summaryrefslogtreecommitdiffstats
path: root/template/en/default/admin/sanitycheck/messages.html.tmpl
blob: 88264d820f949e7944a7583518bd3d30e5f2f3b6 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
[%# The contents of this file are subject to the Mozilla Public
  # License Version 1.1 (the "License"); you may not use this file
  # except in compliance with the License. You may obtain a copy of
  # the License at http://www.mozilla.org/MPL/
  #
  # Software distributed under the License is distributed on an "AS
  # IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or
  # implied. See the License for the specific language governing
  # rights and limitations under the License.
  #
  # The Original Code is the Bugzilla Bug Tracking System.
  #
  # The Initial Developer of the Original Code is Frédéric Buclin.
  #
  # Contributor(s): Frédéric Buclin <LpSolit@gmail.com>
  #%]

[% PROCESS global/variables.none.tmpl %]

[% san_message = BLOCK %]
  [% IF san_tag == "checks_start" %]
    OK, now running sanity checks.

  [% ELSIF san_tag == "checks_completed" %]
    Sanity check completed.

  [% ELSIF san_tag == "attachment_reference_deletion_start" %]
    OK, now removing all references to deleted attachments.

  [% ELSIF san_tag == "attachment_reference_deletion_end" %]
    All references to deleted attachments have been removed.

  [% ELSIF san_tag == "bug_check_alert" %]
    [% errortext FILTER html %]: [% INCLUDE bug_list badbugs = badbugs %]

  [% ELSIF san_tag == "bug_check_repair" %]
    <a href="sanitycheck.cgi?[% param FILTER uri %]=1&amp;token=
       [%- issue_hash_token(['sanitycheck']) FILTER uri %]">[% text FILTER html %]</a>.

  [% ELSIF san_tag == "bug_check_creation_date" %]
    Checking for [% terms.bugs %] with no creation date (which makes them invisible).

  [% ELSIF san_tag == "bug_check_creation_date_error_text" %]
    [% terms.Bugs %] with no creation date

  [% ELSIF san_tag == "bug_check_creation_date_repair_text" %]
    Repair missing creation date for these [% terms.bugs %]

  [% ELSIF san_tag == "bug_check_bugs_fulltext" %]
    Checking for [% terms.bugs %] with no entry for full text searching.

  [% ELSIF san_tag == "bug_check_bugs_fulltext_error_text" %]
    [% terms.Bugs %] with no entry for full text searching

  [% ELSIF san_tag == "bug_check_bugs_fulltext_repair_text" %]
    Repair missing full text search entries for these [% terms.bugs %]

  [% ELSIF san_tag == "bug_check_res_dupl" %]
    Checking resolution/duplicates

  [% ELSIF san_tag == "bug_check_res_dupl_error_text" %]
    [% terms.Bugs %] found on duplicates table that are not marked duplicate

  [% ELSIF san_tag == "bug_check_res_dupl_error_text2" %]
    [% terms.Bugs %] found marked resolved duplicate and not on duplicates table

  [% ELSIF san_tag == "bug_check_status_res" %]
    Checking statuses/resolutions

  [% ELSIF san_tag == "bug_check_status_res_error_text" %]
    [% terms.Bugs %] with open status and a resolution

  [% ELSIF san_tag == "bug_check_status_res_error_text2" %]
    [% terms.Bugs %] with non-open status and no resolution

  [% ELSIF san_tag == "bug_check_status_everconfirmed" %]
    Checking statuses/everconfirmed

  [% ELSIF san_tag == "bug_check_status_everconfirmed_error_text" %]
    [% terms.Bugs %] that are UNCONFIRMED but have everconfirmed set

  [% ELSIF san_tag == "bug_check_status_everconfirmed_error_text2" %]
    [% terms.Bugs %] with confirmed status but don't have everconfirmed set

  [% ELSIF san_tag == "bug_check_control_values" %]
    Checking for bad values in group_control_map

  [% ELSIF san_tag == "bug_check_control_values_alert" %]
    Found [% entries FILTER html %] bad group_control_map entries

  [% ELSIF san_tag == "bug_check_control_values_violation" %]
    Checking for [% terms.bugs %] with groups violating their product's group controls

  [% ELSIF san_tag == "bug_check_control_values_error_text" %]
    Have groups not permitted for their products

  [% ELSIF san_tag == "bug_check_control_values_repair_text" %]
    Permit the missing groups for the affected products
    (set member control to <code>SHOWN</code>)

  [% ELSIF san_tag == "bug_check_control_values_error_text2" %]
    Are missing groups required for their products

  [% ELSIF san_tag == "bug_creation_date_start" %]
    OK, now fixing missing [% terms.bug %] creation dates.

  [% ELSIF san_tag == "bug_creation_date_fixed" %]
    [% bug_count FILTER html %] [%+ terms.bugs %] have been fixed.

  [% ELSIF san_tag == "bugs_fulltext_start" %]
    OK, now fixing [% terms.bug %] entries for full text searching.

  [% ELSIF san_tag == "bugs_fulltext_fixed" %]
    [% bug_count FILTER html %] [%+ terms.bugs %] have been fixed.

  [% ELSIF san_tag == "bug_reference_deletion_start" %]
    OK, now removing all references to deleted [% terms.bugs %].

  [% ELSIF san_tag == "bug_reference_deletion_end" %]
    All references to deleted [% terms.bugs %] have been removed.

  [% ELSIF san_tag == "cross_check_to" %]
    Checking references to [% table FILTER html %].[% field FILTER html %]...

  [% ELSIF san_tag == "cross_check_from" %]
    ... from [% table FILTER html %].[% field FILTER html %].

  [% ELSIF san_tag == "cross_check_alert" %]
    Bad value '[% value FILTER html %]' found in
    [%+ table FILTER html %].[% field FILTER html %]
    [% IF keyname %]
      [% IF keyname == "bug_id" %]
        ([% PROCESS bug_link bug_id = key %])
      [% ELSE %]
        ([% keyname FILTER html %] == '[% key FILTER html %]')
      [% END %]
    [% END %]

  [% ELSIF san_tag == "cross_check_attachment_has_references" %]
    <a href="sanitycheck.cgi?remove_invalid_attach_references=1&amp;token=
       [%- issue_hash_token(['sanitycheck']) FILTER uri %]">Remove
    invalid references to non existent attachments.</a>

  [% ELSIF san_tag == "cross_check_bug_has_references" %]
    <a href="sanitycheck.cgi?remove_invalid_bug_references=1&amp;token=
       [%- issue_hash_token(['sanitycheck']) FILTER uri %]">Remove
    invalid references to non existent [% terms.bugs %].</a>

  [% ELSIF san_tag == "double_cross_check_to" %]
    Checking references to [% table FILTER html %].[% field1 FILTER html %] /
    [%+ table FILTER html %].[% field2 FILTER html %]...

  [% ELSIF san_tag == "double_cross_check_from" %]
    ... from [% table FILTER html %].[% field1 FILTER html %] /
    [%+ table FILTER html %].[% field2 FILTER html %].

  [% ELSIF san_tag == "double_cross_check_alert" %]
    Bad values '[% value1 FILTER html %]', '[% value2 FILTER html %]' found
    in [% table FILTER html %].[% field1 FILTER html %] /
    [%+ table FILTER html %].[% field2 FILTER html %].
    [% IF keyname %]
      [% IF keyname == "bug_id" %]
        ([% PROCESS bug_link bug_id = key %])
      [% ELSE %]
        ([% keyname FILTER html %] == '[% key FILTER html %]')
      [% END %]
    [% END %]

  [% ELSIF san_tag == "everconfirmed_start" %]
    OK, now fixing everconfirmed.

  [% ELSIF san_tag == "everconfirmed_end" %]
    everconfirmed fixed.

  [% ELSIF san_tag == "flag_check_start" %]
    Checking for flags being in the wrong product/component.

  [% ELSIF san_tag == "flag_deletion_start" %]
    OK, now deleting invalid flags.

  [% ELSIF san_tag == "flag_deletion_end" %]
    Invalid flags deleted.

  [% ELSIF san_tag == "flag_alert" %]
    Invalid flag [% flag_id FILTER html %] for
    [% IF attach_id %]
      attachment [% attach_id FILTER html %] in
    [% END %]
    [%+ PROCESS bug_link bug_id = bug_id %].

  [% ELSIF san_tag == "flag_fix" %]
    <a href="sanitycheck.cgi?remove_invalid_flags=1&amp;token=
       [%- issue_hash_token(['sanitycheck']) FILTER uri %]">Click
    here to delete invalid flags</a>

  [% ELSIF san_tag == "group_control_map_entries_creation" %]
    OK, now creating <code>SHOWN</code> member control entries
    for product/group combinations lacking one.

  [% ELSIF san_tag == "group_control_map_entries_update" %]
    Updating <code>NA/<em>xxx</em></code> group control setting
    for group <em>[% group_name FILTER html %]</em> to
    <code>SHOWN/<em>xxx</em></code> in product
    <em>[% product_name FILTER html %]</em>.

  [% ELSIF san_tag == "group_control_map_entries_generation" %]
    Generating <code>SHOWN/NA</code> group control setting
    for group <em>[% group_name FILTER html %]</em> in product
    <em>[% product_name FILTER html %]</em>.

