Commit Graph

820 Commits

Author SHA1 Message Date
Wayne Witzel III
0ef456e4d8 added related Roles to Project, Credential, Inventory, and Group 2016-05-12 10:05:46 -04:00
Wayne Witzel III
6a5f4d6113 remove URL and add roles endpoint for JobTemplate 2016-05-10 16:29:11 -04:00
Alan Rominger
ac24fc75b8 Merge pull request #1823 from AlanCoding/532_survey_validation
Block Duplicate Survey Variables
2016-05-10 13:35:57 -04:00
Wayne Witzel III
84c326d801 Merge pull request #1865 from wwitzel3/issue-1567
add count to labels
2016-05-09 15:05:17 -04:00
Wayne Witzel III
afe5f5ebc0 add count to labels 2016-05-09 14:29:08 -04:00
Alan Rominger
11e9792356 Merge pull request #1819 from AlanCoding/more_error_msg_periods
Add even more periods in error messages
2016-05-09 13:51:02 -04:00
Matthew Jones
b6f8d12119 Map ProjectUpdate for notifications on its view 2016-05-09 12:48:46 -04:00
Wayne Witzel III
c050750489 Merge pull request #1834 from wwitzel3/issue-752
add owners summary_field for Credential
2016-05-06 21:58:47 -04:00
Wayne Witzel III
e6210de7b2 fix related fields to include team and user 2016-05-06 15:21:23 -04:00
Matthew Jones
61525d8da4 Include more details on schedules endpoint 2016-05-06 14:45:00 -04:00
Wayne Witzel III
dc9b609655 add owners summary_field for Credential 2016-05-06 11:49:24 -04:00
John Mitchell
5b19cdcd00 update api browser stdout colors to be consistent w tower 2016-05-05 16:32:29 -04:00
John Mitchell
89b97d40ad update cyan 2016-05-05 16:18:31 -04:00
AlanCoding
92efb2d317 exception for dual-name questions and more tests 2016-05-05 15:53:35 -04:00
AlanCoding
91c7dee2f6 Add error messages in permission denied cases 2016-05-05 14:31:17 -04:00
Matthew Jones
5895b3a343 Refactor Notification's naming
Notifier -> NotificationTemplate
notifier -> notification_template
2016-05-05 13:53:46 -04:00
Matthew Jones
675b596fb0 Perform json and yaml validation on Job Templates 2016-05-05 12:00:12 -04:00
Alan Rominger
0d2e0b47eb Merge pull request #1808 from AlanCoding/1285_system_jobs_err
Raise PermissionDenied error for navigable API links
2016-05-05 08:19:32 -04:00
AlanCoding
87093ec8af reject runtime extra vars that are strings 2016-05-04 19:45:23 -04:00
Wayne Witzel III
102c6940cb Merge pull request #1814 from wwitzel3/issue-1772
No longer attempt to serialize old permission data.
2016-05-04 17:28:56 -04:00
AlanCoding
18f48875c7 change 404 errors to PermissionDenied for those with links 2016-05-04 16:14:21 -04:00
Wayne Witzel III
c4ffab8a3e Attempted fix of issue 1772 2016-05-04 15:31:37 -04:00
Matthew Jones
6dad37d556 Add periods to various serializer validation errs 2016-05-04 14:52:24 -04:00
Matthew Jones
b8ed6c079e Strip newlines from eula at UI team's request 2016-05-04 14:42:10 -04:00
Alan Rominger
bcff14e5e3 Merge pull request #1762 from AlanCoding/1759_launch_fields
Launch endpoints as shortcut to JT data
2016-05-03 16:10:47 -04:00
AlanCoding
01ec242b61 display all JT defaults for UI purposes 2016-05-03 15:54:45 -04:00
Wayne Witzel III
a710f2d2cd Ensure access_list returns a 404 when object is not found 2016-05-03 15:01:23 -04:00
Akita Noek
1b0e3719f1 Merge pull request #1785 from anoek/1689
Filter out a users own Admin Role from their roles list
2016-05-03 14:40:33 -04:00
Akita Noek
7e445124a4 Merge pull request #1783 from anoek/1713
Special case handling for team access list to prevent "read" role shwing up as a direct team role
2016-05-03 14:40:25 -04:00
Matthew Jones
eb714ce67f Merge pull request #1777 from matburt/ad_hoc_extra_vars
Implement extra vars on ad-hoc commands
2016-05-03 14:35:19 -04:00
Wayne Witzel III
5291420a17 Merge pull request #1771 from wwitzel3/issue-1608
Implement ActivityStream for RBAC Roles
2016-05-03 14:30:50 -04:00
Akita Noek
1f49b475bd Filter out a users own Admin Role from their roles list
As per a UI request, we don't want to show the implicitly defined
'admin_role' roles that get created for every user so they can manage
themselves. These roles exist for every user, and the only members of
those roles are the users themselves, so it's a pretty boring role. We
also don't want to allow for anyone to be removed from their own admin
role, so hiding this is probably a good thing all around to avoid
confusion and clutter.

 Fixes #1689
2016-05-03 13:52:34 -04:00
Akita Noek
410a9dd45f Special case handlign for team access list to prevent "read" role showing up as a direct team role
Fixes #1713
2016-05-03 13:42:14 -04:00
Wayne Witzel III
f60ce147f4 Add role to summarizable fields 2016-05-03 12:06:17 -04:00
Matthew Jones
a17bb5677b Implement extra vars on ad-hoc commands 2016-05-03 12:02:27 -04:00
Akita Noek
e237648f4c Merge pull request #1761 from anoek/migration-fixes
Migration fixes
2016-05-03 11:32:38 -04:00
AlanCoding
3e680329fd add additional launch endpoint fields for UI 2016-05-02 16:41:19 -04:00
Wayne Witzel III
573bc07c5d Merge pull request #1738 from wwitzel3/issue-1714
prevent a user from removing their own admin_role
2016-05-02 10:09:41 -04:00
Wayne Witzel III
18e42d442e Merge pull request #1734 from wwitzel3/team-roles-access
ensure change access for adding team roles
2016-05-02 10:09:08 -04:00
Wayne Witzel III
86ea6b115f Merge pull request #1739 from wwitzel3/issue-1531
fixing non-unique query combining
2016-05-02 10:08:18 -04:00
Akita Noek
29b55fa04d Moved access control from credential add view to access.py
as it should have always been. This messes up being able to post to
api/v1/users/:n/credentials and api/v1/teams/:n/credentials without
specifyign the user/team id in the post body, but looking at the old
code it looks like this might have always been the case, so whatevs..

This fixes a old v new access.py test "failure", and is better anyways..
2016-04-29 17:27:14 -04:00
Alan Rominger
293db554c5 Merge pull request #1662 from AlanCoding/1407_credential_post_fields_rebased
Allow credentials to be created in UI touch up documentation for owners
2016-04-29 12:33:59 -04:00
Wayne Witzel III
47561978d2 fixing non-unique query combining 2016-04-28 16:11:12 -04:00
Wayne Witzel III
1e432126cd prevent a user from removing their own admin_role 2016-04-28 15:39:56 -04:00
Wayne Witzel III
ef8eb712c6 added tests to assert team roles attach/unattach permissions, removed previous flawed fix 2016-04-28 15:15:26 -04:00
Wayne Witzel III
b6bbd4fa77 ensure change access for adding team roles 2016-04-28 13:43:49 -04:00
AlanCoding
a2c2ccab20 credential owner fields changed to PK related field to solve 1671 2016-04-28 10:16:37 -04:00
Chris Meyers
526e04a00c Merge pull request #1690 from chrismeyersfsu/fix-labels_disassociate
delete label on last disassociate
2016-04-27 13:21:14 -04:00
Chris Meyers
e449237d8a move delete last unattach mixin to job template sublabel 2016-04-27 12:07:57 -04:00
Chris Meyers
1925742da1 delete orphaned labels when jt or j deleted 2016-04-27 09:46:34 -04:00