927 Commits

Author SHA1 Message Date
dandds
4f304d747e Small tweaks for adding a new application member:
- raise specific invitation type if invite not found in invitation domain classes
- more terse assignments of defaults in invitation service, smh
- terser margin expression for inline input fields
- sass formatting
- use translation for cancel link
- oxford comma for app team management permission explanation
- do not format environment roles with hyphens for role selection
- generalize some additional methods in the invitation domain base class
- use plain atst.models import path
2019-04-30 17:14:58 -04:00
dandds
ade77e6b91 Route for adding new application member
- domain method for creating a new application member
- ApplicationInvitations domain class
- nested form for adding a new user that holds user data, application
  permission sets, and environment roles
- Invitation service can infer invitation type based on role it's given
- new invitation email templates
2019-04-30 14:41:55 -04:00
dandds
054f6b80b9 add application_invitation table 2019-04-30 14:41:55 -04:00
dandds
dd0b184bc2 extract new member form into standalone form class 2019-04-30 14:41:55 -04:00
dandds
c4ad7b4378 Make portfolio invitation specific to portfolio
- add a base domain class
- extract shared model code to mixin
- rename invitation classes
- invitation model relationship to portfolio_role name is now more
  generic "role"
2019-04-30 14:41:55 -04:00
leigh-mil
41f01f8dec
Merge branch 'master' into edit-env-form-view 2019-04-30 14:34:31 -04:00
montana-mil
0c6f00bf4d
Merge pull request #785 from dod-ccpo/check-user-is-in-app-before-adding-env-role
Check user is in app before adding env role
2019-04-30 14:31:08 -04:00
Montana
94e3dc637a Remove has_member function from application model 2019-04-30 10:27:15 -04:00
leigh-mil
67516b3b55 Combine env_forms and environment_obj 2019-04-30 10:13:55 -04:00
Montana
1222220452 Do not add member to application when adding to environment 2019-04-29 15:05:59 -04:00
Montana
60b4c50819 Check that all users with changed data are app users before updating env roles 2019-04-29 15:05:59 -04:00
Montana
0736b229bf Do not use mutable kwarg to set default permission set on application role 2019-04-29 13:39:43 -04:00
Montana
19a09b792e Use user.id to check if user is in application 2019-04-29 13:38:17 -04:00
leigh-mil
4c7a8c399c Sort env members by role 2019-04-29 12:32:41 -04:00
leigh-mil
bdb1cc9ce5 Add in users without access to env team info 2019-04-29 12:07:44 -04:00
Montana
fec4687c02 Check for member in application function, not user function 2019-04-29 11:06:37 -04:00
Montana
6822680bc8 Ensure that a member is an application member before adding the user to an environment 2019-04-29 11:06:37 -04:00
Montana
c9deaeec72 Add is_app_member() to user model 2019-04-29 11:06:37 -04:00
George Drummond
079672c818
Update application environments 2019-04-29 10:46:21 -04:00
leigh-mil
7f4a18a49b Move test checking route access into test_access and rename test checking if route is working 2019-04-25 10:47:39 -04:00
leigh-mil
99a3534d03 Update route to include environment_id 2019-04-25 10:47:39 -04:00
leigh-mil
73e4057c3d Remove unused imports 2019-04-25 10:47:39 -04:00
leigh-mil
5e415edaef Update form to handle No access 2019-04-25 10:47:39 -04:00
leigh-mil
9b426bbde4 Add post route for env roles form 2019-04-25 10:47:39 -04:00
leigh-mil
c085f27af8 Update env roles by environment 2019-04-25 10:47:39 -04:00
leigh-mil
fbd9c9db66 Create form in view route for application settings 2019-04-25 10:47:39 -04:00
dandds
78ba6afba0 rename and rearrange some portfolio route functions 2019-04-22 07:20:08 -04:00
dandds
782a532c32 reorganize task order routes 2019-04-22 07:20:07 -04:00
dandds
849c5d4b58 Rearrange and rename application routes.
- move application routes to their own Flask blueprint
- squash application routes to be resource-specific
- reorganize application routes
2019-04-22 07:19:30 -04:00
dandds
ed25078c39 move portfolio context processor to generic location 2019-04-22 07:15:18 -04:00
dandds
c223bff09c Remove unused portfolio routes 2019-04-18 09:50:53 -04:00
George Drummond
882998e1d7
Merge pull request #748 from dod-ccpo/display-app-users
Display app users
2019-04-17 15:28:28 -04:00
dandds
4a1e5e61b3 portfolio user can view application settings page 2019-04-17 14:49:14 -04:00
George Drummond
52669a0265
Use access specs 2019-04-17 13:52:06 -04:00
George Drummond
769867c6a9
Display app users view only table 2019-04-17 13:25:45 -04:00
Montana
d9c3cf340f Pass users' roles to the template 2019-04-17 11:06:37 -04:00
dandds
c1df245800 Scope access to applications, task orders, and environment roles.
These resources should be scoped to the portfolio when accessed from
route functions.
2019-04-16 14:18:53 -04:00
dandds
eaeeed0b05 Added BaseDomainClass with a get method.
The BaseDomainClass.get can accept any number of keyword arguments and
will add a filter to the query for each kwarg. This will allow the
caller to scope the query as needed with kwargs.
2019-04-16 14:18:53 -04:00
dandds
0bde431a70 extend soft delete functionality to app and env roles 2019-04-15 15:58:38 -04:00
dandds
dac764ab82 route for deleting an application 2019-04-15 15:58:38 -04:00
dandds
0348af7ce7 record soft deletion in audit log for applications and environments 2019-04-15 15:58:38 -04:00
dandds
b58aef2c6b domain methods for deleting apps and environments 2019-04-15 15:58:38 -04:00
dandds
1c0c5dd9c5 soft deletes available for applications and environments
- parent relation will not include applications or environments marked
  as deleted
- domain classes will exclude deleted objects from selections
- changed some test factories to use domain_word for resource names,
  because they were using person names and it bugged me
2019-04-15 15:58:38 -04:00
Montana
4f2cb4d4a2 Test environment_obj 2019-04-11 15:54:56 -04:00
dandds
265833f3fc ApplicationRoles.create should accept permission set names 2019-04-11 11:32:17 -04:00
George Drummond
50a532ddbb
ApplicationRoles seed and domain 2019-04-11 10:03:21 -04:00
leigh-mil
6bca7c7660
Merge pull request #747 from dod-ccpo/disable-edit-ppoc
Disable edit ppoc
2019-04-09 10:00:18 -04:00
leigh-mil
51a5929b52 Check if member is PPoC before updating perms 2019-04-09 08:42:35 -04:00
dandds
d0bf5745e6
Merge pull request #746 from dod-ccpo/application_roles
Application roles
2019-04-08 14:22:52 -04:00
dandds
b17741acd1 Adds an ORM permission set listener for application roles.
Application role changes will be recorded in the audit log. Generalizes
pre-existing listener that was in user for portfolio roles.
2019-04-08 14:00:26 -04:00