process_bug.cgi 70.4 KB
Newer Older
1
#!/usr/bin/perl -wT
2
# -*- Mode: perl; indent-tabs-mode: nil -*-
terry%netscape.com's avatar
terry%netscape.com committed
3
#
4 5 6 7 8 9 10 11 12 13
# The contents of this file are subject to the Mozilla Public
# License Version 1.1 (the "License"); you may not use this file
# except in compliance with the License. You may obtain a copy of
# the License at http://www.mozilla.org/MPL/
#
# Software distributed under the License is distributed on an "AS
# IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or
# implied. See the License for the specific language governing
# rights and limitations under the License.
#
terry%netscape.com's avatar
terry%netscape.com committed
14
# The Original Code is the Bugzilla Bug Tracking System.
15
#
terry%netscape.com's avatar
terry%netscape.com committed
16
# The Initial Developer of the Original Code is Netscape Communications
17 18 19 20
# Corporation. Portions created by Netscape are
# Copyright (C) 1998 Netscape Communications Corporation. All
# Rights Reserved.
#
terry%netscape.com's avatar
terry%netscape.com committed
21
# Contributor(s): Terry Weissman <terry@mozilla.org>
22
#                 Dan Mosedale <dmose@mozilla.org>
23
#                 Dave Miller <justdave@syndicomm.com>
24
#                 Christopher Aillon <christopher@aillon.com>
25
#                 Myk Melez <myk@mozilla.org>
26
#                 Jeff Hedlund <jeff.hedlund@matrixsi.com>
27
#                 Frédéric Buclin <LpSolit@gmail.com>
terry%netscape.com's avatar
terry%netscape.com committed
28

29 30
use strict;

31 32
my $UserInEditGroupSet = -1;
my $UserInCanConfirmGroupSet = -1;
33
my $PrivilegesRequired = 0;
34

35 36
use lib qw(.);

37
use Bugzilla;
38
use Bugzilla::Constants;
39
require "CGI.pl";
40

41
use Bugzilla::Bug;
42
use Bugzilla::User;
43
use Bugzilla::Util;
44

45 46 47
# Use the Flag module to modify flag data if the user set flags.
use Bugzilla::Flag;

48 49
# Shut up misguided -w warnings about "used only once":

50 51 52 53 54 55 56 57
use vars qw(%versions
          %components
          %legal_opsys
          %legal_platform
          %legal_priority
          %settable_resolution
          %target_milestone
          %legal_severity
58
           );
59

60
my $user = Bugzilla->login(LOGIN_REQUIRED);
61
my $whoid = $user->id;
62

63
my $cgi = Bugzilla->cgi;
64
my $dbh = Bugzilla->dbh;
65

66 67
my $requiremilestone = 0;

68 69
use vars qw($template $vars);

70 71 72 73 74 75 76 77
######################################################################
# Begin Data/Security Validation
######################################################################

# Create a list of IDs of all bugs being modified in this request.
# This list will either consist of a single bug number from the "id"
# form/URL field or a series of numbers from multiple form/URL fields
# named "id_x" where "x" is the bug number.
78 79
# For each bug being modified, make sure its ID is a valid bug number 
# representing an existing bug that the user is authorized to access.
80 81
my @idlist;
if (defined $::FORM{'id'}) {
82
    ValidateBugID($::FORM{'id'});
83
    push @idlist, $::FORM{'id'};
84
} else {
85 86
    foreach my $i (keys %::FORM) {
        if ($i =~ /^id_([1-9][0-9]*)/) {
87 88 89
            my $id = $1;
            ValidateBugID($id);
            push @idlist, $id;
90
        }
91 92 93
    }
}

94
# Make sure there are bugs to process.
95
scalar(@idlist) || ThrowUserError("no_bugs_chosen");
96

97 98
$::FORM{'dontchange'} = '' unless exists $::FORM{'dontchange'};

99 100 101 102 103 104 105 106 107 108
# Validate all timetracking fields
foreach my $field ("estimated_time", "work_time", "remaining_time") {
    if (defined $::FORM{$field}) {
        my $er_time = trim($::FORM{$field});
        if ($er_time ne $::FORM{'dontchange'}) {
            Bugzilla::Bug::ValidateTime($er_time, $field);
        }
    }
}

109 110 111
if (UserInGroup(Param('timetrackinggroup'))) {
    my $wk_time = $::FORM{'work_time'};
    if ($::FORM{'comment'} =~ /^\s*$/ && $wk_time && $wk_time != 0) {
112
        ThrowUserError('comment_required');
113
    }
114 115
}

116 117
ValidateComment($::FORM{'comment'});

118 119 120 121 122 123 124 125 126 127 128
# If the bug(s) being modified have dependencies, validate them
# and rebuild the list with the validated values.  This is important
# because there are situations where validation changes the value
# instead of throwing an error, f.e. when one or more of the values
# is a bug alias that gets converted to its corresponding bug ID
# during validation.
foreach my $field ("dependson", "blocked") {
    if (defined($::FORM{$field}) && $::FORM{$field} ne "") {
        my @validvalues;
        foreach my $id (split(/[\s,]+/, $::FORM{$field})) {
            next unless $id;
129
            ValidateBugID($id, $field);
130 131 132 133 134 135
            push(@validvalues, $id);
        }
        $::FORM{$field} = join(",", @validvalues);
    }
}

136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154
# do a match on the fields if applicable

# The order of these function calls is important, as both Flag::validate
# and FlagType::validate assume User::match_field has ensured that the values
# in the requestee fields are legitimate user email addresses.
&Bugzilla::User::match_field({
    'qa_contact'                => { 'type' => 'single' },
    'newcc'                     => { 'type' => 'multi'  },
    'masscc'                    => { 'type' => 'multi'  },
    'assigned_to'               => { 'type' => 'single' },
    '^requestee(_type)?-(\d+)$' => { 'type' => 'single' },
});
# Validate flags, but only if the user is changing a single bug,
# since the multi-change form doesn't include flag changes.
if (defined $::FORM{'id'}) {
    Bugzilla::Flag::validate(\%::FORM, $::FORM{'id'});
    Bugzilla::FlagType::validate(\%::FORM, $::FORM{'id'});
}

155 156 157 158
######################################################################
# End Data/Security Validation
######################################################################

159
print $cgi->header();
160
$vars->{'title_tag'} = "bug_processed";
161 162 163 164 165 166 167 168 169 170 171

# Set the title if we can see a mid-air coming. This test may have false
# negatives, but never false positives, and should catch the majority of cases.
# It only works at all in the single bug case.
if (defined($::FORM{'id'})) {
    SendSQL("SELECT delta_ts FROM bugs WHERE bug_id = $::FORM{'id'}");
    my $delta_ts = FetchOneColumn();
    
    if (defined $::FORM{'delta_ts'} && $delta_ts && 
        $::FORM{'delta_ts'} ne $delta_ts) 
    {
172
        $vars->{'title_tag'} = "mid_air";
173 174
    }
}
175

176 177
# Set up the vars for nagiavtional <link> elements
my $next_bug;
178 179
if ($cgi->cookie("BUGLIST") && $::FORM{'id'}) {
    my @bug_list = split(/:/, $cgi->cookie("BUGLIST"));
180 181 182 183 184 185 186 187 188 189 190 191 192
    $vars->{'bug_list'} = \@bug_list;
    my $cur = lsearch(\@bug_list, $::FORM{"id"});
    if ($cur >= 0 && $cur < $#bug_list) {
        $next_bug = $bug_list[$cur + 1];

        # Note that we only bother with the bug_id here, and get
        # the full bug object at the end, before showing the edit
        # page. If you change this, remember that we have not
        # done the security checks on the next bug yet
        $vars->{'bug'} = { bug_id => $next_bug };
    }
}

193 194
GetVersionTable();

195 196 197
CheckFormFieldDefined(\%::FORM, 'product');
CheckFormFieldDefined(\%::FORM, 'version');
CheckFormFieldDefined(\%::FORM, 'component');
198

199

200 201
# This function checks if there is a comment required for a specific
# function and tests, if the comment was given.
202
# If comments are required for functions is defined by params.
203 204 205 206 207 208 209 210 211 212 213 214 215
#
sub CheckonComment( $ ) {
    my ($function) = (@_);
    
    # Param is 1 if comment should be added !
    my $ret = Param( "commenton" . $function );

    # Allow without comment in case of undefined Params.
    $ret = 0 unless ( defined( $ret ));

    if( $ret ) {
        if (!defined $::FORM{'comment'} || $::FORM{'comment'} =~ /^\s*$/) {
            # No comment - sorry, action not allowed !
216
            ThrowUserError("comment_required");
217 218 219 220 221 222 223
        } else {
            $ret = 0;
        }
    }
    return( ! $ret ); # Return val has to be inverted
}

224 225 226 227 228 229
# Figure out whether or not the user is trying to change the product
# (either the "product" variable is not set to "don't change" or the
# user is changing a single bug and has changed the bug's product),
# and make the user verify the version, component, target milestone,
# and bug groups if so.
if ( $::FORM{'id'} ) {
230 231
    SendSQL("SELECT name FROM products, bugs " .
            "WHERE products.id = bugs.product_id AND bug_id = $::FORM{'id'}");
232 233
    $::oldproduct = FetchSQLData();
}
234
if ((($::FORM{'id'} && $::FORM{'product'} ne $::oldproduct) 
235
     || (!$::FORM{'id'} && $::FORM{'product'} ne $::FORM{'dontchange'}))
236 237
    && CheckonComment( "reassignbycomponent" ))
{
238 239 240 241 242
    # Check to make sure they actually have the right to change the product
    if (!CheckCanChangeField('product', $::FORM{'id'}, $::oldproduct, $::FORM{'product'})) {
        $vars->{'oldvalue'} = $::oldproduct;
        $vars->{'newvalue'} = $::FORM{'product'};
        $vars->{'field'} = 'product';
243
        $vars->{'privs'} = $PrivilegesRequired;
244
        ThrowUserError("illegal_change", $vars);
245
    }
246

247
    CheckFormField(\%::FORM, 'product', \@::legal_product);
248
    my $prod = $::FORM{'product'};
249 250 251 252 253 254 255 256 257

