1241 Commits

Author SHA1 Message Date
dandds
c1df245800 Scope access to applications, task orders, and environment roles.
These resources should be scoped to the portfolio when accessed from
route functions.
2019-04-16 14:18:53 -04:00
dandds
eaeeed0b05 Added BaseDomainClass with a get method.
The BaseDomainClass.get can accept any number of keyword arguments and
will add a filter to the query for each kwarg. This will allow the
caller to scope the query as needed with kwargs.
2019-04-16 14:18:53 -04:00
dandds
0bde431a70 extend soft delete functionality to app and env roles 2019-04-15 15:58:38 -04:00
dandds
dac764ab82 route for deleting an application 2019-04-15 15:58:38 -04:00
dandds
0348af7ce7 record soft deletion in audit log for applications and environments 2019-04-15 15:58:38 -04:00
dandds
b58aef2c6b domain methods for deleting apps and environments 2019-04-15 15:58:38 -04:00
dandds
1c0c5dd9c5 soft deletes available for applications and environments
- parent relation will not include applications or environments marked
  as deleted
- domain classes will exclude deleted objects from selections
- changed some test factories to use domain_word for resource names,
  because they were using person names and it bugged me
2019-04-15 15:58:38 -04:00
Montana
4f2cb4d4a2 Test environment_obj 2019-04-11 15:54:56 -04:00
dandds
265833f3fc ApplicationRoles.create should accept permission set names 2019-04-11 11:32:17 -04:00
George Drummond
50a532ddbb
ApplicationRoles seed and domain 2019-04-11 10:03:21 -04:00
leigh-mil
6bca7c7660
Merge pull request #747 from dod-ccpo/disable-edit-ppoc
Disable edit ppoc
2019-04-09 10:00:18 -04:00
leigh-mil
51a5929b52 Check if member is PPoC before updating perms 2019-04-09 08:42:35 -04:00
dandds
d0bf5745e6
Merge pull request #746 from dod-ccpo/application_roles
Application roles
2019-04-08 14:22:52 -04:00
dandds
b17741acd1 Adds an ORM permission set listener for application roles.
Application role changes will be recorded in the audit log. Generalizes
pre-existing listener that was in user for portfolio roles.
2019-04-08 14:00:26 -04:00
dandds
9c10a14827 update authorization decorator to check for application permissions 2019-04-08 13:31:19 -04:00
dandds
866043495b updates to test factories to accomodate application roles 2019-04-08 13:31:19 -04:00
George Drummond
090e13f083
Update Point of Contact 2019-04-08 13:31:00 -04:00
dandds
8827130444 record portfolio_role permission_set changes with bulk_replace event 2019-04-04 19:00:48 -04:00
Montana
8057c7b2fc Log audit events before we save them to the DB 2019-04-04 08:58:27 -04:00
Montana
ea2338bc30 Make test more robust 2019-04-04 08:38:52 -04:00
Montana
86f106f6d1 Test logging events for auditable mixin 2019-04-03 17:07:33 -04:00
leigh-mil
f1c6717a1e
Merge pull request #733 from dod-ccpo/add-last-login-timestamp
Add last login timestamp
2019-04-03 13:10:52 -04:00
George Drummond
48d9506f96
Merge pull request #730 from dod-ccpo/archive-portfolio-member
Remove Portfolio User
2019-04-03 13:06:41 -04:00
leigh-mil
215c2b4cbc Updates from PR feedback 2019-04-03 12:24:02 -04:00
leigh-mil
610aef428d Add user's last login to the session data 2019-04-03 12:24:02 -04:00
Montana
27e2f81ba0 Only test resend invite link for one officer 2019-04-03 11:33:20 -04:00
George Drummond
83b071bf20
Get changes working with merged PRs 2019-04-03 10:32:03 -04:00
George Drummond
933d90b203
Save PR and don't do an extra lookup 2019-04-03 09:43:40 -04:00
George Drummond
dee14b98be
Remove portfolio permissions when role is disabled 2019-04-03 09:43:40 -04:00
George Drummond
358b00a6e2
Import on one line 2019-04-03 09:43:40 -04:00
George Drummond
5cc8c05dbd
Return correct error code 2019-04-03 09:43:40 -04:00
George Drummond
6f1eb43de4
Remove Portfolio User 2019-04-03 09:43:39 -04:00
Montana
dd4231760f Test that resend links show properly 2019-04-03 09:43:34 -04:00
montana-mil
91c3cc665f
Merge pull request #728 from dod-ccpo/edit-perms-pf-members
Edit Portfolio Members Access Levels
2019-04-02 11:14:02 -04:00
Montana
3cfac9e95e Validate the form 2019-04-02 10:38:18 -04:00
Montana
c46746d43d No need to manually check for update or flash 2019-04-02 10:37:50 -04:00
dandds
ba2a63bffc Update test to use get_many
Co-Authored-By: montana-mil <42577527+montana-mil@users.noreply.github.com>
2019-04-02 10:17:16 -04:00
Montana
25563cf06a Add helper function 2019-04-02 10:17:16 -04:00
Montana
bfff2a94b8 Add tests 2019-04-02 10:17:16 -04:00
dandds
19438ab83e small improvements in existing log statements:
- log exceptions as exception so that stack trace is recorded
- use tags where appropriate for JSON logs
- use different log levels in CRL checker
2019-04-01 16:48:39 -04:00
dandds
5d05c146d6 context filter for adding additional data to logs 2019-03-29 15:47:44 -04:00
dandds
34149de04d basic json log formatter 2019-03-29 14:05:26 -04:00
dandds
29ec4a80af give access decorator override function a clearer name; exception -> override 2019-03-28 09:32:51 -04:00
dandds
09d6b5fb09 just use python stdlib mock in access tests 2019-03-28 09:25:11 -04:00
dandds
ab5b066bf9 fix hard-coded route strings in application tests 2019-03-27 09:35:34 -04:00
dandds
6b59ab800b
Merge pull request #722 from dod-ccpo/render-edit-buttons-pf-users-table
Render Edit Buttons on Portfolio Members Table
2019-03-26 15:43:39 -04:00
Montana
fd64db8688 add a test 2019-03-26 15:28:43 -04:00
leigh-mil
cf1b30d6ca Use url_for 2019-03-26 13:28:44 -04:00
leigh-mil
81635ae979 Add tests to check the TO nested routes 2019-03-26 12:01:44 -04:00
leigh-mil
b5571000fe Update tests - remove references to Workspace, use url_for, and check to make sure time_updated does not change on the application 2019-03-26 10:33:20 -04:00