2015-01-15 05:16:54 -06:00
package api
import (
2020-08-13 07:38:54 -05:00
"errors"
"fmt"
2021-11-29 03:18:01 -06:00
"net/http"
2022-01-14 10:55:57 -06:00
"strconv"
2022-11-14 06:11:26 -06:00
"strings"
2020-08-13 07:38:54 -05:00
2022-09-27 06:58:49 -05:00
"golang.org/x/sync/errgroup"
2015-02-10 08:36:51 -06:00
"github.com/grafana/grafana/pkg/api/dtos"
2021-01-15 07:43:20 -06:00
"github.com/grafana/grafana/pkg/api/response"
2019-02-23 16:35:26 -06:00
"github.com/grafana/grafana/pkg/infra/metrics"
2022-09-27 06:58:49 -05:00
"github.com/grafana/grafana/pkg/services/accesscontrol"
2022-11-18 02:56:06 -06:00
"github.com/grafana/grafana/pkg/services/auth"
2023-08-28 03:42:24 -05:00
"github.com/grafana/grafana/pkg/services/auth/identity"
2023-01-27 01:50:36 -06:00
contextmodel "github.com/grafana/grafana/pkg/services/contexthandler/model"
2023-01-27 12:36:54 -06:00
"github.com/grafana/grafana/pkg/services/login"
2023-01-04 09:20:26 -06:00
"github.com/grafana/grafana/pkg/services/org"
2022-06-28 07:32:25 -05:00
"github.com/grafana/grafana/pkg/services/user"
2015-02-23 04:24:22 -06:00
"github.com/grafana/grafana/pkg/util"
2021-11-29 03:18:01 -06:00
"github.com/grafana/grafana/pkg/web"
2015-01-15 05:16:54 -06:00
)
2022-07-27 08:54:37 -05:00
// swagger:route POST /admin/users admin_users adminCreateUser
//
// Create new user.
//
// If you are running Grafana Enterprise and have Fine-grained access control enabled, you need to have a permission with action `users:create`.
// Note that OrgId is an optional parameter that can be used to assign a new user to a different organization when `auto_assign_org` is set to `true`.
//
// Security:
// - basic:
//
// Responses:
// 200: adminCreateUserResponse
// 400: badRequestError
// 401: unauthorisedError
// 403: forbiddenError
// 412: preconditionFailedError
// 500: internalServerError
2023-01-27 01:50:36 -06:00
func ( hs * HTTPServer ) AdminCreateUser ( c * contextmodel . ReqContext ) response . Response {
2021-11-29 03:18:01 -06:00
form := dtos . AdminCreateUserForm { }
if err := web . Bind ( c . Req , & form ) ; err != nil {
return response . Error ( http . StatusBadRequest , "bad request data" , err )
}
2022-11-14 06:11:26 -06:00
form . Email = strings . TrimSpace ( form . Email )
form . Login = strings . TrimSpace ( form . Login )
2022-06-28 07:32:25 -05:00
cmd := user . CreateUserCommand {
2015-02-10 08:36:51 -06:00
Login : form . Login ,
Email : form . Email ,
Password : form . Password ,
Name : form . Name ,
2022-06-28 07:32:25 -05:00
OrgID : form . OrgId ,
2015-02-10 08:36:51 -06:00
}
if len ( cmd . Login ) == 0 {
cmd . Login = cmd . Email
if len ( cmd . Login ) == 0 {
2021-01-15 07:43:20 -06:00
return response . Error ( 400 , "Validation error, need specify either username or email" , nil )
2015-02-10 08:36:51 -06:00
}
}
if len ( cmd . Password ) < 4 {
2021-01-15 07:43:20 -06:00
return response . Error ( 400 , "Password is missing or too short" , nil )
2015-02-10 08:36:51 -06:00
}
2022-11-29 03:20:44 -06:00
usr , err := hs . userService . Create ( c . Req . Context ( ) , & cmd )
2021-03-18 11:16:56 -05:00
if err != nil {
2023-01-04 09:20:26 -06:00
if errors . Is ( err , org . ErrOrgNotFound ) {
2023-03-06 01:57:46 -06:00
return response . Error ( http . StatusBadRequest , err . Error ( ) , nil )
2020-08-13 07:38:54 -05:00
}
2022-07-20 07:50:06 -05:00
