Refactoring RbacUtils part 2 api tests

The override_role function no longer needs test_obj parameter.
Also removing self.rbac_utils variable.

Story: 2002604
Task: 22223

Change-Id: I1ee95e3051d7bd27f73df818fa2b64caa07c1ed2
This commit is contained in:
Sergey Vilgelm 2019-02-02 09:34:52 -06:00
parent ace8ea37c8
commit d3d77ef10c
No known key found for this signature in database
GPG Key ID: 08D0E2FF778887E6
119 changed files with 704 additions and 708 deletions

View File

@ -132,7 +132,7 @@ def action(service,
rules=["os_compute_api:os-agents"])
def test_list_agents_rbac(self):
# The call to `override_role` is mandatory.
with self.rbac_utils.override_role(self):
with self.override_role():
self.agents_client.list_agents()
"""

View File

@ -40,7 +40,7 @@ class _ValidateListContext(object):
Example::
with self.rbac_utils.override_role_and_validate_list(...) as ctx:
with self.override_role_and_validate_list(...) as ctx:
ctx.resources = list_function()
"""
@ -146,10 +146,6 @@ class RbacUtilsMixin(object):
admin_roles_client = None
@property
def rbac_utils(self):
return self
@classmethod
def setup_clients(cls):
# Intialize the admin roles_client to perform role switching.
@ -250,7 +246,7 @@ class RbacUtilsMixin(object):
return list(res)
@contextlib.contextmanager
def override_role(self, test_obj=None):
def override_role(self):
"""Override the role used by ``os_primary`` Tempest credentials.
Temporarily change the role used by ``os_primary`` credentials to:
@ -273,7 +269,7 @@ class RbacUtilsMixin(object):
rules=['a:test:rule'])
def test_foo(self):
# Allocate test-level resources here.
with self.rbac_utils.override_role(self):
with self.override_role():
# The role for `os_primary` has now been overridden. Within
# this block, call the API endpoint that enforces the
# expected policy specified by "rule" in the decorator.
@ -403,7 +399,7 @@ class RbacUtilsMixin(object):
return False
@contextlib.contextmanager
def override_role_and_validate_list(self, test_obj=None,
def override_role_and_validate_list(self,
admin_resources=None,
admin_resource_id=None):
"""Call ``override_role`` and validate RBAC for a list API action.
@ -427,8 +423,8 @@ class RbacUtilsMixin(object):
admin_resource_id = (
self.ntp_client.create_dscp_marking_rule()
["dscp_marking_rule"]["id'])
with self.rbac_utils.override_role_and_validate_list(
self, admin_resource_id=admin_resource_id) as ctx:
with self.override_role_and_validate_list(
admin_resource_id=admin_resource_id) as ctx:
# the list of resources available for member role
ctx.resources = self.ntp_client.list_dscp_marking_rules(
policy_id=self.policy_id)["dscp_marking_rules"]

View File

@ -45,7 +45,7 @@ class AgentsRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova", rules=["os_compute_api:os-agents"])
@decorators.idempotent_id('d1bc6d97-07f5-4f45-ac29-1c619a6a7e27')
def test_list_agents_rbac(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.agents_client.list_agents()
@rbac_rule_validation.action(
@ -56,7 +56,7 @@ class AgentsRbacTest(rbac_base.BaseV2ComputeRbacTest):
params = {'hypervisor': 'kvm', 'os': 'win', 'architecture': 'x86',
'version': '7.0', 'url': 'xxx://xxxx/xxx/xxx',
'md5hash': 'add6bb58e139be103324d04d82d8f545'}
with self.rbac_utils.override_role(self):
with self.override_role():
body = self.agents_client.create_agent(**params)['agent']
self.addCleanup(self.agents_client.delete_agent,
body['agent_id'])
@ -79,7 +79,7 @@ class AgentsRbacTest(rbac_base.BaseV2ComputeRbacTest):
url='xxx://xxxx/xxx/xxx2',
md5hash='add6bb58e139be103324d04d82d8f547')
with self.rbac_utils.override_role(self):
with self.override_role():
self.agents_client.update_agent(body['agent_id'], **update_params)
@rbac_rule_validation.action(
@ -96,5 +96,5 @@ class AgentsRbacTest(rbac_base.BaseV2ComputeRbacTest):
self.addCleanup(test_utils.call_and_ignore_notfound_exc,
self.agents_client.delete_agent,
body['agent_id'])
with self.rbac_utils.override_role(self):
with self.override_role():
self.agents_client.delete_agent(body['agent_id'])

View File

@ -84,7 +84,7 @@ class AggregatesRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova", rules=["os_compute_api:os-aggregates:create"])
@decorators.idempotent_id('ba754393-896e-434a-9704-452ff4a84f3f')
def test_create_aggregate_rbac(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self._create_aggregate()
@rbac_rule_validation.action(
@ -92,14 +92,14 @@ class AggregatesRbacTest(rbac_base.BaseV2ComputeRbacTest):
@decorators.idempotent_id('8fb0b749-b120-4727-b3fb-bcfa3fa6f55b')
def test_show_aggregate_rbac(self):
aggregate_id = self._create_aggregate()
with self.rbac_utils.override_role(self):
with self.override_role():
self.aggregates_client.show_aggregate(aggregate_id)
@rbac_rule_validation.action(
service="nova", rules=["os_compute_api:os-aggregates:index"])
@decorators.idempotent_id('146284da-5dd6-4c97-b598-42b480f014c6')
def test_list_aggregate_rbac(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.aggregates_client.list_aggregates()
@rbac_rule_validation.action(
@ -108,7 +108,7 @@ class AggregatesRbacTest(rbac_base.BaseV2ComputeRbacTest):
def test_update_aggregate_rbac(self):
aggregate_id = self._create_aggregate()
new_name = data_utils.rand_name(self.__class__.__name__ + '-aggregate')
with self.rbac_utils.override_role(self):
with self.override_role():
self.aggregates_client.update_aggregate(aggregate_id,
name=new_name)
@ -117,7 +117,7 @@ class AggregatesRbacTest(rbac_base.BaseV2ComputeRbacTest):
@decorators.idempotent_id('5a50c5a6-0f12-4405-a1ce-2288ae895ea6')
def test_delete_aggregate_rbac(self):
aggregate_id = self._create_aggregate()
with self.rbac_utils.override_role(self):
with self.override_role():
self.aggregates_client.delete_aggregate(aggregate_id)
@rbac_rule_validation.action(
@ -125,7 +125,7 @@ class AggregatesRbacTest(rbac_base.BaseV2ComputeRbacTest):
@decorators.idempotent_id('97e6e9df-5291-4faa-8147-755b2d1f1ce2')
def test_add_host_to_aggregate_rbac(self):
aggregate_id = self._create_aggregate()
with self.rbac_utils.override_role(self):
with self.override_role():
self._add_host_to_aggregate(aggregate_id)
@rbac_rule_validation.action(
@ -134,7 +134,7 @@ class AggregatesRbacTest(rbac_base.BaseV2ComputeRbacTest):
def test_remove_host_from_aggregate_rbac(self):
aggregate_id = self._create_aggregate()
self._add_host_to_aggregate(aggregate_id)
with self.rbac_utils.override_role(self):
with self.override_role():
self.aggregates_client.remove_host(aggregate_id, host=self.host)
@rbac_rule_validation.action(
@ -144,7 +144,7 @@ class AggregatesRbacTest(rbac_base.BaseV2ComputeRbacTest):
aggregate_id = self._create_aggregate()
rand_key = data_utils.rand_name(self.__class__.__name__ + '-key')
rand_val = data_utils.rand_name(self.__class__.__name__ + '-val')
with self.rbac_utils.override_role(self):
with self.override_role():
self.aggregates_client.set_metadata(
aggregate_id,
metadata={rand_key: rand_val})

View File

@ -33,7 +33,7 @@ class NovaAvailabilityZoneRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:os-availability-zone:list"])
@decorators.idempotent_id('cd34e7ea-d26e-4fa3-a8d0-f8883726ce3d')
def test_get_availability_zone_list_rbac(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.availability_zone_client.list_availability_zones()
@rbac_rule_validation.action(
@ -41,5 +41,5 @@ class NovaAvailabilityZoneRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:os-availability-zone:detail"])
@decorators.idempotent_id('2f61c191-6ece-4f21-b487-39d749e3d38e')
def test_get_availability_zone_list_detail_rbac(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.availability_zone_client.list_availability_zones(detail=True)

View File

@ -58,7 +58,7 @@ class FixedIpsRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:os-fixed-ips"])
def test_show_fixed_ip_details(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.fixed_ips_client.show_fixed_ip(self.ip)
@decorators.idempotent_id('f0314501-735d-4315-9856-959e01e82f0d')
@ -66,7 +66,7 @@ class FixedIpsRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:os-fixed-ips"])
def test_set_reserve(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.fixed_ips_client.reserve_fixed_ip(self.ip, reserve="None")
@decorators.idempotent_id('866a6fdc-a237-4502-9bf2-52fe82aba356')
@ -74,5 +74,5 @@ class FixedIpsRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:os-fixed-ips"])
def test_set_unreserve(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.fixed_ips_client.reserve_fixed_ip(self.ip, unreserve="None")

View File

@ -44,7 +44,7 @@ class FlavorAccessRbacTest(rbac_base.BaseV2ComputeRbacTest):
def test_show_flavor_contains_is_public_key(self):
public_flavor_id = CONF.compute.flavor_ref
with self.rbac_utils.override_role(self):
with self.override_role():
body = self.flavors_client.show_flavor(public_flavor_id)[
'flavor']
@ -62,7 +62,7 @@ class FlavorAccessRbacTest(rbac_base.BaseV2ComputeRbacTest):
def test_list_flavors_details_contains_is_public_key(self):
expected_attr = 'os-flavor-access:is_public'
with self.rbac_utils.override_role(self):
with self.override_role():
flavors = self.flavors_client.list_flavors(detail=True)['flavors']
# There should already be a public flavor available, namely
# `CONF.compute.flavor_ref`.
@ -79,7 +79,7 @@ class FlavorAccessRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:os-flavor-access:add_tenant_access"])
def test_add_flavor_access(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.flavors_client.add_flavor_access(
flavor_id=self.flavor_id, tenant_id=self.tenant_id)
self.addCleanup(self.flavors_client.remove_flavor_access,
@ -96,7 +96,7 @@ class FlavorAccessRbacTest(rbac_base.BaseV2ComputeRbacTest):
self.flavors_client.remove_flavor_access,
flavor_id=self.flavor_id, tenant_id=self.tenant_id)
with self.rbac_utils.override_role(self):
with self.override_role():
self.flavors_client.remove_flavor_access(
flavor_id=self.flavor_id, tenant_id=self.tenant_id)
@ -112,5 +112,5 @@ class FlavorAccessRbacTest(rbac_base.BaseV2ComputeRbacTest):
self.addCleanup(self.flavors_client.remove_flavor_access,
flavor_id=self.flavor_id, tenant_id=self.tenant_id)
with self.rbac_utils.override_role(self):
with self.override_role():
self.flavors_client.list_flavor_access(self.flavor_id)

View File

@ -53,7 +53,7 @@ class FlavorExtraSpecsRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:os-flavor-extra-specs:show"])
def test_show_flavor_extra_spec(self):
key = self._set_flavor_extra_spec()
with self.rbac_utils.override_role(self):
with self.override_role():
self.flavors_client.show_flavor_extra_spec(self.flavor['id'], key)
@decorators.idempotent_id('fcffeca2-ed04-4e85-bf93-02fb5643f22b')
@ -61,7 +61,7 @@ class FlavorExtraSpecsRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:os-flavor-extra-specs:create"])
def test_set_flavor_extra_spec(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self._set_flavor_extra_spec()
@decorators.idempotent_id('42b85279-6bfa-4f58-b7a2-258c284f03c5')
@ -71,7 +71,7 @@ class FlavorExtraSpecsRbacTest(rbac_base.BaseV2ComputeRbacTest):
def test_update_flavor_extra_spec(self):
key = self._set_flavor_extra_spec()
update_val = data_utils.rand_name(self.__class__.__name__ + '-val')
with self.rbac_utils.override_role(self):
with self.override_role():
self.flavors_client.update_flavor_extra_spec(
self.flavor['id'], key, **{key: update_val})
@ -81,7 +81,7 @@ class FlavorExtraSpecsRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:os-flavor-extra-specs:delete"])
def test_unset_flavor_extra_spec(self):
key = self._set_flavor_extra_spec()
with self.rbac_utils.override_role(self):
with self.override_role():
self.flavors_client.unset_flavor_extra_spec(self.flavor['id'], key)
@decorators.idempotent_id('02c3831a-3ce9-476e-a722-d805ac2da621')
@ -90,5 +90,5 @@ class FlavorExtraSpecsRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:os-flavor-extra-specs:index"])
def test_list_flavor_extra_specs(self):
self._set_flavor_extra_spec()
with self.rbac_utils.override_role(self):
with self.override_role():
self.flavors_client.list_flavor_extra_specs(self.flavor['id'])

View File

@ -34,7 +34,7 @@ class FlavorManageRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:os-flavor-manage:create"])
def test_create_flavor_manage(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.create_flavor()
@decorators.idempotent_id('782e988e-061b-4c40-896f-a77c70c2b057')
@ -44,6 +44,6 @@ class FlavorManageRbacTest(rbac_base.BaseV2ComputeRbacTest):
def test_delete_flavor_manage(self):
flavor_id = self.create_flavor()['id']
with self.rbac_utils.override_role(self):
with self.override_role():
self.flavors_client.delete_flavor(flavor_id)
self.flavors_client.wait_for_resource_deletion(flavor_id)

View File

@ -42,7 +42,7 @@ class FlavorRxtxRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:os-flavor-rxtx"])
def test_list_flavors_details_rxtx(self):
with self.rbac_utils.override_role(self):
with self.override_role():
result = self.flavors_client.list_flavors(detail=True)['flavors']
if 'rxtx_factor' not in result[0]:
raise rbac_exceptions.RbacMissingAttributeResponseBody(
@ -55,7 +55,7 @@ class FlavorRxtxRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:os-flavor-rxtx"])
def test_get_flavor_rxtx(self):
with self.rbac_utils.override_role(self):
with self.override_role():
result = self.flavors_client.show_flavor(
CONF.compute.flavor_ref)['flavor']
if 'rxtx_factor' not in result:

View File

@ -50,5 +50,5 @@ class FloatingIpPoolsRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:os-floating-ip-pools"])
def test_list_floating_ip_pools(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.fip_pools_client.list_floating_ip_pools()

View File

@ -91,7 +91,7 @@ class FloatingIpsBulkRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:os-floating-ips-bulk"])
def test_create_floating_ips_bulk(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self._create_floating_ips_bulk()
@decorators.idempotent_id('3b5c8a02-005d-4256-8a95-6fa2f389c6cf')
@ -99,7 +99,7 @@ class FloatingIpsBulkRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:os-floating-ips-bulk"])
def test_list_floating_ips_bulk(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.fip_bulk_client.list_floating_ips_bulk()
@decorators.idempotent_id('37c2b759-c494-4e20-9dba-6a67b2df9573')
@ -108,5 +108,5 @@ class FloatingIpsBulkRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:os-floating-ips-bulk"])
def test_delete_floating_ips_bulk(self):
self._create_floating_ips_bulk()
with self.rbac_utils.override_role(self):
with self.override_role():
self.fip_bulk_client.delete_floating_ips_bulk(self.ip_range)

View File

@ -46,7 +46,7 @@ class FloatingIpsRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:os-floating-ips"])
def test_list_floating_ips(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.floating_ips_client.list_floating_ips()
@decorators.idempotent_id('bebe52b3-5269-4e72-80c8-5a4a39c3bfa6')
@ -58,7 +58,7 @@ class FloatingIpsRbacTest(rbac_base.BaseV2ComputeRbacTest):
pool=CONF.network.floating_network_name)['floating_ip']
self.addCleanup(
self.floating_ips_client.delete_floating_ip, body['id'])
with self.rbac_utils.override_role(self):
with self.override_role():
self.floating_ips_client.show_floating_ip(body['id'])
@decorators.idempotent_id('2bfb8745-c329-4ee9-95f6-c165a1989dbf')
@ -66,7 +66,7 @@ class FloatingIpsRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:os-floating-ips"])
def test_create_floating_ips(self):
with self.rbac_utils.override_role(self):
with self.override_role():
body = self.floating_ips_client.create_floating_ip(
pool=CONF.network.floating_network_name)['floating_ip']
self.addCleanup(
@ -82,5 +82,5 @@ class FloatingIpsRbacTest(rbac_base.BaseV2ComputeRbacTest):
self.addCleanup(
test_utils.call_and_ignore_notfound_exc,
self.floating_ips_client.delete_floating_ip, body['id'])
with self.rbac_utils.override_role(self):
with self.override_role():
self.floating_ips_client.delete_floating_ip(body['id'])

View File

@ -38,7 +38,7 @@ class HostsRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:os-hosts"])
def test_list_hosts(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.hosts_client.list_hosts()
@decorators.idempotent_id('bc10d8b4-d2c3-4d4e-9d2b-31d1bd3e1b51')
@ -50,5 +50,5 @@ class HostsRbacTest(rbac_base.BaseV2ComputeRbacTest):
hosts = [host for host in hosts if host['service'] == 'compute']
self.assertNotEmpty(hosts)
with self.rbac_utils.override_role(self):
with self.override_role():
self.hosts_client.show_host(hosts[0]['host_name'])

View File

@ -41,7 +41,7 @@ class HypervisorRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:os-hypervisors"])
def test_list_hypervisors(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.hypervisor_client.list_hypervisors()
@decorators.idempotent_id('36b95c7d-1085-487a-a674-b7c1ca35f520')
@ -49,7 +49,7 @@ class HypervisorRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:os-hypervisors"])
def test_list_hypervisors_with_details(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.hypervisor_client.list_hypervisors(detail=True)
@decorators.idempotent_id('8a7f6f9e-34a6-4480-8875-bba566c3a581')
@ -57,7 +57,7 @@ class HypervisorRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:os-hypervisors"])
def test_show_hypervisor(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.hypervisor_client.show_hypervisor(self.hypervisor['id'])
@decorators.idempotent_id('ca0e465c-6365-4a7f-ae58-6f8ddbca06c2')
@ -65,7 +65,7 @@ class HypervisorRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:os-hypervisors"])
def test_show_hypervisor_statistics(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.hypervisor_client.show_hypervisor_statistics()
@decorators.idempotent_id('109b37c5-91ba-4da5-b2a2-d7618d84406d')
@ -73,7 +73,7 @@ class HypervisorRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:os-hypervisors"])
def test_show_hypervisor_uptime(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.hypervisor_client.show_hypervisor_uptime(
self.hypervisor['id'])
@ -104,7 +104,7 @@ class HypervisorMaxv252RbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:os-hypervisors"])
def test_list_servers_on_hypervisor(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.hypervisor_client.list_servers_on_hypervisor(
self.hypervisor['hypervisor_hostname'])
@ -113,6 +113,6 @@ class HypervisorMaxv252RbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:os-hypervisors"])
def test_search_hypervisor(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.hypervisor_client.search_hypervisor(
self.hypervisor['hypervisor_hostname'])

View File

@ -81,7 +81,7 @@ class ImagesRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="glance",
rules=["get_images"])
def test_list_images(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.compute_images_client.list_images()
@decorators.idempotent_id('4365ae0f-15ee-4b54-a527-1679faaed140')
@ -89,7 +89,7 @@ class ImagesRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="glance",
rules=["get_images"])
def test_list_images_with_details(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.compute_images_client.list_images(detail=True)
@decorators.idempotent_id('886dfcae-51bf-4610-9e52-82d7189524c2')
@ -97,7 +97,7 @@ class ImagesRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="glance",
rules=["get_image"])
def test_show_image_details(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.compute_images_client.show_image(self.image['id'])
@decorators.idempotent_id('5888c7aa-0803-46d4-a3fb-5d4729465cd5')
@ -110,7 +110,7 @@ class ImagesRbacTest(rbac_base.BaseV2ComputeRbacTest):
self.addCleanup(test_utils.call_and_ignore_notfound_exc,
self.glance_image_client.delete_image, image['id'])
with self.rbac_utils.override_role(self):
with self.override_role():
self.compute_images_client.delete_image(image['id'])
@ -171,7 +171,7 @@ class ImagesMetadataRbacTest(rbac_base.BaseV2ComputeRbacTest):
self.addCleanup(self.compute_images_client.delete_image_metadata_item,
self.image['id'], key='foo')
with self.rbac_utils.override_role(self):
with self.override_role():
self.compute_images_client.show_image_metadata_item(
self.image['id'], key='foo')
@ -180,7 +180,7 @@ class ImagesMetadataRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="glance",
rules=["get_image"])
def test_list_image_metadata(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.compute_images_client.list_image_metadata(self.image['id'])
@decorators.idempotent_id('575604aa-909f-4b1b-a5a5-cfae1f63044b')
@ -188,7 +188,7 @@ class ImagesMetadataRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="glance",
rules=["modify_image"])
def test_create_image_metadata(self):
with self.rbac_utils.override_role(self):
with self.override_role():
# NOTE(felipemonteiro): Although the name of the client function
# appears wrong, it's actually correct: update_image_metadata does
# an http post.
@ -202,7 +202,7 @@ class ImagesMetadataRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="glance",
rules=["modify_image"])
def test_update_image_metadata(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.compute_images_client.set_image_metadata(self.image['id'],
meta={'foo': 'bar'})
self.addCleanup(self.compute_images_client.delete_image_metadata_item,
@ -213,7 +213,7 @@ class ImagesMetadataRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="glance",
rules=["modify_image"])
def test_update_image_metadata_item(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.compute_images_client.set_image_metadata_item(
self.image['id'], meta={'foo': 'bar'}, key='foo')
self.addCleanup(self.compute_images_client.delete_image_metadata_item,
@ -230,7 +230,7 @@ class ImagesMetadataRbacTest(rbac_base.BaseV2ComputeRbacTest):
self.compute_images_client.delete_image_metadata_item,
self.image['id'], key='foo')
with self.rbac_utils.override_role(self):
with self.override_role():
self.compute_images_client.delete_image_metadata_item(
self.image['id'], key='foo')
@ -288,7 +288,7 @@ class ImageSizeRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:image-size"])
def test_show_image_includes_image_size(self):
with self.rbac_utils.override_role(self):
with self.override_role():
body = self.compute_images_client.show_image(self.image['id'])[
'image']
@ -304,7 +304,7 @@ class ImageSizeRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:image-size"])
def test_list_images_with_details_includes_image_size(self):
with self.rbac_utils.override_role(self):
with self.override_role():
body = self.compute_images_client.list_images(detail=True)[
'images']

View File

@ -38,7 +38,7 @@ class InstanceUsagesAuditLogRbacTest(rbac_base.BaseV2ComputeRbacTest):
@rbac_rule_validation.action(
service="nova", rules=["os_compute_api:os-instance-usage-audit-log"])
def test_list_instance_usage_audit_logs(self):
with self.rbac_utils.override_role(self):
with self.override_role():
(self.instance_usages_audit_log_client
.list_instance_usage_audit_logs())
@ -48,7 +48,7 @@ class InstanceUsagesAuditLogRbacTest(rbac_base.BaseV2ComputeRbacTest):
def test_show_instance_usage_audit_log(self):
now = datetime.datetime.now()
with self.rbac_utils.override_role(self):
with self.override_role():
(self.instance_usages_audit_log_client.
show_instance_usage_audit_log(
urllib.quote(now.strftime("%Y-%m-%d %H:%M:%S"))))

View File

@ -36,7 +36,7 @@ class KeypairsRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:os-keypairs:create"])
def test_create_keypair(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self._create_keypair()
@decorators.idempotent_id('85a5eb99-40ec-4e77-9358-bee2cdf9d7df')
@ -45,7 +45,7 @@ class KeypairsRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:os-keypairs:show"])
def test_show_keypair(self):
kp_name = self._create_keypair()['keypair']['name']
with self.rbac_utils.override_role(self):
with self.override_role():
self.keypairs_client.show_keypair(kp_name)
@decorators.idempotent_id('6bff9f1c-b809-43c1-8d63-61fbd19d49d3')
@ -54,7 +54,7 @@ class KeypairsRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:os-keypairs:delete"])
def test_delete_keypair(self):
kp_name = self._create_keypair()['keypair']['name']
with self.rbac_utils.override_role(self):
with self.override_role():
self.keypairs_client.delete_keypair(kp_name)
@decorators.idempotent_id('6bb31346-ff7f-4b10-978e-170ac5fcfa3e')
@ -62,5 +62,5 @@ class KeypairsRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:os-keypairs:index"])
def test_index_keypair(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.keypairs_client.list_keypairs()

