| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251 |
- package api
- import (
- "testing"
- "github.com/grafana/grafana/pkg/api/dtos"
- "github.com/grafana/grafana/pkg/bus"
- "github.com/grafana/grafana/pkg/components/simplejson"
- "github.com/grafana/grafana/pkg/middleware"
- m "github.com/grafana/grafana/pkg/models"
- . "github.com/smartystreets/goconvey/convey"
- )
- func TestDashboardAclApiEndpoint(t *testing.T) {
- Convey("Given a dashboard acl", t, func() {
- mockResult := []*m.DashboardAclInfoDTO{
- {Id: 1, OrgId: 1, DashboardId: 1, UserId: 2, Permission: m.PERMISSION_VIEW},
- {Id: 2, OrgId: 1, DashboardId: 1, UserId: 3, Permission: m.PERMISSION_EDIT},
- {Id: 3, OrgId: 1, DashboardId: 1, UserId: 4, Permission: m.PERMISSION_ADMIN},
- {Id: 4, OrgId: 1, DashboardId: 1, TeamId: 1, Permission: m.PERMISSION_VIEW},
- {Id: 5, OrgId: 1, DashboardId: 1, TeamId: 2, Permission: m.PERMISSION_ADMIN},
- }
- dtoRes := transformDashboardAclsToDTOs(mockResult)
- bus.AddHandler("test", func(query *m.GetDashboardAclInfoListQuery) error {
- query.Result = dtoRes
- return nil
- })
- bus.AddHandler("test", func(query *m.GetDashboardAclInfoListQuery) error {
- query.Result = mockResult
- return nil
- })
- teamResp := []*m.Team{}
- bus.AddHandler("test", func(query *m.GetTeamsByUserQuery) error {
- query.Result = teamResp
- return nil
- })
- Convey("When user is org admin", func() {
- loggedInUserScenarioWithRole("When calling GET on", "GET", "/api/dashboards/id/1/acl", "/api/dashboards/id/:dashboardsId/acl", m.ROLE_ADMIN, func(sc *scenarioContext) {
- Convey("Should be able to access ACL", func() {
- sc.handlerFunc = GetDashboardAclList
- sc.fakeReqWithParams("GET", sc.url, map[string]string{}).exec()
- So(sc.resp.Code, ShouldEqual, 200)
- respJSON, err := simplejson.NewJson(sc.resp.Body.Bytes())
- So(err, ShouldBeNil)
- So(len(respJSON.MustArray()), ShouldEqual, 5)
- So(respJSON.GetIndex(0).Get("userId").MustInt(), ShouldEqual, 2)
- So(respJSON.GetIndex(0).Get("permission").MustInt(), ShouldEqual, m.PERMISSION_VIEW)
- })
- })
- })
- Convey("When user is editor and has admin permission in the ACL", func() {
- loggedInUserScenarioWithRole("When calling GET on", "GET", "/api/dashboards/id/1/acl", "/api/dashboards/id/:dashboardId/acl", m.ROLE_EDITOR, func(sc *scenarioContext) {
- mockResult = append(mockResult, &m.DashboardAclInfoDTO{Id: 6, OrgId: 1, DashboardId: 1, UserId: 1, Permission: m.PERMISSION_ADMIN})
- Convey("Should be able to access ACL", func() {
- sc.handlerFunc = GetDashboardAclList
- sc.fakeReqWithParams("GET", sc.url, map[string]string{}).exec()
- So(sc.resp.Code, ShouldEqual, 200)
- })
- })
- loggedInUserScenarioWithRole("When calling DELETE on", "DELETE", "/api/dashboards/id/1/acl/1", "/api/dashboards/id/:dashboardId/acl/:aclId", m.ROLE_EDITOR, func(sc *scenarioContext) {
- mockResult = append(mockResult, &m.DashboardAclInfoDTO{Id: 6, OrgId: 1, DashboardId: 1, UserId: 1, Permission: m.PERMISSION_ADMIN})
- bus.AddHandler("test3", func(cmd *m.RemoveDashboardAclCommand) error {
- return nil
- })
