mirror of
https://github.com/bringout/oca-ocb-core.git
synced 2026-04-20 03:52:01 +02:00
19.0 vanilla
This commit is contained in:
parent
d1963a3c3a
commit
2d3ee4855a
7430 changed files with 2687981 additions and 2965473 deletions
|
|
@ -1,60 +1,218 @@
|
|||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<odoo noupdate="1">
|
||||
|
||||
<!-- RULES -->
|
||||
<record id="mail_channel_rule" model="ir.rule">
|
||||
<field name="name">Mail.channel: access only public and joined groups</field>
|
||||
<field name="model_id" ref="model_mail_channel"/>
|
||||
<field name="groups" eval="[Command.link(ref('base.group_user')), Command.link(ref('base.group_portal')), Command.link(ref('base.group_public'))]"/>
|
||||
<field name="domain_force">[
|
||||
'|',
|
||||
'&',
|
||||
('channel_type', '!=', 'channel'),
|
||||
('is_member', '=', True),
|
||||
'&',
|
||||
('channel_type', '=', 'channel'),
|
||||
'|',
|
||||
('group_public_id', '=', False),
|
||||
('group_public_id', 'in', user.groups_id.ids)]
|
||||
<record id="ir_rule_discuss_channel_all" model="ir.rule">
|
||||
<field name="name">discuss.channel: can access channels (as member or as group allowed)</field>
|
||||
<field name="model_id" ref="mail.model_discuss_channel"/>
|
||||
<field name="groups"
|
||||
eval="[
|
||||
Command.link(ref('base.group_user')),
|
||||
Command.link(ref('base.group_portal')),
|
||||
Command.link(ref('base.group_public')),
|
||||
]"
|
||||
/>
|
||||
<field name="domain_force">
|
||||
[
|
||||
"|",
|
||||
"&",
|
||||
("channel_type", "!=", "channel"),
|
||||
"|",
|
||||
("is_member", "=", True),
|
||||
("parent_channel_id.is_member", "=", True),
|
||||
"&",
|
||||
("channel_type", "=", "channel"),
|
||||
"|",
|
||||
("group_public_id", "=", False),
|
||||
("group_public_id", "in", user.all_group_ids.ids),
|
||||
]
|
||||
</field>
|
||||
<field name="perm_create" eval="False"/>
|
||||
</record>
|
||||
|
||||
<record id="mail_channel_admin" model="ir.rule">
|
||||
<field name="name">Mail.channel: admin full access</field>
|
||||
<field name="model_id" ref="model_mail_channel"/>
|
||||
<record id="ir_rule_discuss_channel_group_system" model="ir.rule">
|
||||
<field name="name">discuss.channel: admin full access</field>
|
||||
<field name="model_id" ref="mail.model_discuss_channel"/>
|
||||
<field name="groups" eval="[Command.link(ref('base.group_system'))]"/>
|
||||
<field name="domain_force">[(1, '=', 1)]</field>
|
||||
</record>
|
||||
|
||||
<record id="ir_rule_mail_channel_member_group_user" model="ir.rule">
|
||||
<field name="name">mail.channel.member: write its own entries</field>
|
||||
<field name="model_id" ref="model_mail_channel_member"/>
|
||||
<field name="groups" eval="[(4, ref('base.group_user')), (4, ref('base.group_portal'))]"/>
|
||||
<field name="domain_force">[
|
||||
'|',
|
||||
'&',
|
||||
('channel_id.channel_type', '!=', 'channel'),
|
||||
('channel_id.is_member', '=', True),
|
||||
'&',
|
||||
('channel_id.channel_type', '=', 'channel'),
|
||||
'|',
|
||||
('channel_id.group_public_id', '=', False),
|
||||
('channel_id.group_public_id', 'in', user.groups_id.ids)]
|
||||
<record id="ir_rule_discuss_channel_member_is_self_all" model="ir.rule">
|
||||
<field name="name">discuss.channel.member: access their own entries</field>
|
||||
<field name="model_id" ref="mail.model_discuss_channel_member"/>
|
||||
<field name="groups"
|
||||
eval="[
|
||||
Command.link(ref('base.group_user')),
|
||||
Command.link(ref('base.group_portal')),
|
||||
Command.link(ref('base.group_public')),
|
||||
]"
|
||||
/>
|
||||
<field name="domain_force">
|
||||
[
|
||||
('is_self', '=', True),
|
||||
"|",
|
||||
("channel_id.channel_type", "!=", "channel"),
|
||||
"|",
|
||||
("channel_id.group_public_id", "=", False),
|
||||
("channel_id.group_public_id", "in", user.all_group_ids.ids),
|
||||
]
|
||||
</field>
|
||||
<field name="perm_read" eval="False"/>
|
||||
<field name="perm_write" eval="True"/>
|
||||
<!--
|
||||
create() is controlled by other rules because create() rules are applied after the record contains
|
||||
its data, which means just using 'is_self' would allow any user to add themselves in any channel.
|
||||
-->
|
||||
<field name="perm_create" eval="False"/>
|
||||
<field name="perm_unlink" eval="True"/>
|
||||
<!--
|
||||
read() is controlled by other rules, in particular the current rule for reading self member is
|
||||
"contained" within the rule for reading any member of accessible channel which is more generic.
|
||||
-->
|
||||
<field name="perm_read" eval="False"/>
|
||||
</record>
|
||||
|
||||
<record id="ir_rule_mail_channel_member_group_system" model="ir.rule">
|
||||
<field name="name">mail.channel.member: admin can manipulate all entries</field>
|
||||
<field name="model_id" ref="model_mail_channel_member"/>
|
||||
<record id="ir_rule_discuss_channel_member_read_all" model="ir.rule">
|
||||
<field name="name">discuss.channel.member: read members of accessible channels</field>
|
||||
<field name="model_id" ref="mail.model_discuss_channel_member"/>
|
||||
<field name="groups"
|
||||
eval="[
|
||||
Command.link(ref('base.group_user')),
|
||||
Command.link(ref('base.group_portal')),
|
||||
Command.link(ref('base.group_public')),
|
||||
]"
|
||||
/>
|
||||
<field name="domain_force">
|
||||
[
|
||||
"|",
|
||||
"&",
|
||||
("channel_id.channel_type", "!=", "channel"),
|
||||
"|",
|
||||
("channel_id.is_member", "=", True),
|
||||
("channel_id.parent_channel_id.is_member", "=", True),
|
||||
"&",
|
||||
("channel_id.channel_type", "=", "channel"),
|
||||
"|",
|
||||
("channel_id.group_public_id", "=", False),
|
||||
("channel_id.group_public_id", "in", user.all_group_ids.ids),
|
||||
]
|
||||
</field>
|
||||
<field name="perm_create" eval="False"/>
|
||||
<field name="perm_write" eval="False"/>
|
||||
<field name="perm_unlink" eval="False"/>
|
||||
</record>
|
||||
|
||||
<record id="ir_rule_discuss_channel_member_create_is_group_matching_all" model="ir.rule">
|
||||
<field name="name">discuss.channel.member: can join group restricted channels when group is matching</field>
|
||||
<field name="model_id" ref="mail.model_discuss_channel_member"/>
|
||||
<field name="groups"
|
||||
eval="[
|
||||
Command.link(ref('base.group_user')),
|
||||
Command.link(ref('base.group_portal')),
|
||||
Command.link(ref('base.group_public')),
|
||||
]"
|
||||
/>
|
||||
<field name="domain_force">
|
||||
[
|
||||
('is_self', '=', True),
|
||||
('channel_id.channel_type', '=', 'channel'),
|
||||
'|',
|
||||
('channel_id.group_public_id', '=', False),
|
||||
('channel_id.group_public_id', 'in', user.all_group_ids.ids)
|
||||
]
|
||||
</field>
|
||||
<!--
|
||||
This is the only case where the current user can join themselves (is_self = True) when the channel
|
||||
is already created, in all other cases they must be invited by someone else.