View File

@ -31,5 +31,5 @@ class LimitsRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:limits"])
@decorators.idempotent_id('3fb60f83-9a5f-4fdd-89d9-26c3710844a1')
def test_show_limits(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.limits_client.show_limits()

View File

@ -34,5 +34,5 @@ class MigrationsRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:os-migrations:index"])
def test_list_services(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.migrations_client.list_migrations()

View File

@ -65,7 +65,7 @@ class QuotaClassesRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:os-quota-class-sets:show"])
def test_show_quota_class_set(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.quota_classes_client.show_quota_class_set('default')
@decorators.idempotent_id('81889e69-efd2-4e96-bb4c-ee3b646b9755')
@ -80,6 +80,6 @@ class QuotaClassesRbacTest(rbac_base.BaseV2ComputeRbacTest):
for quota, default in quota_class_set.items():
quota_class_set[quota] = default + 100
with self.rbac_utils.override_role(self):
with self.override_role():
self.quota_classes_client.update_quota_class_set(
self.project_id, **quota_class_set)

View File

@ -61,7 +61,7 @@ class QuotaSetsRbacTest(rbac_base.BaseV2ComputeRbacTest):
default_quota_set.pop('id')
new_quota_set = {'injected_file_content_bytes': 20480}
with self.rbac_utils.override_role(self):
with self.override_role():
self.quotas_client.update_quota_set(self.tenant_id,
force=True,
**new_quota_set)
@ -73,7 +73,7 @@ class QuotaSetsRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:os-quota-sets:defaults"])
def test_show_default_quota_set(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.quotas_client.show_default_quota_set(self.tenant_id)
@decorators.idempotent_id('e8169ac4-c402-4864-894e-aba74e3a459c')
@ -81,7 +81,7 @@ class QuotaSetsRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:os-quota-sets:show"])
def test_show_quota_set(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.quotas_client.show_quota_set(self.tenant_id)
@decorators.idempotent_id('4e240644-bf61-4872-9c32-8289ee2fdbbd')
@ -99,7 +99,7 @@ class QuotaSetsRbacTest(rbac_base.BaseV2ComputeRbacTest):
identity.identity_utils(self.os_admin).delete_project,
project_id)
with self.rbac_utils.override_role(self):
with self.override_role():
self.quotas_client.delete_quota_set(project_id)
@decorators.idempotent_id('ac9184b6-f3b3-4e17-a632-4b92c6500f86')
@ -107,6 +107,6 @@ class QuotaSetsRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:os-quota-sets:detail"])
def test_show_quota_set_details(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.quotas_client.show_quota_set(self.tenant_id,
detail=True)

View File

@ -58,7 +58,7 @@ class SecurtiyGroupsRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:os-security-groups"])
@decorators.idempotent_id('3db159c6-a467-469f-9a25-574197885520')
def test_list_security_groups_by_server(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.list_security_groups_by_server(
self.server['id'])
@ -69,7 +69,7 @@ class SecurtiyGroupsRbacTest(rbac_base.BaseV2ComputeRbacTest):
def test_create_security_group_for_server(self):
sg_name = self.create_security_group()['name']
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.add_security_group(self.server['id'],
name=sg_name)
self.addCleanup(test_utils.call_and_ignore_notfound_exc,
@ -88,7 +88,7 @@ class SecurtiyGroupsRbacTest(rbac_base.BaseV2ComputeRbacTest):
self.servers_client.remove_security_group,
self.server['id'], name=sg_name)
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.remove_security_group(
self.server['id'], name=sg_name)
@ -119,7 +119,7 @@ class SecurityGroupsRbacMaxV235Test(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:os-security-groups"])
@decorators.idempotent_id('4ac58e49-48c1-4fca-a6c3-3f95fb99eb77')
def test_list_security_groups(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.security_groups_client.list_security_groups()
@rbac_rule_validation.action(
@ -127,7 +127,7 @@ class SecurityGroupsRbacMaxV235Test(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:os-security-groups"])
@decorators.idempotent_id('e8fe7f5a-69ee-412d-81d3-a8c7a488b54d')
def test_create_security_groups(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.create_security_group()['id']
@rbac_rule_validation.action(
@ -136,7 +136,7 @@ class SecurityGroupsRbacMaxV235Test(rbac_base.BaseV2ComputeRbacTest):
@decorators.idempotent_id('59127e8e-302d-11e7-93ae-92361f002671')
def test_delete_security_groups(self):
sec_group_id = self.create_security_group()['id']
with self.rbac_utils.override_role(self):
with self.override_role():
self.security_groups_client.delete_security_group(sec_group_id)
@rbac_rule_validation.action(
@ -148,7 +148,7 @@ class SecurityGroupsRbacMaxV235Test(rbac_base.BaseV2ComputeRbacTest):
new_name = data_utils.rand_name()
new_desc = data_utils.rand_name()
with self.rbac_utils.override_role(self):
with self.override_role():
self.security_groups_client.update_security_group(
sec_group_id, name=new_name, description=new_desc)
@ -158,5 +158,5 @@ class SecurityGroupsRbacMaxV235Test(rbac_base.BaseV2ComputeRbacTest):
@decorators.idempotent_id('6edc0320-302d-11e7-93ae-92361f002671')
def test_show_security_groups(self):
sec_group_id = self.create_security_group()['id']
with self.rbac_utils.override_role(self):
with self.override_role():
self.security_groups_client.show_security_group(sec_group_id)

View File

@ -121,7 +121,7 @@ class ServerActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:os-pause-server:pause"])
def test_pause_server(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self._pause_server()
@decorators.idempotent_id('087008cf-82fa-4eeb-ae8b-32c4126456ad')
@ -132,7 +132,7 @@ class ServerActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:os-pause-server:unpause"])
def test_unpause_server(self):
self._pause_server()
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.unpause_server(self.server_id)
waiters.wait_for_server_status(
self.servers_client, self.server_id, 'ACTIVE')
@ -142,7 +142,7 @@ class ServerActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:servers:stop"])
@decorators.idempotent_id('ab4a17d2-166f-4a6d-9944-f17baa576cf2')
def test_stop_server(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self._stop_server()
@decorators.attr(type='slow')
@ -153,7 +153,7 @@ class ServerActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
def test_start_server(self):
self._stop_server()
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.start_server(self.server_id)
waiters.wait_for_server_status(
self.servers_client, self.server_id, 'ACTIVE')
@ -166,7 +166,7 @@ class ServerActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
@testtools.skipUnless(CONF.compute_feature_enabled.resize,
'Resize is not available.')
def test_resize_server(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self._resize_server(self.flavor_ref_alt)
@decorators.attr(type='slow')
@ -179,7 +179,7 @@ class ServerActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
def test_revert_resize_server(self):
self._resize_server(self.flavor_ref_alt)
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.revert_resize_server(self.server_id)
waiters.wait_for_server_status(
self.servers_client, self.server_id, 'ACTIVE')
@ -197,7 +197,7 @@ class ServerActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
self.addCleanup(self._resize_server, self.flavor_ref)
self.addCleanup(self._confirm_resize_server)
with self.rbac_utils.override_role(self):
with self.override_role():
self._confirm_resize_server()
@rbac_rule_validation.action(
@ -205,7 +205,7 @@ class ServerActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:servers:rebuild"])
@decorators.idempotent_id('54b1a30b-c96c-472c-9c83-ccaf6ec7e20b')
def test_rebuild_server(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.rebuild_server(self.server_id, self.image_ref)
waiters.wait_for_server_status(
self.servers_client, self.server_id, 'ACTIVE')
@ -215,7 +215,7 @@ class ServerActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:servers:reboot"])
@decorators.idempotent_id('19f27856-56e1-44f8-8615-7257f6b85cbb')
def test_reboot_server(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.reboot_server(self.server_id, type='HARD')
waiters.wait_for_server_status(
self.servers_client, self.server_id, 'ACTIVE')
@ -225,7 +225,7 @@ class ServerActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:servers:index"])
@decorators.idempotent_id('631f0d86-7607-4198-8312-9da2f05464a4')
def test_server_index(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.list_servers(minimal=True)
@rbac_rule_validation.action(
@ -233,7 +233,7 @@ class ServerActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:servers:detail"])
@decorators.idempotent_id('96093480-3ce5-4a8b-b569-aed870379c24')
def test_server_detail(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.list_servers(detail=True)
@rbac_rule_validation.action(
@ -241,7 +241,7 @@ class ServerActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:servers:detail:get_all_tenants"])
@decorators.idempotent_id('a9e5a1c0-acfe-49a2-b2b1-fd8b19d61f71')
def test_server_detail_all_tenants(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.list_servers(detail=True, all_tenants=1)
@rbac_rule_validation.action(
@ -249,7 +249,7 @@ class ServerActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:servers:index:get_all_tenants"])
@decorators.idempotent_id('4b93ba56-69e6-41f5-82c4-84a5c4c42091')
def test_server_index_all_tenants(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.list_servers(minimal=True, all_tenants=1)
@rbac_rule_validation.action(
@ -257,7 +257,7 @@ class ServerActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:servers:show"])
@decorators.idempotent_id('eaaf4f51-31b5-497f-8f0f-f527e5f70b83')
def test_show_server(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.show_server(self.server_id)
@utils.services('image')
@ -266,7 +266,7 @@ class ServerActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:servers:create_image"])
@decorators.idempotent_id('ba0ac859-99f4-4055-b5e0-e0905a44d331')
def test_create_image(self):
with self.rbac_utils.override_role(self):
with self.override_role():
# This function will also call show image
self.create_image_from_server(self.server_id, wait_until='ACTIVE')
@ -281,7 +281,7 @@ class ServerActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
# this test.
server = self.create_test_server(volume_backed=True,
wait_until='ACTIVE')
with self.rbac_utils.override_role(self):
with self.override_role():
# This function will also call show image.
image = self.create_image_from_server(server['id'],
wait_until='ACTIVE',
@ -313,7 +313,7 @@ class ServerActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
backup_name = data_utils.rand_name(self.__class__.__name__ + '-Backup')
with self.rbac_utils.override_role(self):
with self.override_role():
resp = self.servers_client.create_backup(
self.server_id, backup_type='daily', rotation=1,
name=backup_name).response
@ -336,7 +336,7 @@ class ServerActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:os-shelve:shelve"])
def test_shelve_server(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self._shelve_server()
@decorators.attr(type='slow')
@ -346,7 +346,7 @@ class ServerActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:os-shelve:unshelve"])
def test_unshelve_server(self):
self._shelve_server()
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.unshelve_server(self.server_id)
waiters.wait_for_server_status(
self.servers_client, self.server_id, 'ACTIVE')
@ -373,7 +373,7 @@ class ServerActionsV214RbacTest(rbac_base.BaseV2ComputeRbacTest):
# NOTE(felipemonteiro): Because evacuating a server is a risky action
# to test in the gates, a 404 is coerced using a fake host. However,
# the policy check is done before the 404 is thrown.
with self.rbac_utils.override_role(self):
with self.override_role():
self.assertRaisesRegex(
lib_exc.NotFound,
"Compute host %s not found." % fake_host_name,
@ -399,7 +399,7 @@ class ServerActionsV216RbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:servers:show:host_status"])
@decorators.idempotent_id('736da575-86f8-4b2a-9902-dd37dc9a409b')
def test_show_server_host_status(self):
with self.rbac_utils.override_role(self):
with self.override_role():
server = self.servers_client.show_server(self.server_id)['server']
if 'host_status' not in server:

View File

@ -40,7 +40,7 @@ class ServerConsolesRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:os-console-output"])
@decorators.idempotent_id('90fd80f6-456c-11e7-a919-92ebcb67fe33')
def test_get_console_output(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.get_console_output(self.server_id)
@ -64,7 +64,7 @@ class ServerConsolesMaxV25RbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:os-remote-consoles"])
@decorators.idempotent_id('b0a72c02-9b15-4dcb-b186-efe8753370ab')
def test_get_vnc_console_output(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.get_vnc_console(self.server_id, type="novnc")
@ -89,6 +89,6 @@ class ServerConsolesV26RbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:os-remote-consoles"])
@decorators.idempotent_id('879597de-87e0-4da9-a60a-28c8088dc508')
def test_get_remote_console_output(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.get_remote_console(self.server_id,
"novnc", "vnc")

View File

@ -34,7 +34,7 @@ class ServerGroupsRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:os-server-groups:create"])
@decorators.idempotent_id('7f3eae94-6130-47e9-81ac-34009f55be2f')
def test_create_server_group(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.create_test_server_group()
@rbac_rule_validation.action(
@ -43,7 +43,7 @@ class ServerGroupsRbacTest(rbac_base.BaseV2ComputeRbacTest):
@decorators.idempotent_id('832d9be3-632e-47b2-93d2-5897db43e3e2')
def test_delete_server_group(self):
server_group = self.create_test_server_group()
with self.rbac_utils.override_role(self):
with self.override_role():
self.server_groups_client.delete_server_group(server_group['id'])
@rbac_rule_validation.action(
@ -51,7 +51,7 @@ class ServerGroupsRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:os-server-groups:index"])
@decorators.idempotent_id('5eccd67f-5945-483b-b1c8-de851ebfc1c1')
def test_list_server_groups(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.server_groups_client.list_server_groups()
@rbac_rule_validation.action(
@ -60,5 +60,5 @@ class ServerGroupsRbacTest(rbac_base.BaseV2ComputeRbacTest):
@decorators.idempotent_id('62534e3f-7e99-4a3d-a08e-33e056460cf2')
def test_show_server_group(self):
server_group = self.create_test_server_group()
with self.rbac_utils.override_role(self):
with self.override_role():
self.server_groups_client.show_server_group(server_group['id'])

View File

@ -37,7 +37,7 @@ class ServerMetadataRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:server-metadata:index"])
def test_list_server_metadata(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.list_server_metadata(self.server['id'])
@decorators.idempotent_id('6e76748b-2417-4fa2-b41a-c0cc4bff356b')
@ -45,7 +45,7 @@ class ServerMetadataRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:server-metadata:update_all"])
def test_set_server_metadata(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.set_server_metadata(self.server['id'], {})
@decorators.idempotent_id('1060bac4-fe16-4a77-be64-d8e482a06eab')
@ -53,7 +53,7 @@ class ServerMetadataRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:server-metadata:create"])
def test_update_server_metadata(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.update_server_metadata(self.server['id'], {})
@decorators.idempotent_id('93dd8323-d3fa-48d1-8bd6-91c1b62fc341')
@ -61,7 +61,7 @@ class ServerMetadataRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:server-metadata:show"])
def test_show_server_metadata_item(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.show_server_metadata_item(
self.server['id'], 'default_key')
@ -70,7 +70,7 @@ class ServerMetadataRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:server-metadata:update"])
def test_set_server_metadata_item(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.set_server_metadata_item(
self.server['id'], 'default_key', {'default_key': 'value2'})
@ -79,6 +79,6 @@ class ServerMetadataRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:server-metadata:delete"])
def test_delete_server_metadata_item(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.delete_server_metadata_item(
self.server['id'], 'delete_key')

View File

@ -66,7 +66,7 @@ class MigrateServerV225RbacTest(base.BaseV2ComputeRbacTest):
@decorators.idempotent_id('c6f1607c-9fed-4c00-807e-9ba675b98b1b')
def test_cold_migration(self):
server = self.create_test_server(wait_until="ACTIVE")
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.migrate_server(server['id'])
waiters.wait_for_server_status(self.servers_client,
server['id'], 'VERIFY_RESIZE')
@ -84,7 +84,7 @@ class MigrateServerV225RbacTest(base.BaseV2ComputeRbacTest):
actual_host = self._get_host_for_server(server_id)
target_host = self._get_host_other_than(actual_host)
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.live_migrate_server(
server_id, host=target_host,
block_migration=self.block_migration)

View File

@ -85,7 +85,7 @@ class MiscPolicyActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
@decorators.idempotent_id('ae84dd0b-f364-462e-b565-3457f9c019ef')
def test_reset_server_state(self):
"""Test reset server state, part of os-admin-actions."""
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.reset_state(self.server['id'], state='error')
self.addCleanup(self.servers_client.reset_state, self.server['id'],
state='active')
@ -97,7 +97,7 @@ class MiscPolicyActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
@decorators.idempotent_id('ce48c340-51c1-4cff-9b6e-0cc5ef008630')
def test_inject_network_info(self):
"""Test inject network info, part of os-admin-actions."""
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.inject_network_info(self.server['id'])
@utils.requires_ext(extension='os-admin-actions', service='compute')
@ -107,7 +107,7 @@ class MiscPolicyActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
@decorators.idempotent_id('2911a242-15c4-4fcb-80d5-80a8930661b0')
def test_reset_network(self):
"""Test reset network, part of os-admin-actions."""
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.reset_network(self.server['id'])
@testtools.skipUnless(CONF.compute_feature_enabled.change_password,
@ -121,7 +121,7 @@ class MiscPolicyActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
original_password = self.servers_client.show_password(
self.server['id'])
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.change_password(
self.server['id'], adminPass=data_utils.rand_password())
self.addCleanup(self.servers_client.change_password, self.server['id'],
@ -138,7 +138,7 @@ class MiscPolicyActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:os-config-drive"])
def test_list_servers_with_details_config_drive(self):
"""Test list servers with config_drive property in response body."""
with self.rbac_utils.override_role(self):
with self.override_role():
body = self.servers_client.list_servers(detail=True)['servers']
expected_attr = 'config_drive'
# If the first server contains "config_drive", then all the others do.
@ -155,7 +155,7 @@ class MiscPolicyActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:os-config-drive"])
def test_show_server_config_drive(self):
"""Test show server with config_drive property in response body."""
with self.rbac_utils.override_role(self):
with self.override_role():
body = self.servers_client.show_server(self.server['id'])['server']
expected_attr = 'config_drive'
if expected_attr not in body:
@ -169,7 +169,7 @@ class MiscPolicyActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:os-deferred-delete"])
def test_force_delete_server(self):
"""Test force delete server, part of os-deferred-delete."""
with self.rbac_utils.override_role(self):
with self.override_role():
# Force-deleting a server enforces os-deferred-delete.
self.servers_client.force_delete_server(self.server['id'])
@ -184,7 +184,7 @@ class MiscPolicyActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
"""Test list servers OS-EXT-AZ:availability_zone attr in resp body."""
expected_attr = 'OS-EXT-AZ:availability_zone'
with self.rbac_utils.override_role(self):
with self.override_role():
body = self.servers_client.list_servers(detail=True)['servers']
# If the first server contains `expected_attr`, then all the others do.
if expected_attr not in body[0]:
@ -202,7 +202,7 @@ class MiscPolicyActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
"""Test show server OS-EXT-AZ:availability_zone attr in resp body."""
expected_attr = 'OS-EXT-AZ:availability_zone'
with self.rbac_utils.override_role(self):
with self.override_role():
body = self.servers_client.show_server(self.server['id'])['server']
if expected_attr not in body:
raise rbac_exceptions.RbacMissingAttributeResponseBody(
@ -219,7 +219,7 @@ class MiscPolicyActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
"""Test list servers with details, with extended server attributes in
response body.
"""
with self.rbac_utils.override_role(self):
with self.override_role():
body = self.servers_client.list_servers(detail=True)['servers']
# NOTE(felipemonteiro): The attributes included below should be
@ -243,7 +243,7 @@ class MiscPolicyActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
"""Test show server with extended server attributes in response
body.
"""
with self.rbac_utils.override_role(self):
with self.override_role():
body = self.servers_client.show_server(self.server['id'])['server']
# NOTE(felipemonteiro): The attributes included below should be
@ -265,7 +265,7 @@ class MiscPolicyActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:os-extended-status"])
def test_list_servers_extended_status(self):
"""Test list servers with extended properties in response body."""
with self.rbac_utils.override_role(self):
with self.override_role():
body = self.servers_client.list_servers(detail=True)['servers']
expected_attrs = ('OS-EXT-STS:task_state', 'OS-EXT-STS:vm_state',
@ -284,7 +284,7 @@ class MiscPolicyActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:os-extended-status"])
def test_show_server_extended_status(self):
"""Test show server with extended properties in response body."""
with self.rbac_utils.override_role(self):
with self.override_role():
body = self.servers_client.show_server(self.server['id'])['server']
expected_attrs = ('OS-EXT-STS:task_state', 'OS-EXT-STS:vm_state',
@ -307,7 +307,7 @@ class MiscPolicyActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
"""
expected_attr = 'os-extended-volumes:volumes_attached'
with self.rbac_utils.override_role(self):
with self.override_role():
body = self.servers_client.list_servers(detail=True)['servers']
if expected_attr not in body[0]:
raise rbac_exceptions.RbacMissingAttributeResponseBody(
@ -326,7 +326,7 @@ class MiscPolicyActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
"""
expected_attr = 'os-extended-volumes:volumes_attached'
with self.rbac_utils.override_role(self):
with self.override_role():
body = self.servers_client.show_server(self.server['id'])['server']
if expected_attr not in body:
raise rbac_exceptions.RbacMissingAttributeResponseBody(
@ -339,7 +339,7 @@ class MiscPolicyActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:os-instance-actions"])
def test_list_instance_actions(self):
"""Test list instance actions, part of os-instance-actions."""
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.list_instance_actions(self.server['id'])
@utils.requires_ext(extension='os-instance-actions', service='compute')
@ -355,7 +355,7 @@ class MiscPolicyActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
# NOTE: "os_compute_api:os-instance-actions" is also enforced.
request_id = self.server.response['x-compute-request-id']
with self.rbac_utils.override_role(self):
with self.override_role():
instance_action = self.servers_client.show_instance_action(
self.server['id'], request_id)['instanceAction']
@ -375,7 +375,7 @@ class MiscPolicyActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:os-keypairs"])
@decorators.idempotent_id('81e6fa34-c06b-42ca-b195-82bf8699b940')
def test_show_server_keypair(self):
with self.rbac_utils.override_role(self):
with self.override_role():
result = self.servers_client.show_server(self.server['id'])[
'server']
if 'key_name' not in result:
@ -389,7 +389,7 @@ class MiscPolicyActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:os-keypairs"])
@decorators.idempotent_id('41ca4280-ec59-4b80-a9b1-6bc6366faf39')
def test_list_servers_keypairs(self):
with self.rbac_utils.override_role(self):
with self.override_role():
result = self.servers_client.list_servers(detail=True)['servers']
if 'key_name' not in result[0]:
raise rbac_exceptions.RbacMissingAttributeResponseBody(
@ -401,7 +401,7 @@ class MiscPolicyActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
@decorators.idempotent_id('b81e10fb-1864-498f-8c1d-5175c6fec5fb')
def test_lock_server(self):
"""Test lock server, part of os-lock-server."""
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.lock_server(self.server['id'])
self.addCleanup(self.servers_client.unlock_server, self.server['id'])
@ -414,7 +414,7 @@ class MiscPolicyActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
self.servers_client.lock_server(self.server['id'])
self.addCleanup(self.servers_client.unlock_server, self.server['id'])
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.unlock_server(self.server['id'])
@rbac_rule_validation.action(
@ -432,7 +432,7 @@ class MiscPolicyActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
self.os_admin.servers_client.lock_server(self.server['id'])
self.addCleanup(self.servers_client.unlock_server, self.server['id'])
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.unlock_server(self.server['id'])
@utils.requires_ext(extension='os-rescue', service='compute')
@ -442,7 +442,7 @@ class MiscPolicyActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
@decorators.idempotent_id('fbbb2afc-ed0e-4552-887d-ac00fb5d436e')
def test_rescue_server(self):
"""Test rescue server, part of os-rescue."""
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.rescue_server(self.server['id'])
waiters.wait_for_server_status(
self.servers_client, self.server['id'], 'RESCUE')
@ -458,7 +458,7 @@ class MiscPolicyActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
waiters.wait_for_server_status(
self.servers_client, self.server['id'], 'RESCUE')
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.unrescue_server(self.server['id'])
waiters.wait_for_server_status(
self.servers_client, self.server['id'], 'ACTIVE')
@ -470,7 +470,7 @@ class MiscPolicyActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
@decorators.idempotent_id('5dabfcc4-bedb-417b-8247-b3ee7c5c0f3e')
def test_show_server_diagnostics(self):
"""Test show server diagnostics, part of os-server-diagnostics."""
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.show_server_diagnostics(self.server['id'])
@utils.requires_ext(extension='os-server-password', service='compute')
@ -480,7 +480,7 @@ class MiscPolicyActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:os-server-password"])
def test_delete_server_password(self):
"""Test delete server password, part of os-server-password."""
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.delete_password(self.server['id'])
@utils.requires_ext(extension='os-server-password', service='compute')
@ -490,7 +490,7 @@ class MiscPolicyActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
@decorators.idempotent_id('f677971a-7d20-493c-977f-6ff0a74b5b2c')
def test_get_server_password(self):
"""Test show server password, part of os-server-password."""
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.show_password(self.server['id'])
@testtools.skipIf(CONF.policy_feature_enabled.removed_nova_policies_stein,
@ -510,7 +510,7 @@ class MiscPolicyActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
expected_attrs = ('OS-SRV-USG:launched_at',
'OS-SRV-USG:terminated_at')
with self.rbac_utils.override_role(self):
with self.override_role():
body = self.servers_client.show_server(self.server['id'])['server']
for expected_attr in expected_attrs:
if expected_attr not in body:
@ -524,7 +524,7 @@ class MiscPolicyActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
@decorators.idempotent_id('2aef094f-0452-4df6-a66a-0ec22a92b16e')
def test_list_simple_tenant_usages(self):
"""Test list tenant usages, part of os-simple-tenant-usage."""
with self.rbac_utils.override_role(self):
with self.override_role():
self.tenant_usages_client.list_tenant_usages()
@utils.requires_ext(extension='os-simple-tenant-usage', service='compute')
@ -536,7 +536,7 @@ class MiscPolicyActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
"""Test show tenant usage, part of os-simple-tenant-usage."""
tenant_id = self.os_primary.credentials.tenant_id
with self.rbac_utils.override_role(self):
with self.override_role():
self.tenant_usages_client.show_tenant_usage(tenant_id=tenant_id)
@testtools.skipUnless(CONF.compute_feature_enabled.suspend,
@ -547,7 +547,7 @@ class MiscPolicyActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:os-suspend-server:suspend"])
def test_suspend_server(self):
"""Test suspend server, part of os-suspend-server."""
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.suspend_server(self.server['id'])
self.addCleanup(self.servers_client.resume_server, self.server['id'])
waiters.wait_for_server_status(
@ -565,7 +565,7 @@ class MiscPolicyActionsRbacTest(rbac_base.BaseV2ComputeRbacTest):
waiters.wait_for_server_status(
self.servers_client, self.server['id'], 'SUSPENDED')
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.resume_server(self.server['id'])
waiters.wait_for_server_status(
self.servers_client, self.server['id'], 'ACTIVE')
@ -657,7 +657,7 @@ class MiscPolicyActionsNetworkRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:os-attach-interfaces"])
def test_list_interfaces(self):
"""Test list interfaces, part of os-attach-interfaces."""
with self.rbac_utils.override_role(self):
with self.override_role():
self.interfaces_client.list_interfaces(self.server['id'])
@decorators.idempotent_id('1b9cf7db-dc50-48a2-8eb9-8c25af5e934a')
@ -670,7 +670,7 @@ class MiscPolicyActionsNetworkRbacTest(rbac_base.BaseV2ComputeRbacTest):
def test_show_interface(self):
"""Test show interfaces, part of os-attach-interfaces."""
interface = self._attach_interface_to_server()
with self.rbac_utils.override_role(self):
with self.override_role():
self.interfaces_client.show_interface(
self.server['id'], interface['port_id'])
@ -684,7 +684,7 @@ class MiscPolicyActionsNetworkRbacTest(rbac_base.BaseV2ComputeRbacTest):
def test_create_interface(self):
"""Test create interface, part of os-attach-interfaces."""
network_id = self.network['id']
with self.rbac_utils.override_role(self):
with self.override_role():
interface = self.interfaces_client.create_interface(
self.server['id'], net_id=network_id)['interfaceAttachment']
self.addCleanup(
@ -709,7 +709,7 @@ class MiscPolicyActionsNetworkRbacTest(rbac_base.BaseV2ComputeRbacTest):
"""Test delete interface, part of os-attach-interfaces."""
interface = self._attach_interface_to_server()
with self.rbac_utils.override_role(self):
with self.override_role():
self.interfaces_client.delete_interface(self.server['id'],
interface['port_id'])
waiters.wait_for_interface_detach(
@ -722,7 +722,7 @@ class MiscPolicyActionsNetworkRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:ips:index"])
def test_list_addresses(self):
"""Test list server addresses, part of ips policy family."""
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.list_addresses(self.server['id'])
@decorators.idempotent_id('fa43e7e5-0db9-48eb-9c6b-c11eb766b8e4')
@ -736,7 +736,7 @@ class MiscPolicyActionsNetworkRbacTest(rbac_base.BaseV2ComputeRbacTest):
'addresses']
address = next(iter(addresses))
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.list_addresses_by_network(
self.server['id'], address)
@ -763,7 +763,7 @@ class MiscPolicyActionsNetworkRbacTest(rbac_base.BaseV2ComputeRbacTest):
self.interfaces_client.delete_interface,
self.server['id'], interface['port_id'])
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.add_fixed_ip(self.server['id'],
networkId=network_id)
# Get the Fixed IP from server.

View File

@ -48,7 +48,7 @@ class ComputeServersRbacTest(base.BaseV2ComputeRbacTest):
rules=["os_compute_api:servers:create"])
@decorators.idempotent_id('4f34c73a-6ddc-4677-976f-71320fa855bd')
def test_create_server(self):
with self.rbac_utils.override_role(self):
with self.override_role():
server = self.servers_client.create_server(
name=data_utils.rand_name(self.__class__.__name__ + '-Server'),
flavorRef=CONF.compute.flavor_ref,
@ -73,7 +73,7 @@ class ComputeServersRbacTest(base.BaseV2ComputeRbacTest):
host = list(hosts[0].keys())[0]
availability_zone = 'nova:' + host
with self.rbac_utils.override_role(self):
with self.override_role():
server = self.servers_client.create_server(
name=data_utils.rand_name(self.__class__.__name__ + '-Server'),
flavorRef=CONF.compute.flavor_ref,
@ -103,7 +103,7 @@ class ComputeServersRbacTest(base.BaseV2ComputeRbacTest):
'delete_on_termination': False}]
device_mapping = {'block_device_mapping_v2': bd_map_v2}
with self.rbac_utils.override_role(self):
with self.override_role():
# Use image_id='' to avoid using the default image in tempest.conf.
server = self.servers_client.create_server(
name=data_utils.rand_name(self.__class__.__name__ + '-Server'),
@ -151,7 +151,7 @@ class ComputeServersRbacTest(base.BaseV2ComputeRbacTest):
network = _create_network_resources()
network_id = {'uuid': network['id']}
with self.rbac_utils.override_role(self):
with self.override_role():
server = self.servers_client.create_server(
name=data_utils.rand_name(self.__class__.__name__ + '-Server'),
flavorRef=CONF.compute.flavor_ref,
@ -168,7 +168,7 @@ class ComputeServersRbacTest(base.BaseV2ComputeRbacTest):
def test_delete_server(self):
server = self.create_test_server(wait_until='ACTIVE')
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.delete_server(server['id'])
waiters.wait_for_server_termination(
self.servers_client, server['id'])
@ -179,7 +179,7 @@ class ComputeServersRbacTest(base.BaseV2ComputeRbacTest):
@decorators.idempotent_id('077b17cb-5621-43b9-8adf-5725f0d7a863')
def test_update_server(self):
new_name = data_utils.rand_name(self.__class__.__name__ + '-server')
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.update_server(self.server['id'],
name=new_name)
waiters.wait_for_server_status(self.servers_client,

View File

@ -49,7 +49,7 @@ class ServerTagsRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:os-server-tags:index"])
def test_list_tags(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.list_tags(self.server['id'])
@decorators.idempotent_id('9297c99e-94eb-429f-93cf-9b1838e33622')
@ -58,7 +58,7 @@ class ServerTagsRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:os-server-tags:show"])
def test_check_tag_existence(self):
tag_name = self._add_tag_to_server()
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.check_tag_existence(self.server['id'],
tag_name)
@ -67,7 +67,7 @@ class ServerTagsRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:os-server-tags:update"])
def test_update_tag(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self._add_tag_to_server()
@decorators.idempotent_id('115c2694-00aa-41ee-99f6-9eab4040c182')
@ -76,7 +76,7 @@ class ServerTagsRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:os-server-tags:delete"])
def test_delete_tag(self):
tag_name = self._add_tag_to_server()
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.delete_tag(self.server['id'], tag_name)
@decorators.idempotent_id('a8e19b87-6580-4bc8-9933-e62561ff667d')
@ -85,7 +85,7 @@ class ServerTagsRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:os-server-tags:update_all"])
def test_update_all_tags(self):
new_tag_name = data_utils.rand_name(self.__class__.__name__ + '-tag')
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.update_all_tags(self.server['id'],
[new_tag_name])
@ -94,5 +94,5 @@ class ServerTagsRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:os-server-tags:delete_all"])
def test_delete_all_tags(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.delete_all_tags(self.server['id'])

View File

@ -133,7 +133,7 @@ class ServerVolumeAttachmentRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:os-volumes-attachments:index"])
@decorators.idempotent_id('529b668b-6edb-41d5-8886-d7dbd0614678')
def test_list_volume_attachments(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.list_volume_attachments(self.server['id'])
@decorators.attr(type='slow')
@ -142,7 +142,7 @@ class ServerVolumeAttachmentRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:os-volumes-attachments:create"])
@decorators.idempotent_id('21c2c3fd-fbe8-41b1-8ef8-115ec47d54c1')
def test_create_volume_attachment(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.attach_volume(self.server['id'],
volumeId=self.volume['id'])
# On teardown detach the volume and wait for it to be available. This
@ -164,7 +164,7 @@ class ServerVolumeAttachmentRbacTest(rbac_base.BaseV2ComputeRbacTest):
def test_show_volume_attachment(self):
attachment = self.attach_volume(self.server, self.volume)
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.show_volume_attachment(
self.server['id'], attachment['id'])
@ -181,7 +181,7 @@ class ServerVolumeAttachmentRbacTest(rbac_base.BaseV2ComputeRbacTest):
# Attach "volume1" to server
self.attach_volume(self.server, volume1)
with self.rbac_utils.override_role(self):
with self.override_role():
# Swap volume from "volume1" to "volume2"
self.servers_client.update_attached_volume(
self.server['id'], volume1['id'], volumeId=volume2['id'])
@ -201,7 +201,7 @@ class ServerVolumeAttachmentRbacTest(rbac_base.BaseV2ComputeRbacTest):
def test_delete_volume_attachment(self):
self.attach_volume(self.server, self.volume)
with self.rbac_utils.override_role(self):
with self.override_role():
self.servers_client.detach_volume(self.server['id'],
self.volume['id'])
waiters.wait_for_volume_resource_status(self.volumes_client,

View File

@ -34,5 +34,5 @@ class ServicesRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:os-services"])
@decorators.idempotent_id('7472261b-9c6d-453a-bcb3-aecaa29ad281')
def test_list_services(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.services_client.list_services()['services']

View File

@ -56,5 +56,5 @@ class TenantNetworksRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:os-tenant-networks"])
def test_list_show_tenant_networks(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.tenant_networks_client.list_tenant_networks()

View File

@ -53,7 +53,7 @@ class VirtualInterfacesRbacTest(rbac_base.BaseV2ComputeRbacTest):
If Neutron is available, then call the API and expect it to fail
with a 400 BadRequest (policy enforcement is done before that happens).
"""
with self.rbac_utils.override_role(self):
with self.override_role():
if CONF.service_available.neutron:
msg = ("Listing virtual interfaces is not supported by this "
"cloud.")

View File

@ -62,7 +62,7 @@ class VolumeRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:os-volumes"])
def test_create_volume(self):
with self.rbac_utils.override_role(self):
with self.override_role():
volume = self.volumes_extensions_client.create_volume(
size=CONF.volume.volume_size)['volume']
waiters.wait_for_volume_resource_status(self.volumes_client,
@ -75,7 +75,7 @@ class VolumeRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:os-volumes"])
def test_list_volumes(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.volumes_extensions_client.list_volumes()
@decorators.idempotent_id('4ba0a820-040f-488b-86bb-be2e920ea12c')
@ -83,7 +83,7 @@ class VolumeRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:os-volumes"])
def test_show_volume(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.volumes_extensions_client.show_volume(self.volume['id'])
@decorators.idempotent_id('6e7870f2-1bb2-4b58-96f8-6782071ef327')
@ -92,7 +92,7 @@ class VolumeRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:os-volumes"])
def test_delete_volume(self):
volume = self.create_volume()
with self.rbac_utils.override_role(self):
with self.override_role():
self.volumes_extensions_client.delete_volume(volume['id'])
@decorators.idempotent_id('0c3eaa4f-69d6-4a13-9dda-19585f36b1c1')
@ -101,7 +101,7 @@ class VolumeRbacTest(rbac_base.BaseV2ComputeRbacTest):
rules=["os_compute_api:os-volumes"])
def test_create_snapshot(self):
s_name = data_utils.rand_name(self.__class__.__name__ + '-Snapshot')
with self.rbac_utils.override_role(self):
with self.override_role():
snapshot = self.snapshots_extensions_client.create_snapshot(
volume_id=self.volume['id'], display_name=s_name)['snapshot']
self.addCleanup(test_utils.call_and_ignore_notfound_exc,
@ -112,7 +112,7 @@ class VolumeRbacTest(rbac_base.BaseV2ComputeRbacTest):
service="nova",
rules=["os_compute_api:os-volumes"])
def test_list_snapshots(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.snapshots_extensions_client.list_snapshots()
@decorators.idempotent_id('19c2e6bd-585b-472f-a8d7-71ea9299c655')
@ -125,7 +125,7 @@ class VolumeRbacTest(rbac_base.BaseV2ComputeRbacTest):
volume_id=self.volume['id'], display_name=s_name)['snapshot']
self.addCleanup(self._delete_snapshot, snapshot['id'])
with self.rbac_utils.override_role(self):
with self.override_role():
self.snapshots_extensions_client.show_snapshot(snapshot['id'])
@decorators.idempotent_id('f4f5635c-416c-11e7-a919-92ebcb67fe33')
@ -142,7 +142,7 @@ class VolumeRbacTest(rbac_base.BaseV2ComputeRbacTest):
self.snapshots_extensions_client, snapshot['id'],
'available')
with self.rbac_utils.override_role(self):
with self.override_role():
self.snapshots_extensions_client.delete_snapshot(snapshot['id'])
self.snapshots_extensions_client.wait_for_resource_deletion(
snapshot['id'])

View File

@ -56,7 +56,7 @@ class ApplicationCredentialsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
service="keystone",
rules=["identity:create_application_credential"])
def test_create_application_credential(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self._create_application_credential()
@decorators.idempotent_id('58b3c3a0-5ad0-44f7-8da7-0736f71f7168')
@ -64,7 +64,7 @@ class ApplicationCredentialsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
service="keystone",
rules=["identity:list_application_credentials"])
def test_list_application_credentials(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.application_credentials_client.list_application_credentials(
user_id=self.user_id)
@ -74,7 +74,7 @@ class ApplicationCredentialsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
rules=["identity:get_application_credential"])
def test_show_application_credential(self):
app_cred = self._create_application_credential()
with self.rbac_utils.override_role(self):
with self.override_role():
self.application_credentials_client.show_application_credential(
user_id=self.user_id, application_credential_id=app_cred['id'])
@ -84,6 +84,6 @@ class ApplicationCredentialsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
rules=["identity:delete_application_credential"])
def test_delete_application_credential(self):
app_cred = self._create_application_credential()
with self.rbac_utils.override_role(self):
with self.override_role():
self.application_credentials_client.delete_application_credential(
user_id=self.user_id, application_credential_id=app_cred['id'])

View File

@ -34,12 +34,12 @@ class IdentityAuthV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
@rbac_rule_validation.action(service="keystone",
rules=["identity:get_auth_projects"])
def test_list_auth_projects(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.identity_client.list_auth_projects()
@decorators.idempotent_id('6a40af0d-7265-4657-b6b2-87a2828e263e')
@rbac_rule_validation.action(service="keystone",
rules=["identity:get_auth_domains"])
def test_list_auth_domain(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.identity_client.list_auth_domains()

View File

@ -42,7 +42,7 @@ class IdentityCredentialsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
def test_create_credential(self):
project = self.setup_test_project()
user = self.setup_test_user(project_id=project['id'])
with self.rbac_utils.override_role(self):
with self.override_role():
self.setup_test_credential(user=user)
@rbac_rule_validation.action(service="keystone",
@ -53,7 +53,7 @@ class IdentityCredentialsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
new_keys = [data_utils.rand_uuid_hex(),
data_utils.rand_uuid_hex()]
with self.rbac_utils.override_role(self):
with self.override_role():
self.creds_client.update_credential(
credential['id'],
credential=credential,
@ -67,7 +67,7 @@ class IdentityCredentialsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
def test_delete_credential(self):
credential = self._create_user_project_and_credential()
with self.rbac_utils.override_role(self):
with self.override_role():
self.creds_client.delete_credential(credential['id'])
@rbac_rule_validation.action(service="keystone",
@ -76,12 +76,12 @@ class IdentityCredentialsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
def test_show_credential(self):
credential = self._create_user_project_and_credential()
with self.rbac_utils.override_role(self):
with self.override_role():
self.creds_client.show_credential(credential['id'])
@rbac_rule_validation.action(service="keystone",
rules=["identity:list_credentials"])
@decorators.idempotent_id('3de303e2-12a7-4811-805a-f18906472038')
def test_list_credentials(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.creds_client.list_credentials()

View File

@ -56,21 +56,21 @@ class DomainConfigurationV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
rules=["identity:create_domain_config"])
@decorators.idempotent_id('6bdaecd4-0843-4ed6-ab64-3a57ab0cd115')
def test_create_domain_config(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self._create_domain_config(self.domain_id)
@rbac_rule_validation.action(service="keystone",
rules=["identity:get_domain_config"])
@decorators.idempotent_id('6bdaecd4-0843-4ed6-ab64-3a57ab0cd118')
def test_show_domain_config(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.domain_config_client.show_domain_config(self.domain_id)
@decorators.idempotent_id('1b539f95-4991-4e09-960f-fa771e1007d7')
@rbac_rule_validation.action(service="keystone",
rules=["identity:get_domain_config"])
def test_show_domain_group_config(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.domain_config_client.show_domain_group_config(
self.domain_id, 'identity')
@ -78,7 +78,7 @@ class DomainConfigurationV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
@rbac_rule_validation.action(service="keystone",
rules=["identity:get_domain_config"])
def test_show_domain_group_option_config(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.domain_config_client.show_domain_group_option_config(
self.domain_id, 'identity', 'driver')
@ -89,7 +89,7 @@ class DomainConfigurationV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
def test_show_security_compliance_domain_config(self):
# The "security_compliance" group can only be shown for the default
# domain.
with self.rbac_utils.override_role(self):
with self.override_role():
self.domain_config_client.show_domain_group_config(
CONF.identity.default_domain_id, 'security_compliance')
@ -97,21 +97,21 @@ class DomainConfigurationV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
@rbac_rule_validation.action(service="keystone",
rules=["identity:get_domain_config_default"])
def test_show_default_config_settings(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.domain_config_client.show_default_config_settings()
@decorators.idempotent_id('63183377-251f-4622-81f0-6b58a8a285c9')
@rbac_rule_validation.action(service="keystone",
rules=["identity:get_domain_config_default"])
def test_show_default_group_config(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.domain_config_client.show_default_group_config('identity')
@decorators.idempotent_id('6440e9c1-e8da-474d-9118-89996fffe5f8')
@rbac_rule_validation.action(service="keystone",
rules=["identity:get_domain_config_default"])
def test_show_default_group_option(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.domain_config_client.show_default_group_option('identity',
'driver')
@ -120,7 +120,7 @@ class DomainConfigurationV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
@decorators.idempotent_id('6bdaecd4-0843-4ed6-ab64-3a57ab0cd116')
def test_update_domain_config(self):
updated_config = {'ldap': {'url': data_utils.rand_url()}}
with self.rbac_utils.override_role(self):
with self.override_role():
self.domain_config_client.update_domain_config(
self.domain_id, **updated_config)
@ -128,7 +128,7 @@ class DomainConfigurationV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
@rbac_rule_validation.action(service="keystone",
rules=["identity:update_domain_config"])
def test_update_domain_group_config(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.domain_config_client.update_domain_group_config(
self.domain_id, 'identity', identity=self.identity)
@ -136,7 +136,7 @@ class DomainConfigurationV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
@rbac_rule_validation.action(service="keystone",
rules=["identity:update_domain_config"])
def test_update_domain_group_option_config(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.domain_config_client.update_domain_group_option_config(
self.domain_id, 'identity', 'driver', driver='ldap')
@ -144,14 +144,14 @@ class DomainConfigurationV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
rules=["identity:delete_domain_config"])
@decorators.idempotent_id('6bdaecd4-0843-4ed6-ab64-3a57ab0cd117')
def test_delete_domain_config(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.domain_config_client.delete_domain_config(self.domain_id)
@decorators.idempotent_id('f479694b-df02-4d5a-88b6-c8b52f9341eb')
@rbac_rule_validation.action(service="keystone",
rules=["identity:delete_domain_config"])
def test_delete_domain_group_config(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.domain_config_client.delete_domain_group_config(
self.domain_id, 'identity')
@ -159,6 +159,6 @@ class DomainConfigurationV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
@rbac_rule_validation.action(service="keystone",
rules=["identity:delete_domain_config"])
def test_delete_domain_group_option_config(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.domain_config_client.delete_domain_group_option_config(
self.domain_id, 'identity', 'driver')

View File

@ -26,7 +26,7 @@ class IdentityDomainsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
rules=["identity:create_domain"])
@decorators.idempotent_id('6bdaecd4-0843-4ed6-ab64-3a57ab0cd110')
def test_create_domain(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.setup_test_domain()
@rbac_rule_validation.action(service="keystone",
@ -36,7 +36,7 @@ class IdentityDomainsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
domain = self.setup_test_domain()
new_domain_name = data_utils.rand_name(
self.__class__.__name__ + '-test_update_domain')
with self.rbac_utils.override_role(self):
with self.override_role():
self.domains_client.update_domain(domain['id'],
domain=domain,
name=new_domain_name)
@ -50,7 +50,7 @@ class IdentityDomainsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
self.domains_client.update_domain(domain['id'],
domain=domain,
enabled=False)
with self.rbac_utils.override_role(self):
with self.override_role():
self.domains_client.delete_domain(domain['id'])
@rbac_rule_validation.action(service="keystone",
@ -58,12 +58,12 @@ class IdentityDomainsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
@decorators.idempotent_id('6bdaecd4-0843-4ed6-ab64-3a57ab0cd113')
def test_show_domain(self):
domain = self.setup_test_domain()
with self.rbac_utils.override_role(self):
with self.override_role():
self.domains_client.show_domain(domain['id'])
@rbac_rule_validation.action(service="keystone",
rules=["identity:list_domains"])
@decorators.idempotent_id('6bdaecd4-0843-4ed6-ab64-3a57ab0cd114')
def test_list_domains(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.domains_client.list_domains()

View File

@ -27,7 +27,7 @@ class IdentityEndpointsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
@decorators.idempotent_id('6bdaecd4-0843-4ed6-ab64-3a57ab0cd127')
def test_create_endpoint(self):
service = self.setup_test_service()
with self.rbac_utils.override_role(self):
with self.override_role():
self.setup_test_endpoint(service=service)
@rbac_rule_validation.action(service="keystone",
@ -37,7 +37,7 @@ class IdentityEndpointsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
endpoint = self.setup_test_endpoint()
new_url = data_utils.rand_url()
with self.rbac_utils.override_role(self):
with self.override_role():
self.endpoints_client.update_endpoint(
endpoint["id"],
url=new_url)
@ -48,7 +48,7 @@ class IdentityEndpointsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
def test_delete_endpoint(self):
endpoint = self.setup_test_endpoint()
with self.rbac_utils.override_role(self):
with self.override_role():
self.endpoints_client.delete_endpoint(endpoint['id'])
@rbac_rule_validation.action(service="keystone",
@ -57,12 +57,12 @@ class IdentityEndpointsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
def test_show_endpoint(self):
endpoint = self.setup_test_endpoint()
with self.rbac_utils.override_role(self):
with self.override_role():
self.endpoints_client.show_endpoint(endpoint['id'])
@rbac_rule_validation.action(service="keystone",
rules=["identity:list_endpoints"])
@decorators.idempotent_id('6bdaecd4-0843-4ed6-ab64-3a57ab0cd131')
def test_list_endpoints(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.endpoints_client.list_endpoints()

View File

@ -61,21 +61,21 @@ class EndpointFilterGroupsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
rules=["identity:create_endpoint_group"])
@decorators.idempotent_id('b4765906-52ec-477b-b441-a8508ced68e3')
def test_create_endpoint_group(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self._create_endpoint_group(ignore_not_found=True)
@rbac_rule_validation.action(service="keystone",
rules=["identity:list_endpoint_groups"])
@decorators.idempotent_id('089aa3a7-ba1f-4f70-a1cf-f298a845058a')
def test_list_endpoint_groups(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.endpoint_groups_client.list_endpoint_groups()
@decorators.idempotent_id('5c16368d-1485-4c28-9803-db3fa3510623')
@rbac_rule_validation.action(service="keystone",
rules=["identity:get_endpoint_group"])
def test_check_endpoint_group(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.endpoint_groups_client.check_endpoint_group(
self.endpoint_group_id)
@ -83,7 +83,7 @@ class EndpointFilterGroupsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
rules=["identity:get_endpoint_group"])
@decorators.idempotent_id('bd2b6fb8-661f-4255-84b2-50fea4a1dc61')
def test_show_endpoint_group(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.endpoint_groups_client.show_endpoint_group(
self.endpoint_group_id)
@ -94,7 +94,7 @@ class EndpointFilterGroupsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
updated_name = data_utils.rand_name(
self.__class__.__name__ + '-EPFilterGroup')
with self.rbac_utils.override_role(self):
with self.override_role():
self.endpoint_groups_client.update_endpoint_group(
self.endpoint_group_id, name=updated_name)
@ -104,6 +104,6 @@ class EndpointFilterGroupsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
def test_delete_endpoint_group(self):
endpoint_group_id = self._create_endpoint_group(ignore_not_found=True)
with self.rbac_utils.override_role(self):
with self.override_role():
self.endpoint_groups_client.delete_endpoint_group(
endpoint_group_id)

View File

@ -48,7 +48,7 @@ class EndpointFilterProjectsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
@decorators.idempotent_id('9199ec13-816d-4efe-b8b1-e1cd026b9747')
def test_add_endpoint_to_project(self):
# Adding endpoints to projects
with self.rbac_utils.override_role(self):
with self.override_role():
self._add_endpoint_to_project(ignore_not_found=True)
@rbac_rule_validation.action(
@ -56,7 +56,7 @@ class EndpointFilterProjectsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
rules=["identity:list_projects_for_endpoint"])
@decorators.idempotent_id('f53dca42-ec8a-48e9-924b-0bbe6c99727f')
def test_list_projects_for_endpoint(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.endpoint_filter_client.list_projects_for_endpoint(
self.endpoint['id'])
@ -66,7 +66,7 @@ class EndpointFilterProjectsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
@decorators.idempotent_id('0c1425eb-833c-4aa1-a21d-52ffa41fdc6a')
def test_check_endpoint_in_project(self):
self._add_endpoint_to_project()
with self.rbac_utils.override_role(self):
with self.override_role():
self.endpoint_filter_client.check_endpoint_in_project(
self.project['id'], self.endpoint['id'])
@ -75,7 +75,7 @@ class EndpointFilterProjectsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
rules=["identity:list_endpoints_for_project"])
@decorators.idempotent_id('5d86c659-c6ad-41e0-854e-3823e95c7cc2')
def test_list_endpoints_in_project(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.endpoint_filter_client.list_endpoints_in_project(
self.project['id'])
@ -85,6 +85,6 @@ class EndpointFilterProjectsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
@decorators.idempotent_id('b4e21c10-4f47-427b-9b8a-f5b5601adfda')
def test_remove_endpoint_from_project(self):
self._add_endpoint_to_project(ignore_not_found=True)
with self.rbac_utils.override_role(self):
with self.override_role():
self.endpoint_filter_client.delete_endpoint_from_project(
self.project['id'], self.endpoint['id'])

View File

@ -33,7 +33,7 @@ class IdentityGroupsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
rules=["identity:create_group"])
@decorators.idempotent_id('88377f51-9074-4d64-a22f-f8931d048c9a')
def test_create_group(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.setup_test_group()
@rbac_rule_validation.action(service="keystone",
@ -44,7 +44,7 @@ class IdentityGroupsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
new_group_name = data_utils.rand_name(
self.__class__.__name__ + '-group')
with self.rbac_utils.override_role(self):
with self.override_role():
self.groups_client.update_group(group['id'], name=new_group_name)
@rbac_rule_validation.action(service="keystone",
@ -53,7 +53,7 @@ class IdentityGroupsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
def test_delete_group(self):
group = self.setup_test_group()
with self.rbac_utils.override_role(self):
with self.override_role():
self.groups_client.delete_group(group['id'])
@rbac_rule_validation.action(service="keystone",
@ -62,14 +62,14 @@ class IdentityGroupsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
def test_show_group(self):
group = self.setup_test_group()
with self.rbac_utils.override_role(self):
with self.override_role():
self.groups_client.show_group(group['id'])
@rbac_rule_validation.action(service="keystone",
rules=["identity:list_groups"])
@decorators.idempotent_id('c4d0f76b-735f-4fd0-868b-0006bc420ff4')
def test_list_groups(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.groups_client.list_groups()
@rbac_rule_validation.action(service="keystone",
@ -79,7 +79,7 @@ class IdentityGroupsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
group = self.setup_test_group()
user = self.setup_test_user()
with self.rbac_utils.override_role(self):
with self.override_role():
self.groups_client.add_group_user(group['id'], user['id'])
@rbac_rule_validation.action(service="keystone",
@ -88,7 +88,7 @@ class IdentityGroupsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
def test_remove_user_group(self):
group_id, user_id = self._create_user_and_add_to_new_group()
with self.rbac_utils.override_role(self):
with self.override_role():
self.groups_client.delete_group_user(group_id, user_id)
@rbac_rule_validation.action(service="keystone",
@ -97,7 +97,7 @@ class IdentityGroupsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
def test_list_user_group(self):
group = self.setup_test_group()
with self.rbac_utils.override_role(self):
with self.override_role():
self.groups_client.list_group_users(group['id'])
@rbac_rule_validation.action(service="keystone",
@ -106,5 +106,5 @@ class IdentityGroupsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
def test_check_user_group(self):
group_id, user_id = self._create_user_and_add_to_new_group()
with self.rbac_utils.override_role(self):
with self.override_role():
self.groups_client.check_group_user_existence(group_id, user_id)

View File

@ -37,7 +37,7 @@ class IdentityConsumersV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
rules=["identity:create_consumer"])
@decorators.idempotent_id('0f148510-63bf-11e6-4522-080044d0d970')
def test_create_consumer(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self._create_consumer()
@rbac_rule_validation.action(service="keystone",
@ -46,7 +46,7 @@ class IdentityConsumersV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
def test_delete_consumer(self):
consumer = self._create_consumer()
with self.rbac_utils.override_role(self):
with self.override_role():
self.consumers_client.delete_consumer(consumer['id'])
@rbac_rule_validation.action(service="keystone",
@ -57,7 +57,7 @@ class IdentityConsumersV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
updated_description = data_utils.rand_name(
self.__class__.__name__ + '-IdentityConsumer')
with self.rbac_utils.override_role(self):
with self.override_role():
self.consumers_client.update_consumer(consumer['id'],
updated_description)
@ -67,12 +67,12 @@ class IdentityConsumersV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
def test_show_consumer(self):
consumer = self._create_consumer()
with self.rbac_utils.override_role(self):
with self.override_role():
self.consumers_client.show_consumer(consumer['id'])
@rbac_rule_validation.action(service="keystone",
rules=["identity:list_consumers"])
@decorators.idempotent_id('0f148510-63bf-11e6-4522-080044d0d975')
def test_list_consumers(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.consumers_client.list_consumers()

View File

@ -85,7 +85,7 @@ class IdentityOAuthTokensV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
def test_authorize_request_token(self):
_, request_token = self._create_consumer_and_request_token()
with self.rbac_utils.override_role(self):
with self.override_role():
self.oauth_token_client.authorize_request_token(
request_token['oauth_token'],
self.role_ids)
@ -96,7 +96,7 @@ class IdentityOAuthTokensV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
def test_get_access_token(self):
access_token = self._create_access_token()
with self.rbac_utils.override_role(self):
with self.override_role():
self.oauth_token_client.get_access_token(self.user_id,
access_token)
@ -106,7 +106,7 @@ class IdentityOAuthTokensV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
def test_get_access_token_role(self):
access_token = self._create_access_token()
with self.rbac_utils.override_role(self):
with self.override_role():
self.oauth_token_client.get_access_token_role(
self.user_id, access_token, self.role_ids[0])
@ -114,7 +114,7 @@ class IdentityOAuthTokensV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
rules=["identity:list_access_tokens"])
@decorators.idempotent_id('0f148510-63bf-11e6-4522-080044d0d979')
def test_list_access_tokens(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.oauth_token_client.list_access_tokens(self.user_id)
@rbac_rule_validation.action(service="keystone",
@ -123,7 +123,7 @@ class IdentityOAuthTokensV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
def test_list_access_token_roles(self):
access_token = self._create_access_token()
with self.rbac_utils.override_role(self):
with self.override_role():
self.oauth_token_client.list_access_token_roles(
self.user_id, access_token)
@ -133,6 +133,6 @@ class IdentityOAuthTokensV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
def test_revoke_access_token(self):
access_token = self._create_access_token()
with self.rbac_utils.override_role(self):
with self.override_role():
self.oauth_token_client.revoke_access_token(
self.user_id, access_token)

View File

@ -26,7 +26,7 @@ class IdentityPoliciesV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
rules=["identity:create_policy"])
@decorators.idempotent_id('de2f7ecb-fbf0-41f3-abf4-b97b5e082fd5')
def test_create_policy(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.setup_test_policy()
@rbac_rule_validation.action(service="keystone",
@ -37,7 +37,7 @@ class IdentityPoliciesV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
updated_policy_type = data_utils.rand_name(
self.__class__.__name__ + '-policy_type')
with self.rbac_utils.override_role(self):
with self.override_role():
self.policies_client.update_policy(policy['id'],
type=updated_policy_type)
@ -47,7 +47,7 @@ class IdentityPoliciesV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
def test_delete_policy(self):
policy = self.setup_test_policy()
with self.rbac_utils.override_role(self):
with self.override_role():
self.policies_client.delete_policy(policy['id'])
@rbac_rule_validation.action(service="keystone",
@ -56,12 +56,12 @@ class IdentityPoliciesV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
def test_show_policy(self):
policy = self.setup_test_policy()
with self.rbac_utils.override_role(self):
with self.override_role():
self.policies_client.show_policy(policy['id'])
@rbac_rule_validation.action(service="keystone",
rules=["identity:list_policies"])
@decorators.idempotent_id('35a56161-4054-4237-8a78-7ce805dce202')
def test_list_policies(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.policies_client.list_policies()

View File

@ -61,7 +61,7 @@ class IdentityPolicyAssociationRbacTest(
rules=["identity:create_policy_association_for_endpoint"])
@decorators.idempotent_id('1b3f4f62-4f4a-4d27-be27-9a113058597f')
def test_update_policy_association_for_endpoint(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self._update_policy_association_for_endpoint(
self.policy_id, self.endpoint_id)
@ -72,7 +72,7 @@ class IdentityPolicyAssociationRbacTest(
def test_show_policy_association_for_endpoint(self):
self._update_policy_association_for_endpoint(
self.policy_id, self.endpoint_id)
with self.rbac_utils.override_role(self):
with self.override_role():
self.policies_client.show_policy_association_for_endpoint(
self.policy_id, self.endpoint_id)
@ -83,7 +83,7 @@ class IdentityPolicyAssociationRbacTest(
def test_delete_policy_association_for_endpoint(self):
self._update_policy_association_for_endpoint(
self.policy_id, self.endpoint_id)
with self.rbac_utils.override_role(self):
with self.override_role():
self.policies_client.delete_policy_association_for_endpoint(
self.policy_id, self.endpoint_id)
@ -92,7 +92,7 @@ class IdentityPolicyAssociationRbacTest(
rules=["identity:create_policy_association_for_service"])
@decorators.idempotent_id('57fb80fe-6ce2-4995-b710-4692b3fc3cdc')
def test_update_policy_association_for_service(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self._update_policy_association_for_service(
self.policy_id, self.service_id)
@ -103,7 +103,7 @@ class IdentityPolicyAssociationRbacTest(
def test_show_policy_association_for_service(self):
self._update_policy_association_for_service(
self.policy_id, self.service_id)
with self.rbac_utils.override_role(self):
with self.override_role():
self.policies_client.show_policy_association_for_service(
self.policy_id, self.service_id)
@ -114,7 +114,7 @@ class IdentityPolicyAssociationRbacTest(
def test_delete_policy_association_for_service(self):
self._update_policy_association_for_service(
self.policy_id, self.service_id)
with self.rbac_utils.override_role(self):
with self.override_role():
self.policies_client.delete_policy_association_for_service(
self.policy_id, self.service_id)
@ -123,7 +123,7 @@ class IdentityPolicyAssociationRbacTest(
rules=["identity:create_policy_association_for_region_and_service"])
@decorators.idempotent_id('54d2a93e-c84d-4079-8ea9-2fb227c262a1')
def test_update_policy_association_for_region_and_service(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self._update_policy_association_for_region_and_service(
self.policy_id, self.service_id, self.region_id)
@ -134,7 +134,7 @@ class IdentityPolicyAssociationRbacTest(
def test_show_policy_association_for_region_and_service(self):
self._update_policy_association_for_region_and_service(
self.policy_id, self.service_id, self.region_id)
with self.rbac_utils.override_role(self):
with self.override_role():
self.policies_client\
.show_policy_association_for_region_and_service(
self.policy_id, self.service_id, self.region_id)
@ -146,7 +146,7 @@ class IdentityPolicyAssociationRbacTest(
def test_delete_policy_association_for_region_and_service(self):
self._update_policy_association_for_region_and_service(
self.policy_id, self.service_id, self.region_id)
with self.rbac_utils.override_role(self):
with self.override_role():
self.policies_client.\
delete_policy_association_for_region_and_service(
self.policy_id, self.service_id, self.region_id)

View File

@ -45,14 +45,14 @@ class ProjectTagsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
rules=["identity:create_project_tag"])
def test_update_project_tag(self):
tag = data_utils.rand_name(self.__class__.__name__ + '-Tag')
with self.rbac_utils.override_role(self):
with self.override_role():
self.project_tags_client.update_project_tag(self.project_id, tag)
@decorators.idempotent_id('e122d7d1-bb6d-43af-b489-afa8c609b9ae')
@rbac_rule_validation.action(service="keystone",
rules=["identity:list_project_tags"])
def test_list_project_tags(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.project_tags_client.list_project_tags(self.project_id)
@decorators.idempotent_id('716f9081-4626-4594-a82c-e7dc037464ac')
@ -63,7 +63,7 @@ class ProjectTagsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
data_utils.rand_name(self.__class__.__name__ + '-Tag')
for _ in range(2)
]
with self.rbac_utils.override_role(self):
with self.override_role():
self.project_tags_client.update_all_project_tags(
self.project_id, tags)
@ -74,7 +74,7 @@ class ProjectTagsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
tag = data_utils.rand_name(self.__class__.__name__ + '-Tag')
self.project_tags_client.update_project_tag(self.project_id, tag)
with self.rbac_utils.override_role(self):
with self.override_role():
self.project_tags_client.check_project_tag_existence(
self.project_id, tag)
@ -85,12 +85,12 @@ class ProjectTagsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
tag = data_utils.rand_name(self.__class__.__name__ + '-Tag')
self.project_tags_client.update_project_tag(self.project_id, tag)
with self.rbac_utils.override_role(self):
with self.override_role():
self.project_tags_client.delete_project_tag(self.project_id, tag)
@decorators.idempotent_id('94d0ef63-e9e3-4287-9c5e-bd5464467d77')
@rbac_rule_validation.action(service="keystone",
rules=["identity:delete_project_tags"])
def test_delete_all_project_tags(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.project_tags_client.delete_all_project_tags(self.project_id)

View File

@ -26,7 +26,7 @@ class IdentityProjectV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
rules=["identity:create_project"])
@decorators.idempotent_id('0f148510-63bf-11e6-1564-080044d0d904')
def test_create_project(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.setup_test_project()
@rbac_rule_validation.action(service="keystone",
@ -37,7 +37,7 @@ class IdentityProjectV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
new_desc = data_utils.rand_name(
self.__class__.__name__ + '-description')
with self.rbac_utils.override_role(self):
with self.override_role():
self.projects_client.update_project(project['id'],
description=new_desc)
@ -47,7 +47,7 @@ class IdentityProjectV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
def test_delete_project(self):
project = self.setup_test_project()
with self.rbac_utils.override_role(self):
with self.override_role():
self.projects_client.delete_project(project['id'])
@rbac_rule_validation.action(service="keystone",
@ -56,12 +56,12 @@ class IdentityProjectV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
def test_show_project(self):
project = self.setup_test_project()
with self.rbac_utils.override_role(self):
with self.override_role():
self.projects_client.show_project(project['id'])
@rbac_rule_validation.action(service="keystone",
rules=["identity:list_projects"])
@decorators.idempotent_id('0f148510-63bf-11e6-1564-080044d0d908')
def test_list_projects(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.projects_client.list_projects()

View File

@ -26,7 +26,7 @@ class IdentityRegionsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
rules=["identity:create_region"])
@decorators.idempotent_id('6bdaecd4-0843-4ed6-ab64-3a57ab0cd119')
def test_create_region(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.setup_test_region()
@rbac_rule_validation.action(service="keystone",
@ -37,7 +37,7 @@ class IdentityRegionsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
new_description = data_utils.rand_name(
self.__class__.__name__ + '-test_update_region')
with self.rbac_utils.override_role(self):
with self.override_role():
self.regions_client.update_region(region['id'],
description=new_description)
@ -47,7 +47,7 @@ class IdentityRegionsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
def test_delete_region(self):
region = self.setup_test_region()
with self.rbac_utils.override_role(self):
with self.override_role():
self.regions_client.delete_region(region['id'])
@rbac_rule_validation.action(service="keystone",
@ -56,12 +56,12 @@ class IdentityRegionsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
def test_show_region(self):
region = self.setup_test_region()
with self.rbac_utils.override_role(self):
with self.override_role():
self.regions_client.show_region(region['id'])
@rbac_rule_validation.action(service="keystone",
rules=["identity:list_regions"])
@decorators.idempotent_id('6bdaecd4-0843-4ed6-ab64-3a57ab0cd123')
def test_list_regions(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.regions_client.list_regions()

View File

@ -25,7 +25,7 @@ class IdentityRoleAssignmentsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
@rbac_rule_validation.action(service="keystone",
rules=["identity:list_role_assignments"])
def test_list_role_assignments(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.role_assignments_client.list_role_assignments()
@decorators.idempotent_id('36c7a990-857e-415c-8717-38d7200a9894')
@ -35,7 +35,7 @@ class IdentityRoleAssignmentsV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
def test_list_role_assignments_for_tree(self):
project = self.setup_test_project()
with self.rbac_utils.override_role(self):
with self.override_role():
self.role_assignments_client.list_role_assignments(
include_subtree=True,
**{'scope.project.id': project['id']})

View File

@ -37,7 +37,7 @@ class IdentityRolesV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
rules=["identity:create_role"])
@decorators.idempotent_id('0f148510-63bf-11e6-1395-080044d0d904')
def test_create_role(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.setup_test_role()
@rbac_rule_validation.action(service="keystone",
@ -47,7 +47,7 @@ class IdentityRolesV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
new_role_name = data_utils.rand_name(
self.__class__.__name__ + '-test_update_role')
with self.rbac_utils.override_role(self):
with self.override_role():
self.roles_client.update_role(self.role['id'],
name=new_role_name)
@ -57,28 +57,28 @@ class IdentityRolesV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
def test_delete_role(self):
role = self.setup_test_role()
with self.rbac_utils.override_role(self):
with self.override_role():
self.roles_client.delete_role(role['id'])
@rbac_rule_validation.action(service="keystone",
rules=["identity:get_role"])
@decorators.idempotent_id('0f148510-63bf-11e6-1395-080044d0d907')
def test_show_role(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.roles_client.show_role(self.role['id'])
@rbac_rule_validation.action(service="keystone",
rules=["identity:list_roles"])
@decorators.idempotent_id('0f148510-63bf-11e6-1395-080044d0d908')
def test_list_roles(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.roles_client.list_roles()
@rbac_rule_validation.action(service="keystone",
rules=["identity:create_grant"])
@decorators.idempotent_id('0f148510-63bf-11e6-1395-080044d0d909')
def test_create_user_role_on_project(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.roles_client.create_user_role_on_project(
self.project['id'],
self.user['id'],
@ -93,7 +93,7 @@ class IdentityRolesV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
rules=["identity:create_grant"])
@decorators.idempotent_id('0f148510-63bf-11e6-1395-080044d0d90c')
def test_create_group_role_on_project(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.roles_client.create_group_role_on_project(
self.project['id'],
self.group['id'],
@ -108,7 +108,7 @@ class IdentityRolesV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
rules=["identity:create_grant"])
@decorators.idempotent_id('0f148510-63bf-11e6-1395-080044d0d90f')
def test_create_user_role_on_domain(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.roles_client.create_user_role_on_domain(
self.domain['id'],
self.user['id'],
@ -123,7 +123,7 @@ class IdentityRolesV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
rules=["identity:create_grant"])
@decorators.idempotent_id('0f148510-63bf-11e6-1395-080044d0d912')
def test_create_group_role_on_domain(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.roles_client.create_group_role_on_domain(
self.domain['id'],
self.group['id'],
@ -148,7 +148,7 @@ class IdentityRolesV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
self.user['id'],
self.role['id'])
with self.rbac_utils.override_role(self):
with self.override_role():
self.roles_client.check_user_role_existence_on_project(
self.project['id'],
self.user['id'],
@ -168,7 +168,7 @@ class IdentityRolesV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
self.user['id'],
self.role['id'])
with self.rbac_utils.override_role(self):
with self.override_role():
self.roles_client.check_user_role_existence_on_domain(
self.domain['id'],
self.user['id'],
@ -188,7 +188,7 @@ class IdentityRolesV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
self.group['id'],
self.role['id'])
with self.rbac_utils.override_role(self):
with self.override_role():
self.roles_client.check_role_from_group_on_project_existence(
self.project['id'],
self.group['id'],
@ -208,7 +208,7 @@ class IdentityRolesV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
self.group['id'],
self.role['id'])
with self.rbac_utils.override_role(self):
with self.override_role():
self.roles_client.check_role_from_group_on_domain_existence(
self.domain['id'],
self.group['id'],
@ -228,7 +228,7 @@ class IdentityRolesV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
self.user['id'],
self.role['id'])
with self.rbac_utils.override_role(self):
with self.override_role():
self.roles_client.delete_role_from_user_on_project(
self.project['id'],
self.user['id'],
@ -248,7 +248,7 @@ class IdentityRolesV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
self.group['id'],
self.role['id'])
with self.rbac_utils.override_role(self):
with self.override_role():
self.roles_client.delete_role_from_group_on_project(
self.project['id'],
self.group['id'],
@ -268,7 +268,7 @@ class IdentityRolesV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
self.user['id'],
self.role['id'])
with self.rbac_utils.override_role(self):
with self.override_role():
self.roles_client.delete_role_from_user_on_domain(
self.domain['id'],
self.user['id'],
@ -288,7 +288,7 @@ class IdentityRolesV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
self.group['id'],
self.role['id'])
with self.rbac_utils.override_role(self):
with self.override_role():
self.roles_client.delete_role_from_group_on_domain(
self.domain['id'],
self.group['id'],
@ -298,7 +298,7 @@ class IdentityRolesV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
rules=["identity:list_grants"])
@decorators.idempotent_id('0f148510-63bf-11e6-1395-080044d0d90b')
def test_list_user_roles_on_project(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.roles_client.list_user_roles_on_project(
self.project['id'],
self.user['id'])
@ -307,7 +307,7 @@ class IdentityRolesV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
rules=["identity:list_grants"])
@decorators.idempotent_id('0f148510-63bf-11e6-1395-080044d0d90e')
def test_list_group_roles_on_project(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.roles_client.list_group_roles_on_project(
self.project['id'],
self.group['id'])
@ -316,7 +316,7 @@ class IdentityRolesV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
rules=["identity:list_grants"])
@decorators.idempotent_id('0f148510-63bf-11e6-1395-080044d0d911')
def test_list_user_roles_on_domain(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.roles_client.list_user_roles_on_domain(
self.domain['id'],
self.user['id'])
@ -325,7 +325,7 @@ class IdentityRolesV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
rules=["identity:list_grants"])
@decorators.idempotent_id('0f148510-63bf-11e6-1395-080044d0d914')
def test_list_group_roles_on_domain(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.roles_client.list_group_roles_on_domain(
self.domain['id'],
self.group['id'])
@ -334,7 +334,7 @@ class IdentityRolesV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
@rbac_rule_validation.action(service="keystone",
rules=["identity:create_implied_role"])
def test_create_role_inference_rule(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.roles_client.create_role_inference_rule(
self.role['id'], self.implies_role['id'])
self.addCleanup(self.roles_client.delete_role_inference_rule,
@ -349,7 +349,7 @@ class IdentityRolesV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
self.addCleanup(self.roles_client.delete_role_inference_rule,
self.role['id'], self.implies_role['id'])
with self.rbac_utils.override_role(self):
with self.override_role():
self.roles_client.show_role_inference_rule(
self.role['id'], self.implies_role['id'])
@ -357,7 +357,7 @@ class IdentityRolesV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
@rbac_rule_validation.action(service="keystone",
rules=["identity:list_implied_roles"])
def test_list_role_inferences_rules(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.roles_client.list_role_inferences_rules(self.role['id'])
@decorators.idempotent_id('eca2d502-09bb-45cd-9773-bce2e7bcddd1')
@ -369,7 +369,7 @@ class IdentityRolesV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
self.addCleanup(self.roles_client.delete_role_inference_rule,
self.role['id'], self.implies_role['id'])
with self.rbac_utils.override_role(self):
with self.override_role():
self.roles_client.check_role_inference_rule(
self.role['id'], self.implies_role['id'])
@ -383,7 +383,7 @@ class IdentityRolesV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
self.roles_client.delete_role_inference_rule,
self.role['id'], self.implies_role['id'])
with self.rbac_utils.override_role(self):
with self.override_role():
self.roles_client.delete_role_inference_rule(
self.role['id'], self.implies_role['id'])
@ -391,5 +391,5 @@ class IdentityRolesV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
@rbac_rule_validation.action(service="keystone",
rules=["identity:list_role_inference_rules"])
def test_list_all_role_inference_rules(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.roles_client.list_all_role_inference_rules()

View File

@ -26,7 +26,7 @@ class IdentitySericesV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
rules=["identity:create_service"])
@decorators.idempotent_id('9a4bb317-f0bb-4005-8df0-4b672885b7c8')
def test_create_service(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.setup_test_service()
@rbac_rule_validation.action(service="keystone",
@ -36,7 +36,7 @@ class IdentitySericesV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
service = self.setup_test_service()
new_name = data_utils.rand_name(self.__class__.__name__ + '-service')
with self.rbac_utils.override_role(self):
with self.override_role():
self.services_client.update_service(service['id'],
service=service,
name=new_name,
@ -48,7 +48,7 @@ class IdentitySericesV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
def test_delete_service(self):
service = self.setup_test_service()
with self.rbac_utils.override_role(self):
with self.override_role():
self.services_client.delete_service(service['id'])
@rbac_rule_validation.action(service="keystone",
@ -57,12 +57,12 @@ class IdentitySericesV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
def test_show_service(self):
service = self.setup_test_service()
with self.rbac_utils.override_role(self):
with self.override_role():
self.services_client.show_service(service['id'])
@rbac_rule_validation.action(service="keystone",
rules=["identity:list_services"])
@decorators.idempotent_id('706e6bea-3385-4718-919c-0b5121395806')
def test_list_services(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.services_client.list_services()

View File

@ -52,7 +52,7 @@ class IdentityTokenV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
# Explicit negative test for identity:validate_token policy action.
# Assert expected exception is Forbidden and then reraise it.
alt_token_id = self._setup_alt_token()
with self.rbac_utils.override_role(self):
with self.override_role():
e = self.assertRaises(lib_exc.Forbidden,
self.identity_client.show_token,
alt_token_id)
@ -71,7 +71,7 @@ class IdentityTokenV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
# Explicit negative test for identity:revoke_token policy action.
# Assert expected exception is Forbidden and then reraise it.
alt_token_id = self._setup_alt_token()
with self.rbac_utils.override_role(self):
with self.override_role():
e = self.assertRaises(lib_exc.Forbidden,
self.identity_client.delete_token,
alt_token_id)
@ -90,7 +90,7 @@ class IdentityTokenV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
# Explicit negative test for identity:check_token policy action.
# Assert expected exception is Forbidden and then reraise it.
alt_token_id = self._setup_alt_token()
with self.rbac_utils.override_role(self):
with self.override_role():
e = self.assertRaises(lib_exc.Forbidden,
self.identity_client.check_token_existence,
alt_token_id)

View File

@ -37,7 +37,7 @@ class IdentityTokenV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
})
def test_show_token(self):
token_id = self.setup_test_token(self.user_id, self.password)
with self.rbac_utils.override_role(self):
with self.override_role():
self.identity_client.show_token(token_id)
@decorators.idempotent_id('42a299db-fe0a-4ea0-9824-0bfd13155886')
@ -50,7 +50,7 @@ class IdentityTokenV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
})
def test_delete_token(self):
token_id = self.setup_test_token(self.user_id, self.password)
with self.rbac_utils.override_role(self):
with self.override_role():
self.identity_client.delete_token(token_id)
@decorators.idempotent_id('3554d218-8cd6-4730-a1b2-0e22f9b78f45')
@ -63,5 +63,5 @@ class IdentityTokenV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
})
def test_check_token_exsitence(self):
token_id = self.setup_test_token(self.user_id, self.password)
with self.rbac_utils.override_role(self):
with self.override_role():
self.identity_client.check_token_existence(token_id)

View File

@ -70,7 +70,7 @@ class IdentityTrustV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
"trust.trustor_user_id": "os_primary.credentials.user_id"
})
def test_create_trust(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.setup_test_trust(trustor_user_id=self.trustor_user_id,
trustee_user_id=self.trustee_user_id)
@ -85,7 +85,7 @@ class IdentityTrustV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
def test_create_trust_negative(self):
# Explicit negative test for identity:create_trust policy action.
# Assert expected exception is Forbidden and then reraise it.
with self.rbac_utils.override_role(self):
with self.override_role():
e = self.assertRaises(lib_exc.Forbidden, self.setup_test_trust,
trustor_user_id=self.unauthorized_user_id,
trustee_user_id=self.trustee_user_id)
@ -99,7 +99,7 @@ class IdentityTrustV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
trust = self.setup_test_trust(trustor_user_id=self.trustor_user_id,
trustee_user_id=self.trustee_user_id)
with self.rbac_utils.override_role(self):
with self.override_role():
self.trusts_client.delete_trust(trust['id'])
@decorators.idempotent_id('f2e32896-bf66-4f4e-89cf-e7fba0ef1f38')
@ -107,7 +107,7 @@ class IdentityTrustV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
service="keystone",
rules=["identity:list_trusts"])
def test_list_trusts(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.trusts_client.list_trusts(
trustor_user_id=self.trustor_user_id)
@ -116,7 +116,7 @@ class IdentityTrustV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
service="keystone",
rules=["identity:list_roles_for_trust"])
def test_list_roles_for_trust(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.trusts_client.list_trust_roles(self.trust['id'])
@decorators.idempotent_id('3bb4f97b-cecd-4c7d-ad10-b88ee6c5d573')
@ -124,7 +124,7 @@ class IdentityTrustV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
service="keystone",
rules=["identity:get_role_for_trust"])
def test_show_trust_role(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.trusts_client.show_trust_role(
self.trust['id'], self.delegated_role_id)
@ -133,5 +133,5 @@ class IdentityTrustV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
service="keystone",
rules=["identity:get_trust"])
def test_show_trust(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.trusts_client.show_trust(self.trust['id'])

View File

@ -31,7 +31,7 @@ class IdentityUserV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
rules=["identity:create_user"])
@decorators.idempotent_id('0f148510-63bf-11e6-4522-080044d0d904')
def test_create_user(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.setup_test_user()
@rbac_rule_validation.action(service="keystone",
@ -42,7 +42,7 @@ class IdentityUserV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
new_email = data_utils.rand_name(
self.__class__.__name__ + '-user_email')
with self.rbac_utils.override_role(self):
with self.override_role():
self.users_client.update_user(user['id'],
name=user['name'],
email=new_email)
@ -53,33 +53,33 @@ class IdentityUserV3RbacTest(rbac_base.BaseIdentityV3RbacTest):
def test_delete_user(self):
user = self.setup_test_user()
with self.rbac_utils.override_role(self):
with self.override_role():
self.users_client.delete_user(user['id'])
@rbac_rule_validation.action(service="keystone",
rules=["identity:list_users"])
@decorators.idempotent_id('0f148510-63bf-11e6-4522-080044d0d907')
def test_list_users(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.users_client.list_users()
@rbac_rule_validation.action(service="keystone",
rules=["identity:get_user"])
@decorators.idempotent_id('0f148510-63bf-11e6-4522-080044d0d908')
def test_show_own_user(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.users_client.show_user(self.default_user_id)
@rbac_rule_validation.action(service="keystone",
rules=["identity:list_groups_for_user"])
@decorators.idempotent_id('bd5946d4-46d2-423d-a800-a3e7aabc18b3')
def test_list_own_user_group(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.users_client.list_user_groups(self.default_user_id)
@rbac_rule_validation.action(service="keystone",
rules=["identity:list_user_projects"])
@decorators.idempotent_id('0f148510-63bf-11e6-1564-080044d0d909')
def test_list_own_user_projects(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.users_client.list_user_projects(self.default_user_id)

View File

@ -36,7 +36,7 @@ class ImageNamespacesObjectsRbacTest(rbac_base.BaseV2ImageRbacTest):
# cleanup of namespace
object_name = data_utils.rand_name(
self.__class__.__name__ + '-test-object')
with self.rbac_utils.override_role(self):
with self.override_role():
self.namespace_objects_client.create_namespace_object(
namespace['namespace'],
name=object_name)
@ -53,7 +53,7 @@ class ImageNamespacesObjectsRbacTest(rbac_base.BaseV2ImageRbacTest):
RBAC test for the glance get_metadef_objects policy
"""
namespace = self.create_namespace()
with self.rbac_utils.override_role(self):
with self.override_role():
# list md objects
self.namespace_objects_client.list_namespace_objects(
namespace['namespace'])
@ -78,7 +78,7 @@ class ImageNamespacesObjectsRbacTest(rbac_base.BaseV2ImageRbacTest):
# Toggle role and modify object
new_name = "Object New Name"
with self.rbac_utils.override_role(self):
with self.override_role():
self.namespace_objects_client.update_namespace_object(
namespace['namespace'], object_name, name=new_name)
@ -100,7 +100,7 @@ class ImageNamespacesObjectsRbacTest(rbac_base.BaseV2ImageRbacTest):
self.namespace_objects_client.delete_namespace_object,
namespace['namespace'], object_name)
# Toggle role and get object
with self.rbac_utils.override_role(self):
with self.override_role():
self.namespace_objects_client.show_namespace_object(
namespace['namespace'],
object_name)

View File

@ -39,7 +39,7 @@ class NamespacesPropertyRbacTest(rbac_base.BaseV2ImageRbacTest):
namespace = self.create_namespace()
property_name = data_utils.rand_name(
self.__class__.__name__ + '-test-ns-property')
with self.rbac_utils.override_role(self):
with self.override_role():
self.namespace_properties_client.create_namespace_property(
namespace=namespace['namespace'], type="string",
title=property_name, name=self.resource_name)
@ -53,7 +53,7 @@ class NamespacesPropertyRbacTest(rbac_base.BaseV2ImageRbacTest):
RBAC test for the glance get_metadef_properties policy
"""
namespace = self.create_namespace()
with self.rbac_utils.override_role(self):
with self.override_role():
self.namespace_properties_client.list_namespace_properties(
namespace=namespace['namespace'])
@ -72,7 +72,7 @@ class NamespacesPropertyRbacTest(rbac_base.BaseV2ImageRbacTest):
namespace=namespace['namespace'], type="string",
title=property_name, name=self.resource_name)
with self.rbac_utils.override_role(self):
with self.override_role():
self.namespace_properties_client.show_namespace_properties(
namespace['namespace'], self.resource_name)
@ -91,7 +91,7 @@ class NamespacesPropertyRbacTest(rbac_base.BaseV2ImageRbacTest):
namespace=namespace['namespace'], type="string",
title=property_name, name=self.resource_name)
with self.rbac_utils.override_role(self):
with self.override_role():
self.namespace_properties_client.update_namespace_properties(
namespace['namespace'], self.resource_name, type="string",
title=property_name, name=self.resource_name)

View File

@ -33,7 +33,7 @@ class ImageNamespacesRbacTest(rbac_base.BaseV2ImageRbacTest):
"""
namespace_name = data_utils.rand_name(
self.__class__.__name__ + '-test-ns')
with self.rbac_utils.override_role(self):
with self.override_role():
self.namespaces_client.create_namespace(
namespace=namespace_name,
protected=False)
@ -50,7 +50,7 @@ class ImageNamespacesRbacTest(rbac_base.BaseV2ImageRbacTest):
RBAC test for the glance get_metadef_namespaces policy
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self.namespaces_client.list_namespaces()
@rbac_rule_validation.action(service="glance",
@ -66,7 +66,7 @@ class ImageNamespacesRbacTest(rbac_base.BaseV2ImageRbacTest):
body = self.namespaces_client.create_namespace(
namespace=namespace_name,
protected=False)
with self.rbac_utils.override_role(self):
with self.override_role():
self.namespaces_client.update_namespace(
body['namespace'], description="My new description")
self.addCleanup(

View File

@ -69,7 +69,7 @@ class NamespaceTagsRbacTest(base.BaseV2ImageRbacTest):
@rbac_rule_validation.action(service="glance",
rules=["add_metadef_tag"])
def test_create_namespace_tag(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self._create_namespace_tag()
@decorators.idempotent_id('4acf70cc-05da-4b1e-87b2-d5e4475164e7')
@ -77,7 +77,7 @@ class NamespaceTagsRbacTest(base.BaseV2ImageRbacTest):
rules=["get_metadef_tag"])
def test_show_namespace_tag(self):
tag_name = self._create_namespace_tag()
with self.rbac_utils.override_role(self):
with self.override_role():
self.namespace_tags_client.show_namespace_tag(self.namespace,
tag_name)
@ -89,7 +89,7 @@ class NamespaceTagsRbacTest(base.BaseV2ImageRbacTest):
updated_tag_name = data_utils.rand_name(
self.__class__.__name__ + '-tag')
with self.rbac_utils.override_role(self):
with self.override_role():
self.namespace_tags_client.update_namespace_tag(
self.namespace, tag_name, name=updated_tag_name)
@ -97,12 +97,12 @@ class NamespaceTagsRbacTest(base.BaseV2ImageRbacTest):
@rbac_rule_validation.action(service="glance",
rules=["add_metadef_tags"])
def test_create_namespace_tags(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self._create_namespace_tag(multiple=True)
@decorators.idempotent_id('d37c1501-e787-449d-89b3-754a942a459a')
@rbac_rule_validation.action(service="glance",
rules=["get_metadef_tags"])
def test_list_namespace_tags(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.namespace_tags_client.list_namespace_tags(self.namespace)

View File

@ -43,7 +43,7 @@ class ImageResourceTypesRbacTest(rbac_base.BaseV2ImageRbacTest):
RBAC test for the glance list_metadef_resource_type policy.
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self.resource_types_client.list_resource_types()
@rbac_rule_validation.action(service="glance",
@ -54,7 +54,7 @@ class ImageResourceTypesRbacTest(rbac_base.BaseV2ImageRbacTest):
RBAC test for the glance get_metadef_resource_type policy.
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self.resource_types_client.list_resource_type_association(
self.namespace_name)
@ -64,6 +64,6 @@ class ImageResourceTypesRbacTest(rbac_base.BaseV2ImageRbacTest):
@decorators.idempotent_id('ef9fbc60-3e28-4164-a25c-d30d892f7939')
def test_add_metadef_resource_type(self):
type_name = data_utils.rand_name()
with self.rbac_utils.override_role(self):
with self.override_role():
self.resource_types_client.create_resource_type_association(
self.namespace_name, name=type_name)

View File

@ -46,7 +46,7 @@ class ImagesMemberRbacTest(base.BaseV2ImageRbacTest):
"""
image_id = self.create_image()['id']
# Toggle role and add image member
with self.rbac_utils.override_role(self):
with self.override_role():
self.image_member_client.create_image_member(
image_id, member=self.alt_tenant_id)
@ -63,7 +63,7 @@ class ImagesMemberRbacTest(base.BaseV2ImageRbacTest):
self.image_member_client.create_image_member(image_id,
member=self.alt_tenant_id)
# Toggle role and delete image member
with self.rbac_utils.override_role(self):
with self.override_role():
self.image_member_client.delete_image_member(image_id,
self.alt_tenant_id)
@ -83,7 +83,7 @@ class ImagesMemberRbacTest(base.BaseV2ImageRbacTest):
member=self.alt_tenant_id)
# Toggle role and get image member
with self.rbac_utils.override_role(self):
with self.override_role():
self.image_member_client.show_image_member(image_id,
self.alt_tenant_id)
@ -104,7 +104,7 @@ class ImagesMemberRbacTest(base.BaseV2ImageRbacTest):
image_id, self.tenant_id,
status='accepted')
# Toggle role and update member
with self.rbac_utils.override_role(self):
with self.override_role():
self.image_member_client.update_image_member(
image_id, self.tenant_id,
status='pending')
@ -122,5 +122,5 @@ class ImagesMemberRbacTest(base.BaseV2ImageRbacTest):
self.image_member_client.create_image_member(image_id,
member=self.alt_tenant_id)
# Toggle role and list image members
with self.rbac_utils.override_role(self):
with self.override_role():
self.image_member_client.list_image_members(image_id)

View File

@ -50,7 +50,7 @@ class BasicOperationsImagesRbacTest(rbac_base.BaseV2ImageRbacTest):
RBAC test for the glance create_image endpoint
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self._create_image()
@rbac_rule_validation.action(service="glance",
@ -64,7 +64,7 @@ class BasicOperationsImagesRbacTest(rbac_base.BaseV2ImageRbacTest):
"""
image = self._create_image()
with self.rbac_utils.override_role(self):
with self.override_role():
self._upload_image(image['id'])
@decorators.idempotent_id('f0c268f3-cb51-49aa-9bd5-d30cf647322f')
@ -79,7 +79,7 @@ class BasicOperationsImagesRbacTest(rbac_base.BaseV2ImageRbacTest):
image = self._create_image()
self._upload_image(image['id'])
with self.rbac_utils.override_role(self):
with self.override_role():
self.image_client.show_image_file(image['id'])
@rbac_rule_validation.action(service="glance",
@ -93,7 +93,7 @@ class BasicOperationsImagesRbacTest(rbac_base.BaseV2ImageRbacTest):
"""
image = self._create_image()
with self.rbac_utils.override_role(self):
with self.override_role():
self.image_client.delete_image(image['id'])
self.image_client.wait_for_resource_deletion(image['id'])
@ -108,7 +108,7 @@ class BasicOperationsImagesRbacTest(rbac_base.BaseV2ImageRbacTest):
"""
image = self._create_image()
with self.rbac_utils.override_role(self):
with self.override_role():
self.image_client.show_image(image['id'])
@rbac_rule_validation.action(service="glance",
@ -120,7 +120,7 @@ class BasicOperationsImagesRbacTest(rbac_base.BaseV2ImageRbacTest):
RBAC test for the glance list_images endpoint
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self.image_client.list_images()['images']
@rbac_rule_validation.action(service="glance",
@ -136,7 +136,7 @@ class BasicOperationsImagesRbacTest(rbac_base.BaseV2ImageRbacTest):
updated_image_name = data_utils.rand_name(
self.__class__.__name__ + '-image')
with self.rbac_utils.override_role(self):
with self.override_role():
self.image_client.update_image(image['id'], [
dict(replace='/name', value=updated_image_name)])
@ -151,7 +151,7 @@ class BasicOperationsImagesRbacTest(rbac_base.BaseV2ImageRbacTest):
"""
image = self._create_image()
with self.rbac_utils.override_role(self):
with self.override_role():
self.image_client.add_image_tag(
image['id'],
data_utils.rand_name(self.__class__.__name__ + '-tag'))
@ -169,7 +169,7 @@ class BasicOperationsImagesRbacTest(rbac_base.BaseV2ImageRbacTest):
tag_name = data_utils.rand_name(self.__class__.__name__ + '-tag')
self.image_client.add_image_tag(image['id'], tag_name)
with self.rbac_utils.override_role(self):
with self.override_role():
self.image_client.delete_image_tag(image['id'], tag_name)
@rbac_rule_validation.action(service="glance",
@ -181,7 +181,7 @@ class BasicOperationsImagesRbacTest(rbac_base.BaseV2ImageRbacTest):
RBAC test for the glance publicize_image endpoint
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self._create_image(visibility='public')
@decorators.idempotent_id('0f2d8427-134a-4d3c-a102-5fcdf5443d09')
@ -193,7 +193,7 @@ class BasicOperationsImagesRbacTest(rbac_base.BaseV2ImageRbacTest):
RBAC test for the glance communitize_image policy
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self._create_image(visibility='community')
@rbac_rule_validation.action(service="glance",
@ -208,7 +208,7 @@ class BasicOperationsImagesRbacTest(rbac_base.BaseV2ImageRbacTest):
image = self._create_image()
self._upload_image(image['id'])
with self.rbac_utils.override_role(self):
with self.override_role():
self.image_client.deactivate_image(image['id'])
@rbac_rule_validation.action(service="glance",
@ -223,5 +223,5 @@ class BasicOperationsImagesRbacTest(rbac_base.BaseV2ImageRbacTest):
image = self._create_image()
self._upload_image(image['id'])
with self.rbac_utils.override_role(self):
with self.override_role():
self.image_client.reactivate_image(image['id'])

View File

@ -58,7 +58,7 @@ class AddressScopeExtRbacTest(base.BaseNetworkExtRbacTest):
RBAC test for the neutron create_address_scope policy
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self._create_address_scope()
@rbac_rule_validation.action(service="neutron",
@ -72,7 +72,7 @@ class AddressScopeExtRbacTest(base.BaseNetworkExtRbacTest):
RBAC test for the neutron create_address_scope:shared policy
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self._create_address_scope(shared=True)
@rbac_rule_validation.action(service="neutron",
@ -86,7 +86,7 @@ class AddressScopeExtRbacTest(base.BaseNetworkExtRbacTest):
RBAC test for the neutron get_address_scope policy
"""
address_scope = self._create_address_scope()
with self.rbac_utils.override_role(self):
with self.override_role():
self.ntp_client.show_address_scope(address_scope['id'])
@rbac_rule_validation.action(service="neutron",
@ -102,7 +102,7 @@ class AddressScopeExtRbacTest(base.BaseNetworkExtRbacTest):
"""
address_scope = self._create_address_scope()
name = data_utils.rand_name(self.__class__.__name__)
with self.rbac_utils.override_role(self):
with self.override_role():
self.ntp_client.update_address_scope(address_scope['id'],
name=name)
@ -119,7 +119,7 @@ class AddressScopeExtRbacTest(base.BaseNetworkExtRbacTest):
RBAC test for neutron update_address_scope:shared policy
"""
address_scope = self._create_address_scope(shared=True)
with self.rbac_utils.override_role(self):
with self.override_role():
self.ntp_client.update_address_scope(address_scope['id'],
shared=True)
@ -135,7 +135,7 @@ class AddressScopeExtRbacTest(base.BaseNetworkExtRbacTest):
RBAC test for neutron delete_address_scope policy
"""
address_scope = self._create_address_scope()
with self.rbac_utils.override_role(self):
with self.override_role():
self.ntp_client.delete_address_scope(address_scope['id'])
@rbac_rule_validation.action(service="neutron",
@ -148,7 +148,7 @@ class AddressScopeExtRbacTest(base.BaseNetworkExtRbacTest):
the ``get_address_scope`` policy
"""
admin_resource_id = self._create_address_scope()['id']
with (self.rbac_utils.override_role_and_validate_list(
self, admin_resource_id=admin_resource_id)) as ctx:
with (self.override_role_and_validate_list(
admin_resource_id=admin_resource_id)) as ctx:
ctx.resources = self.ntp_client.list_address_scopes(
id=admin_resource_id)["address_scopes"]

