Ai
3 Star 0 Fork 0

Gitee 极速下载/webtools-bmo-bugzilla

加入 Gitee
与超过 1200万 开发者一起发现、参与优秀开源项目,私有仓库也完全免费 :)
免费加入
文件
此仓库是为了提升国内下载速度的镜像仓库,每日同步一次。 原始仓库: https://github.com/mozilla/webtools-bmo-bugzilla
克隆/下载
attachment.cgi 30.80 KB
一键复制 编辑 原始数据 按行查看 历史
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955
#!/usr/bin/env perl
# This Source Code Form is subject to the terms of the Mozilla Public
# License, v. 2.0. If a copy of the MPL was not distributed with this
# file, You can obtain one at http://mozilla.org/MPL/2.0/.
#
# This Source Code Form is "Incompatible With Secondary Licenses", as
# defined by the Mozilla Public License, v. 2.0.
use 5.10.1;
use strict;
use warnings;
use lib qw(. lib local/lib/perl5);
use Bugzilla;
use Bugzilla::BugMail;
use Bugzilla::Constants;
use Bugzilla::Error;
use Bugzilla::Flag;
use Bugzilla::FlagType;
use Bugzilla::User;
use Bugzilla::Util;
use Bugzilla::Bug;
use Bugzilla::Field;
use Bugzilla::Attachment;
use Bugzilla::Attachment::PatchReader;
use Bugzilla::Token;
use Bugzilla::Keyword;
use Bugzilla::Hook;
use Mojo::Util qw(url_escape);
use Encode qw(encode find_encoding from_to);
use URI;
use URI::QueryParam;
use File::Basename qw(basename);
use MIME::Base64 qw(decode_base64);
# For most scripts we don't make $cgi and $template global variables. But
# when preparing Bugzilla for mod_perl, this script used these
# variables in so many subroutines that it was easier to just
# make them globals.
local our $cgi = Bugzilla->cgi;
local our $template = Bugzilla->template;
local our $vars = {};
local $Bugzilla::CGI::ALLOW_UNSAFE_RESPONSE = 1;
################################################################################
# Main Body Execution
################################################################################
# All calls to this script should contain an "action" variable whose
# value determines what the user wants to do. The code below checks
# the value of that variable and runs the appropriate code. If none is
# supplied, we default to 'view'.
# Determine whether to use the action specified by the user or the default.
my $action = $cgi->param('action') || 'view';
my $format = $cgi->param('format') || '';
# BMO: Don't allow updating of bugs if disabled
if (Bugzilla->params->{disable_bug_updates} && $cgi->request_method eq 'POST') {
ThrowErrorPage(
'bug/process/updates-disabled.html.tmpl',
'Bug updates are currently disabled.'
);
}
# You must use the appropriate urlbase param when doing anything
# but viewing an attachment, or a raw diff.
if ($action ne 'view'
&& (($action !~ /^(?:interdiff|diff)$/) || $format ne 'raw'))
{
do_ssl_redirect_if_required();
my $C = Bugzilla->request_cache->{mojo_controller};
if ($C->url_is_attachment_base) {
$cgi->redirect_to_urlbase;
}
Bugzilla->login();
}
# When viewing an attachment, do not request credentials if we are on
# the alternate host. Let view() decide when to call Bugzilla->login.
if ($action eq "view") {
view();
}
elsif ($action eq "interdiff") {
interdiff();
}
elsif ($action eq "diff") {
diff();
}
elsif ($action eq "viewall") {
viewall();
}
elsif ($action eq "enter") {
Bugzilla->login(LOGIN_REQUIRED);
enter();
}
elsif ($action eq "insert") {
Bugzilla->login(LOGIN_REQUIRED);
insert();
}
elsif ($action eq "edit") {
edit();
}
elsif ($action eq "update") {
Bugzilla->login(LOGIN_REQUIRED);
update();
}
elsif ($action eq "delete") {
delete_attachment();
}
else {
ThrowUserError('unknown_action', {action => $action});
}
exit;
