-
Notifications
You must be signed in to change notification settings - Fork 24
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
travis-ci: deploy RPM / Deb packages
Now php-tarantool packages are deployed into two kinds of repositories: packagecloud.io and to S3 based ones. The download.tarantool.org now points to the latter, but we keep packagecloud.io for a while to don't break users, which use it directly (we don't recommend it though). See [1] for more info about deprecation of our packagecloud.io repositories. The deployment scripts allows to provide two configurations: production and staging. The former is for deployment from the master branch and from a git tag. The latter is for deployments from a developer branch. It is useful when something should be verified in a specific environment using a built package or when the deployment process itself was modified and should be tested. The difference between production and staging deployment process is how duplicate package versions are handled. It give an error for production deployment, but does not for staging. The new package is discarded in the case for packagecloud.io, but it replaces the old package in S3 repositories. Read comments in the deployment scripts for more details. [1]: tarantool/tarantool#4947 Fixes #117
- Loading branch information
1 parent
21f638b
commit 7d5bd20
Showing
8 changed files
with
365 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,120 @@ | ||
#!/bin/sh | ||
|
||
# Deploy to packagecloud repositories | ||
# ----------------------------------- | ||
# | ||
# `deploy_packagecloud.sh` is equivalent to | ||
# `deploy_packagecloud.sh staging`. | ||
# | ||
# `deploy_packagecloud.sh staging` requires the following | ||
# environment variables: | ||
# | ||
# - OS | ||
# - DIST | ||
# - DEPLOY_STAGING_PACKAGECLOUD_USER | ||
# - DEPLOY_STAGING_PACKAGECLOUD_TOKEN | ||
# | ||
# `deploy_packagecloud.sh production` requires the following | ||
# environment variables: | ||
# | ||
# - OS | ||
# - DIST | ||
# - DEPLOY_PRODUCTION_PACKAGECLOUD_USER | ||
# - DEPLOY_PRODUCTION_PACKAGECLOUD_TOKEN | ||
# | ||
# If one of those variables is not set or empty, then deployment | ||
# will be skipped. | ||
|
||
# Make shell strictier. | ||
# | ||
# - Exit with a failure on a first failed command. | ||
# - Exit with a failure on an attempt to use an unset variable. | ||
# - Print each executed commmand. | ||
# | ||
# Note: The script expects that Travis-CI will filter sensitive | ||
# information (such as a token): 'Display value in build log' | ||
# toogle should be OFF for to keep a value secure. | ||
set -eux | ||
|
||
configuration=${1:-staging} | ||
|
||
# Choose credentials. | ||
if [ ${configuration} = staging ]; then | ||
DEPLOY_PACKAGECLOUD_USER="${DEPLOY_STAGING_PACKAGECLOUD_USER:-}" | ||
DEPLOY_PACKAGECLOUD_TOKEN="${DEPLOY_STAGING_PACKAGECLOUD_TOKEN:-}" | ||
elif [ ${configuration} = production ]; then | ||
DEPLOY_PACKAGECLOUD_USER="${DEPLOY_PRODUCTION_PACKAGECLOUD_USER:-}" | ||
DEPLOY_PACKAGECLOUD_TOKEN="${DEPLOY_PRODUCTION_PACKAGECLOUD_TOKEN:-}" | ||
else | ||
echo "Unknown configuration: ${configuration}" | ||
exit 1 | ||
fi | ||
|
||
# Skip deployment if some variables are not set or empty. | ||
if [ -z "${OS:-}" ] || [ -z "${DIST:-}" ] || \ | ||
[ -z "${DEPLOY_PACKAGECLOUD_USER}" ] || \ | ||
[ -z "${DEPLOY_PACKAGECLOUD_TOKEN}" ]; then | ||
echo "Skip deployment: some of necessary environment" | ||
echo "variables are not set or empty" | ||
exit 0 | ||
fi | ||
|
||