if errors . Is ( err , user . ErrUserAlreadyExists ) {
2023-03-06 01:57:46 -06:00
return response . Error ( http . StatusPreconditionFailed , fmt . Sprintf ( "User with email '%s' or username '%s' already exists" , form . Email , form . Login ) , err )
2020-04-15 04:11:45 -05:00
}
2023-03-06 01:57:46 -06:00
return response . Error ( http . StatusInternalServerError , "failed to create user" , err )
2015-02-10 08:36:51 -06:00
}
2019-07-16 09:58:46 -05:00
metrics . MApiAdminUserCreate . Inc ( )
2015-03-22 14:14:00 -05:00
2023-01-31 04:04:55 -06:00
result := user . AdminCreateUserResponse {
2015-11-16 09:28:38 -06:00
Message : "User created" ,
2023-01-31 04:04:55 -06:00
ID : usr . ID ,
2015-11-16 09:28:38 -06:00
}
2015-11-16 08:55:02 -06:00
2022-04-15 07:01:58 -05:00
return response . JSON ( http . StatusOK , result )
2015-02-10 08:36:51 -06:00
}
2022-07-27 08:54:37 -05:00
// swagger:route PUT /admin/users/{user_id}/password admin_users adminUpdateUserPassword
//
// Set password for user.
//
// If you are running Grafana Enterprise and have Fine-grained access control enabled, you need to have a permission with action `users.password:update` and scope `global.users:*`.
//
// Security:
// - basic:
//
// Responses:
// 200: okResponse
// 400: badRequestError
// 401: unauthorisedError
// 403: forbiddenError
// 500: internalServerError
2023-01-27 01:50:36 -06:00
func ( hs * HTTPServer ) AdminUpdateUserPassword ( c * contextmodel . ReqContext ) response . Response {
2021-11-29 03:18:01 -06:00
form := dtos . AdminUpdateUserPasswordForm { }
if err := web . Bind ( c . Req , & form ) ; err != nil {
return response . Error ( http . StatusBadRequest , "bad request data" , err )
}
2022-01-14 10:55:57 -06:00
userID , err := strconv . ParseInt ( web . Params ( c . Req ) [ ":id" ] , 10 , 64 )
if err != nil {
return response . Error ( http . StatusBadRequest , "id is invalid" , err )
}
2015-02-23 04:24:22 -06:00
if len ( form . Password ) < 4 {
2021-01-15 07:43:20 -06:00
return response . Error ( 400 , "New password too short" , nil )
2015-02-23 04:24:22 -06:00
}
2022-08-02 09:58:05 -05:00
userQuery := user . GetUserByIDQuery { ID : userID }
2015-02-23 04:24:22 -06:00
2022-08-02 09:58:05 -05:00
usr , err := hs . userService . GetByID ( c . Req . Context ( ) , & userQuery )
if err != nil {
2021-01-15 07:43:20 -06:00
return response . Error ( 500 , "Could not read user from database" , err )
2015-02-23 04:24:22 -06:00
}
2022-08-02 09:58:05 -05:00
passwordHashed , err := util . EncodePassword ( form . Password , usr . Salt )
2019-10-23 03:40:12 -05:00
if err != nil {
2021-01-15 07:43:20 -06:00
return response . Error ( 500 , "Could not encode password" , err )
2019-10-23 03:40:12 -05:00
}
2015-02-23 04:24:22 -06:00
2022-08-04 08:05:05 -05:00
cmd := user . ChangeUserPasswordCommand {
UserID : userID ,
2015-02-23 04:24:22 -06:00
NewPassword : passwordHashed ,
}
2022-08-04 08:05:05 -05:00
if err := hs . userService . ChangePassword ( c . Req . Context ( ) , & cmd ) ; err != nil {
2021-01-15 07:43:20 -06:00
return response . Error ( 500 , "Failed to update user password" , err )
2015-02-23 04:24:22 -06:00
}
2021-01-15 07:43:20 -06:00
return response . Success ( "User password updated" )
2015-02-23 04:24:22 -06:00
}
2022-07-27 08:54:37 -05:00
// swagger:route PUT /admin/users/{user_id}/permissions admin_users adminUpdateUserPermissions
//
// Set permissions for user.
//
// Only works with Basic Authentication (username and password). See introduction for an explanation.
// If you are running Grafana Enterprise and have Fine-grained access control enabled, you need to have a permission with action `users.permissions:update` and scope `global.users:*`.
//
// Responses:
// 200: okResponse
// 400: badRequestError
// 401: unauthorisedError
// 403: forbiddenError
// 500: internalServerError
2023-01-27 01:50:36 -06:00
func ( hs * HTTPServer ) AdminUpdateUserPermissions ( c * contextmodel . ReqContext ) response . Response {
2021-11-29 03:18:01 -06:00
form := dtos . AdminUpdateUserPermissionsForm { }
if err := web . Bind ( c . Req , & form ) ; err != nil {
return response . Error ( http . StatusBadRequest , "bad request data" , err )
}
2022-01-14 10:55:57 -06:00
userID , err := strconv . ParseInt ( web . Params ( c . Req ) [ ":id" ] , 10 , 64 )
if err != nil {
return response . Error ( http . StatusBadRequest , "id is invalid" , err )
}
2015-02-26 08:43:48 -06:00
2023-08-01 10:39:08 -05:00
getAuthQuery := login . GetAuthInfoQuery { UserId : userID }
if authInfo , err := hs . authInfoService . GetAuthInfo ( c . Req . Context ( ) , & getAuthQuery ) ; err == nil && authInfo != nil {
oAuthAndAllowAssignGrafanaAdmin := false
if oauthInfo := hs . SocialService . GetOAuthInfoProvider ( strings . TrimPrefix ( authInfo . AuthModule , "oauth_" ) ) ; oauthInfo != nil {
oAuthAndAllowAssignGrafanaAdmin = oauthInfo . AllowAssignGrafanaAdmin
}
if login . IsGrafanaAdminExternallySynced ( hs . Cfg , authInfo . AuthModule , oAuthAndAllowAssignGrafanaAdmin ) {
return response . Error ( http . StatusForbidden , "Cannot change Grafana Admin role for externally synced user" , nil )
}
}
2022-10-04 07:14:32 -05:00
err = hs . userService . UpdatePermissions ( c . Req . Context ( ) , userID , form . IsGrafanaAdmin )
2021-03-19 03:14:14 -05:00
if err != nil {
2022-07-20 07:50:06 -05:00
if errors . Is ( err , user . ErrLastGrafanaAdmin ) {
return response . Error ( 400 , user . ErrLastGrafanaAdmin . Error ( ) , nil )
2018-12-01 11:28:10 -06:00
}
2021-01-15 07:43:20 -06:00
return response . Error ( 500 , "Failed to update user permissions" , err )
2015-02-26 08:43:48 -06:00
}
2021-01-15 07:43:20 -06:00
return response . Success ( "User permissions updated" )
2015-02-26 08:43:48 -06:00
}
2022-07-27 08:54:37 -05:00
// swagger:route DELETE /admin/users/{user_id} admin_users adminDeleteUser
//
// Delete global User.
//
// If you are running Grafana Enterprise and have Fine-grained access control enabled, you need to have a permission with action `users:delete` and scope `global.users:*`.
