2020-11-24 05:10:32 -06:00
package api
import (
2021-05-12 07:10:35 -05:00
"context"
2020-11-24 05:10:32 -06:00
"encoding/json"
2021-11-17 03:12:28 -06:00
"fmt"
2020-11-24 05:10:32 -06:00
"net/http"
2021-11-17 03:12:28 -06:00
"strings"
2020-11-24 05:10:32 -06:00
"testing"
2021-09-17 02:19:36 -05:00
"time"
2020-11-24 05:10:32 -06:00
2021-11-17 03:12:28 -06:00
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
2021-09-29 05:51:49 -05:00
2020-11-24 05:10:32 -06:00
"github.com/grafana/grafana/pkg/api/dtos"
2021-09-17 02:19:36 -05:00
"github.com/grafana/grafana/pkg/components/simplejson"
2020-11-24 05:10:32 -06:00
"github.com/grafana/grafana/pkg/models"
2021-09-17 02:19:36 -05:00
"github.com/grafana/grafana/pkg/services/accesscontrol"
2022-01-26 11:44:20 -06:00
"github.com/grafana/grafana/pkg/services/featuremgmt"
2022-08-10 04:56:48 -05:00
"github.com/grafana/grafana/pkg/services/org"
2021-05-12 07:10:35 -05:00
"github.com/grafana/grafana/pkg/services/sqlstore"
2022-02-03 02:20:20 -06:00
"github.com/grafana/grafana/pkg/services/sqlstore/mockstore"
2022-09-20 04:29:17 -05:00
"github.com/grafana/grafana/pkg/services/temp_user/tempuserimpl"
2022-06-28 07:32:25 -05:00
"github.com/grafana/grafana/pkg/services/user"
2022-08-16 09:08:59 -05:00
"github.com/grafana/grafana/pkg/services/user/userimpl"
2022-08-11 08:37:31 -05:00
"github.com/grafana/grafana/pkg/setting"
2021-11-17 03:12:28 -06:00
"github.com/grafana/grafana/pkg/util"
2020-11-24 05:10:32 -06:00
)
2021-05-12 07:10:35 -05:00
func setUpGetOrgUsersDB ( t * testing . T , sqlStore * sqlstore . SQLStore ) {
2022-06-07 08:49:18 -05:00
sqlStore . Cfg . AutoAssignOrg = true
sqlStore . Cfg . AutoAssignOrgId = int ( testOrgID )
2021-05-12 07:10:35 -05:00
2022-06-28 07:32:25 -05:00
_ , err := sqlStore . CreateUser ( context . Background ( ) , user . CreateUserCommand { Email : "testUser@grafana.com" , Login : testUserLogin } )
2021-05-12 07:10:35 -05:00
require . NoError ( t , err )
2022-06-28 07:32:25 -05:00
_ , err = sqlStore . CreateUser ( context . Background ( ) , user . CreateUserCommand { Email : "user1@grafana.com" , Login : "user1" } )
2021-05-12 07:10:35 -05:00
require . NoError ( t , err )
2022-06-28 07:32:25 -05:00
_ , err = sqlStore . CreateUser ( context . Background ( ) , user . CreateUserCommand { Email : "user2@grafana.com" , Login : "user2" } )
2021-05-12 07:10:35 -05:00
require . NoError ( t , err )
}
2020-11-24 05:10:32 -06:00
func TestOrgUsersAPIEndpoint_userLoggedIn ( t * testing . T ) {
2022-01-26 11:44:20 -06:00
hs := setupSimpleHTTPServer ( featuremgmt . WithFeatures ( ) )
settings := hs . Cfg
2020-11-24 05:10:32 -06:00
2021-05-12 07:10:35 -05:00
sqlStore := sqlstore . InitTestDB ( t )
2022-01-13 07:40:32 -06:00
sqlStore . Cfg = settings
2021-09-27 09:43:16 -05:00
hs . SQLStore = sqlStore
2022-02-03 02:20:20 -06:00
mock := mockstore . NewSQLStoreMock ( )
2022-01-14 10:55:57 -06:00
loggedInUserScenario ( t , "When calling GET on" , "api/org/users" , "api/org/users" , func ( sc * scenarioContext ) {
2021-09-17 02:19:36 -05:00
setUpGetOrgUsersDB ( t , sqlStore )
2020-11-24 05:10:32 -06:00
sc . handlerFunc = hs . GetOrgUsersForCurrentOrg
sc . fakeReqWithParams ( "GET" , sc . url , map [ string ] string { } ) . exec ( )
require . Equal ( t , http . StatusOK , sc . resp . Code )
var resp [ ] models . OrgUserDTO
err := json . Unmarshal ( sc . resp . Body . Bytes ( ) , & resp )
require . NoError ( t , err )
assert . Len ( t , resp , 3 )
2022-02-03 02:20:20 -06:00
} , mock )
2020-11-24 05:10:32 -06:00
2022-01-14 10:55:57 -06:00
loggedInUserScenario ( t , "When calling GET on" , "api/org/users/search" , "api/org/users/search" , func ( sc * scenarioContext ) {
2021-05-12 07:10:35 -05:00
setUpGetOrgUsersDB ( t , sqlStore )
2021-11-29 03:18:01 -06:00
sc . handlerFunc = hs . SearchOrgUsersWithPaging
2021-05-12 07:10:35 -05:00
sc . fakeReqWithParams ( "GET" , sc . url , map [ string ] string { } ) . exec ( )
require . Equal ( t , http . StatusOK , sc . resp . Code )
var resp models . SearchOrgUsersQueryResult
err := json . Unmarshal ( sc . resp . Body . Bytes ( ) , & resp )
require . NoError ( t , err )
assert . Len ( t , resp . OrgUsers , 3 )
assert . Equal ( t , int64 ( 3 ) , resp . TotalCount )
assert . Equal ( t , 1000 , resp . PerPage )
assert . Equal ( t , 1 , resp . Page )
2022-02-03 02:20:20 -06:00
} , mock )
2021-05-12 07:10:35 -05:00
2022-01-14 10:55:57 -06:00
loggedInUserScenario ( t , "When calling GET with page and limit query parameters on" , "api/org/users/search" , "api/org/users/search" , func ( sc * scenarioContext ) {
2021-05-12 07:10:35 -05:00
setUpGetOrgUsersDB ( t , sqlStore )
2021-11-29 03:18:01 -06:00
sc . handlerFunc = hs . SearchOrgUsersWithPaging
2021-05-12 07:10:35 -05:00
sc . fakeReqWithParams ( "GET" , sc . url , map [ string ] string { "perpage" : "2" , "page" : "2" } ) . exec ( )
require . Equal ( t , http . StatusOK , sc . resp . Code )
var resp models . SearchOrgUsersQueryResult
err := json . Unmarshal ( sc . resp . Body . Bytes ( ) , & resp )
require . NoError ( t , err )
assert . Len ( t , resp . OrgUsers , 1 )
assert . Equal ( t , int64 ( 3 ) , resp . TotalCount )
assert . Equal ( t , 2 , resp . PerPage )
assert . Equal ( t , 2 , resp . Page )
2022-02-03 02:20:20 -06:00
} , mock )
2021-05-12 07:10:35 -05:00
