pkgcheck.checks.repo_metadata module

class pkgcheck.checks.repo_metadata.BadPackageUpdate(msg)[source]

Bases: ProfilesResult, LogError

Badly formatted package update in profiles/updates files.

name = 'BadPackageUpdate'
class pkgcheck.checks.repo_metadata.ConflictingChksums(filename, chksums, pkgs, **kwargs)[source]

Bases: VersionResult, Error

Checksum conflict detected between two files.

property desc

Result description.

name = 'ConflictingChksums'
class pkgcheck.checks.repo_metadata.DeprecatedChksum(filename, deprecated, **kwargs)[source]

Bases: VersionResult, Warning

A file in the chksum data does not use modern checksum set.

property desc

Result description.

name = 'DeprecatedChksum'
class pkgcheck.checks.repo_metadata.DeprecatedManifestHash(hashes, **kwargs)[source]

Bases: PackageResult, Warning

Manifest uses deprecated hashes.

The package uses deprecated hash types in its Manifest file.

property desc

Result description.

name = 'DeprecatedManifestHash'
class pkgcheck.checks.repo_metadata.DeprecatedRepoHash(hashes)[source]

Bases: Warning

Repositories manifest-hashes defines deprecated hashes.

The repository defines deprecated hashes in manifest-hashes.

property desc

Result description.

name = 'DeprecatedRepoHash'
class pkgcheck.checks.repo_metadata.EmptyProject(project)[source]

Bases: Warning

A project has no developers.

property desc

Result description.

name = 'EmptyProject'
class pkgcheck.checks.repo_metadata.GlobalUseCheck(*args)[source]

Bases: RepoCheck

Check global USE and USE_EXPAND flags for various issues.

feed(pkgs)[source]

Handle functionality against the passed in item.

finish()[source]

Do cleanup and yield final results here.

known_results = frozenset({<class 'pkgcheck.checks.repo_metadata.PotentialGlobalUse'>, <class 'pkgcheck.checks.repo_metadata.PotentialLocalUse'>, <class 'pkgcheck.checks.repo_metadata.UnusedGlobalUse'>, <class 'pkgcheck.checks.repo_metadata.UnusedGlobalUseExpand'>})
scope = <PackageScope desc='repo' @0x7f4ee7e9a790>
class pkgcheck.checks.repo_metadata.InvalidManifest(attr, msg, **kwargs)[source]

Bases: MetadataError, PackageResult

Package’s Manifest file is invalid.

attr = 'manifest'
name = 'InvalidManifest'
class pkgcheck.checks.repo_metadata.LicenseGroupsCheck(*args)[source]

Bases: RepoCheck

Scan license groups for unknown licenses.

finish()[source]

Do cleanup and yield final results here.

known_results = frozenset({<class 'pkgcheck.checks.repo_metadata.UnknownLicenses'>})
scope = <PackageScope desc='repo' @0x7f4ee7e9a790>
class pkgcheck.checks.repo_metadata.ManifestCheck(*args, use_addon: UseAddon)[source]

Bases: Check

Manifest related checks.

Verify that the Manifest file exists, doesn’t have missing or extraneous entries, and that the required hashes are in use.

feed(pkgset)[source]

Handle functionality against the passed in item.

known_results = frozenset({<class 'pkgcheck.checks.repo_metadata.DeprecatedChksum'>, <class 'pkgcheck.checks.repo_metadata.DeprecatedManifestHash'>, <class 'pkgcheck.checks.repo_metadata.InvalidManifest'>, <class 'pkgcheck.checks.repo_metadata.MissingChksum'>, <class 'pkgcheck.checks.repo_metadata.MissingManifest'>, <class 'pkgcheck.checks.repo_metadata.UnknownManifest'>, <class 'pkgcheck.checks.repo_metadata.UnnecessaryManifest'>})
required_addons = (<class 'pkgcheck.addons.UseAddon'>,)
scope = <PackageScope desc='package' @0x7f4ee7e994d0>
class pkgcheck.checks.repo_metadata.ManifestCollisionCheck(*args)[source]

Bases: Check

Search Manifest entries for different types of distfile collisions.

