# -*- Mode: perl; indent-tabs-mode: nil -*- # # The contents of this file are subject to the Mozilla Public # License Version 1.1 (the "License"); you may not use this file # except in compliance with the License. You may obtain a copy of # the License at http://www.mozilla.org/MPL/ # # Software distributed under the License is distributed on an "AS # IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or # implied. See the License for the specific language governing # rights and limitations under the License. # # The Original Code is the Bugzilla Bug Tracking System. # # The Initial Developer of the Original Code is Netscape Communications # Corporation. Portions created by Netscape are # Copyright (C) 1998 Netscape Communications Corporation. All # Rights Reserved. # # Contributor(s): Zach Lipton # package Bugzilla::Hook; use strict; use Bugzilla::Constants; use Bugzilla::Util; use Bugzilla::Error; use Scalar::Util qw(blessed); BEGIN { if ($ENV{MOD_PERL}) { require ModPerl::Const; import ModPerl::Const -compile => 'EXIT'; } else { # Create a fake constant. We have to do this in a string eval, # otherwise this will always be defined. eval('sub ModPerl::EXIT;'); } } sub process { my ($name, $args) = @_; # get a list of all extensions my @extensions = glob(bz_locations()->{'extensionsdir'} . "/*"); # check each extension to see if it uses the hook # if so, invoke the extension source file: foreach my $extension (@extensions) { # all of these variables come directly from code or directory names. # If there's malicious data here, we have much bigger issues to # worry about, so we can safely detaint them: trick_taint($extension); # Skip CVS directories and any hidden files/dirs. next if $extension =~ m{/CVS$} || $extension =~ m{/\.[^/]+$}; next if -e "$extension/disabled"; if (-e $extension.'/code/'.$name.'.pl') { Bugzilla->hook_args($args); # Allow extensions to load their own libraries. local @INC = ("$extension/lib", @INC); do($extension.'/code/'.$name.'.pl'); if ($@) { if ($ENV{MOD_PERL} and blessed $@ and $@ == ModPerl::EXIT) { exit; } else { ThrowCodeError('extension_invalid', { errstr => $@, name => $name, extension => $extension }); } } # Flush stored data. Bugzilla->hook_args({}); } } } sub enabled_plugins { my $extdir = bz_locations()->{'extensionsdir'}; my @extensions = glob("$extdir/*"); my %enabled; foreach my $extension (@extensions) { trick_taint($extension); my $extname = $extension; $extname =~ s{^\Q$extdir\E/}{}; next if $extname eq 'CVS' || $extname =~ /^\./; next if -e "$extension/disabled"; # Allow extensions to load their own libraries. local @INC = ("$extension/lib", @INC); $enabled{$extname} = do("$extension/info.pl"); ThrowCodeError('extension_invalid', { errstr => $@, name => 'version', extension => $extension }) if $@; } return \%enabled; } 1; __END__ =head1 NAME Bugzilla::Hook - Extendable extension hooks for Bugzilla code =head1 SYNOPSIS use Bugzilla::Hook; Bugzilla::Hook::process("hookname", { arg => $value, arg2 => $value2 }); =head1 DESCRIPTION Bugzilla allows extension modules to drop in and add routines at arbitrary points in Bugzilla code. These points are referred to as hooks. When a piece of standard Bugzilla code wants to allow an extension to perform additional functions, it uses Bugzilla::Hook's L subroutine to invoke any extension code if installed. There is a sample extension in F that demonstrates most of the things described in this document, as well as many of the hooks available. =head2 How Hooks Work When a hook named C is run, Bugzilla will attempt to invoke any source files named F. So, for example, if your extension is called "testopia", and you want to have code run during the L hook, you would have a file called F that contained perl code to run during that hook. =head2 Arguments Passed to Hooks Some L have params that are passed to them. These params are accessible through L. That returns a hashref. Very frequently, if you want your hook to do anything, you have to modify these variables. You may also want to use L to get parameters that were passed to the current CGI script or WebService method. =head2 Versioning Extensions Every extension must have a file in its root called F. This file must return a hash when called with C. The hash must contain a 'version' key with the current version of the extension. Extension authors can also add any extra infomration to this hash if required, by adding a new key beginning with x_ which will not be used the core Bugzilla code. =head1 SUBROUTINES =over =item C =over =item B Invoke any code hooks with a matching name from any installed extensions. See C in the Bugzilla Guide for more information on Bugzilla's extension mechanism. =item B =over =item C<$name> - The name of the hook to invoke. =item C<$args> - A hashref. The named args to pass to the hook. They will be accessible to the hook via L. =back =item B (nothing) =back =back =head1 HOOKS This describes what hooks exist in Bugzilla currently. They are mostly in alphabetical order, but some related hooks are near each other instead of being alphabetical. =head2 attachment-process_data This happens at the very beginning process of the attachment creation. You can edit the attachment content itself as well as all attributes of the attachment, before they are validated and inserted into the DB. Params: =over =item C - A reference pointing either to the content of the file being uploaded or pointing to the filehandle associated with the file. =item C - A hashref whose keys are the same as L. The data it contains hasn't been checked yet. =back =head2 auth-login_methods This allows you to add new login types to Bugzilla. (See L.) Params: =over =item C This is a hash--a mapping from login-type "names" to the actual module on disk. The keys will be all the values that were passed to L for the C parameter. The values are the actual path to the module on disk. (For example, if the key is C, the value is F.) For your extension, the path will start with F. (See the code in the example extension.) If your login type is in the hash as a key, you should set that key to the right path to your module. That module's C method will be called, probably with empty parameters. If your login type is I in the hash, you should not set it. You will be prevented from adding new keys to the hash, so make sure your key is in there before you modify it. (In other words, you can't add in login methods that weren't passed to L.) =back =head2 auth-verify_methods This works just like L except it's for login verification methods (See L.) It also takes a C parameter, just like L. =head2 bug-columns This allows you to add new fields that will show up in every L object. Note that you will also need to use the L hook in conjunction with this hook to make this work. Params: =over =item C - An arrayref containing an array of column names. Push your column name(s) onto the array. =back =head2 bug-end_of_create This happens at the end of L, after all other changes are made to the database. This occurs inside a database transaction. Params: =over =item C - The changed bug object, with all fields set to their updated values. =item C - The timestamp used for all updates in this transaction. =back =head2 bug-end_of_update This happens at the end of L, after all other changes are made to the database. This generally occurs inside a database transaction. Params: =over =item C - The changed bug object, with all fields set to their updated values. =item C - The timestamp used for all updates in this transaction. =item C - The hash of changed fields. C<$changes-E{field} = [old, new]> =back =head2 bug-fields Allows the addition of database fields from the bugs table to the standard list of allowable fields in a L object, so that you can call the field as a method. Note: You should add here the names of any fields you added in L. Params: =over =item C - A arrayref containing an array of column names. Push your column name(s) onto the array. =back =head2 bug-format_comment Allows you to do custom parsing on comments before they are displayed. You do this by returning two regular expressions: one that matches the section you want to replace, and then another that says what you want to replace that match with. The matching and replacement will be run with the C switch on the regex. Params: =over =item C An arrayref of hashrefs. You should push a hashref containing two keys (C and C) in to this array. C is the regular expression that matches the text you want to replace, C is what you want to replace that text with. (This gets passed into a regular expression like C.) Instead of specifying a regular expression for C you can also return a coderef (a reference to a subroutine). If you want to use backreferences (using C<$1>, C<$2>, etc. in your C), you have to use this method--it won't work if you specify C<$1>, C<$2> in a regular expression for C. Your subroutine will get a hashref as its only argument. This hashref contains a single key, C. C is an arrayref that contains C<$1>, C<$2>, C<$3>, etc. in order, up to C<$10>. Your subroutine should return what you want to replace the full C with. (See the code example for this hook if you want to see how this actually all works in code. It's simpler than it sounds.) B Failing to do so could open a security hole in Bugzilla. =item C A B to the exact text that you are parsing. Generally you should not modify this yourself. Instead you should be returning regular expressions using the C array. The text has already been word-wrapped, but has not been parsed in any way otherwise. (So, for example, it is not HTML-escaped. You get "&", not "&".) =item C The L object that this comment is on. Sometimes this is C, meaning that we are parsing text that is not on a bug. =item C A hashref representing the comment you are about to parse, including all of the fields that comments contain when they are returned by by L. Sometimes this is C, meaning that we are parsing text that is not a bug comment (but could still be some other part of a bug, like the summary line). =back =head2 buglist-columns This happens in buglist.cgi after the standard columns have been defined and right before the display column determination. It gives you the opportunity to add additional display columns. Params: =over =item C - A hashref, where the keys are unique string identifiers for the column being defined and the values are hashrefs with the following fields: =over =item C - The name of the column in the database. =item C - The title of the column as displayed to users. =back The definition is structured as: $columns->{$id} = { name => $name, title => $title }; =back =head2 colchange-columns This happens in F<colchange.cgi> right after the list of possible display columns have been defined and gives you the opportunity to add additional display columns to the list of selectable columns. Params: =over =item C<columns> - An arrayref containing an array of column IDs. Any IDs added by this hook must have been defined in the the buglist-columns hook. See L</buglist-columns>. =back =head2 config-add_panels If you want to add new panels to the Parameters administrative interface, this is where you do it. Params: =over =item C<panel_modules> A hashref, where the keys are the "name" of the module and the value is the Perl module containing that config module. For example, if the name is C<Auth>, the value would be C<Bugzilla::Config::Auth>. For your extension, the Perl module name must start with C<extensions::yourextension::lib>. (See the code in the example extension.) =back =head2 config-modify_panels This is how you modify already-existing panels in the Parameters administrative interface. For example, if you wanted to add a new Auth method (modifying Bugzilla::Config::Auth) this is how you'd do it. Params: =over =item C<panels> A hashref, where the keys are lower-case panel "names" (like C<auth>, C<admin>, etc.) and the values are hashrefs. The hashref contains a single key, C<params>. C<params> is an arrayref--the return value from C<get_param_list> for that module. You can modify C<params> and your changes will be reflected in the interface. Adding new keys to C<panels> will have no effect. You should use L</config-add_panels> if you want to add new panels. =back =head2 enter_bug-entrydefaultvars This happens right before the template is loaded on enter_bug.cgi. Params: =over =item C<vars> - A hashref. The variables that will be passed into the template. =back =head2 flag-end_of_update This happens at the end of L<Bugzilla::Flag/update_flags>, after all other changes are made to the database and after emails are sent. It gives you a before/after snapshot of flags so you can react to specific flag changes. This generally occurs inside a database transaction. Note that the interface to this hook is B<UNSTABLE> and it may change in the future. Params: =over =item C<object> - The changed bug or attachment object. =item C<timestamp> - The timestamp used for all updates in this transaction. =item C<old_flags> - The snapshot of flag summaries from before the change. =item C<new_flags> - The snapshot of flag summaries after the change. Call C<my ($removed, $added) = diff_arrays(old_flags, new_flags)> to get the list of changed flags, and search for a specific condition like C<added eq 'review-'>. =back =head2 install-before_final_checks Allows execution of custom code before the final checks are done in checksetup.pl. Params: =over =item C<silent> A flag that indicates whether or not checksetup is running in silent mode. =back =head2 install-requirements Because of the way Bugzilla installation works, there can't be a normal hook during the time that F<checksetup.pl> checks what modules are installed. (C<Bugzilla::Hook> needs to have those modules installed--it's a chicken-and-egg problem.) So instead of the way hooks normally work, this hook just looks for two subroutines (or constants, since all constants are just subroutines) in your file, called C<OPTIONAL_MODULES> and C<REQUIRED_MODULES>, which should return arrayrefs in the same format as C<OPTIONAL_MODULES> and C<REQUIRED_MODULES> in L<Bugzilla::Install::Requirements>. These subroutines will be passed an arrayref that contains the current Bugzilla requirements of the same type, in case you want to modify Bugzilla's requirements somehow. (Probably the most common would be to alter a version number or the "feature" element of C<OPTIONAL_MODULES>.) F<checksetup.pl> will add these requirements to its own. Please remember--if you put something in C<REQUIRED_MODULES>, then F<checksetup.pl> B<cannot complete> unless the user has that module installed! So use C<OPTIONAL_MODULES> whenever you can. =head2 install-update_db This happens at the very end of all the tables being updated during an installation or upgrade. If you need to modify your custom schema, do it here. No params are passed. =head2 db_schema-abstract_schema This allows you to add tables to Bugzilla. Note that we recommend that you prefix the names of your tables with some word, so that they don't conflict with any future Bugzilla tables. If you wish to add new I<columns> to existing Bugzilla tables, do that in L</install-update_db>. Params: =over =item C<schema> - A hashref, in the format of L<Bugzilla::DB::Schema/ABSTRACT_SCHEMA>. Add new hash keys to make new table definitions. F<checksetup.pl> will automatically add these tables to the database when run. =back =head2 mailer-before_send Called right before L<Bugzilla::Mailer> sends a message to the MTA. Params: =over =item C<email> - The C<Email::MIME> object that's about to be sent. =back =head2 page-before_template This is a simple way to add your own pages to Bugzilla. This hooks C<page.cgi>, which loads templates from F<template/en/default/pages>. For example, C<page.cgi?id=fields.html> loads F<template/en/default/pages/fields.html.tmpl>. This hook is called right before the template is loaded, so that you can pass your own variables to your own pages. Params: =over =item C<page_id> This is the name of the page being loaded, like C<fields.html>. Note that if two extensions use the same name, it is uncertain which will override the others, so you should be careful with how you name your pages. =item C<vars> This is a hashref--put variables into here if you want them passed to your template. =back =head2 product-confirm_delete Called before displaying the confirmation message when deleting a product. Params: =over =item C<vars> - The template vars hashref. =back =head2 sanitycheck-check This hook allows for extra sanity checks to be added, for use by F<sanitycheck.cgi>. Params: =over =item C<status> - a CODEREF that allows status messages to be displayed to the user. (F<sanitycheck.cgi>'s C<Status>) =back =head2 sanitycheck-repair This hook allows for extra sanity check repairs to be made, for use by F<sanitycheck.cgi>. Params: =over =item C<status> - a CODEREF that allows status messages to be displayed to the user. (F<sanitycheck.cgi>'s C<Status>) =back =head2 template-before_process This hook allows you to define additional variables that will be available to the template being processed. You probably want to restrict your hook to operating only if a certain file is being loaded (which is why you get a C<file> argument below). Otherwise, modifying the C<vars> argument will affect every single template in Bugzilla. Params: =over =item C<vars> The template vars hashref--these are the values that get passed to the template. Adding new keys to this hashref will cause those new values to also get passed to the template. =item C<file> The name of the template being processed. This is relative to the main template directory for the language (i.e. for F<template/en/default/bug/show.html.tmpl>, this variable will contain C<bug/show.html.tmpl>). =item C<template> The L<Bugzilla::Template> object that C<process> was called on. =back =head2 webservice This hook allows you to add your own modules to the WebService. (See L<Bugzilla::WebService>.) Params: =over =item C<dispatch> A hashref that you can specify the names of your modules and what Perl module handles the functions for that module. (This is actually sent to L<SOAP::Lite/dispatch_with>. You can see how that's used in F<xmlrpc.cgi>.) The Perl module name must start with C<extensions::yourextension::lib::> (replace C<yourextension> with the name of your extension). The C<package> declaration inside that module must also start with C<extensions::yourextension::lib::> in that module's code. Example: $dispatch->{Example} = "extensions::example::lib::Example"; And then you'd have a module F<extensions/example/lib/Example.pm> It's recommended that all the keys you put in C<dispatch> start with the name of your extension, so that you don't conflict with the standard Bugzilla WebService functions (and so that you also don't conflict with other plugins). =back =head2 webservice-error_codes If your webservice extension throws custom errors, you can set numeric codes for those errors here. Extensions should use error codes above 10000, unless they are re-using an already-existing error code. Params: =over =item C<error_map> A hash that maps the names of errors (like C<invalid_param>) to numbers. See L<Bugzilla::WebService::Constants/WS_ERROR_CODE> for an example. =back