3 # Check for obsolete binary packages
4 # Copyright (C) 2000, 2001, 2002, 2003, 2004, 2006 James Troup <james@nocrew.org>
6 # This program is free software; you can redistribute it and/or modify
7 # it under the terms of the GNU General Public License as published by
8 # the Free Software Foundation; either version 2 of the License, or
9 # (at your option) any later version.
11 # This program is distributed in the hope that it will be useful,
12 # but WITHOUT ANY WARRANTY; without even the implied warranty of
13 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 # GNU General Public License for more details.
16 # You should have received a copy of the GNU General Public License
17 # along with this program; if not, write to the Free Software
18 # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
20 ################################################################################
22 # ``If you're claiming that's a "problem" that needs to be "fixed",
23 # you might as well write some letters to God about how unfair entropy
24 # is while you're at it.'' -- 20020802143104.GA5628@azure.humbug.org.au
26 ## TODO: fix NBS looping for version, implement Dubious NBS, fix up output of duplicate source package stuff, improve experimental ?, add overrides, avoid ANAIS for duplicated packages
28 ################################################################################
30 import commands, pg, os, sys, time
32 import daklib.database as database
33 import daklib.utils as utils
35 ################################################################################
39 suite = "unstable" # Default
41 no_longer_in_suite = {}; # Really should be static to add_nbs, but I'm lazy
46 ################################################################################
48 def usage(exit_code=0):
49 print """Usage: dak cruft-report
50 Check for obsolete or duplicated packages.
52 -h, --help show this help and exit.
53 -m, --mode=MODE chose the MODE to run in (full or daily).
54 -s, --suite=SUITE check suite SUITE."""
57 ################################################################################
59 def add_nbs(nbs_d, source, version, package):
60 # Ensure the package is still in the suite (someone may have already removed it)
61 if no_longer_in_suite.has_key(package):
64 q = projectB.query("SELECT b.id FROM binaries b, bin_associations ba WHERE ba.bin = b.id AND ba.suite = %s AND b.package = '%s' LIMIT 1" % (suite_id, package))
66 no_longer_in_suite[package] = ""
69 nbs_d.setdefault(source, {})
70 nbs_d[source].setdefault(version, {})
71 nbs_d[source][version][package] = ""
73 ################################################################################
75 # Check for packages built on architectures they shouldn't be.
76 def do_anais(architecture, binaries_list, source):
77 if architecture == "any" or architecture == "all":
82 for arch in architecture.split():
83 architectures[arch.strip()] = ""
84 for binary in binaries_list:
85 q = projectB.query("SELECT a.arch_string, b.version FROM binaries b, bin_associations ba, architecture a WHERE ba.suite = %s AND ba.bin = b.id AND b.architecture = a.id AND b.package = '%s'" % (suite_id, binary))
91 if architectures.has_key(arch):
92 versions.append(version)
93 versions.sort(apt_pkg.VersionCompare)
95 latest_version = versions.pop()
98 # Check for 'invalid' architectures
103 if not architectures.has_key(arch):
104 versions_d.setdefault(version, [])
105 versions_d[version].append(arch)
108 anais_output += "\n (*) %s_%s [%s]: %s\n" % (binary, latest_version, source, architecture)
109 versions = versions_d.keys()
110 versions.sort(apt_pkg.VersionCompare)
111 for version in versions:
112 arches = versions_d[version]
114 anais_output += " o %s: %s\n" % (version, ", ".join(arches))
117 ################################################################################
120 experimental_id = database.get_suite_id("experimental")
121 if experimental_id == -1:
123 # Check for packages in experimental obsoleted by versions in unstable
124 q = projectB.query("""
125 SELECT s.source, s.version AS experimental, s2.version AS unstable
126 FROM src_associations sa, source s, source s2, src_associations sa2
127 WHERE sa.suite = %s AND sa2.suite = %d AND sa.source = s.id
128 AND sa2.source = s2.id AND s.source = s2.source
129 AND versioncmp(s.version, s2.version) < 0""" % (experimental_id,
130 database.get_suite_id("unstable")))
134 print "Newer version in unstable"
135 print "-------------------------"
138 (source, experimental_version, unstable_version) = i
139 print " o %s (%s, %s)" % (source, experimental_version, unstable_version)
140 nviu_to_remove.append(source)
142 print "Suggested command:"
143 print " dak rm -m \"[auto-cruft] NVIU\" -s experimental %s" % (" ".join(nviu_to_remove))
