package api import ( "context" "errors" "net/http" "strconv" "github.com/grafana/grafana/pkg/api/dtos" "github.com/grafana/grafana/pkg/api/response" "github.com/grafana/grafana/pkg/models" "github.com/grafana/grafana/pkg/services/login" "github.com/grafana/grafana/pkg/services/user" "github.com/grafana/grafana/pkg/setting" "github.com/grafana/grafana/pkg/util" "github.com/grafana/grafana/pkg/web" ) // swagger:route GET /user signed_in_user getSignedInUser // // Get (current authenticated user) // // Responses: // 200: userResponse // 401: unauthorisedError // 403: forbiddenError // 404: notFoundError // 500: internalServerError func (hs *HTTPServer) GetSignedInUser(c *models.ReqContext) response.Response { return hs.getUserUserProfile(c, c.UserID) } // swagger:route GET /users/{user_id} users getUserByID // // Get user by id. // // Responses: // 200: userResponse // 401: unauthorisedError // 403: forbiddenError // 404: notFoundError // 500: internalServerError func (hs *HTTPServer) GetUserByID(c *models.ReqContext) response.Response { id, err := strconv.ParseInt(web.Params(c.Req)[":id"], 10, 64) if err != nil { return response.Error(http.StatusBadRequest, "id is invalid", err) } return hs.getUserUserProfile(c, id) } func (hs *HTTPServer) getUserUserProfile(c *models.ReqContext, userID int64) response.Response { query := models.GetUserProfileQuery{UserId: userID} if err := hs.SQLStore.GetUserProfile(c.Req.Context(), &query); err != nil { if errors.Is(err, user.ErrUserNotFound) { return response.Error(404, user.ErrUserNotFound.Error(), nil) } return response.Error(500, "Failed to get user", err) } getAuthQuery := models.GetAuthInfoQuery{UserId: userID} query.Result.AuthLabels = []string{} if err := hs.authInfoService.GetAuthInfo(c.Req.Context(), &getAuthQuery); err == nil { authLabel := login.GetAuthProviderLabel(getAuthQuery.Result.AuthModule) query.Result.AuthLabels = append(query.Result.AuthLabels, authLabel) query.Result.IsExternal = true } query.Result.AccessControl = hs.getAccessControlMetadata(c, c.OrgID, "global.users:id:", strconv.FormatInt(userID, 10)) query.Result.AvatarUrl = dtos.GetGravatarUrl(query.Result.Email) return response.JSON(http.StatusOK, query.Result) } // swagger:route GET /users/lookup users getUserByLoginOrEmail // // Get user by login or email. // // Responses: // 200: userResponse // 401: unauthorisedError // 403: forbiddenError // 404: notFoundError // 500: internalServerError func (hs *HTTPServer) GetUserByLoginOrEmail(c *models.ReqContext) response.Response { query := user.GetUserByLoginQuery{LoginOrEmail: c.Query("loginOrEmail")} usr, err := hs.userService.GetByLogin(c.Req.Context(), &query) if err != nil { if errors.Is(err, user.ErrUserNotFound) { return response.Error(404, user.ErrUserNotFound.Error(), nil) } return response.Error(500, "Failed to get user", err) } result := models.UserProfileDTO{ Id: usr.ID, Name: usr.Name, Email: usr.Email, Login: usr.Login, Theme: usr.Theme, IsGrafanaAdmin: usr.IsAdmin, OrgId: usr.OrgID, UpdatedAt: usr.Updated, CreatedAt: usr.Created, } return response.JSON(http.StatusOK, &result) } // swagger:route PUT /user signed_in_user updateSignedInUser // // Update signed in User. // // Responses: // 200: okResponse // 401: unauthorisedError // 403: forbiddenError // 500: internalServerError func (hs *HTTPServer) UpdateSignedInUser(c *models.ReqContext) response.Response { cmd := user.UpdateUserCommand{} if err := web.Bind(c.Req, &cmd); err != nil { return response.Error(http.StatusBadRequest, "bad request data", err) } if setting.AuthProxyEnabled { if setting.AuthProxyHeaderProperty == "email" && cmd.Email != c.Email { return response.Error(400, "Not allowed to change email when auth proxy is using email property", nil) } if setting.AuthProxyHeaderProperty == "username" && cmd.Login != c.Login { return response.Error(400, "Not allowed to change username when auth proxy is using username property", nil) } } cmd.UserID = c.UserID return hs.handleUpdateUser(c.Req.Context(), cmd) } // swagger:route PUT /users/{user_id} users updateUser // // Update user. // // Update the user identified by id. // // Responses: // 200: okResponse // 401: unauthorisedError // 403: forbiddenError // 404: notFoundError // 500: internalServerError func (hs *HTTPServer) UpdateUser(c *models.ReqContext) response.Response { cmd := user.UpdateUserCommand{} var err error if err := web.Bind(c.Req, &cmd); err != nil { return response.Error(http.StatusBadRequest, "bad request