guardian.go 2.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127
  1. package guardian
  2. import (
  3. "github.com/grafana/grafana/pkg/bus"
  4. "github.com/grafana/grafana/pkg/log"
  5. m "github.com/grafana/grafana/pkg/models"
  6. )
  7. type DashboardGuardian struct {
  8. user *m.SignedInUser
  9. dashId int64
  10. orgId int64
  11. acl []*m.DashboardAclInfoDTO
  12. groups []*m.UserGroup
  13. log log.Logger
  14. }
  15. func NewDashboardGuardian(dashId int64, orgId int64, user *m.SignedInUser) *DashboardGuardian {
  16. return &DashboardGuardian{
  17. user: user,
  18. dashId: dashId,
  19. orgId: orgId,
  20. log: log.New("guardians.dashboard"),
  21. }
  22. }
  23. func (g *DashboardGuardian) CanSave() (bool, error) {
  24. return g.HasPermission(m.PERMISSION_EDIT)
  25. }
  26. func (g *DashboardGuardian) CanEdit() (bool, error) {
  27. return g.HasPermission(m.PERMISSION_EDIT)
  28. }
  29. func (g *DashboardGuardian) CanView() (bool, error) {
  30. return g.HasPermission(m.PERMISSION_VIEW)
  31. }
  32. func (g *DashboardGuardian) CanAdmin() (bool, error) {
  33. return g.HasPermission(m.PERMISSION_ADMIN)
  34. }
  35. func (g *DashboardGuardian) HasPermission(permission m.PermissionType) (bool, error) {
  36. if g.user.OrgRole == m.ROLE_ADMIN {
  37. return true, nil
  38. }
  39. acl, err := g.GetAcl()
  40. if err != nil {
  41. return false, err
  42. }
  43. orgRole := g.user.OrgRole
  44. if orgRole == m.ROLE_READ_ONLY_EDITOR {
  45. orgRole = m.ROLE_VIEWER
  46. }
  47. userGroupAclItems := []*m.DashboardAclInfoDTO{}
  48. for _, p := range acl {
  49. // user match
  50. if p.UserId == g.user.UserId && p.Permission >= permission {
  51. return true, nil
  52. }
  53. // role match
  54. if p.Role != nil {
  55. if *p.Role == orgRole && p.Permission >= permission {
  56. return true, nil
  57. }
  58. }
  59. // remember this rule for later
  60. if p.UserGroupId > 0 {
  61. userGroupAclItems = append(userGroupAclItems, p)
  62. }
  63. }
  64. // do we have group rules?
  65. if len(userGroupAclItems) == 0 {
  66. return false, nil
  67. }
  68. // load groups
  69. userGroups, err := g.getUserGroups()
  70. if err != nil {
  71. return false, err
  72. }
  73. // evalute group rules
  74. for _, p := range acl {
  75. for _, ug := range userGroups {
  76. if ug.Id == p.UserGroupId && p.Permission >= permission {
  77. return true, nil
  78. }
  79. }
  80. }
  81. return false, nil
  82. }
  83. // Returns dashboard acl
  84. func (g *DashboardGuardian) GetAcl() ([]*m.DashboardAclInfoDTO, error) {
  85. if g.acl != nil {
  86. return g.acl, nil
  87. }
  88. query := m.GetDashboardAclInfoListQuery{DashboardId: g.dashId, OrgId: g.orgId}
  89. if err := bus.Dispatch(&query); err != nil {
  90. return nil, err
  91. }
  92. g.acl = query.Result
  93. return g.acl, nil
  94. }
  95. func (g *DashboardGuardian) getUserGroups() ([]*m.UserGroup, error) {
  96. if g.groups != nil {
  97. return g.groups, nil
  98. }
  99. query := m.GetUserGroupsByUserQuery{UserId: g.user.UserId}
  100. err := bus.Dispatch(&query)
  101. g.groups = query.Result
  102. return query.Result, err
  103. }