3 # Check for obsolete binary packages
4 # Copyright (C) 2000, 2001, 2002, 2003, 2004, 2006 James Troup <james@nocrew.org>
6 # This program is free software; you can redistribute it and/or modify
7 # it under the terms of the GNU General Public License as published by
8 # the Free Software Foundation; either version 2 of the License, or
9 # (at your option) any later version.
11 # This program is distributed in the hope that it will be useful,
12 # but WITHOUT ANY WARRANTY; without even the implied warranty of
13 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 # GNU General Public License for more details.
16 # You should have received a copy of the GNU General Public License
17 # along with this program; if not, write to the Free Software
18 # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
20 ################################################################################
22 # ``If you're claiming that's a "problem" that needs to be "fixed",
23 # you might as well write some letters to God about how unfair entropy
24 # is while you're at it.'' -- 20020802143104.GA5628@azure.humbug.org.au
26 ## TODO: fix NBS looping for version, implement Dubious NBS, fix up output of duplicate source package stuff, improve experimental ?, add overrides, avoid ANAIS for duplicated packages
28 ################################################################################
30 import commands, pg, os, sys, time, re
32 from daklib import database
33 from daklib import utils
35 ################################################################################
39 suite = "unstable" # Default
41 no_longer_in_suite = {}; # Really should be static to add_nbs, but I'm lazy
46 ################################################################################
48 def usage(exit_code=0):
49 print """Usage: dak cruft-report
50 Check for obsolete or duplicated packages.
52 -h, --help show this help and exit.
53 -m, --mode=MODE chose the MODE to run in (full or daily).
54 -s, --suite=SUITE check suite SUITE.
55 -w, --wanna-build-dump where to find the copies of http://buildd.debian.org/stats/*.txt"""
58 ################################################################################
60 def add_nbs(nbs_d, source, version, package):
61 # Ensure the package is still in the suite (someone may have already removed it)
62 if no_longer_in_suite.has_key(package):
65 q = projectB.query("SELECT b.id FROM binaries b, bin_associations ba WHERE ba.bin = b.id AND ba.suite = %s AND b.package = '%s' LIMIT 1" % (suite_id, package))
67 no_longer_in_suite[package] = ""
70 nbs_d.setdefault(source, {})
71 nbs_d[source].setdefault(version, {})
72 nbs_d[source][version][package] = ""
74 ################################################################################
76 # Check for packages built on architectures they shouldn't be.
77 def do_anais(architecture, binaries_list, source):
78 if architecture == "any" or architecture == "all":
83 for arch in architecture.split():
84 architectures[arch.strip()] = ""
85 for binary in binaries_list:
86 q = projectB.query("SELECT a.arch_string, b.version FROM binaries b, bin_associations ba, architecture a WHERE ba.suite = %s AND ba.bin = b.id AND b.architecture = a.id AND b.package = '%s'" % (suite_id, binary))
92 if architectures.has_key(arch):
93 versions.append(version)
94 versions.sort(apt_pkg.VersionCompare)
96 latest_version = versions.pop()
99 # Check for 'invalid' architectures
104 if not architectures.has_key(arch):
105 versions_d.setdefault(version, [])
106 versions_d[version].append(arch)
109 anais_output += "\n (*) %s_%s [%s]: %s\n" % (binary, latest_version, source, architecture)
110 versions = versions_d.keys()
111 versions.sort(apt_pkg.VersionCompare)
112 for version in versions:
113 arches = versions_d[version]
115 anais_output += " o %s: %s\n" % (version, ", ".join(arches))
119 ################################################################################
121 # Check for out-of-date binaries on architectures that do not want to build that
122 # package any more, and have them listed as Not-For-Us
123 def do_nfu(nfu_packages):
128 for architecture in nfu_packages:
129 a2p[architecture] = []
130 for (package,bver,sver) in nfu_packages[architecture]:
131 output += " * [%s] does not want %s (binary %s, source %s)\n" % (architecture, package, bver, sver)
132 a2p[architecture].append(package)
136 print "Obsolete by Not-For-Us"
137 print "----------------------"
141 print "Suggested commands:"
142 for architecture in a2p:
143 if a2p[architecture]:
144 print (" dak rm -m \"[auto-cruft] NFU\" -s %s -a %s -b %s" %
145 (suite, architecture, " ".join(a2p[architecture])))
148 def parse_nfu(architecture):
149 # utils/hpodder_1.1.5.0: Not-For-Us [optional:out-of-date]
150 r = re.compile("^\w+/([^_]+)_.*: Not-For-Us")
154 filename = "%s/%s-all.txt" % (Cnf["Cruft-Report::Options::Wanna-Build-Dump"], architecture)
156 # Not all architectures have a wanna-build dump, for example armel at the time of writing
157 if os.path.exists(filename):
158 f = utils.open_file(filename)
170 ################################################################################
173 experimental_id = database.get_suite_id("experimental")
174 if experimental_id == -1:
176 # Check for packages in experimental obsoleted by versions in unstable
177 q = projectB.query("""
178 SELECT s.source, s.version AS experimental, s2.version AS unstable
179 FROM src_associations sa, source s, source s2, src_associations sa2
180 WHERE sa.suite = %s AND sa2.suite = %d AND sa.source = s.id
181 AND sa2.source = s2.id AND s.source = s2.source
182 AND versioncmp(s.version, s2.version) < 0""" % (experimental_id,
183 database.get_suite_id("unstable")))
187 print "Newer version in unstable"
188 print "-------------------------"
191 (source, experimental_version, unstable_version) = i
192 print " o %s (%s, %s)" % (source, experimental_version, unstable_version)
193 nviu_to_remove.append(source)
195 print "Suggested command:"
196 print " dak rm -m \"[auto-cruft] NVIU\" -s experimental %s" % (" ".join(nviu_to_remove))
199 ################################################################################
201 def do_nbs(real_nbs):
202 output = "Not Built from Source\n"
203 output += "---------------------\n\n"
206 nbs_keys = real_nbs.keys()
208 for source in nbs_keys:
209 output += " * %s_%s builds: %s\n" % (source,
210 source_versions.get(source, "??"),
211 source_binaries.get(source, "(source does not exist)"))
212 output += " but no longer builds:\n"
213 versions = real_nbs[source].keys()
214 versions.sort(apt_pkg.VersionCompare)
215 for version in versions:
216 packages = real_nbs[source][version].keys()
219 nbs_to_remove.append(pkg)
220 output += " o %s: %s\n" % (version, ", ".join(packages))
227 print "Suggested command:"
228 print " dak rm -m \"[auto-cruft] NBS\" -s %s -b %s" % (suite, " ".join(nbs_to_remove))
231 ################################################################################
233 def do_dubious_nbs(dubious_nbs):
238 dubious_nbs_keys = dubious_nbs.keys()
239 dubious_nbs_keys.sort()
240 for source in dubious_nbs_keys:
241 print " * %s_%s builds: %s" % (source,
242 source_versions.get(source, "??"),
243 source_binaries.get(source, "(source does not exist)"))
244 print " won't admit to building:"
245 versions = dubious_nbs[source].keys()
246 versions.sort(apt_pkg.VersionCompare)
247 for version in versions:
248 packages = dubious_nbs[source][version].keys()
250 print " o %s: %s" % (version, ", ".join(packages))
254 ################################################################################
256 def do_obsolete_source(duplicate_bins, bin2source):
258 for key in duplicate_bins.keys():
259 (source_a, source_b) = key.split('_')
260 for source in [ source_a, source_b ]:
261 if not obsolete.has_key(source):
262 if not source_binaries.has_key(source):
