Jeff Bradberry
8836ed44ce
Construct an ID for Gitlab webhooks
...
by taking the SHA1 of the body of the webhook request.
2019-09-30 13:26:03 -04:00
Jeff Bradberry
992c414737
Launch a Job or WorkflowJob based on the incoming webhook
2019-09-30 13:26:03 -04:00
Jeff Bradberry
66a8186995
Get the webhook receiver views to work at least minimally
2019-09-30 13:26:03 -04:00
Jeff Bradberry
fa15696ffe
Remove some dead comments
2019-09-30 13:26:03 -04:00
Jeff Bradberry
82a0dc0024
Cycle or unset the webhook key if the webhook service changes
...
Also, tests.
2019-09-30 13:26:03 -04:00
Jeff Bradberry
d4b20b7340
Update tests to use the expect keyword argument for get() and post()
2019-09-30 13:26:03 -04:00
Jeff Bradberry
c0ad5a7768
Expose the webhook_service and webhook_credential fields in the serializer
...
webhook_credential specifically as a summary field.
2019-09-30 13:26:03 -04:00
Jeff Bradberry
d9ac291115
Add some RBAC oriented tests for the webhook secret key view
2019-09-30 13:26:03 -04:00
Jeff Bradberry
6b86cf6e86
Revert to using the explicit dispatch to the appropriate model
...
since passing the model class at url include time doesn't work.
2019-09-30 13:26:03 -04:00
Jeff Bradberry
771ef275d4
Include a check for the webhook_key related resource url
...
in the tests for JTs and WFJTs.
2019-09-30 13:26:03 -04:00
Jeff Bradberry
2310413dc0
Fix problem with the tests by dynamically setting the view model
...
instead of using a model @property or lookup method.
2019-09-30 13:26:03 -04:00
Jeff Bradberry
edb9d6b16c
Add the related link to the webhook secrets view to the serializers
2019-09-30 13:26:03 -04:00
Jeff Bradberry
7973a18103
Switch to using a permission class for the webhook secret key view
...
This view is now behaving as expected for superuser, org admin, JT
admin, JT exec, and org member roles.
2019-09-30 13:23:27 -04:00
Jeff Bradberry
747a2283d6
Attempt to get the RBAC right on the webhook secret key view
2019-09-30 13:23:27 -04:00
Jeff Bradberry
9d269d59d6
Add an api view for obtaining and rotating the webhook key
2019-09-30 13:23:27 -04:00
Jeff Bradberry
b0c530402f
Move the webhook url include from the top level urlconf to the JT/WFJT urlconfs
2019-09-30 13:23:26 -04:00
Jeff Bradberry
50a54c9214
Forbid access to the webhook receiver views if webhook_key is not set
2019-09-30 13:23:26 -04:00
Jeff Bradberry
8f97dbf781
Hook in the webhook receiver views into the urlconf
2019-09-30 13:23:26 -04:00
Jeff Bradberry
a7a99ed141
Beginnings of the API views for the webhook receivers
2019-09-30 13:23:26 -04:00
Jeff Bradberry
d6116490c6
Add the webhook-specific fields to JobTemplate and WorkflowJobTemplate
2019-09-30 13:23:26 -04:00
Bill Nottingham
fc70d8b321
Adjust help message; we're no longer using the insights client
2019-09-30 12:17:46 -04:00
mabashian
3182197287
Makes notification toggles more responsive on smaller screens.
2019-09-27 15:48:00 -04:00
beeankha
9ed4e1682d
Remove redundant whitespace
2019-09-27 15:48:00 -04:00
beeankha
5aa6a94710
Enable approval notifications to show up at...
...
...workflow jobs notifications endpoint
2019-09-27 15:48:00 -04:00
beeankha
96689f45c8
Update approval notification message
2019-09-27 15:48:00 -04:00
beeankha
ce6a276e1f
Update migration file
2019-09-27 15:48:00 -04:00
beeankha
8eb1484129
Update migration file, change status syntax
2019-09-27 15:48:00 -04:00
beeankha
1ddf9fd1ed
Fix up models, clean up code re: PR comments
2019-09-27 15:48:00 -04:00
beeankha
17a8e08d93
Add unit tests for approval notifications
2019-09-27 15:48:00 -04:00
beeankha
f835c8650b
Enable org-level approval notifications to work.
2019-09-27 15:48:00 -04:00
beeankha
aa5a4d42c7
Enable email notifications to work,
...
...and customize default messages
2019-09-27 15:48:00 -04:00
beeankha
57fd6b7280
Set default messages for approval notifications
2019-09-27 15:48:00 -04:00
mabashian
7eb7aad491
Adds approval toggles to wf and org notif lists
2019-09-27 15:48:00 -04:00
beeankha
e2b8adcd09
Remove notification endpoint from approvals list
2019-09-27 15:48:00 -04:00
beeankha
13450fdbf9
Set up approval notifications to send
2019-09-27 15:48:00 -04:00
beeankha
6be2d84adb
Add endpoints for approval node notifications
...
...and also add a migration file.
2019-09-27 15:48:00 -04:00
softwarefactory-project-zuul[bot]
d2a5af44de
Merge pull request #4792 from mabashian/relaunch-jobs
...
Add relaunch to Jobs list and Job Details views
Reviewed-by: https://github.com/apps/softwarefactory-project-zuul
2019-09-27 19:18:48 +00:00
mabashian
518a25430d
Adjust unit test after adding conditional render to modals in launch button component
2019-09-27 13:47:13 -04:00
Ryan Petrello
73c3b8849b
lower the isolated poll interval in development
...
(waiting 30s is annoying)
2019-09-27 11:26:10 -04:00
mabashian
bb474b0797
Only render the launch modals if errors are present. This addresses a local unit test failure.
2019-09-27 11:05:23 -04:00
mabashian
af90a78df5
Extends LaunchButton component to include support for relaunching. Adds relaunch button to jobs list and job detail view(s).
2019-09-27 10:37:46 -04:00
softwarefactory-project-zuul[bot]
de68de7f9a
Merge pull request #4735 from AlanCoding/come_as_you_are
...
Copy git submodules as-is to avoid auth and path errors
Reviewed-by: https://github.com/apps/softwarefactory-project-zuul
2019-09-27 13:49:16 +00:00
softwarefactory-project-zuul[bot]
04ba7aaf89
Merge pull request #4835 from ryanpetrello/plural-credentials
...
Update the "Credential" label on JT forms to say "Credentials"
Reviewed-by: https://github.com/apps/softwarefactory-project-zuul
2019-09-27 13:16:50 +00:00
AlanCoding
454f76c066
Copy git submodules as-is to avoid auth and path errors
2019-09-27 09:03:47 -04:00
Ryan Petrello
870b76dc59
Update the "Credential" label on JT forms to say "Credentials"
...
see: https://github.com/ansible/awx/issues/4831
2019-09-27 08:44:04 -04:00
Buymov Ivan
f2676064fd
Fix error with rejoining node to cluster after lost connection to postgres
2019-09-27 01:17:27 -04:00
Ryan Petrello
d30d51d72c
fix a bug that prevents launch-time passphrases w/ cred plugins
...
with the advent of credential plugins there's no way for us to *actually
know* the RSA key value at the time the credential is _created_, because
the order of operations is:
1. Create the credential with a specified passphrase
2. Associate a new dynamic inventory source pointed at some third party
provider (hashi, cyberark, etc...)
this commit removes the code that warns you about an extraneous
passphrase (if you don't specify a private key)
additionally, the code for determining whether or not a credential
_requires_ a password/phrase at launch time has been updated to test
private key validity based on the *actual* value from the third party
provider
see: https://github.com/ansible/awx/issues/4791
2019-09-26 17:14:25 -04:00
softwarefactory-project-zuul[bot]
693e588a25
Merge pull request #4659 from bcoca/nicer_error
...
better error message on missing runner
Reviewed-by: https://github.com/apps/softwarefactory-project-zuul
2019-09-26 20:52:33 +00:00
softwarefactory-project-zuul[bot]
0f42782feb
Merge pull request #4804 from AlexSCorey/4616-4766-JTAddBtn-ToolBarCheckBox
...
ToolBar checkbox checks, JT Add Button closes and Test Clean up
Reviewed-by: https://github.com/apps/softwarefactory-project-zuul
2019-09-26 20:41:27 +00:00
Alex Corey
90cac2ec35
fix lint errors
2019-09-26 16:11:34 -04:00