Nested folders: Fix folder hierarchy in folder responses (#74516)

Nested folders: Fix hierarchy in folder response
pull/74595/head
Sofia Papagiannaki 2 years ago committed by GitHub
parent 394976bb6e
commit 9fcee9b206
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
  1. 60
      pkg/api/folder.go
  2. 24
      pkg/api/folder_test.go

@ -23,6 +23,8 @@ import (
"github.com/grafana/grafana/pkg/web" "github.com/grafana/grafana/pkg/web"
) )
const REDACTED = "redacted"
// swagger:route GET /folders folders getFolders // swagger:route GET /folders folders getFolders
// //
// Get all folders. // Get all folders.
@ -87,12 +89,12 @@ func (hs *HTTPServer) GetFolderByUID(c *contextmodel.ReqContext) response.Respon
return apierrors.ToFolderErrorResponse(err) return apierrors.ToFolderErrorResponse(err)
} }
g, err := guardian.NewByFolder(c.Req.Context(), folder, c.OrgID, c.SignedInUser) folderDTO, err := hs.newToFolderDto(c, folder)
if err != nil { if err != nil {
return response.Err(err) return response.Err(err)
} }
return response.JSON(http.StatusOK, hs.newToFolderDto(c, g, folder)) return response.JSON(http.StatusOK, folderDTO)
} }
// swagger:route GET /folders/id/{folder_id} folders getFolderByID // swagger:route GET /folders/id/{folder_id} folders getFolderByID
@ -120,11 +122,11 @@ func (hs *HTTPServer) GetFolderByID(c *contextmodel.ReqContext) response.Respons
return apierrors.ToFolderErrorResponse(err) return apierrors.ToFolderErrorResponse(err)
} }
g, err := guardian.NewByFolder(c.Req.Context(), folder, c.OrgID, c.SignedInUser) folderDTO, err := hs.newToFolderDto(c, folder)
if err != nil { if err != nil {
return response.Err(err) return response.Err(err)
} }
return response.JSON(http.StatusOK, hs.newToFolderDto(c, g, folder)) return response.JSON(http.StatusOK, folderDTO)
} }
// swagger:route POST /folders folders createFolder // swagger:route POST /folders folders createFolder
@ -161,13 +163,13 @@ func (hs *HTTPServer) CreateFolder(c *contextmodel.ReqContext) response.Response
// Required for cases when caller wants to immediately interact with the newly created object // Required for cases when caller wants to immediately interact with the newly created object
hs.accesscontrolService.ClearUserPermissionCache(c.SignedInUser) hs.accesscontrolService.ClearUserPermissionCache(c.SignedInUser)
g, err := guardian.NewByFolder(c.Req.Context(), folder, c.OrgID, c.SignedInUser) folderDTO, err := hs.newToFolderDto(c, folder)
if err != nil { if err != nil {
return response.Err(err) return response.Err(err)
} }
// TODO set ParentUID if nested folders are enabled // TODO set ParentUID if nested folders are enabled
return response.JSON(http.StatusOK, hs.newToFolderDto(c, g, folder)) return response.JSON(http.StatusOK, folderDTO)
} }
func (hs *HTTPServer) setDefaultFolderPermissions(ctx context.Context, orgID int64, user *user.SignedInUser, folder *folder.Folder) error { func (hs *HTTPServer) setDefaultFolderPermissions(ctx context.Context, orgID int64, user *user.SignedInUser, folder *folder.Folder) error {
@ -216,11 +218,11 @@ func (hs *HTTPServer) MoveFolder(c *contextmodel.ReqContext) response.Response {
return response.Error(http.StatusInternalServerError, "move folder failed", err) return response.Error(http.StatusInternalServerError, "move folder failed", err)
} }
g, err := guardian.NewByFolder(c.Req.Context(), theFolder, c.OrgID, c.SignedInUser) folderDTO, err := hs.newToFolderDto(c, theFolder)
if err != nil { if err != nil {
return response.Err(err) return response.Err(err)
} }
return response.JSON(http.StatusOK, hs.newToFolderDto(c, g, theFolder)) return response.JSON(http.StatusOK, folderDTO)
} }
result := map[string]string{} result := map[string]string{}
result["message"] = "To use this service, you need to activate nested folder feature." result["message"] = "To use this service, you need to activate nested folder feature."
