Skip to content

Commit 12e0357

Browse files
committed
fixed order consistence, fixed typo in json_app
1 parent 8c96037 commit 12e0357

File tree

5 files changed

+233
-10
lines changed

5 files changed

+233
-10
lines changed

module/database/FileDatabase.py

+52-7
Original file line numberDiff line numberDiff line change
@@ -169,8 +169,10 @@ def deletePackage(self, id):
169169
self.core.pullManager.addEvent(e)
170170
self.core.hookManager.dispatchEvent("packageDeleted", id)
171171

172-
if id in self.packageCache:
173-
del self.packageCache[id]
172+
#if id in self.packageCache:
173+
# del self.packageCache[id]
174+
175+
self.packageCache = {} # force order refresh
174176

175177
#----------------------------------------------------------------------
176178
@lock
@@ -435,6 +437,8 @@ def setPackageLocation(self, id, queue):
435437
pack = self.getPackage(id)
436438
e = InsertEvent("pack", id, pack.order, "collector" if not pack.queue else "queue")
437439
self.core.pullManager.addEvent(e)
440+
441+
self.packageCache = {} # force order refresh
438442

439443
@lock
440444
@change
@@ -457,10 +461,12 @@ def reorderPackage(self, id, position):
457461

458462
p.order = position
459463
self.db.commit()
460-
461-
e = ReloadAllEvent("collector" if not p.queue else "queue")
464+
465+
e = InsertEvent("pack", id, pack.order, "collector" if not pack.queue else "queue")
462466
self.core.pullManager.addEvent(e)
463467

468+
self.packageCache = {} # force order refresh
469+
464470
@lock
465471
@change
466472
def reorderFile(self, id, position):
@@ -486,10 +492,11 @@ def reorderFile(self, id, position):
486492
self.cache[id].order = position
487493

488494
self.db.commit()
489-
490-
e = ReloadAllEvent("collector" if not self.getPackage(f["package"]).queue else "queue")
491-
495+
496+
e = InsertEvent("file", id, f["order"], "collector" if not self.getPackage(f["package"]).queue else "queue")
492497
self.core.pullManager.addEvent(e)
498+
499+
self.cache = {} # force order refresh
493500

494501
@change
495502
def updateFileInfo(self, data, pid):
@@ -541,13 +548,21 @@ def deleteFinishedLinks(self):
541548
deleted.append(id)
542549
self.deletePackage(int(id))
543550

551+
552+
self.packageCache = {} # force order refresh
553+
544554
return deleted
545555

546556
@lock
547557
@change
548558
def restartFailed(self):
549559
""" restart all failed links """
550560
self.db.restartFailed()
561+
562+
@lock
563+
@change
564+
def fixPackageOrder(self, queue=0):
565+
self.db.fixPackageOrder(queue)
551566

552567
class FileMethods():
553568
@style.queue
@@ -848,13 +863,43 @@ def getUnfinished(self, pid):
848863

849864
@style.queue
850865
def deleteFinished(self):
866+
self.c.execute("DELETE FROM links WHERE status IN (0,4)")
851867
self.c.execute("DELETE FROM links WHERE status IN (0,4)")
852868
self.c.execute("DELETE FROM packages WHERE NOT EXISTS(SELECT 1 FROM links WHERE packages.id=links.package)")
853869

854870

855871
@style.queue
856872
def restartFailed(self):
857873
self.c.execute("UPDATE links SET status=3,error='' WHERE status IN (8, 9)")
874+
875+
876+
@style.queue
877+
def fixPackageOrder(self, queue=0):
878+
found = 0
879+
order = 0
880+
i = 0
881+
self.c.execute("SELECT count(*) FROM packages WHERE queue = ?", (queue, ))
882+
count = self.c.fetchone()[0]
883+
if count == 0:
884+
return
885+
while order < count:
886+
self.c.execute("SELECT id FROM packages WHERE packageorder = ? AND queue = ?", (i, queue))
887+
all = self.c.fetchall()
888+
if len(all) == 0:
889+
i += 1
890+
elif len(all) == 1:
891+
self.c.execute("UPDATE packages SET packageorder=? WHERE id = ?", (order, all[0][0]))
892+
order += 1
893+
i += 1
894+
elif len(all) > 1:
895+
self.c.execute("UPDATE packages SET packageorder=? WHERE id = ?", (order, all[0][0]))
896+
order += 1
897+
i += len(all)
898+
del all[0]
899+
self.c.execute("UPDATE packages SET packageorder=packageorder+? WHERE packageorder >= ? AND queue=?", (len(all), order, queue))
900+
for r in all:
901+
self.c.execute("UPDATE packages SET packageorder=? WHERE id = ?", order, r[0])
902+
order += 1
858903