2021-09-17 02:19:36 -05:00
t . Run ( "Given there are two hidden users" , func ( t * testing . T ) {
2020-11-24 05:10:32 -06:00
settings . HiddenUsers = map [ string ] struct { } {
"user1" : { } ,
testUserLogin : { } ,
}
t . Cleanup ( func ( ) { settings . HiddenUsers = make ( map [ string ] struct { } ) } )
2022-01-14 10:55:57 -06:00
loggedInUserScenario ( t , "When calling GET on" , "api/org/users" , "api/org/users" , func ( sc * scenarioContext ) {
2021-09-17 02:19:36 -05:00
setUpGetOrgUsersDB ( t , sqlStore )
2020-11-24 05:10:32 -06:00
sc . handlerFunc = hs . GetOrgUsersForCurrentOrg
sc . fakeReqWithParams ( "GET" , sc . url , map [ string ] string { } ) . exec ( )
require . Equal ( t , http . StatusOK , sc . resp . Code )
var resp [ ] models . OrgUserDTO
err := json . Unmarshal ( sc . resp . Body . Bytes ( ) , & resp )
require . NoError ( t , err )
assert . Len ( t , resp , 2 )
assert . Equal ( t , testUserLogin , resp [ 0 ] . Login )
assert . Equal ( t , "user2" , resp [ 1 ] . Login )
2022-02-03 02:20:20 -06:00
} , mock )
2020-11-24 05:10:32 -06:00
loggedInUserScenarioWithRole ( t , "When calling GET as an admin on" , "GET" , "api/org/users/lookup" ,
2022-08-10 04:56:48 -05:00
"api/org/users/lookup" , org . RoleAdmin , func ( sc * scenarioContext ) {
2021-09-17 02:19:36 -05:00
setUpGetOrgUsersDB ( t , sqlStore )
2020-11-24 05:10:32 -06:00
sc . handlerFunc = hs . GetOrgUsersForCurrentOrgLookup
sc . fakeReqWithParams ( "GET" , sc . url , map [ string ] string { } ) . exec ( )
require . Equal ( t , http . StatusOK , sc . resp . Code )
var resp [ ] dtos . UserLookupDTO
err := json . Unmarshal ( sc . resp . Body . Bytes ( ) , & resp )
require . NoError ( t , err )
assert . Len ( t , resp , 2 )
assert . Equal ( t , testUserLogin , resp [ 0 ] . Login )
assert . Equal ( t , "user2" , resp [ 1 ] . Login )
2022-02-03 02:20:20 -06:00
} , mock )
2020-11-24 05:10:32 -06:00
} )
}
2021-09-17 02:19:36 -05:00
func TestOrgUsersAPIEndpoint_LegacyAccessControl_FolderAdmin ( t * testing . T ) {
2022-08-11 08:37:31 -05:00
cfg := setting . NewCfg ( )
cfg . RBACEnabled = false
sc := setupHTTPServerWithCfg ( t , true , cfg )
2021-11-17 03:12:28 -06:00
setInitCtxSignedInViewer ( sc . initCtx )
2021-09-17 02:19:36 -05:00
// Create a dashboard folder
cmd := models . SaveDashboardCommand {
OrgId : testOrgID ,
FolderId : 1 ,
IsFolder : true ,
Dashboard : simplejson . NewFromAny ( map [ string ] interface { } {
"id" : nil ,
"title" : "1 test dash folder" ,
"tags" : "prod" ,
} ) ,
}
2022-02-16 07:15:44 -06:00
folder , err := sc . dashboardsStore . SaveDashboard ( cmd )
2021-09-17 02:19:36 -05:00
require . NoError ( t , err )
require . NotNil ( t , folder )
// Grant our test Viewer with permission to admin the folder
2022-07-18 08:14:58 -05:00
acls := [ ] * models . DashboardACL {
2021-09-17 02:19:36 -05:00
{
DashboardID : folder . Id ,
OrgID : testOrgID ,
UserID : testUserID ,
Permission : models . PERMISSION_ADMIN ,
Created : time . Now ( ) ,
Updated : time . Now ( ) ,
} ,
}
2022-02-16 07:15:44 -06:00
err = sc . dashboardsStore . UpdateDashboardACL ( context . Background ( ) , folder . Id , acls )
2021-09-17 02:19:36 -05:00
require . NoError ( t , err )
2021-11-17 03:12:28 -06:00
response := callAPI ( sc . server , http . MethodGet , "/api/org/users/lookup" , nil , t )
assert . Equal ( t , http . StatusOK , response . Code )
2021-09-17 02:19:36 -05:00
}
func TestOrgUsersAPIEndpoint_LegacyAccessControl_TeamAdmin ( t * testing . T ) {
2022-08-11 08:37:31 -05:00
cfg := setting . NewCfg ( )
cfg . RBACEnabled = false
sc := setupHTTPServerWithCfg ( t , true , cfg )
2021-11-17 03:12:28 -06:00
setInitCtxSignedInViewer ( sc . initCtx )
2021-09-17 02:19:36 -05:00
// Setup store teams
2021-11-17 03:12:28 -06:00
team1 , err := sc . db . CreateTeam ( "testteam1" , "testteam1@example.org" , testOrgID )
2021-09-17 02:19:36 -05:00
require . NoError ( t , err )
2021-11-17 03:12:28 -06:00
err = sc . db . AddTeamMember ( testUserID , testOrgID , team1 . Id , false , models . PERMISSION_ADMIN )
2021-09-17 02:19:36 -05:00
require . NoError ( t , err )
2021-11-17 03:12:28 -06:00
response := callAPI ( sc . server , http . MethodGet , "/api/org/users/lookup" , nil , t )
assert . Equal ( t , http . StatusOK , response . Code )
2021-09-17 02:19:36 -05:00
}
func TestOrgUsersAPIEndpoint_LegacyAccessControl_Admin ( t * testing . T ) {
2022-08-11 08:37:31 -05:00
cfg := setting . NewCfg ( )
cfg . RBACEnabled = false
sc := setupHTTPServerWithCfg ( t , true , cfg )
2021-11-17 03:12:28 -06:00
setInitCtxSignedInOrgAdmin ( sc . initCtx )
2021-09-17 02:19:36 -05:00
2021-11-17 03:12:28 -06:00
response := callAPI ( sc . server , http . MethodGet , "/api/org/users/lookup" , nil , t )
assert . Equal ( t , http . StatusOK , response . Code )
2021-09-17 02:19:36 -05:00
}
func TestOrgUsersAPIEndpoint_LegacyAccessControl_Viewer ( t * testing . T ) {
2022-08-11 08:37:31 -05:00
cfg := setting . NewCfg ( )
cfg . RBACEnabled = false
sc := setupHTTPServerWithCfg ( t , true , cfg )
2021-11-17 03:12:28 -06:00
setInitCtxSignedInViewer ( sc . initCtx )
2021-09-17 02:19:36 -05:00
2021-11-17 03:12:28 -06:00
response := callAPI ( sc . server , http . MethodGet , "/api/org/users/lookup" , nil , t )
assert . Equal ( t , http . StatusForbidden , response . Code )
2021-09-17 02:19:36 -05:00
}
