2018-01-29 20:51:01 +08:00
package api
import (
2020-07-23 14:15:47 +08:00
"errors"
2021-11-29 17:18:01 +08:00
"net/http"
2022-01-15 00:55:57 +08:00
"strconv"
2024-09-10 17:22:08 +08:00
2021-08-25 21:11:22 +08:00
"github.com/grafana/grafana/pkg/api/apierrors"
2018-01-29 20:51:01 +08:00
"github.com/grafana/grafana/pkg/api/dtos"
2021-01-15 21:43:20 +08:00
"github.com/grafana/grafana/pkg/api/response"
2024-09-25 14:56:15 +08:00
"github.com/grafana/grafana/pkg/api/routing"
2024-01-24 19:39:11 +08:00
"github.com/grafana/grafana/pkg/infra/metrics"
2023-01-30 22:19:42 +08:00
"github.com/grafana/grafana/pkg/services/accesscontrol"
2023-01-27 15:50:36 +08:00
contextmodel "github.com/grafana/grafana/pkg/services/contexthandler/model"
2022-06-22 16:29:26 +08:00
"github.com/grafana/grafana/pkg/services/dashboards"
2023-11-22 21:20:22 +08:00
"github.com/grafana/grafana/pkg/services/dashboards/dashboardaccess"
2022-11-10 22:06:52 +08:00
"github.com/grafana/grafana/pkg/services/featuremgmt"
2022-11-10 16:42:32 +08:00
"github.com/grafana/grafana/pkg/services/folder"
2023-02-02 00:32:05 +08:00
"github.com/grafana/grafana/pkg/services/libraryelements/model"
2023-01-23 20:09:09 +08:00
"github.com/grafana/grafana/pkg/services/search"
2023-08-25 00:10:58 +08:00
"github.com/grafana/grafana/pkg/util"
2021-10-11 20:30:59 +08:00
"github.com/grafana/grafana/pkg/web"
2018-01-29 20:51:01 +08:00
)
2023-09-08 15:43:41 +08:00
const REDACTED = "redacted"
2024-09-25 14:56:15 +08:00
func ( hs * HTTPServer ) registerFolderAPI ( apiRoute routing . RouteRegister , authorize func ( accesscontrol . Evaluator ) web . Handler ) {
// #TODO add back auth part
apiRoute . Group ( "/folders" , func ( folderRoute routing . RouteRegister ) {
2024-10-04 17:26:36 +08:00
idScope := dashboards . ScopeFoldersProvider . GetResourceScope ( accesscontrol . Parameter ( ":id" ) )
uidScope := dashboards . ScopeFoldersProvider . GetResourceScopeUID ( accesscontrol . Parameter ( ":uid" ) )
folderRoute . Get ( "/id/:id" , authorize ( accesscontrol . EvalPermission ( dashboards . ActionFoldersRead , idScope ) ) , routing . Wrap ( hs . GetFolderByID ) )
folderRoute . Group ( "/:uid" , func ( folderUidRoute routing . RouteRegister ) {
folderUidRoute . Group ( "/permissions" , func ( folderPermissionRoute routing . RouteRegister ) {
folderPermissionRoute . Get ( "/" , authorize ( accesscontrol . EvalPermission ( dashboards . ActionFoldersPermissionsRead , uidScope ) ) , routing . Wrap ( hs . GetFolderPermissionList ) )
folderPermissionRoute . Post ( "/" , authorize ( accesscontrol . EvalPermission ( dashboards . ActionFoldersPermissionsWrite , uidScope ) ) , routing . Wrap ( hs . UpdateFolderPermissions ) )
} )
} )
2025-01-23 22:25:03 +08:00
folderRoute . Post ( "/" , authorize ( accesscontrol . EvalPermission ( dashboards . ActionFoldersCreate ) ) , routing . Wrap ( hs . CreateFolder ) )
folderRoute . Get ( "/" , authorize ( accesscontrol . EvalPermission ( dashboards . ActionFoldersRead ) ) , routing . Wrap ( hs . GetFolders ) )
folderRoute . Group ( "/:uid" , func ( folderUidRoute routing . RouteRegister ) {
folderUidRoute . Put ( "/" , authorize ( accesscontrol . EvalPermission ( dashboards . ActionFoldersWrite , uidScope ) ) , routing . Wrap ( hs . UpdateFolder ) )
folderUidRoute . Delete ( "/" , authorize ( accesscontrol . EvalPermission ( dashboards . ActionFoldersDelete , uidScope ) ) , routing . Wrap ( hs . DeleteFolder ) )
folderUidRoute . Get ( "/" , authorize ( accesscontrol . EvalPermission ( dashboards . ActionFoldersRead , uidScope ) ) , routing . Wrap ( hs . GetFolderByUID ) )
folderUidRoute . Get ( "/counts" , authorize ( accesscontrol . EvalPermission ( dashboards . ActionFoldersRead , uidScope ) ) , routing . Wrap ( hs . GetFolderDescendantCounts ) )
folderUidRoute . Post ( "/move" , authorize ( accesscontrol . EvalPermission ( dashboards . ActionFoldersWrite , uidScope ) ) , routing . Wrap ( hs . MoveFolder ) )
} )
2024-09-25 14:56:15 +08:00
} )
}
2022-07-27 21:54:37 +08:00
// swagger:route GET /folders folders getFolders
//
// Get all folders.
//
2024-03-07 18:07:35 +08:00
// It returns all folders that the authenticated user has permission to view.
2023-01-23 20:09:09 +08:00
// If nested folders are enabled, it expects an additional query parameter with the parent folder UID
2023-04-27 22:24:47 +08:00
// and returns the immediate subfolders that the authenticated user has permission to view.
// If the parameter is not supplied then it returns immediate subfolders under the root
// that the authenticated user has permission to view.
2022-07-27 21:54:37 +08:00
//
// Responses:
// 200: getFoldersResponse
// 401: unauthorisedError
// 403: forbiddenError
// 500: internalServerError
2023-01-27 15:50:36 +08:00
func ( hs * HTTPServer ) GetFolders ( c * contextmodel . ReqContext ) response . Response {
2024-03-15 20:05:27 +08:00
permission := dashboardaccess . PERMISSION_VIEW
if c . Query ( "permission" ) == "Edit" {
permission = dashboardaccess . PERMISSION_EDIT
}
2023-11-15 04:50:27 +08:00
if hs . Features . IsEnabled ( c . Req . Context ( ) , featuremgmt . FlagNestedFolders ) {
2024-01-16 19:35:10 +08:00
q := & folder . GetChildrenQuery {
2025-04-10 20:42:23 +08:00
OrgID : c . GetOrgID ( ) ,
2023-01-23 20:09:09 +08:00
Limit : c . QueryInt64 ( "limit" ) ,
Page : c . QueryInt64 ( "page" ) ,
2023-01-24 16:20:28 +08:00
UID : c . Query ( "parentUid" ) ,
2024-03-15 20:05:27 +08:00
Permission : permission ,
2023-01-23 20:09:09 +08:00
SignedInUser : c . SignedInUser ,
2024-01-16 19:35:10 +08:00
}
folders , err := hs . folderService . GetChildren ( c . Req . Context ( ) , q )
if err != nil {
return apierrors . ToFolderErrorResponse ( err )
}
hits := make ( [ ] dtos . FolderSearchHit , 0 )
for _ , f := range folders {
hits = append ( hits , dtos . FolderSearchHit {
2025-03-05 14:54:20 +08:00
ID : f . ID , // nolint:staticcheck
UID : f . UID ,
Title : f . Title ,
ParentUID : f . ParentUID ,
ManagedBy : f . ManagedBy ,
2024-01-16 19:35:10 +08:00
} )
2024-01-25 19:14:18 +08:00
metrics . MFolderIDsAPICount . WithLabelValues ( metrics . GetFolders ) . Inc ( )
2024-01-16 19:35:10 +08:00
}
return response . JSON ( http . StatusOK , hits )
2023-01-23 20:09:09 +08:00
}
2018-01-29 20:51:01 +08:00
2024-03-15 20:05:27 +08:00
hits , err := hs . searchFolders ( c , permission )
2018-01-29 20:51:01 +08:00
if err != nil {
2021-08-25 21:11:22 +08:00
return apierrors . ToFolderErrorResponse ( err )
2018-01-29 20:51:01 +08:00
}
2024-01-16 19:35:10 +08:00
return response . JSON ( http . StatusOK , hits )
2018-01-29 20:51:01 +08:00
}
2022-07-27 21:54:37 +08:00
// swagger:route GET /folders/{folder_uid} folders getFolderByUID
//
// Get folder by uid.
//
// Responses:
// 200: folderResponse
// 401: unauthorisedError
// 403: forbiddenError
// 404: notFoundError
// 500: internalServerError
2023-01-27 15:50:36 +08:00
func ( hs * HTTPServer ) GetFolderByUID ( c * contextmodel . ReqContext ) response . Response {
2022-11-11 21:28:24 +08:00
uid := web . Params ( c . Req ) [ ":uid" ]
2025-04-10 20:42:23 +08:00
folder , err := hs . folderService . Get ( c . Req . Context ( ) , & folder . GetFolderQuery { OrgID : c . GetOrgID ( ) , UID : & uid , SignedInUser : c . SignedInUser } )
2018-02-20 20:57:32 +08:00
if err != nil {
2021-08-25 21:11:22 +08:00
return apierrors . ToFolderErrorResponse ( err )
2018-01-29 20:51:01 +08:00
}
2023-09-08 15:43:41 +08:00
folderDTO , err := hs . newToFolderDto ( c , folder )
2022-12-15 22:34:17 +08:00
if err != nil {
return response . Err ( err )
}
2023-09-08 15:43:41 +08:00
return response . JSON ( http . StatusOK , folderDTO )
2018-02-20 20:57:32 +08:00
}
2018-01-29 20:51:01 +08:00
2022-07-27 21:54:37 +08:00
// swagger:route GET /folders/id/{folder_id} folders getFolderByID
//
// Get folder by id.
//
2023-04-25 15:33:47 +08:00
// Returns the folder identified by id. This is deprecated.
// Please refer to [updated API](#/folders/getFolderByUID) instead
//
// Deprecated: true
2022-07-27 21:54:37 +08:00
//
// Responses:
// 200: folderResponse
// 401: unauthorisedError
// 403: forbiddenError
// 404: notFoundError
// 500: internalServerError
2023-01-27 15:50:36 +08:00
func ( hs * HTTPServer ) GetFolderByID ( c * contextmodel . ReqContext ) response . Response {
2022-01-15 00:55:57 +08:00
id , err := strconv . ParseInt ( web . Params ( c . Req ) [ ":id" ] , 10 , 64 )
if err != nil {
return response . Error ( http . StatusBadRequest , "id is invalid" , err )
}
2024-01-25 19:14:18 +08:00
metrics . MFolderIDsAPICount . WithLabelValues ( metrics . GetFolderByID ) . Inc ( )
2023-11-15 23:30:00 +08:00
// nolint:staticcheck
2023-10-06 17:34:36 +08:00
folder , err := hs . folderService . Get ( c . Req . Context ( ) , & folder . GetFolderQuery { ID : & id , OrgID : c . SignedInUser . GetOrgID ( ) , SignedInUser : c . SignedInUser } )
2018-01-29 20:51:01 +08:00
if err != nil {
2021-08-25 21:11:22 +08:00
return apierrors . ToFolderErrorResponse ( err )
2018-01-29 20:51:01 +08:00
}
2023-09-08 15:43:41 +08:00
folderDTO , err := hs . newToFolderDto ( c , folder )
2022-12-15 22:34:17 +08:00
if err != nil {
return response . Err ( err )
}
2023-09-08 15:43:41 +08:00
return response . JSON ( http . StatusOK , folderDTO )
2018-02-20 20:57:32 +08:00
}
2018-01-29 20:51:01 +08:00
2022-07-27 21:54:37 +08:00
// swagger:route POST /folders folders createFolder
//
// Create folder.
//
2022-11-10 17:41:03 +08:00
// If nested folders are enabled then it additionally expects the parent folder UID.
//
2022-07-27 21:54:37 +08:00
// Responses:
// 200: folderResponse
// 400: badRequestError
// 401: unauthorisedError
// 403: forbiddenError
// 409: conflictError
// 500: internalServerError
2023-01-27 15:50:36 +08:00
func ( hs * HTTPServer ) CreateFolder ( c * contextmodel . ReqContext ) response . Response {
2022-11-10 17:41:03 +08:00
cmd := folder . CreateFolderCommand { }
2021-11-29 17:18:01 +08:00
if err := web . Bind ( c . Req , & cmd ) ; err != nil {
return response . Error ( http . StatusBadRequest , "bad request data" , err )
}
2025-04-10 20:42:23 +08:00
cmd . OrgID = c . GetOrgID ( )
2022-11-23 17:13:47 +08:00
cmd . SignedInUser = c . SignedInUser
2022-11-10 17:41:03 +08:00
folder , err := hs . folderService . Create ( c . Req . Context ( ) , & cmd )
2018-01-29 20:51:01 +08:00
if err != nil {
2021-08-25 21:11:22 +08:00
return apierrors . ToFolderErrorResponse ( err )
2018-01-29 20:51:01 +08:00
}
2023-09-08 15:43:41 +08:00
folderDTO , err := hs . newToFolderDto ( c , folder )
2022-12-15 22:34:17 +08:00
if err != nil {
return response . Err ( err )
}
2022-11-10 17:41:03 +08:00
// TODO set ParentUID if nested folders are enabled
2023-09-08 15:43:41 +08:00
return response . JSON ( http . StatusOK , folderDTO )
2018-01-29 20:51:01 +08:00
}
2023-03-30 16:46:11 +08:00
// swagger:route POST /folders/{folder_uid}/move folders moveFolder
//
// Move folder.
//
// Responses:
// 200: folderResponse
// 401: unauthorisedError
// 403: forbiddenError
// 404: notFoundError
// 500: internalServerError
2023-01-27 15:50:36 +08:00
func ( hs * HTTPServer ) MoveFolder ( c * contextmodel . ReqContext ) response . Response {
2023-11-15 04:50:27 +08:00
if hs . Features . IsEnabled ( c . Req . Context ( ) , featuremgmt . FlagNestedFolders ) {
2023-01-25 16:14:32 +08:00
cmd := folder . MoveFolderCommand { }
2022-11-10 22:06:52 +08:00
if err := web . Bind ( c . Req , & cmd ) ; err != nil {
return response . Error ( http . StatusBadRequest , "bad request data" , err )
}
var err error
2023-03-20 19:04:22 +08:00
2025-04-10 20:42:23 +08:00
cmd . OrgID = c . GetOrgID ( )
2023-03-30 16:46:11 +08:00
cmd . UID = web . Params ( c . Req ) [ ":uid" ]
cmd . SignedInUser = c . SignedInUser
theFolder , err := hs . folderService . Move ( c . Req . Context ( ) , & cmd )
if err != nil {
2023-10-24 15:04:45 +08:00
return response . ErrOrFallback ( http . StatusInternalServerError , "move folder failed" , err )
2022-11-10 22:06:52 +08:00
}
2023-03-30 16:46:11 +08:00
2023-09-08 15:43:41 +08:00
folderDTO , err := hs . newToFolderDto ( c , theFolder )
2023-03-30 16:46:11 +08:00
if err != nil {
return response . Err ( err )
}
2023-09-08 15:43:41 +08:00
return response . JSON ( http . StatusOK , folderDTO )
2022-11-10 22:06:52 +08:00
}
result := map [ string ] string { }
result [ "message" ] = "To use this service, you need to activate nested folder feature."
return response . JSON ( http . StatusNotFound , result )
}
2022-07-27 21:54:37 +08:00
// swagger:route PUT /folders/{folder_uid} folders updateFolder
//
// Update folder.
//
// Responses:
// 200: folderResponse
// 400: badRequestError
// 401: unauthorisedError
// 403: forbiddenError
// 404: notFoundError
// 409: conflictError
// 500: internalServerError
2023-01-27 15:50:36 +08:00
func ( hs * HTTPServer ) UpdateFolder ( c * contextmodel . ReqContext ) response . Response {
2022-12-20 21:00:33 +08:00
cmd := folder . UpdateFolderCommand { }
2021-11-29 17:18:01 +08:00
if err := web . Bind ( c . Req , & cmd ) ; err != nil {
return response . Error ( http . StatusBadRequest , "bad request data" , err )
}
2022-12-20 21:00:33 +08:00
2025-04-10 20:42:23 +08:00
cmd . OrgID = c . GetOrgID ( )
2022-12-20 21:00:33 +08:00
cmd . UID = web . Params ( c . Req ) [ ":uid" ]
cmd . SignedInUser = c . SignedInUser
result , err := hs . folderService . Update ( c . Req . Context ( ) , & cmd )
2018-01-29 20:51:01 +08:00
if err != nil {
2021-08-25 21:11:22 +08:00
return apierrors . ToFolderErrorResponse ( err )
2018-01-29 20:51:01 +08:00
}
2023-09-08 15:43:41 +08:00
folderDTO , err := hs . newToFolderDto ( c , result )
2022-12-15 22:34:17 +08:00
if err != nil {
return response . Err ( err )
}
2023-09-08 15:43:41 +08:00
return response . JSON ( http . StatusOK , folderDTO )
2018-01-29 20:51:01 +08:00
}
2022-07-27 21:54:37 +08:00
// swagger:route DELETE /folders/{folder_uid} folders deleteFolder
//
// Delete folder.
