Add support for personal access tokens (mattermost)
* https://docs.mattermost.com/developer/personal-access-tokens.html
This commit is contained in:
parent
ce1c5873ac
commit
7f9a400776
|
@ -61,6 +61,12 @@ func (b *Bmattermost) Connect() error {
|
||||||
b.mh = matterhook.New(b.Config.WebhookURL,
|
b.mh = matterhook.New(b.Config.WebhookURL,
|
||||||
matterhook.Config{InsecureSkipVerify: b.Config.SkipTLSVerify,
|
matterhook.Config{InsecureSkipVerify: b.Config.SkipTLSVerify,
|
||||||
BindAddress: b.Config.WebhookBindAddress})
|
BindAddress: b.Config.WebhookBindAddress})
|
||||||
|
} else if b.Config.Token != "" {
|
||||||
|
flog.Info("Connecting using token (sending)")
|
||||||
|
err := b.apiLogin()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
} else if b.Config.Login != "" {
|
} else if b.Config.Login != "" {
|
||||||
flog.Info("Connecting using login/password (sending)")
|
flog.Info("Connecting using login/password (sending)")
|
||||||
err := b.apiLogin()
|
err := b.apiLogin()
|
||||||
|
@ -81,7 +87,14 @@ func (b *Bmattermost) Connect() error {
|
||||||
b.mh = matterhook.New(b.Config.WebhookURL,
|
b.mh = matterhook.New(b.Config.WebhookURL,
|
||||||
matterhook.Config{InsecureSkipVerify: b.Config.SkipTLSVerify,
|
matterhook.Config{InsecureSkipVerify: b.Config.SkipTLSVerify,
|
||||||
DisableServer: true})
|
DisableServer: true})
|
||||||
if b.Config.Login != "" {
|
if b.Config.Token != "" {
|
||||||
|
flog.Info("Connecting using token (receiving)")
|
||||||
|
err := b.apiLogin()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
go b.handleMatter()
|
||||||
|
} else if b.Config.Login != "" {
|
||||||
flog.Info("Connecting using login/password (receiving)")
|
flog.Info("Connecting using login/password (receiving)")
|
||||||
err := b.apiLogin()
|
err := b.apiLogin()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -90,6 +103,13 @@ func (b *Bmattermost) Connect() error {
|
||||||
go b.handleMatter()
|
go b.handleMatter()
|
||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
|
} else if b.Config.Token != "" {
|
||||||
|
flog.Info("Connecting using token (sending and receiving)")
|
||||||
|
err := b.apiLogin()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
go b.handleMatter()
|
||||||
} else if b.Config.Login != "" {
|
} else if b.Config.Login != "" {
|
||||||
flog.Info("Connecting using login/password (sending and receiving)")
|
flog.Info("Connecting using login/password (sending and receiving)")
|
||||||
err := b.apiLogin()
|
err := b.apiLogin()
|
||||||
|
@ -98,8 +118,8 @@ func (b *Bmattermost) Connect() error {
|
||||||
}
|
}
|
||||||
go b.handleMatter()
|
go b.handleMatter()
|
||||||
}
|
}
|
||||||
if b.Config.WebhookBindAddress == "" && b.Config.WebhookURL == "" && b.Config.Login == "" {
|
if b.Config.WebhookBindAddress == "" && b.Config.WebhookURL == "" && b.Config.Login == "" && b.Config.Token == "" {
|
||||||
return errors.New("No connection method found. See that you have WebhookBindAddress, WebhookURL or Login/Password/Server/Team configured.")
|
return errors.New("No connection method found. See that you have WebhookBindAddress, WebhookURL or Token/Login/Password/Server/Team configured.")
