attachment.cgi 26.2 KB
Newer Older
1
#!/usr/bonsaitools/bin/perl -wT
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22
# -*- Mode: perl; indent-tabs-mode: nil -*-
#
# The contents of this file are subject to the Mozilla Public
# License Version 1.1 (the "License"); you may not use this file
# except in compliance with the License. You may obtain a copy of
# the License at http://www.mozilla.org/MPL/
#
# Software distributed under the License is distributed on an "AS
# IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or
# implied. See the License for the specific language governing
# rights and limitations under the License.
#
# The Original Code is the Bugzilla Bug Tracking System.
#
# The Initial Developer of the Original Code is Netscape Communications
# Corporation. Portions created by Netscape are
# Copyright (C) 1998 Netscape Communications Corporation. All
# Rights Reserved.
#
# Contributor(s): Terry Weissman <terry@mozilla.org>
#                 Myk Melez <myk@mozilla.org>
23 24
#                 Daniel Raichle <draichle@gmx.net>
#                 Dave Miller <justdave@syndicomm.com>
25 26 27 28 29 30 31 32

################################################################################
# Script Initialization
################################################################################

# Make it harder for us to do dangerous things in Perl.
use strict;

33 34
use lib qw(.);

35
use vars qw(
36
  $cgi
37 38 39 40
  $template
  $vars
);

41 42 43
# Include the Bugzilla CGI and general utility library.
require "CGI.pl";

44 45 46
# Use these modules to handle flags.
use Bugzilla::Flag; 
use Bugzilla::FlagType; 
47
use Bugzilla::User;
48

49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75
# Establish a connection to the database backend.
ConnectToDatabase();

# Check whether or not the user is logged in and, if so, set the $::userid 
quietly_check_login();

################################################################################
# Main Body Execution
################################################################################

# All calls to this script should contain an "action" variable whose value
# determines what the user wants to do.  The code below checks the value of
# that variable and runs the appropriate code.

# Determine whether to use the action specified by the user or the default.
my $action = $::FORM{'action'} || 'view';

if ($action eq "view")  
{ 
  validateID();
  view(); 
}
elsif ($action eq "viewall") 
{ 
  ValidateBugID($::FORM{'bugid'});
  viewall(); 
}
76 77
elsif ($action eq "enter") 
{ 
78
  confirm_login();
79 80 81 82 83
  ValidateBugID($::FORM{'bugid'});
  enter(); 
}
elsif ($action eq "insert")
{
84
  confirm_login();
85
  ValidateBugID($::FORM{'bugid'});
86
  ValidateComment($::FORM{'comment'});
87 88
  validateFilename();
  validateIsPatch();
89 90
  my $data = validateData();
  validateDescription();
91 92
  validateContentType() unless $::FORM{'ispatch'};
  validateObsolete() if $::FORM{'obsolete'};
93
  insert($data);
94
}
95 96
elsif ($action eq "edit") 
{ 
97
  quietly_check_login();
98
  validateID();
99
  validateCanEdit($::FORM{'id'});
100 101 102 103 104
  edit(); 
}
elsif ($action eq "update") 
{ 
  confirm_login();
105
  ValidateComment($::FORM{'comment'});
106
  validateID();
107
  validateCanEdit($::FORM{'id'});
108 109
  validateDescription();
  validateIsPatch();
110
  validateContentType() unless $::FORM{'ispatch'};
111
  validateIsObsolete();
112
  validatePrivate();
113 114
  Bugzilla::User::match_field({ '^requestee(_type)?-(\d+)$' => 
                                    { 'type' => 'single' } });
115 116
  Bugzilla::Flag::validate(\%::FORM);
  Bugzilla::FlagType::validate(\%::FORM);
117 118 119 120
  update();
}
else 
{ 
121
  ThrowCodeError("unknown_action");
122 123 124 125 126 127 128 129 130 131
}

exit;

################################################################################
# Data Validation / Security Authorization
################################################################################

sub validateID
{
132 133
    # Validate the value of the "id" form field, which must contain an
    # integer that is the ID of an existing attachment.
134

