| 
									
										
										
										
											2021-08-13 21:58:05 +08:00
										 |  |  | package setting | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | import ( | 
					
						
							|  |  |  | 	"testing" | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2024-03-19 22:56:40 +08:00
										 |  |  | 	"github.com/grafana/grafana-azure-sdk-go/v2/azsettings" | 
					
						
							| 
									
										
										
										
											2021-08-13 21:58:05 +08:00
										 |  |  | 	"github.com/stretchr/testify/assert" | 
					
						
							|  |  |  | 	"github.com/stretchr/testify/require" | 
					
						
							|  |  |  | ) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func TestAzureSettings(t *testing.T) { | 
					
						
							|  |  |  | 	t.Run("cloud name", func(t *testing.T) { | 
					
						
							|  |  |  | 		testCases := []struct { | 
					
						
							|  |  |  | 			name            string | 
					
						
							|  |  |  | 			configuredValue string | 
					
						
							|  |  |  | 			resolvedValue   string | 
					
						
							|  |  |  | 		}{ | 
					
						
							|  |  |  | 			{ | 
					
						
							|  |  |  | 				name:            "should be Public if not set", | 
					
						
							|  |  |  | 				configuredValue: "", | 
					
						
							| 
									
										
										
										
											2022-04-01 19:26:49 +08:00
										 |  |  | 				resolvedValue:   azsettings.AzurePublic, | 
					
						
							| 
									
										
										
										
											2021-08-13 21:58:05 +08:00
										 |  |  | 			}, | 
					
						
							|  |  |  | 			{ | 
					
						
							|  |  |  | 				name:            "should be Public if set to Public", | 
					
						
							| 
									
										
										
										
											2022-04-01 19:26:49 +08:00
										 |  |  | 				configuredValue: azsettings.AzurePublic, | 
					
						
							|  |  |  | 				resolvedValue:   azsettings.AzurePublic, | 
					
						
							| 
									
										
										
										
											2021-08-13 21:58:05 +08:00
										 |  |  | 			}, | 
					
						
							|  |  |  | 			{ | 
					
						
							|  |  |  | 				name:            "should be Public if set to Public using alternative name", | 
					
						
							|  |  |  | 				configuredValue: "AzurePublicCloud", | 
					
						
							| 
									
										
										
										
											2022-04-01 19:26:49 +08:00
										 |  |  | 				resolvedValue:   azsettings.AzurePublic, | 
					
						
							| 
									
										
										
										
											2021-08-13 21:58:05 +08:00
										 |  |  | 			}, | 
					
						
							|  |  |  | 			{ | 
					
						
							|  |  |  | 				name:            "should be China if set to China", | 
					
						
							| 
									
										
										
										
											2022-04-01 19:26:49 +08:00
										 |  |  | 				configuredValue: azsettings.AzureChina, | 
					
						
							|  |  |  | 				resolvedValue:   azsettings.AzureChina, | 
					
						
							| 
									
										
										
										
											2021-08-13 21:58:05 +08:00
										 |  |  | 			}, | 
					
						
							|  |  |  | 			{ | 
					
						
							|  |  |  | 				name:            "should be US Government if set to US Government using alternative name", | 
					
						
							|  |  |  | 				configuredValue: "usgov", | 
					
						
							| 
									
										
										
										
											2022-04-01 19:26:49 +08:00
										 |  |  | 				resolvedValue:   azsettings.AzureUSGovernment, | 
					
						
							| 
									
										
										
										
											2021-08-13 21:58:05 +08:00
										 |  |  | 			}, | 
					
						
							|  |  |  | 			{ | 
					
						
							|  |  |  | 				name:            "should be same as set if not known", | 
					
						
							|  |  |  | 				configuredValue: "Custom123", | 
					
						
							|  |  |  | 				resolvedValue:   "Custom123", | 
					
						
							|  |  |  | 			}, | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		for _, c := range testCases { | 
					
						
							|  |  |  | 			t.Run(c.name, func(t *testing.T) { | 
					
						
							|  |  |  | 				cfg := NewCfg() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 				azureSection, err := cfg.Raw.NewSection("azure") | 
					
						
							|  |  |  | 				require.NoError(t, err) | 
					
						
							|  |  |  | 				_, err = azureSection.NewKey("cloud", c.configuredValue) | 
					
						
							|  |  |  | 				require.NoError(t, err) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 				cfg.readAzureSettings() | 
					
						
							|  |  |  | 				require.NotNil(t, cfg.Azure) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 				assert.Equal(t, c.resolvedValue, cfg.Azure.Cloud) | 
					
						
							|  |  |  | 			}) | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 	}) | 
					
						
							| 
									
										
										
										
											2023-05-16 01:00:54 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2024-03-11 16:57:42 +08:00
										 |  |  | 	t.Run("prometheus", func(t *testing.T) { | 
					
						
							|  |  |  | 		t.Run("should enable azure auth", func(t *testing.T) { | 
					
						
							|  |  |  | 			cfg := NewCfg() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			authSection, err := cfg.Raw.NewSection("auth") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 			_, err = authSection.NewKey("azure_auth_enabled", "true") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			cfg.readAzureSettings() | 
					
						
							|  |  |  | 			require.NotNil(t, cfg.Azure.AzureAuthEnabled) | 
					
						
							|  |  |  | 			assert.True(t, cfg.Azure.AzureAuthEnabled) | 
					
						
							|  |  |  | 		}) | 
					
						
							|  |  |  | 		t.Run("should default to disabled", func(t *testing.T) { | 
					
						
							|  |  |  | 			cfg := NewCfg() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			cfg.readAzureSettings() | 
					
						
							|  |  |  | 			require.NotNil(t, cfg.Azure.AzureAuthEnabled) | 
					
						
							|  |  |  | 			assert.False(t, cfg.Azure.AzureAuthEnabled) | 
					
						
							|  |  |  | 		}) | 
					
						
							|  |  |  | 	}) | 
					
						
							| 
									
										
										
										
											2023-05-16 01:00:54 +08:00
										 |  |  | 	t.Run("User Identity", func(t *testing.T) { | 
					
						
							|  |  |  | 		t.Run("should be disabled by default", func(t *testing.T) { | 
					
						
							|  |  |  | 			cfg := NewCfg() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			cfg.readAzureSettings() | 
					
						
							|  |  |  | 			require.NotNil(t, cfg.Azure) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			assert.False(t, cfg.Azure.UserIdentityEnabled) | 
					
						
							|  |  |  | 		}) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		t.Run("should be enabled", func(t *testing.T) { | 
					
						
							|  |  |  | 			cfg := NewCfg() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			azureSection, err := cfg.Raw.NewSection("azure") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 			_, err = azureSection.NewKey("user_identity_enabled", "true") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			cfg.readAzureSettings() | 
					
						
							|  |  |  | 			require.NotNil(t, cfg.Azure) | 
					
						
							|  |  |  | 			require.NotNil(t, cfg.Azure.UserIdentityTokenEndpoint) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			assert.True(t, cfg.Azure.UserIdentityEnabled) | 
					
						
							|  |  |  | 		}) | 
					
						
							| 
									
										
										
										
											2024-03-20 00:32:24 +08:00
										 |  |  | 		t.Run("enables service credentials by default", func(t *testing.T) { | 
					
						
							|  |  |  | 			cfg := NewCfg() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			azureSection, err := cfg.Raw.NewSection("azure") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 			_, err = azureSection.NewKey("user_identity_enabled", "true") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			cfg.readAzureSettings() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			assert.True(t, cfg.Azure.UserIdentityFallbackCredentialsEnabled) | 
					
						
							|  |  |  | 		}) | 
					
						
							|  |  |  | 		t.Run("disables service credentials", func(t *testing.T) { | 
					
						
							|  |  |  | 			cfg := NewCfg() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			azureSection, err := cfg.Raw.NewSection("azure") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 			_, err = azureSection.NewKey("user_identity_enabled", "true") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 			_, err = azureSection.NewKey("user_identity_fallback_credentials_enabled", "false") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			cfg.readAzureSettings() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			assert.False(t, cfg.Azure.UserIdentityFallbackCredentialsEnabled) | 
					
						
							|  |  |  | 		}) | 
					
						
							| 
									
										
										
										
											2023-05-16 01:00:54 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | 		t.Run("should use token endpoint from Azure AD if enabled", func(t *testing.T) { | 
					
						
							|  |  |  | 			cfg := NewCfg() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			azureAdSection, err := cfg.Raw.NewSection("auth.azuread") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 			_, err = azureAdSection.NewKey("enabled", "true") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 			_, err = azureAdSection.NewKey("token_url", "URL_1") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 			_, err = azureAdSection.NewKey("client_id", "ID_1") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 			_, err = azureAdSection.NewKey("client_secret", "SECRET_1") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			azureSection, err := cfg.Raw.NewSection("azure") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 			_, err = azureSection.NewKey("user_identity_enabled", "true") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			cfg.readAzureSettings() | 
					
