Bugzilla Guide
Bugzilla Guide
Bugzilla Guide
6rc1 Release
Published 2010-03-07
This is the documentation for Bugzilla, a bug-tracking system from mozilla.org. Bugzilla is an enterprise-class piece
of software that tracks millions of bugs and issues for hundreds of organizations around the world.
The most current version of this document can always be found on the Bugzilla Documentation Page
(http://www.bugzilla.org/docs/).
Table of Contents
1. About This Guide......................................................................................................................................................1
1.1. Copyright Information....................................................................................................................................1
1.2. Disclaimer ......................................................................................................................................................1
1.3. New Versions..................................................................................................................................................1
1.4. Credits ............................................................................................................................................................1
1.5. Document Conventions ..................................................................................................................................2
2. Installing Bugzilla .....................................................................................................................................................4
2.1. Installation ......................................................................................................................................................4
2.1.1. Perl.....................................................................................................................................................4
2.1.2. Database Engine ................................................................................................................................5
2.1.2.1. MySQL..................................................................................................................................5
2.1.2.2. PostgreSQL ...........................................................................................................................5
2.1.2.3. Oracle ....................................................................................................................................5
2.1.3. Web Server.........................................................................................................................................6
2.1.4. Bugzilla..............................................................................................................................................6
2.1.5. Perl Modules......................................................................................................................................6
2.1.5.1. DBD::mysql ..........................................................................................................................8
2.1.5.2. Template Toolkit (2.22).........................................................................................................8
2.1.5.3. GD (1.20) ..............................................................................................................................8
2.1.5.4. Chart::Lines (2.1) ..................................................................................................................9
2.1.5.5. GD::Graph (any) ...................................................................................................................9
2.1.5.6. GD::Text (any) ......................................................................................................................9
2.1.5.7. XML::Twig (any) ..................................................................................................................9
2.1.5.8. SOAP::Lite (0.710.06) ..........................................................................................................9
2.1.5.9. PatchReader (0.9.4)...............................................................................................................9
2.1.6. Mail Transfer Agent (MTA) ..............................................................................................................9
2.1.7. Installing Bugzilla on mod_perl ......................................................................................................10
2.2. Configuration................................................................................................................................................10
2.2.1. localconfig........................................................................................................................................10
2.2.2. Database Server ...............................................................................................................................11
2.2.2.1. Bugzilla Database Schema..................................................................................................11
2.2.2.2. MySQL................................................................................................................................11
2.2.2.3. PostgreSQL .........................................................................................................................13
2.2.2.4. Oracle ..................................................................................................................................14
2.2.3. checksetup.pl ...................................................................................................................................15
2.2.4. Web server .......................................................................................................................................15
2.2.4.1. Bugzilla using Apache ........................................................................................................15
2.2.4.2. Microsoft Internet Information Services.............................................................................17
2.2.5. Bugzilla............................................................................................................................................18
2.3. Optional Additional Configuration...............................................................................................................18
2.3.1. Bug Graphs ......................................................................................................................................18
2.3.2. The Whining Cron ...........................................................................................................................19
2.3.3. Whining ...........................................................................................................................................19
2.3.4. Serving Alternate Formats with the right MIME type.....................................................................20
2.4. Multiple Bugzilla databases with a single installation .................................................................................20
iii
2.5. OS-Specific Installation Notes .....................................................................................................................20
2.5.1. Microsoft Windows .........................................................................................................................21
2.5.1.1. Win32 Perl...........................................................................................................................21
2.5.1.2. Perl Modules on Win32.......................................................................................................21
2.5.1.3. Serving the web pages.........................................................................................................22
2.5.1.4. Sending Email .....................................................................................................................22
2.5.2. Mac OS X ........................................................................................................................................22
2.5.2.1. Sendmail..............................................................................................................................22
2.5.2.2. Libraries & Perl Modules on Mac OS X.............................................................................23
2.5.3. Linux Distributions ..........................................................................................................................23
2.6. UNIX (non-root) Installation Notes .............................................................................................................24
2.6.1. Introduction......................................................................................................................................24
2.6.2. MySQL ............................................................................................................................................24
2.6.2.1. Running MySQL as Non-Root ...........................................................................................24
2.6.3. Perl...................................................................................................................................................25
2.6.4. Perl Modules....................................................................................................................................26
2.6.5. HTTP Server ....................................................................................................................................26
2.6.5.1. Running Apache as Non-Root ............................................................................................26
2.6.6. Bugzilla............................................................................................................................................27
2.6.6.1. suexec or shared hosting .....................................................................................................27
2.7. Upgrading to New Releases .........................................................................................................................27
2.7.1. Before You Upgrade ........................................................................................................................28
2.7.2. Getting The New Bugzilla ...............................................................................................................28
2.7.2.1. If you have modified your Bugzilla.....................................................................................29
2.7.2.2. Upgrading using CVS .........................................................................................................29
2.7.2.3. Upgrading using the tarball.................................................................................................29
2.7.2.4. Upgrading using patches .....................................................................................................30
2.7.3. Completing Your Upgrade...............................................................................................................31
2.7.4. Automatic Notifications of New Releases .......................................................................................31
3. Administering Bugzilla...........................................................................................................................................33
3.1. Bugzilla Configuration .................................................................................................................................33
3.1.1. Required Settings.............................................................................................................................33
3.1.2. Administrative Policies....................................................................................................................35
3.1.3. User Authentication .........................................................................................................................35
3.1.4. Attachments .....................................................................................................................................35
3.1.5. Bug Change Policies........................................................................................................................35
3.1.6. Bug Fields........................................................................................................................................36
3.1.7. Bug Moving .....................................................................................................................................36
3.1.8. Dependency Graphs.........................................................................................................................36
3.1.9. Group Security.................................................................................................................................36
3.1.10. LDAP Authentication ....................................................................................................................37
3.1.11. RADIUS Authentication................................................................................................................38
3.1.12. Email..............................................................................................................................................39
3.1.13. Patch Viewer ..................................................................................................................................40
3.1.14. Query Defaults...............................................................................................................................40
3.1.15. Shadow Database...........................................................................................................................40
3.1.16. User Matching ...............................................................................................................................40
iv
3.2. User Administration .....................................................................................................................................41
3.2.1. Creating the Default User ................................................................................................................41
3.2.2. Managing Other Users.....................................................................................................................41
3.2.2.1. Searching for existing users ................................................................................................41
3.2.2.2. Creating new users ..............................................................................................................41
3.2.2.3. Modifying Users .................................................................................................................42
3.2.2.4. Deleting Users.....................................................................................................................43
3.2.2.5. Impersonating Users ...........................................................................................................43
3.3. Classifications...............................................................................................................................................44
3.4. Products ........................................................................................................................................................44
3.4.1. Creating New Products ....................................................................................................................45
3.4.2. Editing Products...............................................................................................................................45
3.4.3. Adding or Editing Components, Versions and Target Milestones...................................................46
3.4.4. Assigning Group Controls to Products ............................................................................................46
3.4.4.1. Common Applications of Group Controls ..........................................................................47
3.5. Components..................................................................................................................................................49
3.6. Versions ........................................................................................................................................................49
3.7. Milestones ....................................................................................................................................................50
3.8. Flags .............................................................................................................................................................50
3.8.1. A Simple Example...........................................................................................................................50
3.8.2. About Flags......................................................................................................................................51
3.8.2.1. Values ..................................................................................................................................51
3.8.3. Using flag requests...........................................................................................................................51
3.8.4. Two Types of Flags..........................................................................................................................51
3.8.4.1. Attachment Flags ................................................................................................................51
3.8.4.2. Bug Flags ............................................................................................................................52
3.8.5. Administering Flags.........................................................................................................................52
3.8.5.1. Editing a Flag ......................................................................................................................52
3.8.5.2. Creating a Flag ....................................................................................................................52
3.8.5.3. Deleting a Flag ....................................................................................................................54
3.9. Keywords......................................................................................................................................................55
3.10. Custom Fields.............................................................................................................................................55
3.10.1. Adding Custom Fields ...................................................................................................................55
3.10.2. Editing Custom Fields ...................................................................................................................56
3.10.3. Deleting Custom Fields .................................................................................................................56
3.11. Legal Values ...............................................................................................................................................56
3.11.1. Viewing/Editing legal values .........................................................................................................57
3.11.2. Deleting legal values......................................................................................................................57
3.12. Bug Status Workflow..................................................................................................................................57
3.13. Voting .........................................................................................................................................................57
3.14. Quips ..........................................................................................................................................................58
3.15. Groups and Group Security........................................................................................................................58
3.15.1. Creating Groups.............................................................................................................................59
3.15.2. Editing Groups and Assigning Group Permissions .......................................................................60
3.15.3. Assigning Users to Groups ............................................................................................................61
3.15.4. Assigning Group Controls to Products ..........................................................................................61
3.16. Checking and Maintaining Database Integrity...........................................................................................61
v
4. Bugzilla Security .....................................................................................................................................................63
4.1. Operating System .........................................................................................................................................63
4.1.1. TCP/IP Ports ....................................................................................................................................63
4.1.2. System User Accounts.....................................................................................................................63
4.1.3. The chroot Jail...............................................................................................................................63
4.2. Web server ....................................................................................................................................................63
4.2.1. Disabling Remote Access to Bugzilla Configuration Files .............................................................64
4.3. Bugzilla ........................................................................................................................................................65
4.3.1. Prevent users injecting malicious Javascript....................................................................................65
5. Using Bugzilla..........................................................................................................................................................66
5.1. Introduction ..................................................................................................................................................66
5.2. Create a Bugzilla Account............................................................................................................................66
5.3. Anatomy of a Bug ........................................................................................................................................67
5.4. Life Cycle of a Bug ......................................................................................................................................68
5.5. Searching for Bugs .......................................................................................................................................69
5.5.1. Boolean Charts.................................................................................................................................69
5.5.1.1. Pronoun Substitution...........................................................................................................70
5.5.1.2. Negation ..............................................................................................................................70
5.5.1.3. Multiple Charts ...................................................................................................................71
5.5.2. Quicksearch .....................................................................................................................................71
5.5.3. Case Sensitivity in Searches ............................................................................................................71
5.5.4. Bug Lists..........................................................................................................................................71
5.5.5. Adding/removing tags to/from bugs ................................................................................................72
5.6. Filing Bugs ...................................................................................................................................................72
5.6.1. Reporting a New Bug ......................................................................................................................72
5.6.2. Clone an Existing Bug .....................................................................................................................73
5.7. Attachments..................................................................................................................................................73
5.7.1. Patch Viewer ....................................................................................................................................74
5.7.1.1. Viewing Patches in Patch Viewer........................................................................................74
5.7.1.2. Seeing the Difference Between Two Patches......................................................................74
5.7.1.3. Getting More Context in a Patch.........................................................................................75
5.7.1.4. Collapsing and Expanding Sections of a Patch...................................................................75
5.7.1.5. Linking to a Section of a Patch ...........................................................................................75
5.7.1.6. Going to Bonsai and LXR...................................................................................................75
5.7.1.7. Creating a Unified Diff........................................................................................................75
5.8. Hints and Tips ..............................................................................................................................................75
5.8.1. Autolinkification ..............................................................................................................................75
5.8.2. Comments ........................................................................................................................................76
5.8.3. Server-Side Comment Wrapping.....................................................................................................76
5.8.4. Dependency Tree .............................................................................................................................76
5.9. Time Tracking Information ..........................................................................................................................76
5.10. User Preferences.........................................................................................................................................77
5.10.1. General Preferences .......................................................................................................................77
5.10.2. Email Preferences ..........................................................................................................................77
5.10.3. Saved Searches ..............................................................................................................................79
5.10.4. Name and Password.......................................................................................................................79
5.10.5. Permissions ....................................................................................................................................79
vi
5.11. Reports and Charts .....................................................................................................................................80
5.11.1. Reports...........................................................................................................................................80
5.11.2. Charts.............................................................................................................................................81
5.11.2.1. Creating Charts .................................................................................................................81
5.11.2.2. Creating New Data Sets ....................................................................................................81
5.12. Flags ...........................................................................................................................................................82
5.13. Whining ......................................................................................................................................................82
5.13.1. The Event.......................................................................................................................................83
5.13.2. Whining Schedule..........................................................................................................................83
5.13.3. Whining Searches ..........................................................................................................................84
5.13.4. Saving Your Changes.....................................................................................................................84
6. Customizing Bugzilla ..............................................................................................................................................86
6.1. Bugzilla Extensions......................................................................................................................................86
6.2. Custom Skins................................................................................................................................................86
6.3. Template Customization...............................................................................................................................86
6.3.1. Template Directory Structure ..........................................................................................................86
6.3.2. Choosing a Customization Method .................................................................................................87
6.3.3. How To Edit Templates ...................................................................................................................88
6.3.4. Template Formats and Types ...........................................................................................................88
6.3.5. Particular Templates ........................................................................................................................89
6.3.6. Configuring Bugzilla to Detect the User’s Language ......................................................................90
6.4. Customizing Who Can Change What ..........................................................................................................90
6.5. Integrating Bugzilla with Third-Party Tools ................................................................................................92
A. Troubleshooting......................................................................................................................................................93
A.1. General Advice............................................................................................................................................93
A.2. The Apache web server is not serving Bugzilla pages ................................................................................93
A.3. I installed a Perl module, but checksetup.pl claims it’s not installed! ..................................................93
A.4. DBD::Sponge::db prepare failed .................................................................................................................94
A.5. cannot chdir(/var/spool/mqueue).................................................................................................................94
A.6. Everybody is constantly being forced to relogin.........................................................................................94
A.7. index.cgi doesn’t show up unless specified in the URL .........................................................................95
A.8. checksetup.pl reports "Client does not support authentication protocol requested by server...".................95
B. Contrib ....................................................................................................................................................................97
B.1. Command-line Search Interface ..................................................................................................................97
B.2. Command-line ’Send Unsent Bug-mail’ tool ..............................................................................................97
C. Manual Installation of Perl Modules....................................................................................................................98
C.1. Instructions ..................................................................................................................................................98
C.2. Download Locations....................................................................................................................................98
C.3. Optional Modules ......................................................................................................................................100
D. GNU Free Documentation License .....................................................................................................................102
0. Preamble........................................................................................................................................................102
1. Applicability and Definition..........................................................................................................................102
2. Verbatim Copying .........................................................................................................................................103
3. Copying in Quantity ......................................................................................................................................103
4. Modifications.................................................................................................................................................104
5. Combining Documents..................................................................................................................................105
vii
6. Collections of Documents .............................................................................................................................105
7. Aggregation with Independent Works...........................................................................................................105
8. Translation.....................................................................................................................................................106
9. Termination ...................................................................................................................................................106
10. Future Revisions of this License .................................................................................................................106
How to use this License for your documents ....................................................................................................106
Glossary .....................................................................................................................................................................108
viii
List of Figures
5-1. Lifecycle of a Bugzilla Bug...................................................................................................................................68
ix
Chapter 1. About This Guide
Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation
License, Version 1.1 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-
Cover Texts, and with no Back-Cover Texts. A copy of the license is included in Appendix D.
If you have any questions regarding this document, its copyright, or publishing this document in non-electronic form,
please contact the Bugzilla Team.
1.2. Disclaimer
No liability for the contents of this document can be accepted. Follow the instructions herein at your own risk. This
document may contain errors and inaccuracies that may damage your system, cause your partner to leave you, your
boss to fire you, your cats to pee on your furniture and clothing, and global thermonuclear war. Proceed with caution.
Naming of particular products or brands should not be seen as endorsements, with the exception of the term
"GNU/Linux". We wholeheartedly endorse the use of GNU/Linux; it is an extremely versatile, stable, and robust
operating system that offers an ideal operating environment for Bugzilla.
Although the Bugzilla development team has taken great care to ensure that all exploitable bugs have been fixed,
security holes surely exist in any piece of code. Great care should be taken both in the installation and usage of this
software. The Bugzilla development team members assume no liability for your use of Bugzilla. You have the source
code, and are responsible for auditing it yourself to ensure your security needs are met.
1.4. Credits
The people listed below have made enormous contributions to the creation of this Guide, through their writing, ded-
icated hacking efforts, numerous e-mail and IRC support sessions, and overall excellent contribution to the Bugzilla
community:
1
Chapter 1. About This Guide
Descriptions Appearance
Caution
Caution
Don’t run with scissors!
2
Chapter 1. About This Guide
Descriptions Appearance
Warning
Warning
Read this or the cat gets it.
This documentation is maintained in DocBook 4.1.2 XML format. Changes are best
submitted as plain text or XML diffs, attached to a bug filed in the Bugzilla Documentation
(https://bugzilla.mozilla.org/enter_bug.cgi?product=Bugzilla&component=Documentation) component.
3
Chapter 2. Installing Bugzilla
2.1. Installation
Note: If you just want to use Bugzilla, you do not need to install it. None of this chapter is relevant to you. Ask your
Bugzilla administrator for the URL to access it from your web browser.
The Bugzilla server software is usually installed on Linux or Solaris. If you are installing on another OS, check Section
2.5 before you start your installation to see if there are any special instructions.
This guide assumes that you have administrative access to the Bugzilla machine. It not possible to install and run
Bugzilla itself without administrative access except in the very unlikely event that every single prerequisite is already
installed.
Warning
The installation process may make your machine insecure for short periods of time. Make sure there is a
firewall between you and the Internet.
You are strongly recommended to make a backup of your system before installing Bugzilla (and at regular intervals
thereafter :-).