################################################################################
# Data Validation / Security Authorization
################################################################################
# Validates an attachment ID. Optionally takes a parameter of a form
# variable name that contains the ID to be validated. If not specified,
# uses 'id'.
# If the second parameter is true, the attachment ID will be validated,
# however the current user's access to the attachment will not be checked.
# Will throw an error if 1) attachment ID is not a valid number,
# 2) attachment does not exist, or 3) user isn't allowed to access the
# attachment.
#
# Returns an attachment object.
sub validateID {
my ($param, $dont_validate_access) = @_;
$param ||= 'id';
# If we're not doing interdiffs, check if id wasn't specified and
# prompt them with a page that allows them to choose an attachment.
# Happens when calling plain attachment.cgi from the urlbar directly
if ($param eq 'id' && !$cgi->param('id')) {
print $cgi->header();
$template->process("attachment/choose.html.tmpl", $vars)
|| ThrowTemplateError($template->error());
exit;
}
my $attach_id = $cgi->param($param);
# Validate the specified attachment id. detaint kills $attach_id if
# non-natural, so use the original value from $cgi in our exception
# message here.
detaint_natural($attach_id)
|| ThrowUserError("invalid_attach_id",
{attach_id => scalar $cgi->param($param)});
# Make sure the attachment exists in the database.
my $attachment = new Bugzilla::Attachment({id => $attach_id, cache => 1})
|| ThrowUserError("invalid_attach_id", {attach_id => $attach_id});
return $attachment if ($dont_validate_access || check_can_access($attachment));
}
# Make sure the current user has access to the specified attachment.
sub check_can_access {
my $attachment = shift;
my $user = Bugzilla->user;
# Make sure the user is authorized to access this attachment's bug.
Bugzilla::Bug->check({id => $attachment->bug_id, cache => 1});
if ( $attachment->isprivate
&& $user->id != $attachment->attacher->id
&& !$user->is_insider)
{
ThrowUserError('auth_failure',
{action => 'access', object => 'attachment', attach_id => $attachment->id});
}
return 1;
}
# Determines if the attachment is public -- that is, if users who are
# not logged in have access to the attachment
sub attachmentIsPublic {
my $attachment = shift;
return 0 if Bugzilla->params->{'requirelogin'};
return 0 if $attachment->isprivate;
my $anon_user = new Bugzilla::User;
return $anon_user->can_see_bug($attachment->bug_id);
}
# Validates format of a diff/interdiff. Takes a list as an parameter, which
# defines the valid format values. Will throw an error if the format is not
# in the list. Returns either the user selected or default format.
sub validateFormat {
# receives a list of legal formats; first item is a default
my $format = $cgi->param('format') || $_[0];
if (not grep($_ eq $format, @_)) {
ThrowUserError("invalid_format", {format => $format, formats => \@_});
}
return $format;
}
# Validates context of a diff/interdiff. Will throw an error if the context
# is not number, "file" or "patch". Returns the validated, detainted context.
sub validateContext {
my $context = $cgi->param('context') || "patch";
if ($context ne "file" && $context ne "patch") {
my $orig_context = $context;
detaint_natural($context)
|| ThrowUserError("invalid_context", {context => $orig_context});
}
return $context;
}
# Gets the attachment object(s) generated by validateID, while ensuring
# attachbase and token authentication is used when required.
sub get_attachment {
my @field_names = @_ ? @_ : qw(id);
my $C = Bugzilla->request_cache->{mojo_controller};
my %attachments;
if (use_attachbase()) {
# Load each attachment, and ensure they are all from the same bug
my $bug_id = 0;
foreach my $field_name (@field_names) {
my $attachment = validateID($field_name, 1);
if (!$bug_id) {
$bug_id = $attachment->bug_id;
}
elsif ($attachment->bug_id != $bug_id) {
ThrowUserError('attachment_bug_id_mismatch');
}
$attachments{$field_name} = $attachment;
}
my @args = map { $_ . '=' . $attachments{$_}->id } @field_names;
my $cgi_params = $cgi->canonicalize_query(@field_names, 't', 'Bugzilla_login',
'Bugzilla_password');
push(@args, $cgi_params) if $cgi_params;
my $path = 'attachment.cgi?' . join('&', @args);
