diff --git a/src/registrar/assets/js/get-gov.js b/src/registrar/assets/js/get-gov.js
index aa186dc31..1cb1e6828 100644
--- a/src/registrar/assets/js/get-gov.js
+++ b/src/registrar/assets/js/get-gov.js
@@ -1717,7 +1717,7 @@ document.addEventListener('DOMContentLoaded', function() {
role="button"
id="button-toggle-delete-domain-alert-${request.id}"
href="#toggle-delete-domain-alert-${request.id}"
- class="usa-button text-secondary usa-button--unstyled text-no-underline late-loading-modal-trigger margin-top-2 visible-mobile"
+ class="usa-button text-secondary usa-button--unstyled text-no-underline late-loading-modal-trigger margin-top-2 visible-mobile-flex"
aria-controls="toggle-delete-domain-alert-${request.id}"
data-open-modal
>
@@ -1726,7 +1726,7 @@ document.addEventListener('DOMContentLoaded', function() {
Delete ${domainName}
-
+
-
- {% if has_domains_portfolio_permission %}
+ {% if has_any_domains_portfolio_permission %}
{% url 'domains' as url %}
{% else %}
{% url 'no-portfolio-domains' as url %}
@@ -77,7 +77,7 @@
- {% elif has_requests_portfolio_permission %}
+ {% elif has_any_requests_portfolio_permission %}
{% url 'domain-requests' as url %}
Domain requests
diff --git a/src/registrar/tests/test_models.py b/src/registrar/tests/test_models.py
index cdf008c57..26f4c381f 100644
--- a/src/registrar/tests/test_models.py
+++ b/src/registrar/tests/test_models.py
@@ -1334,7 +1334,7 @@ class TestUser(TestCase):
@patch.multiple(
User,
has_view_all_domains_portfolio_permission=lambda self, portfolio: True,
- has_requests_portfolio_permission=lambda self, portfolio: True,
+ has_any_requests_portfolio_permission=lambda self, portfolio: True,
has_edit_request_portfolio_permission=lambda self, portfolio: True,
)
def test_portfolio_role_summary_view_only_admin_and_domain_requestor(self):
@@ -1344,7 +1344,7 @@ class TestUser(TestCase):
@patch.multiple(
User,
has_view_all_domains_portfolio_permission=lambda self, portfolio: True,
- has_requests_portfolio_permission=lambda self, portfolio: True,
+ has_any_requests_portfolio_permission=lambda self, portfolio: True,
)
def test_portfolio_role_summary_view_only_admin(self):
# Test if the user is recognized as a View-only admin
@@ -1354,7 +1354,7 @@ class TestUser(TestCase):
User,
has_base_portfolio_permission=lambda self, portfolio: True,
has_edit_request_portfolio_permission=lambda self, portfolio: True,
- has_domains_portfolio_permission=lambda self, portfolio: True,
+ has_any_domains_portfolio_permission=lambda self, portfolio: True,
)
def test_portfolio_role_summary_member_domain_requestor_domain_manager(self):
# Test if the user has 'Member', 'Domain requestor', and 'Domain manager' roles
@@ -1370,7 +1370,7 @@ class TestUser(TestCase):
@patch.multiple(
User,
has_base_portfolio_permission=lambda self, portfolio: True,
- has_domains_portfolio_permission=lambda self, portfolio: True,
+ has_any_domains_portfolio_permission=lambda self, portfolio: True,
)
def test_portfolio_role_summary_member_domain_manager(self):
# Test if the user has 'Member' and 'Domain manager' roles
@@ -1546,8 +1546,8 @@ class TestUser(TestCase):
portfolio, _ = Portfolio.objects.get_or_create(creator=self.user, organization_name="Hotel California")
- user_can_view_all_domains = self.user.has_domains_portfolio_permission(portfolio)
- user_can_view_all_requests = self.user.has_requests_portfolio_permission(portfolio)
+ user_can_view_all_domains = self.user.has_any_domains_portfolio_permission(portfolio)
+ user_can_view_all_requests = self.user.has_any_requests_portfolio_permission(portfolio)
self.assertFalse(user_can_view_all_domains)
self.assertFalse(user_can_view_all_requests)
@@ -1558,8 +1558,8 @@ class TestUser(TestCase):
additional_permissions=[UserPortfolioPermissionChoices.VIEW_ALL_DOMAINS],
)
- user_can_view_all_domains = self.user.has_domains_portfolio_permission(portfolio)
- user_can_view_all_requests = self.user.has_requests_portfolio_permission(portfolio)
+ user_can_view_all_domains = self.user.has_any_domains_portfolio_permission(portfolio)
+ user_can_view_all_requests = self.user.has_any_requests_portfolio_permission(portfolio)
self.assertTrue(user_can_view_all_domains)
self.assertFalse(user_can_view_all_requests)
@@ -1568,16 +1568,16 @@ class TestUser(TestCase):
portfolio_permission.save()