In outline, the installation proceeds as follows:
2.1.1. Perl
Installed Version Test:
perl -v
Any machine that doesn’t have Perl on it is a sad machine indeed. If you don’t have it and your OS doesn’t provide
official packages, visit http://www.perl.org. Although Bugzilla runs with Perl 5.8.1, it’s a good idea to be using the
latest stable version.
4
Chapter 2. Installing Bugzilla
2.1.2.1. MySQL
Installed Version Test:
mysql -V
If you don’t have it and your OS doesn’t provide official packages, visit http://www.mysql.com. You need MySQL
version 4.1.2 or higher.
Note: Many of the binary versions of MySQL store their data files in /var. On some Unix systems, this is part of
a smaller root partition, and may not have room for your bug database. To change the data directory, you have to
build MySQL from source yourself, and set it as an option to configure.
If you install from something other than a packaging/installation system, such as .rpm (Redhat Package), .deb (Debian
Package), .exe (Windows Executable), or .msi (Microsoft Installer), make sure the MySQL server is started when the
machine boots.
2.1.2.2. PostgreSQL
Installed Version Test:
psql -V
If you don’t have it and your OS doesn’t provide official packages, visit http://www.postgresql.org/. You need Post-
greSQL version 8.00.0000 or higher.
If you install from something other than a packaging/installation system, such as .rpm (Redhat Package), .deb (Debian
Package), .exe (Windows Executable), or .msi (Microsoft Installer), make sure the PostgreSQL server is started when
the machine boots.
2.1.2.3. Oracle
Installed Version Test:
5
Chapter 2. Installing Bugzilla
If you install from something other than a packaging/installation system, such as .rpm (Redhat Package), .deb (Debian
Package), .exe (Windows Executable), or .msi (Microsoft Installer), make sure the Oracle server is started when the
machine boots.
2.1.4. Bugzilla
Download a Bugzilla tarball (http://www.bugzilla.org/download/) (or check it out from CVS) and place it in a suitable
directory, accessible by the default web server user (probably “apache” or “www”). Good locations are either directly
in the web server’s document directories or in /usr/local with a symbolic link to the web server’s document
directories or an alias in the web server’s configuration.
Caution
The default Bugzilla distribution is NOT designed to be placed in a cgi-bin directory. This includes any
directory which is configured using the ScriptAlias directive of Apache.
Once all the files are in a web accessible directory, make that directory writable by your web server’s user. This is a
temporary step until you run the checksetup.pl script, which locks down your installation.
checksetup.pl will print out a list of the required and optional Perl modules, together with the versions (if any)
installed on your machine. The list of required modules is reasonably long; however, you may already have several of
them installed.
6
Chapter 2. Installing Bugzilla
The preferred way of installing Perl modules is to use the install-module.pl script on Unix, or PPM on Windows
(see Section 2.5.1.2). If for some reason you need to install the Perl modules manually, see Appendix C. For instance,
on Unix:
Tip: Many people complain that Perl modules will not install for them. Most times, the error messages complain
that they are missing a file in “@INC”. Virtually every time, this error is due to permissions being set too restrictively
for you to compile Perl modules or not having the necessary Perl development libraries installed on your system.
Consult your local UNIX systems administrator for help solving these permissions issues; if you are the local UNIX
sysadmin, please consult the newsgroup/mailing list for further assistance or hire someone to help you out.
Note: If you are using a package-based system, and attempting to install the Perl modules from CPAN, you
may need to install the "development" packages for MySQL and GD before attempting to install the related Perl
modules. The names of these packages will vary depending on the specific distribution you are using, but are
often called <packagename>-devel.
Here is a complete list of modules and their minimum versions. Some modules have special installation notes, which
follow.
Required Perl modules:
1. CGI (3.21)
2. Date::Format (2.21)
3. DateTime (0.28)
4. DateTime::TimeZone (0.71)
5. DBI (1.41)
6. DBD::mysql (4.00) if using MySQL
7. DBD::Pg (1.45) if using PostgreSQL
8. DBD::Oracle (1.19) if using Oracle
9. Digest::SHA (any)
10. Email::Send (2.00)
11. Email::MIME (1.861)
12. Email::MIME::Encodings (1.313)
13. Email::MIME::Modifier (1.442)
14. Template (2.22)
15. URI (any)
Optional Perl modules:
7
Chapter 2. Installing Bugzilla
2.1.5.1. DBD::mysql
The installation process will ask you a few questions about the desired compilation target and your MySQL instal-
lation. For most of the questions the provided default will be adequate, but when asked if your desired target is the
MySQL or mSQL packages, you should select the MySQL-related ones. Later you will be asked if you wish to pro-
vide backwards compatibility with the older MySQL packages; you should answer YES to this question. The default
is NO.
A host of ’localhost’ should be fine. A testing user of ’test’, with a null password, should have sufficient access to run
tests on the ’test’ database which MySQL creates upon installation.
8
Chapter 2. Installing Bugzilla
2.1.5.3. GD (1.20)
The GD module is only required if you want graphical reports.
Note: The Perl GD module requires some other libraries that may or may not be installed on your system, including
libpng and libgd. The full requirements are listed in the Perl GD module README. If compiling GD fails, it’s
probably because you’re missing a required library.
Tip: The version of the GD module you need is very closely tied to the libgd version installed on your system. If
you have a version 1.x of libgd the 2.x versions of the GD module won’t work for you.
9
Chapter 2. Installing Bugzilla
Note: This is not entirely true. It is possible to completely disable email sending, or to have Bugzilla store email
messages in a file instead of sending them. However, this is mainly intended for testing, as disabling or diverting
email on a production machine would mean that users could miss important events (such as bug changes or the
creation of new accounts).
For more information, see the “mail_delivery_method” parameter in Section 3.1.
On Linux, any Sendmail-compatible MTA (Mail Transfer Agent) will suffice. Sendmail, Postfix, qmail and Exim are
examples of common MTAs. Sendmail is the original Unix MTA, but the others are easier to configure, and therefore
many people replace Sendmail with Postfix or Exim. They are drop-in replacements, so Bugzilla will not distinguish
between them.
If you are using Sendmail, version 8.7 or higher is required. If you are using a Sendmail-compatible MTA, it must be
congruent with at least version 8.7 of Sendmail.
Consult the manual for the specific MTA you choose for detailed installation instructions. Each of these programs will
have their own configuration files where you must configure certain parameters to ensure that the mail is delivered
properly. They are implemented as services, and you should ensure that the MTA is in the auto-start list of services
for the machine.
If a simple mail sent with the command-line ’mail’ program succeeds, then Bugzilla should also be fine.
2.2. Configuration
Warning
Poorly-configured MySQL and Bugzilla installations have given attackers full access to systems in the past.
Please take the security parts of these guidelines seriously, even for Bugzilla machines hidden away behind
your firewall. Be certain to read Chapter 4 for some important security tips.
2.2.1. localconfig
You should now run checksetup.pl again, this time without the --check-modules switch.
10
Chapter 2. Installing Bugzilla
bash# ./checksetup.pl
This time, checksetup.pl should tell you that all the correct modules are installed and will display a message about,
and write out a file called, localconfig. This file contains the default settings for a number of Bugzilla parameters.
Load this file in your editor. The only two values you need to change are $db_driver and $db_pass, respectively the
type of the database and the password for the user you will create for your database. Pick a strong password (for
simplicity, it should not contain single quote characters) and put it here. $db_driver can be either ’mysql’, ’Pg’ or
’oracle’.
Note: In Oracle, $db_name should actually be the SID name of your database (e.g. "XE" if you are using Oracle
XE).
You may need to change the value of webservergroup if your web server does not run in the "apache" group. On
Debian, for example, Apache runs in the "www-data" group. If you are going to run Bugzilla on a machine where
you do not have root access (such as on a shared web hosting account), you will need to leave webservergroup empty,
ignoring the warnings that checksetup.pl will subsequently display every time it is run.
Caution
If you are using suexec, you should use your own primary group for webservergroup rather than leaving it
empty, and see the additional directions in the suexec section Section 2.6.6.1.
The other options in the localconfig file are documented by their accompanying comments. If you have a slightly
non-standard database setup, you may wish to change one or more of the other "$db_*" parameters.
11
Chapter 2. Installing Bugzilla
2.2.2.2. MySQL
Caution
MySQL’s default configuration is insecure. We highly recommend to run mysql_secure_installation on
Linux or the MySQL installer on Windows, and follow the instructions. Important points to note are:
[mysqld]
# Allow packets up to 4MB
max_allowed_packet=4M
[mysqld]
# Allow small words in full-text indexes
ft_min_word_len=2
12
Chapter 2. Installing Bugzilla
We use an SQL GRANT command to create a “bugs” user. This also restricts the “bugs”user to operations within a
database called “bugs”, and only allows the account to connect from “localhost”. Modify it to reflect your setup if you
will be connecting from another machine or as a different user.
Run the mysql command-line client and enter:
The above command will change the limit to 20GB. Mysql will have to make a temporary copy of your entire table to
do this. Ideally, you should do this when your attachments table is still small.
Note: This does not affect Big Files, attachments that are stored directly on disk instead of in the database.
2.2.2.3. PostgreSQL
bash# su - postgres
13
Chapter 2. Installing Bugzilla
When asked for a password, provide the password which will be set as $db_pass in localconfig. The created user
will have the ability to create databases and will not be able to create new users.
This means that for TCP/IP (host) connections, allow connections from ’127.0.0.1’ to ’all’ databases on this server
from the ’bugs’ user, and use password authentication (md5) for that user.
Now, you will need to restart PostgreSQL, but you will need to fully stop and start the server rather than just restart-
ing due to the possibility of a change to postgresql.conf. After the server has restarted, you will need to edit
localconfig, finding the $db_driver variable and setting it to Pg and changing the password in $db_pass to the
one you picked previously, while setting up the account.
2.2.2.4. Oracle
Here, the name of the tablespace is ’bugs’, but you can choose another name. $path_to_datafile is the path to the
file containing your database, for instance /u01/oradata/bugzilla.dbf. The initial size of the database file is set
in this example to 500 Mb, with an increment of 30 Mb everytime we reach the size limit of the file.
14
Chapter 2. Installing Bugzilla
2.2.3. checksetup.pl
Next, rerun checksetup.pl. It reconfirms that all the modules are present, and notices the altered localconfig file,
which it assumes you have edited to your satisfaction. It compiles the UI templates, connects to the database using the
’bugs’ user you created and the password you defined, and creates the ’bugs’ database and the tables therein.
After that, it asks for details of an administrator account. Bugzilla can have multiple administrators - you can create
more later - but it needs one to start off with. Enter the email address of an administrator, his or her full name, and a
suitable Bugzilla password.
checksetup.pl will then finish. You may rerun checksetup.pl at any time if you wish.
1. Load httpd.conf in your editor. In Fedora and Red Hat Linux, this file is found in /etc/httpd/conf.
15
Chapter 2. Installing Bugzilla
2. Apache uses <Directory> directives to permit fine-grained permission setting. Add the following lines to a
directive that applies to the location of your Bugzilla installation. (If such a section does not exist, you’ll want to
add one.) In this example, Bugzilla has been installed at /var/www/html/bugzilla.
<Directory /var/www/html/bugzilla>
AddHandler cgi-script .cgi
Options +Indexes +ExecCGI
DirectoryIndex index.cgi
AllowOverride Limit
</Directory>
These instructions: allow apache to run .cgi files found within the bugzilla directory; instructs the server to look
for a file called index.cgi if someone only types the directory name into the browser; and allows Bugzilla’s
.htaccess files to override global permissions.
Note: It is possible to make these changes globally, or to the directive controlling Bugzilla’s parent directory
(e.g. <Directory /var/www/html/>). Such changes would also apply to the Bugzilla directory... but they
would also apply to many other places where they may or may not be appropriate. In most cases, including
this one, it is better to be as restrictive as possible when granting extra access.
Note: On Windows, you may have to also add the ScriptInterpreterSource Registry-Strict line, see
Windows specific notes.
3. checksetup.pl can set tighter permissions on Bugzilla’s files and directories if it knows what group the web
server runs as. Find the Group line in httpd.conf, place the value found there in the $webservergroup
variable in localconfig, then rerun checksetup.pl.
4. Optional: If Bugzilla does not actually reside in the webspace directory, but instead has been symbolically linked
there, you will need to add the following to the Options line of the Bugzilla <Directory> directive (the same
one as in the step above):
+FollowSymLinks
Without this directive, Apache will not follow symbolic links to places outside its own directory structure, and
you will be unable to run Bugzilla.
1. Load httpd.conf in your editor. In Fedora and Red Hat Linux, this file is found in /etc/httpd/conf.
2. Add the following information to your httpd.conf file, substituting where appropriate with your own local paths.
Note: This should be used instead of the <Directory> block shown above. This should also be above any
other mod_perl directives within the httpd.conf and must be specified in the order as below.
16
Chapter 2. Installing Bugzilla
Warning
You should also ensure that you have disabled KeepAlive support in your Apache install when
utilizing Bugzilla under mod_perl
3. checksetup.pl can set tighter permissions on Bugzilla’s files and directories if it knows what group the web
server runs as. Find the Group line in httpd.conf, place the value found there in the $webservergroup
variable in localconfig, then rerun checksetup.pl.
On restarting Apache, Bugzilla should now be running within the mod_perl environment. Please ensure you have run
checksetup.pl to set permissions before you restart Apache.
Note: Please bear the following points in mind when looking at using Bugzilla under mod_perl:
• mod_perl support in Bugzilla can take up a HUGE amount of RAM. You could be looking at 30MB per httpd
child, easily. Basically, you just need a lot of RAM. The more RAM you can get, the better. mod_perl is basically
trading RAM for speed. At least 2GB total system RAM is recommended for running Bugzilla under mod_perl.
• Under mod_perl, you have to restart Apache if you make any manual change to any Bugzilla file. You can’t
just reload--you have to actually restart the server (as in make sure it stops and starts again). You can change
localconfig and the params file manually, if you want, because those are re-read every time you load a page.
• You must run in Apache’s Prefork MPM (this is the default). The Worker MPM may not work--we haven’t tested
Bugzilla’s mod_perl support under threads. (And, in fact, we’re fairly sure it won’t work.)
• Bugzilla generally expects to be the only mod_perl application running on your entire server. It may or may
not work if there are other applications also running under mod_perl. It does try its best to play nice with other
mod_perl applications, but it still may have conflicts.
• It is recommended that you have one Bugzilla instance running under mod_perl on your server. Bugzilla has
not been tested with more than one instance running.
17
Chapter 2. Installing Bugzilla
“Bugzilla”. Instead, place them in a different location, and then use the IIS Administration tool to create a Virtual
Directory named "Bugzilla" that acts as an alias for the actual location of the files. When creating that virtual directory,
make sure you add the “Execute (such as ISAPI applications or CGI)” access permission.
You will also need to tell IIS how to handle Bugzilla’s .cgi files. Using the IIS Administration tool again, open up the
properties for the new virtual directory and select the Configuration option to access the Script Mappings. Create an
entry mapping .cgi to:
For example:
Note: The ActiveState install may have already created an entry for .pl files that is limited to “GET,HEAD,POST”.
If so, this mapping should be removed as Bugzilla’s .pl files are not designed to be run via a web server.
IIS will also need to know that the index.cgi should be treated as a default document. On the Documents tab page of
the virtual directory properties, you need to add index.cgi as a default document type. If you wish, you may remove
the other default document types for this particular virtual directory, since Bugzilla doesn’t use any of them.
Also, and this can’t be stressed enough, make sure that files such as localconfig and your data directory are
secured as described in Section 4.2.1.
2.2.5. Bugzilla
Your Bugzilla should now be working. Access http://<your-bugzilla-server>/ - you should see the Bugzilla
front page. If not, consult the Troubleshooting section, Appendix A.
Note: The URL above may be incorrect if you installed Bugzilla into a subdirectory or used a symbolic link from
your web site root to the Bugzilla directory.
Log in with the administrator account you defined in the last checksetup.pl run. You should go through the Pa-
rameters page and see if there are any you wish to change. They key parameters are documented in Section 3.1; you
should certainly alter maintainer and urlbase; you may also want to alter cookiepath or requirelogin.
Bugzilla has several optional features which require extra configuration. You can read about those in Section 2.3.
18
Chapter 2. Installing Bugzilla
bash# crontab -e
This should bring up the crontab file in your editor. Add a cron entry like this to run collectstats.pl daily at 5
after midnight:
5 0 * * * cd <your-bugzilla-directory> ; ./collectstats.pl
After two days have passed you’ll be able to view bug graphs from the Reports page.
Note: Windows does not have ’cron’, but it does have the Task Scheduler, which performs the same duties. There
are also third-party tools that can be used to implement cron, such as nncron (http://www.nncron.ru/).
55 0 * * * cd <your-bugzilla-directory> ; ./whineatnews.pl
Note: Windows does not have ’cron’, but it does have the Task Scheduler, which performs the same duties. There
are also third-party tools that can be used to implement cron, such as nncron (http://www.nncron.ru/).
2.3.3. Whining
As of Bugzilla 2.20, users can configure Bugzilla to regularly annoy them at regular intervals, by having Bugzilla
execute saved searches at certain times and emailing the results to the user. This is known as "Whining". The process
of configuring Whining is described in Section 5.13, but for it to work a Perl script must be executed at regular
intervals.
This can be done by adding the following command as a daily crontab entry, in the same manner as explained above
for bug graphs. This example runs it every 15 minutes.
Note: Whines can be executed as often as every 15 minutes, so if you specify longer intervals between executions
of whine.pl, some users may not be whined at as often as they would expect. Depending on the person, this can
either be a very Good Thing or a very Bad Thing.
19
Chapter 2. Installing Bugzilla
Note: Windows does not have ’cron’, but it does have the Task Scheduler, which performs the same duties. There
are also third-party tools that can be used to implement cron, such as nncron (http://www.nncron.ru/).
<VirtualHost 212.85.153.228:80>
ServerName foo.bar.baz
SetEnv PROJECT foo
Alias /bugzilla /var/www/bugzilla
</VirtualHost>
Don’t forget to also export this variable before accessing Bugzilla by other means, such as cron tasks for instance.
20
Chapter 2. Installing Bugzilla
Note: These instructions are for 32-bit versions of Windows. If you are using a 64-bit version of Windows, you will
need to install 32-bit Perl in order to install the 32-bit modules as described below.
The best source for the Windows PPM modules needed for Bugzilla is probably the theory58S website, which you
can add to your list of repositories as follows (for Perl 5.8.x):
If you are using Perl 5.10.x, you cannot use the same PPM modules as Perl 5.8.x as they are incompatible. In this
case, you should add the following repository:
21
Chapter 2. Installing Bugzilla
Note: The PPM repository stores modules in ’packages’ that may have a slightly different name than the module.
If retrieving these modules from there, you will need to pay attention to the information provided when you run
checksetup.pl as it will tell you what package you’ll need to install.
Tip: If you are behind a corporate firewall, you will need to let the ActiveState PPM utility know how to get through
it to access the repositories by setting the HTTP_proxy system environmental variable. For more information on
setting that variable, see the ActiveState documentation.
Note: The web server looks at /usr/bin/perl to call Perl. If you are using Apache on windows, you can set the
ScriptInterpreterSource (http://httpd.apache.org/docs-2.0/mod/core.html#scriptinterpretersource) directive in your
Apache config file to make it look at the right place: insert the line
ScriptInterpreterSource Registry-Strict
HKEY_CLASSES_ROOT\.cgi\Shell\ExecCGI\Command
with C:\Perl\bin\perl.exe -T as value (adapt to your path if needed) in the registry. When this is done, restart
Apache.
2.5.2. Mac OS X
Making Bugzilla work on Mac OS X requires the following adjustments.
22
Chapter 2. Installing Bugzilla
2.5.2.1. Sendmail
In Mac OS X 10.3 and later, Postfix (http://www.postfix.org/) is used as the built-in email server. Postfix provides an
executable that mimics sendmail enough to fool Bugzilla, as long as Bugzilla can find it.
As of version 2.20, Bugzilla will be able to find the fake sendmail executable without any assistance. However, you
will have to turn on the sendmailnow parameter before you do anything that would result in email being sent. For
more information, see the description of the sendmailnow parameter in Section 3.1.
Note: To prevent creating conflicts with the software that Apple installs by default, Fink creates its own directory
tree at /sw where it installs most of the software that it installs. This means your libraries and headers will be
at /sw/lib and /sw/include instead of /usr/lib and /usr/include. When the Perl module config script asks
where your libgd is, be sure to tell it /sw/lib.
Also available via DarwinPorts and Fink is expat. After installing the expat package, you will be able to install
XML::Parser using CPAN. If you use fink, there is one caveat. Unlike recent versions of the GD module, XML::Parser
doesn’t prompt for the location of the required libraries. When using CPAN, you will need to use the following
command sequence:
ÊÌ The look command will download the module and spawn a new shell with the extracted files as the current
working directory. The exit command will return you to your original shell.
Ë You should watch the output from these make commands, especially “make test” as errors may prevent
XML::Parser from functioning correctly with Bugzilla.
23
Chapter 2. Installing Bugzilla
package management application and installing it using the normal command syntax. Several distributions also per-
form the proper web server configuration automatically on installation.
Please consult the documentation of your Linux distribution for instructions on how to install packages, or for spe-
cific instructions on installing Bugzilla with native package management tools. There is also a Bugzilla Wiki Page
(http://wiki.mozilla.org/Bugzilla:Linux_Distro_Installation) for distro-specific installation notes.
2.6.1. Introduction
If you are running a *NIX OS as non-root, either due to lack of access (web hosts, for example) or for security reasons,
this will detail how to install Bugzilla on such a setup. It is recommended that you read through the Section 2.1 first
to get an idea on the installation steps required. (These notes will reference to steps in that guide.)
2.6.2. MySQL
You may have MySQL installed as root. If you’re setting up an account with a web host, a MySQL account needs to
be set up for you. From there, you can create the bugs account, or use the account given to you.
Warning
You may have problems trying to set up GRANT permissions to the database. If you’re using a web host,
chances are that you have a separate database which is already locked down (or one big database with
limited/no access to the other areas), but you may want to ask your system administrator what the security
settings are set to, and/or run the GRANT command for you.
Also, you will probably not be able to change the MySQL root user password (for obvious reasons), so skip
that step.
[mysqld]
datadir=/home/foo/mymysql
socket=/home/foo/mymysql/thesock
port=8081
[mysql]
socket=/home/foo/mymysql/thesock
port=8081
[mysql.server]
24
Chapter 2. Installing Bugzilla
user=mysql
basedir=/var/lib
[safe_mysqld]
err-log=/home/foo/mymysql/the.log
pid-file=/home/foo/mymysql/the.pid
bash$
mysql_install_db
bash$
safe_mysql &
After you start mysqld the first time, you then connect to it as "root" and GRANT permissions to other users. (Again,
the MySQL root account has nothing to do with the *NIX root account.)
Note: You will need to start the daemons yourself. You can either ask your system administrator to add them to
system startup files, or add a crontab entry that runs a script to check on these daemons and restart them if
needed.
Warning
Do NOT run daemons or other services on a server without first consulting your system administrator!
Daemons use up system resources and running one may be in violation of your terms of service for any
machine on which you are a user!
25
Chapter 2. Installing Bugzilla
2.6.3. Perl
On the extremely rare chance that you don’t have Perl on the machine, you will have to build the sources yourself.
The following commands should get your system installed with your own personal version of Perl:
bash$
wget http://perl.org/CPAN/src/stable.tar.gz
bash$
tar zvxf stable.tar.gz
bash$
cd perl-5.8.1 (or whatever the version of Perl is called)
bash$
sh Configure -de -Dprefix=/home/foo/perl
bash$
make && make test && make install
Once you have Perl installed into a directory (probably in ~/perl/bin), you will need to install the Perl Modules,
described below.
Note: You will need to start the daemons yourself. You can either ask your system administrator to add them to
system startup files, or add a crontab entry that runs a script to check on these daemons and restart them if
needed.
26
Chapter 2. Installing Bugzilla
Warning
Do NOT run daemons or other services on a server without first consulting your system administrator!
Daemons use up system resources and running one may be in violation of your terms of service for any
machine on which you are a user!
2.6.6. Bugzilla
When you run ./checksetup.pl to create the localconfig file, it will list the Perl modules it finds. If one is missing,
go back and double-check the module installation from Section 2.6.4, then delete the localconfig file and try again.
Warning
One option in localconfig you might have problems with is the web server group. If you can’t successfully
browse to the index.cgi (like a Forbidden error), you may have to relax your permissions, and blank out the
web server group. Of course, this may pose as a security risk. Having a properly jailed shell and/or limited
access to shell accounts may lessen the security risk, but use at your own risk.
for i in docs graphs images js skins; do find $i -type d -exec chmod o+rx {} \; ; done
for i in jpg gif css js png html rdf xul; do find . -name \*.$i -exec chmod o+r {} \; ; done
find . -name .htaccess -exec chmod o+r {} \;
chmod o+x . data data/webdot
Pay particular attention to the number of semicolons and dots. They are all important. A future version of Bugzilla
will hopefully be able to do this for you out of the box.
27
Chapter 2. Installing Bugzilla
Note: Any examples in the following sections are written as though the user were updating to version 2.22.1,
but the procedures are the same no matter what version you’re updating to. Also, in the examples, the user’s
Bugzilla installation is found at /var/www/html/bugzilla. If that is not the same as the location of your Bugzilla
installation, simply substitute the proper paths where appropriate.
1. Read the Release Notes (http://www.bugzilla.org/releases/) of the version you’re upgrading to, particularly the
"Notes for Upgraders" section.
2. View the Sanity Check (Section 3.16) page on your installation before upgrading. Attempt to fix all warnings that
the page produces before you go any further, or you may experience problems during your upgrade.
3. Shut down your Bugzilla installation by putting some HTML or text in the shutdownhtml parameter (see Section
3.1).
4. Make a backup of the Bugzilla database. THIS IS VERY IMPORTANT. If anything goes wrong during the upgrade,
your installation can be corrupted beyond recovery. Having a backup keeps you safe.
Warning
Upgrading is a one-way process. You cannot "downgrade" an upgraded Bugzilla. If you wish to
revert to the old Bugzilla version for any reason, you will have to restore your database from this
backup.
Here are some sample commands you could use to backup your database, depending on what database system
you’re using. You may have to modify these commands for your particular setup.
MySQL:
mysqldump --opt -u bugs -p bugs > bugs.sql
PostgreSQL:
pg_dump --no-privileges --no-owner -h localhost -U bugs > bugs.sql
28
Chapter 2. Installing Bugzilla
bash$ cd /var/www/html/bugzilla
bash$ cvs login
Logging in to :pserver:[email protected]:2401/cvsroot
CVS password: (’anonymous’, or just leave it blank)
bash$ cvs -q update -r BUGZILLA-2_22_1 -dP
P checksetup.pl
P collectstats.pl
P docs/rel_notes.txt
P template/en/default/list/quips.html.tmpl
(etc.)
Caution
If a line in the output from cvs update begins with a C, then that represents a file with local changes that
CVS was unable to properly merge. You need to resolve these conflicts manually before Bugzilla (or at least
the portion using that file) will be usable.
29
Chapter 2. Installing Bugzilla
bash$ cd /var/www/html
bash$ wget http://ftp.mozilla.org/pub/mozilla.org/webtools/bugzilla-2.22.1.tar.gz
(Output omitted)
bash$ tar xzvf bugzilla-2.22.1.tar.gz
bugzilla-2.22.1/
bugzilla-2.22.1/.cvsignore
(Output truncated)
bash$ cd bugzilla-2.22.1
bash$ cp ../bugzilla/localconfig* .
bash$ cp -r ../bugzilla/data .
bash$ cd ..
bash$ mv bugzilla bugzilla.old
bash$ mv bugzilla-2.22.1 bugzilla
Warning
The cp commands both end with periods which is a very important detail--it means that the destination
directory is the current working directory.
This upgrade method will give you a clean install of Bugzilla. That’s fine if you don’t have any local customizations
that you want to maintain. If you do have customizations, then you will need to reapply them by hand to the appropriate
files.
bash$ cd /var/www/html/bugzilla
bash$ wget http://ftp.mozilla.org/pub/mozilla.org/webtools/bugzilla-2.22-to-2.22.1.diff.gz
(Output omitted)
bash$ gunzip bugzilla-2.22-to-2.22.1.diff.gz
bash$ patch -p1 < bugzilla-2.22-to-2.22.1.diff
patching file checksetup.pl
patching file collectstats.pl
(etc.)
30
Chapter 2. Installing Bugzilla
Warning
Be aware that upgrading from a patch file does not change the entries in your CVS directory. This could make
it more difficult to upgrade using CVS (Section 2.7.2.2) in the future.
1. If your new Bugzilla installation is in a different directory or on a different machine than your old Bugzilla
installation, make sure that you have copied the data directory and the localconfig file from your old Bugzilla
installation. (If you followed the tarball instructions above, this has already happened.)
2. If this is a major update, check that the configuration (Section 2.2) for your new Bugzilla is up-to-date. Sometimes
the configuration requirements change between major versions.
3. If you didn’t do it as part of the above configuration step, now you need to run checksetup.pl, which will do
everything required to convert your existing database and settings for the new version:
bash$ cd /var/www/html/bugzilla
bash$ ./checksetup.pl
Warning
The period at the beginning of the command ./checksetup.pl is important and can not be omitted.
Caution
If this is a major upgrade (say, 2.22 to 3.0 or similar), running checksetup.pl on a large installation
(75,000 or more bugs) can take a long time, possibly several hours.
4. Clear any HTML or text that you put into the shutdownhtml parameter, to re-activate Bugzilla.
5. View the Sanity Check (Section 3.16) page in your upgraded Bugzilla.
It is recommended that, if possible, you fix any problems you see, immediately. Failure to do this may mean that
Bugzilla will not work correctly. Be aware that if the sanity check page contains more errors after an upgrade,
it doesn’t necessarily mean there are more errors in your database than there were before, as additional tests are
added to the sanity check over time, and it is possible that those errors weren’t being checked for in the old
version.
31
Chapter 2. Installing Bugzilla
32
Chapter 3. Administering Bugzilla
maintainer
Email address of the person responsible for maintaining this Bugzilla installation. The address need not be that
of a valid Bugzilla account.
urlbase
Defines the fully qualified domain name and web server path to this Bugzilla installation.
For example, if the Bugzilla query page is http://www.foo.com/bugzilla/query.cgi, the “urlbase”
should be set to http://www.foo.com/bugzilla/.
docs_urlbase
Defines path to the Bugzilla documentation. This can be a fully qualified domain name, or a path relative to
"urlbase".
For example, if the "Bugzilla Configuration" page of the documentation is
http://www.foo.com/bugzilla/docs/html/parameters.html, set the “docs_urlbase” to
http://www.foo.com/bugzilla/docs/html/.
sslbase
Defines the fully qualified domain name and web server path for HTTPS (SSL) connections to this Bugzilla
installation.
For example, if the Bugzilla main page is https://www.foo.com/bugzilla/index.cgi, the “sslbase”
should be set to https://www.foo.com/bugzilla/.
ssl_redirect
If enabled, Bugzilla will force HTTPS (SSL) connections, by automatically redirecting any users who try to use
a non-SSL connection.
cookiedomain
Defines the domain for Bugzilla cookies. This is typically left blank. If there are multiple hostnames that point
to the same webserver, which require the same cookie, then this parameter can be utilized. For example, If your
33
Chapter 3. Administering Bugzilla
website is at https://www.foo.com/, setting this to .foo.com/ will also allow bar.foo.com/ to access
Bugzilla cookies.
cookiepath
Defines a path, relative to the web server root, that Bugzilla cookies will be restricted to. For example, if the
urlbase is set to http://www.foo.com/bugzilla/, the cookiepath should be set to /bugzilla/. Setting it
to "/" will allow all sites served by this web server or virtual host to read Bugzilla cookies.
utf8
Determines whether to use UTF-8 (Unicode) encoding for all text in Bugzilla. New installations should set this
to true to avoid character encoding problems. Existing databases should set this to true only after the data has
been converted from existing legacy character encoding to UTF-8, using the contrib/recode.pl script.
Note: If you turn this parameter from "off" to "on", you must re-run checksetup.pl immediately afterward.
shutdownhtml
If there is any text in this field, this Bugzilla installation will be completely disabled and this text will appear
instead of all Bugzilla pages for all users, including Admins. Used in the event of site maintenance or outage
situations.
Note: Although regular log-in capability is disabled while shutdownhtml is enabled, safeguards are in place
to protect the unfortunate admin who loses connection to Bugzilla. Should this happen to you, go directly to
the editparams.cgi (by typing the URL in manually, if necessary). Doing this will prompt you to log in, and
your name/password will be accepted here (but nowhere else).
announcehtml
Any text in this field will be displayed at the top of every HTML page in this Bugzilla installation. The text is
not wrapped in any tags. For best results, wrap the text in a “<div>” tag. Any style attributes from the CSS can
be applied. For example, to make the text green inside of a red box, add “id=message” to the “<div>” tag.
proxy_url
If this Bugzilla installation is behind a proxy, enter the proxy information here to enable Bugzilla to access the
Internet. Bugzilla requires Internet access to utilize the upgrade_notification parameter (below). If the proxy
requires authentication, use the syntax: http://user:pass@proxy_url/.
upgrade_notification
Enable or disable a notification on the homepage of this Bugzilla installation when a newer version of Bugzilla
is available. This notification is only visible to administrators. Choose "disabled", to turn off the notification.
Otherwise, choose which version of Bugzilla you want to be notified about: "development_snapshot" is the latest
release on the trunk; "latest_stable_release" is the most recent release available on the most recent stable branch;
"stable_branch_release" the most recent release on the branch this installation is based on.
34
Chapter 3. Administering Bugzilla
emailregexp
Defines the regular expression used to validate email addresses used for login names. The default attempts to
match fully qualified email addresses (i.e. ’[email protected]’). Some Bugzilla installations allow only local
user names (i.e ’user’ instead of ’[email protected]’). In that case, the emailsuffix parameter should be used
to define the email domain.
emailsuffix
This string is appended to login names when actually sending email to a user. For example, If emailregexp
has been set to allow local usernames, then this parameter would contain the email domain for all users (i.e.
’@example.com’).
3.1.4. Attachments
This page allows for setting restrictions and other parameters regarding attachments to bugs. For example, control size
limitations and whether to allow pointing to external files via a URI.
commenton*
All these fields allow you to dictate what changes can pass without comment, and which must have a comment
from the person who changed them. Often, administrators will allow users to add themselves to the CC list,
accept bugs, or change the Status Whiteboard without adding a comment as to their reasons for the change, yet
require that most other changes come with an explanation.
Set the "commenton" options according to your site policy. It is a wise idea to require comments when users
resolve, reassign, or reopen bugs at the very least.
35
Chapter 3. Administering Bugzilla
Note: It is generally far better to require a developer comment when resolving bugs than not. Few things are
more annoying to bug database users than having a developer mark a bug "fixed" without any comment as
to what the fix was (or even that it was truly fixed!)
noresolveonopenblockers
This option will prevent users from resolving bugs as FIXED if they have unresolved dependencies. Only the
FIXED resolution is affected. Users will be still able to resolve bugs to resolutions other than FIXED if they have
unresolved dependent bugs.
useqacontact
This allows you to define an email address for each component, in addition to that of the default assignee, who
will be sent carbon copies of incoming bugs.
usestatuswhiteboard
This defines whether you wish to have a free-form, overwritable field associated with each bug. The advantage
of the Status Whiteboard is that it can be deleted or modified with ease, and provides an easily-searchable field
for indexing some bugs that have some trait in common.
36
Chapter 3. Administering Bugzilla
makeproductgroups
Determines whether or not to automatically create groups when new products are created. If this is on, the groups
will be used for querying bugs.
usevisibilitygroups
If selected, user visibility will be restricted to members of groups, as selected in the group configuration settings.
Each user-defined group can be allowed to see members of selected other groups. For details on configuring
groups (including the visibility restrictions) see Section 3.15.2.
querysharegroup
The name of the group of users who are allowed to share saved searches with one another. For more information
on using saved searches, see Saved Searches.
Caution
Because the Bugzilla account is not created until the first time a user logs in, a user who has not yet
logged is unknown to Bugzilla. This means they cannot be used as an assignee or QA contact (de-
fault or otherwise), added to any CC list, or any other such operation. One possible workaround is the
bugzilla_ldapsync.rb script in the contrib directory. Another possible solution is fixing bug 201069
(https://bugzilla.mozilla.org/show_bug.cgi?id=201069).
37
Chapter 3. Administering Bugzilla
user_verify_class
If you want to list “LDAP” here, make sure to have set up the other parameters listed below. Unless you have
other (working) authentication methods listed as well, you may otherwise not be able to log back in to Bugzilla
once you log out. If this happens to you, you will need to manually edit data/params and set user_verify_class
to “DB”.
LDAPserver
This parameter should be set to the name (and optionally the port) of your LDAP server. If no port is specified, it
assumes the default LDAP port of 389.
For example: “ldap.company.com” or “ldap.company.com:3268”
You can also specify a LDAP URI, so as to use other protocols, such as LDAPS or LDAPI. If port was not
specified in the URI, the default is either 389 or 636 for ’LDAP’ and ’LDAPS’ schemes respectively.
Tip: In order to use SSL with LDAP, specify a URI with "ldaps://". This will force the use of SSL over port 636.
LDAPbinddn [Optional]
Some LDAP servers will not allow an anonymous bind to search the directory. If this is the case with your
configuration you should set the LDAPbinddn parameter to the user account Bugzilla should use instead of the
anonymous bind.
Ex. “cn=default,cn=user:password”
LDAPBaseDN
The LDAPBaseDN parameter should be set to the location in your LDAP tree that you would like to search for
email addresses. Your uids should be unique under the DN specified here.
Ex. “ou=People,o=Company”
LDAPuidattribute
The LDAPuidattribute parameter should be set to the attribute which contains the unique UID of your users. The
value retrieved from this attribute will be used when attempting to bind as the user to confirm their password.
Ex. “uid”
LDAPmailattribute
The LDAPmailattribute parameter should be the name of the attribute which contains the email address your
users will enter into the Bugzilla login boxes.
Ex. “mail”
38
Chapter 3. Administering Bugzilla
Note: Most caveats that apply to LDAP authentication apply to RADIUS authentication as well. See Section 3.1.10
for details.
user_verify_class
If you want to list “RADIUS” here, make sure to have set up the other parameters listed below. Unless you have
other (working) authentication methods listed as well, you may otherwise not be able to log back in to Bugzilla
once you log out. If this happens to you, you will need to manually edit data/params and set user_verify_class
to “DB”.
RADIUS_server
This parameter should be set to the name (and optionally the port) of your RADIUS server.
RADIUS_secret
This parameter should be set to the RADIUS server’s secret.
RADIUS_email_suffix
Bugzilla needs an e-mail address for each user account. Therefore, it needs to determine the e-mail address
corresponding to a RADIUS user. Bugzilla offers only a simple way to do this: it can concatenate a suffix to the
RADIUS user name to convert it into an e-mail address. You can specify this suffix in the RADIUS_email_suffix
parameter.
If this simple solution does not work for you, you’ll probably need to modify
Bugzilla/Auth/Verify/RADIUS.pm to match your requirements.
3.1.12. Email
This page contains all of the parameters for configuring how Bugzilla deals with the email notifications it sends. See
below for a summary of important options.
mail_delivery_method
This is used to specify how email is sent, or if it is sent at all. There are several options included for different
MTAs, along with two additional options that disable email sending. "Test" does not send mail, but instead saves
it in data/mailer.testfile for later review. "None" disables email sending entirely.
mailfrom
This is the email address that will appear in the "From" field of all emails sent by this Bugzilla installation. Some
email servers require mail to be from a valid email address, therefore it is recommended to choose a valid email
address here.
39
Chapter 3. Administering Bugzilla
sendmailnow
When Bugzilla is using Sendmail older than 8.12, turning this option off will improve performance by not waiting
for Sendmail to actually send mail. If Sendmail 8.12 or later is being used, there is nothing to gain by turning this
off. If another MTA is being used, such as Postfix, then this option *must* be turned on (even if you are using
the fake sendmail executable that Postfix provides).
whinedays
Set this to the number of days you want to let bugs go in the NEW or REOPENED state before notifying people
they have untouched new bugs. If you do not plan to use this feature, simply do not set up the whining cron job
described in the installation instructions, or set this value to "0" (never whine).
globalwatcher
This allows you to define specific users who will receive notification each time a new bug in entered, or when an
existing bug changes, according to the normal groupset permissions. It may be useful for sending notifications to
a mailing-list, for instance.
Note: As of version 3.2, Bugzilla no longer uses the MyISAM table type. Instead, InnoDB is used, which can do
transaction-based locking. Therefore, the limitations the Shadow Database feature was designed to workaround
no longer exist.
40
Chapter 3. Administering Bugzilla
Tip: If you wish to add more administrative users, add them to the "admin" group and, optionally, edit the tweak-
params, editusers, creategroups, editcomponents, and editkeywords groups to add the entire admin group to
those groups (which is the case by default).
41
Chapter 3. Administering Bugzilla
3.2.2.2.1. Self-registration
By default, users can create their own user accounts by clicking the “New Account” link at the bottom of each
page (assuming they aren’t logged in as someone else already). If you want to disable this self-registration, or if
you want to restrict who can create his own user account, you have to edit the “createemailregexp” parameter in the
“Configuration” page, see Section 3.1.
1. After logging in, click the "Users" link at the footer of the query page, and then click "Add a new user".
2. Fill out the form presented. This page is self-explanatory. When done, click "Submit".
Note: Adding a user this way will not send an email informing them of their username and password. While
useful for creating dummy accounts (watchers which shuttle mail to another system, for instance, or email
addresses which are a mailing list), in general it is preferable to log out and use the “New Account” button to
create users, as it will pre-populate all the required fields and also notify the user of her account name and
password.
• Login Name: This is generally the user’s full email address. However, if you have are using the “emailsuffix”
parameter, this may just be the user’s login name. Note that users can now change their login names themselves (to
any valid email address).
• Real Name: The user’s real name. Note that Bugzilla does not require this to create an account.
• Password: You can change the user’s password here. Users can automatically request a new password, so you
shouldn’t need to do this often. If you want to disable an account, see Disable Text below.
• Bugmail Disabled: Mark this checkbox to disable bugmail and whinemail completely for this account. This check-
box replaces the data/nomail file which existed in older versions of Bugzilla.
• Disable Text: If you type anything in this box, including just a space, the user is prevented from logging in, or
making any changes to bugs via the web interface. The HTML you type in this box is presented to the user when
they attempt to perform these actions, and should explain why the account was disabled.
Users with disabled accounts will continue to receive mail from Bugzilla; furthermore, they will not be able to
log in themselves to change their own preferences and stop it. If you want an account (disabled or active) to stop
receiving mail, simply check the “Bugmail Disabled” checkbox above.
42
Chapter 3. Administering Bugzilla
Note: Even users whose accounts have been disabled can still submit bugs via the e-mail gateway, if one exists.
The e-mail gateway should not be enabled for secure installations of Bugzilla.
Warning
Don’t disable all the administrator accounts!
• <groupname>: If you have created some groups, e.g. "securitysensitive", then checkboxes will appear here to allow
you to add users to, or remove them from, these groups.
• canconfirm: This field is only used if you have enabled the "unconfirmed" status. If you enable this for a user, that
user can then move bugs from "Unconfirmed" to a "Confirmed" status (e.g.: "New" status).
• creategroups: This option will allow a user to create and destroy groups in Bugzilla.
• editbugs: Unless a user has this bit set, they can only edit those bugs for which they are the assignee or the reporter.
Even if this option is unchecked, users can still add comments to bugs.
• editcomponents: This flag allows a user to create new products and components, as well as modify and destroy
those that have no bugs associated with them. If a product or component has bugs associated with it, those bugs
must be moved to a different product or component before Bugzilla will allow them to be destroyed.
• editkeywords: If you use Bugzilla’s keyword functionality, enabling this feature allows a user to create and destroy
keywords. As always, the keywords for existing bugs containing the keyword the user wishes to destroy must be
changed before Bugzilla will allow it to die.
• editusers: This flag allows a user to do what you’re doing right now: edit other users. This will allow those with the
right to do so to remove administrator privileges from other users or grant them to themselves. Enable with care.
• tweakparams: This flag allows a user to change Bugzilla’s Params (using editparams.cgi.)
• <productname>: This allows an administrator to specify the products in which a user can see bugs. If you turn on
the “makeproductgroups” parameter in the Group Security Panel in the Parameters page, then Bugzilla creates one
group per product (at the time you create the product), and this group has exactly the same name as the product
itself. Note that for products that already exist when the parameter is turned on, the corresponding group will not
be created. The user must still have the “editbugs” privilege to edit bugs in these products.
43
Chapter 3. Administering Bugzilla
Note: To use the sudo feature, you must be in the bz_sudoers group. By default, all administrators are in this
group.
If you have access to this feature, you may start a session by going to the Edit Users page, Searching for a user and
clicking on their login. You should see a link below their login name titled "Impersonate this user". Click on the link.
This will take you to a page where you will see a description of the feature and instructions for using it. After reading
the text, simply enter the login of the user you would like to impersonate, provide a short message explaining why
you are doing this, and press the button.
As long as you are using this feature, everything you do will be done as if you were logged in as the user you are
impersonating.
Warning
The user you are impersonating will not be told about what you are doing. If you do anything that results in
mail being sent, that mail will appear to be from the user you are impersonating. You should be extremely
careful while using this feature.
3.3. Classifications
Classifications tend to be used in order to group several related products into one distinct entity.
The classifications layer is disabled by default; it can be turned on or off using the useclassification parameter, in the
Bug Fields section of the edit parameters screen.
Access to the administration of classifications is controlled using the editclassifications system group, which defines
a privilege for creating, destroying, and editing classifications.
When activated, classifications will introduce an additional step when filling bugs (dedicated to classification selec-
tion), and they will also appear in the advanced search form.
3.4. Products
Products typically represent real-world shipping products. Products can be given Classifications. For example, if
a company makes computer games, they could have a classification of "Games", and a separate product for each
game. This company might also have a “Common” product for units of technology used in multiple games, and
perhaps a few special products that represent items that are not actually shipping products (for example, "Website", or
"Administration").
Many of Bugzilla’s settings are configurable on a per-product basis. The number of “votes” available to users is set
per-product, as is the number of votes required to move a bug automatically from the UNCONFIRMED status to the
NEW status.
When creating or editing products the following options are available:
44
Chapter 3. Administering Bugzilla
Product
The name of the product
Description
A brief description of the product
Default milestone
Select the default milestone for this product.
Confirmation threshold
Number of votes needed to automatically remove any bug against this product from the UNCONFIRMED state
Version
Specify which version of the product bugs will be entered against.
1. Select “Administration” from the footer and then choose “Products” from the main administration page.
2. Select the “Add” link in the bottom right.
3. Enter the name of the product and a description. The Description field may contain HTML.
4. When the product is created, Bugzilla will give a message stating that a component must be created before any
bugs can be entered against the new product. Follow the link to create a new component. See Components for
more information.
45
Chapter 3. Administering Bugzilla
Note: Products and Groups are not limited to a one-to-one relationship. Multiple groups can be associated with
the same product, and groups can be associated with more than one product.
If any group has Entry selected, then the product will restrict bug entry to only those users who are members of all
the groups with Entry selected.
46
Chapter 3. Administering Bugzilla
If any group has Canedit selected, then the product will be read-only for any users who are not members of all of the
groups with Canedit selected. Only users who are members of all the Canedit groups will be able to edit bugs for this
product. This is an additional restriction that enables finer-grained control over products rather than just all-or-nothing
access levels.
The following settings let you choose privileges on a per-product basis. This is a convenient way to give privileges to
some users for some products only, without having to give them global privileges which would affect all products.
Any group having editcomponents selected allows users who are in this group to edit all aspects of this product,
including components, milestones and versions.
Any group having canconfirm selected allows users who are in this group to confirm bugs in this product.
Any group having editbugs selected allows users who are in this group to edit all fields of bugs in this product.
The MemberControl and OtherControl are used in tandem to determine which bugs will be placed in this group. The
only allowable combinations of these two parameters are listed in a table on the "Edit Group Access Controls" page.
Consult this table for details on how these fields can be used. Examples of different uses are described below.
Product Bar:
foo: ENTRY, MANDATORY/MANDATORY, CANEDIT
Perhaps such strict restrictions are not needed for product "Bar". A more lenient way to configure product "Bar" and
group "Foo" would be:
Product Bar:
foo: ENTRY, SHOWN/SHOWN, EDITCOMPONENTS, CANCONFIRM, EDITBUGS
The above indicates that for product "Bar", members of group "Foo" can enter bugs. Any one with permission to edit
a bug against product "Bar" can put the bug in group "Foo", even if they themselves are not in "Foo". Anyone in group
"Foo" can edit all aspects of the components of product "Bar", can confirm bugs against product "Bar", and can edit
all fields of any bug against product "Bar".
General User Access With Security Group
To permit any user to file bugs against "Product A", and to permit any user to submit those bugs into a group called
"Security":
47
Chapter 3. Administering Bugzilla
Product A:
security: SHOWN/SHOWN
Product Security:
securityworkers: DEFAULT/MANDATORY
Product A:
AccessA: ENTRY, MANDATORY/MANDATORY
Product B:
AccessB: ENTRY, MANDATORY/MANDATORY
Perhaps the "Support Group" wants more control. For example, the "Support Group" could be permitted to make
bugs inaccessible to users of both groups "AccessA" and "AccessB". Then, the "Support Group" could be permitted
to publish bugs relevant to all users in a third product (let’s call it "Product Common") that is read-only to anyone
outside the "Support Group". In this way the "Support Group" could control bugs that should be seen by both groups.
That configuration would be:
Product A:
AccessA: ENTRY, MANDATORY/MANDATORY
Support: SHOWN/NA
Product B:
AccessB: ENTRY, MANDATORY/MANDATORY
Support: SHOWN/NA
Product Common:
Support: ENTRY, DEFAULT/MANDATORY, CANEDIT
48
Chapter 3. Administering Bugzilla
Sometimes a product is retired and should no longer have new bugs filed against it (for example, an older version of a
software product that is no longer supported). A product can be made read-only by creating a group called "readonly"
and adding products to the group as needed:
Product A:
ReadOnly: ENTRY, NA/NA, CANEDIT
Note: For more information on Groups outside of how they relate to products see Section 3.15.
3.5. Components
Components are subsections of a Product. E.g. the computer game you are designing may have a "UI" component, an
"API" component, a "Sound System" component, and a "Plugins" component, each overseen by a different program-
mer. It often makes sense to divide Components in Bugzilla according to the natural divisions of responsibility within
your Product or company.
Each component has a default assignee and (if you turned it on in the parameters), a QA Contact. The default assignee
should be the primary person who fixes bugs in that component. The QA Contact should be the person who will ensure
these bugs are completely fixed. The Assignee, QA Contact, and Reporter will get email when new bugs are created in
this Component and when these bugs change. Default Assignee and Default QA Contact fields only dictate the default
assignments; these can be changed on bug submission, or at any later point in a bug’s life.
To create a new Component:
1. Select the “Edit components” link from the “Edit product” page
2. Select the “Add” link in the bottom right.
3. Fill out the “Component” field, a short “Description”, the “Default Assignee”, “Default CC List” and “Default
QA Contact” (if enabled). The “Component Description” field may contain a limited subset of HTML tags. The
“Default Assignee” field must be a login name already existing in the Bugzilla database.
3.6. Versions
Versions are the revisions of the product, such as "Flinders 3.1", "Flinders 95", and "Flinders 2000". Version is not a
multi-select field; the usual practice is to select the earliest version known to have the bug.
