mirror of
https://github.com/ZwareBear/awx.git
synced 2026-04-23 16:31:50 -05:00
renaming Credential.owner_role -> Credential.admin_role
This commit is contained in:
@@ -159,7 +159,7 @@ def machine_credential():
|
||||
|
||||
@pytest.fixture
|
||||
def org_credential(organization, credential):
|
||||
credential.owner_role.parents.add(organization.admin_role)
|
||||
credential.admin_role.parents.add(organization.admin_role)
|
||||
return credential
|
||||
|
||||
@pytest.fixture
|
||||
|
||||
@@ -16,7 +16,7 @@ def test_credential_migration_user(credential, user, permissions):
|
||||
|
||||
rbac.migrate_credential(apps, None)
|
||||
|
||||
assert u in credential.owner_role
|
||||
assert u in credential.admin_role
|
||||
|
||||
@pytest.mark.django_db
|
||||
def test_two_teams_same_cred_name(organization_factory):
|
||||
@@ -28,8 +28,8 @@ def test_two_teams_same_cred_name(organization_factory):
|
||||
|
||||
rbac.migrate_credential(apps, None)
|
||||
|
||||
assert objects.teams.team1.member_role in cred1.owner_role.parents.all()
|
||||
assert objects.teams.team2.member_role in cred2.owner_role.parents.all()
|
||||
assert objects.teams.team1.member_role in cred1.admin_role.parents.all()
|
||||
assert objects.teams.team2.member_role in cred2.admin_role.parents.all()
|
||||
|
||||
@pytest.mark.django_db
|
||||
def test_credential_use_role(credential, user, permissions):
|
||||
@@ -46,14 +46,14 @@ def test_credential_migration_team_member(credential, team, user, permissions):
|
||||
|
||||
|
||||
# No permissions pre-migration (this happens automatically so we patch this)
|
||||
team.admin_role.children.remove(credential.owner_role)
|
||||
team.admin_role.children.remove(credential.admin_role)
|
||||
team.member_role.children.remove(credential.use_role)
|
||||
assert u not in credential.owner_role
|
||||
assert u not in credential.admin_role
|
||||
|
||||
rbac.migrate_credential(apps, None)
|
||||
|
||||
# Admin permissions post migration
|
||||
assert u in credential.owner_role
|
||||
assert u in credential.admin_role
|
||||
|
||||
@pytest.mark.django_db
|
||||
def test_credential_migration_team_admin(credential, team, user, permissions):
|
||||
@@ -104,7 +104,7 @@ def test_credential_access_admin(user, team, credential):
|
||||
# credential is now part of a team
|
||||
# that is part of an organization
|
||||
# that I am an admin for
|
||||
credential.owner_role.parents.add(team.admin_role)
|
||||
credential.admin_role.parents.add(team.admin_role)
|
||||
credential.save()
|
||||
|
||||
cred = Credential.objects.create(kind='aws', name='test-cred')
|
||||
|
||||
@@ -205,9 +205,9 @@ def test_job_template_access_org_admin(jt_objects, rando):
|
||||
jt_objects.inventory.organization.admin_role.members.add(rando)
|
||||
# Assign organization permission in the same way the create view does
|
||||
organization = jt_objects.inventory.organization
|
||||
jt_objects.credential.owner_role.parents.add(organization.admin_role)
|
||||
jt_objects.cloud_credential.owner_role.parents.add(organization.admin_role)
|
||||
jt_objects.network_credential.owner_role.parents.add(organization.admin_role)
|
||||
jt_objects.credential.admin_role.parents.add(organization.admin_role)
|
||||
jt_objects.cloud_credential.admin_role.parents.add(organization.admin_role)
|
||||
jt_objects.network_credential.admin_role.parents.add(organization.admin_role)
|
||||
|
||||
proj_pk = jt_objects.project.pk
|
||||
assert access.can_add(dict(inventory=jt_objects.inventory.pk, project=proj_pk))
|
||||
|
||||
Reference in New Issue
Block a user