mirror of
https://github.com/grafana/grafana.git
synced 2025-08-03 04:22:13 +08:00

* Remove collectors * Remove zanzana search check, we need to rewrite that part to the new schema * Only use generic resource schema and cleanup code we don't want to keep / need to re-write
163 lines
6.1 KiB
Go
163 lines
6.1 KiB
Go
package actest
|
|
|
|
import (
|
|
"context"
|
|
|
|
"github.com/grafana/grafana/pkg/apimachinery/identity"
|
|
"github.com/grafana/grafana/pkg/services/accesscontrol"
|
|
)
|
|
|
|
var _ accesscontrol.Service = new(FakeService)
|
|
var _ accesscontrol.RoleRegistry = new(FakeService)
|
|
|
|
type FakeService struct {
|
|
accesscontrol.Service
|
|
ExpectedErr error
|
|
ExpectedCachedPermissions bool
|
|
ExpectedPermissions []accesscontrol.Permission
|
|
ExpectedFilteredUserPermissions []accesscontrol.Permission
|
|
ExpectedUsersPermissions map[int64][]accesscontrol.Permission
|
|
}
|
|
|
|
func (f FakeService) GetUsageStats(ctx context.Context) map[string]any {
|
|
return map[string]any{}
|
|
}
|
|
|
|
func (f FakeService) GetUserPermissions(ctx context.Context, user identity.Requester, options accesscontrol.Options) ([]accesscontrol.Permission, error) {
|
|
return f.ExpectedPermissions, f.ExpectedErr
|
|
}
|
|
|
|
func (f FakeService) SearchUsersPermissions(ctx context.Context, user identity.Requester, options accesscontrol.SearchOptions) (map[int64][]accesscontrol.Permission, error) {
|
|
return f.ExpectedUsersPermissions, f.ExpectedErr
|
|
}
|
|
|
|
func (f FakeService) SearchUserPermissions(ctx context.Context, orgID int64, searchOptions accesscontrol.SearchOptions) ([]accesscontrol.Permission, error) {
|
|
return f.ExpectedFilteredUserPermissions, f.ExpectedErr
|
|
}
|
|
|
|
func (f FakeService) ClearUserPermissionCache(user identity.Requester) {}
|
|
|
|
func (f FakeService) DeleteUserPermissions(ctx context.Context, orgID, userID int64) error {
|
|
return f.ExpectedErr
|
|
}
|
|
|
|
func (f FakeService) DeleteTeamPermissions(ctx context.Context, orgID, teamID int64) error {
|
|
return f.ExpectedErr
|
|
}
|
|
|
|
func (f FakeService) DeclareFixedRoles(registrations ...accesscontrol.RoleRegistration) error {
|
|
return f.ExpectedErr
|
|
}
|
|
|
|
func (f FakeService) RegisterFixedRoles(ctx context.Context) error {
|
|
return f.ExpectedErr
|
|
}
|
|
|
|
func (f FakeService) SaveExternalServiceRole(ctx context.Context, cmd accesscontrol.SaveExternalServiceRoleCommand) error {
|
|
return f.ExpectedErr
|
|
}
|
|
|
|
func (f FakeService) DeleteExternalServiceRole(ctx context.Context, externalServiceID string) error {
|
|
return f.ExpectedErr
|
|
}
|
|
|
|
var _ accesscontrol.AccessControl = new(FakeAccessControl)
|
|
|
|
type FakeAccessControl struct {
|
|
ExpectedErr error
|
|
ExpectedEvaluate bool
|
|
}
|
|
|
|
func (f FakeAccessControl) Evaluate(ctx context.Context, user identity.Requester, evaluator accesscontrol.Evaluator) (bool, error) {
|
|
return f.ExpectedEvaluate, f.ExpectedErr
|
|
}
|
|
|
|
func (f FakeAccessControl) RegisterScopeAttributeResolver(prefix string, resolver accesscontrol.ScopeAttributeResolver) {
|
|
}
|
|
|
|
func (f FakeAccessControl) WithoutResolvers() accesscontrol.AccessControl {
|
|
return f
|
|
}
|
|
|
|
type FakeStore struct {
|
|
ExpectedUserPermissions []accesscontrol.Permission
|
|
ExpectedBasicRolesPermissions []accesscontrol.Permission
|
|
ExpectedTeamsPermissions map[int64][]accesscontrol.Permission
|
|
ExpectedUsersPermissions map[int64][]accesscontrol.Permission
|
|
ExpectedUsersRoles map[int64][]string
|
|
ExpectedErr error
|
|
}
|
|
|
|
func (f FakeStore) GetUserPermissions(ctx context.Context, query accesscontrol.GetUserPermissionsQuery) ([]accesscontrol.Permission, error) {
|
|
return f.ExpectedUserPermissions, f.ExpectedErr
|
|
}
|
|
|
|
func (f FakeStore) GetBasicRolesPermissions(ctx context.Context, query accesscontrol.GetUserPermissionsQuery) ([]accesscontrol.Permission, error) {
|
|
return f.ExpectedBasicRolesPermissions, f.ExpectedErr
|
|
}
|
|
|
|
func (f FakeStore) GetTeamsPermissions(ctx context.Context, query accesscontrol.GetUserPermissionsQuery) (map[int64][]accesscontrol.Permission, error) {
|
|
return f.ExpectedTeamsPermissions, f.ExpectedErr
|
|
}
|
|
|
|
func (f FakeStore) SearchUsersPermissions(ctx context.Context, orgID int64, options accesscontrol.SearchOptions) (map[int64][]accesscontrol.Permission, error) {
|
|
return f.ExpectedUsersPermissions, f.ExpectedErr
|
|
}
|
|
|
|
func (f FakeStore) GetUsersBasicRoles(ctx context.Context, userFilter []int64, orgID int64) (map[int64][]string, error) {
|
|
return f.ExpectedUsersRoles, f.ExpectedErr
|
|
}
|
|
|
|
func (f FakeStore) DeleteUserPermissions(ctx context.Context, orgID, userID int64) error {
|
|
return f.ExpectedErr
|
|
}
|
|
|
|
func (f FakeStore) DeleteTeamPermissions(ctx context.Context, orgID, teamID int64) error {
|
|
return f.ExpectedErr
|
|
}
|
|
|
|
func (f FakeStore) SaveExternalServiceRole(ctx context.Context, cmd accesscontrol.SaveExternalServiceRoleCommand) error {
|
|
return f.ExpectedErr
|
|
}
|
|
|
|
func (f FakeStore) DeleteExternalServiceRole(ctx context.Context, externalServiceID string) error {
|
|
return f.ExpectedErr
|
|
}
|
|
|
|
var _ accesscontrol.PermissionsService = new(FakePermissionsService)
|
|
|
|
type FakePermissionsService struct {
|
|
ExpectedErr error
|
|
ExpectedPermission *accesscontrol.ResourcePermission
|
|
ExpectedPermissions []accesscontrol.ResourcePermission
|
|
ExpectedMappedAction string
|
|
}
|
|
|
|
func (f *FakePermissionsService) GetPermissions(ctx context.Context, user identity.Requester, resourceID string) ([]accesscontrol.ResourcePermission, error) {
|
|
return f.ExpectedPermissions, f.ExpectedErr
|
|
}
|
|
|
|
func (f *FakePermissionsService) SetUserPermission(ctx context.Context, orgID int64, user accesscontrol.User, resourceID, permission string) (*accesscontrol.ResourcePermission, error) {
|
|
return f.ExpectedPermission, f.ExpectedErr
|
|
}
|
|
|
|
func (f *FakePermissionsService) SetTeamPermission(ctx context.Context, orgID, teamID int64, resourceID, permission string) (*accesscontrol.ResourcePermission, error) {
|
|
return f.ExpectedPermission, f.ExpectedErr
|
|
}
|
|
|
|
func (f *FakePermissionsService) SetBuiltInRolePermission(ctx context.Context, orgID int64, builtInRole string, resourceID string, permission string) (*accesscontrol.ResourcePermission, error) {
|
|
return f.ExpectedPermission, f.ExpectedErr
|
|
}
|
|
|
|
func (f *FakePermissionsService) SetPermissions(ctx context.Context, orgID int64, resourceID string, commands ...accesscontrol.SetResourcePermissionCommand) ([]accesscontrol.ResourcePermission, error) {
|
|
return f.ExpectedPermissions, f.ExpectedErr
|
|
}
|
|
|
|
func (f *FakePermissionsService) DeleteResourcePermissions(ctx context.Context, orgID int64, resourceID string) error {
|
|
return f.ExpectedErr
|
|
}
|
|
|
|
func (f *FakePermissionsService) MapActions(permission accesscontrol.ResourcePermission) string {
|
|
return f.ExpectedMappedAction
|
|
}
|