Rewrite rbac tests to use Authorizer middleware
This commit is contained in:
@@ -44,7 +44,7 @@ flags.DEFINE_list('allowed_roles',
|
|||||||
# NOTE(vish): a user with one of these roles will be a superuser and
|
# NOTE(vish): a user with one of these roles will be a superuser and
|
||||||
# have access to all api commands
|
# have access to all api commands
|
||||||
flags.DEFINE_list('superuser_roles', ['cloudadmin'],
|
flags.DEFINE_list('superuser_roles', ['cloudadmin'],
|
||||||
'Roles that ignore rbac checking completely')
|
'Roles that ignore authorization checking completely')
|
||||||
|
|
||||||
# NOTE(vish): a user with one of these roles will have it for every
|
# NOTE(vish): a user with one of these roles will have it for every
|
||||||
# project, even if he or she is not a member of the project
|
# project, even if he or she is not a member of the project
|
||||||
@@ -304,7 +304,7 @@ class AuthManager(object):
|
|||||||
return "%s:%s" % (user.access, Project.safe_id(project))
|
return "%s:%s" % (user.access, Project.safe_id(project))
|
||||||
|
|
||||||
def is_superuser(self, user):
|
def is_superuser(self, user):
|
||||||
"""Checks for superuser status, allowing user to bypass rbac
|
"""Checks for superuser status, allowing user to bypass authorization
|
||||||
|
|
||||||
@type user: User or uid
|
@type user: User or uid
|
||||||
@param user: User to check.
|
@param user: User to check.
|
||||||
|
|||||||
@@ -18,12 +18,13 @@
|
|||||||
|
|
||||||
import unittest
|
import unittest
|
||||||
import logging
|
import logging
|
||||||
|
import webob
|
||||||
|
|
||||||
from nova import exception
|
from nova import exception
|
||||||
from nova import flags
|
from nova import flags
|
||||||
from nova import test
|
from nova import test
|
||||||
|
from nova.api import ec2
|
||||||
from nova.auth import manager
|
from nova.auth import manager
|
||||||
from nova.auth import rbac
|
|
||||||
|
|
||||||
|
|
||||||
FLAGS = flags.FLAGS
|
FLAGS = flags.FLAGS
|
||||||
@@ -72,9 +73,14 @@ class AccessTestCase(test.BaseTestCase):
|
|||||||
try:
|
try:
|
||||||
self.project.add_role(self.testsys, 'sysadmin')
|
self.project.add_role(self.testsys, 'sysadmin')
|
||||||
except: pass
|
except: pass
|
||||||
self.context = Context()
|
|
||||||
self.context.project = self.project
|
|
||||||
#user is set in each test
|
#user is set in each test
|
||||||
|
self.mw = ec2.Authorizer(lambda x,y: y('200 OK', []) and '')
|
||||||
|
self.mw.action_roles = {'str': {
|
||||||
|
'_allow_all': ['all'],
|
||||||
|
'_allow_none': [],
|
||||||
|
'_allow_project_manager': ['projectmanager'],
|
||||||
|
'_allow_sys_and_net': ['sysadmin', 'netadmin'],
|
||||||
|
'_allow_sysadmin': ['sysadmin']}}
|
||||||
|
|
||||||
def tearDown(self):
|
def tearDown(self):
|
||||||
um = manager.AuthManager()
|
um = manager.AuthManager()
|
||||||
@@ -87,76 +93,46 @@ class AccessTestCase(test.BaseTestCase):
|
|||||||
um.delete_user('testsys')
|
um.delete_user('testsys')
|
||||||
super(AccessTestCase, self).tearDown()
|
super(AccessTestCase, self).tearDown()
|
||||||
|
|
||||||
|
def response_status(self, user, methodName):
|
||||||
|
context = Context()
|
||||||
|
context.project = self.project
|
||||||
|
context.user = user
|
||||||
|
environ = {'ec2.context' : context,
|
||||||
|
'ec2.controller': 'some string',
|
||||||
|
'ec2.action': methodName}
|
||||||
|
req = webob.Request.blank('/', environ)
|
||||||
|
resp = req.get_response(self.mw)
|
||||||
|
return resp.status_int
|
||||||
|
|
||||||
|
def shouldAllow(self, user, methodName):
|
||||||
|
self.assertEqual(200, self.response_status(user, methodName))
|
||||||
|
|
||||||
|
def shouldDeny(self, user, methodName):
|
||||||
|
self.assertEqual(401, self.response_status(user, methodName))
|
||||||
|
|
||||||
def test_001_allow_all(self):
|
def test_001_allow_all(self):
|
||||||
self.context.user = self.testadmin
|
users = [self.testadmin, self.testpmsys, self.testnet, self.testsys]
|
||||||
self.assertTrue(self._allow_all(self.context))
|
for user in users:
|
||||||
self.context.user = self.testpmsys
|