# Make sure the attachment is served from the correct server.
if ($C->url_is_attachment_base($bug_id)) {
# No need to validate the token for public attachments. We cannot request
# credentials as we are on the alternate host.
if (!all_attachments_are_public(\%attachments)) {
my $token = $cgi->param('t');
my ($userid, undef, $token_data) = Bugzilla::Token::GetTokenData($token);
my %token_data = unpack_token_data($token_data);
my $valid_token = 1;
foreach my $field_name (@field_names) {
my $token_id = $token_data{$field_name};
if ( !$token_id
|| !detaint_natural($token_id)
|| $attachments{$field_name}->id != $token_id)
{
$valid_token = 0;
last;
}
}
unless ($userid && $valid_token) {
# Not a valid token.
print $cgi->redirect('-location' => Bugzilla->localconfig->urlbase . $path);
exit;
}
# Change current user without creating cookies.
Bugzilla->set_user(new Bugzilla::User($userid));
# Tokens are single use only, delete it.
delete_token($token);
}
}
elsif ($C->url_is_attachment_base) {
# If we come here, this means that each bug has its own host
# for attachments, and that we are trying to view one attachment
# using another bug's host. That's not desired.
$cgi->redirect_to_urlbase;
}
else {
# We couldn't call Bugzilla->login earlier as we first had to
# make sure we were not going to request credentials on the
# alternate host.
Bugzilla->login();
my $attachbase = Bugzilla->localconfig->attachment_base;
# Replace %bugid% by the ID of the bug the attachment
# belongs to, if present.
$attachbase =~ s/\%bugid\%/$bug_id/;
# To avoid leaking information we redirect using the attachment ID only
$path = 'attachment.cgi?'
. join('&', map { 'id=' . $attachments{$_}->id } keys %attachments);
if (all_attachments_are_public(\%attachments)) {
# No need for a token; redirect to attachment base.
print $cgi->redirect(-location => $attachbase . $path);
exit;
}
else {
# Make sure the user can view the attachment.
foreach my $field_name (@field_names) {
check_can_access($attachments{$field_name});
}
# Create a token and redirect.
my $token = url_quote(issue_session_token(pack_token_data(\%attachments)));
print $cgi->redirect(-location => $attachbase . "$path&t=$token");
exit;
}
}
}
else {
do_ssl_redirect_if_required();
# No alternate host is used. Request credentials if required.
Bugzilla->login();
foreach my $field_name (@field_names) {
$attachments{$field_name} = validateID($field_name);
}
}
return
wantarray
? map { $attachments{$_} } @field_names
: $attachments{$field_names[0]};
}
sub all_attachments_are_public {
my $attachments = shift;
foreach my $field_name (keys %$attachments) {
if (!attachmentIsPublic($attachments->{$field_name})) {
return 0;
}
}
return 1;
}
sub pack_token_data {
my $attachments = shift;
return join(' ', map { $_ . '=' . $attachments->{$_}->id } keys %$attachments);
}
sub unpack_token_data {
my @token_data = split(/ /, shift || '');
my %data;
foreach my $token (@token_data) {
my ($field_name, $attach_id) = split('=', $token);
$data{$field_name} = $attach_id;
}
return %data;
}
################################################################################
# Functions
################################################################################
# Display an attachment.
sub view {
my $attachment = get_attachment();
# At this point, Bugzilla->login has been called if it had to.
my $contenttype = $attachment->contenttype;
my $filename = basename($attachment->filename);
my $contenttype_override = 0;
# Bug 111522: allow overriding content-type manually in the posted form
# params.
if (defined $cgi->param('content_type')) {
$contenttype = $attachment->_check_content_type($cgi->param('content_type'));
$contenttype_override = 1;
}
# Return the appropriate HTTP response headers.
$attachment->datasize || ThrowUserError("attachment_removed");
# BMO add a hook for GitHub URL redirection
Bugzilla::Hook::process('attachment_view', {attachment => $attachment});
my $do_redirect = 0;
Bugzilla::Hook::process('attachment_should_redirect_login',
{do_redirect => \$do_redirect});
if ($do_redirect) {
my $uri = URI->new('attachment.cgi');
$uri->query_param(id => $attachment->id);
$uri->query_param(content_type => $contenttype) if $contenttype_override;
$cgi->base_redirect($uri->as_string);
}
# Don't send a charset header with attachments--they might not be UTF-8.
# However, we do allow people to explicitly specify a charset if they
# want.
if ($contenttype !~ /\bcharset=/i) {
# In order to prevent Apache from adding a charset, we have to send a
# charset that's a single space.
$cgi->charset("");
if (Bugzilla->feature('detect_charset') && $contenttype =~ /^text\//) {
my $encoding = detect_encoding($attachment->data);
if ($encoding) {
$cgi->charset(find_encoding($encoding)->mime_name);
}
}
}
Bugzilla->log_user_request($attachment->bug_id, $attachment->id,
"attachment-get")
if Bugzilla->user->id;
my $disposition
= Bugzilla->params->{'allow_attachment_display'} ? 'inline' : 'attachment';
my $filename_star = qq{UTF-8''} . url_escape(encode('UTF-8', $filename));
print $cgi->header(
-type => $contenttype,
-content_disposition => "$disposition; filename*=$filename_star",
-content_length => $attachment->datasize,
-Cache_Control => 'no-store, private'
);
disable_utf8();
print $attachment->data;
}
sub interdiff {
# Retrieve and validate parameters
my $format = validateFormat('html', 'raw');
my ($old_attachment, $new_attachment);
if ($format eq 'raw') {
($old_attachment, $new_attachment) = get_attachment('oldid', 'newid');
}
else {
$old_attachment = validateID('oldid');
$new_attachment = validateID('newid');
}
my $context = validateContext();
Bugzilla::Attachment::PatchReader::process_interdiff($old_attachment,
$new_attachment, $format, $context);
}
sub diff {
# Retrieve and validate parameters
my $format = validateFormat('html', 'raw');
my $attachment = $format eq 'raw' ? get_attachment() : validateID();
my $context = validateContext();
# If it is not a patch, view normally.
if (!$attachment->ispatch) {
view();
return;
}
Bugzilla::Attachment::PatchReader::process_diff($attachment, $format, $context);
}
# Display all attachments for a given bug in a series of IFRAMEs within one
# HTML page.
sub viewall {
# Retrieve and validate parameters
my $bug = Bugzilla::Bug->check({id => scalar $cgi->param('bugid'), cache => 1});
my $attachments = Bugzilla::Attachment->get_attachments_by_bug($bug);
# Ignore deleted attachments.
@$attachments = grep { $_->datasize } @$attachments;
if ($cgi->param('hide_obsolete')) {
@$attachments = grep { !$_->isobsolete } @$attachments;
$vars->{'hide_obsolete'} = 1;
}
# Define the variables and functions that will be passed to the UI template.
$vars->{'bug'} = $bug;
$vars->{'attachments'} = $attachments;
print $cgi->header();
