Add Notification Admin

This commit is contained in:
Wayne Witzel III
2018-02-02 16:51:10 +00:00
parent fbece6bdde
commit 9e7bd55579
5 changed files with 55 additions and 35 deletions

View File

@@ -2218,6 +2218,7 @@ class NotificationTemplateAccess(BaseAccess):
def filtered_queryset(self): def filtered_queryset(self):
return self.model.objects.filter( return self.model.objects.filter(
Q(organization__in=Organization.objects.filter(notification_admin_role__members=self.user)) |
Q(organization__in=self.user.admin_of_organizations) | Q(organization__in=self.user.admin_of_organizations) |
Q(organization__in=self.user.auditor_of_organizations) Q(organization__in=self.user.auditor_of_organizations)
).distinct() ).distinct()
@@ -2226,22 +2227,22 @@ class NotificationTemplateAccess(BaseAccess):
if self.user.is_superuser or self.user.is_system_auditor: if self.user.is_superuser or self.user.is_system_auditor:
return True return True
if obj.organization is not None: if obj.organization is not None:
if self.user in obj.organization.admin_role or self.user in obj.organization.auditor_role: if self.user in obj.organization.notification_admin_role or self.user in obj.organization.auditor_role:
return True return True
return False return False
@check_superuser @check_superuser
def can_add(self, data): def can_add(self, data):
if not data: if not data:
return Organization.accessible_objects(self.user, 'admin_role').exists() return Organization.accessible_objects(self.user, 'notification_admin_role').exists()
return self.check_related('organization', Organization, data, mandatory=True) return self.check_related('organization', Organization, data, role_field='notification_admin_role', mandatory=True)
@check_superuser @check_superuser
def can_change(self, obj, data): def can_change(self, obj, data):
if obj.organization is None: if obj.organization is None:
# only superusers are allowed to edit orphan notification templates # only superusers are allowed to edit orphan notification templates
return False return False
return self.check_related('organization', Organization, data, obj=obj, mandatory=True) return self.check_related('organization', Organization, data, obj=obj, role_field='notification_admin_role', mandatory=True)
def can_admin(self, obj, data): def can_admin(self, obj, data):
return self.can_change(obj, data) return self.can_change(obj, data)
@@ -2253,7 +2254,7 @@ class NotificationTemplateAccess(BaseAccess):
def can_start(self, obj, validate_license=True): def can_start(self, obj, validate_license=True):
if obj.organization is None: if obj.organization is None:
return False return False
return self.user in obj.organization.admin_role return self.user in obj.organization.notification_admin_role
class NotificationAccess(BaseAccess): class NotificationAccess(BaseAccess):
@@ -2265,6 +2266,7 @@ class NotificationAccess(BaseAccess):
def filtered_queryset(self): def filtered_queryset(self):
return self.model.objects.filter( return self.model.objects.filter(
Q(notification_template__organization__in=Organization.objects.filter(notification_admin_role__members=self.user)) |
Q(notification_template__organization__in=self.user.admin_of_organizations) | Q(notification_template__organization__in=self.user.admin_of_organizations) |
Q(notification_template__organization__in=self.user.auditor_of_organizations) Q(notification_template__organization__in=self.user.auditor_of_organizations)
).distinct() ).distinct()

View File

@@ -35,6 +35,11 @@ class Migration(migrations.Migration):
name='workflow_admin_role', name='workflow_admin_role',
field=awx.main.fields.ImplicitRoleField(null=b'True', on_delete=django.db.models.deletion.CASCADE, parent_role=b'admin_role', related_name='+', to='main.Role'), field=awx.main.fields.ImplicitRoleField(null=b'True', on_delete=django.db.models.deletion.CASCADE, parent_role=b'admin_role', related_name='+', to='main.Role'),
), ),
migrations.AddField(
model_name='organization',
name='notification_admin_role',
field=awx.main.fields.ImplicitRoleField(null=b'True', on_delete=django.db.models.deletion.CASCADE, parent_role=b'admin_role', related_name='+', to='main.Role'),
),
migrations.AlterField( migrations.AlterField(
model_name='credential', model_name='credential',
name='admin_role', name='admin_role',
@@ -63,6 +68,6 @@ class Migration(migrations.Migration):
migrations.AlterField( migrations.AlterField(
model_name='organization', model_name='organization',
name='member_role', name='member_role',
field=awx.main.fields.ImplicitRoleField(null=b'True', on_delete=django.db.models.deletion.CASCADE, parent_role=[b'admin_role', b'project_admin_role', b'inventory_admin_role', b'workflow_admin_role'], related_name='+', to='main.Role'), field=awx.main.fields.ImplicitRoleField(null=b'True', on_delete=django.db.models.deletion.CASCADE, parent_role=[b'admin_role', b'project_admin_role', b'inventory_admin_role', b'workflow_admin_role', b'notification_admin_role'], related_name='+', to='main.Role'),
), ),
] ]

View File

@@ -55,11 +55,16 @@ class Organization(CommonModel, NotificationFieldsModel, ResourceMixin, CustomVi
workflow_admin_role = ImplicitRoleField( workflow_admin_role = ImplicitRoleField(
parent_role='admin_role', parent_role='admin_role',
) )
notification_admin_role = ImplicitRoleField(
parent_role='admin_role',
)
auditor_role = ImplicitRoleField( auditor_role = ImplicitRoleField(
parent_role='singleton:' + ROLE_SINGLETON_SYSTEM_AUDITOR, parent_role='singleton:' + ROLE_SINGLETON_SYSTEM_AUDITOR,
) )
member_role = ImplicitRoleField( member_role = ImplicitRoleField(
parent_role=['admin_role', 'project_admin_role', 'inventory_admin_role', 'workflow_admin_role'] parent_role=['admin_role', 'project_admin_role',
'inventory_admin_role', 'workflow_admin_role',
'notification_admin_role']
) )
read_role = ImplicitRoleField( read_role = ImplicitRoleField(
parent_role=['member_role', 'auditor_role'], parent_role=['member_role', 'auditor_role'],

