Esempio n. 1
0
 def setUp(self):
     super(TenantNetworksPolicyTest, self).setUp()
     self.controller = tenant_networks.TenantNetworkController()
     self.req = fakes.HTTPRequest.blank('')
     # Check that everyone is able to get tenant networks.
     # NOTE: Nova cannot verify the tenant networks owner during nova policy
     # enforcement so will be passing context's project_id as target to
     # policy and always pass. If requester is not admin or owner
     # of networks then neutron will be returning the appropriate error.
     self.project_reader_authorized_contexts = [
         self.legacy_admin_context, self.system_admin_context,
         self.project_admin_context, self.project_member_context,
         self.project_reader_context, self.project_foo_context,
         self.other_project_reader_context,
         self.system_member_context, self.system_reader_context,
         self.system_foo_context,
         self.other_project_member_context
     ]
 def setUp(self):
     super(TenantNetworksDeprecationTest, self).setUp()
     self.controller = networks_v21.TenantNetworkController()
     self.req = fakes.HTTPRequest.blank('', version='2.36')
Esempio n. 3
0
 def setUp(self):
     super(TenantNetworksEnforcementV21, self).setUp()
     self.controller = networks_v21.TenantNetworkController()
     self.req = fakes.HTTPRequest.blank('')