mirror of
https://github.com/grafana/grafana.git
synced 2025-02-25 18:55:37 -06:00
* Add actions and scopes * add resource service for dashboard and folder * Add dashboard guardian with fgac permission evaluation * Add CanDelete function to guardian interface * Add CanDelete property to folder and dashboard dto and set values * change to correct function name * Add accesscontrol to folder endpoints * add access control to dashboard endpoints * check access for nav links * Add fixed roles for dashboard and folders * use correct package * add hack to override guardian Constructor if accesscontrol is enabled * Add services * Add function to handle api backward compatability * Add permissionServices to HttpServer * Set permission when new dashboard is created * Add default permission when creating new dashboard * Set default permission when creating folder and dashboard * Add access control filter for dashboard search * Add to accept list * Add accesscontrol to dashboardimport * Disable access control in tests * Add check to see if user is allow to create a dashboard * Use SetPermissions * Use function to set several permissions at once * remove permissions for folder and dashboard on delete * update required permission * set permission for provisioning * Add CanCreate to dashboard guardian and set correct permisisons for provisioning * Dont set admin on folder / dashboard creation * Add dashboard and folder permission migrations * Add tests for CanCreate * Add roles and update descriptions * Solve uid to id for dashboard and folder permissions * Add folder and dashboard actions to permission filter * Handle viewer_can_edit flag * set folder and dashboard permissions services * Add dashboard permissions when importing a new dashboard * Set access control permissions on provisioning * Pass feature flags and only set permissions if access control is enabled * only add default permissions for folders and dashboards without folders * Batch create permissions in migrations * Remove `dashboards:edit` action * Remove unused function from interface * Update pkg/services/guardian/accesscontrol_guardian_test.go Co-authored-by: Gabriel MABILLE <gamab@users.noreply.github.com> Co-authored-by: Ieva <ieva.vasiljeva@grafana.com>
217 lines
7.6 KiB
Go
217 lines
7.6 KiB
Go
package api
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"encoding/json"
|
|
"net/http"
|
|
"testing"
|
|
|
|
"github.com/grafana/grafana/pkg/api/routing"
|
|
"github.com/grafana/grafana/pkg/components/simplejson"
|
|
"github.com/grafana/grafana/pkg/models"
|
|
acmock "github.com/grafana/grafana/pkg/services/accesscontrol/mock"
|
|
"github.com/grafana/grafana/pkg/services/dashboardimport"
|
|
"github.com/grafana/grafana/pkg/web/webtest"
|
|
"github.com/stretchr/testify/require"
|
|
)
|
|
|
|
func TestImportDashboardAPI(t *testing.T) {
|
|
t.Run("Quota not reached, schema loader service disabled", func(t *testing.T) {
|
|
importDashboardServiceCalled := false
|
|
service := &serviceMock{
|
|
importDashboardFunc: func(ctx context.Context, req *dashboardimport.ImportDashboardRequest) (*dashboardimport.ImportDashboardResponse, error) {
|
|
importDashboardServiceCalled = true
|
|
return nil, nil
|
|
},
|
|
}
|
|
|
|
schemaLoaderServiceCalled := false
|
|
schemaLoaderService := &schemaLoaderServiceMock{
|
|
dashboardApplyDefaultsFunc: func(input *simplejson.Json) (*simplejson.Json, error) {
|
|
schemaLoaderServiceCalled = true
|
|
return input, nil
|
|
},
|
|
}
|
|
|
|
