Commit Graph

289 Commits

Author SHA1 Message Date
dandds
c1df245800 Scope access to applications, task orders, and environment roles.
These resources should be scoped to the portfolio when accessed from
route functions.
2019-04-16 14:18:53 -04:00
dandds
eaeeed0b05 Added BaseDomainClass with a get method.
The BaseDomainClass.get can accept any number of keyword arguments and
will add a filter to the query for each kwarg. This will allow the
caller to scope the query as needed with kwargs.
2019-04-16 14:18:53 -04:00
dandds
0bde431a70 extend soft delete functionality to app and env roles 2019-04-15 15:58:38 -04:00
dandds
b58aef2c6b domain methods for deleting apps and environments 2019-04-15 15:58:38 -04:00
dandds
1c0c5dd9c5 soft deletes available for applications and environments
- parent relation will not include applications or environments marked
  as deleted
- domain classes will exclude deleted objects from selections
- changed some test factories to use domain_word for resource names,
  because they were using person names and it bugged me
2019-04-15 15:58:38 -04:00
dandds
265833f3fc ApplicationRoles.create should accept permission set names 2019-04-11 11:32:17 -04:00
George Drummond
50a532ddbb ApplicationRoles seed and domain 2019-04-11 10:03:21 -04:00
dandds
d0bf5745e6 Merge pull request #746 from dod-ccpo/application_roles
Application roles
2019-04-08 14:22:52 -04:00
dandds
9c10a14827 update authorization decorator to check for application permissions 2019-04-08 13:31:19 -04:00
George Drummond
090e13f083 Update Point of Contact 2019-04-08 13:31:00 -04:00
Montana
ea2338bc30 Make test more robust 2019-04-04 08:38:52 -04:00
Montana
86f106f6d1 Test logging events for auditable mixin 2019-04-03 17:07:33 -04:00
leigh-mil
f1c6717a1e Merge pull request #733 from dod-ccpo/add-last-login-timestamp
Add last login timestamp
2019-04-03 13:10:52 -04:00
leigh-mil
215c2b4cbc Updates from PR feedback 2019-04-03 12:24:02 -04:00
leigh-mil
610aef428d Add user's last login to the session data 2019-04-03 12:24:02 -04:00
George Drummond
933d90b203 Save PR and don't do an extra lookup 2019-04-03 09:43:40 -04:00
George Drummond
dee14b98be Remove portfolio permissions when role is disabled 2019-04-03 09:43:40 -04:00
George Drummond
6f1eb43de4 Remove Portfolio User 2019-04-03 09:43:39 -04:00
dandds
29ec4a80af give access decorator override function a clearer name; exception -> override 2019-03-28 09:32:51 -04:00
dandds
dc2781ec82 more specificity in decorator exceptions test 2019-03-22 13:05:37 -04:00
dandds
6a18109bdd catch individual errors in authorization decorator test 2019-03-22 12:41:29 -04:00
dandds
601ca1c655 fix access logs and add request method 2019-03-22 11:48:59 -04:00
dandds
746a5834c1 only pass one func to exception kwarg in access decorator 2019-03-22 06:33:01 -04:00
dandds
078264bec7 add access tests for all access-protected routes
- cleans up skipped access tests in domain tests
- cleans up other skipped tests that are no longer relevant
2019-03-22 06:33:01 -04:00
dandds
dff72422f0 log access attempts in access decorator 2019-03-22 06:31:20 -04:00
dandds
4a0dd2d432 remove unused domain methods and arguments 2019-03-22 06:31:20 -04:00
dandds
de7c69bde7 apply access decorator to routes 2019-03-22 06:30:21 -04:00
dandds
0ea21fbb9b remove access checks from domain methods 2019-03-22 06:30:02 -04:00
dandds
0f9662e2f2 restore audit log access test 2019-03-21 05:38:28 -04:00
dandds
7c5e931c67 throw error for missing permission_sets in PermissionSets.get_many 2019-03-21 05:38:28 -04:00
dandds
366ada5a90 check sitewide perms for portfolio access, restore ccpo tests 2019-03-21 05:38:28 -04:00
dandds
bec5d11bfe users have permission sets for site-wide perms 2019-03-21 05:38:28 -04:00
dandds
13bc7f56b0 Merge pull request #701 from dod-ccpo/portfolio-perms
Portfolio perms
2019-03-18 08:40:35 -04:00
dandds
23584da57b changes to increase test branch coverage 2019-03-15 14:41:24 -04:00
dandds
b0e48134b0 trim old permissions list 2019-03-15 07:14:49 -04:00
dandds
ad56ddc60e implement PermissionSets.get_many for getting multiple permission sets by name 2019-03-15 07:14:49 -04:00
dandds
ee37a5543a organize portfolio permission sets by domain 2019-03-15 07:14:49 -04:00
dandds
78aa2dfcc6 permission set names should be constants on the domain class 2019-03-15 07:14:49 -04:00
dandds
d3c3209fc0 cleanup unused portfolio roles 2019-03-15 07:14:49 -04:00
dandds
1a122c5335 rename role -> permission_set everywhere 2019-03-15 07:14:49 -04:00
dandds
720c227c32 remove frontend role selection for edit member 2019-03-15 07:14:49 -04:00
dandds
0eb2d4fa3c remove frontend role selection for new member 2019-03-15 07:14:49 -04:00
dandds
0c2ab6fb7a remove portfolio_role direct relationship to role 2019-03-15 07:14:49 -04:00
dandds
44a4d98978 switch portfolio authorization to rely on new permission sets 2019-03-15 07:14:49 -04:00
dandds
8af3986a2d set portfolio member permission sets 2019-03-15 07:14:49 -04:00
Montana
ceee1f69d2 Rely on fixture to change app config 2019-03-14 13:46:52 -04:00
Montana
280775fa66 Fix test that produces CRLRevocationException 2019-03-14 13:44:54 -04:00
Montana
5782c30a7d Use pytest fixture for app with non default configs 2019-03-14 13:42:12 -04:00
Montana
a1ebedb382 Add another CRLCache test 2019-03-14 13:42:12 -04:00
Montana
effec85cf9 Raise Error Code 008 for invalid CRLs 2019-03-14 13:42:12 -04:00