Add field for deleted in the app members environment form
This commit is contained in:
@@ -29,6 +29,7 @@ class EnvironmentRoles(object):
|
|||||||
EnvironmentRole.application_role_id == application_role_id,
|
EnvironmentRole.application_role_id == application_role_id,
|
||||||
EnvironmentRole.environment_id == environment_id,
|
EnvironmentRole.environment_id == environment_id,
|
||||||
EnvironmentRole.deleted == False,
|
EnvironmentRole.deleted == False,
|
||||||
|
EnvironmentRole.status != EnvironmentRole.Status.DISABLED,
|
||||||
)
|
)
|
||||||
.one_or_none()
|
.one_or_none()
|
||||||
)
|
)
|
||||||
|
@@ -18,6 +18,7 @@ class EnvironmentForm(Form):
|
|||||||
default=NO_ACCESS,
|
default=NO_ACCESS,
|
||||||
filters=[lambda x: None if x == "None" else x],
|
filters=[lambda x: None if x == "None" else x],
|
||||||
)
|
)
|
||||||
|
deleted = BooleanField("Revoke Access", default=False)
|
||||||
|
|
||||||
@property
|
@property
|
||||||
def data(self):
|
def data(self):
|
||||||
|
@@ -77,6 +77,7 @@ def filter_env_roles_form_data(member, environments):
|
|||||||
"environment_id": str(env.id),
|
"environment_id": str(env.id),
|
||||||
"environment_name": env.name,
|
"environment_name": env.name,
|
||||||
"role": NO_ACCESS,
|
"role": NO_ACCESS,
|
||||||
|
"deleted": env.deleted,
|
||||||
}
|
}
|
||||||
env_roles_set = set(env.roles).intersection(set(member.environment_roles))
|
env_roles_set = set(env.roles).intersection(set(member.environment_roles))
|
||||||
if len(env_roles_set) == 1:
|
if len(env_roles_set) == 1:
|
||||||
|
@@ -10,6 +10,7 @@ def test_environment_form():
|
|||||||
"environment_id": 123,
|
"environment_id": 123,
|
||||||
"environment_name": "testing",
|
"environment_name": "testing",
|
||||||
"role": ENV_ROLES[0][0],
|
"role": ENV_ROLES[0][0],
|
||||||
|
"deleted": True,
|
||||||
}
|
}
|
||||||
form = EnvironmentForm(data=form_data)
|
form = EnvironmentForm(data=form_data)
|
||||||
assert form.validate()
|
assert form.validate()
|
||||||
@@ -24,6 +25,7 @@ def test_environment_form_default_no_access():
|
|||||||
"environment_id": 123,
|
"environment_id": 123,
|
||||||
"environment_name": "testing",
|
"environment_name": "testing",
|
||||||
"role": None,
|
"role": None,
|
||||||
|
"deleted": False,
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
@@ -506,7 +506,7 @@ def test_update_member(client, user_session, session):
|
|||||||
EnvironmentRoleFactory.create(
|
EnvironmentRoleFactory.create(
|
||||||
environment=env, application_role=app_role, role=CSPRole.BASIC_ACCESS.value
|
environment=env, application_role=app_role, role=CSPRole.BASIC_ACCESS.value
|
||||||
)
|
)
|
||||||
EnvironmentRoleFactory.create(
|
suspended_role = EnvironmentRoleFactory.create(
|
||||||
environment=env_1, application_role=app_role, role=CSPRole.BASIC_ACCESS.value
|
environment=env_1, application_role=app_role, role=CSPRole.BASIC_ACCESS.value
|
||||||
)
|
)
|
||||||
|
|
||||||
@@ -524,8 +524,8 @@ def test_update_member(client, user_session, session):
|
|||||||
"environment_roles-0-role": CSPRole.TECHNICAL_READ.value,
|
"environment_roles-0-role": CSPRole.TECHNICAL_READ.value,
|
||||||
"environment_roles-0-environment_name": env.name,
|
"environment_roles-0-environment_name": env.name,
|
||||||
"environment_roles-1-environment_id": env_1.id,
|
"environment_roles-1-environment_id": env_1.id,
|
||||||
"environment_roles-1-role": NO_ACCESS,
|
|
||||||
"environment_roles-1-environment_name": env_1.name,
|
"environment_roles-1-environment_name": env_1.name,
|
||||||
|
"environment_roles-1-deleted": "True",
|
||||||
"environment_roles-2-environment_id": env_2.id,
|
"environment_roles-2-environment_id": env_2.id,
|
||||||
"environment_roles-2-role": CSPRole.NETWORK_ADMIN.value,
|
"environment_roles-2-role": CSPRole.NETWORK_ADMIN.value,
|
||||||
"environment_roles-2-environment_name": env_2.name,
|
"environment_roles-2-environment_name": env_2.name,
|
||||||
@@ -561,6 +561,8 @@ def test_update_member(client, user_session, session):
|
|||||||
# check that the user has roles in the correct envs
|
# check that the user has roles in the correct envs
|
||||||
assert environment_roles[0].environment in [env, env_2]
|
assert environment_roles[0].environment in [env, env_2]
|
||||||
assert environment_roles[1].environment in [env, env_2]
|
assert environment_roles[1].environment in [env, env_2]
|
||||||
|
assert suspended_role.status == EnvironmentRole.Status.DISABLED
|
||||||
|
assert suspended_role.deleted
|
||||||
|
|
||||||
|
|
||||||
def test_revoke_invite(client, user_session):
|
def test_revoke_invite(client, user_session):
|
||||||
|
Reference in New Issue
Block a user