From c8630b722dacf8599468615b9027bd22548e8418 Mon Sep 17 00:00:00 2001 From: DavidJForgeFlow Date: Tue, 1 Aug 2023 12:56:26 +0200 Subject: [PATCH 1/8] [ADD] repair_security --- repair_security/README.rst | 0 repair_security/__init__.py | 0 repair_security/__manifest__.py | 18 ++++++++++++ repair_security/readme/CONTRIBUTORS.rst | 1 + repair_security/readme/DESCRIPTION.rst | 1 + repair_security/security/ir.model.access.csv | 13 ++++++++ repair_security/security/repair_security.xml | 31 ++++++++++++++++++++ repair_security/views/repair_views.xml | 9 ++++++ 8 files changed, 73 insertions(+) create mode 100644 repair_security/README.rst create mode 100644 repair_security/__init__.py create mode 100644 repair_security/__manifest__.py create mode 100644 repair_security/readme/CONTRIBUTORS.rst create mode 100644 repair_security/readme/DESCRIPTION.rst create mode 100644 repair_security/security/ir.model.access.csv create mode 100644 repair_security/security/repair_security.xml create mode 100644 repair_security/views/repair_views.xml diff --git a/repair_security/README.rst b/repair_security/README.rst new file mode 100644 index 00000000..e69de29b diff --git a/repair_security/__init__.py b/repair_security/__init__.py new file mode 100644 index 00000000..e69de29b diff --git a/repair_security/__manifest__.py b/repair_security/__manifest__.py new file mode 100644 index 00000000..e03547a3 --- /dev/null +++ b/repair_security/__manifest__.py @@ -0,0 +1,18 @@ +# Copyright 2020 ForgeFlow S.L. +# License AGPL-3.0 or later (https://www.gnu.org/licenses/agpl.html). +{ + "name": "Repair Security", + "summary": "Create security groups for Repair", + "version": "15.0.1.0.0", + "category": "Manufacturing", + "website": "https://github.com/OCA/repair", + "author": "ForgeFlow S.L., Odoo Community Association (OCA)", + "license": "AGPL-3", + "installable": True, + "depends": ["repair"], + "data": [ + "security/repair_security.xml", + "security/ir.model.access.csv", + "views/repair_views.xml", + ], +} diff --git a/repair_security/readme/CONTRIBUTORS.rst b/repair_security/readme/CONTRIBUTORS.rst new file mode 100644 index 00000000..fcd08101 --- /dev/null +++ b/repair_security/readme/CONTRIBUTORS.rst @@ -0,0 +1 @@ +* David Jiménez diff --git a/repair_security/readme/DESCRIPTION.rst b/repair_security/readme/DESCRIPTION.rst new file mode 100644 index 00000000..e1681283 --- /dev/null +++ b/repair_security/readme/DESCRIPTION.rst @@ -0,0 +1 @@ +This module adds security groups fro the Repair App to make it more configurable and independent of Stock. diff --git a/repair_security/security/ir.model.access.csv b/repair_security/security/ir.model.access.csv new file mode 100644 index 00000000..83d8881f --- /dev/null +++ b/repair_security/security/ir.model.access.csv @@ -0,0 +1,13 @@ +id,name,model_id:id,group_id:id,perm_read,perm_write,perm_create,perm_unlink +access_repair_fee_user,Repair Fee user,repair.model_repair_fee,repair_security.group_repair_user,1,0,0,0 +access_repair_fee_manager,Repair Fee manager,repair.model_repair_fee,repair_security.group_repair_manager,1,1,1,1 +access_repair_user,Repair user,repair.model_repair_order,repair_security.group_repair_user,1,1,0,0 +access_repair_manager,Repair manager,repair.model_repair_order,repair_security.group_repair_manager,1,1,1,1 +access_repair_tag_user,Repair Tags user,repair.model_repair_tags,repair_security.group_repair_user,1,0,0,0 +access_repair_tag_manager,Repair Tags user,repair.model_repair_tags,repair_security.group_repair_manager,1,1,1,1 +access_repair_line_user,repair.line user,repair.model_repair_line,repair_security.group_repair_user,1,1,0,0 +access_repair_line_manager,repair.line user,repair.model_repair_line,repair_security.group_repair_manager,1,1,1,1 +access_account_tax_user,account.tax,account.model_account_tax,repair_security.group_repair_user,1,0,0,0 +access_account_tax_manager,account.tax,account.model_account_tax,repair_security.group_repair_manager,1,0,0,0 +access_repair_order_make_invoice_manager,access.repair.order.make_invoice,repair.model_repair_order_make_invoice,repair_security.group_repair_manager,1,1,1,1 +access_stock_warn_insufficient_qty_repair_manager,access.stock.warn.insufficient.qty.repair,repair.model_stock_warn_insufficient_qty_repair,repair_security.group_repair_manager,1,1,1,1 diff --git a/repair_security/security/repair_security.xml b/repair_security/security/repair_security.xml new file mode 100644 index 00000000..c83e4330 --- /dev/null +++ b/repair_security/security/repair_security.xml @@ -0,0 +1,31 @@ + + + + + + + + + + Repair + 25 + + + + User + + + + + Administrator + + + + + + diff --git a/repair_security/views/repair_views.xml b/repair_security/views/repair_views.xml new file mode 100644 index 00000000..70f9c566 --- /dev/null +++ b/repair_security/views/repair_views.xml @@ -0,0 +1,9 @@ + + + + + + From ac35cf361c8de677c250fb3b76eaefc271357a13 Mon Sep 17 00:00:00 2001 From: DavidJForgeFlow Date: Wed, 9 Aug 2023 12:47:34 +0200 Subject: [PATCH 2/8] [IMP] repair_security: add post_init_hooks to match previous permisions --- repair_security/__init__.py | 1 + repair_security/__manifest__.py | 1 + repair_security/hook.py | 12 ++++++++++++ 3 files changed, 14 insertions(+) create mode 100644 repair_security/hook.py diff --git a/repair_security/__init__.py b/repair_security/__init__.py index e69de29b..00164fb9 100644 --- a/repair_security/__init__.py +++ b/repair_security/__init__.py @@ -0,0 +1 @@ +from .hook import post_init_hook diff --git a/repair_security/__manifest__.py b/repair_security/__manifest__.py index e03547a3..25a12426 100644 --- a/repair_security/__manifest__.py +++ b/repair_security/__manifest__.py @@ -15,4 +15,5 @@ "security/ir.model.access.csv", "views/repair_views.xml", ], + "post_init_hook": "post_init_hook", } diff --git a/repair_security/hook.py b/repair_security/hook.py new file mode 100644 index 00000000..20d91715 --- /dev/null +++ b/repair_security/hook.py @@ -0,0 +1,12 @@ +from odoo import SUPERUSER_ID +from odoo.api import Environment + + +def post_init_hook(cr, _): + env = Environment(cr, SUPERUSER_ID, {}) + # Giving Repair Admin access to match the previous permissions. + env.ref("repair_security.group_repair_manager").write( + { + "users": [(6, 0, env.ref("stock.group_stock_user").users.ids)], + } + ) From b06e6d0cbfd7a1e63303ed73d2b0dc4991d75667 Mon Sep 17 00:00:00 2001 From: oca-ci Date: Mon, 21 Aug 2023 07:18:41 +0000 Subject: [PATCH 3/8] [UPD] Update repair_security.pot --- repair_security/i18n/repair_security.pot | 29 ++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 repair_security/i18n/repair_security.pot diff --git a/repair_security/i18n/repair_security.pot b/repair_security/i18n/repair_security.pot new file mode 100644 index 00000000..d06516c7 --- /dev/null +++ b/repair_security/i18n/repair_security.pot @@ -0,0 +1,29 @@ +# Translation of Odoo Server. +# This file contains the translation of the following modules: +# * repair_security +# +msgid "" +msgstr "" +"Project-Id-Version: Odoo Server 15.0\n" +"Report-Msgid-Bugs-To: \n" +"Last-Translator: \n" +"Language-Team: \n" +"MIME-Version: 1.0\n" +"Content-Type: text/plain; charset=UTF-8\n" +"Content-Transfer-Encoding: \n" +"Plural-Forms: \n" + +#. module: repair_security +#: model:res.groups,name:repair_security.group_repair_manager +msgid "Administrator" +msgstr "" + +#. module: repair_security +#: model:ir.module.category,name:repair_security.module_category_repair +msgid "Repair" +msgstr "" + +#. module: repair_security +#: model:res.groups,name:repair_security.group_repair_user +msgid "User" +msgstr "" From a903f8e7732992e3b8d764095e63495dff1d2a1d Mon Sep 17 00:00:00 2001 From: OCA-git-bot Date: Mon, 21 Aug 2023 07:34:31 +0000 Subject: [PATCH 4/8] [UPD] README.rst --- repair_security/README.rst | 70 +++ repair_security/static/description/index.html | 419 ++++++++++++++++++ 2 files changed, 489 insertions(+) create mode 100644 repair_security/static/description/index.html diff --git a/repair_security/README.rst b/repair_security/README.rst index e69de29b..93c0dc29 100644 --- a/repair_security/README.rst +++ b/repair_security/README.rst @@ -0,0 +1,70 @@ +=============== +Repair Security +=============== + +.. !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! + !! This file is generated by oca-gen-addon-readme !! + !! changes will be overwritten. !! + !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! + +.. |badge1| image:: https://img.shields.io/badge/maturity-Beta-yellow.png + :target: https://odoo-community.org/page/development-status + :alt: Beta +.. |badge2| image:: https://img.shields.io/badge/licence-AGPL--3-blue.png + :target: http://www.gnu.org/licenses/agpl-3.0-standalone.html + :alt: License: AGPL-3 +.. |badge3| image:: https://img.shields.io/badge/github-OCA%2Frepair-lightgray.png?logo=github + :target: https://github.com/OCA/repair/tree/15.0/repair_security + :alt: OCA/repair +.. |badge4| image:: https://img.shields.io/badge/weblate-Translate%20me-F47D42.png + :target: https://translation.odoo-community.org/projects/repair-15-0/repair-15-0-repair_security + :alt: Translate me on Weblate + +|badge1| |badge2| |badge3| |badge4| + +This module adds security groups fro the Repair App to make it more configurable and independent of Stock. + +**Table of contents** + +.. contents:: + :local: + +Bug Tracker +=========== + +Bugs are tracked on `GitHub Issues `_. +In case of trouble, please check there if your issue has already been reported. +If you spotted it first, help us smashing it by providing a detailed and welcomed +`feedback `_. + +Do not contact contributors directly about support or help with technical issues. + +Credits +======= + +Authors +~~~~~~~ + +* ForgeFlow S.L. + +Contributors +~~~~~~~~~~~~ + +* David Jiménez + +Maintainers +~~~~~~~~~~~ + +This module is maintained by the OCA. + +.. image:: https://odoo-community.org/logo.png + :alt: Odoo Community Association + :target: https://odoo-community.org + +OCA, or the Odoo Community Association, is a nonprofit organization whose +mission is to support the collaborative development of Odoo features and +promote its widespread use. + +This module is part of the `OCA/repair `_ project on GitHub. + +You are welcome to contribute. To learn how please visit https://odoo-community.org/page/Contribute. diff --git a/repair_security/static/description/index.html b/repair_security/static/description/index.html new file mode 100644 index 00000000..54eac3d7 --- /dev/null +++ b/repair_security/static/description/index.html @@ -0,0 +1,419 @@ + + + + + + +Repair Security + + + +
+

