1382a86a43
to keep Python 3.x compatibility, use six.StringIO/BytesIO to replace StringIO.StringIO StringIO works for unicode BytesIO works for bytes Change-Id: I3892098e31d8d6984d58136110aae653dc4047ab Closes-Bug: #1280100
551 lines
23 KiB
Python
551 lines
23 KiB
Python
# Copyright (c) 2012 OpenStack Foundation.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
|
|
# implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
|
|
"""Test of Policy Engine For Neutron"""
|
|
|
|
import json
|
|
import urllib2
|
|
|
|
import fixtures
|
|
import mock
|
|
import six
|
|
|
|
import neutron
|
|
from neutron.api.v2 import attributes
|
|
from neutron.common import exceptions
|
|
from neutron import context
|
|
from neutron import manager
|
|
from neutron.openstack.common import importutils
|
|
from neutron.openstack.common import policy as common_policy
|
|
from neutron import policy
|
|
from neutron.tests import base
|
|
|
|
|
|
class PolicyFileTestCase(base.BaseTestCase):
|
|
def setUp(self):
|
|
super(PolicyFileTestCase, self).setUp()
|
|
policy.reset()
|
|
self.addCleanup(policy.reset)
|
|
self.context = context.Context('fake', 'fake', is_admin=False)
|
|
self.target = {}
|
|
self.tempdir = self.useFixture(fixtures.TempDir())
|
|
|
|
def test_modified_policy_reloads(self):
|
|
def fake_find_config_file(_1, _2):
|
|
return self.tempdir.join('policy')
|
|
|
|
with mock.patch.object(neutron.common.utils,
|
|
'find_config_file',
|
|
new=fake_find_config_file):
|
|
tmpfilename = fake_find_config_file(None, None)
|
|
action = "example:test"
|
|
with open(tmpfilename, "w") as policyfile:
|
|
policyfile.write("""{"example:test": ""}""")
|
|
policy.enforce(self.context, action, self.target)
|
|
with open(tmpfilename, "w") as policyfile:
|
|
policyfile.write("""{"example:test": "!"}""")
|
|
# NOTE(vish): reset stored policy cache so we don't have to
|
|
# sleep(1)
|
|
policy._POLICY_CACHE = {}
|
|
self.assertRaises(exceptions.PolicyNotAuthorized,
|
|
policy.enforce,
|
|
self.context,
|
|
action,
|
|
self.target)
|
|
|
|
|
|
class PolicyTestCase(base.BaseTestCase):
|
|
def setUp(self):
|
|
super(PolicyTestCase, self).setUp()
|
|
policy.reset()
|
|
self.addCleanup(policy.reset)
|
|
# NOTE(vish): preload rules to circumvent reloading from file
|
|
policy.init()
|
|
rules = {
|
|
"true": '@',
|
|
"example:allowed": '@',
|
|
"example:denied": '!',
|
|
"example:get_http": "http:http://www.example.com",
|
|
"example:my_file": "role:compute_admin or tenant_id:%(tenant_id)s",
|
|
"example:early_and_fail": "! and @",
|
|
"example:early_or_success": "@ or !",
|
|
"example:lowercase_admin": "role:admin or role:sysadmin",
|
|
"example:uppercase_admin": "role:ADMIN or role:sysadmin",
|
|
}
|
|
# NOTE(vish): then overload underlying rules
|
|
common_policy.set_rules(common_policy.Rules(
|
|
dict((k, common_policy.parse_rule(v))
|
|
for k, v in rules.items())))
|
|
self.context = context.Context('fake', 'fake', roles=['member'])
|
|
self.target = {}
|
|
|
|
def test_enforce_nonexistent_action_throws(self):
|
|
action = "example:noexist"
|
|
self.assertRaises(exceptions.PolicyNotAuthorized, policy.enforce,
|
|
self.context, action, self.target)
|
|
|
|
def test_enforce_bad_action_throws(self):
|
|
action = "example:denied"
|
|
self.assertRaises(exceptions.PolicyNotAuthorized, policy.enforce,
|
|
self.context, action, self.target)
|
|
|
|
def test_check_bad_action_noraise(self):
|
|
action = "example:denied"
|
|
result = policy.check(self.context, action, self.target)
|
|
self.assertEqual(result, False)
|
|
|
|
def test_check_if_exists_non_existent_action_raises(self):
|
|
action = "example:idonotexist"
|
|
self.assertRaises(exceptions.PolicyRuleNotFound,
|
|
policy.check_if_exists,
|
|
self.context, action, self.target)
|
|
|
|
def test_enforce_good_action(self):
|
|
action = "example:allowed"
|
|
result = policy.enforce(self.context, action, self.target)
|
|
self.assertEqual(result, True)
|
|
|
|
def test_enforce_http_true(self):
|
|
|
|
def fakeurlopen(url, post_data):
|
|
return six.StringIO("True")
|
|
|
|
with mock.patch.object(urllib2, 'urlopen', new=fakeurlopen):
|
|
action = "example:get_http"
|
|
target = {}
|
|
result = policy.enforce(self.context, action, target)
|
|
self.assertEqual(result, True)
|
|
|
|
def test_enforce_http_false(self):
|
|
|
|
def fakeurlopen(url, post_data):
|
|
return six.StringIO("False")
|
|
|
|
with mock.patch.object(urllib2, 'urlopen', new=fakeurlopen):
|
|
action = "example:get_http"
|
|
target = {}
|
|
self.assertRaises(exceptions.PolicyNotAuthorized, policy.enforce,
|
|
self.context, action, target)
|
|
|
|
def test_templatized_enforcement(self):
|
|
target_mine = {'tenant_id': 'fake'}
|
|
target_not_mine = {'tenant_id': 'another'}
|
|
action = "example:my_file"
|
|
policy.enforce(self.context, action, target_mine)
|
|
self.assertRaises(exceptions.PolicyNotAuthorized, policy.enforce,
|
|
self.context, action, target_not_mine)
|
|
|
|
def test_early_AND_enforcement(self):
|
|
action = "example:early_and_fail"
|
|
self.assertRaises(exceptions.PolicyNotAuthorized, policy.enforce,
|
|
self.context, action, self.target)
|
|
|
|
def test_early_OR_enforcement(self):
|
|
action = "example:early_or_success"
|
|
policy.enforce(self.context, action, self.target)
|
|
|
|
def test_ignore_case_role_check(self):
|
|
lowercase_action = "example:lowercase_admin"
|
|
uppercase_action = "example:uppercase_admin"
|
|
# NOTE(dprince) we mix case in the Admin role here to ensure
|
|
# case is ignored
|
|
admin_context = context.Context('admin', 'fake', roles=['AdMiN'])
|
|
policy.enforce(admin_context, lowercase_action, self.target)
|
|
policy.enforce(admin_context, uppercase_action, self.target)
|
|
|
|
|
|
class DefaultPolicyTestCase(base.BaseTestCase):
|
|
|
|
def setUp(self):
|
|
super(DefaultPolicyTestCase, self).setUp()
|
|
policy.reset()
|
|
policy.init()
|
|
self.addCleanup(policy.reset)
|
|
|
|
self.rules = {
|
|
"default": '',
|
|
"example:exist": '!',
|
|
}
|
|
|
|
self._set_rules('default')
|
|
|
|
self.context = context.Context('fake', 'fake')
|
|
|
|
def _set_rules(self, default_rule):
|
|
rules = common_policy.Rules(
|
|
dict((k, common_policy.parse_rule(v))
|
|
for k, v in self.rules.items()), default_rule)
|
|
common_policy.set_rules(rules)
|
|
|
|
def test_policy_called(self):
|
|
self.assertRaises(exceptions.PolicyNotAuthorized, policy.enforce,
|
|
self.context, "example:exist", {})
|
|
|
|
def test_not_found_policy_calls_default(self):
|
|
policy.enforce(self.context, "example:noexist", {})
|
|
|
|
def test_default_not_found(self):
|
|
self._set_rules("default_noexist")
|
|
self.assertRaises(exceptions.PolicyNotAuthorized, policy.enforce,
|
|
self.context, "example:noexist", {})
|
|
|
|
|
|
FAKE_RESOURCE_NAME = 'something'
|
