user.go 8.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345
  1. package api
  2. import (
  3. "github.com/grafana/grafana/pkg/api/dtos"
  4. "github.com/grafana/grafana/pkg/bus"
  5. m "github.com/grafana/grafana/pkg/models"
  6. "github.com/grafana/grafana/pkg/setting"
  7. "github.com/grafana/grafana/pkg/util"
  8. )
  9. // GET /api/user (current authenticated user)
  10. func GetSignedInUser(c *m.ReqContext) Response {
  11. return getUserUserProfile(c.UserId)
  12. }
  13. // GET /api/users/:id
  14. func GetUserByID(c *m.ReqContext) Response {
  15. return getUserUserProfile(c.ParamsInt64(":id"))
  16. }
  17. func getUserUserProfile(userID int64) Response {
  18. query := m.GetUserProfileQuery{UserId: userID}
  19. if err := bus.Dispatch(&query); err != nil {
  20. if err == m.ErrUserNotFound {
  21. return Error(404, m.ErrUserNotFound.Error(), nil)
  22. }
  23. return Error(500, "Failed to get user", err)
  24. }
  25. getAuthQuery := m.GetAuthInfoQuery{UserId: userID}
  26. query.Result.AuthLabels = []string{}
  27. if err := bus.Dispatch(&getAuthQuery); err == nil {
  28. authLabel := GetAuthProviderLabel(getAuthQuery.Result.AuthModule)
  29. query.Result.AuthLabels = append(query.Result.AuthLabels, authLabel)
  30. query.Result.IsExternal = true
  31. }
  32. return JSON(200, query.Result)
  33. }
  34. // GET /api/users/lookup
  35. func GetUserByLoginOrEmail(c *m.ReqContext) Response {
  36. query := m.GetUserByLoginQuery{LoginOrEmail: c.Query("loginOrEmail")}
  37. if err := bus.Dispatch(&query); err != nil {
  38. if err == m.ErrUserNotFound {
  39. return Error(404, m.ErrUserNotFound.Error(), nil)
  40. }
  41. return Error(500, "Failed to get user", err)
  42. }
  43. user := query.Result
  44. result := m.UserProfileDTO{
  45. Id: user.Id,
  46. Name: user.Name,
  47. Email: user.Email,
  48. Login: user.Login,
  49. Theme: user.Theme,
  50. IsGrafanaAdmin: user.IsAdmin,
  51. OrgId: user.OrgId,
  52. }
  53. return JSON(200, &result)
  54. }
  55. // POST /api/user
  56. func UpdateSignedInUser(c *m.ReqContext, cmd m.UpdateUserCommand) Response {
  57. if setting.AuthProxyEnabled {
  58. if setting.AuthProxyHeaderProperty == "email" && cmd.Email != c.Email {
  59. return Error(400, "Not allowed to change email when auth proxy is using email property", nil)
  60. }
  61. if setting.AuthProxyHeaderProperty == "username" && cmd.Login != c.Login {
  62. return Error(400, "Not allowed to change username when auth proxy is using username property", nil)
  63. }
  64. }
  65. cmd.UserId = c.UserId
  66. return handleUpdateUser(cmd)
  67. }
  68. // POST /api/users/:id
  69. func UpdateUser(c *m.ReqContext, cmd m.UpdateUserCommand) Response {
  70. cmd.UserId = c.ParamsInt64(":id")
  71. return handleUpdateUser(cmd)
  72. }
  73. //POST /api/users/:id/using/:orgId
  74. func UpdateUserActiveOrg(c *m.ReqContext) Response {
  75. userID := c.ParamsInt64(":id")
  76. orgID := c.ParamsInt64(":orgId")
  77. if !validateUsingOrg(userID, orgID) {
  78. return Error(401, "Not a valid organization", nil)
  79. }
  80. cmd := m.SetUsingOrgCommand{UserId: userID, OrgId: orgID}
  81. if err := bus.Dispatch(&cmd); err != nil {
  82. return Error(500, "Failed to change active organization", err)
  83. }
  84. return Success("Active organization changed")
  85. }
  86. func handleUpdateUser(cmd m.UpdateUserCommand) Response {
  87. if len(cmd.Login) == 0 {
