Wipe addons/: full reset for clean re-upload
This commit is contained in:
@@ -1,44 +0,0 @@
|
||||
<?xml version="1.0" encoding="utf-8" ?>
|
||||
<odoo>
|
||||
|
||||
<record id="ir_module_category_tower" model="ir.module.category">
|
||||
<field name="name">Cetmix Tower</field>
|
||||
<field name="sequence">199</field>
|
||||
</record>
|
||||
|
||||
<record id="ir_module_category_tower_server" model="ir.module.category">
|
||||
<field name="parent_id" ref="ir_module_category_tower" />
|
||||
<field name="name">Access Level</field>
|
||||
</record>
|
||||
|
||||
<record id="group_user" model="res.groups">
|
||||
<field name="name">User</field>
|
||||
<field name="category_id" ref="ir_module_category_tower_server" />
|
||||
<field name="comment">
|
||||
Basic actions for selected servers.
|
||||
</field>
|
||||
</record>
|
||||
|
||||
<record id="group_manager" model="res.groups">
|
||||
<field name="name">Manager</field>
|
||||
<field name="category_id" ref="ir_module_category_tower_server" />
|
||||
<field name="implied_ids" eval="[(4, ref('group_user'))]" />
|
||||
<field name="comment">
|
||||
Create and modify selected servers.
|
||||
</field>
|
||||
</record>
|
||||
|
||||
<record id="group_root" model="res.groups">
|
||||
<field name="name">Root</field>
|
||||
<field name="category_id" ref="ir_module_category_tower_server" />
|
||||
<field name="implied_ids" eval="[(4, ref('group_manager'))]" />
|
||||
<field name="comment">
|
||||
Full control over all servers.
|
||||
</field>
|
||||
</record>
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
</odoo>
|
||||
@@ -1,34 +0,0 @@
|
||||
<?xml version="1.0" encoding="utf-8" ?>
|
||||
<odoo>
|
||||
<record id="rule_cx_tower_command_log_group_user_read" model="ir.rule">
|
||||
<field name="name">Tower command log: user access rule</field>
|
||||
<field name="model_id" ref="model_cx_tower_command_log" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_user'))]" />
|
||||
<field name="domain_force">[
|
||||
("access_level", "=", "1"),
|
||||
("create_uid", "=", user.id),
|
||||
("server_id.user_ids", "in", [user.id])
|
||||
]</field>
|
||||
</record>
|
||||
|
||||
<record id="rule_cx_tower_command_log_group_manager_read" model="ir.rule">
|
||||
<field name="name">Tower command log: manager access rule</field>
|
||||
<field name="model_id" ref="model_cx_tower_command_log" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">[
|
||||
"&",
|
||||
("access_level", "<=", "2"),
|
||||
"|",
|
||||
("server_id.user_ids", "in", [user.id]),
|
||||
("server_id.manager_ids", "in", [user.id])
|
||||
]</field>
|
||||
</record>
|
||||
|
||||
|
||||
<record id="rule_cx_tower_command_log_group_root_full" model="ir.rule">
|
||||
<field name="name">Tower command log: root access rule</field>
|
||||
<field name="model_id" ref="model_cx_tower_command_log" />
|
||||
<field name="domain_force">[(1, "=", 1)]</field>
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
|
||||
</record>
|
||||
</odoo>
|
||||
@@ -1,84 +0,0 @@
|
||||
<?xml version="1.0" encoding="utf-8" ?>
|
||||
<odoo>
|
||||
<!-- User: read allowed if access_level == 1 and either command.user_ids or a related server grants access via user_ids -->
|
||||
<record id="rule_cx_tower_command_group_user_read" model="ir.rule">
|
||||
<field name="name">Command: User read</field>
|
||||
<field name="model_id" ref="model_cx_tower_command" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_user'))]" />
|
||||
<field name="domain_force">
|
||||
["&",
|
||||
("access_level", "=", "1"),
|
||||
"|",
|
||||
("user_ids", "in", [user.id]),
|
||||
("server_ids.user_ids", "in", [user.id])
|
||||
]
|
||||
</field>
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager: read allowed if access_level <= 2 and command or server grants access -->
|
||||
<record id="rule_cx_tower_command_group_manager_read" model="ir.rule">
|
||||
<field name="name">Command: Manager read</field>
|
||||
<field name="model_id" ref="model_cx_tower_command" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">