self.shouldAllow(user, '_allow_all')
|
||||||
self.assertTrue(self._allow_all(self.context))
|
|
||||||
self.context.user = self.testnet
|
|
||||||
self.assertTrue(self._allow_all(self.context))
|
|
||||||
self.context.user = self.testsys
|
|
||||||
self.assertTrue(self._allow_all(self.context))
|
|
||||||
|
|
||||||
def test_002_allow_none(self):
|
def test_002_allow_none(self):
|
||||||
self.context.user = self.testadmin
|
self.shouldAllow(self.testadmin, '_allow_none')
|
||||||
self.assertTrue(self._allow_none(self.context))
|
users = [self.testpmsys, self.testnet, self.testsys]
|
||||||
self.context.user = self.testpmsys
|
for user in users:
|
||||||
self.assertRaises(exception.NotAuthorized, self._allow_none, self.context)
|
self.shouldDeny(user, '_allow_none')
|
||||||
self.context.user = self.testnet
|
|
||||||
self.assertRaises(exception.NotAuthorized, self._allow_none, self.context)
|
|
||||||
self.context.user = self.testsys
|
|
||||||
self.assertRaises(exception.NotAuthorized, self._allow_none, self.context)
|
|
||||||
|
|
||||||
def test_003_allow_project_manager(self):
|
def test_003_allow_project_manager(self):
|
||||||
self.context.user = self.testadmin
|
for user in [self.testadmin, self.testpmsys]:
|
||||||
self.assertTrue(self._allow_project_manager(self.context))
|
self.shouldAllow(user, '_allow_project_manager')
|
||||||
self.context.user = self.testpmsys
|
for user in [self.testnet, self.testsys]:
|
||||||
self.assertTrue(self._allow_project_manager(self.context))
|
self.shouldDeny(user, '_allow_project_manager')
|
||||||
self.context.user = self.testnet
|
|
||||||
self.assertRaises(exception.NotAuthorized, self._allow_project_manager, self.context)
|
|
||||||
self.context.user = self.testsys
|
|
||||||
self.assertRaises(exception.NotAuthorized, self._allow_project_manager, self.context)
|
|
||||||
|
|
||||||
def test_004_allow_sys_and_net(self):
|
def test_004_allow_sys_and_net(self):
|
||||||
self.context.user = self.testadmin
|
for user in [self.testadmin, self.testnet, self.testsys]:
|
||||||
self.assertTrue(self._allow_sys_and_net(self.context))
|
self.shouldAllow(user, '_allow_sys_and_net')
|
||||||
self.context.user = self.testpmsys # doesn't have the per project sysadmin
|
# denied because it doesn't have the per project sysadmin
|
||||||
self.assertRaises(exception.NotAuthorized, self._allow_sys_and_net, self.context)
|
for user in [self.testpmsys]:
|
||||||
self.context.user = self.testnet
|
self.shouldDeny(user, '_allow_sys_and_net')
|
||||||
self.assertTrue(self._allow_sys_and_net(self.context))
|
|
||||||
self.context.user = self.testsys
|
|
||||||
self.assertTrue(self._allow_sys_and_net(self.context))
|
|
||||||
|
|
||||||
def test_005_allow_sys_no_pm(self):
|
|
||||||
self.context.user = self.testadmin
|
|
||||||
self.assertTrue(self._allow_sys_no_pm(self.context))
|
|
||||||
self.context.user = self.testpmsys
|
|
||||||
self.assertRaises(exception.NotAuthorized, self._allow_sys_no_pm, self.context)
|
|
||||||
self.context.user = self.testnet
|
|
||||||
self.assertRaises(exception.NotAuthorized, self._allow_sys_no_pm, self.context)
|
|
||||||
self.context.user = self.testsys
|
|
||||||
self.assertTrue(self._allow_sys_no_pm(self.context))
|
|
||||||
|
|
||||||
@rbac.allow('all')
|
|
||||||
def _allow_all(self, context):
|
|
||||||
return True
|
|
||||||
|
|
||||||
@rbac.allow('none')
|
|
||||||
def _allow_none(self, context):
|
|
||||||
return True
|
|
||||||
|
|
||||||
@rbac.allow('projectmanager')
|
|
||||||
def _allow_project_manager(self, context):
|
|
||||||
return True
|
|
||||||
|
|
||||||
@rbac.allow('sysadmin', 'netadmin')
|
|
||||||
def _allow_sys_and_net(self, context):
|
|
||||||
return True
|
|
||||||
|
|
||||||
@rbac.allow('sysadmin')
|
|
||||||
@rbac.deny('projectmanager')
|
|
||||||
def _allow_sys_no_pm(self, context):
|
|
||||||
return True
|
|
||||||
|
|
||||||
if __name__ == "__main__":
|
if __name__ == "__main__":
|
||||||
# TODO: Implement use_fake as an option
|
# TODO: Implement use_fake as an option
|
||||||
|
|||||||
Reference in New Issue
Block a user