mirror of
https://github.com/grafana/grafana.git
synced 2025-02-15 01:53:33 -06:00
* NewIA: Plugin nav config * progress * Progress * Things are working * Add monitoring node * Add alerts and incidents * added experiment with standalone page * Refactoring by adding a type for navtree root * First test working * More tests * more tests * Progress on richer config and sorting * Sort weight working * Path config * Improving logic for not including admin or cfg nodes, making it the last step so that enterprise can add admin nodes without having to worry about the section not existing * fixed index routes * removed file * Fixes * Fixing tests * Fixing more tests and adding support for weight config * Updates * Remove unused fake * More fixes * Minor tweak * Minor fix * Can now control position using sortweight even when existing items have no sortweight * Added tests for frontend standalone page logic * more tests * Remove unused fake and fixed lint issue * Moving reading settings to navtree impl package * remove nav_id setting prefix * Remove old test file * Fix trailing newline * Fixed bug with adding nil node * fixing lint issue * remove some code we have to rethink * move read settings to PrivideService and switch to util.SplitString
185 lines
6.6 KiB
Go
185 lines
6.6 KiB
Go
package navtreeimpl
|
|
|
|
import (
|
|
"github.com/grafana/grafana/pkg/models"
|
|
"github.com/grafana/grafana/pkg/plugins"
|
|
ac "github.com/grafana/grafana/pkg/services/accesscontrol"
|
|
"github.com/grafana/grafana/pkg/services/correlations"
|
|
"github.com/grafana/grafana/pkg/services/datasources"
|
|
"github.com/grafana/grafana/pkg/services/featuremgmt"
|
|
"github.com/grafana/grafana/pkg/services/navtree"
|
|
"github.com/grafana/grafana/pkg/services/org"
|
|
"github.com/grafana/grafana/pkg/services/serviceaccounts"
|
|
)
|
|
|
|
func (s *ServiceImpl) getOrgAdminNode(c *models.ReqContext) (*navtree.NavLink, error) {
|
|
var configNodes []*navtree.NavLink
|
|
|
|
hasAccess := ac.HasAccess(s.accessControl, c)
|
|
if hasAccess(ac.ReqOrgAdmin, datasources.ConfigurationPageAccess) {
|
|
configNodes = append(configNodes, &navtree.NavLink{
|
|
Text: "Data sources",
|
|
Icon: "database",
|
|
Description: "Add and configure data sources",
|
|
Id: "datasources",
|
|
Url: s.cfg.AppSubURL + "/datasources",
|
|
})
|
|
}
|
|
|
|
if s.features.IsEnabled(featuremgmt.FlagCorrelations) && hasAccess(ac.ReqOrgAdmin, correlations.ConfigurationPageAccess) {
|
|
configNodes = append(configNodes, &navtree.NavLink{
|
|
Text: "Correlations",
|
|
Icon: "gf-glue",
|
|
Description: "Add and configure correlations",
|
|
Id: "correlations",
|
|
Url: s.cfg.AppSubURL + "/datasources/correlations",
|
|
})
|
|
}
|
|
|
|
if hasAccess(ac.ReqOrgAdmin, ac.EvalPermission(ac.ActionOrgUsersRead)) {
|
|
configNodes = append(configNodes, &navtree.NavLink{
|
|
Text: "Users",
|
|
Id: "users",
|
|
Description: "Invite and assign roles to users",
|
|
Icon: "user",
|
|
Url: s.cfg.AppSubURL + "/org/users",
|
|
})
|
|
}
|
|
|
|
if hasAccess(s.ReqCanAdminTeams, ac.TeamsAccessEvaluator) {
|
|
configNodes = append(configNodes, &navtree.NavLink{
|
|
Text: "Teams",
|
|
Id: "teams",
|
|
Description: "Groups of users that have common dashboard and permission needs",
|
|
Icon: "users-alt",
|
|
Url: s.cfg.AppSubURL + "/org/teams",
|
|
})
|
|
}
|
|
|
|
// FIXME: while we don't have a permissions for listing plugins the legacy check has to stay as a default
|
|
if plugins.ReqCanAdminPlugins(s.cfg)(c) || hasAccess(plugins.ReqCanAdminPlugins(s.cfg), plugins.AdminAccessEvaluator) {
|
|
configNodes = append(configNodes, &navtree.NavLink{
|
|
Text: "Plugins",
|
|
Id: "plugins",
|
|
Description: "Extend the Grafana experience with plugins",
|
|
Icon: "plug",
|
|
Url: s.cfg.AppSubURL + "/plugins",
|
|
})
|
|
}
|
|
|
|
if hasAccess(ac.ReqOrgAdmin, ac.OrgPreferencesAccessEvaluator) {
|
|
configNodes = append(configNodes, &navtree.NavLink{
|
|
Text: "Preferences",
|
|
Id: "org-settings",
|
|
Description: "Manage preferences across an organization",
|
|
Icon: "sliders-v-alt",
|
|
Url: s.cfg.AppSubURL + "/org",
|
|
})
|
|
}
|
|
|
|
hideApiKeys, _, _ := s.kvStore.Get(c.Req.Context(), c.OrgID, "serviceaccounts", "hideApiKeys")
|
|
apiKeys, err := s.apiKeyService.GetAllAPIKeys(c.Req.Context(), c.OrgID)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
apiKeysHidden := hideApiKeys == "1" && len(apiKeys) == 0
|
|
if hasAccess(ac.ReqOrgAdmin, ac.ApiKeyAccessEvaluator) && !apiKeysHidden {
|
|
configNodes = append(configNodes, &navtree.NavLink{
|
|
Text: "API keys",
|
|
Id: "apikeys",
|
|
Description: "Manage and create API keys that are used to interact with Grafana HTTP APIs",
|
|
Icon: "key-skeleton-alt",
|
|
Url: s.cfg.AppSubURL + "/org/apikeys",
|
|
})
|
|
}
|
|
|
|
if enableServiceAccount(s, c) {
|
|
configNodes = append(configNodes, &navtree.NavLink{
|
|
Text: "Service accounts",
|
|
Id: "serviceaccounts",
|
|
Description: "Use service accounts to run automated workloads in Grafana",
|
|
Icon: "gf-service-account",
|
|
Url: s.cfg.AppSubURL + "/org/serviceaccounts",
|
|
})
|
|
}
|
|
|
|
configNode := &navtree.NavLink{
|
|
Id: navtree.NavIDCfg,
|
|
Text: "Configuration",
|
|
SubTitle: "Organization: " + c.OrgName,
|
|
Icon: "cog",
|
|
Section: navtree.NavSectionConfig,
|
|
SortWeight: navtree.WeightConfig,
|
|
Children: configNodes,
|
|
}
|
|
|
|
return configNode, nil
|
|
}
|
|
|
|
func (s *ServiceImpl) getServerAdminNode(c *models.ReqContext) *navtree.NavLink {
|
|
hasAccess := ac.HasAccess(s.accessControl, c)
|
|
hasGlobalAccess := ac.HasGlobalAccess(s.accessControl, s.accesscontrolService, c)
|
|
orgsAccessEvaluator := ac.EvalPermission(ac.ActionOrgsRead)
|
|
adminNavLinks := []*navtree.NavLink{}
|
|
|
|
if hasAccess(ac.ReqGrafanaAdmin, ac.EvalPermission(ac.ActionUsersRead, ac.ScopeGlobalUsersAll)) {
|
|
adminNavLinks = append(adminNavLinks, &navtree.NavLink{
|
|
Text: "Users", Description: "Manage and create users across the whole Grafana server", Id: "global-users", Url: s.cfg.AppSubURL + "/admin/users", Icon: "user",
|
|
})
|
|
}
|
|
|
|
if hasGlobalAccess(ac.ReqGrafanaAdmin, orgsAccessEvaluator) {
|
|
adminNavLinks = append(adminNavLinks, &navtree.NavLink{
|
|
Text: "Organizations", Description: "Isolated instances of Grafana running on the same server", Id: "global-orgs", Url: s.cfg.AppSubURL + "/admin/orgs", Icon: "building",
|
|
})
|
|
}
|
|
|
|
if hasAccess(ac.ReqGrafanaAdmin, ac.EvalPermission(ac.ActionSettingsRead)) {
|
|
adminNavLinks = append(adminNavLinks, &navtree.NavLink{
|
|
Text: "Settings", Description: "View the settings defined in your Grafana config", Id: "server-settings", Url: s.cfg.AppSubURL + "/admin/settings", Icon: "sliders-v-alt",
|
|
})
|
|
}
|
|
|
|
if hasAccess(ac.ReqGrafanaAdmin, ac.EvalPermission(ac.ActionSettingsRead)) && s.features.IsEnabled(featuremgmt.FlagStorage) {
|
|
adminNavLinks = append(adminNavLinks, &navtree.NavLink{
|
|
Text: "Storage",
|
|
Id: "storage",
|
|
Description: "Manage file storage",
|
|
Icon: "cube",
|
|
Url: s.cfg.AppSubURL + "/admin/storage",
|
|
})
|
|
}
|
|
|
|
if s.cfg.LDAPEnabled && hasAccess(ac.ReqGrafanaAdmin, ac.EvalPermission(ac.ActionLDAPStatusRead)) {
|
|
adminNavLinks = append(adminNavLinks, &navtree.NavLink{
|
|
Text: "LDAP", Id: "ldap", Url: s.cfg.AppSubURL + "/admin/ldap", Icon: "book",
|
|
})
|
|
}
|
|
|
|
adminNode := &navtree.NavLink{
|
|
Text: "Server admin",
|
|
Description: "Manage server-wide settings and access to resources such as organizations, users, and licenses",
|
|
Id: navtree.NavIDAdmin,
|
|
Icon: "shield",
|
|
SortWeight: navtree.WeightAdmin,
|
|
Section: navtree.NavSectionConfig,
|
|
Children: adminNavLinks,
|
|
}
|
|
|
|
if len(adminNavLinks) > 0 {
|
|
adminNode.Url = adminNavLinks[0].Url
|
|
}
|
|
|
|
return adminNode
|
|
}
|
|
|
|
func (s *ServiceImpl) ReqCanAdminTeams(c *models.ReqContext) bool {
|
|
return c.OrgRole == org.RoleAdmin || (s.cfg.EditorsCanAdmin && c.OrgRole == org.RoleEditor)
|
|
}
|
|
|
|
func enableServiceAccount(s *ServiceImpl, c *models.ReqContext) bool {
|
|
hasAccess := ac.HasAccess(s.accessControl, c)
|
|
return hasAccess(ac.ReqOrgAdmin, serviceaccounts.AccessEvaluator)
|
|
}
|