263 # Source has already been removed
266 obsolete[source] = [ i.strip() for i in source_binaries[source].split(',') ]
267 for binary in duplicate_bins[key]:
268 if bin2source.has_key(binary) and bin2source[binary]["source"] == source:
270 if binary in obsolete[source]:
271 obsolete[source].remove(binary)
274 output = "Obsolete source package\n"
275 output += "-----------------------\n\n"
276 obsolete_keys = obsolete.keys()
278 for source in obsolete_keys:
279 if not obsolete[source]:
280 to_remove.append(source)
281 output += " * %s (%s)\n" % (source, source_versions[source])
282 for binary in [ i.strip() for i in source_binaries[source].split(',') ]:
283 if bin2source.has_key(binary):
284 output += " o %s (%s) is built by %s.\n" \
285 % (binary, bin2source[binary]["version"],
286 bin2source[binary]["source"])
288 output += " o %s is not built.\n" % binary
294 print "Suggested command:"
295 print " dak rm -S -p -m \"[auto-cruft] obsolete source package\" %s" % (" ".join(to_remove))
298 def get_suite_binaries():
299 # Initalize a large hash table of all binary packages
303 sys.stderr.write("[Getting a list of binary packages in %s..." % (suite))
304 q = projectB.query("SELECT distinct b.package FROM binaries b, bin_associations ba WHERE ba.suite = %s AND ba.bin = b.id" % (suite_id))
306 sys.stderr.write("done. (%d seconds)]\n" % (int(time.time()-before)))
312 ################################################################################
315 global Cnf, projectB, suite, suite_id, source_binaries, source_versions
317 Cnf = utils.get_conf()
319 Arguments = [('h',"help","Cruft-Report::Options::Help"),
320 ('m',"mode","Cruft-Report::Options::Mode", "HasArg"),
321 ('s',"suite","Cruft-Report::Options::Suite","HasArg"),
322 ('w',"wanna-build-dump","Cruft-Report::Options::Wanna-Build-Dump","HasArg")]
324 if not Cnf.has_key("Cruft-Report::Options::%s" % (i)):
325 Cnf["Cruft-Report::Options::%s" % (i)] = ""
326 Cnf["Cruft-Report::Options::Suite"] = Cnf["Dinstall::DefaultSuite"]
328 if not Cnf.has_key("Cruft-Report::Options::Mode"):
329 Cnf["Cruft-Report::Options::Mode"] = "daily"
331 if not Cnf.has_key("Cruft-Report::Options::Wanna-Build-Dump"):
332 Cnf["Cruft-Report::Options::Wanna-Build-Dump"] = "./wanna-build-dump"
334 apt_pkg.ParseCommandLine(Cnf, Arguments, sys.argv)
336 Options = Cnf.SubTree("Cruft-Report::Options")
340 # Set up checks based on mode
341 if Options["Mode"] == "daily":
342 checks = [ "nbs", "nviu", "obsolete source" ]
343 elif Options["Mode"] == "full":
344 checks = [ "nbs", "nviu", "obsolete source", "nfu", "dubious nbs", "bnb", "bms", "anais" ]
346 utils.warn("%s is not a recognised mode - only 'full' or 'daily' are understood." % (Options["Mode"]))
349 projectB = pg.connect(Cnf["DB::Name"], Cnf["DB::Host"], int(Cnf["DB::Port"]))
350 database.init(Cnf, projectB)
364 suite = Options["Suite"]
365 suite_id = database.get_suite_id(suite)
370 bins_in_suite = get_suite_binaries()
372 # Checks based on the Sources files
373 components = Cnf.ValueList("Suite::%s::Components" % (suite))
374 for component in components:
375 filename = "%s/dists/%s/%s/source/Sources.gz" % (Cnf["Dir::Root"], suite, component)
376 # apt_pkg.ParseTagFile needs a real file handle and can't handle a GzipFile instance...
377 temp_filename = utils.temp_filename()
378 (result, output) = commands.getstatusoutput("gunzip -c %s > %s" % (filename, temp_filename))
380 sys.stderr.write("Gunzip invocation failed!\n%s\n" % (output))
382 sources = utils.open_file(temp_filename)
383 Sources = apt_pkg.ParseTagFile(sources)
384 while Sources.Step():
385 source = Sources.Section.Find('Package')
386 source_version = Sources.Section.Find('Version')
387 architecture = Sources.Section.Find('Architecture')
388 binaries = Sources.Section.Find('Binary')
389 binaries_list = [ i.strip() for i in binaries.split(',') ]
392 # Check for binaries not built on any architecture.
