diff --git a/neutron/tests/unit/conf/policies/test_qos.py b/neutron/tests/unit/conf/policies/test_qos.py new file mode 100644 index 00000000000..3c79f56246e --- /dev/null +++ b/neutron/tests/unit/conf/policies/test_qos.py @@ -0,0 +1,1004 @@ +# Copyright (c) 2021 Red Hat Inc. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or +# implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +from unittest import mock + +from oslo_policy import policy as base_policy +from oslo_utils import uuidutils + +from neutron import policy +from neutron.tests.unit.conf.policies import base + + +class QosPolicyAPITestCase(base.PolicyBaseTestCase): + + def setUp(self): + super(QosPolicyAPITestCase, self).setUp() + self.target = {'project_id': self.project_id} + self.alt_target = {'project_id': self.alt_project_id} + + +class SystemAdminQosPolicyTests(QosPolicyAPITestCase): + + def setUp(self): + super(SystemAdminQosPolicyTests, self).setUp() + self.context = self.system_admin_ctx + + def test_get_policy(self): + self.assertTrue( + policy.enforce(self.context, 'get_policy', self.target)) + self.assertTrue( + policy.enforce(self.context, 'get_policy', self.alt_target)) + + def test_create_policy(self): + self.assertTrue( + policy.enforce(self.context, 'create_policy', self.target)) + self.assertTrue( + policy.enforce(self.context, 'create_policy', self.alt_target)) + + def test_update_policy(self): + self.assertTrue( + policy.enforce(self.context, 'update_policy', self.target)) + self.assertTrue( + policy.enforce(self.context, 'update_policy', self.alt_target)) + + def test_delete_policy(self): + self.assertTrue( + policy.enforce(self.context, 'delete_policy', self.target)) + self.assertTrue( + policy.enforce(self.context, 'delete_policy', self.alt_target)) + + +class SystemMemberQosPolicyTests(SystemAdminQosPolicyTests): + + def setUp(self): + super(SystemMemberQosPolicyTests, self).setUp() + self.context = self.system_member_ctx + + def test_create_policy(self): + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, self.context, 'create_policy', self.target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, self.context, 'create_policy', self.alt_target) + + def test_update_policy(self): + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, self.context, 'update_policy', self.target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, self.context, 'update_policy', self.alt_target) + + def test_delete_policy(self): + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, self.context, 'delete_policy', self.target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, self.context, 'delete_policy', self.alt_target) + + +class SystemReaderQosPolicyTests(SystemMemberQosPolicyTests): + + def setUp(self): + super(SystemReaderQosPolicyTests, self).setUp() + self.context = self.system_reader_ctx + + +class ProjectAdminQosPolicyTests(QosPolicyAPITestCase): + + def setUp(self): + super(ProjectAdminQosPolicyTests, self).setUp() + self.context = self.project_admin_ctx + + def test_get_policy(self): + self.assertTrue( + policy.enforce(self.context, 'get_policy', self.target)) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, self.context, 'get_policy', self.alt_target) + + def test_create_policy(self): + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, self.context, 'create_policy', self.target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, self.context, 'create_policy', self.alt_target) + + def test_update_policy(self): + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, self.context, 'update_policy', self.target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, self.context, 'update_policy', self.alt_target) + + def test_delete_policy(self): + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, self.context, 'delete_policy', self.target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, self.context, 'delete_policy', self.alt_target) + + +class ProjectMemberQosPolicyTests(ProjectAdminQosPolicyTests): + + def setUp(self): + super(ProjectMemberQosPolicyTests, self).setUp() + self.context = self.project_member_ctx + + +class ProjectReaderQosPolicyTests(ProjectMemberQosPolicyTests): + + def