Page Menu
Home
c4science
Search
Configure Global Search
Log In
Files
F96498998
DiffusionDoorkeeperCommitFeedStoryPublisher.php
No One
Temporary
Actions
Download File
Edit File
Delete File
View Transforms
Subscribe
Mute Notifications
Award Token
Subscribers
None
File Metadata
Details
File Info
Storage
Attached
Created
Fri, Dec 27, 07:54
Size
5 KB
Mime Type
text/x-php
Expires
Sun, Dec 29, 07:54 (2 d)
Engine
blob
Format
Raw Data
Handle
23194223
Attached To
rPH Phabricator
DiffusionDoorkeeperCommitFeedStoryPublisher.php
View Options
<?php
final
class
DiffusionDoorkeeperCommitFeedStoryPublisher
extends
DoorkeeperFeedStoryPublisher
{
private
$auditRequests
;
private
$activePHIDs
;
private
$passivePHIDs
;
private
function
getAuditRequests
()
{
return
$this
->
auditRequests
;
}
public
function
canPublishStory
(
PhabricatorFeedStory
$story
,
$object
)
{
return
(
$object
instanceof
PhabricatorRepositoryCommit
);
}
public
function
isStoryAboutObjectCreation
(
$object
)
{
// TODO: Although creation stories exist, they currently don't have a
// primary object PHID set, so they'll never make it here because they
// won't pass `canPublishStory()`.
return
false
;
}
public
function
isStoryAboutObjectClosure
(
$object
)
{
// TODO: This isn't quite accurate, but pretty close: check if this story
// is a close (which clearly is about object closure) or is an "Accept" and
// the commit is fully audited (which is almost certainly a closure).
// After ApplicationTransactions, we could annotate feed stories more
// explicitly.
$story
=
$this
->
getFeedStory
();
$action
=
$story
->
getStoryData
()->
getValue
(
'action'
);
if
(
$action
==
PhabricatorAuditActionConstants
::
CLOSE
)
{
return
true
;
}
$fully_audited
=
PhabricatorAuditCommitStatusConstants
::
FULLY_AUDITED
;
if
((
$action
==
PhabricatorAuditActionConstants
::
ACCEPT
)
&&
$object
->
getAuditStatus
()
==
$fully_audited
)
{
return
true
;
}
return
false
;
}
public
function
willPublishStory
(
$commit
)
{
$requests
=
id
(
new
DiffusionCommitQuery
())
->
withPHIDs
(
array
(
$commit
->
getPHID
()))
->
needAuditRequests
(
true
)
->
executeOne
()
->
getAudits
();
// TODO: This is messy and should be generalized, but we don't have a good
// query for it yet. Since we run in the daemons, just do the easiest thing
// we can for the moment. Figure out who all of the "active" (need to
// audit) and "passive" (no action necessary) users are.
$auditor_phids
=
mpull
(
$requests
,
'getAuditorPHID'
);
$objects
=
id
(
new
PhabricatorObjectQuery
())
->
setViewer
(
$this
->
getViewer
())
->
withPHIDs
(
$auditor_phids
)
->
execute
();
$active
=
array
();
$passive
=
array
();
foreach
(
$requests
as
$request
)
{
$status
=
$request
->
getAuditStatus
();
if
(
$status
==
PhabricatorAuditStatusConstants
::
CC
)
{
// We handle these specially below.
continue
;
}
$object
=
idx
(
$objects
,
$request
->
getAuditorPHID
());
if
(!
$object
)
{
continue
;
}
$request_phids
=
array
();
if
(
$object
instanceof
PhabricatorUser
)
{
$request_phids
=
array
(
$object
->
getPHID
());
}
else
if
(
$object
instanceof
PhabricatorOwnersPackage
)
{
$request_phids
=
PhabricatorOwnersOwner
::
loadAffiliatedUserPHIDs
(
array
(
$object
->
getID
()));
}
else
if
(
$object
instanceof
PhabricatorProject
)
{
$project
=
id
(
new
PhabricatorProjectQuery
())
->
setViewer
(
$this
->
getViewer
())
->
withIDs
(
array
(
$object
->
getID
()))
->
needMembers
(
true
)
->
executeOne
();
$request_phids
=
$project
->
getMemberPHIDs
();
}
else
{
// Dunno what this is.
