mirror of
https://github.com/grafana/grafana.git
synced 2024-11-26 02:40:26 -06:00
05c386504b
* RBAC: remove unnessisary guardian construction and update tests * RBAC: remove usage of guardian in UpdateFolderPermissions and refactor test * RBAC: remove usage of guardian in update and get permissions for dashboards
153 lines
6.3 KiB
Go
153 lines
6.3 KiB
Go
package api
|
|
|
|
import (
|
|
"encoding/json"
|
|
"net/http"
|
|
"strings"
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
|
|
"github.com/grafana/grafana/pkg/services/accesscontrol"
|
|
"github.com/grafana/grafana/pkg/services/accesscontrol/actest"
|
|
"github.com/grafana/grafana/pkg/services/dashboards"
|
|
"github.com/grafana/grafana/pkg/services/folder"
|
|
"github.com/grafana/grafana/pkg/services/folder/foldertest"
|
|
"github.com/grafana/grafana/pkg/setting"
|
|
"github.com/grafana/grafana/pkg/web/webtest"
|
|
)
|
|
|
|
func TestHTTPServer_GetFolderPermissionList(t *testing.T) {
|
|
t.Run("should not be able to list acl when user does not have permission to do so", func(t *testing.T) {
|
|
server := SetupAPITestServer(t, func(hs *HTTPServer) {})
|
|
|
|
res, err := server.Send(webtest.RequestWithSignedInUser(server.NewGetRequest("/api/folders/1/permissions"), userWithPermissions(1, nil)))
|
|
require.NoError(t, err)
|
|
assert.Equal(t, http.StatusForbidden, res.StatusCode)
|
|
require.NoError(t, res.Body.Close())
|
|
})
|
|
|
|
t.Run("should be able to list acl with correct permission", func(t *testing.T) {
|
|
server := SetupAPITestServer(t, func(hs *HTTPServer) {
|
|
hs.folderService = &foldertest.FakeService{ExpectedFolder: &folder.Folder{ID: 1, UID: "1"}}
|
|
hs.folderPermissionsService = &actest.FakePermissionsService{
|
|
ExpectedPermissions: []accesscontrol.ResourcePermission{},
|
|
}
|
|
})
|
|
|
|
res, err := server.Send(webtest.RequestWithSignedInUser(server.NewGetRequest("/api/folders/1/permissions"), userWithPermissions(1, []accesscontrol.Permission{
|
|
{Action: dashboards.ActionFoldersPermissionsRead, Scope: "folders:uid:1"},
|
|
})))
|
|
|
|
require.NoError(t, err)
|
|
assert.Equal(t, http.StatusOK, res.StatusCode)
|
|
require.NoError(t, res.Body.Close())
|
|
})
|
|
|
|
t.Run("should filter out hidden users from acl", func(t *testing.T) {
|
|
server := SetupAPITestServer(t, func(hs *HTTPServer) {
|
|
cfg := setting.NewCfg()
|
|
cfg.HiddenUsers = map[string]struct{}{"hidden": {}}
|
|
hs.Cfg = cfg
|
|
hs.folderService = &foldertest.FakeService{ExpectedFolder: &folder.Folder{ID: 1, UID: "1"}}
|
|
|
|
hs.folderPermissionsService = &actest.FakePermissionsService{
|
|
ExpectedPermissions: []accesscontrol.ResourcePermission{
|
|
{UserId: 1, UserLogin: "regular", IsManaged: true},
|
|
{UserId: 2, UserLogin: "hidden", IsManaged: true},
|
|
},
|
|
}
|
|
})
|
|
|
|
res, err := server.Send(webtest.RequestWithSignedInUser(server.NewGetRequest("/api/folders/1/permissions"), userWithPermissions(1, []accesscontrol.Permission{
|
|
{Action: dashboards.ActionFoldersPermissionsRead, Scope: "folders:uid:1"},
|
|
})))
|
|
|
|
require.NoError(t, err)
|
|
assert.Equal(t, http.StatusOK, res.StatusCode)
|
|
|
|
var result []dashboards.DashboardACLInfoDTO
|
|
require.NoError(t, json.NewDecoder(res.Body).Decode(&result))
|
|
|
|
assert.Len(t, result, 1)
|
|
assert.Equal(t, result[0].UserLogin, "regular")
|
|
require.NoError(t, res.Body.Close())
|
|
})
|
|
}
|
|
|
|
func TestHTTPServer_UpdateFolderPermissions(t *testing.T) {
|
|
t.Run("should not be able to update acl when user does not have permission to do so", func(t *testing.T) {
