github.com/spline-fu/mattermost-server@v4.10.10+incompatible/app/webhook.go (about) 1 // Copyright (c) 2016-present Mattermost, Inc. All Rights Reserved. 2 // See License.txt for license information. 3 4 package app 5 6 import ( 7 "fmt" 8 "io" 9 "net/http" 10 "regexp" 11 "strings" 12 "unicode/utf8" 13 14 "github.com/mattermost/mattermost-server/mlog" 15 "github.com/mattermost/mattermost-server/model" 16 "github.com/mattermost/mattermost-server/store" 17 "github.com/mattermost/mattermost-server/utils" 18 ) 19 20 const ( 21 TRIGGERWORDS_EXACT_MATCH = 0 22 TRIGGERWORDS_STARTS_WITH = 1 23 24 MaxIntegrationResponseSize = 1024 * 1024 // Posts can be <100KB at most, so this is likely more than enough 25 ) 26 27 func (a *App) handleWebhookEvents(post *model.Post, team *model.Team, channel *model.Channel, user *model.User) *model.AppError { 28 if !a.Config().ServiceSettings.EnableOutgoingWebhooks { 29 return nil 30 } 31 32 if channel.Type != model.CHANNEL_OPEN { 33 return nil 34 } 35 36 hchan := a.Srv.Store.Webhook().GetOutgoingByTeam(team.Id, -1, -1) 37 result := <-hchan 38 if result.Err != nil { 39 return result.Err 40 } 41 42 hooks := result.Data.([]*model.OutgoingWebhook) 43 if len(hooks) == 0 { 44 return nil 45 } 46 47 var firstWord, triggerWord string 48 49 splitWords := strings.Fields(post.Message) 50 if len(splitWords) > 0 { 51 firstWord = splitWords[0] 52 } 53 54 relevantHooks := []*model.OutgoingWebhook{} 55 for _, hook := range hooks { 56 if hook.ChannelId == post.ChannelId || len(hook.ChannelId) == 0 { 57 if hook.ChannelId == post.ChannelId && len(hook.TriggerWords) == 0 { 58 relevantHooks = append(relevantHooks, hook) 59 triggerWord = "" 60 } else if hook.TriggerWhen == TRIGGERWORDS_EXACT_MATCH && hook.TriggerWordExactMatch(firstWord) { 61 relevantHooks = append(relevantHooks, hook) 62 triggerWord = hook.GetTriggerWord(firstWord, true) 63 } else if hook.TriggerWhen == TRIGGERWORDS_STARTS_WITH && hook.TriggerWordStartsWith(firstWord) { 64 relevantHooks = append(relevantHooks, hook) 65 triggerWord = hook.GetTriggerWord(firstWord, false) 66 } 67 } 68 } 69 70 for _, hook := range relevantHooks { 71 payload := &model.OutgoingWebhookPayload{ 72 Token: hook.Token, 73 TeamId: hook.TeamId, 74 TeamDomain: team.Name, 75 ChannelId: post.ChannelId, 76 ChannelName: channel.Name, 77 Timestamp: post.CreateAt, 78 UserId: post.UserId, 79 UserName: user.Username, 80 PostId: post.Id, 81 Text: post.Message, 82 TriggerWord: triggerWord, 83 FileIds: strings.Join(post.FileIds, ","), 84 } 85 a.Go(func(hook *model.OutgoingWebhook) func() { 86 return func() { 87 a.TriggerWebhook(payload, hook, post, channel) 88 } 89 }(hook)) 90 } 91 92 return nil 93 } 94 95 func (a *App) TriggerWebhook(payload *model.OutgoingWebhookPayload, hook *model.OutgoingWebhook, post *model.Post, channel *model.Channel) { 96 var body io.Reader 97 var contentType string 98 if hook.ContentType == "application/json" { 99 body = strings.NewReader(payload.ToJSON()) 100 contentType = "application/json" 101 } else { 102 body = strings.NewReader(payload.ToFormValues()) 103 contentType = "application/x-www-form-urlencoded" 104 } 105 106 for _, url := range hook.CallbackURLs { 107 a.Go(func(url string) func() { 108 return func() { 109 req, _ := http.NewRequest("POST", url, body) 110 req.Header.Set("Content-Type", contentType) 111 req.Header.Set("Accept", "application/json") 