commit ed35aa668c0b87348516bb3e208e57505b783719 Author: David Fifield david@bamsoftware.com Date: Thu Nov 7 04:29:48 2013 +0000
Download argparse.
It's on a mirror because it 404s half the time. Restarting the download right away always works. But it often fails the first time you run fetch-inputs.sh after a while. The googlecode download also has the property that you have to download the entire file even if your local copy is newer (that's why the TOOLCHAIN4 download from googlecode is also disabled), but that's not as big a problem as the failed downloads because the argparse package is small. --- gitian/fetch-inputs.sh | 13 ++++++++++++- gitian/versions | 4 ++++ gitian/versions.alpha | 4 ++++ 3 files changed, 20 insertions(+), 1 deletion(-)
diff --git a/gitian/fetch-inputs.sh b/gitian/fetch-inputs.sh index 1fdaa66..dc6332b 100755 --- a/gitian/fetch-inputs.sh +++ b/gitian/fetch-inputs.sh @@ -4,6 +4,7 @@ #
MIRROR_URL=https://people.torproject.org/~mikeperry/mirrors/sources/ +MIRROR_URL_DCF=https://people.torproject.org/~dcf/mirrors/sources/ set -e set -u umask 0022 @@ -158,6 +159,15 @@ do get "${!PACKAGE}" "${MIRROR_URL}${!PACKAGE}" done
+# XXX: Omit ARGPARSE because Google won't allow wget -N and because the +# download seems to 404 about 50% of the time. +for i in ARGPARSE +do + PACKAGE="${i}_PACKAGE" + URL="${MIRROR_URL_DCF}${!PACKAGE}" + get "${!PACKAGE}" "${MIRROR_URL_DCF}${!PACKAGE}" +done + # Verify packages with weak or no signatures via multipath downloads # (OpenSSL is signed with MD5, and OSXSDK is not signed at all) # XXX: Google won't allow wget -N.. We need to re-download the whole @@ -200,7 +210,7 @@ fi
# Verify packages with weak or no signatures via direct sha256 check # (OpenSSL is signed with MD5, and OSXSDK is not signed at all) -for i in OSXSDK TOOLCHAIN4 NOSCRIPT MINGW MSVCR100 PYCRYPTO # OPENSSL +for i in OSXSDK TOOLCHAIN4 NOSCRIPT MINGW MSVCR100 PYCRYPTO ARGPARSE # OPENSSL do PACKAGE="${i}_PACKAGE" HASH="${i}_HASH" @@ -240,6 +250,7 @@ ln -sf "$BINUTILS_PACKAGE" binutils.tar.bz2 ln -sf "$GCC_PACKAGE" gcc.tar.bz2 ln -sf "$PYTHON_PACKAGE" python.tar.bz2 ln -sf "$PYCRYPTO_PACKAGE" pycrypto.tar.gz +ln -sf "$ARGPARSE_PACKAGE" argparse.tar.gz
# Fetch latest gitian-builder itself # XXX - this is broken if a non-standard inputs dir is selected using the command line flag. diff --git a/gitian/versions b/gitian/versions index d62333f..fe0b1e0 100755 --- a/gitian/versions +++ b/gitian/versions @@ -23,6 +23,7 @@ BINUTILS_VER=2.22 GCC_VER=4.6.3 PYTHON_VER=2.7.5 PYCRYPTO_VER=2.6.1 +ARGPARSE_VER=1.2.1
## File names for the source packages # OPENSSL_PACKAGE=openssl-${OPENSSL_VER}.tar.gz @@ -35,6 +36,7 @@ BINUTILS_PACKAGE=binutils-${BINUTILS_VER}.tar.bz2 GCC_PACKAGE=gcc-${GCC_VER}.tar.bz2 PYTHON_PACKAGE=Python-${PYTHON_VER}.tar.bz2 