mirror of
https://github.com/grafana/grafana.git
synced 2024-12-02 13:39:19 -06:00
c63ebc887b
* Chore: Run integration tests without grabpl * Add new step for integration tests in lib.star * Remove old integration test step from lib.star * Change drone signature * Fix: Edit starlark integration step to not affect enterprise * Remove all build tags & rename starlark integration test step * Resync .drone.yml with .drone.star * Fix lint errors * Fix lint errors * Fix lint errors * Fix more lint errors * Fix another lint error * Rename integration test step * Fix last lint error * Recomment enterprise step * Remove comment from Makefile Co-authored-by: Ida Furjesova <ida.furjesova@grafana.com>
205 lines
6.3 KiB
Go
205 lines
6.3 KiB
Go
package sqlstore
|
|
|
|
import (
|
|
"context"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/grafana/grafana/pkg/components/simplejson"
|
|
"github.com/grafana/grafana/pkg/models"
|
|
"github.com/grafana/grafana/pkg/services/secrets"
|
|
"github.com/grafana/grafana/pkg/services/secrets/fakes"
|
|
"github.com/grafana/grafana/pkg/setting"
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
)
|
|
|
|
func TestIntegrationDashboardSnapshotDBAccess(t *testing.T) {
|
|
sqlstore := InitTestDB(t)
|
|
|
|
origSecret := setting.SecretKey
|
|
setting.SecretKey = "dashboard_snapshot_testing"
|
|
t.Cleanup(func() {
|
|
setting.SecretKey = origSecret
|
|
})
|
|
secretsService := fakes.NewFakeSecretsService()
|
|
dashboard := simplejson.NewFromAny(map[string]interface{}{"hello": "mupp"})
|
|
|
|
t.Run("Given saved snapshot", func(t *testing.T) {
|
|
rawDashboard, err := dashboard.Encode()
|
|
require.NoError(t, err)
|
|
|
|
encryptedDashboard, err := secretsService.Encrypt(context.Background(), rawDashboard, secrets.WithoutScope())
|
|
require.NoError(t, err)
|
|
|
|
cmd := models.CreateDashboardSnapshotCommand{
|
|
Key: "hej",
|
|
DashboardEncrypted: encryptedDashboard,
|
|
UserId: 1000,
|
|
OrgId: 1,
|
|
}
|
|
|
|
err = sqlstore.CreateDashboardSnapshot(context.Background(), &cmd)
|
|
require.NoError(t, err)
|
|
|
|
t.Run("Should be able to get snapshot by key", func(t *testing.T) {
|
|
query := models.GetDashboardSnapshotQuery{Key: "hej"}
|
|
err := sqlstore.GetDashboardSnapshot(context.Background(), &query)
|
|
require.NoError(t, err)
|
|
|
|
assert.NotNil(t, query.Result)
|
|
|
|
decryptedDashboard, err := secretsService.Decrypt(
|
|
context.Background(),
|
|
query.Result.DashboardEncrypted,
|
|
)
|
|
require.NoError(t, err)
|
|
|
|
dashboard, err := simplejson.NewJson(decryptedDashboard)
|
|
require.NoError(t, err)
|
|
|
|
assert.Equal(t, "mupp", dashboard.Get("hello").MustString())
|
|
})
|
|
|
|
t.Run("And the user has the admin role", func(t *testing.T) {
|
|
query := models.GetDashboardSnapshotsQuery{
|
|
OrgId: 1,
|
|
SignedInUser: &models.SignedInUser{OrgRole: models.ROLE_ADMIN},
|
|
}
|
|
err := sqlstore.SearchDashboardSnapshots(context.Background(), &query)
|
|
require.NoError(t, err)
|
|
|
|
t.Run("Should return all the snapshots", func(t *testing.T) {
|
|
assert.NotNil(t, query.Result)
|
|
assert.Len(t, query.Result, 1)
|
|
})
|
|
})
|
|
|
|
t.Run("And the user has the editor role and has created a snapshot", func(t *testing.T) {
|
|
query := models.GetDashboardSnapshotsQuery{
|
|
OrgId: 1,
|
|
SignedInUser: &models.SignedInUser{OrgRole: models.ROLE_EDITOR, UserId: 1000},
|
|
}
|
|
err := sqlstore.SearchDashboardSnapshots(context.Background(), &query)
|
|
require.NoError(t, err)
|
|
|
|
t.Run("Should return all the snapshots", func(t *testing.T) {
|
|
require.NotNil(t, query.Result)
|
|
assert.Len(t, query.Result, 1)
|
|
})
|
|
})
|
|
|
|
t.Run("And the user has the editor role and has not created any snapshot", func(t *testing.T) {
