%PDF- %PDF-
| Direktori : /www/loslex_o/tracker/api/soap/ |
| Current File : //www/loslex_o/tracker/api/soap/mc_issue_api.php |
<?php
# MantisBT - A PHP based bugtracking system
# MantisBT is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 2 of the License, or
# (at your option) any later version.
#
# MantisBT is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with MantisBT. If not, see <http://www.gnu.org/licenses/>.
/**
* A webservice interface to Mantis Bug Tracker
*
* @package MantisBT
* @copyright Copyright 2004 Victor Boctor - vboctor@users.sourceforge.net
* @copyright Copyright 2005 MantisBT Team - mantisbt-dev@lists.sourceforge.net
* @link http://www.mantisbt.org
*/
require_once( dirname( __FILE__ ) . '/mc_core.php' );
use Mantis\Exceptions\ClientException;
/**
* Check if an issue with the given id exists.
*
* @param string $p_username The name of the user trying to access the issue.
* @param string $p_password The password of the user.
* @param integer $p_issue_id The id of the issue to check.
* @return boolean true if there is an issue with the given id, false otherwise.
*/
function mc_issue_exists( $p_username, $p_password, $p_issue_id ) {
$t_user_id = mci_check_login( $p_username, $p_password );
if( $t_user_id === false ) {
return mci_fault_login_failed();
}
if( !bug_exists( $p_issue_id ) ) {
return false;
}
$t_project_id = bug_get_field( $p_issue_id, 'project_id' );
if( !mci_has_readonly_access( $t_user_id, $t_project_id ) ) {
# if we return an error here, then we answered the question!
return false;
}
return true;
}
/**
* Get all details about an issue.
*
* @param string $p_username The name of the user trying to access the issue.
* @param string $p_password The password of the user.
* @param integer $p_issue_id The id of the issue to retrieve.
* @return array that represents an IssueData structure
*/
function mc_issue_get( $p_username, $p_password, $p_issue_id ) {
$t_user_id = mci_check_login( $p_username, $p_password );
if( $t_user_id === false ) {
return mci_fault_login_failed();
}
$t_lang = mci_get_user_lang( $t_user_id );
$t_project_id = bug_get_field( $p_issue_id, 'project_id' );
if( !mci_has_readonly_access( $t_user_id, $t_project_id ) ) {
return mci_fault_access_denied( $t_user_id );
}
if( !access_has_bug_level( config_get( 'view_bug_threshold', null, null, $t_project_id ), $p_issue_id, $t_user_id ) ) {
return mci_fault_access_denied( $t_user_id );
}
log_event( LOG_WEBSERVICE, 'getting details for issue \'' . $p_issue_id . '\'' );
$t_bug = bug_get( $p_issue_id, true );
$t_issue_data = mci_issue_data_as_array( $t_bug, $t_user_id, $t_lang );
return $t_issue_data;
}
/**
* Get history details for an issue that is visible to specified user.
* This is used by REST APIs and assumes that user access to issue is
* already done.
*
* @param integer $p_issue_id The issue id.
* @param integer $p_user_id The user id.
* @param string $p_lang The user language.
* @return array history entries or empty if user has no access to history.
*/
function mci_issue_get_history( $p_issue_id, $p_user_id, $p_lang ) {
$t_project_id = bug_get_field( $p_issue_id, 'project_id' );
$t_view_history_threshold = config_get( 'view_history_threshold', null, null, $t_project_id );
if( !access_has_bug_level( $t_view_history_threshold, $p_issue_id, $p_user_id ) ) {
return array();
}
$t_history_rows = history_get_raw_events_array( $p_issue_id, $p_user_id );
$t_history = array();
$t_files = file_get_visible_attachments( $p_issue_id );
foreach( $t_history_rows as $t_history_row ) {
$t_type = (int)$t_history_row['type'];
$t_skip = false;
switch( $t_type ) {
case BUG_ADD_SPONSORSHIP: # Deprecated, not exposed in REST API
case BUG_UPDATE_SPONSORSHIP: # Deprecated, not exposed in REST API
case BUG_DELETE_SPONSORSHIP: # Deprecated, not exposed in REST API
case BUG_REVISION_DROPPED: # Not Supported
case BUGNOTE_REVISION_DROPPED: # Not Supported
$t_skip = true;
break;
}
$t_event = array();
$t_event['created_at'] = ApiObjectFactory::datetime( $t_history_row['date'] );
$t_event['user'] = mci_account_get_array_by_id( $t_history_row['userid'] );
$t_field = $t_history_row['field'];
if( !is_blank( $t_field ) ) {
# map field names to external names
switch( $t_field ) {
case 'reporter_id':
$t_field = 'reporter';
break;
case 'handler_id':
$t_field = 'handler';
break;
case 'sponsorship_total':
# Skip sponsorship fields
$t_skip = true;
break;
}
$t_event['field'] = array(
'name' => $t_field,
'label' => history_localize_field_name( $t_history_row['field'] ) );
}
if( $t_skip ) {
continue;
}
$t_event['type'] = array(
'id' => $t_type,
'name' => history_get_type_name( $t_history_row['type'] ) );
$t_old_value_name = 'old_value';
$t_new_value_name = 'new_value';
$t_show_old_value = true;
$t_show_new_value = true;
switch( $t_type ) {
case NEW_BUG:
case DESCRIPTION_UPDATED:
case ADDITIONAL_INFO_UPDATED:
case STEP_TO_REPRODUCE_UPDATED:
$t_show_old_value = false;
$t_show_new_value = false;
break;
case TAG_ATTACHED:
case TAG_DETACHED:
$t_show_new_value = false;
$t_old_value_name = 'tag';
break;
case FILE_ADDED:
case FILE_DELETED:
$t_show_new_value = false;
$t_old_value_name = 'file';
break;
case BUGNOTE_ADDED:
case BUGNOTE_UPDATED:
case BUGNOTE_DELETED:
$t_show_new_value = false;
$t_old_value_name = 'note';
break;
case BUGNOTE_STATE_CHANGED:
$t_old_value_name = 'view_state';
$t_new_value_name = 'note';
break;
case BUG_ADD_RELATIONSHIP:
case BUG_REPLACE_RELATIONSHIP:
case BUG_DEL_RELATIONSHIP:
$t_old_value_name = 'relationship';
$t_new_value_name = 'issue';
break;
case BUG_CLONED_TO:
$t_show_old_value = false;
$t_new_value_name = 'issue';
break;
}
$fn_process_value = function( $p_issue_id, $p_type, $p_field, $p_value, $p_lang, $p_new_value ) use ( $t_files ) {
if( is_blank( $p_value ) ) {
return '';
}
switch( $p_type ) {
case TAG_ATTACHED:
case TAG_DETACHED:
$t_tag = tag_get_by_name( $p_value );
if( $t_tag === false ) {
return array( 'name' => $p_value );
}
return array( 'id' => $t_tag['id'], 'name' => $t_tag['name'] );
case BUGNOTE_ADDED:
case BUGNOTE_DELETED:
return array( 'id' => (int)$p_value );
case BUGNOTE_UPDATED:
if( !$p_new_value ) {
return array( 'id' => (int) $p_value );
}
return '';
case FILE_ADDED:
case FILE_DELETED:
$t_value = array();
$t_id = null;
foreach( $t_files as $t_file ) {
if( $t_file['display_name'] == $p_value ) {
$t_value['id'] = (int)$t_file['id'];
break;
}
}
$t_value['filename'] = $p_value;
return $t_value;
case BUGNOTE_STATE_CHANGED:
if( $p_new_value ) {
return array( 'id' => (int)$p_value );
}
return mci_enum_get_array_by_id( (int)$p_value, 'view_state', $p_lang );
case BUG_ADD_RELATIONSHIP:
case BUG_REPLACE_RELATIONSHIP:
case BUG_DEL_RELATIONSHIP:
if( $p_new_value ) {
return array( 'id' => (int)$p_value );
}
return array(
'id' => (int)$p_value,
'name' => relationship_get_name_for_api( (int)$p_value ),
'label' => relationship_get_description_for_history( (int)$p_value ) );
case BUG_CLONED_TO:
return array( 'id' => (int)$p_value );
}
switch( $p_field ) {
case 'status':
$t_value = mci_enum_get_array_by_id( (int)$p_value, 'status', $p_lang );
break;
case 'priority':
$t_value = mci_enum_get_array_by_id( (int)$p_value, 'priority', $p_lang );
break;
case 'severity':
$t_value = mci_enum_get_array_by_id( (int)$p_value, 'severity', $p_lang );
break;
case 'view_state':
$t_value = mci_enum_get_array_by_id( (int)$p_value, 'view_state', $p_lang );
break;
case 'resolution':
$t_value = mci_enum_get_array_by_id( (int)$p_value, 'resolution', $p_lang );
break;
case 'reproducibility':
$t_value = mci_enum_get_array_by_id( (int)$p_value, 'reproducibility', $p_lang );
break;
case 'reporter':
case 'handler':
$t_value = mci_account_get_array_by_id( (int)$p_value );
break;
default:
$t_value = $p_value;
break;
}
return $t_value;
};
if( $t_show_old_value ) {
$t_event[$t_old_value_name] = $fn_process_value( $p_issue_id, $t_type, $t_field, $t_history_row['old_value'], $p_lang, false );
}
if( $t_show_new_value ) {
$t_event[$t_new_value_name] = $fn_process_value( $p_issue_id, $t_type, $t_field, $t_history_row['new_value'], $p_lang, true );
}
$t_localized_row = history_localize_item(
$p_issue_id,
$t_history_row['field'],
$t_history_row['type'],
$t_history_row['old_value'],
$t_history_row['new_value'],
false
);
$t_event['message'] = $t_localized_row['note'];
if( !is_blank( $t_localized_row['change'] ) ) {
$t_event['change'] = $t_localized_row['change'];
}
$t_history[] = $t_event;
}
return $t_history;
}
/**
* Get history details about an issue, used by SOAP APIs.
*
* @param string $p_username The name of the user trying to access the issue.
* @param string $p_password The password of the user.
* @param integer $p_issue_id The id of the issue to retrieve.
* @return array that represents a HistoryDataArray structure
*/
function mc_issue_get_history( $p_username, $p_password, $p_issue_id ) {
global $g_project_override;
$t_user_id = mci_check_login( $p_username, $p_password );
if( $t_user_id === false ) {
return mci_fault_login_failed();
}
if( !bug_exists( $p_issue_id ) ) {
return ApiObjectFactory::faultNotFound( "Issue '$p_issue_id' does not exist" );
}
$t_project_id = bug_get_field( $p_issue_id, 'project_id' );
if( !mci_has_readonly_access( $t_user_id, $t_project_id ) ) {
return mci_fault_access_denied( $t_user_id );
}
$g_project_override = $t_project_id;
if( !access_has_bug_level( config_get( 'view_bug_threshold', null, null, $t_project_id ), $p_issue_id, $t_user_id ) ) {
return mci_fault_access_denied( $t_user_id );
}
$t_user_access_level = user_get_access_level( $t_user_id, $t_project_id );
if( !access_compare_level( $t_user_access_level, config_get( 'view_history_threshold' ) ) ) {
return mci_fault_access_denied( $t_user_id );
}
log_event( LOG_WEBSERVICE, 'retrieving history for issue \'' . $p_issue_id . '\'' );
$t_bug_history = history_get_raw_events_array( $p_issue_id, $t_user_id );
return $t_bug_history;
}
/**
* Get due date for a given bug
* @param BugData $p_bug A BugData object.
* @return soapval the value to be encoded as the due date
*/
function mci_issue_get_due_date( BugData $p_bug ) {
$t_value = null;
if( access_has_bug_level( config_get( 'due_date_view_threshold' ), $p_bug->id ) && !date_is_null( $p_bug->due_date ) ) {
$t_value = $p_bug->due_date;
}
return ApiObjectFactory::datetime( $t_value );
}
/**
* Sets the supplied array of custom field values to the specified issue id.
*
* @param integer $p_issue_id Issue id to apply custom field values to.
* @param array &$p_custom_fields The array of custom field values as described in the webservice complex types.
* @param boolean $p_log_insert Create history logs for new values.
* @return boolean|SoapFault|RestFault true for success, otherwise fault.
*/
function mci_issue_set_custom_fields( $p_issue_id, array &$p_custom_fields = null, $p_log_insert = true ) {
# set custom field values on the submitted issue
if( isset( $p_custom_fields ) && is_array( $p_custom_fields ) ) {
foreach( $p_custom_fields as $t_custom_field ) {
$t_custom_field = ApiObjectFactory::objectToArray( $t_custom_field );
# Verify validity of custom field specification
$t_msg = 'Invalid Custom field specification';
$t_valid_cf = isset( $t_custom_field['field'] ) && isset( $t_custom_field['value'] );
if( $t_valid_cf ) {
$t_field = ApiObjectFactory::objectToArray( $t_custom_field['field'] );
if( ( !isset( $t_field['id'] ) || $t_field['id'] == 0 ) && !isset( $t_field['name'] ) ) {
$t_valid_cf = false;
$t_msg .= ", either 'name' or 'id' != 0 or must be given.";
}
}
if( !$t_valid_cf ) {
throw new ClientException(
$t_msg,
ERROR_EMPTY_FIELD,
"custom_field['id']" );
}
# get custom field id from object ref
$t_custom_field_id = mci_get_custom_field_id_from_objectref( (object)$t_custom_field['field'] );
if( $t_custom_field_id == 0 ) {
throw new ClientException(
"Custom field '" . $t_field['name'] . "' not found.",
ERROR_CUSTOM_FIELD_NOT_FOUND,
"custom_field['id']" );
}
# skip if current user doesn't have login access.
if( !custom_field_has_write_access( $t_custom_field_id, $p_issue_id ) ) {
continue;
}
$t_custom_field_def = custom_field_get_definition( $t_custom_field_id );
$t_name = $t_custom_field_def['name'];
$t_value = $t_custom_field['value'];
if( !custom_field_validate( $t_custom_field_id, $t_value ) ) {
throw new ClientException(
"Invalid value for custom field '$t_name'",
ERROR_INVALID_FIELD_VALUE,
"value" );
}
if( !custom_field_set_value( $t_custom_field_id, $p_issue_id, $t_value, $p_log_insert ) ) {
throw new ClientException(
"Invalid value for custom field '$t_name'.",
ERROR_INVALID_FIELD_VALUE,
"value" );
}
}
}
return true;
}
/**
* Get the custom field values associated with the specified issue id.
*
* @param integer $p_issue_id Issue id to get the custom field values for.
*
* @return null if no custom field defined for the project that contains the issue, or if no custom
* fields are accessible to the current user.
*/
function mci_issue_get_custom_fields( $p_issue_id ) {
$t_project_id = bug_get_field( $p_issue_id, 'project_id' );
$t_custom_fields = array();
$t_related_custom_field_ids = custom_field_get_linked_ids( $t_project_id );
custom_field_cache_array_rows( $t_related_custom_field_ids );
# filter out fields not accesible by the user
foreach( $t_related_custom_field_ids as $t_index => $t_id ) {
if( !custom_field_has_read_access( $t_id, $p_issue_id ) ) {
unset( $t_related_custom_field_ids[$t_index] );
}
}
custom_field_cache_values( array( $p_issue_id ), $t_related_custom_field_ids );
foreach( $t_related_custom_field_ids as $t_id ) {
$t_def = custom_field_get_definition( $t_id );
$t_value = custom_field_get_value( $t_id, $p_issue_id );
if( $t_value === false ) {
continue;
}
# return a blank string if the custom field value is undefined
if( $t_value === null ) {
$t_value = '';
}
$t_custom_field_value = array();
$t_custom_field_value['field'] = array();
$t_custom_field_value['field']['id'] = (int)$t_id;
$t_custom_field_value['field']['name'] = $t_def['name'];
$t_custom_field_value['value'] = $t_value;
$t_custom_fields[] = $t_custom_field_value;
}
return count( $t_custom_fields ) == 0 ? null : $t_custom_fields;
}
/**
* Get the attachments of an issue.
*
* @param integer $p_issue_id The id of the issue to retrieve the attachments for.
* @param integer $p_note_id 0 for issue attachments, an id for note attachments, null for all
* @return array that represents an AttachmentData structure
*/
function mci_issue_get_attachments( $p_issue_id, $p_note_id = null ) {
$t_attachment_rows = file_get_visible_attachments( $p_issue_id );
if( $t_attachment_rows == null ) {
return array();
}
$t_result = array();
foreach( $t_attachment_rows as $t_attachment_row ) {
# Filter out attachments that are not requested by caller
if( !is_null( $p_note_id ) && (int)$t_attachment_row['bugnote_id'] != (int)$p_note_id ) {
continue;
}
$t_attachment = array();
$t_attachment['id'] = (int)$t_attachment_row['id'];
$t_created_at = ApiObjectFactory::datetime( $t_attachment_row['date_added'] );
if( ApiObjectFactory::$soap ) {
$t_attachment['user_id'] = (int)$t_attachment_row['user_id'];
$t_attachment['date_submitted'] = $t_created_at;
} else {
$t_attachment['reporter'] = mci_account_get_array_by_id( $t_attachment_row['user_id'] );
$t_attachment['created_at'] = $t_created_at;
}
$t_attachment['filename'] = $t_attachment_row['display_name'];
$t_attachment['size'] = (int)$t_attachment_row['size'];
$t_attachment['content_type'] = $t_attachment_row['file_type'];
if( ApiObjectFactory::$soap ) {
$t_attachment['download_url'] = mci_get_mantis_path() . 'file_download.php?file_id=' . $t_attachment_row['id'] . '&type=bug';
}
$t_result[] = $t_attachment;
}
return $t_result;
}
/**
* Get the relationships of an issue.
