mirror of
https://github.com/grafana/grafana.git
synced 2025-02-11 16:15:42 -06:00
546 lines
22 KiB
Go
546 lines
22 KiB
Go
//go:build integration
|
|
// +build integration
|
|
|
|
package sqlstore
|
|
|
|
import (
|
|
"context"
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/require"
|
|
|
|
"github.com/grafana/grafana/pkg/components/simplejson"
|
|
"github.com/grafana/grafana/pkg/models"
|
|
"github.com/grafana/grafana/pkg/services/search"
|
|
)
|
|
|
|
func TestDashboardFolderDataAccess(t *testing.T) {
|
|
t.Run("Testing DB", func(t *testing.T) {
|
|
var sqlStore *SQLStore
|
|
var folder, dashInRoot, childDash *models.Dashboard
|
|
var currentUser models.User
|
|
|
|
setup := func() {
|
|
sqlStore = InitTestDB(t)
|
|
folder = insertTestDashboard(t, sqlStore, "1 test dash folder", 1, 0, true, "prod", "webapp")
|
|
dashInRoot = insertTestDashboard(t, sqlStore, "test dash 67", 1, 0, false, "prod", "webapp")
|
|
childDash = insertTestDashboard(t, sqlStore, "test dash 23", 1, folder.Id, false, "prod", "webapp")
|
|
insertTestDashboard(t, sqlStore, "test dash 45", 1, folder.Id, false, "prod")
|
|
currentUser = createUser(t, sqlStore, "viewer", "Viewer", false)
|
|
}
|
|
|
|
t.Run("Given one dashboard folder with two dashboards and one dashboard in the root folder", func(t *testing.T) {
|
|
setup()
|
|
|
|
t.Run("and no acls are set", func(t *testing.T) {
|
|
t.Run("should return all dashboards", func(t *testing.T) {
|
|
query := &search.FindPersistedDashboardsQuery{
|
|
SignedInUser: &models.SignedInUser{UserId: currentUser.Id, OrgId: 1, OrgRole: models.ROLE_VIEWER},
|
|
OrgId: 1,
|
|
DashboardIds: []int64{folder.Id, dashInRoot.Id},
|
|
}
|
|
err := sqlStore.SearchDashboards(context.Background(), query)
|
|
require.NoError(t, err)
|
|
require.Equal(t, len(query.Result), 2)
|
|
require.Equal(t, query.Result[0].ID, folder.Id)
|
|
require.Equal(t, query.Result[1].ID, dashInRoot.Id)
|
|
})
|
|
})
|
|
|
|
t.Run("and acl is set for dashboard folder", func(t *testing.T) {
|
|
var otherUser int64 = 999
|
|
err := testHelperUpdateDashboardAcl(t, sqlStore, folder.Id, models.DashboardAcl{
|
|
DashboardID: folder.Id,
|
|
OrgID: 1,
|
|
UserID: otherUser,
|
|
Permission: models.PERMISSION_EDIT,
|
|
})
|
|
require.NoError(t, err)
|
|
|
|
t.Run("should not return folder", func(t *testing.T) {
|
|
query := &search.FindPersistedDashboardsQuery{
|
|
SignedInUser: &models.SignedInUser{UserId: currentUser.Id, OrgId: 1, OrgRole: models.ROLE_VIEWER},
|
|
OrgId: 1, DashboardIds: []int64{folder.Id, dashInRoot.Id},
|
|
}
|
|
err := sqlStore.SearchDashboards(context.Background(), query)
|
|
require.NoError(t, err)
|
|
|
|
require.Equal(t, len(query.Result), 1)
|
|
require.Equal(t, query.Result[0].ID, dashInRoot.Id)
|
|
})
|
|
|
|
t.Run("when the user is given permission", func(t *testing.T) {
|
|
err := testHelperUpdateDashboardAcl(t, sqlStore, folder.Id, models.DashboardAcl{
|
|
DashboardID: folder.Id, OrgID: 1, UserID: currentUser.Id, Permission: models.PERMISSION_EDIT,
|
|
})
|
|
require.NoError(t, err)
|
|
|
|
t.Run("should be able to access folder", func(t *testing.T) {
|
|
query := &search.FindPersistedDashboardsQuery{
|
|
