mirror of
https://github.com/grafana/grafana.git
synced 2025-07-29 17:32:47 +08:00

* Load providers * Display providers * Rename * Remove redundant styles * Update Grid import * Return data in camelCase from the OAuth fb strategy * Update cards and remove empty state * Add comment * Add feature toggle * Update betterer * Add empty state * Fix configPath * Update betterer * Revert backend changes * Remove newline * Enable auth routes --------- Co-authored-by: Mihaly Gyongyosi <mgyongyosi@users.noreply.github.com>
160 lines
5.9 KiB
Go
160 lines
5.9 KiB
Go
package navtreeimpl
|
|
|
|
import (
|
|
ac "github.com/grafana/grafana/pkg/services/accesscontrol"
|
|
contextmodel "github.com/grafana/grafana/pkg/services/contexthandler/model"
|
|
"github.com/grafana/grafana/pkg/services/correlations"
|
|
"github.com/grafana/grafana/pkg/services/featuremgmt"
|
|
"github.com/grafana/grafana/pkg/services/navtree"
|
|
"github.com/grafana/grafana/pkg/services/pluginsintegration/pluginaccesscontrol"
|
|
"github.com/grafana/grafana/pkg/services/serviceaccounts"
|
|
)
|
|
|
|
func (s *ServiceImpl) getAdminNode(c *contextmodel.ReqContext) (*navtree.NavLink, error) {
|
|
var configNodes []*navtree.NavLink
|
|
ctx := c.Req.Context()
|
|
hasAccess := ac.HasAccess(s.accessControl, c)
|
|
hasGlobalAccess := ac.HasGlobalAccess(s.accessControl, s.accesscontrolService, c)
|
|
orgsAccessEvaluator := ac.EvalPermission(ac.ActionOrgsRead)
|
|
authConfigUIAvailable := s.license.FeatureEnabled("saml") || s.cfg.LDAPAuthEnabled
|
|
|
|
// FIXME: If plugin admin is disabled or externally managed, server admins still need to access the page, this is why
|
|
// while we don't have a permissions for listing plugins the legacy check has to stay as a default
|
|
if pluginaccesscontrol.ReqCanAdminPlugins(s.cfg)(c) || hasAccess(pluginaccesscontrol.AdminAccessEvaluator) {
|
|
configNodes = append(configNodes, &navtree.NavLink{
|
|
Text: "Plugins",
|
|
Id: "plugins",
|
|
SubTitle: "Extend the Grafana experience with plugins",
|
|
Icon: "plug",
|
|
Url: s.cfg.AppSubURL + "/plugins",
|
|
})
|
|
}
|
|
|
|
if hasAccess(ac.EvalAny(ac.EvalPermission(ac.ActionOrgUsersRead), ac.EvalPermission(ac.ActionUsersRead, ac.ScopeGlobalUsersAll))) {
|
|
configNodes = append(configNodes, &navtree.NavLink{
|
|
Text: "Users", SubTitle: "Manage users in Grafana", Id: "global-users", Url: s.cfg.AppSubURL + "/admin/users", Icon: "user",
|
|
})
|
|
}
|
|
|
|
if hasAccess(ac.TeamsAccessEvaluator) {
|
|
configNodes = append(configNodes, &navtree.NavLink{
|
|
Text: "Teams",
|
|
Id: "teams",
|
|
SubTitle: "Groups of users that have common dashboard and permission needs",
|
|
Icon: "users-alt",
|
|
Url: s.cfg.AppSubURL + "/org/teams",
|
|
})
|
|
}
|
|
|
|
if enableServiceAccount(s, c) {
|
|
configNodes = append(configNodes, &navtree.NavLink{
|
|
Text: "Service accounts",
|
|
Id: "serviceaccounts",
|
|
SubTitle: "Use service accounts to run automated workloads in Grafana",
|
|
Icon: "gf-service-account",
|
|
Url: s.cfg.AppSubURL + "/org/serviceaccounts",
|
|
})
|
|
}
|
|
|
|
disabled, err := s.apiKeyService.IsDisabled(ctx, c.SignedInUser.GetOrgID())
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if hasAccess(ac.ApiKeyAccessEvaluator) && !disabled {
|
|
configNodes = append(configNodes, &navtree.NavLink{
|
|
Text: "API keys",
|
|
Id: "apikeys",
|
|