Repair Security

+ + +

Beta License: AGPL-3 OCA/repair Translate me on Weblate

+

This module adds security groups fro the Repair App to make it more configurable and independent of Stock.

+

Table of contents

+ +
+

Bug Tracker

+

Bugs are tracked on GitHub Issues. +In case of trouble, please check there if your issue has already been reported. +If you spotted it first, help us smashing it by providing a detailed and welcomed +feedback.

+

Do not contact contributors directly about support or help with technical issues.

+
+
+

Credits

+
+

Authors

+
    +
  • ForgeFlow S.L.
  • +
+
+
+

Contributors

+ +
+
+

Maintainers

+

This module is maintained by the OCA.

+Odoo Community Association +

OCA, or the Odoo Community Association, is a nonprofit organization whose +mission is to support the collaborative development of Odoo features and +promote its widespread use.

+

This module is part of the OCA/repair project on GitHub.

+

You are welcome to contribute. To learn how please visit https://odoo-community.org/page/Contribute.

+
+
+
+ + From e1a15b571ad669244cb89305ba69be654049cbcb Mon Sep 17 00:00:00 2001 From: OCA-git-bot Date: Mon, 21 Aug 2023 07:34:31 +0000 Subject: [PATCH 5/8] [ADD] icon.png --- repair_security/static/description/icon.png | Bin 0 -> 9455 bytes 1 file changed, 0 insertions(+), 0 deletions(-) create mode 100644 repair_security/static/description/icon.png diff --git a/repair_security/static/description/icon.png b/repair_security/static/description/icon.png new file mode 100644 index 0000000000000000000000000000000000000000..3a0328b516c4980e8e44cdb63fd945757ddd132d GIT binary patch literal 9455 zcmW++2RxMjAAjx~&dlBk9S+%}OXg)AGE&Cb*&}d0jUxM@u(PQx^-s)697TX`ehR4?GS^qbkof1cslKgkU)h65qZ9Oc=ml_0temigYLJfnz{IDzUf>bGs4N!v3=Z3jMq&A#7%rM5eQ#dc?k~! zVpnB`o+K7|Al`Q_U;eD$B zfJtP*jH`siUq~{KE)`jP2|#TUEFGRryE2`i0**z#*^6~AI|YzIWy$Cu#CSLW3q=GA z6`?GZymC;dCPk~rBS%eCb`5OLr;RUZ;D`}um=H)BfVIq%7VhiMr)_#G0N#zrNH|__ zc+blN2UAB0=617@>_u;MPHN;P;N#YoE=)R#i$k_`UAA>WWCcEVMh~L_ zj--gtp&|K1#58Yz*AHCTMziU1Jzt_jG0I@qAOHsk$2}yTmVkBp_eHuY$A9)>P6o~I z%aQ?!