# Verify that packpack is cloned into the current directory. | ||
packagecloud_tool=./packpack/tools/packagecloud | ||
if [ ! -f "${packagecloud_tool}" ]; then | ||
echo "Could not find ${packagecloud_tool}" | ||
exit 1 | ||
fi | ||
|
||
# Staging repository: keep older packages in case of a | ||
# version clash. | ||
# | ||
# It would be better to replace old ones, but there is no | ||
# such option in the packagecloud tool we use. It may be | ||
# important if we'll have some manual or automatic testing | ||
# upward a staging repository. But at least CI will not fail | ||
# because a package is already exists. | ||
push_args="" | ||
if [ "${configuration}" = staging ]; then | ||
push_args="${push_args} --ignore-duplicates" | ||
fi | ||
|
||
# Setup environment variables for the packagecloud tool. | ||
export PACKAGECLOUD_TOKEN="${DEPLOY_PACKAGECLOUD_TOKEN}" | ||
|
||
# We have tarantool repositories on packagecloud.io up to | ||
# 2_4. The next ones present only in the S3 based storage. | ||
for repo in 1_6 1_7 1_9 1_10 2x 2_2 2_3 2_4; do | ||
# FIXME: Enable *.ddeb when packagecloud.io will support it. | ||
for file in build/*.{rpm,deb,dsc}; do | ||
extension=${file##*.} | ||
|
||
# Skip non-matched globs: say, build/*.rpm on Debian. | ||
basename="$(basename "${file}" ".${extension}")" | ||
[ "${basename}" = "*" ] && continue | ||
|
||
# Push all source files listed in .dsc file together with | ||
# the file. | ||
# | ||
# FIXME: It seems logical to move this logic to the | ||
# packagecloud tool we use. | ||
files="${file}" | ||
if [ "${extension}" = "dsc" ]; then | ||
parse_dsc_file='{ | ||
if ($0 == "Files:") { | ||
FILES_SECTION = 1; | ||
} else if (FILES_SECTION != 0) { | ||
print "build/"$3; | ||
} | ||
}' | ||
files="${files} $(awk "${parse_dsc_file}" "${file}")" | ||
fi | ||
|
||
# FIXME: The tool fetches distributions.json each time. | ||
# It can cache the data somewhere and reuse during some | ||
# time period until expiration. | ||
user=${DEPLOY_PACKAGECLOUD_USER} | ||
${packagecloud_tool} push ${push_args} ${user}/${repo} ${extension} \ | ||
${OS} ${DIST} ${files} | ||
done | ||
done |
Binary file not shown.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,160 @@ | ||
#!/bin/sh | ||
|
||
# Deploy to S3 based repositories | ||
# ------------------------------- | ||
# | ||
# `deploy_s3.sh` is equivalent to `deploy_s3.sh staging`. | ||
# | ||
# `deploy_s3.sh staging` requires the following environment | ||
# variables: | ||
# | ||
# - OS | ||
# - DIST | ||
# - DEPLOY_STAGING_S3_ENDPOINT_URL="https://..." | ||
# - DEPLOY_STAGING_S3_LIVE_DIR="s3://my_bucket/foo/bar/live" | ||
# - DEPLOY_STAGING_S3_RELEASE_DIR="s3://my_bucket/foo/bar/release" | ||
# - DEPLOY_STAGING_S3_ACCESS_KEY_ID | ||
# - DEPLOY_STAGING_S3_SECRET_ACCESS_KEY | ||
# - DEPLOY_STAGING_S3_GPG_KEY_FILE_KEY (32 bytes in hex) | ||
# - DEPLOY_STAGING_S3_GPG_KEY_FILE_IV (16 bytes in hex) | ||
# | ||
# `deploy_s3.sh production` requires the following environment | ||
# variables: | ||
# | ||
# - OS | ||
# - DIST | ||
# - DEPLOY_PRODUCTION_S3_ENDPOINT_URL="https://..." | ||
# - DEPLOY_PRODUCTION_S3_LIVE_DIR="s3://my_bucket/foo/bar/live" | ||
# - DEPLOY_PRODUCTION_S3_RELEASE_DIR="s3://my_bucket/foo/bar/release" | ||
# - DEPLOY_PRODUCTION_S3_ACCESS_KEY_ID | ||
# - DEPLOY_PRODUCTION_S3_SECRET_ACCESS_KEY | ||
# - DEPLOY_PRODUCTION_S3_GPG_KEY_FILE_KEY (32 bytes in hex) | ||
# - DEPLOY_PRODUCTION_S3_GPG_KEY_FILE_IV (16 bytes in hex) | ||
# | ||
# If one of those variables is not set or empty, then deployment | ||
# will be skipped. | ||
|
