mirror of
https://github.com/grafana/grafana.git
synced 2025-08-02 01:15:46 +08:00
166 lines
3.9 KiB
Go
166 lines
3.9 KiB
Go
package accesscontrol
|
|
|
|
import (
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
|
|
claims "github.com/grafana/authlib/types"
|
|
|
|
"github.com/grafana/grafana/pkg/infra/log"
|
|
"github.com/grafana/grafana/pkg/services/org"
|
|
"github.com/grafana/grafana/pkg/services/user"
|
|
)
|
|
|
|
var testLogger = log.New("test")
|
|
|
|
func TestPermissionCacheKey(t *testing.T) {
|
|
testcases := []struct {
|
|
name string
|
|
signedInUser *user.SignedInUser
|
|
expected string
|
|
}{
|
|
{
|
|
name: "should return correct key for user",
|
|
signedInUser: &user.SignedInUser{
|
|
OrgID: 1,
|
|
UserID: 1,
|
|
FallbackType: claims.TypeUser,
|
|
},
|
|
expected: "rbac-permissions-1-user-1",
|
|
},
|
|
{
|
|
name: "should return correct key for api key",
|
|
signedInUser: &user.SignedInUser{
|
|
OrgID: 1,
|
|
ApiKeyID: 1,
|
|
IsServiceAccount: false,
|
|
FallbackType: claims.TypeUser,
|
|
},
|
|
expected: "rbac-permissions-1-api-key-1",
|
|
},
|
|
{
|
|
name: "should return correct key for service account",
|
|
signedInUser: &user.SignedInUser{
|
|
OrgID: 1,
|
|
UserID: 1,
|
|
IsServiceAccount: true,
|
|
FallbackType: claims.TypeUser,
|
|
},
|
|
expected: "rbac-permissions-1-service-account-1",
|
|
},
|
|
{
|
|
name: "should return correct key for matching a service account with userId -1",
|
|
signedInUser: &user.SignedInUser{
|
|
OrgID: 1,
|
|
UserID: -1,
|
|
IsServiceAccount: true,
|
|
FallbackType: claims.TypeUser, // NOTE, this is still a service account!
|
|
},
|
|
expected: "rbac-permissions-1-service-account--1",
|
|
},
|
|
{
|
|
name: "should use org role if no unique id",
|
|
signedInUser: &user.SignedInUser{
|
|
OrgID: 1,
|
|
OrgRole: org.RoleNone,
|
|
FallbackType: claims.TypeUser,
|
|
},
|
|
expected: "rbac-permissions-1-user-None",
|
|
},
|
|
}
|
|
|
|
for _, tc := range testcases {
|
|
t.Run(tc.name, func(t *testing.T) {
|
|
assert.Equal(t, tc.expected, GetUserPermissionCacheKey(tc.signedInUser))
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestGetSearchPermissionCacheKey(t *testing.T) {
|
|
keyInputs := []struct {
|
|
signedInUser *user.SignedInUser
|
|
searchOptions SearchOptions
|
|
}{
|
|
{
|
|
signedInUser: &user.SignedInUser{
|
|
OrgID: 1,
|
|
UserID: 1,
|
|
},
|
|
searchOptions: SearchOptions{},
|
|
},
|
|
{
|
|
signedInUser: &user.SignedInUser{
|
|
OrgID: 1,
|
|
UserID: 1,
|
|
},
|
|
searchOptions: SearchOptions{
|
|
Action: "datasources:read",
|
|
},
|
|
},
|
|
{
|
|
signedInUser: &user.SignedInUser{
|
|
OrgID: 1,
|
|
UserID: 1,
|
|
},
|
|
searchOptions: SearchOptions{
|
|
Scope: "datasources:*",
|
|
},
|
|
},
|
|
{
|
|
signedInUser: &user.SignedInUser{
|
|
OrgID: 1,
|
|
UserID: 1,
|
|
},
|
|
searchOptions: SearchOptions{
|
|
Action: "datasources:read",
|
|
Scope: "datasources:*",
|
|
},
|
|
},
|
|
{
|
|
signedInUser: &user.SignedInUser{
|
|
OrgID: 1,
|
|
UserID: 1,
|
|
},
|
|
searchOptions: SearchOptions{
|
|
RolePrefixes: []string{"foo", "bar"},
|
|
},
|
|
},
|
|
}
|
|
|
|
cacheKeys := make([]string, 0, len(keyInputs))
|
|
|
|
for _, i := range keyInputs {
|
|
key, err := GetSearchPermissionCacheKey(testLogger, i.signedInUser, i.searchOptions)
|
|
require.NoError(t, err)
|
|
cacheKeys = append(cacheKeys, key)
|
|
}
|
|
|
|
uniqueCheck := make(map[string]bool)
|
|
for _, str := range cacheKeys {
|
|
require.False(t, uniqueCheck[str], "Found duplicate string: %s", str)
|
|
uniqueCheck[str] = true
|
|
}
|
|
|
|
assert.Equal(t, len(cacheKeys), len(uniqueCheck), "The slice contains duplicate strings")
|
|
|
|
t.Run("the cache key is consistent", func(t *testing.T) {
|
|
user := &user.SignedInUser{
|
|
OrgID: 1,
|
|
UserID: 1,
|
|
}
|
|
key1, err := GetSearchPermissionCacheKey(testLogger, user, SearchOptions{
|
|
ActionPrefix: "foobar",
|
|
RolePrefixes: []string{"foo", "bar"},
|
|
})
|
|
require.NoError(t, err)
|
|
key2, err := GetSearchPermissionCacheKey(testLogger, user, SearchOptions{
|
|
ActionPrefix: "foobar",
|
|
RolePrefixes: []string{"foo", "bar"},
|
|
})
|
|
require.NoError(t, err)
|
|
assert.Equal(t, key1, key2, "expected search cache keys to be consistent")
|
|
})
|
|
}
|