-
Notifications
You must be signed in to change notification settings - Fork 363
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Space application supporter can access deployments endpoints #2323
Space application supporter can access deployments endpoints #2323
Conversation
abb65b7
to
1be9a5f
Compare
Co-authored-by: Philipp Thun <[email protected]>
Co-authored-by: Philipp Thun <[email protected]>
Co-authored-by: Philipp Thun <[email protected]>
Co-authored-by: Philipp Thun <[email protected]>
Co-authored-by: Philipp Thun <[email protected]>
1be9a5f
to
978e404
Compare
I've rebased this off of main. |
Looks good! One callout: we made a decision midway through the planning to not allow the space application supporter access to any of the |
This reverts commit a50aef2. See pull request cloudfoundry#2323 for discussion on the decision not to grant the space application supporter access to PATCH endpoints that only allow users to update metadata/labels: cloudfoundry#2323 (comment)
See pull request cloudfoundry#2323 for discussion on the decision not to grant the space application supporter access to PATCH endpoints that only allow users to update metadata/labels: cloudfoundry#2323 (comment)
@monamohebbi Thanks for this. I've made that change (and also an extra commit updating the docs accordingly). I've just asked around at the SAP Control Plane team, which is who I'm working with at the moment, and we believe nobody in the team has permissions to update the user stories in the GitHub backlog for creating this role. Would it be possible to update these stories to remove "PATCH" from the description for endpoints that we know only let you update metadata/labels? This will help prevent colleagues from accidentally implementing this for other endpoints when we do that work. Thanks! |
AcceptanceBehavior Check
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Changes Requested:
PATCH /v3/deployments/:guid
PATCH /v3/deployments/:guid
Looks like this endpoint got overlooked, but it is part of the issue associated with this PR.
Rereading the comments in this PR, looks like this was intentional. I'm going to edit the original issue to remove the PATCH
endpoint.
Code Check
Similar to a comment I made on a previous PR from y'all, if we could shift the request spec to utilize the shared examples that would be great! It'll help us reduce the code duplication. Let me know if you need further clarification on what that might look like.
Docs Check
Minor detail, but we've been trying to alphabetize the roles. If we could reorder the placement of the 'Space Application Supporter' in the list accordingly that would be great!
Co-authored-by: Philipp Thun <[email protected]>
Co-authored-by: Philipp Thun <[email protected]>
Co-authored-by: Philipp Thun <[email protected]>
Co-authored-by: Philipp Thun <[email protected]>
Co-authored-by: Philipp Thun <[email protected]>
This reverts commit a50aef2. See pull request cloudfoundry#2323 for discussion on the decision not to grant the space application supporter access to PATCH endpoints that only allow users to update metadata/labels: cloudfoundry#2323 (comment)
See pull request cloudfoundry#2323 for discussion on the decision not to grant the space application supporter access to PATCH endpoints that only allow users to update metadata/labels: cloudfoundry#2323 (comment)
Hi @sweinstein22, this endpoint is a bit confusing to me because of the following points:
Maybe I'm missing something to get this picture right. Anyways I'd be glad if you could shed some light on this. I think it makes sense to clarify how this endpoint is supposed to work from a permissions point of view, before we continue adding another role in. |
Hi @svkrieger, Returning an empty list for non-permitted users is in accordance with out style guide. We believe the reasoning for this is, from an implementation standpoint, we filter on user provided queries and the user's given permissions together in the fetcher classes and return the results to the controller. In the controller, where we would throw a Given this, if the org auditor is technically permitted to use the list endpoint but not the view endpoint, this would mean the org auditor would receive an empty set when using the list endpoint. No roles not being included in the link you provided is a good thing to call out. I think this is an error that shows up in many places in our documentation. I think updating that documentation would ideally be a part of this PR. The shared org comment you linked is probably a copy paste error as you mentioned. Shared orgs are a concept linked to shared domains, and given this exact comment can be found in the We haven't had the chance to look too much at the format of this spec. Reformatting our specs has been an ongoing chore that we've been working on along with these space supporter issues. We hope to make sure that the specs are formatted in a reasonable way before merging in any new code. Hope this answers your questions! @monamohebbi & Galen |
Hi @will-gant , just wanted to check in on this as it's been a bit. Let us know if you have further questions, thanks! |
…sap-contributions/cloud_controller_ng into space-application-supporter-deployments
@sweinstein22 Apologies for the delay - I've been on leave for the past week. My colleague @svkrieger, who has also been working on this, has also has several days off over the same period. I'm looking at this today, and will hopefully get it sorted! |
No worries @will-gant ! Just wanted to make sure you weren't blocked on something on our end. Hope you enjoyed your time off! |
Signed-off-by: Aftab Alam <[email protected]>
Signed-off-by: Aftab Alam <[email protected]>
Signed-off-by: Aftab Alam <[email protected]>
Signed-off-by: Aftab Alam <[email protected]>
9b51b49
to
cb06089
Compare
@sweinstein22 Aw, thanks! I've just pushed my best attempt at doing this with the shared examples. Let me know what you think :) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks great! Thanks so much for making the adjustments, and thanks for the PR!
…undry#2323) * Allow space application supporter to create, update, get, list, and cancel deployments Co-authored-by: Philipp Thun <[email protected]> Co-authored-by: Sven Krieger <[email protected]> Co-authored-by Aftab Alam <[email protected]>
…undry#2323) * Allow space application supporter to create, update, get, list, and cancel deployments Co-authored-by: Philipp Thun <[email protected]> Co-authored-by: Sven Krieger <[email protected]> Co-authored-by Aftab Alam <[email protected]>
…undry#2323) * Allow space application supporter to create, update, get, list, and cancel deployments Co-authored-by: Philipp Thun <[email protected]> Co-authored-by: Sven Krieger <[email protected]> Co-authored-by Aftab Alam <[email protected]>
* Allow space application supporter to create, update, get, list, and cancel deployments Co-authored-by: Philipp Thun <[email protected]> Co-authored-by: Sven Krieger <[email protected]> Co-authored-by Aftab Alam <[email protected]>
…undry#2323) * Allow space application supporter to create, update, get, list, and cancel deployments Co-authored-by: Philipp Thun <[email protected]> Co-authored-by: Sven Krieger <[email protected]> Co-authored-by Aftab Alam <[email protected]>
* Allow space application supporter to create, update, get, list, and cancel deployments Co-authored-by: Philipp Thun <[email protected]> Co-authored-by: Sven Krieger <[email protected]> Co-authored-by Aftab Alam <[email protected]>
Closes #2218
I have reviewed the contributing guide
I have viewed, signed, and submitted the Contributor License Agreement
I have made this pull request to the
main
branchI have run all the unit tests using
bundle exec rake
[] I have run CF Acceptance Tests