From 56e7bd01ca09ad52b0c4f48f146a20a4f1b78696 Mon Sep 17 00:00:00 2001 From: Wim Date: Sat, 5 Aug 2023 20:43:19 +0200 Subject: Update dependencies and remove old matterclient lib (#2067) --- .../mattermost-server/v5/model/session.go | 235 --------------------- 1 file changed, 235 deletions(-) delete mode 100644 vendor/github.com/mattermost/mattermost-server/v5/model/session.go (limited to 'vendor/github.com/mattermost/mattermost-server/v5/model/session.go') diff --git a/vendor/github.com/mattermost/mattermost-server/v5/model/session.go b/vendor/github.com/mattermost/mattermost-server/v5/model/session.go deleted file mode 100644 index 334c7175..00000000 --- a/vendor/github.com/mattermost/mattermost-server/v5/model/session.go +++ /dev/null @@ -1,235 +0,0 @@ -// Copyright (c) 2015-present Mattermost, Inc. All Rights Reserved. -// See LICENSE.txt for license information. - -package model - -import ( - "encoding/json" - "io" - "strconv" - "strings" - - "github.com/mattermost/mattermost-server/v5/shared/mlog" -) - -const ( - SESSION_COOKIE_TOKEN = "MMAUTHTOKEN" - SESSION_COOKIE_USER = "MMUSERID" - SESSION_COOKIE_CSRF = "MMCSRF" - SESSION_CACHE_SIZE = 35000 - SESSION_PROP_PLATFORM = "platform" - SESSION_PROP_OS = "os" - SESSION_PROP_BROWSER = "browser" - SESSION_PROP_TYPE = "type" - SESSION_PROP_USER_ACCESS_TOKEN_ID = "user_access_token_id" - SESSION_PROP_IS_BOT = "is_bot" - SESSION_PROP_IS_BOT_VALUE = "true" - SESSION_TYPE_USER_ACCESS_TOKEN = "UserAccessToken" - SESSION_TYPE_CLOUD_KEY = "CloudKey" - SESSION_TYPE_REMOTECLUSTER_TOKEN = "RemoteClusterToken" - SESSION_PROP_IS_GUEST = "is_guest" - SESSION_ACTIVITY_TIMEOUT = 1000 * 60 * 5 // 5 minutes - SESSION_USER_ACCESS_TOKEN_EXPIRY = 100 * 365 // 100 years -) - -//msgp StringMap -type StringMap map[string]string - -//msgp:tuple Session - -// Session contains the user session details. -// This struct's serializer methods are auto-generated. If a new field is added/removed, -// please run make gen-serialized. -type Session struct { - Id string `json:"id"` - Token string `json:"token"` - CreateAt int64 `json:"create_at"` - ExpiresAt int64 `json:"expires_at"` - LastActivityAt int64 `json:"last_activity_at"` - UserId string `json:"user_id"` - DeviceId string `json:"device_id"` - Roles string `json:"roles"` - IsOAuth bool `json:"is_oauth"` - ExpiredNotify bool `json:"expired_notify"` - Props StringMap `json:"props"` - TeamMembers []*TeamMember `json:"team_members" db:"-"` - Local bool `json:"local" db:"-"` -} - -// Returns true if the session is unrestricted, which should grant it -// with all permissions. This is used for local mode sessions -func (s *Session) IsUnrestricted() bool { - return s.Local -} - -func (s *Session) DeepCopy() *Session { - copySession := *s - - if s.Props != nil { - copySession.Props = CopyStringMap(s.Props) - } - - if s.TeamMembers != nil { - copySession.TeamMembers = make([]*TeamMember, len(s.TeamMembers)) - for index, tm := range s.TeamMembers { - copySession.TeamMembers[index] = new(TeamMember) - *copySession.TeamMembers[index] = *tm - } - } - - return ©Session -} - -func (s *Session) ToJson() string { - b, _ := json.Marshal(s) - return string(b) -} - -func SessionFromJson(data io.Reader) *Session { - var s *Session - json.NewDecoder(data).Decode(&s) - return s -} - -func (s *Session) PreSave() { - if s.Id == "" { - s.Id = NewId() - } - - if s.Token == "" { - s.Token = NewId() - } - - s.CreateAt = GetMillis() - s.LastActivityAt = s.CreateAt - - if s.Props == nil { - s.Props = make(map[string]string) - } -} - -func (s *Session) Sanitize() { - s.Token = "" -} - -func (s *Session) IsExpired() bool { - - if s.ExpiresAt <= 0 { - return false - } - - if GetMillis() > s.ExpiresAt { - return true - } - - return false -} - -// Deprecated: SetExpireInDays is deprecated and should not be used. -// Use (*App).SetSessionExpireInDays instead which handles the -// cases where the new ExpiresAt is not relative to CreateAt. -func (s *Session) SetExpireInDays(days int) { - if s.CreateAt == 0 { - s.ExpiresAt = GetMillis() + (1000 * 60 * 60 * 24 * int64(days)) - } else { - s.ExpiresAt = s.CreateAt + (1000 * 60 * 60 * 24 * int64(days)) - } -} - -func (s *Session) AddProp(key string, value string) { - - if s.Props == nil { - s.Props = make(map[string]string) - } - - s.Props[key] = value -} - -func (s *Session) GetTeamByTeamId(teamId string) *TeamMember { - for _, team := range s.TeamMembers { - if team.TeamId == teamId { - return team - } - } - - return nil -} - -func (s *Session) IsMobileApp() bool { - return s.DeviceId != "" || s.IsMobile() -} - -func (s *Session) IsMobile() bool { - val, ok := s.Props[USER_AUTH_SERVICE_IS_MOBILE] - if !ok { - return false - } - isMobile, err := strconv.ParseBool(val) - if err != nil { - mlog.Debug("Error parsing boolean property from Session", mlog.Err(err)) - return false - } - return isMobile -} - -func (s *Session) IsSaml() bool { - val, ok := s.Props[USER_AUTH_SERVICE_IS_SAML] - if !ok { - return false - } - isSaml, err := strconv.ParseBool(val) - if err != nil { - mlog.Debug("Error parsing boolean property from Session", mlog.Err(err)) - return false - } - return isSaml -} - -func (s *Session) IsOAuthUser() bool { - val, ok := s.Props[USER_AUTH_SERVICE_IS_OAUTH] - if !ok { - return false - } - isOAuthUser, err := strconv.ParseBool(val) - if err != nil { - mlog.Debug("Error parsing boolean property from Session", mlog.Err(err)) - return false - } - return isOAuthUser -} - -func (s *Session) IsSSOLogin() bool { - return s.IsOAuthUser() || s.IsSaml() -} - -func (s *Session) GetUserRoles() []string { - return strings.Fields(s.Roles) -} - -func (s *Session) GenerateCSRF() string { - token := NewId() - s.AddProp("csrf", token) - return token -} - -func (s *Session) GetCSRF() string { - if s.Props == nil { - return "" - } - - return s.Props["csrf"] -} - -func SessionsToJson(o []*Session) string { - b, err := json.Marshal(o) - if err != nil { - return "[]" - } - return string(b) -} - -func SessionsFromJson(data io.Reader) []*Session { - var o []*Session - json.NewDecoder(data).Decode(&o) - return o -} -- cgit v1.2.3