Hackage-Server: A Haskell Package Repository
Go to file
Janus Troelsen 88b384a76c
Merge pull request #1292 from blackheaven/feature/report-vuln-button
feature: add 'reporting vulnerabilities' link on package pages
2024-09-08 19:58:17 +00:00
.github remove unnecessary Nix cache 2024-08-10 23:45:17 -07:00
benchmarks cleanup buncha partial functions for revdeps, elim use of MonadThrow (#1156) 2023-01-04 11:55:41 -05:00
datafiles Merge pull request #1292 from blackheaven/feature/report-vuln-button 2024-09-08 19:58:17 +00:00
docs Fix whitespace: trailing spaces, trailing empty lines, tabs 2022-02-14 14:41:35 +01:00
example-keys Add example keys for testing purposes 2016-01-06 10:58:43 +01:00
exes Support Cabal-3.12 and GHC 9.10 2024-07-04 10:08:26 +02:00
libstemmer_c Vendor snowball package (#1116) 2022-12-31 00:17:16 -05:00
src Support Cabal-3.12 and GHC 9.10 2024-07-04 10:08:26 +02:00
tests Default library (hackage-server) instead of internal library lib-server 2024-07-02 19:31:56 +02:00
.authorspellings update authorspelling file 2010-08-03 03:24:50 +00:00
.dockerignore docker: build from source and init hackage-server 2015-10-03 15:28:39 +02:00
.envrc replace shell.nix with Nix Flake (#1154) 2023-03-13 19:13:46 -07:00
.gitignore replace shell.nix with Nix Flake (#1154) 2023-03-13 19:13:46 -07:00
cabal.haskell-ci Bump dependencies and CI for GHC 9.8.1 2023-10-28 17:10:01 +02:00
cabal.project Clean cabal.project 2024-07-02 19:28:50 +02:00
config add config 2020-08-25 22:44:27 -07:00
Dockerfile Use cabal 3.0 in Dockerfile 2019-08-05 20:34:05 +02:00
fix-whitespace.yaml Include cabal.* in fix-whitespace check 2022-02-19 17:03:51 +01:00
flake.lock fix nix develop shell 2024-07-25 20:12:48 -07:00
flake.nix fix nix develop shell 2024-07-25 20:12:48 -07:00
hackage-server.cabal Commit to Cabal-3.12.1.0 2024-07-04 10:08:26 +02:00
LICENSE copyright fix 2014-06-18 19:04:09 -05:00
nix-default-servers.cfg simple package mirroring workflow 2024-06-22 11:01:24 -07:00
old-hackage-download.sh Revert "Fix --force mode of build client" 2013-09-03 15:30:52 +01:00
old-hackage-import.sh Revert "Fix --force mode of build client" 2013-09-03 15:30:52 +01:00
README.md simple package mirroring workflow 2024-06-22 11:01:24 -07:00
rundocs.sh don't retry exes, can fail to build tarball 2018-03-17 22:55:42 -04:00

hackage-server

Build status Build status

This is the hackage-server code. This is what powers http://hackage.haskell.org, and many other private hackage instances. The master branch is suitable for general usage. Specific policy and documentation for the central hackage instance exists in the central-server branch.

Installing dependencies

hackage-server depends on libgd, zlib, and other system libraries. You'll also need libbrotli-dev for enabling tests.

You can use the Nix package manager to provide these dependencies, or install them manually.

Using the Nix package manager and provided Nix Flake

If you have the Nix package manager installed, you can build and run hackage-server without manually installing any dependencies:

$ nix run

'state' state-dir already exists
hackage-server: Ready! Point your browser at http://127.0.0.1:8080

If the required state directory does not already exist, nix run will create and initialize it.

The flake.nix is implemented with srid/haskell-flake.

