1174 lines
40 KiB
Python
1174 lines
40 KiB
Python
# Copyright (c) 2021 Red Hat Inc.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
|
|
# implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
|
|
from unittest import mock
|
|
|
|
from oslo_policy import policy as base_policy
|
|
from oslo_utils import uuidutils
|
|
|
|
from neutron import policy
|
|
from neutron.tests.unit.conf.policies import base
|
|
|
|
|
|
class QosPolicyAPITestCase(base.PolicyBaseTestCase):
|
|
|
|
def setUp(self):
|
|
super(QosPolicyAPITestCase, self).setUp()
|
|
self.target = {'project_id': self.project_id}
|
|
self.alt_target = {'project_id': self.alt_project_id}
|
|
|
|
|
|
class SystemAdminQosPolicyTests(QosPolicyAPITestCase):
|
|
|
|
def setUp(self):
|
|
super(SystemAdminQosPolicyTests, self).setUp()
|
|
self.context = self.system_admin_ctx
|
|
|
|
def test_get_policy(self):
|
|
self.assertTrue(
|
|
policy.enforce(self.context, 'get_policy', self.target))
|
|
self.assertTrue(
|
|
policy.enforce(self.context, 'get_policy', self.alt_target))
|
|
|
|
def test_create_policy(self):
|
|
self.assertTrue(
|
|
policy.enforce(self.context, 'create_policy', self.target))
|
|
self.assertTrue(
|
|
policy.enforce(self.context, 'create_policy', self.alt_target))
|
|
|
|
def test_update_policy(self):
|
|
self.assertTrue(
|
|
policy.enforce(self.context, 'update_policy', self.target))
|
|
self.assertTrue(
|
|
policy.enforce(self.context, 'update_policy', self.alt_target))
|
|
|
|
def test_delete_policy(self):
|
|
self.assertTrue(
|
|
policy.enforce(self.context, 'delete_policy', self.target))
|
|
self.assertTrue(
|
|
policy.enforce(self.context, 'delete_policy', self.alt_target))
|
|
|
|
|
|
class SystemMemberQosPolicyTests(SystemAdminQosPolicyTests):
|
|
|
|
def setUp(self):
|
|
super(SystemMemberQosPolicyTests, self).setUp()
|
|
self.context = self.system_member_ctx
|
|
|
|
def test_create_policy(self):
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce, self.context, 'create_policy', self.target)
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce, self.context, 'create_policy', self.alt_target)
|
|
|
|
def test_update_policy(self):
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce, self.context, 'update_policy', self.target)
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce, self.context, 'update_policy', self.alt_target)
|
|
|
|
def test_delete_policy(self):
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce, self.context, 'delete_policy', self.target)
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce, self.context, 'delete_policy', self.alt_target)
|
|
|
|
|
|
class SystemReaderQosPolicyTests(SystemMemberQosPolicyTests):
|
|
|
|
def setUp(self):
|
|
super(SystemReaderQosPolicyTests, self).setUp()
|
|
self.context = self.system_reader_ctx
|
|
|
|
|
|
class ProjectAdminQosPolicyTests(QosPolicyAPITestCase):
|
|
|
|
def setUp(self):
|
|
super(ProjectAdminQosPolicyTests, self).setUp()
|
|
self.context = self.project_admin_ctx
|
|
|
|
def test_get_policy(self):
|
|
self.assertTrue(
|
|
policy.enforce(self.context, 'get_policy', self.target))
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce, self.context, 'get_policy', self.alt_target)
|
|
|
|
def test_create_policy(self):
|
|
self.assertRaises(
|
|
base_policy.InvalidScope,
|
|
policy.enforce, self.context, 'create_policy', self.target)
|
|
self.assertRaises(
|
|
base_policy.InvalidScope,
|
|
policy.enforce, self.context, 'create_policy', self.alt_target)
|
|
|
|
def test_update_policy(self):
|
|
self.assertRaises(
|
|
base_policy.InvalidScope,
|
|
policy.enforce, self.context, 'update_policy', self.target)
|
|
self.assertRaises(
|
|
base_policy.InvalidScope,
|
|
policy.enforce, self.context, 'update_policy', self.alt_target)
|
|
|
|
def test_delete_policy(self):
|
|
self.assertRaises(
|
|
base_policy.InvalidScope,
|
|
policy.enforce, self.context, 'delete_policy', self.target)
|
|
self.assertRaises(
|
|
base_policy.InvalidScope,
|
|
policy.enforce, self.context, 'delete_policy', self.alt_target)
|
|
|
|
|
|
class ProjectMemberQosPolicyTests(ProjectAdminQosPolicyTests):
|
|
|
|
def setUp(self):
|
|
super(ProjectMemberQosPolicyTests, self).setUp()
|
|
self.context = self.project_member_ctx
|
|
|
|
|
|
class ProjectReaderQosPolicyTests(ProjectMemberQosPolicyTests):
|
|
|
|
def setUp(self):
|
|
super(ProjectReaderQosPolicyTests, self).setUp()
|
|
self.context = self.project_reader_ctx
|
|
|
|
|
|
class QosRuleTypeAPITestCase(base.PolicyBaseTestCase):
|
|
|
|
def setUp(self):
|
|
super(QosRuleTypeAPITestCase, self).setUp()
|
|
self.target = {}
|
|
|
|
|
|
class SystemAdminQosRuleTypeTests(QosRuleTypeAPITestCase):
|
|
|
|
def setUp(self):
|
|
super(SystemAdminQosRuleTypeTests, self).setUp()
|
|
self.context = self.system_admin_ctx
|
|
|
|
def test_get_rule_type(self):
|
|
self.assertTrue(
|
|
policy.enforce(self.context, 'get_rule_type', self.target))
|
|
|
|
|
|
class SystemMemberQosRuleTypeTests(SystemAdminQosRuleTypeTests):
|
|
|
|
def setUp(self):
|
|
super(SystemMemberQosRuleTypeTests, self).setUp()
|
|
self.context = self.system_member_ctx
|
|
|
|
|
|
class SystemReaderQosRuleTypeTests(SystemMemberQosRuleTypeTests):
|
|
|
|
def setUp(self):
|
|
super(SystemReaderQosRuleTypeTests, self).setUp()
|
|
self.context = self.system_reader_ctx
|
|
|
|
|
|
class ProjectAdminQosRuleTypeTests(QosRuleTypeAPITestCase):
|
|
|
|
def setUp(self):
|
|
super(ProjectAdminQosRuleTypeTests, self).setUp()
|
|
self.context = self.project_admin_ctx
|
|
|
|
def test_get_rule_type(self):
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce, self.context, 'get_rule_type', self.target)
|
|
|
|
|
|
class ProjectMemberQosRuleTypeTests(ProjectAdminQosRuleTypeTests):
|
|
|
|
def setUp(self):
|
|
super(ProjectMemberQosRuleTypeTests, self).setUp()
|
|
self.context = self.project_member_ctx
|
|
|
|
|
|
class ProjectReaderQosRuleTypeTests(ProjectMemberQosRuleTypeTests):
|
|
|
|
def setUp(self):
|
|
super(ProjectReaderQosRuleTypeTests, self).setUp()
|
|
self.context = self.project_reader_ctx
|
|
|
|
|
|
class QosRulesAPITestCase(base.PolicyBaseTestCase):
|
|
|
|
def setUp(self):
|
|
super(QosRulesAPITestCase, self).setUp()
|
|
self.qos_policy = {
|
|
'id': uuidutils.generate_uuid(),
|
|
'project_id': self.project_id}
|
|
self.target = {
|
|
'project_id': self.project_id,
|
|
'policy_id': self.qos_policy['id'],
|
|
'ext_parent_policy_id': self.qos_policy['id']}
|
|
self.alt_target = {
|
|
'project_id': self.alt_project_id,
|
|
'policy_id': self.qos_policy['id'],
|
|
'ext_parent_policy_id': self.qos_policy['id']}
|
|
|
|
self.plugin_mock = mock.Mock()
|
|
self.plugin_mock.get_qos_policy.return_value = self.qos_policy
|
|
mock.patch(
|
|
'neutron_lib.plugins.directory.get_plugin',
|
|
return_value=self.plugin_mock).start()
|
|
|
|
|
|
class SystemAdminQosBandwidthLimitRuleTests(QosRulesAPITestCase):
|
|
|
|
def setUp(self):
|
|
super(SystemAdminQosBandwidthLimitRuleTests, self).setUp()
|
|
self.context = self.system_admin_ctx
|
|
|
|
def test_get_policy_bandwidth_limit_rule(self):
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'get_policy_bandwidth_limit_rule',
|
|
self.target))
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'get_policy_bandwidth_limit_rule',
|
|
self.alt_target))
|
|
|
|
# And the same for aliases
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'get_alias_bandwidth_limit_rule',
|
|
self.target))
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'get_alias_bandwidth_limit_rule',
|
|
self.alt_target))
|
|
|
|
def test_create_policy_bandwidth_limit_rule(self):
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'create_policy_bandwidth_limit_rule',
|
|
self.target))
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'create_policy_bandwidth_limit_rule',
|
|
self.alt_target))
|
|
|
|
def test_update_policy_bandwidth_limit_rule(self):
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'update_policy_bandwidth_limit_rule',
|
|
self.target))
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'update_policy_bandwidth_limit_rule',
|
|
self.alt_target))
|
|
|
|
# And the same for aliases
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'update_alias_bandwidth_limit_rule',
|
|
self.target))
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'update_alias_bandwidth_limit_rule',
|
|
self.alt_target))
|
|
|
|
def test_delete_policy_bandwidth_limit_rule(self):
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'delete_policy_bandwidth_limit_rule',
|
|
self.target))
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'delete_policy_bandwidth_limit_rule',
|
|
self.alt_target))
|
|
|
|
# And the same for aliases
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'delete_alias_bandwidth_limit_rule',
|
|
self.target))
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'delete_alias_bandwidth_limit_rule',
|
|
self.alt_target))
|
|
|
|
|
|
class SystemMemberQosBandwidthLimitRuleTests(
|
|
SystemAdminQosBandwidthLimitRuleTests):
|
|
|
|
def setUp(self):
|
|
super(SystemMemberQosBandwidthLimitRuleTests, self).setUp()
|
|
self.context = self.system_member_ctx
|
|
|
|
def test_create_policy_bandwidth_limit_rule(self):
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'create_policy_bandwidth_limit_rule',
|
|
self.target)
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'create_policy_bandwidth_limit_rule',
|
|
self.alt_target)
|
|
|
|
def test_update_policy_bandwidth_limit_rule(self):
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'update_policy_bandwidth_limit_rule',
|
|
self.target)
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'update_policy_bandwidth_limit_rule',
|
|
self.alt_target)
|
|
|
|
# And the same for aliases
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'update_alias_bandwidth_limit_rule',
|
|
self.target)
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'update_alias_bandwidth_limit_rule',
|
|
self.alt_target)
|
|
|
|
def test_delete_policy_bandwidth_limit_rule(self):
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'delete_policy_bandwidth_limit_rule',
|
|
self.target)
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'delete_policy_bandwidth_limit_rule',
|
|
self.alt_target)
|
|
|
|
# And the same for aliases
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'delete_alias_bandwidth_limit_rule',
|
|
self.target)
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'delete_alias_bandwidth_limit_rule',
|
|
self.alt_target)
|
|
|
|
|
|
class SystemReaderQosBandwidthLimitRuleTests(
|
|
SystemMemberQosBandwidthLimitRuleTests):
|
|
|
|
def setUp(self):
|
|
super(SystemReaderQosBandwidthLimitRuleTests, self).setUp()
|
|
self.context = self.system_reader_ctx
|
|
|
|
|
|
class ProjectAdminQosBandwidthLimitRuleTests(QosRulesAPITestCase):
|
|
|
|
def setUp(self):
|
|
super(ProjectAdminQosBandwidthLimitRuleTests, self).setUp()
|
|
self.context = self.project_admin_ctx
|
|
|
|
def test_get_policy_bandwidth_limit_rule(self):
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'get_policy_bandwidth_limit_rule',
|
|
self.target))
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'get_policy_bandwidth_limit_rule',
|
|
self.alt_target)
|
|
|
|
# And the same for aliases
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'get_alias_bandwidth_limit_rule',
|
|
self.target))
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'get_alias_bandwidth_limit_rule',
|
|
self.alt_target)
|
|
|
|
def test_create_policy_bandwidth_limit_rule(self):
|
|
self.assertRaises(
|
|
base_policy.InvalidScope,
|
|
policy.enforce,
|
|
self.context, 'create_policy_bandwidth_limit_rule',
|
|
self.target)
|
|
self.assertRaises(
|
|
base_policy.InvalidScope,
|
|
policy.enforce,
|
|
self.context, 'create_policy_bandwidth_limit_rule',
|
|
self.alt_target)
|
|
|
|
def test_update_policy_bandwidth_limit_rule(self):
|
|
self.assertRaises(
|
|
base_policy.InvalidScope,
|
|
policy.enforce,
|
|
self.context, 'update_policy_bandwidth_limit_rule',
|
|
self.target)
|
|
self.assertRaises(
|
|
base_policy.InvalidScope,
|
|
policy.enforce,
|
|
self.context, 'update_policy_bandwidth_limit_rule',
|
|
self.alt_target)
|
|
|
|
# And the same for aliases
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'update_alias_bandwidth_limit_rule',
|
|
self.target)
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'update_alias_bandwidth_limit_rule',
|
|
self.alt_target)
|
|
|
|
def test_delete_policy_bandwidth_limit_rule(self):
|
|
self.assertRaises(
|
|
base_policy.InvalidScope,
|
|
policy.enforce,
|
|
self.context, 'delete_policy_bandwidth_limit_rule',
|
|
self.target)
|
|
self.assertRaises(
|
|
base_policy.InvalidScope,
|
|
policy.enforce,
|
|
self.context, 'delete_policy_bandwidth_limit_rule',
|
|
self.alt_target)
|
|
|
|
# And the same for aliases
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'delete_alias_bandwidth_limit_rule',
|
|
self.target)
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'delete_alias_bandwidth_limit_rule',
|
|
self.alt_target)
|
|
|
|
|
|
class ProjectMemberQosBandwidthLimitRuleTests(
|
|
ProjectAdminQosBandwidthLimitRuleTests):
|
|
|
|
def setUp(self):
|
|
super(ProjectMemberQosBandwidthLimitRuleTests, self).setUp()
|
|
self.context = self.project_member_ctx
|
|
|
|
|
|
class ProjectReaderQosBandwidthLimitRuleTests(
|
|
ProjectMemberQosBandwidthLimitRuleTests):
|
|
|
|
def setUp(self):
|
|
super(ProjectReaderQosBandwidthLimitRuleTests, self).setUp()
|
|
self.context = self.project_reader_ctx
|
|
|
|
|
|
class SystemAdminQosDSCPMarkingRuleTests(QosRulesAPITestCase):
|
|
|
|
def setUp(self):
|
|
super(SystemAdminQosDSCPMarkingRuleTests, self).setUp()
|
|
self.context = self.system_admin_ctx
|
|
|
|
def test_get_policy_dscp_marking_rule(self):
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'get_policy_dscp_marking_rule',
|
|
self.target))
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'get_policy_dscp_marking_rule',
|
|
self.alt_target))
|
|
|
|
# And the same for aliases
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'get_alias_dscp_marking_rule',
|
|
self.target))
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'get_alias_dscp_marking_rule',
|
|
self.alt_target))
|
|
|
|
def test_create_policy_dscp_marking_rule(self):
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'create_policy_dscp_marking_rule',
|
|
self.target))
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'create_policy_dscp_marking_rule',
|
|
self.alt_target))
|
|
|
|
def test_update_policy_dscp_marking_rule(self):
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'update_policy_dscp_marking_rule',
|
|
self.target))
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'update_policy_dscp_marking_rule',
|
|
self.alt_target))
|
|
|
|
# And the same for aliases
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'update_alias_dscp_marking_rule',
|
|
self.target))
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'update_alias_dscp_marking_rule',
|
|
self.alt_target))
|
|
|
|
def test_delete_policy_dscp_marking_rule(self):
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'delete_policy_dscp_marking_rule',
|
|
self.target))
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'delete_policy_dscp_marking_rule',
|
|
self.alt_target))
|
|
|
|
# And the same for aliases
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'delete_alias_dscp_marking_rule',
|
|
self.target))
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'delete_alias_dscp_marking_rule',
|
|
self.alt_target))
|
|
|
|
|
|
class SystemMemberQosDSCPMarkingRuleTests(SystemAdminQosDSCPMarkingRuleTests):
|
|
|
|
def setUp(self):
|
|
super(SystemMemberQosDSCPMarkingRuleTests, self).setUp()
|
|
self.context = self.system_member_ctx
|
|
|
|
def test_create_policy_dscp_marking_rule(self):
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'create_policy_dscp_marking_rule',
