summaryrefslogtreecommitdiffstats
path: root/vendor/github.com/mattermost/mattermost-server/v5/model/license.go
diff options
context:
space:
mode:
authorWim <wim@42.be>2020-08-10 00:29:54 +0200
committerGitHub <noreply@github.com>2020-08-10 00:29:54 +0200
commit4e50fd864921c556988c919269448efdb90fa961 (patch)
treea3625f03f8de3c4f3841364000a4ea3aa42c1533 /vendor/github.com/mattermost/mattermost-server/v5/model/license.go
parentdfdffa0027334e55ce213fc6eb62206dbf48baf6 (diff)
downloadmatterbridge-msglm-4e50fd864921c556988c919269448efdb90fa961.tar.gz
matterbridge-msglm-4e50fd864921c556988c919269448efdb90fa961.tar.bz2
matterbridge-msglm-4e50fd864921c556988c919269448efdb90fa961.zip
Use mattermost v5 module (#1192)
Diffstat (limited to 'vendor/github.com/mattermost/mattermost-server/v5/model/license.go')
-rw-r--r--vendor/github.com/mattermost/mattermost-server/v5/model/license.go278
1 files changed, 278 insertions, 0 deletions
diff --git a/vendor/github.com/mattermost/mattermost-server/v5/model/license.go b/vendor/github.com/mattermost/mattermost-server/v5/model/license.go
new file mode 100644
index 00000000..0504edc0
--- /dev/null
+++ b/vendor/github.com/mattermost/mattermost-server/v5/model/license.go
@@ -0,0 +1,278 @@
+// Copyright (c) 2015-present Mattermost, Inc. All Rights Reserved.
+// See LICENSE.txt for license information.
+
+package model
+
+import (
+ "encoding/json"
+ "io"
+ "net/http"
+)
+
+const (
+ EXPIRED_LICENSE_ERROR = "api.license.add_license.expired.app_error"
+ INVALID_LICENSE_ERROR = "api.license.add_license.invalid.app_error"
+ LICENSE_GRACE_PERIOD = 1000 * 60 * 60 * 24 * 10 //10 days
+ LICENSE_RENEWAL_LINK = "https://licensing.mattermost.com/renew"
+)
+
+type LicenseRecord struct {
+ Id string `json:"id"`
+ CreateAt int64 `json:"create_at"`
+ Bytes string `json:"-"`
+}
+
+type License struct {
+ Id string `json:"id"`
+ IssuedAt int64 `json:"issued_at"`
+ StartsAt int64 `json:"starts_at"`
+ ExpiresAt int64 `json:"expires_at"`
+ Customer *Customer `json:"customer"`
+ Features *Features `json:"features"`
+ SkuName string `json:"sku_name"`
+ SkuShortName string `json:"sku_short_name"`
+}
+
+type Customer struct {
+ Id string `json:"id"`
+ Name string `json:"name"`
+ Email string `json:"email"`
+ Company string `json:"company"`
+}
+
+type TrialLicenseRequest struct {
+ ServerID string `json:"server_id"`
+ Email string `json:"email"`
+ Name string `json:"name"`
+ SiteURL string `json:"site_url"`
+ SiteName string `json:"site_name"`
+ Users int `json:"users"`
+ TermsAccepted bool `json:"terms_accepted"`
+ ReceiveEmailsAccepted bool `json:"receive_emails_accepted"`
+}
+
+func (tlr *TrialLicenseRequest) ToJson() string {
+ b, _ := json.Marshal(tlr)
+ return string(b)
+}
+
+type Features struct {
+ Users *int `json:"users"`
+ LDAP *bool `json:"ldap"`
+ LDAPGroups *bool `json:"ldap_groups"`
