| 
									
										
										
										
											2021-10-27 19:13:59 +08:00
										 |  |  | package api | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | import ( | 
					
						
							| 
									
										
										
										
											2024-07-03 14:08:57 +08:00
										 |  |  | 	"context" | 
					
						
							| 
									
										
										
										
											2021-10-27 19:13:59 +08:00
										 |  |  | 	"fmt" | 
					
						
							|  |  |  | 	"net/http" | 
					
						
							|  |  |  | 	"strings" | 
					
						
							|  |  |  | 	"testing" | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2024-04-10 18:42:13 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/services/authn" | 
					
						
							|  |  |  | 	"github.com/grafana/grafana/pkg/services/authn/authntest" | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-10-27 19:13:59 +08:00
										 |  |  | 	"github.com/stretchr/testify/assert" | 
					
						
							| 
									
										
										
										
											2023-01-17 18:33:01 +08:00
										 |  |  | 	"github.com/stretchr/testify/require" | 
					
						
							| 
									
										
										
										
											2021-10-27 19:13:59 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	"github.com/grafana/grafana/pkg/services/accesscontrol" | 
					
						
							| 
									
										
										
										
											2023-07-12 18:28:04 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/services/accesscontrol/actest" | 
					
						
							| 
									
										
										
										
											2023-01-17 18:33:01 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/services/user" | 
					
						
							|  |  |  | 	"github.com/grafana/grafana/pkg/services/user/usertest" | 
					
						
							| 
									
										
										
										
											2021-10-27 19:13:59 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/setting" | 
					
						
							| 
									
										
										
										
											2023-01-17 18:33:01 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/web/webtest" | 
					
						
							| 
									
										
										
										
											2021-10-27 19:13:59 +08:00
										 |  |  | ) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | var ( | 
					
						
							|  |  |  | 	getCurrentOrgQuotasURL = "/api/org/quotas" | 
					
						
							|  |  |  | 	getOrgsQuotasURL       = "/api/orgs/%v/quotas" | 
					
						
							|  |  |  | 	putOrgsQuotasURL       = "/api/orgs/%v/quotas/%v" | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	testUpdateOrgQuotaCmd = `{ "limit": 20 }` | 
					
						
							|  |  |  | ) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-05-23 22:29:20 +08:00
										 |  |  | func TestAPIEndpoint_GetCurrentOrgQuotas(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2022-11-15 03:08:10 +08:00
										 |  |  | 	cfg := setting.NewCfg() | 
					
						
							|  |  |  | 	cfg.Quota.Enabled = true | 
					
						
							| 
									
										
										
										
											2023-01-17 18:33:01 +08:00
										 |  |  | 	server := SetupAPITestServer(t, func(hs *HTTPServer) { | 
					
						
							|  |  |  | 		hs.Cfg = cfg | 
					
						
							|  |  |  | 	}) | 
					
						
							| 
									
										
										
										
											2021-10-27 19:13:59 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	t.Run("AccessControl allows viewing CurrentOrgQuotas with correct permissions", func(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2023-01-17 18:33:01 +08:00
										 |  |  | 		req := webtest.RequestWithSignedInUser(server.NewGetRequest(getCurrentOrgQuotasURL), userWithPermissions(1, []accesscontrol.Permission{{Action: accesscontrol.ActionOrgsQuotasRead}})) | 
					
						
							|  |  |  | 		res, err := server.Send(req) | 
					
						
							|  |  |  | 		require.NoError(t, err) | 
					
						
							|  |  |  | 		assert.Equal(t, http.StatusOK, res.StatusCode) | 
					
						
							|  |  |  | 		require.NoError(t, res.Body.Close()) | 
					
						
							| 
									
										
										
										
											2021-10-27 19:13:59 +08:00
										 |  |  | 	}) | 
					
						
							| 
									
										
										
										
											2021-11-17 17:12:28 +08:00
										 |  |  | 	t.Run("AccessControl prevents viewing CurrentOrgQuotas with correct permissions in another org", func(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2023-01-17 18:33:01 +08:00
										 |  |  | 		// Set permissions in org 2, but set current org to org 1
 | 
					
						
							|  |  |  | 		user := userWithPermissions(2, []accesscontrol.Permission{{Action: accesscontrol.ActionOrgsQuotasRead}}) | 
					
						
							|  |  |  | 		user.OrgID = 1 | 
					
						
							|  |  |  | 		req := webtest.RequestWithSignedInUser(server.NewGetRequest(getCurrentOrgQuotasURL), user) | 
					
						
							|  |  |  | 		res, err := server.Send(req) | 
					
						
							|  |  |  | 		require.NoError(t, err) | 
					
						
							|  |  |  | 		assert.Equal(t, http.StatusForbidden, res.StatusCode) | 
					
						
							|  |  |  | 		require.NoError(t, res.Body.Close()) | 
					
						
							| 
									
										
										
