Full Mattermost server source with integrated Community Enterprise features. Includes vendor directory for offline/air-gapped builds. Structure: - enterprise-impl/: Enterprise feature implementations - enterprise-community/: Init files that register implementations - enterprise/: Bridge imports (community_imports.go) - vendor/: All dependencies for offline builds Build (online): go build ./cmd/mattermost Build (offline/air-gapped): go build -mod=vendor ./cmd/mattermost 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
416 lines
13 KiB
Go
416 lines
13 KiB
Go
// Copyright (c) 2015-present Mattermost, Inc. All Rights Reserved.
|
|
// See LICENSE.txt for license information.
|
|
|
|
package platform
|
|
|
|
import (
|
|
"crypto/ecdsa"
|
|
"crypto/elliptic"
|
|
"crypto/rand"
|
|
"crypto/sha256"
|
|
"crypto/x509"
|
|
"encoding/base64"
|
|
"encoding/json"
|
|
"errors"
|
|
"fmt"
|
|
"maps"
|
|
"net/http"
|
|
"reflect"
|
|
"strconv"
|
|
|
|
"github.com/mattermost/mattermost/server/public/model"
|
|
"github.com/mattermost/mattermost/server/public/plugin"
|
|
"github.com/mattermost/mattermost/server/public/shared/mlog"
|
|
"github.com/mattermost/mattermost/server/public/shared/request"
|
|
"github.com/mattermost/mattermost/server/public/utils"
|
|
"github.com/mattermost/mattermost/server/v8/channels/store"
|
|
"github.com/mattermost/mattermost/server/v8/config"
|
|
"github.com/mattermost/mattermost/server/v8/einterfaces"
|
|
)
|
|
|
|
// ServiceConfig is used to initialize the PlatformService.
|
|
// The mandatory fields will be checked during the initialization of the service.
|
|
type ServiceConfig struct {
|
|
// Mandatory fields
|
|
Store store.Store
|
|
// Optional fields
|
|
Cluster einterfaces.ClusterInterface
|
|
}
|
|
|
|
func (ps *PlatformService) Config() *model.Config {
|
|
return ps.configStore.Get()
|
|
}
|
|
|
|
// getSanitizedConfig gets the configuration without any secrets.
|
|
func (ps *PlatformService) getSanitizedConfig(rctx request.CTX, opts *model.SanitizeOptions) *model.Config {
|
|
cfg := ps.Config().Clone()
|
|
|
|
manifests, err := ps.getPluginManifests()
|
|
if err != nil {
|
|
// getPluginManifests might error, e.g. when plugins are disabled.
|
|
// Sanitize all plugin settings in this case.
|
|
rctx.Logger().Warn("Failed to get plugin manifests for config sanitization. Will sanitize all plugin settings.", mlog.Err(err))
|
|
cfg.Sanitize(nil, opts)
|
|
} else {
|
|
cfg.Sanitize(manifests, opts)
|
|
}
|
|
|
|
return cfg
|
|
}
|
|
|
|
// Registers a function with a given listener to be called when the config is reloaded and may have changed. The function
|
|
// will be called with two arguments: the old config and the new config. AddConfigListener returns a unique ID
|
|
// for the listener that can later be used to remove it.
|
|
func (ps *PlatformService) AddConfigListener(listener func(*model.Config, *model.Config)) string {
|
|
return ps.configStore.AddListener(listener)
|
|
}
|
|
|
|
func (ps *PlatformService) RemoveConfigListener(id string) {
|
|
ps.configStore.RemoveListener(id)
|
|
}
|
|
|
|
func (ps *PlatformService) UpdateConfig(f func(*model.Config)) {
|
|
if ps.configStore.IsReadOnly() {
|
|
return
|
|
}
|
|
old := ps.Config()
|
|
updated := old.Clone()
|
|
f(updated)
|
|
if _, _, err := ps.configStore.Set(updated); err != nil {
|
|
ps.logger.Error("Failed to update config", mlog.Err(err))
|
|
}
|
|
}
|
|
|
|
// IsConfigReadOnly returns true if the underlying configstore is readonly.
|
|
func (ps *PlatformService) IsConfigReadOnly() bool {
|
|
return ps.configStore.IsReadOnly()
|
|
}
|
|
|
|
// SaveConfig replaces the active configuration, optionally notifying cluster peers.
|
|
// It returns both the previous and current configs.
