patrole/patrole_tempest_plugin/tests/unit/resources
Mykola Yakovliev d02a8d836c RequirementsAuthority multi role support enhancement
This patchset eliminates different behaviour between
policy_authority and requirements_authority.

Problem description:

`rbac_test_roles = [member,]`

Policy authority:

`update_port: role:member and role:viewer`

Results in 403/False (we are member but not viewer).

Requirements authority:

```
req_auth:
    update_port:
        - member
        - viewer
```

Results in 200/True (member in update_port list).

Proposed solution:

Change requirements_authority file sytax to support
comma separated roles to be considered as logical and.

Depends-On: https://review.openstack.org/#/c/606110/
Change-Id: I2e2a4a2020f5e85af15f1836d69386bc91a2d2ec
Co-Authored-By: Felipe Monteiro <felipe.monteiro@att.com>
2018-11-08 14:44:09 +00:00
..
admin_rbac_policy.json Changes tox to only run unit tests and moves unit tests to tests/unit. 2017-02-28 16:03:08 -05:00
alt_admin_rbac_policy.json Changes tox to only run unit tests and moves unit tests to tests/unit. 2017-02-28 16:03:08 -05:00
custom_rbac_policy.json Modify policy parser to combine custom and default policy files. 2017-03-29 19:07:52 +00:00
custom_rbac_policy.yaml Use oslo_policy.policy.Rules.load to load rules 2018-09-12 18:26:21 -05:00
rbac_roles.yaml RequirementsAuthority multi role support enhancement 2018-11-08 14:44:09 +00:00
tenant_rbac_policy.json Enhance rbac policy parser to correctly interpret user_id policy actions. 2017-03-02 10:58:46 -05:00