										
											2021-10-27 19:13:59 +08:00
										 |  |  | 	}) | 
					
						
							|  |  |  | 	t.Run("AccessControl prevents viewing CurrentOrgQuotas with incorrect permissions", func(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2023-01-17 18:33:01 +08:00
										 |  |  | 		req := webtest.RequestWithSignedInUser(server.NewGetRequest(getCurrentOrgQuotasURL), userWithPermissions(1, []accesscontrol.Permission{{Action: "orgs:invalid"}})) | 
					
						
							|  |  |  | 		res, err := server.Send(req) | 
					
						
							|  |  |  | 		require.NoError(t, err) | 
					
						
							|  |  |  | 		assert.Equal(t, http.StatusForbidden, res.StatusCode) | 
					
						
							|  |  |  | 		require.NoError(t, res.Body.Close()) | 
					
						
							| 
									
										
										
										
											2021-10-27 19:13:59 +08:00
										 |  |  | 	}) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-05-23 22:29:20 +08:00
										 |  |  | func TestAPIEndpoint_GetOrgQuotas(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2022-11-15 03:08:10 +08:00
										 |  |  | 	cfg := setting.NewCfg() | 
					
						
							|  |  |  | 	cfg.Quota.Enabled = true | 
					
						
							| 
									
										
										
										
											2023-01-17 18:33:01 +08:00
										 |  |  | 	server := SetupAPITestServer(t, func(hs *HTTPServer) { | 
					
						
							|  |  |  | 		hs.Cfg = cfg | 
					
						
							| 
									
										
										
										
											2023-07-12 18:28:04 +08:00
										 |  |  | 		hs.accesscontrolService = &actest.FakeService{ExpectedPermissions: []accesscontrol.Permission{}} | 
					
						
							| 
									
										
										
										
											2023-01-17 18:33:01 +08:00
										 |  |  | 		hs.userService = &usertest.FakeUserService{ | 
					
						
							|  |  |  | 			ExpectedSignedInUser: &user.SignedInUser{OrgID: 2}, | 
					
						
							|  |  |  | 		} | 
					
						
							| 
									
										
										
										
											2024-04-10 18:42:13 +08:00
										 |  |  | 		hs.authnService = &authntest.FakeService{ | 
					
						
							|  |  |  | 			ExpectedIdentity: &authn.Identity{OrgID: 1}, | 
					
						
							|  |  |  | 		} | 
					
						
							| 
									
										
										
										
											2023-01-17 18:33:01 +08:00
										 |  |  | 	}) | 
					
						
							| 
									
										
										
										
											2021-10-27 19:13:59 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	t.Run("AccessControl allows viewing another org quotas with correct permissions", func(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2023-01-17 18:33:01 +08:00
										 |  |  | 		req := webtest.RequestWithSignedInUser(server.NewGetRequest(fmt.Sprintf(getOrgsQuotasURL, 2)), userWithPermissions(2, []accesscontrol.Permission{{Action: accesscontrol.ActionOrgsQuotasRead}})) | 
					
						
							|  |  |  | 		res, err := server.Send(req) | 
					
						
							|  |  |  | 		require.NoError(t, err) | 
					
						
							|  |  |  | 		assert.Equal(t, http.StatusOK, res.StatusCode) | 
					
						
							|  |  |  | 		require.NoError(t, res.Body.Close()) | 
					
						
							| 
									
										
										
										
											2021-10-27 19:13:59 +08:00
										 |  |  | 	}) | 
					
						
							| 
									
										
										
										
											2021-11-17 17:12:28 +08:00
										 |  |  | 	t.Run("AccessControl prevents viewing another org quotas with correct permissions in another org", func(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2023-01-17 18:33:01 +08:00
										 |  |  | 		// Set correct permissions in org 1 and empty permissions in org 2
 | 
					
						
							|  |  |  | 		user := userWithPermissions(1, []accesscontrol.Permission{{Action: accesscontrol.ActionOrgsQuotasRead}}) | 
					
						
							| 
									
										
										
