from daklib.summarystats import SummaryStats
from daklib.holding import Holding
from daklib.config import Config
+from daklib.regexes import re_match_expired
###############################################################################
for s in u.pkg.changes["distribution"].keys():
suite = get_suite(s, session)
if suite.policy_queue:
- if not chg or chg.approved_for_id != su.policy_queue.policy_queue_id:
+ if not chg or chg.approved_for_id != suite.policy_queue.policy_queue_id:
# This routine will check whether the upload is a binary
# upload when the source is already in the target suite. If
# so, we skip the policy queue, otherwise we go there.
elif answer == 'A':
if not chg:
chg = u.pkg.add_known_changes(holding.holding_dir, session=session)
+ session.commit()
u.accept(summary, short_summary, session)
u.check_override()
chg.clean_from_queue()
u.remove()
elif answer == 'Q':
byebye()
+ sys.exit(0)
session.commit()
if u.pkg.changes["fingerprint"]:
valid_changes_p = u.load_changes(changespath)
else:
+ for reason in rejects:
+ if re_match_expired.match(reason):
+ # Hrm, key expired. Lets see if we can still parse the .changes before
+ # we reject. Then we would be able to mail the maintainer, instead of
+ # just silently dropping the upload.
+ u.load_changes(changespath)
valid_changes_p = False
u.rejects.extend(rejects)
valid_dsc_p = u.check_dsc(not Options["No-Action"])
if valid_dsc_p and not Options["No-Action"]:
u.check_source()
- u.check_lintian()
u.check_hashes()
+ if valid_dsc_p and not Options["No-Action"] and not len(u.rejects):
+ u.check_lintian()
u.check_urgency()
u.check_timestamps()
u.check_signed_by_key()