diff --git a/dev-tools/prepare_release_candidate.py b/dev-tools/prepare_release_candidate.py
deleted file mode 100644
index 84c10f4b9e4..00000000000
--- a/dev-tools/prepare_release_candidate.py
+++ /dev/null
@@ -1,417 +0,0 @@
-# Licensed to Elasticsearch under one or more contributor
-# license agreements. See the NOTICE file distributed with
-# this work for additional information regarding copyright
-# ownership. Elasticsearch licenses this file to you under
-# the Apache License, Version 2.0 (the "License"); you may
-# not use this file except in compliance with the License.
-# You may obtain a copy of the License at
-#
-# http://www.apache.org/licenses/LICENSE-2.0
-#
-# Unless required by applicable law or agreed to in writing,
-# software distributed under the License is distributed on
-# an 'AS IS' BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND,
-# either express or implied. See the License for the specific
-# language governing permissions and limitations under the License.
-
-# Prepare a release
-#
-# 1. Update the Version.java to remove the snapshot bit
-# 2. Remove the -SNAPSHOT suffix in all pom.xml files
-#
-# USAGE:
-#
-# python3 ./dev-tools/prepare-release.py
-#
-# Note: Ensure the script is run from the elasticsearch top level directory
-#
-
-import fnmatch
-import argparse
-from prepare_release_update_documentation import update_reference_docs
-import subprocess
-import tempfile
-import re
-import os
-import shutil
-from functools import partial
-import sys
-
-VERSION_FILE = 'core/src/main/java/org/elasticsearch/Version.java'
-POM_FILE = 'pom.xml'
-MAIL_TEMPLATE = """
-Hi all
-
-The new release candidate for %(version)s is now available, including the x-plugins and RPM/deb repos. This release is based on:
-
- * Elasticsearch commit: %(hash)s - https://github.com/elastic/elasticsearch/commit/%(hash)s
- * X-Plugins commit: FILL_IN_X-PLUGINS_HASH - https://github.com/elastic/x-plugins/commit/FILL_IN_X-PLUGINS_HASH
-
-The packages may be downloaded from the following URLs:
-
- * ZIP - http://%(bucket)s/elasticsearch/staging/%(version)s-%(hash)s/org/elasticsearch/distribution/zip/elasticsearch/%(version)s/elasticsearch-%(version)s.zip
- * tar.gz - http://%(bucket)s/elasticsearch/staging/%(version)s-%(hash)s/org/elasticsearch/distribution/tar/elasticsearch/%(version)s/elasticsearch-%(version)s.tar.gz
- * RPM - http://%(bucket)s/elasticsearch/staging/%(version)s-%(hash)s/org/elasticsearch/distribution/rpm/elasticsearch/%(version)s/elasticsearch-%(version)s.rpm
- * deb - http://%(bucket)s/elasticsearch/staging/%(version)s-%(hash)s/org/elasticsearch/distribution/deb/elasticsearch/%(version)s/elasticsearch-%(version)s.deb
-
-Plugins can be installed as follows:
-
- ES_JAVA_OPTS="-Des.plugins.staging=true" bin/elasticsearch-plugin install cloud-aws
-
-The same goes for the x-plugins:
-
- ES_JAVA_OPTS="-Des.plugins.staging=true" bin/elasticsearch-plugin install license
- ES_JAVA_OPTS="-Des.plugins.staging=true" bin/elasticsearch-plugin install marvel-agent
- ES_JAVA_OPTS="-Des.plugins.staging=true" bin/elasticsearch-plugin install shield
- ES_JAVA_OPTS="-Des.plugins.staging=true" bin/elasticsearch-plugin install watcher
-
-To install the deb from an APT repo:
-
-APT line sources.list line:
-
-deb http://%(bucket)s/elasticsearch/staging/%(version)s-%(hash)s/repos/%(package_repo_version)s/debian/ stable main
-
-To install the RPM, create a YUM file like:
-
- /etc/yum.repos.d/elasticsearch.repo
-
-containing:
-
-[elasticsearch-2.0]
-name=Elasticsearch repository for packages
-baseurl=http://%(bucket)s/elasticsearch/staging/%(version)s-%(hash)s/repos/%(package_repo_version)s/centos
-gpgcheck=1
-gpgkey=http://packages.elastic.co/GPG-KEY-elasticsearch
-enabled=1
-
-To smoke-test the release please run:
-
- python3 -B ./dev-tools/smoke_test_rc.py --version %(version)s --hash %(hash)s --plugins license,shield,watcher
-
-NOTE: this script requires JAVA_HOME to point to a Java 7 Runtime
-
-"""
-
-# console colors
-COLOR_OK = '\033[92m'
-COLOR_END = '\033[0m'
-COLOR_FAIL = '\033[91m'
-
-def run(command, env_vars=None):
- if env_vars:
- for key, value in env_vars.items():
- os.putenv(key, value)
- print('*** Running: %s%s%s' % (COLOR_OK, command, COLOR_END))
- if os.system(command):
- raise RuntimeError(' FAILED: %s' % (command))
-
-def ensure_checkout_is_clean():
- # Make sure no local mods:
- s = subprocess.check_output('git diff --shortstat', shell=True).decode('utf-8')
- if len(s) > 0:
- raise RuntimeError('git diff --shortstat is non-empty got:\n%s' % s)
-
- # Make sure no untracked files:
- s = subprocess.check_output('git status', shell=True).decode('utf-8', errors='replace')
- if 'Untracked files:' in s:
- if 'dev-tools/__pycache__/' in s:
- print('*** NOTE: invoke python with -B to prevent __pycache__ directories ***')
- raise RuntimeError('git status shows untracked files got:\n%s' % s)
-
- # Make sure we have all changes from origin:
- if 'is behind' in s:
- raise RuntimeError('git status shows not all changes pulled from origin; try running "git pull origin" in this branch got:\n%s' % (s))
-
- # Make sure we no local unpushed changes (this is supposed to be a clean area):
- if 'is ahead' in s:
- raise RuntimeError('git status shows local commits; try running "git fetch origin", "git checkout ", "git reset --hard origin/" in this branch got:\n%s' % (s))
-
-# Reads the given file and applies the
-# callback to it. If the callback changed
-# a line the given file is replaced with
-# the modified input.
-def process_file(file_path, line_callback):
- fh, abs_path = tempfile.mkstemp()
- modified = False
- with open(abs_path,'w', encoding='utf-8') as new_file:
- with open(file_path, encoding='utf-8') as old_file:
- for line in old_file:
- new_line = line_callback(line)
- modified = modified or (new_line != line)
- new_file.write(new_line)
- os.close(fh)
- if modified:
- #Remove original file
- os.remove(file_path)
- #Move new file
- shutil.move(abs_path, file_path)
- return True
- else:
- # nothing to do - just remove the tmp file
- os.remove(abs_path)
- return False
-
-# Moves the Version.java file from a snapshot to a release
-def remove_version_snapshot(version_file, release):
- # 1.0.0.Beta1 -> 1_0_0_Beta1
- release = release.replace('.', '_')
- release = release.replace('-', '_')
- pattern = 'new Version(V_%s_ID, true' % (release)
- replacement = 'new Version(V_%s_ID, false' % (release)
- def callback(line):
- return line.replace(pattern, replacement)
- processed = process_file(version_file, callback)
- if not processed:
- raise RuntimeError('failed to remove snapshot version for %s' % (release))
-
-def rename_local_meta_files(path):
- for root, _, file_names in os.walk(path):
- for file_name in fnmatch.filter(file_names, 'maven-metadata-local.xml*'):
- full_path = os.path.join(root, file_name)
- os.rename(full_path, os.path.join(root, file_name.replace('-local', '')))
-
-# Checks the pom.xml for the release version.
-# This method fails if the pom file has no SNAPSHOT version set ie.
-# if the version is already on a release version we fail.
