source:
issm/oecreview/Archive/25834-26739/ISSM-25872-25873.diff
Last change on this file was 26740, checked in by , 3 years ago | |
---|---|
File size: 20.7 KB |
-
../trunk-jpl/packagers/mac/package-issm-mac-binaries-matlab.sh
36 36 # help debug potential SVN issues. 37 37 # 38 38 # NOTE: 39 # - Assumes that 'issm-binaries-user' and 'issm-binaries-pass'are set up in39 # - Assumes that "ISSM_BINARIES_USER" and "ISSM_BINARIES_PASS" are set up in 40 40 # the 'Bindings' section under a 'Username and password (separated)' binding 41 41 # (requires 'Credentials Binding Plugin'). 42 42 # - For local debugging, the aformentioned credentials can be hardcoded into … … 72 72 MATLAB_NROPTIONS="'benchmark','all','exclude',[125,126,234,235,418,420,435,444,445,701,702,703,1101,1102,1103,1104,1105,1106,1107,1108,1109,1110,1201,1202,1203,1204,1205,1206,1207,1208,1301,1302,1303,1304,1401,1402,1601,1602,2006,2020,2021,2051,2052,2053,3001:3200,3201,3202,3300,3480,3481,4001,4002,4003]" # NOTE: Combination of test suites from basic, Dakota, and Solid Earth builds, with tests that require a restart and those that require the JVM excluded 73 73 MATLAB_PATH="/Applications/MATLAB_R2018a.app" 74 74 NOTARIZATION_LOGFILE="notarization.log" 75 PASSWORD=$ env:issm-binaries-pass75 PASSWORD=${ISSM_BINARIES_PASS} 76 76 PKG="ISSM-macOS-MATLAB" # Name of directory to copy distributable files to 77 77 RETRIGGER_SIGNING_FILE="retrigger.txt" 78 78 SIGNED_REPO_COPY="./signed" … … 81 81 SIGNING_LOCK_FILE="signing.lock" 82 82 UNSIGNED_REPO_COPY="./unsigned" 83 83 UNSIGNED_REPO_URL="https://issm.ess.uci.edu/svn/issm-binaries/mac/matlab/unsigned" 84 USERNAME=$ env:issm-binaries-user84 USERNAME=${ISSM_BINARIES_USER} 85 85 86 86 COMPRESSED_PKG="${PKG}.zip" 87 87 … … 88 88 ## Environment 89 89 # 90 90 export PATH="${ISSM_DIR}/bin:$(getconf PATH)" # Ensure that we pick up binaries from 'bin' directory rather than 'externalpackages' 91 91 AGU 92 92 ## Parse options 93 93 # 94 94 if [ $# -gt 1 ]; then … … 115 115 # Remove signing lock file from signed package repository so that a new 116 116 # build can run 117 117 echo "Removing lock file from repository for signed packages" 118 svn co \ 118 svn checkout \ 119 --trust-server-cert \ 120 --non-interactive \ 119 121 --username ${USERNAME} \ 120 122 --password ${PASSWORD} \ 121 123 --depth empty \ … … 123 125 ${SIGNED_REPO_COPY} > /dev/null 2>&1 124 126 svn up ${SIGNED_REPO_COPY}/${SIGNING_LOCK_FILE} > /dev/null 2>&1 125 127 svn delete ${SIGNED_REPO_COPY}/${SIGNING_LOCK_FILE} > /dev/null 2>&1 126 svn commit --message "DEL: Removing lock file after failed build" ${SIGNED_REPO_COPY} > /dev/null 2>&1 128 svn commit \ 129 --trust-server-cert \ 130 --non-interactive \ 131 --username ${USERNAME} \ 132 --password ${PASSWORD} \ 133 --message "DEL: Removing lock file after failed build" ${SIGNED_REPO_COPY} > /dev/null 2>&1 127 134 svn cleanup ${SIGNED_REPO_COPY} > /dev/null 2>&1 128 135 exit 1 129 136 fi … … 148 155 # previous signing. 