|
|
query := models.GetDashboardSnapshotsQuery{
|
|
OrgId: 1,
|
|
SignedInUser: &models.SignedInUser{OrgRole: models.ROLE_EDITOR, UserId: 2},
|
|
}
|
|
err := sqlstore.SearchDashboardSnapshots(context.Background(), &query)
|
|
require.NoError(t, err)
|
|
|
|
t.Run("Should not return any snapshots", func(t *testing.T) {
|
|
require.NotNil(t, query.Result)
|
|
assert.Empty(t, query.Result)
|
|
})
|
|
})
|
|
|
|
t.Run("And the user is anonymous", func(t *testing.T) {
|
|
cmd := models.CreateDashboardSnapshotCommand{
|
|
Key: "strangesnapshotwithuserid0",
|
|
DeleteKey: "adeletekey",
|
|
Dashboard: simplejson.NewFromAny(map[string]interface{}{
|
|
"hello": "mupp",
|
|
}),
|
|
UserId: 0,
|
|
OrgId: 1,
|
|
}
|
|
err := sqlstore.CreateDashboardSnapshot(context.Background(), &cmd)
|
|
require.NoError(t, err)
|
|
|
|
t.Run("Should not return any snapshots", func(t *testing.T) {
|
|
query := models.GetDashboardSnapshotsQuery{
|
|
OrgId: 1,
|
|
SignedInUser: &models.SignedInUser{OrgRole: models.ROLE_EDITOR, IsAnonymous: true, UserId: 0},
|
|
}
|
|
err := sqlstore.SearchDashboardSnapshots(context.Background(), &query)
|
|
require.NoError(t, err)
|
|
|
|
require.NotNil(t, query.Result)
|
|
assert.Empty(t, query.Result)
|
|
})
|
|
})
|
|
|
|
t.Run("Should have encrypted dashboard data", func(t *testing.T) {
|
|
decryptedDashboard, err := secretsService.Decrypt(
|
|
context.Background(),
|
|
cmd.Result.DashboardEncrypted,
|
|
)
|
|
require.NoError(t, err)
|
|
|
|
require.Equal(t, decryptedDashboard, rawDashboard)
|
|
})
|
|
})
|
|
}
|
|
|
|
func TestIntegrationDeleteExpiredSnapshots(t *testing.T) {
|
|
sqlstore := InitTestDB(t)
|
|
|
|
t.Run("Testing dashboard snapshots clean up", func(t *testing.T) {
|
|
setting.SnapShotRemoveExpired = true
|
|
|
|
nonExpiredSnapshot := createTestSnapshot(t, sqlstore, "key1", 48000)
|
|
createTestSnapshot(t, sqlstore, "key2", -1200)
|
|
createTestSnapshot(t, sqlstore, "key3", -1200)
|
|
|
|
err := sqlstore.DeleteExpiredSnapshots(context.Background(), &models.DeleteExpiredSnapshotsCommand{})
|
|
require.NoError(t, err)
|
|
|
|
query := models.GetDashboardSnapshotsQuery{
|
|
OrgId: 1,
|
|
SignedInUser: &models.SignedInUser{OrgRole: models.ROLE_ADMIN},
|
|
}
|
|
err = sqlstore.SearchDashboardSnapshots(context.Background(), &query)
|
|
require.NoError(t, err)
|
|
|
|
assert.Len(t, query.Result, 1)
|
|
assert.Equal(t, nonExpiredSnapshot.Key, query.Result[0].Key)
|
|
|
|
err = sqlstore.DeleteExpiredSnapshots(context.Background(), &models.DeleteExpiredSnapshotsCommand{})
|
|
require.NoError(t, err)
|
|
|
|
query = models.GetDashboardSnapshotsQuery{
|
|
OrgId: 1,
|
|
SignedInUser: &models.SignedInUser{OrgRole: models.ROLE_ADMIN},
|
|
}
|
|
err = sqlstore.SearchDashboardSnapshots(context.Background(), &query)
|
|
require.NoError(t, err)
|
|
|
|
require.Len(t, query.Result, 1)
|
|
require.Equal(t, nonExpiredSnapshot.Key, query.Result[0].Key)
|
|
})
|
|
}
|
|
|
|
func createTestSnapshot(t *testing.T, sqlstore *SQLStore, key string, expires int64) *models.DashboardSnapshot {
|
|
cmd := models.CreateDashboardSnapshotCommand{
|
|
Key: key,
|
|
DeleteKey: "delete" + key,
|
|
Dashboard: simplejson.NewFromAny(map[string]interface{}{
|
|
"hello": "mupp",
|
|
}),
|
|
UserId: 1000,
|
|
OrgId: 1,
|
|
Expires: expires,
|
|
}
|
|
err := sqlstore.CreateDashboardSnapshot(context.Background(), &cmd)
|
|
require.NoError(t, err)
|
|
|
|
// Set expiry date manually - to be able to create expired snapshots
|
|
if expires < 0 {
|
|
expireDate := time.Now().Add(time.Second * time.Duration(expires))
|
|
_, err = sqlstore.engine.Exec("UPDATE dashboard_snapshot SET expires = ? WHERE id = ?", expireDate, cmd.Result.Id)
|
|
require.NoError(t, err)
|
|
}
|
|
|
|
return cmd.Result
|
|
}
|