112 if resp, err := a.HTTPClient(false).Do(req); err != nil { 113 mlog.Error(fmt.Sprintf("Event POST failed, err=%s", err.Error())) 114 } else { 115 defer resp.Body.Close() 116 117 webhookResp := model.OutgoingWebhookResponseFromJson(io.LimitReader(resp.Body, MaxIntegrationResponseSize)) 118 119 if webhookResp != nil && (webhookResp.Text != nil || len(webhookResp.Attachments) > 0) { 120 postRootId := "" 121 if webhookResp.ResponseType == model.OUTGOING_HOOK_RESPONSE_TYPE_COMMENT { 122 postRootId = post.Id 123 } 124 if len(webhookResp.Props) == 0 { 125 webhookResp.Props = make(model.StringInterface) 126 } 127 webhookResp.Props["webhook_display_name"] = hook.DisplayName 128 129 text := "" 130 if webhookResp.Text != nil { 131 text = a.ProcessSlackText(*webhookResp.Text) 132 } 133 webhookResp.Attachments = a.ProcessSlackAttachments(webhookResp.Attachments) 134 // attachments is in here for slack compatibility 135 if len(webhookResp.Attachments) > 0 { 136 webhookResp.Props["attachments"] = webhookResp.Attachments 137 } 138 139 if _, err := a.CreateWebhookPost(hook.CreatorId, channel, text, webhookResp.Username, webhookResp.IconURL, webhookResp.Props, webhookResp.Type, postRootId); err != nil { 140 mlog.Error(fmt.Sprintf("Failed to create response post, err=%v", err)) 141 } 142 } 143 } 144 } 145 }(url)) 146 } 147 } 148 149 func SplitWebhookPost(post *model.Post, maxPostSize int) ([]*model.Post, *model.AppError) { 150 splits := make([]*model.Post, 0) 151 remainingText := post.Message 152 153 base := *post 154 base.Message = "" 155 base.Props = make(map[string]interface{}) 156 for k, v := range post.Props { 157 if k != "attachments" { 158 base.Props[k] = v 159 } 160 } 161 if utf8.RuneCountInString(model.StringInterfaceToJson(base.Props)) > model.POST_PROPS_MAX_USER_RUNES { 162 return nil, model.NewAppError("SplitWebhookPost", "web.incoming_webhook.split_props_length.app_error", map[string]interface{}{"Max": model.POST_PROPS_MAX_USER_RUNES}, "", http.StatusBadRequest) 163 } 164 165 for utf8.RuneCountInString(remainingText) > maxPostSize { 166 split := base 167 x := 0 168 for index := range remainingText { 169 x++ 170 if x > maxPostSize { 171 split.Message = remainingText[:index] 172 remainingText = remainingText[index:] 173 break 174 } 175 } 176 splits = append(splits, &split) 177 } 178 179 split := base 180 split.Message = remainingText 181 splits = append(splits, &split) 182 183 attachments, _ := post.Props["attachments"].([]*model.SlackAttachment) 184 for _, attachment := range attachments { 185 newAttachment := *attachment 186 for { 187 lastSplit := splits[len(splits)-1] 188 newProps := make(map[string]interface{}) 189 for k, v := range lastSplit.Props { 190 newProps[k] = v 191 } 192 origAttachments, _ := newProps["attachments"].([]*model.SlackAttachment) 193 newProps["attachments"] = append(origAttachments, &newAttachment) 194 newPropsString := model.StringInterfaceToJson(newProps) 195 runeCount := utf8.RuneCountInString(newPropsString) 196 197 if runeCount <= model.POST_PROPS_MAX_USER_RUNES { 198 lastSplit.Props = newProps 199 break 200 } 201 202 if len(origAttachments) > 0 { 203 newSplit := base 204 splits = append(splits, &newSplit) 205 continue 206 } 207 208 truncationNeeded := runeCount - model.POST_PROPS_MAX_USER_RUNES 209 textRuneCount := utf8.RuneCountInString(attachment.Text) 210 if textRuneCount < truncationNeeded { 211 return nil, model.NewAppError("SplitWebhookPost", "web.incoming_webhook.split_props_length.app_error", map[string]interface{}{"Max": model.POST_PROPS_MAX_USER_RUNES}, "", http.StatusBadRequest) 212 } 213 x := 0 214 for index := range attachment.Text { 215 x++ 216 if x > textRuneCount-truncationNeeded { 217 newAttachment.Text = newAttachment.Text[:index] 218 break 219 } 220 } 221 lastSplit.Props = newProps 222 break 223 } 224 } 225 226 return splits, nil 227 } 228 229 func (a *App) CreateWebhookPost(userId string, channel *model.Channel, text, overrideUsername, overrideIconUrl string, props model.StringInterface, postType string, postRootId string) (*model.Post, *model.AppError) { 230 // parse links into Markdown format 231 linkWithTextRegex := regexp.MustCompile(`<([^\n<\|>]+)\|([^\n>]+)>`) 232 text = linkWithTextRegex.ReplaceAllString(text, "[${2}](${1})") 233 234 post := &model.Post{UserId: userId, ChannelId: channel.Id, Message: text, Type: postType, RootId: postRootId} 235 post.AddProp("from_webhook", "true") 236 237 if strings.HasPrefix(post.Type, model.POST_SYSTEM_MESSAGE_PREFIX) { 238 err := model.NewAppError("CreateWebhookPost", "api.context.invalid_param.app_error", map[string]interface{}{"Name": "post.type"}, "", http.StatusBadRequest) 239 return nil, err 240 } 241 242 if metrics := a.Metrics; metrics != nil { 243 metrics.IncrementWebhookPost() 244 } 245 246 if a.Config().ServiceSettings.EnablePostUsernameOverride { 247 if len(overrideUsername) != 0 { 248 post.AddProp("override_username", overrideUsername) 249 } else { 250 post.AddProp("override_username", model.DEFAULT_WEBHOOK_USERNAME) 251 } 252 } 253 254 if a.Config().ServiceSettings.EnablePostIconOverride { 255 if len(overrideIconUrl) != 0 { 256 post.AddProp("override_icon_url", overrideIconUrl) 257 } 258 } 259 260 if len(props) > 0 { 261 for key, val := range props { 262 if key == "attachments" { 263 if attachments, success := val.([]*model.SlackAttachment); success { 264 parseSlackAttachment(post, attachments) 265 } 266 } else if key != "override_icon_url" && key != "override_username" && key != "from_webhook" { 267 post.AddProp(key, val) 268 } 269 } 270 } 271 272 splits, err := SplitWebhookPost(post, a.MaxPostSize()) 273 if err != nil { 274 return nil, err 275 } 276 277 for _, split := range splits { 278 if _, err := a.CreatePostMissingChannel(split, false); err != nil { 279 return nil, model.NewAppError("CreateWebhookPost", "api.post.create_webhook_post.creating.app_error", nil, "err="+err.Message, http.StatusInternalServerError) 280 } 281 } 282 283 return splits[0], nil 284 } 285 286 func (a *App) CreateIncomingWebhookForChannel(creatorId string, channel *model.Channel, hook *model.IncomingWebhook) (*model.IncomingWebhook, *model.AppError) { 287 if !a.Config().ServiceSettings.EnableIncomingWebhooks { 288 return nil, model.NewAppError("CreateIncomingWebhookForChannel", "api.incoming_webhook.disabled.app_error", nil, "", http.StatusNotImplemented) 289 } 290 291 hook.UserId = creatorId 292 hook.TeamId = channel.TeamId 293 294 if !a.Config().ServiceSettings.EnablePostUsernameOverride { 295 hook.Username = "" 296 } 297 if !a.Config().ServiceSettings.EnablePostIconOverride { 298 hook.IconURL = "" 299 } 300 301 if hook.Username != "" && !model.IsValidUsername(hook.Username) { 302 return nil, model.NewAppError("CreateIncomingWebhookForChannel", "api.incoming_webhook.invalid_username.app_error", nil, "", http.StatusBadRequest) 303 } 304 305 if result := <-a.Srv.Store.Webhook().SaveIncoming(hook); result.Err != nil { 306 return nil, result.Err 307 } else { 308 return result.Data.