2016-11-17 23:57:46 +00:00
|
|
|
package server
|
|
|
|
|
|
|
|
import (
|
2017-03-10 19:24:48 +00:00
|
|
|
"encoding/json"
|
2016-11-17 23:57:46 +00:00
|
|
|
"fmt"
|
|
|
|
"net/http"
|
2017-10-09 22:19:46 +00:00
|
|
|
"sort"
|
2017-10-18 18:17:42 +00:00
|
|
|
"strconv"
|
2016-11-17 23:57:46 +00:00
|
|
|
|
2017-03-10 19:24:48 +00:00
|
|
|
"github.com/bouk/httprouter"
|
2016-11-17 23:57:46 +00:00
|
|
|
"github.com/influxdata/chronograf"
|
|
|
|
)
|
|
|
|
|
2017-10-09 21:16:24 +00:00
|
|
|
type userRequest struct {
|
2017-10-16 23:26:08 +00:00
|
|
|
ID uint64 `json:"id,string"`
|
|
|
|
Name string `json:"name"`
|
|
|
|
Provider string `json:"provider"`
|
|
|
|
Scheme string `json:"scheme"`
|
|
|
|
Roles []chronograf.Role `json:"roles"`
|
2017-02-15 22:28:17 +00:00
|
|
|
}
|
|
|
|
|
2017-10-09 21:16:24 +00:00
|
|
|
func (r *userRequest) ValidCreate() error {
|
|
|
|
if r.Name == "" {
|
2017-10-10 21:21:43 +00:00
|
|
|
return fmt.Errorf("Name required on Chronograf User request body")
|
2017-03-10 19:24:48 +00:00
|
|
|
}
|
2017-10-09 21:16:24 +00:00
|
|
|
if r.Provider == "" {
|
2017-10-10 21:21:43 +00:00
|
|
|
return fmt.Errorf("Provider required on Chronograf User request body")
|
2017-03-10 19:24:48 +00:00
|
|
|
}
|
2017-10-09 21:16:24 +00:00
|
|
|
if r.Scheme == "" {
|
2017-10-10 21:21:43 +00:00
|
|
|
return fmt.Errorf("Scheme required on Chronograf User request body")
|
2017-03-10 19:24:48 +00:00
|
|
|
}
|
2017-10-19 18:17:40 +00:00
|
|
|
|
|
|
|
// TODO: This Scheme value is hard-coded temporarily since we only currently
|
|
|
|
// support OAuth2. This hard-coding should be removed whenever we add
|
|
|
|
// support for other authentication schemes.
|
|
|
|
r.Scheme = "OAuth2"
|
2017-10-13 19:34:30 +00:00
|
|
|
return r.ValidRoles()
|
2017-10-09 21:16:24 +00:00
|
|
|
}
|
2017-03-10 19:24:48 +00:00
|
|
|
|
2017-10-10 21:19:28 +00:00
|
|
|
// TODO: Provide detailed error message
|
|
|
|
// TODO: Reconsider what fields should actually be updateable once this is more robust
|
2017-10-09 21:16:24 +00:00
|
|
|
func (r *userRequest) ValidUpdate() error {
|
2017-10-13 00:42:30 +00:00
|
|
|
if r.Name == "" && r.Provider == "" && r.Scheme == "" && r.Roles == nil {
|
2017-10-10 21:21:43 +00:00
|
|
|
return fmt.Errorf("No fields to update")
|
2017-02-15 22:28:17 +00:00
|
|
|
}
|
2017-10-13 19:34:30 +00:00
|
|
|
return r.ValidRoles()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (r *userRequest) ValidRoles() error {
|
2017-10-16 18:58:16 +00:00
|
|
|
if len(r.Roles) > 0 {
|
2017-10-13 19:34:30 +00:00
|
|
|
for _, r := range r.Roles {
|
2017-10-16 23:26:08 +00:00
|
|
|
switch r.Name {
|
|
|
|
// TODO: add SuperAdmin
|
2017-10-16 23:33:57 +00:00
|
|
|
case ViewerRoleName, EditorRoleName, AdminRoleName:
|
2017-10-16 23:26:08 +00:00
|
|
|
continue
|
|
|
|
default:
|
2017-10-17 00:42:57 +00:00
|
|
|
return fmt.Errorf("Unknown role %s. Valid roles are 'viewer', 'editor', 'admin', and 'superadmin'", r.Name)
|
2017-10-13 19:34:30 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2017-10-09 21:16:24 +00:00
|
|
|
return nil
|
2016-11-17 23:57:46 +00:00
|
|
|
}
|
|
|
|
|
2017-10-09 21:16:24 +00:00
|
|
|
type userResponse struct {
|
2017-10-16 23:26:08 +00:00
|
|
|
Links selfLinks `json:"links"`
|
|
|
|
ID uint64 `json:"id,string"`
|
|
|
|
Name string `json:"name"`
|
|
|
|
Provider string `json:"provider"`
|
|
|
|
Scheme string `json:"scheme"`
|
|
|
|
Roles []chronograf.Role `json:"roles"`
|
2017-10-09 21:16:24 +00:00
|
|
|
}
|
2017-03-10 19:24:48 +00:00
|
|
|
|
2017-10-09 21:16:24 +00:00
|
|
|
func newUserResponse(u *chronograf.User) *userResponse {
|
2017-10-16 23:26:08 +00:00
|
|
|
// This ensures that any user response with no roles returns an empty array instead of
|
|
|
|
// null when marshaled into JSON. That way, JavaScript doesn't need any guard on the
|
|
|
|
// key existing and it can simply be iterated over.
