process_bug.cgi 85.2 KB
Newer Older
1
#!/usr/bin/perl -wT
2
# -*- Mode: perl; indent-tabs-mode: nil -*-
terry%netscape.com's avatar
terry%netscape.com committed
3
#
4 5 6 7 8 9 10 11 12 13
# The contents of this file are subject to the Mozilla Public
# License Version 1.1 (the "License"); you may not use this file
# except in compliance with the License. You may obtain a copy of
# the License at http://www.mozilla.org/MPL/
#
# Software distributed under the License is distributed on an "AS
# IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or
# implied. See the License for the specific language governing
# rights and limitations under the License.
#
terry%netscape.com's avatar
terry%netscape.com committed
14
# The Original Code is the Bugzilla Bug Tracking System.
15
#
terry%netscape.com's avatar
terry%netscape.com committed
16
# The Initial Developer of the Original Code is Netscape Communications
17 18 19 20
# Corporation. Portions created by Netscape are
# Copyright (C) 1998 Netscape Communications Corporation. All
# Rights Reserved.
#
terry%netscape.com's avatar
terry%netscape.com committed
21
# Contributor(s): Terry Weissman <terry@mozilla.org>
22
#                 Dan Mosedale <dmose@mozilla.org>
23
#                 Dave Miller <justdave@syndicomm.com>
24
#                 Christopher Aillon <christopher@aillon.com>
25
#                 Myk Melez <myk@mozilla.org>
26
#                 Jeff Hedlund <jeff.hedlund@matrixsi.com>
27
#                 Frédéric Buclin <LpSolit@gmail.com>
28
#                 Lance Larsh <lance.larsh@oracle.com>
29
#                 Akamai Technologies <bugzilla-dev@akamai.com>
terry%netscape.com's avatar
terry%netscape.com committed
30

31 32 33 34 35 36 37 38 39 40 41 42
# Implementation notes for this file:
#
# 1) the 'id' form parameter is validated early on, and if it is not a valid
# bugid an error will be reported, so it is OK for later code to simply check
# for a defined form 'id' value, and it can assume a valid bugid.
#
# 2) If the 'id' form parameter is not defined (after the initial validation),
# then we are processing multiple bugs, and @idlist will contain the ids.
#
# 3) If we are processing just the one id, then it is stored in @idlist for
# later processing.

43 44
use strict;

45 46
use lib qw(.);

47
use Bugzilla;
48
use Bugzilla::Constants;
49
use Bugzilla::Bug;
50
use Bugzilla::BugMail;
51
use Bugzilla::Mailer;
52
use Bugzilla::User;
53
use Bugzilla::Util;
54
use Bugzilla::Error;
55
use Bugzilla::Field;
56
use Bugzilla::Product;
57
use Bugzilla::Component;
58
use Bugzilla::Keyword;
59 60
use Bugzilla::Flag;

61
my $user = Bugzilla->login(LOGIN_REQUIRED);
62
local our $whoid = $user->id;
63
my $grouplist = $user->groups_as_string;
64

65
my $cgi = Bugzilla->cgi;
66
my $dbh = Bugzilla->dbh;
67
my $template = Bugzilla->template;
68
local our $vars = {};
69
$vars->{'use_keywords'} = 1 if Bugzilla::Keyword::keyword_count();
70

71 72
my @editable_bug_fields = editable_bug_fields();

73
my $requiremilestone = 0;
74
local our $PrivilegesRequired = 0;
75

76 77 78 79 80 81 82 83 84 85 86 87 88 89 90
######################################################################
# Subroutines
######################################################################

sub BugInGroupId {
    my ($bug_id, $group_id) = @_;
    detaint_natural($bug_id);
    detaint_natural($group_id);
    my ($in_group) = Bugzilla->dbh->selectrow_array(
        "SELECT CASE WHEN bug_id != 0 THEN 1 ELSE 0 END
           FROM bug_group_map
          WHERE bug_id = ? AND group_id = ?", undef, ($bug_id, $group_id));
    return $in_group;
}

91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107
# This function checks if there are any default groups defined.
# If so, then groups may have to be changed when bugs move from
# one bug to another.
sub AnyDefaultGroups {
    my $dbh = Bugzilla->dbh;
    my $any_default =
        $dbh->selectrow_array('SELECT 1
                                 FROM group_control_map
                           INNER JOIN groups
                                   ON groups.id = group_control_map.group_id
                                WHERE isactive != 0
                                  AND (membercontrol = ? OR othercontrol = ?) ' .
                                 $dbh->sql_limit(1),
                                 undef, (CONTROLMAPDEFAULT, CONTROLMAPDEFAULT));
    return $any_default;
}

108 109 110 111 112 113 114 115 116 117 118 119 120 121
# Used to send email when an update is done.
sub send_results {
    my ($bug_id, $vars) = @_;
    my $template = Bugzilla->template;
    if (Bugzilla->usage_mode == USAGE_MODE_EMAIL) {
         Bugzilla::BugMail::Send($bug_id, $vars->{'mailrecipients'});
    }
    else {
        $template->process("bug/process/results.html.tmpl", $vars)
            || ThrowTemplateError($template->error());
    }
    $vars->{'header_done'} = 1;
}

122 123 124 125 126 127 128 129
######################################################################
# Begin Data/Security Validation
######################################################################

# Create a list of IDs of all bugs being modified in this request.
# This list will either consist of a single bug number from the "id"
# form/URL field or a series of numbers from multiple form/URL fields
# named "id_x" where "x" is the bug number.
130 131
# For each bug being modified, make sure its ID is a valid bug number 
# representing an existing bug that the user is authorized to access.
132
my @idlist;
133 134 135 136 137 138 139 140
if (defined $cgi->param('id')) {
  my $id = $cgi->param('id');
  ValidateBugID($id);

  # Store the validated, and detainted id back in the cgi data, as
  # lots of later code will need it, and will obtain it from there
  $cgi->param('id', $id);
  push @idlist, $id;
141
} else {
142
    foreach my $i ($cgi->param()) {
143
        if ($i =~ /^id_([1-9][0-9]*)/) {
144 145 146
            my $id = $1;
            ValidateBugID($id);
            push @idlist, $id;
147
        }
148 149 150
    }
}

151
# Make sure there are bugs to process.
152
scalar(@idlist) || ThrowUserError("no_bugs_chosen");
153

154 155 156
# Build a bug object using $cgi->param('id') as ID.
# If there are more than one bug changed at once, the bug object will be
# empty, which doesn't matter.
157
my $bug = new Bugzilla::Bug(scalar $cgi->param('id'));
158

159 160
# Make sure form param 'dontchange' is defined so it can be compared to easily.
$cgi->param('dontchange','') unless defined $cgi->param('dontchange');
161

162 163 164
# Make sure the 'knob' param is defined; else set it to 'none'.
$cgi->param('knob', 'none') unless defined $cgi->param('knob');

165 166
# Validate all timetracking fields
foreach my $field ("estimated_time", "work_time", "remaining_time") {
167 168 169
    if (defined $cgi->param($field)) {
        my $er_time = trim($cgi->param($field));
        if ($er_time ne $cgi->param('dontchange')) {
170 171 172 173 174
            Bugzilla::Bug::ValidateTime($er_time, $field);
        }
    }
}

175
if (Bugzilla->user->in_group(Bugzilla->params->{'timetrackinggroup'})) {
176 177
    my $wk_time = $cgi->param('work_time');
    if ($cgi->param('comment') =~ /^\s*$/ && $wk_time && $wk_time != 0) {
178
        ThrowUserError('comment_required');
179
    }
180 181
}

182
ValidateComment(scalar $cgi->param('comment'));
183

184 185 186 187 188 189 190
# If the bug(s) being modified have dependencies, validate them
# and rebuild the list with the validated values.  This is important
# because there are situations where validation changes the value
# instead of throwing an error, f.e. when one or more of the values
# is a bug alias that gets converted to its corresponding bug ID
# during validation.
foreach my $field ("dependson", "blocked") {
191 192 193
    if ($cgi->param('id')) {
        my @old = @{$bug->$field};
        my @new;
194
        foreach my $id (split(/[\s,]+/, $cgi->param($field))) {
195
            next unless $id;
196
            ValidateBugID($id, $field);
197
            push @new, $id;
198
        }
199 200 201 202 203 204
        $cgi->param($field, join(",", @new));
        my ($added, $removed) = Bugzilla::Util::diff_arrays(\@old, \@new);
        foreach my $id (@$added , @$removed) {
            # ValidateBugID is called without $field here so that it will
            # throw an error if any of the changed bugs are not visible.
            ValidateBugID($id);
205
            if (Bugzilla->params->{"strict_isolation"}) {
206
                my $deltabug = new Bugzilla::Bug($id);
207 208 209 210 211
                if (!$user->can_edit_product($deltabug->{'product_id'})) {
                    $vars->{'field'} = $field;
                    ThrowUserError("illegal_change_deps", $vars);
                }
            }
212
        }
213 214 215
        if ((@$added || @$removed)
            && !$bug->check_can_change_field($field, 0, 1, \$PrivilegesRequired))
        {
216 217 218 219
            $vars->{'privs'} = $PrivilegesRequired;
            $vars->{'field'} = $field;
            ThrowUserError("illegal_change", $vars);
        }
220 221 222 223 224
    } else {
        # Bugzilla does not support mass-change of dependencies so they
        # are not validated.  To prevent a URL-hacking risk, the dependencies
        # are deleted for mass-changes.
        $cgi->delete($field);
225 226 227
    }
}

228 229
# do a match on the fields if applicable

230 231
# The order of these function calls is important, as Flag::validate
# assumes User::match_field has ensured that the values
232
# in the requestee fields are legitimate user email addresses.
233
&Bugzilla::User::match_field($cgi, {
234 235 236 237
    'qa_contact'                => { 'type' => 'single' },
    'newcc'                     => { 'type' => 'multi'  },
    'masscc'                    => { 'type' => 'multi'  },
    'assigned_to'               => { 'type' => 'single' },
238
    '^requestee(_type)?-(\d+)$' => { 'type' => 'multi'  },
239
});
240 241 242 243

# Validate flags in all cases. validate() should not detect any
# reference to flags if $cgi->param('id') is undefined.
Bugzilla::Flag::validate($cgi, $cgi->param('id'));
244

245 246 247 248
######################################################################
# End Data/Security Validation
######################################################################

249
print $cgi->header() unless Bugzilla->usage_mode == USAGE_MODE_EMAIL;
250
$vars->{'title_tag'} = "bug_processed";
251 252 253 254

# Set the title if we can see a mid-air coming. This test may have false
# negatives, but never false positives, and should catch the majority of cases.
# It only works at all in the single bug case.
255
if (defined $cgi->param('id')) {
256 257 258
    my $delta_ts = $dbh->selectrow_array(
        q{SELECT delta_ts FROM bugs WHERE bug_id = ?},
        undef, $cgi->param('id'));
259
    
260
    if (defined $cgi->param('delta_ts') && $cgi->param('delta_ts') ne $delta_ts)
261
    {
262
        $vars->{'title_tag'} = "mid_air";
263 264
    }
}
265

266
# Set up the vars for navigational <link> elements
267
my @bug_list;
268
if ($cgi->cookie("BUGLIST") && defined $cgi->param('id')) {
269
    @bug_list = split(/:/, $cgi->cookie("BUGLIST"));
270 271 272
    $vars->{'bug_list'} = \@bug_list;
}

273 274
# This function checks if there is a comment required for a specific
# function and tests, if the comment was given.
275
# If comments are required for functions is defined by params.
276
#
277
sub CheckonComment {
278
    my ($function) = (@_);
279
    my $cgi = Bugzilla->cgi;
280 281
    
    # Param is 1 if comment should be added !
282
    my $ret = Bugzilla->params->{ "commenton" . $function };
283 284 285 286 287

    # Allow without comment in case of undefined Params.
    $ret = 0 unless ( defined( $ret ));

    if( $ret ) {
288 289
        if (!defined $cgi->param('comment')
            || $cgi->param('comment') =~ /^\s*$/) {
290
            # No comment - sorry, action not allowed !
291
            ThrowUserError("comment_required");
292 293 294 295 296 297 298
        } else {
            $ret = 0;
        }
    }
    return( ! $ret ); # Return val has to be inverted
}

