| 
									
										
										
										
											2021-08-09 22:07:54 +08:00
										 |  |  | package api | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | import ( | 
					
						
							| 
									
										
										
										
											2022-02-09 20:44:38 +08:00
										 |  |  | 	"context" | 
					
						
							| 
									
										
										
										
											2021-09-08 14:49:05 +08:00
										 |  |  | 	"encoding/json" | 
					
						
							| 
									
										
										
										
											2023-03-28 00:44:06 +08:00
										 |  |  | 	"errors" | 
					
						
							| 
									
										
										
										
											2021-09-08 14:49:05 +08:00
										 |  |  | 	"fmt" | 
					
						
							| 
									
										
										
										
											2022-02-09 20:44:38 +08:00
										 |  |  | 	"net/http" | 
					
						
							|  |  |  | 	"net/http/httptest" | 
					
						
							| 
									
										
										
										
											2021-09-08 14:49:05 +08:00
										 |  |  | 	"os" | 
					
						
							|  |  |  | 	"path/filepath" | 
					
						
							| 
									
										
										
										
											2022-07-06 22:22:59 +08:00
										 |  |  | 	"strings" | 
					
						
							| 
									
										
										
										
											2021-08-09 22:07:54 +08:00
										 |  |  | 	"testing" | 
					
						
							| 
									
										
										
										
											2021-09-08 14:49:05 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-01-27 22:08:17 +08:00
										 |  |  | 	"github.com/prometheus/client_golang/prometheus" | 
					
						
							|  |  |  | 	dto "github.com/prometheus/client_model/go" | 
					
						
							| 
									
										
										
										
											2023-02-21 18:13:35 +08:00
										 |  |  | 	"github.com/stretchr/testify/assert" | 
					
						
							| 
									
										
										
										
											2021-09-08 14:49:05 +08:00
										 |  |  | 	"github.com/stretchr/testify/require" | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2025-01-14 17:26:15 +08:00
										 |  |  | 	"github.com/grafana/grafana-plugin-sdk-go/backend" | 
					
						
							|  |  |  | 	"github.com/grafana/grafana/pkg/plugins/auth" | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-09-09 15:44:50 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/api/dtos" | 
					
						
							| 
									
										
										
										
											2021-09-08 14:49:05 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/infra/log" | 
					
						
							| 
									
										
										
										
											2023-11-24 23:02:44 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/infra/log/logtest" | 
					
						
							| 
									
										
										
										
											2023-03-28 17:01:06 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/infra/tracing" | 
					
						
							| 
									
										
										
										
											2021-09-08 14:49:05 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/plugins" | 
					
						
							| 
									
										
										
										
											2023-01-27 22:08:17 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/plugins/config" | 
					
						
							| 
									
										
										
										
											2023-03-28 00:44:06 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/plugins/manager/fakes" | 
					
						
							| 
									
										
										
										
											2023-03-29 18:55:55 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/plugins/manager/filestore" | 
					
						
							|  |  |  | 	"github.com/grafana/grafana/pkg/plugins/manager/registry" | 
					
						
							| 
									
										
										
										
											2024-10-04 20:55:09 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/plugins/manager/signature" | 
					
						
							|  |  |  | 	"github.com/grafana/grafana/pkg/plugins/manager/signature/statickey" | 
					
						
							| 
									
										
										
										
											2023-01-27 22:08:17 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/plugins/pluginscdn" | 
					
						
							| 
									
										
										
										
											2022-09-09 15:44:50 +08:00
										 |  |  | 	ac "github.com/grafana/grafana/pkg/services/accesscontrol" | 
					
						
							| 
									
										
										
										
											2023-11-24 23:02:44 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/services/accesscontrol/acimpl" | 
					
						
							| 
									
										
										
										
											2023-11-21 22:09:43 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/services/accesscontrol/actest" | 
					
						
							| 
									
										
										
										
											2024-04-10 18:42:13 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/services/authn" | 
					
						
							|  |  |  | 	"github.com/grafana/grafana/pkg/services/authn/authntest" | 
					
						
							| 
									
										
										
										
											2023-01-27 15:50:36 +08:00
										 |  |  | 	contextmodel "github.com/grafana/grafana/pkg/services/contexthandler/model" | 
					
						
							| 
									
										
										
										
											2024-05-10 18:56:52 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/services/featuremgmt" | 
					
						
							| 
									
										
										
										
											2022-08-10 17:56:48 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/services/org" | 
					
						
							| 
									
										
										
										
											2023-01-13 17:34:20 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/services/org/orgtest" | 
					
						
							| 
									
										
										
										
											2024-07-29 18:18:43 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/services/pluginsintegration/managedplugins" | 
					
						
							| 
									
										
										
										
											2023-03-27 17:15:37 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/services/pluginsintegration/pluginaccesscontrol" | 
					
						
							| 
									
										
										
										
											2024-09-09 17:38:35 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/services/pluginsintegration/pluginassets" | 
					
						
							| 
									
										
										
										
											2024-04-18 20:29:02 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/services/pluginsintegration/pluginerrs" | 
					
						
							| 
									
										
										
										
											2025-01-27 23:39:46 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/services/pluginsintegration/plugininstaller" | 
					
						
							| 
									
										
										
										
											2023-03-08 00:22:30 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/services/pluginsintegration/pluginsettings" | 
					
						
							| 
									
										
										
										
											2023-09-11 19:59:24 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/services/pluginsintegration/pluginstore" | 
					
						
							| 
									
										
										
										
											2022-09-09 15:44:50 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/services/updatechecker" | 
					
						
							| 
									
										
										
										
											2023-11-24 23:02:44 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/services/user" | 
					
						
							| 
									
										
										
										
											2021-09-08 14:49:05 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/setting" | 
					
						
							| 
									
										
										
										
											2023-11-24 23:02:44 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/web" | 
					
						
							| 
									
										
										
										
											2022-07-06 22:22:59 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/web/webtest" | 
					
						
							| 
									
										
										
										
											2021-08-09 22:07:54 +08:00
										 |  |  | ) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-07-06 22:22:59 +08:00
										 |  |  | func Test_PluginsInstallAndUninstall(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2023-03-27 17:15:37 +08:00
										 |  |  | 	canInstall := []ac.Permission{{Action: pluginaccesscontrol.ActionInstall}} | 
					
						
							| 
									
										
										
										
											2022-09-09 15:44:50 +08:00
										 |  |  | 	cannotInstall := []ac.Permission{{Action: "plugins:cannotinstall"}} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2024-08-14 20:57:37 +08:00
										 |  |  | 	pluginID := "" | 
					
						
							| 
									
										
										
										
											2023-11-21 22:09:43 +08:00
										 |  |  | 	localOrg := int64(1) | 
					
						
							|  |  |  | 	globalOrg := int64(ac.GlobalOrgID) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-09-09 15:44:50 +08:00
										 |  |  | 	type testCase struct { | 
					
						
							|  |  |  | 		expectedCode                     int | 
					
						
							| 
									
										
										
										
											2023-11-21 22:09:43 +08:00
										 |  |  | 		permissionOrg                    int64 | 
					
						
							| 
									
										
										
										
											2022-09-09 15:44:50 +08:00
										 |  |  | 		permissions                      []ac.Permission | 
					
						
							|  |  |  | 		pluginAdminEnabled               bool | 
					
						
							|  |  |  | 		pluginAdminExternalManageEnabled bool | 
					
						
							| 
									
										
										
										
											2023-11-21 22:09:43 +08:00
										 |  |  | 		singleOrganization               bool | 
					
						
							| 
									
										
										
										
											2024-08-14 20:57:37 +08:00
										 |  |  | 		preInstalledPlugin               bool | 
					
						
							| 
									
										
										
										
											2022-09-09 15:44:50 +08:00
										 |  |  | 	} | 
					
						
							|  |  |  | 	tcs := []testCase{ | 
					
						
							| 
									
										
										
										
											2025-02-17 23:07:41 +08:00
										 |  |  | 		{expectedCode: http.StatusOK, permissionOrg: globalOrg, permissions: canInstall, pluginAdminEnabled: true, pluginAdminExternalManageEnabled: true}, | 
					
						
							| 
									
										
										
										
											2023-11-21 22:09:43 +08:00
										 |  |  | 		{expectedCode: http.StatusNotFound, permissionOrg: globalOrg, permissions: canInstall, pluginAdminEnabled: false, pluginAdminExternalManageEnabled: true}, | 
					
						
							|  |  |  | 		{expectedCode: http.StatusNotFound, permissionOrg: globalOrg, permissions: canInstall, pluginAdminEnabled: false, pluginAdminExternalManageEnabled: false}, | 
					
						
							|  |  |  | 		{expectedCode: http.StatusForbidden, permissionOrg: globalOrg, permissions: cannotInstall, pluginAdminEnabled: true, pluginAdminExternalManageEnabled: false}, | 
					
						
							|  |  |  | 		{expectedCode: http.StatusOK, permissionOrg: globalOrg, permissions: canInstall, pluginAdminEnabled: true, pluginAdminExternalManageEnabled: false}, | 
					
						
							|  |  |  | 		{expectedCode: http.StatusForbidden, permissionOrg: localOrg, permissions: canInstall, pluginAdminEnabled: true, pluginAdminExternalManageEnabled: false}, | 
					
						
							|  |  |  | 		{expectedCode: http.StatusForbidden, permissionOrg: localOrg, permissions: cannotInstall, pluginAdminEnabled: true, pluginAdminExternalManageEnabled: false, singleOrganization: true}, | 
					
						
							|  |  |  | 		{expectedCode: http.StatusOK, permissionOrg: localOrg, permissions: canInstall, pluginAdminEnabled: true, pluginAdminExternalManageEnabled: false, singleOrganization: true}, | 
					
						
							| 
									
										
										
										
											2024-08-14 20:57:37 +08:00
										 |  |  | 		{expectedCode: http.StatusConflict, permissionOrg: globalOrg, permissions: canInstall, pluginAdminEnabled: true, pluginAdminExternalManageEnabled: false, preInstalledPlugin: true}, | 
					
						
							| 
									
										
										
