2011-06-04 06:37:48 -04:00
|
|
|
# Licensed to the Apache Software Foundation (ASF) under one or more
|
|
|
|
# contributor license agreements. See the NOTICE file distributed with
|
|
|
|
# this work for additional information regarding copyright ownership.
|
|
|
|
# The ASF licenses this file to You under the Apache License, Version 2.0
|
|
|
|
# (the "License"); you may not use this file except in compliance with
|
|
|
|
# the License. You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
|
|
|
|
|
|
|
import os
|
2013-04-26 08:03:13 -04:00
|
|
|
import zipfile
|
2012-09-26 14:33:46 -04:00
|
|
|
import codecs
|
2012-04-06 09:33:54 -04:00
|
|
|
import tarfile
|
2012-09-25 17:08:51 -04:00
|
|
|
import zipfile
|
2012-04-06 09:33:54 -04:00
|
|
|
import threading
|
2012-09-24 08:31:22 -04:00
|
|
|
import traceback
|
2013-04-21 09:26:54 -04:00
|
|
|
import datetime
|
|
|
|
import time
|
2012-04-06 09:33:54 -04:00
|
|
|
import subprocess
|
|
|
|
import signal
|
2011-06-04 06:37:48 -04:00
|
|
|
import shutil
|
|
|
|
import hashlib
|
2012-08-03 17:18:14 -04:00
|
|
|
import http.client
|
2011-06-04 06:37:48 -04:00
|
|
|
import re
|
2012-08-03 17:18:14 -04:00
|
|
|
import urllib.request, urllib.error, urllib.parse
|
|
|
|
import urllib.parse
|
2011-06-04 06:37:48 -04:00
|
|
|
import sys
|
2012-08-03 17:18:14 -04:00
|
|
|
import html.parser
|
2012-03-19 13:36:27 -04:00
|
|
|
from collections import defaultdict
|
|
|
|
import xml.etree.ElementTree as ET
|
|
|
|
import filecmp
|
|
|
|
import platform
|
2012-03-22 11:24:44 -04:00
|
|
|
import checkJavaDocs
|
2012-06-08 06:18:09 -04:00
|
|
|
import checkJavadocLinks
|
2012-09-25 17:08:51 -04:00
|
|
|
import io
|
2012-09-26 11:55:27 -04:00
|
|
|
import codecs
|
2011-06-04 06:37:48 -04:00
|
|
|
|
|
|
|
# This tool expects to find /lucene and /solr off the base URL. You
|
2012-03-19 13:36:27 -04:00
|
|
|
# must have a working gpg, tar, unzip in your path. This has been
|
|
|
|
# tested on Linux and on Cygwin under Windows 7.
|
2011-06-04 06:37:48 -04:00
|
|
|
|
2012-09-24 12:33:39 -04:00
|
|
|
cygwin = platform.system().lower().startswith('cygwin')
|
|
|
|
cygwinWindowsRoot = os.popen('cygpath -w /').read().strip().replace('\\','/') if cygwin else ''
|
|
|
|
|
2012-04-08 14:22:14 -04:00
|
|
|
def unshortenURL(url):
|
2012-08-03 17:18:14 -04:00
|
|
|
parsed = urllib.parse.urlparse(url)
|
2012-04-08 14:22:14 -04:00
|
|
|
if parsed[0] in ('http', 'https'):
|
2012-08-03 17:18:14 -04:00
|
|
|
h = http.client.HTTPConnection(parsed.netloc)
|
2012-04-08 14:22:14 -04:00
|
|
|
h.request('HEAD', parsed.path)
|
|
|
|
response = h.getresponse()
|
2012-09-24 08:31:22 -04:00
|
|
|
if int(response.status/100) == 3 and response.getheader('Location'):
|
2012-04-08 14:22:14 -04:00
|
|
|
return response.getheader('Location')
|
|
|
|
return url
|
|
|
|
|
2012-04-06 09:33:54 -04:00
|
|
|
def javaExe(version):
|
2013-03-18 08:28:52 -04:00
|
|
|
if version == '1.7':
|
2012-04-06 09:33:54 -04:00
|
|
|
path = JAVA7_HOME
|
|
|
|
else:
|
|
|
|
raise RuntimeError("unknown Java version '%s'" % version)
|
2012-09-24 12:33:39 -04:00
|
|
|
if cygwin:
|
|
|
|
path = os.popen('cygpath -u "%s"' % path).read().strip()
|
2012-11-05 16:13:08 -05:00
|
|
|
return 'export JAVA_HOME="%s" PATH="%s/bin:$PATH" JAVACMD="%s/bin/java"' % (path, path, path)
|
2011-06-04 06:37:48 -04:00
|
|
|
|
2012-04-06 09:33:54 -04:00
|
|
|
def verifyJavaVersion(version):
|
|
|
|
s = os.popen('%s; java -version 2>&1' % javaExe(version)).read()
|
2012-08-10 05:24:51 -04:00
|
|
|
if s.find(' version "%s.' % version) == -1:
|
2012-04-06 09:33:54 -04:00
|
|
|
raise RuntimeError('got wrong version for java %s:\n%s' % (version, s))
|
|
|
|
|
|
|
|
# http://s.apache.org/lusolr32rc2
|
|
|
|
env = os.environ
|
|
|
|
try:
|
|
|
|
JAVA7_HOME = env['JAVA7_HOME']
|
|
|
|
except KeyError:
|
2013-04-20 06:54:55 -04:00
|
|
|
raise RuntimeError('please set JAVA7_HOME in the env before running smokeTestRelease')
|
2012-11-05 16:13:08 -05:00
|
|
|
print('JAVA7_HOME is %s' % JAVA7_HOME)
|
2012-04-06 09:33:54 -04:00
|
|
|
|
|
|
|
verifyJavaVersion('1.7')
|
2011-06-23 16:09:11 -04:00
|
|
|
|
2011-06-04 06:37:48 -04:00
|
|
|
# TODO
|
|
|
|
# + verify KEYS contains key that signed the release
|
|
|
|
# + make sure changes HTML looks ok
|
|
|
|
# - verify license/notice of all dep jars
|
|
|
|
# - check maven
|
|
|
|
# - check JAR manifest version
|
|
|
|
# - check license/notice exist
|
|
|
|
# - check no "extra" files
|
|
|
|
# - make sure jars exist inside bin release
|
|
|
|
# - run "ant test"
|
|
|
|
# - make sure docs exist
|
|
|
|
# - use java5 for lucene/modules
|
|
|
|
|
|
|
|
reHREF = re.compile('<a href="(.*?)">(.*?)</a>')
|
|
|
|
|
2012-09-26 14:33:46 -04:00
|
|
|
# Set to False to avoid re-downloading the packages...
|
|
|
|
FORCE_CLEAN = True
|
2011-06-04 06:37:48 -04:00
|
|
|
|
|
|
|
def getHREFs(urlString):
|
|
|
|
|
|
|
|
# Deref any redirects
|
|
|
|
while True:
|
2012-08-03 17:18:14 -04:00
|
|
|
url = urllib.parse.urlparse(urlString)
|
|
|
|
h = http.client.HTTPConnection(url.netloc)
|
2011-06-04 06:37:48 -04:00
|
|
|
h.request('GET', url.path)
|
|
|
|
r = h.getresponse()
|
|
|
|
newLoc = r.getheader('location')
|
|
|
|
if newLoc is not None:
|
|
|
|
urlString = newLoc
|
|
|
|
else:
|
|
|
|
break
|
|
|
|
|
|
|
|
links = []
|
2012-09-24 08:31:22 -04:00
|
|
|
try:
|
|
|
|
html = urllib.request.urlopen(urlString).read().decode('UTF-8')
|
|
|
|
except:
|
|
|
|
print('\nFAILED to open url %s' % urlString)
|
2012-09-24 11:25:13 -04:00
|
|
|
traceback.print_exc()
|
2012-09-24 08:31:22 -04:00
|
|
|
raise
|
|
|
|
|
|
|
|
for subUrl, text in reHREF.findall(html):
|
2012-08-03 17:18:14 -04:00
|
|
|
fullURL = urllib.parse.urljoin(urlString, subUrl)
|
2011-06-04 06:37:48 -04:00
|
|
|
links.append((text, fullURL))
|
|
|
|
return links
|
|
|
|
|
2012-03-19 13:36:27 -04:00
|
|
|
def download(name, urlString, tmpDir, quiet=False):
|
2013-04-21 09:26:54 -04:00
|
|
|
startTime = time.time()
|
2011-06-04 06:37:48 -04:00
|
|
|
fileName = '%s/%s' % (tmpDir, name)
|
2012-09-26 14:33:46 -04:00
|
|
|
if not FORCE_CLEAN and os.path.exists(fileName):
|
2012-03-19 13:36:27 -04:00
|
|
|
if not quiet and fileName.find('.asc') == -1:
|
2012-08-03 17:18:14 -04:00
|
|
|
print(' already done: %.1f MB' % (os.path.getsize(fileName)/1024./1024.))
|
2011-06-04 06:37:48 -04:00
|
|
|
return
|
|
|
|
try:
|
2013-04-20 06:54:55 -04:00
|
|
|
fIn = urllib.request.urlopen(urlString)
|
|
|
|
fOut = open(fileName, 'wb')
|
|
|
|
success = False
|
|
|
|
try:
|
|
|
|
while True:
|
|
|
|
s = fIn.read(65536)
|
|
|
|
if s == b'':
|
|
|
|
break
|
|
|
|
fOut.write(s)
|
|
|
|
fOut.close()
|
|
|
|
fIn.close()
|
|
|
|
success = True
|
|
|
|
finally:
|
|
|
|
fIn.close()
|
|
|
|
fOut.close()
|
|
|
|
if not success:
|
|
|
|
os.remove(fileName)
|
|
|
|
if not quiet and fileName.find('.asc') == -1:
|
2013-04-21 09:26:54 -04:00
|
|
|
t = time.time()-startTime
|
|
|
|
sizeMB = os.path.getsize(fileName)/1024./1024.
|
|
|
|
print(' %.1f MB in %.2f sec (%.1f MB/sec)' % (sizeMB, t, sizeMB/t))
|
2013-04-20 06:54:55 -04:00
|
|
|
except Exception as e:
|
|
|
|
raise RuntimeError('failed to download url "%s"' % urlString) from e
|
|
|
|
|
2011-06-04 06:37:48 -04:00
|
|
|
def load(urlString):
|
2012-08-03 17:49:24 -04:00
|
|
|
return urllib.request.urlopen(urlString).read().decode('utf-8')
|
2012-09-25 17:08:51 -04:00
|
|
|
|
|
|
|
def noJavaPackageClasses(desc, file):
|
|
|
|
with zipfile.ZipFile(file) as z2:
|
|
|
|
for name2 in z2.namelist():
|
|
|
|
if name2.endswith('.class') and (name2.startswith('java/') or name2.startswith('javax/')):
|
2012-09-26 10:51:36 -04:00
|
|
|
raise RuntimeError('%s contains sheisty class "%s"' % (desc, name2))
|
2012-09-25 17:08:51 -04:00
|
|
|
|
2012-09-26 14:33:46 -04:00
|
|
|
def decodeUTF8(bytes):
|
|
|
|
return codecs.getdecoder('UTF-8')(bytes)[0]
|
|
|
|
|
|
|
|
MANIFEST_FILE_NAME = 'META-INF/MANIFEST.MF'
|
|
|
|
NOTICE_FILE_NAME = 'META-INF/NOTICE.txt'
|
|
|
|
LICENSE_FILE_NAME = 'META-INF/LICENSE.txt'
|
|
|
|
|
2013-04-21 20:23:53 -04:00
|
|
|
def checkJARMetaData(desc, jarFile, svnRevision, version):
|
2012-09-26 14:33:46 -04:00
|
|
|
|
|
|
|
with zipfile.ZipFile(jarFile, 'r') as z:
|
|
|
|
for name in (MANIFEST_FILE_NAME, NOTICE_FILE_NAME, LICENSE_FILE_NAME):
|
|
|
|
try:
|
|
|
|
# The Python docs state a KeyError is raised ... so this None
|
|
|
|
# check is just defensive:
|
|
|
|
if z.getinfo(name) is None:
|
|
|
|
raise RuntimeError('%s is missing %s' % (desc, name))
|
|
|
|
except KeyError:
|
|
|
|
raise RuntimeError('%s is missing %s' % (desc, name))
|
|
|
|
|
|
|
|
s = decodeUTF8(z.read(MANIFEST_FILE_NAME))
|
|
|
|
|
|
|
|
for verify in (
|
2013-04-09 09:51:01 -04:00
|
|
|
'Specification-Vendor: The Apache Software Foundation',
|
2012-09-26 14:33:46 -04:00
|
|
|
'Implementation-Vendor: The Apache Software Foundation',
|
2013-03-18 08:28:52 -04:00
|
|
|
# Make sure 1.7 compiler was used to build release bits:
|
|
|
|
'X-Compile-Source-JDK: 1.7',
|
2013-04-09 09:51:01 -04:00
|
|
|
# Make sure 1.8 ant was used to build release bits: (this will match 1.8+)
|
|
|
|
'Ant-Version: Apache Ant 1.8',
|
2013-03-18 08:28:52 -04:00
|
|
|
# Make sure .class files are 1.7 format:
|
|
|
|
'X-Compile-Target-JDK: 1.7',
|
2013-03-26 07:56:55 -04:00
|
|
|
'Specification-Version: %s' % version,
|
|
|
|
# Make sure the release was compiled with 1.7:
|
|
|
|
'Created-By: 1.7'):
|
2012-09-26 14:33:46 -04:00
|
|
|
if s.find(verify) == -1:
|
2013-04-21 20:23:53 -04:00
|
|
|
raise RuntimeError('%s is missing "%s" inside its META-INF/MANIFEST.MF' % \
|
2012-09-26 14:33:46 -04:00
|
|
|
(desc, verify))
|
|
|
|
|
2013-05-07 12:39:54 -04:00
|
|
|
if svnRevision != 'skip':
|
|
|
|
# Make sure this matches the version and svn revision we think we are releasing:
|
|
|
|
verifyRevision = 'Implementation-Version: %s %s ' % (version, svnRevision)
|
|
|
|
if s.find(verifyRevision) == -1:
|
|
|
|
raise RuntimeError('%s is missing "%s" inside its META-INF/MANIFEST.MF (wrong svn revision?)' % \
|
|
|
|
(desc, verifyRevision))
|
|
|
|
|
2012-09-26 14:33:46 -04:00
|
|
|
notice = decodeUTF8(z.read(NOTICE_FILE_NAME))
|
|
|
|
license = decodeUTF8(z.read(LICENSE_FILE_NAME))
|
|
|
|
|
|
|
|
idx = desc.find('inside WAR file')
|
|
|
|
if idx != -1:
|
|
|
|
desc2 = desc[:idx]
|
|
|
|
else:
|
|
|
|
desc2 = desc
|
|
|
|
|
|
|
|
justFileName = os.path.split(desc2)[1]
|
|
|
|
|
|
|
|
if justFileName.lower().find('solr') != -1:
|
|
|
|
if SOLR_LICENSE is None:
|
|
|
|
raise RuntimeError('BUG in smokeTestRelease!')
|
|
|
|
if SOLR_NOTICE is None:
|
|
|
|
raise RuntimeError('BUG in smokeTestRelease!')
|
|
|
|
if notice != SOLR_NOTICE:
|
|
|
|
raise RuntimeError('%s: %s contents doesn\'t match main NOTICE.txt' % \
|
|
|
|
(desc, NOTICE_FILE_NAME))
|
|
|
|
if license != SOLR_LICENSE:
|
|
|
|
raise RuntimeError('%s: %s contents doesn\'t match main LICENSE.txt' % \
|
|
|
|
(desc, LICENSE_FILE_NAME))
|
|
|
|
else:
|
|
|
|
if LUCENE_LICENSE is None:
|
|
|
|
raise RuntimeError('BUG in smokeTestRelease!')
|
|
|
|
if LUCENE_NOTICE is None:
|
|
|
|
raise RuntimeError('BUG in smokeTestRelease!')
|
|
|
|
if notice != LUCENE_NOTICE:
|
|
|
|
raise RuntimeError('%s: %s contents doesn\'t match main NOTICE.txt' % \
|
|
|
|
(desc, NOTICE_FILE_NAME))
|
|
|
|
if license != LUCENE_LICENSE:
|
|
|
|
raise RuntimeError('%s: %s contents doesn\'t match main LICENSE.txt' % \
|
|
|
|
(desc, LICENSE_FILE_NAME))
|
|
|
|
|
2012-09-26 10:51:36 -04:00
|
|
|
def normSlashes(path):
|
|
|
|
return path.replace(os.sep, '/')
|
|
|
|
|
2013-10-11 12:58:36 -04:00
|
|
|
def checkAllJARs(topDir, project, svnRevision, version, tmpDir, baseURL):
|
|
|
|
print(' verify JAR metadata/identity/no javax.* or java.* classes...')
|
|
|
|
if project == 'solr':
|
|
|
|
luceneDistFilenames = dict()
|
|
|
|
for file in getBinaryDistFiles('lucene', tmpDir, version, baseURL):
|
|
|
|
luceneDistFilenames[os.path.basename(file)] = file
|
2012-09-26 10:51:36 -04:00
|
|
|
for root, dirs, files in os.walk(topDir):
|
|
|
|
|
|
|
|
normRoot = normSlashes(root)
|
|
|
|
|
|
|
|
if project == 'solr' and normRoot.endswith('/example/lib'):
|
|
|
|
# Solr's example intentionally ships servlet JAR:
|
|
|
|
continue
|
|
|
|
|
2012-09-25 17:08:51 -04:00
|
|
|
for file in files:
|
|
|
|
if file.lower().endswith('.jar'):
|
2012-09-26 10:51:36 -04:00
|
|
|
if project == 'solr':
|
2013-07-04 12:06:40 -04:00
|
|
|
if (normRoot.endswith('/contrib/dataimporthandler/lib') and (file.startswith('mail-') or file.startswith('activation-'))) or (normRoot.endswith('/test-framework/lib') and file.startswith('jersey-')):
|
2012-09-26 10:51:36 -04:00
|
|
|
print(' **WARNING**: skipping check of %s/%s: it has javax.* classes' % (root, file))
|
|
|
|
continue
|
2013-05-16 13:18:59 -04:00
|
|
|
else:
|
|
|
|
if normRoot.endswith('/replicator/lib') and file.startswith('javax.servlet'):
|
|
|
|
continue
|
2012-09-25 17:08:51 -04:00
|
|
|
fullPath = '%s/%s' % (root, file)
|
|
|
|
noJavaPackageClasses('JAR file "%s"' % fullPath, fullPath)
|
2012-09-26 14:33:46 -04:00
|
|
|
if file.lower().find('lucene') != -1 or file.lower().find('solr') != -1:
|
2013-04-21 20:23:53 -04:00
|
|
|
checkJARMetaData('JAR file "%s"' % fullPath, fullPath, svnRevision, version)
|
2013-10-11 12:58:36 -04:00
|
|
|
if project == 'solr' and file.lower().find('lucene') != -1:
|
|
|
|
jarFilename = os.path.basename(file)
|
|
|
|
if jarFilename not in luceneDistFilenames:
|
|
|
|
raise RuntimeError('Artifact %s is not present in Lucene binary distribution' % fullPath)
|
|
|
|
identical = filecmp.cmp(fullPath, luceneDistFilenames[jarFilename], shallow=False)
|
|
|
|
if not identical:
|
|
|
|
raise RuntimeError('Artifact %s is not identical to %s in Lucene binary distribution'
|
|
|
|
% (fullPath, luceneDistFilenames[jarFilename]))
|
|
|
|
|
2012-09-26 10:51:36 -04:00
|
|
|
|
2013-10-11 12:58:36 -04:00
|
|
|
def checkSolrWAR(warFileName, svnRevision, version, tmpDir, baseURL):
|
2012-09-25 17:08:51 -04:00
|
|
|
|
|
|
|
"""
|
|
|
|
Crawls for JARs inside the WAR and ensures there are no classes
|
|
|
|
under java.* or javax.* namespace.
|
|
|
|
"""
|
|
|
|
|
2013-10-11 12:58:36 -04:00
|
|
|
print(' verify WAR metadata/contained JAR identity/no javax.* or java.* classes...')
|
2012-09-25 17:08:51 -04:00
|
|
|
|
2013-04-21 20:23:53 -04:00
|
|
|
checkJARMetaData(warFileName, warFileName, svnRevision, version)
|
2012-09-26 14:33:46 -04:00
|
|
|
|
2013-10-11 12:58:36 -04:00
|
|
|
distFilenames = dict()
|
|
|
|
for file in getBinaryDistFiles('lucene', tmpDir, version, baseURL):
|
|
|
|
distFilenames[os.path.basename(file)] = file
|
|
|
|
|
2012-09-25 17:08:51 -04:00
|
|
|
with zipfile.ZipFile(warFileName, 'r') as z:
|
|
|
|
for name in z.namelist():
|
|
|
|
if name.endswith('.jar'):
|
2013-10-11 12:58:36 -04:00
|
|
|
jarInsideWarContents = z.read(name)
|
2012-09-25 17:08:51 -04:00
|
|
|
noJavaPackageClasses('JAR file %s inside WAR file %s' % (name, warFileName),
|
2013-10-11 12:58:36 -04:00
|
|
|
io.BytesIO(jarInsideWarContents))
|
2012-09-26 14:33:46 -04:00
|
|
|
if name.lower().find('lucene') != -1 or name.lower().find('solr') != -1:
|
|
|
|
checkJARMetaData('JAR file %s inside WAR file %s' % (name, warFileName),
|
2013-10-11 12:58:36 -04:00
|
|
|
io.BytesIO(jarInsideWarContents),
|
2013-04-21 20:23:53 -04:00
|
|
|
svnRevision,
|
2012-09-26 14:33:46 -04:00
|
|
|
version)
|
2013-10-11 12:58:36 -04:00
|
|
|
if name.lower().find('lucene') != -1:
|
|
|
|
jarInsideWarFilename = os.path.basename(name)
|
|
|
|
if jarInsideWarFilename not in distFilenames:
|
|
|
|
raise RuntimeError('Artifact %s in %s is not present in Lucene binary distribution'
|
|
|
|
% (name, warFileName))
|
|
|
|
distJarName = distFilenames[jarInsideWarFilename]
|
|
|
|
with open(distJarName, "rb", buffering=0) as distJarFile:
|
|
|
|
distJarContents = distJarFile.readall()
|
|
|
|
if jarInsideWarContents != distJarContents:
|
|
|
|
raise RuntimeError('Artifact %s in %s is not identical to %s in Lucene binary distribution'
|
|
|
|
% (name, warFileName, distJarName))
|
|
|
|
|
2012-09-25 17:08:51 -04:00
|
|
|
|
2012-04-08 14:22:14 -04:00
|
|
|
def checkSigs(project, urlString, version, tmpDir, isSigned):
|
2011-06-04 06:37:48 -04:00
|
|
|
|
2012-08-03 17:18:14 -04:00
|
|
|
print(' test basics...')