299 300 301 302 303
# Figure out whether or not the user is trying to change the product
# (either the "product" variable is not set to "don't change" or the
# user is changing a single bug and has changed the bug's product),
# and make the user verify the version, component, target milestone,
# and bug groups if so.
304 305
my $oldproduct = '';
if (defined $cgi->param('id')) {
306 307 308 309
    $oldproduct = $dbh->selectrow_array(
        q{SELECT name FROM products INNER JOIN bugs
        ON products.id = bugs.product_id WHERE bug_id = ?},
        undef, $cgi->param('id'));
310
}
311

312 313 314 315
# At this point, the product must be defined, even if set to "dontchange".
defined($cgi->param('product'))
  || ThrowCodeError('undefined_field', { field => 'product' });

316 317 318
if (((defined $cgi->param('id') && $cgi->param('product') ne $oldproduct) 
     || (!$cgi->param('id')
         && $cgi->param('product') ne $cgi->param('dontchange')))
319 320
    && CheckonComment( "reassignbycomponent" ))
{
321
    # Check to make sure they actually have the right to change the product
322 323 324
    if (!$bug->check_can_change_field('product', $oldproduct, $cgi->param('product'),
                                      \$PrivilegesRequired))
    {
325 326
        $vars->{'oldvalue'} = $oldproduct;
        $vars->{'newvalue'} = $cgi->param('product');
327
        $vars->{'field'} = 'product';
328
        $vars->{'privs'} = $PrivilegesRequired;
329
        ThrowUserError("illegal_change", $vars);
330
    }
331

332
    my $prod = $cgi->param('product');
333
    my $prod_obj = new Bugzilla::Product({name => $prod});
334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350
    trick_taint($prod);

    # If at least one bug does not belong to the product we are
    # moving to, we have to check whether or not the user is
    # allowed to enter bugs into that product.
    # Note that this check must be done early to avoid the leakage
    # of component, version and target milestone names.
    my $check_can_enter =
        $dbh->selectrow_array("SELECT 1 FROM bugs
                               INNER JOIN products
                               ON bugs.product_id = products.id
                               WHERE products.name != ?
                               AND bugs.bug_id IN
                               (" . join(',', @idlist) . ") " .
                               $dbh->sql_limit(1),
                               undef, $prod);

351
    if ($check_can_enter) { $user->can_enter_product($prod, 1) }
352 353 354 355 356 357 358 359 360

    # note that when this script is called from buglist.cgi (rather
    # than show_bug.cgi), it's possible that the product will be changed
    # but that the version and/or component will be set to 
    # "--dont_change--" but still happen to be correct.  in this case,
    # the if statement will incorrectly trigger anyway.  this is a 
    # pretty weird case, and not terribly unreasonable behavior, but 
    # worthy of a comment, perhaps.
    #
361
    my @version_names = map($_->name, @{$prod_obj->versions});
362
    my @component_names = map($_->name, @{$prod_obj->components});
363 364 365 366 367 368 369 370
    my $vok = 0;
    if (defined $cgi->param('version')) {
        $vok = lsearch(\@version_names, $cgi->param('version')) >= 0;
    }
    my $cok = 0;
    if (defined $cgi->param('component')) {
        $cok = lsearch(\@component_names, $cgi->param('component')) >= 0;
    }
371 372

    my $mok = 1;   # so it won't affect the 'if' statement if milestones aren't used
373
    my @milestone_names = ();
374
    if ( Bugzilla->params->{"usetargetmilestone"} ) {
375
       @milestone_names = map($_->name, @{$prod_obj->milestones});
376 377 378 379
       $mok = 0;
       if (defined $cgi->param('target_milestone')) {
           $mok = lsearch(\@milestone_names, $cgi->param('target_milestone')) >= 0;
       }
380 381
    }

382 383 384 385 386 387 388 389
    # We cannot be sure if the component is the same by only checking $cok; the
    # current component name could exist in the new product. So always display
    # the form and use the confirm_product_change param to check if that was
    # shown. Also show the verification form if the product-specific fields
    # somehow still need to be verified, or if we need to verify whether or not
    # to add the bugs to their new product's group.
    if (!$vok || !$cok || !$mok || !defined $cgi->param('confirm_product_change')
        || (AnyDefaultGroups() && !defined $cgi->param('addtonewgroup'))) {
390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407

        if (Bugzilla->usage_mode == USAGE_MODE_EMAIL) {
            if (!$vok) {
                ThrowUserError('version_not_valid', {
                    version => $cgi->param('version'),
                    product => $cgi->param('product')});
            }
            if (!$cok) {
                ThrowUserError('component_not_valid', {
                    product => $cgi->param('product'),
                    name    => $cgi->param('component')});
            }
            if (!$mok) {
                ThrowUserError('milestone_not_valid', {
                    product   => $cgi->param('product'),
                    milestone => $cgi->param('target_milestone')});
            }
        }
408
        
409 410 411
        if (!$vok || !$cok || !$mok
            || !defined $cgi->param('confirm_product_change'))
        {
412
            $vars->{'verify_fields'} = 1;
413 414
            my %defaults;
            # We set the defaults to these fields to the old value,
415
            # if it's a valid option, otherwise we use the default where
416
            # that's appropriate
417
            $vars->{'versions'} = \@version_names;
418
            if ($vok) {
419
                $defaults{'version'} = $cgi->param('version');
420
            }
421 422 423 424
            elsif (scalar(@version_names) == 1) {
                $defaults{'version'} = $version_names[0];
            }

425
            $vars->{'components'} = \@component_names;
426
            if ($cok) {
427
                $defaults{'component'} = $cgi->param('component');
428
            }
429 430 431 432
            elsif (scalar(@component_names) == 1) {
                $defaults{'component'} = $component_names[0];
            }

433
            if (Bugzilla->params->{"usetargetmilestone"}) {
434
                $vars->{'use_target_milestone'} = 1;
435
                $vars->{'milestones'} = \@milestone_names;
436
                if ($mok) {
437
                    $defaults{'target_milestone'} = $cgi->param('target_milestone');
438
                } else {
439 440 441
                    $defaults{'target_milestone'} = $dbh->selectrow_array(
                        q{SELECT defaultmilestone FROM products 
                        WHERE name = ?}, undef, $prod);
442
                }
443
            }
444 445
            else {
                $vars->{'use_target_milestone'} = 0;
terry%netscape.com's avatar
terry%netscape.com committed
446
            }
447
            $vars->{'defaults'} = \%defaults;
448
        }
449
        else {
450
            $vars->{'verify_fields'} = 0;
terry%netscape.com's avatar
terry%netscape.com committed
451
        }
452
        
453
        $vars->{'verify_bug_group'} = (AnyDefaultGroups() 
454
                                       && !defined $cgi->param('addtonewgroup'));
455
        
456
        $template->process("bug/process/verify-new-product.html.tmpl", $vars)
457
          || ThrowTemplateError($template->error());
458
        exit;
terry%netscape.com's avatar
terry%netscape.com committed
459 460 461
    }
}

462 463 464 465
# At this point, the component must be defined, even if set to "dontchange".
defined($cgi->param('component'))
  || ThrowCodeError('undefined_field', { field => 'component' });

466 467
# Confirm that the reporter of the current bug can access the bug we are duping to.
sub DuplicateUserConfirm {
468 469 470 471
    my $cgi = Bugzilla->cgi;
    my $dbh = Bugzilla->dbh;
    my $template = Bugzilla->template;

472
    # if we've already been through here, then exit
473
    if (defined $cgi->param('confirm_add_duplicate')) {
474 475 476
        return;
    }

477 478 479 480
    # Remember that we validated both these ids earlier, so we know
    # they are both valid bug ids
    my $dupe = $cgi->param('id');
    my $original = $cgi->param('dup_id');
481
    
482 483
    my $reporter = $dbh->selectrow_array(
        q{SELECT reporter FROM bugs WHERE bug_id = ?}, undef, $dupe);
484
    my $rep_user = Bugzilla::User->new($reporter);
485

486
    if ($rep_user->can_see_bug($original)) {
487
        $cgi->param('confirm_add_duplicate', '1');
488 489
        return;
    }
490 491 492 493 494 495
    elsif (Bugzilla->usage_mode == USAGE_MODE_EMAIL) {
        # The email interface defaults to the safe alternative, which is
        # not CC'ing the user.
        $cgi->param('confirm_add_duplicate', 0);
        return;
    }
496

497 498 499
    $vars->{'cclist_accessible'} = $dbh->selectrow_array(
        q{SELECT cclist_accessible FROM bugs WHERE bug_id = ?},
        undef, $original);
500
    
501 502 503
    # Once in this part of the subroutine, the user has not been auto-validated
    # and the duper has not chosen whether or not to add to CC list, so let's
    # ask the duper what he/she wants to do.
504
    
505 506 507 508 509
    $vars->{'original_bug_id'} = $original;
    $vars->{'duplicate_bug_id'} = $dupe;
    
    # Confirm whether or not to add the reporter to the cc: list
    # of the original bug (the one this bug is being duped against).
510
    print Bugzilla->cgi->header();
511
    $template->process("bug/process/confirm-duplicate.html.tmpl", $vars)
512
      || ThrowTemplateError($template->error());
513
    exit;
514
}
515

516
if (defined $cgi->param('id')) {
517 518 519 520 521 522
    # since this means that we were called from show_bug.cgi, now is a good
    # time to do a whole bunch of error checking that can't easily happen when
    # we've been called from buglist.cgi, because buglist.cgi only tweaks
    # values that have been changed instead of submitting all the new values.
    # (XXX those error checks need to happen too, but implementing them 
    # is more work in the current architecture of this script...)
523
    my $prod_obj = Bugzilla::Product::check_product($cgi->param('product'));
524
    check_field('component', scalar $cgi->param('component'), 
525
                [map($_->name, @{$prod_obj->components})]);
526
    check_field('version', scalar $cgi->param('version'),
527
                [map($_->name, @{$prod_obj->versions})]);
528
    if ( Bugzilla->params->{"usetargetmilestone"} ) {
529
        check_field('target_milestone', scalar $cgi->param('target_milestone'), 
530
                    [map($_->name, @{$prod_obj->milestones})]);
531
    }
532 533 534 535
    check_field('rep_platform', scalar $cgi->param('rep_platform'));
    check_field('op_sys',       scalar $cgi->param('op_sys'));
    check_field('priority',     scalar $cgi->param('priority'));
    check_field('bug_severity', scalar $cgi->param('bug_severity'));
536 537 538 539 540 541

    # Those fields only have to exist. We don't validate their value here.
    foreach my $field_name ('bug_file_loc', 'short_desc', 'longdesclength') {
        defined($cgi->param($field_name))
          || ThrowCodeError('undefined_field', { field => $field_name });
    }
542
    $cgi->param('short_desc', clean_text($cgi->param('short_desc')));
543

544
    if (trim($cgi->param('short_desc')) eq "") {
545
        ThrowUserError("require_summary");
546
    }
terry%netscape.com's avatar
terry%netscape.com committed
547 548
}

549 550
my $action = trim($cgi->param('action') || '');

551 552
if ($action eq Bugzilla->params->{'move-button-text'}) {
    Bugzilla->params->{'move-enabled'} || ThrowUserError("move_bugs_disabled");
553

554 555
    $user->is_mover || ThrowUserError("auth_failure", {action => 'move',
                                                       object => 'bugs'});
556 557 558 559 560 561 562 563 564 565 566 567

    # Moved bugs are marked as RESOLVED MOVED.
    my $sth = $dbh->prepare("UPDATE bugs
                                SET bug_status = 'RESOLVED',
                                    resolution = 'MOVED',
                                    delta_ts = ?
                              WHERE bug_id = ?");
    # Bugs cannot be a dupe and moved at the same time.
    my $sth2 = $dbh->prepare("DELETE FROM duplicates WHERE dupe = ?");

    my $comment = "";
    if (defined $cgi->param('comment') && $cgi->param('comment') !~ /^\s*$/) {
568
        $comment = $cgi->param('comment');
569 570 571 572 573 574 575 576 577 578 579 580 581
    }