149 156 # 150 157 echo "Checking out copy of repository for signed packages" 151 svn co \ 158 svn checkout \ 159 --trust-server-cert \ 160 --non-interactive \ 152 161 --username ${USERNAME} \ 153 162 --password ${PASSWORD} \ 154 163 --depth empty \ … … 265 274 echo "Committing lock file to repository for signed packages" 266 275 touch ${SIGNED_REPO_COPY}/${SIGNING_LOCK_FILE} 267 276 svn add ${SIGNED_REPO_COPY}/${SIGNING_LOCK_FILE} > /dev/null 2>&1 268 svn commit --message "ADD: New lock file" ${SIGNED_REPO_COPY} > /dev/null 2>&1 277 svn commit \ 278 --trust-server-cert \ 279 --non-interactive \ 280 --username ${USERNAME} \ 281 --password ${PASSWORD} \ 282 --message "ADD: New lock file" ${SIGNED_REPO_COPY} > /dev/null 2>&1 269 283 270 284 # Save current working copy revision number 271 285 svn up ${SIGNED_REPO_COPY} > /dev/null 2>&1 … … 273 287 274 288 # Check out copy of SVN repository for unsigned packages 275 289 echo "Checking out copy of repository for unsigned packages" 276 svn co \ 290 svn checkout \ 291 --trust-server-cert \ 292 --non-interactive \ 277 293 --username ${USERNAME} \ 278 294 --password ${PASSWORD} \ 279 295 ${UNSIGNED_REPO_URL} \ … … 288 304 echo "Committing package to repository for unsigned packages" 289 305 cp ${COMPRESSED_PKG} ${UNSIGNED_REPO_COPY} 290 306 svn add ${UNSIGNED_REPO_COPY}/${COMPRESSED_PKG} > /dev/null 2>&1 291 svn commit --message "CHG: New unsigned package" ${UNSIGNED_REPO_COPY} > /dev/null 2>&1 307 svn commit \ 308 --trust-server-cert \ 309 --non-interactive \ 310 --username ${USERNAME} \ 311 --password ${PASSWORD} \ 312 --message "CHG: New unsigned package" ${UNSIGNED_REPO_COPY} > /dev/null 2>&1 292 313 else 293 314 # NOTE: If notarize_only == 1, we commit a dummy file as the signing 294 315 # build on the remote JPL Cybersecurity Jenkins server is … … 297 318 echo "Attempting to sign existing package again" 298 319 touch ${UNSIGNED_REPO_COPY}/${RETRIGGER_SIGNING_FILE} 299 320 svn add ${UNSIGNED_REPO_COPY}/${RETRIGGER_SIGNING_FILE} > /dev/null 2>&1 300 svn commit --message "ADD: Retriggering signing with same package (previous attempt failed)" ${UNSIGNED_REPO_COPY} > /dev/null 2>&1 321 svn commit \ 322 --trust-server-cert \ 323 --non-interactive \ 324 --username ${USERNAME} \ 325 --password ${PASSWORD} \ 326 --message "ADD: Retriggering signing with same package (previous attempt failed)" ${UNSIGNED_REPO_COPY} > /dev/null 2>&1 301 327 fi 302 328 303 329 # Check status of signing -
../trunk-jpl/packagers/mac/package-issm-mac-binaries-python.sh
36 36 # help debug potential SVN issues. 37 37 # 38 38 # NOTE: 39 # - Assumes that 'issm-binaries-user' and 'issm-binaries-pass'are set up in39 # - Assumes that "ISSM_BINARIES_USER" and "ISSM_BINARIES_PASS" are set up in 40 40 # the 'Bindings' section under a 'Username and password (separated)' binding 41 41 # (requires 'Credentials Binding Plugin'). 