||
# Make shell strictier. | ||
# | ||
# - Exit with a failure on a first failed command. | ||
# - Exit with a failure on an attempt to use an unset variable. | ||
# - Print each executed commmand. | ||
# | ||
# Note: The script expects that Travis-CI will filter sensitive | ||
# information (such as a token): 'Display value in build log' | ||
# toogle should be OFF for to keep a value secure. | ||
set -eux | ||
|
||
configuration=${1:-staging} | ||
|
||
# Choose URLs, directories, keys and so. | ||
if [ ${configuration} = staging ]; then | ||
DEPLOY_S3_ENDPOINT_URL="${DEPLOY_STAGING_S3_ENDPOINT_URL:-}" | ||
DEPLOY_S3_LIVE_DIR="${DEPLOY_STAGING_S3_LIVE_DIR:-}" | ||
DEPLOY_S3_RELEASE_DIR="${DEPLOY_STAGING_S3_RELEASE_DIR:-}" | ||
DEPLOY_S3_ACCESS_KEY_ID="${DEPLOY_STAGING_S3_ACCESS_KEY_ID:-}" | ||
DEPLOY_S3_SECRET_ACCESS_KEY="${DEPLOY_STAGING_S3_SECRET_ACCESS_KEY:-}" | ||
DEPLOY_S3_GPG_KEY_FILE_KEY="${DEPLOY_STAGING_S3_GPG_KEY_FILE_KEY:-}" | ||
DEPLOY_S3_GPG_KEY_FILE_IV="${DEPLOY_STAGING_S3_GPG_KEY_FILE_IV:-}" | ||
elif [ ${configuration} = production ]; then | ||
DEPLOY_S3_ENDPOINT_URL="${DEPLOY_PRODUCTION_S3_ENDPOINT_URL:-}" | ||
DEPLOY_S3_LIVE_DIR="${DEPLOY_PRODUCTION_S3_LIVE_DIR:-}" | ||
DEPLOY_S3_RELEASE_DIR="${DEPLOY_PRODUCTION_S3_RELEASE_DIR:-}" | ||
DEPLOY_S3_ACCESS_KEY_ID="${DEPLOY_PRODUCTION_S3_ACCESS_KEY_ID:-}" | ||
DEPLOY_S3_SECRET_ACCESS_KEY="${DEPLOY_PRODUCTION_S3_SECRET_ACCESS_KEY:-}" | ||
DEPLOY_S3_GPG_KEY_FILE_KEY="${DEPLOY_PRODUCTION_S3_GPG_KEY_FILE_KEY:-}" | ||
DEPLOY_S3_GPG_KEY_FILE_IV="${DEPLOY_PRODUCTION_S3_GPG_KEY_FILE_IV:-}" | ||
else | ||
echo "Unknown configuration: ${configuration}" | ||
exit 1 | ||
fi | ||
|
||
# Skip deployment if some variables are not set or empty. | ||
if [ -z "${OS:-}" ] || [ -z "${DIST:-}" ] || \ | ||
[ -z "${DEPLOY_S3_ENDPOINT_URL}" ] || \ | ||
[ -z "${DEPLOY_S3_LIVE_DIR}" ] || \ | ||
[ -z "${DEPLOY_S3_RELEASE_DIR}" ] || \ | ||
[ -z "${DEPLOY_S3_ACCESS_KEY_ID}" ] || \ | ||
[ -z "${DEPLOY_S3_SECRET_ACCESS_KEY}" ] || \ | ||
[ -z "${DEPLOY_S3_GPG_KEY_FILE_KEY}" ] || \ | ||
[ -z "${DEPLOY_S3_GPG_KEY_FILE_IV}" ]; then | ||
echo "Skip deployment: some of necessary environment" | ||
echo "variables are not set or empty" | ||
exit 0 | ||
fi | ||
|
||
# Download the tool to deploy to an S3 based repository. | ||
ref=f84cb1aae3144f5677feacf6be31bd4f15e91c2d | ||
base_url="https://raw.githubusercontent.com/tarantool/tarantool/${ref}" | ||
curl -Ssfo update_repo.sh "${base_url}/tools/update_repo.sh" | ||
chmod a+x update_repo.sh | ||
|
||
# FIXME: Upstream the patch. | ||
patch -p1 -i .travis/update-repo-sh-use-right-gpg-key.patch | ||
|
||
# Decrypt a GPG key. | ||
gpg_key_file=".travis/deploy_${configuration}_s3_gpg_private_key.asc" | ||
openssl aes-256-cbc -K "${DEPLOY_S3_GPG_KEY_FILE_KEY}" \ | ||
-iv "${DEPLOY_S3_GPG_KEY_FILE_IV}" -in "${gpg_key_file}.enc" \ | ||
-out "${gpg_key_file}" -d | ||
|
||
# Import GPG key for signing repository files. | ||
gpg --import --batch "${gpg_key_file}" | ||
|
||
# Extract GPG key id for signing repository files. | ||
export GPG_SIGN_KEY="$(gpg --with-colons --import-options show-only \ | ||
--import "${gpg_key_file}" | grep ^sec: | cut -d: -f5)" | ||
|
||
# Setup environment variables for the update_repo.sh tool. | ||
export AWS_S3_ENDPOINT_URL="${DEPLOY_S3_ENDPOINT_URL}" | ||
export AWS_ACCESS_KEY_ID="${DEPLOY_S3_ACCESS_KEY_ID}" | ||
export AWS_SECRET_ACCESS_KEY="${DEPLOY_S3_SECRET_ACCESS_KEY}" | ||
|
||
