
+ fingerprint.replace('/', '_') + '_id_rsa')
|
|
shutil.move(privkey, ssh_private_key_file)
|
|
|
|
pub = rsakey.get_name() + ' ' + rsakey.get_base64() + ' ' + ssh_private_key_file
|
|
with open(ssh_private_key_file + '.pub', 'w') as fp:
|
|
fp.write(pub)
|
|
|
|
logging.info(_('\nSSH public key to be used as deploy key:') + '\n' + pub)
|
|
|
|
return ssh_private_key_file
|
|
|
|
|
|
def main():
|
|
|
|
parser = ArgumentParser()
|
|
common.setup_global_opts(parser)
|
|
parser.add_argument("--keystore", default=KEYSTORE_FILE,
|
|
help=_("Specify which debug keystore file to use."))
|
|
parser.add_argument("--show-secret-var", action="store_true", default=False,
|
|
help=_("Print the secret variable to the terminal for easy copy/paste"))
|
|
parser.add_argument("--keep-private-keys", action="store_true", default=False,
|
|
help=_("Do not remove the private keys generated from the keystore"))
|
|
parser.add_argument("--no-deploy", action="store_true", default=False,
|
|
help=_("Do not deploy the new files to the repo"))
|
|
parser.add_argument("--file", default='app/build/outputs/apk/*.apk',
|
|
help=_('The file to be included in the repo (path or glob)'))
|
|
parser.add_argument("--no-checksum", action="store_true", default=False,
|
|
help=_("Don't use rsync checksums"))
|
|
parser.add_argument("--archive-older", type=int, default=20,
|
|
help=_("Set maximum releases in repo before older ones are archived"))
|
|
# TODO add --with-btlog
|
|
options = parser.parse_args()
|
|
|
|
# force a tighter umask since this writes private key material
|
|
umask = os.umask(0o077)
|
|
|
|
if 'CI' in os.environ:
|
|
v = os.getenv('DEBUG_KEYSTORE')
|
|
debug_keystore = None
|
|
if v:
|
|
debug_keystore = base64.b64decode(v)
|
|
if not debug_keystore:
|
|
logging.error(_('DEBUG_KEYSTORE is not set or the value is incomplete'))
|
|
sys.exit(1)
|
|
os.makedirs(os.path.dirname(KEYSTORE_FILE), exist_ok=True)
|
|
if os.path.exists(KEYSTORE_FILE):
|
|
logging.warning(_('overwriting existing {path}').format(path=KEYSTORE_FILE))
|
|
with open(KEYSTORE_FILE, 'wb') as fp:
|
|
fp.write(debug_keystore)
|
|
|
|
repo_basedir = os.path.join(os.getcwd(), 'fdroid')
|
|
repodir = os.path.join(repo_basedir, 'repo')
|
|
cibase = os.getcwd()
|
|
os.makedirs(repodir, exist_ok=True)
|
|
|
|
if 'CI_PROJECT_PATH' in os.environ and 'CI_PROJECT_URL' in os.environ:
|
|
# we are in GitLab CI
|
|
repo_git_base = os.getenv('CI_PROJECT_PATH') + NIGHTLY
|
|
clone_url = os.getenv('CI_PROJECT_URL') + NIGHTLY
|
|
repo_base = clone_url + '/raw/master/fdroid'
|
|
servergitmirror = 'git@' + urlparse(clone_url).netloc + ':' + repo_git_base
|
|
deploy_key_url = clone_url + '/settings/repository'
|
|
git_user_name = os.getenv('GITLAB_USER_NAME')
|
|
git_user_email = os.getenv('GITLAB_USER_EMAIL')
|
|
elif 'TRAVIS_REPO_SLUG' in os.environ:
|
|
# we are in Travis CI
|
|
repo_git_base = os.getenv('TRAVIS_REPO_SLUG') + NIGHTLY
|
|
clone_url = 'https://github.com/' + repo_git_base
|
|
_branch = os.getenv('TRAVIS_BRANCH')
|
|
repo_base = 'https://raw.githubusercontent.com/' + repo_git_base + '/' + _branch + '/fdroid'
|
|
servergitmirror = 'git@github.com:' + repo_git_base
|
|
deploy_key_url = ('https://github.com/' + repo_git_base + '/settings/keys'
|
|
+ '\nhttps://developer.github.com/v3/guides/managing-deploy-keys/#deploy-keys')
|
|
git_user_name = repo_git_base
|
|
git_user_email = os.getenv('USER') + '@' + platform.node()
|
|
elif 'CIRCLE_REPOSITORY_URL' in os.environ \
|
|
and 'CIRCLE_PROJECT_USERNAME' in os.environ \
|
|
and 'CIRCLE_PROJECT_REPONAME' in os.environ:
|
|
# we are in Circle CI
|
|
repo_git_base = (os.getenv('CIRCLE_PROJECT_USERNAME')
|
|
+ '/' + os.getenv('CIRCLE_PROJECT_REPONAME') + NIGHTLY)
|
|
clone_url = os.getenv('CIRCLE_REPOSITORY_URL') + NIGHTLY
|
|
repo_base = clone_url + '/raw/master/fdroid'
|
|
servergitmirror = 'git@' + urlparse(clone_url).netloc + ':' + repo_git_base
|
|
deploy_key_url = ('https://github.com/' + repo_git_base + '/settings/keys'
|
|
+ '\nhttps://developer.github.com/v3/guides/managing-deploy-keys/#deploy-keys')
|
|
git_user_name = os.getenv('CIRCLE_USERNAME')
|
|
git_user_email = git_user_name + '@' + platform.node()
|
|
else:
|
|
print(_('ERROR: unsupported CI type, patches welcome!'))
