mirror of
https://github.com/mozilla/gecko-dev.git
synced 2024-11-05 08:35:26 +00:00
208 lines
8.6 KiB
Python
208 lines
8.6 KiB
Python
#!/usr/bin/env python
|
|
import os
|
|
import logging
|
|
import argparse
|
|
import json
|
|
import sys
|
|
import hashlib
|
|
import requests
|
|
import tempfile
|
|
from boto.s3.connection import S3Connection
|
|
from mardor.marfile import MarFile
|
|
|
|
sys.path.insert(0, os.path.join(
|
|
os.path.dirname(__file__), "/home/worker/tools/lib/python"))
|
|
|
|
from balrog.submitter.cli import NightlySubmitterV4, ReleaseSubmitterV4
|
|
from util.retry import retry, retriable
|
|
|
|
log = logging.getLogger(__name__)
|
|
|
|
|
|
def get_hash(content, hash_type="md5"):
|
|
h = hashlib.new(hash_type)
|
|
h.update(content)
|
|
return h.hexdigest()
|
|
|
|
|
|
@retriable()
|
|
def download(url, dest, mode=None):
|
|
log.debug("Downloading %s to %s", url, dest)
|
|
r = requests.get(url)
|
|
r.raise_for_status()
|
|
|
|
bytes_downloaded = 0
|
|
with open(dest, 'wb') as fd:
|
|
for chunk in r.iter_content(4096):
|
|
fd.write(chunk)
|
|
bytes_downloaded += len(chunk)
|
|
|
|
log.debug('Downloaded %s bytes', bytes_downloaded)
|
|
if 'content-length' in r.headers:
|
|
log.debug('Content-Length: %s bytes', r.headers['content-length'])
|
|
if bytes_downloaded != int(r.headers['content-length']):
|
|
raise IOError('Unexpected number of bytes downloaded')
|
|
|
|
if mode:
|
|
log.debug("chmod %o %s", mode, dest)
|
|
os.chmod(dest, mode)
|
|
|
|
|
|
def verify_signature(mar, signature):
|
|
log.info("Checking %s signature", mar)
|
|
m = MarFile(mar, signature_versions=[(1, signature)])
|
|
m.verify_signatures()
|
|
|
|
|
|
def verify_copy_to_s3(bucket_name, aws_access_key_id, aws_secret_access_key,
|
|
mar_url, mar_dest, signing_cert):
|
|
conn = S3Connection(aws_access_key_id, aws_secret_access_key)
|
|
bucket = conn.get_bucket(bucket_name)
|
|
_, dest = tempfile.mkstemp()
|
|
log.info("Downloading %s to %s...", mar_url, dest)
|
|
download(mar_url, dest)
|
|
log.info("Verifying the signature...")
|
|
if not os.getenv("MOZ_DISABLE_MAR_CERT_VERIFICATION"):
|
|
verify_signature(dest, signing_cert)
|
|
for name in possible_names(mar_dest, 10):
|
|
log.info("Checking if %s already exists", name)
|
|
key = bucket.get_key(name)
|
|
if not key:
|
|
log.info("Uploading to %s...", name)
|
|
key = bucket.new_key(name)
|
|
# There is a chance for race condition here. To avoid it we check
|
|
# the return value with replace=False. It should be not None.
|
|
length = key.set_contents_from_filename(dest, replace=False)
|
|
if length is None:
|
|
log.warn("Name race condition using %s, trying again...", name)
|
|
continue
|
|
else:
|
|
# key.make_public() may lead to race conditions, because
|
|
# it doesn't pass version_id, so it may not set permissions
|
|
bucket.set_canned_acl(acl_str='public-read', key_name=name,
|
|
version_id=key.version_id)
|
|
# Use explicit version_id to avoid using "latest" version
|
|
return key.generate_url(expires_in=0, query_auth=False,
|
|
version_id=key.version_id)
|
|
else:
|
|
if get_hash(key.get_contents_as_string()) == \
|
|
get_hash(open(dest).read()):
|
|
log.info("%s has the same MD5 checksum, not uploading...",
|
|
name)
|
|
return key.generate_url(expires_in=0, query_auth=False,
|
|
version_id=key.version_id)
|
|
log.info("%s already exists with different checksum, "
|
|
"trying another one...", name)
|
|
|
|
raise RuntimeError("Cannot generate a unique name for %s", mar_dest)
|
|
|
|
|
|
def possible_names(initial_name, amount):
|
|
"""Generate names appending counter before extension"""
|
|
prefix, ext = os.path.splitext(initial_name)
|
|
return [initial_name] + ["{}-{}{}".format(prefix, n, ext) for n in
|
|
range(1, amount + 1)]
|
|
|
|
|
|
def main():
|
|
parser = argparse.ArgumentParser()
|
|
parser.add_argument("--artifacts-url-prefix", required=True,
|
|
help="URL prefix for MAR")
|
|
parser.add_argument("--manifest", required=True)
|
|
parser.add_argument("-a", "--api-root", required=True,
|
|
help="Balrog API root")
|
|
parser.add_argument("-d", "--dummy", action="store_true",
|
|
help="Add '-dummy' suffix to branch name")
|
|
parser.add_argument("--signing-cert", required=True)
|
|
parser.add_argument("-v", "--verbose", action="store_const",
|
|
dest="loglevel", const=logging.DEBUG,
|
|
default=logging.INFO)
|
|
args = parser.parse_args()
|
|
logging.basicConfig(format="%(asctime)s - %(levelname)s - %(message)s",
|
|
level=args.loglevel)
|
|
logging.getLogger("requests").setLevel(logging.WARNING)
|
|
logging.getLogger("boto").setLevel(logging.WARNING)
|
|
|
|
balrog_username = os.environ.get("BALROG_USERNAME")
|
|
balrog_password = os.environ.get("BALROG_PASSWORD")
|
|
if not balrog_username and not balrog_password:
|
|
raise RuntimeError("BALROG_USERNAME and BALROG_PASSWORD environment "
|
|
"variables should be set")
|
|
|
|
s3_bucket = os.environ.get("S3_BUCKET")
|
|
aws_access_key_id = os.environ.get("AWS_ACCESS_KEY_ID")
|
|
aws_secret_access_key = os.environ.get("AWS_SECRET_ACCESS_KEY")
|
|
if not (s3_bucket and aws_access_key_id and aws_secret_access_key):
|
|
log.warn("Skipping S3 uploads...")