To create and edit Versions:
49
Chapter 3. Administering Bugzilla
3. Enter the name of the Version. This field takes text only. Then click the "Add" button.
3.7. Milestones
Milestones are "targets" that you plan to get a bug fixed by. For example, you have a bug that you plan to fix for your
3.0 release, it would be assigned the milestone of 3.0.
Note: Milestone options will only appear for a Product if you turned on the "usetargetmilestone" parameter in the
"Bug Fields" tab of the "Parameters" page.
To create new Milestones, set Default Milestones, and set Milestone URL:
3.8. Flags
Flags are a way to attach a specific status to a bug or attachment, either “+” or “-”. The meaning of these symbols
depends on the text the flag itself, but contextually they could mean pass/fail, accept/reject, approved/denied, or even
a simple yes/no. If your site allows requestable flags, then users may set a flag to “?” as a request to another user that
they look at the bug/attachment, and set the flag to its correct status.
1. The Bugzilla administrator creates a flag type called “blocking2.0” that shows up on all bugs in your product.
It shows up on the “Show Bug” screen as the text “blocking2.0” with a drop-down box next to it. The drop-down
box contains four values: an empty space, “?”, “-”, and “+”.
2. The developer sets the flag to “?”.
3. The manager sees the blocking2.0 flag with a “?” value.
50
Chapter 3. Administering Bugzilla
4. If the manager thinks the feature should go into the product before version 2.0 can be released, he sets the flag to
“+”. Otherwise, he sets it to “-”.
5. Now, every Bugzilla user who looks at the bug knows whether or not the bug needs to be fixed before release of
version 2.0.
3.8.2.1. Values
Flags can have three values:
?
A user is requesting that a status be set. (Think of it as ’A question is being asked’.)
-
The status has been set negatively. (The question has been answered “no”.)
+
The status has been set positively. (The question has been answered “yes”.)
Actually, there’s a fourth value a flag can have -- “unset” -- which shows up as a blank space. This just means that
nobody has expressed an opinion (or asked someone else to express an opinion) about this bug or attachment.
51
Chapter 3. Administering Bugzilla
1. On the list of attachments in the “Show Bug” screen, you can see the current state of any flags that have been set
to ?, +, or -. You can see who asked about the flag (the requester), and who is being asked (the requestee).
2. When you “Edit” an attachment, you can see any settable flag, along with any flags that have already been set.
This “Edit Attachment” screen is where you set flags to ?, -, +, or unset them.
3. Requests are listed in the “Request Queue”, which is accessible from the “My Requests” link (if you are logged
in) or “Requests” link (if you are logged out) visible in the footer of all pages.
52
Chapter 3. Administering Bugzilla
3.8.5.2.1. Name
This is the name of the flag. This will be displayed to Bugzilla users who are looking at or setting the flag. The name
may contain any valid Unicode characters except commas and spaces.
3.8.5.2.2. Description
The description describes the flag in more detail. It is visible in a tooltip when hovering over a flag either in the “Show
Bug” or “Edit Attachment” pages. This field can be as long as you like, and can contain any character you want.
3.8.5.2.3. Category
Default behaviour for a newly-created flag is to appear on products and all components, which is why
“__Any__:__Any__” is already entered in the “Inclusions” box. If this is not your desired behaviour, you must
either set some exclusions (for products on which you don’t want the flag to appear), or you must remove
“__Any__:__Any__” from the Inclusions box and define products/components specifically for this flag.
To create an Inclusion, select a Product from the top drop-down box. You may also select a specific component
from the bottom drop-down box. (Setting “__Any__” for Product translates to, “all the products in this Bugzilla”.
Selecting “__Any__” in the Component field means “all components in the selected product.”) Selections made, press
“Include”, and your Product/Component pairing will show up in the “Inclusions” box on the right.
To create an Exclusion, the process is the same; select a Product from the top drop-down box, select a specific
component if you want one, and press “Exclude”. The Product/Component pairing will show up in the “Exclusions”
box on the right.
This flag will and can be set for any products/components that appearing in the “Inclusions” box (or which fall under
the appropriate “__Any__”). This flag will not appear (and therefore cannot be set) on any products appearing in the
“Exclusions” box. IMPORTANT: Exclusions override inclusions.
You may select a Product without selecting a specific Component, but you can’t select a Component without a Product,
or to select a Component that does not belong to the named Product. If you do so, Bugzilla will display an error
message, even if all your products have a component by that name.
Example: Let’s say you have a product called “Jet Plane” that has thousands of components. You want to be able to
ask if a problem should be fixed in the next model of plane you release. We’ll call the flag “fixInNext”. But, there’s
one component in “Jet Plane,” called “Pilot.” It doesn’t make sense to release a new pilot, so you don’t want to have
the flag show up in that component. So, you include “Jet Plane:__Any__” and you exclude “Jet Plane:Pilot”.
53
Chapter 3. Administering Bugzilla
3.8.5.2.5. Active
Sometimes, you might want to keep old flag information in the Bugzilla database, but stop users from setting any new
flags of this type. To do this, uncheck “active”. Deactivated flags will still show up in the UI if they are ?, +, or -, but
they may only be cleared (unset), and cannot be changed to a new value. Once a deactivated flag is cleared, it will
completely disappear from a bug/attachment, and cannot be set again.
3.8.5.2.6. Requestable
New flags are, by default, “requestable”, meaning that they offer users the “?” option, as well as “+” and “-”. To
remove the ? option, uncheck “requestable”.
3.8.5.2.8. Multiplicable
Any flag with “Multiplicable” set (default for new flags is ’on’) may be set more than once. After being set once, an
unset flag of the same type will appear below it with “addl.” (short for “additional”) before the name. There is no limit
to the number of times a Multiplicable flags may be set on the same bug/attachment.
3.8.5.2.9. CC List
If you want certain users to be notified every time this flag is set to ?, -, +, or unset, add them here. This is a comma-
separated list of email addresses that need not be restricted to Bugzilla usernames.
54
Chapter 3. Administering Bugzilla
Warning
Once you delete a flag, it is gone from your Bugzilla. All the data for that flag will be deleted. Everywhere
that flag was set, it will disappear, and you cannot get that data back. If you want to keep flag data, but don’t
want anybody to set any new flags or change current flags, unset “active” in the flag Edit form.
3.9. Keywords
The administrator can define keywords which can be used to tag and categorise bugs. For example, the keyword
"regression" is commonly used. A company might have a policy stating all regressions must be fixed by the next
release - this keyword can make tracking those bugs much easier.
Keywords are global, rather than per-product. If the administrator changes a keyword currently applied to any bugs,
the keyword cache must be rebuilt using the Section 3.16 script. Currently keywords can not be marked obsolete to
prevent future usage.
Keywords can be created, edited or deleted by clicking the "Keywords" link in the admin page. There are two fields
for each keyword - the keyword itself and a brief description. Once created, keywords can be selected and applied to
individual bugs in that bug’s "Details" section.
Tip: Before adding a Custom Field, make sure that Bugzilla can not already do the desired behavior. Many Bugzilla
options are not enabled by default, and many times Administrators find that simply enabling certain options that
already exist is sufficient.
Administrators can manage Custom Fields using the “Custom Fields” link on the Administration page. The Custom
Fields administration page displays a list of Custom Fields, if any exist, and a link to "Add a new custom field".
55
Chapter 3. Administering Bugzilla
• Name: The name of the field in the database, used internally. This name MUST begin with “cf_” to prevent confu-
sion with standard fields. If this string is omitted, it will be automatically added to the name entered.
• Description: A brief string which is used as the label for this Custom Field. That is the string that users will see,
and should be short and explicit.
• Type: The type of field to create. There are several types available:
Large Text Box: A multiple line box for entering free text.
Free Text: A single line box for entering free text.
Multiple-Selection Box: A list box where multiple options can be selected. After creating this field, it must be edited to add the sele
Drop Down: A list box where only one option can be selected. After creating this field, it must be edited to add the selection option
Date/Time: A date field. This field appears with a calendar widget for choosing the date.
• Sortkey: Integer that determines in which order Custom Fields are displayed in the User Interface, especially when
viewing a bug. Fields with lower values are displayed first.
• Can be set on bug creation: Boolean that determines whether this field can be set on bug creation. If not selected,
then a bug must be created before this field can be set. See Section 5.6 for information about filing bugs.
• Displayed in bugmail for new bugs: Boolean that determines whether the value set on this field should appear in
bugmail when the bug is filed. This attribute has no effect if the field cannot be set on bug creation.
• Is obsolete: Boolean that determines whether this field should be displayed at all. Obsolete Custom Fields are
hidden.
56
Chapter 3. Administering Bugzilla
with Bugzilla 2.23.3, the list of valid resolutions can be customized from the same interface. Since Bugzilla 3.1.1 the
list of valid bug statuses can be customized as well.
3.13. Voting
Voting allows users to be given a pot of votes which they can allocate to bugs, to indicate that they’d like them
fixed. This allows developers to gauge user need for a particular enhancement or bugfix. By allowing bugs with a
certain number of votes to automatically move from "UNCONFIRMED" to "NEW", users of the bug system can help
high-priority bugs garner attention so they don’t sit for a long time awaiting triage.
To modify Voting settings:
57
Chapter 3. Administering Bugzilla
1. Navigate to the "Edit product" screen for the Product you wish to modify
2. Maximum Votes per person: Setting this field to "0" disables voting.
3. Maximum Votes a person can put on a single bug: It should probably be some number lower than the "Maximum
votes per person". Don’t set this field to "0" if "Maximum votes per person" is non-zero; that doesn’t make any
sense.
4. Number of votes a bug in this product needs to automatically get out of the UNCONFIRMED state: Setting this
field to "0" disables the automatic move of bugs from UNCONFIRMED to NEW.
5. Once you have adjusted the values to your preference, click "Update".
3.14. Quips
Quips are small text messages that can be configured to appear next to search results. A Bugzilla installation can have
its own specific quips. Whenever a quip needs to be displayed, a random selection is made from the pool of already
existing quips.
Quips are controlled by the enablequips parameter. It has several possible values: on, approved, frozen or off. In order
to enable quips approval you need to set this parameter to "approved". In this way, users are free to submit quips for
addition but an administrator must explicitly approve them before they are actually used.
In order to see the user interface for the quips, it is enough to click on a quip when it is displayed together with the
search results. Or it can be seen directly in the browser by visiting the quips.cgi URL (prefixed with the usual web
location of the Bugzilla installation). Once the quip interface is displayed, it is enough to click the "view and edit the
whole quip list" in order to see the administration page. A page with all the quips available in the database will be
displayed.
Next to each tip there is a checkbox, under the "Approved" column. Quips who have this checkbox checked are already
approved and will appear next to the search results. The ones that have it unchecked are still preserved in the database
but they will not appear on search results pages. User submitted quips have initially the checkbox unchecked.
Also, there is a delete link next to each quip, which can be used in order to permanently delete a quip.
1. The group configuration page. To view or edit existing groups, or to create new groups, access the "Groups" link
from the "Administration" page. This section of the manual deals primarily with the aspect of group controls
accessed on this page.
58
Chapter 3. Administering Bugzilla
2. Global configuration parameters. Bugzilla has several parameters that control the overall default group behavior
and restriction levels. For more information on the parameters that control group behavior globally, see Section
3.1.9.
3. Product association with groups. Most of the functionality of groups and group security is controlled at the
product level. Some aspects of group access controls for products are discussed in this section, but for more detail
see Section 3.4.4.
4. Group access for users. See Section 3.15.3 for details on how users are assigned group access.
Group permissions are such that if a bug belongs to a group, only members of that group can see the bug. If a bug is in
more than one group, only members of all the groups that the bug is in can see the bug. For information on granting
read-only access to certain people and full edit access to others, see Section 3.4.4.
Note: By default, bugs can also be seen by the Assignee, the Reporter, and by everyone on the CC List, regardless
of whether or not the bug would typically be viewable by them. Visibility to the Reporter and CC List can be
overridden (on a per-bug basis) by bringing up the bug, finding the section that starts with “Users in the roles
selected below...” and un-checking the box next to either ’Reporter’ or ’CC List’ (or both).
1. Select the “Administration” link in the page footer, and then select the “Groups” link from the Administration
page.
2. A table of all the existing groups is displayed. Below the table is a description of all the fields. To create a new
group, select the “Add Group” link under the table of existing groups.
3. There are five fields to fill out. These fields are documented below the form. Choose a name and description
for the group. Decide whether this group should be used for bugs (in all likelihood this should be selected).
Optionally, choose a regular expression that will automatically add any matching users to the group, and choose
an icon that will help identify user comments for the group. The regular expression can be useful, for example,
to automatically put all users from the same company into one group (if the group is for a specific customer or
partner).
Note: If “User RegExp” is filled out, users whose email addresses match the regular expression will automat-
ically be members of the group as long as their email addresses continue to match the regular expression.
If their email address changes and no longer matches the regular expression, they will be removed from
the group. Versions 2.16 and older of Bugzilla did not automatically remove users who’s email addresses no
longer matched the RegExp.
Warning
If specifying a domain in the regular expression, end the regexp with a "$". Otherwise,
when granting access to "@mycompany\.com", access will also be granted to
’[email protected]’. Use the syntax, ’@mycompany\.com$’ for the regular
expression.
59
Chapter 3. Administering Bugzilla
4. After the new group is created, it can be edited for additional options. The "Edit Group" page allows for specifying
other groups that should be included in this group and which groups should be permitted to add and delete users
from this group. For more details, see Section 3.15.2.
60
Chapter 3. Administering Bugzilla
1. The user can be explicitly placed in the group by editing the user’s profile. This can be done by accessing the
"Users" page from the "Administration" page. Use the search form to find the user you want to edit group mem-
bership for, and click on their email address in the search results to edit their profile. The profile page lists all
the groups, and indicates if the user is a member of the group either directly or indirectly. More information on
indirect group membership is below. For more details on User administration, see Section 3.2.
2. The group can include another group of which the user is a member. This is indicated by square brackets around
the checkbox next to the group name in the user’s profile. See Section 3.15.2 for details on group inheritance.
3. The user’s email address can match the regular expression that has been specified to automatically grant mem-
bership to the group. This is indicated by "*" around the check box by the group name in the user’s profile. See
Section 3.15.1 for details on the regular expression option when creating groups.
61
Chapter 3. Administering Bugzilla
Warning
The "Sanity Check" script is no substitute for a competent database administrator. It is only designed to
check and repair basic database problems.
62
Chapter 4. Bugzilla Security
While some of the items in this chapter are related to the operating system Bugzilla is running on or some of the support
software required to run Bugzilla, it is all related to protecting your data. This is not intended to be a comprehensive
guide to securing Linux, Apache, MySQL, or any other piece of software mentioned. There is no substitute for active
administration and monitoring of a machine. The key to good security is actually right in the middle of the word: U R
It.
While programmers in general always strive to write secure code, accidents can and do happen. The best approach to
security is to always assume that the program you are working with isn’t 100% secure and restrict its access to other
parts of your machine as much as possible.
Note: You will need to set the webservergroup option in localconfig to the group your web server runs as. This
will allow ./checksetup.pl to set file permissions on Unix systems so that nothing is world-writable.
63
Chapter 4. Bugzilla Security
Tip: Bugzilla ships with the ability to create .htaccess files that enforce these rules. Instructions for enabling
these directives in Apache can be found in Section 2.2.4.1
• In data:
• Block everything
• In data/webdot:
• If you use a remote webdot server:
• Block everything
• But allow *.dot only for the remote webdot server
• In Bugzilla:
• Block everything
• In template:
• Block everything
Be sure to test that data that should not be accessed remotely is properly blocked. Of particular interest
is the localconfig file which contains your database password. Also, be aware that many editors create
temporary and backup files in the working directory and that those should also not be accessible. For more
64
Chapter 4. Bugzilla Security
Tip: Be sure to check Section 2.2.4 for instructions specific to the web server you use.
4.3. Bugzilla
65
Chapter 5. Using Bugzilla
5.1. Introduction
This section contains information for end-users of Bugzilla. There is a Bugzilla test installation, called Landfill
(http://landfill.bugzilla.org/), which you are welcome to play with (if it’s up). However, not all of the Bugzilla in-
stallations there will necessarily have all Bugzilla features enabled, and different installations run different versions,
so some things may not quite work as this document describes.
Frequently Asked Questions (FAQ) are available and answered on wiki.mozilla.org
(http://wiki.mozilla.org/Bugzilla:FAQ). They may cover some questions you have which are left unanswered.
1. On the home page index.cgi, click the “Open a new Bugzilla account” link, or the “New Account” link avail-
able in the footer of pages. Now enter your email address, then click the “Send” button.
Note: If none of these links is available, this means that the administrator of the installation has disabled self-
registration. This means that only an administrator can create accounts for other users. One reason could be
that this installation is private.
Note: Also, if only some users are allowed to create an account on the installation, you may see these links
but your registration may fail if your email address doesn’t match the ones accepted by the installation. This
is another way to restrict who can access and edit bugs in this installation.
2. Within moments, and if your registration is accepted, you should receive an email to the address you provided,
which contains your login name (generally the same as the email address), and two URLs with a token (a random
string generated by the installation) to confirm, respectively cancel, your registration. This is a way to prevent
users from abusing the generation of user accounts, for instance by entering inexistent email addresses, or email
addresses which do not belong to them.
3. By default, you have 3 days to confirm your registration. Past this timeframe, the token is invalidated and the
registration is automatically canceled. You can also cancel this registration sooner by using the appropriate URL
in the email you got.