|
|
sys.exit(1)
|
|
|
|
repo_url = repo_base + '/repo'
|
|
git_mirror_path = os.path.join(repo_basedir, 'git-mirror')
|
|
git_mirror_repodir = os.path.join(git_mirror_path, 'fdroid', 'repo')
|
|
git_mirror_metadatadir = os.path.join(git_mirror_path, 'fdroid', 'metadata')
|
|
git_mirror_statsdir = os.path.join(git_mirror_path, 'fdroid', 'stats')
|
|
if not os.path.isdir(git_mirror_repodir):
|
|
logging.debug(_('cloning {url}').format(url=clone_url))
|
|
try:
|
|
git.Repo.clone_from(clone_url, git_mirror_path)
|
|
except Exception:
|
|
pass
|
|
if not os.path.isdir(git_mirror_repodir):
|
|
os.makedirs(git_mirror_repodir, mode=0o755)
|
|
|
|
mirror_git_repo = git.Repo.init(git_mirror_path)
|
|
writer = mirror_git_repo.config_writer()
|
|
writer.set_value('user', 'name', git_user_name)
|
|
writer.set_value('user', 'email', git_user_email)
|
|
writer.release()
|
|
for remote in mirror_git_repo.remotes:
|
|
mirror_git_repo.delete_remote(remote)
|
|
|
|
readme_path = os.path.join(git_mirror_path, 'README.md')
|
|
readme = '''
|
|
# {repo_git_base}
|
|
|
|
[]({repo_url})
|
|
|
|
Last updated: {date}'''.format(repo_git_base=repo_git_base,
|
|
repo_url=repo_url,
|
|
date=datetime.datetime.utcnow().strftime('%Y-%m-%d %H:%M:%S UTC'))
|
|
with open(readme_path, 'w') as fp:
|
|
fp.write(readme)
|
|
mirror_git_repo.git.add(all=True)
|
|
mirror_git_repo.index.commit("update README")
|
|
|
|
mirror_git_repo.git.add(all=True)
|
|
mirror_git_repo.index.commit("update repo/website icon")
|
|
|
|
os.chdir(repo_basedir)
|
|
if os.path.isdir(git_mirror_repodir):
|
|
common.local_rsync(options, git_mirror_repodir + '/', 'repo/')
|
|
if os.path.isdir(git_mirror_metadatadir):
|
|
common.local_rsync(options, git_mirror_metadatadir + '/', 'metadata/')
|
|
if os.path.isdir(git_mirror_statsdir):
|
|
common.local_rsync(options, git_mirror_statsdir + '/', 'stats/')
|
|
|
|
ssh_private_key_file = _ssh_key_from_debug_keystore()
|
|
# this is needed for GitPython to find the SSH key
|
|
ssh_dir = os.path.join(os.getenv('HOME'), '.ssh')
|
|
os.makedirs(ssh_dir, exist_ok=True)
|
|
ssh_config = os.path.join(ssh_dir, 'config')
|
|
logging.debug(_('adding IdentityFile to {path}').format(path=ssh_config))
|
|
with open(ssh_config, 'a') as fp:
|
|
fp.write('\n\nHost *\n\tIdentityFile %s\n' % ssh_private_key_file)
|
|
|
|
config = ''
|
|
config += "identity_file = '%s'\n" % ssh_private_key_file
|
|
config += "repo_name = '%s'\n" % repo_git_base
|
|
config += "repo_url = '%s'\n" % repo_url
|
|
config += "repo_description = 'Nightly builds from %s'\n" % git_user_email
|
|
config += "archive_name = '%s'\n" % (repo_git_base + ' archive')
|
|
config += "archive_url = '%s'\n" % (repo_base + '/archive')
|
|
config += "archive_description = 'Old nightly builds that have been archived.'\n"
|
|
config += "archive_older = %i\n" % options.archive_older
|
|
config += "servergitmirrors = '%s'\n" % servergitmirror
|
|
config += "keystore = '%s'\n" % KEYSTORE_FILE
|
|
config += "repo_keyalias = '%s'\n" % KEY_ALIAS
|
|
config += "keystorepass = '%s'\n" % PASSWORD
|
|
config += "keypass = '%s'\n" % PASSWORD
|
|
config += "keydname = '%s'\n" % DISTINGUISHED_NAME
|
|
config += "make_current_version_link = False\n"
|
|
config += "update_stats = True\n"
|
|
with open('config.py', 'w') as fp:
|
|
fp.write(config)
|
|
os.chmod('config.py', 0o600)
|
|
config = common.read_config(options)
|
|
common.assert_config_keystore(config)
|
|
|
|
for root, dirs, files in os.walk(cibase):
|
|
for d in dirs:
|
|
if d == '.git' or d == '.gradle' or (d == 'fdroid' and root == cibase):
|
|
dirs.remove(d)
|
|
for f in files:
|
|
if f.endswith('-debug.apk'):