135 136 137 138
    $vars->{'attach_id'} = $::FORM{'id'};
    
    detaint_natural($::FORM{'id'}) 
     || ThrowUserError("invalid_attach_id");
139
  
140 141 142
    # Make sure the attachment exists in the database.
    SendSQL("SELECT bug_id, isprivate FROM attachments WHERE attach_id = $::FORM{'id'}");
    MoreSQLData()
143
      || ThrowUserError("invalid_attach_id");
144

145 146 147 148
    # Make sure the user is authorized to access this attachment's bug.
    my ($bugid, $isprivate) = FetchSQLData();
    ValidateBugID($bugid);
    if (($isprivate > 0 ) && Param("insidergroup") && !(UserInGroup(Param("insidergroup")))) {
149
        ThrowUserError("attachment_access_denied");
150
    }
151 152
}

153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170
sub validateCanEdit
{
    my ($attach_id) = (@_);

    # If the user is not logged in, claim that they can edit. This allows
    # the edit scrren to be displayed to people who aren't logged in.
    # People not logged in can't actually commit changes, because that code
    # calls confirm_login, not quietly_check_login, before calling this sub
    return if $::userid == 0;

    # People in editbugs can edit all attachments
    return if UserInGroup("editbugs");

    # Bug 97729 - the submitter can edit their attachments
    SendSQL("SELECT attach_id FROM attachments WHERE " .
            "attach_id = $attach_id AND submitter_id = $::userid");

    FetchSQLData()
171
      || ThrowUserError("illegal_attachment_edit");
172 173
}

174 175 176
sub validateDescription
{
  $::FORM{'description'}
177
    || ThrowUserError("missing_attachment_description");
178 179 180 181 182 183 184 185
}

sub validateIsPatch
{
  # Set the ispatch flag to zero if it is undefined, since the UI uses
  # an HTML checkbox to represent this flag, and unchecked HTML checkboxes
  # do not get sent in HTML requests.
  $::FORM{'ispatch'} = $::FORM{'ispatch'} ? 1 : 0;
186 187 188 189 190 191 192 193 194

  # Set the content type to text/plain if the attachment is a patch.
  $::FORM{'contenttype'} = "text/plain" if $::FORM{'ispatch'};
}

sub validateContentType
{
  if (!$::FORM{'contenttypemethod'})
  {
195
    ThrowUserError("missing_content_type_method");
196 197 198
  }
  elsif ($::FORM{'contenttypemethod'} eq 'autodetect')
  {
199
    my $contenttype = $cgi->uploadInfo($cgi->param('data'))->{'Content-Type'};
200 201
    # The user asked us to auto-detect the content type, so use the type
    # specified in the HTTP request headers.
202
    if ( !$contenttype )
203
    {
204
      ThrowUserError("missing_content_type");
205
    }
206
    $::FORM{'contenttype'} = $contenttype;
207 208 209 210 211 212 213 214 215 216 217 218 219
  }
  elsif ($::FORM{'contenttypemethod'} eq 'list')
  {
    # The user selected a content type from the list, so use their selection.
    $::FORM{'contenttype'} = $::FORM{'contenttypeselection'};
  }
  elsif ($::FORM{'contenttypemethod'} eq 'manual')
  {
    # The user entered a content type manually, so use their entry.
    $::FORM{'contenttype'} = $::FORM{'contenttypeentry'};
  }
  else
  {
220 221
    $vars->{'contenttypemethod'} = $::FORM{'contenttypemethod'};
    ThrowCodeError("illegal_content_type_method");
222 223 224 225
  }

  if ( $::FORM{'contenttype'} !~ /^(application|audio|image|message|model|multipart|text|video)\/.+$/ )
  {
226 227
    $vars->{'contenttype'} = $::FORM{'contenttype'};
    ThrowUserError("invalid_content_type");
228
  }
229 230 231 232 233 234 235 236 237 238
}

sub validateIsObsolete
{
  # Set the isobsolete flag to zero if it is undefined, since the UI uses
  # an HTML checkbox to represent this flag, and unchecked HTML checkboxes
  # do not get sent in HTML requests.
  $::FORM{'isobsolete'} = $::FORM{'isobsolete'} ? 1 : 0;
}

