summaryrefslogtreecommitdiffstats
path: root/qa/config
diff options
context:
space:
mode:
authorDavid Lawrence <dkl@mozilla.com>2015-06-25 05:35:16 +0200
committerDavid Lawrence <dkl@mozilla.com>2015-06-25 05:35:16 +0200
commita6238e079b4e8e62d3e23f019e0895c626133c83 (patch)
tree5c840202b0e02237a9a6b6acfdd613d78d38624a /qa/config
parent28f425dac57db417b2a701fa99ef4ad73da0a729 (diff)
downloadbugzilla-a6238e079b4e8e62d3e23f019e0895c626133c83.tar.gz
bugzilla-a6238e079b4e8e62d3e23f019e0895c626133c83.tar.xz
Bug 1144485: Adapt upstream Selenium test suite to BMO
Diffstat (limited to 'qa/config')
-rw-r--r--qa/config/checksetup_answers.txt26
-rw-r--r--qa/config/generate_test_data.pl822
-rw-r--r--qa/config/patch.diff18
-rw-r--r--qa/config/selenium_test.conf49
4 files changed, 915 insertions, 0 deletions
diff --git a/qa/config/checksetup_answers.txt b/qa/config/checksetup_answers.txt
new file mode 100644
index 000000000..adafe8c43
--- /dev/null
+++ b/qa/config/checksetup_answers.txt
@@ -0,0 +1,26 @@
+$answer{'ADMIN_EMAIL'} = 'admin@mozilla.bugs';
+$answer{'ADMIN_OK'} = 'Y';
+$answer{'ADMIN_PASSWORD'} = 'password';
+$answer{'ADMIN_REALNAME'} = 'QA Admin';
+$answer{'NO_PAUSE'} = 1;
+$answer{'bugzilla_version'} = '1';
+$answer{'create_htaccess'} = '';
+$answer{'cvsbin'} = '/usr/bin/cvs';
+$answer{'db_check'} = 1;
+$answer{'db_driver'} = '%DB%';
+$answer{'db_host'} = 'localhost';
+$answer{'db_mysql_ssl_ca_file'} = '';
+$answer{'db_mysql_ssl_ca_path'} = '';
+$answer{'db_mysql_ssl_client_cert'} = '';
+$answer{'db_mysql_ssl_client_key'} = '';
+$answer{'db_name'} = '%DB_NAME%',
+$answer{'db_pass'} = 'bugs';
+$answer{'db_port'} = 0;
+$answer{'db_sock'} = '';
+$answer{'db_user'} = 'bugs';
+$answer{'diffpath'} = '/usr/bin';
+$answer{'index_html'} = 0;
+$answer{'interdiffbin'} = '/usr/bin/interdiff';
+$answer{'urlbase'} = 'http://localhost/bmo/';
+$answer{'use_suexec'} = '';
+$answer{'webservergroup'} = '%USER%';
diff --git a/qa/config/generate_test_data.pl b/qa/config/generate_test_data.pl
new file mode 100644
index 000000000..2c6afe03a
--- /dev/null
+++ b/qa/config/generate_test_data.pl
@@ -0,0 +1,822 @@
+#!/usr/bin/perl -w
+
+# This Source Code Form is subject to the terms of the Mozilla Public
+# License, v. 2.0. If a copy of the MPL was not distributed with this
+# file, You can obtain one at http://mozilla.org/MPL/2.0/.
+#
+# This Source Code Form is "Incompatible With Secondary Licenses", as
+# defined by the Mozilla Public License, v. 2.0.
+
+# -*- Mode: perl; indent-tabs-mode: nil -*-
+
+use strict;
+use warnings;
+
+use Cwd;
+use File::Copy::Recursive qw(dircopy);
+
+my $conf_path;
+my $config;
+
+BEGIN {
+ print "reading the config file...\n";
+ my $conf_file = "selenium_test.conf";
+ if (@ARGV) {
+ $conf_file = shift @ARGV;
+ }
+ $config = do "$conf_file"
+ or die "can't read configuration '$conf_file': $!$@";
+
+ $conf_path = $config->{bugzilla_path};
+}
+
+use lib $conf_path;
+
+use Bugzilla;
+use Bugzilla::Attachment;
+use Bugzilla::Bug;
+use Bugzilla::User;
+use Bugzilla::Install;
+use Bugzilla::Milestone;
+use Bugzilla::Product;
+use Bugzilla::Component;
+use Bugzilla::Group;
+use Bugzilla::Version;
+use Bugzilla::Constants;
+use Bugzilla::Keyword;
+use Bugzilla::Config qw(:admin);
+use Bugzilla::User::Setting;
+use Bugzilla::Util qw(generate_random_password);
+
+my $dbh = Bugzilla->dbh;
+
+# set Bugzilla usage mode to USAGE_MODE_CMDLINE
+Bugzilla->usage_mode(USAGE_MODE_CMDLINE);
+
+##########################################################################
+# Set Parameters
+##########################################################################
+
+# Some parameters must be turned on to create bugs requiring them.