|
||||
-->
|
||||
<field name="perm_read" eval="False"/>
|
||||
<field name="perm_write" eval="False"/>
|
||||
<field name="perm_unlink" eval="False"/>
|
||||
</record>
|
||||
|
||||
<record id="ir_rule_discuss_channel_member_create_is_group_matching_group_user" model="ir.rule">
|
||||
<field name="name">discuss.channel.member: internal users can invite others in group restricted channels when group is matching</field>
|
||||
<field name="model_id" ref="mail.model_discuss_channel_member"/>
|
||||
<field name="groups" eval="[Command.link(ref('base.group_user'))]"/>
|
||||
<field name="domain_force">
|
||||
[
|
||||
('is_self', '=', False),
|
||||
('channel_id.channel_type', '=', 'channel'),
|
||||
'|',
|
||||
('channel_id.group_public_id', '=', False),
|
||||
('channel_id.group_public_id', 'in', user.all_group_ids.ids)
|
||||
]
|
||||
</field>
|
||||
<field name="perm_read" eval="False"/>
|
||||
<field name="perm_write" eval="False"/>
|
||||
<field name="perm_unlink" eval="False"/>
|
||||
</record>
|
||||
|
||||
<record id="ir_rule_discuss_channel_member_create_is_member_group_user" model="ir.rule">
|
||||
<field name="name">discuss.channel.member: internal users can invite others in channels they are member of</field>
|
||||
<field name="model_id" ref="mail.model_discuss_channel_member"/>
|
||||
<field name="groups" eval="[Command.link(ref('base.group_user'))]"/>
|
||||
<field name="domain_force">
|
||||
[
|
||||
('is_self', '=', False),
|
||||
('channel_id.channel_type', 'not in', ('channel', 'chat')),
|
||||
('channel_id.is_member', '=', True)
|
||||
]
|
||||
</field>
|
||||
<!--
|
||||
create() for the current user is controlled by other rules because create() rules are applied after the record
|
||||
contains its data, which means allowing 'is_self' would allow any user to add themselves in any channel.
|
||||
-->
|
||||
<field name="perm_read" eval="False"/>
|
||||
<field name="perm_write" eval="False"/>
|
||||
<field name="perm_unlink" eval="False"/>
|
||||
</record>
|
||||
|
||||
<record id="ir_rule_discuss_call_history_read_all" model="ir.rule">
|
||||
<field name="name">discuss.call.history: read call history of accessible channels</field>
|
||||
<field name="model_id" ref="mail.model_discuss_call_history"/>
|
||||
<field name="groups"
|
||||
eval="[
|
||||
Command.link(ref('base.group_user')),
|
||||
Command.link(ref('base.group_portal')),
|
||||
Command.link(ref('base.group_public')),
|
||||
]"
|
||||
/>
|
||||
<field name="domain_force">
|
||||
[
|
||||
"|",
|
||||
"&",
|
||||
("channel_id.channel_type", "!=", "channel"),
|
||||
"|",
|
||||
("channel_id.is_member", "=", True),
|
||||
("channel_id.parent_channel_id.is_member", "=", True),
|
||||
"&",
|
||||
("channel_id.channel_type", "=", "channel"),
|
||||
"|",
|
||||
("channel_id.group_public_id", "=", False),
|
||||
("channel_id.group_public_id", "in", user.all_group_ids.ids),
|
||||
]
|
||||
</field>
|
||||
<field name="perm_create" eval="False"/>
|
||||
<field name="perm_write" eval="False"/>
|
||||
<field name="perm_unlink" eval="False"/>
|
||||
</record>
|
||||
|
||||
<record id="ir_rule_discuss_channel_member_group_system" model="ir.rule">
|
||||
<field name="name">discuss.channel.member: admin can manipulate all entries</field>
|
||||
<field name="model_id" ref="mail.model_discuss_channel_member"/>
