¡@

Home 

OpenStack Study: test_policy.py

OpenStack Index

**** CubicPower OpenStack Study ****

# Copyright (c) 2012 OpenStack Foundation.

#

# Licensed under the Apache License, Version 2.0 (the "License");

# you may not use this file except in compliance with the License.

# You may obtain a copy of the License at

#

# http://www.apache.org/licenses/LICENSE-2.0

#

# Unless required by applicable law or agreed to in writing, software

# distributed under the License is distributed on an "AS IS" BASIS,

# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or

# implied.

# See the License for the specific language governing permissions and

# limitations under the License.

"""Test of Policy Engine For Neutron"""

import json

import urllib2

import fixtures

import mock

import six

import neutron

from neutron.api.v2 import attributes

from neutron.common import exceptions

from neutron import context

from neutron import manager

from neutron.openstack.common import importutils

from neutron.openstack.common import policy as common_policy

from neutron import policy

from neutron.tests import base

**** CubicPower OpenStack Study ****

class PolicyFileTestCase(base.BaseTestCase):

**** CubicPower OpenStack Study ****

    def setUp(self):

        super(PolicyFileTestCase, self).setUp()

        policy.reset()

        self.addCleanup(policy.reset)

        self.context = context.Context('fake', 'fake', is_admin=False)

        self.target = {}

        self.tempdir = self.useFixture(fixtures.TempDir())

**** CubicPower OpenStack Study ****

    def test_modified_policy_reloads(self):

        def fake_find_config_file(_1, _2):

            return self.tempdir.join('policy')

        with mock.patch.object(neutron.common.utils,

                               'find_config_file',

                               new=fake_find_config_file):

            tmpfilename = fake_find_config_file(None, None)

            action = "example:test"

            with open(tmpfilename, "w") as policyfile:

                policyfile.write("""{"example:test": ""}""")

            policy.enforce(self.context, action, self.target)

            with open(tmpfilename, "w") as policyfile:

                policyfile.write("""{"example:test": "!"}""")

            # NOTE(vish): reset stored policy cache so we don't have to

            # sleep(1)

            policy._POLICY_CACHE = {}

            self.assertRaises(exceptions.PolicyNotAuthorized,

                              policy.enforce,

                              self.context,

                              action,

                              self.target)

**** CubicPower OpenStack Study ****

        def fake_find_config_file(_1, _2):

            return self.tempdir.join('policy')

        with mock.patch.object(neutron.common.utils,

                               'find_config_file',

                               new=fake_find_config_file):

            tmpfilename = fake_find_config_file(None, None)

            action = "example:test"

            with open(tmpfilename, "w") as policyfile:

                policyfile.write("""{"example:test": ""}""")

            policy.enforce(self.context, action, self.target)

            with open(tmpfilename, "w") as policyfile:

                policyfile.write("""{"example:test": "!"}""")

            # NOTE(vish): reset stored policy cache so we don't have to

            # sleep(1)

            policy._POLICY_CACHE = {}

            self.assertRaises(exceptions.PolicyNotAuthorized,

                              policy.enforce,

                              self.context,

                              action,

                              self.target)

**** CubicPower OpenStack Study ****

class PolicyTestCase(base.BaseTestCase):

**** CubicPower OpenStack Study ****

    def setUp(self):

        super(PolicyTestCase, self).setUp()

        policy.reset()

        self.addCleanup(policy.reset)

        # NOTE(vish): preload rules to circumvent reloading from file

        policy.init()

        rules = {

            "true": '@',

            "example:allowed": '@',

            "example:denied": '!',

            "example:get_http": "http:http://www.example.com",

            "example:my_file": "role:compute_admin or tenant_id:%(tenant_id)s",

            "example:early_and_fail": "! and @",

            "example:early_or_success": "@ or !",

            "example:lowercase_admin": "role:admin or role:sysadmin",

            "example:uppercase_admin": "role:ADMIN or role:sysadmin",

        }

        # NOTE(vish): then overload underlying rules

        common_policy.set_rules(common_policy.Rules(

            dict((k, common_policy.parse_rule(v))

                 for k, v in rules.items())))

        self.context = context.Context('fake', 'fake', roles=['member'])

        self.target = {}

**** CubicPower OpenStack Study ****

    def test_enforce_nonexistent_action_throws(self):

        action = "example:noexist"

        self.assertRaises(exceptions.PolicyNotAuthorized, policy.enforce,

                          self.context, action, self.target)

**** CubicPower OpenStack Study ****

    def test_enforce_bad_action_throws(self):

        action = "example:denied"

        self.assertRaises(exceptions.PolicyNotAuthorized, policy.enforce,

                          self.context, action, self.target)

**** CubicPower OpenStack Study ****

    def test_check_bad_action_noraise(self):

        action = "example:denied"

        result = policy.check(self.context, action, self.target)

        self.assertEqual(result, False)

**** CubicPower OpenStack Study ****

    def test_check_if_exists_non_existent_action_raises(self):

        action = "example:idonotexist"

        self.assertRaises(exceptions.PolicyRuleNotFound,

                          policy.check_if_exists,

                          self.context, action, self.target)

**** CubicPower OpenStack Study ****

    def test_enforce_good_action(self):

        action = "example:allowed"

        result = policy.enforce(self.context, action, self.target)

        self.assertEqual(result, True)

**** CubicPower OpenStack Study ****

    def test_enforce_http_true(self):

        def fakeurlopen(url, post_data):

            return six.StringIO("True")

        with mock.patch.object(urllib2, 'urlopen', new=fakeurlopen):

            action = "example:get_http"

            target = {}

            result = policy.enforce(self.context, action, target)

            self.assertEqual(result, True)

**** CubicPower OpenStack Study ****

        def fakeurlopen(url, post_data):

            return six.StringIO("True")

        with mock.patch.object(urllib2, 'urlopen', new=fakeurlopen):

            action = "example:get_http"

            target = {}

            result = policy.enforce(self.context, action, target)

            self.assertEqual(result, True)

**** CubicPower OpenStack Study ****

    def test_enforce_http_false(self):

        def fakeurlopen(url, post_data):

            return six.StringIO("False")

        with mock.patch.object(urllib2, 'urlopen', new=fakeurlopen):

            action = "example:get_http"

            target = {}

            self.assertRaises(exceptions.PolicyNotAuthorized, policy.enforce,

                              self.context, action, target)

**** CubicPower OpenStack Study ****

        def fakeurlopen(url, post_data):

            return six.StringIO("False")

        with mock.patch.object(urllib2, 'urlopen', new=fakeurlopen):

            action = "example:get_http"

            target = {}

            self.assertRaises(exceptions.PolicyNotAuthorized, policy.enforce,

                              self.context, action, target)

**** CubicPower OpenStack Study ****

    def test_templatized_enforcement(self):

        target_mine = {'tenant_id': 'fake'}

        target_not_mine = {'tenant_id': 'another'}

        action = "example:my_file"

        policy.enforce(self.context, action, target_mine)

        self.assertRaises(exceptions.PolicyNotAuthorized, policy.enforce,

                          self.context, action, target_not_mine)

**** CubicPower OpenStack Study ****

    def test_early_AND_enforcement(self):

        action = "example:early_and_fail"

        self.assertRaises(exceptions.PolicyNotAuthorized, policy.enforce,

                          self.context, action, self.target)

**** CubicPower OpenStack Study ****

    def test_early_OR_enforcement(self):

        action = "example:early_or_success"

        policy.enforce(self.context, action, self.target)

**** CubicPower OpenStack Study ****

    def test_ignore_case_role_check(self):

        lowercase_action = "example:lowercase_admin"

        uppercase_action = "example:uppercase_admin"

        # NOTE(dprince) we mix case in the Admin role here to ensure

        # case is ignored

        admin_context = context.Context('admin', 'fake', roles=['AdMiN'])

        policy.enforce(admin_context, lowercase_action, self.target)

        policy.enforce(admin_context, uppercase_action, self.target)

**** CubicPower OpenStack Study ****

class DefaultPolicyTestCase(base.BaseTestCase):

**** CubicPower OpenStack Study ****

    def setUp(self):

        super(DefaultPolicyTestCase, self).setUp()

        policy.reset()

        policy.init()

        self.addCleanup(policy.reset)

        self.rules = {

            "default": '',

            "example:exist": '!',

        }

        self._set_rules('default')

        self.context = context.Context('fake', 'fake')

**** CubicPower OpenStack Study ****

    def _set_rules(self, default_rule):

        rules = common_policy.Rules(

            dict((k, common_policy.parse_rule(v))

                 for k, v in self.rules.items()), default_rule)

        common_policy.set_rules(rules)

**** CubicPower OpenStack Study ****

    def test_policy_called(self):

        self.assertRaises(exceptions.PolicyNotAuthorized, policy.enforce,

                          self.context, "example:exist", {})

**** CubicPower OpenStack Study ****

    def test_not_found_policy_calls_default(self):

        policy.enforce(self.context, "example:noexist", {})

**** CubicPower OpenStack Study ****

    def test_default_not_found(self):

        self._set_rules("default_noexist")

        self.assertRaises(exceptions.PolicyNotAuthorized, policy.enforce,

                          self.context, "example:noexist", {})

FAKE_RESOURCE_NAME = 'something'

FAKE_RESOURCE = {"%ss" % FAKE_RESOURCE_NAME:

                 {'attr': {'allow_post': True,

                           'allow_put': True,

                           'is_visible': True,

                           'default': None,

                           'enforce_policy': True,

                           'validate': {'type:dict':

                                        {'sub_attr_1': {'type:string': None},

                                         'sub_attr_2': {'type:string': None}}}

                           }}}

**** CubicPower OpenStack Study ****

class NeutronPolicyTestCase(base.BaseTestCase):

**** CubicPower OpenStack Study ****

    def setUp(self):

        super(NeutronPolicyTestCase, self).setUp()

        policy.reset()

        policy.init()

        self.addCleanup(policy.reset)

        self.admin_only_legacy = "role:admin"

        self.admin_or_owner_legacy = "role:admin or tenant_id:%(tenant_id)s"

        # Add a Fake 'something' resource to RESOURCE_ATTRIBUTE_MAP

        attributes.RESOURCE_ATTRIBUTE_MAP.update(FAKE_RESOURCE)

        self.rules = dict((k, common_policy.parse_rule(v)) for k, v in {

            "context_is_admin": "role:admin",

            "admin_or_network_owner": "rule:context_is_admin or "

                                      "tenant_id:%(network:tenant_id)s",

            "admin_or_owner": ("rule:context_is_admin or "

                               "tenant_id:%(tenant_id)s"),

            "admin_only": "rule:context_is_admin",

            "regular_user": "role:user",

            "shared": "field:networks:shared=True",

            "external": "field:networks:router:external=True",

            "default": '@',

            "create_network": "rule:admin_or_owner",

            "create_network:shared": "rule:admin_only",

            "update_network": '@',

            "update_network:shared": "rule:admin_only",

            "get_network": "rule:admin_or_owner or "

                           "rule:shared or "

                           "rule:external",

            "create_port:mac": "rule:admin_or_network_owner",

            "create_something": "rule:admin_or_owner",

            "create_something:attr": "rule:admin_or_owner",

            "create_something:attr:sub_attr_1": "rule:admin_or_owner",

            "create_something:attr:sub_attr_2": "rule:admin_only",

            "get_firewall_policy": "rule:admin_or_owner or "

                            "rule:shared",

            "get_firewall_rule": "rule:admin_or_owner or "

                            "rule:shared"

        }.items())

        def fakepolicyinit():

            common_policy.set_rules(common_policy.Rules(self.rules))

        def remove_fake_resource():

            del attributes.RESOURCE_ATTRIBUTE_MAP["%ss" % FAKE_RESOURCE_NAME]

        self.patcher = mock.patch.object(neutron.policy,

                                         'init',

                                         new=fakepolicyinit)

        self.patcher.start()

        self.addCleanup(self.patcher.stop)

        self.addCleanup(remove_fake_resource)

        self.context = context.Context('fake', 'fake', roles=['user'])

        plugin_klass = importutils.import_class(

            "neutron.db.db_base_plugin_v2.NeutronDbPluginV2")

        self.manager_patcher = mock.patch('neutron.manager.NeutronManager')

        fake_manager = self.manager_patcher.start()

        fake_manager_instance = fake_manager.return_value

        fake_manager_instance.plugin = plugin_klass()

        self.addCleanup(self.manager_patcher.stop)