PYCRYPTO_PACKAGE=pycrypto-${PYCRYPTO_VER}.tar.gz +ARGPARSE_PACKAGE=argparse-${ARGPARSE_VER}.tar.gz
# Hashes for packages with weak sigs or no sigs # OPENSSL_HASH=f74f15e8c8ff11aa3d5bb5f276d202ec18d7246e95f961db76054199c69c1ae3 @@ -44,6 +46,7 @@ NOSCRIPT_HASH=5ac1a5c727a5101fd7673ba48179a52ca1804149ed1b67e6172724606355440e MINGW_HASH=a5b03d0448a309341be4cf34c6ad3016d04c89952dca5243254b4d6c738b164f MSVCR100_HASH=1221a09484964a6f38af5e34ee292b9afefccb3dc6e55435fd3aaf7c235d9067 PYCRYPTO_HASH=f2ce1e989b272cfcb677616763e0a2e7ec659effa67a88aa92b3a65528f60a3c +ARGPARSE_HASH=ddaf4b0a618335a32b6664d4ae038a1de8fbada3b25033f9021510ed2b3941a4
## Non-git package URLs # OPENSSL_URL=https://www.openssl.org/source/$%7BOPENSSL_PACKAGE%7D @@ -54,3 +57,4 @@ GCC_URL=https://ftp.gnu.org/gnu/gcc/gcc-$%7BGCC_VER%7D/$%7BGCC_PACKAGE%7D NOSCRIPT_URL=https://addons.cdn.mozilla.net/storage/public-staging/722/$%7BNOSCRIPT_PACKA... PYTHON_URL=http://www.python.org/ftp/python/$%7BPYTHON_VER%7D/$%7BPYTHON_PACKAGE%7D PYCRYPTO_URL=https://ftp.dlitz.net/pub/dlitz/crypto/pycrypto/$%7BPYCRYPTO_PACKAGE%7D +ARGPARSE_URL=https://argparse.googlecode.com/files/$%7BARGPARSE_PACKAGE%7D diff --git a/gitian/versions.alpha b/gitian/versions.alpha index 042049d..8c8d58d 100755 --- a/gitian/versions.alpha +++ b/gitian/versions.alpha @@ -23,6 +23,7 @@ BINUTILS_VER=2.22 GCC_VER=4.6.3 PYTHON_VER=2.7.5 PYCRYPTO_VER=2.6.1 +ARGPARSE_VER=1.2.1
## File names for the source packages # OPENSSL_PACKAGE=openssl-${OPENSSL_VER}.tar.gz @@ -35,6 +36,7 @@ BINUTILS_PACKAGE=binutils-${BINUTILS_VER}.tar.bz2 GCC_PACKAGE=gcc-${GCC_VER}.tar.bz2 PYTHON_PACKAGE=Python-${PYTHON_VER}.tar.bz2 PYCRYPTO_PACKAGE=pycrypto-${PYCRYPTO_VER}.tar.gz +ARGPARSE_PACKAGE=argparse-${ARGPARSE_VER}.tar.gz
# Hashes for packages with weak sigs or no sigs # OPENSSL_HASH=f74f15e8c8ff11aa3d5bb5f276d202ec18d7246e95f961db76054199c69c1ae3 @@ -44,6 +46,7 @@ NOSCRIPT_HASH=5ac1a5c727a5101fd7673ba48179a52ca1804149ed1b67e6172724606355440e MINGW_HASH=a5b03d0448a309341be4cf34c6ad3016d04c89952dca5243254b4d6c738b164f MSVCR100_HASH=1221a09484964a6f38af5e34ee292b9afefccb3dc6e55435fd3aaf7c235d9067 PYCRYPTO_HASH=f2ce1e989b272cfcb677616763e0a2e7ec659effa67a88aa92b3a65528f60a3c +ARGPARSE_HASH=ddaf4b0a618335a32b6664d4ae038a1de8fbada3b25033f9021510ed2b3941a4
## Non-git package URLs # OPENSSL_URL=https://www.openssl.org/source/$%7BOPENSSL_PACKAGE%7D @@ -54,3 +57,4 @@ GCC_URL=https://ftp.gnu.org/gnu/gcc/gcc-$%7BGCC_VER%7D/$%7BGCC_PACKAGE%7D NOSCRIPT_URL=https://addons.cdn.mozilla.net/storage/public-staging/722/$%7BNOSCRIPT_PACKA... PYTHON_URL=http://www.python.org/ftp/python/$%7BPYTHON_VER%7D/$%7BPYTHON_PACKAGE%7D PYCRYPTO_URL=https://ftp.dlitz.net/pub/dlitz/crypto/pycrypto/$%7BPYCRYPTO_PACKAGE%7D +ARGPARSE_URL=https://argparse.googlecode.com/files/$%7BARGPARSE_PACKAGE%7D