mirror of
https://github.com/grafana/grafana.git
synced 2025-02-25 18:55:37 -06:00
Feature Flags: use FeatureToggles interface where possible (#85131)
* Feature Flags: use FeatureToggles interface where possible Signed-off-by: Dave Henderson <dave.henderson@grafana.com> * Replace TestFeatureToggles with existing WithFeatures Signed-off-by: Dave Henderson <dave.henderson@grafana.com> --------- Signed-off-by: Dave Henderson <dave.henderson@grafana.com>
This commit is contained in:
parent
67045aa90c
commit
5687243d0b
@ -171,7 +171,7 @@ func TestCallResource(t *testing.T) {
|
|||||||
Backend: true,
|
Backend: true,
|
||||||
},
|
},
|
||||||
}))
|
}))
|
||||||
middlewares := pluginsintegration.CreateMiddlewares(cfg, &oauthtokentest.Service{}, tracing.InitializeTracerForTest(), &caching.OSSCachingService{}, &featuremgmt.FeatureManager{}, prometheus.DefaultRegisterer, pluginRegistry)
|
middlewares := pluginsintegration.CreateMiddlewares(cfg, &oauthtokentest.Service{}, tracing.InitializeTracerForTest(), &caching.OSSCachingService{}, featuremgmt.WithFeatures(), prometheus.DefaultRegisterer, pluginRegistry)
|
||||||
pc, err := pluginClient.NewDecorator(&fakes.FakePluginClient{
|
pc, err := pluginClient.NewDecorator(&fakes.FakePluginClient{
|
||||||
CallResourceHandlerFunc: backend.CallResourceHandlerFunc(func(ctx context.Context,
|
CallResourceHandlerFunc: backend.CallResourceHandlerFunc(func(ctx context.Context,
|
||||||
req *backend.CallResourceRequest, sender backend.CallResourceResponseSender) error {
|
req *backend.CallResourceRequest, sender backend.CallResourceResponseSender) error {
|
||||||
|
@ -33,7 +33,7 @@ import (
|
|||||||
"github.com/grafana/grafana/pkg/setting"
|
"github.com/grafana/grafana/pkg/setting"
|
||||||
)
|
)
|
||||||
|
|
||||||
func initConflictCfg(cmd *utils.ContextCommandLine) (*setting.Cfg, *featuremgmt.FeatureManager, error) {
|
func initConflictCfg(cmd *utils.ContextCommandLine) (*setting.Cfg, featuremgmt.FeatureToggles, error) {
|
||||||
configOptions := strings.Split(cmd.String("configOverrides"), " ")
|
configOptions := strings.Split(cmd.String("configOverrides"), " ")
|
||||||
configOptions = append(configOptions, cmd.Args().Slice()...)
|
configOptions = append(configOptions, cmd.Args().Slice()...)
|
||||||
cfg, err := setting.NewCfgFromArgs(setting.CommandLineArgs{
|
cfg, err := setting.NewCfgFromArgs(setting.CommandLineArgs{
|
||||||
|
@ -19,7 +19,7 @@ import (
|
|||||||
func TestConvertDataFramesToResults(t *testing.T) {
|
func TestConvertDataFramesToResults(t *testing.T) {
|
||||||
s := &Service{
|
s := &Service{
|
||||||
cfg: setting.NewCfg(),
|
cfg: setting.NewCfg(),
|
||||||
features: &featuremgmt.FeatureManager{},
|
features: featuremgmt.WithFeatures(),
|
||||||
tracer: tracing.InitializeTracerForTest(),
|
tracer: tracing.InitializeTracerForTest(),
|
||||||
metrics: newMetrics(nil),
|
metrics: newMetrics(nil),
|
||||||
}
|
}
|
||||||
|
