Skip to content

Commit 1b256e4

Browse files
fix errors.
1 parent 1b0a4e2 commit 1b256e4

File tree

3 files changed

+30
-30
lines changed

3 files changed

+30
-30
lines changed

modules/packages/arch/metadata.go

Lines changed: 28 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ type VersionMetadata struct {
7171
Conflicts []string `json:"conflicts,omitempty"`
7272
Replaces []string `json:"replaces,omitempty"`
7373
Backup []string `json:"backup,omitempty"`
74-
Xdata []string `json:"xdata,omitempty"`
74+
XData []string `json:"xdata,omitempty"`
7575
}
7676

7777
// FileMetadata Metadata related to specific package file.
@@ -221,7 +221,7 @@ func ParsePackageInfo(compressType string, r io.Reader) (*Package, error) {
221221
case "replaces":
222222
p.VersionMetadata.Replaces = append(p.VersionMetadata.Replaces, value)
223223
case "xdata":
224-
p.VersionMetadata.Xdata = append(p.VersionMetadata.Xdata, value)
224+
p.VersionMetadata.XData = append(p.VersionMetadata.XData, value)
225225
case "builddate":
226226
bd, err := strconv.ParseInt(value, 10, 64)
227227
if err != nil {
@@ -261,48 +261,48 @@ func ValidatePackageSpec(p *Package) error {
261261
return util.NewInvalidArgumentErrorf("invalid project URL")
262262
}
263263
}
264-
for _, cd := range p.VersionMetadata.CheckDepends {
265-
if !rePkgVer.MatchString(cd) {
266-
return util.NewInvalidArgumentErrorf("invalid check dependency: %s", cd)
264+
for _, checkDepend := range p.VersionMetadata.CheckDepends {
265+
if !rePkgVer.MatchString(checkDepend) {
266+
return util.NewInvalidArgumentErrorf("invalid check dependency: %s", checkDepend)
267267
}
268268
}
269-
for _, d := range p.VersionMetadata.Depends {
270-
if !rePkgVer.MatchString(d) {
271-
return util.NewInvalidArgumentErrorf("invalid dependency: %s", d)
269+
for _, depend := range p.VersionMetadata.Depends {
270+
if !rePkgVer.MatchString(depend) {
271+
return util.NewInvalidArgumentErrorf("invalid dependency: %s", depend)
272272
}
273273
}
274-
for _, md := range p.VersionMetadata.MakeDepends {
275-
if !rePkgVer.MatchString(md) {
276-
return util.NewInvalidArgumentErrorf("invalid make dependency: %s ", md)
274+
for _, makeDepend := range p.VersionMetadata.MakeDepends {
275+
if !rePkgVer.MatchString(makeDepend) {
276+
return util.NewInvalidArgumentErrorf("invalid make dependency: %s ", makeDepend)
277277
}
278278
}
279-
for _, p := range p.VersionMetadata.Provides {
280-
if !rePkgVer.MatchString(p) {
281-
return util.NewInvalidArgumentErrorf("invalid provides: %s", p)
279+
for _, provide := range p.VersionMetadata.Provides {
280+
if !rePkgVer.MatchString(provide) {
281+
return util.NewInvalidArgumentErrorf("invalid provides: %s", provide)
282282
}
283283
}
284-
for _, p := range p.VersionMetadata.Conflicts {
285-
if !rePkgVer.MatchString(p) {
286-
return util.NewInvalidArgumentErrorf("invalid conflicts: %s", p)
284+
for _, conflict := range p.VersionMetadata.Conflicts {
285+
if !rePkgVer.MatchString(conflict) {
286+
return util.NewInvalidArgumentErrorf("invalid conflicts: %s", conflict)
287287
}
288288
}
289-
for _, p := range p.VersionMetadata.Replaces {
290-
if !rePkgVer.MatchString(p) {
291-
return util.NewInvalidArgumentErrorf("invalid replaces: %s", p)
289+
for _, replace := range p.VersionMetadata.Replaces {
290+
if !rePkgVer.MatchString(replace) {
291+
return util.NewInvalidArgumentErrorf("invalid replaces: %s", replace)
292292
}
293293
}
294-
for _, p := range p.VersionMetadata.Xdata {
295-
if !rePkgVer.MatchString(p) {
296-
return util.NewInvalidArgumentErrorf("invalid xdata: %s", p)
294+
for _, data := range p.VersionMetadata.XData {
295+
if !rePkgVer.MatchString(data) {
296+
return util.NewInvalidArgumentErrorf("invalid xdata: %s", data)
297297
}
298298
}
299-
for _, od := range p.VersionMetadata.OptDepends {
300-
if !reOptDep.MatchString(od) {
301-
return util.NewInvalidArgumentErrorf("invalid optional dependency: %s", od)
299+
for _, optDepend := range p.VersionMetadata.OptDepends {
300+
if !reOptDep.MatchString(optDepend) {
301+
return util.NewInvalidArgumentErrorf("invalid optional dependency: %s", optDepend)
302302
}
303303
}
304-
for _, bf := range p.VersionMetadata.Backup {
305-
if strings.HasPrefix(bf, "/") {
304+
for _, backup := range p.VersionMetadata.Backup {
305+
if strings.HasPrefix(backup, "/") {
306306
return util.NewInvalidArgumentErrorf("backup file contains leading forward slash")
307307
}
308308
}

routers/api/packages/arch/arch.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ func GetRepositoryKey(ctx *context.Context) {
4949
}
5050

5151
func refreshLocker(ctx *context.Context, group string) (globallock.ReleaseFunc, error) {
52-
return globallock.Lock(ctx, fmt.Sprintf("pkg_arch_pkg_%s", group))
52+
return globallock.Lock(ctx, fmt.Sprintf("pkg_%d_arch_pkg_%s", ctx.Package.Owner.ID, group))
5353
}
5454

5555
func PushPackage(ctx *context.Context) {

services/packages/arch/repository.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ func NewFileSign(ctx context.Context, ownerID int64, input io.Reader) (*packages
105105
// BuildPacmanDB Create db signature cache
106106
func BuildPacmanDB(ctx context.Context, ownerID int64, group, arch string) error {
107107
// Prevent `update/delete` and `cron clean task` from running concurrently.
108-
lock, err := globallock.Lock(ctx, fmt.Sprintf("pkg_arch_db_%s", group))
108+
lock, err := globallock.Lock(ctx, fmt.Sprintf("pkg_%d_arch_db_%s", ownerID, group))
109109
if err != nil {
110110
return err
111111
}

0 commit comments

Comments
 (0)