Alternatively, open the nix develop shell:

$ nix develop

(in develop shell)

# if state directory does not already exist
$ cabal v2-run -- hackage-server init --static-dir=datafiles --state-dir=state

$ cabal v2-run -- hackage-server run --static-dir=datafiles --state-dir=state --base-uri=http://127.0.0.1:8080
hackage-server: Ready! Point your browser at http://127.0.0.1:8080

Populate the local package index

This copies packages from real Hackage Server to local Hackage Server.

Add the default admin user to the mirrorers group here: http://localhost:8080/packages/mirrorers/

Then

 $ nix run .#mirror-hackage-server

Not working

Please note this App cannot be run directly from GitHub like this:

nix run github:haskell/hackage-server -- init --static-dir=datafiles

nix run github:haskell/hackage-server -- run --static-dir=datafiles --base-uri=http://127.0.0.1:8080

because hackage-server expects the directories state and datafiles to exist in the working directory.

Manually

You can also install dependencies manually via your operating system's package manager.

Libgd

You'll need to do the following to get hackage-server's dependency hs-captcha (and transitively gd) to build:

  • Mac OS X

    brew install libgd
    
  • Ubuntu/Debian

    sudo apt-get update
    sudo apt-get install unzip libgd-dev
    
  • Fedora/CentOS

    sudo dnf install unzip libgd-devel
    
  • Nix/NixOS

    nix-shell --packages gd
    

libbrotli

  • Ubuntu/Debian

    sudo apt update
    sudo apt install libbrotli-dev
    
  • Fedora/CentOS

    sudo dnf install brotli-devel
    

openssl

  • Fedora/CentOS

    sudo dnf install openssl-devel

zlib

  • Mac OS X

    brew install zlib
    
  • Ubuntu/Debian

    sudo apt-get update
    sudo apt-get install zlib
    
  • Fedora/CentOS

    sudo dnf install zlib
    
  • Nix/NixOS

    nix-shell --packages zlib
    

Mac OS X

In addition to the above commands, you'll need to run

brew install pkg-config

After running the above brew install commands, you also need to update cabal.project.local with the following:

cat >> cabal.project.local <<EOF
package gd
  extra-include-dirs:
    $(echo $(brew --prefix)/Cellar/gd/*/include)
  extra-lib-dirs:
    $(echo $(brew --prefix)/Cellar/gd/*/lib)
    $(echo $(brew --prefix)/Cellar/libpng/*/lib)
    $(echo $(brew --prefix)/Cellar/jpeg-turbo/*/lib)
    $(echo $(brew --prefix)/Cellar/fontconfig/*/lib)
    $(echo $(brew --prefix)/Cellar/freetype/*/lib)

constraints:
  , HsOpenSSL +use-pkg-config
EOF

Setting up security infrastructure

Out of the box the server comes with some example keys and TUF metadata. The example keys are in example-keys/; these keys were used to create

datafiles/TUF/root.json
datafiles/TUF/mirrors.json
datafiles/TUF/timestamp.private
datafiles/TUF/snapshot.private

While these files will enable you to start the server without doing anything else, you should replace all these files before deploying your server. In the remainder of this section we will explain how to do that.

The first step is to create your own keys using the hackage-repo-tool:

hackage-repo-tool create-keys --keys /path/to/keys

Then copy over the timestamp and snapshot keys to the TUF directory:

cp /path/to/keys/timestamp/<id>.private datafiles/TUF/timestamp.private
cp /path/to/keys/snapshot/<id>.private  datafiles/TUF/snapshot.private

Create root information:

hackage-repo-tool create-root --keys /path/to/keys -o datafiles/TUF/root.json

And finally create a list of mirrors (this is necessary even if you don't have any mirrors):

hackage-repo-tool create-mirrors --keys /path/to/keys -o datafiles/TUF/mirrors.json

The create-mirrors command takes a list of mirrors as additional arguments if you do want to list mirrors.

