static int checkErrors(ini_sContext* cp) { if (cp->warnings == 0 && cp->errors == 0 && cp->fatals == 0) return 1; if (cp->fatals > 0) { errh_LogFatal(&cp->log, "Found %d warning(s), %d error(s) and %d fatal error(s)", cp->warnings, cp->errors, cp->fatals); if (cp->flags.b.ignoreFatal) { errh_LogInfo(&cp->log, "Ignoring fatal errors, errors and warnings, continued..."); return 1; } else { return ask_yes_no("Do you want to continue"); } } if (cp->errors > 0) { errh_LogError(&cp->log, "Found %d warning(s), %d error(s) and %d fatal error(s)", cp->warnings, cp->errors, cp->fatals); if (cp->flags.b.ignoreError) { errh_LogInfo(&cp->log, "Ignoring errors and warnings, continued..."); return 1; } else { return ask_yes_no("Do you want to continue"); } } if (cp->warnings > 0) { errh_LogWarning(&cp->log, "Found %d warning(s), %d error(s) and %d fatal error(s)", cp->warnings, cp->errors, cp->fatals); if (cp->flags.b.ignoreWarning) { errh_LogInfo(&cp->log, "Ignoring warnings, continued..."); return 1; } else { return ask_yes_no("Do you want to continue"); } } return 1; }
int cmd_logout(int argc, char **argv) { static struct option long_options[] = { {"force", no_argument, NULL, 'f'}, {0, 0, 0, 0} }; int option; int option_index; bool force = false; struct session *session = NULL; unsigned char key[KDF_HASH_LEN]; while ((option = getopt_long(argc, argv, "f", long_options, &option_index)) != -1) { switch (option) { case 'f': force = true; break; case '?': default: die_usage(cmd_logout_usage); } } if (optind < argc) die_usage(cmd_logout_usage); if (!config_exists("verify")) die("Not currently logged in."); if (!force && !ask_yes_no(true, "Are you sure you would like to log out?")) { terminal_printf(TERMINAL_FG_YELLOW TERMINAL_BOLD "Log out" TERMINAL_RESET ": aborted.\n"); return 1; } init_all(0, key, &session, NULL); if (!config_unlink("verify") || !config_unlink("username") || !config_unlink("session_sessionid") || !config_unlink("iterations")) die_errno("could not log out."); config_unlink("blob"); config_unlink("session_token"); config_unlink("session_uid"); config_unlink("session_privatekey"); config_unlink("plaintext_key"); agent_kill(); upload_queue_kill(); lastpass_logout(session); terminal_printf(TERMINAL_FG_YELLOW TERMINAL_BOLD "Log out" TERMINAL_RESET ": complete.\n"); return 0; }
bool ask_yes_no(){ char *confirm = calloc(1, sizeof(char)); scanf("%s", confirm); if (*confirm == 'y' || *confirm == 'Y'){ free(confirm); return true; } if (*confirm == 'n' || *confirm == 'N'){ free(confirm); return false; } else{ puts("Not a valid answer, try again"); free(confirm); clear_stdin(); ask_yes_no(); } return true; }
int main(int argc, char **argv) { abrt_init(argv); enum { OPT_v = 1 << 0, OPT_d = 1 << 1, OPT_g = 1 << 2, OPT_b = 1 << 3, OPT_u = 1 << 4, OPT_r = 1 << 5, }; const char *bugs = NULL, *release = NULL, *dump_dir_path = "."; /* Keep enum above and order of options below in sync! */ struct options program_options[] = { OPT__VERBOSE(&g_verbose), OPT__DUMP_DIR(&dump_dir_path), OPT_GROUP(""), OPT_STRING('b', "bugs", &bugs, "ID1[,ID2,...]" , _("List of bug ids")), OPT_STRING('u', "url", &bodhi_url, "URL", _("Specify a bodhi server url")), OPT_OPTSTRING('r', "release", &release, "RELEASE", _("Specify a release")), OPT_END() }; const char *program_usage_string = _( "& [-v] [-r[RELEASE]] (-b ID1[,ID2,...] | PKG-NAME) [PKG-NAME]... \n" "\n" "Search for updates on bodhi server" ); unsigned opts = parse_opts(argc, argv, program_options, program_usage_string); if (!bugs && !argv[optind]) show_usage_and_die(program_usage_string, program_options); struct strbuf *query = strbuf_new(); if (bugs) query = strbuf_append_strf(query, "bugs=%s&", bugs); if (opts & OPT_r) { if (release) { query = strbuf_append_strf(query, "release=%s&", release); } else { struct dump_dir *dd = dd_opendir(dump_dir_path, DD_OPEN_READONLY); if (!dd) xfunc_die(); problem_data_t *problem_data = create_problem_data_from_dump_dir(dd); dd_close(dd); if (!problem_data) xfunc_die(); /* create_problem_data_for_reporting already emitted error msg */ char *product, *version; map_string_t *osinfo = new_map_string(); problem_data_get_osinfo(problem_data, osinfo); parse_osinfo_for_rhts(osinfo, &product, &version); query = strbuf_append_strf(query, "release=f%s&", version); free(product); free(version); free_map_string(osinfo); } } if (argv[optind]) { char *escaped = g_uri_escape_string(argv[optind], NULL, 0); query = strbuf_append_strf(query, "package=%s&", escaped); free(escaped); } if (query->buf[query->len - 1] == '&') query->buf[query->len - 1] = '\0'; log(_("Searching for updates")); GHashTable *update_hash_tbl = bodhi_query_list(query->buf, release); strbuf_free(query); if (!update_hash_tbl || !g_hash_table_size(update_hash_tbl)) { log(_("No updates for this package found")); /*if (update_hash_tbl) g_hash_table_unref(update_hash_tbl);*/ return 0; } GHashTableIter iter; char *name; struct bodhi *b; struct strbuf *q = strbuf_new(); g_hash_table_iter_init(&iter, update_hash_tbl); while (g_hash_table_iter_next(&iter, (void **) &name, (void **) &b)) { char *installed_pkg_nvr = rpm_get_nvr_by_pkg_name(name); if (installed_pkg_nvr && rpmvercmp(installed_pkg_nvr, b->nvr) >= 0) { log_info("Update %s is older or same as local version %s, skipping", b->nvr, installed_pkg_nvr); free(installed_pkg_nvr); continue; } free(installed_pkg_nvr); strbuf_append_strf(q, " %s", b->nvr); } /*g_hash_table_unref(update_hash_tbl);*/ if (!q->len) { /*strbuf_free(q);*/ log(_("Local version of the package is newer than available updates")); return 0; } /* Message is split into text and command in order to make * translator's job easier */ /* We suggest the command which is most likely to exist on user's system, * and which is familiar to the largest population of users. * There are other tools (pkcon et al) which might be somewhat more * convenient (for example, they might be usable from non-root), but they * might be not present on the system, may evolve or be superseded, * while yum is unlikely to do so. */ strbuf_prepend_str(q, "yum update --enablerepo=fedora --enablerepo=updates-testing"); char *msg = xasprintf(_("An update exists which might fix your problem. " "You can install it by running: %s. " "Do you want to continue with reporting the bug?"), q->buf ); /*strbuf_free(q);*/ return !ask_yes_no(msg); }
int cmd_login(int argc, char **argv) { static struct option long_options[] = { {"trust", no_argument, NULL, 't'}, {"plaintext-key", no_argument, NULL, 'P'}, {"force", no_argument, NULL, 'f'}, {"color", required_argument, NULL, 'C'}, {0, 0, 0, 0} }; int option; int option_index; bool trust = false; bool plaintext_key = false; bool force = false; char *username; _cleanup_free_ char *error = NULL; _cleanup_free_ char *password = NULL; int iterations; struct session *session; unsigned char key[KDF_HASH_LEN]; char hex[KDF_HEX_LEN]; while ((option = getopt_long(argc, argv, "f", long_options, &option_index)) != -1) { switch (option) { case 't': trust = true; break; case 'P': plaintext_key = true; break; case 'f': force = true; break; case 'C': terminal_set_color_mode( parse_color_mode_string(optarg)); break; case '?': default: die_usage(cmd_login_usage); } } if (argc - optind != 1) die_usage(cmd_login_usage); if (!force && plaintext_key && !ask_yes_no(false, "You have used the --plaintext-key option. This option will greatly reduce the security of your passwords. You are advised, instead, to use the agent, whose timeout can be disabled by settting LPASS_AGENT_TIMEOUT=0. Are you sure you would like to do this?")) die("Login aborted. Try again without --plaintext-key."); username = argv[optind]; iterations = lastpass_iterations(username); if (!iterations) die("Unable to fetch iteration count. Check your internet connection and be sure your username is valid."); do { free(password); password = password_prompt("Master Password", error, "Please enter the LastPass master password for <%s>.", username); if (!password) die("Failed to enter correct password."); kdf_login_key(username, password, iterations, hex); kdf_decryption_key(username, password, iterations, key); free(error); error = NULL; session = lastpass_login(username, hex, key, iterations, &error, trust); } while (!session_is_valid(session)); config_unlink("plaintext_key"); if (plaintext_key) config_write_buffer("plaintext_key", (char *)key, KDF_HASH_LEN); agent_save(username, iterations, key); session_save(session, key); session_free(session); session = NULL; terminal_printf(TERMINAL_FG_GREEN TERMINAL_BOLD "Success" TERMINAL_RESET ": Logged in as " TERMINAL_UNDERLINE "%s" TERMINAL_RESET ".\n", username); return 0; }
int main(int argc, char **argv) { abrt_init(argv); /* I18n */ setlocale(LC_ALL, ""); #if ENABLE_NLS bindtextdomain(PACKAGE, LOCALEDIR); textdomain(PACKAGE); #endif /* Can't keep these strings/structs static: _() doesn't support that */ const char *program_usage_string = _( "\n& [-vbf] [-g GROUP-NAME]... [-c CONFFILE]... [-F FMTFILE] [-A FMTFILE2] -d DIR" "\nor:" "\n& [-v] [-c CONFFILE]... [-d DIR] -t[ID] FILE..." "\nor:" "\n& [-v] [-c CONFFILE]... [-d DIR] -t[ID] -w" "\nor:" "\n& [-v] [-c CONFFILE]... -h DUPHASH" "\n" "\nReports problem to Bugzilla." "\n" "\nThe tool reads DIR. Then it logs in to Bugzilla and tries to find a bug" "\nwith the same abrt_hash:HEXSTRING in 'Whiteboard'." "\n" "\nIf such bug is not found, then a new bug is created. Elements of DIR" "\nare stored in the bug as part of bug description or as attachments," "\ndepending on their type and size." "\n" "\nOtherwise, if such bug is found and it is marked as CLOSED DUPLICATE," "\nthe tool follows the chain of duplicates until it finds a non-DUPLICATE bug." "\nThe tool adds a new comment to found bug." "\n" "\nThe URL to new or modified bug is printed to stdout and recorded in" "\n'reported_to' element." "\n" "\nOption -t uploads FILEs to the already created bug on Bugzilla site." "\nThe bug ID is retrieved from directory specified by -d DIR." "\nIf problem data in DIR was never reported to Bugzilla, upload will fail." "\n" "\nOption -tID uploads FILEs to the bug with specified ID on Bugzilla site." "\n-d DIR is ignored." "\n" "\nOption -w adds bugzilla user to bug's CC list." "\n" "\nIf not specified, CONFFILE defaults to "CONF_DIR"/plugins/bugzilla.conf" "\nIts lines should have 'PARAM = VALUE' format." "\nRecognized string parameters: BugzillaURL, Login, Password, OSRelease." "\nRecognized boolean parameter (VALUE should be 1/0, yes/no): SSLVerify." "\nParameters can be overridden via $Bugzilla_PARAM environment variables." "\n" "\nFMTFILE and FMTFILE2 default to "CONF_DIR"/plugins/bugzilla_format.conf" ); enum { OPT_v = 1 << 0, OPT_d = 1 << 1, OPT_c = 1 << 2, OPT_F = 1 << 3, OPT_A = 1 << 4, OPT_t = 1 << 5, OPT_b = 1 << 6, OPT_f = 1 << 7, OPT_w = 1 << 8, OPT_h = 1 << 9, OPT_g = 1 << 10, OPT_D = 1 << 11, }; const char *dump_dir_name = "."; GList *conf_file = NULL; const char *fmt_file = CONF_DIR"/plugins/bugzilla_format.conf"; const char *fmt_file2 = fmt_file; char *abrt_hash = NULL; char *ticket_no = NULL; char *debug_str = NULL; GList *group = NULL; /* Keep enum above and order of options below in sync! */ struct options program_options[] = { OPT__VERBOSE(&g_verbose), OPT_STRING( 'd', NULL, &dump_dir_name , "DIR" , _("Problem directory")), OPT_LIST( 'c', NULL, &conf_file , "FILE" , _("Configuration file (may be given many times)")), OPT_STRING( 'F', NULL, &fmt_file , "FILE" , _("Formatting file for initial comment")), OPT_STRING( 'A', NULL, &fmt_file2 , "FILE" , _("Formatting file for duplicates")), OPT_OPTSTRING('t', "ticket", &ticket_no , "ID" , _("Attach FILEs [to bug with this ID]")), OPT_BOOL( 'b', NULL, NULL, _("When creating bug, attach binary files too")), OPT_BOOL( 'f', NULL, NULL, _("Force reporting even if this problem is already reported")), OPT_BOOL( 'w', NULL, NULL, _("Add bugzilla user to CC list [of bug with this ID]")), OPT_STRING( 'h', "duphash", &abrt_hash, "DUPHASH", _("Print BUG_ID which has given DUPHASH")), OPT_LIST( 'g', "group", &group , "GROUP" , _("Restrict access to this group only")), OPT_OPTSTRING('D', "debug", &debug_str , "STR" , _("Debug")), OPT_END() }; unsigned opts = parse_opts(argc, argv, program_options, program_usage_string); argv += optind; export_abrt_envvars(0); map_string_t *settings = new_map_string(); struct bugzilla_struct rhbz = { 0 }; { if (!conf_file) conf_file = g_list_append(conf_file, (char*) CONF_DIR"/plugins/bugzilla.conf"); while (conf_file) { char *fn = (char *)conf_file->data; VERB1 log("Loading settings from '%s'", fn); load_conf_file(fn, settings, /*skip key w/o values:*/ false); VERB3 log("Loaded '%s'", fn); conf_file = g_list_delete_link(conf_file, conf_file); } set_settings(&rhbz, settings); /* WRONG! set_settings() does not copy the strings, it merely sets up pointers * to settings[] dictionary: */ /*free_map_string(settings);*/ } VERB1 log("Initializing XML-RPC library"); xmlrpc_env env; xmlrpc_env_init(&env); xmlrpc_client_setup_global_const(&env); if (env.fault_occurred) abrt_xmlrpc_die(&env); xmlrpc_env_clean(&env); struct abrt_xmlrpc *client; client = abrt_xmlrpc_new_client(rhbz.b_bugzilla_xmlrpc, rhbz.b_ssl_verify); unsigned rhbz_ver = rhbz_version(client); if (abrt_hash) { log(_("Looking for similar problems in bugzilla")); char *hash; if (prefixcmp(abrt_hash, "abrt_hash:")) hash = xasprintf("abrt_hash:%s", abrt_hash); else hash = xstrdup(abrt_hash); /* it's Fedora specific */ xmlrpc_value *all_bugs = rhbz_search_duphash(client, /*product:*/ "Fedora", /*version:*/ NULL, /*component:*/ NULL, hash); free(hash); unsigned all_bugs_size = rhbz_array_size(all_bugs); if (all_bugs_size > 0) { int bug_id = rhbz_get_bug_id_from_array0(all_bugs, rhbz_ver); printf("%i\n", bug_id); } return EXIT_SUCCESS; } if (rhbz.b_login[0] == '\0') { free(rhbz.b_login); rhbz.b_login = ask_bz_login(_("Login is not provided by configuration. Please enter your BZ login:"******"Password is not provided by configuration. Please enter the password for '%s':"), rhbz.b_login); rhbz.b_password = ask_bz_password(question); free(question); } if (opts & OPT_t) { if ((!argv[0] && !(opts & OPT_w)) || (argv[0] && (opts & OPT_w))) show_usage_and_die(program_usage_string, program_options); if (!ticket_no) { struct dump_dir *dd = dd_opendir(dump_dir_name, /*flags:*/ 0); if (!dd) xfunc_die(); report_result_t *reported_to = find_in_reported_to(dd, "Bugzilla:"); dd_close(dd); if (!reported_to || !reported_to->url) error_msg_and_die(_("Can't get Bugzilla ID because this problem has not yet been reported to Bugzilla.")); char *url = reported_to->url; reported_to->url = NULL; free_report_result(reported_to); if (prefixcmp(url, rhbz.b_bugzilla_url) != 0) error_msg_and_die(_("This problem has been reported to Bugzilla '%s' which differs from the configured Bugzilla '%s'."), url, rhbz.b_bugzilla_url); ticket_no = strrchr(url, '='); if (!ticket_no) error_msg_and_die(_("Malformed url to Bugzilla '%s'."), url); /* won't ever call free on it - it simplifies the code a lot */ ticket_no = xstrdup(ticket_no + 1); log(_("Using Bugzilla ID '%s'"), ticket_no); } login(client, &rhbz); if (opts & OPT_w) rhbz_mail_to_cc(client, xatoi_positive(ticket_no), rhbz.b_login, /* require mail notify */ 0); else { /* Attach files to existing BZ */ while (*argv) { const char *filename = *argv++; VERB1 log("Attaching file '%s' to bug %s", filename, ticket_no); int fd = open(filename, O_RDONLY); if (fd < 0) { perror_msg("Can't open '%s'", filename); continue; } struct stat st; if (fstat(fd, &st) != 0 || !S_ISREG(st.st_mode)) { error_msg("'%s': not a regular file", filename); close(fd); continue; } rhbz_attach_fd(client, ticket_no, filename, fd, /*flags*/ 0); close(fd); } } log(_("Logging out")); rhbz_logout(client); #if 0 /* enable if you search for leaks (valgrind etc) */ abrt_xmlrpc_free_client(client); #endif return 0; } /* Create new bug in Bugzilla */ if (!(opts & OPT_f)) { struct dump_dir *dd = dd_opendir(dump_dir_name, /*flags:*/ 0); if (!dd) xfunc_die(); report_result_t *reported_to = find_in_reported_to(dd, "Bugzilla:"); dd_close(dd); if (reported_to && reported_to->url) { char *msg = xasprintf("This problem was already reported to Bugzilla (see '%s')." " Do you still want to create a new bug?", reported_to->url); int yes = ask_yes_no(msg); free(msg); if (!yes) return 0; } free_report_result(reported_to); } problem_data_t *problem_data = create_problem_data_for_reporting(dump_dir_name); if (!problem_data) xfunc_die(); /* create_problem_data_for_reporting already emitted error msg */ const char *component = problem_data_get_content_or_die(problem_data, FILENAME_COMPONENT); const char *duphash = problem_data_get_content_or_NULL(problem_data, FILENAME_DUPHASH); //COMPAT, remove after 2.1 release if (!duphash) duphash = problem_data_get_content_or_die(problem_data, "global_uuid"); if (!rhbz.b_product || !*rhbz.b_product) /* if not overridden or empty... */ { free(rhbz.b_product); free(rhbz.b_product_version); map_string_t *osinfo = new_map_string(); problem_data_get_osinfo(problem_data, osinfo); parse_osinfo_for_bz(osinfo, &rhbz.b_product, &rhbz.b_product_version); free_map_string(osinfo); if (!rhbz.b_product) error_msg_and_die(_("Can't determine Bugzilla Product from problem data.")); } if (opts & OPT_D) { GList *comment_fmt_spec = load_bzrep_conf_file(fmt_file); struct strbuf *bzcomment_buf = strbuf_new(); generate_bz_comment(bzcomment_buf, problem_data, comment_fmt_spec); char *bzcomment = strbuf_free_nobuf(bzcomment_buf); char *summary = create_summary_string(problem_data, comment_fmt_spec); printf("summary: %s\n" "\n" "%s" , summary, bzcomment ); free(bzcomment); free(summary); exit(0); } login(client, &rhbz); int bug_id = 0; /* If REMOTE_RESULT contains "DUPLICATE 12345", we consider it a dup of 12345 * and won't search on bz server. */ char *remote_result; remote_result = problem_data_get_content_or_NULL(problem_data, FILENAME_REMOTE_RESULT); if (remote_result) { char *cmd = strtok(remote_result, " \n"); char *id = strtok(NULL, " \n"); if (!prefixcmp(cmd, "DUPLICATE")) { errno = 0; char *e; bug_id = strtoul(id, &e, 10); if (errno || id == e || *e != '\0' || bug_id > INT_MAX) { /* error / no digits / illegal trailing chars / too big a number */ bug_id = 0; } } } struct bug_info *bz = NULL; if (!bug_id) { log(_("Checking for duplicates")); int existing_id = -1; int crossver_id = -1; { /* Figure out whether we want to match component * when doing dup search. */ const char *component_substitute = is_in_comma_separated_list(component, rhbz.b_DontMatchComponents) ? NULL : component; /* We don't do dup detection across versions (see below why), * but we do add a note if cross-version potential dup exists. * For that, we search for cross version dups first: */ xmlrpc_value *crossver_bugs = rhbz_search_duphash(client, rhbz.b_product, /*version:*/ NULL, component_substitute, duphash); unsigned crossver_bugs_count = rhbz_array_size(crossver_bugs); VERB3 log("Bugzilla has %i reports with duphash '%s' including cross-version ones", crossver_bugs_count, duphash); if (crossver_bugs_count > 0) crossver_id = rhbz_get_bug_id_from_array0(crossver_bugs, rhbz_ver); xmlrpc_DECREF(crossver_bugs); if (crossver_bugs_count > 0) { /* In dup detection we require match in product *and version*. * Otherwise we sometimes have bugs in e.g. Fedora 17 * considered to be dups of Fedora 16 bugs. * Imagine that F16 is "end-of-lifed" - allowing cross-version * match will make all newly detected crashes DUPed * to a bug in a dead release. */ xmlrpc_value *dup_bugs = rhbz_search_duphash(client, rhbz.b_product, rhbz.b_product_version, component_substitute, duphash); unsigned dup_bugs_count = rhbz_array_size(dup_bugs); VERB3 log("Bugzilla has %i reports with duphash '%s'", dup_bugs_count, duphash); if (dup_bugs_count > 0) existing_id = rhbz_get_bug_id_from_array0(dup_bugs, rhbz_ver); xmlrpc_DECREF(dup_bugs); } } if (existing_id < 0) { /* Create new bug */ log(_("Creating a new bug")); GList *comment_fmt_spec = load_bzrep_conf_file(fmt_file); struct strbuf *bzcomment_buf = strbuf_new(); generate_bz_comment(bzcomment_buf, problem_data, comment_fmt_spec); if (crossver_id >= 0) strbuf_append_strf(bzcomment_buf, "\nPotential duplicate: bug %u\n", crossver_id); char *bzcomment = strbuf_free_nobuf(bzcomment_buf); char *summary = create_summary_string(problem_data, comment_fmt_spec); int new_id = rhbz_new_bug(client, problem_data, rhbz.b_product, rhbz.b_product_version, summary, bzcomment, group ); free(bzcomment); free(summary); if (new_id == -1) { error_msg_and_die(_("Failed to create a new bug.")); } log(_("Adding attachments to bug %i"), new_id); char new_id_str[sizeof(int)*3 + 2]; sprintf(new_id_str, "%i", new_id); attach_files(client, new_id_str, problem_data, comment_fmt_spec); //TODO: free_comment_fmt_spec(comment_fmt_spec); bz = new_bug_info(); bz->bi_status = xstrdup("NEW"); bz->bi_id = new_id; goto log_out; } bug_id = existing_id; } bz = rhbz_bug_info(client, bug_id); log(_("Bug is already reported: %i"), bz->bi_id); /* Follow duplicates */ if ((strcmp(bz->bi_status, "CLOSED") == 0) && (strcmp(bz->bi_resolution, "DUPLICATE") == 0) ) { struct bug_info *origin; origin = rhbz_find_origin_bug_closed_duplicate(client, bz); if (origin) { free_bug_info(bz); bz = origin; } } if (strcmp(bz->bi_status, "CLOSED") != 0) { /* Add user's login to CC if not there already */ if (strcmp(bz->bi_reporter, rhbz.b_login) != 0 && !g_list_find_custom(bz->bi_cc_list, rhbz.b_login, (GCompareFunc)g_strcmp0) ) { log(_("Adding %s to CC list"), rhbz.b_login); rhbz_mail_to_cc(client, bz->bi_id, rhbz.b_login, RHBZ_NOMAIL_NOTIFY); } /* Add comment and bt */ const char *comment = problem_data_get_content_or_NULL(problem_data, FILENAME_COMMENT); if (comment && comment[0]) { GList *comment_fmt_spec = load_bzrep_conf_file(fmt_file2); struct strbuf *bzcomment_buf = strbuf_new(); generate_bz_comment(bzcomment_buf, problem_data, comment_fmt_spec); char *bzcomment = strbuf_free_nobuf(bzcomment_buf); //TODO: free_comment_fmt_spec(comment_fmt_spec); int dup_comment = is_comment_dup(bz->bi_comments, bzcomment); if (!dup_comment) { log(_("Adding new comment to bug %d"), bz->bi_id); rhbz_add_comment(client, bz->bi_id, bzcomment, 0); free(bzcomment); const char *bt = problem_data_get_content_or_NULL(problem_data, FILENAME_BACKTRACE); unsigned rating = 0; const char *rating_str = problem_data_get_content_or_NULL(problem_data, FILENAME_RATING); /* python doesn't have rating file */ if (rating_str) rating = xatou(rating_str); if (bt && rating > bz->bi_best_bt_rating) { char bug_id_str[sizeof(int)*3 + 2]; sprintf(bug_id_str, "%i", bz->bi_id); log(_("Attaching better backtrace")); rhbz_attach_blob(client, bug_id_str, FILENAME_BACKTRACE, bt, strlen(bt), RHBZ_NOMAIL_NOTIFY); } } else { free(bzcomment); log(_("Found the same comment in the bug history, not adding a new one")); } } } log_out: log(_("Logging out")); rhbz_logout(client); log(_("Status: %s%s%s %s/show_bug.cgi?id=%u"), bz->bi_status, bz->bi_resolution ? " " : "", bz->bi_resolution ? bz->bi_resolution : "", rhbz.b_bugzilla_url, bz->bi_id); struct dump_dir *dd = dd_opendir(dump_dir_name, /*flags:*/ 0); if (dd) { char *msg = xasprintf("Bugzilla: URL=%s/show_bug.cgi?id=%u", rhbz.b_bugzilla_url, bz->bi_id); add_reported_to(dd, msg); free(msg); dd_close(dd); } #if 0 /* enable if you search for leaks (valgrind etc) */ free(rhbz.b_product); free(rhbz.b_product_version); problem_data_free(problem_data); free_bug_info(bz); abrt_xmlrpc_free_client(client); #endif return 0; }
int run_event_stdio_ask_yes_no(const char *msg, void *param) { return ask_yes_no(msg); }
int main(int argc, char **argv) { abrt_init(argv); /* I18n */ setlocale(LC_ALL, ""); #if ENABLE_NLS bindtextdomain(PACKAGE, LOCALEDIR); textdomain(PACKAGE); #endif const char *program_usage_string = _( "\n& [-vf] [-c CONFFILE]... [-F FMTFILE] [-A FMTFILE2] -d DIR" "\nor:" "\n& [-v] [-c CONFFILE]... [-d DIR] -t[ID] FILE..." "\nor:" "\n& [-v] [-c CONFFILE]... [-d DIR] -t[ID] -w" "\nor:" "\n& [-v] [-c CONFFILE]... -h DUPHASH" "\n" "\nReports problem to MantisBT." "\n" "\nThe tool reads DIR. Then it tries to find an issue" "\nwith the same abrt_hash in custom field 'abrt_hash'." "\n" "\nIf such issue is not found, then a new issue is created. Elements of DIR" "\nare stored in the issue as part of issue description or as attachments," "\ndepending on their type and size." "\n" "\nOtherwise, if such issue is found and it is marked as CLOSED DUPLICATE," "\nthe tool follows the chain of duplicates until it finds a non-DUPLICATE issue." "\nThe tool adds a new comment to found issue." "\n" "\nThe URL to new or modified issue is printed to stdout and recorded in" "\n'reported_to' element." "\n" "\nOption -t uploads FILEs to the already created issue on MantisBT site." "\nThe issue ID is retrieved from directory specified by -d DIR." "\nIf problem data in DIR was never reported to MantisBT, upload will fail." "\n" "\nOption -tID uploads FILEs to the issue with specified ID on MantisBT site." "\n-d DIR is ignored." "\n" "\nOption -r sets the last url from reporter_to element which is prefixed with" "\nTRACKER_NAME to URL field. This option is applied only when a new issue is to be" "\nfiled. The default value is 'ABRT Server'" "\n" "\nIf not specified, CONFFILE defaults to "CONF_DIR"/plugins/mantisbt.conf" "\nand user's local ~"USER_HOME_CONFIG_PATH"/mantisbt.conf." "\nIts lines should have 'PARAM = VALUE' format." "\nRecognized string parameters: MantisbtURL, Login, Password, Project, ProjectVersion." "\nRecognized boolean parameter (VALUE should be 1/0, yes/no): SSLVerify, CreatePrivate." "\nUser's local configuration overrides the system wide configuration." "\nParameters can be overridden via $Mantisbt_PARAM environment variables." "\n" "\nFMTFILE default to "CONF_DIR"/plugins/mantisbt_format.conf." "\nFMTFILE2 default to "CONF_DIR"/plugins/mantisbt_formatdup.conf." ); enum { OPT_v = 1 << 0, OPT_d = 1 << 1, OPT_c = 1 << 2, OPT_F = 1 << 3, OPT_A = 1 << 4, OPT_t = 1 << 5, OPT_f = 1 << 6, OPT_h = 1 << 7, OPT_r = 1 << 8, OPT_D = 1 << 9, }; const char *dump_dir_name = "."; GList *conf_file = NULL; const char *fmt_file = CONF_DIR"/plugins/mantisbt_format.conf"; const char *fmt_file2 = CONF_DIR"/plugins/mantisbt_formatdup.conf"; char *abrt_hash = NULL; char *ticket_no = NULL; const char *tracker_str = "ABRT Server"; char *debug_str = NULL; mantisbt_settings_t mbt_settings = { 0 }; /* Keep enum above and order of options below in sync! */ struct options program_options[] = { OPT__VERBOSE(&g_verbose), OPT_STRING( 'd', NULL, &dump_dir_name , "DIR" , _("Problem directory")), OPT_LIST( 'c', NULL, &conf_file , "FILE" , _("Configuration file (may be given many times)")), OPT_STRING( 'F', NULL, &fmt_file , "FILE" , _("Formatting file for initial comment")), OPT_STRING( 'A', NULL, &fmt_file2 , "FILE" , _("Formatting file for duplicates")), OPT_OPTSTRING('t', "ticket", &ticket_no , "ID" , _("Attach FILEs [to issue with this ID]")), OPT_BOOL( 'f', NULL, NULL, _("Force reporting even if this problem is already reported")), OPT_STRING( 'h', "duphash", &abrt_hash, "DUPHASH", _("Print BUG_ID which has given DUPHASH")), OPT_STRING( 'r', "tracker", &tracker_str, "TRACKER_NAME", _("A name of bug tracker for an additional URL from 'reported_to'")), OPT_OPTSTRING('D', "debug", &debug_str , "STR" , _("Debug")), OPT_END() }; unsigned opts = parse_opts(argc, argv, program_options, program_usage_string); argv += optind; export_abrt_envvars(0); map_string_t *settings = new_map_string(); { char *local_conf = NULL; if (!conf_file) { conf_file = g_list_append(conf_file, (char*) CONF_DIR"/plugins/mantisbt.conf"); local_conf = xasprintf("%s"USER_HOME_CONFIG_PATH"/mantisbt.conf", getenv("HOME")); conf_file = g_list_append(conf_file, local_conf); } while (conf_file) { char *fn = (char *)conf_file->data; log_notice("Loading settings from '%s'", fn); load_conf_file(fn, settings, /*skip key w/o values:*/ false); log_debug("Loaded '%s'", fn); conf_file = g_list_delete_link(conf_file, conf_file); } free(local_conf); struct dump_dir *dd = NULL; if (abrt_hash == NULL) { dd = dd_opendir(dump_dir_name, /*flags:*/ 0); if (!dd) error_msg_and_die(_("Can't open problem dir '%s'."), dump_dir_name); } set_settings(&mbt_settings, settings, dd); dd_close(dd); /* WRONG! set_settings() does not copy the strings, it merely sets up pointers * to settings[] dictionary: */ /*free_map_string(settings);*/ } /* No connection is opened between client and server. Users authentication * is performed on every SOAP method call. In the first step we verify the * credentials by calling 'mc_login' method. In the case the credentials are * correctly applies the reporter uses them in the next requests. It is not * necessary to call 'mc_login' method because the method provides only * verification of credentials. */ verify_credentials(&mbt_settings); if (abrt_hash) { log_warning(_("Looking for similar problems in MantisBT")); GList *ids = mantisbt_search_by_abrt_hash(&mbt_settings, abrt_hash); mantisbt_settings_free(&mbt_settings); if (ids == NULL) return EXIT_FAILURE; puts(ids->data); response_values_free(ids); return EXIT_SUCCESS; } mantisbt_get_project_id_from_name(&mbt_settings); if (opts & OPT_t) { if (!argv[0]) show_usage_and_die(program_usage_string, program_options); if (!ticket_no) { struct dump_dir *dd = dd_opendir(dump_dir_name, /*flags:*/ 0); if (!dd) xfunc_die(); report_result_t *reported_to = find_in_reported_to(dd, "MantisBT"); dd_close(dd); if (!reported_to || !reported_to->url) error_msg_and_die(_("Can't get MantisBT ID because this problem has not yet been reported to MantisBT.")); char *url = reported_to->url; reported_to->url = NULL; free_report_result(reported_to); if (prefixcmp(url, mbt_settings.m_mantisbt_url) != 0) error_msg_and_die(_("This problem has been reported to MantisBT '%s' which differs from the configured MantisBT '%s'."), url, mbt_settings.m_mantisbt_url); ticket_no = strrchr(url, '='); if (!ticket_no) error_msg_and_die(_("Malformed url to MantisBT '%s'."), url); /* won't ever call free on it - it simplifies the code a lot */ ticket_no = xstrdup(ticket_no + 1); log_warning(_("Using MantisBT ID '%s'"), ticket_no); } /* Attach files to existing MantisBT issues */ while (*argv) { const char *path = *argv++; char *filename = basename(path); log_warning(_("Attaching file '%s' to issue %s"), filename, ticket_no); mantisbt_attach_file(&mbt_settings, ticket_no, filename, path); } return 0; } /* Create new issue in MantisBT */ if (!(opts & OPT_f)) { struct dump_dir *dd = dd_opendir(dump_dir_name, /*flags:*/ 0); if (!dd) xfunc_die(); report_result_t *reported_to = find_in_reported_to(dd, "MantisBT"); dd_close(dd); if (reported_to && reported_to->url) { char *msg = xasprintf(_("This problem was already reported to MantisBT (see '%s')." " Do you still want to create a new issue?"), reported_to->url); int yes = ask_yes_no(msg); free(msg); if (!yes) return 0; } free_report_result(reported_to); } problem_data_t *problem_data = create_problem_data_for_reporting(dump_dir_name); if (!problem_data) xfunc_die(); /* create_problem_data_for_reporting already emitted error msg */ const char *category = problem_data_get_content_or_die(problem_data, FILENAME_COMPONENT); const char *duphash = problem_data_get_content_or_die(problem_data, FILENAME_DUPHASH); if (opts & OPT_D) { problem_formatter_t *pf = problem_formatter_new(); problem_formatter_add_section(pf, PR_SEC_ADDITIONAL_INFO, /* optional section */ 0); if (problem_formatter_load_file(pf, fmt_file)) error_msg_and_die("Invalid format file: %s", fmt_file); problem_report_t *pr = NULL; if (problem_formatter_generate_report(pf, problem_data, &pr)) error_msg_and_die("Failed to format issue report from problem data"); printf("summary: %s\n" "\n" "Description:\n%s\n" "Additional info:\n%s\n" , problem_report_get_summary(pr) , problem_report_get_description(pr) , problem_report_get_section(pr, PR_SEC_ADDITIONAL_INFO) ); puts("attachments:"); for (GList *a = problem_report_get_attachments(pr); a != NULL; a = g_list_next(a)) printf(" %s\n", (const char *)a->data); problem_report_free(pr); problem_formatter_free(pf); exit(0); } unsigned long bug_id = 0; /* If REMOTE_RESULT contains "DUPLICATE 12345", we consider it a dup of 12345 * and won't search on MantisBT server. */ char *remote_result; remote_result = problem_data_get_content_or_NULL(problem_data, FILENAME_REMOTE_RESULT); if (remote_result) { char *cmd = strtok(remote_result, " \n"); char *id = strtok(NULL, " \n"); if (!prefixcmp(cmd, "DUPLICATE")) { errno = 0; char *e; bug_id = strtoul(id, &e, 10); if (errno || id == e || *e != '\0' || bug_id > INT_MAX) { /* error / no digits / illegal trailing chars / too big a number */ bug_id = 0; } } } mantisbt_issue_info_t *ii; if (!bug_id) { log_warning(_("Checking for duplicates")); int existing_id = -1; int crossver_id = -1; { /* Figure out whether we want to match category * when doing dup search. */ const char *category_substitute = is_in_comma_separated_list(category, mbt_settings.m_DontMatchComponents) ? NULL : category; /* We don't do dup detection across versions (see below why), * but we do add a note if cross-version potential dup exists. * For that, we search for cross version dups first: */ // SOAP API searching method is not in the final version, it's possible the project will be string GList *crossver_bugs_ids = mantisbt_search_duplicate_issues(&mbt_settings, category_substitute, /*version*/ NULL, duphash); unsigned crossver_bugs_count = g_list_length(crossver_bugs_ids); log_debug("MantisBT has %i reports with duphash '%s' including cross-version ones", crossver_bugs_count, duphash); if (crossver_bugs_count > 0) crossver_id = atoi(g_list_first(crossver_bugs_ids)->data); if (crossver_bugs_count > 0) { // SOAP API searching method is not in the final version, it's possible the project will be string GList *dup_bugs_ids = mantisbt_search_duplicate_issues(&mbt_settings, category_substitute, mbt_settings.m_project_version, duphash); unsigned