    # note that when this script is called from buglist.cgi (rather
    # than show_bug.cgi), it's possible that the product will be changed
    # but that the version and/or component will be set to 
    # "--dont_change--" but still happen to be correct.  in this case,
    # the if statement will incorrectly trigger anyway.  this is a 
    # pretty weird case, and not terribly unreasonable behavior, but 
    # worthy of a comment, perhaps.
    #
258 259
    my $vok = lsearch($::versions{$prod}, $::FORM{'version'}) >= 0;
    my $cok = lsearch($::components{$prod}, $::FORM{'component'}) >= 0;
260 261 262

    my $mok = 1;   # so it won't affect the 'if' statement if milestones aren't used
    if ( Param("usetargetmilestone") ) {
263
       CheckFormFieldDefined(\%::FORM, 'target_milestone');
264 265 266
       $mok = lsearch($::target_milestone{$prod}, $::FORM{'target_milestone'}) >= 0;
    }

267 268 269
    # If the product-specific fields need to be verified, or we need to verify
    # whether or not to add the bugs to their new product's group, display
    # a verification form.
270
    if (!$vok || !$cok || !$mok || (AnyDefaultGroups() && !defined($::FORM{'addtonewgroup'}))) {
271
        $vars->{'form'} = \%::FORM;
272
        $vars->{'mform'} = \%::MFORM;
273
        
274
        if (!$vok || !$cok || !$mok) {
275
            $vars->{'verify_fields'} = 1;
276 277 278 279
            my %defaults;
            # We set the defaults to these fields to the old value,
            # if its a valid option, otherwise we use the default where
            # thats appropriate
280
            $vars->{'versions'} = $::versions{$prod};
281
            if ($vok) {
282 283
                $defaults{'version'} = $::FORM{'version'};
            }
284
            $vars->{'components'} = $::components{$prod};
285
            if ($cok) {
286 287
                $defaults{'component'} = $::FORM{'component'};
            }
288 289 290
            if (Param("usetargetmilestone")) {
                $vars->{'use_target_milestone'} = 1;
                $vars->{'milestones'} = $::target_milestone{$prod};
291
                if ($mok) {
292 293
                    $defaults{'target_milestone'} = $::FORM{'target_milestone'};
                } else {
294 295
                    SendSQL("SELECT defaultmilestone FROM products " .
                            "WHERE name = " . SqlQuote($prod));
296 297
                    $defaults{'target_milestone'} = FetchOneColumn();
                }
298
            }
299 300
            else {
                $vars->{'use_target_milestone'} = 0;
terry%netscape.com's avatar
terry%netscape.com committed
301
            }
302
            $vars->{'defaults'} = \%defaults;
303
        }
304
        else {
305
            $vars->{'verify_fields'} = 0;
terry%netscape.com's avatar
terry%netscape.com committed
306
        }
307
        
308
        $vars->{'verify_bug_group'} = (AnyDefaultGroups() 
309 310
                                       && !defined($::FORM{'addtonewgroup'}));
        
311
        $template->process("bug/process/verify-new-product.html.tmpl", $vars)
312
          || ThrowTemplateError($template->error());
313
        exit;
terry%netscape.com's avatar
terry%netscape.com committed
314 315 316 317
    }
}


318 319 320 321 322 323 324 325 326
# Checks that the user is allowed to change the given field.  Actually, right
# now, the rules are pretty simple, and don't look at the field itself very
# much, but that could be enhanced.

my $lastbugid = 0;
my $ownerid;
my $reporterid;
my $qacontactid;

327 328 329
################################################################################
# CheckCanChangeField() defines what users are allowed to change what bugs. You
# can add code here for site-specific policy changes, according to the 
330
# instructions given in the Bugzilla Guide and below. Note that you may also
331 332
# have to update the Bugzilla::Bug::user() function to give people access to the
# options that they are permitted to change.
333 334 335 336 337 338 339 340 341 342 343 344 345 346 347
#
# CheckCanChangeField() should return true if the user is allowed to change this
# field, and false if they are not.
#
# The parameters to this function are as follows:
# $field    - name of the field in the bugs table the user is trying to change
# $bugid    - the ID of the bug they are changing
# $oldvalue - what they are changing it from
# $newvalue - what they are changing it to
#
# Note that this function is currently not called for dependency changes 
# (bug 141593) or CC changes, which means anyone can change those fields.
#
# Do not change the sections between START DO_NOT_CHANGE and END DO_NOT_CHANGE.
################################################################################
348
sub CheckCanChangeField {
349 350 351 352
    # START DO_NOT_CHANGE
    my ($field, $bugid, $oldvalue, $newvalue) = (@_);

    # Return true if they haven't changed this field at all.
353 354
    if ($oldvalue eq $newvalue) {
        return 1;
355
    } elsif (trim($oldvalue) eq trim($newvalue)) {
356
        return 1;
357
    # numeric fields need to be compared using == 
358 359 360
    } elsif (($field eq "estimated_time" || $field eq "remaining_time")
             && $oldvalue == $newvalue)
    {
361
        return 1;
362
    }
363

364 365 366 367 368
    # A resolution change is always accompanied by a status change. So, we 
    # always OK resolution changes; if they really can't do this, we will 
    # notice it when status is checked. 
    if ($field eq "resolution") { 
        return 1;             
369
    }
370 371 372 373 374
    # END DO_NOT_CHANGE

    # Allow anyone to change comments.
    if ($field =~ /^longdesc/) {
        return 1;
375
    }
376 377 378 379 380 381 382 383 384

    # Ignore the assigned_to field if the bug is not being reassigned
    if ($field eq "assigned_to"
        && $::FORM{'knob'} ne "reassignbycomponent"
        && $::FORM{'knob'} ne "reassign")
    {
        return 1;
    }

385 386 387 388
    # START DO_NOT_CHANGE
    # Find out whether the user is a member of the "editbugs" and/or
    # "canconfirm" groups. $UserIn*GroupSet are caches of the return value of 
    # the UserInGroup calls.
389 390 391
    if ($UserInEditGroupSet < 0) {
        $UserInEditGroupSet = UserInGroup("editbugs");
    }
392 393 394 395 396
    
    if ($UserInCanConfirmGroupSet < 0) {
        $UserInCanConfirmGroupSet = UserInGroup("canconfirm");
    }
    # END DO_NOT_CHANGE
397 398 399 400 401 402 403 404 405 406 407

    # If the user isn't allowed to change a field, we must tell him who can.
    # We store the required permission set into the $PrivilegesRequired
    # variable which gets passed to the error template.
    #
    # $PrivilegesRequired = 0 : no privileges required;
    # $PrivilegesRequired = 1 : the reporter, owner or an empowered user;
    # $PrivilegesRequired = 2 : the owner or an empowered user;
    # $PrivilegesRequired = 3 : an empowered user.

    # Allow anyone with "editbugs" privs to change anything.
408 409 410
    if ($UserInEditGroupSet) {
        return 1;
    }
411 412 413 414

    # *Only* users with "canconfirm" privs can confirm bugs.
    if ($field eq "canconfirm"
        || ($field eq "bug_status"
415
            && $oldvalue eq 'UNCONFIRMED'
416 417 418 419
            && IsOpenedState($newvalue)))
    {
        $PrivilegesRequired = 3;
        return $UserInCanConfirmGroupSet;
420
    }
421

422 423 424
    # START DO_NOT_CHANGE
    # $reporterid, $ownerid and $qacontactid are caches of the results of
    # the call to find out the owner, reporter and qacontact of the current bug.
425
    if ($lastbugid != $bugid) {
426 427
        SendSQL("SELECT reporter, assigned_to, qa_contact FROM bugs
                 WHERE bug_id = $bugid");
428
        ($reporterid, $ownerid, $qacontactid) = (FetchSQLData());
429
        $lastbugid = $bugid;
430 431 432
    }    
    # END DO_NOT_CHANGE

433 434
    # Allow the owner to change anything else.
    if ($ownerid == $whoid) {
435
        return 1;
436
    }
437
    
438 439
    # Allow the QA contact to change anything else.
    if (Param('useqacontact') && ($qacontactid == $whoid)) {
440 441
        return 1;
    }
442
    
443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468
    # At this point, the user is either the reporter or an
    # unprivileged user. We first check for fields the reporter
    # is not allowed to change.

    # The reporter may not:
    # - reassign bugs, unless the bugs are assigned to him;
    #   in that case we will have already returned 1 above
    #   when checking for the owner of the bug.
    if ($field eq "assigned_to") {
        $PrivilegesRequired = 2;
        return 0;
    }
    # - change the QA contact
    if ($field eq "qa_contact") {
        $PrivilegesRequired = 2;
        return 0;
    }
    # - change the target milestone
    if ($field eq "target_milestone") {
        $PrivilegesRequired = 2;
        return 0;
    }
    # - change the priority (unless he could have set it originally)
    if ($field eq "priority"
        && !Param('letsubmitterchoosepriority'))
    {
469
        $PrivilegesRequired = 2;
470 471
        return 0;
    }
472

473 474
    # The reporter is allowed to change anything else.
    if ($reporterid == $whoid) {
475
        return 1;
476
    }
477

478 479
    # If we haven't returned by this point, then the user doesn't
    # have the necessary permissions to change this field.
480
    $PrivilegesRequired = 1;
481
    return 0;
482 483
}

484 485
# Confirm that the reporter of the current bug can access the bug we are duping to.
sub DuplicateUserConfirm {
486 487 488 489 490
    # if we've already been through here, then exit
    if (defined $::FORM{'confirm_add_duplicate'}) {
        return;
    }

491 492
    my $dupe = $::FORM{'id'};
    my $original = $::FORM{'dup_id'};
493 494 495
    
    SendSQL("SELECT reporter FROM bugs WHERE bug_id = " . SqlQuote($dupe));
    my $reporter = FetchOneColumn();
496
    my $rep_user = Bugzilla::User->new($reporter);
497

498
    if ($rep_user->can_see_bug($original)) {
499 500 501
        $::FORM{'confirm_add_duplicate'} = "1";
        return;
    }
502 503

    SendSQL("SELECT cclist_accessible FROM bugs WHERE bug_id = $original");
504
    $vars->{'cclist_accessible'} = FetchOneColumn();
505
    
506 507 508
    # Once in this part of the subroutine, the user has not been auto-validated
    # and the duper has not chosen whether or not to add to CC list, so let's
    # ask the duper what he/she wants to do.
509
    
510
    $vars->{'form'} = \%::FORM;
511
    $vars->{'mform'} = \%::MFORM;
512 513 514 515 516
    $vars->{'original_bug_id'} = $original;
    $vars->{'duplicate_bug_id'} = $dupe;
    
