Changeset 25874
- Timestamp:
- 12/15/20 14:39:49 (4 years ago)
- Location:
- issm/trunk-jpl/packagers/mac
- Files:
-
- 4 edited
Legend:
- Unmodified
- Added
- Removed
-
issm/trunk-jpl/packagers/mac/package-issm-mac-binaries-matlab.sh
r25873 r25874 89 89 # 90 90 export PATH="${ISSM_DIR}/bin:$(getconf PATH)" # Ensure that we pick up binaries from 'bin' directory rather than 'externalpackages' 91 AGU 91 92 ## Functions 93 # 94 validate_signed_repo_copy(){ 95 # Check out copy of repository for signed binaries if it does not exist 96 # (e.g. 'Check-out Strategy' was set to 'Use 'svn update' as much as 97 # possible'; initial checkout failed) 98 if [ ! -d ${SIGNED_REPO_COPY} && ! -d ${SIGNED_REPO_COPY}/.svn ]; then 99 # Check out copy of SVN repository for signed packages 100 # 101 # NOTE: Get empty copy because we do not want to have to check out package from 102 # previous signing. 103 # 104 echo "Checking out copy of repository for signed packages" 105 svn checkout \ 106 --trust-server-cert \ 107 --non-interactive \ 108 --depth empty \ 109 --username ${USERNAME} \ 110 --password ${PASSWORD} \ 111 ${SIGNED_REPO_URL} \ 112 ${SIGNED_REPO_COPY} > /dev/null 2>&1 113 fi 114 } 115 92 116 ## Parse options 93 117 # … … 167 191 # If lock file exists, a signing build is still in process by JPL Cybersecurity 168 192 svn up ${SIGNED_REPO_COPY}/${SIGNING_LOCK_FILE} > /dev/null 2>&1 169 if [ [ -f ${SIGNED_REPO_COPY}/${SIGNING_LOCK_FILE} ]]; then193 if [ -f ${SIGNED_REPO_COPY}/${SIGNING_LOCK_FILE} ]; then 170 194 echo "Previous signing job still in process by JPL Cybersecurity. Please try again later." 171 195 exit 1 … … 243 267 numTestsFailed=`cat matlab.log | grep -c -e "FAILED|ERROR"` 244 268 245 if [ [ ${numTestsFailed} -ne 0 ]]; then269 if [ ${numTestsFailed} -ne 0 ]; then 246 270 echo "One or more tests FAILED" 247 271 exit 1 … … 269 293 echo "Compressing package" 270 294 ditto -ck --sequesterRsrc --keepParent ${PKG} ${COMPRESSED_PKG} 295 else 296 # Assume that previous build was successful, but signing/notarization 297 # failed. 298 # 299 300 # Make sure copy of repository for signed packages exists 301 validate_signed_repo_copy 271 302 fi 272 303 … … 360 391 # that transfer to ISSM Web site failed and user built this project again 361 392 # with -t/--transferonly option. 393 # 394 395 # Make sure copy of repository for signed packages exists 396 validate_signed_repo_copy 397 362 398 SUCCESS=1 363 399 fi -
issm/trunk-jpl/packagers/mac/package-issm-mac-binaries-python.sh
r25873 r25874 88 88 # 89 89 export PATH="${ISSM_DIR}/bin:$(getconf PATH)" # Ensure that we pick up binaries from 'bin' directory rather than 'externalpackages' 90 91 ## Functions 92 # 93 validate_signed_repo_copy(){ 94 # Check out copy of repository for signed binaries if it does not exist 95 # (e.g. 'Check-out Strategy' was set to 'Use 'svn update' as much as 96 # possible'; initial checkout failed) 97 if [ ! -d ${SIGNED_REPO_COPY} && ! -d ${SIGNED_REPO_COPY}/.svn ]; then 98 # Check out copy of SVN repository for signed packages 99 # 100 # NOTE: Get empty copy because we do not want to have to check out package from 101 # previous signing. 