|
||||
<field name="groups" eval="[Command.link(ref('base.group_system'))]"/>
|
||||
<field name="domain_force">[(1, '=', 1)]</field>
|
||||
</record>
|
||||
|
||||
<record id="discuss_gif_favorite_user_rule" model="ir.rule">
|
||||
<field name="name">Discuss.gif.favorite: User access</field>
|
||||
<field name="model_id" ref="model_discuss_gif_favorite"/>
|
||||
<field name="groups" eval="[Command.link(ref('base.group_user'))]"/>
|
||||
<field name="domain_force">[('create_uid', '=', user.id)]</field>
|
||||
</record>
|
||||
|
||||
<record id="discuss_gif_favorite_admin_rule" model="ir.rule">
|
||||
<field name="name">Discuss.gif.favorite: admin full access</field>
|
||||
<field name="model_id" ref="model_discuss_gif_favorite"/>
|
||||
<field name="groups" eval="[Command.link(ref('base.group_erp_manager'))]"/>
|
||||
<field name="domain_force">[(1, '=', 1)]</field>
|
||||
</record>
|
||||
|
||||
<record id="ir_rule_mail_notifications_group_user" model="ir.rule">
|
||||
<field name="name">mail.notifications: group_user: write its own entries</field>
|
||||
<field name="model_id" ref="model_mail_notification"/>
|
||||
|
|
@ -90,6 +248,20 @@
|
|||
<field name="perm_unlink" eval="True"/>
|
||||
</record>
|
||||
|
||||
<record id="mail_activity_plan_rule_admin" model="ir.rule">
|
||||
<field name="name">Administrators can access all activity plans.</field>
|
||||
<field name="model_id" ref="model_mail_activity_plan"/>
|
||||
<field name="groups" eval="[Command.link(ref('base.group_system'))]"/>
|
||||
<field name="domain_force">[(1, '=', 1)]</field>
|
||||
</record>
|
||||
|
||||
<record id="mail_activity_plan_template_rule_admin" model="ir.rule">
|
||||
<field name="name">Administrators can access all activity plan templates.</field>
|
||||
<field name="model_id" ref="model_mail_activity_plan_template"/>
|
||||
<field name="groups" eval="[Command.link(ref('base.group_system'))]"/>
|
||||
<field name="domain_force">[(1, '=', 1)]</field>
|
||||
</record>
|
||||
|
||||
<record id="mail_compose_message_rule" model="ir.rule">
|
||||
<field name="name">Mail Compose Message Rule</field>
|
||||
<field name="model_id" ref="model_mail_compose_message"/>
|
||||
|
|
@ -101,9 +273,9 @@
|
|||
</record>
|
||||
|
||||
<record id="mail_template_employee_rule" model="ir.rule">
|
||||
<field name="name">Employees can only change their own templates</field>
|
||||
<field name="name">Employees can only modify templates they have created or been assigned</field>
|
||||
<field name="model_id" ref="model_mail_template"/>
|
||||
<field name="domain_force">[('create_uid', '=', user.id)]</field>
|
||||
<field name="domain_force">['|', ('create_uid', '=', user.id), ('user_id', '=', user.id)]</field>
|
||||
<field name="groups" eval="[Command.link(ref('base.group_user'))]"/>
|
||||
<field name="perm_create" eval="True"/>
|
||||
<field name="perm_read" eval="False"/>
|
||||
|
|
@ -122,28 +294,6 @@
|
|||
<field name="perm_unlink" eval="True"/>
|
||||
</record>
|
||||
|
||||
<record id="res_users_settings_rule_admin" model="ir.rule">
|
||||
<field name="name">Administrators can access all User Settings.</field>
|
||||
<field name="model_id" ref="model_res_users_settings"/>
|
||||
<field name="groups" eval="[Command.link(ref('base.group_system'))]"/>
|
||||
