File size: 3,256 Bytes
1e92f2d
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
const authToken = process.env.CODE_FREEZE_TOKEN

if (!authToken) {
  throw new Error(`missing CODE_FREEZE_TOKEN env`)
}

const codeFreezeRule = {
  context: 'Potentially publish release',
  app_id: 15368,
}

async function updateRules(newRules) {
  const res = await fetch(
    `https://api.github.com/repos/vercel/next.js/branches/canary/protection`,
    {
      method: 'PUT',
      headers: {
        Accept: 'application/vnd.github+json',
        Authorization: `Bearer ${authToken}`,
        'X-GitHub-Api-Version': '2022-11-28',
      },
      body: JSON.stringify(newRules),
    }
  )

  if (!res.ok) {
    throw new Error(
      `Failed to check for rule ${res.status} ${await res.text()}`
    )
  }
}

async function getCurrentRules() {
  const res = await fetch(
    `https://api.github.com/repos/vercel/next.js/branches/canary/protection`,
    {
      headers: {
        Accept: 'application/vnd.github+json',
        Authorization: `Bearer ${authToken}`,
        'X-GitHub-Api-Version': '2022-11-28',
      },
    }
  )

  if (!res.ok) {
    throw new Error(
      `Failed to check for rule ${res.status} ${await res.text()}`
    )
  }
  const data = await res.json()

  return {
    required_status_checks: {
      strict: data.required_status_checks.strict,
      // checks: data.required_status_checks.checks,
      contexts: data.required_status_checks.contexts,
    },
    enforce_admins: data.enforce_admins.enabled,
    required_pull_request_reviews: {
      dismiss_stale_reviews:
        data.required_pull_request_reviews.dismiss_stale_reviews,
      require_code_owner_reviews:
        data.required_pull_request_reviews.require_code_owner_reviews,
      require_last_push_approval:
        data.required_pull_request_reviews.require_last_push_approval,
      required_approving_review_count:
        data.required_pull_request_reviews.required_approving_review_count,
    },
    restrictions: {
      users: data.restrictions.users?.map((user) => user.login) || [],
      teams: data.restrictions.teams?.map((team) => team.slug) || [],
      apps: data.restrictions.apps?.map((app) => app.slug) || [],
    },
  }
}

async function main() {
  const typeIdx = process.argv.indexOf('--type')
  const type = process.argv[typeIdx + 1]

  if (type !== 'enable' && type !== 'disable') {
    throw new Error(`--type should be enable or disable`)
  }
  const isEnable = type === 'enable'
  const currentRules = await getCurrentRules()
  const hasRule = currentRules.required_status_checks.contexts?.some((ctx) => {
    return ctx === codeFreezeRule.context
  })

  console.log(currentRules)

  if (isEnable) {
    if (hasRule) {
      console.log(`Already enabled`)
      return
    }
    currentRules.required_status_checks.contexts.push(codeFreezeRule.context)
    await updateRules(currentRules)
    console.log('Enabled code freeze')
  } else {
    if (!hasRule) {
      console.log(`Already disabled`)
      return
    }
    currentRules.required_status_checks.contexts =
      currentRules.required_status_checks.contexts.filter(
        (ctx) => ctx !== codeFreezeRule.context
      )
    await updateRules(currentRules)
    console.log('Disabled code freeze')
  }
}

main().catch((err) => {
  console.error(err)
  process.exit(1)
})