										
											2022-09-09 15:44:50 +08:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	testName := func(action string, tc testCase) string { | 
					
						
							| 
									
										
										
										
											2023-11-21 22:09:43 +08:00
										 |  |  | 		return fmt.Sprintf("%s request returns %d when adminEnabled: %t, externalEnabled: %t, permissions: %d: %s, single_org: %t", | 
					
						
							|  |  |  | 			action, tc.expectedCode, tc.pluginAdminEnabled, tc.pluginAdminExternalManageEnabled, tc.permissionOrg, tc.permissions[0].Action, tc.singleOrganization) | 
					
						
							| 
									
										
										
										
											2022-09-09 15:44:50 +08:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	for _, tc := range tcs { | 
					
						
							| 
									
										
										
										
											2024-08-14 20:57:37 +08:00
										 |  |  | 		pluginID = "grafana-test-datasource" | 
					
						
							|  |  |  | 		if tc.preInstalledPlugin { | 
					
						
							|  |  |  | 			pluginID = "grafana-preinstalled-datasource" | 
					
						
							|  |  |  | 		} | 
					
						
							| 
									
										
										
										
											2023-01-13 17:34:20 +08:00
										 |  |  | 		server := SetupAPITestServer(t, func(hs *HTTPServer) { | 
					
						
							| 
									
										
										
										
											2023-11-13 23:55:15 +08:00
										 |  |  | 			hs.Cfg = setting.NewCfg() | 
					
						
							|  |  |  | 			hs.Cfg.PluginAdminEnabled = tc.pluginAdminEnabled | 
					
						
							|  |  |  | 			hs.Cfg.PluginAdminExternalManageEnabled = tc.pluginAdminExternalManageEnabled | 
					
						
							| 
									
										
										
										
											2024-07-25 00:31:26 +08:00
										 |  |  | 			hs.Cfg.RBAC.SingleOrganization = tc.singleOrganization | 
					
						
							| 
									
										
										
										
											2024-08-21 22:11:55 +08:00
										 |  |  | 			hs.Cfg.PreinstallPlugins = []setting.InstallPlugin{{ID: "grafana-preinstalled-datasource", Version: "1.0.0"}} | 
					
						
							| 
									
										
										
										
											2023-11-10 19:28:36 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-01-13 17:34:20 +08:00
										 |  |  | 			hs.orgService = &orgtest.FakeOrgService{ExpectedOrg: &org.Org{}} | 
					
						
							| 
									
										
										
										
											2023-11-21 22:09:43 +08:00
										 |  |  | 			hs.accesscontrolService = &actest.FakeService{} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-01-13 17:34:20 +08:00
										 |  |  | 			hs.pluginInstaller = NewFakePluginInstaller() | 
					
						
							| 
									
										
										
										
											2023-03-29 18:55:55 +08:00
										 |  |  | 			hs.pluginFileStore = &fakes.FakePluginFileStore{} | 
					
						
							| 
									
										
										
										
											2024-02-12 19:47:49 +08:00
										 |  |  | 			hs.pluginStore = pluginstore.NewFakePluginStore(pluginstore.Plugin{ | 
					
						
							|  |  |  | 				JSONData: plugins.JSONData{ | 
					
						
							|  |  |  | 					ID: pluginID, | 
					
						
							|  |  |  | 				}, | 
					
						
							|  |  |  | 			}) | 
					
						
							| 
									
										
										
										
											2024-07-29 18:18:43 +08:00
										 |  |  | 			hs.managedPluginsService = managedplugins.NewNoop() | 
					
						
							| 
									
										
										
										
											2025-01-27 23:39:46 +08:00
										 |  |  | 			hs.pluginPreinstall = plugininstaller.ProvidePreinstall(hs.Cfg) | 
					
						
							| 
									
										
										
										
											2024-04-10 18:42:13 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | 			expectedIdentity := &authn.Identity{ | 
					
						
							|  |  |  | 				OrgID:       tc.permissionOrg, | 
					
						
							|  |  |  | 				Permissions: map[int64]map[string][]string{}, | 
					
						
							|  |  |  | 				OrgRoles:    map[int64]org.RoleType{}, | 
					
						
							|  |  |  | 			} | 
					
						
							| 
									
										
										
										
											2024-07-03 14:08:57 +08:00
										 |  |  | 			expectedIdentity.Permissions[tc.permissionOrg] = ac.GroupScopesByActionContext(context.Background(), tc.permissions) | 
					
						
							| 
									
										
										
										
											2024-04-10 18:42:13 +08:00
										 |  |  | 			hs.authnService = &authntest.FakeService{ | 
					
						
							|  |  |  | 				ExpectedIdentity: expectedIdentity, | 
					
						
							|  |  |  | 			} | 
					
						
							| 
									
										
										
										
											2024-07-18 23:19:36 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | 			hs.log = log.NewNopLogger() | 
					
						
							| 
									
										
										
										
											2023-01-13 17:34:20 +08:00
										 |  |  | 		}) | 
					
						
							| 
									
										
										
										
											2022-09-09 15:44:50 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | 		t.Run(testName("Install", tc), func(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2023-01-13 17:34:20 +08:00
										 |  |  | 			input := strings.NewReader(`{"version": "1.0.2"}`) | 
					
						
							| 
									
										
										
										
											2024-02-12 19:47:49 +08:00
										 |  |  | 			endpoint := fmt.Sprintf("/api/plugins/%s/install", pluginID) | 
					
						
							|  |  |  | 			req := webtest.RequestWithSignedInUser(server.NewPostRequest(endpoint, input), userWithPermissions(tc.permissionOrg, tc.permissions)) | 
					
						
							| 
									
										
										
										
											2023-01-13 17:34:20 +08:00
										 |  |  | 			res, err := server.SendJSON(req) | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							| 
									
										
										
										
											2023-01-27 22:08:17 +08:00
										 |  |  | 			require.Equal(t, tc.expectedCode, res.StatusCode) | 
					
						
							| 
									
										
										
										
											2023-01-13 17:34:20 +08:00
										 |  |  | 			require.NoError(t, res.Body.Close()) | 
					
						
							| 
									
										
										
										
											2022-09-09 15:44:50 +08:00
										 |  |  | 		}) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		t.Run(testName("Uninstall", tc), func(t *testing.T) { | 
					
						
							|  |  |  | 			input := strings.NewReader("{ }") | 
					
						
							| 
									
										
										
										
											2024-02-12 19:47:49 +08:00
										 |  |  | 			endpoint := fmt.Sprintf("/api/plugins/%s/uninstall", pluginID) | 
					
						
							|  |  |  | 			req := webtest.RequestWithSignedInUser(server.NewPostRequest(endpoint, input), userWithPermissions(tc.permissionOrg, tc.permissions)) | 
					
						
							| 
									
										
										
										
											2023-01-13 17:34:20 +08:00
										 |  |  | 			res, err := server.SendJSON(req) | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							| 
									
										
										
										
											2023-01-27 22:08:17 +08:00
										 |  |  | 			require.Equal(t, tc.expectedCode, res.StatusCode) | 
					
						
							| 
									
										
										
										
											2023-01-13 17:34:20 +08:00
										 |  |  | 			require.NoError(t, res.Body.Close()) | 
					
						
							| 
									
										
										
										
											2022-09-09 15:44:50 +08:00
										 |  |  | 		}) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-01-27 22:08:17 +08:00
										 |  |  | func Test_GetPluginAssetCDNRedirect(t *testing.T) { | 
					
						
							|  |  |  | 	const cdnPluginID = "cdn-plugin" | 
					
						
							|  |  |  | 	const nonCDNPluginID = "non-cdn-plugin" | 
					
						
							|  |  |  | 	t.Run("Plugin CDN asset redirect", func(t *testing.T) { | 
					
						
							|  |  |  | 		cdnPlugin := &plugins.Plugin{ | 
					
						
							|  |  |  | 			JSONData: plugins.JSONData{ID: cdnPluginID, Info: plugins.Info{Version: "1.0.0"}}, | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 		nonCdnPlugin := &plugins.Plugin{ | 
					
						
							|  |  |  | 			JSONData: plugins.JSONData{ID: nonCDNPluginID, Info: plugins.Info{Version: "2.0.0"}}, | 
					
						
							|  |  |  | 		} | 
					
						
							| 
									
										
										
										
											2023-03-29 18:55:55 +08:00
										 |  |  | 		registry := &fakes.FakePluginRegistry{ | 
					
						
							|  |  |  | 			Store: map[string]*plugins.Plugin{ | 
					
						
							|  |  |  | 				cdnPluginID:    cdnPlugin, | 
					
						
							|  |  |  | 				nonCDNPluginID: nonCdnPlugin, | 
					
						
							| 
									
										
										
										
											2023-01-27 22:08:17 +08:00
										 |  |  | 			}, | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 		cfg := setting.NewCfg() | 
					
						
							| 
									
										
										
										
											2023-02-24 21:28:13 +08:00
										 |  |  | 		cfg.PluginsCDNURLTemplate = "https://cdn.example.com" | 
					
						
							| 
									
										
										
										
											2023-01-27 22:08:17 +08:00
										 |  |  | 		cfg.PluginSettings = map[string]map[string]string{ | 
					
						
							|  |  |  | 			cdnPluginID: {"cdn": "true"}, | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		const cdnFolderBaseURL = "https://cdn.example.com/cdn-plugin/1.0.0/public/plugins/cdn-plugin" | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		type tc struct { | 
					
						
							|  |  |  | 			assetURL       string | 
					
						
							|  |  |  | 			expRelativeURL string | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 		for _, cas := range []tc{ | 
					
						
							|  |  |  | 			{"module.js", "module.js"}, | 
					
						
							|  |  |  | 			{"other/folder/file.js", "other/folder/file.js"}, | 
					
						
							|  |  |  | 			{"double////slashes/file.js", "double/slashes/file.js"}, | 
					
						
							|  |  |  | 		} { | 
					
						
							|  |  |  | 			pluginAssetScenario( | 
					
						
							|  |  |  | 				t, | 
					
						
							|  |  |  | 				"When calling GET for a CDN plugin on", | 
					
						
							|  |  |  | 				fmt.Sprintf("/public/plugins/%s/%s", cdnPluginID, cas.assetURL), | 
					
						
							|  |  |  | 				"/public/plugins/:pluginId/*", | 
					
						
							| 
									
										
										
										
											2023-03-29 18:55:55 +08:00
										 |  |  | 				cfg, registry, func(sc *scenarioContext) { | 
					
						
							| 
									
										
										
										
											2023-01-27 22:08:17 +08:00
										 |  |  | 					// Get the prometheus metric (to test that the handler is instrumented correctly)
 | 
					
						
							|  |  |  | 					counter := pluginsCDNFallbackRedirectRequests.With(prometheus.Labels{ | 
					
						
							|  |  |  | 						"plugin_id":      cdnPluginID, | 
					
						
							|  |  |  | 						"plugin_version": "1.0.0", | 
					
						
							|  |  |  | 					}) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 					// Encode the prometheus metric and get its value
 | 
					
						
							|  |  |  | 					var m dto.Metric | 
					
						
							|  |  |  | 					require.NoError(t, counter.Write(&m)) | 
					
						
							|  |  |  | 					before := m.Counter.GetValue() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 					// Call handler
 | 
					
						
							|  |  |  | 					callGetPluginAsset(sc) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 					// Check redirect code + location
 | 
					
						
							|  |  |  | 					require.Equal(t, http.StatusTemporaryRedirect, sc.resp.Code, "wrong status code") | 
					
						
							|  |  |  | 					require.Equal(t, cdnFolderBaseURL+"/"+cas.expRelativeURL, sc.resp.Header().Get("Location"), "wrong location header") | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 					// Check metric
 | 
					
						
							|  |  |  | 					require.NoError(t, counter.Write(&m)) | 
					
						
							|  |  |  | 					require.Equal(t, before+1, m.Counter.GetValue(), "prometheus metric not incremented") | 
					
						
							|  |  |  | 				}, | 
					
						
							|  |  |  | 			) | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 		pluginAssetScenario( | 
					
						
							|  |  |  | 			t, | 
					
						
							|  |  |  | 			"When calling GET for a non-CDN plugin on", | 
					
						
							|  |  |  | 			fmt.Sprintf("/public/plugins/%s/%s", nonCDNPluginID, "module.js"), | 
					
						
							|  |  |  | 			"/public/plugins/:pluginId/*", | 
					
						
							| 
									
										
										
										
											2023-03-29 18:55:55 +08:00
										 |  |  | 			cfg, registry, func(sc *scenarioContext) { | 
					
						
							| 
									
										
										
										
											2023-01-27 22:08:17 +08:00
										 |  |  | 				// Here the metric should not increment
 | 
					
						
							|  |  |  | 				var m dto.Metric | 
					
						
							|  |  |  | 				counter := pluginsCDNFallbackRedirectRequests.With(prometheus.Labels{ | 
					
						
							|  |  |  | 					"plugin_id":      nonCDNPluginID, | 
					
						
							|  |  |  | 					"plugin_version": "2.0.0", | 
					
						
							|  |  |  | 				}) | 
					
						
							|  |  |  | 				require.NoError(t, counter.Write(&m)) | 
					
						
							|  |  |  | 				require.Zero(t, m.Counter.GetValue()) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 				// Call handler
 | 
					
						
							|  |  |  | 				callGetPluginAsset(sc) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 				// 404 implies access to fs
 | 
					
						
							|  |  |  | 				require.Equal(t, http.StatusNotFound, sc.resp.Code) | 
					
						
							|  |  |  | 				require.Empty(t, sc.resp.Header().Get("Location")) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 				// Ensure the metric did not change
 | 
					
						
							|  |  |  | 				require.NoError(t, counter.Write(&m)) | 
					
						
							|  |  |  | 				require.Zero(t, m.Counter.GetValue()) | 
					
						
							|  |  |  | 			}, | 
					
						
							|  |  |  | 		) | 
					
						
							|  |  |  | 	}) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-09-08 14:49:05 +08:00
										 |  |  | func Test_GetPluginAssets(t *testing.T) { | 
					
						
							|  |  |  | 	pluginID := "test-plugin" | 
					
						
							|  |  |  | 	pluginDir := "." | 
					
						
							| 
									
										
										
										
											2022-08-10 21:37:51 +08:00
										 |  |  | 	tmpFile, err := os.CreateTemp(pluginDir, "") | 
					
						
							| 
									
										
										
										
											2021-09-08 14:49:05 +08:00
										 |  |  | 	require.NoError(t, err) | 
					
						
							| 
									
										
										
										
											2022-08-10 21:37:51 +08:00
										 |  |  | 	tmpFileInParentDir, err := os.CreateTemp("..", "") | 
					
						
							| 
									
										
										
										
											2021-12-08 01:15:53 +08:00
										 |  |  | 	require.NoError(t, err) | 
					
						
							| 
									
										
										
										
											2021-09-08 14:49:05 +08:00
										 |  |  | 	t.Cleanup(func() { | 
					
						
							|  |  |  | 		err := os.RemoveAll(tmpFile.Name()) | 
					
						
							| 
									
										
										
										
											2022-12-02 20:46:55 +08:00
										 |  |  | 		require.NoError(t, err) | 
					
						
							| 
									
										
										
										
											2021-12-08 01:15:53 +08:00
										 |  |  | 		err = os.RemoveAll(tmpFileInParentDir.Name()) | 
					
						
							| 
									
										
										
										
											2022-12-02 20:46:55 +08:00
										 |  |  | 		require.NoError(t, err) | 
					
						
							| 
									
										
										
										
											2021-09-08 14:49:05 +08:00
										 |  |  | 	}) | 
					
						
							|  |  |  | 	expectedBody := "Plugin test" | 
					
						
							|  |  |  | 	_, err = tmpFile.WriteString(expectedBody) | 
					
						
							| 
									
										
										
										
											2022-12-02 20:46:55 +08:00
										 |  |  | 	require.NoError(t, err) | 
					
						
							| 
									
										
										
										
											2021-08-09 22:07:54 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-09-08 14:49:05 +08:00
										 |  |  | 	requestedFile := filepath.Clean(tmpFile.Name()) | 
					
						
							| 
									
										
										
										
											2021-08-09 22:07:54 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-12-02 20:46:55 +08:00
										 |  |  | 	t.Run("Given a request for an existing plugin file", func(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2023-06-08 18:21:19 +08:00
										 |  |  | 		p := createPlugin(plugins.JSONData{ID: pluginID}, plugins.ClassExternal, plugins.NewLocalFS(filepath.Dir(requestedFile))) | 
					
						
							| 
									
										
										
										
											2023-03-29 18:55:55 +08:00
										 |  |  | 		pluginRegistry := &fakes.FakePluginRegistry{ | 
					
						
							|  |  |  | 			Store: map[string]*plugins.Plugin{ | 
					
						
							|  |  |  | 				p.ID: p, | 
					
						
							|  |  |  | 			}, | 
					
						
							| 
									
										
										
										
											2021-09-08 14:49:05 +08:00
										 |  |  | 		} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		url := fmt.Sprintf("/public/plugins/%s/%s", pluginID, requestedFile) | 
					
						
							| 
									
										
										
										
											2023-01-27 22:08:17 +08:00
										 |  |  | 		pluginAssetScenario(t, "When calling GET on", url, "/public/plugins/:pluginId/*", | 
					
						
							| 
									
										
										
										
											2023-03-29 18:55:55 +08:00
										 |  |  | 			setting.NewCfg(), pluginRegistry, func(sc *scenarioContext) { | 
					
						
							| 
									
										
										
										
											2021-09-08 14:49:05 +08:00
										 |  |  | 				callGetPluginAsset(sc) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 				require.Equal(t, 200, sc.resp.Code) | 
					
						
							| 
									
										
										
										
											2022-12-02 20:46:55 +08:00
										 |  |  | 				require.Equal(t, expectedBody, sc.resp.Body.String()) | 
					
						
							| 
									
										
										
										
											2021-09-08 14:49:05 +08:00
										 |  |  | 			}) | 
					
						
							|  |  |  | 	}) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-12-08 01:15:53 +08:00
										 |  |  | 	t.Run("Given a request for a relative path", func(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2023-06-08 18:21:19 +08:00
										 |  |  | 		p := createPlugin(plugins.JSONData{ID: pluginID}, plugins.ClassExternal, plugins.NewFakeFS()) | 
					
						
							| 
									
										
										
										
											2023-03-29 18:55:55 +08:00
										 |  |  | 		pluginRegistry := &fakes.FakePluginRegistry{ | 
					
						
							|  |  |  | 			Store: map[string]*plugins.Plugin{ | 
					
						
							|  |  |  | 				p.ID: p, | 
					
						
							|  |  |  | 			}, | 
					
						
							| 
									
										
										
										
											2021-12-08 01:15:53 +08:00
										 |  |  | 		} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		url := fmt.Sprintf("/public/plugins/%s/%s", pluginID, tmpFileInParentDir.Name()) | 
					
						
							| 
									
										
										
										
											2023-01-27 22:08:17 +08:00
										 |  |  | 		pluginAssetScenario(t, "When calling GET on", url, "/public/plugins/:pluginId/*", | 
					
						
							| 
									
										
										
										
											2023-03-29 18:55:55 +08:00
										 |  |  | 			setting.NewCfg(), pluginRegistry, func(sc *scenarioContext) { | 
					
						
							| 
									
										
										
										
											2021-12-08 01:15:53 +08:00
										 |  |  | 				callGetPluginAsset(sc) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 				require.Equal(t, 404, sc.resp.Code) | 
					
						
							|  |  |  | 			}) | 
					
						
							|  |  |  | 	}) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-03-07 23:47:02 +08:00
										 |  |  | 	t.Run("Given a request for an existing plugin file that is not listed as a signature covered file", func(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2023-06-08 18:21:19 +08:00
										 |  |  | 		p := createPlugin(plugins.JSONData{ID: pluginID}, plugins.ClassCore, plugins.NewLocalFS(filepath.Dir(requestedFile))) | 
					
						
							| 
									
										
										
