39bd444a0c
This is the first step in moving the policy engine to django_openstack_auth. It makes the policy check method pluggable in openstack_dashboard as it is in horizon. To do this, the wrapper around the policy engine is moved to a new file isolated from the policy check method. A thin check method is left in policy.py to allow the code and policy mix-ins to behave as now. The existing policy test file is also moved for relocation. A new test file has been added to exercise the simpler check method. Once the actual engine is moved to django_openstack_auth, we'll be able to remove policy_backend.py and the test version of policy_backend.py as well. Partially Implemenents: blueprint move-policy-engine Change-Id: I591bcbe69bf255f1aa0346fdf869fac86d2e6d3d
104 lines
4.2 KiB
Python
104 lines
4.2 KiB
Python
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
from django.test.utils import override_settings
|
|
|
|
from openstack_dashboard import policy
|
|
from openstack_dashboard import policy_backend
|
|
from openstack_dashboard.test import helpers as test
|
|
|
|
|
|
class PolicyBackendTestCase(test.TestCase):
|
|
def test_policy_file_load(self):
|
|
policy_backend.reset()
|
|
enforcer = policy_backend._get_enforcer()
|
|
self.assertEqual(2, len(enforcer))
|
|
self.assertTrue('identity' in enforcer)
|
|
self.assertTrue('compute' in enforcer)
|
|
|
|
def test_policy_reset(self):
|
|
policy_backend._get_enforcer()
|
|
self.assertEqual(2, len(policy_backend._ENFORCER))
|
|
policy_backend.reset()
|
|
self.assertIsNone(policy_backend._ENFORCER)
|
|
|
|
@override_settings(POLICY_CHECK_FUNCTION=policy_backend.check)
|
|
def test_check_admin_required_false(self):
|
|
policy_backend.reset()
|
|
value = policy.check((("identity", "admin_required"),),
|
|
request=self.request)
|
|
self.assertFalse(value)
|
|
|
|
@override_settings(POLICY_CHECK_FUNCTION=policy_backend.check)
|
|
def test_check_identity_rule_not_found_false(self):
|
|
policy_backend.reset()
|
|
value = policy.check((("identity", "i_dont_exist"),),
|
|
request=self.request)
|
|
# this should fail because the default check for
|
|
# identity is admin_required
|
|
self.assertFalse(value)
|
|
|
|
@override_settings(POLICY_CHECK_FUNCTION=policy_backend.check)
|
|
def test_check_nova_context_is_admin_false(self):
|
|
policy_backend.reset()
|
|
value = policy.check((("compute", "context_is_admin"),),
|
|
request=self.request)
|
|
self.assertFalse(value)
|
|
|
|
@override_settings(POLICY_CHECK_FUNCTION=policy_backend.check)
|
|
def test_compound_check_false(self):
|
|
policy_backend.reset()
|
|
value = policy.check((("identity", "admin_required"),
|
|
("identity", "identity:default"),),
|
|
request=self.request)
|
|
self.assertFalse(value)
|
|
|
|
@override_settings(POLICY_CHECK_FUNCTION=policy_backend.check)
|
|
def test_scope_not_found(self):
|
|
policy_backend.reset()
|
|
value = policy.check((("dummy", "default"),),
|
|
request=self.request)
|
|
self.assertTrue(value)
|
|
|
|
|
|
class PolicyBackendTestCaseAdmin(test.BaseAdminViewTests):
|
|
@override_settings(POLICY_CHECK_FUNCTION=policy_backend.check)
|
|
def test_check_admin_required_true(self):
|
|
policy_backend.reset()
|
|
value = policy.check((("identity", "admin_required"),),
|
|
request=self.request)
|
|
self.assertTrue(value)
|
|
|
|
@override_settings(POLICY_CHECK_FUNCTION=policy_backend.check)
|
|
def test_check_identity_rule_not_found_true(self):
|
|
policy_backend.reset()
|
|
value = policy.check((("identity", "i_dont_exist"),),
|
|
request=self.request)
|
|
# this should succeed because the default check for
|
|
# identity is admin_required
|
|
self.assertTrue(value)
|
|
|
|
@override_settings(POLICY_CHECK_FUNCTION=policy_backend.check)
|
|
def test_compound_check_true(self):
|
|
policy_backend.reset()
|
|
value = policy.check((("identity", "admin_required"),
|
|
("identity", "identity:default"),),
|
|
request=self.request)
|
|
self.assertTrue(value)
|
|
|
|
@override_settings(POLICY_CHECK_FUNCTION=policy_backend.check)
|
|
def test_check_nova_context_is_admin_true(self):
|
|
policy_backend.reset()
|
|
value = policy.check((("compute", "context_is_admin"),),
|
|
request=self.request)
|
|
self.assertTrue(value)
|