richard-dds
d1e6533824
Implement EnvironmentRoles.disable
2019-10-29 15:57:57 -04:00
richard-dds
184b58d5d2
Remove AWSCloudProvider
2019-10-28 13:55:34 -04:00
richard-dds
6ea17bb4f8
Merge create_environment and create_environment_baseline
2019-10-28 13:39:40 -04:00
richard-dds
c66b1ef2f9
Add mypy and add typechecking step to script/test
...
Only check atst/domain/csp/cloud.py for now
2019-10-24 14:44:53 -04:00
richard-dds
04235fd13d
Extract constant for permission boundary ARN
2019-10-02 16:01:23 -04:00
richard-dds
329f014b16
Use jinja template to generate policy json
2019-10-02 16:01:23 -04:00
richard-dds
7a8b96d2a8
Use _get_client everywhere
2019-10-02 16:01:23 -04:00
richard-dds
10aa1c9bff
Pull out a constant
2019-10-02 16:01:23 -04:00
richard-dds
cc3de11e54
Standardize all of the AWS credentials
2019-10-02 16:01:23 -04:00
richard-dds
686ef55e40
Remove comment
2019-10-02 16:01:23 -04:00
richard-dds
6ca6131d21
Add comment regarding AWSCloudProvider.BASELINE_POLICIES
2019-10-02 16:01:23 -04:00
richard-dds
faaac42291
Remove todo
2019-10-02 16:01:23 -04:00
richard-dds
4c0f6704f2
Clean up and refine TODOs
2019-10-02 16:01:12 -04:00
richard-dds
cacb9135d1
Tests for AWSCloudProvider.create_environment
...
Created mock boto3 for testing
2019-10-02 16:01:12 -04:00
richard-dds
26a7d97a1b
Fix AWSCloudProvider.create_atat_admin_user
2019-10-02 16:00:43 -04:00
richard-dds
3cb4b5b334
Formatting
2019-10-02 16:00:43 -04:00
richard-dds
1a93e466d3
Trying to get AwsCloudProvider.create_atat_admin_user working
2019-10-02 16:00:43 -04:00
richard-dds
39442c3ccd
Fix AWSCloudProvider.create_environment
2019-10-02 16:00:43 -04:00
richard-dds
73f69650df
Handle case where baseline policy already exists
2019-10-02 16:00:43 -04:00
richard-dds
4f648d7885
Update get_client
2019-10-02 16:00:43 -04:00
richard-dds
7dcf27f690
Implement AWSCloudProvider.create_environment_baseline
2019-10-02 16:00:43 -04:00
richard-dds
48eb860e05
Update some todos
2019-10-02 16:00:43 -04:00
richard-dds
30210ba09c
Rough implementation of AWSCloudProvider
...
Rough implementation of AWSCloudProvider.create_environment
Rough impl of AWSCloudProvider.create_atat_admin_user
2019-10-02 16:00:43 -04:00
tomdds
ff8119acd1
Integrate errors with MockCloudProvider
2019-09-24 13:54:41 -04:00
tomdds
5aa5acfb2a
Remove redundant EnvironmentExistsException
2019-09-24 13:53:41 -04:00
tomdds
08f98a557f
Create separate authentication and authorization exceptions
2019-09-24 13:53:41 -04:00
tomdds
34c616ce63
First pass at Cloud Provision Exceptions
2019-09-24 13:53:41 -04:00
richard-dds
d1e146f577
Add create_user task
2019-09-19 16:56:36 -04:00
richard-dds
6c0420d6c5
Read config to determine mock CSP type
2019-09-09 10:45:38 -04:00
richard-dds
fd65a3a972
Rename "throw" to "raise"
2019-09-09 10:41:17 -04:00
richard-dds
43d5be4e19
Add network failures to suspend / delete user
2019-09-09 10:41:17 -04:00
richard-dds
62795561a8
All the methods
2019-09-09 10:41:17 -04:00
richard-dds
25bedb816d
Auth create_environment
2019-09-09 10:41:17 -04:00
richard-dds
f757e86eb3
Update TODOs
2019-09-09 10:41:17 -04:00
richard-dds
523f41a75d
Delay and network errors
2019-09-09 10:41:17 -04:00
richard-dds
b247c53cd2
id helper
2019-09-09 10:41:17 -04:00
tomdds
84580a1330
Add type hinting to cloud interface and fix mismatch in mock implementation
2019-09-03 15:12:14 -04:00
tomdds
a23a484630
add Environment model to create_environment arguments
2019-09-03 10:43:04 -04:00
tomdds
74ad006428
Specify return type of create_or_update_user
2019-09-03 10:41:45 -04:00
tomdds
e5e9f5a3e2
Directly pass EnvironmentUser to CSP User upsert
2019-08-30 09:57:42 -04:00
tomdds
9712e6896e
Return True from suspend and delete CSP calls
2019-08-29 17:20:35 -04:00
tomdds
cce25679a4
Define potential structure for admin user return type
2019-08-29 17:03:00 -04:00
tomdds
0451dce8cf
Pass credentials to each CSP method rather than an abstract auth object
2019-08-29 17:01:51 -04:00
tomdds
776887686c
Generalize baseline provisioning method signature
2019-08-29 16:51:44 -04:00
tomdds
1fe9399f99
Update CloudProviderInterface for provision job consumption
2019-08-29 14:06:18 -04:00
dandds
df06d1b62f
Use application_role_id on environment_roles.
...
In the future, an `application_invitation1 will not refer to a `user` until
someone accepts the invitation; they'll only reference an
`application_role`. When a user is invited to an application, the
inviter can specify the environments the invitee should have access to.
For this to be possible, an `environment_role` should reference an
`application_role`, because no `user` entity will be known at that time.
In addition to updating all the models and domain methods necessary for
this change, this commit deletes unused code and tests that were
dependent on `environment_roles` having a `user_id` foreign key.
2019-05-31 11:21:20 -04:00
dandds
e4c50da363
push environment deletion info to CSP
2019-04-15 16:03:32 -04:00
Patrick Smith
02cac0b2d9
Use rackspace estimate calculator
2019-01-17 13:23:47 -05:00
Patrick Smith
28e0d423fd
Create user account in CSP when adding an environment role
2019-01-08 12:19:51 -05:00
Patrick Smith
91419af71a
Generate mock access token when access env
2019-01-07 17:30:34 -05:00