userprefs.cgi 19.8 KB
Newer Older
1
#!/usr/bin/perl -wT
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
# -*- Mode: perl; indent-tabs-mode: nil -*-
#
# The contents of this file are subject to the Mozilla Public
# License Version 1.1 (the "License"); you may not use this file
# except in compliance with the License. You may obtain a copy of
# the License at http://www.mozilla.org/MPL/
#
# Software distributed under the License is distributed on an "AS
# IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or
# implied. See the License for the specific language governing
# rights and limitations under the License.
#
# The Original Code is the Bugzilla Bug Tracking System.
#
# Contributor(s): Terry Weissman <terry@mozilla.org>
17
#                 Dan Mosedale <dmose@mozilla.org>
18
#                 Alan Raetz <al_raetz@yahoo.com>
19
#                 David Miller <justdave@syndicomm.com>
20
#                 Christopher Aillon <christopher@aillon.com>
21
#                 Gervase Markham <gerv@gerv.net>
22
#                 Vlad Dascalu <jocuri@softhome.net>
23
#                 Shane H. W. Travis <travis@sedsystems.ca>
24 25 26

use strict;

27 28
use lib qw(.);

29
use Bugzilla;
30
use Bugzilla::Constants;
31
use Bugzilla::Search;
32
use Bugzilla::Util;
33
use Bugzilla::Error;
34
use Bugzilla::User;
35

36
my $template = Bugzilla->template;
37
local our $vars = {};
38

39 40 41
###############################################################################
# Each panel has two functions - panel Foo has a DoFoo, to get the data 
# necessary for displaying the panel, and a SaveFoo, to save the panel's 
42
# contents from the form data (if appropriate). 
43 44 45
# SaveFoo may be called before DoFoo.    
###############################################################################
sub DoAccount {
46
    my $dbh = Bugzilla->dbh;
47 48
    my $user = Bugzilla->user;

49
    ($vars->{'realname'}) = $dbh->selectrow_array(
50
        "SELECT realname FROM profiles WHERE userid = ?", undef, $user->id);
51

52
    if(Bugzilla->params->{'allowemailchange'} 
53
       && Bugzilla->user->authorizer->can_change_email) {
54 55
        my @token = $dbh->selectrow_array(
            "SELECT tokentype, issuedate + " .
56
                    $dbh->sql_interval(MAX_TOKEN_AGE, 'DAY') . ", eventdata
57 58 59
               FROM tokens
              WHERE userid = ?
                AND tokentype LIKE 'email%'
60
           ORDER BY tokentype ASC " . $dbh->sql_limit(1), undef, $user->id);
61 62
        if (scalar(@token) > 0) {
            my ($tokentype, $change_date, $eventdata) = @token;
63 64 65 66 67 68 69 70
            $vars->{'login_change_date'} = $change_date;

            if($tokentype eq 'emailnew') {
                my ($oldemail,$newemail) = split(/:/,$eventdata);
                $vars->{'new_login_name'} = $newemail;
            }
        }
    }
71 72 73
}

sub SaveAccount {
74
    my $cgi = Bugzilla->cgi;
75
    my $dbh = Bugzilla->dbh;
76
    my $user = Bugzilla->user;
77

78 79 80 81
    my $pwd1 = $cgi->param('new_password1');
    my $pwd2 = $cgi->param('new_password2');

    if ($cgi->param('Bugzilla_password') ne "" || 
82
        $pwd1 ne "" || $pwd2 ne "") 
83
    {
84 85
        my ($oldcryptedpwd) = $dbh->selectrow_array(
                        q{SELECT cryptpassword FROM profiles WHERE userid = ?},
86
                        undef, $user->id);
87 88
        $oldcryptedpwd || ThrowCodeError("unable_to_retrieve_password");

89
        if (crypt(scalar($cgi->param('Bugzilla_password')), $oldcryptedpwd) ne 
90 91
                  $oldcryptedpwd) 
        {
92
            ThrowUserError("old_password_incorrect");
93
        }
94 95 96

        if ($pwd1 ne "" || $pwd2 ne "")
        {
97 98
            $cgi->param('new_password1')
              || ThrowUserError("new_password_missing");
99
            validate_password($pwd1, $pwd2);
100 101 102 103 104 105 106 107 108 109 110

            if ($cgi->param('Bugzilla_password') ne $pwd1) {
                my $cryptedpassword = bz_crypt($pwd1);
                $dbh->do(q{UPDATE profiles
                              SET cryptpassword = ?
                            WHERE userid = ?},
                         undef, ($cryptedpassword, $user->id));