    # Confirm whether or not to add the reporter to the cc: list
    # of the original bug (the one this bug is being duped against).
517
    print Bugzilla->cgi->header();
518
    $template->process("bug/process/confirm-duplicate.html.tmpl", $vars)
519
      || ThrowTemplateError($template->error());
520
    exit;
521
}
522

523
if (defined $::FORM{'id'}) {
524 525 526 527 528 529 530
    # since this means that we were called from show_bug.cgi, now is a good
    # time to do a whole bunch of error checking that can't easily happen when
    # we've been called from buglist.cgi, because buglist.cgi only tweaks
    # values that have been changed instead of submitting all the new values.
    # (XXX those error checks need to happen too, but implementing them 
    # is more work in the current architecture of this script...)
    #
531
    CheckFormField(\%::FORM, 'product', \@::legal_product);
532 533 534 535
    CheckFormField(\%::FORM, 'component', 
                   \@{$::components{$::FORM{'product'}}});
    CheckFormField(\%::FORM, 'version', 
                   \@{$::versions{$::FORM{'product'}}});
536 537 538 539 540
    if ( Param("usetargetmilestone") ) {
        CheckFormField(\%::FORM, 'target_milestone', 
                       \@{$::target_milestone{$::FORM{'product'}}});
    }
    CheckFormField(\%::FORM, 'rep_platform', \@::legal_platform);
541
    CheckFormField(\%::FORM, 'op_sys', \@::legal_opsys);
542 543 544 545
    CheckFormField(\%::FORM, 'priority', \@::legal_priority);
    CheckFormField(\%::FORM, 'bug_severity', \@::legal_severity);
    CheckFormFieldDefined(\%::FORM, 'bug_file_loc');
    CheckFormFieldDefined(\%::FORM, 'short_desc');
546
    CheckFormFieldDefined(\%::FORM, 'longdesclength');
547

548
    if (trim($::FORM{'short_desc'}) eq "") {
549
        ThrowUserError("require_summary");
550
    }
terry%netscape.com's avatar
terry%netscape.com committed
551 552
}

553
my $action = '';
554
if (defined $::FORM{action}) {
555
  $action = trim($::FORM{action});
556
}
557
if (Param("move-enabled") && $action eq Param("move-button-text")) {
558
  $cgi->param('buglist', join (":", @idlist));
559 560 561 562 563 564
  do "move.pl" || die "Error executing move.cgi: $!";
  PutFooter();
  exit;
}


565 566 567 568
$::query = "update bugs\nset";
$::comma = "";
umask(0);

569 570 571 572 573 574 575 576 577 578 579 580 581 582 583
sub _remove_remaining_time {
    if (UserInGroup(Param('timetrackinggroup'))) {
        if ( defined $::FORM{'remaining_time'} 
             && $::FORM{'remaining_time'} > 0 )
        {
            $::FORM{'remaining_time'} = 0;
            $vars->{'message'} = "remaining_time_zeroed";
        }
    }
    else {
        DoComma();
        $::query .= "remaining_time = 0";
    }
}

584 585 586
sub DoComma {
    $::query .= "$::comma\n    ";
    $::comma = ",";
terry%netscape.com's avatar
terry%netscape.com committed
587 588
}

589
sub DoConfirm {
590
    if (CheckCanChangeField("canconfirm", $::FORM{'id'}, 0, 1)) {
591 592 593 594 595 596
        DoComma();
        $::query .= "everconfirmed = 1";
    }
}


597 598
sub ChangeStatus {
    my ($str) = (@_);
599 600
    if (!$::FORM{'dontchange'} ||
       ($str ne $::FORM{'dontchange'})) {
601
        DoComma();
602 603 604
        if ($::FORM{knob} eq 'reopen') {
            # When reopening, we need to check whether the bug was ever
            # confirmed or not
605
            $::query .= "bug_status = CASE WHEN everconfirmed = 1 THEN " .
606
                         SqlQuote($str) . " ELSE 'UNCONFIRMED' END";
607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632
        } elsif (IsOpenedState($str)) {
            # Note that we cannot combine this with the above branch - here we
            # need to check if bugs.bug_status is open, (since we don't want to
            # reopen closed bugs when reassigning), while above the whole point
            # is to reopen a closed bug.
            # Currently, the UI doesn't permit a user to reassign a closed bug
            # from the single bug page (only during a mass change), but they
            # could still hack the submit, so don't restrict this extended
            # check to the mass change page for safety/sanity/consistency
            # purposes.

            # The logic for this block is:
            # If the new state is open:
            #   If the old state was open
            #     If the bug was confirmed
            #       - move it to the new state
            #     Else
            #       - Set the state to unconfirmed
            #   Else
            #     - leave it as it was

            # This is valid only because 'reopen' is the only thing which moves
            # from closed to open, and its handled above
            # This also relies on the fact that confirming and accepting have
            # already called DoConfirm before this is called

633 634
            my @open_state = map(SqlQuote($_), OpenStates());
            my $open_state = join(", ", @open_state);
635 636 637
            $::query .= "bug_status = CASE WHEN bug_status IN($open_state) THEN " .
                                        "(CASE WHEN everconfirmed = 1 THEN " .
                                            SqlQuote($str) . " ELSE " .
638
                                            " 'UNCONFIRMED' END) ELSE " .
639
                                        "bug_status END";
640
        } else {
641
            $::query .= "bug_status = " . SqlQuote($str);
642
        }
643 644 645 646
        # If bugs are reassigned and their status is "UNCONFIRMED", they
        # should keep this status instead of "NEW" as suggested here.
        # This point is checked for each bug later in the code.
        $::FORM{'bug_status'} = $str;
terry%netscape.com's avatar
terry%netscape.com committed
647 648 649
    }
}

650 651
sub ChangeResolution {
    my ($str) = (@_);
652 653 654
    if (!$::FORM{'dontchange'}
        || $str ne $::FORM{'dontchange'})
    {
655
        DoComma();
656
        $::query .= "resolution = " . SqlQuote($str);
657 658 659
        # We define this variable here so that customized installations
        # may set rules based on the resolution in CheckCanChangeField.
        $::FORM{'resolution'} = $str;
terry%netscape.com's avatar
terry%netscape.com committed
660 661 662
    }
}

663 664 665 666
# Changing this so that it will process groups from checkboxes instead of
# select lists.  This means that instead of looking for the bit-X values in
# the form, we need to loop through all the bug groups this user has access
# to, and for each one, see if it's selected.
667 668
# If the form element isn't present, or the user isn't in the group, leave
# it as-is
669

670 671 672 673 674
my @groupAdd = ();
my @groupDel = ();

SendSQL("SELECT groups.id, isactive FROM groups, user_group_map WHERE " .
        "groups.id = user_group_map.group_id AND " .
675
        "user_group_map.user_id = $whoid AND " .
676 677 678 679 680 681 682 683 684 685 686 687 688
        "isbless = 0 AND isbuggroup = 1");
while (my ($b, $isactive) = FetchSQLData()) {
    # The multiple change page may not show all groups a bug is in
    # (eg product groups when listing more than one product)
    # Only consider groups which were present on the form. We can't do this
    # for single bug changes because non-checked checkboxes aren't present.
    # All the checkboxes should be shown in that case, though, so its not
    # an issue there
    if ($::FORM{'id'} || exists $::FORM{"bit-$b"}) {
        if (!$::FORM{"bit-$b"}) {
            push(@groupDel, $b);
        } elsif ($::FORM{"bit-$b"} == 1 && $isactive) {
            push(@groupAdd, $b);
689 690
        }
    }
691 692
}

693 694
foreach my $field ("rep_platform", "priority", "bug_severity",
                   "bug_file_loc", "short_desc", "version", "op_sys",
695
                   "target_milestone", "status_whiteboard") {
696
    if (defined $::FORM{$field}) {
697 698
        if (!$::FORM{'dontchange'}
            || $::FORM{$field} ne $::FORM{'dontchange'}) {
699
            DoComma();
700
            $::query .= "$field = " . SqlQuote(trim($::FORM{$field}));
terry%netscape.com's avatar
terry%netscape.com committed
701 702 703 704
        }
    }
}

705
my $prod_id; # Remember, can't use this for mass changes
706
if ($::FORM{'product'} ne $::FORM{'dontchange'}) {
707
    $prod_id = get_product_id($::FORM{'product'});
708
    $prod_id ||
709
      ThrowUserError("invalid_product_name", {product => $::FORM{'product'}});
710
      
711 712 713 714
    DoComma();
    $::query .= "product_id = $prod_id";
} else {
    SendSQL("SELECT DISTINCT product_id FROM bugs WHERE bug_id IN (" .
715
            join(',', @idlist) . ") " . $dbh->sql_limit(2));
716 717 718 719 720
    $prod_id = FetchOneColumn();
    $prod_id = undef if (FetchOneColumn());
}

my $comp_id; # Remember, can't use this for mass changes
721
if ($::FORM{'component'} ne $::FORM{'dontchange'}) {
722
    if (!defined $prod_id) {
723
        ThrowUserError("no_component_change_for_multiple_products");
724 725 726
    }
    $comp_id = get_component_id($prod_id,
                                $::FORM{'component'});
727
    $comp_id || ThrowCodeError("invalid_component", 
728
                               {name => $::FORM{'component'},
729 730
                                product => $::FORM{'product'}});
    
731 732 733 734
    DoComma();
    $::query .= "component_id = $comp_id";
}

735 736 737 738 739 740 741 742 743 744 745 746 747
# If this installation uses bug aliases, and the user is changing the alias,
# add this change to the query.
if (Param("usebugaliases") && defined($::FORM{'alias'})) {
    my $alias = trim($::FORM{'alias'});
    
    # Since aliases are unique (like bug numbers), they can only be changed
    # for one bug at a time, so ignore the alias change unless only a single
    # bug is being changed.
    if (scalar(@idlist) == 1) {
        # Validate the alias if the user entered one.
        if ($alias ne "") {
            # Make sure the alias isn't too long.
            if (length($alias) > 20) {
748
                ThrowUserError("alias_too_long");
749 750 751 752
            }

            # Make sure the alias is unique.
            my $escaped_alias = SqlQuote($alias);
753
            my $vars = { alias => $alias };
754
            