*
* @param integer $p_issue_id The id of the issue to retrieve the relationships for.
* @param integer $p_user_id The user id of the user trying to access the information.
* @return array that represents an RelationShipData structure
*/
function mci_issue_get_relationships( $p_issue_id, $p_user_id ) {
$t_relationships = array();
$t_src_relationships = relationship_get_all_src( $p_issue_id );
foreach( $t_src_relationships as $t_relship_row ) {
if( access_has_bug_level( config_get( 'webservice_readonly_access_level_threshold' ), $t_relship_row->dest_bug_id, $p_user_id ) ) {
$t_related_issue_id = (int)$t_relship_row->dest_bug_id;
$t_relationship = array();
$t_reltype = array();
$t_relationship['id'] = (int)$t_relship_row->id;
$t_reltype['id'] = (int)$t_relship_row->type;
if( ApiObjectFactory::$soap ) {
$t_reltype['name'] = relationship_get_description_src_side( $t_relship_row->type );
} else {
$t_reltype['name'] = relationship_get_name_for_api( $t_relship_row->type );
$t_reltype['label'] = relationship_get_description_src_side( $t_relship_row->type );
}
$t_relationship['type'] = $t_reltype;
if( ApiObjectFactory::$soap ) {
$t_relationship['target_id'] = $t_related_issue_id;
} else {
$t_relationship['issue'] = mci_related_issue_as_array_by_id( $t_related_issue_id );
}
$t_relationships[] = $t_relationship;
}
}
$t_dest_relationships = relationship_get_all_dest( $p_issue_id );
foreach( $t_dest_relationships as $t_relship_row ) {
if( access_has_bug_level( config_get( 'webservice_readonly_access_level_threshold' ), $t_relship_row->src_bug_id, $p_user_id ) ) {
$t_relationship = array();
$t_relationship['id'] = (int)$t_relship_row->id;
$t_reltype = array();
$t_complementary_type_id = (int)relationship_get_complementary_type( $t_relship_row->type );
$t_reltype['id'] = $t_complementary_type_id;
if( ApiObjectFactory::$soap ) {
$t_reltype['name'] = relationship_get_description_dest_side( $t_relship_row->type );
} else {
$t_reltype['name'] = relationship_get_name_for_api( $t_complementary_type_id );
$t_reltype['label'] = relationship_get_description_dest_side( $t_relship_row->type );
}
$t_relationship['type'] = $t_reltype;
$t_related_issue_id = (int)$t_relship_row->src_bug_id;
if( ApiObjectFactory::$soap ) {
$t_relationship['target_id'] = $t_related_issue_id;
} else {
$t_relationship['issue'] = mci_related_issue_as_array_by_id( $t_related_issue_id );
}
$t_relationships[] = $t_relationship;
}
}
return (count( $t_relationships ) == 0 ? null : $t_relationships );
}
/**
* Convert a note row into an array.
* @param $p_bugnote_row The note row object.
* @return array The note array.
*/
function mci_issue_note_data_as_array( $p_bugnote_row ) {
$t_user_id = auth_get_current_user_id();
$t_lang = mci_get_user_lang( $t_user_id );
$t_has_time_tracking_access = access_has_bug_level( config_get( 'time_tracking_view_threshold' ), $p_bugnote_row->bug_id );
$t_bugnote = array();
$t_bugnote['id'] = (int)$p_bugnote_row->id;
$t_bugnote['reporter'] = mci_account_get_array_by_id( $p_bugnote_row->reporter_id );
$t_bugnote['text'] = mci_sanitize_xml_string( $p_bugnote_row->note );
$t_bugnote['view_state'] = mci_enum_get_array_by_id( $p_bugnote_row->view_state, 'view_state', $t_lang );
$t_bugnote['time_tracking'] = $t_has_time_tracking_access ? $p_bugnote_row->time_tracking : 0;
$t_created_at = ApiObjectFactory::datetimeString( $p_bugnote_row->date_submitted );
$t_modified_at = ApiObjectFactory::datetimeString( $p_bugnote_row->last_modified );
if( ApiObjectFactory::$soap ) {
$t_bugnote['note_type'] = $p_bugnote_row->note_type;
$t_bugnote['note_attr'] = $p_bugnote_row->note_attr;
$t_bugnote['date_submitted'] = $t_created_at;
$t_bugnote['last_modified'] = $t_modified_at;
} else {
$t_bugnote['attachments'] = mci_issue_get_attachments( $p_bugnote_row->bug_id, $p_bugnote_row->id );
switch( $p_bugnote_row->note_type ) {
case REMINDER:
$t_type = 'reminder';
break;
case TIME_TRACKING:
$t_type = $t_has_time_tracking_access ? 'timelog' : 'note';
break;
case BUGNOTE:
default:
$t_type = 'note';
break;
}
$t_bugnote['type'] = $t_type;
if( !is_blank( $p_bugnote_row->note_attr ) ) {
$t_bugnote['attr'] = $p_bugnote_row->note_attr;
}
if( isset( $t_bugnote['time_tracking'] ) ) {
if ( $t_bugnote['time_tracking'] == 0 || $t_type != 'timelog' ) {
unset( $t_bugnote['time_tracking'] );
} else {
$t_bugnote['time_tracking'] = array( 'duration' => db_minutes_to_hhmm( $t_bugnote['time_tracking'] ) );
}
}
$t_bugnote['created_at'] = $t_created_at;
$t_bugnote['updated_at'] = $t_modified_at;
}
return $t_bugnote;
}
/**
* Get all visible notes for a specific issue
*
* @param integer $p_issue_id The id of the issue to retrieve the notes for.
* @return array that represents an SOAP IssueNoteData structure
*/
function mci_issue_get_notes( $p_issue_id ) {
$t_user_bugnote_order = 'ASC'; # always get the notes in ascending order for consistency to the calling application.
$t_result = array();
foreach( bugnote_get_all_visible_bugnotes( $p_issue_id, $t_user_bugnote_order, 0 ) as $t_value ) {
$t_bugnote = mci_issue_note_data_as_array( $t_value );
$t_result[] = $t_bugnote;
}
return count( $t_result ) == 0 ? null : $t_result;
}
/**
* Sets the monitors of the specified issue
*
* <p>This functions performs access level checks and only performs operations which would
* modify the existing monitors list.</p>
*
* @param integer $p_issue_id The issue id to set the monitors for.
* @param integer $p_requesting_user_id The user which requests the monitor change.
* @param array $p_monitors An array of arrays with the <em>id</em> field set to the id
* of the users which should monitor this issue.
* @return mixed
*/
function mci_issue_set_monitors( $p_issue_id, $p_requesting_user_id, array $p_monitors ) {
if( bug_is_readonly( $p_issue_id ) ) {
return mci_fault_access_denied( $p_requesting_user_id, 'Issue \'' . $p_issue_id . '\' is readonly' );
}
# 1. get existing monitor ids
$t_existing_monitor_ids = bug_get_monitors( $p_issue_id );
# 2. build new monitors ids
$t_new_monitor_ids = array();
foreach ( $p_monitors as $t_monitor ) {
$t_monitor = ApiObjectFactory::objectToArray( $t_monitor );
$t_new_monitor_ids[] = $t_monitor['id'];
}
# 3. for each of the new monitor ids, add it if it does not already exist
foreach( $t_new_monitor_ids as $t_user_id ) {
if( $p_requesting_user_id == $t_user_id ) {
if( ! access_has_bug_level( config_get( 'monitor_bug_threshold' ), $p_issue_id ) ) {
continue;
}
} else {
if( !access_has_bug_level( config_get( 'monitor_add_others_bug_threshold' ), $p_issue_id ) ) {
continue;
}
}
if( in_array( $t_user_id, $t_existing_monitor_ids ) ) {
continue;
}
bug_monitor( $p_issue_id, $t_user_id );
}
# 4. for each of the existing monitor ids, remove it if it is not found in the new monitor ids
foreach ( $t_existing_monitor_ids as $t_user_id ) {
if( $p_requesting_user_id == $t_user_id ) {
if( ! access_has_bug_level( config_get( 'monitor_bug_threshold' ), $p_issue_id ) ) {
continue;
}
} else {
if( !access_has_bug_level( config_get( 'monitor_delete_others_bug_threshold' ), $p_issue_id ) ) {
continue;
}
}
if( in_array( $t_user_id, $t_new_monitor_ids ) ) {
continue;
}
bug_unmonitor( $p_issue_id, $t_user_id );
}
}
/**
* Get the biggest issue id currently used.
*
* @param string $p_username The name of the user trying to retrieve the information.
* @param string $p_password The password of the user.
* @param integer $p_project_id One of -1 default project, 0 for all projects, otherwise project id.
* @return integer The biggest used issue id.
*/
function mc_issue_get_biggest_id( $p_username, $p_password, $p_project_id ) {
global $g_project_override;
$t_user_id = mci_check_login( $p_username, $p_password );
if( $t_user_id === false ) {
return mci_fault_login_failed();
}
$t_any = defined( 'META_FILTER_ANY' ) ? META_FILTER_ANY : 'any';
$t_none = defined( 'META_FILTER_NONE' ) ? META_FILTER_NONE : 'none';
$t_filter = array(
'category_id' => array(
'0' => $t_any,
),
'severity' => array(
'0' => $t_any,
),
'status' => array(
'0' => $t_any,
),
'highlight_changed' => 0,
'reporter_id' => array(
'0' => $t_any,
),
'handler_id' => array(
'0' => $t_any,
),
'resolution' => array(
'0' => $t_any,
),
'build' => array(
'0' => $t_any,
),
'version' => array(
'0' => $t_any,
),
'hide_status' => array(
'0' => $t_none,
),
'monitor_user_id' => array(
'0' => $t_any,
),
'dir' => 'DESC',
'sort' => 'id',
);
$t_page_number = 1;
$t_per_page = 1;
$t_bug_count = 0;
$t_page_count = 0;
# Get project id, if -1, then retrieve the current which will be the default since there is no cookie.
$t_project_id = $p_project_id;
if( $t_project_id == -1 ) {
$t_project_id = helper_get_current_project();
}
$g_project_override = $t_project_id;
if( ( $t_project_id > 0 ) && !project_exists( $t_project_id ) ) {
return ApiObjectFactory::faultNotFound( 'Project \'' . $t_project_id . '\' does not exist.' );
}
if( !mci_has_readonly_access( $t_user_id, $t_project_id ) ) {
return mci_fault_access_denied( $t_user_id );
}
$t_rows = filter_get_bug_rows( $t_page_number, $t_per_page, $t_page_count, $t_bug_count, $t_filter, $t_project_id, $t_user_id );
if( count( $t_rows ) == 0 ) {
return 0;
} else {
return $t_rows[0]->id;
}
}
/**
* Get the id of an issue via the issue's summary.
*
* @param string $p_username The name of the user trying to retrieve the information.
* @param string $p_password The password of the user.
* @param string $p_summary The summary of the issue to retrieve.
* @return integer The id of the issue with the given summary, 0 if there is no such issue.
*/
function mc_issue_get_id_from_summary( $p_username, $p_password, $p_summary ) {
global $g_project_override;
$t_user_id = mci_check_login( $p_username, $p_password );
if( $t_user_id === false ) {
return mci_fault_login_failed();
}
$t_query = 'SELECT id FROM {bug} WHERE summary = ' . db_param();
$t_result = db_query( $t_query, array( $p_summary ), 1 );
if( db_num_rows( $t_result ) == 0 ) {
return 0;
} else {
while( ( $t_row = db_fetch_array( $t_result ) ) !== false ) {
$t_issue_id = (int)$t_row['id'];
$t_project_id = bug_get_field( $t_issue_id, 'project_id' );
$g_project_override = $t_project_id;
if( mci_has_readonly_access( $t_user_id, $t_project_id ) &&
access_has_bug_level( config_get( 'view_bug_threshold', null, null, $t_project_id ), $t_issue_id, $t_user_id ) ) {
return $t_issue_id;
}
}
# no issue found that belongs to a project that the user has read access to.
return 0;
}
}
/**
* Does the actual checks when setting the issue handler.
* The user existence check is always done even if handler doesn't change.
* The handler's access level check is done even if handler doesn't change.
* The current user ability to assign issue access check is only done on change.
* This behavior would be consistent with the web UI.
*
* @param integer $p_user_id The id of the logged in user.
* @param integer $p_project_id The id of the project the issue is associated with.
* @param integer $p_old_handler_id The old handler id.
* @param integer $p_new_handler_id The new handler id. 0 for not assigned.
* @return true: access ok, otherwise: soap fault.
*/
function mci_issue_handler_access_check( $p_user_id, $p_project_id, $p_old_handler_id, $p_new_handler_id ) {
if( $p_new_handler_id != 0 ) {
if( !user_exists( $p_new_handler_id ) ) {
return ApiObjectFactory::faultNotFound( 'User \'' . $p_new_handler_id . '\' does not exist.' );
}
if( !access_has_project_level( config_get( 'handle_bug_threshold' ), $p_project_id, $p_new_handler_id ) ) {
return mci_fault_access_denied( $p_new_handler_id, 'User does not have access right to handle issues' );
}
}
if( $p_old_handler_id != $p_new_handler_id ) {
if( !access_has_project_level( config_get( 'update_bug_assign_threshold' ), $p_project_id, $p_user_id ) ) {
return mci_fault_access_denied( $p_user_id, 'User does not have access right to assign issues' );
}
}
return true;
}
/**
* Add an issue to the database.
*
* @param string $p_username The name of the user trying to add the issue.
* @param string $p_password The password of the user.
* @param array|stdClass $p_issue A IssueData structure containing information about the new issue.
* @return integer|RestFault|SoapFault The id of the created issue.
*/
function mc_issue_add( $p_username, $p_password, $p_issue ) {
$t_user_id = mci_check_login( $p_username, $p_password );
if( $t_user_id === false ) {
return mci_fault_login_failed();
}
$t_issue = ApiObjectFactory::objectToArray( $p_issue, /* recursive */ true );
$t_project_id = isset( $t_issue['project'] ) ? mci_get_project_id( $t_issue['project'] ) : ALL_PROJECTS;
if( !mci_has_readwrite_access( $t_user_id, $t_project_id ) ) {
return mci_fault_access_denied( $t_user_id );
}
$t_data = array(
'payload' => array( 'issue' => $t_issue )
);
$t_command = new IssueAddCommand( $t_data );
$t_result = $t_command->execute();
$t_issue_id = (int)$t_result['issue_id'];
return $t_issue_id;
}
/**
* Update Issue in database
*
* Created By KGB
* @param string $p_username The name of the user trying to update the issue.
* @param string $p_password The password of the user.
* @param integer $p_issue_id The issue id of the existing issue being updated.
* @param stdClass $p_issue A IssueData structure containing information about the new issue.
* @return integer|RestFault|SoapFault The id of the created issue.
*/
function mc_issue_update( $p_username, $p_password, $p_issue_id, stdClass $p_issue ) {
global $g_project_override;
$t_user_id = mci_check_login( $p_username, $p_password );
if( $t_user_id === false ) {
return mci_fault_login_failed();
}
if( !bug_exists( $p_issue_id ) ) {
return ApiObjectFactory::faultNotFound( 'Issue \'' . $p_issue_id . '\' does not exist.' );
}
if( bug_is_readonly( $p_issue_id ) ) {
return ApiObjectFactory::faultForbidden( 'Issue \'' . $p_issue_id . '\' is readonly' );
}
$t_project_id = bug_get_field( $p_issue_id, 'project_id' );
if( !mci_has_readwrite_access( $t_user_id, $t_project_id ) ) {
return mci_fault_access_denied( $t_user_id );
}
$g_project_override = $t_project_id; # ensure that helper_get_current_project() calls resolve to this project id
$p_issue = ApiObjectFactory::objectToArray( $p_issue );
# If no project specified, default to the Issue's current project
if( isset( $p_issue['project'] ) ) {
$t_project = $p_issue['project'];
$t_project_id = mci_get_project_id( $t_project );
if( $t_project_id == 0 ) {
return ApiObjectFactory::faultNotFound( 'Project \'' . $t_project['name'] . '\' does not exist.' );
} elseif( !project_exists( $t_project_id ) ) {
return ApiObjectFactory::faultNotFound( 'Project \'' . $t_project_id . '\' does not exist.' );
}
}
$t_reporter_id = isset( $p_issue['reporter'] ) ? mci_get_user_id( $p_issue['reporter'] ) : $t_user_id ;
$t_handler_id = isset( $p_issue['handler'] ) ? mci_get_user_id( $p_issue['handler'] ) : 0;
$t_summary = isset( $p_issue['summary'] ) ? $p_issue['summary'] : '';
$t_description = isset( $p_issue['description'] ) ? $p_issue['description'] : '';
if( !access_has_bug_level( config_get( 'update_bug_threshold' ), $p_issue_id, $t_user_id ) ) {
return mci_fault_access_denied( $t_user_id, 'Not enough rights to update issues' );
}
$t_category = isset( $p_issue['category'] ) ? $p_issue['category'] : null;
$t_category_id = mci_get_category_id( $t_category, $t_project_id );
$t_version_id = isset( $p_issue['version'] ) ? mci_get_version_id( $p_issue['version'], $t_project_id, 'version' ) : 0;
$t_fixed_in_version_id = isset( $p_issue['fixed_in_version'] ) ? mci_get_version_id( $p_issue['fixed_in_version'], $t_project_id, 'fixed_in_version' ) : 0;
$t_target_version_id = isset( $p_issue['target_version'] ) ? mci_get_version_id( $p_issue['target_version'], $t_project_id, 'target_version' ) : 0;
if( is_blank( $t_summary ) ) {
return ApiObjectFactory::faultBadRequest( 'Mandatory field \'summary\' is missing.' );
}
if( is_blank( $t_description ) ) {
return ApiObjectFactory::faultBadRequest( 'Mandatory field \'description\' is missing.' );
}
# fields which we expect to always be set
$t_bug_data = bug_get( $p_issue_id, true );
$t_bug_data->project_id = $t_project_id;
$t_bug_data->reporter_id = $t_reporter_id;