|
||||
["&",
|
||||
("access_level", "<=", "2"),
|
||||
"|",
|
||||
"|", ("user_ids", "in", [user.id]), ("manager_ids", "in", [user.id]),
|
||||
"|",
|
||||
("server_ids", "=", False),
|
||||
"|",
|
||||
("server_ids.user_ids", "in", [user.id]),
|
||||
("server_ids.manager_ids", "in", [user.id])
|
||||
]
|
||||
</field>
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager: write & create allowed if access_level <= 2 and in command.manager_ids -->
|
||||
<record id="rule_cx_tower_command_group_manager_write" model="ir.rule">
|
||||
<field name="name">Command: Manager write & create</field>
|
||||
<field name="model_id" ref="model_cx_tower_command" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">
|
||||
[("access_level", "<=", "2"), ("manager_ids", "in", [user.id])]
|
||||
</field>
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="1" />
|
||||
<field name="perm_create" eval="1" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager: unlink allowed if access_level <= 2, creator, and in manager_ids -->
|
||||
<record id="rule_cx_tower_command_group_manager_unlink" model="ir.rule">
|
||||
<field name="name">Command: Manager unlink</field>
|
||||
<field name="model_id" ref="model_cx_tower_command" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">
|
||||
[
|
||||
("access_level", "<=", "2"),
|
||||
("create_uid", "=", user.id),
|
||||
("manager_ids", "in", [user.id])
|
||||
]
|
||||
</field>
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="1" />
|
||||
</record>
|
||||
|
||||
<!-- Root: unrestricted access -->
|
||||
<record id="rule_cx_tower_command_group_root_full" model="ir.rule">
|
||||
<field name="name">Command: Root unrestricted access</field>
|
||||
<field name="model_id" ref="model_cx_tower_command" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
|
||||
<field name="domain_force">[(1, '=', 1)]</field>
|
||||
</record>
|
||||
</odoo>
|
||||
@@ -1,52 +0,0 @@
|
||||
<?xml version="1.0" encoding="utf-8" ?>
|
||||
<odoo>
|
||||
<!-- User: Read access rule: Allow reading file records when the current user is in the related Server's user_ids -->
|
||||
<record id="rule_cx_tower_file_group_user_read" model="ir.rule">
|
||||
<field name="name">File: User read via related server (user_ids)</field>
|
||||
<field name="model_id" ref="model_cx_tower_file" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_user'))]" />
|
||||
<field name="domain_force">[('server_id.user_ids', 'in', [user.id])]</field>
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager: Write and Create access rule: Allow update and creation when current user is in related Server's manager_ids -->
|
||||
<record id="rule_cx_tower_file_group_manager_read_write" model="ir.rule">
|
||||
<field
|
||||
name="name"
|
||||
>File: Manager write & create via related server (manager_ids)</field>
|
||||
<field name="model_id" ref="model_cx_tower_file" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">[('server_id.manager_ids', 'in', [user.id])]</field>
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="1" />
|
||||
<field name="perm_create" eval="1" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager: Unlink access rule: Allow deletion only when the current user is in the related Server's manager_ids and is the record creator -->
|
||||
<record id="rule_cx_tower_file_group_manager_unlink" model="ir.rule">
|
||||
<field
|
||||
name="name"
|
||||
>File: Manager unlink via related server (manager_ids) and record creator</field>
|
||||
<field name="model_id" ref="model_cx_tower_file" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">
|
||||
[ ('server_id.manager_ids', 'in', [user.id]), ('create_uid', '=', user.id) ]
|
||||
</field>
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="1" />
|
||||
</record>
|
||||
|
||||
<!-- Root: Unrestricted access rule: Allow access to all files -->
|
||||
<record id="rule_cx_tower_file_group_root_full" model="ir.rule">
|
||||
<field name="name">File: Root Unrestricted Access</field>
|
||||