|
|
server := SetupAPITestServer(t, func(hs *HTTPServer) {})
|
|
|
|
res, err := server.Send(webtest.RequestWithSignedInUser(server.NewPostRequest("/api/folders/1/permissions", nil), userWithPermissions(1, nil)))
|
|
require.NoError(t, err)
|
|
assert.Equal(t, http.StatusForbidden, res.StatusCode)
|
|
require.NoError(t, res.Body.Close())
|
|
})
|
|
|
|
t.Run("should be able to update acl with correct permissions", func(t *testing.T) {
|
|
server := SetupAPITestServer(t, func(hs *HTTPServer) {
|
|
hs.folderService = &foldertest.FakeService{ExpectedFolder: &folder.Folder{ID: 1, UID: "1"}}
|
|
hs.folderPermissionsService = &actest.FakePermissionsService{}
|
|
})
|
|
|
|
body := `{"items": []}`
|
|
res, err := server.SendJSON(webtest.RequestWithSignedInUser(server.NewPostRequest("/api/folders/1/permissions", strings.NewReader(body)), userWithPermissions(1, []accesscontrol.Permission{
|
|
{Action: dashboards.ActionFoldersPermissionsWrite, Scope: "folders:uid:1"},
|
|
})))
|
|
|
|
require.NoError(t, err)
|
|
assert.Equal(t, http.StatusOK, res.StatusCode)
|
|
require.NoError(t, res.Body.Close())
|
|
})
|
|
|
|
t.Run("should not be able to specify team and user in same acl", func(t *testing.T) {
|
|
server := SetupAPITestServer(t, func(hs *HTTPServer) {
|
|
hs.folderService = &foldertest.FakeService{ExpectedFolder: &folder.Folder{ID: 1, UID: "1"}}
|
|
hs.folderPermissionsService = &actest.FakePermissionsService{}
|
|
})
|
|
|
|
body := `{"items": [{ userId:1, teamId: 2 }]}`
|
|
res, err := server.SendJSON(webtest.RequestWithSignedInUser(server.NewPostRequest("/api/folders/1/permissions", strings.NewReader(body)), userWithPermissions(1, []accesscontrol.Permission{
|
|
{Action: dashboards.ActionFoldersPermissionsWrite, Scope: "folders:uid:1"},
|
|
})))
|
|
|
|
require.NoError(t, err)
|
|
assert.Equal(t, http.StatusBadRequest, res.StatusCode)
|
|
require.NoError(t, res.Body.Close())
|
|
})
|
|
|
|
t.Run("should not be able to specify team and role in same acl", func(t *testing.T) {
|
|
server := SetupAPITestServer(t, func(hs *HTTPServer) {
|
|
hs.folderService = &foldertest.FakeService{ExpectedFolder: &folder.Folder{ID: 1, UID: "1"}}
|
|
hs.folderPermissionsService = &actest.FakePermissionsService{}
|
|
})
|
|
|
|
body := `{"items": [{ teamId:1, role: "Admin" }]}`
|
|
res, err := server.SendJSON(webtest.RequestWithSignedInUser(server.NewPostRequest("/api/folders/1/permissions", strings.NewReader(body)), userWithPermissions(1, []accesscontrol.Permission{
|
|
{Action: dashboards.ActionFoldersPermissionsWrite, Scope: "folders:uid:1"},
|
|
})))
|
|
|
|
require.NoError(t, err)
|
|
assert.Equal(t, http.StatusBadRequest, res.StatusCode)
|
|
require.NoError(t, res.Body.Close())
|
|
})
|
|
|
|
t.Run("should not be able to specify user and role in same acl", func(t *testing.T) {
|
|
server := SetupAPITestServer(t, func(hs *HTTPServer) {
|
|
hs.folderService = &foldertest.FakeService{ExpectedFolder: &folder.Folder{ID: 1, UID: "1"}}
|
|
hs.folderPermissionsService = &actest.FakePermissionsService{}
|
|
})
|
|
|
|
body := `{"items": [{ userId:1, role: "Admin" }]}`
|
|
res, err := server.SendJSON(webtest.RequestWithSignedInUser(server.NewPostRequest("/api/folders/1/permissions", strings.NewReader(body)), userWithPermissions(1, []accesscontrol.Permission{
|
|
{Action: dashboards.ActionFoldersPermissionsWrite, Scope: "folders:uid:1"},
|
|
})))
|
|
|
|
require.NoError(t, err)
|
|
assert.Equal(t, http.StatusBadRequest, res.StatusCode)
|
|
require.NoError(t, res.Body.Close())
|
|
})
|
|
}
|