  [% ELSIF san_tag == "group_control_map_entries_repaired" %]
    Repaired [% counter FILTER html %] defective group control settings.

  [% ELSIF san_tag == "keyword_check_start" %]
    Checking keywords table.

  [% ELSIF san_tag == "keyword_check_alert" %]
    Duplicate entry in keyworddefs for id [% id FILTER html %].

  [% ELSIF san_tag == "keyword_check_invalid_name" %]
    Bogus name in keyworddefs for id [% id FILTER html %].

  [% ELSIF san_tag == "keyword_check_invalid_id" %]
    Bogus keywordids [% id FILTER html %] found in keywords table.

  [% ELSIF san_tag == "keyword_check_duplicated_ids" %]
    Duplicate keyword IDs found in [% PROCESS bug_link bug_id = id %].

  [% ELSIF san_tag == "profile_login_start" %]
    Checking profile logins.

  [% ELSIF san_tag == "profile_login_alert" %]
    Bad profile email address, id=[% id FILTER html %],
    &lt;[% email FILTER html %]&gt;.

  [% ELSIF san_tag == "repair_bugs" %]
    Repair these [% terms.bugs %].

  [% ELSIF san_tag == "send_bugmail_start" %]
    OK, now attempting to send unsent mail.

  [% ELSIF san_tag == "send_bugmail_status" %]
    [% bug_count FILTER html %] [%+ terms.bugs %] found with
    possibly unsent mail.

  [% ELSIF san_tag == "send_bugmail_end" %]
    Unsent mail has been sent.

  [% ELSIF san_tag == "unsent_bugmail_check" %]
    Checking for unsent mail

  [% ELSIF san_tag == "unsent_bugmail_alert" %]
    [% terms.Bugs %] that have changes but no mail sent for at least
    half an hour: [% INCLUDE bug_list badbugs = badbugs %]

  [% ELSIF san_tag == "unsent_bugmail_fix" %]
    <a href="sanitycheck.cgi?rescanallBugMail=1&amp;token=
       [%- issue_hash_token(['sanitycheck']) FILTER uri %]">Send these mails</a>.

  [% ELSIF san_tag == "whines_obsolete_target_deletion_start" %]
    OK, now removing non-existent users/groups from whines.

  [% ELSIF san_tag == "whines_obsolete_target_deletion_end" %]
    Non-existent users/groups have been removed from whines.

  [% ELSIF san_tag == "whines_obsolete_target_start" %]
    Checking for whines with non-existent users/groups.

  [% ELSIF san_tag == "whines_obsolete_target_alert" %]
    [% FOREACH schedule = schedules %]
      Non-existent [% (type == constants.MAILTO_USER) ? "user" : "group" FILTER html %]
      [%+ schedule.1 FILTER html %] for whine schedule [% schedule.0 FILTER html %]<br>
    [% END %]

  [% ELSIF san_tag == "whines_obsolete_target_fix" %]
    <a href="sanitycheck.cgi?remove_old_whine_targets=1&amp;token=
       [%- issue_hash_token(['sanitycheck']) FILTER uri %]">Click here to
    remove old users/groups</a>

  [% ELSE %]
    [% message = Hook.process("statuses") %]

    [% IF message %]
      [% message FILTER none %]
    [% ELSE %]
      The status message string <code>[% san_tag FILTER html %]</code>
      was not found. Please send email to [% Param("maintainer") %] describing
      the steps taken to obtain this message.
    [% END %]

  [% END %]
[% END %]

[% USE Bugzilla %]
[% IF Bugzilla.usage_mode == constants.USAGE_MODE_CMDLINE %]
  [% san_message FILTER none %]
[% ELSE %]
  [%# Avoid the txt filter in message.txt.tmpl. %]
  [% san_message FILTER html %]
[% END %]

[% BLOCK bug_list %]
  [% FOREACH bug_id = badbugs %]
    [%# Do not use FILTER bug_link() here, because bug_link() calls get_text()
     # which itself calls this template again, generating a recursion error.
     # I doubt having a tooltip with the bug status and summary is so
     # important here anyway, as you can click the "(as buglist)" link. %]
    <a href="show_bug.cgi?id=[% bug_id FILTER uri %]">[% bug_id FILTER html %]</a>
    [% ", " IF !loop.last %]
  [% END %]
  (<a href="buglist.cgi?bug_id=[% badbugs.join(",") FILTER uri %]">as [% terms.bug %] list</a>).
[% END %]

[% BLOCK bug_link %]
  <a href="show_bug.cgi?id=[% bug_id FILTER uri %]">[% terms.bug %] [%+ bug_id FILTER html %]</a>
[% END %]