**** CubicPower OpenStack Study ****

        def fakepolicyinit():

            common_policy.set_rules(common_policy.Rules(self.rules))

**** CubicPower OpenStack Study ****

        def remove_fake_resource():

            del attributes.RESOURCE_ATTRIBUTE_MAP["%ss" % FAKE_RESOURCE_NAME]

        self.patcher = mock.patch.object(neutron.policy,

                                         'init',

                                         new=fakepolicyinit)

        self.patcher.start()

        self.addCleanup(self.patcher.stop)

        self.addCleanup(remove_fake_resource)

        self.context = context.Context('fake', 'fake', roles=['user'])

        plugin_klass = importutils.import_class(

            "neutron.db.db_base_plugin_v2.NeutronDbPluginV2")

        self.manager_patcher = mock.patch('neutron.manager.NeutronManager')

        fake_manager = self.manager_patcher.start()

        fake_manager_instance = fake_manager.return_value

        fake_manager_instance.plugin = plugin_klass()

        self.addCleanup(self.manager_patcher.stop)

**** CubicPower OpenStack Study ****

    def _test_action_on_attr(self, context, action, attr, value,

                             exception=None):

        action = "%s_network" % action

        target = {'tenant_id': 'the_owner', attr: value}

        if exception:

            self.assertRaises(exception, policy.enforce,

                              context, action, target)

        else:

            result = policy.enforce(context, action, target)

            self.assertEqual(result, True)

**** CubicPower OpenStack Study ****

    def _test_nonadmin_action_on_attr(self, action, attr, value,

                                      exception=None):

        user_context = context.Context('', "user", roles=['user'])

        self._test_action_on_attr(user_context, action, attr,

                                  value, exception)

**** CubicPower OpenStack Study ****

    def test_nonadmin_write_on_private_fails(self):

        self._test_nonadmin_action_on_attr('create', 'shared', False,

                                           exceptions.PolicyNotAuthorized)

**** CubicPower OpenStack Study ****

    def test_nonadmin_read_on_private_fails(self):

        self._test_nonadmin_action_on_attr('get', 'shared', False,

                                           exceptions.PolicyNotAuthorized)

**** CubicPower OpenStack Study ****

    def test_nonadmin_write_on_shared_fails(self):

        self._test_nonadmin_action_on_attr('create', 'shared', True,

                                           exceptions.PolicyNotAuthorized)

**** CubicPower OpenStack Study ****

    def test_nonadmin_read_on_shared_succeeds(self):

        self._test_nonadmin_action_on_attr('get', 'shared', True)

**** CubicPower OpenStack Study ****

    def _test_enforce_adminonly_attribute(self, action):

        admin_context = context.get_admin_context()

        target = {'shared': True}

        result = policy.enforce(admin_context, action, target)

        self.assertEqual(result, True)

**** CubicPower OpenStack Study ****

    def test_enforce_adminonly_attribute_create(self):

        self._test_enforce_adminonly_attribute('create_network')

**** CubicPower OpenStack Study ****

    def test_enforce_adminonly_attribute_update(self):

        self._test_enforce_adminonly_attribute('update_network')

**** CubicPower OpenStack Study ****

    def test_enforce_adminonly_attribute_no_context_is_admin_policy(self):

        del self.rules[policy.ADMIN_CTX_POLICY]

        self.rules['admin_only'] = common_policy.parse_rule(

            self.admin_only_legacy)

        self.rules['admin_or_owner'] = common_policy.parse_rule(

            self.admin_or_owner_legacy)

        self._test_enforce_adminonly_attribute('create_network')

**** CubicPower OpenStack Study ****

    def test_enforce_adminonly_attribute_nonadminctx_returns_403(self):

        action = "create_network"

        target = {'shared': True, 'tenant_id': 'somebody_else'}

        self.assertRaises(exceptions.PolicyNotAuthorized, policy.enforce,

                          self.context, action, target)

**** CubicPower OpenStack Study ****

    def test_enforce_adminonly_nonadminctx_no_ctx_is_admin_policy_403(self):

        del self.rules[policy.ADMIN_CTX_POLICY]

        self.rules['admin_only'] = common_policy.parse_rule(

            self.admin_only_legacy)

        self.rules['admin_or_owner'] = common_policy.parse_rule(

            self.admin_or_owner_legacy)

        action = "create_network"

        target = {'shared': True, 'tenant_id': 'somebody_else'}

        self.assertRaises(exceptions.PolicyNotAuthorized, policy.enforce,

                          self.context, action, target)

**** CubicPower OpenStack Study ****

    def _test_build_subattribute_match_rule(self, validate_value):

        bk = FAKE_RESOURCE['%ss' % FAKE_RESOURCE_NAME]['attr']['validate']

        FAKE_RESOURCE['%ss' % FAKE_RESOURCE_NAME]['attr']['validate'] = (

            validate_value)

        action = "create_something"

        target = {'tenant_id': 'fake', 'attr': {'sub_attr_1': 'x'}}

        self.assertFalse(policy._build_subattr_match_rule(

            'attr',

            FAKE_RESOURCE['%ss' % FAKE_RESOURCE_NAME]['attr'],

            action,

            target))

        FAKE_RESOURCE['%ss' % FAKE_RESOURCE_NAME]['attr']['validate'] = bk

**** CubicPower OpenStack Study ****

    def test_build_subattribute_match_rule_empty_dict_validator(self):

        self._test_build_subattribute_match_rule({})

**** CubicPower OpenStack Study ****

    def test_build_subattribute_match_rule_wrong_validation_info(self):

        self._test_build_subattribute_match_rule(

            {'type:dict': 'wrong_stuff'})

**** CubicPower OpenStack Study ****

    def test_enforce_subattribute(self):

        action = "create_something"

        target = {'tenant_id': 'fake', 'attr': {'sub_attr_1': 'x'}}

        result = policy.enforce(self.context, action, target, None)

        self.assertEqual(result, True)

**** CubicPower OpenStack Study ****

    def test_enforce_admin_only_subattribute(self):

        action = "create_something"

        target = {'tenant_id': 'fake', 'attr': {'sub_attr_1': 'x',

                                                'sub_attr_2': 'y'}}

        result = policy.enforce(context.get_admin_context(),

                                action, target, None)

        self.assertEqual(result, True)

**** CubicPower OpenStack Study ****

    def test_enforce_admin_only_subattribute_nonadminctx_returns_403(self):

        action = "create_something"

        target = {'tenant_id': 'fake', 'attr': {'sub_attr_1': 'x',

                                                'sub_attr_2': 'y'}}

        self.assertRaises(exceptions.PolicyNotAuthorized, policy.enforce,

                          self.context, action, target, None)

**** CubicPower OpenStack Study ****

    def test_enforce_regularuser_on_read(self):

        action = "get_network"

        target = {'shared': True, 'tenant_id': 'somebody_else'}

        result = policy.enforce(self.context, action, target)

        self.assertTrue(result)

**** CubicPower OpenStack Study ****

    def test_enforce_firewall_policy_shared(self):

        action = "get_firewall_policy"

        target = {'shared': True, 'tenant_id': 'somebody_else'}

        result = policy.enforce(self.context, action, target)

        self.assertTrue(result)

**** CubicPower OpenStack Study ****

    def test_enforce_firewall_rule_shared(self):

        action = "get_firewall_rule"

        target = {'shared': True, 'tenant_id': 'somebody_else'}

        result = policy.enforce(self.context, action, target)

        self.assertTrue(result)

**** CubicPower OpenStack Study ****

    def test_enforce_tenant_id_check(self):

