Merge lp:~frankban/launchpad/setuplxc-remove-sleep into lp:~frankban/launchpad/more-integration
- setuplxc-remove-sleep
- Merge into more-integration
Proposed by
Francesco Banconi
Status: | Rejected |
---|---|
Rejected by: | Francesco Banconi |
Proposed branch: | lp:~frankban/launchpad/setuplxc-remove-sleep |
Merge into: | lp:~frankban/launchpad/more-integration |
Diff against target: |
1962 lines (+552/-406) 34 files modified
database/schema/security.cfg (+1/-43) lib/canonical/launchpad/icing/css/colours.css (+0/-20) lib/canonical/launchpad/icing/shipit.css (+0/-150) lib/lp/app/templates/base-layout-macros.pt (+16/-17) lib/lp/app/templates/base-layout.pt (+15/-28) lib/lp/app/templates/root-index.pt (+1/-1) lib/lp/bugs/stories/guided-filebug/xx-bug-reporting-tools.txt (+10/-6) lib/lp/bugs/stories/guided-filebug/xx-ubuntu-filebug.txt (+8/-0) lib/lp/registry/browser/pillar.py (+3/-3) lib/lp/registry/browser/tests/test_pillar_sharing.py (+1/-1) lib/lp/registry/interfaces/accesspolicy.py (+10/-0) lib/lp/registry/interfaces/accesspolicyservice.py (+11/-10) lib/lp/registry/javascript/disclosure/observerpicker.js (+13/-13) lib/lp/registry/javascript/disclosure/observertable.js (+14/-12) lib/lp/registry/javascript/disclosure/pillarsharingview.js (+36/-8) lib/lp/registry/javascript/disclosure/tests/test_observerpicker.js (+8/-7) lib/lp/registry/javascript/disclosure/tests/test_observertable.js (+5/-3) lib/lp/registry/javascript/disclosure/tests/test_pillarsharingview.html (+4/-0) lib/lp/registry/javascript/disclosure/tests/test_pillarsharingview.js (+50/-9) lib/lp/registry/model/accesspolicy.py (+15/-0) lib/lp/registry/services/accesspolicyservice.py (+48/-21) lib/lp/registry/services/tests/test_accesspolicyservice.py (+87/-17) lib/lp/registry/tests/test_accesspolicy.py (+41/-0) lib/lp/scripts/garbo.py (+72/-1) lib/lp/scripts/tests/test_garbo.py (+22/-0) lib/lp/services/webapp/adapter.py (+3/-3) lib/lp/services/webapp/errorlog.py (+8/-10) lib/lp/services/webapp/tests/test_user_requested_oops.py (+19/-12) lib/lp/soyuz/stories/soyuz/xx-builder-page.txt (+4/-1) lib/lp/soyuz/stories/soyuz/xx-buildfarm-index.txt (+2/-0) lib/lp/soyuz/stories/soyuz/xx-builds-pages.txt (+2/-1) lib/lp/soyuz/stories/soyuz/xx-private-builds.txt (+5/-1) lib/lp/translations/stories/buildfarm/xx-build-summary.txt (+1/-0) utilities/setuplxc.py (+17/-8) |
To merge this branch: | bzr merge lp:~frankban/launchpad/setuplxc-remove-sleep |
Related bugs: |
Reviewer | Review Type | Date Requested | Status |
---|---|---|---|
Gary Poster (community) | Approve | ||
Review via email: mp+96422@code.launchpad.net |
Commit message
Description of the change
== Changes ==
- Replaced *sleep 30* with an ssh/sleep loop.
- Removed unused function argument in *create_scripts*.
== Notes ==
The diff is against the merge of latest Benji's branch and devel.
To post a comment you must log in.
Preview Diff
[H/L] Next/Prev Comment, [J/K] Next/Prev File, [N/P] Next/Prev Hunk
1 | === modified file 'database/schema/security.cfg' |
2 | --- database/schema/security.cfg 2012-03-06 05:23:43 +0000 |
3 | +++ database/schema/security.cfg 2012-03-08 16:34:46 +0000 |
4 | @@ -140,7 +140,6 @@ |
5 | public.bugattachment = SELECT, INSERT, UPDATE, DELETE |
6 | public.bugbranch = SELECT, INSERT, UPDATE, DELETE |
7 | public.bugcve = SELECT, INSERT, DELETE |
8 | -public.bugjob = SELECT, INSERT, UPDATE, DELETE |
9 | public.bugnomination = SELECT, UPDATE |
10 | public.bugnotification = SELECT, INSERT, UPDATE, DELETE |
11 | public.bugnotificationattachment = SELECT, INSERT |
12 | @@ -564,7 +563,6 @@ |
13 | public.bugactivity = SELECT, INSERT |
14 | public.bugaffectsperson = SELECT, INSERT, UPDATE, DELETE |
15 | public.bugcve = SELECT, INSERT |
16 | -public.bugjob = SELECT, INSERT |
17 | public.bugmessage = SELECT, INSERT, UPDATE |
18 | public.bugmute = SELECT |
19 | public.bugnomination = SELECT |
20 | @@ -1124,7 +1122,6 @@ |
21 | public.bug = SELECT, INSERT, UPDATE |
22 | public.bugactivity = SELECT, INSERT, UPDATE |
23 | public.bugattachment = SELECT, INSERT, UPDATE |
24 | -public.bugjob = SELECT, INSERT |
25 | public.bugmessage = SELECT, INSERT, UPDATE |
26 | public.bugmute = SELECT, INSERT, UPDATE, DELETE |
27 | public.bugnomination = SELECT, INSERT, UPDATE, DELETE |
28 | @@ -1273,7 +1270,6 @@ |
29 | public.bugactivity = SELECT, INSERT |
30 | public.bugaffectsperson = SELECT, INSERT, UPDATE, DELETE |
31 | public.bugcve = SELECT, INSERT |
32 | -public.bugjob = SELECT, INSERT |
33 | public.bugmessage = SELECT, INSERT |
34 | public.bugmute = SELECT |
35 | public.bugnomination = SELECT |
36 | @@ -1377,7 +1373,6 @@ |
37 | public.bugactivity = SELECT, INSERT |
38 | public.bugaffectsperson = SELECT, INSERT, UPDATE, DELETE |
39 | public.bugcve = SELECT, INSERT |
40 | -public.bugjob = SELECT, INSERT |
41 | public.bugmessage = SELECT, INSERT |
42 | public.bugmute = SELECT |
43 | public.bugnomination = SELECT |
44 | @@ -1470,13 +1465,6 @@ |
45 | type=user |
46 | groups=queued |
47 | |
48 | -[ppad] |
49 | -groups=script |
50 | -public.archive = SELECT |
51 | -public.archivearch = SELECT |
52 | -public.person = SELECT |
53 | -type=user |
54 | - |
55 | [session] |
56 | type=user |
57 | |
58 | @@ -1490,7 +1478,6 @@ |
59 | public.bugactivity = SELECT, INSERT |
60 | public.bugaffectsperson = SELECT, INSERT, UPDATE, DELETE |
61 | public.bugattachment = SELECT |
62 | -public.bugjob = SELECT, INSERT |
63 | public.bugmessage = SELECT, INSERT |
64 | public.bugmute = SELECT |
65 | public.bugnomination = SELECT |
66 | @@ -1641,15 +1628,6 @@ |
67 | public.translationtemplateitem = SELECT |
68 | type=user |
69 | |
70 | -[oopsprune] |
71 | -groups=script |
72 | -public.bug = SELECT |
73 | -public.bugtask = SELECT |
74 | -public.message = SELECT |
75 | -public.messagechunk = SELECT |
76 | -public.question = SELECT |
77 | -type=user |
78 | - |
79 | [listteammembers] |
80 | public.emailaddress = SELECT |
81 | public.person = SELECT |
82 | @@ -1680,7 +1658,6 @@ |
83 | public.bugattachment = SELECT, INSERT |
84 | public.bugbranch = SELECT |
85 | public.bugcve = SELECT, INSERT |
86 | -public.bugjob = SELECT, INSERT |
87 | public.bugmessage = SELECT, INSERT |
88 | public.bugmute = SELECT |
89 | public.bugnomination = SELECT, INSERT, UPDATE |
90 | @@ -1942,7 +1919,6 @@ |
91 | public.account = SELECT, INSERT, UPDATE |
92 | public.bug = SELECT, INSERT, UPDATE |
93 | public.bugaffectsperson = SELECT, INSERT, UPDATE, DELETE |
94 | -public.bugjob = SELECT, INSERT |
95 | public.bugmessage = SELECT, INSERT |
96 | public.bugsubscription = SELECT, INSERT |
97 | public.bugsubscriptionfilter = SELECT, INSERT |
98 | @@ -2125,13 +2101,9 @@ |
99 | public.wikiname = SELECT, UPDATE |
100 | type=user |
101 | |
102 | -[weblogstats] |
103 | -public.libraryfilealias = SELECT |
104 | -public.libraryfiledownloadcount = SELECT, INSERT, UPDATE, DELETE |
105 | -type=user |
106 | - |
107 | [garbo] |
108 | groups=script,read |
109 | +public.accesspolicy = SELECT, INSERT |
110 | public.account = SELECT, DELETE |
111 | public.answercontact = SELECT, DELETE |
112 | public.branch = SELECT, UPDATE |
113 | @@ -2142,7 +2114,6 @@ |
114 | public.bug = SELECT, UPDATE |
115 | public.bugaffectsperson = SELECT |
116 | public.bugattachment = SELECT, DELETE |
117 | -public.bugjob = SELECT, INSERT |
118 | public.bugmessage = SELECT, UPDATE |
119 | public.bugnotification = SELECT, DELETE |
120 | public.bugnotificationfilter = SELECT, DELETE |
121 | @@ -2236,19 +2207,6 @@ |
122 | public.branch = SELECT |
123 | type=user |
124 | |
125 | -[calculate-bug-heat] |
126 | -groups=script,read |
127 | -public.bug = SELECT, UPDATE |
128 | -public.bugjob = SELECT, DELETE |
129 | -public.distribution = SELECT, UPDATE |
130 | -public.distributionsourcepackage = SELECT, INSERT, UPDATE |
131 | -public.distroseries = SELECT |
132 | -public.job = SELECT, UPDATE, DELETE |
133 | -public.product = SELECT, UPDATE |
134 | -public.productseries = SELECT |
135 | -public.project = SELECT, UPDATE |
136 | -type=user |
137 | - |
138 | [lagmon] |
139 | public.update_replication_lag_cache() = EXECUTE |
140 | type=user |
141 | |
142 | === modified file 'lib/canonical/launchpad/icing/css/colours.css' |
143 | --- lib/canonical/launchpad/icing/css/colours.css 2012-03-07 00:23:37 +0000 |
144 | +++ lib/canonical/launchpad/icing/css/colours.css 2012-03-08 16:34:46 +0000 |
145 | @@ -346,23 +346,3 @@ |
146 | .red { |
147 | color: red; |
148 | } |
149 | - |
150 | -.accessPolicyPUBLIC, .accessPolicyPUBLIC a { |
151 | - color: green; |
152 | - } |
153 | - |
154 | -.accessPolicyUNEMBARGOEDSECURITY, .accessPolicyUNEMBARGOEDSECURITY a { |
155 | - color: #1f7dff; |
156 | - } |
157 | - |
158 | -.accessPolicyEMBARGOEDSECURITY, .accessPolicyEMBARGOEDSECURITY a { |
159 | - color: #ff4500; |
160 | - } |
161 | - |
162 | -.accessPolicyUSERDATA, .accessPolicyUSERDATA a { |
163 | - color: #800080; |
164 | - } |
165 | - |
166 | -.accessPolicyPROPRIETARY, .accessPolicyPROPRIETARY a { |
167 | - color: red; |
168 | - } |
169 | |
170 | === removed file 'lib/canonical/launchpad/icing/shipit.css' |
171 | --- lib/canonical/launchpad/icing/shipit.css 2011-12-07 04:57:36 +0000 |
172 | +++ lib/canonical/launchpad/icing/shipit.css 1970-01-01 00:00:00 +0000 |
173 | @@ -1,150 +0,0 @@ |
174 | -/* === Overall presentation === */ |
175 | - |
176 | -html { |
177 | - position: relative; |
178 | - font-family: Ubuntu, 'Bitstream Vera Sans', 'DejaVu Sans', Tahoma, sans-serif; |
179 | - font-size: 12pt; |
180 | - color: black; |
181 | - background-color: #FFFFFF; |
182 | -} |
183 | -body {margin: 0; padding: 0;} |
184 | - |
185 | -div.body {padding: 0em 1em;} |
186 | - |
187 | -.discreet, .lesser {font-size: small;} |
188 | - |
189 | -/* --- Error, warning, and info messages --- */ |
190 | - |
191 | -.error, .warning, .informational { |
192 | - padding: 0.5em; |
193 | -} |
194 | -.message { |
195 | - background: 5px 0.5em no-repeat; |
196 | - font-weight: bold; |
197 | - margin: 1em 0 0.5em; |
198 | - padding: 0.5em 1em 0.5em 30px; /* 30px because the image has a pixel size */ |
199 | -} |
200 | -.error .message, .warning .message, .informational .message { |
201 | - margin: 0.25em 0 0; |
202 | - padding: 0 0 0 25px; |
203 | - background: 0 0 no-repeat; |
204 | -} |
205 | -.error {background-color: #f0cccc; color: black;} |
206 | -.error.message, .error .message { |
207 | - background-image: url(/@@/error); |
208 | -} |
209 | -.warning {background-color: #fcdd99; color: black;} |
210 | -.warning.message, .warning .message { |
211 | - background-image: url(/@@/warning); |
212 | -} |
213 | -.informational {background-color: #fcfc99; color: black;} |
214 | -.informational.message, .informational .message { |
215 | - background-image: url(/@@/info); |
216 | -} |
217 | -.debugging {background-color: #666; color: white;} |
218 | -.debugging.message, .debugging .message { |
219 | - background-image: url(/@@/info); |
220 | -} |
221 | - |
222 | -/* --- Form controls --- */ |
223 | - |
224 | -form {border: 0; margin: 0; padding: 0;} |
225 | -input, select, textarea { |
226 | - background-color: #fff; |
227 | - color: #656565; |
228 | - font-family: Ubuntu, 'Bitstream Vera Sans', 'DejaVu Sans', Tahoma, sans-serif; |
229 | - margin: 0; |
230 | -} |
231 | -input[type="text"], input[type="submit"], input[type="reset"], textarea { |
232 | - font-size: 1em; /* Forces a readable font size in Safari */ |
233 | -} |
234 | -input.urlTextType {width: 100%;} |
235 | -.fieldRequired, .fieldOptional {color: #999;} |
236 | -.formHelp {margin-bottom: 1em;} |
237 | -textarea {width: 100%;} |
238 | -table.form {width: 100%;} |
239 | - |
240 | -/* === Tables === */ |
241 | - |
242 | -table.latest th, table.latest td {padding-bottom: 2em;} |
243 | -table.summary {float: right; margin: 0 0 1em 1em;} |
244 | -table.summary caption {font-style: italic; margin-left: 1em;} |
245 | -div.right table.summary {float: none; margin: 1em auto;} |
246 | -table.summary tr {border: dotted #ccc; border-width: 1px 0;} |
247 | -table.summary td {padding-left: 0.5em;} |
248 | -table.summary ul, table.summary ul li { |
249 | - list-style-position: inside; |
250 | - margin: 0; |
251 | - padding: 0; |
252 | -} |
253 | -th, td {padding: 0.25em;} |
254 | -th.icon, td.icon {vertical-align: top; white-space: nowrap; width: 1px;} |
255 | -th.icon.left, td.icon.left {padding-right: 0;} |
256 | -th.icon.right, td.icon.right {padding-left: 0;} |
257 | -th.nowrap, td.nowrap {white-space: nowrap;} |
258 | -tfoot th, table.contributions th {text-align: left;} |
259 | -table.contributions, table.contributions th, table.contributions td { |
260 | - border: 1px solid #e6e6e6;} |
261 | -table.contributions tr.odd {background-color: #fff; color: inherit;} |
262 | -table.contributions tr.even {background-color: #f6f6f6; color: inherit;} |
263 | -table.contributions th, table.contributions td {padding: 0.5em 0.75em;} |
264 | -table.contributions td {vertical-align: middle; width: 16px;} |
265 | -table.headers-right-aligned th {text-align: right;} |
266 | - |
267 | -/* --- Listing tables --- */ |
268 | - |
269 | -table.listing {margin: 0; width: 100%;} |
270 | -table.listing, table.listing tbody {border-bottom: 1px solid #d2d2d2;} |
271 | -table.listing thead, table.listing thead th, table.listing tfoot tr { |
272 | - border: 1px solid #d2d2d2; |
273 | - background-color: #fff; |
274 | -} |
275 | -table.listing tfoot td {border: 1px solid #d2d2d2;} |
276 | -table.listing thead td {border: none;} |
277 | -tr.highlight {background-color: #ff9;} |
278 | -table.listing tr.note {font-size: smaller;} |
279 | -tr.amount, td.amount {text-align: right;} |
280 | -table.listing th, table.listing td {padding: 0.25em;} |
281 | -table.listing th {font-size: 1.125em; white-space: nowrap;} |
282 | -table.listing td {border: 1px #d2d2d2; border-style: dotted none none none;} |
283 | -table.listing tr.note td {border-style: none;} |
284 | -table.listing img {vertical-align: middle;} |
285 | -table.listing tr.secondary th, table.listing tr.secondary td {border-top: none;} |
286 | -table.listing table tbody, table.listing table thead, |
287 | -table.listing table thead th, table.listing tfoot tr, |
288 | -table.listing table tfoot td, table.listing table td { |
289 | - border: none; |
290 | -} |
291 | - |
292 | - |
293 | -/* --- Sortable tables --- */ |
294 | - |
295 | -table.sortable a.sortheader { |
296 | - color:#666666; |
297 | - font-weight: bold; |
298 | - text-decoration: none; |
299 | - display: block; |
300 | -} |
301 | -table.sortable img.sortarrow { |
302 | - padding-left: 2px; |
303 | -} |
304 | -th.ascending { |
305 | - background-image: url(/@@/arrowDown); |
306 | - background-position: center right; |
307 | - background-repeat: no-repeat; |
308 | -} |
309 | -th.descending { |
310 | - background-image: url(/@@/arrowUp); |
311 | - background-position: center right; |
312 | - background-repeat: no-repeat; |
313 | -} |
314 | -/* Used to indicate a value to be used to sort cells in a row */ |
315 | -.sortkey, .revsortkey {display: none;} |
316 | - |
317 | - |
318 | -:link { |
319 | - color: #660000; |
320 | -} |
321 | -:visited { |
322 | - color: #993333; |
323 | -} |
324 | |
325 | === modified file 'lib/lp/app/templates/base-layout-macros.pt' |
326 | --- lib/lp/app/templates/base-layout-macros.pt 2012-02-15 22:09:43 +0000 |
327 | +++ lib/lp/app/templates/base-layout-macros.pt 2012-03-08 16:34:46 +0000 |
328 | @@ -474,25 +474,24 @@ |
329 | |
330 | |
331 | <metal:debug-timeline define-macro="debug-timeline"> |
332 | - <a name="debug_timeline" |
333 | - id="debug_timeline" |
334 | - class="hidden" |
335 | - > |
336 | - <table |
337 | - tal:condition="request/features/visible_render_time" |
338 | - tal:define="timeline_actions modules/lp.services.webapp.adapter/get_timeline_actions" |
339 | - class="debug-timeline listing" |
340 | - > |
341 | + <a tal:condition="request/features/visible_render_time" |
342 | + tal:define="timeline_actions modules/lp.services.webapp.adapter/get_timeline_actions" |
343 | + id="debug_timeline" class="hidden"> |
344 | + <table class="debug-timeline listing"> |
345 | <thead> |
346 | - <th>Duration</th> |
347 | - <th>Action</th> |
348 | + <tr> |
349 | + <th>Duration</th> |
350 | + <th>Action</th> |
351 | + </tr> |
352 | </thead> |
353 | - <tr tal:repeat="action timeline_actions"> |
354 | - <td class="amount" tal:content="action/duration/fmt:millisecondduration"/> |
355 | - <td style="font-family: monospace; text-align: left;"> |
356 | - <pre class="wrap"><span class="action-category" tal:content="action/category"/>: <span class="action-details" tal:content="action/detail"/></pre> |
357 | - </td> |
358 | - </tr> |
359 | + <tbody> |
360 | + <tr tal:repeat="action timeline_actions"> |
361 | + <td class="amount" tal:content="action/duration/fmt:millisecondduration"/> |
362 | + <td style="font-family: monospace; text-align: left;"> |
363 | + <pre class="wrap"><span class="action-category" tal:content="action/category"/>: <span class="action-details" tal:content="action/detail"/></pre> |
364 | + </td> |
365 | + </tr> |
366 | + </tbody> |
367 | </table> |
368 | </a> |
369 | </metal:debug-timeline> |
370 | |
371 | === modified file 'lib/lp/app/templates/base-layout.pt' |
372 | --- lib/lp/app/templates/base-layout.pt 2012-02-24 04:54:53 +0000 |
373 | +++ lib/lp/app/templates/base-layout.pt 2012-03-08 16:34:46 +0000 |
374 | @@ -43,15 +43,6 @@ |
375 | html, body {background-image: url(/@@/demo) !important;} |
376 | </style> |
377 | |
378 | - <tal:comment condition="nothing"> |
379 | - Removing the below <noscript></noscript> snippet makes two tests fail |
380 | - with redirection problems: |
381 | - xx-ubuntu-filebug.txt |
382 | - xx-bug-reporting-tools.txt |
383 | - No time to look into it now, so keeping it in. XXX Danilo 20110715 |
384 | - </tal:comment> |
385 | - <noscript></noscript> |
386 | - |
387 | <tal:view condition="not: view/macro:is-page-contentless"> |
388 | <meta name="description" |
389 | tal:condition="view/page_description | nothing" |
390 | @@ -176,6 +167,21 @@ |
391 | |
392 | <metal:lp-client-cache |
393 | use-macro="context/@@+base-layout-macros/lp-client-cache" /> |
394 | + <metal:debug-timeline |
395 | + use-macro="context/@@+base-layout-macros/debug-timeline" /> |
396 | + <tal:comment |
397 | + tal:condition="request/features/visible_render_time" |
398 | + define="render_time modules/lp.services.webapp.adapter/summarize_requests;" |
399 | + replace='structure string:<script type="text/javascript"> |
400 | + var render_time = "${render_time}"; |
401 | + LPJS.use("node", "lp.ajax_log" , function(Y) { |
402 | + Y.on("domready", function() { |
403 | + var node = Y.one("#rendertime"); |
404 | + node.set("innerHTML", render_time); |
405 | + var ajax_log = new Y.lp.ajax_log(); |
406 | + }); |
407 | + }); |
408 | + </script>' /> |
409 | </body> |
410 | |
411 | <tal:template> |
412 | @@ -196,24 +202,5 @@ |
413 | |
414 | -->" /> |
415 | </tal:template> |
416 | - |
417 | - |
418 | -<metal:debug-timeline |
419 | - use-macro="context/@@+base-layout-macros/debug-timeline" /> |
420 | - |
421 | -<tal:comment |
422 | - tal:condition="request/features/visible_render_time" |
423 | - define="render_time modules/lp.services.webapp.adapter/summarize_requests;" |
424 | - replace='structure string:<script type="text/javascript"> |
425 | - var render_time = "${render_time}"; |
426 | - LPJS.use("node", "lp.ajax_log" , function(Y) { |
427 | - Y.on("domready", function() { |
428 | - var node = Y.one("#rendertime"); |
429 | - node.set("innerHTML", render_time); |
430 | - var ajax_log = new Y.lp.ajax_log(); |
431 | - }); |
432 | - }); |
433 | -</script>' /> |
434 | - |
435 | </html> |
436 | </metal:page> |
437 | |
438 | === modified file 'lib/lp/app/templates/root-index.pt' |
439 | --- lib/lp/app/templates/root-index.pt 2012-02-24 04:44:55 +0000 |
440 | +++ lib/lp/app/templates/root-index.pt 2012-03-08 16:34:46 +0000 |
441 | @@ -136,7 +136,7 @@ |
442 | xml:lang="en" lang="en" dir="ltr" |
443 | tal:attributes="action string:${rooturl}+search" |
444 | method="get" accept-charset="UTF-8"> |
445 | - <input id="text" type="text" name="field.text" size="25%" /> |
446 | + <input id="text" type="text" name="field.text" size="25" /> |
447 | <input id="search" type="submit" value="Search Launchpad" /> |
448 | </form> |
449 | <script type="text/javascript"> |
450 | |
451 | === modified file 'lib/lp/bugs/stories/guided-filebug/xx-bug-reporting-tools.txt' |
452 | --- lib/lp/bugs/stories/guided-filebug/xx-bug-reporting-tools.txt 2011-12-29 05:29:36 +0000 |
453 | +++ lib/lp/bugs/stories/guided-filebug/xx-bug-reporting-tools.txt 2012-03-08 16:34:46 +0000 |
454 | @@ -61,22 +61,26 @@ |
455 | The most common case will be that the user is sent to the guided |
456 | +filebug page and the user goes through the workflow there. |
457 | |
458 | - >>> filebug_url = ( |
459 | - ... 'http://launchpad.dev/ubuntu/+source/mozilla-firefox/+filebug/' |
460 | - ... '%s' % blob_token) |
461 | - >>> user_browser.open(filebug_url) |
462 | + >>> filebug_host = 'launchpad.dev' |
463 | + >>> filebug_path = ( |
464 | + ... '/ubuntu/+source/mozilla-firefox/+filebug/%s' % blob_token) |
465 | + >>> filebug_url = 'http://%s%s' % (filebug_host, filebug_path) |
466 | + >>> contents = str(http( |
467 | + ... "GET %s HTTP/1.1\nHostname: %s\n" |
468 | + ... "Authorization: Basic test@canonical.com:test\n\n" |
469 | + ... % (filebug_path, filebug_host))) |
470 | |
471 | At first, the user will be shown a message telling them that the extra |
472 | data is being processed. |
473 | |
474 | - >>> for message in find_tags_by_class(user_browser.contents, 'message'): |
475 | + >>> for message in find_tags_by_class(contents, 'message'): |
476 | ... print message.renderContents() |
477 | Please wait while bug data is processed. This page will refresh |
478 | every 10 seconds until processing is complete. |
479 | |
480 | The page header contains a 10-second meta refresh tag. |
481 | |
482 | - >>> '<meta http-equiv="refresh" content="10"' in user_browser.contents |
