2018-01-30 06:17:48 -06:00
|
|
|
package api
|
|
|
|
|
|
|
|
import (
|
2021-11-29 03:18:01 -06:00
|
|
|
"bytes"
|
2021-09-27 09:43:16 -05:00
|
|
|
"context"
|
2021-11-29 03:18:01 -06:00
|
|
|
"encoding/json"
|
2020-05-12 06:04:18 -05:00
|
|
|
"fmt"
|
2021-10-27 06:13:59 -05:00
|
|
|
"io"
|
2018-01-30 06:17:48 -06:00
|
|
|
"net/http"
|
|
|
|
"net/http/httptest"
|
|
|
|
"path/filepath"
|
2020-05-12 06:04:18 -05:00
|
|
|
"testing"
|
2018-01-30 06:17:48 -06:00
|
|
|
|
2022-08-03 10:17:26 -05:00
|
|
|
"github.com/stretchr/testify/mock"
|
2022-05-17 13:52:22 -05:00
|
|
|
"github.com/stretchr/testify/require"
|
|
|
|
|
2021-01-15 07:43:20 -06:00
|
|
|
"github.com/grafana/grafana/pkg/api/response"
|
|
|
|
"github.com/grafana/grafana/pkg/api/routing"
|
2020-12-15 12:09:04 -06:00
|
|
|
"github.com/grafana/grafana/pkg/infra/fs"
|
2022-09-14 02:13:10 -05:00
|
|
|
"github.com/grafana/grafana/pkg/infra/localcache"
|
2021-10-27 06:13:59 -05:00
|
|
|
"github.com/grafana/grafana/pkg/infra/log"
|
2020-12-11 04:44:44 -06:00
|
|
|
"github.com/grafana/grafana/pkg/infra/remotecache"
|
2022-01-20 04:10:12 -06:00
|
|
|
"github.com/grafana/grafana/pkg/infra/tracing"
|
2020-03-04 05:57:20 -06:00
|
|
|
"github.com/grafana/grafana/pkg/models"
|
2021-08-24 04:36:28 -05:00
|
|
|
"github.com/grafana/grafana/pkg/services/accesscontrol"
|
2022-09-05 11:15:47 -05:00
|
|
|
"github.com/grafana/grafana/pkg/services/accesscontrol/acimpl"
|
2021-08-24 13:12:48 -05:00
|
|
|
accesscontrolmock "github.com/grafana/grafana/pkg/services/accesscontrol/mock"
|
2021-11-17 03:12:28 -06:00
|
|
|
"github.com/grafana/grafana/pkg/services/accesscontrol/ossaccesscontrol"
|
2022-09-19 02:54:37 -05:00
|
|
|
"github.com/grafana/grafana/pkg/services/annotations/annotationstest"
|
2019-03-08 08:15:38 -06:00
|
|
|
"github.com/grafana/grafana/pkg/services/auth"
|
2020-12-11 04:44:44 -06:00
|
|
|
"github.com/grafana/grafana/pkg/services/contexthandler"
|
2022-03-30 10:01:24 -05:00
|
|
|
"github.com/grafana/grafana/pkg/services/contexthandler/authproxy"
|
2022-05-20 11:45:18 -05:00
|
|
|
"github.com/grafana/grafana/pkg/services/contexthandler/ctxkey"
|
2022-02-16 07:15:44 -06:00
|
|
|
"github.com/grafana/grafana/pkg/services/dashboards"
|
|
|
|
dashboardsstore "github.com/grafana/grafana/pkg/services/dashboards/database"
|
2022-05-17 13:52:22 -05:00
|
|
|
dashboardservice "github.com/grafana/grafana/pkg/services/dashboards/service"
|
2022-05-25 03:41:51 -05:00
|
|
|
dashver "github.com/grafana/grafana/pkg/services/dashboardversion"
|
2022-01-26 11:44:20 -06:00
|
|
|
"github.com/grafana/grafana/pkg/services/featuremgmt"
|
2022-08-03 10:17:26 -05:00
|
|
|
"github.com/grafana/grafana/pkg/services/guardian"
|
2022-02-01 05:03:21 -06:00
|
|
|
"github.com/grafana/grafana/pkg/services/ldap"
|
2022-05-25 06:43:58 -05:00
|
|
|
"github.com/grafana/grafana/pkg/services/licensing"
|
2022-03-30 10:01:24 -05:00
|
|
|
"github.com/grafana/grafana/pkg/services/login/loginservice"
|
2022-04-04 13:36:15 -05:00
|
|
|
"github.com/grafana/grafana/pkg/services/login/logintest"
|
2022-08-10 04:56:48 -05:00
|
|
|
"github.com/grafana/grafana/pkg/services/org"
|
2022-09-20 02:55:40 -05:00
|
|
|
"github.com/grafana/grafana/pkg/services/org/orgtest"
|
2022-04-21 08:03:17 -05:00
|
|
|
"github.com/grafana/grafana/pkg/services/preference/preftest"
|
2022-07-15 11:06:44 -05:00
|
|
|
"github.com/grafana/grafana/pkg/services/quota/quotaimpl"
|
2020-12-11 04:44:44 -06:00
|
|
|
"github.com/grafana/grafana/pkg/services/rendering"
|
2022-08-03 10:17:26 -05:00
|
|
|
"github.com/grafana/grafana/pkg/services/search"
|
2021-11-17 03:12:28 -06:00
|
|
|