    $dbh->bz_lock_tables('bugs WRITE', 'bugs_activity WRITE', 'duplicates WRITE',
                         'longdescs WRITE', 'profiles READ', 'groups READ',
                         'bug_group_map READ', 'group_group_map READ',
                         'user_group_map READ', 'classifications READ',
                         'products READ', 'components READ', 'votes READ',
                         'cc READ', 'fielddefs READ');

    my $timestamp = $dbh->selectrow_array("SELECT NOW()");
    my @bugs;
    # First update all moved bugs.
    foreach my $id (@idlist) {
582
        my $bug = new Bugzilla::Bug($id);
583 584 585 586 587
        push(@bugs, $bug);

        $sth->execute($timestamp, $id);
        $sth2->execute($id);

588
        AppendComment($id, $whoid, $comment, 0, $timestamp, 0, CMT_MOVED_TO, $user->login);
589 590 591 592 593 594 595 596 597 598 599 600 601 602

        if ($bug->bug_status ne 'RESOLVED') {
            LogActivityEntry($id, 'bug_status', $bug->bug_status,
                             'RESOLVED', $whoid, $timestamp);
        }
        if ($bug->resolution ne 'MOVED') {
            LogActivityEntry($id, 'resolution', $bug->resolution,
                             'MOVED', $whoid, $timestamp);
        }
    }
    $dbh->bz_unlock_tables();

    # Now send emails.
    foreach my $id (@idlist) {
603
        $vars->{'mailrecipients'} = { 'changer' => $user->login };
604 605
        $vars->{'id'} = $id;
        $vars->{'type'} = "move";
606
        send_results($id, $vars);
607 608
    }
    # Prepare and send all data about these bugs to the new database
609
    my $to = Bugzilla->params->{'move-to-address'};
610
    $to =~ s/@/\@/;
611
    my $from = Bugzilla->params->{'moved-from-address'};
612 613 614 615 616
    $from =~ s/@/\@/;
    my $msg = "To: $to\n";
    $msg .= "From: Bugzilla <" . $from . ">\n";
    $msg .= "Subject: Moving bug(s) " . join(', ', @idlist) . "\n\n";

617
    my @fieldlist = (Bugzilla::Bug->fields, 'group', 'long_desc',
618
                     'attachment', 'attachmentdata');
619 620 621 622 623 624 625 626 627 628 629
    my %displayfields;
    foreach (@fieldlist) {
        $displayfields{$_} = 1;
    }

    $template->process("bug/show.xml.tmpl", { bugs => \@bugs,
                                              displayfields => \%displayfields,
                                            }, \$msg)
      || ThrowTemplateError($template->error());

    $msg .= "\n";
630
    MessageToMTA($msg);
631 632

    # End the response page.
633 634 635 636 637 638
    unless (Bugzilla->usage_mode == USAGE_MODE_EMAIL) {
        $template->process("bug/navigate.html.tmpl", $vars)
            || ThrowTemplateError($template->error());
        $template->process("global/footer.html.tmpl", $vars)
            || ThrowTemplateError($template->error());
    }
639
    exit;
640 641 642
}


643
$::query = "UPDATE bugs SET";
644
$::comma = "";
645
local our @values;
646 647
umask(0);

648
sub _remove_remaining_time {
649
    my $cgi = Bugzilla->cgi;
650
    if (Bugzilla->user->in_group(Bugzilla->params->{'timetrackinggroup'})) {
651 652
        if ( defined $cgi->param('remaining_time') 
             && $cgi->param('remaining_time') > 0 )
653
        {
654
            $cgi->param('remaining_time', 0);
655 656 657 658 659 660 661 662 663
            $vars->{'message'} = "remaining_time_zeroed";
        }
    }
    else {
        DoComma();
        $::query .= "remaining_time = 0";
    }
}

664 665 666
sub DoComma {
    $::query .= "$::comma\n    ";
    $::comma = ",";
terry%netscape.com's avatar
terry%netscape.com committed
667 668
}

669 670
# $everconfirmed is used by ChangeStatus() to determine whether we are
# confirming the bug or not.
671
local our $everconfirmed;
672
sub DoConfirm {
673 674 675 676
    my $bug = shift;
    if ($bug->check_can_change_field("canconfirm", 0, 1, 
                                     \$PrivilegesRequired)) 
    {
677 678
        DoComma();
        $::query .= "everconfirmed = 1";
679
        $everconfirmed = 1;
680 681 682
    }
}

683 684
sub ChangeStatus {
    my ($str) = (@_);
685 686 687
    my $cgi = Bugzilla->cgi;
    my $dbh = Bugzilla->dbh;

688 689
    if (!$cgi->param('dontchange')
        || $str ne $cgi->param('dontchange')) {
690
        DoComma();
691
        if ($cgi->param('knob') eq 'reopen') {
692 693
            # When reopening, we need to check whether the bug was ever
            # confirmed or not
694
            $::query .= "bug_status = CASE WHEN everconfirmed = 1 THEN " .
695
                        $dbh->quote($str) . " ELSE 'UNCONFIRMED' END";
696
        } elsif (is_open_state($str)) {
697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717
            # Note that we cannot combine this with the above branch - here we
            # need to check if bugs.bug_status is open, (since we don't want to
            # reopen closed bugs when reassigning), while above the whole point
            # is to reopen a closed bug.
            # Currently, the UI doesn't permit a user to reassign a closed bug
            # from the single bug page (only during a mass change), but they
            # could still hack the submit, so don't restrict this extended
            # check to the mass change page for safety/sanity/consistency
            # purposes.

            # The logic for this block is:
            # If the new state is open:
            #   If the old state was open
            #     If the bug was confirmed
            #       - move it to the new state
            #     Else
            #       - Set the state to unconfirmed
            #   Else
            #     - leave it as it was

            # This is valid only because 'reopen' is the only thing which moves
718
            # from closed to open, and it's handled above
719 720 721
            # This also relies on the fact that confirming and accepting have
            # already called DoConfirm before this is called

722
            my @open_state = map($dbh->quote($_), BUG_STATE_OPEN);
723
            my $open_state = join(", ", @open_state);
724 725 726

            # If we are changing everconfirmed to 1, we have to take this change
            # into account and the new bug status is given by $str.
727
            my $cond = $dbh->quote($str);
728 729 730 731 732 733
            # If we are not setting everconfirmed, the new bug status depends on
            # the actual value of everconfirmed, which is bug-specific.
            unless ($everconfirmed) {
                $cond = "(CASE WHEN everconfirmed = 1 THEN " . $cond .
                        " ELSE 'UNCONFIRMED' END)";
            }
734
            $::query .= "bug_status = CASE WHEN bug_status IN($open_state) THEN " .
735
                                      $cond . " ELSE bug_status END";
736
        } else {
737 738
            $::query .= "bug_status = ?";
            push(@values, $str);
739
        }
740 741 742
        # If bugs are reassigned and their status is "UNCONFIRMED", they
        # should keep this status instead of "NEW" as suggested here.
        # This point is checked for each bug later in the code.
743
        $cgi->param('bug_status', $str);
terry%netscape.com's avatar
terry%netscape.com committed
744 745 746
    }
}

747
sub ChangeResolution {
748
    my ($bug, $str) = (@_);
749 750 751
    my $dbh = Bugzilla->dbh;
    my $cgi = Bugzilla->cgi;

752 753
    if (!$cgi->param('dontchange')
        || $str ne $cgi->param('dontchange'))
754
    {
755 756 757 758 759 760 761 762 763 764 765 766
        # Make sure the user is allowed to change the resolution.
        # If the user is changing several bugs at once using the UI,
        # then he has enough privs to do so. In the case he is hacking
        # the URL, we don't care if he reads --UNKNOWN-- as a resolution
        # in the error message.
        my $old_resolution = '-- UNKNOWN --';
        my $bug_id = $cgi->param('id');
        if ($bug_id) {
            $old_resolution =
                $dbh->selectrow_array('SELECT resolution FROM bugs WHERE bug_id = ?',
                                       undef, $bug_id);
        }
767 768 769
        unless ($bug->check_can_change_field('resolution', $old_resolution, $str,
                                             \$PrivilegesRequired))
        {
770 771 772 773 774 775 776
            $vars->{'oldvalue'} = $old_resolution;
            $vars->{'newvalue'} = $str;
            $vars->{'field'} = 'resolution';
            $vars->{'privs'} = $PrivilegesRequired;
            ThrowUserError("illegal_change", $vars);
        }

777
        DoComma();
778 779 780
        $::query .= "resolution = ?";
        trick_taint($str);
        push(@values, $str);
781
        # We define this variable here so that customized installations
782
        # may set rules based on the resolution in Bug::check_can_change_field().
783
        $cgi->param('resolution', $str);
terry%netscape.com's avatar
terry%netscape.com committed
784 785 786
    }
}

787 788 789 790
# Changing this so that it will process groups from checkboxes instead of
# select lists.  This means that instead of looking for the bit-X values in
# the form, we need to loop through all the bug groups this user has access
# to, and for each one, see if it's selected.
791 792
# If the form element isn't present, or the user isn't in the group, leave
# it as-is
793

794 795 796
my @groupAdd = ();
my @groupDel = ();

797 798 799 800 801
my $groups = $dbh->selectall_arrayref(
    qq{SELECT groups.id, isactive FROM groups
        WHERE id IN($grouplist) AND isbuggroup = 1});
foreach my $group (@$groups) {
    my ($b, $isactive) = @$group;
802 803 804 805
    # The multiple change page may not show all groups a bug is in
    # (eg product groups when listing more than one product)
    # Only consider groups which were present on the form. We can't do this
    # for single bug changes because non-checked checkboxes aren't present.
806
    # All the checkboxes should be shown in that case, though, so it isn't
807
    # an issue there
808 809
    if (defined $cgi->param('id') || defined $cgi->param("bit-$b")) {
        if (!$cgi->param("bit-$b")) {
810
            push(@groupDel, $b);
811
        } elsif ($cgi->param("bit-$b") == 1 && $isactive) {
812
            push(@groupAdd, $b);
813 814
        }
    }
815 816
}

817 818
foreach my $field ("rep_platform", "priority", "bug_severity",
                   "bug_file_loc", "short_desc", "version", "op_sys",
819
                   "target_milestone", "status_whiteboard") {
820 821 822
    if (defined $cgi->param($field)) {
        if (!$cgi->param('dontchange')
            || $cgi->param($field) ne $cgi->param('dontchange')) {
823
            DoComma();
824 825 826 827
            $::query .= "$field = ?";
            my $value = trim($cgi->param($field));
            trick_taint($value);
            push(@values, $value);
terry%netscape.com's avatar
terry%netscape.com committed
828 829 830 831
        }
    }
}

832
# Add custom fields data to the query that will update the database.
833 834 835
foreach my $field (Bugzilla->get_fields({custom => 1, obsolete => 0})) {
    my $fname = $field->name;
    if (defined $cgi->param($fname)
836
        && (!$cgi->param('dontchange')
837
            || $cgi->param($fname) ne $cgi->param('dontchange')))
838 839
    {
        DoComma();
840 841 842
        $::query .= "$fname = ?";
        my $value = $cgi->param($fname);
        check_field($fname, $value) if ($field->type == FIELD_TYPE_SINGLE_SELECT);
843 844
        trick_taint($value);
        push(@values, $value);
845 846 847
    }
}

848
my $product;
849
my $prod_changed = 0;
850
my @newprod_ids;
851
if ($cgi->param('product') ne $cgi->param('dontchange')) {
852 853
    $product = Bugzilla::Product::check_product(scalar $cgi->param('product'));

854
    DoComma();
855
    $::query .= "product_id = ?";
856 857
    push(@values, $product->id);
    @newprod_ids = ($product->id);
858 859 860 861 862 863 864 865
    # If the bug remains in the same product, leave $prod_changed set to 0.
    # Even with 'strict_isolation' turned on, we ignore users who already
    # play a role for the bug; else you would never be able to edit it.
    # If you want to move the bug to another product, then you first have to
    # remove these users from the bug.
    unless (defined $cgi->param('id') && $bug->product_id == $product->id) {
        $prod_changed = 1;
    }
866
} else {
867 868 869 870 871 872
    @newprod_ids = @{$dbh->selectcol_arrayref("SELECT DISTINCT product_id
                                               FROM bugs 
                                               WHERE bug_id IN (" .
                                                   join(',', @idlist) . 
                                               ")")};
    if (scalar(@newprod_ids) == 1) {
873
        $product = new Bugzilla::Product($newprod_ids[0]);
874
    }
875 876
}

