| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345 |
- package api
- import (
- "github.com/grafana/grafana/pkg/api/dtos"
- "github.com/grafana/grafana/pkg/bus"
- m "github.com/grafana/grafana/pkg/models"
- "github.com/grafana/grafana/pkg/setting"
- "github.com/grafana/grafana/pkg/util"
- )
- // GET /api/user (current authenticated user)
- func GetSignedInUser(c *m.ReqContext) Response {
- return getUserUserProfile(c.UserId)
- }
- // GET /api/users/:id
- func GetUserByID(c *m.ReqContext) Response {
- return getUserUserProfile(c.ParamsInt64(":id"))
- }
- func getUserUserProfile(userID int64) Response {
- query := m.GetUserProfileQuery{UserId: userID}
- if err := bus.Dispatch(&query); err != nil {
- if err == m.ErrUserNotFound {
- return Error(404, m.ErrUserNotFound.Error(), nil)
- }
- return Error(500, "Failed to get user", err)
- }
- getAuthQuery := m.GetAuthInfoQuery{UserId: userID}
- query.Result.AuthLabels = []string{}
- if err := bus.Dispatch(&getAuthQuery); err == nil {
- authLabel := GetAuthProviderLabel(getAuthQuery.Result.AuthModule)
- query.Result.AuthLabels = append(query.Result.AuthLabels, authLabel)
- query.Result.IsExternal = true
- }
- return JSON(200, query.Result)
- }
- // GET /api/users/lookup
- func GetUserByLoginOrEmail(c *m.ReqContext) Response {
- query := m.GetUserByLoginQuery{LoginOrEmail: c.Query("loginOrEmail")}
- if err := bus.Dispatch(&query); err != nil {
- if err == m.ErrUserNotFound {
- return Error(404, m.ErrUserNotFound.Error(), nil)
- }
- return Error(500, "Failed to get user", err)
- }
- user := query.Result
- result := m.UserProfileDTO{
- Id: user.Id,
- Name: user.Name,
- Email: user.Email,
- Login: user.Login,
- Theme: user.Theme,
- IsGrafanaAdmin: user.IsAdmin,
- OrgId: user.OrgId,
- }
- return JSON(200, &result)
- }
- // POST /api/user
- func UpdateSignedInUser(c *m.ReqContext, cmd m.UpdateUserCommand) Response {
- if setting.AuthProxyEnabled {
- if setting.AuthProxyHeaderProperty == "email" && cmd.Email != c.Email {
- return Error(400, "Not allowed to change email when auth proxy is using email property", nil)
- }
- if setting.AuthProxyHeaderProperty == "username" && cmd.Login != c.Login {
- return Error(400, "Not allowed to change username when auth proxy is using username property", nil)
- }
- }
- cmd.UserId = c.UserId
- return handleUpdateUser(cmd)
- }
- // POST /api/users/:id
- func UpdateUser(c *m.ReqContext, cmd m.UpdateUserCommand) Response {
- cmd.UserId = c.ParamsInt64(":id")
- return handleUpdateUser(cmd)
- }
- //POST /api/users/:id/using/:orgId
- func UpdateUserActiveOrg(c *m.ReqContext) Response {
- userID := c.ParamsInt64(":id")
- orgID := c.ParamsInt64(":orgId")
- if !validateUsingOrg(userID, orgID) {
- return Error(401, "Not a valid organization", nil)
- }
- cmd := m.SetUsingOrgCommand{UserId: userID, OrgId: orgID}
- if err := bus.Dispatch(&cmd); err != nil {
- return Error(500, "Failed to change active organization", err)
- }
- return Success("Active organization changed")
- }
- func handleUpdateUser(cmd m.UpdateUserCommand) Response {
- if len(cmd.Login) == 0 {
- cmd.Login = cmd.Email
- if len(cmd.Login) == 0 {
- return Error(400, "Validation error, need to specify either username or email", nil)
- }
- }
- if err := bus.Dispatch(&cmd); err != nil {
- return Error(500, "Failed to update user", err)
- }
- return Success("User updated")
- }
- // GET /api/user/orgs
- func GetSignedInUserOrgList(c *m.ReqContext) Response {
- return getUserOrgList(c.UserId)
- }
- // GET /api/user/teams
- func GetSignedInUserTeamList(c *m.ReqContext) Response {
- return getUserTeamList(c.OrgId, c.UserId)
- }
- // GET /api/users/:id/teams
- func GetUserTeams(c *m.ReqContext) Response {
- return getUserTeamList(c.OrgId, c.ParamsInt64(":id"))
- }
- func getUserTeamList(orgID int64, userID int64) Response {
- query := m.GetTeamsByUserQuery{OrgId: orgID, UserId: userID}
- if err := bus.Dispatch(&query); err != nil {
- return Error(500, "Failed to get user teams", err)
- }
- for _, team := range query.Result {
- team.AvatarUrl = dtos.GetGravatarUrlWithDefault(team.Email, team.Name)
- }
- return JSON(200, query.Result)
- }
- // GET /api/users/:id/orgs
- func GetUserOrgList(c *m.ReqContext) Response {
- return getUserOrgList(c.ParamsInt64(":id"))
- }
- func getUserOrgList(userID int64) Response {
- query := m.GetUserOrgListQuery{UserId: userID}
- if err := bus.Dispatch(&query); err != nil {
- return Error(500, "Failed to get user organizations", err)
- }
- return JSON(200, query.Result)
- }