setUp(self): + super(ProjectReaderQosPolicyTests, self).setUp() + self.context = self.project_reader_ctx + + +class QosRuleTypeAPITestCase(base.PolicyBaseTestCase): + + def setUp(self): + super(QosRuleTypeAPITestCase, self).setUp() + self.target = {} + + +class SystemAdminQosRuleTypeTests(QosRuleTypeAPITestCase): + + def setUp(self): + super(SystemAdminQosRuleTypeTests, self).setUp() + self.context = self.system_admin_ctx + + def test_get_rule_type(self): + self.assertTrue( + policy.enforce(self.context, 'get_rule_type', self.target)) + + +class SystemMemberQosRuleTypeTests(SystemAdminQosRuleTypeTests): + + def setUp(self): + super(SystemMemberQosRuleTypeTests, self).setUp() + self.context = self.system_member_ctx + + +class SystemReaderQosRuleTypeTests(SystemMemberQosRuleTypeTests): + + def setUp(self): + super(SystemReaderQosRuleTypeTests, self).setUp() + self.context = self.system_reader_ctx + + +class ProjectAdminQosRuleTypeTests(QosRuleTypeAPITestCase): + + def setUp(self): + super(ProjectAdminQosRuleTypeTests, self).setUp() + self.context = self.project_admin_ctx + + def test_get_rule_type(self): + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, self.context, 'get_rule_type', self.target) + + +class ProjectMemberQosRuleTypeTests(ProjectAdminQosRuleTypeTests): + + def setUp(self): + super(ProjectMemberQosRuleTypeTests, self).setUp() + self.context = self.project_member_ctx + + +class ProjectReaderQosRuleTypeTests(ProjectMemberQosRuleTypeTests): + + def setUp(self): + super(ProjectReaderQosRuleTypeTests, self).setUp() + self.context = self.project_reader_ctx + + +class QosRulesAPITestCase(base.PolicyBaseTestCase): + + def setUp(self): + super(QosRulesAPITestCase, self).setUp() + self.qos_policy = { + 'id': uuidutils.generate_uuid(), + 'project_id': self.project_id} + self.target = { + 'project_id': self.project_id, + 'policy_id': self.qos_policy['id'], + 'ext_parent_policy_id': self.qos_policy['id']} + self.alt_target = { + 'project_id': self.alt_project_id, + 'policy_id': self.qos_policy['id'], + 'ext_parent_policy_id': self.qos_policy['id']} + + self.plugin_mock = mock.Mock() + self.plugin_mock.get_qos_policy.return_value = self.qos_policy + mock.patch( + 'neutron_lib.plugins.directory.get_plugin', + return_value=self.plugin_mock).start() + + +class SystemAdminQosBandwidthLimitRuleTests(QosRulesAPITestCase): + + def setUp(self): + super(SystemAdminQosBandwidthLimitRuleTests, self).setUp() + self.context = self.system_admin_ctx + + def test_get_policy_bandwidth_limit_rule(self): + self.assertTrue( + policy.enforce(self.context, + 'get_policy_bandwidth_limit_rule', + self.target)) + self.assertTrue( + policy.enforce(self.context, + 'get_policy_bandwidth_limit_rule', + self.alt_target)) + + # And the same for aliases + self.assertTrue( + policy.enforce(self.context, + 'get_alias_bandwidth_limit_rule', + self.target)) + self.assertTrue( + policy.enforce(self.context, + 'get_alias_bandwidth_limit_rule', + self.alt_target)) + + def test_create_policy_bandwidth_limit_rule(self): + self.assertTrue( + policy.enforce(self.context, + 'create_policy_bandwidth_limit_rule', + self.target)) + self.assertTrue( + policy.enforce(self.context, + 'create_policy_bandwidth_limit_rule', + self.alt_target)) + + def test_update_policy_bandwidth_limit_rule(self): + self.assertTrue( + policy.enforce(self.context, + 'update_policy_bandwidth_limit_rule', + self.target)) + self.assertTrue( + policy.enforce(self.context, + 'update_policy_bandwidth_limit_rule', + self.alt_target)) + + # And the same for aliases + self.assertTrue( + policy.enforce(self.context, + 'update_alias_bandwidth_limit_rule', + self.target)) + self.assertTrue( + policy.enforce(self.context, + 'update_alias_bandwidth_limit_rule', + self.alt_target)) + + def test_delete_policy_bandwidth_limit_rule(self): + self.assertTrue( + policy.enforce(self.context, + 'delete_policy_bandwidth_limit_rule', + self.target)) + self.assertTrue( + policy.enforce(self.context, + 'delete_policy_bandwidth_limit_rule', + self.alt_target)) + + # And the same for aliases + self.assertTrue( + policy.enforce(self.context, + 'delete_alias_bandwidth_limit_rule', + self.target)) + self.assertTrue( + policy.enforce(self.context, + 'delete_alias_bandwidth_limit_rule', + self.alt_target)) + + +class SystemMemberQosBandwidthLimitRuleTests( + SystemAdminQosBandwidthLimitRuleTests): + + def setUp(self): + super(SystemMemberQosBandwidthLimitRuleTests, self).setUp() + self.context = self.system_member_ctx + + def test_create_policy_bandwidth_limit_rule(self): + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'create_policy_bandwidth_limit_rule', + self.target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'create_policy_bandwidth_limit_rule', + self.alt_target) + + def test_update_policy_bandwidth_limit_rule(self): + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'update_policy_bandwidth_limit_rule', + self.target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'update_policy_bandwidth_limit_rule', + self.alt_target) + + # And the same for aliases + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'update_alias_bandwidth_limit_rule', + self.target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'update_alias_bandwidth_limit_rule', + self.alt_target) + + def test_delete_policy_bandwidth_limit_rule(self): + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'delete_policy_bandwidth_limit_rule', + self.target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'delete_policy_bandwidth_limit_rule', + self.alt_target) + + # And the same for aliases + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'delete_alias_bandwidth_limit_rule', + self.target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'delete_alias_bandwidth_limit_rule', + self.alt_target) + + +class SystemReaderQosBandwidthLimitRuleTests( + SystemMemberQosBandwidthLimitRuleTests): + + def setUp(self): + super(SystemReaderQosBandwidthLimitRuleTests, self).setUp() + self.context = self.system_reader_ctx + + +class ProjectAdminQosBandwidthLimitRuleTests(QosRulesAPITestCase): + + def setUp(self): + super(ProjectAdminQosBandwidthLimitRuleTests, self).setUp() + self.context = self.project_admin_ctx + + def test_get_policy_bandwidth_limit_rule(self): + self.assertTrue( + policy.enforce(self.context, + 'get_policy_bandwidth_limit_rule', + self.target)) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'get_policy_bandwidth_limit_rule', + self.alt_target) + + # And the same for aliases + self.assertTrue( + policy.enforce(self.context, + 'get_alias_bandwidth_limit_rule', + self.target)) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'get_alias_bandwidth_limit_rule', + self.alt_target) + + def test_create_policy_bandwidth_limit_rule(self): + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'create_policy_bandwidth_limit_rule', + self.target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'create_policy_bandwidth_limit_rule', + self.alt_target) + + def test_update_policy_bandwidth_limit_rule(self): + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'update_policy_bandwidth_limit_rule', + self.target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'update_policy_bandwidth_limit_rule', + self.alt_target) + + # And the same for aliases + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'update_alias_bandwidth_limit_rule', + self.target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'update_alias_bandwidth_limit_rule', + self.alt_target) + + def test_delete_policy_bandwidth_limit_rule(self): + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'delete_policy_bandwidth_limit_rule', + self.target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'delete_policy_bandwidth_limit_rule', + self.alt_target) + + # And the same for aliases + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'delete_alias_bandwidth_limit_rule', + self.target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'delete_alias_bandwidth_limit_rule', + self.alt_target) + + +class ProjectMemberQosBandwidthLimitRuleTests( + ProjectAdminQosBandwidthLimitRuleTests): + + def setUp(self): + super(ProjectMemberQosBandwidthLimitRuleTests, self).setUp() + self.context = self.project_member_ctx + + +class