From a98490706f329bf9a5d8cd71d4dadd1fd36f7f42 Mon Sep 17 00:00:00 2001 From: Alexis de Lattre Date: Thu, 8 May 2025 12:18:30 +0000 Subject: [PATCH] [IMP] Remove full access on uom.uom and uom.category to sale manager, stock manager, purchase manager, POS manager, MRP manager We only keep full access to uom.uom and uom.category to the group Administration/Configuration --- mrp_usability/__manifest__.py | 1 + mrp_usability/security/ir.model.access.csv | 3 +++ pos_usability/__manifest__.py | 1 + pos_usability/security/ir.model.access.csv | 3 +++ purchase_usability/__manifest__.py | 1 + purchase_usability/security/ir.model.access.csv | 3 +++ sale_usability/security/ir.model.access.csv | 2 ++ stock_usability/security/ir.model.access.csv | 2 ++ 8 files changed, 16 insertions(+) create mode 100644 mrp_usability/security/ir.model.access.csv create mode 100644 pos_usability/security/ir.model.access.csv create mode 100644 purchase_usability/security/ir.model.access.csv diff --git a/mrp_usability/__manifest__.py b/mrp_usability/__manifest__.py index c2ded0a..31b7a40 100644 --- a/mrp_usability/__manifest__.py +++ b/mrp_usability/__manifest__.py @@ -12,6 +12,7 @@ 'website': 'http://www.akretion.com', 'depends': ['mrp'], 'data': [ + 'security/ir.model.access.csv', 'views/mrp_production.xml', 'views/product_template.xml', 'views/stock_move_line.xml', diff --git a/mrp_usability/security/ir.model.access.csv b/mrp_usability/security/ir.model.access.csv new file mode 100644 index 0000000..0d19d54 --- /dev/null +++ b/mrp_usability/security/ir.model.access.csv @@ -0,0 +1,3 @@ +id,name,model_id:id,group_id:id,perm_read,perm_write,perm_create,perm_unlink +mrp.access_uom_category_mrp_manager,Read access on uom.category (inherited in usability module to remove full access),uom.model_uom_category,mrp.group_mrp_manager,1,0,0,0 +mrp.access_uom_uom_mrp_manager,Read access on uom.uom (inherited in usability module to remove full access),uom.model_uom_uom,mrp.group_mrp_manager,1,0,0,0 diff --git a/pos_usability/__manifest__.py b/pos_usability/__manifest__.py index eb56ec1..059b19a 100644 --- a/pos_usability/__manifest__.py +++ b/pos_usability/__manifest__.py @@ -27,6 +27,7 @@ Akretion: "website": "http://www.akretion.com", "depends": ["point_of_sale"], "data": [ + "security/ir.model.access.csv", "report/pos.xml", "views/report_pos_order.xml", "views/pos_category.xml", diff --git a/pos_usability/security/ir.model.access.csv b/pos_usability/security/ir.model.access.csv new file mode 100644 index 0000000..e9608c4 --- /dev/null +++ b/pos_usability/security/ir.model.access.csv @@ -0,0 +1,3 @@ +id,name,model_id:id,group_id:id,perm_read,perm_write,perm_create,perm_unlink +point_of_sale.access_uom_uom_manager,Read access on uom.uom (inherited in usability module to remove full access),uom.model_uom_uom,point_of_sale.group_pos_manager,1,0,0,0 + diff --git a/purchase_usability/__manifest__.py b/purchase_usability/__manifest__.py index 84d197c..3fc2efc 100644 --- a/purchase_usability/__manifest__.py +++ b/purchase_usability/__manifest__.py @@ -12,6 +12,7 @@ 'website': 'http://www.akretion.com', 'depends': ['purchase'], 'data': [ + 'security/ir.model.access.csv', 'views/purchase_order.xml', 'views/purchase_report.xml', 'views/account_move.xml', diff --git a/purchase_usability/security/ir.model.access.csv b/purchase_usability/security/ir.model.access.csv new file mode 100644 index 0000000..5a9a855 --- /dev/null +++ b/purchase_usability/security/ir.model.access.csv @@ -0,0 +1,3 @@ +id,name,model_id:id,group_id:id,perm_read,perm_write,perm_create,perm_unlink +purchase.access_uom_category_purchase_manager,Read access on uom.category (inherited in usability module to remove full access),uom.model_uom_category,purchase.group_purchase_manager,1,0,0,0 +purchase.access_uom_uom_purchase_manager,Read access on uom.uom (inherited in usability module to remove full access),uom.model_uom_uom,purchase.group_purchase_manager,1,0,0,0 diff --git a/sale_usability/security/ir.model.access.csv b/sale_usability/security/ir.model.access.csv index 0fede3e..cda26e4 100644 --- a/sale_usability/security/ir.model.access.csv +++ b/sale_usability/security/ir.model.access.csv @@ -1,3 +1,5 @@ id,name,model_id:id,group_id:id,perm_read,perm_write,perm_create,perm_unlink access_sale_invoice_discount_all_lines_sale,Full access on sale.invoice.discount.all.lines to Sale user,model_sale_invoice_discount_all_lines,sales_team.group_sale_salesman,1,1,1,1 access_sale_invoice_discount_all_lines_invoice,Full access on sale.invoice.discount.all.lines to Invoice user,model_sale_invoice_discount_all_lines,account.group_account_invoice,1,1,1,1 +sale.access_uom_category_sale_manager,Read access on uom.category (inherited in usability module to remove full access),uom.model_uom_category,sales_team.group_sale_manager,1,0,0,0 +sale.access_uom_uom_sale_manager,Read access on uom.uom (inherited in usability module to remove full access),uom.model_uom_uom,sales_team.group_sale_manager,1,0,0,0 diff --git a/stock_usability/security/ir.model.access.csv b/stock_usability/security/ir.model.access.csv index c49d585..9eba4b1 100644 --- a/stock_usability/security/ir.model.access.csv +++ b/stock_usability/security/ir.model.access.csv @@ -4,3 +4,5 @@ access_procurement_scheduler_log_user,Read/Create procurement.scheduler.log to S access_procurement_scheduler_log_read,Read access on procurement.scheduler.log to Employee,model_procurement_scheduler_log,base.group_user,1,0,0,0 access_stock_warehouse_orderpoint_employee,Read access on stock.warehouse.orderpoint to employee (needed to open product form view with employee-only group),stock.model_stock_warehouse_orderpoint,base.group_user,1,0,0,0 stock.access_stock_inventory_line_user,stock.inventory.line user,stock.model_stock_inventory_line,stock.group_stock_user,1,1,1,1 +stock.access_uom_category_stock_manager,Read access on uom.category (inherited in usability module to remove full access),uom.model_uom_category,stock.group_stock_manager,1,0,0,0 +stock.access_uom_uom_stock_manager,Read access on uom.uom (inherited in usability module to remove full access),uom.model_uom_uom,stock.group_stock_manager,1,0,0,0