summaryrefslogtreecommitdiffstats
path: root/vendor/github.com/mattermost/mattermost-server/model/oauth.go
diff options
context:
space:
mode:
authorWim <wim@42.be>2018-08-06 21:47:05 +0200
committerWim <wim@42.be>2018-08-06 21:47:05 +0200
commit51062863a5c34d81e296cf15c61140911037cf3b (patch)
tree9b5e044672486326c7a0ca8fb26430f37bf4d83c /vendor/github.com/mattermost/mattermost-server/model/oauth.go
parent4fb4b7aa6c02a54db8ad8dd98e4d321396926c0d (diff)
downloadmatterbridge-msglm-51062863a5c34d81e296cf15c61140911037cf3b.tar.gz
matterbridge-msglm-51062863a5c34d81e296cf15c61140911037cf3b.tar.bz2
matterbridge-msglm-51062863a5c34d81e296cf15c61140911037cf3b.zip
Use mod vendor for vendored directory (backwards compatible)
Diffstat (limited to 'vendor/github.com/mattermost/mattermost-server/model/oauth.go')
-rw-r--r--vendor/github.com/mattermost/mattermost-server/model/oauth.go164
1 files changed, 0 insertions, 164 deletions
diff --git a/vendor/github.com/mattermost/mattermost-server/model/oauth.go b/vendor/github.com/mattermost/mattermost-server/model/oauth.go
deleted file mode 100644
index 70e8a3f2..00000000
--- a/vendor/github.com/mattermost/mattermost-server/model/oauth.go
+++ /dev/null
@@ -1,164 +0,0 @@
-// Copyright (c) 2015-present Mattermost, Inc. All Rights Reserved.
-// See License.txt for license information.
-
-package model
-
-import (
- "encoding/json"
- "fmt"
- "io"
- "net/http"
- "unicode/utf8"
-)
-
-const (
- OAUTH_ACTION_SIGNUP = "signup"
- OAUTH_ACTION_LOGIN = "login"
- OAUTH_ACTION_EMAIL_TO_SSO = "email_to_sso"
- OAUTH_ACTION_SSO_TO_EMAIL = "sso_to_email"
- OAUTH_ACTION_MOBILE = "mobile"
-)
-
-type OAuthApp struct {
- Id string `json:"id"`
- CreatorId string `json:"creator_id"`
- CreateAt int64 `json:"create_at"`
- UpdateAt int64 `json:"update_at"`
- ClientSecret string `json:"client_secret"`
- Name string `json:"name"`
- Description string `json:"description"`
- IconURL string `json:"icon_url"`
- CallbackUrls StringArray `json:"callback_urls"`
- Homepage string `json:"homepage"`
- IsTrusted bool `json:"is_trusted"`
-}
-
-// IsValid validates the app and returns an error if it isn't configured
-// correctly.
-func (a *OAuthApp) IsValid() *AppError {
-
- if len(a.Id) != 26 {
- return NewAppError("OAuthApp.IsValid", "model.oauth.is_valid.app_id.app_error", nil, "", http.StatusBadRequest)
- }
-
- if a.CreateAt == 0 {
- return NewAppError("OAuthApp.IsValid", "model.oauth.is_valid.create_at.app_error", nil, "app_id="+a.Id, http.StatusBadRequest)
- }
-
- if a.UpdateAt == 0 {
- return NewAppError("OAuthApp.IsValid", "model.oauth.is_valid.update_at.app_error", nil, "app_id="+a.Id, http.StatusBadRequest)
- }
-
- if len(a.CreatorId) != 26 {
- return NewAppError("OAuthApp.IsValid", "model.oauth.is_valid.creator_id.app_error", nil, "app_id="+a.Id, http.StatusBadRequest)
- }
-
- if len(a.ClientSecret) == 0 || len(a.ClientSecret) > 128 {
- return NewAppError("OAuthApp.IsValid", "model.oauth.is_valid.client_secret.app_error", nil, "app_id="+a.Id, http.StatusBadRequest)
- }
-
- if len(a.Name) == 0 || len(a.Name) > 64 {
- return NewAppError("OAuthApp.IsValid", "model.oauth.is_valid.name.app_error", nil, "app_id="+a.Id, http.StatusBadRequest)
- }
-
- if len(a.CallbackUrls) == 0 || len(fmt.Sprintf("%s", a.CallbackUrls)) > 1024 {
- return NewAppError("OAuthApp.IsValid", "model.oauth.is_valid.callback.app_error", nil, "app_id="+a.Id, http.StatusBadRequest)
- }
-
- for _, callback := range a.CallbackUrls {
- if !IsValidHttpUrl(callback) {
- return NewAppError("OAuthApp.IsValid", "model.oauth.is_valid.callback.app_error", nil, "", http.StatusBadRequest)
- }
- }
-
- if len(a.Homepage) == 0 || len(a.Homepage) > 256 || !IsValidHttpUrl(a.Homepage) {
- return NewAppError("OAuthApp.IsValid", "model.oauth.is_valid.homepage.app_error", nil, "app_id="+a.Id, http.StatusBadRequest)
- }
-
- if utf8.RuneCountInString(a.Description) > 512 {
- return NewAppError("OAuthApp.IsValid", "model.oauth.is_valid.description.app_error", nil, "app_id="+a.Id, http.StatusBadRequest)
- }
-
- if len(a.IconURL) > 0 {
- if len(a.IconURL) > 512 || !IsValidHttpUrl(a.IconURL) {
- return NewAppError("OAuthApp.IsValid", "model.oauth.is_valid.icon_url.app_error", nil, "app_id="+a.Id, http.StatusBadRequest)
- }
- }
-
- return nil
-}
-
-// PreSave will set the Id and ClientSecret if missing. It will also fill
-// in the CreateAt, UpdateAt times. It should be run before saving the app to the db.
-func (a *OAuthApp) PreSave() {
- if a.Id == "" {
- a.Id = NewId()
- }
-
- if a.ClientSecret == "" {
- a.ClientSecret = NewId()
- }
-
- a.CreateAt = GetMillis()
- a.UpdateAt = a.CreateAt
-}
-
-// PreUpdate should be run before updating the app in the db.
-func (a *OAuthApp) PreUpdate() {
- a.UpdateAt = GetMillis()
-}
-
-// ToJson convert a User to a json string
-func (a *OAuthApp) ToJson() string {
- b, _ := json.Marshal(a)
- return string(b)
-}
-
-// Generate a valid strong etag so the browser can cache the results
-func (a *OAuthApp) Etag() string {
- return Etag(a.Id, a.UpdateAt)
-}
-
-// Remove any private data from the app object
-func (a *OAuthApp) Sanitize() {
- a.ClientSecret = ""
-}
-
-func (a *OAuthApp) IsValidRedirectURL(url string) bool {
- for _, u := range a.CallbackUrls {
- if u == url {
- return true
- }
- }
-
- return false
-}
-
-// OAuthAppFromJson will decode the input and return a User
-func OAuthAppFromJson(data io.Reader) *OAuthApp {
- var app *OAuthApp
- json.NewDecoder(data).Decode(&app)
- return app
-}
-
-func OAuthAppMapToJson(a map[string]*OAuthApp) string {
- b, _ := json.Marshal(a)
- return string(b)
-}
-
-func OAuthAppMapFromJson(data io.Reader) map[string]*OAuthApp {
- var apps map[string]*OAuthApp
- json.NewDecoder(data).Decode(&apps)
- return apps
-}
-
-func OAuthAppListToJson(l []*OAuthApp) string {
- b, _ := json.Marshal(l)
- return string(b)
-}
-
-func OAuthAppListFromJson(data io.Reader) []*OAuthApp {
- var o []*OAuthApp
- json.NewDecoder(data).Decode(&o)
- return o
-}