"github.com/grafana/grafana/pkg/services/searchusers"
|
|
|
|
"github.com/grafana/grafana/pkg/services/searchusers/filters"
|
2020-12-11 04:44:44 -06:00
|
|
|
"github.com/grafana/grafana/pkg/services/sqlstore"
|
2022-08-03 10:17:26 -05:00
|
|
|
"github.com/grafana/grafana/pkg/services/sqlstore/mockstore"
|
2022-09-21 07:04:01 -05:00
|
|
|
"github.com/grafana/grafana/pkg/services/tag/tagimpl"
|
2022-09-20 11:58:04 -05:00
|
|
|
"github.com/grafana/grafana/pkg/services/team"
|
|
|
|
"github.com/grafana/grafana/pkg/services/team/teamimpl"
|
|
|
|
"github.com/grafana/grafana/pkg/services/team/teamtest"
|
2022-08-02 09:58:05 -05:00
|
|
|
"github.com/grafana/grafana/pkg/services/user"
|
2022-08-04 06:22:43 -05:00
|
|
|
"github.com/grafana/grafana/pkg/services/user/usertest"
|
2020-12-11 04:44:44 -06:00
|
|
|
"github.com/grafana/grafana/pkg/setting"
|
2021-10-11 07:30:59 -05:00
|
|
|
"github.com/grafana/grafana/pkg/web"
|
2022-03-10 11:38:04 -06:00
|
|
|
"github.com/grafana/grafana/pkg/web/webtest"
|
2018-01-30 06:17:48 -06:00
|
|
|
)
|
|
|
|
|
2022-02-03 02:20:20 -06:00
|
|
|
func loggedInUserScenario(t *testing.T, desc string, url string, routePattern string, fn scenarioFunc, sqlStore sqlstore.Store) {
|
2022-08-10 04:56:48 -05:00
|
|
|
loggedInUserScenarioWithRole(t, desc, "GET", url, routePattern, org.RoleEditor, fn, sqlStore)
|
2018-01-30 06:17:48 -06:00
|
|
|
}
|
|
|
|
|
2022-08-10 04:56:48 -05:00
|
|
|
func loggedInUserScenarioWithRole(t *testing.T, desc string, method string, url string, routePattern string, role org.RoleType, fn scenarioFunc, sqlStore sqlstore.Store) {
|
2020-11-13 02:52:38 -06:00
|
|
|
t.Run(fmt.Sprintf("%s %s", desc, url), func(t *testing.T) {
|
|
|
|
sc := setupScenarioContext(t, url)
|
2022-02-03 02:20:20 -06:00
|
|
|
sc.sqlStore = sqlStore
|
2022-08-04 06:22:43 -05:00
|
|
|
sc.userService = usertest.NewUserServiceFake()
|
2021-01-15 07:43:20 -06:00
|
|
|
sc.defaultHandler = routing.Wrap(func(c *models.ReqContext) response.Response {
|
2018-01-30 06:17:48 -06:00
|
|
|
sc.context = c
|
2022-08-11 06:28:55 -05:00
|
|
|
sc.context.UserID = testUserID
|
|
|
|
sc.context.OrgID = testOrgID
|
2020-11-24 05:10:32 -06:00
|
|
|
sc.context.Login = testUserLogin
|
2018-01-30 06:17:48 -06:00
|
|
|
sc.context.OrgRole = role
|
|
|
|
if sc.handlerFunc != nil {
|
|
|
|
return sc.handlerFunc(sc.context)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
|
|
|
|
switch method {
|
|
|
|
case "GET":
|
|
|
|
sc.m.Get(routePattern, sc.defaultHandler)
|
|
|
|
case "DELETE":
|
|
|
|
sc.m.Delete(routePattern, sc.defaultHandler)
|
|
|
|
}
|
|
|
|
fn(sc)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2020-11-13 02:52:38 -06:00
|
|
|
func anonymousUserScenario(t *testing.T, desc string, method string, url string, routePattern string, fn scenarioFunc) {
|
|
|
|
t.Run(fmt.Sprintf("%s %s", desc, url), func(t *testing.T) {
|
|
|
|
sc := setupScenarioContext(t, url)
|
2021-01-15 07:43:20 -06:00
|
|
|
sc.defaultHandler = routing.Wrap(func(c *models.ReqContext) response.Response {
|
2018-05-24 01:55:16 -05:00
|
|
|
sc.context = c
|
|
|
|
if sc.handlerFunc != nil {
|
|
|
|
return sc.handlerFunc(sc.context)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
|
|
|
|
switch method {
|
|
|
|
case "GET":
|
|
|
|
sc.m.Get(routePattern, sc.defaultHandler)
|
|
|
|
case "DELETE":
|
|
|
|
sc.m.Delete(routePattern, sc.defaultHandler)
|
|
|
|
}
|
|
|
|
|
|
|
|
fn(sc)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2018-01-30 06:17:48 -06:00
|
|
|
func (sc *scenarioContext) fakeReq(method, url string) *scenarioContext {
|
|
|
|
sc.resp = httptest.NewRecorder()
|
|
|
|
req, err := http.NewRequest(method, url, nil)
