sale/tests/test_access_rights.py

139 lines
5.4 KiB
Python

# -*- coding: utf-8 -*-
# Part of Odoo. See LICENSE file for full copyright and licensing details.
from odoo.exceptions import AccessError, UserError
from odoo.tests import tagged
from odoo.tools import mute_logger
from odoo.addons.base.tests.common import BaseUsersCommon
from odoo.addons.sale.tests.common import SaleCommon
@tagged('post_install', '-at_install')
class TestAccessRights(BaseUsersCommon, SaleCommon):
@classmethod
def setUpClass(cls):
super().setUpClass()
cls.sale_user2 = cls.env['res.users'].create({
'name': 'salesman_2',
'login': 'salesman_2',
'email': 'default_user_salesman_2@example.com',
'signature': '--\nMark',
'notification_type': 'email',
'groups_id': [(6, 0, cls.group_sale_salesman.ids)],
})
# Create the SO with a specific salesperson
cls.sale_order.user_id = cls.sale_user
def test_access_sales_manager(self):
""" Test sales manager's access rights """
SaleOrder = self.env['sale.order'].with_user(self.sale_manager)
so_as_sale_manager = SaleOrder.browse(self.sale_order.id)
# Manager can see the SO which is assigned to another salesperson
so_as_sale_manager.read()
# Manager can change a salesperson of the SO
so_as_sale_manager.write({'user_id': self.sale_user2.id})
# Manager can create the SO for other salesperson
sale_order = SaleOrder.create({
'partner_id': self.partner.id,
'user_id': self.sale_user.id
})
self.assertIn(
sale_order.id, SaleOrder.search([]).ids,
'Sales manager should be able to create the SO of other salesperson')
# Manager can confirm the SO
sale_order.action_confirm()
# Manager can not delete confirmed SO
with self.assertRaises(UserError), mute_logger('odoo.models.unlink'):
sale_order.unlink()
# Manager can delete the SO of other salesperson if SO is in 'draft' or 'cancel' state
so_as_sale_manager.unlink()
self.assertNotIn(
so_as_sale_manager.id, SaleOrder.search([]).ids,
'Sales manager should be able to delete the SO')
@mute_logger('odoo.addons.base.models.ir_model', 'odoo.addons.base.models.ir_rule')
def test_access_sales_person(self):
""" Test Salesperson's access rights """
SaleOrder = self.env['sale.order'].with_user(self.sale_user2)
so_as_salesperson = SaleOrder.browse(self.sale_order.id)
# Salesperson can see only their own sales order
with self.assertRaises(AccessError):
so_as_salesperson.read()
# Now assign the SO to themselves
# (using self.sale_order to do the change as superuser)
self.sale_order.write({'user_id': self.sale_user2.id})
# The salesperson is now able to read it
so_as_salesperson.read()
# Salesperson can change a Sales Team of SO
so_as_salesperson.write({'team_id': self.sale_team.id})
# Salesperson can't create a SO for other salesperson
with self.assertRaises(AccessError):
self.env['sale.order'].with_user(self.sale_user2).create({
'partner_id': self.partner.id,
'user_id': self.sale_user.id
})
# Salesperson can't delete Sale Orders
with self.assertRaises(AccessError):
so_as_salesperson.unlink()
# Salesperson can confirm the SO
so_as_salesperson.action_confirm()
@mute_logger('odoo.addons.base.models.ir_model', 'odoo.addons.base.models.ir_rule')
def test_access_portal_user(self):
""" Test portal user's access rights """
SaleOrder = self.env['sale.order'].with_user(self.user_portal)
so_as_portal_user = SaleOrder.browse(self.sale_order.id)
# Portal user can see the confirmed SO for which they are assigned as a customer
with self.assertRaises(AccessError):
so_as_portal_user.read()
self.sale_order.partner_id = self.user_portal.partner_id
self.sale_order.action_confirm()
# Portal user can't edit the SO
with self.assertRaises(AccessError):
so_as_portal_user.write({'team_id': self.sale_team.id})
# Portal user can't create the SO
with self.assertRaises(AccessError):
SaleOrder.create({
'partner_id': self.partner.id,
})
# Portal user can't delete the SO which is in 'draft' or 'cancel' state
self.sale_order.action_cancel()
with self.assertRaises(AccessError):
so_as_portal_user.unlink()
@mute_logger('odoo.addons.base.models.ir_model')
def test_access_employee(self):
""" Test classic employee's access rights """
SaleOrder = self.env['sale.order'].with_user(self.user_internal)
so_as_internal_user = SaleOrder.browse(self.sale_order.id)
# Employee can't see any SO
with self.assertRaises(AccessError):
so_as_internal_user.read()
# Employee can't edit the SO
with self.assertRaises(AccessError):
so_as_internal_user.write({'team_id': self.sale_team.id})
# Employee can't create the SO
with self.assertRaises(AccessError):
SaleOrder.create({
'partner_id': self.partner.id,
})
# Employee can't delete the SO
with self.assertRaises(AccessError):
so_as_internal_user.unlink()