mirror of
https://github.com/mattermost/mattermost.git
synced 2026-02-10 14:24:06 -05:00
* MM-64486: Remove telemetry Remove telemetry from Mattermost. We're no longer relying on Rudder upstream, and no longer making use of this information. * recover mock for SystemStore.Get * Fix TestClearPushNotificationSync by adding missing SystemStore mock The test was failing because the SystemStore mock was missing the Get() method that's required by the ServerId() function. Added the missing mock to return a StringMap with SystemServerId. * fix mocking issue * Remove now-unused telemetry and constants * Remove "Disable telemetry events" debug setting * Remove empty functions * Remove most "Telemetry tracking removed" comments * Remove remains of DataPrefetch telemetry * Remove now-unused prop from InviteMembersButton * Remove trackDotMenuEvent * Remove some more leftover comments * Remove lingering logic related to trackingLocation * Remove now-unused argument from useCopyText * Remove lingering telemetry references from PreparingWorkspace * fixup Remove trackDotMenuEvent * Remove lingering telemetry references from signup page and password check * Update snapshots and fix test broken by my changes * Fix unintended behavior change in thread list filtering Remove handleSetFilter wrapper that was accidentally modified during telemetry removal. The function was calling clear() when switching to unread filter, which was not the original behavior. Use setFilter directly instead, restoring the original functionality. * Remove unused useOpenDowngradeModal hook The useOpenDowngradeModal hook was not being used anywhere in the codebase. * Remove unused expandableLink from useExpandOverageUsersCheck The expandableLink return value was not being used by any components. * Re-add missing TeamLinkClicked performance telemetry The mark(Mark.TeamLinkClicked) call was accidentally removed from the handleSwitch function. This telemetry is needed for Looker-based performance tracking. * drop LogSettings.VerboseDiagnostics --------- Co-authored-by: Harrison Healey <harrisonmhealey@gmail.com> Co-authored-by: Mattermost Build <build@mattermost.com>
144 lines
4.7 KiB
Go
144 lines
4.7 KiB
Go
// Copyright (c) 2015-present Mattermost, Inc. All Rights Reserved.
|
|
// See LICENSE.txt for license information.
|
|
|
|
package app
|
|
|
|
import (
|
|
"encoding/json"
|
|
"io"
|
|
"net/http"
|
|
"net/url"
|
|
"runtime"
|
|
"strconv"
|
|
|
|
"github.com/mattermost/mattermost/server/public/model"
|
|
"github.com/mattermost/mattermost/server/public/shared/i18n"
|
|
"github.com/mattermost/mattermost/server/public/shared/mlog"
|
|
"github.com/mattermost/mattermost/server/v8/platform/shared/mail"
|
|
)
|
|
|
|
const (
|
|
PropSecurityURL = "https://securityupdatecheck.mattermost.com"
|
|
SecurityUpdatePeriod = 86400000 // 24 hours in milliseconds.
|
|
|
|
PropSecurityID = "id"
|
|
PropSecurityBuild = "b"
|
|
PropSecurityEnterpriseReady = "be"
|
|
PropSecurityDatabase = "db"
|
|
PropSecurityOS = "os"
|
|
PropSecurityUserCount = "uc"
|
|
PropSecurityTeamCount = "tc"
|
|
PropSecurityActiveUserCount = "auc"
|
|
PropSecurityUnitTests = "ut"
|
|
)
|
|
|
|
func (s *Server) DoSecurityUpdateCheck() {
|
|
if !*s.platform.Config().ServiceSettings.EnableSecurityFixAlert {
|
|
return
|
|
}
|
|
|
|
props, err := s.Store().System().Get()
|
|
if err != nil {
|
|
return
|
|
}
|
|
|
|
lastSecurityTime, _ := strconv.ParseInt(props[model.SystemLastSecurityTime], 10, 0)
|
|
currentTime := model.GetMillis()
|
|
|
|
if (currentTime - lastSecurityTime) > SecurityUpdatePeriod {