239 240 241 242 243 244 245 246
sub validatePrivate
{
    # Set the isprivate flag to zero if it is undefined, since the UI uses
    # an HTML checkbox to represent this flag, and unchecked HTML checkboxes
    # do not get sent in HTML requests.
    $::FORM{'isprivate'} = $::FORM{'isprivate'} ? 1 : 0;
}

247 248
sub validateData
{
249 250
  my $maxsize = $::FORM{'ispatch'} ? Param('maxpatchsize') : Param('maxattachmentsize');
  $maxsize *= 1024; # Convert from K
251

252 253
  my $fh = $cgi->upload('data');
  my $data;
254

255 256
  # We could get away with reading only as much as required, except that then
  # we wouldn't have a size to print to the error handler below.
257
  {
258 259 260
      # enable 'slurp' mode
      local $/;
      $data = <$fh>;
261
  }
262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277

  $data
    || ThrowUserError("zero_length_file");

  # Make sure the attachment does not exceed the maximum permitted size
  my $len = length($data);
  if ($maxsize && $len > $maxsize) {
      $vars->{'filesize'} = sprintf("%.0f", $len/1024);
      if ( $::FORM{'ispatch'} ) {
          ThrowUserError("patch_too_large");
      } else {
          ThrowUserError("file_too_large");
      }
  }

  return $data;
278 279
}

280
my $filename;
281 282
sub validateFilename
{
283
  defined $cgi->upload('data')
284
    || ThrowUserError("file_not_specified");
285 286 287 288 289 290 291 292 293 294 295 296 297

  $filename = $cgi->upload('data');
  
  # Remove path info (if any) from the file name.  The browser should do this
  # for us, but some are buggy.  This may not work on Mac file names and could
  # mess up file names with slashes in them, but them's the breaks.  We only
  # use this as a hint to users downloading attachments anyway, so it's not 
  # a big deal if it munges incorrectly occasionally.
  $filename =~ s/^.*[\/\\]//;

  # Truncate the filename to 100 characters, counting from the end of the string
  # to make sure we keep the filename extension.
  $filename = substr($filename, -100, 100);
298 299 300 301 302 303 304
}

sub validateObsolete
{
  # Make sure the attachment id is valid and the user has permissions to view
  # the bug to which it is attached.
  foreach my $attachid (@{$::MFORM{'obsolete'}}) {
305 306
    $vars->{'attach_id'} = $attachid;
    
307
    detaint_natural($attachid)
308
      || ThrowCodeError("invalid_attach_id_to_obsolete");
309 310 311 312 313 314
  
    SendSQL("SELECT bug_id, isobsolete, description 
             FROM attachments WHERE attach_id = $attachid");

    # Make sure the attachment exists in the database.
    MoreSQLData()
315
      || ThrowUserError("invalid_attach_id");
316 317 318

    my ($bugid, $isobsolete, $description) = FetchSQLData();

319 320
    $vars->{'description'} = $description;
    
321 322
    if ($bugid != $::FORM{'bugid'})
    {
323 324 325
      $vars->{'my_bug_id'} = $::FORM{'bugid'};
      $vars->{'attach_bug_id'} = $bugid;
      ThrowCodeError("mismatched_bug_ids_on_obsolete");
326 327 328 329
    }

    if ( $isobsolete )
    {
330
      ThrowCodeError("attachment_already_obsolete");
331
    }
332 333 334

    # Check that the user can modify this attachment
    validateCanEdit($attachid);
335 336 337 338
  }

}

339 340 341 342 343 344
################################################################################
# Functions
################################################################################

sub view
{
345
    # Display an attachment.
346

347
    # Retrieve the attachment content and its content type from the database.
348 349 350
    SendSQL("SELECT mimetype, filename, thedata FROM attachments WHERE attach_id = $::FORM{'id'}");
    my ($contenttype, $filename, $thedata) = FetchSQLData();