877
my $component;
878
if ($cgi->param('component') ne $cgi->param('dontchange')) {
879
    if (scalar(@newprod_ids) > 1) {
880
        ThrowUserError("no_component_change_for_multiple_products");
881
    }
882 883 884 885 886
    $component =
        Bugzilla::Component::check_component($product, scalar $cgi->param('component'));

    # This parameter is required later when checking fields the user can change.
    $cgi->param('component_id', $component->id);
887
    DoComma();
888
    $::query .= "component_id = ?";
889
    push(@values, $component->id);
890 891
}

892 893
# If this installation uses bug aliases, and the user is changing the alias,
# add this change to the query.
894
if (Bugzilla->params->{"usebugaliases"} && defined $cgi->param('alias')) {
895
    my $alias = trim($cgi->param('alias'));
896 897 898 899 900 901 902 903 904 905
    
    # Since aliases are unique (like bug numbers), they can only be changed
    # for one bug at a time, so ignore the alias change unless only a single
    # bug is being changed.
    if (scalar(@idlist) == 1) {
        # Add the alias change to the query.  If the field contains the blank 
        # value, make the field be NULL to indicate that the bug has no alias.
        # Otherwise, if the field contains a value, update the record 
        # with that value.
        DoComma();
906 907
        if ($alias ne "") {
            ValidateBugAlias($alias, $idlist[0]);
908 909
            $::query .= "alias = ?";
            push(@values, $alias);
910
        } else {
911
            $::query .= "alias = NULL";
912
        }
913 914
    }
}
915

916 917
# If the user is submitting changes from show_bug.cgi for a single bug,
# and that bug is restricted to a group, process the checkboxes that
918
# allowed the user to set whether or not the reporter
919 920
# and cc list can see the bug even if they are not members of all groups 
# to which the bug is restricted.
921
if (defined $cgi->param('id')) {
922 923 924
    my ($havegroup) = $dbh->selectrow_array(
        q{SELECT group_id FROM bug_group_map WHERE bug_id = ?},
        undef, $cgi->param('id'));
925
    if ( $havegroup ) {
926
        DoComma();
927 928
        $cgi->param('reporter_accessible',
                    $cgi->param('reporter_accessible') ? '1' : '0');
929 930
        $::query .= "reporter_accessible = ?";
        push(@values, $cgi->param('reporter_accessible'));
931 932

        DoComma();
933 934
        $cgi->param('cclist_accessible',
                    $cgi->param('cclist_accessible') ? '1' : '0');
935 936
        $::query .= "cclist_accessible = ?";
        push(@values, $cgi->param('cclist_accessible'));
937 938 939
    }
}

940 941
if ( defined $cgi->param('id') &&
     (Bugzilla->params->{"insidergroup"} 
942
      && Bugzilla->user->in_group(Bugzilla->params->{"insidergroup"})) ) 
943
{
944

945 946 947
    my $sth = $dbh->prepare('UPDATE longdescs SET isprivate = ?
                             WHERE bug_id = ? AND bug_when = ?');

948
    foreach my $field ($cgi->param()) {
949 950
        if ($field =~ /when-([0-9]+)/) {
            my $sequence = $1;
951 952 953
            my $private = $cgi->param("isprivate-$sequence") ? 1 : 0 ;
            if ($private != $cgi->param("oisprivate-$sequence")) {
                my $field_data = $cgi->param("$field");
954 955 956
                # Make sure a valid date is given.
                $field_data = format_time($field_data, '%Y-%m-%d %T');
                $sth->execute($private, $cgi->param('id'), $field_data);
957 958 959 960 961
            }
        }

    }
}
962

963
my $duplicate;
964

965 966 967 968
# We need to check the addresses involved in a CC change before we touch any bugs.
# What we'll do here is formulate the CC data into two hashes of ID's involved
# in this CC change.  Then those hashes can be used later on for the actual change.
my (%cc_add, %cc_remove);
969 970 971 972
if (defined $cgi->param('newcc')
    || defined $cgi->param('addselfcc')
    || defined $cgi->param('removecc')
    || defined $cgi->param('masscc')) {
973 974 975
    # If masscc is defined, then we came from buglist and need to either add or
    # remove cc's... otherwise, we came from bugform and may need to do both.
    my ($cc_add, $cc_remove) = "";
976 977 978 979 980
    if (defined $cgi->param('masscc')) {
        if ($cgi->param('ccaction') eq 'add') {
            $cc_add = join(' ',$cgi->param('masscc'));
        } elsif ($cgi->param('ccaction') eq 'remove') {
            $cc_remove = join(' ',$cgi->param('masscc'));
981 982
        }
    } else {
983
        $cc_add = join(' ',$cgi->param('newcc'));
984 985
        # We came from bug_form which uses a select box to determine what cc's
        # need to be removed...
986 987
        if (defined $cgi->param('removecc') && $cgi->param('cc')) {
            $cc_remove = join (",", $cgi->param('cc'));
988 989 990 991
        }
    }

    if ($cc_add) {
992 993
        $cc_add =~ s/[\s,]+/ /g; # Change all delimiters to a single space
        foreach my $person ( split(" ", $cc_add) ) {
994
            my $pid = login_to_id($person, THROW_ERROR);
995 996 997
            $cc_add{$pid} = $person;
        }
    }
998
    if ($cgi->param('addselfcc')) {
999 1000
        $cc_add{$whoid} = $user->login;
    }
1001
    if ($cc_remove) {
1002 1003
        $cc_remove =~ s/[\s,]+/ /g; # Change all delimiters to a single space
        foreach my $person ( split(" ", $cc_remove) ) {
1004
            my $pid = login_to_id($person, THROW_ERROR);
1005 1006 1007 1008 1009
            $cc_remove{$pid} = $person;
        }
    }
}

1010 1011
# Store the new assignee and QA contact IDs (if any). This is the
# only way to keep these informations when bugs are reassigned by
1012
# component as $cgi->param('assigned_to') and $cgi->param('qa_contact')
1013
# are not the right fields to look at.
1014 1015 1016
# If the assignee or qacontact is changed, the new one is checked when
# changed information is validated.  If not, then the unchanged assignee
# or qacontact may have to be validated later.
1017 1018 1019

my $assignee;
my $qacontact;
1020 1021 1022 1023
my $qacontact_checked = 0;
my $assignee_checked = 0;

my %usercache = ();
1024

1025 1026
if (defined $cgi->param('qa_contact')
    && $cgi->param('knob') ne "reassignbycomponent")
1027
{
1028
    my $name = trim($cgi->param('qa_contact'));
1029
    # The QA contact cannot be deleted from show_bug.cgi for a single bug!
1030
    if ($name ne $cgi->param('dontchange')) {
1031
        $qacontact = login_to_id($name, THROW_ERROR) if ($name ne "");
1032 1033 1034 1035
        if ($qacontact && Bugzilla->params->{"strict_isolation"}
            && !(defined $cgi->param('id') && $bug->qa_contact
                 && $qacontact == $bug->qa_contact->id))
        {
1036 1037 1038 1039
                $usercache{$qacontact} ||= Bugzilla::User->new($qacontact);
                my $qa_user = $usercache{$qacontact};
                foreach my $product_id (@newprod_ids) {
                    if (!$qa_user->can_edit_product($product_id)) {
1040
                        my $product_name = Bugzilla::Product->new($product_id)->name;
1041 1042 1043 1044 1045 1046 1047 1048
                        ThrowUserError('invalid_user_group',
                                          {'users'   => $qa_user->login,
                                           'product' => $product_name,
                                           'bug_id' => (scalar(@idlist) > 1)
                                                         ? undef : $idlist[0]
                                          });
                    }
                }
1049
        }
1050
        $qacontact_checked = 1;
1051
        DoComma();
1052
        if($qacontact) {
1053 1054
            $::query .= "qa_contact = ?";
            push(@values, $qacontact);
1055 1056 1057 1058
        }
        else {
            $::query .= "qa_contact = NULL";
        }
1059 1060
    }
}
1061

1062
SWITCH: for ($cgi->param('knob')) {
1063 1064 1065
    /^none$/ && do {
        last SWITCH;
    };
1066
    /^confirm$/ && CheckonComment( "confirm" ) && do {
1067
        DoConfirm($bug);
1068 1069 1070
        ChangeStatus('NEW');
        last SWITCH;
    };
1071
    /^accept$/ && CheckonComment( "accept" ) && do {
1072
        DoConfirm($bug);
1073
        ChangeStatus('ASSIGNED');
1074 1075 1076
        if (Bugzilla->params->{"usetargetmilestone"} 
            && Bugzilla->params->{"musthavemilestoneonaccept"}) 
        {
1077
            $requiremilestone = 1;
1078
        }
1079 1080
        last SWITCH;
    };
1081
    /^clearresolution$/ && CheckonComment( "clearresolution" ) && do {
1082
        ChangeResolution($bug, '');
1083 1084
        last SWITCH;
    };
1085
    /^(resolve|change_resolution)$/ && CheckonComment( "resolve" ) && do {
1086
        # Check here, because it's the only place we require the resolution
1087
        check_field('resolution', scalar $cgi->param('resolution'),
1088
                    Bugzilla::Bug->settable_resolutions);
1089

1090
        # don't resolve as fixed while still unresolved blocking bugs
1091
        if (Bugzilla->params->{"noresolveonopenblockers"}
1092
            && $cgi->param('resolution') eq 'FIXED')
1093
        {
1094
            my @dependencies = Bugzilla::Bug::CountOpenDependencies(@idlist);
1095 1096
            if (scalar @dependencies > 0) {
                ThrowUserError("still_unresolved_bugs",
1097 1098
                               { dependencies     => \@dependencies,
                                 dependency_count => scalar @dependencies });
1099
            }
1100
        }
1101

1102 1103 1104 1105 1106 1107 1108
        if ($cgi->param('knob') eq 'resolve') {
            # RESOLVED bugs should have no time remaining;
            # more time can be added for the VERIFY step, if needed.
            _remove_remaining_time();

            ChangeStatus('RESOLVED');
        }
1109

1110
        ChangeResolution($bug, $cgi->param('resolution'));
1111 1112
        last SWITCH;
    };
1113
    /^reassign$/ && CheckonComment( "reassign" ) && do {
1114
        if ($cgi->param('andconfirm')) {
1115
            DoConfirm($bug);
1116
        }
1117 1118
        ChangeStatus('NEW');
        DoComma();
1119 1120
        if (defined $cgi->param('assigned_to')
            && trim($cgi->param('assigned_to')) ne "") { 
1121
            $assignee = login_to_id(trim($cgi->param('assigned_to')), THROW_ERROR);
1122
            if (Bugzilla->params->{"strict_isolation"}) {
1123 1124 1125 1126
                $usercache{$assignee} ||= Bugzilla::User->new($assignee);
                my $assign_user = $usercache{$assignee};
                foreach my $product_id (@newprod_ids) {
                    if (!$assign_user->can_edit_product($product_id)) {
1127
                        my $product_name = Bugzilla::Product->new($product_id)->name;
1128 1129 1130 1131 1132 1133 1134 1135
                        ThrowUserError('invalid_user_group',
                                          {'users'   => $assign_user->login,
                                           'product' => $product_name,
                                           'bug_id' => (scalar(@idlist) > 1)
                                                         ? undef : $idlist[0]
                                          });
                    }
                }
1136
            }
1137
        } else {
1138
            ThrowUserError("reassign_to_empty");
1139
        }
1140 1141
        $::query .= "assigned_to = ?";
        push(@values, $assignee);
1142
        $assignee_checked = 1;
1143 1144
        last SWITCH;
    };
1145
    /^reassignbycomponent$/  && CheckonComment( "reassignbycomponent" ) && do {
1146
        if ($cgi->param('compconfirm')) {
1147
            DoConfirm($bug);
1148
        }
1149 1150
        ChangeStatus('NEW');
        last SWITCH;
1151
    };
1152
    /^reopen$/  && CheckonComment( "reopen" ) && do {
1153
        ChangeStatus('REOPENED');
1154
        ChangeResolution($bug, '');
1155 1156
        last SWITCH;
    };
1157
    /^verify$/ && CheckonComment( "verify" ) && do {
1158 1159 1160
        ChangeStatus('VERIFIED');
        last SWITCH;
    };
1161
    /^close$/ && CheckonComment( "close" ) && do {
1162 1163 1164
        # CLOSED bugs should have no time remaining.
        _remove_remaining_time();

1165 1166 1167
        ChangeStatus('CLOSED');
        last SWITCH;
    };
1168
    /^duplicate$/ && CheckonComment( "duplicate" ) && do {
1169 1170 1171 1172 1173 1174
        # You cannot mark bugs as duplicates when changing
        # several bugs at once.
        unless (defined $cgi->param('id')) {
            ThrowUserError('dupe_not_allowed');
        }

1175
        # Make sure we can change the original bug (issue A on bug 96085)
1176 1177 1178
        defined($cgi->param('dup_id'))
          || ThrowCodeError('undefined_field', { field => 'dup_id' });

1179 1180 1181
        $duplicate = $cgi->param('dup_id');
        ValidateBugID($duplicate, 'dup_id');
        $cgi->param('dup_id', $duplicate);
1182

1183 1184 1185
        # Make sure a loop isn't created when marking this bug
        # as duplicate.
        my %dupes;
1186
        my $dupe_of = $duplicate;
1187 1188 1189 1190 1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1207 1208
        my $sth = $dbh->prepare('SELECT dupe_of FROM duplicates
                                 WHERE dupe = ?');

        while ($dupe_of) {
            if ($dupe_of == $cgi->param('id')) {
                ThrowUserError('dupe_loop_detected', { bug_id  => $cgi->param('id'),
                                                       dupe_of => $duplicate });
            }
            # If $dupes{$dupe_of} is already set to 1, then a loop
            # already exists which does not involve this bug.
            # As the user is not responsible for this loop, do not
            # prevent him from marking this bug as a duplicate.
            last if exists $dupes{"$dupe_of"};
            $dupes{"$dupe_of"} = 1;
            $sth->execute($dupe_of);
            $dupe_of = $sth->fetchrow_array;
        }

        # Also, let's see if the reporter has authorization to see
        # the bug to which we are duping. If not we need to prompt.
        DuplicateUserConfirm();

1209 1210 1211
        # DUPLICATE bugs should have no time remaining.
        _remove_remaining_time();

1212
        ChangeStatus('RESOLVED');
1213
        ChangeResolution($bug, 'DUPLICATE');
1214 1215
        last SWITCH;
    };
1216

1217
    ThrowCodeError("unknown_action", { action => $cgi->param('knob') });
terry%netscape.com's avatar
terry%netscape.com committed
1218 1219
}

1220 1221 1222
my @keywordlist;
my %keywordseen;

1223 1224
if (defined $cgi->param('keywords')) {
    foreach my $keyword (split(/[\s,]+/, $cgi->param('keywords'))) {
1225 1226 1227
        if ($keyword eq '') {
            next;
        }
1228 1229
        my $keyword_obj = new Bugzilla::Keyword({name => $keyword});
        if (!$keyword_obj) {
1230 1231
            ThrowUserError("unknown_keyword",
                           { keyword => $keyword });
1232
        }
1233 1234 1235
        if (!$keywordseen{$keyword_obj->id}) {
            push(@keywordlist, $keyword_obj->id);
            $keywordseen{$keyword_obj->id} = 1;
1236 1237 1238 1239
        }
    }
}

1240
my $keywordaction = $cgi->param('keywordaction') || "makeexact";
1241 1242 1243
if (!grep($keywordaction eq $_, qw(add delete makeexact))) {
    $keywordaction = "makeexact";
}
1244

1245
if ($::comma eq ""
1246
    && (! @groupAdd) && (! @groupDel)
1247 1248
    && (!Bugzilla::Keyword::keyword_count() 
        || (0 == @keywordlist && $keywordaction ne "makeexact"))
1249
    && defined $cgi->param('masscc') && ! $cgi->param('masscc')
1250
    ) {
1251
    if (!defined $cgi->param('comment') || $cgi->param('comment') =~ /^\s*$/) {
1252
        ThrowUserError("bugs_not_changed");
terry%netscape.com's avatar
terry%netscape.com committed
1253 1254 1255
    }
}

1256
# Process data for Time Tracking fields
1257
if (Bugzilla->user->in_group(Bugzilla->params->{'timetrackinggroup'})) {
1258
    foreach my $field ("estimated_time", "remaining_time") {
1259 1260 1261
        if (defined $cgi->param($field)) {
            my $er_time = trim($cgi->param($field));
            if ($er_time ne $cgi->param('dontchange')) {
1262
                DoComma();
1263 1264 1265
                $::query .= "$field = ?";
                trick_taint($er_time);
                push(@values, $er_time);
1266 1267 1268 1269
            }
        }
    }

1270
    if (defined $cgi->param('deadline')) {
1271
        DoComma();
1272
        if ($cgi->param('deadline')) {
1273 1274 1275
            validate_date($cgi->param('deadline'))
              || ThrowUserError('illegal_date', {date => $cgi->param('deadline'),
                                                 format => 'YYYY-MM-DD'});
1276 1277 1278 1279
            $::query .= "deadline = ?";
            my $deadline = $cgi->param('deadline');
            trick_taint($deadline);
            push(@values, $deadline);
1280
        } else {
1281
            $::query .= "deadline = NULL";
1282 1283 1284 1285
        }
    }
}

1286
my $basequery = $::query;
1287

1288
local our $delta_ts;
1289 1290
sub SnapShotBug {
    my ($id) = (@_);
1291
    my $dbh = Bugzilla->dbh;
1292
    my @row = $dbh->selectrow_array(q{SELECT delta_ts, } .
1293
                join(',', editable_bug_fields()).q{ FROM bugs WHERE bug_id = ?},
1294
                undef, $id);
1295
    $delta_ts = shift @row;
1296

1297
    return @row;
terry%netscape.com's avatar
terry%netscape.com committed
1298 1299 1300
}


1301
sub SnapShotDeps {
1302 1303
    my ($bug_id, $target, $me) = (@_);
    my $list = Bugzilla::Bug::EmitDependList($me, $target, $bug_id);
1304
    return join(',', @$list);
1305 1306 1307 1308 1309
}


my $timestamp;

1310
local our $bug_changed;
1311
sub LogDependencyActivity {
1312
    my ($i, $oldstr, $target, $me, $timestamp) = (@_);
1313
    my $dbh = Bugzilla->dbh;
1314 1315
    my $newstr = SnapShotDeps($i, $target, $me);
    if ($oldstr ne $newstr) {
1316
        # Figure out what's really different...
1317
        my ($removed, $added) = diff_strings($oldstr, $newstr);
1318
        LogActivityEntry($i,$target,$removed,$added,$whoid,$timestamp);
1319
        # update timestamp on target bug so midairs will be triggered
1320 1321
        $dbh->do(q{UPDATE bugs SET delta_ts = ? WHERE bug_id = ?},
                 undef, $timestamp, $i);
1322
        $bug_changed = 1;
1323 1324 1325 1326 1327
        return 1;
    }
    return 0;
}

1328
if (Bugzilla->params->{"strict_isolation"}) {
1329 1330 1331 1332 1333 1334 1335 1336 1337 1338 1339 1340 1341 1342 1343 1344 1345 1346
    my @blocked_cc = ();
    foreach my $pid (keys %cc_add) {
        $usercache{$pid} ||= Bugzilla::User->new($pid);
        my $cc_user = $usercache{$pid};
        foreach my $product_id (@newprod_ids) {
            if (!$cc_user->can_edit_product($product_id)) {
                push (@blocked_cc, $cc_user->login);
                last;
            }
        }
    }
    if (scalar(@blocked_cc)) {
        ThrowUserError("invalid_user_group", 
            {'users' => \@blocked_cc,
             'bug_id' => (scalar(@idlist) > 1) ? undef : $idlist[0]});
    }
}

1347
if ($prod_changed && Bugzilla->params->{"strict_isolation"}) {
1348 1349 1350 1351 1352 1353
    my $sth_cc = $dbh->prepare("SELECT who
                                FROM cc
                                WHERE bug_id = ?");
    my $sth_bug = $dbh->prepare("SELECT assigned_to, qa_contact
                                 FROM bugs
                                 WHERE bug_id = ?");
1354

1355 1356 1357 1358
    foreach my $id (@idlist) {
        $sth_cc->execute($id);
        my @blocked_cc = ();
        while (my ($pid) = $sth_cc->fetchrow_array) {
1359 1360
            # Ignore deleted accounts. They will never get notification.
            $usercache{$pid} ||= Bugzilla::User->new($pid) || next;
1361
            my $cc_user = $usercache{$pid};
1362
            if (!$cc_user->can_edit_product($product->id)) {
1363 1364 1365 1366 1367 1368 1369
                push (@blocked_cc, $cc_user->login);
            }
        }
        if (scalar(@blocked_cc)) {
            ThrowUserError('invalid_user_group',
                              {'users'   => \@blocked_cc,
                               'bug_id' => $id,
1370
                               'product' => $product->name});
1371 1372 1373 1374
        }
        $sth_bug->execute($id);
        my ($assignee, $qacontact) = $sth_bug->fetchrow_array;
        if (!$assignee_checked) {
1375
            $usercache{$assignee} ||= Bugzilla::User->new($assignee) || next;
1376
            my $assign_user = $usercache{$assignee};
1377
            if (!$assign_user->can_edit_product($product->id)) {
1378 1379 1380
                    ThrowUserError('invalid_user_group',
                                      {'users'   => $assign_user->login,
                                       'bug_id' => $id,
1381
                                       'product' => $product->name});
1382 1383 1384
            }
        }
        if (!$qacontact_checked && $qacontact) {
1385
            $usercache{$qacontact} ||= Bugzilla::User->new($qacontact) || next;
1386
            my $qa_user = $usercache{$qacontact};
1387
            if (!$qa_user->can_edit_product($product->id)) {
1388 1389 1390
                    ThrowUserError('invalid_user_group',
                                      {'users'   => $qa_user->login,
                                       'bug_id' => $id,
1391
                                       'product' => $product->name});
1392 1393 1394 1395 1396 1397
            }
        }
    }
}


1398 1399 1400
# This loop iterates once for each bug to be processed (i.e. all the
# bugs selected when this script is called with multiple bugs selected
# from buglist.cgi, or just the one bug when called from
1401 1402
# show_bug.cgi).
#
1403
foreach my $id (@idlist) {
1404
    my $query = $basequery;
1405
    my @bug_values = @values;
1406
    my $old_bug_obj = new Bugzilla::Bug($id);
1407 1408 1409

    if ($cgi->param('knob') eq 'reassignbycomponent') {
        # We have to check whether the bug is moved to another product
1410
        # and/or component before reassigning. If $component is defined,
1411
        # use it; else use the product/component the bug is already in.
1412
        my $new_comp_id = $component ? $component->id : $old_bug_obj->{'component_id'};
1413 1414 1415 1416
        $assignee = $dbh->selectrow_array('SELECT initialowner
                                           FROM components
                                           WHERE components.id = ?',
                                           undef, $new_comp_id);
1417
        $query .= ", assigned_to = ?";
1418
        push(@bug_values, $assignee);
1419
        if (Bugzilla->params->{"useqacontact"}) {
1420 1421 1422 1423 1424
            $qacontact = $dbh->selectrow_array('SELECT initialqacontact
                                                FROM components
                                                WHERE components.id = ?',
                                                undef, $new_comp_id);
            if ($qacontact) {
1425
                $query .= ", qa_contact = ?";
1426
                push(@bug_values, $qacontact);
1427 1428 1429 1430 1431
            }
            else {
                $query .= ", qa_contact = NULL";
            }
        }
1432 1433 1434 1435 1436 1437 1438 1439 1440 1441 1442 1443

        