@ -138,7 +138,7 @@ func TestDSQueryError(t *testing.T) {
|
|||||||
cfg: setting.NewCfg(),
|
cfg: setting.NewCfg(),
|
||||||
dataService: me,
|
dataService: me,
|
||||||
pCtxProvider: pCtxProvider,
|
pCtxProvider: pCtxProvider,
|
||||||
features: &featuremgmt.FeatureManager{},
|
features: featuremgmt.WithFeatures(),
|
||||||
tracer: tracing.InitializeTracerForTest(),
|
tracer: tracing.InitializeTracerForTest(),
|
||||||
metrics: newMetrics(nil),
|
metrics: newMetrics(nil),
|
||||||
}
|
}
|
||||||
|
@ -35,14 +35,14 @@ var resourceInfo = v0alpha1.FolderResourceInfo
|
|||||||
// This is used just so wire has something unique to return
|
// This is used just so wire has something unique to return
|
||||||
type FolderAPIBuilder struct {
|
type FolderAPIBuilder struct {
|
||||||
gv schema.GroupVersion
|
gv schema.GroupVersion
|
||||||
features *featuremgmt.FeatureManager
|
features featuremgmt.FeatureToggles
|
||||||
namespacer request.NamespaceMapper
|
namespacer request.NamespaceMapper
|
||||||
folderSvc folder.Service
|
folderSvc folder.Service
|
||||||
accessControl accesscontrol.AccessControl
|
accessControl accesscontrol.AccessControl
|
||||||
}
|
}
|
||||||
|
|
||||||
func RegisterAPIService(cfg *setting.Cfg,
|
func RegisterAPIService(cfg *setting.Cfg,
|
||||||
features *featuremgmt.FeatureManager,
|
features featuremgmt.FeatureToggles,
|
||||||
apiregistration builder.APIRegistrar,
|
apiregistration builder.APIRegistrar,
|
||||||
folderSvc folder.Service,
|
folderSvc folder.Service,
|
||||||
accessControl accesscontrol.AccessControl,
|
accessControl accesscontrol.AccessControl,
|
||||||
|
@ -59,7 +59,7 @@ func TestIntegrationProvideFolderService(t *testing.T) {
|
|||||||
cfg := setting.NewCfg()
|
cfg := setting.NewCfg()
|
||||||
ac := acmock.New()
|
ac := acmock.New()
|
||||||
db := sqlstore.InitTestDB(t)
|
db := sqlstore.InitTestDB(t)
|
||||||
ProvideService(ac, bus.ProvideBus(tracing.InitializeTracerForTest()), cfg, nil, nil, db, &featuremgmt.FeatureManager{}, supportbundlestest.NewFakeBundleService(), nil)
|
ProvideService(ac, bus.ProvideBus(tracing.InitializeTracerForTest()), cfg, nil, nil, db, featuremgmt.WithFeatures(), supportbundlestest.NewFakeBundleService(), nil)
|
||||||
|
|
||||||
require.Len(t, ac.Calls.RegisterAttributeScopeResolver, 3)
|
require.Len(t, ac.Calls.RegisterAttributeScopeResolver, 3)
|
||||||
})
|
})
|
||||||
|
@ -634,7 +634,7 @@ func createService(store *fakes.RuleStore) *RulerSrv {
|
|||||||
authz: accesscontrol.NewRuleService(acimpl.ProvideAccessControl(setting.NewCfg())),
|
authz: accesscontrol.NewRuleService(acimpl.ProvideAccessControl(setting.NewCfg())),
|
||||||
amConfigStore: &fakeAMRefresher{},
|
amConfigStore: &fakeAMRefresher{},
|
||||||
amRefresher: &fakeAMRefresher{},
|
amRefresher: &fakeAMRefresher{},
|
||||||
featureManager: &featuremgmt.FeatureManager{},
|
featureManager: featuremgmt.WithFeatures(),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -160,7 +160,7 @@ func TestRouteTestGrafanaRuleConfig(t *testing.T) {
