Changeset 25780
- Timestamp:
- 11/24/20 14:39:01 (4 years ago)
- Location:
- issm/trunk-jpl
- Files:
-
- 4 edited
- 3 copied
Legend:
- Unmodified
- Added
- Removed
-
issm/trunk-jpl/packagers/mac/package-issm-mac-binaries-matlab.sh
r25744 r25780 11 11 # - Checks resulting executables and libraries against test suite. 12 12 # - Packages and compresses executables and libraries. 13 # - Commits compressed package to SVN repository to be signed by JPL 14 # Cybersecurity. 13 # - Commits compressed package to repository to be signed by JPL Cybersecurity. 15 14 # - Retrieves signed package and transmits it to ISSM Web site for 16 15 # distribution. 17 16 # 18 # To skip tests, run with -s/--skiptests option. 17 # Options: 18 # -c/--cleanup Remove lock file from signed package repository (use if 19 # build is aborted to allow for subsequent fresh build) 20 # -n/--notarizeonly Sign/notarize only (use if signing/notarization fails 21 # to skip tests/packaging) 22 # -s/--skiptests Skip tests (use if this script fails for some reason 23 # after tests have successfully passed to save time) 24 # -t/--transferonly Transfer package to ISSM Web site only (use if 25 # transfer fails for some reason to skip testing and 26 # signing) 19 27 # 20 28 # Debugging: … … 36 44 ################################################################################ 37 45 46 # Expand aliases within the context of this script 47 shopt -s expand_aliases 48 38 49 # From https://developer.apple.com/documentation/macos-release-notes/macos-catalina-10_15-release-notes, 39 50 # … … 49 60 # is available in PATH. 50 61 # 51 shopt -s expand_aliases 62 # NOTE: May be able to remove this after updating macOS. 63 # 52 64 alias svn='/usr/local/bin/svn' 53 65 … … 58 70 ## Constants 59 71 # 60 61 72 MATLAB_NROPTIONS="'benchmark','all','exclude',[125,126,234,235,418,420,435,444,445,701,702,703,1101,1102,1103,1104,1105,1106,1107,1108,1109,1110,1201,1202,1203,1204,1205,1206,1207,1208,1301,1302,1303,1304,1401,1402,1601,1602,2006,2020,2021,2051,2052,2053,3001:3200,3201,3202,3300,3480,3481,4001,4002,4003]" # NOTE: Combination of test suites from basic, Dakota, and Solid Earth builds, with tests that require a restart and those that require the JVM excluded 62 MATLAB_PATH="/Applications/MATLAB_R201 8a.app"73 MATLAB_PATH="/Applications/MATLAB_R2019b.app" 63 74 NOTARIZATION_LOGFILE="notarization.log" 64 75 PASSWORD=$env:issm-binaries-pass 65 76 PKG="ISSM-macOS-MATLAB" # Name of directory to copy distributable files to 77 RETRIGGER_SIGNING_FILE="retrigger.txt" 66 78 SIGNED_REPO_COPY="./signed" 67 79 SIGNED_REPO_URL="https://issm.ess.uci.edu/svn/issm-binaries/mac/matlab/signed" 68 SIGNING_CHECK_PERIOD=60 # seconds80 SIGNING_CHECK_PERIOD=60 # in seconds 69 81 SIGNING_LOCK_FILE="signing.lock" 70 82 UNSIGNED_REPO_COPY="./unsigned" … … 80 92 ## Parse options 81 93 # 94 cleanup=0 95 notarize_only=0 82 96 skip_tests=0 83 97 transfer_only=0 84 while [ [ "$#" -gt 0 ]]; do98 while [ $# -gt 0 ]; do 85 99 case $1 in 100 -c|--cleanup) cleanup=1; shift ;; 101 -n|--notarizeonly) notarize_only=1; shift ;; 86 102 -s|--skiptests) skip_tests=1; shift ;; 87 103 -t|--transferonly) transfer_only=1; shift ;; … … 91 107 done 92 108 93 if [ ${transfer_only} -eq 0 ]; then 94 # Check if MATLAB exists 95 if ! [ -d ${MATLAB_PATH} ]; then 96 echo "${MATLAB_PATH} does not point to a MATLAB installation! Please modify MATLAB_PATH variable in $(basename $0) and try again." 97 exit 1 98 fi 99 100 # Clean up from previous packaging (not necessary for single builds on Jenkins, 101 # but useful when testing packaging locally) 102 echo "Cleaning up existing assets" 103 cd ${ISSM_DIR} 104 rm -rf ${PKG} ${COMPRESSED_PKG} ${SIGNED_REPO_COPY} ${UNSIGNED_REPO_COPY} 105 mkdir ${PKG} 106 107 # Check out copy of SVN repository for signed macOS packages 108 # 109 # NOTE: Get empty copy because we do not want to have to check out package from 110 # previous signing. 111 # 112 echo "Checking out copy of repository for signed packages" 109 if [ ${cleanup} -eq 1 ]; then 110 # Remove signing lock file from signed package repository so that a new 111 # build can run 112 echo "Removing lock file from repository for signed packages" 113 113 svn co \ 114 114 --username ${USERNAME} \ … … 117 117 ${SIGNED_REPO_URL} \ 118 118 ${SIGNED_REPO_COPY} > /dev/null 2>&1 119 120 # If lock file exists, a signing build is still in process by JPL Cybersecurity121 119 svn up ${SIGNED_REPO_COPY}/${SIGNING_LOCK_FILE} > /dev/null 2>&1 122 if [[ -f ${SIGNED_REPO_COPY}/${SIGNING_LOCK_FILE} ]]; then 123 echo "Previous signing job still in process by JPL Cybersecurity. Please try again later." 124 exit 1 120 svn delete ${SIGNED_REPO_COPY}/${SIGNING_LOCK_FILE} > /dev/null 2>&1 121 svn commit --message "DEL: Removing lock file after failed build" ${SIGNED_REPO_COPY} > /dev/null 2>&1 122 svn cleanup ${SIGNED_REPO_COPY} > /dev/null 2>&1 123 exit 1 124 fi 125 126 if [ ${transfer_only} -eq 0 ]; then 127 if [ ${notarize_only} -eq 0 ]; then 128 # Check if MATLAB exists 129 if ! [ -d ${MATLAB_PATH} ]; then 130 echo "${MATLAB_PATH} does not point to a MATLAB installation! Please modify MATLAB_PATH variable in $(basename $0) and try again." 131 exit 1 132 fi 133 134 # Clean up from previous packaging (not necessary for single builds on Jenkins, 135 # but useful when testing packaging locally) 136 echo "Cleaning up existing assets" 137 cd ${ISSM_DIR} 138 rm -rf ${PKG} ${COMPRESSED_PKG} ${SIGNED_REPO_COPY} ${UNSIGNED_REPO_COPY} 139 mkdir ${PKG} 140 141 # Check out copy of SVN repository for signed packages 142 # 143 # NOTE: Get empty copy because we do not want to have to check out package from 144 # previous signing. 145 # 146 echo "Checking out copy of repository for signed packages" 147 svn co \ 148 --username ${USERNAME} \ 149 --password ${PASSWORD} \ 150 --depth empty \ 151 ${SIGNED_REPO_URL} \ 152 ${SIGNED_REPO_COPY} > /dev/null 2>&1 153 154 # If lock file exists, a signing build is still in process by JPL Cybersecurity 155 svn up ${SIGNED_REPO_COPY}/${SIGNING_LOCK_FILE} > /dev/null 2>&1 156 if [[ -f ${SIGNED_REPO_COPY}/${SIGNING_LOCK_FILE} ]]; then 157 echo "Previous signing job still in process by JPL Cybersecurity. Please try again later." 158 exit 1 159 fi 160 161 # Add required binaries and libraries to package and modify them where needed 162 cd ${ISSM_DIR}/bin 163 164 echo "Modify generic" 165 cat generic_static.m | sed -e "s/generic_static/generic/g" > generic.m 166 167 echo "Moving MPICH binaries to bin/" 168 if [ -f ${ISSM_DIR}/externalpackages/petsc/install/bin/mpiexec ]; then 169 cp ${ISSM_DIR}/externalpackages/petsc/install/bin/mpiexec . 170 cp ${ISSM_DIR}/externalpackages/petsc/install/bin/hydra_pmi_proxy . 171 elif [ -f ${ISSM_DIR}/externalpackages/mpich/install/bin/mpiexec ]; then 172 cp ${ISSM_DIR}/externalpackages/mpich/install/bin/mpiexec . 173 cp ${ISSM_DIR}/externalpackages/mpich/install/bin/hydra_pmi_proxy . 174 else 175 echo "MPICH not found" 176 exit 1 177 fi 178 179 echo "Moving GDAL binaries to bin/" 180 if [ -f ${ISSM_DIR}/externalpackages/gdal/install/bin/gdal-config ]; then 181 cp ${ISSM_DIR}/externalpackages/gdal/install/bin/gdalsrsinfo . 182 cp ${ISSM_DIR}/externalpackages/gdal/install/bin/gdaltransform . 183 else 184 echo "GDAL not found" 185 exit 1 186 fi 187 188 echo "Moving GMT binaries to bin/" 189 if [ -f ${ISSM_DIR}/externalpackages/gmt/install/bin/gmt-config ]; then 190 cp ${ISSM_DIR}/externalpackages/gmt/install/bin/gmt . 191 cp ${ISSM_DIR}/externalpackages/gmt/install/bin/gmtselect . 192 else 193 echo "GMT not found" 194 exit 1 195 fi 196 197 echo "Moving Gmsh binaries to bin/" 198 if [ -f ${ISSM_DIR}/externalpackages/gmsh/install/bin/gmsh ]; then 199 cp ${ISSM_DIR}/externalpackages/gmsh/install/bin/gmsh . 200 else 201 echo "Gmsh not found" 202 exit 1 203 fi 204 205 # Run tests 206 if [ ${skip_tests} -eq 0 ]; then 207 echo "Running tests" 208 cd ${ISSM_DIR}/test/NightlyRun 209 rm matlab.log 2> /dev/null 210 211 # Run tests, redirecting output to logfile and suppressing output to console 212 ${MATLAB_PATH}/bin/matlab -nojvm -nosplash -r "try, addpath ${ISSM_DIR}/bin ${ISSM_DIR}/lib; runme(${MATLAB_NROPTIONS}); exit; catch me,fprintf('%s',getReport(me)); exit; end" -logfile matlab.log &> /dev/null 213 214 # Check that MATLAB did not exit in error 215 matlabExitCode=`echo $?