summaryrefslogtreecommitdiffstats
path: root/model/user_access_token.go
diff options
context:
space:
mode:
authorJoram Wilander <jwawilander@gmail.com>2017-07-31 12:59:32 -0400
committerGitHub <noreply@github.com>2017-07-31 12:59:32 -0400
commit59992ae4a4638006ec1489dd834151b258c1728c (patch)
tree8bc5c0fa8f6a4d6a40026c965bd865c1110af838 /model/user_access_token.go
parented62660e96528920b0ecb8c755265c6c8d2756c4 (diff)
downloadchat-59992ae4a4638006ec1489dd834151b258c1728c.tar.gz
chat-59992ae4a4638006ec1489dd834151b258c1728c.tar.bz2
chat-59992ae4a4638006ec1489dd834151b258c1728c.zip
PLT-6763 Implement user access tokens and new roles (server-side) (#6972)
* Implement user access tokens and new roles * Update config.json * Add public post permission to apiv3 * Remove old comment * Fix model unit test * Updates to store per feedback * Updates per feedback from CS
Diffstat (limited to 'model/user_access_token.go')
-rw-r--r--model/user_access_token.go81
1 files changed, 81 insertions, 0 deletions
diff --git a/model/user_access_token.go b/model/user_access_token.go
new file mode 100644
index 000000000..090780fd0
--- /dev/null
+++ b/model/user_access_token.go
@@ -0,0 +1,81 @@
+// Copyright (c) 2017-present Mattermost, Inc. All Rights Reserved.
+// See License.txt for license information.
+
+package model
+
+import (
+ "encoding/json"
+ "io"
+ "net/http"
+)
+
+type UserAccessToken struct {
+ Id string `json:"id"`
+ Token string `json:"token,omitempty"`
+ UserId string `json:"user_id"`
+ Description string `json:"description"`
+}
+
+func (t *UserAccessToken) IsValid() *AppError {
+ if len(t.Id) != 26 {
+ return NewAppError("UserAccessToken.IsValid", "model.user_access_token.is_valid.id.app_error", nil, "", http.StatusBadRequest)
+ }
+
+ if len(t.Token) != 26 {
+ return NewAppError("UserAccessToken.IsValid", "model.user_access_token.is_valid.token.app_error", nil, "", http.StatusBadRequest)
+ }
+
+ if len(t.UserId) != 26 {
+ return NewAppError("UserAccessToken.IsValid", "model.user_access_token.is_valid.user_id.app_error", nil, "", http.StatusBadRequest)
+ }
+
+ if len(t.Description) > 255 {
+ return NewAppError("UserAccessToken.IsValid", "model.user_access_token.is_valid.description.app_error", nil, "", http.StatusBadRequest)
+ }
+
+ return nil
+}
+
+func (t *UserAccessToken) PreSave() {
+ t.Id = NewId()
+}
+
+func (t *UserAccessToken) ToJson() string {
+ b, err := json.Marshal(t)
+ if err != nil {
+ return ""
+ } else {
+ return string(b)
+ }
+}
+
+func UserAccessTokenFromJson(data io.Reader) *UserAccessToken {
+ decoder := json.NewDecoder(data)
+ var t UserAccessToken
+ err := decoder.Decode(&t)
+ if err == nil {
+ return &t
+ } else {
+ return nil
+ }
+}
+
+func UserAccessTokenListToJson(t []*UserAccessToken) string {
+ b, err := json.Marshal(t)
+ if err != nil {
+ return ""
+ } else {
+ return string(b)
+ }
+}
+
+func UserAccessTokenListFromJson(data io.Reader) []*UserAccessToken {
+ decoder := json.NewDecoder(data)
+ var t []*UserAccessToken
+ err := decoder.Decode(&t)
+ if err == nil {
+ return t
+ } else {
+ return nil
+ }
+}