mirror of
https://github.com/grafana/grafana.git
synced 2024-11-28 11:44:26 -06:00
de50f39c12
* Refactor Scope resolver to support resolving into several scopes * Change permission evaluator to match at least one of passed scopes
160 lines
4.9 KiB
Go
160 lines
4.9 KiB
Go
package accesscontrol
|
|
|
|
import (
|
|
"context"
|
|
"testing"
|
|
|
|
"github.com/grafana/grafana/pkg/models"
|
|
"github.com/stretchr/testify/assert"
|
|
)
|
|
|
|
func TestResolveKeywordScope(t *testing.T) {
|
|
tests := []struct {
|
|
name string
|
|
user *models.SignedInUser
|
|
permission Permission
|
|
want Permission
|
|
wantErr bool
|
|
}{
|
|
{
|
|
name: "no scope",
|
|
user: testUser,
|
|
permission: Permission{Action: "users:read"},
|
|
want: Permission{Action: "users:read"},
|
|
wantErr: false,
|
|
},
|
|
{
|
|
name: "user if resolution",
|
|
user: testUser,
|
|
permission: Permission{Action: "users:read", Scope: "users:self"},
|
|
want: Permission{Action: "users:read", Scope: "users:id:2"},
|
|
wantErr: false,
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
var err error
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
resolvers := NewScopeResolvers()
|
|
scopeModifier := resolvers.GetScopeKeywordMutator(tt.user)
|
|
tt.permission.Scope, err = scopeModifier(context.TODO(), tt.permission.Scope)
|
|
if tt.wantErr {
|
|
assert.Error(t, err, "expected an error during the resolution of the scope")
|
|
return
|
|
}
|
|
assert.NoError(t, err)
|
|
assert.EqualValues(t, tt.want, tt.permission, "permission did not match expected resolution")
|
|
})
|
|
}
|
|
}
|
|
|
|
var testUser = &models.SignedInUser{
|
|
UserId: 2,
|
|
OrgId: 3,
|
|
OrgName: "TestOrg",
|
|
OrgRole: models.ROLE_VIEWER,
|
|
Login: "testUser",
|
|
Name: "Test User",
|
|
Email: "testuser@example.org",
|
|
}
|
|
|
|
func TestResolveAttributeScope(t *testing.T) {
|
|
// Calls allow us to see how many times the fakeDataSourceResolution has been called
|
|
calls := 0
|
|
fakeDataSourceResolver := ScopeAttributeResolverFunc(func(ctx context.Context, orgID int64, initialScope string) ([]string, error) {
|
|
calls++
|
|
if initialScope == "datasources:name:testds" {
|
|
return []string{Scope("datasources", "id", "1")}, nil
|
|
} else if initialScope == "datasources:name:testds2" {
|
|
return []string{Scope("datasources", "id", "2")}, nil
|
|
} else if initialScope == "datasources:name:test:ds4" {
|
|
return []string{Scope("datasources", "id", "4")}, nil
|
|
} else if initialScope == "datasources:name:testds5*" {
|
|
return []string{Scope("datasources", "id", "5")}, nil
|
|
} else {
|
|
return nil, models.ErrDataSourceNotFound
|
|
}
|
|
})
|
|
|
|
tests := []struct {
|
|
name string
|
|
orgID int64
|
|
evaluator Evaluator
|
|
wantEvaluator Evaluator
|
|
wantCalls int
|
|
wantErr error
|
|
}{
|
|
{
|
|
name: "should work with scope less permissions",
|
|
evaluator: EvalPermission("datasources:read"),
|
|
wantEvaluator: EvalPermission("datasources:read"),
|
|
wantCalls: 0,
|
|
},
|
|
{
|
|
name: "should handle an error",
|
|
orgID: 1,
|
|
evaluator: EvalPermission("datasources:read", Scope("datasources", "name", "testds3")),
|
|
wantErr: models.ErrDataSourceNotFound,
|
|
wantCalls: 1,
|
|
},
|
|
{
|
|
name: "should resolve a scope",
|
|
orgID: 1,
|
|
evaluator: EvalPermission("datasources:read", Scope("datasources", "name", "testds")),
|
|
wantEvaluator: EvalPermission("datasources:read", Scope("datasources", "id", "1")),
|
|
wantCalls: 1,
|
|
},
|
|
{
|
|
name: "should resolve nested scopes with cache",
|
|
orgID: 1,
|
|
evaluator: EvalAll(
|
|
EvalPermission("datasources:read", Scope("datasources", "name", "testds")),
|
|
EvalAny(
|
|
EvalPermission("datasources:read", Scope("datasources", "name", "testds")),
|
|
EvalPermission("datasources:read", Scope("datasources", "name", "testds2")),
|
|
),
|
|
),
|
|
wantEvaluator: EvalAll(
|
|
EvalPermission("datasources:read", Scope("datasources", "id", "1")),
|
|
EvalAny(
|
|
EvalPermission("datasources:read", Scope("datasources", "id", "1")),
|
|
EvalPermission("datasources:read", Scope("datasources", "id", "2")),
|
|
),
|
|
),
|
|
wantCalls: 2,
|
|
},
|
|
{
|
|
name: "should resolve name with colon",
|
|
orgID: 1,
|
|
evaluator: EvalPermission("datasources:read", Scope("datasources", "name", "test:ds4")),
|
|
wantEvaluator: EvalPermission("datasources:read", Scope("datasources", "id", "4")),
|
|
wantCalls: 1,
|
|
},
|
|
{
|
|
name: "should resolve names with '*'",
|
|
orgID: 1,
|
|
evaluator: EvalPermission("datasources:read", Scope("datasources", "name", "testds5*")),
|
|
wantEvaluator: EvalPermission("datasources:read", Scope("datasources", "id", "5")),
|
|
wantCalls: 1,
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
resolvers := NewScopeResolvers()
|
|
|
|
// Reset calls counter
|
|
calls = 0
|
|
// Register a resolution method
|
|
resolvers.AddScopeAttributeResolver("datasources:name:", fakeDataSourceResolver)
|
|
|
|
// Test
|
|
mutate := resolvers.GetScopeAttributeMutator(tt.orgID)
|
|
resolvedEvaluator, err := tt.evaluator.MutateScopes(context.Background(), mutate)
|
|
if tt.wantErr != nil {
|
|
assert.ErrorAs(t, err, &tt.wantErr, "expected an error during the resolution of the scope")
|
|
return
|
|
}
|
|
assert.NoError(t, err)
|
|
assert.EqualValues(t, tt.wantEvaluator, resolvedEvaluator, "permission did not match expected resolution")
|
|
assert.Equal(t, tt.wantCalls, calls, "cache has not been used")
|
|
}
|
|
}
|