1998-09-15 21:49:26 +00:00
|
|
|
# -*- Mode: perl; indent-tabs-mode: nil -*-
|
|
|
|
#
|
1999-11-01 23:33:56 +00:00
|
|
|
# The contents of this file are subject to the Mozilla Public
|
|
|
|
# License Version 1.1 (the "License"); you may not use this file
|
|
|
|
# except in compliance with the License. You may obtain a copy of
|
|
|
|
# the License at http://www.mozilla.org/MPL/
|
|
|
|
#
|
|
|
|
# Software distributed under the License is distributed on an "AS
|
|
|
|
# IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or
|
|
|
|
# implied. See the License for the specific language governing
|
|
|
|
# rights and limitations under the License.
|
|
|
|
#
|
1998-09-15 21:49:26 +00:00
|
|
|
# The Original Code is the Bugzilla Bug Tracking System.
|
1999-11-01 23:33:56 +00:00
|
|
|
#
|
1998-09-15 21:49:26 +00:00
|
|
|
# The Initial Developer of the Original Code is Netscape Communications
|
1999-11-01 23:33:56 +00:00
|
|
|
# Corporation. Portions created by Netscape are
|
|
|
|
# Copyright (C) 1998 Netscape Communications Corporation. All
|
|
|
|
# Rights Reserved.
|
|
|
|
#
|
1998-09-15 21:49:26 +00:00
|
|
|
# Contributor(s): Terry Weissman <terry@mozilla.org>
|
2000-03-28 21:31:24 +00:00
|
|
|
# Dan Mosedale <dmose@mozilla.org>
|
2002-08-27 04:28:05 +00:00
|
|
|
# Jacob Steenhagen <jake@bugzilla.org>
|
2002-11-19 07:19:34 +00:00
|
|
|
# Bradley Baetz <bbaetz@student.usyd.edu.au>
|
2001-11-17 10:29:55 +00:00
|
|
|
# Christopher Aillon <christopher@aillon.com>
|
2002-09-22 17:15:13 +00:00
|
|
|
# Joel Peshkin <bugreport@peshkin.net>
|
1998-09-15 21:49:26 +00:00
|
|
|
|
|
|
|
# Contains some global variables and routines used throughout bugzilla.
|
|
|
|
|
|
|
|
use strict;
|
1999-10-18 23:57:58 +00:00
|
|
|
|
2003-01-14 20:00:11 +00:00
|
|
|
use Bugzilla::DB qw(:DEFAULT :deprecated);
|
2002-11-24 19:56:34 +00:00
|
|
|
use Bugzilla::Constants;
|
2002-08-19 13:59:45 +00:00
|
|
|
use Bugzilla::Util;
|
2002-08-29 09:25:54 +00:00
|
|
|
# Bring ChmodDataFile in until this is all moved to the module
|
2003-11-22 03:50:42 +00:00
|
|
|
use Bugzilla::Config qw(:DEFAULT ChmodDataFile $localconfig $datadir);
|
2002-08-19 13:59:45 +00:00
|
|
|
|
1999-10-18 23:57:58 +00:00
|
|
|
# Shut up misguided -w warnings about "used only once". For some reason,
|
|
|
|
# "use vars" chokes on me when I try it here.
|
|
|
|
|
|
|
|
sub globals_pl_sillyness {
|
|
|
|
my $zz;
|
|
|
|
$zz = @main::default_column_list;
|
2000-01-29 20:22:44 +00:00
|
|
|
$zz = $main::defaultqueryname;
|
2002-02-14 01:25:25 +00:00
|
|
|
$zz = @main::enterable_products;
|
2000-01-14 22:35:49 +00:00
|
|
|
$zz = %main::keywordsbyname;
|
1999-10-18 23:57:58 +00:00
|
|
|
$zz = @main::legal_bug_status;
|
|
|
|
$zz = @main::legal_components;
|
2000-01-14 22:35:49 +00:00
|
|
|
$zz = @main::legal_keywords;
|
1999-10-18 23:57:58 +00:00
|
|
|
$zz = @main::legal_opsys;
|
|
|
|
$zz = @main::legal_platform;
|
|
|
|
$zz = @main::legal_priority;
|
|
|
|
$zz = @main::legal_product;
|
|
|
|
$zz = @main::legal_severity;
|
|
|
|
$zz = @main::legal_target_milestone;
|
|
|
|
$zz = @main::legal_versions;
|
|
|
|
$zz = @main::milestoneurl;
|
2002-02-14 01:25:25 +00:00
|
|
|
$zz = %main::proddesc;
|
1999-10-18 23:57:58 +00:00
|
|
|
$zz = @main::prodmaxvotes;
|
2002-02-03 09:28:48 +00:00
|
|
|
$zz = $main::template;
|
2002-03-12 13:55:07 +00:00
|
|
|
$zz = $main::userid;
|
2002-02-03 09:28:48 +00:00
|
|
|
$zz = $main::vars;
|
1999-10-18 23:57:58 +00:00
|
|
|
}
|
|
|
|
|
2000-01-29 20:22:44 +00:00
|
|
|
#
|
|
|
|
# Here are the --LOCAL-- variables defined in 'localconfig' that we'll use
|
|
|
|
# here
|
|
|
|
#
|
|
|
|
|
2002-08-29 09:25:54 +00:00
|
|
|
# XXX - Move this to Bugzilla::Config once code which uses these has moved out
|
|
|
|
# of globals.pl
|
2003-11-22 03:50:42 +00:00
|
|
|
do $localconfig;
|
2000-01-29 20:22:44 +00:00
|
|
|
|
2000-05-20 01:22:07 +00:00
|
|
|
use DBI;
|
1998-09-15 21:49:26 +00:00
|
|
|
|
|
|
|
use Date::Format; # For time2str().
|
2000-01-20 21:31:22 +00:00
|
|
|
use Date::Parse; # For str2time().
|
2004-03-18 03:57:05 +00:00
|
|
|
use Bugzilla::RelationSet;
|
1998-09-15 21:49:26 +00:00
|
|
|
|
2002-03-12 13:55:07 +00:00
|
|
|
# Use standard Perl libraries for cross-platform file/directory manipulation.
|
|
|
|
use File::Spec;
|
|
|
|
|
2001-10-23 15:44:53 +00:00
|
|
|
# Some environment variables are not taint safe
|
2002-11-22 00:36:13 +00:00
|
|
|
delete @::ENV{'PATH', 'IFS', 'CDPATH', 'ENV', 'BASH_ENV'};
|
2001-07-04 04:41:27 +00:00
|
|
|
|
2002-03-23 03:51:05 +00:00
|
|
|
# Cwd.pm in perl 5.6.1 gives a warning if $::ENV{'PATH'} isn't defined
|
|
|
|
# Set this to '' so that we don't get warnings cluttering the logs on every
|
|
|
|
# system call
|
|
|
|
$::ENV{'PATH'} = '';
|
|
|
|
|
2002-03-28 07:57:05 +00:00
|
|
|
# Ignore SIGTERM and SIGPIPE - this prevents DB corruption. If the user closes
|
|
|
|
# their browser window while a script is running, the webserver sends these
|
|
|
|
# signals, and we don't want to die half way through a write.
|
|
|
|
$::SIG{TERM} = 'IGNORE';
|
|
|
|
$::SIG{PIPE} = 'IGNORE';
|
|
|
|
|
2002-10-01 22:07:17 +00:00
|
|
|
$::defaultqueryname = "(Default query)"; # This string not exposed in UI
|
2000-02-17 05:15:23 +00:00
|
|
|
$::unconfirmedstate = "UNCONFIRMED";
|
1998-09-15 21:49:26 +00:00
|
|
|
|
2003-08-06 01:46:14 +00:00
|
|
|
# The following subroutine is for debugging purposes only.
|
|
|
|
# Uncommenting this sub and the $::SIG{__DIE__} trap underneath it will
|
|
|
|
# cause any fatal errors to result in a call stack trace to help track
|
|
|
|
# down weird errors.
|
|
|
|
#sub die_with_dignity {
|
|
|
|
# use Carp; # for confess()
|
|
|
|
# my ($err_msg) = @_;
|
|
|
|
# print $err_msg;
|
|
|
|
# confess($err_msg);
|
|
|
|
#}
|
|
|
|
#$::SIG{__DIE__} = \&die_with_dignity;
|
2001-07-04 04:41:27 +00:00
|
|
|
|
2002-12-08 00:42:55 +00:00
|
|
|
@::default_column_list = ("bug_severity", "priority", "rep_platform",
|
|
|
|
"assigned_to", "bug_status", "resolution",
|
|
|
|
"short_short_desc");
|
1998-09-15 21:49:26 +00:00
|
|
|
|
|
|
|
sub AppendComment {
|
2002-10-13 04:26:24 +00:00
|
|
|
my ($bugid, $who, $comment, $isprivate, $timestamp, $work_time) = @_;
|
|
|
|
$work_time ||= 0;
|
2002-09-28 18:42:54 +00:00
|
|
|
|
|
|
|
# Use the date/time we were given if possible (allowing calling code
|
|
|
|
# to synchronize the comment's timestamp with those of other records).
|
|
|
|
$timestamp = ($timestamp ? SqlQuote($timestamp) : "NOW()");
|
|
|
|
|
1999-04-21 17:45:22 +00:00
|
|
|
$comment =~ s/\r\n/\n/g; # Get rid of windows-style line endings.
|
|
|
|
$comment =~ s/\r/\n/g; # Get rid of mac-style line endings.
|
2002-10-13 04:26:24 +00:00
|
|
|
|
|
|
|
# allowing negatives though so people can back out errors in time reporting
|
|
|
|
if (defined $work_time) {
|
|
|
|
# regexp verifies one or more digits, optionally followed by a period and
|
|
|
|
# zero or more digits, OR we have a period followed by one or more digits
|
|
|
|
if ($work_time !~ /^-?(?:\d+(?:\.\d*)?|\.\d+)$/) {
|
2004-06-19 08:15:26 +00:00
|
|
|
ThrowUserError("need_numeric_value", {}, "abort");
|
2002-10-13 04:26:24 +00:00
|
|
|
}
|
|
|
|
} else { $work_time = 0 };
|
|
|
|
|
|
|
|
if ($comment =~ /^\s*$/) { # Nothin' but whitespace
|
1998-09-15 21:49:26 +00:00
|
|
|
return;
|
|
|
|
}
|
2000-01-20 21:31:22 +00:00
|
|
|
|
|
|
|
my $whoid = DBNameToIdAndCheck($who);
|
2002-08-19 21:17:28 +00:00
|
|
|
my $privacyval = $isprivate ? 1 : 0 ;
|
2002-10-13 04:26:24 +00:00
|
|
|
SendSQL("INSERT INTO longdescs (bug_id, who, bug_when, thetext, isprivate, work_time) " .
|
2002-09-28 18:42:54 +00:00
|
|
|
"VALUES($bugid, $whoid, $timestamp, " . SqlQuote($comment) . ", " .
|
2002-10-13 04:26:24 +00:00
|
|
|
$privacyval . ", " . SqlQuote($work_time) . ")");
|
2000-01-20 21:42:23 +00:00
|
|
|
|
|
|
|
SendSQL("UPDATE bugs SET delta_ts = now() WHERE bug_id = $bugid");
|
1998-09-15 21:49:26 +00:00
|
|
|
}
|
|
|
|
|
2000-01-22 04:24:42 +00:00
|
|
|
sub GetFieldID {
|
|
|
|
my ($f) = (@_);
|
|
|
|
SendSQL("SELECT fieldid FROM fielddefs WHERE name = " . SqlQuote($f));
|
|
|
|
my $fieldid = FetchOneColumn();
|
2002-08-10 07:34:17 +00:00
|
|
|
die "Unknown field id: $f" if !$fieldid;
|
2000-01-22 04:24:42 +00:00
|
|
|
return $fieldid;
|
|
|
|
}
|
1998-09-15 21:49:26 +00:00
|
|
|
|
2002-08-29 09:25:54 +00:00
|
|
|
# XXXX - this needs to go away
|
1998-09-15 21:49:26 +00:00
|
|
|
sub GenerateVersionTable {
|
2002-08-12 05:43:05 +00:00
|
|
|
SendSQL("SELECT versions.value, products.name " .
|
|
|
|
"FROM versions, products " .
|
|
|
|
"WHERE products.id = versions.product_id " .
|
|
|
|
"ORDER BY versions.value");
|
1998-09-15 21:49:26 +00:00
|
|
|
my @line;
|
|
|
|
my %varray;
|
|
|
|
my %carray;
|
|
|
|
while (@line = FetchSQLData()) {
|
|
|
|
my ($v,$p1) = (@line);
|
|
|
|
if (!defined $::versions{$p1}) {
|
|
|
|
$::versions{$p1} = [];
|
|
|
|
}
|
|
|
|
push @{$::versions{$p1}}, $v;
|
|
|
|
$varray{$v} = 1;
|
|
|
|
}
|
2002-08-12 05:43:05 +00:00
|
|
|
SendSQL("SELECT components.name, products.name " .
|
|
|
|
"FROM components, products " .
|
|
|
|
"WHERE products.id = components.product_id " .
|
|
|
|
"ORDER BY components.name");
|
1998-09-15 21:49:26 +00:00
|
|
|
while (@line = FetchSQLData()) {
|
|
|
|
my ($c,$p) = (@line);
|
|
|
|
if (!defined $::components{$p}) {
|
|
|
|
$::components{$p} = [];
|
|
|
|
}
|
|
|
|
my $ref = $::components{$p};
|
|
|
|
push @$ref, $c;
|
|
|
|
$carray{$c} = 1;
|
|
|
|
}
|
|
|
|
|
2000-03-24 00:43:40 +00:00
|
|
|
my $dotargetmilestone = 1; # This used to check the param, but there's
|
|
|
|
# enough code that wants to pretend we're using
|
|
|
|
# target milestones, even if they don't get
|
|
|
|
# shown to the user. So we cache all the data
|
|
|
|
# about them anyway.
|
1999-02-03 02:46:51 +00:00
|
|
|
|
|
|
|
my $mpart = $dotargetmilestone ? ", milestoneurl" : "";
|
2002-08-12 05:43:05 +00:00
|
|
|
SendSQL("select name, description, votesperuser, disallownew$mpart from products ORDER BY name");
|
1998-10-06 20:23:40 +00:00
|
|
|
while (@line = FetchSQLData()) {
|
1999-10-07 23:54:52 +00:00
|
|
|
my ($p, $d, $votesperuser, $dis, $u) = (@line);
|
1998-10-06 20:23:40 +00:00
|
|
|
$::proddesc{$p} = $d;
|
2003-11-06 21:55:25 +00:00
|
|
|
if (!$dis && scalar($::components{$p})) {
|
2002-02-14 01:25:25 +00:00
|
|
|
push @::enterable_products, $p;
|
1999-03-03 18:16:24 +00:00
|
|
|
}
|
1999-02-03 02:46:51 +00:00
|
|
|
if ($dotargetmilestone) {
|
|
|
|
$::milestoneurl{$p} = $u;
|
|
|
|
}
|
1999-10-07 23:54:52 +00:00
|
|
|
$::prodmaxvotes{$p} = $votesperuser;
|
1998-10-06 20:23:40 +00:00
|
|
|
}
|
|
|
|
|
1998-09-15 21:49:26 +00:00
|
|
|
my $cols = LearnAboutColumns("bugs");
|
|
|
|
|
|
|
|
@::log_columns = @{$cols->{"-list-"}};
|
2000-01-22 04:24:42 +00:00
|
|
|
foreach my $i ("bug_id", "creation_ts", "delta_ts", "lastdiffed") {
|
1998-09-15 21:49:26 +00:00
|
|
|
my $w = lsearch(\@::log_columns, $i);
|
|
|
|
if ($w >= 0) {
|
|
|
|
splice(@::log_columns, $w, 1);
|
|
|
|
}
|
|
|
|
}
|
1999-03-23 22:32:21 +00:00
|
|
|
@::log_columns = (sort(@::log_columns));
|
1998-09-15 21:49:26 +00:00
|
|
|
|
|
|
|
@::legal_priority = SplitEnumType($cols->{"priority,type"});
|
|
|
|
@::legal_severity = SplitEnumType($cols->{"bug_severity,type"});
|
|
|
|
@::legal_platform = SplitEnumType($cols->{"rep_platform,type"});
|
1998-12-03 16:10:52 +00:00
|
|
|
@::legal_opsys = SplitEnumType($cols->{"op_sys,type"});
|
1998-09-15 21:49:26 +00:00
|
|
|
@::legal_bug_status = SplitEnumType($cols->{"bug_status,type"});
|
|
|
|
@::legal_resolution = SplitEnumType($cols->{"resolution,type"});
|
2000-07-14 03:20:17 +00:00
|
|
|
|
|
|
|
# 'settable_resolution' is the list of resolutions that may be set
|
|
|
|
# directly by hand in the bug form. Start with the list of legal
|
|
|
|
# resolutions and remove 'MOVED' and 'DUPLICATE' because setting
|
|
|
|
# bugs to those resolutions requires a special process.
|
|
|
|
#
|
|
|
|
@::settable_resolution = @::legal_resolution;
|
|
|
|
my $w = lsearch(\@::settable_resolution, "DUPLICATE");
|
1998-09-15 21:49:26 +00:00
|
|
|
if ($w >= 0) {
|
2000-07-14 03:20:17 +00:00
|
|
|
splice(@::settable_resolution, $w, 1);
|
|
|
|
}
|
|
|
|
my $z = lsearch(\@::settable_resolution, "MOVED");
|
|
|
|
if ($z >= 0) {
|
|
|
|
splice(@::settable_resolution, $z, 1);
|
1998-09-15 21:49:26 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
my @list = sort { uc($a) cmp uc($b)} keys(%::versions);
|
|
|
|
@::legal_product = @list;
|
|
|
|
|
2003-04-24 21:17:31 +00:00
|
|
|
require File::Temp;
|
|
|
|
my ($fh, $tmpname) = File::Temp::tempfile("versioncache.XXXXX",
|
2003-11-22 03:50:42 +00:00
|
|
|
DIR => "$datadir");
|
2003-04-24 21:17:31 +00:00
|
|
|
|
|
|
|
print $fh "#\n";
|
|
|
|
print $fh "# DO NOT EDIT!\n";
|
|
|
|
print $fh "# This file is automatically generated at least once every\n";
|
|
|
|
print $fh "# hour by the GenerateVersionTable() sub in globals.pl.\n";
|
|
|
|
print $fh "# Any changes you make will be overwritten.\n";
|
|
|
|
print $fh "#\n";
|
2001-10-19 23:49:37 +00:00
|
|
|
|
2002-10-16 10:49:56 +00:00
|
|
|
require Data::Dumper;
|
2003-04-25 00:47:17 +00:00
|
|
|
print $fh (Data::Dumper->Dump([\@::log_columns, \%::versions],
|
|
|
|
['*::log_columns', '*::versions']));
|
1998-09-15 21:49:26 +00:00
|
|
|
|
|
|
|
foreach my $i (@list) {
|
|
|
|
if (!defined $::components{$i}) {
|
2001-07-01 02:00:56 +00:00
|
|
|
$::components{$i} = [];
|
1998-09-15 21:49:26 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
@::legal_versions = sort {uc($a) cmp uc($b)} keys(%varray);
|
2003-04-25 00:47:17 +00:00
|
|
|
print $fh (Data::Dumper->Dump([\@::legal_versions, \%::components],
|
|
|
|
['*::legal_versions', '*::components']));
|
1998-09-15 21:49:26 +00:00
|
|
|
@::legal_components = sort {uc($a) cmp uc($b)} keys(%carray);
|
2002-08-29 09:25:54 +00:00
|
|
|
|
2003-04-25 00:47:17 +00:00
|
|
|
print $fh (Data::Dumper->Dump([\@::legal_components, \@::legal_product,
|
|
|
|
\@::legal_priority, \@::legal_severity,
|
|
|
|
\@::legal_platform, \@::legal_opsys,
|
|
|
|
\@::legal_bug_status, \@::legal_resolution],
|
|
|
|
['*::legal_components', '*::legal_product',
|
|
|
|
'*::legal_priority', '*::legal_severity',
|
|
|
|
'*::legal_platform', '*::legal_opsys',
|
|
|
|
'*::legal_bug_status', '*::legal_resolution']));
|
2002-08-29 09:25:54 +00:00
|
|
|
|
2003-04-25 00:47:17 +00:00
|
|
|
print $fh (Data::Dumper->Dump([\@::settable_resolution, \%::proddesc,
|
|
|
|
\@::enterable_products, \%::prodmaxvotes],
|
|
|
|
['*::settable_resolution', '*::proddesc',
|
|
|
|
'*::enterable_products', '*::prodmaxvotes']));
|
1998-09-15 21:49:26 +00:00
|
|
|
|
1999-02-03 02:46:51 +00:00
|
|
|
if ($dotargetmilestone) {
|
2000-03-21 16:47:06 +00:00
|
|
|
# reading target milestones in from the database - matthew@zeroknowledge.com
|
2002-08-12 05:43:05 +00:00
|
|
|
SendSQL("SELECT milestones.value, products.name " .
|
|
|
|
"FROM milestones, products " .
|
|
|
|
"WHERE products.id = milestones.product_id " .
|
|
|
|
"ORDER BY milestones.sortkey, milestones.value");
|
2000-03-21 16:47:06 +00:00
|
|
|
my @line;
|
|
|
|
my %tmarray;
|
|
|
|
@::legal_target_milestone = ();
|
|
|
|
while(@line = FetchSQLData()) {
|
|
|
|
my ($tm, $pr) = (@line);
|
|
|
|
if (!defined $::target_milestone{$pr}) {
|
|
|
|
$::target_milestone{$pr} = [];
|
|
|
|
}
|
|
|
|
push @{$::target_milestone{$pr}}, $tm;
|
|
|
|
if (!exists $tmarray{$tm}) {
|
|
|
|
$tmarray{$tm} = 1;
|
|
|
|
push(@::legal_target_milestone, $tm);
|
|
|
|
}
|
1999-01-27 21:17:10 +00:00
|
|
|
}
|
2000-03-21 16:47:06 +00:00
|
|
|
|
2003-04-25 00:47:17 +00:00
|
|
|
print $fh (Data::Dumper->Dump([\%::target_milestone,
|
|
|
|
\@::legal_target_milestone,
|
|
|
|
\%::milestoneurl],
|
|
|
|
['*::target_milestone',
|
|
|
|
'*::legal_target_milestone',
|
|
|
|
'*::milestoneurl']));
|
1999-01-27 21:17:10 +00:00
|
|
|
}
|
2000-01-06 21:16:15 +00:00
|
|
|
|
|
|
|
SendSQL("SELECT id, name FROM keyworddefs ORDER BY name");
|
|
|
|
while (MoreSQLData()) {
|
|
|
|
my ($id, $name) = FetchSQLData();
|
2000-07-14 15:31:43 +00:00
|
|
|
push(@::legal_keywords, $name);
|
2000-07-13 20:04:15 +00:00
|
|
|
$name = lc($name);
|
2000-01-06 21:16:15 +00:00
|
|
|
$::keywordsbyname{$name} = $id;
|
|
|
|
}
|
2002-08-29 09:25:54 +00:00
|
|
|
|
2003-04-25 00:47:17 +00:00
|
|
|
print $fh (Data::Dumper->Dump([\@::legal_keywords, \%::keywordsbyname],
|
|
|
|
['*::legal_keywords', '*::keywordsbyname']));
|
2000-01-06 21:16:15 +00:00
|
|
|
|
2003-04-24 21:17:31 +00:00
|
|
|
print $fh "1;\n";
|
|
|
|
close $fh;
|
2002-08-29 09:25:54 +00:00
|
|
|
|
2003-11-22 03:50:42 +00:00
|
|
|
rename $tmpname, "$datadir/versioncache" || die "Can't rename $tmpname to versioncache";
|
|
|
|
ChmodDataFile("$datadir/versioncache", 0666);
|
1998-09-15 21:49:26 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2000-07-13 20:04:15 +00:00
|
|
|
sub GetKeywordIdFromName {
|
|
|
|
my ($name) = (@_);
|
|
|
|
$name = lc($name);
|
|
|
|
return $::keywordsbyname{$name};
