3
3
4
4
from feast .permissions .action import READ , AuthzedAction
5
5
from feast .permissions .security_manager import assert_permissions , permitted_resources
6
+ from feast .permissions .user import User
6
7
7
8
8
9
@pytest .mark .parametrize (
9
10
"username, requested_actions, allowed, allowed_single, raise_error_in_assert, raise_error_in_permit, intra_communication_flag" ,
10
11
[
11
- (None , [], False , [False , False ], [True , True ], False , False ),
12
- (None , [], False , [False , False ], [True , True ], False , True ),
12
+ (None , [], True , [True , True ], [False , False ], False , False ),
13
+ (None , [], True , [True , True ], [False , False ], False , True ),
13
14
(
14
15
"r" ,
15
16
[AuthzedAction .DESCRIBE ],
28
29
False ,
29
30
True ,
30
31
),
31
- ("test1234 " , [], True , [True , True ], [False , False ], False , True ),
32
+ ("server_intra_com_val " , [], True , [True , True ], [False , False ], False , True ),
32
33
(
33
34
"r" ,
34
35
[AuthzedAction .UPDATE ],
38
39
False ,
39
40
False ,
40
41
),
41
- ("r" , [AuthzedAction .UPDATE ], False , [False , False ], [True , True ], False , True ),
42
+ ("r" , [AuthzedAction .UPDATE ], True , [True , True ], [False , False ], False , True ),
42
43
(
43
44
"w" ,
44
45
[AuthzedAction .DESCRIBE ],
51
52
(
52
53
"w" ,
53
54
[AuthzedAction .DESCRIBE ],
54
- False ,
55
- [False , False ],
55
+ True ,
56
+ [True , True ],
56
57
[True , True ],
57
58
False ,
58
59
True ,
115
116
(
116
117
"rw" ,
117
118
[AuthzedAction .DESCRIBE , AuthzedAction .UPDATE ],
118
- False ,
119
- [False , False ],
120
- [True , True ],
121
119
True ,
120
+ [True , True ],
121
+ [False , False ],
122
+ False ,
122
123
True ,
123
124
),
124
125
(
133
134
(
134
135
"admin" ,
135
136
[AuthzedAction .DESCRIBE , AuthzedAction .UPDATE ],
136
- False ,
137
- [False , True ],
138
- [True , False ],
139
137
True ,
138
+ [True , True ],
139
+ [False , False ],
140
+ False ,
140
141
True ,
141
142
),
142
143
(
151
152
(
152
153
"admin" ,
153
154
READ + [AuthzedAction .UPDATE ],
154
- False ,
155
- [False , False ],
156
- [True , True ],
157
155
True ,
156
+ [True , True ],
157
+ [False , False ],
158
+ False ,
158
159
True ,
159
160
),
160
161
],
@@ -172,17 +173,18 @@ def test_access_SecuredFeatureView(
172
173
intra_communication_flag ,
173
174
monkeypatch ,
174
175
):
176
+ sm = security_manager
177
+ user = users .get (username )
178
+ sm .set_current_user (user )
179
+
175
180
if intra_communication_flag :
176
- monkeypatch .setenv ("INTRA_COMMUNICATION_BASE64" , "test1234" )
181
+ monkeypatch .setenv ("INTRA_COMMUNICATION_BASE64" , "server_intra_com_val" )
182
+ sm .set_current_user (User ("server_intra_com_val" , []))
177
183
else :
178
184
monkeypatch .delenv ("INTRA_COMMUNICATION_BASE64" , False )
179
185
180
- sm = security_manager
181
186
resources = feature_views
182
187
183
- user = users .get (username )
184
- sm .set_current_user (user )
185
-
186
188
result = []
187
189
if raise_error_in_permit :
188
190
with pytest .raises (PermissionError ):
0 commit comments