dandds
849c5d4b58
Rearrange and rename application routes.
...
- move application routes to their own Flask blueprint
- squash application routes to be resource-specific
- reorganize application routes
2019-04-22 07:19:30 -04:00
dandds
ed25078c39
move portfolio context processor to generic location
2019-04-22 07:15:18 -04:00
dandds
c223bff09c
Remove unused portfolio routes
2019-04-18 09:50:53 -04:00
George Drummond
882998e1d7
Merge pull request #748 from dod-ccpo/display-app-users
...
Display app users
2019-04-17 15:28:28 -04:00
dandds
4a1e5e61b3
portfolio user can view application settings page
2019-04-17 14:49:14 -04:00
George Drummond
52669a0265
Use access specs
2019-04-17 13:52:06 -04:00
George Drummond
769867c6a9
Display app users view only table
2019-04-17 13:25:45 -04:00
Montana
d9c3cf340f
Pass users' roles to the template
2019-04-17 11:06:37 -04:00
dandds
c1df245800
Scope access to applications, task orders, and environment roles.
...
These resources should be scoped to the portfolio when accessed from
route functions.
2019-04-16 14:18:53 -04:00
dandds
eaeeed0b05
Added BaseDomainClass with a get
method.
...
The BaseDomainClass.get can accept any number of keyword arguments and
will add a filter to the query for each kwarg. This will allow the
caller to scope the query as needed with kwargs.
2019-04-16 14:18:53 -04:00
dandds
0bde431a70
extend soft delete functionality to app and env roles
2019-04-15 15:58:38 -04:00
dandds
dac764ab82
route for deleting an application
2019-04-15 15:58:38 -04:00
dandds
0348af7ce7
record soft deletion in audit log for applications and environments
2019-04-15 15:58:38 -04:00
dandds
b58aef2c6b
domain methods for deleting apps and environments
2019-04-15 15:58:38 -04:00
dandds
1c0c5dd9c5
soft deletes available for applications and environments
...
- parent relation will not include applications or environments marked
as deleted
- domain classes will exclude deleted objects from selections
- changed some test factories to use domain_word for resource names,
because they were using person names and it bugged me
2019-04-15 15:58:38 -04:00
Montana
4f2cb4d4a2
Test environment_obj
2019-04-11 15:54:56 -04:00
dandds
265833f3fc
ApplicationRoles.create should accept permission set names
2019-04-11 11:32:17 -04:00
George Drummond
50a532ddbb
ApplicationRoles seed and domain
2019-04-11 10:03:21 -04:00
leigh-mil
6bca7c7660
Merge pull request #747 from dod-ccpo/disable-edit-ppoc
...
Disable edit ppoc
2019-04-09 10:00:18 -04:00
leigh-mil
51a5929b52
Check if member is PPoC before updating perms
2019-04-09 08:42:35 -04:00
dandds
d0bf5745e6
Merge pull request #746 from dod-ccpo/application_roles
...
Application roles
2019-04-08 14:22:52 -04:00
dandds
b17741acd1
Adds an ORM permission set listener for application roles.
...
Application role changes will be recorded in the audit log. Generalizes
pre-existing listener that was in user for portfolio roles.
2019-04-08 14:00:26 -04:00
dandds
9c10a14827
update authorization decorator to check for application permissions
2019-04-08 13:31:19 -04:00
dandds
866043495b
updates to test factories to accomodate application roles
2019-04-08 13:31:19 -04:00
George Drummond
090e13f083
Update Point of Contact
2019-04-08 13:31:00 -04:00
dandds
8827130444
record portfolio_role permission_set changes with bulk_replace event
2019-04-04 19:00:48 -04:00
Montana
8057c7b2fc
Log audit events before we save them to the DB
2019-04-04 08:58:27 -04:00
Montana
ea2338bc30
Make test more robust
2019-04-04 08:38:52 -04:00
Montana
86f106f6d1
Test logging events for auditable mixin
2019-04-03 17:07:33 -04:00
leigh-mil
f1c6717a1e
Merge pull request #733 from dod-ccpo/add-last-login-timestamp
...
Add last login timestamp
2019-04-03 13:10:52 -04:00
George Drummond
48d9506f96
Merge pull request #730 from dod-ccpo/archive-portfolio-member
...
Remove Portfolio User
2019-04-03 13:06:41 -04:00
leigh-mil
215c2b4cbc
Updates from PR feedback
2019-04-03 12:24:02 -04:00
leigh-mil
610aef428d
Add user's last login to the session data
2019-04-03 12:24:02 -04:00
Montana
27e2f81ba0
Only test resend invite link for one officer
2019-04-03 11:33:20 -04:00
George Drummond
83b071bf20
Get changes working with merged PRs
2019-04-03 10:32:03 -04:00
George Drummond
933d90b203
Save PR and don't do an extra lookup
2019-04-03 09:43:40 -04:00
George Drummond
dee14b98be
Remove portfolio permissions when role is disabled
2019-04-03 09:43:40 -04:00
George Drummond
358b00a6e2
Import on one line
2019-04-03 09:43:40 -04:00
George Drummond
5cc8c05dbd
Return correct error code
2019-04-03 09:43:40 -04:00
George Drummond
6f1eb43de4
Remove Portfolio User
2019-04-03 09:43:39 -04:00
Montana
dd4231760f
Test that resend links show properly
2019-04-03 09:43:34 -04:00
montana-mil
91c3cc665f
Merge pull request #728 from dod-ccpo/edit-perms-pf-members
...
Edit Portfolio Members Access Levels
2019-04-02 11:14:02 -04:00
Montana
3cfac9e95e
Validate the form
2019-04-02 10:38:18 -04:00
Montana
c46746d43d
No need to manually check for update or flash
2019-04-02 10:37:50 -04:00
dandds
ba2a63bffc
Update test to use get_many
...
Co-Authored-By: montana-mil <42577527+montana-mil@users.noreply.github.com>
2019-04-02 10:17:16 -04:00
Montana
25563cf06a
Add helper function
2019-04-02 10:17:16 -04:00
Montana
bfff2a94b8
Add tests
2019-04-02 10:17:16 -04:00
dandds
19438ab83e
small improvements in existing log statements:
...
- log exceptions as exception so that stack trace is recorded
- use tags where appropriate for JSON logs
- use different log levels in CRL checker
2019-04-01 16:48:39 -04:00
dandds
5d05c146d6
context filter for adding additional data to logs
2019-03-29 15:47:44 -04:00
dandds
34149de04d
basic json log formatter
2019-03-29 14:05:26 -04:00