4. If you confirm your registration, Bugzilla will ask you your real name (optional, but recommended) and your
password, which must be between 3 and 16 characters long.
66
Chapter 5. Using Bugzilla
5. Now all you need to do is to click the “Log In” link in the footer at the bottom of the page in your browser, enter
your email address and password you just chose into the login form, and click the “Log in” button.
You are now logged in. Bugzilla uses cookies to remember you are logged in so, unless you have cookies disabled or
your IP address changes, you should not have to log in again during your session.
1. Product and Component: Bugs are divided up by Product and Component, with a Product having one or more
Components in it. For example, bugzilla.mozilla.org’s "Bugzilla" Product is composed of several Components:
2. Status and Resolution: These define exactly what state the bug is in - from not even being confirmed as a bug,
through to being fixed and the fix confirmed by Quality Assurance. The different possible values for Status and
Resolution on your installation should be documented in the context-sensitive help for those items.
3. Assigned To: The person responsible for fixing the bug.
4. *QA Contact: The person responsible for quality assurance on this bug.
5. *URL: A URL associated with the bug, if any.
6. Summary: A one-sentence summary of the problem.
7. *Status Whiteboard: (a.k.a. Whiteboard) A free-form text area for adding short notes and tags to a bug.
8. *Keywords: The administrator can define keywords which you can use to tag and categorise bugs - e.g. The
Mozilla Project has keywords like crash and regression.
9. Platform and OS: These indicate the computing environment where the bug was found.
10. Version: The "Version" field is usually used for versions of a product which have been released, and is set to
indicate which versions of a Component have the particular problem the bug report is about.
11. Priority: The bug assignee uses this field to prioritize his or her bugs. It’s a good idea not to change this on other
people’s bugs.
12. Severity: This indicates how severe the problem is - from blocker ("application unusable") to trivial ("minor
cosmetic issue"). You can also use this field to indicate whether a bug is an enhancement request.
67
Chapter 5. Using Bugzilla
13. *Target: (a.k.a. Target Milestone) A future version by which the bug is to be fixed. e.g. The Bugzilla Project’s
milestones for future Bugzilla versions are 2.18, 2.20, 3.0, etc. Milestones are not restricted to numbers, thought
- you can use any text strings, such as dates.
14. Reporter: The person who filed the bug.
15. CC list: A list of people who get mail when the bug changes.
16. *Time Tracking: This form can be used for time tracking. To use this feature, you have to be blessed group
membership specified by the “timetrackinggroup” parameter.
Orig. Est.: This field shows the original estimated time.
Current Est.: This field shows the current estimated time. This number is calculated from “Hours Worked” and “Hours Left”.
Hours Worked: This field shows the number of hours worked.
Hours Left: This field shows the “Current Est.” - “Hours Worked”. This value + “Hours Worked” will become the new Current Es
%Complete: This field shows what percentage of the task is complete.
Gain: This field shows the number of hours that the bug is ahead of the “Orig. Est.”.
Deadline: This field shows the deadline for this bug.
17. Attachments: You can attach files (e.g. testcases or patches) to bugs. If there are any attachments, they are listed
in this section. Attachments are normally stored in the Bugzilla database, unless they are marked as Big Files,
which are stored directly on disk.
18. *Dependencies: If this bug cannot be fixed unless other bugs are fixed (depends on), or this bug stops other bugs
being fixed (blocks), their numbers are recorded here.
19. *Votes: Whether this bug has any votes.
20. Additional Comments: You can add your two cents to the bug discussion here, if you have something worthwhile
to say.
68
Chapter 5. Using Bugzilla
69
Chapter 5. Using Bugzilla
5.5.1.2. Negation
At first glance, negation seems redundant. Rather than searching for
70
Chapter 5. Using Bugzilla
("cc" "contains the string" "foo@") AND ("cc" "contains the string" "@mozilla.org")
would return only bugs with "[email protected]" on the cc list. If you wanted bugs where there is someone on the cc
list containing "foo@" and someone else containing "@mozilla.org", then you would need two boolean charts.
5.5.2. Quicksearch
Quicksearch is a single-text-box query tool which uses metacharacters to indicate what is to be searched. For example,
typing "foo|bar" into Quicksearch would search for "foo" or "bar" in the summary and status whiteboard of a bug;
adding ":BazProduct" would search only in that product. You can use it to find a bug by its number or its alias, too.
You’ll find the Quicksearch box in Bugzilla’s footer area. On Bugzilla’s front page, there is an additional Help
(../../page.cgi?id=quicksearch.html) link which details how to use it.
Long Format: this gives you a large page with a non-editable summary of the fields of each bug.
XML: get the buglist in the XML format.
CSV: get the buglist as comma-separated values, for import into e.g. a spreadsheet.
Feed: get the buglist as an Atom feed. Copy this link into your favorite feed reader. If you are using Firefox, you can also save the list
iCalendar: Get the buglist as an iCalendar file. Each bug is represented as a to-do item in the imported calendar.
Change Columns: change the bug attributes which appear in the list.
Change several bugs at once: If your account is sufficiently empowered, and more than one bug appear in the bug list, this link is disp
Send mail to bug assignees: If more than one bug appear in the bug list and there are at least two distinct bug assignees, this links is di
71
Chapter 5. Using Bugzilla
Edit Search: If you didn’t get exactly the results you were looking for, you can return to the Query page through this link and make sm
Remember Search As: You can give a search a name and remember it; a link will appear in your page footer giving you quick access to
If you would like to access the bug list from another program it is often useful to have the list returned in something
other than HTML. By adding the ctype=type parameter into the bug list URL you can specify several alternate formats.
Besides the types described above, the following formats are also supported: ECMAScript, also known as JavaScript
(ctype=js), and Resource Description Framework RDF/XML (ctype=rdf).
1. Click the “New” link available in the footer of pages, or the “Enter a new bug report” link displayed on the home
page of the Bugzilla installation.
Note: If you want to file a test bug to see how Bugzilla works, you can do it on one of our test installations on
Landfill (http://landfill.bugzilla.org/bugzilla-3.6-branch/).
2. You first have to select the product in which you found a bug.
72
Chapter 5. Using Bugzilla
3. You now see a form where you can specify the component (part of the product which is affected by the bug you
discovered; if you have no idea, just select “General” if such a component exists), the version of the program you
were using, the Operating System and platform your program is running on and the severity of the bug (if the bug
you found crashes the program, it’s probably a major or a critical bug; if it’s a typo somewhere, that’s something
pretty minor; if it’s something you would like to see implemented, then that’s an enhancement).
4. You now have to give a short but descriptive summary of the bug you found. “My program is crashing all the
time” is a very poor summary and doesn’t help developers at all. Try something more meaningful or your bug will
probably be ignored due to a lack of precision. The next step is to give a very detailed list of steps to reproduce
the problem you encountered. Try to limit these steps to a minimum set required to reproduce the problem. This
will make the life of developers easier, and the probability that they consider your bug in a reasonable timeframe
will be much higher.
Note: Try to make sure that everything in the summary is also in the first comment. Summaries are often
updated and this will ensure your original information is easily accessible.
5. As you file the bug, you can also attach a document (testcase, patch, or screenshot of the problem).
6. Depending on the Bugzilla installation you are using and the product in which you are filing the bug, you can
also request developers to consider your bug in different ways (such as requesting review for the patch you just
attached, requesting your bug to block the next release of the product, and many other product specific requests).
7. Now is a good time to read your bug report again. Remove all misspellings, otherwise your bug may not be found
by developers running queries for some specific words, and so your bug would not get any attention. Also make
sure you didn’t forget any important information developers should know in order to reproduce the problem, and
make sure your description of the problem is explicit and clear enough. When you think your bug report is ready
to go, the last step is to click the “Commit” button to add your report into the database.
You do not need to put "any" or similar strings in the URL field. If there is no specific URL associated with the bug,
leave this field blank.
If you feel a bug you filed was incorrectly marked as a DUPLICATE of another, please question it in your bug, not
the bug it was duped to. Feel free to CC the person who duped it if they are not already CCed.
73
Chapter 5. Using Bugzilla
5.7. Attachments
You should use attachments, rather than comments, for large chunks of ASCII data, such as trace, debugging output
files, or log files. That way, it doesn’t bloat the bug for everyone who wants to read it, and cause people to receive fat,
useless mails.
You should make sure to trim screenshots. There’s no need to show the whole screen if you are pointing out a single-
pixel problem.
Bugzilla stores and uses a Content-Type for each attachment (e.g. text/html). To download an attachment as a different
Content-Type (e.g. application/xhtml+xml), you can override this using a ’content_type’ parameter on the URL, e.g.
&content_type=text/plain.
If you have a really large attachment, something that does not need to be recorded forever (as most attachments
are), or something that is too big for your database, you can mark your attachment as a “Big File”, assuming the
administrator of the installation has enabled this feature. Big Files are stored directly on disk instead of in the database.
The maximum size of a “Big File” is normally larger than the maximum size of a regular attachment. Independently
of the storage system used, an administrator can delete these attachments at any time. Nevertheless, if these files are
stored in the database, the “allow_attachment_deletion” parameter (which is turned off by default) must be enabled in
order to delete them.
Also, if the administrator turned on the “allow_attach_url” parameter, you can enter the URL pointing to the at-
tachment instead of uploading the attachment itself. For example, this is useful if you want to point to an external
application, a website or a very large file. Note that there is no guarantee that the source file will always be available,
nor that its content will remain unchanged.
View patches in color, with side-by-side view rather than trying to interpret the contents of the patch.
See the difference between two patches.
Get more context in a patch.
Collapse and expand sections of a patch for easy reading.
Link to a particular section of a patch for discussion or review
Go to Bonsai or LXR to see more context, blame, and cross-references for the part of the patch you are looking at
Create a rawtext unified format diff out of any patch, no matter what format it came from
74
Chapter 5. Using Bugzilla
75
Chapter 5. Using Bugzilla
5.8.1. Autolinkification
Bugzilla comments are plain text - so typing <U> will produce less-than, U, greater-than rather than underlined text.
However, Bugzilla will automatically make hyperlinks out of certain sorts of text in comments. For example, the text
"http://www.bugzilla.org" will be turned into a link: http://www.bugzilla.org. Other strings which get linkified in the
obvious manner are:
bug 12345
comment 7
bug 23456, comment 53
attachment 4321
mailto:[email protected]
[email protected]
ftp://ftp.mozilla.org
Most other sorts of URL
A corollary here is that if you type a bug number in a comment, you should put the word "bug" before it, so it gets
autolinkified for the convenience of others.
5.8.2. Comments
If you are changing the fields on a bug, only comment if either you have something pertinent to say, or Bugzilla
requires it. Otherwise, you may spam people unnecessarily with bug mail. To take an example: a user can set up their
account to filter out messages where someone just adds themselves to the CC field of a bug (which happens a lot.) If
you come along, add yourself to the CC field, and add a comment saying "Adding self to CC", then that person gets a
pointless piece of mail they would otherwise have avoided.
Don’t use sigs in comments. Signing your name ("Bill") is acceptable, if you do it out of habit, but full mail/news-style
four line ASCII art creations are not.
76
Chapter 5. Using Bugzilla
• Bugzilla’s general appearance (skin) - select which skin to use. Bugzilla supports adding custom skins.
• Quote the associated comment when you click on its reply link - sets the behavior of the comment "Reply" link.
Options include quoting the full comment, just reference the comment number, or turn the link off.
• Language used in email - select which language email will be sent in, from the list of available languages.
• After changing a bug - This controls what page is displayed after changes to a bug are submitted. The options
include to show the bug just modified, to show the next bug in your list, or to do nothing.
• Enable tags for bugs - turn bug tagging on or off.
• Zoom textareas large when in use (requires JavaScript) - enable or disable the automatic expanding of text areas
when text is being entered into them.
• Field separator character for CSV files - Select between a comma and semi-colon for exported CSV bug lists.
• Automatically add me to the CC list of bugs I change - set default behavior of CC list. Options include "Always",
"Never", and "Only if I have no role on them".
• When viewing a bug, show comments in this order - controls the order of comments. Options include "Oldest to
Newest", "Newest to Oldest" and "Newest to Oldest, but keep the bug description at the top".
• Show a quip at the top of each bug list - controls whether a quip will be shown on the Bug list page.
77
Chapter 5. Using Bugzilla
Note: A Bugzilla administrator can stop a user from receiving bugmail by clicking the “Bugmail Disabled” checkbox
when editing the user account. This is a drastic step best taken only for disabled accounts, as it overrides the user’s
individual mail preferences.
There are two global options -- “Email me when someone asks me to set a flag” and “Email me when someone
sets a flag I asked for”. These define how you want to receive bugmail with regards to flags. Their use is quite
straightforward; enable the checkboxes if you want Bugzilla to send you mail under either of the above conditions.
If you’d like to set your bugmail to something besides ’Completely ON’ and ’Completely OFF’, the “Field/recipient
specific options” table allows you to do just that. The rows of the table define events that can happen to a bug -- things
like attachments being added, new comments being made, the priority changing, etc. The columns in the table define
your relationship with the bug:
• Reporter - Where you are the person who initially reported the bug. Your name/account appears in the “Reporter:”
field.
• Assignee - Where you are the person who has been designated as the one responsible for the bug. Your name/account
appears in the “Assigned To:” field of the bug.
• QA Contact - You are one of the designated QA Contacts for the bug. Your account appears in the “QA Contact:”
text-box of the bug.
• CC - You are on the list CC List for the bug. Your account appears in the “CC:” text box of the bug.
• Voter - You have placed one or more votes for the bug. Your account appears only if someone clicks on the “Show
votes for this bug” link on the bug.
Note: Some columns may not be visible for your installation, depending on your site’s configuration.
To fine-tune your bugmail, decide the events for which you want to receive bugmail; then decide if you want to
receive it all the time (enable the checkbox for every column), or only when you have a certain relationship with a bug
(enable the checkbox only for those columns). For example: if you didn’t want to receive mail when someone added
themselves to the CC list, you could uncheck all the boxes in the “CC Field Changes” line. As another example, if
you never wanted to receive email on bugs you reported unless the bug was resolved, you would un-check all boxes
in the “Reporter” column except for the one on the “The bug is resolved or verified” row.
Note: Bugzilla adds the “X-Bugzilla-Reason” header to all bugmail it sends, describing the recipient’s relationship
(AssignedTo, Reporter, QAContact, CC, or Voter) to the bug. This header can be used to do further client-side
filtering.
Bugzilla has a feature called “Users Watching”. When you enter one or more comma-delineated user accounts (usually
email addresses) into the text entry box, you will receive a copy of all the bugmail those users are sent (security
settings permitting). This powerful functionality enables seamless transitions as developers change projects or users
go on holiday.
Note: The ability to watch other users may not be available in all Bugzilla installations. If you don’t see this feature,
and feel that you need it, speak to your administrator.
78
Chapter 5. Using Bugzilla
Each user listed in the “Users watching you” field has you listed in their “Users to watch” list and can get bugmail
according to your relationship to the bug and their “Field/recipient specific options” setting.
5.10.5. Permissions
This is a purely informative page which outlines your current permissions on this installation of Bugzilla.
A complete list of permissions is below. Only users with editusers privileges can change the permissions of other
users.
admin
Indicates user is an Administrator.
bz_canusewhineatothers
Indicates user can configure whine reports for other users.
bz_canusewhines
Indicates user can configure whine reports for self.
bz_sudoers
Indicates user can perform actions as other users.
bz_sudo_protect
Indicates user can not be impersonated by other users.
canconfirm
Indicates user can confirm a bug or mark it a duplicate.
creategroups
Indicates user can create and destroy groups.
79
Chapter 5. Using Bugzilla
editbugs
Indicates user can edit all bug fields.
editclassifications
Indicates user can create, destroy, and edit classifications.
editcomponents
Indicates user can create, destroy, and edit components.
editkeywords
Indicates user can create, destroy, and edit keywords.
editusers
Indicates user can edit or disable users.
tweakparams
Indicates user can change Parameters.
Note: For more information on how permissions work in Bugzilla (i.e. who can change what), see Section 6.4.
5.11.1. Reports
A report is a view of the current state of the bug database.
You can run either an HTML-table-based report, or a graphical line/pie/bar-chart-based one. The two have different
pages to define them, but are close cousins - once you’ve defined and viewed a report, you can switch between any of
the different views of the data at will.
Both report types are based on the idea of defining a set of bugs using the standard search interface, and then choosing
some aspect of that set to plot on the horizontal and/or vertical axes. You can also get a form of 3-dimensional report
by choosing to have multiple images or tables.
So, for example, you could use the search form to choose "all bugs in the WorldControl product", and then plot their
severity against their component to see which component had had the largest number of bad bugs reported against it.
Once you’ve defined your parameters and hit "Generate Report", you can switch between HTML, CSV, Bar, Line and
Pie. (Note: Pie is only available if you didn’t define a vertical axis, as pie charts don’t have one.) The other controls
80
Chapter 5. Using Bugzilla
are fairly self-explanatory; you can change the size of the image if you find text is overwriting other text, or the bars
are too thin to see.
5.11.2. Charts
A chart is a view of the state of the bug database over time.
Bugzilla currently has two charting systems - Old Charts and New Charts. Old Charts have been part of Bugzilla for a
long time; they chart each status and resolution for each product, and that’s all. They are deprecated, and going away
soon - we won’t say any more about them. New Charts are the future - they allow you to chart anything you can define
as a search.
