mirror of
https://github.com/mattermost/mattermost.git
synced 2025-02-25 18:55:24 -06:00
* improve performance on sendNotifications * Fix SQL queries * Remove get direct profiles, not needed anymore * Add raw data to error details if AppError fails to decode * men * Fix decode (#4052) * Fixing json decode * Adding unit test * Initial work for client scaling (#4051) * Begin adding paging to profiles API * Added more paging functionality * Finish hooking up admin console user lists * Add API for searching users and add searching to all user lists * Add lazy loading of profiles * Revert config.json * Fix unit tests and some style issues * Add GetProfilesFromList to Go driver and fix web unit test * Update etag for GetProfiles * Updating ui for filters and pagination (#4044) * Updating UI for pagination * Adjusting margins for filter row * Adjusting margin for specific modals * Adding relative padding to system console * Adjusting responsive view * Update client user tests * Minor fixes for direct messages modal (#4056) * Remove some unneeded initial load calls (#4057) * UX updates to user lists, added smart counts and bug fixes (#4059) * Improved getExplicitMentions and unit tests (#4064) * Refactor getting posts to lazy load profiles correctly (#4062) * Comment out SetActiveChannel test (#4066) * Profiler cpu, block, and memory profiler. (#4081) * Fix TestSetActiveChannel unit test (#4071) * Fixing build failure caused by dependancies updating (#4076) * Adding profiler * Fix admin_team_member_dropdown eslint errors * Bumping session cache size (#4077) * Bumping session cache size * Bumping status cache * Refactor how the client handles channel members to be large team friendly (#4106) * Refactor how the client handles channel members to be large team friendly * Change Id to ChannelId in ChannelStats model * Updated getChannelMember and getProfilesByIds routes to match proposal * Performance improvements (#4100) * Performance improvements * Fixing re-connect issue * Fixing error message * Some other minor perf tweaks * Some other minor perf tweaks * Fixing config file * Fixing buffer size * Fixing web socket send message * adding some error logging * fix getMe to be user required * Fix websocket event for new user * Fixing shutting down * Reverting web socket changes * Fixing logging lvl * Adding caching to GetMember * Adding some logging * Fixing caching * Fixing caching invalidate * Fixing direct message caching * Fixing caching * Fixing caching * Remove GetDirectProfiles from initial load * Adding logging and fixing websocket client * Adding back caching from bad merge. * Explicitly close go driver requests (#4162) * Refactored how the client handles team members to be more large team friendly (#4159) * Refactor getProfilesForDirectMessageList API into getAllProfiles API * Refactored how the client handles team members to be more large team friendly * Fix js error when receiving a notification * Fix JS error caused by current user being overwritten with sanitized version (#4165) * Adding error message to status failure (#4167) * Fix a few bugs caused by client scaling refactoring (#4170) * When there is no read replica, don't open a second set of connections to the master database (#4173) * Adding connection tacking to stats (#4174) * Reduce DB writes for statuses and other status related changes (#4175) * Fix bug preventing opening of DM channels from more modal (#4181) * Fixing socket timing error (#4183) * Fixing ping/pong handler * Fixing socket timing error * Commenting out status broadcasting * Removing user status changes * Removing user status changes * Removing user status changes * Removing user status changes * Adding DoPreComputeJson() * Performance improvements (#4194) * * Fix System Console Analytics queries * Add db.SetConnMaxLifetime to 15 minutes * Add "net/http/pprof" for profiling * Add FreeOSMemory() to manually release memory on reload config * Add flag to enable http profiler * Fix memory leak (#4197) * Fix memory leak * removed unneeded nil assignment * Fixing go routine leak (#4208) * Merge fixes * Merge fix * Refactored statuses to be queried by the client rather than broadcast by the server (#4212) * Refactored server code to reduce status broadcasts and to allow getting statuses by IDs * Refactor client code to periodically fetch statuses * Add store unit test for getting statuses by ids * Fix status unit test * Add getStatusesByIds REST API and move the client over to use that instead of the WebSocket * Adding multiple threads to websocket hub (#4230) * Adding multiple threads to websocket hub * Fixing unit tests * Fixing so websocket connections from the same user end up in the same… (#4240) * Fixing so websocket connections from the same user end up in the same list * Removing old comment * Refactor user autocomplete to query the server (#4239) * Add API for autocompleting users * Converted at mention autocomplete to query server * Converted user search autocomplete to query server * Switch autocomplete API naming to use term instead of username * Split autocomplete API into two, one for channels and for teams * Fix copy/paste error * Some final client scaling fixes (#4246) * Add lazy loading of profiles to integration pages * Add lazy loading of profiles to emoji page * Fix JS error when receiving post in select team menu and also clean up channel store
188 lines
5.3 KiB
Go
188 lines
5.3 KiB
Go
// Copyright (c) 2016 Mattermost, Inc. All Rights Reserved.
|
|
// See License.txt for license information.
|
|
|
|
package api
|
|
|
|
import (
|
|
"net/http"
|
|
"strings"
|
|
|
|
l4g "github.com/alecthomas/log4go"
|
|
"github.com/mattermost/platform/model"
|
|
)
|
|
|
|
func HasPermissionToContext(c *Context, permission *model.Permission) bool {
|
|
userRoles := c.Session.GetUserRoles()
|
|
if !CheckIfRolesGrantPermission(userRoles, permission.Id) {
|
|
c.Err = model.NewLocAppError("HasPermissionToContext", "api.context.permissions.app_error", nil, "userId="+c.Session.UserId+", teamId="+c.TeamId+" permission="+permission.Id+" "+model.RoleIdsToString(userRoles))
|
|
c.Err.StatusCode = http.StatusForbidden
|
|
return false
|
|
}
|
|
|
|
return true
|
|
}
|
|
|
|
func HasPermissionTo(user *model.User, permission *model.Permission) bool {
|
|
roles := user.GetRoles()
|
|
|
|
return CheckIfRolesGrantPermission(roles, permission.Id)
|
|
}
|
|
|
|
func HasPermissionToCurrentTeamContext(c *Context, permission *model.Permission) bool {
|
|
return HasPermissionToTeamContext(c, c.TeamId, permission)
|
|
}
|
|
|
|
func HasPermissionToTeamContext(c *Context, teamId string, permission *model.Permission) bool {
|
|
teamMember := c.Session.GetTeamByTeamId(teamId)
|
|
if teamMember != nil {
|
|
roles := teamMember.GetRoles()
|
|
|
|
if CheckIfRolesGrantPermission(roles, permission.Id) {
|
|
return true
|
|
}
|
|
}
|
|
|
|
if HasPermissionToContext(c, permission) {
|
|
return true
|
|
}
|
|
|
|
c.Err = model.NewLocAppError("HasPermissionToTeamContext", "api.context.permissions.app_error", nil, "userId="+c.Session.UserId+", teamId="+c.TeamId+" permission="+permission.Id)
|
|
c.Err.StatusCode = http.StatusForbidden
|
|
return false
|
|
}
|
|
|
|
func HasPermissionToTeam(user *model.User, teamMember *model.TeamMember, permission *model.Permission) bool {
|
|
if teamMember == nil {
|
|
return false
|
|
}
|
|
|
|
roles := teamMember.GetRoles()
|
|
|
|
if CheckIfRolesGrantPermission(roles, permission.Id) {
|
|
return true
|
|
}
|
|
|
|
return HasPermissionTo(user, permission)
|
|
}
|
|
|
|
func HasPermissionToChannelContext(c *Context, channelId string, permission *model.Permission) bool {
|
|
cmc := Srv.Store.Channel().GetAllChannelMembersForUser(c.Session.UserId, true)
|
|
|
|
var channelRoles []string
|
|
if cmcresult := <-cmc; cmcresult.Err == nil {
|
|
ids := cmcresult.Data.(map[string]string)
|
|
if roles, ok := ids[channelId]; ok {
|
|
channelRoles = strings.Fields(roles)
|
|
if CheckIfRolesGrantPermission(channelRoles, permission.Id) {
|
|
return true
|
|
}
|
|
}
|
|
}
|
|
|
|
cc := Srv.Store.Channel().Get(channelId)
|
|
if ccresult := <-cc; ccresult.Err == nil {
|
|
channel := ccresult.Data.(*model.Channel)
|
|
|
|
if teamMember := c.Session.GetTeamByTeamId(channel.TeamId); teamMember != nil {
|
|
roles := teamMember.GetRoles()
|
|
|
|
if CheckIfRolesGrantPermission(roles, permission.Id) {
|
|
return true
|
|
}
|
|
}
|
|
|
|
}
|
|
|
|
if HasPermissionToContext(c, permission) {
|
|
return true
|
|
}
|
|
|
|
c.Err = model.NewLocAppError("HasPermissionToChannelContext", "api.context.permissions.app_error", nil, "userId="+c.Session.UserId+", "+"permission="+permission.Id+" channelRoles="+model.RoleIdsToString(channelRoles))
|
|
c.Err.StatusCode = http.StatusForbidden
|
|
return false
|
|
}
|
|
|
|
func HasPermissionToChannel(user *model.User, teamMember *model.TeamMember, channelMember *model.ChannelMember, permission *model.Permission) bool {
|
|
if channelMember == nil {
|
|
return false
|
|
}
|
|
|
|
roles := channelMember.GetRoles()
|
|
|
|
if CheckIfRolesGrantPermission(roles, permission.Id) {
|
|
return true
|
|
}
|
|
|
|
return HasPermissionToTeam(user, teamMember, permission)
|
|
}
|
|
|
|
func HasPermissionToChannelByPostContext(c *Context, postId string, permission *model.Permission) bool {
|
|
cmc := Srv.Store.Channel().GetMemberForPost(postId, c.Session.UserId)
|
|
|
|
var channelRoles []string
|
|
if cmcresult := <-cmc; cmcresult.Err == nil {
|
|
channelMember := cmcresult.Data.(*model.ChannelMember)
|
|
channelRoles = channelMember.GetRoles()
|
|
|
|
if CheckIfRolesGrantPermission(channelRoles, permission.Id) {
|
|
return true
|
|
}
|
|
}
|
|
|
|
cc := Srv.Store.Channel().GetForPost(postId)
|
|
if ccresult := <-cc; ccresult.Err == nil {
|
|
channel := ccresult.Data.(*model.Channel)
|
|
|
|
if teamMember := c.Session.GetTeamByTeamId(channel.TeamId); teamMember != nil {
|
|
roles := teamMember.GetRoles()
|
|
|
|
if CheckIfRolesGrantPermission(roles, permission.Id) {
|
|
return true
|
|
}
|
|
}
|
|
|
|
}
|
|
|
|
if HasPermissionToContext(c, permission) {
|
|
return true
|
|
}
|
|
|
|
c.Err = model.NewLocAppError("HasPermissionToChannelByPostContext", "api.context.permissions.app_error", nil, "userId="+c.Session.UserId+", "+"permission="+permission.Id+" channelRoles="+model.RoleIdsToString(channelRoles))
|
|
c.Err.StatusCode = http.StatusForbidden
|
|
return false
|
|
}
|
|
|
|
func HasPermissionToUser(c *Context, userId string) bool {
|
|
// You are the user (users autmaticly have permissions to themselves)
|
|
if c.Session.UserId == userId {
|
|
return true
|
|
}
|
|
|
|
// You have permission
|
|
if HasPermissionToContext(c, model.PERMISSION_EDIT_OTHER_USERS) {
|
|
return true
|
|
}
|
|
|
|
c.Err = model.NewLocAppError("HasPermissionToUser", "api.context.permissions.app_error", nil, "userId="+userId)
|
|
c.Err.StatusCode = http.StatusForbidden
|
|
return false
|
|
}
|
|
|
|
func CheckIfRolesGrantPermission(roles []string, permissionId string) bool {
|
|
for _, roleId := range roles {
|
|
if role, ok := model.BuiltInRoles[roleId]; !ok {
|
|
l4g.Debug("Bad role in system " + roleId)
|
|
return false
|
|
} else {
|
|
permissions := role.Permissions
|
|
for _, permission := range permissions {
|
|
if permission == permissionId {
|
|
return true
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
return false
|
|
}
|