//
// Security:
// - basic:
//
// Responses:
// 200: okResponse
// 401: unauthorisedError
// 403: forbiddenError
// 404: notFoundError
// 500: internalServerError
2023-01-27 01:50:36 -06:00
func ( hs * HTTPServer ) AdminDeleteUser ( c * contextmodel . ReqContext ) response . Response {
2022-01-14 10:55:57 -06:00
userID , err := strconv . ParseInt ( web . Params ( c . Req ) [ ":id" ] , 10 , 64 )
if err != nil {
return response . Error ( http . StatusBadRequest , "id is invalid" , err )
}
2015-02-11 09:47:22 -06:00
2022-08-15 06:56:16 -05:00
cmd := user . DeleteUserCommand { UserID : userID }
2015-02-11 09:47:22 -06:00
2022-08-15 06:56:16 -05:00
if err := hs . userService . Delete ( c . Req . Context ( ) , & cmd ) ; err != nil {
2022-07-20 07:50:06 -05:00
if errors . Is ( err , user . ErrUserNotFound ) {
return response . Error ( 404 , user . ErrUserNotFound . Error ( ) , nil )
2020-01-10 04:43:44 -06:00
}
2021-01-15 07:43:20 -06:00
return response . Error ( 500 , "Failed to delete user" , err )
2015-02-11 09:47:22 -06:00
}
2022-09-27 06:58:49 -05:00
g , ctx := errgroup . WithContext ( c . Req . Context ( ) )
g . Go ( func ( ) error {
if err := hs . starService . DeleteByUser ( ctx , cmd . UserID ) ; err != nil {
return err
}
return nil
} )
g . Go ( func ( ) error {
if err := hs . orgService . DeleteUserFromAll ( ctx , cmd . UserID ) ; err != nil {
return err
}
return nil
} )
g . Go ( func ( ) error {
if err := hs . DashboardService . DeleteACLByUser ( ctx , cmd . UserID ) ; err != nil {
return err
}
return nil
} )
g . Go ( func ( ) error {
if err := hs . preferenceService . DeleteByUser ( ctx , cmd . UserID ) ; err != nil {
return err
}
return nil
} )
g . Go ( func ( ) error {
2023-05-22 11:41:53 -05:00
if err := hs . teamService . RemoveUsersMemberships ( ctx , cmd . UserID ) ; err != nil {
2022-09-27 06:58:49 -05:00
return err
}
return nil
} )
g . Go ( func ( ) error {
2022-11-18 07:40:26 -06:00
if err := hs . authInfoService . DeleteUserAuthInfo ( ctx , cmd . UserID ) ; err != nil {
2022-09-27 06:58:49 -05:00
return err
}
return nil
} )
g . Go ( func ( ) error {
2022-11-18 07:40:26 -06:00
if err := hs . AuthTokenService . RevokeAllUserTokens ( ctx , cmd . UserID ) ; err != nil {
2022-09-27 06:58:49 -05:00
return err
}
return nil
} )
g . Go ( func ( ) error {
2022-11-14 13:08:10 -06:00
if err := hs . QuotaService . DeleteQuotaForUser ( ctx , cmd . UserID ) ; err != nil {
2022-09-27 06:58:49 -05:00
return err
}
return nil
} )
g . Go ( func ( ) error {
if err := hs . accesscontrolService . DeleteUserPermissions ( ctx , accesscontrol . GlobalOrgID , cmd . UserID ) ; err != nil {
return err
}
return nil
} )
if err := g . Wait ( ) ; err != nil {
return response . Error ( 500 , "Failed to delete user" , err )
}
2021-01-15 07:43:20 -06:00
return response . Success ( "User deleted" )
2015-02-11 09:47:22 -06:00
}
2019-03-08 08:15:38 -06:00
2022-07-27 08:54:37 -05:00
// swagger:route POST /admin/users/{user_id}/disable admin_users adminDisableUser
//
// Disable user.
//
// If you are running Grafana Enterprise and have Fine-grained access control enabled, you need to have a permission with action `users:disable` and scope `global.users:1` (userIDScope).
//
// Security:
// - basic:
//
// Responses:
// 200: okResponse
// 401: unauthorisedError
// 403: forbiddenError
// 404: notFoundError
// 500: internalServerError
2023-01-27 01:50:36 -06:00
func ( hs * HTTPServer ) AdminDisableUser ( c * contextmodel . ReqContext ) response . Response {
2022-01-14 10:55:57 -06:00
userID , err := strconv . ParseInt ( web . Params ( c . Req ) [ ":id" ] , 10 , 64 )
if err != nil {
return response . Error ( http . StatusBadRequest , "id is invalid" , err )
}
2019-05-21 06:52:49 -05:00
// External users shouldn't be disabled from API
2023-01-27 12:36:54 -06:00
authInfoQuery := & login . GetAuthInfoQuery { UserId : userID }
2023-03-28 13:32:21 -05:00
if _ , err := hs . authInfoService . GetAuthInfo ( c . Req . Context ( ) , authInfoQuery ) ; ! errors . Is ( err , user . ErrUserNotFound ) {
2021-01-15 07:43:20 -06:00
return response . Error ( 500 , "Could not disable external user" , nil )
2019-05-21 06:52:49 -05:00
}
2022-08-16 07:24:57 -05:00
disableCmd := user . DisableUserCommand { UserID : userID , IsDisabled : true }
if err := hs . userService . Disable ( c . Req . Context ( ) , & disableCmd ) ; err != nil {
2022-07-20 07:50:06 -05:00
if errors . Is ( err , user . ErrUserNotFound ) {
return response . Error ( 404 , user . ErrUserNotFound . Error ( ) , nil )
2020-01-10 04:43:44 -06:00
}
2021-01-15 07:43:20 -06:00
return response . Error ( 500 , "Failed to disable user" , err )
2019-05-23 07:54:47 -05:00
}
2022-01-14 10:55:57 -06:00
err = hs . AuthTokenService . RevokeAllUserTokens ( c . Req . Context ( ) , userID )
2019-05-23 07:54:47 -05:00
if err != nil {
2021-01-15 07:43:20 -06:00
return response . Error ( 500 , "Failed to disable user" , err )
2019-05-21 06:52:49 -05:00
}
2021-01-15 07:43:20 -06:00
return response . Success ( "User disabled" )
2019-05-21 06:52:49 -05:00
}
2022-07-27 08:54:37 -05:00
// swagger:route POST /admin/users/{user_id}/enable admin_users adminEnableUser
//
// Enable user.
//
// If you are running Grafana Enterprise and have Fine-grained access control enabled, you need to have a permission with action `users:enable` and scope `global.users:1` (userIDScope).
//
// Security:
// - basic:
//
// Responses:
// 200: okResponse
// 401: unauthorisedError
// 403: forbiddenError
// 404: notFoundError
// 500: internalServerError
2023-01-27 01:50:36 -06:00
func ( hs * HTTPServer ) AdminEnableUser ( c * contextmodel . ReqContext ) response . Response {
2022-01-14 10:55:57 -06:00
userID , err := strconv . ParseInt ( web . Params ( c . Req ) [ ":id" ] , 10 , 64 )
if err != nil {
return response . Error ( http . StatusBadRequest , "id is invalid" , err )
}
2019-05-21 06:52:49 -05:00
// External users shouldn't be disabled from API
2023-01-27 12:36:54 -06:00
authInfoQuery := & login . GetAuthInfoQuery { UserId : userID }
2023-03-28 13:32:21 -05:00
if _ , err := hs . authInfoService . GetAuthInfo ( c . Req . Context ( ) , authInfoQuery ) ; ! errors . Is ( err , user . ErrUserNotFound ) {
2021-01-15 07:43:20 -06:00
return response . Error ( 500 , "Could not enable external user" , nil )
2019-05-21 06:52:49 -05:00
}
2022-08-16 07:24:57 -05:00
disableCmd := user . DisableUserCommand { UserID : userID , IsDisabled : false }
if err := hs . userService . Disable ( c . Req . Context ( ) , & disableCmd ) ; err != nil {
2022-07-20 07:50:06 -05:00
if errors . Is ( err , user . ErrUserNotFound ) {
return response . Error ( 404 , user . ErrUserNotFound . Error ( ) , nil )
2020-01-10 04:43:44 -06:00
}
2021-01-15 07:43:20 -06:00
return response . Error ( 500 , "Failed to enable user" , err )
2019-05-21 06:52:49 -05:00
}
2021-01-15 07:43:20 -06:00
return response . Success ( "User enabled" )
2019-05-21 06:52:49 -05:00
}
2022-07-27 08:54:37 -05:00
// swagger:route POST /admin/users/{user_id}/logout admin_users adminLogoutUser
//
// Logout user revokes all auth tokens (devices) for the user. User of issued auth tokens (devices) will no longer be logged in and will be required to authenticate again upon next activity.