351
    # Return the appropriate HTTP response headers.
352 353 354
    $filename =~ s/^.*[\/\\]//;
    my $filesize = length($thedata);
    print qq{Content-Type: $contenttype; name="$filename"\n};
355
    print qq{Content-Disposition: inline; filename=$filename\n};
356 357
    print qq{Content-Length: $filesize\n};
    print qq{\n$thedata};
358 359 360 361 362 363 364 365 366 367

}


sub viewall
{
  # Display all attachments for a given bug in a series of IFRAMEs within one HTML page.

  # Retrieve the attachments from the database and write them into an array
  # of hashes where each hash represents one attachment.
368 369 370 371
    my $privacy = "";
    if (Param("insidergroup") && !(UserInGroup(Param("insidergroup")))) {
        $privacy = "AND isprivate < 1 ";
    }
372 373
    SendSQL("SELECT attach_id, DATE_FORMAT(creation_ts, '%Y.%m.%d %H:%i'),
            mimetype, description, ispatch, isobsolete, isprivate 
374 375
            FROM attachments WHERE bug_id = $::FORM{'bugid'} $privacy 
            ORDER BY attach_id");
376
  my @attachments; # the attachments array
377 378
  while (MoreSQLData())
  {
379
    my %a; # the attachment hash
380
    ($a{'attachid'}, $a{'date'}, $a{'contenttype'}, 
381
     $a{'description'}, $a{'ispatch'}, $a{'isobsolete'}, $a{'isprivate'}) = FetchSQLData();
382 383 384 385 386

    # Flag attachments as to whether or not they can be viewed (as opposed to
    # being downloaded).  Currently I decide they are viewable if their MIME type 
    # is either text/*, image/*, or application/vnd.mozilla.*.
    # !!! Yuck, what an ugly hack.  Fix it!
387
    $a{'isviewable'} = ( $a{'contenttype'} =~ /^(text|image|application\/vnd\.mozilla\.)/ );
388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405

    # Add the hash representing the attachment to the array of attachments.
    push @attachments, \%a;
  }

  # Retrieve the bug summary for displaying on screen.
  SendSQL("SELECT short_desc FROM bugs WHERE bug_id = $::FORM{'bugid'}");
  my ($bugsummary) = FetchSQLData();

  # Define the variables and functions that will be passed to the UI template.
  $vars->{'bugid'} = $::FORM{'bugid'};
  $vars->{'bugsummary'} = $bugsummary;
  $vars->{'attachments'} = \@attachments;

  # Return the appropriate HTTP response headers.
  print "Content-Type: text/html\n\n";

  # Generate and return the UI (HTML page) from the appropriate template.
406 407
  $template->process("attachment/show-multiple.html.tmpl", $vars)
    || ThrowTemplateError($template->error());
408 409 410
}


411 412 413 414
sub enter
{
  # Display a form for entering a new attachment.

415 416 417 418 419 420
  # Retrieve the attachments the user can edit from the database and write
  # them into an array of hashes where each hash represents one attachment.
  my $canEdit = "";
  if (!UserInGroup("editbugs")) {
      $canEdit = "AND submitter_id = $::userid";
  }
421
  SendSQL("SELECT attach_id, description, isprivate
422 423
           FROM attachments
           WHERE bug_id = $::FORM{'bugid'}
424
           AND isobsolete = 0 $canEdit
425 426 427 428
           ORDER BY attach_id");
  my @attachments; # the attachments array
  while ( MoreSQLData() ) {
    my %a; # the attachment hash
429
    ($a{'id'}, $a{'description'}, $a{'isprivate'}) = FetchSQLData();
430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447

    # Add the hash representing the attachment to the array of attachments.
    push @attachments, \%a;
  }

  # Retrieve the bug summary for displaying on screen.
  SendSQL("SELECT short_desc FROM bugs WHERE bug_id = $::FORM{'bugid'}");
  my ($bugsummary) = FetchSQLData();