483 | + >>> '<meta http-equiv="refresh" content="10"' in contents |
484 | True |
485 | |
486 | Once the data has been processed, the +filebug process can continue as |
487 | |
488 | === modified file 'lib/lp/bugs/stories/guided-filebug/xx-ubuntu-filebug.txt' |
489 | --- lib/lp/bugs/stories/guided-filebug/xx-ubuntu-filebug.txt 2011-12-29 05:29:36 +0000 |
490 | +++ lib/lp/bugs/stories/guided-filebug/xx-ubuntu-filebug.txt 2012-03-08 16:34:46 +0000 |
491 | @@ -71,6 +71,14 @@ |
492 | ... extra_filebug_data, 'not/important', 'not.important') |
493 | >>> anon_browser.getControl(name='FORM_SUBMIT').click() |
494 | >>> blob_token = anon_browser.headers['X-Launchpad-Blob-Token'] |
495 | + >>> from lp.bugs.interfaces.apportjob import IProcessApportBlobJobSource |
496 | + >>> login('foo.bar@canonical.com') |
497 | + >>> job = getUtility(IProcessApportBlobJobSource).getByBlobUUID( |
498 | + ... blob_token) |
499 | + >>> job.job.start() |
500 | + >>> job.run() |
501 | + >>> job.job.complete() |
502 | + >>> logout() |
503 | >>> filebug_url = ( |
504 | ... 'http://launchpad.dev/ubuntu/+source/mozilla-firefox/+filebug/' |
505 | ... '%s' % blob_token) |
506 | |
507 | === modified file 'lib/lp/registry/browser/pillar.py' |
508 | --- lib/lp/registry/browser/pillar.py 2012-03-05 01:20:59 +0000 |
509 | +++ lib/lp/registry/browser/pillar.py 2012-03-08 16:34:46 +0000 |
510 | @@ -240,8 +240,8 @@ |
511 | return getUtility(IService, 'accesspolicy') |
512 | |
513 | @property |
514 | - def access_policies(self): |
515 | - return self._getAccessPolicyService().getAccessPolicies(self.context) |
516 | + def information_types(self): |
517 | + return self._getAccessPolicyService().getInformationTypes(self.context) |
518 | |
519 | @property |
520 | def sharing_permissions(self): |
521 | @@ -279,6 +279,6 @@ |
522 | if not getFeatureFlag('disclosure.enhanced_sharing.enabled'): |
523 | raise Unauthorized("This feature is not yet available.") |
524 | cache = IJSONRequestCache(self.request) |
525 | - cache.objects['access_policies'] = self.access_policies |
526 | + cache.objects['information_types'] = self.information_types |
527 | cache.objects['sharing_permissions'] = self.sharing_permissions |
528 | cache.objects['observer_data'] = self.observer_data |
529 | |
530 | === modified file 'lib/lp/registry/browser/tests/test_pillar_sharing.py' |
531 | --- lib/lp/registry/browser/tests/test_pillar_sharing.py 2012-03-03 04:28:09 +0000 |
532 | +++ lib/lp/registry/browser/tests/test_pillar_sharing.py 2012-03-08 16:34:46 +0000 |
533 | @@ -81,7 +81,7 @@ |
534 | with FeatureFixture(FLAG): |
535 | view = create_initialized_view(self.pillar, name='+sharing') |
536 | cache = IJSONRequestCache(view.request) |
537 | - self.assertIsNotNone(cache.objects.get('access_policies')) |
538 | + self.assertIsNotNone(cache.objects.get('information_types')) |
539 | self.assertIsNotNone(cache.objects.get('sharing_permissions')) |
540 | aps = getUtility(IService, 'accesspolicy') |
541 | observers = aps.getPillarObservers(self.pillar) |
542 | |
543 | === modified file 'lib/lp/registry/interfaces/accesspolicy.py' |
544 | --- lib/lp/registry/interfaces/accesspolicy.py 2012-03-07 01:24:33 +0000 |
545 | +++ lib/lp/registry/interfaces/accesspolicy.py 2012-03-08 16:34:46 +0000 |
546 | @@ -153,6 +153,9 @@ |
547 | def findByPolicy(policies): |
548 | """Return all `IAccessPolicyArtifact` objects for the policies.""" |
549 | |
550 | + def deleteByArtifact(artifacts): |
551 | + """Delete all `IAccesyPolicyArtifact` objects for the artifacts.""" |
552 | + |
553 | |
554 | class IAccessPolicySource(Interface): |
555 | |
556 | @@ -218,3 +221,10 @@ |
557 | |
558 | :param policies: a collection of `IAccesPolicy`s. |
559 | """ |
560 | + |
561 | + def findArtifactsByGrantee(grantee, policies): |
562 | + """Find the `IAccessArtifact`s for grantee and policies. |
563 | + |
564 | + :param grantee: the access artifact grantee. |
565 | + :param policies: a collection of `IAccesPolicy`s. |
566 | + """ |
567 | |
568 | === modified file 'lib/lp/registry/interfaces/accesspolicyservice.py' |
569 | --- lib/lp/registry/interfaces/accesspolicyservice.py 2012-03-07 02:04:23 +0000 |
570 | +++ lib/lp/registry/interfaces/accesspolicyservice.py 2012-03-08 16:34:46 +0000 |
571 | @@ -39,11 +39,11 @@ |
572 | # version 'devel' |
573 | export_as_webservice_entry(publish_web_link=False, as_of='beta') |
574 | |
575 | - def getAccessPolicies(pillar): |
576 | - """Return the allowed access policy types for the given pillar.""" |
577 | + def getInformationTypes(pillar): |
578 | + """Return the allowed information types for the given pillar.""" |
579 | |
580 | def getSharingPermissions(): |
581 | - """Return the access policy sharing permissions.""" |
582 | + """Return the information sharing permissions.""" |
583 | |
584 | @export_read_operation() |
585 | @operation_parameters( |
586 | @@ -57,22 +57,23 @@ |
587 | @operation_parameters( |
588 | pillar=Reference(IPillar, title=_('Pillar'), required=True), |
589 | observer=Reference(IPerson, title=_('Observer'), required=True), |
590 | - access_policy_types=List(Choice(vocabulary=InformationType))) |
591 | + information_types=List(Choice(vocabulary=InformationType))) |
592 | @operation_for_version('devel') |
593 | - def updatePillarObserver(pillar, observer, access_policy_types, user): |
594 | - """Ensure observer has the grants for access policies on a pillar.""" |
595 | + def updatePillarObserver(pillar, observer, information_types, user): |
596 | + """Ensure observer has the grants for information types on a pillar.""" |
597 | |
598 | @export_write_operation() |
599 | @operation_parameters( |
600 | pillar=Reference(IPillar, title=_('Pillar'), required=True), |
601 | observer=Reference(IPerson, title=_('Observer'), required=True), |
602 | - access_policy_type=Choice(vocabulary=InformationType, required=False)) |
603 | + information_types=List( |
604 | + Choice(vocabulary=InformationType), required=False)) |
605 | @operation_for_version('devel') |
606 | - def deletePillarObserver(pillar, observer, access_policy_type): |
607 | + def deletePillarObserver(pillar, observer, information_types): |
608 | """Remove an observer from a pillar. |
609 | |
610 | :param pillar: the pillar from which to remove access |
611 | :param observer: the person or team to remove |
612 | - :param access_policy_type: if None, remove all access, otherwise just |
613 | - remove the specified access_policy |
614 | + :param information_types: if None, remove all access, otherwise just |
615 | + remove the specified access_policies |
616 | """ |
617 | |
618 | === modified file 'lib/lp/registry/javascript/disclosure/observerpicker.js' |
619 | --- lib/lp/registry/javascript/disclosure/observerpicker.js 2012-03-06 20:58:51 +0000 |
620 | +++ lib/lp/registry/javascript/disclosure/observerpicker.js 2012-03-08 16:34:46 +0000 |
621 | @@ -18,13 +18,13 @@ |
622 | |
623 | ObserverPicker.ATTRS = { |
624 | /** |
625 | - * The value, in percentage, of the progress bar. |
626 | + * The available information types. |
627 | * |
628 | - * @attribute access_policies |
629 | + * @attribute information_types |
630 | * @type Object |
631 | * @default [] |
632 | */ |
633 | - access_policies: { |
634 | + information_types: { |
635 | value: [] |
636 | }, |
637 | // Override for testing |
638 | @@ -37,13 +37,13 @@ |
639 | Y.extend(ObserverPicker, Y.lazr.picker.Picker, { |
640 | initializer: function(config) { |
641 | ObserverPicker.superclass.initializer.apply(this, arguments); |
642 | - var access_policies = []; |
643 | + var information_types = []; |
644 | if (config !== undefined) { |
645 | - if (config.access_policies !== undefined) { |
646 | - access_policies = config.access_policies; |
647 | + if (config.information_types !== undefined) { |
648 | + information_types = config.information_types; |
649 | } |
650 | } |
651 | - this.set('access_policies', access_policies); |
652 | + this.set('information_types', information_types); |
653 | var self = this; |
654 | this.subscribe('save', function (e) { |
655 | e.preventDefault(); |
656 | @@ -98,7 +98,7 @@ |
657 | }, |
658 | |
659 | _display_step_two: function(data) { |
660 | - var title = Y.Lang.substitute('Select access policy for {name}', |
661 | + var title = Y.Lang.substitute('Select sharing policy for {name}', |
662 | {name: data.title}); |
663 | this.set('steptitle', title); |
664 | this.set('progress', 75); |
665 | @@ -132,17 +132,17 @@ |
666 | }, |
667 | |
668 | _publish_result: function(data) { |
669 | - // Determine the chosen access policy type. data already contains the |
670 | + // Determine the chosen information type. data already contains the |
671 | // selected person due to the base picker behaviour. |
672 | var contentBox = this.get('contentBox'); |
673 | - var selected_access_policies = []; |
674 | + var selected_info_types = []; |
675 | contentBox.all('input[name=field.visibility]') |
676 | .each(function(node) { |
677 | if (node.get('checked')) { |
678 | - selected_access_policies.push(node.get('value')); |
679 | + selected_info_types.push(node.get('value')); |
680 | } |
681 | }); |
682 | - data.access_policies = selected_access_policies; |
683 | + data.information_types = selected_info_types; |
684 | // Publish the result with step_nr 0 to indicate we have finished. |
685 | this.fire('save', data, 0); |
686 | }, |
687 | @@ -173,7 +173,7 @@ |
688 | '{{/policies}}', |
689 | '</tbody></table></div>' |
690 | ].join(''), { |
691 | - policies: this.get('access_policies') |
692 | + policies: this.get('information_types') |
693 | }); |
694 | return Y.Node.create(html); |
695 | }, |
696 | |
697 | === modified file 'lib/lp/registry/javascript/disclosure/observertable.js' |
698 | --- lib/lp/registry/javascript/disclosure/observertable.js 2012-03-06 05:22:53 +0000 |
699 | +++ lib/lp/registry/javascript/disclosure/observertable.js 2012-03-08 16:34:46 +0000 |
700 | @@ -33,8 +33,8 @@ |
701 | observers: { |
702 | value: [] |
703 | }, |
704 | - // The access policy types: public, publicsecurity, userdata etc. |
705 | - access_policy_types: { |
706 | + // The information types: public, embargoedsecurity, userdata etc. |
707 | + information_types: { |
708 | value: {} |
709 | }, |
710 | // The sharing permission choices: all, some, nothing etc. |
711 | @@ -109,7 +109,8 @@ |
712 | '<td id="remove-{{name}}">', |
713 | ' <a title="Share nothing with this user"', |
714 | ' href="#" class="sprite remove"' + |
715 | - ' data-self_link="{{self_link}}">', |
716 | + ' data-self_link="{{self_link}}"' + |
717 | + ' data-person_name="{{display_name}}">', |
718 | ' </a>', |
719 | '</td>', |
720 | '<td id="td-permission-{{name}}">', |
721 | @@ -126,19 +127,19 @@ |
722 | |
723 | _observer_policy_template: function() { |
724 | return [ |
725 | - '{{#access_policies}}', |
726 | + '{{#information_types}}', |
727 | '<li><span id="{{policy}}-permission-{{observer_name}}">', |
728 | ' <span class="value"></span>', |
729 | ' <a class="editicon sprite edit" href="#"> </a>', |
730 | '</span></li>', |
731 | - '{{/access_policies}}'].join(' '); |
732 | + '{{/information_types}}'].join(' '); |
733 | }, |
734 | |
735 | // Render the popup widget to pick the sharing permission for an |
736 | // access policy. |
737 | render_observer_policy: function( |
738 | observer, policy, current_value) { |
739 | - var access_policy_types = this.get('access_policy_types'); |
740 | + var information_types = this.get('information_types'); |
741 | var sharing_permissions = this.get('sharing_permissions'); |
742 | var choice_items = []; |
743 | Y.Array.forEach(sharing_permissions, function(permission) { |
744 | @@ -148,7 +149,7 @@ |
745 | value: permission.value, |
746 | name: permission.title, |
747 | source_name: Y.Lang.substitute(source_name, |
748 | - {policy_name: access_policy_types[policy], |
749 | + {policy_name: information_types[policy], |
750 | permission_name: permission.title}) |
751 | }); |
752 | }); |
753 | @@ -165,7 +166,7 @@ |
754 | value_location: value_location, |
755 | editicon: editicon, |
756 | value: current_value, |
757 | - title: "Share " + access_policy_types[policy] + " with " |
758 | + title: "Share " + information_types[policy] + " with " |
759 | + observer.display_name, |
760 | items: choice_items, |
761 | elementToFlash: contentBox, |
762 | @@ -215,7 +216,8 @@ |
763 | e.preventDefault(); |
764 | var delete_link = e.currentTarget; |
765 | var observer_link = delete_link.getAttribute('data-self_link'); |
766 | - self.fire(REMOVE_OBSERVER, delete_link, observer_link); |
767 | + var person_name = delete_link.getAttribute('data-person_name'); |
768 | + self.fire(REMOVE_OBSERVER, delete_link, observer_link, person_name); |
769 | }, 'td[id^=remove-] a'); |
770 | }, |
771 | |
772 | @@ -226,12 +228,12 @@ |
773 | _prepareObserverDisplayData: function(observers) { |
774 | Y.Array.forEach(observers, function(observer) { |
775 | var observer_policies = observer.permissions; |
776 | - var policy_values = []; |
777 | + var info_types = []; |
778 | Y.each(observer_policies, function(policy_value, policy) { |
779 | - policy_values.push({policy: policy, |
780 | + info_types.push({policy: policy, |
781 | observer_name: observer.name}); |
782 | }); |
783 | - observer.access_policies = policy_values; |
784 | + observer.information_types = info_types; |
785 | }); |
786 | }, |
787 | |
788 | |
789 | === modified file 'lib/lp/registry/javascript/disclosure/pillarsharingview.js' |
790 | --- lib/lp/registry/javascript/disclosure/pillarsharingview.js 2012-03-06 12:03:09 +0000 |
791 | +++ lib/lp/registry/javascript/disclosure/pillarsharingview.js 2012-03-08 16:34:46 +0000 |
792 | @@ -54,7 +54,7 @@ |
793 | headerContent: Y.Node.create("<h2></h2>").set('text', header), |
794 | zIndex: 1000, |
795 | visible: false, |
796 | - access_policies: LP.cache.access_policies, |
797 | + information_types: LP.cache.information_types, |
798 | save: function(result) { |
799 | self.save_sharing_selection(result); |
800 | } |
801 | @@ -68,9 +68,9 @@ |
802 | destructor: function() { }, |
803 | |
804 | renderUI: function() { |
805 | - var access_policy_types = {}; |
806 | - Y.Array.each(LP.cache.access_policies, function(policy) { |
807 | - access_policy_types[policy.value] = policy.title; |
808 | + var information_types = {}; |
809 | + Y.Array.each(LP.cache.information_types, function(info_type) { |
810 | + information_types[info_type.value] = info_type.title; |
811 | }); |
812 | var sharing_permissions = LP.cache.sharing_permissions; |
813 | var observer_data = LP.cache.observer_data; |
814 | @@ -78,7 +78,7 @@ |
815 | var observer_table = new otns.ObserverTableWidget({ |
816 | observers: observer_data, |
817 | sharing_permissions: sharing_permissions, |
818 | - access_policy_types: access_policy_types |
819 | + information_types: information_types |
820 | }); |
821 | this.set('observer_table', observer_table); |
822 | observer_table.render(); |
823 | @@ -95,7 +95,8 @@ |
824 | var otns = Y.lp.registry.disclosure.observertable; |
825 | observer_table.subscribe( |
826 | otns.ObserverTableWidget.REMOVE_OBSERVER, function(e) { |
827 | - self.perform_remove_observer(e.details[0], e.details[1]); |
828 | + self.confirm_observer_removal( |
829 | + e.details[0], e.details[1], e.details[2]); |
830 | }); |
831 | }, |
832 | |
833 | @@ -129,6 +130,32 @@ |
834 | }, |
835 | |
836 | /** |
837 | + * Prompt the user to confirm the removal of the selected observer. |
838 | + * |
839 | + * @method confirm_observer_removal |
840 | + */ |
841 | + confirm_observer_removal: function(delete_link, person_uri, person_name) { |
842 | + var confirm_text_template = [ |
843 | + '<p class="large-warning" style="padding:2px 2px 0 36px;">', |
844 | + ' Do you really want to stop sharing', |
845 | + ' "{pillar}" with {person_name}?<br><br>', |
846 | + '</p>' |
847 | + ].join(''); |
848 | + var confirm_text = Y.Lang.sub(confirm_text_template, |
849 | + {pillar: LP.cache.context.display_name, |
850 | + person_name: person_name}); |
851 | + var self = this; |
852 | + var co = new Y.lp.app.confirmationoverlay.ConfirmationOverlay({ |
853 | + submit_fn: function() { |
854 | + self.perform_remove_observer(delete_link, person_uri); |
855 | + }, |
856 | + form_content: confirm_text, |
857 | + headerContent: '<h2>Stop sharing</h2>' |
858 | + }); |
859 | + co.show(); |
860 | + }, |
861 | + |
862 | + /** |
863 | * The server call to remove the specified observer has succeeded. |
864 | * Update the model and view. |
865 | * @method remove_observer_success |
866 | @@ -236,7 +263,7 @@ |
867 | parameters: { |
868 | pillar: pillar_uri, |
869 | observer: person_uri, |
870 | - access_policy_types: selection_result.access_policies |
871 | + information_types: selection_result.information_types |
872 | } |
873 | }; |
874 | this.get('lp_client').named_post( |
875 | @@ -250,5 +277,6 @@ |
876 | }, "0.1", { "requires": [ |
877 | 'node', 'lp.client', 'lp.mustache', 'lazr.picker', 'lp.app.picker', |
878 | 'lp.mustache', 'lp.registry.disclosure.observerpicker', |
879 | - 'lp.registry.disclosure.observertable'] }); |
880 | + 'lp.registry.disclosure.observertable', 'lp.app.confirmationoverlay' |
881 | + ]}); |
882 | |
883 | |
884 | === modified file 'lib/lp/registry/javascript/disclosure/tests/test_observerpicker.js' |
885 | --- lib/lp/registry/javascript/disclosure/tests/test_observerpicker.js 2012-03-06 12:03:09 +0000 |
886 | +++ lib/lp/registry/javascript/disclosure/tests/test_observerpicker.js 2012-03-08 16:34:46 +0000 |
887 | @@ -18,7 +18,7 @@ |
888 | "description": "frieda@example.com", "api_uri": "~/frieda", |
889 | "metadata": "team"} |
890 | ]; |
891 | - this.access_policies = [ |
892 | + this.information_types = [ |
893 | {index: '0', value: 'P1', title: 'Policy 1', |
894 | description: 'Policy 1 description'}, |
895 | {index: '1', value: 'P2', title: 'Policy 2', |
896 | @@ -46,7 +46,7 @@ |
897 | |
898 | _create_picker: function(overrides) { |
899 | var config = { |
900 | - anim_duratrion: 0, |
901 | + anim_duration: 0, |
902 | progressbar: true, |
903 | progress: 50, |
904 | headerContent: "<h2>Grant access</h2>", |
905 | @@ -54,7 +54,7 @@ |
906 | "with whom to share", |
907 | zIndex: 1000, |
908 | visible: false, |
909 | - access_policies: this.access_policies |
910 | + information_types: this.information_types |
911 | }; |
912 | if (overrides !== undefined) { |
913 | config = Y.merge(config, overrides); |
914 | @@ -103,15 +103,16 @@ |
915 | // The step title should be updated according to the selected |
916 | // person. |
917 | steptitle = cb.one('.contains-steptitle h2').getContent(); |
918 | - Y.Assert.areEqual('Select access policy for Fred', steptitle); |
919 | + Y.Assert.areEqual( |
920 | + 'Select sharing policy for Fred', steptitle); |
921 | // The second step ui should be visible. |
922 | var step_two_content = cb.one('.picker-content-two'); |
923 | Y.Assert.isFalse(step_two_content.hasClass('unseen')); |
924 | // The second step ui should contain input buttons for each access |
925 | // policy type. |
926 | - Y.Array.each(this.access_policies, function(policy) { |
927 | + Y.Array.each(this.information_types, function(info_type) { |
928 | var rb = step_two_content.one( |
929 | - 'input[value="' + policy.title + '"]'); |
930 | + 'input[value="' + info_type.title + '"]'); |
931 | Y.Assert.isNotNull(rb); |
932 | }); |
933 | // There should be a link back to previous step. |
934 | @@ -170,7 +171,7 @@ |
935 | var select_link = step_two_content.one('a.next'); |
936 | select_link.simulate('click'); |
937 | Y.ArrayAssert.itemsAreEqual( |
938 | - ['Policy 2'], selected_result.access_policies); |
939 | + ['Policy 2'], selected_result.information_types); |
940 | Y.Assert.areEqual('~/fred', selected_result.api_uri); |
941 | } |
942 | })); |
943 | |
944 | === modified file 'lib/lp/registry/javascript/disclosure/tests/test_observertable.js' |
945 | --- lib/lp/registry/javascript/disclosure/tests/test_observertable.js 2012-03-06 05:22:53 +0000 |
946 | +++ lib/lp/registry/javascript/disclosure/tests/test_observertable.js 2012-03-08 16:34:46 +0000 |
947 | @@ -25,7 +25,7 @@ |
948 | {'value': 's2', 'title': 'S2', |
949 | 'description': 'Sharing 2'} |
950 | ]; |
951 | - this.access_policies = { |
952 | + this.information_types = { |
953 | 'P1': 'Policy 1', |
954 | 'P2': 'Policy 2', |
955 | 'P3': 'Policy 3' |
956 | @@ -42,7 +42,7 @@ |
957 | anim_duration: 0.001, |
958 | observers: this.observer_data, |
959 | sharing_permissions: this.sharing_permissions, |
960 | - access_policy_types: this.access_policies |
961 | + information_types: this.information_types |
962 | }); |
963 | }, |
964 | |
965 | @@ -70,7 +70,7 @@ |
966 | Y.Assert.isNotNull( |
967 | Y.one('#observer-table td[id=remove-' |
968 | + observer.name + '] a')); |
969 | - // The access policy sharing permissions |
970 | + // The sharing permissions |
971 | var permission; |
972 | for (permission in observer.permissions) { |
973 | if (observer.permissions.hasOwnProperty(permission)) { |
974 | @@ -120,7 +120,9 @@ |
975 | ns.ObserverTableWidget.REMOVE_OBSERVER, function(e) { |
976 | var delete_link = e.details[0]; |
977 | var observer_uri = e.details[1]; |
978 | + var person_name = e.details[2]; |
979 | Y.Assert.areEqual('~fred', observer_uri); |
980 | + Y.Assert.areEqual('Fred Bloggs', person_name); |
981 | Y.Assert.areEqual(delete_link_to_click, delete_link); |
982 | event_fired = true; |
983 | } |
984 | |
985 | === modified file 'lib/lp/registry/javascript/disclosure/tests/test_pillarsharingview.html' |
986 | --- lib/lp/registry/javascript/disclosure/tests/test_pillarsharingview.html 2012-03-01 05:46:50 +0000 |
987 | +++ lib/lp/registry/javascript/disclosure/tests/test_pillarsharingview.html 2012-03-08 16:34:46 +0000 |
988 | @@ -33,12 +33,16 @@ |
989 | <script type="text/javascript" |
990 | src="../../../../../../build/js/lp/app/lp.js"></script> |
991 | <script type="text/javascript" |
992 | + src="../../../../../../build/js/lp/app/confirmationoverlay/confirmationoverlay.js"></script> |
