Skip to content
This repository has been archived by the owner on Aug 2, 2019. It is now read-only.

We shouldn't need the same permissions for a PUT which create or modify a record same for models. #114

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

Natim
Copy link
Member

@Natim Natim commented Nov 21, 2014

No description provided.

@Natim Natim changed the title Le mask ne doit pas être le même pour un PUT qui créé que pour un PUT qui modifie le record. We shouldn't need the same permissions for a PUT which create or modify a record. Jul 24, 2014
@Natim Natim changed the title We shouldn't need the same permissions for a PUT which create or modify a record. We shouldn't need the same permissions for a PUT which create or modify a record same for models. Jul 24, 2014
@almet
Copy link
Member

almet commented Jul 24, 2014

I believe this is no longer valid. Can we close?

@Natim
Copy link
Member Author

Natim commented Jul 24, 2014

No it is still valid. This is an ACL inconsistency AMA.

If you make a PUT on a create you should just have the create_record, if you make a PUT on a erase, you should need the create_record and delete_record (same for models)

@leplatrem leplatrem modified the milestones: 1.1, 1.0 Sep 15, 2014
@leplatrem
Copy link
Contributor

Should we check something like this in records.put view ? https://github.com/spiral-project/daybed/blob/1.0.1/daybed/views/records.py#L34

@Natim
Copy link
Member Author

Natim commented Sep 16, 2014

Yes I think so
Le 16 sept. 2014 15:26, "Mathieu Leplatre" [email protected] a
écrit :

Should we check something like this in records.put view ?
https://github.com/spiral-project/daybed/blob/1.0.1/daybed/views/records.py#L34


Reply to this email directly or view it on GitHub
#114 (comment)
.

@Natim
Copy link
Member Author

Natim commented Nov 21, 2014

I had this bug with https://github.com/spiral-project/daybed-cloud-share, I am going to fix it.

@Natim
Copy link
Member Author

Natim commented Nov 21, 2014

r? @leplatrem

@leplatrem
Copy link
Contributor

I'm not sure about what is done in this PR actually :(

Could explicit your specifications in the tests please ?

I would have expected something like :

  • test that a user without creation permission cannot create a record with PUT
  • test that a user without update permission can create a record with PUT

And since the title says "same for models", I would have expected the same for models :)

Please note that views permissions tests are not supposed to be functional test suites, something in RecordsViewsTest would be more efficient, since not executed several times with different backend etc.

@Natim
Copy link
Member Author

Natim commented Nov 21, 2014

Ok I will rework this tests.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants