mirror of
https://github.com/mattermost/mattermost.git
synced 2026-02-03 20:40:00 -05:00
* Posts * Add missing translation * Fix internal store marshaling * [MM-22051] Remove To/From JSON (Channels) (#18116) * Channels * Channel members * ChannelSearch * Channel categories, list, sidebar, stats, view * Fix conversions * [MM-22051] Remove To/From JSON (Users) (#18121) * User related structs * Fix return * Team related structures (#18127) * [MM-22051] Remove To/From JSON (Status, Bot, Reaction, Thread, FileInfo) (#18130) * Status * Bot * Reaction * Thread * FileInfo * Some fixes * Translations update from Weblate (#18143) * Translated using Weblate (German) Currently translated at 100.0% (2309 of 2309 strings) Translation: mattermost-languages-shipped/mattermost-server Translate-URL: https://translate.mattermost.com/projects/mattermost/mattermost-server_master/de/ * Translated using Weblate (Turkish) Currently translated at 100.0% (2309 of 2309 strings) Translation: mattermost-languages-shipped/mattermost-server Translate-URL: https://translate.mattermost.com/projects/mattermost/mattermost-server_master/tr/ * Translated using Weblate (Hungarian) Currently translated at 100.0% (2309 of 2309 strings) Translation: mattermost-languages-shipped/mattermost-server Translate-URL: https://translate.mattermost.com/projects/mattermost/mattermost-server_master/hu/ * Update translation files Updated by "Cleanup translation files" hook in Weblate. Translation: mattermost-languages-shipped/mattermost-server Translate-URL: https://translate.mattermost.com/projects/mattermost/mattermost-server_master/ Update translation files Updated by "Cleanup translation files" hook in Weblate. Translation: mattermost-languages-shipped/mattermost-server Translate-URL: https://translate.mattermost.com/projects/mattermost/mattermost-server_master/ Update translation files Updated by "Cleanup translation files" hook in Weblate. Translation: mattermost-languages-shipped/mattermost-server Translate-URL: https://translate.mattermost.com/projects/mattermost/mattermost-server_master/ Update translation files Updated by "Cleanup translation files" hook in Weblate. Translation: mattermost-languages-shipped/mattermost-server Translate-URL: https://translate.mattermost.com/projects/mattermost/mattermost-server_master/ * Translated using Weblate (German) Currently translated at 100.0% (2301 of 2301 strings) Translation: mattermost-languages-shipped/mattermost-server Translate-URL: https://translate.mattermost.com/projects/mattermost/mattermost-server_master/de/ * Translated using Weblate (Turkish) Currently translated at 100.0% (2301 of 2301 strings) Translation: mattermost-languages-shipped/mattermost-server Translate-URL: https://translate.mattermost.com/projects/mattermost/mattermost-server_master/tr/ * Translated using Weblate (Hungarian) Currently translated at 100.0% (2301 of 2301 strings) Translation: mattermost-languages-shipped/mattermost-server Translate-URL: https://translate.mattermost.com/projects/mattermost/mattermost-server_master/hu/ * Translated using Weblate (English (Australia)) Currently translated at 100.0% (2301 of 2301 strings) Translation: mattermost-languages-shipped/mattermost-server Translate-URL: https://translate.mattermost.com/projects/mattermost/mattermost-server_master/en_AU/ * Translated using Weblate (Bulgarian) Currently translated at 100.0% (2301 of 2301 strings) Translation: mattermost-languages-shipped/mattermost-server Translate-URL: https://translate.mattermost.com/projects/mattermost/mattermost-server_master/bg/ * Translated using Weblate (Japanese) Currently