<field name="model_id" ref="model_cx_tower_file" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
|
||||
<field name="domain_force">[(1, '=', 1)]</field>
|
||||
</record>
|
||||
</odoo>
|
||||
@@ -1,52 +0,0 @@
|
||||
<?xml version="1.0" encoding="utf-8" ?>
|
||||
<odoo>
|
||||
|
||||
|
||||
<!-- Manager: Read access (if the current user is in user_ids or manager_ids) -->
|
||||
<record id="rule_cx_tower_file_template_group_manager_read" model="ir.rule">
|
||||
<field name="name">File: Manager read (user_ids or manager_ids)</field>
|
||||
<field name="model_id" ref="model_cx_tower_file_template" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">
|
||||
["|", ("user_ids", "in", [user.id]), ("manager_ids", "in", [user.id])]
|
||||
</field>
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager: Write and Create access (if the current user is in manager_ids) -->
|
||||
<record id="rule_cx_tower_file_template_group_manager_write" model="ir.rule">
|
||||
<field name="name">File: Manager write & create (manager_ids)</field>
|
||||
<field name="model_id" ref="model_cx_tower_file_template" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">[('manager_ids', 'in', [user.id])]</field>
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="1" />
|
||||
<field name="perm_create" eval="1" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager: Unlink access (if the current user is in manager_ids and is the record creator) -->
|
||||
<record id="rule_cx_tower_file_template_group_manager_unlink" model="ir.rule">
|
||||
<field name="name">File: Manager unlink (manager_ids & creator)</field>
|
||||
<field name="model_id" ref="model_cx_tower_file_template" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">
|
||||
[("manager_ids", "in", [user.id]), ("create_uid", "=", user.id)]
|
||||
</field>
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="1" />
|
||||
</record>
|
||||
|
||||
<!-- Root: unlimited access -->
|
||||
<record id="rule_cx_tower_file_template_group_root_full" model="ir.rule">
|
||||
<field name="name">File: Root unrestricted access</field>
|
||||
<field name="model_id" ref="model_cx_tower_file_template" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
|
||||
<field name="domain_force">[(1, '=', 1)]</field>
|
||||
</record>
|
||||
</odoo>
|
||||
@@ -1,75 +0,0 @@
|
||||
<?xml version="1.0" encoding="utf-8" ?>
|
||||
<odoo>
|
||||
|
||||
<!-- User Read Access -->
|
||||
<!-- Action access level is "User" AND Template access level is "User" OR user is added in "Users" in the Jet Template OR user is added in "Users" of any Jets created from the template -->
|
||||
<record id="rule_cx_tower_jet_action_user_read" model="ir.rule">
|
||||
<field name="name">Jet Action: User Read Access</field>
|
||||
<field name="model_id" ref="model_cx_tower_jet_action" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_user'))]" />
|
||||
<field name="domain_force">
|
||||
[
|
||||
("access_level", "=", "1"),
|
||||
"|",
|
||||
("jet_template_id.access_level", "=", "1"),
|
||||
"|",
|
||||
("jet_template_id.user_ids", "in", [user.id]),
|
||||
("jet_template_id.jet_ids.user_ids", "in", [user.id])
|
||||
]
|
||||
</field>
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager Read Access -->
|
||||
<!-- Action access level is "Manager" or less AND Jet Template access level is "Manager" or less OR user is added in "Users" or "Managers" in the template -->
|
||||
<record id="rule_cx_tower_jet_action_manager_read" model="ir.rule">
|
||||
<field name="name">Jet Action: Manager Read Access</field>
|
||||
<field name="model_id" ref="model_cx_tower_jet_action" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">
|
||||
[
|
||||
("access_level", "<=", "2"),
|
||||
"|",
|
||||
("jet_template_id.access_level", "<=", "2"),
|
||||
"|",
|
||||
("jet_template_id.user_ids", "in", [user.id]),
|
||||
("jet_template_id.manager_ids", "in", [user.id])
|
||||
]
|
||||
</field>
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager Write/Create/Unlink Access -->
|
||||