|
|
|
|
if u.Roles == nil {
|
|
|
|
u.Roles = []chronograf.Role{}
|
2017-10-13 19:34:30 +00:00
|
|
|
}
|
2017-10-09 21:16:24 +00:00
|
|
|
return &userResponse{
|
|
|
|
ID: u.ID,
|
|
|
|
Name: u.Name,
|
|
|
|
Provider: u.Provider,
|
|
|
|
Scheme: u.Scheme,
|
2017-10-16 23:26:08 +00:00
|
|
|
Roles: u.Roles,
|
2017-10-09 21:16:24 +00:00
|
|
|
Links: selfLinks{
|
2017-10-10 19:27:55 +00:00
|
|
|
Self: fmt.Sprintf("/chronograf/v1/users/%d", u.ID),
|
2017-10-09 21:16:24 +00:00
|
|
|
},
|
2017-03-10 19:24:48 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-10-09 22:03:50 +00:00
|
|
|
type usersResponse struct {
|
|
|
|
Links selfLinks `json:"links"`
|
|
|
|
Users []*userResponse `json:"users"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func newUsersResponse(users []chronograf.User) *usersResponse {
|
2017-10-10 18:30:57 +00:00
|
|
|
usersResp := make([]*userResponse, len(users))
|
2017-10-09 22:03:50 +00:00
|
|
|
for i, user := range users {
|
|
|
|
usersResp[i] = newUserResponse(&user)
|
|
|
|
}
|
2017-10-10 18:30:57 +00:00
|
|
|
sort.Slice(usersResp, func(i, j int) bool {
|
|
|
|
return usersResp[i].ID < usersResp[j].ID
|
|
|
|
})
|
2017-10-09 22:03:50 +00:00
|
|
|
return &usersResponse{
|
|
|
|
Users: usersResp,
|
|
|
|
Links: selfLinks{
|
|
|
|
Self: "/chronograf/v1/users",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-10-16 23:33:57 +00:00
|
|
|
// Chronograf User Roles
|
|
|
|
const (
|
2017-10-17 00:42:57 +00:00
|
|
|
ViewerRoleName = "viewer"
|
|
|
|
EditorRoleName = "editor"
|
|
|
|
AdminRoleName = "admin"
|
2017-10-16 23:33:57 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
|
|
|
// ViewerRole is the role for a user who can only perform READ operations on Dashboards, Rules, and Sources
|
|
|
|
ViewerRole = chronograf.Role{
|
|
|
|
Name: ViewerRoleName,
|
|
|
|
}
|
|
|
|
|
|
|
|
// EditorRole is the role for a user who can perform READ and WRITE operations on Dashboards, Rules, and Sources
|
|
|
|
EditorRole = chronograf.Role{
|
|
|
|
Name: EditorRoleName,
|
|
|
|
}
|
|
|
|
|
|
|
|
// AdminRole is the role for a user who can perform READ and WRITE operations on Dashboards, Rules, Sources, and Users
|
|
|
|
AdminRole = chronograf.Role{
|
|
|
|
Name: AdminRoleName,
|
|
|
|
}
|
|
|
|
)
|
|
|
|
|
2017-10-09 22:28:39 +00:00
|
|
|
// UserID retrieves a Chronograf user with ID from store
|
2017-10-09 21:16:24 +00:00
|
|
|
func (s *Service) UserID(w http.ResponseWriter, r *http.Request) {
|
2017-03-10 19:24:48 +00:00
|
|
|
ctx := r.Context()
|
2017-02-24 05:26:09 +00:00
|
|
|
|
2017-10-18 18:17:42 +00:00
|
|
|
idStr := httprouter.GetParamFromContext(ctx, "id")
|
|
|
|
id, err := strconv.ParseUint(idStr, 10, 64)
|
|
|
|
if err != nil {
|
|
|
|
Error(w, http.StatusBadRequest, fmt.Sprintf("invalid user id: %s", err.Error()), s.Logger)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