993 | + <script type="text/javascript" |
994 | src="../../../../../../build/js/lp/app/mustache.js"></script> |
995 | <script type="text/javascript" |
996 | src="../../../../../../build/js/lp/app/activator/activator.js"></script> |
997 | <script type="text/javascript" |
998 | src="../../../../../../build/js/lp/app/choiceedit/choiceedit.js"></script> |
999 | <script type="text/javascript" |
1000 | + src="../../../../../../build/js/lp/app/formoverlay/formoverlay.js"></script> |
1001 | + <script type="text/javascript" |
1002 | src="../../../../../../build/js/lp/app/overlay/overlay.js"></script> |
1003 | <script type="text/javascript" |
1004 | src="../../../../../../build/js/lp/app/picker/picker.js"></script> |
1005 | |
1006 | === modified file 'lib/lp/registry/javascript/disclosure/tests/test_pillarsharingview.js' |
1007 | --- lib/lp/registry/javascript/disclosure/tests/test_pillarsharingview.js 2012-03-06 12:03:09 +0000 |
1008 | +++ lib/lp/registry/javascript/disclosure/tests/test_pillarsharingview.js 2012-03-08 16:34:46 +0000 |
1009 | @@ -31,7 +31,7 @@ |
1010 | {'value': 's2', 'title': 'S2', |
1011 | 'description': 'Sharing 2'} |
1012 | ], |
1013 | - access_policies: [ |
1014 | + information_types: [ |
1015 | {index: '0', value: 'P1', title: 'Policy 1', |
1016 | description: 'Policy 1 description'}, |
1017 | {index: '1', value: 'P2', title: 'Policy 2', |
1018 | @@ -88,24 +88,65 @@ |
1019 | .hasClass('yui3-observer_picker-hidden')); |
1020 | }, |
1021 | |
1022 | - // Clicking a delete observer link calls the perform_remove_observer |
1023 | + // Clicking a delete observer link calls the confirm_observer_removal |
1024 | // method with the correct parameters. |
1025 | test_delete_observer_click: function() { |
1026 | this.view = this._create_Widget(); |
1027 | this.view.render(); |
1028 | + var confirmRemove_called = false; |
1029 | + this.view.confirm_observer_removal = function( |
1030 | + delete_link, person_uri, person_name) { |
1031 | + Y.Assert.areEqual('~fred', person_uri); |
1032 | + Y.Assert.areEqual('Fred Bloggs', person_name); |
1033 | + Y.Assert.areEqual(delete_link_to_click, delete_link); |
1034 | + confirmRemove_called = true; |
1035 | + |
1036 | + }; |
1037 | + var delete_link_to_click = |
1038 | + Y.one('#observer-table td[id=remove-fred] a'); |
1039 | + delete_link_to_click.simulate('click'); |
1040 | + Y.Assert.isTrue(confirmRemove_called); |
1041 | + }, |
1042 | + |
1043 | + //Test the behaviour of the removal confirmation dialog. |
1044 | + _test_confirm_observer_removal: function(click_ok) { |
1045 | + this.view = this._create_Widget(); |
1046 | + this.view.render(); |
1047 | var performRemove_called = false; |
1048 | - var self = this; |
1049 | this.view.perform_remove_observer = function( |
1050 | delete_link, person_uri) { |
1051 | Y.Assert.areEqual('~fred', person_uri); |
1052 | - Y.Assert.areEqual(delete_link_to_click, delete_link); |
1053 | + Y.Assert.areEqual(delete_link, delete_link); |
1054 | performRemove_called = true; |
1055 | |
1056 | }; |
1057 | - var delete_link_to_click = |
1058 | + var delete_link = |
1059 | Y.one('#observer-table td[id=remove-fred] a'); |
1060 | - delete_link_to_click.simulate('click'); |
1061 | - Y.Assert.isTrue(performRemove_called); |
1062 | + this.view.confirm_observer_removal( |
1063 | + delete_link, '~fred', 'Fred Bloggs'); |
1064 | + var co = Y.one('.yui3-overlay.yui3-lp-app-confirmationoverlay'); |
1065 | + var actions = co.one('.yui3-lazr-formoverlay-actions'); |
1066 | + var btn_style; |
1067 | + if (click_ok) { |
1068 | + btn_style = '.ok-btn'; |
1069 | + } else { |
1070 | + btn_style = '.cancel-btn'; |
1071 | + } |
1072 | + var button = actions.one(btn_style); |
1073 | + button.simulate('click'); |
1074 | + Y.Assert.areEqual(click_ok, performRemove_called); |
1075 | + Y.Assert.isTrue( |
1076 | + co.hasClass('yui3-lp-app-confirmationoverlay-hidden')); |
1077 | + }, |
1078 | + |
1079 | + //Test the remove confirmation dialog when the user clicks Ok. |
1080 | + test_confirm_observer_removal_ok: function() { |
1081 | + this._test_confirm_observer_removal(true); |
1082 | + }, |
1083 | + |
1084 | + //Test the remove confirmation dialog when the user clicks Cancel. |
1085 | + test_confirm_observer_removal_cancel: function() { |
1086 | + this._test_confirm_observer_removal(false); |
1087 | }, |
1088 | |
1089 | // The perform_remove_observer method makes the expected XHR calls. |
1090 | @@ -174,7 +215,7 @@ |
1091 | Y.Assert.areEqual('joe', observer.name); |
1092 | save_sharing_selection_success_called = true; |
1093 | }; |
1094 | - // Use the picker to select a new observer and access policy. |
1095 | + // Use the picker to select a new observer and information type. |
1096 | var observer_picker = this.view.get('observer_picker'); |
1097 | var picker_results = [ |
1098 | {"value": "joe", "title": "Joe", "css": "sprite-person", |
1099 | @@ -203,7 +244,7 @@ |
1100 | expected_url = Y.lp.client.append_qs( |
1101 | expected_url, 'observer', person_uri); |
1102 | expected_url = Y.lp.client.append_qs( |
1103 | - expected_url, 'access_policy_types', ['Policy 2']); |
1104 | + expected_url, 'information_types', ['Policy 2']); |
1105 | Y.Assert.areEqual(expected_url, mockio.last_request.config.data); |
1106 | mockio.last_request.successJSON({ |
1107 | 'resource_type_link': 'entity', |
1108 | |
1109 | === modified file 'lib/lp/registry/model/accesspolicy.py' |
1110 | --- lib/lp/registry/model/accesspolicy.py 2012-03-07 01:24:33 +0000 |
1111 | +++ lib/lp/registry/model/accesspolicy.py 2012-03-08 16:34:46 +0000 |
1112 | @@ -222,6 +222,11 @@ |
1113 | ids = [policy.id for policy in policies] |
1114 | return IStore(cls).find(cls, cls.policy_id.is_in(ids)) |
1115 | |
1116 | + @classmethod |
1117 | + def deleteByArtifact(cls, artifacts): |
1118 | + """See `IAccessPolicyArtifactSource`.""" |
1119 | + cls.findByArtifact(artifacts).remove() |
1120 | + |
1121 | |
1122 | class AccessArtifactGrant(StormBase): |
1123 | implements(IAccessArtifactGrant) |
1124 | @@ -330,3 +335,13 @@ |
1125 | ids = [policy.id for policy in policies] |
1126 | return IStore(cls).find( |
1127 | Person, Person.id == cls.grantee_id, cls.policy_id.is_in(ids)) |
1128 | + |
1129 | + @classmethod |
1130 | + def findArtifactsByGrantee(cls, grantee, policies): |
1131 | + """See `IAccessPolicyGrantFlatSource`.""" |
1132 | + ids = [policy.id for policy in policies] |
1133 | + return IStore(cls).find( |
1134 | + AccessArtifact, |
1135 | + AccessArtifact.id == cls.abstract_artifact_id, |
1136 | + cls.grantee_id == grantee.id, |
1137 | + cls.policy_id.is_in(ids)) |
1138 | |
1139 | === modified file 'lib/lp/registry/services/accesspolicyservice.py' |
1140 | --- lib/lp/registry/services/accesspolicyservice.py 2012-03-07 01:24:33 +0000 |
1141 | +++ lib/lp/registry/services/accesspolicyservice.py 2012-03-08 16:34:46 +0000 |
1142 | @@ -19,7 +19,9 @@ |
1143 | SharingPermission, |
1144 | ) |
1145 | from lp.registry.interfaces.accesspolicy import ( |
1146 | + IAccessArtifactGrantSource, |
1147 | IAccessPolicySource, |
1148 | + IAccessPolicyGrantFlatSource, |
1149 | IAccessPolicyGrantSource, |
1150 | ) |
1151 | from lp.registry.interfaces.accesspolicyservice import IAccessPolicyService |
1152 | @@ -29,7 +31,7 @@ |
1153 | |
1154 | |
1155 | class AccessPolicyService: |
1156 | - """Service providing operations for access policies. |
1157 | + """Service providing operations for adding and removing pillar observers. |
1158 | |
1159 | Service is accessed via a url of the form |
1160 | '/services/accesspolicy?ws.op=... |
1161 | @@ -42,27 +44,27 @@ |
1162 | """See `IService`.""" |
1163 | return 'accesspolicy' |
1164 | |
1165 | - def getAccessPolicies(self, pillar): |
1166 | + def getInformationTypes(self, pillar): |
1167 | """See `IAccessPolicyService`.""" |
1168 | - allowed_policy_types = [ |
1169 | + allowed_types = [ |
1170 | InformationType.EMBARGOEDSECURITY, |
1171 | InformationType.USERDATA] |
1172 | # Products with current commercial subscriptions are also allowed to |
1173 | - # have a PROPRIETARY access policy. |
1174 | + # have a PROPRIETARY information type. |
1175 | if (IProduct.providedBy(pillar) and |
1176 | pillar.has_current_commercial_subscription): |
1177 | - allowed_policy_types.append(InformationType.PROPRIETARY) |
1178 | + allowed_types.append(InformationType.PROPRIETARY) |
1179 | |
1180 | - policies_data = [] |
1181 | - for x, policy in enumerate(allowed_policy_types): |
1182 | + result_data = [] |
1183 | + for x, policy in enumerate(allowed_types): |
1184 | item = dict( |
1185 | index=x, |
1186 | value=policy.name, |
1187 | title=policy.title, |
1188 | description=policy.description |
1189 | ) |
1190 | - policies_data.append(item) |
1191 | - return policies_data |
1192 | + result_data.append(item) |
1193 | + return result_data |
1194 | |
1195 | def getSharingPermissions(self): |
1196 | """See `IAccessPolicyService`.""" |
1197 | @@ -96,31 +98,31 @@ |
1198 | person_data = resource.toDataForJSON() |
1199 | person_data['permissions'] = {} |
1200 | person_by_id[policy_grant.grantee.id] = person_data |
1201 | + result.append(person_data) |
1202 | person_data = person_by_id[policy_grant.grantee.id] |
1203 | person_data['permissions'][policy_grant.policy.type.name] = ( |
1204 | SharingPermission.ALL.name) |
1205 | - result.append(person_data) |
1206 | return result |
1207 | |
1208 | @available_with_permission('launchpad.Edit', 'pillar') |
1209 | - def updatePillarObserver(self, pillar, observer, access_policy_types, |
1210 | + def updatePillarObserver(self, pillar, observer, information_types, |
1211 | user): |
1212 | """See `IAccessPolicyService`.""" |
1213 | |
1214 | # We do not support adding observers to project groups. |
1215 | assert not IProjectGroup.providedBy(pillar) |
1216 | |
1217 | - pillar_policy_types = [ |
1218 | - (pillar, access_policy_type) |
1219 | - for access_policy_type in access_policy_types] |
1220 | + pillar_info_types = [ |
1221 | + (pillar, information_type) |
1222 | + for information_type in information_types] |
1223 | |
1224 | # Create any missing pillar access policies. |
1225 | policy_source = getUtility(IAccessPolicySource) |
1226 | - pillar_policies = list(policy_source.find(pillar_policy_types)) |
1227 | + pillar_policies = list(policy_source.find(pillar_info_types)) |
1228 | existing_policy_types = [ |
1229 | (pillar, pillar_policy.type) for pillar_policy in pillar_policies] |
1230 | required_policies = ( |
1231 | - set(pillar_policy_types).difference(existing_policy_types)) |
1232 | + set(pillar_info_types).difference(existing_policy_types)) |
1233 | if len(required_policies) > 0: |
1234 | pillar_policies.extend(policy_source.create(required_policies)) |
1235 | |
1236 | @@ -154,13 +156,38 @@ |
1237 | resource = EntryResource(observer, request) |
1238 | person_data = resource.toDataForJSON() |
1239 | permissions = {} |
1240 | - for access_policy_type in access_policy_types: |
1241 | - permissions[access_policy_type.name] = SharingPermission.ALL.name |