<!-- Action access level is "Manager" or less AND user is added to "Managers" of the Jet Template -->
|
||||
<record id="rule_cx_tower_jet_action_manager_write" model="ir.rule">
|
||||
<field name="name">Jet Action: Manager Write/Create/Unlink</field>
|
||||
<field name="model_id" ref="model_cx_tower_jet_action" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">
|
||||
[
|
||||
("access_level", "<=", "2"),
|
||||
("jet_template_id.manager_ids", "in", [user.id])
|
||||
]
|
||||
</field>
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="1" />
|
||||
<field name="perm_create" eval="1" />
|
||||
<field name="perm_unlink" eval="1" />
|
||||
</record>
|
||||
|
||||
<!-- Root Full Access -->
|
||||
<!-- Any record -->
|
||||
<record id="rule_cx_tower_jet_action_root_full" model="ir.rule">
|
||||
<field name="name">Jet Action: Root Full Access</field>
|
||||
<field name="model_id" ref="model_cx_tower_jet_action" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
|
||||
<field name="domain_force">[(1, '=', 1)]</field>
|
||||
</record>
|
||||
|
||||
</odoo>
|
||||
@@ -1,52 +0,0 @@
|
||||
<?xml version="1.0" encoding="utf-8" ?>
|
||||
<odoo>
|
||||
|
||||
<!-- Manager Read Access -->
|
||||
<!-- User is in "Users" or "Managers" of both the Jet and the depended Jet -->
|
||||
<record id="rule_cx_tower_jet_dependency_manager_read" model="ir.rule">
|
||||
<field name="name">Jet Dependency: Manager Read Access</field>
|
||||
<field name="model_id" ref="model_cx_tower_jet_dependency" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">
|
||||
["&",
|
||||
"|",
|
||||
("jet_id.user_ids", "in", [user.id]),
|
||||
("jet_id.manager_ids", "in", [user.id]),
|
||||
"|",
|
||||
("jet_depends_on_id.user_ids", "in", [user.id]),
|
||||
("jet_depends_on_id.manager_ids", "in", [user.id])
|
||||
]
|
||||
</field>
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager Write/Create/Delete Access -->
|
||||
<!-- User is in "Managers" of the Jet AND in "Users" or "Managers" of the depended Jet -->
|
||||
<record id="rule_cx_tower_jet_dependency_manager_crud" model="ir.rule">
|
||||
<field
|
||||
name="name"
|
||||
>Jet Dependency: Manager write & create & unlink</field>
|
||||
<field name="model_id" ref="model_cx_tower_jet_dependency" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">
|
||||
[
|
||||
("jet_id.manager_ids", "in", [user.id]),
|
||||
"|",
|
||||
("jet_depends_on_id.user_ids", "in", [user.id]),
|
||||
("jet_depends_on_id.manager_ids", "in", [user.id])
|
||||
]
|
||||
</field>
|
||||
<field name="perm_read" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Root Full Access -->
|
||||
<record id="rule_cx_tower_jet_dependency_root_full" model="ir.rule">
|
||||
<field name="name">Jet Dependency: Root Full Access</field>
|
||||
<field name="model_id" ref="model_cx_tower_jet_dependency" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
|
||||
<field name="domain_force">[(1, '=', 1)]</field>
|
||||
</record>
|
||||
|
||||
</odoo>
|
||||
@@ -1,93 +0,0 @@
|
||||
<?xml version="1.0" encoding="utf-8" ?>
|
||||
<odoo>
|
||||
|
||||
<!-- User Read Access -->
|
||||
<!-- User is added to "Users" in jet AND user is added to "Users" in related Server -->
|
||||
<record id="rule_cx_tower_jet_user_read" model="ir.rule">
|
||||
<field name="name">Jet: User Read Access</field>
|
||||
<field name="model_id" ref="model_cx_tower_jet" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_user'))]" />
|
||||
<field name="domain_force">
|
||||
[
|
||||
("user_ids", "in", [user.id]),
|
||||
("server_id.user_ids", "in", [user.id])
|
||||
]
|
||||
</field>
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager Read Access -->
|
||||
<!-- User is added to "Users" or "Managers" in jet AND user is added to "Users" or "Managers" in related Server -->
|
||||
<record id="rule_cx_tower_jet_manager_read" model="ir.rule">
|
||||
<field name="name">Jet: Manager Read Access</field>
|
||||
<field name="model_id" ref="model_cx_tower_jet" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">
|
||||
["&",
|
||||
"|",
