6c728f8dec
* Provisioning: allow access check to proceed even when non access policy * Provisioning: access checker needs this for MT * add permissions registration * remove scopes * use in MT for now * no need to document an internal flag here * revert vscode change * refactor the authZ permission evaluation and mapper code to allow evaluating unscoped actions beyond creation * update wire * gofmt * add boolean to struct --------- Co-authored-by: IevaVasiljeva <ieva.vasiljeva@grafana.com>
25 lines
686 B
Go
25 lines
686 B
Go
package provisioning
|
|
|
|
import (
|
|
"fmt"
|
|
|
|
"github.com/grafana/grafana/pkg/services/accesscontrol"
|
|
"github.com/grafana/grafana/pkg/services/featuremgmt"
|
|
"github.com/grafana/grafana/pkg/setting"
|
|
)
|
|
|
|
// DependencyRegisterer is set to satisfy wire gen and make sure the `RegisterDependencies` is called.
|
|
type DependencyRegisterer struct{}
|
|
|
|
func RegisterDependencies(
|
|
cfg *setting.Cfg,
|
|
accessControlService accesscontrol.Service,
|
|
features featuremgmt.FeatureToggles,
|
|
) (*DependencyRegisterer, error) {
|
|
if err := registerAccessControlRoles(accessControlService); err != nil {
|
|
return nil, fmt.Errorf("registering access control roles: %w", err)
|
|
}
|
|
|
|
return &DependencyRegisterer{}, nil
|
|
}
|