123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577 |
- // Copyright (c) 2015-present Mattermost, Inc. All Rights Reserved.
- // See LICENSE.txt for license information.
- package api4
- import (
- "net/http"
- "github.com/mattermost/mattermost-server/v5/audit"
- "github.com/mattermost/mattermost-server/v5/model"
- )
- func (api *API) InitWebhook() {
- api.BaseRoutes.IncomingHooks.Handle("", api.ApiSessionRequired(createIncomingHook)).Methods("POST")
- api.BaseRoutes.IncomingHooks.Handle("", api.ApiSessionRequired(getIncomingHooks)).Methods("GET")
- api.BaseRoutes.IncomingHook.Handle("", api.ApiSessionRequired(getIncomingHook)).Methods("GET")
- api.BaseRoutes.IncomingHook.Handle("", api.ApiSessionRequired(updateIncomingHook)).Methods("PUT")
- api.BaseRoutes.IncomingHook.Handle("", api.ApiSessionRequired(deleteIncomingHook)).Methods("DELETE")
- api.BaseRoutes.OutgoingHooks.Handle("", api.ApiSessionRequired(createOutgoingHook)).Methods("POST")
- api.BaseRoutes.OutgoingHooks.Handle("", api.ApiSessionRequired(getOutgoingHooks)).Methods("GET")
- api.BaseRoutes.OutgoingHook.Handle("", api.ApiSessionRequired(getOutgoingHook)).Methods("GET")
- api.BaseRoutes.OutgoingHook.Handle("", api.ApiSessionRequired(updateOutgoingHook)).Methods("PUT")
- api.BaseRoutes.OutgoingHook.Handle("", api.ApiSessionRequired(deleteOutgoingHook)).Methods("DELETE")
- api.BaseRoutes.OutgoingHook.Handle("/regen_token", api.ApiSessionRequired(regenOutgoingHookToken)).Methods("POST")
- }
- func createIncomingHook(c *Context, w http.ResponseWriter, r *http.Request) {
- hook := model.IncomingWebhookFromJson(r.Body)
- if hook == nil {
- c.SetInvalidParam("incoming_webhook")
- return
- }
- channel, err := c.App.GetChannel(hook.ChannelId)
- if err != nil {
- c.Err = err
- return
- }
- auditRec := c.MakeAuditRecord("createIncomingHook", audit.Fail)
- defer c.LogAuditRec(auditRec)
- auditRec.AddMeta("channel", channel)
- c.LogAudit("attempt")
- if !c.App.SessionHasPermissionToTeam(*c.App.Session(), channel.TeamId, model.PERMISSION_MANAGE_INCOMING_WEBHOOKS) {
- c.SetPermissionError(model.PERMISSION_MANAGE_INCOMING_WEBHOOKS)
- return
- }
- if channel.Type != model.CHANNEL_OPEN && !c.App.SessionHasPermissionToChannel(*c.App.Session(), channel.Id, model.PERMISSION_READ_CHANNEL) {
- c.LogAudit("fail - bad channel permissions")
- c.SetPermissionError(model.PERMISSION_READ_CHANNEL)
- return
- }
- incomingHook, err := c.App.CreateIncomingWebhookForChannel(c.App.Session().UserId, channel, hook)
- if err != nil {
- c.Err = err
- return
- }
- auditRec.Success()
- auditRec.AddMeta("hook", incomingHook)
- c.LogAudit("success")
- w.WriteHeader(http.StatusCreated)
- w.Write([]byte(incomingHook.ToJson()))
- }
- func updateIncomingHook(c *Context, w http.ResponseWriter, r *http.Request) {
- c.RequireHookId()
- if c.Err != nil {
- return
- }
- updatedHook := model.IncomingWebhookFromJson(r.Body)
- if updatedHook == nil {
- c.SetInvalidParam("incoming_webhook")
- return
- }
- // The hook being updated in the payload must be the same one as indicated in the URL.
- if updatedHook.Id != c.Params.HookId {
- c.SetInvalidParam("hook_id")
- return
- }
- auditRec := c.MakeAuditRecord("updateIncomingHook", audit.Fail)
- defer c.LogAuditRec(auditRec)
- auditRec.AddMeta("hook_id", c.Params.HookId)
- c.LogAudit("attempt")
- oldHook, err := c.App.GetIncomingWebhook(c.Params.HookId)
- if err != nil {
- c.Err = err
- return
- }
- auditRec.AddMeta("team_id", oldHook.TeamId)
- if updatedHook.TeamId == "" {
- updatedHook.TeamId = oldHook.TeamId
- }
- if updatedHook.TeamId != oldHook.TeamId {
- c.Err = model.NewAppError("updateIncomingHook", "api.webhook.team_mismatch.app_error", nil, "user_id="+c.App.Session().UserId, http.StatusBadRequest)
- return
- }
- channel, err := c.App.GetChannel(updatedHook.ChannelId)
- if err != nil {
- c.Err = err
- return
- }
- auditRec.AddMeta("channel_id", channel.Id)
- auditRec.AddMeta("channel_name", channel.Name)
- if channel.TeamId != updatedHook.TeamId {
- c.SetInvalidParam("channel_id")
- return
- }
- if !c.App.SessionHasPermissionToTeam(*c.App.Session(), channel.TeamId, model.PERMISSION_MANAGE_INCOMING_WEBHOOKS) {
- c.SetPermissionError(model.PERMISSION_MANAGE_INCOMING_WEBHOOKS)
- return
- }
- if c.App.Session().UserId != oldHook.UserId && !c.App.SessionHasPermissionToTeam(*c.App.Session(), channel.TeamId, model.PERMISSION_MANAGE_OTHERS_INCOMING_WEBHOOKS) {
- c.LogAudit("fail - inappropriate permissions")
- c.SetPermissionError(model.PERMISSION_MANAGE_OTHERS_INCOMING_WEBHOOKS)
- return
- }
- if channel.Type != model.CHANNEL_OPEN && !c.App.SessionHasPermissionToChannel(*c.App.Session(), channel.Id, model.PERMISSION_READ_CHANNEL) {
- c.LogAudit("fail - bad channel permissions")
- c.SetPermissionError(model.PERMISSION_READ_CHANNEL)
- return
- }
- incomingHook, err := c.App.UpdateIncomingWebhook(oldHook, updatedHook)
- if err != nil {
- c.Err = err
- return
- }
- auditRec.Success()
- c.LogAudit("success")
- w.WriteHeader(http.StatusCreated)
- w.Write([]byte(incomingHook.ToJson()))
- }
- func getIncomingHooks(c *Context, w http.ResponseWriter, r *http.Request) {
- teamId := r.URL.Query().Get("team_id")
- userId := c.App.Session().UserId
- var hooks []*model.IncomingWebhook
- var err *model.AppError
- if len(teamId) > 0 {
- if !c.App.SessionHasPermissionToTeam(*c.App.Session(), teamId, model.PERMISSION_MANAGE_INCOMING_WEBHOOKS) {
- c.SetPermissionError(model.PERMISSION_MANAGE_INCOMING_WEBHOOKS)
- return
- }
- // Remove userId as a filter if they have permission to manage others.
- if c.App.SessionHasPermissionToTeam(*c.App.Session(), teamId, model.PERMISSION_MANAGE_OTHERS_INCOMING_WEBHOOKS) {
- userId = ""
- }
- hooks, err = c.App.GetIncomingWebhooksForTeamPageByUser(teamId, userId, c.Params.Page, c.Params.PerPage)
- } else {
- if !c.App.SessionHasPermissionTo(*c.App.Session(), model.PERMISSION_MANAGE_INCOMING_WEBHOOKS) {
- c.SetPermissionError(model.PERMISSION_MANAGE_INCOMING_WEBHOOKS)
- return
- }
- // Remove userId as a filter if they have permission to manage others.
- if c.App.SessionHasPermissionTo(*c.App.Session(), model.PERMISSION_MANAGE_OTHERS_INCOMING_WEBHOOKS) {
- userId = ""
- }
- hooks, err = c.App.GetIncomingWebhooksPageByUser(userId, c.Params.Page, c.Params.PerPage)
- }
- if err != nil {
- c.Err = err
- return
- }
- w.Write([]byte(model.IncomingWebhookListToJson(hooks)))
- }
- func getIncomingHook(c *Context, w http.ResponseWriter, r *http.Request) {
- c.RequireHookId()
- if c.Err != nil {
- return
- }
- hookId := c.Params.HookId
- var err *model.AppError
- var hook *model.IncomingWebhook
- var channel *model.Channel
- hook, err = c.App.GetIncomingWebhook(hookId)
- if err != nil {
- c.Err = err
- return
- }
- auditRec := c.MakeAuditRecord("getIncomingHook", audit.Fail)
- defer c.LogAuditRec(auditRec)
- auditRec.AddMeta("hook_id", hook.Id)
- auditRec.AddMeta("hook_display", hook.DisplayName)
- auditRec.AddMeta("channel_id", hook.ChannelId)
- auditRec.AddMeta("team_id", hook.TeamId)
- c.LogAudit("attempt")
- channel, err = c.App.GetChannel(hook.ChannelId)
- if err != nil {
- c.Err = err
- return
- }
- if !c.App.SessionHasPermissionToTeam(*c.App.Session(), hook.TeamId, model.PERMISSION_MANAGE_INCOMING_WEBHOOKS) ||
- (channel.Type != model.CHANNEL_OPEN && !c.App.SessionHasPermissionToChannel(*c.App.Session(), hook.ChannelId, model.PERMISSION_READ_CHANNEL)) {
- c.LogAudit("fail - bad permissions")
- c.SetPermissionError(model.PERMISSION_MANAGE_INCOMING_WEBHOOKS)
- return
- }
- if c.App.Session().UserId != hook.UserId && !c.App.SessionHasPermissionToTeam(*c.App.Session(), hook.TeamId, model.PERMISSION_MANAGE_OTHERS_INCOMING_WEBHOOKS) {
- c.LogAudit("fail - inappropriate permissions")
- c.SetPermissionError(model.PERMISSION_MANAGE_OTHERS_INCOMING_WEBHOOKS)
- return
- }
- auditRec.Success()
- c.LogAudit("success")
- w.Write([]byte(hook.ToJson()))
- }
- func deleteIncomingHook(c *Context, w http.ResponseWriter, r *http.Request) {
- c.RequireHookId()
- if c.Err != nil {
- return
- }
- hookId := c.Params.HookId
- var err *model.AppError
- var hook *model.IncomingWebhook
- var channel *model.Channel
- hook, err = c.App.GetIncomingWebhook(hookId)
- if err != nil {
- c.Err = err
- return
- }
- channel, err = c.App.GetChannel(hook.ChannelId)
- if err != nil {
- c.Err = err
- return
- }
- auditRec := c.MakeAuditRecord("deleteIncomingHook", audit.Fail)
- defer c.LogAuditRec(auditRec)
- auditRec.AddMeta("hook_id", hook.Id)
- auditRec.AddMeta("hook_display", hook.DisplayName)
- auditRec.AddMeta("channel_id", channel.Id)
- auditRec.AddMeta("channel_name", channel.Name)
- auditRec.AddMeta("team_id", hook.TeamId)
- if !c.App.SessionHasPermissionToTeam(*c.App.Session(), hook.TeamId, model.PERMISSION_MANAGE_INCOMING_WEBHOOKS) ||
- (channel.Type != model.CHANNEL_OPEN && !c.App.SessionHasPermissionToChannel(*c.App.Session(), hook.ChannelId, model.PERMISSION_READ_CHANNEL)) {
- c.LogAudit("fail - bad permissions")
- c.SetPermissionError(model.PERMISSION_MANAGE_INCOMING_WEBHOOKS)
- return
- }
- if c.App.Session().UserId != hook.UserId && !c.App.SessionHasPermissionToTeam(*c.App.Session(), hook.TeamId, model.PERMISSION_MANAGE_OTHERS_INCOMING_WEBHOOKS) {
- c.LogAudit("fail - inappropriate permissions")
- c.SetPermissionError(model.PERMISSION_MANAGE_OTHERS_INCOMING_WEBHOOKS)
- return
- }
- if err = c.App.DeleteIncomingWebhook(hookId); err != nil {
- c.Err = err
- return
- }
- auditRec.Success()
- ReturnStatusOK(w)
- }
- func updateOutgoingHook(c *Context, w http.ResponseWriter, r *http.Request) {
- c.RequireHookId()
- if c.Err != nil {
- return
- }
- updatedHook := model.OutgoingWebhookFromJson(r.Body)
- if updatedHook == nil {
- c.SetInvalidParam("outgoing_webhook")
- return
- }
- // The hook being updated in the payload must be the same one as indicated in the URL.