|
||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
@ -152,7 +172,11 @@ func (b *Bmattermost) handleMatter() {
|
||||||
flog.Debugf("Choosing webhooks based receiving")
|
flog.Debugf("Choosing webhooks based receiving")
|
||||||
go b.handleMatterHook(mchan)
|
go b.handleMatterHook(mchan)
|
||||||
} else {
|
} else {
|
||||||
flog.Debugf("Choosing login/password based receiving")
|
if b.Config.Token != "" {
|
||||||
|
flog.Debugf("Choosing token based receiving")
|
||||||
|
} else {
|
||||||
|
flog.Debugf("Choosing login/password based receiving")
|
||||||
|
}
|
||||||
go b.handleMatterClient(mchan)
|
go b.handleMatterClient(mchan)
|
||||||
}
|
}
|
||||||
for message := range mchan {
|
for message := range mchan {
|
||||||
|
@ -221,7 +245,12 @@ func (b *Bmattermost) handleMatterHook(mchan chan *MMMessage) {
|
||||||
}
|
}
|
||||||
|
|
||||||
func (b *Bmattermost) apiLogin() error {
|
func (b *Bmattermost) apiLogin() error {
|
||||||
b.mc = matterclient.New(b.Config.Login, b.Config.Password,
|
password := b.Config.Password
|
||||||
|
if b.Config.Token != "" {
|
||||||
|
password = "MMAUTHTOKEN=" + b.Config.Token
|
||||||
|
}
|
||||||
|
|
||||||
|
b.mc = matterclient.New(b.Config.Login, password,
|
||||||
b.Config.Team, b.Config.Server)
|
b.Config.Team, b.Config.Server)
|
||||||
b.mc.SkipTLSVerify = b.Config.SkipTLSVerify
|
b.mc.SkipTLSVerify = b.Config.SkipTLSVerify
|
||||||
b.mc.NoTLS = b.Config.NoTLS
|
b.mc.NoTLS = b.Config.NoTLS
|
||||||
|
|
|
@ -213,6 +213,11 @@ Team="yourteam"
|
||||||
Login="yourlogin"
|
Login="yourlogin"
|
||||||
Password="yourpass"
|
Password="yourpass"
|
||||||
|
|
||||||
|
#personal access token of the bot.
|
||||||
|
#new feature since mattermost 4.1. See https://docs.mattermost.com/developer/personal-access-tokens.html
|
||||||
|
#OPTIONAL (you can use token instead of login/password)
|
||||||
|
#Token="abcdefghijklm"
|
||||||
|
|
||||||
#Enable this to make a http connection (instead of https) to your mattermost.
|
#Enable this to make a http connection (instead of https) to your mattermost.
|
||||||
#OPTIONAL (default false)
|
#OPTIONAL (default false)
|
||||||
NoTLS=false
|
NoTLS=false
|
||||||
|
|
|
@ -140,7 +140,7 @@ func (m *MMClient) Login() error {
|
||||||
for {
|
for {
|
||||||
m.log.Debugf("%s %s %s %s", logmsg, m.Credentials.Team, m.Credentials.Login, m.Credentials.Server)
|
m.log.Debugf("%s %s %s %s", logmsg, m.Credentials.Team, m.Credentials.Login, m.Credentials.Server)
|
||||||
if strings.Contains(m.Credentials.Pass, model.SESSION_COOKIE_TOKEN) {
|
if strings.Contains(m.Credentials.Pass, model.SESSION_COOKIE_TOKEN) {
|
||||||
m.log.Debugf(logmsg+" with %s", model.SESSION_COOKIE_TOKEN)
|
m.log.Debugf(logmsg + " with token")
|
||||||
token := strings.Split(m.Credentials.Pass, model.SESSION_COOKIE_TOKEN+"=")
|
token := strings.Split(m.Credentials.Pass, model.SESSION_COOKIE_TOKEN+"=")
|
||||||
if len(token) != 2 {
|
if len(token) != 2 {
|
||||||
return errors.New("incorrect MMAUTHTOKEN. valid input is MMAUTHTOKEN=yourtoken")
|
return errors.New("incorrect MMAUTHTOKEN. valid input is MMAUTHTOKEN=yourtoken")
|
||||||
|
@ -150,7 +150,7 @@ func (m *MMClient) Login() error {
|
||||||
m.Client.AuthType = model.HEADER_BEARER
|
m.Client.AuthType = model.HEADER_BEARER
|
||||||
m.User, resp = m.Client.GetMe("")
|
m.User, resp = m.Client.GetMe("")
|
||||||
if resp.Error != nil {
|
if resp.Error != nil {
|
||||||
return errors.New(resp.Error.DetailedError)
|
return resp.Error
|
||||||
}
|
}
|
||||||
if m.User == nil {
|
if m.User == nil {
|
||||||
m.log.Errorf("LOGIN TOKEN: %s is invalid", m.Credentials.Pass)
|
m.log.Errorf("LOGIN TOKEN: %s is invalid", m.Credentials.Pass)
|
||||||
|
|
Loading…
Reference in New Issue