42 42 # - For local debugging, the aformentioned credentials can be hardcoded into … … 70 70 ## Constants 71 71 # 72 72 NOTARIZATION_LOGFILE="notarization.log" 73 PASSWORD=$ env:issm-binaries-pass73 PASSWORD=${ISSM_BINARIES_PASS} 74 74 PKG="ISSM-macOS-Python" # Name of directory to copy distributable files to 75 75 PYTHON_NROPTIONS="--benchmark all --exclude 125 126 234 235 418 420 435 444 445 701 702 703 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1201 1202 1203 1204 1205 1206 1207 1208 1301 1302 1303 1304 1401 1402 1601 1602 2006 2020 2021 2051 2052 2053 3001:3200 3201 3202 3300 3480 3481 4001 4002 4003" # NOTE: Combination of test suites from basic, Dakota, and Solid Earth builds, with tests that require a restart and those that require the JVM excluded 76 76 RETRIGGER_SIGNING_FILE="retrigger.txt" … … 80 80 SIGNING_LOCK_FILE="signing.lock" 81 81 UNSIGNED_REPO_COPY="./unsigned" 82 82 UNSIGNED_REPO_URL="https://issm.ess.uci.edu/svn/issm-binaries/mac/python/unsigned" 83 USERNAME=$ env:issm-binaries-user83 USERNAME=${ISSM_BINARIES_USER} 84 84 85 85 COMPRESSED_PKG="${PKG}.zip" 86 86 … … 114 114 # Remove signing lock file from signed package repository so that a new 115 115 # build can run 116 116 echo "Removing lock file from repository for signed packages" 117 svn co \ 117 svn checkout \ 118 --trust-server-cert \ 119 --non-interactive \ 118 120 --username ${USERNAME} \ 119 121 --password ${PASSWORD} \ 120 122 --depth empty \ … … 122 124 ${SIGNED_REPO_COPY} > /dev/null 2>&1 123 125 svn up ${SIGNED_REPO_COPY}/${SIGNING_LOCK_FILE} > /dev/null 2>&1 124 126 svn delete ${SIGNED_REPO_COPY}/${SIGNING_LOCK_FILE} > /dev/null 2>&1 125 svn commit --message "DEL: Removing lock file after failed build" ${SIGNED_REPO_COPY} > /dev/null 2>&1 127 svn commit \ 128 --trust-server-cert \ 129 --non-interactive \ 130 --username ${USERNAME} \ 131 --password ${PASSWORD} \ 132 --message "DEL: Removing lock file after failed build" ${SIGNED_REPO_COPY} > /dev/null 2>&1 126 133 svn cleanup ${SIGNED_REPO_COPY} > /dev/null 2>&1 127 134 exit 1 128 135 fi … … 141 148 # from previous signing. 142 149 # 143 150 echo "Checking out copy of repository for signed packages" 144 svn co \ 151 svn checkout \ 152 --trust-server-cert \ 153 --non-interactive \ 145 154 --username ${USERNAME} \ 146 155 --password ${PASSWORD} \ 147 156 --depth empty \ … … 266 275 echo "Committing lock file to repository for signed packages" 267 276 touch ${SIGNED_REPO_COPY}/${SIGNING_LOCK_FILE} 268 277 svn add ${SIGNED_REPO_COPY}/${SIGNING_LOCK_FILE} > /dev/null 2>&1 269 svn commit --message "ADD: New lock file" ${SIGNED_REPO_COPY} > /dev/null 2>&1 278 svn commit \ 279 --trust-server-cert \ 280 --non-interactive \ 281 --username ${USERNAME} \ 282 --password ${PASSWORD} \ 283 --message "ADD: New lock file" ${SIGNED_REPO_COPY} > /dev/null 2>&1 270 284 271 285 # Save current working copy revision number 272 286 svn up ${SIGNED_REPO_COPY} > /dev/null 2>&1 … … 274 288 275 289 # Check out copy of SVN repository for unsigned packages 276 290 echo "Checking out copy of repository for unsigned packages" 277 svn co \ 291 svn checkout \ 292 --trust-server-cert \ 293 --non-interactive \ 278 294 --username ${USERNAME} \ 279 295 --password ${PASSWORD} \ 280 296 ${UNSIGNED_REPO_URL} \ … … 289 305 echo "Committing package to repository for unsigned packages" 