View File

@ -46,7 +46,7 @@ class AgentsRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron get_agent policy
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self.agents_client.show_agent(self.agent['id'])
@decorators.idempotent_id('8ca68fdb-eaf6-4880-af82-ba0982949dec')
@ -61,7 +61,7 @@ class AgentsRbacTest(base.BaseNetworkRbacTest):
original_status = self.agent['admin_state_up']
agent_status = {'admin_state_up': original_status}
with self.rbac_utils.override_role(self):
with self.override_role():
self.agents_client.update_agent(agent_id=self.agent['id'],
agent=agent_status)
@ -74,8 +74,8 @@ class AgentsRbacTest(base.BaseNetworkRbacTest):
the ``get_agent`` policy
"""
admin_resource_id = self.agent['id']
with (self.rbac_utils.override_role_and_validate_list(
self, admin_resource_id=admin_resource_id)) as ctx:
with (self.override_role_and_validate_list(
admin_resource_id=admin_resource_id)) as ctx:
ctx.resources = self.agents_client.list_agents(
id=admin_resource_id)["agents"]
@ -120,7 +120,7 @@ class L3AgentSchedulerRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron get_l3-routers policy
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self.agents_client.list_routers_on_l3_agent(self.agent['id'])
@decorators.idempotent_id('466b2a10-8747-4c09-855a-bd90a1c86ce7')
@ -131,7 +131,7 @@ class L3AgentSchedulerRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron create_l3-router policy
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self.agents_client.create_router_on_l3_agent(
self.agent['id'], router_id=self.router['id'])
self.addCleanup(
@ -154,7 +154,7 @@ class L3AgentSchedulerRbacTest(base.BaseNetworkRbacTest):
self.agents_client.delete_router_from_l3_agent,
self.agent['id'], router_id=self.router['id'])
with self.rbac_utils.override_role(self):
with self.override_role():
self.agents_client.delete_router_from_l3_agent(
self.agent['id'], router_id=self.router['id'])
@ -213,7 +213,7 @@ class DHCPAgentSchedulersRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron get_dhcp-networks policy
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self.agents_client.list_networks_hosted_by_one_dhcp_agent(
self.agent['id'])
@ -228,7 +228,7 @@ class DHCPAgentSchedulersRbacTest(base.BaseNetworkRbacTest):
network_id = self._create_and_prepare_network_for_agent(
self.agent['id'])
with self.rbac_utils.override_role(self):
with self.override_role():
self.agents_client.add_dhcp_agent_to_network(
self.agent['id'], network_id=network_id)
# Clean up is not necessary and might result in 409 being raised.
@ -247,7 +247,7 @@ class DHCPAgentSchedulersRbacTest(base.BaseNetworkRbacTest):
self.agent['id'], network_id=network_id)
# Clean up is not necessary and might result in 409 being raised.
with self.rbac_utils.override_role(self):
with self.override_role():
self.agents_client.delete_network_from_dhcp_agent(
self.agent['id'], network_id=network_id)
@ -275,7 +275,7 @@ class L3AgentsExtRbacTest(base.BaseNetworkExtRbacTest):
RBAC test for the neutron get_l3-agents policy
"""
with self.rbac_utils.override_role(self):
with self.override_role():
# NOTE: It is not empty list since it's a special case where
# policy.enforce is called from the controller.
self.ntp_client.list_l3_agents_hosting_router(self.router['id'])

View File

@ -39,7 +39,7 @@ class AutoAllocationTopologyExtRbacTest(base.BaseNetworkExtRbacTest):
RBAC test for the neutron "get_auto_allocated_topology" policy
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self.ntp_client.get_auto_allocated_topology(
tenant_id=self.os_primary.credentials.tenant_id)
@ -73,6 +73,6 @@ class AutoAllocationTopologyExtRbacTest(base.BaseNetworkExtRbacTest):
self._ensure_network_not_in_use(net_id)
with self.rbac_utils.override_role(self):
with self.override_role():
self.ntp_client.delete_auto_allocated_topology(
tenant_id=self.os_primary.credentials.tenant_id)

View File

@ -42,7 +42,7 @@ class AvailabilityZoneExtRbacTest(base.BaseNetworkExtRbacTest):
"""
admin_resources = (self.ntp_client.list_availability_zones()
["availability_zones"])
with self.rbac_utils.override_role_and_validate_list(
self, admin_resources=admin_resources) as ctx:
with self.override_role_and_validate_list(
admin_resources=admin_resources) as ctx:
ctx.resources = (self.ntp_client.list_availability_zones()
['availability_zones'])

View File

@ -57,7 +57,7 @@ class DscpMarkingRuleExtRbacTest(base.BaseNetworkExtRbacTest):
RBAC test for the neutron "create_policy_dscp_marking_rule" policy
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self.create_policy_dscp_marking_rule()
@decorators.idempotent_id('3D68F50E-B948-4B25-8A72-F6F4890BBC6F')
@ -71,7 +71,7 @@ class DscpMarkingRuleExtRbacTest(base.BaseNetworkExtRbacTest):
"""
rule_id = self.create_policy_dscp_marking_rule()
with self.rbac_utils.override_role(self):
with self.override_role():
self.ntp_client.show_dscp_marking_rule(self.policy_id, rule_id)
@decorators.idempotent_id('33830794-8731-45C3-BC97-17718555DD7C')
@ -86,7 +86,7 @@ class DscpMarkingRuleExtRbacTest(base.BaseNetworkExtRbacTest):
"""
rule_id = self.create_policy_dscp_marking_rule()
with self.rbac_utils.override_role(self):
with self.override_role():
self.ntp_client.update_dscp_marking_rule(
self.policy_id, rule_id, dscp_mark=16)
@ -102,7 +102,7 @@ class DscpMarkingRuleExtRbacTest(base.BaseNetworkExtRbacTest):
"""
rule_id = self.create_policy_dscp_marking_rule()
with self.rbac_utils.override_role(self):
with self.override_role():
self.ntp_client.delete_dscp_marking_rule(self.policy_id, rule_id)
@decorators.idempotent_id('c012fd4f-3a3e-4af4-9075-dd3e170daecd')
@ -115,7 +115,7 @@ class DscpMarkingRuleExtRbacTest(base.BaseNetworkExtRbacTest):
the ``get_policy_dscp_marking_rule`` policy
"""
admin_resource_id = self.create_policy_dscp_marking_rule()
with (self.rbac_utils.override_role_and_validate_list(
self, admin_resource_id=admin_resource_id)) as ctx:
with (self.override_role_and_validate_list(
admin_resource_id=admin_resource_id)) as ctx:
ctx.resources = self.ntp_client.list_dscp_marking_rules(
policy_id=self.policy_id)["dscp_marking_rules"]

View File

@ -57,7 +57,7 @@ class FlavorsServiceProfileExtRbacTest(base.BaseNetworkExtRbacTest):
RBAC test for the neutron "create_flavor_service_profile" policy
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self.create_flavor_service_profile(self.flavor_id,
self.service_profile_id)
@ -72,6 +72,6 @@ class FlavorsServiceProfileExtRbacTest(base.BaseNetworkExtRbacTest):
self.create_flavor_service_profile(self.flavor_id,
self.service_profile_id)
with self.rbac_utils.override_role(self):
with self.override_role():
self.ntp_client.delete_flavor_service_profile(
self.flavor_id, self.service_profile_id)

View File

@ -39,7 +39,7 @@ class FlavorsExtRbacTest(base.BaseNetworkExtRbacTest):
RBAC test for the neutron "create_flavor" policy
"""
with self.rbac_utils.override_role(self):
with self.override_role():
flavor = self.ntp_client.create_flavor(
service_type=self.service_type)
@ -63,7 +63,7 @@ class FlavorsExtRbacTest(base.BaseNetworkExtRbacTest):
self.ntp_client.delete_flavor, flavor["flavor"]["id"])
name = data_utils.rand_name(self.__class__.__name__ + '-Flavor')
with self.rbac_utils.override_role(self):
with self.override_role():
self.ntp_client.update_flavor(flavor["flavor"]["id"], name=name)
@decorators.idempotent_id('1de15f9e-5080-4259-ab41-e230bb312de8')
@ -81,7 +81,7 @@ class FlavorsExtRbacTest(base.BaseNetworkExtRbacTest):
test_utils.call_and_ignore_notfound_exc,
self.ntp_client.delete_flavor, flavor["flavor"]["id"])
with self.rbac_utils.override_role(self):
with self.override_role():
self.ntp_client.delete_flavor(flavor["flavor"]["id"])
@decorators.idempotent_id('c2baf35f-e6c1-4833-9114-aadd9b1f6aaa')
@ -98,7 +98,7 @@ class FlavorsExtRbacTest(base.BaseNetworkExtRbacTest):
test_utils.call_and_ignore_notfound_exc,
self.ntp_client.delete_flavor, flavor["flavor"]["id"])
with self.rbac_utils.override_role(self):
with self.override_role():
self.ntp_client.show_flavor(flavor["flavor"]["id"])
@decorators.idempotent_id('ab10bd5d-987e-4255-966f-947670ffd0fa')
@ -114,7 +114,7 @@ class FlavorsExtRbacTest(base.BaseNetworkExtRbacTest):
test_utils.call_and_ignore_notfound_exc,
self.ntp_client.delete_flavor, flavor["flavor"]["id"])
with self.rbac_utils.override_role_and_validate_list(
self, admin_resource_id=flavor["flavor"]["id"]
with self.override_role_and_validate_list(
admin_resource_id=flavor["flavor"]["id"]
) as ctx:
ctx.resources = self.ntp_client.list_flavors()['flavors']

View File

@ -70,7 +70,7 @@ class FloatingIpsRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron create_floatingip policy
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self._create_floatingip()
@rbac_rule_validation.action(
@ -85,7 +85,7 @@ class FloatingIpsRbacTest(base.BaseNetworkRbacTest):
"""
fip = str(netaddr.IPAddress(self.cidr) + 10)
with self.rbac_utils.override_role(self):
with self.override_role():
self._create_floatingip(floating_ip_address=fip)
@rbac_rule_validation.action(service="neutron",
@ -98,7 +98,7 @@ class FloatingIpsRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron update_floatingip policy
"""
floating_ip = self._create_floatingip()
with self.rbac_utils.override_role(self):
with self.override_role():
# Associate floating IP to the other port
self.floating_ips_client.update_floatingip(
floating_ip['id'], port_id=None)
@ -113,7 +113,7 @@ class FloatingIpsRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron get_floatingip policy
"""
floating_ip = self._create_floatingip()
with self.rbac_utils.override_role(self):
with self.override_role():
# Show floating IP
self.floating_ips_client.show_floatingip(floating_ip['id'])
@ -127,7 +127,7 @@ class FloatingIpsRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron delete_floatingip policy
"""
floating_ip = self._create_floatingip()
with self.rbac_utils.override_role(self):
with self.override_role():
# Delete the floating IP
self.floating_ips_client.delete_floatingip(floating_ip['id'])
@ -140,7 +140,7 @@ class FloatingIpsRbacTest(base.BaseNetworkRbacTest):
the ``get_floatingip`` policy
"""
admin_resource_id = self._create_floatingip()['id']
with (self.rbac_utils.override_role_and_validate_list(
self, admin_resource_id=admin_resource_id)) as ctx:
with (self.override_role_and_validate_list(
admin_resource_id=admin_resource_id)) as ctx:
ctx.resources = self.floating_ips_client.list_floatingips(
id=admin_resource_id)["floatingips"]

View File

@ -70,7 +70,7 @@ class MeteringLabelRulesRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron create_metering_label_rule policy
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self._create_metering_label_rule(self.label)
@rbac_rule_validation.action(service="neutron",
@ -83,7 +83,7 @@ class MeteringLabelRulesRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron get_metering_label_rule policy
"""
label_rule = self._create_metering_label_rule(self.label)
with self.rbac_utils.override_role(self):
with self.override_role():
self.metering_label_rules_client.show_metering_label_rule(
label_rule['id'])
@ -98,7 +98,7 @@ class MeteringLabelRulesRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron delete_metering_label_rule policy
"""
label_rule = self._create_metering_label_rule(self.label)
with self.rbac_utils.override_role(self):
with self.override_role():
self.metering_label_rules_client.delete_metering_label_rule(
label_rule['id'])
@ -112,8 +112,8 @@ class MeteringLabelRulesRbacTest(base.BaseNetworkRbacTest):
the ``get_metering_label_rule`` policy
"""
admin_resource_id = self._create_metering_label_rule(self.label)['id']
with (self.rbac_utils.override_role_and_validate_list(
self, admin_resource_id=admin_resource_id)) as ctx:
with (self.override_role_and_validate_list(
admin_resource_id=admin_resource_id)) as ctx:
ctx.resources = (
self.metering_label_rules_client.
list_metering_label_rules(id=admin_resource_id)

View File

@ -54,7 +54,7 @@ class MeteringLabelsRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron "create_metering_label" policy
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self._create_metering_label()
@rbac_rule_validation.action(service="neutron",
@ -67,7 +67,7 @@ class MeteringLabelsRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron "get_metering_label" policy
"""
label = self._create_metering_label()
with self.rbac_utils.override_role(self):
with self.override_role():
self.metering_labels_client.show_metering_label(label['id'])
@rbac_rule_validation.action(service="neutron",
@ -81,7 +81,7 @@ class MeteringLabelsRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron "delete_metering_label" policy
"""
label = self._create_metering_label()
with self.rbac_utils.override_role(self):
with self.override_role():
self.metering_labels_client.delete_metering_label(label['id'])
@rbac_rule_validation.action(service="neutron",
@ -94,8 +94,8 @@ class MeteringLabelsRbacTest(base.BaseNetworkRbacTest):
the ``get_metering_label`` policy
"""
admin_resource_id = self._create_metering_label()['id']
with (self.rbac_utils.override_role_and_validate_list(
self, admin_resource_id=admin_resource_id)) as ctx:
with (self.override_role_and_validate_list(
admin_resource_id=admin_resource_id)) as ctx:
ctx.resources = (
self.metering_labels_client.
list_metering_labels(id=admin_resource_id)

View File

@ -44,7 +44,7 @@ class NetworkIpAvailabilityExtRbacTest(base.BaseNetworkExtRbacTest):
self.__class__.__name__ + '-Network')
network = self.create_network(network_name=network_name)
with self.rbac_utils.override_role(self):
with self.override_role():
self.ntp_client.show_network_ip_availability(network['id'])
@rbac_rule_validation.action(service="neutron",
@ -58,7 +58,7 @@ class NetworkIpAvailabilityExtRbacTest(base.BaseNetworkExtRbacTest):
"""
admin_resources = (self.ntp_client.list_network_ip_availabilities()
["network_ip_availabilities"])
with self.rbac_utils.override_role_and_validate_list(
self, admin_resources=admin_resources) as ctx:
with self.override_role_and_validate_list(
admin_resources=admin_resources) as ctx:
ctx.resources = (self.ntp_client.list_network_ip_availabilities()
["network_ip_availabilities"])

View File

@ -74,7 +74,7 @@ class NetworkSegmentsRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron create_network:segments policy
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self._create_network_segments()
@rbac_rule_validation.action(service="neutron",
@ -90,7 +90,7 @@ class NetworkSegmentsRbacTest(base.BaseNetworkRbacTest):
network = self._create_network_segments()
new_segments = [{'provider:network_type': self.network_type}]
with self.rbac_utils.override_role(self):
with self.override_role():
self.networks_client.update_network(network['id'],
segments=new_segments)
@ -106,7 +106,7 @@ class NetworkSegmentsRbacTest(base.BaseNetworkRbacTest):
"""
network = self._create_network_segments()
with self.rbac_utils.override_role(self):
with self.override_role():
body = self.networks_client.show_network(network['id'],
fields='segments')
response_network = body['network']

View File

@ -105,7 +105,7 @@ class NetworksRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron create_network policy
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self._create_network()
@rbac_rule_validation.action(service="neutron",
@ -119,7 +119,7 @@ class NetworksRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron create_network:is_default policy
"""
try:
with self.rbac_utils.override_role(self):
with self.override_role():
self._create_network(is_default=True)
except lib_exc.Conflict as exc:
# A default network might already exist
@ -136,7 +136,7 @@ class NetworksRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron create_network:shared policy
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self._create_network(shared=True)
@utils.requires_ext(extension='external-net', service='network')
@ -150,7 +150,7 @@ class NetworksRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron create_network:router:external policy
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self._create_network(router_external=True)
@utils.requires_ext(extension='provider', service='network')
@ -166,7 +166,7 @@ class NetworksRbacTest(base.BaseNetworkRbacTest):
RBAC test for neutron create_network:provider:physical_network policy
"""
try:
with self.rbac_utils.override_role(self):
with self.override_role():
self._create_network(provider_physical_network='provider',
provider_network_type='flat')
except lib_exc.BadRequest as exc:
@ -188,7 +188,7 @@ class NetworksRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron create_network:provider:network_type policy
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self._create_network(provider_network_type='vxlan')
@utils.requires_ext(extension='provider', service='network')
@ -203,7 +203,7 @@ class NetworksRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron create_network:provider:segmentation_id
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self._create_network(provider_network_type='vxlan',
provider_segmentation_id=200)
@ -220,7 +220,7 @@ class NetworksRbacTest(base.BaseNetworkRbacTest):
updated_name = data_utils.rand_name(
self.__class__.__name__ + '-Network')
with self.rbac_utils.override_role(self):
with self.override_role():
self._update_network(name=updated_name)
@rbac_rule_validation.action(service="neutron",
@ -235,7 +235,7 @@ class NetworksRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron update_network:shared policy
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self._update_network(shared_network=True)
self.addCleanup(self._update_network, shared_network=False)
@ -253,7 +253,7 @@ class NetworksRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron update_network:router:external policy
"""
network = self._create_network()
with self.rbac_utils.override_role(self):
with self.override_role():
self._update_network(net_id=network['id'], router_external=True)
@utils.requires_ext(extension='provider', service='network')
@ -271,7 +271,7 @@ class NetworksRbacTest(base.BaseNetworkRbacTest):
RBAC test for neutron update_network:provider:network_type policy
"""
try:
with self.rbac_utils.override_role(self):
with self.override_role():
self._update_network(self.network['id'],
provider_network_type='vxlan')
except lib_exc.BadRequest as exc:
@ -296,7 +296,7 @@ class NetworksRbacTest(base.BaseNetworkRbacTest):
RBAC test for neutron update_network:provider:physical_network policy
"""
try:
with self.rbac_utils.override_role(self):
with self.override_role():
self._update_network(self.network['id'],
provider_physical_network='provider')
except lib_exc.BadRequest as exc:
@ -321,7 +321,7 @@ class NetworksRbacTest(base.BaseNetworkRbacTest):
RBAC test for neutron update_network:provider:segmentation_id policy
"""
try:
with self.rbac_utils.override_role(self):
with self.override_role():
self._update_network(self.network['id'],
provider_segmentation_id=400)
except lib_exc.BadRequest as exc:
@ -341,7 +341,7 @@ class NetworksRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron get_network policy
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self.networks_client.show_network(self.network['id'])
@utils.requires_ext(extension='external-net', service='network')
@ -358,7 +358,7 @@ class NetworksRbacTest(base.BaseNetworkRbacTest):
"""
kwargs = {'fields': 'router:external'}
with self.rbac_utils.override_role(self):
with self.override_role():
retrieved_network = self.networks_client.show_network(
self.network['id'], **kwargs)['network']
@ -379,7 +379,7 @@ class NetworksRbacTest(base.BaseNetworkRbacTest):
"""
kwargs = {'fields': 'provider:network_type'}
with self.rbac_utils.override_role(self):
with self.override_role():
retrieved_network = self.networks_client.show_network(
self.network['id'], **kwargs)['network']
@ -401,7 +401,7 @@ class NetworksRbacTest(base.BaseNetworkRbacTest):
"""
kwargs = {'fields': 'provider:physical_network'}
with self.rbac_utils.override_role(self):
with self.override_role():
retrieved_network = self.networks_client.show_network(
self.network['id'], **kwargs)['network']
@ -423,7 +423,7 @@ class NetworksRbacTest(base.BaseNetworkRbacTest):
"""
kwargs = {'fields': 'provider:segmentation_id'}
with self.rbac_utils.override_role(self):
with self.override_role():
retrieved_network = self.networks_client.show_network(
self.network['id'], **kwargs)['network']
@ -441,7 +441,7 @@ class NetworksRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron delete_network policy
"""
network = self._create_network()
with self.rbac_utils.override_role(self):
with self.override_role():
self.networks_client.delete_network(network['id'])
@utils.requires_ext(extension='dhcp_agent_scheduler', service='network')
@ -454,7 +454,7 @@ class NetworksRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron "get_dhcp-agents" policy
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self.networks_client.list_dhcp_agents_on_hosting_network(
self.network['id'])
@ -468,7 +468,7 @@ class NetworksRbacTest(base.BaseNetworkRbacTest):
"""
admin_resource_id = self.network['id']
with (self.rbac_utils.override_role_and_validate_list(
self, admin_resource_id=admin_resource_id)) as ctx:
with (self.override_role_and_validate_list(
admin_resource_id=admin_resource_id)) as ctx:
ctx.resources = self.networks_client.list_networks(
id=admin_resource_id)["networks"]

View File

@ -59,7 +59,7 @@ class PolicyBandwidthLimitRuleExtRbacTest(base.BaseNetworkExtRbacTest):
RBAC test for the neutron "create_policy_bandwidth_limit_rule" policy
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self._create_bandwidth_limit_rule()
@decorators.idempotent_id('A092BD50-364F-4F55-B81A-37DAD6E77B95')
@ -73,7 +73,7 @@ class PolicyBandwidthLimitRuleExtRbacTest(base.BaseNetworkExtRbacTest):
"""
rule_id = self._create_bandwidth_limit_rule()
with self.rbac_utils.override_role(self):
with self.override_role():
self.ntp_client.show_bandwidth_limit_rule(self.policy_id, rule_id)
@decorators.idempotent_id('CAA27599-082B-44B9-AF09-8C9B8E777ED7')
@ -88,7 +88,7 @@ class PolicyBandwidthLimitRuleExtRbacTest(base.BaseNetworkExtRbacTest):
"""
rule_id = self._create_bandwidth_limit_rule()
with self.rbac_utils.override_role(self):
with self.override_role():
self.ntp_client.update_bandwidth_limit_rule(
self.policy_id, rule_id, max_kbps=2000)
@ -104,6 +104,6 @@ class PolicyBandwidthLimitRuleExtRbacTest(base.BaseNetworkExtRbacTest):
"""
rule_id = self._create_bandwidth_limit_rule()
with self.rbac_utils.override_role(self):
with self.override_role():
self.ntp_client.delete_bandwidth_limit_rule(self.policy_id,
rule_id)