|
FAKE_RESOURCE = {"%ss" % FAKE_RESOURCE_NAME:
|
|
{'attr': {'allow_post': True,
|
|
'allow_put': True,
|
|
'is_visible': True,
|
|
'default': None,
|
|
'enforce_policy': True,
|
|
'validate': {'type:dict':
|
|
{'sub_attr_1': {'type:string': None},
|
|
'sub_attr_2': {'type:string': None}}}
|
|
}}}
|
|
|
|
|
|
class NeutronPolicyTestCase(base.BaseTestCase):
|
|
|
|
def setUp(self):
|
|
super(NeutronPolicyTestCase, self).setUp()
|
|
policy.reset()
|
|
policy.init()
|
|
self.addCleanup(policy.reset)
|
|
self.admin_only_legacy = "role:admin"
|
|
self.admin_or_owner_legacy = "role:admin or tenant_id:%(tenant_id)s"
|
|
# Add a Fake 'something' resource to RESOURCE_ATTRIBUTE_MAP
|
|
attributes.RESOURCE_ATTRIBUTE_MAP.update(FAKE_RESOURCE)
|
|
self.rules = dict((k, common_policy.parse_rule(v)) for k, v in {
|
|
"context_is_admin": "role:admin",
|
|
"admin_or_network_owner": "rule:context_is_admin or "
|
|
"tenant_id:%(network:tenant_id)s",
|
|
"admin_or_owner": ("rule:context_is_admin or "
|
|
"tenant_id:%(tenant_id)s"),
|
|
"admin_only": "rule:context_is_admin",
|
|
"regular_user": "role:user",
|
|
"shared": "field:networks:shared=True",
|
|
"external": "field:networks:router:external=True",
|
|
"default": '@',
|
|
|
|
"create_network": "rule:admin_or_owner",
|
|
"create_network:shared": "rule:admin_only",
|
|
"update_network": '@',
|
|
"update_network:shared": "rule:admin_only",
|
|
|
|
"get_network": "rule:admin_or_owner or "
|
|
"rule:shared or "
|
|
"rule:external",
|
|
"create_port:mac": "rule:admin_or_network_owner",
|
|
"create_something": "rule:admin_or_owner",
|
|
"create_something:attr": "rule:admin_or_owner",
|
|
"create_something:attr:sub_attr_1": "rule:admin_or_owner",
|
|
"create_something:attr:sub_attr_2": "rule:admin_only",
|
|
|
|
"get_firewall_policy": "rule:admin_or_owner or "
|
|
"rule:shared",
|
|
"get_firewall_rule": "rule:admin_or_owner or "
|
|
"rule:shared"
|
|
}.items())
|
|
|
|
def fakepolicyinit():
|
|
common_policy.set_rules(common_policy.Rules(self.rules))
|
|
|
|
def remove_fake_resource():
|
|
del attributes.RESOURCE_ATTRIBUTE_MAP["%ss" % FAKE_RESOURCE_NAME]
|
|
|
|
self.patcher = mock.patch.object(neutron.policy,
|
|
'init',
|
|
new=fakepolicyinit)
|
|
self.patcher.start()
|
|
self.addCleanup(self.patcher.stop)
|
|
self.addCleanup(remove_fake_resource)
|
|
self.context = context.Context('fake', 'fake', roles=['user'])
|
|
plugin_klass = importutils.import_class(
|
|
"neutron.db.db_base_plugin_v2.NeutronDbPluginV2")
|
|
self.manager_patcher = mock.patch('neutron.manager.NeutronManager')
|
|
fake_manager = self.manager_patcher.start()
|
|
fake_manager_instance = fake_manager.return_value
|
|
fake_manager_instance.plugin = plugin_klass()
|
|
self.addCleanup(self.manager_patcher.stop)
|
|
|
|
def _test_action_on_attr(self, context, action, attr, value,
|
|
exception=None):
|
|
action = "%s_network" % action
|
|
target = {'tenant_id': 'the_owner', attr: value}
|
|
if exception:
|
|
self.assertRaises(exception, policy.enforce,
|
|
context, action, target)
|
|
else:
|
|
result = policy.enforce(context, action, target)
|
|
self.assertEqual(result, True)
|
|
|
|
def _test_nonadmin_action_on_attr(self, action, attr, value,
|
|
exception=None):
|
|
user_context = context.Context('', "user", roles=['user'])
|
|
self._test_action_on_attr(user_context, action, attr,
|
|
value, exception)
|
|
|
|
