policy-in-code will be supported by the main neutron repo because the neutron API layer uses the policy code in the neutron repo. However, neutron_lib.context refers to its own policy enforcer, so we need a small code to support policy-in-code in neutron-lib side. Part of blueprint get-policy-from-neutron-lib Change-Id: I4923a069f4080dc53a8fb359f5a1518de06feb2f
75 lines
2.9 KiB
Python
75 lines
2.9 KiB
Python
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
|
|
# implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
|
|
import mock
|
|
|
|
from neutron_lib import _policy as policy
|
|
from neutron_lib import context
|
|
|
|
from neutron_lib.tests import _base as base
|
|
|
|
|
|
class TestPolicyEnforcer(base.BaseTestCase):
|
|
def setUp(self):
|
|
super(TestPolicyEnforcer, self).setUp()
|
|
# Isolate one _ROLE_ENFORCER per test case
|
|
mock.patch.object(policy, '_ROLE_ENFORCER', None).start()
|
|
|
|
def test_init_reset(self):
|
|
self.assertIsNone(policy._ROLE_ENFORCER)
|
|
policy.init()
|
|
self.assertIsNotNone(policy._ROLE_ENFORCER)
|
|
|
|
def test_check_user_is_not_admin(self):
|
|
ctx = context.Context('me', 'my_project')
|
|
self.assertFalse(policy.check_is_admin(ctx))
|
|
|
|
def test_check_user_elevated_is_admin(self):
|
|
ctx = context.Context('me', 'my_project', roles=['user']).elevated()
|
|
self.assertTrue(policy.check_is_admin(ctx))
|
|
|
|
def test_check_is_admin_no_roles_no_admin(self):
|
|
policy.init(policy_file='dummy_policy.json')
|
|
ctx = context.Context('me', 'my_project', roles=['user']).elevated()
|
|
# With no admin role, elevated() should not work.
|
|
self.assertFalse(policy.check_is_admin(ctx))
|
|
|
|
def test_check_user_elevated_is_admin_with_default_policy(self):
|
|
policy.init(policy_file='no_policy.json')
|
|
ctx = context.Context('me', 'my_project', roles=['user']).elevated()
|
|
self.assertTrue(policy.check_is_admin(ctx))
|
|
|
|
def test_check_is_advsvc_role(self):
|
|
ctx = context.Context('me', 'my_project', roles=['advsvc'])
|
|
self.assertTrue(policy.check_is_advsvc(ctx))
|
|
|
|
def test_check_is_not_advsvc_user(self):
|
|
ctx = context.Context('me', 'my_project', roles=['user'])
|
|
self.assertFalse(policy.check_is_advsvc(ctx))
|
|
|
|
def test_check_is_not_advsvc_admin(self):
|
|
ctx = context.Context('me', 'my_project').elevated()
|
|
self.assertTrue(policy.check_is_admin(ctx))
|
|
self.assertFalse(policy.check_is_advsvc(ctx))
|
|
|
|
def test_check_is_advsvc_no_roles_no_advsvc(self):
|
|
policy.init(policy_file='dummy_policy.json')
|
|
ctx = context.Context('me', 'my_project', roles=['advsvc'])
|
|
# No advsvc role in the policy file, so cannot assume the role.
|
|
self.assertFalse(policy.check_is_advsvc(ctx))
|
|
|
|
def test_check_is_advsvc_role_with_default_policy(self):
|
|
policy.init(policy_file='no_policy.json')
|
|
ctx = context.Context('me', 'my_project', roles=['advsvc'])
|
|
self.assertTrue(policy.check_is_advsvc(ctx))
|