(GqeQ-Y+b0I(m9pwgi(IIZZzsbMv+9w{PFtd_<_(LA~0H(xz{=FhLB@(1&qHA5EJw1>>=%q2f&^X>IQ{!GJ4e9U z&KlB)z(84HmNgm2hg2C0>WM{E(DdPr+EeU_N@57;PC2&DmGFW_9kP&%?X4}+xWi)( z;)z%wI5>D4a*5XwD)P--sPkoY(a~WBw;E~AW`Yue4kFa^LM3X`8x|}ZUeMnqr}>kH zG%WWW>3ml$Yez?i%)2pbKPI7?5o?hydokgQyZsNEr{a|mLdt;X2TX(#B1j35xPnPW z*bMSSOauW>o;*=kO8ojw91VX!qoOQb)zHJ!odWB}d+*K?#sY_jqPdg{Sm2HdYzdEx zOGVPhVRTGPtv0o}RfVP;Nd(|CB)I;*t&QO8h zFfekr30S!-LHmV_Su-W+rEwYXJ^;6&3|L$mMC8*bQptyOo9;>Qb9Q9`ySe3%V$A*9 zeKEe+b0{#KWGp$F+tga)0RtI)nhMa-K@JS}2krK~n8vJ=Ngm?R!9G<~RyuU0d?nz# z-5EK$o(!F?hmX*2Yt6+coY`6jGbb7tF#6nHA zuKk=GGJ;ZwON1iAfG$E#Y7MnZVmrY|j0eVI(DN_MNFJmyZ|;w4tf@=CCDZ#5N_0K= z$;R~bbk?}TpfDjfB&aiQ$VA}s?P}xPERJG{kxk5~R`iRS(SK5d+Xs9swCozZISbnS zk!)I0>t=A<-^z(cmSFz3=jZ23u13X><0b)P)^1T_))Kr`e!-pb#q&J*Q`p+B6la%C zuVl&0duN<;uOsB3%T9Fp8t{ED108<+W(nOZd?gDnfNBC3>M8WE61$So|P zVvqH0SNtDTcsUdzaMDpT=Ty0pDHHNL@Z0w$Y`XO z2M-_r1S+GaH%pz#Uy0*w$Vdl=X=rQXEzO}d6J^R6zjM1u&c9vYLvLp?W7w(?np9x1 zE_0JSAJCPB%i7p*Wvg)pn5T`8k3-uR?*NT|J`eS#_#54p>!p(mLDvmc-3o0mX*mp_ zN*AeS<>#^-{S%W<*mz^!X$w_2dHWpcJ6^j64qFBft-o}o_Vx80o0>}Du;>kLts;$8 zC`7q$QI(dKYG`Wa8#wl@V4jVWBRGQ@1dr-hstpQL)Tl+aqVpGpbSfN>5i&QMXfiZ> zaA?T1VGe?rpQ@;+pkrVdd{klI&jVS@I5_iz!=UMpTsa~mBga?1r}aRBm1WS;TT*s0f0lY=JBl66Upy)-k4J}lh=P^8(SXk~0xW=T9v*B|gzIhN z>qsO7dFd~mgxAy4V?&)=5ieYq?zi?ZEoj)&2o)RLy=@hbCRcfT5jigwtQGE{L*8<@Yd{zg;CsL5mvzfDY}P-wos_6PfprFVaeqNE%h zKZhLtcQld;ZD+>=nqN~>GvROfueSzJD&BE*}XfU|H&(FssBqY=hPCt`d zH?@s2>I(|;fcW&YM6#V#!kUIP8$Nkdh0A(bEVj``-AAyYgwY~jB zT|I7Bf@%;7aL7Wf4dZ%VqF$eiaC38OV6oy3Z#TER2G+fOCd9Iaoy6aLYbPTN{XRPz z;U!V|vBf%H!}52L2gH_+j;`bTcQRXB+y9onc^wLm5wi3-Be}U>k_u>2Eg$=k!(l@I zcCg+flakT2Nej3i0yn+g+}%NYb?ta;R?(g5SnwsQ49U8Wng8d|{B+lyRcEDvR3+`O{zfmrmvFrL6acVP%yG98X zo&+VBg@px@i)%o?dG(`T;n*$S5*rnyiR#=wW}}GsAcfyQpE|>a{=$Hjg=-*_K;UtD z#z-)AXwSRY?OPefw^iI+ z)AXz#PfEjlwTes|_{sB?4(O@fg0AJ^g8gP}ex9Ucf*@_^J(s_5jJV}c)s$`Myn|Kd z$6>}#q^n{4vN@+Os$m7KV+`}c%4)4pv@06af4-x5#wj!KKb%caK{A&Y#Rfs z-po?Dcb1({W=6FKIUirH&(yg=*6aLCekcKwyfK^JN5{wcA3nhO(o}SK#!CINhI`-I z1)6&n7O&ZmyFMuNwvEic#IiOAwNkR=u5it{B9n2sAJV5pNhar=j5`*N!Na;c7g!l$ z3aYBqUkqqTJ=Re-;)s!EOeij=7SQZ3Hq}ZRds%IM*PtM$wV z@;rlc*NRK7i3y5BETSKuumEN`Xu_8GP1Ri=OKQ$@I^ko8>H6)4rjiG5{VBM>B|%`&&s^)jS|-_95&yc=GqjNo{zFkw%%HHhS~e=s zD#sfS+-?*t|J!+ozP6KvtOl!R)@@-z24}`9{QaVLD^9VCSR2b`b!KC#o;Ki<+wXB6 zx3&O0LOWcg4&rv4QG0)4yb}7BFSEg~=IR5#ZRj8kg}dS7_V&^%#Do==#`u zpy6{ox?jWuR(;pg+f@mT>#HGWHAJRRDDDv~@(IDw&R>9643kK#HN`!1vBJHnC+RM&yIh8{gG2q zA%e*U3|N0XSRa~oX-3EAneep)@{h2vvd3Xvy$7og(sayr@95+e6~Xvi1tUqnIxoIH zVWo*OwYElb#uyW{Imam6f2rGbjR!Y3`#gPqkv57dB6K^wRGxc9B(t|aYDGS=m$&S!NmCtrMMaUg(c zc2qC=2Z`EEFMW-me5B)24AqF*bV5Dr-M5ig(l-WPS%CgaPzs6p_gnCIvTJ=Y<6!gT zVt@AfYCzjjsMEGi=rDQHo0yc;HqoRNnNFeWZgcm?f;cp(6CNylj36DoL(?TS7eU#+ z7&mfr#y))+CJOXQKUMZ7QIdS9@#-}7y2K1{8)cCt0~-X0O!O?Qx#E4Og+;A2SjalQ zs7r?qn0H044=sDN$SRG$arw~n=+T_DNdSrarmu)V6@|?1-ZB#hRn`uilTGPJ@fqEy zGt(f0B+^JDP&f=r{#Y_wi#AVDf-y!RIXU^0jXsFpf>=Ji*TeqSY!H~AMbJdCGLhC) zn7Rx+sXw6uYj;WRYrLd^5IZq@6JI1C^YkgnedZEYy<&4(z%Q$5yv#Boo{AH8n$a zhb4Y3PWdr269&?V%uI$xMcUrMzl=;w<_nm*qr=c3Rl@i5wWB;e-`t7D&c-mcQl7x! zZWB`UGcw=Y2=}~wzrfLx=uet<;m3~=8I~ZRuzvMQUQdr+yTV|ATf1Uuomr__nDf=X zZ3WYJtHp_ri(}SQAPjv+Y+0=fH4krOP@S&=zZ-t1jW1o@}z;xk8 z(Nz1co&El^HK^NrhVHa-_;&88vTU>_J33=%{if;BEY*J#1n59=07jrGQ#IP>@u#3A z;!q+E1Rj3ZJ+!4bq9F8PXJ@yMgZL;>&gYA0%_Kbi8?S=XGM~dnQZQ!yBSgcZhY96H zrWnU;k)qy`rX&&xlDyA%(a1Hhi5CWkmg(`Gb%m(HKi-7Z!LKGRP_B8@`7&hdDy5n= z`OIxqxiVfX@OX1p(mQu>0Ai*v_cTMiw4qRt3~NBvr9oBy0)r>w3p~V0SCm=An6@3n)>@z!|o-$HvDK z|3D2ZMJkLE5loMKl6R^ez@Zz%S$&mbeoqH5`Bb){Ei21q&VP)hWS2tjShfFtGE+$z zzCR$P#uktu+#!w)cX!lWN1XU%K-r=s{|j?)Akf@q#3b#{6cZCuJ~gCxuMXRmI$nGtnH+-h z+GEi!*X=AP<|fG`1>MBdTb?28JYc=fGvAi2I<$B(rs$;eoJCyR6_bc~p!XR@O-+sD z=eH`-ye})I5ic1eL~TDmtfJ|8`0VJ*Yr=hNCd)G1p2MMz4C3^Mj?7;!w|Ly%JqmuW zlIEW^Ft%z?*|fpXda>Jr^1noFZEwFgVV%|*XhH@acv8rdGxeEX{M$(vG{Zw+x(ei@ zmfXb22}8-?Fi`vo-YVrTH*C?a8%M=Hv9MqVH7H^J$KsD?>!SFZ;ZsvnHr_gn=7acz z#W?0eCdVhVMWN12VV^$>WlQ?f;P^{(&pYTops|btm6aj>_Uz+hqpGwB)vWp0Cf5y< zft8-je~nn?W11plq}N)4A{l8I7$!ks_x$PXW-2XaRFswX_BnF{R#6YIwMhAgd5F9X zGmwdadS6(a^fjHtXg8=l?Rc0Sm%hk6E9!5cLVloEy4eh(=FwgP`)~I^5~pBEWo+F6 zSf2ncyMurJN91#cJTy_u8Y}@%!bq1RkGC~-bV@SXRd4F{R-*V`bS+6;W5vZ(&+I<9$;-V|eNfLa5n-6% z2(}&uGRF;p92eS*sE*oR$@pexaqr*meB)VhmIg@h{uzkk$9~qh#cHhw#>O%)b@+(| z^IQgqzuj~Sk(J;swEM-3TrJAPCq9k^^^`q{IItKBRXYe}e0Tdr=Huf7da3$l4PdpwWDop%^}n;dD#K4s#DYA8SHZ z&1!riV4W4R7R#C))JH1~axJ)RYnM$$lIR%6fIVA@zV{XVyx}C+a-Dt8Y9M)^KU0+H zR4IUb2CJ{Hg>CuaXtD50jB(_Tcx=Z$^WYu2u5kubqmwp%drJ6 z?Fo40g!Qd<-l=TQxqHEOuPX0;^z7iX?Ke^a%XT<13TA^5`4Xcw6D@Ur&VT&CUe0d} z1GjOVF1^L@>O)l@?bD~$wzgf(nxX1OGD8fEV?TdJcZc2KoUe|oP1#=$$7ee|xbY)A zDZq+cuTpc(fFdj^=!;{k03C69lMQ(|>uhRfRu%+!k&YOi-3|1QKB z z?n?eq1XP>p-IM$Z^C;2L3itnbJZAip*Zo0aw2bs8@(s^~*8T9go!%dHcAz2lM;`yp zD=7&xjFV$S&5uDaiScyD?B-i1ze`+CoRtz`Wn+Zl&#s4&}MO{@N!ufrzjG$B79)Y2d3tBk&)TxUTw@QS0TEL_?njX|@vq?Uz(nBFK5Pq7*xj#u*R&i|?7+6# z+|r_n#SW&LXhtheZdah{ZVoqwyT{D>MC3nkFF#N)xLi{p7J1jXlmVeb;cP5?e(=f# zuT7fvjSbjS781v?7{)-X3*?>tq?)Yd)~|1{BDS(pqC zC}~H#WXlkUW*H5CDOo<)#x7%RY)A;ShGhI5s*#cRDA8YgqG(HeKDx+#(ZQ?386dv! zlXCO)w91~Vw4AmOcATuV653fa9R$fyK8ul%rG z-wfS zihugoZyr38Im?Zuh6@RcF~t1anQu7>#lPpb#}4cOA!EM11`%f*07RqOVkmX{p~KJ9 z^zP;K#|)$`^Rb{rnHGH{~>1(fawV0*Z#)}M`m8-?ZJV<+e}s9wE# z)l&az?w^5{)`S(%MRzxdNqrs1n*-=jS^_jqE*5XDrA0+VE`5^*p3CuM<&dZEeCjoz zR;uu_H9ZPZV|fQq`Cyw4nscrVwi!fE6ciMmX$!_hN7uF;jjKG)d2@aC4ropY)8etW=xJvni)8eHi`H$%#zn^WJ5NLc-rqk|u&&4Z6fD_m&JfSI1Bvb?b<*n&sfl0^t z=HnmRl`XrFvMKB%9}>PaA`m-fK6a0(8=qPkWS5bb4=v?XcWi&hRY?O5HdulRi4?fN zlsJ*N-0Qw+Yic@s0(2uy%F@ib;GjXt01Fmx5XbRo6+n|pP(&nodMoap^z{~q ziEeaUT@Mxe3vJSfI6?uLND(CNr=#^W<1b}jzW58bIfyWTDle$mmS(|x-0|2UlX+9k zQ^EX7Nw}?EzVoBfT(-LT|=9N@^hcn-_p&sqG z&*oVs2JSU+N4ZD`FhCAWaS;>|wH2G*Id|?pa#@>tyxX`+4HyIArWDvVrX)2WAOQff z0qyHu&-S@i^MS-+j--!pr4fPBj~_8({~e1bfcl0wI1kaoN>mJL6KUPQm5N7lB(ui1 zE-o%kq)&djzWJ}ob<-GfDlkB;F31j-VHKvQUGQ3sp`CwyGJk_i!y^sD0fqC@$9|jO zOqN!r!8-p==F@ZVP=U$qSpY(gQ0)59P1&t@y?5rvg<}E+GB}26NYPp4f2YFQrQtot5mn3wu_qprZ=>Ig-$ zbW26Ws~IgY>}^5w`vTB(G`PTZaDiGBo5o(tp)qli|NeV( z@H_=R8V39rt5J5YB2Ky?4eJJ#b`_iBe2ot~6%7mLt5t8Vwi^Jy7|jWXqa3amOIoRb zOr}WVFP--DsS`1WpN%~)t3R!arKF^Q$e12KEqU36AWwnCBICpH4XCsfnyrHr>$I$4 z!DpKX$OKLWarN7nv@!uIA+~RNO)l$$w}p(;b>mx8pwYvu;dD_unryX_NhT8*Tj>BTrTTL&!?O+%Rv;b?B??gSzdp?6Uug9{ zd@V08Z$BdI?fpoCS$)t4mg4rT8Q_I}h`0d-vYZ^|dOB*Q^S|xqTV*vIg?@fVFSmMpaw0qtTRbx} z({Pg?#{2`sc9)M5N$*N|4;^t$+QP?#mov zGVC@I*lBVrOU-%2y!7%)fAKjpEFsgQc4{amtiHb95KQEwvf<(3T<9-Zm$xIew#P22 zc2Ix|App^>v6(3L_MCU0d3W##AB0M~3D00EWoKZqsJYT(#@w$Y_H7G22M~ApVFTRHMI_3be)Lkn#0F*V8Pq zc}`Cjy$bE;FJ6H7p=0y#R>`}-m4(0F>%@P|?7fx{=R^uFdISRnZ2W_xQhD{YuR3t< z{6yxu=4~JkeA;|(J6_nv#>Nvs&FuLA&PW^he@t(UwFFE8)|a!R{`E`K`i^ZnyE4$k z;(749Ix|oi$c3QbEJ3b~D_kQsPz~fIUKym($a_7dJ?o+40*OLl^{=&oq$<#Q(yyrp z{J-FAniyAw9tPbe&IhQ|a`DqFTVQGQ&Gq3!C2==4x{6EJwiPZ8zub-iXoUtkJiG{} zPaR&}_fn8_z~(=;5lD-aPWD3z8PZS@AaUiomF!G8I}Mf>e~0g#BelA-5#`cj;O5>N Xviia!U7SGha1wx#SCgwmn*{w2TRX*I literal 0 HcmV?d00001 From 2847298839f69ab99c4587a138fcc3179058d827 Mon Sep 17 00:00:00 2001 From: OCA-git-bot Date: Sun, 3 Sep 2023 15:54:28 +0000 Subject: [PATCH 6/8] [UPD] README.rst --- repair_security/README.rst | 12 +++++-- repair_security/static/description/index.html | 34 ++++++++++--------- 2 files changed, 27 insertions(+), 19 deletions(-) diff --git a/repair_security/README.rst b/repair_security/README.rst index 93c0dc29..312245ea 100644 --- a/repair_security/README.rst +++ b/repair_security/README.rst @@ -2,10 +2,13 @@ Repair Security =============== -.. !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! +.. + !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !! This file is generated by oca-gen-addon-readme !! !! changes will be overwritten. !! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! + !! source digest: sha256:3fe02b72d8ecc5810af4047e8ca9ef267f1fac979fc3f20627e4ea7829b16065 + !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! .. |badge1| image:: https://img.shields.io/badge/maturity-Beta-yellow.png :target: https://odoo-community.org/page/development-status @@ -19,8 +22,11 @@ Repair Security .. |badge4| image:: https://img.shields.io/badge/weblate-Translate%20me-F47D42.png :target: https://translation.odoo-community.org/projects/repair-15-0/repair-15-0-repair_security :alt: Translate me on Weblate +.. |badge5| image:: https://img.shields.io/badge/runboat-Try%20me-875A7B.png + :target: https://runboat.odoo-community.org/builds?repo=OCA/repair&target_branch=15.0 + :alt: Try me on Runboat -|badge1| |badge2| |badge3| |badge4| +|badge1| |badge2| |badge3| |badge4| |badge5| This module adds security groups fro the Repair App to make it more configurable and independent of Stock. @@ -34,7 +40,7 @@ Bug Tracker Bugs are tracked on `GitHub Issues `_. In case of trouble, please check there if your issue has already been reported. -If you spotted it first, help us smashing it by providing a detailed and welcomed +If you spotted it first, help us to smash it by providing a detailed and welcomed `feedback `_. Do not contact contributors directly about support or help with technical issues. diff --git a/repair_security/static/description/index.html b/repair_security/static/description/index.html index 54eac3d7..f7f657f1 100644 --- a/repair_security/static/description/index.html +++ b/repair_security/static/description/index.html @@ -1,20 +1,20 @@ - + - + Repair Security -
-

