mirror of
https://github.com/apache/superset.git
synced 2026-05-10 18:35:40 +00:00
fix: Allow dataset owners to explore their datasets (#20382)
* fix: Allow dataset owners to explore their datasets * Re-order imports * Give owners security manager permissions to their datasets * Update test suite * Add SqlaTable to is_owner types * Add owners to datasource mock * Fix VSCode import error * Fix merge error
This commit is contained in:
@@ -878,7 +878,10 @@ class TestSecurityManager(SupersetTestCase):
|
||||
|
||||
@patch("superset.security.SupersetSecurityManager.can_access")
|
||||
@patch("superset.security.SupersetSecurityManager.can_access_schema")
|
||||
def test_raise_for_access_datasource(self, mock_can_access_schema, mock_can_access):
|
||||
@patch("superset.views.utils.is_owner")
|
||||
def test_raise_for_access_datasource(
|
||||
self, mock_can_access_schema, mock_can_access, mock_is_owner
|
||||
):
|
||||
datasource = self.get_datasource_mock()
|
||||
|
||||
mock_can_access_schema.return_value = True
|
||||
@@ -886,12 +889,14 @@ class TestSecurityManager(SupersetTestCase):
|
||||
|
||||
mock_can_access.return_value = False
|
||||
mock_can_access_schema.return_value = False
|
||||
mock_is_owner.return_value = False
|
||||
|
||||
with self.assertRaises(SupersetSecurityException):
|
||||
security_manager.raise_for_access(datasource=datasource)
|
||||
|
||||
@patch("superset.security.SupersetSecurityManager.can_access")
|
||||
def test_raise_for_access_query(self, mock_can_access):
|
||||
@patch("superset.views.utils.is_owner")
|
||||
def test_raise_for_access_query(self, mock_can_access, mock_is_owner):
|
||||
query = Mock(
|
||||
database=get_example_database(), schema="bar", sql="SELECT * FROM foo"
|
||||
)
|
||||
@@ -900,6 +905,7 @@ class TestSecurityManager(SupersetTestCase):
|
||||
security_manager.raise_for_access(query=query)
|
||||
|
||||
mock_can_access.return_value = False
|
||||
mock_is_owner.return_value = False
|
||||
|
||||
with self.assertRaises(SupersetSecurityException):
|
||||
security_manager.raise_for_access(query=query)
|
||||
|
||||
Reference in New Issue
Block a user