` 216 matlabExitedInError=`grep -E "Activation cannot proceed|license|Error" matlab.log | wc -l` 217 218 if [[ ${matlabExitCode} -ne 0 || ${matlabExitedInError} -ne 0 ]]; then 219 echo "----------MATLAB exited in error!----------" 220 cat matlab.log 221 echo "-----------End of matlab.log-----------" 222 223 # Clean up execution directory 224 rm -rf ${ISSM_DIR}/execution/* 225 226 exit 1 227 fi 228 229 # Check that all tests passed 230 numTestsFailed=`cat matlab.log | grep -c -e "FAILED|ERROR"` 231 232 if [[ ${numTestsFailed} -ne 0 ]]; then 233 echo "One or more tests FAILED" 234 exit 1 235 else 236 echo "All tests PASSED" 237 fi 238 else 239 echo "Skipping tests" 240 fi 241 242 # Create package 243 cd ${ISSM_DIR} 244 svn cleanup --remove-ignored --remove-unversioned test # Clean up test directory (before copying to package) 245 echo "Copying assets to package: ${PKG}" 246 cp -rf bin examples lib scripts test ${PKG}/ 247 mkdir ${PKG}/execution 248 cp packagers/mac/issm-executable_entitlements.plist ${PKG}/bin/entitlements.plist 249 echo "Cleaning up unneeded/unwanted files" 250 rm -f ${PKG}/bin/generic_static.* # Remove static versions of generic cluster classes 251 rm -f ${PKG}/lib/*.a # Remove static libraries from package 252 rm -f ${PKG}/lib/*.la # Remove libtool libraries from package 253 rm -rf ${PKG}/test/SandBox # Remove testing sandbox from package 254 255 # Compress package 256 echo "Compressing package" 257 ditto -ck --sequesterRsrc --keepParent ${PKG} ${COMPRESSED_PKG} 125 258 fi 126 127 # Add required binaries and libraries to package and modify them where needed128 cd ${ISSM_DIR}/bin129 130 echo "Modify generic"131 cat generic_static.m | sed -e "s/generic_static/generic/g" > generic.m132 133 echo "Moving MPICH binaries to bin/"134 if [ -f ${ISSM_DIR}/externalpackages/petsc/install/bin/mpiexec ]; then135 cp ${ISSM_DIR}/externalpackages/petsc/install/bin/mpiexec .136 cp ${ISSM_DIR}/externalpackages/petsc/install/bin/hydra_pmi_proxy .137 elif [ -f ${ISSM_DIR}/externalpackages/mpich/install/bin/mpiexec ]; then138 cp ${ISSM_DIR}/externalpackages/mpich/install/bin/mpiexec .139 cp ${ISSM_DIR}/externalpackages/mpich/install/bin/hydra_pmi_proxy .140 else141 echo "MPICH not found"142 exit 1143 fi144 145 echo "Moving GDAL binaries to bin/"146 if [ -f ${ISSM_DIR}/externalpackages/gdal/install/bin/gdal-config ]; then147 cp ${ISSM_DIR}/externalpackages/gdal/install/bin/gdalsrsinfo .148 cp ${ISSM_DIR}/externalpackages/gdal/install/bin/gdaltransform .149 else150 echo "GDAL not found"151 exit 1152 fi153 154 echo "Moving GMT binaries to bin/"155 if [ -f ${ISSM_DIR}/externalpackages/gmt/install/bin/gmt-config ]; then156 cp ${ISSM_DIR}/externalpackages/gmt/install/bin/gmt .157 cp ${ISSM_DIR}/externalpackages/gmt/install/bin/gmtselect .158 else159 echo "GMT not found"160 exit 1161 fi162 163 echo "Moving Gmsh binaries to bin/"164 if [ -f ${ISSM_DIR}/externalpackages/gmsh/install/bin/gmsh ]; then165 cp ${ISSM_DIR}/externalpackages/gmsh/install/bin/gmsh .166 else167 echo "Gmsh not found"168 exit 1169 fi170 171 # Run tests172 if [ ${skip_tests} -eq 0 ]; then173 echo "Running tests"174 cd ${ISSM_DIR}/test/NightlyRun175 rm matlab.log 2> /dev/null176 177 # Run tests, redirecting output to logfile and suppressing output to console178 ${MATLAB_PATH}/bin/matlab -nojvm -nosplash -r "try, addpath ${ISSM_DIR}/bin ${ISSM_DIR}/lib; runme(${MATLAB_NROPTIONS}); exit; catch me,fprintf('%s',getReport(me)); exit; end" -logfile matlab.log &> /dev/null179 180 # Check that MATLAB did not exit in error181 matlabExitCode=`echo $?`182 matlabExitedInError=`grep -E "Activation cannot proceed|license|Error" matlab.log | wc -l`183 184 if [[ ${matlabExitCode} -ne 0 || ${matlabExitedInError} -ne 0 ]]; then185 echo "----------MATLAB exited in error!----------"186 cat matlab.log187 echo "-----------End of matlab.log-----------"188 189 # Clean up execution directory190 rm -rf ${ISSM_DIR}/execution/*191 192 exit 1193 fi194 195 # Check that all tests passed196 numTestsFailed=`cat matlab.log | grep -c -e "FAILED|ERROR"`197 198 if [[ ${numTestsFailed} -ne 0 ]]; then199 echo "One or more tests FAILED"200 exit 1201 else202 echo "All tests PASSED"203 fi204 else205 echo "Skipping tests"206 fi207 208 # Create package209 cd ${ISSM_DIR}210 svn cleanup --remove-ignored --remove-unversioned test # Clean up test directory (before copying to package)211 echo "Copying assets to package: ${PKG}"212 cp -rf bin examples lib scripts test ${PKG}/213 echo "Cleaning up unneeded/unwanted files"214 rm -f ${PKG}/bin/generic_static.* # Remove static versions of generic cluster classes215 rm -f ${PKG}/lib/*.a # Remove static libraries from package216 rm -f ${PKG}/lib/*.la # Remove libtool libraries from package217 rm -rf ${PKG}/test/SandBox # Remove testing sandbox from package218 219 # Compress package220 echo "Compressing package"221 ditto -ck --sequesterRsrc --keepParent ${PKG} ${COMPRESSED_PKG}222 259 223 260 # Commit lock file to repository for signed packages … … 231 268 CURRENT_REV=$(svn info --show-item last-changed-revision ${SIGNED_REPO_COPY}) 232 269 233 # Check out copy of SVN repository for unsigned macOSpackages270 # Check out copy of SVN repository for unsigned packages 234 271 echo "Checking out copy of repository for unsigned packages" 235 272 svn co \ … … 239 276 ${UNSIGNED_REPO_COPY} > /dev/null 2>&1 240 277 241 # Commit new compressed package to repository for unsigned binaries 242 # 243 # NOTE: This will not work if, for any reason, the checksum on the compressed 244 # package is unchanged. 245 # 246 echo "Committing package to repository for unsigned packages" 247 cp ${COMPRESSED_PKG} ${UNSIGNED_REPO_COPY} 248 svn add ${UNSIGNED_REPO_COPY}/${COMPRESSED_PKG} > /dev/null 2>&1 249 svn commit --message "CHG: New unsigned package" ${UNSIGNED_REPO_COPY} > /dev/null 2>&1 278 if [ ${notarize_only} -eq 0 ]; then 279 # Commit new compressed package to repository for unsigned binaries 280 # 281 # NOTE: This will not work if, for any reason, the checksum on the compressed 282 # package is unchanged. 283 # 284 echo "Committing package to repository for unsigned packages" 285 cp ${COMPRESSED_PKG} ${UNSIGNED_REPO_COPY} 286 svn add ${UNSIGNED_REPO_COPY}/${COMPRESSED_PKG} > /dev/null 2>&1 287 svn commit --message "CHG: New unsigned package" ${UNSIGNED_REPO_COPY} > /dev/null 2>&1 288 else 289 # NOTE: If notarize_only == 1, we commit a dummy file as the signing 290 # build on the remote JPL Cybersecurity Jenkins server is 291 # triggered by polling SCM. 292 # 293 echo "Attempting to sign existing package again" 294 touch ${UNSIGNED_REPO_COPY}/${RETRIGGER_SIGNING_FILE} 295 svn add ${UNSIGNED_REPO_COPY}/${RETRIGGER_SIGNING_FILE} > /dev/null 2>&1 296 svn commit --message "ADD: Retriggering signing with same package (previous attempt failed)" ${UNSIGNED_REPO_COPY} > /dev/null 2>&1 297 fi 250 298 251 299 # Check status of signing … … 255 303 256 304 while [ ${IN_PROCESS} -eq 1 ]; do 257 echo "...in progress still; checking again in ${SIGNING_CHECK_PERIOD} seconds ."305 echo "...in progress still; checking again in ${SIGNING_CHECK_PERIOD} seconds" 258 306 sleep ${SIGNING_CHECK_PERIOD} 259 307 svn up ${SIGNED_REPO_COPY} > /dev/null 2>&1 … … 269 317 STATUS=$(grep 'Status:' ${SIGNED_REPO_COPY}/${NOTARIZATION_LOGFILE} | sed -e 's/[[:space:]]*Status: //') 270 318 if [[ "${STATUS}" == "success" ]]; then 271 echo 'Notarization successful!'319 echo "Notarization successful!" 272 320 273 321 # Set flag indicating notarization was successful 274 322 SUCCESS=1 275 323 else 276 echo 'Notarization failed!'324 echo "Notarization failed!" 277 325 fi 278 326 fi 279 327 done 280 else # transfer_only == 1328 else 281 329 # Assume that previous build resulted in successful signing of package but 282 330 # that transfer to ISSM Web site failed and user built this project again … … 288 336 if [ ${SUCCESS} -eq 1 ]; then 289 337 # Transfer signed package to ISSM Web site 290 echo 'Transferring signed package to ISSM Web site'338 echo "Transferring signed package to ISSM Web site" 291 339 scp -i ~/.ssh/pine_island_to_ross ${SIGNED_REPO_COPY}/${COMPRESSED_PKG} jenkins@ross.ics.uci.edu:/var/www/html/${COMPRESSED_PKG} 292 340 … … 296 344 fi 297 345 else 298 echo '----------------------- Contents of notarization logfile -----------------------'346 echo "----------------------- Contents of notarization logfile -----------------------" 299 347 cat ${SIGNED_REPO_COPY}/${NOTARIZATION_LOGFILE} 300 echo '--------------------------------------------------------------------------------'348 echo "--------------------------------------------------------------------------------" 301 349 302 350 exit 1 -
