dev-tools/scripts/smokeTestRelease.py (944 lines of code) (raw):

#!/usr/bin/env python3 # -*- coding: utf-8 -*- # Licensed to the Apache Software Foundation (ASF) under one or more # contributor license agreements. See the NOTICE file distributed with # this work for additional information regarding copyright ownership. # The ASF licenses this file to You under the Apache License, Version 2.0 # (the "License"); you may not use this file except in compliance with # the License. You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. import argparse import codecs import datetime import filecmp import hashlib import http.client import os import platform import re import shutil import subprocess import sys import textwrap import traceback import urllib.error import urllib.parse import urllib.request import xml.etree.ElementTree as ET import zipfile from collections import namedtuple import scriptutil # This tool expects to find /solr off the base URL. You # must have a working gpg, tar in your path. This has been # tested on Linux and on Cygwin under Windows 7. BASE_JAVA_VERSION = "21" SOLRJ_JAVA_VERSION = "17" cygwin = platform.system().lower().startswith('cygwin') cygwinWindowsRoot = os.popen('cygpath -w /').read().strip().replace('\\','/') if cygwin else '' def unshortenURL(url): parsed = urllib.parse.urlparse(url) if parsed[0] in ('http', 'https'): h = http.client.HTTPConnection(parsed.netloc) h.request('HEAD', parsed.path) response = h.getresponse() if int(response.status/100) == 3 and response.getheader('Location'): return response.getheader('Location') return url # TODO # - make sure jars exist inside bin release # - make sure docs exist reHREF = re.compile('<a href="(.*?)">(.*?)</a>') # Set to False to avoid re-downloading the packages... FORCE_CLEAN = True def getHREFs(urlString): # Deref any redirects while True: url = urllib.parse.urlparse(urlString) if url.scheme == "http": h = http.client.HTTPConnection(url.netloc) elif url.scheme == "https": h = http.client.HTTPSConnection(url.netloc) else: raise RuntimeError("Unknown protocol: %s" % url.scheme) h.request('HEAD', url.path) r = h.getresponse() newLoc = r.getheader('location') if newLoc is not None: urlString = newLoc else: break links = [] try: html = load(urlString) except: print('\nFAILED to open url %s' % urlString) traceback.print_exc() raise for subUrl, text in reHREF.findall(html): #print("Got suburl %s and text %s" % (subUrl, text)) fullURL = urllib.parse.urljoin(urlString, subUrl) links.append((text, fullURL)) return links def load(urlString): try: raw_request = urllib.request.Request(urlString) raw_request.add_header('User-Agent', 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:78.0) Gecko/20100101 Firefox/78.0') raw_request.add_header('Accept', 'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8') content = urllib.request.urlopen(raw_request).read().decode('utf-8') except Exception as e: print('Retrying download of url %s after exception: %s' % (urlString, e)) content = urllib.request.urlopen(urlString).read().decode('utf-8') return content def noJavaPackageClasses(desc, file): with zipfile.ZipFile(file) as z2: for name2 in z2.namelist(): if name2.endswith('.class') and (name2.startswith('java/') or name2.startswith('javax/')): raise RuntimeError('%s contains java or javax class "%s"' % (desc, name2)) def decodeUTF8(bytes): return codecs.getdecoder('UTF-8')(bytes)[0] MANIFEST_FILE_NAME = 'META-INF/MANIFEST.MF' NOTICE_FILE_NAME = 'META-INF/NOTICE.txt' LICENSE_FILE_NAME = 'META-INF/LICENSE.txt' def checkJARMetaData(desc, jarFile, gitRevision, version): with zipfile.ZipFile(jarFile, 'r') as z: for name in (MANIFEST_FILE_NAME, NOTICE_FILE_NAME, LICENSE_FILE_NAME): try: # The Python docs state a KeyError is raised ... so this None # check is just defensive: if z.getinfo(name) is None: raise RuntimeError('%s is missing %s' % (desc, name)) except KeyError: raise RuntimeError('%s is missing %s' % (desc, name)) s = decodeUTF8(z.read(MANIFEST_FILE_NAME)) compileJDK = BASE_JAVA_VERSION if 'solrj' in desc or 'api' in desc: compileJDK = SOLRJ_JAVA_VERSION for verify in ( 'Specification-Vendor: The Apache Software Foundation', 'Implementation-Vendor: The Apache Software Foundation', 'Specification-Title: Apache Solr Search Server:', 'Implementation-Title: org.apache.solr', 'X-Compile-Source-JDK: %s' % compileJDK, 'X-Compile-Target-JDK: %s' % compileJDK, 'Specification-Version: %s' % version, 'X-Build-JDK: %s.' % BASE_JAVA_VERSION, 'Extension-Name: org.apache.solr'): if type(verify) is not tuple: verify = (verify,) for x in verify: if s.find(x) != -1: break else: if len(verify) == 1: raise RuntimeError('%s is missing "%s" inside its META-INF/MANIFEST.MF' % (desc, verify[0])) else: raise RuntimeError('%s is missing one of "%s" inside its META-INF/MANIFEST.MF' % (desc, verify)) if gitRevision != 'skip': # Make sure this matches the version and git revision we think we are releasing: match = re.search("Implementation-Version: (.+\r\n .