Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix #961 -- Move view detail permissions into project user policy #1071

Merged
merged 3 commits into from
Feb 16, 2017

Conversation

oliverroick
Copy link
Member

Proposed changes in this pull request

  • Fixes Permissions issue: Public user role within an organization #961: Moving view permissions for all entities into the project user policy description. Organisation members will not be able to view details for locations, relationships, parties and resources for any of the organisation's projects; unless they are a member of the project.
  • Change permission handling of PartiesList to make it consistent with locations listing: All parties are listed, not taking into account whether the user can view details or not.

When should this PR be merged

Anytime

Risks

None

Follow up actions

Permissions policies need to be reloaded when deploying (/cc @amplifi)

Checklist (for reviewing)

General

  • Is this PR explained thoroughly? All code changes must be accounted for in the PR description.
  • Is the PR labeled correctly? It should have the migration label if a new migration is added.
    Is the risk level assessment sufficient? The risks section should contain all risks that might be introduced with the PR and which actions we need to take to mitigate these risks. Possible risks are database migrations, new libraries that need to be installed or changes to deployment scripts.

Functionality

  • Are all requirements met? Compare implemented functionality with the requirements specification.
  • Does the UI work as expected? There should be no Javascript errors in the console; all resources should load. There should be no unexpected errors. Deliberately try to break the feature to find out if there are corner cases that are not handled.

Code

  • Do you fully understand the introduced changes to the code? If not ask for clarification, it might uncover ways to solve a problem in a more elegant and efficient way.
  • Does the PR introduce any inefficient database requests? Use the debug server to check for duplicate requests.
  • Are all necessary strings marked for translation? All strings that are exposed to users via the UI must be marked for translation.

Tests

  • Are there sufficient test cases? Ensure that all components are tested individually; models, forms, and serializers should be tested in isolation even if a test for a view covers these components.
  • If this is a bug fix, are tests for the issue in place There must be a test case for the bug to ensure the issue won’t regress. Make sure that the tests break without the new code to fix the issue.

Documentation

  • Are changes to the UI documented in the platform docs? If this PR introduces new platform site functionality or changes existing ones, the changes must be documented in the Cadasta Platform Documentation.
  • Are changes to the API documented in the API docs? If this PR introduces new API functionality or changes existing ones, the changes must be documented in the API docs.
  • Are reusable components documented? If this PR introduces components that are relevant to other developers (for instance a mixin for a view or a generic form) they should be documented in the Wiki.

Copy link
Contributor

@seav seav left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I have a couple of requests.

@@ -4,5 +4,35 @@
// additional permissions over those given to all users. This may
// change in the future. In particular, project users may be
// permitted access to projects that are normally private.
Copy link
Contributor

@seav seav Jan 24, 2017

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This comment is no longer correct ("...no additional permissions...").

@@ -84,8 +84,27 @@ def test_get_from_non_existent_project(self):
def test_get_with_unauthorized_user(self):
user = UserFactory.create()
response = self.request(user=user)
assert response.status_code == 302
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please add another assertion for the redirect URL.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This isn't necessary.

The redirect URL is based on the referrer and it is defined in core.mixins.PermissionRequiredMixin.handle_no_permission, which has appropriate tests.

@CLAassistant
Copy link

CLAassistant commented Jan 24, 2017

CLA assistant check
All committers have signed the CLA.

@amplifi amplifi self-assigned this Feb 7, 2017
@oliverroick oliverroick force-pushed the bugfix/#961 branch 2 times, most recently from 6b5d7b2 to 9ca5e01 Compare February 9, 2017 10:04
@seav
Copy link
Contributor

seav commented Feb 10, 2017

The updated changes are OK.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Permissions issue: Public user role within an organization
5 participants