(*model.IncomingWebhook), nil 309 } 310 } 311 312 func (a *App) UpdateIncomingWebhook(oldHook, updatedHook *model.IncomingWebhook) (*model.IncomingWebhook, *model.AppError) { 313 if !a.Config().ServiceSettings.EnableIncomingWebhooks { 314 return nil, model.NewAppError("UpdateIncomingWebhook", "api.incoming_webhook.disabled.app_error", nil, "", http.StatusNotImplemented) 315 } 316 317 if !a.Config().ServiceSettings.EnablePostUsernameOverride { 318 updatedHook.Username = oldHook.Username 319 } 320 if !a.Config().ServiceSettings.EnablePostIconOverride { 321 updatedHook.IconURL = oldHook.IconURL 322 } 323 324 if updatedHook.Username != "" && !model.IsValidUsername(updatedHook.Username) { 325 return nil, model.NewAppError("UpdateIncomingWebhook", "api.incoming_webhook.invalid_username.app_error", nil, "", http.StatusBadRequest) 326 } 327 328 updatedHook.Id = oldHook.Id 329 updatedHook.UserId = oldHook.UserId 330 updatedHook.CreateAt = oldHook.CreateAt 331 updatedHook.UpdateAt = model.GetMillis() 332 updatedHook.TeamId = oldHook.TeamId 333 updatedHook.DeleteAt = oldHook.DeleteAt 334 335 if result := <-a.Srv.Store.Webhook().UpdateIncoming(updatedHook); result.Err != nil { 336 return nil, result.Err 337 } else { 338 a.InvalidateCacheForWebhook(oldHook.Id) 339 return result.Data.(*model.IncomingWebhook), nil 340 } 341 } 342 343 func (a *App) DeleteIncomingWebhook(hookId string) *model.AppError { 344 if !a.Config().ServiceSettings.EnableIncomingWebhooks { 345 return model.NewAppError("DeleteIncomingWebhook", "api.incoming_webhook.disabled.app_error", nil, "", http.StatusNotImplemented) 346 } 347 348 if result := <-a.Srv.Store.Webhook().DeleteIncoming(hookId, model.GetMillis()); result.Err != nil { 349 return result.Err 350 } 351 352 a.InvalidateCacheForWebhook(hookId) 353 354 return nil 355 } 356 357 func (a *App) GetIncomingWebhook(hookId string) (*model.IncomingWebhook, *model.AppError) { 358 if !a.Config().ServiceSettings.EnableIncomingWebhooks { 359 return nil, model.NewAppError("GetIncomingWebhook", "api.incoming_webhook.disabled.app_error", nil, "", http.StatusNotImplemented) 360 } 361 362 if result := <-a.Srv.Store.Webhook().GetIncoming(hookId, true); result.Err != nil { 363 return nil, result.Err 364 } else { 365 return result.Data.(*model.IncomingWebhook), nil 366 } 367 } 368 369 func (a *App) GetIncomingWebhooksForTeamPage(teamId string, page, perPage int) ([]*model.IncomingWebhook, *model.AppError) { 370 if !a.Config().ServiceSettings.EnableIncomingWebhooks { 371 return nil, model.NewAppError("GetIncomingWebhooksForTeamPage", "api.incoming_webhook.disabled.app_error", nil, "", http.StatusNotImplemented) 372 } 373 374 if result := <-a.Srv.Store.Webhook().GetIncomingByTeam(teamId, page*perPage, perPage); result.Err != nil { 375 return nil, result.Err 376 } else { 377 return result.Data.