mirror of
https://github.com/mattermost/mattermost.git
synced 2025-02-25 18:55:24 -06:00
838 lines
25 KiB
Go
838 lines
25 KiB
Go
// Copyright (c) 2016 Mattermost, Inc. All Rights Reserved.
|
|
// See License.txt for license information.
|
|
|
|
package api
|
|
|
|
import (
|
|
"bufio"
|
|
"io"
|
|
"io/ioutil"
|
|
"net/http"
|
|
"os"
|
|
"strconv"
|
|
"strings"
|
|
"time"
|
|
|
|
"runtime/debug"
|
|
|
|
l4g "github.com/alecthomas/log4go"
|
|
"github.com/gorilla/mux"
|
|
"github.com/mattermost/platform/einterfaces"
|
|
"github.com/mattermost/platform/model"
|
|
"github.com/mattermost/platform/store"
|
|
"github.com/mattermost/platform/utils"
|
|
"github.com/mssola/user_agent"
|
|
)
|
|
|
|
func InitAdmin() {
|
|
l4g.Debug(utils.T("api.admin.init.debug"))
|
|
|
|
BaseRoutes.Admin.Handle("/logs", ApiAdminSystemRequired(getLogs)).Methods("GET")
|
|
BaseRoutes.Admin.Handle("/audits", ApiAdminSystemRequired(getAllAudits)).Methods("GET")
|
|
BaseRoutes.Admin.Handle("/config", ApiAdminSystemRequired(getConfig)).Methods("GET")
|
|
BaseRoutes.Admin.Handle("/save_config", ApiAdminSystemRequired(saveConfig)).Methods("POST")
|
|
BaseRoutes.Admin.Handle("/reload_config", ApiAdminSystemRequired(reloadConfig)).Methods("GET")
|
|
BaseRoutes.Admin.Handle("/invalidate_all_caches", ApiAdminSystemRequired(invalidateAllCaches)).Methods("GET")
|
|
BaseRoutes.Admin.Handle("/test_email", ApiAdminSystemRequired(testEmail)).Methods("POST")
|
|
BaseRoutes.Admin.Handle("/recycle_db_conn", ApiAdminSystemRequired(recycleDatabaseConnection)).Methods("GET")
|
|
BaseRoutes.Admin.Handle("/analytics/{id:[A-Za-z0-9]+}/{name:[A-Za-z0-9_]+}", ApiAdminSystemRequired(getAnalytics)).Methods("GET")
|
|
BaseRoutes.Admin.Handle("/analytics/{name:[A-Za-z0-9_]+}", ApiAdminSystemRequired(getAnalytics)).Methods("GET")
|
|
BaseRoutes.Admin.Handle("/save_compliance_report", ApiAdminSystemRequired(saveComplianceReport)).Methods("POST")
|
|
BaseRoutes.Admin.Handle("/compliance_reports", ApiAdminSystemRequired(getComplianceReports)).Methods("GET")
|
|
BaseRoutes.Admin.Handle("/download_compliance_report/{id:[A-Za-z0-9]+}", ApiAdminSystemRequiredTrustRequester(downloadComplianceReport)).Methods("GET")
|
|
BaseRoutes.Admin.Handle("/upload_brand_image", ApiAdminSystemRequired(uploadBrandImage)).Methods("POST")
|
|
BaseRoutes.Admin.Handle("/get_brand_image", ApiAppHandlerTrustRequester(getBrandImage)).Methods("GET")
|
|
BaseRoutes.Admin.Handle("/reset_mfa", ApiAdminSystemRequired(adminResetMfa)).Methods("POST")
|
|
BaseRoutes.Admin.Handle("/reset_password", ApiAdminSystemRequired(adminResetPassword)).Methods("POST")
|
|
BaseRoutes.Admin.Handle("/ldap_sync_now", ApiAdminSystemRequired(ldapSyncNow)).Methods("POST")
|
|
BaseRoutes.Admin.Handle("/ldap_test", ApiAdminSystemRequired(ldapTest)).Methods("POST")
|
|
BaseRoutes.Admin.Handle("/saml_metadata", ApiAppHandler(samlMetadata)).Methods("GET")
|
|
BaseRoutes.Admin.Handle("/add_certificate", ApiAdminSystemRequired(addCertificate)).Methods("POST")
|
|
BaseRoutes.Admin.Handle("/remove_certificate", ApiAdminSystemRequired(removeCertificate)).Methods("POST")
|
|
BaseRoutes.Admin.Handle("/saml_cert_status", ApiAdminSystemRequired(samlCertificateStatus)).Methods("GET")
|
|
BaseRoutes.Admin.Handle("/cluster_status", ApiAdminSystemRequired(getClusterStatus)).Methods("GET")
|
|
BaseRoutes.Admin.Handle("/recently_active_users/{team_id:[A-Za-z0-9]+}", ApiUserRequired(getRecentlyActiveUsers)).Methods("GET")
|
|
}
|
|
|
|
func getLogs(c *Context, w http.ResponseWriter, r *http.Request) {
|
|
lines, err := GetLogs()
|
|
if err != nil {
|
|
c.Err = err
|
|
return
|
|
}
|
|
|
|
if einterfaces.GetClusterInterface() != nil {
|
|
clines, err := einterfaces.GetClusterInterface().GetLogs()
|
|
if err != nil {
|
|
c.Err = err
|
|
return
|
|
}
|
|
|
|
lines = append(lines, clines...)