										
											2023-03-29 18:55:55 +08:00
										 |  |  | 		pluginRegistry := &fakes.FakePluginRegistry{ | 
					
						
							|  |  |  | 			Store: map[string]*plugins.Plugin{ | 
					
						
							|  |  |  | 				p.ID: p, | 
					
						
							|  |  |  | 			}, | 
					
						
							| 
									
										
										
										
											2021-09-08 14:49:05 +08:00
										 |  |  | 		} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		url := fmt.Sprintf("/public/plugins/%s/%s", pluginID, requestedFile) | 
					
						
							| 
									
										
										
										
											2023-01-27 22:08:17 +08:00
										 |  |  | 		pluginAssetScenario(t, "When calling GET on", url, "/public/plugins/:pluginId/*", | 
					
						
							| 
									
										
										
										
											2023-03-29 18:55:55 +08:00
										 |  |  | 			setting.NewCfg(), pluginRegistry, func(sc *scenarioContext) { | 
					
						
							| 
									
										
										
										
											2021-09-08 14:49:05 +08:00
										 |  |  | 				callGetPluginAsset(sc) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-03-07 23:47:02 +08:00
										 |  |  | 				require.Equal(t, 200, sc.resp.Code) | 
					
						
							|  |  |  | 				assert.Equal(t, expectedBody, sc.resp.Body.String()) | 
					
						
							| 
									
										
										
										
											2021-09-08 14:49:05 +08:00
										 |  |  | 			}) | 
					
						
							|  |  |  | 	}) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-03-07 23:47:02 +08:00
										 |  |  | 	t.Run("Given a request for an non-existing plugin file", func(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2023-06-08 18:21:19 +08:00
										 |  |  | 		p := createPlugin(plugins.JSONData{ID: pluginID}, plugins.ClassExternal, plugins.NewFakeFS()) | 
					
						
							| 
									
										
										
										
											2023-03-29 18:55:55 +08:00
										 |  |  | 		service := &fakes.FakePluginRegistry{ | 
					
						
							|  |  |  | 			Store: map[string]*plugins.Plugin{ | 
					
						
							|  |  |  | 				p.ID: p, | 
					
						
							|  |  |  | 			}, | 
					
						
							| 
									
										
										
										
											2021-09-08 14:49:05 +08:00
										 |  |  | 		} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		requestedFile := "nonExistent" | 
					
						
							|  |  |  | 		url := fmt.Sprintf("/public/plugins/%s/%s", pluginID, requestedFile) | 
					
						
							| 
									
										
										
										
											2023-01-27 22:08:17 +08:00
										 |  |  | 		pluginAssetScenario(t, "When calling GET on", url, "/public/plugins/:pluginId/*", | 
					
						
							|  |  |  | 			setting.NewCfg(), service, func(sc *scenarioContext) { | 
					
						
							| 
									
										
										
										
											2021-09-08 14:49:05 +08:00
										 |  |  | 				callGetPluginAsset(sc) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-08-30 23:46:47 +08:00
										 |  |  | 				var respJson map[string]any | 
					
						
							| 
									
										
										
										
											2021-09-08 14:49:05 +08:00
										 |  |  | 				err := json.NewDecoder(sc.resp.Body).Decode(&respJson) | 
					
						
							|  |  |  | 				require.NoError(t, err) | 
					
						
							| 
									
										
										
										
											2022-12-02 20:46:55 +08:00
										 |  |  | 				require.Equal(t, 404, sc.resp.Code) | 
					
						
							| 
									
										
										
										
											2023-03-07 23:47:02 +08:00
										 |  |  | 				require.Equal(t, "Plugin file not found", respJson["message"]) | 
					
						
							| 
									
										
										
										
											2021-09-08 14:49:05 +08:00
										 |  |  | 			}) | 
					
						
							|  |  |  | 	}) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-03-07 23:47:02 +08:00
										 |  |  | 	t.Run("Given a request for an non-existing plugin", func(t *testing.T) { | 
					
						
							|  |  |  | 		requestedFile := "nonExistent" | 
					
						
							| 
									
										
										
										
											2021-09-08 14:49:05 +08:00
										 |  |  | 		url := fmt.Sprintf("/public/plugins/%s/%s", pluginID, requestedFile) | 
					
						
							| 
									
										
										
										
											2023-01-27 22:08:17 +08:00
										 |  |  | 		pluginAssetScenario(t, "When calling GET on", url, "/public/plugins/:pluginId/*", | 
					
						
							| 
									
										
										
										
											2023-03-29 18:55:55 +08:00
										 |  |  | 			setting.NewCfg(), fakes.NewFakePluginRegistry(), func(sc *scenarioContext) { | 
					
						
							| 
									
										
										
										
											2021-09-08 14:49:05 +08:00
										 |  |  | 				callGetPluginAsset(sc) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-08-30 23:46:47 +08:00
										 |  |  | 				var respJson map[string]any | 
					
						
							| 
									
										
										
										
											2023-03-07 23:47:02 +08:00
										 |  |  | 				err := json.NewDecoder(sc.resp.Body).Decode(&respJson) | 
					
						
							|  |  |  | 				require.NoError(t, err) | 
					
						
							|  |  |  | 				require.Equal(t, 404, sc.resp.Code) | 
					
						
							|  |  |  | 				require.Equal(t, "Plugin not found", respJson["message"]) | 
					
						
							| 
									
										
										
										
											2021-09-08 14:49:05 +08:00
										 |  |  | 			}) | 
					
						
							|  |  |  | 	}) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-02-09 20:44:38 +08:00
										 |  |  | func TestMakePluginResourceRequest(t *testing.T) { | 
					
						
							|  |  |  | 	hs := HTTPServer{ | 
					
						
							| 
									
										
										
										
											2023-04-22 01:03:49 +08:00
										 |  |  | 		Cfg:          setting.NewCfg(), | 
					
						
							|  |  |  | 		log:          log.New(), | 
					
						
							|  |  |  | 		pluginClient: &fakePluginClient{}, | 
					
						
							| 
									
										
										
										
											2022-02-09 20:44:38 +08:00
										 |  |  | 	} | 
					
						
							|  |  |  | 	req := httptest.NewRequest(http.MethodGet, "/", nil) | 
					
						
							| 
									
										
										
										
											2022-10-21 19:54:55 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-02-09 20:44:38 +08:00
										 |  |  | 	resp := httptest.NewRecorder() | 
					
						
							|  |  |  | 	pCtx := backend.PluginContext{} | 
					
						
							|  |  |  | 	err := hs.makePluginResourceRequest(resp, req, pCtx) | 
					
						
							|  |  |  | 	require.NoError(t, err) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2025-04-10 20:42:23 +08:00
										 |  |  | 	require.True(t, resp.Flushed, "response should be flushed after request is processed") | 
					
						
							| 
									
										
										
										
											2022-02-09 20:44:38 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-04-26 01:44:32 +08:00
										 |  |  | 	res := resp.Result() | 
					
						
							|  |  |  | 	require.NoError(t, res.Body.Close()) | 
					
						
							|  |  |  | 	require.Equal(t, http.StatusOK, res.StatusCode) | 
					
						
							| 
									
										
										
										
											2022-11-09 22:47:32 +08:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func TestMakePluginResourceRequestContentTypeUnique(t *testing.T) { | 
					
						
							|  |  |  | 	// Ensures Content-Type is present only once, even if it's present with
 | 
					
						
							|  |  |  | 	// a non-canonical key in the plugin response.
 | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Test various upper/lower case combinations for content-type that may be returned by the plugin.
 | 
					
						
							|  |  |  | 	for _, ctHeader := range []string{"content-type", "Content-Type", "CoNtEnT-TyPe"} { | 
					
						
							|  |  |  | 		t.Run(ctHeader, func(t *testing.T) { | 
					
						
							|  |  |  | 			hs := HTTPServer{ | 
					
						
							|  |  |  | 				Cfg: setting.NewCfg(), | 
					
						
							|  |  |  | 				log: log.New(), | 
					
						
							|  |  |  | 				pluginClient: &fakePluginClient{ | 
					
						
							|  |  |  | 					headers: map[string][]string{ | 
					
						
							|  |  |  | 						// This should be "overwritten" by the HTTP server
 | 
					
						
							|  |  |  | 						ctHeader: {"application/json"}, | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 						// Another header that should still be present
 | 
					
						
							|  |  |  | 						"x-another": {"hello"}, | 
					
						
							|  |  |  | 					}, | 
					
						
							|  |  |  | 				}, | 
					
						
							|  |  |  | 			} | 
					
						
							|  |  |  | 			req := httptest.NewRequest(http.MethodGet, "/", nil) | 
					
						
							|  |  |  | 			resp := httptest.NewRecorder() | 
					
						
							|  |  |  | 			pCtx := backend.PluginContext{} | 
					
						
							|  |  |  | 			err := hs.makePluginResourceRequest(resp, req, pCtx) | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2025-04-10 20:42:23 +08:00
										 |  |  | 			require.True(t, resp.Flushed, "response should be flushed after request is processed") | 
					
						
							| 
									
										
										
										
											2022-12-02 20:46:55 +08:00
										 |  |  | 			require.Len(t, resp.Header().Values("Content-Type"), 1, "should have 1 Content-Type header") | 
					
						
							|  |  |  | 			require.Len(t, resp.Header().Values("x-another"), 1, "should have 1 X-Another header") | 
					
						
							| 
									
										
										
										
											2022-11-09 22:47:32 +08:00
										 |  |  | 		}) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-11-08 00:25:49 +08:00
										 |  |  | func TestMakePluginResourceRequestContentTypeEmpty(t *testing.T) { | 
					
						
							|  |  |  | 	pluginClient := &fakePluginClient{ | 
					
						
							|  |  |  | 		statusCode: http.StatusNoContent, | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	hs := HTTPServer{ | 
					
						
							| 
									
										
										