- if updatedHook.Id != c.Params.HookId {
- c.SetInvalidParam("hook_id")
- return
- }
- auditRec := c.MakeAuditRecord("updateOutgoingHook", audit.Fail)
- defer c.LogAuditRec(auditRec)
- auditRec.AddMeta("hook_id", updatedHook.Id)
- auditRec.AddMeta("hook_display", updatedHook.DisplayName)
- auditRec.AddMeta("channel_id", updatedHook.ChannelId)
- auditRec.AddMeta("team_id", updatedHook.TeamId)
- c.LogAudit("attempt")
- oldHook, err := c.App.GetOutgoingWebhook(c.Params.HookId)
- if err != nil {
- c.Err = err
- return
- }
- if updatedHook.TeamId == "" {
- updatedHook.TeamId = oldHook.TeamId
- }
- if updatedHook.TeamId != oldHook.TeamId {
- c.Err = model.NewAppError("updateOutgoingHook", "api.webhook.team_mismatch.app_error", nil, "user_id="+c.App.Session().UserId, http.StatusBadRequest)
- return
- }
- if !c.App.SessionHasPermissionToTeam(*c.App.Session(), updatedHook.TeamId, model.PERMISSION_MANAGE_OUTGOING_WEBHOOKS) {
- c.SetPermissionError(model.PERMISSION_MANAGE_OUTGOING_WEBHOOKS)
- return
- }
- if c.App.Session().UserId != oldHook.CreatorId && !c.App.SessionHasPermissionToTeam(*c.App.Session(), updatedHook.TeamId, model.PERMISSION_MANAGE_OTHERS_OUTGOING_WEBHOOKS) {
- c.LogAudit("fail - inappropriate permissions")
- c.SetPermissionError(model.PERMISSION_MANAGE_OTHERS_OUTGOING_WEBHOOKS)
- return
- }
- updatedHook.CreatorId = c.App.Session().UserId
- rhook, err := c.App.UpdateOutgoingWebhook(oldHook, updatedHook)
- if err != nil {
- c.Err = err
- return
- }
- auditRec.Success()
- c.LogAudit("success")
- w.Write([]byte(rhook.ToJson()))
- }
- func createOutgoingHook(c *Context, w http.ResponseWriter, r *http.Request) {
- hook := model.OutgoingWebhookFromJson(r.Body)
- if hook == nil {
- c.SetInvalidParam("outgoing_webhook")
- return
- }
- auditRec := c.MakeAuditRecord("createOutgoingHook", audit.Fail)
- defer c.LogAuditRec(auditRec)
- auditRec.AddMeta("hook_id", hook.Id)
- c.LogAudit("attempt")
- hook.CreatorId = c.App.Session().UserId
- if !c.App.SessionHasPermissionToTeam(*c.App.Session(), hook.TeamId, model.PERMISSION_MANAGE_OUTGOING_WEBHOOKS) {
- c.SetPermissionError(model.PERMISSION_MANAGE_OUTGOING_WEBHOOKS)
- return
- }
- rhook, err := c.App.CreateOutgoingWebhook(hook)
- if err != nil {
- c.LogAudit("fail")
- c.Err = err
- return
- }
- auditRec.Success()
- auditRec.AddMeta("hook_display", rhook.DisplayName)
- auditRec.AddMeta("channel_id", rhook.ChannelId)
- auditRec.AddMeta("team_id", rhook.TeamId)
- c.LogAudit("success")
- w.WriteHeader(http.StatusCreated)
- w.Write([]byte(rhook.ToJson()))
- }
- func getOutgoingHooks(c *Context, w http.ResponseWriter, r *http.Request) {
- channelId := r.URL.Query().Get("channel_id")
- teamId := r.URL.Query().Get("team_id")
- userId := c.App.Session().UserId
- var hooks []*model.OutgoingWebhook
- var err *model.AppError
- if len(channelId) > 0 {
- if !c.App.SessionHasPermissionToChannel(*c.App.Session(), channelId, model.PERMISSION_MANAGE_OUTGOING_WEBHOOKS) {
- c.SetPermissionError(model.PERMISSION_MANAGE_OUTGOING_WEBHOOKS)
- return
- }
- // Remove userId as a filter if they have permission to manage others.
