mirror of
https://github.com/nillerusr/source-engine.git
synced 2024-12-22 06:06:50 +00:00
616 lines
23 KiB
Python
616 lines
23 KiB
Python
#!/usr/bin/env python
|
|
|
|
#
|
|
# build "my current enlistment" remotely
|
|
# does a handful of steps:
|
|
# 1. makes sure the users has ssh key auth setup to the target host (as automatic as possible)
|
|
# 2. creates a p4 client on the remote host that's a mirror of their local client
|
|
# 3. sync's the remote client to the same (submitted) change as the local client
|
|
# 4. pickles up local changes, scp's them to the remote host, and applies them to the remote client
|
|
# 5. runs vpc and make, reporting status/errors to the user
|
|
#
|
|
|
|
import getopt
|
|
import getpass
|
|
import marshal
|
|
import os
|
|
import p4helpers
|
|
import stat
|
|
import sys
|
|
import subprocess
|
|
import tempfile
|
|
|
|
##### Don't merge this block to another branch, this section needs to be altered to match the requirements
|
|
##### of the p4 branch you are merging into!!
|
|
g_Branch = "//ValveGames/staging"
|
|
# branchspec needs the leading \t to make the p4 formatting happy when making a changelist
|
|
g_BranchSpec = "\t//ValveGames/staging/src/... //%s/src/..."
|
|
g_VPCCommand = { 'linux' : "dedicated /dedicated /f /tf /dod /cstrike /hl2mp" , 'osx' : "port /tf /dod /portal /hl2 /episodic /hl2mp /cstrike" }
|
|
#####
|
|
#### merge block ends
|
|
####
|
|
|
|
g_bVerbose = True
|
|
g_bDebugVerbose = False
|
|
g_bBatchMode = False
|
|
g_bSimulateOnly = False
|
|
|
|
g_lRemotePlatforms = [ 'linux', 'osx' ]
|
|
g_lBuildConfigs = [ 'debug', 'release' ]
|
|
|
|
g_szSSHBin = 'ssh'
|
|
g_szSCPBin = 'scp'
|
|
g_szVCodePickle = os.path.join( "src", "devtools", "vcodepickle.py" )
|
|
g_szMoreBin = 'less'
|
|
g_szSSHKeyDir = '.ssh'
|
|
g_szSSHAgentAddKeyCmd = 'ssh-add'
|
|
g_szCleanTarget = ''
|
|
|
|
if sys.platform == 'win32':
|
|
# relative to the top of the enlistment
|
|
g_szSSHBin = 'src\\devtools\\bin\\putty\\plink.exe'
|
|
g_szSCPBin = 'src\\devtools\\bin\\putty\\pscp.exe'
|
|
g_szMoreBin = '%WINDIR%\\notepad.exe'
|
|
g_szSSHKeyDir = 'ssh'
|
|
g_szSSHKeyConvertCmd = 'start /wait src\\devtools\\bin\\putty\\puttygen.exe'
|
|
g_szSSHAgentAddKeyCmd = 'src\\devtools\\bin\\putty\\pageant.exe'
|
|
|
|
g_mapPlatformToBuildHostInfo = { "linux" : { "hostname" : "linuxpiston.valvesoftware.com",
|
|
"sshkey" : { "win32" : { "regkey" : "Software\\SimonTatham\\Putty\\SshHostKeys",
|
|
"valueName" : "rsa2@22:linuxpiston.valvesoftware.com",
|
|
"value" : "0x23,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" },
|
|
"posix": "linuxpiston.valvesoftware.com ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAuaBcCG8rj9X/y1Jw9NRHniRiRZz2cW4pe88VrvJpbymsKGYfRbikJ+Hp4iTro6ls64j4If3fupUHIrzRvLRvyjoQZfXhcnDR3mBQkcx37oOay8uKwJ5sNtEPUX8pTpsDO8UvlpURz8IVeixxHejUpU746rRtau17OLDd86Nd0kErSKuRN4QV2aAcXQ/yQj6gWdjF04s0LBBsyGCYnGVgeIe1UtWZoBi67pjzgtA6czrQwmqR2TZt87Q7q3LqAwhWqFchN55xUh84KAqpqtNkVYEOOsHJ6lOoKakqksPW27fuB1YYwZMf8HV5jihObHhxWI5kq8lxnRWYGc+3KftRfQ==" } },
|
|
"osx" : { "hostname" : "macslave01.valvesoftware.com",
|
|
"sshkey" : { "win32" : { "regkey" : "Software\\SimonTatham\\Putty\\SshHostKeys",
|
|
"valueName" : "rsa2@22:macslave01.valvesoftware.com",
|
|
"value" : "0x23,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" },
|
|
"posix": "macslave01.valvesoftware.com ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAxQ7P5X/vMp9EKmUlZvyHNPz0L3wgvrJZPuVc4FxDKlBHiH7ijW8k88YMXW2vWC/NjQdPIN5GeJOthY/6aAnMWUJ83iyGU2v2yYgQ3DdLevzrSaabYH+ynOfqoodR/NeNRbWbQJ5mWADpGwmgYVsWEYv7/rtjjvY9m90jpmoc2kk+F9UptNn8+WqMc8lH6GoKQZNrI2x5ijViCvZa5QRZ9GAu8UNPBvWWz/qNvr+YXliDNeAKn2flLJfp2bDPQgoE6S9WwST0ML5Nxy5wEkS78AXTYdoEi56NPVbOXT/EWwg97SMVp2krzRq3wZfdWI/WlZk0QjcaptuGPxej0Pux+Q==" } } }
|
|
|
|
g_szFetchSSHPrivateKeyScriptlet = '''
|
|
export LANG="C";
|
|
KEYFILE=~/.ssh/id_rsa;
|
|
if [ -f ${KEYFILE} -a -f ${KEYFILE}.pub ]; then
|
|
echo "using existing ssh private/public key" >&2;
|
|
else
|
|
echo "generating ssh keypair" >&2;
|
|
mkdir -p ~/.ssh;
|
|
ssh-keygen -t rsa -b 1024 -f ${KEYFILE} -q -N "";
|
|
fi;
|
|
grep -q "`head -2 ${KEYFILE}.pub | tail -1`" ~/.ssh/authorized_keys;
|
|
if [ $? -ne 0 ]; then
|
|
echo "adding key to authorized keys file" >&2;
|
|
cat ${KEYFILE}.pub >> ~/.ssh/authorized_keys;
|
|
fi;
|
|
cat ${KEYFILE};
|
|
exit $?;'''
|
|
|
|
g_szCreateClientScriptletTemplate = '''
|
|
export LANG="C";
|
|
export P4CLIENT=%(P4CLIENT)s;
|
|
export P4PORT=perforce.valvesoftware.com:1666;
|
|
|
|
mkdir -p P4Clients/${P4CLIENT};
|
|
cd P4Clients/${P4CLIENT};
|
|
|
|
echo "creating p4 client ${P4CLIENT}" >&2;
|
|
p4 client -i << EOF
|
|
|
|
Client: ${P4CLIENT}
|
|
|
|
Owner: ${USER}
|
|
|
|
Root: ${PWD}
|
|
|
|
Options: noallwrite clobber nocompress unlocked nomodtime rmdir
|
|
|
|
SubmitOptions: revertunchanged
|
|
|
|
LineEnd: local
|
|
|
|
View:
|
|
%(VIEWSPEC)s
|
|
|
|
EOF
|
|
|
|
RET=$?;
|
|
if [ $RET -ne 0 ]; then
|
|
echo "client creation failed" >&2;
|
|
exit $RET;
|
|
fi;
|
|
'''
|
|
|
|
g_szRemoteP4ScriptletTemplate = '''
|
|
export LANG="C";
|
|
export P4CLIENT=%(P4CLIENT)s;
|
|
export P4PORT=perforce.valvesoftware.com:1666;
|
|
|
|
mkdir -p P4Clients/${P4CLIENT};
|
|
cd P4Clients/${P4CLIENT};
|
|
|
|
p4 %(P4COMMAND)s;
|
|
exit $?;
|
|
'''
|
|
|
|
g_szRemoteUnpickleScriptletTemplate = '''
|
|
export LANG="C";
|
|
export P4CLIENT=%(P4CLIENT)s;
|
|
export P4PORT=perforce.valvesoftware.com:1666;
|
|
|
|
mkdir -p P4Clients/${P4CLIENT};
|
|
cd P4Clients/${P4CLIENT};
|
|
|
|
/usr/bin/env python ./src/devtools/vcodepickle.py --restore --file %(PICKLEFILE)s;
|
|
exit $?;
|
|
'''
|
|
|
|
g_szRemoteBuildScriptletTemplate = '''
|
|
export LANG="C";
|
|
export P4CLIENT=%(P4CLIENT)s;
|
|
export P4PORT=perforce.valvesoftware.com:1666;
|
|
export BUILDLOG=remote_build.log
|
|
export CRITWARNLOG=critical_warnings.log
|
|
export SOLUTION=remote_build
|
|
|
|
mkdir -p P4Clients/${P4CLIENT};
|
|
cd P4Clients/${P4CLIENT}/src;
|
|
cp /dev/null ${BUILDLOG}
|
|
|
|
./devtools/bin/vpc /mksln ${SOLUTION} +%(VPCGROUP)s >> ${BUILDLOG} 2>> ${BUILDLOG};
|
|
|
|
echo -e "\n\n\n=================== Starting %(CONFIG)s Build ===================\n" >> ${BUILDLOG};
|
|
make -f ${SOLUTION}.mak CFG=%(CONFIG)s -k %(TARGET)s >> ${BUILDLOG} 2>> ${BUILDLOG};
|
|
BUILDFAIL=$?
|
|
|
|
# look for warnings we promote to errors - needs to be kept
|
|
# in sync with the buildbot rules
|
|
grep "call will abort" ${BUILDLOG} > ${CRITWARNLOG};
|
|
let "NOCRITICALWARNINGS=$?";
|
|
grep "is used uninitialized" ${BUILDLOG} >> ${CRITWARNLOG};
|
|
let "NOCRITICALWARNINGS=$NOCRITICALWARNINGS & $?";
|
|
|
|
RET=1;
|
|
if [ $BUILDFAIL -eq 0 -a $NOCRITICALWARNINGS -eq 1 ]; then
|
|
RET=0;
|
|
echo "BUILD SUCCESS";
|
|
else
|
|
echo "BUILD FAILED";
|
|
fi;
|
|
|
|
if [ $NOCRITICALWARNINGS -eq 0 ]; then
|
|
echo "!!! The following warnings will be promoted to errors !!!" >&2
|
|
echo >&2;
|
|
cat ${CRITWARNLOG} >&2
|
|
echo >&2
|
|
fi;
|
|
|
|
cat ${BUILDLOG} >&2
|
|
exit $RET
|
|
'''
|
|
|
|
g_szRemoteVsignTestTemplate = '''
|
|
export P4CLIENT=%(P4CLIENT)s;
|
|
cd P4Clients/${P4CLIENT}/src;
|
|
cp ./devtools/bin/vsign ./devtools/bin/vsign_test;
|
|
chmod +w ./devtools/bin/vsign_test
|
|
./devtools/bin/vsign -signvalve ./devtools/bin/vsign_test;
|
|
exit $?;
|
|
'''
|
|
|
|
g_szRemoteVsignSetPassphraseTemplate = '''
|
|
export P4CLIENT=%(P4CLIENT)s;
|
|
cd P4Clients/${P4CLIENT}/src;
|
|
mkdir -p ~/Library/Application\ Support/Steam;
|
|
./devtools/bin/vsign -set_passphrase CodeSignature %(PASSPHRASE)s;
|
|
exit $?;
|
|
'''
|
|
|
|
def usage():
|
|
global g_mapPlatformToBuildHostInfo
|
|
print "usage: ", sys.argv[0], " [options]"
|
|
print ""
|
|
print "-p,--platform= %s" % g_mapPlatformToBuildHostInfo.keys()
|
|
print "-c,--config= [ 'debug', 'release' ] (default builds both )"
|
|
print "-e,--exhaustive build all build configurations on all platforms"
|
|
print "--rebuild do a clean build"
|
|
print "-b,--batch supress user prompts"
|
|
print "-r,--root= if you have a strange p4 client spec (cough, JoeR, cough)"
|
|
print " specify the directory *containing* src"
|
|
print "output related options:"
|
|
print "-q,--quiet reduce spew"
|
|
print "-d,--debug debug level spew"
|
|
print "-s,--simulate dry-run"
|
|
|
|
def runLocalCommand( szCommand, bWait=True ):
|
|
global g_bSimulateOnly
|
|
global g_bDebugVerbose
|
|
|
|
if g_bDebugVerbose:
|
|
print ">>> runLocalCommand( %s )\n" % szCommand
|
|
if g_bSimulateOnly:
|
|
return( 0, None, None )
|
|
|
|
po = subprocess.Popen( szCommand, shell=True, stdout=subprocess.PIPE, stderr=subprocess.PIPE, stdin=sys.stdin )
|
|
if bWait:
|
|
( stdout, stderr ) = po.communicate()
|
|
if g_bDebugVerbose:
|
|
print stdout
|
|
print stderr
|
|
return ( po.returncode, stdout, stderr )
|
|
else:
|
|
return ( 0, "", "" )
|
|
|
|
def runRemoteCommand( szRemoteUser, szRemoteHost, szCommand, bPromptForPasswd = False, bCheckReturn = True ):
|
|
global g_bSimulateOnly
|
|
global g_bDebugVerbose
|
|
global g_bBatchMode
|
|
global g_szSSHBin
|
|
global g_mapPlatformToBuildHostInfo
|
|
szSSHCmd = g_szSSHBin
|
|
|
|
if bPromptForPasswd and g_bBatchMode:
|
|
raise RuntimeError( "can't prompt for password in batch mode" )
|
|
|
|
if sys.platform == 'win32':
|
|
szSSHCmd += " -agent -batch"
|
|
if bPromptForPasswd:
|
|
szPasswd = getpass.getpass( "password for %s@%s: " % (szRemoteUser, szRemoteHost) )
|
|
szSSHCmd += ' -pw "%s"' % szPasswd
|
|
|
|
cmd = '%s %s@%s' % ( szSSHCmd,
|
|
szRemoteUser,
|
|
szRemoteHost )
|
|
|
|
fd = fname = None
|
|
if sys.platform == 'win32':
|
|
# windows shell FTW
|
|
(fd, fname) = tempfile.mkstemp()
|
|
os.write( fd, szCommand )
|
|
os.close( fd )
|
|
cmd += " -m %s" % fname
|
|
if g_bDebugVerbose: print "tmpfile %s contains %s" % ( fname, szCommand )
|
|
else:
|
|
cmd += " '%s'" % szCommand
|
|
|
|
if g_bDebugVerbose:
|
|
print ">>> runRemoteCommand( %s )\n" % cmd
|
|
if g_bSimulateOnly:
|
|
return ( 0, "simulation mode", "" )
|
|
|
|
po = subprocess.Popen( cmd, shell=True, stdout=subprocess.PIPE, stderr=subprocess.PIPE, stdin=sys.stdin )
|
|
( stdout, stderr ) = po.communicate()
|
|
|
|
if fd is not None:
|
|
os.unlink( fname )
|
|
|
|
if po.returncode != 0 and bCheckReturn:
|
|
print "looks like something went wrong with a remote command"
|
|
print ">>> %s " % cmd
|
|
print "returned %d" % po.returncode
|
|
if sys.platform == 'win32':
|
|
print "tempfile contains %s" % szCommand
|
|
print "produced stdout:"
|
|
print stdout
|
|
print ""
|
|
print "produced stderr:"
|
|
print stderr
|
|
raise RuntimeError( "runRemoteCommand returned non-zero result" )
|
|
|
|
if g_bDebugVerbose: print "return: %d\nstdout: %s\nstderr: %s" % ( po.returncode, stdout, stderr )
|
|
|
|
return ( po.returncode, stdout, stderr )
|
|
|
|
def addHostKeyToKnownHostKeys( szPlatformName ):
|
|
global g_mapPlatformToBuildHostInfo
|
|
global g_bDebugVerbose
|
|
|
|
if sys.platform == 'win32':
|
|
mapRegKeyInfo = g_mapPlatformToBuildHostInfo[ szPlatformName ][ 'sshkey' ][ 'win32' ]
|
|
import _winreg
|
|
try:
|
|
knownHostsKey = _winreg.OpenKey( _winreg.HKEY_CURRENT_USER,
|
|
mapRegKeyInfo[ 'regkey' ],
|
|
sam = _winreg.KEY_SET_VALUE )
|
|
if g_bDebugVerbose: print "OpenKey %s succeeded" % mapRegKeyInfo[ 'regkey' ]
|
|
except:
|
|
knownHostsKey = _winreg.CreateKey( _winreg.HKEY_CURRENT_USER,
|
|
mapRegKeyInfo[ 'regkey' ] )
|
|
if g_bDebugVerbose: print "CreateKey %s succeeded" % mapRegKeyInfo[ 'regkey' ]
|
|
try:
|
|
value, type = _winreg.QueryValueEx( knownHostsKey, mapRegKeyInfo[ 'valueName' ] )
|
|
assert( type == _winreg.REG_SZ and value == mapRegKeyInfo[ 'value' ] )
|
|
if g_bDebugVerbose: print "QueryValueEx %s succeeded" % mapRegKeyInfo[ 'valueName' ]
|
|
except:
|
|
_winreg.SetValueEx( knownHostsKey,
|
|
mapRegKeyInfo[ 'valueName' ], False,
|
|
_winreg.REG_SZ, mapRegKeyInfo[ 'value' ] )
|
|
if g_bDebugVerbose: print "SetValueEx %s=%s succeeded" % ( mapRegKeyInfo[ 'valueName' ],
|
|
mapRegKeyInfo[ 'value' ] )
|
|
try:
|
|
_winreg.CloseKey( knownHostsKey )
|
|
if g_bDebugVerbose: print "CloseKey succeeded"
|
|
except:
|
|
pass
|
|
else:
|
|
assert( "implement addHostKeyToKnownKeys" )
|
|
|
|
|
|
def calculateRemoteView( mapClientInfo, szRemoteClientName, szBranchName ):
|
|
global g_BranchSpec
|
|
szRemoteView = g_BranchSpec % ( szRemoteClientName )
|
|
return szRemoteView
|
|
|
|
|
|
def main():
|
|
global g_bVerbose
|
|
global g_bDebugVerbose
|
|
global g_bSimulateOnly
|
|
global g_bBatchMode
|
|
global g_lRemotePlatforms
|
|
global g_lBuildConfigs
|
|
global g_szSSHKeyDir
|
|
global g_szSSHAddKeyCmd
|
|
global g_szCleanTarget
|
|
global g_szSSHKeyConvertCmd
|
|
global g_szVCodePickle
|
|
global g_szMoreBin
|
|
global g_szFetchSSHPrivateKeyScriptlet
|
|
global g_szCreateClientScriptletTemplate
|
|
global g_szRemoteP4ScriptletTemplate
|
|
global g_szRemoteBuildScriptletTemplate
|
|
global g_mapPlatformToBuildHostInfo
|
|
global g_VPCCommand
|
|
global g_Branch
|
|
|
|
bSetBuildConfigs = False
|
|
bSetBuildPlatform = False
|
|
szBranchName = ""
|
|
szUserName = getpass.getuser()
|
|
szP4ChangeToSync = "all"
|
|
|
|
clientInfo = p4helpers.GetClientInfo()
|
|
szLocalClientName = clientInfo[ 'Client' ]
|
|
szLocalClientRoot = clientInfo[ 'Root' ]
|
|
|
|
try:
|
|
opts, args = getopt.getopt( sys.argv[1:], "bdsvqp:c:r:e?l", [ "change=", "batch", "config=", "exhaustive", "debug", "simulate", "verbose", "quiet", "platform=", "root=", "rebuild", "limited-sync" ] )
|
|
except getopt.GetoptError, e:
|
|
print ""
|
|
print "Argument error: ", e
|
|
print ""
|
|
usage()
|
|
sys.exit(1)
|
|
for o, a in opts:
|
|
if o in ( "-?" ):
|
|
usage()
|
|
sys.exit(1)
|
|
if o in ( "-b", "--batch" ):
|
|
g_bBatchMode = True
|
|
if o in ( "--rebuild" ):
|
|
g_szCleanTarget = "clean"
|
|
if o in ( "-c", "--config" ):
|
|
if a not in [ 'debug', 'release' ]:
|
|
raise RuntimeError( "configuration '%s' not understood" % a )
|
|
g_lBuildConfigs = [ a ]
|
|
bSetBuildConfigs = True;
|
|
if o in ( "-r", "--root" ):
|
|
szLocalClientRoot = a
|
|
if o in ( "-e", "--exhaustive" ):
|
|
g_lRemotePlatforms = g_mapPlatformToBuildHostInfo.keys()
|
|
if o in ( "-p", "--platform" ):
|
|
if a not in g_mapPlatformToBuildHostInfo.keys():
|
|
raise RuntimeError( "platform '%s' not supported" % a )
|
|
g_lRemotePlatforms = [ a ]
|
|
bSetBuildPlatform = True
|
|
if o in ( "-v", "--verbose" ):
|
|
g_bVerbose = True
|
|
if o in ( "-q", "--quiet" ):
|
|
g_bVerbose = False
|
|
g_bDebugVerbose = False
|
|
if o in ( "-d", "--debug" ):
|
|
g_bDebugVerbose = True
|
|
if o in ( "-s", "--simulate" ):
|
|
g_bSimulateOnly = True
|
|
if o in ( "--change" ):
|
|
szP4ChangeToSync = a
|
|
|
|
if not os.getcwd().lower().startswith( clientInfo[ 'Root' ].lower() ):
|
|
print ""
|
|
print "I need to be run from the root (%s)" % szLocalClientRoot
|
|
print "or any subdirectory of your p4 client (%s)" % szLocalClientName
|
|
print ""
|
|
print "If these values look wrong, make sure you have p4 configured"
|
|
print "correctly for command-line use."
|
|
sys.exit(1)
|
|
|
|
try:
|
|
p4path = p4helpers.P4Where( os.path.join( szLocalClientRoot, "src\..." ) )
|
|
except:
|
|
try:
|
|
# try the cwd as the place src/ is to support "interesting" client specs
|
|
szLocalClientRoot = os.path.split( os.getcwd() )[0]
|
|
p4path = p4helpers.P4Where( os.path.join( szLocalClientRoot, "src\..." ) )
|
|
except:
|
|
print "couldn't find src where I expected it, perhaps you need the -r option?"
|
|
usage()
|
|
sys.exit(1)
|
|
|
|
# on source only build release by default
|
|
if ( bSetBuildConfigs == False ):
|
|
g_lBuildConfigs = ['release' ]
|
|
|
|
if not p4path.lower().startswith( g_Branch ):
|
|
raise RunTimeError( "couldn't map local enlistment to staging branch" )
|
|
|
|
# do everything relative to the client root directory
|
|
os.chdir( szLocalClientRoot )
|
|
|
|
if g_bVerbose: print "building configuration(s) %s on platform(s) %s" % ( g_lBuildConfigs, g_lRemotePlatforms )
|
|
|
|
szLocallySyncedRevision = p4helpers.GetSyncedRevision( szLocalClientRoot )
|
|
|
|
szPickleFile = 'vcodepickle_%s.zip' % szLocalClientName
|
|
if g_bVerbose: print "pickling local changes to %s..." % szPickleFile,
|
|
( ret, stdout, stderr ) = runLocalCommand( '%s --backup --file %s -c %s --exclude "*.exe" --exclude "*.dll" --exclude "*.pdb" --include "*/src/*"' % ( g_szVCodePickle, szPickleFile, szP4ChangeToSync ) )
|
|
if g_bVerbose: sys.stdout.flush(); print "done."
|
|
|
|
for platform in g_lRemotePlatforms:
|
|
if g_bVerbose: print "\nbuilding on platform %s\n" % ( platform )
|
|
szRemoteHost = g_mapPlatformToBuildHostInfo[ platform ][ 'hostname' ]
|
|
|
|
szRemoteClientName = "%s_%s_remote_build_%s" % ( szUserName, g_Branch.replace( "//", "" ).replace( "/", "_" ), szRemoteHost[ : szRemoteHost.find(".") ] )
|
|
|
|
# figure out where the private key for this host would be, if we were to have one
|
|
absKeyDirPath = os.path.join( os.path.expanduser("~"), g_szSSHKeyDir )
|
|
szSSHPrivKeyFile = os.path.join( absKeyDirPath, 'id_rsa_%s@%s' % ( szUserName, szRemoteHost ) )
|
|
if sys.platform == 'win32':
|
|
szSSHPrivKeyFile += '.ppk'
|
|
|
|
if g_bDebugVerbose: print "adding remote host key for %s to known keys..." % platform
|
|
addHostKeyToKnownHostKeys( platform )
|
|
|
|
# if we don't have a key for this host, run the scriptlet to create one
|
|
if not os.path.exists( szSSHPrivKeyFile ):
|
|
if not os.path.exists( absKeyDirPath ):
|
|
os.makedirs( absKeyDirPath )
|
|
|
|
if g_bVerbose: print "creating ssh public/private keypair..."
|
|
( ret, stdout, stderr ) = runRemoteCommand( szUserName, szRemoteHost, g_szFetchSSHPrivateKeyScriptlet, bPromptForPasswd = True )
|
|
|
|
if not g_bSimulateOnly:
|
|
assert( len( stdout ) )
|
|
assert( not g_bBatchMode )
|
|
f = open( szSSHPrivKeyFile, "w" )
|
|
f.write( stdout )
|
|
f.close()
|
|
|
|
if sys.platform == 'win32':
|
|
os.rename( szSSHPrivKeyFile, szSSHPrivKeyFile + ".tmp" )
|
|
# let's assume we need to convert their key into putty format
|
|
print ""
|
|
print " !!!!! ACHTUNG !!!!!"
|
|
print ""
|
|
print "your private key doesn't seem to be in putty format (yet)."
|
|
print ""
|
|
print "I'm going to launch puttygen, which should present a dialog"
|
|
print "saying it's successfully imported the key, and that you need"
|
|
print "to save it in putty format before use."
|
|
print ""
|
|
print "1. click OK to dismiss this dialog"
|
|
print "2. Choose File->Save Private Key"
|
|
print "3. Confirm saving the key without a passphrase"
|
|
print "4. paste this path into the save dialog:"
|
|
print " %s" % szSSHPrivKeyFile.replace( "/", "\\" )
|
|
print "5. quit puttygen"
|
|
print ""
|
|
raw_input( "Press return to continue: " )
|
|
runLocalCommand( "%s %s" % ( g_szSSHKeyConvertCmd, szSSHPrivKeyFile + ".tmp" ) )
|
|
os.remove( szSSHPrivKeyFile + ".tmp" )
|
|
else:
|
|
# on posix, ssh wants the keyfile to be tightly controlled
|
|
os.chmod( szSSHPrivKeyFile, stat.S_IRUSR | stat.S_IWUSR )
|
|
|
|
# try loading the ssh key into their agent
|
|
if g_bDebugVerbose: print "adding private key to ssh authentication agent..."
|
|
( ret, stdout, stderr ) = runLocalCommand( "%s %s" % ( g_szSSHAgentAddKeyCmd, szSSHPrivKeyFile ), bWait = False )
|
|
|
|
# figure out what the remote view should look like
|
|
if g_bDebugVerbose: print "calculating remote view..."
|
|
szRemoteView = calculateRemoteView( clientInfo, szRemoteClientName, szBranchName )
|
|
if g_bDebugVerbose: print "remote view: %s" % szRemoteView
|
|
|
|
# do the magic substituion on the client create scriptlet
|
|
if g_bVerbose: print "syncing remote p4 client spec...",
|
|
szClientCreateScriptlet = g_szCreateClientScriptletTemplate % { "P4CLIENT" : szRemoteClientName,
|
|
"VIEWSPEC" : szRemoteView,
|
|
"REVISION" : szLocallySyncedRevision }
|
|
( ret, stdout, stderr ) = runRemoteCommand( szUserName, szRemoteHost, szClientCreateScriptlet )
|
|
if g_bVerbose: sys.stdout.flush(); print "done."
|
|
|
|
if platform == "osx":
|
|
if g_bVerbose: print "checking if vsign is set up...",
|
|
szRemoteCheckVsignScriptlet = g_szRemoteVsignTestTemplate % { "P4CLIENT" : szRemoteClientName }
|
|
( ret, stdout, stderr ) = runRemoteCommand( szUserName, szRemoteHost, szRemoteCheckVsignScriptlet, False, False )
|
|
if g_bVerbose: sys.stdout.flush(); print "done."
|
|
|
|
if( ret != 0 ):
|
|
passphrase = raw_input("Please enter code signature passphrase for public universe: ")
|
|
if g_bVerbose: print "setting vsign passphrase...",
|
|
szremoteSetVsignPassphraseScriptlet = g_szRemoteVsignSetPassphraseTemplate % { "P4CLIENT" : szRemoteClientName,
|
|
"PASSPHRASE": passphrase}
|
|
( ret, stdout, stderr ) = runRemoteCommand( szUserName, szRemoteHost, szremoteSetVsignPassphraseScriptlet, False, False )
|
|
if g_bVerbose: sys.stdout.flush(); print "done."