										
											2023-04-22 01:03:49 +08:00
										 |  |  | 		Cfg:          setting.NewCfg(), | 
					
						
							|  |  |  | 		log:          log.New(), | 
					
						
							|  |  |  | 		pluginClient: pluginClient, | 
					
						
							| 
									
										
										
										
											2022-11-08 00:25:49 +08:00
										 |  |  | 	} | 
					
						
							|  |  |  | 	req := httptest.NewRequest(http.MethodGet, "/", nil) | 
					
						
							|  |  |  | 	resp := httptest.NewRecorder() | 
					
						
							|  |  |  | 	pCtx := backend.PluginContext{} | 
					
						
							|  |  |  | 	err := hs.makePluginResourceRequest(resp, req, pCtx) | 
					
						
							|  |  |  | 	require.NoError(t, err) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2025-04-10 20:42:23 +08:00
										 |  |  | 	require.True(t, resp.Flushed, "response should be flushed after request is processed") | 
					
						
							| 
									
										
										
										
											2022-11-08 00:25:49 +08:00
										 |  |  | 	require.Zero(t, resp.Header().Get("Content-Type")) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-03-28 00:44:06 +08:00
										 |  |  | func TestPluginMarkdown(t *testing.T) { | 
					
						
							|  |  |  | 	t.Run("Plugin not installed returns error", func(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2023-03-29 18:55:55 +08:00
										 |  |  | 		pluginFileStore := &fakes.FakePluginFileStore{ | 
					
						
							| 
									
										
										
										
											2024-02-12 19:47:49 +08:00
										 |  |  | 			FileFunc: func(ctx context.Context, pluginID, pluginVersion, filename string) (*plugins.File, error) { | 
					
						
							| 
									
										
										
										
											2023-03-29 18:55:55 +08:00
										 |  |  | 				return nil, plugins.ErrPluginNotInstalled | 
					
						
							| 
									
										
										
										
											2023-03-28 00:44:06 +08:00
										 |  |  | 			}, | 
					
						
							|  |  |  | 		} | 
					
						
							| 
									
										
										
										
											2023-03-29 18:55:55 +08:00
										 |  |  | 		hs := HTTPServer{pluginFileStore: pluginFileStore} | 
					
						
							| 
									
										
										
										
											2023-03-28 00:44:06 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | 		pluginID := "test-datasource" | 
					
						
							| 
									
										
										
										
											2024-02-12 19:47:49 +08:00
										 |  |  | 		md, err := hs.pluginMarkdown(context.Background(), pluginID, "", "test") | 
					
						
							| 
									
										
										
										
											2023-03-28 00:44:06 +08:00
										 |  |  | 		require.ErrorAs(t, err, &plugins.NotFoundError{PluginID: pluginID}) | 
					
						
							|  |  |  | 		require.Equal(t, []byte{}, md) | 
					
						
							|  |  |  | 	}) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	t.Run("File fetch will be retried using different casing if error occurs", func(t *testing.T) { | 
					
						
							|  |  |  | 		var requestedFiles []string | 
					
						
							| 
									
										
										
										
											2023-03-29 18:55:55 +08:00
										 |  |  | 		pluginFileStore := &fakes.FakePluginFileStore{ | 
					
						
							| 
									
										
										
										
											2024-02-12 19:47:49 +08:00
										 |  |  | 			FileFunc: func(ctx context.Context, pluginID, pluginVersion, filename string) (*plugins.File, error) { | 
					
						
							| 
									
										
										
										
											2023-03-29 18:55:55 +08:00
										 |  |  | 				requestedFiles = append(requestedFiles, filename) | 
					
						
							| 
									
										
										
										
											2023-03-28 00:44:06 +08:00
										 |  |  | 				return nil, errors.New("some error") | 
					
						
							|  |  |  | 			}, | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-03-29 18:55:55 +08:00
										 |  |  | 		hs := HTTPServer{pluginFileStore: pluginFileStore} | 
					
						
							| 
									
										
										
										
											2023-03-28 00:44:06 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2024-02-12 19:47:49 +08:00
										 |  |  | 		md, err := hs.pluginMarkdown(context.Background(), "", "", "reAdMe") | 
					
						
							| 
									
										
										
										
											2023-03-28 00:44:06 +08:00
										 |  |  | 		require.NoError(t, err) | 
					
						
							|  |  |  | 		require.Equal(t, []byte{}, md) | 
					
						
							|  |  |  | 		require.Equal(t, []string{"README.md", "readme.md"}, requestedFiles) | 
					
						
							|  |  |  | 	}) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	t.Run("File fetch receive cleaned file paths", func(t *testing.T) { | 
					
						
							|  |  |  | 		tcs := []struct { | 
					
						
							|  |  |  | 			filePath string | 
					
						
							|  |  |  | 			expected []string | 
					
						
							|  |  |  | 		}{ | 
					
						
							|  |  |  | 			{ | 
					
						
							|  |  |  | 				filePath: "../../docs", | 
					
						
							|  |  |  | 				expected: []string{"DOCS.md"}, | 
					
						
							|  |  |  | 			}, | 
					
						
							|  |  |  | 			{ | 
					
						
							|  |  |  | 				filePath: "/../../docs/../docs", | 
					
						
							|  |  |  | 				expected: []string{"DOCS.md"}, | 
					
						
							|  |  |  | 			}, | 
					
						
							|  |  |  | 			{ | 
					
						
							|  |  |  | 				filePath: "readme.md/../../secrets", | 
					
						
							|  |  |  | 				expected: []string{"SECRETS.md"}, | 
					
						
							|  |  |  | 			}, | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		for _, tc := range tcs { | 
					
						
							| 
									
										
										
										
											2023-03-29 18:55:55 +08:00
										 |  |  | 			data := []byte{123} | 
					
						
							| 
									
										
										
										
											2023-03-28 00:44:06 +08:00
										 |  |  | 			var requestedFiles []string | 
					
						
							| 
									
										
										
										
											2023-03-29 18:55:55 +08:00
										 |  |  | 			pluginFileStore := &fakes.FakePluginFileStore{ | 
					
						
							| 
									
										
										
										
											2024-02-12 19:47:49 +08:00
										 |  |  | 				FileFunc: func(ctx context.Context, pluginID, pluginVersion, filename string) (*plugins.File, error) { | 
					
						
							| 
									
										
										
										
											2023-03-29 18:55:55 +08:00
										 |  |  | 					requestedFiles = append(requestedFiles, filename) | 
					
						
							|  |  |  | 					return &plugins.File{Content: data}, nil | 
					
						
							| 
									
										
										
										
											2023-03-28 00:44:06 +08:00
										 |  |  | 				}, | 
					
						
							|  |  |  | 			} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-03-29 18:55:55 +08:00
										 |  |  | 			hs := HTTPServer{pluginFileStore: pluginFileStore} | 
					
						
							| 
									
										
										
										
											2023-03-28 00:44:06 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2024-02-12 19:47:49 +08:00
										 |  |  | 			md, err := hs.pluginMarkdown(context.Background(), "test-datasource", "", tc.filePath) | 
					
						
							| 
									
										
										
										
											2023-03-28 00:44:06 +08:00
										 |  |  | 			require.NoError(t, err) | 
					
						
							| 
									
										
										
										
											2023-03-29 18:55:55 +08:00
										 |  |  | 			require.Equal(t, data, md) | 
					
						
							| 
									
										
										
										
											2023-03-28 00:44:06 +08:00
										 |  |  | 			require.Equal(t, tc.expected, requestedFiles) | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 	}) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	t.Run("Non markdown file request returns an error", func(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2023-03-29 18:55:55 +08:00
										 |  |  | 		hs := HTTPServer{pluginFileStore: &fakes.FakePluginFileStore{}} | 
					
						
							| 
									
										
										
										
											2023-03-28 00:44:06 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2024-02-12 19:47:49 +08:00
										 |  |  | 		md, err := hs.pluginMarkdown(context.Background(), "", "", "test.json") | 
					
						
							| 
									
										
										
										
											2023-03-28 00:44:06 +08:00
										 |  |  | 		require.ErrorIs(t, err, ErrUnexpectedFileExtension) | 
					
						
							|  |  |  | 		require.Equal(t, []byte{}, md) | 
					
						
							|  |  |  | 	}) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	t.Run("Happy path", func(t *testing.T) { | 
					
						
							|  |  |  | 		data := []byte{1, 2, 3} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-03-29 18:55:55 +08:00
										 |  |  | 		pluginFileStore := &fakes.FakePluginFileStore{ | 
					
						
							| 
									
										
										
										
											2024-02-12 19:47:49 +08:00
										 |  |  | 			FileFunc: func(ctx context.Context, pluginID, pluginVersion, filename string) (*plugins.File, error) { | 
					
						
							| 
									
										
										
										
											2023-03-29 18:55:55 +08:00
										 |  |  | 				return &plugins.File{Content: data}, nil | 
					
						
							| 
									
										
										
										
											2023-03-28 00:44:06 +08:00
										 |  |  | 			}, | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-03-29 18:55:55 +08:00
										 |  |  | 		hs := HTTPServer{pluginFileStore: pluginFileStore} | 
					
						
							| 
									
										
										
										
											2023-03-28 00:44:06 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2024-02-12 19:47:49 +08:00
										 |  |  | 		md, err := hs.pluginMarkdown(context.Background(), "", "", "someFile") | 
					
						
							| 
									
										
										
										
											2023-03-28 00:44:06 +08:00
										 |  |  | 		require.NoError(t, err) | 
					
						
							|  |  |  | 		require.Equal(t, data, md) | 
					
						
							|  |  |  | 	}) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-09-08 14:49:05 +08:00
										 |  |  | func callGetPluginAsset(sc *scenarioContext) { | 
					
						
							|  |  |  | 	sc.fakeReqWithParams("GET", sc.url, map[string]string{}).exec() | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-01-27 22:08:17 +08:00
										 |  |  | func pluginAssetScenario(t *testing.T, desc string, url string, urlPattern string, | 
					
						
							| 
									
										
										