def test_nonadmin_write_on_private_fails(self):
|
|
self._test_nonadmin_action_on_attr('create', 'shared', False,
|
|
exceptions.PolicyNotAuthorized)
|
|
|
|
def test_nonadmin_read_on_private_fails(self):
|
|
self._test_nonadmin_action_on_attr('get', 'shared', False,
|
|
exceptions.PolicyNotAuthorized)
|
|
|
|
def test_nonadmin_write_on_shared_fails(self):
|
|
self._test_nonadmin_action_on_attr('create', 'shared', True,
|
|
exceptions.PolicyNotAuthorized)
|
|
|
|
def test_nonadmin_read_on_shared_succeeds(self):
|
|
self._test_nonadmin_action_on_attr('get', 'shared', True)
|
|
|
|
def _test_enforce_adminonly_attribute(self, action):
|
|
admin_context = context.get_admin_context()
|
|
target = {'shared': True}
|
|
result = policy.enforce(admin_context, action, target)
|
|
self.assertEqual(result, True)
|
|
|
|
def test_enforce_adminonly_attribute_create(self):
|
|
self._test_enforce_adminonly_attribute('create_network')
|
|
|
|
def test_enforce_adminonly_attribute_update(self):
|
|
self._test_enforce_adminonly_attribute('update_network')
|
|
|
|
def test_enforce_adminonly_attribute_no_context_is_admin_policy(self):
|
|
del self.rules[policy.ADMIN_CTX_POLICY]
|
|
self.rules['admin_only'] = common_policy.parse_rule(
|
|
self.admin_only_legacy)
|
|
self.rules['admin_or_owner'] = common_policy.parse_rule(
|
|
self.admin_or_owner_legacy)
|
|
self._test_enforce_adminonly_attribute('create_network')
|
|
|
|
def test_enforce_adminonly_attribute_nonadminctx_returns_403(self):
|
|
action = "create_network"
|
|
target = {'shared': True, 'tenant_id': 'somebody_else'}
|
|
self.assertRaises(exceptions.PolicyNotAuthorized, policy.enforce,
|
|
self.context, action, target)
|
|
|
|
def test_enforce_adminonly_nonadminctx_no_ctx_is_admin_policy_403(self):
|
|
del self.rules[policy.ADMIN_CTX_POLICY]
|
|
self.rules['admin_only'] = common_policy.parse_rule(
|
|
self.admin_only_legacy)
|
|
self.rules['admin_or_owner'] = common_policy.parse_rule(
|
|
self.admin_or_owner_legacy)
|
|
action = "create_network"
|
|
target = {'shared': True, 'tenant_id': 'somebody_else'}
|
|
self.assertRaises(exceptions.PolicyNotAuthorized, policy.enforce,
|
|
self.context, action, target)
|
|
|
|
def _test_build_subattribute_match_rule(self, validate_value):
|
|
bk = FAKE_RESOURCE['%ss' % FAKE_RESOURCE_NAME]['attr']['validate']
|
|
FAKE_RESOURCE['%ss' % FAKE_RESOURCE_NAME]['attr']['validate'] = (
|
|
validate_value)
|
|
action = "create_something"
|
|
target = {'tenant_id': 'fake', 'attr': {'sub_attr_1': 'x'}}
|
|
self.assertFalse(policy._build_subattr_match_rule(
|
|
'attr',
|
|
FAKE_RESOURCE['%ss' % FAKE_RESOURCE_NAME]['attr'],
|
|
action,
|
|
target))
|
|
FAKE_RESOURCE['%ss' % FAKE_RESOURCE_NAME]['attr']['validate'] = bk
|
|
|
|
def test_build_subattribute_match_rule_empty_dict_validator(self):
|
|
self._test_build_subattribute_match_rule({})
|
|
|
|
def test_build_subattribute_match_rule_wrong_validation_info(self):
|
|
self._test_build_subattribute_match_rule(
|
|
{'type:dict': 'wrong_stuff'})
|
|
|
|
def test_enforce_subattribute(self):
|
|
action = "create_something"
|
|
target = {'tenant_id': 'fake', 'attr': {'sub_attr_1': 'x'}}
|
|
result = policy.enforce(self.context, action, target, None)
|
|
self.assertEqual(result, True)
|
|
|
|
def test_enforce_admin_only_subattribute(self):
|
|
action = "create_something"
|
|
target = {'tenant_id': 'fake', 'attr': {'sub_attr_1': 'x',
