Commit Graph

22 Commits

Author SHA1 Message Date
Jon
2d7335ff85 refactor(access): Rename model Organization -> Tenant
ref: #756 #505
2025-05-15 02:44:53 +09:30
Jon
0f5b2b6630 fix(core): Use object organization for ticket linked items
ref: #434 #441
2024-12-22 21:04:24 +09:30
Jon
6c95105528 refactor(access): Adjust permission check logic to use try..catch instead of gettattr due to base method throwing exception
if method is not overridden, the base class throws an exception instead of returning None

ref: #434 #441
2024-12-22 19:02:21 +09:30
Jon
40e2da5d8f fix(access): During permission checking also use get_serializer if avail
ref: #434 #441
2024-12-22 18:15:03 +09:30
Jon
116655cf2e fix(access): default to empty when attempting to get view attribute
ref: #434 #441
2024-12-22 17:45:39 +09:30
Jon
9b528c2c0a feat(access): Check if organization field is read-only during permission check
ref: #434 #441
2024-12-22 17:22:52 +09:30
Jon
47df49012d feat(access): Ability to specify parent model for permission to do
ref: #434 #441
2024-12-22 17:21:13 +09:30
Jon
56112b7ce8 revert(api): during permission checking, if model is an organization and the user is a manager allow access to the organization.
ref: #425 #426
2024-12-20 12:17:57 +09:30
Jon
e282d9967c feat(api): during permission checking, if model is an organization and the user is a manager allow access to the organization.
ref: #425 #426
2024-12-20 12:16:56 +09:30
Jon
2c934d4eaf fix(api): Ensure METHOD_NOT_ALLOWED exception is thrown
ref: #15 #248 #368 #374
2024-11-28 02:22:21 +09:30
Jon
7e92760340 fix(api): on permission check error, return authorized=false
ref: #248 #352
2024-11-28 02:22:00 +09:30
Jon
1f9070c420 fix(api): correct logic for permission check to use either queryset or get_queryset
ref:  #248 #345 #346
2024-11-28 02:20:27 +09:30
Jon
ad1b35dfc7 fix(api): during permission checking if request is HTTP/Options and user is authenticated, allow access
ref:  #345 #346
2024-11-28 02:19:21 +09:30
Jon
cf8014a26b fix(api): during permission checking dont attempt to access view obj if it doesn't exist
ref:  #345 #346
2024-11-28 02:18:26 +09:30
Jon
61f34876ed fix(core): Ensure user cant view tickets in orgs they are not part of
ref: #399
2024-11-28 01:40:24 +09:30
Jon
53489ec43b feat(access): add ability to fetch dynamic permissions
ref: #250 #96 #93 #95 #90 #263
2024-09-03 17:00:22 +09:30
Jon
3a9e4b29b3 fix(api): confirm HTTP method is allowed before permission check
return HTTP/405 for logged in user ONLY!!

!44 #159
2024-07-29 17:02:52 +09:30
Jon
505f4cfdd9 fix(api): ensure proper permission checking
!24 fixes #55
2024-06-11 22:18:50 +09:30
Jon
7fe1260308 feat(access): throw error if no organization added
!17
2024-06-03 14:28:12 +09:30
Jon
f41282d08b fix(api): check for org must by by type None
!16
2024-06-02 03:58:09 +09:30
Jon
c3f3c1247e chore(api): implement workaround for listview
until logic written, all listview access=true

!16
2024-06-02 01:39:23 +09:30
Jon
33b1a6c91d refactor(api): move permission check to mixin
!16
2024-06-02 01:03:05 +09:30