func TestOrgUsersAPIEndpoint_AccessControl ( t * testing . T ) {
tests := [ ] accessControlTestCase {
{
expectedCode : http . StatusOK ,
desc : "UsersLookupGet should return 200 for user with correct permissions" ,
url : "/api/org/users/lookup" ,
method : http . MethodGet ,
2022-06-14 03:17:48 -05:00
permissions : [ ] accesscontrol . Permission { { Action : accesscontrol . ActionOrgUsersRead , Scope : accesscontrol . ScopeUsersAll } } ,
2021-09-17 02:19:36 -05:00
} ,
{
expectedCode : http . StatusForbidden ,
desc : "UsersLookupGet should return 403 for user without required permissions" ,
url : "/api/org/users/lookup" ,
method : http . MethodGet ,
2022-06-14 03:17:48 -05:00
permissions : [ ] accesscontrol . Permission { { Action : "wrong" } } ,
2021-09-17 02:19:36 -05:00
} ,
}
for _ , test := range tests {
t . Run ( test . desc , func ( t * testing . T ) {
2022-08-11 08:37:31 -05:00
sc := setupHTTPServer ( t , true )
2021-11-17 03:12:28 -06:00
setInitCtxSignedInViewer ( sc . initCtx )
2022-08-11 06:28:55 -05:00
setAccessControlPermissions ( sc . acmock , test . permissions , sc . initCtx . OrgID )
2021-11-17 03:12:28 -06:00
response := callAPI ( sc . server , http . MethodGet , test . url , nil , t )
assert . Equal ( t , test . expectedCode , response . Code )
} )
}
}
var (
2022-08-10 04:56:48 -05:00
testServerAdminViewer = user . SignedInUser {
2022-08-11 06:28:55 -05:00
UserID : 1 ,
OrgID : 1 ,
2021-11-17 03:12:28 -06:00
OrgName : "TestOrg1" ,
2022-08-10 04:56:48 -05:00
OrgRole : org . RoleViewer ,
2021-11-17 03:12:28 -06:00
Login : "testServerAdmin" ,
Name : "testServerAdmin" ,
Email : "testServerAdmin@example.org" ,
OrgCount : 2 ,
IsGrafanaAdmin : true ,
IsAnonymous : false ,
}
2022-08-10 04:56:48 -05:00
testAdminOrg2 = user . SignedInUser {
2022-08-11 06:28:55 -05:00
UserID : 2 ,
OrgID : 2 ,
2021-11-17 03:12:28 -06:00
OrgName : "TestOrg2" ,
2022-08-10 04:56:48 -05:00
OrgRole : org . RoleAdmin ,
2021-11-17 03:12:28 -06:00
Login : "testAdmin" ,
Name : "testAdmin" ,
Email : "testAdmin@example.org" ,
OrgCount : 1 ,
IsGrafanaAdmin : false ,
IsAnonymous : false ,
}
2022-08-10 04:56:48 -05:00
testEditorOrg1 = user . SignedInUser {
2022-08-11 06:28:55 -05:00
UserID : 3 ,
OrgID : 1 ,
2021-11-17 03:12:28 -06:00
OrgName : "TestOrg1" ,
2022-08-10 04:56:48 -05:00
OrgRole : org . RoleEditor ,
2021-11-17 03:12:28 -06:00
Login : "testEditor" ,
Name : "testEditor" ,
Email : "testEditor@example.org" ,
OrgCount : 1 ,
IsGrafanaAdmin : false ,
IsAnonymous : false ,
}
)
// setupOrgUsersDBForAccessControlTests creates three users placed in two orgs
// Org1: testServerAdminViewer, testEditorOrg1
// Org2: testServerAdminViewer, testAdminOrg2
2022-03-07 12:33:01 -06:00
func setupOrgUsersDBForAccessControlTests ( t * testing . T , db sqlstore . Store ) {
2021-11-17 03:12:28 -06:00
t . Helper ( )
var err error
2022-06-28 07:32:25 -05:00
_ , err = db . CreateUser ( context . Background ( ) , user . CreateUserCommand { Email : testServerAdminViewer . Email , SkipOrgSetup : true , Login : testServerAdminViewer . Login } )
2021-11-17 03:12:28 -06:00
require . NoError ( t , err )
2022-06-28 07:32:25 -05:00
_ , err = db . CreateUser ( context . Background ( ) , user . CreateUserCommand { Email : testAdminOrg2 . Email , SkipOrgSetup : true , Login : testAdminOrg2 . Login } )
2021-11-17 03:12:28 -06:00
require . NoError ( t , err )
2022-06-28 07:32:25 -05:00
_ , err = db . CreateUser ( context . Background ( ) , user . CreateUserCommand { Email : testEditorOrg1 . Email , SkipOrgSetup : true , Login : testEditorOrg1 . Login } )
2021-11-17 03:12:28 -06:00
require . NoError ( t , err )
// Create both orgs with server admin
2022-08-11 06:28:55 -05:00
_ , err = db . CreateOrgWithMember ( testServerAdminViewer . OrgName , testServerAdminViewer . UserID )
2021-11-17 03:12:28 -06:00
require . NoError ( t , err )
2022-08-11 06:28:55 -05:00
_ , err = db . CreateOrgWithMember ( testAdminOrg2 . OrgName , testServerAdminViewer . UserID )
2021-11-17 03:12:28 -06:00
require . NoError ( t , err )
2022-08-11 06:28:55 -05:00
err = db . AddOrgUser ( context . Background ( ) , & models . AddOrgUserCommand { LoginOrEmail : testAdminOrg2 . Login , Role : testAdminOrg2 . OrgRole , OrgId : testAdminOrg2 . OrgID , UserId : testAdminOrg2 . UserID } )
2021-11-17 03:12:28 -06:00
require . NoError ( t , err )
2022-08-11 06:28:55 -05:00
err = db . AddOrgUser ( context . Background ( ) , & models . AddOrgUserCommand { LoginOrEmail : testEditorOrg1 . Login , Role : testEditorOrg1 . OrgRole , OrgId : testEditorOrg1 . OrgID , UserId : testEditorOrg1 . UserID } )
2021-11-17 03:12:28 -06:00
require . NoError ( t , err )
}
2021-12-22 11:46:33 -06:00
func TestGetOrgUsersAPIEndpoint_AccessControlMetadata ( t * testing . T ) {
url := "/api/orgs/%v/users?accesscontrol=true"
type testCase struct {
name string
enableAccessControl bool
expectedCode int
expectedMetadata map [ string ] bool
2022-08-10 04:56:48 -05:00
user user . SignedInUser
2021-12-22 11:46:33 -06:00
targetOrg int64
}
tests := [ ] testCase {
{
name : "access control metadata not requested" ,
enableAccessControl : false ,
expectedCode : http . StatusOK ,
expectedMetadata : nil ,
user : testServerAdminViewer ,
2022-08-11 06:28:55 -05:00
targetOrg : testServerAdminViewer . OrgID ,
2021-12-22 11:46:33 -06:00
} ,
{