-# Returns the next version string ie. 0.90.7
-def find_release_version():
- with open('pom.xml', encoding='utf-8') as file:
- for line in file:
- match = re.search(r'(.+)-SNAPSHOT', line)
- if match:
- return match.group(1)
- raise RuntimeError('Could not find release version in branch')
-
-# Checks if the produced RPM is signed with the supplied GPG key
-def ensure_rpm_is_signed(rpm, gpg_key):
- rpm_check_signature_cmd = 'rpm -v -K %s | grep -qi %s' % (rpm, gpg_key)
- try:
- subprocess.check_output(rpm_check_signature_cmd, shell=True)
- except:
- raise RuntimeError('Aborting. RPM does not seem to be signed, check with: rpm -v -K %s' % rpm)
-
-# Checks if a command exists, needed for external binaries
-def check_command_exists(name, cmd):
- try:
- subprocess.check_output(cmd, shell=True, stderr=subprocess.STDOUT)
- except subprocess.CalledProcessError:
- raise RuntimeError('Could not run command %s - please make sure it is installed and in $PATH' % (name))
-
-def run_and_print(text, run_function):
- try:
- print(text, end='')
- run_function()
- print(COLOR_OK + 'OK' + COLOR_END)
- return True
- except RuntimeError:
- print(COLOR_FAIL + 'NOT OK' + COLOR_END)
- return False
-
-def check_env_var(text, env_var):
- try:
- print(text, end='')
- os.environ[env_var]
- print(COLOR_OK + 'OK' + COLOR_END)
- return True
- except KeyError:
- print(COLOR_FAIL + 'NOT OK' + COLOR_END)
- return False
-
-def check_environment_and_commandline_tools(check_only):
- checks = list()
- checks.append(check_env_var('Checking for AWS env configuration AWS_SECRET_KEY... ', 'AWS_SECRET_KEY'))
- checks.append(check_env_var('Checking for AWS env configuration AWS_ACCESS_KEY... ', 'AWS_ACCESS_KEY'))
- checks.append(run_and_print('Checking command: rpm... ', partial(check_command_exists, 'rpm', 'rpm --version')))
- checks.append(run_and_print('Checking command: dpkg... ', partial(check_command_exists, 'dpkg', 'dpkg --version')))
- checks.append(run_and_print('Checking command: gpg... ', partial(check_command_exists, 'gpg', 'gpg --version')))
- checks.append(run_and_print('Checking command: expect... ', partial(check_command_exists, 'expect', 'expect -v')))
- checks.append(run_and_print('Checking command: createrepo... ', partial(check_command_exists, 'createrepo', 'createrepo --version')))
- checks.append(run_and_print('Checking command: s3cmd... ', partial(check_command_exists, 's3cmd', 's3cmd --version')))
- checks.append(run_and_print('Checking command: deb-s3... ', partial(check_command_exists, 'deb-s3', 'deb-s3 -h')))
- checks.append(run_and_print('Checking command: rpm-s3... ', partial(check_command_exists, 'rpm-s3', 'rpm-s3 -h')))
-
- if check_only:
- sys.exit(0)
-
- if False in checks:
- print("Exiting due to failing checks")
- sys.exit(0)
-
-if __name__ == "__main__":
- parser = argparse.ArgumentParser(description='Builds and publishes a Elasticsearch Release')
- parser.add_argument('--deploy-sonatype', dest='deploy_sonatype', action='store_true',
- help='Installs and Deploys the release on a sonatype staging repository.')