1242 | + for information_type in information_types: |
1243 | + permissions[information_type.name] = SharingPermission.ALL.name |
1244 | person_data['permissions'] = permissions |
1245 | return person_data |
1246 | |
1247 | @available_with_permission('launchpad.Edit', 'pillar') |
1248 | - def deletePillarObserver(self, pillar, observer, access_policy_type): |
1249 | + def deletePillarObserver(self, pillar, observer, |
1250 | + information_types=None): |
1251 | """See `IAccessPolicyService`.""" |
1252 | - # TODO - implement this |
1253 | - pass |
1254 | + |
1255 | + policy_source = getUtility(IAccessPolicySource) |
1256 | + if information_types is None: |
1257 | + # We delete all policy grants for the pillar. |
1258 | + pillar_policies = policy_source.findByPillar([pillar]) |
1259 | + else: |
1260 | + # We delete selected policy grants for the pillar. |
1261 | + pillar_policy_types = [ |
1262 | + (pillar, information_type) |
1263 | + for information_type in information_types] |
1264 | + pillar_policies = list(policy_source.find(pillar_policy_types)) |
1265 | + |
1266 | + # First delete any access policy grants. |
1267 | + policy_grant_source = getUtility(IAccessPolicyGrantSource) |
1268 | + policy_grants = [(policy, observer) for policy in pillar_policies] |
1269 | + grants = [ |
1270 | + (grant.policy, grant.grantee) |
1271 | + for grant in policy_grant_source.find(policy_grants)] |
1272 | + policy_grant_source.revoke(grants) |
1273 | + |
1274 | + # Second delete any access artifact grants. |
1275 | + ap_grant_flat = getUtility(IAccessPolicyGrantFlatSource) |
1276 | + to_delete = ap_grant_flat.findArtifactsByGrantee( |
1277 | + observer, pillar_policies) |
1278 | + accessartifact_grant_source = getUtility(IAccessArtifactGrantSource) |
1279 | + accessartifact_grant_source.revokeByArtifact(to_delete) |
1280 | |
1281 | === modified file 'lib/lp/registry/services/tests/test_accesspolicyservice.py' |
1282 | --- lib/lp/registry/services/tests/test_accesspolicyservice.py 2012-03-07 01:24:33 +0000 |
1283 | +++ lib/lp/registry/services/tests/test_accesspolicyservice.py 2012-03-08 16:34:46 +0000 |
1284 | @@ -57,8 +57,8 @@ |
1285 | observer_data['permissions'] = permissions |
1286 | return observer_data |
1287 | |
1288 | - def _test_getAccessPolicies(self, pillar, expected_policies): |
1289 | - policy_data = self.service.getAccessPolicies(pillar) |
1290 | + def _test_getInformationTypes(self, pillar, expected_policies): |
1291 | + policy_data = self.service.getInformationTypes(pillar) |
1292 | expected_data = [] |
1293 | for x, policy in enumerate(expected_policies): |
1294 | item = dict( |
1295 | @@ -70,31 +70,31 @@ |
1296 | expected_data.append(item) |
1297 | self.assertContentEqual(expected_data, policy_data) |
1298 | |
1299 | - def test_getAccessPolicies_product(self): |
1300 | + def test_getInformationTypes_product(self): |
1301 | product = self.factory.makeProduct() |
1302 | - self._test_getAccessPolicies( |
1303 | + self._test_getInformationTypes( |
1304 | product, |
1305 | [InformationType.EMBARGOEDSECURITY, InformationType.USERDATA]) |
1306 | |
1307 | - def test_getAccessPolicies_expired_commercial_product(self): |
1308 | + def test_getInformationTypes_expired_commercial_product(self): |
1309 | product = self.factory.makeProduct() |
1310 | self.factory.makeCommercialSubscription(product, expired=True) |
1311 | - self._test_getAccessPolicies( |
1312 | + self._test_getInformationTypes( |
1313 | product, |
1314 | [InformationType.EMBARGOEDSECURITY, InformationType.USERDATA]) |
1315 | |
1316 | - def test_getAccessPolicies_commercial_product(self): |
1317 | + def test_getInformationTypes_commercial_product(self): |
1318 | product = self.factory.makeProduct() |
1319 | self.factory.makeCommercialSubscription(product) |
1320 | - self._test_getAccessPolicies( |
1321 | + self._test_getInformationTypes( |
1322 | product, |
1323 | [InformationType.EMBARGOEDSECURITY, |
1324 | InformationType.USERDATA, |
1325 | InformationType.PROPRIETARY]) |
1326 | |
1327 | - def test_getAccessPolicies_distro(self): |
1328 | + def test_getInformationTypes_distro(self): |
1329 | distro = self.factory.makeDistribution() |
1330 | - self._test_getAccessPolicies( |
1331 | + self._test_getInformationTypes( |
1332 | distro, |
1333 | [InformationType.EMBARGOEDSECURITY, InformationType.USERDATA]) |
1334 | |
1335 | @@ -164,21 +164,21 @@ |
1336 | policy, grantee=observer, grantor=grantor) |
1337 | |
1338 | # Now call updatePillarObserver will the grants we want. |
1339 | - access_policy_types = [ |
1340 | + information_types = [ |
1341 | InformationType.EMBARGOEDSECURITY, |
1342 | InformationType.USERDATA] |
1343 | observer_data = self.service.updatePillarObserver( |
1344 | - pillar, observer, access_policy_types, grantor) |
1345 | + pillar, observer, information_types, grantor) |
1346 | policies = getUtility(IAccessPolicySource).findByPillar([pillar]) |
1347 | policy_grant_source = getUtility(IAccessPolicyGrantSource) |
1348 | grants = policy_grant_source.findByPolicy(policies) |
1349 | - self.assertEqual(grants.count(), len(access_policy_types)) |
1350 | + self.assertEqual(grants.count(), len(information_types)) |
1351 | for grant in grants: |
1352 | self.assertEqual(grantor, grant.grantor) |
1353 | self.assertEqual(observer, grant.grantee) |
1354 | - self.assertIn(grant.policy.type, access_policy_types) |
1355 | + self.assertIn(grant.policy.type, information_types) |
1356 | expected_observer_data = self._makeObserverData( |
1357 | - observer, access_policy_types) |
1358 | + observer, information_types) |
1359 | self.assertEqual(expected_observer_data, observer_data) |
1360 | |
1361 | def test_updateProjectGroupObserver_not_allowed(self): |
1362 | @@ -209,11 +209,10 @@ |
1363 | # updatePillarObserver raises an Unauthorized exception if the user is |
1364 | # not permitted to do so. |
1365 | observer = self.factory.makePerson() |
1366 | - access_policy_type = InformationType.USERDATA |
1367 | user = self.factory.makePerson() |
1368 | self.assertRaises( |
1369 | Unauthorized, self.service.updatePillarObserver, |
1370 | - pillar, observer, [access_policy_type], user) |
1371 | + pillar, observer, [InformationType.USERDATA], user) |
1372 | |
1373 | def test_updatePillarObserverAnonymous(self): |
1374 | # Anonymous users are not allowed. |
1375 | @@ -227,6 +226,77 @@ |
1376 | login_person(self.factory.makePerson()) |
1377 | self._test_updatePillarObserverUnauthorized(product) |
1378 | |
1379 | + def _test_deletePillarObserver(self, pillar, types_to_delete=None): |
1380 | + # Make grants for some information types. |
1381 | + information_types = [ |
1382 | + InformationType.EMBARGOEDSECURITY, |
1383 | + InformationType.USERDATA] |
1384 | + access_policies = [] |
1385 | + for info_type in information_types: |
1386 | + access_policy = self.factory.makeAccessPolicy( |
1387 | + pillar=pillar, type=info_type) |
1388 | + access_policies.append(access_policy) |
1389 | + grantee = self.factory.makePerson() |
1390 | + # Make some access policy grants for our observer. |
1391 | + for access_policy in access_policies: |
1392 | + self.factory.makeAccessPolicyGrant(access_policy, grantee) |
1393 | + # Make some artifact grants for our observer. |
1394 | + artifact = self.factory.makeAccessArtifact() |
1395 | + self.factory.makeAccessArtifactGrant(artifact, grantee) |
1396 | + for access_policy in access_policies: |
1397 | + self.factory.makeAccessPolicyArtifact( |
1398 | + artifact=artifact, policy=access_policy) |
1399 | + # Make some access policy grants for another observer. |
1400 | + another = self.factory.makePerson() |
1401 | + self.factory.makeAccessPolicyGrant(access_policies[0], another) |
1402 | + # Delete data for a specific information type. |
1403 | + self.service.deletePillarObserver(pillar, grantee, types_to_delete) |
1404 | + # Assemble the expected data for the remaining access grants for |
1405 | + # grantee. |
1406 | + expected_data = [] |
1407 | + if types_to_delete is not None: |
1408 | + expected_information_types = ( |
1409 | + set(information_types).difference(types_to_delete)) |
1410 | + remaining_grantee_person_data = self._makeObserverData( |
1411 | + grantee, expected_information_types) |
1412 | + expected_data.append(remaining_grantee_person_data) |
1413 | + # Add the data for the other observer. |
1414 | + another_person_data = self._makeObserverData( |
1415 | + another, information_types[:1]) |
1416 | + expected_data.append(another_person_data) |
1417 | + self.assertContentEqual( |
1418 | + expected_data, self.service.getPillarObservers(pillar)) |
1419 | + |
1420 | + def test_deleteProductObserverAll(self): |
1421 | + # Users with launchpad.Edit can delete all access for an observer. |
1422 | + owner = self.factory.makePerson() |
1423 | + product = self.factory.makeProduct(owner=owner) |
1424 | + login_person(owner) |
1425 | + self._test_deletePillarObserver(product) |
1426 | + |
1427 | + def test_deleteProductObserverPolicies(self): |
1428 | + # Users with launchpad.Edit can delete selected policy access for an |
1429 | + # observer. |
1430 | + owner = self.factory.makePerson() |
1431 | + product = self.factory.makeProduct(owner=owner) |
1432 | + login_person(owner) |
1433 | + self._test_deletePillarObserver(product, [InformationType.USERDATA]) |
1434 | + |
1435 | + def test_deleteDistroObserverAll(self): |
1436 | + # Users with launchpad.Edit can delete all access for an observer. |
1437 | + owner = self.factory.makePerson() |
1438 | + distro = self.factory.makeDistribution(owner=owner) |
1439 | + login_person(owner) |
1440 | + self._test_deletePillarObserver(distro) |
1441 | + |
1442 | + def test_deleteDistroObserverPolicies(self): |
1443 | + # Users with launchpad.Edit can delete selected policy access for an |
1444 | + # observer. |
1445 | + owner = self.factory.makePerson() |
1446 | + distro = self.factory.makeDistribution(owner=owner) |
1447 | + login_person(owner) |
1448 | + self._test_deletePillarObserver(distro, [InformationType.USERDATA]) |
1449 | + |
1450 | |
1451 | class ApiTestMixin: |
1452 | """Common tests for launchpadlib and webservice.""" |
1453 | |
1454 | === modified file 'lib/lp/registry/tests/test_accesspolicy.py' |
1455 | --- lib/lp/registry/tests/test_accesspolicy.py 2012-03-07 01:24:33 +0000 |
1456 | +++ lib/lp/registry/tests/test_accesspolicy.py 2012-03-08 16:34:46 +0000 |
1457 | @@ -264,6 +264,16 @@ |
1458 | grants, |
1459 | getUtility(IAccessArtifactGrantSource).findByArtifact([artifact])) |
1460 | |
1461 | + def test_revokeByArtifact(self): |
1462 | + # revokeByArtifact() removes the relevant grants. |
1463 | + artifact = self.factory.makeAccessArtifact() |
1464 | + grant = self.factory.makeAccessArtifactGrant(artifact=artifact) |
1465 | + other_grant = self.factory.makeAccessArtifactGrant() |
1466 | + getUtility(IAccessArtifactGrantSource).revokeByArtifact([artifact]) |
1467 | + IStore(grant).invalidate() |
1468 | + self.assertRaises(LostObjectError, getattr, grant, 'grantor') |