name : "access control metadata requested" ,
enableAccessControl : true ,
expectedCode : http . StatusOK ,
expectedMetadata : map [ string ] bool {
2022-06-02 07:14:48 -05:00
"org.users:write" : true ,
"org.users:add" : true ,
"org.users:read" : true ,
"org.users:remove" : true } ,
2021-12-22 11:46:33 -06:00
user : testServerAdminViewer ,
2022-08-11 06:28:55 -05:00
targetOrg : testServerAdminViewer . OrgID ,
2021-12-22 11:46:33 -06:00
} ,
}
for _ , tc := range tests {
t . Run ( tc . name , func ( t * testing . T ) {
2022-08-11 08:37:31 -05:00
cfg := setting . NewCfg ( )
cfg . RBACEnabled = tc . enableAccessControl
2022-08-16 09:08:59 -05:00
sc := setupHTTPServerWithCfg ( t , false , cfg , func ( hs * HTTPServer ) {
hs . userService = userimpl . ProvideService (
hs . SQLStore , nil , nil , nil , nil ,
nil , nil , nil , nil , nil , hs . SQLStore . ( * sqlstore . SQLStore ) ,
)
} )
2022-03-07 12:33:01 -06:00
setupOrgUsersDBForAccessControlTests ( t , sc . db )
2021-12-22 11:46:33 -06:00
setInitCtxSignedInUser ( sc . initCtx , tc . user )
// Perform test
response := callAPI ( sc . server , http . MethodGet , fmt . Sprintf ( url , tc . targetOrg ) , nil , t )
require . Equal ( t , tc . expectedCode , response . Code )
var userList [ ] * models . OrgUserDTO
err := json . NewDecoder ( response . Body ) . Decode ( & userList )
require . NoError ( t , err )
if tc . expectedMetadata != nil {
assert . Equal ( t , tc . expectedMetadata , userList [ 0 ] . AccessControl )
} else {
assert . Nil ( t , userList [ 0 ] . AccessControl )
}
} )
}
}
2021-11-17 03:12:28 -06:00
func TestGetOrgUsersAPIEndpoint_AccessControl ( t * testing . T ) {
url := "/api/orgs/%v/users/"
type testCase struct {
name string
enableAccessControl bool
expectedCode int
expectedUserCount int
2022-08-10 04:56:48 -05:00
user user . SignedInUser
2021-11-17 03:12:28 -06:00
targetOrg int64
}
tests := [ ] testCase {
{
name : "server admin can get users in his org (legacy)" ,
enableAccessControl : false ,
expectedCode : http . StatusOK ,
expectedUserCount : 2 ,
user : testServerAdminViewer ,
2022-08-11 06:28:55 -05:00
targetOrg : testServerAdminViewer . OrgID ,
2021-11-17 03:12:28 -06:00
} ,
{
name : "server admin can get users in another org (legacy)" ,
enableAccessControl : false ,
expectedCode : http . StatusOK ,
expectedUserCount : 2 ,
user : testServerAdminViewer ,
targetOrg : 2 ,
} ,
{
name : "org admin cannot get users in his org (legacy)" ,
enableAccessControl : false ,
expectedCode : http . StatusForbidden ,
user : testAdminOrg2 ,
2022-08-11 06:28:55 -05:00
targetOrg : testAdminOrg2 . OrgID ,
2021-11-17 03:12:28 -06:00
} ,
{
name : "org admin cannot get users in another org (legacy)" ,
enableAccessControl : false ,
expectedCode : http . StatusForbidden ,
user : testAdminOrg2 ,
targetOrg : 1 ,
} ,
{
name : "server admin can get users in his org" ,
enableAccessControl : true ,
expectedCode : http . StatusOK ,
expectedUserCount : 2 ,
user : testServerAdminViewer ,
2022-08-11 06:28:55 -05:00
targetOrg : testServerAdminViewer . OrgID ,
2021-11-17 03:12:28 -06:00
} ,
{
name : "server admin can get users in another org" ,
enableAccessControl : true ,
expectedCode : http . StatusOK ,
expectedUserCount : 2 ,
user : testServerAdminViewer ,
targetOrg : 2 ,
} ,
{
name : "org admin can get users in his org" ,
enableAccessControl : true ,
expectedCode : http . StatusOK ,
expectedUserCount : 2 ,
user : testAdminOrg2 ,
2022-08-11 06:28:55 -05:00
targetOrg : testAdminOrg2 . OrgID ,
2021-11-17 03:12:28 -06:00
} ,
{
name : "org admin cannot get users in another org" ,
enableAccessControl : true ,
expectedCode : http . StatusForbidden ,
user : testAdminOrg2 ,
targetOrg : 1 ,
} ,
}
for _ , tc := range tests {
t . Run ( tc . name , func ( t * testing . T ) {
2022-08-11 08:37:31 -05:00
cfg := setting . NewCfg ( )
cfg . RBACEnabled = tc . enableAccessControl
2022-08-16 09:08:59 -05:00
sc := setupHTTPServerWithCfg ( t , false , cfg , func ( hs * HTTPServer ) {
hs . userService = userimpl . ProvideService (
hs . SQLStore , nil , nil , nil , nil ,
nil , nil , nil , nil , nil , hs . SQLStore . ( * sqlstore . SQLStore ) ,
)
} )
2021-11-17 03:12:28 -06:00
setInitCtxSignedInUser ( sc . initCtx , tc . user )
2022-08-16 09:08:59 -05:00
setupOrgUsersDBForAccessControlTests ( t , sc . db )
2021-11-17 03:12:28 -06:00
// Perform test
response := callAPI ( sc . server , http . MethodGet , fmt . Sprintf ( url , tc . targetOrg ) , nil , t )
require . Equal ( t , tc . expectedCode , response . Code )
if tc . expectedCode != http . StatusForbidden {
var userList [ ] * models . OrgUserDTO
err := json . NewDecoder ( response . Body ) . Decode ( & userList )
require . NoError ( t , err )
assert . Len ( t , userList , tc . expectedUserCount )
}
} )
}
}
func TestPostOrgUsersAPIEndpoint_AccessControl ( t * testing . T ) {
url := "/api/orgs/%v/users/"
type testCase struct {
name string
enableAccessControl bool
2022-08-10 04:56:48 -05:00
user user . SignedInUser
2021-11-17 03:12:28 -06:00
targetOrg int64
input string
expectedCode int
}
tests := [ ] testCase {
{
name : "server admin can add users to his org (legacy)" ,
enableAccessControl : false ,
user : testServerAdminViewer ,
2022-08-11 06:28:55 -05:00
targetOrg : testServerAdminViewer . OrgID ,
2021-11-17 03:12:28 -06:00