//
// Deletes an existing folder identified by UID along with all dashboards (and their alerts) stored in the folder. This operation cannot be reverted.
2022-11-10 17:41:03 +08:00
// If nested folders are enabled then it also deletes all the subfolders.
2022-07-27 21:54:37 +08:00
//
// Responses:
// 200: deleteFolderResponse
// 400: badRequestError
// 401: unauthorisedError
// 403: forbiddenError
// 404: notFoundError
// 500: internalServerError
2023-01-27 15:50:36 +08:00
func ( hs * HTTPServer ) DeleteFolder ( c * contextmodel . ReqContext ) response . Response { // temporarily adding this function to HTTPServer, will be removed from HTTPServer when librarypanels featuretoggle is removed
2021-10-11 20:30:59 +08:00
err := hs . LibraryElementService . DeleteLibraryElementsInFolder ( c . Req . Context ( ) , c . SignedInUser , web . Params ( c . Req ) [ ":uid" ] )
2021-05-12 14:48:17 +08:00
if err != nil {
2023-02-02 00:32:05 +08:00
if errors . Is ( err , model . ErrFolderHasConnectedLibraryElements ) {
2024-02-28 00:39:51 +08:00
return response . Error ( http . StatusForbidden , "Folder could not be deleted because it contains library elements in use" , err )
2021-03-02 17:34:01 +08:00
}
2021-08-25 21:11:22 +08:00
return apierrors . ToFolderErrorResponse ( err )
2021-03-02 17:34:01 +08:00
}
2023-07-25 19:05:53 +08:00
/ * TODO : after a decision regarding folder deletion permissions has been made
( https : //github.com/grafana/grafana-enterprise/issues/5144),
remove the previous call to hs . LibraryElementService . DeleteLibraryElementsInFolder
and remove "user" from the signature of DeleteInFolder in the folder RegistryService .
Context : https : //github.com/grafana/grafana/pull/69149#discussion_r1235057903
* /
2021-03-02 17:34:01 +08:00
2022-06-04 04:11:32 +08:00
uid := web . Params ( c . Req ) [ ":uid" ]
2025-04-10 20:42:23 +08:00
err = hs . folderService . Delete ( c . Req . Context ( ) , & folder . DeleteFolderCommand { UID : uid , OrgID : c . GetOrgID ( ) , ForceDeleteRules : c . QueryBool ( "forceDeleteRules" ) , SignedInUser : c . SignedInUser } )
2018-02-20 20:57:32 +08:00
if err != nil {
2021-08-25 21:11:22 +08:00
return apierrors . ToFolderErrorResponse ( err )
2018-01-29 20:51:01 +08:00
}
2023-08-25 00:10:58 +08:00
return response . JSON ( http . StatusOK , util . DynMap {
"message" : "Folder deleted" ,
} )
2018-01-29 20:51:01 +08:00
}
2023-04-27 23:00:09 +08:00
// swagger:route GET /folders/{folder_uid}/counts folders getFolderDescendantCounts
2023-04-24 21:57:28 +08:00
//
// Gets the count of each descendant of a folder by kind. The folder is identified by UID.
