mirror of
https://github.com/grafana/grafana.git
synced 2025-02-25 18:55:37 -06:00
* expose ngalert API to public * add delete action to time-intervals * introduce time-interval model generated by app-platform-sdk from CUE model the fields of the model are chosen to be compatible with the current model * implement api server * add feature flag alertingApiServer ---- Test Infra * update helper to support creating custom users with enterprise permissions * add generator for Interval model
55 lines
1.6 KiB
Go
55 lines
1.6 KiB
Go
package timeinterval
|
|
|
|
import (
|
|
"context"
|
|
|
|
"k8s.io/apiserver/pkg/authorization/authorizer"
|
|
|
|
"github.com/grafana/grafana/pkg/infra/appcontext"
|
|
"github.com/grafana/grafana/pkg/services/accesscontrol"
|
|
)
|
|
|
|
func Authorize(ctx context.Context, ac accesscontrol.AccessControl, attr authorizer.Attributes) (authorized authorizer.Decision, reason string, err error) {
|
|
if attr.GetResource() != resourceInfo.GroupResource().Resource {
|
|
return authorizer.DecisionNoOpinion, "", nil
|
|
}
|
|
user, err := appcontext.User(ctx)
|
|
if err != nil {
|
|
return authorizer.DecisionDeny, "valid user is required", err
|
|
}
|
|
|
|
var action accesscontrol.Evaluator
|
|
switch attr.GetVerb() {
|
|
case "patch":
|
|
fallthrough
|
|
case "create":
|
|
fallthrough
|
|
case "update":
|
|
action = accesscontrol.EvalAny(
|
|
accesscontrol.EvalPermission(accesscontrol.ActionAlertingNotificationsTimeIntervalsWrite),
|
|
accesscontrol.EvalPermission(accesscontrol.ActionAlertingNotificationsWrite),
|
|
)
|
|
case "deletecollection":
|
|
fallthrough
|
|
case "delete":
|
|
action = accesscontrol.EvalAny(
|
|
accesscontrol.EvalPermission(accesscontrol.ActionAlertingNotificationsTimeIntervalsDelete),
|
|
accesscontrol.EvalPermission(accesscontrol.ActionAlertingNotificationsWrite),
|
|
)
|
|
}
|
|
|
|
eval := accesscontrol.EvalAny(
|
|
accesscontrol.EvalPermission(accesscontrol.ActionAlertingNotificationsTimeIntervalsRead),
|
|
accesscontrol.EvalPermission(accesscontrol.ActionAlertingNotificationsRead),
|
|
)
|
|
if action != nil {
|
|
eval = accesscontrol.EvalAll(eval, action)
|
|
}
|
|
|
|
ok, err := ac.Evaluate(ctx, user, eval)
|
|
if ok {
|
|
return authorizer.DecisionAllow, "", nil
|
|
}
|
|
return authorizer.DecisionDeny, "", err
|
|
}
|