|
|
}
|
|
|
|
w.Write([]byte(model.ArrayToJson(lines)))
|
|
}
|
|
|
|
func GetLogs() ([]string, *model.AppError) {
|
|
var lines []string
|
|
|
|
if utils.Cfg.LogSettings.EnableFile {
|
|
file, err := os.Open(utils.GetLogFileLocation(utils.Cfg.LogSettings.FileLocation))
|
|
if err != nil {
|
|
return nil, model.NewLocAppError("getLogs", "api.admin.file_read_error", nil, err.Error())
|
|
}
|
|
|
|
defer file.Close()
|
|
|
|
scanner := bufio.NewScanner(file)
|
|
for scanner.Scan() {
|
|
lines = append(lines, scanner.Text())
|
|
}
|
|
} else {
|
|
lines = append(lines, "")
|
|
}
|
|
|
|
return lines, nil
|
|
}
|
|
|
|
func getClusterStatus(c *Context, w http.ResponseWriter, r *http.Request) {
|
|
infos := make([]*model.ClusterInfo, 0)
|
|
if einterfaces.GetClusterInterface() != nil {
|
|
infos = einterfaces.GetClusterInterface().GetClusterInfos()
|
|
}
|
|
|
|
w.Write([]byte(model.ClusterInfosToJson(infos)))
|
|
}
|
|
|
|
func getAllAudits(c *Context, w http.ResponseWriter, r *http.Request) {
|
|
if result := <-Srv.Store.Audit().Get("", 200); result.Err != nil {
|
|
c.Err = result.Err
|
|
return
|
|
} else {
|
|
audits := result.Data.(model.Audits)
|
|
etag := audits.Etag()
|
|
|
|
if HandleEtag(etag, "Get All Audits", w, r) {
|
|
return
|
|
}
|
|
|
|
if len(etag) > 0 {
|
|
w.Header().Set(model.HEADER_ETAG_SERVER, etag)
|
|
}
|
|
|
|
w.Write([]byte(audits.ToJson()))
|
|
return
|
|
}
|
|
}
|
|
|
|
func getConfig(c *Context, w http.ResponseWriter, r *http.Request) {
|
|
json := utils.Cfg.ToJson()
|
|
cfg := model.ConfigFromJson(strings.NewReader(json))
|
|
|
|
cfg.Sanitize()
|
|
|
|
w.Header().Set("Cache-Control", "no-cache, no-store, must-revalidate")
|
|
w.Write([]byte(cfg.ToJson()))
|
|
}
|
|
|
|
func reloadConfig(c *Context, w http.ResponseWriter, r *http.Request) {
|
|
debug.FreeOSMemory()
|
|
utils.LoadConfig(utils.CfgFileName)
|
|
|
|
// start/restart email batching job if necessary
|
|
InitEmailBatching()
|
|
|
|
w.Header().Set("Cache-Control", "no-cache, no-store, must-revalidate")
|
|
ReturnStatusOK(w)
|
|
}
|
|
|
|
func invalidateAllCaches(c *Context, w http.ResponseWriter, r *http.Request) {
|
|
debug.FreeOSMemory()
|
|
|
|
InvalidateAllCaches()
|
|
|
|
if einterfaces.GetClusterInterface() != nil {
|
|
err := einterfaces.GetClusterInterface().InvalidateAllCaches()
|
|
if err != nil {
|
|
c.Err = err
|
|
return
|
|
}
|
|
|
|
}
|
|
|
|
w.Header().Set("Cache-Control", "no-cache, no-store, must-revalidate")
|
|
ReturnStatusOK(w)
|
|
}
|
|
|
|
func saveConfig(c *Context, w http.ResponseWriter, r *http.Request) {
|
|
cfg := model.ConfigFromJson(r.Body)
|
|
if cfg == nil {
|
|
c.SetInvalidParam("saveConfig", "config")
|
|
return
|
|
}
|
|
|
|
cfg.SetDefaults()
|
|
utils.Desanitize(cfg)
|
|
|
|
if err := cfg.IsValid(); err != nil {
|
|
c.Err = err
|
|
return
|
|
}
|
|
|
|
if err := utils.ValidateLdapFilter(cfg); err != nil {
|
|
c.Err = err
|
|
return
|
|
}
|
|
|
|
if *utils.Cfg.ClusterSettings.Enable {
|
|
c.Err = model.NewLocAppError("saveConfig", "ent.cluster.save_config.error", nil, "")
|
|
return
|
|
}
|
|
|
|
c.LogAudit("")
|
|
|
|
//oldCfg := utils.Cfg
|
|
utils.SaveConfig(utils.CfgFileName, cfg)
|
|
utils.LoadConfig(utils.CfgFileName)
|
|
|
|
if einterfaces.GetMetricsInterface() != nil {
|
|
if *utils.Cfg.MetricsSettings.Enable {
|
|
einterfaces.GetMetricsInterface().StartServer()
|
|
} else {
|
|
einterfaces.GetMetricsInterface().StopServer()
|
|
}
|
|
}
|
|
|
|
// Future feature is to sync the configuration files
|
|
// if einterfaces.GetClusterInterface() != nil {
|
|
// err := einterfaces.GetClusterInterface().ConfigChanged(cfg, oldCfg, true)
|
|
// if err != nil {
|
|
// c.Err = err
|
|
// return
|
|
// }
|
|
// }
|
|
|
|
// start/restart email batching job if necessary
|
|
InitEmailBatching()
|
|
|
|
rdata := map[string]string{}
|
|
rdata["status"] = "OK"
|
|
w.Write([]byte(model.MapToJson(rdata)))
|
|
}
|
|
|
|
func recycleDatabaseConnection(c *Context, w http.ResponseWriter, r *http.Request) {
|
|
oldStore := Srv.Store
|
|
|
|
l4g.Warn(utils.T("api.admin.recycle_db_start.warn"))
|
|
Srv.Store = store.NewSqlStore()
|
|
|
|
time.Sleep(20 * time.Second)
|
|
oldStore.Close()
|
|
|
|
l4g.Warn(utils.T("api.admin.recycle_db_end.warn"))
|
|
|
|
w.Header().Set("Cache-Control", "no-cache, no-store, must-revalidate")
|
|
ReturnStatusOK(w)
|
|
}
|
|
|
|
func testEmail(c *Context, w http.ResponseWriter, r *http.Request) {
|
|
cfg := model.ConfigFromJson(r.Body)
|
|
if cfg == nil {
|
|
c.SetInvalidParam("testEmail", "config")
|
|
return
|
|
}
|
|
|
|
if len(cfg.EmailSettings.SMTPServer) == 0 {
|
|
c.Err = model.NewLocAppError("testEmail", "api.admin.test_email.missing_server", nil, utils.T("api.context.invalid_param.app_error", map[string]interface{}{"Name": "SMTPServer"}))
|
|
return
|
|
}
|
|
|
|
// if the user hasn't changed their email settings, fill in the actual SMTP password so that
|
|
// the user can verify an existing SMTP connection
|
|
if cfg.EmailSettings.SMTPPassword == model.FAKE_SETTING {
|
|
if cfg.EmailSettings.SMTPServer == utils.Cfg.EmailSettings.SMTPServer &&
|
|
cfg.EmailSettings.SMTPPort == utils.Cfg.EmailSettings.SMTPPort &&
|
|
cfg.EmailSettings.SMTPUsername == utils.Cfg.EmailSettings.SMTPUsername {
|
|
cfg.EmailSettings.SMTPPassword = utils.Cfg.EmailSettings.SMTPPassword
|
|
} else {
|
|
c.Err = model.NewLocAppError("testEmail", "api.admin.test_email.reenter_password", nil, "")
|
|
return
|
|
}
|
|
}
|
|
|
|
if result := <-Srv.Store.User().Get(c.Session.UserId); result.Err != nil {
|
|
c.Err = result.Err
|
|
return
|
|
} else {
|
|
if err := utils.SendMailUsingConfig(result.Data.(*model.User).Email, c.T("api.admin.test_email.subject"), c.T("api.admin.test_email.body"), cfg); err != nil {
|
|
c.Err = err
|
|
return
|
|
}
|
|
}
|
|
|
|
m := make(map[string]string)
|
|
m["SUCCESS"] = "true"
|
|
w.Write([]byte(model.MapToJson(m)))
|
|
}
|
|
|
|
func getComplianceReports(c *Context, w http.ResponseWriter, r *http.Request) {
|
|
if !*utils.Cfg.ComplianceSettings.Enable || !utils.IsLicensed || !*utils.License.Features.Compliance {
|
|
c.Err = model.NewLocAppError("getComplianceReports", "ent.compliance.licence_disable.app_error", nil, "")
|
|
return
|
|
}
|
|
|
|
if result := <-Srv.Store.Compliance().GetAll(); result.Err != nil {
|
|
c.Err = result.Err
|
|
return
|
|
} else {
|
|
crs := result.Data.(model.Compliances)
|
|
w.Write([]byte(crs.ToJson()))
|
|
}
|
|
}
|
|
|
|
func saveComplianceReport(c *Context, w http.ResponseWriter, r *http.Request) {
|
|
if !*utils.Cfg.ComplianceSettings.Enable || !utils.IsLicensed || !*utils.License.Features.Compliance || einterfaces.GetComplianceInterface() == nil {
|
|
c.Err = model.NewLocAppError("saveComplianceReport", "ent.compliance.licence_disable.app_error", nil, "")
