admin_users.go 3.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135
  1. package api
  2. import (
  3. "github.com/grafana/grafana/pkg/api/dtos"
  4. "github.com/grafana/grafana/pkg/bus"
  5. "github.com/grafana/grafana/pkg/infra/metrics"
  6. m "github.com/grafana/grafana/pkg/models"
  7. "github.com/grafana/grafana/pkg/util"
  8. )
  9. func AdminCreateUser(c *m.ReqContext, form dtos.AdminCreateUserForm) {
  10. cmd := m.CreateUserCommand{
  11. Login: form.Login,
  12. Email: form.Email,
  13. Password: form.Password,
  14. Name: form.Name,
  15. }
  16. if len(cmd.Login) == 0 {
  17. cmd.Login = cmd.Email
  18. if len(cmd.Login) == 0 {
  19. c.JsonApiErr(400, "Validation error, need specify either username or email", nil)
  20. return
  21. }
  22. }
  23. if len(cmd.Password) < 4 {
  24. c.JsonApiErr(400, "Password is missing or too short", nil)
  25. return
  26. }
  27. if err := bus.Dispatch(&cmd); err != nil {
  28. c.JsonApiErr(500, "failed to create user", err)
  29. return
  30. }
  31. metrics.M_Api_Admin_User_Create.Inc()
  32. user := cmd.Result
  33. result := m.UserIdDTO{
  34. Message: "User created",
  35. Id: user.Id,
  36. }
  37. c.JSON(200, result)
  38. }
  39. func AdminUpdateUserPassword(c *m.ReqContext, form dtos.AdminUpdateUserPasswordForm) {
  40. userID := c.ParamsInt64(":id")
  41. if len(form.Password) < 4 {
  42. c.JsonApiErr(400, "New password too short", nil)
  43. return
  44. }
  45. userQuery := m.GetUserByIdQuery{Id: userID}
  46. if err := bus.Dispatch(&userQuery); err != nil {
  47. c.JsonApiErr(500, "Could not read user from database", err)
  48. return
  49. }
  50. passwordHashed := util.EncodePassword(form.Password, userQuery.Result.Salt)
  51. cmd := m.ChangeUserPasswordCommand{
  52. UserId: userID,
  53. NewPassword: passwordHashed,
  54. }
  55. if err := bus.Dispatch(&cmd); err != nil {
  56. c.JsonApiErr(500, "Failed to update user password", err)
  57. return
  58. }
  59. c.JsonOK("User password updated")
  60. }
  61. // PUT /api/admin/users/:id/permissions
  62. func AdminUpdateUserPermissions(c *m.ReqContext, form dtos.AdminUpdateUserPermissionsForm) {
  63. userID := c.ParamsInt64(":id")
  64. cmd := m.UpdateUserPermissionsCommand{
  65. UserId: userID,
  66. IsGrafanaAdmin: form.IsGrafanaAdmin,
  67. }
  68. if err := bus.Dispatch(&cmd); err != nil {
  69. if err == m.ErrLastGrafanaAdmin {
  70. c.JsonApiErr(400, m.ErrLastGrafanaAdmin.Error(), nil)
  71. return
  72. }
  73. c.JsonApiErr(500, "Failed to update user permissions", err)
  74. return
  75. }
  76. c.JsonOK("User permissions updated")
  77. }
  78. func AdminDeleteUser(c *m.ReqContext) {
  79. userID := c.ParamsInt64(":id")
  80. cmd := m.DeleteUserCommand{UserId: userID}
  81. if err := bus.Dispatch(&cmd); err != nil {
  82. c.JsonApiErr(500, "Failed to delete user", err)
  83. return
  84. }
  85. c.JsonOK("User deleted")
  86. }
  87. // POST /api/admin/users/:id/logout
  88. func (server *HTTPServer) AdminLogoutUser(c *m.ReqContext) Response {
  89. userID := c.ParamsInt64(":id")
  90. if c.UserId == userID {
  91. return Error(400, "You cannot logout yourself", nil)
  92. }
  93. return server.logoutUserFromAllDevicesInternal(c.Req.Context(), userID)
  94. }
  95. // GET /api/admin/users/:id/auth-tokens
  96. func (server *HTTPServer) AdminGetUserAuthTokens(c *m.ReqContext) Response {
  97. userID := c.ParamsInt64(":id")
  98. return server.getUserAuthTokensInternal(c, userID)
  99. }
  100. // POST /api/admin/users/:id/revoke-auth-token
  101. func (server *HTTPServer) AdminRevokeUserAuthToken(c *m.ReqContext, cmd m.RevokeAuthTokenCmd) Response {
  102. userID := c.ParamsInt64(":id")
  103. return server.revokeUserAuthTokenInternal(c, userID, cmd)
  104. }