- if c.App.SessionHasPermissionToChannel(*c.App.Session(), channelId, model.PERMISSION_MANAGE_OTHERS_OUTGOING_WEBHOOKS) {
- userId = ""
- }
- hooks, err = c.App.GetOutgoingWebhooksForChannelPageByUser(channelId, userId, c.Params.Page, c.Params.PerPage)
- } else if len(teamId) > 0 {
- if !c.App.SessionHasPermissionToTeam(*c.App.Session(), teamId, model.PERMISSION_MANAGE_OUTGOING_WEBHOOKS) {
- c.SetPermissionError(model.PERMISSION_MANAGE_OUTGOING_WEBHOOKS)
- return
- }
- // Remove userId as a filter if they have permission to manage others.
- if c.App.SessionHasPermissionToTeam(*c.App.Session(), teamId, model.PERMISSION_MANAGE_OTHERS_OUTGOING_WEBHOOKS) {
- userId = ""
- }
- hooks, err = c.App.GetOutgoingWebhooksForTeamPageByUser(teamId, userId, c.Params.Page, c.Params.PerPage)
- } else {
- if !c.App.SessionHasPermissionTo(*c.App.Session(), model.PERMISSION_MANAGE_OUTGOING_WEBHOOKS) {
- c.SetPermissionError(model.PERMISSION_MANAGE_OUTGOING_WEBHOOKS)
- return
- }
- // Remove userId as a filter if they have permission to manage others.
- if c.App.SessionHasPermissionTo(*c.App.Session(), model.PERMISSION_MANAGE_OTHERS_OUTGOING_WEBHOOKS) {
- userId = ""
- }
- hooks, err = c.App.GetOutgoingWebhooksPageByUser(userId, c.Params.Page, c.Params.PerPage)
- }
- if err != nil {
- c.Err = err
- return
- }
- w.Write([]byte(model.OutgoingWebhookListToJson(hooks)))
- }
- func getOutgoingHook(c *Context, w http.ResponseWriter, r *http.Request) {
- c.RequireHookId()
- if c.Err != nil {
- return
- }
- hook, err := c.App.GetOutgoingWebhook(c.Params.HookId)
- if err != nil {
- c.Err = err
- return
- }
- auditRec := c.MakeAuditRecord("getOutgoingHook", audit.Fail)
- defer c.LogAuditRec(auditRec)
- auditRec.AddMeta("hook_id", hook.Id)
- auditRec.AddMeta("hook_display", hook.DisplayName)
- auditRec.AddMeta("channel_id", hook.ChannelId)
- auditRec.AddMeta("team_id", hook.TeamId)
- c.LogAudit("attempt")
- if !c.App.SessionHasPermissionToTeam(*c.App.Session(), hook.TeamId, model.PERMISSION_MANAGE_OUTGOING_WEBHOOKS) {
- c.SetPermissionError(model.PERMISSION_MANAGE_OUTGOING_WEBHOOKS)
- return
- }
- if c.App.Session().UserId != hook.CreatorId && !c.App.SessionHasPermissionToTeam(*c.App.Session(), hook.TeamId, model.PERMISSION_MANAGE_OTHERS_OUTGOING_WEBHOOKS) {
- c.LogAudit("fail - inappropriate permissions")
- c.SetPermissionError(model.PERMISSION_MANAGE_OTHERS_OUTGOING_WEBHOOKS)
- return
- }
- auditRec.Success()
- c.LogAudit("success")