|
|
self.target)
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'create_policy_dscp_marking_rule',
|
|
self.alt_target)
|
|
|
|
def test_update_policy_dscp_marking_rule(self):
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'update_policy_dscp_marking_rule',
|
|
self.target)
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'update_policy_dscp_marking_rule',
|
|
self.alt_target)
|
|
|
|
# And the same for aliases
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'update_alias_dscp_marking_rule',
|
|
self.target)
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'update_alias_dscp_marking_rule',
|
|
self.alt_target)
|
|
|
|
def test_delete_policy_dscp_marking_rule(self):
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'delete_policy_dscp_marking_rule',
|
|
self.target)
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'delete_policy_dscp_marking_rule',
|
|
self.alt_target)
|
|
|
|
# And the same for aliases
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'delete_alias_dscp_marking_rule',
|
|
self.target)
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'delete_alias_dscp_marking_rule',
|
|
self.alt_target)
|
|
|
|
|
|
class SystemReaderQosDSCPMarkingRuleTests(SystemMemberQosDSCPMarkingRuleTests):
|
|
|
|
def setUp(self):
|
|
super(SystemReaderQosDSCPMarkingRuleTests, self).setUp()
|
|
self.context = self.system_reader_ctx
|
|
|
|
|
|
class ProjectAdminQosDSCPMarkingRuleTests(QosRulesAPITestCase):
|
|
|
|
def setUp(self):
|
|
super(ProjectAdminQosDSCPMarkingRuleTests, self).setUp()
|
|
self.context = self.project_admin_ctx
|
|
|
|
def test_get_policy_dscp_marking_rule(self):
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'get_policy_dscp_marking_rule',
|
|
self.target))
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'get_policy_dscp_marking_rule',
|
|
self.alt_target)
|
|
|
|
# And the same for aliases
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'get_alias_dscp_marking_rule',
|
|
self.target))
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'get_alias_dscp_marking_rule',
|
|
self.alt_target)
|
|
|
|
def test_create_policy_dscp_marking_rule(self):
|
|
self.assertRaises(
|
|
base_policy.InvalidScope,
|
|
policy.enforce,
|
|
self.context, 'create_policy_dscp_marking_rule',
|
|
self.target)
|
|
self.assertRaises(
|
|
base_policy.InvalidScope,
|
|
policy.enforce,
|
|
self.context, 'create_policy_dscp_marking_rule',
|
|
self.alt_target)
|
|
|
|
def test_update_policy_dscp_marking_rule(self):
|
|
self.assertRaises(
|
|
base_policy.InvalidScope,
|
|
policy.enforce,
|
|
self.context, 'update_policy_dscp_marking_rule',
|
|
self.target)
|
|
self.assertRaises(
|
|
base_policy.InvalidScope,
|
|
policy.enforce,
|
|
self.context, 'update_policy_dscp_marking_rule',
|
|
self.alt_target)
|
|
|
|
# And the same for aliases
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'update_alias_dscp_marking_rule',
|
|
self.target)
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'update_alias_dscp_marking_rule',
|
|
self.alt_target)
|
|
|
|
def test_delete_policy_dscp_marking_rule(self):
|
|
self.assertRaises(
|
|
base_policy.InvalidScope,
|
|
policy.enforce,
|
|
self.context, 'delete_policy_dscp_marking_rule',
|
|
self.target)
|
|
self.assertRaises(
|
|
base_policy.InvalidScope,
|
|
policy.enforce,
|
|
self.context, 'delete_policy_dscp_marking_rule',
|
|
self.alt_target)
|
|
|
|
# And the same for aliases
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'delete_alias_dscp_marking_rule',
|
|
self.target)
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'delete_alias_dscp_marking_rule',
|
|
self.alt_target)
|
|
|
|
|
|
class ProjectMemberQosDSCPMarkingRuleTests(
|
|
ProjectAdminQosDSCPMarkingRuleTests):
|
|
|
|
def setUp(self):
|
|
super(ProjectMemberQosDSCPMarkingRuleTests, self).setUp()
|
|
self.context = self.project_member_ctx
|
|
|
|
|
|
class ProjectReaderQosDSCPMarkingRuleTests(
|
|
