| 
									
										
										
										
											2021-10-27 19:13:59 +08:00
										 |  |  | package api | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | import ( | 
					
						
							|  |  |  | 	"fmt" | 
					
						
							|  |  |  | 	"net/http" | 
					
						
							|  |  |  | 	"strings" | 
					
						
							|  |  |  | 	"testing" | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	"github.com/stretchr/testify/assert" | 
					
						
							| 
									
										
										
										
											2023-01-17 18:33:01 +08:00
										 |  |  | 	"github.com/stretchr/testify/require" | 
					
						
							| 
									
										
										
										
											2021-10-27 19:13:59 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	"github.com/grafana/grafana/pkg/services/accesscontrol" | 
					
						
							| 
									
										
										
										
											2023-07-12 18:28:04 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/services/accesscontrol/actest" | 
					
						
							| 
									
										
										
										
											2023-01-17 18:33:01 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/services/user" | 
					
						
							|  |  |  | 	"github.com/grafana/grafana/pkg/services/user/usertest" | 
					
						
							| 
									
										
										
										
											2021-10-27 19:13:59 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/setting" | 
					
						
							| 
									
										
										
										
											2023-01-17 18:33:01 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/web/webtest" | 
					
						
							| 
									
										
										
										
											2021-10-27 19:13:59 +08:00
										 |  |  | ) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | var ( | 
					
						
							|  |  |  | 	getCurrentOrgQuotasURL = "/api/org/quotas" | 
					
						
							|  |  |  | 	getOrgsQuotasURL       = "/api/orgs/%v/quotas" | 
					
						
							|  |  |  | 	putOrgsQuotasURL       = "/api/orgs/%v/quotas/%v" | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	testUpdateOrgQuotaCmd = `{ "limit": 20 }` | 
					
						
							|  |  |  | ) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-05-23 22:29:20 +08:00
										 |  |  | func TestAPIEndpoint_GetCurrentOrgQuotas(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2022-11-15 03:08:10 +08:00
										 |  |  | 	cfg := setting.NewCfg() | 
					
						
							|  |  |  | 	cfg.Quota.Enabled = true | 
					
						
							| 
									
										
										
										
											2023-01-17 18:33:01 +08:00
										 |  |  | 	server := SetupAPITestServer(t, func(hs *HTTPServer) { | 
					
						
							|  |  |  | 		hs.Cfg = cfg | 
					
						
							|  |  |  | 	}) | 
					
						
							| 
									
										
										
										
											2021-10-27 19:13:59 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	t.Run("AccessControl allows viewing CurrentOrgQuotas with correct permissions", func(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2023-01-17 18:33:01 +08:00
										 |  |  | 		req := webtest.RequestWithSignedInUser(server.NewGetRequest(getCurrentOrgQuotasURL), userWithPermissions(1, []accesscontrol.Permission{{Action: accesscontrol.ActionOrgsQuotasRead}})) | 
					
						
							|  |  |  | 		res, err := server.Send(req) | 
					
						
							|  |  |  | 		require.NoError(t, err) | 
					
						
							|  |  |  | 		assert.Equal(t, http.StatusOK, res.StatusCode) | 
					
						
							|  |  |  | 		require.NoError(t, res.Body.Close()) | 
					
						
							| 
									
										
										
										
											2021-10-27 19:13:59 +08:00
										 |  |  | 	}) | 
					
						
							| 
									
										
										
										
											2021-11-17 17:12:28 +08:00
										 |  |  | 	t.Run("AccessControl prevents viewing CurrentOrgQuotas with correct permissions in another org", func(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2023-01-17 18:33:01 +08:00
										 |  |  | 		// Set permissions in org 2, but set current org to org 1
 | 
					
						
							|  |  |  | 		user := userWithPermissions(2, []accesscontrol.Permission{{Action: accesscontrol.ActionOrgsQuotasRead}}) | 
					
						
							|  |  |  | 		user.OrgID = 1 | 
					
						
							|  |  |  | 		req := webtest.RequestWithSignedInUser(server.NewGetRequest(getCurrentOrgQuotasURL), user) | 
					
						
							|  |  |  | 		res, err := server.Send(req) | 
					
						
							|  |  |  | 		require.NoError(t, err) | 
					
						
							|  |  |  | 		assert.Equal(t, http.StatusForbidden, res.StatusCode) | 
					
						
							|  |  |  | 		require.NoError(t, res.Body.Close()) | 
					
						
							| 
									
										
										
										
											2021-10-27 19:13:59 +08:00
										 |  |  | 	}) | 
					
						
							|  |  |  | 	t.Run("AccessControl prevents viewing CurrentOrgQuotas with incorrect permissions", func(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2023-01-17 18:33:01 +08:00
										 |  |  | 		req := webtest.RequestWithSignedInUser(server.NewGetRequest(getCurrentOrgQuotasURL), userWithPermissions(1, []accesscontrol.Permission{{Action: "orgs:invalid"}})) | 
					
						
							|  |  |  | 		res, err := server.Send(req) | 
					
						
							|  |  |  | 		require.NoError(t, err) | 
					
						
							|  |  |  | 		assert.Equal(t, http.StatusForbidden, res.StatusCode) | 
					
						
							|  |  |  | 		require.NoError(t, res.Body.Close()) | 
					
						
							| 
									
										
										
										
											2021-10-27 19:13:59 +08:00
										 |  |  | 	}) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-05-23 22:29:20 +08:00
										 |  |  | func TestAPIEndpoint_GetOrgQuotas(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2022-11-15 03:08:10 +08:00
										 |  |  | 	cfg := setting.NewCfg() | 
					
						
							|  |  |  | 	cfg.Quota.Enabled = true | 
					
						
							| 
									
										
										
										
											2023-01-17 18:33:01 +08:00
										 |  |  | 	server := SetupAPITestServer(t, func(hs *HTTPServer) { | 
					
						
							|  |  |  | 		hs.Cfg = cfg | 
					
						
							| 
									
										
										
										
											2023-07-12 18:28:04 +08:00
										 |  |  | 		hs.accesscontrolService = &actest.FakeService{ExpectedPermissions: []accesscontrol.Permission{}} | 
					
						
							| 
									
										
										
										
											2023-01-17 18:33:01 +08:00
										 |  |  | 		hs.userService = &usertest.FakeUserService{ | 
					
						
							|  |  |  | 			ExpectedSignedInUser: &user.SignedInUser{OrgID: 2}, | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 	}) | 
					
						
							| 
									
										
										
										
											2021-10-27 19:13:59 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	t.Run("AccessControl allows viewing another org quotas with correct permissions", func(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2023-01-17 18:33:01 +08:00
										 |  |  | 		req := webtest.RequestWithSignedInUser(server.NewGetRequest(fmt.Sprintf(getOrgsQuotasURL, 2)), userWithPermissions(2, []accesscontrol.Permission{{Action: accesscontrol.ActionOrgsQuotasRead}})) | 
					
						
							|  |  |  | 		res, err := server.Send(req) | 
					
						
							|  |  |  | 		require.NoError(t, err) | 
					
						
							|  |  |  | 		assert.Equal(t, http.StatusOK, res.StatusCode) | 
					
						
							|  |  |  | 		require.NoError(t, res.Body.Close()) | 
					
						
							| 
									
										
										
										
											2021-10-27 19:13:59 +08:00
										 |  |  | 	}) | 
					
						
							| 
									
										
										
										
											2021-11-17 17:12:28 +08:00
										 |  |  | 	t.Run("AccessControl prevents viewing another org quotas with correct permissions in another org", func(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2023-01-17 18:33:01 +08:00
										 |  |  | 		// Set correct permissions in org 1 and empty permissions in org 2
 | 
					
						
							|  |  |  | 		user := userWithPermissions(1, []accesscontrol.Permission{{Action: accesscontrol.ActionOrgsQuotasRead}}) | 
					
						
							| 
									
										
										