SignedInUser: &models.SignedInUser{UserId: currentUser.Id, OrgId: 1, OrgRole: models.ROLE_VIEWER},
|
|
OrgId: 1,
|
|
DashboardIds: []int64{folder.Id, dashInRoot.Id},
|
|
}
|
|
err := sqlStore.SearchDashboards(context.Background(), query)
|
|
require.NoError(t, err)
|
|
require.Equal(t, len(query.Result), 2)
|
|
require.Equal(t, query.Result[0].ID, folder.Id)
|
|
require.Equal(t, query.Result[1].ID, dashInRoot.Id)
|
|
})
|
|
})
|
|
|
|
t.Run("when the user is an admin", func(t *testing.T) {
|
|
t.Run("should be able to access folder", func(t *testing.T) {
|
|
query := &search.FindPersistedDashboardsQuery{
|
|
SignedInUser: &models.SignedInUser{
|
|
UserId: currentUser.Id,
|
|
OrgId: 1,
|
|
OrgRole: models.ROLE_ADMIN,
|
|
},
|
|
OrgId: 1,
|
|
DashboardIds: []int64{folder.Id, dashInRoot.Id},
|
|
}
|
|
err := sqlStore.SearchDashboards(context.Background(), query)
|
|
require.NoError(t, err)
|
|
require.Equal(t, len(query.Result), 2)
|
|
require.Equal(t, query.Result[0].ID, folder.Id)
|
|
require.Equal(t, query.Result[1].ID, dashInRoot.Id)
|
|
})
|
|
})
|
|
})
|
|
|
|
t.Run("and acl is set for dashboard child and folder has all permissions removed", func(t *testing.T) {
|
|
var otherUser int64 = 999
|
|
err := testHelperUpdateDashboardAcl(t, sqlStore, folder.Id)
|
|
require.NoError(t, err)
|
|
err = testHelperUpdateDashboardAcl(t, sqlStore, childDash.Id, models.DashboardAcl{
|
|
DashboardID: folder.Id, OrgID: 1, UserID: otherUser, Permission: models.PERMISSION_EDIT,
|
|
})
|
|
require.NoError(t, err)
|
|
|
|
t.Run("should not return folder or child", func(t *testing.T) {
|
|
query := &search.FindPersistedDashboardsQuery{
|
|
SignedInUser: &models.SignedInUser{UserId: currentUser.Id, OrgId: 1, OrgRole: models.ROLE_VIEWER}, OrgId: 1, DashboardIds: []int64{folder.Id, childDash.Id, dashInRoot.Id},
|
|
}
|
|
err := sqlStore.SearchDashboards(context.Background(), query)
|
|
require.NoError(t, err)
|
|
require.Equal(t, len(query.Result), 1)
|
|
require.Equal(t, query.Result[0].ID, dashInRoot.Id)
|
|
})
|
|
|
|
t.Run("when the user is given permission to child", func(t *testing.T) {
|
|
err := testHelperUpdateDashboardAcl(t, sqlStore, childDash.Id, models.DashboardAcl{
|
|
DashboardID: childDash.Id, OrgID: 1, UserID: currentUser.Id, Permission: models.PERMISSION_EDIT,
|
|
})
|
|
require.NoError(t, err)
|
|
|
|
t.Run("should be able to search for child dashboard but not folder", func(t *testing.T) {
|
|
query := &search.FindPersistedDashboardsQuery{SignedInUser: &models.SignedInUser{UserId: currentUser.Id, OrgId: 1, OrgRole: models.ROLE_VIEWER}, OrgId: 1, DashboardIds: []int64{folder.Id, childDash.Id, dashInRoot.Id}}
|
|
err := sqlStore.SearchDashboards(context.Background(), query)
|
|
require.NoError(t, err)
|
|
require.Equal(t, len(query.Result), 2)
|
|
require.Equal(t, query.Result[0].ID, childDash.Id)
|
|
require.Equal(t, query.Result[1].ID, dashInRoot.Id)
|
|
})
|
|
})
|
|
|
|
t.Run("when the user is an admin", func(t *testing.T) {
|
|
t.Run("should be able to search for child dash and folder", func(t *testing.T) {
|
|
query := &search.FindPersistedDashboardsQuery{
|
|
SignedInUser: &models.SignedInUser{
|
|
UserId: currentUser.Id,
|
|
