From 4ff3ae3235f142228ed12f909339ad9f1ee2c118 Mon Sep 17 00:00:00 2001 From: Slawek Kaplonski Date: Wed, 7 Apr 2021 11:01:16 +0200 Subject: [PATCH] Add tests for segments API's new policy rules Related-blueprint: bp/secure-rbac-roles Change-Id: I955059c9d26166deb6eaf99f2862b93bfdb0f0e7 --- .../tests/unit/conf/policies/test_segment.py | 126 ++++++++++++++++++ 1 file changed, 126 insertions(+) create mode 100644 neutron/tests/unit/conf/policies/test_segment.py diff --git a/neutron/tests/unit/conf/policies/test_segment.py b/neutron/tests/unit/conf/policies/test_segment.py new file mode 100644 index 00000000000..8946e1dfdf7 --- /dev/null +++ b/neutron/tests/unit/conf/policies/test_segment.py @@ -0,0 +1,126 @@ +# Copyright (c) 2021 Red Hat Inc. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or +# implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +from oslo_policy import policy as base_policy + +from neutron import policy +from neutron.tests.unit.conf.policies import base + + +class SegmentAPITestCase(base.PolicyBaseTestCase): + + def setUp(self): + super(SegmentAPITestCase, self).setUp() + self.target = {} + + +class SystemAdminTests(SegmentAPITestCase): + + def setUp(self): + super(SystemAdminTests, self).setUp() + self.context = self.system_admin_ctx + + def test_create_segment(self): + self.assertTrue( + policy.enforce(self.context, 'create_segment', self.target)) + + def test_get_segment(self): + self.assertTrue( + policy.enforce(self.context, 'get_segment', self.target)) + + def test_update_segment(self): + self.assertTrue( + policy.enforce(self.context, 'update_segment', self.target)) + + def test_delete_segment(self): + self.assertTrue( + policy.enforce(self.context, 'delete_segment', self.target)) + + +class SystemMemberTests(SystemAdminTests): + + def setUp(self): + super(SystemMemberTests, self).setUp() + self.context = self.system_member_ctx + + def test_create_segment(self): + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'create_segment', self.target) + + def test_update_segment(self): + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'update_segment', self.target) + + def test_delete_segment(self): + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'delete_segment', self.target) + + +class SystemReaderTests(SystemMemberTests): + + def setUp(self): + super(SystemReaderTests, self).setUp() + self.context = self.system_reader_ctx + + +class ProjectAdminTests(SegmentAPITestCase): + + def setUp(self): + super(ProjectAdminTests, self).setUp() + self.context = self.project_admin_ctx + + def test_create_segment(self): + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'create_segment', self.target) + + def test_get_segment(self): + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'get_segment', self.target) + + def test_update_segment(self): + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'update_segment', self.target) + + def test_delete_segment(self): + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'delete_segment', self.target) + + +class ProjectMemberTests(ProjectAdminTests): + + def setUp(self): + super(ProjectMemberTests, self).setUp() + self.context = self.project_member_ctx + + +class ProjectReaderTests(ProjectMemberTests): + + def setUp(self): + super(ProjectReaderTests, self).setUp() + self.context = self.project_reader_ctx