Summary: This commit doesn't change license of any file. It just makes the license implicit (inherited from LICENSE file in the root directory). We are removing the headers for these reasons: - It wastes space in editors, less code is visible in editor upon opening a file. - It brings noise to diff of the first change of any file every year. - It confuses Git file copy detection when creating small files. - We don't have an explicit license header in other files (JS, CSS, images, documentation). - Using license header in every file is not obligatory: http://www.apache.org/dev/apply-license.html#new. This change is approved by Alma Chao (Lead Open Source and IP Counsel at Facebook). Test Plan: Verified that the license survived only in LICENSE file and that it didn't modify externals. Reviewers: epriestley, davidrecordon Reviewed By: epriestley CC: aran, Korvin Maniphest Tasks: T2035 Differential Revision: https://secure.phabricator.com/D3886
		
			
				
	
	
		
			96 lines
		
	
	
		
			3.3 KiB
		
	
	
	
		
			PHP
		
	
	
		
			Executable File
		
	
	
	
	
			
		
		
	
	
			96 lines
		
	
	
		
			3.3 KiB
		
	
	
	
		
			PHP
		
	
	
		
			Executable File
		
	
	
	
	
#!/usr/bin/env php
 | 
						|
<?php
 | 
						|
 | 
						|
$root = dirname(dirname(dirname(__FILE__)));
 | 
						|
require_once $root.'/scripts/__init_script__.php';
 | 
						|
 | 
						|
if (empty($argv[1])) {
 | 
						|
  echo "usage: test_connection.php <repository_callsign>\n";
 | 
						|
  exit(1);
 | 
						|
}
 | 
						|
 | 
						|
echo phutil_console_wrap(
 | 
						|
  phutil_console_format(
 | 
						|
    'This script will test that you have configured valid credentials for '.
 | 
						|
    'access to a repository, so the Phabricator daemons can pull from it. '.
 | 
						|
    'You should run this as the **same user you will run the daemons as**, '.
 | 
						|
    'from the **same machine they will run from**. Doing this will help '.
 | 
						|
    'detect various problems with your configuration, such as SSH issues.'));
 | 
						|
 | 
						|
list($whoami) = execx('whoami');
 | 
						|
$whoami = trim($whoami);
 | 
						|
 | 
						|
$ok = phutil_console_confirm("Do you want to continue as '{$whoami}'?");
 | 
						|
if (!$ok) {
 | 
						|
  die(1);
 | 
						|
}
 | 
						|
 | 
						|
$callsign = $argv[1];
 | 
						|
echo "Loading '{$callsign}' repository...\n";
 | 
						|
$repository = id(new PhabricatorRepository())->loadOneWhere(
 | 
						|
  'callsign = %s',
 | 
						|
  $argv[1]);
 | 
						|
if (!$repository) {
 | 
						|
  throw new Exception("No such repository exists!");
 | 
						|
}
 | 
						|
 | 
						|
$vcs = $repository->getVersionControlSystem();
 | 
						|
 | 
						|
PhutilServiceProfiler::installEchoListener();
 | 
						|
 | 
						|
echo phutil_console_format(
 | 
						|
  "\n".
 | 
						|
  "**NOTE:** If you are prompted for an SSH password in the next step, the\n".
 | 
						|
  "daemon won't work because it doesn't have the password and can't respond\n".
 | 
						|
  "to an interactive prompt. Instead of typing the password, it will hang\n".
 | 
						|
  "forever when prompted. There are several ways to resolve this:\n\n".
 | 
						|
  "  - Run the daemon inside an ssh-agent session where you have unlocked\n".
 | 
						|
  "    the key (most secure, but most complicated).\n".
 | 
						|
  "  - Generate a new, passwordless certificate for the daemon to use\n".
 | 
						|
  "    (usually quite easy).\n".
 | 
						|
  "  - Remove the passphrase from the key with `ssh-keygen -p`\n".
 | 
						|
  "    (easy, but questionable).");
 | 
						|
 | 
						|
phutil_console_confirm('Did you read all that?', $default_no = false);
 | 
						|
 | 
						|
echo "Trying to connect to the remote...\n";
 | 
						|
switch ($vcs) {
 | 
						|
  case PhabricatorRepositoryType::REPOSITORY_TYPE_SVN:
 | 
						|
    $err = $repository->passthruRemoteCommand(
 | 
						|
      '--limit 1 log %s',
 | 
						|
      $repository->getRemoteURI());
 | 
						|
    break;
 | 
						|
  case PhabricatorRepositoryType::REPOSITORY_TYPE_GIT:
 | 
						|
    // Do an ls-remote on a nonexistent ref, which we expect to just return
 | 
						|
    // nothing.
 | 
						|
    $err = $repository->passthruRemoteCommand(
 | 
						|
      'ls-remote %s %s',
 | 
						|
      $repository->getRemoteURI(),
 | 
						|
      'just-testing');
 | 
						|
    break;
 | 
						|
  case PhabricatorRepositoryType::REPOSITORY_TYPE_MERCURIAL:
 | 
						|
    // TODO: 'hg id' doesn't support --insecure so we can't tell it not to
 | 
						|
    // spew. If 'hg id' eventually supports --insecure, consider using it.
 | 
						|
    echo "(It is safe to ignore any 'certificate with fingerprint ... not ".
 | 
						|
         "verified' warnings, although you may want to configure Mercurial ".
 | 
						|
         "to recognize the server's fingerprint/certificate.)\n";
 | 
						|
    $err = $repository->passthruRemoteCommand(
 | 
						|
      'id --rev tip %s',
 | 
						|
      $repository->getRemoteURI());
 | 
						|
    break;
 | 
						|
  default:
 | 
						|
    throw new Exception("Unsupported repository type.");
 | 
						|
}
 | 
						|
 | 
						|
if ($err) {
 | 
						|
  echo phutil_console_format(
 | 
						|
    "<bg:red>** FAIL **</bg> Connection failed. The credentials for this ".
 | 
						|
    "repository appear to be incorrectly configured.\n");
 | 
						|
  exit(1);
 | 
						|
} else {
 | 
						|
  echo phutil_console_format(
 | 
						|
    "<bg:green>** OKAY **</bg> Connection successful. The credentials for ".
 | 
						|
    "this repository appear to be correctly configured.\n");
 | 
						|
}
 | 
						|
 |