										
											2023-03-29 18:55:55 +08:00
										 |  |  | 	cfg *setting.Cfg, pluginRegistry registry.Service, fn scenarioFunc) { | 
					
						
							| 
									
										
										
										
											2021-09-08 14:49:05 +08:00
										 |  |  | 	t.Run(fmt.Sprintf("%s %s", desc, url), func(t *testing.T) { | 
					
						
							|  |  |  | 		hs := HTTPServer{ | 
					
						
							| 
									
										
										
										
											2023-03-29 18:55:55 +08:00
										 |  |  | 			Cfg:             cfg, | 
					
						
							| 
									
										
										
										
											2023-09-11 19:59:24 +08:00
										 |  |  | 			pluginStore:     pluginstore.New(pluginRegistry, &fakes.FakeLoader{}), | 
					
						
							| 
									
										
										
										
											2023-03-29 18:55:55 +08:00
										 |  |  | 			pluginFileStore: filestore.ProvideService(pluginRegistry), | 
					
						
							|  |  |  | 			log:             log.NewNopLogger(), | 
					
						
							| 
									
										
										
										
											2024-02-27 19:38:02 +08:00
										 |  |  | 			pluginsCDNService: pluginscdn.ProvideService(&config.PluginManagementCfg{ | 
					
						
							| 
									
										
										
										
											2023-01-27 22:08:17 +08:00
										 |  |  | 				PluginsCDNURLTemplate: cfg.PluginsCDNURLTemplate, | 
					
						
							|  |  |  | 				PluginSettings:        cfg.PluginSettings, | 
					
						
							|  |  |  | 			}), | 
					
						
							| 
									
										
										
										
											2021-09-08 14:49:05 +08:00
										 |  |  | 		} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		sc := setupScenarioContext(t, url) | 
					
						
							| 
									
										
										
										
											2023-01-27 15:50:36 +08:00
										 |  |  | 		sc.defaultHandler = func(c *contextmodel.ReqContext) { | 
					
						
							| 
									
										
										
										
											2021-09-08 14:49:05 +08:00
										 |  |  | 			sc.context = c | 
					
						
							|  |  |  | 			hs.getPluginAssets(c) | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		sc.m.Get(urlPattern, sc.defaultHandler) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		fn(sc) | 
					
						
							|  |  |  | 	}) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-02-09 20:44:38 +08:00
										 |  |  | type fakePluginClient struct { | 
					
						
							|  |  |  | 	plugins.Client | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	req *backend.CallResourceRequest | 
					
						
							| 
									
										
										
										
											2022-05-04 00:02:20 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	backend.QueryDataHandlerFunc | 
					
						
							| 
									
										
										
										
											2022-11-08 00:25:49 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	statusCode int | 
					
						
							| 
									
										
										
										
											2022-11-09 22:47:32 +08:00
										 |  |  | 	headers    map[string][]string | 
					
						
							| 
									
										
										
										
											2022-02-09 20:44:38 +08:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-05-04 00:02:20 +08:00
										 |  |  | func (c *fakePluginClient) CallResource(_ context.Context, req *backend.CallResourceRequest, sender backend.CallResourceResponseSender) error { | 
					
						
							| 
									
										
										
										
											2022-02-09 20:44:38 +08:00
										 |  |  | 	c.req = req | 
					
						
							| 
									
										
										
										
											2023-08-30 23:46:47 +08:00
										 |  |  | 	bytes, err := json.Marshal(map[string]any{ | 
					
						
							| 
									
										
										
										
											2022-02-09 20:44:38 +08:00
										 |  |  | 		"message": "hello", | 
					
						
							|  |  |  | 	}) | 
					
						
							|  |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-11-08 00:25:49 +08:00
										 |  |  | 	statusCode := http.StatusOK | 
					
						
							|  |  |  | 	if c.statusCode != 0 { | 
					
						
							|  |  |  | 		statusCode = c.statusCode | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-02-09 20:44:38 +08:00
										 |  |  | 	return sender.Send(&backend.CallResourceResponse{ | 
					
						
							| 
									
										
										
										
											2022-11-08 00:25:49 +08:00
										 |  |  | 		Status:  statusCode, | 
					
						
							| 
									
										
										
										
											2022-11-09 22:47:32 +08:00
										 |  |  | 		Headers: c.headers, | 
					
						
							| 
									
										
										
										
											2022-02-09 20:44:38 +08:00
										 |  |  | 		Body:    bytes, | 
					
						
							|  |  |  | 	}) | 
					
						
							|  |  |  | } | 
					
						
							| 
									
										
										
										
											2022-05-04 00:02:20 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | func (c *fakePluginClient) QueryData(ctx context.Context, req *backend.QueryDataRequest) (*backend.QueryDataResponse, error) { | 
					
						
							|  |  |  | 	if c.QueryDataHandlerFunc != nil { | 
					
						
							|  |  |  | 		return c.QueryDataHandlerFunc.QueryData(ctx, req) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	return backend.NewQueryDataResponse(), nil | 
					
						
							|  |  |  | } | 
					
						
							| 
									
										
										
										
											2022-09-09 15:44:50 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | func Test_PluginsList_AccessControl(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2023-03-29 18:55:55 +08:00
										 |  |  | 	p1 := createPlugin(plugins.JSONData{ | 
					
						
							| 
									
										
										
										
											2023-03-07 23:47:02 +08:00
										 |  |  | 		ID: "test-app", Type: "app", Name: "test-app", | 
					
						
							|  |  |  | 		Info: plugins.Info{ | 
					
						
							|  |  |  | 			Version: "1.0.0", | 
					
						
							| 
									
										
										
										
											2023-06-08 18:21:19 +08:00
										 |  |  | 		}}, plugins.ClassExternal, plugins.NewFakeFS()) | 
					
						
							| 
									
										
										
										
											2023-03-29 18:55:55 +08:00
										 |  |  | 	p2 := createPlugin( | 
					
						
							| 
									
										
										
										
											2023-03-07 23:47:02 +08:00
										 |  |  | 		plugins.JSONData{ID: "mysql", Type: "datasource", Name: "MySQL", | 
					
						
							| 
									
										
										
										
											2022-12-02 20:46:55 +08:00
										 |  |  | 			Info: plugins.Info{ | 
					
						
							|  |  |  | 				Author:      plugins.InfoLink{Name: "Grafana Labs", URL: "https://grafana.com"}, | 
					
						
							|  |  |  | 				Description: "Data source for MySQL databases", | 
					
						
							| 
									
										
										
										
											2023-06-08 18:21:19 +08:00
										 |  |  | 			}}, plugins.ClassCore, plugins.NewFakeFS()) | 
					
						
							| 
									
										
										
										
											2023-03-07 23:47:02 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-03-29 18:55:55 +08:00
										 |  |  | 	pluginRegistry := &fakes.FakePluginRegistry{ | 
					
						
							|  |  |  | 		Store: map[string]*plugins.Plugin{ | 
					
						
							|  |  |  | 			p1.ID: p1, | 
					
						
							|  |  |  | 			p2.ID: p2, | 
					
						
							|  |  |  | 		}, | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2022-09-28 14:29:35 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	pluginSettings := pluginsettings.FakePluginSettings{Plugins: map[string]*pluginsettings.DTO{ | 
					
						
							| 
									
										
										
										
											2022-09-09 15:44:50 +08:00
										 |  |  | 		"test-app": {ID: 0, OrgID: 1, PluginID: "test-app", PluginVersion: "1.0.0", Enabled: true}, | 
					
						
							|  |  |  | 		"mysql":    {ID: 0, OrgID: 1, PluginID: "mysql", PluginVersion: "", Enabled: true}}, | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	type testCase struct { | 
					
						
							| 
									
										
										
										
											2023-02-21 18:13:35 +08:00
										 |  |  | 		desc            string | 
					
						
							|  |  |  | 		permissions     []ac.Permission | 
					
						
							| 
									
										
										
										
											2022-09-09 15:44:50 +08:00
										 |  |  | 		expectedCode    int | 
					
						
							|  |  |  | 		expectedPlugins []string | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	tcs := []testCase{ | 
					
						
							| 
									
										
										
										
											2023-02-21 18:13:35 +08:00
										 |  |  | 		{ | 
					
						
							|  |  |  | 			desc:            "should only be able to list core plugins", | 
					
						
							|  |  |  | 			permissions:     []ac.Permission{}, | 
					
						
							|  |  |  | 			expectedCode:    http.StatusOK, | 
					
						
							|  |  |  | 			expectedPlugins: []string{"mysql"}, | 
					
						
							|  |  |  | 		}, | 
					
						
							|  |  |  | 		{ | 
					
						
							|  |  |  | 			desc:            "should be able to list core plugins and plugins user has permission to", | 
					
						
							| 
									
										
										
										
											2023-03-27 17:15:37 +08:00
										 |  |  | 			permissions:     []ac.Permission{{Action: pluginaccesscontrol.ActionWrite, Scope: "plugins:id:test-app"}}, | 
					
						
							| 
									
										
										
										
											2023-02-21 18:13:35 +08:00
										 |  |  | 			expectedCode:    http.StatusOK, | 
					
						
							|  |  |  | 			expectedPlugins: []string{"mysql", "test-app"}, | 
					
						
							|  |  |  | 		}, | 
					
						
							| 
									
										
										
										
											2022-09-09 15:44:50 +08:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	for _, tc := range tcs { | 
					
						
							| 
									
										
										
										
											2023-02-21 18:13:35 +08:00
										 |  |  | 		t.Run(tc.desc, func(t *testing.T) { | 
					
						
							|  |  |  | 			server := SetupAPITestServer(t, func(hs *HTTPServer) { | 
					
						
							|  |  |  | 				hs.Cfg = setting.NewCfg() | 
					
						
							|  |  |  | 				hs.PluginSettings = &pluginSettings | 
					
						
							| 
									
										
										