|
2011-06-04 06:37:48 -04:00
|
|
|
ents = getDirEntries(urlString)
|
|
|
|
artifact = None
|
|
|
|
keysURL = None
|
|
|
|
changesURL = None
|
|
|
|
mavenURL = None
|
2012-04-08 14:22:14 -04:00
|
|
|
expectedSigs = []
|
|
|
|
if isSigned:
|
|
|
|
expectedSigs.append('asc')
|
|
|
|
expectedSigs.extend(['md5', 'sha1'])
|
|
|
|
|
2011-06-04 06:37:48 -04:00
|
|
|
artifacts = []
|
|
|
|
for text, subURL in ents:
|
|
|
|
if text == 'KEYS':
|
|
|
|
keysURL = subURL
|
|
|
|
elif text == 'maven/':
|
|
|
|
mavenURL = subURL
|
|
|
|
elif text.startswith('changes'):
|
|
|
|
if text not in ('changes/', 'changes-%s/' % version):
|
|
|
|
raise RuntimeError('%s: found %s vs expected changes-%s/' % (project, text, version))
|
|
|
|
changesURL = subURL
|
|
|
|
elif artifact == None:
|
|
|
|
artifact = text
|
|
|
|
artifactURL = subURL
|
|
|
|
if project == 'solr':
|
2013-01-12 12:51:57 -05:00
|
|
|
expected = 'solr-%s' % version
|
2011-06-04 06:37:48 -04:00
|
|
|
else:
|
|
|
|
expected = 'lucene-%s' % version
|
|
|
|
if not artifact.startswith(expected):
|
|
|
|
raise RuntimeError('%s: unknown artifact %s: expected prefix %s' % (project, text, expected))
|
|
|
|
sigs = []
|
|
|
|
elif text.startswith(artifact + '.'):
|
|
|
|
sigs.append(text[len(artifact)+1:])
|
|
|
|
else:
|
|
|
|
if sigs != expectedSigs:
|
|
|
|
raise RuntimeError('%s: artifact %s has wrong sigs: expected %s but got %s' % (project, artifact, expectedSigs, sigs))
|
|
|
|
artifacts.append((artifact, artifactURL))
|
|
|
|
artifact = text
|
|
|
|
artifactURL = subURL
|
|
|
|
sigs = []
|
|
|
|
|
|
|
|
if sigs != []:
|
|
|
|
artifacts.append((artifact, artifactURL))
|
|
|
|
if sigs != expectedSigs:
|
|
|
|
raise RuntimeError('%s: artifact %s has wrong sigs: expected %s but got %s' % (project, artifact, expectedSigs, sigs))
|
|
|
|
|
|
|
|
if project == 'lucene':
|
|
|
|
expected = ['lucene-%s-src.tgz' % version,
|
|
|
|
'lucene-%s.tgz' % version,
|
|
|
|
'lucene-%s.zip' % version]
|
|
|
|
else:
|
2013-01-12 12:51:57 -05:00
|
|
|
expected = ['solr-%s-src.tgz' % version,
|
|
|
|
'solr-%s.tgz' % version,
|
|
|
|
'solr-%s.zip' % version]
|
2011-06-04 06:37:48 -04:00
|
|
|
|
|
|
|
actual = [x[0] for x in artifacts]
|
|
|
|
if expected != actual:
|
|
|
|
raise RuntimeError('%s: wrong artifacts: expected %s but got %s' % (project, expected, actual))
|
|
|
|
|
|
|
|
if keysURL is None:
|
|
|
|
raise RuntimeError('%s is missing KEYS' % project)
|
|
|
|
|
2012-08-03 17:18:14 -04:00
|
|
|
print(' get KEYS')
|
2011-06-04 06:37:48 -04:00
|
|
|
download('%s.KEYS' % project, keysURL, tmpDir)
|
|
|
|
|
|
|
|
keysFile = '%s/%s.KEYS' % (tmpDir, project)
|
|
|
|
|
|
|
|
# Set up clean gpg world; import keys file:
|
|
|
|
gpgHomeDir = '%s/%s.gpg' % (tmpDir, project)
|
|
|
|
if os.path.exists(gpgHomeDir):
|
|
|
|
shutil.rmtree(gpgHomeDir)
|
2012-08-03 17:18:14 -04:00
|
|
|
os.makedirs(gpgHomeDir, 0o700)
|
2011-06-04 06:37:48 -04:00
|
|
|
run('gpg --homedir %s --import %s' % (gpgHomeDir, keysFile),
|
2013-05-21 06:40:30 -04:00
|
|
|
'%s/%s.gpg.import.log' % (tmpDir, project))
|
2011-06-04 06:37:48 -04:00
|
|
|
|
|
|
|
if mavenURL is None:
|
|
|
|
raise RuntimeError('%s is missing maven' % project)
|
|
|
|
|
2012-09-24 00:40:14 -04:00
|
|
|
if changesURL is None:
|
|
|
|
raise RuntimeError('%s is missing changes-%s' % (project, version))
|
|
|
|
testChanges(project, version, changesURL)
|
2011-06-04 06:37:48 -04:00
|
|
|
|
|
|
|
for artifact, urlString in artifacts:
|
2012-08-03 17:18:14 -04:00
|
|
|
print(' download %s...' % artifact)
|
2011-06-04 06:37:48 -04:00
|
|
|
download(artifact, urlString, tmpDir)
|
|
|
|
verifyDigests(artifact, urlString, tmpDir)
|
|
|
|
|
2012-04-08 14:22:14 -04:00
|
|
|
if isSigned:
|
2012-08-03 17:18:14 -04:00
|
|
|
print(' verify sig')
|
2012-04-08 14:22:14 -04:00
|
|
|
# Test sig (this is done with a clean brand-new GPG world)
|
|
|
|
download(artifact + '.asc', urlString + '.asc', tmpDir)
|
|
|
|
sigFile = '%s/%s.asc' % (tmpDir, artifact)
|
|
|
|
artifactFile = '%s/%s' % (tmpDir, artifact)
|
|
|
|
logFile = '%s/%s.%s.gpg.verify.log' % (tmpDir, project, artifact)
|
|
|
|
run('gpg --homedir %s --verify %s %s' % (gpgHomeDir, sigFile, artifactFile),
|
|
|
|
logFile)
|
|
|
|
# Forward any GPG warnings, except the expected one (since its a clean world)
|
2012-08-03 17:49:24 -04:00
|
|
|
f = open(logFile, encoding='UTF-8')
|
2012-04-08 14:22:14 -04:00
|
|
|
for line in f.readlines():
|
|
|
|
if line.lower().find('warning') != -1 \
|
|
|
|
and line.find('WARNING: This key is not certified with a trusted signature') == -1:
|
2012-08-03 17:18:14 -04:00
|
|
|
print(' GPG: %s' % line.strip())
|
2012-04-08 14:22:14 -04:00
|
|
|
f.close()
|
2011-11-21 08:54:41 -05:00
|
|
|
|
2012-04-08 14:22:14 -04:00
|
|
|
# Test trust (this is done with the real users config)
|
|
|
|
run('gpg --import %s' % (keysFile),
|
2013-05-21 06:40:30 -04:00
|
|
|
'%s/%s.gpg.trust.import.log' % (tmpDir, project))
|
2012-08-03 17:18:14 -04:00
|
|
|
print(' verify trust')
|
2012-04-08 14:22:14 -04:00
|
|
|
logFile = '%s/%s.%s.gpg.trust.log' % (tmpDir, project, artifact)
|
|
|
|
run('gpg --verify %s %s' % (sigFile, artifactFile), logFile)
|
|
|
|
# Forward any GPG warnings:
|
2012-08-03 17:49:24 -04:00
|
|
|
f = open(logFile, encoding='UTF-8')
|
2012-04-08 14:22:14 -04:00
|
|
|
for line in f.readlines():
|
|
|
|
if line.lower().find('warning') != -1:
|
2012-08-03 17:18:14 -04:00
|
|
|
print(' GPG: %s' % line.strip())
|
2012-04-08 14:22:14 -04:00
|
|
|
f.close()
|
2011-06-04 06:37:48 -04:00
|
|
|
|
|
|
|
def testChanges(project, version, changesURLString):
|
2012-08-03 17:18:14 -04:00
|
|
|
print(' check changes HTML...')
|
2011-06-04 06:37:48 -04:00
|
|
|
changesURL = None
|
|
|
|
for text, subURL in getDirEntries(changesURLString):
|
|
|
|
if text == 'Changes.html':
|
|
|
|
changesURL = subURL
|
|
|
|
|
|
|
|
if changesURL is None:
|
|
|
|
raise RuntimeError('did not see Changes.html link from %s' % changesURLString)
|
|
|
|
|
|
|
|
s = load(changesURL)
|
2011-06-28 16:51:05 -04:00
|
|
|
checkChangesContent(s, version, changesURL, project, True)
|
2011-06-04 06:37:48 -04:00
|
|
|
|
2011-06-28 16:51:05 -04:00
|
|
|
def testChangesText(dir, version, project):
|
|
|
|
"Checks all CHANGES.txt under this dir."
|
|
|
|
for root, dirs, files in os.walk(dir):
|
|
|
|
|
|
|
|
# NOTE: O(N) but N should be smallish:
|
|
|
|
if 'CHANGES.txt' in files:
|
|
|
|
fullPath = '%s/CHANGES.txt' % root
|
2012-03-22 11:24:44 -04:00
|
|
|
#print 'CHECK %s' % fullPath
|
2012-08-03 17:49:24 -04:00
|
|
|
checkChangesContent(open(fullPath, encoding='UTF-8').read(), version, fullPath, project, False)
|
2013-04-19 13:38:46 -04:00
|
|
|
|
|
|
|
reChangesSectionHREF = re.compile('<a id="(.*?)".*?>(.*?)</a>', re.IGNORECASE)
|
|
|
|
|
2011-06-28 16:51:05 -04:00
|
|
|
def checkChangesContent(s, version, name, project, isHTML):
|
|
|
|
|
|
|
|
if isHTML and s.find('Release %s' % version) == -1:
|
|
|
|
raise RuntimeError('did not see "Release %s" in %s' % (version, name))
|
|
|
|
|
|
|
|
if s.lower().find('not yet released') != -1:
|
|
|
|
raise RuntimeError('saw "not yet released" in %s' % name)
|
|
|
|
|
|
|
|
if not isHTML:
|
|
|
|
if project == 'lucene':
|
|
|
|
sub = 'Lucene %s' % version
|
|
|
|
else:
|
|
|
|
sub = version
|
|
|
|
|
|
|
|
if s.find(sub) == -1:
|
2012-06-08 06:18:09 -04:00
|
|
|
# benchmark never seems to include release info:
|
2011-06-28 16:51:05 -04:00
|
|
|
if name.find('/benchmark/') == -1:
|
|
|
|
raise RuntimeError('did not see "%s" in %s' % (sub, name))
|
2012-04-08 13:15:54 -04:00
|
|
|
|
2013-04-19 13:38:46 -04:00
|
|
|
if isHTML:
|
|
|
|
# Make sure a section only appears once under each release:
|
|
|
|
seenIDs = set()
|
|
|
|
seenText = set()
|
|
|
|
|
|
|
|
release = None
|
|
|
|
for id, text in reChangesSectionHREF.findall(s):
|
|
|
|
if text.lower().startswith('release '):
|
|
|
|
release = text[8:].strip()
|
|
|
|
seenText.clear()
|
|
|
|
if id in seenIDs:
|
|
|
|
raise RuntimeError('%s has duplicate section "%s" under release "%s"' % (name, text, release))
|
|
|
|
seenIDs.add(id)
|
|
|
|
if text in seenText:
|
|
|
|
raise RuntimeError('%s has duplicate section "%s" under release "%s"' % (name, text, release))
|
|
|
|
seenText.add(text)
|
|
|
|
|
2012-04-08 13:15:54 -04:00
|
|
|
reUnixPath = re.compile(r'\b[a-zA-Z_]+=(?:"(?:\\"|[^"])*"' + '|(?:\\\\.|[^"\'\\s])*' + r"|'(?:\\'|[^'])*')" \
|
|
|
|
+ r'|(/(?:\\.|[^"\'\s])*)' \
|
|
|
|
+ r'|("/(?:\\.|[^"])*")' \
|
|
|
|
+ r"|('/(?:\\.|[^'])*')")
|
|
|
|
|
|
|
|
def unix2win(matchobj):
|
|
|
|
if matchobj.group(1) is not None: return cygwinWindowsRoot + matchobj.group()
|
|
|
|
if matchobj.group(2) is not None: return '"%s%s' % (cygwinWindowsRoot, matchobj.group().lstrip('"'))
|
|
|
|
if matchobj.group(3) is not None: return "'%s%s" % (cygwinWindowsRoot, matchobj.group().lstrip("'"))
|
|
|
|
return matchobj.group()
|
|
|
|
|
|
|
|
def cygwinifyPaths(command):