        # Trigger a policy with rule admin_or_owner

        action = "create_network"

        target = {'tenant_id': 'fake'}

        result = policy.enforce(self.context, action, target)

        self.assertTrue(result)

**** CubicPower OpenStack Study ****

    def test_enforce_tenant_id_check_parent_resource(self):

        def fakegetnetwork(*args, **kwargs):

            return {'tenant_id': 'fake'}

        action = "create_port:mac"

        with mock.patch.object(manager.NeutronManager.get_instance().plugin,

                               'get_network', new=fakegetnetwork):

            target = {'network_id': 'whatever'}

            result = policy.enforce(self.context, action, target)

            self.assertTrue(result)

**** CubicPower OpenStack Study ****

        def fakegetnetwork(*args, **kwargs):

            return {'tenant_id': 'fake'}

        action = "create_port:mac"

        with mock.patch.object(manager.NeutronManager.get_instance().plugin,

                               'get_network', new=fakegetnetwork):

            target = {'network_id': 'whatever'}

            result = policy.enforce(self.context, action, target)

            self.assertTrue(result)

**** CubicPower OpenStack Study ****

    def test_enforce_plugin_failure(self):

        def fakegetnetwork(*args, **kwargs):

            raise NotImplementedError('Blast!')

        # the policy check and plugin method we use in this test are irrelevant

        # so long that we verify that, if *f* blows up, the behavior of the

        # policy engine to propagate the exception is preserved

        action = "create_port:mac"

        with mock.patch.object(manager.NeutronManager.get_instance().plugin,

                               'get_network', new=fakegetnetwork):

            target = {'network_id': 'whatever'}

            self.assertRaises(NotImplementedError,

                              policy.enforce,

                              self.context,

                              action,

                              target)

**** CubicPower OpenStack Study ****

        def fakegetnetwork(*args, **kwargs):

            raise NotImplementedError('Blast!')

        # the policy check and plugin method we use in this test are irrelevant

        # so long that we verify that, if *f* blows up, the behavior of the

        # policy engine to propagate the exception is preserved

        action = "create_port:mac"

        with mock.patch.object(manager.NeutronManager.get_instance().plugin,

                               'get_network', new=fakegetnetwork):

            target = {'network_id': 'whatever'}

            self.assertRaises(NotImplementedError,

                              policy.enforce,

                              self.context,

                              action,

                              target)

**** CubicPower OpenStack Study ****

    def test_enforce_tenant_id_check_parent_resource_bw_compatibility(self):

        def fakegetnetwork(*args, **kwargs):

            return {'tenant_id': 'fake'}

        del self.rules['admin_or_network_owner']

        self.rules['admin_or_network_owner'] = common_policy.parse_rule(

            "role:admin or tenant_id:%(network_tenant_id)s")

        action = "create_port:mac"

        with mock.patch.object(manager.NeutronManager.get_instance().plugin,

                               'get_network', new=fakegetnetwork):

            target = {'network_id': 'whatever'}

            result = policy.enforce(self.context, action, target)

            self.assertTrue(result)

**** CubicPower OpenStack Study ****

        def fakegetnetwork(*args, **kwargs):

            return {'tenant_id': 'fake'}

        del self.rules['admin_or_network_owner']

        self.rules['admin_or_network_owner'] = common_policy.parse_rule(

            "role:admin or tenant_id:%(network_tenant_id)s")

        action = "create_port:mac"

        with mock.patch.object(manager.NeutronManager.get_instance().plugin,

                               'get_network', new=fakegetnetwork):

            target = {'network_id': 'whatever'}

            result = policy.enforce(self.context, action, target)

            self.assertTrue(result)

**** CubicPower OpenStack Study ****

    def test_tenant_id_check_no_target_field_raises(self):

        # Try and add a bad rule

        self.assertRaises(

            exceptions.PolicyInitError,

            common_policy.parse_rule,

            'tenant_id:(wrong_stuff)')

**** CubicPower OpenStack Study ****

    def _test_enforce_tenant_id_raises(self, bad_rule):

        self.rules['admin_or_owner'] = common_policy.parse_rule(bad_rule)

