summaryrefslogtreecommitdiffstats
path: root/app
diff options
context:
space:
mode:
Diffstat (limited to 'app')
-rw-r--r--app/emoji.go7
-rw-r--r--app/file.go13
-rw-r--r--app/ldap.go6
-rw-r--r--app/login.go70
-rw-r--r--app/team.go2
-rw-r--r--app/user.go36
6 files changed, 63 insertions, 71 deletions
diff --git a/app/emoji.go b/app/emoji.go
index 2f957fbcc..b07331e65 100644
--- a/app/emoji.go
+++ b/app/emoji.go
@@ -98,7 +98,7 @@ func (a *App) UploadEmojiImage(id string, imageData *multipart.FileHeader) *mode
if err := gif.EncodeAll(newbuf, resized_gif); err != nil {
return model.NewAppError("uploadEmojiImage", "api.emoji.upload.large_image.gif_encode_error", nil, "", http.StatusBadRequest)
}
- if err := a.WriteFile(newbuf.Bytes(), getEmojiImagePath(id)); err != nil {
+ if _, err := a.WriteFile(newbuf, getEmojiImagePath(id)); err != nil {
return err
}
}
@@ -110,14 +110,15 @@ func (a *App) UploadEmojiImage(id string, imageData *multipart.FileHeader) *mode
if err := png.Encode(newbuf, resized_image); err != nil {
return model.NewAppError("uploadEmojiImage", "api.emoji.upload.large_image.encode_error", nil, "", http.StatusBadRequest)
}
- if err := a.WriteFile(newbuf.Bytes(), getEmojiImagePath(id)); err != nil {
+ if _, err := a.WriteFile(newbuf, getEmojiImagePath(id)); err != nil {
return err
}
}
}
}
- return a.WriteFile(buf.Bytes(), getEmojiImagePath(id))
+ _, appErr := a.WriteFile(buf, getEmojiImagePath(id))
+ return appErr
}
func (a *App) DeleteEmoji(emoji *model.Emoji) *model.AppError {
diff --git a/app/file.go b/app/file.go
index 87e1986a2..cb8d54cb1 100644
--- a/app/file.go
+++ b/app/file.go
@@ -78,12 +78,13 @@ func (a *App) MoveFile(oldPath, newPath string) *model.AppError {
return backend.MoveFile(oldPath, newPath)
}
-func (a *App) WriteFile(f []byte, path string) *model.AppError {
+func (a *App) WriteFile(fr io.Reader, path string) (int64, *model.AppError) {
backend, err := a.FileBackend()
if err != nil {
- return err
+ return 0, err
}
- return backend.WriteFile(f, path)
+
+ return backend.WriteFile(fr, path)
}
func (a *App) RemoveFile(path string) *model.AppError {
@@ -414,7 +415,7 @@ func (a *App) DoUploadFile(now time.Time, rawTeamId string, rawChannelId string,
info.ThumbnailPath = pathPrefix + nameWithoutExtension + "_thumb.jpg"
}
- if err := a.WriteFile(data, info.Path); err != nil {
+ if _, err := a.WriteFile(bytes.NewReader(data), info.Path); err != nil {
return nil, err
}
@@ -531,7 +532,7 @@ func (a *App) generateThumbnailImage(img image.Image, thumbnailPath string, widt
return
}
- if err := a.WriteFile(buf.Bytes(), thumbnailPath); err != nil {
+ if _, err := a.WriteFile(buf, thumbnailPath); err != nil {
mlog.Error(fmt.Sprintf("Unable to upload thumbnail path=%v err=%v", thumbnailPath, err))
return
}
@@ -553,7 +554,7 @@ func (a *App) generatePreviewImage(img image.Image, previewPath string, width in
return
}
- if err := a.WriteFile(buf.Bytes(), previewPath); err != nil {
+ if _, err := a.WriteFile(buf, previewPath); err != nil {
mlog.Error(fmt.Sprintf("Unable to upload preview err=%v", err), mlog.String("path", previewPath))
return
}
diff --git a/app/ldap.go b/app/ldap.go
index 22c3b746b..544905b70 100644
--- a/app/ldap.go
+++ b/app/ldap.go
@@ -40,7 +40,7 @@ func (a *App) TestLdap() *model.AppError {
return nil
}
-func (a *App) SwitchEmailToLdap(email, password, code, ldapId, ldapPassword string) (string, *model.AppError) {