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
srv := createTestingApiSrv(t, nil, ac, eval_mocks.NewEvaluatorFactory(&eval_mocks.ConditionEvaluatorMock{}), &featuremgmt.FeatureManager{}, ruleStore)
|
srv := createTestingApiSrv(t, nil, ac, eval_mocks.NewEvaluatorFactory(&eval_mocks.ConditionEvaluatorMock{}), featuremgmt.WithFeatures(), ruleStore)
|
||||||
|
|
||||||
rule := validRule()
|
rule := validRule()
|
||||||
|
|
||||||
@ -184,7 +184,7 @@ func TestRouteTestGrafanaRuleConfig(t *testing.T) {
|
|||||||
f := randFolder()
|
f := randFolder()
|
||||||
ruleStore := fakes2.NewRuleStore(t)
|
ruleStore := fakes2.NewRuleStore(t)
|
||||||
ruleStore.Folders[rc.OrgID] = []*folder.Folder{f}
|
ruleStore.Folders[rc.OrgID] = []*folder.Folder{f}
|
||||||
srv := createTestingApiSrv(t, nil, ac, eval_mocks.NewEvaluatorFactory(&eval_mocks.ConditionEvaluatorMock{}), &featuremgmt.FeatureManager{}, ruleStore)
|
srv := createTestingApiSrv(t, nil, ac, eval_mocks.NewEvaluatorFactory(&eval_mocks.ConditionEvaluatorMock{}), featuremgmt.WithFeatures(), ruleStore)
|
||||||
|
|
||||||
rule := validRule()
|
rule := validRule()
|
||||||
rule.GrafanaManagedAlert.Data = ApiAlertQueriesFromAlertQueries([]models.AlertQuery{data1, data2})
|
rule.GrafanaManagedAlert.Data = ApiAlertQueriesFromAlertQueries([]models.AlertQuery{data1, data2})
|
||||||
@ -222,7 +222,7 @@ func TestRouteTestGrafanaRuleConfig(t *testing.T) {
|
|||||||
ruleStore := fakes2.NewRuleStore(t)
|
ruleStore := fakes2.NewRuleStore(t)
|
||||||
ruleStore.Folders[rc.OrgID] = []*folder.Folder{f}
|
ruleStore.Folders[rc.OrgID] = []*folder.Folder{f}
|
||||||
|
|
||||||
srv := createTestingApiSrv(t, ds, ac, evalFactory, &featuremgmt.FeatureManager{}, ruleStore)
|
srv := createTestingApiSrv(t, ds, ac, evalFactory, featuremgmt.WithFeatures(), ruleStore)
|
||||||
|
|
||||||
rule := validRule()
|
rule := validRule()
|
||||||
rule.GrafanaManagedAlert.Data = ApiAlertQueriesFromAlertQueries([]models.AlertQuery{data1, data2})
|
rule.GrafanaManagedAlert.Data = ApiAlertQueriesFromAlertQueries([]models.AlertQuery{data1, data2})
|
||||||
@ -299,7 +299,7 @@ func TestRouteEvalQueries(t *testing.T) {
|
|||||||
|
|
||||||
ruleStore := fakes2.NewRuleStore(t)
|
ruleStore := fakes2.NewRuleStore(t)
|
||||||
|
|
||||||
srv := createTestingApiSrv(t, ds, ac, eval_mocks.NewEvaluatorFactory(evaluator), &featuremgmt.FeatureManager{}, ruleStore)
|
srv := createTestingApiSrv(t, ds, ac, eval_mocks.NewEvaluatorFactory(evaluator), featuremgmt.WithFeatures(), ruleStore)
|
||||||
|
|
||||||
response := srv.RouteEvalQueries(rc, definitions.EvalQueriesPayload{
|
response := srv.RouteEvalQueries(rc, definitions.EvalQueriesPayload{
|
||||||
Data: ApiAlertQueriesFromAlertQueries([]models.AlertQuery{data1, data2}),
|
Data: ApiAlertQueriesFromAlertQueries([]models.AlertQuery{data1, data2}),
|
||||||
