summaryrefslogtreecommitdiff
path: root/rt/lib/RT/Queue_Overlay.pm
diff options
context:
space:
mode:
Diffstat (limited to 'rt/lib/RT/Queue_Overlay.pm')
-rw-r--r--rt/lib/RT/Queue_Overlay.pm1246
1 files changed, 0 insertions, 1246 deletions
diff --git a/rt/lib/RT/Queue_Overlay.pm b/rt/lib/RT/Queue_Overlay.pm
deleted file mode 100644
index 5245af43f..000000000
--- a/rt/lib/RT/Queue_Overlay.pm
+++ /dev/null
@@ -1,1246 +0,0 @@
-# BEGIN BPS TAGGED BLOCK {{{
-#
-# COPYRIGHT:
-#
-# This software is Copyright (c) 1996-2011 Best Practical Solutions, LLC
-# <sales@bestpractical.com>
-#
-# (Except where explicitly superseded by other copyright notices)
-#
-#
-# LICENSE:
-#
-# This work is made available to you under the terms of Version 2 of
-# the GNU General Public License. A copy of that license should have
-# been provided with this software, but in any event can be snarfed
-# from www.gnu.org.
-#
-# This work is distributed in the hope that it will be useful, but
-# WITHOUT ANY WARRANTY; without even the implied warranty of
-# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
-# General Public License for more details.
-#
-# You should have received a copy of the GNU General Public License
-# along with this program; if not, write to the Free Software
-# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
-# 02110-1301 or visit their web page on the internet at
-# http://www.gnu.org/licenses/old-licenses/gpl-2.0.html.
-#
-#
-# CONTRIBUTION SUBMISSION POLICY:
-#
-# (The following paragraph is not intended to limit the rights granted
-# to you to modify and distribute this software under the terms of
-# the GNU General Public License and is only of importance to you if
-# you choose to contribute your changes and enhancements to the
-# community by submitting them to Best Practical Solutions, LLC.)
-#
-# By intentionally submitting any modifications, corrections or
-# derivatives to this work, or any other work intended for use with
-# Request Tracker, to Best Practical Solutions, LLC, you confirm that
-# you are the copyright holder for those contributions and you grant
-# Best Practical Solutions, LLC a nonexclusive, worldwide, irrevocable,
-# royalty-free, perpetual, license to use, copy, create derivative
-# works based on those contributions, and sublicense and distribute
-# those contributions and any derivatives thereof.
-#
-# END BPS TAGGED BLOCK }}}
-
-=head1 NAME
-
- RT::Queue - an RT Queue object
-
-=head1 SYNOPSIS
-
- use RT::Queue;
-
-=head1 DESCRIPTION
-
-An RT queue object.
-
-=head1 METHODS
-
-=cut
-
-
-package RT::Queue;
-
-use strict;
-no warnings qw(redefine);
-
-use RT::Groups;
-use RT::ACL;
-use RT::Interface::Email;
-
-our @DEFAULT_ACTIVE_STATUS = qw(new open stalled);
-our @DEFAULT_INACTIVE_STATUS = qw(resolved rejected deleted);
-
-# $self->loc('new'); # For the string extractor to get a string to localize
-# $self->loc('open'); # For the string extractor to get a string to localize
-# $self->loc('stalled'); # For the string extractor to get a string to localize
-# $self->loc('resolved'); # For the string extractor to get a string to localize
-# $self->loc('rejected'); # For the string extractor to get a string to localize
-# $self->loc('deleted'); # For the string extractor to get a string to localize
-
-
-our $RIGHTS = {
- SeeQueue => 'Can this principal see this queue', # loc_pair
- AdminQueue => 'Create, delete and modify queues', # loc_pair
- ShowACL => 'Display Access Control List', # loc_pair
- ModifyACL => 'Modify Access Control List', # loc_pair
- ModifyQueueWatchers => 'Modify the queue watchers', # loc_pair
- SeeCustomField => 'See custom field values', # loc_pair
- ModifyCustomField => 'Modify custom field values', # loc_pair
- AssignCustomFields => 'Assign and remove custom fields', # loc_pair
- ModifyTemplate => 'Modify Scrip templates for this queue', # loc_pair
- ShowTemplate => 'Display Scrip templates for this queue', # loc_pair
-
- ModifyScrips => 'Modify Scrips for this queue', # loc_pair
- ShowScrips => 'Display Scrips for this queue', # loc_pair
-
- ShowTicket => 'See ticket summaries', # loc_pair
- ShowTicketComments => 'See ticket private commentary', # loc_pair
- ShowOutgoingEmail => 'See exact outgoing email messages and their recipeients', # loc_pair
-
- Watch => 'Sign up as a ticket Requestor or ticket or queue Cc', # loc_pair
- WatchAsAdminCc => 'Sign up as a ticket or queue AdminCc', # loc_pair
- CreateTicket => 'Create tickets in this queue', # loc_pair
- ReplyToTicket => 'Reply to tickets', # loc_pair
- CommentOnTicket => 'Comment on tickets', # loc_pair
- OwnTicket => 'Own tickets', # loc_pair
- ModifyTicket => 'Modify tickets', # loc_pair
- DeleteTicket => 'Delete tickets', # loc_pair
- TakeTicket => 'Take tickets', # loc_pair
- StealTicket => 'Steal tickets', # loc_pair
-
- ForwardMessage => 'Forward messages to third person(s)', # loc_pair
-
-};
-
-# Tell RT::ACE that this sort of object can get acls granted
-$RT::ACE::OBJECT_TYPES{'RT::Queue'} = 1;
-
-# TODO: This should be refactored out into an RT::ACLedObject or something
-# stuff the rights into a hash of rights that can exist.