|
2020-11-13 02:52:38 -06:00
|
|
|
require.NoError(sc.t, err)
|
2022-02-09 06:44:38 -06:00
|
|
|
req.Header.Add("Content-Type", "application/json")
|
2018-01-30 06:17:48 -06:00
|
|
|
sc.req = req
|
|
|
|
|
|
|
|
return sc
|
|
|
|
}
|
|
|
|
|
|
|
|
func (sc *scenarioContext) fakeReqWithParams(method, url string, queryParams map[string]string) *scenarioContext {
|
|
|
|
sc.resp = httptest.NewRecorder()
|
|
|
|
req, err := http.NewRequest(method, url, nil)
|
2020-05-12 06:04:18 -05:00
|
|
|
// TODO: Depend on sc.t
|
|
|
|
if sc.t != nil {
|
|
|
|
require.NoError(sc.t, err)
|
|
|
|
} else if err != nil {
|
|
|
|
panic(fmt.Sprintf("Making request failed: %s", err))
|
|
|
|
}
|
|
|
|
|
2022-02-09 06:44:38 -06:00
|
|
|
req.Header.Add("Content-Type", "application/json")
|
|
|
|
|
2018-01-30 06:17:48 -06:00
|
|
|
q := req.URL.Query()
|
|
|
|
for k, v := range queryParams {
|
|
|
|
q.Add(k, v)
|
|
|
|
}
|
|
|
|
req.URL.RawQuery = q.Encode()
|
|
|
|
sc.req = req
|
|
|
|
return sc
|
|
|
|
}
|
|
|
|
|
2019-07-09 01:37:24 -05:00
|
|
|
func (sc *scenarioContext) fakeReqNoAssertions(method, url string) *scenarioContext {
|
|
|
|
sc.resp = httptest.NewRecorder()
|
|
|
|
req, _ := http.NewRequest(method, url, nil)
|
2022-02-09 06:44:38 -06:00
|
|
|
req.Header.Add("Content-Type", "application/json")
|
2019-07-09 01:37:24 -05:00
|
|
|
sc.req = req
|
|
|
|
|
|
|
|
return sc
|
|
|
|
}
|
|
|
|
|
|
|
|
func (sc *scenarioContext) fakeReqNoAssertionsWithCookie(method, url string, cookie http.Cookie) *scenarioContext {
|
|
|
|
sc.resp = httptest.NewRecorder()
|
|
|
|
http.SetCookie(sc.resp, &cookie)
|
|
|
|
|
|
|
|
req, _ := http.NewRequest(method, url, nil)
|
|
|
|
req.Header = http.Header{"Cookie": sc.resp.Header()["Set-Cookie"]}
|
2022-02-09 06:44:38 -06:00
|
|
|
req.Header.Add("Content-Type", "application/json")
|
2019-07-09 01:37:24 -05:00
|
|
|
sc.req = req
|
|
|
|
|
|
|
|
return sc
|
|
|
|
}
|
|
|
|
|
2018-01-30 06:17:48 -06:00
|
|
|
type scenarioContext struct {
|
2022-05-25 03:41:51 -05:00
|
|
|
t *testing.T
|
|
|
|
cfg *setting.Cfg
|
|
|
|
m *web.Mux
|
|
|
|
context *models.ReqContext
|
|
|
|
resp *httptest.ResponseRecorder
|
|
|
|
handlerFunc handlerFunc
|
|
|
|
defaultHandler web.Handler
|
|
|
|
req *http.Request
|
|
|
|
url string
|
|
|
|
userAuthTokenService *auth.FakeUserAuthTokenService
|
|
|
|
sqlStore sqlstore.Store
|
|
|
|
authInfoService *logintest.AuthInfoServiceFake
|
|
|
|
dashboardVersionService dashver.Service
|
2022-08-02 09:58:05 -05:00
|
|
|
userService user.Service
|
2018-01-30 06:17:48 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
func (sc *scenarioContext) exec() {
|
|
|
|
sc.m.ServeHTTP(sc.resp, sc.req)
|
|
|
|
}
|
|
|
|
|
|
|
|
type scenarioFunc func(c *scenarioContext)
|
2021-01-15 07:43:20 -06:00
|
|
|
type handlerFunc func(c *models.ReqContext) response.Response
|
2018-01-30 06:17:48 -06:00
|
|
|
|
2020-12-15 12:09:04 -06:00
|
|
|
func getContextHandler(t *testing.T, cfg *setting.Cfg) *contexthandler.ContextHandler {
|
2020-12-11 04:44:44 -06:00
|
|
|
t.Helper()
|
|
|
|
|
2020-12-15 12:09:04 -06:00
|
|
|
if cfg == nil {
|
|
|
|
cfg = setting.NewCfg()
|
|
|
|
}
|
|
|
|
|
2020-12-11 04:44:44 -06:00
|
|
|
sqlStore := sqlstore.InitTestDB(t)
|
|
|
|
remoteCacheSvc := &remotecache.RemoteCache{}
|
|
|
|
cfg.RemoteCacheOptions = &setting.RemoteCacheOptions{
|
|
|
|
Name: "database",
|
|
|
|
}
|
|
|
|
userAuthTokenSvc := auth.NewFakeUserAuthTokenService()
|
|
|
|
renderSvc := &fakeRenderService{}
|
2021-03-31 10:40:44 -05:00
|
|
|
authJWTSvc := models.NewFakeJWTService()
|
2022-06-15 05:40:41 -05:00
|
|
|
tracer := tracing.InitializeTracerForTest()
|