data", err) } cmd.UserID, err = strconv.ParseInt(web.Params(c.Req)[":id"], 10, 64) if err != nil { return response.Error(http.StatusBadRequest, "id is invalid", err) } return hs.handleUpdateUser(c.Req.Context(), cmd) } // POST /api/users/:id/using/:orgId func (hs *HTTPServer) UpdateUserActiveOrg(c *models.ReqContext) response.Response { userID, err := strconv.ParseInt(web.Params(c.Req)[":id"], 10, 64) if err != nil { return response.Error(http.StatusBadRequest, "id is invalid", err) } orgID, err := strconv.ParseInt(web.Params(c.Req)[":orgId"], 10, 64) if err != nil { return response.Error(http.StatusBadRequest, "orgId is invalid", err) } if !hs.validateUsingOrg(c.Req.Context(), userID, orgID) { return response.Error(401, "Not a valid organization", nil) } cmd := models.SetUsingOrgCommand{UserId: userID, OrgId: orgID} if err := hs.SQLStore.SetUsingOrg(c.Req.Context(), &cmd); err != nil { return response.Error(500, "Failed to change active organization", err) } return response.Success("Active organization changed") } func (hs *HTTPServer) handleUpdateUser(ctx context.Context, cmd user.UpdateUserCommand) response.Response { if len(cmd.Login) == 0 { cmd.Login = cmd.Email if len(cmd.Login) == 0 { return response.Error(http.StatusBadRequest, "Validation error, need to specify either username or email", nil) } } if err := hs.userService.Update(ctx, &cmd); err != nil { if errors.Is(err, user.ErrCaseInsensitive) { return response.Error(http.StatusConflict, "Update would result in user login conflict", err) } return response.Error(http.StatusInternalServerError, "Failed to update user", err) } return response.Success("User updated") } // swagger:route GET /user/orgs signed_in_user getSignedInUserOrgList // // Organizations of the actual User. // // Return a list of all organizations of the current user. // // Security: // - basic: // // Responses: // 200: getSignedInUserOrgListResponse // 401: unauthorisedError // 403: forbiddenError // 500: internalServerError func (hs *HTTPServer) GetSignedInUserOrgList(c *models.ReqContext) response.Response { return hs.getUserOrgList(c.Req.Context(), c.UserID) } // swagger:route GET /user/teams signed_in_user getSignedInUserTeamList // // Teams that the actual User is member of. // // Return a list of all teams that the current user is member of. // // Responses: // 200: getSignedInUserTeamListResponse // 401: unauthorisedError // 403: forbiddenError // 500: internalServerError func (hs *HTTPServer) GetSignedInUserTeamList(c *models.ReqContext) response.Response { return hs.getUserTeamList(c, c.OrgID, c.UserID) } // swagger:route GET /users/{user_id}/teams users getUserTeams // // Get teams for user. // // Get teams for user identified by id. // // Responses: // 200: getUserTeamsResponse // 401: unauthorisedError // 403: forbiddenError // 404: notFoundError // 500: internalServerError func (hs *HTTPServer) GetUserTeams(c *models.ReqContext) response.Response { id, err := strconv.ParseInt(web.Params(c.Req)[":id"], 10, 64) if err != nil { return response.Error(http.StatusBadRequest, "id is invalid", err) } return hs.getUserTeamList(c, c.OrgID, id) } func (hs *HTTPServer) getUserTeamList(c *models.ReqContext, orgID int64, userID int64) response.Response { query := models.GetTeamsByUserQuery{OrgId: orgID, UserId: userID, SignedInUser: c.SignedInUser} if err := hs.SQLStore.GetTeamsByUser(c.Req.Context(), &query); err != nil { return response.Error(500, "Failed to get user teams", err) } for _, team := range query.Result { team.AvatarUrl = dtos.GetGravatarUrlWithDefault(team.Email, team.Name) } return response.JSON(http.StatusOK, query.Result) } // swagger:route GET /users/{user_id}/orgs users getUserOrgList // // Get organizations for user. // // Get organizations for user identified by id. // // Responses: // 200: getUserOrgListResponse // 401: unauthorisedError // 403: forbiddenError // 404: notFoundError // 500: internalServerError func (hs *HTTPServer) GetUserOrgList(c *models.ReqContext) response.Response { id, err := strconv.ParseInt(web.Params(c.Req)[":id"], 10, 64) if err != nil { return response.Error(http.StatusBadRequest, "id is invalid", err) } return hs.getUserOrgList(c.Req.Context(), id) } func (hs *HTTPServer) getUserOrgList(ctx context.Context, userID int64) response.Response { query := models.GetUserOrgListQuery{UserId: userID} if err := hs.SQLStore.GetUserOrgList(ctx, &query); err != nil { return response.Error(500, "Failed to get user organizations", err) } return