290 306 cp ${COMPRESSED_PKG} ${UNSIGNED_REPO_COPY} 291 307 svn add ${UNSIGNED_REPO_COPY}/${COMPRESSED_PKG} > /dev/null 2>&1 292 svn commit --message "CHG: New unsigned package" ${UNSIGNED_REPO_COPY} > /dev/null 2>&1 308 svn commit \ 309 --trust-server-cert \ 310 --non-interactive \ 311 --username ${USERNAME} \ 312 --password ${PASSWORD} \ 313 --message "CHG: New unsigned package" ${UNSIGNED_REPO_COPY} > /dev/null 2>&1 293 314 else 294 315 # NOTE: If notarize_only == 1, we commit a dummy file as the signing 295 316 # build on the remote JPL Cybersecurity Jenkins server is … … 298 319 echo "Attempting to sign existing package again" 299 320 touch ${UNSIGNED_REPO_COPY}/${RETRIGGER_SIGNING_FILE} 300 321 svn add ${UNSIGNED_REPO_COPY}/${RETRIGGER_SIGNING_FILE} > /dev/null 2>&1 301 svn commit --message "ADD: Retriggering signing with same package (previous attempt failed)" ${UNSIGNED_REPO_COPY} > /dev/null 2>&1 322 svn commit \ 323 --trust-server-cert \ 324 --non-interactive \ 325 --username ${USERNAME} \ 326 --password ${PASSWORD} \ 327 --message "ADD: Retriggering signing with same package (previous attempt failed)" ${UNSIGNED_REPO_COPY} > /dev/null 2>&1 302 328 fi 303 329 304 330 # Check status of signing -
../trunk-jpl/packagers/mac/sign-issm-mac-binaries-matlab.sh
16 16 # - Navigate to 'Manage Jenkins' -> 'Manage Credentials' -> <domain> -> 17 17 # 'Add Credentials' and enter the crendentials from above. 18 18 # - From the 'Dashboard', select 'New Item' -> 'Freestyle project'. 19 # - Under 'Source Code Management', select 'Subversion'. 19 # - Under 'Source Code Management', select 'Subversion'. 20 20 # - The 'Repository URL' text field should be set to 21 # "https://issm.ess.uci.edu/svn/issm-binaries/mac/matlab/unsigned" 21 # "https://issm.ess.uci.edu/svn/issm-binaries/mac/matlab/unsigned". 22 22 # - The 'Credentials' select menu should be set to the new credentials 23 23 # created previously. 24 # - The 'Local module directory' text field should be set to the same 25 # value as the constant UNSIGNED_REPO_COPY (set below to './unsigned'). 24 26 # - Under 'Build Trigggers', check the box for 'Poll SCM' and set the 25 27 # 'Schedule' text area to "H/5 * * * *". 26 28 # - Under 'Build Environment', check the box for 'Use secret text(s) or 27 29 # file(s)', then under 'Bindings' click the 'Add...' button and select 28 30 # 'Username and password (separated)'. 29 # - Set 'Username Variable' to " issm-binaries-user”.30 # - Set 'Password Variable' to " issm-binaries-pass”.31 # - Set 'Username Variable' to "ISSM_BINARIES_USER". 32 # - Set 'Password Variable' to "ISSM_BINARIES_PASS". 31 33 # - Under 'Credentials', select the same, new credentials that created 32 34 # previously. 33 35 # - The contents of this script can be copied/pasted directly into the ‘Build' … … 81 83 NOTARIZATION_CHECK_PERIOD=60 82 84 NOTARIZATION_LOGFILE="notarization.log" 83 85 NOTARIZATION_LOGFILE_PATH="." 