#!/usr/bin/perl -wT # -*- Mode: perl; indent-tabs-mode: nil -*- # # The contents of this file are subject to the Mozilla Public # License Version 1.1 (the "License"); you may not use this file # except in compliance with the License. You may obtain a copy of # the License at http://www.mozilla.org/MPL/ # # Software distributed under the License is distributed on an "AS # IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or # implied. See the License for the specific language governing # rights and limitations under the License. # # The Original Code is the Bugzilla Bug Tracking System. # # The Initial Developer of the Original Code is Netscape Communications # Corporation. Portions created by Netscape are # Copyright (C) 1998 Netscape Communications Corporation. All # Rights Reserved. # # Contributor(s): Terry Weissman # Dan Mosedale # Joe Robins # Gervase Markham # Marc Schumann use strict; use lib qw(.); use Bugzilla; use Bugzilla::Attachment; use Bugzilla::Constants; use Bugzilla::Util; use Bugzilla::Error; use Bugzilla::Bug; use Bugzilla::User; use Bugzilla::Field; use Bugzilla::Product; use Bugzilla::Component; use Bugzilla::Keyword; use Bugzilla::Token; use Bugzilla::Flag; my $user = Bugzilla->login(LOGIN_REQUIRED); my $cgi = Bugzilla->cgi; my $dbh = Bugzilla->dbh; my $template = Bugzilla->template; my $vars = {}; ###################################################################### # Main Script ###################################################################### # Detect if the user already used the same form to submit a bug my $token = trim($cgi->param('token')); if ($token) { my ($creator_id, $date, $old_bug_id) = Bugzilla::Token::GetTokenData($token); unless ($creator_id && ($creator_id == $user->id) && ($old_bug_id =~ "^createbug:")) { # The token is invalid. ThrowUserError('token_inexistent'); } $old_bug_id =~ s/^createbug://; if ($old_bug_id && (!$cgi->param('ignore_token') || ($cgi->param('ignore_token') != $old_bug_id))) { $vars->{'bugid'} = $old_bug_id; $vars->{'allow_override'} = defined $cgi->param('ignore_token') ? 0 : 1; print $cgi->header(); $template->process("bug/create/confirm-create-dupe.html.tmpl", $vars) || ThrowTemplateError($template->error()); exit; } } # do a match on the fields if applicable &Bugzilla::User::match_field ($cgi, { 'cc' => { 'type' => 'multi' }, 'assigned_to' => { 'type' => 'single' }, 'qa_contact' => { 'type' => 'single' }, '^requestee_type-(\d+)$' => { 'type' => 'multi' }, }); # The format of the initial comment can be structured by adding fields to the # enter_bug template and then referencing them in the comment template. my $comment; my $format = $template->get_format("bug/create/comment", scalar($cgi->param('format')), "txt"); $template->process($format->{'template'}, $vars, \$comment) || ThrowTemplateError($template->error()); # Check that the product exists and that the user # is allowed to enter bugs into this product. my $product = Bugzilla::Bug->_check_product($cgi->param('product')); # Set cookies if (defined $cgi->param('product')) { if (defined $cgi->param('version')) { $cgi->send_cookie(-name => "VERSION-" . $product->name, -value => $cgi->param('version'), -expires => "Fri, 01-Jan-2038 00:00:00 GMT"); } } if (defined $cgi->param('maketemplate')) { $vars->{'url'} = $cgi->query_string(); $vars->{'short_desc'} = $cgi->param('short_desc'); print $cgi->header(); $template->process("bug/create/make-template.html.tmpl", $vars) || ThrowTemplateError($template->error()); exit; } umask 0; # This has to go somewhere after 'maketemplate' # or it breaks bookmarks with no comments. $comment = Bugzilla::Bug->_check_comment($cgi->param('comment')); # If comment is all whitespace, it'll be null at this point. That's # OK except for the fact that it causes e-mail to be suppressed. $comment = $comment ? $comment : " "; my @keyword_ids = @{Bugzilla::Bug->_check_keywords($cgi->param('keywords'))}; my ($depends_on_ids, $blocks_ids) = Bugzilla::Bug->_check_dependencies( scalar $cgi->param('dependson'), scalar $cgi->param('blocked')); # get current time my $timestamp = $dbh->selectrow_array(q{SELECT NOW()}); # Group Validation my @selected_groups; foreach my $group (grep(/^bit-\d+$/, $cgi->param())) { $group =~ /^bit-(\d+)$/; push(@selected_groups, $1); } # Include custom fields editable on bug creation. my @custom_bug_fields = Bugzilla->get_fields( { custom => 1, obsolete => 0, enter_bug => 1 }); my @bug_fields = map { $_->name } @custom_bug_fields; # Custom tables must be locked (required when validating custom fields). my @custom_tables = grep { $_->type == FIELD_TYPE_SINGLE_SELECT } @custom_bug_fields; @custom_tables = map { $_->name . ' READ' } @custom_tables; push(@bug_fields, qw( product component assigned_to qa_contact alias bug_file_loc bug_severity bug_status short_desc op_sys priority rep_platform version target_milestone status_whiteboard estimated_time deadline )); my %bug_params; foreach my $field (@bug_fields) { $bug_params{$field} = $cgi->param($field); } $bug_params{'creation_ts'} = $timestamp; $bug_params{'cc'} = [$cgi->param('cc')]; $bug_params{'groups'} = \@selected_groups; # Add the bug report to the DB. $dbh->bz_lock_tables('bugs WRITE', 'bug_group_map WRITE', 'longdescs WRITE', 'cc WRITE', 'keywords WRITE', 'dependencies WRITE', 'bugs_activity WRITE', 'groups READ', 'user_group_map READ', 'group_group_map READ', 'keyworddefs READ', 'fielddefs READ', 'products READ', 'versions READ', 'milestones READ', 'components READ', 'profiles READ', 'bug_severity READ', 'op_sys READ', 'priority READ', 'rep_platform READ', 'group_control_map READ', @custom_tables); my $bug = Bugzilla::Bug->create(\%bug_params); # Get the bug ID back. my $id = $bug->bug_id; # Add the initial comment, allowing for the fact that it may be private my $privacy = 0; if (Bugzilla->params->{"insidergroup"} && Bugzilla->user->in_group(Bugzilla->params->{"insidergroup"})) { $privacy = $cgi->param('commentprivacy') ? 1 : 0; } trick_taint($comment); $dbh->do(q{INSERT INTO longdescs (bug_id, who, bug_when, thetext,isprivate) VALUES (?, ?, ?, ?, ?)}, undef, ($id, $user->id, $timestamp, $comment, $privacy)); my @all_deps; my $sth_addkeyword = $dbh->prepare(q{ INSERT INTO keywords (bug_id, keywordid) VALUES (?, ?)}); if (Bugzilla->user->in_group("editbugs")) { foreach my $keyword (@keyword_ids) { $sth_addkeyword->execute($id, $keyword); } if (@keyword_ids) { # Make sure that we have the correct case for the kw my $kw_ids = join(', ', @keyword_ids); my $list = $dbh->selectcol_arrayref(qq{ SELECT name FROM keyworddefs WHERE id IN ($kw_ids) ORDER BY name}); my $kw_list = join(', ', @$list); $dbh->do(q{UPDATE bugs SET delta_ts = ?, keywords = ? WHERE bug_id = ?}, undef, ($timestamp, $kw_list, $id)); } if ($cgi->param('dependson') || $cgi->param('blocked')) { my %deps = (dependson => $depends_on_ids, blocked => $blocks_ids); foreach my $pair (["blocked", "dependson"], ["dependson", "blocked"]) { my ($me, $target) = @{$pair}; my $sth_dep = $dbh->prepare(qq{ INSERT INTO dependencies ($me, $target) VALUES (?, ?)}); foreach my $i (@{$deps{$target}}) { $sth_dep->execute($id, $i); push(@all_deps, $i); # list for mailing dependent bugs # Log the activity for the other bug: LogActivityEntry($i, $me, "", $id, $user->id, $timestamp); } } } } # All fields related to the newly created bug are set. # The bug can now be made accessible. $dbh->do("UPDATE bugs SET creation_ts = ? WHERE bug_id = ?", undef, ($timestamp, $id)); $dbh->bz_unlock_tables(); # We don't have to check if the user can see the bug, because a user filing # a bug can always see it. You can't change reporter_accessible until # after the bug is filed. # Add an attachment if requested. if (defined($cgi->upload('data')) || $cgi->param('attachurl')) { $cgi->param('isprivate', $cgi->param('commentprivacy')); Bugzilla::Attachment->insert_attachment_for_bug(!THROW_ERROR, $bug, $user, $timestamp, \$vars) || ($vars->{'message'} = 'attachment_creation_failed'); # Determine if Patch Viewer is installed, for Diff link eval { require PatchReader; $vars->{'patchviewerinstalled'} = 1; }; } # Add flags, if any. To avoid dying if something goes wrong # while processing flags, we will eval() flag validation. # This requires errors to die(). # XXX: this can go away as soon as flag validation is able to # fail without dying. my $error_mode_cache = Bugzilla->error_mode; Bugzilla->error_mode(ERROR_MODE_DIE); eval { Bugzilla::Flag::validate($cgi, $id); Bugzilla::Flag::process($bug, undef, $timestamp, $cgi); }; Bugzilla->error_mode($error_mode_cache); if ($@) { $vars->{'message'} = 'flag_creation_failed'; $vars->{'flag_creation_error'} = $@; } # Email everyone the details of the new bug $vars->{'mailrecipients'} = {'changer' => $user->login}; $vars->{'id'} = $id; $vars->{'bug'} = $bug; ThrowCodeError("bug_error", { bug => $bug }) if $bug->error; $vars->{'sentmail'} = []; push (@{$vars->{'sentmail'}}, { type => 'created', id => $id, }); foreach my $i (@all_deps) { push (@{$vars->{'sentmail'}}, { type => 'dep', id => $i, }); } my @bug_list; if ($cgi->cookie("BUGLIST")) { @bug_list = split(/:/, $cgi->cookie("BUGLIST")); } $vars->{'bug_list'} = \@bug_list; $vars->{'use_keywords'} = 1 if Bugzilla::Keyword::keyword_count(); if ($token) { trick_taint($token); $dbh->do('UPDATE tokens SET eventdata = ? WHERE token = ?', undef, ("createbug:$id", $token)); } print $cgi->header(); $template->process("bug/create/created.html.tmpl", $vars) || ThrowTemplateError($template->error());