input : ` { "loginOrEmail": " ` + testAdminOrg2 . Login + ` ", "role": " ` + string ( testAdminOrg2 . OrgRole ) + ` "} ` ,
expectedCode : http . StatusOK ,
} ,
{
name : "server admin can add users to another org (legacy)" ,
enableAccessControl : false ,
user : testServerAdminViewer ,
targetOrg : 2 ,
input : ` { "loginOrEmail": " ` + testEditorOrg1 . Login + ` ", "role": " ` + string ( testEditorOrg1 . OrgRole ) + ` "} ` ,
expectedCode : http . StatusOK ,
} ,
{
name : "org admin cannot add users to his org (legacy)" ,
enableAccessControl : false ,
expectedCode : http . StatusForbidden ,
user : testAdminOrg2 ,
2022-08-11 06:28:55 -05:00
targetOrg : testAdminOrg2 . OrgID ,
2021-11-17 03:12:28 -06:00
input : ` { "loginOrEmail": " ` + testEditorOrg1 . Login + ` ", "role": " ` + string ( testEditorOrg1 . OrgRole ) + ` "} ` ,
} ,
{
name : "org admin cannot add users to another org (legacy)" ,
enableAccessControl : false ,
expectedCode : http . StatusForbidden ,
user : testAdminOrg2 ,
targetOrg : 1 ,
input : ` { "loginOrEmail": " ` + testAdminOrg2 . Login + ` ", "role": " ` + string ( testAdminOrg2 . OrgRole ) + ` "} ` ,
} ,
{
name : "server admin can add users to his org" ,
enableAccessControl : true ,
user : testServerAdminViewer ,
2022-08-11 06:28:55 -05:00
targetOrg : testServerAdminViewer . OrgID ,
2021-11-17 03:12:28 -06:00
input : ` { "loginOrEmail": " ` + testAdminOrg2 . Login + ` ", "role": " ` + string ( testAdminOrg2 . OrgRole ) + ` "} ` ,
expectedCode : http . StatusOK ,
} ,
{
name : "server admin can add users to another org" ,
enableAccessControl : true ,
user : testServerAdminViewer ,
targetOrg : 2 ,
input : ` { "loginOrEmail": " ` + testEditorOrg1 . Login + ` ", "role": " ` + string ( testEditorOrg1 . OrgRole ) + ` "} ` ,
expectedCode : http . StatusOK ,
} ,
{
name : "org admin can add users to his org" ,
enableAccessControl : true ,
user : testAdminOrg2 ,
2022-08-11 06:28:55 -05:00
targetOrg : testAdminOrg2 . OrgID ,
2021-11-17 03:12:28 -06:00
input : ` { "loginOrEmail": " ` + testEditorOrg1 . Login + ` ", "role": " ` + string ( testEditorOrg1 . OrgRole ) + ` "} ` ,
expectedCode : http . StatusOK ,
} ,
{
name : "org admin cannot add users to another org" ,
enableAccessControl : true ,
expectedCode : http . StatusForbidden ,
user : testAdminOrg2 ,
targetOrg : 1 ,
input : ` { "loginOrEmail": " ` + testAdminOrg2 . Login + ` ", "role": " ` + string ( testAdminOrg2 . OrgRole ) + ` "} ` ,
} ,
}
for _ , tc := range tests {
t . Run ( tc . name , func ( t * testing . T ) {
2022-08-11 08:37:31 -05:00
cfg := setting . NewCfg ( )
cfg . RBACEnabled = tc . enableAccessControl
2022-08-16 09:08:59 -05:00
sc := setupHTTPServerWithCfg ( t , false , cfg , func ( hs * HTTPServer ) {
hs . userService = userimpl . ProvideService (
hs . SQLStore , nil , nil , nil , nil ,
nil , nil , nil , nil , nil , hs . SQLStore . ( * sqlstore . SQLStore ) ,
)
} )
2022-03-07 12:33:01 -06:00
setupOrgUsersDBForAccessControlTests ( t , sc . db )
2021-11-17 03:12:28 -06:00
setInitCtxSignedInUser ( sc . initCtx , tc . user )
// Perform request
input := strings . NewReader ( tc . input )
response := callAPI ( sc . server , http . MethodPost , fmt . Sprintf ( url , tc . targetOrg ) , input , t )
assert . Equal ( t , tc . expectedCode , response . Code )
if tc . expectedCode != http . StatusForbidden {
// Check result
var message util . DynMap
err := json . NewDecoder ( response . Body ) . Decode ( & message )
require . NoError ( t , err )
2022-08-10 04:56:48 -05:00
getUsersQuery := models . GetOrgUsersQuery { OrgId : tc . targetOrg , User : & user . SignedInUser {
2022-08-11 06:28:55 -05:00
OrgID : tc . targetOrg ,
2022-01-13 07:40:32 -06:00
Permissions : map [ int64 ] map [ string ] [ ] string { tc . targetOrg : { "org.users:read" : { "users:*" } } } ,
} }
2021-11-17 03:12:28 -06:00
err = sc . db . GetOrgUsers ( context . Background ( ) , & getUsersQuery )
require . NoError ( t , err )
2021-09-17 02:19:36 -05:00
}
2021-11-17 03:12:28 -06:00
} )
}
}
2021-09-17 02:19:36 -05:00
2022-06-27 11:40:12 -05:00
func TestOrgUsersAPIEndpointWithSetPerms_AccessControl ( t * testing . T ) {
type accessControlTestCase2 struct {
expectedCode int
desc string
url string
method string
permissions [ ] accesscontrol . Permission
input string
}
tests := [ ] accessControlTestCase2 {
{
expectedCode : http . StatusOK ,
desc : "org viewer with the correct permissions can add a user as a viewer to his org" ,
url : "/api/org/users" ,
method : http . MethodPost ,
permissions : [ ] accesscontrol . Permission { { Action : accesscontrol . ActionOrgUsersAdd , Scope : accesscontrol . ScopeUsersAll } } ,
2022-08-10 04:56:48 -05:00
input : ` { "loginOrEmail": " ` + testAdminOrg2 . Login + ` ", "role": " ` + string ( org . RoleViewer ) + ` "} ` ,
2022-06-27 11:40:12 -05:00
} ,
{
expectedCode : http . StatusForbidden ,
desc : "org viewer with the correct permissions cannot add a user as an editor to his org" ,
url : "/api/org/users" ,
method : http . MethodPost ,
permissions : [ ] accesscontrol . Permission { { Action : accesscontrol . ActionOrgUsersAdd , Scope : accesscontrol . ScopeUsersAll } } ,
2022-08-10 04:56:48 -05:00
input : ` { "loginOrEmail": " ` + testAdminOrg2 . Login + ` ", "role": " ` + string ( org . RoleEditor ) + ` "} ` ,
2022-06-27 11:40:12 -05:00
} ,
{
expectedCode : http . StatusOK ,