                # Invalidate all logins except for the current one
                Bugzilla->logout(LOGOUT_KEEP_CURRENT);
            }
111
        }
112 113
    }

114
    if(Bugzilla->params->{"allowemailchange"} && $cgi->param('new_login_name')) {
115 116
        my $old_login_name = $cgi->param('Bugzilla_login');
        my $new_login_name = trim($cgi->param('new_login_name'));
117 118

        if($old_login_name ne $new_login_name) {
119
            $cgi->param('Bugzilla_password') 
120
              || ThrowUserError("old_password_required");
121

122
            use Bugzilla::Token;
123
            # Block multiple email changes for the same user.
124
            if (Bugzilla::Token::HasEmailChangeToken($user->id)) {
125
                ThrowUserError("email_change_in_progress");
126 127 128
            }

            # Before changing an email address, confirm one does not exist.
129 130
            validate_email_syntax($new_login_name)
              || ThrowUserError('illegal_email_address', {addr => $new_login_name});
131
            is_available_username($new_login_name)
132
              || ThrowUserError("account_exists", {email => $new_login_name});
133

134 135
            Bugzilla::Token::IssueEmailChangeToken($user->id, $old_login_name,
                                                   $new_login_name);
136

137
            $vars->{'email_changes_saved'} = 1;
138 139
        }
    }
140

141 142 143
    my $realname = trim($cgi->param('realname'));
    trick_taint($realname); # Only used in a placeholder
    $dbh->do("UPDATE profiles SET realname = ? WHERE userid = ?",
144
             undef, ($realname, $user->id));
145 146 147
}


148
sub DoSettings {
149 150 151
    my $user = Bugzilla->user;

    my $settings = $user->settings;
152
    $vars->{'settings'} = $settings;
153

154
    my @setting_list = keys %$settings;
155
    $vars->{'setting_names'} = \@setting_list;
156 157 158 159 160 161 162 163 164 165

    $vars->{'has_settings_enabled'} = 0;
    # Is there at least one user setting enabled?
    foreach my $setting_name (@setting_list) {
        if ($settings->{"$setting_name"}->{'is_enabled'}) {
            $vars->{'has_settings_enabled'} = 1;
            last;
        }
    }
    $vars->{'dont_show_button'} = !$vars->{'has_settings_enabled'};
166 167 168 169
}

sub SaveSettings {
    my $cgi = Bugzilla->cgi;
170
    my $user = Bugzilla->user;
171

172 173
    my $settings = $user->settings;
    my @setting_list = keys %$settings;
174 175 176 177

    foreach my $name (@setting_list) {
        next if ! ($settings->{$name}->{'is_enabled'});
        my $value = $cgi->param($name);
178
        my $setting = new Bugzilla::User::Setting($name);
179 180 181

        if ($value eq "${name}-isdefault" ) {
            if (! $settings->{$name}->{'is_default'}) {
182
                $settings->{$name}->reset_to_default;
183 184 185
            }
        }
        else {
186 187
            $setting->validate_value($value);
            $settings->{$name}->set($value);
188 189
        }
    }
190
    $vars->{'settings'} = $user->settings(1);
191 192
}

193
sub DoEmail {
194
    my $dbh = Bugzilla->dbh;
195
    my $user = Bugzilla->user;
196 197 198 199
    
    ###########################################################################
    # User watching
    ###########################################################################
200
    if (Bugzilla->params->{"supportwatchers"}) {
201
        my $watched_ref = $dbh->selectcol_arrayref(
202 203
            "SELECT profiles.login_name FROM watch INNER JOIN profiles" .
            " ON watch.watched = profiles.userid" .
204 205
            " WHERE watcher = ?" .
            " ORDER BY profiles.login_name",
206
            undef, $user->id);
207
        $vars->{'watchedusers'} = $watched_ref;
208 209 210

        my $watcher_ids = $dbh->selectcol_arrayref(
            "SELECT watcher FROM watch WHERE watched = ?",
211
            undef, $user->id);
212 213 214 215 216 217 218 219 220

        my @watchers;
        foreach my $watcher_id (@$watcher_ids) {
            my $watcher = new Bugzilla::User($watcher_id);
            push (@watchers, Bugzilla::User::identity($watcher));
        }

        @watchers = sort { lc($a) cmp lc($b) } @watchers;
        $vars->{'watchers'} = \@watchers;
221
    }
222

223 224 225
    ###########################################################################
    # Role-based preferences
    ###########################################################################
226 227 228 229
    my $sth = $dbh->prepare("SELECT relationship, event " . 
                            "FROM email_setting " . 
                            "WHERE user_id = ?");
    $sth->execute($user->id);
230 231 232 233 234

    my %mail;
    while (my ($relationship, $event) = $sth->fetchrow_array()) {
        $mail{$relationship}{$event} = 1;
    }
235

236 237
    $vars->{'mail'} = \%mail;      
}
238

239 240 241
sub SaveEmail {
    my $dbh = Bugzilla->dbh;
    my $cgi = Bugzilla->cgi;
242
    my $user = Bugzilla->user;
243
    
244 245 246 247 248 249
    ###########################################################################
    # Role-based preferences
    ###########################################################################
    $dbh->bz_lock_tables("email_setting WRITE");

    # Delete all the user's current preferences
250
    $dbh->do("DELETE FROM email_setting WHERE user_id = ?", undef, $user->id);
251 252 253 254 255 256 257 258

    # Repopulate the table - first, with normal events in the 
    # relationship/event matrix.
    # Note: the database holds only "off" email preferences, as can be implied 
    # from the name of the table - profiles_nomail.
    foreach my $rel (RELATIONSHIPS) {
        # Positive events: a ticked box means "send me mail."
        foreach my $event (POS_EVENTS) {
259 260 261
            if (defined($cgi->param("email-$rel-$event"))
                && $cgi->param("email-$rel-$event") == 1)
            {
262 263
                $dbh->do("INSERT INTO email_setting " . 
                         "(user_id, relationship, event) " . 
264 265
                         "VALUES (?, ?, ?)",
                         undef, ($user->id, $rel, $event));
266
            }
267 268 269 270 271 272 273 274 275
        }
        
        # Negative events: a ticked box means "don't send me mail."
        foreach my $event (NEG_EVENTS) {
            if (!defined($cgi->param("neg-email-$rel-$event")) ||
                $cgi->param("neg-email-$rel-$event") != 1) 
            {
                $dbh->do("INSERT INTO email_setting " . 
                         "(user_id, relationship, event) " . 
276 277
                         "VALUES (?, ?, ?)",
                         undef, ($user->id, $rel, $event));
278
            }
279
        }
280
    }
281

282 283
    # Global positive events: a ticked box means "send me mail."
    foreach my $event (GLOBAL_EVENTS) {
284 285 286
        if (defined($cgi->param("email-" . REL_ANY . "-$event"))
            && $cgi->param("email-" . REL_ANY . "-$event") == 1)
        {
287 288
            $dbh->do("INSERT INTO email_setting " . 
                     "(user_id, relationship, event) " . 
289 290
                     "VALUES (?, ?, ?)",
                     undef, ($user->id, REL_ANY, $event));
291
        }
292
    }
293

294 295 296 297 298
    $dbh->bz_unlock_tables();

    ###########################################################################
    # User watching
    ###########################################################################
299
    if (Bugzilla->params->{"supportwatchers"} 
300 301
        && (defined $cgi->param('new_watchedusers')
            || defined $cgi->param('remove_watched_users'))) 
302
    {
303 304 305 306
        # Just in case.  Note that this much locking is actually overkill:
        # we don't really care if anyone reads the watch table.  So 
        # some small amount of contention could be gotten rid of by
        # using user-defined locks rather than table locking.
307
        $dbh->bz_lock_tables('watch WRITE', 'profiles READ');
308

309
        # Use this to protect error messages on duplicate submissions
310 311
        my $old_watch_ids =
            $dbh->selectcol_arrayref("SELECT watched FROM watch"
312
                                   . " WHERE watcher = ?", undef, $user->id);
313 314 315

        # The new information given to us by the user.
        my @new_watch_names = split(/[,\s]+/, $cgi->param('new_watchedusers'));
316
        my %new_watch_ids;
317

318
        foreach my $username (@new_watch_names) {
319
            my $watched_userid = login_to_id(trim($username), THROW_ERROR);
320
            $new_watch_ids{$watched_userid} = 1;
321 322 323 324 325
        }

        # Add people who were added.
        my $insert_sth = $dbh->prepare('INSERT INTO watch (watched, watcher)'
                                     . ' VALUES (?, ?)');
326 327
        foreach my $add_me (keys(%new_watch_ids)) {
            next if grep($_ == $add_me, @$old_watch_ids);
328
            $insert_sth->execute($add_me, $user->id);
329
        }
330

