mirror of
https://github.com/grafana/grafana.git
synced 2025-02-25 18:55:37 -06:00
* move access control api to SignedInUser interface * remove unused code * add logic for reading perms from a specific org * move the specific org logic to org_user.go * add a comment --------- Co-authored-by: IevaVasiljeva <ieva.vasiljeva@grafana.com>
56 lines
2.4 KiB
Go
56 lines
2.4 KiB
Go
package mock
|
|
|
|
import (
|
|
"context"
|
|
|
|
"github.com/stretchr/testify/mock"
|
|
|
|
"github.com/grafana/grafana/pkg/services/accesscontrol"
|
|
"github.com/grafana/grafana/pkg/services/auth/identity"
|
|
)
|
|
|
|
var _ accesscontrol.PermissionsService = new(MockPermissionsService)
|
|
|
|
func NewMockedPermissionsService() *MockPermissionsService {
|
|
return &MockPermissionsService{}
|
|
}
|
|
|
|
type MockPermissionsService struct {
|
|
mock.Mock
|
|
}
|
|
|
|
func (m *MockPermissionsService) GetPermissions(ctx context.Context, user identity.Requester, resourceID string) ([]accesscontrol.ResourcePermission, error) {
|
|
mockedArgs := m.Called(ctx, user, resourceID)
|
|
return mockedArgs.Get(0).([]accesscontrol.ResourcePermission), mockedArgs.Error(1)
|
|
}
|
|
|
|
func (m *MockPermissionsService) SetUserPermission(ctx context.Context, orgID int64, user accesscontrol.User, resourceID, permission string) (*accesscontrol.ResourcePermission, error) {
|
|
mockedArgs := m.Called(ctx, orgID, user, resourceID, permission)
|
|
return mockedArgs.Get(0).(*accesscontrol.ResourcePermission), mockedArgs.Error(1)
|
|
}
|
|
|
|
func (m *MockPermissionsService) SetTeamPermission(ctx context.Context, orgID, teamID int64, resourceID, permission string) (*accesscontrol.ResourcePermission, error) {
|
|
mockedArgs := m.Called(ctx, orgID, teamID, resourceID, permission)
|
|
return mockedArgs.Get(0).(*accesscontrol.ResourcePermission), mockedArgs.Error(1)
|
|
}
|
|
|
|
func (m *MockPermissionsService) SetBuiltInRolePermission(ctx context.Context, orgID int64, builtInRole, resourceID, permission string) (*accesscontrol.ResourcePermission, error) {
|
|
mockedArgs := m.Called(ctx, orgID, builtInRole, resourceID, permission)
|
|
return mockedArgs.Get(0).(*accesscontrol.ResourcePermission), mockedArgs.Error(1)
|
|
}
|
|
|
|
func (m *MockPermissionsService) SetPermissions(ctx context.Context, orgID int64, resourceID string, commands ...accesscontrol.SetResourcePermissionCommand) ([]accesscontrol.ResourcePermission, error) {
|
|
mockedArgs := m.Called(ctx, orgID, resourceID, commands)
|
|
return mockedArgs.Get(0).([]accesscontrol.ResourcePermission), mockedArgs.Error(1)
|
|
}
|
|
|
|
func (m *MockPermissionsService) DeleteResourcePermissions(ctx context.Context, orgID int64, resourceID string) error {
|
|
mockedArgs := m.Called(ctx, orgID, resourceID)
|
|
return mockedArgs.Error(1)
|
|
}
|
|
|
|
func (m *MockPermissionsService) MapActions(permission accesscontrol.ResourcePermission) string {
|
|
mockedArgs := m.Called(permission)
|
|
return mockedArgs.Get(0).(string)
|
|
}
|