2022-02-16 11:47:41 -06:00
|
|
|
package searchV2
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
|
2022-10-19 08:02:15 -05:00
|
|
|
"github.com/grafana/grafana/pkg/infra/db"
|
2022-02-16 11:47:41 -06:00
|
|
|
"github.com/grafana/grafana/pkg/models"
|
2022-04-28 13:16:23 -05:00
|
|
|
"github.com/grafana/grafana/pkg/services/accesscontrol"
|
2022-02-16 11:47:41 -06:00
|
|
|
"github.com/grafana/grafana/pkg/services/sqlstore/permissions"
|
2022-04-28 13:16:23 -05:00
|
|
|
"github.com/grafana/grafana/pkg/services/sqlstore/searchstore"
|
2022-08-10 04:56:48 -05:00
|
|
|
"github.com/grafana/grafana/pkg/services/user"
|
2022-02-16 11:47:41 -06:00
|
|
|
)
|
|
|
|
|
|
|
|
// ResourceFilter checks if a given a uid (resource identifier) check if we have the requested permission
|
|
|
|
type ResourceFilter func(uid string) bool
|
|
|
|
|
|
|
|
// FutureAuthService eventually implemented by the security service
|
|
|
|
type FutureAuthService interface {
|
2022-08-10 04:56:48 -05:00
|
|
|
GetDashboardReadFilter(user *user.SignedInUser) (ResourceFilter, error)
|
2022-02-16 11:47:41 -06:00
|
|
|
}
|
|
|
|
|
2022-04-28 13:16:23 -05:00
|
|
|
var _ FutureAuthService = (*simpleSQLAuthService)(nil)
|
|
|
|
|
2022-02-16 11:47:41 -06:00
|
|
|
type simpleSQLAuthService struct {
|
2022-10-19 08:02:15 -05:00
|
|
|
sql db.DB
|
2022-08-24 06:29:17 -05:00
|
|
|
ac accesscontrol.Service
|
2022-02-16 11:47:41 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
type dashIdQueryResult struct {
|
|
|
|
UID string `xorm:"uid"`
|
|
|
|
}
|
|
|
|
|
2022-08-10 04:56:48 -05:00
|
|
|
func (a *simpleSQLAuthService) getDashboardTableAuthFilter(user *user.SignedInUser) searchstore.FilterWhere {
|
2022-04-28 13:16:23 -05:00
|
|
|
if a.ac.IsDisabled() {
|
|
|
|
return permissions.DashboardPermissionFilter{
|
|
|
|
OrgRole: user.OrgRole,
|
2022-08-11 06:28:55 -05:00
|
|
|
OrgId: user.OrgID,
|
2022-10-19 08:02:15 -05:00
|
|
|
Dialect: a.sql.GetDialect(),
|
2022-08-11 06:28:55 -05:00
|
|
|
UserId: user.UserID,
|
2022-04-28 13:16:23 -05:00
|
|
|
PermissionLevel: models.PERMISSION_VIEW,
|
|
|
|
}
|
2022-02-16 11:47:41 -06:00
|
|
|
}
|
|
|
|
|
2022-04-28 13:16:23 -05:00
|
|
|
return permissions.NewAccessControlDashboardPermissionFilter(user, models.PERMISSION_VIEW, searchstore.TypeDashboard)
|
|
|
|
}
|
|
|
|
|
2022-08-10 04:56:48 -05:00
|
|
|
func (a *simpleSQLAuthService) GetDashboardReadFilter(user *user.SignedInUser) (ResourceFilter, error) {
|
2022-04-28 13:16:23 -05:00
|
|
|
filter := a.getDashboardTableAuthFilter(user)
|
2022-02-16 11:47:41 -06:00
|
|
|
rows := make([]*dashIdQueryResult, 0)
|
|
|
|
|
2022-10-19 08:02:15 -05:00
|
|
|
err := a.sql.WithDbSession(context.Background(), func(sess *db.Session) error {
|
2022-02-16 11:47:41 -06:00
|
|
|
sql, params := filter.Where()
|
|
|
|
sess.Table("dashboard").
|
|
|
|
Where(sql, params...).
|
2022-08-11 06:28:55 -05:00
|
|
|
Where("org_id = ?", user.OrgID).
|
2022-02-16 11:47:41 -06:00
|
|
|
Cols("uid")
|
|
|
|
|
|
|
|
err := sess.Find(&rows)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
uids := make(map[string]bool, len(rows)+1)
|
|
|
|
for i := 0; i < len(rows); i++ {
|
|
|
|
uids[rows[i].UID] = true
|
|
|
|
}
|
|
|
|
|
|
|
|
return func(uid string) bool {
|
|
|
|
return uids[uid]
|
|
|
|
}, err
|
|
|
|
}
|