In particular, search for matching filenames with different checksums and different filenames with matching checksums.

feed(pkgs)[source]

Handle functionality against the passed in item.

known_results = frozenset({<class 'pkgcheck.checks.repo_metadata.ConflictingChksums'>, <class 'pkgcheck.checks.repo_metadata.MatchingChksums'>})
scope = <PackageScope desc='repo' @0x7f4ee7e9a790>
class pkgcheck.checks.repo_metadata.MatchingChksums(filename, orig_file, orig_pkg, **kwargs)[source]

Bases: VersionResult, Warning

Two distfiles share the same checksums but use different names.

property desc

Result description.

name = 'MatchingChksums'
class pkgcheck.checks.repo_metadata.MissingChksum(filename, missing, existing, **kwargs)[source]

Bases: VersionResult, Warning

A file in the chksum data lacks required checksums.

property desc

Result description.

name = 'MissingChksum'
class pkgcheck.checks.repo_metadata.MissingManifest(files, **kwargs)[source]

Bases: VersionResult, Error

SRC_URI targets missing from Manifest file.

property desc

Result description.

name = 'MissingManifest'
class pkgcheck.checks.repo_metadata.MovedPackageUpdate(msg)[source]

Bases: ProfilesResult, LogWarning

Entry for package already moved in profiles/updates files.

name = 'MovedPackageUpdate'
class pkgcheck.checks.repo_metadata.MultiMovePackageUpdate(pkg, moves)[source]

Bases: ProfilesResult, Warning

Entry for package moved multiple times in profiles/updates files.

property desc

Result description.

name = 'MultiMovePackageUpdate'
class pkgcheck.checks.repo_metadata.OldMultiMovePackageUpdate(pkg, moves)[source]

Bases: ProfilesResult, Warning

Old entry for removed package moved multiple times in profiles/updates files.

This means that the reported pkg has been moved at least three times and finally removed from the tree. All the related lines should be removed from the update files.

property desc

Result description.

name = 'OldMultiMovePackageUpdate'
class pkgcheck.checks.repo_metadata.OldPackageUpdate(pkg, updates)[source]

Bases: ProfilesResult, Warning

Old entry for removed package in profiles/updates files.

property desc

Result description.

name = 'OldPackageUpdate'
class pkgcheck.checks.repo_metadata.PackageUpdatesCheck(*args)[source]

Bases: RepoCheck

Scan profiles/updates/* for outdated entries and other issues.

finish()[source]

Do cleanup and yield final results here.

known_results = frozenset({<class 'pkgcheck.checks.repo_metadata.BadPackageUpdate'>, <class 'pkgcheck.checks.repo_metadata.MovedPackageUpdate'>, <class 'pkgcheck.checks.repo_metadata.MultiMovePackageUpdate'>, <class 'pkgcheck.checks.repo_metadata.OldMultiMovePackageUpdate'>, <class 'pkgcheck.checks.repo_metadata.OldPackageUpdate'>, <class 'pkgcheck.checks.repo_metadata.RedundantPackageUpdate'>})
scope = <LocationScope desc='profiles' @0x7f4ee7e9a450>
class pkgcheck.checks.repo_metadata.PotentialGlobalUse(flag, pkgs)[source]

Bases: Info

Local USE flag is a potential global USE flag.

property desc

Result description.

name = 'PotentialGlobalUse'
class pkgcheck.checks.repo_metadata.PotentialLocalUse(flag, pkgs)[source]

Bases: Info

Global USE flag is a potential local USE flag.

property desc

Result description.

name = 'PotentialLocalUse'
class pkgcheck.checks.repo_metadata.ProjectMetadataCheck(*args)[source]

Bases: RepoCheck

Check projects.xml for issues.

finish()[source]

Do cleanup and yield final results here.