+)", s, re.MULTILINE) if match: implLine = match.group(1).replace("\r\n ", "") verifyRevision = '%s %s' % (version, gitRevision) if implLine.find(verifyRevision) == -1: raise RuntimeError('%s is missing "%s" inside its META-INF/MANIFEST.MF (wrong git revision?)' % \ (desc, verifyRevision)) else: raise RuntimeError('%s is missing Implementation-Version inside its META-INF/MANIFEST.MF' % desc) notice = decodeUTF8(z.read(NOTICE_FILE_NAME)) license = decodeUTF8(z.read(LICENSE_FILE_NAME)) if SOLR_LICENSE is None or SOLR_NOTICE is None: raise RuntimeError('BUG in smokeTestRelease!') if notice != SOLR_NOTICE: raise RuntimeError('%s: %s contents doesn\'t match main NOTICE.txt' % \ (desc, NOTICE_FILE_NAME)) if license != SOLR_LICENSE: raise RuntimeError('%s: %s contents doesn\'t match main LICENSE.txt' % \ (desc, LICENSE_FILE_NAME)) def normSlashes(path): return path.replace(os.sep, '/') def checkAllJARs(topDir, gitRevision, version): print(' verify JAR metadata/identity/no javax.* or java.* classes...') for root, dirs, files in os.walk(topDir): # pylint: disable=unused-variable normRoot = normSlashes(root) if normRoot.endswith('/server/lib'): # Solr's example intentionally ships servlet JAR: continue for file in files: if file.lower().endswith('.jar'): if ((normRoot.endswith('/modules/extraction/lib') and (file.startswith('jakarta.activation-') or file.startswith('jakarta.xml'))) or (normRoot.endswith('/modules/extraction/lib') and file.startswith('unit-api-')) or (normRoot.endswith('/server/solr-webapp/webapp/WEB-INF/lib') and file.startswith('jakarta.')) or (normRoot.endswith('/server/lib/ext') and file.startswith('jetty-servlet-api-'))): print(' **WARNING**: skipping check of %s/%s: it has javax.* classes' % (root, file)) continue fullPath = '%s/%s' % (root, file) noJavaPackageClasses('JAR file "%s"' % fullPath, fullPath) if file.lower().find('solr') != -1: checkJARMetaData('JAR file "%s"' % fullPath, fullPath, gitRevision, version) def checkSigs(urlString, version, tmpDir, isSigned, keysFile): print(' test basics...') ents = getDirEntries(urlString) artifact = None changesURL = None openApiURL = None mavenURL = None dockerURL = None artifactURL = None expectedSigs = [] if isSigned: expectedSigs.append('asc') expectedSigs.extend(['sha512']) sigs = [] artifacts = [] for text, subURL in ents: if text == '.gitrev': continue # Allow this in the distribution build directory if text == 'KEYS': raise RuntimeError('solr: release dir should not contain a KEYS file - only toplevel /dist/solr/KEYS is used') elif text == 'maven/': mavenURL = subURL elif text == 'docker/': dockerURL = subURL elif text.startswith('changes'): if text not in ('changes/', 'changes-%s/' % version): raise RuntimeError('solr: found %s vs expected changes-%s/' % (text, version)) changesURL = subURL elif text.startswith('openApi'): if text not in ('openApi/', 'openApi-%s/' % version): raise RuntimeError('solr: found %s vs expected openApi-%s/' % (text, version)) openApiURL = subURL elif artifact is None: artifact = text artifactURL = subURL expected = 'solr-%s' % version if not artifact.startswith(expected): raise RuntimeError('solr: unknown artifact %s: expected prefix %s' % (text, expected)) sigs = [] elif text.startswith(artifact + '.'): sigs.append(subURL.rsplit(".")[-1:][0]) else: if sigs != expectedSigs: raise RuntimeError('solr: artifact %s has wrong sigs: expected %s but got %s' % (artifact, expectedSigs, sigs)) artifacts.append((artifact, artifactURL)) artifact = text artifactURL = subURL sigs = [] if sigs != []: artifacts.append((artifact, artifactURL)) if sigs != expectedSigs: raise RuntimeError('solr: artifact %s has wrong sigs: expected %s but got %s' % (artifact, expectedSigs, sigs)) expected = ['solr-%s-src.tgz' % version, 'solr-%s.tgz' % version, 'solr-%s-slim.tgz' % version] actual = [x[0] for x in artifacts] expected.sort() actual.sort() if expected != actual: raise RuntimeError('solr: wrong artifacts: expected %s but got %s' % (expected, actual)) # Set up clean gpg world; import keys file: gpgHomeDir = '%s/solr.gpg' % tmpDir if os.path.exists(gpgHomeDir): shutil.rmtree(gpgHomeDir) os.makedirs(gpgHomeDir, 0o700) gpgLogFile = '%s/solr.gpg.import.log' % tmpDir run('gpg --homedir %s --import %s' % (gpgHomeDir, keysFile), gpgLogFile) logfile = '%s/solr.assertions.log' % tmpDir if mavenURL is None: stopGpgAgent(gpgHomeDir, logfile) raise RuntimeError('solr is missing maven') if dockerURL is None: stopGpgAgent(gpgHomeDir, logfile) raise RuntimeError('solr is missing docker') if changesURL is None: stopGpgAgent(gpgHomeDir, logfile) raise RuntimeError('solr is missing changes-%s' % version) testChanges(version, changesURL) if openApiURL is None: stopGpgAgent(gpgHomeDir, logfile) raise RuntimeError('solr is missing OpenAPI specification' % version) testOpenApi(version, openApiURL) for artifact, urlString in artifacts: # pylint: disable=redefined-argument-from-local print(' download %s...' % artifact) scriptutil.download(artifact, urlString, tmpDir, force_clean=FORCE_CLEAN) verifyDigests(artifact, urlString, tmpDir) if isSigned: print(' verify sig') # Test sig (this is done with a clean brand-new GPG world) scriptutil.download(artifact + '.asc', urlString + '.asc', tmpDir, force_clean=FORCE_CLEAN) sigFile = '%s/%s.asc' % (tmpDir, artifact) artifactFile = '%s/%s' % (tmpDir, artifact) logFile = '%s/solr.%s.gpg.verify.log' % (tmpDir, artifact) run('gpg --homedir %s --display-charset utf-8 --verify %s %s' % (gpgHomeDir, sigFile, artifactFile), logFile) # Forward any GPG warnings, except the expected one (since it's a clean world) with open(logFile) as f: print("File: %s" % logFile) for line in f.readlines(): if line.lower().find('warning') != -1 \ and line.find('WARNING: This key is not certified with a trusted signature') == -1: print(' GPG: %s' % line.strip()) # Test trust (this is done with the real users config) run('gpg --import %s' % (keysFile), '%s/solr.gpg.trust.import.log' % tmpDir) print(' verify trust') logFile = '%s/solr.