ProjectReaderQosBandwidthLimitRuleTests( + ProjectMemberQosBandwidthLimitRuleTests): + + def setUp(self): + super(ProjectReaderQosBandwidthLimitRuleTests, self).setUp() + self.context = self.project_reader_ctx + + +class SystemAdminQosDSCPMarkingRuleTests(QosRulesAPITestCase): + + def setUp(self): + super(SystemAdminQosDSCPMarkingRuleTests, self).setUp() + self.context = self.system_admin_ctx + + def test_get_policy_dscp_marking_rule(self): + self.assertTrue( + policy.enforce(self.context, + 'get_policy_dscp_marking_rule', + self.target)) + self.assertTrue( + policy.enforce(self.context, + 'get_policy_dscp_marking_rule', + self.alt_target)) + + # And the same for aliases + self.assertTrue( + policy.enforce(self.context, + 'get_alias_dscp_marking_rule', + self.target)) + self.assertTrue( + policy.enforce(self.context, + 'get_alias_dscp_marking_rule', + self.alt_target)) + + def test_create_policy_dscp_marking_rule(self): + self.assertTrue( + policy.enforce(self.context, + 'create_policy_dscp_marking_rule', + self.target)) + self.assertTrue( + policy.enforce(self.context, + 'create_policy_dscp_marking_rule', + self.alt_target)) + + def test_update_policy_dscp_marking_rule(self): + self.assertTrue( + policy.enforce(self.context, + 'update_policy_dscp_marking_rule', + self.target)) + self.assertTrue( + policy.enforce(self.context, + 'update_policy_dscp_marking_rule', + self.alt_target)) + + # And the same for aliases + self.assertTrue( + policy.enforce(self.context, + 'update_alias_dscp_marking_rule', + self.target)) + self.assertTrue( + policy.enforce(self.context, + 'update_alias_dscp_marking_rule', + self.alt_target)) + + def test_delete_policy_dscp_marking_rule(self): + self.assertTrue( + policy.enforce(self.context, + 'delete_policy_dscp_marking_rule', + self.target)) + self.assertTrue( + policy.enforce(self.context, + 'delete_policy_dscp_marking_rule', + self.alt_target)) + + # And the same for aliases + self.assertTrue( + policy.enforce(self.context, + 'delete_alias_dscp_marking_rule', + self.target)) + self.assertTrue( + policy.enforce(self.context, + 'delete_alias_dscp_marking_rule', + self.alt_target)) + + +class SystemMemberQosDSCPMarkingRuleTests(SystemAdminQosDSCPMarkingRuleTests): + + def setUp(self): + super(SystemMemberQosDSCPMarkingRuleTests, self).setUp() + self.context = self.system_member_ctx + + def test_create_policy_dscp_marking_rule(self): + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'create_policy_dscp_marking_rule', + self.target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'create_policy_dscp_marking_rule', + self.alt_target) + + def test_update_policy_dscp_marking_rule(self): + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'update_policy_dscp_marking_rule', + self.target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'update_policy_dscp_marking_rule', + self.alt_target) + + # And the same for aliases + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'update_alias_dscp_marking_rule', + self.target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'update_alias_dscp_marking_rule', + self.alt_target) + + def test_delete_policy_dscp_marking_rule(self): + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'delete_policy_dscp_marking_rule', + self.target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'delete_policy_dscp_marking_rule', + self.alt_target) + + # And the same for aliases + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'delete_alias_dscp_marking_rule', + self.target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'delete_alias_dscp_marking_rule', + self.alt_target) + + +class SystemReaderQosDSCPMarkingRuleTests(SystemMemberQosDSCPMarkingRuleTests): + + def setUp(self): + super(SystemReaderQosDSCPMarkingRuleTests, self).setUp() + self.context = self.system_reader_ctx + + +class ProjectAdminQosDSCPMarkingRuleTests(QosRulesAPITestCase): + + def setUp(self): + super(ProjectAdminQosDSCPMarkingRuleTests, self).setUp() + self.context = self.project_admin_ctx + + def test_get_policy_dscp_marking_rule(self): + self.assertTrue( + policy.enforce(self.context, + 