OrgId: 1,
|
|
OrgRole: models.ROLE_ADMIN,
|
|
},
|
|
OrgId: 1,
|
|
DashboardIds: []int64{folder.Id, dashInRoot.Id, childDash.Id},
|
|
}
|
|
err := sqlStore.SearchDashboards(context.Background(), query)
|
|
require.NoError(t, err)
|
|
require.Equal(t, len(query.Result), 3)
|
|
require.Equal(t, query.Result[0].ID, folder.Id)
|
|
require.Equal(t, query.Result[1].ID, childDash.Id)
|
|
require.Equal(t, query.Result[2].ID, dashInRoot.Id)
|
|
})
|
|
})
|
|
})
|
|
})
|
|
|
|
t.Run("Given two dashboard folders with one dashboard each and one dashboard in the root folder", func(t *testing.T) {
|
|
var sqlStore *SQLStore
|
|
var folder1, folder2, dashInRoot, childDash1, childDash2 *models.Dashboard
|
|
var currentUser models.User
|
|
var rootFolderId int64 = 0
|
|
|
|
setup2 := func() {
|
|
sqlStore = InitTestDB(t)
|
|
folder1 = insertTestDashboard(t, sqlStore, "1 test dash folder", 1, 0, true, "prod")
|
|
folder2 = insertTestDashboard(t, sqlStore, "2 test dash folder", 1, 0, true, "prod")
|
|
dashInRoot = insertTestDashboard(t, sqlStore, "test dash 67", 1, 0, false, "prod")
|
|
childDash1 = insertTestDashboard(t, sqlStore, "child dash 1", 1, folder1.Id, false, "prod")
|
|
childDash2 = insertTestDashboard(t, sqlStore, "child dash 2", 1, folder2.Id, false, "prod")
|
|
|
|
currentUser = createUser(t, sqlStore, "viewer", "Viewer", false)
|
|
}
|
|
|
|
setup2()
|
|
t.Run("and one folder is expanded, the other collapsed", func(t *testing.T) {
|
|
t.Run("should return dashboards in root and expanded folder", func(t *testing.T) {
|
|
query := &search.FindPersistedDashboardsQuery{
|
|
FolderIds: []int64{
|
|
rootFolderId, folder1.Id}, SignedInUser: &models.SignedInUser{UserId: currentUser.Id,
|
|
OrgId: 1, OrgRole: models.ROLE_VIEWER,
|
|
},
|
|
OrgId: 1,
|
|
}
|
|
err := sqlStore.SearchDashboards(context.Background(), query)
|
|
require.NoError(t, err)
|
|
require.Equal(t, len(query.Result), 4)
|
|
require.Equal(t, query.Result[0].ID, folder1.Id)
|
|
require.Equal(t, query.Result[1].ID, folder2.Id)
|
|
require.Equal(t, query.Result[2].ID, childDash1.Id)
|
|
require.Equal(t, query.Result[3].ID, dashInRoot.Id)
|
|
})
|
|
})
|
|
|
|
t.Run("and acl is set for one dashboard folder", func(t *testing.T) {
|
|
const otherUser int64 = 999
|
|
err := testHelperUpdateDashboardAcl(t, sqlStore, folder1.Id, models.DashboardAcl{
|
|
DashboardID: folder1.Id, OrgID: 1, UserID: otherUser, Permission: models.PERMISSION_EDIT,
|
|
})
|
|
require.NoError(t, err)
|
|
|
|
t.Run("and a dashboard is moved from folder without acl to the folder with an acl", func(t *testing.T) {
|
|
moveDashboard(t, sqlStore, 1, childDash2.Data, folder1.Id)
|
|
|
|
t.Run("should not return folder with acl or its children", func(t *testing.T) {
|
|
query := &search.FindPersistedDashboardsQuery{
|
|
SignedInUser: &models.SignedInUser{UserId: currentUser.Id, OrgId: 1, OrgRole: models.ROLE_VIEWER},
|
|
OrgId: 1,
|
|
DashboardIds: []int64{folder1.Id, childDash1.Id, childDash2.Id, dashInRoot.Id},
|
|
}
|
|
err := sqlStore.SearchDashboards(context.Background(), query)
|
|
require.NoError(t, err)
|
|
require.Equal(t, len(query.Result), 1)
|
|
require.Equal(t, query.Result[0].ID, dashInRoot.Id)