  # Define the variables and functions that will be passed to the UI template.
  $vars->{'bugid'} = $::FORM{'bugid'};
  $vars->{'bugsummary'} = $bugsummary;
  $vars->{'attachments'} = \@attachments;

  # Return the appropriate HTTP response headers.
  print "Content-Type: text/html\n\n";

  # Generate and return the UI (HTML page) from the appropriate template.
448 449
  $template->process("attachment/create.html.tmpl", $vars)
    || ThrowTemplateError($template->error());
450 451 452 453 454
}


sub insert
{
455 456
  my ($data) = @_;

457 458 459
  # Insert a new attachment into the database.

  # Escape characters in strings that will be used in SQL statements.
460
  $filename = SqlQuote($filename);
461 462
  my $description = SqlQuote($::FORM{'description'});
  my $contenttype = SqlQuote($::FORM{'contenttype'});
463
  my $thedata = SqlQuote($data);
464
  my $isprivate = $::FORM{'isprivate'} ? 1 : 0;
465 466

  # Insert the attachment into the database.
467 468
  SendSQL("INSERT INTO attachments (bug_id, creation_ts, filename, description, mimetype, ispatch, isprivate, submitter_id, thedata) 
           VALUES ($::FORM{'bugid'}, now(), $filename, $description, $contenttype, $::FORM{'ispatch'}, $isprivate, $::userid, $thedata)");
469 470 471 472 473 474

  # Retrieve the ID of the newly created attachment record.
  SendSQL("SELECT LAST_INSERT_ID()");
  my $attachid = FetchOneColumn();

  # Insert a comment about the new attachment into the database.
475
  my $comment = "Created an attachment (id=$attachid)\n$::FORM{'description'}\n";
476 477 478 479 480 481 482 483 484
  $comment .= ("\n" . $::FORM{'comment'}) if $::FORM{'comment'};

  use Text::Wrap;
  $Text::Wrap::columns = 80;
  $Text::Wrap::huge = 'overflow';
  $comment = Text::Wrap::wrap('', '', $comment);

  AppendComment($::FORM{'bugid'}, 
                $::COOKIE{"Bugzilla_login"},
485 486
                $comment,
                $isprivate);
487 488 489

  # Make existing attachments obsolete.
  my $fieldid = GetFieldID('attachments.isobsolete');
490 491
  foreach my $obsolete_id (@{$::MFORM{'obsolete'}}) {
      SendSQL("UPDATE attachments SET isobsolete = 1 WHERE attach_id = $obsolete_id");
492
      SendSQL("INSERT INTO bugs_activity (bug_id, attach_id, who, bug_when, fieldid, removed, added) 
493 494 495 496 497
               VALUES ($::FORM{'bugid'}, $obsolete_id, $::userid, NOW(), $fieldid, '0', '1')");
      # If the obsolete attachment has pending flags, migrate them to the new attachment.
      if (Bugzilla::Flag::count({ 'attach_id' => $obsolete_id , 'status' => 'pending' })) {
        Bugzilla::Flag::migrate($obsolete_id, $attachid);
      }
498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522
  }

  # Send mail to let people know the attachment has been created.  Uses a 
  # special syntax of the "open" and "exec" commands to capture the output of 
  # "processmail", which "system" doesn't allow, without running the command 
  # through a shell, which backticks (``) do.
  #system ("./processmail", $bugid , $::userid);
  #my $mailresults = `./processmail $bugid $::userid`;
  my $mailresults = '';
  open(PMAIL, "-|") or exec('./processmail', $::FORM{'bugid'}, $::COOKIE{'Bugzilla_login'});
  $mailresults .= $_ while <PMAIL>;
  close(PMAIL);
 
  # Define the variables and functions that will be passed to the UI template.
  $vars->{'bugid'} = $::FORM{'bugid'};
  $vars->{'attachid'} = $attachid;
  $vars->{'description'} = $description;
  $vars->{'mailresults'} = $mailresults;
  $vars->{'contenttypemethod'} = $::FORM{'contenttypemethod'};
  $vars->{'contenttype'} = $::FORM{'contenttype'};

