summaryrefslogtreecommitdiffstats
path: root/editgroups.cgi
diff options
context:
space:
mode:
Diffstat (limited to 'editgroups.cgi')
-rwxr-xr-xeditgroups.cgi692
1 files changed, 352 insertions, 340 deletions
diff --git a/editgroups.cgi b/editgroups.cgi
index b67b76755..9e3ffc6bf 100755
--- a/editgroups.cgi
+++ b/editgroups.cgi
@@ -22,39 +22,40 @@ use Bugzilla::Product;
use Bugzilla::User;
use Bugzilla::Token;
-use constant SPECIAL_GROUPS => ('chartgroup', 'insidergroup',
- 'timetrackinggroup', 'querysharegroup');
+use constant SPECIAL_GROUPS =>
+ ('chartgroup', 'insidergroup', 'timetrackinggroup', 'querysharegroup');
-my $cgi = Bugzilla->cgi;
-my $dbh = Bugzilla->dbh;
+my $cgi = Bugzilla->cgi;
+my $dbh = Bugzilla->dbh;
my $template = Bugzilla->template;
-my $vars = {};
+my $vars = {};
my $user = Bugzilla->login(LOGIN_REQUIRED);
print $cgi->header();
$user->in_group('creategroups')
- || ThrowUserError("auth_failure", {group => "creategroups",
- action => "edit",
- object => "groups"});
+ || ThrowUserError("auth_failure",
+ {group => "creategroups", action => "edit", object => "groups"});
my $action = trim($cgi->param('action') || '');
-my $token = $cgi->param('token');
+my $token = $cgi->param('token');
# CheckGroupID checks that a positive integer is given and is
# actually a valid group ID. If all tests are successful, the
# trimmed group ID is returned.
sub CheckGroupID {
- my ($group_id) = @_;
- $group_id = trim($group_id || 0);
- ThrowUserError("group_not_specified") unless $group_id;
- (detaint_natural($group_id)
- && Bugzilla->dbh->selectrow_array("SELECT id FROM groups WHERE id = ?",
- undef, $group_id))
- || ThrowUserError("invalid_group_ID");
- return $group_id;
+ my ($group_id) = @_;
+ $group_id = trim($group_id || 0);
+ ThrowUserError("group_not_specified") unless $group_id;
+ (
+ detaint_natural($group_id) && Bugzilla->dbh->selectrow_array(
+ "SELECT id FROM groups WHERE id = ?",
+ undef, $group_id
+ )
+ ) || ThrowUserError("invalid_group_ID");
+ return $group_id;
}
# CheckGroupRegexp checks that the regular expression is valid
@@ -63,86 +64,87 @@ sub CheckGroupID {
# is returned.
sub CheckGroupRegexp {
- my ($regexp) = @_;
- $regexp = trim($regexp || '');
- trick_taint($regexp);
- ThrowUserError("invalid_regexp") unless (eval {qr/$regexp/});
- return $regexp;
+ my ($regexp) = @_;
+ $regexp = trim($regexp || '');
+ trick_taint($regexp);
+ ThrowUserError("invalid_regexp") unless (eval {qr/$regexp/});
+ return $regexp;
}
# A helper for displaying the edit.html.tmpl template.
sub get_current_and_available {
- my ($group, $vars) = @_;
-
- my @all_groups = Bugzilla::Group->get_all;
- my @members_current = @{$group->grant_direct(GROUP_MEMBERSHIP)};
- my @member_of_current = @{$group->granted_by_direct(GROUP_MEMBERSHIP)};
- my @bless_from_current = @{$group->grant_direct(GROUP_BLESS)};
- my @bless_to_current = @{$group->granted_by_direct(GROUP_BLESS)};
- my (@visible_from_current, @visible_to_me_current);
+ my ($group, $vars) = @_;
+
+ my @all_groups = Bugzilla::Group->get_all;
+ my @members_current = @{$group->grant_direct(GROUP_MEMBERSHIP)};
+ my @member_of_current = @{$group->granted_by_direct(GROUP_MEMBERSHIP)};
+ my @bless_from_current = @{$group->grant_direct(GROUP_BLESS)};
+ my @bless_to_current = @{$group->granted_by_direct(GROUP_BLESS)};
+ my (@visible_from_current, @visible_to_me_current);
+ if (Bugzilla->params->{'usevisibilitygroups'}) {
+ @visible_from_current = @{$group->grant_direct(GROUP_VISIBLE)};
+ @visible_to_me_current = @{$group->granted_by_direct(GROUP_VISIBLE)};
+ }
+
+ # Figure out what groups are not currently a member of this group,
+ # and what groups this group is not currently a member of.
+ my (
+ @members_available, @member_of_available, @bless_from_available,
+ @bless_to_available, @visible_from_available, @visible_to_me_available
+ );
+ foreach my $group_option (@all_groups) {
if (Bugzilla->params->{'usevisibilitygroups'}) {
- @visible_from_current = @{$group->grant_direct(GROUP_VISIBLE)};
- @visible_to_me_current = @{$group->granted_by_direct(GROUP_VISIBLE)};
+ push(@visible_from_available, $group_option)
+ if !grep($_->id == $group_option->id, @visible_from_current);
+ push(@visible_to_me_available, $group_option)
+ if !grep($_->id == $group_option->id, @visible_to_me_current);
}
- # Figure out what groups are not currently a member of this group,
- # and what groups this group is not currently a member of.
- my (@members_available, @member_of_available,
- @bless_from_available, @bless_to_available,
- @visible_from_available, @visible_to_me_available);
- foreach my $group_option (@all_groups) {
- if (Bugzilla->params->{'usevisibilitygroups'}) {
- push(@visible_from_available, $group_option)
- if !grep($_->id == $group_option->id, @visible_from_current);
- push(@visible_to_me_available, $group_option)
- if !grep($_->id == $group_option->id, @visible_to_me_current);
- }
-
- push(@bless_from_available, $group_option)
- if !grep($_->id == $group_option->id, @bless_from_current);
-
- # The group itself should never show up in the membership lists,
- # and should show up in only one of the bless lists (otherwise
- # you can try to allow it to bless itself twice, leading to a
- # database unique constraint error).
- next if $group_option->id == $group->id;
-
- push(@members_available, $group_option)
- if !grep($_->id == $group_option->id, @members_current);
- push(@member_of_available, $group_option)
- if !grep($_->id == $group_option->id, @member_of_current);
- push(@bless_to_available, $group_option)
- if !grep($_->id == $group_option->id, @bless_to_current);
- }
-
- $vars->{'members_current'} = \@members_current;
- $vars->{'members_available'} = \@members_available;
- $vars->{'member_of_current'} = \@member_of_current;
- $vars->{'member_of_available'} = \@member_of_available;
-
- $vars->{'bless_from_current'} = \@bless_from_current;
- $vars->{'bless_from_available'} = \@bless_from_available;
- $vars->{'bless_to_current'} = \@bless_to_current;
- $vars->{'bless_to_available'} = \@bless_to_available;
-
- if (Bugzilla->params->{'usevisibilitygroups'}) {
- $vars->{'visible_from_current'} = \@visible_from_current;
- $vars->{'visible_from_available'} = \@visible_from_available;
- $vars->{'visible_to_me_current'} = \@visible_to_me_current;
- $vars->{'visible_to_me_available'} = \@visible_to_me_available;
- }
+ push(@bless_from_available, $group_option)
+ if !grep($_->id == $group_option->id, @bless_from_current);
+
+ # The group itself should never show up in the membership lists,
+ # and should show up in only one of the bless lists (otherwise
+ # you can try to allow it to bless itself twice, leading to a
+ # database unique constraint error).
+ next if $group_option->id == $group->id;
+
+ push(@members_available, $group_option)
+ if !grep($_->id == $group_option->id, @members_current);
+ push(@member_of_available, $group_option)
+ if !grep($_->id == $group_option->id, @member_of_current);
+ push(@bless_to_available, $group_option)
+ if !grep($_->id == $group_option->id, @bless_to_current);
+ }
+
+ $vars->{'members_current'} = \@members_current;
+ $vars->{'members_available'} = \@members_available;
+ $vars->{'member_of_current'} = \@member_of_current;
+ $vars->{'member_of_available'} = \@member_of_available;
+
+ $vars->{'bless_from_current'} = \@bless_from_current;
+ $vars->{'bless_from_available'} = \@bless_from_available;
+ $vars->{'bless_to_current'} = \@bless_to_current;
+ $vars->{'bless_to_available'} = \@bless_to_available;
+
+ if (Bugzilla->params->{'usevisibilitygroups'}) {
+ $vars->{'visible_from_current'} = \@visible_from_current;
+ $vars->{'visible_from_available'} = \@visible_from_available;
+ $vars->{'visible_to_me_current'} = \@visible_to_me_current;
+ $vars->{'visible_to_me_available'} = \@visible_to_me_available;
+ }
}
# If no action is specified, get a list of all groups available.
unless ($action) {
- my @groups = Bugzilla::Group->get_all;
- $vars->{'groups'} = \@groups;
+ my @groups = Bugzilla::Group->get_all;
+ $vars->{'groups'} = \@groups;
- print $cgi->header();
- $template->process("admin/groups/list.html.tmpl", $vars)
- || ThrowTemplateError($template->error());
- exit;
+ print $cgi->header();
+ $template->process("admin/groups/list.html.tmpl", $vars)
+ || ThrowTemplateError($template->error());
+ exit;
}
#
@@ -152,20 +154,21 @@ unless ($action) {
#
if ($action eq 'changeform') {
- # Check that an existing group ID is given
- my $group_id = CheckGroupID($cgi->param('group'));
- my $group = new Bugzilla::Group($group_id);
- check_for_restricted_groups([ $group ]);
- get_current_and_available($group, $vars);
- $vars->{'group'} = $group;
- $vars->{'token'} = issue_session_token('edit_group');
+ # Check that an existing group ID is given
+ my $group_id = CheckGroupID($cgi->param('group'));
+ my $group = new Bugzilla::Group($group_id);
+ check_for_restricted_groups([$group]);
+
+ get_current_and_available($group, $vars);
+ $vars->{'group'} = $group;
+ $vars->{'token'} = issue_session_token('edit_group');
- print $cgi->header();
- $template->process("admin/groups/edit.html.tmpl", $vars)
- || ThrowTemplateError($template->error());
+ print $cgi->header();
+ $template->process("admin/groups/edit.html.tmpl", $vars)
+ || ThrowTemplateError($template->error());
- exit;
+ exit;
}
#
@@ -175,51 +178,52 @@ if ($action eq 'changeform') {
#
if ($action eq 'add') {
- $vars->{'token'} = issue_session_token('add_group');
- print $cgi->header();
- $template->process("admin/groups/create.html.tmpl", $vars)
- || ThrowTemplateError($template->error());
+ $vars->{'token'} = issue_session_token('add_group');
+ print $cgi->header();
+ $template->process("admin/groups/create.html.tmpl", $vars)
+ || ThrowTemplateError($template->error());
- exit;
+ exit;
}
-
#
# action='new' -> add group entered in the 'action=add' screen
#
if ($action eq 'new') {
- check_token_data($token, 'add_group');
- my $group = Bugzilla::Group->create({
- name => scalar $cgi->param('name'),
- description => scalar $cgi->param('desc'),
- userregexp => scalar $cgi->param('regexp'),
- isactive => scalar $cgi->param('isactive'),
- icon_url => scalar $cgi->param('icon_url'),
- idle_member_removal => scalar $cgi->param('idle_member_removal'),
- isbuggroup => 1,
- owner_user_id => scalar $cgi->param('owner'),
- });
-
- # Permit all existing products to use the new group if makeproductgroups.
- if ($cgi->param('insertnew')) {
- $dbh->do('INSERT INTO group_control_map
+ check_token_data($token, 'add_group');
+ my $group = Bugzilla::Group->create({
+ name => scalar $cgi->param('name'),
+ description => scalar $cgi->param('desc'),
+ userregexp => scalar $cgi->param('regexp'),
+ isactive => scalar $cgi->param('isactive'),
+ icon_url => scalar $cgi->param('icon_url'),
+ idle_member_removal => scalar $cgi->param('idle_member_removal'),
+ isbuggroup => 1,
+ owner_user_id => scalar $cgi->param('owner'),
+ });
+
+ # Permit all existing products to use the new group if makeproductgroups.
+ if ($cgi->param('insertnew')) {
+ $dbh->do(
+ 'INSERT INTO group_control_map
(group_id, product_id, membercontrol, othercontrol)
- SELECT ?, products.id, ?, ? FROM products',
- undef, ($group->id, CONTROLMAPSHOWN, CONTROLMAPNA));
- }
- delete_token($token);
-
- $vars->{'message'} = 'group_created';
- $vars->{'group'} = $group;
- get_current_and_available($group, $vars);
- $vars->{'token'} = issue_session_token('edit_group');
-
- print $cgi->header();
- $template->process("admin/groups/edit.html.tmpl", $vars)
- || ThrowTemplateError($template->error());
- exit;
+ SELECT ?, products.id, ?, ? FROM products', undef,
+ ($group->id, CONTROLMAPSHOWN, CONTROLMAPNA)
+ );
+ }
+ delete_token($token);
+
+ $vars->{'message'} = 'group_created';
+ $vars->{'group'} = $group;
+ get_current_and_available($group, $vars);
+ $vars->{'token'} = issue_session_token('edit_group');
+
+ print $cgi->header();
+ $template->process("admin/groups/edit.html.tmpl", $vars)
+ || ThrowTemplateError($template->error());
+ exit;
}
#
@@ -229,23 +233,25 @@ if ($action eq 'new') {
#
if ($action eq 'del') {
- # Check that an existing group ID is given
- my $group = Bugzilla::Group->check({ id => scalar $cgi->param('group') });
- check_for_restricted_groups([ $group ]);
- $group->check_remove({ test_only => 1 });
- $vars->{'shared_queries'} =
- $dbh->selectrow_array('SELECT COUNT(*)
+
+ # Check that an existing group ID is given
+ my $group = Bugzilla::Group->check({id => scalar $cgi->param('group')});
+ check_for_restricted_groups([$group]);
+ $group->check_remove({test_only => 1});
+ $vars->{'shared_queries'} = $dbh->selectrow_array(
+ 'SELECT COUNT(*)
FROM namedquery_group_map
- WHERE group_id = ?', undef, $group->id);
+ WHERE group_id = ?', undef, $group->id
+ );
- $vars->{'group'} = $group;
- $vars->{'token'} = issue_session_token('delete_group');
+ $vars->{'group'} = $group;
+ $vars->{'token'} = issue_session_token('delete_group');
- print $cgi->header();
- $template->process("admin/groups/delete.html.tmpl", $vars)
- || ThrowTemplateError($template->error());
+ print $cgi->header();
+ $template->process("admin/groups/delete.html.tmpl", $vars)
+ || ThrowTemplateError($template->error());
- exit;
+ exit;
}
#
@@ -253,26 +259,27 @@ if ($action eq 'del') {
#
if ($action eq 'delete') {
- check_token_data($token, 'delete_group');
- # Check that an existing group ID is given
- my $group = Bugzilla::Group->check({ id => scalar $cgi->param('group') });
- check_for_restricted_groups([ $group ]);
- $vars->{'name'} = $group->name;
- $group->remove_from_db({
- remove_from_users => scalar $cgi->param('removeusers'),
- remove_from_bugs => scalar $cgi->param('removebugs'),
- remove_from_flags => scalar $cgi->param('removeflags'),
- remove_from_products => scalar $cgi->param('unbind'),
- });
- delete_token($token);
-
- $vars->{'message'} = 'group_deleted';
- $vars->{'groups'} = [Bugzilla::Group->get_all];
-
- print $cgi->header();
- $template->process("admin/groups/list.html.tmpl", $vars)
- || ThrowTemplateError($template->error());
- exit;
+ check_token_data($token, 'delete_group');
+
+ # Check that an existing group ID is given
+ my $group = Bugzilla::Group->check({id => scalar $cgi->param('group')});
+ check_for_restricted_groups([$group]);
+ $vars->{'name'} = $group->name;
+ $group->remove_from_db({
+ remove_from_users => scalar $cgi->param('removeusers'),
+ remove_from_bugs => scalar $cgi->param('removebugs'),
+ remove_from_flags => scalar $cgi->param('removeflags'),
+ remove_from_products => scalar $cgi->param('unbind'),
+ });
+ delete_token($token);
+
+ $vars->{'message'} = 'group_deleted';
+ $vars->{'groups'} = [Bugzilla::Group->get_all];
+
+ print $cgi->header();
+ $template->process("admin/groups/list.html.tmpl", $vars)
+ || ThrowTemplateError($template->error());
+ exit;
}
#
@@ -280,73 +287,75 @@ if ($action eq 'delete') {
#
if ($action eq 'postchanges') {
- check_token_data($token, 'edit_group');
- my $changes = doGroupChanges();
- delete_token($token);
-
- my $group = new Bugzilla::Group($cgi->param('group_id'));
- get_current_and_available($group, $vars);
- $vars->{'message'} = 'group_updated';
- $vars->{'group'} = $group;
- $vars->{'changes'} = $changes;
- $vars->{'token'} = issue_session_token('edit_group');
-
- print $cgi->header();
- $template->process("admin/groups/edit.html.tmpl", $vars)
- || ThrowTemplateError($template->error());
- exit;
+ check_token_data($token, 'edit_group');
+ my $changes = doGroupChanges();
+ delete_token($token);
+
+ my $group = new Bugzilla::Group($cgi->param('group_id'));
+ get_current_and_available($group, $vars);
+ $vars->{'message'} = 'group_updated';
+ $vars->{'group'} = $group;
+ $vars->{'changes'} = $changes;
+ $vars->{'token'} = issue_session_token('edit_group');
+
+ print $cgi->header();
+ $template->process("admin/groups/edit.html.tmpl", $vars)
+ || ThrowTemplateError($template->error());
+ exit;
}
if ($action eq 'confirm_remove') {
- my $group = new Bugzilla::Group(CheckGroupID($cgi->param('group_id')));
- check_for_restricted_groups([ $group ]);
- $vars->{'group'} = $group;
- $vars->{'regexp'} = CheckGroupRegexp($cgi->param('regexp'));
- $vars->{'token'} = issue_session_token('remove_group_members');
- $template->process('admin/groups/confirm-remove.html.tmpl', $vars)
- || ThrowTemplateError($template->error());
- exit;
+ my $group = new Bugzilla::Group(CheckGroupID($cgi->param('group_id')));
+ check_for_restricted_groups([$group]);
+ $vars->{'group'} = $group;
+ $vars->{'regexp'} = CheckGroupRegexp($cgi->param('regexp'));
+ $vars->{'token'} = issue_session_token('remove_group_members');
+ $template->process('admin/groups/confirm-remove.html.tmpl', $vars)
+ || ThrowTemplateError($template->error());
+ exit;
}
if ($action eq 'remove_regexp') {
- check_token_data($token, 'remove_group_members');
- # remove all explicit users from the group with
- # gid = $cgi->param('group') that match the regular expression
- # stored in the DB for that group or all of them period
-
- my $group = new Bugzilla::Group(CheckGroupID($cgi->param('group_id')));
- check_for_restricted_groups([ $group ]);
- my $regexp = CheckGroupRegexp($cgi->param('regexp'));
-
- $dbh->bz_start_transaction();
-
- my $users = $group->members_direct();
- my $sth_delete = $dbh->prepare(
- "DELETE FROM user_group_map
- WHERE user_id = ? AND isbless = 0 AND group_id = ?");
-
- my @deleted;
- foreach my $member (@$users) {
- if ($regexp eq '' || $member->login =~ m/$regexp/i) {
- $sth_delete->execute($member->id, $group->id);
- push(@deleted, $member);
- }
+ check_token_data($token, 'remove_group_members');
+
+ # remove all explicit users from the group with
+ # gid = $cgi->param('group') that match the regular expression
+ # stored in the DB for that group or all of them period
+
+ my $group = new Bugzilla::Group(CheckGroupID($cgi->param('group_id')));
+ check_for_restricted_groups([$group]);
+ my $regexp = CheckGroupRegexp($cgi->param('regexp'));
+
+ $dbh->bz_start_transaction();
+
+ my $users = $group->members_direct();
+ my $sth_delete = $dbh->prepare(
+ "DELETE FROM user_group_map
+ WHERE user_id = ? AND isbless = 0 AND group_id = ?"
+ );
+
+ my @deleted;
+ foreach my $member (@$users) {
+ if ($regexp eq '' || $member->login =~ m/$regexp/i) {
+ $sth_delete->execute($member->id, $group->id);
+ push(@deleted, $member);
}
- $dbh->bz_commit_transaction();
+ }
+ $dbh->bz_commit_transaction();
- $vars->{'users'} = \@deleted;
- $vars->{'regexp'} = $regexp;
- delete_token($token);
+ $vars->{'users'} = \@deleted;
+ $vars->{'regexp'} = $regexp;
+ delete_token($token);
- $vars->{'message'} = 'group_membership_removed';
- $vars->{'group'} = $group->name;
- $vars->{'groups'} = [Bugzilla::Group->get_all];
+ $vars->{'message'} = 'group_membership_removed';
+ $vars->{'group'} = $group->name;
+ $vars->{'groups'} = [Bugzilla::Group->get_all];
- print $cgi->header();
- $template->process("admin/groups/list.html.tmpl", $vars)
- || ThrowTemplateError($template->error());
+ print $cgi->header();
+ $template->process("admin/groups/list.html.tmpl", $vars)
+ || ThrowTemplateError($template->error());
- exit;
+ exit;
}
# No valid action found
@@ -354,153 +363,156 @@ ThrowUserError('unknown_action', {action => $action});
# Helper sub to handle the making of changes to a group
sub doGroupChanges {
- my $cgi = Bugzilla->cgi;
- my $dbh = Bugzilla->dbh;
+ my $cgi = Bugzilla->cgi;
+ my $dbh = Bugzilla->dbh;
- $dbh->bz_start_transaction();
+ $dbh->bz_start_transaction();
- # Check that the given group ID is valid and make a Group.
- my $group = new Bugzilla::Group(CheckGroupID($cgi->param('group_id')));
- check_for_restricted_groups([ $group ]);
+ # Check that the given group ID is valid and make a Group.
+ my $group = new Bugzilla::Group(CheckGroupID($cgi->param('group_id')));
+ check_for_restricted_groups([$group]);
- if (defined $cgi->param('regexp')) {
- $group->set_user_regexp($cgi->param('regexp'));
- }
+ if (defined $cgi->param('regexp')) {
+ $group->set_user_regexp($cgi->param('regexp'));
+ }
- if ($group->is_bug_group) {
- if (defined $cgi->param('name')) {
- $group->set_name($cgi->param('name'));
- }
- if (defined $cgi->param('desc')) {
- $group->set_description($cgi->param('desc'));
- }
- # Only set isactive if we came from the right form.
- if (defined $cgi->param('regexp')) {
- $group->set_is_active($cgi->param('isactive'));
- }
+ if ($group->is_bug_group) {
+ if (defined $cgi->param('name')) {
+ $group->set_name($cgi->param('name'));
}
-
- if (defined $cgi->param('icon_url')) {
- $group->set_icon_url($cgi->param('icon_url'));
+ if (defined $cgi->param('desc')) {
+ $group->set_description($cgi->param('desc'));
}
- if (defined $cgi->param('owner')) {
- $group->set_owner($cgi->param('owner'));
+ # Only set isactive if we came from the right form.
+ if (defined $cgi->param('regexp')) {
+ $group->set_is_active($cgi->param('isactive'));
}
+ }
- if (defined $cgi->param('idle_member_removal')) {
- $group->set_idle_member_removal($cgi->param('idle_member_removal'));
- }
+ if (defined $cgi->param('icon_url')) {
+ $group->set_icon_url($cgi->param('icon_url'));
+ }
- my $changes = $group->update();
+ if (defined $cgi->param('owner')) {
+ $group->set_owner($cgi->param('owner'));
+ }
- my $sth_insert = $dbh->prepare('INSERT INTO group_group_map
+ if (defined $cgi->param('idle_member_removal')) {
+ $group->set_idle_member_removal($cgi->param('idle_member_removal'));
+ }
+
+ my $changes = $group->update();
+
+ my $sth_insert = $dbh->prepare(
+ 'INSERT INTO group_group_map
(member_id, grantor_id, grant_type)
- VALUES (?, ?, ?)');
+ VALUES (?, ?, ?)'
+ );
- my $sth_delete = $dbh->prepare('DELETE FROM group_group_map
+ my $sth_delete = $dbh->prepare(
+ 'DELETE FROM group_group_map
WHERE member_id = ?
AND grantor_id = ?
- AND grant_type = ?');
-
- # First item is the type, second is whether or not it's "reverse"
- # (granted_by) (see _do_add for more explanation).
- my %fields = (
- members => [GROUP_MEMBERSHIP, 0],
- bless_from => [GROUP_BLESS, 0],
- visible_from => [GROUP_VISIBLE, 0],
- member_of => [GROUP_MEMBERSHIP, 1],
- bless_to => [GROUP_BLESS, 1],
- visible_to_me => [GROUP_VISIBLE, 1]
- );
- while (my ($field, $data) = each %fields) {
- _do_add($group, $changes, $sth_insert, "${field}_add",
- $data->[0], $data->[1]);
- _do_remove($group, $changes, $sth_delete, "${field}_remove",
- $data->[0], $data->[1]);
- }
-
- $dbh->bz_commit_transaction();
- return $changes;
+ AND grant_type = ?'
+ );
+
+ # First item is the type, second is whether or not it's "reverse"
+ # (granted_by) (see _do_add for more explanation).
+ my %fields = (
+ members => [GROUP_MEMBERSHIP, 0],
+ bless_from => [GROUP_BLESS, 0],
+ visible_from => [GROUP_VISIBLE, 0],
+ member_of => [GROUP_MEMBERSHIP, 1],
+ bless_to => [GROUP_BLESS, 1],
+ visible_to_me => [GROUP_VISIBLE, 1]
+ );
+ while (my ($field, $data) = each %fields) {
+ _do_add($group, $changes, $sth_insert, "${field}_add", $data->[0], $data->[1]);
+ _do_remove($group, $changes, $sth_delete, "${field}_remove", $data->[0],
+ $data->[1]);
+ }
+
+ $dbh->bz_commit_transaction();
+ return $changes;
}
sub _do_add {
- my ($group, $changes, $sth_insert, $field, $type, $reverse) = @_;
- my $cgi = Bugzilla->cgi;
-
- my $current;
- # $reverse means we're doing a granted_by--that is, somebody else
- # is granting us something.
- if ($reverse) {
- $current = $group->granted_by_direct($type);
- }
- else {
- $current = $group->grant_direct($type);
- }
-
- my $add_items = Bugzilla::Group->new_from_list([$cgi->param($field)]);
- check_for_restricted_groups($add_items);
-
- foreach my $add (@$add_items) {
- next if grep($_->id == $add->id, @$current);
-
- $changes->{$field} ||= [];
- push(@{$changes->{$field}}, $add->name);
- # They go this direction for a normal "This group is granting
- # $add something."
- my @ids = ($add->id, $group->id);
- # But they get reversed for "This group is being granted something
- # by $add."