ProjectMemberQosDSCPMarkingRuleTests):
|
|
|
|
def setUp(self):
|
|
super(ProjectReaderQosDSCPMarkingRuleTests, self).setUp()
|
|
self.context = self.project_reader_ctx
|
|
|
|
|
|
class SystemAdminQosMinimumBandwidthRuleTests(QosRulesAPITestCase):
|
|
|
|
def setUp(self):
|
|
super(SystemAdminQosMinimumBandwidthRuleTests, self).setUp()
|
|
self.context = self.system_admin_ctx
|
|
|
|
def test_get_policy_minimum_bandwidth_rule(self):
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'get_policy_minimum_bandwidth_rule',
|
|
self.target))
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'get_policy_minimum_bandwidth_rule',
|
|
self.alt_target))
|
|
|
|
# And the same for aliases
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'get_alias_minimum_bandwidth_rule',
|
|
self.target))
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'get_alias_minimum_bandwidth_rule',
|
|
self.alt_target))
|
|
|
|
def test_create_policy_minimum_bandwidth_rule(self):
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'create_policy_minimum_bandwidth_rule',
|
|
self.target))
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'create_policy_minimum_bandwidth_rule',
|
|
self.alt_target))
|
|
|
|
def test_update_policy_minimum_bandwidth_rule(self):
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'update_policy_minimum_bandwidth_rule',
|
|
self.target))
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'update_policy_minimum_bandwidth_rule',
|
|
self.alt_target))
|
|
|
|
# And the same for aliases
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'update_alias_minimum_bandwidth_rule',
|
|
self.target))
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'update_alias_minimum_bandwidth_rule',
|
|
self.alt_target))
|
|
|
|
def test_delete_policy_minimum_bandwidth_rule(self):
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'delete_policy_minimum_bandwidth_rule',
|
|
self.target))
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'delete_policy_minimum_bandwidth_rule',
|
|
self.alt_target))
|
|
|
|
# And the same for aliases
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'delete_alias_minimum_bandwidth_rule',
|
|
self.target))
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'delete_alias_minimum_bandwidth_rule',
|
|
self.alt_target))
|
|
|
|
|
|
class SystemMemberQosMinimumBandwidthRuleTests(
|
|
SystemAdminQosMinimumBandwidthRuleTests):
|
|
|
|
def setUp(self):
|
|
super(SystemMemberQosMinimumBandwidthRuleTests, self).setUp()
|
|
self.context = self.system_member_ctx
|
|
|
|
def test_create_policy_minimum_bandwidth_rule(self):
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'create_policy_minimum_bandwidth_rule',
|
|
self.target)
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'create_policy_minimum_bandwidth_rule',
|
|
self.alt_target)
|
|
|
|
def test_update_policy_minimum_bandwidth_rule(self):
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'update_policy_minimum_bandwidth_rule',
|
|
self.target)
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'update_policy_minimum_bandwidth_rule',
|
|
self.alt_target)
|
|
|
|
# And the same for aliases
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'update_alias_minimum_bandwidth_rule',
|
|
self.target)
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'update_alias_minimum_bandwidth_rule',
|
|
self.alt_target)
|
|
|
|
def test_delete_policy_minimum_bandwidth_rule(self):
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'delete_policy_minimum_bandwidth_rule',
|
|
self.target)
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'delete_policy_minimum_bandwidth_rule',
|
|
self.alt_target)
|
|
|
|
# And the same for aliases
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'delete_alias_minimum_bandwidth_rule',
|
|
self.target)
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'delete_alias_minimum_bandwidth_rule',
|
|
self.alt_target)
|
|
|
|
|
|
class SystemReaderQosMinimumBandwidthRuleTests(