translated at 100.0% (2301 of 2301 strings) Translation: mattermost-languages-shipped/mattermost-server Translate-URL: https://translate.mattermost.com/projects/mattermost/mattermost-server_master/ja/ * Translated using Weblate (Chinese (Simplified)) Currently translated at 100.0% (2301 of 2301 strings) Translation: mattermost-languages-shipped/mattermost-server Translate-URL: https://translate.mattermost.com/projects/mattermost/mattermost-server_master/zh_Hans/ Co-authored-by: JtheBAB <srast@bioc.uzh.ch> Co-authored-by: Kaya Zeren <kayazeren@gmail.com> Co-authored-by: Tóth Csaba // Online ERP Hungary Kft <csaba.toth@online-erp.hu> Co-authored-by: Matthew Williams <Matthew.Williams@outlook.com.au> Co-authored-by: Nikolai Zahariev <nikolaiz@yahoo.com> Co-authored-by: kaakaa <stooner.hoe@gmail.com> Co-authored-by: aeomin <lin@aeomin.net> Co-authored-by: Weblate (bot) <hosted@weblate.org> Co-authored-by: JtheBAB <srast@bioc.uzh.ch> Co-authored-by: Kaya Zeren <kayazeren@gmail.com> Co-authored-by: Tóth Csaba // Online ERP Hungary Kft <csaba.toth@online-erp.hu> Co-authored-by: Matthew Williams <Matthew.Williams@outlook.com.au> Co-authored-by: Nikolai Zahariev <nikolaiz@yahoo.com> Co-authored-by: kaakaa <stooner.hoe@gmail.com> Co-authored-by: aeomin <lin@aeomin.net> * [MM-22051] Remove To/From JSON methods from model (#18138) * Scheme * Role * Session * Config * Status * Fix logic * Emoji * GuestsInvite * Group * Command * ClusterInfo * License * Job * System * Plugin * Command2 * IncomingWebhook * OutgoingWebhook * Fix tests * Update traslation * Some fixes * Add missing return * Simplify * Make Config.ToJSONFiltered() return []byte * Make Busy.ToJSON() return []byte * Include error in log * Split logic * [MM-22051] Remove To/From JSON (final) (#18150) * SwitchRequest * PluginEventData * Permalink * PushNotification * SuggestCommand * PluginsResponse * WebSocketMessage * RemoteCluster * SharedChannel * PluginStatuses * InitialLoad * ClusterDiscovery * ClusterStats * MfaSecret * GroupSyncable * SAML * WebSocketRequest * TypingRequest * SecurityBulletin * OAuthApp * IntegrationAction * DataRetention * Preference * FileInfoList * Compliance * Preferences * FileInfoSearchResults * TermsOfService * InstallMarketplacePluginRequest * GitLabUser * UploadSessions * Remove unused helpers * Fix tests * [MM-23280] Fix linting for ToJSON/FromJSON (#18153) * SwitchRequest * PluginEventData * Permalink * PushNotification * SuggestCommand * PluginsResponse * WebSocketMessage * RemoteCluster * SharedChannel * PluginStatuses * InitialLoad * ClusterDiscovery * ClusterStats * MfaSecret * GroupSyncable * SAML * WebSocketRequest * TypingRequest * SecurityBulletin * OAuthApp * IntegrationAction * DataRetention * Preference * FileInfoList * Compliance * Preferences * FileInfoSearchResults * TermsOfService * InstallMarketplacePluginRequest * GitLabUser * UploadSessions * Remove unused helpers * Fix tests * Fix linting for ToJSON/FromJSON * Fix conversions Co-authored-by: Weblate (bot) <hosted@weblate.org> Co-authored-by: JtheBAB <srast@bioc.uzh.ch> Co-authored-by: Kaya Zeren <kayazeren@gmail.com> Co-authored-by: Tóth Csaba // Online ERP Hungary Kft <csaba.toth@online-erp.hu> Co-authored-by: Matthew Williams <Matthew.Williams@outlook.com.au> Co-authored-by: Nikolai Zahariev <nikolaiz@yahoo.com> Co-authored-by: kaakaa <stooner.hoe@gmail.com> Co-authored-by: aeomin <lin@aeomin.net> Co-authored-by: Mattermod <mattermod@users.noreply.github.com>
479 lines
14 KiB
Go
479 lines
14 KiB
Go
// Copyright (c) 2015-present Mattermost, Inc. All Rights Reserved.
|
|
// See LICENSE.txt for license information.
|
|
|
|
package api4
|
|
|
|
import (
|
|
"encoding/json"
|
|
"net/http"
|
|
"strconv"
|
|
"strings"
|
|
|
|
"github.com/mattermost/mattermost-server/v6/audit"
|
|
"github.com/mattermost/mattermost-server/v6/model"
|
|
"github.com/mattermost/mattermost-server/v6/shared/mlog"
|
|
)
|
|
|
|
func (api *API) InitCommand() {
|
|
api.BaseRoutes.Commands.Handle("", api.APISessionRequired(createCommand)).Methods("POST")
|
|
api.BaseRoutes.Commands.Handle("", api.APISessionRequired(listCommands)).Methods("GET")
|
|
api.BaseRoutes.Commands.Handle("/execute", api.APISessionRequired(executeCommand)).Methods("POST")
|
|
|
|
api.BaseRoutes.Command.Handle("", api.APISessionRequired(getCommand)).Methods("GET")
|
|
api.BaseRoutes.Command.Handle("", api.APISessionRequired(updateCommand)).Methods("PUT")
|
|
api.BaseRoutes.Command.Handle("/move", api.APISessionRequired(moveCommand)).Methods("PUT")
|
|
api.BaseRoutes.Command.Handle("", api.APISessionRequired(deleteCommand)).Methods("DELETE")
|
|
|
|
api.BaseRoutes.Team.Handle("/commands/autocomplete", api.APISessionRequired(listAutocompleteCommands)).Methods("GET")
|
|
api.BaseRoutes.Team.Handle("/commands/autocomplete_suggestions", api.APISessionRequired(listCommandAutocompleteSuggestions)).Methods("GET")
|
|
api.BaseRoutes.Command.Handle("/regen_token", api.APISessionRequired(regenCommandToken)).Methods("PUT")
|
|
}
|
|
|
|
func createCommand(c *Context, w http.ResponseWriter, r *http.Request) {
|
|
var cmd model.Command
|
|
if jsonErr := json.NewDecoder(r.Body).Decode(&cmd); jsonErr != nil {
|
|
c.SetInvalidParam("command")
|
|
return
|
|
}
|
|
|
|
auditRec := c.MakeAuditRecord("createCommand", audit.Fail)
|
|
defer c.LogAuditRec(auditRec)
|
|
c.LogAudit("attempt")
|
|
|
|
if !c.App.SessionHasPermissionToTeam(*c.AppContext.Session(), cmd.TeamId, model.PermissionManageSlashCommands) {
|
|
c.SetPermissionError(model.PermissionManageSlashCommands)
|
|
return
|
|
}
|
|
|
|
cmd.CreatorId = c.AppContext.Session().UserId
|
|
|
|
rcmd, err := c.App.CreateCommand(&cmd)
|
|
if err != nil {
|
|
c.Err = err
|
|
return
|
|
}
|
|
|
|
auditRec.Success()
|
|
c.LogAudit("success")
|
|
auditRec.AddMeta("command", rcmd)
|
|
|
|
w.WriteHeader(http.StatusCreated)
|
|
if err := json.NewEncoder(w).Encode(rcmd); err != nil {
|
|
mlog.Warn("Error while writing response", mlog.Err(err))
|
|
}
|
|
}
|
|
|
|
func updateCommand(c *Context, w http.ResponseWriter, r *http.Request) {
|
|
c.RequireCommandId()
|
|
if c.Err != nil {
|
|
return
|
|
}
|
|
|
|
var cmd model.Command
|
|
if jsonErr := json.NewDecoder(r.Body).Decode(&cmd); jsonErr != nil || cmd.Id != c.Params.CommandId {
|
|
c.SetInvalidParam("command")
|
|
return
|
|
}
|
|
|
|
auditRec := c.MakeAuditRecord("updateCommand", audit.Fail)
|
|
defer c.LogAuditRec(auditRec)
|
|
c.LogAudit("attempt")
|
|
|
|
oldCmd, err := c.App.GetCommand(c.Params.CommandId)
|
|
if err != nil {
|
|
auditRec.AddMeta("command_id", c.Params.CommandId)
|
|
c.SetCommandNotFoundError()
|
|
return
|
|
}
|
|
auditRec.AddMeta("command", oldCmd)
|
|
|
|
if cmd.TeamId != oldCmd.TeamId {
|
|
c.Err = model.NewAppError("updateCommand", "api.command.team_mismatch.app_error", nil, "user_id="+c.AppContext.Session().UserId, http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
if !c.App.SessionHasPermissionToTeam(*c.AppContext.Session(), oldCmd.TeamId, model.PermissionManageSlashCommands) {
|
|
c.LogAudit("fail - inappropriate permissions")
|
|
// here we return Not_found instead of a permissions error so we don't leak the existence of
|
|
// a command to someone without permissions for the team it belongs to.
|
|
c.SetCommandNotFoundError()
|
|
return
|
|
}
|
|
|
|
if c.AppContext.Session().UserId != oldCmd.CreatorId && !c.App.SessionHasPermissionToTeam(*c.AppContext.Session(), oldCmd.TeamId, model.PermissionManageOthersSlashCommands) {
|
|
c.LogAudit("fail - inappropriate permissions")
|
|
c.SetPermissionError(model.PermissionManageOthersSlashCommands)
|
|
return
|
|
}
|
|
|
|
rcmd, err := c.App.UpdateCommand(oldCmd, &cmd)
|
|
if err != nil {
|
|
c.Err = err
|
|
return
|
|
}
|
|
|
|
auditRec.Success()
|
|
c.LogAudit("success")
|
|
|
|
if err := json.NewEncoder(w).Encode(rcmd); err != nil {
|
|
mlog.Warn("Error while writing response", mlog.Err(err))
|
|
}
|
|
}
|
|
|
|
func moveCommand(c *Context, w http.ResponseWriter, r *http.Request) {
|
|
c.RequireCommandId()
|
|
if c.Err != nil {
|
|
return
|
|
}
|
|
|
|
var cmr model.CommandMoveRequest
|
|
if jsonErr := json.NewDecoder(r.Body).Decode(&cmr); jsonErr != nil {
|
|
c.SetInvalidParam("team_id")
|
|
return
|
|
}
|
|
|
|
auditRec := c.MakeAuditRecord("moveCommand", audit.Fail)
|
|
defer c.LogAuditRec(auditRec)
|
|
c.LogAudit("attempt")
|
|
|
|
newTeam, appErr := c.App.GetTeam(cmr.TeamId)
|
|
if appErr != nil {
|
|
c.Err = appErr
|
|
return
|
|
}
|
|
auditRec.AddMeta("team", newTeam)
|
|
|
|
if !c.App.SessionHasPermissionToTeam(*c.AppContext.Session(), newTeam.Id, model.PermissionManageSlashCommands) {
|
|
c.LogAudit("fail - inappropriate permissions")
|
|
c.SetPermissionError(model.PermissionManageSlashCommands)
|
|
return
|
|
}
|
|
|
|
cmd, appErr := c.App.GetCommand(c.Params.CommandId)
|
|
if appErr != nil {
|
|
c.SetCommandNotFoundError()
|
|
return
|
|
}
|
|
auditRec.AddMeta("command", cmd)
|
|
|
|
if !c.App.SessionHasPermissionToTeam(*c.AppContext.Session(), cmd.TeamId, model.PermissionManageSlashCommands) {
|
|
c.LogAudit("fail - inappropriate permissions")
|
|
// here we return Not_found instead of a permissions error so we don't leak the existence of
|
|
// a command to someone without permissions for the team it belongs to.
|
|
c.SetCommandNotFoundError()
|
|
return
|
|
}
|
|
|
|
if appErr = c.App.MoveCommand(newTeam, cmd); appErr != nil {
|
|
c.Err = appErr
|
|
return
|
|
}
|
|
|
|
auditRec.Success()
|
|
c.LogAudit("success")
|
|
|
|
ReturnStatusOK(w)
|
|
}
|
|
|
|
func deleteCommand(c *Context, w http.ResponseWriter, r *http.Request) {
|
|
c.RequireCommandId()
|
|
if c.Err != nil {
|
|
return
|
|
}
|
|
|
|
auditRec := c.MakeAuditRecord("deleteCommand", audit.Fail)
|
|
defer c.LogAuditRec(auditRec)
|
|
c.LogAudit("attempt")
|
|
|
|
cmd, err := c.App.GetCommand(c.Params.CommandId)
|
|
if err != nil {
|
|
c.SetCommandNotFoundError()
|
|
return
|
|
}
|
|
auditRec.AddMeta("command", cmd)
|
|
|
|
if !c.App.SessionHasPermissionToTeam(*c.AppContext.Session(), cmd.TeamId, model.PermissionManageSlashCommands) {
|
|
c.LogAudit("fail - inappropriate permissions")
|
|
// here we return Not_found instead of a permissions error so we don't leak the existence of
|
|
// a command to someone without permissions for the team it belongs to.