- @ids = reverse @ids if $reverse;
- $sth_insert->execute(@ids, $type);
- }
+ my ($group, $changes, $sth_insert, $field, $type, $reverse) = @_;
+ my $cgi = Bugzilla->cgi;
+
+ my $current;
+
+ # $reverse means we're doing a granted_by--that is, somebody else
+ # is granting us something.
+ if ($reverse) {
+ $current = $group->granted_by_direct($type);
+ }
+ else {
+ $current = $group->grant_direct($type);
+ }
+
+ my $add_items = Bugzilla::Group->new_from_list([$cgi->param($field)]);
+ check_for_restricted_groups($add_items);
+
+ foreach my $add (@$add_items) {
+ next if grep($_->id == $add->id, @$current);
+
+ $changes->{$field} ||= [];
+ push(@{$changes->{$field}}, $add->name);
+
+ # They go this direction for a normal "This group is granting
+ # $add something."
+ my @ids = ($add->id, $group->id);
+
+ # But they get reversed for "This group is being granted something
+ # by $add."
+ @ids = reverse @ids if $reverse;
+ $sth_insert->execute(@ids, $type);
+ }
}
sub _do_remove {
- my ($group, $changes, $sth_delete, $field, $type, $reverse) = @_;
- my $cgi = Bugzilla->cgi;
- my $remove_items = Bugzilla::Group->new_from_list([$cgi->param($field)]);
- check_for_restricted_groups($remove_items);
-
- foreach my $remove (@$remove_items) {
- my @ids = ($remove->id, $group->id);
- # See _do_add for an explanation of $reverse
- @ids = reverse @ids if $reverse;
- # Deletions always succeed and are harmless if they fail, so we
- # don't need to do any checks.
- $sth_delete->execute(@ids, $type);
- $changes->{$field} ||= [];
- push(@{$changes->{$field}}, $remove->name);
- }
+ my ($group, $changes, $sth_delete, $field, $type, $reverse) = @_;
+ my $cgi = Bugzilla->cgi;
+ my $remove_items = Bugzilla::Group->new_from_list([$cgi->param($field)]);
+ check_for_restricted_groups($remove_items);
+
+ foreach my $remove (@$remove_items) {
+ my @ids = ($remove->id, $group->id);
+
+ # See _do_add for an explanation of $reverse
+ @ids = reverse @ids if $reverse;
+
+ # Deletions always succeed and are harmless if they fail, so we
+ # don't need to do any checks.
+ $sth_delete->execute(@ids, $type);
+ $changes->{$field} ||= [];
+ push(@{$changes->{$field}}, $remove->name);
+ }
}
# ensure non-admins cannot edit the admin group
# likewise you must be a member of the insider group in order to update it
sub check_for_restricted_groups {
- my ($groups) = @_;
-
- my $user = Bugzilla->user;
- return if $user->in_group('admin');
-
- # check for admin changes
- foreach my $group (@$groups) {
- if ($group->name eq 'admin') {
- ThrowUserError('auth_failure', {
- action => 'edit',
- object => 'admin_group',
- });
- }
- }
+ my ($groups) = @_;
- # check for insider group changes
- my $insider_group = Bugzilla->params->{insidergroup};
- return if $user->in_group($insider_group);
- foreach my $group (@$groups) {
- if ($group->name eq $insider_group) {
- ThrowUserError('auth_failure', {
- action => 'edit',
- object => 'insider_group',
- });
- }
+ my $user = Bugzilla->user;
+ return if $user->in_group('admin');
+
+ # check for admin changes
+ foreach my $group (@$groups) {
+ if ($group->name eq 'admin') {
+ ThrowUserError('auth_failure', {action => 'edit', object => 'admin_group',});
+ }
+ }
+
+ # check for insider group changes
+ my $insider_group = Bugzilla->params->{insidergroup};
+ return if $user->in_group($insider_group);
+ foreach my $group (@$groups) {
+ if ($group->name eq $insider_group) {
+ ThrowUserError('auth_failure', {action => 'edit', object => 'insider_group',});
}
+ }
}