859904

860905
@style.queue
+176
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,176 @@
1+
#
2+
# Licensed to the Apache Software Foundation (ASF) under one
3+
# or more contributor license agreements. See the NOTICE file
4+
# distributed with this work for additional information
5+
# regarding copyright ownership. The ASF licenses this file
6+
# to you under the Apache License, Version 2.0 (the
7+
# "License"); you may not use this file except in compliance
8+
# with the License. You may obtain a copy of the License at
9+
#
10+
# http://www.apache.org/licenses/LICENSE-2.0
11+
#
12+
# Unless required by applicable law or agreed to in writing,
13+
# software distributed under the License is distributed on an
14+
# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
15+
# KIND, either express or implied. See the License for the
16+
# specific language governing permissions and limitations
17+
# under the License.
18+
#
19+
import os
20+
import socket
21+
import ssl
22+
23+
from thrift.transport import TSocket
24+
from thrift.transport.TTransport import TTransportException
25+
26+
class TSSLSocket(TSocket.TSocket):
27+
"""
28+
SSL implementation of client-side TSocket
29+
30+
This class creates outbound sockets wrapped using the
31+
python standard ssl module for encrypted connections.
32+
33+
The protocol used is set using the class variable
34+
SSL_VERSION, which must be one of ssl.PROTOCOL_* and
35+
defaults to ssl.PROTOCOL_TLSv1 for greatest security.
36+
"""
37+
SSL_VERSION = ssl.PROTOCOL_TLSv1
38+
39+
def __init__(self, host='localhost', port=9090, validate=True, ca_certs=None, unix_socket=None):
40+
"""
41+
@param validate: Set to False to disable SSL certificate validation entirely.
42+
@type validate: bool
43+
@param ca_certs: Filename to the Certificate Authority pem file, possibly a
44+
file downloaded from: http://curl.haxx.se/ca/cacert.pem This is passed to
45+
the ssl_wrap function as the 'ca_certs' parameter.
46+
@type ca_certs: str
47+
48+
Raises an IOError exception if validate is True and the ca_certs file is
49+
None, not present or unreadable.
50+
"""
51+
self.validate = validate
52+
self.is_valid = False
53+
self.peercert = None
54+
if not validate:
55+
self.cert_reqs = ssl.CERT_NONE
56+
else:
57+
self.cert_reqs = ssl.CERT_REQUIRED
58+
self.ca_certs = ca_certs
59+
if validate:
60+
if ca_certs is None or not os.access(ca_certs, os.R_OK):
61+
raise IOError('Certificate Authority ca_certs file "%s" is not readable, cannot validate SSL certificates.' % (ca_certs))
62+
TSocket.TSocket.__init__(self, host, port, unix_socket)
63+
64+
def open(self):
65+
try:
66+
res0 = self._resolveAddr()
67+
for res in res0:
68+
sock_family, sock_type= res[0:2]
69+
ip_port = res[4]
70+
plain_sock = socket.socket(sock_family, sock_type)
71+
self.handle = ssl.wrap_socket(plain_sock, ssl_version=self.SSL_VERSION,
72+
do_handshake_on_connect=True, ca_certs=self.ca_certs, cert_reqs=self.cert_reqs)
73+
self.handle.settimeout(self._timeout)
74+
try:
75+
self.handle.connect(ip_port)
76+
except socket.error, e:
77+
if res is not res0[-1]:
78+
continue
79+
else:
80+
raise e
81+
break
82+
except socket.error, e:
83+
if self._unix_socket:
84+
message = 'Could not connect to secure socket %s' % self._unix_socket
85+
else:
86+
message = 'Could not connect to %s:%d' % (self.host, self.port)
87+
raise TTransportException(type=TTransportException.NOT_OPEN, message=message)
88+
if self.validate:
89+
self._validate_cert()
90+
91+
def _validate_cert(self):
92+
"""internal method to validate the peer's SSL certificate, and to check the
93+
commonName of the certificate to ensure it matches the hostname we
94+
used to make this connection. Does not support subjectAltName records
95+
in certificates.
96+
97+
raises TTransportException if the certificate fails validation."""
98+
cert = self.handle.getpeercert()
99+
self.peercert = cert
100+
if 'subject' not in cert:
101+
raise TTransportException(type=TTransportException.NOT_OPEN,
102+
message='No SSL certificate found from %s:%s' % (self.host, self.port))
103+
fields = cert['subject']
104+
for field in fields:
105+
# ensure structure we get back is what we expect
106+
if not isinstance(field, tuple):
107+
continue
108+
cert_pair = field[0]
109+
if len(cert_pair) < 2:
110+
continue
111+
cert_key, cert_value = cert_pair[0:2]
112+
if cert_key != 'commonName':
113+
continue
114+
certhost = cert_value
115+
if certhost == self.host:
116+
# success, cert commonName matches desired hostname
117+
self.is_valid = True
118+
return
119+
else:
120+
raise TTransportException(type=TTransportException.UNKNOWN,
121+
message='Host name we connected to "%s" doesn\'t match certificate provided commonName "%s"' % (self.host, certhost))
122+
raise TTransportException(type=TTransportException.UNKNOWN,
123+
message='Could not validate SSL certificate from host "%s". Cert=%s' % (self.host, cert))
124+
125+
class TSSLServerSocket(TSocket.TServerSocket):
126+
"""
127+
SSL implementation of TServerSocket
128+
129+
This uses the ssl module's wrap_socket() method to provide SSL
130+
negotiated encryption.
131+
"""
132+
SSL_VERSION = ssl.PROTOCOL_TLSv1
133+
134+
def __init__(self, host=None, port=9090, certfile='cert.pem', unix_socket=None):
135+
"""Initialize a TSSLServerSocket
136+
137+
@param certfile: The filename of the server certificate file, defaults to cert.pem
138+
@type certfile: str
139+
@param host: The hostname or IP to bind the listen socket to, i.e. 'localhost' for only allowing
140+
local network connections. Pass None to bind to all interfaces.
141+
@type host: str
142+
@param port: The port to listen on for inbound connections.
143+
@type port: int
144+
"""
145+
self.setCertfile(certfile)
146+
TSocket.TServerSocket.__init__(self, host, port)
147+
148+
def setCertfile(self, certfile):
149+
"""Set or change the server certificate file used to wrap new connections.
150+
151+
@param certfile: The filename of the server certificate, i.e. '/etc/certs/server.pem'
152+
@type certfile: str
153+
154+
Raises an IOError exception if the certfile is not present or unreadable.
155+
"""
156+
if not os.access(certfile, os.R_OK):
157+
raise IOError('No such certfile found: %s' % (certfile))
158+
self.certfile = certfile
159+
160+
def accept(self):
161+
plain_client, addr = self.handle.accept()
162+
try:
163+
client = ssl.wrap_socket(plain_client, certfile=self.certfile,
164+
server_side=True, ssl_version=self.SSL_VERSION)
165+
except ssl.SSLError, ssl_exc:
166+
# failed handshake/ssl wrap, close socket to client
167+
plain_client.close()
168+
# raise ssl_exc
169+
# We can't raise the exception, because it kills most TServer derived serve()
170+
# methods.
171+
# Instead, return None, and let the TServer instance deal with it in
172+
# other exception handling. (but TSimpleServer dies anyway)
173+
return None
174+
result = TSocket.TSocket()
175+
result.setHandle(client)
176+
return result

