admin_users.go 4.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176
  1. package api
  2. import (
  3. "github.com/grafana/grafana/pkg/api/dtos"
  4. "github.com/grafana/grafana/pkg/bus"
  5. "github.com/grafana/grafana/pkg/infra/metrics"
  6. "github.com/grafana/grafana/pkg/models"
  7. "github.com/grafana/grafana/pkg/util"
  8. )
  9. func AdminCreateUser(c *models.ReqContext, form dtos.AdminCreateUserForm) {
  10. cmd := models.CreateUserCommand{
  11. Login: form.Login,
  12. Email: form.Email,
  13. Password: form.Password,
  14. Name: form.Name,
  15. }
  16. if len(cmd.Login) == 0 {
  17. cmd.Login = cmd.Email
  18. if len(cmd.Login) == 0 {
  19. c.JsonApiErr(400, "Validation error, need specify either username or email", nil)
  20. return
  21. }
  22. }
  23. if len(cmd.Password) < 4 {
  24. c.JsonApiErr(400, "Password is missing or too short", nil)
  25. return
  26. }
  27. if err := bus.Dispatch(&cmd); err != nil {
  28. c.JsonApiErr(500, "failed to create user", err)
  29. return
  30. }
  31. metrics.M_Api_Admin_User_Create.Inc()
  32. user := cmd.Result
  33. result := models.UserIdDTO{
  34. Message: "User created",
  35. Id: user.Id,
  36. }
  37. c.JSON(200, result)
  38. }
  39. func AdminUpdateUserPassword(c *models.ReqContext, form dtos.AdminUpdateUserPasswordForm) {
  40. userID := c.ParamsInt64(":id")
  41. if len(form.Password) < 4 {
  42. c.JsonApiErr(400, "New password too short", nil)
  43. return
  44. }
  45. userQuery := models.GetUserByIdQuery{Id: userID}
  46. if err := bus.Dispatch(&userQuery); err != nil {
  47. c.JsonApiErr(500, "Could not read user from database", err)
  48. return
  49. }
  50. passwordHashed := util.EncodePassword(form.Password, userQuery.Result.Salt)
  51. cmd := models.ChangeUserPasswordCommand{
  52. UserId: userID,
  53. NewPassword: passwordHashed,
  54. }
  55. if err := bus.Dispatch(&cmd); err != nil {
  56. c.JsonApiErr(500, "Failed to update user password", err)
  57. return
  58. }
  59. c.JsonOK("User password updated")
  60. }
  61. // PUT /api/admin/users/:id/permissions
  62. func AdminUpdateUserPermissions(c *models.ReqContext, form dtos.AdminUpdateUserPermissionsForm) {
  63. userID := c.ParamsInt64(":id")
  64. cmd := models.UpdateUserPermissionsCommand{
  65. UserId: userID,
  66. IsGrafanaAdmin: form.IsGrafanaAdmin,
  67. }
  68. if err := bus.Dispatch(&cmd); err != nil {
  69. if err == models.ErrLastGrafanaAdmin {
  70. c.JsonApiErr(400, models.ErrLastGrafanaAdmin.Error(), nil)
  71. return
  72. }
  73. c.JsonApiErr(500, "Failed to update user permissions", err)
  74. return
  75. }
  76. c.JsonOK("User permissions updated")
  77. }
  78. func AdminDeleteUser(c *models.ReqContext) {
  79. userID := c.ParamsInt64(":id")
  80. cmd := models.DeleteUserCommand{UserId: userID}
  81. if err := bus.Dispatch(&cmd); err != nil {
  82. c.JsonApiErr(500, "Failed to delete user", err)
  83. return
  84. }
  85. c.JsonOK("User deleted")
  86. }
  87. // POST /api/admin/users/:id/disable
  88. func (server *HTTPServer) AdminDisableUser(c *models.ReqContext) Response {
  89. userID := c.ParamsInt64(":id")
  90. // External users shouldn't be disabled from API
  91. authInfoQuery := &models.GetAuthInfoQuery{UserId: userID}
  92. if err := bus.Dispatch(authInfoQuery); err != models.ErrUserNotFound {
  93. return Error(500, "Could not disable external user", nil)
  94. }
  95. disableCmd := models.DisableUserCommand{UserId: userID, IsDisabled: true}
  96. if err := bus.Dispatch(&disableCmd); err != nil {
  97. return Error(500, "Failed to disable user", err)
  98. }
  99. err := server.AuthTokenService.RevokeAllUserTokens(c.Req.Context(), userID)
  100. if err != nil {
  101. return Error(500, "Failed to disable user", err)
  102. }
  103. return Success("User disabled")
  104. }
  105. // POST /api/admin/users/:id/enable
  106. func AdminEnableUser(c *models.ReqContext) Response {
  107. userID := c.ParamsInt64(":id")
  108. // External users shouldn't be disabled from API
  109. authInfoQuery := &models.GetAuthInfoQuery{UserId: userID}
  110. if err := bus.Dispatch(authInfoQuery); err != models.ErrUserNotFound {
  111. return Error(500, "Could not enable external user", nil)
  112. }
  113. disableCmd := models.DisableUserCommand{UserId: userID, IsDisabled: false}
  114. if err := bus.Dispatch(&disableCmd); err != nil {
  115. return Error(500, "Failed to enable user", err)
  116. }
  117. return Success("User enabled")
  118. }
  119. // POST /api/admin/users/:id/logout
  120. func (server *HTTPServer) AdminLogoutUser(c *models.ReqContext) Response {
  121. userID := c.ParamsInt64(":id")
  122. if c.UserId == userID {
  123. return Error(400, "You cannot logout yourself", nil)
  124. }
  125. return server.logoutUserFromAllDevicesInternal(c.Req.Context(), userID)
  126. }
  127. // GET /api/admin/users/:id/auth-tokens
  128. func (server *HTTPServer) AdminGetUserAuthTokens(c *models.ReqContext) Response {
  129. userID := c.ParamsInt64(":id")
  130. return server.getUserAuthTokensInternal(c, userID)
  131. }
  132. // POST /api/admin/users/:id/revoke-auth-token
  133. func (server *HTTPServer) AdminRevokeUserAuthToken(c *models.ReqContext, cmd models.RevokeAuthTokenCmd) Response {
  134. userID := c.ParamsInt64(":id")
  135. return server.revokeUserAuthTokenInternal(c, userID, cmd)
  136. }