										
											2023-07-12 18:28:04 +08:00
										 |  |  | 		user.Permissions[2] = nil | 
					
						
							| 
									
										
										
										
											2023-01-17 18:33:01 +08:00
										 |  |  | 		req := webtest.RequestWithSignedInUser(server.NewGetRequest(fmt.Sprintf(getOrgsQuotasURL, 2)), user) | 
					
						
							|  |  |  | 		res, err := server.Send(req) | 
					
						
							|  |  |  | 		require.NoError(t, err) | 
					
						
							|  |  |  | 		assert.Equal(t, http.StatusForbidden, res.StatusCode) | 
					
						
							|  |  |  | 		require.NoError(t, res.Body.Close()) | 
					
						
							| 
									
										
										
										
											2021-10-27 19:13:59 +08:00
										 |  |  | 	}) | 
					
						
							|  |  |  | 	t.Run("AccessControl prevents viewing another org quotas with incorrect permissions", func(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2023-01-17 18:33:01 +08:00
										 |  |  | 		req := webtest.RequestWithSignedInUser(server.NewGetRequest(fmt.Sprintf(getOrgsQuotasURL, 2)), userWithPermissions(2, []accesscontrol.Permission{{Action: "orgs:invalid"}})) | 
					
						
							|  |  |  | 		res, err := server.Send(req) | 
					
						
							|  |  |  | 		require.NoError(t, err) | 
					
						
							|  |  |  | 		assert.Equal(t, http.StatusForbidden, res.StatusCode) | 
					
						
							|  |  |  | 		require.NoError(t, res.Body.Close()) | 
					
						
							| 
									
										
										
										
											2021-10-27 19:13:59 +08:00
										 |  |  | 	}) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-05-23 22:29:20 +08:00
										 |  |  | func TestAPIEndpoint_PutOrgQuotas(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2024-04-10 18:42:13 +08:00
										 |  |  | 	type testCase struct { | 
					
						
							|  |  |  | 		desc         string | 
					
						
							|  |  |  | 		userOrg      int64 | 
					
						
							|  |  |  | 		targetOrg    int64 | 
					
						
							|  |  |  | 		permissions  map[int64][]accesscontrol.Permission | 
					
						
							|  |  |  | 		expectedCode int | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	tests := []testCase{ | 
					
						
							|  |  |  | 		{ | 
					
						
							|  |  |  | 			desc:         "AccessControl allows updating another org quotas with correct permissions", | 
					
						
							|  |  |  | 			userOrg:      1, | 
					
						
							|  |  |  | 			targetOrg:    2, | 
					
						
							|  |  |  | 			permissions:  map[int64][]accesscontrol.Permission{2: {{Action: accesscontrol.ActionOrgsQuotasWrite}}}, | 
					
						
							|  |  |  | 			expectedCode: http.StatusOK, | 
					
						
							| 
									
										
										
										
											2022-11-15 03:08:10 +08:00
										 |  |  | 		}, | 
					
						
							| 
									
										
										
										
											2024-04-10 18:42:13 +08:00
										 |  |  | 		{ | 
					
						
							|  |  |  | 			desc:         "AccessControl prevents updating another org quotas with correct permissions in another org", | 
					
						
							|  |  |  | 			userOrg:      1, | 
					
						
							|  |  |  | 			targetOrg:    2, | 
					
						
							|  |  |  | 			permissions:  map[int64][]accesscontrol.Permission{1: {{Action: accesscontrol.ActionOrgsQuotasWrite}}}, | 
					
						
							|  |  |  | 			expectedCode: http.StatusForbidden, | 
					
						
							| 
									
										
										
										
											2022-11-15 03:08:10 +08:00
										 |  |  | 		}, | 
					
						
							| 
									
										
										
										
											2024-04-10 18:42:13 +08:00
										 |  |  | 		{ | 
					
						
							|  |  |  | 			desc:         "AccessControl prevents updating another org quotas with incorrect permissions", | 
					
						
							|  |  |  | 			userOrg:      2, | 
					
						
							|  |  |  | 			targetOrg:    2, | 
					
						
							|  |  |  | 			permissions:  map[int64][]accesscontrol.Permission{2: {{Action: "orgs:invalid"}}}, | 
					
						
							|  |  |  | 			expectedCode: http.StatusForbidden, | 
					
						
							| 
									
										
										