  # Return the appropriate HTTP response headers.
  print "Content-Type: text/html\n\n";

  # Generate and return the UI (HTML page) from the appropriate template.
523 524
  $template->process("attachment/created.html.tmpl", $vars)
    || ThrowTemplateError($template->error());
525 526 527
}


528 529
sub edit
{
530 531 532 533
  # Edit an attachment record.  Users with "editbugs" privileges, (or the 
  # original attachment's submitter) can edit the attachment's description,
  # content type, ispatch and isobsolete flags, and statuses, and they can
  # also submit a comment that appears in the bug.
534 535 536
  # Users cannot edit the content of the attachment itself.

  # Retrieve the attachment from the database.
537
  SendSQL("SELECT description, mimetype, filename, bug_id, ispatch, isobsolete, isprivate 
538
           FROM attachments WHERE attach_id = $::FORM{'id'}");
539
  my ($description, $contenttype, $filename, $bugid, $ispatch, $isobsolete, $isprivate) = FetchSQLData();
540 541

  # Flag attachment as to whether or not it can be viewed (as opposed to
542 543
  # being downloaded).  Currently I decide it is viewable if its content
  # type is either text/.* or application/vnd.mozilla.*.
544
  # !!! Yuck, what an ugly hack.  Fix it!
545
  my $isviewable = ( $contenttype =~ /^(text|image|application\/vnd\.mozilla\.)/ );
546 547 548 549 550 551 552 553

  # Retrieve a list of attachments for this bug as well as a summary of the bug
  # to use in a navigation bar across the top of the screen.
  SendSQL("SELECT attach_id FROM attachments WHERE bug_id = $bugid ORDER BY attach_id");
  my @bugattachments;
  push(@bugattachments, FetchSQLData()) while (MoreSQLData());
  SendSQL("SELECT short_desc FROM bugs WHERE bug_id = $bugid");
  my ($bugsummary) = FetchSQLData();
554 555 556 557 558
  
  # Get a list of flag types that can be set for this attachment.
  SendSQL("SELECT product_id, component_id FROM bugs WHERE bug_id = $bugid");
  my ($product_id, $component_id) = FetchSQLData();
  my $flag_types = Bugzilla::FlagType::match({ 'target_type'  => 'attachment' , 
559 560
                                               'product_id'   => $product_id , 
                                               'component_id' => $component_id });
561 562
  foreach my $flag_type (@$flag_types) {
    $flag_type->{'flags'} = Bugzilla::Flag::match({ 'type_id'   => $flag_type->{'id'}, 
563
                                                    'attach_id' => $::FORM{'id'} });
564 565
  }
  $vars->{'flag_types'} = $flag_types;
566
  $vars->{'any_flags_requesteeble'} = grep($_->{'is_requesteeble'}, @$flag_types);
567
  
568 569 570
  # Define the variables and functions that will be passed to the UI template.
  $vars->{'attachid'} = $::FORM{'id'}; 
  $vars->{'description'} = $description; 
571
  $vars->{'contenttype'} = $contenttype; 
572
  $vars->{'filename'} = $filename;
573 574 575 576
  $vars->{'bugid'} = $bugid; 
  $vars->{'bugsummary'} = $bugsummary; 
  $vars->{'ispatch'} = $ispatch; 
  $vars->{'isobsolete'} = $isobsolete; 
577
  $vars->{'isprivate'} = $isprivate; 
578 579 580 581 582 583 584
  $vars->{'isviewable'} = $isviewable; 
  $vars->{'attachments'} = \@bugattachments; 

