package folders import ( "context" "net/http" "k8s.io/apimachinery/pkg/runtime" "k8s.io/apiserver/pkg/registry/rest" folders "github.com/grafana/grafana/apps/folder/pkg/apis/folder/v1beta1" "github.com/grafana/grafana/pkg/apimachinery/identity" "github.com/grafana/grafana/pkg/services/accesscontrol" "github.com/grafana/grafana/pkg/services/apiserver/endpoints/request" "github.com/grafana/grafana/pkg/services/dashboards" "github.com/grafana/grafana/pkg/services/folder" ) type subAccessREST struct { service folder.Service ac accesscontrol.AccessControl } var _ = rest.Connecter(&subAccessREST{}) var _ = rest.StorageMetadata(&subAccessREST{}) func (r *subAccessREST) New() runtime.Object { return &folders.FolderAccessInfo{} } func (r *subAccessREST) Destroy() { } func (r *subAccessREST) ConnectMethods() []string { return []string{"GET"} } func (r *subAccessREST) ProducesMIMETypes(verb string) []string { return nil } func (r *subAccessREST) ProducesObject(verb string) interface{} { return &folders.FolderAccessInfo{} } func (r *subAccessREST) NewConnectOptions() (runtime.Object, bool, string) { return nil, false, "" // true means you can use the trailing path as a variable } func (r *subAccessREST) Connect(ctx context.Context, name string, opts runtime.Object, responder rest.Responder) (http.Handler, error) { ns, err := request.NamespaceInfoFrom(ctx, true) if err != nil { return nil, err } user, err := identity.GetRequester(ctx) if err != nil { return nil, err } // Can view is managed here (and in the Authorizer) f, err := r.service.Get(ctx, &folder.GetFolderQuery{ UID: &name, OrgID: ns.OrgID, SignedInUser: user, }) if err != nil { return nil, err } return http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) { access := &folders.FolderAccessInfo{} canEditEvaluator := accesscontrol.EvalPermission(dashboards.ActionFoldersWrite, dashboards.ScopeFoldersProvider.GetResourceScopeUID(f.UID)) access.CanEdit, _ = r.ac.Evaluate(ctx, user, canEditEvaluator) access.CanSave = access.CanEdit canAdminEvaluator := accesscontrol.EvalAll( accesscontrol.EvalPermission(dashboards.ActionFoldersPermissionsRead, dashboards.ScopeFoldersProvider.GetResourceScopeUID(f.UID)), accesscontrol.EvalPermission(dashboards.ActionFoldersPermissionsWrite, dashboards.ScopeFoldersProvider.GetResourceScopeUID(f.UID)), ) access.CanAdmin, _ = r.ac.Evaluate(ctx, user, canAdminEvaluator) canDeleteEvaluator := accesscontrol.EvalPermission(dashboards.ActionFoldersDelete, dashboards.ScopeFoldersProvider.GetResourceScopeUID(f.UID)) access.CanDelete, _ = r.ac.Evaluate(ctx, user, canDeleteEvaluator) responder.Object(http.StatusOK, access) }), nil }