- func validateUsingOrg(userID int64, orgID int64) bool {
- query := m.GetUserOrgListQuery{UserId: userID}
- if err := bus.Dispatch(&query); err != nil {
- return false
- }
- // validate that the org id in the list
- valid := false
- for _, other := range query.Result {
- if other.OrgId == orgID {
- valid = true
- }
- }
- return valid
- }
- // POST /api/user/using/:id
- func UserSetUsingOrg(c *m.ReqContext) Response {
- orgID := c.ParamsInt64(":id")
- if !validateUsingOrg(c.UserId, orgID) {
- return Error(401, "Not a valid organization", nil)
- }
- cmd := m.SetUsingOrgCommand{UserId: c.UserId, OrgId: orgID}
- if err := bus.Dispatch(&cmd); err != nil {
- return Error(500, "Failed to change active organization", err)
- }
- return Success("Active organization changed")
- }
- // GET /profile/switch-org/:id
- func (hs *HTTPServer) ChangeActiveOrgAndRedirectToHome(c *m.ReqContext) {
- orgID := c.ParamsInt64(":id")
- if !validateUsingOrg(c.UserId, orgID) {
- hs.NotFoundHandler(c)
- }
- cmd := m.SetUsingOrgCommand{UserId: c.UserId, OrgId: orgID}
- if err := bus.Dispatch(&cmd); err != nil {
- hs.NotFoundHandler(c)
- }
- c.Redirect(setting.AppSubUrl + "/")
- }
- func ChangeUserPassword(c *m.ReqContext, cmd m.ChangeUserPasswordCommand) Response {
- if setting.LDAPEnabled || setting.AuthProxyEnabled {
- return Error(400, "Not allowed to change password when LDAP or Auth Proxy is enabled", nil)
- }
- userQuery := m.GetUserByIdQuery{Id: c.UserId}
- if err := bus.Dispatch(&userQuery); err != nil {
- return Error(500, "Could not read user from database", err)
- }
- passwordHashed := util.EncodePassword(cmd.OldPassword, userQuery.Result.Salt)
- if passwordHashed != userQuery.Result.Password {
- return Error(401, "Invalid old password", nil)
- }
- password := m.Password(cmd.NewPassword)
- if password.IsWeak() {
- return Error(400, "New password is too short", nil)
- }
- cmd.UserId = c.UserId
- cmd.NewPassword = util.EncodePassword(cmd.NewPassword, userQuery.Result.Salt)
- if err := bus.Dispatch(&cmd); err != nil {
- return Error(500, "Failed to change user password", err)
- }
- return Success("User password changed")
- }
- // GET /api/users
- func SearchUsers(c *m.ReqContext) Response {
- query, err := searchUser(c)
- if err != nil {
- return Error(500, "Failed to fetch users", err)
- }
- return JSON(200, query.Result.Users)
- }
- // GET /api/users/search
- func SearchUsersWithPaging(c *m.ReqContext) Response {
- query, err := searchUser(c)
- if err != nil {
- return Error(500, "Failed to fetch users", err)
- }
- return JSON(200, query.Result)
- }
- func searchUser(c *m.ReqContext) (*m.SearchUsersQuery, error) {
- perPage := c.QueryInt("perpage")
- if perPage <= 0 {
- perPage = 1000
- }
- page := c.QueryInt("page")
- if page < 1 {
- page = 1
- }
- searchQuery := c.Query("query")
- query := &m.SearchUsersQuery{Query: searchQuery, Page: page, Limit: perPage}
- if err := bus.Dispatch(query); err != nil {
- return nil, err
- }
- for _, user := range query.Result.Users {
- user.AvatarUrl = dtos.GetGravatarUrl(user.Email)
- user.AuthLabels = make([]string, 0)
- if user.AuthModule != nil && len(user.AuthModule) > 0 {
- for _, authModule := range user.AuthModule {
- user.AuthLabels = append(user.AuthLabels, GetAuthProviderLabel(authModule))
- }
- }
- }
- query.Result.Page = page
- query.Result.PerPage = perPage
- return query, nil
- }
- func SetHelpFlag(c *m.ReqContext) Response {
- flag := c.ParamsInt64(":id")
- bitmask := &c.HelpFlags1
- bitmask.AddFlag(m.HelpFlags1(flag))
- cmd := m.SetUserHelpFlagCommand{
- UserId: c.UserId,
- HelpFlags1: *bitmask,
- }
- if err := bus.Dispatch(&cmd); err != nil {
- return Error(500, "Failed to update help flag", err)
- }
- return JSON(200, &util.DynMap{"message": "Help flag set", "helpFlags1": cmd.HelpFlags1})
- }
- func ClearHelpFlags(c *m.ReqContext) Response {
- cmd := m.SetUserHelpFlagCommand{
- UserId: c.UserId,
- HelpFlags1: m.HelpFlags1(0),
- }
- if err := bus.Dispatch(&cmd); err != nil {
- return Error(500, "Failed to update help flag", err)
- }
- return JSON(200, &util.DynMap{"message": "Help flag set", "helpFlags1": cmd.HelpFlags1})
- }
- func GetAuthProviderLabel(authModule string) string {
- switch authModule {
- case "oauth_github":
- return "GitHub"
- case "oauth_google":
- return "Google"
- case "oauth_gitlab":
- return "GitLab"
- case "oauth_grafana_com", "oauth_grafananet":
- return "grafana.com"
- case "auth.saml":
- return "SAML"
- case "ldap", "":
- return "LDAP"
- default:
- return "OAuth"
- }
- }
|