diff --git a/neutron/tests/unit/conf/policies/test_rbac.py b/neutron/tests/unit/conf/policies/test_rbac.py new file mode 100644 index 00000000000..011b0688372 --- /dev/null +++ b/neutron/tests/unit/conf/policies/test_rbac.py @@ -0,0 +1,268 @@ +# Copyright (c) 2021 Red Hat Inc. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or +# implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +from oslo_policy import policy as base_policy + +from neutron import policy +from neutron.tests.unit.conf.policies import base + + +class RbacAPITestCase(base.PolicyBaseTestCase): + + def setUp(self): + super(RbacAPITestCase, self).setUp() + self.target = { + 'project_id': self.project_id, + 'target_tenant': 'other-project'} + self.alt_target = { + 'project_id': self.alt_project_id, + 'target_tenant': 'other-project'} + self.wildcard_target = { + 'project_id': self.project_id, + 'target_tenant': '*'} + self.wildcard_alt_target = { + 'project_id': self.alt_project_id, + 'target_tenant': '*'} + + +class SystemAdminTests(RbacAPITestCase): + + def setUp(self): + super(SystemAdminTests, self).setUp() + self.context = self.system_admin_ctx + + def test_create_rbac_policy(self): + self.assertTrue( + policy.enforce(self.context, + 'create_rbac_policy', self.wildcard_target)) + self.assertTrue( + policy.enforce(self.context, + 'create_rbac_policy', self.wildcard_alt_target)) + + def test_create_rbac_policy_target_tenant(self): + self.assertTrue( + policy.enforce(self.context, + 'create_rbac_policy:target_tenant', + self.target)) + self.assertTrue( + policy.enforce(self.context, + 'create_rbac_policy:target_tenant', + self.alt_target)) + + def test_update_rbac_policy(self): + self.assertTrue( + policy.enforce(self.context, + 'update_rbac_policy', self.wildcard_target)) + self.assertTrue( + policy.enforce(self.context, + 'update_rbac_policy', self.wildcard_alt_target)) + + def test_update_rbac_policy_target_tenant(self): + self.assertTrue( + policy.enforce(self.context, + 'update_rbac_policy:target_tenant', + self.target)) + self.assertTrue( + policy.enforce(self.context, + 'update_rbac_policy:target_tenant', + self.alt_target)) + + def test_get_rbac_policy(self): + self.assertTrue( + policy.enforce(self.context, 'get_rbac_policy', self.target)) + self.assertTrue( + policy.enforce(self.context, 'get_rbac_policy', self.alt_target)) + + def test_delete_rbac_policy(self): + self.assertTrue( + policy.enforce(self.context, 'delete_rbac_policy', self.target)) + self.assertTrue( + policy.enforce(self.context, + 'delete_rbac_policy', self.alt_target)) + + +class SystemMemberTests(SystemAdminTests): + + def setUp(self): + super(SystemMemberTests, self).setUp() + self.context = self.system_member_ctx + + def test_create_rbac_policy(self): + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'create_rbac_policy', self.target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'create_rbac_policy', self.alt_target) + + def test_create_rbac_policy_target_tenant(self): + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'create_rbac_policy:target_tenant', + self.wildcard_target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'create_rbac_policy:target_tenant', + self.wildcard_alt_target) + + def test_update_rbac_policy(self): + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'update_rbac_policy', self.target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'update_rbac_policy', self.alt_target) + + def test_update_rbac_policy_target_tenant(self): + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'update_rbac_policy:target_tenant', + self.wildcard_target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'update_rbac_policy:target_tenant', + self.wildcard_alt_target) + + def test_delete_rbac_policy(self): + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'delete_rbac_policy', self.target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'delete_rbac_policy', self.alt_target) + + +class SystemReaderTests(SystemMemberTests): + + def setUp(self): + super(SystemReaderTests, self).setUp() + self.context = self.system_reader_ctx + + +class ProjectAdminTests(RbacAPITestCase): + + def setUp(self): + super(ProjectAdminTests, self).setUp() + self.context = self.project_admin_ctx + + def test_create_rbac_policy(self): + self.assertTrue( + policy.enforce(self.context, 'create_rbac_policy', self.target)) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'create_rbac_policy', self.alt_target) + + def test_create_rbac_policy_target_tenant(self): + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'create_rbac_policy:target_tenant', + self.wildcard_target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'create_rbac_policy:target_tenant', + self.wildcard_alt_target) + + def test_update_rbac_policy(self): + self.assertTrue( + policy.enforce(self.context, 'update_rbac_policy', self.target)) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'update_rbac_policy', self.alt_target) + + def test_update_rbac_policy_target_tenant(self): + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'update_rbac_policy:target_tenant', + self.wildcard_target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'update_rbac_policy:target_tenant', + self.wildcard_alt_target) + + def test_get_rbac_policy(self): + self.assertTrue( + policy.enforce(self.context, 'get_rbac_policy', self.target)) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'get_rbac_policy', self.alt_target) + + def test_delete_rbac_policy(self): + self.assertTrue( + policy.enforce(self.context, 'delete_rbac_policy', self.target)) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'delete_rbac_policy', self.alt_target) + + +class ProjectMemberTests(ProjectAdminTests): + + def setUp(self): + super(ProjectMemberTests, self).setUp() + self.context = self.project_member_ctx + + +class ProjectReaderTests(ProjectMemberTests): + + def setUp(self): + super(ProjectReaderTests, self).setUp() + self.context = self.project_reader_ctx + + def test_create_rbac_policy(self): + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'create_rbac_policy', self.target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'create_rbac_policy', self.alt_target) + + def test_update_rbac_policy(self): + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'update_rbac_policy', self.target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'update_rbac_policy', self.alt_target) + + def test_delete_rbac_policy(self): + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'delete_rbac_policy', self.target) + self.assertRaises( + base_policy.PolicyNotAuthorized, + policy.enforce, + self.context, 'delete_rbac_policy', self.alt_target)