@@ -169,7 +169,7 @@ def test_get_all_hides_deleted(self):
169
169
objects = response .json .get (self .root_tag_list )
170
170
self .assertEqual (len (objects ), 0 )
171
171
172
- def test_get_all_authorized (self ):
172
+ def _test_get_all_authorized (self , roles , project_id ):
173
173
api_m_1 = self .create_member (
174
174
self .pool_id , '192.0.2.1' , 80 ).get (self .root_tag )
175
175
self .set_lb_status (self .lb_id )
@@ -195,13 +195,13 @@ def test_get_all_authorized(self):
195
195
'is_admin_project' : True ,
196
196
'service_project_domain_id' : None ,
197
197
'service_project_id' : None ,
198
- 'roles' : [ 'load-balancer_member' , 'member' ] ,
198
+ 'roles' : roles ,
199
199
'user_id' : None ,
200
200
'is_admin' : False ,
201
201
'service_user_domain_id' : None ,
202
202
'project_domain_id' : None ,
203
203
'service_roles' : [],
204
- 'project_id' : self . project_id }
204
+ 'project_id' : project_id }
205
205
with mock .patch (
206
206
"oslo_context.context.RequestContext.to_policy_values" ,
207
207
return_value = override_credentials ):
@@ -216,6 +216,15 @@ def test_get_all_authorized(self):
216
216
for m in [api_m_1 , api_m_2 ]:
217
217
self .assertIn (m , response )
218
218
219
+ def test_get_all_authorized (self ):
220
+ self ._test_get_all_authorized (
221
+ roles = ['load-balancer_member' , 'member' ],
222
+ project_id = self .project_id )
223
+
224
+ def test_get_all_authorized_service (self ):
225
+ self ._test_get_all_authorized (
226
+ roles = ['service' ], project_id = 'services' )
227
+
219
228
def test_get_all_unscoped_token (self ):
220
229
api_m_1 = self .create_member (
221
230
self .pool_id , '192.0.2.1' , 80 ).get (self .root_tag )
0 commit comments