Full Mattermost server source with integrated Community Enterprise features. Includes vendor directory for offline/air-gapped builds. Structure: - enterprise-impl/: Enterprise feature implementations - enterprise-community/: Init files that register implementations - enterprise/: Bridge imports (community_imports.go) - vendor/: All dependencies for offline builds Build (online): go build ./cmd/mattermost Build (offline/air-gapped): go build -mod=vendor ./cmd/mattermost 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
253 lines
7.5 KiB
Go
253 lines
7.5 KiB
Go
// Copyright (c) 2015-present Mattermost, Inc. All Rights Reserved.
|
|
// See LICENSE.txt for license information.
|
|
|
|
package api4
|
|
|
|
import (
|
|
"net/http"
|
|
|
|
"github.com/klauspost/compress/gzhttp"
|
|
|
|
"github.com/mattermost/mattermost/server/public/model"
|
|
"github.com/mattermost/mattermost/server/public/shared/mlog"
|
|
"github.com/mattermost/mattermost/server/v8/channels/app"
|
|
"github.com/mattermost/mattermost/server/v8/channels/web"
|
|
)
|
|
|
|
type Context = web.Context
|
|
|
|
type handlerFunc func(*Context, http.ResponseWriter, *http.Request)
|
|
|
|
type APIHandlerOption string
|
|
|
|
const (
|
|
handlerParamFileAPI = APIHandlerOption("fileAPI")
|
|
)
|
|
|
|
// APIHandler provides a handler for API endpoints which do not require the user to be logged in order for access to be
|
|
// granted.
|
|
func (api *API) APIHandler(h handlerFunc, opts ...APIHandlerOption) http.Handler {
|
|
handler := &web.Handler{
|
|
Srv: api.srv,
|
|
HandleFunc: h,
|
|
HandlerName: web.GetHandlerName(h),
|
|
RequireSession: false,
|
|
TrustRequester: false,
|
|
RequireMfa: false,
|
|
IsStatic: false,
|
|
IsLocal: false,
|
|
}
|
|
setHandlerOpts(handler, opts...)
|
|
|
|
if *api.srv.Config().ServiceSettings.WebserverMode == "gzip" {
|
|
return gzhttp.GzipHandler(handler)
|
|
}
|
|
return handler
|
|
}
|
|
|
|
// APISessionRequired provides a handler for API endpoints which require the user to be logged in in order for access to
|
|
// be granted.
|
|
func (api *API) APISessionRequired(h handlerFunc, opts ...APIHandlerOption) http.Handler {
|
|
handler := &web.Handler{
|
|
Srv: api.srv,
|
|
HandleFunc: h,
|
|
HandlerName: web.GetHandlerName(h),
|
|
RequireSession: true,
|
|
TrustRequester: false,
|
|
RequireMfa: true,
|
|
IsStatic: false,
|
|
IsLocal: false,
|
|
}
|
|
setHandlerOpts(handler, opts...)
|
|
|
|
if *api.srv.Config().ServiceSettings.WebserverMode == "gzip" {
|
|
return gzhttp.GzipHandler(handler)
|
|
}
|
|
return handler
|
|
}
|
|
|
|
// CloudAPIKeyRequired provides a handler for webhook endpoints to access Cloud installations from CWS
|
|
func (api *API) CloudAPIKeyRequired(h handlerFunc, opts ...APIHandlerOption) http.Handler {
|
|
handler := &web.Handler{
|
|
Srv: api.srv,
|
|
HandleFunc: h,
|
|
HandlerName: web.GetHandlerName(h),
|
|
RequireSession: false,
|
|
RequireCloudKey: true,
|
|
TrustRequester: false,
|
|
RequireMfa: false,
|
|
IsStatic: false,
|
|
IsLocal: false,
|
|
}
|
|
setHandlerOpts(handler, opts...)
|
|
|
|
if *api.srv.Config().ServiceSettings.WebserverMode == "gzip" {
|
|
return gzhttp.GzipHandler(handler)
|
|
}
|
|
return handler
|
|
}
|
|
|
|
// RemoteClusterTokenRequired provides a handler for remote cluster requests to /remotecluster endpoints.
|
|
func (api *API) RemoteClusterTokenRequired(h handlerFunc, opts ...APIHandlerOption) http.Handler {
|
|
handler := &web.Handler{
|
|
Srv: api.srv,
|
|
HandleFunc: h,
|
|
HandlerName: web.GetHandlerName(h),
|
|
RequireSession: false,
|
|
RequireCloudKey: false,
|
|
RequireRemoteClusterToken: true,
|
|
TrustRequester: false,
|
|
RequireMfa: false,
|
|
IsStatic: false,
|
|
IsLocal: false,
|
|
}
|
|
setHandlerOpts(handler, opts...)
|
|
|
|
if *api.srv.Config().ServiceSettings.WebserverMode == "gzip" {
|
|
return gzhttp.GzipHandler(handler)
|
|
}
|
|
return handler
|
|
}
|
|
|
|
// APISessionRequiredMfa provides a handler for API endpoints which require a logged-in user session but when accessed,
|
|
// if MFA is enabled, the MFA process is not yet complete, and therefore the requirement to have completed the MFA
|
|
// authentication must be waived.