+ MFA *bool `json:"mfa"`
+ GoogleOAuth *bool `json:"google_oauth"`
+ Office365OAuth *bool `json:"office365_oauth"`
+ Compliance *bool `json:"compliance"`
+ Cluster *bool `json:"cluster"`
+ Metrics *bool `json:"metrics"`
+ MHPNS *bool `json:"mhpns"`
+ SAML *bool `json:"saml"`
+ Elasticsearch *bool `json:"elastic_search"`
+ Announcement *bool `json:"announcement"`
+ ThemeManagement *bool `json:"theme_management"`
+ EmailNotificationContents *bool `json:"email_notification_contents"`
+ DataRetention *bool `json:"data_retention"`
+ MessageExport *bool `json:"message_export"`
+ CustomPermissionsSchemes *bool `json:"custom_permissions_schemes"`
+ CustomTermsOfService *bool `json:"custom_terms_of_service"`
+ GuestAccounts *bool `json:"guest_accounts"`
+ GuestAccountsPermissions *bool `json:"guest_accounts_permissions"`
+ IDLoadedPushNotifications *bool `json:"id_loaded"`
+ LockTeammateNameDisplay *bool `json:"lock_teammate_name_display"`
+ EnterprisePlugins *bool `json:"enterprise_plugins"`
+
+ // after we enabled more features we'll need to control them with this
+ FutureFeatures *bool `json:"future_features"`
+}
+
+func (f *Features) ToMap() map[string]interface{} {
+ return map[string]interface{}{
+ "ldap": *f.LDAP,
+ "ldap_groups": *f.LDAPGroups,
+ "mfa": *f.MFA,
+ "google": *f.GoogleOAuth,
+ "office365": *f.Office365OAuth,
+ "compliance": *f.Compliance,
+ "cluster": *f.Cluster,
+ "metrics": *f.Metrics,
+ "mhpns": *f.MHPNS,
+ "saml": *f.SAML,
+ "elastic_search": *f.Elasticsearch,
+ "email_notification_contents": *f.EmailNotificationContents,
+ "data_retention": *f.DataRetention,
+ "message_export": *f.MessageExport,
+ "custom_permissions_schemes": *f.CustomPermissionsSchemes,
+ "guest_accounts": *f.GuestAccounts,
+ "guest_accounts_permissions": *f.GuestAccountsPermissions,
+ "id_loaded": *f.IDLoadedPushNotifications,
+ "lock_teammate_name_display": *f.LockTeammateNameDisplay,
+ "enterprise_plugins": *f.EnterprisePlugins,
+ "future": *f.FutureFeatures,
+ }
+}
+
+func (f *Features) SetDefaults() {
+ if f.FutureFeatures == nil {
+ f.FutureFeatures = NewBool(true)
+ }
+
+ if f.Users == nil {
+ f.Users = NewInt(0)
+ }
+
+ if f.LDAP == nil {
+ f.LDAP = NewBool(*f.FutureFeatures)
+ }
+
+ if f.LDAPGroups == nil {
+ f.LDAPGroups = NewBool(*f.FutureFeatures)
+ }
+
+ if f.MFA == nil {
+ f.MFA = NewBool(*f.FutureFeatures)
+ }
+
+ if f.GoogleOAuth == nil {
+ f.GoogleOAuth = NewBool(*f.FutureFeatures)
+ }
+
+ if f.Office365OAuth == nil {
+ f.Office365OAuth = NewBool(*f.FutureFeatures)
+ }
+
+ if f.Compliance == nil {
+ f.Compliance = NewBool(*f.FutureFeatures)
+ }
+
+ if f.Cluster == nil {
+ f.Cluster = NewBool(*f.FutureFeatures)
+ }
+
+ if f.Metrics == nil {
+ f.Metrics = NewBool(*f.FutureFeatures)
+ }
+
+ if f.MHPNS == nil {
+ f.MHPNS = NewBool(*f.FutureFeatures)
+ }
+
+ if f.SAML == nil {
+ f.SAML = NewBool(*f.FutureFeatures)
+ }
+
+ if f.Elasticsearch == nil {
+ f.Elasticsearch = NewBool(*f.FutureFeatures)
+ }
+
+ if f.Announcement == nil {
+ f.Announcement = NewBool(true)
+ }
+
+ if f.ThemeManagement == nil {
+ f.ThemeManagement = NewBool(true)
+ }
+
+ if f.EmailNotificationContents == nil {
+ f.EmailNotificationContents = NewBool(*f.FutureFeatures)
+ }
+
+ if f.DataRetention == nil {
+ f.DataRetention = NewBool(*f.FutureFeatures)
+ }
+
+ if f.MessageExport == nil {
+ f.MessageExport = NewBool(*f.FutureFeatures)
+ }
+
+ if f.CustomPermissionsSchemes == nil {
+ f.CustomPermissionsSchemes = NewBool(*f.FutureFeatures)
+ }
+
+ if f.GuestAccounts == nil {
+ f.GuestAccounts = NewBool(*f.FutureFeatures)
+ }
+
+ if f.GuestAccountsPermissions == nil {
+ f.GuestAccountsPermissions = NewBool(*f.FutureFeatures)
+ }
+
+ if f.CustomTermsOfService == nil {
+ f.CustomTermsOfService = NewBool(*f.FutureFeatures)
+ }
+
+ if f.IDLoadedPushNotifications == nil {
+ f.IDLoadedPushNotifications = NewBool(*f.FutureFeatures)
+ }
+
+ if f.LockTeammateNameDisplay == nil {
+ f.LockTeammateNameDisplay = NewBool(*f.FutureFeatures)
+ }
+
+ if f.EnterprisePlugins == nil {
+ f.EnterprisePlugins = NewBool(*f.FutureFeatures)
+ }
+}
+
+func (l *License) IsExpired() bool {
+ return l.ExpiresAt < GetMillis()
+}
+
+func (l *License) IsPastGracePeriod() bool {
+ timeDiff := GetMillis() - l.ExpiresAt
+ return timeDiff > LICENSE_GRACE_PERIOD
+}
+
+func (l *License) IsStarted() bool {
+ return l.StartsAt < GetMillis()
+}
+
+func (l *License) ToJson() string {
+ b, _ := json.Marshal(l)
+ return string(b)
+}
+
+// NewTestLicense returns a license that expires in the future and has the given features.
+func NewTestLicense(features ...string) *License {
+ ret := &License{
+ ExpiresAt: GetMillis() + 90*24*60*60*1000,
+ Customer: &Customer{},
+ Features: &Features{},
+ }
+ ret.Features.SetDefaults()
+
+ featureMap := map[string]bool{}
+ for _, feature := range features {
+ featureMap[feature] = true
+ }
+ featureJson, _ := json.Marshal(featureMap)
+ json.Unmarshal(featureJson, &ret.Features)
+
+ return ret
+}
+
+func LicenseFromJson(data io.Reader) *License {
+ var o *License
+ json.NewDecoder(data).Decode(&o)
+ return o
+}
+
+func (lr *LicenseRecord) IsValid() *AppError {
+ if !IsValidId(lr.Id) {
+ return NewAppError("LicenseRecord.IsValid", "model.license_record.is_valid.id.app_error", nil, "", http.StatusBadRequest)
+ }
+
+ if lr.CreateAt == 0 {
+ return NewAppError("LicenseRecord.IsValid", "model.license_record.is_valid.create_at.app_error", nil, "", http.StatusBadRequest)
+ }
+
+ if len(lr.Bytes) == 0 || len(lr.Bytes) > 10000 {
+ return NewAppError("LicenseRecord.IsValid", "model.license_record.is_valid.create_at.app_error", nil, "", http.StatusBadRequest)
+ }
+
+ return nil
+}
+
+func (lr *LicenseRecord) PreSave() {
+ lr.CreateAt = GetMillis()
+}