aboutsummaryrefslogtreecommitdiffstats
path: root/vnfsdk_pkgtools/packager/csar.py
blob: 1bf5c205e74a03331637f46cc3f16c93d331c785 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
# Licensed to the Apache Software Foundation (ASF) under one or more
# contributor license agreements.  See the NOTICE file distributed with
# this work for additional information regarding copyright ownership.
# The ASF licenses this file to You under the Apache License, Version 2.0
# (the "License"); you may not use this file except in compliance with
# the License.  You may obtain a copy of the License at
#
#     http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.

import logging
import os
import pprint
import tempfile
import zipfile

import requests
from ruamel import yaml # @UnresolvedImport

from vnfsdk_pkgtools.packager import manifest
from vnfsdk_pkgtools.packager import utils

LOG = logging.getLogger(__name__)

META_FILE = 'TOSCA-Metadata/TOSCA.meta'
META_FILE_VERSION_KEY = 'TOSCA-Meta-File-Version'
META_FILE_VERSION_VALUE = '1.0'
META_CSAR_VERSION_KEY = 'CSAR-Version'
META_CSAR_VERSION_VALUE = '1.1'
META_CREATED_BY_KEY = 'Created-By'
META_CREATED_BY_VALUE = 'ONAP'
META_ENTRY_DEFINITIONS_KEY = 'Entry-Definitions'
META_ENTRY_MANIFEST_FILE_KEY = 'Entry-Manifest'
META_ENTRY_HISTORY_FILE_KEY = 'Entry-Change-Log'
META_ENTRY_TESTS_DIR_KEY = 'Entry-Tests'
META_ENTRY_LICENSES_DIR_KEY = 'Entry-Licenses'
META_ENTRY_CERT_FILE_KEY = 'Entry-Certificate'

BASE_METADATA = {
    META_FILE_VERSION_KEY: META_FILE_VERSION_VALUE,
    META_CSAR_VERSION_KEY: META_CSAR_VERSION_VALUE,
    META_CREATED_BY_KEY: META_CREATED_BY_VALUE,
}


def check_file_dir(root, entry, msg, check_for_non=False, check_dir=False):
    path = os.path.join(root, entry)
    if check_for_non:
        ret = not os.path.exists(path)
        error_msg = '{0} already exists. ' + msg
    elif check_dir:
        ret = os.path.isdir(path)
        error_msg = '{0} is not an existing directory. ' + msg
    else:
        ret = os.path.isfile(path)
        error_msg = '{0} is not an existing file. ' + msg
    if not ret:
        raise ValueError(error_msg.format(path))


def write(source, entry, destination, args):
    source = os.path.expanduser(source)
    destination = os.path.expanduser(destination)
    metadata = BASE_METADATA.copy()

    check_file_dir(root=source,
                   entry='',
                   msg='Please specify the service template directory.',
                   check_dir=True)

    check_file_dir(root=source,
                   entry=entry,
                   msg='Please specify a valid entry point.',
                   check_dir=False)
    metadata[META_ENTRY_DEFINITIONS_KEY] = entry

    check_file_dir(root='',
                   entry=destination,
                   msg='Please provide a path to where the CSAR should be created.',
                   check_for_non=True)

    check_file_dir(root=source,
                   entry=META_FILE,
                   msg='This commands generates a meta file for you. Please '
                       'remove the existing metafile.',
                   check_for_non=True)

    if(args.manifest):
        check_file_dir(root=source,
                       entry=args.manifest,
                       msg='Please specify a valid manifest file.',
                       check_dir=False)
        metadata[META_ENTRY_MANIFEST_FILE_KEY] = args.manifest
        manifest_file = manifest.Manifest(source, args.manifest) 
        manifest_file_full_path = os.path.join(source, args.manifest)
    elif args.certificate or args.digest:
        raise ValueError("Must specify manifest file if certificate or digest is specified")
    else:
        manifest_file = None
        manifest_file_full_path = None


    if(args.history):
        check_file_dir(root=source,
                       entry=args.history,
                       msg='Please specify a valid change history file.',
                       check_dir=False)
        metadata[META_ENTRY_HISTORY_FILE_KEY] = args.history

    if args.certificate:
        check_file_dir(root=source,
                       entry=args.certificate,
                       msg='Please specify a valid certificate file.',
                       check_dir=False)
        metadata[META_ENTRY_CERT_FILE_KEY] = args.certificate
        if not args.privkey:
            raise ValueError('Need private key file for signing')
        check_file_dir(root='',
                       entry=args.privkey,
                       msg='Please specify a valid private key file.',
                       check_dir=False)

    if(args.tests):
        check_file_dir(root=source,
                       entry=args.tests,
                       msg='Please specify a valid test directory.',
                       check_dir=True)
        metadata[META_ENTRY_TESTS_DIR_KEY] = args.tests

    if(args.licenses):
        check_file_dir(root=source,
                       entry=args.licenses,
                       msg='Please specify a valid license directory.',
                       check_dir=True)
        metadata[META_ENTRY_LICENSES_DIR_KEY] = args.licenses