user, err := s.UsersStore.Get(ctx, chronograf.UserQuery{ID: &id})
|
2016-11-17 23:57:46 +00:00
|
|
|
if err != nil {
|
2017-10-09 21:16:24 +00:00
|
|
|
Error(w, http.StatusBadRequest, err.Error(), s.Logger)
|
2017-03-10 19:24:48 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-10-09 21:16:24 +00:00
|
|
|
res := newUserResponse(user)
|
|
|
|
encodeJSON(w, http.StatusOK, res, s.Logger)
|
2017-03-10 19:24:48 +00:00
|
|
|
}
|
|
|
|
|
2017-10-09 22:28:39 +00:00
|
|
|
// NewUser adds a new Chronograf user to store
|
2017-10-09 21:16:24 +00:00
|
|
|
func (s *Service) NewUser(w http.ResponseWriter, r *http.Request) {
|
2017-03-10 19:24:48 +00:00
|
|
|
var req userRequest
|
|
|
|
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
|
2017-10-09 21:16:24 +00:00
|
|
|
invalidJSON(w, s.Logger)
|
2016-11-17 23:57:46 +00:00
|
|
|
return
|
|
|
|
}
|
2017-02-17 19:37:00 +00:00
|
|
|
|
2017-10-09 21:16:24 +00:00
|
|
|
if err := req.ValidCreate(); err != nil {
|
|
|
|
invalidData(w, err, s.Logger)
|
2016-11-17 23:57:46 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-10-09 21:16:24 +00:00
|
|
|
ctx := r.Context()
|
2016-11-17 23:57:46 +00:00
|
|
|
user := &chronograf.User{
|
2017-10-09 21:16:24 +00:00
|
|
|
Name: req.Name,
|
|
|
|
Provider: req.Provider,
|
|
|
|
Scheme: req.Scheme,
|
2017-10-16 23:26:08 +00:00
|
|
|
Roles: req.Roles,
|
2017-03-10 19:24:48 +00:00
|
|
|
}
|
|
|
|
|
2017-10-09 21:16:24 +00:00
|
|
|
res, err := s.UsersStore.Add(ctx, user)
|
2016-11-17 23:57:46 +00:00
|
|
|
if err != nil {
|
2017-10-09 21:16:24 +00:00
|
|
|
Error(w, http.StatusBadRequest, err.Error(), s.Logger)
|
2016-11-17 23:57:46 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-10-09 21:16:24 +00:00
|
|
|
cu := newUserResponse(res)
|
2017-10-10 21:40:45 +00:00
|
|
|
location(w, cu.Links.Self)
|
2017-10-09 21:16:24 +00:00
|
|
|
encodeJSON(w, http.StatusCreated, cu, s.Logger)
|
2016-11-17 23:57:46 +00:00
|
|
|
}
|
2017-03-10 19:24:48 +00:00
|
|
|
|
2017-10-09 22:28:39 +00:00
|
|
|
// RemoveUser deletes a Chronograf user from store
|
2017-10-09 21:16:24 +00:00
|
|
|
func (s *Service) RemoveUser(w http.ResponseWriter, r *http.Request) {
|
|
|
|
ctx := r.Context()
|
2017-10-18 18:17:42 +00:00
|
|
|
idStr := httprouter.GetParamFromContext(ctx, "id")
|
|
|
|
id, err := strconv.ParseUint(idStr, 10, 64)
|
|
|
|
if err != nil {
|
|
|
|
Error(w, http.StatusBadRequest, fmt.Sprintf("invalid user id: %s", err.Error()), s.Logger)
|
|
|
|
return
|
|
|
|
}
|
2017-03-10 19:24:48 +00:00
|
|
|
|
2017-10-18 18:17:42 +00:00
|
|
|
u, err := s.UsersStore.Get(ctx, chronograf.UserQuery{ID: &id})
|
2017-03-10 19:24:48 +00:00
|
|
|
if err != nil {
|
2017-10-09 21:16:24 +00:00
|
|
|
Error(w, http.StatusNotFound, err.Error(), s.Logger)
|
2017-10-20 19:42:51 +00:00
|
|
|
return
|
2017-03-10 19:24:48 +00:00
|
|
|
}
|
2017-10-09 21:16:24 +00:00
|
|
|
if err := s.UsersStore.Delete(ctx, u); err != nil {
|
|
|
|
Error(w, http.StatusBadRequest, err.Error(), s.Logger)
|
2017-10-20 19:42:51 +00:00
|
|
|
return
|
2017-03-10 19:24:48 +00:00
|
|
|
}
|
|
|
|
|
2017-10-09 21:16:24 +00:00
|
|
|
w.WriteHeader(http.StatusNoContent)
|
2017-03-10 19:24:48 +00:00
|
|
|
}
|
|
|
|
|
2017-10-09 22:28:39 +00:00
|
|
|
// UpdateUser updates a Chronograf user in store
|
2017-10-09 21:16:24 +00:00
|
|
|
func (s *Service) UpdateUser(w http.ResponseWriter, r *http.Request) {
|
|
|
|
var req userRequest
|
|
|
|
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
|
|
|
|
invalidJSON(w, s.Logger)
|
|
|
|
return
|
2017-03-10 19:24:48 +00:00
|
|
|
}
|
|
|
|
|
2017-10-09 21:16:24 +00:00
|
|
|
if err := req.ValidUpdate(); err != nil {
|
|
|
|
invalidData(w, err, s.Logger)
|
|
|
|
return
|
2017-03-10 19:24:48 +00:00
|
|
|
}
|
|
|
|
|
2017-10-09 21:16:24 +00:00
|
|
|
ctx := r.Context()
|
2017-10-18 18:17:42 +00:00
|
|
|
idStr := httprouter.GetParamFromContext(ctx, "id")
|
|
|
|
id, err := strconv.ParseUint(idStr, 10, 64)
|
|
|
|
if err != nil {
|
|
|
|
Error(w, http.StatusBadRequest, fmt.Sprintf("invalid user id: %s", err.Error()), s.Logger)
|
|
|
|
return
|
|
|
|
}
|
2017-03-10 19:24:48 +00:00
|
|
|
|
2017-10-18 18:17:42 +00:00
|
|
|
u, err := s.UsersStore.Get(ctx, chronograf.UserQuery{ID: &id})
|
2017-10-09 21:16:24 +00:00
|
|
|
if err != nil {
|
|
|
|
Error(w, http.StatusNotFound, err.Error(), s.Logger)
|
2017-10-20 19:42:51 +00:00
|
|
|
return
|
2017-03-10 19:24:48 +00:00
|
|
|
}
|
|
|
|
|
2017-10-10 18:40:33 +00:00
|
|
|
if req.Name != "" {
|
|
|
|
u.Name = req.Name
|
|
|
|
}
|
|
|
|
if req.Provider != "" {
|
|
|
|
u.Provider = req.Provider
|
|
|
|
}
|
|
|
|
if req.Scheme != "" {
|
|
|
|
u.Scheme = req.Scheme
|
|
|
|
}
|
2017-10-13 00:42:30 +00:00
|
|
|
if req.Roles != nil {
|
2017-10-16 23:26:08 +00:00
|
|
|
u.Roles = req.Roles
|
2017-10-13 00:42:30 +00:00
|
|
|
}
|
2017-03-10 19:24:48 +00:00
|
|
|
|
2017-10-09 21:16:24 +00:00
|
|
|
err = s.UsersStore.Update(ctx, u)
|
|
|
|
if err != nil {
|
|
|
|
Error(w, http.StatusBadRequest, err.Error(), s.Logger)
|
|
|
|
return
|
2017-03-10 19:24:48 +00:00
|
|
|
}
|
|
|
|
|
2017-10-09 21:16:24 +00:00
|
|
|
cu := newUserResponse(u)
|
2017-10-10 21:40:45 +00:00
|
|
|
location(w, cu.Links.Self)
|
2017-10-09 21:16:24 +00:00
|
|
|
encodeJSON(w, http.StatusOK, cu, s.Logger)
|
2017-03-10 19:24:48 +00:00
|
|
|
}
|
2017-10-09 22:03:50 +00:00
|
|
|
|
2017-10-09 22:28:39 +00:00
|
|
|
// Users retrieves all Chronograf users from store
|
2017-10-09 22:03:50 +00:00
|
|
|
func (s *Service) Users(w http.ResponseWriter, r *http.Request) {
|
|
|
|
ctx := r.Context()
|
|
|
|
|
|
|
|
users, err := s.UsersStore.All(ctx)
|
|
|
|
if err != nil {
|
|
|
|
Error(w, http.StatusBadRequest, err.Error(), s.Logger)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
res := newUsersResponse(users)
|
|
|
|
encodeJSON(w, http.StatusOK, res, s.Logger)
|
|
|
|
}
|