  88. cmd.Login = cmd.Email
  89. if len(cmd.Login) == 0 {
  90. return Error(400, "Validation error, need to specify either username or email", nil)
  91. }
  92. }
  93. if err := bus.Dispatch(&cmd); err != nil {
  94. return Error(500, "Failed to update user", err)
  95. }
  96. return Success("User updated")
  97. }
  98. // GET /api/user/orgs
  99. func GetSignedInUserOrgList(c *m.ReqContext) Response {
  100. return getUserOrgList(c.UserId)
  101. }
  102. // GET /api/user/teams
  103. func GetSignedInUserTeamList(c *m.ReqContext) Response {
  104. return getUserTeamList(c.OrgId, c.UserId)
  105. }
  106. // GET /api/users/:id/teams
  107. func GetUserTeams(c *m.ReqContext) Response {
  108. return getUserTeamList(c.OrgId, c.ParamsInt64(":id"))
  109. }
  110. func getUserTeamList(orgID int64, userID int64) Response {
  111. query := m.GetTeamsByUserQuery{OrgId: orgID, UserId: userID}
  112. if err := bus.Dispatch(&query); err != nil {
  113. return Error(500, "Failed to get user teams", err)
  114. }
  115. for _, team := range query.Result {
  116. team.AvatarUrl = dtos.GetGravatarUrlWithDefault(team.Email, team.Name)
  117. }
  118. return JSON(200, query.Result)
  119. }
  120. // GET /api/users/:id/orgs
  121. func GetUserOrgList(c *m.ReqContext) Response {
  122. return getUserOrgList(c.ParamsInt64(":id"))
  123. }
  124. func getUserOrgList(userID int64) Response {
  125. query := m.GetUserOrgListQuery{UserId: userID}
  126. if err := bus.Dispatch(&query); err != nil {
  127. return Error(500, "Failed to get user organizations", err)
  128. }
  129. return JSON(200, query.Result)
  130. }
  131. func validateUsingOrg(userID int64, orgID int64) bool {
  132. query := m.GetUserOrgListQuery{UserId: userID}
  133. if err := bus.Dispatch(&query); err != nil {
  134. return false
  135. }
  136. // validate that the org id in the list
  137. valid := false
  138. for _, other := range query.Result {
  139. if other.OrgId == orgID {
  140. valid = true
  141. }
  142. }
  143. return valid
  144. }
  145. // POST /api/user/using/:id
  146. func UserSetUsingOrg(c *m.ReqContext) Response {
  147. orgID := c.ParamsInt64(":id")
  148. if !validateUsingOrg(c.UserId, orgID) {
  149. return Error(401, "Not a valid organization", nil)
  150. }
  151. cmd := m.SetUsingOrgCommand{UserId: c.UserId, OrgId: orgID}
  152. if err := bus.Dispatch(&cmd); err != nil {
  153. return Error(500, "Failed to change active organization", err)
  154. }
  155. return Success("Active organization changed")
  156. }
  157. // GET /profile/switch-org/:id
  158. func (hs *HTTPServer) ChangeActiveOrgAndRedirectToHome(c *m.ReqContext) {
  159. orgID := c.ParamsInt64(":id")
  160. if !validateUsingOrg(c.UserId, orgID) {
  161. hs.NotFoundHandler(c)
  162. }
  163. cmd := m.SetUsingOrgCommand{UserId: c.UserId, OrgId: orgID}
  164. if err := bus.Dispatch(&cmd); err != nil {
  165. hs.NotFoundHandler(c)
  166. }
  167. c.Redirect(setting.AppSubUrl + "/")
  168. }
  169. func ChangeUserPassword(c *m.ReqContext, cmd m.ChangeUserPasswordCommand) Response {
  170. if setting.LDAPEnabled || setting.AuthProxyEnabled {
  171. return Error(400, "Not allowed to change password when LDAP or Auth Proxy is enabled", nil)
  172. }
  173. userQuery := m.GetUserByIdQuery{Id: c.UserId}
  174. if err := bus.Dispatch(&userQuery); err != nil {
  175. return Error(500, "Could not read user from database", err)
  176. }