SubTitle: "Manage and create API keys that are used to interact with Grafana HTTP APIs",
|
|
Icon: "key-skeleton-alt",
|
|
Url: s.cfg.AppSubURL + "/org/apikeys",
|
|
})
|
|
}
|
|
|
|
if hasAccess(ac.OrgPreferencesAccessEvaluator) {
|
|
configNodes = append(configNodes, &navtree.NavLink{
|
|
Text: "Default preferences",
|
|
Id: "org-settings",
|
|
SubTitle: "Manage preferences across an organization",
|
|
Icon: "sliders-v-alt",
|
|
Url: s.cfg.AppSubURL + "/org",
|
|
})
|
|
}
|
|
|
|
if (authConfigUIAvailable && hasAccess(evalAuthenticationSettings())) || s.features.IsEnabled(ctx, featuremgmt.FlagSsoSettingsApi) {
|
|
configNodes = append(configNodes, &navtree.NavLink{
|
|
Text: "Authentication",
|
|
Id: "authentication",
|
|
SubTitle: "Manage your auth settings and configure single sign-on",
|
|
Icon: "signin",
|
|
Url: s.cfg.AppSubURL + "/admin/authentication",
|
|
})
|
|
}
|
|
|
|
if hasAccess(ac.EvalPermission(ac.ActionSettingsRead, ac.ScopeSettingsAll)) {
|
|
configNodes = append(configNodes, &navtree.NavLink{
|
|
Text: "Settings", SubTitle: "View the settings defined in your Grafana config", Id: "server-settings", Url: s.cfg.AppSubURL + "/admin/settings", Icon: "sliders-v-alt",
|
|
})
|
|
}
|
|
|
|
if hasGlobalAccess(orgsAccessEvaluator) {
|
|
configNodes = append(configNodes, &navtree.NavLink{
|
|
Text: "Organizations", SubTitle: "Isolated instances of Grafana running on the same server", Id: "global-orgs", Url: s.cfg.AppSubURL + "/admin/orgs", Icon: "building",
|
|
})
|
|
}
|
|
|
|
if s.features.IsEnabled(ctx, featuremgmt.FlagFeatureToggleAdminPage) && hasAccess(ac.EvalPermission(ac.ActionFeatureManagementRead)) {
|
|
configNodes = append(configNodes, &navtree.NavLink{
|
|
Text: "Feature Toggles",
|
|
SubTitle: "View and edit feature toggles",
|
|
Id: "feature-toggles",
|
|
Url: s.cfg.AppSubURL + "/admin/featuretoggles",
|
|
Icon: "toggle-on",
|
|
})
|
|
}
|
|
|
|
if s.features.IsEnabled(ctx, featuremgmt.FlagCorrelations) && hasAccess(correlations.ConfigurationPageAccess) {
|
|
configNodes = append(configNodes, &navtree.NavLink{
|
|
Text: "Correlations",
|
|
Icon: "gf-glue",
|
|
SubTitle: "Add and configure correlations",
|
|
Id: "correlations",
|
|
Url: s.cfg.AppSubURL + "/datasources/correlations",
|
|
})
|
|
}
|
|
|
|
if hasAccess(ac.EvalPermission(ac.ActionSettingsRead, ac.ScopeSettingsAll)) && s.features.IsEnabled(ctx, featuremgmt.FlagStorage) {
|
|
storage := &navtree.NavLink{
|
|
Text: "Storage",
|
|
Id: "storage",
|
|
SubTitle: "Manage file storage",
|
|
Icon: "cube",
|
|
Url: s.cfg.AppSubURL + "/admin/storage",
|
|
}
|
|
configNodes = append(configNodes, storage)
|
|
}
|
|
|
|
configNode := &navtree.NavLink{
|
|
Id: navtree.NavIDCfg,
|
|
Text: "Administration",
|
|
SubTitle: "Organization: " + c.SignedInUser.GetOrgName(),
|
|
Icon: "cog",
|
|
SortWeight: navtree.WeightConfig,
|
|
Children: configNodes,
|
|
Url: "/admin",
|
|
}
|
|
|
|
return configNode, nil
|
|
}
|
|
|
|
func enableServiceAccount(s *ServiceImpl, c *contextmodel.ReqContext) bool {
|
|
hasAccess := ac.HasAccess(s.accessControl, c)
|
|
return hasAccess(serviceaccounts.AccessEvaluator)
|
|
}
|
|
|
|
func evalAuthenticationSettings() ac.Evaluator {
|
|
return ac.EvalAny(ac.EvalAll(
|
|
ac.EvalPermission(ac.ActionSettingsWrite, ac.ScopeSettingsSAML),
|
|
ac.EvalPermission(ac.ActionSettingsRead, ac.ScopeSettingsSAML),
|
|
), ac.EvalPermission(ac.ActionLDAPStatusRead))
|
|
}
|