Skip to content

chazzlabs/ozp-backend

 
 

Repository files navigation

ozp-backend

Django-based backend API for the OZONE Platform (OZP). For those who just want to get OZP (Center, HUD, Webtop, IWC) up and running, see the quickstart of the ozp-ansible project.

3rd Party Services

Travis-CI Build Status

Quantified Code Code Issues

Background

ozp-backend replaces ozp-rest as the backend for Center, HUD, Webtop, and IWC. Notable differences include:

  • Python vs. Java/Groovy
  • Django, Django Rest Framework vs. Grails, JAX-RS
  • Postgres vs. MySQL

Getting Started

The recommended approach is to use the vagrant box referenced at the beginning of this README, which will create a production-esque deployment of OZP:

  • Postgres (vs. SQLite)
  • PKI (vs. HTTP Basic Auth)
  • Use of external authorization service
  • Enable HTTPS (via nginx reverse proxy)
  • Served via Gunicorn (vs. Django development server)

To serve the application on your host machine with minimal external dependencies, do the following:

  1. Remove psycopg2 from requirements.txt (so that Postgres won't be required)
  2. Enable HTTP Basic Auth and disable PKI authentication. In settings.py, REST_FRAMEWORK.DEFAULT_AUTHENTICATION_CLASSES should be set to 'rest_framework.authentication.BasicAuthentication'
  3. Disable the authorization service. In settings.py, set OZP.USE_AUTH_SERVER to False
  4. In settings.py, set OZP.DEMO_APP_ROOT to localhost:8000 (or wherever the django app will be served at)

Then, do the following:

  1. Install Python 3.4.3. Python can be installed by downloading the appropriate files here. Note that Python 3.4 includes both pip and venv, a built-in replacement for the virtualenv package
  2. Create a new python environment using python 3.4.x. First, create a new directory where this environment will live, for example, in ~/python_envs/ozp. Now create a new environment there: python3.4 -m venv ENV (where ENV is the path you used above)
  3. Active the new environment: source ENV/bin/activate
  4. Install the necessary dependencies into this python environment: pip install -r requirements.txt
  5. Run the server: ./restart_clean_dev_server.sh

Swagger documentation for the api is available at http://localhost:8000/docs/ Use username wsmith password password when prompted for authentication info

There's also the admin interface at http://localhost:8000/admin (username: wsmith, password: password)

Releasing

Run python release.py to generate a tarball with Wheels for the application and all of its dependencies. See release.py for details

For Developers

Understanding this project requires knowing a small-medium amount of Django and a large amount of Django Rest Framework (DRF). From Django itself:

  • Object-relational mapper (ORM)
  • Authentication
  • manage.py utility (testing, database migration)
  • Logging
  • Settings

Most of the URLs and Views are done with DRF, and very little is done with templating, forms, and the admin site

Plugins

TODO Add documentation

  • How does it work
  • How do make a new plugin

Pep8

Pep8 is the Style Guide for Python Code

pep8 ozp ozpcenter ozpiwc plugins plugins_util --ignore=E501,E123,E128,E121,E124,E711,E402 --exclude=ozpcenter/scripts/* --show-source
autopep8 . -r --diff --ignore errors=E501,E123,E128,E121,E124  --max-line-length=5000

Serializers

Serialization = Python obj -> JSON

Deserialization = JSON -> Python obj

DRF does not have a built-in, defacto way of specifying different serializers for handling input on a request vs output on a Response. Sometimes this is acceptable, but often times the two structures are not the same. For instance, some fields may be auto-generated on the server when a POST is made (so they shouldn't be part of the POST Request data that will be deserialized), but a GET request should return a Response that includes this information. For simple cases like this, Serializer fields can be marked as read_only or write_only (read_only fields will not become part of the serializer's validated_data). If more control than this is needed (e.g. very different input and output formats), the get_serializer_class() method can be overridden in the View and selected dynamically based on request.method (POST, GET, etc).

For details regarding input vs output serializers:

Sometimes it might not be clear where the Serializer classes should live for nested objects. For example, the listing resource needs to serialize the nested Agency model - should that Agency serializer live in the listing resource package or in the agency package? Generally speaking, if the serializer is very generic, it should live in its respective resource package. If instead it's highly customized (and thus unlikely to be used by other resources), it should live with its nested resource.

One annoyance with nested serializers is that, if doing a create/POST, DRF assumes that each nested resource should also be created. This causes validation errors to be raised when doing things like creating a new listing with an existing category, listing type, etc. The way around that problem is to explicitly remove all validation on any nested serializer fields that have unique constraints. For example, for a serializer with a title field:

extra_kwargs = {
    'title': {'validators': []}
}

Because we don't want to remove the validator for the base resource (only when it's used in a nested fashion), some of the more complicated resources (namely Listing) have lots of nested serializers that are identical to their non-nested counterparts save for the removal of the unique field validators

Model Access and Caching

model_access.py files should be used to encapsulate more complex database queries and business logic (as opposed to placing it in Views and Serializers). These methods are easier to use in sample data generators, easier to test, and allows the complexity of Django Rest Framework to stay largely separate from the core application logic

Memcache is not currently used, but this is also the layer to implement object/query caching, such as:

data = cache.get('stuff')
if data is None:
    data = list(Stuff.objects.all())
    cache.set('stuff', data)
return data

Note that we also need logic to invalidate specific caches when resources are modified. For example, if a Listing is updated, all cached items referring/using that listing's data should be invalidated. By far and large, this logic is not yet in place, so enabling the cache will likely lead to unexpected results. In addition, the requirement to support 'tailored views' reduces the value of caching, since most queries must be filtered against a user's particular access controls

Models

Regarding __str__(): It’s important to add __str__() methods to your models, not only for your own convenience when dealing with the interactive prompt, but also because objects’ representations are used throughout Django’s automatically-generated admin. Note that on Python 2, __unicode__() should be defined instead.

By default, fields cannot be null or blank

Some of the access control logic necessary to support tailored views lives in models.py as custom models.Manager classes (Reviews, Listings, ListingActivities, and Images)

Views

We generally prefer to use class-based views and ViewSets (ModelViewSets in particular) just because it's less code (assuming you don't require a significant amount of customization)

The use of the convenience method get_object_or_404 breaks the encapsulation of database queries in the model_access files (and prevents caching). That might be something to look at later on.

URLs

All resource endpoints are defined in the resource's respective urls.py in ozpcenter/api/. ozpcenter.urls collects all of these endpoints, where they are given the api/ prefix in the global urls.py

DRF uses a browsable API, meaning that you can go to localhost:8000/api/metadata/ (for instance) in your browser. In general, the Swagger documentation is the recommended way to view and interact with the API.

All URLs are currently set to use a trailing /

Authentication and Authorization

Overview

Authentication and authorization is based on the default django.contrib.auth system built into Django, with numerous customizations.

The default User model is extended by giving the Profile model a one-to-one relationship with the django.contrib.auth.models.User model, as described here

The default User model has the following fields:

  • username
  • first_name
  • last_name
  • email
  • password
  • groups (many-to-many relationship to Group)
  • user_permissions (many-to-many relationship to Permission)
  • is_staff (Boolean. Designates whether this user can access the admin site)
  • is_active (Boolean. Designates whether this user account should be considered active)
  • is_superuser (Boolean. Designates that this user has all permissions without explicitly assigning them)
  • last_login (a datetime of the user's last login)
  • date_joined (a datetime designating when the account was created)

Of these fields:

  • first_name and last_name are not used
  • is_superuser is always set to False
  • is_staff is set to True for Org Stewards and Apps Mall Stewards
  • password is only used in development. On production, client SSL certs are used, and so password is set to XXXXXXXX

Groups are used to categorize users as Users, Org Stewards, Apps Mall Stewards, etc. These groups are used to partially control access to various resources (for example, Users cannot make modifications to the Categories). That said, the majority of 'access control' cannot be accomplished by creating generic permissions and groups. For example, an Org Steward should be able to approve a Listing only for organizations to which they belong. Furthermore, any resources (Listings, Images) that have a specific access_control associated with them must be hidden from users (regardless of role/group) without the appropriate level of access.

Django Permissions are used to control access to the Admin site. By default, add, change, and delete permissions are added to each model in the application. The notion of separate permissions for these three operations don't make much sense for this application - for now, the default permissions will be left alone, but the Permissions infrastructure won't be used much beyond that. As previously stated, it is not possible to create generic permissions that can be statically assigned to users, like 'can_approve_listing', since the allowance of such an action depends on the object (model instance), not just the model type. Therefore, custom object-level permissions will typically be used to control access to specific resource instances (for both read and write operations). For list queries where multiple resources are returned, these object-level permission checks are not used. Instead, filters and custom querysets are used to ensure only the appropriate data is returned.

Authentication

The app currently supports two forms of authentication - HTTP Basic Auth and PKI (client SSL authentication). HTTP Basic Auth is used for development purposes only. PKI authentication is implemented in ozpcenter/auth/pkiauth.py. The method of authentication to use is controlled by REST_FRAMEWORK.DEFAULT_AUTHENTICATION_CLASSES in settings.py

Tests

Generally speaking, each resource (listing, agency, profile, etc) may have two types of tests: business logic tests and API tests. The former typically tests code in model_access.py files, which is pure Python code and independent of Django or any "web stuff". The latter API tests, on the other hand, actually make HTTP requests using special testing clients and factories, and are more like end-to-end or integration tests

Database

System uses Postgres in Production and Sqlite3 in Development

Performance Debugging

We check the performance of a Database model using shell_plus command for manage.py.

python manage.py shell_plus --print-sql
# Shell Plus Model Imports
from corsheaders.models import CorsModel
from django.contrib.admin.models import LogEntry
from django.contrib.auth.models import Group, Permission, User
from django.contrib.contenttypes.models import ContentType
from django.contrib.sessions.models import Session
from ozpcenter.models import Agency, ApplicationLibraryEntry, Category, ChangeDetail, Contact, ContactType, DocUrl, Image, ImageType, Intent, Listing, ListingActivity, ListingType, Notification, Profile, Review, Screenshot, Tag
from ozpiwc.models import DataResource
# Shell Plus Django Imports
from django.utils import timezone
from django.conf import settings
from django.core.cache import cache
from django.core.urlresolvers import reverse
from django.db.models import Avg, Count, F, Max, Min, Sum, Q, Prefetch
from django.db import transaction
Python 3.4.3 (default, Feb 25 2016, 10:08:19)
[GCC 4.8.2] on linux
Type "help", "copyright", "credits" or "license" for more information.
(InteractiveConsole)
>>>

Getting all Profiles (without any optimizations)

>>> Profile.objects.all()
QUERY = 'SELECT "ozpcenter_profile"."id", "ozpcenter_profile"."display_name", "ozpcenter_profile"."bio", "ozpcenter_profile"."center_tour_flag", "ozpcenter_profile"."hud_tour_flag", "ozpcenter_profile"."webtop_tour_flag", "ozpcenter_profile"."dn", "ozpcenter_profile"."issuer_dn", "ozpcenter_profile"."auth_expires", "ozpcenter_profile"."access_control", "ozpcenter_profile"."user_id" FROM "ozpcenter_profile" LIMIT 21' - PARAMS = ()

Execution time: 0.000324s [Database: default]

QUERY = 'SELECT "auth_user"."id", "auth_user"."password", "auth_user"."last_login", "auth_user"."is_superuser", "auth_user"."username", "auth_user"."first_name", "auth_user"."last_name", "auth_user"."email", "auth_user"."is_staff", "auth_user"."is_active", "auth_user"."date_joined" FROM "auth_user" WHERE "auth_user"."id" = %s' - PARAMS = (1,)

Execution time: 0.000207s [Database: default]