1469 | + self.assertIsNot(None, other_grant.grantor) |
1470 | + |
1471 | |
1472 | class TestAccessPolicyArtifact(TestCaseWithFactory): |
1473 | layer = DatabaseFunctionalLayer |
1474 | @@ -319,6 +329,21 @@ |
1475 | links, |
1476 | getUtility(IAccessPolicyArtifactSource).findByPolicy([policy])) |
1477 | |
1478 | + def test_deleteByArtifact(self): |
1479 | + # deleteByArtifact() removes the relevant grants. |
1480 | + grant = self.factory.makeAccessPolicyArtifact() |
1481 | + other_grant = self.factory.makeAccessPolicyArtifact() |
1482 | + getUtility(IAccessPolicyArtifactSource).deleteByArtifact( |
1483 | + [grant.abstract_artifact]) |
1484 | + self.assertContentEqual( |
1485 | + [], |
1486 | + getUtility(IAccessPolicyArtifactSource).findByArtifact( |
1487 | + [grant.abstract_artifact])) |
1488 | + self.assertContentEqual( |
1489 | + [other_grant], |
1490 | + getUtility(IAccessPolicyArtifactSource).findByArtifact( |
1491 | + [other_grant.abstract_artifact])) |
1492 | + |
1493 | |
1494 | class TestAccessPolicyGrant(TestCaseWithFactory): |
1495 | layer = DatabaseFunctionalLayer |
1496 | @@ -414,3 +439,19 @@ |
1497 | self.assertContentEqual( |
1498 | [policy_grant.grantee, artifact_grant.grantee], |
1499 | apgfs.findGranteesByPolicy([policy])) |
1500 | + |
1501 | + def test_findArtifactsByGrantee(self): |
1502 | + # findArtifactsByGrantee() returns the artifacts for grantee for any of |
1503 | + # the policies. |
1504 | + apgfs = getUtility(IAccessPolicyGrantFlatSource) |
1505 | + policy = self.factory.makeAccessPolicy() |
1506 | + grantee = self.factory.makePerson() |
1507 | + # Artifacts not linked to the policy do not show up. |
1508 | + artifact = self.factory.makeAccessArtifact() |
1509 | + self.factory.makeAccessArtifactGrant(artifact, grantee) |
1510 | + self.assertContentEqual( |
1511 | + [], apgfs.findArtifactsByGrantee(grantee, [policy])) |
1512 | + # Artifacts linked to the policy do show up. |
1513 | + self.factory.makeAccessPolicyArtifact(artifact=artifact, policy=policy) |
1514 | + self.assertContentEqual( |
1515 | + [artifact], apgfs.findArtifactsByGrantee(grantee, [policy])) |
1516 | |
1517 | === modified file 'lib/lp/scripts/garbo.py' |
1518 | --- lib/lp/scripts/garbo.py 2012-03-07 07:29:31 +0000 |
1519 | +++ lib/lp/scripts/garbo.py 2012-03-08 16:34:46 +0000 |
1520 | @@ -13,6 +13,7 @@ |
1521 | datetime, |
1522 | timedelta, |
1523 | ) |
1524 | +import itertools |
1525 | import logging |
1526 | import multiprocessing |
1527 | import os |
1528 | @@ -26,7 +27,12 @@ |
1529 | import iso8601 |
1530 | from psycopg2 import IntegrityError |
1531 | import pytz |
1532 | -from storm.expr import In |
1533 | +from storm.expr import ( |
1534 | + Exists, |
1535 | + In, |
1536 | + Not, |
1537 | + Select, |
1538 | + ) |
1539 | from storm.locals import ( |
1540 | Max, |
1541 | Min, |
1542 | @@ -57,7 +63,12 @@ |
1543 | RevisionCache, |
1544 | ) |
1545 | from lp.hardwaredb.model.hwdb import HWSubmission |
1546 | +from lp.registry.enums import InformationType |
1547 | +from lp.registry.interfaces.accesspolicy import IAccessPolicySource |
1548 | +from lp.registry.model.accesspolicy import AccessPolicy |
1549 | +from lp.registry.model.distribution import Distribution |
1550 | from lp.registry.model.person import Person |
1551 | +from lp.registry.model.product import Product |
1552 | from lp.services.config import config |
1553 | from lp.services.database import postgresql |
1554 | from lp.services.database.constants import UTC_NOW |
1555 | @@ -990,6 +1001,64 @@ |
1556 | transaction.commit() |
1557 | |
1558 | |
1559 | +class AccessPolicyDistributionAddition(TunableLoop): |
1560 | + """A `TunableLoop` to add AccessPolicy for all distributions.""" |
1561 | + |
1562 | + maximum_chunk_size = 5000 |
1563 | + |
1564 | + def __init__(self, log, abort_time=None): |
1565 | + super(AccessPolicyDistributionAddition, self).__init__( |
1566 | + log, abort_time) |
1567 | + self.transaction = transaction |
1568 | + self.store = IMasterStore(Distribution) |
1569 | + |
1570 | + def findDistributions(self): |
1571 | + return self.store.find( |
1572 | + Distribution, |
1573 | + Not(Exists( |
1574 | + Select(AccessPolicy.id, |
1575 | + tables=[AccessPolicy], where=[ |
1576 | + AccessPolicy.distribution_id == Distribution.id])))) |
1577 | + |
1578 | + def isDone(self): |
1579 | + return self.findDistributions().is_empty() |
1580 | + |
1581 | + def __call__(self, chunk_size): |
1582 | + policies = itertools.product( |
1583 | + self.findDistributions()[:chunk_size], |
1584 | + (InformationType.USERDATA, InformationType.EMBARGOEDSECURITY)) |
1585 | + getUtility(IAccessPolicySource).create(policies) |
1586 | + self.transaction.commit() |
1587 | + |
1588 | + |
1589 | +class AccessPolicyProductAddition(TunableLoop): |
1590 | + """A `TunableLoop` to add AccessPolicy for all products.""" |
1591 | + |
1592 | + maximum_chunk_size = 5000 |
1593 | + |
1594 | + def __init__(self, log, abort_time=None): |
1595 | + super(AccessPolicyProductAddition, self).__init__(log, abort_time) |
1596 | + self.transaction = transaction |
1597 | + self.store = IMasterStore(Product) |
1598 | + |
1599 | + def findProducts(self): |
1600 | + return self.store.find( |
1601 | + Product, |
1602 | + Not(Exists( |
1603 | + Select(AccessPolicy.id, tables=[AccessPolicy], where=[ |
1604 | + AccessPolicy.product_id == Product.id])))) |
1605 | + |
1606 | + def isDone(self): |
1607 | + return self.findProducts().is_empty() |
1608 | + |
1609 | + def __call__(self, chunk_size): |
1610 | + policies = itertools.product( |
1611 | + self.findProducts()[:chunk_size], |
1612 | + (InformationType.USERDATA, InformationType.EMBARGOEDSECURITY)) |
1613 | + getUtility(IAccessPolicySource).create(policies) |
1614 | + self.transaction.commit() |
1615 | + |
1616 | + |
1617 | class SpecificationWorkitemMigrator(TunableLoop): |
1618 | """Migrate work-items from Specification.whiteboard to |
1619 | SpecificationWorkItem. |
1620 | @@ -1315,6 +1384,8 @@ |
1621 | UnusedSessionPruner, |
1622 | DuplicateSessionPruner, |
1623 | BugHeatUpdater, |
1624 | + AccessPolicyDistributionAddition, |
1625 | + AccessPolicyProductAddition, |
1626 | ] |
1627 | experimental_tunable_loops = [] |
1628 | |
1629 | |
1630 | === modified file 'lib/lp/scripts/tests/test_garbo.py' |
1631 | --- lib/lp/scripts/tests/test_garbo.py 2012-03-07 07:29:31 +0000 |
1632 | +++ lib/lp/scripts/tests/test_garbo.py 2012-03-08 16:34:46 +0000 |
1633 | @@ -54,6 +54,8 @@ |
1634 | ) |
1635 | from lp.code.model.codeimportevent import CodeImportEvent |
1636 | from lp.code.model.codeimportresult import CodeImportResult |
1637 | +from lp.registry.enums import InformationType |
1638 | +from lp.registry.interfaces.accesspolicy import IAccessPolicySource |
1639 | from lp.registry.interfaces.person import IPersonSet |
1640 | from lp.scripts.garbo import ( |
1641 | AntiqueSessionPruner, |
1642 | @@ -1019,6 +1021,26 @@ |
1643 | self.runHourly() |
1644 | self.assertNotEqual(old_update, bug.heat_last_updated) |
1645 | |
1646 | + def test_AccessPolicyDistributionAddition(self): |
1647 | + switch_dbuser('testadmin') |
1648 | + distribution = self.factory.makeDistribution() |
1649 | + transaction.commit() |
1650 | + self.runHourly() |
1651 | + ap = getUtility(IAccessPolicySource).findByPillar((distribution,)) |
1652 | + expected = [ |
1653 | + InformationType.USERDATA, InformationType.EMBARGOEDSECURITY] |
1654 | + self.assertContentEqual(expected, [policy.type for policy in ap]) |
1655 | + |
1656 | + def test_AccessPolicyProductAddition(self): |
1657 | + switch_dbuser('testadmin') |
1658 | + product = self.factory.makeProduct() |
1659 | + transaction.commit() |
1660 | + self.runHourly() |
1661 | + ap = getUtility(IAccessPolicySource).findByPillar((product,)) |
1662 | + expected = [ |
1663 | + InformationType.USERDATA, InformationType.EMBARGOEDSECURITY] |
1664 | + self.assertContentEqual(expected, [policy.type for policy in ap]) |
1665 | + |
1666 | def test_SpecificationWorkitemMigrator_not_enabled_by_default(self): |
1667 | self.assertFalse(getFeatureFlag('garbo.workitem_migrator.enabled')) |
1668 | switch_dbuser('testadmin') |
1669 | |
1670 | === modified file 'lib/lp/services/webapp/adapter.py' |
1671 | --- lib/lp/services/webapp/adapter.py 2011-12-30 08:13:14 +0000 |
1672 | +++ lib/lp/services/webapp/adapter.py 2012-03-08 16:34:46 +0000 |
1673 | @@ -226,11 +226,11 @@ |
1674 | timeline = get_request_timeline(request) |
1675 | from lp.services.webapp.errorlog import ( |
1676 | maybe_record_user_requested_oops) |
1677 | - oopsid = maybe_record_user_requested_oops() |
1678 | - if oopsid is None: |
1679 | + maybe_record_user_requested_oops() |
1680 | + if request.oopsid is None: |
1681 | oops_str = "" |
1682 | else: |
1683 | - oops_str = " %s" % oopsid |
1684 | + oops_str = " %s" % request.oopsid |
1685 | log = "%s queries/external actions issued in %.2f seconds%s" % ( |
1686 | len(timeline.actions), secs, oops_str) |
1687 | return log |
1688 | |
1689 | === modified file 'lib/lp/services/webapp/errorlog.py' |
1690 | --- lib/lp/services/webapp/errorlog.py 2012-01-01 02:58:52 +0000 |
1691 | +++ lib/lp/services/webapp/errorlog.py 2012-03-08 16:34:46 +0000 |
1692 | @@ -542,18 +542,16 @@ |
1693 | def maybe_record_user_requested_oops(): |
1694 | """If an OOPS has been requested, report one. |
1695 | |
1696 | - :return: The oopsid of the requested oops. Returns None if an oops was |
1697 | - not requested, or if there is already an OOPS. |
1698 | + It will be stored in request.oopsid. |
1699 | """ |
1700 | request = get_current_browser_request() |
1701 | - # If there is no request, or there is an oops already, then return. |
1702 | - if (request is None or |
1703 | - request.oopsid is not None or |
1704 | - not request.annotations.get(LAZR_OOPS_USER_REQUESTED_KEY, False)): |
1705 | - return None |
1706 | - globalErrorUtility.raising( |
1707 | - (UserRequestOops, UserRequestOops(), None), request) |
1708 | - return request.oopsid |
1709 | + # If there's a request and no existing OOPS, but an OOPS has been |
1710 | + # requested, record one. |
1711 | + if (request is not None |
1712 | + and request.oopsid is None |
1713 | + and request.annotations.get(LAZR_OOPS_USER_REQUESTED_KEY, False)): |
1714 | + globalErrorUtility.raising( |
1715 | + (UserRequestOops, UserRequestOops(), None), request) |
1716 | |
1717 | |
1718 | class OopsNamespace(view): |
1719 | |
1720 | === modified file 'lib/lp/services/webapp/tests/test_user_requested_oops.py' |
1721 | --- lib/lp/services/webapp/tests/test_user_requested_oops.py 2012-01-01 02:58:52 +0000 |
1722 | +++ lib/lp/services/webapp/tests/test_user_requested_oops.py 2012-03-08 16:34:46 +0000 |
1723 | @@ -37,20 +37,28 @@ |
1724 | def test_none_requested(self): |
1725 | # If an oops was not requested, then maybe_record_user_requested_oops |
1726 | # does not record an oops. |
1727 | - oops_id = maybe_record_user_requested_oops() |
1728 | - self.assertIs(None, oops_id) |
1729 | request = get_current_browser_request() |
1730 | + maybe_record_user_requested_oops() |