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
1998-09-15 21:49:26 +00:00
|
|
|
|
|
|
|
# Returns the modification time of a file.
|
|
|
|
|
|
|
|
sub ModTime {
|
|
|
|
my ($filename) = (@_);
|
|
|
|
my ($dev,$ino,$mode,$nlink,$uid,$gid,$rdev,$size,
|
|
|
|
$atime,$mtime,$ctime,$blksize,$blocks)
|
|
|
|
= stat($filename);
|
|
|
|
return $mtime;
|
|
|
|
}
|
|
|
|
|
2001-06-07 21:26:49 +00:00
|
|
|
$::VersionTableLoaded = 0;
|
1998-09-15 21:49:26 +00:00
|
|
|
sub GetVersionTable {
|
2001-06-07 21:26:49 +00:00
|
|
|
return if $::VersionTableLoaded;
|
2003-11-22 03:50:42 +00:00
|
|
|
my $mtime = ModTime("$datadir/versioncache");
|
|
|
|
if (!defined $mtime || $mtime eq "" || !-r "$datadir/versioncache") {
|
1998-09-15 21:49:26 +00:00
|
|
|
$mtime = 0;
|
|
|
|
}
|
|
|
|
if (time() - $mtime > 3600) {
|
2004-03-18 03:57:05 +00:00
|
|
|
use Bugzilla::Token;
|
|
|
|
Bugzilla::Token::CleanTokenTable() if Bugzilla->dbwritesallowed;
|
1998-09-15 21:49:26 +00:00
|
|
|
GenerateVersionTable();
|
|
|
|
}
|
2003-11-22 03:50:42 +00:00
|
|
|
require "$datadir/versioncache";
|
1998-09-15 21:49:26 +00:00
|
|
|
if (!defined %::versions) {
|
|
|
|
GenerateVersionTable();
|
2003-11-22 03:50:42 +00:00
|
|
|
do "$datadir/versioncache";
|
1998-09-15 21:49:26 +00:00
|
|
|
|
|
|
|
if (!defined %::versions) {
|
2003-11-22 03:50:42 +00:00
|
|
|
die "Can't generate file $datadir/versioncache";
|
1998-09-15 21:49:26 +00:00
|
|
|
}
|
|
|
|
}
|
2001-06-07 21:26:49 +00:00
|
|
|
$::VersionTableLoaded = 1;
|
1998-09-15 21:49:26 +00:00
|
|
|
}
|
|
|
|
|
2002-04-01 22:52:40 +00:00
|
|
|
# Validates a given username as a new username
|
|
|
|
# returns 1 if valid, 0 if invalid
|
|
|
|
sub ValidateNewUser {
|
|
|
|
my ($username, $old_username) = @_;
|
|
|
|
|
|
|
|
if(DBname_to_id($username) != 0) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2002-08-30 15:24:12 +00:00
|
|
|
my $sqluname = SqlQuote($username);
|
|
|
|
|
2002-04-01 22:52:40 +00:00
|
|
|
# Reject if the new login is part of an email change which is
|
|
|
|
# still in progress
|
2002-08-30 15:24:12 +00:00
|
|
|
#
|
|
|
|
# substring/locate stuff: bug 165221; this used to use regexes, but that
|
|
|
|
# was unsafe and required weird escaping; using substring to pull out
|
|
|
|
# the new/old email addresses and locate() to find the delimeter (':')
|
|
|
|
# is cleaner/safer
|
2002-04-01 22:52:40 +00:00
|
|
|
SendSQL("SELECT eventdata FROM tokens WHERE tokentype = 'emailold'
|
2002-08-30 15:24:12 +00:00
|
|
|
AND SUBSTRING(eventdata, 1, (LOCATE(':', eventdata) - 1)) = $sqluname
|
|
|
|
OR SUBSTRING(eventdata, (LOCATE(':', eventdata) + 1)) = $sqluname");
|
|
|
|
|
2002-04-01 22:52:40 +00:00
|
|
|
if (my ($eventdata) = FetchSQLData()) {
|
|
|
|
# Allow thru owner of token
|
|
|
|
if($old_username && ($eventdata eq "$old_username:$username")) {
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
1998-09-15 21:49:26 +00:00
|
|
|
sub InsertNewUser {
|
1999-08-19 00:06:01 +00:00
|
|
|
my ($username, $realname) = (@_);
|
2000-12-22 23:01:30 +00:00
|
|
|
|
2001-07-11 05:29:21 +00:00
|
|
|
# Generate a new random password for the user.
|
|
|
|
my $password = GenerateRandomPassword();
|
|
|
|
my $cryptpassword = Crypt($password);
|
|
|
|
|
|
|
|
|
|
|
|
# Insert the new user record into the database.
|
1999-08-19 00:06:01 +00:00
|
|
|
$username = SqlQuote($username);
|
|
|
|
$realname = SqlQuote($realname);
|
2001-07-11 05:29:21 +00:00
|
|
|
$cryptpassword = SqlQuote($cryptpassword);
|
2002-09-22 17:15:13 +00:00
|
|
|
PushGlobalSQLState();
|
|
|
|
SendSQL("INSERT INTO profiles (login_name, realname, cryptpassword)
|
|
|
|
VALUES ($username, $realname, $cryptpassword)");
|
2001-03-19 21:03:52 +00:00
|
|
|
PopGlobalSQLState();
|
2001-07-11 05:29:21 +00:00
|
|
|
|
|
|
|
# Return the password to the calling code so it can be included
|
|
|
|
# in an email sent to the user.
|
|
|
|
return $password;
|
|
|
|
}
|
|
|
|
|
|
|
|
sub GenerateRandomPassword {
|
2004-04-22 21:15:28 +00:00
|
|
|
my $size = (shift or 10); # default to 10 chars if nothing specified
|
|
|
|
return join("", map{ ('0'..'9','a'..'z','A'..'Z')[rand 62] } (1..$size));
|
1998-09-15 21:49:26 +00:00
|
|
|
}
|
|
|
|
|
2002-11-24 19:56:34 +00:00
|
|
|
#
|
|
|
|
# This function checks if there are any entry groups defined.
|
|
|
|
# If called with no arguments, it identifies
|
|
|
|
# entry groups for all products. If called with a product
|
|
|
|
# id argument, it checks for entry groups associated with
|
|
|
|
# one particular product.
|
|
|
|
sub AnyEntryGroups {
|
|
|
|
my $product_id = shift;
|
|
|
|
$product_id = 0 unless ($product_id);
|
|
|
|
return $::CachedAnyEntryGroups{$product_id}
|
|
|
|
if defined($::CachedAnyEntryGroups{$product_id});
|
|
|
|
PushGlobalSQLState();
|
|
|
|
my $query = "SELECT 1 FROM group_control_map WHERE entry != 0";
|
|
|
|
$query .= " AND product_id = $product_id" if ($product_id);
|
|
|
|
$query .= " LIMIT 1";
|
|
|
|
SendSQL($query);
|
2003-01-23 07:43:06 +00:00
|
|
|
if (MoreSQLData()) {
|
|
|
|
$::CachedAnyEntryGroups{$product_id} = MoreSQLData();
|
|
|
|
FetchSQLData();
|
|
|
|
PopGlobalSQLState();
|
|
|
|
return $::CachedAnyEntryGroups{$product_id};
|
|
|
|
} else {
|
|
|
|
return undef;
|
|
|
|
}
|
2002-11-24 19:56:34 +00:00
|
|
|
}
|
|
|
|
#
|
|
|
|
# This function checks if there are any default groups defined.
|
|
|
|
# If so, then groups may have to be changed when bugs move from
|
|
|
|
# one bug to another.
|
|
|
|
sub AnyDefaultGroups {
|
|
|
|
return $::CachedAnyDefaultGroups if defined($::CachedAnyDefaultGroups);
|
|
|
|
PushGlobalSQLState();
|
|
|
|
SendSQL("SELECT 1 FROM group_control_map, groups WHERE " .
|
|
|
|
"groups.id = group_control_map.group_id " .
|
|
|
|
"AND isactive != 0 AND " .
|
|
|
|
"(membercontrol = " . CONTROLMAPDEFAULT .
|
|
|
|
" OR othercontrol = " . CONTROLMAPDEFAULT .
|
|
|
|
") LIMIT 1");
|
|
|
|
$::CachedAnyDefaultGroups = MoreSQLData();
|
|
|
|
FetchSQLData();
|
|
|
|
PopGlobalSQLState();
|
|
|
|
return $::CachedAnyDefaultGroups;
|
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# This function checks if, given a product id, the user can edit
|
|
|
|
# bugs in this product at all.
|
|
|
|
sub CanEditProductId {
|
|
|
|
my ($productid) = @_;
|
|
|
|
my $query = "SELECT group_id FROM group_control_map " .
|
|
|
|
"WHERE product_id = $productid " .
|
|
|
|
"AND canedit != 0 ";
|
2003-06-03 09:48:15 +00:00
|
|
|
if (defined Bugzilla->user && %{Bugzilla->user->groups}) {
|
2002-11-24 19:56:34 +00:00
|
|
|
$query .= "AND group_id NOT IN(" .
|
2003-06-03 09:48:15 +00:00
|
|
|
join(',', values(%{Bugzilla->user->groups})) . ") ";
|
2002-11-24 19:56:34 +00:00
|
|
|
}
|
|
|
|
$query .= "LIMIT 1";
|
|
|
|
PushGlobalSQLState();
|
|
|
|
SendSQL($query);
|
|
|
|
my ($result) = FetchSQLData();
|
|
|
|
PopGlobalSQLState();
|
|
|
|
return (!defined($result));
|
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# This function determines if a user can enter bugs in the named
|
|
|
|
# product.
|
|
|
|
sub CanEnterProduct {
|
|
|
|
my ($productname) = @_;
|
|
|
|
my $query = "SELECT group_id IS NULL " .
|
|
|
|
"FROM products " .
|
|
|
|
"LEFT JOIN group_control_map " .
|
|
|
|
"ON group_control_map.product_id = products.id " .
|
|
|
|
"AND group_control_map.entry != 0 ";
|
2003-06-03 09:48:15 +00:00
|
|
|
if (defined Bugzilla->user && %{Bugzilla->user->groups}) {
|
2002-11-24 19:56:34 +00:00
|
|
|
$query .= "AND group_id NOT IN(" .
|
2003-06-03 09:48:15 +00:00
|
|
|
join(',', values(%{Bugzilla->user->groups})) . ") ";
|
2002-11-24 19:56:34 +00:00
|
|
|
}
|
|
|
|
$query .= "WHERE products.name = " . SqlQuote($productname) . " LIMIT 1";
|
|
|
|
PushGlobalSQLState();
|
|
|
|
SendSQL($query);
|
|
|
|
my ($ret) = FetchSQLData();
|
|
|
|
PopGlobalSQLState();
|
|
|
|
return ($ret);
|
|
|
|
}
|
|
|
|
|
2004-07-10 07:44:12 +00:00
|
|
|
sub GetEnterableProducts {
|
|
|
|
my @products;
|
|
|
|
# XXX rewrite into pure SQL instead of relying on legal_products?
|
|
|
|
foreach my $p (@::legal_product) {
|
|
|
|
if (CanEnterProduct($p)) {
|
|
|
|
push @products, $p;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return (@products);
|
|
|
|
}
|
|
|
|
|
2002-11-24 19:56:34 +00:00
|
|
|
#
|
|
|
|
# This function returns an alphabetical list of product names to which
|
2003-04-25 05:41:29 +00:00
|
|
|
# the user can enter bugs. If the $by_id parameter is true, also retrieves IDs
|
|
|
|
# and pushes them onto the list as id, name [, id, name...] for easy slurping
|
|
|
|
# into a hash by the calling code.
|
2002-12-10 14:17:05 +00:00
|
|
|
sub GetSelectableProducts {
|
2003-04-25 05:41:29 +00:00
|
|
|
my ($by_id) = @_;
|
|
|
|
|
|
|
|
my $extra_sql = $by_id ? "id, " : "";
|
|
|
|
|
|
|
|
my $query = "SELECT $extra_sql name " .