146 ################################################################################
148 def do_nbs(real_nbs):
149 output = "Not Built from Source\n"
150 output += "---------------------\n\n"
153 nbs_keys = real_nbs.keys()
155 for source in nbs_keys:
156 output += " * %s_%s builds: %s\n" % (source,
157 source_versions.get(source, "??"),
158 source_binaries.get(source, "(source does not exist)"))
159 output += " but no longer builds:\n"
160 versions = real_nbs[source].keys()
161 versions.sort(apt_pkg.VersionCompare)
162 for version in versions:
163 packages = real_nbs[source][version].keys()
166 nbs_to_remove.append(pkg)
167 output += " o %s: %s\n" % (version, ", ".join(packages))
174 print "Suggested command:"
175 print " dak rm -m \"[auto-cruft] NBS\" -s %s -b %s" % (suite, " ".join(nbs_to_remove))
178 ################################################################################
180 def do_dubious_nbs(dubious_nbs):
185 dubious_nbs_keys = dubious_nbs.keys()
186 dubious_nbs_keys.sort()
187 for source in dubious_nbs_keys:
188 print " * %s_%s builds: %s" % (source,
189 source_versions.get(source, "??"),
190 source_binaries.get(source, "(source does not exist)"))
191 print " won't admit to building:"
192 versions = dubious_nbs[source].keys()
193 versions.sort(apt_pkg.VersionCompare)
194 for version in versions:
195 packages = dubious_nbs[source][version].keys()
197 print " o %s: %s" % (version, ", ".join(packages))
201 ################################################################################
203 def do_obsolete_source(duplicate_bins, bin2source):
205 for key in duplicate_bins.keys():
206 (source_a, source_b) = key.split('_')
207 for source in [ source_a, source_b ]:
208 if not obsolete.has_key(source):
209 if not source_binaries.has_key(source):
210 # Source has already been removed
213 obsolete[source] = [ i.strip() for i in source_binaries[source].split(',') ]
214 for binary in duplicate_bins[key]:
215 if bin2source.has_key(binary) and bin2source[binary]["source"] == source:
217 if binary in obsolete[source]:
218 obsolete[source].remove(binary)
221 output = "Obsolete source package\n"
222 output += "-----------------------\n\n"
223 obsolete_keys = obsolete.keys()
225 for source in obsolete_keys:
226 if not obsolete[source]:
227 to_remove.append(source)
228 output += " * %s (%s)\n" % (source, source_versions[source])
229 for binary in [ i.strip() for i in source_binaries[source].split(',') ]:
230 if bin2source.has_key(binary):
231 output += " o %s (%s) is built by %s.\n" \
232 % (binary, bin2source[binary]["version"],
233 bin2source[binary]["source"])
235 output += " o %s is not built.\n" % binary
241 print "Suggested command:"
242 print " dak rm -S -p -m \"[auto-cruft] obsolete source package\" %s" % (" ".join(to_remove))
245 ################################################################################
248 global Cnf, projectB, suite, suite_id, source_binaries, source_versions
250 Cnf = utils.get_conf()
252 Arguments = [('h',"help","Cruft-Report::Options::Help"),
253 ('m',"mode","Cruft-Report::Options::Mode", "HasArg"),
254 ('s',"suite","Cruft-Report::Options::Suite","HasArg")]
256 if not Cnf.has_key("Cruft-Report::Options::%s" % (i)):
257 Cnf["Cruft-Report::Options::%s" % (i)] = ""
258 Cnf["Cruft-Report::Options::Suite"] = Cnf["Dinstall::DefaultSuite"]
260 if not Cnf.has_key("Cruft-Report::Options::Mode"):
261 Cnf["Cruft-Report::Options::Mode"] = "daily"
263 apt_pkg.ParseCommandLine(Cnf, Arguments, sys.argv)
265 Options = Cnf.SubTree("Cruft-Report::Options")
269 # Set up checks based on mode
270 if Options["Mode"] == "daily":
271 checks = [ "nbs", "nviu", "obsolete source" ]
272 elif Options["Mode"] == "full":
273 checks = [ "nbs", "nviu", "obsolete source", "dubious nbs", "bnb", "bms", "anais" ]
275 utils.warn("%s is not a recognised mode - only 'full' or 'daily' are understood." % (Options["Mode"]))
278 projectB = pg.connect(Cnf["DB::Name"], Cnf["DB::Host"], int(Cnf["DB::Port"]))
279 database.init(Cnf, projectB)
291 suite = Options["Suite"]
292 suite_id = database.get_suite_id(suite)
297 # Initalize a large hash table of all binary packages
299 sys.stderr.write("[Getting a list of binary packages in %s..." % (suite))
300 q = projectB.query("SELECT distinct b.package FROM binaries b, bin_associations ba WHERE ba.suite = %s AND ba.bin = b.id" % (suite_id))
302 sys.stderr.write("done. (%d seconds)]\n" % (int(time.time()-before)))
304 bins_in_suite[i[0]] = ""
306 # Checks based on the Sources files
307 components = Cnf.ValueList("Suite::%s::Components" % (suite))
308 for component in components:
309 filename = "%s/dists/%s/%s/source/Sources.gz" % (Cnf["Dir::Root"], suite, component)
310 # apt_pkg.ParseTagFile needs a real file handle and can't handle a GzipFile instance...
