#!/usr/bin/perl -T # This Source Code Form is subject to the terms of the Mozilla Public # License, v. 2.0. If a copy of the MPL was not distributed with this # file, You can obtain one at http://mozilla.org/MPL/2.0/. # # This Source Code Form is "Incompatible With Secondary Licenses", as # defined by the Mozilla Public License, v. 2.0. use 5.10.1; use strict; use warnings; use lib qw(. lib); use Bugzilla; use Bugzilla::Util; use Bugzilla::Error; use Bugzilla::Flag; use Bugzilla::FlagType; use Bugzilla::User; use Bugzilla::Product; use Bugzilla::Component; # Make sure the user is logged in. my $user = Bugzilla->login(); my $cgi = Bugzilla->cgi; # Force the script to run against the shadow DB. We already validated credentials. Bugzilla->switch_to_shadow_db; my $template = Bugzilla->template; my $action = $cgi->param('action') || ''; my $format = $template->get_format( 'request/queue', scalar($cgi->param('format')), scalar($cgi->param('ctype')) ); $cgi->set_dated_content_disp("inline", "requests", $format->{extension}); print $cgi->header($format->{'ctype'}); my $fields; $fields->{'requester'}->{'type'} = 'single'; # If the user doesn't restrict their search to requests from the wind # (requestee ne '-'), include the requestee for completion. unless (defined $cgi->param('requestee') && $cgi->param('requestee') eq '-') { $fields->{'requestee'}->{'type'} = 'single'; } Bugzilla::User::match_field($fields); if ($action eq 'queue') { queue($format); } else { my $flagtypes = get_flag_types(); my @types = ('all', @$flagtypes); my $vars = {}; $vars->{'types'} = \@types; $vars->{'requests'} = {}; $vars->{'components'} = [$cgi->param('component')]; $template->process($format->{'template'}, $vars) || ThrowTemplateError($template->error()); } exit; ################################################################################ # Functions ################################################################################ sub queue { my $format = shift; my $cgi = Bugzilla->cgi; my $dbh = Bugzilla->dbh; my $template = Bugzilla->template; my $user = Bugzilla->user; my $userid = $user->id; my $vars = {}; my $status = validateStatus($cgi->param('status')); my $form_group = validateGroup($cgi->param('group')); my $query = # Select columns describing each flag, the bug/attachment on which # it has been set, who set it, and of whom they are requesting it. " SELECT flags.id, flagtypes.name, flags.status, flags.bug_id, bugs.short_desc, products.name, components.name, flags.attach_id, attachments.description, requesters.realname, requesters.login_name, requestees.realname, requestees.login_name, COUNT(privs.group_id), " . $dbh->sql_date_format('flags.modification_date', '%Y.%m.%d %H:%i') . # Use the flags and flagtypes tables for information about the flags, # the bugs and attachments tables for target info, the profiles tables # for setter and requestee info, the products/components tables # so we can display product and component names, and the bug_group_map # table to help us weed out secure bugs to which the user should not have # access. ", DATE_PART('day', NOW() - bugs.creation_ts) as age FROM flags LEFT JOIN attachments ON flags.attach_id = attachments.attach_id INNER JOIN flagtypes ON flags.type_id = flagtypes.id INNER JOIN profiles AS requesters ON flags.setter_id = requesters.userid LEFT JOIN profiles AS requestees ON flags.requestee_id = requestees.userid INNER JOIN bugs ON flags.bug_id = bugs.bug_id INNER JOIN products ON bugs.product_id = products.id INNER JOIN components ON bugs.component_id = components.id LEFT JOIN bug_group_map AS privs ON privs.bug_id = bugs.bug_id LEFT JOIN cc AS ccmap ON ccmap.who = $userid AND ccmap.bug_id = bugs.bug_id LEFT JOIN bug_group_map AS bgmap ON bgmap.bug_id = bugs.bug_id "; if (Bugzilla->params->{or_groups}) { $query .= " AND bgmap.group_id IN (" . $user->groups_as_string . ")"; $query .= " WHERE (privs.group_id IS NULL OR bgmap.group_id IS NOT NULL OR"; } else { $query .= " AND bgmap.group_id NOT IN (" . $user->groups_as_string . ")"; $query .