2022-03-30 10:01:24 -05:00
|
|
|
authProxy := authproxy.ProvideAuthProxy(cfg, remoteCacheSvc, loginservice.LoginServiceMock{}, sqlStore)
|
2022-04-08 03:33:19 -05:00
|
|
|
loginService := &logintest.LoginServiceFake{}
|
|
|
|
authenticator := &logintest.AuthenticatorFake{}
|
2022-08-04 08:44:14 -05:00
|
|
|
ctxHdlr := contexthandler.ProvideService(cfg, userAuthTokenSvc, authJWTSvc, remoteCacheSvc, renderSvc, sqlStore, tracer, authProxy, loginService, nil, authenticator, usertest.NewUserServiceFake())
|
2020-12-11 04:44:44 -06:00
|
|
|
|
|
|
|
return ctxHdlr
|
|
|
|
}
|
|
|
|
|
2020-11-13 02:52:38 -06:00
|
|
|
func setupScenarioContext(t *testing.T, url string) *scenarioContext {
|
2020-12-15 12:09:04 -06:00
|
|
|
cfg := setting.NewCfg()
|
2018-01-30 06:17:48 -06:00
|
|
|
sc := &scenarioContext{
|
|
|
|
url: url,
|
2020-11-13 02:52:38 -06:00
|
|
|
t: t,
|
2020-12-15 12:09:04 -06:00
|
|
|
cfg: cfg,
|
2018-01-30 06:17:48 -06:00
|
|
|
}
|
2020-12-11 04:44:44 -06:00
|
|
|
viewsPath, err := filepath.Abs("../../public/views")
|
|
|
|
require.NoError(t, err)
|
2020-12-15 12:09:04 -06:00
|
|
|
exists, err := fs.Exists(viewsPath)
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.Truef(t, exists, "Views should be in %q", viewsPath)
|
2018-01-30 06:17:48 -06:00
|
|
|
|
2021-10-11 07:30:59 -05:00
|
|
|
sc.m = web.New()
|
|
|
|
sc.m.UseMiddleware(web.Renderer(viewsPath, "[[", "]]"))
|
2020-12-15 12:09:04 -06:00
|
|
|
sc.m.Use(getContextHandler(t, cfg).Middleware)
|
2018-01-30 06:17:48 -06:00
|
|
|
|
|
|
|
return sc
|
|
|
|
}
|
2020-12-11 04:44:44 -06:00
|
|
|
|
|
|
|
type fakeRenderService struct {
|
|
|
|
rendering.Service
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *fakeRenderService) Init() error {
|
|
|
|
return nil
|
|
|
|
}
|
2021-06-11 08:58:18 -05:00
|
|
|
|
2022-06-14 03:17:48 -05:00
|
|
|
func setupAccessControlScenarioContext(t *testing.T, cfg *setting.Cfg, url string, permissions []accesscontrol.Permission) (*scenarioContext, *HTTPServer) {
|
2021-09-01 08:18:17 -05:00
|
|
|
cfg.Quota.Enabled = false
|
2021-06-11 08:58:18 -05:00
|
|
|
|
2022-03-22 14:48:32 -05:00
|
|
|
store := sqlstore.InitTestDB(t)
|
2021-06-11 08:58:18 -05:00
|
|
|
hs := &HTTPServer{
|
2021-09-29 05:51:49 -05:00
|
|
|
Cfg: cfg,
|
2022-03-22 14:48:32 -05:00
|
|
|
Live: newTestLive(t, store),
|
2022-05-25 13:40:41 -05:00
|
|
|
License: &licensing.OSSLicensingService{},
|
2022-05-05 10:31:14 -05:00
|
|
|
Features: featuremgmt.WithFeatures(),
|
2022-07-15 11:06:44 -05:00
|
|
|
QuotaService: "aimpl.Service{Cfg: cfg},
|
2021-09-29 05:51:49 -05:00
|
|
|
RouteRegister: routing.NewRouteRegister(),
|
|
|
|
AccessControl: accesscontrolmock.New().WithPermissions(permissions),
|
2022-08-16 07:24:57 -05:00
|
|
|
searchUsersService: searchusers.ProvideUsersService(filters.ProvideOSSSearchUserFilter(), usertest.NewUserServiceFake()),
|
2022-02-01 05:03:21 -06:00
|
|
|
ldapGroups: ldap.ProvideGroupsService(),
|
2021-06-11 08:58:18 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
sc := setupScenarioContext(t, url)
|
|
|
|
|
|
|
|
hs.registerRoutes()
|
|
|
|
hs.RouteRegister.Register(sc.m.Router)
|
|
|
|
|
2021-06-14 10:36:48 -05:00
|
|
|
return sc, hs
|
|
|
|
}
|
|
|
|
|
|
|
|
type accessControlTestCase struct {
|
|
|
|
expectedCode int
|
|
|
|
desc string
|
|
|
|
url string
|
|
|
|
method string
|
2022-06-14 03:17:48 -05:00
|
|
|
permissions []accesscontrol.Permission
|
2021-06-11 08:58:18 -05:00
|
|
|
}
|
2021-10-27 06:13:59 -05:00
|
|
|
|
|
|
|
// accessControlScenarioContext contains the setups for accesscontrol tests
|
|
|
|
type accessControlScenarioContext struct {
|
|
|
|
// server we registered hs routes on.