View File

@ -59,7 +59,7 @@ class PolicyMinimumBandwidthRuleExtRbacTest(base.BaseNetworkExtRbacTest):
RBAC test for the neutron "create_policy_minimum_bandwidth_rule" policy
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self.create_minimum_bandwidth_rule()
@decorators.idempotent_id('01DD902C-47C5-45D2-9A0E-7AF05981DF21')
@ -73,7 +73,7 @@ class PolicyMinimumBandwidthRuleExtRbacTest(base.BaseNetworkExtRbacTest):
"""
rule_id = self.create_minimum_bandwidth_rule()
with self.rbac_utils.override_role(self):
with self.override_role():
self.ntp_client.show_minimum_bandwidth_rule(
self.policy_id, rule_id)
@ -90,7 +90,7 @@ class PolicyMinimumBandwidthRuleExtRbacTest(base.BaseNetworkExtRbacTest):
"""
rule_id = self.create_minimum_bandwidth_rule()
with self.rbac_utils.override_role(self):
with self.override_role():
self.ntp_client.update_minimum_bandwidth_rule(
self.policy_id, rule_id, min_kbps=2000)
@ -107,6 +107,6 @@ class PolicyMinimumBandwidthRuleExtRbacTest(base.BaseNetworkExtRbacTest):
"""
rule_id = self.create_minimum_bandwidth_rule()
with self.rbac_utils.override_role(self):
with self.override_role():
self.ntp_client.delete_minimum_bandwidth_rule(
self.policy_id, rule_id)

View File

@ -63,7 +63,7 @@ class PortsRbacTest(base.BaseNetworkRbacTest):
@decorators.idempotent_id('0ec8c551-625c-4864-8a52-85baa7c40f22')
def test_create_port(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.create_port(self.network)
@decorators.idempotent_id('045ee797-4962-4913-b96a-5d7ea04099e7')
@ -71,7 +71,7 @@ class PortsRbacTest(base.BaseNetworkRbacTest):
rules=["create_port",
"create_port:device_owner"])
def test_create_port_device_owner(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.create_port(self.network,
device_owner='network:router_interface')
@ -80,7 +80,7 @@ class PortsRbacTest(base.BaseNetworkRbacTest):
rules=["create_port",
"create_port:port_security_enabled"])
def test_create_port_security_enabled(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.create_port(self.network, port_security_enabled=True)
@utils.requires_ext(extension='binding', service='network')
@ -93,7 +93,7 @@ class PortsRbacTest(base.BaseNetworkRbacTest):
post_body = {'network': self.network,
'binding:host_id': "rbac_test_host"}
with self.rbac_utils.override_role(self):
with self.override_role():
self.create_port(**post_body)
@utils.requires_ext(extension='binding', service='network')
@ -108,7 +108,7 @@ class PortsRbacTest(base.BaseNetworkRbacTest):
post_body = {'network': self.network,
'binding:profile': binding_profile}
with self.rbac_utils.override_role(self):
with self.override_role():
self.create_port(**post_body)
@testtools.skipUnless(
@ -127,7 +127,7 @@ class PortsRbacTest(base.BaseNetworkRbacTest):
post_body = {'network': self.network,
'fixed_ips': fixed_ips}
with self.rbac_utils.override_role(self):
with self.override_role():
self.create_port(**post_body)
@rbac_rule_validation.action(service="neutron",
@ -139,7 +139,7 @@ class PortsRbacTest(base.BaseNetworkRbacTest):
post_body = {'network': self.network,
'mac_address': data_utils.rand_mac_address()}
with self.rbac_utils.override_role(self):
with self.override_role():
self.create_port(**post_body)
@rbac_rule_validation.action(service="neutron",
@ -155,7 +155,7 @@ class PortsRbacTest(base.BaseNetworkRbacTest):
post_body = {'network': self.network,
'allowed_address_pairs': allowed_address_pairs}
with self.rbac_utils.override_role(self):
with self.override_role():
self.create_port(**post_body)
@rbac_rule_validation.action(service="neutron",
@ -163,7 +163,7 @@ class PortsRbacTest(base.BaseNetworkRbacTest):
expected_error_codes=[404])
@decorators.idempotent_id('a9d41cb8-78a2-4b97-985c-44e4064416f4')
def test_show_port(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.ports_client.show_port(self.port['id'])
@utils.requires_ext(extension='binding', service='network')
@ -177,7 +177,7 @@ class PortsRbacTest(base.BaseNetworkRbacTest):
# Verify specific fields of a port
fields = ['binding:vif_type']
with self.rbac_utils.override_role(self):
with self.override_role():
retrieved_port = self.ports_client.show_port(
self.port['id'], fields=fields)['port']
@ -197,7 +197,7 @@ class PortsRbacTest(base.BaseNetworkRbacTest):
# Verify specific fields of a port
fields = ['binding:vif_details']
with self.rbac_utils.override_role(self):
with self.override_role():
retrieved_port = self.ports_client.show_port(
self.port['id'], fields=fields)['port']
@ -220,7 +220,7 @@ class PortsRbacTest(base.BaseNetworkRbacTest):
'binding:host_id': data_utils.rand_name('host-id')}
port = self.create_port(**post_body)
with self.rbac_utils.override_role(self):
with self.override_role():
retrieved_port = self.ports_client.show_port(
port['id'], fields=fields)['port']
@ -244,7 +244,7 @@ class PortsRbacTest(base.BaseNetworkRbacTest):
'binding:profile': binding_profile}
port = self.create_port(**post_body)
with self.rbac_utils.override_role(self):
with self.override_role():
retrieved_port = self.ports_client.show_port(
port['id'], fields=fields)['port']
@ -258,7 +258,7 @@ class PortsRbacTest(base.BaseNetworkRbacTest):
expected_error_codes=[404, 403])
@decorators.idempotent_id('afa80981-3c59-42fd-9531-3bcb2cd03711')
def test_update_port(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.ports_client.update_port(self.port['id'],
admin_state_up=False)
self.addCleanup(self.ports_client.update_port, self.port['id'],
@ -272,7 +272,7 @@ class PortsRbacTest(base.BaseNetworkRbacTest):
def test_update_port_device_owner(self):
original_device_owner = self.port['device_owner']
with self.rbac_utils.override_role(self):
with self.override_role():
self.ports_client.update_port(
self.port['id'], device_owner='network:router_interface')
self.addCleanup(self.ports_client.update_port, self.port['id'],
@ -286,7 +286,7 @@ class PortsRbacTest(base.BaseNetworkRbacTest):
def test_update_port_mac_address(self):
original_mac_address = self.port['mac_address']
with self.rbac_utils.override_role(self):
with self.override_role():
self.ports_client.update_port(
self.port['id'], mac_address=data_utils.rand_mac_address())
self.addCleanup(self.ports_client.update_port, self.port['id'],
@ -309,7 +309,7 @@ class PortsRbacTest(base.BaseNetworkRbacTest):
ip_list = self._get_unused_ip_address()
fixed_ips = [{'ip_address': ip_list[0]}]
with self.rbac_utils.override_role(self):
with self.override_role():
self.ports_client.update_port(port['id'], fixed_ips=fixed_ips)
@rbac_rule_validation.action(service="neutron",
@ -318,7 +318,7 @@ class PortsRbacTest(base.BaseNetworkRbacTest):
expected_error_codes=[404, 403, 403])
@decorators.idempotent_id('795541af-6652-4e35-9581-fd58224f7545')
def test_update_port_security_enabled(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.ports_client.update_port(self.port['id'],
port_security_enabled=True)
@ -337,7 +337,7 @@ class PortsRbacTest(base.BaseNetworkRbacTest):
updated_body = {'port_id': port['id'],
'binding:host_id': 'rbac_test_host_updated'}
with self.rbac_utils.override_role(self):
with self.override_role():
self.ports_client.update_port(**updated_body)
@utils.requires_ext(extension='binding', service='network')
@ -358,7 +358,7 @@ class PortsRbacTest(base.BaseNetworkRbacTest):
updated_body = {'port_id': port['id'],
'binding:profile': new_binding_profile}
with self.rbac_utils.override_role(self):
with self.override_role():
self.ports_client.update_port(**updated_body)
@rbac_rule_validation.action(service="neutron",
@ -375,7 +375,7 @@ class PortsRbacTest(base.BaseNetworkRbacTest):
post_body = {'network': self.network}
port = self.create_port(**post_body)
with self.rbac_utils.override_role(self):
with self.override_role():
self.ports_client.update_port(port['id'],
allowed_address_pairs=address_pairs)
@ -386,7 +386,7 @@ class PortsRbacTest(base.BaseNetworkRbacTest):
def test_delete_port(self):
port = self.create_port(self.network)
with self.rbac_utils.override_role(self):
with self.override_role():
self.ports_client.delete_port(port['id'])
@rbac_rule_validation.action(service="neutron", rules=["get_port"])
@ -398,7 +398,7 @@ class PortsRbacTest(base.BaseNetworkRbacTest):
the ``get_port`` policy
"""
admin_resource_id = self.port['id']
with (self.rbac_utils.override_role_and_validate_list(
self, admin_resource_id=admin_resource_id)) as ctx:
with (self.override_role_and_validate_list(
admin_resource_id=admin_resource_id)) as ctx:
ctx.resources = self.ports_client.list_ports(
id=admin_resource_id)["ports"]

View File

@ -53,7 +53,7 @@ class QosExtRbacTest(base.BaseNetworkExtRbacTest):
RBAC test for the neutron create_policy policy
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self.create_policy()
@rbac_rule_validation.action(service="neutron",
@ -67,7 +67,7 @@ class QosExtRbacTest(base.BaseNetworkExtRbacTest):
RBAC test for the neutron get_policy policy
"""
policy = self.create_policy()
with self.rbac_utils.override_role(self):
with self.override_role():
self.ntp_client.show_qos_policy(policy['id'])
@rbac_rule_validation.action(service="neutron",
@ -81,7 +81,7 @@ class QosExtRbacTest(base.BaseNetworkExtRbacTest):
RBAC test for the neutron update_policy policy
"""
policy = self.create_policy()
with self.rbac_utils.override_role(self):
with self.override_role():
self.ntp_client.update_qos_policy(policy['id'],
description='updated')
@ -96,7 +96,7 @@ class QosExtRbacTest(base.BaseNetworkExtRbacTest):
RBAC test for the neutron delete_policy policy
"""
policy = self.create_policy()
with self.rbac_utils.override_role(self):
with self.override_role():
self.ntp_client.delete_qos_policy(policy['id'])
@rbac_rule_validation.action(service="neutron", rules=["get_policy"])
@ -108,7 +108,7 @@ class QosExtRbacTest(base.BaseNetworkExtRbacTest):
the ``get_policy``
"""
admin_resource_id = self.create_policy()['id']
with (self.rbac_utils.override_role_and_validate_list(
self, admin_resource_id=admin_resource_id)) as ctx:
with (self.override_role_and_validate_list(
admin_resource_id=admin_resource_id)) as ctx:
ctx.resources = self.ntp_client.list_qos_policies(
id=admin_resource_id)["policies"]

View File

@ -56,7 +56,7 @@ class RbacPoliciesExtRbacTest(base.BaseNetworkExtRbacTest):
Neutron's custom FieldCheck oslo.policy rule.
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self.create_rbac_policy(self.tenant_id, self.network_id)
@decorators.idempotent_id('f5d836d8-3b64-412d-a283-ee29761017f3')
@ -77,7 +77,7 @@ class RbacPoliciesExtRbacTest(base.BaseNetworkExtRbacTest):
"""
policy_id = self.create_rbac_policy(self.tenant_id, self.network_id)
with self.rbac_utils.override_role(self):
with self.override_role():
self.ntp_client.update_rbac_policy(
policy_id, target_tenant=self.tenant_id)
@ -92,7 +92,7 @@ class RbacPoliciesExtRbacTest(base.BaseNetworkExtRbacTest):
"""
policy_id = self.create_rbac_policy(self.tenant_id, self.network_id)
with self.rbac_utils.override_role(self):
with self.override_role():
self.ntp_client.show_rbac_policy(policy_id)
@decorators.idempotent_id('54aa9bce-efea-47fb-b0e4-12012f82f285')
@ -107,7 +107,7 @@ class RbacPoliciesExtRbacTest(base.BaseNetworkExtRbacTest):
"""
policy_id = self.create_rbac_policy(self.tenant_id, self.network_id)
with self.rbac_utils.override_role(self):
with self.override_role():
self.ntp_client.delete_rbac_policy(policy_id)
@decorators.idempotent_id('5337d95a-2e75-47bb-a0ea-0a082be930bf')
@ -120,7 +120,7 @@ class RbacPoliciesExtRbacTest(base.BaseNetworkExtRbacTest):
"""
admin_resource_id = self.create_rbac_policy(self.tenant_id,
self.network_id)
with (self.rbac_utils.override_role_and_validate_list(
self, admin_resource_id=admin_resource_id)) as ctx:
with (self.override_role_and_validate_list(
admin_resource_id=admin_resource_id)) as ctx:
ctx.resources = self.ntp_client.list_rbac_policies(
id=admin_resource_id)["rbac_policies"]

View File

@ -63,7 +63,7 @@ class RouterRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron create_router policy
"""
with self.rbac_utils.override_role(self):
with self.override_role():
router = self.routers_client.create_router()
self.addCleanup(self.routers_client.delete_router,
router['router']['id'])
@ -78,7 +78,7 @@ class RouterRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron create_router:ha policy
"""
with self.rbac_utils.override_role(self):
with self.override_role():
router = self.routers_client.create_router(ha=True)
self.addCleanup(self.routers_client.delete_router,
router['router']['id'])
@ -93,7 +93,7 @@ class RouterRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron create_router:distributed policy
"""
with self.rbac_utils.override_role(self):
with self.override_role():
router = self.routers_client.create_router(distributed=True)
self.addCleanup(self.routers_client.delete_router,
router['router']['id'])
@ -114,7 +114,7 @@ class RouterRbacTest(base.BaseNetworkRbacTest):
external_gateway_info = {'network_id': self.network['id'],
'enable_snat': True}
with self.rbac_utils.override_role(self):
with self.override_role():
router = self.routers_client.create_router(
name=name, external_gateway_info=external_gateway_info)
self.addCleanup(self.routers_client.delete_router,
@ -140,7 +140,7 @@ class RouterRbacTest(base.BaseNetworkRbacTest):
'enable_snat': False, # Default is True.
'external_fixed_ips': [external_fixed_ips]}
with self.rbac_utils.override_role(self):
with self.override_role():
router = self.routers_client.create_router(
name=name, external_gateway_info=external_gateway_info)
self.addCleanup(self.routers_client.delete_router,
@ -156,7 +156,7 @@ class RouterRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron get_router policy
"""
# Prevent other policies from being enforced by using barebones fields.
with self.rbac_utils.override_role(self):
with self.override_role():
self.routers_client.show_router(self.router['id'], fields=['id'])
@decorators.idempotent_id('3ed26ea2-b419-410c-b4b5-576c1edafa06')
@ -173,7 +173,7 @@ class RouterRbacTest(base.BaseNetworkRbacTest):
router = self.routers_client.create_router(distributed=True)['router']
self.addCleanup(self.routers_client.delete_router, router['id'])
with self.rbac_utils.override_role(self):
with self.override_role():
retrieved_fields = self.routers_client.show_router(
router['id'], fields=['distributed'])['router']
@ -195,7 +195,7 @@ class RouterRbacTest(base.BaseNetworkRbacTest):
router = self.routers_client.create_router(ha=True)['router']
self.addCleanup(self.routers_client.delete_router, router['id'])
with self.rbac_utils.override_role(self):
with self.override_role():
retrieved_fields = self.routers_client.show_router(
router['id'], fields=['ha'])['router']
@ -215,7 +215,7 @@ class RouterRbacTest(base.BaseNetworkRbacTest):
"""
new_name = data_utils.rand_name(
self.__class__.__name__ + '-new-router-name')
with self.rbac_utils.override_role(self):
with self.override_role():
self.routers_client.update_router(self.router['id'], name=new_name)
@rbac_rule_validation.action(service="neutron",
@ -229,7 +229,7 @@ class RouterRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron
update_router:external_gateway_info policy
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self.routers_client.update_router(self.router['id'],
external_gateway_info={})
@ -246,7 +246,7 @@ class RouterRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron
update_router:external_gateway_info:network_id policy
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self.routers_client.update_router(
self.router['id'],
external_gateway_info={'network_id': self.network['id']})
@ -269,7 +269,7 @@ class RouterRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron
update_router:external_gateway_info:enable_snat policy
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self.routers_client.update_router(
self.router['id'],
external_gateway_info={'network_id': self.network['id'],
@ -298,7 +298,7 @@ class RouterRbacTest(base.BaseNetworkRbacTest):
external_gateway_info = {'network_id': self.network['id'],
'external_fixed_ips': [external_fixed_ips]}
with self.rbac_utils.override_role(self):
with self.override_role():
self.routers_client.update_router(
self.router['id'],
external_gateway_info=external_gateway_info)
@ -318,7 +318,7 @@ class RouterRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron update_router:ha policy
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self.routers_client.update_router(self.router['id'], ha=True)
self.addCleanup(self.routers_client.update_router, self.router['id'],
ha=False)
@ -334,7 +334,7 @@ class RouterRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron update_router:distributed policy
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self.routers_client.update_router(self.router['id'],
distributed=True)
self.addCleanup(self.routers_client.update_router, self.router['id'],
@ -350,7 +350,7 @@ class RouterRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron delete_router policy
"""
router = self.create_router()
with self.rbac_utils.override_role(self):
with self.override_role():
self.routers_client.delete_router(router['id'])
@rbac_rule_validation.action(service="neutron",
@ -366,7 +366,7 @@ class RouterRbacTest(base.BaseNetworkRbacTest):
subnet = self.create_subnet(network)
router = self.create_router()
with self.rbac_utils.override_role(self):
with self.override_role():
self.routers_client.add_router_interface(
router['id'], subnet_id=subnet['id'])
self.addCleanup(
@ -397,7 +397,7 @@ class RouterRbacTest(base.BaseNetworkRbacTest):
router['id'],
subnet_id=subnet['id'])
with self.rbac_utils.override_role(self):
with self.override_role():
self.routers_client.remove_router_interface(
router['id'],
subnet_id=subnet['id'])
@ -412,7 +412,7 @@ class RouterRbacTest(base.BaseNetworkRbacTest):
"""
admin_resource_id = self.router['id']
with (self.rbac_utils.override_role_and_validate_list(
self, admin_resource_id=admin_resource_id)) as ctx:
with (self.override_role_and_validate_list(
admin_resource_id=admin_resource_id)) as ctx:
ctx.resources = self.routers_client.list_routers(
id=admin_resource_id)["routers"]

View File

@ -74,7 +74,7 @@ class SecGroupRbacTest(base.BaseNetworkRbacTest):
@decorators.idempotent_id('db7003ce-5717-4e5b-afc7-befa35e8c67f')
def test_create_security_group(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self._create_security_group()
@rbac_rule_validation.action(service="neutron",
@ -83,7 +83,7 @@ class SecGroupRbacTest(base.BaseNetworkRbacTest):
@decorators.idempotent_id('56335e77-aef2-4b54-86c7-7f772034b585')
def test_show_security_group(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.security_groups_client.show_security_group(
self.secgroup['id'])
@ -97,7 +97,7 @@ class SecGroupRbacTest(base.BaseNetworkRbacTest):
# Create a security group
secgroup_id = self._create_security_group()['id']
with self.rbac_utils.override_role(self):
with self.override_role():
self.security_groups_client.delete_security_group(secgroup_id)
@rbac_rule_validation.action(service="neutron",
@ -110,7 +110,7 @@ class SecGroupRbacTest(base.BaseNetworkRbacTest):
# Create a security group
secgroup_id = self._create_security_group()['id']
with self.rbac_utils.override_role(self):
with self.override_role():
self.security_groups_client.update_security_group(
secgroup_id,
description="test description")
@ -125,8 +125,8 @@ class SecGroupRbacTest(base.BaseNetworkRbacTest):
the ``get_security_group`` policy
"""
admin_resource_id = self.secgroup['id']
with (self.rbac_utils.override_role_and_validate_list(
self, admin_resource_id=admin_resource_id)) as ctx:
with (self.override_role_and_validate_list(
admin_resource_id=admin_resource_id)) as ctx:
ctx.resources = self.security_groups_client.list_security_groups(
id=admin_resource_id)["security_groups"]
@ -135,7 +135,7 @@ class SecGroupRbacTest(base.BaseNetworkRbacTest):
@decorators.idempotent_id('953d78df-00cd-416f-9cbd-b7cb4ea65772')
def test_create_security_group_rule(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self._create_security_group_rule()
@rbac_rule_validation.action(service="neutron",
@ -146,7 +146,7 @@ class SecGroupRbacTest(base.BaseNetworkRbacTest):
def test_delete_security_group_rule(self):
sec_group_rule = self._create_security_group_rule()
with self.rbac_utils.override_role(self):
with self.override_role():
self.security_group_rules_client.delete_security_group_rule(
sec_group_rule['id'])
@ -157,7 +157,7 @@ class SecGroupRbacTest(base.BaseNetworkRbacTest):
def test_show_security_group_rule(self):
sec_group_rule = self._create_security_group_rule()
with self.rbac_utils.override_role(self):
with self.override_role():
self.security_group_rules_client.show_security_group_rule(
sec_group_rule['id'])
@ -166,7 +166,7 @@ class SecGroupRbacTest(base.BaseNetworkRbacTest):
@decorators.idempotent_id('05739ab6-fa35-11e6-bc64-92361f002671')
def test_list_security_group_rules(self):
with self.rbac_utils.override_role(self):
with self.override_role():
security_rules = self.security_group_rules_client.\
list_security_group_rules()

View File

@ -73,7 +73,7 @@ class SegmentsExtRbacTest(base.BaseNetworkExtRbacTest):
RBAC test for the neutron "create_segment" policy
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self.create_segment(self.network)
@decorators.idempotent_id('c02618e7-bb20-1a3a-83c8-6eec2af08127')
@ -87,7 +87,7 @@ class SegmentsExtRbacTest(base.BaseNetworkExtRbacTest):
"""
segment = self.create_segment(self.network)
with self.rbac_utils.override_role(self):
with self.override_role():
self.ntp_client.show_segment(segment['segment']['id'])
@decorators.idempotent_id('c02618e7-bb20-1a3a-83c8-6eec2af08128')
@ -102,7 +102,7 @@ class SegmentsExtRbacTest(base.BaseNetworkExtRbacTest):
"""
segment = self.create_segment(self.network)
with self.rbac_utils.override_role(self):
with self.override_role():
self.ntp_client.update_segment(segment['segment']['id'],
name="NewName")
@ -118,7 +118,7 @@ class SegmentsExtRbacTest(base.BaseNetworkExtRbacTest):
"""
segment = self.create_segment(self.network)
with self.rbac_utils.override_role(self):
with self.override_role():
self.ntp_client.delete_segment(segment['segment']['id'])
@decorators.idempotent_id('d68a0578-36ae-435e-8aaa-508ee96bdfae')
@ -130,7 +130,7 @@ class SegmentsExtRbacTest(base.BaseNetworkExtRbacTest):
the``get_segment`` policy
"""
admin_resource_id = self.create_segment(self.network)['segment']['id']
with (self.rbac_utils.override_role_and_validate_list(
self, admin_resource_id=admin_resource_id)) as ctx:
with (self.override_role_and_validate_list(
admin_resource_id=admin_resource_id)) as ctx:
ctx.resources = self.ntp_client.list_segments(
id=admin_resource_id)["segments"]

View File

@ -28,7 +28,7 @@ class ServiceProfileExtRbacTest(base.BaseNetworkExtRbacTest):
RBAC test for the neutron "create_service_profile" policy
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self.create_service_profile()
@decorators.idempotent_id('e4c473b7-3ae9-4a2e-8cac-848f7b01187d')
@ -41,7 +41,7 @@ class ServiceProfileExtRbacTest(base.BaseNetworkExtRbacTest):
RBAC test for the neutron "get_service_profile" policy
"""
profile_id = self.create_service_profile()
with self.rbac_utils.override_role(self):
with self.override_role():
self.ntp_client.show_service_profile(profile_id)
@decorators.idempotent_id('a3dd719d-4cd3-40cc-b4f1-5642e2717adf')
@ -55,7 +55,7 @@ class ServiceProfileExtRbacTest(base.BaseNetworkExtRbacTest):
RBAC test for the neutron "update_service_profile" policy
"""
profile_id = self.create_service_profile()
with self.rbac_utils.override_role(self):
with self.override_role():
self.ntp_client.update_service_profile(profile_id, enabled=False)
@decorators.idempotent_id('926b60c2-04fe-4339-aa44-bf27121392e8')
@ -69,5 +69,5 @@ class ServiceProfileExtRbacTest(base.BaseNetworkExtRbacTest):
RBAC test for the neutron "delete_service_profile" policy
"""
profile_id = self.create_service_profile()
with self.rbac_utils.override_role(self):
with self.override_role():
self.ntp_client.delete_service_profile(profile_id)