known_results = frozenset({<class 'pkgcheck.checks.repo_metadata.EmptyProject'>})
scope = <PackageScope desc='repo' @0x7f4ee7e9a790>
class pkgcheck.checks.repo_metadata.RedundantPackageUpdate(updates)[source]

Bases: ProfilesResult, Warning

Move entry to the same package/slot (source == target).

property desc

Result description.

name = 'RedundantPackageUpdate'
class pkgcheck.checks.repo_metadata.RepoManifestHashCheck(*args)[source]

Bases: RepoCheck

Check manifest-hashes config for issues.

finish()[source]

Do cleanup and yield final results here.

known_results = frozenset({<class 'pkgcheck.checks.repo_metadata.DeprecatedRepoHash'>})
scope = <PackageScope desc='repo' @0x7f4ee7e9a790>
class pkgcheck.checks.repo_metadata.UnknownLicenses(group, licenses)[source]

Bases: Warning

License(s) listed in license group(s) that don’t exist.

property desc

Result description.

name = 'UnknownLicenses'
class pkgcheck.checks.repo_metadata.UnknownManifest(files, **kwargs)[source]

Bases: PackageResult, Warning

Manifest entries not matching any SRC_URI targets.

property desc

Result description.

name = 'UnknownManifest'
class pkgcheck.checks.repo_metadata.UnnecessaryManifest(files, **kwargs)[source]

Bases: PackageResult, Warning

Manifest entries for non-DIST targets on a repo with thin manifests enabled.

property desc

Result description.

name = 'UnnecessaryManifest'
class pkgcheck.checks.repo_metadata.UnusedEclasses(eclasses)[source]

Bases: Warning

Unused eclasses detected.

property desc

Result description.

name = 'UnusedEclasses'
class pkgcheck.checks.repo_metadata.UnusedEclassesCheck(*args)[source]

Bases: RepoCheck

Check for unused eclasses.

feed(pkg)[source]

Handle functionality against the passed in item.

finish()[source]

Do cleanup and yield final results here.

known_results = frozenset({<class 'pkgcheck.checks.repo_metadata.UnusedEclasses'>})
scope = <PackageScope desc='repo' @0x7f4ee7e9a790>
start()[source]

Do startup here.

class pkgcheck.checks.repo_metadata.UnusedGlobalUse(flags)[source]

Bases: Warning

Unused use.desc flag(s).

property desc

Result description.

name = 'UnusedGlobalUse'
class pkgcheck.checks.repo_metadata.UnusedGlobalUseExpand(flags)[source]

Bases: Warning

Unused global USE_EXPAND flag(s).

property desc

Result description.

name = 'UnusedGlobalUseExpand'
class pkgcheck.checks.repo_metadata.UnusedLicenses(licenses)[source]

Bases: Warning

Unused license(s) detected.

property desc

Result description.

name = 'UnusedLicenses'
class pkgcheck.checks.repo_metadata.UnusedLicensesCheck(*args)[source]

Bases: RepoCheck

Check for unused license files.

feed(pkg)[source]

Handle functionality against the passed in item.

finish()[source]

Do cleanup and yield final results here.

known_results = frozenset({<class 'pkgcheck.checks.repo_metadata.UnusedLicenses'>})
scope = <PackageScope desc='repo' @0x7f4ee7e9a790>
start()[source]

Do startup here.

class pkgcheck.checks.repo_metadata.UnusedMirrors(mirrors)[source]

Bases: Warning

Unused mirrors detected.

property desc

Result description.

name = 'UnusedMirrors'
class pkgcheck.checks.repo_metadata.UnusedMirrorsCheck(*args, use_addon)[source]

Bases: MirrorsCheck, RepoCheck

Check for unused mirrors.

feed(pkg)[source]

Handle functionality against the passed in item.

finish()[source]

Do cleanup and yield final results here.

known_results = frozenset({<class 'pkgcheck.checks.repo_metadata.UnusedMirrors'>})
scope = <PackageScope desc='repo' @0x7f4ee7e9a790>
start()[source]

Do startup here.