    LOG.debug('Compressing root directory to ZIP')
    with zipfile.ZipFile(destination, 'w', zipfile.ZIP_DEFLATED) as f:
        for root, dirs, files in os.walk(source):
            # add dir entries
            for dir in dirs:
                dir_full_path = os.path.join(root, dir)
                dir_relative_path = os.path.relpath(dir_full_path, source) + os.sep
                LOG.debug('Writing to archive: {0}'.format(dir_relative_path))
                f.write(dir_full_path + os.sep, dir_relative_path)

            for file in files:
                file_full_path = os.path.join(root, file)
                # skip manifest file here in case we need to generate digest
                if file_full_path!=manifest_file_full_path:
                    file_relative_path = os.path.relpath(file_full_path, source)
                    LOG.debug('Writing to archive: {0}'.format(file_relative_path))
                    f.write(file_full_path, file_relative_path)
                    if manifest_file and args.digest:
                        LOG.debug('Update file digest: {0}'.format(file_relative_path))
                        manifest_file.add_file(file_relative_path, args.digest)

        if manifest_file:
            LOG.debug('Update manifest file to temporary file')
            manifest_file_full_path = manifest_file.update_to_file(True)
            if args.certificate and args.privkey:
                LOG.debug('calculate signature')
                manifest_file.signature = utils.sign(msg_file=manifest_file_full_path,
                                                     cert_file=os.path.join(source, args.certificate),
                                                     key_file=args.privkey)
                # write cms into it
                manifest_file_full_path = manifest_file.update_to_file(True)
            LOG.debug('Writing to archive: {0}'.format(args.manifest))
            f.write(manifest_file_full_path, args.manifest)

        LOG.debug('Writing new metadata file to {0}'.format(META_FILE))
        f.writestr(META_FILE, yaml.dump(metadata, default_flow_style=False))


class _CSARReader(object):

    def __init__(self, source, destination, no_verify_cert=True):
        if os.path.isdir(destination) and os.listdir(destination):
            raise ValueError('{0} already exists and is not empty. '
                             'Please specify the location where the CSAR '
                             'should be extracted.'.format(destination))
        downloaded_csar = '://' in source
        if downloaded_csar:
            file_descriptor, download_target = tempfile.mkstemp()
            os.close(file_descriptor)
            self._download(source, download_target)
            source = download_target
        self.source = os.path.expanduser(source)
        self.destination = os.path.expanduser(destination)
        self.metadata = {}
        self.manifest = None
        try:
            if not os.path.exists(self.source):
                raise ValueError('{0} does not exists. Please specify a valid CSAR path.'
                                 .format(self.source))
            if not zipfile.is_zipfile(self.source):
                raise ValueError('{0} is not a valid CSAR.'.format(self.source))
            self._extract()
            self._read_metadata()
            self._validate(no_verify_cert)
        finally:
            if downloaded_csar:
                os.remove(self.source)

    @property
    def created_by(self):
        return self.metadata.get(META_CREATED_BY_KEY)

    @property
    def csar_version(self):
        return self.metadata.get(META_CSAR_VERSION_KEY)

    @property
    def meta_file_version(self):
        return self.metadata.get(META_FILE_VERSION_KEY)

    @property
    def entry_definitions(self):
        return self.metadata.get(META_ENTRY_DEFINITIONS_KEY)

    @property
    def entry_definitions_yaml(self):
        with open(os.path.join(self.destination, self.entry_definitions)) as f:
            return yaml.safe_load(f)

    @property
    def entry_manifest_file(self):
        return self.metadata.get(META_ENTRY_MANIFEST_FILE_KEY)

    @property
    def entry_history_file(self):
        return self.metadata.get(META_ENTRY_HISTORY_FILE_KEY)

    @property
    def entry_tests_dir(self):
        return self.metadata.get(META_ENTRY_TESTS_DIR_KEY)

    @property
    def entry_licenses_dir(self):
        return self.metadata.get(META_ENTRY_LICENSES_DIR_KEY)