-
-foreach my $right ( keys %{$RIGHTS} ) {
- $RT::ACE::LOWERCASERIGHTNAMES{ lc $right } = $right;
-}
-
-=head2 AddRights C<RIGHT>, C<DESCRIPTION> [, ...]
-
-Adds the given rights to the list of possible rights. This method
-should be called during server startup, not at runtime.
-
-=cut
-
-sub AddRights {
- my $self = shift;
- my %new = @_;
- $RIGHTS = { %$RIGHTS, %new };
- %RT::ACE::LOWERCASERIGHTNAMES = ( %RT::ACE::LOWERCASERIGHTNAMES,
- map { lc($_) => $_ } keys %new);
-}
-
-sub AddLink {
- my $self = shift;
- my %args = ( Target => '',
- Base => '',
- Type => '',
- Silent => undef,
- @_ );
-
- unless ( $self->CurrentUserHasRight('ModifyQueue') ) {
- return ( 0, $self->loc("Permission Denied") );
- }
-
- return $self->SUPER::_AddLink(%args);
-}
-
-sub DeleteLink {
- my $self = shift;
- my %args = (
- Base => undef,
- Target => undef,
- Type => undef,
- @_
- );
-
- #check acls
- unless ( $self->CurrentUserHasRight('ModifyQueue') ) {
- $RT::Logger->debug("No permission to delete links");
- return ( 0, $self->loc('Permission Denied'))
- }
-
- return $self->SUPER::_DeleteLink(%args);
-}
-
-=head2 AvailableRights
-
-Returns a hash of available rights for this object. The keys are the right names and the values are a description of what the rights do
-
-=cut
-
-sub AvailableRights {
- my $self = shift;
- return($RIGHTS);
-}
-
-# {{{ ActiveStatusArray
-
-=head2 ActiveStatusArray
-
-Returns an array of all ActiveStatuses for this queue
-
-=cut
-
-sub ActiveStatusArray {
- my $self = shift;
- if (RT->Config->Get('ActiveStatus')) {
- return (RT->Config->Get('ActiveStatus'))
- } else {
- $RT::Logger->warning("RT::ActiveStatus undefined, falling back to deprecated defaults");
- return (@DEFAULT_ACTIVE_STATUS);
- }
-}
-
-# }}}
-
-# {{{ InactiveStatusArray
-
-=head2 InactiveStatusArray
-
-Returns an array of all InactiveStatuses for this queue
-
-=cut
-
-sub InactiveStatusArray {
- my $self = shift;
- if (RT->Config->Get('InactiveStatus')) {
- return (RT->Config->Get('InactiveStatus'))
- } else {
- $RT::Logger->warning("RT::InactiveStatus undefined, falling back to deprecated defaults");
- return (@DEFAULT_INACTIVE_STATUS);
- }
-}
-
-# }}}
-
-# {{{ StatusArray
-
-=head2 StatusArray
-
-Returns an array of all statuses for this queue
-
-=cut
-
-sub StatusArray {
- my $self = shift;
- return ($self->ActiveStatusArray(), $self->InactiveStatusArray());
-}
-
-# }}}
-
-# {{{ IsValidStatus
-
-=head2 IsValidStatus VALUE
-
-Returns true if VALUE is a valid status. Otherwise, returns 0.
-
-
-=cut
-
-sub IsValidStatus {
- my $self = shift;
- my $value = shift;
-
- my $retval = grep ( $_ eq $value, $self->StatusArray );
- return ($retval);
-
-}
-
-# }}}
-
-# {{{ IsActiveStatus
-
-=head2 IsActiveStatus VALUE
-
-Returns true if VALUE is a Active status. Otherwise, returns 0
-
-
-=cut
-
-sub IsActiveStatus {
- my $self = shift;
- my $value = shift;
-
- my $retval = grep ( $_ eq $value, $self->ActiveStatusArray );
- return ($retval);
-
-}
-
-# }}}
-
-# {{{ IsInactiveStatus
-
-=head2 IsInactiveStatus VALUE
-
-Returns true if VALUE is a Inactive status. Otherwise, returns 0
-
-
-=cut
-
-sub IsInactiveStatus {
- my $self = shift;
- my $value = shift;
-
- my $retval = grep ( $_ eq $value, $self->InactiveStatusArray );
- return ($retval);
-
-}
-
-# }}}
-
-
-# {{{ sub Create
-
-
-
-
-=head2 Create(ARGS)
-
-Arguments: ARGS is a hash of named parameters. Valid parameters are:
-
- Name (required)
- Description
- CorrespondAddress
- CommentAddress
- InitialPriority
- FinalPriority
- DefaultDueIn
-
-If you pass the ACL check, it creates the queue and returns its queue id.
-
-
-=cut
-
-sub Create {
- my $self = shift;
- my %args = (
- Name => undef,
- CorrespondAddress => '',
- Description => '',
- CommentAddress => '',
- SubjectTag => '',
- InitialPriority => 0,
- FinalPriority => 0,
- DefaultDueIn => 0,
- Sign => undef,
- Encrypt => undef,
- _RecordTransaction => 1,
- @_
- );
-
- unless ( $self->CurrentUser->HasRight(Right => 'AdminQueue', Object => $RT::System) )
- { #Check them ACLs
- return ( 0, $self->loc("No permission to create queues") );
- }
-
- unless ( $self->ValidateName( $args{'Name'} ) ) {
- return ( 0, $self->loc('Queue already exists') );
- }
-
- my %attrs = map {$_ => 1} $self->ReadableAttributes;
-
- #TODO better input validation
- $RT::Handle->BeginTransaction();
- my $id = $self->SUPER::Create( map { $_ => $args{$_} } grep exists $args{$_}, keys %attrs );
- unless ($id) {
- $RT::Handle->Rollback();
- return ( 0, $self->loc('Queue could not be created') );
- }
-
- my $create_ret = $self->_CreateQueueGroups();
- unless ($create_ret) {
- $RT::Handle->Rollback();
- return ( 0, $self->loc('Queue could not be created') );
- }
- if ( $args{'_RecordTransaction'} ) {
- $self->_NewTransaction( Type => "Create" );
- }
- $RT::Handle->Commit;
-
- if ( defined $args{'Sign'} ) {
- my ($status, $msg) = $self->SetSign( $args{'Sign'} );
- $RT::Logger->error("Couldn't set attribute 'Sign': $msg")
- unless $status;
- }
- if ( defined $args{'Encrypt'} ) {
- my ($status, $msg) = $self->SetEncrypt( $args{'Encrypt'} );
- $RT::Logger->error("Couldn't set attribute 'Encrypt': $msg")
- unless $status;
- }
-
- RT->System->QueueCacheNeedsUpdate(1);
-
- return ( $id, $self->loc("Queue created") );
-}
-
-# }}}
-
-# {{{ sub Delete
-
-sub Delete {
- my $self = shift;
- return ( 0,
- $self->loc('Deleting this object would break referential integrity') );
-}
-
-# }}}
-
-# {{{ sub SetDisabled
-
-=head2 SetDisabled
-
-Takes a boolean.
-1 will cause this queue to no longer be available for tickets.
-0 will re-enable this queue.
-
-=cut
-
-sub SetDisabled {
- my $self = shift;
- my $val = shift;
-
- $RT::Handle->BeginTransaction();
- my $set_err = $self->SUPER::SetDisabled($val);
- unless ($set_err) {
- $RT::Handle->Rollback();
- $RT::Logger->warning("Couldn't ".($val == 1) ? "disable" : "enable"." queue ".$self->PrincipalObj->Id);
- return (undef);
- }
- $self->_NewTransaction( Type => ($val == 1) ? "Disabled" : "Enabled" );
-
- $RT::Handle->Commit();
-
- RT->System->QueueCacheNeedsUpdate(1);
-
- if ( $val == 1 ) {
- return (1, $self->loc("Queue disabled"));
- } else {
- return (1, $self->loc("Queue enabled"));
- }
-
-}
-
-# }}}
-
-# {{{ sub Load
-
-=head2 Load
-
-Takes either a numerical id or a textual Name and loads the specified queue.
