diff options
author | lpsolit%gmail.com <> | 2006-03-10 03:19:54 +0100 |
---|---|---|
committer | lpsolit%gmail.com <> | 2006-03-10 03:19:54 +0100 |
commit | 65e2e0e8843352abd8950033bb5b418b9a290f4c (patch) | |
tree | 8e32739b4e744a2cc30a72c066cd9bb9b0915012 | |
parent | f4ec7d28bc7b7a21cf0d1decf8f3831d0486496b (diff) | |
download | bugzilla-65e2e0e8843352abd8950033bb5b418b9a290f4c.tar.gz bugzilla-65e2e0e8843352abd8950033bb5b418b9a290f4c.tar.xz |
Bug 300551: Eliminate deprecated Bugzilla::DB routines from User.pm and Token.pm - Patch by Frédéric Buclin <LpSolit@gmail.com> r=wicked a=justdave
-rw-r--r-- | Bugzilla/Token.pm | 127 | ||||
-rw-r--r-- | Bugzilla/User.pm | 170 |
2 files changed, 129 insertions, 168 deletions
diff --git a/Bugzilla/Token.pm b/Bugzilla/Token.pm index dfc7be418..a7ad095b0 100644 --- a/Bugzilla/Token.pm +++ b/Bugzilla/Token.pm @@ -88,36 +88,32 @@ sub IssueEmailChangeToken { Bugzilla::BugMail::MessageToMTA($message); } +# Generates a random token, adds it to the tokens table, and sends it +# to the user with instructions for using it to change their password. sub IssuePasswordToken { - # Generates a random token, adds it to the tokens table, and sends it - # to the user with instructions for using it to change their password. - - my ($loginname) = @_; - + my $loginname = shift; my $dbh = Bugzilla->dbh; + my $template = Bugzilla->template; + my $vars = {}; # Retrieve the user's ID from the database. - my $quotedloginname = &::SqlQuote($loginname); - &::SendSQL("SELECT profiles.userid, tokens.issuedate FROM profiles - LEFT JOIN tokens - ON tokens.userid = profiles.userid - AND tokens.tokentype = 'password' - AND tokens.issuedate > NOW() - " . - $dbh->sql_interval(10, 'MINUTE') . " - WHERE " . $dbh->sql_istrcmp('login_name', $quotedloginname)); - my ($userid, $toosoon) = &::FetchSQLData(); - - if ($toosoon) { - ThrowUserError('too_soon_for_new_token'); - }; + trick_taint($loginname); + my ($userid, $too_soon) = + $dbh->selectrow_array('SELECT profiles.userid, tokens.issuedate + FROM profiles + LEFT JOIN tokens + ON tokens.userid = profiles.userid + AND tokens.tokentype = ? + AND tokens.issuedate > NOW() - ' . + $dbh->sql_interval(10, 'MINUTE') . ' + WHERE ' . $dbh->sql_istrcmp('login_name', '?'), + undef, ('password', $loginname)); + + ThrowUserError('too_soon_for_new_token') if $too_soon; my ($token, $token_ts) = _create_token($userid, 'password', $::ENV{'REMOTE_ADDR'}); # Mail the user the token along with instructions for using it. - - my $template = Bugzilla->template; - my $vars = {}; - $vars->{'token'} = $token; $vars->{'emailaddress'} = $loginname . Param('emailsuffix'); @@ -143,9 +139,10 @@ sub IssueSessionToken { sub CleanTokenTable { my $dbh = Bugzilla->dbh; $dbh->bz_lock_tables('tokens WRITE'); - &::SendSQL("DELETE FROM tokens WHERE " . - $dbh->sql_to_days('NOW()') . " - " . - $dbh->sql_to_days('issuedate') . " >= " . $maxtokenage); + $dbh->do('DELETE FROM tokens + WHERE ' . $dbh->sql_to_days('NOW()') . ' - ' . + $dbh->sql_to_days('issuedate') . ' >= ?', + undef, $maxtokenage); $dbh->bz_unlock_tables(); } @@ -154,9 +151,8 @@ sub GenerateUniqueToken { # for the tokens themselves and checks uniqueness by searching for # the token in the "tokens" table. Gives up if it can't come up # with a token after about one hundred tries. - my ($table, $column) = @_; - + my $token; my $duplicate = 1; my $tries = 0; @@ -175,30 +171,27 @@ sub GenerateUniqueToken { $sth->execute($token); $duplicate = $sth->fetchrow_array; } - return $token; } +# Cancels a previously issued token and notifies the system administrator. +# This should only happen when the user accidentally makes a token request +# or when a malicious hacker makes a token request on behalf of a user. sub Cancel { - # Cancels a previously issued token and notifies the system administrator. - # This should only happen when the user accidentally makes a token request - # or when a malicious hacker makes a token request on behalf of a user. - my ($token, $cancelaction, $vars) = @_; - my $dbh = Bugzilla->dbh; $vars ||= {}; - # Quote the token for inclusion in SQL statements. - my $quotedtoken = &::SqlQuote($token); - # Get information about the token being cancelled. - &::SendSQL("SELECT " . $dbh->sql_date_format('issuedate') . ", - tokentype , eventdata , login_name , realname - FROM tokens, profiles - WHERE tokens.userid = profiles.userid - AND token = $quotedtoken"); - my ($issuedate, $tokentype, $eventdata, $loginname, $realname) = &::FetchSQLData(); + trick_taint($token); + my ($issuedate, $tokentype, $eventdata, $loginname, $realname) = + $dbh->selectrow_array('SELECT ' . $dbh->sql_date_format('issuedate') . ', + tokentype , eventdata , login_name , realname + FROM tokens + INNER JOIN profiles + ON tokens.userid = profiles.userid + WHERE token = ?', + undef, $token); # Get the email address of the Bugzilla maintainer. my $maintainer = Param('maintainer'); @@ -228,53 +221,53 @@ sub Cancel { sub DeletePasswordTokens { my ($userid, $reason) = @_; - my $dbh = Bugzilla->dbh; - my $sth = $dbh->prepare("SELECT token " . - "FROM tokens " . - "WHERE userid=? AND tokentype='password'"); - $sth->execute($userid); - while (my $token = $sth->fetchrow_array) { + + detaint_natural($userid); + my $tokens = $dbh->selectcol_arrayref('SELECT token FROM tokens + WHERE userid = ? AND tokentype = ?', + undef, ($userid, 'password')); + + foreach my $token (@$tokens) { Bugzilla::Token::Cancel($token, $reason); } } +# Returns an email change token if the user has one. sub HasEmailChangeToken { - # Returns an email change token if the user has one. - - my ($userid) = @_; - + my $userid = shift; my $dbh = Bugzilla->dbh; - &::SendSQL("SELECT token FROM tokens WHERE userid = $userid " . - "AND (tokentype = 'emailnew' OR tokentype = 'emailold') " . - $dbh->sql_limit(1)); - my ($token) = &::FetchSQLData(); - + + my $token = $dbh->selectrow_array('SELECT token FROM tokens + WHERE userid = ? + AND (tokentype = ? OR tokentype = ?) ' . + $dbh->sql_limit(1), + undef, ($userid, 'emailnew', 'emailold')); return $token; } +# Returns the userid, issuedate and eventdata for the specified token sub GetTokenData { - # Returns the userid, issuedate and eventdata for the specified token - my ($token) = @_; + my $dbh = Bugzilla->dbh; + return unless defined $token; trick_taint($token); - - my $dbh = Bugzilla->dbh; + return $dbh->selectrow_array( "SELECT userid, " . $dbh->sql_date_format('issuedate') . ", eventdata FROM tokens WHERE token = ?", undef, $token); } +# Deletes specified token sub DeleteToken { - # Deletes specified token - my ($token) = @_; + my $dbh = Bugzilla->dbh; + return unless defined $token; trick_taint($token); - my $dbh = Bugzilla->dbh; $dbh->bz_lock_tables('tokens WRITE'); $dbh->do("DELETE FROM tokens WHERE token = ?", undef, $token); $dbh->bz_unlock_tables(); @@ -284,16 +277,16 @@ sub DeleteToken { # Internal Functions ################################################################################ +# Generates a unique token and inserts it into the database +# Returns the token and the token timestamp sub _create_token { - # Generates a unique token and inserts it into the database - # Returns the token and the token timestamp my ($userid, $tokentype, $eventdata) = @_; + my $dbh = Bugzilla->dbh; detaint_natural($userid); trick_taint($tokentype); trick_taint($eventdata); - my $dbh = Bugzilla->dbh; $dbh->bz_lock_tables('tokens WRITE'); my $token = GenerateUniqueToken(); diff --git a/Bugzilla/User.pm b/Bugzilla/User.pm index 7288ab30e..41feb1128 100644 --- a/Bugzilla/User.pm +++ b/Bugzilla/User.pm @@ -129,19 +129,11 @@ sub _create { my $dbh = Bugzilla->dbh; - my ($id, - $login, - $name, - $disabledtext, - $mybugslink) = $dbh->selectrow_array(qq{SELECT userid, - login_name, - realname, - disabledtext, - mybugslink - FROM profiles - WHERE $cond}, - undef, - $val); + my ($id, $login, $name, $disabledtext, $mybugslink) = + $dbh->selectrow_array(qq{SELECT userid, login_name, realname, + disabledtext, mybugslink + FROM profiles WHERE $cond}, + undef, $val); return undef unless defined $id; @@ -675,12 +667,8 @@ sub derive_regexp_groups { } } - $dbh->do(q{UPDATE profiles - SET refreshed_when = ? - WHERE userid=?