        # And add in the Default CC for the Component.
        my $comp_obj = $component || new Bugzilla::Component($new_comp_id);
        my @new_init_cc = @{$comp_obj->initial_cc};
        foreach my $cc (@new_init_cc) {
            # NewCC must be defined or the code below won't insert
            # any CCs.
            $cgi->param('newcc') || $cgi->param('newcc', []);
            $cc_add{$cc->id} = $cc->login;
        }
1444 1445
    }

1446
    my %dependencychanged;
1447
    $bug_changed = 0;
1448 1449
    my $write = "WRITE";        # Might want to make a param to control
                                # whether we do LOW_PRIORITY ...
1450
    $dbh->bz_lock_tables("bugs $write", "bugs_activity $write", "cc $write",
1451
            "profiles READ", "dependencies $write", "votes $write",
1452
            "products READ", "components READ", "milestones READ",
1453
            "keywords $write", "longdescs $write", "fielddefs READ",
1454
            "bug_group_map $write", "flags $write", "duplicates $write",
1455
            "user_group_map READ", "group_group_map READ", "flagtypes READ",
1456 1457 1458 1459
            "flaginclusions AS i READ", "flagexclusions AS e READ",
            "keyworddefs READ", "groups READ", "attachments READ",
            "group_control_map AS oldcontrolmap READ",
            "group_control_map AS newcontrolmap READ",
1460
            "group_control_map READ", "email_setting READ", "classifications READ");
1461

1462
    # It may sound crazy to set %formhash for each bug as $cgi->param()
1463 1464
    # will not change, but %formhash is modified below and we prefer
    # to set it again.
1465
    my $i = 0;
1466 1467 1468
    my @oldvalues = SnapShotBug($id);
    my %oldhash;
    my %formhash;
1469
    foreach my $col (@editable_bug_fields) {
1470
        # Consider NULL db entries to be equivalent to the empty string
1471 1472 1473
        $oldvalues[$i] = defined($oldvalues[$i]) ? $oldvalues[$i] : '';
        # Convert the deadline taken from the DB into the YYYY-MM-DD format
        # for consistency with the deadline provided by the user, if any.
1474 1475
        # Else Bug::check_can_change_field() would see them as different
        # in all cases.
1476 1477 1478
        if ($col eq 'deadline') {
            $oldvalues[$i] = format_time($oldvalues[$i], "%Y-%m-%d");
        }
1479
        $oldhash{$col} = $oldvalues[$i];
1480
        $formhash{$col} = $cgi->param($col) if defined $cgi->param($col);
1481 1482 1483 1484 1485 1486 1487
        $i++;
    }
    # If the user is reassigning bugs, we need to:
    # - convert $newhash{'assigned_to'} and $newhash{'qa_contact'}
    #   email addresses into their corresponding IDs;
    # - update $newhash{'bug_status'} to its real state if the bug
    #   is in the unconfirmed state.
1488
    $formhash{'qa_contact'} = $qacontact if Bugzilla->params->{'useqacontact'};
1489 1490
    if ($cgi->param('knob') eq 'reassignbycomponent'
        || $cgi->param('knob') eq 'reassign') {
1491
        $formhash{'assigned_to'} = $assignee;
1492
        if ($oldhash{'bug_status'} eq 'UNCONFIRMED') {
1493 1494 1495
            $formhash{'bug_status'} = $oldhash{'bug_status'};
        }
    }
1496 1497 1498 1499 1500
    # This hash is required by Bug::check_can_change_field().
    my $cgi_hash = {
        'dontchange' => scalar $cgi->param('dontchange'),
        'knob'       => scalar $cgi->param('knob')
    };
1501
    foreach my $col (@editable_bug_fields) {
1502 1503 1504
        # The 'resolution' field is checked by ChangeResolution(),
        # i.e. only if we effectively use it.
        next if ($col eq 'resolution');
1505
        if (exists $formhash{$col}
1506 1507
            && !$old_bug_obj->check_can_change_field($col, $oldhash{$col}, $formhash{$col},
                                                     \$PrivilegesRequired, $cgi_hash))
1508 1509 1510 1511
        {
            my $vars;
            if ($col eq 'component_id') {
                # Display the component name
1512
                $vars->{'oldvalue'} = $old_bug_obj->component;
1513
                $vars->{'newvalue'} = $cgi->param('component');
1514 1515 1516
                $vars->{'field'} = 'component';
            } elsif ($col eq 'assigned_to' || $col eq 'qa_contact') {
                # Display the assignee or QA contact email address
1517 1518
                $vars->{'oldvalue'} = user_id_to_login($oldhash{$col});
                $vars->{'newvalue'} = user_id_to_login($formhash{$col});
1519 1520 1521 1522 1523
                $vars->{'field'} = $col;
            } else {
                $vars->{'oldvalue'} = $oldhash{$col};
                $vars->{'newvalue'} = $formhash{$col};
                $vars->{'field'} = $col;
1524
            }
1525
            $vars->{'privs'} = $PrivilegesRequired;
1526
            ThrowUserError("illegal_change", $vars);
1527 1528
        }
    }
1529
    
1530 1531
    # When editing multiple bugs, users can specify a list of keywords to delete
    # from bugs.  If the list matches the current set of keywords on those bugs,
1532 1533
    # Bug::check_can_change_field will fail to check permissions because it thinks
    # the list hasn't changed. To fix that, we have to call Bug::check_can_change_field
1534 1535
    # again with old!=new if the keyword action is "delete" and old=new.
    if ($keywordaction eq "delete"
1536
        && defined $cgi->param('keywords')
1537
        && length(@keywordlist) > 0
1538
        && $cgi->param('keywords') eq $oldhash{keywords}
1539 1540
        && !$old_bug_obj->check_can_change_field("keywords", "old is not", "equal to new",
                                                 \$PrivilegesRequired))
1541 1542 1543 1544
    {
        $vars->{'oldvalue'} = $oldhash{keywords};
        $vars->{'newvalue'} = "no keywords";
        $vars->{'field'} = "keywords";
1545
        $vars->{'privs'} = $PrivilegesRequired;
1546
        ThrowUserError("illegal_change", $vars);
1547 1548
    }

1549
    $oldhash{'product'} = $old_bug_obj->product;
1550
    if (!Bugzilla->user->can_edit_product($oldhash{'product_id'})) {
1551
        ThrowUserError("product_edit_denied",
1552
                      { product => $oldhash{'product'} });
1553 1554
    }

1555
    if ($requiremilestone) {
1556 1557
        # musthavemilestoneonaccept applies only if at least two
        # target milestones are defined for the current product.
1558 1559
        my $prod_obj = new Bugzilla::Product({'name' => $oldhash{'product'}});
        my $nb_milestones = scalar(@{$prod_obj->milestones});
1560 1561 1562 1563 1564 1565 1566 1567 1568 1569 1570 1571
        if ($nb_milestones > 1) {
            my $value = $cgi->param('target_milestone');
            if (!defined $value || $value eq $cgi->param('dontchange')) {
                $value = $oldhash{'target_milestone'};
            }
            my $defaultmilestone =
                $dbh->selectrow_array("SELECT defaultmilestone
                                       FROM products WHERE id = ?",
                                       undef, $oldhash{'product_id'});
            # if musthavemilestoneonaccept == 1, then the target
            # milestone must be different from the default one.
            if ($value eq $defaultmilestone) {
1572
                ThrowUserError("milestone_required", { bug_id => $id });
1573
            }
1574 1575
        }
    }   
1576 1577
    if (defined $cgi->param('delta_ts') && $cgi->param('delta_ts') ne $delta_ts)
    {
1578 1579
        ($vars->{'operations'}) =
            Bugzilla::Bug::GetBugActivity($id, $cgi->param('delta_ts'));
1580

1581
        $vars->{'start_at'} = $cgi->param('longdesclength');
1582 1583 1584 1585

        # Always sort midair collision comments oldest to newest,
        # regardless of the user's personal preference.
        $vars->{'comments'} = Bugzilla::Bug::GetComments($id, "oldest_to_newest");
1586

1587
        $cgi->param('delta_ts', $delta_ts);
1588 1589 1590
        
        $vars->{'bug_id'} = $id;
        
1591
        $dbh->bz_unlock_tables(UNLOCK_ABORT);
1592 1593
        
        # Warn the user about the mid-air collision and ask them what to do.
1594
        $template->process("bug/process/midair.html.tmpl", $vars)
1595
          || ThrowTemplateError($template->error());
1596 1597 1598
        exit;
    }

1599
    # Gather the dependency list, and make sure there are no circular refs
1600 1601
    my %deps = Bugzilla::Bug::ValidateDependencies(scalar($cgi->param('dependson')),
                                                   scalar($cgi->param('blocked')),
1602
                                                   $id);
1603

1604 1605 1606 1607
    #
    # Start updating the relevant database entries
    #

1608
    $timestamp = $dbh->selectrow_array(q{SELECT NOW()});
1609

1610
    my $work_time;
1611
    if (Bugzilla->user->in_group(Bugzilla->params->{'timetrackinggroup'})) {
1612
        $work_time = $cgi->param('work_time');
1613 1614 1615 1616
        if ($work_time) {
            # AppendComment (called below) can in theory raise an error,
            # but because we've already validated work_time here it's
            # safe to log the entry before adding the comment.
1617
            LogActivityEntry($id, "work_time", "", $work_time,
1618
                             $whoid, $timestamp);
1619 1620 1621
        }
    }

1622 1623 1624
    if ($cgi->param('comment') || $work_time || $duplicate) {
        my $type = $duplicate ? CMT_DUPE_OF : CMT_NORMAL;

1625
        AppendComment($id, $whoid, scalar($cgi->param('comment')),
1626 1627
                      scalar($cgi->param('commentprivacy')), $timestamp,
                      $work_time, $type, $duplicate);
1628 1629 1630
        $bug_changed = 1;
    }

1631 1632 1633
    if (Bugzilla::Keyword::keyword_count() 
        && defined $cgi->param('keywords')) 
    {
1634 1635 1636 1637 1638
        # There are three kinds of "keywordsaction": makeexact, add, delete.
        # For makeexact, we delete everything, and then add our things.
        # For add, we delete things we're adding (to make sure we don't
        # end up having them twice), and then we add them.
        # For delete, we just delete things on the list.
1639
        my $changed = 0;
1640
        if ($keywordaction eq "makeexact") {
1641 1642
            $dbh->do(q{DELETE FROM keywords WHERE bug_id = ?},
                     undef, $id);
1643
            $changed = 1;
1644
        }
1645 1646 1647 1648 1649 1650
        my $sth_delete = $dbh->prepare(q{DELETE FROM keywords
                                               WHERE bug_id = ?
                                                 AND keywordid = ?});
        my $sth_insert =
            $dbh->prepare(q{INSERT INTO keywords (bug_id, keywordid)
                                 VALUES (?, ?)});
1651 1652
        foreach my $keyword (@keywordlist) {
            if ($keywordaction ne "makeexact") {
1653
                $sth_delete->execute($id, $keyword);
1654
                $changed = 1;
1655 1656
            }
            if ($keywordaction ne "delete") {
1657
                $sth_insert->execute($id, $keyword);
1658 1659 1660 1661
                $changed = 1;
            }
        }
        if ($changed) {
1662 1663 1664 1665 1666 1667 1668 1669
            my $list = $dbh->selectcol_arrayref(
                q{SELECT keyworddefs.name
                    FROM keyworddefs
              INNER JOIN keywords 
                      ON keyworddefs.id = keywords.keywordid
                   WHERE keywords.bug_id = ?
                ORDER BY keyworddefs.name},
                undef, $id);
1670
            $dbh->do("UPDATE bugs SET keywords = ? WHERE bug_id = ?",
1671
                     undef, join(', ', @$list), $id);
1672 1673
        }
    }
1674
    $query .= " WHERE bug_id = ?";
1675
    push(@bug_values, $id);
1676
    
1677
    if ($::comma ne "") {
1678
        $dbh->do($query, undef, @bug_values);
terry%netscape.com's avatar
terry%netscape.com committed
1679
    }
1680