-
-=cut
-
-sub Load {
- my $self = shift;
-
- my $identifier = shift;
- if ( !$identifier ) {
- return (undef);
- }
-
- if ( $identifier =~ /^(\d+)$/ ) {
- $self->SUPER::LoadById($identifier);
- }
- else {
- $self->LoadByCols( Name => $identifier );
- }
-
- return ( $self->Id );
-
-}
-
-# }}}
-
-# {{{ sub ValidateName
-
-=head2 ValidateName NAME
-
-Takes a queue name. Returns true if it's an ok name for
-a new queue. Returns undef if there's already a queue by that name.
-
-=cut
-
-sub ValidateName {
- my $self = shift;
- my $name = shift;
-
- my $tempqueue = new RT::Queue($RT::SystemUser);
- $tempqueue->Load($name);
-
- #If this queue exists, return undef
- if ( $tempqueue->Name() && $tempqueue->id != $self->id) {
- return (undef);
- }
-
- #If the queue doesn't exist, return 1
- else {
- return ($self->SUPER::ValidateName($name));
- }
-
-}
-
-# }}}
-
-=head2 SetSign
-
-=cut
-
-sub Sign {
- my $self = shift;
- my $value = shift;
-
- return undef unless $self->CurrentUserHasRight('SeeQueue');
- my $attr = $self->FirstAttribute('Sign') or return 0;
- return $attr->Content;
-}
-
-sub SetSign {
- my $self = shift;
- my $value = shift;
-
- return ( 0, $self->loc('Permission Denied') )
- unless $self->CurrentUserHasRight('AdminQueue');
-
- my ($status, $msg) = $self->SetAttribute(
- Name => 'Sign',
- Description => 'Sign outgoing messages by default',
- Content => $value,
- );
- return ($status, $msg) unless $status;
- return ($status, $self->loc('Signing enabled')) if $value;
- return ($status, $self->loc('Signing disabled'));
-}
-
-sub Encrypt {
- my $self = shift;
- my $value = shift;
-
- return undef unless $self->CurrentUserHasRight('SeeQueue');
- my $attr = $self->FirstAttribute('Encrypt') or return 0;
- return $attr->Content;
-}
-
-sub SetEncrypt {
- my $self = shift;
- my $value = shift;
-
- return ( 0, $self->loc('Permission Denied') )
- unless $self->CurrentUserHasRight('AdminQueue');
-
- my ($status, $msg) = $self->SetAttribute(
- Name => 'Encrypt',
- Description => 'Encrypt outgoing messages by default',
- Content => $value,
- );
- return ($status, $msg) unless $status;
- return ($status, $self->loc('Encrypting enabled')) if $value;
- return ($status, $self->loc('Encrypting disabled'));
-}
-
-sub SubjectTag {
- my $self = shift;
- return RT->System->SubjectTag( $self );
-}
-
-sub SetSubjectTag {
- my $self = shift;
- my $value = shift;
-
- return ( 0, $self->loc('Permission Denied') )
- unless $self->CurrentUserHasRight('AdminQueue');
-
- my $attr = RT->System->FirstAttribute('BrandedSubjectTag');
- my $map = $attr ? $attr->Content : {};
- if ( defined $value && length $value ) {
- $map->{ $self->id } = $value;
- } else {
- delete $map->{ $self->id };
- }
-
- my ($status, $msg) = RT->System->SetAttribute(
- Name => 'BrandedSubjectTag',
- Description => 'Queue id => subject tag map',
- Content => $map,
- );
- return ($status, $msg) unless $status;
- return ($status, $self->loc(
- "SubjectTag changed to [_1]",
- (defined $value && length $value)? $value : $self->loc("(no value)")
- ))
-}
-
-# {{{ sub Templates
-
-=head2 Templates
-
-Returns an RT::Templates object of all of this queue's templates.
-
-=cut
-
-sub Templates {
- my $self = shift;
-
- my $templates = RT::Templates->new( $self->CurrentUser );
-
- if ( $self->CurrentUserHasRight('ShowTemplate') ) {
- $templates->LimitToQueue( $self->id );
- }
-
- return ($templates);
-}
-
-# }}}
-
-# {{{ Dealing with custom fields
-
-# {{{ CustomField
-
-=head2 CustomField NAME
-
-Load the queue-specific custom field named NAME
-
-=cut
-
-sub CustomField {
- my $self = shift;
- my $name = shift;
- my $cf = RT::CustomField->new($self->CurrentUser);
- $cf->LoadByNameAndQueue(Name => $name, Queue => $self->Id);
- return ($cf);
-}
-
-
-# {{{ TicketCustomFields
-
-=head2 TicketCustomFields
-
-Returns an L<RT::CustomFields> object containing all global and
-queue-specific B<ticket> custom fields.