										
											2023-07-12 18:28:04 +08:00
										 |  |  | 		user.Permissions[2] = nil | 
					
						
							| 
									
										
										
										
											2023-01-17 18:33:01 +08:00
										 |  |  | 		req := webtest.RequestWithSignedInUser(server.NewGetRequest(fmt.Sprintf(getOrgsQuotasURL, 2)), user) | 
					
						
							|  |  |  | 		res, err := server.Send(req) | 
					
						
							|  |  |  | 		require.NoError(t, err) | 
					
						
							|  |  |  | 		assert.Equal(t, http.StatusForbidden, res.StatusCode) | 
					
						
							|  |  |  | 		require.NoError(t, res.Body.Close()) | 
					
						
							| 
									
										
										
										
											2021-10-27 19:13:59 +08:00
										 |  |  | 	}) | 
					
						
							|  |  |  | 	t.Run("AccessControl prevents viewing another org quotas with incorrect permissions", func(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2023-01-17 18:33:01 +08:00
										 |  |  | 		req := webtest.RequestWithSignedInUser(server.NewGetRequest(fmt.Sprintf(getOrgsQuotasURL, 2)), userWithPermissions(2, []accesscontrol.Permission{{Action: "orgs:invalid"}})) | 
					
						
							|  |  |  | 		res, err := server.Send(req) | 
					
						
							|  |  |  | 		require.NoError(t, err) | 
					
						
							|  |  |  | 		assert.Equal(t, http.StatusForbidden, res.StatusCode) | 
					
						
							|  |  |  | 		require.NoError(t, res.Body.Close()) | 
					
						
							| 
									
										
										
										
											2021-10-27 19:13:59 +08:00
										 |  |  | 	}) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-05-23 22:29:20 +08:00
										 |  |  | func TestAPIEndpoint_PutOrgQuotas(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2022-11-15 03:08:10 +08:00
										 |  |  | 	cfg := setting.NewCfg() | 
					
						
							|  |  |  | 	cfg.Quota = setting.QuotaSettings{ | 
					
						
							|  |  |  | 		Enabled: true, | 
					
						
							|  |  |  | 		Global: setting.GlobalQuota{ | 
					
						
							|  |  |  | 			Org: 5, | 
					
						
							|  |  |  | 		}, | 
					
						
							|  |  |  | 		Org: setting.OrgQuota{ | 
					
						
							|  |  |  | 			User: 5, | 
					
						
							|  |  |  | 		}, | 
					
						
							|  |  |  | 		User: setting.UserQuota{ | 
					
						
							|  |  |  | 			Org: 5, | 
					
						
							|  |  |  | 		}, | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2023-07-12 18:28:04 +08:00
										 |  |  | 	fakeACService := &actest.FakeService{} | 
					
						
							| 
									
										
										
										
											2023-01-17 18:33:01 +08:00
										 |  |  | 	server := SetupAPITestServer(t, func(hs *HTTPServer) { | 
					
						
							|  |  |  | 		hs.Cfg = cfg | 
					
						
							| 
									
										
										
										
											2023-07-12 18:28:04 +08:00
										 |  |  | 		hs.accesscontrolService = fakeACService | 
					
						
							| 
									
										
										
										
											2023-01-17 18:33:01 +08:00
										 |  |  | 		hs.userService = &usertest.FakeUserService{ | 
					
						
							|  |  |  | 			ExpectedSignedInUser: &user.SignedInUser{OrgID: 2}, | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 	}) | 
					
						
							| 
									
										
										
										
											2021-10-27 19:13:59 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	input := strings.NewReader(testUpdateOrgQuotaCmd) | 
					
						
							|  |  |  | 	t.Run("AccessControl allows updating another org quotas with correct permissions", func(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2023-01-17 18:33:01 +08:00
										 |  |  | 		user := userWithPermissions(2, []accesscontrol.Permission{{Action: accesscontrol.ActionOrgsQuotasWrite}}) | 
					
						
							|  |  |  | 		user.OrgID = 1 | 
					
						
							| 
									
										
										