%s.gpg.trust.log' % (tmpDir, artifact) run('gpg --display-charset utf-8 --verify %s %s' % (sigFile, artifactFile), logFile) # Forward any GPG warnings: with open(logFile) as f: for line in f.readlines(): if line.lower().find('warning') != -1: print(' GPG: %s' % line.strip()) # Make sure to shutdown the GPG agent at the end stopGpgAgent(gpgHomeDir, logFile) def stopGpgAgent(gpgHomeDir, logFile): run('gpgconf --homedir %s --kill gpg-agent' % (gpgHomeDir), logFile) def testChanges(version, changesURLString): print(' check changes HTML...') changesURL = None for text, subURL in getDirEntries(changesURLString): if text == 'Changes.html': changesURL = subURL if changesURL is None: raise RuntimeError('did not see Changes.html link from %s' % changesURLString) s = load(changesURL) checkChangesContent(s, version, changesURL, True) def testOpenApi(version, openApiDirUrl): print(' check OpenAPI specification...') specFound = False expectedSpecFileName = 'solr-openapi-' + version + '.json' for text, subURL in getDirEntries(openApiDirUrl): if text == expectedSpecFileName: specFound = True if not specFound: raise RuntimeError('Did not see %s in %s' % expectedSpecFileName, openApiDirUrl) def testChangesText(dir, version): "Checks all CHANGES.txt under this dir." for root, dirs, files in os.walk(dir): # pylint: disable=unused-variable # NOTE: O(N) but N should be smallish: if 'CHANGES.txt' in files: fullPath = '%s/CHANGES.txt' % root #print 'CHECK %s' % fullPath checkChangesContent(open(fullPath, encoding='UTF-8').read(), version, fullPath, False) reChangesSectionHREF = re.compile('<a id="(.*?)".*?>(.*?)</a>', re.IGNORECASE) reUnderbarNotDashHTML = re.compile(r'<li>(\s*(SOLR)_\d\d\d\d+)') reUnderbarNotDashTXT = re.compile(r'\s+((SOLR)_\d\d\d\d+)', re.MULTILINE) def checkChangesContent(s, version, name, isHTML): currentVersionTuple = versionToTuple(version, name) if isHTML and s.find('Release %s' % version) == -1: raise RuntimeError('did not see "Release %s" in %s' % (version, name)) if isHTML: r = reUnderbarNotDashHTML else: r = reUnderbarNotDashTXT m = r.search(s) if m is not None: raise RuntimeError('incorrect issue (_ instead of -) in %s: %s' % (name, m.group(1))) if s.lower().find('not yet released') != -1: raise RuntimeError('saw "not yet released" in %s' % name) if not isHTML: sub = version if s.find(sub) == -1: # benchmark never seems to include release info: if name.find('/benchmark/') == -1: raise RuntimeError('did not see "%s" in %s' % (sub, name)) if isHTML: # Make sure that a section only appears once under each release, # and that each release is not greater than the current version seenIDs = set() seenText = set() release = None for id, text in reChangesSectionHREF.findall(s): if text.lower().startswith('release '): release = text[8:].strip() seenText.clear() releaseTuple = versionToTuple(release, name) if releaseTuple > currentVersionTuple: raise RuntimeError('Future release %s is greater than %s in %s' % (release, version, name)) if id in seenIDs: raise RuntimeError('%s has duplicate section "%s" under release "%s"' % (name, text, release)) seenIDs.add(id) if text in seenText: raise RuntimeError('%s has duplicate section "%s" under release "%s"' % (name, text, release)) seenText.add(text) reVersion = re.compile(r'(\d+)\.(\d+)(?:\.(\d+))?\s*(-alpha|-beta|final|RC\d+)?\s*(?:\[.*\])?', re.IGNORECASE) def versionToTuple(version, name): versionMatch = reVersion.match(version) if versionMatch is None: raise RuntimeError('Version %s in %s cannot be parsed' % (version, name)) versionTuple = versionMatch.groups() while versionTuple[-1] is None or versionTuple[-1] == '': versionTuple = versionTuple[:-1] if versionTuple[-1].lower() == '-alpha': versionTuple = versionTuple[:-1] + ('0',) elif versionTuple[-1].lower() == '-beta': versionTuple = versionTuple[:-1] + ('1',) elif versionTuple[-1].lower() == 'final': versionTuple = versionTuple[:-2] + ('100',) elif versionTuple[-1].lower()[:2] == 'rc': versionTuple = versionTuple[:-2] + (versionTuple[-1][2:],) return tuple(int(x) if x is not None and x.isnumeric() else x for x in versionTuple) reUnixPath = re.compile(r'\b[a-zA-Z_]+=(?:"(?:\\"|[^"])*"' + '|(?:\\\\.|[^"\'\\s])*' + r"|'(?:\\'|[^'])*')" \ + r'|(/(?:\\.|[^"\'\s])*)' \ + r'|("/(?:\\.|[^"])*")' \ + r"|('/(?:\\.|[^'])*')") def unix2win(matchobj): if matchobj.group(1) is not None: return cygwinWindowsRoot + matchobj.group() if matchobj.group(2) is not None: return '"%s%s' % (cygwinWindowsRoot, matchobj.group().lstrip('"')) if matchobj.group(3) is not None: return "'%s%s" % (cygwinWindowsRoot, matchobj.group().lstrip("'")) return matchobj.group() def cygwinifyPaths(command): # The problem: Native Windows applications running under Cygwin can't # handle Cygwin's Unix-style paths. However, environment variable # values are automatically converted, so only paths outside of # environment variable values should be converted to Windows paths. # Assumption: all paths will be absolute. if '; gradlew ' in command: command = reUnixPath.sub(unix2win, command) return command def printFileContents(fileName): # Assume log file was written in system's default encoding, but # even if we are wrong, we replace errors ... the ASCII chars # (which is what we mostly care about eg for the test seed) should # still survive: txt = codecs.open(fileName, 'r', encoding=sys.getdefaultencoding(), errors='replace').read() # Encode