@ -252,12 +254,12 @@ func (hs *HTTPServer) UpdateFolder(c *contextmodel.ReqContext) response.Response
if err != nil { if err != nil {
return apierrors.ToFolderErrorResponse(err) return apierrors.ToFolderErrorResponse(err)
} }
g, err := guardian.NewByFolder(c.Req.Context(), result, c.OrgID, c.SignedInUser) folderDTO, err := hs.newToFolderDto(c, result)
if err != nil { if err != nil {
return response.Err(err) return response.Err(err)
} }
return response.JSON(http.StatusOK, hs.newToFolderDto(c, g, result)) return response.JSON(http.StatusOK, folderDTO)
} }
// swagger:route DELETE /folders/{folder_uid} folders deleteFolder // swagger:route DELETE /folders/{folder_uid} folders deleteFolder
@ -319,9 +321,14 @@ func (hs *HTTPServer) GetFolderDescendantCounts(c *contextmodel.ReqContext) resp
return response.JSON(http.StatusOK, counts) return response.JSON(http.StatusOK, counts)
} }
func (hs *HTTPServer) newToFolderDto(c *contextmodel.ReqContext, g guardian.DashboardGuardian, f *folder.Folder) dtos.Folder { func (hs *HTTPServer) newToFolderDto(c *contextmodel.ReqContext, f *folder.Folder) (dtos.Folder, error) {
ctx := c.Req.Context() ctx := c.Req.Context()
toDTO := func(f *folder.Folder) dtos.Folder { toDTO := func(f *folder.Folder, checkCanView bool) (dtos.Folder, error) {
g, err := guardian.NewByFolder(c.Req.Context(), f, c.OrgID, c.SignedInUser)
if err != nil {
return dtos.Folder{}, err
}
canEdit, _ := g.CanEdit() canEdit, _ := g.CanEdit()
canSave, _ := g.CanSave() canSave, _ := g.CanSave()
canAdmin, _ := g.CanAdmin() canAdmin, _ := g.CanAdmin()
@ -338,6 +345,16 @@ func (hs *HTTPServer) newToFolderDto(c *contextmodel.ReqContext, g guardian.Dash
acMetadata, _ := hs.getFolderACMetadata(c, f) acMetadata, _ := hs.getFolderACMetadata(c, f)
if checkCanView {
canView, _ := g.CanView()
if !canView {
return dtos.Folder{
Uid: REDACTED,
Title: REDACTED,
}, nil
}
}
return dtos.Folder{ return dtos.Folder{
Id: f.ID, Id: f.ID,
Uid: f.UID, Uid: f.UID,
@ -355,13 +372,17 @@ func (hs *HTTPServer) newToFolderDto(c *contextmodel.ReqContext, g guardian.Dash
Version: f.Version, Version: f.Version,
AccessControl: acMetadata, AccessControl: acMetadata,
ParentUID: f.ParentUID, ParentUID: f.ParentUID,
} }, nil
} }
folderDTO := toDTO(f) // no need to check view permission for the starting folder since it's already checked by the callers
folderDTO, err := toDTO(f, false)
if err != nil {
return dtos.Folder{}, err
}
if !hs.Features.IsEnabled(featuremgmt.FlagNestedFolders) { if !hs.Features.IsEnabled(featuremgmt.FlagNestedFolders) {
return folderDTO return folderDTO, nil
} }
parents, err := hs.folderService.GetParents(ctx, folder.GetParentsQuery{UID: f.UID, OrgID: f.OrgID}) parents, err := hs.folderService.GetParents(ctx, folder.GetParentsQuery{UID: f.UID, OrgID: f.OrgID})
@ -372,10 +393,15 @@ func (hs *HTTPServer) newToFolderDto(c *contextmodel.ReqContext, g guardian.Dash
folderDTO.Parents = make([]dtos.Folder, 0, len(parents)) folderDTO.Parents = make([]dtos.Folder, 0, len(parents))
for _, f := range parents { for _, f := range parents {
folderDTO.Parents = append(folderDTO.Parents, toDTO(f)) DTO, err := toDTO(f, true)
if err != nil {
hs.log.Error("failed to convert folder to DTO", "folder", f.UID, "org", f.OrgID, "error", err)
continue
}
folderDTO.Parents = append(folderDTO.Parents, DTO)
} }
return folderDTO return folderDTO, nil
} }
func (hs *HTTPServer) getFolderACMetadata(c *contextmodel.ReqContext, f *folder.Folder) (accesscontrol.Metadata, error) { func (hs *HTTPServer) getFolderACMetadata(c *contextmodel.ReqContext, f *folder.Folder) (accesscontrol.Metadata, error) {