										
											2023-07-12 18:28:04 +08:00
										 |  |  | 		fakeACService.ExpectedPermissions = []accesscontrol.Permission{{Action: accesscontrol.ActionOrgsQuotasWrite}} | 
					
						
							| 
									
										
										
										
											2023-01-17 18:33:01 +08:00
										 |  |  | 		req := webtest.RequestWithSignedInUser(server.NewRequest(http.MethodPut, fmt.Sprintf(putOrgsQuotasURL, 2, "org_user"), input), user) | 
					
						
							|  |  |  | 		response, err := server.SendJSON(req) | 
					
						
							|  |  |  | 		require.NoError(t, err) | 
					
						
							|  |  |  | 		assert.Equal(t, http.StatusOK, response.StatusCode) | 
					
						
							|  |  |  | 		require.NoError(t, response.Body.Close()) | 
					
						
							| 
									
										
										
										
											2021-10-27 19:13:59 +08:00
										 |  |  | 	}) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	input = strings.NewReader(testUpdateOrgQuotaCmd) | 
					
						
							| 
									
										
										
										
											2021-11-17 17:12:28 +08:00
										 |  |  | 	t.Run("AccessControl prevents updating another org quotas with correct permissions in another org", func(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2023-01-17 18:33:01 +08:00
										 |  |  | 		user := userWithPermissions(1, []accesscontrol.Permission{{Action: accesscontrol.ActionOrgsQuotasWrite}}) | 
					
						
							| 
									
										
										
										
											2023-07-12 18:28:04 +08:00
										 |  |  | 		user.Permissions[2] = nil | 
					
						
							|  |  |  | 		fakeACService.ExpectedPermissions = []accesscontrol.Permission{} | 
					
						
							| 
									
										
										
										
											2023-01-17 18:33:01 +08:00
										 |  |  | 		req := webtest.RequestWithSignedInUser(server.NewRequest(http.MethodPut, fmt.Sprintf(putOrgsQuotasURL, 2, "org_user"), input), user) | 
					
						
							|  |  |  | 		response, err := server.SendJSON(req) | 
					
						
							|  |  |  | 		require.NoError(t, err) | 
					
						
							|  |  |  | 		assert.Equal(t, http.StatusForbidden, response.StatusCode) | 
					
						
							|  |  |  | 		require.NoError(t, response.Body.Close()) | 
					
						
							| 
									
										
										
										
											2021-10-27 19:13:59 +08:00
										 |  |  | 	}) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	input = strings.NewReader(testUpdateOrgQuotaCmd) | 
					
						
							|  |  |  | 	t.Run("AccessControl prevents updating another org quotas with incorrect permissions", func(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2023-01-17 18:33:01 +08:00
										 |  |  | 		user := userWithPermissions(2, []accesscontrol.Permission{{Action: "orgs:invalid"}}) | 
					
						
							| 
									
										
										
										
											2023-07-12 18:28:04 +08:00
										 |  |  | 		fakeACService.ExpectedPermissions = []accesscontrol.Permission{} | 
					
						
							| 
									
										
										
										
											2023-01-17 18:33:01 +08:00
										 |  |  | 		req := webtest.RequestWithSignedInUser(server.NewRequest(http.MethodPut, fmt.Sprintf(putOrgsQuotasURL, 2, "org_user"), input), user) | 
					
						
							|  |  |  | 		response, err := server.SendJSON(req) | 
					
						
							|  |  |  | 		require.NoError(t, err) | 
					
						
							|  |  |  | 		assert.Equal(t, http.StatusForbidden, response.StatusCode) | 
					
						
							|  |  |  | 		require.NoError(t, response.Body.Close()) | 
					
						
							| 
									
										
										
										
											2021-10-27 19:13:59 +08:00
										 |  |  | 	}) | 
					
						
							|  |  |  | } |