Skip to content

Commit 5ed07b2

Browse files
committed
fix: relocate unittest and fix file path
Signed-off-by: Zxilly <zhouxinyu1001@gmail.com>
1 parent 243fc96 commit 5ed07b2

4 files changed

Lines changed: 39 additions & 36 deletions

File tree

casbin/__init__.py

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,6 @@
11
from .enforcer import *
22
from .synced_enforcer import SyncedEnforcer
33
from . import util
4+
from .persist import *
5+
from .effect import *
6+
from .model import *

casbin/persist/__init__.py

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,4 @@
11
from .adapter import *
22
from .adapter_filtered import *
3-
from .batch_adapter import *
3+
from .batch_adapter import *
4+
from .adapters import *

examples/rbac_with_domains_policy.csv

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,5 @@ p, admin, domain1, data1, read
22
p, admin, domain1, data1, write
33
p, admin, domain2, data2, read
44
p, admin, domain2, data2, write
5-
65
g, alice, admin, domain1
76
g, bob, admin, domain2
Lines changed: 34 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -1,29 +1,32 @@
11
import casbin
2-
import os
32
from unittest import TestCase
4-
import unittest
3+
from tests.test_enforcer import get_examples
4+
5+
56
class Filter:
6-
#P,G are strings
7+
# P,G are strings
78
P = []
89
G = []
10+
11+
912
class TestFilteredAdapter(TestCase):
1013
def test_init_filtered_adapter(self):
11-
adapter = casbin.persist.adapters.FilteredAdapter("examples/rbac_with_domains_policy.csv")
12-
e = casbin.Enforcer("examples/rbac_with_domains_model.conf", adapter)
13-
self.assertFalse(e.has_policy(['admin', 'domain1', 'data1','read']))
14+
adapter = casbin.persist.adapters.FilteredAdapter(get_examples("rbac_with_domains_policy.csv"))
15+
e = casbin.Enforcer(get_examples("rbac_with_domains_model.conf"), adapter)
16+
self.assertFalse(e.has_policy(['admin', 'domain1', 'data1', 'read']))
1417

1518
def test_load_filtered_policy(self):
16-
adapter = casbin.persist.adapters.FilteredAdapter("examples/rbac_with_domains_policy.csv")
17-
e = casbin.Enforcer("examples/rbac_with_domains_model.conf", adapter)
19+
adapter = casbin.persist.adapters.FilteredAdapter(get_examples("rbac_with_domains_policy.csv"))
20+
e = casbin.Enforcer(get_examples("rbac_with_domains_model.conf"), adapter)
1821
filter = Filter()
1922
filter.P = ["", "domain1"]
2023
filter.G = ["", "", "domain1"]
2124
try:
2225
e.load_policy()
2326
except:
24-
raise RuntimeError("nexpected error in LoadFilteredPolicy")
25-
self.assertTrue(e.has_policy(['admin', 'domain1', 'data1','read']))
26-
self.assertTrue(e.has_policy(['admin', 'domain2', 'data2','read']))
27+
raise RuntimeError("unexpected error in LoadFilteredPolicy")
28+
self.assertTrue(e.has_policy(['admin', 'domain1', 'data1', 'read']))
29+
self.assertTrue(e.has_policy(['admin', 'domain2', 'data2', 'read']))
2730
try:
2831
e.load_filtered_policy(filter)
2932
except:
@@ -32,8 +35,8 @@ def test_load_filtered_policy(self):
3235
if not e.is_filtered:
3336
raise RuntimeError("adapter did not set the filtered flag correctly")
3437

35-
self.assertTrue(e.has_policy(['admin', 'domain1', 'data1','read']))
36-
self.assertFalse(e.has_policy(['admin', 'domain2', 'data2','read']))
38+
self.assertTrue(e.has_policy(['admin', 'domain1', 'data1', 'read']))
39+
self.assertFalse(e.has_policy(['admin', 'domain2', 'data2', 'read']))
3740

3841
with self.assertRaises(RuntimeError):
3942
e.save_policy()
@@ -42,17 +45,17 @@ def test_load_filtered_policy(self):
4245
e.get_adapter().save_policy(e.get_model())
4346

4447
def test_append_filtered_policy(self):
45-
adapter = casbin.persist.adapters.FilteredAdapter("examples/rbac_with_domains_policy.csv")
46-
e = casbin.Enforcer("examples/rbac_with_domains_model.conf", adapter)
48+
adapter = casbin.persist.adapters.FilteredAdapter(get_examples("rbac_with_domains_policy.csv"))
49+
e = casbin.Enforcer(get_examples("rbac_with_domains_model.conf"), adapter)
4750
filter = Filter()
4851
filter.P = ["", "domain1"]
4952
filter.G = ["", "", "domain1"]
5053
try:
5154
e.load_policy()
5255
except:
53-
raise RuntimeError("nexpected error in LoadFilteredPolicy")
54-
self.assertTrue(e.has_policy(['admin', 'domain1', 'data1','read']))
55-
self.assertTrue(e.has_policy(['admin', 'domain2', 'data2','read']))
56+
raise RuntimeError("unexpected error in LoadFilteredPolicy")
57+
self.assertTrue(e.has_policy(['admin', 'domain1', 'data1', 'read']))
58+
self.assertTrue(e.has_policy(['admin', 'domain2', 'data2', 'read']))
5659
try:
5760
e.load_filtered_policy(filter)
5861
except:
@@ -61,8 +64,8 @@ def test_append_filtered_policy(self):
6164
if not e.is_filtered:
6265
raise RuntimeError("adapter did not set the filtered flag correctly")
6366

64-
self.assertTrue(e.has_policy(['admin', 'domain1', 'data1','read']))
65-
self.assertFalse(e.has_policy(['admin', 'domain2', 'data2','read']))
67+
self.assertTrue(e.has_policy(['admin', 'domain1', 'data1', 'read']))
68+
self.assertFalse(e.has_policy(['admin', 'domain2', 'data2', 'read']))
6669

6770
filter.P = ["", "domain2"]
6871
filter.G = ["", "", "domain2"]
@@ -71,22 +74,20 @@ def test_append_filtered_policy(self):
7174
except:
7275
raise RuntimeError("unexpected error in LoadFilteredPolicy")
7376

74-
self.assertTrue(e.has_policy(['admin', 'domain1', 'data1','read']))
75-
self.assertTrue(e.has_policy(['admin', 'domain2', 'data2','read']))
76-
77+
self.assertTrue(e.has_policy(['admin', 'domain1', 'data1', 'read']))
78+
self.assertTrue(e.has_policy(['admin', 'domain2', 'data2', 'read']))
7779

7880
def test_filtered_policy_invalid_filter(self):
79-
adapter = casbin.persist.adapters.FilteredAdapter("examples/rbac_with_domains_policy.csv")
80-
e = casbin.Enforcer("examples/rbac_with_domains_model.conf", adapter)
81-
filter = ["","domain1"]
81+
adapter = casbin.persist.adapters.FilteredAdapter(get_examples("rbac_with_domains_policy.csv"))
82+
e = casbin.Enforcer(get_examples("rbac_with_domains_model.conf"), adapter)
83+
filter = ["", "domain1"]
8284

8385
with self.assertRaises(RuntimeError):
8486
e.load_filtered_policy(filter)
8587

86-
8788
def test_filtered_policy_empty_filter(self):
88-
adapter = casbin.persist.adapters.FilteredAdapter("examples/rbac_with_domains_policy.csv")
89-
e = casbin.Enforcer("examples/rbac_with_domains_model.conf", adapter)
89+
adapter = casbin.persist.adapters.FilteredAdapter(get_examples("rbac_with_domains_policy.csv"))
90+
e = casbin.Enforcer(get_examples("rbac_with_domains_model.conf"), adapter)
9091

9192
try:
9293
e.load_filtered_policy(None)
@@ -101,9 +102,8 @@ def test_filtered_policy_empty_filter(self):
101102
except:
102103
raise RuntimeError("unexpected error in SavePolicy")
103104

104-
105105
def test_unsupported_filtered_policy(self):
106-
e = casbin.Enforcer("examples/rbac_with_domains_model.conf", "examples/rbac_with_domains_policy.csv")
106+
e = casbin.Enforcer(get_examples("rbac_with_domains_model.conf"), get_examples("rbac_with_domains_policy.csv"))
107107
filter = Filter()
108108
filter.P = ["", "domain1"]
109109
filter.G = ["", "", "domain1"]
@@ -112,14 +112,14 @@ def test_unsupported_filtered_policy(self):
112112

113113
def test_filtered_adapter_empty_filepath(self):
114114
adapter = casbin.persist.adapters.FilteredAdapter("")
115-
e = casbin.Enforcer("examples/rbac_with_domains_model.conf",adapter)
115+
e = casbin.Enforcer(get_examples("rbac_with_domains_model.conf"), adapter)
116116

117117
with self.assertRaises(RuntimeError):
118118
e.load_filtered_policy(None)
119119

120120
def test_filtered_adapter_invalid_filepath(self):
121-
adapter = casbin.persist.adapters.FilteredAdapter("examples/does_not_exist_policy.csv")
122-
e = casbin.Enforcer("examples/rbac_with_domains_model.conf", adapter)
121+
adapter = casbin.persist.adapters.FilteredAdapter(get_examples("does_not_exist_policy.csv"))
122+
e = casbin.Enforcer(get_examples("rbac_with_domains_model.conf"), adapter)
123123

124124
with self.assertRaises(RuntimeError):
125125
e.load_filtered_policy(None)

0 commit comments

Comments
 (0)