dandds
df06d1b62f
Use application_role_id on environment_roles.
...
In the future, an `application_invitation1 will not refer to a `user` until
someone accepts the invitation; they'll only reference an
`application_role`. When a user is invited to an application, the
inviter can specify the environments the invitee should have access to.
For this to be possible, an `environment_role` should reference an
`application_role`, because no `user` entity will be known at that time.
In addition to updating all the models and domain methods necessary for
this change, this commit deletes unused code and tests that were
dependent on `environment_roles` having a `user_id` foreign key.
2019-05-31 11:21:20 -04:00
George Drummond
a9fac1ca59
Add in missing test
2019-05-22 11:19:14 -04:00
dandds
078264bec7
add access tests for all access-protected routes
...
- cleans up skipped access tests in domain tests
- cleans up other skipped tests that are no longer relevant
2019-03-22 06:33:01 -04:00
dandds
4a0dd2d432
remove unused domain methods and arguments
2019-03-22 06:31:20 -04:00
dandds
de7c69bde7
apply access decorator to routes
2019-03-22 06:30:21 -04:00
dandds
0ea21fbb9b
remove access checks from domain methods
2019-03-22 06:30:02 -04:00
dandds
366ada5a90
check sitewide perms for portfolio access, restore ccpo tests
2019-03-21 05:38:28 -04:00
dandds
bec5d11bfe
users have permission sets for site-wide perms
2019-03-21 05:38:28 -04:00
dandds
23584da57b
changes to increase test branch coverage
2019-03-15 14:41:24 -04:00
dandds
b0e48134b0
trim old permissions list
2019-03-15 07:14:49 -04:00
dandds
ad56ddc60e
implement PermissionSets.get_many for getting multiple permission sets by name
2019-03-15 07:14:49 -04:00
dandds
78aa2dfcc6
permission set names should be constants on the domain class
2019-03-15 07:14:49 -04:00
dandds
d3c3209fc0
cleanup unused portfolio roles
2019-03-15 07:14:49 -04:00
dandds
1a122c5335
rename role -> permission_set everywhere
2019-03-15 07:14:49 -04:00
dandds
720c227c32
remove frontend role selection for edit member
2019-03-15 07:14:49 -04:00
dandds
0eb2d4fa3c
remove frontend role selection for new member
2019-03-15 07:14:49 -04:00
dandds
0c2ab6fb7a
remove portfolio_role direct relationship to role
2019-03-15 07:14:49 -04:00
dandds
44a4d98978
switch portfolio authorization to rely on new permission sets
2019-03-15 07:14:49 -04:00
Patrick Smith
2c62f54b83
Remove request-related models
2019-02-25 14:54:14 -05:00
Montana
ef85340baa
Add to test
2019-01-23 15:47:00 -05:00
Montana
1d2befa660
Fix test
2019-01-23 14:45:29 -05:00
dandds
d3d36822df
workspace -> portfolio everywhere
2019-01-14 16:00:17 -05:00