1731 | self.assertIs(None, request.oopsid) |
1732 | |
1733 | def test_annotation_key(self): |
1734 | - # The request for an oops is stored in the request annotations. If a |
1735 | - # user request oops is recorded, the oops id is returned, and also |
1736 | - # stored in the request. |
1737 | - request = get_current_browser_request() |
1738 | - request.annotations[LAZR_OOPS_USER_REQUESTED_KEY] = True |
1739 | - oops_id = maybe_record_user_requested_oops() |
1740 | - self.assertIsNot(None, oops_id) |
1741 | - self.assertEqual(oops_id, request.oopsid) |
1742 | + # The request for an oops is stored in the request annotations. |
1743 | + # If a user request oops is recorded, the oops id is stored in |
1744 | + # the request. |
1745 | + request = get_current_browser_request() |
1746 | + request.annotations[LAZR_OOPS_USER_REQUESTED_KEY] = True |
1747 | + self.assertIs(None, request.oopsid) |
1748 | + maybe_record_user_requested_oops() |
1749 | + self.assertIsNot(None, request.oopsid) |
1750 | + |
1751 | + def test_multiple_calls(self): |
1752 | + # Asking to record the OOPS twice just returns the same ID. |
1753 | + request = get_current_browser_request() |
1754 | + request.annotations[LAZR_OOPS_USER_REQUESTED_KEY] = True |
1755 | + maybe_record_user_requested_oops() |
1756 | + orig_oops_id = request.oopsid |
1757 | + maybe_record_user_requested_oops() |
1758 | + self.assertEqual(orig_oops_id, request.oopsid) |
1759 | |
1760 | def test_existing_oops_stops_user_requested(self): |
1761 | # If there is already an existing oops id in the request, then the |
1762 | @@ -58,8 +66,7 @@ |
1763 | request = get_current_browser_request() |
1764 | request.oopsid = "EXISTING" |
1765 | request.annotations[LAZR_OOPS_USER_REQUESTED_KEY] = True |
1766 | - oops_id = maybe_record_user_requested_oops() |
1767 | - self.assertIs(None, oops_id) |
1768 | + maybe_record_user_requested_oops() |
1769 | self.assertEqual("EXISTING", request.oopsid) |
1770 | |
1771 | def test_OopsNamespace_traverse(self): |
1772 | |
1773 | === modified file 'lib/lp/soyuz/stories/soyuz/xx-builder-page.txt' |
1774 | --- lib/lp/soyuz/stories/soyuz/xx-builder-page.txt 2012-01-15 11:06:57 +0000 |
1775 | +++ lib/lp/soyuz/stories/soyuz/xx-builder-page.txt 2012-03-08 16:34:46 +0000 |
1776 | @@ -4,6 +4,7 @@ |
1777 | builder state. In the sampledata, the builder 'bob' is building |
1778 | 'mozilla-firefox'. |
1779 | |
1780 | + >>> anon_browser.mech_browser.set_handle_equiv(False) |
1781 | >>> anon_browser.open("http://launchpad.dev/builders") |
1782 | >>> anon_browser.getLink("bob").click() |
1783 | |
1784 | @@ -27,6 +28,7 @@ |
1785 | timezone. This way they can easily find out if they are reading |
1786 | outdated information. |
1787 | |
1788 | + >>> user_browser.mech_browser.set_handle_equiv(False) |
1789 | >>> user_browser.open(anon_browser.url) |
1790 | >>> print extract_text(find_portlet( |
1791 | ... user_browser.contents, 'View full history Current status')) |
1792 | @@ -68,6 +70,7 @@ |
1793 | |
1794 | >>> cprov_browser = setupBrowser( |
1795 | ... auth='Basic celso.providelo@canonical.com:test') |
1796 | + >>> cprov_browser.mech_browser.set_handle_equiv(False) |
1797 | |
1798 | >>> cprov_browser.open('http://launchpad.dev/builders') |
1799 | >>> cprov_browser.getLink('bob').click() |
1800 | @@ -193,7 +196,7 @@ |
1801 | when they judge it convenient, for instance, when the builder present |
1802 | transient failures or is used for another purpose. |
1803 | |
1804 | - >>> cprov_browser.open('http://launchpad.dev/+builds') |
1805 | + >>> cprov_browser.open('http://launchpad.dev/builders') |
1806 | >>> cprov_browser.getLink('bob').click() |
1807 | >>> print backslashreplace(cprov_browser.title) |
1808 | Bob The Builder : Build Farm |
1809 | |
1810 | === modified file 'lib/lp/soyuz/stories/soyuz/xx-buildfarm-index.txt' |
1811 | --- lib/lp/soyuz/stories/soyuz/xx-buildfarm-index.txt 2011-12-23 23:44:59 +0000 |
1812 | +++ lib/lp/soyuz/stories/soyuz/xx-buildfarm-index.txt 2012-03-08 16:34:46 +0000 |
1813 | @@ -4,6 +4,7 @@ |
1814 | link to it yet because we are not yet sure of the benefits of doing |
1815 | this, since the audience of this page is still restricted. |
1816 | |
1817 | + >>> anon_browser.mech_browser.set_handle_equiv(False) |
1818 | >>> anon_browser.open('http://launchpad.dev/+builds') |
1819 | |
1820 | The BuildFarm contains a list of all builders registered in Launchpad |
1821 | @@ -120,6 +121,7 @@ |
1822 | |
1823 | Administrators can create new builders. |
1824 | |
1825 | + >>> admin_browser.mech_browser.set_handle_equiv(False) |
1826 | >>> admin_browser.open("http://launchpad.dev/+builds/+index") |
1827 | |
1828 | >>> admin_browser.getLink("Register a new build machine").click() |
1829 | |
1830 | === modified file 'lib/lp/soyuz/stories/soyuz/xx-builds-pages.txt' |
1831 | --- lib/lp/soyuz/stories/soyuz/xx-builds-pages.txt 2012-01-06 11:08:30 +0000 |
1832 | +++ lib/lp/soyuz/stories/soyuz/xx-builds-pages.txt 2012-03-08 16:34:46 +0000 |
1833 | @@ -69,7 +69,8 @@ |
1834 | |
1835 | For Builder, same as Distribution: |
1836 | |
1837 | - >>> anon_browser.open("http://launchpad.dev/+builds/bob") |
1838 | + >>> anon_browser.mech_browser.set_handle_equiv(False) |
1839 | + >>> anon_browser.open("http://launchpad.dev/builders/bob") |
1840 | >>> anon_browser.getLink("View full history").click() |
1841 | >>> print anon_browser.title |
1842 | Build history : Bob The Builder : Build Farm |
1843 | |
1844 | === modified file 'lib/lp/soyuz/stories/soyuz/xx-private-builds.txt' |
1845 | --- lib/lp/soyuz/stories/soyuz/xx-private-builds.txt 2012-01-15 11:06:57 +0000 |
1846 | +++ lib/lp/soyuz/stories/soyuz/xx-private-builds.txt 2012-03-08 16:34:46 +0000 |
1847 | @@ -65,6 +65,7 @@ |
1848 | The status shown to an anonymous user hides the private source it is |
1849 | building. |
1850 | |
1851 | + >>> anon_browser.mech_browser.set_handle_equiv(False) |
1852 | >>> anon_browser.open("http://launchpad.dev/+builds/frog") |
1853 | >>> print extract_text(find_main_content(anon_browser.contents)) |
1854 | The frog builder... |
1855 | @@ -74,6 +75,7 @@ |
1856 | |
1857 | Launchpad Administrators are allowed to see the build: |
1858 | |
1859 | + >>> admin_browser.mech_browser.set_handle_equiv(False) |
1860 | >>> admin_browser.open("http://launchpad.dev/+builds/frog") |
1861 | >>> print extract_text(find_main_content(admin_browser.contents)) |
1862 | The frog builder... |
1863 | @@ -85,6 +87,7 @@ |
1864 | Buildd Administrators are not allowed to see the build in the portlet: |
1865 | |
1866 | >>> name12_browser = setupBrowser(auth="Basic test@canonical.com:test") |
1867 | + >>> name12_browser.mech_browser.set_handle_equiv(False) |
1868 | >>> name12_browser.open("http://launchpad.dev/+builds/frog") |
1869 | >>> print extract_text(find_main_content(name12_browser.contents)) |
1870 | The frog builder... |
1871 | @@ -96,6 +99,7 @@ |
1872 | |
1873 | >>> cprov_browser = setupBrowser( |
1874 | ... auth="Basic celso.providelo@canonical.com:test") |
1875 | + >>> cprov_browser.mech_browser.set_handle_equiv(False) |
1876 | >>> cprov_browser.open("http://launchpad.dev/+builds/frog") |
1877 | >>> print extract_text(find_main_content(cprov_browser.contents)) |
1878 | The frog builder... |
1879 | @@ -295,7 +299,6 @@ |
1880 | |
1881 | Now the anonymous user can see the build: |
1882 | |
1883 | - >>> anon_browser = setupBrowser() |
1884 | >>> anon_browser.open("http://launchpad.dev/+builds") |
1885 | >>> print extract_text(find_main_content(anon_browser.contents)) |
1886 | The Launchpad build farm |
1887 | @@ -307,6 +310,7 @@ |
1888 | |
1889 | Any other logged-in user will also see the build: |
1890 | |
1891 | + >>> browser.mech_browser.set_handle_equiv(False) |
1892 | >>> browser.open("http://launchpad.dev/+builds") |
1893 | >>> print extract_text(find_main_content(browser.contents)) |
1894 | The Launchpad build farm |
1895 | |
1896 | === modified file 'lib/lp/translations/stories/buildfarm/xx-build-summary.txt' |
1897 | --- lib/lp/translations/stories/buildfarm/xx-build-summary.txt 2012-02-09 23:09:36 +0000 |
1898 | +++ lib/lp/translations/stories/buildfarm/xx-build-summary.txt 2012-03-08 16:34:46 +0000 |
1899 | @@ -71,6 +71,7 @@ |
1900 | The job's summary shows that what type of job this is. It also links |
1901 | to the branch. |
1902 | |
1903 | + >>> user_browser.mech_browser.set_handle_equiv(False) |
1904 | >>> user_browser.open(builder_page) |
1905 | >>> print extract_text(find_build_summary(user_browser)) |
1906 | Working on TranslationTemplatesBuildJob for branch ... |
1907 | |
1908 | === modified file 'utilities/setuplxc.py' |
1909 | --- utilities/setuplxc.py 2012-03-06 00:11:17 +0000 |
1910 | +++ utilities/setuplxc.py 2012-03-08 16:34:46 +0000 |
1911 | @@ -761,13 +761,12 @@ |
1912 | LP_SOURCE_DEPS, 'download-cache']) |
1913 | |
1914 | |
1915 | -def create_scripts(user, directory, lxcname, ssh_key_path): |
1916 | +def create_scripts(user, lxcname, ssh_key_path): |
1917 | """Create scripts to update the Launchpad environment and run tests.""" |
1918 | mapping = { |
1919 | - 'user': user, |
1920 | 'lxcname': lxcname, |
1921 | 'ssh_key_path': ssh_key_path, |
1922 | - 'checkout_dir': os.path.join(directory, LP_CHECKOUT), |
1923 | + 'user': user, |
1924 | } |
1925 | # We need a script that will run the LP build inside LXC. It is run as |
1926 | # root (see below) but drops root once inside the LXC container. |
1927 | @@ -775,12 +774,22 @@ |
1928 | with open(build_script_file, 'w') as script: |
1929 | script.write(textwrap.dedent("""\ |
1930 | #!/bin/sh |
1931 | - set -uex |
1932 | + set -ux |
1933 | lxc-start -n {lxcname} -d |
1934 | lxc-wait -n {lxcname} -s RUNNING |
1935 | - sleep 30 # aparently RUNNING isn't quite enough |
1936 | - su {user} -c "/usr/bin/ssh -o StrictHostKeyChecking=no \\ |
1937 | - -i '{ssh_key_path}' {lxcname} make -C $PWD schema" |
1938 | + for i in $(seq 1 30); do |
1939 | + su {user} -c "/usr/bin/ssh -o StrictHostKeyChecking=no \\ |
1940 | + -i '{ssh_key_path}' {lxcname} make -C $PWD schema" |
1941 | + if [ ! 255 -eq $? ]; then |
1942 | + # If ssh returns 255 then its connection failed. |
1943 | + # Anything else is either success (status 0) or a |
1944 | + # failure from whatever we ran over the SSH connection. |
1945 | + # In those cases we want to stop looping, so we break |
1946 | + # here. |
1947 | + break; |
1948 | + fi |
1949 | + sleep 1 |
1950 | + done |
1951 | lxc-stop -n {lxcname} |
1952 | lxc-wait -n {lxcname} -s STOPPED |
1953 | """.format(**mapping))) |
1954 | @@ -955,7 +964,7 @@ |
1955 | ('initialize_host', ( |
1956 | user, fullname, email, lpuser, private_key, public_key, |
1957 | ssh_key_path, dependencies_dir, directory)), |
1958 | - ('create_scripts', (user, directory, lxc_name, ssh_key_path)), |
1959 | + ('create_scripts', (user, lxc_name, ssh_key_path)), |
1960 | ('create_lxc', (user, lxc_name, ssh_key_path)), |
1961 | ('initialize_lxc', ( |
1962 | user, dependencies_dir, directory, lxc_name, ssh_key_path)), |
Thank you!