@@ -188,24 +188,9 @@ mod tests {
188
188
async fn test_load_policy ( ) {
189
189
let policy = "p, alice, data1, read\n p, bob, data2, write" ;
190
190
let mut adapter = StringAdapter :: new ( policy) ;
191
- let mut model = DefaultModel :: from_str (
192
- "[request_definition]
193
- r = sub, obj, act
194
-
195
- [policy_definition]
196
- p = sub, obj, act
197
-
198
- [role_definition]
199
- g = _, _
200
-
201
- [policy_effect]
202
- e = some(where (p.eft == allow))
203
-
204
- [matchers]
205
- m = r.sub == p.sub && r.obj == p.obj && r.act == p.act" ,
206
- )
207
- . await
208
- . unwrap ( ) ;
191
+ let mut model = DefaultModel :: from_file ( "tests/rbac_model.conf" )
192
+ . await
193
+ . unwrap ( ) ;
209
194
210
195
adapter. load_policy ( & mut model) . await . unwrap ( ) ;
211
196
let enforcer = Enforcer :: new ( model, adapter) . await . unwrap ( ) ;
@@ -220,24 +205,9 @@ mod tests {
220
205
async fn test_save_policy ( ) {
221
206
let policy = "p, alice, data1, read\n p, bob, data2, write" ;
222
207
let mut adapter = StringAdapter :: new ( policy) ;
223
- let mut model = DefaultModel :: from_str (
224
- "[request_definition]
225
- r = sub, obj, act
226
-
227
- [policy_definition]
228
- p = sub, obj, act
229
-
230
- [role_definition]
231
- g = _, _
232
-
233
- [policy_effect]
234
- e = some(where (p.eft == allow))
235
-
236
- [matchers]
237
- m = r.sub == p.sub && r.obj == p.obj && r.act == p.act" ,
238
- )
239
- . await
240
- . unwrap ( ) ;
208
+ let mut model = DefaultModel :: from_file ( "tests/rbac_model.conf" )
209
+ . await
210
+ . unwrap ( ) ;
241
211
242
212
adapter. load_policy ( & mut model) . await . unwrap ( ) ;
243
213
adapter. save_policy ( & mut model) . await . unwrap ( ) ;
@@ -253,24 +223,9 @@ mod tests {
253
223
async fn test_clear_policy ( ) {
254
224
let policy = "p, alice, data1, read\n p, bob, data2, write" ;
255
225
let mut adapter = StringAdapter :: new ( policy) ;
256
- let mut model = DefaultModel :: from_str (
257
- "[request_definition]
258
- r = sub, obj, act
259
-
260
- [policy_definition]
261
- p = sub, obj, act
262
-
263
- [role_definition]
264
- g = _, _
265
-
266
- [policy_effect]
267
- e = some(where (p.eft == allow))
268
-
269
- [matchers]
270
- m = r.sub == p.sub && r.obj == p.obj && r.act == p.act" ,
271
- )
272
- . await
273
- . unwrap ( ) ;
226
+ let mut model = DefaultModel :: from_file ( "tests/rbac_model.conf" )
227
+ . await
228
+ . unwrap ( ) ;
274
229
275
230
adapter. load_policy ( & mut model) . await . unwrap ( ) ;
276
231
adapter. clear_policy ( ) . await . unwrap ( ) ;
@@ -284,24 +239,9 @@ mod tests {
284
239
async fn test_is_filtered ( ) {
285
240
let policy = "p, alice, data1, read\n p, bob, data2, write" ;
286
241
let mut adapter = StringAdapter :: new ( policy) ;
287
- let mut model = DefaultModel :: from_str (
288
- "[request_definition]
289
- r = sub, obj, act
290
-
291
- [policy_definition]
292
- p = sub, obj, act
293
-
294
- [role_definition]
295
- g = _, _
296
-
297
- [policy_effect]
298
- e = some(where (p.eft == allow))
299
-
300
- [matchers]
301
- m = r.sub == p.sub && r.obj == p.obj && r.act == p.act" ,
302
- )
303
- . await
304
- . unwrap ( ) ;
242
+ let mut model = DefaultModel :: from_file ( "tests/rbac_model.conf" )
243
+ . await
244
+ . unwrap ( ) ;
305
245
306
246
let filter = Filter {
307
247
p : vec ! [ "alice" ] ,
@@ -312,6 +252,7 @@ mod tests {
312
252
. load_filtered_policy ( & mut model, filter)
313
253
. await
314
254
. unwrap ( ) ;
255
+
315
256
assert ! ( adapter. is_filtered( ) ) ;
316
257
}
317
258
}
0 commit comments