Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

10.0 access restricted #66

Merged
merged 72 commits into from
Dec 5, 2017
Merged

Conversation

iledarn
Copy link

@iledarn iledarn commented Nov 6, 2017

No description provided.

@iledarn iledarn mentioned this pull request Nov 7, 2017
@yelizariev
Copy link
Collaborator

We probably need to imply Adminstration / Settings rights when user has access Allow add implied groups from settings, otherwise latter doesn't have sense, because user doens't have access to Settings. see https://github.com/it-projects-llc/access-addons/pull/66#discussion_r151070397

….group_system - if we allow to add grups from settings then we should give rights to open the settings menu
@yelizariev
Copy link
Collaborator

For squashed commit:

[ADD] set of updates


access_apps:

`1.2.0`
-------

- REF: rename "Show Apps Menu" to "Allow install apps"
- ADD: "Allow install apps only from settings"
- IMP: group "Show Apps Menu" and "Allow install apps only from settings" under "Apps access" security category
 

access_restricted:

`1.3.0`
-------

- [ADD] security group that allows increasing rights from settings menu (by checking ``res.config.settings`` 'group_XXX' boolean fields)

@yelizariev
Copy link
Collaborator

yelizariev commented Nov 16, 2017

  • write tests for new features of access_restricted (User has access -> no errors, User has not access -> error is raised)

@yelizariev
Copy link
Collaborator

yelizariev commented Nov 16, 2017

  • test that non-super admin don't see unavailable fields (groups)
    • emulate opening of res.user form -- repeat calls that browser does via xmlrpc when you open view manulally via interface
    • add new groups to users and open form again -- new group must be appeared at the form

Copy link
Collaborator

@yelizariev yelizariev left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

More tests are required

@iledarn
Copy link
Author

iledarn commented Nov 23, 2017

@yelizariev please check 329739d for > test that non-super admin don't see unavailable fields (groups)

@iledarn
Copy link
Author

iledarn commented Nov 29, 2017

@yelizariev

We probably need to imply Adminstration / Settings rights when user has access Allow add implied groups from settings, otherwise latter doesn't have sense, because user doens't have access to Settings

Implying the 'Administration / Settings' is excessive.
Access to see a specific settings menu may be given by a custom security group. In other words, we shouldn't give a user full administration privileges just to make him able to open a specific menu item

Ildar Nasyrov added 4 commits November 29, 2017 12:29
…for base.group_system - if we allow to add grups from settings then we should give rights to open the settings menu"

This reverts commit 866e84a.
@iledarn
Copy link
Author

iledarn commented Dec 4, 2017

@yelizariev ,

write tests for new features of access_restricted (User has access -> no errors, User has not access -> error is raised)

This is also done, please merge

self.assertTrue(test_config_settings._get_classified_fields()['group'])

test_config_settings.sudo(demo_user.id).execute()
self.assertTrue(self.env['res.users'].sudo(demo_user.id).has_group('base.group_user'))
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Add check that demo user doesn't have group_user before calling execute()

@iledarn
Copy link
Author

iledarn commented Dec 4, 2017

@yelizariev

@yelizariev yelizariev merged commit 540597a into itpp-labs:10.0 Dec 5, 2017
yelizariev pushed a commit that referenced this pull request May 13, 2024
close #66

> Made via .github/workflows/DINAR-PORT.yml
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants