mirror of
https://github.com/mozilla/gecko-dev.git
synced 2024-11-14 15:37:55 +00:00
595 lines
22 KiB
Perl
Executable File
595 lines
22 KiB
Perl
Executable File
#!/usr/bin/perl -wT
|
|
# -*- Mode: perl; indent-tabs-mode: nil -*-
|
|
#
|
|
# The contents of this file are subject to the Mozilla Public
|
|
# License Version 1.1 (the "License"); you may not use this file
|
|
# except in compliance with the License. You may obtain a copy of
|
|
# the License at http://www.mozilla.org/MPL/
|
|
#
|
|
# Software distributed under the License is distributed on an "AS
|
|
# IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or
|
|
# implied. See the License for the specific language governing
|
|
# rights and limitations under the License.
|
|
#
|
|
# The Original Code is the Bugzilla Bug Tracking System.
|
|
#
|
|
# Contributor(s): Terry Weissman <terry@mozilla.org>
|
|
# Dan Mosedale <dmose@mozilla.org>
|
|
# Alan Raetz <al_raetz@yahoo.com>
|
|
# David Miller <justdave@syndicomm.com>
|
|
# Christopher Aillon <christopher@aillon.com>
|
|
# Gervase Markham <gerv@gerv.net>
|
|
# Vlad Dascalu <jocuri@softhome.net>
|
|
# Shane H. W. Travis <travis@sedsystems.ca>
|
|
|
|
use strict;
|
|
|
|
use lib qw(.);
|
|
|
|
use Bugzilla;
|
|
use Bugzilla::Constants;
|
|
use Bugzilla::Search;
|
|
use Bugzilla::Util;
|
|
use Bugzilla::Error;
|
|
use Bugzilla::User;
|
|
|
|
my $template = Bugzilla->template;
|
|
local our $vars = {};
|
|
|
|
###############################################################################
|
|
# Each panel has two functions - panel Foo has a DoFoo, to get the data
|
|
# necessary for displaying the panel, and a SaveFoo, to save the panel's
|
|
# contents from the form data (if appropriate.)
|
|
# SaveFoo may be called before DoFoo.
|
|
###############################################################################
|
|
sub DoAccount {
|
|
my $dbh = Bugzilla->dbh;
|
|
my $user = Bugzilla->user;
|
|
|
|
($vars->{'realname'}) = $dbh->selectrow_array(
|
|
"SELECT realname FROM profiles WHERE userid = ?", undef, $user->id);
|
|
|
|
if(Bugzilla->params->{'allowemailchange'}
|
|
&& Bugzilla->user->authorizer->can_change_email) {
|
|
my @token = $dbh->selectrow_array(
|
|
"SELECT tokentype, issuedate + " .
|
|
$dbh->sql_interval(MAX_TOKEN_AGE, 'DAY') . ", eventdata
|
|
FROM tokens
|
|
WHERE userid = ?
|
|
AND tokentype LIKE 'email%'
|
|
ORDER BY tokentype ASC " . $dbh->sql_limit(1), undef, $user->id);
|
|
if (scalar(@token) > 0) {
|
|
my ($tokentype, $change_date, $eventdata) = @token;
|
|
$vars->{'login_change_date'} = $change_date;
|
|
|
|
if($tokentype eq 'emailnew') {
|
|
my ($oldemail,$newemail) = split(/:/,$eventdata);
|
|
$vars->{'new_login_name'} = $newemail;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
sub SaveAccount {
|
|
my $cgi = Bugzilla->cgi;
|
|
my $dbh = Bugzilla->dbh;
|
|
my $user = Bugzilla->user;
|
|
|
|
my $pwd1 = $cgi->param('new_password1');
|
|
my $pwd2 = $cgi->param('new_password2');
|
|
|
|
if ($cgi->param('Bugzilla_password') ne "" ||
|
|
$pwd1 ne "" || $pwd2 ne "")
|
|
{
|
|
my ($oldcryptedpwd) = $dbh->selectrow_array(
|
|
q{SELECT cryptpassword FROM profiles WHERE userid = ?},
|
|
undef, $user->id);
|
|
$oldcryptedpwd || ThrowCodeError("unable_to_retrieve_password");
|
|
|
|
if (crypt(scalar($cgi->param('Bugzilla_password')), $oldcryptedpwd) ne
|
|
$oldcryptedpwd)
|
|
{
|
|
ThrowUserError("old_password_incorrect");
|
|
}
|
|
|
|
if ($pwd1 ne "" || $pwd2 ne "")
|
|
{
|
|
$cgi->param('new_password1')
|
|
|| ThrowUserError("new_password_missing");
|
|
validate_password($pwd1, $pwd2);
|
|
|
|
if ($cgi->param('Bugzilla_password') ne $pwd1) {
|
|
my $cryptedpassword = bz_crypt($pwd1);
|
|
trick_taint($cryptedpassword); # Only used in a placeholder
|
|
$dbh->do(q{UPDATE profiles
|
|
SET cryptpassword = ?
|
|
WHERE userid = ?},
|
|
undef, ($cryptedpassword, $user->id));
|
|
|
|
# Invalidate all logins except for the current one
|
|
Bugzilla->logout(LOGOUT_KEEP_CURRENT);
|
|
}
|
|
}
|
|
}
|
|
|
|
if(Bugzilla->params->{"allowemailchange"} && $cgi->param('new_login_name')) {
|
|
my $old_login_name = $cgi->param('Bugzilla_login');
|
|
my $new_login_name = trim($cgi->param('new_login_name'));
|
|
|
|
if($old_login_name ne $new_login_name) {
|
|
$cgi->param('Bugzilla_password')
|
|
|| ThrowUserError("old_password_required");
|
|
|
|
use Bugzilla::Token;
|
|
# Block multiple email changes for the same user.
|
|
if (Bugzilla::Token::HasEmailChangeToken($user->id)) {
|
|
ThrowUserError("email_change_in_progress");
|
|
}
|
|
|
|
# Before changing an email address, confirm one does not exist.
|
|
validate_email_syntax($new_login_name)
|
|
|| ThrowUserError('illegal_email_address', {addr => $new_login_name});
|
|
trick_taint($new_login_name);
|
|
is_available_username($new_login_name)
|
|
|| ThrowUserError("account_exists", {email => $new_login_name});
|
|
|
|
Bugzilla::Token::IssueEmailChangeToken($user->id, $old_login_name,
|
|
$new_login_name);
|
|
|
|
$vars->{'email_changes_saved'} = 1;
|
|
}
|
|
}
|
|
|
|
my $realname = trim($cgi->param('realname'));
|
|
trick_taint($realname); # Only used in a placeholder
|
|
$dbh->do("UPDATE profiles SET realname = ? WHERE userid = ?",
|
|
undef, ($realname, $user->id));
|
|
}
|
|
|
|
|
|
sub DoSettings {
|
|
my $user = Bugzilla->user;
|
|
|
|
my $settings = $user->settings;
|
|
$vars->{'settings'} = $settings;
|
|
|
|
my @setting_list = keys %$settings;
|
|
$vars->{'setting_names'} = \@setting_list;
|
|
|
|
$vars->{'has_settings_enabled'} = 0;
|
|
# Is there at least one user setting enabled?
|
|
foreach my $setting_name (@setting_list) {
|
|
if ($settings->{"$setting_name"}->{'is_enabled'}) {
|
|
$vars->{'has_settings_enabled'} = 1;
|
|
last;
|
|
}
|
|
}
|
|
$vars->{'dont_show_button'} = !$vars->{'has_settings_enabled'};
|
|
}
|
|
|
|
sub SaveSettings {
|
|
my $cgi = Bugzilla->cgi;
|
|
my $user = Bugzilla->user;
|
|
|
|
my $settings = $user->settings;
|
|
my @setting_list = keys %$settings;
|
|
|
|
foreach my $name (@setting_list) {
|
|
next if ! ($settings->{$name}->{'is_enabled'});
|
|
my $value = $cgi->param($name);
|
|
my $setting = new Bugzilla::User::Setting($name);
|
|
|
|
if ($value eq "${name}-isdefault" ) {
|
|
if (! $settings->{$name}->{'is_default'}) {
|
|
$settings->{$name}->reset_to_default;
|
|
}
|
|
}
|
|
else {
|
|
$setting->validate_value($value);
|
|
$settings->{$name}->set($value);
|
|
}
|
|
}
|
|
$vars->{'settings'} = $user->settings(1);
|
|
}
|
|
|
|
sub DoEmail {
|
|
my $dbh = Bugzilla->dbh;
|
|
my $user = Bugzilla->user;
|
|
|
|
###########################################################################
|
|
# User watching
|
|
###########################################################################
|
|
if (Bugzilla->params->{"supportwatchers"}) {
|
|
my $watched_ref = $dbh->selectcol_arrayref(
|
|
"SELECT profiles.login_name FROM watch INNER JOIN profiles" .
|
|
" ON watch.watched = profiles.userid" .
|
|
" WHERE watcher = ?",
|
|
undef, $user->id);
|
|
$vars->{'watchedusers'} = $watched_ref;
|
|
|
|
my $watcher_ids = $dbh->selectcol_arrayref(
|
|
"SELECT watcher FROM watch WHERE watched = ?",
|
|
undef, $user->id);
|
|
|
|
my @watchers;
|
|
foreach my $watcher_id (@$watcher_ids) {
|
|
my $watcher = new Bugzilla::User($watcher_id);
|
|
push (@watchers, Bugzilla::User::identity($watcher));
|
|
}
|
|
|
|
@watchers = sort { lc($a) cmp lc($b) } @watchers;
|
|
$vars->{'watchers'} = \@watchers;
|
|
}
|
|
|
|
###########################################################################
|
|
# Role-based preferences
|
|
###########################################################################
|
|
my $sth = $dbh->prepare("SELECT relationship, event " .
|
|
"FROM email_setting " .
|
|
"WHERE user_id = ?");
|
|
$sth->execute($user->id);
|
|
|
|
my %mail;
|
|
while (my ($relationship, $event) = $sth->fetchrow_array()) {
|
|
$mail{$relationship}{$event} = 1;
|
|
}
|
|
|
|
$vars->{'mail'} = \%mail;
|
|
}
|
|
|
|
sub SaveEmail {
|
|
my $dbh = Bugzilla->dbh;
|
|
my $cgi = Bugzilla->cgi;
|
|
my $user = Bugzilla->user;
|
|
|
|
###########################################################################
|
|
# Role-based preferences
|
|
###########################################################################
|
|
$dbh->bz_lock_tables("email_setting WRITE");
|
|
|
|
# Delete all the user's current preferences
|
|
$dbh->do("DELETE FROM email_setting WHERE user_id = ?", undef, $user->id);
|
|
|
|
# Repopulate the table - first, with normal events in the
|
|
# relationship/event matrix.
|
|
# Note: the database holds only "off" email preferences, as can be implied
|
|
# from the name of the table - profiles_nomail.
|
|
foreach my $rel (RELATIONSHIPS) {
|
|
# Positive events: a ticked box means "send me mail."
|
|
foreach my $event (POS_EVENTS) {
|
|
if (defined($cgi->param("email-$rel-$event"))
|
|
&& $cgi->param("email-$rel-$event") == 1)
|
|
{
|
|
$dbh->do("INSERT INTO email_setting " .
|
|
"(user_id, relationship, event) " .
|
|
"VALUES (?, ?, ?)",
|
|
undef, ($user->id, $rel, $event));
|
|
}
|
|
}
|
|
|
|
# Negative events: a ticked box means "don't send me mail."
|
|
foreach my $event (NEG_EVENTS) {
|
|
if (!defined($cgi->param("neg-email-$rel-$event")) ||
|
|
$cgi->param("neg-email-$rel-$event") != 1)
|
|
{
|
|
$dbh->do("INSERT INTO email_setting " .
|
|
"(user_id, relationship, event) " .
|
|
"VALUES (?, ?, ?)",
|
|
undef, ($user->id, $rel, $event));
|
|
}
|
|
}
|
|
}
|
|
|
|
# Global positive events: a ticked box means "send me mail."
|
|
foreach my $event (GLOBAL_EVENTS) {
|
|
if (defined($cgi->param("email-" . REL_ANY . "-$event"))
|
|
&& $cgi->param("email-" . REL_ANY . "-$event") == 1)
|
|
{
|
|
$dbh->do("INSERT INTO email_setting " .
|
|
"(user_id, relationship, event) " .
|
|
"VALUES (?, ?, ?)",
|
|
undef, ($user->id, REL_ANY, $event));
|
|
}
|
|
}
|
|
|
|
$dbh->bz_unlock_tables();
|
|
|
|
###########################################################################
|
|
# User watching
|
|
###########################################################################
|
|
if (Bugzilla->params->{"supportwatchers"}
|
|
&& (defined $cgi->param('new_watchedusers')
|
|
|| defined $cgi->param('remove_watched_users')))
|
|
{
|
|
# Just in case. Note that this much locking is actually overkill:
|
|
# we don't really care if anyone reads the watch table. So
|
|
# some small amount of contention could be gotten rid of by
|
|
# using user-defined locks rather than table locking.
|
|
$dbh->bz_lock_tables('watch WRITE', 'profiles READ');
|
|
|
|
# Use this to protect error messages on duplicate submissions
|
|
my $old_watch_ids =
|
|
$dbh->selectcol_arrayref("SELECT watched FROM watch"
|
|
. " WHERE watcher = ?", undef, $user->id);
|
|
|
|
# The new information given to us by the user.
|
|
my @new_watch_names = split(/[,\s]+/, $cgi->param('new_watchedusers'));
|
|
my %new_watch_ids;
|
|
|
|
foreach my $username (@new_watch_names) {
|
|
my $watched_userid = login_to_id(trim($username), THROW_ERROR);
|
|
$new_watch_ids{$watched_userid} = 1;
|
|
}
|
|
|
|
# Add people who were added.
|
|
my $insert_sth = $dbh->prepare('INSERT INTO watch (watched, watcher)'
|
|
. ' VALUES (?, ?)');
|
|
foreach my $add_me (keys(%new_watch_ids)) {
|
|
next if grep($_ == $add_me, @$old_watch_ids);
|
|
$insert_sth->execute($add_me, $user->id);
|
|
}
|
|
|
|
if (defined $cgi->param('remove_watched_users')) {
|
|
my @removed = $cgi->param('watched_by_you');
|
|
# Remove people who were removed.
|
|
my $delete_sth = $dbh->prepare('DELETE FROM watch WHERE watched = ?'
|
|
. ' AND watcher = ?');
|
|
|
|
my %remove_watch_ids;
|
|
foreach my $username (@removed) {
|
|
my $watched_userid = login_to_id(trim($username), THROW_ERROR);
|
|
$remove_watch_ids{$watched_userid} = 1;
|
|
}
|
|
foreach my $remove_me (keys(%remove_watch_ids)) {
|
|
$delete_sth->execute($remove_me, $user->id);
|
|
}
|
|
}
|
|
|
|
$dbh->bz_unlock_tables();
|
|
}
|
|
}
|
|
|
|
|
|
sub DoPermissions {
|
|
my $dbh = Bugzilla->dbh;
|
|
my $user = Bugzilla->user;
|
|
my (@has_bits, @set_bits);
|
|
|
|
my $groups = $dbh->selectall_arrayref(
|
|
"SELECT DISTINCT name, description FROM groups WHERE id IN (" .
|
|
$user->groups_as_string . ") ORDER BY name");
|
|
foreach my $group (@$groups) {
|
|
my ($nam, $desc) = @$group;
|
|
push(@has_bits, {"desc" => $desc, "name" => $nam});
|
|
}
|
|
$groups = $dbh->selectall_arrayref('SELECT DISTINCT id, name, description
|
|
FROM groups
|
|
ORDER BY name');
|
|
foreach my $group (@$groups) {
|
|
my ($group_id, $nam, $desc) = @$group;
|
|
if ($user->can_bless($group_id)) {
|
|
push(@set_bits, {"desc" => $desc, "name" => $nam});
|
|
}
|
|
}
|
|
|
|
$vars->{'has_bits'} = \@has_bits;
|
|
$vars->{'set_bits'} = \@set_bits;
|
|
}
|
|
|
|
# No SavePermissions() because this panel has no changeable fields.
|
|
|
|
|
|
sub DoSavedSearches {
|
|
# 2004-12-13 - colin.ogilvie@gmail.com, bug 274397
|
|
# Need to work around the possibly missing query_format=advanced
|
|
my $dbh = Bugzilla->dbh;
|
|
my $user = Bugzilla->user;
|
|
|
|
my @queries = @{$user->queries};
|
|
my @newqueries;
|
|
foreach my $q (@queries) {
|
|
if ($q->{'query'} =~ /query_format=([^&]*)/) {
|
|
my $format = $1;
|
|
if (!IsValidQueryType($format)) {
|
|
if ($format eq "") {
|
|
$q->{'query'} =~ s/query_format=/query_format=advanced/;
|
|
}
|
|
else {
|
|
$q->{'query'} .= '&query_format=advanced';
|
|
}
|
|
}
|
|
} else {
|
|
$q->{'query'} .= '&query_format=advanced';
|
|
}
|
|
push @newqueries, $q;
|
|
}
|
|
$vars->{'queries'} = \@newqueries;
|
|
if ($user->queryshare_groups_as_string) {
|
|
$vars->{'queryshare_groups'} = $dbh->selectall_arrayref(
|
|
'SELECT id, name FROM groups WHERE id IN ' .
|
|
'(' . $user->queryshare_groups_as_string .')',
|
|
{'Slice' => {}});
|
|
}
|
|
}
|
|
|
|
sub SaveSavedSearches {
|
|
my $cgi = Bugzilla->cgi;
|
|
my $dbh = Bugzilla->dbh;
|
|
my $user = Bugzilla->user;
|
|
|
|
# We'll need this in a loop, so do the call once.
|
|
my $user_id = $user->id;
|
|
|
|
my @queries = @{$user->queries};
|
|
my $sth_check_nl = $dbh->prepare('SELECT COUNT(*)
|
|
FROM namedqueries_link_in_footer
|
|
WHERE namedquery_id = ?
|
|
AND user_id = ?');
|
|
my $sth_insert_nl = $dbh->prepare('INSERT INTO namedqueries_link_in_footer
|
|
(namedquery_id, user_id)
|
|
VALUES (?, ?)');
|
|
my $sth_delete_nl = $dbh->prepare('DELETE FROM namedqueries_link_in_footer
|
|
WHERE namedquery_id = ?
|
|
AND user_id = ?');
|
|
my $sth_check_ngm = $dbh->prepare('SELECT COUNT(*)
|
|
FROM namedquery_group_map
|
|
WHERE namedquery_id = ?');
|
|
my $sth_insert_ngm = $dbh->prepare('INSERT INTO namedquery_group_map
|
|
(namedquery_id, group_id)
|
|
VALUES (?, ?)');
|
|
my $sth_update_ngm = $dbh->prepare('UPDATE namedquery_group_map
|
|
SET group_id = ?
|
|
WHERE namedquery_id = ?');
|
|
my $sth_delete_ngm = $dbh->prepare('DELETE FROM namedquery_group_map
|
|
WHERE namedquery_id = ?');
|
|
my $sth_direct_group_members =
|
|
$dbh->prepare('SELECT user_id
|
|
FROM user_group_map
|
|
WHERE group_id = ?
|
|
AND isbless = ' . GROUP_MEMBERSHIP . '
|
|
AND grant_type = ' . GRANT_DIRECT);
|
|
foreach my $q (@queries) {
|
|
# Update namedqueries_link_in_footer.
|
|
$sth_check_nl->execute($q->{'id'}, $user_id);
|
|
my ($link_in_footer_entries) = $sth_check_nl->fetchrow_array();
|
|
if (defined($cgi->param("link_in_footer_$q->{'id'}"))) {
|
|
if ($link_in_footer_entries == 0) {
|
|
$sth_insert_nl->execute($q->{'id'}, $user_id);
|
|
}
|
|
}
|
|
else {
|
|
if ($link_in_footer_entries > 0) {
|
|
$sth_delete_nl->execute($q->{'id'}, $user_id);
|
|
}
|
|
}
|
|
|
|
# For user's own queries, update namedquery_group_map.
|
|
if ($q->{'userid'} == $user_id) {
|
|
my ($group_id, $group_map_entries);
|
|
if ($user->in_group(Bugzilla->params->{'querysharegroup'})) {
|
|
$sth_check_ngm->execute($q->{'id'});
|
|
($group_map_entries) = $sth_check_ngm->fetchrow_array();
|
|
$group_id = $cgi->param("share_$q->{'id'}") || '';
|
|
}
|
|
if ($group_id) {
|
|
if (grep(/^\Q$group_id\E$/, @{$user->queryshare_groups()})) {
|
|
# $group_id is now definitely a valid ID of a group the
|
|
# user can see, so we can trick_taint.
|
|
trick_taint($group_id);
|
|
if ($group_map_entries == 0) {
|
|
$sth_insert_ngm->execute($q->{'id'}, $group_id);
|
|
}
|
|
else {
|
|
$sth_update_ngm->execute($group_id, $q->{'id'});