= " WHERE (bgmap.group_id IS NULL OR"; } # Weed out bug the user does not have access to $query .= " (ccmap.who IS NOT NULL AND cclist_accessible = 1) OR (bugs.reporter = $userid AND bugs.reporter_accessible = 1) OR (bugs.assigned_to = $userid) " . ## REDHAT EXTENSION 876015: Add docscontact ( Bugzilla->params->{'usedocscontact'} ? "OR (bugs.docs_contact = $userid)" : "" ) . ( Bugzilla->params->{'useqacontact'} ? "OR (bugs.qa_contact = $userid))" : ")" ); unless ($user->is_insider) { $query .= " AND (attachments.attach_id IS NULL OR attachments.isprivate = 0 OR attachments.submitter_id = $userid)"; } # Weed out flags user is not authorized to see # Non-logged in users can only see public flags # Users in 'editcomponents' and/or 'admin' can see all if (not $user->in_group('editcomponents') and not $user->in_group('admin')) { $query .= " AND (flagtypes.view_group_id IS NULL "; if ($user->id) { $query .= " OR flagtypes.view_group_id IN (" . $user->groups_as_string . ")"; } $query .= ") "; } # Limit query to pending requests. $query .= " AND flags.status = '?' " unless $status; # The set of criteria by which we filter records to display in the queue. my @criteria = (); # A list of columns to exclude from the report because the report conditions # limit the data being displayed to exact matches for those columns. # In other words, if we are only displaying "pending" , we don't # need to display a "status" column in the report because the value for that # column will always be the same. my @excluded_columns = (); my $do_union = $cgi->param('do_union'); # Filter results by exact email address of requester or requestee. if (defined $cgi->param('requester') && $cgi->param('requester') ne "") { my $requester = $dbh->quote($cgi->param('requester')); trick_taint($requester); # Quoted above push(@criteria, $dbh->sql_istrcmp('requesters.login_name', $requester)); push(@excluded_columns, 'requester') unless $do_union; } if (defined $cgi->param('requestee') && $cgi->param('requestee') ne "") { if ($cgi->param('requestee') ne "-") { my $requestee = $dbh->quote($cgi->param('requestee')); trick_taint($requestee); # Quoted above push(@criteria, $dbh->sql_istrcmp('requestees.login_name', $requestee)); } else { push(@criteria, "flags.requestee_id IS NULL"); } push(@excluded_columns, 'requestee') unless $do_union; } # If the user wants requester = foo OR requestee = bar, we have to join # these criteria separately as all other criteria use AND. if (@criteria == 2 && $do_union) { my $union = join(' OR ', @criteria); @criteria = ("($union)"); } # Filter requests by status: "pending", "granted", "denied", "all" # (which means any), or "fulfilled" (which means "granted" or "denied"). if ($status) { if ($status eq "+-") { push(@criteria, "flags.status IN ('+', '-')"); push(@excluded_columns, 'status'); } elsif ($status ne "all") { push(@criteria, "flags.status = '$status'"); push(@excluded_columns, 'status'); } } # Filter results by exact product or component. if (defined $cgi->param('product') && $cgi->param('product') ne "") { my $product = Bugzilla::Product->check(scalar $cgi->param('product')); push(@criteria, "bugs.product_id = " . $product->id); push(@excluded_columns, 'product'); if (defined $cgi->param('component') && $cgi->param('component') ne "") { my $component = Bugzilla::Component->check({ product => $product, name => scalar $cgi->param('component') }); push(@criteria, "bugs.component_id = " . $component->id); push(@excluded_columns, 'component'); } } # Filter results by flag types. my $form_type = $cgi->param('type'); if (defined $form_type && !grep($form_type eq $_, ("", "all"))) { # Check if any matching types are for attachments. If not, don't show # the attachment column in the report. my $has_attachment_type = Bugzilla::FlagType::count( {'name' => $form_type, 'target_type' => 'attachment'}); if (!$has_attachment_type) { push(@excluded_columns, 'attachment') } my $quoted_form_type = $dbh->quote($form_type); trick_taint($quoted_form_type); # Already SQL quoted push(@criteria, "flagtypes.name = " . $quoted_form_type); push(@excluded_columns, 'type'); } $query .