issm/trunk-jpl/packagers/mac/package-issm-mac-binaries-python.sh
r25769 r25780 4 4 # To be used after running, 5 5 # 6 # ${ISSM_DIR}/jenkins/jenkins.sh ${ISSM_DIR}/jenkins/pine_island-mac-binaries- matlab6 # ${ISSM_DIR}/jenkins/jenkins.sh ${ISSM_DIR}/jenkins/pine_island-mac-binaries-python 7 7 # 8 8 # in the context of a Jenkins project. … … 11 11 # - Checks resulting executables and libraries against test suite. 12 12 # - Packages and compresses executables and libraries. 13 # - Commits compressed package to SVN repository to be signed by JPL 14 # Cybersecurity. 13 # - Commits compressed package to repository to be signed by JPL Cybersecurity. 15 14 # - Retrieves signed package and transmits it to ISSM Web site for 16 15 # distribution. 17 16 # 18 # To skip tests, run with -s/--skiptests option. 17 # Options: 18 # -c/--cleanup Remove lock file from signed package repository (use if 19 # build is aborted to allow for subsequent fresh build) 20 # -n/--notarizeonly Sign/notarize only (use if signing/notarization fails 21 # to skip tests/packaging) 22 # -s/--skiptests Skip tests (use if this script fails for some reason 23 # after tests have successfully passed to save time) 24 # -t/--transferonly Transfer package to ISSM Web site only (use if 25 # transfer fails for some reason to skip testing and 26 # signing) 19 27 # 20 28 # Debugging: … … 22 30 # Jenkins server. Debugging may be perfomed locally by running, 23 31 # 24 # packagers/mac/sign-issm-mac-binaries- matlab.sh32 # packagers/mac/sign-issm-mac-binaries-python.sh 25 33 # 26 34 # with Apple Developer credentials. … … 36 44 ################################################################################ 37 45 46 # Expand aliases within the context of this script 47 shopt -s expand_aliases 48 38 49 # From https://developer.apple.com/documentation/macos-release-notes/macos-catalina-10_15-release-notes, 39 50 # … … 49 60 # is available in PATH. 50 61 # 51 shopt -s expand_aliases 62 # NOTE: May be able to remove this after updating macOS. 63 # 52 64 alias svn='/usr/local/bin/svn' 53 65 … … 58 70 ## Constants 59 71 # 60 61 MATLAB_NROPTIONS="'benchmark','all','exclude',[125,126,234,235,418,420,435,444,445,701,702,703,1101,1102,1103,1104,1105,1106,1107,1108,1109,1110,1201,1202,1203,1204,1205,1206,1207,1208,1301,1302,1303,1304,1401,1402,1601,1602,2006,2020,2021,2051,2052,2053,3001:3200,3201,3202,3300,3480,3481,4001,4002,4003]" # NOTE: Combination of test suites from basic, Dakota, and Solid Earth builds, with tests that require a restart and those that require the JVM excluded62 MATLAB_PATH="/Applications/MATLAB_R2018a.app"63 72 NOTARIZATION_LOGFILE="notarization.log" 64 73 PASSWORD=$env:issm-binaries-pass 65 PKG="ISSM-macOS-MATLAB" # Name of directory to copy distributable files to 74 PKG="ISSM-macOS-Python" # Name of directory to copy distributable files to 75 PYTHON_NROPTIONS="--benchmark all --exclude 125 126 234 235 418 420 435 444 445 701 702 703 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1201 1202 1203 1204 1205 1206 1207 1208 1301 1302 1303 1304 1401 1402 1601 1602 2006 2020 2021 2051 2052 2053 3001:3200 3201 3202 3300 3480 3481 4001 4002 4003" # NOTE: Combination of test suites from basic, Dakota, and Solid Earth builds, with tests that require a restart and those that require the JVM excluded 76 RETRIGGER_SIGNING_FILE="retrigger.txt" 66 77 SIGNED_REPO_COPY="./signed" 67 SIGNED_REPO_URL="https://issm.ess.uci.edu/svn/issm-binaries/mac/ matlab/signed"68 SIGNING_CHECK_PERIOD=60 # seconds78 SIGNED_REPO_URL="https://issm.ess.uci.edu/svn/issm-binaries/mac/python/signed" 79 SIGNING_CHECK_PERIOD=60 # in seconds 69 80 SIGNING_LOCK_FILE="signing.lock" 70 81 UNSIGNED_REPO_COPY="./unsigned" 71 UNSIGNED_REPO_URL="https://issm.ess.uci.edu/svn/issm-binaries/mac/ matlab/unsigned"82 UNSIGNED_REPO_URL="https://issm.ess.uci.edu/svn/issm-binaries/mac/python/unsigned" 72 83 USERNAME=$env:issm-binaries-user 73 84 … … 80 91 ## Parse options 81 92 # 93 cleanup=0 94 notarize_only=0 82 95 skip_tests=0 83 96 transfer_only=0 84 while [ [ "$#" -gt 0 ]]; do97 while [ $# -gt 0 ]; do 85 98 case $1 in 99 -c|--cleanup) cleanup=1; shift ;; 100 -n|--notarizeonly) notarize_only=1; shift ;; 86 101 -s|--skiptests) skip_tests=1; shift ;; 87 102 -t|--transferonly) transfer_only=1; shift ;; … … 91 106 done 92 107 93 if [ ${transfer_only} -eq 0 ]; then 94 # Check if MATLAB exists 95 if ! [ -d ${MATLAB_PATH} ]; then 96 echo "${MATLAB_PATH} does not point to a MATLAB installation! Please modify MATLAB_PATH variable in $(basename $0) and try again." 97 exit 1 98 fi 99 100 # Clean up from previous packaging (not necessary for single builds on Jenkins, 101 # but useful when testing packaging locally) 102 echo "Cleaning up existing assets" 103 cd ${ISSM_DIR} 104 rm -rf ${PKG} ${COMPRESSED_PKG} ${SIGNED_REPO_COPY} ${UNSIGNED_REPO_COPY} 105 mkdir ${PKG} 106 107 # Check out copy of SVN repository for signed macOS packages 108 # 109 # NOTE: Get empty copy because we do not want to have to check out package from 110 # previous signing. 111 # 112 echo "Checking out copy of repository for signed packages" 108 if [ ${cleanup} -eq 1 ]; then 109 # Remove signing lock file from signed package repository so that a new 110 # build can run 111 echo "Removing lock file from repository for signed packages" 113 112 svn co \ 114 113 --username ${USERNAME} \ … … 117 116 ${SIGNED_REPO_URL} \ 118 117 ${SIGNED_REPO_COPY} > /dev/null 2>&1 119 120 # If lock file exists, a signing build is still in process by JPL Cybersecurity121 118 svn up ${SIGNED_REPO_COPY}/${SIGNING_LOCK_FILE} > /dev/null 2>&1 122 if [[ -f ${SIGNED_REPO_COPY}/${SIGNING_LOCK_FILE} ]]; then 123 echo "Previous signing job still in process by JPL Cybersecurity. Please try again later." 124 exit 1 119 svn delete ${SIGNED_REPO_COPY}/${SIGNING_LOCK_FILE} > /dev/null 2>&1 120 svn commit --message "DEL: Removing lock file after failed build" ${SIGNED_REPO_COPY} > /dev/null 2>&1 121 svn cleanup ${SIGNED_REPO_COPY} > /dev/null 2>&1 122 exit 1 123 fi 124 125 if [ ${transfer_only} -eq 0 ]; then 126 if [ ${notarize_only} -eq 0 ]; then 127 # Clean up from previous packaging (not necessary for single builds on 128 # Jenkins, but useful when testing packaging locally) 129 echo "Cleaning up existing assets" 130 cd ${ISSM_DIR} 131 rm -rf ${PKG} ${COMPRESSED_PKG} ${SIGNED_REPO_COPY} ${UNSIGNED_REPO_COPY} 132 mkdir ${PKG} 133 134 # Check out copy of SVN repository for signed packages 135 # 136 # NOTE: Get empty copy because we do not want to have to check out package 137 # from previous signing. 138 # 139 echo "Checking out copy of repository for signed packages" 140 svn co \ 141 --username ${USERNAME} \ 142 --password ${PASSWORD} \ 143 --depth empty \ 144 ${SIGNED_REPO_URL} \ 145 ${SIGNED_REPO_COPY} > /dev/null 2>&1 146 147 # If lock file exists, a signing build is still in process by JPL Cybersecurity 148 svn up ${SIGNED_REPO_COPY}/${SIGNING_LOCK_FILE} > /dev/null 2>&1 149 if [[ -f ${SIGNED_REPO_COPY}/${SIGNING_LOCK_FILE} ]]; then 150 echo "Previous signing job still in process by JPL Cybersecurity. Please try again later." 151 exit 1 152 fi 153 154 # Add required binaries and libraries to package and modify them where needed 155 cd ${ISSM_DIR}/bin 156 157 echo "Modify generic" 158 cat generic_static.m | sed -e "s/generic_static/generic/g" > generic.m 159 160 echo "Moving MPICH binaries to bin/" 161 if [ -f ${ISSM_DIR}/externalpackages/petsc/install/bin/mpiexec ]; then 162 cp ${ISSM_DIR}/externalpackages/petsc/install/bin/mpiexec . 163 cp ${ISSM_DIR}/externalpackages/petsc/install/bin/hydra_pmi_proxy . 164 elif [ -f ${ISSM_DIR}/externalpackages/mpich/install/bin/mpiexec ]; then 165 cp ${ISSM_DIR}/externalpackages/mpich/install/bin/mpiexec . 166 cp ${ISSM_DIR}/externalpackages/mpich/install/bin/hydra_pmi_proxy . 167 else 168 echo "MPICH not found" 169 exit 1 170 fi 171 172 echo "Moving GDAL binaries to bin/" 173 if [ -f ${ISSM_DIR}/externalpackages/gdal/install/bin/gdal-config ]; then 174 cp ${ISSM_DIR}/externalpackages/gdal/install/bin/gdalsrsinfo . 