|
|
'sub_attr_2': 'y'}}
|
|
result = policy.enforce(context.get_admin_context(),
|
|
action, target, None)
|
|
self.assertEqual(result, True)
|
|
|
|
def test_enforce_admin_only_subattribute_nonadminctx_returns_403(self):
|
|
action = "create_something"
|
|
target = {'tenant_id': 'fake', 'attr': {'sub_attr_1': 'x',
|
|
'sub_attr_2': 'y'}}
|
|
self.assertRaises(exceptions.PolicyNotAuthorized, policy.enforce,
|
|
self.context, action, target, None)
|
|
|
|
def test_enforce_regularuser_on_read(self):
|
|
action = "get_network"
|
|
target = {'shared': True, 'tenant_id': 'somebody_else'}
|
|
result = policy.enforce(self.context, action, target)
|
|
self.assertTrue(result)
|
|
|
|
def test_enforce_firewall_policy_shared(self):
|
|
action = "get_firewall_policy"
|
|
target = {'shared': True, 'tenant_id': 'somebody_else'}
|
|
result = policy.enforce(self.context, action, target)
|
|
self.assertTrue(result)
|
|
|
|
def test_enforce_firewall_rule_shared(self):
|
|
action = "get_firewall_rule"
|
|
target = {'shared': True, 'tenant_id': 'somebody_else'}
|
|
result = policy.enforce(self.context, action, target)
|
|
self.assertTrue(result)
|
|
|
|
def test_enforce_tenant_id_check(self):
|
|
# Trigger a policy with rule admin_or_owner
|
|
action = "create_network"
|
|
target = {'tenant_id': 'fake'}
|
|
result = policy.enforce(self.context, action, target)
|
|
self.assertTrue(result)
|
|
|
|
def test_enforce_tenant_id_check_parent_resource(self):
|
|
|
|
def fakegetnetwork(*args, **kwargs):
|
|
return {'tenant_id': 'fake'}
|
|
|
|
action = "create_port:mac"
|
|
with mock.patch.object(manager.NeutronManager.get_instance().plugin,
|
|
'get_network', new=fakegetnetwork):
|
|
target = {'network_id': 'whatever'}
|
|
result = policy.enforce(self.context, action, target)
|
|
self.assertTrue(result)
|
|
|
|
def test_enforce_plugin_failure(self):
|
|
|
|
def fakegetnetwork(*args, **kwargs):
|
|
raise NotImplementedError('Blast!')
|
|
|
|
# the policy check and plugin method we use in this test are irrelevant
|
|
# so long that we verify that, if *f* blows up, the behavior of the
|
|
# policy engine to propagate the exception is preserved
|
|
action = "create_port:mac"
|
|
with mock.patch.object(manager.NeutronManager.get_instance().plugin,
|
|
'get_network', new=fakegetnetwork):
|
|
target = {'network_id': 'whatever'}
|
|
self.assertRaises(NotImplementedError,
|
|
policy.enforce,
|
|
self.context,
|
|
action,
|
|
target)
|
|
|
|
def test_enforce_tenant_id_check_parent_resource_bw_compatibility(self):
|
|
|
|
def fakegetnetwork(*args, **kwargs):
|
|
return {'tenant_id': 'fake'}
|
|
|
|
del self.rules['admin_or_network_owner']
|
|
self.rules['admin_or_network_owner'] = common_policy.parse_rule(
|
|
"role:admin or tenant_id:%(network_tenant_id)s")
|
|
action = "create_port:mac"
|
|
with mock.patch.object(manager.NeutronManager.get_instance().plugin,
|
|
'get_network', new=fakegetnetwork):
|
|
target = {'network_id': 'whatever'}
|
|
result = policy.enforce(self.context, action, target)
|
|
self.assertTrue(result)
|
|
|
|
def test_tenant_id_check_no_target_field_raises(self):
|
|
# Try and add a bad rule
|
|
self.assertRaises(
|
|
exceptions.PolicyInitError,
|
|
common_policy.parse_rule,
|
|
'tenant_id:(wrong_stuff)')
|
|
|
|
def _test_enforce_tenant_id_raises(self, bad_rule):
|
|
self.rules['admin_or_owner'] = common_policy.parse_rule(bad_rule)