@ -387,7 +387,7 @@ func TestRouteEvalQueries(t *testing.T) {
|
|||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
func createTestingApiSrv(t *testing.T, ds *fakes.FakeCacheService, ac *acMock.Mock, evaluator eval.EvaluatorFactory, featureManager *featuremgmt.FeatureManager, ruleStore RuleStore) *TestingApiSrv {
|
func createTestingApiSrv(t *testing.T, ds *fakes.FakeCacheService, ac *acMock.Mock, evaluator eval.EvaluatorFactory, featureManager featuremgmt.FeatureToggles, ruleStore RuleStore) *TestingApiSrv {
|
||||||
if ac == nil {
|
if ac == nil {
|
||||||
ac = acMock.New()
|
ac = acMock.New()
|
||||||
}
|
}
|
||||||
|
@ -590,7 +590,7 @@ func TestValidate(t *testing.T) {
|
|||||||
pluginsStore: store,
|
pluginsStore: store,
|
||||||
})
|
})
|
||||||
|
|
||||||
evaluator := NewEvaluatorFactory(setting.UnifiedAlertingSettings{}, cacheService, expr.ProvideService(&setting.Cfg{ExpressionsEnabled: true}, nil, nil, &featuremgmt.FeatureManager{}, nil, tracing.InitializeTracerForTest()), store)
|
evaluator := NewEvaluatorFactory(setting.UnifiedAlertingSettings{}, cacheService, expr.ProvideService(&setting.Cfg{ExpressionsEnabled: true}, nil, nil, featuremgmt.WithFeatures(), nil, tracing.InitializeTracerForTest()), store)
|
||||||
evalCtx := NewContext(context.Background(), u)
|
evalCtx := NewContext(context.Background(), u)
|
||||||
|
|
||||||
err := evaluator.Validate(evalCtx, condition)
|
err := evaluator.Validate(evalCtx, condition)
|
||||||
|
@ -98,7 +98,7 @@ func TestMultiorgAlertmanager_RemoteSecondaryMode(t *testing.T) {
|
|||||||
nil,
|
nil,
|
||||||
nopLogger,
|
nopLogger,
|
||||||
secretsService,
|
secretsService,
|
||||||
&featuremgmt.FeatureManager{},
|
featuremgmt.WithFeatures(),
|
||||||
override,
|
override,
|
||||||
)
|
)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
@ -42,7 +42,7 @@ func TestMultiOrgAlertmanager_SyncAlertmanagersForOrgs(t *testing.T) {
|
|||||||
DisabledOrgs: map[int64]struct{}{5: {}},
|
DisabledOrgs: map[int64]struct{}{5: {}},
|
||||||
}, // do not poll in tests.
|
}, // do not poll in tests.
|
||||||
}
|
}
|
||||||
mam, err := NewMultiOrgAlertmanager(cfg, configStore, orgStore, kvStore, provStore, decryptFn, m.GetMultiOrgAlertmanagerMetrics(), nil, log.New("testlogger"), secretsService, &featuremgmt.FeatureManager{})
|
mam, err := NewMultiOrgAlertmanager(cfg, configStore, orgStore, kvStore, provStore, decryptFn, m.GetMultiOrgAlertmanagerMetrics(), nil, log.New("testlogger"), secretsService, featuremgmt.WithFeatures())
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
ctx := context.Background()
|
ctx := context.Background()
|
||||||
|
|
||||||
@ -150,7 +150,7 @@ func TestMultiOrgAlertmanager_SyncAlertmanagersForOrgsWithFailures(t *testing.T)
|
|||||||
DefaultConfiguration: setting.GetAlertmanagerDefaultConfiguration(),
|
DefaultConfiguration: setting.GetAlertmanagerDefaultConfiguration(),
|
||||||
}, // do not poll in tests.
|
}, // do not poll in tests.
|
||||||
}
|
}
|
||||||
mam, err := NewMultiOrgAlertmanager(cfg, configStore, orgStore, kvStore, provStore, decryptFn, m.GetMultiOrgAlertmanagerMetrics(), nil, log.New("testlogger"), secretsService, &featuremgmt.FeatureManager{})
|
mam, err := NewMultiOrgAlertmanager(cfg, configStore, orgStore, kvStore, provStore, decryptFn, m.GetMultiOrgAlertmanagerMetrics(), nil, log.New("testlogger"), secretsService, featuremgmt.WithFeatures())
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
ctx := context.Background()
|
ctx := context.Background()
|
||||||
|
|
||||||
@ -237,7 +237,7 @@ func TestMultiOrgAlertmanager_AlertmanagerFor(t *testing.T) {
|
|||||||
decryptFn := secretsService.GetDecryptedValue
|
decryptFn := secretsService.GetDecryptedValue
|
||||||
reg := prometheus.NewPedanticRegistry()
|
reg := prometheus.NewPedanticRegistry()
|
||||||
m := metrics.NewNGAlert(reg)
|
m := metrics.NewNGAlert(reg)
|
||||||
mam, err := NewMultiOrgAlertmanager(cfg, configStore, orgStore, kvStore, provStore, decryptFn, m.GetMultiOrgAlertmanagerMetrics(), nil, log.New("testlogger"), secretsService, &featuremgmt.FeatureManager{})
|
mam, err := NewMultiOrgAlertmanager(cfg, configStore, orgStore, kvStore, provStore, decryptFn, m.GetMultiOrgAlertmanagerMetrics(), nil, log.New("testlogger"), secretsService, featuremgmt.WithFeatures())
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
ctx := context.Background()
|
ctx := context.Background()
|
||||||
|
|
||||||
@ -289,7 +289,7 @@ func TestMultiOrgAlertmanager_ActivateHistoricalConfiguration(t *testing.T) {
|
|||||||
decryptFn := secretsService.GetDecryptedValue
|
decryptFn := secretsService.GetDecryptedValue
|
||||||
reg := prometheus.NewPedanticRegistry()
|
reg := prometheus.NewPedanticRegistry()
|
||||||
m := metrics.NewNGAlert(reg)
|
m := metrics.NewNGAlert(reg)
|
||||||
mam, err := NewMultiOrgAlertmanager(cfg, configStore, orgStore, kvStore, provStore, decryptFn, m.GetMultiOrgAlertmanagerMetrics(), nil, log.New("testlogger"), secretsService, &featuremgmt.FeatureManager{})
|
mam, err := NewMultiOrgAlertmanager(cfg, configStore, orgStore, kvStore, provStore, decryptFn, m.GetMultiOrgAlertmanagerMetrics(), nil, log.New("testlogger"), secretsService, featuremgmt.WithFeatures())
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
ctx := context.Background()
|
ctx := context.Background()
|
||||||
|
|
||||||
|
@ -63,7 +63,7 @@ func TestProcessTicks(t *testing.T) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
cacheServ := &datasources.FakeCacheService{}
|
cacheServ := &datasources.FakeCacheService{}
|
||||||
evaluator := eval.NewEvaluatorFactory(setting.UnifiedAlertingSettings{}, cacheServ, expr.ProvideService(&setting.Cfg{ExpressionsEnabled: true}, nil, nil, &featuremgmt.FeatureManager{}, nil, tracing.InitializeTracerForTest()), &pluginstore.FakePluginStore{})
|
evaluator := eval.NewEvaluatorFactory(setting.UnifiedAlertingSettings{}, cacheServ, expr.ProvideService(&setting.Cfg{ExpressionsEnabled: true}, nil, nil, featuremgmt.WithFeatures(), nil, tracing.InitializeTracerForTest()), &pluginstore.FakePluginStore{})
|
||||||
|
|
||||||
schedCfg := SchedulerCfg{
|
schedCfg := SchedulerCfg{
|
||||||
BaseInterval: cfg.BaseInterval,
|
BaseInterval: cfg.BaseInterval,
|
||||||
@ -394,7 +394,7 @@ func setupScheduler(t *testing.T, rs *fakeRulesStore, is *state.FakeInstanceStor
|
|||||||
|
|
||||||
var evaluator = evalMock
|
var evaluator = evalMock
|
||||||
if evalMock == nil {
|
if evalMock == nil {
|
||||||
