def setUp(self): super(AggregatesPolicyTest, self).setUp() self.controller = aggregates.AggregateController() self.req = fakes.HTTPRequest.blank('') # Check that admin is able to perform Aggregate Operations self.admin_authorized_contexts = [ self.legacy_admin_context, self.system_admin_context, self.project_admin_context] # Check that non-admin is not able to perform Aggregate Operations self.admin_unauthorized_contexts = [ self.system_member_context, self.system_reader_context, self.system_foo_context, self.project_member_context, self.other_project_member_context, self.project_foo_context, self.project_reader_context ] # Check that system reader is able to get Aggregate self.system_reader_authorized_contexts = [ self.legacy_admin_context, self.system_admin_context, self.project_admin_context, self.system_member_context, self.system_reader_context] # Check that non-admin is not able to get Aggregate self.system_reader_unauthorized_contexts = [ self.system_foo_context, self.project_member_context, self.other_project_member_context, self.project_foo_context, self.project_reader_context ]
def setUp(self): super(AggregatesPolicyTest, self).setUp() self.controller = aggregates.AggregateController() self.req = fakes.HTTPRequest.blank('') # With legacy rule and scope check disabled by default, system admin, # legacy admin, and project admin will be able to perform Aggregate # Operations. self.system_admin_authorized_contexts = [ self.legacy_admin_context, self.system_admin_context, self.project_admin_context ]
def _set_up(self): self.controller = aggregates_v21.AggregateController() self.req = fakes.HTTPRequest.blank('/v2/os-aggregates', use_admin_context=True) self.user_req = fakes.HTTPRequest.blank('/v2/os-aggregates') self.context = self.req.environ['nova.context']