'get_policy_dscp_marking_rule', + self.target)) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'get_policy_dscp_marking_rule', + self.alt_target) + + # And the same for aliases + self.assertTrue( + policy.enforce(self.context, + 'get_alias_dscp_marking_rule', + self.target)) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'get_alias_dscp_marking_rule', + self.alt_target) + + def test_create_policy_dscp_marking_rule(self): + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'create_policy_dscp_marking_rule', + self.target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'create_policy_dscp_marking_rule', + self.alt_target) + + def test_update_policy_dscp_marking_rule(self): + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'update_policy_dscp_marking_rule', + self.target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'update_policy_dscp_marking_rule', + self.alt_target) + + # And the same for aliases + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'update_alias_dscp_marking_rule', + self.target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'update_alias_dscp_marking_rule', + self.alt_target) + + def test_delete_policy_dscp_marking_rule(self): + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'delete_policy_dscp_marking_rule', + self.target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'delete_policy_dscp_marking_rule', + self.alt_target) + + # And the same for aliases + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'delete_alias_dscp_marking_rule', + self.target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'delete_alias_dscp_marking_rule', + self.alt_target) + + +class ProjectMemberQosDSCPMarkingRuleTests( + ProjectAdminQosDSCPMarkingRuleTests): + + def setUp(self): + super(ProjectMemberQosDSCPMarkingRuleTests, self).setUp() + self.context = self.project_member_ctx + + +class ProjectReaderQosDSCPMarkingRuleTests( + ProjectMemberQosDSCPMarkingRuleTests): + + def setUp(self): + super(ProjectReaderQosDSCPMarkingRuleTests, self).setUp() + self.context = self.project_reader_ctx + + +class SystemAdminQosMinimumBandwidthRuleTests(QosRulesAPITestCase): + + def setUp(self): + super(SystemAdminQosMinimumBandwidthRuleTests, self).setUp() + self.context = self.system_admin_ctx + + def test_get_policy_minimum_bandwidth_rule(self): + self.assertTrue( + policy.enforce(self.context, + 'get_policy_minimum_bandwidth_rule', + self.target)) + self.assertTrue( + policy.enforce(self.context, + 'get_policy_minimum_bandwidth_rule', + self.alt_target)) + + # And the same for aliases + self.assertTrue( + policy.enforce(self.context, + 'get_alias_minimum_bandwidth_rule', + self.target)) + self.assertTrue( + policy.enforce(self.context, + 'get_alias_minimum_bandwidth_rule', + self.alt_target)) + + def test_create_policy_minimum_bandwidth_rule(self): + self.assertTrue( + policy.enforce(self.context, + 'create_policy_minimum_bandwidth_rule', + self.target)) + self.assertTrue( + policy.enforce(self.context, + 'create_policy_minimum_bandwidth_rule', + self.alt_target)) + + def test_update_policy_minimum_bandwidth_rule(self): + self.assertTrue( + policy.enforce(self.context, + 'update_policy_minimum_bandwidth_rule', + self.target)) + self.assertTrue( + policy.enforce(self.context, + 'update_policy_minimum_bandwidth_rule', + self.alt_target)) + + # And the same for aliases + self.assertTrue( + policy.enforce(self.context, + 'update_alias_minimum_bandwidth_rule', + self.target)) + self.assertTrue( + policy.enforce(self.context, + 'update_alias_minimum_bandwidth_rule', + self.alt_target)) + + def test_delete_policy_minimum_bandwidth_rule(self): + self.assertTrue( + policy.enforce(self.context, + 'delete_policy_minimum_bandwidth_rule', + self.target)) + self.assertTrue( + policy.enforce(self.context, + 'delete_policy_minimum_bandwidth_rule', + self.alt_target)) + + # And the same for aliases + self.assertTrue( + policy.enforce(self.context, + 'delete_alias_minimum_bandwidth_rule', + self.target)) + self.assertTrue( + policy.enforce(self.context, + 'delete_alias_minimum_bandwidth_rule', + self.alt_target)) + + +class SystemMemberQosMinimumBandwidthRuleTests( + SystemAdminQosMinimumBandwidthRuleTests): + + def