# Only check that user can handle the issue if it was modified by the update.
if( $t_bug_data->handler_id != $t_handler_id ) {
$t_access_check_result = mci_issue_handler_access_check(
$t_user_id, $t_project_id, /* old */ $t_bug_data->handler_id, /* new */ $t_handler_id );
if( $t_access_check_result !== true ) {
return $t_access_check_result;
}
$t_bug_data->handler_id = $t_handler_id;
}
$t_bug_data->category_id = $t_category_id;
$t_bug_data->summary = $t_summary;
$t_bug_data->description = $t_description;
# fields which might not be set
if( isset( $p_issue['steps_to_reproduce'] ) ) {
$t_bug_data->steps_to_reproduce = $p_issue['steps_to_reproduce'];
}
if( isset( $p_issue['additional_information'] ) ) {
$t_bug_data->additional_information = $p_issue['additional_information'];
}
if( isset( $p_issue['priority'] ) ) {
$t_bug_data->priority = mci_get_priority_id( $p_issue['priority'] );
}
if( isset( $p_issue['severity'] ) ) {
$t_bug_data->severity = mci_get_severity_id( $p_issue['severity'] );
}
if( isset( $p_issue['status'] ) ) {
$t_bug_data->status = mci_get_status_id( $p_issue['status'] );
}
if( isset( $p_issue['reproducibility'] ) ) {
$t_bug_data->reproducibility = mci_get_reproducibility_id( $p_issue['reproducibility'] );
}
if( isset( $p_issue['resolution'] ) ) {
$t_bug_data->resolution = mci_get_resolution_id( $p_issue['resolution'] );
}
if( isset( $p_issue['projection'] ) ) {
$t_bug_data->projection = mci_get_projection_id( $p_issue['projection'] );
}
if( isset( $p_issue['eta'] ) ) {
$t_bug_data->eta = mci_get_eta_id( $p_issue['eta'] );
}
if( isset( $p_issue['view_state'] ) ) {
$t_bug_data->view_state = mci_get_view_state_id( $p_issue['view_state'] );
}
if( isset( $p_issue['date_submitted'] ) ) {
$t_bug_data->date_submitted = $p_issue['date_submitted'];
}
if( isset( $p_issue['date_updated'] ) ) {
$t_bug_data->last_updated = $p_issue['last_updated'];
}
if( isset( $p_issue['profile_id'] ) ) {
$t_bug_data->profile_id = $p_issue['profile_id'];
}
if( isset( $p_issue['os'] ) ) {
$t_bug_data->os = $p_issue['os'];
}
if( isset( $p_issue['os_build'] ) ) {
$t_bug_data->os_build = $p_issue['os_build'];
}
if( isset( $p_issue['build'] ) ) {
$t_bug_data->build = $p_issue['build'];
}
if( isset( $p_issue['platform'] ) ) {
$t_bug_data->platform = $p_issue['platform'];
}
if( $t_version_id != 0 ) {
$t_bug_data->version = version_get_field( $t_version_id, 'version' );
}
if( $t_fixed_in_version_id != 0 ) {
$t_bug_data->fixed_in_version = version_get_field( $t_fixed_in_version_id, 'version' );
}
if( $t_target_version_id != 0 && access_has_project_level( config_get( 'roadmap_update_threshold' ), $t_bug_data->project_id, $t_user_id ) ) {
$t_bug_data->target_version = version_get_field( $t_target_version_id, 'version' );
}
if( isset( $p_issue['sticky'] ) && access_has_bug_level( config_get( 'set_bug_sticky_threshold' ), $t_bug_data->id ) ) {
$t_bug_data->sticky = $p_issue['sticky'];
}
if( isset( $p_issue['due_date'] ) &&
access_has_project_level( config_get( 'due_date_update_threshold' ), $t_bug_data->project_id ) ) {
$t_bug_data->due_date = strtotime( $p_issue['due_date'] );
} else {
$t_bug_data->due_date = date_get_null();
}
mci_issue_set_custom_fields( $p_issue_id, $p_issue['custom_fields'], true );
if( isset( $p_issue['monitors'] ) ) {
mci_issue_set_monitors( $p_issue_id, $t_user_id, $p_issue['monitors'] );
}
if( isset( $p_issue['notes'] ) && is_array( $p_issue['notes'] ) ) {
$t_bugnotes = bugnote_get_all_visible_bugnotes( $p_issue_id, 'DESC', 0 );
$t_bugnotes_by_id = array();
foreach( $t_bugnotes as $t_bugnote ) {
$t_bugnotes_by_id[$t_bugnote->id] = $t_bugnote;
}
foreach( $p_issue['notes'] as $t_note ) {
$t_note = ApiObjectFactory::objectToArray( $t_note );
if( isset( $t_note['view_state'] ) ) {
$t_view_state = $t_note['view_state'];
} else {
$t_view_state = config_get( 'default_bugnote_view_status' );
}
if( isset( $t_note['id'] ) && ( (int)$t_note['id'] > 0 ) ) {
$t_bugnote_id = (integer)$t_note['id'];
$t_view_state_id = mci_get_enum_id_from_objectref( 'view_state', $t_view_state );
if( array_key_exists( $t_bugnote_id, $t_bugnotes_by_id ) ) {
$t_bugnote_changed = false;
if( $t_bugnote->note !== $t_note['text'] ) {
bugnote_set_text( $t_bugnote_id, $t_note['text'] );
$t_bugnote_changed = true;
}
if( $t_bugnote->view_state != $t_view_state_id ) {
bugnote_set_view_state( $t_bugnote_id, $t_view_state_id == VS_PRIVATE );
$t_bugnote_changed = true;
}
if( isset( $t_note['time_tracking']) && $t_note['time_tracking'] != $t_bugnote->time_tracking ) {
bugnote_set_time_tracking( $t_bugnote_id, mci_get_time_tracking_from_note( $p_issue_id, $t_note ) );
$t_bugnote_changed = true;
}
if( $t_bugnote_changed ) {
bugnote_date_update( $t_bugnote_id );
}
}
} else {
$t_view_state_id = mci_get_enum_id_from_objectref( 'view_state', $t_view_state );
$t_note_type = isset( $t_note['note_type'] ) ? (int)$t_note['note_type'] : BUGNOTE;
$t_note_attr = isset( $t_note['note_type'] ) ? $t_note['note_attr'] : '';
bugnote_add( $p_issue_id, $t_note['text'], mci_get_time_tracking_from_note( $p_issue_id, $t_note ), $t_view_state_id == VS_PRIVATE, $t_note_type, $t_note_attr, $t_user_id, false );
}
}
# The issue has been cached earlier in the bug_get() call. Flush the cache since it is
# now stale. Otherwise, the email notification will be based on the cached data.
bugnote_clear_bug_cache( $p_issue_id );
}
if( isset( $p_issue['tags'] ) && is_array( $p_issue['tags'] ) ) {
mci_tag_set_for_issue( $p_issue_id, $p_issue['tags'], $t_user_id );
}
# submit the issue
log_event( LOG_WEBSERVICE, 'updating issue \'' . $p_issue_id . '\'' );
return $t_bug_data->update( /* update extended */ true, /* bypass email */ false );
}
/**
* Set tags for a given issue
* @param string $p_username Username.
* @param string $p_password Password.
* @param integer $p_issue_id A issue identifier.
* @param array $p_tags An array of tags to set.
* @return mixed
*/
function mc_issue_set_tags ( $p_username, $p_password, $p_issue_id, array $p_tags ) {
global $g_project_override;
$t_user_id = mci_check_login( $p_username, $p_password );
if( $t_user_id === false ) {
return mci_fault_login_failed();
}
if( !bug_exists( $p_issue_id ) ) {
return ApiObjectFactory::faultNotFound( 'Issue \'' . $p_issue_id . '\' does not exist.' );
}
$t_project_id = bug_get_field( $p_issue_id, 'project_id' );
$g_project_override = $t_project_id;
if( !mci_has_readwrite_access( $t_user_id, $t_project_id ) ) {
return mci_fault_access_denied( $t_user_id );
}
if( bug_is_readonly( $p_issue_id ) ) {
return mci_fault_access_denied( $t_user_id, 'Issue \'' . $p_issue_id . '\' is readonly' );
}
mci_tag_set_for_issue( $p_issue_id, $p_tags, $t_user_id );
return true;
}
/**
* Delete the specified issue.
*
* @param string $p_username The name of the user trying to delete the issue.
* @param string $p_password The password of the user.
* @param integer $p_issue_id The id of the issue to delete.
* @return boolean True if the issue has been deleted successfully, false otherwise.