= ' AND ' . join(' AND ', @criteria) if scalar(@criteria); # Group the records by flag ID so we don't get multiple rows of data # for each flag. This is only necessary because of the code that # removes flags on bugs the user is unauthorized to access. $query .= ' ' . $dbh->sql_group_by( 'flags.id', 'flagtypes.name, flags.status, flags.bug_id, bugs.short_desc, products.name, components.name, flags.attach_id, attachments.description, requesters.realname, requesters.login_name, requestees.realname, requestees.login_name, flags.modification_date, cclist_accessible, bugs.reporter, bugs.reporter_accessible, bugs.assigned_to, age' ); # Group the records, in other words order them by the group column # so the loop in the display template can break them up into separate # tables every time the value in the group column changes. $form_group ||= "requestee"; if ($form_group eq "requester") { $query .= " ORDER BY requesters.realname, requesters.login_name"; } elsif ($form_group eq "requestee") { $query .= " ORDER BY requestees.realname, requestees.login_name"; } elsif ($form_group eq "category") { $query .= " ORDER BY products.name, components.name"; } elsif ($form_group eq "type") { $query .= " ORDER BY flagtypes.name"; } # Order the records (within each group). $query .= " , flags.modification_date"; # Pass the query to the template for use when debugging this script. $vars->{'query'} = $query; $vars->{'debug'} = $cgi->param('debug') ? 1 : 0; my $results = $dbh->selectall_arrayref($query); my @requests = (); foreach my $result (@$results) { my @data = @$result; my $request = { 'id' => $data[0], 'type' => $data[1], 'status' => $data[2], 'bug_id' => $data[3], 'bug_summary' => $data[4], 'category' => "$data[5]: $data[6]", 'attach_id' => $data[7], 'attach_summary' => $data[8], 'requester' => ($data[9] ? "$data[9] <$data[10]>" : $data[10]), 'requestee' => ($data[11] ? "$data[11] <$data[12]>" : $data[12]), 'restricted' => $data[13] ? 1 : 0, 'created' => $data[14], 'age' => $data[15], }; push(@requests, $request); } # Get a list of request type names to use in the filter form. my @types = ("all"); my $flagtypes = get_flag_types(); push(@types, @$flagtypes); $vars->{'excluded_columns'} = \@excluded_columns; $vars->{'group_field'} = $form_group; $vars->{'requests'} = \@requests; $vars->{'types'} = \@types; # This code is needed to populate the Product and Component select fields. my ($products, %components); if (Bugzilla->params->{useclassification}) { foreach my $class (@{$user->get_selectable_classifications}) { push @$products, @{$user->get_selectable_products($class->id)}; } } else { $products = $user->get_selectable_products; } $vars->{'products'} = $products; $vars->{'components'} = [$cgi->param('component')]; $vars->{'urlquerypart'} = $cgi->canonicalise_query('ctype'); # Generate and return the UI (HTML page) from the appropriate template. $template->process($format->{'template'}, $vars) || ThrowTemplateError($template->error()); } ################################################################################ # Data Validation / Security Authorization ################################################################################ sub validateStatus { my $status = shift; return if !defined $status; grep($status eq $_, qw(? +- + - all)) || ThrowUserError("flag_status_invalid", {status => $status}); trick_taint($status); return $status; } sub validateGroup { my $group = shift; return if !defined $group; grep($group eq $_, qw(requester requestee category type)) || ThrowUserError("request_queue_group_invalid", {group => $group}); trick_taint($group); return $group; } # Returns all flag types which have at least one flag of this type. # If a flag type is inactive but still has flags, we want it. sub get_flag_types { my $dbh = Bugzilla->dbh; my $flag_types = $dbh->selectcol_arrayref( 'SELECT DISTINCT name FROM flagtypes WHERE flagtypes.id IN (SELECT DISTINCT type_id FROM flags) ORDER BY name' ); return $flag_types; }