+func (a *App) SwitchEmailToLdap(email, password, code, ldapLoginId, ldapPassword string) (string, *model.AppError) {
if a.License() != nil && !*a.Config().ServiceSettings.ExperimentalEnableAuthenticationTransfer {
return "", model.NewAppError("emailToLdap", "api.user.email_to_ldap.not_available.app_error", nil, "", http.StatusForbidden)
}
@@ -63,7 +63,7 @@ func (a *App) SwitchEmailToLdap(email, password, code, ldapId, ldapPassword stri
return "", model.NewAppError("SwitchEmailToLdap", "api.user.email_to_ldap.not_available.app_error", nil, "", http.StatusNotImplemented)
}
- if err := ldapInterface.SwitchToLdap(user.Id, ldapId, ldapPassword); err != nil {
+ if err := ldapInterface.SwitchToLdap(user.Id, ldapLoginId, ldapPassword); err != nil {
return "", err
}
@@ -95,7 +95,7 @@ func (a *App) SwitchLdapToEmail(ldapPassword, code, email, newPassword string) (
return "", model.NewAppError("SwitchLdapToEmail", "api.user.ldap_to_email.not_available.app_error", nil, "", http.StatusNotImplemented)
}
- if err := ldapInterface.CheckPassword(*user.AuthData, ldapPassword); err != nil {
+ if err := ldapInterface.CheckPasswordAuthData(*user.AuthData, ldapPassword); err != nil {
return "", err
}
diff --git a/app/login.go b/app/login.go
index 43b022749..529e4cb21 100644
--- a/app/login.go
+++ b/app/login.go
@@ -11,47 +11,69 @@ import (
"github.com/avct/uasurfer"
"github.com/mattermost/mattermost-server/model"
+ "github.com/mattermost/mattermost-server/store"
)
-func (a *App) AuthenticateUserForLogin(id, loginId, password, mfaToken, deviceId string, ldapOnly bool) (*model.User, *model.AppError) {
+func (a *App) AuthenticateUserForLogin(id, loginId, password, mfaToken string, ldapOnly bool) (user *model.User, err *model.AppError) {
+ // Do statistics
+ defer func() {
+ if a.Metrics != nil {
+ if user == nil || err != nil {
+ a.Metrics.IncrementLoginFail()
+ } else {
+ a.Metrics.IncrementLogin()
+ }
+ }
+ }()
+
if len(password) == 0 {
err := model.NewAppError("AuthenticateUserForLogin", "api.user.login.blank_pwd.app_error", nil, "", http.StatusBadRequest)
return nil, err
}
- var user *model.User
- var err *model.AppError
+ // Get the MM user we are trying to login
+ if user, err = a.GetUserForLogin(id, loginId); err != nil {
+ return nil, err
+ }
+
+ // and then authenticate them
+ if user, err = a.authenticateUser(user, password, mfaToken); err != nil {
+ return nil, err
+ }
+
+ return user, nil
+}
+
+func (a *App) GetUserForLogin(id, loginId string) (*model.User, *model.AppError) {
+ enableUsername := *a.Config().EmailSettings.EnableSignInWithUsername
+ enableEmail := *a.Config().EmailSettings.EnableSignInWithEmail
+ // If we are given a userID then fail if we can't find a user with that ID
if len(id) != 0 {
- if user, err = a.GetUser(id); err != nil {
- err.StatusCode = http.StatusBadRequest
- if a.Metrics != nil {
- a.Metrics.IncrementLoginFail()
+ if user, err := a.GetUser(id); err != nil {
+ if err.Id != store.MISSING_ACCOUNT_ERROR {
+ err.StatusCode = http.StatusInternalServerError
+ return nil, err
+ } else {
+ err.StatusCode = http.StatusBadRequest
+ return nil, err
}
- return nil, err
- }
- } else {
- if user, err = a.GetUserForLogin(loginId, ldapOnly); err != nil {
- if a.Metrics != nil {
- a.Metrics.IncrementLoginFail()
- }
- return nil, err
+ } else {
+ return user, nil
}
}
- // and then authenticate them
- if user, err = a.authenticateUser(user, password, mfaToken); err != nil {
- if a.Metrics != nil {
- a.Metrics.IncrementLoginFail()