|
2002-11-24 19:56:34 +00:00
|
|
|
"FROM products " .
|
|
|
|
"LEFT JOIN group_control_map " .
|
2002-12-10 14:17:05 +00:00
|
|
|
"ON group_control_map.product_id = products.id ";
|
|
|
|
if (Param('useentrygroupdefault')) {
|
|
|
|
$query .= "AND group_control_map.entry != 0 ";
|
|
|
|
} else {
|
|
|
|
$query .= "AND group_control_map.membercontrol = " .
|
|
|
|
CONTROLMAPMANDATORY . " ";
|
|
|
|
}
|
2003-06-03 09:48:15 +00:00
|
|
|
if (defined Bugzilla->user && %{Bugzilla->user->groups}) {
|
2002-11-24 19:56:34 +00:00
|
|
|
$query .= "AND group_id NOT IN(" .
|
2003-06-03 09:48:15 +00:00
|
|
|
join(',', values(%{Bugzilla->user->groups})) . ") ";
|
2002-11-24 19:56:34 +00:00
|
|
|
}
|
|
|
|
$query .= "WHERE group_id IS NULL ORDER BY name";
|
|
|
|
PushGlobalSQLState();
|
|
|
|
SendSQL($query);
|
|
|
|
my @products = ();
|
2003-04-25 05:41:29 +00:00
|
|
|
push(@products, FetchSQLData()) while MoreSQLData();
|
2002-11-24 19:56:34 +00:00
|
|
|
PopGlobalSQLState();
|
|
|
|
return (@products);
|
|
|
|
}
|
|
|
|
|
2002-12-10 14:17:05 +00:00
|
|
|
# GetSelectableProductHash
|
2002-11-25 05:38:09 +00:00
|
|
|
# returns a hash containing
|
|
|
|
# legal_products => an enterable product list
|
2003-04-25 05:41:29 +00:00
|
|
|
# legal_(components|versions|milestones) =>
|
|
|
|
# the list of components, versions, and milestones of enterable products
|
|
|
|
# (components|versions|milestones)_by_product
|
|
|
|
# => a hash of component lists for each enterable product
|
|
|
|
# Milestones only get returned if the usetargetmilestones parameter is set.
|
2002-12-10 14:17:05 +00:00
|
|
|
sub GetSelectableProductHash {
|
2003-04-25 05:41:29 +00:00
|
|
|
# The hash of selectable products and their attributes that gets returned
|
|
|
|
# at the end of this function.
|
|
|
|
my $selectables = {};
|
|
|
|
|
|
|
|
my %products = GetSelectableProducts(1);
|
|
|
|
|
|
|
|
$selectables->{legal_products} = [sort values %products];
|
|
|
|
|
|
|
|
# Run queries that retrieve the list of components, versions,
|
|
|
|
# and target milestones (if used) for the selectable products.
|
|
|
|
my @tables = qw(components versions);
|
|
|
|
push(@tables, 'milestones') if Param('usetargetmilestone');
|
|
|
|
|
2002-11-25 05:38:09 +00:00
|
|
|
PushGlobalSQLState();
|
2003-04-25 05:41:29 +00:00
|
|
|
foreach my $table (@tables) {
|
|
|
|
# Why oh why can't we standardize on these names?!?
|
|
|
|
my $fld = ($table eq "components" ? "name" : "value");
|
|
|
|
|
|
|
|
my $query = "SELECT $fld, product_id FROM $table WHERE product_id IN " .
|
|
|
|
"(" . join(",", keys %products) . ") ORDER BY $fld";
|
|
|
|
SendSQL($query);
|
|
|
|
|
|
|
|
my %values;
|
|
|
|
my %values_by_product;
|
|
|
|
|
|
|
|
while (MoreSQLData()) {
|
|
|
|
my ($name, $product_id) = FetchSQLData();
|
|
|
|
next unless $name;
|
|
|
|
$values{$name} = 1;
|
|
|
|
push @{$values_by_product{$products{$product_id}}}, $name;
|
2002-11-25 05:38:09 +00:00
|
|
|
}
|
2003-04-25 05:41:29 +00:00
|
|
|
|
|
|
|
$selectables->{"legal_$table"} = [sort keys %values];
|
|
|
|
$selectables->{"${table}_by_product"} = \%values_by_product;
|
2002-11-25 05:38:09 +00:00
|
|
|
}
|
|
|
|
PopGlobalSQLState();
|
2003-04-25 05:41:29 +00:00
|
|
|
|
|
|
|
return $selectables;
|
2002-11-25 05:38:09 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-06-23 18:01:39 +00:00
|
|
|
sub GetFieldDefs {
|
|
|
|
my $extra = "";
|
|
|
|
if (!UserInGroup(Param('timetrackinggroup'))) {
|
|
|
|
$extra = "WHERE name NOT IN ('estimated time', 'remaining_time', " .
|
|
|
|
"'work_time', 'percentage_complete')";
|
|
|
|
}
|
|
|
|
|
|
|
|
my @fields;
|
|
|
|
PushGlobalSQLState();
|
|
|
|
SendSQL("SELECT name, description FROM fielddefs $extra ORDER BY sortkey");
|
|
|
|
while (MoreSQLData()) {
|
|
|
|
my ($name, $description) = FetchSQLData();
|
|
|
|
push(@fields, { name => $name, description => $description });
|
|
|
|
}
|
|
|
|
PopGlobalSQLState();
|
|
|
|
|
|
|
|
return(@fields);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2001-10-23 15:44:53 +00:00
|
|
|
sub CanSeeBug {
|
|
|
|
|
2002-09-22 17:15:13 +00:00
|
|
|
my ($id, $userid) = @_;
|
2001-10-23 15:44:53 +00:00
|
|
|
|
|
|
|
# Query the database for the bug, retrieving a boolean value that
|
|
|
|
# represents whether or not the user is authorized to access the bug.
|
|
|
|
|
2002-09-22 17:15:13 +00:00
|
|
|
# if no groups are found --> user is permitted to access
|
|
|
|
# if no user is found for any group --> user is not permitted to access
|
|
|
|
my $query = "SELECT bugs.bug_id, reporter, assigned_to, qa_contact," .
|
|
|
|
" reporter_accessible, cclist_accessible," .
|
|
|
|
" cc.who IS NOT NULL," .
|
2002-10-02 03:06:06 +00:00
|
|
|
" COUNT(DISTINCT(bug_group_map.group_id)) as cntbugingroups," .
|
2002-09-22 17:15:13 +00:00
|
|
|
" COUNT(DISTINCT(user_group_map.group_id)) as cntuseringroups" .
|
|
|
|
" FROM bugs" .
|
|
|
|
" LEFT JOIN cc ON bugs.bug_id = cc.bug_id" .
|
|
|
|
" AND cc.who = $userid" .
|
|
|
|
" LEFT JOIN bug_group_map ON bugs.bug_id = bug_group_map.bug_id" .
|
|
|
|
" LEFT JOIN user_group_map ON" .
|
|
|
|
" user_group_map.group_id = bug_group_map.group_id" .
|
|
|
|
" AND user_group_map.isbless = 0" .
|
|
|
|
" AND user_group_map.user_id = $userid" .
|
|
|
|
" WHERE bugs.bug_id = $id GROUP BY bugs.bug_id";
|
2001-10-23 15:44:53 +00:00
|
|
|
PushGlobalSQLState();
|
2002-09-22 17:15:13 +00:00
|
|
|
SendSQL($query);
|
|
|
|
my ($found_id, $reporter, $assigned_to, $qa_contact,
|
|
|
|
$rep_access, $cc_access,
|
|
|
|
$found_cc, $found_groups, $found_members)
|
|
|
|
= FetchSQLData();
|
2001-10-23 15:44:53 +00:00
|
|
|
PopGlobalSQLState();
|
2002-09-22 17:15:13 +00:00
|
|
|
return (
|
|
|
|
($found_groups == 0)
|
|
|
|
|| (($userid > 0) &&
|
|
|
|
(
|
|
|
|
($assigned_to == $userid)
|
2003-02-23 07:31:09 +00:00
|
|
|
|| (Param('useqacontact') && $qa_contact == $userid)
|
2002-09-22 17:15:13 +00:00
|
|
|
|| (($reporter == $userid) && $rep_access)
|
|
|
|
|| ($found_cc && $cc_access)
|
|
|
|
|| ($found_groups == $found_members)
|
|
|
|
))
|
|
|
|
);
|
2001-10-23 15:44:53 +00:00
|
|
|
}
|
2001-07-11 05:29:21 +00:00
|
|
|
|
|
|
|
sub ValidatePassword {
|
|
|
|
# Determines whether or not a password is valid (i.e. meets Bugzilla's
|
2002-10-06 11:52:37 +00:00
|
|
|
# requirements for length and content).
|
2001-07-11 05:29:21 +00:00
|
|
|
# If a second password is passed in, this function also verifies that
|
|
|
|
# the two passwords match.
|
|
|
|
my ($password, $matchpassword) = @_;
|
|
|
|
|
2002-10-06 11:52:37 +00:00
|
|
|
if (length($password) < 3) {
|
|
|
|
ThrowUserError("password_too_short");
|
|
|
|
} elsif (length($password) > 16) {
|
|
|
|
ThrowUserError("password_too_long");
|
2004-03-03 05:19:28 +00:00
|
|
|
} elsif ((defined $matchpassword) && ($password ne $matchpassword)) {
|
2002-10-06 11:52:37 +00:00
|
|
|
ThrowUserError("passwords_dont_match");
|
2001-07-11 05:29:21 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
sub Crypt {
|
|
|
|
# Crypts a password, generating a random salt to do it.
|
|
|
|
# Random salts are generated because the alternative is usually
|
|
|
|
# to use the first two characters of the password itself, and since
|
|
|
|
# the salt appears in plaintext at the beginning of the crypted
|
|
|
|
# password string this has the effect of revealing the first two
|
|
|
|
# characters of the password to anyone who views the crypted version.
|
|
|
|
|
|
|
|
my ($password) = @_;
|
|
|
|
|
|
|
|
# The list of characters that can appear in a salt. Salts and hashes
|
|
|
|
# are both encoded as a sequence of characters from a set containing
|
|
|
|
# 64 characters, each one of which represents 6 bits of the salt/hash.
|
|
|
|
# The encoding is similar to BASE64, the difference being that the
|
|
|
|
# BASE64 plus sign (+) is replaced with a forward slash (/).
|
|
|
|
my @saltchars = (0..9, 'A'..'Z', 'a'..'z', '.', '/');
|
|
|
|
|
|
|
|
# Generate the salt. We use an 8 character (48 bit) salt for maximum
|
|
|
|
# security on systems whose crypt uses MD5. Systems with older
|
|
|
|
# versions of crypt will just use the first two characters of the salt.
|
|
|
|
my $salt = '';
|
|
|
|
for ( my $i=0 ; $i < 8 ; ++$i ) {
|
|
|
|
$salt .= $saltchars[rand(64)];
|
|
|
|
}
|
|
|
|
|
|
|
|
# Crypt the password.
|
|
|
|
my $cryptedpassword = crypt($password, $salt);