# ${product} value may affect location of *.deb, *.rpm and related | ||
# files relative to a base repository URL. We can provide it or | ||
# miss: the script will generate correct repository metainfo | ||
# anyway. | ||
# | ||
# However providing meaningful value for this option enables | ||
# grouping of related set of packages into a subdirectory named as | ||
# ${product} (only for Deb repositories at moment of writing | ||
# this). | ||
# | ||
# It is enabled here for consistency with locations of other Deb | ||
# packages in our repositories, but in fact it is the internal | ||
# detail, which does not lead to any change in the user | ||
# experience. | ||
product=php-tarantool | ||
|
||
# Setup arguments that are common for all repositories | ||
# (1.10, 2.1, ...). | ||
update_repo_args="--os=${OS} --distribution=${DIST} --product=${product}" | ||
|
||
# Staging repository: rewrite a package if there is a previous one | ||
# of the same version. | ||
# | ||
# Note: It differs from a logic in deploy_packagecloud.sh. | ||
if [ "${configuration}" = staging ]; then | ||
update_repo_args="${update_repo_args} --force" | ||
fi | ||
|
||
# Deploy to S3 based repositories. | ||
for repo in 1.10 2.1 2.2 2.3 2.4 2.5; do | ||
# Note: The update_repo.sh tool automatically find | ||
# *.{rpm,deb,dsc} within a passed directory, so we just | ||
# pass the directory name: 'build'. | ||
|
||
# FIXME: Machine-local locking that is used in the | ||
# update_repo.sh tool is insufficient when we deploy from a | ||
# just created virtual machine. | ||
|
||
# Deploy to live repository (per-push). | ||
bucket="${DEPLOY_S3_LIVE_DIR}/${repo}" | ||
./update_repo.sh ${update_repo_args} --bucket="${bucket}" build | ||
|
||
# Deploy to release repository (tagged commits). | ||
if [ -n "${TRAVIS_TAG:-}" ]; then | ||
bucket="${DEPLOY_S3_RELEASE_DIR}/${repo}" | ||
./update_repo.sh ${update_repo_args} --bucket="${bucket}" build | ||
fi | ||
done |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,10 @@ | ||
#!/bin/sh | ||
|
||
# Prevent procmail package from asking configuration parameters | ||
# interactively. | ||
# See https://github.com/packpack/packpack/issues/7 | ||
export DEBIAN_FRONTEND=noninteractive | ||
|
||
apt-get install -y procmail # for lockfile tool | ||
apt-get install -y awscli | ||
apt-get install -y reprepro |
Binary file not shown.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,29 @@ | ||
--- a/update_repo.sh 2020-06-09 17:35:03.332961335 +0300 | ||
+++ b/update_repo.sh 2020-06-23 02:26:55.532653673 +0300 | ||
@@ -415,7 +415,7 @@ | ||
done | ||
# resign the selfsigned InRelease file | ||
$rm_file InRelease | ||
- gpg --clearsign -o InRelease Release | ||
+ gpg -u $GPG_SIGN_KEY --clearsign -o InRelease Release | ||
# resign the Release file | ||
$rm_file Release.gpg | ||
gpg -u $GPG_SIGN_KEY -abs -o Release.gpg Release | ||
@@ -784,7 +784,7 @@ | ||
EOF | ||
done | ||
tail -n 1 repodata.adding/repomd.xml >>repodata/repomd.xml | ||
- gpg --detach-sign --armor repodata/repomd.xml | ||
+ gpg -u $GPG_SIGN_KEY --detach-sign --armor repodata/repomd.xml | ||
|
||
# copy the packages to S3 | ||
for file in $pack_rpms ; do | ||
@@ -901,7 +901,7 @@ | ||
tail -n 1 repomd_saved.xml >>repomd.xml | ||
rm -f repomd_saved.xml repomd.xml.asc | ||
popd | ||
- gpg --detach-sign --armor repodata/repomd.xml | ||
+ gpg -u $GPG_SIGN_KEY --detach-sign --armor repodata/repomd.xml | ||
|
||
# update the metadata at the S3 | ||
$aws_sync_public repodata "$bucket_path/$repopath/repodata" |