to our output encoding (likely also system's default # encoding): bytes = txt.encode(sys.stdout.encoding, errors='replace') # Decode back to string and print... we should hit no exception here # since all errors have been replaced: print(codecs.getdecoder(sys.stdout.encoding)(bytes)[0]) print() def run(command, logFile): if cygwin: command = cygwinifyPaths(command) if os.system('%s > %s 2>&1' % (command, logFile)): logPath = os.path.abspath(logFile) print('\ncommand "%s" failed:' % command) printFileContents(logFile) raise RuntimeError('command "%s" failed; see log file %s' % (command, logPath)) def verifyDigests(artifact, urlString, tmpDir): print(' verify sha512 digest') sha512Expected, t = load(urlString + '.sha512').strip().split() if t != '*'+artifact: raise RuntimeError('SHA512 %s.sha512 lists artifact %s but expected *%s' % (urlString, t, artifact)) s512 = hashlib.sha512() f = open('%s/%s' % (tmpDir, artifact), 'rb') while True: x = f.read(65536) if len(x) == 0: break s512.update(x) f.close() sha512Actual = s512.hexdigest() if sha512Actual != sha512Expected: raise RuntimeError('SHA512 digest mismatch for %s: expected %s but got %s' % (artifact, sha512Expected, sha512Actual)) def getDirEntries(urlString): if urlString.startswith('file:/') and not urlString.startswith('file://'): # stupid bogus ant URI urlString = "file:///" + urlString[6:] if urlString.startswith('file://'): path = urlString[7:] if path.endswith('/'): path = path[:-1] if cygwin: # Convert Windows path to Cygwin path path = re.sub(r'^/([A-Za-z]):/', r'/cygdrive/\1/', path) l = [] for ent in os.listdir(path): entPath = '%s/%s' % (path, ent) if os.path.isdir(entPath): entPath += '/' ent += '/' l.append((ent, 'file://%s' % entPath)) l.sort() return l else: links = getHREFs(urlString) for i, (text, subURL) in enumerate(links): # pylint: disable=unused-variable if text == 'Parent Directory' or text == '..': return links[(i+1):] return None def unpackAndVerify(java, tmpDir, artifact, gitRevision, version, testArgs): destDir = '%s/unpack' % tmpDir if os.path.exists(destDir): shutil.rmtree(destDir) os.makedirs(destDir) os.chdir(destDir) print(' unpack %s...' % artifact) unpackLogFile = '%s/solr-unpack-%s.log' % (tmpDir, artifact) expected = artifact if artifact.endswith('.tar.gz') or artifact.endswith('.tgz'): expected = artifact[:artifact.find('.t')] expected = expected.replace("-src", "") # Remove when the src tgz subdirectory has "-src" appended run('tar xzf %s/%s' % (tmpDir, artifact), unpackLogFile) # make sure it unpacks to proper subdir l = os.listdir(destDir) if l != [expected]: raise RuntimeError('unpack produced entries %s; expected only %s' % (l, expected)) unpackPath = '%s/%s' % (destDir, expected) verifyUnpacked(java, artifact, unpackPath, gitRevision, version, testArgs) return unpackPath SOLR_NOTICE = None SOLR_LICENSE = None def is_in_list(in_folder, files, indent=4): for file_name in files: print("%sChecking %s" % (" "*indent, file_name)) found = False for f in [file_name, file_name + '.txt', file_name + '.md']: if f in in_folder: in_folder.remove(f) found = True if not found: raise RuntimeError('file "%s" is missing' % file_name) def verifyUnpacked(java, artifact, unpackPath, gitRevision, version, testArgs): global SOLR_NOTICE global SOLR_LICENSE os.chdir(unpackPath) isSrc = artifact.find('-src') != -1 isSlim = artifact.find('-slim') != -1 # Check text files in release print(" %s" % artifact) in_root_folder = list(filter(lambda x: x[0] != '.', os.listdir(unpackPath))) in_solr_folder = [] if isSrc: in_solr_folder.extend(os.listdir(os.path.join(unpackPath, 'solr'))) is_in_list(in_root_folder, ['LICENSE.txt', 'NOTICE.txt', 'README.md', 'CONTRIBUTING.md']) is_in_list(in_solr_folder, ['CHANGES.txt', 'README.adoc']) else: is_in_list(in_root_folder, ['LICENSE.txt', 'NOTICE.txt', 'README.txt', 'CHANGES.txt']) if SOLR_NOTICE is None: SOLR_NOTICE = open('%s/NOTICE.txt' % unpackPath, encoding='UTF-8').read() if SOLR_LICENSE is None: SOLR_LICENSE = open('%s/LICENSE.txt' % unpackPath, encoding='UTF-8').read() # if not isSrc: # # TODO: we should add verifyModule/verifySubmodule (e.g. analysis) here and recurse through # expectedJARs = () # # for fileName in expectedJARs: # fileName += '.jar' # if fileName not in l: # raise RuntimeError('solr: file "%s" is missing from artifact %s' % (fileName, artifact)) # in_root_folder.remove(fileName) if isSrc: expected_src_root_folders = ['build-tools', 'dev-docs', 'dev-tools', 'gradle', 'help', 'solr'] expected_src_root_files = ['build.gradle', 'gradlew', 'gradlew.bat', 'settings.gradle', 'settings-gradle.lockfile', 'versions.lock'] expected_src_solr_files = ['build.gradle'] expected_src_solr_folders = ['benchmark', 'bin', 'modules', 'api', 'core', 'cross-dc-manager', 'docker', 'documentation', 'example', 'licenses', 'packaging', 'distribution', 'prometheus-exporter', 'server', 'solr-ref-guide', 'solrj', 'solrj-streaming', 'solrj-zookeeper', 'test-framework', 'webapp', '.gitignore', '.gitattributes'] is_in_list(in_root_folder, expected_src_root_folders) is_in_list(in_root_folder, expected_src_root_files) is_in_list(in_solr_folder, expected_src_solr_folders) is_in_list(in_solr_folder, expected_src_solr_files) if len(in_solr_folder) > 0: raise RuntimeError('solr: unexpected files/dirs in artifact %s solr/ folder: %s' % (artifact, in_solr_folder)) elif isSlim: is_in_list(in_root_folder, ['bin', 'docker', 'docs', 'example', 'licenses', 'server', 