<field name="domain_force">[(1, '=', 1)]</field>
|
||||
<field name="perm_read" eval="True"/>
|
||||
<field name="perm_write" eval="True"/>
|
||||
<field name="perm_create" eval="True"/>
|
||||
<field name="perm_unlink" eval="True"/>
|
||||
</record>
|
||||
|
||||
<record id="res_users_settings_rule_user" model="ir.rule">
|
||||
<field name="name">res.users.settings: access their own entries</field>
|
||||
<field name="model_id" ref="model_res_users_settings"/>
|
||||
<field name="groups" eval="[Command.link(ref('base.group_user'))]"/>
|
||||
<field name="domain_force">[('user_id', '=', user.id)]</field>
|
||||
<field name="perm_read" eval="True"/>
|
||||
<field name="perm_write" eval="True"/>
|
||||
<field name="perm_create" eval="True"/>
|
||||
<field name="perm_unlink" eval="True"/>
|
||||
</record>
|
||||
|
||||
<record id="res_users_settings_volumes_rule_user" model="ir.rule">
|
||||
<field name="name">res.users.settings.volumes: access their own entries</field>
|
||||
<field name="model_id" ref="model_res_users_settings_volumes"/>
|
||||
|
|
@ -166,4 +316,39 @@
|
|||
<field name="perm_unlink" eval="True"/>
|
||||
</record>
|
||||
|
||||
<record id="ir_rule_mail_canned_response_admin" model="ir.rule">
|
||||
<field name="name">Canned response: admin has all access on shared canned response</field>
|
||||
<field name="model_id" ref="model_mail_canned_response"/>
|
||||
<field name="groups" eval="[Command.link(ref('group_mail_canned_response_admin'))]"/>
|
||||
<field name="domain_force">[('is_shared', '=', True)]</field>
|
||||
<field name="perm_create" eval="False"/>
|
||||
</record>
|
||||
|
||||
<!-- Internal user: rationale is that they read their own or the one belonging to
|
||||
their user groups. They can modify only their own -->
|
||||
<record id="ir_rule_mail_canned_response_user_read" model="ir.rule">
|
||||
<field name="name">Canned response: User read: own or in groups</field>
|
||||
<field name="model_id" ref="model_mail_canned_response"/>
|
||||
<field name="groups" eval="[Command.link(ref('base.group_user'))]"/>
|
||||
<field name="domain_force">['|', ('create_uid', '=', user.id), ('group_ids', 'in', user.all_group_ids.ids)]</field>
|
||||
<field name="perm_write" eval="False"/>
|
||||
<field name="perm_create" eval="False"/>
|
||||
<field name="perm_unlink" eval="False"/>
|
||||
</record>
|
||||
<record id="ir_rule_mail_canned_response_user_update" model="ir.rule">
|
||||
<field name="name">Canned response: User write/unlink: own only</field>
|
||||
<field name="model_id" ref="model_mail_canned_response"/>
|
||||
<field name="groups" eval="[Command.link(ref('base.group_user'))]"/>
|
||||
<field name="domain_force">[('create_uid', '=', user.id)]</field>
|
||||
<field name="perm_create" eval="False"/>
|
||||
<field name="perm_read" eval="False"/>
|
||||
</record>
|
||||
<record id="ir_rule_mail_scheduled_message_user" model="ir.rule">
|
||||
<field name="model_id" ref="model_mail_scheduled_message"/>
|
||||
<field name="domain_force">[('create_uid', '=', user.id)]</field>
|
||||
<field name="perm_read" eval="False"/>
|
||||
<field name="perm_write" eval="True"/>
|
||||
<field name="perm_create" eval="True"/>
|
||||
<field name="perm_unlink" eval="False"/>
|
||||
</record>
|
||||
</odoo>
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue