当前位置: 首页>>代码示例>>Python>>正文


Python RBAC.create_permission方法代码示例

本文整理汇总了Python中zato.server.rbac_.RBAC.create_permission方法的典型用法代码示例。如果您正苦于以下问题:Python RBAC.create_permission方法的具体用法?Python RBAC.create_permission怎么用?Python RBAC.create_permission使用的例子?那么恭喜您, 这里精选的方法代码示例或许可以为您提供帮助。您也可以进一步了解该方法所在zato.server.rbac_.RBAC的用法示例。


在下文中一共展示了RBAC.create_permission方法的7个代码示例,这些例子默认根据受欢迎程度排序。您可以为喜欢或者感觉有用的代码点赞,您的评价将有助于系统推荐出更棒的Python代码示例。

示例1: test_create_role_permission_deny

# 需要导入模块: from zato.server.rbac_ import RBAC [as 别名]
# 或者: from zato.server.rbac_.RBAC import create_permission [as 别名]
    def test_create_role_permission_deny(self):

        role_id1, role_id2 = 1, 2
        role_name1, role_name2 = 'role_name1', 'role_name2'

        res_name1, res_name2 = 'res_name1', 'res_name2'

        perm_id1, perm_id2 = 11, 22
        perm_name1, perm_name2 = 'perm_name1', 'perm_name2'

        rbac = RBAC()

        rbac.create_role(role_id1, role_name1, None)
        rbac.create_role(role_id2, role_name2, None)

        rbac.create_resource(res_name1)
        rbac.create_resource(res_name2)

        rbac.create_permission(perm_id1, perm_name1)
        rbac.create_permission(perm_id2, perm_name2)

        rbac.create_role_permission_deny(role_id1, perm_id1, res_name1)
        rbac.create_role_permission_deny(role_id1, perm_id2, res_name1)

        rbac.create_role_permission_deny(role_id2, perm_id1, res_name2)
        rbac.create_role_permission_deny(role_id2, perm_id2, res_name2)

        self.assertIn((role_id1, perm_id1, res_name1), rbac.registry._denied)
        self.assertIn((role_id1, perm_id2, res_name1), rbac.registry._denied)

        self.assertIn((role_id2, perm_id1, res_name2), rbac.registry._denied)
        self.assertIn((role_id2, perm_id2, res_name2), rbac.registry._denied)
开发者ID:Aayush-Kasurde,项目名称:zato,代码行数:34,代码来源:test_rbac_.py

示例2: test_is_role_allowed_parent_hierarchy

# 需要导入模块: from zato.server.rbac_ import RBAC [as 别名]
# 或者: from zato.server.rbac_.RBAC import create_permission [as 别名]
    def test_is_role_allowed_parent_hierarchy(self):

        role_id1, role_id2 = 1, 2
        role_name1, role_name2 = 'role_name1', 'role_name2'

        res_name1, res_name2 = 'res_name1', 'res_name2'

        perm_id1 = 11
        perm_name1 = 'perm_name1'

        rbac = RBAC()

        rbac.create_role(role_id1, role_name1, None)
        rbac.create_role(role_id2, role_name2, role_id1)

        rbac.create_resource(res_name1)
        rbac.create_resource(res_name2)

        rbac.create_permission(perm_id1, perm_name1)

        rbac.create_role_permission_allow(role_id2, perm_id1, res_name1)
        rbac.create_role_permission_deny(role_id2, perm_id1, res_name2)

        self.assertTrue(rbac.is_role_allowed(role_id2, perm_id1, res_name1))
        self.assertFalse(rbac.is_role_allowed(role_id2, perm_id1, res_name2))

        # Denied implicitly because there is no explicit 'allow'
        self.assertFalse(rbac.is_role_allowed(role_id1, perm_id1, res_name1))
        self.assertFalse(rbac.is_role_allowed(role_id1, perm_id1, res_name2))
开发者ID:Aayush-Kasurde,项目名称:zato,代码行数:31,代码来源:test_rbac_.py

示例3: test_edit_permission_does_not_exist

# 需要导入模块: from zato.server.rbac_ import RBAC [as 别名]
# 或者: from zato.server.rbac_.RBAC import create_permission [as 别名]
    def test_edit_permission_does_not_exist(self):

        id, name = 1, 'name'

        rbac = RBAC()
        rbac.create_permission(id, name)
        self.assertRaises(ValueError, rbac.edit_permission, 1234, 'new_name')
开发者ID:Aayush-Kasurde,项目名称:zato,代码行数:9,代码来源:test_rbac_.py

示例4: test_delete_permission_no_client_permission

# 需要导入模块: from zato.server.rbac_ import RBAC [as 别名]
# 或者: from zato.server.rbac_.RBAC import create_permission [as 别名]
    def test_delete_permission_no_client_permission(self):

        id, name = 1, 'name'

        rbac = RBAC()
        rbac.create_permission(id, name)
        rbac.delete_permission(id)

        self.assertTrue(id not in rbac.permissions)
开发者ID:Aayush-Kasurde,项目名称:zato,代码行数:11,代码来源:test_rbac_.py

示例5: test_create_permission

# 需要导入模块: from zato.server.rbac_ import RBAC [as 别名]
# 或者: from zato.server.rbac_.RBAC import create_permission [as 别名]
    def test_create_permission(self):

        id1, name1 = 1, 'name1'
        id2, name2 = 2, 'name2'

        rbac = RBAC()
        rbac.create_permission(id1, name1)
        rbac.create_permission(id2, name2)

        self.assertEquals(rbac.permissions[id1], name1)
        self.assertEquals(rbac.permissions[id2], name2)
开发者ID:Aayush-Kasurde,项目名称:zato,代码行数:13,代码来源:test_rbac_.py

示例6: test_edit_permission_exists

# 需要导入模块: from zato.server.rbac_ import RBAC [as 别名]
# 或者: from zato.server.rbac_.RBAC import create_permission [as 别名]
    def test_edit_permission_exists(self):

        id1, name1 = 1, 'name1'
        id2, name2 = 2, 'name2'

        new_name1 = 'new_name1'

        rbac = RBAC()
        rbac.create_permission(id1, name1)
        rbac.create_permission(id2, name2)
        rbac.edit_permission(id1, new_name1)

        self.assertEquals(rbac.permissions[id1], new_name1)
        self.assertEquals(rbac.permissions[id2], name2)
开发者ID:Aayush-Kasurde,项目名称:zato,代码行数:16,代码来源:test_rbac_.py

示例7: test_delete_permission_has_role_permission

# 需要导入模块: from zato.server.rbac_ import RBAC [as 别名]
# 或者: from zato.server.rbac_.RBAC import create_permission [as 别名]
    def test_delete_permission_has_role_permission(self):

        role_id1, role_name1 = 1, 'role_name1'
        role_id2, role_name2 = 2, 'role_name2'

        perm_id1, perm_name1 = 11, 'perm_name1'
        perm_id2, perm_name2 = 22, 'perm_name2'

        res_name1, res_name2 = 'res_name1', 'res_name2'

        rbac = RBAC()

        rbac.create_role(role_id1, role_name1, None)
        rbac.create_role(role_id2, role_name2, None)

        rbac.create_permission(perm_id1, perm_name1)
        rbac.create_permission(perm_id2, perm_name2)

        rbac.create_resource(res_name1)
        rbac.create_resource(res_name2)

        rbac.create_role_permission_allow(role_id1, perm_id1, res_name1)
        rbac.create_role_permission_allow(role_id1, perm_id2, res_name1)

        rbac.create_role_permission_allow(role_id2, perm_id1, res_name2)
        rbac.create_role_permission_allow(role_id2, perm_id2, res_name2)

        self.assertIn((role_id1, perm_id1, res_name1), rbac.registry._allowed)
        self.assertIn((role_id1, perm_id2, res_name1), rbac.registry._allowed)

        self.assertIn((role_id2, perm_id1, res_name2), rbac.registry._allowed)
        self.assertIn((role_id2, perm_id2, res_name2), rbac.registry._allowed)

        rbac.delete_permission(perm_id1)

        self.assertNotIn((role_id1, perm_id1, res_name1), rbac.registry._allowed)
        self.assertIn((role_id1, perm_id2, res_name1), rbac.registry._allowed)

        self.assertNotIn((role_id2, perm_id1, res_name2), rbac.registry._allowed)
        self.assertIn((role_id2, perm_id2, res_name2), rbac.registry._allowed)
开发者ID:Aayush-Kasurde,项目名称:zato,代码行数:42,代码来源:test_rbac_.py


注:本文中的zato.server.rbac_.RBAC.create_permission方法示例由纯净天空整理自Github/MSDocs等开源代码及文档管理平台,相关代码片段筛选自各路编程大神贡献的开源项目,源码版权归原作者所有,传播和使用请参考对应项目的License;未经允许,请勿转载。