mirror of
https://github.com/bringout/oca-ocb-sale.git
synced 2026-04-26 19:32:01 +02:00
Initial commit: Sale packages
This commit is contained in:
commit
14e3d26998
6469 changed files with 2479670 additions and 0 deletions
138
odoo-bringout-oca-ocb-sale/sale/tests/test_access_rights.py
Normal file
138
odoo-bringout-oca-ocb-sale/sale/tests/test_access_rights.py
Normal file
|
|
@ -0,0 +1,138 @@
|
|||
# -*- coding: utf-8 -*-
|
||||
# Part of Odoo. See LICENSE file for full copyright and licensing details.
|
||||
|
||||
from odoo.exceptions import AccessError, UserError
|
||||
from odoo.tests import tagged
|
||||
from odoo.tools import mute_logger
|
||||
|
||||
from odoo.addons.base.tests.common import BaseUsersCommon
|
||||
from odoo.addons.sale.tests.common import SaleCommon
|
||||
|
||||
|
||||
@tagged('post_install', '-at_install')
|
||||
class TestAccessRights(BaseUsersCommon, SaleCommon):
|
||||
|
||||
@classmethod
|
||||
def setUpClass(cls):
|
||||
super().setUpClass()
|
||||
|
||||
cls.sale_user2 = cls.env['res.users'].create({
|
||||
'name': 'salesman_2',
|
||||
'login': 'salesman_2',
|
||||
'email': 'default_user_salesman_2@example.com',
|
||||
'signature': '--\nMark',
|
||||
'notification_type': 'email',
|
||||
'groups_id': [(6, 0, cls.group_sale_salesman.ids)],
|
||||
})
|
||||
|
||||
# Create the SO with a specific salesperson
|
||||
cls.sale_order.user_id = cls.sale_user
|
||||
|
||||
def test_access_sales_manager(self):
|
||||
""" Test sales manager's access rights """
|
||||
SaleOrder = self.env['sale.order'].with_user(self.sale_manager)
|
||||
so_as_sale_manager = SaleOrder.browse(self.sale_order.id)
|
||||
|
||||
# Manager can see the SO which is assigned to another salesperson
|
||||
so_as_sale_manager.read()
|
||||
# Manager can change a salesperson of the SO
|
||||
so_as_sale_manager.write({'user_id': self.sale_user2.id})
|
||||
|
||||
# Manager can create the SO for other salesperson
|
||||
sale_order = SaleOrder.create({
|
||||
'partner_id': self.partner.id,
|
||||
'user_id': self.sale_user.id
|
||||
})
|
||||
self.assertIn(
|
||||
sale_order.id, SaleOrder.search([]).ids,
|
||||
'Sales manager should be able to create the SO of other salesperson')
|
||||
# Manager can confirm the SO
|
||||
sale_order.action_confirm()
|
||||
# Manager can not delete confirmed SO
|
||||
with self.assertRaises(UserError), mute_logger('odoo.models.unlink'):
|
||||
sale_order.unlink()
|
||||
|
||||
# Manager can delete the SO of other salesperson if SO is in 'draft' or 'cancel' state
|
||||
so_as_sale_manager.unlink()
|
||||
self.assertNotIn(
|
||||
so_as_sale_manager.id, SaleOrder.search([]).ids,
|
||||
'Sales manager should be able to delete the SO')
|
||||
|
||||
@mute_logger('odoo.addons.base.models.ir_model', 'odoo.addons.base.models.ir_rule')
|
||||
def test_access_sales_person(self):
|
||||
""" Test Salesperson's access rights """
|
||||
SaleOrder = self.env['sale.order'].with_user(self.sale_user2)
|
||||
so_as_salesperson = SaleOrder.browse(self.sale_order.id)
|
||||
|
||||
# Salesperson can see only their own sales order
|
||||
with self.assertRaises(AccessError):
|
||||
so_as_salesperson.read()
|
||||
|
||||
# Now assign the SO to themselves
|
||||
# (using self.sale_order to do the change as superuser)
|
||||
self.sale_order.write({'user_id': self.sale_user2.id})
|
||||
|
||||
# The salesperson is now able to read it
|
||||
so_as_salesperson.read()
|
||||
# Salesperson can change a Sales Team of SO
|
||||
so_as_salesperson.write({'team_id': self.sale_team.id})
|
||||
|
||||
# Salesperson can't create a SO for other salesperson
|
||||
with self.assertRaises(AccessError):
|
||||
self.env['sale.order'].with_user(self.sale_user2).create({
|
||||
'partner_id': self.partner.id,
|
||||
'user_id': self.sale_user.id
|
||||
})
|
||||
|
||||
# Salesperson can't delete Sale Orders
|
||||
with self.assertRaises(AccessError):
|
||||
so_as_salesperson.unlink()
|
||||
|
||||
# Salesperson can confirm the SO
|
||||
so_as_salesperson.action_confirm()
|
||||
|
||||
@mute_logger('odoo.addons.base.models.ir_model', 'odoo.addons.base.models.ir_rule')
|
||||
def test_access_portal_user(self):
|
||||
""" Test portal user's access rights """
|
||||
SaleOrder = self.env['sale.order'].with_user(self.user_portal)
|
||||
so_as_portal_user = SaleOrder.browse(self.sale_order.id)
|
||||
|
||||
# Portal user can see the confirmed SO for which they are assigned as a customer
|
||||
with self.assertRaises(AccessError):
|
||||
so_as_portal_user.read()
|
||||
|
||||
self.sale_order.partner_id = self.user_portal.partner_id
|
||||
self.sale_order.action_confirm()
|
||||
# Portal user can't edit the SO
|
||||
with self.assertRaises(AccessError):
|
||||
so_as_portal_user.write({'team_id': self.sale_team.id})
|
||||
# Portal user can't create the SO
|
||||
with self.assertRaises(AccessError):
|
||||
SaleOrder.create({
|
||||
'partner_id': self.partner.id,
|
||||
})
|
||||
# Portal user can't delete the SO which is in 'draft' or 'cancel' state
|
||||
self.sale_order.action_cancel()
|
||||
with self.assertRaises(AccessError):
|
||||
so_as_portal_user.unlink()
|
||||
|
||||
@mute_logger('odoo.addons.base.models.ir_model')
|
||||
def test_access_employee(self):
|
||||
""" Test classic employee's access rights """
|
||||
SaleOrder = self.env['sale.order'].with_user(self.user_internal)
|
||||
so_as_internal_user = SaleOrder.browse(self.sale_order.id)
|
||||
|
||||
# Employee can't see any SO
|
||||
with self.assertRaises(AccessError):
|
||||
so_as_internal_user.read()
|
||||
# Employee can't edit the SO
|
||||
with self.assertRaises(AccessError):
|
||||
so_as_internal_user.write({'team_id': self.sale_team.id})
|
||||
# Employee can't create the SO
|
||||
with self.assertRaises(AccessError):
|
||||
SaleOrder.create({
|
||||
'partner_id': self.partner.id,
|
||||
})
|
||||
# Employee can't delete the SO
|
||||
with self.assertRaises(AccessError):
|
||||
so_as_internal_user.unlink()
|
||||
Loading…
Add table
Add a link
Reference in a new issue