										
											2022-11-15 03:08:10 +08:00
										 |  |  | 		}, | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2021-10-27 19:13:59 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2024-04-10 18:42:13 +08:00
										 |  |  | 	for _, tt := range tests { | 
					
						
							|  |  |  | 		t.Run(tt.desc, func(t *testing.T) { | 
					
						
							|  |  |  | 			cfg := setting.NewCfg() | 
					
						
							|  |  |  | 			cfg.Quota = setting.QuotaSettings{ | 
					
						
							|  |  |  | 				Enabled: true, | 
					
						
							|  |  |  | 				Global: setting.GlobalQuota{ | 
					
						
							|  |  |  | 					Org: 5, | 
					
						
							|  |  |  | 				}, | 
					
						
							|  |  |  | 				Org: setting.OrgQuota{ | 
					
						
							|  |  |  | 					User: 5, | 
					
						
							|  |  |  | 				}, | 
					
						
							|  |  |  | 				User: setting.UserQuota{ | 
					
						
							|  |  |  | 					Org: 5, | 
					
						
							|  |  |  | 				}, | 
					
						
							|  |  |  | 			} | 
					
						
							|  |  |  | 			fakeACService := &actest.FakeService{} | 
					
						
							|  |  |  | 			input := strings.NewReader(testUpdateOrgQuotaCmd) | 
					
						
							|  |  |  | 			expectedIdentity := &authn.Identity{ | 
					
						
							|  |  |  | 				OrgID:       tt.userOrg, | 
					
						
							|  |  |  | 				Permissions: map[int64]map[string][]string{}, | 
					
						
							|  |  |  | 			} | 
					
						
							|  |  |  | 			for orgID, permissions := range tt.permissions { | 
					
						
							| 
									
										
										
										
											2024-07-03 14:08:57 +08:00
										 |  |  | 				expectedIdentity.Permissions[orgID] = accesscontrol.GroupScopesByActionContext(context.Background(), permissions) | 
					
						
							| 
									
										
										
										
											2024-04-10 18:42:13 +08:00
										 |  |  | 			} | 
					
						
							| 
									
										
										
										
											2021-10-27 19:13:59 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2024-04-10 18:42:13 +08:00
										 |  |  | 			server := SetupAPITestServer(t, func(hs *HTTPServer) { | 
					
						
							|  |  |  | 				hs.Cfg = cfg | 
					
						
							|  |  |  | 				hs.accesscontrolService = fakeACService | 
					
						
							|  |  |  | 				hs.userService = &usertest.FakeUserService{ | 
					
						
							|  |  |  | 					ExpectedSignedInUser: &user.SignedInUser{OrgID: tt.userOrg}, | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 				hs.authnService = &authntest.FakeService{ | 
					
						
							|  |  |  | 					ExpectedIdentity: expectedIdentity, | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 			}) | 
					
						
							| 
									
										
										
										
											2021-10-27 19:13:59 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2024-04-10 18:42:13 +08:00
										 |  |  | 			user := userWithPermissions(tt.userOrg, getFirstOrgPermissions(tt.permissions)) | 
					
						
							|  |  |  | 			fakeACService.ExpectedPermissions = []accesscontrol.Permission{{Action: accesscontrol.ActionOrgsQuotasWrite}} | 
					
						
							|  |  |  | 			req := webtest.RequestWithSignedInUser(server.NewRequest(http.MethodPut, fmt.Sprintf(putOrgsQuotasURL, tt.targetOrg, "org_user"), input), user) | 
					
						
							|  |  |  | 			response, err := server.SendJSON(req) | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 			assert.Equal(t, tt.expectedCode, response.StatusCode) | 
					
						
							|  |  |  | 			require.NoError(t, response.Body.Close()) | 
					
						
							|  |  |  | 		}) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func getFirstOrgPermissions(p map[int64][]accesscontrol.Permission) []accesscontrol.Permission { | 
					
						
							|  |  |  | 	for _, permissions := range p { | 
					
						
							|  |  |  | 		return permissions | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	return []accesscontrol.Permission{} | 
					
						
							| 
									
										
										
										
											2021-10-27 19:13:59 +08:00
										 |  |  | } |