Repair Security

+
+ + +Odoo Community Association + +
+

Repair Security

-

Beta License: AGPL-3 OCA/repair Translate me on Weblate Try me on Runboat

-

This module adds security groups fro the Repair App to make it more configurable and independent of Stock.

+

Beta License: AGPL-3 OCA/repair Translate me on Weblate Try me on Runboat

+

This module adds security groups fro the Repair App to make it more +configurable and independent of Stock.

Table of contents

    @@ -384,38 +390,41 @@

    Repair Security

-

Bug Tracker

+

Bug Tracker

Bugs are tracked on GitHub Issues. In case of trouble, please check there if your issue has already been reported. If you spotted it first, help us to smash it by providing a detailed and welcomed -feedback.

+feedback.

Do not contact contributors directly about support or help with technical issues.

-

Credits

+

Credits

-

Authors

+

Authors

  • ForgeFlow S.L.
-

Maintainers

+

Maintainers

This module is maintained by the OCA.

-Odoo Community Association + +Odoo Community Association +

OCA, or the Odoo Community Association, is a nonprofit organization whose mission is to support the collaborative development of Odoo features and promote its widespread use.

-

This module is part of the OCA/repair project on GitHub.

+

This module is part of the OCA/repair project on GitHub.

You are welcome to contribute. To learn how please visit https://odoo-community.org/page/Contribute.

+
diff --git a/repair_security/views/repair_views.xml b/repair_security/views/repair_views.xml index 70f9c566..a84647db 100644 --- a/repair_security/views/repair_views.xml +++ b/repair_security/views/repair_views.xml @@ -1,9 +1,8 @@ - - + From 71e2f5a462bf9af350fc03eeabcc0d622dce82df Mon Sep 17 00:00:00 2001 From: JasminSForgeFlow Date: Fri, 19 Dec 2025 11:23:01 +0000 Subject: [PATCH 8/8] [MIG] repair_security: Migration to 19.0 --- repair_security/__manifest__.py | 2 +- repair_security/hook.py | 9 ++------- repair_security/security/ir.model.access.csv | 5 ----- repair_security/security/repair_security.xml | 13 +++++++++---- repair_security/views/repair_views.xml | 2 +- 5 files changed, 13 insertions(+), 18 deletions(-) diff --git a/repair_security/__manifest__.py b/repair_security/__manifest__.py index 25a12426..68cefcaa 100644 --- a/repair_security/__manifest__.py +++ b/repair_security/__manifest__.py @@ -3,7 +3,7 @@ { "name": "Repair Security", "summary": "Create security groups for Repair", - "version": "15.0.1.0.0", + "version": "19.0.1.0.0", "category": "Manufacturing", "website": "https://github.com/OCA/repair", "author": "ForgeFlow S.L., Odoo Community Association (OCA)", diff --git a/repair_security/hook.py b/repair_security/hook.py index 20d91715..441534e3 100644 --- a/repair_security/hook.py +++ b/repair_security/hook.py @@ -1,12 +1,7 @@ -from odoo import SUPERUSER_ID -from odoo.api import Environment - - -def post_init_hook(cr, _): - env = Environment(cr, SUPERUSER_ID, {}) +def post_init_hook(env): # Giving Repair Admin access to match the previous permissions. env.ref("repair_security.group_repair_manager").write( { - "users": [(6, 0, env.ref("stock.group_stock_user").users.ids)], + "user_ids": [(6, 0, env.ref("stock.group_stock_user").user_ids.ids)], } ) diff --git a/repair_security/security/ir.model.access.csv b/repair_security/security/ir.model.access.csv index 83d8881f..09f04664 100644 --- a/repair_security/security/ir.model.access.csv +++ b/repair_security/security/ir.model.access.csv @@ -1,13 +1,8 @@ id,name,model_id:id,group_id:id,perm_read,perm_write,perm_create,perm_unlink -access_repair_fee_user,Repair Fee user,repair.model_repair_fee,repair_security.group_repair_user,1,0,0,0 -access_repair_fee_manager,Repair Fee manager,repair.model_repair_fee,repair_security.group_repair_manager,1,1,1,1 access_repair_user,Repair user,repair.model_repair_order,repair_security.group_repair_user,1,1,0,0 access_repair_manager,Repair manager,repair.model_repair_order,repair_security.group_repair_manager,1,1,1,1 access_repair_tag_user,Repair Tags user,repair.model_repair_tags,repair_security.group_repair_user,1,0,0,0 access_repair_tag_manager,Repair Tags user,repair.model_repair_tags,repair_security.group_repair_manager,1,1,1,1 -access_repair_line_user,repair.line user,repair.model_repair_line,repair_security.group_repair_user,1,1,0,0 -access_repair_line_manager,repair.line user,repair.model_repair_line,repair_security.group_repair_manager,1,1,1,1 access_account_tax_user,account.tax,account.model_account_tax,repair_security.group_repair_user,1,0,0,0 access_account_tax_manager,account.tax,account.model_account_tax,repair_security.group_repair_manager,1,0,0,0 -access_repair_order_make_invoice_manager,access.repair.order.make_invoice,repair.model_repair_order_make_invoice,repair_security.group_repair_manager,1,1,1,1 access_stock_warn_insufficient_qty_repair_manager,access.stock.warn.insufficient.qty.repair,repair.model_stock_warn_insufficient_qty_repair,repair_security.group_repair_manager,1,1,1,1 diff --git a/repair_security/security/repair_security.xml b/repair_security/security/repair_security.xml index ae0f6247..f6e67d7a 100644 --- a/repair_security/security/repair_security.xml +++ b/repair_security/security/repair_security.xml @@ -2,7 +2,7 @@ @@ -11,19 +11,24 @@ Repair 25 + + Repair + + 7 + User - + Administrator - + diff --git a/repair_security/views/repair_views.xml b/repair_security/views/repair_views.xml index a84647db..9da0dfb9 100644 --- a/repair_security/views/repair_views.xml +++ b/repair_security/views/repair_views.xml @@ -1,7 +1,7 @@