755 756 757
            SendSQL("SELECT bug_id FROM bugs WHERE alias = $escaped_alias " . 
                    "AND bug_id != $idlist[0]");
            my $id = FetchOneColumn();
758
            
759
            if ($id) {
760
                $vars->{'bug_link'} = GetBugLink($id, "Bug $id");
761
                ThrowUserError("alias_in_use", $vars);
762 763 764 765
            }

            # Make sure the alias isn't just a number.
            if ($alias =~ /^\d+$/) {
766
                ThrowUserError("alias_is_numeric", $vars);
767 768 769 770
            }

            # Make sure the alias has no commas or spaces.
            if ($alias =~ /[, ]/) {
771
                ThrowUserError("alias_has_comma_or_space", $vars);
772 773 774 775 776 777 778 779 780
            }
        }
        
        # Add the alias change to the query.  If the field contains the blank 
        # value, make the field be NULL to indicate that the bug has no alias.
        # Otherwise, if the field contains a value, update the record 
        # with that value.
        DoComma();
        $::query .= "alias = ";
781 782 783 784 785
        if ($alias eq "") {
            $::query .= "NULL";
        } else {
            $::query .= SqlQuote($alias);
        }
786 787
    }
}
788

789 790
# If the user is submitting changes from show_bug.cgi for a single bug,
# and that bug is restricted to a group, process the checkboxes that
791
# allowed the user to set whether or not the reporter
792 793
# and cc list can see the bug even if they are not members of all groups 
# to which the bug is restricted.
794
if ( $::FORM{'id'} ) {
795 796 797
    SendSQL("SELECT group_id FROM bug_group_map WHERE bug_id = $::FORM{'id'}");
    my ($havegroup) = FetchSQLData();
    if ( $havegroup ) {
798 799 800 801 802 803 804 805 806 807
        DoComma();
        $::FORM{'reporter_accessible'} = $::FORM{'reporter_accessible'} ? '1' : '0';
        $::query .= "reporter_accessible = $::FORM{'reporter_accessible'}";

        DoComma();
        $::FORM{'cclist_accessible'} = $::FORM{'cclist_accessible'} ? '1' : '0';
        $::query .= "cclist_accessible = $::FORM{'cclist_accessible'}";
    }
}

808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823
if ($::FORM{'id'} && 
    (Param("insidergroup") && UserInGroup(Param("insidergroup")))) {
    detaint_natural($::FORM{'id'});
    foreach my $field (keys %::FORM) {
        if ($field =~ /when-([0-9]+)/) {
            my $sequence = $1;
            my $private = $::FORM{"isprivate-$sequence"} ? 1 : 0 ;
            if ($private != $::FORM{"oisprivate-$sequence"}) {
                detaint_natural($::FORM{"$field"});
                SendSQL("UPDATE longdescs SET isprivate = $private 
                    WHERE bug_id = $::FORM{'id'} AND bug_when = " . $::FORM{"$field"});
            }
        }

    }
}
824

825
my $duplicate = 0;
826

827 828 829 830
# We need to check the addresses involved in a CC change before we touch any bugs.
# What we'll do here is formulate the CC data into two hashes of ID's involved
# in this CC change.  Then those hashes can be used later on for the actual change.
my (%cc_add, %cc_remove);
831
if (defined $::FORM{newcc} || defined $::FORM{'addselfcc'} || defined $::FORM{removecc} || defined $::FORM{masscc}) {
832 833 834 835 836 837 838 839 840 841 842 843 844
    # If masscc is defined, then we came from buglist and need to either add or
    # remove cc's... otherwise, we came from bugform and may need to do both.
    my ($cc_add, $cc_remove) = "";
    if (defined $::FORM{masscc}) {
        if ($::FORM{ccaction} eq 'add') {
            $cc_add = $::FORM{masscc};
        } elsif ($::FORM{ccaction} eq 'remove') {
            $cc_remove = $::FORM{masscc};
        }
    } else {
        $cc_add = $::FORM{newcc};
        # We came from bug_form which uses a select box to determine what cc's
        # need to be removed...
845
        if (defined $::FORM{removecc} && $::FORM{cc}) {
846 847 848 849 850
            $cc_remove = join (",", @{$::MFORM{cc}});
        }
    }

    if ($cc_add) {
851 852
        $cc_add =~ s/[\s,]+/ /g; # Change all delimiters to a single space
        foreach my $person ( split(" ", $cc_add) ) {
853 854 855 856
            my $pid = DBNameToIdAndCheck($person);
            $cc_add{$pid} = $person;
        }
    }
857 858 859
    if ($::FORM{'addselfcc'}) {
        $cc_add{$whoid} = $user->login;
    }
860
    if ($cc_remove) {
861 862
        $cc_remove =~ s/[\s,]+/ /g; # Change all delimiters to a single space
        foreach my $person ( split(" ", $cc_remove) ) {
863 864 865 866 867 868
            my $pid = DBNameToIdAndCheck($person);
            $cc_remove{$pid} = $person;
        }
    }
}

869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888
# Store the new assignee and QA contact IDs (if any). This is the
# only way to keep these informations when bugs are reassigned by
# component as $::FORM{'assigned_to'} and $::FORM{'qa_contact'}
# are not the right fields to look at.

my $assignee;
my $qacontact;

if (defined $::FORM{'qa_contact'}
    && $::FORM{'knob'} ne "reassignbycomponent")
{
    $qacontact = 0;
    my $name = trim($::FORM{'qa_contact'});
    # The QA contact cannot be deleted from show_bug.cgi for a single bug!
    if ($name ne $::FORM{'dontchange'}) {
        $qacontact = DBNameToIdAndCheck($name) if ($name ne "");
        DoComma();
        $::query .= "qa_contact = $qacontact";
    }
}
889

890
CheckFormFieldDefined(\%::FORM, 'knob');
891 892 893 894
SWITCH: for ($::FORM{'knob'}) {
    /^none$/ && do {
        last SWITCH;
    };
895 896 897 898 899
    /^confirm$/ && CheckonComment( "confirm" ) && do {
        DoConfirm();
        ChangeStatus('NEW');
        last SWITCH;
    };
900
    /^accept$/ && CheckonComment( "accept" ) && do {
901
        DoConfirm();
902
        ChangeStatus('ASSIGNED');
903 904
        if (Param("usetargetmilestone") && Param("musthavemilestoneonaccept")) {
            $requiremilestone = 1;
905
        }
906 907
        last SWITCH;
    };
908
    /^clearresolution$/ && CheckonComment( "clearresolution" ) && do {
909 910 911
        ChangeResolution('');
        last SWITCH;
    };
912
    /^resolve$/ && CheckonComment( "resolve" ) && do {
913 914 915
        # Check here, because its the only place we require the resolution
        CheckFormField(\%::FORM, 'resolution', \@::settable_resolution);

916
        # don't resolve as fixed while still unresolved blocking bugs
917 918 919
        if (Param("noresolveonopenblockers")
            && $::FORM{'resolution'} eq 'FIXED')
        {
920
            my @dependencies = Bugzilla::Bug::CountOpenDependencies(@idlist);
921 922
            if (scalar @dependencies > 0) {
                ThrowUserError("still_unresolved_bugs",
923 924
                               { dependencies     => \@dependencies,
                                 dependency_count => scalar @dependencies });
925
            }
926
        }
927 928 929 930 931

        # RESOLVED bugs should have no time remaining;
        # more time can be added for the VERIFY step, if needed.
        _remove_remaining_time();

932 933 934 935
        ChangeStatus('RESOLVED');
        ChangeResolution($::FORM{'resolution'});
        last SWITCH;
    };
936
    /^reassign$/ && CheckonComment( "reassign" ) && do {
937 938 939
        if ($::FORM{'andconfirm'}) {
            DoConfirm();
        }
940 941
        ChangeStatus('NEW');
        DoComma();
942 943 944
        if (!defined $::FORM{'assigned_to'}
            || trim($::FORM{'assigned_to'}) eq "")
        {
945
            ThrowUserError("reassign_to_empty");
946
        }
947 948
        $assignee = DBNameToIdAndCheck(trim($::FORM{'assigned_to'}));
        $::query .= "assigned_to = $assignee";
949 950
        last SWITCH;
    };
951
    /^reassignbycomponent$/  && CheckonComment( "reassignbycomponent" ) && do {
952
        if ($::FORM{'product'} eq $::FORM{'dontchange'}) {
953
            ThrowUserError("need_product");
954
        }
955
        if ($::FORM{'component'} eq $::FORM{'dontchange'}) {
956
            ThrowUserError("need_component");
terry%netscape.com's avatar
terry%netscape.com committed
957
        }
958 959 960
        if ($::FORM{'compconfirm'}) {
            DoConfirm();
        }
961
        ChangeStatus('NEW');
962 963
        SendSQL("SELECT initialowner FROM components " .
                "WHERE components.id = $comp_id");
964
        $assignee = FetchOneColumn();
965
        DoComma();
966
        $::query .= "assigned_to = $assignee";
967
        if (Param("useqacontact")) {
968 969
            SendSQL("SELECT initialqacontact FROM components " .
                    "WHERE components.id = $comp_id");
970
            $qacontact = FetchOneColumn() || 0;
971 972
            DoComma();
            $::query .= "qa_contact = $qacontact";
973
        }
974 975
        last SWITCH;
    };   
976
    /^reopen$/  && CheckonComment( "reopen" ) && do {
977
        ChangeStatus('REOPENED');
978
        ChangeResolution('');
979 980
        last SWITCH;
    };
981
    /^verify$/ && CheckonComment( "verify" ) && do {
982 983 984
        ChangeStatus('VERIFIED');
        last SWITCH;
    };
985
    /^close$/ && CheckonComment( "close" ) && do {
986 987 988
        # CLOSED bugs should have no time remaining.
        _remove_remaining_time();

989 990 991
        ChangeStatus('CLOSED');
        last SWITCH;
    };
992
    /^duplicate$/ && CheckonComment( "duplicate" ) && do {
993 994 995 996 997 998 999 1000 1001 1002
        # Make sure we can change the original bug (issue A on bug 96085)
        CheckFormFieldDefined(\%::FORM, 'dup_id');
        ValidateBugID($::FORM{'dup_id'}, 'dup_id');

        # Also, let's see if the reporter has authorization to see
        # the bug to which we are duping. If not we need to prompt.
        DuplicateUserConfirm();

        $duplicate = $::FORM{'dup_id'};
        if (!defined($::FORM{'id'}) || $duplicate == $::FORM{'id'}) {
1003
            ThrowUserError("dupe_of_self_disallowed");
terry%netscape.com's avatar
terry%netscape.com committed
1004
        }
1005 1006 1007 1008

        # DUPLICATE bugs should have no time remaining.
        _remove_remaining_time();

1009 1010 1011 1012
        ChangeStatus('RESOLVED');
        ChangeResolution('DUPLICATE');
        $::FORM{'comment'} .= "\n\n*** This bug has been marked " .
                              "as a duplicate of $duplicate ***";
1013 1014
        last SWITCH;
    };
1015 1016

    ThrowCodeError("unknown_action", { action => $::FORM{'knob'} });
terry%netscape.com's avatar
terry%netscape.com committed
1017 1018 1019
}


1020
if ($#idlist < 0) {
1021
    ThrowUserError("no_bugs_chosen");
terry%netscape.com's avatar
terry%netscape.com committed
1022 1023
}

1024 1025 1026 1027 1028

my @keywordlist;
my %keywordseen;

if ($::FORM{'keywords'}) {
1029 1030 1031 1032
    foreach my $keyword (split(/[\s,]+/, $::FORM{'keywords'})) {
        if ($keyword eq '') {
            next;
        }
1033
        my $i = GetKeywordIdFromName($keyword);
1034
        if (!$i) {
1035 1036
            ThrowUserError("unknown_keyword",
                           { keyword => $keyword });
1037 1038 1039 1040 1041 1042 1043 1044
        }
        if (!$keywordseen{$i}) {
            push(@keywordlist, $i);
            $keywordseen{$i} = 1;
        }
    }
}

1045
my $keywordaction = $::FORM{'keywordaction'} || "makeexact";
1046 1047 1048
if (!grep($keywordaction eq $_, qw(add delete makeexact))) {
    $keywordaction = "makeexact";
}
1049

1050
if ($::comma eq ""
1051
    && (! @groupAdd) && (! @groupDel)
1052
    && (! @::legal_keywords || (0 == @keywordlist && $keywordaction ne "makeexact"))
1053 1054
    && defined $::FORM{'masscc'} && ! $::FORM{'masscc'}
    ) {
1055
    if (!defined $::FORM{'comment'} || $::FORM{'comment'} =~ /^\s*$/) {
1056
        ThrowUserError("bugs_not_changed");
terry%netscape.com's avatar
terry%netscape.com committed
1057 1058 1059
    }
}

1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083
# Process data for Time Tracking fields
if (UserInGroup(Param('timetrackinggroup'))) {
    foreach my $field ("estimated_time", "remaining_time") {
        if (defined $::FORM{$field}) {
            my $er_time = trim($::FORM{$field});
            if ($er_time ne $::FORM{'dontchange'}) {
                DoComma();
                $::query .= "$field = " . SqlQuote($er_time);
            }
        }
    }

    if (defined $::FORM{'deadline'}) {
        DoComma();
        $::query .= "deadline = ";
        if ($::FORM{'deadline'}) {
            Bugzilla::Util::ValidateDate($::FORM{'deadline'}, 'YYYY-MM-DD');
            $::query .= SqlQuote($::FORM{'deadline'});
        } else {
            $::query .= "NULL" ;
        }
    }
}

1084
my $basequery = $::query;
1085
my $delta_ts;
terry%netscape.com's avatar
terry%netscape.com committed
1086

1087

1088 1089
sub SnapShotBug {
    my ($id) = (@_);
1090
    SendSQL("select delta_ts, " . join(',', @::log_columns) .
1091
            " from bugs where bug_id = $id");
1092 1093
    my @row = FetchSQLData();
    $delta_ts = shift @row;
1094

1095
    return @row;
terry%netscape.com's avatar
terry%netscape.com committed
1096 1097 1098
}


1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110
sub SnapShotDeps {
    my ($i, $target, $me) = (@_);
    SendSQL("select $target from dependencies where $me = $i order by $target");
    my @list;
    while (MoreSQLData()) {
        push(@list, FetchOneColumn());
    }
    return join(',', @list);
}


my $timestamp;
1111
my $bug_changed;
1112

1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131
sub FindWrapPoint {
    my ($string, $startpos) = @_;
    if (!$string) { return 0 }
    if (length($string) < $startpos) { return length($string) }
    my $wrappoint = rindex($string, ",", $startpos); # look for comma
    if ($wrappoint < 0) {  # can't find comma
        $wrappoint = rindex($string, " ", $startpos); # look for space
        if ($wrappoint < 0) {  # can't find space
            $wrappoint = rindex($string, "-", $startpos); # look for hyphen
            if ($wrappoint < 0) {  # can't find hyphen
                $wrappoint = $startpos;  # just truncate it
            } else {
                $wrappoint++; # leave hyphen on the left side
            }
        }
    }
    return $wrappoint;
}

1132
sub LogDependencyActivity {
1133 1134
    my ($i, $oldstr, $target, $me, $timestamp) = (@_);
    my $sql_timestamp = SqlQuote($timestamp);
1135 1136
    my $newstr = SnapShotDeps($i, $target, $me);
    if ($oldstr ne $newstr) {
1137
        # Figure out what's really different...
1138
        my ($removed, $added) = diff_strings($oldstr, $newstr);
1139
        LogActivityEntry($i,$target,$removed,$added,$whoid,$timestamp);
1140
        # update timestamp on target bug so midairs will be triggered
1141
        SendSQL("UPDATE bugs SET delta_ts = $sql_timestamp WHERE bug_id = $i");
1142
        $bug_changed = 1;
1143 1144 1145 1146 1147
        return 1;
    }
    return 0;
}

1148
# this loop iterates once for each bug to be processed (eg when this script
1149
# is called with multiple bugs selected from buglist.cgi instead of
1150 1151
# show_bug.cgi).
#
1152
foreach my $id (@idlist) {
1153
    my %dependencychanged;
1154
    $bug_changed = 0;
1155 1156
    my $write = "WRITE";        # Might want to make a param to control
                                # whether we do LOW_PRIORITY ...
1157 1158 1159 1160 1161 1162
    $dbh->bz_lock_tables("bugs $write", "bugs_activity $write",
            "cc $write", "cc AS selectVisible_cc $write",
            "profiles $write", "dependencies $write", "votes $write",
            "products READ", "components READ",
            "keywords $write", "longdescs $write", "fielddefs $write",
            "bug_group_map $write", "flags $write", "duplicates $write",
1163
            # user_group_map would be a READ lock except that Flag::process
1164 1165 1166 1167
            # may call Flag::notify, which creates a new user object,
            # which might call derive_groups, which wants a WRITE lock on that
            # table. group_group_map is in here at all because derive_groups
            # needs it.
1168 1169 1170 1171 1172
            "user_group_map $write", "group_group_map READ", "flagtypes READ",
            "flaginclusions AS i READ", "flagexclusions AS e READ",
            "keyworddefs READ", "groups READ", "attachments READ",
            "group_control_map AS oldcontrolmap READ",
            "group_control_map AS newcontrolmap READ",
1173
            "group_control_map READ");
1174 1175 1176 1177 1178 1179
    # Fun hack.  @::log_columns only contains the component_id,
    # not the name (since bug 43600 got fixed).  So, we need to have
    # this id ready for the loop below, otherwise anybody can
    # change the component of a bug (we checked product above).
    # http://bugzilla.mozilla.org/show_bug.cgi?id=180545
    my $product_id = get_product_id($::FORM{'product'});
1180 1181 1182 1183 1184
    
    if ($::FORM{'component'} ne $::FORM{'dontchange'}) {
        $::FORM{'component_id'} = 
                            get_component_id($product_id, $::FORM{'component'});
    }
1185 1186 1187 1188

    # It may sound crazy to set %formhash for each bug as $::FORM{}
    # will not change, but %formhash is modified below and we prefer
    # to set it again.
1189
    my $i = 0;
1190 1191 1192
    my @oldvalues = SnapShotBug($id);
    my %oldhash;
    my %formhash;
1193
    foreach my $col (@::log_columns) {
1194
        # Consider NULL db entries to be equivalent to the empty string
1195
        $oldvalues[$i] = '' unless defined $oldvalues[$i];
1196
        $oldhash{$col} = $oldvalues[$i];
1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1207 1208 1209
        $formhash{$col} = $::FORM{$col} if defined $::FORM{$col};
        $i++;
    }
    # If the user is reassigning bugs, we need to:
    # - convert $newhash{'assigned_to'} and $newhash{'qa_contact'}
    #   email addresses into their corresponding IDs;
    # - update $newhash{'bug_status'} to its real state if the bug
    #   is in the unconfirmed state.
    $formhash{'qa_contact'} = $qacontact if Param('useqacontact');
    if ($::FORM{'knob'} eq 'reassignbycomponent'
        || $::FORM{'knob'} eq 'reassign')
    {
        $formhash{'assigned_to'} = $assignee;
1210
        if ($oldhash{'bug_status'} eq 'UNCONFIRMED') {
1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 1231 1232
            $formhash{'bug_status'} = $oldhash{'bug_status'};
        }
    }
    foreach my $col (@::log_columns) {
        if (exists $formhash{$col}
            && !CheckCanChangeField($col, $id, $oldhash{$col}, $formhash{$col}))
        {
            my $vars;
            if ($col eq 'component_id') {
                # Display the component name
                $vars->{'oldvalue'} = get_component_name($oldhash{$col});
                $vars->{'newvalue'} = $::FORM{'component'};
                $vars->{'field'} = 'component';
            } elsif ($col eq 'assigned_to' || $col eq 'qa_contact') {
                # Display the assignee or QA contact email address
                $vars->{'oldvalue'} = DBID_to_name($oldhash{$col});
                $vars->{'newvalue'} = DBID_to_name($formhash{$col});
                $vars->{'field'} = $col;
            } else {
                $vars->{'oldvalue'} = $oldhash{$col};
                $vars->{'newvalue'} = $formhash{$col};
                $vars->{'field'} = $col;
1233
            }
1234
            $vars->{'privs'} = $PrivilegesRequired;
1235
            ThrowUserError("illegal_change", $vars);
1236 1237
        }
    }
1238