175 cp ${ISSM_DIR}/externalpackages/gdal/install/bin/gdaltransform . 176 else 177 echo "GDAL not found" 178 exit 1 179 fi 180 181 echo "Moving GMT binaries to bin/" 182 if [ -f ${ISSM_DIR}/externalpackages/gmt/install/bin/gmt-config ]; then 183 cp ${ISSM_DIR}/externalpackages/gmt/install/bin/gmt . 184 cp ${ISSM_DIR}/externalpackages/gmt/install/bin/gmtselect . 185 else 186 echo "GMT not found" 187 exit 1 188 fi 189 190 echo "Moving Gmsh binaries to bin/" 191 if [ -f ${ISSM_DIR}/externalpackages/gmsh/install/bin/gmsh ]; then 192 cp ${ISSM_DIR}/externalpackages/gmsh/install/bin/gmsh . 193 else 194 echo "Gmsh not found" 195 exit 1 196 fi 197 198 # Run tests 199 if [ ${skip_tests} -eq 0 ]; then 200 echo "Running tests" 201 202 cd ${ISSM_DIR}/test/NightlyRun 203 rm python.log 2> /dev/null 204 205 # Set Python environment 206 export PYTHONPATH="${ISSM_DIR}/src/m/dev" 207 export PYTHONSTARTUP="${PYTHONPATH}/devpath.py" 208 export PYTHONUNBUFFERED=1 # We don't want Python to buffer output, otherwise issm.exe output is not captured 209 210 # Run tests, redirecting output to logfile and suppressing output to console 211 ./runme.py ${PYTHON_NROPTIONS} &> python.log 2>&1 212 213 # Check that Python did not exit in error 214 pythonExitCode=`echo $?` 215 pythonExitedInError=`grep -E "Error|Standard exception|Traceback|bad interpreter" python.log | wc -l` 216 217 if [[ ${pythonExitCode} -ne 0 || ${pythonExitedInError} -ne 0 ]]; then 218 echo "----------Python exited in error!----------" 219 cat python.log 220 echo "-----------End of python.log-----------" 221 222 # Clean up execution directory 223 rm -rf ${ISSM_DIR}/execution/* 224 225 exit 1 226 fi 227 228 # Check that all tests passed 229 numTestsFailed=`cat python.log | grep -c -e "FAILED|ERROR"` 230 231 if [[ ${numTestsFailed} -ne 0 ]]; then 232 echo "One or more tests FAILED" 233 exit 1 234 else 235 echo "All tests PASSED" 236 fi 237 else 238 echo "Skipping tests" 239 fi 240 241 # Create package 242 cd ${ISSM_DIR} 243 svn cleanup --remove-ignored --remove-unversioned test # Clean up test directory (before copying to package) 244 echo "Copying assets to package: ${PKG}" 245 cp -rf bin examples lib scripts test ${PKG}/ 246 mkdir ${PKG}/execution 247 cp packagers/mac/issm-executable_entitlements.plist ${PKG}/bin/entitlements.plist 248 ${ISSM_DIR}/scripts/py_to_pyc.sh ${PKG}/bin # Compile Python source files 249 echo "Cleaning up unneeded/unwanted files" 250 rm -f ${PKG}/bin/*.py # Remove all Python scripts 251 rm -f ${PKG}/bin/generic_static.* # Remove static versions of generic cluster classes 252 rm -f ${PKG}/lib/*.a # Remove static libraries from package 253 rm -f ${PKG}/lib/*.la # Remove libtool libraries from package 254 rm -rf ${PKG}/test/SandBox # Remove testing sandbox from package 255 256 # Compress package 257 echo "Compressing package" 258 ditto -ck --sequesterRsrc --keepParent ${PKG} ${COMPRESSED_PKG} 125 259 fi 126 127 # Add required binaries and libraries to package and modify them where needed128 cd ${ISSM_DIR}/bin129 130 echo "Modify generic"131 cat generic_static.m | sed -e "s/generic_static/generic/g" > generic.m132 133 echo "Moving MPICH binaries to bin/"134 if [ -f ${ISSM_DIR}/externalpackages/petsc/install/bin/mpiexec ]; then135 cp ${ISSM_DIR}/externalpackages/petsc/install/bin/mpiexec .136 cp ${ISSM_DIR}/externalpackages/petsc/install/bin/hydra_pmi_proxy .137 elif [ -f ${ISSM_DIR}/externalpackages/mpich/install/bin/mpiexec ]; then138 cp ${ISSM_DIR}/externalpackages/mpich/install/bin/mpiexec .139 cp ${ISSM_DIR}/externalpackages/mpich/install/bin/hydra_pmi_proxy .140 else141 echo "MPICH not found"142 exit 1143 fi144 145 echo "Moving GDAL binaries to bin/"146 if [ -f ${ISSM_DIR}/externalpackages/gdal/install/bin/gdal-config ]; then147 cp ${ISSM_DIR}/externalpackages/gdal/install/bin/gdalsrsinfo .148 cp ${ISSM_DIR}/externalpackages/gdal/install/bin/gdaltransform .149 else150 echo "GDAL not found"151 exit 1152 fi153 154 echo "Moving GMT binaries to bin/"155 if [ -f ${ISSM_DIR}/externalpackages/gmt/install/bin/gmt-config ]; then156 cp ${ISSM_DIR}/externalpackages/gmt/install/bin/gmt .157 cp ${ISSM_DIR}/externalpackages/gmt/install/bin/gmtselect .158 else159 echo "GMT not found"160 exit 1161 fi162 163 echo "Moving Gmsh binaries to bin/"164 if [ -f ${ISSM_DIR}/externalpackages/gmsh/install/bin/gmsh ]; then165 cp ${ISSM_DIR}/externalpackages/gmsh/install/bin/gmsh .166 else167 echo "Gmsh not found"168 exit 1169 fi170 171 # Run tests172 if [ ${skip_tests} -eq 0 ]; then173 echo "Running tests"174 cd ${ISSM_DIR}/test/NightlyRun175 rm matlab.log 2> /dev/null176 177 # Run tests, redirecting output to logfile and suppressing output to console178 ${MATLAB_PATH}/bin/matlab -nojvm -nosplash -r "try, addpath ${ISSM_DIR}/bin ${ISSM_DIR}/lib; runme(${MATLAB_NROPTIONS}); exit; catch me,fprintf('%s',getReport(me)); exit; end" -logfile matlab.log &> /dev/null179 180 # Check that MATLAB did not exit in error181 matlabExitCode=`echo $?`182 matlabExitedInError=`grep -E "Activation cannot proceed|license|Error" matlab.log | wc -l`183 184 if [[ ${matlabExitCode} -ne 0 || ${matlabExitedInError} -ne 0 ]]; then185 echo "----------MATLAB exited in error!----------"186 cat matlab.log187 echo "-----------End of matlab.log-----------"188 189 # Clean up execution directory190 rm -rf ${ISSM_DIR}/execution/*191 192 exit 1193 fi194 195 # Check that all tests passed196 numTestsFailed=`cat matlab.log | grep -c -e "FAILED|ERROR"`197 198 if [[ ${numTestsFailed} -ne 0 ]]; then199 echo "One or more tests FAILED"200 exit 1201 else202 echo "All tests PASSED"203 fi204 else205 echo "Skipping tests"206 fi207 208 # Create package209 cd ${ISSM_DIR}210 svn cleanup --remove-ignored --remove-unversioned test # Clean up test directory (before copying to package)211 echo "Copying assets to package: ${PKG}"212 cp -rf bin examples lib scripts test ${PKG}/213 echo "Cleaning up unneeded/unwanted files"214 rm -f ${PKG}/bin/generic_static.* # Remove static versions of generic cluster classes215 rm -f ${PKG}/lib/*.a # Remove static libraries from package216 rm -f ${PKG}/lib/*.la # Remove libtool libraries from package217 rm -rf ${PKG}/test/SandBox # Remove testing sandbox from package218 219 # Compress package220 echo "Compressing package"221 ditto -ck --sequesterRsrc --keepParent ${PKG} ${COMPRESSED_PKG}222 260 223 261 # Commit lock file to repository for signed packages … … 231 269 CURRENT_REV=$(svn info --show-item last-changed-revision ${SIGNED_REPO_COPY}) 232 270 233 # Check out copy of SVN repository for unsigned macOSpackages271 # Check out copy of SVN repository for unsigned packages 234 272 echo "Checking out copy of repository for unsigned packages" 235 273 svn co \ … … 239 277 ${UNSIGNED_REPO_COPY} > /dev/null 2>&1 240 278 241 # Commit new compressed package to repository for unsigned binaries 242 # 243 # NOTE: This will not work if, for any reason, the checksum on the compressed 244 # package is unchanged. 245 # 246 echo "Committing package to repository for unsigned packages" 247 cp ${COMPRESSED_PKG} ${UNSIGNED_REPO_COPY} 248 svn add ${UNSIGNED_REPO_COPY}/${COMPRESSED_PKG} > /dev/null 2>&1 249 svn commit --message "CHG: New unsigned package" ${UNSIGNED_REPO_COPY} > /dev/null 2>&1 279 if [ ${notarize_only} -eq 0 ]; then 280 # Commit new compressed package to repository for unsigned binaries 281 # 282 # NOTE: This will not work if, for any reason, the checksum on the compressed 283 # package is unchanged. 284 # 285 echo "Committing package to repository for unsigned packages" 286 cp ${COMPRESSED_PKG} ${UNSIGNED_REPO_COPY} 287 svn add ${UNSIGNED_REPO_COPY}/${COMPRESSED_PKG} > /dev/null 2>&1 288 svn commit --message "CHG: New unsigned package" ${UNSIGNED_REPO_COPY} > /dev/null 2>&1 289 else 290 # NOTE: If notarize_only == 1, we commit a dummy file as the signing 291 # build on the remote JPL Cybersecurity Jenkins server is 292 # triggered by polling SCM. 293 # 294 echo "Attempting to sign existing package again" 295 touch ${UNSIGNED_REPO_COPY}/${RETRIGGER_SIGNING_FILE} 296 svn add ${UNSIGNED_REPO_COPY}/${RETRIGGER_SIGNING_FILE} > /dev/null 2>&1 297 svn commit --message "ADD: Retriggering signing with same package (previous attempt failed)" ${UNSIGNED_REPO_COPY} > /dev/null 2>&1 298 fi 250 299 251 300 # Check status of signing … … 255 304 256 305 while [ ${IN_PROCESS} -eq 1 ]; do 257 echo "...in progress still; checking again in ${SIGNING_CHECK_PERIOD} seconds ."306 echo "...in progress still; checking again in ${SIGNING_CHECK_PERIOD} seconds" 258 307 sleep ${SIGNING_CHECK_PERIOD} 259 308 svn up ${SIGNED_REPO_COPY} > /dev/null 2>&1 … … 269 318 STATUS=$(grep 'Status:' ${SIGNED_REPO_COPY}/${NOTARIZATION_LOGFILE} | sed -e 's/[[:space:]]*Status: //') 270 319 if [[ "${STATUS}" == "success" ]]; then 271 echo 'Notarization successful!'272 320 echo "Notarization successful!" 