- Convey("Should be able to delete permission", func() {
- sc.handlerFunc = DeleteDashboardAcl
- sc.fakeReqWithParams("DELETE", sc.url, map[string]string{}).exec()
- So(sc.resp.Code, ShouldEqual, 200)
- })
- })
- loggedInUserScenarioWithRole("When calling DELETE on", "DELETE", "/api/dashboards/id/1/acl/6", "/api/dashboards/id/:dashboardId/acl/:aclId", m.ROLE_EDITOR, func(sc *scenarioContext) {
- mockResult = append(mockResult, &m.DashboardAclInfoDTO{Id: 6, OrgId: 1, DashboardId: 1, UserId: 1, Permission: m.PERMISSION_ADMIN})
- bus.AddHandler("test3", func(cmd *m.RemoveDashboardAclCommand) error {
- return nil
- })
- Convey("Should not be able to delete their own Admin permission", func() {
- sc.handlerFunc = DeleteDashboardAcl
- sc.fakeReqWithParams("DELETE", sc.url, map[string]string{}).exec()
- So(sc.resp.Code, ShouldEqual, 403)
- })
- })
- Convey("Should not be able to downgrade their own Admin permission", func() {
- cmd := dtos.UpdateDashboardAclCommand{
- Items: []dtos.DashboardAclUpdateItem{
- {UserId: TestUserID, Permission: m.PERMISSION_EDIT},
- },
- }
- postAclScenario("When calling POST on", "/api/dashboards/id/1/acl", "/api/dashboards/id/:dashboardId/acl", m.ROLE_EDITOR, cmd, func(sc *scenarioContext) {
- mockResult = append(mockResult, &m.DashboardAclInfoDTO{Id: 6, OrgId: 1, DashboardId: 1, UserId: 1, Permission: m.PERMISSION_ADMIN})
- CallPostAcl(sc)
- So(sc.resp.Code, ShouldEqual, 403)
- })
- })
- Convey("Should be able to update permissions", func() {
- cmd := dtos.UpdateDashboardAclCommand{
- Items: []dtos.DashboardAclUpdateItem{
- {UserId: TestUserID, Permission: m.PERMISSION_ADMIN},
- {UserId: 2, Permission: m.PERMISSION_EDIT},
- },
- }
- postAclScenario("When calling POST on", "/api/dashboards/id/1/acl", "/api/dashboards/id/:dashboardId/acl", m.ROLE_EDITOR, cmd, func(sc *scenarioContext) {
- mockResult = append(mockResult, &m.DashboardAclInfoDTO{Id: 6, OrgId: 1, DashboardId: 1, UserId: 1, Permission: m.PERMISSION_ADMIN})
- CallPostAcl(sc)
- So(sc.resp.Code, ShouldEqual, 200)
- })
- })
- Convey("When user is a member of a team in the ACL with admin permission", func() {
- loggedInUserScenarioWithRole("When calling DELETE on", "DELETE", "/api/dashboards/id/1/acl/1", "/api/dashboards/id/:dashboardsId/acl/:aclId", m.ROLE_EDITOR, func(sc *scenarioContext) {
- teamResp = append(teamResp, &m.Team{Id: 2, OrgId: 1, Name: "UG2"})
- bus.AddHandler("test3", func(cmd *m.RemoveDashboardAclCommand) error {
- return nil
- })
- Convey("Should be able to delete permission", func() {
- sc.handlerFunc = DeleteDashboardAcl
- sc.fakeReqWithParams("DELETE", sc.url, map[string]string{}).exec()
- So(sc.resp.Code, ShouldEqual, 200)
- })
- })
- })
- })
- Convey("When user is editor and has edit permission in the ACL", func() {
- loggedInUserScenarioWithRole("When calling GET on", "GET", "/api/dashboards/id/1/acl", "/api/dashboards/id/:dashboardId/acl", m.ROLE_EDITOR, func(sc *scenarioContext) {
- mockResult = append(mockResult, &m.DashboardAclInfoDTO{Id: 1, OrgId: 1, DashboardId: 1, UserId: 1, Permission: m.PERMISSION_EDIT})