'lib']) else: is_in_list(in_root_folder, ['bin', 'modules', 'cross-dc-manager', 'docker', 'prometheus-exporter', 'docs', 'example', 'licenses', 'server', 'lib']) if len(in_root_folder) > 0: raise RuntimeError('solr: unexpected files/dirs in artifact %s: %s' % (artifact, in_root_folder)) if isSrc: print(' make sure no JARs/WARs in src dist...') lines = os.popen('find . -name \\*.jar').readlines() if len(lines) != 0: print(' FAILED:') for line in lines: print(' %s' % line.strip()) raise RuntimeError('source release has JARs...') lines = os.popen('find . -name \\*.war').readlines() if len(lines) != 0: print(' FAILED:') for line in lines: print(' %s' % line.strip()) raise RuntimeError('source release has WARs...') validateCmd = './gradlew --no-daemon check -p solr/documentation' print(' run "%s"' % validateCmd) java.run_java(validateCmd, '%s/validate.log' % unpackPath) print(" run tests w/ Java %s and testArgs='%s'..." % (BASE_JAVA_VERSION, testArgs)) java.run_java('./gradlew --no-daemon test %s' % testArgs, '%s/test.log' % unpackPath) print(" run integration tests w/ Java %s" % BASE_JAVA_VERSION) java.run_java('./gradlew --no-daemon integrationTest -Dversion.release=%s' % version, '%s/itest.log' % unpackPath) print(" build binary release w/ Java %s" % BASE_JAVA_VERSION) java.run_java('./gradlew --no-daemon dev -Dversion.release=%s' % version, '%s/assemble.log' % unpackPath) testSolrExample("%s/solr/packaging/build/dev" % unpackPath, java.java_home, False) if java.run_alt_javas: for run_alt_java, alt_java_version in zip(java.run_alt_javas, java.alt_java_versions): print(" run tests w/ Java %s and testArgs='%s'..." % (alt_java_version, testArgs)) run_alt_java('./gradlew --no-daemon clean test %s' % testArgs, '%s/test-java%s.log' % (unpackPath, alt_java_version)) print(" run integration tests w/ Java %s" % alt_java_version) run_alt_java('./gradlew --no-daemon integrationTest -Dversion.release=%s' % version, '%s/itest-java%s.log' % (unpackPath, alt_java_version)) print(" build binary release w/ Java %s" % alt_java_version) run_alt_java('./gradlew --no-daemon dev -Dversion.release=%s' % version, '%s/assemble-java%s.log' % (unpackPath, alt_java_version)) testSolrExample("%s/solr/packaging/build/dev" % unpackPath, run_alt_java, False) else: # Binary tarball checkAllJARs(os.getcwd(), gitRevision, version) print(' copying unpacked distribution for Java %s ...' % BASE_JAVA_VERSION) javaBaseVersionUnpackPath = '%s-java%s' % (unpackPath, BASE_JAVA_VERSION) if os.path.exists(javaBaseVersionUnpackPath): shutil.rmtree(javaBaseVersionUnpackPath) shutil.copytree(unpackPath, javaBaseVersionUnpackPath) os.chdir(javaBaseVersionUnpackPath) print(' test solr example w/ Java %s...' % BASE_JAVA_VERSION) testSolrExample(javaBaseVersionUnpackPath, java.java_home, isSlim) if java.run_alt_javas: for run_alt_java, alt_java_version in zip(java.run_alt_javas, java.alt_java_versions): print("The alt version of java", run_alt_java, alt_java_version) print(' copying unpacked distribution for Java %s ...' % alt_java_version) javaAltVersionUnpackPath = '%s-java%s' % (unpackPath, alt_java_version) if os.path.exists(javaAltVersionUnpackPath): shutil.rmtree(javaAltVersionUnpackPath) shutil.copytree(unpackPath, javaAltVersionUnpackPath) os.chdir(javaAltVersionUnpackPath) print(' test solr example w/ Java %s...' % alt_java_version) testSolrExample(javaAltVersionUnpackPath, run_alt_java, isSlim) os.chdir(unpackPath) testChangesText('.', version) def readSolrOutput(p, startupEvent, failureEvent, logFile): f = open(logFile, 'wb') try: while True: line = p.stdout.readline() if len(line) == 0: p.poll() if not startupEvent.isSet(): failureEvent.set() startupEvent.set() break f.write(line) f.flush() #print('SOLR: %s' % line.strip()) if not startupEvent.isSet(): if line.find(b'Started ServerConnector@') != -1 and line.find(b'{HTTP/1.1}{0.0.0.0:8983}') != -1: startupEvent.set() elif p.poll() is not None: failureEvent.set() startupEvent.set() break except: print() print('Exception reading Solr output:') traceback.print_exc() failureEvent.set() startupEvent.set() finally: f.close() def is_port_in_use(port): import socket with socket.socket(socket.AF_INET, socket.SOCK_STREAM) as s: return s.connect_ex(('localhost', port)) == 0 def testSolrExample(binaryDistPath, javaPath, isSlim): # test solr using some examples it comes with logFile = '%s/solr-example.log' % binaryDistPath old_cwd = os.getcwd() # So we can back-track os.chdir(binaryDistPath) print(' start Solr instance (log=%s)...' % logFile) env = {} env.update(os.environ) env['JAVA_HOME'] = javaPath env['PATH'] = '%s/bin:%s' % (javaPath, env['PATH']) example = "techproducts" if isSlim: example = "films" # Stop Solr running on port 8983 (in case a previous run didn't shutdown cleanly) try: if not cygwin: subprocess.call(['bin/solr','stop','-p','8983']) else: subprocess.call('env "PATH=`cygpath -S -w`:$PATH" bin/solr.cmd stop -p 8983', shell=True) except: print(' Stop failed due to: '+sys.exc_info()[0]) print(' Running %s example on port 8983 from %s' % (example, binaryDistPath)) try: if not cygwin: runExampleStatus = subprocess.call(['bin/solr','start','-e',example]) else: runExampleStatus = subprocess.call('env "PATH=`cygpath -S -w`:$PATH" bin/solr.cmd -e ' + example, shell=True) if runExampleStatus != 0: raise RuntimeError('Failed to run the %s example, check log for previous errors.' % example) os.chdir('example') print(' run query...') s = load('http://localhost:8983/solr/%s/select/?q=video' % example) if s.find('"numFound":%d,' % (8 if isSlim else 3)) == -1: print('FAILED: response is:\n%s' % s) raise RuntimeError('query on solr example instance failed') s = load('http://localhost:8983/api/cores') if s.find('"status":0,') == -1: print('FAILED: response is:\n%s' % s) raise RuntimeError('query api v2 on solr example instance failed') finally: # Stop server: print(' stop server using: bin/solr stop -p 8983') os.chdir(binaryDistPath) if not cygwin: subprocess.call(['bin/solr','stop','-p','8983']) else: subprocess.call('env "PATH=`cygpath -S -w`:$PATH" bin/solr.cmd stop -p 8983', shell=True) os.chdir(old_cwd) def removeTrailingZeros(version): return re.sub(r'(\.0)*$', '', version) def checkMaven(baseURL, tmpDir, gitRevision, version, isSigned, keysFile): print(' download artifacts') artifacts = [] artifactsURL = '%s/maven/org/apache/solr/' % baseURL targetDir = '%s/maven/org/apache/solr' % tmpDir if not os.path.exists(targetDir): os.makedirs(targetDir) crawl(artifacts, artifactsURL, targetDir) print() verifyPOMperBinaryArtifact(artifacts, version) verifyMavenDigests(artifacts) checkJavadocAndSourceArtifacts(artifacts, version) verifyDeployedPOMsCoordinates(artifacts, version) if isSigned: verifyMavenSigs(tmpDir, artifacts, keysFile) distFiles = getBinaryDistFiles(tmpDir, version, baseURL) checkIdenticalMavenArtifacts(distFiles, artifacts, version) checkAllJARs('%s/maven/org/apache/solr' % tmpDir, gitRevision, version) def getBinaryDistFiles(tmpDir, version, baseURL): distribution = 'solr-%s.tgz' % version if not os.path.exists('%s/%s' % (tmpDir, distribution)): distURL = '%s/solr/%s' % (baseURL, distribution) print(' download %s...' % distribution, end=' ') scriptutil.download(distribution, distURL, tmpDir, force_clean=FORCE_CLEAN) destDir = '%s/unpack-solr-getBinaryDistFiles' % tmpDir if os.path.exists(destDir): shutil.rmtree(destDir) os.makedirs(destDir) os.chdir(destDir) print(' unpack %s...' % distribution) unpackLogFile = '%s/unpack-%s-getBinaryDistFiles.log' % (tmpDir, distribution) run('tar xzf %s/%s' % (tmpDir, distribution), unpackLogFile) distributionFiles = [] for root, dirs, files in os.walk(destDir): # pylint: disable=unused-variable distributionFiles.extend([os.path.join(root, file) for file in files]) return distributionFiles def checkJavadocAndSourceArtifacts(artifacts, version): print(' check for javadoc and sources artifacts...') for artifact in artifacts: if artifact.endswith(version + '.jar'): javadocJar = artifact[:-4] + '-javadoc.jar' if javadocJar not in artifacts: raise RuntimeError('missing: %s' % javadocJar) sourcesJar = artifact[:-4] + '-sources.jar' if sourcesJar not in artifacts: raise RuntimeError('missing: %s' % sourcesJar) def checkIdenticalMavenArtifacts(distFiles, artifacts, version): print(' verify that Maven artifacts are same as in the binary distribution...') reJarWar = re.compile(r'%s\.[wj]ar$' % version) # exclude *-javadoc.jar and *-sources.jar distFilenames = dict() for file in distFiles: baseName = os.path.basename(file) distFilenames[baseName] = file for artifact in artifacts: if reJarWar.search(artifact): artifactFilename = os.path.basename(artifact) if artifactFilename in ['solr-test-framework-%s.jar' % version]: if artifactFilename in distFilenames: raise RuntimeError(' solr-test-framework should not be present in solr binary distribution' % artifact) continue if artifactFilename not in distFilenames: raise RuntimeError(' Maven artifact %s is not present in solr binary distribution' % artifact) else: identical = filecmp.cmp(artifact, distFilenames[artifactFilename], shallow=False) if not identical: raise RuntimeError(' Maven artifact %s is not identical to %s in solr binary distribution' % (artifact, distFilenames[artifactFilename])) def verifyMavenDigests(artifacts): print(" verify Maven artifacts' md5/sha1 digests...") reJarWarPom = re.compile(r'\.(?:[wj]ar|pom)$') for artifactFile in [a for a in artifacts if reJarWarPom.search(a)]: if artifactFile + '.md5' not in artifacts: raise RuntimeError('missing: MD5 digest for %s' % artifactFile) if artifactFile + '.sha1' not in artifacts: raise RuntimeError('missing: SHA1 digest for %s' % artifactFile) with open(artifactFile + '.md5', encoding='UTF-8') as md5File: md5Expected = md5File.read().strip() with open(artifactFile + '.sha1', encoding='UTF-8') as sha1File: sha1Expected = sha1File.read().strip() md5 = hashlib.md5() sha1 = hashlib.sha1() inputFile = open(artifactFile, 'rb') while True: bytes = inputFile.read(65536) if len(bytes) == 0: break md5.update(bytes) sha1.update(bytes) inputFile.close() md5Actual = md5.hexdigest() sha1Actual = sha1.hexdigest() if md5Actual != md5Expected: raise RuntimeError('MD5 digest mismatch for %s: expected %s but got %s' % (artifactFile, md5Expected, md5Actual)) if sha1Actual != sha1Expected: raise RuntimeError('SHA1 digest mismatch for %s: expected %s but got %s' % (artifactFile, sha1Expected, sha1Actual)) def getPOMcoordinate(treeRoot): namespace = '{http://maven.apache.org/POM/4.0.0}' groupId = treeRoot.find('%sgroupId' % namespace) if groupId is None: groupId = treeRoot.find('{0}parent/{0}groupId'.format(namespace)) groupId = groupId.text.strip() artifactId = treeRoot.find('%sartifactId' % namespace).text.strip() version = treeRoot.find('%sversion' % namespace) if version is None: version = treeRoot.find('{0}parent/{0}version'.format(namespace)) version = version.text.strip() packaging = treeRoot.find('%spackaging' % namespace) packaging = 'jar' if packaging is None else packaging.text.strip() return groupId, artifactId, packaging, version def verifyMavenSigs(tmpDir, artifacts, keysFile): print(' verify maven artifact sigs', end=' ') # Set up clean gpg world; import keys file: gpgHomeDir = '%s/solr.gpg' % tmpDir if os.path.exists(gpgHomeDir): shutil.rmtree(gpgHomeDir) os.makedirs(gpgHomeDir, 0o700) run('gpg --homedir %s --import %s' % (gpgHomeDir, keysFile), '%s/solr.gpg.import.log' % tmpDir) reArtifacts = re.compile(r'\.