In order for secure clients to bootstrap the root security metadata from your server, you will need to provide them with the public key IDs of your root keys; you can find these as the file names of the files created in /path/to/keys/root (as well as in the generated root.json under the signed.roles.root.keyids). An example cabal client configuration might look something like

repository my-private-hackage
  url: http://example.com:8080/
  secure: True
  root-keys: 865cc6ce84231ccc990885b1addc92646b7377dd8bb920bdfe3be4d20c707796
             dd86074061a8a6570348e489aae306b997ed3ccdf87d567260c4568f8ac2cbee
             e4182227adac4f3d0f60c9e9392d720e07a8586e6f271ddcc1697e1eeab73390
  key-threshold: 2

Note that if you elect to not use a secure client, the hackage server will not provide your client the most recent versions of packages from its index. The cabal-version:2.0 format packages are thus only available in the newer secure repository mode. See Issue #4625 for further information.

Running

cabal install

hackage-server init
hackage-server run

If you want to run the server directly from the build tree, run

cabal v2-run -- hackage-server init

once to initialise the state. After that you can run the server with

cabal v2-run -- hackage-server run --static-dir=datafiles/ --base-uri=http://127.0.0.1:8080

By default the server runs on port 8080 with the following settings:

URL:      http://localhost:8080/
username: admin
password: admin

To specify something different, see hackage-server init --help for details.

The http://127.0.0.1:8080/packages/uploaders/edit is used to add users (e.g. admin) to Uploaders group.

The server can be stopped by using Control-C.

This will save the current state and shutdown cleanly. Running again will resume with the same state.

Resetting

To reset everything, kill the server and delete the server state:

rm -rf state/

Note that the datafiles/ and state/ directories differ: datafiles is for static html, templates and other files. The state directory holds the database (using acid-state and a separate blob store).

Creating users & uploading packages

Currently there is no restriction on registering, but only an admin user can grant privileges to registered users e.g. by adding them to other groups. In particular there are groups:

  • admins http://localhost:8080/users/admins/ -- administrators can do things with user accounts like disabling, deleting, changing other groups etc.
  • trustees http://localhost:8080/packages/trustees/ -- trustees can do janitorial work on all packages
  • mirrors http://localhost:8080/packages/mirrorers/ -- for special mirroring clients that are trusted to upload packages
  • per-package maintainer groups http://localhost:8080/package/foo/maintainers -- users allowed to upload packages
  • uploaders http://localhost:8080/packages/uploaders/ -- for uploading new packages

Mirroring

There is a client program included in the hackage-server package called hackage-mirror. It's intended to run against two servers, syncing all the packages from one to the other, e.g. getting all the packages from the old hackage and uploading them to a local instance of a hackage-server.

To try it out:

  1. On the target server, add a user to the mirrorers group via http://localhost:8080/packages/mirrorers/.

  2. Create a config file that contains the source and target servers. Assuming you are cloning the packages on http://hackage.haskell.org locally, create the file servers.cfg:

    source "hackage"
      uri: http://hackage.haskell.org
      type: secure
    
    target "mirror"
      uri: http://admin:admin@localhost:8080
      type: hackage2
    
      post-mirror-hook: "shell command to execute"
    

    Recognized types are hackage2, secure and local. The target server name was displayed when you ran.

    Note, the target must not have a trailing slash, or confusion will tend to occur. Additionally, if you have ipv6 setup on the machine, you may need to replace localhost with 127.0.0.1.

    Also note that you should mirror from hackage2 or secure typically and mirror to hackage2. Only mirroring from secure will include dependency revision information.

    hackage-server run
    
  3. Run the client, pointing to the config file:

    hackage-mirror servers.cfg
    

    This will do a one-time sync, and will bail out at the first sign of trouble. You can also do more robust and continuous mirroring. Use the flag --continuous. It will sync every 30 minutes (configurable with --interval). In this mode it carries on even when some packages cannot be mirrored for some reason and remembers them so it doesn't try them again and again. You can force it to try again by deleting the state files it mentions.