- parser.add_argument('--deploy-s3', dest='deploy_s3', action='store_true',
- help='Pushes artifacts to the S3 staging area')
- parser.add_argument('--deploy-s3-repos', dest='deploy_s3_repos', action='store_true',
- help='Creates package repositories in S3 repo')
- parser.add_argument('--no-install', dest='no_install', action='store_true',
- help='Does not run "mvn install", expects this to be run already and reuses artifacts from local repo, only useful with --deploy-s3/--deploy-s3-repos, after sonatype deplomeny to ensure same artifacts')
- parser.add_argument('--skip-doc-check', dest='skip_doc_check', action='store_false',
- help='Skips any checks for pending documentation changes')
- parser.add_argument('--skip-tests', dest='skip_tests', action='store_true',
- help='Skips any test runs')
- parser.add_argument('--gpg-key', dest='gpg_key', default="D88E42B4",
- help='Allows you to specify a different gpg_key to be used instead of the default release key')
- parser.add_argument('--bucket', '-b', dest='bucket', default="download.elasticsearch.org",
- help='Allows you to specify a different s3 bucket to upload the artifacts to')
- parser.add_argument('--quiet', dest='quiet', action='store_true',
- help='Runs the script in quiet mode')
- parser.add_argument('--check', dest='check', action='store_true',
- help='Checks and reports for all requirements and then exits')
-
- # by default, we only run mvn install and don't push anything repo
- parser.set_defaults(deploy_sonatype=False)
- parser.set_defaults(deploy_s3=False)
- parser.set_defaults(deploy_s3_repos=False)
- parser.set_defaults(no_install=False)
- # other defaults
- parser.set_defaults(skip_doc_check=False)
- parser.set_defaults(quiet=False)
- parser.set_defaults(skip_tests=False)
-
- args = parser.parse_args()
- skip_doc_check = args.skip_doc_check
- gpg_key = args.gpg_key
- bucket = args.bucket
- deploy_sonatype = args.deploy_sonatype
- deploy_s3 = args.deploy_s3
- deploy_s3_repos = args.deploy_s3_repos
- run_mvn_install = not args.no_install
- skip_tests = args.skip_tests
-
- check_environment_and_commandline_tools(args.check)
-
- if not run_mvn_install and deploy_sonatype:
- print('Using --no-install and --deploy-sonatype together does not work. Exiting')
- sys.exit(-1)
-
- print('*** Preparing a release candidate: ', end='')
- print('deploy sonatype: %s%s%s' % (COLOR_OK if deploy_sonatype else COLOR_FAIL, 'yes' if deploy_sonatype else 'no', COLOR_END), end='')
- print(', deploy s3: %s%s%s' % (COLOR_OK if deploy_s3 else COLOR_FAIL, 'yes' if deploy_s3 else 'no', COLOR_END), end='')
- print(', deploy s3 repos: %s%s%s' % (COLOR_OK if deploy_s3_repos else COLOR_FAIL, 'yes' if deploy_s3_repos else 'no', COLOR_END), end='')
- print('')
-
- shortHash = subprocess.check_output('git log --pretty=format:"%h" -n 1', shell=True).decode('utf-8')
- releaseDirectory = os.getenv('HOME') + '/elastic-releases'
- release_version = find_release_version()
- localRepo = '%s/elasticsearch-%s-%s' % (releaseDirectory, release_version, shortHash)
- localRepoElasticsearch = localRepo + '/org/elasticsearch'
-
- ensure_checkout_is_clean()
- if not re.match('(\d+\.\d+)\.*',release_version):
- raise RuntimeError('illegal release version format: %s' % (release_version))
- package_repo_version = '%s.x' % re.match('(\d+)\.*', release_version).group(1)
-
- print('*** Preparing release version: [%s]' % release_version)
-
- if not skip_doc_check:
- print('*** Check for pending documentation changes')
- pending_files = update_reference_docs(release_version)
- if pending_files:
- raise RuntimeError('pending coming[%s] documentation changes found in %s' % (release_version, pending_files))
-
- run('cd dev-tools && mvn versions:set -DnewVersion=%s -DgenerateBackupPoms=false' % (release_version))
- run('cd rest-api-spec && mvn versions:set -DnewVersion=%s -DgenerateBackupPoms=false' % (release_version))
- run('mvn versions:set -DnewVersion=%s -DgenerateBackupPoms=false' % (release_version))
-
- remove_version_snapshot(VERSION_FILE, release_version)
-
- print('*** Done removing snapshot version. DO NOT COMMIT THIS, WHEN CREATING A RELEASE CANDIDATE.')