([]*model.IncomingWebhook), nil 378 } 379 } 380 381 func (a *App) GetIncomingWebhooksPage(page, perPage int) ([]*model.IncomingWebhook, *model.AppError) { 382 if !a.Config().ServiceSettings.EnableIncomingWebhooks { 383 return nil, model.NewAppError("GetIncomingWebhooksPage", "api.incoming_webhook.disabled.app_error", nil, "", http.StatusNotImplemented) 384 } 385 386 if result := <-a.Srv.Store.Webhook().GetIncomingList(page*perPage, perPage); result.Err != nil { 387 return nil, result.Err 388 } else { 389 return result.Data.([]*model.IncomingWebhook), nil 390 } 391 } 392 393 func (a *App) CreateOutgoingWebhook(hook *model.OutgoingWebhook) (*model.OutgoingWebhook, *model.AppError) { 394 if !a.Config().ServiceSettings.EnableOutgoingWebhooks { 395 return nil, model.NewAppError("CreateOutgoingWebhook", "api.outgoing_webhook.disabled.app_error", nil, "", http.StatusNotImplemented) 396 } 397 398 if len(hook.ChannelId) != 0 { 399 cchan := a.Srv.Store.Channel().Get(hook.ChannelId, true) 400 401 var channel *model.Channel 402 if result := <-cchan; result.Err != nil { 403 return nil, result.Err 404 } else { 405 channel = result.Data.(*model.Channel) 406 } 407 408 if channel.Type != model.CHANNEL_OPEN { 409 return nil, model.NewAppError("CreateOutgoingWebhook", "api.outgoing_webhook.disabled.app_error", nil, "", http.StatusForbidden) 410 } 411 412 if channel.Type != model.CHANNEL_OPEN || channel.TeamId != hook.TeamId { 413 return nil, model.NewAppError("CreateOutgoingWebhook", "api.webhook.create_outgoing.permissions.app_error", nil, "", http.StatusForbidden) 414 } 415 } else if len(hook.TriggerWords) == 0 { 416 return nil, model.NewAppError("CreateOutgoingWebhook", "api.webhook.create_outgoing.triggers.app_error", nil, "", http.StatusBadRequest) 417 } 418 419 if result := <-a.Srv.Store.Webhook().GetOutgoingByTeam(hook.TeamId, -1, -1); result.Err != nil { 420 return nil, result.Err 421 } else { 422 allHooks := result.Data.([]*model.OutgoingWebhook) 423 424 for _, existingOutHook := range allHooks { 425 urlIntersect := utils.StringArrayIntersection(existingOutHook.CallbackURLs, hook.CallbackURLs) 426 triggerIntersect := utils.StringArrayIntersection(existingOutHook.TriggerWords, hook.TriggerWords) 427 428 if existingOutHook.ChannelId == hook.ChannelId && len(urlIntersect) != 0 && len(triggerIntersect) != 0 { 429 return nil, model.NewAppError("CreateOutgoingWebhook", "api.webhook.create_outgoing.intersect.app_error", nil, "", http.StatusInternalServerError) 430 } 431 } 432 } 433 434 if result := <-a.Srv.Store.Webhook().SaveOutgoing(hook); result.Err != nil { 435 return nil, result.Err 436 } else { 437 return result.Data.(*model.OutgoingWebhook), nil 438 } 439 } 440 441 func (a *App) UpdateOutgoingWebhook(oldHook, updatedHook *model.OutgoingWebhook) (*model.OutgoingWebhook, *model.AppError) { 442 if !a.Config().ServiceSettings.EnableOutgoingWebhooks { 443 return nil, model.NewAppError("UpdateOutgoingWebhook", "api.outgoing_webhook.disabled.app_error", nil, "", http.StatusNotImplemented) 444 } 445 446 if len(updatedHook.ChannelId) > 0 { 447 channel, err := a.GetChannel(updatedHook.ChannelId) 448 if err != nil { 449 return nil, err 450 } 451 452 if channel.Type != model.CHANNEL_OPEN { 453 return nil, model.NewAppError("UpdateOutgoingWebhook", "api.webhook.create_outgoing.not_open.app_error", nil, "", http.StatusForbidden) 454 } 455 456 if channel.TeamId != oldHook.TeamId { 457 return nil, model.NewAppError("UpdateOutgoingWebhook", "api.webhook.create_outgoing.permissions.app_error", nil, "", http.StatusForbidden) 458 } 459 } else if len(updatedHook.TriggerWords) == 0 { 460 return nil, model.NewAppError("UpdateOutgoingWebhook", "api.webhook.create_outgoing.triggers.app_error", nil, "", http.StatusInternalServerError) 461 } 462 463 var result store.StoreResult 464 if result = <-a.Srv.Store.Webhook().GetOutgoingByTeam(oldHook.TeamId, -1, -1); result.Err != nil { 465 return nil, result.Err 466 } 467 468 allHooks := result.Data.