|
|
SystemMemberQosMinimumBandwidthRuleTests):
|
|
|
|
def setUp(self):
|
|
super(SystemReaderQosMinimumBandwidthRuleTests, self).setUp()
|
|
self.context = self.system_reader_ctx
|
|
|
|
|
|
class ProjectAdminQosMinimumBandwidthRuleTests(QosRulesAPITestCase):
|
|
|
|
def setUp(self):
|
|
super(ProjectAdminQosMinimumBandwidthRuleTests, self).setUp()
|
|
self.context = self.project_admin_ctx
|
|
|
|
def test_get_policy_minimum_bandwidth_rule(self):
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'get_policy_minimum_bandwidth_rule',
|
|
self.target))
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'get_policy_minimum_bandwidth_rule',
|
|
self.alt_target)
|
|
|
|
# And the same for aliases
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'get_alias_minimum_bandwidth_rule',
|
|
self.target))
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'get_alias_minimum_bandwidth_rule',
|
|
self.alt_target)
|
|
|
|
def test_create_policy_minimum_bandwidth_rule(self):
|
|
self.assertRaises(
|
|
base_policy.InvalidScope,
|
|
policy.enforce,
|
|
self.context, 'create_policy_minimum_bandwidth_rule',
|
|
self.target)
|
|
self.assertRaises(
|
|
base_policy.InvalidScope,
|
|
policy.enforce,
|
|
self.context, 'create_policy_minimum_bandwidth_rule',
|
|
self.alt_target)
|
|
|
|
def test_update_policy_minimum_bandwidth_rule(self):
|
|
self.assertRaises(
|
|
base_policy.InvalidScope,
|
|
policy.enforce,
|
|
self.context, 'update_policy_minimum_bandwidth_rule',
|
|
self.target)
|
|
self.assertRaises(
|
|
base_policy.InvalidScope,
|
|
policy.enforce,
|
|
self.context, 'update_policy_minimum_bandwidth_rule',
|
|
self.alt_target)
|
|
|
|
# And the same for aliases
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'update_alias_minimum_bandwidth_rule',
|
|
self.target)
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'update_alias_minimum_bandwidth_rule',
|
|
self.alt_target)
|
|
|
|
def test_delete_policy_minimum_bandwidth_rule(self):
|
|
self.assertRaises(
|
|
base_policy.InvalidScope,
|
|
policy.enforce,
|
|
self.context, 'delete_policy_minimum_bandwidth_rule',
|
|
self.target)
|
|
self.assertRaises(
|
|
base_policy.InvalidScope,
|
|
policy.enforce,
|
|
self.context, 'delete_policy_minimum_bandwidth_rule',
|
|
self.alt_target)
|
|
|
|
# And the same for aliases
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'delete_alias_minimum_bandwidth_rule',
|
|
self.target)
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'delete_alias_minimum_bandwidth_rule',
|
|
self.alt_target)
|
|
|
|
|
|
class ProjectMemberQosMinimumBandwidthRuleTests(
|
|
ProjectAdminQosMinimumBandwidthRuleTests):
|
|
|
|
def setUp(self):
|
|
super(ProjectMemberQosMinimumBandwidthRuleTests, self).setUp()
|
|
self.context = self.project_member_ctx
|
|
|
|
|
|
class ProjectReaderQosMinimumBandwidthRuleTests(
|
|
ProjectMemberQosMinimumBandwidthRuleTests):
|
|
|
|
def setUp(self):
|
|
super(ProjectReaderQosMinimumBandwidthRuleTests, self).setUp()
|
|
self.context = self.project_reader_ctx
|
|
|
|
|
|
class SystemAdminQosMinimumPacketRateRuleTests(QosRulesAPITestCase):
|
|
|
|
def setUp(self):
|
|
super(SystemAdminQosMinimumPacketRateRuleTests, self).setUp()
|
|
self.context = self.system_admin_ctx
|
|
|
|
def test_get_policy_minimum_packet_rate_rule(self):
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'get_policy_minimum_packet_rate_rule',
|
|
self.target))
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'get_policy_minimum_packet_rate_rule',
|
|
self.alt_target))
|
|
|
|
def test_create_policy_minimum_packet_rate_rule(self):
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'create_policy_minimum_packet_rate_rule',
|
|
self.target))
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'create_policy_minimum_packet_rate_rule',
|
|
self.alt_target))
|
|
|
|
def test_update_policy_minimum_packet_rate_rule(self):
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'update_policy_minimum_packet_rate_rule',