- Convey("Should not be able to access ACL", func() {
- sc.handlerFunc = GetDashboardAclList
- sc.fakeReqWithParams("GET", sc.url, map[string]string{}).exec()
- So(sc.resp.Code, ShouldEqual, 403)
- })
- })
- loggedInUserScenarioWithRole("When calling DELETE on", "DELETE", "/api/dashboards/id/1/acl/1", "/api/dashboards/id/:dashboardId/acl/:aclId", m.ROLE_EDITOR, func(sc *scenarioContext) {
- mockResult = append(mockResult, &m.DashboardAclInfoDTO{Id: 1, OrgId: 1, DashboardId: 1, UserId: 1, Permission: m.PERMISSION_EDIT})
- bus.AddHandler("test3", func(cmd *m.RemoveDashboardAclCommand) error {
- return nil
- })
- Convey("Should be not be able to delete permission", func() {
- sc.handlerFunc = DeleteDashboardAcl
- sc.fakeReqWithParams("DELETE", sc.url, map[string]string{}).exec()
- So(sc.resp.Code, ShouldEqual, 403)
- })
- })
- })
- Convey("When user is editor and not in the ACL", func() {
- loggedInUserScenarioWithRole("When calling GET on", "GET", "/api/dashboards/id/1/acl", "/api/dashboards/id/:dashboardsId/acl", m.ROLE_EDITOR, func(sc *scenarioContext) {
- Convey("Should not be able to access ACL", func() {
- sc.handlerFunc = GetDashboardAclList
- sc.fakeReqWithParams("GET", sc.url, map[string]string{}).exec()
- So(sc.resp.Code, ShouldEqual, 403)
- })
- })
- loggedInUserScenarioWithRole("When calling DELETE on", "DELETE", "/api/dashboards/id/1/acl/user/1", "/api/dashboards/id/:dashboardsId/acl/user/:userId", m.ROLE_EDITOR, func(sc *scenarioContext) {
- mockResult = append(mockResult, &m.DashboardAclInfoDTO{Id: 1, OrgId: 1, DashboardId: 1, UserId: 1, Permission: m.PERMISSION_VIEW})
- bus.AddHandler("test3", func(cmd *m.RemoveDashboardAclCommand) error {
- return nil
- })
- Convey("Should be not be able to delete permission", func() {
- sc.handlerFunc = DeleteDashboardAcl
- sc.fakeReqWithParams("DELETE", sc.url, map[string]string{}).exec()
- So(sc.resp.Code, ShouldEqual, 403)
- })
- })
- })
- })
- }
- func transformDashboardAclsToDTOs(acls []*m.DashboardAclInfoDTO) []*m.DashboardAclInfoDTO {
- dtos := make([]*m.DashboardAclInfoDTO, 0)
- for _, acl := range acls {
- dto := &m.DashboardAclInfoDTO{
- Id: acl.Id,
- OrgId: acl.OrgId,
- DashboardId: acl.DashboardId,
- Permission: acl.Permission,
- UserId: acl.UserId,
- TeamId: acl.TeamId,
- }
- dtos = append(dtos, dto)
- }
- return dtos
- }
- func CallPostAcl(sc *scenarioContext) {
- bus.AddHandler("test", func(cmd *m.UpdateDashboardAclCommand) error {
- return nil
- })
- sc.fakeReqWithParams("POST", sc.url, map[string]string{}).exec()
- }
- func postAclScenario(desc string, url string, routePattern string, role m.RoleType, cmd dtos.UpdateDashboardAclCommand, fn scenarioFunc) {
- Convey(desc+" "+url, func() {
- defer bus.ClearBusHandlers()
- sc := setupScenarioContext(url)
- sc.defaultHandler = wrap(func(c *middleware.Context) Response {
- sc.context = c
- sc.context.UserId = TestUserID
- sc.context.OrgId = TestOrgID
- sc.context.OrgRole = role
- return UpdateDashboardAcl(c, cmd)
- })
- sc.m.Post(routePattern, sc.defaultHandler)
- fn(sc)
- })
- }
|