|
|
c.SetCommandNotFoundError()
|
|
return
|
|
}
|
|
|
|
if c.AppContext.Session().UserId != cmd.CreatorId && !c.App.SessionHasPermissionToTeam(*c.AppContext.Session(), cmd.TeamId, model.PermissionManageOthersSlashCommands) {
|
|
c.LogAudit("fail - inappropriate permissions")
|
|
c.SetPermissionError(model.PermissionManageOthersSlashCommands)
|
|
return
|
|
}
|
|
|
|
err = c.App.DeleteCommand(cmd.Id)
|
|
if err != nil {
|
|
c.Err = err
|
|
return
|
|
}
|
|
|
|
auditRec.Success()
|
|
c.LogAudit("success")
|
|
|
|
ReturnStatusOK(w)
|
|
}
|
|
|
|
func listCommands(c *Context, w http.ResponseWriter, r *http.Request) {
|
|
customOnly, _ := strconv.ParseBool(r.URL.Query().Get("custom_only"))
|
|
|
|
teamId := r.URL.Query().Get("team_id")
|
|
if teamId == "" {
|
|
c.SetInvalidParam("team_id")
|
|
return
|
|
}
|
|
|
|
if !c.App.SessionHasPermissionToTeam(*c.AppContext.Session(), teamId, model.PermissionViewTeam) {
|
|
c.SetPermissionError(model.PermissionViewTeam)
|
|
return
|
|
}
|
|
|
|
var commands []*model.Command
|
|
var err *model.AppError
|
|
if customOnly {
|
|
if !c.App.SessionHasPermissionToTeam(*c.AppContext.Session(), teamId, model.PermissionManageSlashCommands) {
|
|
c.SetPermissionError(model.PermissionManageSlashCommands)
|
|
return
|
|
}
|
|
commands, err = c.App.ListTeamCommands(teamId)
|
|
if err != nil {
|
|
c.Err = err
|
|
return
|
|
}
|
|
} else {
|
|
//User with no permission should see only system commands
|
|
if !c.App.SessionHasPermissionToTeam(*c.AppContext.Session(), teamId, model.PermissionManageSlashCommands) {
|
|
commands, err = c.App.ListAutocompleteCommands(teamId, c.AppContext.T)
|
|
if err != nil {
|
|
c.Err = err
|
|
return
|
|
}
|
|
} else {
|
|
commands, err = c.App.ListAllCommands(teamId, c.AppContext.T)
|
|
if err != nil {
|
|
c.Err = err
|
|
return
|
|
}
|
|
}
|
|
}
|
|
|
|
if err := json.NewEncoder(w).Encode(commands); err != nil {
|
|
mlog.Warn("Error writing response", mlog.Err(err))
|
|
}
|
|
}
|
|
|
|
func getCommand(c *Context, w http.ResponseWriter, r *http.Request) {
|
|
c.RequireCommandId()
|
|
if c.Err != nil {
|
|
return
|
|
}
|
|
|
|
cmd, err := c.App.GetCommand(c.Params.CommandId)
|
|
if err != nil {
|
|
c.SetCommandNotFoundError()
|
|
return
|
|
}
|
|
|
|
// check for permissions to view this command; must have perms to view team and
|
|
// PERMISSION_MANAGE_SLASH_COMMANDS for the team the command belongs to.
|
|
|
|
if !c.App.SessionHasPermissionToTeam(*c.AppContext.Session(), cmd.TeamId, model.PermissionViewTeam) {
|
|
// here we return Not_found instead of a permissions error so we don't leak the existence of
|
|
// a command to someone without permissions for the team it belongs to.
|
|
c.SetCommandNotFoundError()
|
|
return
|
|
}
|
|
if !c.App.SessionHasPermissionToTeam(*c.AppContext.Session(), cmd.TeamId, model.PermissionManageSlashCommands) {
|
|
// again, return not_found to ensure id existence does not leak.