1239 1240 1241 1242 1243 1244 1245 1246 1247 1248 1249 1250 1251 1252
    # When editing multiple bugs, users can specify a list of keywords to delete
    # from bugs.  If the list matches the current set of keywords on those bugs,
    # CheckCanChangeField above will fail to check permissions because it thinks
    # the list hasn't changed.  To fix that, we have to call CheckCanChangeField
    # again with old!=new if the keyword action is "delete" and old=new.
    if ($keywordaction eq "delete"
        && exists $::FORM{keywords}
        && length(@keywordlist) > 0
        && $::FORM{keywords} eq $oldhash{keywords}
        && !CheckCanChangeField("keywords", $id, "old is not", "equal to new"))
    {
        $vars->{'oldvalue'} = $oldhash{keywords};
        $vars->{'newvalue'} = "no keywords";
        $vars->{'field'} = "keywords";
1253
        $vars->{'privs'} = $PrivilegesRequired;
1254
        ThrowUserError("illegal_change", $vars);
1255 1256
    }

1257
    $oldhash{'product'} = get_product_name($oldhash{'product_id'});
1258
    if (!CanEditProductId($oldhash{'product_id'})) {
1259
        ThrowUserError("product_edit_denied",
1260
                      { product => $oldhash{'product'} });
1261 1262 1263 1264 1265 1266
    }

    if (defined $::FORM{'product'} 
        && $::FORM{'product'} ne $::FORM{'dontchange'} 
        && $::FORM{'product'} ne $oldhash{'product'}
        && !CanEnterProduct($::FORM{'product'})) {
1267
        ThrowUserError("entry_access_denied",
1268
                       { product => $::FORM{'product'} });
1269
    }
1270
    if ($requiremilestone) {
1271 1272 1273 1274 1275 1276 1277 1278 1279 1280 1281 1282 1283 1284 1285
        # musthavemilestoneonaccept applies only if at least two
        # target milestones are defined for the current product.
        my $nb_milestones = scalar(@{$::target_milestone{$oldhash{'product'}}});
        if ($nb_milestones > 1) {
            my $value = $cgi->param('target_milestone');
            if (!defined $value || $value eq $cgi->param('dontchange')) {
                $value = $oldhash{'target_milestone'};
            }
            my $defaultmilestone =
                $dbh->selectrow_array("SELECT defaultmilestone
                                       FROM products WHERE id = ?",
                                       undef, $oldhash{'product_id'});
            # if musthavemilestoneonaccept == 1, then the target
            # milestone must be different from the default one.
            if ($value eq $defaultmilestone) {
1286
                ThrowUserError("milestone_required", { bug_id => $id });
1287
            }
1288 1289
        }
    }   
1290
    if (defined $::FORM{'delta_ts'} && $::FORM{'delta_ts'} ne $delta_ts) {
1291 1292 1293
        ($vars->{'operations'}) = GetBugActivity($::FORM{'id'}, $::FORM{'delta_ts'});

        $vars->{'start_at'} = $::FORM{'longdesclength'};
1294
        $vars->{'comments'} = Bugzilla::Bug::GetComments($id);
1295

1296
        $::FORM{'delta_ts'} = $delta_ts;
1297
        $vars->{'form'} = \%::FORM;
1298
        $vars->{'mform'} = \%::MFORM;
1299 1300 1301
        
        $vars->{'bug_id'} = $id;
        
1302
        $dbh->bz_unlock_tables(UNLOCK_ABORT);
1303 1304
        
        # Warn the user about the mid-air collision and ask them what to do.
1305
        $template->process("bug/process/midair.html.tmpl", $vars)
1306
          || ThrowTemplateError($template->error());
1307 1308 1309
        exit;
    }
        
1310 1311 1312 1313
    my %deps;
    if (defined $::FORM{'dependson'}) {
        my $me = "blocked";
        my $target = "dependson";
1314
        my %deptree;
1315
        for (1..2) {
1316
            $deptree{$target} = [];
1317 1318
            my %seen;
            foreach my $i (split('[\s,]+', $::FORM{$target})) {
1319 1320
                next if $i eq "";
                
1321
                if ($id eq $i) {
1322
                    ThrowUserError("dependency_loop_single");
1323
                }
1324
                if (!exists $seen{$i}) {
1325
                    push(@{$deptree{$target}}, $i);
1326 1327 1328
                    $seen{$i} = 1;
                }
            }
1329 1330 1331
            # populate $deps{$target} as first-level deps only.
            # and find remainder of dependency tree in $deptree{$target}
            @{$deps{$target}} = @{$deptree{$target}};
1332 1333 1334
            my @stack = @{$deps{$target}};
            while (@stack) {
                my $i = shift @stack;
1335 1336
                SendSQL("select $target from dependencies where $me = " .
                        SqlQuote($i));
1337 1338
                while (MoreSQLData()) {
                    my $t = FetchOneColumn();
1339 1340 1341 1342
                    # ignore any _current_ dependencies involving this bug,
                    # as they will be overwritten with data from the form.
                    if ($t != $id && !exists $seen{$t}) {
                        push(@{$deptree{$target}}, $t);
1343 1344 1345 1346 1347
                        push @stack, $t;
                        $seen{$t} = 1;
                    }
                }
            }
1348

1349
            if ($me eq 'dependson') {
1350 1351
                my @deps   =  @{$deptree{'dependson'}};
                my @blocks =  @{$deptree{'blocked'}};
1352 1353 1354 1355 1356 1357 1358
                my @union = ();
                my @isect = ();
                my %union = ();
                my %isect = ();
                foreach my $b (@deps, @blocks) { $union{$b}++ && $isect{$b}++ }
                @union = keys %union;
                @isect = keys %isect;
1359
                if (@isect > 0) {
1360 1361
                    my $both;
                    foreach my $i (@isect) {
1362
                       $both = $both . GetBugLink($i, "#" . $i) . " ";
1363
                    }
1364 1365

                    ThrowUserError("dependency_loop_multi",
1366
                                   { both => $both });
1367 1368
                }
            }
1369 1370 1371 1372 1373
            my $tmp = $me;
            $me = $target;
            $target = $tmp;
        }
    }
1374

1375 1376 1377 1378
    #
    # Start updating the relevant database entries
    #

1379 1380
    SendSQL("select now()");
    $timestamp = FetchOneColumn();
1381
    my $sql_timestamp = SqlQuote($timestamp);
1382

1383 1384 1385 1386 1387 1388 1389 1390 1391
    my $work_time;
    if (UserInGroup(Param('timetrackinggroup'))) {
        $work_time = $::FORM{'work_time'};
        if ($work_time) {
            # AppendComment (called below) can in theory raise an error,
            # but because we've already validated work_time here it's
            # safe to log the entry before adding the comment.
            LogActivityEntry($id, "work_time", "", $::FORM{'work_time'},
                             $whoid, $timestamp);
1392 1393 1394
        }
    }

1395 1396 1397 1398 1399 1400
    if ($::FORM{'comment'} || $work_time) {
        AppendComment($id, Bugzilla->user->login, $::FORM{'comment'},
                      $::FORM{'commentprivacy'}, $timestamp, $work_time);
        $bug_changed = 1;
    }

1401
    if (@::legal_keywords && exists $::FORM{keywords}) {
1402 1403 1404 1405 1406
        # There are three kinds of "keywordsaction": makeexact, add, delete.
        # For makeexact, we delete everything, and then add our things.
        # For add, we delete things we're adding (to make sure we don't
        # end up having them twice), and then we add them.
        # For delete, we just delete things on the list.
1407
        my $changed = 0;
1408 1409
        if ($keywordaction eq "makeexact") {
            SendSQL("DELETE FROM keywords WHERE bug_id = $id");
1410
            $changed = 1;
1411 1412 1413 1414 1415
        }
        foreach my $keyword (@keywordlist) {
            if ($keywordaction ne "makeexact") {
                SendSQL("DELETE FROM keywords
                         WHERE bug_id = $id AND keywordid = $keyword");
1416
                $changed = 1;
1417 1418 1419 1420
            }
            if ($keywordaction ne "delete") {
                SendSQL("INSERT INTO keywords 
                         (bug_id, keywordid) VALUES ($id, $keyword)");
1421 1422 1423 1424 1425 1426 1427 1428 1429 1430 1431 1432
                $changed = 1;
            }
        }
        if ($changed) {
            SendSQL("SELECT keyworddefs.name 
                     FROM keyworddefs, keywords
                     WHERE keywords.bug_id = $id
                         AND keyworddefs.id = keywords.keywordid
                     ORDER BY keyworddefs.name");
            my @list;
            while (MoreSQLData()) {
                push(@list, FetchOneColumn());
1433
            }
1434
            SendSQL("UPDATE bugs SET delta_ts = $sql_timestamp, keywords = " .
1435 1436
                    SqlQuote(join(', ', @list)) .
                    " WHERE bug_id = $id");
1437 1438
        }
    }
1439
    my $query = "$basequery\nwhere bug_id = $id";
terry%netscape.com's avatar
terry%netscape.com committed
1440
    
1441 1442
    if ($::comma ne "") {
        SendSQL($query);
terry%netscape.com's avatar
terry%netscape.com committed
1443
    }
1444

1445 1446 1447 1448 1449 1450 1451
    # Check for duplicates if the bug is [re]open
    SendSQL("SELECT resolution FROM bugs WHERE bug_id = $id");
    my $resolution = FetchOneColumn();
    if ($resolution eq '') {
        SendSQL("DELETE FROM duplicates WHERE dupe = $id");
    }
    
1452 1453 1454 1455 1456 1457 1458 1459 1460 1461 1462 1463 1464 1465 1466 1467 1468 1469 1470 1471 1472 1473 1474
    my $newproduct_id = $oldhash{'product_id'};
    if ((defined $::FORM{'product'})
        && ($::FORM{'product'} ne $::FORM{'dontchange'})) {
        my $newproduct_id = get_product_id($::FORM{'product'});
    }

    my %groupsrequired = ();
    my %groupsforbidden = ();
    SendSQL("SELECT id, membercontrol 
             FROM groups LEFT JOIN group_control_map
             ON id = group_id
             AND product_id = $newproduct_id WHERE isactive != 0");
    while (MoreSQLData()) {
        my ($group, $control) = FetchSQLData();
        $control ||= 0;
        unless ($control > &::CONTROLMAPNA)  {
            $groupsforbidden{$group} = 1;
        }
        if ($control == &::CONTROLMAPMANDATORY) {
            $groupsrequired{$group} = 1;
        }
    }