321 273 322 # Set flag indicating notarization was successful 274 323 SUCCESS=1 275 324 else 276 echo 'Notarization failed!'325 echo "Notarization failed!" 277 326 fi 278 327 fi 279 328 done 280 else # transfer_only == 1329 else 281 330 # Assume that previous build resulted in successful signing of package but 282 331 # that transfer to ISSM Web site failed and user built this project again … … 288 337 if [ ${SUCCESS} -eq 1 ]; then 289 338 # Transfer signed package to ISSM Web site 290 echo 'Transferring signed package to ISSM Web site'339 echo "Transferring signed package to ISSM Web site" 291 340 scp -i ~/.ssh/pine_island_to_ross ${SIGNED_REPO_COPY}/${COMPRESSED_PKG} jenkins@ross.ics.uci.edu:/var/www/html/${COMPRESSED_PKG} 292 341 … … 296 345 fi 297 346 else 298 echo '----------------------- Contents of notarization logfile -----------------------'347 echo "----------------------- Contents of notarization logfile -----------------------" 299 348 cat ${SIGNED_REPO_COPY}/${NOTARIZATION_LOGFILE} 300 echo '--------------------------------------------------------------------------------'349 echo "--------------------------------------------------------------------------------" 301 350 302 351 exit 1 -
issm/trunk-jpl/packagers/mac/sign-issm-mac-binaries-matlab.sh
r25744 r25780 1 #!/bin/bash 2 3 ################################################################################ 4 # Intended to be run in the context of a Jenkins project on a JPL 5 # Cybersecurity server for signing macOS applications. Polls SCM of the 6 # Subversion repository hosted at 7 # https://issm.ess.uci.edu/svn/issm-binaries/mac/matlab/unsigned to trigger new 8 # builds. 9 # 10 # In order to replicate the requried Jenkins project configuration: 11 # - First, navigate to 'Manage Jenkins' -> 'Manage Plugins' and install the 12 # 'Credentials Bindings Plugin' if it is not already installed. 13 # - Contact one of the members of the ISSM development team for crendentials 14 # for the ISSM binaries repository (mention that the credentials are stored 15 # in ISSM-Infrastructure.pdf). 16 # - Navigate to 'Manage Jenkins' -> 'Manage Credentials' -> <domain> -> 17 # 'Add Credentials' and enter the crendentials from above. 18 # - From the 'Dashboard', select 'New Item' -> 'Freestyle project'. 19 # - Under 'Source Code Management', select 'Subversion'. 20 # - The 'Repository URL' text field should be set to 21 # "https://issm.ess.uci.edu/svn/issm-binaries/mac/matlab/unsigned" 22 # - The 'Credentials' select menu should be set to the new credentials 23 # created previously. 24 # - Under 'Build Trigggers', check the box for 'Poll SCM' and set the 25 # 'Schedule' text area to "H/5 * * * *". 26 # - Under 'Build Environment', check the box for 'Use secret text(s) or 27 # file(s)', then under 'Bindings' click the 'Add...' button and select 28 # 'Username and password (separated)'. 29 # - Set 'Username Variable' to "issm-binaries-user”. 30 # - Set 'Password Variable' to "issm-binaries-pass”. 31 # - Under 'Credentials', select the same, new credentials that created 32 # previously. 33 # - The contents of this script can be copied/pasted directly into the ‘Build' 34 # -> 'Execute Shell' -> ‘Command' textarea of the project configuration (or 35 # you can simply store the script on disk and call it from there). 36 # - Make sure to click the 'Save' button. 37 # 38 # Current point of contact at JPL Cybersecurity: 39 # Alex Coward, alexander.g.coward@jpl.nasa.gov 40 # 41 # NOTE: 42 # - Assumes that 'issm-binaries-user' and 'issm-binaries-pass' are set up in 43 # the 'Bindings' section under a 'Username and password (separated)' binding 44 # (requires 'Credentials Binding Plugin'). 45 # - For local debugging, the aformentioned credentials can be hardcoded into 46 # the 'USERNAME' and 'PASSWORD' constants below. 47 ################################################################################ 48 49 # Expand aliases within the context of this script 50 shopt -s expand_aliases 51 1 52 # From https://developer.apple.com/documentation/macos-release-notes/macos-catalina-10_15-release-notes, 2 53 # … … 12 63 # is available in PATH. 13 64 # 14 shopt -s expand_aliases 65 # NOTE: May be able to remove this after updating macOS. 66 # 15 67 alias svn='/usr/local/bin/svn' 16 68 … … 20 72 alias grep=$(which grep) 21 73 22 AD_IDENTITY="**********" 23 AD_USERNAME="**********" 24 ALTOOL_PASSWORD="@keychain:**********" 74 ## Constants 75 # 76 AD_IDENTITY="**********" # Apple Developer identity 77 AD_USERNAME="**********" # Apple Developer username 78 ALTOOL_PASSWORD="@keychain:**********" # altool password (assumed to be stored in keychain) 25 79 ASC_PROVIDER="**********" 26 80 NOTARIZATION_CHECK_ATTEMPTS=60 … … 29 83 NOTARIZATION_LOGFILE_PATH="." 30 84 PKG="ISSM-macOS-MATLAB" 31 PRIMARY_BUNDLE_ID="**********.issm.matlab" 85 PRIMARY_BUNDLE_ID="**********.issm.matlab" # Maybe "nasa.jpl.issm.matlab"? 86 RETRIGGER_SIGNING_FILE="retrigger.txt" 32 87 SIGNED_REPO_COPY="./signed" 33 88 SIGNED_REPO_URL="https://issm.ess.uci.edu/svn/issm-binaries/mac/matlab/signed" … … 38 93 39 94 COMPRESSED_PKG="${PKG}.zip" 95 EXE_ENTITLEMENTS_PLIST="${PKG}/bin/entitlements.plist" 40 96 41 97 # Clean up from previous packaging (not necessary for single builds on Jenkins, 42 98 # but useful when testing packaging locally) 43 echo 'Cleaning up existing assets'99 echo "Cleaning up existing assets" 44 100 rm -rf ${PKG} ${COMPRESSED_PKG} ${NOTARIZATION_LOGFILE_PATH}/${NOTARIZATION_LOGFILE} ${SIGNED_REPO_COPY} ${UNSIGNED_REPO_COPY} 45 101 mkdir ${PKG} 46 102 47 # Check out copy of SVN repository for unsigned macOSpackages48 echo 'Checking out copy of SVN respository for unsigned packages'103 # Check out copy of repository for unsigned packages 104 echo "Checking out copy of respository for unsigned packages" 49 105 svn co \ 50 106 --username ${USERNAME} \ 51 107 --password ${PASSWORD} \ 52 108 ${UNSIGNED_REPO_URL} \ 53 ${UNSIGNED_REPO_COPY} 54 55 # Uncompress package56 echo 'Uncompressing package'109 ${UNSIGNED_REPO_COPY} > /dev/null 2>&1 110 111 # Extract package contents 112 echo "Extracting package contents" 57 113 ditto -xk ${UNSIGNED_REPO_COPY}/${COMPRESSED_PKG} . 58 114 … … 60 116 xattr -cr ${PKG} 61 117 62 # Build list of executables 63 EXECUTABLES=$(\ 118 # Build list of ISSM executables 119 ISSM_BINS=$(\ 120 find ${PKG}/bin -type f -name *.exe; \ 121 find ${PKG}/lib -type f -name *.mexmaci64; \ 122 ) 123 124 # Build list of third party executables 125 THIRD_PARTY_BINS=$(\ 64 126 echo ${PKG}/bin/mpiexec; \ 65 127 echo ${PKG}/bin/hydra_pmi_proxy; \ … … 69 131 echo ${PKG}/bin/gmtselect; \ 70 132 echo ${PKG}/bin/gmsh; \ 71 find ${PKG} -type f -name *.exe; \72 find ${PKG} -type f -name *.mexmaci64; \73 133 ) 74 134 75 135 # Sign all executables in package 76 echo 'Signing all executables in package' 77 codesign -s ${AD_IDENTITY} --timestamp --options=runtime ${EXECUTABLES} 136 echo "Signing all executables in package" 137 codesign -s ${AD_IDENTITY} --timestamp --options=runtime --entitlements ${EXE_ENTITLEMENTS_PLIST} ${ISSM_BINS} 138 codesign -s ${AD_IDENTITY} --timestamp --options=runtime ${THIRD_PARTY_BINS} 78 139 79 140 # NOTE: Skipping signature validation because this is not a true package nor app 80 141 81 142 # Compress signed package 82 echo 'Compressing signed package'143 echo "Compressing signed package" 83 144 ditto -ck --sequesterRsrc --keepParent ${PKG} ${COMPRESSED_PKG} 84 145 85 146 # Submit compressed package for notarization 86 echo 'Submitting signed package for notarization'147 echo "Submitting signed package to Apple for notarization" 87 148 xcrun altool --notarize-app --primary-bundle-id ${PRIMARY_BUNDLE_ID} --username ${AD_USERNAME} --password ${ALTOOL_PASSWORD} --asc-provider ${ASC_PROVIDER} --file ${COMPRESSED_PKG} &> ${NOTARIZATION_LOGFILE_PATH}/${NOTARIZATION_LOGFILE} 88 149 89 150 # Sleep until notarization request response is received 90 echo 'Waiting for notarizaion request response'151 echo "Waiting for notarizaion request response" 91 152 while [[ ! -f ${NOTARIZATION_LOGFILE_PATH}/${NOTARIZATION_LOGFILE} || ! -z $(find ${NOTARIZATION_LOGFILE_PATH} -empty -name ${NOTARIZATION_LOGFILE}) ]]; do 92 153 sleep 30 93 154 done 94 155 95 echo 'Notarizaion request response received'156 echo "Notarizaion request response received" 96 157 97 158 # Check if UUID exists in response 98 159 HAS_UUID=$(grep 'RequestUUID = ' ${NOTARIZATION_LOGFILE_PATH}/${NOTARIZATION_LOGFILE}) # NOTE: Checking for "RequestUUID = " because "RequestUUID" shows up in some error messages 99 160 if [[ -z "${HAS_UUID}" ]]; then 100 echo 'Notarization failed!'101 echo '----------------------- Contents of notarization logfile -----------------------'161 echo "Notarization failed!" 