# Generate and return the UI (HTML page) from the appropriate template.
$template->process("attachment/show-multiple.html.tmpl", $vars)
|| ThrowTemplateError($template->error());
}
# Display a form for entering a new attachment.
sub enter {
# Retrieve and validate parameters
my $bug = Bugzilla::Bug->check(scalar $cgi->param('bugid'));
my $bugid = $bug->id;
Bugzilla::Attachment->_check_bug($bug);
my $dbh = Bugzilla->dbh;
my $user = Bugzilla->user;
# Retrieve the attachments the user can edit from the database and write
# them into an array of hashes where each hash represents one attachment.
my $canEdit = "";
if (!$user->in_group('editbugs', $bug->product_id)) {
$canEdit = "AND submitter_id = " . $user->id;
}
my $attach_ids = $dbh->selectcol_arrayref(
"SELECT attach_id FROM attachments
WHERE bug_id = ? AND isobsolete = 0 $canEdit
ORDER BY attach_id", undef, $bugid
);
# Define the variables and functions that will be passed to the UI template.
$vars->{'bug'} = $bug;
$vars->{'attachments'} = Bugzilla::Attachment->new_from_list($attach_ids);
my $flag_types = Bugzilla::FlagType::match({
'target_type' => 'attachment',
'product_id' => $bug->product_id,
'component_id' => $bug->component_id,
'is_active' => 1
});
$vars->{'flag_types'} = $flag_types;
$vars->{'any_flags_requesteeble'}
= grep { $_->is_requestable && $_->is_requesteeble } @$flag_types;
$vars->{'token'} = issue_session_token('create_attachment');
print $cgi->header();
# Generate and return the UI (HTML page) from the appropriate template.
$template->process("attachment/create.html.tmpl", $vars)
|| ThrowTemplateError($template->error());
}
# Insert a new attachment into the database.
sub insert {
my $dbh = Bugzilla->dbh;
my $user = Bugzilla->user;
my $C = Bugzilla->request_cache->{mojo_controller};
$dbh->bz_start_transaction;
# Retrieve and validate parameters
my $bug = Bugzilla::Bug->check(scalar $cgi->param('bugid'));
my $bugid = $bug->id;
my ($timestamp) = $dbh->selectrow_array("SELECT NOW()");
# Detect if the user already used the same form to submit an attachment
my $token = trim($cgi->param('token'));
check_token_data($token, 'create_attachment', 'index.cgi');
# Check attachments the user tries to mark as obsolete.
my @obsolete_attachments;
if ($cgi->param('obsolete')) {
my @obsolete = $cgi->param('obsolete');
@obsolete_attachments
= Bugzilla::Attachment->validate_obsolete($bug, \@obsolete);
}
# Must be called before create() as it may alter $cgi->param('ispatch').
my $content_type = Bugzilla::Attachment::get_content_type();
# Get the filehandle of the attachment.
my $data_fh = $cgi->upload('data');
my $attach_text = $cgi->param('attach_text');
my $data_base64 = $cgi->param('data_base64');
my $data;
my $filename;
if ($attach_text) {
# Convert to Unix line-endings if pasting a patch
if (scalar($cgi->param('ispatch'))) {
$attach_text =~ s/[\012\015]{1,2}/\012/g;
}
$data = $attach_text;
$filename = "file_$bugid.txt";
}
elsif ($data_base64) {
$data = decode_base64($data_base64);
$filename = $cgi->param('filename') || "file_$bugid";
}
else {
$data = $filename = $data_fh;
}
my $attachment = Bugzilla::Attachment->create({
bug => $bug,
creation_ts => $timestamp,
data => $data,
description => scalar $cgi->param('description'),
filename => $filename,
ispatch => scalar $cgi->param('ispatch'),
isprivate => scalar $cgi->param('isprivate'),
mimetype => $content_type,
});
# Delete the token used to create this attachment.
delete_token($token);
foreach my $obsolete_attachment (@obsolete_attachments) {
$obsolete_attachment->set_is_obsolete(1);
$obsolete_attachment->update($timestamp);
}
# BMO - allow pre-processing of attachment flags
Bugzilla::Hook::process('create_attachment_flags',
{bug => $bug, attachment => $attachment});
my ($flags, $new_flags)
= Bugzilla::Flag->extract_flags_from_cgi($bug, $attachment, $vars,
SKIP_REQUESTEE_ON_ERROR);
$attachment->set_flags($flags, $new_flags);