dup_bugs_count = g_list_length(dup_bugs_ids); log_debug("MantisBT has %i reports with duphash '%s'", dup_bugs_count, duphash); if (dup_bugs_count > 0) existing_id = atoi(g_list_first(dup_bugs_ids)->data); } } if (existing_id < 0) { /* Create new issue */ log_warning(_("Creating a new issue")); problem_formatter_t *pf = problem_formatter_new(); problem_formatter_add_section(pf, PR_SEC_ADDITIONAL_INFO, 0); if (problem_formatter_load_file(pf, fmt_file)) error_msg_and_die(_("Invalid format file: %s"), fmt_file); problem_report_t *pr = NULL; if (problem_formatter_generate_report(pf, problem_data, &pr)) error_msg_and_die(_("Failed to format problem data")); if (crossver_id >= 0) problem_report_buffer_printf( problem_report_get_buffer(pr, PR_SEC_DESCRIPTION), "\nPotential duplicate: issue %u\n", crossver_id); problem_formatter_free(pf); /* get tracker URL if exists */ struct dump_dir *dd = dd_opendir(dump_dir_name, 0); char *tracker_url = NULL; if (dd) { report_result_t *reported_to = find_in_reported_to(dd, tracker_str); dd_close(dd); if (reported_to && reported_to->url) { log_warning(_("Adding External URL to issue")); tracker_url = xstrdup(reported_to->url); free_report_result(reported_to); } } int new_id = mantisbt_create_new_issue(&mbt_settings, problem_data, pr, tracker_url); free(tracker_url); if (new_id == -1) return EXIT_FAILURE; log_warning(_("Adding attachments to issue %i"), new_id); char *new_id_str = xasprintf("%u", new_id); for (GList *a = problem_report_get_attachments(pr); a != NULL; a = g_list_next(a)) { const char *item_name = (const char *)a->data; struct problem_item *item = problem_data_get_item_or_NULL(problem_data, item_name); if (!item) continue; else if (item->flags & CD_FLAG_TXT) mantisbt_attach_data(&mbt_settings, new_id_str, item_name, item->content, strlen(item->content)); else if (item->flags & CD_FLAG_BIN) mantisbt_attach_file(&mbt_settings, new_id_str, item_name, item->content); } free(new_id_str); problem_report_free(pr); ii = mantisbt_issue_info_new(); ii->mii_id = new_id; ii->mii_status = xstrdup("new"); goto finish; } bug_id = existing_id; } ii = mantisbt_get_issue_info(&mbt_settings, bug_id); log_warning(_("Bug is already reported: %i"), ii->mii_id); /* Follow duplicates */ if ((strcmp(ii->mii_status, "closed") == 0) && (strcmp(ii->mii_resolution, "duplicate") == 0) ) { mantisbt_issue_info_t *origin = mantisbt_find_origin_bug_closed_duplicate(&mbt_settings, ii); if (origin) { mantisbt_issue_info_free(ii); ii = origin; } } /* TODO CC list * Is no MantisBT SOAP API method which allows adding users to CC list * without updating issue. */ /* Add comment and bt */ const char *comment = problem_data_get_content_or_NULL(problem_data, FILENAME_COMMENT); if (comment && comment[0]) { problem_formatter_t *pf = problem_formatter_new(); if (problem_formatter_load_file(pf, fmt_file2)) error_msg_and_die(_("Invalid duplicate format file: '%s"), fmt_file2); problem_report_t *pr; if (problem_formatter_generate_report(pf, problem_data, &pr)) error_msg_and_die(_("Failed to format duplicate comment from problem data")); const char *mbtcomment = problem_report_get_description(pr); int dup_comment = is_comment_dup(ii->mii_notes, mbtcomment); if (!dup_comment) { log_warning(_("Adding new comment to issue %d"), ii->mii_id); mantisbt_add_issue_note(&mbt_settings, ii->mii_id, mbtcomment); const char *bt = problem_data_get_content_or_NULL(problem_data, FILENAME_BACKTRACE); unsigned rating = 0; const char *rating_str = problem_data_get_content_or_NULL(problem_data, FILENAME_RATING); /* python doesn't have rating file */ if (rating_str) rating = xatou(rating_str); if (bt && rating > ii->mii_best_bt_rating) { char *bug_id_str = xasprintf("%i", ii->mii_id); log_warning(_("Attaching better backtrace")); // find unique filename of attachment char *name = NULL; for (int i = 0;; ++i) { if (i == 0) name = xasprintf("%s", FILENAME_BACKTRACE); else name = xasprintf("%s%d", FILENAME_BACKTRACE, i); if (g_list_find_custom(ii->mii_attachments, name, (GCompareFunc) strcmp) == NULL) break; free(name); } mantisbt_attach_data(&mbt_settings, bug_id_str, name, bt, strlen(bt)); free(name); free(bug_id_str); } } else log_warning(_("Found the same comment in the issue history, not adding a new one")); problem_report_free(pr); problem_formatter_free(pf); } finish: log_warning(_("Status: %s%s%s %s/view.php?id=%u"), ii->mii_status, ii->mii_resolution ? " " : "", ii->mii_resolution ? ii->mii_resolution : "", mbt_settings.m_mantisbt_url, ii->mii_id); struct dump_dir *dd = dd_opendir(dump_dir_name, /*flags:*/ 0); if (dd) { report_result_t rr = { .label = (char *)"MantisBT" }; rr.url = xasprintf("%s/view.php?id=%u", mbt_settings.m_mantisbt_url, ii->mii_id); add_reported_to_entry(dd, &rr); free(rr.url); dd_close(dd); } mantisbt_settings_free(&mbt_settings); return 0; }