+# They are also expected to be turned on by some webservice_*.t scripts.
+my ($urlbase, $sslbase);
+$urlbase = $config->{browser_url} . '/' . $config->{bugzilla_installation};
+$urlbase .= '/' unless $urlbase =~ /\/$/;
+
+if ($urlbase =~ /^https/) {
+ $sslbase = $urlbase;
+ $urlbase =~ s/^https(.+)$/http$1/;
+}
+
+# Create missing priorities
+# BMO uses P1-P5 which is different from upstream
+my $field = Bugzilla::Field->new({ name => 'priority' });
+foreach my $value (qw(Highest High Normal Low Lowest)) {
+# Bugzilla::Field::Choice->type($field)->create({
+# value => $value,
+# sortkey => 0
+# });
+}
+
+# Add missing platforms
+$field = Bugzilla::Field->new({ name => 'rep_platform' });
+foreach my $value (qw(PC)) {
+# Bugzilla::Field::Choice->type($field)->create({
+# value => $value,
+# sortkey => 0
+# });
+}
+
+my %set_params = (
+ urlbase => $urlbase,
+ sslbase => $sslbase,
+ usebugaliases => 1,
+ useqacontact => 1,
+ mail_delivery_method => 'Test',
+ maxattachmentsize => 256,
+ defaultpriority => 'Highest', # BMO CHANGE
+ timetrackinggroup => 'editbugs', # BMO CHANGE
+ letsubmitterchoosepriority => 1, # BMO CHANGE
+ createemailregexp => '.*', # BMO CHANGE
+);
+
+my $params_modified;
+foreach my $param (keys %set_params) {
+ my $value = $set_params{$param};
+ next unless defined $value && Bugzilla->params->{$param} ne $value;
+ SetParam($param, $value);
+ $params_modified = 1;
+}
+
+write_params() if $params_modified;
+
+##########################################################################
+# Set Default User Preferences
+##########################################################################
+
+# When editing a bug, the page being displayed depends on the
+# post_bug_submit_action user pref. We set it globally so that we know
+# the exact behavior of process_bug.cgi.
+my %user_prefs = (post_bug_submit_action => 'nothing');
+
+foreach my $pref (keys %user_prefs) {
+ my $value = $user_prefs{$pref};
+ Bugzilla::User::Setting::set_default($pref, $value, 0);
+}
+
+##########################################################################
+# Create Users
+##########################################################################
+# First of all, remove the default .* regexp for the editbugs group.
+my $group = new Bugzilla::Group({ name => 'editbugs' });
+$group->set_user_regexp('');
+$group->update();
+
+my @usernames = (
+ 'admin', 'no-privs',
+ 'QA-Selenium-TEST', 'canconfirm',
+ 'tweakparams', 'permanent_user',
+ 'editbugs', 'disabled',
+);
+
+print "creating user accounts...\n";
+foreach my $username (@usernames) {
+
+ my $password;
+ my $login;
+ my $realname = exists $config->{"$username" . "_user_username"}
+ ? $config->{"$username" . "_user_username"}
+ : $username;
+
+ if ($username eq 'permanent_user') {
+ $password = $config->{admin_user_passwd};
+ $login = $config->{$username};
+ }
+ elsif ($username eq 'no-privs') {
+ $password = $config->{unprivileged_user_passwd};
+ $login = $config->{unprivileged_user_login};
+ }
+ elsif ($username eq 'QA-Selenium-TEST') {
+ $password = $config->{QA_Selenium_TEST_user_passwd};
+ $login = $config->{QA_Selenium_TEST_user_login};
+ }
+ else {
+ $password = $config->{"$username" . "_user_passwd"};
+ $login = $config->{"$username" . "_user_login"};
+ }
+
+ if ( is_available_username($login) ) {
+ my %extra_args;
+ if ($username eq 'disabled') {
+ $extra_args{disabledtext} = '!!This is the text!!';
+ }
+
+ Bugzilla::User->create(
+ { login_name => $login,
+ realname => $realname,
+ cryptpassword => $password,
+ %extra_args,
+ }
+ );
+
+ if ( $username eq 'admin' or $username eq 'permanent_user' ) {
+
+ Bugzilla::Install::make_admin($login);
+ }
+ }
+}
+
+##########################################################################
+# Bug statuses
+##########################################################################
+
+# We need to add in the upstream statuses in addition to the BMO ones.
+
+my @statuses = (
+ {
+ value => undef,
+ transitions => [['UNCONFIRMED', 0], ['CONFIRMED', 0], ['NEW', 0],
+ ['ASSIGNED', 0], ['IN_PROGRESS', 0]],
+ },
+ {
+ value => 'UNCONFIRMED',
+ sortkey => 100,
+ isactive => 1,
+ isopen => 1,
+ transitions => [['CONFIRMED', 0], ['NEW', 0], ['ASSIGNED', 0],
+ ['IN_PROGRESS', 0], ['RESOLVED', 0]],
+ },
+ {
+ value => 'CONFIRMED',
+ sortkey => 200,
+ isactive => 1,
+ isopen => 1,
+ transitions => [['UNCONFIRMED', 0], ['NEW', 0], ['ASSIGNED', 0],
+ ['IN_PROGRESS', 0], ['RESOLVED', 0]],
+ },
+ {
+ value => 'NEW',
+ sortkey => 300,
+ isactive => 1,
+ isopen => 1,
+ transitions => [['UNCONFIRMED', 0], ['CONFIRMED', 0], ['ASSIGNED', 0],
+ ['IN_PROGRESS', 0], ['RESOLVED', 0]],
+ },
+ {
+ value => 'ASSIGNED',
+ sortkey => 400,
+ isactive => 1,
+ isopen => 1,
+ transitions => [['UNCONFIRMED', 0], ['CONFIRMED', 0], ['NEW', 0],
+ ['IN_PROGRESS', 0], ['RESOLVED', 0]],
+ },
+ {
+ value => 'IN_PROGRESS',
+ sortkey => 500,
+ isactive => 1,
+ isopen => 1,
+ transitions => [['UNCONFIRMED', 0], ['CONFIRMED', 0], ['NEW', 0],
+ ['ASSIGNED', 0], ['RESOLVED', 0]],
+ },
+ {
+ value => 'REOPENED',
+ sortkey => 600,
+ isactive => 1,
+ isopen => 1,
+ transitions => [['UNCONFIRMED', 0], ['CONFIRMED', 0], ['NEW', 0],
+ ['ASSIGNED', 0], ['IN_PROGRESS', 0], ['RESOLVED', 0]],
+ },
+ {
+ value => 'RESOLVED',
+ sortkey => 700,
+ isactive => 1,
+ isopen => 0,
+ transitions => [['UNCONFIRMED', 0], ['CONFIRMED', 0], ['REOPENED', 0],
+ ['VERIFIED', 0]],
+ },
+ {
+ value => 'VERIFIED',
+ sortkey => 800,
+ isactive => 1,
+ isopen => 0,
+ transitions => [['UNCONFIRMED', 0], ['CONFIRMED', 0], ['REOPENED', 0],
+ ['RESOLVED', 0]],
+ },
+ {
+ value => 'CLOSED',
+ sortkey => 900,
+ isactive => 1,
+ isopen => 0,
+ transitions => [['UNCONFIRMED', 0], ['CONFIRMED', 0], ['REOPENED', 0],
+ ['RESOLVED', 0]],
+ },
+);
+
+if ($dbh->selectrow_array("SELECT 1 FROM bug_status WHERE value = 'ASSIGNED'")) {
+ $dbh->do('DELETE FROM bug_status');
+ $dbh->do('DELETE FROM status_workflow');
+
+ print "creating status workflow...\n";
+
+ # One pass to add the status entries.
+ foreach my $status (@statuses) {
+ next if !$status->{value};
+ $dbh->do('INSERT INTO bug_status (value, sortkey, isactive, is_open) VALUES (?, ?, ?, ?)',
+ undef, ( $status->{value}, $status->{sortkey}, $status->{isactive}, $status->{isopen} ));
+ }
+
+ # Another pass to add the transitions.
+ foreach my $status (@statuses) {
+ my $old_id;
+ if ($status->{value}) {
+ my $from_status = new Bugzilla::Status({ name => $status->{value} });
+ $old_id = $from_status->{id};
+ } else {
+ $old_id = undef;
+ }
+
+ foreach my $transition (@{$status->{transitions}}) {
+ my $to_status = new Bugzilla::Status({ name => $transition->[0] });
+
+ $dbh->do('INSERT INTO status_workflow (old_status, new_status, require_comment) VALUES (?, ?, ?)',
+ undef, ( $old_id, $to_status->{id}, $transition->[1] ));
+ }
+ }
+}
+
+##########################################################################
+# Create Bugs
+##########################################################################
+
+# login to bugzilla
+my $admin_user = Bugzilla::User->check($config->{admin_user_login});
+Bugzilla->set_user($admin_user);
+
+my %field_values = (
+ 'priority' => 'Highest',
+ 'bug_status' => 'CONFIRMED',
+ 'version' => 'unspecified',
+ 'bug_file_loc' => '',
+ 'comment' => 'please ignore this bug',
+ 'component' => 'TestComponent',
+ 'rep_platform' => 'All',
+ 'short_desc' => 'This is a testing bug only',
+ 'product' => 'TestProduct',
+ 'op_sys' => 'Linux',
+ 'bug_severity' => 'normal',
+ 'groups' => [],
+);
+
+print "creating bugs...\n";
+Bugzilla::Bug->create( \%field_values );
+if (Bugzilla::Bug->new('public_bug')->{error}) {
+ # The deadline must be set so that this bug can be used to test
+ # timetracking fields using WebServices.