module/lib/thrift/transport/TSocket.py

+2-2
Original file line numberDiff line numberDiff line change
@@ -151,8 +151,8 @@ def listen(self):
151151

152152
self.handle = socket.socket(res[0], res[1])
153153
self.handle.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
154-
if hasattr(self.handle, 'set_timeout'):
155-
self.handle.set_timeout(None)
154+
if hasattr(self.handle, 'settimeout'):
155+
self.handle.settimeout(None)
156156
self.handle.bind(res[4])
157157
self.handle.listen(128)
158158

module/web/json_app.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -186,7 +186,7 @@ def add_package():
186186
PYLOAD.setPackageData(pack, data)
187187

188188

189-
@route("/json/move_package/<dest:int/<id:int>")
189+
@route("/json/move_package/<dest:int>/<id:int>")
190190
@login_required('MODIFY')
191191
def move_package(dest, id):
192192
try:

pyLoadCore.py

+2
Original file line numberDiff line numberDiff line change
@@ -472,6 +472,8 @@ def setupDB(self):
472472

473473
self.files = FileHandler(self)
474474
self.db.manager = self.files #ugly?
475+
self.files.fixPackageOrder(0)
476+
self.files.fixPackageOrder(1)
475477

476478
def init_webserver(self):
477479
if self.config['webinterface']['activated']:

0 commit comments

Comments
 (0)