        # Trigger a policy with rule admin_or_owner

        action = "create_network"

        target = {'tenant_id': 'fake'}

        self.assertRaises(exceptions.PolicyCheckError,

                          policy.enforce,

                          self.context, action, target)

**** CubicPower OpenStack Study ****

    def test_enforce_tenant_id_check_malformed_target_field_raises(self):

        self._test_enforce_tenant_id_raises('tenant_id:%(malformed_field)s')

**** CubicPower OpenStack Study ****

    def test_enforce_tenant_id_check_invalid_parent_resource_raises(self):

        self._test_enforce_tenant_id_raises('tenant_id:%(foobaz_tenant_id)s')

**** CubicPower OpenStack Study ****

    def test_get_roles_context_is_admin_rule_missing(self):

        rules = dict((k, common_policy.parse_rule(v)) for k, v in {

            "some_other_rule": "role:admin",

        }.items())

        common_policy.set_rules(common_policy.Rules(rules))

        # 'admin' role is expected for bw compatibility

        self.assertEqual(['admin'], policy.get_admin_roles())

**** CubicPower OpenStack Study ****

    def test_get_roles_with_role_check(self):

        rules = dict((k, common_policy.parse_rule(v)) for k, v in {

            policy.ADMIN_CTX_POLICY: "role:admin",

        }.items())

        common_policy.set_rules(common_policy.Rules(rules))

        self.assertEqual(['admin'], policy.get_admin_roles())

**** CubicPower OpenStack Study ****

    def test_get_roles_with_rule_check(self):

        rules = dict((k, common_policy.parse_rule(v)) for k, v in {

            policy.ADMIN_CTX_POLICY: "rule:some_other_rule",

            "some_other_rule": "role:admin",

        }.items())

        common_policy.set_rules(common_policy.Rules(rules))

        self.assertEqual(['admin'], policy.get_admin_roles())

**** CubicPower OpenStack Study ****

    def test_get_roles_with_or_check(self):

        self.rules = dict((k, common_policy.parse_rule(v)) for k, v in {

            policy.ADMIN_CTX_POLICY: "rule:rule1 or rule:rule2",

            "rule1": "role:admin_1",

            "rule2": "role:admin_2"

        }.items())

        self.assertEqual(['admin_1', 'admin_2'],

                         policy.get_admin_roles())

**** CubicPower OpenStack Study ****

    def test_get_roles_with_other_rules(self):

        self.rules = dict((k, common_policy.parse_rule(v)) for k, v in {

            policy.ADMIN_CTX_POLICY: "role:xxx or other:value",

        }.items())

        self.assertEqual(['xxx'], policy.get_admin_roles())

**** CubicPower OpenStack Study ****

    def _test_set_rules_with_deprecated_policy(self, input_rules,

                                               expected_rules):

        policy._set_rules(json.dumps(input_rules))

        # verify deprecated policy has been removed

        for pol in input_rules.keys():

            self.assertNotIn(pol, common_policy._rules)

        # verify deprecated policy was correctly translated. Iterate

        # over items for compatibility with unittest2 in python 2.6

        for rule in expected_rules:

            self.assertIn(rule, common_policy._rules)

            self.assertEqual(str(common_policy._rules[rule]),

                             expected_rules[rule])

**** CubicPower OpenStack Study ****

    def test_set_rules_with_deprecated_view_policy(self):

        self._test_set_rules_with_deprecated_policy(

            {'extension:router:view': 'rule:admin_or_owner'},

            {'get_network:router:external': 'rule:admin_or_owner'})

**** CubicPower OpenStack Study ****

    def test_set_rules_with_deprecated_set_policy(self):

        expected_policies = ['create_network:provider:network_type',

                             'create_network:provider:physical_network',

                             'create_network:provider:segmentation_id',

                             'update_network:provider:network_type',

                             'update_network:provider:physical_network',

                             'update_network:provider:segmentation_id']

        self._test_set_rules_with_deprecated_policy(

            {'extension:provider_network:set': 'rule:admin_only'},

            dict((policy, 'rule:admin_only') for policy in

                 expected_policies))