def setUp(self): super(HostsPolicyTest, self).setUp() self.controller = hosts.HostController() self.req = fakes.HTTPRequest.blank('') # Check that admin is able to perform operations on hosts. self.system_admin_authorized_contexts = [ self.system_admin_context, self.legacy_admin_context, self.project_admin_context ] # Check that non-admin is not able to perform operations # on hosts. self.system_admin_unauthorized_contexts = [ self.system_member_context, self.system_reader_context, self.system_foo_context, self.other_project_member_context, self.project_foo_context, self.project_member_context, self.project_reader_context, self.other_project_reader_context ] self.system_reader_authorized_contexts = [ self.system_admin_context, self.system_member_context, self.system_reader_context, self.legacy_admin_context, self.project_admin_context ] self.system_reader_unauthorized_contexts = [ self.project_foo_context, self.system_foo_context, self.project_member_context, self.project_reader_context, self.other_project_member_context, self.other_project_reader_context ]
def setUp(self): super(HostsPolicyTest, self).setUp() self.controller = hosts.HostController() self.req = fakes.HTTPRequest.blank('') # With legacy rule and scope check disabled by default, system admin, # legacy admin, and project admin will be able to perform hosts # Operations. self.system_admin_authorized_contexts = [ self.legacy_admin_context, self.system_admin_context, self.project_admin_context ]
def setUp(self): super(HostControllerDeprecationTest, self).setUp() self.controller = os_hosts_v21.HostController() self.req = fakes.HTTPRequest.blank('', version='2.43')
def setUp(self): super(HostsPolicyEnforcementV21, self).setUp() self.controller = os_hosts_v21.HostController() self.req = fakes.HTTPRequest.blank('')