- w.Write([]byte(hook.ToJson()))
- }
- func regenOutgoingHookToken(c *Context, w http.ResponseWriter, r *http.Request) {
- c.RequireHookId()
- if c.Err != nil {
- return
- }
- hook, err := c.App.GetOutgoingWebhook(c.Params.HookId)
- if err != nil {
- c.Err = err
- return
- }
- auditRec := c.MakeAuditRecord("regenOutgoingHookToken", audit.Fail)
- defer c.LogAuditRec(auditRec)
- auditRec.AddMeta("hook_id", hook.Id)
- auditRec.AddMeta("hook_display", hook.DisplayName)
- auditRec.AddMeta("channel_id", hook.ChannelId)
- auditRec.AddMeta("team_id", hook.TeamId)
- c.LogAudit("attempt")
- if !c.App.SessionHasPermissionToTeam(*c.App.Session(), hook.TeamId, model.PERMISSION_MANAGE_OUTGOING_WEBHOOKS) {
- c.SetPermissionError(model.PERMISSION_MANAGE_OUTGOING_WEBHOOKS)
- return
- }
- if c.App.Session().UserId != hook.CreatorId && !c.App.SessionHasPermissionToTeam(*c.App.Session(), hook.TeamId, model.PERMISSION_MANAGE_OTHERS_OUTGOING_WEBHOOKS) {
- c.LogAudit("fail - inappropriate permissions")
- c.SetPermissionError(model.PERMISSION_MANAGE_OTHERS_OUTGOING_WEBHOOKS)
- return
- }
- rhook, err := c.App.RegenOutgoingWebhookToken(hook)
- if err != nil {
- c.Err = err
- return
- }
- auditRec.Success()
- c.LogAudit("success")
- w.Write([]byte(rhook.ToJson()))
- }
- func deleteOutgoingHook(c *Context, w http.ResponseWriter, r *http.Request) {
- c.RequireHookId()
- if c.Err != nil {
- return
- }
- hook, err := c.App.GetOutgoingWebhook(c.Params.HookId)
- if err != nil {
- c.Err = err
- return
- }
- auditRec := c.MakeAuditRecord("deleteOutgoingHook", audit.Fail)
- defer c.LogAuditRec(auditRec)
- auditRec.AddMeta("hook_id", hook.Id)
- auditRec.AddMeta("hook_display", hook.DisplayName)
- auditRec.AddMeta("channel_id", hook.ChannelId)
- auditRec.AddMeta("team_id", hook.TeamId)
- c.LogAudit("attempt")
- if !c.App.SessionHasPermissionToTeam(*c.App.Session(), hook.TeamId, model.PERMISSION_MANAGE_OUTGOING_WEBHOOKS) {
- c.SetPermissionError(model.PERMISSION_MANAGE_OUTGOING_WEBHOOKS)
- return
- }
- if c.App.Session().UserId != hook.CreatorId && !c.App.SessionHasPermissionToTeam(*c.App.Session(), hook.TeamId, model.PERMISSION_MANAGE_OTHERS_OUTGOING_WEBHOOKS) {
- c.LogAudit("fail - inappropriate permissions")
- c.SetPermissionError(model.PERMISSION_MANAGE_OTHERS_OUTGOING_WEBHOOKS)
- return
- }
- if err := c.App.DeleteOutgoingWebhook(hook.Id); err != nil {
- c.LogAudit("fail")
- c.Err = err
- return
- }
- auditRec.Success()
- c.LogAudit("success")
- ReturnStatusOK(w)
- }
|