*/
function mc_issue_delete( $p_username, $p_password, $p_issue_id ) {
$t_user_id = mci_check_login( $p_username, $p_password );
if( $t_user_id === false ) {
return mci_fault_login_failed();
}
if( !bug_exists( $p_issue_id ) ) {
return ApiObjectFactory::faultNotFound( "Issue '$p_issue_id' does not exist." );
}
$t_project_id = bug_get_field( $p_issue_id, 'project_id' );
if( !mci_has_readwrite_access( $t_user_id, $t_project_id ) ) {
return mci_fault_access_denied( $t_user_id );
}
$t_data = array( 'query' => array( 'id' => $p_issue_id ) );
$t_command = new IssueDeleteCommand( $t_data );
$t_command->execute();
}
/**
* Add a note to an existing issue.
*
* @param string $p_username The name of the user trying to add a note to an issue.
* @param string $p_password The password of the user.
* @param integer $p_issue_id The id of the issue to add the note to.
* @param stdClass $p_note The note to add.
* @return integer The id of the added note.
*/
function mc_issue_note_add( $p_username, $p_password, $p_issue_id, stdClass $p_note ) {
$t_user_id = mci_check_login( $p_username, $p_password );
if( $t_user_id === false ) {
return mci_fault_login_failed();
}
$t_project_id = bug_get_field( $p_issue_id, 'project_id' );
if( !mci_has_readwrite_access( $t_user_id, $t_project_id ) ) {
return mci_fault_access_denied( $t_user_id );
}
$p_note = ApiObjectFactory::objectToArray( $p_note );
$t_note_type = isset( $p_note['note_type'] ) ? (int)$p_note['note_type'] : BUGNOTE;
if( $t_note_type != REMINDER ) {
$t_payload = array();
if( $t_note_type == TIME_TRACKING ) {
$t_payload['type'] = 'timelog';
} else {
$t_payload['type'] = 'note';
}
if( isset( $p_note['text'] ) ) {
$t_payload['text'] = $p_note['text'];
}
if( isset( $p_note['view_state'] ) ) {
$t_payload['view_state'] = ApiObjectFactory::objectToArray( $p_note['view_state'] );
}
if( isset( $p_note['reporter'] ) ) {
$t_payload['reporter'] = array( 'id' => mci_get_user_id( $p_note['reporter'] ) );
}
if( isset( $p_note['time_tracking'] ) && is_numeric( $p_note['time_tracking'] ) ) {
$t_payload['time_tracking'] = array(
'duration' => db_minutes_to_hhmm( $p_note['time_tracking'] )
);
}
$t_data = array(
'query' => array( 'issue_id' => $p_issue_id ),
'payload' => $t_payload
);
$t_command = new IssueNoteAddCommand( $t_data );
$t_result = $t_command->execute();
return $t_result['id'];
}
# TODO: Keep the code path below for adding REMINDERs.
if( (integer)$p_issue_id < 1 ) {
return ApiObjectFactory::faultBadRequest( 'Invalid issue id \'' . $p_issue_id . '\'' );
}
if( !bug_exists( $p_issue_id ) ) {
return ApiObjectFactory::faultNotFound( 'Issue \'' . $p_issue_id . '\' does not exist.' );
}
if( !isset( $p_note['text'] ) || is_blank( $p_note['text'] ) ) {
return ApiObjectFactory::faultBadRequest( 'Issue note text must not be blank.' );
}
global $g_project_override;
$g_project_override = $t_project_id;
if( !access_has_bug_level( config_get( 'add_bugnote_threshold' ), $p_issue_id, $t_user_id ) ) {
return mci_fault_access_denied( $t_user_id, 'You do not have access rights to add notes to this issue' );
}
if( bug_is_readonly( $p_issue_id ) ) {
return mci_fault_access_denied( $t_user_id, 'Issue \'' . $p_issue_id . '\' is readonly' );
}
if( isset( $p_note['view_state'] ) ) {
$t_view_state = $p_note['view_state'];
} else {
$t_view_state = array(
'id' => config_get( 'default_bug_view_status' ),
);
}
# TODO: #17777: Add test case for mc_issue_add() and mc_issue_note_add() reporter override
if( isset( $p_note['reporter'] ) ) {
$t_reporter_id = mci_get_user_id( $p_note['reporter'] );
if( !$t_reporter_id ) {
return ApiObjectFactory::faultBadRequest( 'Invalid reporter.' );
}
if( $t_reporter_id != $t_user_id ) {
# Make sure that active user has access level required to specify a different reporter.
$t_specify_reporter_access_level = config_get( 'webservice_specify_reporter_on_add_access_level_threshold' );
if( !access_has_project_level( $t_specify_reporter_access_level, $t_project_id, $t_user_id ) ) {
return mci_fault_access_denied( $t_user_id, "Active user does not have access level required to specify a different issue note reporter" );
}
}
} else {
$t_reporter_id = $t_user_id;
}
$t_view_state_id = mci_get_enum_id_from_objectref( 'view_state', $t_view_state );
$t_note_attr = isset( $p_note['note_type'] ) ? $p_note['note_attr'] : '';
log_event( LOG_WEBSERVICE, 'adding bugnote to issue \'' . $p_issue_id . '\'' );
$t_bugnote_id = bugnote_add( $p_issue_id, $p_note['text'], mci_get_time_tracking_from_note( $p_issue_id, $p_note ), $t_view_state_id == VS_PRIVATE, $t_note_type, $t_note_attr, $t_reporter_id );
bugnote_process_mentions( $p_issue_id, $t_bugnote_id, $p_note['text'] );
return $t_bugnote_id;
}
/**
* Delete a note given its id.
*
* @param string $p_username The name of the user trying to delete a note from an issue.
* @param string $p_password The password of the user.
* @param integer $p_issue_note_id The id of the note to be deleted.
* @return boolean true: success, false: failure
*/
function mc_issue_note_delete( $p_username, $p_password, $p_issue_note_id ) {
$t_user_id = mci_check_login( $p_username, $p_password );
if( $t_user_id === false ) {
return mci_fault_login_failed();
}
if( (integer)$p_issue_note_id < 1 ) {
return ApiObjectFactory::faultBadRequest( 'Invalid issue note id \'' . $p_issue_note_id . '\'.' );
}
$t_issue_id = bugnote_get_field( $p_issue_note_id, 'bug_id' );
$t_project_id = bug_get_field( $t_issue_id, 'project_id' );
if( !mci_has_readwrite_access( $t_user_id, $t_project_id ) ) {
return mci_fault_access_denied( $t_user_id );
}
$t_data = array(
'query' => array( 'id' => $p_issue_note_id )
);
$t_command = new IssueNoteDeleteCommand( $t_data );
$t_command->execute();
return true;
}
/**
* Update a note
*
* @param string $p_username The name of the user trying to update a note of an issue.
* @param string $p_password The password of the user.
* @param stdClass $p_note The note to update.
* @return true on success, false on failure
*/
function mc_issue_note_update( $p_username, $p_password, stdClass $p_note ) {
global $g_project_override;
$t_user_id = mci_check_login( $p_username, $p_password );
if( $t_user_id === false ) {
return mci_fault_login_failed();
}
$p_note = ApiObjectFactory::objectToArray( $p_note );
if( !isset( $p_note['id'] ) || is_blank( $p_note['id'] ) ) {
return ApiObjectFactory::faultBadRequest( 'Issue note id must not be blank.' );
}
if( !isset( $p_note['text'] ) || is_blank( $p_note['text'] ) ) {
return ApiObjectFactory::faultBadRequest( 'Issue note text must not be blank.' );
}
$t_issue_note_id = $p_note['id'];
if( !bugnote_exists( $t_issue_note_id ) ) {
return ApiObjectFactory::faultNotFound( 'Issue note \'' . $t_issue_note_id . '\' does not exist.' );
}
$t_issue_id = bugnote_get_field( $t_issue_note_id, 'bug_id' );
$t_project_id = bug_get_field( $t_issue_id, 'project_id' );
$g_project_override = $t_project_id;
if( !mci_has_readwrite_access( $t_user_id, $t_project_id ) ) {
return mci_fault_access_denied( $t_user_id );
}
# Check if the user owns the bugnote and is allowed to update their own bugnotes
# regardless of the update_bugnote_threshold level.
$t_user_owns_the_bugnote = bugnote_is_user_reporter( $t_issue_note_id, $t_user_id );
$t_user_can_update_own_bugnote = config_get( 'bugnote_user_edit_threshold', null, $t_user_id, $t_project_id );
if( $t_user_owns_the_bugnote && !$t_user_can_update_own_bugnote ) {
return mci_fault_access_denied( $t_user_id );
}
# Check if the user has an access level beyond update_bugnote_threshold for the
# project containing the bugnote to update.
$t_update_bugnote_threshold = config_get( 'update_bugnote_threshold', null, $t_user_id, $t_project_id );
if( !$t_user_owns_the_bugnote && !access_has_bugnote_level( $t_update_bugnote_threshold, $t_issue_note_id, $t_user_id ) ) {
return mci_fault_access_denied( $t_user_id );
}
# Check if the bug is readonly
if( bug_is_readonly( $t_issue_id ) ) {
return mci_fault_access_denied( $t_user_id, 'Issue \'' . $t_issue_id . '\' is readonly' );
}
if( isset( $p_note['view_state'] ) ) {
$t_view_state = $p_note['view_state'];
$t_view_state_id = mci_get_enum_id_from_objectref( 'view_state', $t_view_state );
bugnote_set_view_state( $t_issue_note_id, $t_view_state_id == VS_PRIVATE );
}
log_event( LOG_WEBSERVICE, 'updating bugnote id \'' . $t_issue_note_id . '\'' );
bugnote_set_text( $t_issue_note_id, $p_note['text'] );
return bugnote_date_update( $t_issue_note_id );
}
/**
* Submit a new relationship.