|
|
self.target))
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'update_policy_minimum_packet_rate_rule',
|
|
self.alt_target))
|
|
|
|
def test_delete_policy_minimum_packet_rate_rule(self):
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'delete_policy_minimum_packet_rate_rule',
|
|
self.target))
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'delete_policy_minimum_packet_rate_rule',
|
|
self.alt_target))
|
|
|
|
|
|
class SystemMemberQosMinimumPacketRateRuleTests(
|
|
SystemAdminQosMinimumPacketRateRuleTests):
|
|
|
|
def setUp(self):
|
|
super(SystemMemberQosMinimumPacketRateRuleTests, self).setUp()
|
|
self.context = self.system_member_ctx
|
|
|
|
def test_create_policy_minimum_packet_rate_rule(self):
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'create_policy_minimum_packet_rate_rule',
|
|
self.target)
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'create_policy_minimum_packet_rate_rule',
|
|
self.alt_target)
|
|
|
|
def test_update_policy_minimum_packet_rate_rule(self):
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'update_policy_minimum_packet_rate_rule',
|
|
self.target)
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'update_policy_minimum_packet_rate_rule',
|
|
self.alt_target)
|
|
|
|
def test_delete_policy_minimum_packet_rate_rule(self):
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'delete_policy_minimum_packet_rate_rule',
|
|
self.target)
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'delete_policy_minimum_packet_rate_rule',
|
|
self.alt_target)
|
|
|
|
|
|
class SystemReaderQosMinimumPacketRateRuleTests(
|
|
SystemMemberQosMinimumPacketRateRuleTests):
|
|
|
|
def setUp(self):
|
|
super(SystemReaderQosMinimumPacketRateRuleTests, self).setUp()
|
|
self.context = self.system_reader_ctx
|
|
|
|
|
|
class ProjectAdminQosMinimumPacketRateRuleTests(QosRulesAPITestCase):
|
|
|
|
def setUp(self):
|
|
super(ProjectAdminQosMinimumPacketRateRuleTests, self).setUp()
|
|
self.context = self.project_admin_ctx
|
|
|
|
def test_get_policy_minimum_packet_rate_rule(self):
|
|
self.assertTrue(
|
|
policy.enforce(self.context,
|
|
'get_policy_minimum_packet_rate_rule',
|
|
self.target))
|
|
self.assertRaises(
|
|
base_policy.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context, 'get_policy_minimum_packet_rate_rule',
|
|
self.alt_target)
|
|
|
|
def test_create_policy_minimum_packet_rate_rule(self):
|
|
self.assertRaises(
|
|
base_policy.InvalidScope,
|
|
policy.enforce,
|
|
self.context, 'create_policy_minimum_packet_rate_rule',
|
|
self.target)
|
|
self.assertRaises(
|
|
base_policy.InvalidScope,
|
|
policy.enforce,
|
|
self.context, 'create_policy_minimum_packet_rate_rule',
|
|
self.alt_target)
|
|
|
|
def test_update_policy_minimum_packet_rate_rule(self):
|
|
self.assertRaises(
|
|
base_policy.InvalidScope,
|
|
policy.enforce,
|
|
self.context, 'update_policy_minimum_packet_rate_rule',
|
|
self.target)
|
|
self.assertRaises(
|
|
base_policy.InvalidScope,
|
|
policy.enforce,
|
|
self.context, 'update_policy_minimum_packet_rate_rule',
|
|
self.alt_target)
|
|
|
|
def test_delete_policy_minimum_packet_rate_rule(self):
|
|
self.assertRaises(
|
|
base_policy.InvalidScope,
|
|
policy.enforce,
|
|
self.context, 'delete_policy_minimum_packet_rate_rule',
|
|
self.target)
|
|
self.assertRaises(
|
|
base_policy.InvalidScope,
|
|
policy.enforce,
|
|
self.context, 'delete_policy_minimum_packet_rate_rule',
|
|
self.alt_target)
|
|
|
|
|
|
class ProjectMemberQosMinimumPacketRateRuleTests(
|
|
ProjectAdminQosMinimumPacketRateRuleTests):
|
|
|
|
def setUp(self):
|
|
super(ProjectMemberQosMinimumPacketRateRuleTests, self).setUp()
|
|
self.context = self.project_member_ctx
|
|
|
|
|
|
class ProjectReaderQosMinimumPacketRateRuleTests(
|
|
ProjectMemberQosMinimumPacketRateRuleTests):
|
|
|
|
def setUp(self):
|
|
super(ProjectReaderQosMinimumPacketRateRuleTests, self).setUp()
|
|
self.context = self.project_reader_ctx
|