|
|
return
|
|
}
|
|
|
|
job := model.ComplianceFromJson(r.Body)
|
|
if job == nil {
|
|
c.SetInvalidParam("saveComplianceReport", "compliance")
|
|
return
|
|
}
|
|
|
|
job.UserId = c.Session.UserId
|
|
job.Type = model.COMPLIANCE_TYPE_ADHOC
|
|
|
|
if result := <-Srv.Store.Compliance().Save(job); result.Err != nil {
|
|
c.Err = result.Err
|
|
return
|
|
} else {
|
|
job = result.Data.(*model.Compliance)
|
|
go einterfaces.GetComplianceInterface().RunComplianceJob(job)
|
|
}
|
|
|
|
w.Write([]byte(job.ToJson()))
|
|
}
|
|
|
|
func downloadComplianceReport(c *Context, w http.ResponseWriter, r *http.Request) {
|
|
if !*utils.Cfg.ComplianceSettings.Enable || !utils.IsLicensed || !*utils.License.Features.Compliance || einterfaces.GetComplianceInterface() == nil {
|
|
c.Err = model.NewLocAppError("downloadComplianceReport", "ent.compliance.licence_disable.app_error", nil, "")
|
|
return
|
|
}
|
|
|
|
params := mux.Vars(r)
|
|
|
|
id := params["id"]
|
|
if len(id) != 26 {
|
|
c.SetInvalidParam("downloadComplianceReport", "id")
|
|
return
|
|
}
|
|
|
|
if result := <-Srv.Store.Compliance().Get(id); result.Err != nil {
|
|
c.Err = result.Err
|
|
return
|
|
} else {
|
|
job := result.Data.(*model.Compliance)
|
|
c.LogAudit("downloaded " + job.Desc)
|
|
|
|
if f, err := ioutil.ReadFile(*utils.Cfg.ComplianceSettings.Directory + "compliance/" + job.JobName() + ".zip"); err != nil {
|
|
c.Err = model.NewLocAppError("readFile", "api.file.read_file.reading_local.app_error", nil, err.Error())
|
|
return
|
|
} else {
|
|
w.Header().Set("Cache-Control", "max-age=2592000, public")
|
|
w.Header().Set("Content-Length", strconv.Itoa(len(f)))
|
|
w.Header().Del("Content-Type") // Content-Type will be set automatically by the http writer
|
|
|
|
// attach extra headers to trigger a download on IE, Edge, and Safari
|
|
ua := user_agent.New(r.UserAgent())
|
|
bname, _ := ua.Browser()
|
|
|
|
w.Header().Set("Content-Disposition", "attachment;filename=\""+job.JobName()+".zip\"")
|
|
|
|
if bname == "Edge" || bname == "Internet Explorer" || bname == "Safari" {
|
|
// trim off anything before the final / so we just get the file's name
|
|
w.Header().Set("Content-Type", "application/octet-stream")
|
|
}
|
|
|
|
w.Write(f)
|
|
}
|
|
}
|
|
}
|
|
|
|
func getAnalytics(c *Context, w http.ResponseWriter, r *http.Request) {
|
|
params := mux.Vars(r)
|
|
teamId := params["id"]
|
|
name := params["name"]
|
|
|
|
skipIntensiveQueries := false
|
|
var systemUserCount int64
|
|
if r := <-Srv.Store.User().AnalyticsUniqueUserCount(""); r.Err != nil {
|
|
c.Err = r.Err
|
|
return
|
|
} else {
|
|
systemUserCount = r.Data.(int64)
|
|
if systemUserCount > int64(*utils.Cfg.AnalyticsSettings.MaxUsersForStatistics) {
|
|
l4g.Debug("More than %v users on the system, intensive queries skipped", *utils.Cfg.AnalyticsSettings.MaxUsersForStatistics)
|
|
skipIntensiveQueries = true
|
|
}
|
|
}
|
|
|
|
if name == "standard" {
|
|
var rows model.AnalyticsRows = make([]*model.AnalyticsRow, 8)
|
|
rows[0] = &model.AnalyticsRow{"channel_open_count", 0}
|
|
rows[1] = &model.AnalyticsRow{"channel_private_count", 0}
|
|
rows[2] = &model.AnalyticsRow{"post_count", 0}
|
|
rows[3] = &model.AnalyticsRow{"unique_user_count", 0}
|
|
rows[4] = &model.AnalyticsRow{"team_count", 0}
|
|
rows[5] = &model.AnalyticsRow{"total_websocket_connections", 0}
|
|