86 PASSWORD=${ISSM_BINARIES_PASS} 84 87 PKG="ISSM-macOS-MATLAB" 85 88 PRIMARY_BUNDLE_ID="**********.issm.matlab" # Should be "gov.nasa.jpl.issm.matlab" 86 89 RETRIGGER_SIGNING_FILE="retrigger.txt" … … 90 93 SUCCESS_LOGFILE="${SIGNED_REPO_COPY}/success.log" 91 94 UNSIGNED_REPO_COPY="./unsigned" 92 95 UNSIGNED_REPO_URL="https://issm.ess.uci.edu/svn/issm-binaries/mac/matlab/unsigned" 96 USERNAME=${ISSM_BINARIES_USER} 93 97 94 98 COMPRESSED_PKG="${PKG}.zip" 95 99 EXE_ENTITLEMENTS_PLIST="${PKG}/bin/entitlements.plist" … … 100 104 rm -rf ${PKG} ${COMPRESSED_PKG} ${NOTARIZATION_LOGFILE_PATH}/${NOTARIZATION_LOGFILE} ${SIGNED_REPO_COPY} ${UNSIGNED_REPO_COPY} 101 105 mkdir ${PKG} 102 106 107 # NOTE: Uncomment the following for local testing (Jenkins checks out copy of 108 # repository for unsigned packages to working directory) 109 # 103 110 # Check out copy of repository for unsigned packages 104 echo "Checking out copy of respository for unsigned packages" 105 svn co \ 106 --username ${USERNAME} \ 107 --password ${PASSWORD} \ 108 ${UNSIGNED_REPO_URL} \ 109 ${UNSIGNED_REPO_COPY} > /dev/null 2>&1 111 # echo "Checking out copy of respository for unsigned packages" 112 # svn checkout \ 113 # --trust-server-cert \ 114 # --non-interactive \ 115 # --username ${USERNAME} \ 116 # --password ${PASSWORD} \ 117 # ${UNSIGNED_REPO_URL} \ 118 # ${UNSIGNED_REPO_COPY} > /dev/null 2>&1 110 119 111 120 # Extract package contents 112 121 echo "Extracting package contents" … … 238 247 239 248 # Remove dummy file for retriggering signing/notarization (if it exists) 240 249 svn delete ${UNSIGNED_REPO_COPY}/${RETRIGGER_SIGNING_FILE} > /dev/null 2>&1 241 svn commit --message "DEL: Removing dummy file for retriggering signing of same package" ${UNSIGNED_REPO_COPY} > /dev/null 2>&1 250 svn commit \ 251 --trust-server-cert \ 252 --non-interactive \ 253 --username ${USERNAME} \ 254 --password ${PASSWORD} \ 255 --message "DEL: Removing dummy file for retriggering signing of same package" ${UNSIGNED_REPO_COPY} > /dev/null 2>&1 242 256 243 257 # Check out copy of repository for signed packages 244 258 echo "Checking out copy of respository for signed packages" 245 svn co \ 259 svn checkout \ 260 --trust-server-cert \ 261 --non-interactive \ 246 262 --username ${USERNAME} \ 247 263 --password ${PASSWORD} \ 248 264 ${SIGNED_REPO_URL} \ … … 262 278 263 279 # Commit changes 264 280 echo "Committing changes to repository for signed packages" 265 svn commit --message "CHG: New signed package (success)" ${SIGNED_REPO_COPY} > /dev/null 2>&1 281 svn commit \ 282 --trust-server-cert \ 283 --non-interactive \ 284 --username ${USERNAME} \ 285 --password ${PASSWORD} \ 286 --message "CHG: New signed package (success)" ${SIGNED_REPO_COPY} > /dev/null 2>&1 266 287 else 267 288 # Commit changes 268 289 echo "Committing changes to repository for signed packages" 269 svn commit --message "CHG: New signed package (failure)" ${SIGNED_REPO_COPY} > /dev/null 2>&1 290 svn commit \ 291 --trust-server-cert \ 292 --non-interactive \ 293 --username ${USERNAME} \ 294 --password ${PASSWORD} \ 295 --message "CHG: New signed package (failure)" ${SIGNED_REPO_COPY} > /dev/null 2>&1 270 296 271 297 exit 1 272 298 fi -
