1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
|
# This Source Code Form is subject to the terms of the Mozilla Public
# License, v. 2.0. If a copy of the MPL was not distributed with this
# file, You can obtain one at http://mozilla.org/MPL/2.0/.
#
# This Source Code Form is "Incompatible With Secondary Licenses", as
# defined by the Mozilla Public License, v. 2.0.
package Bugzilla::Extension::Push::Connector::Phabricator;
use 5.10.1;
use strict;
use warnings;
use base 'Bugzilla::Extension::Push::Connector::Base';
use Bugzilla::Bug;
use Bugzilla::Constants;
use Bugzilla::Extension::PhabBugz::Constants;
use Bugzilla::Extension::PhabBugz::Policy;
use Bugzilla::Extension::PhabBugz::Project;
use Bugzilla::Extension::PhabBugz::Revision;
use Bugzilla::Extension::PhabBugz::Util qw(
get_attachment_revisions
get_bug_role_phids
);
use Bugzilla::Extension::Push::Constants;
use Bugzilla::Extension::Push::Util qw(is_public);
sub options {
return ({
name => 'phabricator_url',
label => 'Phabricator URL',
type => 'string',
default => '',
required => 1,
});
}
sub should_send {
my ($self, $message) = @_;
return 0 unless Bugzilla->params->{phabricator_enabled};
# We are only interested currently in bug group, assignee, qa-contact, or cc changes.
return 0
unless $message->routing_key
=~ /^(?:attachment|bug)\.modify:.*\b(bug_group|assigned_to|qa_contact|cc)\b/;
my $bug = $self->_get_bug_by_data($message->payload_decoded) || return 0;
return $bug->has_attachment_with_mimetype(PHAB_CONTENT_TYPE);
}
sub send {
my ($self, $message) = @_;
my $logger = Bugzilla->push_ext->logger;
my $data = $message->payload_decoded;
my $bug = $self->_get_bug_by_data($data) || return PUSH_RESULT_OK;
my $is_public = is_public($bug);
my $revisions = get_attachment_revisions($bug);
my $group_change
= ($message->routing_key =~ /^(?:attachment|bug)\.modify:.*\bbug_group\b/)
? 1
: 0;
foreach my $revision (@$revisions) {
if ($is_public && $group_change) {
Bugzilla->audit(
sprintf('Making revision %s public for bug %s', $revision->id, $bug->id));
$revision->make_public();
}
elsif (!$is_public && $group_change) {
Bugzilla->audit(sprintf(
'Giving revision %s a custom policy for bug %s',
$revision->id, $bug->id
));
my $set_project_names = [map { "bmo-" . $_->name } @{$bug->groups_in}];
$revision->make_private($set_project_names);
}
# Subscriber list of the private revision should always match
# the bug roles such as assignee, qa contact, and cc members.
if (!$is_public) {
Bugzilla->audit(
sprintf('Updating subscribers for %s for bug %s', $revision->id, $bug->id));
my $subscribers = get_bug_role_phids($bug);
$revision->set_subscribers($subscribers) if $subscribers;
}
$revision->update();
}
return PUSH_RESULT_OK;
}
sub _get_bug_by_data {
my ($self, $data) = @_;
my $bug_data = $self->_get_bug_data($data) || return 0;
my $bug = Bugzilla::Bug->new({id => $bug_data->{id}});
}
sub _get_bug_data {
my ($self, $data) = @_;
my $target = $data->{event}->{target};
if ($target eq 'bug') {
return $data->{bug};
}
elsif (exists $data->{$target}->{bug}) {
return $data->{$target}->{bug};
}
else {
return;
}
}
1;
|