						
							|  |  |  | 			require.NotNil(t, cfg.Azure) | 
					
						
							|  |  |  | 			require.NotNil(t, cfg.Azure.UserIdentityTokenEndpoint) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			assert.True(t, cfg.Azure.UserIdentityEnabled) | 
					
						
							|  |  |  | 			assert.Equal(t, "URL_1", cfg.Azure.UserIdentityTokenEndpoint.TokenUrl) | 
					
						
							|  |  |  | 			assert.Equal(t, "ID_1", cfg.Azure.UserIdentityTokenEndpoint.ClientId) | 
					
						
							|  |  |  | 			assert.Equal(t, "SECRET_1", cfg.Azure.UserIdentityTokenEndpoint.ClientSecret) | 
					
						
							|  |  |  | 		}) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		t.Run("should not use token endpoint from Azure AD if not enabled", func(t *testing.T) { | 
					
						
							|  |  |  | 			cfg := NewCfg() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			azureAdSection, err := cfg.Raw.NewSection("auth.azuread") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 			_, err = azureAdSection.NewKey("enabled", "false") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 			_, err = azureAdSection.NewKey("token_url", "URL_1") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 			_, err = azureAdSection.NewKey("client_id", "ID_1") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 			_, err = azureAdSection.NewKey("client_secret", "SECRET_1") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			azureSection, err := cfg.Raw.NewSection("azure") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 			_, err = azureSection.NewKey("user_identity_enabled", "true") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			cfg.readAzureSettings() | 
					
						
							|  |  |  | 			require.NotNil(t, cfg.Azure) | 
					
						
							|  |  |  | 			require.NotNil(t, cfg.Azure.UserIdentityTokenEndpoint) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			assert.True(t, cfg.Azure.UserIdentityEnabled) | 
					
						
							|  |  |  | 			assert.Empty(t, cfg.Azure.UserIdentityTokenEndpoint.TokenUrl) | 
					
						
							|  |  |  | 			assert.Empty(t, cfg.Azure.UserIdentityTokenEndpoint.ClientId) | 
					
						
							|  |  |  | 			assert.Empty(t, cfg.Azure.UserIdentityTokenEndpoint.ClientSecret) | 
					
						
							|  |  |  | 		}) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		t.Run("should override Azure AD settings", func(t *testing.T) { | 
					
						
							|  |  |  | 			cfg := NewCfg() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			azureAdSection, err := cfg.Raw.NewSection("auth.azuread") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 			_, err = azureAdSection.NewKey("enabled", "true") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 			_, err = azureAdSection.NewKey("token_url", "URL_1") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 			_, err = azureAdSection.NewKey("client_id", "ID_1") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 			_, err = azureAdSection.NewKey("client_secret", "SECRET_1") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			azureSection, err := cfg.Raw.NewSection("azure") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 			_, err = azureSection.NewKey("user_identity_enabled", "true") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 			_, err = azureSection.NewKey("user_identity_token_url", "URL_2") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 			_, err = azureSection.NewKey("user_identity_client_id", "ID_2") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 			_, err = azureSection.NewKey("user_identity_client_secret", "SECRET_2") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			cfg.readAzureSettings() | 
					
						
							|  |  |  | 			require.NotNil(t, cfg.Azure) | 
					
						
							|  |  |  | 			require.NotNil(t, cfg.Azure.UserIdentityTokenEndpoint) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			assert.True(t, cfg.Azure.UserIdentityEnabled) | 
					
						
							|  |  |  | 			assert.Equal(t, "URL_2", cfg.Azure.UserIdentityTokenEndpoint.TokenUrl) | 
					
						
							|  |  |  | 			assert.Equal(t, "ID_2", cfg.Azure.UserIdentityTokenEndpoint.ClientId) | 
					
						
							|  |  |  | 			assert.Equal(t, "SECRET_2", cfg.Azure.UserIdentityTokenEndpoint.ClientSecret) | 
					
						
							|  |  |  | 		}) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		t.Run("should not use secret from Azure AD if client ID overridden", func(t *testing.T) { | 
					
						
							|  |  |  | 			cfg := NewCfg() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			azureAdSection, err := cfg.Raw.NewSection("auth.azuread") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 			_, err = azureAdSection.NewKey("enabled", "true") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 			_, err = azureAdSection.NewKey("token_url", "URL_1") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 			_, err = azureAdSection.NewKey("client_id", "ID_1") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 			_, err = azureAdSection.NewKey("client_secret", "SECRET_1") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			azureSection, err := cfg.Raw.NewSection("azure") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 			_, err = azureSection.NewKey("user_identity_enabled", "true") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 			_, err = azureSection.NewKey("user_identity_token_url", "URL_2") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 			_, err = azureSection.NewKey("user_identity_client_id", "ID_2") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			cfg.readAzureSettings() | 
					