- }
- return nil, err
+ // Try to get the user by username/email
+ if result := <-a.Srv.Store.User().GetForLogin(loginId, enableUsername, enableEmail); result.Err == nil {
+ return result.Data.(*model.User), nil
}
- if a.Metrics != nil {
- a.Metrics.IncrementLogin()
+ // Try to get the user with LDAP
+ if user, err := a.Ldap.GetUser(loginId); err == nil {
+ return user, nil
}
- return user, nil
+ return nil, model.NewAppError("GetUserForLogin", "store.sql_user.get_for_login.app_error", nil, "", http.StatusBadRequest)
}
func (a *App) DoLogin(w http.ResponseWriter, r *http.Request, user *model.User, deviceId string) (*model.Session, *model.AppError) {
diff --git a/app/team.go b/app/team.go
index d8ebbab2a..2833e2eed 100644
--- a/app/team.go
+++ b/app/team.go
@@ -1057,7 +1057,7 @@ func (a *App) SetTeamIconFromFile(teamId string, file multipart.File) *model.App
path := "teams/" + teamId + "/teamIcon.png"
- if err := a.WriteFile(buf.Bytes(), path); err != nil {
+ if _, err := a.WriteFile(buf, path); err != nil {
return model.NewAppError("SetTeamIcon", "api.team.set_team_icon.write_file.app_error", nil, "", http.StatusInternalServerError)
}
diff --git a/app/user.go b/app/user.go
index fd8b6b377..2ee410684 100644
--- a/app/user.go
+++ b/app/user.go
@@ -382,38 +382,6 @@ func (a *App) GetUserByAuth(authData *string, authService string) (*model.User,
}
}
-func (a *App) GetUserForLogin(loginId string, onlyLdap bool) (*model.User, *model.AppError) {
- license := a.License()
- ldapAvailable := *a.Config().LdapSettings.Enable && a.Ldap != nil && license != nil && *license.Features.LDAP
-
- if result := <-a.Srv.Store.User().GetForLogin(
- loginId,
- *a.Config().EmailSettings.EnableSignInWithUsername && !onlyLdap,
- *a.Config().EmailSettings.EnableSignInWithEmail && !onlyLdap,
- ldapAvailable,
- ); result.Err != nil && result.Err.Id == "store.sql_user.get_for_login.multiple_users" {
- // don't fall back to LDAP in this case since we already know there's an LDAP user, but that it shouldn't work
- result.Err.StatusCode = http.StatusBadRequest
- return nil, result.Err
- } else if result.Err != nil {
- if !ldapAvailable {
- // failed to find user and no LDAP server to fall back on
- result.Err.StatusCode = http.StatusBadRequest
- return nil, result.Err
- }
-
- // fall back to LDAP server to see if we can find a user
- if ldapUser, ldapErr := a.Ldap.GetUser(loginId); ldapErr != nil {
- ldapErr.StatusCode = http.StatusBadRequest
- return nil, ldapErr
- } else {
- return ldapUser, nil
- }
- } else {
- return result.Data.(*model.User), nil
- }
-}
-
func (a *App) GetUsers(offset int, limit int) ([]*model.User, *model.AppError) {
if result := <-a.Srv.Store.User().GetAllProfiles(offset, limit); result.Err != nil {
return nil, result.Err
@@ -786,7 +754,7 @@ func (a *App) GetProfileImage(user *model.User) ([]byte, bool, *model.AppError)
}
if user.LastPictureUpdate == 0 {
- if err := a.WriteFile(img, path); err != nil {
+ if _, err := a.WriteFile(bytes.NewReader(img), path); err != nil {
return nil, false, err
}
}
@@ -842,7 +810,7 @@ func (a *App) SetProfileImageFromFile(userId string, file multipart.File) *model
path := "users/" + userId + "/profile.png"
- if err := a.WriteFile(buf.Bytes(), path); err != nil {
+ if _, err := a.WriteFile(buf, path); err != nil {
return model.NewAppError("SetProfileImage", "api.user.upload_profile_user.upload_profile.app_error", nil, "", http.StatusInternalServerError)
}