QUERY = 'SELECT "auth_user"."id", "auth_user"."password", "auth_user"."last_login", "auth_user"."is_superuser", "auth_user"."username", "auth_user"."first_name", "auth_user"."last_name", "auth_user"."email", "auth_user"."is_staff", "auth_user"."is_active", "auth_user"."date_joined" FROM "auth_user" WHERE "auth_user"."id" = %s' - PARAMS = (2,)

Execution time: 0.000203s [Database: default]

QUERY = 'SELECT "auth_user"."id", "auth_user"."password", "auth_user"."last_login", "auth_user"."is_superuser", "auth_user"."username", "auth_user"."first_name", "auth_user"."last_name", "auth_user"."email", "auth_user"."is_staff", "auth_user"."is_active", "auth_user"."date_joined" FROM "auth_user" WHERE "auth_user"."id" = %s' - PARAMS = (3,)

Execution time: 0.000202s [Database: default]

QUERY = 'SELECT "auth_user"."id", "auth_user"."password", "auth_user"."last_login", "auth_user"."is_superuser", "auth_user"."username", "auth_user"."first_name", "auth_user"."last_name", "auth_user"."email", "auth_user"."is_staff", "auth_user"."is_active", "auth_user"."date_joined" FROM "auth_user" WHERE "auth_user"."id" = %s' - PARAMS = (4,)

Execution time: 0.000124s [Database: default]

QUERY = 'SELECT "auth_user"."id", "auth_user"."password", "auth_user"."last_login", "auth_user"."is_superuser", "auth_user"."username", "auth_user"."first_name", "auth_user"."last_name", "auth_user"."email", "auth_user"."is_staff", "auth_user"."is_active", "auth_user"."date_joined" FROM "auth_user" WHERE "auth_user"."id" = %s' - PARAMS = (5,)

Execution time: 0.000101s [Database: default]

QUERY = 'SELECT "auth_user"."id", "auth_user"."password", "auth_user"."last_login", "auth_user"."is_superuser", "auth_user"."username", "auth_user"."first_name", "auth_user"."last_name", "auth_user"."email", "auth_user"."is_staff", "auth_user"."is_active", "auth_user"."date_joined" FROM "auth_user" WHERE "auth_user"."id" = %s' - PARAMS = (6,)

Execution time: 0.000145s [Database: default]

QUERY = 'SELECT "auth_user"."id", "auth_user"."password", "auth_user"."last_login", "auth_user"."is_superuser", "auth_user"."username", "auth_user"."first_name", "auth_user"."last_name", "auth_user"."email", "auth_user"."is_staff", "auth_user"."is_active", "auth_user"."date_joined" FROM "auth_user" WHERE "auth_user"."id" = %s' - PARAMS = (7,)

Execution time: 0.000145s [Database: default]

QUERY = 'SELECT "auth_user"."id", "auth_user"."password", "auth_user"."last_login", "auth_user"."is_superuser", "auth_user"."username", "auth_user"."first_name", "auth_user"."last_name", "auth_user"."email", "auth_user"."is_staff", "auth_user"."is_active", "auth_user"."date_joined" FROM "auth_user" WHERE "auth_user"."id" = %s' - PARAMS = (8,)

Execution time: 0.000131s [Database: default]

QUERY = 'SELECT "auth_user"."id", "auth_user"."password", "auth_user"."last_login", "auth_user"."is_superuser", "auth_user"."username", "auth_user"."first_name", "auth_user"."last_name", "auth_user"."email", "auth_user"."is_staff", "auth_user"."is_active", "auth_user"."date_joined" FROM "auth_user" WHERE "auth_user"."id" = %s' - PARAMS = (9,)

Execution time: 0.000099s [Database: default]

QUERY = 'SELECT "auth_user"."id", "auth_user"."password", "auth_user"."last_login", "auth_user"."is_superuser", "auth_user"."username", "auth_user"."first_name", "auth_user"."last_name", "auth_user"."email", "auth_user"."is_staff", "auth_user"."is_active", "auth_user"."date_joined" FROM "auth_user" WHERE "auth_user"."id" = %s' - PARAMS = (10,)

Execution time: 0.000098s [Database: default]