response.JSON(http.StatusOK, query.Result) } func (hs *HTTPServer) validateUsingOrg(ctx context.Context, userID int64, orgID int64) bool { query := models.GetUserOrgListQuery{UserId: userID} if err := hs.SQLStore.GetUserOrgList(ctx, &query); err != nil { return false } // validate that the org id in the list valid := false for _, other := range query.Result { if other.OrgId == orgID { valid = true } } return valid } // swagger:route POST /user/using/{org_id} signed_in_user userSetUsingOrg // // Switch user context for signed in user. // // Switch user context to the given organization. // // Responses: // 200: okResponse // 400: badRequestError // 401: unauthorisedError // 403: forbiddenError // 500: internalServerError func (hs *HTTPServer) UserSetUsingOrg(c *models.ReqContext) response.Response { orgID, err := strconv.ParseInt(web.Params(c.Req)[":id"], 10, 64) if err != nil { return response.Error(http.StatusBadRequest, "id is invalid", err) } if !hs.validateUsingOrg(c.Req.Context(), c.UserID, orgID) { return response.Error(401, "Not a valid organization", nil) } cmd := models.SetUsingOrgCommand{UserId: c.UserID, OrgId: orgID} if err := hs.SQLStore.SetUsingOrg(c.Req.Context(), &cmd); err != nil { return response.Error(500, "Failed to change active organization", err) } return response.Success("Active organization changed") } // GET /profile/switch-org/:id func (hs *HTTPServer) ChangeActiveOrgAndRedirectToHome(c *models.ReqContext) { orgID, err := strconv.ParseInt(web.Params(c.Req)[":id"], 10, 64) if err != nil { c.JsonApiErr(http.StatusBadRequest, "id is invalid", err) return } if !hs.validateUsingOrg(c.Req.Context(), c.UserID, orgID) { hs.NotFoundHandler(c) } cmd := models.SetUsingOrgCommand{UserId: c.UserID, OrgId: orgID} if err := hs.SQLStore.SetUsingOrg(c.Req.Context(), &cmd); err != nil { hs.NotFoundHandler(c) } c.Redirect(hs.Cfg.AppSubURL + "/") } // swagger:route PUT /user/password signed_in_user changeUserPassword // // Change Password. // // Changes the password for the user. // // Security: // - basic: // // Responses: // 200: okResponse // 400: badRequestError // 401: unauthorisedError // 403: forbiddenError // 500: internalServerError func (hs *HTTPServer) ChangeUserPassword(c *models.ReqContext) response.Response { cmd := user.ChangeUserPasswordCommand{} if err := web.Bind(c.Req, &cmd); err != nil { return response.Error(http.StatusBadRequest, "bad request data", err) } userQuery := user.GetUserByIDQuery{ID: c.UserID} user, err := hs.userService.GetByID(c.Req.Context(), &userQuery) if err != nil { return response.Error(500, "Could not read user from database", err) } getAuthQuery := models.GetAuthInfoQuery{UserId: user.ID} if err := hs.authInfoService.GetAuthInfo(c.Req.Context(), &getAuthQuery); err == nil { authModule := getAuthQuery.Result.AuthModule if authModule == login.LDAPAuthModule || authModule == login.AuthProxyAuthModule { return response.Error(400, "Not allowed to reset password for LDAP or Auth Proxy user", nil) } } passwordHashed, err := util.EncodePassword(cmd.OldPassword, user.Salt) if err != nil { return response.Error(500, "Failed to encode password", err) } if passwordHashed != user.Password { return response.Error(401, "Invalid old password", nil) } password := models.Password(cmd.NewPassword) if password.IsWeak() { return response.Error(400, "New password is too short", nil) } cmd.UserID = c.UserID cmd.NewPassword, err = util.EncodePassword(cmd.NewPassword, user.Salt) if err != nil { return response.Error(500, "Failed to encode password", err) } if err := hs.userService.ChangePassword(c.Req.Context(), &cmd); err != nil { return response.Error(500, "Failed to change user password", err) } return response.Success("User password changed") } // redirectToChangePassword handles GET /.well-known/change-password. func redirectToChangePassword(c *models.ReqContext) { c.Redirect("/profile/password", 302) } // swagger:route PUT /user/helpflags/{flag_id} signed_in_user setHelpFlag // // Set user help flag. // // Responses: // 200: helpFlagResponse // 401: unauthorisedError // 403: forbiddenError // 500: internalServerError func (hs *HTTPServer) SetHelpFlag(c *models.ReqContext) response.Response { flag, err := strconv.ParseInt(web.Params(c.Req)[":id"], 10, 64) if err != nil { return response.Error(http.StatusBadRequest, "id is invalid", err) } bitmask := &c.HelpFlags1 bitmask.AddFlag(user.HelpFlags1(flag)) cmd := models.SetUserHelpFlagCommand{ UserId: c.UserID, HelpFlags1: *bitmask, } if err := hs.SQLStore.SetUserHelpFlag(c.Req.Context(), &cmd); err != nil { return response.Error(500, "Failed to update help flag", err) } return response.JSON(http.StatusOK, &util.DynMap{"message": "Help flag set", "helpFlags1": cmd.HelpFlags1}) } // swagger:route GET /user/helpflags/clear signed_in_user clearHelpFlags // // Clear user help flag. // // Responses: // 200: helpFlagResponse // 401: unauthorisedError // 403: forbiddenError // 500: internalServerError func (hs *HTTPServer) ClearHelpFlags(c *models.ReqContext) response.Response { cmd := models.SetUserHelpFlagCommand{ UserId: c.UserID, HelpFlags1: user.HelpFlags1(0), } if err := hs.SQLStore.SetUserHelpFlag(c.Req.Context(), &cmd); err != nil { return response.Error(500, "Failed to update help flag", err) } return response.JSON(http.StatusOK, &util.DynMap{"message": "Help flag set", "helpFlags1": cmd.HelpFlags1}) } // swagger:parameters searchUsers type SearchUsersParams struct { // Limit the maximum number of users to return per page // in:query // required:false // default:1000 Limit int64 `json:"perpage"` // Page index for starting fetching users // in:query // required:false // default:1 Page int64 `json:"page"` } // swagger:parameters searchUsersWithPaging type SearchUsersWithPagingParams struct { // Limit the maximum number of users to return per page // in:query // required:false // default:1000 Limit int64 `json:"perpage"` // Page index for starting fetching users // in:query // required:false // default:1 Page int64 `json:"page"` // Query allows return results where the query value is contained in one of the name, login or email fields. Query values with spaces need to be URL encoded e.g. query=Jane%20Doe // in:query // required:false Query string `json:"query"` } // swagger:parameters updateSignedInUser type UpdateSignedInUserParams struct { // To change the email, name, login, theme, provide another one. // in:body // required:true Body models.UpdateUserCommand `json:"body"` } // swagger:parameters userSetUsingOrg type UserSetUsingOrgParams struct { // in:path // required:true OrgID int64 `json:"org_id"` } // swagger:parameters setHelpFlag type SetHelpFlagParams struct { // in:path // required:true FlagID string `json:"flag_id"` } // swagger:parameters changeUserPassword type ChangeUserPasswordParams struct { // To change the email, name, login, theme, provide another one. // in:body // required:true Body models.ChangeUserPasswordCommand `json:"body"` } // swagger:parameters getUserByID type GetUserByIDParams struct { // in:path // required:true UserID int64 `json:"user_id"` } // swagger:parameters getUserOrgList type GetUserOrgListParams struct { // in:path // required:true UserID int64 `json:"user_id"` } // swagger:parameters getUserTeams type GetUserTeamsParams struct { // in:path // required:true UserID int64 `json:"user_id"` } // swagger:parameters getUserByLoginOrEmail type GetUserByLoginOrEmailParams struct { // loginOrEmail of the user // in:query // required:true LoginOrEmail string `json:"loginOrEmail"` } // swagger:parameters updateUser type UpdateUserParams struct { // To change the email, name, login, theme, provide another one. // in:body // required:true Body models.UpdateUserCommand `json:"body"` // in:path // required:true UserID int64 `json:"user_id"` } // swagger:response searchUsersResponse type SearchUsersResponse struct { // The response message // in: body Body models.SearchUserQueryResult `json:"body"` } // swagger:response userResponse type UserResponse struct { // The response message // in: body Body models.UserProfileDTO `json:"body"` } // swagger:response getUserOrgListResponse type GetUserOrgListResponse struct { // The response message // in: body Body []*models.UserOrgDTO `json:"body"` } // swagger:response getSignedInUserOrgListResponse type GetSignedInUserOrgListResponse struct { // The response message // in: body Body []*models.UserOrgDTO `json:"body"` } // swagger:response getUserTeamsResponse type GetUserTeamsResponse struct { // The response message // in: body Body []*models.TeamDTO `json:"body"` } // swagger:response getSignedInUserTeamListResponse type GetSignedInUserTeamListResponse struct { // The response message // in: body Body []*models.TeamDTO `json:"body"` } // swagger:response helpFlagResponse type HelpFlagResponse struct { // The response message // in: body Body struct { HelpFlags1 int64 `json:"helpFlags1"` Message string `json:"message"` } `json:"body"` }