						
							|  |  |  | 			require.NotNil(t, cfg.Azure) | 
					
						
							|  |  |  | 			require.NotNil(t, cfg.Azure.UserIdentityTokenEndpoint) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			assert.True(t, cfg.Azure.UserIdentityEnabled) | 
					
						
							|  |  |  | 			assert.Equal(t, "URL_2", cfg.Azure.UserIdentityTokenEndpoint.TokenUrl) | 
					
						
							|  |  |  | 			assert.Equal(t, "ID_2", cfg.Azure.UserIdentityTokenEndpoint.ClientId) | 
					
						
							|  |  |  | 			assert.Empty(t, cfg.Azure.UserIdentityTokenEndpoint.ClientSecret) | 
					
						
							|  |  |  | 		}) | 
					
						
							| 
									
										
										
										
											2024-05-17 00:50:02 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | 		t.Run("does not enable username assertion by default", func(t *testing.T) { | 
					
						
							|  |  |  | 			cfg := NewCfg() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			azureSection, err := cfg.Raw.NewSection("azure") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 			_, err = azureSection.NewKey("user_identity_enabled", "true") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			cfg.readAzureSettings() | 
					
						
							|  |  |  | 			require.NotNil(t, cfg.Azure) | 
					
						
							|  |  |  | 			require.NotNil(t, cfg.Azure.UserIdentityTokenEndpoint) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			assert.True(t, cfg.Azure.UserIdentityEnabled) | 
					
						
							|  |  |  | 			assert.False(t, cfg.Azure.UserIdentityTokenEndpoint.UsernameAssertion) | 
					
						
							|  |  |  | 		}) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		t.Run("should appropriately set username assertion", func(t *testing.T) { | 
					
						
							|  |  |  | 			cfg := NewCfg() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			azureSection, err := cfg.Raw.NewSection("azure") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 			_, err = azureSection.NewKey("user_identity_enabled", "true") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 			_, err = azureSection.NewKey("username_assertion", "username") | 
					
						
							|  |  |  | 			require.NoError(t, err) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			cfg.readAzureSettings() | 
					
						
							|  |  |  | 			require.NotNil(t, cfg.Azure) | 
					
						
							|  |  |  | 			require.NotNil(t, cfg.Azure.UserIdentityTokenEndpoint) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			assert.True(t, cfg.Azure.UserIdentityEnabled) | 
					
						
							|  |  |  | 			assert.True(t, cfg.Azure.UserIdentityTokenEndpoint.UsernameAssertion) | 
					
						
							|  |  |  | 		}) | 
					
						
							| 
									
										
										
										
											2023-05-16 01:00:54 +08:00
										 |  |  | 	}) | 
					
						
							| 
									
										
										
										
											2023-12-14 19:48:22 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	t.Run("forward settings to plugins", func(t *testing.T) { | 
					
						
							|  |  |  | 		testCases := []struct { | 
					
						
							|  |  |  | 			name            string | 
					
						
							|  |  |  | 			configuredValue string | 
					
						
							|  |  |  | 			resolvedValue   []string | 
					
						
							|  |  |  | 		}{ | 
					
						
							|  |  |  | 			{ | 
					
						
							|  |  |  | 				name:            "should be set to user plugins if set", | 
					
						
							|  |  |  | 				configuredValue: "test-datasource", | 
					
						
							|  |  |  | 				resolvedValue:   []string{"test-datasource"}, | 
					
						
							|  |  |  | 			}, | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		for _, c := range testCases { | 
					
						
							|  |  |  | 			t.Run(c.name, func(t *testing.T) { | 
					
						
							|  |  |  | 				cfg := NewCfg() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 				azureSection, err := cfg.Raw.NewSection("azure") | 
					
						
							|  |  |  | 				require.NoError(t, err) | 
					
						
							|  |  |  | 				_, err = azureSection.NewKey("forward_settings_to_plugins", c.configuredValue) | 
					
						
							|  |  |  | 				require.NoError(t, err) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 				cfg.readAzureSettings() | 
					
						
							|  |  |  | 				require.NotNil(t, cfg.Azure) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 				assert.Equal(t, c.resolvedValue, cfg.Azure.ForwardSettingsPlugins) | 
					
						
							|  |  |  | 			}) | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 	}) | 
					
						
							| 
									
										
										
										
											2021-08-13 21:58:05 +08:00
										 |  |  | } |