*
* @param string $p_username The name of the user trying to add a relationship to an issue.
* @param string $p_password The password of the user.
* @param integer $p_issue_id The id of the issue of the source issue.
* @param stdClass $p_relationship The relationship to add (RelationshipData SOAP object).
* @return integer The id of the added relationship.
*/
function mc_issue_relationship_add( $p_username, $p_password, $p_issue_id, stdClass $p_relationship ) {
global $g_project_override;
$t_user_id = mci_check_login( $p_username, $p_password );
$p_relationship = ApiObjectFactory::objectToArray( $p_relationship );
$t_dest_issue_id = $p_relationship['target_id'];
$t_rel_type = ApiObjectFactory::objectToArray( $p_relationship['type'] );
if( $t_user_id === false ) {
return mci_fault_login_failed();
}
$t_project_id = bug_get_field( $p_issue_id, 'project_id' );
$g_project_override = $t_project_id;
if( !mci_has_readwrite_access( $t_user_id, $t_project_id ) ) {
return mci_fault_access_denied( $t_user_id );
}
# user has access to update the bug...
if( !access_has_bug_level( config_get( 'update_bug_threshold' ), $p_issue_id, $t_user_id ) ) {
return mci_fault_access_denied( $t_user_id, 'Active user does not have access level required to add a relationship to this issue' );
}
# source and destination bugs are the same bug...
if( $p_issue_id == $t_dest_issue_id ) {
return ApiObjectFactory::faultBadRequest( 'An issue can\'t be related to itself.' );
}
# the related bug exists...
if( !bug_exists( $t_dest_issue_id ) ) {
return ApiObjectFactory::faultNotFound( 'Issue \'' . $t_dest_issue_id . '\' not found.' );
}
# bug is not read-only...
if( bug_is_readonly( $p_issue_id ) ) {
return mci_fault_access_denied( $t_user_id, 'Issue \'' . $p_issue_id . '\' is readonly' );
}
# user can access to the related bug at least as viewer...
if( !access_has_bug_level( config_get( 'view_bug_threshold', null, null, $t_project_id ), $t_dest_issue_id, $t_user_id ) ) {
return mci_fault_access_denied( $t_user_id, 'The issue \'' . $t_dest_issue_id . '\' requires higher access level' );
}
log_event( LOG_WEBSERVICE, 'adding relationship type \'' . $t_rel_type['id'] . '\' between \'' . $p_issue_id . '\' and \'' . $t_dest_issue_id . '\'' );
$t_relationship_id = relationship_upsert( $p_issue_id, $t_dest_issue_id, $t_rel_type['id'] );
return $t_relationship_id;
}
/**
* Delete the relationship with the specified target id.
*
* @param string $p_username The name of the user trying to delete a relationship from an issue.
* @param string $p_password The password of the user.
* @param integer $p_issue_id The id of the source issue for the relationship.
* @param integer $p_relationship_id The id of relationship to delete.
* @return boolean true: success, false: failure
*/
function mc_issue_relationship_delete( $p_username, $p_password, $p_issue_id, $p_relationship_id ) {
global $g_project_override;
$t_user_id = mci_check_login( $p_username, $p_password );
if( $t_user_id === false ) {
return mci_fault_login_failed();
}
$t_project_id = bug_get_field( $p_issue_id, 'project_id' );
$g_project_override = $t_project_id;
if( !mci_has_readwrite_access( $t_user_id, $t_project_id ) ) {
return mci_fault_access_denied( $t_user_id );
}
# user has access to update the bug...
if( !access_has_bug_level( config_get( 'update_bug_threshold' ), $p_issue_id, $t_user_id ) ) {
return mci_fault_access_denied( $t_user_id, 'Active user does not have access level required to remove a relationship from this issue.' );
}
# bug is not read-only...
if( bug_is_readonly( $p_issue_id ) ) {
return mci_fault_access_denied( $t_user_id, 'Issue \'' . $p_issue_id . '\' is readonly.' );
}
# retrieve the destination bug of the relationship
$t_dest_issue_id = relationship_get_linked_bug_id( $p_relationship_id, $p_issue_id );
# user can access to the related bug at least as viewer, if it's exist...
if( bug_exists( $t_dest_issue_id ) ) {
if( !access_has_bug_level( config_get( 'view_bug_threshold', null, null, $t_project_id ), $t_dest_issue_id, $t_user_id ) ) {
return mci_fault_access_denied( $t_user_id, 'The issue \'' . $t_dest_issue_id . '\' requires higher access level.' );
}
}
# delete relationship from the DB
log_event( LOG_WEBSERVICE, 'deleting relationship id \'' . $p_relationship_id . '\'' );
relationship_delete( $p_relationship_id );
return true;
}
/**
* Transforms a `BugData` object into a response for webservice API.
* This function assumes that user has access to the issue.
* This function will filter out issue information that user doesn't have
* access to.
*
* @param BugData $p_issue_data A BugData object to process.
* @param integer $p_user_id A valid user identifier.
* @param string $p_lang A valid language string.
* @return array The issue as an array
*/
function mci_issue_data_as_array( BugData $p_issue_data, $p_user_id, $p_lang ) {
global $g_project_override;
$t_project_id = $p_issue_data->project_id;
$g_project_override = $t_project_id;
$t_id = (int)$p_issue_data->id;
$t_issue = array();
$t_issue['id'] = $t_id;
$t_issue['summary'] = mci_sanitize_xml_string( $p_issue_data->summary );
$t_issue['description'] = mci_sanitize_xml_string( bug_get_text_field( $t_id, 'description' ) );
$t_steps_to_reproduce = bug_get_text_field( $t_id, 'steps_to_reproduce' );
$t_issue['steps_to_reproduce'] = mci_null_if_empty( mci_sanitize_xml_string( $t_steps_to_reproduce ) );
$t_additional_information = bug_get_text_field( $t_id, 'additional_information' );
$t_issue['additional_information'] = mci_null_if_empty( mci_sanitize_xml_string( $t_additional_information ) );
$t_issue['project'] = mci_project_as_array_by_id( $p_issue_data->project_id );
$t_issue['category'] = mci_get_category( $p_issue_data->category_id );
$t_issue['version'] = mci_get_version( $p_issue_data->version, $p_issue_data->project_id );
$t_issue['fixed_in_version'] = mci_get_version( $p_issue_data->fixed_in_version, $p_issue_data->project_id );
if( access_has_bug_level( config_get( 'roadmap_view_threshold' ), $t_id ) ) {
$t_issue['target_version'] = mci_get_version( $p_issue_data->target_version, $p_issue_data->project_id );
}
$t_issue['reporter'] = mci_account_get_array_by_id( $p_issue_data->reporter_id );
if( !empty( $p_issue_data->handler_id ) &&
access_has_bug_level( config_get( 'view_handler_threshold', null, null, $t_project_id ), $t_id, $p_user_id ) ) {
$t_issue['handler'] = mci_account_get_array_by_id($p_issue_data->handler_id);
}
$t_issue['status'] = mci_enum_get_array_by_id( $p_issue_data->status, 'status', $p_lang );
$t_issue['resolution'] = mci_enum_get_array_by_id( $p_issue_data->resolution, 'resolution', $p_lang );
$t_issue['view_state'] = mci_enum_get_array_by_id( $p_issue_data->view_state, 'view_state', $p_lang );
$t_issue['priority'] = mci_enum_get_array_by_id( $p_issue_data->priority, 'priority', $p_lang );
$t_issue['severity'] = mci_enum_get_array_by_id( $p_issue_data->severity, 'severity', $p_lang );
$t_issue['reproducibility'] = mci_enum_get_array_by_id( $p_issue_data->reproducibility, 'reproducibility', $p_lang );
if( config_get( 'enable_projection' ) != OFF ) {
$t_issue['projection'] = mci_enum_get_array_by_id( $p_issue_data->projection, 'projection', $p_lang );
}
if( config_get( 'enable_product_build' ) != OFF ) {
$t_issue['build'] = mci_null_if_empty( $p_issue_data->build );
}
if( config_get( 'allow_freetext_in_profile_fields' ) != OFF ) {
$t_issue['platform'] = mci_null_if_empty( $p_issue_data->platform );
$t_issue['os'] = mci_null_if_empty( $p_issue_data->os );
$t_issue['os_build'] = mci_null_if_empty( $p_issue_data->os_build );
}
if( config_get( 'enable_eta' ) != OFF ) {
$t_issue['eta'] = mci_enum_get_array_by_id( $p_issue_data->eta, 'eta', $p_lang );
}
if( access_has_bug_level( config_get( 'due_date_view_threshold' ), $t_id ) ) {
$t_issue['due_date'] = ApiObjectFactory::datetime( $p_issue_data->due_date );
}
$t_created_at = ApiObjectFactory::datetime( $p_issue_data->date_submitted );
$t_updated_at = ApiObjectFactory::datetime( $p_issue_data->last_updated );
if( ApiObjectFactory::$soap ) {
if( config_get( 'enable_profiles' ) != OFF ) {
$t_issue['profile_id'] = (int)$p_issue_data->profile_id;
}
if( access_has_bug_level( config_get( 'view_sponsorship_total_threshold' ), $t_id ) ) {
$t_issue['sponsorship_total'] = $p_issue_data->sponsorship_total;
} else {
$t_issue['sponsorship_total'] = 0;
}
$t_issue['sticky'] = $p_issue_data->sticky;
$t_issue['date_submitted'] = $t_created_at;
$t_issue['last_updated'] = $t_updated_at;
} else {
if( config_get( 'enable_profiles' ) != OFF ) {
if ((int)$p_issue_data->profile_id != 0) {
$t_issue['profile'] = mci_profile_as_array_by_id($p_issue_data->profile_id);
}
}
$t_issue['sticky'] = (bool)$p_issue_data->sticky;
$t_issue['created_at'] = $t_created_at;
$t_issue['updated_at'] = $t_updated_at;
}
# Get attachments - access checked as part of returning attachments
$t_issue['attachments'] = mci_issue_get_attachments( $p_issue_data->id, /* note_id */ 0 );