-
-=cut
-
-sub TicketCustomFields {
- my $self = shift;
-
- my $cfs = RT::CustomFields->new( $self->CurrentUser );
- if ( $self->CurrentUserHasRight('SeeQueue') ) {
- $cfs->SetContextObject( $self );
- $cfs->LimitToGlobalOrObjectId( $self->Id );
- $cfs->LimitToLookupType( 'RT::Queue-RT::Ticket' );
- $cfs->ApplySortOrder;
- }
- return ($cfs);
-}
-
-# }}}
-
-# {{{ TicketTransactionCustomFields
-
-=head2 TicketTransactionCustomFields
-
-Returns an L<RT::CustomFields> object containing all global and
-queue-specific B<transaction> custom fields.
-
-=cut
-
-sub TicketTransactionCustomFields {
- my $self = shift;
-
- my $cfs = RT::CustomFields->new( $self->CurrentUser );
- if ( $self->CurrentUserHasRight('SeeQueue') ) {
- $cfs->LimitToGlobalOrObjectId( $self->Id );
- $cfs->LimitToLookupType( 'RT::Queue-RT::Ticket-RT::Transaction' );
- $cfs->ApplySortOrder;
- }
- return ($cfs);
-}
-
-# }}}
-
-# }}}
-
-
-# {{{ Routines dealing with watchers.
-
-# {{{ _CreateQueueGroups
-
-=head2 _CreateQueueGroups
-
-Create the ticket groups and links for this ticket.
-This routine expects to be called from Ticket->Create _inside of a transaction_
-
-It will create four groups for this ticket: Requestor, Cc, AdminCc and Owner.
-
-It will return true on success and undef on failure.
-
-
-=cut
-
-
-sub _CreateQueueGroups {
- my $self = shift;
-
- my @types = qw(Cc AdminCc Requestor Owner);
-
- foreach my $type (@types) {
- my $type_obj = RT::Group->new($self->CurrentUser);
- my ($id, $msg) = $type_obj->CreateRoleGroup(Instance => $self->Id,
- Type => $type,
- Domain => 'RT::Queue-Role');
- unless ($id) {
- $RT::Logger->error("Couldn't create a Queue group of type '$type' for ticket ".
- $self->Id.": ".$msg);
- return(undef);
- }
- }
- return(1);
-
-}
-
-
-# }}}
-
-# {{{ sub AddWatcher
-
-=head2 AddWatcher
-
-AddWatcher takes a parameter hash. The keys are as follows:
-
-Type One of Requestor, Cc, AdminCc
-
-PrinicpalId The RT::Principal id of the user or group that's being added as a watcher
-Email The email address of the new watcher. If a user with this
- email address can't be found, a new nonprivileged user will be created.
-
-If the watcher you\'re trying to set has an RT account, set the Owner parameter to their User Id. Otherwise, set the Email parameter to their Email address.
-
-Returns a tuple of (status/id, message).
-
-=cut
-
-sub AddWatcher {
- my $self = shift;
- my %args = (
- Type => undef,
- PrincipalId => undef,
- Email => undef,
- @_
- );
-
- return ( 0, "No principal specified" )
- unless $args{'Email'} or $args{'PrincipalId'};
-
- if ( !$args{'PrincipalId'} && $args{'Email'} ) {
- my $user = RT::User->new( $self->CurrentUser );
- $user->LoadByEmail( $args{'Email'} );
- $args{'PrincipalId'} = $user->PrincipalId if $user->id;
- }
-
- # {{{ Check ACLS
- return ( $self->_AddWatcher(%args) )
- if $self->CurrentUserHasRight('ModifyQueueWatchers');
-
- #If the watcher we're trying to add is for the current user
- if ( defined $args{'PrincipalId'} && $self->CurrentUser->PrincipalId eq $args{'PrincipalId'}) {
- # If it's an AdminCc and they don't have
- # 'WatchAsAdminCc' or 'ModifyTicket', bail
- if ( defined $args{'Type'} && ($args{'Type'} eq 'AdminCc') ) {
- return ( $self->_AddWatcher(%args) )
- if $self->CurrentUserHasRight('WatchAsAdminCc');
- }
-
- # If it's a Requestor or Cc and they don't have
- # 'Watch' or 'ModifyTicket', bail
- elsif ( $args{'Type'} eq 'Cc' or $args{'Type'} eq 'Requestor' ) {
- return ( $self->_AddWatcher(%args) )
- if $self->CurrentUserHasRight('Watch');
- }
- else {
- $RT::Logger->warning( "$self -> AddWatcher got passed a bogus type");
- return ( 0, $self->loc('Error in parameters to Queue->AddWatcher') );
- }
- }
-
- return ( 0, $self->loc("Permission Denied") );
-}
-
-#This contains the meat of AddWatcher. but can be called from a routine like
