# This Source Code Form is subject to the terms of the Mozilla Public # License, v. 2.0. If a copy of the MPL was not distributed with this # file, You can obtain one at http://mozilla.org/MPL/2.0/. # # This Source Code Form is "Incompatible With Secondary Licenses", as # defined by the Mozilla Public License, v. 2.0. package Bugzilla::Bug; use 5.10.1; use strict; use warnings; use Bugzilla::Attachment; use Bugzilla::Constants; use Bugzilla::Field; use Bugzilla::Flag; use Bugzilla::FlagType; use Bugzilla::Hook; use Bugzilla::Keyword; use Bugzilla::Milestone; use Bugzilla::User; use Bugzilla::Util; use Bugzilla::Version; use Bugzilla::Error; use Bugzilla::Product; use Bugzilla::Component; use Bugzilla::Group; use Bugzilla::Status; use Bugzilla::Comment; use Bugzilla::BugUrl; use Bugzilla::BugUserLastVisit; use Bugzilla::WebService::Util qw(filter); use List::MoreUtils qw(apply firstidx uniq part); use List::Util qw(min max first); use Regexp::Common; use Storable qw(dclone); use URI; use URI::QueryParam; use Scalar::Util qw(blessed weaken); use parent qw(Bugzilla::Object Exporter); @Bugzilla::Bug::EXPORT = qw( bug_alias_to_id LogActivityEntry editable_bug_fields ); # This hash keeps a weak copy of every bug created. my %CLEANUP; ##################################################################### # Constants ##################################################################### use constant DB_TABLE => 'bugs'; use constant ID_FIELD => 'bug_id'; use constant NAME_FIELD => 'bug_id'; use constant LIST_ORDER => ID_FIELD; # Bugs have their own auditing table, bugs_activity. use constant AUDIT_CREATES => 0; use constant AUDIT_UPDATES => 0; # This will be enabled later use constant USE_MEMCACHED => 0; # This is a sub because it needs to call other subroutines. sub DB_COLUMNS { my $dbh = Bugzilla->dbh; my @custom = grep { $_->type != FIELD_TYPE_MULTI_SELECT && $_->type != FIELD_TYPE_ONE_SELECT } Bugzilla->active_custom_fields; my @custom_names = map { $_->name } @custom; my @columns = ( qw( assigned_to bug_file_loc bug_id bug_severity bug_status cclist_accessible component_id creation_ts delta_ts estimated_time everconfirmed lastdiffed op_sys priority product_id qa_contact remaining_time rep_platform reporter_accessible resolution short_desc status_whiteboard target_milestone version ), 'reporter AS reporter_id', $dbh->sql_date_format('deadline', '%Y-%m-%d') . ' AS deadline', @custom_names ); Bugzilla::Hook::process("bug_columns", {columns => \@columns}); return @columns; } sub VALIDATORS { my $validators = { alias => \&_check_alias, assigned_to => \&_check_assigned_to, blocked => \&_check_dependencies, bug_file_loc => \&_check_bug_file_loc, bug_severity => \&_check_select_field, bug_status => \&_check_bug_status, cc => \&_check_cc, comment => \&_check_comment, component => \&_check_component, creation_ts => \&_check_creation_ts, deadline => \&_check_deadline, dependson => \&_check_dependencies, dup_id => \&_check_dup_id, estimated_time => \&_check_time_field, everconfirmed => \&Bugzilla::Object::check_boolean, groups => \&_check_groups, keywords => \&_check_keywords, op_sys => \&_check_select_field, priority => \&_check_priority, product => \&_check_product, qa_contact => \&_check_qa_contact, ## REDHAT EXTENSION START 876015 docs_contact => \&_check_docs_contact, ## REDHAT EXTENSION END 876015 remaining_time => \&_check_time_field, rep_platform => \&_check_select_field, resolution => \&_check_resolution, short_desc => \&_check_short_desc, status_whiteboard => \&_check_status_whiteboard, target_milestone => \&_check_target_milestone, target_release => \&_check_target_release, version => \&_check_version, cclist_accessible => \&Bugzilla::Object::check_boolean, reporter_accessible => \&Bugzilla::Object::check_boolean, }; # Set up validators for custom fields. foreach my $field (Bugzilla->active_custom_fields) { my $validator; if ($field->type == FIELD_TYPE_SINGLE_SELECT) { $validator = \&_check_select_field; } elsif ($field->type == FIELD_TYPE_MULTI_SELECT) { $validator = \&_check_multi_select_field; } elsif ($field->type == FIELD_TYPE_ONE_SELECT) { $validator = \&_check_single_select_field; } elsif ($field->type == FIELD_TYPE_DATETIME) { $validator = \&_check_datetime_field; } elsif ($field->type == FIELD_TYPE_DATE) { $validator = \&_check_date_field; } elsif ($field->type == FIELD_TYPE_FREETEXT) { $validator = \&_check_freetext_field; } elsif ($field->type == FIELD_TYPE_BUG_ID) { $validator = \&_check_bugid_field; } elsif ($field->type == FIELD_TYPE_TEXTAREA) { $validator = \&_check_textarea_field; } elsif ($field->type == FIELD_TYPE_INTEGER) { $validator = \&_check_integer_field; } else { $validator = \&_check_default_field; } $validators->{$field->name} = $validator; } return $validators; } sub VALIDATOR_DEPENDENCIES { my $cache = Bugzilla->request_cache; return $cache->{bug_validator_dependencies} if $cache->{bug_validator_dependencies}; my %deps = ( assigned_to => ['component'], blocked => ['product'], bug_status => ['product', 'comment', 'target_milestone'], cc => ['component'], comment => ['creation_ts'], component => ['product'], dependson => ['product'], dup_id => ['bug_status', 'resolution'], groups => ['product'], keywords => ['product'], resolution => ['bug_status', 'dependson'], qa_contact => ['component'], ## REDHAT EXTENSION START 876015 docs_contact => ['component'], ## REDHAT EXTENSION END 876015 target_milestone => ['product'], target_release => ['product'], version => ['product'], ); foreach my $field (@{Bugzilla->fields}) { $deps{$field->name} = [$field->visibility_field->name] if $field->{visibility_field_id}; } ## REDHAT EXTENSION BEGIN 815549 # We need the groups and product sorted before we process the CC:s push @{$deps{cc}}, 'groups', 'product'; ## REDHAT EXTENSION END 815549 $cache->{bug_validator_dependencies} = \%deps; return \%deps; } sub UPDATE_COLUMNS { my @custom = grep { $_->type != FIELD_TYPE_MULTI_SELECT && $_->type != FIELD_TYPE_ONE_SELECT } Bugzilla->active_custom_fields; my @custom_names = map { $_->name } @custom; ## REDHAT EXTENSION 876015: Add docs_contact my @columns = qw( assigned_to bug_file_loc bug_severity bug_status cclist_accessible component_id deadline estimated_time everconfirmed op_sys priority product_id qa_contact docs_contact remaining_time rep_platform reporter_accessible resolution short_desc status_whiteboard target_milestone version ); push(@columns, @custom_names); return @columns; } use constant NUMERIC_COLUMNS => qw( estimated_time remaining_time ); sub DATE_COLUMNS { my @fields = (@{Bugzilla->fields({type => [FIELD_TYPE_DATETIME, FIELD_TYPE_DATE]})}); return map { $_->name } @fields; } # Used in LogActivityEntry(). Gives the max length of lines in the # activity table. use constant MAX_LINE_LENGTH => 254; # This maps the names of internal Bugzilla bug fields to things that would # make sense to somebody who's not intimately familiar with the inner workings # of Bugzilla. (These are the field names that the WebService and email_in.pl # use.) use constant FIELD_MAP => { blocks => 'blocked', commentprivacy => 'comment_is_private', creation_time => 'creation_ts', creator => 'reporter', description => 'comment', depends_on => 'dependson', depends_on_all => 'dependson_all', dupe_of => 'dup_id', id => 'bug_id', is_confirmed => 'everconfirmed', is_cc_accessible => 'cclist_accessible', is_creator_accessible => 'reporter_accessible', last_change_time => 'delta_ts', platform => 'rep_platform', severity => 'bug_severity', status => 'bug_status', summary => 'short_desc', url => 'bug_file_loc', whiteboard => 'status_whiteboard', ## REDHAT EXTENSION 653316 sub_components => 'rh_sub_components', }; use constant REQUIRED_FIELD_MAP => {product_id => 'product', component_id => 'component',}; # Creation timestamp is here because it needs to be validated # but it can be NULL in the database (see comments in create above) # # Target Milestone is here because it has a default that the validator # creates (product.defaultmilestone) that is different from the database # default. # # CC is here because it is a separate table, and has a validator-created # default of the component initialcc. # # QA Contact is allowed to be NULL in the database, so it wouldn't normally # be caught by _required_create_fields. However, it always has to be validated, # because it has a default of the component.defaultqacontact. # # Groups are in a separate table, but must always be validated so that # mandatory groups get set on bugs. ## REDHAT EXTENSION 876015: Add docs_contact ## REDHAT EXTENSION 965151: Add target_release use constant EXTRA_REQUIRED_FIELDS => qw(creation_ts target_milestone cc qa_contact docs_contact groups target_release); ##################################################################### sub new { my $invocant = shift; my $class = ref($invocant) || $invocant; my $param = shift; # Remove leading "#" mark if we've just been passed an id. if (defined $param && !ref $param && $param =~ /^#([0-9]+)$/) { $param = $1; } # If we get something that looks like a word (not a number), # make it the "name" param. if ( !defined $param || (!ref($param) && $param !~ /^[0-9]+$/) || (ref($param) && $param->{id} !~ /^[0-9]+$/)) { if ($param) { my $alias = ref($param) ? $param->{id} : $param; my $bug_id = bug_alias_to_id($alias); if (!$bug_id) { my $error_self = {}; bless $error_self, $class; $error_self->{'bug_id'} = $alias; $error_self->{'error'} = 'InvalidBugId'; return $error_self; } $param = {id => $bug_id, cache => ref($param) ? $param->{cache} : 0}; } else { # We got something that's not a number. my $error_self = {}; bless $error_self, $class; $error_self->{'bug_id'} = $param; $error_self->{'error'} = 'InvalidBugId'; return $error_self; } } unshift @_, $param; my $self = $class->SUPER::new(@_); # Bugzilla::Bug->new always returns something, but sets $self->{error} # if the bug wasn't found in the database. if (!$self) { my $error_self = {}; if (ref $param) { $error_self->{bug_id} = $param->{name}; $error_self->{error} = 'InvalidBugId'; } else { $error_self->{bug_id} = $param; $error_self->{error} = 'NotFound'; } bless $error_self, $class; return $error_self; } $CLEANUP{$self->id} = $self; weaken($CLEANUP{$self->id}); return $self; } sub initialize { $_[0]->_create_cf_accessors(); } sub object_cache_key { my $class = shift; my $key = $class->SUPER::object_cache_key(@_) || return; return $key . ',' . Bugzilla->user->id; } # This is called by Bugzilla::_cleanup() at the end of requests in a persistent environment # (such as mod_perl) sub CLEANUP { foreach my $bug (values %CLEANUP) { # $bug will be undef if there are no other references to it. next unless $bug; delete $bug->{depends_on_obj}; delete $bug->{blocks_obj}; } %CLEANUP = (); } sub check { my $class = shift; my ($param, $field) = @_; # Bugzilla::Bug throws lots of special errors, so we don't call # SUPER::check, we just call our new and do our own checks. my $id = ref($param) ? ($param->{id} = trim($param->{id})) : ($param = trim($param)); ThrowUserError('improper_bug_id_field_value', {field => $field}) unless defined $id; my $self = $class->new($param); if ($self->{error}) { # For error messages, use the id that was returned by new(), because # it's cleaned up. $id = $self->id if ($self->id); if ($self->{error} eq 'NotFound') { ThrowUserError("bug_id_does_not_exist", {bug_id => $id}); } if ($self->{error} eq 'InvalidBugId') { ThrowUserError("improper_bug_id_field_value", {bug_id => $id, field => $field}); } } unless ($field && $field =~ /^(dependson|blocked|dup_id)$/) { $self->check_is_visible($id); } return $self; } sub check_for_edit { my $class = shift; my $bug = $class->check(@_); Bugzilla->user->can_edit_product($bug->product_id) || ThrowUserError("product_edit_denied", {product => $bug->product}); return $bug; } sub check_is_visible { my ($self, $input_id) = @_; $input_id ||= $self->id; my $user = Bugzilla->user; if (!$user->can_see_bug($self->id)) { # The error the user sees depends on whether or not they are # logged in (i.e. $user->id contains the user's positive integer ID). # If we are validating an alias, then use it in the error message # instead of its corresponding bug ID, to not disclose it. if ($user->id) { ThrowUserError("bug_access_denied", {bug_id => $input_id}); } else { ThrowUserError("bug_access_query", {bug_id => $input_id}); } } } sub match { my $class = shift; my ($params) = @_; # Allow matching certain fields by name (in addition to matching by ID). my %translate_fields = ( assigned_to => 'Bugzilla::User', qa_contact => 'Bugzilla::User', ## REDHAT EXTENSION START 876015 docs_contact => 'Bugzilla::User', ## REDHAT EXTENSION END 876015 reporter => 'Bugzilla::User', product => 'Bugzilla::Product', component => 'Bugzilla::Component', ); my %translated; foreach my $field (keys %translate_fields) { my @ids; # Convert names to ids. We use "exists" everywhere since people can # legally specify "undef" to mean IS NULL (even though most of these # fields can't be NULL, people can still specify it...). if (exists $params->{$field}) { my $names = $params->{$field}; my $type = $translate_fields{$field}; my $param = $type eq 'Bugzilla::User' ? 'login_name' : 'name'; # We call Bugzilla::Object::match directly to avoid the # Bugzilla::User::match implementation which is different. my $objects = Bugzilla::Object::match($type, {$param => $names}); push(@ids, map { $_->id } @$objects); } # You can also specify ids directly as arguments to this function, # so include them in the list if they have been specified. if (exists $params->{"${field}_id"}) { my $current_ids = $params->{"${field}_id"}; my @id_array = ref $current_ids ? @$current_ids : ($current_ids); push(@ids, @id_array); } # We do this "or" instead of a "scalar(@ids)" to handle the case # when people passed only invalid object names. Otherwise we'd # end up with a SUPER::match call with zero criteria (which dies). if (exists $params->{$field} or exists $params->{"${field}_id"}) { $translated{$field} = scalar(@ids) == 1 ? $ids[0] : \@ids; } } # The user fields don't have an _id on the end of them in the database, # but the product & component fields do, so we have to have separate # code to deal with the different sets of fields here. foreach my $field (qw(assigned_to qa_contact reporter)) { delete $params->{"${field}_id"}; $params->{$field} = $translated{$field} if exists $translated{$field}; } foreach my $field (qw(product component)) { delete $params->{$field}; $params->{"${field}_id"} = $translated{$field} if exists $translated{$field}; } ## REDHAT EXTENSION BEGIN 814476 if (my $alias = delete $params->{alias}) { my $q = (ref $alias eq 'ARRAY' and scalar(@$alias) > 1) ? 'IN (' . join(',', (('?') x scalar(@$alias))) . ')' : '= ?'; ## REDHAT EXTENSION - 1853587 - caseless $params->{WHERE} ->{"bug_id IN (SELECT bug_id FROM bugs_aliases WHERE lower(alias) $q)"} = lc($alias); } ## REDHAT EXTENSION END 814476 ## REDHAT EXTENSION BEGIN 584957 if (my $component_id = delete $params->{component_id}) { if (ref $component_id ne 'ARRAY') { $component_id = [$component_id]; } my $q = scalar(@$component_id) > 1 ? 'IN (' . join(',', (('?') x scalar(@$component_id))) . ')' : '= ?'; my $sql = " (bug_id IN (SELECT bug_id FROM bugs b JOIN rh_multiple_bug_components mbc USING (bug_id) JOIN components c ON (c.id = mbc.component_id) WHERE c.id $q ) OR bugs.component_id $q )"; if (scalar(@$component_id)) { $params->{WHERE}->{$sql} = [@$component_id, @$component_id]; } else { $params->{WHERE}->{$sql} = ['', '']; } } ## REDHAT EXTENSION END 584957 ## REDHAT EXTENSION BEGIN 584954 if (my $version = delete $params->{version}) { if (ref $version ne 'ARRAY') { $version = [$version]; } my $q = scalar(@$version) > 1 ? 'IN (' . join(',', (('?') x scalar(@$version))) . ')' : '= ?'; my $sql = " ( bug_id IN ( SELECT bug_id FROM rh_multiple_bug_versions mbv JOIN versions v ON (mbv.version_id = v.id) WHERE v.value $q) OR bugs.version $q )"; $params->{WHERE}->{$sql} = [@$version, @$version]; } ## REDHAT EXTENSION END 584954 # Match blocked and dependson if (my $blocked = delete $params->{blocked}) { my $q = (ref $blocked eq 'ARRAY' and scalar(@$blocked) > 1) ? 'IN (' . join(',', (('?') x scalar(@$blocked))) . ')' : '= ?'; $params->{WHERE} ->{"bug_id IN (SELECT dependson FROM dependencies WHERE blocked $q)"} = $blocked; } if (my $depends_on = delete $params->{dependson}) { my $q = (ref $depends_on eq 'ARRAY' and scalar(@$depends_on) > 1) ? 'IN (' . join(',', (('?') x scalar(@$depends_on))) . ')' : '= ?'; $params->{WHERE} ->{"bug_id IN (SELECT blocked FROM dependencies WHERE dependson $q)"} = $depends_on; } # Match keywords if (my $keywords = delete $params->{keywords}) { my $q = (ref $keywords eq 'ARRAY' and scalar(@$keywords) > 1) ? 'IN (' . join(',', (('?') x scalar(@$keywords))) . ')' : '= ?'; my $query = " bug_id IN ( SELECT bug_id FROM keywords JOIN keyworddefs ON keywords.keywordid = keyworddefs.id WHERE keyworddefs.name $q )"; $params->{WHERE}->{$query} = $keywords; } return $class->SUPER::match(@_); } # Helps load up information for bugs for show_bug.cgi and other situations # that will need to access info on lots of bugs. sub preload { my ($class, $bugs) = @_; my $user = Bugzilla->user; # It would be faster but MUCH more complicated to select all the # deps for the entire list in one SQL statement. If we ever have # a profile that proves that that's necessary, we can switch over # to the more complex method. my @all_dep_ids; foreach my $bug (@$bugs) { push @all_dep_ids, @{$bug->blocked}, @{$bug->dependson}; push @all_dep_ids, @{$bug->duplicate_ids}; push @all_dep_ids, @{$bug->_preload_referenced_bugs}; } @all_dep_ids = uniq @all_dep_ids; # If we don't do this, can_see_bug will do one call per bug in # the dependency and duplicate lists, in Bugzilla::Template::get_bug_link. $user->visible_bugs(\@all_dep_ids); } # Helps load up bugs referenced in comments by retrieving them with a single # query from the database and injecting bug objects into the object-cache. sub _preload_referenced_bugs { my $self = shift; # inject current duplicates into the object-cache first foreach my $bug (@{$self->duplicates}) { $bug->object_cache_set() unless Bugzilla::Bug->object_cache_get($bug->id); } # preload bugs from comments my $referenced_bug_ids = _extract_bug_ids($self->comments); my @ref_bug_ids = grep { !Bugzilla::Bug->object_cache_get($_) } @$referenced_bug_ids; # inject into object-cache my $referenced_bugs = Bugzilla::Bug->new_from_list(\@ref_bug_ids); $_->object_cache_set() foreach @$referenced_bugs; return $referenced_bug_ids; } # Extract bug IDs mentioned in comments. This is much faster than calling quoteUrls(). sub _extract_bug_ids { my $comments = shift; my @bug_ids; my $params = Bugzilla->params; my @urlbases = ($params->{'urlbase'}); push(@urlbases, $params->{'sslbase'}) if $params->{'sslbase'}; my $urlbase_re = '(?:' . join('|', map {qr/$_/} @urlbases) . ')'; my $bug_word = template_var('terms')->{bug}; my $bugs_word = template_var('terms')->{bugs}; foreach my $comment (@$comments) { if ($comment->type == CMT_HAS_DUPE || $comment->type == CMT_DUPE_OF) { push @bug_ids, $comment->extra_data; next; } my $s = $comment->already_wrapped ? qr/\s/ : qr/\h/; my $text = $comment->body; # Full bug links push @bug_ids, $text =~ /\b$urlbase_re\Qshow_bug.cgi?id=\E([0-9]+)(?:\#c[0-9]+)?/g; # bug X my $bug_re = qr/\Q$bug_word\E$s*\#?$s*([0-9]+)/i; push @bug_ids, $text =~ /\b$bug_re/g; # bugs X, Y, Z my $bugs_re = qr/\Q$bugs_word\E$s*\#?$s*([0-9]+)(?:$s*,$s*\#?$s*([0-9]+))+/i; push @bug_ids, $text =~ /\b$bugs_re/g; # Old duplicate markers push @bug_ids, $text =~ /(?<=^\*\*\*\ This\ bug\ has\ been\ marked\ as\ a\ duplicate\ of\ )([0-9]+)(?=\ \*\*\*\Z)/; } # Make sure to filter invalid bug IDs. @bug_ids = grep { $_ < MAX_INT_32 } @bug_ids; return [uniq @bug_ids]; } sub possible_duplicates { my ($class, $params) = @_; my $short_desc = $params->{summary}; my $products = $params->{products} || []; my $limit = $params->{limit} || MAX_POSSIBLE_DUPLICATES; $limit = MAX_POSSIBLE_DUPLICATES if $limit > MAX_POSSIBLE_DUPLICATES; $products = [$products] if !ref($products) eq 'ARRAY'; my $orig_limit = $limit; detaint_natural($limit) || ThrowCodeError('param_must_be_numeric', {function => 'possible_duplicates', param => $orig_limit}); my $dbh = Bugzilla->dbh; my $user = Bugzilla->user; my @words = split(/[\b\s]+/, $short_desc || ''); # Remove leading/trailing punctuation from words foreach my $word (@words) { $word =~ s/(?:^\W+|\W+$)//g; } # And make sure that each word is longer than 2 characters. @words = grep { defined $_ and length($_) > 2 } @words; return [] if !@words; my ($where_sql, $relevance_sql); if ($dbh->FULLTEXT_OR) { my $joined_terms = join($dbh->FULLTEXT_OR, @words); ($where_sql, $relevance_sql) = $dbh->sql_fulltext_search('bugs_fulltext.short_desc', $joined_terms); $relevance_sql ||= $where_sql; } else { my (@where, @relevance); foreach my $word (@words) { my ($term, $rel_term) = $dbh->sql_fulltext_search('bugs_fulltext.short_desc', $word); push(@where, $term); push(@relevance, $rel_term || $term); } $where_sql = join(' OR ', @where); $relevance_sql = join(' + ', @relevance); } my $product_ids = join(',', map { $_->id } @$products); my $product_sql = $product_ids ? "AND product_id IN ($product_ids)" : ""; # Because we collapse duplicates, we want to get slightly more bugs # than were actually asked for. my $sql_limit = $limit + 5; my $possible_dupes = $dbh->selectall_arrayref( "SELECT bugs.bug_id AS bug_id, bugs.resolution AS resolution, ($relevance_sql) AS relevance FROM bugs INNER JOIN bugs_fulltext ON bugs.bug_id = bugs_fulltext.bug_id WHERE ($where_sql) $product_sql ORDER BY relevance DESC, bug_id DESC " . $dbh->sql_limit($sql_limit), {Slice => {}} ); my @actual_dupe_ids; # Resolve duplicates into their ultimate target duplicates. foreach my $bug (@$possible_dupes) { my $push_id = $bug->{bug_id}; if ($bug->{resolution} && $bug->{resolution} eq 'DUPLICATE') { $push_id = _resolve_ultimate_dup_id($bug->{bug_id}); } push(@actual_dupe_ids, $push_id); } @actual_dupe_ids = uniq @actual_dupe_ids; if (scalar @actual_dupe_ids > $limit) { @actual_dupe_ids = @actual_dupe_ids[0 .. ($limit - 1)]; } my $visible = $user->visible_bugs(\@actual_dupe_ids); return $class->new_from_list($visible); } # Docs for create() (there's no POD in this file yet, but we very # much need this documented right now): # # The same as Bugzilla::Object->create. Parameters are only required # if they say so below. # # Params: # # C - B The name of the product this bug is being # filed against. # C - B The name of the component this bug is being # filed against. # # C - B The severity for the bug, a string. # C - B A SQL timestamp for when the bug was created. # C - B A summary for the bug. # C - B The OS the bug was found against. # C - B The initial priority for the bug. # C - B The platform the bug was found against. # C - B The version of the product the bug was found in. # # C - An alias for this bug. # C - When this bug is expected to be fixed. # C - When this bug is expected to be fixed. # C - A string. # C - The initial status of the bug, a string. # C - The URL field. # # C - The full login name of the user who the bug is # initially assigned to. # C - The full login name of the QA Contact for this bug. # Will be ignored if C is off. # C - The full login name of the Docs Contact for this bug. # Will be ignored if C is off. # # C - For time-tracking. Will be ignored if # C is not set, or if the current # user is not a member of the timetrackinggroup. # C - For time-tracking. Will be ignored for the same # reasons as C. # C - An array of flags that will be applied to the bug. sub create { my ($class, $params) = @_; my $dbh = Bugzilla->dbh; $dbh->bz_start_transaction(); foreach my $fld (@{Bugzilla->fields({obsolete => 0, custom => 1})}) { next if($fld->name eq 'cf_clone_of'); if(defined $params->{$fld->name} && !$fld->user_can_edit(Bugzilla->user)){ ThrowUserError('illegal_change', {field => $fld->name}); } } my $deleted_params = {}; Bugzilla::Hook::process('bug_before_create', {params => $params, deleted_params => $deleted_params}); # These fields have default values which we can use if they are undefined. $params->{bug_severity} = Bugzilla->params->{defaultseverity} unless defined $params->{bug_severity}; $params->{priority} = Bugzilla->params->{defaultpriority} unless defined $params->{priority}; $params->{op_sys} = Bugzilla->params->{defaultopsys} unless defined $params->{op_sys}; $params->{rep_platform} = Bugzilla->params->{defaultplatform} unless defined $params->{rep_platform}; # Make sure a comment is always defined. $params->{comment} = '' unless defined $params->{comment}; $class->check_required_create_fields($params); $params = $class->run_create_validators($params); # These are not a fields in the bugs table, so we don't pass them to # insert_create_data. my $bug_aliases = delete $params->{alias}; my $cc_ids = delete $params->{cc}; my $groups = delete $params->{groups}; my $depends_on = delete $params->{dependson}; my $blocked = delete $params->{blocked}; my $keywords = delete $params->{keywords}; my $creation_comment = delete $params->{comment}; my $see_also = delete $params->{see_also}; ## REDHAT EXTENSION START 706784 877243 my $target_release = delete $params->{target_release}; ## REDHAT EXTENSION END 706784 877243 ## REDHAT EXTENSION BEGIN 1175096 my $extra_components = delete $params->{extra_components}; my $extra_versions = delete $params->{extra_versions}; ## REDHAT EXTENSION BEGIN 1175096 ## REDHAT EXTENSION 653316 my $rh_sub_components = delete $params->{rh_sub_components}; # We don't want the bug to appear in the system until it's correctly # protected by groups. my $timestamp = delete $params->{creation_ts}; my $flags = delete $params->{flags}; my $ms_values = $class->_extract_multi_selects($params); my $ext_values = $class->_extract_single_external($params); my $bug = $class->insert_create_data($params); # Add the group restrictions my $sth_group = $dbh->prepare('INSERT INTO bug_group_map (bug_id, group_id) VALUES (?, ?)'); foreach my $group (@$groups) { $sth_group->execute($bug->bug_id, $group->id); } $dbh->do('UPDATE bugs SET creation_ts = ? WHERE bug_id = ?', undef, $timestamp, $bug->bug_id); # Update the bug instance as well $bug->{creation_ts} = $timestamp; # Add the CCs my $sth_cc = $dbh->prepare('INSERT INTO cc (bug_id, who) VALUES (?,?)'); foreach my $user_id (@$cc_ids) { $sth_cc->execute($bug->bug_id, $user_id); } # Add in keywords my $sth_keyword = $dbh->prepare('INSERT INTO keywords (bug_id, keywordid) VALUES (?, ?)'); foreach my $keyword_id (map($_->id, @$keywords)) { $sth_keyword->execute($bug->bug_id, $keyword_id); } # Set up dependencies (blocked/dependson) my $sth_deps = $dbh->prepare( 'INSERT INTO dependencies (blocked, dependson) VALUES (?, ?)'); my $sth_bug_time = $dbh->prepare('UPDATE bugs SET delta_ts = ? WHERE bug_id = ?'); foreach my $depends_on_id (@$depends_on) { $sth_deps->execute($bug->bug_id, $depends_on_id); # Log the reverse action on the other bug. LogActivityEntry($depends_on_id, 'blocked', '', $bug->bug_id, $bug->{reporter_id}, $timestamp); $sth_bug_time->execute($timestamp, $depends_on_id); } foreach my $blocked_id (@$blocked) { $sth_deps->execute($blocked_id, $bug->bug_id); # Log the reverse action on the other bug. LogActivityEntry($blocked_id, 'dependson', '', $bug->bug_id, $bug->{reporter_id}, $timestamp); $sth_bug_time->execute($timestamp, $blocked_id); } # Insert the values into the multiselect value tables foreach my $field (keys %$ms_values) { $dbh->do("DELETE FROM bug_$field where bug_id = ?", undef, $bug->bug_id); foreach my $value (@{$ms_values->{$field}}) { $dbh->do("INSERT INTO bug_$field (bug_id, value) VALUES (?,?)", undef, $bug->bug_id, $value); } } # Insert the values into the multiselect value tables foreach my $field (keys %$ext_values) { $dbh->do("DELETE FROM bug_$field where bug_id = ?", undef, $bug->bug_id); $dbh->do("INSERT INTO bug_$field (bug_id, value) VALUES (?,?)", undef, $bug->bug_id, $ext_values->{$field}) if ($ext_values->{$field}); } ## REDHAT EXTENSION 1188085 BEGIN # Apply any flags. if (defined $flags) { $bug->set_flags($flags); foreach my $flag (@{$bug->flags}) { Bugzilla::Flag->create($flag); } delete $bug->{'flag_types'}; } ## REDHAT EXTENSION 1188085 END # Insert any see_also values if ($see_also) { my $see_also_array = $see_also; if (!ref $see_also_array) { $see_also = trim($see_also); $see_also_array = [split(/[\s,]+/, $see_also)]; } foreach my $value (@$see_also_array) { $bug->add_see_also($value); } foreach my $see_also (@{$bug->see_also}) { $see_also->insert_create_data($see_also); } foreach my $ref_bug (@{$bug->{_update_ref_bugs} || []}) { $ref_bug->update(); } delete $bug->{_update_ref_bugs}; } # Comment #0 handling... # We now have a bug id so we can fill this out $creation_comment->{'bug_id'} = $bug->id; # Insert the comment. We always insert a comment on bug creation, # but sometimes it's blank. Bugzilla::Comment->insert_create_data($creation_comment); # Set up aliases my $sth_aliases = $dbh->prepare('INSERT INTO bugs_aliases (alias, bug_id) VALUES (?, ?)'); foreach my $alias (@$bug_aliases) { trick_taint($alias); $sth_aliases->execute($alias, $bug->bug_id); } ## REDHAT EXTENSION START 706784 877243 # Add the target releases values my $sth_release = $dbh->prepare('INSERT INTO bugs_release (value, bug_id) VALUES (?, ?)'); foreach my $release (@$target_release) { trick_taint($release); $sth_release->execute($release, $bug->bug_id); } ## REDHAT EXTENSION END 706784 877243 ## REDHAT EXTENSION START 653316 # Add the sub component values if (Bugzilla->params->{usesubcomponents}) { my $sth_comp = $dbh->prepare( 'INSERT INTO bug_rh_sub_components (rh_sub_component_id, bug_id) VALUES (?, ?)' ); foreach my $sub_comp (@$rh_sub_components) { $sth_comp->execute($sub_comp->id, $bug->bug_id); } } ## REDHAT EXTENSION END 653316 ## REDHAT EXTENSION BEGIN 1175096 if (defined($extra_components)) { my $query = 'INSERT INTO rh_multiple_bug_components (bug_id, component_id)' . ' VALUES(?, (SELECT id FROM components WHERE name = ? AND product_id = ?))'; my $sth_mc = $dbh->prepare($query); foreach my $comp (@$extra_components) { trick_taint($comp); $sth_mc->execute($bug->id, $comp, $bug->product_id); } } if (defined($extra_versions)) { my $query = 'INSERT INTO rh_multiple_bug_versions (bug_id, version_id)' . ' VALUES(?, (SELECT id FROM versions WHERE value = ? AND product_id = ?))'; my $sth_mv = $dbh->prepare($query); foreach my $ver (@$extra_versions) { trick_taint($ver); $sth_mv->execute($bug->id, $ver, $bug->product_id); } } ## REDHAT EXTENSION END 1175096 Bugzilla::Hook::process( 'bug_end_of_create', { bug => $bug, timestamp => $timestamp, params => $params, deleted_params => $deleted_params } ); ## REDHAT EXTENSION START 1171556 $bug->_sync_fulltext(new_bug => 1) if (!Bugzilla->is_mysql()); ## REDHAT EXTENSION END 1171556 $dbh->bz_commit_transaction(); # Because MySQL doesn't support transactions on the fulltext table, # we do this after we've committed the transaction. That way we're # sure we're inserting a good Bug ID. ## REDHAT EXTENSION START 1171556 $bug->_sync_fulltext(new_bug => 1) if (Bugzilla->is_mysql()); ## REDHAT EXTENSION END 1171556 return $bug; } sub run_create_validators { my $class = shift; my $params = $class->SUPER::run_create_validators(@_); # Add classification for checking mandatory fields which depend on it $params->{classification} = $params->{product}->classification->name; my @mandatory_fields = @{Bugzilla->fields({is_mandatory => 1, enter_bug => 1, obsolete => 0})}; foreach my $field (@mandatory_fields) { $class->_check_field_is_mandatory($params->{$field->name}, $field, $params); } my $product = delete $params->{product}; $params->{product_id} = $product->id; my $component = delete $params->{component}; $params->{component_id} = $component->id; # Callers cannot set reporter, creation_ts, or delta_ts. $params->{reporter} = $class->_check_reporter(); $params->{delta_ts} = $params->{creation_ts}; if ($params->{estimated_time}) { $params->{remaining_time} = $params->{estimated_time}; } ## REDHAT EXTENSION 876015: Add docs_contact $class->_check_strict_isolation($params->{cc}, $params->{assigned_to}, $params->{qa_contact}, $params->{docs_contact}, $product); # You can't set these fields. delete $params->{lastdiffed}; delete $params->{bug_id}; delete $params->{classification}; Bugzilla::Hook::process('bug_end_of_create_validators', {params => $params}); # And this is not a valid DB field, it's just used as part of # _check_dependencies to avoid running it twice for both blocked # and dependson. delete $params->{_dependencies_validated}; return $params; } sub update { my $self = shift; my $dbh = Bugzilla->dbh; my $user = Bugzilla->user; # XXX This is just a temporary hack until all updating happens # inside this function. my $delta_ts = shift || $dbh->selectrow_array('SELECT LOCALTIMESTAMP(0)'); $dbh->bz_start_transaction(); my ($changes, $old_bug) = $self->SUPER::update(@_); Bugzilla::Hook::process( 'bug_start_of_update', { timestamp => $delta_ts, bug => $self, old_bug => $old_bug, changes => $changes } ); # Certain items in $changes have to be fixed so that they hold # a name instead of an ID. foreach my $field (qw(product_id component_id)) { my $change = delete $changes->{$field}; if ($change) { my $new_field = $field; $new_field =~ s/_id$//; $changes->{$new_field} = [$self->{"_old_${new_field}_name"}, $self->$new_field]; } } ## REDHAT EXTENSION 876015: Add docs_contact foreach my $field (qw(qa_contact docs_contact assigned_to)) { if ($changes->{$field}) { my ($from, $to) = @{$changes->{$field}}; $from = $old_bug->$field->login if $from; $to = $self->$field->login if $to; $changes->{$field} = [$from, $to]; } } # CC my @old_cc = map { $_->id } @{$old_bug->cc_users}; my @new_cc = map { $_->id } @{$self->cc_users}; my ($removed_cc, $added_cc) = diff_arrays(\@old_cc, \@new_cc); if (scalar @$removed_cc) { $dbh->do( 'DELETE FROM cc WHERE bug_id = ? AND ' . $dbh->sql_in('who', $removed_cc), undef, $self->id); } foreach my $user_id (@$added_cc) { $dbh->do('INSERT INTO cc (bug_id, who) VALUES (?,?)', undef, $self->id, $user_id); } # If any changes were found, record it in the activity log if (scalar @$removed_cc || scalar @$added_cc) { my $removed_users = Bugzilla::User->new_from_list($removed_cc); my $added_users = Bugzilla::User->new_from_list($added_cc); my $removed_names = join(', ', (map { $_->login } @$removed_users)); my $added_names = join(', ', (map { $_->login } @$added_users)); $changes->{cc} = [$removed_names, $added_names]; } # Aliases my $old_aliases = $old_bug->alias; my $new_aliases = $self->alias; my ($removed_aliases, $added_aliases) = diff_arrays($old_aliases, $new_aliases); foreach my $alias (@$removed_aliases) { ## REDHAT EXTENSION - 1853587 - caseless $dbh->do('DELETE FROM bugs_aliases WHERE bug_id = ? AND lower(alias) = ?', undef, $self->id, lc($alias)); } foreach my $alias (@$added_aliases) { trick_taint($alias); $dbh->do('INSERT INTO bugs_aliases (bug_id, alias) VALUES (?,?)', undef, $self->id, $alias); } # If any changes were found, record it in the activity log if (scalar @$removed_aliases || scalar @$added_aliases) { $changes->{alias} = [join(', ', @$removed_aliases), join(', ', @$added_aliases)]; } ## REDHAT EXTENSION START 706784 877243 my $old_releases = $old_bug->target_release; my $new_releases = $self->target_release; my ($removed_releases, $added_releases) = diff_arrays($old_releases, $new_releases); foreach my $release (@$removed_releases) { $dbh->do('DELETE FROM bugs_release WHERE bug_id = ? AND value = ?', undef, $self->id, $release); } foreach my $release (@$added_releases) { trick_taint($release); $dbh->do('INSERT INTO bugs_release (bug_id, value) VALUES (?,?)', undef, $self->id, $release); } # If any changes were found, record it in the activity log if (scalar @$removed_releases || scalar @$added_releases) { $changes->{target_release} = [join(', ', @$removed_releases), join(', ', @$added_releases)]; } ## REDHAT EXTENSION END 706784 877243 # Keywords my @old_kw_ids = map { $_->id } @{$old_bug->keyword_objects}; my @new_kw_ids = map { $_->id } @{$self->keyword_objects}; my ($removed_kw, $added_kw) = diff_arrays(\@old_kw_ids, \@new_kw_ids); if (scalar @$removed_kw) { $dbh->do( 'DELETE FROM keywords WHERE bug_id = ? AND ' . $dbh->sql_in('keywordid', $removed_kw), undef, $self->id ); } foreach my $keyword_id (@$added_kw) { $dbh->do('INSERT INTO keywords (bug_id, keywordid) VALUES (?,?)', undef, $self->id, $keyword_id); } # If any changes were found, record it in the activity log if (scalar @$removed_kw || scalar @$added_kw) { my $removed_keywords = Bugzilla::Keyword->new_from_list($removed_kw); my $added_keywords = Bugzilla::Keyword->new_from_list($added_kw); my $removed_names = join(', ', (map { $_->name } @$removed_keywords)); my $added_names = join(', ', (map { $_->name } @$added_keywords)); $changes->{keywords} = [$removed_names, $added_names]; } # Dependencies foreach my $pair ([qw(dependson blocked)], [qw(blocked dependson)]) { my ($type, $other) = @$pair; my $old = $old_bug->$type; my $new = $self->$type; my ($removed, $added) = diff_arrays($old, $new); foreach my $removed_id (@$removed) { $dbh->do("DELETE FROM dependencies WHERE $type = ? AND $other = ?", undef, $removed_id, $self->id); # Add an activity entry for the other bug. LogActivityEntry($removed_id, $other, $self->id, '', $user->id, $delta_ts); # Update delta_ts on the other bug so that we trigger mid-airs. $dbh->do('UPDATE bugs SET delta_ts = ? WHERE bug_id = ?', undef, $delta_ts, $removed_id); } foreach my $added_id (@$added) { $dbh->do("INSERT INTO dependencies ($type, $other) VALUES (?,?)", undef, $added_id, $self->id); # Add an activity entry for the other bug. LogActivityEntry($added_id, $other, '', $self->id, $user->id, $delta_ts); # Update delta_ts on the other bug so that we trigger mid-airs. $dbh->do('UPDATE bugs SET delta_ts = ? WHERE bug_id = ?', undef, $delta_ts, $added_id); } if (scalar(@$removed) || scalar(@$added)) { $changes->{$type} = [join(', ', @$removed), join(', ', @$added)]; } } # Groups my %old_groups = map { $_->id => $_ } @{$old_bug->groups_in}; my %new_groups = map { $_->id => $_ } @{$self->groups_in}; my ($removed_gr, $added_gr) = diff_arrays([keys %old_groups], [keys %new_groups]); if (scalar @$removed_gr || scalar @$added_gr) { if (@$removed_gr) { my $qmarks = join(',', ('?') x @$removed_gr); $dbh->do( "DELETE FROM bug_group_map WHERE bug_id = ? AND group_id IN ($qmarks)", undef, $self->id, @$removed_gr ); } my $sth_insert = $dbh->prepare('INSERT INTO bug_group_map (bug_id, group_id) VALUES (?,?)'); foreach my $gid (@$added_gr) { $sth_insert->execute($self->id, $gid); } my @removed_names = map { $old_groups{$_}->name } @$removed_gr; my @added_names = map { $new_groups{$_}->name } @$added_gr; $changes->{'bug_group'} = [join(', ', @removed_names), join(', ', @added_names)]; } # Comments foreach my $comment (@{$self->{added_comments} || []}) { # Override the Comment's timestamp to be identical to the update # timestamp. $comment->{bug_when} = $delta_ts; $comment = Bugzilla::Comment->insert_create_data($comment); if ($comment->work_time) { LogActivityEntry($self->id, "work_time", "", $comment->work_time, $user->id, $delta_ts); } } # Comment Privacy foreach my $comment (@{$self->{comment_isprivate} || []}) { $comment->update(); my ($from, $to) = $comment->is_private ? (0, 1) : (1, 0); LogActivityEntry($self->id, "longdescs.isprivate", $from, $to, $user->id, $delta_ts, $comment->id); } # Clear the cache of comments delete $self->{comments}; # Insert the values into the multiselect value tables my @multi_selects = grep { $_->type == FIELD_TYPE_MULTI_SELECT } Bugzilla->active_custom_fields; foreach my $field (@multi_selects) { my $name = $field->name; my ($removed, $added) = diff_arrays($old_bug->$name, $self->$name); if (scalar @$removed || scalar @$added) { $changes->{$name} = [join(', ', @$removed), join(', ', @$added)]; $dbh->do("DELETE FROM bug_$name where bug_id = ?", undef, $self->id); foreach my $value (@{$self->$name}) { $dbh->do("INSERT INTO bug_$name (bug_id, value) VALUES (?,?)", undef, $self->id, $value); } } } my @single_selects = grep { $_->type == FIELD_TYPE_ONE_SELECT } Bugzilla->active_custom_fields; foreach my $field (@single_selects) { my $name = $field->name; my ($removed, $added) = ($old_bug->$name, $self->$name); if (($old_bug->$name || "") ne ($self->$name || "")) { $changes->{$name} = [$old_bug->$name, $self->$name]; $dbh->do("DELETE FROM bug_$name where bug_id = ?", undef, $self->id); if ($self->$name && $self->{$name} ne '') { $dbh->do("INSERT INTO bug_$name (bug_id, value) VALUES (?,?)", undef, $self->id, $self->{$name}); } } } # See Also my ($removed_see, $added_see) = diff_arrays($old_bug->see_also, $self->see_also, 'name'); $_->remove_from_db foreach @$removed_see; $_->insert_create_data($_) foreach @$added_see; # If any changes were found, record it in the activity log if (scalar @$removed_see || scalar @$added_see) { $changes->{see_also} = [ join(', ', map { $_->name } @$removed_see), join(', ', map { $_->name } @$added_see) ]; } ## REDHAT EXTENSION START 861276 $_->{_skip_extra_change} = 1 foreach @{$self->{_update_ref_bugs} || []}; ## REDHAT EXTENSION END 861276 # Flags my ($removed, $added) = Bugzilla::Flag->update_flags($self, $old_bug, $delta_ts); if ($removed || $added) { $changes->{'flagtypes.name'} = [$removed, $added]; } $_->update foreach @{$self->{_update_ref_bugs} || []}; delete $self->{_update_ref_bugs}; ## REDHAT EXTENSION BEGIN 584954 Bugzilla::Hook::process('bug_modify_changes', {changes => $changes}); ## REDHAT EXTENSION END 584954 # Log bugs_activity items # XXX Eventually, when bugs_activity is able to track the dupe_id, # this code should go below the duplicates-table-updating code below. foreach my $field (keys %$changes) { my $change = $changes->{$field}; my $from = defined $change->[0] ? $change->[0] : ''; my $to = defined $change->[1] ? $change->[1] : ''; ## REDHAT EXTENSIONS START 442504 my $do_log_activity = 1; Bugzilla::Hook::process( 'bug_log_activity', { bug => $self, field => $field, old_value => $from, new_value => $to, do_log_activity => \$do_log_activity } ); next if !$do_log_activity; ## REDHAT EXTENSIONS END 442504 # REDHAT EXTENSION START 1757211 LogActivityEntry( $self->id, $field, $from, $to, $user->id, $delta_ts, undef, undef, $self, $old_bug ); ## REDHAT EXTENSION END 1757211 } # Check if we have to update the duplicates table and the other bug. my ($old_dup, $cur_dup) = ($old_bug->dup_id || 0, $self->dup_id || 0); if ($old_dup != $cur_dup) { $dbh->do("DELETE FROM duplicates WHERE dupe = ?", undef, $self->id); if ($cur_dup) { $dbh->do('INSERT INTO duplicates (dupe, dupe_of) VALUES (?,?)', undef, $self->id, $cur_dup); if (my $update_dup = delete $self->{_dup_for_update}) { ## REDHAT EXTENSION START 861276 $update_dup->{_skip_extra_change} = 1; ## REDHAT EXTENSION END 861276 $update_dup->update(); } } $changes->{'dup_id'} = [$old_dup || undef, $cur_dup || undef]; } Bugzilla::Hook::process( 'bug_end_of_update', { bug => $self, timestamp => $delta_ts, changes => $changes, old_bug => $old_bug } ); # If any change occurred, refresh the timestamp of the bug. if ( scalar(keys %$changes) || $self->{added_comments} || $self->{comment_isprivate}) { $dbh->do('UPDATE bugs SET delta_ts = ? WHERE bug_id = ?', undef, ($delta_ts, $self->id)); $self->{delta_ts} = $delta_ts; } # Update last-visited if ($user->is_involved_in_bug($self)) { $self->update_user_last_visit($user, $delta_ts); } # If a user is no longer involved, remove their last visit entry my $last_visits = Bugzilla::BugUserLastVisit->match({bug_id => $self->id}); foreach my $lv (@$last_visits) { $lv->remove_from_db() unless $lv->user->is_involved_in_bug($self); } # Update bug ignore data if user wants to ignore mail for this bug if (exists $self->{'bug_ignored'}) { my $bug_ignored_changed; if ($self->{'bug_ignored'} && !$user->is_bug_ignored($self->id)) { $dbh->do( 'INSERT INTO email_bug_ignore (user_id, bug_id) VALUES (?, ?)', undef, $user->id, $self->id ); $bug_ignored_changed = 1; } elsif (!$self->{'bug_ignored'} && $user->is_bug_ignored($self->id)) { $dbh->do( 'DELETE FROM email_bug_ignore WHERE user_id = ? AND bug_id = ?', undef, $user->id, $self->id ); $bug_ignored_changed = 1; } delete $user->{bugs_ignored} if $bug_ignored_changed; } $dbh->bz_commit_transaction(); # The only problem with this here is that update() is often called # in the middle of a transaction, and if that transaction is rolled # back, this change will *not* be rolled back. As we expect rollbacks # to be extremely rare, that is OK for us. $self->_sync_fulltext( update_short_desc => $changes->{short_desc}, update_comments => $self->{added_comments} || $self->{comment_isprivate} || exists $changes->{'longdesc'} ## REDHAT EXTENSION 420461 ); # Remove obsolete internal variables. delete $self->{'_old_assigned_to'}; delete $self->{'_old_qa_contact'}; ## REDHAT EXTENSION 876015: Add docs_contact delete $self->{'_old_docs_contact'}; # Also flush the visible_bugs cache for this bug as the user's # relationship with this bug may have changed. delete $user->{_visible_bugs_cache}->{$self->id}; ## REDHAT EXTENSION START 1287318 return wantarray ? ($changes, $delta_ts, $old_bug) : $changes; ## REDHAT EXTENSION END 1287318 } # Used by create(). # We need to handle multi-select fields differently than normal fields, # because they're arrays and don't go into the bugs table. sub _extract_multi_selects { my ($invocant, $params) = @_; my @multi_selects = grep { $_->type == FIELD_TYPE_MULTI_SELECT } Bugzilla->active_custom_fields; my %ms_values; foreach my $field (@multi_selects) { my $name = $field->name; if (exists $params->{$name}) { my $array = delete($params->{$name}) || []; $ms_values{$name} = $array; } } return \%ms_values; } # Used by create(). # We need to handle external fields differently than normal fields, # because they don't go into the bugs table. sub _extract_single_external { my ($invocant, $params) = @_; my @external = grep { $_->type == FIELD_TYPE_ONE_SELECT } Bugzilla->active_custom_fields; my %values; foreach my $field (@external) { my $name = $field->name; if (exists $params->{$name}) { my $val = delete($params->{$name}); $values{$name} = $val; } } return \%values; } # Should be called any time you update short_desc or change a comment. sub _sync_fulltext { my ($self, %options) = @_; my $dbh = Bugzilla->dbh; my ($all_comments, $public_comments); if ($options{new_bug} || $options{update_comments}) { my $comments = $dbh->selectall_arrayref( 'SELECT thetext, isprivate FROM longdescs WHERE bug_id = ?', undef, $self->id); $all_comments = join("\n", map { $_->[0] } @$comments); my @no_private = grep { !$_->[1] } @$comments; $public_comments = join("\n", map { $_->[0] } @no_private); } if ($options{new_bug}) { $dbh->do( 'INSERT INTO bugs_fulltext (bug_id, short_desc, comments, comments_noprivate) VALUES (?, ?, ?, ?)', undef, $self->id, $self->short_desc, $all_comments, $public_comments ); } else { my (@names, @values); if ($options{update_short_desc}) { push @names, 'short_desc'; push @values, $self->short_desc; } if ($options{update_comments}) { push @names, ('comments', 'comments_noprivate'); push @values, ($all_comments, $public_comments); } if (@names) { $dbh->do( 'UPDATE bugs_fulltext SET ' . join(', ', map {"$_ = ?"} @names) . ' WHERE bug_id = ?', undef, @values, $self->id ); } } } sub remove_from_db { my ($self) = @_; my $dbh = Bugzilla->dbh; ThrowCodeError("bug_error", {bug => $self}) if $self->{'error'}; my $bug_id = $self->{'bug_id'}; # Delete entries from custom multi-select fields. my $multi_selects = Bugzilla->fields( { custom => 1, type => [FIELD_TYPE_MULTI_SELECT, FIELD_TYPE_ONE_SELECT], by_name => 1 } ); foreach my $field_name (keys %$multi_selects) { $dbh->do("DELETE FROM bug_" . $field_name . " WHERE bug_id = ?", undef, $bug_id); } ## REDHAT EXTENSION BEGIN 693936 Bugzilla::Hook::process('bug_remove_from_db', {bug_id => $bug_id}); ## REDHAT EXTENSION END 693936 $self->SUPER::remove_from_db(); # The bugs_fulltext table doesn't support foreign keys. $dbh->do("DELETE FROM bugs_fulltext WHERE bug_id = ?", undef, $bug_id); } ##################################################################### # Sending Email After Bug Update ##################################################################### sub send_changes { my ($self, $changes, $vars, $minor_update) = @_; ## REDHAT EXTENSION START 470051 # If we are adding new bugs to the duplicate, send notifications for it if (my $dup_changes = $self->{_dup_blocked_changes}) { my $dup_bug = $self->new($self->dup_id); $dup_bug->send_changes($dup_changes, $vars); } ## REDHAT EXTENSION END 470051 my $user = Bugzilla->user; my $old_qa = $changes->{'qa_contact'} ? $changes->{'qa_contact'}->[0] : ''; ## REDHAT EXTENSION 876015: Add docs_contact my $old_docs = $changes->{'docs_contact'} ? $changes->{'docs_contact'}->[0] : ''; my $old_own = $changes->{'assigned_to'} ? $changes->{'assigned_to'}->[0] : ''; my $old_cc = $changes->{cc} ? $changes->{cc}->[0] : ''; my %forced = ( cc => [split(/[,;]+/, $old_cc)], owner => $old_own, qacontact => $old_qa, docscontact => $old_docs, changer => $user, ); _send_bugmail( { id => $self->id, type => 'bug', forced => \%forced, minor_update => $minor_update, edited_comment => $vars->{edited_comment}, }, $vars ); # If the bug was marked as a duplicate, we need to notify users on the # other bug of any changes to that bug. my $new_dup_id = $changes->{'dup_id'} ? $changes->{'dup_id'}->[1] : undef; if ($new_dup_id) { _send_bugmail( { forced => {changer => $user}, type => "dupe", id => $new_dup_id, minor_update => $minor_update }, $vars ); } # If there were changes in dependencies, we need to notify those # dependencies. if ($changes->{'bug_status'}) { my ($old_status, $new_status) = @{$changes->{'bug_status'}}; # If this bug has changed from opened to closed or vice-versa, # then all of the bugs we block need to be notified. if (is_open_state($old_status) ne is_open_state($new_status)) { my $params = { forced => {changer => $user}, type => 'dep', dep_only => 1, blocker => $self, changes => $changes, minor_update => $minor_update }; foreach my $id (@{$self->blocked}) { $params->{id} = $id; _send_bugmail($params, $vars); } } } # To get a list of all changed dependencies, convert the "changes" arrays # into a long string, then collapse that string into unique numbers in # a hash. my $all_changed_deps = join(', ', @{$changes->{'dependson'} || []}); $all_changed_deps = join(', ', @{$changes->{'blocked'} || []}, $all_changed_deps); my %changed_deps = map { $_ => 1 } split(', ', $all_changed_deps); # When clearning one field (say, blocks) and filling in the other # (say, dependson), an empty string can get into the hash and cause # an error later. delete $changed_deps{''}; foreach my $id (sort { $a <=> $b } (keys %changed_deps)) { _send_bugmail( { forced => {changer => $user}, type => "dep", id => $id, minor_update => $minor_update }, $vars ); } # Sending emails for the referenced bugs. foreach my $ref_bug_id (uniq @{$self->{see_also_changes} || []}) { _send_bugmail( { forced => {changer => $user}, id => $ref_bug_id, minor_update => $minor_update }, $vars ); } } sub _send_bugmail { my ($params, $vars) = @_; require Bugzilla::BugMail; my $results = Bugzilla::BugMail::Send($params->{'id'}, $params->{'forced'}, $params); if (Bugzilla->usage_mode == USAGE_MODE_BROWSER) { my $template = Bugzilla->template; $vars->{$_} = $params->{$_} foreach keys %$params; $vars->{'sent_bugmail'} = $results; $template->process("bug/process/results.html.tmpl", $vars) || ThrowTemplateError($template->error()); $vars->{'header_done'} = 1; } } ##################################################################### # Validators ##################################################################### sub _check_alias { my ($invocant, $aliases) = @_; $aliases = ref $aliases ? $aliases : [split(/[\s,]+/, $aliases)]; # Remove empty aliases @$aliases = grep {$_} @$aliases; foreach my $alias (@$aliases) { $alias = trim($alias); # Make sure the alias isn't too long. if (length($alias) > 40) { ThrowUserError("alias_too_long"); } # Make sure the alias isn't just a number. if ($alias =~ /^\d+$/) { ThrowUserError("alias_is_numeric", {alias => $alias}); } # Make sure the alias has no commas or spaces. if ($alias =~ /[, ]/) { ThrowUserError("alias_has_comma_or_space", {alias => $alias}); } # Make sure the alias is unique, or that it's already our alias. my $other_bug = new Bugzilla::Bug($alias); if (!$other_bug->{error} && (!ref $invocant || $other_bug->id != $invocant->id)) { ThrowUserError("alias_in_use", {alias => $alias, bug_id => $other_bug->id}); } } return $aliases; } sub _check_assigned_to { my ($invocant, $assignee, undef, $params) = @_; my $user = Bugzilla->user; my $component = blessed($invocant) ? $invocant->component_obj : $params->{component}; # Default assignee is the component owner. my $id; # If this is a new bug, you can only set the assignee if you have editbugs. # If you didn't specify the assignee, we use the default assignee. if (!ref $invocant && (!$user->in_group('editbugs', $component->product_id) || !$assignee)) { $id = $component->default_assignee->id; ## REDHAT EXTENSION START 653316 # If a sub component is selected, use that for the default value if (Bugzilla->params->{usesubcomponents} && scalar @{$params->{rh_sub_components}}) { $id = $params->{rh_sub_components}[0]->default_assignee->id; } ## REDHAT EXTENSION END 653316 } else { if (!ref $assignee) { $assignee = trim($assignee); # When updating a bug, assigned_to can't be empty. ThrowUserError("reassign_to_empty") if ref $invocant && !$assignee; $assignee = Bugzilla::User->check($assignee); } $id = $assignee->id; # create() checks this another way, so we don't have to run this # check during create(). $invocant->_check_strict_isolation_for_user($assignee) if ref $invocant; } return $id; } sub _check_bug_file_loc { my ($invocant, $url) = @_; $url = '' if !defined($url); $url = trim($url); # On bug entry, if bug_file_loc is "http://", the default, use an # empty value instead. However, on bug editing people can set that # back if they *really* want to. if (!ref $invocant && $url eq 'http://') { $url = ''; } return $url; } sub _check_bug_status { my ($invocant, $new_status, undef, $params) = @_; my $user = Bugzilla->user; my @valid_statuses; my $old_status; # Note that this is undef for new bugs. my ($product, $comment); if (ref $invocant) { @valid_statuses = @{$invocant->statuses_available}; $product = $invocant->product_obj; $old_status = $invocant->status; my $comments = $invocant->{added_comments} || []; $comment = $comments->[-1]; } else { $product = $params->{product}; $comment = $params->{comment}; @valid_statuses = @{Bugzilla::Bug->statuses_available($product)}; } # Check permissions for users filing new bugs. if (!ref $invocant) { if ( $user->in_group('editbugs', $product->id) || $user->in_group('canconfirm', $product->id)) { # If the user with privs hasn't selected another status, # select the first one of the list. unless ($new_status) { if (scalar(@valid_statuses) == 1) { $new_status = $valid_statuses[0]; } else { $new_status = ($valid_statuses[0]->name ne 'UNCONFIRMED') ? $valid_statuses[0] : $valid_statuses[1]; } } } else { # A user with no privs cannot choose the initial status. # If UNCONFIRMED is valid for this product, use it; else # use the first bug status available. if (grep { $_->name eq 'UNCONFIRMED' } @valid_statuses) { $new_status = 'UNCONFIRMED'; } else { $new_status = $valid_statuses[0]; } } } # Time to validate the bug status. $new_status = Bugzilla::Status->check($new_status) unless ref($new_status); # We skip this check if we are changing from a status to itself. if ((!$old_status || $old_status->id != $new_status->id) && !grep { $_->name eq $new_status->name } @valid_statuses) { ThrowUserError('illegal_bug_status_transition', {old => $old_status, new => $new_status}); } # Check if a comment is required for this change. if ($new_status->comment_required_on_change_from($old_status) && !$comment->{'thetext'}) { ThrowUserError( 'comment_required', { old => $old_status ? $old_status->name : undef, new => $new_status->name, field => 'bug_status' } ); } if ( ref $invocant && ( $new_status->name eq 'IN_PROGRESS' # Backwards-compat for the old default workflow. or $new_status->name eq 'ASSIGNED' ) && Bugzilla->params->{"usetargetmilestone"} && Bugzilla->params->{"musthavemilestoneonaccept"} # musthavemilestoneonaccept applies only if at least two # target milestones are defined for the product. && scalar(@{$product->milestones}) > 1 && $invocant->target_milestone eq $product->default_milestone ) { ThrowUserError("milestone_required", {bug => $invocant}); } if (!blessed $invocant) { $params->{everconfirmed} = $new_status->name eq 'UNCONFIRMED' ? 0 : 1; } return $new_status->name; } sub _check_cc { my ($invocant, $ccs, undef, $params) = @_; my $component = blessed($invocant) ? $invocant->component_obj : $params->{component}; ## REDHAT EXTENSION BEGIN 815549 $ccs = [] unless $ccs; ## REDHAT EXTENSION END 815549 # Allow comma-separated input as well as arrayrefs. $ccs = [split(/[,;]+/, $ccs)] if !ref $ccs; my %cc_ids; foreach my $person (@$ccs) { $person = trim($person); next unless $person; my $id = login_to_id($person, THROW_ERROR); $cc_ids{$id} = 1; } ## REDHAT EXTENSION BEGIN 815549 # Restrict default CC:es to those that can view the bug anyway my $product_id = $params->{product}->id; my $bug_groups = $params->{groups}; # Enforce Default CC ## REDHAT EXTENSION START 653316 # If a sub component is selected, use that for the default CC value my $default_cc = (Bugzilla->params->{usesubcomponents} && scalar(@{$params->{rh_sub_components}})) ? $params->{rh_sub_components}[0]->initial_cc : $component->initial_cc; foreach my $user (@$default_cc) { ## REDHAT EXTENSION END 653316 if (scalar(@$bug_groups) == 0) { # There are not group restrictions on the bug, so we add the CC: $cc_ids{$user->id} = 1; } else { foreach my $group (@$bug_groups) { if ($user->in_group($group->name, $product_id)) { # This user can see this bug, so add them to the CC: $cc_ids{$user->id} = 1; last; } } } } ## REDHAT EXTENSION END 815549 return [keys %cc_ids]; } sub _check_comment { my ($invocant, $comment_txt, undef, $params) = @_; # Comment can be empty. We should force it to be empty if the text is undef if (!defined $comment_txt) { $comment_txt = ''; } # Load up some data my $isprivate = delete $params->{comment_is_private}; my $timestamp = $params->{creation_ts}; # Create the new comment so we can check it my $comment = {thetext => $comment_txt, bug_when => $timestamp,}; # We don't include the "isprivate" column unless it was specified. # This allows it to fall back to its database default. if (defined $isprivate) { $comment->{isprivate} = $isprivate; } # Validate comment. We have to do this special as a comment normally # requires a bug to be already created. For a new bug, the first comment # obviously can't get the bug if the bug is created after this # (see bug 590334) Bugzilla::Comment->check_required_create_fields($comment); $comment = Bugzilla::Comment->run_create_validators($comment, {skip => ['bug_id']}); return $comment; } sub _check_commenton { my ($invocant, $new_value, $field, $params) = @_; my $has_comment = ref($invocant) ? $invocant->{added_comments} : (defined $params->{comment} and $params->{comment}->{thetext} ne ''); my $is_changing = ref($invocant) ? $invocant->$field ne $new_value : $new_value ne ''; if ($is_changing && !$has_comment) { my $old_value = ref($invocant) ? $invocant->$field : undef; ThrowUserError('comment_required', {field => $field, old => $old_value, new => $new_value}); } } sub _check_component { my ($invocant, $name, undef, $params) = @_; $name = trim($name); $name || ThrowUserError("require_component"); my $product = blessed($invocant) ? $invocant->product_obj : $params->{product}; my $old_comp = blessed($invocant) ? $invocant->component : ''; my $object = Bugzilla::Component->check({product => $product, name => $name}); if ($object->name ne $old_comp && !$object->is_active) { ThrowUserError('value_inactive', {class => ref($object), value => $name}); } return $object; } sub _check_creation_ts { return Bugzilla->dbh->selectrow_array('SELECT LOCALTIMESTAMP(0)'); } sub _check_deadline { my ($invocant, $date) = @_; # When filing bugs, we're forgiving and just return undef if # the user isn't a timetracker. When updating bugs, check_can_change_field # controls permissions, so we don't want to check them here. if (!ref $invocant and !Bugzilla->user->is_timetracker) { return undef; } # Validate entered deadline $date = trim($date); return undef if !$date; validate_date($date) || ThrowUserError('illegal_date', {date => $date, format => 'YYYY-MM-DD'}); return $date; } # Takes two comma/space-separated strings and returns arrayrefs # of valid bug IDs. sub _check_dependencies { my ($invocant, $value, $field, $params) = @_; return $value if $params->{_dependencies_validated}; if (!ref $invocant) { # Only editbugs users can set dependencies on bug entry. return ([], []) unless Bugzilla->user->in_group('editbugs', $params->{product}->id); } # This is done this way so that dependson and blocked can be in # VALIDATORS, meaning that they can be in VALIDATOR_DEPENDENCIES, # which means that they can be checked in the right order during # bug creation. my $opposite = $field eq 'dependson' ? 'blocked' : 'dependson'; my %deps_in = ($field => $value || '', $opposite => $params->{$opposite} || ''); foreach my $type (qw(dependson blocked)) { my @bug_ids = ref($deps_in{$type}) ? @{$deps_in{$type}} : split(/[\s,]+/, $deps_in{$type}); # Eliminate nulls. @bug_ids = grep {$_} @bug_ids; my @check_access = @bug_ids; # When we're updating a bug, only added or removed bug_ids are # checked for whether or not we can see/edit those bugs. if (ref $invocant) { my $old = $invocant->$type; my ($removed, $added) = diff_arrays($old, \@bug_ids); @check_access = (@$added, @$removed); # Check field permissions if we've changed anything. if (@check_access) { my $privs; if (!$invocant->check_can_change_field($type, 0, 1, \$privs)) { ThrowUserError('illegal_change', {field => $type, privs => $privs}); } } } my $user = Bugzilla->user; foreach my $modified_id (@check_access) { my $delta_bug = $invocant->check($modified_id); # Under strict isolation, you can't modify a bug if you can't # edit it, even if you can see it. if (Bugzilla->params->{"strict_isolation"}) { if (!$user->can_edit_product($delta_bug->{'product_id'})) { ThrowUserError("illegal_change_deps", {field => $type}); } } } # Replace all aliases by their corresponding bug ID. @bug_ids = map { $_ =~ /^(\d+)$/ ? $1 : $invocant->check($_, $type)->id } @bug_ids; $deps_in{$type} = \@bug_ids; } # And finally, check for dependency loops. my $bug_id = ref($invocant) ? $invocant->id : 0; my %deps = ValidateDependencies($deps_in{dependson}, $deps_in{blocked}, $bug_id); $params->{$opposite} = $deps{$opposite}; $params->{_dependencies_validated} = 1; return $deps{$field}; } sub _check_dup_id { my ($self, $dupe_of) = @_; my $dbh = Bugzilla->dbh; # Store the bug ID/alias passed by the user for visibility checks. my $orig_dupe_of = $dupe_of = trim($dupe_of); $dupe_of || ThrowCodeError('undefined_field', {field => 'dup_id'}); # Validate the bug ID. The second argument will force check() to only # make sure that the bug exists, and convert the alias to the bug ID # if a string is passed. Group restrictions are checked below. my $dupe_of_bug = $self->check($dupe_of, 'dup_id'); $dupe_of = $dupe_of_bug->id; # If the dupe is unchanged, we have nothing more to check. return $dupe_of if ($self->dup_id && $self->dup_id == $dupe_of); # If we come here, then the duplicate is new. We have to make sure # that we can view/change it (issue A on bug 96085). $dupe_of_bug->check_is_visible($orig_dupe_of); # Make sure a loop isn't created when marking this bug # as duplicate. _resolve_ultimate_dup_id($self->id, $dupe_of, 1); my $cur_dup = $self->dup_id || 0; if ( $cur_dup != $dupe_of && Bugzilla->params->{'commentonduplicate'} && !$self->{added_comments}) { ThrowUserError('comment_required'); } # Should we add the reporter to the CC list of the new bug? # If they can see the bug... if ($self->reporter->can_see_bug($dupe_of)) { # We only add them if they're not the reporter of the other bug. $self->{_add_dup_cc} = 1 if $dupe_of_bug->reporter->id != $self->reporter->id; } # What if the reporter currently can't see the new bug? In the browser # interface, we prompt the user. In other interfaces, we default to # not adding the user, as the safest option. elsif (Bugzilla->usage_mode == USAGE_MODE_BROWSER) { # If we've already confirmed whether the user should be added... my $cgi = Bugzilla->cgi; my $add_confirmed = $cgi->param('confirm_add_duplicate'); if (defined $add_confirmed) { $self->{_add_dup_cc} = $add_confirmed; } else { # Note that here we don't check if the user is already the reporter # of the dupe_of bug, since we already checked if they can *see* # the bug, above. People might have reporter_accessible turned # off, but cclist_accessible turned on, so they might want to # add the reporter even though they're already the reporter of the # dup_of bug. my $vars = {}; my $template = Bugzilla->template; # Ask the user what they want to do about the reporter. $vars->{'cclist_accessible'} = $dupe_of_bug->cclist_accessible; $vars->{'original_bug_id'} = $dupe_of; $vars->{'duplicate_bug_id'} = $self->id; print $cgi->header(); $template->process("bug/process/confirm-duplicate.html.tmpl", $vars) || ThrowTemplateError($template->error()); exit; } } return $dupe_of; } sub _check_groups { my ($invocant, $group_names, undef, $params) = @_; my $bug_id = blessed($invocant) ? $invocant->id : undef; my $product = blessed($invocant) ? $invocant->product_obj : $params->{product}; my %add_groups; # In email or WebServices, when the "groups" item actually # isn't specified, then just add the default groups. if (!defined $group_names) { my $available = $product->groups_available; foreach my $group (@$available) { $add_groups{$group->id} = $group if $group->{is_default}; } } else { # Allow a comma-separated list, for email_in.pl. $group_names = [map { trim($_) } split(',', $group_names)] if !ref $group_names; # First check all the groups they chose to set. my %args = (product => $product->name, bug_id => $bug_id, action => 'add'); foreach my $name (@$group_names) { my $group = Bugzilla::Group->check_no_disclose({%args, name => $name}); if (!$product->group_is_settable($group)) { ThrowUserError('group_restriction_not_allowed', {%args, name => $name}); } $add_groups{$group->id} = $group; } } # Now enforce mandatory groups. $add_groups{$_->id} = $_ foreach @{$product->groups_mandatory}; my @add_groups = values %add_groups; return \@add_groups; } sub _check_keywords { my ($invocant, $keywords_in, undef, $params) = @_; return [] if !defined $keywords_in; my $keyword_array = $keywords_in; if (!ref $keyword_array) { $keywords_in = trim($keywords_in); $keyword_array = [split(/[\s,]+/, $keywords_in)]; } my %keywords; foreach my $keyword (@$keyword_array) { next unless $keyword; my $obj = Bugzilla::Keyword->check($keyword); $keywords{$obj->id} = $obj; } return [values %keywords]; } sub _check_product { my ($invocant, $name) = @_; $name = trim($name); # If we're updating the bug and they haven't changed the product, # always allow it. if (ref $invocant && lc($invocant->product_obj->name) eq lc($name)) { return $invocant->product_obj; } # Check that the product exists and that the user # is allowed to enter bugs into this product. my $product = Bugzilla->user->can_enter_product($name, THROW_ERROR); return $product; } sub _check_priority { my ($invocant, $priority) = @_; ## REDHAT EXTENSION START 457016 # adding setpriority check if ( !ref $invocant && !Bugzilla->params->{'letsubmitterchoosepriority'} && !Bugzilla->user->in_group('setpriority')) { $priority = Bugzilla->params->{'defaultpriority'}; } ## REDHAT EXTENSION END 457016 return $invocant->_check_select_field($priority, 'priority'); } sub _check_qa_contact { my ($invocant, $qa_contact, undef, $params) = @_; $qa_contact = trim($qa_contact) if !ref $qa_contact; my $component = blessed($invocant) ? $invocant->component_obj : $params->{component}; if (!ref $invocant) { # Bugs get no QA Contact on creation if useqacontact is off. return undef if !Bugzilla->params->{useqacontact}; # Set the default QA Contact if one isn't specified or if the # user doesn't have editbugs. if ( !Bugzilla->user->in_group('editbugs', $component->product_id) || !$qa_contact) { ## REDHAT EXTENSION START 653316 # If a sub component is selected, use that for the default value if (Bugzilla->params->{usesubcomponents} && scalar @{$params->{rh_sub_components}}) { return $params->{rh_sub_components}[0]->default_qa_contact ? $params->{rh_sub_components}[0]->default_qa_contact->id : undef; } ## REDHAT EXTENSION END 653316 return $component->default_qa_contact ? $component->default_qa_contact->id : undef; } } # If a QA Contact was specified or if we're updating, check # the QA Contact for validity. my $id; if ($qa_contact) { $qa_contact = Bugzilla::User->check($qa_contact) if !ref $qa_contact; $id = $qa_contact->id; # create() checks this another way, so we don't have to run this # check during create(). # If there is no QA contact, this check is not required. $invocant->_check_strict_isolation_for_user($qa_contact) if (ref $invocant && $id); } # "0" always means "undef", for QA Contact. return $id || undef; } ## REDHAT EXTENSION START 876015 sub _check_docs_contact { my ($invocant, $docs_contact, undef, $params) = @_; $docs_contact = trim($docs_contact) if !ref $docs_contact; my $component = blessed($invocant) ? $invocant->component_obj : $params->{component}; if (!ref $invocant) { # Bugs get no Docs Contact on creation if usedocscontact is off. return undef if !Bugzilla->params->{usedocscontact}; # Set the default Docs Contact if one isn't specified or if the # user doesn't have editbugs. if ( !Bugzilla->user->in_group('editbugs', $component->product_id) || !$docs_contact) { ## REDHAT EXTENSION START 653316 # If a sub component is selected, use that for the default value if (Bugzilla->params->{usesubcomponents} && scalar @{$params->{rh_sub_components}}) { return $params->{rh_sub_components}[0]->default_docs_contact ? $params->{rh_sub_components}[0]->default_docs_contact->id : undef; } ## REDHAT EXTENSION END 653316 return $component->default_docs_contact ? $component->default_docs_contact->id : undef; } } # If a Docs Contact was specified or if we're updating, check # the Docs Contact for validity. my $id; if ($docs_contact) { $docs_contact = Bugzilla::User->check($docs_contact) if !ref $docs_contact; $id = $docs_contact->id; # create() checks this another way, so we don't have to run this # check during create(). # If there is no Docs contact, this check is not required. $invocant->_check_strict_isolation_for_user($docs_contact) if (ref $invocant && $id); } # "0" always means "undef", for Docs Contact. return $id || undef; } ## REDHAT EXTENSION START 876015 sub _check_reporter { my $invocant = shift; my $reporter; if (ref $invocant) { # You cannot change the reporter of a bug. $reporter = $invocant->reporter->id; } else { # On bug creation, the reporter is the logged in user # (meaning that they must be logged in first!). Bugzilla->login(LOGIN_REQUIRED); $reporter = Bugzilla->user->id; } return $reporter; } sub _check_resolution { my ($invocant, $resolution, undef, $params) = @_; $resolution = trim($resolution); my $status = ref($invocant) ? $invocant->status->name : $params->{bug_status}; my $is_open = ref($invocant) ? $invocant->status->is_open : is_open_state($status); # Throw a special error for resolving bugs without a resolution # (or trying to change the resolution to '' on a closed bug without # using clear_resolution). ThrowUserError('missing_resolution', {status => $status}) if !$resolution && !$is_open; # Make sure this is a valid resolution. $resolution = $invocant->_check_select_field($resolution, 'resolution'); # Don't allow open bugs to have resolutions. ThrowUserError('resolution_not_allowed') if $is_open; # Check noresolveonopenblockers. my $dependson = ref($invocant) ? $invocant->dependson : ($params->{dependson} || []); if ( Bugzilla->params->{"noresolveonopenblockers"} && $resolution eq 'FIXED' && ( !ref $invocant or !$invocant->resolution or $resolution ne $invocant->resolution) && scalar @$dependson ) { my $dep_bugs = Bugzilla::Bug->new_from_list($dependson); my $count_open = grep { $_->isopened } @$dep_bugs; if ($count_open) { my $bug_id = ref($invocant) ? $invocant->id : undef; ThrowUserError("still_unresolved_bugs", {bug_id => $bug_id, dep_count => $count_open}); } } # Check if they're changing the resolution and need to comment. if (Bugzilla->params->{'commentonchange_resolution'}) { $invocant->_check_commenton($resolution, 'resolution', $params); } return $resolution; } sub _check_short_desc { my ($invocant, $short_desc) = @_; # Set the parameter to itself, but cleaned up $short_desc = clean_text($short_desc) if $short_desc; if (!defined $short_desc || $short_desc eq '') { ThrowUserError("require_summary"); } if (length($short_desc) > MAX_FREETEXT_LENGTH) { ThrowUserError('freetext_too_long', {field => 'short_desc', text => $short_desc}); } return $short_desc; } sub _check_status_whiteboard { return defined $_[1] ? $_[1] : ''; } # Unlike other checkers, this one doesn't return anything. ## REDHAT EXTENSION 876015: Add docs_contact sub _check_strict_isolation { ## REDHAT EXTENSION START 876015 my ($invocant, $ccs, $assignee, $qa_contact, $docs_contact, $product) = @_; ## REDHAT EXTENSION END 876015 return unless Bugzilla->params->{'strict_isolation'}; if (ref $invocant) { my $original = $invocant->new($invocant->id); # We only check people if they've been added. This way, if # strict_isolation is turned on when there are invalid users # on bugs, people can still add comments and so on. my @old_cc = map { $_->id } @{$original->cc_users}; my @new_cc = map { $_->id } @{$invocant->cc_users}; my ($removed, $added) = diff_arrays(\@old_cc, \@new_cc); $ccs = Bugzilla::User->new_from_list($added); $assignee = $invocant->assigned_to if $invocant->assigned_to->id != $original->assigned_to->id; if ( $invocant->qa_contact && (!$original->qa_contact || $invocant->qa_contact->id != $original->qa_contact->id) ) { $qa_contact = $invocant->qa_contact; } ## REDHAT EXTENSION START 876015 if ( $invocant->docs_contact && (!$original->docs_contact || $invocant->docs_contact->id != $original->docs_contact->id) ) { $docs_contact = $invocant->docs_contact; } ## REDHAT EXTENSION END 876015 $product = $invocant->product_obj; } my @related_users = @$ccs; push(@related_users, $assignee) if $assignee; if (Bugzilla->params->{'useqacontact'} && $qa_contact) { push(@related_users, $qa_contact); } ## REDHAT EXTENSION START 876015 if (Bugzilla->params->{'usedocscontact'} && $docs_contact) { push(@related_users, $docs_contact); } ## REDHAT EXTENSION END 876015 @related_users = @{Bugzilla::User->new_from_list(\@related_users)} if !ref $invocant; # For each unique user in @related_users...(assignee and qa_contact # could be duplicates of users in the CC list) my %unique_users = map { $_->id => $_ } @related_users; my @blocked_users; foreach my $id (keys %unique_users) { my $related_user = $unique_users{$id}; if ( !$related_user->can_edit_product($product->id) || !$related_user->can_see_product($product->name)) { push(@blocked_users, $related_user->login); } } if (scalar(@blocked_users)) { my %vars = (users => \@blocked_users, product => $product->name); if (ref $invocant) { $vars{'bug_id'} = $invocant->id; } else { $vars{'new'} = 1; } ThrowUserError("invalid_user_group", \%vars); } } # This is used by various set_ checkers, to make their code simpler. sub _check_strict_isolation_for_user { my ($self, $user) = @_; return unless Bugzilla->params->{"strict_isolation"}; if (!$user->can_edit_product($self->{product_id})) { ThrowUserError('invalid_user_group', {users => $user->login, product => $self->product, bug_id => $self->id}); } } sub _check_tag_name { my ($invocant, $tag) = @_; $tag = clean_text($tag); $tag || ThrowUserError('no_tag_to_edit'); ThrowUserError('tag_name_too_long') if length($tag) > MAX_LEN_QUERY_NAME; trick_taint($tag); # Tags are all lowercase. return lc($tag); } sub _check_target_milestone { my ($invocant, $target, undef, $params) = @_; my $product = blessed($invocant) ? $invocant->product_obj : $params->{product}; my $old_target = blessed($invocant) ? $invocant->target_milestone : ''; $target = trim($target); $target = $product->default_milestone if !defined $target; my $object = Bugzilla::Milestone->check({product => $product, name => $target}); if ($old_target && $object->name ne $old_target && !$object->is_active) { ThrowUserError('value_inactive', {class => ref($object), value => $target}); } return $object->name; } sub _check_target_release { my ($invocant, $targets, undef, $params) = @_; my @object_names = (); my $product = blessed($invocant) ? $invocant->product_obj : $params->{product}; if (not defined $targets) { $targets = []; } elsif (not ref $targets) { $targets = [$targets]; } # If no target release is specified, use the default for the product if (not scalar(@$targets)) { $targets = [$product->default_release]; } my $old_targets = blessed($invocant) ? $invocant->target_release : []; foreach my $target (@$targets) { $target = trim($target); my $object = Bugzilla::Release->check({product => $product, name => $target}); if (!grep ({ $_ eq $object->name } @$old_targets) && !$object->is_active) { ThrowUserError('value_inactive', {class => ref($object), value => $target}); } push @object_names, $object->name; } ## REDHAT EXTENSION BEGIN 706784 # Check that this product can do multiple target releases if (!$product->multiple_target_releases and scalar(@object_names) > 1) { ThrowUserError('no_multiple_target_releases', {product_name => $product->name}); } ## REDHAT EXTENSION END 706784 return \@object_names; } sub _check_time_field { my ($invocant, $value, $field, $params) = @_; # When filing bugs, we're forgiving and just return 0 if # the user isn't a timetracker. When updating bugs, check_can_change_field # controls permissions, so we don't want to check them here. if (!ref $invocant and !Bugzilla->user->is_timetracker) { return 0; } # check_time is in Bugzilla::Object. return $invocant->check_time($value, $field, $params); } sub _check_version { my ($invocant, $version, undef, $params) = @_; $version = trim($version); my $product = blessed($invocant) ? $invocant->product_obj : $params->{product}; my $old_vers = blessed($invocant) ? $invocant->version : ''; my $object = Bugzilla::Version->check({product => $product, name => $version}); if ($object->name ne $old_vers && !$object->is_active) { ThrowUserError('value_inactive', {class => ref($object), value => $version}); } return $object->name; } # Custom Field Validators sub _check_field_is_mandatory { my ($invocant, $value, $field, $params) = @_; if (!blessed($field)) { $field = Bugzilla::Field->new({name => $field}); return if !$field; } return if !$field->is_mandatory; return if !$field->is_visible_on_bug($params || $invocant); return if ($field->type == FIELD_TYPE_SINGLE_SELECT && scalar @{get_legal_field_values($field->name)} == 1); return if ($field->type == FIELD_TYPE_MULTI_SELECT && !scalar @{get_legal_field_values($field->name)}); if (ref($value) eq 'ARRAY') { $value = join('', @$value); } $value = trim($value); if ( !defined($value) or $value eq "" or ($value eq '---' and $field->type == FIELD_TYPE_SINGLE_SELECT) or ($value =~ EMPTY_DATETIME_REGEX and $field->type == FIELD_TYPE_DATETIME)) { ThrowUserError('required_field', {field => $field}); } } sub _check_date_field { my ($invocant, $date) = @_; return $invocant->_check_datetime_field($date, undef, {date_only => 1}); } sub _check_datetime_field { my ($invocant, $date_time, $field, $params) = @_; # Empty datetimes are empty strings or strings only containing # 0's, whitespace, and punctuation. if ($date_time =~ /^[\s0[:punct:]]*$/) { return undef; } $date_time = trim($date_time); my ($date, $time) = split(' ', $date_time); if ($date && !validate_date($date)) { ThrowUserError('illegal_date', {date => $date, format => 'YYYY-MM-DD'}); } if ($time && $params->{date_only}) { ThrowUserError('illegal_date', {date => $date_time, format => 'YYYY-MM-DD'}); } if ($time && !validate_time($time)) { ThrowUserError('illegal_time', {'time' => $time, format => 'HH:MM:SS'}); } return $date_time; } sub _check_default_field { return defined $_[1] ? trim($_[1]) : ''; } sub _check_freetext_field { my ($invocant, $text, $field) = @_; $text = (defined $text) ? trim($text) : ''; if (length($text) > MAX_FREETEXT_LENGTH && (!($field eq 'cf_fixed_in' && length($text) <= 32767))) { ThrowUserError('freetext_too_long', {field => $field, text => $text}); } return $text; } sub _check_multi_select_field { my ($invocant, $values, $field) = @_; # Allow users (mostly email_in.pl) to specify multi-selects as # comma-separated values. if (defined $values and !ref $values) { # We don't split on spaces because multi-select values can and often # do have spaces in them. (Theoretically they can have commas in them # too, but that's much less common and people should be able to work # around it pretty cleanly, if they want to use email_in.pl.) $values = [split(',', $values)]; } return [] if !$values; my @checked_values; foreach my $value (@$values) { push(@checked_values, $invocant->_check_select_field($value, $field)); } return \@checked_values; } sub _check_single_select_field { my ($invocant, $value, $field) = @_; if($value) { my $object = Bugzilla::Field::Choice->type($field)->check($value); return $object->name; } return; } sub _check_select_field { my ($invocant, $value, $field) = @_; my $object = Bugzilla::Field::Choice->type($field)->check($value); return $object->name; } sub _check_bugid_field { my ($invocant, $value, $field) = @_; return undef if !$value; # check that the value is a valid, visible bug id my $checked_id = $invocant->check($value, $field)->id; # check for loop (can't have a loop if this is a new bug) if (ref $invocant) { _check_relationship_loop($field, $invocant->bug_id, $checked_id); } return $checked_id; } sub _check_textarea_field { my ($invocant, $text, $field) = @_; $text = (defined $text) ? trim($text) : ''; # Web browsers submit newlines as \r\n. # Sanitize all input to match the web standard. # XMLRPC input could be either \n or \r\n $text =~ s/\r?\n/\r\n/g; return $text; } sub _check_integer_field { my ($invocant, $value, $field) = @_; $value = defined($value) ? trim($value) : ''; if ($value eq '') { return 0; } my $orig_value = $value; if (!detaint_signed($value)) { ThrowUserError("number_not_integer", {field => $field, num => $orig_value}); } elsif (abs($value) > MAX_INT_32) { ThrowUserError("number_too_large", {field => $field, num => $orig_value, max_num => MAX_INT_32}); } return $value; } sub _check_relationship_loop { # Generates a dependency tree for a given bug. Calls itself recursively # to generate sub-trees for the bug's dependencies. my ($field, $bug_id, $dep_id, $ids) = @_; # Don't do anything if this bug doesn't have any dependencies. return unless defined($dep_id); # Check whether we have seen this bug yet $ids = {} unless defined $ids; $ids->{$bug_id} = 1; if ($ids->{$dep_id}) { ThrowUserError("relationship_loop_single", {'bug_id' => $bug_id, 'dep_id' => $dep_id, 'field_name' => $field}); } # Get this dependency's record from the database my $dbh = Bugzilla->dbh; my $next_dep_id = $dbh->selectrow_array("SELECT $field FROM bugs WHERE bug_id = ?", undef, $dep_id); _check_relationship_loop($field, $dep_id, $next_dep_id, $ids); } ##################################################################### # Class Accessors ##################################################################### sub fields { my $class = shift; my @fields = ( # Standard Fields # Keep this ordering in sync with bugzilla.dtd. qw(bug_id alias creation_ts short_desc delta_ts reporter_accessible cclist_accessible classification_id classification product component version rep_platform op_sys bug_status resolution dup_id see_also bug_file_loc status_whiteboard keywords priority bug_severity target_milestone dependson blocked everconfirmed reporter assigned_to cc estimated_time remaining_time actual_time deadline), # Conditional Fields Bugzilla->params->{'useqacontact'} ? "qa_contact" : (), ## REDHAT EXTENSION START 876015 Bugzilla->params->{'usedocscontact'} ? "docs_contact" : (), ## REDHAT EXTENSION END 876015 # Custom Fields map { $_->name } Bugzilla->active_custom_fields ); Bugzilla::Hook::process('bug_fields', {'fields' => \@fields}); return @fields; } ##################################################################### # Mutators ##################################################################### # To run check_can_change_field. sub _set_global_validator { my ($self, $value, $field) = @_; my $current = $self->$field; my $privs; if ( ref $current && ref($current) ne 'ARRAY' && $current->isa('Bugzilla::Object')) { $current = $current->id; } if (ref $value && ref($value) ne 'ARRAY' && $value->isa('Bugzilla::Object')) { $value = $value->id; } my $can = $self->check_can_change_field($field, $current, $value, \$privs); if (!$can) { ## REDHAT EXTENSION START 876015 if ( $field eq 'assigned_to' || $field eq 'qa_contact' || $field eq 'docs_contact') { ## REDHAT EXTENSION START 876015 $value = Bugzilla::User->new($value)->login; $current = Bugzilla::User->new($current)->login; } ThrowUserError('illegal_change', {field => $field, oldvalue => $current, newvalue => $value, privs => $privs}); } $self->_check_field_is_mandatory($value, $field); } ################# # "Set" Methods # ################# # Note that if you are changing multiple bugs at once, you must pass # other_bugs to set_all in order for it to behave properly. sub set_all { my $self = shift; my ($input_params) = @_; ## REDHAT EXTENSION BEGIN 584954 # extension is adding product to the hook Bugzilla::Hook::process('bug_before_set_all', {params => $input_params, bug => $self}); ## REDHAT EXTENSION END 584954 # Clone the data as we are going to alter it, and this would affect # subsequent bugs when calling set_all() again, as some fields would # be modified or no longer defined. my $params = {}; %$params = %$input_params; # You cannot mark bugs as duplicate when changing several bugs at once # (because currently there is no way to check for duplicate loops in that # situation). You also cannot set the alias of several bugs at once. if ($params->{other_bugs} and scalar @{$params->{other_bugs}} > 1) { ThrowUserError('dupe_not_allowed') if exists $params->{dup_id}; ThrowUserError('multiple_alias_not_allowed') if defined $params->{alias}; } # For security purposes, and because lots of other checks depend on it, # we set the product first before anything else. my $product_changed; # Used only for strict_isolation checks. if (exists $params->{'product'}) { $product_changed = $self->_set_product($params->{'product'}, $params); } # strict_isolation checks mean that we should set the groups # immediately after changing the product. $self->_add_remove($params, 'groups'); if (exists $params->{'dependson'} or exists $params->{'blocked'}) { my %set_deps; foreach my $name (qw(dependson blocked)) { my @dep_ids = @{$self->$name}; # If only one of the two fields was passed in, then we need to # retain the current value for the other one. if (!exists $params->{$name}) { $set_deps{$name} = \@dep_ids; next; } # Explicitly setting them to a particular value overrides # add/remove. if (exists $params->{$name}->{set}) { $set_deps{$name} = $params->{$name}->{set}; next; } foreach my $add (@{$params->{$name}->{add} || []}) { push(@dep_ids, $add) if !grep($_ == $add, @dep_ids); } foreach my $remove (@{$params->{$name}->{remove} || []}) { @dep_ids = grep($_ != $remove, @dep_ids); } $set_deps{$name} = \@dep_ids; } $self->set_dependencies($set_deps{'dependson'}, $set_deps{'blocked'}); } if (exists $params->{'keywords'}) { # Sorting makes the order "add, remove, set", just like for other # fields. foreach my $action (sort keys %{$params->{'keywords'}}) { $self->modify_keywords($params->{'keywords'}->{$action}, $action); } } if (exists $params->{'comment'} or exists $params->{'work_time'}) { # Add a comment as needed to each bug. This is done early because # there are lots of things that want to check if we added a comment. $self->add_comment( $params->{'comment'}->{'body'}, { isprivate => $params->{'comment'}->{'is_private'}, work_time => $params->{'work_time'} } ); } if (exists $params->{alias} && $params->{alias}{set}) { my ($removed_aliases, $added_aliases) = diff_arrays($self->alias, $params->{alias}{set}); $params->{alias} = {add => $added_aliases, remove => $removed_aliases,}; } my %normal_set_all; foreach my $name (keys %$params) { # These are handled separately below. if ($self->can("set_$name")) { $normal_set_all{$name} = $params->{$name}; } } $self->SUPER::set_all(\%normal_set_all); $self->reset_assigned_to if $params->{'reset_assigned_to'}; $self->reset_qa_contact if $params->{'reset_qa_contact'}; ## REDHAT EXTENSION START 876015 $self->reset_docs_contact if $params->{'reset_docs_contact'}; ## REDHAT EXTENSION END 876015 $self->_add_remove($params, 'see_also'); # And set custom fields. my @custom_fields = Bugzilla->active_custom_fields; foreach my $field (@custom_fields) { my $fname = $field->name; if (exists $params->{$fname}) { $self->set_custom_field($field, $params->{$fname}); } } $self->_add_remove($params, 'cc'); $self->_add_remove($params, 'alias'); # Theoretically you could move a product without ever specifying # a new assignee or qa_contact, or adding/removing any CCs. So, # we have to check that the current assignee, qa, and CCs are still # valid if we've switched products, under strict_isolation. We can only # do that here, because if they *did* change the assignee, qa, or CC, # then we don't want to check the original ones, only the new ones. $self->_check_strict_isolation() if $product_changed; } # Helper for set_all that helps with fields that have an "add/remove" # pattern instead of a "set_" pattern. sub _add_remove { my ($self, $params, $name) = @_; my @add = @{$params->{$name}->{add} || []}; my @remove = @{$params->{$name}->{remove} || []}; $name =~ s/s$// if $name ne 'alias'; my $add_method = "add_$name"; my $remove_method = "remove_$name"; $self->$add_method($_) foreach @add; $self->$remove_method($_) foreach @remove; } sub set_assigned_to { my ($self, $value) = @_; $self->set('assigned_to', $value); # Store the old assignee. check_can_change_field() needs it. $self->{'_old_assigned_to'} = $self->{'assigned_to_obj'}->id; delete $self->{'assigned_to_obj'}; } sub reset_assigned_to { my $self = shift; my $comp = $self->component_obj; $self->set_assigned_to($comp->default_assignee); } sub set_bug_ignored { $_[0]->set('bug_ignored', $_[1]); } sub set_cclist_accessible { $_[0]->set('cclist_accessible', $_[1]); } sub set_comment_is_private { my ($self, $comments, $isprivate) = @_; $self->{comment_isprivate} ||= []; my $is_insider = Bugzilla->user->is_insider; $comments = {$comments => $isprivate} unless ref $comments; foreach my $comment (@{$self->comments}) { # Skip unmodified comment privacy. next unless exists $comments->{$comment->id}; my $isprivate = delete $comments->{$comment->id} ? 