portfolio_permission.refresh_from_db()
- user_can_view_all_domains = self.user.has_domains_portfolio_permission(portfolio)
- user_can_view_all_requests = self.user.has_requests_portfolio_permission(portfolio)
+ user_can_view_all_domains = self.user.has_any_domains_portfolio_permission(portfolio)
+ user_can_view_all_requests = self.user.has_any_requests_portfolio_permission(portfolio)
self.assertTrue(user_can_view_all_domains)
self.assertTrue(user_can_view_all_requests)
UserDomainRole.objects.get_or_create(user=self.user, domain=self.domain, role=UserDomainRole.Roles.MANAGER)
- user_can_view_all_domains = self.user.has_domains_portfolio_permission(portfolio)
- user_can_view_all_requests = self.user.has_requests_portfolio_permission(portfolio)
+ user_can_view_all_domains = self.user.has_any_domains_portfolio_permission(portfolio)
+ user_can_view_all_requests = self.user.has_any_requests_portfolio_permission(portfolio)
self.assertTrue(user_can_view_all_domains)
self.assertTrue(user_can_view_all_requests)
diff --git a/src/registrar/tests/test_views_portfolio.py b/src/registrar/tests/test_views_portfolio.py
index c5d1a9830..2e7bb978e 100644
--- a/src/registrar/tests/test_views_portfolio.py
+++ b/src/registrar/tests/test_views_portfolio.py
@@ -502,7 +502,7 @@ class TestPortfolio(WebTest):
self.client.force_login(self.user)
response = self.client.get(reverse("home"), follow=True)
- self.assertFalse(self.user.has_domains_portfolio_permission(response.wsgi_request.session.get("portfolio")))
+ self.assertFalse(self.user.has_any_domains_portfolio_permission(response.wsgi_request.session.get("portfolio")))
self.assertEqual(response.status_code, 200)
self.assertContains(response, "You aren")
@@ -517,7 +517,7 @@ class TestPortfolio(WebTest):
# Test the domains page - this user should have access
response = self.client.get(reverse("domains"))
- self.assertTrue(self.user.has_domains_portfolio_permission(response.wsgi_request.session.get("portfolio")))
+ self.assertTrue(self.user.has_any_domains_portfolio_permission(response.wsgi_request.session.get("portfolio")))
self.assertEqual(response.status_code, 200)
self.assertContains(response, "Domain name")
@@ -528,7 +528,7 @@ class TestPortfolio(WebTest):
# Test the domains page - this user should have access
response = self.client.get(reverse("domains"))
- self.assertTrue(self.user.has_domains_portfolio_permission(response.wsgi_request.session.get("portfolio")))
+ self.assertTrue(self.user.has_any_domains_portfolio_permission(response.wsgi_request.session.get("portfolio")))
self.assertEqual(response.status_code, 200)
self.assertContains(response, "Domain name")
permission.delete()
diff --git a/src/registrar/views/domain.py b/src/registrar/views/domain.py
index 003f8dd0d..511c55228 100644
--- a/src/registrar/views/domain.py
+++ b/src/registrar/views/domain.py
@@ -175,7 +175,7 @@ class DomainView(DomainBaseView):
If particular views allow permissions, they will need to override
this function."""
portfolio = self.request.session.get("portfolio")
- if self.request.user.has_domains_portfolio_permission(portfolio):
+ if self.request.user.has_any_domains_portfolio_permission(portfolio):
if Domain.objects.filter(id=pk).exists():
domain = Domain.objects.get(id=pk)
if domain.domain_info.portfolio == portfolio:
diff --git a/src/registrar/views/utility/mixins.py b/src/registrar/views/utility/mixins.py
index 48c0ccb61..24483b6ef 100644
--- a/src/registrar/views/utility/mixins.py
+++ b/src/registrar/views/utility/mixins.py
@@ -433,7 +433,7 @@ class PortfolioDomainsPermission(PortfolioBasePermission):
up from the portfolio's primary key in self.kwargs["pk"]"""
portfolio = self.request.session.get("portfolio")
- if not self.request.user.has_domains_portfolio_permission(portfolio):
+ if not self.request.user.has_any_domains_portfolio_permission(portfolio):
return False
return super().has_permission()
@@ -450,7 +450,7 @@ class PortfolioDomainRequestsPermission(PortfolioBasePermission):
up from the portfolio's primary key in self.kwargs["pk"]"""
portfolio = self.request.session.get("portfolio")
- if not self.request.user.has_requests_portfolio_permission(portfolio):
+ if not self.request.user.has_any_requests_portfolio_permission(portfolio):
return False
return super().has_permission()