(?:pom|[jw]ar)$') for artifactFile in [a for a in artifacts if reArtifacts.search(a)]: artifact = os.path.basename(artifactFile) sigFile = '%s.asc' % artifactFile # Test sig (this is done with a clean brand-new GPG world) logFile = '%s/solr.%s.gpg.verify.log' % (tmpDir, artifact) run('gpg --display-charset utf-8 --homedir %s --verify %s %s' % (gpgHomeDir, sigFile, artifactFile), logFile) # Forward any GPG warnings, except the expected one (since it's a clean world) print_warnings_in_file(logFile) # Test trust (this is done with the real users config) run('gpg --import %s' % keysFile, '%s/solr.gpg.trust.import.log' % tmpDir) logFile = '%s/solr.%s.gpg.trust.log' % (tmpDir, artifact) run('gpg --display-charset utf-8 --verify %s %s' % (sigFile, artifactFile), logFile) # Forward any GPG warnings: print_warnings_in_file(logFile) sys.stdout.write('.') print() # Make sure to shutdown the GPG agent at the end stopGpgAgent(gpgHomeDir, logFile) def print_warnings_in_file(file): with open(file) as f: for line in f.readlines(): if line.lower().find('warning') != -1 \ and line.find('WARNING: This key is not certified with a trusted signature') == -1 \ and line.find('WARNING: using insecure memory') == -1: print(' GPG: %s' % line.strip()) def verifyPOMperBinaryArtifact(artifacts, version): print(' verify that each binary artifact has a deployed POM...') reBinaryJarWar = re.compile(r'%s\.[jw]ar$' % re.escape(version)) for artifact in [a for a in artifacts if reBinaryJarWar.search(a)]: POM = artifact[:-4] + '.pom' if POM not in artifacts: raise RuntimeError('missing: POM for %s' % artifact) def verifyDeployedPOMsCoordinates(artifacts, version): """ verify that each POM's coordinate (drawn from its content) matches its filepath, and verify that the corresponding artifact exists. """ print(" verify deployed POMs' coordinates...") for POM in [a for a in artifacts if a.endswith('.pom')]: treeRoot = ET.parse(POM).getroot() groupId, artifactId, packaging, POMversion = getPOMcoordinate(treeRoot) POMpath = '%s/%s/%s/%s-%s.pom' \ % (groupId.replace('.', '/'), artifactId, version, artifactId, version) if not POM.endswith(POMpath): raise RuntimeError("Mismatch between POM coordinate %s:%s:%s and filepath: %s" % (groupId, artifactId, POMversion, POM)) # Verify that the corresponding artifact exists artifact = POM[:-3] + packaging if artifact not in artifacts: raise RuntimeError('Missing corresponding .%s artifact for POM %s' % (packaging, POM)) def crawl(downloadedFiles, urlString, targetDir, exclusions=set()): for text, subURL in getDirEntries(urlString): if text not in exclusions: path = os.path.join(targetDir, text) if text.endswith('/'): if not os.path.exists(path): os.makedirs(path) crawl(downloadedFiles, subURL, path, exclusions) else: if not os.path.exists(path) or FORCE_CLEAN: scriptutil.download(text, subURL, targetDir, quiet=True, force_clean=FORCE_CLEAN) downloadedFiles.append(path) sys.stdout.write('.') def make_java_config(parser, alt_java_homes): def _make_runner(java_home, is_base_version=False): if cygwin: java_home = subprocess.check_output('cygpath -u "%s"' % java_home, shell=True).decode('utf-8').strip() cmd_prefix = 'export JAVA_HOME="%s" PATH="%s/bin:$PATH" JAVACMD="%s/bin/java"' % \ (java_home, java_home, java_home) s = subprocess.check_output('%s; java -version' % cmd_prefix, shell=True, stderr=subprocess.STDOUT).decode('utf-8') actual_version = re.search(r'version "([1-9][0-9]*)', s).group(1) print('Java %s JAVA_HOME=%s' % (actual_version, java_home)) # validate Java version if is_base_version: if BASE_JAVA_VERSION != actual_version: parser.error('got wrong base version for java %s:\n%s' % (BASE_JAVA_VERSION, s)) else: if int(actual_version) < int(BASE_JAVA_VERSION): parser.error('got wrong version for java %s, less than base version %s:\n%s' % (actual_version, BASE_JAVA_VERSION, s)) def run_java(cmd, logfile): run('%s; %s' % (cmd_prefix, cmd), logfile) return run_java, actual_version java_home = os.environ.get('JAVA_HOME') if java_home is None: parser.error('JAVA_HOME must be set') run_java, _ = _make_runner(java_home, True) run_alt_javas = [] alt_java_versions = [] if alt_java_homes: for alt_java_home in alt_java_homes: run_alt_java, version = _make_runner(alt_java_home) run_alt_javas.append(run_alt_java) alt_java_versions.append(version) print("alt java ", run_alt_javas, alt_java_versions) jc = namedtuple('JavaConfig', 'run_java java_home run_alt_javas alt_java_homes alt_java_versions') return jc(run_java, java_home, run_alt_javas, alt_java_homes, alt_java_versions) version_re = re.compile(r'(\d+\.\d+\.