|
|
|
|
if g_bVerbose: print "reverting any open files on remote p4client...",
|
|
szClientSyncScriptlet = g_szRemoteP4ScriptletTemplate % { "P4CLIENT" : szRemoteClientName,
|
|
"P4COMMAND": 'revert ...' }
|
|
( ret, stdout, stderr ) = runRemoteCommand( szUserName, szRemoteHost, szClientSyncScriptlet )
|
|
if g_bVerbose: sys.stdout.flush(); print "done."
|
|
|
|
if g_bVerbose: print "syncing remote p4client to changelist %s (this could take a while)..." % szLocallySyncedRevision,
|
|
szClientSyncScriptlet = g_szRemoteP4ScriptletTemplate % { "P4CLIENT" : szRemoteClientName,
|
|
"P4COMMAND": 'sync @%s' % szLocallySyncedRevision }
|
|
( ret, stdout, stderr ) = runRemoteCommand( szUserName, szRemoteHost, szClientSyncScriptlet )
|
|
if g_bVerbose: sys.stdout.flush(); print "done."
|
|
|
|
if g_bVerbose: print "transferring pickled changes...",
|
|
( ret, stdout, stderr ) = runLocalCommand( "%s %s %s@%s:P4Clients/%s/" % ( g_szSCPBin, szPickleFile, szUserName, szRemoteHost, szRemoteClientName ) )
|
|
if g_bVerbose: sys.stdout.flush(); print "done."
|
|
|
|
if g_bVerbose: print "applying changes to remote client...",
|
|
szUnpickleScriptlet = g_szRemoteUnpickleScriptletTemplate % { "P4CLIENT" : szRemoteClientName,
|
|
"PICKLEFILE": szPickleFile }
|
|
( ret, stdout, stderr ) = runRemoteCommand( szUserName, szRemoteHost, szUnpickleScriptlet )
|
|
if g_bVerbose: sys.stdout.flush(); print "done."
|
|
|
|
for buildConfig in g_lBuildConfigs:
|
|
if g_bVerbose: print "running remote %s build..." % buildConfig,
|
|
szBuildScriptlet = g_szRemoteBuildScriptletTemplate % { "P4CLIENT" : szRemoteClientName,
|
|
"VPCGROUP" : g_VPCCommand[ platform ],
|
|
"CONFIG" : buildConfig,
|
|
"TARGET" : "%s all" % g_szCleanTarget }
|
|
( ret, stdout, stderr ) = runRemoteCommand( szUserName, szRemoteHost, szBuildScriptlet, bCheckReturn = False )
|
|
if g_bVerbose: sys.stdout.flush(); print "done."
|
|
|
|
if len(stderr):
|
|
# figure out the correct newline character - can't we all just get along?
|
|
NL = "\n"
|
|
if sys.platform == "win32":
|
|
NL = "\r\n"
|
|
|
|
# look for a couple common cases
|
|
errlines = stderr.split( "\n" )
|
|
|
|
(fd, name) = tempfile.mkstemp( suffix=".txt" )
|
|
os.write( fd, NL.join( errlines ) )
|
|
os.close( fd )
|
|
print "build output in file://%s" % name
|
|
|
|
bFoundErrors = False
|
|
for errline in errlines:
|
|
if errline.lower().find( "error:" ) >= 0:
|
|
bFoundErrors = True
|
|
print " " + errline
|
|
|
|
if ret !=0 and not bFoundErrors:
|
|
iLines = 5
|
|
print "first %d lines of build log:" % iLines
|
|
print NL.join( errlines[ :iLines ] )
|
|
if len(errlines) > iLines:
|
|
print "..."
|
|
|
|
if ret != 0:
|
|
if not g_bBatchMode:
|
|
resp = raw_input( "display full build log (Y/N)? " )
|
|
if resp.lower() == "y":
|
|
cmd = "%s %s" % ( g_szMoreBin, name )
|
|
runLocalCommand( cmd )
|
|
|
|
print stdout
|
|
|
|
if ret != 0:
|
|
break;
|
|
|
|
if __name__ == '__main__':
|
|
main()
|
|
|