mirror of
https://github.com/grafana/grafana.git
synced 2024-11-23 09:26:43 -06:00
6c5a573772
* Chore: Move ReqContext to contexthandler service * Rename package to contextmodel * Generate ngalert files * Remove unused imports
404 lines
12 KiB
Go
404 lines
12 KiB
Go
package api
|
|
|
|
import (
|
|
"errors"
|
|
"net/http"
|
|
"strconv"
|
|
|
|
"github.com/grafana/grafana/pkg/api/dtos"
|
|
"github.com/grafana/grafana/pkg/api/response"
|
|
contextmodel "github.com/grafana/grafana/pkg/services/contexthandler/model"
|
|
"github.com/grafana/grafana/pkg/services/dashboards"
|
|
"github.com/grafana/grafana/pkg/services/org"
|
|
"github.com/grafana/grafana/pkg/services/team"
|
|
"github.com/grafana/grafana/pkg/util"
|
|
"github.com/grafana/grafana/pkg/web"
|
|
)
|
|
|
|
// swagger:route POST /teams teams createTeam
|
|
//
|
|
// Add Team.
|
|
//
|
|
// Responses:
|
|
// 200: createTeamResponse
|
|
// 401: unauthorisedError
|
|
// 403: forbiddenError
|
|
// 409: conflictError
|
|
// 500: internalServerError
|
|
func (hs *HTTPServer) CreateTeam(c *contextmodel.ReqContext) response.Response {
|
|
cmd := team.CreateTeamCommand{}
|
|
if err := web.Bind(c.Req, &cmd); err != nil {
|
|
return response.Error(http.StatusBadRequest, "bad request data", err)
|
|
}
|
|
accessControlEnabled := !hs.AccessControl.IsDisabled()
|
|
if !accessControlEnabled && c.OrgRole == org.RoleViewer {
|
|
return response.Error(403, "Not allowed to create team.", nil)
|
|
}
|
|
|
|
t, err := hs.teamService.CreateTeam(cmd.Name, cmd.Email, c.OrgID)
|
|
if err != nil {
|
|
if errors.Is(err, team.ErrTeamNameTaken) {
|
|
return response.Error(409, "Team name taken", err)
|
|
}
|
|
return response.Error(500, "Failed to create Team", err)
|
|
}
|
|
|
|
// Clear permission cache for the user who's created the team, so that new permissions are fetched for their next call
|
|
// Required for cases when caller wants to immediately interact with the newly created object
|
|
if !hs.AccessControl.IsDisabled() {
|
|
hs.accesscontrolService.ClearUserPermissionCache(c.SignedInUser)
|
|
}
|
|
|
|
if accessControlEnabled || (c.OrgRole == org.RoleEditor && hs.Cfg.EditorsCanAdmin) {
|
|
// if the request is authenticated using API tokens
|
|
// the SignedInUser is an empty struct therefore
|
|
// an additional check whether it is an actual user is required
|
|
if c.SignedInUser.IsRealUser() {
|
|
if err := addOrUpdateTeamMember(c.Req.Context(), hs.teamPermissionsService, c.SignedInUser.UserID, c.OrgID, t.ID, dashboards.PERMISSION_ADMIN.String()); err != nil {
|
|
c.Logger.Error("Could not add creator to team", "error", err)
|
|
}
|
|
} else {
|
|
c.Logger.Warn("Could not add creator to team because is not a real user")
|
|
}
|
|
}
|
|
return response.JSON(http.StatusOK, &util.DynMap{
|
|
"teamId": t.ID,
|
|
"message": "Team created",
|
|
})
|
|
}
|
|
|
|
// swagger:route PUT /teams/{team_id} teams updateTeam
|
|
//
|
|
// Update Team.
|
|
//
|
|
// Responses:
|
|
// 200: okResponse
|
|
// 401: unauthorisedError
|
|
// 403: forbiddenError
|
|
// 404: notFoundError
|
|
// 409: conflictError
|
|
// 500: internalServerError
|
|
func (hs *HTTPServer) UpdateTeam(c *contextmodel.ReqContext) response.Response {
|
|
cmd := team.UpdateTeamCommand{}
|
|
var err error
|
|
if err := web.Bind(c.Req, &cmd); err != nil {
|
|
return response.Error(http.StatusBadRequest, "bad request data", err)
|
|
}
|
|
cmd.OrgID = c.OrgID
|
|
cmd.ID, err = strconv.ParseInt(web.Params(c.Req)[":teamId"], 10, 64)
|
|
if err != nil {
|
|
return response.Error(http.StatusBadRequest, "teamId is invalid", err)
|
|
}
|
|
|
|
if hs.AccessControl.IsDisabled() {
|
|
if err := hs.teamGuardian.CanAdmin(c.Req.Context(), cmd.OrgID, cmd.ID, c.SignedInUser); err != nil {
|
|
return response.Error(403, "Not allowed to update team", err)
|
|
}
|
|
}
|
|
|
|
if err := hs.teamService.UpdateTeam(c.Req.Context(), &cmd); err != nil {
|
|
if errors.Is(err, team.ErrTeamNameTaken) {
|
|
return response.Error(400, "Team name taken", err)
|
|
}
|
|
return response.Error(500, "Failed to update Team", err)
|
|
}
|
|
|
|
return response.Success("Team updated")
|
|
}
|
|
|
|
// swagger:route DELETE /teams/{team_id} teams deleteTeamByID
|
|
//
|
|
// Delete Team By ID.
|
|
//
|
|
// Responses:
|
|
// 200: okResponse
|
|
// 401: unauthorisedError
|
|
// 403: forbiddenError
|
|
// 404: notFoundError
|
|
// 500: internalServerError
|
|
func (hs *HTTPServer) DeleteTeamByID(c *contextmodel.ReqContext) response.Response {
|
|
orgID := c.OrgID
|
|
teamID, err := strconv.ParseInt(web.Params(c.Req)[":teamId"], 10, 64)
|
|
if err != nil {
|
|
return response.Error(http.StatusBadRequest, "teamId is invalid", err)
|
|
}
|
|
user := c.SignedInUser
|
|
|
|
if hs.AccessControl.IsDisabled() {
|
|
if err := hs.teamGuardian.CanAdmin(c.Req.Context(), orgID, teamID, user); err != nil {
|
|
return response.Error(403, "Not allowed to delete team", err)
|
|
}
|
|
}
|
|
|
|
if err := hs.teamService.DeleteTeam(c.Req.Context(), &team.DeleteTeamCommand{OrgID: orgID, ID: teamID}); err != nil {
|
|
if errors.Is(err, team.ErrTeamNotFound) {
|
|
return response.Error(404, "Failed to delete Team. ID not found", nil)
|
|
}
|
|
return response.Error(500, "Failed to delete Team", err)
|
|
}
|
|
return response.Success("Team deleted")
|
|
}
|
|
|
|
// swagger:route GET /teams/search teams searchTeams
|
|
//
|
|
// Team Search With Paging.
|
|
//
|
|
// Responses:
|
|
// 200: searchTeamsResponse
|
|
// 401: unauthorisedError
|
|
// 403: forbiddenError
|
|
// 500: internalServerError
|
|
func (hs *HTTPServer) SearchTeams(c *contextmodel.ReqContext) response.Response {
|
|
perPage := c.QueryInt("perpage")
|
|
if perPage <= 0 {
|
|
perPage = 1000
|
|
}
|
|
page := c.QueryInt("page")
|
|
if page < 1 {
|
|
page = 1
|
|
}
|
|
|
|
// Using accesscontrol the filtering is done based on user permissions
|
|
userIDFilter := team.FilterIgnoreUser
|
|
if hs.AccessControl.IsDisabled() {
|
|
userIDFilter = userFilter(c)
|
|
}
|
|
|
|
query := team.SearchTeamsQuery{
|
|
OrgID: c.OrgID,
|
|
Query: c.Query("query"),
|
|
Name: c.Query("name"),
|
|
UserIDFilter: userIDFilter,
|
|
Page: page,
|
|
Limit: perPage,
|
|
SignedInUser: c.SignedInUser,
|
|
HiddenUsers: hs.Cfg.HiddenUsers,
|
|
}
|
|
|
|
queryResult, err := hs.teamService.SearchTeams(c.Req.Context(), &query)
|
|
if err != nil {
|
|
return response.Error(500, "Failed to search Teams", err)
|
|
}
|
|
|
|
teamIDs := map[string]bool{}
|
|
for _, team := range queryResult.Teams {
|
|
team.AvatarURL = dtos.GetGravatarUrlWithDefault(team.Email, team.Name)
|
|
teamIDs[strconv.FormatInt(team.ID, 10)] = true
|
|
}
|
|
|
|
metadata := hs.getMultiAccessControlMetadata(c, c.OrgID, "teams:id:", teamIDs)
|
|
if len(metadata) > 0 {
|
|
for _, team := range queryResult.Teams {
|
|
team.AccessControl = metadata[strconv.FormatInt(team.ID, 10)]
|
|
}
|
|
}
|
|
|
|
queryResult.Page = page
|
|
queryResult.PerPage = perPage
|
|
|
|
return response.JSON(http.StatusOK, queryResult)
|
|
}
|
|
|
|
// UserFilter returns the user ID used in a filter when querying a team
|
|
// 1. If the user is a viewer or editor, this will return the user's ID.
|
|
// 2. If the user is an admin, this will return models.FilterIgnoreUser (0)
|
|
func userFilter(c *contextmodel.ReqContext) int64 {
|
|
userIdFilter := c.SignedInUser.UserID
|
|
if c.OrgRole == org.RoleAdmin {
|
|
userIdFilter = team.FilterIgnoreUser
|
|
}
|
|
return userIdFilter
|
|
}
|
|
|
|
// swagger:route GET /teams/{team_id} teams getTeamByID
|
|
//
|
|
// Get Team By ID.
|
|
//
|
|
// Responses:
|
|
// 200: getTeamByIDResponse
|
|
// 401: unauthorisedError
|
|
// 403: forbiddenError
|
|
// 404: notFoundError
|
|
// 500: internalServerError
|
|
func (hs *HTTPServer) GetTeamByID(c *contextmodel.ReqContext) response.Response {
|
|
teamId, err := strconv.ParseInt(web.Params(c.Req)[":teamId"], 10, 64)
|
|
if err != nil {
|
|
return response.Error(http.StatusBadRequest, "teamId is invalid", err)
|
|
}
|
|
|
|
// Using accesscontrol the filtering has already been performed at middleware layer
|
|
userIdFilter := team.FilterIgnoreUser
|
|
if hs.AccessControl.IsDisabled() {
|
|
userIdFilter = userFilter(c)
|
|
}
|
|
|
|
query := team.GetTeamByIDQuery{
|
|
OrgID: c.OrgID,
|
|
ID: teamId,
|
|
SignedInUser: c.SignedInUser,
|
|
HiddenUsers: hs.Cfg.HiddenUsers,
|
|
UserIdFilter: userIdFilter,
|
|
}
|
|
|
|
queryResult, err := hs.teamService.GetTeamByID(c.Req.Context(), &query)
|
|
if err != nil {
|
|
if errors.Is(err, team.ErrTeamNotFound) {
|
|
return response.Error(404, "Team not found", err)
|
|
}
|
|
|
|
return response.Error(500, "Failed to get Team", err)
|
|
}
|
|
|
|
// Add accesscontrol metadata
|
|
queryResult.AccessControl = hs.getAccessControlMetadata(c, c.OrgID, "teams:id:", strconv.FormatInt(queryResult.ID, 10))
|
|
|
|
queryResult.AvatarURL = dtos.GetGravatarUrlWithDefault(queryResult.Email, queryResult.Name)
|
|
return response.JSON(http.StatusOK, &queryResult)
|
|
}
|
|
|
|
// swagger:route GET /teams/{team_id}/preferences teams getTeamPreferences
|
|
//
|
|
// Get Team Preferences.
|
|
//
|
|
// Responses:
|
|
// 200: getPreferencesResponse
|
|
// 401: unauthorisedError
|
|
// 500: internalServerError
|
|
func (hs *HTTPServer) GetTeamPreferences(c *contextmodel.ReqContext) response.Response {
|
|
teamId, err := strconv.ParseInt(web.Params(c.Req)[":teamId"], 10, 64)
|
|
if err != nil {
|
|
return response.Error(http.StatusBadRequest, "teamId is invalid", err)
|
|
}
|
|
|
|
orgId := c.OrgID
|
|
|
|
if hs.AccessControl.IsDisabled() {
|
|
if err := hs.teamGuardian.CanAdmin(c.Req.Context(), orgId, teamId, c.SignedInUser); err != nil {
|
|
return response.Error(403, "Not allowed to view team preferences.", err)
|
|
}
|
|
}
|
|
|
|
return hs.getPreferencesFor(c.Req.Context(), orgId, 0, teamId)
|
|
}
|
|
|
|
// swagger:route PUT /teams/{team_id}/preferences teams updateTeamPreferences
|
|
//
|
|
// Update Team Preferences.
|
|
//
|
|
// Responses:
|
|
// 200: okResponse
|
|
// 400: badRequestError
|
|
// 401: unauthorisedError
|
|
// 500: internalServerError
|
|
func (hs *HTTPServer) UpdateTeamPreferences(c *contextmodel.ReqContext) response.Response {
|
|
dtoCmd := dtos.UpdatePrefsCmd{}
|
|
if err := web.Bind(c.Req, &dtoCmd); err != nil {
|
|
return response.Error(http.StatusBadRequest, "bad request data", err)
|
|
}
|
|
|
|
teamId, err := strconv.ParseInt(web.Params(c.Req)[":teamId"], 10, 64)
|
|
if err != nil {
|
|
return response.Error(http.StatusBadRequest, "teamId is invalid", err)
|
|
}
|
|
|
|
orgId := c.OrgID
|
|
|
|
if hs.AccessControl.IsDisabled() {
|
|
if err := hs.teamGuardian.CanAdmin(c.Req.Context(), orgId, teamId, c.SignedInUser); err != nil {
|
|
return response.Error(403, "Not allowed to update team preferences.", err)
|
|
}
|
|
}
|
|
|
|
return hs.updatePreferencesFor(c.Req.Context(), orgId, 0, teamId, &dtoCmd)
|
|
}
|
|
|
|
// swagger:parameters updateTeamPreferences
|
|
type UpdateTeamPreferencesParams struct {
|
|
// in:path
|
|
// required:true
|
|
TeamID string `json:"team_id"`
|
|
// in:body
|
|
// required:true
|
|
Body dtos.UpdatePrefsCmd `json:"body"`
|
|
}
|
|
|
|
// swagger:parameters getTeamByID
|
|
type GetTeamByIDParams struct {
|
|
// in:path
|
|
// required:true
|
|
TeamID string `json:"team_id"`
|
|
}
|
|
|
|
// swagger:parameters deleteTeamByID
|
|
type DeleteTeamByIDParams struct {
|
|
// in:path
|
|
// required:true
|
|
TeamID string `json:"team_id"`
|
|
}
|
|
|
|
// swagger:parameters getTeamPreferences
|
|
type GetTeamPreferencesParams struct {
|
|
// in:path
|
|
// required:true
|
|
TeamID string `json:"team_id"`
|
|
}
|
|
|
|
// swagger:parameters searchTeams
|
|
type SearchTeamsParams struct {
|
|
// in:query
|
|
// required:false
|
|
// default: 1
|
|
Page int `json:"page"`
|
|
// Number of items per page
|
|
// The totalCount field in the response can be used for pagination list E.g. if totalCount is equal to 100 teams and the perpage parameter is set to 10 then there are 10 pages of teams.
|
|
// in:query
|
|
// required:false
|
|
// default: 1000
|
|
PerPage int `json:"perpage"`
|
|
Name string `json:"name"`
|
|
// If set it will return results where the query value is contained in the name field. Query values with spaces need to be URL encoded.
|
|
// required:false
|
|
Query string `json:"query"`
|
|
}
|
|
|
|
// swagger:parameters createTeam
|
|
type CreateTeamParams struct {
|
|
// in:body
|
|
// required:true
|
|
Body team.CreateTeamCommand `json:"body"`
|
|
}
|
|
|
|
// swagger:parameters updateTeam
|
|
type UpdateTeamParams struct {
|
|
// in:body
|
|
// required:true
|
|
Body team.UpdateTeamCommand `json:"body"`
|
|
// in:path
|
|
// required:true
|
|
TeamID string `json:"team_id"`
|
|
}
|
|
|
|
// swagger:response searchTeamsResponse
|
|
type SearchTeamsResponse struct {
|
|
// The response message
|
|
// in: body
|
|
Body team.SearchTeamQueryResult `json:"body"`
|
|
}
|
|
|
|
// swagger:response getTeamByIDResponse
|
|
type GetTeamByIDResponse struct {
|
|
// The response message
|
|
// in: body
|
|
Body *team.TeamDTO `json:"body"`
|
|
}
|
|
|
|
// swagger:response createTeamResponse
|
|
type CreateTeamResponse struct {
|
|
// The response message
|
|
// in: body
|
|
Body struct {
|
|
TeamId int64 `json:"teamId"`
|
|
Message string `json:"message"`
|
|
} `json:"body"`
|
|
}
|