QUERY = 'SELECT "auth_user"."id", "auth_user"."password", "auth_user"."last_login", "auth_user"."is_superuser", "auth_user"."username", "auth_user"."first_name", "auth_user"."last_name", "auth_user"."email", "auth_user"."is_staff", "auth_user"."is_active", "auth_user"."date_joined" FROM "auth_user" WHERE "auth_user"."id" = %s' - PARAMS = (11,)

Execution time: 0.000096s [Database: default]

[Profile: wsmith, Profile: julia, Profile: obrien, Profile: bigbrother, Profile: bigbrother2, Profile: aaronson, Profile: jones, Profile: rutherford, Profile: syme, Profile: tparsons, Profile: charrington]

Results: 12 database calls ( 1 + num of user = Database calls)

Getting all Profiles (with join)

>>> Profile.objects.all().select_related('user')
QUERY = 'SELECT "ozpcenter_profile"."id", "ozpcenter_profile"."display_name", "ozpcenter_profile"."bio", "ozpcenter_profile"."center_tour_flag", "ozpcenter_profile"."hud_tour_flag", "ozpcenter_profile"."webtop_tour_flag", "ozpcenter_profile"."dn", "ozpcenter_profile"."issuer_dn", "ozpcenter_profile"."auth_expires", "ozpcenter_profile"."access_control", "ozpcenter_profile"."user_id", "auth_user"."id", "auth_user"."password", "auth_user"."last_login", "auth_user"."is_superuser", "auth_user"."username", "auth_user"."first_name", "auth_user"."last_name", "auth_user"."email", "auth_user"."is_staff", "auth_user"."is_active", "auth_user"."date_joined" FROM "ozpcenter_profile" LEFT OUTER JOIN "auth_user" ON ( "ozpcenter_profile"."user_id" = "auth_user"."id" ) LIMIT 21' - PARAMS = ()

Execution time: 0.000472s [Database: default]

[Profile: wsmith, Profile: julia, Profile: obrien, Profile: bigbrother, Profile: bigbrother2, Profile: aaronson, Profile: jones, Profile: rutherford, Profile: syme, Profile: tparsons, Profile: charrington]

Results: 1 database call

Debugging Storefront Serializer

from rest_framework.response import Response
import ozpcenter.api.storefront.model_access as ma
import ozpcenter.api.storefront.serializers as se
import timeit
from django.test.client import RequestFactory

rf = RequestFactory()
get_request = rf.get('/hello/')

data = ma.get_storefront('bigbrother') # Database calls
sea = se.StorefrontSerializer(data,context={'request':get_request})
start = timeit.timeit(); r= Response(sea.data) ; end = timeit.timeit() # Database calls
print('Time: %s' % end)

API Documentation

There are a number of different documentation resources available, depending on what you're looking for.

DRF's Web Browsable API can be accessed by entering an endpoint in the browser, for example, <rootUrl>/api/profile/. Limitations:

  • the API Root doesn't have a list of all endpoints, so you need to know what you're looking for
  • although these pages include forms that could potentially support POST requests, they don't work very well, making the browsable API mostly useless for non-GET requests

Swagger docs are created via Django REST Swagger and served at <rootUrl>/docs/. Swagger makes it easy to see all of the endpoints available. Unlike the Browsable API docs, Swagger supports POST, PUT, and DELETE for most of the endpoints as well. Limitations:

  • POST api/image/ doesn't work from Swagger
  • some of the more complicated endpoints (like POST api/listing/) might not have forms that show all of the required and/or optional data that must or could be included in the request

Postman was used extensively during the API's development, and perhaps someday a Postman Collection of requests will be added to this repo

Logging

Currently, a single logger (ozp-center) is used throughout the application. See settings.py for details

Static and Media Files

Static files: JS, CSS, fonts, etc. Media files: images uploaded during app usage. Good explanation here

Static files include html/css/js for:

  • Django admin site
  • DRF Browsable API
  • Swagger docs

Media files (uploaded images) have associated access controls that require enforcement on a per-user basis. For that reason, media files are not served statically as they typically are, but instead served by the wsgi app itself