$request_phids
=
array
();
}
switch
(
$status
)
{
case
PhabricatorAuditStatusConstants
::
AUDIT_REQUIRED
:
case
PhabricatorAuditStatusConstants
::
AUDIT_REQUESTED
:
case
PhabricatorAuditStatusConstants
::
CONCERNED
:
$active
+=
array_fuse
(
$request_phids
);
break
;
default
:
$passive
+=
array_fuse
(
$request_phids
);
break
;
}
}
// Remove "Active" users from the "Passive" list.
$passive
=
array_diff_key
(
$passive
,
$active
);
$this
->
activePHIDs
=
$active
;
$this
->
passivePHIDs
=
$passive
;
$this
->
auditRequests
=
$requests
;
return
$commit
;
}
public
function
getOwnerPHID
(
$object
)
{
return
$object
->
getAuthorPHID
();
}
public
function
getActiveUserPHIDs
(
$object
)
{
return
$this
->
activePHIDs
;
}
public
function
getPassiveUserPHIDs
(
$object
)
{
return
$this
->
passivePHIDs
;
}
public
function
getCCUserPHIDs
(
$object
)
{
$ccs
=
array
();
foreach
(
$this
->
getAuditRequests
()
as
$request
)
{
if
(
$request
->
getAuditStatus
()
==
PhabricatorAuditStatusConstants
::
CC
)
{
$ccs
[]
=
$request
->
getAuditorPHID
();
}
}
return
$ccs
;
}
public
function
getObjectTitle
(
$object
)
{
$prefix
=
$this
->
getTitlePrefix
(
$object
);
$repository
=
$object
->
getRepository
();
$name
=
$repository
->
formatCommitName
(
$object
->
getCommitIdentifier
());
$title
=
$object
->
getSummary
();
return
ltrim
(
"{$prefix} {$name}: {$title}"
);
}
public
function
getObjectURI
(
$object
)
{
$repository
=
$object
->
getRepository
();
$name
=
$repository
->
formatCommitName
(
$object
->
getCommitIdentifier
());
return
PhabricatorEnv
::
getProductionURI
(
'/'
.
$name
);
}
public
function
getObjectDescription
(
$object
)
{
$data
=
$object
->
loadCommitData
();
if
(
$data
)
{
return
$data
->
getCommitMessage
();
}
return
null
;
}
public
function
isObjectClosed
(
$object
)
{
switch
(
$object
->
getAuditStatus
())
{
case
PhabricatorAuditCommitStatusConstants
::
NEEDS_AUDIT
:
case
PhabricatorAuditCommitStatusConstants
::
CONCERN_RAISED
:
case
PhabricatorAuditCommitStatusConstants
::
PARTIALLY_AUDITED
:
return
false
;
default
:
return
true
;
}
}
public
function
getResponsibilityTitle
(
$object
)
{
$prefix
=
$this
->
getTitlePrefix
(
$object
);
return
pht
(
'%s Audit'
,
$prefix
);
}
public
function
getStoryText
(
$object
)
{
$implied_context
=
$this
->
getRenderWithImpliedContext
();
$story
=
$this
->
getFeedStory
();
if
(
$story
instanceof
PhabricatorFeedStoryAudit
)
{
$text
=
$story
->
renderForAsanaBridge
(
$implied_context
);
}
else
{
$text
=
$story
->
renderText
();
}
return
$text
;
}
private
function
getTitlePrefix
(
PhabricatorRepositoryCommit
$commit
)
{
$prefix_key
=
'metamta.diffusion.subject-prefix'
;
return
PhabricatorEnv
::
getEnvConfig
(
$prefix_key
);
}
}
Event Timeline
Log In to Comment