Page MenuHomePhabricator

When triggering audits, respect committer identities when importing commits
ClosedPublic

Authored by epriestley on Jun 17 2019, 5:04 PM.
Tags
None
Referenced Files
Unknown Object (File)
Feb 9 2025, 7:52 AM
Unknown Object (File)
Feb 9 2025, 7:52 AM
Unknown Object (File)
Feb 9 2025, 7:52 AM
Unknown Object (File)
Feb 9 2025, 7:52 AM
Unknown Object (File)
Feb 2 2025, 5:27 AM
Unknown Object (File)
Jan 30 2025, 3:06 AM
Unknown Object (File)
Jan 29 2025, 3:41 PM
Unknown Object (File)
Jan 28 2025, 5:17 AM
Subscribers
None

Details

Summary

Ref T13311. We currently don't use committer identity mappings when triggering audits, so if a user is only associated with an identity via manual mapping we won't treat them as the author.

Instead, use the identity and manual mapping if they're available.

Test Plan
  • Pushed a commit as xyz <xyz@example.org>, an address with no corresponding user.
  • In the UI, manually associated that identity with user @alice.
  • Ran bin/repository reparse --publish <hash> to trigger audits and publishing for the commit.
  • Before: observed the $author_phid was null.
  • After: observed the $author_phid is Alice.

Diff Detail

Repository
rP Phabricator
Branch
audit1
Lint
Lint Passed
Unit
Tests Passed
Build Status
Buildable 22960
Build 31510: Run Core Tests
Build 31509: arc lint + arc unit