Scripts

The runscript command is installed via the django-extensions package and used to run scripts in the django context, just as you would get by running a set of commands in the shell using python manage.py shell. This can be used to run the script to populate the database with sample data: python manage.py runscript sample_data_generator. See the docs for details

API Input

All POST, PUT, and PATCH endpoints should use JSON encoded input as per this

Django Admin Site

The admin site is currently enabled in development (but will likely be disabled in production). It is accessible by both Apps Mall Stewards and Org Stewards. It has a number of limitations, including the inability to upload images (since images aren't stored in the database), and the fact that many operations (like editing reviews, approving listings, etc) should result in additional operations (like creating ListingActivity entries), but using the Admin interface directly bypasses that logic

Tracing REST Call

This section describes the life of a REST call. Developer should have knownledge of

Example trace for a GET Request for getting a user's profile for an authenticated user GET /api/self/profile

  • Entry Point for all REST Calls - ozp/urls.py. All /api/* calls get re-routed to ozpcenter/urls.py file
  • ozpcenter/urls.py add REST access points for all the views for the resources (agency, category, etc...)
    • This line of code url(r'', include('ozpcenter.api.profile.urls')) adds endpoints related to profile REST Calls
  • ozpcenter/api/profile/user.py - 'self/profile/' route points to current user's profile (Using CurrentUserViewSet in ozpcenter/api/profile/views.py)
  • ozpcenter/api/profile/views.py - For GET Request for this route it will call the 'retrieve' method
    • Before allowing user to access the endpoint it will make sure user is authenticated and has the correct role using 'permission_classes = (permissions.IsUser,)'

Controlling Access

Anonymous users have no access - all must have a valid username/password (dev) or valid certificate (production) to be granted any access

A few endpoints only provide READ access:

  • storefront
  • metadata

Several resources allow global READ access with WRITE access restricted to Apps Mall Stewards:

  • access_control
  • agency
  • category
  • contact_type
  • listing_type

image

  • global READ of metadata, but access_control enforcement on the images themselves
  • WRITE access allowed for all users, but the associated access_control level cannot exceed that of the current user

intent

  • global READ and WRITE allowed, but associated intent.icon.access_control cannot exceed that of the current user

library

  • READ access for ORG stewards and above
  • no WRITE access
  • READ and WRITE access to /self/library for the current user

notification

  • global READ access
  • WRITE access restricted to Org Stewards and above, unless the notification is associated with a Listing owned by this user
  • READ and WRITE access to /self/notification for the current user

profile

  • READ access restricted to Org Stewards and above
  • WRITE access restricted to the associated user (users cannot create, modify, or delete users other than themselves)
  • READ and WRITE access to /self/profile for the current user

listing

  • READ access restricted by agency (if listing is private) and by access_control level
  • WRITE access:
    • global WRITE access to create/modify/delete a listing in the draft or pending state ONLY
    • Org Stewards and above can change the state to published/approved or rejected, and change state to enabled/disabled, but must respect Organization (an Org Steward cannot modify a listing for which they are not the owner and/or not a member of the listing's agency)
    • global WRITE access to create/modify/delete reviews (item_comment) for any listing (must respect organization (if private) and access_control )
  • READ access to /self/listing to return listings that current user owns (?)

Permission Types

Permission Types Description
read The Read permission refers to a user's capability to read the contents of the endpoint.
write The Write permission refers to a user's capability to write contents to the endpoint.
access_control enforcement flag access_control level cannot exceed that of the current user

Access Control Matrix

<tr>
    <th>Endpoint</th>
    <th>Anonymous Users</th>
    <th>Self</th>
    <th>Other</th>
    <th>Org Steward</th>
    <th>Apps Mall Steward </th>
    <th>Notes</th>
</tr>

<tr>
    <td>access_control (?)</td>
    <td>---</td>
    <td>r--</td>
    <td></td>
    <td>r--</td>
    <td>rw-</td>
    <td></td>
</tr>

<tr>
    <td>agency</td>
    <td>---</td>
    <td>r--</td>
    <td>r--</td>
    <td>r--</td>
    <td>rw-</td>
    <td></td>
</tr>