1475
    my @groupAddNames = ();
1476 1477 1478 1479
    my @groupAddNamesAll = ();
    foreach my $grouptoadd (@groupAdd, keys %groupsrequired) {
        next if $groupsforbidden{$grouptoadd};
        push(@groupAddNamesAll, GroupIdToName($grouptoadd));
1480 1481 1482 1483 1484 1485 1486
        if (!BugInGroupId($id, $grouptoadd)) {
            push(@groupAddNames, GroupIdToName($grouptoadd));
            SendSQL("INSERT INTO bug_group_map (bug_id, group_id) 
                     VALUES ($id, $grouptoadd)");
        }
    }
    my @groupDelNames = ();
1487 1488 1489 1490
    my @groupDelNamesAll = ();
    foreach my $grouptodel (@groupDel, keys %groupsforbidden) {
        push(@groupDelNamesAll, GroupIdToName($grouptodel));
        next if $groupsrequired{$grouptodel};
1491 1492 1493 1494 1495 1496 1497 1498 1499 1500
        if (BugInGroupId($id, $grouptodel)) {
            push(@groupDelNames, GroupIdToName($grouptodel));
        }
        SendSQL("DELETE FROM bug_group_map 
                 WHERE bug_id = $id AND group_id = $grouptodel");
    }

    my $groupDelNames = join(',', @groupDelNames);
    my $groupAddNames = join(',', @groupAddNames);

1501 1502 1503 1504 1505
    if ($groupDelNames ne $groupAddNames) {
        LogActivityEntry($id, "bug_group", $groupDelNames, $groupAddNames,
                         $whoid, $timestamp); 
        $bug_changed = 1;
    }
1506 1507

    my @ccRemoved = (); 
1508
    if (defined $::FORM{newcc} || defined $::FORM{'addselfcc'} || defined $::FORM{removecc} || defined $::FORM{masscc}) {
1509 1510 1511 1512 1513 1514 1515 1516
        # Get the current CC list for this bug
        my %oncc;
        SendSQL("SELECT who FROM cc WHERE bug_id = $id");
        while (MoreSQLData()) {
            $oncc{FetchOneColumn()} = 1;
        }

        my (@added, @removed) = ();
1517 1518 1519 1520 1521 1522
        foreach my $pid (keys %cc_add) {
            # If this person isn't already on the cc list, add them
            if (! $oncc{$pid}) {
                SendSQL("INSERT INTO cc (bug_id, who) VALUES ($id, $pid)");
                push (@added, $cc_add{$pid});
                $oncc{$pid} = 1;
1523 1524
            }
        }
1525 1526 1527 1528 1529 1530
        foreach my $pid (keys %cc_remove) {
            # If the person is on the cc list, remove them
            if ($oncc{$pid}) {
                SendSQL("DELETE FROM cc WHERE bug_id = $id AND who = $pid");
                push (@removed, $cc_remove{$pid});
                $oncc{$pid} = 0;
1531 1532
            }
        }
1533

1534 1535
        # If any changes were found, record it in the activity log
        if (scalar(@removed) || scalar(@added)) {
1536 1537
            my $removed = join(", ", @removed);
            my $added = join(", ", @added);
1538 1539
            LogActivityEntry($id,"cc",$removed,$added,$whoid,$timestamp);
            $bug_changed = 1;
1540
        }
1541
        @ccRemoved = @removed;
1542
    }
1543

1544
    # We need to send mail for dependson/blocked bugs if the dependencies
1545 1546 1547
    # change or the status or resolution change. This var keeps track of that.
    my $check_dep_bugs = 0;

1548 1549 1550 1551 1552 1553 1554 1555 1556 1557 1558
    if (defined $::FORM{'dependson'}) {
        my $me = "blocked";
        my $target = "dependson";
        for (1..2) {
            SendSQL("select $target from dependencies where $me = $id order by $target");
            my %snapshot;
            my @oldlist;
            while (MoreSQLData()) {
                push(@oldlist, FetchOneColumn());
            }
            my @newlist = sort {$a <=> $b} @{$deps{$target}};
1559 1560
            @dependencychanged{@oldlist} = 1;
            @dependencychanged{@newlist} = 1;
1561 1562 1563 1564 1565 1566 1567 1568 1569 1570 1571 1572 1573 1574

            while (0 < @oldlist || 0 < @newlist) {
                if (@oldlist == 0 || (@newlist > 0 &&
                                      $oldlist[0] > $newlist[0])) {
                    $snapshot{$newlist[0]} = SnapShotDeps($newlist[0], $me,
                                                          $target);
                    shift @newlist;
                } elsif (@newlist == 0 || (@oldlist > 0 &&
                                           $newlist[0] > $oldlist[0])) {
                    $snapshot{$oldlist[0]} = SnapShotDeps($oldlist[0], $me,
                                                          $target);
                    shift @oldlist;
                } else {
                    if ($oldlist[0] != $newlist[0]) {
1575
                        $dbh->bz_unlock_tables(UNLOCK_ABORT);
1576 1577 1578 1579 1580 1581 1582 1583 1584 1585 1586 1587 1588 1589
                        die "Error in list comparing code";
                    }
                    shift @oldlist;
                    shift @newlist;
                }
            }
            my @keys = keys(%snapshot);
            if (@keys) {
                my $oldsnap = SnapShotDeps($id, $target, $me);
                SendSQL("delete from dependencies where $me = $id");
                foreach my $i (@{$deps{$target}}) {
                    SendSQL("insert into dependencies ($me, $target) values ($id, $i)");
                }
                foreach my $k (@keys) {
1590
                    LogDependencyActivity($k, $snapshot{$k}, $me, $target, $timestamp);
1591
                }
1592
                LogDependencyActivity($id, $oldsnap, $target, $me, $timestamp);
1593
                $check_dep_bugs = 1;
1594 1595 1596 1597 1598 1599 1600 1601
            }

            my $tmp = $me;
            $me = $target;
            $target = $tmp;
        }
    }

1602 1603 1604 1605 1606
    # When a bug changes products and the old or new product is associated
    # with a bug group, it may be necessary to remove the bug from the old
    # group or add it to the new one.  There are a very specific series of
    # conditions under which these activities take place, more information
    # about which can be found in comments within the conditionals below.
1607
    # Check if the user has changed the product to which the bug belongs;
1608
    if ( 
1609
      defined $::FORM{'product'} 
1610
        && $::FORM{'product'} ne $::FORM{'dontchange'} 
1611 1612
          && $::FORM{'product'} ne $oldhash{'product'} 
    ) {
1613 1614 1615 1616 1617 1618 1619 1620 1621 1622 1623 1624 1625 1626 1627 1628 1629 1630 1631 1632 1633 1634 1635
        my $newproduct_id = get_product_id($::FORM{'product'});
        # Depending on the "addtonewgroup" variable, groups with
        # defaults will change.
        #
        # For each group, determine
        # - The group id and if it is active
        # - The control map value for the old product and this group
        # - The control map value for the new product and this group
        # - Is the user in this group?
        # - Is the bug in this group?
        SendSQL("SELECT DISTINCT groups.id, isactive, " .
                "oldcontrolmap.membercontrol, newcontrolmap.membercontrol, " .
                "user_group_map.user_id IS NOT NULL, " .
                "bug_group_map.group_id IS NOT NULL " .
                "FROM groups " .
                "LEFT JOIN group_control_map AS oldcontrolmap " .
                "ON oldcontrolmap.group_id = groups.id " .
                "AND oldcontrolmap.product_id = " . $oldhash{'product_id'} .
                " LEFT JOIN group_control_map AS newcontrolmap " .
                "ON newcontrolmap.group_id = groups.id " .
                "AND newcontrolmap.product_id = $newproduct_id " .
                "LEFT JOIN user_group_map " .
                "ON user_group_map.group_id = groups.id " .
1636
                "AND user_group_map.user_id = $whoid " .
1637 1638 1639 1640 1641 1642 1643 1644 1645 1646 1647 1648 1649 1650 1651 1652 1653 1654 1655 1656 1657 1658 1659
                "AND user_group_map.isbless = 0 " .
                "LEFT JOIN bug_group_map " .
                "ON bug_group_map.group_id = groups.id " .
                "AND bug_group_map.bug_id = $id "
            );
        my @groupstoremove = ();
        my @groupstoadd = ();
        my @defaultstoremove = ();
        my @defaultstoadd = ();
        my @allgroups = ();
        my $buginanydefault = 0;
        my $buginanychangingdefault = 0;
        while (MoreSQLData()) {
            my ($groupid, $isactive, $oldcontrol, $newcontrol, 
            $useringroup, $bugingroup) = FetchSQLData();
            # An undefined newcontrol is none.
            $newcontrol = CONTROLMAPNA unless $newcontrol;
            $oldcontrol = CONTROLMAPNA unless $oldcontrol;
            push(@allgroups, $groupid);
            if (($bugingroup) && ($isactive)
                && ($oldcontrol == CONTROLMAPDEFAULT)) {
                # Bug was in a default group.
                $buginanydefault = 1;
1660 1661
                if (($newcontrol != CONTROLMAPDEFAULT)
                    && ($newcontrol != CONTROLMAPMANDATORY)) {
1662 1663 1664 1665 1666 1667 1668 1669 1670 1671 1672 1673 1674 1675 1676 1677 1678 1679
                    # Bug was in a default group that no longer is.
                    $buginanychangingdefault = 1;
                    push (@defaultstoremove, $groupid);
                }
            }
            if (($isactive) && (!$bugingroup)
                && ($newcontrol == CONTROLMAPDEFAULT)
                && ($useringroup)) {
                push (@defaultstoadd, $groupid);
            }
            if (($bugingroup) && ($isactive) && ($newcontrol == CONTROLMAPNA)) {
                # Group is no longer permitted.
                push(@groupstoremove, $groupid);
            }
            if ((!$bugingroup) && ($isactive) 
                && ($newcontrol == CONTROLMAPMANDATORY)) {
                # Group is now required.
                push(@groupstoadd, $groupid);
1680
            }
1681
        }
1682 1683 1684 1685 1686 1687 1688 1689 1690 1691 1692 1693 1694
        # If addtonewgroups = "yes", old default groups will be removed
        # and new default groups will be added.
        # If addtonewgroups = "yesifinold", old default groups will be removed
        # and new default groups will be added only if the bug was in ANY
        # of the old default groups.
        # If addtonewgroups = "no", old default groups will be removed and not
        # replaced.
        push(@groupstoremove, @defaultstoremove);
        if (AnyDefaultGroups()
            && (($::FORM{'addtonewgroup'} eq 'yes')
            || (($::FORM{'addtonewgroup'} eq 'yesifinold') 
            && ($buginanydefault)))) {
            push(@groupstoadd, @defaultstoadd);
1695 1696
        }

