dandds
b58aef2c6b
domain methods for deleting apps and environments
2019-04-15 15:58:38 -04:00
dandds
1c0c5dd9c5
soft deletes available for applications and environments
...
- parent relation will not include applications or environments marked
as deleted
- domain classes will exclude deleted objects from selections
- changed some test factories to use domain_word for resource names,
because they were using person names and it bugged me
2019-04-15 15:58:38 -04:00
dandds
265833f3fc
ApplicationRoles.create should accept permission set names
2019-04-11 11:32:17 -04:00
George Drummond
50a532ddbb
ApplicationRoles seed and domain
2019-04-11 10:03:21 -04:00
dandds
d0bf5745e6
Merge pull request #746 from dod-ccpo/application_roles
...
Application roles
2019-04-08 14:22:52 -04:00
dandds
9c10a14827
update authorization decorator to check for application permissions
2019-04-08 13:31:19 -04:00
George Drummond
090e13f083
Update Point of Contact
2019-04-08 13:31:00 -04:00
Montana
ea2338bc30
Make test more robust
2019-04-04 08:38:52 -04:00
Montana
86f106f6d1
Test logging events for auditable mixin
2019-04-03 17:07:33 -04:00
leigh-mil
f1c6717a1e
Merge pull request #733 from dod-ccpo/add-last-login-timestamp
...
Add last login timestamp
2019-04-03 13:10:52 -04:00
leigh-mil
215c2b4cbc
Updates from PR feedback
2019-04-03 12:24:02 -04:00
leigh-mil
610aef428d
Add user's last login to the session data
2019-04-03 12:24:02 -04:00
George Drummond
933d90b203
Save PR and don't do an extra lookup
2019-04-03 09:43:40 -04:00
George Drummond
dee14b98be
Remove portfolio permissions when role is disabled
2019-04-03 09:43:40 -04:00
George Drummond
6f1eb43de4
Remove Portfolio User
2019-04-03 09:43:39 -04:00
dandds
29ec4a80af
give access decorator override function a clearer name; exception -> override
2019-03-28 09:32:51 -04:00
dandds
dc2781ec82
more specificity in decorator exceptions test
2019-03-22 13:05:37 -04:00
dandds
6a18109bdd
catch individual errors in authorization decorator test
2019-03-22 12:41:29 -04:00
dandds
601ca1c655
fix access logs and add request method
2019-03-22 11:48:59 -04:00
dandds
746a5834c1
only pass one func to exception kwarg in access decorator
2019-03-22 06:33:01 -04:00
dandds
078264bec7
add access tests for all access-protected routes
...
- cleans up skipped access tests in domain tests
- cleans up other skipped tests that are no longer relevant
2019-03-22 06:33:01 -04:00
dandds
dff72422f0
log access attempts in access decorator
2019-03-22 06:31:20 -04:00
dandds
4a0dd2d432
remove unused domain methods and arguments
2019-03-22 06:31:20 -04:00
dandds
de7c69bde7
apply access decorator to routes
2019-03-22 06:30:21 -04:00
dandds
0ea21fbb9b
remove access checks from domain methods
2019-03-22 06:30:02 -04:00
dandds
0f9662e2f2
restore audit log access test
2019-03-21 05:38:28 -04:00
dandds
7c5e931c67
throw error for missing permission_sets in PermissionSets.get_many
2019-03-21 05:38:28 -04:00
dandds
366ada5a90
check sitewide perms for portfolio access, restore ccpo tests
2019-03-21 05:38:28 -04:00
dandds
bec5d11bfe
users have permission sets for site-wide perms
2019-03-21 05:38:28 -04:00
dandds
13bc7f56b0
Merge pull request #701 from dod-ccpo/portfolio-perms
...
Portfolio perms
2019-03-18 08:40:35 -04:00
dandds
23584da57b
changes to increase test branch coverage
2019-03-15 14:41:24 -04:00
dandds
b0e48134b0
trim old permissions list
2019-03-15 07:14:49 -04:00
dandds
ad56ddc60e
implement PermissionSets.get_many for getting multiple permission sets by name
2019-03-15 07:14:49 -04:00
dandds
ee37a5543a
organize portfolio permission sets by domain
2019-03-15 07:14:49 -04:00
dandds
78aa2dfcc6
permission set names should be constants on the domain class
2019-03-15 07:14:49 -04:00
dandds
d3c3209fc0
cleanup unused portfolio roles
2019-03-15 07:14:49 -04:00
dandds
1a122c5335
rename role -> permission_set everywhere
2019-03-15 07:14:49 -04:00
dandds
720c227c32
remove frontend role selection for edit member
2019-03-15 07:14:49 -04:00
dandds
0eb2d4fa3c
remove frontend role selection for new member
2019-03-15 07:14:49 -04:00
dandds
0c2ab6fb7a
remove portfolio_role direct relationship to role
2019-03-15 07:14:49 -04:00
dandds
44a4d98978
switch portfolio authorization to rely on new permission sets
2019-03-15 07:14:49 -04:00
dandds
8af3986a2d
set portfolio member permission sets
2019-03-15 07:14:49 -04:00
Montana
ceee1f69d2
Rely on fixture to change app config
2019-03-14 13:46:52 -04:00
Montana
280775fa66
Fix test that produces CRLRevocationException
2019-03-14 13:44:54 -04:00
Montana
5782c30a7d
Use pytest fixture for app with non default configs
2019-03-14 13:42:12 -04:00
Montana
a1ebedb382
Add another CRLCache test
2019-03-14 13:42:12 -04:00
Montana
effec85cf9
Raise Error Code 008 for invalid CRLs
2019-03-14 13:42:12 -04:00
Montana
2eeb548458
Move crl fixtures to conftest
2019-03-14 13:42:12 -04:00
Montana
30cd77ff98
Test AuthenticationContext
2019-03-14 13:42:12 -04:00
Montana
720859efb6
Ugly implementation for CRLInvalidException
2019-03-14 13:42:12 -04:00