102 # 103 echo "Checking out copy of repository for signed packages" 104 svn checkout \ 105 --trust-server-cert \ 106 --non-interactive \ 107 --depth empty \ 108 --username ${USERNAME} \ 109 --password ${PASSWORD} \ 110 ${SIGNED_REPO_URL} \ 111 ${SIGNED_REPO_COPY} > /dev/null 2>&1 112 fi 113 } 90 114 91 115 ## Parse options … … 160 184 # If lock file exists, a signing build is still in process by JPL Cybersecurity 161 185 svn up ${SIGNED_REPO_COPY}/${SIGNING_LOCK_FILE} > /dev/null 2>&1 162 if [ [ -f ${SIGNED_REPO_COPY}/${SIGNING_LOCK_FILE} ]]; then186 if [ -f ${SIGNED_REPO_COPY}/${SIGNING_LOCK_FILE} ]; then 163 187 echo "Previous signing job still in process by JPL Cybersecurity. Please try again later." 164 188 exit 1 … … 242 266 numTestsFailed=`cat python.log | grep -c -e "FAILED|ERROR"` 243 267 244 if [ [ ${numTestsFailed} -ne 0 ]]; then268 if [ ${numTestsFailed} -ne 0 ]; then 245 269 echo "One or more tests FAILED" 246 270 exit 1 … … 270 294 echo "Compressing package" 271 295 ditto -ck --sequesterRsrc --keepParent ${PKG} ${COMPRESSED_PKG} 296 else 297 # Assume that previous build was successful, but signing/notarization 298 # failed. 299 # 300 301 # Make sure copy of repository for signed packages exists 302 validate_signed_repo_copy 272 303 fi 273 304 … … 361 392 # that transfer to ISSM Web site failed and user built this project again 362 393 # with -t/--transferonly option. 394 # 395 396 # Make sure copy of repository for signed packages exists 397 validate_signed_repo_copy 398 363 399 SUCCESS=1 364 400 fi -
issm/trunk-jpl/packagers/mac/sign-issm-mac-binaries-matlab.sh
r25873 r25874 167 167 # Check if UUID exists in response 168 168 HAS_UUID=$(grep 'RequestUUID = ' ${NOTARIZATION_LOGFILE_PATH}/${NOTARIZATION_LOGFILE}) # NOTE: Checking for "RequestUUID = " because "RequestUUID" shows up in some error messages 169 if [ [ -z "${HAS_UUID}" ]]; then169 if [ -z "${HAS_UUID}" ]; then 170 170 echo "Notarization failed!" 171 171 echo "----------------------- Contents of notarization logfile -----------------------" … … 199 199 # First, check if there is an error 200 200 ERROR_CHECK=$(grep 'Error' ${NOTARIZATION_LOGFILE_PATH}/${NOTARIZATION_LOGFILE}) 201 if [ [ ! -z "${ERROR_CHECK}" ]]; then201 if [ ! -z "${ERROR_CHECK}" ]; then 202 202 break 203 203 fi -
issm/trunk-jpl/packagers/mac/sign-issm-mac-binaries-python.sh
r25873 r25874 176 176 # Check if UUID exists in response 177 177 HAS_UUID=$(grep 'RequestUUID = ' ${NOTARIZATION_LOGFILE_PATH}/${NOTARIZATION_LOGFILE}) # NOTE: Checking for "RequestUUID = " because "RequestUUID" shows up in some error messages 178 if [ [ -z "${HAS_UUID}" ]]; then178 if [ -z "${HAS_UUID}" ]; then 179 179 echo "Notarization failed!" 180 180 echo "----------------------- Contents of notarization logfile -----------------------" … … 208 208 # First, check if there is an error 209 209 ERROR_CHECK=$(grep 'Error' ${NOTARIZATION_LOGFILE_PATH}/${NOTARIZATION_LOGFILE}) 210 if [ [ ! -z "${ERROR_CHECK}" ]]; then210 if [ ! -z "${ERROR_CHECK}" ]; then 211 211 break 212 212 fi
Note:
See TracChangeset
for help on using the changeset viewer.