importDashboardAPI := New(service, quotaServiceFunc(quotaNotReached), schemaLoaderService, nil, acmock.New().WithDisabled())
|
|
routeRegister := routing.NewRouteRegister()
|
|
importDashboardAPI.RegisterAPIEndpoints(routeRegister)
|
|
s := webtest.NewServer(t, routeRegister)
|
|
|
|
t.Run("Not signed in should return 404", func(t *testing.T) {
|
|
cmd := &dashboardimport.ImportDashboardRequest{}
|
|
jsonBytes, err := json.Marshal(cmd)
|
|
require.NoError(t, err)
|
|
req := s.NewRequest(http.MethodPost, "/api/dashboards/import", bytes.NewReader(jsonBytes))
|
|
req.Header.Add("Content-Type", "application/json")
|
|
resp, err := s.Send(req)
|
|
require.NoError(t, err)
|
|
require.NoError(t, resp.Body.Close())
|
|
require.Equal(t, http.StatusUnauthorized, resp.StatusCode)
|
|
})
|
|
|
|
t.Run("Signed in, empty plugin id and dashboard model empty should return error", func(t *testing.T) {
|
|
cmd := &dashboardimport.ImportDashboardRequest{
|
|
PluginId: "",
|
|
Dashboard: nil,
|
|
}
|
|
jsonBytes, err := json.Marshal(cmd)
|
|
require.NoError(t, err)
|
|
req := s.NewRequest(http.MethodPost, "/api/dashboards/import", bytes.NewReader(jsonBytes))
|
|
req.Header.Add("Content-Type", "application/json")
|
|
webtest.RequestWithSignedInUser(req, &models.SignedInUser{
|
|
UserId: 1,
|
|
})
|
|
resp, err := s.Send(req)
|
|
require.NoError(t, err)
|
|
require.NoError(t, resp.Body.Close())
|
|
require.Equal(t, http.StatusUnprocessableEntity, resp.StatusCode)
|
|
})
|
|
|
|
t.Run("Signed in, dashboard model set should call import dashboard service", func(t *testing.T) {
|
|
cmd := &dashboardimport.ImportDashboardRequest{
|
|
Dashboard: simplejson.New(),
|
|
}
|
|
jsonBytes, err := json.Marshal(cmd)
|
|
require.NoError(t, err)
|
|
req := s.NewRequest(http.MethodPost, "/api/dashboards/import", bytes.NewReader(jsonBytes))
|
|
req.Header.Add("Content-Type", "application/json")
|
|
webtest.RequestWithSignedInUser(req, &models.SignedInUser{
|
|
UserId: 1,
|
|
})
|
|
resp, err := s.Send(req)
|
|
require.NoError(t, err)
|
|
require.NoError(t, resp.Body.Close())
|
|
require.Equal(t, http.StatusOK, resp.StatusCode)
|
|
require.True(t, importDashboardServiceCalled)
|
|
})
|
|
|
|
t.Run("Signed in, dashboard model set, trimdefaults enabled should not call schema loader service", func(t *testing.T) {
|
|
cmd := &dashboardimport.ImportDashboardRequest{
|
|
Dashboard: simplejson.New(),
|
|
}
|
|
jsonBytes, err := json.Marshal(cmd)
|
|
require.NoError(t, err)
|
|
req := s.NewRequest(http.MethodPost, "/api/dashboards/import?trimdefaults=true", bytes.NewReader(jsonBytes))
|
|
req.Header.Add("Content-Type", "application/json")
|
|
webtest.RequestWithSignedInUser(req, &models.SignedInUser{
|
|
UserId: 1,
|
|
})
|
|
resp, err := s.Send(req)
|
|
require.NoError(t, err)
|
|
require.NoError(t, resp.Body.Close())
|
|
require.Equal(t, http.StatusOK, resp.StatusCode)
|
|
require.False(t, schemaLoaderServiceCalled)
|
|
require.True(t, importDashboardServiceCalled)
|
|
})
|
|
})
|
|
|
|
t.Run("Quota not reached, schema loader service enabled", func(t *testing.T) {
|
|
importDashboardServiceCalled := false
|
|
service := &serviceMock{
|
|
importDashboardFunc: func(ctx context.Context, req *dashboardimport.ImportDashboardRequest) (*dashboardimport.ImportDashboardResponse, error) {
|
|
importDashboardServiceCalled = true
|
|
return nil, nil
|
|
},
|
|
}
|
|
|
|
schemaLoaderServiceCalled := false
|
|
schemaLoaderService := &schemaLoaderServiceMock{
|
|
enabled: true,
|
|
dashboardApplyDefaultsFunc: func(input *simplejson.Json) (*simplejson.Json, error) {
|
|
schemaLoaderServiceCalled = true
|
|
return input, nil
|
|
},
|
|
}
|
|
|
|
importDashboardAPI := New(service, quotaServiceFunc(quotaNotReached), schemaLoaderService, nil, acmock.New().WithDisabled())
|
|
routeRegister := routing.NewRouteRegister()
|
|
importDashboardAPI.RegisterAPIEndpoints(routeRegister)
|
|
s := webtest.NewServer(t, routeRegister)
|
|
|
|
t.Run("Signed in, dashboard model set, trimdefaults enabled should call schema loader service", func(t *testing.T) {
|
|
cmd := &dashboardimport.ImportDashboardRequest{
|
|
Dashboard: simplejson.New(),
|
|
}
|
|
jsonBytes, err := json.Marshal(cmd)
|
|
require.NoError(t, err)
|
|
req := s.NewRequest(http.MethodPost, "/api/dashboards/import?trimdefaults=true", bytes.NewReader(jsonBytes))
|
|
req.Header.Add("Content-Type", "application/json")
|
|
webtest.RequestWithSignedInUser(req, &models.SignedInUser{
|
|
UserId: 1,
|
|
})
|
|
resp, err := s.Send(req)
|
|
require.NoError(t, err)
|
|
require.NoError(t, resp.Body.Close())
|
|
require.Equal(t, http.StatusOK, resp.StatusCode)
|
|
require.True(t, schemaLoaderServiceCalled)
|
|
require.True(t, importDashboardServiceCalled)
|
|
})
|
|
})
|
|
|
|
t.Run("Quota reached", func(t *testing.T) {
|
|
service := &serviceMock{}
|
|
schemaLoaderService := &schemaLoaderServiceMock{}
|
|
importDashboardAPI := New(service, quotaServiceFunc(quotaReached), schemaLoaderService, nil, acmock.New().WithDisabled())
|
|
|
|
routeRegister := routing.NewRouteRegister()
|
|
importDashboardAPI.RegisterAPIEndpoints(routeRegister)
|
|
s := webtest.NewServer(t, routeRegister)
|
|
|
|
t.Run("Signed in, dashboard model set, should return 403 forbidden/quota reached", func(t *testing.T) {
|
|
cmd := &dashboardimport.ImportDashboardRequest{
|
|
Dashboard: simplejson.New(),
|
|
}
|
|
jsonBytes, err := json.Marshal(cmd)
|
|
require.NoError(t, err)
|
|
req := s.NewRequest(http.MethodPost, "/api/dashboards/import", bytes.NewReader(jsonBytes))
|
|
req.Header.Add("Content-Type", "application/json")
|
|
webtest.RequestWithSignedInUser(req, &models.SignedInUser{
|
|
UserId: 1,
|
|
})
|
|
resp, err := s.Send(req)
|
|
require.NoError(t, err)
|
|
require.NoError(t, resp.Body.Close())
|
|
require.Equal(t, http.StatusForbidden, resp.StatusCode)
|
|
})
|
|
})
|
|
}
|
|
|
|
type serviceMock struct {
|
|
importDashboardFunc func(ctx context.Context, req *dashboardimport.ImportDashboardRequest) (*dashboardimport.ImportDashboardResponse, error)
|
|
}
|
|
|
|
func (s *serviceMock) ImportDashboard(ctx context.Context, req *dashboardimport.ImportDashboardRequest) (*dashboardimport.ImportDashboardResponse, error) {
|
|
if s.importDashboardFunc != nil {
|
|
return s.importDashboardFunc(ctx, req)
|
|
}
|
|
|
|
return nil, nil
|
|
}
|
|
|
|
type schemaLoaderServiceMock struct {
|
|
enabled bool
|
|
dashboardApplyDefaultsFunc func(input *simplejson.Json) (*simplejson.Json, error)
|
|
}
|
|
|
|
func (s *schemaLoaderServiceMock) IsDisabled() bool {
|
|
return !s.enabled
|
|
}
|
|
|
|
func (s *schemaLoaderServiceMock) DashboardApplyDefaults(input *simplejson.Json) (*simplejson.Json, error) {
|
|
if s.dashboardApplyDefaultsFunc != nil {
|
|
return s.dashboardApplyDefaultsFunc(input)
|
|
}
|
|
|
|
return input, nil
|
|
}
|
|
|
|
func quotaReached(c *models.ReqContext, target string) (bool, error) {
|
|
return true, nil
|
|
}
|
|
|
|
func quotaNotReached(c *models.ReqContext, target string) (bool, error) {
|
|
return false, nil
|
|
}
|