|
|
func (api *API) APISessionRequiredMfa(h handlerFunc, opts ...APIHandlerOption) http.Handler {
|
|
handler := &web.Handler{
|
|
Srv: api.srv,
|
|
HandleFunc: h,
|
|
HandlerName: web.GetHandlerName(h),
|
|
RequireSession: true,
|
|
TrustRequester: false,
|
|
RequireMfa: false,
|
|
IsStatic: false,
|
|
IsLocal: false,
|
|
}
|
|
setHandlerOpts(handler, opts...)
|
|
|
|
if *api.srv.Config().ServiceSettings.WebserverMode == "gzip" {
|
|
return gzhttp.GzipHandler(handler)
|
|
}
|
|
return handler
|
|
}
|
|
|
|
// APIHandlerTrustRequester provides a handler for API endpoints which do not require the user to be logged in and are
|
|
// allowed to be requested directly rather than via javascript/XMLHttpRequest, such as site branding images or the
|
|
// websocket.
|
|
func (api *API) APIHandlerTrustRequester(h handlerFunc, opts ...APIHandlerOption) http.Handler {
|
|
handler := &web.Handler{
|
|
Srv: api.srv,
|
|
HandleFunc: h,
|
|
HandlerName: web.GetHandlerName(h),
|
|
RequireSession: false,
|
|
TrustRequester: true,
|
|
RequireMfa: false,
|
|
IsStatic: false,
|
|
IsLocal: false,
|
|
}
|
|
setHandlerOpts(handler, opts...)
|
|
|
|
if *api.srv.Config().ServiceSettings.WebserverMode == "gzip" {
|
|
return gzhttp.GzipHandler(handler)
|
|
}
|
|
return handler
|
|
}
|
|
|
|
// APISessionRequiredTrustRequester provides a handler for API endpoints which do require the user to be logged in and
|
|
// are allowed to be requested directly rather than via javascript/XMLHttpRequest, such as emoji or file uploads.
|
|
func (api *API) APISessionRequiredTrustRequester(h handlerFunc, opts ...APIHandlerOption) http.Handler {
|
|
handler := &web.Handler{
|
|
Srv: api.srv,
|
|
HandleFunc: h,
|
|
HandlerName: web.GetHandlerName(h),
|
|
RequireSession: true,
|
|
TrustRequester: true,
|
|
RequireMfa: true,
|
|
IsStatic: false,
|
|
IsLocal: false,
|
|
}
|
|
setHandlerOpts(handler, opts...)
|
|
|
|
if *api.srv.Config().ServiceSettings.WebserverMode == "gzip" {
|
|
return gzhttp.GzipHandler(handler)
|
|
}
|
|
return handler
|
|
}
|
|
|
|
// DisableWhenBusy provides a handler for API endpoints which should be disabled when the server is under load,
|
|
// responding with HTTP 503 (Service Unavailable).
|
|
func (api *API) APISessionRequiredDisableWhenBusy(h handlerFunc, opts ...APIHandlerOption) http.Handler {
|
|
handler := &web.Handler{
|
|
Srv: api.srv,
|
|
HandleFunc: h,
|
|
HandlerName: web.GetHandlerName(h),
|
|
RequireSession: true,
|
|
TrustRequester: false,
|
|
RequireMfa: true,
|
|
IsStatic: false,
|
|
IsLocal: false,
|
|
DisableWhenBusy: true,
|
|
}
|
|
setHandlerOpts(handler, opts...)
|
|
|
|
if *api.srv.Config().ServiceSettings.WebserverMode == "gzip" {
|
|
return gzhttp.GzipHandler(handler)
|
|
}
|
|
return handler
|
|
}
|
|
|
|
// APILocal provides a handler for API endpoints to be used in local
|
|
// mode, this is, through a UNIX socket and without an authenticated
|
|
// session, but with one that has no user set and no permission
|
|
// restrictions
|
|
func (api *API) APILocal(h handlerFunc, opts ...APIHandlerOption) http.Handler {
|
|
handler := &web.Handler{
|
|
Srv: api.srv,
|
|
HandleFunc: h,
|
|
HandlerName: web.GetHandlerName(h),
|
|
RequireSession: false,
|
|
TrustRequester: false,
|
|
RequireMfa: false,
|
|
IsStatic: false,
|
|
IsLocal: true,
|
|
}
|
|
setHandlerOpts(handler, opts...)
|
|
|
|
if *api.srv.Config().ServiceSettings.WebserverMode == "gzip" {
|
|
return gzhttp.GzipHandler(handler)
|
|
}
|
|
return handler
|
|
}
|
|
|
|
func (api *API) RateLimitedHandler(apiHandler http.Handler, settings model.RateLimitSettings) http.Handler {
|
|
settings.SetDefaults()
|
|
|
|
rateLimiter, err := app.NewRateLimiter(&settings, []string{})
|
|
if err != nil {
|
|
api.srv.Log().Error("getRateLimitedHandler", mlog.Err(err))
|
|
return nil
|
|
}
|
|
return rateLimiter.RateLimitHandler(apiHandler)
|
|
}
|
|
|
|
func requireLicense(c *Context) *model.AppError {
|
|
if c.App.Channels().License() == nil {
|
|
err := model.NewAppError("", "api.license_error", nil, "", http.StatusNotImplemented)
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func setHandlerOpts(handler *web.Handler, opts ...APIHandlerOption) {
|
|
if len(opts) == 0 {
|
|
return
|
|
}
|
|
|
|
for _, option := range opts {
|
|
switch option {
|
|
case handlerParamFileAPI:
|
|
handler.FileAPI = true
|
|
}
|
|
}
|
|
}
|