|
|
|
|
server *web.Mux
|
|
|
|
|
|
|
|
// initCtx is used in a middleware to set the initial context
|
|
|
|
// of the request server side. Can be used to pretend sign in.
|
|
|
|
initCtx *models.ReqContext
|
|
|
|
|
|
|
|
// hs is a minimal HTTPServer for the accesscontrol tests to pass.
|
|
|
|
hs *HTTPServer
|
|
|
|
|
|
|
|
// acmock is an accesscontrol mock used to fake users rights.
|
|
|
|
acmock *accesscontrolmock.Mock
|
|
|
|
|
2022-08-16 09:08:59 -05:00
|
|
|
usermock *usertest.FakeUserService
|
|
|
|
|
2021-10-27 06:13:59 -05:00
|
|
|
// db is a test database initialized with InitTestDB
|
2022-09-27 03:34:31 -05:00
|
|
|
db *sqlstore.SQLStore
|
2021-10-27 06:13:59 -05:00
|
|
|
|
|
|
|
// cfg is the setting provider
|
|
|
|
cfg *setting.Cfg
|
2022-02-16 07:15:44 -06:00
|
|
|
|
|
|
|
dashboardsStore dashboards.Store
|
2022-09-20 11:58:04 -05:00
|
|
|
teamService team.Service
|
2021-10-27 06:13:59 -05:00
|
|
|
}
|
|
|
|
|
2022-06-14 03:17:48 -05:00
|
|
|
func setAccessControlPermissions(acmock *accesscontrolmock.Mock, perms []accesscontrol.Permission, org int64) {
|
2022-02-11 10:40:43 -06:00
|
|
|
acmock.GetUserPermissionsFunc =
|
2022-08-10 04:56:48 -05:00
|
|
|
func(_ context.Context, u *user.SignedInUser, _ accesscontrol.Options) ([]accesscontrol.Permission, error) {
|
2022-08-11 06:28:55 -05:00
|
|
|
if u.OrgID == org {
|
2022-02-11 10:40:43 -06:00
|
|
|
return perms, nil
|
|
|
|
}
|
|
|
|
return nil, nil
|
2021-11-17 03:12:28 -06:00
|
|
|
}
|
2021-10-27 06:13:59 -05:00
|
|
|
}
|
|
|
|
|
2021-11-17 03:12:28 -06:00
|
|
|
// setInitCtxSignedInUser sets a copy of the user in initCtx
|
2022-08-10 04:56:48 -05:00
|
|
|
func setInitCtxSignedInUser(initCtx *models.ReqContext, user user.SignedInUser) {
|
2021-11-17 03:12:28 -06:00
|
|
|
initCtx.IsSignedIn = true
|
|
|
|
initCtx.SignedInUser = &user
|
|
|
|
}
|
|
|
|
|
2021-10-27 06:13:59 -05:00
|
|
|
func setInitCtxSignedInViewer(initCtx *models.ReqContext) {
|
|
|
|
initCtx.IsSignedIn = true
|
2022-08-11 06:28:55 -05:00
|
|
|
initCtx.SignedInUser = &user.SignedInUser{UserID: testUserID, OrgID: 1, OrgRole: org.RoleViewer, Login: testUserLogin}
|
2021-10-27 06:13:59 -05:00
|
|
|
}
|
|
|
|
|
2022-01-10 11:05:53 -06:00
|
|
|
func setInitCtxSignedInEditor(initCtx *models.ReqContext) {
|
|
|
|
initCtx.IsSignedIn = true
|
2022-08-11 06:28:55 -05:00
|
|
|
initCtx.SignedInUser = &user.SignedInUser{UserID: testUserID, OrgID: 1, OrgRole: org.RoleEditor, Login: testUserLogin}
|
2022-01-10 11:05:53 -06:00
|
|
|
}
|
|
|
|
|
2021-10-27 06:13:59 -05:00
|
|
|
func setInitCtxSignedInOrgAdmin(initCtx *models.ReqContext) {
|
|
|
|
initCtx.IsSignedIn = true
|
2022-08-11 06:28:55 -05:00
|
|
|
initCtx.SignedInUser = &user.SignedInUser{UserID: testUserID, OrgID: 1, OrgRole: org.RoleAdmin, Login: testUserLogin}
|
2021-10-27 06:13:59 -05:00
|
|
|
}
|
|
|
|
|
2022-01-26 11:44:20 -06:00
|
|
|
func setupSimpleHTTPServer(features *featuremgmt.FeatureManager) *HTTPServer {
|
|
|
|
if features == nil {
|
|
|
|
features = featuremgmt.WithFeatures()
|
|
|
|
}
|
|
|
|
cfg := setting.NewCfg()
|
2022-08-11 08:37:31 -05:00
|
|
|
cfg.RBACEnabled = false
|
2022-01-26 11:44:20 -06:00
|
|
|
cfg.IsFeatureToggleEnabled = features.IsEnabled
|
|
|
|
|
|
|
|
return &HTTPServer{
|
2022-09-19 02:54:37 -05:00
|
|
|
Cfg: cfg,
|
|
|
|
Features: features,
|
|
|
|
License: &licensing.OSSLicensingService{},
|
|
|
|
AccessControl: accesscontrolmock.New().WithDisabled(),