//
// Responses:
2023-04-27 23:00:09 +08:00
// 200: getFolderDescendantCountsResponse
2023-04-24 21:57:28 +08:00
// 401: unauthorisedError
// 403: forbiddenError
// 404: notFoundError
// 500: internalServerError
2023-04-27 23:00:09 +08:00
func ( hs * HTTPServer ) GetFolderDescendantCounts ( c * contextmodel . ReqContext ) response . Response {
2023-04-24 21:57:28 +08:00
uid := web . Params ( c . Req ) [ ":uid" ]
2025-04-10 20:42:23 +08:00
counts , err := hs . folderService . GetDescendantCounts ( c . Req . Context ( ) , & folder . GetDescendantCountsQuery { OrgID : c . GetOrgID ( ) , UID : & uid , SignedInUser : c . SignedInUser } )
2023-04-24 21:57:28 +08:00
if err != nil {
return apierrors . ToFolderErrorResponse ( err )
}
return response . JSON ( http . StatusOK , counts )
}
2023-09-08 15:43:41 +08:00
func ( hs * HTTPServer ) newToFolderDto ( c * contextmodel . ReqContext , f * folder . Folder ) ( dtos . Folder , error ) {
2023-04-25 16:22:20 +08:00
ctx := c . Req . Context ( )
2023-09-08 15:43:41 +08:00
toDTO := func ( f * folder . Folder , checkCanView bool ) ( dtos . Folder , error ) {
2025-06-05 17:02:07 +08:00
canEditEvaluator := accesscontrol . EvalPermission ( dashboards . ActionFoldersWrite , dashboards . ScopeFoldersProvider . GetResourceScopeUID ( f . UID ) )
2025-05-17 05:25:07 +08:00
canEdit , _ := hs . AccessControl . Evaluate ( ctx , c . SignedInUser , canEditEvaluator )
canSave := canEdit
canAdminEvaluator := accesscontrol . EvalAll (
accesscontrol . EvalPermission ( dashboards . ActionFoldersPermissionsRead , dashboards . ScopeFoldersProvider . GetResourceScopeUID ( f . UID ) ) ,
accesscontrol . EvalPermission ( dashboards . ActionFoldersPermissionsWrite , dashboards . ScopeFoldersProvider . GetResourceScopeUID ( f . UID ) ) ,
)
canAdmin , _ := hs . AccessControl . Evaluate ( ctx , c . SignedInUser , canAdminEvaluator )
2025-06-05 17:02:07 +08:00
canDeleteEvaluator := accesscontrol . EvalPermission ( dashboards . ActionFoldersDelete , dashboards . ScopeFoldersProvider . GetResourceScopeUID ( f . UID ) )
2025-05-17 05:25:07 +08:00
canDelete , _ := hs . AccessControl . Evaluate ( ctx , c . SignedInUser , canDeleteEvaluator )
2023-04-25 16:22:20 +08:00
// Finding creator and last updater of the folder
updater , creator := anonString , anonString
if f . CreatedBy > 0 {
2025-01-10 17:06:59 +08:00
creator = hs . getIdentityName ( ctx , f . OrgID , f . CreatedBy )
2023-04-25 16:22:20 +08:00
}
if f . UpdatedBy > 0 {
2025-01-10 17:06:59 +08:00
updater = hs . getIdentityName ( ctx , f . OrgID , f . UpdatedBy )
2023-04-25 16:22:20 +08:00
}
acMetadata , _ := hs . getFolderACMetadata ( c , f )
2023-09-08 15:43:41 +08:00
if checkCanView {
2025-06-05 17:02:07 +08:00
canViewEvaluator := accesscontrol . EvalPermission ( dashboards . ActionFoldersRead , dashboards . ScopeFoldersProvider . GetResourceScopeUID ( f . UID ) )
2025-05-17 05:25:07 +08:00
canView , _ := hs . AccessControl . Evaluate ( ctx , c . SignedInUser , canViewEvaluator )
2023-09-08 15:43:41 +08:00
if ! canView {
return dtos . Folder {
2023-12-07 20:15:58 +08:00
UID : REDACTED ,
2023-09-08 15:43:41 +08:00
Title : REDACTED ,
} , nil
}
}
2024-01-25 19:14:18 +08:00
metrics . MFolderIDsAPICount . WithLabelValues ( metrics . NewToFolderDTO ) . Inc ( )
2023-04-25 16:22:20 +08:00
return dtos . Folder {
2023-12-07 20:15:58 +08:00
ID : f . ID , // nolint:staticcheck
UID : f . UID ,
2025-01-29 10:13:26 +08:00
OrgID : f . OrgID ,
2023-04-25 16:22:20 +08:00
Title : f . Title ,
2023-12-07 20:15:58 +08:00
URL : f . URL ,
2023-04-25 16:22:20 +08:00
HasACL : f . HasACL ,
CanSave : canSave ,
CanEdit : canEdit ,
CanAdmin : canAdmin ,
CanDelete : canDelete ,
CreatedBy : creator ,
Created : f . Created ,
UpdatedBy : updater ,
Updated : f . Updated ,
Version : f . Version ,
AccessControl : acMetadata ,
ParentUID : f . ParentUID ,
2025-03-05 14:54:20 +08:00