|
|
})
|
|
})
|
|
t.Run("and a dashboard is moved from folder with acl to the folder without an acl", func(t *testing.T) {
|
|
setup2()
|
|
moveDashboard(t, sqlStore, 1, childDash1.Data, folder2.Id)
|
|
|
|
t.Run("should return folder without acl and its children", func(t *testing.T) {
|
|
query := &search.FindPersistedDashboardsQuery{
|
|
SignedInUser: &models.SignedInUser{UserId: currentUser.Id, OrgId: 1, OrgRole: models.ROLE_VIEWER},
|
|
OrgId: 1,
|
|
DashboardIds: []int64{folder2.Id, childDash1.Id, childDash2.Id, dashInRoot.Id},
|
|
}
|
|
err := sqlStore.SearchDashboards(context.Background(), query)
|
|
require.NoError(t, err)
|
|
require.Equal(t, len(query.Result), 4)
|
|
require.Equal(t, query.Result[0].ID, folder2.Id)
|
|
require.Equal(t, query.Result[1].ID, childDash1.Id)
|
|
require.Equal(t, query.Result[2].ID, childDash2.Id)
|
|
require.Equal(t, query.Result[3].ID, dashInRoot.Id)
|
|
})
|
|
})
|
|
|
|
t.Run("and a dashboard with an acl is moved to the folder without an acl", func(t *testing.T) {
|
|
err := testHelperUpdateDashboardAcl(t, sqlStore, childDash1.Id, models.DashboardAcl{
|
|
DashboardID: childDash1.Id, OrgID: 1, UserID: otherUser, Permission: models.PERMISSION_EDIT,
|
|
})
|
|
require.NoError(t, err)
|
|
|
|
moveDashboard(t, sqlStore, 1, childDash1.Data, folder2.Id)
|
|
|
|
t.Run("should return folder without acl but not the dashboard with acl", func(t *testing.T) {
|
|
query := &search.FindPersistedDashboardsQuery{
|
|
SignedInUser: &models.SignedInUser{UserId: currentUser.Id, OrgId: 1, OrgRole: models.ROLE_VIEWER},
|
|
OrgId: 1,
|
|
DashboardIds: []int64{folder2.Id, childDash1.Id, childDash2.Id, dashInRoot.Id},
|
|
}
|
|
err = sqlStore.SearchDashboards(context.Background(), query)
|
|
require.NoError(t, err)
|
|
require.Equal(t, len(query.Result), 4)
|
|
require.Equal(t, query.Result[0].ID, folder2.Id)
|
|
require.Equal(t, query.Result[1].ID, childDash1.Id)
|
|
require.Equal(t, query.Result[2].ID, childDash2.Id)
|
|
require.Equal(t, query.Result[3].ID, dashInRoot.Id)
|
|
})
|
|
})
|
|
})
|
|
})
|
|
|
|
t.Run("Given two dashboard folders", func(t *testing.T) {
|
|
var sqlStore *SQLStore
|
|
var folder1, folder2 *models.Dashboard
|
|
var adminUser, editorUser, viewerUser models.User
|
|
|
|
setup3 := func() {
|
|
sqlStore = InitTestDB(t)
|
|
folder1 = insertTestDashboard(t, sqlStore, "1 test dash folder", 1, 0, true, "prod")
|
|
folder2 = insertTestDashboard(t, sqlStore, "2 test dash folder", 1, 0, true, "prod")
|
|
insertTestDashboard(t, sqlStore, "folder in another org", 2, 0, true, "prod")
|
|
|
|
adminUser = createUser(t, sqlStore, "admin", "Admin", true)
|
|
editorUser = createUser(t, sqlStore, "editor", "Editor", false)
|
|
viewerUser = createUser(t, sqlStore, "viewer", "Viewer", false)
|
|
}
|
|
|
|
setup3()
|
|
t.Run("Admin users", func(t *testing.T) {
|
|
t.Run("Should have write access to all dashboard folders in their org", func(t *testing.T) {
|
|
query := search.FindPersistedDashboardsQuery{
|
|
OrgId: 1,
|
|
SignedInUser: &models.SignedInUser{UserId: adminUser.Id, OrgRole: models.ROLE_ADMIN, OrgId: 1},
|
|
Permission: models.PERMISSION_VIEW,
|
|
Type: "dash-folder",
|
|
}
|
|