  177. passwordHashed := util.EncodePassword(cmd.OldPassword, userQuery.Result.Salt)
  178. if passwordHashed != userQuery.Result.Password {
  179. return Error(401, "Invalid old password", nil)
  180. }
  181. password := m.Password(cmd.NewPassword)
  182. if password.IsWeak() {
  183. return Error(400, "New password is too short", nil)
  184. }
  185. cmd.UserId = c.UserId
  186. cmd.NewPassword = util.EncodePassword(cmd.NewPassword, userQuery.Result.Salt)
  187. if err := bus.Dispatch(&cmd); err != nil {
  188. return Error(500, "Failed to change user password", err)
  189. }
  190. return Success("User password changed")
  191. }
  192. // GET /api/users
  193. func SearchUsers(c *m.ReqContext) Response {
  194. query, err := searchUser(c)
  195. if err != nil {
  196. return Error(500, "Failed to fetch users", err)
  197. }
  198. return JSON(200, query.Result.Users)
  199. }
  200. // GET /api/users/search
  201. func SearchUsersWithPaging(c *m.ReqContext) Response {
  202. query, err := searchUser(c)
  203. if err != nil {
  204. return Error(500, "Failed to fetch users", err)
  205. }
  206. return JSON(200, query.Result)
  207. }
  208. func searchUser(c *m.ReqContext) (*m.SearchUsersQuery, error) {
  209. perPage := c.QueryInt("perpage")
  210. if perPage <= 0 {
  211. perPage = 1000
  212. }
  213. page := c.QueryInt("page")
  214. if page < 1 {
  215. page = 1
  216. }
  217. searchQuery := c.Query("query")
  218. query := &m.SearchUsersQuery{Query: searchQuery, Page: page, Limit: perPage}
  219. if err := bus.Dispatch(query); err != nil {
  220. return nil, err
  221. }
  222. for _, user := range query.Result.Users {
  223. user.AvatarUrl = dtos.GetGravatarUrl(user.Email)
  224. user.AuthLabels = make([]string, 0)
  225. if user.AuthModule != nil && len(user.AuthModule) > 0 {
  226. for _, authModule := range user.AuthModule {
  227. user.AuthLabels = append(user.AuthLabels, GetAuthProviderLabel(authModule))
  228. }
  229. }
  230. }
  231. query.Result.Page = page
  232. query.Result.PerPage = perPage
  233. return query, nil
  234. }
  235. func SetHelpFlag(c *m.ReqContext) Response {
  236. flag := c.ParamsInt64(":id")
  237. bitmask := &c.HelpFlags1
  238. bitmask.AddFlag(m.HelpFlags1(flag))
  239. cmd := m.SetUserHelpFlagCommand{
  240. UserId: c.UserId,
  241. HelpFlags1: *bitmask,
  242. }
  243. if err := bus.Dispatch(&cmd); err != nil {
  244. return Error(500, "Failed to update help flag", err)
  245. }
  246. return JSON(200, &util.DynMap{"message": "Help flag set", "helpFlags1": cmd.HelpFlags1})
  247. }
  248. func ClearHelpFlags(c *m.ReqContext) Response {
  249. cmd := m.SetUserHelpFlagCommand{
  250. UserId: c.UserId,
  251. HelpFlags1: m.HelpFlags1(0),
  252. }
  253. if err := bus.Dispatch(&cmd); err != nil {
  254. return Error(500, "Failed to update help flag", err)
  255. }
  256. return JSON(200, &util.DynMap{"message": "Help flag set", "helpFlags1": cmd.HelpFlags1})
  257. }
  258. func GetAuthProviderLabel(authModule string) string {
  259. switch authModule {
  260. case "oauth_github":
  261. return "GitHub"
  262. case "oauth_google":
  263. return "Google"
  264. case "oauth_gitlab":
  265. return "GitLab"
  266. case "oauth_grafana_com", "oauth_grafananet":
  267. return "grafana.com"
  268. case "auth.saml":
  269. return "SAML"
  270. case "ldap", "":
  271. return "LDAP"
  272. default:
  273. return "OAuth"
  274. }
  275. }