|
|
|
|
|
|
|
|
# Return the crypted password.
|
|
|
|
return $cryptedpassword;
|
|
|
|
}
|
|
|
|
|
2000-04-26 01:44:28 +00:00
|
|
|
sub DBID_to_real_or_loginname {
|
2000-04-21 18:45:55 +00:00
|
|
|
my ($id) = (@_);
|
2001-03-19 21:03:52 +00:00
|
|
|
PushGlobalSQLState();
|
2000-04-26 01:44:28 +00:00
|
|
|
SendSQL("SELECT login_name,realname FROM profiles WHERE userid = $id");
|
|
|
|
my ($l, $r) = FetchSQLData();
|
2001-03-19 21:03:52 +00:00
|
|
|
PopGlobalSQLState();
|
2000-05-08 18:23:55 +00:00
|
|
|
if (!defined $r || $r eq "") {
|
2000-04-26 01:44:28 +00:00
|
|
|
return $l;
|
2000-04-21 18:45:55 +00:00
|
|
|
} else {
|
2000-04-26 01:44:28 +00:00
|
|
|
return "$l ($r)";
|
2000-04-21 18:45:55 +00:00
|
|
|
}
|
|
|
|
}
|
1998-09-15 21:49:26 +00:00
|
|
|
|
|
|
|
sub DBID_to_name {
|
|
|
|
my ($id) = (@_);
|
2001-07-04 04:41:27 +00:00
|
|
|
# $id should always be a positive integer
|
|
|
|
if ($id =~ m/^([1-9][0-9]*)$/) {
|
|
|
|
$id = $1;
|
|
|
|
} else {
|
|
|
|
$::cachedNameArray{$id} = "__UNKNOWN__";
|
|
|
|
}
|
1998-09-15 21:49:26 +00:00
|
|
|
if (!defined $::cachedNameArray{$id}) {
|
2001-03-19 21:03:52 +00:00
|
|
|
PushGlobalSQLState();
|
1998-09-15 21:49:26 +00:00
|
|
|
SendSQL("select login_name from profiles where userid = $id");
|
|
|
|
my $r = FetchOneColumn();
|
2001-03-19 21:03:52 +00:00
|
|
|
PopGlobalSQLState();
|
2000-05-08 18:23:55 +00:00
|
|
|
if (!defined $r || $r eq "") {
|
1998-09-15 21:49:26 +00:00
|
|
|
$r = "__UNKNOWN__";
|
|
|
|
}
|
|
|
|
$::cachedNameArray{$id} = $r;
|
|
|
|
}
|
|
|
|
return $::cachedNameArray{$id};
|
|
|
|
}
|
|
|
|
|
|
|
|
sub DBname_to_id {
|
|
|
|
my ($name) = (@_);
|
2001-03-19 21:03:52 +00:00
|
|
|
PushGlobalSQLState();
|
1998-09-15 21:49:26 +00:00
|
|
|
SendSQL("select userid from profiles where login_name = @{[SqlQuote($name)]}");
|
|
|
|
my $r = FetchOneColumn();
|
2001-03-19 21:03:52 +00:00
|
|
|
PopGlobalSQLState();
|
2001-07-04 04:41:27 +00:00
|
|
|
# $r should be a positive integer, this makes Taint mode happy
|
|
|
|
if (defined $r && $r =~ m/^([1-9][0-9]*)$/) {
|
|
|
|
return $1;
|
|
|
|
} else {
|
1998-09-15 21:49:26 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
sub DBNameToIdAndCheck {
|
2002-04-24 21:41:51 +00:00
|
|
|
my ($name) = (@_);
|
1998-09-15 21:49:26 +00:00
|
|
|
my $result = DBname_to_id($name);
|
|
|
|
if ($result > 0) {
|
|
|
|
return $result;
|
|
|
|
}
|
2002-04-24 21:41:51 +00:00
|
|
|
|
2003-04-02 12:35:07 +00:00
|
|
|
ThrowUserError("invalid_username",
|
2004-05-12 04:20:10 +00:00
|
|
|
{ name => $name }, "abort");
|
1998-09-15 21:49:26 +00:00
|
|
|
}
|
|
|
|
|
2002-09-22 17:15:13 +00:00
|
|
|
|
|
|
|
|
|
|
|
|
2002-08-12 05:43:05 +00:00
|
|
|
sub get_product_id {
|
|
|
|
my ($prod) = @_;
|
|
|
|
PushGlobalSQLState();
|
|
|
|
SendSQL("SELECT id FROM products WHERE name = " . SqlQuote($prod));
|
|
|
|
my ($prod_id) = FetchSQLData();
|
|
|
|
PopGlobalSQLState();
|
|
|
|
return $prod_id;
|
|
|
|
}
|
|
|
|
|
|
|
|
sub get_product_name {
|
|
|
|
my ($prod_id) = @_;
|
|
|
|
die "non-numeric prod_id '$prod_id' passed to get_product_name"
|
|
|
|
unless ($prod_id =~ /^\d+$/);
|
|
|
|
PushGlobalSQLState();
|
|
|
|
SendSQL("SELECT name FROM products WHERE id = $prod_id");
|
|
|
|
my ($prod) = FetchSQLData();
|
|
|
|
PopGlobalSQLState();
|
|
|
|
return $prod;
|
|
|
|
}
|
|
|
|
|
|
|
|
sub get_component_id {
|
|
|
|
my ($prod_id, $comp) = @_;
|
2004-02-13 20:24:51 +00:00
|
|
|
return undef unless ($prod_id && ($prod_id =~ /^\d+$/));
|
2002-08-12 05:43:05 +00:00
|
|
|
PushGlobalSQLState();
|
|
|
|
SendSQL("SELECT id FROM components " .
|
|
|
|
"WHERE product_id = $prod_id AND name = " . SqlQuote($comp));
|
|
|
|
my ($comp_id) = FetchSQLData();
|
|
|
|
PopGlobalSQLState();
|
|
|
|
return $comp_id;
|
|
|
|
}
|
|
|
|
|
|
|
|
sub get_component_name {
|
|
|
|
my ($comp_id) = @_;
|
|
|
|
die "non-numeric comp_id '$comp_id' passed to get_component_name"
|
|
|
|
unless ($comp_id =~ /^\d+$/);
|
|
|
|
PushGlobalSQLState();
|
|
|
|
SendSQL("SELECT name FROM components WHERE id = $comp_id");
|
|
|
|
my ($comp) = FetchSQLData();
|
|
|
|
PopGlobalSQLState();
|
|
|
|
return $comp;
|
|
|
|
}
|
|
|
|
|
2000-03-10 18:01:32 +00:00
|
|
|
# This routine quoteUrls contains inspirations from the HTML::FromText CPAN
|
|
|
|
# module by Gareth Rees <garethr@cre.canon.co.uk>. It has been heavily hacked,
|
|
|
|
# all that is really recognizable from the original is bits of the regular
|
|
|
|
# expressions.
|
2002-07-03 02:45:13 +00:00
|
|
|
# This has been rewritten to be faster, mainly by substituting 'as we go'.
|
|
|
|
# If you want to modify this routine, read the comments carefully
|
2000-03-10 18:01:32 +00:00
|
|
|
|
|
|
|
sub quoteUrls {
|
2002-02-19 23:22:24 +00:00
|
|
|
my ($text) = (@_);
|
2000-03-10 18:01:32 +00:00
|
|
|
return $text unless $text;
|
|
|
|
|
2002-07-03 02:45:13 +00:00
|
|
|
# We use /g for speed, but uris can have other things inside them
|
|
|
|
# (http://foo/bug#3 for example). Filtering that out filters valid
|
|
|
|
# bug refs out, so we have to do replacements.
|
|
|
|
# mailto can't contain space or #, so we don't have to bother for that
|
|
|
|
# Do this by escaping \0 to \1\0, and replacing matches with \0\0$count\0\0
|
|
|
|
# \0 is used because its unliklely to occur in the text, so the cost of
|
|
|
|
# doing this should be very small
|
|
|
|
# Also, \0 won't appear in the value_quote'd bug title, so we don't have
|
|
|
|
# to worry about bogus substitutions from there
|
|
|
|
|
|
|
|
# escape the 2nd escape char we're using
|
|
|
|
my $chr1 = chr(1);
|
|
|
|
$text =~ s/\0/$chr1\0/g;
|
|
|
|
|
|
|
|
# However, note that adding the title (for buglinks) can affect things
|
|
|
|
# In particular, attachment matches go before bug titles, so that titles
|
|
|
|
# with 'attachment 1' don't double match.
|
|
|
|
# Dupe checks go afterwards, because that uses ^ and \Z, which won't occur
|
|
|
|
# if it was subsituted as a bug title (since that always involve leading
|
|
|
|
# and trailing text)
|
|
|
|
|
|
|
|
# Because of entities, its easier (and quicker) to do this before escaping
|
2000-03-10 18:01:32 +00:00
|
|
|
|
|
|
|
my @things;
|
2002-07-03 02:45:13 +00:00
|
|
|
my $count = 0;
|
|
|
|
my $tmp;
|
|
|
|
|
|
|
|
# non-mailto protocols
|
2004-01-14 18:07:32 +00:00
|
|
|
my $protocol_re = qr/(afs|cid|ftp|gopher|http|https|irc|mid|news|nntp|prospero|telnet|view-source|wais)/i;
|
2002-07-03 02:45:13 +00:00
|
|
|
|
|
|
|
$text =~ s~\b(${protocol_re}: # The protocol:
|
|
|
|
[^\s<>\"]+ # Any non-whitespace
|
|
|
|
[\w\/]) # so that we end in \w or /
|
|
|
|
~($tmp = html_quote($1)) &&
|
|
|
|
($things[$count++] = "<a href=\"$tmp\">$tmp</a>") &&
|
|
|
|
("\0\0" . ($count-1) . "\0\0")
|
|
|
|
~egox;
|
|
|
|
|
|
|
|
# We have to quote now, otherwise our html is itsself escaped
|
|
|
|
# THIS MEANS THAT A LITERAL ", <, >, ' MUST BE ESCAPED FOR A MATCH
|
|
|
|
|
|
|
|
$text = html_quote($text);
|
|
|
|
|
|
|
|
# mailto:
|
|
|
|
# Use |<nothing> so that $1 is defined regardless
|
|
|
|
$text =~ s~\b(mailto:|)?([\w\.\-\+\=]+\@[\w\-]+(?:\.[\w\-]+)+)\b
|
|
|
|
~<a href=\"mailto:$2\">$1$2</a>~igx;
|
|
|
|
|
2004-05-12 05:08:28 +00:00
|
|
|
# attachment links - handle both cases separately for simplicity
|
2002-07-03 02:45:13 +00:00
|
|
|
$text =~ s~((?:^Created\ an\ |\b)attachment\s*\(id=(\d+)\))
|
2004-05-12 05:08:28 +00:00
|
|
|
~($things[$count++] = GetAttachmentLink($2, $1)) &&
|
|
|
|
("\0\0" . ($count-1) . "\0\0")
|
2003-07-27 01:16:45 +00:00
|
|
|
~egmx;
|
2002-07-03 02:45:13 +00:00
|
|
|
|
|
|
|
$text =~ s~\b(attachment\s*\#?\s*(\d+))
|
2004-05-12 05:08:28 +00:00
|
|
|
~($things[$count++] = GetAttachmentLink($2, $1)) &&
|
|
|
|
("\0\0" . ($count-1) . "\0\0")
|
2004-03-22 06:45:21 +00:00
|
|
|
~egmxi;
|
2002-07-03 02:45:13 +00:00
|
|
|
|
|
|
|
# This handles bug a, comment b type stuff. Because we're using /g
|
|
|
|
# we have to do this in one pattern, and so this is semi-messy.
|
|
|
|
# Also, we can't use $bug_re?$comment_re? because that will match the
|
|
|
|
# empty string
|
|
|
|
my $bug_re = qr/bug\s*\#?\s*(\d+)/i;
|
|
|
|
my $comment_re = qr/comment\s*\#?\s*(\d+)/i;
|
|
|
|
$text =~ s~\b($bug_re(?:\s*,?\s*$comment_re)?|$comment_re)
|
|
|
|
~ # We have several choices. $1 here is the link, and $2-4 are set
|
|
|
|
# depending on which part matched
|
|
|
|
(defined($2) ? GetBugLink($2,$1,$3) :
|
|
|
|
"<a href=\"#c$4\">$1</a>")
|
|
|
|
~egox;
|
|
|
|
|
|
|
|
# Duplicate markers
|
|
|
|
$text =~ s~(?<=^\*\*\*\ This\ bug\ has\ been\ marked\ as\ a\ duplicate\ of\ )
|
|
|
|
(\d+)
|
|
|
|
(?=\ \*\*\*\Z)
|
|
|
|
~GetBugLink($1, $1)
|
|
|
|
~egmx;
|
|
|
|
|
|
|
|
# Now remove the encoding hacks
|
|
|
|
$text =~ s/\0\0(\d+)\0\0/$things[$1]/eg;
|
|
|
|
$text =~ s/$chr1\0/\0/g;
|
2000-03-10 18:01:32 +00:00
|
|
|
|
2001-01-24 22:24:06 +00:00
|
|
|
return $text;