# Insert a comment about the new attachment into the database.
my $comment = $cgi->param('comment');
$comment = '' unless defined $comment;
$bug->add_comment(
$comment,
{
isprivate => $attachment->isprivate,
type => CMT_ATTACHMENT_CREATED,
extra_data => $attachment->id,
is_markdown => Bugzilla->params->{use_markdown} ? 1 : 0,
}
);
# Assign the bug to the user, if they are allowed to take it
my $owner = "";
if ($cgi->param('takebug') && $user->in_group('editbugs', $bug->product_id)) {
# When taking a bug, we have to follow the workflow.
my $bug_status = $cgi->param('bug_status') || '';
($bug_status) = grep { $_->name eq $bug_status } @{$bug->status->can_change_to};
if ( $bug_status
&& $bug_status->is_open
&& ($bug_status->name ne 'UNCONFIRMED' || $bug->product_obj->allows_unconfirmed)
)
{
$bug->set_bug_status($bug_status->name);
$bug->clear_resolution();
}
# Make sure the person we are taking the bug from gets mail.
$owner = $bug->assigned_to->login;
$bug->set_assigned_to($user);
}
# Add user to CC if requested
if ($cgi->param('addselfcc')) {
$bug->add_cc(Bugzilla->user);
}
$bug->update($timestamp);
# We have to update the attachment after updating the bug, to ensure new
# comments are available.
$attachment->update($timestamp);
$dbh->bz_commit_transaction;
# Persist details of what changed and redirect to show_bug page.
my $recipients = {'changer' => $user, 'owner' => $owner};
my $sent_bugmail = Bugzilla::BugMail::Send($bugid, $recipients);
my $content_type_method = $cgi->param('contenttypemethod');
my $last_sent_attachment_change = {
attachment => {
id => $attachment->id,
bug_id => $attachment->bug_id,
contenttype => $attachment->contenttype,
description => $attachment->description,
},
type => 'created',
recipient_count => scalar @{$sent_bugmail->{sent}},
content_type_method => $content_type_method,
};
$C->flash(last_sent_attachment_changes => [$last_sent_attachment_change]);
my $redirect_url = Bugzilla->localconfig->urlbase . "show_bug.cgi?id=$bugid";
$C->redirect_to($redirect_url);
}
# Displays a form for editing attachment properties.
# Any user is allowed to access this page, unless the attachment
# is private and the user does not belong to the insider group.
# Validations are done later when the user submits changes.
sub edit {
my $attachment = validateID();
my $bugattachments
= Bugzilla::Attachment->get_attachments_by_bug($attachment->bug);
my $any_flags_requesteeble = grep { $_->is_requestable && $_->is_requesteeble }
@{$attachment->flag_types};
# Useful in case a flagtype is no longer requestable but a requestee
# has been set before we turned off that bit.
$any_flags_requesteeble ||= grep { $_->requestee_id } @{$attachment->flags};
$vars->{'any_flags_requesteeble'} = $any_flags_requesteeble;
$vars->{'attachment'} = $attachment;
$vars->{'attachments'} = $bugattachments;
Bugzilla->log_user_request($attachment->bug_id, $attachment->id,
"attachment-get")
if Bugzilla->user->id;
print $cgi->header();
# Generate and return the UI (HTML page) from the appropriate template.
$template->process("attachment/edit.html.tmpl", $vars)
|| ThrowTemplateError($template->error());
}
# Updates an attachment record. Only users with "editbugs" privileges,
# (or the original attachment's submitter) can edit the attachment.
# Users cannot edit the content of the attachment itself.
sub update {
my $user = Bugzilla->user;
my $dbh = Bugzilla->dbh;
my $C = Bugzilla->request_cache->{mojo_controller};