../trunk-jpl/packagers/mac/sign-issm-mac-binaries-python.sh
4 4 # Intended to be run in the context of a Jenkins project on a JPL 5 5 # Cybersecurity server for signing macOS applications. Polls SCM of the 6 6 # Subversion repository hosted at 7 # https://issm.ess.uci.edu/svn/issm-binaries/mac/ python/unsigned to trigger new7 # https://issm.ess.uci.edu/svn/issm-binaries/mac/matlab/unsigned to trigger new 8 8 # builds. 9 9 # 10 10 # In order to replicate the requried Jenkins project configuration: … … 16 16 # - Navigate to 'Manage Jenkins' -> 'Manage Credentials' -> <domain> -> 17 17 # 'Add Credentials' and enter the crendentials from above. 18 18 # - From the 'Dashboard', select 'New Item' -> 'Freestyle project'. 19 # - Under 'Source Code Management', select 'Subversion'. 19 # - Under 'Source Code Management', select 'Subversion'. 20 20 # - The 'Repository URL' text field should be set to 21 # "https://issm.ess.uci.edu/svn/issm-binaries/mac/ python/unsigned"21 # "https://issm.ess.uci.edu/svn/issm-binaries/mac/matlab/unsigned". 22 22 # - The 'Credentials' select menu should be set to the new credentials 23 23 # created previously. 24 # - The 'Local module directory' text field should be set to the same 25 # value as the constant UNSIGNED_REPO_COPY (set below to './unsigned'). 24 26 # - Under 'Build Trigggers', check the box for 'Poll SCM' and set the 25 27 # 'Schedule' text area to "H/5 * * * *". 26 28 # - Under 'Build Environment', check the box for 'Use secret text(s) or 27 29 # file(s)', then under 'Bindings' click the 'Add...' button and select 28 30 # 'Username and password (separated)'. 29 # - Set 'Username Variable' to " issm-binaries-user”.30 # - Set 'Password Variable' to " issm-binaries-pass”.31 # - Set 'Username Variable' to "ISSM_BINARIES_USER". 32 # - Set 'Password Variable' to "ISSM_BINARIES_PASS". 31 33 # - Under 'Credentials', select the same, new credentials that created 32 34 # previously. 33 35 # - The contents of this script can be copied/pasted directly into the ‘Build' … … 46 48 # the 'USERNAME' and 'PASSWORD' constants below. 47 49 ################################################################################ 48 50 51 # Expand aliases within the context of this script 52 shopt -s expand_aliases 53 49 54 # From https://developer.apple.com/documentation/macos-release-notes/macos-catalina-10_15-release-notes, 50 55 # 51 56 # Command line tool support for Subversion — including svn, git-svn, and … … 59 64 # when calling svn, even when subversion is installed via Homebrew and its path 60 65 # is available in PATH. 61 66 # 62 shopt -s expand_aliases 67 # NOTE: May be able to remove this after updating macOS. 68 # 63 69 alias svn='/usr/local/bin/svn' 64 70 65 71 ## Override certain other aliases … … 77 83 NOTARIZATION_CHECK_PERIOD=60 78 84 NOTARIZATION_LOGFILE="notarization.log" 79 85 NOTARIZATION_LOGFILE_PATH="." 