|
|
|
|
}
|
|
|
|
|
2003-07-27 01:16:45 +00:00
|
|
|
# GetAttachmentLink creates a link to an attachment,
|
|
|
|
# including its title.
|
|
|
|
|
|
|
|
sub GetAttachmentLink {
|
|
|
|
my ($attachid, $link_text) = @_;
|
|
|
|
detaint_natural($attachid) ||
|
|
|
|
die "GetAttachmentLink() called with non-integer attachment number";
|
|
|
|
|
|
|
|
# If we've run GetAttachmentLink() for this attachment before,
|
|
|
|
# %::attachlink will contain an anonymous array ref of relevant
|
|
|
|
# values. If not, we need to get the information from the database.
|
|
|
|
if (! defined $::attachlink{$attachid}) {
|
|
|
|
# Make sure any unfetched data from a currently running query
|
|
|
|
# is saved off rather than overwritten
|
|
|
|
PushGlobalSQLState();
|
|
|
|
|
|
|
|
SendSQL("SELECT bug_id, isobsolete, description
|
|
|
|
FROM attachments WHERE attach_id = $attachid");
|
|
|
|
|
|
|
|
if (MoreSQLData()) {
|
|
|
|
my ($bugid, $isobsolete, $desc) = FetchSQLData();
|
|
|
|
my $title = "";
|
|
|
|
my $className = "";
|
|
|
|
if (CanSeeBug($bugid, $::userid)) {
|
|
|
|
$title = $desc;
|
|
|
|
}
|
|
|
|
if ($isobsolete) {
|
|
|
|
$className = "bz_obsolete";
|
|
|
|
}
|
|
|
|
$::attachlink{$attachid} = [value_quote($title), $className];
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
# Even if there's nothing in the database, we want to save a blank
|
|
|
|
# anonymous array in the %::attachlink hash so the query doesn't get
|
|
|
|
# run again next time we're called for this attachment number.
|
|
|
|
$::attachlink{$attachid} = [];
|
|
|
|
}
|
|
|
|
# All done with this sidetrip
|
|
|
|
PopGlobalSQLState();
|
|
|
|
}
|
|
|
|
|
|
|
|
# Now that we know we've got all the information we're gonna get, let's
|
|
|
|
# return the link (which is the whole reason we were called :)
|
|
|
|
my ($title, $className) = @{$::attachlink{$attachid}};
|
2004-07-24 00:20:43 +00:00
|
|
|
# $title will be undefined if the attachment didn't exist in the database.
|
2003-07-27 01:16:45 +00:00
|
|
|
if (defined $title) {
|
2004-07-24 00:20:43 +00:00
|
|
|
my $linkval = "attachment.cgi?id=$attachid";
|
|
|
|
return qq{<a href="$linkval" class="$className" title="$title">$link_text</a> [<a href="$linkval&action=edit">edit</a>]};
|
2003-07-27 01:16:45 +00:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
return qq{$link_text};
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2002-07-03 02:45:13 +00:00
|
|
|
# GetBugLink creates a link to a bug, including its title.
|
2002-09-06 03:59:06 +00:00
|
|
|
# It takes either two or three parameters:
|
2002-07-03 02:45:13 +00:00
|
|
|
# - The bug number
|
|
|
|
# - The link text, to place between the <a>..</a>
|
|
|
|
# - An optional comment number, for linking to a particular
|
|
|
|
# comment in the bug
|
2001-01-24 22:24:06 +00:00
|
|
|
|
|
|
|
sub GetBugLink {
|
2002-07-03 02:45:13 +00:00
|
|
|
my ($bug_num, $link_text, $comment_num) = @_;
|
2004-01-28 22:08:29 +00:00
|
|
|
$bug_num || return "<missing bug number>";
|
|
|
|
detaint_natural($bug_num) || return "<invalid bug number>";
|
2001-11-12 13:43:59 +00:00
|
|
|
|
|
|
|
# If we've run GetBugLink() for this bug number before, %::buglink
|
|
|
|
# will contain an anonymous array ref of relevent values, if not
|
|
|
|
# we need to get the information from the database.
|
|
|
|
if (! defined $::buglink{$bug_num}) {
|
|
|
|
# Make sure any unfetched data from a currently running query
|
|
|
|
# is saved off rather than overwritten
|
|
|
|
PushGlobalSQLState();
|
2001-01-24 22:24:06 +00:00
|
|
|
|
2002-09-22 17:15:13 +00:00
|
|
|
SendSQL("SELECT bugs.bug_status, resolution, short_desc " .
|
2001-11-12 13:43:59 +00:00
|
|
|
"FROM bugs WHERE bugs.bug_id = $bug_num");
|
|
|
|
|
|
|
|
# If the bug exists, save its data off for use later in the sub
|
|
|
|
if (MoreSQLData()) {
|
2002-09-22 17:15:13 +00:00
|
|
|
my ($bug_state, $bug_res, $bug_desc) = FetchSQLData();
|
2001-11-12 13:43:59 +00:00
|
|
|
# Initialize these variables to be "" so that we don't get warnings
|
|
|
|
# if we don't change them below (which is highly likely).
|
|
|
|
my ($pre, $title, $post) = ("", "", "");
|
2000-12-12 03:47:40 +00:00
|
|
|
|
2001-11-12 13:43:59 +00:00
|
|
|
$title = $bug_state;
|
|
|
|
if ($bug_state eq $::unconfirmedstate) {
|
|
|
|
$pre = "<i>";
|
|
|
|
$post = "</i>";
|
|
|
|
}
|
|
|
|
elsif (! IsOpenedState($bug_state)) {
|
2004-03-16 23:53:01 +00:00
|
|
|
$pre = '<span class="bz_closed">';
|
2001-11-12 13:43:59 +00:00
|
|
|
$title .= " $bug_res";
|
2004-03-16 23:53:01 +00:00
|
|
|
$post = '</span>';
|
2001-11-12 13:43:59 +00:00
|
|
|
}
|
2002-09-22 17:15:13 +00:00
|
|
|
if (CanSeeBug($bug_num, $::userid)) {
|
2001-11-12 13:43:59 +00:00
|
|
|
$title .= " - $bug_desc";
|
|
|
|
}
|
|
|
|
$::buglink{$bug_num} = [$pre, value_quote($title), $post];
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
# Even if there's nothing in the database, we want to save a blank
|
|
|
|
# anonymous array in the %::buglink hash so the query doesn't get
|
|
|
|
# run again next time we're called for this bug number.
|
|
|
|
$::buglink{$bug_num} = [];
|
|
|
|
}
|
|
|
|
# All done with this sidetrip
|
|
|
|
PopGlobalSQLState();
|
|
|
|
}
|
2001-01-24 22:24:06 +00:00
|
|
|
|
2001-11-12 13:43:59 +00:00
|
|
|
# Now that we know we've got all the information we're gonna get, let's
|
|
|
|
# return the link (which is the whole reason we were called :)
|
|
|
|
my ($pre, $title, $post) = @{$::buglink{$bug_num}};
|
|
|
|
# $title will be undefined if the bug didn't exist in the database.
|
|
|
|
if (defined $title) {
|
2002-07-03 02:45:13 +00:00
|
|
|
my $linkval = "show_bug.cgi?id=$bug_num";
|
|
|
|
if (defined $comment_num) {
|
|
|
|
$linkval .= "#c$comment_num";
|
|
|
|
}
|
|
|
|
return qq{$pre<a href="$linkval" title="$title">$link_text</a>$post};
|
2001-11-12 13:43:59 +00:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
return qq{$link_text};
|
|
|
|
}
|
2000-03-10 18:01:32 +00:00
|
|
|
}
|
|
|
|
|
2004-03-18 05:55:41 +00:00
|
|
|
# CountOpenDependencies counts the number of open dependent bugs for a
|
|
|
|
# list of bugs and returns a list of bug_id's and their dependency count
|
|
|
|
# It takes one parameter:
|
|
|
|
# - A list of bug numbers whose dependencies are to be checked
|
|
|
|
|
|
|
|
sub CountOpenDependencies {
|
|
|
|
my (@bug_list) = @_;
|
|
|
|
my @dependencies;
|
|
|
|
|
|
|
|
# Make sure any unfetched data from a currently running query
|
|
|
|
# is saved off rather than overwritten
|
|
|
|
PushGlobalSQLState();
|
|
|
|
|
|
|
|
SendSQL("SELECT blocked, count(bug_status) " .
|
|
|
|
"FROM bugs, dependencies " .
|
|
|
|
"WHERE blocked IN (" . (join "," , @bug_list) . ") " .
|
|
|
|
"AND bug_id = dependson " .
|
|
|
|
"AND bug_status IN ('" . (join "','", OpenStates()) . "') " .
|
|
|
|
"GROUP BY blocked ");
|
|
|
|
|
|
|
|
while (MoreSQLData()) {
|
|
|
|
my ($bug_id, $dependencies) = FetchSQLData();
|
|
|
|
push(@dependencies, { bug_id => $bug_id,
|
|
|
|
dependencies => $dependencies });
|
|
|
|
}
|
|
|
|
|
|
|
|
# All done with this sidetrip
|
|
|
|
PopGlobalSQLState();
|
|
|
|
|
|
|
|
return @dependencies;
|
|
|
|
}
|
|
|
|
|
2000-03-10 18:01:32 +00:00
|
|
|
sub GetLongDescriptionAsText {
|
2000-01-22 04:24:42 +00:00
|
|
|
my ($id, $start, $end) = (@_);
|
2000-01-20 21:31:22 +00:00
|
|
|
my $result = "";
|
|
|
|
my $count = 0;
|
2002-08-19 21:17:28 +00:00
|
|
|
my $anyprivate = 0;
|
2003-07-11 16:12:09 +00:00
|
|
|
my ($query) = ("SELECT profiles.login_name, DATE_FORMAT(longdescs.bug_when,'%Y.%m.%d %H:%i'), " .
|
2002-08-19 21:17:28 +00:00
|
|
|
" longdescs.thetext, longdescs.isprivate " .
|
2002-02-19 23:22:24 +00:00
|
|
|
"FROM longdescs, profiles " .
|
|
|
|
"WHERE profiles.userid = longdescs.who " .
|
|
|
|
"AND longdescs.bug_id = $id ");
|
2000-01-22 04:24:42 +00:00
|
|
|
|
|
|
|
if ($start && $start =~ /[1-9]/) {
|
|
|
|
# If the start is all zeros, then don't do this (because we want to
|
2000-03-10 18:26:23 +00:00
|
|
|
# not emit a leading "Additional Comments" line in that case.)
|
2000-01-22 04:24:42 +00:00
|
|
|
$query .= "AND longdescs.bug_when > '$start'";
|
|
|
|
$count = 1;
|
|
|
|
}
|
|
|
|
if ($end) {
|
|
|
|
$query .= "AND longdescs.bug_when <= '$end'";
|
|
|
|
}
|
|
|
|
|
|
|
|
$query .= "ORDER BY longdescs.bug_when";
|
|
|
|
SendSQL($query);
|
2000-01-20 21:31:22 +00:00
|
|
|
while (MoreSQLData()) {
|
2002-10-13 04:26:24 +00:00
|
|
|
my ($who, $when, $text, $isprivate, $work_time) = (FetchSQLData());
|
2000-01-20 21:31:22 +00:00
|
|
|
if ($count) {
|
2000-09-13 17:45:48 +00:00
|
|
|
$result .= "\n\n------- Additional Comments From $who".Param('emailsuffix')." ".