evaluator = eval.NewEvaluatorFactory(setting.UnifiedAlertingSettings{}, nil, expr.ProvideService(&setting.Cfg{ExpressionsEnabled: true}, nil, nil, &featuremgmt.FeatureManager{}, nil, tracing.InitializeTracerForTest()), &pluginstore.FakePluginStore{})
|
evaluator = eval.NewEvaluatorFactory(setting.UnifiedAlertingSettings{}, nil, expr.ProvideService(&setting.Cfg{ExpressionsEnabled: true}, nil, nil, featuremgmt.WithFeatures(), nil, tracing.InitializeTracerForTest()), &pluginstore.FakePluginStore{})
|
||||||
}
|
}
|
||||||
|
|
||||||
if registry == nil {
|
if registry == nil {
|
||||||
|
@ -411,7 +411,7 @@ func createMultiOrgAlertmanager(t *testing.T, orgs []int64) *notifier.MultiOrgAl
|
|||||||
m := metrics.NewNGAlert(registry)
|
m := metrics.NewNGAlert(registry)
|
||||||
secretsService := secretsManager.SetupTestService(t, fake_secrets.NewFakeSecretsStore())
|
secretsService := secretsManager.SetupTestService(t, fake_secrets.NewFakeSecretsStore())
|
||||||
decryptFn := secretsService.GetDecryptedValue
|
decryptFn := secretsService.GetDecryptedValue
|
||||||
moa, err := notifier.NewMultiOrgAlertmanager(cfg, cfgStore, orgStore, kvStore, fakes.NewFakeProvisioningStore(), decryptFn, m.GetMultiOrgAlertmanagerMetrics(), nil, log.New("testlogger"), secretsService, &featuremgmt.FeatureManager{})
|
moa, err := notifier.NewMultiOrgAlertmanager(cfg, cfgStore, orgStore, kvStore, fakes.NewFakeProvisioningStore(), decryptFn, m.GetMultiOrgAlertmanagerMetrics(), nil, log.New("testlogger"), secretsService, featuremgmt.WithFeatures())
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
require.NoError(t, moa.LoadAndSyncAlertmanagersForOrgs(context.Background()))
|
require.NoError(t, moa.LoadAndSyncAlertmanagersForOrgs(context.Background()))
|
||||||
require.Eventually(t, func() bool {
|
require.Eventually(t, func() bool {
|
||||||
|
@ -141,7 +141,7 @@ func ProvideClientDecorator(
|
|||||||
oAuthTokenService oauthtoken.OAuthTokenService,
|
oAuthTokenService oauthtoken.OAuthTokenService,
|
||||||
tracer tracing.Tracer,
|
tracer tracing.Tracer,
|
||||||
cachingService caching.CachingService,
|
cachingService caching.CachingService,
|
||||||
features *featuremgmt.FeatureManager,
|
features featuremgmt.FeatureToggles,
|
||||||
promRegisterer prometheus.Registerer,
|
promRegisterer prometheus.Registerer,
|
||||||
) (*client.Decorator, error) {
|
) (*client.Decorator, error) {
|
||||||
return NewClientDecorator(cfg, pluginRegistry, oAuthTokenService, tracer, cachingService, features, promRegisterer, pluginRegistry)
|
return NewClientDecorator(cfg, pluginRegistry, oAuthTokenService, tracer, cachingService, features, promRegisterer, pluginRegistry)
|
||||||
@ -150,7 +150,7 @@ func ProvideClientDecorator(
|
|||||||
func NewClientDecorator(
|
func NewClientDecorator(
|
||||||
cfg *setting.Cfg,
|
cfg *setting.Cfg,
|
||||||
pluginRegistry registry.Service, oAuthTokenService oauthtoken.OAuthTokenService,
|
pluginRegistry registry.Service, oAuthTokenService oauthtoken.OAuthTokenService,
|
||||||
tracer tracing.Tracer, cachingService caching.CachingService, features *featuremgmt.FeatureManager,
|
tracer tracing.Tracer, cachingService caching.CachingService, features featuremgmt.FeatureToggles,
|
||||||
promRegisterer prometheus.Registerer, registry registry.Service,
|
promRegisterer prometheus.Registerer, registry registry.Service,
|
||||||
) (*client.Decorator, error) {
|
) (*client.Decorator, error) {
|
||||||
c := client.ProvideService(pluginRegistry)
|
c := client.ProvideService(pluginRegistry)
|
||||||
@ -158,7 +158,7 @@ func NewClientDecorator(
|
|||||||
return client.NewDecorator(c, middlewares...)
|
return client.NewDecorator(c, middlewares...)