|
|
err := sqlStore.SearchDashboards(context.Background(), &query)
|
|
require.NoError(t, err)
|
|
|
|
require.Equal(t, len(query.Result), 2)
|
|
require.Equal(t, query.Result[0].ID, folder1.Id)
|
|
require.Equal(t, query.Result[1].ID, folder2.Id)
|
|
})
|
|
|
|
t.Run("should have write access to all folders and dashboards", func(t *testing.T) {
|
|
query := models.GetDashboardPermissionsForUserQuery{
|
|
DashboardIds: []int64{folder1.Id, folder2.Id},
|
|
OrgId: 1,
|
|
UserId: adminUser.Id,
|
|
OrgRole: models.ROLE_ADMIN,
|
|
}
|
|
|
|
err := GetDashboardPermissionsForUser(context.Background(), &query)
|
|
require.NoError(t, err)
|
|
|
|
require.Equal(t, len(query.Result), 2)
|
|
require.Equal(t, query.Result[0].DashboardId, folder1.Id)
|
|
require.Equal(t, query.Result[0].Permission, models.PERMISSION_ADMIN)
|
|
require.Equal(t, query.Result[1].DashboardId, folder2.Id)
|
|
require.Equal(t, query.Result[1].Permission, models.PERMISSION_ADMIN)
|
|
})
|
|
|
|
t.Run("should have edit permission in folders", func(t *testing.T) {
|
|
query := &models.HasEditPermissionInFoldersQuery{
|
|
SignedInUser: &models.SignedInUser{UserId: adminUser.Id, OrgId: 1, OrgRole: models.ROLE_ADMIN},
|
|
}
|
|
err := HasEditPermissionInFolders(context.Background(), query)
|
|
require.NoError(t, err)
|
|
require.True(t, query.Result)
|
|
})
|
|
|
|
t.Run("should have admin permission in folders", func(t *testing.T) {
|
|
query := &models.HasAdminPermissionInFoldersQuery{
|
|
SignedInUser: &models.SignedInUser{UserId: adminUser.Id, OrgId: 1, OrgRole: models.ROLE_ADMIN},
|
|
}
|
|
err := HasAdminPermissionInFolders(context.Background(), query)
|
|
require.NoError(t, err)
|
|
require.True(t, query.Result)
|
|
})
|
|
})
|
|
|
|
t.Run("Editor users", func(t *testing.T) {
|
|
query := search.FindPersistedDashboardsQuery{
|
|
OrgId: 1,
|
|
SignedInUser: &models.SignedInUser{UserId: editorUser.Id, OrgRole: models.ROLE_EDITOR, OrgId: 1},
|
|
Permission: models.PERMISSION_EDIT,
|
|
}
|
|
|
|
t.Run("Should have write access to all dashboard folders with default ACL", func(t *testing.T) {
|
|
err := sqlStore.SearchDashboards(context.Background(), &query)
|
|
require.NoError(t, err)
|
|
|
|
require.Equal(t, len(query.Result), 2)
|
|
require.Equal(t, query.Result[0].ID, folder1.Id)
|
|
require.Equal(t, query.Result[1].ID, folder2.Id)
|
|
})
|
|
|
|
t.Run("should have edit access to folders with default ACL", func(t *testing.T) {
|
|
query := models.GetDashboardPermissionsForUserQuery{
|
|
DashboardIds: []int64{folder1.Id, folder2.Id},
|
|
OrgId: 1,
|
|
UserId: editorUser.Id,
|
|
OrgRole: models.ROLE_EDITOR,
|
|
}
|
|
|
|
err := GetDashboardPermissionsForUser(context.Background(), &query)
|
|
require.NoError(t, err)
|
|
|
|
require.Equal(t, len(query.Result), 2)
|
|
require.Equal(t, query.Result[0].DashboardId, folder1.Id)
|
|
require.Equal(t, query.Result[0].Permission, models.PERMISSION_EDIT)
|
|
require.Equal(t, query.Result[1].DashboardId, folder2.Id)
|
|
require.Equal(t, query.Result[1].Permission, models.PERMISSION_EDIT)
|
|
})
|
|
|
|
t.Run("Should have write access to one dashboard folder if default role changed to view for one folder", func(t *testing.T) {