// If you are running Grafana Enterprise and have Fine-grained access control enabled, you need to have a permission with action `users.logout` and scope `global.users:*`.
//
// Security:
// - basic:
//
// Responses:
// 200: okResponse
// 400: badRequestError
// 401: unauthorisedError
// 403: forbiddenError
// 404: notFoundError
// 500: internalServerError
2023-01-27 01:50:36 -06:00
func ( hs * HTTPServer ) AdminLogoutUser ( c * contextmodel . ReqContext ) response . Response {
2022-01-14 10:55:57 -06:00
userID , err := strconv . ParseInt ( web . Params ( c . Req ) [ ":id" ] , 10 , 64 )
if err != nil {
return response . Error ( http . StatusBadRequest , "id is invalid" , err )
}
2019-03-08 08:15:38 -06:00
2023-08-28 03:42:24 -05:00
namespace , identifier := c . SignedInUser . GetNamespacedID ( )
if namespace == identity . NamespaceUser {
activeUserID , err := identity . IntIdentifier ( namespace , identifier )
if err != nil {
return response . Error ( http . StatusInternalServerError , "Failed to parse active user id" , err )
}
if activeUserID == userID {
return response . Error ( http . StatusBadRequest , "You cannot logout yourself" , nil )
}
2019-03-08 08:15:38 -06:00
}
2020-11-05 08:37:11 -06:00
return hs . logoutUserFromAllDevicesInternal ( c . Req . Context ( ) , userID )
2019-03-08 08:15:38 -06:00
}
2022-07-27 08:54:37 -05:00
// swagger:route GET /admin/users/{user_id}/auth-tokens admin_users adminGetUserAuthTokens
//
// Return a list of all auth tokens (devices) that the user currently have logged in from.
// If you are running Grafana Enterprise and have Fine-grained access control enabled, you need to have a permission with action `users.authtoken:list` and scope `global.users:*`.
//
// Security:
// - basic:
//
// Responses:
// 200: adminGetUserAuthTokensResponse
// 401: unauthorisedError
// 403: forbiddenError
// 500: internalServerError
2023-01-27 01:50:36 -06:00
func ( hs * HTTPServer ) AdminGetUserAuthTokens ( c * contextmodel . ReqContext ) response . Response {
2022-01-14 10:55:57 -06:00
userID , err := strconv . ParseInt ( web . Params ( c . Req ) [ ":id" ] , 10 , 64 )
if err != nil {
return response . Error ( http . StatusBadRequest , "id is invalid" , err )
}
2020-11-05 08:37:11 -06:00
return hs . getUserAuthTokensInternal ( c , userID )
2019-03-08 08:15:38 -06:00
}
2022-07-27 08:54:37 -05:00
// swagger:route POST /admin/users/{user_id}/revoke-auth-token admin_users adminRevokeUserAuthToken
//
// Revoke auth token for user.