-
- if not os.path.exists(releaseDirectory):
- os.mkdir(releaseDirectory)
- if os.path.exists(localRepoElasticsearch) and run_mvn_install:
- print('clean local repository %s' % localRepoElasticsearch)
- shutil.rmtree(localRepoElasticsearch)
-
- mvn_target = 'deploy' if deploy_sonatype else 'install'
- tests = '-DskipTests' if skip_tests else '-Dskip.integ.tests=true'
- install_command = 'mvn clean %s -Prelease %s -Dgpg.key="%s" -Dpackaging.rpm.rpmbuild=/usr/bin/rpmbuild -Drpm.sign=true -Dmaven.repo.local=%s -Dno.commit.pattern="\\bno(n|)commit\\b" -Dforbidden.test.signatures=""' % (mvn_target, tests, gpg_key, localRepo)
- clean_repo_command = 'find %s -name _remote.repositories -exec rm {} \;' % (localRepoElasticsearch)
-
- if not run_mvn_install:
- print('')
- print('*** By choosing --no-install we assume you ran the following commands successfully:')
- print(' %s' % (install_command))
- print(' 1. Remove all _remote.repositories: %s' % (clean_repo_command))
- rename_metadata_files_command = 'for i in $(find %s -name "maven-metadata-local.xml*") ; do mv "$i" "${i/-local/}" ; done' % (localRepoElasticsearch)
- print(' 2. Rename all maven metadata files: %s' % (rename_metadata_files_command))
- else:
- for cmd in [install_command, clean_repo_command]:
- run(cmd)
- rename_local_meta_files(localRepoElasticsearch)
-
- rpm = '%s/distribution/rpm/elasticsearch/%s/elasticsearch-%s.rpm' % (localRepoElasticsearch, release_version, release_version)
- print('Ensuring that RPM has been signed')
- ensure_rpm_is_signed(rpm, gpg_key)
-
- # repository push commands
- s3cmd_sync_to_staging_bucket_cmd = 's3cmd sync -P %s s3://%s/elasticsearch/staging/%s-%s/org/' % (localRepoElasticsearch, bucket, release_version, shortHash)
- s3_bucket_sync_to = '%s/elasticsearch/staging/%s-%s/repos/' % (bucket, release_version, shortHash)
- s3cmd_sync_official_repo_cmd = 's3cmd sync s3://packages.elasticsearch.org/elasticsearch/%s s3://%s' % (package_repo_version, s3_bucket_sync_to)
-
- debs3_prefix = 'elasticsearch/staging/%s-%s/repos/%s/debian' % (release_version, shortHash, package_repo_version)
- debs3_upload_cmd = 'deb-s3 upload --preserve-versions %s/distribution/deb/elasticsearch/%s/elasticsearch-%s.deb -b %s --prefix %s --sign %s --arch amd64' % (localRepoElasticsearch, release_version, release_version, bucket, debs3_prefix, gpg_key)
- debs3_list_cmd = 'deb-s3 list -b %s --prefix %s' % (bucket, debs3_prefix)
- debs3_verify_cmd = 'deb-s3 verify -b %s --prefix %s' % (bucket, debs3_prefix)
- rpms3_prefix = 'elasticsearch/staging/%s-%s/repos/%s/centos' % (release_version, shortHash, package_repo_version)
- # external-1 is the alias name for the us-east-1 region. This is used by rpm-s3 to construct the hostname
- rpms3_upload_cmd = 'rpm-s3 -v -b %s -p %s --sign --visibility public-read -k 100 %s -r external-1' % (bucket, rpms3_prefix, rpm)
-
- if deploy_s3:
- run(s3cmd_sync_to_staging_bucket_cmd)
- else:
- print('')
- print('*** To push a release candidate to s3 run: ')
- print(' 1. Sync %s into S3 bucket' % (localRepoElasticsearch))
- print (' %s' % (s3cmd_sync_to_staging_bucket_cmd))
-
- if deploy_s3_repos:
- print('*** Syncing official package repository into staging s3 bucket')
- run(s3cmd_sync_official_repo_cmd)
- print('*** Uploading debian package (you will be prompted for the passphrase!)')
- run(debs3_upload_cmd)
- run(debs3_list_cmd)
- run(debs3_verify_cmd)
- print('*** Uploading rpm package (you will be prompted for the passphrase!)')