+ Bugzilla::Bug->create({ %field_values, alias => 'public_bug', deadline => '2010-01-01' });
+}
+
+##########################################################################
+# Create Classifications
+##########################################################################
+my @classifications = ({ name => "Class2_QA",
+ description => "required by Selenium... DON'T DELETE" },
+);
+
+print "creating classifications...\n";
+foreach my $class (@classifications) {
+ my $new_class = Bugzilla::Classification->new({ name => $class->{name} });
+ if (!$new_class) {
+ $dbh->do('INSERT INTO classifications (name, description) VALUES (?, ?)',
+ undef, ( $class->{name}, $class->{description} ));
+ }
+}
+##########################################################################
+# Create Products
+##########################################################################
+my $default_platform_id = $dbh->selectcol_arrayref("SELECT id FROM rep_platform WHERE value = 'Unspecified'");
+my $default_op_sys_id = $dbh->selectcol_arrayref("SELECT id FROM op_sys WHERE value = 'Unspecified'");
+
+my @products = (
+ { product_name => 'QA-Selenium-TEST',
+ description => "used by Selenium test.. DON'T DELETE",
+ versions => ['unspecified', 'QAVersion'],
+ milestones => ['QAMilestone'],
+ defaultmilestone => '---',
+ components => [
+ { name => "QA-Selenium-TEST",
+ description => "used by Selenium test.. DON'T DELETE",
+ initialowner => $config->{QA_Selenium_TEST_user_login},
+ initialqacontact => $config->{QA_Selenium_TEST_user_login},
+ initial_cc => [$config->{QA_Selenium_TEST_user_login}],
+
+ }
+ ],
+ default_platform_id => $default_platform_id,
+ default_op_sys_id => $default_op_sys_id,
+ },
+
+ { product_name => 'Another Product',
+ description =>
+ "Alternate product used by Selenium. <b>Do not edit!</b>",
+ versions => ['unspecified', 'Another1', 'Another2'],
+ milestones => ['AnotherMS1', 'AnotherMS2', 'Milestone'],
+ defaultmilestone => '---',
+
+ components => [
+ { name => "c1",
+ description => "c1",
+ initialowner => $config->{permanent_user},
+ initialqacontact => '',
+ initial_cc => [],
+
+ },
+ { name => "c2",
+ description => "c2",
+ initialowner => $config->{permanent_user},
+ initialqacontact => '',
+ initial_cc => [],
+
+ },
+ ],
+ default_platform_id => $default_platform_id,
+ default_op_sys_id => $default_op_sys_id,
+ },
+
+ { product_name => 'C2 Forever',
+ description => 'I must remain in the Class2_QA classification ' .
+ 'in all cases! Do not edit!',
+ classification => 'Class2_QA',
+ versions => ['unspecified', 'C2Ver'],
+ milestones => ['C2Mil'],
+ defaultmilestone => '---',
+ components => [
+ { name => "Helium",
+ description => "Feel free to add bugs to me",
+ initialowner => $config->{permanent_user},
+ initialqacontact => '',
+ initial_cc => [],
+
+ }
+ ],
+ default_platform_id => $default_platform_id,
+ default_op_sys_id => $default_op_sys_id,
+ },
+
+ { product_name => 'QA Entry Only',
+ description => 'Only the QA group may enter bugs here.',
+ versions => ['unspecified'],
+ milestones => [],
+ defaultmilestone => '---',
+ components => [
+ { name => "c1",
+ description => "Same name as Another Product's component",
+ initialowner => $config->{QA_Selenium_TEST_user_login},
+ initialqacontact => '',
+ initial_cc => [],
+ }
+ ],
+ default_platform_id => $default_platform_id,
+ default_op_sys_id => $default_op_sys_id,
+ },
+
+ { product_name => 'QA Search Only',
+ description => 'Only the QA group may search for bugs here.',
+ versions => ['unspecified'],
+ milestones => [],
+ defaultmilestone => '---',
+ components => [
+ { name => "c1",
+ description => "Still same name as the Another component",
+ initialowner => $config->{QA_Selenium_TEST_user_login},
+ initialqacontact => '',
+ initial_cc => [],
+ }
+ ],
+ default_platform_id => $default_platform_id,
+ default_op_sys_id => $default_op_sys_id,
+ },
+);
+
+print "creating products...\n";
+foreach my $product (@products) {
+ my $new_product =
+ Bugzilla::Product->new({ name => $product->{product_name} });
+ if (!$new_product) {
+ my $class_id = 1;
+ if ($product->{classification}) {
+ $class_id = Bugzilla::Classification->new({ name => $product->{classification} })->id;
+ }
+ $dbh->do('INSERT INTO products (name, description, classification_id, default_platform_id, default_op_sys_id)
+ VALUES (?, ?, ?, ?, ?)',
+ undef, ( $product->{product_name}, $product->{description}, $class_id,
+ $new_product->{default_platform_id}, $new_product->{default_op_sys_id} ));
+
+ $new_product
+ = new Bugzilla::Product( { name => $product->{product_name} } );
+
+ $dbh->do( 'INSERT INTO milestones (product_id, value) VALUES (?, ?)',
+ undef, ( $new_product->id, $product->{defaultmilestone} ) );
+
+ # Now clear the internal list of accessible products.