ManagedBy : f . ManagedBy ,
2023-09-08 15:43:41 +08:00
} , nil
2023-04-25 16:22:20 +08:00
}
2023-04-24 21:57:28 +08:00
2023-09-08 15:43:41 +08:00
// no need to check view permission for the starting folder since it's already checked by the callers
folderDTO , err := toDTO ( f , false )
if err != nil {
return dtos . Folder { } , err
}
2022-11-10 17:41:03 +08:00
2023-11-15 04:50:27 +08:00
if ! hs . Features . IsEnabled ( c . Req . Context ( ) , featuremgmt . FlagNestedFolders ) {
2023-09-08 15:43:41 +08:00
return folderDTO , nil
2022-11-15 18:58:12 +08:00
}
2023-04-25 16:22:20 +08:00
parents , err := hs . folderService . GetParents ( ctx , folder . GetParentsQuery { UID : f . UID , OrgID : f . OrgID } )
if err != nil {
// log the error instead of failing
hs . log . Error ( "failed to fetch folder parents" , "folder" , f . UID , "org" , f . OrgID , "error" , err )
2022-11-15 18:58:12 +08:00
}
2022-11-10 17:41:03 +08:00
2023-04-25 16:22:20 +08:00
folderDTO . Parents = make ( [ ] dtos . Folder , 0 , len ( parents ) )
for _ , f := range parents {
2023-09-08 15:43:41 +08:00
DTO , err := toDTO ( f , true )
if err != nil {
hs . log . Error ( "failed to convert folder to DTO" , "folder" , f . UID , "org" , f . OrgID , "error" , err )
continue
}
folderDTO . Parents = append ( folderDTO . Parents , DTO )
2022-11-10 17:41:03 +08:00
}
2023-04-25 16:22:20 +08:00
2023-09-08 15:43:41 +08:00
return folderDTO , nil
2022-11-10 17:41:03 +08:00
}
2023-04-21 22:05:11 +08:00
func ( hs * HTTPServer ) getFolderACMetadata ( c * contextmodel . ReqContext , f * folder . Folder ) ( accesscontrol . Metadata , error ) {
2023-07-10 20:14:21 +08:00
if ! c . QueryBool ( "accesscontrol" ) {
2023-04-21 22:05:11 +08:00
return nil , nil
}
2025-04-10 20:42:23 +08:00
parents , err := hs . folderService . GetParents ( c . Req . Context ( ) , folder . GetParentsQuery { UID : f . UID , OrgID : c . GetOrgID ( ) } )
2023-04-21 22:05:11 +08:00
if err != nil {
return nil , err
}
folderIDs := map [ string ] bool { f . UID : true }
for _ , p := range parents {
folderIDs [ p . UID ] = true
}
2024-10-07 18:08:16 +08:00
allMetadata := getMultiAccessControlMetadata ( c , dashboards . ScopeFoldersPrefix , folderIDs )
2023-11-28 17:28:47 +08:00
metadata := map [ string ] bool { }
2023-04-21 22:05:11 +08:00
// Flatten metadata - if any parent has a permission, the child folder inherits it
for _ , md := range allMetadata {
for action := range md {
metadata [ action ] = true
}
}
return metadata , nil
}
2024-03-15 20:05:27 +08:00
func ( hs * HTTPServer ) searchFolders ( c * contextmodel . ReqContext , permission dashboardaccess . PermissionType ) ( [ ] dtos . FolderSearchHit , error ) {
2023-01-23 20:09:09 +08:00
searchQuery := search . Query {
SignedInUser : c . SignedInUser ,
DashboardIds : make ( [ ] int64 , 0 ) ,
2023-11-07 22:51:44 +08:00
FolderIds : make ( [ ] int64 , 0 ) , // nolint:staticcheck
2023-01-23 20:09:09 +08:00
Limit : c . QueryInt64 ( "limit" ) ,
2025-04-10 20:42:23 +08:00
OrgId : c . GetOrgID ( ) ,
2023-01-23 20:09:09 +08:00
Type : "dash-folder" ,
2024-03-15 20:05:27 +08:00
Permission : permission ,
2023-01-23 20:09:09 +08:00
Page : c . QueryInt64 ( "page" ) ,
}
2023-03-30 17:28:12 +08:00
hits , err := hs . SearchService . SearchHandler ( c . Req . Context ( ) , & searchQuery )
if err != nil {
2023-01-23 20:09:09 +08:00
return nil , err
}
2024-01-16 19:35:10 +08:00
folderHits := make ( [ ] dtos . FolderSearchHit , 0 )
2023-03-30 17:28:12 +08:00
for _ , hit := range hits {
2024-01-16 19:35:10 +08:00
folderHits = append ( folderHits , dtos . FolderSearchHit {
2023-11-21 04:44:51 +08:00
ID : hit . ID , // nolint:staticcheck
2023-01-23 20:09:09 +08:00
UID : hit . UID ,
Title : hit . Title ,
} )
2024-01-25 19:14:18 +08:00
metrics . MFolderIDsAPICount . WithLabelValues ( metrics . SearchFolders ) . Inc ( )
2023-01-23 20:09:09 +08:00
}
2024-01-16 19:35:10 +08:00