([]*model.OutgoingWebhook) 469 470 for _, existingOutHook := range allHooks { 471 urlIntersect := utils.StringArrayIntersection(existingOutHook.CallbackURLs, updatedHook.CallbackURLs) 472 triggerIntersect := utils.StringArrayIntersection(existingOutHook.TriggerWords, updatedHook.TriggerWords) 473 474 if existingOutHook.ChannelId == updatedHook.ChannelId && len(urlIntersect) != 0 && len(triggerIntersect) != 0 && existingOutHook.Id != updatedHook.Id { 475 return nil, model.NewAppError("UpdateOutgoingWebhook", "api.webhook.update_outgoing.intersect.app_error", nil, "", http.StatusBadRequest) 476 } 477 } 478 479 updatedHook.CreatorId = oldHook.CreatorId 480 updatedHook.CreateAt = oldHook.CreateAt 481 updatedHook.DeleteAt = oldHook.DeleteAt 482 updatedHook.TeamId = oldHook.TeamId 483 updatedHook.UpdateAt = model.GetMillis() 484 485 if result = <-a.Srv.Store.Webhook().UpdateOutgoing(updatedHook); result.Err != nil { 486 return nil, result.Err 487 } else { 488 return result.Data.(*model.OutgoingWebhook), nil 489 } 490 } 491 492 func (a *App) GetOutgoingWebhook(hookId string) (*model.OutgoingWebhook, *model.AppError) { 493 if !a.Config().ServiceSettings.EnableOutgoingWebhooks { 494 return nil, model.NewAppError("GetOutgoingWebhook", "api.outgoing_webhook.disabled.app_error", nil, "", http.StatusNotImplemented) 495 } 496 497 if result := <-a.Srv.Store.Webhook().GetOutgoing(hookId); result.Err != nil { 498 return nil, result.Err 499 } else { 500 return result.Data.(*model.OutgoingWebhook), nil 501 } 502 } 503 504 func (a *App) GetOutgoingWebhooksPage(page, perPage int) ([]*model.OutgoingWebhook, *model.AppError) { 505 if !a.Config().ServiceSettings.EnableOutgoingWebhooks { 506 return nil, model.NewAppError("GetOutgoingWebhooksPage", "api.outgoing_webhook.disabled.app_error", nil, "", http.StatusNotImplemented) 507 } 508 509 if result := <-a.Srv.Store.Webhook().GetOutgoingList(page*perPage, perPage); result.Err != nil { 510 return nil, result.Err 511 } else { 512 return result.Data.([]*model.OutgoingWebhook), nil 513 } 514 } 515 516 func (a *App) GetOutgoingWebhooksForChannelPage(channelId string, page, perPage int) ([]*model.OutgoingWebhook, *model.AppError) { 517 if !a.Config().ServiceSettings.EnableOutgoingWebhooks { 518 return nil, model.NewAppError("GetOutgoingWebhooksForChannelPage", "api.outgoing_webhook.disabled.app_error", nil, "", http.StatusNotImplemented) 519 } 520 521 if result := <-a.Srv.Store.Webhook().GetOutgoingByChannel(channelId, page*perPage, perPage); result.Err != nil { 522 return nil, result.Err 523 } else { 524 return result.Data.([]*model.OutgoingWebhook), nil 525 } 526 } 527 528 func (a *App) GetOutgoingWebhooksForTeamPage(teamId string, page, perPage int) ([]*model.OutgoingWebhook, *model.AppError) { 529 if !a.Config().ServiceSettings.EnableOutgoingWebhooks { 530 return nil, model.NewAppError("GetOutgoingWebhooksForTeamPage", "api.outgoing_webhook.disabled.app_error", nil, "", http.StatusNotImplemented) 531 } 532 533 if result := <-a.Srv.Store.Webhook().GetOutgoingByTeam(teamId, page*perPage, perPage); result.Err != nil { 534 return nil, result.Err 535 } else { 536 return result.Data.