Initial version for ACL manager

Adding a tool to help with juggling between pre and post-release
ACLs on stable/$SERIES branches (for milestone-driven projects).

The tool facilitates:

- building the ACL patch (sometimes between m-2 and m-3)
- setting the pre-release group membership (once ACL patch merged)
- setting the post-release group membership (on release day)

Change-Id: I346b6d1154acc9fd5345388cfdfc4c1df6123195
This commit is contained in:
Thierry Carrez 2016-08-05 12:24:35 +02:00
parent 13121d0d60
commit 17e0b083a4
2 changed files with 223 additions and 0 deletions

View File

@ -845,6 +845,34 @@ period started. References to these reviews will be appended to
2014.1.4-freeze.txt to be unfrozen later on.
aclmanager.py
-------------
A script to handle pre-release/post-release ACLs on stable/$SERIES branches.
The 'acls' action helps to produce a patch over openstack-infra/project-config
that inserts a specific ACL for stable/$SERIES.
The 'groups' action helps to adjust the membership of $PROJ-release-branch
Gerrit groups, to ensure presence of Release Managers (ensure_rm subaction),
remove $PROJ-stable-maint and add the $PROJ-release group (pre_release
subaction) or remove $PROJ-release and add $PROJ-stable-maint (post_release
subaction).
Examples:
To create the ACL patch for stable/newton:
::
./aclmanager.py acls ~/branches/openstack-infra/project-config newton
To set the pre-release group membership:
::
./aclmanager.py groups pre_release ttx
autokick.py
-----------

195
aclmanager.py Executable file
View File

@ -0,0 +1,195 @@
#!/usr/bin/python
#
# Handle pre-release / post-release ACLs for milestone-driven projects
#
# Copyright 2016 Thierry Carrez <thierry@openstack.org>
# All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
import argparse
import getpass
import os
import sys
import requests
import yaml
GERRIT_URL = 'https://review.openstack.org/'
EXCEPTIONS = ['openstack/training-labs',
'openstack/murano-apps',
'openstack/trove-image-builder']
def repositories_list():
"""Yields (team, repo) tuples for cycle-with-milestones deliverables"""
r = requests.get('http://git.openstack.org/cgit/openstack/governance/plain/reference/projects.yaml') # noqa
teams = yaml.load(r.text)
for tname, team in teams.iteritems():
for dname, deliverable in team['deliverables'].items():
if 'release:cycle-with-milestones' in deliverable.get('tags', []):
for repo in deliverable.get('repos', []):
if repo not in EXCEPTIONS:
yield(tname, repo)
def patch_acls(args):
"""Handles the acls action"""
blob = """[access "refs/heads/stable/{branch}"]
abandon = group Change Owner
abandon = group Project Bootstrappers
abandon = group {group}
exclusiveGroupPermissions = abandon label-Code-Review label-Workflow
label-Code-Review = -2..+2 group Project Bootstrappers
label-Code-Review = -2..+2 group {group}
label-Code-Review = -1..+1 group Registered Users
label-Workflow = -1..+0 group Change Owner
label-Workflow = -1..+1 group Project Bootstrappers
label-Workflow = -1..+1 group {group}
"""
# Load repo/aclfile mapping from Gerrit config
projectsyaml = os.path.join(args.repository, 'gerrit', 'projects.yaml')
acl = {}
config = yaml.load(open(projectsyaml))
for project in config:
aclfilename = project.get('acl-config')
if aclfilename:
acl[project['project']] = aclfilename[19:]
else:
acl[project['project']] = project['project'] + '.config'
# Get the list of ACL files to update
aclfiles = {}
for team, repo in repositories_list():
try:
aclfiles[acl[repo]] = team
except KeyError:
print('No ACL file defined for %s' % repo)
sys.exit(1)
for aclfn, teamname in aclfiles.items():
newcontent = ''
fullfilename = os.path.join(args.repository, 'gerrit', 'acls', aclfn)
group = '%s-release-branch' % teamname
print('Patching %s' % fullfilename)
if args.dryrun:
print('Adding stable/%s ACL with rights for %s' %
(args.series, group))
else:
with open(fullfilename) as aclfile:
hit = False
for line in aclfile:
if line.startswith("[receive]"):
newcontent += blob.format(
branch=args.series,
group=group)
hit = True
newcontent += line
if not hit:
print("Could not update %s automatically" % fullfilename)
with open(fullfilename, 'w') as aclfile:
aclfile.write(newcontent)
def gerrit_group_membership_test(action, group, member):
"""Test for Gerrit group membership based on action taken"""
call = '/groups/%s/groups/%s' % (group, member)
r = requests.get(GERRIT_URL + call)
if action == 'PUT':
# For PUT operations, return true if member is not already there
return r.status_code != 200
else:
# For DELETE operations, return true if member already there
return r.status_code == 200
def modify_gerrit_groups(args):
"""Handles the 'groups' action"""
if args.stage == 'pre_release':
actions = [('DELETE', lambda x: '%s-stable-maint' % x),
('PUT', lambda x: '%s-release' % x)]
elif args.stage == 'post_release':
actions = [('DELETE', lambda x: '%s-release' % x),
('PUT', lambda x: '%s-stable-maint' % x)]
elif args.stage == 'ensure_rm':
actions = [('PUT', lambda x: 'Release Managers')]
# Build the list of calls to make
print('Computing the list of modifications')
calls = set()
for team, _ in repositories_list():
group = '%s-release-branch' % team
for (verb, memberformat) in actions:
member = memberformat(team)
# Filter based on already-handled names
if gerrit_group_membership_test(verb, group, member):
calls.add((verb, group, member))
else:
print("Skipping %s %s in %s (already done)" %
(verb, member, group))
gerritauth = requests.auth.HTTPDigestAuth(args.username, getpass.getpass())
for verb, group, member in calls:
call = 'a/groups/%s/groups/%s' % (group, member)
print('Updating %s group using %s %s' % (group, verb, call))
if not args.dryrun:
r = requests.request(verb, GERRIT_URL + call, auth=gerritauth)
if r.status_code not in (201, 204):
print('Error (%d) while updating group' % r.status_code)
def main(args=sys.argv[1:]):
parser = argparse.ArgumentParser()
parser.add_argument(
'--dryrun',
default=False,
help='do not actually do anything',
action='store_true')
subparsers = parser.add_subparsers(title='commands')
do_acls = subparsers.add_parser(
'acls',
help='patch ACL files')
do_acls.add_argument(
'repository',
help='location of the local project-config repository')
do_acls.add_argument(
'series',
help='series to generate ACL for')
do_acls.set_defaults(func=patch_acls)
do_groups = subparsers.add_parser(
'groups',
help='modify Gerrit groups membership')
do_groups.add_argument(
'stage',
choices=['ensure_rm', 'pre_release', 'post_release'],
help='type of modification to push')
do_groups.add_argument(
'username',
help='gerrit HTTP username')
do_groups.set_defaults(func=modify_gerrit_groups)
args = parser.parse_args(args)
if args.dryrun:
print('Running in dry run mode, no action will be actually taken')
return args.func(args)
if __name__ == '__main__':
main()