393 for binary in binaries_list:
394 if not bins_in_suite.has_key(binary):
395 bin_not_built.setdefault(source, {})
396 bin_not_built[source][binary] = ""
398 if "anais" in checks:
399 anais_output += do_anais(architecture, binaries_list, source)
401 # Check for duplicated packages and build indices for checking "no source" later
402 source_index = component + '/' + source
403 if src_pkgs.has_key(source):
404 print " %s is a duplicated source package (%s and %s)" % (source, source_index, src_pkgs[source])
405 src_pkgs[source] = source_index
406 for binary in binaries_list:
407 if bin_pkgs.has_key(binary):
408 key_list = [ source, bin_pkgs[binary] ]
410 key = '_'.join(key_list)
411 duplicate_bins.setdefault(key, [])
412 duplicate_bins[key].append(binary)
413 bin_pkgs[binary] = source
414 source_binaries[source] = binaries
415 source_versions[source] = source_version
418 os.unlink(temp_filename)
420 # Checks based on the Packages files
421 check_components = components[:]
422 if suite != "experimental":
423 check_components.append('main/debian-installer');
424 for component in check_components:
425 architectures = filter(utils.real_arch, Cnf.ValueList("Suite::%s::Architectures" % (suite)))
426 for architecture in architectures:
427 filename = "%s/dists/%s/%s/binary-%s/Packages.gz" % (Cnf["Dir::Root"], suite, component, architecture)
428 # apt_pkg.ParseTagFile needs a real file handle
429 temp_filename = utils.temp_filename()
430 (result, output) = commands.getstatusoutput("gunzip -c %s > %s" % (filename, temp_filename))
432 sys.stderr.write("Gunzip invocation failed!\n%s\n" % (output))
435 nfu_packages.setdefault(architecture,[])
436 nfu_entries = parse_nfu(architecture)
438 packages = utils.open_file(temp_filename)
439 Packages = apt_pkg.ParseTagFile(packages)
440 while Packages.Step():
441 package = Packages.Section.Find('Package')
442 source = Packages.Section.Find('Source', "")
443 version = Packages.Section.Find('Version')
446 if bin2source.has_key(package) and \
447 apt_pkg.VersionCompare(version, bin2source[package]["version"]) > 0:
448 bin2source[package]["version"] = version
449 bin2source[package]["source"] = source
451 bin2source[package] = {}
452 bin2source[package]["version"] = version
453 bin2source[package]["source"] = source
454 if source.find("(") != -1:
455 m = utils.re_extract_src_version.match(source)
458 if not bin_pkgs.has_key(package):
459 nbs.setdefault(source,{})
460 nbs[source].setdefault(package, {})
461 nbs[source][package][version] = ""
463 previous_source = bin_pkgs[package]
464 if previous_source != source:
465 key_list = [ source, previous_source ]
467 key = '_'.join(key_list)
468 duplicate_bins.setdefault(key, [])
469 if package not in duplicate_bins[key]:
470 duplicate_bins[key].append(package)
471 if package in nfu_entries and \
472 version != source_versions[source]: # only suggest to remove out-of-date packages
473 nfu_packages[architecture].append((package,version,source_versions[source]))
476 os.unlink(temp_filename)
478 if "obsolete source" in checks:
479 do_obsolete_source(duplicate_bins, bin2source)
481 # Distinguish dubious (version numbers match) and 'real' NBS (they don't)
484 for source in nbs.keys():
485 for package in nbs[source].keys():
486 versions = nbs[source][package].keys()
487 versions.sort(apt_pkg.VersionCompare)
488 latest_version = versions.pop()
489 source_version = source_versions.get(source,"0")
490 if apt_pkg.VersionCompare(latest_version, source_version) == 0:
491 add_nbs(dubious_nbs, source, latest_version, package)
493 add_nbs(real_nbs, source, latest_version, package)
503 if Options["Mode"] == "full":
511 print "Unbuilt binary packages"
512 print "-----------------------"
514 keys = bin_not_built.keys()
517 binaries = bin_not_built[source].keys()
519 print " o %s: %s" % (source, ", ".join(binaries))
523 print "Built from multiple source packages"
524 print "-----------------------------------"
526 keys = duplicate_bins.keys()
529 (source_a, source_b) = key.split("_")
530 print " o %s & %s => %s" % (source_a, source_b, ", ".join(duplicate_bins[key]))
533 if "anais" in checks:
534 print "Architecture Not Allowed In Source"
535 print "----------------------------------"
539 if "dubious nbs" in checks:
540 do_dubious_nbs(dubious_nbs)
543 ################################################################################
545 if __name__ == '__main__':