|
|
|
|
# The problem: Native Windows applications running under Cygwin
|
|
|
|
# (e.g. Ant, which isn't available as a Cygwin package) can't
|
|
|
|
# handle Cygwin's Unix-style paths. However, environment variable
|
|
|
|
# values are automatically converted, so only paths outside of
|
|
|
|
# environment variable values should be converted to Windows paths.
|
|
|
|
# Assumption: all paths will be absolute.
|
|
|
|
if '; ant ' in command: command = reUnixPath.sub(unix2win, command)
|
|
|
|
return command
|
|
|
|
|
2012-11-08 09:00:28 -05:00
|
|
|
def printFileContents(fileName):
|
|
|
|
|
|
|
|
# Assume log file was written in system's default encoding, but
|
|
|
|
# even if we are wrong, we replace errors ... the ASCII chars
|
|
|
|
# (which is what we mostly care about eg for the test seed) should
|
|
|
|
# still survive:
|
|
|
|
txt = codecs.open(fileName, 'r', encoding=sys.getdefaultencoding(), errors='replace').read()
|
|
|
|
|
|
|
|
# Encode to our output encoding (likely also system's default
|
|
|
|
# encoding):
|
|
|
|
bytes = txt.encode(sys.stdout.encoding, errors='replace')
|
|
|
|
|
|
|
|
# Decode back to string and print... we should hit no exception here
|
|
|
|
# since all errors have been replaced:
|
|
|
|
print(codecs.getdecoder(sys.stdout.encoding)(bytes)[0])
|
|
|
|
print()
|
|
|
|
|
2011-06-04 06:37:48 -04:00
|
|
|
def run(command, logFile):
|
2012-04-08 13:15:54 -04:00
|
|
|
if cygwin: command = cygwinifyPaths(command)
|
2011-06-04 06:37:48 -04:00
|
|
|
if os.system('%s > %s 2>&1' % (command, logFile)):
|
2012-03-19 13:36:27 -04:00
|
|
|
logPath = os.path.abspath(logFile)
|
2012-09-26 11:55:27 -04:00
|
|
|
print('\ncommand "%s" failed:' % command)
|
2012-11-08 09:00:28 -05:00
|
|
|
printFileContents(logFile)
|
2012-03-19 13:36:27 -04:00
|
|
|
raise RuntimeError('command "%s" failed; see log file %s' % (command, logPath))
|
2011-06-04 06:37:48 -04:00
|
|
|
|
|
|
|
def verifyDigests(artifact, urlString, tmpDir):
|
2012-08-03 17:18:14 -04:00
|
|
|
print(' verify md5/sha1 digests')
|
2011-06-04 06:37:48 -04:00
|
|
|
md5Expected, t = load(urlString + '.md5').strip().split()
|
|
|
|
if t != '*'+artifact:
|
|
|
|
raise RuntimeError('MD5 %s.md5 lists artifact %s but expected *%s' % (urlString, t, artifact))
|
|
|
|
|
|
|
|
sha1Expected, t = load(urlString + '.sha1').strip().split()
|
|
|
|
if t != '*'+artifact:
|
|
|
|
raise RuntimeError('SHA1 %s.sha1 lists artifact %s but expected *%s' % (urlString, t, artifact))
|
|
|
|
|
|
|
|
m = hashlib.md5()
|
|
|
|
s = hashlib.sha1()
|
2012-08-03 17:49:24 -04:00
|
|
|
f = open('%s/%s' % (tmpDir, artifact), 'rb')
|
2011-06-04 06:37:48 -04:00
|
|
|
while True:
|
|
|
|
x = f.read(65536)
|
2012-08-03 17:49:24 -04:00
|
|
|
if len(x) == 0:
|
2011-06-04 06:37:48 -04:00
|
|
|
break
|
|
|
|
m.update(x)
|
|
|
|
s.update(x)
|
|
|
|
f.close()
|
|
|
|
md5Actual = m.hexdigest()
|
|
|
|
sha1Actual = s.hexdigest()
|
|
|
|
if md5Actual != md5Expected:
|
|
|
|
raise RuntimeError('MD5 digest mismatch for %s: expected %s but got %s' % (artifact, md5Expected, md5Actual))
|
|
|
|
if sha1Actual != sha1Expected:
|
|
|
|
raise RuntimeError('SHA1 digest mismatch for %s: expected %s but got %s' % (artifact, sha1Expected, sha1Actual))
|
2012-03-19 13:36:27 -04:00
|
|
|
|
2011-06-04 06:37:48 -04:00
|
|
|
def getDirEntries(urlString):
|
2012-08-07 16:58:46 -04:00
|
|
|
if urlString.startswith('file:/') and not urlString.startswith('file://'):
|
|
|
|
# stupid bogus ant URI
|
|
|
|
urlString = "file:///" + urlString[6:]
|
|
|
|
|
2012-04-08 14:22:14 -04:00
|
|
|
if urlString.startswith('file://'):
|
|
|
|
path = urlString[7:]
|
|
|
|
if path.endswith('/'):
|
|
|
|
path = path[:-1]
|
2012-09-22 21:28:16 -04:00
|
|
|
if cygwin: # Convert Windows path to Cygwin path
|
|
|
|
path = re.sub(r'^/([A-Za-z]):/', r'/cygdrive/\1/', path)
|
2012-04-08 14:22:14 -04:00
|
|
|
l = []
|
|
|
|
for ent in os.listdir(path):
|
|
|
|
entPath = '%s/%s' % (path, ent)
|
|
|
|
if os.path.isdir(entPath):
|
|
|
|
entPath += '/'
|
|
|
|
ent += '/'
|
|
|
|
l.append((ent, 'file://%s' % entPath))
|
|
|
|
l.sort()
|
|
|
|
return l
|
|
|
|
else:
|
|
|
|
links = getHREFs(urlString)
|
|
|
|
for i, (text, subURL) in enumerate(links):
|
|
|
|
if text == 'Parent Directory' or text == '..':
|
|
|
|
return links[(i+1):]
|
2011-06-04 06:37:48 -04:00
|
|
|
|
2013-10-11 12:58:36 -04:00
|
|
|
def unpackAndVerify(project, tmpDir, artifact, svnRevision, version, testArgs, baseURL):
|
2011-06-04 06:37:48 -04:00
|
|
|
destDir = '%s/unpack' % tmpDir
|
|
|
|
if os.path.exists(destDir):
|
|
|
|
shutil.rmtree(destDir)
|
|
|
|
os.makedirs(destDir)
|
|
|
|
os.chdir(destDir)
|
2012-09-25 15:09:58 -04:00
|
|
|
print(' unpack %s...' % artifact)
|
2011-06-04 06:37:48 -04:00
|
|
|
unpackLogFile = '%s/%s-unpack-%s.log' % (tmpDir, project, artifact)
|
|
|
|
if artifact.endswith('.tar.gz') or artifact.endswith('.tgz'):
|
|
|
|
run('tar xzf %s/%s' % (tmpDir, artifact), unpackLogFile)
|
|
|
|
elif artifact.endswith('.zip'):
|
|
|
|
run('unzip %s/%s' % (tmpDir, artifact), unpackLogFile)
|
|
|
|
|
|
|
|
# make sure it unpacks to proper subdir
|
|
|
|
l = os.listdir(destDir)
|
2013-01-12 12:51:57 -05:00
|
|
|
expected = '%s-%s' % (project, version)
|
2011-06-04 06:37:48 -04:00
|
|
|
if l != [expected]:
|
|
|
|
raise RuntimeError('unpack produced entries %s; expected only %s' % (l, expected))
|
|
|
|
|
|
|
|
unpackPath = '%s/%s' % (destDir, expected)
|
2013-10-11 12:58:36 -04:00
|
|
|
verifyUnpacked(project, artifact, unpackPath, svnRevision, version, testArgs, tmpDir, baseURL)
|
2011-06-04 06:37:48 -04:00
|
|
|
|
2012-09-26 14:33:46 -04:00
|
|
|
LUCENE_NOTICE = None
|
|
|
|
LUCENE_LICENSE = None
|
|
|
|
SOLR_NOTICE = None
|
|
|
|
SOLR_LICENSE = None
|
|
|
|
|
2013-10-11 12:58:36 -04:00
|
|
|
def verifyUnpacked(project, artifact, unpackPath, svnRevision, version, testArgs, tmpDir, baseURL):
|
2012-09-26 14:33:46 -04:00
|
|
|
global LUCENE_NOTICE
|
|
|
|
global LUCENE_LICENSE
|
|
|
|
global SOLR_NOTICE
|
|
|
|
global SOLR_LICENSE
|
|
|
|
|
2011-06-04 06:37:48 -04:00
|
|
|
os.chdir(unpackPath)
|
|
|
|
isSrc = artifact.find('-src') != -1
|
|
|
|
l = os.listdir(unpackPath)
|
2012-10-18 08:34:08 -04:00
|
|
|
textFiles = ['LICENSE', 'NOTICE', 'README']
|
2011-06-04 06:37:48 -04:00
|
|
|
if project == 'lucene':
|
2012-10-18 08:34:08 -04:00
|
|
|
textFiles.extend(('JRE_VERSION_MIGRATION', 'CHANGES', 'MIGRATE', 'SYSTEM_REQUIREMENTS'))
|
2011-06-04 06:37:48 -04:00
|
|
|
if isSrc:
|
|
|
|
textFiles.append('BUILD')
|
2012-10-18 13:31:39 -04:00
|
|
|
elif not isSrc:
|
|
|
|
textFiles.append('SYSTEM_REQUIREMENTS')
|
|
|
|
|
2011-06-04 06:37:48 -04:00
|
|
|
for fileName in textFiles:
|
|
|
|
fileName += '.txt'
|
|
|
|
if fileName not in l:
|
|
|
|
raise RuntimeError('file "%s" is missing from artifact %s' % (fileName, artifact))
|
|
|
|
l.remove(fileName)
|
|
|
|
|
2012-09-26 14:33:46 -04:00
|
|
|
if project == 'lucene':
|
|
|
|
if LUCENE_NOTICE is None:
|
2012-09-29 10:26:53 -04:00
|
|
|
LUCENE_NOTICE = open('%s/NOTICE.txt' % unpackPath, encoding='UTF-8').read()
|
2012-09-26 14:33:46 -04:00
|
|
|
if LUCENE_LICENSE is None:
|
2012-09-29 10:26:53 -04:00
|
|
|
LUCENE_LICENSE = open('%s/LICENSE.txt' % unpackPath, encoding='UTF-8').read()
|
2012-09-26 14:33:46 -04:00
|
|
|
else:
|
|
|
|
if SOLR_NOTICE is None:
|
2012-09-29 10:26:53 -04:00
|
|
|
SOLR_NOTICE = open('%s/NOTICE.txt' % unpackPath, encoding='UTF-8').read()
|
2012-09-26 14:33:46 -04:00
|
|
|
if SOLR_LICENSE is None:
|
2012-09-29 10:26:53 -04:00
|
|
|
SOLR_LICENSE = open('%s/LICENSE.txt' % unpackPath, encoding='UTF-8').read()
|
2012-09-26 14:33:46 -04:00
|
|
|
|
2011-06-04 06:37:48 -04:00
|
|
|
if not isSrc:
|
2012-06-08 05:46:28 -04:00
|
|
|
# TODO: we should add verifyModule/verifySubmodule (e.g. analysis) here and recurse through
|
2011-06-04 06:37:48 -04:00
|
|
|
if project == 'lucene':
|
2012-06-08 05:46:28 -04:00
|
|
|
expectedJARs = ()
|
2011-06-04 06:37:48 -04:00
|
|
|
else:
|
|
|
|
expectedJARs = ()
|
|
|
|
|
|
|
|
for fileName in expectedJARs:
|
|
|
|
fileName += '.jar'
|
|
|
|
if fileName not in l:
|
|
|
|
raise RuntimeError('%s: file "%s" is missing from artifact %s' % (project, fileName, artifact))
|
|
|
|
l.remove(fileName)
|
|
|
|
|
|
|
|
if project == 'lucene':
|
2012-06-08 05:46:28 -04:00
|
|
|
# TODO: clean this up to not be a list of modules that we must maintain
|
2013-09-12 23:11:17 -04:00
|
|
|
extras = ('analysis', 'benchmark', 'classification', 'codecs', 'core', 'demo', 'docs', 'expressions', 'facet', 'grouping', 'highlighter', 'join', 'memory', 'misc', 'queries', 'queryparser', 'replicator', 'sandbox', 'spatial', 'suggest', 'test-framework', 'licenses')
|
2011-06-04 06:37:48 -04:00
|
|
|
if isSrc:
|
2013-10-02 10:10:19 -04:00
|
|
|
extras += ('build.xml', 'common-build.xml', 'module-build.xml', 'ivy-settings.xml', 'ivy-versions.properties', 'backwards', 'tools', 'site')
|
2011-06-04 06:37:48 -04:00
|
|
|
else:
|
|
|
|
extras = ()
|
|
|
|
|
2012-08-03 18:48:27 -04:00
|
|
|
# TODO: if solr, verify lucene/licenses, solr/licenses are present
|
|
|
|
|
2011-06-04 06:37:48 -04:00
|
|
|
for e in extras:
|
|
|
|
if e not in l:
|
|
|
|
raise RuntimeError('%s: %s missing from artifact %s' % (project, e, artifact))
|
|
|
|
l.remove(e)
|
|
|
|
|
|
|
|
if project == 'lucene':
|
|
|
|
if len(l) > 0:
|
|
|
|
raise RuntimeError('%s: unexpected files/dirs in artifact %s: %s' % (project, artifact, l))
|
2012-10-18 13:31:39 -04:00
|
|
|
elif isSrc and not os.path.exists('%s/solr/SYSTEM_REQUIREMENTS.txt' % unpackPath):
|
|
|
|
raise RuntimeError('%s: solr/SYSTEM_REQUIREMENTS.txt does not exist in artifact %s' % (project, artifact))
|
2011-06-04 06:37:48 -04:00
|
|
|
|
|
|
|
if isSrc:
|
2012-08-03 17:18:14 -04:00
|
|
|
print(' make sure no JARs/WARs in src dist...')
