Closed Bug 523420 Opened 13 years ago Closed 12 years ago
_upload .py fails when contrib dirs have contents owned by others
I ran into this while doing the rebuilds for tr for 3.5.4 build3. Running post-upload command: post_upload.py -p firefox -v 3.5.4 -n 3 --release-to-candidates-dir Traceback (most recent call last): File "/usr/bin/post_upload.py", line 243, in ? func(options, upload_dir, files) File "/usr/bin/post_upload.py", line 137, in ReleaseToCandidatesDir os.chmod(os.path.join(root, d), 0755) OSError: [Errno 1] Operation not permitted: '/home/ftp/pub/firefox/nightly/3.5.4-candidates/build3/contrib/solaris_pkgadd' Encountered error while uploading Essentially post_upload.py tries to chmod the entire candidates dir, but runs into files that it doesn't own under the contribs dirs. This causes the chmod to fail, and prevents the subsequent upload of the MAR file. I dodged around this during the release by applying the attached patch to the local copy of post_upload.py to avoid touching the contrib dirs. I'm open to other suggestions about how to approach this. It's an edge case to be sure.
Perhaps the download target failed to exclude contrib*/ when sucking builds down ? http://hg.mozilla.org/build/tools/file/380d197f23e5/release/signing/download-exclude.list
(In reply to comment #1) > Perhaps the download target failed to exclude contrib*/ when sucking builds > down ? Doesn't look that way. I checked both download-exclude.list files I used when signing (build3 and the tr rebuild) and they both exclude those dirs (and those dirs do not appear on keymaster in the downloaded files).
Mass move of bugs from Release Engineering:Future -> Release Engineering. See http://coop.deadsquid.com/2010/02/kiss-the-future-goodbye/ for more details.
Component: Release Engineering: Future → Release Engineering
Perhaps just creating the contrib/ dir earlier in the process so we can't get "scooped?"
Based on the other work I have planned for the quarter I don't think I'll be getting to this.
Whiteboard: [automation] → [automation][triagefollowup]
Ben: is my patch a valid solution here, or do we need something more elaborate?
(In reply to comment #6) > Based on the other work I have planned for the quarter I don't think I'll be > getting to this. Please disregard. (In reply to comment #7) > Ben: is my patch a valid solution here, or do we need something more elaborate? I haven't had a chance to really think about this, I'm not sure yet.
Whiteboard: [automation][triagefollowup] → [automation]
Coop, your patch seems like it would work and I can't think of any downsides. I'm going to get it landed.
Attachment #407345 - Flags: review+
Comment on attachment 407345 [details] [diff] [review] Ignore contrib dirs in post_upload.py Catlee points out that this patch has no effect because everything is commented out. I'll write the real one.
Attachment #407345 - Attachment is obsolete: true
Need to test this in staging still.
This patch will get us ensuring that contrib dirs have correct permissions and ignore any dirs inside of contrib. tested in staging.
Attachment #493430 - Flags: review?(coop) → review+
Comment on attachment 493430 [details] [diff] [review] tested, working version changeset: 1317:317feefa028f
Attachment #493430 - Flags: checked-in+
I updated the checkouts on stage, staging-stage, and preproduction-stage.
Status: NEW → RESOLVED
Closed: 12 years ago
Resolution: --- → FIXED
Product: mozilla.org → Release Engineering
You need to log in before you can comment on or make changes to this bug.