# Get notes - access checked as part of returning notes.
$t_issue['notes'] = mci_issue_get_notes( $p_issue_data->id );
# Get attachments - access checked as part of returning relationships
$t_issue['relationships'] = mci_issue_get_relationships( $p_issue_data->id, $p_user_id );
# Get custom fields - access checked as part of returning custom fields
$t_issue['custom_fields'] = mci_issue_get_custom_fields( $p_issue_data->id );
# Get tags - access checked as part of returning tags
$t_issue['tags'] = mci_issue_get_tags_for_bug_id( $p_issue_data->id, $p_user_id );
# Get users monitoring issue - access checked as part of returning user list.
$t_issue['monitors'] = mci_account_get_array_by_ids( bug_get_monitors( $p_issue_data->id ) );
if( !ApiObjectFactory::$soap ) {
$t_history = mci_issue_get_history( $p_issue_data->id, $p_user_id, $p_lang );
if( !empty( $t_history ) ) {
$t_issue['history'] = $t_history;
}
mci_remove_null_keys( $t_issue );
mci_remove_empty_arrays( $t_issue );
}
return $t_issue;
}
/**
* Get tags linked to a given bug id
* @param integer $p_bug_id A bug identifier.
* @param integer $p_user_id User accessing the information.
* @return array
*/
function mci_issue_get_tags_for_bug_id( $p_bug_id, $p_user_id ) {
if( !access_has_bug_level( config_get( 'tag_view_threshold' ), $p_bug_id, $p_user_id ) ) {
return array();
}
$t_tag_rows = tag_bug_get_attached( $p_bug_id );
$t_result = array();
foreach ( $t_tag_rows as $t_tag_row ) {
$t_result[] = array (
'id' => $t_tag_row['id'],
'name' => $t_tag_row['name']
);
}
return $t_result;
}
/**
* Returns an array for SOAP encoding from a BugData object
*
* @param BugData $p_issue_data A BugData object to process.
* @return array The issue header data as an array
*/
function mci_issue_data_as_header_array( BugData $p_issue_data ) {
$t_issue = array();
$t_id = $p_issue_data->id;
$t_issue['id'] = $t_id;
$t_issue['view_state'] = $p_issue_data->view_state;
$t_issue['last_updated'] = ApiObjectFactory::datetime( $p_issue_data->last_updated );
$t_issue['project'] = $p_issue_data->project_id;
$t_issue['category'] = mci_get_category( $p_issue_data->category_id );
$t_issue['priority'] = $p_issue_data->priority;
$t_issue['severity'] = $p_issue_data->severity;
$t_issue['status'] = $p_issue_data->status;
$t_issue['reporter'] = $p_issue_data->reporter_id;
$t_issue['summary'] = mci_sanitize_xml_string( $p_issue_data->summary );
if( !empty( $p_issue_data->handler_id ) ) {
$t_issue['handler'] = $p_issue_data->handler_id;
} else {
$t_issue['handler'] = null;
}
$t_issue['resolution'] = $p_issue_data->resolution;
$t_attachments = mci_issue_get_attachments( $p_issue_data->id );
$t_issue['attachments_count'] = $t_attachments === null ? 0 : count( $t_attachments );
$t_notes = mci_issue_get_notes( $p_issue_data->id );
$t_issue['notes_count'] = $t_notes === null ? 0 : count( $t_notes );
return $t_issue;
}
/**
* Check if the bug exists and the user has a access right to read it.
*
* @param integer $p_user_id The user id.
* @param integer $p_bug_id The bug id.
* @return true if the user has access rights and the bug exists, otherwise return false
*/
function mci_check_access_to_bug( $p_user_id, $p_bug_id ) {
if( !bug_exists( $p_bug_id ) ) {
return false;
}
$t_project_id = bug_get_field( $p_bug_id, 'project_id' );
$g_project_override = $t_project_id;
if( !mci_has_readonly_access( $p_user_id, $t_project_id ) ) {
return false;
}
if( !access_has_bug_level( config_get( 'view_bug_threshold', null, null, $t_project_id ), $p_bug_id, $p_user_id ) ) {
return false;
}
return true;
}
/**
* Get all issues matching the ids.
*
* @param string $p_username The name of the user trying to access the issues.
* @param string $p_password The password of the user.
* @param IntegerArray $p_issue_ids Number of issues to display per page.
* @return array that represents an IssueDataArray structure
*/
function mc_issues_get( $p_username, $p_password, $p_issue_ids ) {
$t_user_id = mci_check_login( $p_username, $p_password );
if( $t_user_id === false ) {
return mci_fault_login_failed();
}
$t_lang = mci_get_user_lang( $t_user_id );
$t_result = array();
foreach( $p_issue_ids as $t_id ) {
if( mci_check_access_to_bug( $t_user_id, $t_id ) === false ) {
continue;
}
log_event( LOG_WEBSERVICE, 'getting details for issue \'' . $t_id . '\'' );
$t_issue_data = bug_get( $t_id, true );
$t_result[] = mci_issue_data_as_array( $t_issue_data, $t_user_id, $t_lang );
}
return $t_result;
}
/**
* Get all issues header matching the ids.
*
* @param string $p_username The name of the user trying to access the issues.
* @param string $p_password The password of the user.
* @param IntegerArray $p_issue_ids Number of issues to display per page.
* @return array that represents an IssueHeaderDataArray structure
*/
function mc_issues_get_header( $p_username, $p_password, $p_issue_ids ) {
$t_user_id = mci_check_login( $p_username, $p_password );
if( $t_user_id === false ) {
return mci_fault_login_failed();
}
$t_result = array();
foreach( $p_issue_ids as $t_id ) {
if( mci_check_access_to_bug( $t_user_id, $t_id ) === false )
continue;
log_event( LOG_WEBSERVICE, 'getting details for issue \'' . $t_id . '\'' );
$t_issue_data = bug_get( $t_id, true );
$t_result[] = mci_issue_data_as_header_array( $t_issue_data );
}
return $t_result;
}
/**
* Calculate hash for an issue.
*
* @param integer $p_issue_id The issue id.
* @param null|string|array $p_issue The issue or null if issue doesn't exist.
* @param integer $p_user_id The user id.
* @return string The hash of the issue.
*/
function mc_issue_hash( $p_issue_id, $p_issue, $p_user_id = null ) {
if( $p_user_id === null ) {
if( auth_is_user_authenticated() ) {
$t_user_id = auth_get_current_user_id();
} else {
$t_user_id = 0;
}
} else {
$t_user_id = (int)$p_user_id;
}
if( $p_issue === null ) {
$t_issue = '';
} else if( is_array( $p_issue ) ) {
$t_issue = json_encode( $p_issue );
} else {
$t_issue = $p_issue;
}
$t_issue_id = (int)$p_issue_id;
$t_str_to_hash = 'v1_' . $t_user_id . '_' . $t_issue_id . '_' . $t_issue;
return mci_etag_hash( $t_str_to_hash );
}