162 echo "----------------------- Contents of notarization logfile -----------------------" 102 163 cat ${NOTARIZATION_LOGFILE_PATH}/${NOTARIZATION_LOGFILE} 103 echo '--------------------------------------------------------------------------------'164 echo "--------------------------------------------------------------------------------" 104 165 105 166 # Clean up … … 120 181 # will not be able to clear Gatekeeper if they are offline. 121 182 # 122 echo 'Checking notarization status'183 echo "Checking notarization status" 123 184 SUCCESS=0 124 185 for ATTEMPT in $(seq 1 ${NOTARIZATION_CHECK_ATTEMPTS}); do … … 156 217 fi 157 218 else 158 if [ $ ATTEMPT-lt ${NOTARIZATION_CHECK_ATTEMPTS} ]; then219 if [ ${ATTEMPT} -lt ${NOTARIZATION_CHECK_ATTEMPTS} ]; then 159 220 echo " ...not ready yet; checking again in ${NOTARIZATION_CHECK_PERIOD} seconds." 160 221 sleep ${NOTARIZATION_CHECK_PERIOD} 161 222 else 162 echo ' ...maximum attempts reached, but no response, or something else went wrong.'163 echo ' If contents of notarization status check logfile appear to be valid, increase NOTARIZATION_CHECK_ATTEMPTS and run again.'223 echo " ...maximum attempts reached, but no response, or something else went wrong." 224 echo " If contents of notarization status check logfile appear to be valid, increase NOTARIZATION_CHECK_ATTEMPTS and run again." 164 225 break 165 226 fi … … 167 228 done 168 229 169 # Check out copy of SVN repository for signed macOS packages 170 echo 'Checking out copy of SVN respository for signed packages' 230 if [ ${SUCCESS} -eq 1 ]; then 231 echo "Notarization successful!" 232 else 233 echo "Notarization failed!" 234 echo "----------------------- Contents of notarization logfile -----------------------" 235 cat ${NOTARIZATION_LOGFILE_PATH}/${NOTARIZATION_LOGFILE} 236 echo "--------------------------------------------------------------------------------" 237 fi 238 239 # Remove dummy file for retriggering signing/notarization (if it exists) 240 svn delete ${UNSIGNED_REPO_COPY}/${RETRIGGER_SIGNING_FILE} > /dev/null 2>&1 241 svn commit --message "DEL: Removing dummy file for retriggering signing of same package" ${UNSIGNED_REPO_COPY} > /dev/null 2>&1 242 243 # Check out copy of repository for signed packages 244 echo "Checking out copy of respository for signed packages" 171 245 svn co \ 172 246 --username ${USERNAME} \ 173 247 --password ${PASSWORD} \ 174 248 ${SIGNED_REPO_URL} \ 175 ${SIGNED_REPO_COPY} 176 177 # Copy notarization file to repository for signed binaries249 ${SIGNED_REPO_COPY} > /dev/null 2>&1 250 251 # Copy notarization file to repository for signed packages 178 252 cp ${NOTARIZATION_LOGFILE_PATH}/${NOTARIZATION_LOGFILE} ${SIGNED_REPO_COPY} 179 253 svn add ${SIGNED_REPO_COPY}/${NOTARIZATION_LOGFILE} > /dev/null 2>&1 180 254 181 # Remove lock file from repository for signed binaries255 # Remove lock file from repository for signed packages 182 256 svn delete ${SIGNED_REPO_COPY}/${SIGNING_LOCK_FILE} > /dev/null 2>&1 183 257 184 258 if [ ${SUCCESS} -eq 1 ]; then 185 echo 'Notarization successful!' 186 187 # Copy signed package to repository for signed binaries 259 # Copy signed package to repository for signed packages 188 260 cp ${COMPRESSED_PKG} ${SIGNED_REPO_COPY} 189 261 svn add ${SIGNED_REPO_COPY}/${COMPRESSED_PKG} > /dev/null 2>&1 190 262 191 263 # Commit changes 192 svn commit --message "CHG: New signed package (success)" ${SIGNED_REPO_COPY} 264 echo "Committing changes to repository for signed packages" 265 svn commit --message "CHG: New signed package (success)" ${SIGNED_REPO_COPY} > /dev/null 2>&1 193 266 else 194 echo 'Notarization failed!'195 echo '----------------------- Contents of notarization logfile -----------------------'196 cat ${NOTARIZATION_LOGFILE_PATH}/${NOTARIZATION_LOGFILE}197 echo '--------------------------------------------------------------------------------'198 199 267 # Commit changes 200 svn commit --message "CHG: New signed package (failure)" ${SIGNED_REPO_COPY} 268 echo "Committing changes to repository for signed packages" 269 svn commit --message "CHG: New signed package (failure)" ${SIGNED_REPO_COPY} > /dev/null 2>&1 201 270 202 271 exit 1 -
issm/trunk-jpl/packagers/mac/sign-issm-mac-binaries-python.sh
r25751 r25780 1 #!/bin/bash 2 3 ################################################################################ 4 # Intended to be run in the context of a Jenkins project on a JPL 5 # Cybersecurity server for signing macOS applications. Polls SCM of the 6 # Subversion repository hosted at 7 # https://issm.ess.uci.edu/svn/issm-binaries/mac/python/unsigned to trigger new 8 # builds. 9 # 10 # In order to replicate the requried Jenkins project configuration: 11 # - First, navigate to 'Manage Jenkins' -> 'Manage Plugins' and install the 12 # 'Credentials Bindings Plugin' if it is not already installed. 13 # - Contact one of the members of the ISSM development team for crendentials 14 # for the ISSM binaries repository (mention that the credentials are stored 15 # in ISSM-Infrastructure.pdf). 16 # - Navigate to 'Manage Jenkins' -> 'Manage Credentials' -> <domain> -> 17 # 'Add Credentials' and enter the crendentials from above. 18 # - From the 'Dashboard', select 'New Item' -> 'Freestyle project'. 19 # - Under 'Source Code Management', select 'Subversion'. 20 # - The 'Repository URL' text field should be set to 21 # "https://issm.ess.uci.edu/svn/issm-binaries/mac/python/unsigned" 22 # - The 'Credentials' select menu should be set to the new credentials 23 # created previously. 24 # - Under 'Build Trigggers', check the box for 'Poll SCM' and set the 25 # 'Schedule' text area to "H/5 * * * *". 26 # - Under 'Build Environment', check the box for 'Use secret text(s) or 27 # file(s)', then under 'Bindings' click the 'Add...' button and select 28 # 'Username and password (separated)'. 29 # - Set 'Username Variable' to "issm-binaries-user”. 30 # - Set 'Password Variable' to "issm-binaries-pass”. 31 # - Under 'Credentials', select the same, new credentials that created 32 # previously. 33 # - The contents of this script can be copied/pasted directly into the ‘Build' 34 # -> 'Execute Shell' -> ‘Command' textarea of the project configuration (or 35 # you can simply store the script on disk and call it from there). 36 # - Make sure to click the 'Save' button. 37 # 38 # Current point of contact at JPL Cybersecurity: 39 # Alex Coward, alexander.g.coward@jpl.nasa.gov 40 # 41 # NOTE: 42 # - Assumes that 'issm-binaries-user' and 'issm-binaries-pass' are set up in 43 # the 'Bindings' section under a 'Username and password (separated)' binding 44 # (requires 'Credentials Binding Plugin'). 45 # - For local debugging, the aformentioned credentials can be hardcoded into 46 # the 'USERNAME' and 'PASSWORD' constants below. 47 ################################################################################ 48 1 49 # From https://developer.apple.com/documentation/macos-release-notes/macos-catalina-10_15-release-notes, 2 50 # … … 20 68 alias grep=$(which grep) 21 69 22 AD_IDENTITY="**********" 23 AD_USERNAME="**********" 24 ALTOOL_PASSWORD="@keychain:**********" 70 ## Constants 71 # 72 AD_IDENTITY="**********" # Apple Developer identity 73 AD_USERNAME="**********" # Apple Developer username 74 ALTOOL_PASSWORD="@keychain:**********" # altool password (assumed to be stored in keychain) 25 75 ASC_PROVIDER="**********" 26 76 NOTARIZATION_CHECK_ATTEMPTS=60 … … 28 78 NOTARIZATION_LOGFILE="notarization.log" 29 79 NOTARIZATION_LOGFILE_PATH="." 