|
2012-04-06 09:33:54 -04:00
|
|
|
lines = os.popen('find . -name \\*.jar').readlines()
|
|
|
|
if len(lines) != 0:
|
2012-08-03 17:18:14 -04:00
|
|
|
print(' FAILED:')
|
2012-04-06 09:33:54 -04:00
|
|
|
for line in lines:
|
2012-08-03 17:18:14 -04:00
|
|
|
print(' %s' % line.strip())
|
2012-04-06 09:33:54 -04:00
|
|
|
raise RuntimeError('source release has JARs...')
|
|
|
|
lines = os.popen('find . -name \\*.war').readlines()
|
|
|
|
if len(lines) != 0:
|
2012-08-03 17:18:14 -04:00
|
|
|
print(' FAILED:')
|
2012-04-06 09:33:54 -04:00
|
|
|
for line in lines:
|
2012-08-03 17:18:14 -04:00
|
|
|
print(' %s' % line.strip())
|
2012-04-06 09:33:54 -04:00
|
|
|
raise RuntimeError('source release has WARs...')
|
|
|
|
|
2012-08-03 17:18:14 -04:00
|
|
|
print(' run "ant validate"')
|
2012-04-06 09:33:54 -04:00
|
|
|
run('%s; ant validate' % javaExe('1.7'), '%s/validate.log' % unpackPath)
|
|
|
|
|
2011-06-04 06:37:48 -04:00
|
|
|
if project == 'lucene':
|
2013-05-20 12:51:52 -04:00
|
|
|
print(" run tests w/ Java 7 and testArgs='%s'..." % testArgs)
|
|
|
|
run('%s; ant clean test %s' % (javaExe('1.7'), testArgs), '%s/test.log' % unpackPath)
|
2012-10-26 00:53:34 -04:00
|
|
|
run('%s; ant jar' % javaExe('1.7'), '%s/compile.log' % unpackPath)
|
|
|
|
testDemo(isSrc, version, '1.7')
|
|
|
|
|
|
|
|
print(' generate javadocs w/ Java 7...')
|
|
|
|
run('%s; ant javadocs' % javaExe('1.7'), '%s/javadocs.log' % unpackPath)
|
|
|
|
checkJavadocpathFull('%s/build/docs' % unpackPath)
|
|
|
|
|
2011-06-04 06:37:48 -04:00
|
|
|
else:
|
2012-09-06 18:45:52 -04:00
|
|
|
os.chdir('solr')
|
2011-11-21 10:45:07 -05:00
|
|
|
|
2012-09-22 09:10:29 -04:00
|
|
|
# DISABLED until solr tests consistently pass
|
2013-05-20 12:51:52 -04:00
|
|
|
#print(" run tests w/ Java 7 and testArgs='%s'..." % testArgs)
|
|
|
|
#run('%s; ant clean test %s' % (javaExe('1.7'), testArgs), '%s/test.log' % unpackPath)
|
2011-11-21 10:45:07 -05:00
|
|
|
|
|
|
|
# test javadocs
|
2012-08-03 17:18:14 -04:00
|
|
|
print(' generate javadocs w/ Java 7...')
|
2012-10-26 00:53:34 -04:00
|
|
|
run('%s; ant clean javadocs' % javaExe('1.7'), '%s/javadocs.log' % unpackPath)
|
|
|
|
checkJavadocpathFull('%s/solr/build/docs' % unpackPath, False)
|
2011-11-21 10:45:07 -05:00
|
|
|
|
2012-08-03 17:18:14 -04:00
|
|
|
print(' test solr example w/ Java 7...')
|
2012-04-06 09:33:54 -04:00
|
|
|
run('%s; ant clean example' % javaExe('1.7'), '%s/antexample.log' % unpackPath)
|
|
|
|
testSolrExample(unpackPath, JAVA7_HOME, True)
|
|
|
|
os.chdir('..')
|
|
|
|
|
2012-08-03 17:18:14 -04:00
|
|
|
print(' check NOTICE')
|
2012-04-06 09:33:54 -04:00
|
|
|
testNotice(unpackPath)
|
|
|
|
|
2011-06-04 06:37:48 -04:00
|
|
|
else:
|
2012-09-26 10:51:36 -04:00
|
|
|
|
2013-10-11 12:58:36 -04:00
|
|
|
checkAllJARs(os.getcwd(), project, svnRevision, version, tmpDir, baseURL)
|
2012-09-26 10:51:36 -04:00
|
|
|
|
2011-06-04 06:37:48 -04:00
|
|
|
if project == 'lucene':
|
2012-10-26 00:53:34 -04:00
|
|
|
testDemo(isSrc, version, '1.7')
|
2012-09-25 17:08:51 -04:00
|
|
|
|
2012-04-06 09:33:54 -04:00
|
|
|
else:
|
2013-10-11 12:58:36 -04:00
|
|
|
checkSolrWAR('%s/example/webapps/solr.war' % unpackPath, svnRevision, version, tmpDir, baseURL)
|
2012-09-25 17:08:51 -04:00
|
|
|
|
2012-09-25 15:09:58 -04:00
|
|
|
print(' copying unpacked distribution for Java 7 ...')
|
|
|
|
java7UnpackPath = '%s-java7' %unpackPath
|
|
|
|
if os.path.exists(java7UnpackPath):
|
|
|
|
shutil.rmtree(java7UnpackPath)
|
|
|
|
shutil.copytree(unpackPath, java7UnpackPath)
|
|
|
|
os.chdir(java7UnpackPath)
|
2012-08-03 17:18:14 -04:00
|
|
|
print(' test solr example w/ Java 7...')
|
2012-09-25 15:09:58 -04:00
|
|
|
testSolrExample(java7UnpackPath, JAVA7_HOME, False)
|
|
|
|
|
|
|
|
os.chdir(unpackPath)
|
2011-06-04 06:37:48 -04:00
|
|
|
|
2011-06-28 16:51:05 -04:00
|
|
|
testChangesText('.', version, project)
|
|
|
|
|
2012-03-22 11:24:44 -04:00
|
|
|
if project == 'lucene' and not isSrc:
|
2012-08-03 17:18:14 -04:00
|
|
|
print(' check Lucene\'s javadoc JAR')
|
2012-06-08 06:18:09 -04:00
|
|
|
checkJavadocpath('%s/docs' % unpackPath)
|
2012-03-22 11:24:44 -04:00
|
|
|
|
2012-04-06 09:33:54 -04:00
|
|
|
def testNotice(unpackPath):
|
2012-08-03 17:49:24 -04:00
|
|
|
solrNotice = open('%s/NOTICE.txt' % unpackPath, encoding='UTF-8').read()
|
|
|
|
luceneNotice = open('%s/lucene/NOTICE.txt' % unpackPath, encoding='UTF-8').read()
|
2012-04-06 09:33:54 -04:00
|
|
|
|
|
|
|
expected = """
|
|
|
|
=========================================================================
|
|
|
|
== Apache Lucene Notice ==
|
|
|
|
=========================================================================
|
|
|
|
|
|
|
|
""" + luceneNotice + """---
|
|
|
|
"""
|
|
|
|
|
|
|
|
if solrNotice.find(expected) == -1:
|
|
|
|
raise RuntimeError('Solr\'s NOTICE.txt does not have the verbatim copy, plus header/footer, of Lucene\'s NOTICE.txt')
|
|
|
|
|
2012-08-20 20:16:43 -04:00
|
|
|
def readSolrOutput(p, startupEvent, failureEvent, logFile):
|
2012-04-06 09:33:54 -04:00
|
|
|
f = open(logFile, 'wb')
|
|
|
|
try:
|
|
|
|
while True:
|
2013-04-01 18:04:05 -04:00
|
|
|
line = p.stdout.readline()
|
2012-08-03 18:48:27 -04:00
|
|
|
if len(line) == 0:
|
2012-11-08 09:00:28 -05:00
|
|
|
p.poll()
|
|
|
|
if not startupEvent.isSet():
|
|
|
|
failureEvent.set()
|
|
|
|
startupEvent.set()
|
2012-04-06 09:33:54 -04:00
|
|
|
break
|
|
|
|
f.write(line)
|
|
|
|
f.flush()
|
2012-11-08 09:00:28 -05:00
|
|
|
#print('SOLR: %s' % line.strip())
|
|
|
|
if not startupEvent.isSet():
|
|
|
|
if line.find(b'Started SocketConnector@0.0.0.0:8983') != -1:
|
|
|
|
startupEvent.set()
|
|
|
|
elif p.poll() is not None:
|
|
|
|
failureEvent.set()
|
|
|
|
startupEvent.set()
|
|
|
|
break
|
2012-08-20 20:16:43 -04:00
|
|
|
except:
|
|
|
|
print()
|
|
|
|
print('Exception reading Solr output:')
|
|
|
|
traceback.print_exc()
|
|
|
|
failureEvent.set()
|
2012-11-08 09:00:28 -05:00
|
|
|
startupEvent.set()
|
2012-04-06 09:33:54 -04:00
|
|
|
finally:
|
|
|
|
f.close()
|
|
|
|
|
|
|
|
def testSolrExample(unpackPath, javaPath, isSrc):
|
|
|
|
logFile = '%s/solr-example.log' % unpackPath
|
|
|
|
os.chdir('example')
|
2012-08-03 17:18:14 -04:00
|
|
|
print(' start Solr instance (log=%s)...' % logFile)
|
2012-04-06 09:33:54 -04:00
|
|
|
env = {}
|
|
|
|
env.update(os.environ)
|
|
|
|
env['JAVA_HOME'] = javaPath
|
|
|
|
env['PATH'] = '%s/bin:%s' % (javaPath, env['PATH'])
|
2013-04-01 18:04:05 -04:00
|
|
|
server = subprocess.Popen(['java', '-jar', 'start.jar'], stdout=subprocess.PIPE, stderr=subprocess.STDOUT, stdin=subprocess.PIPE, env=env)
|
2012-04-06 09:33:54 -04:00
|
|
|
|
|
|
|
startupEvent = threading.Event()
|
2012-08-20 20:16:43 -04:00
|
|
|
failureEvent = threading.Event()
|
2012-11-08 09:00:28 -05:00
|
|
|
serverThread = threading.Thread(target=readSolrOutput, args=(server, startupEvent, failureEvent, logFile))
|
2012-04-06 09:33:54 -04:00
|
|
|
serverThread.setDaemon(True)
|
|
|
|
serverThread.start()
|
|
|
|
|
|
|
|
try:
|
2013-03-31 17:30:31 -04:00
|
|
|
|
|
|
|
# Make sure Solr finishes startup:
|
|
|
|
if not startupEvent.wait(1800):
|
|
|
|
raise RuntimeError('startup took more than 30 minutes')
|
|
|
|
|
|
|
|
if failureEvent.isSet():
|
|
|
|
logFile = os.path.abspath(logFile)
|
|
|
|
print
|
|
|
|
print('Startup failed; see log %s' % logFile)
|
|
|
|
printFileContents(logFile)
|
|
|
|
raise RuntimeError('failure on startup; see log %s' % logFile)
|
|
|
|
|
|
|
|
print(' startup done')
|
|
|
|
|
2012-08-03 17:18:14 -04:00
|
|
|
print(' test utf8...')
|
2012-04-06 09:33:54 -04:00
|
|
|
run('sh ./exampledocs/test_utf8.sh', 'utf8.log')
|
2012-08-03 17:18:14 -04:00
|
|
|
print(' index example docs...')
|
2012-04-06 09:33:54 -04:00
|
|
|
run('sh ./exampledocs/post.sh ./exampledocs/*.xml', 'post-example-docs.log')
|
2012-08-03 17:18:14 -04:00
|
|
|
print(' run query...')
|
2012-08-03 17:49:24 -04:00
|
|
|
s = urllib.request.urlopen('http://localhost:8983/solr/select/?q=video').read().decode('UTF-8')
|
2012-04-06 09:33:54 -04:00
|
|
|
if s.find('<result name="response" numFound="3" start="0">') == -1:
|
2012-08-03 17:18:14 -04:00
|
|
|
print('FAILED: response is:\n%s' % s)
|
2012-04-06 09:33:54 -04:00
|
|
|
raise RuntimeError('query on solr example instance failed')
|
|
|
|
finally:
|
|
|
|
# Stop server:
|
2012-08-03 17:18:14 -04:00
|
|
|
print(' stop server (SIGINT)...')
|
2012-04-06 09:33:54 -04:00
|
|
|
os.kill(server.pid, signal.SIGINT)
|
|
|
|
|
|
|
|
# Give it 10 seconds to gracefully shut down
|
|
|
|
serverThread.join(10.0)
|
|
|
|
|
|
|
|
if serverThread.isAlive():
|
|
|
|
# Kill server:
|
2012-08-03 17:18:14 -04:00
|
|
|
print('***WARNING***: Solr instance didn\'t respond to SIGINT; using SIGKILL now...')