setUp(self): + super(SystemMemberQosMinimumBandwidthRuleTests, self).setUp() + self.context = self.system_member_ctx + + def test_create_policy_minimum_bandwidth_rule(self): + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'create_policy_minimum_bandwidth_rule', + self.target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'create_policy_minimum_bandwidth_rule', + self.alt_target) + + def test_update_policy_minimum_bandwidth_rule(self): + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'update_policy_minimum_bandwidth_rule', + self.target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'update_policy_minimum_bandwidth_rule', + self.alt_target) + + # And the same for aliases + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'update_alias_minimum_bandwidth_rule', + self.target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'update_alias_minimum_bandwidth_rule', + self.alt_target) + + def test_delete_policy_minimum_bandwidth_rule(self): + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'delete_policy_minimum_bandwidth_rule', + self.target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'delete_policy_minimum_bandwidth_rule', + self.alt_target) + + # And the same for aliases + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'delete_alias_minimum_bandwidth_rule', + self.target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'delete_alias_minimum_bandwidth_rule', + self.alt_target) + + +class SystemReaderQosMinimumBandwidthRuleTests( + SystemMemberQosMinimumBandwidthRuleTests): + + def setUp(self): + super(SystemReaderQosMinimumBandwidthRuleTests, self).setUp() + self.context = self.system_reader_ctx + + +class ProjectAdminQosMinimumBandwidthRuleTests(QosRulesAPITestCase): + + def setUp(self): + super(ProjectAdminQosMinimumBandwidthRuleTests, self).setUp() + self.context = self.project_admin_ctx + + def test_get_policy_minimum_bandwidth_rule(self): + self.assertTrue( + policy.enforce(self.context, + 'get_policy_minimum_bandwidth_rule', + self.target)) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'get_policy_minimum_bandwidth_rule', + self.alt_target) + + # And the same for aliases + self.assertTrue( + policy.enforce(self.context, + 'get_alias_minimum_bandwidth_rule', + self.target)) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'get_alias_minimum_bandwidth_rule', + self.alt_target) + + def test_create_policy_minimum_bandwidth_rule(self): + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'create_policy_minimum_bandwidth_rule', + self.target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'create_policy_minimum_bandwidth_rule', + self.alt_target) + + def test_update_policy_minimum_bandwidth_rule(self): + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'update_policy_minimum_bandwidth_rule', + self.target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'update_policy_minimum_bandwidth_rule', + self.alt_target) + + # And the same for aliases + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'update_alias_minimum_bandwidth_rule', + self.target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'update_alias_minimum_bandwidth_rule', + self.alt_target) + + def test_delete_policy_minimum_bandwidth_rule(self): + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'delete_policy_minimum_bandwidth_rule', + self.target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'delete_policy_minimum_bandwidth_rule', + self.alt_target) + + # And the same for aliases + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'delete_alias_minimum_bandwidth_rule', + self.target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'delete_alias_minimum_bandwidth_rule', + self.alt_target) + + +class ProjectMemberQosMinimumBandwidthRuleTests( + ProjectAdminQosMinimumBandwidthRuleTests): + + def setUp(self): + super(ProjectMemberQosMinimumBandwidthRuleTests, self).setUp() + self.context = self.project_member_ctx + + +class ProjectReaderQosMinimumBandwidthRuleTests( + ProjectMemberQosMinimumBandwidthRuleTests): + + def setUp(self): + super(ProjectReaderQosMinimumBandwidthRuleTests, self).setUp() + self.context = self.project_reader_ctx