mirror of
https://github.com/grafana/grafana.git
synced 2025-02-25 18:55:37 -06:00
118 lines
3.4 KiB
Go
118 lines
3.4 KiB
Go
package azureauth
|
|
|
|
import (
|
|
"testing"
|
|
|
|
"github.com/grafana/grafana-azure-sdk-go/azsettings"
|
|
"github.com/grafana/grafana-plugin-sdk-go/backend"
|
|
sdkhttpclient "github.com/grafana/grafana-plugin-sdk-go/backend/httpclient"
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
|
|
"github.com/grafana/grafana/pkg/setting"
|
|
)
|
|
|
|
func TestConfigureAzureAuthentication(t *testing.T) {
|
|
cfg := &setting.Cfg{
|
|
Azure: &azsettings.AzureSettings{},
|
|
}
|
|
|
|
t.Run("should set Azure middleware when JsonData contains valid credentials", func(t *testing.T) {
|
|
settings := backend.DataSourceInstanceSettings{
|
|
JSONData: []byte(`{
|
|
"httpMethod": "POST",
|
|
"azureCredentials": {
|
|
"authType": "msi"
|
|
}
|
|
}`),
|
|
}
|
|
|
|
var opts = &sdkhttpclient.Options{CustomOptions: map[string]any{}}
|
|
|
|
err := ConfigureAzureAuthentication(settings, cfg.Azure, opts)
|
|
require.NoError(t, err)
|
|
|
|
require.NotNil(t, opts.Middlewares)
|
|
assert.Len(t, opts.Middlewares, 1)
|
|
})
|
|
|
|
t.Run("should not set Azure middleware when JsonData doesn't contain valid credentials", func(t *testing.T) {
|
|
settings := backend.DataSourceInstanceSettings{
|
|
JSONData: []byte(`{ "httpMethod": "POST" }`),
|
|
}
|
|
|
|
var opts = &sdkhttpclient.Options{CustomOptions: map[string]any{}}
|
|
|
|
err := ConfigureAzureAuthentication(settings, cfg.Azure, opts)
|
|
require.NoError(t, err)
|
|
|
|
assert.NotContains(t, opts.CustomOptions, "_azureCredentials")
|
|
})
|
|
|
|
t.Run("should return error when JsonData contains invalid credentials", func(t *testing.T) {
|
|
settings := backend.DataSourceInstanceSettings{
|
|
JSONData: []byte(`{
|
|
"httpMethod": "POST",
|
|
"azureCredentials": "invalid"
|
|
}`),
|
|
}
|
|
|
|
var opts = &sdkhttpclient.Options{CustomOptions: map[string]any{}}
|
|
err := ConfigureAzureAuthentication(settings, cfg.Azure, opts)
|
|
assert.Error(t, err)
|
|
})
|
|
|
|
t.Run("should set Azure middleware when JsonData contains credentials and valid audience", func(t *testing.T) {
|
|
settings := backend.DataSourceInstanceSettings{
|
|
JSONData: []byte(`{
|
|
"httpMethod": "POST",
|
|
"azureCredentials": {
|
|
"authType": "msi"
|
|
},
|
|
"azureEndpointResourceId": "https://api.example.com/abd5c4ce-ca73-41e9-9cb2-bed39aa2adb5"
|
|
}`),
|
|
}
|
|
var opts = &sdkhttpclient.Options{CustomOptions: map[string]any{}}
|
|
|
|
err := ConfigureAzureAuthentication(settings, cfg.Azure, opts)
|
|
require.NoError(t, err)
|
|
|
|
require.NotNil(t, opts.Middlewares)
|
|
assert.Len(t, opts.Middlewares, 1)
|
|
})
|
|
|
|
t.Run("should not set Azure middleware when JsonData doesn't contain credentials", func(t *testing.T) {
|
|
settings := backend.DataSourceInstanceSettings{
|
|
JSONData: []byte(`{
|
|
"httpMethod": "POST",
|
|
"azureEndpointResourceId": "https://api.example.com/abd5c4ce-ca73-41e9-9cb2-bed39aa2adb5"
|
|
}`),
|
|
}
|
|
var opts = &sdkhttpclient.Options{CustomOptions: map[string]any{}}
|
|
|
|
err := ConfigureAzureAuthentication(settings, cfg.Azure, opts)
|
|
require.NoError(t, err)
|
|
|
|
if opts.Middlewares != nil {
|
|
assert.Len(t, opts.Middlewares, 0)
|
|
}
|
|
})
|
|
|
|
t.Run("should return error when JsonData contains invalid audience", func(t *testing.T) {
|
|
settings := backend.DataSourceInstanceSettings{
|
|
JSONData: []byte(`{
|
|
"httpMethod": "POST",
|
|
"azureCredentials": {
|
|
"authType": "msi"
|
|
},
|
|
"azureEndpointResourceId": "invalid"
|
|
}`),
|
|
}
|
|
|
|
var opts = &sdkhttpclient.Options{CustomOptions: map[string]any{}}
|
|
|
|
err := ConfigureAzureAuthentication(settings, cfg.Azure, opts)
|
|
assert.Error(t, err)
|
|
})
|
|
}
|