+ delete Bugzilla->user->{selectable_products};
+
+ foreach my $component ( @{ $product->{components} } ) {
+ # BMO Change for ComponentWatching extension
+ my $watch_user = lc($component->{name}) . '@' . lc($new_product->name) . '.bugs';
+ $watch_user =~ s/\s+/\-/g;
+
+ Bugzilla::User->create({
+ login_name => $watch_user,
+ cryptpassword => generate_random_password(),
+ disable_mail => 1,
+ });
+
+ my %params = %{ Bugzilla->input_params };
+ $params{watch_user} = $watch_user;
+ Bugzilla->input_params(\%params);
+
+ Bugzilla::Component->create(
+ { name => $component->{name},
+ product => $new_product,
+ description => $component->{description},
+ initialowner => $component->{initialowner},
+ initialqacontact => $component->{initialqacontact},
+ initial_cc => $component->{initial_cc},
+ }
+ );
+ }
+ }
+
+ foreach my $version (@{ $product->{versions} }) {
+ if (!new Bugzilla::Version({ name => $version,
+ product => $new_product }))
+ {
+ Bugzilla::Version->create({value => $version, product => $new_product});
+ }
+ }
+
+ foreach my $milestone (@{ $product->{milestones} }) {
+ if (!new Bugzilla::Milestone({ name => $milestone,
+ product => $new_product }))
+ {
+ # We don't use Bugzilla::Milestone->create because we want to
+ # bypass security checks.
+ $dbh->do('INSERT INTO milestones (product_id, value) VALUES (?,?)',
+ undef, $new_product->id, $milestone);
+ }
+ }
+}
+
+##########################################################################
+# Create Groups
+##########################################################################
+# create Master group
+my ( $group_name, $group_desc )
+ = ( "Master", "Master Selenium Group <b>DO NOT EDIT!</b>" );
+
+print "creating groups...\n";
+if ( !Bugzilla::Group->new( { name => $group_name } ) ) {
+ my $group = Bugzilla::Group->create({ name => $group_name,
+ description => $group_desc,
+ isbuggroup => 1});
+
+ $dbh->do('INSERT INTO group_control_map
+ (group_id, product_id, entry, membercontrol, othercontrol, canedit)
+ SELECT ?, products.id, 0, ?, ?, 0 FROM products',
+ undef, ( $group->id, CONTROLMAPSHOWN, CONTROLMAPSHOWN ) );
+}
+
+# create QA-Selenium-TEST group. Do not use Group->create() so that
+# the admin group doesn't inherit membership (yes, that's what we want!).
+( $group_name, $group_desc )
+ = ( "QA-Selenium-TEST", "used by Selenium test.. DON'T DELETE" );
+
+if ( !Bugzilla::Group->new( { name => $group_name } ) ) {
+ $dbh->do('INSERT INTO groups (name, description, isbuggroup, isactive)
+ VALUES (?, ?, 1, 1)', undef, ( $group_name, $group_desc ) );
+}
+
+# BMO 'editbugs' is also a member of 'canconfirm'
+my $editbugs = Bugzilla::Group->new({ name => 'editbugs' });
+my $canconfirm = Bugzilla::Group->new({ name => 'canconfirm' });
+$dbh->do('INSERT INTO group_group_map VALUES (?, ?, 0)',
+ undef, $editbugs->id, $canconfirm->id);
+
+##########################################################################
+# Add Users to Groups
+##########################################################################
+my @users_groups = (
+ { user => $config->{QA_Selenium_TEST_user_login}, group => 'QA-Selenium-TEST' },
+ { user => $config->{tweakparams_user_login}, group => 'tweakparams' },
+ { user => $config->{canconfirm_user_login}, group => 'canconfirm' },
+ { user => $config->{editbugs_user_login}, group => 'editbugs' },
+);
+
+print "adding users to groups...\n";
+foreach my $user_group (@users_groups) {
+
+ my $group = new Bugzilla::Group( { name => $user_group->{group} } );
+ my $user = new Bugzilla::User( { name => $user_group->{user} } );
+
+ my $sth_add_mapping = $dbh->prepare(
+ qq{INSERT INTO user_group_map (user_id, group_id, isbless, grant_type)
+ VALUES (?, ?, ?, ?)});
+ # Don't crash if the entry already exists.