|
||||
("user_ids", "in", [user.id]),
|
||||
("manager_ids", "in", [user.id]),
|
||||
"|",
|
||||
("server_id.user_ids", "in", [user.id]),
|
||||
("server_id.manager_ids", "in", [user.id])
|
||||
]
|
||||
</field>
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager Write/Create Access -->
|
||||
<!-- User is added to "Managers" in jet AND user is added to "Users" or "Managers" in related Server -->
|
||||
<record id="rule_cx_tower_jet_manager_write" model="ir.rule">
|
||||
<field name="name">Jet: Manager write & create</field>
|
||||
<field name="model_id" ref="model_cx_tower_jet" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">
|
||||
[
|
||||
("manager_ids", "in", [user.id]),
|
||||
"|",
|
||||
("server_id.user_ids", "in", [user.id]),
|
||||
("server_id.manager_ids", "in", [user.id])
|
||||
]
|
||||
</field>
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="1" />
|
||||
<field name="perm_create" eval="1" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager Delete Access -->
|
||||
<!-- User is added to "Managers" in jet AND record is created by the user AND user is added to "Users" or "Managers" in related Server -->
|
||||
<record id="rule_cx_tower_jet_manager_unlink" model="ir.rule">
|
||||
<field name="name">Jet: Manager unlink</field>
|
||||
<field name="model_id" ref="model_cx_tower_jet" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">
|
||||
[
|
||||
("manager_ids", "in", [user.id]),
|
||||
("create_uid", "=", user.id),
|
||||
"|",
|
||||
("server_id.user_ids", "in", [user.id]),
|
||||
("server_id.manager_ids", "in", [user.id])
|
||||
]
|
||||
</field>
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="1" />
|
||||
</record>
|
||||
|
||||
<!-- Root Full Access -->
|
||||
<record id="rule_cx_tower_jet_root_full" model="ir.rule">
|
||||
<field name="name">Jet: Root Full Access</field>
|
||||
<field name="model_id" ref="model_cx_tower_jet" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
|
||||
<field name="domain_force">[(1, '=', 1)]</field>
|
||||
</record>
|
||||
|
||||
</odoo>
|
||||
@@ -1,53 +0,0 @@
|
||||
<?xml version="1.0" encoding="utf-8" ?>
|
||||
<odoo>
|
||||
|
||||
<!-- Manager Read Access -->
|
||||
<!-- Template access level is "Manager" or less OR user is added in "Users" or "Managers" in the Jet Template -->
|
||||
<record id="rule_cx_tower_jet_template_dependency_manager_read" model="ir.rule">
|
||||
<field name="name">Jet Template Dependency: Manager Read Access</field>
|
||||
<field name="model_id" ref="model_cx_tower_jet_template_dependency" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">
|
||||
["|",
|
||||
("template_id.access_level", "<=", "2"),
|
||||
"|",
|
||||
("template_id.user_ids", "in", [user.id]),
|
||||
("template_id.manager_ids", "in", [user.id])
|
||||
]
|
||||
</field>
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager Write/Create/Delete Access -->
|
||||
<!-- Template access level is "Manager" or less AND user is added in "Managers" in the Jet Template -->
|
||||
<record id="rule_cx_tower_jet_template_dependency_manager_crud" model="ir.rule">
|
||||
<field
|
||||
name="name"
|
||||
>Jet Template Dependency: Manager write & create & unlink</field>
|
||||
<field name="model_id" ref="model_cx_tower_jet_template_dependency" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">
|
||||
[("template_id.access_level", "<=", "2"), ("template_id.manager_ids", "in", [user.id])]
|
||||
</field>
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="1" />
|
||||
<field name="perm_create" eval="1" />
|
||||
<field name="perm_unlink" eval="1" />
|
||||
</record>
|
||||
|
||||
<!-- Root Full Access -->
|
||||
<record id="rule_cx_tower_jet_template_dependency_root_full" model="ir.rule">
|
||||
<field name="name">Jet Template Dependency: Root Full Access</field>
|
||||
<field name="model_id" ref="model_cx_tower_jet_template_dependency" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
|
||||
<field name="domain_force">[(1, '=', 1)]</field>
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="1" />
|
||||
<field name="perm_create" eval="1" />
|
||||
<field name="perm_unlink" eval="1" />
|
||||
</record>
|
||||
|
||||
</odoo>
|
||||
@@ -1,34 +0,0 @@
|
||||
<?xml version="1.0" encoding="utf-8" ?>
|
||||
<odoo>
|
||||
|
||||
<!-- Manager Read Access -->
|
||||
<!-- User is added to "Users" or "Managers" in the related server AND template access level is "Manager" or less OR user is added in "Users" -->
|
||||
<record id="rule_cx_tower_jet_template_install_line_manager_read" model="ir.rule">
|
||||
<field name="name">Jet Template Install Line: Manager Read Access</field>
|
||||
<field name="model_id" ref="model_cx_tower_jet_template_install_line" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">
|
||||
["&",
|
||||
"|",
|
||||
("server_id.user_ids", "in", [user.id]),
|
||||
("server_id.manager_ids", "in", [user.id]),
|
||||
"|",
|
||||
("jet_template_id.access_level", "<=", "2"),
|
||||
("jet_template_id.user_ids", "in", [user.id])
|
||||
]
|
||||
</field>
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Root Full Access -->
|
||||
<record id="rule_cx_tower_jet_template_install_line_root_full" model="ir.rule">
|
||||
<field name="name">Jet Template Install Line: Root Full Access</field>
|
||||
<field name="model_id" ref="model_cx_tower_jet_template_install_line" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
|
||||
<field name="domain_force">[(1, '=', 1)]</field>
|
||||
</record>
|
||||
|
||||
</odoo>
|
||||
@@ -1,34 +0,0 @@
|
||||
<?xml version="1.0" encoding="utf-8" ?>
|
||||
<odoo>
|
||||
|
||||
<!-- Manager Read Access -->
|
||||
<!-- User is added to "Users" or "Managers" in the related server AND template access level is "Manager" or less OR user is added in "Users" -->
|
||||
<record id="rule_cx_tower_jet_template_install_manager_read" model="ir.rule">
|
||||
<field name="name">Jet Template Install: Manager Read Access</field>
|
||||
<field name="model_id" ref="model_cx_tower_jet_template_install" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">
|
||||
["&",
|
||||
"|",
|
||||
("server_id.user_ids", "in", [user.id]),
|
||||
("server_id.manager_ids", "in", [user.id]),
|
||||
"|",
|
||||
("jet_template_id.access_level", "<=", "2"),
|
||||
("jet_template_id.user_ids", "in", [user.id])
|
||||
]
|
||||
</field>
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Root Full Access -->
|
||||
<record id="rule_cx_tower_jet_template_install_root_full" model="ir.rule">
|
||||
<field name="name">Jet Template Install: Root Full Access</field>
|
||||
<field name="model_id" ref="model_cx_tower_jet_template_install" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
|
||||
<field name="domain_force">[(1, '=', 1)]</field>
|
||||
</record>
|
||||
|
||||
</odoo>
|
||||
@@ -1,87 +0,0 @@
|
||||
<?xml version="1.0" encoding="utf-8" ?>
|
||||
<odoo>
|
||||
|
||||
<!-- User Read Access -->
|
||||
<!-- Access level is "User" or user is added in "Users" or user is added in "Users" of any Jets created from the template -->
|
||||
<record id="rule_cx_tower_jet_template_user_read" model="ir.rule">
|
||||
<field name="name">Jet Template: User Read Access</field>
|
||||
<field name="model_id" ref="model_cx_tower_jet_template" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_user'))]" />
|
||||
<field name="domain_force">
|
||||
["|","|",
|
||||
("access_level", "=", "1"),
|
||||
("user_ids", "in", [user.id]),
|
||||
("jet_ids.user_ids", "in", [user.id])
|
||||
]
|
||||
</field>
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager Read Access -->
|
||||
<!-- Access level is "Manager" or less OR user is added in "Users" or "Managers" -->
|
||||
<record id="rule_cx_tower_jet_template_manager_read" model="ir.rule">
|
||||
<field name="name">Jet Template: Manager Read Access</field>
|
||||
<field name="model_id" ref="model_cx_tower_jet_template" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">
|
||||
["|",
|
||||
("access_level", "<=", "2"),
|
||||
"|", "|",
|
||||
("user_ids", "in", [user.id]),
|
||||
("manager_ids", "in", [user.id]),