|
2002-11-27 16:00:44 +00:00
|
|
|
Bugzilla::Util::format_time($when) . " -------\n";
|
2000-01-20 21:31:22 +00:00
|
|
|
}
|
2002-08-19 21:17:28 +00:00
|
|
|
if (($isprivate > 0) && Param("insidergroup")) {
|
|
|
|
$anyprivate = 1;
|
|
|
|
}
|
2000-01-20 21:31:22 +00:00
|
|
|
$result .= $text;
|
|
|
|
$count++;
|
|
|
|
}
|
|
|
|
|
2002-08-19 21:17:28 +00:00
|
|
|
return ($result, $anyprivate);
|
1998-09-15 21:49:26 +00:00
|
|
|
}
|
|
|
|
|
2002-02-19 23:22:24 +00:00
|
|
|
sub GetComments {
|
|
|
|
my ($id) = (@_);
|
|
|
|
my @comments;
|
|
|
|
SendSQL("SELECT profiles.realname, profiles.login_name,
|
2002-11-27 16:00:44 +00:00
|
|
|
date_format(longdescs.bug_when,'%Y.%m.%d %H:%i'),
|
2002-10-13 04:26:24 +00:00
|
|
|
longdescs.thetext, longdescs.work_time,
|
2002-08-19 21:17:28 +00:00
|
|
|
isprivate,
|
|
|
|
date_format(longdescs.bug_when,'%Y%m%d%H%i%s')
|
2002-02-19 23:22:24 +00:00
|
|
|
FROM longdescs, profiles
|
|
|
|
WHERE profiles.userid = longdescs.who
|
|
|
|
AND longdescs.bug_id = $id
|
|
|
|
ORDER BY longdescs.bug_when");
|
|
|
|
|
|
|
|
while (MoreSQLData()) {
|
|
|
|
my %comment;
|
2002-10-13 04:26:24 +00:00
|
|
|
($comment{'name'}, $comment{'email'}, $comment{'time'},
|
|
|
|
$comment{'body'}, $comment{'work_time'},
|
2002-08-19 21:17:28 +00:00
|
|
|
$comment{'isprivate'}, $comment{'when'}) = FetchSQLData();
|
2002-02-19 23:22:24 +00:00
|
|
|
|
|
|
|
$comment{'email'} .= Param('emailsuffix');
|
|
|
|
$comment{'name'} = $comment{'name'} || $comment{'email'};
|
|
|
|
|
|
|
|
push (@comments, \%comment);
|
|
|
|
}
|
|
|
|
|
|
|
|
return \@comments;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
1998-09-15 21:49:26 +00:00
|
|
|
# Fills in a hashtable with info about the columns for the given table in the
|
|
|
|
# database. The hashtable has the following entries:
|
|
|
|
# -list- the list of column names
|
|
|
|
# <name>,type the type for the given name
|
|
|
|
|
|
|
|
sub LearnAboutColumns {
|
|
|
|
my ($table) = (@_);
|
|
|
|
my %a;
|
|
|
|
SendSQL("show columns from $table");
|
|
|
|
my @list = ();
|
|
|
|
my @row;
|
|
|
|
while (@row = FetchSQLData()) {
|
|
|
|
my ($name,$type) = (@row);
|
|
|
|
$a{"$name,type"} = $type;
|
|
|
|
push @list, $name;
|
|
|
|
}
|
|
|
|
$a{"-list-"} = \@list;
|
|
|
|
return \%a;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
# If the above returned a enum type, take that type and parse it into the
|
|
|
|
# list of values. Assumes that enums don't ever contain an apostrophe!
|
|
|
|
|
|
|
|
sub SplitEnumType {
|
|
|
|
my ($str) = (@_);
|
|
|
|
my @result = ();
|
|
|
|
if ($str =~ /^enum\((.*)\)$/) {
|
|
|
|
my $guts = $1 . ",";
|
|
|
|
while ($guts =~ /^\'([^\']*)\',(.*)$/) {
|
|
|
|
push @result, $1;
|
|
|
|
$guts = $2;
|
2001-10-13 01:36:17 +00:00
|
|
|
}
|
1998-09-15 21:49:26 +00:00
|
|
|
}
|
|
|
|
return @result;
|
|
|
|
}
|
|
|
|
|
1999-03-11 16:30:54 +00:00
|
|
|
sub UserInGroup {
|
2004-03-27 10:45:30 +00:00
|
|
|
if ($_[1]) {
|
|
|
|
die "UserInGroup no longer takes a second parameter.";
|
|
|
|
}
|
|
|
|
|
2003-06-03 09:48:15 +00:00
|
|
|
return defined Bugzilla->user && defined Bugzilla->user->groups->{$_[0]};
|
2002-09-22 17:15:13 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
sub UserCanBlessGroup {
|
|
|
|
my ($groupname) = (@_);
|
|
|
|
PushGlobalSQLState();
|
|
|
|
# check if user explicitly can bless group
|
|
|
|
SendSQL("SELECT groups.id FROM groups, user_group_map
|
|
|
|
WHERE groups.id = user_group_map.group_id
|
|
|
|
AND user_group_map.user_id = $::userid
|
|
|
|
AND isbless = 1
|
|
|
|
AND groups.name = " . SqlQuote($groupname));
|
|
|
|
my $result = FetchOneColumn();
|
|
|
|
PopGlobalSQLState();
|
|
|
|
if ($result) {
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
PushGlobalSQLState();
|
|
|
|
# check if user is a member of a group that can bless this group
|
|
|
|
# this group does not count
|
|
|
|
SendSQL("SELECT groups.id FROM groups, user_group_map,
|
|
|
|
group_group_map
|
|
|
|
WHERE groups.id = grantor_id
|
|
|
|
AND user_group_map.user_id = $::userid
|
|
|
|
AND user_group_map.isbless = 0
|
2004-07-27 16:33:41 +00:00
|
|
|
AND group_group_map.grant_type = " . GROUP_BLESS . "
|
2002-09-22 17:15:13 +00:00
|
|
|
AND user_group_map.group_id = member_id
|
|
|
|
AND groups.name = " . SqlQuote($groupname));
|
|
|
|
$result = FetchOneColumn();
|
|
|
|
PopGlobalSQLState();
|
|
|
|
return $result;
|
|
|
|
}
|
|
|
|
|
2001-08-11 01:18:24 +00:00
|
|
|
sub BugInGroup {
|
|
|
|
my ($bugid, $groupname) = (@_);
|
|
|
|
PushGlobalSQLState();
|
2002-09-22 17:15:13 +00:00
|
|
|
SendSQL("SELECT bug_group_map.bug_id != 0 FROM bug_group_map, groups
|
|
|
|
WHERE bug_group_map.bug_id = $bugid
|
|
|
|
AND bug_group_map.group_id = groups.id
|
|
|
|
AND groups.name = " . SqlQuote($groupname));
|
|
|
|
my $bugingroup = FetchOneColumn();
|
|
|
|
PopGlobalSQLState();
|
|
|
|
return $bugingroup;
|
|
|
|
}
|
|
|
|
|
|
|
|
sub BugInGroupId {
|
|
|
|
my ($bugid, $groupid) = (@_);
|
|
|
|
PushGlobalSQLState();
|
|
|
|
SendSQL("SELECT bug_id != 0 FROM bug_group_map
|
|
|
|
WHERE bug_id = $bugid
|
|
|
|
AND group_id = $groupid");
|
2001-08-11 01:18:24 +00:00
|
|
|
my $bugingroup = FetchOneColumn();
|
|
|
|
PopGlobalSQLState();
|
|
|
|
return $bugingroup;
|
|
|
|
}
|
|
|
|
|
2000-03-10 16:25:03 +00:00
|
|
|
sub GroupExists {
|
|
|
|
my ($groupname) = (@_);
|
2002-06-03 13:36:39 +00:00
|
|
|
PushGlobalSQLState();
|
2002-09-22 17:15:13 +00:00
|
|
|
SendSQL("SELECT id FROM groups WHERE name=" . SqlQuote($groupname));
|
|
|
|
my $id = FetchOneColumn();
|
2002-06-03 13:36:39 +00:00
|
|
|
PopGlobalSQLState();
|
2002-09-22 17:15:13 +00:00
|
|
|
return $id;
|
2000-03-10 16:25:03 +00:00
|
|
|
}
|
1999-03-11 16:30:54 +00:00
|
|
|
|
2002-09-22 17:15:13 +00:00
|
|
|
sub GroupNameToId {
|
2001-08-11 01:18:24 +00:00
|
|
|
my ($groupname) = (@_);
|
|
|
|
PushGlobalSQLState();
|
2002-09-22 17:15:13 +00:00
|
|
|
SendSQL("SELECT id FROM groups WHERE name=" . SqlQuote($groupname));
|
|
|
|
my $id = FetchOneColumn();
|
2001-08-11 01:18:24 +00:00
|
|
|
PopGlobalSQLState();
|
2002-09-22 17:15:13 +00:00
|
|
|
return $id;
|
2001-08-11 01:18:24 +00:00
|
|
|
}
|
|
|
|
|
2002-09-22 17:15:13 +00:00
|
|
|
sub GroupIdToName {
|
|
|
|
my ($groupid) = (@_);
|
|
|
|
PushGlobalSQLState();
|
|
|
|
SendSQL("SELECT name FROM groups WHERE id = $groupid");
|
|
|
|
my $name = FetchOneColumn();
|
|
|
|
PopGlobalSQLState();
|
|
|
|
return $name;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2001-06-06 03:16:52 +00:00
|
|
|
# Determines whether or not a group is active by checking
|
|
|
|
# the "isactive" column for the group in the "groups" table.
|
2002-09-22 17:15:13 +00:00
|
|
|
# Note: This function selects groups by id rather than by name.
|
2001-06-06 03:16:52 +00:00
|
|
|
sub GroupIsActive {
|
2002-09-22 17:15:13 +00:00
|
|
|
my ($groupid) = (@_);
|
|
|
|
$groupid ||= 0;
|
2002-06-03 13:36:39 +00:00
|
|
|
PushGlobalSQLState();
|
2002-09-22 17:15:13 +00:00
|
|
|
SendSQL("SELECT isactive FROM groups WHERE id=$groupid");
|
2001-06-06 03:16:52 +00:00
|
|
|
my $isactive = FetchOneColumn();
|
2002-06-03 13:36:39 +00:00
|
|
|
PopGlobalSQLState();
|
2001-06-06 03:16:52 +00:00
|
|
|
return $isactive;
|
|
|
|
}
|
|
|
|
|
2000-01-23 01:03:15 +00:00
|
|
|
# Determines if the given bug_status string represents an "Opened" bug. This
|
2002-09-06 03:59:06 +00:00
|
|
|
# routine ought to be parameterizable somehow, as people tend to introduce
|
2000-01-23 01:03:15 +00:00
|
|
|
# new states into Bugzilla.
|
|
|
|
|
|
|
|
sub IsOpenedState {
|
|
|
|
my ($state) = (@_);
|
2001-09-14 21:50:08 +00:00
|
|
|
if (grep($_ eq $state, OpenStates())) {
|
2000-01-23 01:03:15 +00:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2001-09-14 21:50:08 +00:00
|
|
|
# This sub will return an array containing any status that
|
|
|
|
# is considered an open bug.
|
|
|
|
|
|
|
|
sub OpenStates {
|
|
|
|
return ('NEW', 'REOPENED', 'ASSIGNED', $::unconfirmedstate);
|
|
|
|
}
|
|
|
|
|
2000-01-23 01:03:15 +00:00
|
|
|
|
1999-10-07 23:54:52 +00:00
|
|
|
sub RemoveVotes {
|
2000-02-17 05:15:23 +00:00
|
|
|
my ($id, $who, $reason) = (@_);
|
|
|
|
my $whopart = "";
|
|
|
|
if ($who) {
|
|
|
|
$whopart = " AND votes.who = $who";
|
|
|
|
}
|
2003-04-27 07:20:39 +00:00
|
|
|
SendSQL("SELECT profiles.login_name, profiles.userid, votes.vote_count, " .
|
2001-08-16 02:46:15 +00:00
|
|
|
"products.votesperuser, products.maxvotesperbug " .
|
|
|
|
"FROM profiles " .
|
|
|
|
"LEFT JOIN votes ON profiles.userid = votes.who " .
|
|
|
|
"LEFT JOIN bugs USING(bug_id) " .
|
2002-08-12 05:43:05 +00:00
|
|
|
"LEFT JOIN products ON products.id = bugs.product_id " .
|
2000-02-17 05:15:23 +00:00
|
|
|
"WHERE votes.bug_id = $id " .