return folderHits , nil
2023-01-23 20:09:09 +08:00
}
2022-07-27 21:54:37 +08:00
// swagger:parameters getFolders
type GetFoldersParams struct {
// Limit the maximum number of folders to return
// in:query
// required:false
// default:1000
Limit int64 ` json:"limit" `
// Page index for starting fetching folders
// in:query
// required:false
// default:1
Page int64 ` json:"page" `
2022-12-19 16:52:04 +08:00
// The parent folder UID
// in:query
// required:false
2023-01-24 16:20:28 +08:00
ParentUID string ` json:"parentUid" `
2024-03-15 20:05:27 +08:00
// Set to `Edit` to return folders that the user can edit
// in:query
// required: false
// default:View
// Enum: Edit,View
Permission string ` json:"permission" `
2022-07-27 21:54:37 +08:00
}
// swagger:parameters getFolderByUID
type GetFolderByUIDParams struct {
// in:path
// required:true
FolderUID string ` json:"folder_uid" `
}
// swagger:parameters updateFolder
type UpdateFolderParams struct {
// in:path
// required:true
FolderUID string ` json:"folder_uid" `
// To change the unique identifier (uid), provide another one.
// To overwrite an existing folder with newer version, set `overwrite` to `true`.
// Provide the current version to safelly update the folder: if the provided version differs from the stored one the request will fail, unless `overwrite` is `true`.
//
// in:body
// required:true
2022-12-20 21:00:33 +08:00
Body folder . UpdateFolderCommand ` json:"body" `
2022-07-27 21:54:37 +08:00
}
// swagger:parameters getFolderByID
type GetFolderByIDParams struct {
// in:path
// required:true
2023-11-16 22:57:04 +08:00
//
// Deprecated: use FolderUID instead
2022-07-27 21:54:37 +08:00
FolderID int64 ` json:"folder_id" `
}
// swagger:parameters createFolder
type CreateFolderParams struct {
// in:body
// required:true
2022-11-10 17:41:03 +08:00
Body folder . CreateFolderCommand ` json:"body" `
2022-07-27 21:54:37 +08:00
}
2023-03-30 16:46:11 +08:00
// swagger:parameters moveFolder
type MoveFolderParams struct {
// in:path
// required:true
FolderUID string ` json:"folder_uid" `
// in:body
// required:true
Body folder . MoveFolderCommand ` json:"body" `
}
2022-07-27 21:54:37 +08:00
// swagger:parameters deleteFolder
type DeleteFolderParams struct {
// in:path
// required:true
FolderUID string ` json:"folder_uid" `
// If `true` any Grafana 8 Alerts under this folder will be deleted.
// Set to `false` so that the request will fail if the folder contains any Grafana 8 Alerts.
// in:query
// required:false
// default:false
ForceDeleteRules bool ` json:"forceDeleteRules" `
}
// swagger:response getFoldersResponse
type GetFoldersResponse struct {
// The response message
// in: body
Body [ ] dtos . FolderSearchHit ` json:"body" `
}
// swagger:response folderResponse
type FolderResponse struct {
// The response message
// in: body
Body dtos . Folder ` json:"body" `
}
// swagger:response deleteFolderResponse
type DeleteFolderResponse struct {
// The response message
// in: body
Body struct {
// ID Identifier of the deleted folder.
// required: true
// example: 65
ID int64 ` json:"id" `
// Title of the deleted folder.
// required: true
// example: My Folder
Title string ` json:"title" `
// Message Message of the deleted folder.
// required: true
// example: Folder My Folder deleted
Message string ` json:"message" `
} ` json:"body" `
}
2023-04-24 21:57:28 +08:00
2023-04-27 23:00:09 +08:00
// swagger:parameters getFolderDescendantCounts
type GetFolderDescendantCountsParams struct {
2023-04-24 21:57:28 +08:00
// in:path
// required:true
FolderUID string ` json:"folder_uid" `
}
2023-04-27 23:00:09 +08:00
// swagger:response getFolderDescendantCountsResponse
type GetFolderDescendantCountsResponse struct {
2023-04-24 21:57:28 +08:00
// The response message
// in: body
2023-04-27 23:00:09 +08:00
Body folder . DescendantCounts ` json:"body" `
2023-04-24 21:57:28 +08:00
}