1697 1698 1699 1700 1701 1702 1703 1704 1705 1706 1707 1708 1709 1710 1711 1712 1713 1714 1715 1716 1717 1718
        # Now actually update the bug_group_map.
        my @DefGroupsAdded = ();
        my @DefGroupsRemoved = ();
        foreach my $groupid (@allgroups) {
            my $thisadd = grep( ($_ == $groupid), @groupstoadd);
            my $thisdel = grep( ($_ == $groupid), @groupstoremove);
            if ($thisadd) {
                push(@DefGroupsAdded, GroupIdToName($groupid));
                SendSQL("INSERT INTO bug_group_map (bug_id, group_id) VALUES " .
                        "($id, $groupid)");
            } elsif ($thisdel) {
                push(@DefGroupsRemoved, GroupIdToName($groupid));
                SendSQL("DELETE FROM bug_group_map WHERE bug_id = $id " .
                        "AND group_id = $groupid");
            }
        }
        if ((@DefGroupsAdded) || (@DefGroupsRemoved)) {
            LogActivityEntry($id, "bug_group",
                join(', ', @DefGroupsRemoved),
                join(', ', @DefGroupsAdded),
                     $whoid, $timestamp); 
        }
1719 1720
    }
  
1721 1722 1723 1724
    # get a snapshot of the newly set values out of the database, 
    # and then generate any necessary bug activity entries by seeing 
    # what has changed since before we wrote out the new values.
    #
1725
    my @newvalues = SnapShotBug($id);
1726 1727 1728 1729 1730 1731 1732 1733
    my %newhash;
    $i = 0;
    foreach my $col (@::log_columns) {
        # Consider NULL db entries to be equivalent to the empty string
        $newvalues[$i] ||= '';
        $newhash{$col} = $newvalues[$i];
        $i++;
    }
1734
    # for passing to Bugzilla::BugMail to ensure that when someone is removed
1735 1736 1737 1738
    # from one of these fields, they get notified of that fact (if desired)
    #
    my $origOwner = "";
    my $origQaContact = "";
1739
    
1740
    foreach my $c (@::log_columns) {
1741 1742
        my $col = $c;           # We modify it, don't want to modify array
                                # values in place.
1743 1744 1745
        my $old = shift @oldvalues;
        my $new = shift @newvalues;
        if ($old ne $new) {
1746

1747 1748 1749 1750 1751 1752 1753 1754 1755 1756 1757 1758 1759
            # Products and components are now stored in the DB using ID's
            # We need to translate this to English before logging it
            if ($col eq 'product_id') {
                $old = get_product_name($old);
                $new = get_product_name($new);
                $col = 'product';
            }
            if ($col eq 'component_id') {
                $old = get_component_name($old);
                $new = get_component_name($new);
                $col = 'component';
            }

1760 1761
            # save off the old value for passing to Bugzilla::BugMail so
            # the old owner can be notified
1762 1763 1764 1765 1766 1767 1768 1769 1770 1771
            #
            if ($col eq 'assigned_to') {
                $old = ($old) ? DBID_to_name($old) : "";
                $new = ($new) ? DBID_to_name($new) : "";
                $origOwner = $old;
            }

            # ditto for the old qa contact
            #
            if ($col eq 'qa_contact') {
1772 1773
                $old = ($old) ? DBID_to_name($old) : "";
                $new = ($new) ? DBID_to_name($new) : "";
1774
                $origQaContact = $old;
terry%netscape.com's avatar
terry%netscape.com committed
1775
            }
1776

1777 1778
            # If this is the keyword field, only record the changes, not everything.
            if ($col eq 'keywords') {
1779
                ($old, $new) = diff_strings($old, $new);
1780 1781
            }

1782
            if ($col eq 'product') {
1783
                RemoveVotes($id, 0,
1784 1785
                            "This bug has been moved to a different product");
            }
1786 1787 1788 1789 1790 1791
            
            if ($col eq 'bug_status' 
                && IsOpenedState($old) ne IsOpenedState($new))
            {
                $check_dep_bugs = 1;
            }
1792 1793 1794 1795 1796 1797 1798 1799 1800 1801 1802

            # Convert deadlines to the YYYY-MM-DD format. We use an
            # intermediate $xxxtime to prevent errors in the web
            # server log file when str2time($xxx) is undefined.
            if ($col eq 'deadline') {
                my $oldtime = str2time($old);
                $old = ($oldtime) ? time2str("%Y-%m-%d", $oldtime) : '';
                my $newtime = str2time($new);
                $new = ($newtime) ? time2str("%Y-%m-%d", $newtime) : '';
            }

1803 1804
            LogActivityEntry($id,$col,$old,$new,$whoid,$timestamp);
            $bug_changed = 1;
terry%netscape.com's avatar
terry%netscape.com committed
1805 1806
        }
    }
1807 1808 1809 1810 1811
    # Set and update flags.
    if ($UserInEditGroupSet) {
        my $target = Bugzilla::Flag::GetTarget($id);
        Bugzilla::Flag::process($target, $timestamp, \%::FORM);
    }
1812
    if ($bug_changed) {
1813
        SendSQL("UPDATE bugs SET delta_ts = $sql_timestamp WHERE bug_id = $id");
1814
    }
1815
    $dbh->bz_unlock_tables();
1816

1817 1818 1819
    $vars->{'mailrecipients'} = { 'cc' => \@ccRemoved,
                                  'owner' => $origOwner,
                                  'qa' => $origQaContact,
1820
                                  'changer' => Bugzilla->user->login };
1821 1822 1823 1824 1825

    $vars->{'id'} = $id;
    
    # Let the user know the bug was changed and who did and didn't
    # receive email about the change.
1826
    $template->process("bug/process/results.html.tmpl", $vars)
1827
      || ThrowTemplateError($template->error());
1828
    $vars->{'header_done'} = 1;
1829
    
1830 1831 1832 1833 1834 1835 1836 1837
    if ($duplicate) {
        # Check to see if Reporter of this bug is reporter of Dupe 
        SendSQL("SELECT reporter FROM bugs WHERE bug_id = " . SqlQuote($::FORM{'id'}));
        my $reporter = FetchOneColumn();
        SendSQL("SELECT reporter FROM bugs WHERE bug_id = " . SqlQuote($duplicate) . " and reporter = $reporter");
        my $isreporter = FetchOneColumn();
        SendSQL("SELECT who FROM cc WHERE bug_id = " . SqlQuote($duplicate) . " and who = $reporter");
        my $isoncc = FetchOneColumn();
1838
        unless ($isreporter || $isoncc || ! $::FORM{'confirm_add_duplicate'}) {
matty%chariot.net.au's avatar
matty%chariot.net.au committed
1839
            # The reporter is oblivious to the existence of the new bug and is permitted access
1840
            # ... add 'em to the cc (and record activity)
1841 1842
            LogActivityEntry($duplicate,"cc","",DBID_to_name($reporter),
                             $whoid,$timestamp);
1843 1844
            SendSQL("INSERT INTO cc (who, bug_id) VALUES ($reporter, " . SqlQuote($duplicate) . ")");
        }
1845
        # Bug 171639 - Duplicate notifications do not need to be private. 
1846 1847 1848 1849
        AppendComment($duplicate, Bugzilla->user->login,
                      "*** Bug $::FORM{'id'} has been marked as a duplicate of this bug. ***",
                      0, $timestamp);

1850
        CheckFormFieldDefined(\%::FORM,'comment');
1851
        SendSQL("INSERT INTO duplicates VALUES ($duplicate, $::FORM{'id'})");
1852
        
1853
        $vars->{'mailrecipients'} = { 'changer' => Bugzilla->user->login }; 
1854

1855 1856 1857 1858
        $vars->{'id'} = $duplicate;
        $vars->{'type'} = "dupe";
        
        # Let the user know a duplication notation was added to the original bug.
1859
        $template->process("bug/process/results.html.tmpl", $vars)
1860
          || ThrowTemplateError($template->error());
1861
        $vars->{'header_done'} = 1;
1862 1863
    }

1864 1865
    if ($check_dep_bugs) {
        foreach my $k (keys(%dependencychanged)) {
1866
            $vars->{'mailrecipients'} = { 'changer' => Bugzilla->user->login }; 
1867 1868 1869 1870 1871 1872 1873 1874
            $vars->{'id'} = $k;
            $vars->{'type'} = "dep";

            # Let the user know we checked to see if we should email notice
            # of this change to users with a relationship to the dependent
            # bug and who did and didn't receive email about it.
            $template->process("bug/process/results.html.tmpl", $vars)
              || ThrowTemplateError($template->error());
1875
            $vars->{'header_done'} = 1;
1876
        }
1877
    }
terry%netscape.com's avatar
terry%netscape.com committed
1878 1879
}

1880 1881
# now show the next bug
if ($next_bug) {
1882
    if (detaint_natural($next_bug) && Bugzilla->user->can_see_bug($next_bug)) {
1883
        my $bug = new Bugzilla::Bug($next_bug, $whoid);
1884
        ThrowCodeError("bug_error", { bug => $bug }) if $bug->error;
1885

1886 1887 1888
        # next.html.tmpl includes edit.html.tmpl, and therefore we
        # need $bug defined in $vars.
        $vars->{'bug'} = $bug;
1889 1890 1891 1892 1893 1894 1895 1896

        # And we need to determine if Patch Viewer is installed, for
        # Diff link (NB: Duplicate code with show_bug.cgi.)
        eval {
            require PatchReader;
            $vars->{'patchviewerinstalled'} = 1;
        };

1897 1898
        $template->process("bug/process/next.html.tmpl", $vars)
          || ThrowTemplateError($template->error());
1899

1900
        exit;
1901
    }
terry%netscape.com's avatar
terry%netscape.com committed
1902
}
1903

1904
# End the response page.
1905
$template->process("bug/navigate.html.tmpl", $vars)
1906
  || ThrowTemplateError($template->error());
1907
$template->process("global/footer.html.tmpl", $vars)
1908
  || ThrowTemplateError($template->error());