|
|
|
|
$whopart);
|
1999-10-07 23:54:52 +00:00
|
|
|
my @list;
|
|
|
|
while (MoreSQLData()) {
|
2001-08-25 00:12:12 +00:00
|
|
|
my ($name, $userid, $oldvotes, $votesperuser, $maxvotesperbug) = (FetchSQLData());
|
|
|
|
push(@list, [$name, $userid, $oldvotes, $votesperuser, $maxvotesperbug]);
|
1999-10-07 23:54:52 +00:00
|
|
|
}
|
|
|
|
if (0 < @list) {
|
2000-02-17 05:15:23 +00:00
|
|
|
foreach my $ref (@list) {
|
2001-08-25 00:12:12 +00:00
|
|
|
my ($name, $userid, $oldvotes, $votesperuser, $maxvotesperbug) = (@$ref);
|
|
|
|
my $s;
|
|
|
|
|
|
|
|
$maxvotesperbug = $votesperuser if ($votesperuser < $maxvotesperbug);
|
2001-08-16 02:46:15 +00:00
|
|
|
|
|
|
|
# If this product allows voting and the user's votes are in
|
|
|
|
# the acceptable range, then don't do anything.
|
2001-08-25 00:12:12 +00:00
|
|
|
next if $votesperuser && $oldvotes <= $maxvotesperbug;
|
2001-08-16 02:46:15 +00:00
|
|
|
|
|
|
|
# If the user has more votes on this bug than this product
|
|
|
|
# allows, then reduce the number of votes so it fits
|
|
|
|
my $newvotes = $votesperuser ? $maxvotesperbug : 0;
|
2001-08-25 00:12:12 +00:00
|
|
|
|
|
|
|
my $removedvotes = $oldvotes - $newvotes;
|
|
|
|
|
|
|
|
$s = $oldvotes == 1 ? "" : "s";
|
|
|
|
my $oldvotestext = "You had $oldvotes vote$s on this bug.";
|
|
|
|
|
|
|
|
$s = $removedvotes == 1 ? "" : "s";
|
|
|
|
my $removedvotestext = "You had $removedvotes vote$s removed from this bug.";
|
|
|
|
|
|
|
|
my $newvotestext;
|
2001-08-16 02:46:15 +00:00
|
|
|
if ($newvotes) {
|
2003-04-27 07:20:39 +00:00
|
|
|
SendSQL("UPDATE votes SET vote_count = $newvotes " .
|
2001-08-16 02:46:15 +00:00
|
|
|
"WHERE bug_id = $id AND who = $userid");
|
2001-08-25 00:12:12 +00:00
|
|
|
$s = $newvotes == 1 ? "" : "s";
|
|
|
|
$newvotestext = "You still have $newvotes vote$s on this bug."
|
2001-08-16 02:46:15 +00:00
|
|
|
} else {
|
|
|
|
SendSQL("DELETE FROM votes WHERE bug_id = $id AND who = $userid");
|
2001-08-25 00:12:12 +00:00
|
|
|
$newvotestext = "You have no more votes remaining on this bug.";
|
2001-08-16 02:46:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
# Notice that we did not make sure that the user fit within the $votesperuser
|
2001-08-25 00:12:12 +00:00
|
|
|
# range. This is considered to be an acceptable alternative to losing votes
|
2001-08-16 02:46:15 +00:00
|
|
|
# during product moves. Then next time the user attempts to change their votes,
|
|
|
|
# they will be forced to fit within the $votesperuser limit.
|
|
|
|
|
|
|
|
# Now lets send the e-mail to alert the user to the fact that their votes have
|
|
|
|
# been reduced or removed.
|
2000-09-12 16:29:38 +00:00
|
|
|
my $sendmailparm = '-ODeliveryMode=deferred';
|
|
|
|
if (Param('sendmailnow')) {
|
|
|
|
$sendmailparm = '';
|
|
|
|
}
|
2002-02-17 08:22:31 +00:00
|
|
|
if (open(SENDMAIL, "|/usr/lib/sendmail $sendmailparm -t -i")) {
|
2000-02-17 05:15:23 +00:00
|
|
|
my %substs;
|
2001-08-25 00:12:12 +00:00
|
|
|
|
2000-02-17 05:15:23 +00:00
|
|
|
$substs{"to"} = $name;
|
|
|
|
$substs{"bugid"} = $id;
|
|
|
|
$substs{"reason"} = $reason;
|
2001-08-25 00:12:12 +00:00
|
|
|
|
|
|
|
$substs{"votesremoved"} = $removedvotes;
|
|
|
|
$substs{"votesold"} = $oldvotes;
|
|
|
|
$substs{"votesnew"} = $newvotes;
|
|
|
|
|
|
|
|
$substs{"votesremovedtext"} = $removedvotestext;
|
|
|
|
$substs{"votesoldtext"} = $oldvotestext;
|
|
|
|
$substs{"votesnewtext"} = $newvotestext;
|
|
|
|
|
|
|
|
$substs{"count"} = $removedvotes . "\n " . $newvotestext;
|
|
|
|
|
2000-02-17 14:57:57 +00:00
|
|
|
my $msg = PerformSubsts(Param("voteremovedmail"),
|
|
|
|
\%substs);
|
|
|
|
print SENDMAIL $msg;
|
2000-02-17 05:15:23 +00:00
|
|
|
close SENDMAIL;
|
|
|
|
}
|
1999-10-07 23:54:52 +00:00
|
|
|
}
|
2003-04-27 07:20:39 +00:00
|
|
|
SendSQL("SELECT SUM(vote_count) FROM votes WHERE bug_id = $id");
|
2000-02-17 05:15:23 +00:00
|
|
|
my $v = FetchOneColumn();
|
|
|
|
$v ||= 0;
|
|
|
|
SendSQL("UPDATE bugs SET votes = $v, delta_ts = delta_ts " .
|
|
|
|
"WHERE bug_id = $id");
|
1999-10-07 23:54:52 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2001-07-20 15:18:30 +00:00
|
|
|
# Take two comma or space separated strings and return what
|
|
|
|
# values were removed from or added to the new one.
|
|
|
|
sub DiffStrings {
|
|
|
|
my ($oldstr, $newstr) = @_;
|
|
|
|
|
2001-08-19 18:26:21 +00:00
|
|
|
# Split the old and new strings into arrays containing their values.
|
|
|
|
$oldstr =~ s/[\s,]+/ /g;
|
|
|
|
$newstr =~ s/[\s,]+/ /g;
|
|
|
|
my @old = split(" ", $oldstr);
|
|
|
|
my @new = split(" ", $newstr);
|
|
|
|
|
2004-05-12 23:57:31 +00:00
|
|
|
# For each pair of (old, new) entries:
|
|
|
|
# If they're equal, set them to empty. When done, @old contains entries
|
|
|
|
# that were removed; @new contains ones that got added.
|
|
|
|
|
|
|
|
foreach my $oldv (@old) {
|
2004-05-13 07:17:43 +00:00
|
|
|
foreach my $newv (@new) {
|
|
|
|
next if ($newv eq '');
|
|
|
|
if ($oldv eq $newv) {
|
|
|
|
$newv = $oldv = '';
|
|
|
|
}
|
2004-05-12 23:57:31 +00:00
|
|
|
}
|
2001-07-20 15:18:30 +00:00
|
|
|
}
|
2004-05-12 23:57:31 +00:00
|
|
|
my $removed = join (", ", grep { $_ ne '' } @old);
|
|
|
|
my $added = join (", ", grep { $_ ne '' } @new);
|
2001-07-20 15:18:30 +00:00
|
|
|
|
|
|
|
return ($removed, $added);
|
|
|
|
}
|
|
|
|
|
1998-09-15 21:49:26 +00:00
|
|
|
sub PerformSubsts {
|
|
|
|
my ($str, $substs) = (@_);
|
|
|
|
$str =~ s/%([a-z]*)%/(defined $substs->{$1} ? $substs->{$1} : Param($1))/eg;
|
|
|
|
return $str;
|
|
|
|
}
|
|
|
|
|
2002-10-13 04:26:24 +00:00
|
|
|
sub FormatTimeUnit {
|
|
|
|
# Returns a number with 2 digit precision, unless the last digit is a 0
|
|
|
|
# then it returns only 1 digit precision
|
|
|
|
my ($time) = (@_);
|
|
|
|
|
|
|
|
my $newtime = sprintf("%.2f", $time);
|
|
|
|
|
|
|
|
if ($newtime =~ /0\Z/) {
|
|
|
|
$newtime = sprintf("%.1f", $time);
|
|
|
|
}
|
|
|
|
|
|
|
|
return $newtime;
|
|
|
|
|
|
|
|
}
|
2002-12-20 07:21:43 +00:00
|
|
|
|
2002-05-30 01:44:33 +00:00
|
|
|
###############################################################################
|
2002-03-12 13:55:07 +00:00
|
|
|
|
2002-09-17 23:28:24 +00:00
|
|
|
# Constructs a format object from URL parameters. You most commonly call it
|
|
|
|
# like this:
|
2004-03-26 21:00:11 +00:00
|
|
|
# my $format = GetFormat("foo/bar", scalar($cgi->param('format')),
|
|
|
|
# scalar($cgi->param('ctype')));
|
2003-03-22 01:17:02 +00:00
|
|
|
|
2002-09-17 23:28:24 +00:00
|
|
|
sub GetFormat {
|
|
|
|
my ($template, $format, $ctype) = @_;
|
2002-12-20 07:21:43 +00:00
|
|
|
|
2002-09-17 23:28:24 +00:00
|
|
|
$ctype ||= "html";
|
2002-10-07 06:44:07 +00:00
|
|
|
$format ||= "";
|
2002-12-20 07:21:43 +00:00
|
|
|
|
2002-09-17 23:28:24 +00:00
|
|
|
# Security - allow letters and a hyphen only
|
|
|
|
$ctype =~ s/[^a-zA-Z\-]//g;
|
|
|
|
$format =~ s/[^a-zA-Z\-]//g;
|
2002-09-26 23:25:12 +00:00
|
|
|
trick_taint($ctype);
|
|
|
|
trick_taint($format);
|
2002-12-20 07:21:43 +00:00
|
|
|
|
2002-09-17 23:28:24 +00:00
|
|
|
$template .= ($format ? "-$format" : "");
|
|
|
|
$template .= ".$ctype.tmpl";
|
2002-12-20 07:21:43 +00:00
|
|
|
|
2003-03-22 01:17:02 +00:00
|
|
|
# Now check that the template actually exists. We only want to check
|
|
|
|
# if the template exists; any other errors (eg parse errors) will
|
2004-03-28 22:49:16 +00:00
|
|
|
# end up being detected later.
|
2003-03-22 01:17:02 +00:00
|
|
|
eval {
|
|
|
|
Bugzilla->template->context->template($template);
|
|
|
|
};
|
|
|
|
# This parsing may seem fragile, but its OK:
|
|
|
|
# http://lists.template-toolkit.org/pipermail/templates/2003-March/004370.html
|
|
|
|
# Even if it is wrong, any sort of error is going to cause a failure
|
|
|
|
# eventually, so the only issue would be an incorrect error message
|
|
|
|
if ($@ && $@->info =~ /: not found$/) {
|
|
|
|
ThrowUserError("format_not_found", { 'format' => $format,
|
|
|
|
'ctype' => $ctype,
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
# Else, just return the info
|
2002-12-20 07:21:43 +00:00
|
|
|
return
|
|
|
|
{
|
|
|
|
'template' => $template ,
|
|
|
|
'extension' => $ctype ,
|
2003-05-05 01:15:38 +00:00
|
|
|
'ctype' => Bugzilla::Constants::contenttypes->{$ctype} ,
|
2002-09-17 23:28:24 +00:00
|
|
|
};
|
2002-03-12 13:55:07 +00:00
|
|
|
}
|
|
|
|
|
2002-12-20 07:21:43 +00:00
|
|
|
############# Live code below here (that is, not subroutine defs) #############
|
2002-02-03 09:28:48 +00:00
|
|
|
|
2002-12-20 07:21:43 +00:00
|
|
|
use Bugzilla;
|
2002-07-26 18:16:39 +00:00
|
|
|
|
2003-02-07 07:19:15 +00:00
|
|
|
$::template = Bugzilla->template();
|
2002-03-01 06:01:12 +00:00
|
|
|
|
2002-12-20 07:21:43 +00:00
|
|
|
$::vars = {};
|
2002-02-03 09:28:48 +00:00
|
|
|
|
1998-09-15 21:49:26 +00:00
|
|
|
1;
|