|
2012-04-06 09:33:54 -04:00
|
|
|
os.kill(server.pid, signal.SIGKILL)
|
|
|
|
|
|
|
|
serverThread.join(10.0)
|
|
|
|
|
|
|
|
if serverThread.isAlive():
|
|
|
|
# Shouldn't happen unless something is seriously wrong...
|
2012-08-03 17:18:14 -04:00
|
|
|
print('***WARNING***: Solr instance didn\'t respond to SIGKILL; ignoring...')
|
2012-04-06 09:33:54 -04:00
|
|
|
|
2012-08-20 20:16:43 -04:00
|
|
|
if failureEvent.isSet():
|
|
|
|
raise RuntimeError('exception while reading Solr output')
|
|
|
|
|
2012-04-06 09:33:54 -04:00
|
|
|
os.chdir('..')
|
|
|
|
|
2012-10-26 00:53:34 -04:00
|
|
|
# the weaker check: we can use this on java6 for some checks,
|
|
|
|
# but its generated HTML is hopelessly broken so we cannot run
|
|
|
|
# the link checking that checkJavadocpathFull does.
|
2012-09-06 18:45:52 -04:00
|
|
|
def checkJavadocpath(path, failOnMissing=True):
|
2012-06-08 06:18:09 -04:00
|
|
|
# check for level='package'
|
|
|
|
# we fail here if its screwed up
|
2012-09-06 18:45:52 -04:00
|
|
|
if failOnMissing and checkJavaDocs.checkPackageSummaries(path, 'package'):
|
2012-06-08 06:18:09 -04:00
|
|
|
raise RuntimeError('missing javadocs package summaries!')
|
|
|
|
|
|
|
|
# now check for level='class'
|
|
|
|
if checkJavaDocs.checkPackageSummaries(path):
|
2012-04-06 09:33:54 -04:00
|
|
|
# disabled: RM cannot fix all this, see LUCENE-3887
|
|
|
|
# raise RuntimeError('javadoc problems')
|
2012-08-03 17:18:14 -04:00
|
|
|
print('\n***WARNING***: javadocs want to fail!\n')
|
2012-06-08 06:18:09 -04:00
|
|
|
|
2012-10-26 00:53:34 -04:00
|
|
|
# full checks
|
|
|
|
def checkJavadocpathFull(path, failOnMissing=True):
|
|
|
|
# check for missing, etc
|
|
|
|
checkJavadocpath(path, failOnMissing)
|
|
|
|
|
|
|
|
# also validate html/check for broken links
|
2012-06-08 06:18:09 -04:00
|
|
|
if checkJavadocLinks.checkAll(path):
|
|
|
|
raise RuntimeError('broken javadocs links found!')
|
2012-03-22 11:24:44 -04:00
|
|
|
|
2012-10-26 00:53:34 -04:00
|
|
|
def testDemo(isSrc, version, jdk):
|
2012-10-27 13:42:45 -04:00
|
|
|
if os.path.exists('index'):
|
2012-10-26 00:53:34 -04:00
|
|
|
shutil.rmtree('index') # nuke any index from any previous iteration
|
|
|
|
|
|
|
|
print(' test demo with %s...' % jdk)
|
2012-04-08 13:15:54 -04:00
|
|
|
sep = ';' if cygwin else ':'
|
2011-06-04 06:37:48 -04:00
|
|
|
if isSrc:
|
2012-06-08 09:25:04 -04:00
|
|
|
cp = 'build/core/classes/java{0}build/demo/classes/java{0}build/analysis/common/classes/java{0}build/queryparser/classes/java'.format(sep)
|
2012-03-19 13:36:27 -04:00
|
|
|
docsDir = 'core/src'
|
2011-06-04 06:37:48 -04:00
|
|
|
else:
|
2012-06-08 06:18:09 -04:00
|
|
|
cp = 'core/lucene-core-{0}.jar{1}demo/lucene-demo-{0}.jar{1}analysis/common/lucene-analyzers-common-{0}.jar{1}queryparser/lucene-queryparser-{0}.jar'.format(version, sep)
|
2011-06-04 06:37:48 -04:00
|
|
|
docsDir = 'docs'
|
2012-10-26 00:53:34 -04:00
|
|
|
run('%s; java -cp "%s" org.apache.lucene.demo.IndexFiles -index index -docs %s' % (javaExe(jdk), cp, docsDir), 'index.log')
|
|
|
|
run('%s; java -cp "%s" org.apache.lucene.demo.SearchFiles -index index -query lucene' % (javaExe(jdk), cp), 'search.log')
|
2011-06-04 06:37:48 -04:00
|
|
|
reMatchingDocs = re.compile('(\d+) total matching documents')
|
2012-08-03 17:49:24 -04:00
|
|
|
m = reMatchingDocs.search(open('search.log', encoding='UTF-8').read())
|
2011-06-04 06:37:48 -04:00
|
|
|
if m is None:
|
|
|
|
raise RuntimeError('lucene demo\'s SearchFiles found no results')
|
|
|
|
else:
|
|
|
|
numHits = int(m.group(1))
|
|
|
|
if numHits < 100:
|
|
|
|
raise RuntimeError('lucene demo\'s SearchFiles found too few results: %s' % numHits)
|
2012-08-03 17:18:14 -04:00
|
|
|
print(' got %d hits for query "lucene"' % numHits)
|
2012-03-19 13:36:27 -04:00
|
|
|
|
2013-04-21 20:23:53 -04:00
|
|
|
def checkMaven(baseURL, tmpDir, svnRevision, version, isSigned):
|
2012-03-19 13:36:27 -04:00
|
|
|
# Locate the release branch in subversion
|
|
|
|
m = re.match('(\d+)\.(\d+)', version) # Get Major.minor version components
|
|
|
|
releaseBranchText = 'lucene_solr_%s_%s/' % (m.group(1), m.group(2))
|
|
|
|
branchesURL = 'http://svn.apache.org/repos/asf/lucene/dev/branches/'
|
|
|
|
releaseBranchSvnURL = None
|
|
|
|
branches = getDirEntries(branchesURL)
|
|
|
|
for text, subURL in branches:
|
|
|
|
if text == releaseBranchText:
|
|
|
|
releaseBranchSvnURL = subURL
|
|
|
|
|
|
|
|
POMtemplates = defaultdict()
|
|
|
|
getPOMtemplates(POMtemplates, tmpDir, releaseBranchSvnURL)
|
2012-08-03 17:18:14 -04:00
|
|
|
print()
|
2013-10-11 12:58:36 -04:00
|
|
|
print(' download artifacts')
|
2012-03-19 13:36:27 -04:00
|
|
|
artifacts = {'lucene': [], 'solr': []}
|
|
|
|
for project in ('lucene', 'solr'):
|
|
|
|
artifactsURL = '%s/%s/maven/org/apache/%s' % (baseURL, project, project)
|
|
|
|
targetDir = '%s/maven/org/apache/%s' % (tmpDir, project)
|
|
|
|
if not os.path.exists(targetDir):
|
|
|
|
os.makedirs(targetDir)
|
|
|
|
crawl(artifacts[project], artifactsURL, targetDir)
|
2012-08-03 17:18:14 -04:00
|
|
|
print()
|
2012-03-19 13:36:27 -04:00
|
|
|
verifyPOMperBinaryArtifact(artifacts, version)
|
|
|
|
verifyArtifactPerPOMtemplate(POMtemplates, artifacts, tmpDir, version)
|
|
|
|
verifyMavenDigests(artifacts)
|
2013-10-09 13:57:31 -04:00
|
|
|
checkJavadocAndSourceArtifacts(artifacts, version)
|
2012-03-19 13:36:27 -04:00
|
|
|
verifyDeployedPOMsCoordinates(artifacts, version)
|
2012-04-08 14:22:14 -04:00
|
|
|
if isSigned:
|
|
|
|
verifyMavenSigs(baseURL, tmpDir, artifacts)
|
2012-03-19 13:36:27 -04:00
|
|
|
|
2013-10-11 12:58:36 -04:00
|
|
|
distFiles = getBinaryDistFilesForMavenChecks(tmpDir, version, baseURL)
|
|
|
|
checkIdenticalMavenArtifacts(distFiles, artifacts, version)
|
2012-03-19 13:36:27 -04:00
|
|
|
|
2013-10-11 12:58:36 -04:00
|
|
|
checkAllJARs('%s/maven/org/apache/lucene' % tmpDir, 'lucene', svnRevision, version, tmpDir, baseURL)
|
|
|
|
checkAllJARs('%s/maven/org/apache/solr' % tmpDir, 'solr', svnRevision, version, tmpDir, baseURL)
|
2012-09-26 14:33:46 -04:00
|
|
|
|
2013-10-11 12:58:36 -04:00
|
|
|
def getBinaryDistFilesForMavenChecks(tmpDir, version, baseURL):
|
|
|
|
distFiles = defaultdict()
|
2012-03-19 13:36:27 -04:00
|
|
|
for project in ('lucene', 'solr'):
|
2013-10-11 12:58:36 -04:00
|
|
|
distFiles[project] = getBinaryDistFiles(project, tmpDir, version, baseURL)
|
|
|
|
return distFiles
|
|
|
|
|
|
|
|
def getBinaryDistFiles(project, tmpDir, version, baseURL):
|
|
|
|
distribution = '%s-%s.tgz' % (project, version)
|
|
|
|
if not os.path.exists('%s/%s' % (tmpDir, distribution)):
|
|
|
|
distURL = '%s/%s/%s' % (baseURL, project, distribution)
|
|
|
|
print(' download %s...' % distribution, end=' ')
|
|
|
|
download(distribution, distURL, tmpDir)
|
|
|
|
destDir = '%s/unpack-%s-getBinaryDistFiles' % (tmpDir, project)
|
|
|
|
if os.path.exists(destDir):
|
|
|
|
shutil.rmtree(destDir)
|
|
|
|
os.makedirs(destDir)
|
|
|
|
os.chdir(destDir)
|
|
|
|
print(' unpack %s...' % distribution)
|
|
|
|
unpackLogFile = '%s/unpack-%s-getBinaryDistFiles.log' % (tmpDir, distribution)
|
|
|
|
run('tar xzf %s/%s' % (tmpDir, distribution), unpackLogFile)
|
|
|
|
distributionFiles = []
|
|
|
|
for root, dirs, files in os.walk(destDir):
|
|
|
|
distributionFiles.extend([os.path.join(root, file) for file in files])
|
2012-03-19 13:36:27 -04:00
|
|
|
return distributionFiles
|
|
|
|
|
2013-10-09 13:57:31 -04:00
|
|
|
def checkJavadocAndSourceArtifacts(artifacts, version):
|
2013-10-11 12:58:36 -04:00
|
|
|
print(' check for javadoc and sources artifacts...')
|
2012-03-19 13:36:27 -04:00
|
|
|
for project in ('lucene', 'solr'):
|
|
|
|
for artifact in artifacts[project]:
|
2013-10-09 13:57:31 -04:00
|
|
|
if artifact.endswith(version + '.jar'):
|
2012-03-19 13:36:27 -04:00
|
|
|
javadocJar = artifact[:-4] + '-javadoc.jar'
|
|
|
|
if javadocJar not in artifacts[project]:
|
|
|
|
raise RuntimeError('missing: %s' % javadocJar)
|
|
|
|
sourcesJar = artifact[:-4] + '-sources.jar'
|
|
|
|
if sourcesJar not in artifacts[project]:
|
|
|
|
raise RuntimeError('missing: %s' % sourcesJar)
|
|
|
|
|
2013-04-26 08:03:13 -04:00
|
|
|
def getZipFileEntries(fileName):
|
|
|
|
entries = []
|
|
|
|
with zipfile.ZipFile(fileName) as zf:
|
|
|
|
for zi in zf.infolist():
|
2013-04-26 16:24:22 -04:00
|
|
|
entries.append(zi.filename)
|
2013-04-26 08:03:13 -04:00
|
|
|
# Sort by name:
|
|
|
|
entries.sort()
|
|
|
|
return entries
|
|
|
|
|
2013-10-11 12:58:36 -04:00
|
|
|
def checkIdenticalMavenArtifacts(distFiles, artifacts, version):
|
|
|
|
print(' verify that Maven artifacts are same as in the binary distribution...')