    @property
    def entry_certificate_file(self):
        return self.metadata.get(META_ENTRY_CERT_FILE_KEY)

    def _extract(self):
        LOG.debug('Extracting CSAR contents')
        if not os.path.exists(self.destination):
            os.mkdir(self.destination)
        with zipfile.ZipFile(self.source) as f:
            f.extractall(self.destination)
        LOG.debug('CSAR contents successfully extracted')

    def _read_metadata(self):
        csar_metafile = os.path.join(self.destination, META_FILE)
        if not os.path.exists(csar_metafile):
            raise ValueError('Metadata file {0} is missing from the CSAR'.format(csar_metafile))
        LOG.debug('CSAR metadata file: {0}'.format(csar_metafile))
        LOG.debug('Attempting to parse CSAR metadata YAML')
        with open(csar_metafile) as f:
            self.metadata.update(yaml.safe_load(f))
        LOG.debug('CSAR metadata:\n{0}'.format(pprint.pformat(self.metadata)))

    def _validate(self, no_verify_cert):
        def validate_key(key, expected=None):
            if not self.metadata.get(key):
                raise ValueError('{0} is missing from the metadata file.'.format(key))
            actual = str(self.metadata[key])
            if expected and actual != expected:
                raise ValueError('{0} is expected to be {1} in the metadata file while it is in '
                                 'fact {2}.'.format(key, expected, actual))
        validate_key(META_FILE_VERSION_KEY, expected=META_FILE_VERSION_VALUE)
        validate_key(META_CSAR_VERSION_KEY, expected=META_CSAR_VERSION_VALUE)
        validate_key(META_CREATED_BY_KEY)
        validate_key(META_ENTRY_DEFINITIONS_KEY)
        LOG.debug('CSAR entry definitions: {0}'.format(self.entry_definitions))
        LOG.debug('CSAR manifest file: {0}'.format(self.entry_manifest_file))
        LOG.debug('CSAR change history file: {0}'.format(self.entry_history_file))
        LOG.debug('CSAR tests directory: {0}'.format(self.entry_tests_dir))
        LOG.debug('CSAR licenses directory: {0}'.format(self.entry_licenses_dir))
        LOG.debug('CSAR certificate file: {0}'.format(self.entry_certificate_file))

        check_file_dir(self.destination,
                       self.entry_definitions,
                       'The entry definitions {0} referenced by the metadata '
                       'file does not exist.'.format(self.entry_definitions),
                       check_dir=False)

        if(self.entry_manifest_file):
             check_file_dir(self.destination,
                            self.entry_manifest_file,
                            'The manifest file {0} referenced by the metadata '
                            'file does not exist.'.format(self.entry_manifest_file),
                            check_dir=False)
             self.manifest = manifest.Manifest(self.destination,
                                               self.entry_manifest_file)


        if(self.entry_history_file):
             check_file_dir(self.destination,
                            self.entry_history_file,
                            'The change history file {0} referenced by the metadata '
                            'file does not exist.'.format(self.entry_history_file),
                            check_dir=False)

        if(self.entry_tests_dir):
             check_file_dir(self.destination,
                            self.entry_tests_dir,
                            'The test directory {0} referenced by the metadata '
                            'file does not exist.'.format(self.entry_tests_dir),
                            check_dir=True)

        if(self.entry_licenses_dir):
             check_file_dir(self.destination,
                            self.entry_licenses_dir,
                            'The license directory {0} referenced by the metadata '
                            'file does not exist.'.format(self.entry_licenses_dir),
                            check_dir=True)

        if(self.entry_certificate_file):
            # check certificate
            check_file_dir(self.destination,
                           self.entry_certificate_file,
                           'The certificate file {0} referenced by the metadata '
                           'file does not exist.'.format(self.entry_certificate_file),
                           check_dir=False)
            tmp_manifest = self.manifest.save_to_temp_without_cms()
            utils.verify(tmp_manifest,
                         os.path.join(self.destination, self.entry_certificate_file),
                         self.manifest.signature,
                         no_verify_cert)
            os.unlink(tmp_manifest)

    def _download(self, url, target):
        response = requests.get(url, stream=True)
        if response.status_code != 200:
            raise ValueError('Server at {0} returned a {1} status code'
                             .format(url, response.status_code))
        LOG.info('Downloading {0} to {1}'.format(url, target))
        with open(target, 'wb') as f:
            for chunk in response.iter_content(chunk_size=8192):
                if chunk:
                    f.write(chunk)


def read(source, destination, no_verify_cert=False):
    return _CSARReader(source=source,
                       destination=destination,
                       no_verify_cert=no_verify_cert)