([]*model.OutgoingWebhook), nil 537 } 538 } 539 540 func (a *App) DeleteOutgoingWebhook(hookId string) *model.AppError { 541 if !a.Config().ServiceSettings.EnableOutgoingWebhooks { 542 return model.NewAppError("DeleteOutgoingWebhook", "api.outgoing_webhook.disabled.app_error", nil, "", http.StatusNotImplemented) 543 } 544 545 if result := <-a.Srv.Store.Webhook().DeleteOutgoing(hookId, model.GetMillis()); result.Err != nil { 546 return result.Err 547 } 548 549 return nil 550 } 551 552 func (a *App) RegenOutgoingWebhookToken(hook *model.OutgoingWebhook) (*model.OutgoingWebhook, *model.AppError) { 553 if !a.Config().ServiceSettings.EnableOutgoingWebhooks { 554 return nil, model.NewAppError("RegenOutgoingWebhookToken", "api.outgoing_webhook.disabled.app_error", nil, "", http.StatusNotImplemented) 555 } 556 557 hook.Token = model.NewId() 558 559 if result := <-a.Srv.Store.Webhook().UpdateOutgoing(hook); result.Err != nil { 560 return nil, result.Err 561 } else { 562 return result.Data.(*model.OutgoingWebhook), nil 563 } 564 } 565 566 func (a *App) HandleIncomingWebhook(hookId string, req *model.IncomingWebhookRequest) *model.AppError { 567 if !a.Config().ServiceSettings.EnableIncomingWebhooks { 568 return model.NewAppError("HandleIncomingWebhook", "web.incoming_webhook.disabled.app_error", nil, "", http.StatusNotImplemented) 569 } 570 571 hchan := a.Srv.Store.Webhook().GetIncoming(hookId, true) 572 573 if req == nil { 574 return model.NewAppError("HandleIncomingWebhook", "web.incoming_webhook.parse.app_error", nil, "", http.StatusBadRequest) 575 } 576 577 text := req.Text 578 if len(text) == 0 && req.Attachments == nil { 579 return model.NewAppError("HandleIncomingWebhook", "web.incoming_webhook.text.app_error", nil, "", http.StatusBadRequest) 580 } 581 582 channelName := req.ChannelName 583 webhookType := req.Type 584 585 var hook *model.IncomingWebhook 586 if result := <-hchan; result.Err != nil { 587 return model.NewAppError("HandleIncomingWebhook", "web.incoming_webhook.invalid.app_error", nil, "err="+result.Err.Message, http.StatusBadRequest) 588 } else { 589 hook = result.Data.(*model.IncomingWebhook) 590 } 591 592 if len(req.Props) == 0 { 593 req.Props = make(model.StringInterface) 594 } 595 596 req.Props["webhook_display_name"] = hook.DisplayName 597 598 text = a.ProcessSlackText(text) 599 req.Attachments = a.ProcessSlackAttachments(req.Attachments) 600 // attachments is in here for slack compatibility 601 if len(req.Attachments) > 0 { 602 req.Props["attachments"] = req.Attachments 603 webhookType = model.POST_SLACK_ATTACHMENT 604 } 605 606 var channel *model.Channel 607 var cchan store.StoreChannel 608 609 if len(channelName) != 0 { 610 if channelName[0] == '@' { 611 if result := <-a.Srv.Store.User().GetByUsername(channelName[1:]); result.Err != nil { 612 return model.NewAppError("HandleIncomingWebhook", "web.incoming_webhook.user.app_error", nil, "err="+result.Err.Message, http.StatusBadRequest) 613 } else { 614 if ch, err := a.GetDirectChannel(hook.UserId, result.Data.