30 PKG="ISSM-macOS-MATLAB" 31 PRIMARY_BUNDLE_ID="**********.issm.matlab" 80 PKG="ISSM-macOS-Python" 81 PRIMARY_BUNDLE_ID="**********.issm.python" # Maybe "nasa.jpl.issm.matlab"? 82 RETRIGGER_SIGNING_FILE="retrigger.txt" 32 83 SIGNED_REPO_COPY="./signed" 33 SIGNED_REPO_URL="https://issm.ess.uci.edu/svn/issm-binaries/mac/ matlab/signed"84 SIGNED_REPO_URL="https://issm.ess.uci.edu/svn/issm-binaries/mac/python/signed" 34 85 SIGNING_LOCK_FILE="signing.lock" 35 86 SUCCESS_LOGFILE="${SIGNED_REPO_COPY}/success.log" 36 87 UNSIGNED_REPO_COPY="./unsigned" 37 UNSIGNED_REPO_URL="https://issm.ess.uci.edu/svn/issm-binaries/mac/ matlab/unsigned"88 UNSIGNED_REPO_URL="https://issm.ess.uci.edu/svn/issm-binaries/mac/python/unsigned" 38 89 39 90 COMPRESSED_PKG="${PKG}.zip" 91 EXE_ENTITLEMENTS_PLIST="${PKG}/bin/entitlements.plist" 40 92 41 93 # Clean up from previous packaging (not necessary for single builds on Jenkins, 42 94 # but useful when testing packaging locally) 43 echo 'Cleaning up existing assets'95 echo "Cleaning up existing assets" 44 96 rm -rf ${PKG} ${COMPRESSED_PKG} ${NOTARIZATION_LOGFILE_PATH}/${NOTARIZATION_LOGFILE} ${SIGNED_REPO_COPY} ${UNSIGNED_REPO_COPY} 45 97 mkdir ${PKG} 46 98 47 # Check out copy of SVN repository for unsigned macOSpackages48 echo 'Checking out copy of SVN respository for unsigned packages'99 # Check out copy of repository for unsigned packages 100 echo "Checking out copy of respository for unsigned packages" 49 101 svn co \ 50 102 --username ${USERNAME} \ 51 103 --password ${PASSWORD} \ 52 104 ${UNSIGNED_REPO_URL} \ 53 ${UNSIGNED_REPO_COPY} 54 55 # Uncompress package56 echo 'Uncompressing package'105 ${UNSIGNED_REPO_COPY} > /dev/null 2>&1 106 107 # Extract package contents 108 echo "Extracting package contents" 57 109 ditto -xk ${UNSIGNED_REPO_COPY}/${COMPRESSED_PKG} . 58 110 … … 60 112 xattr -cr ${PKG} 61 113 62 # Build list of executables 63 EXECUTABLES=$(\ 114 # Build list of ISSM executables 115 ISSM_BINS=$(\ 116 find ${PKG}/bin -type f -name *.exe; \ 117 find ${PKG}/bin -type f -name *.pyc; \ 118 ) 119 120 # Build list of third party executables 121 THIRD_PARTY_BINS=$(\ 64 122 echo ${PKG}/bin/mpiexec; \ 65 123 echo ${PKG}/bin/hydra_pmi_proxy; \ … … 69 127 echo ${PKG}/bin/gmtselect; \ 70 128 echo ${PKG}/bin/gmsh; \ 71 find ${PKG} -type f -name *.exe; \72 find ${PKG} -type f -name *.mexmaci64; \73 129 ) 74 130 75 131 # Sign all executables in package 76 echo 'Signing all executables in package' 77 codesign -s ${AD_IDENTITY} --timestamp --options=runtime ${EXECUTABLES} 132 echo "Signing all executables in package" 133 codesign -s ${AD_IDENTITY} --timestamp --options=runtime --entitlements ${EXE_ENTITLEMENTS_PLIST} ${ISSM_BINS} 134 codesign -s ${AD_IDENTITY} --timestamp --options=runtime ${THIRD_PARTY_BINS} 135 136 # Build list of ISSM libraries 137 ISSM_LIBS=$(\ 138 find ${PKG}/lib -type f -name *.so; \ 139 ) 140 141 # Sign all libraries in package 142 echo "Signing all libraries in package" 143 codesign -s ${AD_IDENTITY} --timestamp --options=runtime ${ISSM_LIBS} 78 144 79 145 # NOTE: Skipping signature validation because this is not a true package nor app 80 146 81 147 # Compress signed package 82 echo 'Compressing signed package'148 echo "Compressing signed package" 83 149 ditto -ck --sequesterRsrc --keepParent ${PKG} ${COMPRESSED_PKG} 84 150 85 151 # Submit compressed package for notarization 86 echo 'Submitting signed package for notarization'152 echo "Submitting signed package to Apple for notarization" 87 153 xcrun altool --notarize-app --primary-bundle-id ${PRIMARY_BUNDLE_ID} --username ${AD_USERNAME} --password ${ALTOOL_PASSWORD} --asc-provider ${ASC_PROVIDER} --file ${COMPRESSED_PKG} &> ${NOTARIZATION_LOGFILE_PATH}/${NOTARIZATION_LOGFILE} 88 154 89 155 # Sleep until notarization request response is received 90 echo 'Waiting for notarizaion request response'156 echo "Waiting for notarizaion request response" 91 157 while [[ ! -f ${NOTARIZATION_LOGFILE_PATH}/${NOTARIZATION_LOGFILE} || ! -z $(find ${NOTARIZATION_LOGFILE_PATH} -empty -name ${NOTARIZATION_LOGFILE}) ]]; do 92 158 sleep 30 93 159 done 94 160 95 echo 'Notarizaion request response received'161 echo "Notarizaion request response received" 96 162 97 163 # Check if UUID exists in response 98 164 HAS_UUID=$(grep 'RequestUUID = ' ${NOTARIZATION_LOGFILE_PATH}/${NOTARIZATION_LOGFILE}) # NOTE: Checking for "RequestUUID = " because "RequestUUID" shows up in some error messages 99 165 if [[ -z "${HAS_UUID}" ]]; then 100 echo 'Notarization failed!'101 echo '----------------------- Contents of notarization logfile -----------------------'166 echo "Notarization failed!" 167 echo "----------------------- Contents of notarization logfile -----------------------" 102 168 cat ${NOTARIZATION_LOGFILE_PATH}/${NOTARIZATION_LOGFILE} 103 echo '--------------------------------------------------------------------------------'169 echo "--------------------------------------------------------------------------------" 104 170 105 171 # Clean up … … 120 186 # will not be able to clear Gatekeeper if they are offline. 121 187 # 122 echo 'Checking notarization status'188 echo "Checking notarization status" 123 189 SUCCESS=0 124 190 for ATTEMPT in $(seq 1 ${NOTARIZATION_CHECK_ATTEMPTS}); do … … 137 203 if [[ "${STATUS}" == "success" ]]; then 138 204 # Staple notarization to all elements of package that were previously signed 139 #xcrun stapler staple ${ EXECUTABLES} # NOTE: Fails with "Stapler is incapable of working with MATLAB Mex files."205 #xcrun stapler staple ${THIRD_PARTY_BINS} # NOTE: Fails with "Stapler is incapable of working with MATLAB Mex files." 140 206 141 207 # Validate stapling of notarization 142 #xcrun stapler validation ${ EXECUTABLES} # NOTE: Skipping notarization stapling validation because this is not a true package nor app208 #xcrun stapler validation ${THIRD_PARTY_BINS} # NOTE: Skipping notarization stapling validation because this is not a true package nor app 143 209 144 210 # Compress signed and notarized package … … 156 222 fi 157 223 else 158 if [ $ ATTEMPT-lt ${NOTARIZATION_CHECK_ATTEMPTS} ]; then159 echo " ...not ready yet; checking again in ${NOTARIZATION_CHECK_PERIOD} seconds ."224 if [ ${ATTEMPT} -lt ${NOTARIZATION_CHECK_ATTEMPTS} ]; then 225 echo " ...not ready yet; checking again in ${NOTARIZATION_CHECK_PERIOD} seconds" 160 226 sleep ${NOTARIZATION_CHECK_PERIOD} 161 227 else 162 echo ' ...maximum attempts reached, but no response, or something else went wrong.'163 echo ' If contents of notarization status check logfile appear to be valid, increase NOTARIZATION_CHECK_ATTEMPTS and run again.'228 echo " ...maximum attempts reached, but no response, or something else went wrong" 229 echo " If contents of notarization status check logfile appear to be valid, increase NOTARIZATION_CHECK_ATTEMPTS and run again" 164 230 break 165 231 fi … … 167 233 done 168 234 169 # Check out copy of SVN repository for signed macOS packages 170 echo 'Checking out copy of SVN respository for signed packages' 235 if [ ${SUCCESS} -eq 1 ]; then 236 echo "Notarization successful!" 237 else 238 echo "Notarization failed!" 239 echo "----------------------- Contents of notarization logfile -----------------------" 240 cat ${NOTARIZATION_LOGFILE_PATH}/${NOTARIZATION_LOGFILE} 241 echo "--------------------------------------------------------------------------------" 242 fi 243 244 # Remove dummy file for retriggering signing/notarization (if it exists) 245 svn delete ${UNSIGNED_REPO_COPY}/${RETRIGGER_SIGNING_FILE} > /dev/null 2>&1 246 svn commit --message "DEL: Removing dummy file for retriggering signing of same package" ${UNSIGNED_REPO_COPY} > /dev/null 2>&1 247 248 # Check out copy of repository for signed packages 249 echo "Checking out copy of respository for signed packages" 171 250 svn co \ 172 251 --username ${USERNAME} \ 173 252 --password ${PASSWORD} \ 174 253 ${SIGNED_REPO_URL} \ 175 ${SIGNED_REPO_COPY} 176 177 # Copy notarization file to repository for signed binaries254 ${SIGNED_REPO_COPY} > /dev/null 2>&1 255 256 # Copy notarization file to repository for signed packages 178 257 cp ${NOTARIZATION_LOGFILE_PATH}/${NOTARIZATION_LOGFILE} ${SIGNED_REPO_COPY} 179 258 svn add ${SIGNED_REPO_COPY}/${NOTARIZATION_LOGFILE} > /dev/null 2>&1 180 259 181 # Remove lock file from repository for signed binaries260 # Remove lock file from repository for signed packages 182 261 svn delete ${SIGNED_REPO_COPY}/${SIGNING_LOCK_FILE} > /dev/null 2>&1 183 262 184 263 if [ ${SUCCESS} -eq 1 ]; then 185 echo 'Notarization successful!' 