  # Return the appropriate HTTP response headers.
  print "Content-Type: text/html\n\n";

  # Generate and return the UI (HTML page) from the appropriate template.
585 586
  $template->process("attachment/edit.html.tmpl", $vars)
    || ThrowTemplateError($template->error());
587 588 589 590 591
}


sub update
{
592
  # Updates an attachment record.
593 594 595

  # Get the bug ID for the bug to which this attachment is attached.
  SendSQL("SELECT bug_id FROM attachments WHERE attach_id = $::FORM{'id'}");
596 597 598 599 600 601 602
  my $bugid = FetchSQLData();
  unless ($bugid) 
  {
    $vars->{'bug_id'} = $bugid;
    ThrowUserError("invalid_bug_id");
  }
  
603
  # Lock database tables in preparation for updating the attachment.
604 605 606 607 608
  SendSQL("LOCK TABLES attachments WRITE , flags WRITE , " . 
          "flagtypes READ , fielddefs READ , bugs_activity WRITE, " . 
          "flaginclusions AS i READ, flagexclusions AS e READ, " . 
          "bugs READ, profiles READ");
  
609 610
  # Get a copy of the attachment record before we make changes
  # so we can record those changes in the activity table.
611
  SendSQL("SELECT description, mimetype, filename, ispatch, isobsolete, isprivate
612
           FROM attachments WHERE attach_id = $::FORM{'id'}");
613 614
  my ($olddescription, $oldcontenttype, $oldfilename, $oldispatch,
      $oldisobsolete, $oldisprivate) = FetchSQLData();
615

616
  # Quote the description and content type for use in the SQL UPDATE statement.
617
  my $quoteddescription = SqlQuote($::FORM{'description'});
618
  my $quotedcontenttype = SqlQuote($::FORM{'contenttype'});
619
  my $quotedfilename = SqlQuote($::FORM{'filename'});
620 621 622 623 624

  # Update the attachment record in the database.
  # Sets the creation timestamp to itself to avoid it being updated automatically.
  SendSQL("UPDATE  attachments 
           SET     description = $quoteddescription , 
625
                   mimetype = $quotedcontenttype , 
626
                   filename = $quotedfilename ,
627
                   ispatch = $::FORM{'ispatch'} , 
628 629
                   isobsolete = $::FORM{'isobsolete'} ,
                   isprivate = $::FORM{'isprivate'} 
630 631 632
           WHERE   attach_id = $::FORM{'id'}
         ");

633 634 635 636
  # Figure out when the changes were made.
  SendSQL("SELECT NOW()");
  my $timestamp = FetchOneColumn();
    
637
  # Record changes in the activity table.
638
  my $sql_timestamp = SqlQuote($timestamp);
639 640 641 642
  if ($olddescription ne $::FORM{'description'}) {
    my $quotedolddescription = SqlQuote($olddescription);
    my $fieldid = GetFieldID('attachments.description');
    SendSQL("INSERT INTO bugs_activity (bug_id, attach_id, who, bug_when, fieldid, removed, added) 
643
             VALUES ($bugid, $::FORM{'id'}, $::userid, $sql_timestamp, $fieldid, $quotedolddescription, $quoteddescription)");
644
  }
645 646
  if ($oldcontenttype ne $::FORM{'contenttype'}) {
    my $quotedoldcontenttype = SqlQuote($oldcontenttype);
647 648
    my $fieldid = GetFieldID('attachments.mimetype');
    SendSQL("INSERT INTO bugs_activity (bug_id, attach_id, who, bug_when, fieldid, removed, added) 
649
             VALUES ($bugid, $::FORM{'id'}, $::userid, $sql_timestamp, $fieldid, $quotedoldcontenttype, $quotedcontenttype)");
650
  }
651 652 653 654 655 656
  if ($oldfilename ne $::FORM{'filename'}) {
    my $quotedoldfilename = SqlQuote($oldfilename);
    my $fieldid = GetFieldID('attachments.filename');
    SendSQL("INSERT INTO bugs_activity (bug_id, attach_id, who, bug_when, fieldid, removed, added) 
             VALUES ($bugid, $::FORM{'id'}, $::userid, NOW(), $fieldid, $quotedoldfilename, $quotedfilename)");
  }
657 658 659
  if ($oldispatch ne $::FORM{'ispatch'}) {
    my $fieldid = GetFieldID('attachments.ispatch');
    SendSQL("INSERT INTO bugs_activity (bug_id, attach_id, who, bug_when, fieldid, removed, added) 
660
             VALUES ($bugid, $::FORM{'id'}, $::userid, $sql_timestamp, $fieldid, $oldispatch, $::FORM{'ispatch'})");
661 662 663 664
  }
  if ($oldisobsolete ne $::FORM{'isobsolete'}) {
    my $fieldid = GetFieldID('attachments.isobsolete');
    SendSQL("INSERT INTO bugs_activity (bug_id, attach_id, who, bug_when, fieldid, removed, added) 
665
             VALUES ($bugid, $::FORM{'id'}, $::userid, $sql_timestamp, $fieldid, $oldisobsolete, $::FORM{'isobsolete'})");
666
  }
667 668 669 670 671
  if ($oldisprivate ne $::FORM{'isprivate'}) {
    my $fieldid = GetFieldID('attachments.isprivate');
    SendSQL("INSERT INTO bugs_activity (bug_id, attach_id, who, bug_when, fieldid, removed, added) 
             VALUES ($bugid, $::FORM{'id'}, $::userid, NOW(), $fieldid, $oldisprivate, $::FORM{'isprivate'})");
  }
672 673 674 675 676
  
  # Update flags.
  my $target = Bugzilla::Flag::GetTarget(undef, $::FORM{'id'});
  Bugzilla::Flag::process($target, $timestamp, \%::FORM);
  
677 678 679 680 681 682 683
  # Unlock all database tables now that we are finished updating the database.
  SendSQL("UNLOCK TABLES");

  # If the user submitted a comment while editing the attachment, 
  # add the comment to the bug.
  if ( $::FORM{'comment'} )
  {
684 685 686 687
    use Text::Wrap;
    $Text::Wrap::columns = 80;
    $Text::Wrap::huge = 'wrap';

688 689 690 691
    # Append a string to the comment to let users know that the comment came from
    # the "edit attachment" screen.
    my $comment = qq|(From update of attachment $::FORM{'id'})\n| . $::FORM{'comment'};

692 693 694 695 696 697 698 699 700 701 702 703 704
    my $wrappedcomment = "";
    foreach my $line (split(/\r\n|\r|\n/, $comment))
    {
      if ( $line =~ /^>/ )
      {
        $wrappedcomment .= $line . "\n";
      }
      else
      {
        $wrappedcomment .= wrap('', '', $line) . "\n";
      }
    }

705 706 707 708 709 710
    # Get the user's login name since the AppendComment function needs it.
    my $who = DBID_to_name($::userid);
    # Mention $::userid again so Perl doesn't give me a warning about it.
    my $neverused = $::userid;

    # Append the comment to the list of comments in the database.
711
    AppendComment($bugid, $who, $wrappedcomment, $::FORM{'isprivate'}, $timestamp);
712 713

  }
714
  
715 716 717 718 719 720 721
  # Send mail to let people know the bug has changed.  Uses a special syntax
  # of the "open" and "exec" commands to capture the output of "processmail",
  # which "system" doesn't allow, without running the command through a shell,
  # which backticks (``) do.
  #system ("./processmail", $bugid , $::userid);
  #my $mailresults = `./processmail $bugid $::userid`;
  my $mailresults = '';
722
  open(PMAIL, "-|") or exec('./processmail', $bugid, DBID_to_name($::userid));
723 724 725 726 727 728 729 730 731 732 733 734
  $mailresults .= $_ while <PMAIL>;
  close(PMAIL);
 
  # Define the variables and functions that will be passed to the UI template.
  $vars->{'attachid'} = $::FORM{'id'}; 
  $vars->{'bugid'} = $bugid; 
  $vars->{'mailresults'} = $mailresults; 

  # Return the appropriate HTTP response headers.
  print "Content-Type: text/html\n\n";

  # Generate and return the UI (HTML page) from the appropriate template.
735 736
  $template->process("attachment/updated.html.tmpl", $vars)
    || ThrowTemplateError($template->error());
737
}