View File

@@ -33,37 +33,39 @@ ROLE_SINGLETON_SYSTEM_ADMINISTRATOR='system_administrator'
ROLE_SINGLETON_SYSTEM_AUDITOR='system_auditor' ROLE_SINGLETON_SYSTEM_AUDITOR='system_auditor'
role_names = { role_names = {
'system_administrator' : _('System Administrator'), 'system_administrator': _('System Administrator'),
'system_auditor' : _('System Auditor'), 'system_auditor': _('System Auditor'),
'adhoc_role' : _('Ad Hoc'), 'adhoc_role': _('Ad Hoc'),
'admin_role' : _('Admin'), 'admin_role': _('Admin'),
'project_admin_role' : _('Project Admin'), 'project_admin_role': _('Project Admin'),
'inventory_admin_role' : _('Inventory Admin'), 'inventory_admin_role': _('Inventory Admin'),
'credential_admin_role': _('Credential Admin'), 'credential_admin_role': _('Credential Admin'),
'workflow_admin_role' : _('Workflow Admin'), 'workflow_admin_role': _('Workflow Admin'),
'auditor_role' : _('Auditor'), 'notification_admin_role': _('Notification Admin'),
'execute_role' : _('Execute'), 'auditor_role': _('Auditor'),
'member_role' : _('Member'), 'execute_role': _('Execute'),
'read_role' : _('Read'), 'member_role': _('Member'),
'update_role' : _('Update'), 'read_role': _('Read'),
'use_role' : _('Use'), 'update_role': _('Update'),
'use_role': _('Use'),
} }
role_descriptions = { role_descriptions = {
'system_administrator' : _('Can manage all aspects of the system'), 'system_administrator': _('Can manage all aspects of the system'),
'system_auditor' : _('Can view all settings on the system'), 'system_auditor': _('Can view all settings on the system'),
'adhoc_role' : _('May run ad hoc commands on an inventory'), 'adhoc_role': _('May run ad hoc commands on an inventory'),
'admin_role' : _('Can manage all aspects of the %s'), 'admin_role': _('Can manage all aspects of the %s'),
'project_admin_role' : _('Can manage all projects of the %s'), 'project_admin_role': _('Can manage all projects of the %s'),
'inventory_admin_role' : _('Can manage all inventories of the %s'), 'inventory_admin_role': _('Can manage all inventories of the %s'),
'credential_admin_role': _('Can manage all credentials of the %s'), 'credential_admin_role': _('Can manage all credentials of the %s'),
'workflow_admin_role' : _('Can manage all workflows of the %s'), 'workflow_admin_role': _('Can manage all workflows of the %s'),
'auditor_role' : _('Can view all settings for the %s'), 'notification_admin_role': _('Can manage all notifications of the %s'),
'execute_role' : _('May run the %s'), 'auditor_role': _('Can view all settings for the %s'),
'member_role' : _('User is a member of the %s'), 'execute_role': _('May run the %s'),
'read_role' : _('May view settings for the %s'), 'member_role': _('User is a member of the %s'),
'update_role' : _('May update project or inventory or group using the configured source update system'), 'read_role': _('May view settings for the %s'),
'use_role' : _('Can use the %s in a job template'), 'update_role': _('May update project or inventory or group using the configured source update system'),
'use_role': _('Can use the %s in a job template'),
} }

View File

@@ -32,6 +32,11 @@ def test_notification_template_get_queryset_orgadmin(notification_template, user
notification_template.organization.admin_role.members.add(user('admin', False)) notification_template.organization.admin_role.members.add(user('admin', False))
assert access.get_queryset().count() == 1 assert access.get_queryset().count() == 1
@pytest.mark.django_db
def test_notification_template_get_queryset_notificationadmin(notification_template, user):
access = NotificationTemplateAccess(user('admin', False))
notification_template.organization.notification_admin_role.members.add(user('admin', False))
assert access.get_queryset().count() == 1
@pytest.mark.django_db @pytest.mark.django_db
def test_notification_template_get_queryset_org_auditor(notification_template, org_auditor): def test_notification_template_get_queryset_org_auditor(notification_template, org_auditor):
@@ -59,12 +64,13 @@ def test_notification_template_access_superuser(notification_template_factory):
@pytest.mark.django_db @pytest.mark.django_db
def test_notification_template_access_admin(organization_factory, notification_template_factory): @pytest.mark.parametrize("role", ["present.admin_role:admin", "present.notification_admin_role:admin"])
def test_notification_template_access_admin(role, organization_factory, notification_template_factory):
other_objects = organization_factory('other') other_objects = organization_factory('other')
present_objects = organization_factory('present', present_objects = organization_factory('present',
users=['admin'], users=['admin'],
notification_templates=['test-notification'], notification_templates=['test-notification'],
roles=['present.admin_role:admin']) roles=[role])
notification_template = present_objects.notification_templates.test_notification notification_template = present_objects.notification_templates.test_notification
other_org = other_objects.organization other_org = other_objects.organization