331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346
        if (defined $cgi->param('remove_watched_users')) {
            my @removed = $cgi->param('watched_by_you');
            # Remove people who were removed.
            my $delete_sth = $dbh->prepare('DELETE FROM watch WHERE watched = ?'
                                         . ' AND watcher = ?');
            
            my %remove_watch_ids;
            foreach my $username (@removed) {
                my $watched_userid = login_to_id(trim($username), THROW_ERROR);
                $remove_watch_ids{$watched_userid} = 1;
            }
            foreach my $remove_me (keys(%remove_watch_ids)) {
                $delete_sth->execute($remove_me, $user->id);
            }
        }

347
        $dbh->bz_unlock_tables();
348
    }
349 350 351
}


352
sub DoPermissions {
353
    my $dbh = Bugzilla->dbh;
354
    my $user = Bugzilla->user;
355 356
    my (@has_bits, @set_bits);
    
357 358
    my $groups = $dbh->selectall_arrayref(
               "SELECT DISTINCT name, description FROM groups WHERE id IN (" . 
359
               $user->groups_as_string . ") ORDER BY name");
360 361
    foreach my $group (@$groups) {
        my ($nam, $desc) = @$group;
362
        push(@has_bits, {"desc" => $desc, "name" => $nam});
363
    }
364 365 366
    $groups = $dbh->selectall_arrayref('SELECT DISTINCT id, name, description
                                          FROM groups
                                         ORDER BY name');
367
    foreach my $group (@$groups) {
368 369
        my ($group_id, $nam, $desc) = @$group;
        if ($user->can_bless($group_id)) {
370
            push(@set_bits, {"desc" => $desc, "name" => $nam});
371 372
        }
    }
373 374 375 376 377 378 379

    # If the user has product specific privileges, inform him about that.
    foreach my $privs (PER_PRODUCT_PRIVILEGES) {
        next if $user->in_group($privs);
        $vars->{"local_$privs"} = $user->get_products_by_permission($privs);
    }

380 381
    $vars->{'has_bits'} = \@has_bits;
    $vars->{'set_bits'} = \@set_bits;    
382
}
383

384
# No SavePermissions() because this panel has no changeable fields.
385

386

387
sub DoSavedSearches {
388
    my $dbh = Bugzilla->dbh;
389 390
    my $user = Bugzilla->user;

391
    if ($user->queryshare_groups_as_string) {
392 393
        $vars->{'queryshare_groups'} =
            Bugzilla::Group->new_from_list($user->queryshare_groups);
394
    }
395 396
}

397
sub SaveSavedSearches {
398 399
    my $cgi = Bugzilla->cgi;
    my $dbh = Bugzilla->dbh;
400 401
    my $user = Bugzilla->user;

402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418
    # We'll need this in a loop, so do the call once.
    my $user_id = $user->id;

    my $sth_insert_nl = $dbh->prepare('INSERT INTO namedqueries_link_in_footer
                                       (namedquery_id, user_id)
                                       VALUES (?, ?)');
    my $sth_delete_nl = $dbh->prepare('DELETE FROM namedqueries_link_in_footer
                                             WHERE namedquery_id = ?
                                               AND user_id = ?');
    my $sth_insert_ngm = $dbh->prepare('INSERT INTO namedquery_group_map
                                        (namedquery_id, group_id)
                                        VALUES (?, ?)');
    my $sth_update_ngm = $dbh->prepare('UPDATE namedquery_group_map
                                           SET group_id = ?
                                         WHERE namedquery_id = ?');
    my $sth_delete_ngm = $dbh->prepare('DELETE FROM namedquery_group_map
                                              WHERE namedquery_id = ?');
419 420 421 422 423

    # Update namedqueries_link_in_footer for this user.
    foreach my $q (@{$user->queries}, @{$user->queries_available}) {
        if (defined $cgi->param("link_in_footer_" . $q->id)) {
            $sth_insert_nl->execute($q->id, $user_id) if !$q->link_in_footer;
424 425
        }
        else {
426
            $sth_delete_nl->execute($q->id, $user_id) if $q->link_in_footer;
427
        }
428
    }
429

