aboutsummaryrefslogtreecommitdiff
path: root/etc
diff options
context:
space:
mode:
authorSergey Poznyakoff <gray@gnu.org.ua>2009-02-16 16:17:03 +0200
committerSergey Poznyakoff <gray@gnu.org.ua>2009-02-16 16:23:53 +0200
commit6cfe6f8fe1b7506e772403fecc9d7298fc52dc74 (patch)
tree64e579d8895bfecfadceb9914f9f795d75e4ccbb /etc
parent98ca4bb1bc96cc95bdd141cb653b17029957de38 (diff)
downloadwydawca-6cfe6f8fe1b7506e772403fecc9d7298fc52dc74.tar.gz
wydawca-6cfe6f8fe1b7506e772403fecc9d7298fc52dc74.tar.bz2
Improve keyword (meta) expansion, add testsuite framework
* src/meta.c: New file. * src/Makefile.am (wydawca_SOURCES): Add meta.c. * Makefile.am (SUBDIRS): Add tests. * configure.ac: Initialize testsuite. * src/cmdline.opt: Add preprocessor-related options: --[no-]preprocessor, -E * src/mail.c, src/triplet.c, src/verify.c, src/wydawca.c, src/wydawca.h: Use new expansion functions. * src/update-2.0.awk: Replace % markup with $. * etc/wydawca.rc: Switch to new meta-variable syntax. * gnulib.modules: Add c-ctype. * doc/Makefile.am (check-options): Rewrite. * doc/wydawca.texi: Mark unrevised/obsolete material. * tests/: New directory
Diffstat (limited to 'etc')
-rw-r--r--etc/wydawca.rc90
1 files changed, 45 insertions, 45 deletions
diff --git a/etc/wydawca.rc b/etc/wydawca.rc
index c722fa6..205c4e0 100644
--- a/etc/wydawca.rc
+++ b/etc/wydawca.rc
@@ -56,36 +56,36 @@ access-method project-owner {
params (default,
"SELECT user.email, user.realname "
"FROM user,user_group,groups "
"WHERE user_group.user_id=user.user_id "
"AND user_group.group_id=groups.group_id "
"AND user_group.admin_flags = 'A' "
- "AND groups.unix_group_name='%p'");
+ "AND groups.unix_group_name='$p'");
}
access-method user-data {
type sql;
params (default,
- "SELECT email, realname FROM user WHERE user_name='%{user}'");
+ "SELECT email, realname FROM user WHERE user_name='${user}'");
}
access-method verify-user {
type sql;
params (default,
"SELECT user.user_name "
"FROM user,user_group, groups "
"WHERE user_group.user_id=user.user_id "
"AND user_group.group_id=groups.group_id "
"AND user_group.admin_flags = 'A' "
- "AND groups.unix_group_name='%p' AND user.user_name='%u'");
+ "AND groups.unix_group_name='$p' AND user.user_name='$u'");
}
access-method gpg-key {
type sql;
params (default,
- "SELECT gpg_key FROM user WHERE user_name='%u'");
+ "SELECT gpg_key FROM user WHERE user_name='$u'");
}
#############################################################################
# Configure your directory pairs.
# A directory pair defines where to look for input triplets, and where to
# copy uploaded files.
@@ -113,28 +113,28 @@ from-address "wydawca@localhost";
# See `info wydawca statreports'.
mail-statistics {
statistics all;
message <<EOT
Subject: Wydawca stats
-This is to notify you that the run of wydawca on %{date}
+This is to notify you that the run of wydawca on ${date}
caused the following results:
-errors ............................. %{stat:errors}
-warning ............................ %{stat:warnings}
-bad signatures ..................... %{stat:bad_signatures}
-access violation attempts .......... %{stat:access_violations}
-complete triplets .................. %{stat:complete_triplets}
-incomplete triplets ................ %{stat:incomplete_triplets}
-bad triplets ....................... %{stat:bad_triplets}
-expired triplets ................... %{stat:expired_triplets}
-triplet successes .................. %{stat:triplet_success}
-files uploaded ..................... %{stat:uploads}
-files archived ..................... %{stat:archives}
-symlinks created ................... %{stat:symlinks}
-symlinks removed ................... %{stat:rmsymlinks}
+errors ............................. ${stat:errors}
+warning ............................ ${stat:warnings}
+bad signatures ..................... ${stat:bad_signatures}
+access violation attempts .......... ${stat:access_violations}
+complete triplets .................. ${stat:complete_triplets}
+incomplete triplets ................ ${stat:incomplete_triplets}
+bad triplets ....................... ${stat:bad_triplets}
+expired triplets ................... ${stat:expired_triplets}
+triplet successes .................. ${stat:triplet_success}
+files uploaded ..................... ${stat:uploads}
+files archived ..................... ${stat:archives}
+symlinks created ................... ${stat:symlinks}
+symlinks removed ................... ${stat:rmsymlinks}
Regards,
Wydawca
EOT;
}
@@ -142,35 +142,35 @@ EOT;
# Notify the user about successful uploads
notify-event {
event success;
recipient user;
message <<EOT
-Subject: Upload of %{project} successful
+Subject: Upload of ${project} successful
-Upload of %{project} to %{dir} finished successfully. Files uploaded:
+Upload of ${project} to ${dir} finished successfully. Files uploaded:
-%{triplet:upload}
+${triplet:upload}
Regards,
Wydawca
The Project Submission Robot
EOT;