|
|
apkfilename = os.path.join(root, f)
|
|
logging.debug(_('Stripping mystery signature from {apkfilename}')
|
|
.format(apkfilename=apkfilename))
|
|
destapk = os.path.join(repodir, os.path.basename(f))
|
|
os.chmod(apkfilename, 0o644)
|
|
logging.debug(_('Resigning {apkfilename} with provided debug.keystore')
|
|
.format(apkfilename=os.path.basename(apkfilename)))
|
|
common.apk_strip_v1_signatures(apkfilename, strip_manifest=True)
|
|
common.sign_apk(apkfilename, destapk, KEY_ALIAS)
|
|
|
|
if options.verbose:
|
|
logging.debug(_('attempting bare SSH connection to test deploy key:'))
|
|
try:
|
|
subprocess.check_call(['ssh', '-Tvi', ssh_private_key_file,
|
|
'-oIdentitiesOnly=yes', '-oStrictHostKeyChecking=no',
|
|
servergitmirror.split(':')[0]])
|
|
except subprocess.CalledProcessError:
|
|
pass
|
|
|
|
app_url = clone_url[:-len(NIGHTLY)]
|
|
template = dict()
|
|
template['AuthorName'] = clone_url.split('/')[4]
|
|
template['AuthorWebSite'] = '/'.join(clone_url.split('/')[:4])
|
|
template['Categories'] = ['nightly']
|
|
template['SourceCode'] = app_url
|
|
template['IssueTracker'] = app_url + '/issues'
|
|
template['Summary'] = 'Nightly build of ' + urlparse(app_url).path[1:]
|
|
template['Description'] = template['Summary']
|
|
with open('template.yml', 'w') as fp:
|
|
yaml.dump(template, fp)
|
|
|
|
subprocess.check_call(['fdroid', 'update', '--rename-apks', '--create-metadata', '--verbose'],
|
|
cwd=repo_basedir)
|
|
common.local_rsync(options, repo_basedir + '/metadata/', git_mirror_metadatadir + '/')
|
|
common.local_rsync(options, repo_basedir + '/stats/', git_mirror_statsdir + '/')
|
|
mirror_git_repo.git.add(all=True)
|
|
mirror_git_repo.index.commit("update app metadata")
|
|
|
|
if not options.no_deploy:
|
|
try:
|
|
cmd = ['fdroid', 'deploy', '--verbose', '--no-keep-git-mirror-archive']
|
|
subprocess.check_call(cmd, cwd=repo_basedir)
|
|
except subprocess.CalledProcessError:
|
|
logging.error(_('cannot publish update, did you set the deploy key?')
|
|
+ '\n' + deploy_key_url)
|
|
sys.exit(1)
|
|
|
|
if not options.keep_private_keys:
|
|
os.remove(KEYSTORE_FILE)
|
|
if shutil.rmtree.avoids_symlink_attacks:
|
|
shutil.rmtree(os.path.dirname(ssh_private_key_file))
|
|
|
|
else:
|
|
if not os.path.isfile(options.keystore):
|
|
androiddir = os.path.dirname(options.keystore)
|
|
if not os.path.exists(androiddir):
|
|
os.mkdir(androiddir)
|
|
logging.info(_('created {path}').format(path=androiddir))
|
|
logging.error(_('{path} does not exist! Create it by running:').format(path=options.keystore)
|
|
+ '\n keytool -genkey -v -keystore ' + options.keystore + ' -storepass android \\'
|
|
+ '\n -alias androiddebugkey -keypass android -keyalg RSA -keysize 2048 -validity 10000 \\'
|
|
+ '\n -dname "CN=Android Debug,O=Android,C=US"')
|
|
sys.exit(1)
|
|
ssh_dir = os.path.join(os.getenv('HOME'), '.ssh')
|
|
os.makedirs(os.path.dirname(ssh_dir), exist_ok=True)
|
|
privkey = _ssh_key_from_debug_keystore(options.keystore)
|
|
ssh_private_key_file = os.path.join(ssh_dir, os.path.basename(privkey))
|
|
shutil.move(privkey, ssh_private_key_file)
|
|
shutil.move(privkey + '.pub', ssh_private_key_file + '.pub')
|
|
if shutil.rmtree.avoids_symlink_attacks:
|
|
shutil.rmtree(os.path.dirname(privkey))
|
|
|
|
if options.show_secret_var:
|
|
with open(options.keystore, 'rb') as fp:
|
|
debug_keystore = base64.standard_b64encode(fp.read()).decode('ascii')
|
|
print(_('\n{path} encoded for the DEBUG_KEYSTORE secret variable:')
|
|
.format(path=options.keystore))
|
|
print(debug_keystore)
|
|
|
|
os.umask(umask)
|
|
|
|
|
|
if __name__ == "__main__":
|
|
main()
|