ts "locked part finished"
state "postlock"
+GO=(
+ FUNC="changelogs"
+ TIME="changelogs"
+ ARGS=""
+ ERR="false"
+)
+stage $GO &
+
GO=(
FUNC="pgdump_post"
TIME="pg_dump2"
{
Root "/srv/backports-master.debian.org/ftp/";
Pool "/srv/backports-master.debian.org/ftp/pool/";
+ Export "/srv/backports-master.debian.org/export/";
Templates "/srv/backports-master.debian.org/dak/templates/";
PoolRoot "pool/";
Lists "/srv/backports-master.debian.org/database/dists/";
{
Root "/srv/security-master.debian.org/ftp/";
Pool "/srv/security-master.debian.org/ftp/pool/";
+ Export "/srv/security-master.debian.org/export/";
Dak "/srv/security-master.debian.org/dak/";
Templates "/srv/security-master.debian.org/dak/templates/";
PoolRoot "pool/";
Override "/srv/security-master.debian.org/scripts/override/";
QueueBuild "/srv/security-master.debian.org/buildd/";
Upload "/srv/queued/ftpmaster/";
+ TempPath "/srv/security-master.debian.org/tmp";
Queue
{
Byhand "/srv/security-master.debian.org/queue/byhand/";
critical;
};
};
+
+Changelogs
+{
+ Export "/srv/security-master.debian.org/export/changelogs";
+}
--- /dev/null
+#!/bin/bash
+
+set -e
+set -u
+set -E
+
+export SCRIPTVARS=/srv/security-master.debian.org/dak/config/debian-security/vars
+. $SCRIPTVARS
+
+# Make sure we start out with a sane umask setting
+umask 022
+
+# And use one locale, no matter what the caller has set
+export LANG=C
+export LC_ALL=C
+
+. "${configdir}/../debian/common"
+
+# extract changelogs and stuff
+function changelogs() {
+ log "Extracting changelogs"
+ dak make-changelog -e
+ mkdir -p ${exportpublic}/changelogs
+ cd ${exportpublic}/changelogs
+ rsync -aHW --delete --delete-after --ignore-errors ${exportdir}/changelogs/. .
+ sudo -H -u archvsync /home/archvsync/runmirrors metasdo > ~dak/runmirrors-metadata.log 2>&1 &
+}
+
+changelogs
if not result:
stats['unpack'] += 1
for file in files:
- for f in glob(os.path.join(tempdir, 'debian', '*%s*' % file)):
+ for f in glob(os.path.join(tempdir, 'debian', '*%s' % file)):
for s in unpack[p][1]:
suite = os.path.join(unpack[p][0], '%s.%s' \
% (s, os.path.basename(f)))
spawn("apt-ftparchive generate %s" % (utils.which_apt_conf_file()))
print "Updating Release files..."
spawn("dak generate-releases")
- print "Triggering security mirrors..."
+ print "Triggering security mirrors... (this may take a while)"
spawn("/srv/security-master.debian.org/dak/config/debian-security/make-mirror.sh")
spawn("sudo -u archvsync -H /home/archvsync/signal_security")
+ print "Triggering metadata export for packages.d.o and other consumers"
+ spawn("/srv/security-master.debian.org/dak/config/debian-security/export.sh")
########################################################################
########################################################################
# Yes, we could do this inside do_Approve too. But this way we see who exactly
# called it (ownership of the file)
- dbchange=get_dbchange(os.path.basename(changes[0]), session)
- # strip epoch from version
- version=dbchange.version
- version=version[(version.find(':')+1):]
- acceptfilename="%s/COMMENTS/ACCEPT.%s_%s" % (os.path.dirname(os.path.abspath(changes[0])), dbchange.source, version)
+
+ acceptfiles={}
+ for change in changes:
+ dbchange=get_dbchange(os.path.basename(change), session)
+ # strip epoch from version
+ version=dbchange.version
+ version=version[(version.find(':')+1):]
+ acceptfilename="%s/COMMENTS/ACCEPT.%s_%s" % (os.path.dirname(os.path.abspath(changes[0])), dbchange.source, version)
+ acceptfiles[acceptfilename]=1
+
if Options["No-Action"]:
- print "Would create %s now and then go on to accept this package, but No-Action is set" % (acceptfilename)
+ print "Would create %s now and then go on to accept this package, but No-Action is set" % (acceptfiles.keys())
sys.exit(0)
- accept_file = file(acceptfilename, "w")
- accept_file.write("OK\n")
- accept_file.close()
+
+ for acceptfilename in acceptfiles.keys():
+ accept_file = file(acceptfilename, "w")
+ accept_file.write("OK\n")
+ accept_file.close()
+
do_Approve()
maps = [ (x[1], x[2]) for x in maps
if x[0] == "map" or x[0] == "silent-map" ]
s = [suite]
- for x in maps:
- if x[1] in s and x[0] not in s:
- s.append(x[0])
+ for (from_, to) in maps:
+ if from_ in s and to not in s:
+ s.append(to)
q = q.filter(DBSource.suites.any(Suite.suite_name.in_(s)))
close them or re-assign them to another package if the removed package
was superseded by another one.
+The version of this package that was in Debian prior to this removal
+can still be found using http://snapshot.debian.org/.
+
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to __BUG_NUMBER__@__BUG_SERVER__.
For details on the removal, please see http://__BUG_SERVER__/__BUG_NUMBER__
+The version of this package that was in Debian prior to this removal
+can still be found using http://snapshot.debian.org/.
+
This message was generated automatically; if you believe that there is
a problem with it please contact the archive administrators by mailing
__ADMIN_ADDRESS__.