|
|
}
|
|
|
|
# If we're sharing our query with a group we can bless,
|
|
# we're subscribing direct group members to our search
|
|
# automatically. Otherwise, the group members need to
|
|
# opt in. This behaviour is deemed most likely to fit
|
|
# users' needs.
|
|
if ($user->can_bless($group_id)) {
|
|
$sth_direct_group_members->execute($group_id);
|
|
my $user_id;
|
|
while ($user_id =
|
|
$sth_direct_group_members->fetchrow_array()) {
|
|
next if $user_id == $user->id;
|
|
|
|
$sth_check_nl->execute($q->{'id'}, $user_id);
|
|
my ($already_shown_in_footer) =
|
|
$sth_check_nl->fetchrow_array();
|
|
if (! $already_shown_in_footer) {
|
|
$sth_insert_nl->execute($q->{'id'}, $user_id);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
else {
|
|
# In the unlikely case somebody removed visibility to the
|
|
# group in the meantime, don't modify sharing.
|
|
}
|
|
}
|
|
else {
|
|
if ($group_map_entries > 0) {
|
|
$sth_delete_ngm->execute($q->{'id'});
|
|
}
|
|
|
|
# Don't remove namedqueries_link_in_footer entries for users
|
|
# subscribing to the shared query. The idea is that they will
|
|
# probably want to be subscribers again should the sharing
|
|
# user choose to share the query again.
|
|
}
|
|
}
|
|
}
|
|
|
|
$user->flush_queries_cache;
|
|
|
|
# Update profiles.mybugslink.
|
|
my $showmybugslink = defined($cgi->param("showmybugslink")) ? 1 : 0;
|
|
$dbh->do("UPDATE profiles SET mybugslink = ? WHERE userid = ?",
|
|
undef, ($showmybugslink, $user->id));
|
|
$user->{'showmybugslink'} = $showmybugslink;
|
|
}
|
|
|
|
|
|
###############################################################################
|
|
# Live code (not subroutine definitions) starts here
|
|
###############################################################################
|
|
|
|
my $cgi = Bugzilla->cgi;
|
|
|
|
# This script needs direct access to the username and password CGI variables,
|
|
# so we save them before their removal in Bugzilla->login, and delete them
|
|
# prior to login if we might possibly be in an sudo session.
|
|
my $bugzilla_login = $cgi->param('Bugzilla_login');
|
|
my $bugzilla_password = $cgi->param('Bugzilla_password');
|
|
$cgi->delete('Bugzilla_login', 'Bugzilla_password') if ($cgi->cookie('sudo'));
|
|
|
|
Bugzilla->login(LOGIN_REQUIRED);
|
|
$cgi->param('Bugzilla_login', $bugzilla_login);
|
|
$cgi->param('Bugzilla_password', $bugzilla_password);
|
|
|
|
$vars->{'changes_saved'} = $cgi->param('dosave');
|
|
|
|
my $current_tab_name = $cgi->param('tab') || "account";
|
|
|
|
# The SWITCH below makes sure that this is valid
|
|
trick_taint($current_tab_name);
|
|
|
|
$vars->{'current_tab_name'} = $current_tab_name;
|
|
|
|
# Do any saving, and then display the current tab.
|
|
SWITCH: for ($current_tab_name) {
|
|
/^account$/ && do {
|
|
SaveAccount() if $cgi->param('dosave');
|
|
DoAccount();
|
|
last SWITCH;
|
|
};
|
|
/^settings$/ && do {
|
|
SaveSettings() if $cgi->param('dosave');
|
|
DoSettings();
|
|
last SWITCH;
|
|
};
|
|
/^email$/ && do {
|
|
SaveEmail() if $cgi->param('dosave');
|
|
DoEmail();
|
|
last SWITCH;
|
|
};
|
|
/^permissions$/ && do {
|
|
DoPermissions();
|
|
last SWITCH;
|
|
};
|
|
/^saved-searches$/ && do {
|
|
SaveSavedSearches() if $cgi->param('dosave');
|
|
DoSavedSearches();
|
|
last SWITCH;
|
|
};
|
|
ThrowUserError("unknown_tab",
|
|
{ current_tab_name => $current_tab_name });
|
|
}
|
|
|
|
# Generate and return the UI (HTML page) from the appropriate template.
|
|
print $cgi->header();
|
|
$template->process("account/prefs/prefs.html.tmpl", $vars)
|
|
|| ThrowTemplateError($template->error());
|