|
|
func (ps *PlatformService) SaveConfig(newCfg *model.Config, sendConfigChangeClusterMessage bool) (*model.Config, *model.Config, *model.AppError) {
|
|
if ps.pluginEnv != nil {
|
|
var hookErr error
|
|
ps.pluginEnv.RunMultiHook(func(hooks plugin.Hooks, _ *model.Manifest) bool {
|
|
var cfg *model.Config
|
|
cfg, hookErr = hooks.ConfigurationWillBeSaved(newCfg)
|
|
if hookErr == nil && cfg != nil {
|
|
newCfg = cfg
|
|
}
|
|
return hookErr == nil
|
|
}, plugin.ConfigurationWillBeSavedID)
|
|
if hookErr != nil {
|
|
if appErr, ok := hookErr.(*model.AppError); ok {
|
|
return nil, nil, appErr
|
|
}
|
|
return nil, nil, model.NewAppError("saveConfig", "app.save_config.plugin_hook_error", nil, "", http.StatusBadRequest).Wrap(hookErr)
|
|
}
|
|
}
|
|
|
|
oldCfg, newCfg, err := ps.configStore.Set(newCfg)
|
|
if errors.Is(err, config.ErrReadOnlyConfiguration) {
|
|
return nil, nil, model.NewAppError("saveConfig", "ent.cluster.save_config.error", nil, "", http.StatusForbidden).Wrap(err)
|
|
} else if err != nil {
|
|
return nil, nil, model.NewAppError("saveConfig", "app.save_config.app_error", nil, "", http.StatusInternalServerError).Wrap(err)
|
|
}
|
|
|
|
if ps.clusterIFace != nil {
|
|
err := ps.clusterIFace.ConfigChanged(ps.configStore.RemoveEnvironmentOverrides(oldCfg),
|
|
ps.configStore.RemoveEnvironmentOverrides(newCfg), sendConfigChangeClusterMessage)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
}
|
|
|
|
return oldCfg, newCfg, nil
|
|
}
|
|
|
|
func (ps *PlatformService) ReloadConfig() error {
|
|
if err := ps.configStore.Load(); err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (ps *PlatformService) GetEnvironmentOverridesWithFilter(filter func(reflect.StructField) bool) map[string]any {
|
|
return ps.configStore.GetEnvironmentOverridesWithFilter(filter)
|
|
}
|
|
|
|
func (ps *PlatformService) GetEnvironmentOverrides() map[string]any {
|
|
return ps.configStore.GetEnvironmentOverrides()
|
|
}
|
|
|
|
func (ps *PlatformService) DescribeConfig() string {
|
|
return ps.configStore.String()
|
|
}
|
|
|
|
func (ps *PlatformService) CleanUpConfig() error {
|
|
return ps.configStore.CleanUp()
|
|
}
|
|
|
|
// ConfigureLogger applies the specified configuration to a logger.
|
|
func (ps *PlatformService) ConfigureLogger(name string, logger *mlog.Logger, logSettings *model.LogSettings, getPath func(string) string) error {
|
|
// Advanced logging is E20 only, however logging must be initialized before the license
|
|
// file is loaded. If no valid E20 license exists then advanced logging will be
|
|
// shutdown once license is loaded/checked.
|
|
var resultLevel = mlog.LvlInfo
|
|
var resultMsg string
|
|
var err error
|
|
var logConfigSrc config.LogConfigSrc
|
|
dsn := logSettings.GetAdvancedLoggingConfig()
|
|
if !utils.IsEmptyJSON(dsn) {
|
|
logConfigSrc, err = config.NewLogConfigSrc(dsn, ps.configStore)
|
|
if err != nil {
|
|
return fmt.Errorf("invalid config source for %s, %w", name, err)
|
|
}
|
|
resultMsg = fmt.Sprintf("Loaded Advanced Logging configuration for %s: %s", name, string(dsn))
|
|
} else {
|
|
resultLevel = mlog.LvlDebug
|
|
resultMsg = fmt.Sprintf("Advanced logging config not provided for %s", name)
|
|
}
|
|
|
|
cfg, err := config.MloggerConfigFromLoggerConfig(logSettings, logConfigSrc, getPath)
|
|
if err != nil {
|
|
return fmt.Errorf("invalid config source for %s, %w", name, err)
|
|
}
|
|
|
|
// this will remove any existing targets and replace with those defined in cfg.