311 temp_filename = utils.temp_filename()
312 (result, output) = commands.getstatusoutput("gunzip -c %s > %s" % (filename, temp_filename))
314 sys.stderr.write("Gunzip invocation failed!\n%s\n" % (output))
316 sources = utils.open_file(temp_filename)
317 Sources = apt_pkg.ParseTagFile(sources)
318 while Sources.Step():
319 source = Sources.Section.Find('Package')
320 source_version = Sources.Section.Find('Version')
321 architecture = Sources.Section.Find('Architecture')
322 binaries = Sources.Section.Find('Binary')
323 binaries_list = [ i.strip() for i in binaries.split(',') ]
326 # Check for binaries not built on any architecture.
327 for binary in binaries_list:
328 if not bins_in_suite.has_key(binary):
329 bin_not_built.setdefault(source, {})
330 bin_not_built[source][binary] = ""
332 if "anais" in checks:
333 anais_output += do_anais(architecture, binaries_list, source)
335 # Check for duplicated packages and build indices for checking "no source" later
336 source_index = component + '/' + source
337 if src_pkgs.has_key(source):
338 print " %s is a duplicated source package (%s and %s)" % (source, source_index, src_pkgs[source])
339 src_pkgs[source] = source_index
340 for binary in binaries_list:
341 if bin_pkgs.has_key(binary):
342 key_list = [ source, bin_pkgs[binary] ]
344 key = '_'.join(key_list)
345 duplicate_bins.setdefault(key, [])
346 duplicate_bins[key].append(binary)
347 bin_pkgs[binary] = source
348 source_binaries[source] = binaries
349 source_versions[source] = source_version
352 os.unlink(temp_filename)
354 # Checks based on the Packages files
355 check_components = components[:]
356 if suite != "experimental":
357 check_components.append('main/debian-installer');
358 for component in check_components:
359 architectures = filter(utils.real_arch, Cnf.ValueList("Suite::%s::Architectures" % (suite)))
360 for architecture in architectures:
361 filename = "%s/dists/%s/%s/binary-%s/Packages.gz" % (Cnf["Dir::Root"], suite, component, architecture)
362 # apt_pkg.ParseTagFile needs a real file handle
363 temp_filename = utils.temp_filename()
364 (result, output) = commands.getstatusoutput("gunzip -c %s > %s" % (filename, temp_filename))
366 sys.stderr.write("Gunzip invocation failed!\n%s\n" % (output))
368 packages = utils.open_file(temp_filename)
369 Packages = apt_pkg.ParseTagFile(packages)
370 while Packages.Step():
371 package = Packages.Section.Find('Package')
372 source = Packages.Section.Find('Source', "")
373 version = Packages.Section.Find('Version')
376 if bin2source.has_key(package) and \
377 apt_pkg.VersionCompare(version, bin2source[package]["version"]) > 0:
378 bin2source[package]["version"] = version
379 bin2source[package]["source"] = source
381 bin2source[package] = {}
382 bin2source[package]["version"] = version
383 bin2source[package]["source"] = source
384 if source.find("(") != -1:
385 m = utils.re_extract_src_version.match(source)
388 if not bin_pkgs.has_key(package):
389 nbs.setdefault(source,{})
390 nbs[source].setdefault(package, {})
391 nbs[source][package][version] = ""
393 previous_source = bin_pkgs[package]
394 if previous_source != source:
395 key_list = [ source, previous_source ]
397 key = '_'.join(key_list)
398 duplicate_bins.setdefault(key, [])
399 if package not in duplicate_bins[key]:
400 duplicate_bins[key].append(package)
402 os.unlink(temp_filename)
404 if "obsolete source" in checks:
405 do_obsolete_source(duplicate_bins, bin2source)
407 # Distinguish dubious (version numbers match) and 'real' NBS (they don't)
410 for source in nbs.keys():
411 for package in nbs[source].keys():
412 versions = nbs[source][package].keys()
413 versions.sort(apt_pkg.VersionCompare)
414 latest_version = versions.pop()
415 source_version = source_versions.get(source,"0")
416 if apt_pkg.VersionCompare(latest_version, source_version) == 0:
417 add_nbs(dubious_nbs, source, latest_version, package)
419 add_nbs(real_nbs, source, latest_version, package)
429 if Options["Mode"] == "full":
434 print "Unbuilt binary packages"
435 print "-----------------------"
437 keys = bin_not_built.keys()
440 binaries = bin_not_built[source].keys()
442 print " o %s: %s" % (source, ", ".join(binaries))
446 print "Built from multiple source packages"
447 print "-----------------------------------"
449 keys = duplicate_bins.keys()
452 (source_a, source_b) = key.split("_")
453 print " o %s & %s => %s" % (source_a, source_b, ", ".join(duplicate_bins[key]))
456 if "anais" in checks:
457 print "Architecture Not Allowed In Source"
458 print "----------------------------------"
462 if "dubious nbs" in checks:
463 do_dubious_nbs(dubious_nbs)
466 ################################################################################
468 if __name__ == '__main__':