<tr>
    <td>category</td>
    <td>---</td>
    <td>r--</td>
    <td>r--</td>
    <td>r--</td>
    <td>rw-</td>
    <td></td>
</tr>

<tr>
    <td>contact_type</td>
    <td>---</td>
    <td>r--</td>
    <td>r--</td>
    <td>r--</td>
    <td>rw-</td>
    <td></td>
</tr>

<tr>
    <td>image (metadata)</td>
    <td>---</td>
    <td>rwa</td>
    <td>rwa</td>
    <td>rwa</td>
    <td>rwa</td>
    <td>Read: access_control enforcement on the images themselves, Write: associated access_control level cannot exceed that of the current user</td>
</tr>

<tr>
    <td>intent</td>
    <td>---</td>
    <td>rwa</td>
    <td>rwa</td>
    <td>rwa</td>
    <td>rwa</td>
    <td>associated intent.icon.access_control cannot exceed that of the current user</td>
</tr>

<tr>
    <td>library</td>
    <td>---</td>
    <td>r--</td>
    <td>r--</td>
    <td>r--</td>
    <td>r--</td>
    <td></td>
</tr>

<tr>
    <td>library (self)</td>
    <td>---</td>
    <td>rw-</td>
    <td>---</td>
    <td>---</td>
    <td>---</td>
    <td></td>
</tr>

<tr>
    <td>listing</td>
    <td>---</td>
    <td>r-a</td>
    <td>---</td>
    <td>rw-</td>
    <td>rw-</td>
    <td></td>
</tr>

<tr>
    <td>listing (self)</td>
    <td>---</td>
    <td>rw-</td>
    <td>---</td>
    <td>---</td>
    <td>---</td>
    <td></td>
</tr>

<tr>
    <td>listing_type (?)</td>
    <td>---</td>
    <td>r--</td>
    <td>---</td>
    <td>r--</td>
    <td>rw-</td>
    <td></td>
</tr>

<tr>
    <td>notification</td>
    <td>---</td>
    <td>rw-</td>
    <td>r--</td>
    <td>rw-</td>
    <td>rw-</td>
    <td></td>
</tr>

<tr>
    <td>profile</td>
    <td>---</td>
    <td>---</td>
    <td>---</td>
    <td>rw-</td>
    <td>rw-</td>
    <td>users cannot create, modify, or delete users other than themselves</td>
</tr>

<tr>
    <td>profile (self route)</td>
    <td>---</td>
    <td>rw-</td>
    <td>---</td>
    <td>---</td>
    <td>---</td>
    <td>Self</td>
</tr>

<tr>
    <td>storefront</td>
    <td>---</td>
    <td>R--</td>
    <td>---</td>
    <td>---</td>
    <td>---</td>
    <td>Get Storefront for current user</td>
</tr>

<tr>
    <td>metadata</td>
    <td>---</td>
    <td>R--</td>
    <td>---</td>
    <td>---</td>
    <td>---</td>
    <td>Get metadata for current user</td>
</tr>
ozp-center Access Control

Domain Knowledge

The life of a submitted listing

Description on how listings get submitted. API endpoint: /api/listing

  • User: A User submits a listing
    • State
      • User: Submitted Listing
      • Org Steward: Needs Action (Approve Listing or return listing to user)
      • Admin: Pending
  • Org Steward: An Org Steward will approve user's listing or return back to the user with a comment)
    • State: If Approved
      • User: Pending
      • Org Steward: Org Approved
      • Admin: Needs Action
    • State: If Returned to the user
      • User: Needs Action
      • Org Steward: Returned
      • Admin: Returned
  • Admin: An admin will approve or reject listing for a org
    • State: If approved the listing will be published
      • User: Done
      • Org Steward: Org Approved
      • Admin: Admin Approved (Listing Published)
    • State: If rejected
      • User: Needs Action
      • Org Steward: Returned
      • Admin: Returned

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Python 98.2%
  • PLpgSQL 1.2%
  • Other 0.6%