Note: Both charting forms require the administrator to set up the data-gathering script. If you can’t see any charts,
ask them whether they have done so.
An individual line on a chart is called a data set. All data sets are organised into categories and subcategories. The data
sets that Bugzilla defines automatically use the Product name as a Category and Component names as Subcategories,
but there is no need for you to follow that naming scheme with your own charts if you don’t want to.
Data sets may be public or private. Everyone sees public data sets in the list, but only their creator sees private data
sets. Only administrators can make data sets public. No two data sets, even two private ones, can have the same set
of category, subcategory and name. So if you are creating private data sets, one idea is to have the Category be your
username.
81
Chapter 5. Using Bugzilla
If you have sufficient permissions, you can make the data set public, and reduce the frequency of data collection to
less than the default seven days.
5.12. Flags
A flag is a kind of status that can be set on bugs or attachments to indicate that the bugs/attachments are in a certain
state. Each installation can define its own set of flags that can be set on bugs or attachments.
If your installation has defined a flag, you can set or unset that flag, and if your administrator has enabled requesting
of flags, you can submit a request for another user to set the flag.
To set a flag, select either "+" or "-" from the drop-down menu next to the name of the flag in the "Flags" list. The
meaning of these values are flag-specific and thus cannot be described in this documentation, but by way of example,
setting a flag named "review" to "+" may indicate that the bug/attachment has passed review, while setting it to "-"
may indicate that the bug/attachment has failed review.
To unset a flag, click its drop-down menu and select the blank value. Note that marking an attachment as obsolete
automatically cancels all pending requests for the attachment.
If your administrator has enabled requests for a flag, request a flag by selecting "?" from the drop-down menu and
then entering the username of the user you want to set the flag in the text field next to the menu.
A set flag appears in bug reports and on "edit attachment" pages with the abbreviated username of the user who set
the flag prepended to the flag name. For example, if Jack sets a "review" flag to "+", it appears as Jack: review [ + ]
A requested flag appears with the user who requested the flag prepended to the flag name and the user who has been
requested to set the flag appended to the flag name within parentheses. For example, if Jack asks Jill for review, it
appears as Jack: review [ ? ] (Jill).
You can browse through open requests made of you and by you by selecting ’My Requests’ from the footer. You can
also look at open requests limited by other requesters, requestees, products, components, and flag names from this
page. Note that you can use ’-’ for requestee to specify flags with ’no requestee’ set.
5.13. Whining
Whining is a feature in Bugzilla that can regularly annoy users at specified times. Using this feature, users can execute
saved searches at specific times (i.e. the 15th of the month at midnight) or at regular intervals (i.e. every 15 minutes
on Sundays). The results of the searches are sent to the user, either as a single email or as one email per bug, along
with some descriptive text.
82
Chapter 5. Using Bugzilla
Warning
Throughout this section it will be assumed that all users are members of the bz_canusewhines group,
membership in which is required in order to use the Whining system. You can easily make all users members
of the bz_canusewhines group by setting the User RegExp to ".*" (without the quotes).
Also worth noting is the bz_canusewhineatothers group. Members of this group can create whines for any
user or group in Bugzilla using a extended form of the whining interface. Features only available to members
of the bz_canusewhineatothers group will be noted in the appropriate places.
Note: For whining to work, a special Perl script must be executed at regular intervals. More information on this is
available in Section 2.3.3.
Note: This section does not cover the whineatnews.pl script. See Section 2.3.2 for more information on The
Whining Cron.
Warning
Be careful if you set your event to run on the 29th, 30th, or 31st of the month, as your event may not run
exactly when expected. If you want your event to run on the last day of the month, select "Last day of the
month" as the interval.
83
Chapter 5. Using Bugzilla
Once you have specified the day(s) on which the event is to be run, you should now specify the time at which the
event is to be run. You can have the event run at a certain hour on the specified day(s), or every hour, half-hour, or
quarter-hour on the specified day(s).
If a single schedule does not execute an event as many times as you would want, you can create another schedule for
the same event. For example, if you want to run an event on days whose numbers are divisible by seven, you would
need to add four schedules to the event, setting the schedules to run on the 7th, 14th, 21st, and 28th (one day per
schedule) at whatever time (or times) you choose.
Note: If you are a member of the bz_canusewhineatothers group, then you will be presented with another option:
"Mail to". Using this you can control who will receive the emails generated by this event. You can choose to send
the emails to a single user (identified by email address) or a single group (identified by group name). To send to
multiple users or groups, create a new schedule for each additional user/group.
Note: When running queries, the whining system acts as if you are the user executing the query. This means that
the whining system will ignore bugs that match your query, but that you can not access.
Once you have chosen the saved search to be executed, give the query a descriptive title. This title will appear in the
email, above the results of the query. If you choose "One message per bug", the query title will appear at the top of
each email that contains a bug matching your query.
Finally, decide if the results of the query should be sent in a single email, or if each bug should appear in its own
email.
Warning
Think carefully before checking the "One message per bug" box. If you create a query that matches thou-
sands of bugs, you will receive thousands of emails!
84
Chapter 5. Using Bugzilla
Note: If you ever feel like deleting your event, you may do so using the "Remove Event" button in the upper-right
corner of each Event. You can also modify an existing event, so long as you "Update/Commit" after completing
your modifications.
85
Chapter 6. Customizing Bugzilla
After you put the file or the directory there, make sure to run checksetup.pl so that it can reset the file permissions
correctly.
After you have installed the new skin, it will show up as an option in the user’s General Preferences. If you would
like to force a particular skin on all users, just select it in the Default Preferences and then uncheck "Enabled" on the
preference.
86
Chapter 6. Customizing Bugzilla
Warning
A directory data/templates also exists; this is where Template Toolkit puts the compiled versions of the
templates from either the default or custom directories. Do not directly edit the files in this directory, or all
your changes will be lost the next time Template Toolkit recompiles the templates.
Note: If you use this method, and CVS conflicts occur during an update, the conflicted templates (and possibly
other parts of your installation) will not work until they are resolved.
The second method is to copy the templates to be modified into a mirrored directory structure under
template/en/custom. Templates in this directory structure automatically override any identically-named and
identically-located templates in the default directory.
Note: The custom directory does not exist at first and must be created if you want to use it.
The second method of customization should be used if you use the overwriting method of upgrade, because otherwise
your changes will be lost. This method may also be better if you are using the CVS method of upgrading and are
going to make major changes, because it is guaranteed that the contents of this directory will not be touched during
an upgrade, and you can then decide whether to continue using your own templates, or make the effort to merge your
changes into the new versions by hand.
Using this method, your installation may break if incompatible changes are made to the template interface. Such
changes should be documented in the release notes, provided you are using a stable release of Bugzilla. If you use
using unstable code, you will need to deal with this one yourself, although if possible the changes will be mentioned
before they occur in the deprecations section of the previous stable release’s release notes.
Note: Regardless of which method you choose, it is recommended that you run ./checksetup.pl after editing
any templates in the template/en/default directory, and after creating or editing any templates in the custom
directory.
Warning
It is required that you run ./checksetup.pl after creating a new template in the custom directory. Failure to
do so will raise an incomprehensible error message.
87
Chapter 6. Customizing Bugzilla
Note: If you are making template changes that you intend on submitting back for inclusion in standard Bugzilla,
you should read the relevant sections of the Developers’ Guide (http://www.bugzilla.org/docs/developer.html).
The syntax of the Template Toolkit language is beyond the scope of this guide. It’s reasonably easy to pick up
by looking at the current templates; or, you can read the manual, available on the Template Toolkit home page
(http://www.template-toolkit.org).
One thing you should take particular care about is the need to properly HTML filter data that has been passed into
the template. This means that if the data can possibly contain special HTML characters such as <, and the data was
not intended to be HTML, they need to be converted to entity form, i.e. <. You use the ’html’ filter in the Template
Toolkit to do this. If you forget, you may open up your installation to cross-site scripting attacks.
Also note that Bugzilla adds a few filters of its own, that are not in standard Template Toolkit. In particular, the
’url_quote’ filter can convert characters that are illegal or have special meaning in URLs, such as &, to the encoded
form, i.e. %26. This actually encodes most characters (but not the common ones such as letters and numbers and so
on), including the HTML-special characters, so there’s never a need to HTML filter afterwards.
Editing templates is a good way of doing a “poor man’s custom fields”. For example, if you don’t use the Status
Whiteboard, but want to have a free-form text entry box for “Build Identifier”, then you can just edit the templates to
change the field labels. It’s still be called status_whiteboard internally, but your users don’t need to know that.
Note: After adding or changing a content type, it’s suitable to edit Bugzilla/Constants.pm in order to reflect the
changes. Also, the file should be kept up to date after an upgrade if content types have been customized in the
past.
88
Chapter 6. Customizing Bugzilla
Save the template as <stubname>-<formatname>.<contenttypetag>.tmpl. Try out the template by calling the
CGI as <cginame>.cgi?format=<formatname>&ctype=<type> .
89
Chapter 6. Customizing Bugzilla
distribution as an example for you to copy. It can be found in the files create-guided.html.tmpl and
comment-guided.html.tmpl.
So to use this feature, create a custom template for enter_bug.cgi. The default template, on which you could
base it, is custom/bug/create/create.html.tmpl. Call it create-<formatname>.html.tmpl, and in it, add
widgets for each piece of information you’d like collected - such as a build number, or set of steps to reproduce.
Then, create a template like custom/bug/create/comment.txt.tmpl, and call it
comment-<formatname>.txt.tmpl. This template should reference the form fields you have created using the
syntax [% form.<fieldname> %]. When a bug report is submitted, the initial comment attached to the bug report
will be formatted according to the layout of this template.
For example, if your custom enter_bug template had a field
BuildID: [% form.buildid %]
BuildID: 20020303
Warning
This feature should be considered experimental; the Bugzilla code you will be changing is not stable, and
could change or move between versions. Be aware that if you make modifications as outlined here, you may
have to re-make them or port them if Bugzilla changes internally between versions, and you upgrade.
Companies often have rules about which employees, or classes of employees, are allowed to change certain things in
the bug system. For example, only the bug’s designated QA Contact may be allowed to VERIFY the bug. Bugzilla
has been designed to make it easy for you to write your own custom rules to define who is allowed to make what sorts
of value transition.
By default, assignees, QA owners and users with editbugs privileges can edit all fields of bugs, except group restric-
tions (unless they are members of the groups they are trying to change). Bug reporters also have the ability to edit
90
Chapter 6. Customizing Bugzilla
some fields, but in a more restrictive manner. Other users, without editbugs privileges, can not edit bugs, except to
comment and add themselves to the CC list.
For maximum flexibility, customizing this means editing Bugzilla’s Perl code. This gives the administrator complete
control over exactly who is allowed to do what. The relevant method is called check_can_change_field(), and
is found in Bug.pm in your Bugzilla/ directory. If you open that file and search for “sub check_can_change_field”,
you’ll find it.
This function has been carefully commented to allow you to see exactly how it works, and give you an idea of how to
make changes to it. Certain marked sections should not be changed - these are the “plumbing” which makes the rest
of the function work. In between those sections, you’ll find snippets of code like:
if ($field eq "qacontact") {
if (Bugzilla->user->in_group("quality_assurance")) {
return 1;
}
else {
return 0;
}
}
This says that only users in the group "quality_assurance" can change the QA Contact field of a bug.
Getting more weird:
91
Chapter 6. Customizing Bugzilla
This says that if the user is trying to change the priority field, and their email address is @example.com, they can only
do so if the old value of the field was "P1". Not very useful, but illustrative.
Warning
If you are modifying process_bug.cgi in any way, do not change the code that is bounded by
DO_NOT_CHANGE blocks. Doing so could compromise security, or cause your installation to stop working
entirely.
For a list of possible field names, look at the bugs table in the database. If you need help writing custom rules for your
organization, ask in the newsgroup.
92
Appendix A. Troubleshooting
This section gives solutions to common Bugzilla installation problems. If none of the section headings seems to match
your problem, read the general advice.
1. You have two versions of Perl on your machine. You are installing modules into one, and Bugzilla is us-
ing the other. Rerun the CPAN commands (or manual compile) using the full path to Perl from the top of
checksetup.pl. This will make sure you are installing the modules in the right place.
93
Appendix A. Troubleshooting
2. The permissions on your library directories are set incorrectly. They must, at the very least, be readable by the
web server user or group. It is recommended that they be world readable.
my $numFields;
if ($attribs->{’NUM_OF_FIELDS’}) {
$numFields = $attribs->{’NUM_OF_FIELDS’};
} elsif ($attribs->{’NAME’}) {
$numFields = @{$attribs->{NAME}};
with
my $numFields;
if ($attribs->{’NUM_OF_FIELDS’}) {
$numFields = $attribs->{’NUM_OF_FIELDS’};
} elsif ($attribs->{’NAMES’}) {
$numFields = @{$attribs->{NAMES}};
This is because your /var/spool/mqueue directory has a mode of drwx------. Type chmod 755
/var/spool/mqueue as root to fix this problem. This will allow any process running on your machine the ability to
read the /var/spool/mqueue directory.
94
Appendix A. Troubleshooting
The value of the cookiepath parameter should be the actual directory containing your Bugzilla installation, as seen
by the end-user’s web browser. Leading and trailing slashes are mandatory. You can also set the cookiepath to any
directory which is a parent of the Bugzilla directory (such as ’/’, the root directory). But you can’t put something
that isn’t at least a partial match or it won’t work. What you’re actually doing is restricting the end-user’s browser to
sending the cookies back only to that directory.
How do you know if you want your specific Bugzilla directory or the whole site?
If you have only one Bugzilla running on the server, and you don’t mind having other applications on the same server
with it being able to see the cookies (you might be doing this on purpose if you have other things on your site that
share authentication with Bugzilla), then you’ll want to have the cookiepath set to "/", or to a sufficiently-high enough
directory that all of the involved apps can see the cookies.
urlbase is http://bugzilla.mozilla.org/
cookiepath is /
urlbase is http://tools.mysite.tld/bugzilla/
but you have http://tools.mysite.tld/someotherapp/ which shares
authentication with your Bugzilla
cookiepath is /
On the other hand, if you have more than one Bugzilla running on the server (some people do - we do on landfill) then
you need to have the cookiepath restricted enough so that the different Bugzillas don’t confuse their cookies with one
another.
urlbase is http://landfill.bugzilla.org/bugzilla-tip/
cookiepath is /bugzilla-tip/
urlbase is http://landfill.bugzilla.org/bugzilla-2.16-branch/
cookiepath is /bugzilla-2.16-branch/
If you had cookiepath set to “/” at any point in the past and need to set it to something more restrictive (i.e. “/bugzilla/”),
you can safely do this without requiring users to delete their Bugzilla-related cookies in their browser (this is true
starting with Bugzilla 2.18 and Bugzilla 2.16.5).
95
Appendix A. Troubleshooting
96
Appendix B. Contrib
There are a number of unofficial Bugzilla add-ons in the $BUGZILLA_ROOT/contrib/ directory. This section docu-
ments them.
Warning
These files pre-date the templatization work done as part of the 2.16 release, and have not been updated.
query.conf contains the mapping from options to field names and comparison types. Quoted option names are
“grepped” for, so it should be easy to edit this file. Comments (#) have no effect; you must make sure these lines do
not contain any quoted “option”.
buglist is a shell script that submits a Bugzilla query and writes the resulting HTML page to stdout. It supports both
short options, (such as “-Afoo” or “-Rbar”) and long options (such as “--assignedto=foo” or “--reporter=bar”). If the
first character of an option is not “-”, it is treated as if it were prefixed with “--default=”.
The column list is taken from the COLUMNLIST environment variable. This is equivalent to the “Change Columns”
option that is available when you list bugs in buglist.cgi. If you have already used Bugzilla, grep for COLUMNLIST
in your cookies file to see your current COLUMNLIST setting.
bugs is a simple shell script which calls buglist and extracts the bug numbers from the output. Adding the prefix
“http://bugzilla.mozilla.org/buglist.cgi?bug_id=” turns the bug list into a working link if any bugs are found. Counting
bugs is easy. Pipe the results through sed -e ’s/,/ /g’ | wc | awk ’{printf $2 "\n"}’
Akkana Peck says she has good results piping buglist output through w3m -T text/html -dump
97
Appendix C. Manual Installation of Perl
Modules
C.1. Instructions
If you need to install Perl modules manually, here’s how it’s done. Download the module using the link given in the
next section, and then apply this magic incantation, as root:
Note: In order to compile source code under Windows you will need to obtain a ’make’ utility. The nmake utility
provided with Microsoft Visual C++ may be used. As an alternative, there is a utility called dmake available from
CPAN which is written entirely in Perl.
As described in Section C.2, however, most packages already exist and are available from ActiveState or the-
ory58S. We highly recommend that you install them using the ppm GUI available with ActiveState and to add the
theory58S repository to your list of repositories.
CGI:
Data-Dumper:
98
Appendix C. Manual Installation of Perl Modules
Documentation: http://search.cpan.org/dist/Data-Dumper/Dumper.pm
DBI:
DBD::mysql:
DBD::Pg:
Template-Toolkit:
GD:
Template::Plugin::GD:
99
Appendix C. Manual Installation of Perl Modules
GD::Graph:
XML::Twig:
PatchReader:
100
Appendix C. Manual Installation of Perl Modules
101
Appendix D. GNU Free Documentation License
Version 1.1, March 2000
Copyright (C) 2000 Free Software Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Everyone is
permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.
0. Preamble
The purpose of this License is to make a manual, textbook, or other written document "free" in the sense of freedom:
to assure everyone the effective freedom to copy and redistribute it, with or without modifying it, either commercially
or noncommercially. Secondarily, this License preserves for the author and publisher a way to get credit for their
work, while not being considered responsible for modifications made by others.
This License is a kind of "copyleft", which means that derivative works of the document must themselves be free
in the same sense. It complements the GNU General Public License, which is a copyleft license designed for free
software.
We have designed this License in order to use it for manuals for free software, because free software needs free
documentation: a free program should come with manuals providing the same freedoms that the software does. But
this License is not limited to software manuals; it can be used for any textual work, regardless of subject matter
or whether it is published as a printed book. We recommend this License principally for works whose purpose is
instruction or reference.
102
Appendix D. GNU Free Documentation License
ing editor, and that is suitable for input to text formatters or for automatic translation to a variety of formats suitable
for input to text formatters. A copy made in an otherwise Transparent file format whose markup has been designed to
thwart or discourage subsequent modification by readers is not Transparent. A copy that is not "Transparent" is called
"Opaque".
Examples of suitable formats for Transparent copies include plain ASCII without markup, Texinfo input format, La-
TeX input format, SGML or XML using a publicly available DTD, and standard-conforming simple HTML designed
for human modification. Opaque formats include PostScript, PDF, proprietary formats that can be read and edited
only by proprietary word processors, SGML or XML for which the DTD and/or processing tools are not generally
available, and the machine-generated HTML produced by some word processors for output purposes only.
The "Title Page" means, for a printed book, the title page itself, plus such following pages as are needed to hold,
legibly, the material this License requires to appear in the title page. For works in formats which do not have any
title page as such, "Title Page" means the text near the most prominent appearance of the work’s title, preceding the
beginning of the body of the text.
2. Verbatim Copying
You may copy and distribute the Document in any medium, either commercially or noncommercially, provided that
this License, the copyright notices, and the license notice saying this License applies to the Document are reproduced
in all copies, and that you add no other conditions whatsoever to those of this License. You may not use technical
measures to obstruct or control the reading or further copying of the copies you make or distribute. However, you may
accept compensation in exchange for copies. If you distribute a large enough number of copies you must also follow
the conditions in section 3.
You may also lend copies, under the same conditions stated above, and you may publicly display copies.
3. Copying in Quantity
If you publish printed copies of the Document numbering more than 100, and the Document’s license notice requires
Cover Texts, you must enclose the copies in covers that carry, clearly and legibly, all these Cover Texts: Front-Cover
Texts on the front cover, and Back-Cover Texts on the back cover. Both covers must also clearly and legibly identify
you as the publisher of these copies. The front cover must present the full title with all words of the title equally
prominent and visible. You may add other material on the covers in addition. Copying with changes limited to the
covers, as long as they preserve the title of the Document and satisfy these conditions, can be treated as verbatim
copying in other respects.
If the required texts for either cover are too voluminous to fit legibly, you should put the first ones listed (as many as
fit reasonably) on the actual cover, and continue the rest onto adjacent pages.
If you publish or distribute Opaque copies of the Document numbering more than 100, you must either include a
machine-readable Transparent copy along with each Opaque copy, or state in or with each Opaque copy a publicly-
accessible computer-network location containing a complete Transparent copy of the Document, free of added mate-
rial, which the general network-using public has access to download anonymously at no charge using public-standard
network protocols. If you use the latter option, you must take reasonably prudent steps, when you begin distribution
of Opaque copies in quantity, to ensure that this Transparent copy will remain thus accessible at the stated location
until at least one year after the last time you distribute an Opaque copy (directly or through your agents or retailers)
of that edition to the public.
103
Appendix D. GNU Free Documentation License
It is requested, but not required, that you contact the authors of the Document well before redistributing any large
number of copies, to give them a chance to provide you with an updated version of the Document.
4. Modifications
You may copy and distribute a Modified Version of the Document under the conditions of sections 2 and 3 above,
provided that you release the Modified Version under precisely this License, with the Modified Version filling the role
of the Document, thus licensing distribution and modification of the Modified Version to whoever possesses a copy of
it. In addition, you must do these things in the Modified Version:
A. Use in the Title Page (and on the covers, if any) a title distinct from that of the Document, and from those of
previous versions (which should, if there were any, be listed in the History section of the Document). You may
use the same title as a previous version if the original publisher of that version gives permission.
B. List on the Title Page, as authors, one or more persons or entities responsible for authorship of the modifications
in the Modified Version, together with at least five of the principal authors of the Document (all of its principal
authors, if it has less than five).
C. State on the Title page the name of the publisher of the Modified Version, as the publisher.
D. Preserve all the copyright notices of the Document.
E. Add an appropriate copyright notice for your modifications adjacent to the other copyright notices.
F. Include, immediately after the copyright notices, a license notice giving the public permission to use the Modified
Version under the terms of this License, in the form shown in the Addendum below.
G. Preserve in that license notice the full lists of Invariant Sections and required Cover Texts given in the Document’s
license notice.
H. Include an unaltered copy of this License.
I. Preserve the section entitled "History", and its title, and add to it an item stating at least the title, year, new authors,
and publisher of the Modified Version as given on the Title Page. If there is no section entitled "History" in the
Document, create one stating the title, year, authors, and publisher of the Document as given on its Title Page,
then add an item describing the Modified Version as stated in the previous sentence.
J. Preserve the network location, if any, given in the Document for public access to a Transparent copy of the
Document, and likewise the network locations given in the Document for previous versions it was based on.
These may be placed in the "History" section. You may omit a network location for a work that was published at
least four years before the Document itself, or if the original publisher of the version it refers to gives permission.
K. In any section entitled "Acknowledgements" or "Dedications", preserve the section’s title, and preserve in the
section all the substance and tone of each of the contributor acknowledgements and/or dedications given therein.
L. Preserve all the Invariant Sections of the Document, unaltered in their text and in their titles. Section numbers or
the equivalent are not considered part of the section titles.
M. Delete any section entitled "Endorsements". Such a section may not be included in the Modified Version.
N. Do not retitle any existing section as "Endorsements" or to conflict in title with any Invariant Section.
If the Modified Version includes new front-matter sections or appendices that qualify as Secondary Sections and
contain no material copied from the Document, you may at your option designate some or all of these sections as
104
Appendix D. GNU Free Documentation License
invariant. To do this, add their titles to the list of Invariant Sections in the Modified Version’s license notice. These
titles must be distinct from any other section titles.
You may add a section entitled "Endorsements", provided it contains nothing but endorsements of your Modified Ver-
sion by various parties--for example, statements of peer review or that the text has been approved by an organization
as the authoritative definition of a standard.
You may add a passage of up to five words as a Front-Cover Text, and a passage of up to 25 words as a Back-Cover
Text, to the end of the list of Cover Texts in the Modified Version. Only one passage of Front-Cover Text and one
of Back-Cover Text may be added by (or through arrangements made by) any one entity. If the Document already
includes a cover text for the same cover, previously added by you or by arrangement made by the same entity you
are acting on behalf of, you may not add another; but you may replace the old one, on explicit permission from the
previous publisher that added the old one.
The author(s) and publisher(s) of the Document do not by this License give permission to use their names for publicity
for or to assert or imply endorsement of any Modified Version.
5. Combining Documents
You may combine the Document with other documents released under this License, under the terms defined in section
4 above for modified versions, provided that you include in the combination all of the Invariant Sections of all of the
original documents, unmodified, and list them all as Invariant Sections of your combined work in its license notice.
The combined work need only contain one copy of this License, and multiple identical Invariant Sections may be
replaced with a single copy. If there are multiple Invariant Sections with the same name but different contents, make
the title of each such section unique by adding at the end of it, in parentheses, the name of the original author or
publisher of that section if known, or else a unique number. Make the same adjustment to the section titles in the list
of Invariant Sections in the license notice of the combined work.
In the combination, you must combine any sections entitled "History" in the various original documents, forming
one section entitled "History"; likewise combine any sections entitled "Acknowledgements", and any sections entitled
"Dedications". You must delete all sections entitled "Endorsements."
6. Collections of Documents
You may make a collection consisting of the Document and other documents released under this License, and replace
the individual copies of this License in the various documents with a single copy that is included in the collection,
provided that you follow the rules of this License for verbatim copying of each of the documents in all other respects.
You may extract a single document from such a collection, and distribute it individually under this License, provided
you insert a copy of this License into the extracted document, and follow this License in all other respects regarding
verbatim copying of that document.
105
Appendix D. GNU Free Documentation License
provided no compilation copyright is claimed for the compilation. Such a compilation is called an "aggregate", and
this License does not apply to the other self-contained works thus compiled with the Document, on account of their
being thus compiled, if they are not themselves derivative works of the Document.
If the Cover Text requirement of section 3 is applicable to these copies of the Document, then if the Document is less
than one quarter of the entire aggregate, the Document’s Cover Texts may be placed on covers that surround only the
Document within the aggregate. Otherwise they must appear on covers around the whole aggregate.
8. Translation
Translation is considered a kind of modification, so you may distribute translations of the Document under the terms
of section 4. Replacing Invariant Sections with translations requires special permission from their copyright holders,
but you may include translations of some or all Invariant Sections in addition to the original versions of these Invariant
Sections. You may include a translation of this License provided that you also include the original English version of
this License. In case of a disagreement between the translation and the original English version of this License, the
original English version will prevail.
9. Termination
You may not copy, modify, sublicense, or distribute the Document except as expressly provided for under this License.
Any other attempt to copy, modify, sublicense or distribute the Document is void, and will automatically terminate
your rights under this License. However, parties who have received copies, or rights, from you under this License will
not have their licenses terminated so long as such parties remain in full compliance.
Copyright (c) YEAR YOUR NAME. Permission is granted to copy, distribute and/or modify this document under the terms
of the GNU Free Documentation License, Version 1.1 or any later version published by the Free Software Foundation; with
106
Appendix D. GNU Free Documentation License
the Invariant Sections being LIST THEIR TITLES, with the Front-Cover Texts being LIST, and with the Back-Cover Texts
being LIST. A copy of the license is included in the section entitled "GNU Free Documentation License".
If you have no Invariant Sections, write "with no Invariant Sections" instead of saying which ones are invariant. If
you have no Front-Cover Texts, write "no Front-Cover Texts" instead of "Front-Cover Texts being LIST"; likewise for
Back-Cover Texts.
If your document contains nontrivial examples of program code, we recommend releasing these examples in parallel
under your choice of free software license, such as the GNU General Public License, to permit their use in free
software.
107
Glossary
Apache web server, and other NCSA-compliant web servers, observe the convention of using files in directories
called .htaccess to restrict access to certain files. In Bugzilla, they are used to keep secret files which would
otherwise compromise your installation - e.g. the localconfig file contains the password to your database.
curious.
A
Apache
In this context, Apache is the web server most commonly used for serving up Bugzilla pages. Contrary to popular
belief, the apache web server has nothing to do with the ancient and noble Native American tribe, but instead
derived its name from the fact that it was “a patchy” version of the original NCSA world-wide-web server.
AllowOverride (http://httpd.apache.org/docs-2.0/mod/core.html#allowoverride)
Options (http://httpd.apache.org/docs-2.0/mod/core.html#options)
These directives are used to tell Apache many things about the directory they apply to. For Bugzilla’s
purposes, we need them to allow script execution and .htaccess overrides.
DirectoryIndex (http://httpd.apache.org/docs-2.0/mod/mod_dir.html#directoryindex)
Used to tell Apache what files are indexes. If you can not add index.cgi to the list of valid files, you’ll need
to set $index_html to 1 in localconfig so ./checksetup.pl will create an index.html that redirects to
index.cgi.
ScriptInterpreterSource (http://httpd.apache.org/docs-2.0/mod/core.html#scriptinterpretersource)
Used when running Apache on windows so the shebang line doesn’t have to be changed in every Bugzilla
script.
For more information about how to configure Apache for Bugzilla, see Section 2.2.4.1.
108
B
Bug
A “bug” in Bugzilla refers to an issue entered into the database which has an associated number, assignments,
comments, etc. Some also refer to a “tickets” or “issues”; in the context of Bugzilla, they are synonymous.
Bug Number
Each Bugzilla bug is assigned a number that uniquely identifies that bug. The bug associated with a bug number
can be pulled up via a query, or easily from the very front page by typing the number in the "Find" box.
Bugzilla
C
Common Gateway Interface
CGI is an acronym for Common Gateway Interface. This is a standard for interfacing an external application with
a web server. Bugzilla is an example of a CGI application.
Component
A Component is a subsection of a Product. It should be a narrow category, tailored to your organization. All
Products must contain at least one Component (and, as a matter of fact, creating a Product with no Components
will create an error in Bugzilla).
CPAN stands for the “Comprehensive Perl Archive Network”. CPAN maintains a large number of extremely
useful Perl modules - encapsulated chunks of code for performing a particular task.
contrib
The contrib directory is a location to put scripts that have been contributed to Bugzilla but are not a part of the
official distribution. These scripts are written by third parties and may be in languages other than perl. For those
109
that are in perl, there may be additional modules or other requirements than those of the official distribution.
Note: Scripts in the contrib directory are not officially supported by the Bugzilla team and may break in
between versions.
D
daemon
A daemon is a computer program which runs in the background. In general, most daemons are started at boot
time via System V init scripts, or through RC scripts on BSD-based systems. mysqld, the MySQL server, and
apache, a web server, are generally run as daemons.
DOS Attack
A DOS, or Denial of Service attack, is when a user attempts to deny access to a web server by repeatedly
accessing a page or sending malformed requests to a webserver. A D-DOS, or Distributed Denial of Service
attack, is when these requests come from multiple sources at the same time. Unfortunately, these are much more
difficult to defend against.
G
Groups
The word “Groups” has a very special meaning to Bugzilla. Bugzilla’s main security mechanism comes by
placing users in groups, and assigning those groups certain privileges to view bugs in particular Products in the
Bugzilla database.
J
JavaScript
110
M
Message Transport Agent
A Message Transport Agent is used to control the flow of email on a system. The Email::Send
(http://search.cpan.org/dist/Email-Send/lib/Email/Send.pm) Perl module, which Bugzilla uses to send email,
can be configured to use many different underlying implementations for actually sending the mail using the
mail_delivery_method parameter. Implementations other than sendmail require that the sendmailnow
param be set to on.
MySQL
MySQL is currently the required RDBMS for Bugzilla. MySQL can be downloaded from http://www.mysql.com.
While you should familiarize yourself with all of the documentation, some high points are:
Backup (http://www.mysql.com/doc/en/Backup.html)
Methods for backing up your Bugzilla database.
P
Perl Package Manager
http://aspn.activestate.com/ASPN/Downloads/ActivePerl/PPM/
Product
A Product is a broad category of types of bugs, normally representing a single piece of software or entity. In
general, there are several Components to a Product. A Product may define a group (used for security) for all bugs
entered into its Components.
111
Perl
First written by Larry Wall, Perl is a remarkable program language. It has the benefits of the flexibility of an
interpreted scripting language (such as shell script), combined with the speed and power of a compiled language,
such as C. Bugzilla is maintained in Perl.
Q
QA
“QA”, “Q/A”, and “Q.A.” are short for “Quality Assurance”. In most large software development organizations,
there is a team devoted to ensuring the product meets minimum standards before shipping. This team will also
generally want to track the progress of bugs over their life cycle, thus the need for the “QA Contact” field in a
bug.
R
Relational DataBase Management System
A relational database management system is a database system that stores information in tables that are related
to each other.
Regular Expression
S
Service
In Windows NT environment, a boot-time background application is referred to as a service. These are generally
managed through the control panel while logged in as an account with “Administrator” level capabilities. For
more information, consult your Windows manual or the MSKB.
112
SGML
SGML stands for “Standard Generalized Markup Language”. Created in the 1980’s to provide an extensible
means to maintain documentation based upon content instead of presentation, SGML has withstood the test of
time as a robust, powerful language. XML is the “baby brother” of SGML; any valid XML document it, by
definition, a valid SGML document. The document you are reading is written and maintained in SGML, and is
also valid XML if you modify the Document Type Definition.
T
Target Milestone
Target Milestones are Product goals. They are configurable on a per-Product basis. Most software development
houses have a concept of “milestones” where the people funding a project expect certain functionality on certain
dates. Bugzilla facilitates meeting these milestones by giving you the ability to declare by which milestone a bug
will be fixed, or an enhancement will be implemented.
TCL is an open source scripting language available for Windows, Macintosh, and Unix based systems. Bugzilla
1.0 was written in TCL but never released. The first release of Bugzilla was 2.0, which was when it was ported
to perl.
Z
Zarro Boogs Found
This is just a goofy way of saying that there were no bugs found matching your query. When asked to explain
this message, Terry had the following to say:
I’ve been asked to explain this ... way back when, when Netscape released version 4.0 of its browser, we had a release
party. Naturally, there had been a big push to try and fix every known bug before the release. Naturally, that hadn’t
actually happened. (This is not unique to Netscape or to 4.0; the same thing has happened with every software project
I’ve ever seen.) Anyway, at the release party, T-shirts were handed out that said something like "Netscape 4.0: Zarro
Boogs". Just like the software, the T-shirt had no known bugs. Uh-huh.
So, when you query for a list of bugs, and it gets no results, you can think of this as a friendly reminder. Of *course*
there are bugs matching your query, they just aren’t in the bugsystem yet...
—Terry Weissman
113