|
|
err := testHelperUpdateDashboardAcl(t, sqlStore, folder1.Id, models.DashboardAcl{
|
|
DashboardID: folder1.Id, OrgID: 1, UserID: editorUser.Id, Permission: models.PERMISSION_VIEW,
|
|
})
|
|
require.NoError(t, err)
|
|
|
|
err = sqlStore.SearchDashboards(context.Background(), &query)
|
|
require.NoError(t, err)
|
|
|
|
require.Equal(t, len(query.Result), 1)
|
|
require.Equal(t, query.Result[0].ID, folder2.Id)
|
|
})
|
|
|
|
t.Run("should have edit permission in folders", func(t *testing.T) {
|
|
query := &models.HasEditPermissionInFoldersQuery{
|
|
SignedInUser: &models.SignedInUser{UserId: editorUser.Id, OrgId: 1, OrgRole: models.ROLE_EDITOR},
|
|
}
|
|
err := HasEditPermissionInFolders(context.Background(), query)
|
|
require.NoError(t, err)
|
|
require.True(t, query.Result)
|
|
})
|
|
|
|
t.Run("should not have admin permission in folders", func(t *testing.T) {
|
|
query := &models.HasAdminPermissionInFoldersQuery{
|
|
SignedInUser: &models.SignedInUser{UserId: adminUser.Id, OrgId: 1, OrgRole: models.ROLE_EDITOR},
|
|
}
|
|
err := HasAdminPermissionInFolders(context.Background(), query)
|
|
require.NoError(t, err)
|
|
require.False(t, query.Result)
|
|
})
|
|
})
|
|
|
|
t.Run("Viewer users", func(t *testing.T) {
|
|
query := search.FindPersistedDashboardsQuery{
|
|
OrgId: 1,
|
|
SignedInUser: &models.SignedInUser{UserId: viewerUser.Id, OrgRole: models.ROLE_VIEWER, OrgId: 1},
|
|
Permission: models.PERMISSION_EDIT,
|
|
}
|
|
|
|
t.Run("Should have no write access to any dashboard folders with default ACL", func(t *testing.T) {
|
|
err := sqlStore.SearchDashboards(context.Background(), &query)
|
|
require.NoError(t, err)
|
|
|
|
require.Equal(t, len(query.Result), 0)
|
|
})
|
|
|
|
t.Run("should have view access to folders with default ACL", func(t *testing.T) {
|
|
setup3()
|
|
|
|
query := models.GetDashboardPermissionsForUserQuery{
|
|
DashboardIds: []int64{folder1.Id, folder2.Id},
|
|
OrgId: 1,
|
|
UserId: viewerUser.Id,
|
|
OrgRole: models.ROLE_VIEWER,
|
|
}
|
|
|
|
err := GetDashboardPermissionsForUser(context.Background(), &query)
|
|
require.NoError(t, err)
|
|
|
|
require.Equal(t, len(query.Result), 2)
|
|
require.Equal(t, query.Result[0].DashboardId, folder1.Id)
|
|
require.Equal(t, query.Result[0].Permission, models.PERMISSION_VIEW)
|
|
require.Equal(t, query.Result[1].DashboardId, folder2.Id)
|
|
require.Equal(t, query.Result[1].Permission, models.PERMISSION_VIEW)
|
|
})
|
|
|
|
t.Run("Should be able to get one dashboard folder if default role changed to edit for one folder", func(t *testing.T) {
|
|
err := testHelperUpdateDashboardAcl(t, sqlStore, folder1.Id, models.DashboardAcl{
|
|
DashboardID: folder1.Id, OrgID: 1, UserID: viewerUser.Id, Permission: models.PERMISSION_EDIT,
|
|
})
|
|
require.NoError(t, err)
|
|
|
|
err = sqlStore.SearchDashboards(context.Background(), &query)
|
|
require.NoError(t, err)
|
|
|
|
require.Equal(t, len(query.Result), 1)
|
|
require.Equal(t, query.Result[0].ID, folder1.Id)
|
|
})
|
|
|
|
t.Run("should not have edit permission in folders", func(t *testing.T) {
|
|
setup3()
|
|
|
|
query := &models.HasEditPermissionInFoldersQuery{
|
|
SignedInUser: &models.SignedInUser{UserId: viewerUser.Id, OrgId: 1, OrgRole: models.ROLE_VIEWER},
|
|
}
|
|
err := HasEditPermissionInFolders(context.Background(), query)
|
|
require.NoError(t, err)
|
|
require.False(t, query.Result)
|
|
})
|
|
|
|
t.Run("should not have admin permission in folders", func(t *testing.T) {
|
|
query := &models.HasAdminPermissionInFoldersQuery{
|
|
SignedInUser: &models.SignedInUser{UserId: adminUser.Id, OrgId: 1, OrgRole: models.ROLE_VIEWER},
|
|
}
|
|
err := HasAdminPermissionInFolders(context.Background(), query)
|
|
require.NoError(t, err)
|
|
require.False(t, query.Result)
|
|
})
|
|
|
|
t.Run("and admin permission is given for user with org role viewer in one dashboard folder", func(t *testing.T) {
|
|
err := testHelperUpdateDashboardAcl(t, sqlStore, folder1.Id, models.DashboardAcl{
|
|
DashboardID: folder1.Id, OrgID: 1, UserID: viewerUser.Id, Permission: models.PERMISSION_ADMIN,
|
|
})
|
|
require.NoError(t, err)
|
|
|
|
t.Run("should have edit permission in folders", func(t *testing.T) {
|
|
query := &models.HasEditPermissionInFoldersQuery{
|
|
SignedInUser: &models.SignedInUser{UserId: viewerUser.Id, OrgId: 1, OrgRole: models.ROLE_VIEWER},
|
|
}
|
|
err := HasEditPermissionInFolders(context.Background(), query)
|
|
require.NoError(t, err)
|
|
require.True(t, query.Result)
|
|
})
|
|
})
|
|
|
|
t.Run("and edit permission is given for user with org role viewer in one dashboard folder", func(t *testing.T) {
|
|
err := testHelperUpdateDashboardAcl(t, sqlStore, folder1.Id, models.DashboardAcl{
|
|
DashboardID: folder1.Id, OrgID: 1, UserID: viewerUser.Id, Permission: models.PERMISSION_EDIT,
|
|
})
|
|
require.NoError(t, err)
|
|
|
|
t.Run("should have edit permission in folders", func(t *testing.T) {
|
|
query := &models.HasEditPermissionInFoldersQuery{
|
|
SignedInUser: &models.SignedInUser{UserId: viewerUser.Id, OrgId: 1, OrgRole: models.ROLE_VIEWER},
|
|
}
|
|
err := HasEditPermissionInFolders(context.Background(), query)
|
|
require.NoError(t, err)
|
|
require.True(t, query.Result)
|
|
})
|
|
})
|
|
})
|
|
})
|
|
|
|
t.Run("Given dashboard and folder with the same title", func(t *testing.T) {
|
|
var orgId int64 = 1
|
|
title := "Very Unique Name"
|
|
var sqlStore *SQLStore
|
|
var folder1, folder2 *models.Dashboard
|
|
sqlStore = InitTestDB(t)
|
|
folder2 = insertTestDashboard(t, sqlStore, "TEST", orgId, 0, true, "prod")
|
|
_ = insertTestDashboard(t, sqlStore, title, orgId, folder2.Id, false, "prod")
|
|
folder1 = insertTestDashboard(t, sqlStore, title, orgId, 0, true, "prod")
|
|
|
|
t.Run("GetFolderByTitle should find the folder", func(t *testing.T) {
|
|
result, err := sqlStore.GetFolderByTitle(orgId, title)
|
|
require.NoError(t, err)
|
|
require.Equal(t, folder1.Id, result.Id)
|
|
})
|
|
})
|
|
})
|
|
}
|
|
|
|
func moveDashboard(t *testing.T, sqlStore *SQLStore, orgId int64, dashboard *simplejson.Json,
|
|
newFolderId int64) *models.Dashboard {
|
|
t.Helper()
|
|
|
|
cmd := models.SaveDashboardCommand{
|
|
OrgId: orgId,
|
|
FolderId: newFolderId,
|
|
Dashboard: dashboard,
|
|
Overwrite: true,
|
|
}
|
|
dash, err := sqlStore.SaveDashboard(cmd)
|
|
require.NoError(t, err)
|
|
|
|
return dash
|
|
}
|