|
|
c.SetCommandNotFoundError()
|
|
return
|
|
}
|
|
if err := json.NewEncoder(w).Encode(cmd); err != nil {
|
|
mlog.Warn("Error while writing response", mlog.Err(err))
|
|
}
|
|
}
|
|
|
|
func executeCommand(c *Context, w http.ResponseWriter, r *http.Request) {
|
|
var commandArgs model.CommandArgs
|
|
if jsonErr := json.NewDecoder(r.Body).Decode(&commandArgs); jsonErr != nil {
|
|
c.SetInvalidParam("command_args")
|
|
return
|
|
}
|
|
|
|
if len(commandArgs.Command) <= 1 || strings.Index(commandArgs.Command, "/") != 0 || !model.IsValidId(commandArgs.ChannelId) {
|
|
c.Err = model.NewAppError("executeCommand", "api.command.execute_command.start.app_error", nil, "", http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
auditRec := c.MakeAuditRecord("executeCommand", audit.Fail)
|
|
defer c.LogAuditRec(auditRec)
|
|
auditRec.AddMeta("commandargs", commandArgs)
|
|
|
|
// checks that user is a member of the specified channel, and that they have permission to use slash commands in it
|
|
if !c.App.SessionHasPermissionToChannel(*c.AppContext.Session(), commandArgs.ChannelId, model.PermissionUseSlashCommands) {
|
|
c.SetPermissionError(model.PermissionUseSlashCommands)
|
|
return
|
|
}
|
|
|
|
channel, err := c.App.GetChannel(commandArgs.ChannelId)
|
|
if err != nil {
|
|
c.Err = err
|
|
return
|
|
}
|
|
|
|
if channel.Type != model.ChannelTypeDirect && channel.Type != model.ChannelTypeGroup {
|
|
// if this isn't a DM or GM, the team id is implicitly taken from the channel so that slash commands created on
|
|
// some other team can't be run against this one
|
|
commandArgs.TeamId = channel.TeamId
|
|
} else {
|
|
// if the slash command was used in a DM or GM, ensure that the user is a member of the specified team, so that
|
|
// they can't just execute slash commands against arbitrary teams
|
|
if c.AppContext.Session().GetTeamByTeamId(commandArgs.TeamId) == nil {
|
|
if !c.App.SessionHasPermissionTo(*c.AppContext.Session(), model.PermissionUseSlashCommands) {
|
|
c.SetPermissionError(model.PermissionUseSlashCommands)
|
|
return
|
|
}
|
|
}
|
|
}
|
|
|
|
commandArgs.UserId = c.AppContext.Session().UserId
|
|
commandArgs.T = c.AppContext.T
|
|
commandArgs.SiteURL = c.GetSiteURLHeader()
|
|
commandArgs.Session = *c.AppContext.Session()
|
|
|
|
auditRec.AddMeta("commandargs", commandArgs) // overwrite in case teamid changed
|
|
|
|
response, err := c.App.ExecuteCommand(c.AppContext, &commandArgs)
|
|
if err != nil {
|
|
c.Err = err
|
|
return
|
|
}
|
|
|
|
auditRec.Success()
|
|
if err := json.NewEncoder(w).Encode(response); err != nil {
|
|
mlog.Warn("Error while writing response", mlog.Err(err))
|
|
}
|
|
}
|
|
|
|
func listAutocompleteCommands(c *Context, w http.ResponseWriter, r *http.Request) {
|
|
c.RequireTeamId()
|
|
if c.Err != nil {
|
|
return
|
|
}
|
|
|
|
if !c.App.SessionHasPermissionToTeam(*c.AppContext.Session(), c.Params.TeamId, model.PermissionViewTeam) {
|
|
c.SetPermissionError(model.PermissionViewTeam)
|
|
return
|
|
}
|
|
|
|
commands, err := c.App.ListAutocompleteCommands(c.Params.TeamId, c.AppContext.T)
|
|
if err != nil {
|
|
c.Err = err
|
|
return
|
|
}
|
|
|
|
if err := json.NewEncoder(w).Encode(commands); err != nil {
|
|
mlog.Warn("Error while writing response", mlog.Err(err))
|
|
}
|
|
}
|
|
|
|
func listCommandAutocompleteSuggestions(c *Context, w http.ResponseWriter, r *http.Request) {
|
|
c.RequireTeamId()
|
|
if c.Err != nil {
|
|
return
|
|
}
|
|
if !c.App.SessionHasPermissionToTeam(*c.AppContext.Session(), c.Params.TeamId, model.PermissionViewTeam) {
|
|
c.SetPermissionError(model.PermissionViewTeam)
|
|
return
|
|
}
|
|
|
|
roleId := model.SystemUserRoleId
|
|
if c.IsSystemAdmin() {
|
|
roleId = model.SystemAdminRoleId
|
|
}
|
|
|
|
query := r.URL.Query()
|
|
userInput := query.Get("user_input")
|
|
if userInput == "" {
|
|
c.SetInvalidParam("userInput")
|
|
return
|
|
}
|
|
userInput = strings.TrimPrefix(userInput, "/")
|
|
|
|
commands, err := c.App.ListAutocompleteCommands(c.Params.TeamId, c.AppContext.T)
|
|
if err != nil {
|
|
c.Err = err
|
|
return
|
|
}
|
|
|
|
commandArgs := &model.CommandArgs{
|
|
ChannelId: query.Get("channel_id"),
|
|
TeamId: c.Params.TeamId,
|
|
RootId: query.Get("root_id"),
|
|
UserId: c.AppContext.Session().UserId,
|
|
T: c.AppContext.T,
|
|
Session: *c.AppContext.Session(),
|
|
SiteURL: c.GetSiteURLHeader(),
|
|
Command: userInput,
|
|
}
|
|
|
|
suggestions := c.App.GetSuggestions(c.AppContext, commandArgs, commands, roleId)
|
|
|
|
js, jsonErr := json.Marshal(suggestions)
|
|
if jsonErr != nil {
|
|
c.Err = model.NewAppError("listCommandAutocompleteSuggestions", "api.marshal_error", nil, jsonErr.Error(), http.StatusInternalServerError)
|
|
return
|
|
}
|
|
w.Write(js)
|
|
}
|
|
|
|
func regenCommandToken(c *Context, w http.ResponseWriter, r *http.Request) {
|
|
c.RequireCommandId()
|
|
if c.Err != nil {
|
|
return
|
|
}
|
|
|
|
auditRec := c.MakeAuditRecord("regenCommandToken", audit.Fail)
|
|
defer c.LogAuditRec(auditRec)
|
|
c.LogAudit("attempt")
|
|
|
|
cmd, err := c.App.GetCommand(c.Params.CommandId)
|
|
if err != nil {
|
|
auditRec.AddMeta("command_id", c.Params.CommandId)
|
|
c.SetCommandNotFoundError()
|
|
return
|
|
}
|
|
auditRec.AddMeta("command", cmd)
|
|
|
|
if !c.App.SessionHasPermissionToTeam(*c.AppContext.Session(), cmd.TeamId, model.PermissionManageSlashCommands) {
|
|
c.LogAudit("fail - inappropriate permissions")
|
|
// here we return Not_found instead of a permissions error so we don't leak the existence of
|
|
// a command to someone without permissions for the team it belongs to.
|
|
c.SetCommandNotFoundError()
|
|
return
|
|
}
|
|
|
|
if c.AppContext.Session().UserId != cmd.CreatorId && !c.App.SessionHasPermissionToTeam(*c.AppContext.Session(), cmd.TeamId, model.PermissionManageOthersSlashCommands) {
|
|
c.LogAudit("fail - inappropriate permissions")
|
|
c.SetPermissionError(model.PermissionManageOthersSlashCommands)
|
|
return
|
|
}
|
|
|
|
rcmd, err := c.App.RegenCommandToken(cmd)
|
|
if err != nil {
|
|
c.Err = err
|
|
return
|
|
}
|
|
|
|
auditRec.Success()
|
|
c.LogAudit("success")
|
|
|
|
resp := make(map[string]string)
|
|
resp["token"] = rcmd.Token
|
|
|
|
w.Write([]byte(model.MapToJSON(resp)))
|
|
}
|