|
|
|
|
annotationsRepo: annotationstest.NewFakeAnnotationsRepo(),
|
2022-01-26 11:44:20 -06:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-08-16 09:08:59 -05:00
|
|
|
func setupHTTPServer(t *testing.T, useFakeAccessControl bool, options ...APITestServerOption) accessControlScenarioContext {
|
|
|
|
return setupHTTPServerWithCfg(t, useFakeAccessControl, setting.NewCfg(), options...)
|
2022-01-10 11:05:53 -06:00
|
|
|
}
|
|
|
|
|
2022-08-16 09:08:59 -05:00
|
|
|
func setupHTTPServerWithCfg(t *testing.T, useFakeAccessControl bool, cfg *setting.Cfg, options ...APITestServerOption) accessControlScenarioContext {
|
2022-05-16 05:45:41 -05:00
|
|
|
db := sqlstore.InitTestDB(t, sqlstore.InitTestDBOpt{})
|
2022-08-16 09:08:59 -05:00
|
|
|
return setupHTTPServerWithCfgDb(t, useFakeAccessControl, cfg, db, db, featuremgmt.WithFeatures(), options...)
|
2022-03-07 12:33:01 -06:00
|
|
|
}
|
|
|
|
|
2022-08-16 09:08:59 -05:00
|
|
|
func setupHTTPServerWithCfgDb(
|
|
|
|
t *testing.T, useFakeAccessControl bool, cfg *setting.Cfg, db *sqlstore.SQLStore,
|
|
|
|
store sqlstore.Store, features *featuremgmt.FeatureManager, options ...APITestServerOption,
|
|
|
|
) accessControlScenarioContext {
|
2022-01-10 11:05:53 -06:00
|
|
|
t.Helper()
|
|
|
|
|
2022-08-11 08:37:31 -05:00
|
|
|
db.Cfg.RBACEnabled = cfg.RBACEnabled
|
2022-01-26 11:44:20 -06:00
|
|
|
|
2022-06-07 04:02:20 -05:00
|
|
|
license := &licensing.OSSLicensingService{}
|
2022-01-26 08:48:41 -06:00
|
|
|
routeRegister := routing.NewRouteRegister()
|
2022-09-22 12:16:21 -05:00
|
|
|
teamService := teamimpl.ProvideService(db, cfg)
|
2022-09-21 07:04:01 -05:00
|
|
|
dashboardsStore := dashboardsstore.ProvideDashboardStore(db, featuremgmt.WithFeatures(), tagimpl.ProvideService(db))
|
2022-03-07 12:33:01 -06:00
|
|
|
|
2022-06-07 04:02:20 -05:00
|
|
|
var acmock *accesscontrolmock.Mock
|
|
|
|
var ac accesscontrol.AccessControl
|
2022-08-24 06:29:17 -05:00
|
|
|
var acService accesscontrol.Service
|
2021-10-27 06:13:59 -05:00
|
|
|
|
2021-11-17 03:12:28 -06:00
|
|
|
// Defining the accesscontrol service has to be done before registering routes
|
|
|
|
if useFakeAccessControl {
|
|
|
|
acmock = accesscontrolmock.New()
|
2022-08-11 08:37:31 -05:00
|
|
|
if !cfg.RBACEnabled {
|
2021-11-17 03:12:28 -06:00
|
|
|
acmock = acmock.WithDisabled()
|
|
|
|
}
|
2022-06-07 04:02:20 -05:00
|
|
|
ac = acmock
|
2022-08-24 06:29:17 -05:00
|
|
|
acService = acmock
|
2021-11-17 03:12:28 -06:00
|
|
|
} else {
|
2022-06-07 04:02:20 -05:00
|
|
|
var err error
|
2022-09-15 04:34:15 -05:00
|
|
|
acService, err = acimpl.ProvideService(cfg, db, routeRegister, localcache.ProvideService())
|
2022-01-26 08:48:41 -06:00
|
|
|
require.NoError(t, err)
|
2022-09-09 02:07:45 -05:00
|
|
|
ac = acimpl.ProvideAccessControl(cfg)
|
2021-11-17 03:12:28 -06:00
|
|
|
}
|
|
|
|
|
2022-09-22 12:16:21 -05:00
|
|
|
teamPermissionService, err := ossaccesscontrol.ProvideTeamPermissions(cfg, routeRegister, db, ac, license, acService, teamService)
|
2022-06-07 04:02:20 -05:00
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
// Create minimal HTTP Server
|
2022-08-04 06:22:43 -05:00
|
|
|
userMock := usertest.NewUserServiceFake()
|
|
|
|
userMock.ExpectedUser = &user.User{ID: 1}
|
2022-06-07 04:02:20 -05:00
|
|
|
hs := &HTTPServer{
|
|
|
|
Cfg: cfg,
|
|
|
|
Features: features,
|
|
|
|
Live: newTestLive(t, db),
|
2022-07-15 11:06:44 -05:00
|
|
|
QuotaService: "aimpl.Service{Cfg: cfg},