+ eval {
+ $sth_add_mapping->execute( $user->id, $group->id, 0, GRANT_DIRECT );
+ };
+}
+
+##########################################################################
+# Associate Products with groups
+##########################################################################
+# Associate the QA-Selenium-TEST group with the QA-Selenium-TEST.
+my $created_group = new Bugzilla::Group( { name => 'QA-Selenium-TEST' } );
+my $secret_product = new Bugzilla::Product( { name => 'QA-Selenium-TEST' } );
+my $no_entry = new Bugzilla::Product({ name => 'QA Entry Only' });
+my $no_search = new Bugzilla::Product({ name => 'QA Search Only' });
+
+print "restricting products to groups...\n";
+# Don't crash if the entries already exist.
+my $sth = $dbh->prepare('INSERT INTO group_control_map
+ (group_id, product_id, entry, membercontrol, othercontrol, canedit)
+ VALUES (?, ?, ?, ?, ?, ?)');
+eval {
+ $sth->execute($created_group->id, $secret_product->id, 1, CONTROLMAPMANDATORY,
+ CONTROLMAPMANDATORY, 0);
+};
+eval {
+ $sth->execute($created_group->id, $no_entry->id, 1, CONTROLMAPNA, CONTROLMAPNA, 0);
+};
+eval {
+ $sth->execute($created_group->id, $no_search->id, 0, CONTROLMAPMANDATORY,
+ CONTROLMAPMANDATORY, 0);
+};
+
+##########################################################################
+# Create flag types
+##########################################################################
+my @flagtypes = (
+ {name => 'spec_multi_flag', desc => 'Specifically requestable and multiplicable bug flag',
+ is_requestable => 1, is_requesteeble => 1, is_multiplicable => 1, grant_group => 'editbugs',
+ target_type => 'b', cc_list => '', inclusions => ['Another Product:c1']},
+);
+
+print "creating flag types...\n";
+foreach my $flag (@flagtypes) {
+ # The name is not unique, even within a single product/component, so there is NO WAY
+ # to know if the existing flag type is the one we want or not.
+ # As our Selenium scripts would be confused anyway if there is already such a flag name,
+ # we simply skip it and assume the existing flag type is the one we want.
+ next if new Bugzilla::FlagType({ name => $flag->{name} });
+
+ my $grant_group_id = $flag->{grant_group} ? Bugzilla::Group->new({ name => $flag->{grant_group} })->id : undef;
+ my $request_group_id = $flag->{request_group} ? Bugzilla::Group->new({ name => $flag->{request_group} })->id : undef;
+
+ $dbh->do('INSERT INTO flagtypes (name, description, cc_list, target_type, is_requestable,
+ is_requesteeble, is_multiplicable, grant_group_id, request_group_id)
+ VALUES (?, ?, ?, ?, ?, ?, ?, ?, ?)',
+ undef, ($flag->{name}, $flag->{desc}, $flag->{cc_list}, $flag->{target_type},
+ $flag->{is_requestable}, $flag->{is_requesteeble}, $flag->{is_multiplicable},
+ $grant_group_id, $request_group_id));
+
+ my $type_id = $dbh->bz_last_key('flagtypes', 'id');
+
+ foreach my $inclusion (@{$flag->{inclusions}}) {
+ my ($product, $component) = split(':', $inclusion);
+ my ($prod_id, $comp_id);
+ if ($product) {
+ my $prod_obj = Bugzilla::Product->new({ name => $product });
+ $prod_id = $prod_obj->id;
+ if ($component) {
+ $comp_id = Bugzilla::Component->new({ name => $component, product => $prod_obj})->id;
+ }
+ }
+ $dbh->do('INSERT INTO flaginclusions (type_id, product_id, component_id)
+ VALUES (?, ?, ?)',
+ undef, ($type_id, $prod_id, $comp_id));
+ }
+}
+
+##########################################################################
+# Create custom fields
+##########################################################################
+my @fields = (
+ { name => 'cf_QA_status',
+ description => 'QA Status',
+ type => FIELD_TYPE_MULTI_SELECT,
+ sortkey => 100,
+ mailhead => 0,
+ enter_bug => 1,
+ obsolete => 0,
+ custom => 1,
+ values => ['verified', 'in progress', 'untested']
+ },
+ { name => 'cf_single_select',
+ description => 'SingSel',
+ type => FIELD_TYPE_SINGLE_SELECT,
+ sortkey => 200,
+ mailhead => 0,
+ enter_bug => 1,
+ custom => 1,
+ obsolete => 0,
+ values => [qw(one two three)],
+ },
+);
+
+print "creating custom fields...\n";
+foreach my $f (@fields) {
+ # Skip existing custom fields.
+ next if Bugzilla::Field->new({ name => $f->{name} });
+
+ my @values;
+ if (exists $f->{values}) {
+ @values = @{$f->{values}};
+ # We have to delete this key, else create() will complain
+ # that 'values' is not an existing column name.
+ delete $f->{values};
+ }
+ Bugzilla::Field->create($f);
+ my $field = Bugzilla::Field->new({ name => $f->{name} });
+
+ # Now populate the table with valid values, if necessary.
+ next unless scalar @values;
+
+ my $sth = $dbh->prepare('INSERT INTO ' . $field->name . ' (value) VALUES (?)');
+ foreach my $value (@values) {
+ $sth->execute($value);
+ }
+}
+
+####################################################################
+# Set Parameters That Require Other Things To Have Been Done First #
+####################################################################
+
+if (Bugzilla->params->{insidergroup} ne 'QA-Selenium-TEST') {
+ SetParam('insidergroup', 'QA-Selenium-TEST');
+ $params_modified = 1;
+}
+
+if ($params_modified) {
+ write_params();
+ print <<EOT
+** Parameters have been modified by this script. Please re-run
+** checksetup.pl to set file permissions on data/params correctly.
+
+EOT
+}
+
+########################
+# Create a Private Bug #
+########################
+
+my $test_user = Bugzilla::User->check($config->{QA_Selenium_TEST_user_login});
+Bugzilla->set_user($test_user);
+
+print "Creating private bug(s)...\n";
+if (Bugzilla::Bug->new('private_bug')->{error}) {
+ my %priv_values = %field_values;
+ $priv_values{alias} = 'private_bug';
+ $priv_values{product} = 'QA-Selenium-TEST';
+ $priv_values{component} = 'QA-Selenium-TEST';
+ my $bug = Bugzilla::Bug->create(\%priv_values);
+}
+
+######################
+# Create Attachments #
+######################
+
+# BMO FIXME: Users must be in 'editbugs' to set their own
+# content type other than text/plain or application/octet-stream
+$group = new Bugzilla::Group( { name => 'editbugs' } );
+my $sth_add_mapping = $dbh->prepare(
+ qq{INSERT INTO user_group_map (user_id, group_id, isbless, grant_type)
+ VALUES (?, ?, ?, ?)});
+# Don't crash if the entry already exists.
+eval {
+ $sth_add_mapping->execute( Bugzilla->user->id, $group->id, 0, GRANT_DIRECT );
+};
+
+print "creating attachments...\n";
+
+# We use the contents of this script as the attachment.
+open(my $attachment_fh, '<', __FILE__) or die __FILE__ . ": $!";
+
+my $attachment_contents;
+{ local $/; $attachment_contents = <$attachment_fh>; }
+
+close($attachment_fh);
+
+foreach my $alias (qw(public_bug private_bug)) {
+ my $bug = Bugzilla::Bug->new($alias);
+ foreach my $is_private (0, 1) {
+ Bugzilla::Attachment->create({
+ bug => $bug,
+ data => $attachment_contents,
+ description => "${alias}_${is_private}",
+ filename => "${alias}_${is_private}.pl",
+ mimetype => 'application/x-perl',
+ isprivate => $is_private,
+ });
+ }
+}
+
+# BMO FIXME: Remove test user from 'editbugs' group
+my $sth_remove_mapping = $dbh->prepare(
+ qq{DELETE FROM user_group_map WHERE user_id = ?
+ AND group_id = ? AND isbless = 0 AND grant_type = ?});
+# Don't crash if the entry already exists.