86 PASSWORD=${ISSM_BINARIES_PASS} 80 87 PKG="ISSM-macOS-Python" 81 88 PRIMARY_BUNDLE_ID="**********.issm.python" # Should be "gov.nasa.jpl.issm.python" 82 89 RETRIGGER_SIGNING_FILE="retrigger.txt" … … 86 93 SUCCESS_LOGFILE="${SIGNED_REPO_COPY}/success.log" 87 94 UNSIGNED_REPO_COPY="./unsigned" 88 95 UNSIGNED_REPO_URL="https://issm.ess.uci.edu/svn/issm-binaries/mac/python/unsigned" 96 USERNAME=${ISSM_BINARIES_USER} 89 97 90 98 COMPRESSED_PKG="${PKG}.zip" 91 99 EXE_ENTITLEMENTS_PLIST="${PKG}/bin/entitlements.plist" … … 96 104 rm -rf ${PKG} ${COMPRESSED_PKG} ${NOTARIZATION_LOGFILE_PATH}/${NOTARIZATION_LOGFILE} ${SIGNED_REPO_COPY} ${UNSIGNED_REPO_COPY} 97 105 mkdir ${PKG} 98 106 107 # NOTE: Uncomment the following for local testing (Jenkins checks out copy of 108 # repository for unsigned packages to working directory) 109 # 99 110 # Check out copy of repository for unsigned packages 100 echo "Checking out copy of respository for unsigned packages" 101 svn co \ 102 --username ${USERNAME} \ 103 --password ${PASSWORD} \ 104 ${UNSIGNED_REPO_URL} \ 105 ${UNSIGNED_REPO_COPY} > /dev/null 2>&1 111 # echo "Checking out copy of respository for unsigned packages" 112 # svn checkout \ 113 # --trust-server-cert \ 114 # --non-interactive \ 115 # --username ${USERNAME} \ 116 # --password ${PASSWORD} \ 117 # ${UNSIGNED_REPO_URL} \ 118 # ${UNSIGNED_REPO_COPY} > /dev/null 2>&1 106 119 107 120 # Extract package contents 108 121 echo "Extracting package contents" … … 243 256 244 257 # Remove dummy file for retriggering signing/notarization (if it exists) 245 258 svn delete ${UNSIGNED_REPO_COPY}/${RETRIGGER_SIGNING_FILE} > /dev/null 2>&1 246 svn commit --message "DEL: Removing dummy file for retriggering signing of same package" ${UNSIGNED_REPO_COPY} > /dev/null 2>&1 259 svn commit \ 260 --trust-server-cert \ 261 --non-interactive \ 262 --username ${USERNAME} \ 263 --password ${PASSWORD} \ 264 --message "DEL: Removing dummy file for retriggering signing of same package" ${UNSIGNED_REPO_COPY} > /dev/null 2>&1 247 265 248 266 # Check out copy of repository for signed packages 249 267 echo "Checking out copy of respository for signed packages" 250 svn co \ 268 svn checkout \ 269 --trust-server-cert \ 270 --non-interactive \ 251 271 --username ${USERNAME} \ 252 272 --password ${PASSWORD} \ 253 273 ${SIGNED_REPO_URL} \ … … 267 287 268 288 # Commit changes 269 289 echo "Committing changes to repository for signed packages" 270 svn commit --message "CHG: New signed package (success)" ${SIGNED_REPO_COPY} > /dev/null 2>&1 290 svn commit \ 291 --trust-server-cert \ 292 --non-interactive \ 293 --username ${USERNAME} \ 294 --password ${PASSWORD} \ 295 --message "CHG: New signed package (success)" ${SIGNED_REPO_COPY} > /dev/null 2>&1 271 296 else 272 297 # Commit changes 273 298 echo "Committing changes to repository for signed packages" 274 svn commit --message "CHG: New signed package (failure)" ${SIGNED_REPO_COPY} > /dev/null 2>&1 299 svn commit \ 300 --trust-server-cert \ 301 --non-interactive \ 302 --username ${USERNAME} \ 303 --password ${PASSWORD} \ 304 --message "CHG: New signed package (failure)" ${SIGNED_REPO_COPY} > /dev/null 2>&1 275 305 276 306 exit 1 277 307 fi
Note:
See TracBrowser
for help on using the repository browser.