rows[6] = &model.AnalyticsRow{"total_master_db_connections", 0}
|
|
rows[7] = &model.AnalyticsRow{"total_read_db_connections", 0}
|
|
|
|
openChan := Srv.Store.Channel().AnalyticsTypeCount(teamId, model.CHANNEL_OPEN)
|
|
privateChan := Srv.Store.Channel().AnalyticsTypeCount(teamId, model.CHANNEL_PRIVATE)
|
|
teamChan := Srv.Store.Team().AnalyticsTeamCount()
|
|
|
|
var userChan store.StoreChannel
|
|
if teamId != "" {
|
|
userChan = Srv.Store.User().AnalyticsUniqueUserCount(teamId)
|
|
}
|
|
|
|
var postChan store.StoreChannel
|
|
if !skipIntensiveQueries {
|
|
postChan = Srv.Store.Post().AnalyticsPostCount(teamId, false, false)
|
|
}
|
|
|
|
if r := <-openChan; r.Err != nil {
|
|
c.Err = r.Err
|
|
return
|
|
} else {
|
|
rows[0].Value = float64(r.Data.(int64))
|
|
}
|
|
|
|
if r := <-privateChan; r.Err != nil {
|
|
c.Err = r.Err
|
|
return
|
|
} else {
|
|
rows[1].Value = float64(r.Data.(int64))
|
|
}
|
|
|
|
if postChan == nil {
|
|
rows[2].Value = -1
|
|
} else {
|
|
if r := <-postChan; r.Err != nil {
|
|
c.Err = r.Err
|
|
return
|
|
} else {
|
|
rows[2].Value = float64(r.Data.(int64))
|
|
}
|
|
}
|
|
|
|
if userChan == nil {
|
|
rows[3].Value = float64(systemUserCount)
|
|
} else {
|
|
if r := <-userChan; r.Err != nil {
|
|
c.Err = r.Err
|
|
return
|
|
} else {
|
|
rows[3].Value = float64(r.Data.(int64))
|
|
}
|
|
}
|
|
|
|
if r := <-teamChan; r.Err != nil {
|
|
c.Err = r.Err
|
|
return
|
|
} else {
|
|
rows[4].Value = float64(r.Data.(int64))
|
|
}
|
|
|
|
// If in HA mode then aggregrate all the stats
|
|
if einterfaces.GetClusterInterface() != nil && *utils.Cfg.ClusterSettings.Enable {
|
|
stats, err := einterfaces.GetClusterInterface().GetClusterStats()
|
|
if err != nil {
|
|
c.Err = err
|
|
return
|
|
}
|
|
|
|
totalSockets := TotalWebsocketConnections()
|
|
totalMasterDb := Srv.Store.TotalMasterDbConnections()
|
|
totalReadDb := Srv.Store.TotalReadDbConnections()
|
|
|
|
for _, stat := range stats {
|
|
totalSockets = totalSockets + stat.TotalWebsocketConnections
|
|
totalMasterDb = totalMasterDb + stat.TotalMasterDbConnections
|
|
totalReadDb = totalReadDb + stat.TotalReadDbConnections
|
|
}
|
|
|
|
rows[5].Value = float64(totalSockets)
|
|
rows[6].Value = float64(totalMasterDb)
|
|
rows[7].Value = float64(totalReadDb)
|
|
|
|
} else {
|
|
rows[5].Value = float64(TotalWebsocketConnections())
|
|
rows[6].Value = float64(Srv.Store.TotalMasterDbConnections())
|
|
rows[7].Value = float64(Srv.Store.TotalReadDbConnections())
|
|
}
|
|
|
|
w.Write([]byte(rows.ToJson()))
|
|
} else if name == "post_counts_day" {
|
|
if skipIntensiveQueries {
|
|
rows := model.AnalyticsRows{&model.AnalyticsRow{"", -1}}
|
|
w.Write([]byte(rows.ToJson()))
|
|
return
|
|
}
|
|
|
|
if r := <-Srv.Store.Post().AnalyticsPostCountsByDay(teamId); r.Err != nil {
|
|
c.Err = r.Err
|
|
return
|
|
} else {
|
|
w.Write([]byte(r.Data.(model.AnalyticsRows).ToJson()))
|
|
}
|
|
} else if name == "user_counts_with_posts_day" {
|
|
if skipIntensiveQueries {
|
|
rows := model.AnalyticsRows{&model.AnalyticsRow{"", -1}}
|
|
w.Write([]byte(rows.ToJson()))
|
|
return
|
|
}
|
|
|
|
if r := <-Srv.Store.Post().AnalyticsUserCountsWithPostsByDay(teamId); r.Err != nil {
|
|
c.Err = r.Err
|
|
return
|
|
} else {
|
|
w.Write([]byte(r.Data.(model.AnalyticsRows).ToJson()))
|
|
}
|
|
} else if name == "extra_counts" {
|
|
var rows model.AnalyticsRows = make([]*model.AnalyticsRow, 6)