|
2022-06-07 04:02:20 -05:00
|
|
|
RouteRegister: routeRegister,
|
|
|
|
SQLStore: store,
|
|
|
|
License: &licensing.OSSLicensingService{},
|
|
|
|
AccessControl: ac,
|
2022-08-24 06:29:17 -05:00
|
|
|
accesscontrolService: acService,
|
2022-06-07 04:02:20 -05:00
|
|
|
teamPermissionsService: teamPermissionService,
|
2022-08-16 07:24:57 -05:00
|
|
|
searchUsersService: searchusers.ProvideUsersService(filters.ProvideOSSSearchUserFilter(), usertest.NewUserServiceFake()),
|
2022-07-06 13:42:39 -05:00
|
|
|
DashboardService: dashboardservice.ProvideDashboardService(
|
2022-06-07 04:02:20 -05:00
|
|
|
cfg, dashboardsStore, nil, features,
|
|
|
|
accesscontrolmock.NewMockedPermissionsService(), accesscontrolmock.NewMockedPermissionsService(), ac,
|
|
|
|
),
|
|
|
|
preferenceService: preftest.NewPreferenceServiceFake(),
|
2022-08-04 06:22:43 -05:00
|
|
|
userService: userMock,
|
2022-09-20 02:55:40 -05:00
|
|
|
orgService: orgtest.NewOrgServiceFake(),
|
2022-09-20 11:58:04 -05:00
|
|
|
teamService: teamService,
|
2022-09-19 02:54:37 -05:00
|
|
|
annotationsRepo: annotationstest.NewFakeAnnotationsRepo(),
|
2022-06-07 04:02:20 -05:00
|
|
|
}
|
|
|
|
|
2022-08-16 09:08:59 -05:00
|
|
|
for _, o := range options {
|
|
|
|
o(hs)
|
|
|
|
}
|
|
|
|
|
2022-06-07 04:02:20 -05:00
|
|
|
require.NoError(t, hs.declareFixedRoles())
|
2022-08-24 06:29:17 -05:00
|
|
|
require.NoError(t, hs.accesscontrolService.(accesscontrol.RoleRegistry).RegisterFixedRoles(context.Background()))
|
2022-06-07 04:02:20 -05:00
|
|
|
|
2021-10-27 06:13:59 -05:00
|
|
|
// Instantiate a new Server
|
|
|
|
m := web.New()
|
|
|
|
|
|
|
|
// middleware to set the test initial context
|
|
|
|
initCtx := &models.ReqContext{}
|
|
|
|
m.Use(func(c *web.Context) {
|
|
|
|
initCtx.Context = c
|
|
|
|
initCtx.Logger = log.New("api-test")
|
2022-05-20 11:45:18 -05:00
|
|
|
c.Req = c.Req.WithContext(ctxkey.Set(c.Req.Context(), initCtx))
|
2021-10-27 06:13:59 -05:00
|
|
|
})
|
|
|
|
|
2022-08-24 06:29:17 -05:00
|
|
|
m.Use(accesscontrol.LoadPermissionsMiddleware(hs.accesscontrolService))
|
2022-01-13 07:40:32 -06:00
|
|
|
|
2021-10-27 06:13:59 -05:00
|
|
|
// Register all routes
|
|
|
|
hs.registerRoutes()
|
|
|
|
hs.RouteRegister.Register(m.Router)
|
|
|
|
|
|
|
|
return accessControlScenarioContext{
|
2022-02-16 07:15:44 -06:00
|
|
|
server: m,
|
|
|
|
initCtx: initCtx,
|
|
|
|
hs: hs,
|
|
|
|
acmock: acmock,
|
|
|
|
db: db,
|
|
|
|
cfg: cfg,
|
|
|
|
dashboardsStore: dashboardsStore,
|
2022-09-20 11:58:04 -05:00
|
|
|
teamService: teamService,
|
2022-08-16 09:08:59 -05:00
|
|
|
usermock: userMock,
|
2021-10-27 06:13:59 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func callAPI(server *web.Mux, method, path string, body io.Reader, t *testing.T) *httptest.ResponseRecorder {
|
|
|
|
req, err := http.NewRequest(method, path, body)
|
|
|
|
require.NoError(t, err)
|
|
|
|
req.Header.Set("Content-Type", "application/json")
|
|
|
|
recorder := httptest.NewRecorder()
|
|
|
|
server.ServeHTTP(recorder, req)
|
|
|
|
return recorder
|
|
|
|
}
|
2021-11-29 03:18:01 -06:00
|
|
|
|
|
|
|
func mockRequestBody(v interface{}) io.ReadCloser {
|
|
|
|
b, _ := json.Marshal(v)
|
|
|
|
return io.NopCloser(bytes.NewReader(b))
|
|
|
|
}
|
2022-03-10 11:38:04 -06:00
|
|
|
|
|
|
|
// APITestServerOption option func for customizing HTTPServer configuration
|
|
|
|
// when setting up an API test server via SetupAPITestServer.
|
|
|
|
type APITestServerOption func(hs *HTTPServer)
|
|
|
|
|
|
|
|
// SetupAPITestServer sets up a webtest.Server ready for testing all
|
|
|
|
// routes registered via HTTPServer.registerRoutes().
|
|
|
|
// Optionally customize HTTPServer configuration by providing APITestServerOption
|
|
|
|
// option(s).
|
|
|
|
func SetupAPITestServer(t *testing.T, opts ...APITestServerOption) *webtest.Server {
|
|
|
|
t.Helper()
|
|
|
|
|
|
|
|
hs := &HTTPServer{
|
|
|
|
RouteRegister: routing.NewRouteRegister(),
|
|
|
|
Cfg: setting.NewCfg(),
|
2022-05-25 13:40:41 -05:00
|
|
|
License: &licensing.OSSLicensingService{},
|
2022-03-10 11:38:04 -06:00
|
|
|
AccessControl: accesscontrolmock.New().WithDisabled(),
|
|
|
|
Features: featuremgmt.WithFeatures(),
|
|
|
|
searchUsersService: &searchusers.OSSService{},
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, opt := range opts {
|
|
|
|
opt(hs)
|
|
|
|
}
|
|
|
|
|
|
|
|
hs.registerRoutes()
|
|
|
|
s := webtest.NewServer(t, hs.RouteRegister)
|
|
|
|
return s
|
|
|
|
}
|
2022-08-03 10:17:26 -05:00
|
|
|
|
|
|
|
var (
|
2022-08-10 04:56:48 -05:00
|
|
|
viewerRole = org.RoleViewer
|
|
|
|
editorRole = org.RoleEditor
|
2022-08-03 10:17:26 -05:00
|
|
|
)
|
|
|
|
|
|
|
|
type setUpConf struct {
|
|
|
|
aclMockResp []*models.DashboardACLInfoDTO
|
|
|
|
}
|
|
|
|
|
|
|
|
type mockSearchService struct{ ExpectedResult models.HitList }
|
|
|
|
|
|
|
|
func (mss *mockSearchService) SearchHandler(_ context.Context, q *search.Query) error {
|
|
|
|
q.Result = mss.ExpectedResult
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
func (mss *mockSearchService) SortOptions() []models.SortOption { return nil }
|
|
|
|
|
|
|
|
func setUp(confs ...setUpConf) *HTTPServer {
|
|
|
|
singleAlert := &models.Alert{Id: 1, DashboardId: 1, Name: "singlealert"}
|
|
|
|
store := mockstore.NewSQLStoreMock()
|
|
|
|
hs := &HTTPServer{SQLStore: store, SearchService: &mockSearchService{}}
|
|
|
|
store.ExpectedAlert = singleAlert
|
|
|
|
|
|
|
|
aclMockResp := []*models.DashboardACLInfoDTO{}
|
|
|
|
for _, c := range confs {
|
|
|
|
if c.aclMockResp != nil {
|
|
|
|
aclMockResp = c.aclMockResp
|
|
|
|
}
|
|
|
|
}
|
|
|
|
store.ExpectedTeamsByUser = []*models.TeamDTO{}
|
2022-09-20 11:58:04 -05:00
|
|
|
teamSvc := &teamtest.FakeService{}
|
2022-08-03 10:17:26 -05:00
|
|
|
dashSvc := &dashboards.FakeDashboardService{}
|
|
|
|
dashSvc.On("GetDashboardACLInfoList", mock.Anything, mock.AnythingOfType("*models.GetDashboardACLInfoListQuery")).Run(func(args mock.Arguments) {
|
|
|
|
q := args.Get(1).(*models.GetDashboardACLInfoListQuery)
|
|
|
|
q.Result = aclMockResp
|
|
|
|
}).Return(nil)
|
2022-09-20 11:58:04 -05:00
|
|
|
guardian.InitLegacyGuardian(store, dashSvc, teamSvc)
|
2022-08-03 10:17:26 -05:00
|
|
|
return hs
|
|
|
|
}
|