1681
    # Check for duplicates if the bug is [re]open or its resolution is changed.
1682 1683
    my $resolution = $dbh->selectrow_array(
        q{SELECT resolution FROM bugs WHERE bug_id = ?}, undef, $id);
1684
    if ($resolution ne 'DUPLICATE') {
1685
        $dbh->do(q{DELETE FROM duplicates WHERE dupe = ?}, undef, $id);
1686
    }
1687

1688 1689
    my %groupsrequired = ();
    my %groupsforbidden = ();
1690 1691 1692 1693 1694 1695 1696
    my $group_controls =
        $dbh->selectall_arrayref(q{SELECT id, membercontrol
                                     FROM groups
                                LEFT JOIN group_control_map
                                       ON id = group_id
                                      AND product_id = ?
                                    WHERE isactive != 0},
1697
        undef, $oldhash{'product_id'});
1698 1699
    foreach my $group_control (@$group_controls) {
        my ($group, $control) = @$group_control;
1700
        $control ||= 0;
1701
        unless ($control > CONTROLMAPNA)  {
1702 1703
            $groupsforbidden{$group} = 1;
        }
1704
        if ($control == CONTROLMAPMANDATORY) {
1705 1706 1707 1708
            $groupsrequired{$group} = 1;
        }
    }

1709
    my @groupAddNames = ();
1710
    my @groupAddNamesAll = ();
1711 1712
    my $sth = $dbh->prepare(q{INSERT INTO bug_group_map (bug_id, group_id)
                                   VALUES (?, ?)});
1713 1714
    foreach my $grouptoadd (@groupAdd, keys %groupsrequired) {
        next if $groupsforbidden{$grouptoadd};
1715 1716
        my $group_obj = new Bugzilla::Group($grouptoadd);
        push(@groupAddNamesAll, $group_obj->name);
1717
        if (!BugInGroupId($id, $grouptoadd)) {
1718
            push(@groupAddNames, $group_obj->name);
1719
            $sth->execute($id, $grouptoadd);
1720 1721 1722
        }
    }
    my @groupDelNames = ();
1723
    my @groupDelNamesAll = ();
1724 1725
    $sth = $dbh->prepare(q{DELETE FROM bug_group_map
                                 WHERE bug_id = ? AND group_id = ?});
1726
    foreach my $grouptodel (@groupDel, keys %groupsforbidden) {
1727 1728
        my $group_obj = new Bugzilla::Group($grouptodel);
        push(@groupDelNamesAll, $group_obj->name);
1729
        next if $groupsrequired{$grouptodel};
1730
        if (BugInGroupId($id, $grouptodel)) {
1731
            push(@groupDelNames, $group_obj->name);
1732
        }
1733
        $sth->execute($id, $grouptodel);
1734 1735 1736 1737 1738
    }

    my $groupDelNames = join(',', @groupDelNames);
    my $groupAddNames = join(',', @groupAddNames);

1739 1740 1741 1742 1743
    if ($groupDelNames ne $groupAddNames) {
        LogActivityEntry($id, "bug_group", $groupDelNames, $groupAddNames,
                         $whoid, $timestamp); 
        $bug_changed = 1;
    }
1744 1745

    my @ccRemoved = (); 
1746 1747 1748 1749
    if (defined $cgi->param('newcc')
        || defined $cgi->param('addselfcc')
        || defined $cgi->param('removecc')
        || defined $cgi->param('masscc')) {
1750 1751
        # Get the current CC list for this bug
        my %oncc;
1752 1753 1754 1755
        my $cc_list = $dbh->selectcol_arrayref(
            q{SELECT who FROM cc WHERE bug_id = ?}, undef, $id);
        foreach my $who (@$cc_list) {
            $oncc{$who} = 1;
1756 1757
        }

1758
        my (@added, @removed) = ();
1759 1760 1761

        my $sth_insert = $dbh->prepare(q{INSERT INTO cc (bug_id, who)
                                              VALUES (?, ?)});
1762 1763 1764
        foreach my $pid (keys %cc_add) {
            # If this person isn't already on the cc list, add them
            if (! $oncc{$pid}) {
1765
                $sth_insert->execute($id, $pid);
1766 1767
                push (@added, $cc_add{$pid});
                $oncc{$pid} = 1;
1768 1769
            }
        }
1770 1771
        my $sth_delete = $dbh->prepare(q{DELETE FROM cc
                                          WHERE bug_id = ? AND who = ?});
1772 1773 1774
        foreach my $pid (keys %cc_remove) {
            # If the person is on the cc list, remove them
            if ($oncc{$pid}) {
1775
                $sth_delete->execute($id, $pid);
1776 1777
                push (@removed, $cc_remove{$pid});
                $oncc{$pid} = 0;
1778 1779
            }
        }
1780

1781 1782
        # If any changes were found, record it in the activity log
        if (scalar(@removed) || scalar(@added)) {
1783 1784
            my $removed = join(", ", @removed);
            my $added = join(", ", @added);
1785 1786
            LogActivityEntry($id,"cc",$removed,$added,$whoid,$timestamp);
            $bug_changed = 1;
1787
        }
1788
        @ccRemoved = @removed;
1789
    }
1790

1791
    # We need to send mail for dependson/blocked bugs if the dependencies
1792 1793 1794
    # change or the status or resolution change. This var keeps track of that.
    my $check_dep_bugs = 0;

1795 1796 1797 1798 1799 1800
    foreach my $pair ("blocked/dependson", "dependson/blocked") {
        my ($me, $target) = split("/", $pair);

        my @oldlist = @{$dbh->selectcol_arrayref("SELECT $target FROM dependencies
                                                  WHERE $me = ? ORDER BY $target",
                                                  undef, $id)};
1801 1802 1803 1804 1805 1806

        # Only bugs depending on the current one should get notification.
        # Bugs blocking the current one never get notification, unless they
        # are added or removed from the dependency list. This case is treated
        # below.
        @dependencychanged{@oldlist} = 1 if ($me eq 'dependson');
1807

1808
        if (defined $cgi->param($target)) {
1809 1810 1811 1812 1813 1814 1815 1816 1817 1818 1819 1820 1821 1822 1823 1824
            my %snapshot;
            my @newlist = sort {$a <=> $b} @{$deps{$target}};

            while (0 < @oldlist || 0 < @newlist) {
                if (@oldlist == 0 || (@newlist > 0 &&
                                      $oldlist[0] > $newlist[0])) {
                    $snapshot{$newlist[0]} = SnapShotDeps($newlist[0], $me,
                                                          $target);
                    shift @newlist;
                } elsif (@newlist == 0 || (@oldlist > 0 &&
                                           $newlist[0] > $oldlist[0])) {
                    $snapshot{$oldlist[0]} = SnapShotDeps($oldlist[0], $me,
                                                          $target);
                    shift @oldlist;
                } else {
                    if ($oldlist[0] != $newlist[0]) {
1825
                        ThrowCodeError('list_comparison_error');
1826 1827 1828 1829 1830 1831 1832 1833
                    }
                    shift @oldlist;
                    shift @newlist;
                }
            }
            my @keys = keys(%snapshot);
            if (@keys) {
                my $oldsnap = SnapShotDeps($id, $target, $me);
1834 1835 1836 1837 1838
                $dbh->do(qq{DELETE FROM dependencies WHERE $me = ?},
                         undef, $id);
                my $sth =
                    $dbh->prepare(qq{INSERT INTO dependencies ($me, $target)
                                          VALUES (?, ?)});
1839
                foreach my $i (@{$deps{$target}}) {
1840
                    $sth->execute($id, $i);
1841 1842
                }
                foreach my $k (@keys) {
1843
                    LogDependencyActivity($k, $snapshot{$k}, $me, $target, $timestamp);
1844
                }
1845
                LogDependencyActivity($id, $oldsnap, $target, $me, $timestamp);
1846
                $check_dep_bugs = 1;
1847 1848 1849
                # All bugs added or removed from the dependency list
                # must be notified.
                @dependencychanged{@keys} = 1;
1850 1851 1852 1853
            }
        }
    }

1854 1855 1856 1857 1858
    # When a bug changes products and the old or new product is associated
    # with a bug group, it may be necessary to remove the bug from the old
    # group or add it to the new one.  There are a very specific series of
    # conditions under which these activities take place, more information
    # about which can be found in comments within the conditionals below.
1859
    # Check if the user has changed the product to which the bug belongs;
1860
    if ($cgi->param('product') ne $cgi->param('dontchange')
1861 1862
        && $cgi->param('product') ne $oldhash{'product'})
    {
1863 1864 1865 1866 1867 1868 1869 1870 1871
        # Depending on the "addtonewgroup" variable, groups with
        # defaults will change.
        #
        # For each group, determine
        # - The group id and if it is active
        # - The control map value for the old product and this group
        # - The control map value for the new product and this group
        # - Is the user in this group?
        # - Is the bug in this group?
1872 1873 1874 1875 1876 1877 1878 1879 1880 1881 1882 1883 1884 1885 1886 1887 1888
        my $groups = $dbh->selectall_arrayref(
            qq{SELECT DISTINCT groups.id, isactive,
                               oldcontrolmap.membercontrol,
                               newcontrolmap.membercontrol,
                      CASE WHEN groups.id IN ($grouplist) THEN 1 ELSE 0 END,
                      CASE WHEN bug_group_map.group_id IS NOT NULL
                                THEN 1 ELSE 0 END
                 FROM groups
            LEFT JOIN group_control_map AS oldcontrolmap
                   ON oldcontrolmap.group_id = groups.id
                  AND oldcontrolmap.product_id = ?
            LEFT JOIN group_control_map AS newcontrolmap
                   ON newcontrolmap.group_id = groups.id
                  AND newcontrolmap.product_id = ?
            LEFT JOIN bug_group_map
                   ON bug_group_map.group_id = groups.id
                  AND bug_group_map.bug_id = ?},
1889
            undef, $oldhash{'product_id'}, $product->id, $id);
1890 1891 1892 1893 1894 1895 1896
        my @groupstoremove = ();
        my @groupstoadd = ();
        my @defaultstoremove = ();
        my @defaultstoadd = ();
        my @allgroups = ();
        my $buginanydefault = 0;
        my $buginanychangingdefault = 0;
1897 1898 1899
        foreach my $group (@$groups) {
            my ($groupid, $isactive, $oldcontrol, $newcontrol,
                   $useringroup, $bugingroup) = @$group;
1900 1901 1902 1903 1904 1905 1906 1907
            # An undefined newcontrol is none.
            $newcontrol = CONTROLMAPNA unless $newcontrol;
            $oldcontrol = CONTROLMAPNA unless $oldcontrol;
            push(@allgroups, $groupid);
            if (($bugingroup) && ($isactive)
                && ($oldcontrol == CONTROLMAPDEFAULT)) {
                # Bug was in a default group.
                $buginanydefault = 1;
1908 1909
                if (($newcontrol != CONTROLMAPDEFAULT)
                    && ($newcontrol != CONTROLMAPMANDATORY)) {
1910 1911 1912 1913 1914 1915 1916 1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927
                    # Bug was in a default group that no longer is.
                    $buginanychangingdefault = 1;
                    push (@defaultstoremove, $groupid);
                }
            }
            if (($isactive) && (!$bugingroup)
                && ($newcontrol == CONTROLMAPDEFAULT)
                && ($useringroup)) {
                push (@defaultstoadd, $groupid);
            }
            if (($bugingroup) && ($isactive) && ($newcontrol == CONTROLMAPNA)) {
                # Group is no longer permitted.
                push(@groupstoremove, $groupid);
            }
            if ((!$bugingroup) && ($isactive) 
                && ($newcontrol == CONTROLMAPMANDATORY)) {
                # Group is now required.
                push(@groupstoadd, $groupid);
1928
            }
1929
        }
1930 1931 1932 1933 1934 1935 1936 1937 1938
        # If addtonewgroups = "yes", old default groups will be removed
        # and new default groups will be added.
        # If addtonewgroups = "yesifinold", old default groups will be removed
        # and new default groups will be added only if the bug was in ANY
        # of the old default groups.
        # If addtonewgroups = "no", old default groups will be removed and not
        # replaced.
        push(@groupstoremove, @defaultstoremove);
        if (AnyDefaultGroups()
1939 1940
            && (($cgi->param('addtonewgroup') eq 'yes')
            || (($cgi->param('addtonewgroup') eq 'yesifinold')
1941 1942
            && ($buginanydefault)))) {
            push(@groupstoadd, @defaultstoadd);
1943 1944
        }

1945 1946 1947
        # Now actually update the bug_group_map.
        my @DefGroupsAdded = ();
        my @DefGroupsRemoved = ();
1948 1949 1950 1951 1952 1953
        my $sth_insert =
            $dbh->prepare(q{INSERT INTO bug_group_map (bug_id, group_id)
                                 VALUES (?, ?)});
        my $sth_delete = $dbh->prepare(q{DELETE FROM bug_group_map
                                               WHERE bug_id = ?
                                                 AND group_id = ?});
1954 1955 1956 1957
        foreach my $groupid (@allgroups) {
            my $thisadd = grep( ($_ == $groupid), @groupstoadd);
            my $thisdel = grep( ($_ == $groupid), @groupstoremove);
            if ($thisadd) {
1958 1959
                my $group_obj = new Bugzilla::Group($groupid);
                push(@DefGroupsAdded, $group_obj->name);
1960
                $sth_insert->execute($id, $groupid);
1961
            } elsif ($thisdel) {
1962 1963
                my $group_obj = new Bugzilla::Group($groupid);
                push(@DefGroupsRemoved, $group_obj->name);
1964
                $sth_delete->execute($id, $groupid);
1965 1966 1967 1968 1969 1970 1971 1972
            }
        }
        if ((@DefGroupsAdded) || (@DefGroupsRemoved)) {
            LogActivityEntry($id, "bug_group",
                join(', ', @DefGroupsRemoved),
                join(', ', @DefGroupsAdded),
                     $whoid, $timestamp); 
        }
1973 1974
    }
  
1975 1976 1977 1978
    # get a snapshot of the newly set values out of the database, 
    # and then generate any necessary bug activity entries by seeing 
    # what has changed since before we wrote out the new values.
    #
1979
    my $new_bug_obj = new Bugzilla::Bug($id);
1980
    my @newvalues = SnapShotBug($id);
1981 1982
    my %newhash;
    $i = 0;
1983
    foreach my $col (@editable_bug_fields) {
1984
        # Consider NULL db entries to be equivalent to the empty string
1985
        $newvalues[$i] = defined($newvalues[$i]) ? $newvalues[$i] : '';
1986 1987 1988 1989
        # Convert the deadline to the YYYY-MM-DD format.
        if ($col eq 'deadline') {
            $newvalues[$i] = format_time($newvalues[$i], "%Y-%m-%d");
        }
1990 1991 1992
        $newhash{$col} = $newvalues[$i];
        $i++;
    }
1993
    # for passing to Bugzilla::BugMail to ensure that when someone is removed
1994 1995 1996 1997
    # from one of these fields, they get notified of that fact (if desired)
    #
    my $origOwner = "";
    my $origQaContact = "";
1998 1999 2000 2001

    # $msgs will store emails which have to be sent to voters, if any.
    my $msgs;

2002
    foreach my $c (@editable_bug_fields) {
2003 2004
        my $col = $c;           # We modify it, don't want to modify array
                                # values in place.
2005 2006 2007
        my $old = shift @oldvalues;
        my $new = shift @newvalues;
        if ($old ne $new) {
2008

2009 2010 2011
            # Products and components are now stored in the DB using ID's
            # We need to translate this to English before logging it
            if ($col eq 'product_id') {
2012 2013
                $old = $old_bug_obj->product;
                $new = $new_bug_obj->product;
2014 2015 2016
                $col = 'product';
            }
            if ($col eq 'component_id') {
2017 2018
                $old = $old_bug_obj->component;
                $new = $new_bug_obj->component;
2019 2020 2021
                $col = 'component';
            }

2022
            # save off the old value for passing to Bugzilla::BugMail so
2023
            # the old assignee can be notified
2024 2025
            #
            if ($col eq 'assigned_to') {
2026 2027
                $old = ($old) ? user_id_to_login($old) : "";
                $new = ($new) ? user_id_to_login($new) : "";
2028 2029 2030 2031 2032 2033
                $origOwner = $old;
            }

            # ditto for the old qa contact
            #
            if ($col eq 'qa_contact') {
2034 2035
                $old = ($old) ? user_id_to_login($old) : "";
                $new = ($new) ? user_id_to_login($new) : "";
2036
                $origQaContact = $old;
terry%netscape.com's avatar
terry%netscape.com committed
2037
            }
2038

2039 2040
            # If this is the keyword field, only record the changes, not everything.
            if ($col eq 'keywords') {
2041
                ($old, $new) = diff_strings($old, $new);
2042 2043
            }

2044
            if ($col eq 'product') {
2045 2046 2047 2048 2049
                # If some votes have been removed, RemoveVotes() returns
                # a list of messages to send to voters.
                # We delay the sending of these messages till tables are unlocked.
                $msgs = RemoveVotes($id, 0,
                          "This bug has been moved to a different product");
2050 2051

                CheckIfVotedConfirmed($id, $whoid);
2052
            }
2053

2054
            if ($col eq 'bug_status' 
2055
                && is_open_state($old) ne is_open_state($new))
2056 2057 2058
            {
                $check_dep_bugs = 1;
            }
2059

2060 2061
            LogActivityEntry($id,$col,$old,$new,$whoid,$timestamp);
            $bug_changed = 1;
terry%netscape.com's avatar
terry%netscape.com committed
2062 2063
        }
    }
2064
    # Set and update flags.
2065
    Bugzilla::Flag::process($new_bug_obj, undef, $timestamp, $cgi);
2066

2067
    if ($bug_changed) {
2068 2069
        $dbh->do(q{UPDATE bugs SET delta_ts = ? WHERE bug_id = ?},
                 undef, $timestamp, $id);
2070
    }
2071
    $dbh->bz_unlock_tables();
2072

2073 2074
    # Now is a good time to send email to voters.
    foreach my $msg (@$msgs) {
2075
        MessageToMTA($msg);
2076 2077
    }

2078
    if ($duplicate) {
2079 2080 2081 2082 2083
        # If the bug was already marked as a duplicate, remove
        # the existing entry.
        $dbh->do('DELETE FROM duplicates WHERE dupe = ?',
                  undef, $cgi->param('id'));

2084
        # Check to see if Reporter of this bug is reporter of Dupe 
2085 2086 2087 2088 2089 2090 2091 2092
        my $reporter = $dbh->selectrow_array(
            q{SELECT reporter FROM bugs WHERE bug_id = ?}, undef, $id);
        my $isreporter = $dbh->selectrow_array(
            q{SELECT reporter FROM bugs WHERE bug_id = ? AND reporter = ?},
            undef, $duplicate, $reporter);
        my $isoncc = $dbh->selectrow_array(q{SELECT who FROM cc
                                           WHERE bug_id = ? AND who = ?},
                                           undef, $duplicate, $reporter);
2093 2094
        unless ($isreporter || $isoncc
                || !$cgi->param('confirm_add_duplicate')) {
matty%chariot.net.au's avatar
matty%chariot.net.au committed
2095
            # The reporter is oblivious to the existence of the new bug and is permitted access
2096
            # ... add 'em to the cc (and record activity)
2097
            LogActivityEntry($duplicate,"cc","",user_id_to_login($reporter),
2098
                             $whoid,$timestamp);
2099 2100
            $dbh->do(q{INSERT INTO cc (who, bug_id) VALUES (?, ?)},
                     undef, $reporter, $duplicate);
2101
        }
2102
        # Bug 171639 - Duplicate notifications do not need to be private.
2103 2104
        AppendComment($duplicate, $whoid, "", 0, $timestamp, 0,
                      CMT_HAS_DUPE, scalar $cgi->param('id'));
2105

2106 2107
        $dbh->do(q{INSERT INTO duplicates VALUES (?, ?)}, undef,
                 $duplicate, $cgi->param('id'));
2108 2109 2110 2111 2112 2113 2114 2115 2116 2117 2118 2119
    }

    # Now all changes to the DB have been made. It's time to email
    # all concerned users, including the bug itself, but also the
    # duplicated bug and dependent bugs, if any.

    $vars->{'mailrecipients'} = { 'cc' => \@ccRemoved,
                                  'owner' => $origOwner,
                                  'qacontact' => $origQaContact,
                                  'changer' => Bugzilla->user->login };

    $vars->{'id'} = $id;
2120
    $vars->{'type'} = "bug";
2121 2122 2123
    
    # Let the user know the bug was changed and who did and didn't
    # receive email about the change.
2124 2125
    send_results($id, $vars);
 
2126
    if ($duplicate) {
2127
        $vars->{'mailrecipients'} = { 'changer' => Bugzilla->user->login }; 
2128

2129 2130 2131
        $vars->{'id'} = $duplicate;
        $vars->{'type'} = "dupe";
        
2132 2133 2134
        # Let the user know a duplication notation was added to the 
        # original bug.
        send_results($duplicate, $vars);
2135 2136
    }

2137 2138
    if ($check_dep_bugs) {
        foreach my $k (keys(%dependencychanged)) {
2139
            $vars->{'mailrecipients'} = { 'changer' => Bugzilla->user->login }; 
2140 2141 2142
            $vars->{'id'} = $k;
            $vars->{'type'} = "dep";

2143 2144 2145 2146 2147
            # Let the user (if he is able to see the bug) know we checked to 
            # see if we should email notice of this change to users with a 
            # relationship to the dependent bug and who did and didn't 
            # receive email about it.
            send_results($k, $vars);
2148
        }
2149
    }
terry%netscape.com's avatar
terry%netscape.com committed
2150 2151
}

2152 2153 2154 2155 2156 2157
# Determine if Patch Viewer is installed, for Diff link
# (NB: Duplicate code with show_bug.cgi.)
eval {
    require PatchReader;
    $vars->{'patchviewerinstalled'} = 1;
};
2158

2159 2160 2161 2162 2163 2164
if (defined $cgi->param('id')) {
    $action = Bugzilla->user->settings->{'post_bug_submit_action'}->{'value'};
} else {
    # param('id') is not defined when changing multiple bugs
    $action = 'nothing';
}
2165

2166 2167 2168 2169
if (Bugzilla->usage_mode == USAGE_MODE_EMAIL) {
    # Do nothing.
}
elsif ($action eq 'next_bug') {
2170 2171 2172 2173 2174 2175 2176
    my $next_bug;
    my $cur = lsearch(\@bug_list, $cgi->param("id"));
    if ($cur >= 0 && $cur < $#bug_list) {
        $next_bug = $bug_list[$cur + 1];
    }
    if ($next_bug) {
        if (detaint_natural($next_bug) && Bugzilla->user->can_see_bug($next_bug)) {
2177
            my $bug = new Bugzilla::Bug($next_bug);
2178
            ThrowCodeError("bug_error", { bug => $bug }) if $bug->error;
2179

2180 2181
            $vars->{'bugs'} = [$bug];
            $vars->{'nextbug'} = $bug->bug_id;
2182

2183 2184 2185 2186 2187
            $template->process("bug/show.html.tmpl", $vars)
              || ThrowTemplateError($template->error());

            exit;
        }
2188
    }
2189
} elsif ($action eq 'same_bug') {
2190
    if (Bugzilla->user->can_see_bug($cgi->param('id'))) {
2191
        my $bug = new Bugzilla::Bug($cgi->param('id'));
2192
        ThrowCodeError("bug_error", { bug => $bug }) if $bug->error;
2193

2194
        $vars->{'bugs'} = [$bug];
2195

2196 2197
        $template->process("bug/show.html.tmpl", $vars)
          || ThrowTemplateError($template->error());
2198

2199 2200
        exit;
    }
2201 2202
} elsif ($action ne 'nothing') {
    ThrowCodeError("invalid_post_bug_submit_action");
terry%netscape.com's avatar
terry%netscape.com committed
2203
}
2204

2205
# End the response page.
2206 2207 2208 2209 2210 2211 2212 2213
unless (Bugzilla->usage_mode == USAGE_MODE_EMAIL) {
    $template->process("bug/navigate.html.tmpl", $vars)
        || ThrowTemplateError($template->error());
    $template->process("global/footer.html.tmpl", $vars)
        || ThrowTemplateError($template->error());
}

1;