desc : "org viewer with the correct permissions can add a user as a viewer to his org" ,
url : "/api/orgs/1/users" ,
method : http . MethodPost ,
permissions : [ ] accesscontrol . Permission { { Action : accesscontrol . ActionOrgUsersAdd , Scope : accesscontrol . ScopeUsersAll } } ,
2022-08-10 04:56:48 -05:00
input : ` { "loginOrEmail": " ` + testAdminOrg2 . Login + ` ", "role": " ` + string ( org . RoleViewer ) + ` "} ` ,
2022-06-27 11:40:12 -05:00
} ,
{
expectedCode : http . StatusForbidden ,
desc : "org viewer with the correct permissions cannot add a user as an editor to his org" ,
url : "/api/orgs/1/users" ,
method : http . MethodPost ,
permissions : [ ] accesscontrol . Permission { { Action : accesscontrol . ActionOrgUsersAdd , Scope : accesscontrol . ScopeUsersAll } } ,
2022-08-10 04:56:48 -05:00
input : ` { "loginOrEmail": " ` + testAdminOrg2 . Login + ` ", "role": " ` + string ( org . RoleEditor ) + ` "} ` ,
2022-06-27 11:40:12 -05:00
} ,
{
expectedCode : http . StatusOK ,
desc : "org viewer with the correct permissions can update a user's role to a viewer in his org" ,
2022-08-11 06:28:55 -05:00
url : fmt . Sprintf ( "/api/org/users/%d" , testEditorOrg1 . UserID ) ,
2022-06-27 11:40:12 -05:00
method : http . MethodPatch ,
permissions : [ ] accesscontrol . Permission { { Action : accesscontrol . ActionOrgUsersWrite , Scope : accesscontrol . ScopeUsersAll } } ,
2022-08-10 04:56:48 -05:00
input : ` { "role": " ` + string ( org . RoleViewer ) + ` "} ` ,
2022-06-27 11:40:12 -05:00
} ,
{
expectedCode : http . StatusForbidden ,
desc : "org viewer with the correct permissions cannot update a user's role to a viewer in his org" ,
2022-08-11 06:28:55 -05:00
url : fmt . Sprintf ( "/api/org/users/%d" , testEditorOrg1 . UserID ) ,
2022-06-27 11:40:12 -05:00
method : http . MethodPatch ,
permissions : [ ] accesscontrol . Permission { { Action : accesscontrol . ActionOrgUsersWrite , Scope : accesscontrol . ScopeUsersAll } } ,
2022-08-10 04:56:48 -05:00
input : ` { "role": " ` + string ( org . RoleEditor ) + ` "} ` ,
2022-06-27 11:40:12 -05:00
} ,
{
expectedCode : http . StatusOK ,
desc : "org viewer with the correct permissions can update a user's role to a viewer in his org" ,
2022-08-11 06:28:55 -05:00
url : fmt . Sprintf ( "/api/orgs/1/users/%d" , testEditorOrg1 . UserID ) ,
2022-06-27 11:40:12 -05:00
method : http . MethodPatch ,
permissions : [ ] accesscontrol . Permission { { Action : accesscontrol . ActionOrgUsersWrite , Scope : accesscontrol . ScopeUsersAll } } ,
2022-08-10 04:56:48 -05:00
input : ` { "role": " ` + string ( org . RoleViewer ) + ` "} ` ,
2022-06-27 11:40:12 -05:00
} ,
{
expectedCode : http . StatusForbidden ,
desc : "org viewer with the correct permissions cannot update a user's role to a viewer in his org" ,
2022-08-11 06:28:55 -05:00
url : fmt . Sprintf ( "/api/orgs/1/users/%d" , testEditorOrg1 . UserID ) ,
2022-06-27 11:40:12 -05:00
method : http . MethodPatch ,
permissions : [ ] accesscontrol . Permission { { Action : accesscontrol . ActionOrgUsersWrite , Scope : accesscontrol . ScopeUsersAll } } ,
2022-08-10 04:56:48 -05:00
input : ` { "role": " ` + string ( org . RoleEditor ) + ` "} ` ,
2022-06-27 11:40:12 -05:00
} ,
{
expectedCode : http . StatusOK ,
desc : "org viewer with the correct permissions can invite a user as a viewer in his org" ,
url : "/api/org/invites" ,
method : http . MethodPost ,
2022-07-27 11:37:27 -05:00
permissions : [ ] accesscontrol . Permission { { Action : accesscontrol . ActionOrgUsersAdd , Scope : accesscontrol . ScopeUsersAll } } ,
2022-08-10 04:56:48 -05:00
input : ` { "loginOrEmail": "newUserEmail@test.com", "sendEmail": false, "role": " ` + string ( org . RoleViewer ) + ` "} ` ,
2022-06-27 11:40:12 -05:00
} ,
{
expectedCode : http . StatusForbidden ,
desc : "org viewer with the correct permissions cannot invite a user as an editor in his org" ,
url : "/api/org/invites" ,
method : http . MethodPost ,
permissions : [ ] accesscontrol . Permission { { Action : accesscontrol . ActionUsersCreate } } ,
2022-08-10 04:56:48 -05:00
input : ` { "loginOrEmail": "newUserEmail@test.com", "sendEmail": false, "role": " ` + string ( org . RoleEditor ) + ` "} ` ,
2022-06-27 11:40:12 -05:00
} ,
}
for _ , test := range tests {
t . Run ( test . desc , func ( t * testing . T ) {
2022-08-16 09:08:59 -05:00
sc := setupHTTPServer ( t , true , func ( hs * HTTPServer ) {
2022-09-20 04:29:17 -05:00
hs . tempUserService = tempuserimpl . ProvideService ( hs . SQLStore )
2022-08-16 09:08:59 -05:00
hs . userService = userimpl . ProvideService (
hs . SQLStore , nil , nil , nil , nil ,
nil , nil , nil , nil , nil , hs . SQLStore . ( * sqlstore . SQLStore ) ,
)
} )
2022-06-27 11:40:12 -05:00
setInitCtxSignedInViewer ( sc . initCtx )
setupOrgUsersDBForAccessControlTests ( t , sc . db )
2022-08-11 06:28:55 -05:00
setAccessControlPermissions ( sc . acmock , test . permissions , sc . initCtx . OrgID )
2022-06-27 11:40:12 -05:00
input := strings . NewReader ( test . input )
response := callAPI ( sc . server , test . method , test . url , input , t )
assert . Equal ( t , test . expectedCode , response . Code )
} )
}
}
2021-11-17 03:12:28 -06:00
func TestPatchOrgUsersAPIEndpoint_AccessControl ( t * testing . T ) {
url := "/api/orgs/%v/users/%v"
type testCase struct {
name string