# Start a transaction in preparation for updating the attachment.
$dbh->bz_start_transaction();
# Retrieve and validate parameters
my $attachment = validateID();
my $bug = $attachment->bug;
$attachment->_check_bug;
my $can_edit = $attachment->validate_can_edit;
if ($can_edit) {
$attachment->set_description(scalar $cgi->param('description'));
$attachment->set_is_patch(scalar $cgi->param('ispatch'));
$attachment->set_content_type(scalar $cgi->param('contenttypeentry'));
$attachment->set_is_obsolete(scalar $cgi->param('isobsolete'));
$attachment->set_is_private(scalar $cgi->param('isprivate'));
$attachment->set_filename(scalar $cgi->param('filename'));
# Now make sure the attachment has not been edited since we loaded the page.
my $delta_ts = $cgi->param('delta_ts');
my $modification_time = $attachment->modification_time;
if ($delta_ts && $delta_ts ne $modification_time) {
datetime_from($delta_ts)
or ThrowCodeError('invalid_timestamp', {timestamp => $delta_ts});
($vars->{'operations'})
= Bugzilla::Bug::GetBugActivity($bug->id, $attachment->id, $delta_ts);
# If the modification date changed but there is no entry in
# the activity table, this means someone commented only.
# In this case, there is no reason to midair.
if (scalar(@{$vars->{'operations'}})) {
$cgi->param('delta_ts', $modification_time);
# The token contains the old modification_time. We need a new one.
$cgi->param('token', issue_hash_token([$attachment->id, $modification_time]));
$vars->{'attachment'} = $attachment;
print $cgi->header();
# Warn the user about the mid-air collision and ask them what to do.
$template->process("attachment/midair.html.tmpl", $vars)
|| ThrowTemplateError($template->error());
exit;
}
}
}
# We couldn't do this check earlier as we first had to validate attachment ID
# and display the mid-air collision page if modification_time changed.
my $token = $cgi->param('token');
check_hash_token($token, [$attachment->id, $attachment->modification_time]);
# If the user submitted a comment while editing the attachment,
# add the comment to the bug. Do this after having validated isprivate!
my $comment = $cgi->param('comment');
my $is_markdown = Bugzilla->params->{use_markdown} ? 1 : 0;
if ($cgi->param('markdown_off')) {
$is_markdown = 0;
}
if (defined $comment && trim($comment) ne '') {
$bug->add_comment(
$comment,
{
isprivate => $attachment->isprivate,
type => CMT_ATTACHMENT_UPDATED,
extra_data => $attachment->id,
is_markdown => $is_markdown,
}
);
}
my ($flags, $new_flags)
= Bugzilla::Flag->extract_flags_from_cgi($bug, $attachment, $vars);
if ($can_edit) {
$attachment->set_flags($flags, $new_flags);
}
# Requestees can set flags targeted to them, even if they cannot
# edit the attachment. Flag setters can edit their own flags too.
elsif (scalar @$flags) {
my @flag_ids = map { $_->{id} } @$flags;
my $flag_objs = Bugzilla::Flag->new_from_list(\@flag_ids);
my %flag_list = map { $_->id => $_ } @$flag_objs;
my @editable_flags;
foreach my $flag (@$flags) {
my $flag_obj = $flag_list{$flag->{id}};
if ($flag_obj->setter_id == $user->id
|| ($flag_obj->requestee_id && $flag_obj->requestee_id == $user->id))
{
push(@editable_flags, $flag);
}
}
if (scalar @editable_flags) {
$attachment->set_flags(\@editable_flags, []);
# Flag changes must be committed.
$can_edit = 1;
}
}
# Figure out when the changes were made.
my $timestamp = $dbh->selectrow_array('SELECT LOCALTIMESTAMP(0)');
# Add user to CC if requested
if ($cgi->param('addselfcc')) {
$bug->add_cc(Bugzilla->user);
}
# Commit the comment, if any.
# This has to happen before updating the attachment, to ensure new comments
# are available to $attachment->update.
$bug->update($timestamp);
if ($can_edit) {
my $changes = $attachment->update($timestamp);
# If there are changes, we updated delta_ts in the DB. We have to
# reflect this change in the bug object.
$bug->{delta_ts} = $timestamp if scalar(keys %$changes);
}
# Commit the transaction now that we are finished updating the database.
$dbh->bz_commit_transaction();
# Persist details of what changed and redirect to show_bug page.
my $sent_bugmail = Bugzilla::BugMail::Send($bug->id, {'changer' => $user});
my $last_sent_attachment_change = {
attachment => {
id => $attachment->id,
bug_id => $attachment->bug_id,
contenttype => $attachment->contenttype,
description => $attachment->description,
},
type => 'updated',
recipient_count => scalar @{$sent_bugmail->{sent}},
};
$C->flash(last_sent_attachment_changes => [$last_sent_attachment_change]);
my $redirect_url = Bugzilla->localconfig->urlbase . 'show_bug.cgi?id=' . $bug->id;
$C->redirect_to($redirect_url);
}
# Only administrators can delete attachments.
sub delete_attachment {
my $user = Bugzilla->login(LOGIN_REQUIRED);
my $dbh = Bugzilla->dbh;
my $C = Bugzilla->request_cache->{mojo_controller};
$user->in_group('can_delete_attachments')
|| ThrowUserError('auth_failure',
{group => 'can_delete_attachments', action => 'delete', object => 'attachment'});
Bugzilla->params->{'allow_attachment_deletion'}
|| ThrowUserError('attachment_deletion_disabled');
# Make sure the administrator is allowed to edit this attachment.
my $attachment = validateID();
Bugzilla::Attachment->_check_bug($attachment->bug);
$attachment->datasize || ThrowUserError('attachment_removed');
# We don't want to let a malicious URL accidentally delete an attachment.
my $token = trim($cgi->param('token'));
if ($token) {
my ($creator_id, $date, $event) = Bugzilla::Token::GetTokenData($token);
unless ($creator_id
&& ($creator_id == $user->id)
&& ($event eq 'delete_attachment' . $attachment->id))
{
# The token is invalid.
ThrowUserError('token_does_not_exist');
}
my $bug = new Bugzilla::Bug($attachment->bug_id);
# The token is valid. Delete the content of the attachment.
my $msg;
$vars->{'attachment'} = $attachment;
$vars->{'reason'} = clean_text($cgi->param('reason') || '');
$template->process("attachment/delete_reason.txt.tmpl", $vars, \$msg)
|| ThrowTemplateError($template->error());
# Paste the reason provided by the admin into a comment.
$bug->add_comment($msg);
# Remove attachment.
$attachment->remove_from_db();
# Now delete the token.
delete_token($token);
# Insert the comment.
$bug->update();
# Persist details of what changed and redirect to show_bug page.
my $sent_bugmail = Bugzilla::BugMail::Send($bug->id, {'changer' => $user});
my $last_sent_attachment_change = {
attachment => {
id => $attachment->id,
bug_id => $attachment->bug_id,
contenttype => $attachment->contenttype,
description => $attachment->description,
},
type => 'deleted',
recipient_count => scalar @{$sent_bugmail->{sent}},
};
$C->flash(last_sent_attachment_changes => [$last_sent_attachment_change]);
my $redirect_url = Bugzilla->localconfig->urlbase . 'show_bug.cgi?id=' . $bug->id;
$C->redirect_to($redirect_url);
}
else {
# Create a token.
$token = issue_session_token('delete_attachment' . $attachment->id);
$vars->{'a'} = $attachment;
$vars->{'token'} = $token;
print $cgi->header();
$template->process("attachment/confirm-delete.html.tmpl", $vars)
|| ThrowTemplateError($template->error());
}
}
Loading...
马建仓 AI 助手
尝试更多
代码解读
代码找茬
代码优化
Perl
1
https://gitee.com/mirrors/webtools-bmo-bugzilla.git
git@gitee.com:mirrors/webtools-bmo-bugzilla.git
mirrors
webtools-bmo-bugzilla
webtools-bmo-bugzilla
master

搜索帮助