|
||||||
}
|
}
|
||||||
|
|
||||||
func CreateMiddlewares(cfg *setting.Cfg, oAuthTokenService oauthtoken.OAuthTokenService, tracer tracing.Tracer, cachingService caching.CachingService, features *featuremgmt.FeatureManager, promRegisterer prometheus.Registerer, registry registry.Service) []plugins.ClientMiddleware {
|
func CreateMiddlewares(cfg *setting.Cfg, oAuthTokenService oauthtoken.OAuthTokenService, tracer tracing.Tracer, cachingService caching.CachingService, features featuremgmt.FeatureToggles, promRegisterer prometheus.Registerer, registry registry.Service) []plugins.ClientMiddleware {
|
||||||
middlewares := []plugins.ClientMiddleware{
|
middlewares := []plugins.ClientMiddleware{
|
||||||
clientmiddleware.NewPluginRequestMetaMiddleware(),
|
clientmiddleware.NewPluginRequestMetaMiddleware(),
|
||||||
clientmiddleware.NewTracingMiddleware(tracer),
|
clientmiddleware.NewTracingMiddleware(tracer),
|
||||||
|
@ -484,7 +484,7 @@ func setup(t *testing.T) *testContext {
|
|||||||
pluginSettings.ProvideService(sqlStore, secretsService), pluginconfig.NewFakePluginRequestConfigProvider(),
|
pluginSettings.ProvideService(sqlStore, secretsService), pluginconfig.NewFakePluginRequestConfigProvider(),
|
||||||
)
|
)
|
||||||
exprService := expr.ProvideService(&setting.Cfg{ExpressionsEnabled: true}, pc, pCtxProvider,
|
exprService := expr.ProvideService(&setting.Cfg{ExpressionsEnabled: true}, pc, pCtxProvider,
|
||||||
&featuremgmt.FeatureManager{}, nil, tracing.InitializeTracerForTest())
|
featuremgmt.WithFeatures(), nil, tracing.InitializeTracerForTest())
|
||||||
queryService := ProvideService(setting.NewCfg(), dc, exprService, rv, pc, pCtxProvider) // provider belonging to this package
|
queryService := ProvideService(setting.NewCfg(), dc, exprService, rv, pc, pCtxProvider) // provider belonging to this package
|
||||||
return &testContext{
|
return &testContext{
|
||||||
pluginContext: pc,
|
pluginContext: pc,
|
||||||
|
@ -42,7 +42,7 @@ type RenderingService struct {
|
|||||||
|
|
||||||
perRequestRenderKeyProvider renderKeyProvider
|
perRequestRenderKeyProvider renderKeyProvider
|
||||||
Cfg *setting.Cfg
|
Cfg *setting.Cfg
|
||||||
features *featuremgmt.FeatureManager
|
features featuremgmt.FeatureToggles
|
||||||
RemoteCacheService *remotecache.RemoteCache
|
RemoteCacheService *remotecache.RemoteCache
|
||||||
RendererPluginManager PluginManager
|
RendererPluginManager PluginManager
|
||||||
}
|
}
|
||||||
@ -57,7 +57,7 @@ type Plugin interface {
|
|||||||
Version() string
|
Version() string
|
||||||
}
|
}
|
||||||
|
|
||||||
func ProvideService(cfg *setting.Cfg, features *featuremgmt.FeatureManager, remoteCache *remotecache.RemoteCache, rm PluginManager) (*RenderingService, error) {
|
func ProvideService(cfg *setting.Cfg, features featuremgmt.FeatureToggles, remoteCache *remotecache.RemoteCache, rm PluginManager) (*RenderingService, error) {
|
||||||
folders := []string{
|
folders := []string{
|
||||||
cfg.ImagesDir,
|
cfg.ImagesDir,
|
||||||
cfg.CSVsDir,
|
cfg.CSVsDir,
|
||||||
|
@ -38,7 +38,7 @@ func NewServiceAccountsAPI(
|
|||||||
accesscontrolService accesscontrol.Service,
|
accesscontrolService accesscontrol.Service,
|
||||||
routerRegister routing.RouteRegister,
|
routerRegister routing.RouteRegister,
|
||||||
permissionService accesscontrol.ServiceAccountPermissionsService,
|
permissionService accesscontrol.ServiceAccountPermissionsService,
|
||||||
features *featuremgmt.FeatureManager,
|
features featuremgmt.FeatureToggles,
|
||||||
) *ServiceAccountsAPI {
|
) *ServiceAccountsAPI {
|
||||||
return &ServiceAccountsAPI{
|
return &ServiceAccountsAPI{
|
||||||
cfg: cfg,
|
cfg: cfg,
|
||||||
|
@ -34,7 +34,7 @@ type ExtSvcAccountsService struct {
|
|||||||
tracer tracing.Tracer
|
tracer tracing.Tracer
|
||||||
}
|
}
|
||||||
|
|
||||||
func ProvideExtSvcAccountsService(acSvc ac.Service, bus bus.Bus, db db.DB, features *featuremgmt.FeatureManager, reg prometheus.Registerer, saSvc *manager.ServiceAccountsService, secretsSvc secrets.Service, tracer tracing.Tracer) *ExtSvcAccountsService {
|
func ProvideExtSvcAccountsService(acSvc ac.Service, bus bus.Bus, db db.DB, features featuremgmt.FeatureToggles, reg prometheus.Registerer, saSvc *manager.ServiceAccountsService, secretsSvc secrets.Service, tracer tracing.Tracer) *ExtSvcAccountsService {
|
||||||
logger := log.New("serviceauth.extsvcaccounts")
|
logger := log.New("serviceauth.extsvcaccounts")
|
||||||
esa := &ExtSvcAccountsService{
|
esa := &ExtSvcAccountsService{
|
||||||
acSvc: acSvc,
|
acSvc: acSvc,
|
||||||
|
@ -30,7 +30,7 @@ func ProvideServiceAccountsProxy(
|
|||||||
cfg *setting.Cfg,
|
cfg *setting.Cfg,
|
||||||
ac accesscontrol.AccessControl,
|
ac accesscontrol.AccessControl,
|
||||||
accesscontrolService accesscontrol.Service,
|
accesscontrolService accesscontrol.Service,
|
||||||
features *featuremgmt.FeatureManager,
|
features featuremgmt.FeatureToggles,
|
||||||
permissionService accesscontrol.ServiceAccountPermissionsService,
|
permissionService accesscontrol.ServiceAccountPermissionsService,
|
||||||
proxiedService *manager.ServiceAccountsService,
|
proxiedService *manager.ServiceAccountsService,
|
||||||
routeRegister routing.RouteRegister,
|
routeRegister routing.RouteRegister,
|
||||||
|
@ -23,7 +23,7 @@ type Api struct {
|
|||||||
Log log.Logger
|
Log log.Logger
|
||||||
RouteRegister routing.RouteRegister
|
RouteRegister routing.RouteRegister
|
||||||
AccessControl ac.AccessControl
|
AccessControl ac.AccessControl
|
||||||
Features *featuremgmt.FeatureManager
|
Features featuremgmt.FeatureToggles
|
||||||
SSOSettingsService ssosettings.Service
|
SSOSettingsService ssosettings.Service
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -31,7 +31,7 @@ type Service struct {
|
|||||||
accessControl ac.AccessControl
|
accessControl ac.AccessControl
|
||||||
bundleRegistry *bundleregistry.Service
|
bundleRegistry *bundleregistry.Service
|
||||||
cfg *setting.Cfg
|
cfg *setting.Cfg
|
||||||
features *featuremgmt.FeatureManager
|
features featuremgmt.FeatureToggles
|
||||||
pluginSettings pluginsettings.Service
|
pluginSettings pluginsettings.Service
|
||||||
pluginStore pluginstore.Store
|
pluginStore pluginstore.Store
|
||||||
store bundleStore
|
store bundleStore
|
||||||
@ -49,7 +49,7 @@ func ProvideService(
|
|||||||
accesscontrolService ac.Service,
|
accesscontrolService ac.Service,
|
||||||
bundleRegistry *bundleregistry.Service,
|
bundleRegistry *bundleregistry.Service,
|
||||||
cfg *setting.Cfg,
|
cfg *setting.Cfg,
|
||||||
features *featuremgmt.FeatureManager,
|
features featuremgmt.FeatureToggles,
|
||||||
httpServer *grafanaApi.HTTPServer,
|
httpServer *grafanaApi.HTTPServer,
|
||||||
kvStore kvstore.KVStore,
|
kvStore kvstore.KVStore,
|
||||||
pluginSettings pluginsettings.Service,
|
pluginSettings pluginsettings.Service,
|
||||||
|
Loading…
Reference in New Issue
Block a user