-# Create, which doesn't need the additional acl check
-sub _AddWatcher {
- my $self = shift;
- my %args = (
- Type => undef,
- Silent => undef,
- PrincipalId => undef,
- Email => undef,
- @_
- );
-
-
- my $principal = RT::Principal->new( $self->CurrentUser );
- if ( $args{'PrincipalId'} ) {
- $principal->Load( $args{'PrincipalId'} );
- if ( $principal->id and $principal->IsUser and my $email = $principal->Object->EmailAddress ) {
- return (0, $self->loc("[_1] is an address RT receives mail at. Adding it as a '[_2]' would create a mail loop", $email, $self->loc($args{'Type'})))
- if RT::EmailParser->IsRTAddress( $email );
- }
- }
- elsif ( $args{'Email'} ) {
- if ( RT::EmailParser->IsRTAddress( $args{'Email'} ) ) {
- return (0, $self->loc("[_1] is an address RT receives mail at. Adding it as a '[_2]' would create a mail loop", $args{'Email'}, $self->loc($args{'Type'})));
- }
- my $user = RT::User->new($self->CurrentUser);
- $user->LoadByEmail( $args{'Email'} );
- $user->Load( $args{'Email'} )
- unless $user->id;
-
- if ( $user->Id ) { # If the user exists
- $principal->Load( $user->PrincipalId );
- } else {
- # if the user doesn't exist, we need to create a new user
- my $new_user = RT::User->new($RT::SystemUser);
-
- my ( $Address, $Name ) =
- RT::Interface::Email::ParseAddressFromHeader($args{'Email'});
-
- my ( $Val, $Message ) = $new_user->Create(
- Name => $Address,
- EmailAddress => $Address,
- RealName => $Name,
- Privileged => 0,
- Comments => 'Autocreated when added as a watcher'
- );
- unless ($Val) {
- $RT::Logger->error("Failed to create user ".$args{'Email'} .": " .$Message);
- # Deal with the race condition of two account creations at once
- $new_user->LoadByEmail( $args{'Email'} );
- }
- $principal->Load( $new_user->PrincipalId );
- }
- }
- # If we can't find this watcher, we need to bail.
- unless ( $principal->Id ) {
- return(0, $self->loc("Could not find or create that user"));
- }
-
- my $group = RT::Group->new($self->CurrentUser);
- $group->LoadQueueRoleGroup(Type => $args{'Type'}, Queue => $self->Id);
- unless ($group->id) {
- return(0,$self->loc("Group not found"));
- }
-
- if ( $group->HasMember( $principal)) {
-
- return ( 0, $self->loc('That principal is already a [_1] for this queue', $args{'Type'}) );
- }
-
-
- my ($m_id, $m_msg) = $group->_AddMember(PrincipalId => $principal->Id);
- unless ($m_id) {
- $RT::Logger->error("Failed to add ".$principal->Id." as a member of group ".$group->Id.": ".$m_msg);
-
- return ( 0, $self->loc('Could not make that principal a [_1] for this queue', $args{'Type'}) );
- }
- return ( 1, $self->loc('Added principal as a [_1] for this queue', $args{'Type'}) );
-}
-
-# }}}
-
-# {{{ sub DeleteWatcher
-
-=head2 DeleteWatcher { Type => TYPE, PrincipalId => PRINCIPAL_ID, Email => EMAIL_ADDRESS }
-
-
-Deletes a queue watcher. Takes two arguments:
-
-Type (one of Requestor,Cc,AdminCc)
-
-and one of
-
-PrincipalId (an RT::Principal Id of the watcher you want to remove)
- OR
-Email (the email address of an existing wathcer)
-
-
-=cut
-
-
-sub DeleteWatcher {
- my $self = shift;
-
- my %args = ( Type => undef,
- PrincipalId => undef,
- Email => undef,
- @_ );
-
- unless ( $args{'PrincipalId'} || $args{'Email'} ) {
- return ( 0, $self->loc("No principal specified") );
- }
-
- if ( !$args{PrincipalId} and $args{Email} ) {
- my $user = RT::User->new( $self->CurrentUser );
- my ($rv, $msg) = $user->LoadByEmail( $args{Email} );
- $args{PrincipalId} = $user->PrincipalId if $rv;
- }
-
- my $principal = RT::Principal->new( $self->CurrentUser );
- if ( $args{'PrincipalId'} ) {
- $principal->Load( $args{'PrincipalId'} );
- }
- else {
- my $user = RT::User->new( $self->CurrentUser );
- $user->LoadByEmail( $args{'Email'} );
- $principal->Load( $user->Id );
- }
-
- # If we can't find this watcher, we need to bail.
- unless ( $principal->Id ) {
- return ( 0, $self->loc("Could not find that principal") );
- }
-
- my $group = RT::Group->new($self->CurrentUser);
- $group->LoadQueueRoleGroup(Type => $args{'Type'}, Queue => $self->Id);
- unless ($group->id) {
- return(0,$self->loc("Group not found"));
- }
-
- my $can_modify_queue = $self->CurrentUserHasRight('ModifyQueueWatchers');
-
- # {{{ Check ACLS
- #If the watcher we're trying to add is for the current user
- if ( defined $args{'PrincipalId'} and $self->CurrentUser->PrincipalId eq $args{'PrincipalId'}) {
- # If it's an AdminCc and they don't have
- # 'WatchAsAdminCc' or 'ModifyQueue', bail
- if ( $args{'Type'} eq 'AdminCc' ) {
- unless ( $can_modify_queue
- or $self->CurrentUserHasRight('WatchAsAdminCc') ) {
- return ( 0, $self->loc('Permission Denied'))
- }
- }
-
- # If it's a Requestor or Cc and they don't have
- # 'Watch' or 'ModifyQueue', bail
- elsif ( ( $args{'Type'} eq 'Cc' ) or ( $args{'Type'} eq 'Requestor' ) ) {
- unless ( $can_modify_queue
- or $self->CurrentUserHasRight('Watch') ) {
- return ( 0, $self->loc('Permission Denied'))
- }
- }
- else {
- $RT::Logger->warning( "$self -> DeleteWatcher got passed a bogus type");
- return ( 0, $self->loc('Error in parameters to Queue->DeleteWatcher') );
- }
- }
-
- # If the watcher isn't the current user
- # and the current user doesn't have 'ModifyQueueWathcers' bail
- else {
- unless ( $can_modify_queue ) {
- return ( 0, $self->loc("Permission Denied") );
- }
- }
-
- # }}}
-
-
- # see if this user is already a watcher.
-
- unless ( $group->HasMember($principal)) {
- return ( 0,
- $self->loc('That principal is not a [_1] for this queue', $args{'Type'}) );
- }
-
- my ($m_id, $m_msg) = $group->_DeleteMember($principal->Id);
- unless ($m_id) {
- $RT::Logger->error("Failed to delete ".$principal->Id.
- " as a member of group ".$group->Id.": ".$m_msg);
-
- return ( 0, $self->loc('Could not remove that principal as a [_1] for this queue', $args{'Type'}) );
- }
-
- return ( 1, $self->loc("[_1] is no longer a [_2] for this queue.", $principal->Object->Name, $args{'Type'} ));
-}
-
-# }}}
-
-# {{{ AdminCcAddresses
-
-=head2 AdminCcAddresses
-
-returns String: All queue AdminCc email addresses as a string
-
-=cut
-
-sub AdminCcAddresses {
- my $self = shift;
-
- unless ( $self->CurrentUserHasRight('SeeQueue') ) {
- return undef;
- }
-
- return ( $self->AdminCc->MemberEmailAddressesAsString )
-
-}
-
-# }}}
-
-# {{{ CcAddresses
-
-=head2 CcAddresses
-
-returns String: All queue Ccs as a string of email addresses
-
-=cut
-
-sub CcAddresses {
- my $self = shift;
-
- unless ( $self->CurrentUserHasRight('SeeQueue') ) {
- return undef;
- }
-
- return ( $self->Cc->MemberEmailAddressesAsString);
-
-}
-# }}}
-
-
-# {{{ sub Cc
-
-=head2 Cc
-
-Takes nothing.
-Returns an RT::Group object which contains this Queue's Ccs.
-If the user doesn't have "ShowQueue" permission, returns an empty group
-
-=cut
-
-sub Cc {
- my $self = shift;
-
- my $group = RT::Group->new($self->CurrentUser);
- if ( $self->CurrentUserHasRight('SeeQueue') ) {
- $group->LoadQueueRoleGroup(Type => 'Cc', Queue => $self->Id);
- }
- return ($group);
-
-}
-
-# }}}
-
-# {{{ sub AdminCc
-
-=head2 AdminCc
-
-Takes nothing.