|
|
rows[0] = &model.AnalyticsRow{"file_post_count", 0}
|
|
rows[1] = &model.AnalyticsRow{"hashtag_post_count", 0}
|
|
rows[2] = &model.AnalyticsRow{"incoming_webhook_count", 0}
|
|
rows[3] = &model.AnalyticsRow{"outgoing_webhook_count", 0}
|
|
rows[4] = &model.AnalyticsRow{"command_count", 0}
|
|
rows[5] = &model.AnalyticsRow{"session_count", 0}
|
|
|
|
iHookChan := Srv.Store.Webhook().AnalyticsIncomingCount(teamId)
|
|
oHookChan := Srv.Store.Webhook().AnalyticsOutgoingCount(teamId)
|
|
commandChan := Srv.Store.Command().AnalyticsCommandCount(teamId)
|
|
sessionChan := Srv.Store.Session().AnalyticsSessionCount()
|
|
|
|
var fileChan store.StoreChannel
|
|
var hashtagChan store.StoreChannel
|
|
if !skipIntensiveQueries {
|
|
fileChan = Srv.Store.Post().AnalyticsPostCount(teamId, true, false)
|
|
hashtagChan = Srv.Store.Post().AnalyticsPostCount(teamId, false, true)
|
|
}
|
|
|
|
if fileChan == nil {
|
|
rows[0].Value = -1
|
|
} else {
|
|
if r := <-fileChan; r.Err != nil {
|
|
c.Err = r.Err
|
|
return
|
|
} else {
|
|
rows[0].Value = float64(r.Data.(int64))
|
|
}
|
|
}
|
|
|
|
if hashtagChan == nil {
|
|
rows[1].Value = -1
|
|
} else {
|
|
if r := <-hashtagChan; r.Err != nil {
|
|
c.Err = r.Err
|
|
return
|
|
} else {
|
|
rows[1].Value = float64(r.Data.(int64))
|
|
}
|
|
}
|
|
|
|
if r := <-iHookChan; r.Err != nil {
|
|
c.Err = r.Err
|
|
return
|
|
} else {
|
|
rows[2].Value = float64(r.Data.(int64))
|
|
}
|
|
|
|
if r := <-oHookChan; r.Err != nil {
|
|
c.Err = r.Err
|
|
return
|
|
} else {
|
|
rows[3].Value = float64(r.Data.(int64))
|
|
}
|
|
|
|
if r := <-commandChan; r.Err != nil {
|
|
c.Err = r.Err
|
|
return
|
|
} else {
|
|
rows[4].Value = float64(r.Data.(int64))
|
|
}
|
|
|
|
if r := <-sessionChan; r.Err != nil {
|
|
c.Err = r.Err
|
|
return
|
|
} else {
|
|
rows[5].Value = float64(r.Data.(int64))
|
|
}
|
|
|
|
w.Write([]byte(rows.ToJson()))
|
|
} else {
|
|
c.SetInvalidParam("getAnalytics", "name")
|
|
}
|
|
|
|
}
|
|
|
|
func uploadBrandImage(c *Context, w http.ResponseWriter, r *http.Request) {
|
|
if len(utils.Cfg.FileSettings.DriverName) == 0 {
|
|
c.Err = model.NewLocAppError("uploadBrandImage", "api.admin.upload_brand_image.storage.app_error", nil, "")
|
|
c.Err.StatusCode = http.StatusNotImplemented
|
|
return
|
|
}
|
|
|
|
if r.ContentLength > *utils.Cfg.FileSettings.MaxFileSize {
|
|
c.Err = model.NewLocAppError("uploadBrandImage", "api.admin.upload_brand_image.too_large.app_error", nil, "")
|
|
c.Err.StatusCode = http.StatusRequestEntityTooLarge
|
|
return
|
|
}
|
|
|
|
if err := r.ParseMultipartForm(*utils.Cfg.FileSettings.MaxFileSize); err != nil {
|
|
c.Err = model.NewLocAppError("uploadBrandImage", "api.admin.upload_brand_image.parse.app_error", nil, "")
|
|
return
|
|
}
|
|
|
|
m := r.MultipartForm
|
|
|
|
imageArray, ok := m.File["image"]
|
|
if !ok {
|
|
c.Err = model.NewLocAppError("uploadBrandImage", "api.admin.upload_brand_image.no_file.app_error", nil, "")
|
|
c.Err.StatusCode = http.StatusBadRequest
|
|
return
|
|
}
|
|
|
|
if len(imageArray) <= 0 {
|
|
c.Err = model.NewLocAppError("uploadBrandImage", "api.admin.upload_brand_image.array.app_error", nil, "")
|
|
c.Err.StatusCode = http.StatusBadRequest
|
|
return
|
|
}
|
|
|
|
brandInterface := einterfaces.GetBrandInterface()
|
|
if brandInterface == nil {
|
|
c.Err = model.NewLocAppError("uploadBrandImage", "api.admin.upload_brand_image.not_available.app_error", nil, "")
|
|
c.Err.StatusCode = http.StatusNotImplemented
|
|
return
|
|
}
|
|
|
|
if err := brandInterface.SaveBrandImage(imageArray[0]); err != nil {
|
|
c.Err = err
|
|
return
|
|
}
|
|
|
|
c.LogAudit("")
|
|
|
|
rdata := map[string]string{}
|
|
rdata["status"] = "OK"
|
|
w.Write([]byte(model.MapToJson(rdata)))
|
|
}
|
|
|
|
func getBrandImage(c *Context, w http.ResponseWriter, r *http.Request) {
|
|
if len(utils.Cfg.FileSettings.DriverName) == 0 {
|
|
c.Err = model.NewLocAppError("getBrandImage", "api.admin.get_brand_image.storage.app_error", nil, "")
|
|
c.Err.StatusCode = http.StatusNotImplemented
|
|
return
|
|
}
|
|
|
|
brandInterface := einterfaces.GetBrandInterface()
|
|
if brandInterface == nil {
|
|
c.Err = model.NewLocAppError("getBrandImage", "api.admin.get_brand_image.not_available.app_error", nil, "")
|
|
c.Err.StatusCode = http.StatusNotImplemented
|
|
return
|
|
}
|
|
|
|
if img, err := brandInterface.GetBrandImage(); err != nil {
|
|
w.Write(nil)
|
|
} else {
|
|
w.Header().Set("Content-Type", "image/png")
|
|
w.Write(img)
|
|
}
|
|
}
|
|
|
|
func adminResetMfa(c *Context, w http.ResponseWriter, r *http.Request) {
|
|
props := model.MapFromJson(r.Body)
|
|
|
|
userId := props["user_id"]
|
|
if len(userId) != 26 {
|
|
c.SetInvalidParam("adminResetMfa", "user_id")
|
|
return
|
|
}
|
|
|
|
if err := DeactivateMfa(userId); err != nil {
|
|
c.Err = err
|
|
return
|
|
}
|
|
|
|
c.LogAudit("")
|
|
|
|
rdata := map[string]string{}
|
|
rdata["status"] = "ok"
|
|
w.Write([]byte(model.MapToJson(rdata)))
|
|
}
|
|
|
|
func adminResetPassword(c *Context, w http.ResponseWriter, r *http.Request) {
|
|
props := model.MapFromJson(r.Body)
|
|
|
|
userId := props["user_id"]
|
|
if len(userId) != 26 {
|
|
c.SetInvalidParam("adminResetPassword", "user_id")
|
|
return
|
|
}
|
|
|
|
newPassword := props["new_password"]
|
|
if err := utils.IsPasswordValid(newPassword); err != nil {
|
|
c.Err = err
|
|
return
|
|
}
|
|
|
|
if err := ResetPassword(c, userId, newPassword); err != nil {
|
|
c.Err = err
|
|
return
|
|
}
|
|
|
|
c.LogAudit("")
|
|
|
|
rdata := map[string]string{}
|
|
rdata["status"] = "ok"
|
|
w.Write([]byte(model.MapToJson(rdata)))
|
|
}
|
|
|
|
func ldapSyncNow(c *Context, w http.ResponseWriter, r *http.Request) {
|
|
go func() {
|
|
if utils.IsLicensed && *utils.License.Features.LDAP && *utils.Cfg.LdapSettings.Enable {
|
|
if ldapI := einterfaces.GetLdapInterface(); ldapI != nil {
|
|
ldapI.SyncNow()
|
|
} else {
|
|
l4g.Error("%v", model.NewLocAppError("ldapSyncNow", "ent.ldap.disabled.app_error", nil, "").Error())
|
|
}
|
|
}
|
|
}()
|
|
|
|
rdata := map[string]string{}
|
|
rdata["status"] = "ok"
|
|
w.Write([]byte(model.MapToJson(rdata)))
|
|
}
|
|
|
|
func ldapTest(c *Context, w http.ResponseWriter, r *http.Request) {
|
|
if ldapI := einterfaces.GetLdapInterface(); ldapI != nil && utils.IsLicensed && *utils.License.Features.LDAP && *utils.Cfg.LdapSettings.Enable {
|
|
if err := ldapI.RunTest(); err != nil {
|
|
c.Err = err
|
|
c.Err.StatusCode = 500
|
|
}
|
|
} else {
|
|
c.Err = model.NewLocAppError("ldapTest", "ent.ldap.disabled.app_error", nil, "")
|
|
c.Err.StatusCode = http.StatusNotImplemented
|
|
}
|
|
|
|
if c.Err == nil {
|
|
rdata := map[string]string{}
|
|
rdata["status"] = "ok"
|
|
w.Write([]byte(model.MapToJson(rdata)))
|
|
}
|
|
}
|
|
|
|
func samlMetadata(c *Context, w http.ResponseWriter, r *http.Request) {
|
|
samlInterface := einterfaces.GetSamlInterface()
|
|
|
|
if samlInterface == nil {
|
|
c.Err = model.NewLocAppError("loginWithSaml", "api.admin.saml.not_available.app_error", nil, "")
|
|
c.Err.StatusCode = http.StatusFound
|
|
return
|
|
}
|
|
|
|
if result, err := samlInterface.GetMetadata(); err != nil {
|
|
c.Err = model.NewLocAppError("loginWithSaml", "api.admin.saml.metadata.app_error", nil, "err="+err.Message)
|
|
return
|
|
} else {
|
|
w.Header().Set("Content-Type", "application/xml")
|
|
w.Header().Set("Content-Disposition", "attachment; filename=\"metadata.xml\"")
|
|
w.Write([]byte(result))
|
|
}
|
|
}
|
|
|
|
func addCertificate(c *Context, w http.ResponseWriter, r *http.Request) {
|
|
err := r.ParseMultipartForm(*utils.Cfg.FileSettings.MaxFileSize)
|
|
if err != nil {
|
|
http.Error(w, err.Error(), http.StatusInternalServerError)
|
|
return
|
|
}
|
|
|
|
m := r.MultipartForm
|
|
|
|
fileArray, ok := m.File["certificate"]
|
|
if !ok {
|
|
c.Err = model.NewLocAppError("addCertificate", "api.admin.add_certificate.no_file.app_error", nil, "")
|
|
c.Err.StatusCode = http.StatusBadRequest
|
|
return
|
|
}
|
|
|
|
if len(fileArray) <= 0 {
|
|
c.Err = model.NewLocAppError("addCertificate", "api.admin.add_certificate.array.app_error", nil, "")
|
|
c.Err.StatusCode = http.StatusBadRequest
|
|
return
|
|
}
|
|
|
|
fileData := fileArray[0]
|
|
|
|
file, err := fileData.Open()
|
|
defer file.Close()
|
|
if err != nil {
|
|
c.Err = model.NewLocAppError("addCertificate", "api.admin.add_certificate.open.app_error", nil, err.Error())
|
|
return
|
|
}
|
|
|
|
out, err := os.Create(utils.FindDir("config") + fileData.Filename)
|
|
if err != nil {
|
|
c.Err = model.NewLocAppError("addCertificate", "api.admin.add_certificate.saving.app_error", nil, err.Error())
|
|
return
|
|
}
|
|
defer out.Close()
|
|
|
|
io.Copy(out, file)
|
|
ReturnStatusOK(w)
|
|
}
|
|
|
|
func removeCertificate(c *Context, w http.ResponseWriter, r *http.Request) {
|
|
props := model.MapFromJson(r.Body)
|
|
|
|
filename := props["filename"]
|
|
if err := os.Remove(utils.FindConfigFile(filename)); err != nil {
|
|
c.Err = model.NewLocAppError("removeCertificate", "api.admin.remove_certificate.delete.app_error",
|
|
map[string]interface{}{"Filename": filename}, err.Error())
|
|
return
|
|
}
|
|
ReturnStatusOK(w)
|
|
}
|
|
|
|
func samlCertificateStatus(c *Context, w http.ResponseWriter, r *http.Request) {
|
|
status := make(map[string]interface{})
|
|
|
|
status["IdpCertificateFile"] = utils.FileExistsInConfigFolder(*utils.Cfg.SamlSettings.IdpCertificateFile)
|
|
status["PrivateKeyFile"] = utils.FileExistsInConfigFolder(*utils.Cfg.SamlSettings.PrivateKeyFile)
|
|
status["PublicCertificateFile"] = utils.FileExistsInConfigFolder(*utils.Cfg.SamlSettings.PublicCertificateFile)
|
|
|
|
w.Write([]byte(model.StringInterfaceToJson(status)))
|
|
}
|
|
|
|
func getRecentlyActiveUsers(c *Context, w http.ResponseWriter, r *http.Request) {
|
|
if result := <-Srv.Store.User().GetRecentlyActiveUsersForTeam(c.TeamId); result.Err != nil {
|
|
c.Err = result.Err
|
|
return
|
|
} else {
|
|
profiles := result.Data.(map[string]*model.User)
|
|
|
|
for _, p := range profiles {
|
|
sanitizeProfile(c, p)
|
|
}
|
|
|
|
w.Write([]byte(model.UserMapToJson(profiles)))
|
|
}
|
|
|
|
}
|