//
// Revokes the given auth token (device) for the user. User of issued auth token (device) will no longer be logged in and will be required to authenticate again upon next activity.
// If you are running Grafana Enterprise and have Fine-grained access control enabled, you need to have a permission with action `users.authtoken:update` and scope `global.users:*`.
//
// Security:
// - basic:
//
// Responses:
// 200: okResponse
// 400: badRequestError
// 401: unauthorisedError
// 403: forbiddenError
// 404: notFoundError
// 500: internalServerError
2023-01-27 01:50:36 -06:00
func ( hs * HTTPServer ) AdminRevokeUserAuthToken ( c * contextmodel . ReqContext ) response . Response {
2022-11-18 02:56:06 -06:00
cmd := auth . RevokeAuthTokenCmd { }
2021-11-29 03:18:01 -06:00
if err := web . Bind ( c . Req , & cmd ) ; err != nil {
return response . Error ( http . StatusBadRequest , "bad request data" , err )
}
2022-01-14 10:55:57 -06:00
userID , err := strconv . ParseInt ( web . Params ( c . Req ) [ ":id" ] , 10 , 64 )
if err != nil {
return response . Error ( http . StatusBadRequest , "id is invalid" , err )
}
2020-11-05 08:37:11 -06:00
return hs . revokeUserAuthTokenInternal ( c , userID , cmd )
2019-03-08 08:15:38 -06:00
}
2022-07-27 08:54:37 -05:00
// swagger:parameters adminUpdateUserPassword
type AdminUpdateUserPasswordParams struct {
// in:body
// required:true
Body dtos . AdminUpdateUserPasswordForm ` json:"body" `
// in:path
// required:true
UserID int64 ` json:"user_id" `
}
// swagger:parameters adminDeleteUser
type AdminDeleteUserParams struct {
// in:path
// required:true
UserID int64 ` json:"user_id" `
}
// swagger:parameters adminEnableUser
type AdminEnableUserParams struct {
// in:path
// required:true
UserID int64 ` json:"user_id" `
}
// swagger:parameters adminDisableUser
type AdminDisableUserParams struct {
// in:path
// required:true
UserID int64 ` json:"user_id" `
}
// swagger:parameters adminGetUserAuthTokens
type AdminGetUserAuthTokensParams struct {
// in:path
// required:true
UserID int64 ` json:"user_id" `
}
// swagger:parameters adminLogoutUser
type AdminLogoutUserParams struct {
// in:path
// required:true
UserID int64 ` json:"user_id" `
}
// swagger:parameters adminRevokeUserAuthToken
type AdminRevokeUserAuthTokenParams struct {
// in:body
// required:true
2022-11-18 02:56:06 -06:00
Body auth . RevokeAuthTokenCmd ` json:"body" `
2022-07-27 08:54:37 -05:00
// in:path
// required:true
UserID int64 ` json:"user_id" `
}
// swagger:parameters adminCreateUser
type AdminCreateUserParams struct {
// in:body
// required:true
Body dtos . AdminCreateUserForm ` json:"body" `
}
// swagger:parameters adminUpdateUserPermissions
type AdminUpdateUserPermissionsParams struct {
// in:body
// required:true
Body dtos . AdminUpdateUserPermissionsForm ` json:"body" `
// in:path
// required:true
UserID int64 ` json:"user_id" `
}
// swagger:response adminCreateUserResponse
type AdminCreateUserResponseResponse struct {
// in:body
2023-01-31 04:04:55 -06:00
Body user . AdminCreateUserResponse ` json:"body" `
2022-07-27 08:54:37 -05:00
}
// swagger:response adminGetUserAuthTokensResponse
type AdminGetUserAuthTokensResponse struct {
// in:body
2022-11-18 02:56:06 -06:00
Body [ ] * auth . UserToken ` json:"body" `
2022-07-27 08:54:37 -05:00
}