View File

@ -25,5 +25,5 @@ class ServiceProvidersRbacTest(base.BaseNetworkRbacTest):
rules=["get_service_provider"])
@decorators.idempotent_id('15f573b7-474a-4b37-8629-7fac86553ce5')
def test_list_service_providers(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.service_providers_client.list_service_providers()

View File

@ -60,7 +60,7 @@ class SubnetPoolsRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron create_subnetpool policy
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self._create_subnetpool()
@rbac_rule_validation.action(service="neutron",
@ -83,7 +83,7 @@ class SubnetPoolsRbacTest(base.BaseNetworkRbacTest):
self.addCleanup(self.subnetpools_client.update_subnetpool,
default_pool["id"], is_default=True)
with self.rbac_utils.override_role(self):
with self.override_role():
# It apparently only enforces the policy for is_default=True.
# It does nothing for is_default=False
self._create_subnetpool(is_default=True)
@ -98,7 +98,7 @@ class SubnetPoolsRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron create_subnetpool:shared policy
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self._create_subnetpool(shared=True)
@rbac_rule_validation.action(service="neutron",
@ -111,7 +111,7 @@ class SubnetPoolsRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron get_subnetpool policy
"""
subnetpool = self._create_subnetpool()
with self.rbac_utils.override_role(self):
with self.override_role():
self.subnetpools_client.show_subnetpool(subnetpool['id'])
@rbac_rule_validation.action(service="neutron",
@ -125,7 +125,7 @@ class SubnetPoolsRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron update_subnetpool policy
"""
subnetpool = self._create_subnetpool()
with self.rbac_utils.override_role(self):
with self.override_role():
self.subnetpools_client.update_subnetpool(subnetpool['id'],
min_prefixlen=24)
@ -147,7 +147,7 @@ class SubnetPoolsRbacTest(base.BaseNetworkRbacTest):
default_pool = self._create_subnetpool(is_default=True)
original_desc = default_pool['description']
with self.rbac_utils.override_role(self):
with self.override_role():
self.subnetpools_client.update_subnetpool(
default_pool['id'], description=original_desc, is_default=True)
@ -162,7 +162,7 @@ class SubnetPoolsRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron delete_subnetpool policy
"""
subnetpool = self._create_subnetpool()
with self.rbac_utils.override_role(self):
with self.override_role():
self.subnetpools_client.delete_subnetpool(subnetpool['id'])
@rbac_rule_validation.action(service="neutron", rules=["get_subnetpool"])
@ -174,7 +174,7 @@ class SubnetPoolsRbacTest(base.BaseNetworkRbacTest):
the ``get_subnetpool`` policy
"""
admin_resource_id = self._create_subnetpool()['id']
with (self.rbac_utils.override_role_and_validate_list(
self, admin_resource_id=admin_resource_id)) as ctx:
with (self.override_role_and_validate_list(
admin_resource_id=admin_resource_id)) as ctx:
ctx.resources = self.subnetpools_client.list_subnetpools(
id=admin_resource_id)["subnetpools"]

View File

@ -44,7 +44,7 @@ class SubnetsRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron "create_subnet" policy
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self.create_subnet(self.network)
@decorators.idempotent_id('c02618e7-bb20-4abd-83c8-6eec2af08752')
@ -56,7 +56,7 @@ class SubnetsRbacTest(base.BaseNetworkRbacTest):
RBAC test for the neutron "get_subnet" policy
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self.subnets_client.show_subnet(self.subnet['id'])
@decorators.idempotent_id('e2ddc415-5cab-43f4-9b61-166aed65d637')
@ -68,8 +68,8 @@ class SubnetsRbacTest(base.BaseNetworkRbacTest):
the ``get_subnet`` policy
"""
admin_resource_id = self.subnet['id']
with (self.rbac_utils.override_role_and_validate_list(
self, admin_resource_id=admin_resource_id)) as ctx:
with (self.override_role_and_validate_list(
admin_resource_id=admin_resource_id)) as ctx:
ctx.resources = self.subnets_client.list_subnets(
id=admin_resource_id)["subnets"]
@ -84,7 +84,7 @@ class SubnetsRbacTest(base.BaseNetworkRbacTest):
"""
update_name = data_utils.rand_name(self.__class__.__name__ + '-Subnet')
with self.rbac_utils.override_role(self):
with self.override_role():
self.subnets_client.update_subnet(self.subnet['id'],
name=update_name)
@ -99,5 +99,5 @@ class SubnetsRbacTest(base.BaseNetworkRbacTest):
"""
subnet = self.create_subnet(self.network)
with self.rbac_utils.override_role(self):
with self.override_role():
self.subnets_client.delete_subnet(subnet['id'])

View File

@ -52,7 +52,7 @@ class TrunksExtRbacTest(base.BaseNetworkExtRbacTest):
RBAC test for the neutron "create_trunk" policy
"""
with self.rbac_utils.override_role(self):
with self.override_role():
self.create_trunk(self.port_id)
@decorators.idempotent_id('c02618e7-bb20-1a3a-83c8-6eec2af08131')
@ -66,7 +66,7 @@ class TrunksExtRbacTest(base.BaseNetworkExtRbacTest):
"""
trunk = self.create_trunk(self.port_id)
with self.rbac_utils.override_role(self):
with self.override_role():
self.ntp_client.show_trunk(trunk['trunk']['id'])
@decorators.idempotent_id('c02618e7-bb20-1a3a-83c8-6eec2af08132')
@ -81,7 +81,7 @@ class TrunksExtRbacTest(base.BaseNetworkExtRbacTest):
"""
trunk = self.create_trunk(self.port_id)
with self.rbac_utils.override_role(self):
with self.override_role():
self.ntp_client.delete_trunk(trunk['trunk']['id'])
@decorators.idempotent_id('047badd1-e4ff-40c5-9929-99ffcb8750a7')
@ -93,8 +93,8 @@ class TrunksExtRbacTest(base.BaseNetworkExtRbacTest):
the ``get_trunk`` policy
"""
admin_resource_id = self.create_trunk(self.port_id)["trunk"]['id']
with (self.rbac_utils.override_role_and_validate_list(
self, admin_resource_id=admin_resource_id)) as ctx:
with (self.override_role_and_validate_list(
admin_resource_id=admin_resource_id)) as ctx:
ctx.resources = self.ntp_client.list_trunks(
id=admin_resource_id)["trunks"]
@ -149,7 +149,7 @@ class TrunksSubportsExtRbacTest(base.BaseNetworkExtRbacTest):
self.create_subports(self.trunk_id, port["id"])
with self.rbac_utils.override_role(self):
with self.override_role():
self.ntp_client.get_subports(self.trunk_id)
@decorators.idempotent_id('c02618e7-bb20-1a3a-83c8-6eec2af08134')
@ -176,7 +176,7 @@ class TrunksSubportsExtRbacTest(base.BaseNetworkExtRbacTest):
self.ntp_client.remove_subports,
self.trunk_id, subports)
with self.rbac_utils.override_role(self):
with self.override_role():
self.ntp_client.add_subports(self.trunk_id, subports)
@decorators.idempotent_id('c02618e7-bb20-1a3a-83c8-6eec2af08135')
@ -197,5 +197,5 @@ class TrunksSubportsExtRbacTest(base.BaseNetworkExtRbacTest):
subports = self.create_subports(self.trunk_id, port["id"])
with self.rbac_utils.override_role(self):
with self.override_role():
self.ntp_client.remove_subports(self.trunk_id, subports)

View File

@ -41,5 +41,5 @@ class CapabilitiesV3RbacTest(rbac_base.BaseVolumeRbacTest):
@decorators.idempotent_id('40928b74-2141-11e7-93ae-92361f002671')
def test_show_back_end_capabilities(self):
host = self.hosts_client.list_hosts()['hosts'][0]['host_name']
with self.rbac_utils.override_role(self):
with self.override_role():
self.capabilities_client.show_backend_capabilities(host)

View File

@ -73,7 +73,7 @@ class EncryptionTypesV3RbacTest(rbac_base.BaseVolumeRbacTest):
rules=[_CREATE_VOLUME_TYPE_ENCRYPTION])
def test_create_volume_type_encryption(self):
vol_type_id = self.create_volume_type()['id']
with self.rbac_utils.override_role(self):
with self.override_role():
self.encryption_types_client.create_encryption_type(
vol_type_id,
provider="nova.volume.encryptors.luks.LuksEncryptor",
@ -85,7 +85,7 @@ class EncryptionTypesV3RbacTest(rbac_base.BaseVolumeRbacTest):
rules=[_DELETE_VOLUME_TYPE_ENCRYPTION])
def test_delete_volume_type_encryption(self):
vol_type_id = self._create_volume_type_encryption()
with self.rbac_utils.override_role(self):
with self.override_role():
self.encryption_types_client.delete_encryption_type(vol_type_id)
@decorators.idempotent_id('42da9fec-32fd-4dca-9242-8a53b2fed25a')
@ -94,7 +94,7 @@ class EncryptionTypesV3RbacTest(rbac_base.BaseVolumeRbacTest):
rules=[_UPDATE_VOLUME_TYPE_ENCRYPTION])
def test_update_volume_type_encryption(self):
vol_type_id = self._create_volume_type_encryption()
with self.rbac_utils.override_role(self):
with self.override_role():
self.encryption_types_client.update_encryption_type(
vol_type_id,
control_location="front-end")
@ -105,7 +105,7 @@ class EncryptionTypesV3RbacTest(rbac_base.BaseVolumeRbacTest):
rules=[_SHOW_VOLUME_TYPE_ENCRYPTION])
def test_show_volume_type_encryption(self):
vol_type_id = self._create_volume_type_encryption()
with self.rbac_utils.override_role(self):
with self.override_role():
self.encryption_types_client.show_encryption_type(vol_type_id)
@decorators.idempotent_id('d4ed3cf8-52b2-4fa2-910d-e405361f0881')
@ -114,6 +114,6 @@ class EncryptionTypesV3RbacTest(rbac_base.BaseVolumeRbacTest):
rules=[_SHOW_VOLUME_TYPE_ENCRYPTION])
def test_show_encryption_specs_item(self):
vol_type_id = self._create_volume_type_encryption()
with self.rbac_utils.override_role(self):
with self.override_role():
self.encryption_types_client.show_encryption_specs_item(
vol_type_id, 'provider')

View File

@ -92,7 +92,7 @@ class GroupSnaphotsV314RbacTest(BaseGroupSnapshotsRbacTest):
rules=["group:create_group_snapshot"]
)
def test_create_group_snapshot(self):
with self.rbac_utils.override_role(self):
with self.override_role():
name = data_utils.rand_name(
self.__class__.__name__ + '-Group_Snapshot')
group_snapshot = self.group_snapshots_client.create_group_snapshot(
@ -118,7 +118,7 @@ class GroupSnaphotsV314RbacTest(BaseGroupSnapshotsRbacTest):
group_snapshot_name = data_utils.rand_name('group_snapshot')
group_snapshot = self._create_group_snapshot(group_id=self.grp['id'],
name=group_snapshot_name)
with self.rbac_utils.override_role(self):
with self.override_role():
self.group_snapshots_client.show_group_snapshot(
group_snapshot['id'])
@ -128,7 +128,7 @@ class GroupSnaphotsV314RbacTest(BaseGroupSnapshotsRbacTest):
rules=["group:get_all_group_snapshots"]
)
def test_list_group_snapshot_rbac(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.group_snapshots_client.list_group_snapshots()
@decorators.idempotent_id('cf2e25ee-ca58-4ad6-b98d-33235c77db7b')
@ -140,7 +140,7 @@ class GroupSnaphotsV314RbacTest(BaseGroupSnapshotsRbacTest):
group_snapshot_name = data_utils.rand_name('group_snapshot')
group_snapshot = self._create_group_snapshot(group_id=self.grp['id'],
name=group_snapshot_name)
with self.rbac_utils.override_role(self):
with self.override_role():
self.group_snapshots_client.delete_group_snapshot(
group_snapshot['id'])
vols = self.volumes_client.list_volumes(detail=True)['volumes']
@ -192,7 +192,7 @@ class GroupSnaphotsV319RbacTest(BaseGroupSnapshotsRbacTest):
group_snapshot_name = data_utils.rand_name('group_snapshot')
group_snapshot = self._create_group_snapshot(group_id=self.grp['id'],
name=group_snapshot_name)
with self.rbac_utils.override_role(self):
with self.override_role():
self.group_snapshots_client.reset_group_snapshot_status(
group_snapshot['id'], 'error')

View File

@ -39,7 +39,7 @@ class GroupTypeSpecsRbacTest(rbac_base.BaseVolumeRbacTest):
"key2": "value2"
}
with self.rbac_utils.override_role(self):
with self.override_role():
self.group_types_client. \
create_or_update_group_type_specs(
group_type['id'], create_specs)['group_specs']
@ -58,7 +58,7 @@ class GroupTypeSpecsRbacTest(rbac_base.BaseVolumeRbacTest):
self.group_types_client.create_or_update_group_type_specs(
group_type['id'], specs)['group_specs']
# Show specified item of group type specs
with self.rbac_utils.override_role(self):
with self.override_role():
self.group_types_client.show_group_type_specs_item(
group_type['id'], 'key2')
@ -74,7 +74,7 @@ class GroupTypeSpecsRbacTest(rbac_base.BaseVolumeRbacTest):
update_spec = {update_key: "value3-updated"}
self.group_types_client.create_or_update_group_type_specs(
group_type['id'], update_spec)['group_specs']
with self.rbac_utils.override_role(self):
with self.override_role():
self.group_types_client.update_group_type_specs_item(
group_type['id'], update_key, update_spec)
@ -85,7 +85,7 @@ class GroupTypeSpecsRbacTest(rbac_base.BaseVolumeRbacTest):
)
def test_group_type_specs_list(self):
group_type = self.create_group_type()
with self.rbac_utils.override_role(self):
with self.override_role():
self.group_types_client.list_group_type_specs(
group_type['id'])['group_specs']
@ -101,6 +101,6 @@ class GroupTypeSpecsRbacTest(rbac_base.BaseVolumeRbacTest):
specs = {'key1': 'value1'}
self.group_types_client.create_or_update_group_type_specs(
group_type['id'], specs)['group_specs']
with self.rbac_utils.override_role(self):
with self.override_role():
self.group_types_client.delete_group_type_specs_item(
group_type['id'], delete_key)

View File

@ -68,7 +68,7 @@ class GroupsV3RbacTest(BaseGroupRbacTest):
group_name = name or data_utils.rand_name(
self.__class__.__name__ + '-Group')
with self.rbac_utils.override_role(self):
with self.override_role():
group = self.groups_client.create_group(
name=group_name, group_type=self.group_type_id,
volume_types=[self.volume_type_id])['group']
@ -85,7 +85,7 @@ class GroupsV3RbacTest(BaseGroupRbacTest):
group = self._create_group(group_type=self.group_type_id,
volume_types=[self.volume_type_id])
with self.rbac_utils.override_role(self):
with self.override_role():
self.groups_client.show_group(group['id'])
@decorators.idempotent_id('db43841b-a173-4317-acfc-f83e4e48e4ee')
@ -93,7 +93,7 @@ class GroupsV3RbacTest(BaseGroupRbacTest):
service="cinder",
rules=["group:get_all"])
def test_list_groups(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.groups_client.list_groups()['groups']
@decorators.idempotent_id('5378da93-9c26-4ad4-b039-0555e2b8f668')
@ -101,7 +101,7 @@ class GroupsV3RbacTest(BaseGroupRbacTest):
service="cinder",
rules=["group:get_all"])
def test_list_groups_with_details(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.groups_client.list_groups(detail=True)['groups']
@decorators.idempotent_id('f499fc48-df83-4917-bf8d-783ebf6f080b')
@ -113,7 +113,7 @@ class GroupsV3RbacTest(BaseGroupRbacTest):
volume_types=[self.volume_type_id])
updated_name = data_utils.rand_name(self.__class__.__name__ + '-Group')
with self.rbac_utils.override_role(self):
with self.override_role():
self.groups_client.update_group(group['id'], name=updated_name)
@decorators.idempotent_id('66fda391-5774-42a9-a018-80b34e57ab76')
@ -126,7 +126,7 @@ class GroupsV3RbacTest(BaseGroupRbacTest):
group_type=self.group_type_id,
volume_types=[self.volume_type_id])
group_id = group['id']
with self.rbac_utils.override_role(self):
with self.override_role():
self.groups_client.delete_group(group_id, delete_volumes=True)
self.groups_client.wait_for_resource_deletion(group_id)
@ -152,7 +152,7 @@ class GroupV320RbacTest(BaseGroupRbacTest):
group_type=self.group_type_id,
volume_types=[self.volume_type_id])
status = 'available'
with self.rbac_utils.override_role(self):
with self.override_role():
self.groups_client.reset_group_status(group['id'],
status)
waiters.wait_for_volume_resource_status(
@ -168,7 +168,7 @@ class GroupTypesV3RbacTest(rbac_base.BaseVolumeRbacTest):
service="cinder",
rules=["group:group_types_manage"])
def test_create_group_type(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.create_group_type(ignore_notfound=True)
@decorators.idempotent_id('f77f8156-4fc9-4f02-be15-8930f748e10c')
@ -178,7 +178,7 @@ class GroupTypesV3RbacTest(rbac_base.BaseVolumeRbacTest):
def test_delete_group_type(self):
group_type = self.create_group_type(ignore_notfound=True)
with self.rbac_utils.override_role(self):
with self.override_role():
self.group_types_client.delete_group_type(group_type['id'])
@decorators.idempotent_id('67929954-4551-4d22-b15a-27fb6e56b711')
@ -192,7 +192,7 @@ class GroupTypesV3RbacTest(rbac_base.BaseVolumeRbacTest):
self.__class__.__name__ + '-updated-group-type'),
'description': 'updated-group-type-desc'
}
with self.rbac_utils.override_role(self):
with self.override_role():
self.group_types_client.update_group_type(
group_type['id'], **update_params)
@ -204,7 +204,7 @@ class GroupTypesV3RbacTest(rbac_base.BaseVolumeRbacTest):
# TODO(felipemonteiro): Combine with ``test_create_group_type``
# once multiple policy testing is supported. This policy is
# only enforced after "group:group_types_manage".
with self.rbac_utils.override_role(self):
with self.override_role():
group_type = self.create_group_type(ignore_notfound=True)
if 'group_specs' not in group_type:
@ -217,7 +217,7 @@ class GroupTypesV3RbacTest(rbac_base.BaseVolumeRbacTest):
rules=["group:access_group_types_specs"])
def test_show_group_type(self):
group_type = self.create_group_type()
with self.rbac_utils.override_role(self):
with self.override_role():
resp_body = self.group_types_client.show_group_type(
group_type['id'])['group_type']
if 'group_specs' not in resp_body:

View File

@ -46,7 +46,7 @@ class LimitsV3RbacTest(rbac_base.BaseVolumeRbacTest):
'totalBackupGigabytesUsed'
}
with self.rbac_utils.override_role(self):
with self.override_role():
absolute_limits = self.volume_limits_client.show_limits()[
'limits']['absolute']
for key in expected_keys:

View File

@ -42,7 +42,7 @@ class VolumeQOSV3RbacTest(rbac_base.BaseVolumeRbacTest):
service="cinder", rules=["volume_extension:qos_specs_manage:create"])
@decorators.idempotent_id('4f9f45f0-b379-4577-a279-cec3e917cbec')
def test_create_qos_with_consumer(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self._create_test_qos_specs()
@rbac_rule_validation.action(
@ -50,7 +50,7 @@ class VolumeQOSV3RbacTest(rbac_base.BaseVolumeRbacTest):
@decorators.idempotent_id('fbc8a77e-6b6d-45ae-bebe-c496eb8f06f7')
def test_delete_qos_with_consumer(self):
qos = self._create_test_qos_specs()
with self.rbac_utils.override_role(self):
with self.override_role():
self.qos_client.delete_qos(qos['id'])
@rbac_rule_validation.action(
@ -59,7 +59,7 @@ class VolumeQOSV3RbacTest(rbac_base.BaseVolumeRbacTest):
@decorators.idempotent_id('22aff0dd-0343-408d-ae80-e77551956e14')
def test_show_qos(self):
qos = self._create_test_qos_specs()
with self.rbac_utils.override_role(self):
with self.override_role():
self.qos_client.show_qos(qos['id'])['qos_specs']
@rbac_rule_validation.action(
@ -72,7 +72,7 @@ class VolumeQOSV3RbacTest(rbac_base.BaseVolumeRbacTest):
self.qos_client.associate_qos(qos['id'], vol_type)
self.addCleanup(self.qos_client.disassociate_qos, qos['id'], vol_type)
with self.rbac_utils.override_role(self):
with self.override_role():
self.qos_client.show_association_qos(qos['id'])
@rbac_rule_validation.action(
@ -80,7 +80,7 @@ class VolumeQOSV3RbacTest(rbac_base.BaseVolumeRbacTest):
rules=["volume_extension:qos_specs_manage:get_all"])
@decorators.idempotent_id('546b8bb1-04a4-4387-9506-a538a7f3cd6a')
def test_list_qos(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.qos_client.list_qos()['qos_specs']
@rbac_rule_validation.action(
@ -88,7 +88,7 @@ class VolumeQOSV3RbacTest(rbac_base.BaseVolumeRbacTest):
@decorators.idempotent_id('89b630b7-c170-47c3-ac80-50ed425c2d98')
def test_set_qos_key(self):
qos = self._create_test_qos_specs()
with self.rbac_utils.override_role(self):
with self.override_role():
self.qos_client.set_qos_key(
qos['id'], iops_bytes='500')['qos_specs']
@ -99,7 +99,7 @@ class VolumeQOSV3RbacTest(rbac_base.BaseVolumeRbacTest):
qos = self._create_test_qos_specs()
self.qos_client.set_qos_key(qos['id'], iops_bytes='500')['qos_specs']
with self.rbac_utils.override_role(self):
with self.override_role():
self.qos_client.unset_qos_key(qos['id'], ['iops_bytes'])
waiters.wait_for_qos_operations(self.qos_client, qos['id'],
'qos-key-unset', args=['iops_bytes'])
@ -111,7 +111,7 @@ class VolumeQOSV3RbacTest(rbac_base.BaseVolumeRbacTest):
qos = self._create_test_qos_specs()
vol_type = self.create_volume_type()['id']
with self.rbac_utils.override_role(self):
with self.override_role():
self.qos_client.associate_qos(qos['id'], vol_type)
self.addCleanup(
test_utils.call_and_ignore_notfound_exc,
@ -127,7 +127,7 @@ class VolumeQOSV3RbacTest(rbac_base.BaseVolumeRbacTest):
self.addCleanup(test_utils.call_and_ignore_notfound_exc,
self.qos_client.disassociate_qos, qos['id'], vol_type)
with self.rbac_utils.override_role(self):
with self.override_role():
self.qos_client.disassociate_qos(qos['id'], vol_type)
waiters.wait_for_qos_operations(self.qos_client, qos['id'],
'disassociate', args=vol_type)
@ -142,7 +142,7 @@ class VolumeQOSV3RbacTest(rbac_base.BaseVolumeRbacTest):
self.addCleanup(test_utils.call_and_ignore_notfound_exc,
self.qos_client.disassociate_qos, qos['id'], vol_type)
with self.rbac_utils.override_role(self):
with self.override_role():
self.qos_client.disassociate_all_qos(qos['id'])
waiters.wait_for_qos_operations(self.qos_client, qos['id'],
'disassociate-all')

View File

@ -41,7 +41,7 @@ class QuotaClassesV3RbacTest(rbac_base.BaseVolumeRbacTest):
@rbac_rule_validation.action(service="cinder",
rules=["volume_extension:quota_classes"])
def test_show_quota_class_set(self):
with self.rbac_utils.override_role(self):
with self.override_role():
self.quota_classes_client.show_quota_class_set(
self.quota_name)['quota_class_set']
@ -53,6 +53,6 @@ class QuotaClassesV3RbacTest(rbac_base.BaseVolumeRbacTest):
self.quota_name)['quota_class_set']
quota_class_set.pop('id')
with self.rbac_utils.override_role(self):
with self.override_role():
self.quota_classes_client.update_quota_class_set(self.quota_name,
**quota_class_set)

Some files were not shown because too many files have changed in this diff Show More