|
|
uploads_enabled = False
|
|
else:
|
|
uploads_enabled = True
|
|
|
|
manifest = json.load(open(args.manifest))
|
|
auth = (balrog_username, balrog_password)
|
|
|
|
for e in manifest:
|
|
complete_info = [{
|
|
"hash": e["to_hash"],
|
|
"size": e["to_size"],
|
|
}]
|
|
partial_info = [{
|
|
"hash": e["hash"],
|
|
"size": e["size"],
|
|
}]
|
|
|
|
if "previousVersion" in e and "previousBuildNumber" in e:
|
|
log.info("Release style balrog submission")
|
|
partial_info[0]["previousVersion"] = e["previousVersion"]
|
|
partial_info[0]["previousBuildNumber"] = e["previousBuildNumber"]
|
|
submitter = ReleaseSubmitterV4(api_root=args.api_root, auth=auth,
|
|
dummy=args.dummy)
|
|
retry(lambda: submitter.run(
|
|
platform=e["platform"], productName=e["appName"],
|
|
version=e["toVersion"],
|
|
build_number=e["toBuildNumber"],
|
|
appVersion=e["version"], extVersion=e["version"],
|
|
buildID=e["to_buildid"], locale=e["locale"],
|
|
hashFunction='sha512',
|
|
partialInfo=partial_info, completeInfo=complete_info,
|
|
))
|
|
elif "from_buildid" in e and uploads_enabled:
|
|
log.info("Nightly style balrog submission")
|
|
partial_mar_url = "{}/{}".format(args.artifacts_url_prefix,
|
|
e["mar"])
|
|
complete_mar_url = e["to_mar"]
|
|
dest_prefix = "{branch}/{buildid}".format(
|
|
branch=e["branch"], buildid=e["to_buildid"])
|
|
partial_mar_dest = "{}/{}".format(dest_prefix, e["mar"])
|
|
complete_mar_filename = "{appName}-{branch}-{version}-" \
|
|
"{platform}-{locale}.complete.mar"
|
|
complete_mar_filename = complete_mar_filename.format(
|
|
appName=e["appName"], branch=e["branch"],
|
|
version=e["version"], platform=e["platform"],
|
|
locale=e["locale"]
|
|
)
|
|
complete_mar_dest = "{}/{}".format(dest_prefix,
|
|
complete_mar_filename)
|
|
partial_info[0]["url"] = verify_copy_to_s3(
|
|
s3_bucket, aws_access_key_id, aws_secret_access_key,
|
|
partial_mar_url, partial_mar_dest, args.signing_cert)
|
|
complete_info[0]["url"] = verify_copy_to_s3(
|
|
s3_bucket, aws_access_key_id, aws_secret_access_key,
|
|
complete_mar_url, complete_mar_dest, args.signing_cert)
|
|
partial_info[0]["from_buildid"] = e["from_buildid"]
|
|
submitter = NightlySubmitterV4(api_root=args.api_root, auth=auth,
|
|
dummy=args.dummy)
|
|
retry(lambda: submitter.run(
|
|
platform=e["platform"], buildID=e["to_buildid"],
|
|
productName=e["appName"], branch=e["branch"],
|
|
appVersion=e["version"], locale=e["locale"],
|
|
hashFunction='sha512', extVersion=e["version"],
|
|
partialInfo=partial_info, completeInfo=complete_info),
|
|
attempts=30, sleeptime=10, max_sleeptime=60,
|
|
)
|
|
else:
|
|
raise RuntimeError("Cannot determine Balrog submission style")
|
|
|
|
if __name__ == '__main__':
|
|
main()
|