1 : 0; if ($isprivate != $comment->is_private) { ThrowUserError('user_not_insider') unless $is_insider; $comment->set_is_private($isprivate); push @{$self->{comment_isprivate}}, $comment; ## REDHAT EXTENSION START 404771 765712 # If a comment is being made private and it is linked to an # attachment, make the attachment private too if ($isprivate == 1 and $comment->type == CMT_ATTACHMENT_CREATED) { my $attach_id = $comment->extra_data; my $attachment = Bugzilla::Attachment->new($attach_id); $attachment->set_is_private(1); $attachment->update(); } ## REDHAT EXTENSION END 404771 765712 } } # If there are still entries in $comments, then they are illegal. ThrowUserError('comment_invalid_isprivate', {id => join(', ', keys %$comments)}) if scalar keys %$comments; # If no comment privacy has been modified, remove this key. delete $self->{comment_isprivate} unless scalar @{$self->{comment_isprivate}}; } sub set_component { my ($self, $name) = @_; my $old_comp = $self->component_obj; my $component = $self->_check_component($name); if ($old_comp->id != $component->id) { $self->{component_id} = $component->id; $self->{component} = $component->name; $self->{component_obj} = $component; # For update() $self->{_old_component_name} = $old_comp->name; # Add in the Default CC of the new Component; ## REDHAT EXTENSION START 653316 1117645 # If a sub component is selected, use that for the default CC value my $default_cc = (Bugzilla->params->{usesubcomponents} && scalar(@{$self->rh_sub_component_objs})) ? $self->rh_sub_component_objs->[0]->initial_cc : $component->initial_cc; foreach my $cc (@$default_cc) { ## REDHAT EXTENSION END 653316 1117645 $self->add_cc($cc, 1); } } } sub set_custom_field { my ($self, $field, $value) = @_; $field->user_can_edit(Bugzilla->user) || ThrowUserError('illegal_change', {field => $field->name}); if (ref $value eq 'ARRAY' && $field->type != FIELD_TYPE_MULTI_SELECT) { $value = $value->[0]; } ## REDHAT EXTENSION BEGIN 824974 1039815 # If a hash is given for a multi select custom field, assuming the # user supplied 'add', 'remove' and 'set' keys. Set is has priority # over add which has priority over remove. if (ref $value eq 'HASH' && $field->type == FIELD_TYPE_MULTI_SELECT) { my $dbh = Bugzilla->dbh; my $field_name = $field->name; # Get the current and allowed values. We need to use SQL to get the # value to get around restrictions my $query = "SELECT value FROM bug_$field_name WHERE bug_id = ?"; my $new_values = $dbh->selectcol_arrayref($query, undef, $self->id); my $legal_values = $field->legal_values; # We need to trap this error here, otherwise we would leak # if a value was set or not. foreach my $action ('add', 'remove', 'set') { foreach my $value (@{$value->{$action} || []}) { if (!grep { $_->name eq $value } @$legal_values) { ThrowUserError( "field_cannot_$action", {field => $field, value => $value} ); } } } # Remove and/or add as required foreach my $rem_value (@{$value->{remove} || []}) { @$new_values = grep { $_ ne trim($rem_value) } @$new_values; } foreach my $add_value (@{$value->{add} || []}) { if (not grep { $_ eq trim($add_value) } @$new_values) { push @$new_values, trim($add_value); } } if (defined $value->{set}) { @$new_values = map { trim($_) } @{$value->{set}}; } # Return the array that is expected $value = $new_values; } ## REDHAT EXTENSION END 824974 1039815 ThrowCodeError('field_not_custom', {field => $field}) if !$field->custom; $self->set($field->name, $value); } sub set_deadline { $_[0]->set('deadline', $_[1]); } sub set_dependencies { my ($self, $dependson, $blocked) = @_; my %extra = (blocked => $blocked); $dependson = $self->_check_dependencies($dependson, 'dependson', \%extra); $blocked = $extra{blocked}; # These may already be detainted, but all setters are supposed to # detaint their input if they've run a validator (just as though # we had used Bugzilla::Object::set), so we do that here. detaint_natural($_) foreach (@$dependson, @$blocked); $self->{'dependson'} = $dependson; $self->{'blocked'} = $blocked; delete $self->{depends_on_obj}; delete $self->{blocks_obj}; } sub _clear_dup_id { $_[0]->{dup_id} = undef; } sub set_dup_id { my ($self, $dup_id) = @_; my $old = $self->dup_id || 0; $self->set('dup_id', $dup_id); my $new = $self->dup_id; return if $old == $new; # Make sure that we have the DUPLICATE resolution. This is needed # if somebody calls set_dup_id without calling set_bug_status or # set_resolution. if ($self->resolution ne 'DUPLICATE') { # Even if the current status is VERIFIED, we change it back to # RESOLVED (or whatever the duplicate_or_move_bug_status is) here, # because that's the same thing the UI does when you click on the # "Mark as Duplicate" link. If people really want to retain their # current status, they can use set_bug_status and set the DUPLICATE # resolution before getting here. $self->set_bug_status(Bugzilla->params->{'duplicate_or_move_bug_status'}, {resolution => 'DUPLICATE'}); } # Update the other bug. my $dupe_of = new Bugzilla::Bug($self->dup_id); if (delete $self->{_add_dup_cc}) { $dupe_of->add_cc($self->reporter); } $dupe_of->add_comment("", {type => CMT_HAS_DUPE, extra_data => $self->id}); $self->{_dup_for_update} = $dupe_of; # Now make sure that we add a duplicate comment on *this* bug. # (Change an existing comment into a dup comment, if there is one, # or add an empty dup comment.) if ($self->{added_comments}) { my @normal = grep { !defined $_->{type} || $_->{type} == CMT_NORMAL } @{$self->{added_comments}}; # Turn the last one into a dup comment. $normal[-1]->{type} = CMT_DUPE_OF; $normal[-1]->{extra_data} = $self->dup_id; } else { $self->add_comment('', {type => CMT_DUPE_OF, extra_data => $self->dup_id}); } } sub set_estimated_time { $_[0]->set('estimated_time', $_[1]); } sub _set_everconfirmed { $_[0]->set('everconfirmed', $_[1]); } sub set_flags { my ($self, $flags, $new_flags) = @_; Bugzilla::Flag->set_flag($self, $_) foreach (@$flags, @$new_flags); } sub set_op_sys { $_[0]->set('op_sys', $_[1]); } sub set_platform { $_[0]->set('rep_platform', $_[1]); } sub set_priority { $_[0]->set('priority', $_[1]); } # For security reasons, you have to use set_all to change the product. # See the strict_isolation check in set_all for an explanation. sub _set_product { my ($self, $name, $params) = @_; my $old_product = $self->product_obj; my $product = $self->_check_product($name); my $product_changed = 0; if ($old_product->id != $product->id) { $self->{product_id} = $product->id; $self->{product} = $product->name; $self->{product_obj} = $product; # For update() $self->{_old_product_name} = $old_product->name; # Delete fields that depend upon the old Product value. delete $self->{choices}; $product_changed = 1; } $params ||= {}; # We delete these so that they're not set again later in set_all. my $comp_name = delete $params->{component} || $self->component; my $vers_name = delete $params->{version} || $self->version; my $tm_name = delete $params->{target_milestone}; # This way, if usetargetmilestone is off and we've changed products, # set_target_milestone will reset our target_milestone to # $product->default_milestone. But if we haven't changed products, # we don't reset anything. if (!defined $tm_name && (Bugzilla->params->{'usetargetmilestone'} || !$product_changed)) { $tm_name = $self->target_milestone; } ## REDHAT EXTENSION START 706784 877243 my $tr_names = $params->{target_release}; # This way, if usetargetrelease is off and we've changed products, # set_target_release will reset our target_release to # $product->default_release. But if we haven't changed products, # we don't reset anything. if (not defined $tr_names && (Bugzilla->params->{'usetargetrelease'} || !$product_changed)) { $tr_names = $self->target_release; } ## REDHAT EXTENSION END 706784 877243 if ($product_changed && Bugzilla->usage_mode == USAGE_MODE_BROWSER) { # Try to set each value with the new product. # Have to set error_mode because Throw*Error calls exit() otherwise. my $old_error_mode = Bugzilla->error_mode; Bugzilla->error_mode(ERROR_MODE_DIE); my $component_ok = eval { $self->set_component($comp_name); 1; }; my $version_ok = eval { $self->set_version($vers_name); 1; }; my $milestone_ok = 1; # Reporters can move bugs between products but not set the TM. if ($self->check_can_change_field('target_milestone', 0, 1)) { $milestone_ok = eval { $self->set_target_milestone($tm_name); 1; }; } else { # Have to set this directly to bypass the validators. $self->{target_milestone} = $product->default_milestone; } ## REDHAT EXTENSION START 706784 877243 my $release_ok = 1; # Reporters can move bugs between products but not set the TR. if ($self->check_can_change_field('target_release', 0, 1)) { $release_ok = eval { $self->set_target_release($tr_names); 1; }; } else { # Have to set this directly to bypass the validators. $self->{target_release} = [$product->default_release]; } ## REDHAT EXTENSION END 706784 877243 # If there were any errors thrown, make sure we don't mess up any # other part of Bugzilla that checks $@. undef $@; Bugzilla->error_mode($old_error_mode); my $verified = $params->{product_change_confirmed}; my %vars; ## REDHAT EXTENSION 2006361 - Ignore $verified if ( !$component_ok || !$version_ok || !$milestone_ok || !$release_ok) { $vars{component_ok} = $component_ok; $vars{version_ok} = $version_ok; $vars{milestone_ok} = $milestone_ok; $vars{release_ok} = $release_ok; $vars{defaults} = { # Note that because of the eval { set } above, these are # already set correctly if they're valid, otherwise they're # set to some invalid value which the template will ignore. component => $self->component, version => $self->version, milestone => $milestone_ok ? $self->target_milestone : $product->default_milestone, release => $release_ok ? $self->target_release : $product->default_release }; ## REDHAT EXTENSION BEGIN 1151025 $vars{defaults}->{component} = [$self->component, @{$params->{'extra_components'}}] if ($params->{'extra_components'}); ## REDHAT EXTENSION END 1151025 $vars{components} = [map { $_->name } grep($_->is_active, @{$product->components})]; $vars{milestones} = [map { $_->name } grep($_->is_active, @{$product->milestones})]; $vars{releases} = [map { $_->name } grep($_->is_active, @{$product->releases})]; $vars{versions} = [map { $_->name } grep($_->is_active, @{$product->versions})]; $vars{verify_bug_groups} = 1; my $dbh = Bugzilla->dbh; my @idlist = ($self->id); push(@idlist, map { $_->id } @{$params->{other_bugs}}) if $params->{other_bugs}; @idlist = uniq @idlist; # Get the ID of groups which are no longer valid in the new product. my $gids = $dbh->selectcol_arrayref( 'SELECT bgm.group_id FROM bug_group_map AS bgm WHERE bgm.bug_id IN (' . join(',', ('?') x @idlist) . ') AND bgm.group_id NOT IN (SELECT gcm.group_id FROM group_control_map AS gcm WHERE gcm.product_id = ? AND ( (gcm.membercontrol != ? AND gcm.group_id IN (' . Bugzilla->user->groups_as_string . ')) OR gcm.othercontrol != ?) )', undef, (@idlist, $product->id, CONTROLMAPNA, CONTROLMAPNA) ); $vars{'old_groups'} = Bugzilla::Group->new_from_list($gids); # Did we come here from editing multiple bugs? (affects how we # show optional group changes) $vars{multiple_bugs} = (@idlist > 1) ? 1 : 0; } if (%vars) { $vars{product} = $product; $vars{bug} = $self; my $template = Bugzilla->template; $template->process("bug/process/verify-new-product.html.tmpl", \%vars) || ThrowTemplateError($template->error()); exit; } } else { # When we're not in the browser (or we didn't change the product), we # just die if any of these are invalid. $self->set_component($comp_name); $self->set_version($vers_name); if ($product_changed and !$self->check_can_change_field('target_milestone', 0, 1)) { # Have to set this directly to bypass the validators. $self->{target_milestone} = $product->default_milestone; } else { $self->set_target_milestone($tm_name); } if ($product_changed && !$self->check_can_change_field('target_release', 0, 1)) { # Have to set this directly to bypass the validators. $self->{target_release} = [$product->default_release]; } else { $self->set_target_release($tr_names); } } if ($product_changed) { # Remove groups that can't be set in the new product. # We copy this array because the original array is modified while we're # working, and that confuses "foreach". my @current_groups = @{$self->groups_in}; foreach my $group (@current_groups) { if (!$product->group_is_valid($group)) { $self->remove_group($group); } } # Make sure the bug is in all the mandatory groups for the new product. foreach my $group (@{$product->groups_mandatory}) { $self->add_group($group); } } return $product_changed; } sub set_qa_contact { my ($self, $value) = @_; $self->set('qa_contact', $value); # Store the old QA contact. check_can_change_field() needs it. if ($self->{'qa_contact_obj'}) { $self->{'_old_qa_contact'} = $self->{'qa_contact_obj'}->id; } delete $self->{'qa_contact_obj'}; } sub reset_qa_contact { my $self = shift; my $comp = $self->component_obj; $self->set_qa_contact($comp->default_qa_contact); } ## REDHAT EXTENSION START 876015 sub set_docs_contact { my ($self, $value) = @_; $self->set('docs_contact', $value); # Store the old Docs contact. check_can_change_field() needs it. if ($self->{'docs_contact_obj'}) { $self->{'_old_docs_contact'} = $self->{'docs_contact_obj'}->id; } delete $self->{'docs_contact_obj'}; } sub reset_docs_contact { my $self = shift; my $comp = $self->component_obj; $self->set_docs_contact($comp->default_docs_contact); } ## REDHAT EXTENSION END 876015 sub set_remaining_time { $_[0]->set('remaining_time', $_[1]); } # Used only when closing a bug or moving between closed states. sub _zero_remaining_time { $_[0]->{'remaining_time'} = 0; } sub set_reporter_accessible { $_[0]->set('reporter_accessible', $_[1]); } sub set_resolution { my ($self, $value, $params) = @_; my $old_res = $self->resolution; $self->set('resolution', $value); delete $self->{choices}; my $new_res = $self->resolution; if ($new_res ne $old_res) { # Clear the dup_id if we're leaving the dup resolution. if ($old_res eq 'DUPLICATE') { $self->_clear_dup_id(); } # Duplicates should have no remaining time left. elsif ($new_res eq 'DUPLICATE' && $self->remaining_time != 0) { $self->_zero_remaining_time(); } } # We don't check if we're entering or leaving the dup resolution here, # because we could be moving from being a dup of one bug to being a dup # of another, theoretically. Note that this code block will also run # when going between different closed states. if ($self->resolution eq 'DUPLICATE') { if (my $dup_id = $params->{dup_id}) { $self->set_dup_id($dup_id); } elsif (!$self->dup_id) { ThrowUserError('dupe_id_required'); } } # This method has handled dup_id, so set_all doesn't have to worry # about it now. delete $params->{dup_id}; } sub clear_resolution { my $self = shift; if (!$self->status->is_open) { ThrowUserError('resolution_cant_clear', {bug_id => $self->id}); } $self->{'resolution'} = ''; $self->_clear_dup_id; } ## REDHAT EXTENSION START 1244617 sub resolutions_available { my $self = shift; return $self->{'resolutions_available'} if defined $self->{'resolutions_available'}; my $resolution_field = new Bugzilla::Field({name => 'resolution'}); # Don't include the empty resolutions my @resolutions = grep($_->name, @{$resolution_field->legal_values}); $self->{'resolutions_available'} = \@resolutions; return \@resolutions; } ## REDHAT EXTENSION END 1244617 sub set_severity { $_[0]->set('bug_severity', $_[1]); } sub set_bug_status { my ($self, $status, $params) = @_; my $old_status = $self->status; $self->set('bug_status', $status); delete $self->{'status'}; delete $self->{'statuses_available'}; delete $self->{'choices'}; my $new_status = $self->status; if ($new_status->is_open) { # Check for the everconfirmed transition $self->_set_everconfirmed($new_status->name eq 'UNCONFIRMED' ? 0 : 1); $self->clear_resolution(); # Calling clear_resolution handled the "resolution" and "dup_id" # setting, so set_all doesn't have to worry about them. delete $params->{resolution}; delete $params->{dup_id}; } else { # We do this here so that we can make sure closed statuses have # resolutions. my $resolution = $self->resolution; # We need to check "defined" to prevent people from passing # a blank resolution in the WebService, which would otherwise fail # silently. if (defined $params->{resolution}) { $resolution = delete $params->{resolution}; } $self->set_resolution($resolution, $params); # Changing between closed statuses zeros the remaining time. if ($new_status->id != $old_status->id && $self->remaining_time != 0) { $self->_zero_remaining_time(); } } } sub set_status_whiteboard { $_[0]->set('status_whiteboard', $_[1]); } sub set_summary { $_[0]->set('short_desc', $_[1]); } sub set_target_milestone { $_[0]->set('target_milestone', $_[1]); } sub set_url { $_[0]->set('bug_file_loc', $_[1]); } sub set_version { $_[0]->set('version', $_[1]); } ## REDHAT EXTENSION START 706784 877243 sub set_target_release { $_[0]->set('target_release', $_[1]); } ## REDHAT EXTENSION END 706784 877243 ## REDHAT EXTENSION START 406451 850909 # Clear the needinfo flag if the user has ticked the box stating # 'I am providing the requested information for this bug' sub set_needinfo { my ($self, $comment, $isprivate, $clear_needinfo, $clear_my_needinfo) = @_; return unless($clear_needinfo || $clear_my_needinfo); # Nothing to do. my @flags; foreach my $type (@{$self->flag_types}) { foreach my $flag (@{$type->{flags}}) { if ($flag->id && $flag->name eq 'needinfo' && $flag->status eq '?') { ## REDHAT EXTENSION 1729004 next if ($clear_my_needinfo && (!$flag->requestee_id || $flag->requestee_id != Bugzilla->user->id)); # Don't remove the needinfo flag if the comment is private and the # flag setter isn't a member of the private_comment group. if (!$isprivate || $flag->setter->is_insider) { push(@flags, {id => $flag->id, status => 'X'}); } } } } $self->set_flags(\@flags, []); } ## REDHAT EXTENSION END 406451 850909 ######################## # "Add/Remove" Methods # ######################## # These are in alphabetical order by field name. # Accepts a User object or a username. Adds the user only if they # don't already exist as a CC on the bug. ## REDHAT EXTENSION 1269925 Don't add unprivileged users for automated changes. sub add_cc { my ($self, $user_or_name, $exclude_unprivileged) = @_; return if !$user_or_name; my $user = ref $user_or_name ? $user_or_name : Bugzilla::User->check($user_or_name); $self->_check_strict_isolation_for_user($user); my $cc_users = $self->cc_users; ## REDHAT EXTENSION START 1269925 my @current_groups = @{$self->groups_in}; if ($exclude_unprivileged && @current_groups) { my $product_id = $self->{product_id}; my $allowed = 0; foreach my $group (@current_groups) { if ($user->in_group($group->name, $product_id)) { # This user can see this bug, so add them to the CC: $allowed = 1; last; } } return unless ($allowed); } ## REDHAT EXTENSION END 1269925 push(@$cc_users, $user) if !grep($_->id == $user->id, @$cc_users); } # Accepts a User object or a username. Removes the User if they exist # in the list, but doesn't throw an error if they don't exist. sub remove_cc { my ($self, $user_or_name) = @_; my $user = ref $user_or_name ? $user_or_name : Bugzilla::User->check($user_or_name); my $currentUser = Bugzilla->user; if (!$self->user->{'canedit'} && $user->id != $currentUser->id) { ThrowUserError('cc_remove_denied'); } my $cc_users = $self->cc_users; @$cc_users = grep { $_->id != $user->id } @$cc_users; } sub add_alias { my ($self, $alias) = @_; return if !$alias; my $aliases = $self->_check_alias($alias); $alias = $aliases->[0]; my @new_aliases; my $found = 0; foreach my $old_alias (@{$self->alias}) { if (lc($old_alias) eq lc($alias)) { push(@new_aliases, $alias); $found = 1; } else { push(@new_aliases, $old_alias); } } push(@new_aliases, $alias) if !$found; $self->{alias} = \@new_aliases; } sub remove_alias { my ($self, $alias) = @_; my $bug_aliases = $self->alias; @$bug_aliases = grep { $_ ne $alias } @$bug_aliases; } # $bug->add_comment("comment", {isprivate => 1, work_time => 10.5, # type => CMT_NORMAL, extra_data => $data}); sub add_comment { my ($self, $comment, $params) = @_; $params ||= {}; # Fill out info that doesn't change and callers may not pass in $params->{'bug_id'} = $self; $params->{'thetext'} = defined($comment) ? $comment : ''; # Validate all the entered data Bugzilla::Comment->check_required_create_fields($params); $params = Bugzilla::Comment->run_create_validators($params); # This makes it so we won't create new comments when there is nothing # to add if ($params->{'thetext'} eq '' && !($params->{type} || abs($params->{work_time} || 0))) { return; } # If the user has explicitly set remaining_time, this will be overridden # later in set_all. But if they haven't, this keeps remaining_time # up-to-date. if ($params->{work_time}) { $self->set_remaining_time(max($self->remaining_time - $params->{work_time}, 0)); } $self->{added_comments} ||= []; push(@{$self->{added_comments}}, $params); } # There was a lot of duplicate code when I wrote this as three separate # functions, so I just combined them all into one. This is also easier for # process_bug to use. sub modify_keywords { my ($self, $keywords, $action) = @_; if (!$action || !grep { $action eq $_ } qw(add remove set)) { $action = 'set'; } $keywords = $self->_check_keywords($keywords); my @old_keywords = @{$self->keyword_objects}; my @result; if ($action eq 'set') { @result = @$keywords; } else { # We're adding or deleting specific keywords. my %keys = map { $_->id => $_ } @old_keywords; if ($action eq 'add') { $keys{$_->id} = $_ foreach @$keywords; } else { delete $keys{$_->id} foreach @$keywords; } @result = values %keys; } # Check if anything was added or removed. my @old_ids = map { $_->id } @old_keywords; my @new_ids = map { $_->id } @result; my ($removed, $added) = diff_arrays(\@old_ids, \@new_ids); my $any_changes = scalar @$removed || scalar @$added; # Make sure we retain the sort order. @result = sort { lc($a->name) cmp lc($b->name) } @result; if ($any_changes) { my $privs; my $new = join(', ', (map { $_->name } @result)); my $check = $self->check_can_change_field('keywords', 0, 1, \$privs) || ThrowUserError( 'illegal_change', { field => 'keywords', oldvalue => $self->keywords, newvalue => $new, privs => $privs } ); } $self->{'keyword_objects'} = \@result; } sub add_group { my ($self, $group) = @_; # If the user enters "FoO" but the DB has "Foo", $group->name would # return "Foo" and thus revealing the existence of the group name. # So we have to store and pass the name as entered by the user to # the error message, if we have it. my $group_name = blessed($group) ? $group->name : $group; my $args = { name => $group_name, product => $self->product, bug_id => $self->id, action => 'add' }; $group = Bugzilla::Group->check_no_disclose($args) if !blessed $group; # If the bug is already in this group, then there is nothing to do. return if $self->in_group($group); # Make sure that bugs in this product can actually be restricted # to this group by the current user. $self->product_obj->group_is_settable($group) || ThrowUserError('group_restriction_not_allowed', $args); ## REDHAT EXTENSION START 408671 # We need to allow all 'othercontrol' type groups to be added # at bug change time, upstream has this only enabled at product # change time and at bug entry time # OtherControl people can add groups only during a product change, # and only when the group is not NA for them. #if (!Bugzilla->user->in_group($group->name)) { # my $controls = $self->product_obj->group_controls->{$group->id}; # if (!$self->{_old_product_name} # || $controls->{othercontrol} == CONTROLMAPNA) # { # ThrowUserError('group_restriction_not_allowed', $args); # } #} #REDHAT EXTENSION END 408671 my $current_groups = $self->groups_in; push(@$current_groups, $group); } sub remove_group { my ($self, $group) = @_; # See add_group() for the reason why we store the user input. my $group_name = blessed($group) ? $group->name : $group; my $args = { name => $group_name, product => $self->product, bug_id => $self->id, action => 'remove' }; $group = Bugzilla::Group->check_no_disclose($args) if !blessed $group; # If the bug isn't in this group, then either the name is misspelled, # or the group really doesn't exist. Let the user know about this problem. $self->in_group($group) || ThrowUserError('group_invalid_removal', $args); # Check if this is a valid group for this product. You can *always* # remove a group that is not valid for this product (set_product does this). # This particularly happens when we're moving a bug to a new product. # You still have to be a member of an inactive group to remove it. if ($self->product_obj->group_is_valid($group)) { my $controls = $self->product_obj->group_controls->{$group->id}; # Nobody can ever remove a Mandatory group, unless it became inactive. if ($controls->{membercontrol} == CONTROLMAPMANDATORY && $group->is_active) { ThrowUserError('group_invalid_removal', $args); } # OtherControl people can remove groups only during a product change, # and only when they are non-Mandatory and non-NA. if (!Bugzilla->user->in_group($group->name)) { if (!$self->{_old_product_name} || $controls->{othercontrol} == CONTROLMAPMANDATORY || $controls->{othercontrol} == CONTROLMAPNA) { ThrowUserError('group_invalid_removal', $args); } } } my $current_groups = $self->groups_in; @$current_groups = grep { $_->id != $group->id } @$current_groups; } sub add_see_also { my ($self, $input, $skip_recursion) = @_; # REDHAT EXTENSION START 1920323 unless (Bugzilla->params->{"use_see_also"}) { ThrowUserError('see_also_disabled'); } # REDHAT EXTENSION END 1920323 # This is needed by xt/search.t. $input = $input->name if blessed($input); $input = trim($input); return if !$input; my ($class, $uri) = Bugzilla::BugUrl->class_for($input); my $params = {value => $uri, bug_id => $self, class => $class}; $class->check_required_create_fields($params); my $field_values = $class->run_create_validators($params); my $value = $field_values->{value}->as_string; trick_taint($value); $field_values->{value} = $value; # We only add the new URI if it hasn't been added yet. URIs are # case-sensitive, but most of our DBs are case-insensitive, so we do # this check case-insensitively. if (!grep { lc($_->name) eq lc($value) } @{$self->see_also}) { my $privs; my $can = $self->check_can_change_field('see_also', '', $value, \$privs); if (!$can) { ThrowUserError('illegal_change', {field => 'see_also', newvalue => $value, privs => $privs}); } # If this is a link to a local bug then save the # ref bug id for sending changes email. my $ref_bug = delete $field_values->{ref_bug}; if ( $class->isa('Bugzilla::BugUrl::Bugzilla::Local') and !$skip_recursion and $ref_bug->check_can_change_field('see_also', '', $self->id, \$privs)) { $ref_bug->add_see_also($self->id, 'skip_recursion'); push @{$self->{_update_ref_bugs}}, $ref_bug; push @{$self->{see_also_changes}}, $ref_bug->id; } push @{$self->{see_also}}, bless($field_values, $class); } } sub remove_see_also { my ($self, $url, $skip_recursion) = @_; my $see_also = $self->see_also; # This is needed by xt/search.t. $url = $url->name if blessed($url); my ($removed_bug_url, $new_see_also) = part { lc($_->name) ne lc($url) } @$see_also; my $privs; my $can = $self->check_can_change_field('see_also', $see_also, $new_see_also, \$privs); if (!$can) { ThrowUserError('illegal_change', {field => 'see_also', oldvalue => $url, privs => $privs}); } # Since we remove also the url from the referenced bug, # we need to notify changes for that bug too. $removed_bug_url = $removed_bug_url->[0]; if ( !$skip_recursion and $removed_bug_url and $removed_bug_url->isa('Bugzilla::BugUrl::Bugzilla::Local') and $removed_bug_url->ref_bug_url) { my $ref_bug = Bugzilla::Bug->check($removed_bug_url->ref_bug_url->bug_id); if (Bugzilla->user->can_edit_product($ref_bug->product_id) and $ref_bug->check_can_change_field('see_also', $self->id, '', \$privs)) { my $self_url = $removed_bug_url->local_uri($self->id); $ref_bug->remove_see_also($self_url, 'skip_recursion'); push @{$self->{_update_ref_bugs}}, $ref_bug; push @{$self->{see_also_changes}}, $ref_bug->id; } } $self->{see_also} = $new_see_also || []; } sub add_tag { my ($self, $tag) = @_; my $dbh = Bugzilla->dbh; my $user = Bugzilla->user; $tag = $self->_check_tag_name($tag); my $tag_id = $user->tags->{$tag}->{id}; # If this tag doesn't exist for this user yet, create it. if (!$tag_id) { $dbh->do('INSERT INTO tag (user_id, name) VALUES (?, ?)', undef, ($user->id, $tag)); $tag_id = $dbh->selectrow_array( 'SELECT id FROM tag WHERE name = ? AND user_id = ?', undef, ($tag, $user->id) ); # The list has changed. delete $user->{tags}; } # Do nothing if this tag is already set for this bug. return if grep { $_ eq $tag } @{$self->tags}; # Increment the counter. Do it before the SQL call below, # to not count the tag twice. $user->tags->{$tag}->{bug_count}++; $dbh->do('INSERT INTO bug_tag (bug_id, tag_id) VALUES (?, ?)', undef, ($self->id, $tag_id)); push(@{$self->{tags}}, $tag); } sub remove_tag { my ($self, $tag) = @_; my $dbh = Bugzilla->dbh; my $user = Bugzilla->user; $tag = $self->_check_tag_name($tag); my $tag_id = exists $user->tags->{$tag} ? $user->tags->{$tag}->{id} : undef; # Do nothing if the user doesn't use this tag, or didn't set it for this bug. return unless ($tag_id && grep { $_ eq $tag } @{$self->tags}); $dbh->do('DELETE FROM bug_tag WHERE bug_id = ? AND tag_id = ?', undef, ($self->id, $tag_id)); $self->{tags} = [grep { $_ ne $tag } @{$self->tags}]; # Decrement the counter, and delete the tag if no bugs are using it anymore. if (!--$user->tags->{$tag}->{bug_count}) { $dbh->do('DELETE FROM tag WHERE name = ? AND user_id = ?', undef, ($tag, $user->id)); # The list has changed. delete $user->{tags}; } } sub tags { my $self = shift; my $dbh = Bugzilla->dbh; my $user = Bugzilla->user; # This method doesn't support several users using the same bug object. if (!exists $self->{tags}) { $self->{tags} = $dbh->selectcol_arrayref( 'SELECT name FROM bug_tag INNER JOIN tag ON tag.id = bug_tag.tag_id WHERE bug_id = ? AND user_id = ?', undef, ($self->id, $user->id) ); } return $self->{tags}; } ##################################################################### # Simple Accessors ##################################################################### # These are accessors that don't need to access the database. # Keep them in alphabetical order. sub bug_file_loc { return $_[0]->{bug_file_loc} } sub bug_id { return $_[0]->{bug_id} } sub bug_severity { return $_[0]->{bug_severity} } sub bug_status { return $_[0]->{bug_status} } sub cclist_accessible { return $_[0]->{cclist_accessible} } sub component_id { return $_[0]->{component_id} } sub creation_ts { return $_[0]->{creation_ts} } sub estimated_time { return $_[0]->{estimated_time} } sub deadline { return $_[0]->{deadline} } sub delta_ts { return $_[0]->{delta_ts} } sub error { return $_[0]->{error} } sub everconfirmed { return $_[0]->{everconfirmed} } sub lastdiffed { return $_[0]->{lastdiffed} } sub op_sys { return $_[0]->{op_sys} } sub priority { return $_[0]->{priority} } sub product_id { return $_[0]->{product_id} } sub remaining_time { return $_[0]->{remaining_time} } sub reporter_accessible { return $_[0]->{reporter_accessible} } sub rep_platform { return $_[0]->{rep_platform} } sub resolution { return $_[0]->{resolution} } sub short_desc { return $_[0]->{short_desc} } sub status_whiteboard { return $_[0]->{status_whiteboard} } sub target_milestone { return $_[0]->{target_milestone} } sub version { return $_[0]->{version} } ##################################################################### # Complex Accessors ##################################################################### # These are accessors that have to access the database for additional # information about a bug. # These subs are in alphabetical order, as much as possible. # If you add a new sub, please try to keep it in alphabetical order # with the other ones. # Note: If you add a new method, remember that you must check the error # state of the bug before returning any data. If $self->{error} is # defined, then return something empty. Otherwise you risk potential # security holes. sub dup_id { my ($self) = @_; return $self->{'dup_id'} if exists $self->{'dup_id'}; $self->{'dup_id'} = undef; return if $self->{'error'}; if ($self->{'resolution'} eq 'DUPLICATE') { my $dbh = Bugzilla->dbh; $self->{'dup_id'} = $dbh->selectrow_array( q{SELECT dupe_of FROM duplicates WHERE dupe = ?}, undef, $self->{'bug_id'} ); } return $self->{'dup_id'}; } sub _resolve_ultimate_dup_id { my ($bug_id, $dupe_of, $loops_are_an_error) = @_; my $dbh = Bugzilla->dbh; my $sth = $dbh->prepare('SELECT dupe_of FROM duplicates WHERE dupe = ?'); my $this_dup = $dupe_of || $dbh->selectrow_array($sth, undef, $bug_id); my $last_dup = $bug_id; my %dupes; while ($this_dup) { if ($this_dup == $bug_id) { if ($loops_are_an_error) { ThrowUserError('dupe_loop_detected', {bug_id => $bug_id, dupe_of => $dupe_of}); } else { return $last_dup; } } # If $dupes{$this_dup} is already set to 1, then a loop # already exists which does not involve this bug. # As the user is not responsible for this loop, do not # prevent them from marking this bug as a duplicate. return $last_dup if exists $dupes{$this_dup}; $dupes{$this_dup} = 1; $last_dup = $this_dup; $this_dup = $dbh->selectrow_array($sth, undef, $this_dup); } return $last_dup; } sub actual_time { my ($self) = @_; return $self->{'actual_time'} if exists $self->{'actual_time'}; if ($self->{'error'} || !Bugzilla->user->is_timetracker) { $self->{'actual_time'} = undef; return $self->{'actual_time'}; } my $sth = Bugzilla->dbh->prepare( "SELECT SUM(work_time) FROM longdescs WHERE longdescs.bug_id=?" ); $sth->execute($self->{bug_id}); $self->{'actual_time'} = $sth->fetchrow_array(); return $self->{'actual_time'}; } sub alias { my ($self) = @_; return $self->{'alias'} if exists $self->{'alias'}; return [] if $self->{'error'}; my $dbh = Bugzilla->dbh; $self->{'alias'} = $dbh->selectcol_arrayref( q{SELECT alias FROM bugs_aliases WHERE bug_id = ? ORDER BY alias}, undef, $self->bug_id); return $self->{'alias'}; } sub any_flags_requesteeble { my ($self) = @_; return $self->{'any_flags_requesteeble'} if exists $self->{'any_flags_requesteeble'}; return 0 if $self->{'error'}; my $any_flags_requesteeble = grep { $_->is_requestable && $_->is_requesteeble } @{$self->flag_types}; # Useful in case a flagtype is no longer requestable but a requestee # has been set before we turned off that bit. $any_flags_requesteeble ||= grep { $_->requestee_id } @{$self->flags}; $self->{'any_flags_requesteeble'} = $any_flags_requesteeble; return $self->{'any_flags_requesteeble'}; } sub attachments { my ($self) = @_; return $self->{'attachments'} if exists $self->{'attachments'}; return [] if $self->{'error'}; $self->{'attachments'} = Bugzilla::Attachment->get_attachments_by_bug($self, {preload => 1}); $_->object_cache_set() foreach @{$self->{'attachments'}}; return $self->{'attachments'}; } sub assigned_to { my ($self) = @_; return $self->{'assigned_to_obj'} if exists $self->{'assigned_to_obj'}; $self->{'assigned_to'} = 0 if $self->{'error'}; $self->{'assigned_to_obj'} ||= new Bugzilla::User({id => $self->{'assigned_to'}, cache => 1}); return $self->{'assigned_to_obj'}; } sub blocked { my ($self) = @_; return $self->{'blocked'} if exists $self->{'blocked'}; return [] if $self->{'error'}; $self->{'blocked'} = EmitDependList("dependson", "blocked", $self->bug_id); return $self->{'blocked'}; } sub blocks_obj { my ($self) = @_; $self->{blocks_obj} ||= $self->_bugs_in_order($self->blocked); return $self->{blocks_obj}; } sub bug_group { my ($self) = @_; return join(', ', (map { $_->name } @{$self->groups_in})); } sub related_bugs { my ($self, $relationship) = @_; return [] if $self->{'error'}; my $field_name = $relationship->name; $self->{'related_bugs'}->{$field_name} ||= $self->match({$field_name => $self->id}); return $self->{'related_bugs'}->{$field_name}; } sub cc { my ($self) = @_; return $self->{'cc'} if exists $self->{'cc'}; return [] if $self->{'error'}; my $dbh = Bugzilla->dbh; $self->{'cc'} = $dbh->selectcol_arrayref( q{SELECT profiles.login_name FROM cc, profiles WHERE bug_id = ? AND cc.who = profiles.userid ORDER BY profiles.login_name}, undef, $self->bug_id ); return $self->{'cc'}; } # XXX Eventually this will become the standard "cc" method used everywhere. sub cc_users { my $self = shift; return $self->{'cc_users'} if exists $self->{'cc_users'}; return [] if $self->{'error'}; my $dbh = Bugzilla->dbh; my $cc_ids = $dbh->selectcol_arrayref('SELECT who FROM cc WHERE bug_id = ?', undef, $self->id); $self->{'cc_users'} = Bugzilla::User->new_from_list($cc_ids); return $self->{'cc_users'}; } sub component { my ($self) = @_; return '' if $self->{error}; $self->{component} //= $self->component_obj->name; return $self->{component}; } # XXX Eventually this will replace component() sub component_obj { my ($self) = @_; return $self->{component_obj} if defined $self->{component_obj}; return {} if $self->{error}; $self->{component_obj} = new Bugzilla::Component({id => $self->{component_id}, cache => 1}); return $self->{component_obj}; } sub classification_id { my ($self) = @_; return 0 if $self->{error}; $self->{classification_id} //= $self->product_obj->classification_id; return $self->{classification_id}; } sub classification { my ($self) = @_; return '' if $self->{error}; $self->{classification} //= $self->product_obj->classification->name; return $self->{classification}; } sub default_bug_status { my $class = shift; # XXX This should just call new_bug_statuses when the UI accepts closed # bug statuses instead of accepting them as a parameter. my @statuses = @_; my $status; if (scalar(@statuses) == 1) { $status = $statuses[0]->name; } else { $status = ($statuses[0]->name ne 'UNCONFIRMED') ? $statuses[0]->name : $statuses[1]->name; } return $status; } sub dependson { my ($self) = @_; return $self->{'dependson'} if exists $self->{'dependson'}; return [] if $self->{'error'}; $self->{'dependson'} = EmitDependList("blocked", "dependson", $self->bug_id); return $self->{'dependson'}; } sub depends_on_obj { my ($self) = @_; $self->{depends_on_obj} ||= $self->_bugs_in_order($self->dependson); return $self->{depends_on_obj}; } sub duplicates { my $self = shift; return $self->{duplicates} if exists $self->{duplicates}; return [] if $self->{error}; $self->{duplicates} = Bugzilla::Bug->new_from_list($self->duplicate_ids); return $self->{duplicates}; } sub duplicate_ids { my $self = shift; return $self->{duplicate_ids} if exists $self->{duplicate_ids}; return [] if $self->{error}; my $dbh = Bugzilla->dbh; $self->{duplicate_ids} = $dbh->selectcol_arrayref('SELECT dupe FROM duplicates WHERE dupe_of = ?', undef, $self->id); return $self->{duplicate_ids}; } ## REDHAT EXTENSION START 612792 sub clones { my $self = shift; return $self->{clones} if exists $self->{clones}; return [] if $self->{error}; $self->{clones} = Bugzilla::Bug->new_from_list($self->clone_ids); return $self->{clones}; } sub clone_ids { my $self = shift; return $self->{clone_ids} if exists $self->{clone_ids}; return [] if $self->{error}; my $dbh = Bugzilla->dbh; $self->{clone_ids} = $dbh->selectcol_arrayref('SELECT bug_id FROM bugs WHERE cf_clone_of = ?', undef, $self->id); return $self->{clone_ids}; } ## REDHAT EXTENSION END 612792 sub flag_types { my ($self) = @_; return $self->{'flag_types'} if exists $self->{'flag_types'}; return [] if $self->{'error'}; my $vars = { target_type => 'bug', product_id => $self->{product_id}, component_id => $self->{component_id}, bug_id => $self->bug_id }; $self->{'flag_types'} = Bugzilla::Flag->_flag_types($vars); return $self->{'flag_types'}; } sub flags { my $self = shift; # Don't cache it as it must be in sync with ->flag_types. $self->{flags} = [map { @{$_->{flags}} } @{$self->flag_types}]; return $self->{flags}; } sub isopened { my $self = shift; unless (exists $self->{isopened}) { $self->{isopened} = is_open_state($self->{bug_status}) ? 1 : 0; } return $self->{isopened}; } sub keywords { my ($self) = @_; return join(', ', (map { $_->name } @{$self->keyword_objects})); } # XXX At some point, this should probably replace the normal "keywords" sub. sub keyword_objects { my $self = shift; return $self->{'keyword_objects'} if defined $self->{'keyword_objects'}; return [] if $self->{'error'}; my $dbh = Bugzilla->dbh; my $ids = $dbh->selectcol_arrayref("SELECT keywordid FROM keywords WHERE bug_id = ?", undef, $self->id); $self->{'keyword_objects'} = Bugzilla::Keyword->new_from_list($ids); return $self->{'keyword_objects'}; } ## REDHAT EXTENSION START 706784 877243 sub target_release { my $self = shift; return $self->{'target_release'} if defined $self->{'target_release'}; return [] if $self->{'error'}; my $dbh = Bugzilla->dbh; my $ids = $dbh->selectcol_arrayref("SELECT value FROM bugs_release WHERE bug_id = ?", undef, $self->id); return $self->{'target_release'} = $ids; } ## REDHAT EXTENSION END 706784 877243 sub comments { my ($self, $params) = @_; return [] if $self->{'error'}; $params ||= {}; if (!defined $self->{'comments'}) { $self->{'comments'} = Bugzilla::Comment->match({bug_id => $self->id}); my $count = 0; state $is_mysql = Bugzilla->dbh->isa('Bugzilla::DB::Mysql') ? 1 : 0; foreach my $comment (@{$self->{'comments'}}) { $comment->{count} = $count++; $comment->{bug} = $self; weaken($comment->{bug}); # XXX - hack for MySQL. Convert [U+....] back into its Unicode # equivalent for characters above U+FFFF as MySQL older than 5.5.3 # cannot store them, see Bugzilla::Comment::_check_thetext(). if ($is_mysql) { # Perl 5.13.8 and older complain about non-characters. no warnings 'utf8'; $comment->{thetext} =~ s/\x{FDD0}\[U\+((?:[1-9A-F]|10)[0-9A-F]{4})\]\x{FDD1}/chr(hex $1)/eg; } } # Some bugs may have no comments when upgrading old installations. Bugzilla::Comment->preload($self->{'comments'}) if $count; } my @comments = @{$self->{'comments'}}; my $order = $params->{order} || Bugzilla->user->setting('comment_sort_order'); if ($order ne 'oldest_to_newest') { @comments = reverse @comments; if ($order eq 'newest_to_oldest_desc_first') { unshift(@comments, pop @comments); } } if ($params->{after}) { my $from = datetime_from($params->{after}); @comments = grep { datetime_from($_->creation_ts) > $from } @comments; } if ($params->{to}) { my $to = datetime_from($params->{to}); @comments = grep { datetime_from($_->creation_ts) <= $to } @comments; } return \@comments; } sub new_bug_statuses { my ($class, $product) = @_; my $user = Bugzilla->user; # Construct the list of allowable statuses. my @statuses = @{Bugzilla::Bug->statuses_available($product)}; # If the user has no privs... unless ($user->in_group('editbugs', $product->id) || $user->in_group('canconfirm', $product->id)) { # ... use UNCONFIRMED if available, else use the first status of the list. my ($unconfirmed) = grep { $_->name eq 'UNCONFIRMED' } @statuses; # Because of an apparent Perl bug, "$unconfirmed || $statuses[0]" doesn't # work, so we're using an "?:" operator. See bug 603314 for details. @statuses = ($unconfirmed ? $unconfirmed : $statuses[0]); } return \@statuses; } # This is needed by xt/search.t. sub percentage_complete { my $self = shift; return undef if $self->{'error'} || !Bugzilla->user->is_timetracker; my $remaining = $self->remaining_time; my $actual = $self->actual_time; my $total = $remaining + $actual; return undef if $total == 0; # Search.pm truncates this value to an integer, so we want to as well, # since this is mostly used in a test where its value needs to be # identical to what the database will return. return int(100 * ($actual / $total)); } sub product { my ($self) = @_; return '' if $self->{error}; $self->{product} //= $self->product_obj->name; return $self->{product}; } # XXX This should eventually replace the "product" subroutine. sub product_obj { my $self = shift; return {} if $self->{error}; $self->{product_obj} ||= new Bugzilla::Product({id => $self->{product_id}, cache => 1}); return $self->{product_obj}; } sub qa_contact { my ($self) = @_; return $self->{'qa_contact_obj'} if exists $self->{'qa_contact_obj'}; return undef if $self->{'error'}; if (Bugzilla->params->{'useqacontact'} && $self->{'qa_contact'}) { $self->{'qa_contact_obj'} = new Bugzilla::User({id => $self->{'qa_contact'}, cache => 1}); } else { $self->{'qa_contact_obj'} = undef; } return $self->{'qa_contact_obj'}; } ## REDHAT EXTENSION START 876015 sub docs_contact { my ($self) = @_; return $self->{'docs_contact_obj'} if exists $self->{'docs_contact_obj'}; return undef if $self->{'error'}; if (Bugzilla->params->{'usedocscontact'} && $self->{'docs_contact'}) { $self->{'docs_contact_obj'} = new Bugzilla::User($self->{'docs_contact'}); } else { $self->{'docs_contact_obj'} = undef; } return $self->{'docs_contact_obj'}; } ## REDHAT EXTENSION END 876015 sub reporter { my ($self) = @_; return $self->{'reporter'} if exists $self->{'reporter'}; $self->{'reporter_id'} = 0 if $self->{'error'}; $self->{'reporter'} = new Bugzilla::User({id => $self->{'reporter_id'}, cache => 1}); return $self->{'reporter'}; } sub see_also { my ($self) = @_; return [] if $self->{'error'}; if (!exists $self->{see_also}) { my $ids = Bugzilla->dbh->selectcol_arrayref( 'SELECT id FROM bug_see_also WHERE bug_id = ?', undef, $self->id); my $bug_urls = Bugzilla::BugUrl->new_from_list($ids); $self->{see_also} = $bug_urls; } return $self->{see_also}; } sub status { my $self = shift; return undef if $self->{'error'}; $self->{'status'} ||= new Bugzilla::Status({name => $self->{'bug_status'}}); return $self->{'status'}; } sub statuses_available { my ($invocant, $product) = @_; my @statuses; if (ref $invocant) { return [] if $invocant->{'error'}; return $invocant->{'statuses_available'} if defined $invocant->{'statuses_available'}; @statuses = @{$invocant->status->can_change_to}; $product = $invocant->product_obj; } else { @statuses = @{Bugzilla::Status->can_change_to}; } # UNCONFIRMED is only a valid status if it is enabled in this product. if (!$product->allows_unconfirmed) { @statuses = grep { $_->name ne 'UNCONFIRMED' } @statuses; } if (ref $invocant) { my $available = $invocant->_refine_available_statuses(@statuses); $invocant->{'statuses_available'} = $available; return $available; } return \@statuses; } sub _refine_available_statuses { my $self = shift; my @statuses = @_; my @available; foreach my $status (@statuses) { # Make sure this is a legal status transition next if !$self->check_can_change_field('bug_status', $self->status->name, $status->name); push(@available, $status); } # If this bug has an inactive status set, it should still be in the list. if (!grep($_->name eq $self->status->name, @available)) { unshift(@available, $self->status); } return \@available; } sub show_attachment_flags { my ($self) = @_; return $self->{'show_attachment_flags'} if exists $self->{'show_attachment_flags'}; return 0 if $self->{'error'}; # The number of types of flags that can be set on attachments to this bug # and the number of flags on those attachments. One of these counts must be # greater than zero in order for the "flags" column to appear in the table # of attachments. my $num_attachment_flag_types = Bugzilla::FlagType::count({ 'target_type' => 'attachment', 'product_id' => $self->{'product_id'}, 'component_id' => $self->{'component_id'} }); my $num_attachment_flags = Bugzilla::Flag->count({ 'target_type' => 'attachment', 'bug_id' => $self->bug_id }); $self->{'show_attachment_flags'} = ($num_attachment_flag_types || $num_attachment_flags); return $self->{'show_attachment_flags'}; } sub groups { my $self = shift; return $self->{'groups'} if exists $self->{'groups'}; return [] if $self->{'error'}; my $dbh = Bugzilla->dbh; my @groups; # Some of this stuff needs to go into Bugzilla::User # For every group, we need to know if there is ANY bug_group_map # record putting the current bug in that group and if there is ANY # user_group_map record putting the user in that group. # The LEFT JOINs are checking for record existence. # my $grouplist = Bugzilla->user->groups_as_string; my $sql = "SELECT DISTINCT groups.id, name, description, category," . " CASE WHEN bug_group_map.group_id IS NOT NULL" . " THEN 1 ELSE 0 END,"; if (Bugzilla->user->in_group('admin')) { $sql .= " 1=1, "; } else { $sql .= " CASE WHEN groups.id IN($grouplist) THEN 1 ELSE 0 END,"; } $sql .= " isactive, membercontrol, othercontrol" . " FROM groups" . " LEFT JOIN bug_group_map" . " ON bug_group_map.group_id = groups.id" . " AND bug_id = ?" . " LEFT JOIN group_control_map" . " ON group_control_map.group_id = groups.id" . " AND group_control_map.product_id = ? " . " WHERE isbuggroup = 1" . " ORDER BY description"; my $sth = $dbh->prepare($sql); $sth->execute($self->{'bug_id'}, $self->{'product_id'}); while ( my ( $groupid, $name, $description, $category, $ison, $ingroup, $isactive, $membercontrol, $othercontrol ) = $sth->fetchrow_array() ) { $membercontrol ||= 0; # For product groups, we only want to use the group if either # (1) The bit is set and not required, or # (2) The group is Shown or Default for members and # the user is a member of the group. # ## REDHAT EXTENSION START 408671 # (3) The group is othercontrol type. if ( $ison || ( $isactive && ($ingroup || ($othercontrol && $othercontrol == CONTROLMAPSHOWN)) && ($membercontrol && ($membercontrol == CONTROLMAPDEFAULT || $membercontrol == CONTROLMAPSHOWN)) ) ) { my $ismandatory = $isactive && ($membercontrol == CONTROLMAPMANDATORY); my $isothercontrol = $isactive && ($othercontrol == CONTROLMAPSHOWN); push( @groups, { "bit" => $groupid, "name" => $name, "category" => $category, "ison" => $ison, "ingroup" => $ingroup, "mandatory" => $ismandatory, "othercontrol" => $isothercontrol, "description" => $description } ); } } $self->{'groups'} = \@groups; return $self->{'groups'}; } sub groups_in { my $self = shift; return $self->{'groups_in'} if exists $self->{'groups_in'}; return [] if $self->{'error'}; my $group_ids = Bugzilla->dbh->selectcol_arrayref( 'SELECT group_id FROM bug_group_map WHERE bug_id = ?', undef, $self->id); $self->{'groups_in'} = Bugzilla::Group->new_from_list($group_ids); return $self->{'groups_in'}; } sub in_group { my ($self, $group) = @_; return grep($_->id == $group->id, @{$self->groups_in}) ? 1 : 0; } sub user { my $self = shift; return $self->{'user'} if exists $self->{'user'}; return {} if $self->{'error'}; my $user = Bugzilla->user; my $prod_id = $self->{'product_id'}; my $editbugs = $user->in_group('editbugs', $prod_id); my $is_reporter = $user->id == $self->{reporter_id} ? 1 : 0; my $is_assignee = $user->id == $self->{'assigned_to'} ? 1 : 0; my $is_qa_contact = Bugzilla->params->{'useqacontact'} && $self->{'qa_contact'} && $user->id == $self->{'qa_contact'} ? 1 : 0; ## REDHAT EXTENSION START 876015 my $is_docs_contact = Bugzilla->params->{'usedocscontact'} && $self->{'docs_contact'} && $user->id == $self->{'docs_contact'} ? 1 : 0; my $canedit = $editbugs || $is_assignee || $is_qa_contact || $is_docs_contact; my $canconfirm = $editbugs || $user->in_group('canconfirm', $prod_id); my $has_any_role = $is_reporter || $is_assignee || $is_qa_contact || $is_docs_contact; ## REDHAT EXTENSION END 876015 $self->{'user'} = { canconfirm => $canconfirm, canedit => $canedit, isreporter => $is_reporter, has_any_role => $has_any_role }; return $self->{'user'}; } # This is intended to get values that can be selected by the user in the # UI. It should not be used for security or validation purposes. sub choices { my $self = shift; return $self->{'choices'} if exists $self->{'choices'}; return {} if $self->{'error'}; my $user = Bugzilla->user; my @products = @{$user->get_enterable_products}; # The current product is part of the popup, even if new bugs are no longer # allowed for that product if (!grep($_->name eq $self->product_obj->name, @products)) { unshift(@products, $self->product_obj); } my %class_ids = map { $_->classification_id => 1 } @products; my $classifications = Bugzilla::Classification->new_from_list([keys %class_ids]); my %choices = ( bug_status => $self->statuses_available, classification => $classifications, product => \@products, component => $self->product_obj->components, version => $self->product_obj->versions, target_milestone => $self->product_obj->milestones, target_release => $self->product_obj->releases, ); my $resolution_field = new Bugzilla::Field({name => 'resolution'}); # Don't include the empty resolution in drop-downs. my @resolutions = grep($_->name, @{$resolution_field->legal_values}); $choices{'resolution'} = \@resolutions; foreach my $key (keys %choices) { my $value = $self->$key; $choices{$key} = [grep { $_->is_active || $_->name eq $value } @{$choices{$key}}]; } $self->{'choices'} = \%choices; return $self->{'choices'}; } # Convenience Function. If you need speed, use this. If you need # other Bug fields in addition to this, just create a new Bug with # the alias. # Queries the database for the bug with a given alias, and returns # the ID of the bug if it exists or the undefined value if it doesn't. sub bug_alias_to_id { my ($alias) = @_; my $dbh = Bugzilla->dbh; trick_taint($alias); ## REDHAT EXTENSION - 1853587 - caseless return $dbh->selectrow_array( "SELECT bug_id FROM bugs_aliases WHERE lower(alias) = ?", undef, lc($alias)); } ##################################################################### # Subroutines ##################################################################### # Returns a list of currently active and editable bug fields, # including multi-select fields. sub editable_bug_fields { my @fields = Bugzilla->dbh->bz_table_columns('bugs'); # Add multi-select fields push( @fields, map { $_->name } @{Bugzilla->fields( {obsolete => 0, type => [FIELD_TYPE_MULTI_SELECT || FIELD_TYPE_ONE_SELECT]} ) } ); ## REDHAT EXTENSION BEGIN 1142795 push @fields, 'target_release'; ## REDHAT EXTENSION END 1142795 # Obsolete custom fields are not editable. my @obsolete_fields = @{Bugzilla->fields({obsolete => 1, custom => 1})}; @obsolete_fields = map { $_->name } @obsolete_fields; foreach my $remove ("bug_id", "reporter", "creation_ts", "delta_ts", "lastdiffed", @obsolete_fields) { my $location = firstidx { $_ eq $remove } @fields; # Ensure field exists before attempting to remove it. splice(@fields, $location, 1) if ($location > -1); } ## REDHAT EXTENSION BEGIN 826962 # We need to filter this list, but to do so, we need objects not names # We also need to specially handle the product_id and component_id fields my @field_obj = grep { defined $_ } map { Bugzilla::Field->new({name => $_}) } apply {s/^(product|component)_id$/$1/} @fields; Bugzilla::Hook::process('bug_filter_fields', {fields => \@field_obj}); # And turn it back into an array @fields = map { /^(product|component)$/ ? "${_}_id" : $_ } map { $_->name } @field_obj; ## REDHAT EXTENSION END 826962 # Sorted because the old @::log_columns variable, which this replaces, # was sorted. return sort(@fields); } # XXX - When Bug::update() will be implemented, we should make this routine # a private method. # Join with bug_status and bugs tables to show bugs with open statuses first, # and then the others sub EmitDependList { my ($my_field, $target_field, $bug_id, $exclude_resolved) = @_; my $cache = Bugzilla->request_cache->{bug_dependency_list} ||= {}; my $dbh = Bugzilla->dbh; $exclude_resolved = $exclude_resolved ? 1 : 0; my $is_open_clause = $exclude_resolved ? 'AND is_open = 1' : ''; $cache->{"${target_field}_sth_$exclude_resolved"} ||= $dbh->prepare( "SELECT $target_field FROM dependencies INNER JOIN bugs ON dependencies.$target_field = bugs.bug_id INNER JOIN bug_status ON bugs.bug_status = bug_status.value WHERE $my_field = ? $is_open_clause ORDER BY is_open DESC, $target_field" ); return $dbh->selectcol_arrayref( $cache->{"${target_field}_sth_$exclude_resolved"}, undef, $bug_id); } # Creates a lot of bug objects in the same order as the input array. sub _bugs_in_order { my ($self, $bug_ids) = @_; return [] unless @$bug_ids; my %bug_map; my $dbh = Bugzilla->dbh; # there's no need to load bugs from the database if they are already in the # object-cache my @missing_ids; foreach my $bug_id (@$bug_ids) { if (my $bug = Bugzilla::Bug->object_cache_get($bug_id)) { $bug_map{$bug_id} = $bug; } else { push @missing_ids, $bug_id; } } if (@missing_ids) { my $bugs = Bugzilla::Bug->new_from_list(\@missing_ids); $bug_map{$_->id} = $_ foreach @$bugs; } # Dependencies are often displayed using their aliases instead of their # bug ID. Load them all at once. my $rows = $dbh->selectall_arrayref('SELECT bug_id, alias FROM bugs_aliases WHERE ' . $dbh->sql_in('bug_id', $bug_ids) . ' ORDER BY alias'); foreach my $row (@$rows) { my ($bug_id, $alias) = @$row; $bug_map{$bug_id}->{alias} ||= []; push @{$bug_map{$bug_id}->{alias}}, $alias; } # Make sure all bugs have their alias attribute set. $bug_map{$_}->{alias} ||= [] foreach @$bug_ids; return [map { $bug_map{$_} } @$bug_ids]; } # Get the activity of a bug, starting from $starttime (if given). # This routine assumes Bugzilla::Bug->check has been previously called. sub get_activity { my ($self, $attach_id, $starttime, $include_comment_tags) = @_; my $dbh = Bugzilla->dbh; my $user = Bugzilla->user; # Arguments passed to the SQL query. my @args = ($self->id); # Only consider changes since $starttime, if given. my $datepart = ""; if (defined $starttime) { trick_taint($starttime); push(@args, $starttime); $datepart = "AND bug_when > ?"; } my $attachpart = ""; if ($attach_id) { push(@args, $attach_id); $attachpart = "AND bugs_activity.attach_id = ?"; } # Only includes attachments the user is allowed to see. my $suppjoins = ""; my $suppwhere = ""; if (!$user->is_insider) { $suppjoins = "LEFT JOIN attachments ON attachments.attach_id = bugs_activity.attach_id"; $suppwhere = "AND COALESCE(attachments.isprivate, 0) = 0"; } my $query = "SELECT fielddefs.name, fielddefs.description, bugs_activity.attach_id, " . $dbh->sql_date_format('bugs_activity.bug_when', '%Y.%m.%d %H:%i:%s') . " AS bug_when, bugs_activity.removed, bugs_activity.added, "; ## REDHAT EXTENSION START 447765 if (Bugzilla->user->id) { $query .= "profiles.login_name, "; } else { $query .= "profiles.realname, "; } ## REDHAT EXTENSION END 447765 ## REDHAT EXTENSION START 847166 $query .= "bugs_activity.object_id, "; ## REDHAT EXTENSION END 847166 $query .= " bugs_activity.comment_id, bugs_activity.id AS activity_order FROM bugs_activity $suppjoins INNER JOIN fielddefs ON bugs_activity.fieldid = fielddefs.id INNER JOIN profiles ON profiles.userid = bugs_activity.who WHERE bugs_activity.bug_id = ? $datepart $attachpart $suppwhere "; if ( Bugzilla->params->{'comment_taggers_group'} && $include_comment_tags && !$attach_id) { # Only includes comment tag activity for comments the user is allowed to see. $suppjoins = ""; $suppwhere = ""; if (!Bugzilla->user->is_insider) { $suppjoins = "INNER JOIN longdescs ON longdescs.comment_id = longdescs_tags_activity.comment_id"; $suppwhere = "AND longdescs.isprivate = 0"; } $query .= " UNION ALL SELECT 'comment_tag' AS name, NULL AS description, NULL AS attach_id," . $dbh->sql_date_format('longdescs_tags_activity.bug_when', '%Y.%m.%d %H:%i:%s') . " AS bug_when, longdescs_tags_activity.removed, longdescs_tags_activity.added,"; ## REDHAT EXTENSION START 447765 if (Bugzilla->user->id) { $query .= "profiles.login_name, "; } else { $query .= "profiles.realname, "; } ## REDHAT EXTENSION END 847166 ## REDHAT EXTENSION START 847166 $query .= "NULL as object_id, "; ## REDHAT EXTENSION END 847166 $query .= "longdescs_tags_activity.comment_id as comment_id, longdescs_tags_activity.id AS activity_order FROM longdescs_tags_activity INNER JOIN profiles ON profiles.userid = longdescs_tags_activity.who $suppjoins WHERE longdescs_tags_activity.bug_id = ? $datepart $suppwhere "; push @args, $self->id; push @args, $starttime if defined $starttime; } $query .= "ORDER BY bug_when, activity_order"; my $list = $dbh->selectall_arrayref($query, undef, @args); my @operations; my $operation = {}; my $changes = []; my $incomplete_data = 0; foreach my $entry (@$list) { my ( $fieldname, $fielddesc, $attachid, $when, $removed, $added, $who, $object_id, $comment_id ) = @$entry; my %change; my $activity_visible = 1; # check if the user should see this field's activity if (grep { $fieldname eq $_ } TIMETRACKING_FIELDS) { $activity_visible = $user->is_timetracker; } elsif ($fieldname eq 'longdescs.isprivate' && !$user->is_insider && $added) { $activity_visible = 0; } else { $activity_visible = 1; } ## REDHAT EXTENSIONS START 406111 Bugzilla::Hook::process( 'bug_filter_change', { user => Bugzilla->user, field => $fieldname, added => $added, removed => $removed, object_id => $object_id, visible => \$activity_visible, bug => $self } ); ## REDHAT EXTENSIONS END 406111 if ($activity_visible) { # Check for the results of an old Bugzilla data corruption bug if ( (defined($added) && defined($removed) && $added eq '?' && $removed eq '?') || (defined($added) && $added =~ /^\? /) || (defined($removed) && $removed =~ /^\? /)) { $incomplete_data = 1; } ## REDHAT EXTENSIONS START 1201616 if ($fieldname eq 'rh_rule') { # wrap in eval to allow template compilation eval { require Bugzilla::Extension::RuleEngine::Rule; my $rule = Bugzilla::Extension::RuleEngine::Rule->new($added); $added = $rule->name(); }; } ## REDHAT EXTENSIONS END 1201616 ## REDHAT EXTENSIONS START 1348445 elsif ($fieldname eq 'dependent_products') { if ($added) { my @prods = split /, */, $added; my $aprods = Bugzilla::Product->new_from_list(\@prods); $added = join(', ', map { $_->name() } @$aprods); } if ($removed) { my @prods = split /, */, $removed; my $rprods = Bugzilla::Product->new_from_list(\@prods); $removed = join(', ', map { $_->name() } @$rprods); } } ## REDHAT EXTENSIONS END 1348445 # An operation, done by 'who' at time 'when', has a number of # 'changes' associated with it. # If this is the start of a new operation, store the data from the # previous one, and set up the new one. if ($operation->{'who'} && ($who ne $operation->{'who'} || $when ne $operation->{'when'})) { $operation->{'changes'} = $changes; push(@operations, $operation); # Create new empty anonymous data structures. $operation = {}; $changes = []; } # If this is the same field as the previous item, then concatenate # the data into the same change. if ( $operation->{'who'} && $who eq $operation->{'who'} && $when eq $operation->{'when'} && $fieldname eq $operation->{'fieldname'} && ($comment_id || 0) == ($operation->{'comment_id'} || 0) && ($attachid || 0) == ($operation->{'attachid'} || 0) && ($fieldname ne 'rh_rule')) { my $old_change = pop @$changes; $removed = join_activity_entries($fieldname, $old_change->{'removed'}, $removed); $added = join_activity_entries($fieldname, $old_change->{'added'}, $added); } $operation->{'who'} = $who; $operation->{'when'} = $when; $operation->{'fieldname'} = $change{'fieldname'} = $fieldname; $operation->{'attachid'} = $change{'attachid'} = $attachid; $change{'removed'} = $removed; $change{'added'} = $added; if ($comment_id) { $operation->{comment_id} = $change{'comment'} = Bugzilla::Comment->new($comment_id); } push(@$changes, \%change); } } if ($operation->{'who'}) { $operation->{'changes'} = $changes; push(@operations, $operation); } return (\@operations, $incomplete_data); } sub has_unsent_changes { my $self = shift; return 1 if !defined $self->lastdiffed; return datetime_from($self->lastdiffed) < datetime_from($self->delta_ts) ? 1 : 0; } # Update the bugs_activity table to reflect changes made in bugs. sub LogActivityEntry { my ($bug_id, $field, $removed, $added, $user_id, $timestamp, $comment_id, $attach_id, $bug, $old_bug) = @_; my $dbh = Bugzilla->dbh; # in the case of CCs, deps, and keywords, there's a possibility that someone # might try to add or remove a lot of them at once, which might take more # space than the activity table allows. We'll solve this by splitting it # into multiple entries if it's too long. while ($removed || $added) { my ($removestr, $addstr) = ($removed, $added); ## REDHAT EXTENSION START 831328 915533 my $object_id = undef; if ( $field eq 'flagtypes.name' or $field eq 'cf_partner' or $field eq 'cf_verified' or $field eq 'ext_bz_bug_map.ext_bz_bug_id' or $field eq 'see_also') { my $value = ''; my $is_added = 0; # REDHAT EXTENSION 1757211 if ($removed) { $addstr = ''; # Deal with the added values next time ($removestr, $removed) = split(/\s*,\s*/, $removed, 2); $value = $removestr; } else { $removestr = ''; # Prevent error with tainting $removestr ($addstr, $added) = split(/\s*,\s*/, $added, 2); $value = $addstr; $is_added = 1; # REDHAT EXTENSION 1757211 } if ($field ne 'see_also') { ## REDHAT EXTENSION 1757211 $object_id = _get_object_id($field, $value, $is_added, $bug, $old_bug); } } else { ## REDHAT EXTENSION END 831328 915533 if (length($removestr) > MAX_LINE_LENGTH) { my $commaposition = find_wrap_point($removed, MAX_LINE_LENGTH); $removestr = substr($removed, 0, $commaposition); $removed = substr($removed, $commaposition); } else { $removed = ""; # no more entries } if (length($addstr) > MAX_LINE_LENGTH) { my $commaposition = find_wrap_point($added, MAX_LINE_LENGTH); $addstr = substr($added, 0, $commaposition); $added = substr($added, $commaposition); } else { $added = ""; # no more entries } } trick_taint($addstr); trick_taint($removestr); trick_taint($timestamp); my $fieldid = get_field_id($field); ## REDHAT EXTENSION START 831328 $dbh->do( "INSERT INTO bugs_activity (bug_id, who, bug_when, fieldid, removed, added, comment_id, attach_id, object_id) VALUES (?, ?, ?, ?, ?, ?, ?, ?, ?)", undef, ( $bug_id, $user_id, $timestamp, $fieldid, $removestr, $addstr, $comment_id, $attach_id, $object_id ) ); ## REDHAT EXTENSION END 831328 } } sub _get_object_id { my ($col, $value, $is_added, $bug, $old_bug) = @_; if ($col eq 'flagtypes.name') { my ($flag_name) = ($value =~ /^(.*)(?:\+|\-|\?(?:\(.*\))?)$/); ## REDHAT EXTENSION START 1757211 my $product_id = undef; $product_id = $old_bug->product_id if($old_bug); $product_id = $bug->product_id if($bug && (!$old_bug || $is_added)); my $flag = Bugzilla::FlagType::match({name => $flag_name, product_id => $product_id}); ## REDHAT EXTENSION END 1757211 if (@$flag) { return $flag->[0]->id; } } elsif ($col eq 'ext_bz_bug_map.ext_bz_bug_id') { my $query = "SELECT description, id FROM external_bugzilla ORDER BY LENGTH(description) DESC, id"; my $ext_bzs = Bugzilla->dbh->selectall_arrayref($query); foreach my $ext_bz (@$ext_bzs) { my ($desc, $id) = @$ext_bz; $desc .= ' '; if (substr($value, 0, length($desc)) eq $desc) { return $id; } } } else { # We don't need to get the object id for this type return undef; } # We will e-mail out a warning, since we should never get here Bugzilla->logger->info("Cannot get object id Col: $col, Value: $value"); return undef; } # Update bug_user_last_visit table sub update_user_last_visit { my ($self, $user, $last_visit_ts) = @_; my $lv = Bugzilla::BugUserLastVisit->match({bug_id => $self->id, user_id => $user->id })->[0]; if ($lv) { $lv->set(last_visit_ts => $last_visit_ts); $lv->update; } else { Bugzilla::BugUserLastVisit->create({ bug_id => $self->id, user_id => $user->id, last_visit_ts => $last_visit_ts }); } } # Convert WebService API and email_in.pl field names to internal DB field # names. sub map_fields { my ($params, $except) = @_; my %field_values; foreach my $field (keys %$params) { # Don't allow setting private fields via email_in or the WebService. next if $field =~ /^_/; my $field_name; if ($except->{$field}) { $field_name = $field; } else { $field_name = FIELD_MAP->{$field} || $field; } $field_values{$field_name} = $params->{$field}; } return \%field_values; } ################################################################################ # check_can_change_field() defines what users are allowed to change. You # can add code here for site-specific policy changes, according to the # instructions given in the Bugzilla Guide and below. Note that you may also # have to update the Bugzilla::Bug::user() function to give people access to the # options that they are permitted to change. # # check_can_change_field() returns true if the user is allowed to change this # field, and false if they are not. # # The parameters to this method are as follows: # $field - name of the field in the bugs table the user is trying to change # $oldvalue - what they are changing it from # $newvalue - what they are changing it to # $PrivilegesRequired - return the reason of the failure, if any ################################################################################ sub check_can_change_field { my $self = shift; my ($field, $oldvalue, $newvalue, $PrivilegesRequired) = (@_); my $user = Bugzilla->user; return (1) if ($user->in_group('admin')); $oldvalue = defined($oldvalue) ? $oldvalue : ''; $newvalue = defined($newvalue) ? $newvalue : ''; # Return true if they haven't changed this field at all. if ($oldvalue eq $newvalue) { return 1; } elsif (ref($newvalue) eq 'ARRAY' && ref($oldvalue) eq 'ARRAY') { my ($removed, $added) = diff_arrays($oldvalue, $newvalue); return 1 if !scalar(@$removed) && !scalar(@$added); } elsif (trim($oldvalue) eq trim($newvalue)) { return 1; # numeric fields need to be compared using == } elsif ( ( $field eq 'estimated_time' || $field eq 'remaining_time' || $field eq 'work_time' ) && $oldvalue == $newvalue ) { return 1; } my @priv_results; Bugzilla::Hook::process( 'bug_check_can_change_field', { bug => $self, field => $field, new_value => $newvalue, old_value => $oldvalue, priv_results => \@priv_results } ); if (my $priv_required = first { $_ > 0 } @priv_results) { $$PrivilegesRequired = $priv_required; return 0; } my $allow_found = first { $_ == 0 } @priv_results; if (defined $allow_found) { return 1; } # Allow anyone to change comments, or set flags if ($field =~ /^longdesc/ || $field eq 'flagtypes.name') { return 1; } # If the user isn't allowed to change a field, we must tell them who can. # We store the required permission set into the $PrivilegesRequired # variable which gets passed to the error template. # # $PrivilegesRequired = PRIVILEGES_REQUIRED_NONE : no privileges required; # $PrivilegesRequired = PRIVILEGES_REQUIRED_REPORTER : the reporter, assignee or an empowered user; # $PrivilegesRequired = PRIVILEGES_REQUIRED_ASSIGNEE : the assignee or an empowered user; # $PrivilegesRequired = PRIVILEGES_REQUIRED_EMPOWERED : an empowered user. # Only users in the time-tracking group can change time-tracking fields, # including the deadline. if (grep { $_ eq $field } (TIMETRACKING_FIELDS, 'deadline')) { if (!$user->is_timetracker) { $$PrivilegesRequired = PRIVILEGES_REQUIRED_EMPOWERED; return 0; } } # Allow anyone with (product-specific) "editbugs" privs to change anything. if ($user->in_group('editbugs', $self->{'product_id'})) { return 1; } # *Only* users with (product-specific) "canconfirm" privs can confirm bugs. if ($self->_changes_everconfirmed($field, $oldvalue, $newvalue)) { $$PrivilegesRequired = PRIVILEGES_REQUIRED_EMPOWERED; return $user->in_group('canconfirm', $self->{'product_id'}); } # Make sure that a valid bug ID has been given. if (!$self->{'error'}) { # Allow the assignee to change anything else. if ( $self->{'assigned_to'} == $user->id || $self->{'_old_assigned_to'} && $self->{'_old_assigned_to'} == $user->id) { return 1; } # Allow the QA contact to change anything else. if ( Bugzilla->params->{'useqacontact'} && ( ($self->{'qa_contact'} && $self->{'qa_contact'} == $user->id) || ($self->{'_old_qa_contact'} && $self->{'_old_qa_contact'} == $user->id)) ) { return 1; } ## REDHAT EXTENSION START 876015 # Allow the Docs contact to change anything else. if ( Bugzilla->params->{'usedocscontact'} && ( ($self->{'docs_contact'} && $self->{'docs_contact'} == $user->id) || ($self->{'_old_docs_contact'} && $self->{'_old_docs_contact'} == $user->id)) ) { return 1; } ## REDHAT EXTENSION END 876015 } # At this point, the user is either the reporter or an # unprivileged user. We first check for fields the reporter # is not allowed to change. # The reporter may not: # - reassign bugs, unless the bugs are assigned to them; # in that case we will have already returned 1 above # when checking for the assignee of the bug. if ($field eq 'assigned_to') { $$PrivilegesRequired = PRIVILEGES_REQUIRED_ASSIGNEE; return 0; } # - change the QA contact if ($field eq 'qa_contact') { $$PrivilegesRequired = PRIVILEGES_REQUIRED_ASSIGNEE; return 0; } ## REDHAT EXTENSION START 876015 # - change the Docs contact if ($field eq 'docs_contact') { $$PrivilegesRequired = PRIVILEGES_REQUIRED_ASSIGNEE; return 0; } ## REDHAT EXTENSION END 876015 # - change the target milestone if ($field eq 'target_milestone') { $$PrivilegesRequired = PRIVILEGES_REQUIRED_ASSIGNEE; return 0; } # - change the target release if ($field eq 'target_release') { $$PrivilegesRequired = PRIVILEGES_REQUIRED_ASSIGNEE; return 0; } # - change the priority (unless he could have set it originally) if ($field eq 'priority' && !Bugzilla->params->{'letsubmitterchoosepriority'}) { $$PrivilegesRequired = PRIVILEGES_REQUIRED_ASSIGNEE; return 0; } # - unconfirm bugs (confirming them is handled above) if ($field eq 'everconfirmed') { $$PrivilegesRequired = PRIVILEGES_REQUIRED_ASSIGNEE; return 0; } # - change the status from one open state to another if ( $field eq 'bug_status' && is_open_state($oldvalue) && is_open_state($newvalue)) { $$PrivilegesRequired = PRIVILEGES_REQUIRED_ASSIGNEE; return 0; } # The reporter is allowed to change anything else. if (!$self->{'error'} && $self->{'reporter_id'} == $user->id) { return 1; } # If we haven't returned by this point, then the user doesn't # have the necessary permissions to change this field. $$PrivilegesRequired = PRIVILEGES_REQUIRED_REPORTER; return 0; } # A helper for check_can_change_field sub _changes_everconfirmed { my ($self, $field, $old, $new) = @_; return 1 if $field eq 'everconfirmed'; if ($field eq 'bug_status') { if ($self->everconfirmed) { # Moving a confirmed bug to UNCONFIRMED will change everconfirmed. return 1 if $new eq 'UNCONFIRMED'; } else { # Moving an unconfirmed bug to an open state that isn't # UNCONFIRMED will confirm the bug. return 1 if (is_open_state($new) and $new ne 'UNCONFIRMED'); } } return 0; } ## REDHAT EXTENSION START 536717 # Generates a list of dependencies for a given bug. Calls itself recursively # to generate the entire tree. Will list a bug that a user cannot see (as # is standard for the bug view), but will not list its dependency. sub dependent_bugs { my ($self, $relationship, $bugs) = @_; $bugs = [] if not defined $bugs; # Check the relationship is valid if ($relationship ne 'dependson' && $relationship ne 'blocked') { ThrowCodeError('dependent_bugs_bad_relationship'); } my @dependencies; if ($relationship eq 'dependson') { @dependencies = @{$self->dependson}; } else { @dependencies = @{$self->blocked}; } # Don't do anything if this bug doesn't have any dependencies. return [] unless scalar(@dependencies); foreach my $dep_id (@dependencies) { if (!grep { $_ == $dep_id } @$bugs) { if (Bugzilla->user->can_see_bug($dep_id)) { my $dep = new Bugzilla::Bug($dep_id); $dep->dependent_bugs($relationship, $bugs); } push @$bugs, $dep_id; } } return [sort { $a <=> $b } @$bugs]; } ## REDHAT EXTENSION END 536717 # # Field Validation # # Validate and return a hash of dependencies sub ValidateDependencies { my $fields = {}; # These can be arrayrefs or they can be strings. $fields->{'dependson'} = shift; $fields->{'blocked'} = shift; my $id = shift || 0; unless (defined($fields->{'dependson'}) || defined($fields->{'blocked'})) { return; } my $dbh = Bugzilla->dbh; my %deps; my %deptree; my %sth; $sth{dependson} = $dbh->prepare('SELECT dependson FROM dependencies WHERE blocked = ?'); $sth{blocked} = $dbh->prepare('SELECT blocked FROM dependencies WHERE dependson = ?'); foreach my $pair (["blocked", "dependson"], ["dependson", "blocked"]) { my ($me, $target) = @{$pair}; $deptree{$target} = []; $deps{$target} = []; next unless $fields->{$target}; my %seen; my $target_array = ref($fields->{$target}) ? $fields->{$target} : [split(/[\s,]+/, $fields->{$target})]; foreach my $i (@$target_array) { if ($id == $i) { ThrowUserError("dependency_loop_single"); } if (!exists $seen{$i}) { push(@{$deptree{$target}}, $i); $seen{$i} = 1; } } # populate $deps{$target} as first-level deps only. # and find remainder of dependency tree in $deptree{$target} @{$deps{$target}} = @{$deptree{$target}}; my @stack = @{$deps{$target}}; while (@stack) { my $i = shift @stack; my $dep_list = $dbh->selectcol_arrayref($sth{$target}, undef, $i); foreach my $t (@$dep_list) { # ignore any _current_ dependencies involving this bug, # as they will be overwritten with data from the form. if ($t != $id && !exists $seen{$t}) { push(@{$deptree{$target}}, $t); push @stack, $t; $seen{$t} = 1; } } } } my @deps = @{$deptree{'dependson'}}; my @blocks = @{$deptree{'blocked'}}; my %union = (); my %isect = (); foreach my $b (@deps, @blocks) { $union{$b}++ && $isect{$b}++ } my @isect = keys %isect; if (scalar(@isect) > 0) { ThrowUserError("dependency_loop_multi", {'deps' => \@isect}); } return %deps; } ##################################################################### # Custom Field Accessors ##################################################################### sub _create_cf_accessors { my ($invocant) = @_; my $class = ref($invocant) || $invocant; return if Bugzilla->request_cache->{"${class}_cf_accessors_created"}; ## REDHAT EXTENSION START 1101335 # We can't use the upstream code here, as we want to get all the custom # fields, not just the ones that the user can see. my $fields = Bugzilla::Field->match({custom => 1}); ## REDHAT EXTENSION END 1101335 foreach my $field (@$fields) { my $accessor = $class->_accessor_for($field); my $name = "${class}::" . $field->name; { no strict 'refs'; next if defined *{$name}; *{$name} = $accessor; } } Bugzilla->request_cache->{"${class}_cf_accessors_created"} = 1; } sub _accessor_for { my ($class, $field) = @_; if ($field->type == FIELD_TYPE_MULTI_SELECT) { return $class->_multi_select_accessor($field->name); } elsif ( $field->type == FIELD_TYPE_ONE_SELECT) { return $class->_single_select_accessor($field->name); } return $class->_cf_accessor($field->name); } sub _cf_accessor { my ($class, $field) = @_; my $accessor = sub { my ($self) = @_; return $self->{$field}; }; return $accessor; } sub _multi_select_accessor { my ($class, $field) = @_; my $accessor = sub { my ($self) = @_; ## REDHAT EXTENSION START 1039815 1101335 # Filter result based on what user can see. We can't do this in the # outer block because modperl caches $accessor if (not exists $self->{$field}) { my $filter_list = Bugzilla->user->see_field_values($field); my $extra_sql = ''; if (defined $filter_list) { if (scalar(@$filter_list)) { $extra_sql = ' AND value IN ( ' . join(', ', map { Bugzilla->dbh->quote($_->name) } @$filter_list) . ')'; } else { # They cannot see anything $self->{$field} = []; return []; } } $self->{$field} = Bugzilla->dbh->selectcol_arrayref( "SELECT value FROM bug_$field WHERE bug_id = ?$extra_sql ORDER BY value", undef, $self->id); } ## REDHAT EXTENSION END 1039815 1101335 return $self->{$field}; }; return $accessor; } sub _single_select_accessor { my ($class, $field) = @_; my $accessor = sub { my ($self) = @_; ## REDHAT EXTENSION START 1039815 1101335 # Filter result based on what user can see. We can't do this in the # outer block because modperl caches $accessor if (not exists $self->{$field}) { my $filter_list = Bugzilla->user->see_field_values($field); my $extra_sql = ''; if (defined $filter_list) { if (scalar(@$filter_list)) { $extra_sql = ' AND value IN ( ' . join(', ', map { Bugzilla->dbh->quote($_->name) } @$filter_list) . ')'; } else { # They cannot see anything $self->{$field} = []; return []; } } $self->{$field} = Bugzilla->dbh->selectrow_array( "SELECT value FROM bug_$field WHERE bug_id = ?$extra_sql ORDER BY value", undef, $self->id); } ## REDHAT EXTENSION END 1039815 1101335 return $self->{$field}; }; return $accessor; } sub PreFetch { my $bugs = shift; my $params = shift; my $dbh = Bugzilla->dbh; # If there are no bugs, return return if not defined $bugs or scalar(@$bugs) == 0; # Shortcut for writting SQL statements, since it used so often my $in_clause = "IN (" . join(',', map { $_->bug_id } @$bugs) . ')'; # Get the user id of the logged in user. my $user_id = Bugzilla->user->id; # What fields do we need to prefetch (key is the name in the RPC, value # is the key in the Bugzilla::Bug object my $fields = { actual_time => { value => 'actual_time', empty => 0, sql => qq{ SELECT bug_id, SUM(work_time) FROM longdescs WHERE bug_id $in_clause GROUP BY bug_id } }, blocks => { value => 'blocked', sql => qq{ SELECT dependson, blocked FROM dependencies INNER JOIN bugs ON dependencies.blocked = bugs.bug_id INNER JOIN bug_status ON bugs.bug_status = bug_status.value WHERE dependson $in_clause ORDER BY is_open DESC, blocked } }, cc => { value => 'cc', sql => qq{ SELECT bug_id, profiles.login_name FROM cc, profiles WHERE bug_id $in_clause AND cc.who = profiles.userid ORDER BY profiles.login_name } }, classification => { value => 'classification', empty => '', sql => qq{ SELECT b.bug_id, c.name FROM bugs b JOIN products p ON b.product_id = p.id JOIN classifications c ON p.classification_id = c.id WHERE b.bug_id $in_clause } }, component => { value => 'component', empty => '', sql => qq{ SELECT b.bug_id, c.name AS value FROM bugs b JOIN components c ON b.component_id = c.id WHERE b.bug_id $in_clause }, }, depends_on => { value => 'dependson', sql => qq{ SELECT blocked, dependson FROM dependencies INNER JOIN bugs ON dependencies.dependson = bugs.bug_id INNER JOIN bug_status ON bugs.bug_status = bug_status.value WHERE blocked $in_clause ORDER BY is_open DESC, dependson } }, groups => { value => 'groups_in', sql => qq{ SELECT bug_id, group_id FROM bug_group_map WHERE bug_id $in_clause } }, keywords => { value => 'keyword_objects', sql => qq{ SELECT bug_id, keywordid FROM keywords WHERE bug_id $in_clause } }, product => { value => 'product', empty => '', sql => qq{ SELECT b.bug_id, p.name FROM bugs b JOIN products p ON b.product_id = p.id WHERE b.bug_id $in_clause } }, see_also => { value => 'see_also', sql => qq{ SELECT bug_id, id FROM bug_see_also WHERE bug_id $in_clause } }, tag => { value => 'tags', sql => qq{ SELECT bug_tag.bug_id, tag.name FROM tag JOIN bug_tag ON (bug_tag.tag_id = tag.id) WHERE bug_tag.bug_id $in_clause AND tag.user_id = $user_id } }, }; # Add the custom fields my $custom_fields = Bugzilla->fields( {custom => 1, type => [FIELD_TYPE_MULTI_SELECT, FIELD_TYPE_ONE_SELECT]}); foreach my $custom_field (@$custom_fields) { my $name = $custom_field->name; $fields->{$name} = { value => $name, sql => qq{ SELECT bug_id, value FROM bug_$name WHERE bug_id $in_clause ORDER BY value } }; } # Some extensions might want to change this Bugzilla::Hook::process("bug_prefetch", {fields => $fields, in_clause => $in_clause}); # We only want to prefetch the fields that we are going to return # if the params value is specified if (defined $params) { $fields = filter($params, $fields); } # Get the data. my %data = (); foreach my $field (keys %$fields) { # Set the default empty value if (not defined $fields->{$field}{empty}) { $fields->{$field}{empty} = []; } # Get all the rows from the database for this field my $sql = $fields->{$field}{sql}; my $rows = $dbh->selectall_arrayref($sql); foreach my $row (@$rows) { push @{$data{$row->[0]}{$field}}, $row->[1]; } } # Now populate the data in each bug my @keys = keys %$fields; for my $bug (@$bugs) { foreach my $key (@keys) { my $value = $data{$bug->bug_id}{$key}; # If there is no results, we still want to record that if (not defined $value) { $value = $fields->{$key}{empty}; } # Some times we need to convert the values into an object elsif ($key eq 'groups') { $value = Bugzilla::Group->new_from_list($value); } elsif ($key eq 'keywords') { $value = Bugzilla::Keyword->new_from_list($value); } elsif ($key eq 'see_also') { $value = Bugzilla::BugUrl->new_from_list($value); } # These values are scalars, so we return the first value elsif (ref($fields->{$key}{empty}) eq '') { $value = $value->[0]; } $bug->{$fields->{$key}{value}} = $value; } } } 1; __END__ =head1 B =over =item C Ensures the accessors for custom fields are always created. =item C Adds an alias to the internal respresentation of the bug. You will need to call L to make the changes permanent. =item C Removes an alias from the internal respresentation of the bug. You will need to call L to make the changes permanent. =item C Creates or updates a L for this bug and the supplied $user, the timestamp given as $last_visit. =item C Checks if this bug has changes for which bug mail has not been sent. =back =head1 B =over =item remove_cc =item add_see_also =item choices =item keywords =item blocked =item qa_contact =item add_comment =item bug_severity =item dup_id =item set_priority =item any_flags_requesteeble =item set_bug_status =item estimated_time =item set_platform =item statuses_available =item set_custom_field =item remove_see_also =item remove_from_db =item product_obj =item reporter_accessible =item set_summary =item LogActivityEntry =item set_assigned_to =item add_group =item bug_file_loc =item DATE_COLUMNS =item set_component =item delta_ts =item set_resolution =item version =item deadline =item fields =item dependson =item check_can_change_field =item update =item set_op_sys =item object_cache_key =item bug_group =item comments =item map_fields =item assigned_to =item user =item ValidateDependencies =item short_desc =item duplicate_ids =item isopened =item remaining_time =item set_deadline =item preload =item groups_in =item clear_resolution =item set_estimated_time =item in_group =item status =item get_activity =item reporter =item rep_platform =item DB_COLUMNS =item flag_types =item bug_status =item attachments =item flags =item set_flags =item actual_time =item component =item UPDATE_COLUMNS =item set_cclist_accessible =item set_bug_ignored =item product =item VALIDATORS =item show_attachment_flags =item set_comment_is_private =item set_severity =item send_changes =item add_tag =item bug_id =item reset_qa_contact =item remove_group =item set_dup_id =item set_target_milestone =item cc_users =item everconfirmed =item check_is_visible =item check_for_edit =item match =item VALIDATOR_DEPENDENCIES =item possible_duplicates =item set_url =item add_cc =item blocks_obj =item set_status_whiteboard =item product_id =item error =item reset_assigned_to =item status_whiteboard =item create =item set_all =item set_reporter_accessible =item classification_id =item tags =item modify_keywords =item priority =item keyword_objects =item set_dependencies =item depends_on_obj =item cclist_accessible =item cc =item duplicates =item component_obj =item see_also =item groups =item default_bug_status =item related_bugs =item editable_bug_fields =item resolution =item lastdiffed =item classification =item alias =item op_sys =item remove_tag =item percentage_complete =item EmitDependList =item bug_alias_to_id =item set_qa_contact =item creation_ts =item set_version =item component_id =item new_bug_statuses =item set_remaining_time =item target_milestone =item set_docs_contact =item clone_ids =item clones =item target_release =item resolutions_available =item set_target_release =item PreFetch =item docs_contact =item dependent_bugs =item set_needinfo =item reset_docs_contact =item CLEANUP =back