|
|
@@ -17,11 +17,21 @@ func GetDataSources(c *m.ReqContext) Response {
|
|
|
return Error(500, "Failed to query datasources", err)
|
|
|
}
|
|
|
|
|
|
+ permissions := map[int64]m.DsPermissionType{}
|
|
|
+ permissionsQuery := m.GetDataSourcePermissionsForUserQuery{User: c.SignedInUser}
|
|
|
+ if err := bus.Dispatch(&permissionsQuery); err != nil {
|
|
|
+ if err != bus.ErrHandlerNotFound {
|
|
|
+ return Error(500, "failed to read datasource permissions", err)
|
|
|
+ }
|
|
|
+ } else {
|
|
|
+ permissions = permissionsQuery.Result
|
|
|
+ }
|
|
|
+
|
|
|
result := make(dtos.DataSourceList, 0)
|
|
|
for _, ds := range query.Result {
|
|
|
dsItem := dtos.DataSourceListItemDTO{
|
|
|
- Id: ds.Id,
|
|
|
OrgId: ds.OrgId,
|
|
|
+ Id: ds.Id,
|
|
|
Name: ds.Name,
|
|
|
Url: ds.Url,
|
|
|
Type: ds.Type,
|
|
|
@@ -35,6 +45,13 @@ func GetDataSources(c *m.ReqContext) Response {
|
|
|
ReadOnly: ds.ReadOnly,
|
|
|
}
|
|
|
|
|
|
+ if permission, ok := permissions[ds.Id]; ok {
|
|
|
+ c.Logger.Info("Found permission", "permission", permission)
|
|
|
+ if permission == m.DsPermissionNoAccess {
|
|
|
+ continue
|
|
|
+ }
|
|
|
+ }
|
|
|
+
|
|
|
if plugin, exists := plugins.DataSources[ds.Type]; exists {
|
|
|
dsItem.TypeLogoUrl = plugin.Info.Logos.Small
|
|
|
} else {
|
|
|
@@ -49,7 +66,27 @@ func GetDataSources(c *m.ReqContext) Response {
|
|
|
return JSON(200, &result)
|
|
|
}
|
|
|
|
|
|
-func GetDataSourceByID(c *m.ReqContext) Response {
|
|
|
+func hasRequiredDatasourcePermission(dsId int64, permission m.DsPermissionType, user *m.SignedInUser) Response {
|
|
|
+ query := m.HasRequiredDataSourcePermissionQuery{
|
|
|
+ Id: dsId,
|
|
|
+ User: user,
|
|
|
+ RequiredPermission: permission,
|
|
|
+ }
|
|
|
+
|
|
|
+ if err := bus.Dispatch(&query); err != nil {
|
|
|
+ if err == bus.ErrHandlerNotFound {
|
|
|
+ return nil
|
|
|
+ }
|
|
|
+ if err == m.ErrDataSourceAccessDenied {
|
|
|
+ return Error(403, err.Error(), nil)
|
|
|
+ }
|
|
|
+ return Error(500, "Failed to check data source permissions", err)
|
|
|
+ }
|
|
|
+
|
|
|
+ return nil
|
|
|
+}
|
|
|
+
|
|
|
+func GetDataSourceById(c *m.ReqContext) Response {
|
|
|
query := m.GetDataSourceByIdQuery{
|
|
|
Id: c.ParamsInt64(":id"),
|
|
|
OrgId: c.OrgId,
|
|
|
@@ -68,14 +105,14 @@ func GetDataSourceByID(c *m.ReqContext) Response {
|
|
|
return JSON(200, &dtos)
|
|
|
}
|
|
|
|
|
|
-func DeleteDataSourceByID(c *m.ReqContext) Response {
|
|
|
+func DeleteDataSourceById(c *m.ReqContext) Response {
|
|
|
id := c.ParamsInt64(":id")
|
|
|
|
|
|
if id <= 0 {
|
|
|
return Error(400, "Missing valid datasource id", nil)
|
|
|
}
|
|
|
|
|
|
- ds, err := getRawDataSourceByID(id, c.OrgId)
|
|
|
+ ds, err := getRawDataSourceById(id, c.OrgId)
|
|
|
if err != nil {
|
|
|
return Error(400, "Failed to delete datasource", nil)
|
|
|
}
|
|
|
@@ -186,7 +223,7 @@ func fillWithSecureJSONData(cmd *m.UpdateDataSourceCommand) error {
|
|
|
return nil
|
|
|
}
|
|
|
|
|
|
- ds, err := getRawDataSourceByID(cmd.Id, cmd.OrgId)
|
|
|
+ ds, err := getRawDataSourceById(cmd.Id, cmd.OrgId)
|
|
|
if err != nil {
|
|
|
return err
|
|
|
}
|
|
|
@@ -206,7 +243,7 @@ func fillWithSecureJSONData(cmd *m.UpdateDataSourceCommand) error {
|
|
|
return nil
|
|
|
}
|
|
|
|
|
|
-func getRawDataSourceByID(id int64, orgID int64) (*m.DataSource, error) {
|
|
|
+func getRawDataSourceById(id int64, orgID int64) (*m.DataSource, error) {
|
|
|
query := m.GetDataSourceByIdQuery{
|
|
|
Id: id,
|
|
|
OrgId: orgID,
|
|
|
@@ -236,7 +273,7 @@ func GetDataSourceByName(c *m.ReqContext) Response {
|
|
|
}
|
|
|
|
|
|
// Get /api/datasources/id/:name
|
|
|
-func GetDataSourceIDByName(c *m.ReqContext) Response {
|
|
|
+func GetDataSourceIdByName(c *m.ReqContext) Response {
|
|
|
query := m.GetDataSourceByNameQuery{Name: c.Params(":name"), OrgId: c.OrgId}
|
|
|
|
|
|
if err := bus.Dispatch(&query); err != nil {
|