|
|
mlog.Debug("Checking for security update from Mattermost")
|
|
|
|
v := url.Values{}
|
|
|
|
v.Set(PropSecurityID, s.ServerId())
|
|
v.Set(PropSecurityBuild, model.CurrentVersion+"."+model.BuildNumber)
|
|
v.Set(PropSecurityEnterpriseReady, model.BuildEnterpriseReady)
|
|
v.Set(PropSecurityDatabase, *s.platform.Config().SqlSettings.DriverName)
|
|
v.Set(PropSecurityOS, runtime.GOOS)
|
|
|
|
if props[model.SystemRanUnitTests] != "" {
|
|
v.Set(PropSecurityUnitTests, "1")
|
|
} else {
|
|
v.Set(PropSecurityUnitTests, "0")
|
|
}
|
|
|
|
systemSecurityLastTime := &model.System{Name: model.SystemLastSecurityTime, Value: strconv.FormatInt(currentTime, 10)}
|
|
if lastSecurityTime == 0 {
|
|
if err := s.Store().System().Save(systemSecurityLastTime); err != nil {
|
|
s.Log().Error("Failed to save last security check time", mlog.Err(err))
|
|
return
|
|
}
|
|
} else {
|
|
if err := s.Store().System().Update(systemSecurityLastTime); err != nil {
|
|
s.Log().Error("Failed to update last security check time", mlog.Err(err))
|
|
return
|
|
}
|
|
}
|
|
|
|
if count, err := s.Store().User().Count(model.UserCountOptions{IncludeDeleted: true}); err == nil {
|
|
v.Set(PropSecurityUserCount, strconv.FormatInt(count, 10))
|
|
}
|
|
|
|
if ucr, err := s.Store().Status().GetTotalActiveUsersCount(); err == nil {
|
|
v.Set(PropSecurityActiveUserCount, strconv.FormatInt(ucr, 10))
|
|
}
|
|
|
|
if teamCount, err := s.Store().Team().AnalyticsTeamCount(nil); err == nil {
|
|
v.Set(PropSecurityTeamCount, strconv.FormatInt(teamCount, 10))
|
|
}
|
|
|
|
res, err := http.Get(PropSecurityURL + "/security?" + v.Encode())
|
|
if err != nil {
|
|
mlog.Error("Failed to get security update information from Mattermost.")
|
|
return
|
|
}
|
|
|
|
defer res.Body.Close()
|
|
|
|
var bulletins model.SecurityBulletins
|
|
if jsonErr := json.NewDecoder(res.Body).Decode(&bulletins); jsonErr != nil {
|
|
s.Log().Error("Failed to decode JSON", mlog.Err(jsonErr))
|
|
return
|
|
}
|
|
|
|
for _, bulletin := range bulletins {
|
|
if bulletin.AppliesToVersion == model.CurrentVersion {
|
|
if props["SecurityBulletin_"+bulletin.Id] == "" {
|
|
users, userErr := s.Store().User().GetSystemAdminProfiles()
|
|
if userErr != nil {
|
|
mlog.Error("Failed to get system admins for security update information from Mattermost.")
|
|
return
|
|
}
|
|
|
|
resBody, err := http.Get(PropSecurityURL + "/bulletins/" + bulletin.Id)
|
|
if err != nil {
|
|
mlog.Error("Failed to get security bulletin details")
|
|
return
|
|
}
|
|
|
|
body, err := io.ReadAll(resBody.Body)
|
|
resBody.Body.Close()
|
|
if err != nil || resBody.StatusCode != 200 {
|
|
mlog.Error("Failed to read security bulletin details")
|
|
return
|
|
}
|
|
|
|
for _, user := range users {
|
|
mlog.Info("Sending security bulletin", mlog.String("bulletin_id", bulletin.Id), mlog.String("user_email", user.Email))
|
|
license := s.License()
|
|
mailConfig := s.MailServiceConfig()
|
|
err = mail.SendMailUsingConfig(user.Email, i18n.T("mattermost.bulletin.subject"), string(body), mailConfig, license != nil && *license.Features.Compliance, "", "", "", "", "SecurityUpdateCheck")
|
|
if err != nil {
|
|
s.Log().Error("Failed to send security bulletin email", mlog.String("user_email", user.Email), mlog.Err(err))
|
|
}
|
|
}
|
|
|
|
bulletinSeen := &model.System{Name: "SecurityBulletin_" + bulletin.Id, Value: bulletin.Id}
|
|
if err := s.Store().System().Save(bulletinSeen); err != nil {
|
|
s.Log().Error("Failed to save security bulletin status", mlog.Err(err))
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|