|
2012-03-19 20:21:13 -04:00
|
|
|
reJarWar = re.compile(r'%s\.[wj]ar$' % version) # exclude *-javadoc.jar and *-sources.jar
|
2012-03-19 13:36:27 -04:00
|
|
|
for project in ('lucene', 'solr'):
|
|
|
|
distFilenames = dict()
|
2013-10-11 12:58:36 -04:00
|
|
|
for file in distFiles[project]:
|
2012-03-23 19:47:55 -04:00
|
|
|
baseName = os.path.basename(file)
|
|
|
|
distFilenames[baseName] = file
|
2012-03-19 13:36:27 -04:00
|
|
|
for artifact in artifacts[project]:
|
|
|
|
if reJarWar.search(artifact):
|
2013-10-09 13:57:31 -04:00
|
|
|
artifactFilename = os.path.basename(artifact)
|
|
|
|
if artifactFilename not in distFilenames:
|
|
|
|
raise RuntimeError('Maven artifact %s is not present in %s binary distribution'
|
|
|
|
% (artifact, project))
|
|
|
|
else:
|
2013-10-11 12:58:36 -04:00
|
|
|
identical = filecmp.cmp(artifact, distFilenames[artifactFilename], shallow=False)
|
|
|
|
if not identical:
|
|
|
|
raise RuntimeError('Maven artifact %s is not identical to %s in %s binary distribution'
|
|
|
|
% (artifact, distFilenames[artifactFilename], project))
|
2012-03-19 13:36:27 -04:00
|
|
|
|
|
|
|
def verifyMavenDigests(artifacts):
|
2013-10-11 12:58:36 -04:00
|
|
|
print(" verify Maven artifacts' md5/sha1 digests...")
|
2012-03-19 13:36:27 -04:00
|
|
|
reJarWarPom = re.compile(r'\.(?:[wj]ar|pom)$')
|
|
|
|
for project in ('lucene', 'solr'):
|
|
|
|
for artifactFile in [a for a in artifacts[project] if reJarWarPom.search(a)]:
|
|
|
|
if artifactFile + '.md5' not in artifacts[project]:
|
|
|
|
raise RuntimeError('missing: MD5 digest for %s' % artifactFile)
|
|
|
|
if artifactFile + '.sha1' not in artifacts[project]:
|
|
|
|
raise RuntimeError('missing: SHA1 digest for %s' % artifactFile)
|
2012-08-03 17:49:24 -04:00
|
|
|
with open(artifactFile + '.md5', encoding='UTF-8') as md5File:
|
2012-03-19 13:36:27 -04:00
|
|
|
md5Expected = md5File.read().strip()
|
2012-08-03 17:49:24 -04:00
|
|
|
with open(artifactFile + '.sha1', encoding='UTF-8') as sha1File:
|
2012-03-19 13:36:27 -04:00
|
|
|
sha1Expected = sha1File.read().strip()
|
|
|
|
md5 = hashlib.md5()
|
|
|
|
sha1 = hashlib.sha1()
|
2012-08-03 17:49:24 -04:00
|
|
|
inputFile = open(artifactFile, 'rb')
|
2012-03-19 13:36:27 -04:00
|
|
|
while True:
|
|
|
|
bytes = inputFile.read(65536)
|
2012-08-03 18:48:27 -04:00
|
|
|
if len(bytes) == 0:
|
|
|
|
break
|
2012-03-19 13:36:27 -04:00
|
|
|
md5.update(bytes)
|
|
|
|
sha1.update(bytes)
|
|
|
|
inputFile.close()
|
|
|
|
md5Actual = md5.hexdigest()
|
|
|
|
sha1Actual = sha1.hexdigest()
|
|
|
|
if md5Actual != md5Expected:
|
|
|
|
raise RuntimeError('MD5 digest mismatch for %s: expected %s but got %s'
|
|
|
|
% (artifactFile, md5Expected, md5Actual))
|
|
|
|
if sha1Actual != sha1Expected:
|
|
|
|
raise RuntimeError('SHA1 digest mismatch for %s: expected %s but got %s'
|
|
|
|
% (artifactFile, sha1Expected, sha1Actual))
|
|
|
|
|
|
|
|
def getPOMcoordinate(treeRoot):
|
|
|
|
namespace = '{http://maven.apache.org/POM/4.0.0}'
|
|
|
|
groupId = treeRoot.find('%sgroupId' % namespace)
|
|
|
|
if groupId is None:
|
|
|
|
groupId = treeRoot.find('{0}parent/{0}groupId'.format(namespace))
|
|
|
|
groupId = groupId.text.strip()
|
|
|
|
artifactId = treeRoot.find('%sartifactId' % namespace).text.strip()
|
|
|
|
version = treeRoot.find('%sversion' % namespace)
|
|
|
|
if version is None:
|
|
|
|
version = treeRoot.find('{0}parent/{0}version'.format(namespace))
|
|
|
|
version = version.text.strip()
|
|
|
|
packaging = treeRoot.find('%spackaging' % namespace)
|
|
|
|
packaging = 'jar' if packaging is None else packaging.text.strip()
|
|
|
|
return groupId, artifactId, packaging, version
|
|
|
|
|
|
|
|
def verifyMavenSigs(baseURL, tmpDir, artifacts):
|
2013-10-11 12:58:36 -04:00
|
|
|
print(' verify maven artifact sigs', end=' ')
|
2012-03-19 13:36:27 -04:00
|
|
|
for project in ('lucene', 'solr'):
|
|
|
|
keysFile = '%s/%s.KEYS' % (tmpDir, project)
|
|
|
|
if not os.path.exists(keysFile):
|
|
|
|
keysURL = '%s/%s/KEYS' % (baseURL, project)
|
|
|
|
download('%s.KEYS' % project, keysURL, tmpDir, quiet=True)
|
|
|
|
|
|
|
|
# Set up clean gpg world; import keys file:
|
|
|
|
gpgHomeDir = '%s/%s.gpg' % (tmpDir, project)
|
|
|
|
if os.path.exists(gpgHomeDir):
|
|
|
|
shutil.rmtree(gpgHomeDir)
|
2012-08-03 17:18:14 -04:00
|
|
|
os.makedirs(gpgHomeDir, 0o700)
|
2012-03-19 13:36:27 -04:00
|
|
|
run('gpg --homedir %s --import %s' % (gpgHomeDir, keysFile),
|
|
|
|
'%s/%s.gpg.import.log' % (tmpDir, project))
|
|
|
|
|
|
|
|
reArtifacts = re.compile(r'\.(?:pom|[jw]ar)$')
|
|
|
|
for artifactFile in [a for a in artifacts[project] if reArtifacts.search(a)]:
|
|
|
|
artifact = os.path.basename(artifactFile)
|
|
|
|
sigFile = '%s.asc' % artifactFile
|
|
|
|
# Test sig (this is done with a clean brand-new GPG world)
|
|
|
|
logFile = '%s/%s.%s.gpg.verify.log' % (tmpDir, project, artifact)
|
|
|
|
run('gpg --homedir %s --verify %s %s' % (gpgHomeDir, sigFile, artifactFile),
|
|
|
|
logFile)
|
|
|
|
# Forward any GPG warnings, except the expected one (since its a clean world)
|
2012-08-03 17:49:24 -04:00
|
|
|
f = open(logFile, encoding='UTF-8')
|
2012-03-19 13:36:27 -04:00
|
|
|
for line in f.readlines():
|
|
|
|
if line.lower().find('warning') != -1 \
|
|
|
|
and line.find('WARNING: This key is not certified with a trusted signature') == -1 \
|
|
|
|
and line.find('WARNING: using insecure memory') == -1:
|
2012-08-03 17:18:14 -04:00
|
|
|
print(' GPG: %s' % line.strip())
|
2012-03-19 13:36:27 -04:00
|
|
|
f.close()
|
|
|
|
|
|
|
|
# Test trust (this is done with the real users config)
|
|
|
|
run('gpg --import %s' % keysFile,
|
|
|
|
'%s/%s.gpg.trust.import.log' % (tmpDir, project))
|
|
|
|
logFile = '%s/%s.%s.gpg.trust.log' % (tmpDir, project, artifact)
|
|
|
|
run('gpg --verify %s %s' % (sigFile, artifactFile), logFile)
|
|
|
|
# Forward any GPG warnings:
|
2012-08-03 17:49:24 -04:00
|
|
|
f = open(logFile, encoding='UTF-8')
|
2012-03-19 13:36:27 -04:00
|
|
|
for line in f.readlines():
|
|
|
|
if line.lower().find('warning') != -1 \
|
|
|
|
and line.find('WARNING: This key is not certified with a trusted signature') == -1 \
|
|
|
|
and line.find('WARNING: using insecure memory') == -1:
|
2012-08-03 17:18:14 -04:00
|
|
|
print(' GPG: %s' % line.strip())
|
2012-03-19 13:36:27 -04:00
|
|
|
f.close()
|
|
|
|
|
|
|
|
sys.stdout.write('.')
|
2012-08-03 17:18:14 -04:00
|
|
|
print()
|
2012-03-19 13:36:27 -04:00
|
|
|
|
|
|
|
def verifyPOMperBinaryArtifact(artifacts, version):
|
2013-10-11 12:58:36 -04:00
|
|
|
print(' verify that each binary artifact has a deployed POM...')
|
2012-03-19 13:36:27 -04:00
|
|
|
reBinaryJarWar = re.compile(r'%s\.[jw]ar$' % re.escape(version))
|
|
|
|
for project in ('lucene', 'solr'):
|
|
|
|
for artifact in [a for a in artifacts[project] if reBinaryJarWar.search(a)]:
|
|
|
|
POM = artifact[:-4] + '.pom'
|
|
|
|
if POM not in artifacts[project]:
|
|
|
|
raise RuntimeError('missing: POM for %s' % artifact)
|
|
|
|
|
|
|
|
def verifyDeployedPOMsCoordinates(artifacts, version):
|
|
|
|
"""
|
|
|
|
verify that each POM's coordinate (drawn from its content) matches
|
|
|
|
its filepath, and verify that the corresponding artifact exists.
|
|
|
|
"""
|
2013-10-11 12:58:36 -04:00
|
|
|
print(" verify deployed POMs' coordinates...")
|
2012-03-19 13:36:27 -04:00
|
|
|
for project in ('lucene', 'solr'):
|
|
|
|
for POM in [a for a in artifacts[project] if a.endswith('.pom')]:
|
|
|
|
treeRoot = ET.parse(POM).getroot()
|
|
|
|
groupId, artifactId, packaging, POMversion = getPOMcoordinate(treeRoot)
|
|
|
|
POMpath = '%s/%s/%s/%s-%s.pom' \
|
|
|
|
% (groupId.replace('.', '/'), artifactId, version, artifactId, version)
|
|
|
|
if not POM.endswith(POMpath):
|
|
|
|
raise RuntimeError("Mismatch between POM coordinate %s:%s:%s and filepath: %s"
|
|
|
|
% (groupId, artifactId, POMversion, POM))
|
|
|
|
# Verify that the corresponding artifact exists
|
|
|
|
artifact = POM[:-3] + packaging
|
|
|
|
if artifact not in artifacts[project]:
|
|
|
|
raise RuntimeError('Missing corresponding .%s artifact for POM %s' % (packaging, POM))
|
|
|
|
|
|
|
|
def verifyArtifactPerPOMtemplate(POMtemplates, artifacts, tmpDir, version):
|
2013-10-11 12:58:36 -04:00
|
|
|
print(' verify that there is an artifact for each POM template...')