- run(rpms3_upload_cmd)
- else:
- print('*** To create repositories on S3 run:')
- print(' 1. Sync existing repo into staging: %s' % s3cmd_sync_official_repo_cmd)
- print(' 2. Upload debian package (and sign it): %s' % debs3_upload_cmd)
- print(' 3. List all debian packages: %s' % debs3_list_cmd)
- print(' 4. Verify debian packages: %s' % debs3_verify_cmd)
- print(' 5. Upload RPM: %s' % rpms3_upload_cmd)
- print('')
- print('NOTE: the above mvn command will promt you several times for the GPG passphrase of the key you specified you can alternatively pass it via -Dgpg.passphrase=yourPassPhrase')
- print(' since RPM signing doesn\'t support gpg-agents the recommended way to set the password is to add a release profile to your settings.xml:')
- print("""
-
-
- release
-
- YourPasswordGoesHere
-
-
-
- """)
- print('NOTE: Running s3cmd might require you to create a config file with your credentials, if the s3cmd does not support suppliying them via the command line!')
-
- print('*** Once the release is deployed and published send out the following mail to dev@elastic.co:')
- string_format_dict = {'version' : release_version, 'hash': shortHash, 'package_repo_version' : package_repo_version, 'bucket': bucket}
- print(MAIL_TEMPLATE % string_format_dict)
-
- print('')
- print('You can verify that pushing to the staging repository pushed all the artifacts by running (log into sonatype to find out the correct id):')
- print(' python -B dev-tools/validate-maven-repository.py %s https://oss.sonatype.org/service/local/repositories/orgelasticsearch-IDTOFINDOUT/content/org/elasticsearch ' %(localRepoElasticsearch))
-
- print('')
- print('To publish the release and the repo on S3 execute the following commands:')
- print(' s3cmd cp --recursive s3://%(bucket)s/elasticsearch/staging/%(version)s-%(hash)s/repos/%(package_repo_version)s/ s3://packages.elasticsearch.org/elasticsearch/%(package_repo_version)s' % string_format_dict)
- print(' s3cmd cp --recursive s3://%(bucket)s/elasticsearch/staging/%(version)s-%(hash)s/org/ s3://%(bucket)s/elasticsearch/release/org' % string_format_dict)
- print('Now go ahead and tag the release:')
- print(' git tag -a v%(version)s %(hash)s' % string_format_dict)
- print(' git push origin v%(version)s' % string_format_dict )
-
-
diff --git a/dev-tools/validate-maven-repository.py b/dev-tools/validate-maven-repository.py
deleted file mode 100644
index 6bf84a3a185..00000000000
--- a/dev-tools/validate-maven-repository.py
+++ /dev/null
@@ -1,130 +0,0 @@
-# Licensed to Elasticsearch under one or more contributor
-# license agreements. See the NOTICE file distributed with
-# this work for additional information regarding copyright
-# ownership. Elasticsearch licenses this file to you under
-# the Apache License, Version 2.0 (the "License"); you may
-# not use this file except in compliance with the License.
-# You may obtain a copy of the License at
-#
-# http://www.apache.org/licenses/LICENSE-2.0
-#
-# Unless required by applicable law or agreed to in writing,
-# software distributed under the License is distributed on
-# an 'AS IS' BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND,
-# either express or implied. See the License for the specific
-# language governing permissions and limitations under the License.
