Commit Graph

519 Commits

Author SHA1 Message Date
dandds
a2ebdf78a0 Route for accepting an application invitation.
- Domain method for enabling an application role.
- Updated ApplicationRole model `history` property so that it serializes
  the `status` correctly
2019-05-03 17:11:57 -04:00
dandds
4f304d747e Small tweaks for adding a new application member:
- raise specific invitation type if invite not found in invitation domain classes
- more terse assignments of defaults in invitation service, smh
- terser margin expression for inline input fields
- sass formatting
- use translation for cancel link
- oxford comma for app team management permission explanation
- do not format environment roles with hyphens for role selection
- generalize some additional methods in the invitation domain base class
- use plain atst.models import path
2019-04-30 17:14:58 -04:00
dandds
ade77e6b91 Route for adding new application member
- domain method for creating a new application member
- ApplicationInvitations domain class
- nested form for adding a new user that holds user data, application
  permission sets, and environment roles
- Invitation service can infer invitation type based on role it's given
- new invitation email templates
2019-04-30 14:41:55 -04:00
dandds
c4ad7b4378 Make portfolio invitation specific to portfolio
- add a base domain class
- extract shared model code to mixin
- rename invitation classes
- invitation model relationship to portfolio_role name is now more
  generic "role"
2019-04-30 14:41:55 -04:00
montana-mil
0c6f00bf4d Merge pull request #785 from dod-ccpo/check-user-is-in-app-before-adding-env-role
Check user is in app before adding env role
2019-04-30 14:31:08 -04:00
Montana
78a8201323 Send resource id to NotFoundError as well as resource name. 2019-04-30 10:11:10 -04:00
Montana
1222220452 Do not add member to application when adding to environment 2019-04-29 15:05:59 -04:00
Montana
60b4c50819 Check that all users with changed data are app users before updating env roles 2019-04-29 15:05:59 -04:00
Montana
0736b229bf Do not use mutable kwarg to set default permission set on application role 2019-04-29 13:39:43 -04:00
Montana
19a09b792e Use user.id to check if user is in application 2019-04-29 13:38:17 -04:00
Montana
fec4687c02 Check for member in application function, not user function 2019-04-29 11:06:37 -04:00
Montana
6822680bc8 Ensure that a member is an application member before adding the user to an environment 2019-04-29 11:06:37 -04:00
Montana
3e0a332ffc Default permission_sets to VIEW_APPLICATION on creating an application role 2019-04-29 11:06:37 -04:00
George Drummond
079672c818 Update application environments 2019-04-29 10:46:21 -04:00
leigh-mil
99a3534d03 Update route to include environment_id 2019-04-25 10:47:39 -04:00
leigh-mil
1f7b5469de remove unnecessary if statement 2019-04-25 10:47:39 -04:00
leigh-mil
5e415edaef Update form to handle No access 2019-04-25 10:47:39 -04:00
leigh-mil
c085f27af8 Update env roles by environment 2019-04-25 10:47:39 -04:00
dandds
849c5d4b58 Rearrange and rename application routes.
- move application routes to their own Flask blueprint
- squash application routes to be resource-specific
- reorganize application routes
2019-04-22 07:19:30 -04:00
dandds
c1df245800 Scope access to applications, task orders, and environment roles.
These resources should be scoped to the portfolio when accessed from
route functions.
2019-04-16 14:18:53 -04:00
dandds
eaeeed0b05 Added BaseDomainClass with a get method.
The BaseDomainClass.get can accept any number of keyword arguments and
will add a filter to the query for each kwarg. This will allow the
caller to scope the query as needed with kwargs.
2019-04-16 14:18:53 -04:00
dandds
e4c50da363 push environment deletion info to CSP 2019-04-15 16:03:32 -04:00
dandds
0bde431a70 extend soft delete functionality to app and env roles 2019-04-15 15:58:38 -04:00
dandds
dac764ab82 route for deleting an application 2019-04-15 15:58:38 -04:00
dandds
b58aef2c6b domain methods for deleting apps and environments 2019-04-15 15:58:38 -04:00
dandds
1c0c5dd9c5 soft deletes available for applications and environments
- parent relation will not include applications or environments marked
  as deleted
- domain classes will exclude deleted objects from selections
- changed some test factories to use domain_word for resource names,
  because they were using person names and it bugged me
2019-04-15 15:58:38 -04:00
dandds
265833f3fc ApplicationRoles.create should accept permission set names 2019-04-11 11:32:17 -04:00
George Drummond
50a532ddbb ApplicationRoles seed and domain 2019-04-11 10:03:21 -04:00
dandds
d0bf5745e6 Merge pull request #746 from dod-ccpo/application_roles
Application roles
2019-04-08 14:22:52 -04:00
dandds
9c10a14827 update authorization decorator to check for application permissions 2019-04-08 13:31:19 -04:00
dandds
0ac8c9632b add application permission sets 2019-04-08 13:31:19 -04:00
George Drummond
090e13f083 Update Point of Contact 2019-04-08 13:31:00 -04:00
leigh-mil
f1c6717a1e Merge pull request #733 from dod-ccpo/add-last-login-timestamp
Add last login timestamp
2019-04-03 13:10:52 -04:00
leigh-mil
cc11123eba Simplify get_last_login() 2019-04-03 13:03:17 -04:00
leigh-mil
215c2b4cbc Updates from PR feedback 2019-04-03 12:24:02 -04:00
leigh-mil
610aef428d Add user's last login to the session data 2019-04-03 12:24:02 -04:00
George Drummond
270b8d0db6 We aren't using this import 2019-04-03 09:43:40 -04:00
George Drummond
dee14b98be Remove portfolio permissions when role is disabled 2019-04-03 09:43:40 -04:00
George Drummond
6f1eb43de4 Remove Portfolio User 2019-04-03 09:43:39 -04:00
dandds
19438ab83e small improvements in existing log statements:
- log exceptions as exception so that stack trace is recorded
- use tags where appropriate for JSON logs
- use different log levels in CRL checker
2019-04-01 16:48:39 -04:00
dandds
29ec4a80af give access decorator override function a clearer name; exception -> override 2019-03-28 09:32:51 -04:00
leigh-mil
0d30b81ec5 Use if/else to avoid multiple queries 2019-03-26 10:36:23 -04:00
leigh-mil
5d2b8556ed Check that user has portfolio and invite perms to revoke or resend invites 2019-03-25 16:19:44 -04:00
leigh-mil
d152034e1b Add in check to make sure that user has portfolio and app perms 2019-03-25 15:54:10 -04:00
dandds
21af2b8ce9 separate control structures for task_order_id and portfolio_id in decorator 2019-03-22 14:47:42 -04:00
dandds
601ca1c655 fix access logs and add request method 2019-03-22 11:48:59 -04:00
dandds
746a5834c1 only pass one func to exception kwarg in access decorator 2019-03-22 06:33:01 -04:00
dandds
905f03342d remove permission from access decorator exception args 2019-03-22 06:33:01 -04:00
dandds
dff72422f0 log access attempts in access decorator 2019-03-22 06:31:20 -04:00
dandds
4a0dd2d432 remove unused domain methods and arguments 2019-03-22 06:31:20 -04:00