enableAccessControl bool
2022-08-10 04:56:48 -05:00
user user . SignedInUser
2021-11-17 03:12:28 -06:00
targetUserId int64
targetOrg int64
input string
expectedCode int
expectedMessage util . DynMap
2022-08-10 04:56:48 -05:00
expectedUserRole org . RoleType
2021-11-17 03:12:28 -06:00
}
2021-09-17 02:19:36 -05:00
2021-11-17 03:12:28 -06:00
tests := [ ] testCase {
{
name : "server admin can update users in his org (legacy)" ,
enableAccessControl : false ,
user : testServerAdminViewer ,
2022-08-11 06:28:55 -05:00
targetUserId : testEditorOrg1 . UserID ,
targetOrg : testServerAdminViewer . OrgID ,
2021-11-17 03:12:28 -06:00
input : ` { "role": "Viewer"} ` ,
expectedCode : http . StatusOK ,
expectedMessage : util . DynMap { "message" : "Organization user updated" } ,
2022-08-10 04:56:48 -05:00
expectedUserRole : org . RoleViewer ,
2021-11-17 03:12:28 -06:00
} ,
{
name : "server admin can update users in another org (legacy)" ,
enableAccessControl : false ,
user : testServerAdminViewer ,
2022-08-11 06:28:55 -05:00
targetUserId : testServerAdminViewer . UserID ,
2021-11-17 03:12:28 -06:00
targetOrg : 2 ,
input : ` { "role": "Editor"} ` ,
expectedCode : http . StatusOK ,
expectedMessage : util . DynMap { "message" : "Organization user updated" } ,
2022-08-10 04:56:48 -05:00
expectedUserRole : org . RoleEditor ,
2021-11-17 03:12:28 -06:00
} ,
{
name : "org admin cannot update users in his org (legacy)" ,
enableAccessControl : false ,
user : testAdminOrg2 ,
2022-08-11 06:28:55 -05:00
targetUserId : testServerAdminViewer . UserID ,
targetOrg : testAdminOrg2 . OrgID ,
2021-11-17 03:12:28 -06:00
input : ` { "role": "Editor"} ` ,
expectedCode : http . StatusForbidden ,
} ,
{
name : "org admin cannot update users in another org (legacy)" ,
enableAccessControl : false ,
user : testAdminOrg2 ,
2022-08-11 06:28:55 -05:00
targetUserId : testServerAdminViewer . UserID ,
2021-11-17 03:12:28 -06:00
targetOrg : 1 ,
input : ` { "role": "Editor"} ` ,
expectedCode : http . StatusForbidden ,
} ,
{
name : "server admin can update users in his org" ,
enableAccessControl : true ,
user : testServerAdminViewer ,
2022-08-11 06:28:55 -05:00
targetUserId : testEditorOrg1 . UserID ,
targetOrg : testServerAdminViewer . OrgID ,
2021-11-17 03:12:28 -06:00
input : ` { "role": "Viewer"} ` ,
expectedCode : http . StatusOK ,
expectedMessage : util . DynMap { "message" : "Organization user updated" } ,
2022-08-10 04:56:48 -05:00
expectedUserRole : org . RoleViewer ,
2021-11-17 03:12:28 -06:00
} ,
{
name : "server admin can update users in another org" ,
enableAccessControl : true ,
user : testServerAdminViewer ,
2022-08-11 06:28:55 -05:00
targetUserId : testServerAdminViewer . UserID ,
2021-11-17 03:12:28 -06:00
targetOrg : 2 ,
input : ` { "role": "Editor"} ` ,
expectedCode : http . StatusOK ,
expectedMessage : util . DynMap { "message" : "Organization user updated" } ,
2022-08-10 04:56:48 -05:00
expectedUserRole : org . RoleEditor ,
2021-11-17 03:12:28 -06:00
} ,
{
name : "org admin can update users in his org" ,
enableAccessControl : true ,
user : testAdminOrg2 ,
2022-08-11 06:28:55 -05:00
targetUserId : testServerAdminViewer . UserID ,
targetOrg : testAdminOrg2 . OrgID ,
2021-11-17 03:12:28 -06:00
input : ` { "role": "Editor"} ` ,
expectedCode : http . StatusOK ,
expectedMessage : util . DynMap { "message" : "Organization user updated" } ,
2022-08-10 04:56:48 -05:00
expectedUserRole : org . RoleEditor ,
2021-11-17 03:12:28 -06:00
} ,
{
name : "org admin cannot update users in another org" ,
enableAccessControl : true ,
user : testAdminOrg2 ,
2022-08-11 06:28:55 -05:00
targetUserId : testServerAdminViewer . UserID ,
2021-11-17 03:12:28 -06:00
targetOrg : 1 ,
input : ` { "role": "Editor"} ` ,
expectedCode : http . StatusForbidden ,
} ,
}
for _ , tc := range tests {
t . Run ( tc . name , func ( t * testing . T ) {
2022-08-11 08:37:31 -05:00
cfg := setting . NewCfg ( )
cfg . RBACEnabled = tc . enableAccessControl
2022-08-16 09:08:59 -05:00
sc := setupHTTPServerWithCfg ( t , false , cfg , func ( hs * HTTPServer ) {
hs . userService = userimpl . ProvideService (
hs . SQLStore , nil , nil , nil , nil ,
nil , nil , nil , nil , nil , hs . SQLStore . ( * sqlstore . SQLStore ) ,
)
} )
2022-03-07 12:33:01 -06:00
setupOrgUsersDBForAccessControlTests ( t , sc . db )
2021-11-17 03:12:28 -06:00
setInitCtxSignedInUser ( sc . initCtx , tc . user )
// Perform request
input := strings . NewReader ( tc . input )
setInitCtxSignedInUser ( sc . initCtx , tc . user )
response := callAPI ( sc . server , http . MethodPatch , fmt . Sprintf ( url , tc . targetOrg , tc . targetUserId ) , input , t )
assert . Equal ( t , tc . expectedCode , response . Code )
if tc . expectedCode != http . StatusForbidden {
// Check result
var message util . DynMap
err := json . NewDecoder ( response . Body ) . Decode ( & message )
require . NoError ( t , err )
assert . Equal ( t , tc . expectedMessage , message )
2021-09-17 02:19:36 -05:00
2021-11-17 03:12:28 -06:00
getUserQuery := models . GetSignedInUserQuery {
UserId : tc . targetUserId ,
OrgId : tc . targetOrg ,
}
2022-01-25 13:30:08 -06:00
err = sc . db . GetSignedInUser ( context . Background ( ) , & getUserQuery )
2021-11-17 03:12:28 -06:00
require . NoError ( t , err )
assert . Equal ( t , tc . expectedUserRole , getUserQuery . Result . OrgRole )