-
-# Helper python script to check if a sonatype staging repo contains
-# all the required files compared to a local repository
-#
-# The script does the following steps
-#
-# 1. Scans the local maven repo for all files in /org/elasticsearch
-# 2. Opens a HTTP connection to the staging repo
-# 3. Executes a HEAD request for each file found in step one
-# 4. Compares the content-length response header with the real file size
-# 5. Return an error if those two numbers differ
-#
-# A pre requirement to run this, is to find out via the oss.sonatype.org web UI, how that repo is named
-# - After logging in you go to 'Staging repositories' and search for the one you just created
-# - Click into the `Content` tab
-# - Open any artifact (not a directory)
-# - Copy the link of `Repository Path` on the right and reuse that part of the URL
-#
-# Alternatively you can just use the name of the repository and reuse the rest (ie. the repository
-# named for the example below would have been named orgelasticsearch-1012)
-#
-#
-# Example call
-# python dev-tools/validate-maven-repository.py /path/to/repo/org/elasticsearch/ \
-# https://oss.sonatype.org/service/local/repositories/orgelasticsearch-1012/content/org/elasticsearch
-
-import sys
-import os
-import httplib
-import urlparse
-import re
-
-# Draw a simple progress bar, a couple of hundred HEAD requests might take a while
-# Note, when drawing this, it uses the carriage return character, so you should not
-# write anything in between
-def drawProgressBar(percent, barLen = 40):
- sys.stdout.write("\r")
- progress = ""
- for i in range(barLen):
- if i < int(barLen * percent):
- progress += "="
- else:
- progress += " "
- sys.stdout.write("[ %s ] %.2f%%" % (progress, percent * 100))
- sys.stdout.flush()
-
-if __name__ == "__main__":
- if len(sys.argv) != 3:
- print 'Usage: %s [user:pass]' % (sys.argv[0])
- print ''
- print 'Example: %s /tmp/my-maven-repo/org/elasticsearch https://oss.sonatype.org/service/local/repositories/orgelasticsearch-1012/content/org/elasticsearch' % (sys.argv[0])
- else:
- sys.argv[1] = re.sub('/$', '', sys.argv[1])
- sys.argv[2] = re.sub('/$', '', sys.argv[2])
-
- localMavenRepo = sys.argv[1]
- endpoint = sys.argv[2]
-
- filesToCheck = []
- foundSignedFiles = False
-
- for root, dirs, files in os.walk(localMavenRepo):
- for file in files:
- # no metadata files (they get renamed from maven-metadata-local.xml to maven-metadata.xml while deploying)
- # no .properties and .repositories files (they don't get uploaded)
- if not file.startswith('maven-metadata') and not file.endswith('.properties') and not file.endswith('.repositories'):
- filesToCheck.append(os.path.join(root, file))
- if file.endswith('.asc'):
- foundSignedFiles = True
-
- print "Need to check %i files" % len(filesToCheck)
- if not foundSignedFiles:
- print '### Warning: No signed .asc files found'
-
- # set up http
- parsed_uri = urlparse.urlparse(endpoint)
- domain = parsed_uri.netloc
- if parsed_uri.scheme == 'https':
- conn = httplib.HTTPSConnection(domain)
- else:
- conn = httplib.HTTPConnection(domain)
- #conn.set_debuglevel(5)
-
- drawProgressBar(0)
- errors = []
- for idx, file in enumerate(filesToCheck):
- request_uri = parsed_uri.path + file[len(localMavenRepo):]
- conn.request("HEAD", request_uri)
- res = conn.getresponse()
- res.read() # useless call for head, but prevents httplib.ResponseNotReady raise
-
- absolute_url = parsed_uri.scheme + '://' + parsed_uri.netloc + request_uri
- if res.status == 200:
- content_length = res.getheader('content-length')
- local_file_size = os.path.getsize(file)
- if int(content_length) != int(local_file_size):
- errors.append('LENGTH MISMATCH: %s differs in size. local %s <=> %s remote' % (absolute_url, content_length, local_file_size))
- elif res.status == 404:
- errors.append('MISSING: %s' % absolute_url)
- elif res.status == 301 or res.status == 302:
- errors.append('REDIRECT: %s to %s' % (absolute_url, res.getheader('location')))
- else:
- errors.append('ERROR: %s http response: %s %s' %(absolute_url, res.status, res.reason))
-
- # update progressbar at the end
- drawProgressBar((idx+1)/float(len(filesToCheck)))
-
- print
-
- if len(errors) != 0:
- print 'The following errors occurred (%s out of %s files)' % (len(errors), len(filesToCheck))
- print
- for error in errors:
- print error
- sys.exit(-1)