186 187 # Copy signed package to repository for signed binaries 264 # Copy signed package to repository for signed packages 188 265 cp ${COMPRESSED_PKG} ${SIGNED_REPO_COPY} 189 266 svn add ${SIGNED_REPO_COPY}/${COMPRESSED_PKG} > /dev/null 2>&1 190 267 191 268 # Commit changes 192 svn commit --message "CHG: New signed package (success)" ${SIGNED_REPO_COPY} 269 echo "Committing changes to repository for signed packages" 270 svn commit --message "CHG: New signed package (success)" ${SIGNED_REPO_COPY} > /dev/null 2>&1 193 271 else 194 echo 'Notarization failed!'195 echo '----------------------- Contents of notarization logfile -----------------------'196 cat ${NOTARIZATION_LOGFILE_PATH}/${NOTARIZATION_LOGFILE}197 echo '--------------------------------------------------------------------------------'198 199 272 # Commit changes 200 svn commit --message "CHG: New signed package (failure)" ${SIGNED_REPO_COPY} 273 echo "Committing changes to repository for signed packages" 274 svn commit --message "CHG: New signed package (failure)" ${SIGNED_REPO_COPY} > /dev/null 2>&1 201 275 202 276 exit 1 -
issm/trunk-jpl/packagers/mac/test-issm-mac-binaries-matlab.sh
r25744 r25780 1 1 #!/bin/bash 2 2 3 # This script is intended to test ISSM macOS MATLAB binaries downloaded to a 4 # user-end machine. 3 ################################################################################ 4 # This script is intended to test ISSM macOS MATLAB binaries on an end-user 5 # machine after successful packaging and signing. 5 6 # 6 7 # NOTE: Tarball must already exist in INSTALL_DIR 8 ################################################################################ 9 10 ## Constants 7 11 # 8 9 INSTALL_DIR=~/Downloads 12 INSTALL_DIR=. 10 13 MATLAB_NROPTIONS="'benchmark','all','exclude',[125,126,234,235,418,420,435,444,445,701,702,703,1101,1102,1103,1104,1105,1106,1107,1108,1109,1110,1201,1202,1203,1204,1205,1206,1207,1208,1301,1302,1303,1304,1401,1402,1601,1602,2006,2020,2021,2051,2052,2053,3001:3200,3201,3202,3300,3480,3481,4001,4002,4003]" # NOTE: Combination of test suites from basic, Dakota, and Solid Earth builds, with tests that require a restart and those that require the JVM excluded 11 14 MATLAB_PATH="/Applications/MATLAB_R2018a.app" … … 14 17 COMPRESSED_PKG="${PKG}.zip" 15 18 19 ## Environment 20 # 16 21 export ISSM_DIR="${INSTALL_DIR}/${PKG}" 17 22 export PATH="${PATH}:${ISSM_DIR}/bin:${ISSM_DIR}/scripts" … … 19 24 cd ${INSTALL_DIR} 20 25 rm -rf ${PKG} 21 tar -zxvf ${COMPRESSED_PKG} 26 ditto -xk ${COMPRESSED_PKG} . 22 27 cd ${PKG}/test/NightlyRun 23 28 24 # Check that MATLAB tests run25 echo "Running MATLABtests"29 # Run tests, redirecting output to logfile and suppressing output to console 30 echo "Running tests" 26 31 rm matlab.log 2> /dev/null 27 28 # Run MATLAB tests redirecting output to logfile and suppressing output to console29 32 ${MATLAB_PATH}/bin/matlab -nosplash -nodesktop -nojvm -r "try, addpath ../../bin; addpath ../../lib; runme(${MATLAB_NROPTIONS}); exit; catch me,fprintf('%s',getReport(me)); exit; end" -logfile matlab.log &> /dev/null 30 33 … … 41 44 fi 42 45 43 # Check that all MATLABtests passed44 num MatlabTestsFailed=`cat matlab.log | grep -c -e "FAILED|ERROR"`46 # Check that all tests passed 47 numTestsFailed=`cat matlab.log | grep -c -e "FAILED|ERROR"` 45 48 46 if [[ ${num MatlabTestsFailed} -ne 0 ]]; then47 echo "One or more MATLABtests FAILED"49 if [[ ${numTestsFailed} -ne 0 ]]; then 50 echo "One or more tests FAILED" 48 51 exit 1 49 52 else 50 echo "All MATLABtests PASSED"53 echo "All tests PASSED" 51 54 fi -
issm/trunk-jpl/packagers/mac/test-issm-mac-binaries-python.sh
r25769 r25780 1 1 #!/bin/bash 2 2 3 # This script is intended to test ISSM macOS MATLAB binaries downloaded to a 4 # user-end machine. 3 ################################################################################ 4 # This script is intended to test ISSM macOS MATLAB binaries on an end-user 5 # machine after successful packaging and signing. 5 6 # 6 7 # NOTE: Tarball must already exist in INSTALL_DIR 8 ################################################################################ 9 10 ## Constants 7 11 # 8 9 INSTALL_DIR=~/Downloads 10 MATLAB_NROPTIONS="'benchmark','all','exclude',[125,126,234,235,418,420,435,444,445,701,702,703,1101,1102,1103,1104,1105,1106,1107,1108,1109,1110,1201,1202,1203,1204,1205,1206,1207,1208,1301,1302,1303,1304,1401,1402,1601,1602,2006,2020,2021,2051,2052,2053,3001:3200,3201,3202,3300,3480,3481,4001,4002,4003]" # NOTE: Combination of test suites from basic, Dakota, and Solid Earth builds, with tests that require a restart and those that require the JVM excluded 11 MATLAB_PATH="/Applications/MATLAB_R2018a.app" 12 PKG="ISSM-macOS-MATLAB" 12 INSTALL_DIR=. 13 PKG="ISSM-macOS-Python" 14 PYTHON_NROPTIONS="--benchmark all --exclude 125 126 234 235 418 420 435 444 445 701 702 703 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1201 1202 1203 1204 1205 1206 1207 1208 1301 1302 1303 1304 1401 1402 1601 1602 2006 2020 2021 2051 2052 2053 3001:3200 3201 3202 3300 3480 3481 4001 4002 4003" # NOTE: Combination of test suites from basic, Dakota, and Solid Earth builds, with tests that require a restart and those that require the JVM excluded 13 15 14 16 COMPRESSED_PKG="${PKG}.zip" … … 16 18 export ISSM_DIR="${INSTALL_DIR}/${PKG}" 17 19 export PATH="${PATH}:${ISSM_DIR}/bin:${ISSM_DIR}/scripts" 20 export PYTHONPATH="${ISSM_DIR}/scripts" 21 export PYTHONSTARTUP="${PYTHONPATH}/devpath.py" 22 export PYTHONUNBUFFERED=1 # We don't want Python to buffer output, otherwise issm.exe output is not captured 18 23 19 24 cd ${INSTALL_DIR} 20 25 rm -rf ${PKG} 21 tar -zxvf ${COMPRESSED_PKG} 26 ditto -xk ${COMPRESSED_PKG} . 22 27 cd ${PKG}/test/NightlyRun 23 28 24 # Check that MATLAB tests run 25 echo "Running MATLAB tests" 26 rm matlab.log 2> /dev/null 29 # Run tests, redirecting output to logfile and suppressing output to console 30 echo "Running tests" 31 rm python.log 2> /dev/null 32 ./runme.py ${PYTHON_NROPTIONS} &> python.log 2>&1 27 33 28 # Run MATLAB tests redirecting output to logfile and suppressing output to console 29 ${MATLAB_PATH}/bin/matlab -nosplash -nodesktop -nojvm -r "try, addpath ../../bin; addpath ../../lib; runme(${MATLAB_NROPTIONS}); exit; catch me,fprintf('%s',getReport(me)); exit; end" -logfile matlab.log &> /dev/null 34 # Check that Python did not exit in error 35 pythonExitCode=`echo $?` 36 pythonExitedInError=`grep -E "runme.py: error" python.log | wc -l` 30 37 31 # Check that MATLAB did not exit in error 32 matlabExitCode=`echo $?` 33 matlabExitedInError=`grep -E "Activation cannot proceed|license|Error|Warning: Name is nonexistent or not a directory" matlab.log | wc -l` 34 35 if [[ ${matlabExitCode} -ne 0 || ${matlabExitedInError} -ne 0 ]]; then 36 echo "----------MATLAB exited in error!----------" 37 cat matlab.log 38 echo 39 echo "-----------End of matlab.log-----------" 38 if [[ ${pythonExitCode} -ne 0 || ${pythonExitedInError} -ne 0 ]]; then 39 echo "----------Python exited in error!----------" 40 cat python.log 41 echo "-----------End of python.log-----------" 40 42 exit 1 41 43 fi 42 44 43 # Check that all MATLABtests passed44 num MatlabTestsFailed=`cat matlab.log | grep -c -e "FAILED|ERROR"`45 # Check that all tests passed 46 numTestsFailed=`cat python.log | grep -c -e "FAILED|ERROR"` 45 47 46 if [[ ${num MatlabTestsFailed} -ne 0 ]]; then47 echo "One or more MATLABtests FAILED"48 if [[ ${numTestsFailed} -ne 0 ]]; then 49 echo "One or more tests FAILED" 48 50 exit 1 49 51 else 50 echo "All MATLABtests PASSED"52 echo "All tests PASSED" 51 53 fi -
issm/trunk-jpl/src/m/classes/results.py
r25726 r25780 107 107 108 108 def __init__(self, *args): #{{{ 109 self.steps = None 109 110 if len(args) == 1: 110 111 arg = args[0]
Note:
See TracChangeset
for help on using the changeset viewer.