}
} )
}
}
func TestDeleteOrgUsersAPIEndpoint_AccessControl ( t * testing . T ) {
url := "/api/orgs/%v/users/%v"
type testCase struct {
name string
enableAccessControl bool
2022-08-10 04:56:48 -05:00
user user . SignedInUser
2021-11-17 03:12:28 -06:00
targetUserId int64
targetOrg int64
expectedCode int
expectedMessage util . DynMap
expectedUserCount int
}
tests := [ ] testCase {
{
name : "server admin can delete users from his org (legacy)" ,
enableAccessControl : false ,
user : testServerAdminViewer ,
2022-08-11 06:28:55 -05:00
targetUserId : testEditorOrg1 . UserID ,
targetOrg : testServerAdminViewer . OrgID ,
2021-11-17 03:12:28 -06:00
expectedCode : http . StatusOK ,
expectedMessage : util . DynMap { "message" : "User removed from organization" } ,
expectedUserCount : 1 ,
} ,
{
name : "server admin can delete users from another org (legacy)" ,
enableAccessControl : false ,
user : testServerAdminViewer ,
2022-08-11 06:28:55 -05:00
targetUserId : testServerAdminViewer . UserID ,
2021-11-17 03:12:28 -06:00
targetOrg : 2 ,
expectedCode : http . StatusOK ,
expectedMessage : util . DynMap { "message" : "User removed from organization" } ,
expectedUserCount : 1 ,
} ,
{
name : "org admin can delete users from his org (legacy)" ,
enableAccessControl : false ,
user : testAdminOrg2 ,
2022-08-11 06:28:55 -05:00
targetUserId : testServerAdminViewer . UserID ,
targetOrg : testAdminOrg2 . OrgID ,
2021-11-17 03:12:28 -06:00
expectedCode : http . StatusForbidden ,
} ,
{
name : "org admin cannot delete users from another org (legacy)" ,
enableAccessControl : false ,
user : testAdminOrg2 ,
2022-08-11 06:28:55 -05:00
targetUserId : testEditorOrg1 . UserID ,
2021-11-17 03:12:28 -06:00
targetOrg : 1 ,
expectedCode : http . StatusForbidden ,
} ,
{
name : "server admin can delete users from his org" ,
enableAccessControl : true ,
user : testServerAdminViewer ,
2022-08-11 06:28:55 -05:00
targetUserId : testEditorOrg1 . UserID ,
targetOrg : testServerAdminViewer . OrgID ,
2021-11-17 03:12:28 -06:00
expectedCode : http . StatusOK ,
expectedMessage : util . DynMap { "message" : "User removed from organization" } ,
expectedUserCount : 1 ,
} ,
{
name : "server admin can delete users from another org" ,
enableAccessControl : true ,
user : testServerAdminViewer ,
2022-08-11 06:28:55 -05:00
targetUserId : testServerAdminViewer . UserID ,
2021-11-17 03:12:28 -06:00
targetOrg : 2 ,
expectedCode : http . StatusOK ,
expectedMessage : util . DynMap { "message" : "User removed from organization" } ,
expectedUserCount : 1 ,
} ,
{
name : "org admin can delete users from his org" ,
enableAccessControl : true ,
user : testAdminOrg2 ,
2022-08-11 06:28:55 -05:00
targetUserId : testServerAdminViewer . UserID ,
targetOrg : testAdminOrg2 . OrgID ,
2021-11-17 03:12:28 -06:00
expectedCode : http . StatusOK ,
expectedMessage : util . DynMap { "message" : "User removed from organization" } ,
expectedUserCount : 1 ,
} ,
{
name : "org admin cannot delete users from another org" ,
enableAccessControl : true ,
user : testAdminOrg2 ,
2022-08-11 06:28:55 -05:00
targetUserId : testEditorOrg1 . UserID ,
2021-11-17 03:12:28 -06:00
targetOrg : 1 ,
expectedCode : http . StatusForbidden ,
} ,
}
for _ , tc := range tests {
t . Run ( tc . name , func ( t * testing . T ) {
2022-08-11 08:37:31 -05:00
cfg := setting . NewCfg ( )
cfg . RBACEnabled = tc . enableAccessControl
2022-08-16 09:08:59 -05:00
sc := setupHTTPServerWithCfg ( t , false , cfg , func ( hs * HTTPServer ) {
hs . userService = userimpl . ProvideService (
hs . SQLStore , nil , nil , nil , nil ,
nil , nil , nil , nil , nil , hs . SQLStore . ( * sqlstore . SQLStore ) ,
)
} )
2022-03-07 12:33:01 -06:00
setupOrgUsersDBForAccessControlTests ( t , sc . db )
2021-11-17 03:12:28 -06:00
setInitCtxSignedInUser ( sc . initCtx , tc . user )
response := callAPI ( sc . server , http . MethodDelete , fmt . Sprintf ( url , tc . targetOrg , tc . targetUserId ) , nil , t )
assert . Equal ( t , tc . expectedCode , response . Code )
if tc . expectedCode != http . StatusForbidden {
// Check result
var message util . DynMap
err := json . NewDecoder ( response . Body ) . Decode ( & message )
require . NoError ( t , err )
assert . Equal ( t , tc . expectedMessage , message )
2022-01-13 07:40:32 -06:00
getUsersQuery := models . GetOrgUsersQuery {
OrgId : tc . targetOrg ,
2022-08-10 04:56:48 -05:00
User : & user . SignedInUser {
2022-08-11 06:28:55 -05:00
OrgID : tc . targetOrg ,
2022-01-13 07:40:32 -06:00
Permissions : map [ int64 ] map [ string ] [ ] string { tc . targetOrg : { accesscontrol . ActionOrgUsersRead : { accesscontrol . ScopeUsersAll } } } ,
} ,
}
2021-11-17 03:12:28 -06:00
err = sc . db . GetOrgUsers ( context . Background ( ) , & getUsersQuery )
require . NoError ( t , err )
assert . Len ( t , getUsersQuery . Result , tc . expectedUserCount )
2022-08-17 09:32:02 -05:00
// check all permissions for user is removed in org
2022-08-24 06:29:17 -05:00
permission , err := sc . hs . accesscontrolService . GetUserPermissions ( context . Background ( ) , & user . SignedInUser { UserID : tc . targetUserId , OrgID : tc . targetOrg } , accesscontrol . Options { } )
2022-08-17 09:32:02 -05:00
require . NoError ( t , err )
assert . Len ( t , permission , 0 )
2021-11-17 03:12:28 -06:00
}
2021-09-17 02:19:36 -05:00
} )
}
}