add a list of hashes for generate-release with the suite names they are for
remove the double indirection with print_HASH_files, directly call print_hash_files
and use the hashfuncs dict to know which hash function to call
Signed-off-by: Joerg Jaspert <joerg@debian.org>
{
Export "/srv/backports-master.debian.org/export/changelogs";
}
{
Export "/srv/backports-master.debian.org/export/changelogs";
}
+
+Generate-Releases
+{
+ MD5
+ {
+ lenny-backports;
+ lenny-backports-sloppy;
+ squeeze-backports;
+ };
+ SHA1
+ {
+ lenny-backports;
+ lenny-backports-sloppy;
+ squeeze-backports;
+ };
+ SHA256
+ {
+ lenny-backports;
+ lenny-backports-sloppy;
+ squeeze-backports;
+ };
+}
{
Export "/srv/security-master.debian.org/export/changelogs";
}
{
Export "/srv/security-master.debian.org/export/changelogs";
}
+
+Generate-Releases
+{
+ MD5
+ {
+ oldstable;
+ stable;
+ testing;
+ };
+ SHA1
+ {
+ oldstable;
+ stable;
+ testing;
+ };
+ SHA256
+ {
+ oldstable;
+ stable;
+ testing;
+ };
+}
Britney "/srv/ftp-master.debian.org/ftp/dists/testing/ChangeLog";
Export "/srv/ftp-master.debian.org/export/changelogs";
}
Britney "/srv/ftp-master.debian.org/ftp/dists/testing/ChangeLog";
Export "/srv/ftp-master.debian.org/export/changelogs";
}
+
+Generate-Releases
+{
+ MD5
+ {
+ oldstable;
+ oldstable-proposed-updates;
+ proposed-updates;
+ stable;
+ };
+ SHA1
+ {
+ oldstable;
+ oldstable-proposed-updates;
+ proposed-updates;
+ squeeze-updates;
+ stable;
+ testing;
+ testing-proposed-updates;
+ unstable;
+ experimental;
+ };
+ SHA256
+ {
+ oldstable;
+ oldstable-proposed-updates;
+ proposed-updates;
+ squeeze-updates;
+ stable;
+ testing;
+ testing-proposed-updates;
+ unstable;
+ experimental;
+ };
+}
decompressors = { 'zcat' : gzip.GzipFile,
'bzip2' : bz2.BZ2File }
decompressors = { 'zcat' : gzip.GzipFile,
'bzip2' : bz2.BZ2File }
+hashfuncs = { 'MD5' : apt_pkg.md5sum,
+ 'SHA1' : apt_pkg.sha1sum,
+ 'SHA256' : apt_pkg.sha256sum }
+
def print_hash_files (tree, files, hashop):
path = Cnf["Dir::Root"] + tree + "/"
for name in files:
def print_hash_files (tree, files, hashop):
path = Cnf["Dir::Root"] + tree + "/"
for name in files:
(cat, ext, name) = (name[1:j], name[j+1:k], name[k+1:])
file_handle = decompressors[ cat ]( "%s%s%s" % (path, name, ext) )
contents = file_handle.read()
(cat, ext, name) = (name[1:j], name[j+1:k], name[k+1:])
file_handle = decompressors[ cat ]( "%s%s%s" % (path, name, ext) )
contents = file_handle.read()
- hashvalue = hashop(contents)
+ hashvalue = hashfuncs[ hashop ](contents)
hashlen = len(contents)
else:
try:
file_handle = utils.open_file(path + name)
hashlen = len(contents)
else:
try:
file_handle = utils.open_file(path + name)
- hashvalue = hashop(file_handle)
+ hashvalue = hashfuncs[ hashop ](file_handle)
hashlen = os.stat(path + name).st_size
except:
raise
hashlen = os.stat(path + name).st_size
except:
raise
else:
out.write(" %s %8d %s\n" % (hashvalue, hashlen, name))
else:
out.write(" %s %8d %s\n" % (hashvalue, hashlen, name))
-def print_sha1_files (tree, files):
- print_hash_files (tree, files, apt_pkg.sha1sum)
-
-def print_sha256_files (tree, files):
- print_hash_files (tree, files, apt_pkg.sha256sum)
-
def write_release_file (relpath, suite, component, origin, label, arch, version="", suite_suffix="", notautomatic="", butautomaticupgrades=""):
try:
if os.access(relpath, os.F_OK):
def write_release_file (relpath, suite, component, origin, label, arch, version="", suite_suffix="", notautomatic="", butautomaticupgrades=""):
try:
if os.access(relpath, os.F_OK):
else:
print "ALERT: no tree/bindirectory for %s" % (tree)
else:
print "ALERT: no tree/bindirectory for %s" % (tree)
- out.write("SHA1:\n")
- print_sha1_files(tree, files)
- out.write("SHA256:\n")
- print_sha256_files(tree, files)
+ for hashvalue in cnf.SubTree("Generate-Releases").List():
+ if suite in [ i.lower() for i in cnf.ValueList("Generate-Releases::%s" % (hashvalue)) ]:
+ out.write("%s:\n" % (hashvalue))
+ print_hash_files(tree, files, hashvalue)
out.close()
if Cnf.has_key("Dinstall::SigningKeyring"):
out.close()
if Cnf.has_key("Dinstall::SigningKeyring"):