430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447
    # For user's own queries, update namedquery_group_map.
    foreach my $q (@{$user->queries}) {
        my $group_id;

        if ($user->in_group(Bugzilla->params->{'querysharegroup'})) {
            $group_id = $cgi->param("share_" . $q->id) || '';
        }

        if ($group_id) {
            # Don't allow the user to share queries with groups he's not
            # allowed to.
            next unless grep($_ eq $group_id, @{$user->queryshare_groups});

            # $group_id is now definitely a valid ID of a group the
            # user can share queries with, so we can trick_taint.
            detaint_natural($group_id);
            if ($q->shared_with_group) {
                $sth_update_ngm->execute($group_id, $q->id);
448 449
            }
            else {
450 451
                $sth_insert_ngm->execute($q->id, $group_id);
            }
452

453 454 455 456 457 458 459 460 461 462 463 464
            # If we're sharing our query with a group we can bless, we 
            # subscribe direct group members to our search automatically.
            # Otherwise, the group members need to opt in. This behaviour 
            # is deemed most likely to fit users' needs.
            if ($user->can_bless($group_id)) {
                my $group = new Bugzilla::Group($group_id);
                my $members = $group->members_non_inherited;
                foreach my $member (@$members) {
                    next if $member->id == $user->id;
                    $sth_insert_nl->execute($q->id, $member->id)
                        if !$q->link_in_footer($member);
                }
465 466
            }
        }
467 468 469 470 471 472 473 474 475 476 477
        else {
            # They have unshared that query.
            if ($q->shared_with_group) {
                $sth_delete_ngm->execute($q->id);
            }

            # Don't remove namedqueries_link_in_footer entries for users
            # subscribing to the shared query. The idea is that they will
            # probably want to be subscribers again should the sharing
            # user choose to share the query again.
        }
478 479
    }

480
    $user->flush_queries_cache;
481
    
482
    # Update profiles.mybugslink.
483
    my $showmybugslink = defined($cgi->param("showmybugslink")) ? 1 : 0;
484 485 486
    $dbh->do("UPDATE profiles SET mybugslink = ? WHERE userid = ?",
             undef, ($showmybugslink, $user->id));    
    $user->{'showmybugslink'} = $showmybugslink;
487
}
488 489


490 491 492
###############################################################################
# Live code (not subroutine definitions) starts here
###############################################################################
493

494 495 496
my $cgi = Bugzilla->cgi;

# This script needs direct access to the username and password CGI variables,
497 498
# so we save them before their removal in Bugzilla->login, and delete them 
# prior to login if we might possibly be in an sudo session.
499 500
my $bugzilla_login    = $cgi->param('Bugzilla_login');
my $bugzilla_password = $cgi->param('Bugzilla_password');
501
$cgi->delete('Bugzilla_login', 'Bugzilla_password') if ($cgi->cookie('sudo'));
502

503
Bugzilla->login(LOGIN_REQUIRED);
504 505
$cgi->param('Bugzilla_login', $bugzilla_login);
$cgi->param('Bugzilla_password', $bugzilla_password);
506

507
$vars->{'changes_saved'} = $cgi->param('dosave');
508

509
my $current_tab_name = $cgi->param('tab') || "settings";
510

511 512 513
# The SWITCH below makes sure that this is valid
trick_taint($current_tab_name);

514
$vars->{'current_tab_name'} = $current_tab_name;
515

516 517 518
# Do any saving, and then display the current tab.
SWITCH: for ($current_tab_name) {
    /^account$/ && do {
519
        SaveAccount() if $cgi->param('dosave');
520 521 522
        DoAccount();
        last SWITCH;
    };
523 524 525 526 527
    /^settings$/ && do {
        SaveSettings() if $cgi->param('dosave');
        DoSettings();
        last SWITCH;
    };
528
    /^email$/ && do {
529
        SaveEmail() if $cgi->param('dosave');
530 531 532 533 534 535 536
        DoEmail();
        last SWITCH;
    };
    /^permissions$/ && do {
        DoPermissions();
        last SWITCH;
    };
537
    /^saved-searches$/ && do {
538
        SaveSavedSearches() if $cgi->param('dosave');
539 540 541
        DoSavedSearches();
        last SWITCH;
    };
542 543
    ThrowUserError("unknown_tab",
                   { current_tab_name => $current_tab_name });
544 545
}

546
# Generate and return the UI (HTML page) from the appropriate template.
547
print $cgi->header();
548 549
$template->process("account/prefs/prefs.html.tmpl", $vars)
  || ThrowTemplateError($template->error());