										
											2023-09-11 19:59:24 +08:00
										 |  |  | 				hs.pluginStore = pluginstore.New(pluginRegistry, &fakes.FakeLoader{}) | 
					
						
							| 
									
										
										
										
											2023-03-29 18:55:55 +08:00
										 |  |  | 				hs.pluginFileStore = filestore.ProvideService(pluginRegistry) | 
					
						
							| 
									
										
										
										
											2024-07-29 18:18:43 +08:00
										 |  |  | 				hs.managedPluginsService = managedplugins.NewNoop() | 
					
						
							| 
									
										
										
										
											2023-03-28 17:01:06 +08:00
										 |  |  | 				var err error | 
					
						
							| 
									
										
										
										
											2023-03-29 18:55:55 +08:00
										 |  |  | 				hs.pluginsUpdateChecker, err = updatechecker.ProvidePluginsService(hs.Cfg, nil, tracing.InitializeTracerForTest()) | 
					
						
							| 
									
										
										
										
											2023-03-28 17:01:06 +08:00
										 |  |  | 				require.NoError(t, err) | 
					
						
							| 
									
										
										
										
											2023-02-21 18:13:35 +08:00
										 |  |  | 			}) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			res, err := server.Send(webtest.RequestWithSignedInUser(server.NewGetRequest("/api/plugins"), userWithPermissions(1, tc.permissions))) | 
					
						
							| 
									
										
										
										
											2022-09-09 15:44:50 +08:00
										 |  |  | 			require.NoError(t, err) | 
					
						
							| 
									
										
										
										
											2023-02-21 18:13:35 +08:00
										 |  |  | 			var result dtos.PluginList | 
					
						
							|  |  |  | 			require.NoError(t, json.NewDecoder(res.Body).Decode(&result)) | 
					
						
							|  |  |  | 			require.Len(t, result, len(tc.expectedPlugins)) | 
					
						
							|  |  |  | 			for _, plugin := range result { | 
					
						
							| 
									
										
										
										
											2022-09-09 15:44:50 +08:00
										 |  |  | 				require.Contains(t, tc.expectedPlugins, plugin.Id) | 
					
						
							|  |  |  | 			} | 
					
						
							| 
									
										
										
										
											2023-02-21 18:13:35 +08:00
										 |  |  | 			assert.Equal(t, tc.expectedCode, res.StatusCode) | 
					
						
							|  |  |  | 			require.NoError(t, res.Body.Close()) | 
					
						
							| 
									
										
										
										
											2022-09-09 15:44:50 +08:00
										 |  |  | 		}) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | } | 
					
						
							| 
									
										
										
										
											2022-12-02 20:46:55 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-03-29 18:55:55 +08:00
										 |  |  | func createPlugin(jd plugins.JSONData, class plugins.Class, files plugins.FS) *plugins.Plugin { | 
					
						
							|  |  |  | 	return &plugins.Plugin{ | 
					
						
							| 
									
										
										
										
											2023-03-07 23:47:02 +08:00
										 |  |  | 		JSONData: jd, | 
					
						
							|  |  |  | 		Class:    class, | 
					
						
							|  |  |  | 		FS:       files, | 
					
						
							| 
									
										
										
										
											2022-12-02 20:46:55 +08:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2023-03-28 00:44:06 +08:00
										 |  |  | } | 
					
						
							| 
									
										
										
										
											2023-11-24 23:02:44 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | func TestHTTPServer_hasPluginRequestedPermissions(t *testing.T) { | 
					
						
							|  |  |  | 	pluginReg := pluginstore.Plugin{ | 
					
						
							|  |  |  | 		JSONData: plugins.JSONData{ | 
					
						
							|  |  |  | 			ID: "grafana-test-app", | 
					
						
							| 
									
										
										
										
											2025-01-11 04:43:40 +08:00
										 |  |  | 			IAM: &auth.IAM{ | 
					
						
							|  |  |  | 				Permissions: []auth.Permission{{Action: ac.ActionUsersRead, Scope: ac.ScopeUsersAll}, {Action: ac.ActionUsersCreate}}, | 
					
						
							| 
									
										
										
										
											2023-11-24 23:02:44 +08:00
										 |  |  | 			}, | 
					
						
							|  |  |  | 		}, | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	tests := []struct { | 
					
						
							|  |  |  | 		name        string | 
					
						
							|  |  |  | 		plugin      pluginstore.Plugin | 
					
						
							|  |  |  | 		orgID       int64 | 
					
						
							|  |  |  | 		singleOrg   bool | 
					
						
							|  |  |  | 		permissions map[int64]map[string][]string | 
					
						
							|  |  |  | 		warnCount   int | 
					
						
							|  |  |  | 	}{ | 
					
						
							|  |  |  | 		{ | 
					
						
							|  |  |  | 			name: "no warn if plugin has no registration", | 
					
						
							|  |  |  | 			plugin: pluginstore.Plugin{ | 
					
						
							|  |  |  | 				JSONData: plugins.JSONData{ | 
					
						
							|  |  |  | 					ID: "grafana-test-app", | 
					
						
							|  |  |  | 				}, | 
					
						
							|  |  |  | 			}, | 
					
						
							|  |  |  | 			warnCount: 0, | 
					
						
							|  |  |  | 		}, | 
					
						
							|  |  |  | 		{ | 
					
						
							|  |  |  | 			name:   "warn if user does not have plugin permissions globally", | 
					
						
							|  |  |  | 			plugin: pluginReg, | 
					
						
							|  |  |  | 			orgID:  1, | 
					
						
							|  |  |  | 			permissions: map[int64]map[string][]string{ | 
					
						
							|  |  |  | 				1: {ac.ActionUsersRead: {ac.ScopeUsersAll}, ac.ActionUsersCreate: {}}, | 
					
						
							|  |  |  | 			}, | 
					
						
							|  |  |  | 			warnCount: 1, | 
					
						
							|  |  |  | 		}, | 
					
						
							|  |  |  | 		{ | 
					
						
							|  |  |  | 			name:   "no warn if user has plugin permissions globally", | 
					
						
							|  |  |  | 			plugin: pluginReg, | 
					
						
							|  |  |  | 			orgID:  0, | 
					
						
							|  |  |  | 			permissions: map[int64]map[string][]string{ | 
					
						
							|  |  |  | 				0: {ac.ActionUsersRead: {ac.ScopeUsersAll}, ac.ActionUsersCreate: {}}, | 
					
						
							|  |  |  | 			}, | 
					
						
							|  |  |  | 			warnCount: 0, | 
					
						
							|  |  |  | 		}, | 
					
						
							|  |  |  | 		{ | 
					
						
							|  |  |  | 			name:      "no warn if user has plugin permissions in single organization", | 
					
						
							|  |  |  | 			plugin:    pluginReg, | 
					
						
							|  |  |  | 			singleOrg: true, | 
					
						
							|  |  |  | 			orgID:     1, | 
					
						
							|  |  |  | 			permissions: map[int64]map[string][]string{ | 
					
						
							|  |  |  | 				1: {ac.ActionUsersRead: {ac.ScopeUsersAll}, ac.ActionUsersCreate: {}}, | 
					
						
							|  |  |  | 			}, | 
					
						
							|  |  |  | 			warnCount: 0, | 
					
						
							|  |  |  | 		}, | 
					
						
							|  |  |  | 		{ | 
					
						
							|  |  |  | 			name:        "warn if user does not have all plugin permissions", | 
					
						
							|  |  |  | 			plugin:      pluginReg, | 
					
						
							|  |  |  | 			singleOrg:   true, | 
					
						
							|  |  |  | 			orgID:       1, | 
					
						
							|  |  |  | 			permissions: map[int64]map[string][]string{1: {ac.ActionUsersCreate: {}}}, | 
					
						
							|  |  |  | 			warnCount:   1, | 
					
						
							|  |  |  | 		}, | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	for _, tt := range tests { | 
					
						
							|  |  |  | 		t.Run(tt.name, func(t *testing.T) { | 
					
						
							|  |  |  | 			logger := &logtest.Fake{} | 
					
						
							|  |  |  | 			hs := &HTTPServer{} | 
					
						
							|  |  |  | 			httpReq, err := http.NewRequest(http.MethodGet, "", nil) | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			hs.Cfg = setting.NewCfg() | 
					
						
							| 
									
										
										
										
											2024-07-25 00:31:26 +08:00
										 |  |  | 			hs.Cfg.RBAC.SingleOrganization = tt.singleOrg | 
					
						
							| 
									
										
										
										
											2023-11-24 23:02:44 +08:00
										 |  |  | 			hs.pluginStore = &pluginstore.FakePluginStore{ | 
					
						
							|  |  |  | 				PluginList: []pluginstore.Plugin{tt.plugin}, | 
					
						
							|  |  |  | 			} | 
					
						
							|  |  |  | 			hs.log = logger | 
					
						
							|  |  |  | 			hs.accesscontrolService = actest.FakeService{} | 
					
						
							| 
									
										
										
										
											2025-01-14 17:26:15 +08:00
										 |  |  | 			hs.AccessControl = acimpl.ProvideAccessControl(featuremgmt.WithFeatures()) | 
					
						
							| 
									
										
										
										
											2023-11-24 23:02:44 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2024-04-10 18:42:13 +08:00
										 |  |  | 			expectedIdentity := &authn.Identity{ | 
					
						
							|  |  |  | 				OrgID:       tt.orgID, | 
					
						
							|  |  |  | 				Permissions: tt.permissions, | 
					
						
							|  |  |  | 			} | 
					
						
							|  |  |  | 			hs.authnService = &authntest.FakeService{ | 
					
						
							|  |  |  | 				ExpectedIdentity: expectedIdentity, | 
					
						
							|  |  |  | 			} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-11-24 23:02:44 +08:00
										 |  |  | 			c := &contextmodel.ReqContext{ | 
					
						
							|  |  |  | 				Context:      &web.Context{Req: httpReq}, | 
					
						
							|  |  |  | 				SignedInUser: &user.SignedInUser{OrgID: tt.orgID, Permissions: tt.permissions}, | 
					
						
							|  |  |  | 			} | 
					
						
							|  |  |  | 			hs.hasPluginRequestedPermissions(c, "grafana-test-app") | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			assert.Equal(t, tt.warnCount, logger.WarnLogs.Calls) | 
					
						
							|  |  |  | 		}) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | } | 
					
						
							| 
									
										
										
