53 Commits

Author SHA1 Message Date
richard-dds
d1e6533824 Implement EnvironmentRoles.disable 2019-10-29 15:57:57 -04:00
richard-dds
184b58d5d2 Remove AWSCloudProvider 2019-10-28 13:55:34 -04:00
richard-dds
6ea17bb4f8 Merge create_environment and create_environment_baseline 2019-10-28 13:39:40 -04:00
richard-dds
c66b1ef2f9 Add mypy and add typechecking step to script/test
Only check atst/domain/csp/cloud.py for now
2019-10-24 14:44:53 -04:00
richard-dds
04235fd13d Extract constant for permission boundary ARN 2019-10-02 16:01:23 -04:00
richard-dds
329f014b16 Use jinja template to generate policy json 2019-10-02 16:01:23 -04:00
richard-dds
7a8b96d2a8 Use _get_client everywhere 2019-10-02 16:01:23 -04:00
richard-dds
10aa1c9bff Pull out a constant 2019-10-02 16:01:23 -04:00
richard-dds
cc3de11e54 Standardize all of the AWS credentials 2019-10-02 16:01:23 -04:00
richard-dds
686ef55e40 Remove comment 2019-10-02 16:01:23 -04:00
richard-dds
6ca6131d21 Add comment regarding AWSCloudProvider.BASELINE_POLICIES 2019-10-02 16:01:23 -04:00
richard-dds
faaac42291 Remove todo 2019-10-02 16:01:23 -04:00
richard-dds
4c0f6704f2 Clean up and refine TODOs 2019-10-02 16:01:12 -04:00
richard-dds
cacb9135d1 Tests for AWSCloudProvider.create_environment
Created mock boto3 for testing
2019-10-02 16:01:12 -04:00
richard-dds
26a7d97a1b Fix AWSCloudProvider.create_atat_admin_user 2019-10-02 16:00:43 -04:00
richard-dds
3cb4b5b334 Formatting 2019-10-02 16:00:43 -04:00
richard-dds
1a93e466d3 Trying to get AwsCloudProvider.create_atat_admin_user working 2019-10-02 16:00:43 -04:00
richard-dds
39442c3ccd Fix AWSCloudProvider.create_environment 2019-10-02 16:00:43 -04:00
richard-dds
73f69650df Handle case where baseline policy already exists 2019-10-02 16:00:43 -04:00
richard-dds
4f648d7885 Update get_client 2019-10-02 16:00:43 -04:00
richard-dds
7dcf27f690 Implement AWSCloudProvider.create_environment_baseline 2019-10-02 16:00:43 -04:00
richard-dds
48eb860e05 Update some todos 2019-10-02 16:00:43 -04:00
richard-dds
30210ba09c Rough implementation of AWSCloudProvider
Rough implementation of AWSCloudProvider.create_environment

Rough impl of AWSCloudProvider.create_atat_admin_user
2019-10-02 16:00:43 -04:00
tomdds
ff8119acd1 Integrate errors with MockCloudProvider 2019-09-24 13:54:41 -04:00
tomdds
5aa5acfb2a Remove redundant EnvironmentExistsException 2019-09-24 13:53:41 -04:00
tomdds
08f98a557f Create separate authentication and authorization exceptions 2019-09-24 13:53:41 -04:00
tomdds
34c616ce63 First pass at Cloud Provision Exceptions 2019-09-24 13:53:41 -04:00
richard-dds
d1e146f577 Add create_user task 2019-09-19 16:56:36 -04:00
richard-dds
6c0420d6c5 Read config to determine mock CSP type 2019-09-09 10:45:38 -04:00
richard-dds
fd65a3a972 Rename "throw" to "raise" 2019-09-09 10:41:17 -04:00
richard-dds
43d5be4e19 Add network failures to suspend / delete user 2019-09-09 10:41:17 -04:00
richard-dds
62795561a8 All the methods 2019-09-09 10:41:17 -04:00
richard-dds
25bedb816d Auth create_environment 2019-09-09 10:41:17 -04:00
richard-dds
f757e86eb3 Update TODOs 2019-09-09 10:41:17 -04:00
richard-dds
523f41a75d Delay and network errors 2019-09-09 10:41:17 -04:00
richard-dds
b247c53cd2 id helper 2019-09-09 10:41:17 -04:00
tomdds
84580a1330 Add type hinting to cloud interface and fix mismatch in mock implementation 2019-09-03 15:12:14 -04:00
tomdds
a23a484630 add Environment model to create_environment arguments 2019-09-03 10:43:04 -04:00
tomdds
74ad006428 Specify return type of create_or_update_user 2019-09-03 10:41:45 -04:00
tomdds
e5e9f5a3e2 Directly pass EnvironmentUser to CSP User upsert 2019-08-30 09:57:42 -04:00
tomdds
9712e6896e Return True from suspend and delete CSP calls 2019-08-29 17:20:35 -04:00
tomdds
cce25679a4 Define potential structure for admin user return type 2019-08-29 17:03:00 -04:00
tomdds
0451dce8cf Pass credentials to each CSP method rather than an abstract auth object 2019-08-29 17:01:51 -04:00
tomdds
776887686c Generalize baseline provisioning method signature 2019-08-29 16:51:44 -04:00
tomdds
1fe9399f99 Update CloudProviderInterface for provision job consumption 2019-08-29 14:06:18 -04:00
dandds
df06d1b62f Use application_role_id on environment_roles.
In the future, an `application_invitation1 will not refer to a `user` until
someone accepts the invitation; they'll only reference an
`application_role`. When a user is invited to an application, the
inviter can specify the environments the invitee should have access to.
For this to be possible, an `environment_role` should reference an
`application_role`, because no `user` entity will be known at that time.

In addition to updating all the models and domain methods necessary for
this change, this commit deletes unused code and tests that were
dependent on `environment_roles` having a `user_id` foreign key.
2019-05-31 11:21:20 -04:00
dandds
e4c50da363 push environment deletion info to CSP 2019-04-15 16:03:32 -04:00
Patrick Smith
02cac0b2d9 Use rackspace estimate calculator 2019-01-17 13:23:47 -05:00
Patrick Smith
28e0d423fd Create user account in CSP when adding an environment role 2019-01-08 12:19:51 -05:00
Patrick Smith
91419af71a Generate mock access token when access env 2019-01-07 17:30:34 -05:00