-Returns an RT::Group object which contains this Queue's AdminCcs.
-If the user doesn't have "ShowQueue" permission, returns an empty group
-
-=cut
-
-sub AdminCc {
- my $self = shift;
-
- my $group = RT::Group->new($self->CurrentUser);
- if ( $self->CurrentUserHasRight('SeeQueue') ) {
- $group->LoadQueueRoleGroup(Type => 'AdminCc', Queue => $self->Id);
- }
- return ($group);
-
-}
-
-# }}}
-
-# {{{ IsWatcher, IsCc, IsAdminCc
-
-# {{{ sub IsWatcher
-# a generic routine to be called by IsRequestor, IsCc and IsAdminCc
-
-=head2 IsWatcher { Type => TYPE, PrincipalId => PRINCIPAL_ID }
-
-Takes a param hash with the attributes Type and PrincipalId
-
-Type is one of Requestor, Cc, AdminCc and Owner
-
-PrincipalId is an RT::Principal id
-
-Returns true if that principal is a member of the group Type for this queue
-
-
-=cut
-
-sub IsWatcher {
- my $self = shift;
-
- my %args = ( Type => 'Cc',
- PrincipalId => undef,
- @_
- );
-
- # Load the relevant group.
- my $group = RT::Group->new($self->CurrentUser);
- $group->LoadQueueRoleGroup(Type => $args{'Type'}, Queue => $self->id);
- # Ask if it has the member in question
-
- my $principal = RT::Principal->new($self->CurrentUser);
- $principal->Load($args{'PrincipalId'});
- unless ($principal->Id) {
- return (undef);
- }
-
- return ($group->HasMemberRecursively($principal));
-}
-
-# }}}
-
-
-# {{{ sub IsCc
-
-=head2 IsCc PRINCIPAL_ID
-
-Takes an RT::Principal id.
-Returns true if the principal is a requestor of the current queue.
-
-
-=cut
-
-sub IsCc {
- my $self = shift;
- my $cc = shift;
-
- return ( $self->IsWatcher( Type => 'Cc', PrincipalId => $cc ) );
-
-}
-
-# }}}
-
-# {{{ sub IsAdminCc
-
-=head2 IsAdminCc PRINCIPAL_ID
-
-Takes an RT::Principal id.
-Returns true if the principal is a requestor of the current queue.
-
-=cut
-
-sub IsAdminCc {
- my $self = shift;
- my $person = shift;
-
- return ( $self->IsWatcher( Type => 'AdminCc', PrincipalId => $person ) );
-
-}
-
-# }}}
-
-
-# }}}
-
-
-
-
-
-# }}}
-
-# {{{ ACCESS CONTROL
-
-# {{{ sub _Set
-sub _Set {
- my $self = shift;
-
- unless ( $self->CurrentUserHasRight('AdminQueue') ) {
- return ( 0, $self->loc('Permission Denied') );
- }
- return ( $self->SUPER::_Set(@_) );
-}
-
-# }}}
-
-# {{{ sub _Value
-
-sub _Value {
- my $self = shift;
-
- unless ( $self->CurrentUserHasRight('SeeQueue') ) {
- return (undef);
- }
-
- return ( $self->__Value(@_) );
-}
-
-# }}}
-
-# {{{ sub CurrentUserHasRight
-
-=head2 CurrentUserHasRight
-
-Takes one argument. A textual string with the name of the right we want to check.
-Returns true if the current user has that right for this queue.
-Returns undef otherwise.
-
-=cut
-
-sub CurrentUserHasRight {
- my $self = shift;
- my $right = shift;
-
- return (
- $self->HasRight(
- Principal => $self->CurrentUser,
- Right => "$right"
- )
- );
-
-}
-
-# }}}
-
-# {{{ sub HasRight
-
-=head2 HasRight
-
-Takes a param hash with the fields 'Right' and 'Principal'.
-Principal defaults to the current user.
-Returns true if the principal has that right for this queue.
-Returns undef otherwise.
-
-=cut
-
-# TAKES: Right and optional "Principal" which defaults to the current user
-sub HasRight {
- my $self = shift;
- my %args = (
- Right => undef,
- Principal => $self->CurrentUser,
- @_
- );
- my $principal = delete $args{'Principal'};
- unless ( $principal ) {
- $RT::Logger->error("Principal undefined in Queue::HasRight");
- return undef;
- }
-
- return $principal->HasRight(
- %args,
- Object => ($self->Id ? $self : $RT::System),
- );
-}
-
-# }}}
-
-# }}}
-
-1;