\d+(-ALPHA|-BETA)?)') revision_re = re.compile(r'rev-([a-f\d]+)') def parse_config(): epilogue = textwrap.dedent(''' Example usage: python3 -u dev-tools/scripts/smokeTestRelease.py https://dist.apache.org/repos/dist/dev/solr/solr-10.0.0-RC1-rev-c7510a0... ''') description = 'Utility to test a release.' parser = argparse.ArgumentParser(description=description, epilog=epilogue, formatter_class=argparse.RawDescriptionHelpFormatter) parser.add_argument('--tmp-dir', metavar='PATH', help='Temporary directory to test inside, defaults to /tmp/smoke_solr_$version_$revision') parser.add_argument('--not-signed', dest='is_signed', action='store_false', default=True, help='Indicates the release is not signed') parser.add_argument('--local-keys', metavar='PATH', help='Uses local KEYS file instead of fetching from https://archive.apache.org/dist/solr/KEYS') parser.add_argument('--revision', help='GIT revision number that release was built with, defaults to that in URL') parser.add_argument('--version', metavar='X.Y.Z(-ALPHA|-BETA)?', help='Version of the release, defaults to that in URL') parser.add_argument('--test-alt-java', action='append', help='Path to Java alternative home directory, to run tests with if specified') parser.add_argument('--download-only', action='store_true', default=False, help='Only perform download and sha hash check steps') parser.add_argument('--dev-mode', action='store_true', default=False, help='Enable dev mode, will not check branch compatibility') parser.add_argument('url', help='Url pointing to release to test') parser.add_argument('test_args', nargs=argparse.REMAINDER, help='Arguments to pass to gradle for testing, e.g. -Dwhat=ever.') c = parser.parse_args() if c.version is not None: if not version_re.match(c.version): parser.error('version "%s" does not match format X.Y.Z[-ALPHA|-BETA]' % c.version) else: version_match = version_re.search(c.url) if version_match is None: parser.error('Could not find version in URL') c.version = version_match.group(1) if c.revision is None: revision_match = revision_re.search(c.url) if revision_match is None: parser.error('Could not find revision in URL') c.revision = revision_match.group(1) print('Revision: %s' % c.revision) if c.local_keys is not None and not os.path.exists(c.local_keys): parser.error('Local KEYS file "%s" not found' % c.local_keys) c.java = make_java_config(parser, c.test_alt_java) if c.tmp_dir: c.tmp_dir = os.path.abspath(c.tmp_dir) else: tmp = '/tmp/smoke_solr_%s_%s' % (c.version, c.revision) c.tmp_dir = tmp i = 1 while os.path.exists(c.tmp_dir): c.tmp_dir = tmp + '_%d' % i i += 1 return c reVersion1 = re.compile(r'\>(\d+)\.(\d+)\.(\d+)(-alpha|-beta)?/\<', re.IGNORECASE) reVersion2 = re.compile(r'-(\d+)\.(\d+)\.(\d+)(-alpha|-beta)?\.', re.IGNORECASE) def main(): c = parse_config() # Pick <major>.<minor> part of version and require script to be from same branch scriptVersion = re.search(r'((\d+).(\d+)).(\d+)', scriptutil.find_current_version()).group(1).strip() if not c.version.startswith(scriptVersion + '.') and not c.dev_mode: raise RuntimeError('smokeTestRelease.py for %s.X is incompatible with a %s release.' % (scriptVersion, c.version)) print('NOTE: output encoding is %s' % sys.stdout.encoding) smokeTest(c.java, c.url, c.revision, c.version, c.tmp_dir, c.is_signed, c.local_keys, ' '.join(c.test_args), downloadOnly=c.download_only) def smokeTest(java, baseURL, gitRevision, version, tmpDir, isSigned, local_keys, testArgs, downloadOnly=False): startTime = datetime.datetime.now() # Avoid @Nightly and @Badapple tests as they are slow and buggy # Instead verify that the recent Jenkins tests pass print('NOTE: Not running @Nightly or @BadApple tests. Please verify that recent Jenkins runs have passed.') testArgs = '-Dtests.nightly=false -Dtests.badapples=false %s' % testArgs if FORCE_CLEAN: if os.path.exists(tmpDir): raise RuntimeError('temp dir %s exists; please remove first' % tmpDir) if not os.path.exists(tmpDir): os.makedirs(tmpDir) solrPath = None print() print('Load release URL "%s"...' % baseURL) newBaseURL = unshortenURL(baseURL) if newBaseURL != baseURL: print(' unshortened: %s' % newBaseURL) baseURL = newBaseURL if baseURL.endswith('distribution/build/release'): # Used when building release locally in Jenkins solrPath = baseURL else: # An ordinary release has a 'solr' sub folder for text, subURL in getDirEntries(baseURL): if text.lower() == "solr/": solrPath = subURL for text, subURL in getDirEntries(solrPath): if text.lower() == version + "/": solrPath = subURL if solrPath is None: raise RuntimeError("could not find solr/%s/ subdir" % version) print() print('Get KEYS...') if local_keys is not None: print(" Using local KEYS file %s" % local_keys) keysFile = local_keys else: keysFileURL = "https://archive.apache.org/dist/solr/KEYS" print(" Downloading online KEYS file %s" % keysFileURL) scriptutil.download('KEYS', keysFileURL, tmpDir, force_clean=FORCE_CLEAN) keysFile = '%s/KEYS' % (tmpDir) if is_port_in_use(8983): raise RuntimeError('Port 8983 is already in use. The smoketester needs it to test Solr') print() print('Test Solr...') checkSigs(solrPath, version, tmpDir, isSigned, keysFile) if not downloadOnly: unpackAndVerify(java, tmpDir, 'solr-%s.tgz' % version, gitRevision, version, testArgs) unpackAndVerify(java, tmpDir, 'solr-%s-slim.tgz' % version, gitRevision, version, testArgs) unpackAndVerify(java, tmpDir, 'solr-%s-src.tgz' % version, gitRevision, version, testArgs) print() print('Test Maven artifacts...') checkMaven(solrPath, tmpDir, gitRevision, version, isSigned, keysFile) else: print("Solr test done (--download-only specified)") print('\nSUCCESS! [%s]\n' % (datetime.datetime.now() - startTime)) if __name__ == '__main__': try: main() except KeyboardInterrupt: print('Keyboard interrupt...exiting')