debian-mirror-gitlab/db/fixtures/development/33_triage_ops.rb
2023-04-23 21:23:45 +05:30

239 lines
6.5 KiB
Ruby

# frozen_string_literal: true
require './spec/support/sidekiq_middleware'
require './spec/support/helpers/test_env'
class Gitlab::Seeder::TriageOps
WEBHOOK_URL = 'http://0.0.0.0:$PORT$'
WEBHOOK_TOKEN = "triage-ops-webhook-token"
WORK_TYPE_LABELS = <<~LABELS.split("\n")
bug::availability
bug::mobile
bug::performance
bug::vulnerability
feature::addition
feature::consolidation
feature::enhancement
feature::removal
maintenance::dependency
maintenance::pipelines
maintenance::refactor
maintenance::test-gap
maintenance::usability
maintenance::workflow
type::bug
type::feature
type::maintenance
LABELS
WORKFLOW_LABELS = <<~LABELS.split("\n")
workflow::blocked
workflow::design
workflow::in dev
workflow::in review
workflow::planning breakdown
workflow::production
workflow::ready
workflow::ready for design
workflow::ready for development
workflow::ready for review
workflow::refinement
workflow::validation backlog
workflow::verification
LABELS
OTHER_LABELS = <<~LABELS.split("\n")
ep::contributor tooling
ep::meta
ep::metrics
ep::pipeline
ep::review-apps
ep::triage
master-broken::caching
master-broken::ci-config
master-broken::dependency-upgrade
master-broken::flaky-test
master-broken::fork-repo-test-gap
master-broken::infrastructure
master-broken::need-merge-train
master-broken::pipeline-skipped-before-merge
master-broken::test-selection-gap
master-broken::undetermined
pipeline:expedite
pipeline:expedite-master-fixing
pipeline:mr-approved
pipeline:run-all-jest
pipeline:run-all-rspec
pipeline:run-as-if-foss
pipeline:run-as-if-jh
pipeline:run-flaky-tests
pipeline:run-praefect-with-db
pipeline:run-review-app
pipeline:run-single-db
pipeline:skip-undercoverage
pipeline:update-cache
documentation
Community contribution
LABELS
def seed!
puts "Updating settings to allow web hooks to localhost"
ApplicationSetting.current_without_cache.update!(allow_local_requests_from_web_hooks_and_services: true)
Sidekiq::Worker.skipping_transaction_check do
Sidekiq::Testing.inline! do
puts "Ensuring required groups"
ensure_group('gitlab-com')
ensure_group('gitlab-com/gl-security/appsec')
ensure_group('gitlab-jh/jh-team')
ensure_group('gitlab-org')
ensure_group('gitlab-org/gitlab-core-team/community-members')
ensure_group('gitlab-org/security')
puts "Ensuring required projects"
ensure_project('gitlab-org/gitlab')
ensure_project('gitlab-org/security/gitlab')
puts "Ensuring required bot user"
ensure_bot_user
puts "Setting up webhooks"
ensure_webhook_for('gitlab-com')
ensure_webhook_for('gitlab-org')
puts "Ensuring work type labels"
ensure_labels_for(WORK_TYPE_LABELS, 'gitlab-com')
ensure_labels_for(WORK_TYPE_LABELS, 'gitlab-org')
puts "Ensuring workflow type labels"
ensure_labels_for(WORKFLOW_LABELS, 'gitlab-com')
ensure_labels_for(WORKFLOW_LABELS, 'gitlab-org')
puts "Ensuring other labels"
ensure_labels_for(OTHER_LABELS, 'gitlab-com')
ensure_labels_for(OTHER_LABELS, 'gitlab-org')
end
end
end
private
def ensure_bot_user
bot = User.find_by_username('triagebot')
bot ||= User.create!(
username: 'triagebot',
name: 'Triage Bot',
email: 'triagebot@example.com',
confirmed_at: DateTime.now,
password: SecureRandom.hex.slice(0, 16)
)
ensure_group('gitlab-org').add_maintainer(bot)
ensure_group('gitlab-com').add_maintainer(bot)
params = {
scopes: ['api'],
name: "API Token #{Time.zone.now}"
}
response = PersonalAccessTokens::CreateService.new(current_user: bot, target_user: bot, params: params).execute
unless response.success?
raise "Can't create Triage Bot access token: #{response.message}"
end
puts "Bot with API_TOKEN=#{response[:personal_access_token].token} is present now."
bot
end
def ensure_webhook_for(group_path)
group = Group.find_by_full_path(group_path)
hook_params = {
enable_ssl_verification: false,
token: WEBHOOK_TOKEN,
url: WEBHOOK_URL.gsub("$PORT$", ENV.fetch('TRIAGE_OPS_WEBHOOK_PORT', '8091'))
}
# Subscribe the hook to all possible events.
all_group_hook_events = GroupHook.triggers.values
all_group_hook_events.each { |value| hook_params[value] = true }
group.hooks.delete_all
hook = group.hooks.new(hook_params)
hook.save!
puts "Hook with url '#{hook.url}' and token '#{hook.token}' for '#{group_path}' is present now."
end
def ensure_labels_for(label_titles, group_path)
group = Group.find_by_full_path(group_path)
label_titles.each do |label_title|
color = ::Gitlab::Color.color_for(label_title[/[^:]+/])
Labels::CreateService
.new(title: label_title, color: "#{color}")
.execute(group: group)
end
end
def ensure_group(full_path)
group = Group.find_by_full_path(full_path)
return group if group
parent_path = full_path.split('/')[0..-2].join('/')
parent = ensure_group(parent_path) if parent_path.present?
group_path = full_path.split('/').last
group = Group.new(
name: group_path.titleize,
path: group_path,
parent_id: parent&.id
)
group.description = FFaker::Lorem.sentence
group.save!
group.add_owner(User.first)
group.create_namespace_settings
group
end
def ensure_project(project_fullpath)
project = Project.find_by_full_path(project_fullpath)
return project if project
group_path = project_fullpath.split('/')[0..-2].join('/')
project_path = project_fullpath.split('/').last
group = ensure_group(group_path)
params = {
namespace_id: group.id,
name: project_path.titleize,
path: project_path,
description: FFaker::Lorem.sentence,
visibility_level: Gitlab::VisibilityLevel::PRIVATE,
skip_disk_validation: true
}
project = ::Projects::CreateService.new(User.first, params).execute
raise "Can't create project '#{project_fullpath}' : #{project.errors.full_messages}" unless project.persisted?
project
end
end
if ENV['SEED_TRIAGE_OPS']
Gitlab::Seeder.quiet do
Gitlab::Seeder::TriageOps.new.seed!
end
else
puts "Skipped. Use the `SEED_TRIAGE_OPS` environment variable to enable seeding data for triage ops project."
end