@ -19,6 +19,7 @@ import (
"github.com/grafana/grafana/pkg/services/featuremgmt" "github.com/grafana/grafana/pkg/services/featuremgmt"
"github.com/grafana/grafana/pkg/services/folder" "github.com/grafana/grafana/pkg/services/folder"
"github.com/grafana/grafana/pkg/services/folder/foldertest" "github.com/grafana/grafana/pkg/services/folder/foldertest"
"github.com/grafana/grafana/pkg/services/guardian"
"github.com/grafana/grafana/pkg/services/quota/quotatest" "github.com/grafana/grafana/pkg/services/quota/quotatest"
"github.com/grafana/grafana/pkg/services/search/model" "github.com/grafana/grafana/pkg/services/search/model"
"github.com/grafana/grafana/pkg/services/user" "github.com/grafana/grafana/pkg/services/user"
@ -433,7 +434,6 @@ func TestFolderGetAPIEndpoint(t *testing.T) {
}, },
}, },
} }
setUpRBACGuardian(t)
type testCase struct { type testCase struct {
description string description string
@ -443,6 +443,7 @@ func TestFolderGetAPIEndpoint(t *testing.T) {
expectedParentUIDs []string expectedParentUIDs []string
expectedParentTitles []string expectedParentTitles []string
permissions []accesscontrol.Permission permissions []accesscontrol.Permission
g *guardian.FakeDashboardGuardian
} }
tcs := []testCase{ tcs := []testCase{
{ {
@ -455,6 +456,19 @@ func TestFolderGetAPIEndpoint(t *testing.T) {
permissions: []accesscontrol.Permission{ permissions: []accesscontrol.Permission{
{Action: dashboards.ActionFoldersRead, Scope: dashboards.ScopeFoldersProvider.GetResourceScopeUID("uid")}, {Action: dashboards.ActionFoldersRead, Scope: dashboards.ScopeFoldersProvider.GetResourceScopeUID("uid")},
}, },
g: &guardian.FakeDashboardGuardian{CanViewValue: true},
},
{
description: "get folder by UID should return parent folders redacted if nested folder are enabled and user does not have read access to parent folders",
URL: "/api/folders/uid",
expectedCode: http.StatusOK,
features: featuremgmt.WithFeatures(featuremgmt.FlagNestedFolders),
expectedParentUIDs: []string{REDACTED, REDACTED},
expectedParentTitles: []string{REDACTED, REDACTED},
permissions: []accesscontrol.Permission{
{Action: dashboards.ActionFoldersRead, Scope: dashboards.ScopeFoldersProvider.GetResourceScopeUID("uid")},
},
g: &guardian.FakeDashboardGuardian{CanViewValue: false},
}, },
{ {
description: "get folder by UID should not return parent folders if nested folder are disabled", description: "get folder by UID should not return parent folders if nested folder are disabled",
@ -466,6 +480,7 @@ func TestFolderGetAPIEndpoint(t *testing.T) {
permissions: []accesscontrol.Permission{ permissions: []accesscontrol.Permission{
{Action: dashboards.ActionFoldersRead, Scope: dashboards.ScopeFoldersProvider.GetResourceScopeUID("uid")}, {Action: dashboards.ActionFoldersRead, Scope: dashboards.ScopeFoldersProvider.GetResourceScopeUID("uid")},
}, },
g: &guardian.FakeDashboardGuardian{CanViewValue: true},
}, },
} }
@ -477,6 +492,13 @@ func TestFolderGetAPIEndpoint(t *testing.T) {
}) })
t.Run(tc.description, func(t *testing.T) { t.Run(tc.description, func(t *testing.T) {
origNewGuardian := guardian.New
t.Cleanup(func() {
guardian.New = origNewGuardian
})
guardian.MockDashboardGuardian(tc.g)
req := srv.NewGetRequest(tc.URL) req := srv.NewGetRequest(tc.URL)
req = webtest.RequestWithSignedInUser(req, userWithPermissions(1, tc.permissions)) req = webtest.RequestWithSignedInUser(req, userWithPermissions(1, tc.permissions))
resp, err := srv.Send(req) resp, err := srv.Send(req)

Loading…
Cancel
Save