|
2012-03-19 13:36:27 -04:00
|
|
|
namespace = '{http://maven.apache.org/POM/4.0.0}'
|
|
|
|
xpathPlugin = '{0}build/{0}plugins/{0}plugin'.format(namespace)
|
|
|
|
xpathSkipConfiguration = '{0}configuration/{0}skip'.format(namespace)
|
|
|
|
for project in ('lucene', 'solr'):
|
|
|
|
for POMtemplate in POMtemplates[project]:
|
|
|
|
treeRoot = ET.parse(POMtemplate).getroot()
|
|
|
|
skipDeploy = False
|
|
|
|
for plugin in treeRoot.findall(xpathPlugin):
|
|
|
|
artifactId = plugin.find('%sartifactId' % namespace).text.strip()
|
|
|
|
if artifactId == 'maven-deploy-plugin':
|
|
|
|
skip = plugin.find(xpathSkipConfiguration)
|
|
|
|
if skip is not None: skipDeploy = (skip.text.strip().lower() == 'true')
|
|
|
|
if not skipDeploy:
|
|
|
|
groupId, artifactId, packaging, POMversion = getPOMcoordinate(treeRoot)
|
|
|
|
# Ignore POMversion, since its value will not have been interpolated
|
|
|
|
artifact = '%s/maven/%s/%s/%s/%s-%s.%s' \
|
|
|
|
% (tmpDir, groupId.replace('.', '/'), artifactId,
|
|
|
|
version, artifactId, version, packaging)
|
|
|
|
if artifact not in artifacts['lucene'] and artifact not in artifacts['solr']:
|
|
|
|
raise RuntimeError('Missing artifact %s' % artifact)
|
|
|
|
|
|
|
|
def getPOMtemplates(POMtemplates, tmpDir, releaseBranchSvnURL):
|
2013-10-11 12:58:36 -04:00
|
|
|
print(' get POM templates')
|
2012-03-19 13:36:27 -04:00
|
|
|
allPOMtemplates = []
|
2012-03-19 20:21:13 -04:00
|
|
|
sourceLocation = releaseBranchSvnURL
|
|
|
|
if sourceLocation is None:
|
|
|
|
# Use the POM templates under dev-tools/maven/ in the local working copy
|
|
|
|
# sys.path[0] is the directory containing this script: dev-tools/scripts/
|
|
|
|
sourceLocation = os.path.abspath('%s/../maven' % sys.path[0])
|
|
|
|
rePOMtemplate = re.compile(r'^pom.xml.template$')
|
|
|
|
for root, dirs, files in os.walk(sourceLocation):
|
|
|
|
allPOMtemplates.extend([os.path.join(root, f) for f in files if rePOMtemplate.search(f)])
|
|
|
|
else:
|
|
|
|
sourceLocation += 'dev-tools/maven/'
|
|
|
|
targetDir = '%s/dev-tools/maven' % tmpDir
|
|
|
|
if not os.path.exists(targetDir):
|
|
|
|
os.makedirs(targetDir)
|
2012-09-22 21:28:16 -04:00
|
|
|
crawl(allPOMtemplates, sourceLocation, targetDir, set(['Apache Subversion', 'maven.testlogging.properties']))
|
2012-03-19 20:21:13 -04:00
|
|
|
|
2012-09-22 21:28:16 -04:00
|
|
|
reLucenePOMtemplate = re.compile(r'.*/maven/lucene.*/pom\.xml\.template$')
|
|
|
|
POMtemplates['lucene'] = [p for p in allPOMtemplates if reLucenePOMtemplate.search(p)]
|
2012-03-19 13:36:27 -04:00
|
|
|
if POMtemplates['lucene'] is None:
|
2012-03-19 20:21:13 -04:00
|
|
|
raise RuntimeError('No Lucene POMs found at %s' % sourceLocation)
|
2012-09-22 21:28:16 -04:00
|
|
|
reSolrPOMtemplate = re.compile(r'.*/maven/solr.*/pom\.xml\.template$')
|
|
|
|
POMtemplates['solr'] = [p for p in allPOMtemplates if reSolrPOMtemplate.search(p)]
|
2012-03-19 13:36:27 -04:00
|
|
|
if POMtemplates['solr'] is None:
|
2012-03-19 20:21:13 -04:00
|
|
|
raise RuntimeError('No Solr POMs found at %s' % sourceLocation)
|
2012-03-19 13:36:27 -04:00
|
|
|
POMtemplates['grandfather'] = [p for p in allPOMtemplates if '/maven/pom.xml.template' in p]
|
2012-04-08 14:22:14 -04:00
|
|
|
if len(POMtemplates['grandfather']) == 0:
|
2012-03-19 20:21:13 -04:00
|
|
|
raise RuntimeError('No Lucene/Solr grandfather POM found at %s' % sourceLocation)
|
2012-03-19 13:36:27 -04:00
|
|
|
|
|
|
|
def crawl(downloadedFiles, urlString, targetDir, exclusions=set()):
|
|
|
|
for text, subURL in getDirEntries(urlString):
|
|
|
|
if text not in exclusions:
|
|
|
|
path = os.path.join(targetDir, text)
|
|
|
|
if text.endswith('/'):
|
|
|
|
if not os.path.exists(path):
|
|
|
|
os.makedirs(path)
|
|
|
|
crawl(downloadedFiles, subURL, path, exclusions)
|
|
|
|
else:
|
2012-09-26 14:33:46 -04:00
|
|
|
if not os.path.exists(path) or FORCE_CLEAN:
|
2012-03-19 13:36:27 -04:00
|
|
|
download(text, subURL, targetDir, quiet=True)
|
|
|
|
downloadedFiles.append(path)
|
|
|
|
sys.stdout.write('.')
|
|
|
|
|
2012-09-25 17:37:31 -04:00
|
|
|
reAllowedVersion = re.compile(r'^\d+\.\d+\.\d+(-ALPHA|-BETA)?$')
|
|
|
|
|
2011-06-04 06:37:48 -04:00
|
|
|
def main():
|
|
|
|
|
2013-04-21 20:23:53 -04:00
|
|
|
if len(sys.argv) < 5:
|
2012-08-03 17:18:14 -04:00
|
|
|
print()
|
2013-06-10 08:02:09 -04:00
|
|
|
print('Usage python -u %s BaseURL SvnRevision version tmpDir [ isSigned(True|False) ] [ -testArgs "-Dwhat=ever [ ... ]" ]'
|
2013-05-20 12:51:52 -04:00
|
|
|
% sys.argv[0])
|
2012-08-03 17:18:14 -04:00
|
|
|
print()
|
2013-04-21 20:23:53 -04:00
|
|
|
print(' example: python3.2 -u dev-tools/scripts/smokeTestRelease.py http://people.apache.org/~whoever/staging_area/lucene-solr-4.3.0-RC1-rev1469340 1469340 4.3.0 /path/to/a/tmp/dir')
|
2013-04-20 06:54:55 -04:00
|
|
|
print()
|
2011-06-04 06:37:48 -04:00
|
|
|
sys.exit(1)
|
|
|
|
|
|
|
|
baseURL = sys.argv[1]
|
2013-04-21 20:23:53 -04:00
|
|
|
svnRevision = sys.argv[2]
|
|
|
|
version = sys.argv[3]
|
2012-09-25 17:37:31 -04:00
|
|
|
|
|
|
|
if not reAllowedVersion.match(version):
|
|
|
|
raise RuntimeError('version "%s" does not match format X.Y.Z[-ALPHA|-BETA]' % version)
|
|
|
|
|
2013-05-20 12:51:52 -04:00
|
|
|
tmpDirArgNum = 4
|
|
|
|
tmpDir = os.path.abspath(sys.argv[tmpDirArgNum])
|
|
|
|
|
|
|
|
# TODO: yuck: positional-only args with more than one optional arg totally sucks
|
|
|
|
# TODO: consider naming all args
|
|
|
|
isSigned = True
|
|
|
|
testArgs = ''
|
|
|
|
lastArgNum = len(sys.argv) - 1
|
|
|
|
if lastArgNum > tmpDirArgNum:
|
|
|
|
nextArgNum = tmpDirArgNum + 1
|
|
|
|
if sys.argv[nextArgNum] == '-testArgs':
|
|
|
|
if nextArgNum == lastArgNum:
|
|
|
|
raise RuntimeError('missing expected argument to -testArgs')
|
|
|
|
else:
|
|
|
|
# TODO: should there be arg validation here? E.g. starts with '-D'?
|
|
|
|
testArgs = sys.argv[nextArgNum + 1]
|
|
|
|
nextArgNum += 2
|
|
|
|
if nextArgNum <= lastArgNum:
|
|
|
|
isSigned = (sys.argv[nextArgNum] == "True")
|
|
|
|
nextArgNum += 1
|
|
|
|
if nextArgNum <= lastArgNum and testArgs == '':
|
|
|
|
if sys.argv[nextArgNum] == '-testArgs':
|
|
|
|
if nextArgNum == lastArgNum:
|
|
|
|
raise RuntimeError('missing expected argument to -testArgs')
|
|
|
|
else:
|
|
|
|
# TODO: should there be arg validation here? E.g. starts with '-D'?
|
|
|
|
testArgs = sys.argv[nextArgNum + 1]
|
2011-06-04 06:37:48 -04:00
|
|
|
|
2013-05-20 12:51:52 -04:00
|
|
|
smokeTest(baseURL, svnRevision, version, tmpDir, isSigned, testArgs)
|
2012-04-08 14:22:14 -04:00
|
|
|
|
2013-05-20 12:51:52 -04:00
|
|
|
def smokeTest(baseURL, svnRevision, version, tmpDir, isSigned, testArgs):
|
2012-04-08 14:22:14 -04:00
|
|
|
|
2013-04-21 09:26:54 -04:00
|
|
|
startTime = datetime.datetime.now()
|
|
|
|
|
2012-09-26 14:33:46 -04:00
|
|
|
if FORCE_CLEAN:
|
2011-06-04 06:37:48 -04:00
|
|
|
if os.path.exists(tmpDir):
|
|
|
|
raise RuntimeError('temp dir %s exists; please remove first' % tmpDir)
|
2012-04-06 09:33:54 -04:00
|
|
|
|
|
|
|
if not os.path.exists(tmpDir):
|
2011-06-04 06:37:48 -04:00
|
|
|
os.makedirs(tmpDir)
|
|
|
|
|
|
|
|
lucenePath = None
|
|
|
|
solrPath = None
|
2012-08-03 17:18:14 -04:00
|
|
|
print()
|
|
|
|
print('Load release URL "%s"...' % baseURL)
|
2012-04-08 14:22:14 -04:00
|
|
|
newBaseURL = unshortenURL(baseURL)
|
|
|
|
if newBaseURL != baseURL:
|
2012-08-03 17:18:14 -04:00
|
|
|
print(' unshortened: %s' % newBaseURL)
|
2012-04-08 14:22:14 -04:00
|
|
|
baseURL = newBaseURL
|
|
|
|
|
2011-06-04 06:37:48 -04:00
|
|
|
for text, subURL in getDirEntries(baseURL):
|
|
|
|
if text.lower().find('lucene') != -1:
|
|
|
|
lucenePath = subURL
|
|
|
|
elif text.lower().find('solr') != -1:
|
|
|
|
solrPath = subURL
|
|
|
|
|
|
|
|
if lucenePath is None:
|
|
|
|
raise RuntimeError('could not find lucene subdir')
|
|
|
|
if solrPath is None:
|
|
|
|
raise RuntimeError('could not find solr subdir')
|
|
|
|
|
2012-08-03 17:18:14 -04:00
|
|
|
print()
|
|
|
|
print('Test Lucene...')
|
2012-04-08 14:22:14 -04:00
|
|
|
checkSigs('lucene', lucenePath, version, tmpDir, isSigned)
|
2011-06-04 06:37:48 -04:00
|
|
|
for artifact in ('lucene-%s.tgz' % version, 'lucene-%s.zip' % version):
|
2013-10-11 12:58:36 -04:00
|
|
|
unpackAndVerify('lucene', tmpDir, artifact, svnRevision, version, testArgs, baseURL)
|
|
|
|
unpackAndVerify('lucene', tmpDir, 'lucene-%s-src.tgz' % version, svnRevision, version, testArgs, baseURL)
|
2011-06-04 06:37:48 -04:00
|
|
|
|
2012-08-03 17:18:14 -04:00
|
|
|
print()
|
|
|
|
print('Test Solr...')
|
2012-04-08 14:22:14 -04:00
|
|
|
checkSigs('solr', solrPath, version, tmpDir, isSigned)
|
2013-01-12 12:51:57 -05:00
|
|
|
for artifact in ('solr-%s.tgz' % version, 'solr-%s.zip' % version):
|
2013-10-11 12:58:36 -04:00
|
|
|
unpackAndVerify('solr', tmpDir, artifact, svnRevision, version, testArgs, baseURL)
|
|
|
|
unpackAndVerify('solr', tmpDir, 'solr-%s-src.tgz' % version, svnRevision, version, testArgs, baseURL)
|
2011-06-04 06:37:48 -04:00
|
|
|
|
2012-09-26 14:33:46 -04:00
|
|
|
print()
|
2012-08-03 17:18:14 -04:00
|
|
|
print('Test Maven artifacts for Lucene and Solr...')
|
2013-04-21 20:23:53 -04:00
|
|
|
checkMaven(baseURL, tmpDir, svnRevision, version, isSigned)
|
2012-03-19 13:36:27 -04:00
|
|
|
|
2013-04-21 09:26:54 -04:00
|
|
|
print('\nSUCCESS! [%s]\n' % (datetime.datetime.now() - startTime))
|
2012-09-24 15:37:53 -04:00
|
|
|
|
2011-06-04 06:37:48 -04:00
|
|
|
if __name__ == '__main__':
|
2012-09-26 11:55:27 -04:00
|
|
|
print('NOTE: output encoding is %s' % sys.stdout.encoding)
|
2012-08-03 18:48:27 -04:00
|
|
|
try:
|
|
|
|
main()
|
|
|
|
except:
|
|
|
|
traceback.print_exc()
|
2012-08-07 16:58:46 -04:00
|
|
|
sys.exit(1)
|
|
|
|
sys.exit(0)
|