|
|
# Trigger a policy with rule admin_or_owner
|
|
action = "create_network"
|
|
target = {'tenant_id': 'fake'}
|
|
self.assertRaises(exceptions.PolicyCheckError,
|
|
policy.enforce,
|
|
self.context, action, target)
|
|
|
|
def test_enforce_tenant_id_check_malformed_target_field_raises(self):
|
|
self._test_enforce_tenant_id_raises('tenant_id:%(malformed_field)s')
|
|
|
|
def test_enforce_tenant_id_check_invalid_parent_resource_raises(self):
|
|
self._test_enforce_tenant_id_raises('tenant_id:%(foobaz_tenant_id)s')
|
|
|
|
def test_get_roles_context_is_admin_rule_missing(self):
|
|
rules = dict((k, common_policy.parse_rule(v)) for k, v in {
|
|
"some_other_rule": "role:admin",
|
|
}.items())
|
|
common_policy.set_rules(common_policy.Rules(rules))
|
|
# 'admin' role is expected for bw compatibility
|
|
self.assertEqual(['admin'], policy.get_admin_roles())
|
|
|
|
def test_get_roles_with_role_check(self):
|
|
rules = dict((k, common_policy.parse_rule(v)) for k, v in {
|
|
policy.ADMIN_CTX_POLICY: "role:admin",
|
|
}.items())
|
|
common_policy.set_rules(common_policy.Rules(rules))
|
|
self.assertEqual(['admin'], policy.get_admin_roles())
|
|
|
|
def test_get_roles_with_rule_check(self):
|
|
rules = dict((k, common_policy.parse_rule(v)) for k, v in {
|
|
policy.ADMIN_CTX_POLICY: "rule:some_other_rule",
|
|
"some_other_rule": "role:admin",
|
|
}.items())
|
|
common_policy.set_rules(common_policy.Rules(rules))
|
|
self.assertEqual(['admin'], policy.get_admin_roles())
|
|
|
|
def test_get_roles_with_or_check(self):
|
|
self.rules = dict((k, common_policy.parse_rule(v)) for k, v in {
|
|
policy.ADMIN_CTX_POLICY: "rule:rule1 or rule:rule2",
|
|
"rule1": "role:admin_1",
|
|
"rule2": "role:admin_2"
|
|
}.items())
|
|
self.assertEqual(['admin_1', 'admin_2'],
|
|
policy.get_admin_roles())
|
|
|
|
def test_get_roles_with_other_rules(self):
|
|
self.rules = dict((k, common_policy.parse_rule(v)) for k, v in {
|
|
policy.ADMIN_CTX_POLICY: "role:xxx or other:value",
|
|
}.items())
|
|
self.assertEqual(['xxx'], policy.get_admin_roles())
|
|
|
|
def _test_set_rules_with_deprecated_policy(self, input_rules,
|
|
expected_rules):
|
|
policy._set_rules(json.dumps(input_rules))
|
|
# verify deprecated policy has been removed
|
|
for pol in input_rules.keys():
|
|
self.assertNotIn(pol, common_policy._rules)
|
|
# verify deprecated policy was correctly translated. Iterate
|
|
# over items for compatibility with unittest2 in python 2.6
|
|
for rule in expected_rules:
|
|
self.assertIn(rule, common_policy._rules)
|
|
self.assertEqual(str(common_policy._rules[rule]),
|
|
expected_rules[rule])
|
|
|
|
def test_set_rules_with_deprecated_view_policy(self):
|
|
self._test_set_rules_with_deprecated_policy(
|
|
{'extension:router:view': 'rule:admin_or_owner'},
|
|
{'get_network:router:external': 'rule:admin_or_owner'})
|
|
|
|
def test_set_rules_with_deprecated_set_policy(self):
|
|
expected_policies = ['create_network:provider:network_type',
|
|
'create_network:provider:physical_network',
|
|
'create_network:provider:segmentation_id',
|
|
'update_network:provider:network_type',
|
|
'update_network:provider:physical_network',
|
|
'update_network:provider:segmentation_id']
|
|
self._test_set_rules_with_deprecated_policy(
|
|
{'extension:provider_network:set': 'rule:admin_only'},
|
|
dict((policy, 'rule:admin_only') for policy in
|
|
expected_policies))
|