}
# Notify project admin about a successful upload.
notify-event {
event success;
recipient owner;
message <<EOT
-Subject: Upload of %{project} successful
+Subject: Upload of ${project} successful
-%{user:real-name} (%{user:email}) successfully uploaded files
-for %{project} to %{dir}. Files uploaded:
+${user:real-name} (${user:email}) successfully uploaded files
+for ${project} to ${dir}. Files uploaded:
-%{triplet:upload}
+${triplet:upload}
Regards,
Wydawca
The Project Submission Robot
EOT;
}
@@ -178,23 +178,23 @@ EOT;
# Notify project admin, if someone non authorized attempted to upload some
# files for the project they run.
notify-event {
event bad-ownership;
recipient owner;
message <<EOT
-Subject: Suspicious upload of %{project}
+Subject: Suspicious upload of ${project}
-Someone not authorized to make releases for %{project}
-has attempted to upload the following files to %{dir}:
+Someone not authorized to make releases for ${project}
+has attempted to upload the following files to ${dir}:
-%{triplet:full}
+${triplet:full}
This upload has been ignored and the files removed. The person who attempted
-the upload was %{user:real-name}, user name %{user:name}, email %{user:email}.
+the upload was ${user:real-name}, user name ${user:name}, email ${user:email}.
If you think this is an error and wish this user to be authorized to make
-releases for %{project}, please contact <puszcza-hackers@gnu.org.ua>.
+releases for ${project}, please contact <puszcza-hackers@gnu.org.ua>.
Otherwise, let us know so we could undertake appropriate measures.
Regards,
Wydawca
The Project Submission Robot
EOT;
@@ -206,19 +206,19 @@ EOT;
# stay on a safe side. Notifying project admins (see below) should be quite
# enough.
notify-event {
event bad-directive-signature;
recipient user;
message <<EOT
-Subject: Suspicious upload of %{project}
+Subject: Suspicious upload of ${project}
-Someone (apparently you), has tried to make a release for %{project}.
+Someone (apparently you), has tried to make a release for ${project}.
However, the signature of the directive file was wrong, which looks
suspicious. The person uploaded the following files:
-%{triplet:full}
+${triplet:full}
This upload has been ignored and the files removed. If it was you who
attempted this upload, please make sure you use the right PGP key and
try again. If not, please let us know as soon as possible, so we can
track down the person trying to make believe he is you.
@@ -231,19 +231,19 @@ EOT;
# Notify the project admin, if submitted directive signature did not match
# submitter record.
notify-event {
event bad-directive-signature;
recipient owner;
message <<EOT
-Subject: Suspicious upload of %{project}
+Subject: Suspicious upload of ${project}
-%{user:real-name} (%{user:email}) has tried to make a release
-for %{project}. However, the signature of the directive file was wrong,
+${user:real-name} (${user:email}) has tried to make a release
+for ${project}. However, the signature of the directive file was wrong,
which looks suspicious. The person uploaded the following files:
-%{triplet:full}
+${triplet:full}
This upload has been ignored and the files removed.
Regards,
Wydawca
The Project Submission Robot
@@ -256,19 +256,19 @@ EOT;
# stay on a safe side. Notifying project admins (see below) should be quite
# enough.
notify-event {
event bad-detached-signature;
recipient user;
message <<EOT
-Subject: Suspicious upload of %{project}
+Subject: Suspicious upload of ${project}
-Someone (apparently you), has tried to make a release for %{project}.
+Someone (apparently you), has tried to make a release for ${project}.
However, the detached signature signature was wrong, which looks
suspicious. The person uploaded the following files:
-%{triplet:full}
+${triplet:full}
This upload has been ignored and the files removed. If it was you who
attempted this upload, please make sure you use the right PGP key and
try again. If not, please let us know as soon as possible, so we can
track down the person trying to make believe he is you.
@@ -281,19 +281,19 @@ EOT;
# Notify the project admin, if submitted detached signature did not match
# submitter record.
notify-event {
event bad-detached-signature;
recipient owner;
message <<EOT
-Subject: Suspicious upload of %{project}
+Subject: Suspicious upload of ${project}
-%{user:real-name} (%{user:email}) has tried to make a release
-for %{project}. However, the detached signature file was wrong,
+${user:real-name} (${user:email}) has tried to make a release
+for ${project}. However, the detached signature file was wrong,
which looks suspicious. The person uploaded the following files:
-%{triplet:full}
+${triplet:full}
This upload has been ignored and the files removed.
Regards,
Wydawca
The Project Submission Robot

Return to:

Send suggestions and report system problems to the System administrator.