(*model.User).Id); err != nil { 615 return err 616 } else { 617 channel = ch 618 } 619 } 620 } else if channelName[0] == '#' { 621 cchan = a.Srv.Store.Channel().GetByName(hook.TeamId, channelName[1:], true) 622 } else { 623 cchan = a.Srv.Store.Channel().GetByName(hook.TeamId, channelName, true) 624 } 625 } else { 626 cchan = a.Srv.Store.Channel().Get(hook.ChannelId, true) 627 } 628 629 if channel == nil { 630 result := <-cchan 631 if result.Err != nil { 632 return model.NewAppError("HandleIncomingWebhook", "web.incoming_webhook.channel.app_error", nil, "err="+result.Err.Message, result.Err.StatusCode) 633 } else { 634 channel = result.Data.(*model.Channel) 635 } 636 } 637 638 if a.License() != nil && *a.Config().TeamSettings.ExperimentalTownSquareIsReadOnly && 639 channel.Name == model.DEFAULT_CHANNEL { 640 return model.NewAppError("HandleIncomingWebhook", "api.post.create_post.town_square_read_only", nil, "", http.StatusForbidden) 641 } 642 643 if channel.Type != model.CHANNEL_OPEN && !a.HasPermissionToChannel(hook.UserId, channel.Id, model.PERMISSION_READ_CHANNEL) { 644 return model.NewAppError("HandleIncomingWebhook", "web.incoming_webhook.permissions.app_error", nil, "", http.StatusForbidden) 645 } 646 647 overrideUsername := hook.Username 648 if req.Username != "" { 649 overrideUsername = req.Username 650 } 651 652 overrideIconUrl := hook.IconURL 653 if req.IconURL != "" { 654 overrideIconUrl = req.IconURL 655 } 656 657 _, err := a.CreateWebhookPost(hook.UserId, channel, text, overrideUsername, overrideIconUrl, req.Props, webhookType, "") 658 return err 659 } 660 661 func (a *App) CreateCommandWebhook(commandId string, args *model.CommandArgs) (*model.CommandWebhook, *model.AppError) { 662 hook := &model.CommandWebhook{ 663 CommandId: commandId, 664 UserId: args.UserId, 665 ChannelId: args.ChannelId, 666 RootId: args.RootId, 667 ParentId: args.ParentId, 668 } 669 670 if result := <-a.Srv.Store.CommandWebhook().Save(hook); result.Err != nil { 671 return nil, result.Err 672 } else { 673 return result.Data.(*model.CommandWebhook), nil 674 } 675 } 676 677 func (a *App) HandleCommandWebhook(hookId string, response *model.CommandResponse) *model.AppError { 678 if response == nil { 679 return model.NewAppError("HandleCommandWebhook", "web.command_webhook.parse.app_error", nil, "", http.StatusBadRequest) 680 } 681 682 var hook *model.CommandWebhook 683 if result := <-a.Srv.Store.CommandWebhook().Get(hookId); result.Err != nil { 684 return model.NewAppError("HandleCommandWebhook", "web.command_webhook.invalid.app_error", nil, "err="+result.Err.Message, result.Err.StatusCode) 685 } else { 686 hook = result.Data.(*model.CommandWebhook) 687 } 688 689 var cmd *model.Command 690 if result := <-a.Srv.Store.Command().Get(hook.CommandId); result.Err != nil { 691 return model.NewAppError("HandleCommandWebhook", "web.command_webhook.command.app_error", nil, "err="+result.Err.Message, http.StatusBadRequest) 692 } else { 693 cmd = result.Data.(*model.Command) 694 } 695 696 args := &model.CommandArgs{ 697 UserId: hook.UserId, 698 ChannelId: hook.ChannelId, 699 TeamId: cmd.TeamId, 700 RootId: hook.RootId, 701 ParentId: hook.ParentId, 702 } 703 704 if result := <-a.Srv.Store.CommandWebhook().TryUse(hook.Id, 5); result.Err != nil { 705 return model.NewAppError("HandleCommandWebhook", "web.command_webhook.invalid.app_error", nil, "err="+result.Err.Message, result.Err.StatusCode) 706 } 707 708 _, err := a.HandleCommandResponse(cmd, args, response, false) 709 return err 710 }