										
											2024-04-18 20:29:02 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | func Test_PluginsSettings(t *testing.T) { | 
					
						
							|  |  |  | 	pID := "test-datasource" | 
					
						
							|  |  |  | 	p1 := createPlugin(plugins.JSONData{ | 
					
						
							|  |  |  | 		ID: pID, Type: "datasource", Name: pID, | 
					
						
							|  |  |  | 		Info: plugins.Info{ | 
					
						
							|  |  |  | 			Version: "1.0.0", | 
					
						
							|  |  |  | 		}}, plugins.ClassExternal, plugins.NewFakeFS()) | 
					
						
							|  |  |  | 	pluginRegistry := &fakes.FakePluginRegistry{ | 
					
						
							|  |  |  | 		Store: map[string]*plugins.Plugin{ | 
					
						
							|  |  |  | 			p1.ID: p1, | 
					
						
							|  |  |  | 		}, | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	pluginSettings := pluginsettings.FakePluginSettings{Plugins: map[string]*pluginsettings.DTO{ | 
					
						
							|  |  |  | 		pID: {ID: 0, OrgID: 1, PluginID: pID, PluginVersion: "1.0.0"}, | 
					
						
							|  |  |  | 	}} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	type testCase struct { | 
					
						
							|  |  |  | 		desc             string | 
					
						
							|  |  |  | 		expectedCode     int | 
					
						
							|  |  |  | 		errCode          plugins.ErrorCode | 
					
						
							|  |  |  | 		expectedSettings dtos.PluginSetting | 
					
						
							|  |  |  | 		expectedError    string | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	tcs := []testCase{ | 
					
						
							|  |  |  | 		{ | 
					
						
							|  |  |  | 			desc:         "should only be able to get plugin settings", | 
					
						
							|  |  |  | 			expectedCode: http.StatusOK, | 
					
						
							|  |  |  | 			expectedSettings: dtos.PluginSetting{ | 
					
						
							|  |  |  | 				Id:   pID, | 
					
						
							|  |  |  | 				Name: pID, | 
					
						
							|  |  |  | 				Type: "datasource", | 
					
						
							|  |  |  | 				Info: plugins.Info{ | 
					
						
							|  |  |  | 					Version: "1.0.0", | 
					
						
							|  |  |  | 				}, | 
					
						
							|  |  |  | 				SecureJsonFields: map[string]bool{}, | 
					
						
							| 
									
										
										
										
											2024-09-09 17:38:35 +08:00
										 |  |  | 				LoadingStrategy:  plugins.LoadingStrategyScript, | 
					
						
							| 
									
										
										
										
											2024-04-18 20:29:02 +08:00
										 |  |  | 			}, | 
					
						
							|  |  |  | 		}, | 
					
						
							|  |  |  | 		{ | 
					
						
							|  |  |  | 			desc:          "should return a plugin error", | 
					
						
							|  |  |  | 			expectedCode:  http.StatusInternalServerError, | 
					
						
							|  |  |  | 			errCode:       plugins.ErrorCodeFailedBackendStart, | 
					
						
							|  |  |  | 			expectedError: "Plugin failed to start", | 
					
						
							|  |  |  | 		}, | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	for _, tc := range tcs { | 
					
						
							|  |  |  | 		t.Run(tc.desc, func(t *testing.T) { | 
					
						
							|  |  |  | 			server := SetupAPITestServer(t, func(hs *HTTPServer) { | 
					
						
							|  |  |  | 				hs.Cfg = setting.NewCfg() | 
					
						
							|  |  |  | 				hs.PluginSettings = &pluginSettings | 
					
						
							|  |  |  | 				hs.pluginStore = pluginstore.New(pluginRegistry, &fakes.FakeLoader{}) | 
					
						
							|  |  |  | 				hs.pluginFileStore = filestore.ProvideService(pluginRegistry) | 
					
						
							|  |  |  | 				errTracker := pluginerrs.ProvideErrorTracker() | 
					
						
							|  |  |  | 				if tc.errCode != "" { | 
					
						
							|  |  |  | 					errTracker.Record(context.Background(), &plugins.Error{ | 
					
						
							|  |  |  | 						PluginID:  pID, | 
					
						
							|  |  |  | 						ErrorCode: tc.errCode, | 
					
						
							|  |  |  | 					}) | 
					
						
							|  |  |  | 				} | 
					
						
							| 
									
										
										
										
											2024-10-04 20:55:09 +08:00
										 |  |  | 				pCfg := &config.PluginManagementCfg{} | 
					
						
							|  |  |  | 				pluginCDN := pluginscdn.ProvideService(pCfg) | 
					
						
							|  |  |  | 				sig := signature.ProvideService(pCfg, statickey.New()) | 
					
						
							|  |  |  | 				hs.pluginAssets = pluginassets.ProvideService(pCfg, pluginCDN, sig, hs.pluginStore) | 
					
						
							| 
									
										
										
										
											2024-04-18 20:29:02 +08:00
										 |  |  | 				hs.pluginErrorResolver = pluginerrs.ProvideStore(errTracker) | 
					
						
							|  |  |  | 				var err error | 
					
						
							|  |  |  | 				hs.pluginsUpdateChecker, err = updatechecker.ProvidePluginsService(hs.Cfg, nil, tracing.InitializeTracerForTest()) | 
					
						
							|  |  |  | 				require.NoError(t, err) | 
					
						
							|  |  |  | 			}) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			res, err := server.Send(webtest.RequestWithSignedInUser(server.NewGetRequest("/api/plugins/"+pID+"/settings"), userWithPermissions(1, []ac.Permission{}))) | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 			assert.Equal(t, tc.expectedCode, res.StatusCode) | 
					
						
							|  |  |  | 			if tc.expectedCode == http.StatusOK { | 
					
						
							|  |  |  | 				var result dtos.PluginSetting | 
					
						
							|  |  |  | 				require.NoError(t, json.NewDecoder(res.Body).Decode(&result)) | 
					
						
							|  |  |  | 				require.NoError(t, res.Body.Close()) | 
					
						
							|  |  |  | 				assert.Equal(t, tc.expectedSettings, result) | 
					
						
							|  |  |  | 			} else { | 
					
						
							|  |  |  | 				var respJson map[string]any | 
					
						
							|  |  |  | 				err := json.NewDecoder(res.Body).Decode(&respJson) | 
					
						
							|  |  |  | 				require.NoError(t, err) | 
					
						
							|  |  |  | 				require.Equal(t, tc.expectedError, respJson["message"]) | 
					
						
							|  |  |  | 			} | 
					
						
							|  |  |  | 		}) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | } | 
					
						
							| 
									
										
										
										
											2024-12-16 21:51:04 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | func Test_UpdatePluginSetting(t *testing.T) { | 
					
						
							|  |  |  | 	pID := "test-app" | 
					
						
							|  |  |  | 	p1 := createPlugin(plugins.JSONData{ | 
					
						
							|  |  |  | 		ID: pID, Type: "app", Name: pID, | 
					
						
							|  |  |  | 		Info: plugins.Info{ | 
					
						
							|  |  |  | 			Version: "1.0.0", | 
					
						
							|  |  |  | 		}, | 
					
						
							|  |  |  | 		AutoEnabled: true, | 
					
						
							|  |  |  | 	}, plugins.ClassExternal, plugins.NewFakeFS(), | 
					
						
							|  |  |  | 	) | 
					
						
							|  |  |  | 	pluginRegistry := &fakes.FakePluginRegistry{ | 
					
						
							|  |  |  | 		Store: map[string]*plugins.Plugin{ | 
					
						
							|  |  |  | 			p1.ID: p1, | 
					
						
							|  |  |  | 		}, | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	pluginSettings := pluginsettings.FakePluginSettings{Plugins: map[string]*pluginsettings.DTO{ | 
					
						
							|  |  |  | 		pID: {ID: 0, OrgID: 1, PluginID: pID, PluginVersion: "1.0.0", Enabled: true}, | 
					
						
							|  |  |  | 	}} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	t.Run("should return an error when trying to disable an auto-enabled plugin", func(t *testing.T) { | 
					
						
							|  |  |  | 		server := SetupAPITestServer(t, func(hs *HTTPServer) { | 
					
						
							|  |  |  | 			hs.Cfg = setting.NewCfg() | 
					
						
							|  |  |  | 			hs.PluginSettings = &pluginSettings | 
					
						
							|  |  |  | 			hs.pluginStore = pluginstore.New(pluginRegistry, &fakes.FakeLoader{}) | 
					
						
							|  |  |  | 			hs.pluginFileStore = filestore.ProvideService(pluginRegistry) | 
					
						
							|  |  |  | 			hs.managedPluginsService = managedplugins.NewNoop() | 
					
						
							|  |  |  | 			hs.log = log.NewNopLogger() | 
					
						
							|  |  |  | 		}) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		input := strings.NewReader(`{"enabled": false}`) | 
					
						
							|  |  |  | 		endpoint := fmt.Sprintf("/api/plugins/%s/settings", pID) | 
					
						
							|  |  |  | 		req := webtest.RequestWithSignedInUser(server.NewPostRequest(endpoint, input), userWithPermissions(1, []ac.Permission{{Action: pluginaccesscontrol.ActionWrite, Scope: "plugins:id:test-app"}})) | 
					
						
							|  |  |  | 		res, err := server.SendJSON(req) | 
					
						
							|  |  |  | 		require.NoError(t, err) | 
					
						
							|  |  |  | 		require.Equal(t, http.StatusBadRequest, res.StatusCode) | 
					
						
							|  |  |  | 		require.NoError(t, res.Body.Close()) | 
					
						
							|  |  |  | 	}) | 
					
						
							|  |  |  | } |