}, - undef, - $time, - $id); + $dbh->do(q{UPDATE profiles SET refreshed_when = ? WHERE userid = ?}, + undef, ($time, $id)); } sub product_responsibilities { @@ -751,9 +739,10 @@ sub match { # $str contains the string to match, while $limit contains the # maximum number of records to retrieve. my ($str, $limit, $exclude_disabled) = @_; - - my @users = (); + my $user = Bugzilla->user; + my $dbh = Bugzilla->dbh; + my @users = (); return \@users if $str =~ /^\s*$/; # The search order is wildcards, then exact match, then substring search. @@ -762,97 +751,77 @@ sub match { # ones following it will not execute. # first try wildcards - my $wildstr = $str; - my $user = Bugzilla->user; - my $dbh = Bugzilla->dbh; if ($wildstr =~ s/\*/\%/g && # don't do wildcards if no '*' in the string Param('usermatchmode') ne 'off') { # or if we only want exact matches # Build the query. - my $sqlstr = &::SqlQuote($wildstr); - my $query = "SELECT DISTINCT userid, realname, login_name, " . - "LENGTH(login_name) AS namelength " . - "FROM profiles "; - if (&::Param('usevisibilitygroups')) { - $query .= ", user_group_map "; + trick_taint($wildstr); + my $query = "SELECT DISTINCT login_name FROM profiles "; + if (Param('usevisibilitygroups')) { + $query .= "INNER JOIN user_group_map + ON user_group_map.user_id = profiles.userid "; } - $query .= "WHERE (" - . $dbh->sql_istrcmp('login_name', $sqlstr, "LIKE") . " OR " . - $dbh->sql_istrcmp('realname', $sqlstr, "LIKE") . ") "; - if (&::Param('usevisibilitygroups')) { - $query .= "AND user_group_map.user_id = userid " . - "AND isbless = 0 " . + $query .= "WHERE (" + . $dbh->sql_istrcmp('login_name', '?', "LIKE") . " OR " . + $dbh->sql_istrcmp('realname', '?', "LIKE") . ") "; + if (Param('usevisibilitygroups')) { + $query .= "AND isbless = 0 " . "AND group_id IN(" . - join(', ', (-1, @{$user->visible_groups_inherited})) . - ")"; + join(', ', (-1, @{$user->visible_groups_inherited})) . ") "; } $query .= " AND disabledtext = '' " if $exclude_disabled; - $query .= "ORDER BY namelength "; + $query .= " ORDER BY login_name "; $query .= $dbh->sql_limit($limit) if $limit; # Execute the query, retrieve the results, and make them into # User objects. - - &::PushGlobalSQLState(); - &::SendSQL($query); - push(@users, new Bugzilla::User(&::FetchSQLData())) while &::MoreSQLData(); - &::PopGlobalSQLState(); - + my $user_logins = $dbh->selectcol_arrayref($query, undef, ($wildstr, $wildstr)); + foreach my $login_name (@$user_logins) { + push(@users, Bugzilla::User->new_from_login($login_name)); + } } else { # try an exact match - - my $sqlstr = &::SqlQuote($str); - my $query = "SELECT userid, realname, login_name " . - "FROM profiles " . - "WHERE " . $dbh->sql_istrcmp('login_name', $sqlstr); # Exact matches don't care if a user is disabled. + trick_taint($str); + my $user_id = $dbh->selectrow_array('SELECT userid FROM profiles + WHERE ' . $dbh->sql_istrcmp('login_name', '?'), + undef, $str); - &::PushGlobalSQLState(); - &::SendSQL($query); - push(@users, new Bugzilla::User(&::FetchSQLData())) if &::MoreSQLData(); - &::PopGlobalSQLState(); + push(@users, new Bugzilla::User($user_id)) if $user_id; } # then try substring search - if ((scalar(@users) == 0) - && (&::Param('usermatchmode') eq 'search') + && (Param('usermatchmode') eq 'search') && (length($str) >= 3)) { + $str = lc($str); + trick_taint($str); - my $sqlstr = &::SqlQuote(lc($str)); - - my $query = "SELECT DISTINCT userid, realname, login_name, " . - "LENGTH(login_name) AS namelength " . - "FROM profiles"; - if (&::Param('usevisibilitygroups')) { - $query .= ", user_group_map"; + my $query = "SELECT DISTINCT login_name FROM profiles "; + if (Param('usevisibilitygroups')) { + $query .= "INNER JOIN user_group_map + ON user_group_map.user_id = profiles.userid "; } $query .= " WHERE (" . - $dbh->sql_position($sqlstr, 'LOWER(login_name)') . " > 0" . - " OR " . - $dbh->sql_position($sqlstr, 'LOWER(realname)') . " > 0)"; - if (&::Param('usevisibilitygroups')) { - $query .= " AND user_group_map.user_id = userid" . - " AND isbless = 0" . + $dbh->sql_position('?', 'LOWER(login_name)') . " > 0" . " OR " . + $dbh->sql_position('?', 'LOWER(realname)') . " > 0) "; + if (Param('usevisibilitygroups')) { + $query .= " AND isbless = 0" . " AND group_id IN(" . - join(', ', (-1, @{$user->visible_groups_inherited})) . ")"; + join(', ', (-1, @{$user->visible_groups_inherited})) . ") "; } - $query .= " AND disabledtext = ''" if $exclude_disabled; - $query .= " ORDER BY namelength"; - $query .= " " . $dbh->sql_limit($limit) if $limit; - &::PushGlobalSQLState(); - &::SendSQL($query); - push(@users, new Bugzilla::User(&::FetchSQLData())) while &::MoreSQLData(); - &::PopGlobalSQLState(); - } - - # order @users by alpha - - @users = sort { uc($a->login) cmp uc($b->login) } @users; + $query .= " AND disabledtext = '' " if $exclude_disabled; + $query .= " ORDER BY login_name "; + $query .= $dbh->sql_limit($limit) if $limit; + my $user_logins = $dbh->selectcol_arrayref($query, undef, ($str, $str)); + foreach my $login_name (@$user_logins) { + push(@users, Bugzilla::User->new_from_login($login_name)); + } + } return \@users; } @@ -1203,10 +1172,10 @@ sub wants_bug_mail { # need one piece of information, and doing so (as of 2004-11-23) slows # down bugmail sending by a factor of 2. If Bug creation was more # lazy, this might not be so bad. - my $bug_status = $dbh->selectrow_array("SELECT bug_status - FROM bugs - WHERE bug_id = $bug_id"); - + my $bug_status = $dbh->selectrow_array('SELECT bug_status + FROM bugs WHERE bug_id = ?', + undef, $bug_id); + if ($bug_status eq "UNCONFIRMED") { $wants_mail &= $self->wants_mail([EVT_UNCONFIRMED], $relationship); } @@ -1237,13 +1206,14 @@ sub wants_mail { } my $wants_mail = - $dbh->selectrow_array("SELECT 1 - FROM email_setting - WHERE user_id = $self->{'id'} - AND relationship = $relationship - AND event IN (" . join(",", @$events) . ") - LIMIT 1"); - + $dbh->selectrow_array('SELECT 1 + FROM email_setting + WHERE user_id = ? + AND relationship = ? + AND event IN (' . join(',', @$events) . ') ' . + $dbh->sql_limit(1), + undef, ($self->{'id'}, $relationship)); + return defined($wants_mail) ? 1 : 0; } @@ -1271,7 +1241,7 @@ sub get_userlist { $query .= " 1 "; } $query .= "FROM profiles "; - if (&::Param('usevisibilitygroups')) { + if (Param('usevisibilitygroups')) { $query .= "LEFT JOIN user_group_map " . "ON user_group_map.user_id = userid AND isbless = 0 " . "AND group_id IN(" . @@ -1334,16 +1304,14 @@ sub insert_new_user { next if ($event == EVT_CHANGED_BY_ME); next if (($event == EVT_CC) && ($rel != REL_REPORTER)); - $dbh->do("INSERT INTO email_setting " . - "(user_id, relationship, event) " . - "VALUES ($userid, $rel, $event)"); - } + $dbh->do('INSERT INTO email_setting (user_id, relationship, event) + VALUES (?, ?, ?)', undef, ($userid, $rel, $event)); + } } foreach my $event (GLOBAL_EVENTS) { - $dbh->do("INSERT INTO email_setting " . - "(user_id, relationship, event) " . - "VALUES ($userid, " . REL_ANY . ", $event)"); + $dbh->do('INSERT INTO email_setting (user_id, relationship, event) + VALUES (?, ?, ?)', undef, ($userid, REL_ANY, $event)); } my $user = new Bugzilla::User($userid); |