|
|
if err := logger.ConfigureTargets(cfg, nil); err != nil {
|
|
return fmt.Errorf("invalid config for %s, %w", name, err)
|
|
}
|
|
|
|
if resultMsg != "" {
|
|
ps.Log().Log(resultLevel, resultMsg)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (ps *PlatformService) GetConfigStore() *config.Store {
|
|
return ps.configStore
|
|
}
|
|
|
|
func (ps *PlatformService) GetConfigFile(name string) ([]byte, error) {
|
|
return ps.configStore.GetFile(name)
|
|
}
|
|
|
|
func (ps *PlatformService) SetConfigFile(name string, data []byte) error {
|
|
return ps.configStore.SetFile(name, data)
|
|
}
|
|
|
|
func (ps *PlatformService) RemoveConfigFile(name string) error {
|
|
return ps.configStore.RemoveFile(name)
|
|
}
|
|
|
|
func (ps *PlatformService) HasConfigFile(name string) (bool, error) {
|
|
return ps.configStore.HasFile(name)
|
|
}
|
|
|
|
func (ps *PlatformService) SetConfigReadOnlyFF(readOnly bool) {
|
|
ps.configStore.SetReadOnlyFF(readOnly)
|
|
}
|
|
|
|
func (ps *PlatformService) ClientConfigHash() string {
|
|
return ps.clientConfigHash.Load().(string)
|
|
}
|
|
|
|
func (ps *PlatformService) regenerateClientConfig() {
|
|
clientConfig := config.GenerateClientConfig(ps.Config(), ps.telemetryId, ps.License())
|
|
limitedClientConfig := config.GenerateLimitedClientConfig(ps.Config(), ps.telemetryId, ps.License())
|
|
|
|
if clientConfig["EnableCustomTermsOfService"] == "true" {
|
|
termsOfService, err := ps.Store.TermsOfService().GetLatest(true)
|
|
if err != nil {
|
|
mlog.Err(err)
|
|
} else {
|
|
clientConfig["CustomTermsOfServiceId"] = termsOfService.Id
|
|
limitedClientConfig["CustomTermsOfServiceId"] = termsOfService.Id
|
|
}
|
|
}
|
|
|
|
if key := ps.AsymmetricSigningKey(); key != nil {
|
|
der, _ := x509.MarshalPKIXPublicKey(&key.PublicKey)
|
|
clientConfig["AsymmetricSigningPublicKey"] = base64.StdEncoding.EncodeToString(der)
|
|
limitedClientConfig["AsymmetricSigningPublicKey"] = base64.StdEncoding.EncodeToString(der)
|
|
}
|
|
|
|
clientConfigJSON, _ := json.Marshal(clientConfig)
|
|
ps.clientConfig.Store(clientConfig)
|
|
ps.limitedClientConfig.Store(limitedClientConfig)
|
|
ps.clientConfigHash.Store(fmt.Sprintf("%x", sha256.Sum256(clientConfigJSON)))
|
|
}
|
|
|
|
// AsymmetricSigningKey will return a private key that can be used for asymmetric signing.
|
|
func (ps *PlatformService) AsymmetricSigningKey() *ecdsa.PrivateKey {
|
|
return ps.asymmetricSigningKey.Load()
|
|
}
|
|
|
|
// EnsureAsymmetricSigningKey ensures that an asymmetric signing key exists and future calls to
|
|
// AsymmetricSigningKey will always return a valid signing key.
|
|
func (ps *PlatformService) EnsureAsymmetricSigningKey() error {
|
|
if ps.AsymmetricSigningKey() != nil {
|
|
return nil
|
|
}
|
|
|
|
var key *model.SystemAsymmetricSigningKey
|
|
|
|
value, err := ps.Store.System().GetByName(model.SystemAsymmetricSigningKeyKey)
|
|
if err == nil {
|
|
if err := json.Unmarshal([]byte(value.Value), &key); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
// If we don't already have a key, try to generate one.
|
|
if key == nil {
|
|
newECDSAKey, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
newKey := &model.SystemAsymmetricSigningKey{
|
|
ECDSAKey: &model.SystemECDSAKey{
|
|
Curve: "P-256",
|
|
X: newECDSAKey.X,
|
|
Y: newECDSAKey.Y,
|
|
D: newECDSAKey.D,
|
|
},
|
|
}
|
|
system := &model.System{
|
|
Name: model.SystemAsymmetricSigningKeyKey,
|
|
}
|
|
v, err := json.Marshal(newKey)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
system.Value = string(v)
|
|
// If we were able to save the key, use it, otherwise log the error.
|
|
if err = ps.Store.System().Save(system); err != nil {
|
|
mlog.Warn("Failed to save AsymmetricSigningKey", mlog.Err(err))
|
|
} else {
|
|
key = newKey
|
|
}
|
|
}
|
|
|
|
// If we weren't able to save a new key above, another server must have beat us to it. Get the
|
|
// key from the database, and if that fails, error out.
|
|
if key == nil {
|
|
value, err := ps.Store.System().GetByName(model.SystemAsymmetricSigningKeyKey)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := json.Unmarshal([]byte(value.Value), &key); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
var curve elliptic.Curve
|
|
switch key.ECDSAKey.Curve {
|
|
case "P-256":
|
|
curve = elliptic.P256()
|
|
default:
|
|
return fmt.Errorf("unknown curve: %s", key.ECDSAKey.Curve)
|
|
}
|
|
ps.asymmetricSigningKey.Store(&ecdsa.PrivateKey{
|
|
PublicKey: ecdsa.PublicKey{
|
|
Curve: curve,
|
|
X: key.ECDSAKey.X,
|
|
Y: key.ECDSAKey.Y,
|
|
},
|
|
D: key.ECDSAKey.D,
|
|
})
|
|
ps.regenerateClientConfig()
|
|
return nil
|
|
}
|
|
|
|
// LimitedClientConfigWithComputed gets the configuration in a format suitable for sending to the client.
|
|
func (ps *PlatformService) LimitedClientConfigWithComputed() map[string]string {
|
|
respCfg := maps.Clone(ps.LimitedClientConfig())
|
|
|
|
// These properties are not configurable, but nevertheless represent configuration expected
|
|
// by the client.
|
|
respCfg["NoAccounts"] = strconv.FormatBool(ps.IsFirstUserAccount())
|
|
|
|
return respCfg
|
|
}
|
|
|
|
// ClientConfigWithComputed gets the configuration in a format suitable for sending to the client.
|
|
func (ps *PlatformService) ClientConfigWithComputed() map[string]string {
|
|
respCfg := maps.Clone(ps.ClientConfig())
|
|
|
|
// These properties are not configurable, but nevertheless represent configuration expected
|
|
// by the client.
|
|
respCfg["NoAccounts"] = strconv.FormatBool(ps.IsFirstUserAccount())
|
|
respCfg["MaxPostSize"] = strconv.Itoa(ps.MaxPostSize())
|
|
respCfg["UpgradedFromTE"] = strconv.FormatBool(ps.isUpgradedFromTE())
|
|
respCfg["InstallationDate"] = ""
|
|
if installationDate, err := ps.GetSystemInstallDate(); err == nil {
|
|
respCfg["InstallationDate"] = strconv.FormatInt(installationDate, 10)
|
|
}
|
|
if ver, err := ps.Store.GetDBSchemaVersion(); err != nil {
|
|
mlog.Error("Could not get the schema version", mlog.Err(err))
|
|
} else {
|
|
respCfg["SchemaVersion"] = strconv.Itoa(ver)
|
|
}
|
|
return respCfg
|
|
}
|
|
|
|
func (ps *PlatformService) LimitedClientConfig() map[string]string {
|
|
return ps.limitedClientConfig.Load().(map[string]string)
|
|
}
|
|
|
|
func (ps *PlatformService) IsFirstUserAccount() bool {
|
|
if !ps.isFirstUserAccount.Load() {
|
|
return false
|
|
}
|
|
|
|
ps.isFirstUserAccountLock.Lock()
|
|
defer ps.isFirstUserAccountLock.Unlock()
|
|
// Retry under lock as another call might have already succeeded.
|
|
if !ps.isFirstUserAccount.Load() {
|
|
return false
|
|
}
|
|
|
|
ps.logger.Debug("Fetching user count for first user account check")
|
|
count, err := ps.Store.User().Count(model.UserCountOptions{IncludeDeleted: true})
|
|
if err != nil {
|
|
return false
|
|
}
|
|
|
|
// Avoid calling the user count query in future if we get a count > 0
|
|
if count > 0 {
|
|
ps.isFirstUserAccount.Store(false)
|
|
return false
|
|
}
|
|
|
|
return true
|
|
}
|
|
|
|
func (ps *PlatformService) MaxPostSize() int {
|
|
return ps.Store.Post().GetMaxPostSize()
|
|
}
|
|
|
|
func (ps *PlatformService) isUpgradedFromTE() bool {
|
|
val, err := ps.Store.System().GetByName(model.SystemUpgradedFromTeId)
|
|
if err != nil {
|
|
return false
|
|
}
|
|
return val.Value == "true"
|
|
}
|
|
|
|
func (ps *PlatformService) GetSystemInstallDate() (int64, *model.AppError) {
|
|
systemData, err := ps.Store.System().GetByName(model.SystemInstallationDateKey)
|
|
if err != nil {
|
|
return 0, model.NewAppError("getSystemInstallDate", "app.system.get_by_name.app_error", nil, "", http.StatusInternalServerError).Wrap(err)
|
|
}
|
|
value, err := strconv.ParseInt(systemData.Value, 10, 64)
|
|
if err != nil {
|
|
return 0, model.NewAppError("getSystemInstallDate", "app.system_install_date.parse_int.app_error", nil, "", http.StatusInternalServerError).Wrap(err)
|
|
}
|
|
return value, nil
|
|
}
|
|
|
|
func (ps *PlatformService) ClientConfig() map[string]string {
|
|
return ps.clientConfig.Load().(map[string]string)
|
|
}
|