+eval {
+ $sth_remove_mapping->execute( Bugzilla->user->id, $group->id, GRANT_DIRECT );
+};
+
+###################
+# Create Keywords #
+###################
+
+my @keywords = (
+ { name => 'test-keyword-1',
+ description => 'Created for Bugzilla QA Tests, Keyword 1' },
+ { name => 'test-keyword-2',
+ description => 'Created for Bugzilla QA Tests, Keyword 2' },
+);
+
+print "creating keywords...\n";
+foreach my $kw (@keywords) {
+ next if new Bugzilla::Keyword({ name => $kw->{name} });
+ Bugzilla::Keyword->create($kw);
+}
+
+############################
+# Install the QA extension #
+############################
+
+print "copying the QA extension...\n";
+dircopy("$conf_path/qa/extensions/QA", "$conf_path/extensions/QA");
+
+my $cwd = cwd();
+chdir($conf_path);
+system("perl", "contrib/fixperms.pl");
+chdir($cwd);
+
+print "installation and configuration complete!\n";
diff --git a/qa/config/patch.diff b/qa/config/patch.diff
new file mode 100644
index 000000000..d85ecbdfe
--- /dev/null
+++ b/qa/config/patch.diff
@@ -0,0 +1,18 @@
+Index: Bugzilla/Config/MTA.pm
+===================================================================
+RCS file: /cvsroot/mozilla/webtools/bugzilla/Bugzilla/Config/MTA.pm,v
+retrieving revision 1.13
+diff -3 -p -u -r1.13 MTA.pm
+--- Bugzilla/Config/MTA.pm 13 Nov 2006 23:32:28 -0000 1.13
++++ Bugzilla/Config/MTA.pm 9 Dec 2006 12:19:44 -0000
+@@ -44,7 +44,9 @@ sub get_param_list {
+ {
+ name => 'mail_delivery_method',
+ type => 's',
+- choices => [Email::Send->new()->all_mailers(), 'None'],
++ # Bugzilla is not ready yet to send mails to newsgroups, and 'IO'
++ # is of no use for now as we already have our own 'Test' mode.
++ choices => [grep {$_ ne 'NNTP' && $_ ne 'IO'} Email::Send->new()->all_mailers(), 'None'],
+ default => 'Sendmail',
+ checker => \&check_mail_delivery_method
+ },
diff --git a/qa/config/selenium_test.conf b/qa/config/selenium_test.conf
new file mode 100644
index 000000000..896d332e9
--- /dev/null
+++ b/qa/config/selenium_test.conf
@@ -0,0 +1,49 @@
+# This Source Code Form is subject to the terms of the Mozilla Public
+# License, v. 2.0. If a copy of the MPL was not distributed with this
+# file, You can obtain one at http://mozilla.org/MPL/2.0/.
+#
+# This Source Code Form is "Incompatible With Secondary Licenses", as
+# defined by the Mozilla Public License, v. 2.0.
+
+# To make this configuration file useful to you, you have to:
+# - set the path and URL to your Bugzilla installation.
+# - replace @mozilla.test by something more relevant to you,
+# also what comes before @mozilla.test if you want/need to.
+# - set passwords for each user accounts.
+
+{ 'browser' => '*firefox',
+ 'experimental_browser_launcher' => '*chrome',
+ 'host' => 'localhost',
+ 'port' => 4444,
+ 'browser_url' => 'http://localhost',
+ 'attachment_file' => '/home/bugzilla/devel/htdocs/1144485/qa/config/patch.diff',
+ 'bugzilla_installation' => '1144485',
+ 'bugzilla_path' => '/home/bugzilla/devel/htdocs/1144485',
+ 'test_bug_1' => 1,
+ 'test_bug_2' => 2,
+ 'admin_user_login' => 'admin@mozilla.test',
+ 'admin_user_passwd' => 'password',
+ 'admin_user_username' => 'QA Admin',
+ 'admin_user_nick' => 'admin',
+ 'permanent_user' => 'permanent_user@mozilla.test',
+ 'permanent_user_login' => 'permanent_user@mozilla.test',
+ 'permanent_user_passwd' => 'password',
+ 'unprivileged_user_login' => 'no-privs@mozilla.test',
+ 'unprivileged_user_passwd' => 'password',
+ 'unprivileged_user_username' => 'no-privs',
+ 'unprivileged_user_nick' => 'no-privs',
+ 'unprivileged_user_login_truncated' => 'no-privs@mo',
+ 'QA_Selenium_TEST_user_login' => 'QA-Selenium-TEST@mozilla.test',
+ 'QA_Selenium_TEST_user_passwd' => 'password',
+ 'editbugs_user_login' => 'editbugs@mozilla.test',
+ 'editbugs_user_passwd' => 'password',
+ 'canconfirm_user_login' => 'canconfirm@mozilla.test',
+ 'canconfirm_user_passwd' => 'password',
+ 'tweakparams_user_login' => 'tweakparams@mozilla.test',
+ 'tweakparams_user_login_truncated' => 'tweakparams@mo',
+ 'tweakparams_user_passwd' => 'password',
+ 'disabled_user_login' => 'disabled@mozilla.test',
+ 'disabled_user_passwd' => 'password',
+ 'common_email' => '@mozilla.test',
+ 'test_extensions' => 1,
+};