|
||||
("jet_ids.manager_ids", "in", [user.id])
|
||||
|
||||
]
|
||||
</field>
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager Write/Create Access -->
|
||||
<!-- Access level is "Manager" or less AND user is added to "Managers" -->
|
||||
<record id="rule_cx_tower_jet_template_manager_write" model="ir.rule">
|
||||
<field name="name">Jet Template: Manager write & create</field>
|
||||
<field name="model_id" ref="model_cx_tower_jet_template" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">
|
||||
[("access_level", "<=", "2"), ("manager_ids", "in", [user.id])]
|
||||
</field>
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="1" />
|
||||
<field name="perm_create" eval="1" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager Delete Access -->
|
||||
<!-- Access level is "Manager" or less AND user is added to "Managers" AND the record is created by the user -->
|
||||
<record id="rule_cx_tower_jet_template_manager_unlink" model="ir.rule">
|
||||
<field name="name">Jet Template: Manager unlink</field>
|
||||
<field name="model_id" ref="model_cx_tower_jet_template" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">
|
||||
[("access_level", "<=", "2"), ("manager_ids", "in", [user.id]), ("create_uid", "=", user.id)]
|
||||
</field>
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="1" />
|
||||
</record>
|
||||
|
||||
<!-- Root Full Access -->
|
||||
<record id="rule_cx_tower_jet_template_root_full" model="ir.rule">
|
||||
<field name="name">Jet Template: Root Full Access</field>
|
||||
<field name="model_id" ref="model_cx_tower_jet_template" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
|
||||
<field name="domain_force">[(1, '=', 1)]</field>
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="1" />
|
||||
<field name="perm_create" eval="1" />
|
||||
<field name="perm_unlink" eval="1" />
|
||||
</record>
|
||||
|
||||
</odoo>
|
||||
@@ -1,70 +0,0 @@
|
||||
<?xml version="1.0" encoding="utf-8" ?>
|
||||
<odoo>
|
||||
|
||||
<!-- Manager Read Access -->
|
||||
<!-- Access level is Manager (2) and User is added in "Users" or "Managers" of the Jet -->
|
||||
<record id="rule_cx_tower_jet_waypoint_manager_read" model="ir.rule">
|
||||
<field name="name">Jet Waypoint: Manager Read Access</field>
|
||||
<field name="model_id" ref="model_cx_tower_jet_waypoint" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">
|
||||
[("access_level", "<=", "2"),
|
||||
"|",
|
||||
("jet_id.user_ids", "in", [user.id]),
|
||||
("jet_id.manager_ids", "in", [user.id])
|
||||
]
|
||||
</field>
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager Write/Create Access -->
|
||||
<!-- Access level is Manager (2) AND user is added to "Managers" of the Jet Template -->
|
||||
<record id="rule_cx_tower_jet_waypoint_manager_write" model="ir.rule">
|
||||
<field name="name">Jet Waypoint: Manager write & create</field>
|
||||
<field name="model_id" ref="model_cx_tower_jet_waypoint" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">
|
||||
[("access_level", "<=", "2"),
|
||||
("jet_id.jet_template_id.manager_ids", "in", [user.id])
|
||||
]
|
||||
</field>
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="1" />
|
||||
<field name="perm_create" eval="1" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager Delete Access -->
|
||||
<!-- Access level is Manager (2) AND user is added to "Managers" of the Jet Template AND the record is created by the user -->
|
||||
<record id="rule_cx_tower_jet_waypoint_manager_unlink" model="ir.rule">
|
||||
<field name="name">Jet Waypoint: Manager unlink</field>
|
||||
<field name="model_id" ref="model_cx_tower_jet_waypoint" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">
|
||||
[("access_level", "<=", "2"),
|
||||
("jet_id.jet_template_id.manager_ids", "in", [user.id]),
|
||||
("create_uid", "=", user.id)
|
||||
]
|
||||
</field>
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="1" />
|
||||
</record>
|
||||
|
||||
<!-- Root Full Access -->
|
||||
<record id="rule_cx_tower_jet_waypoint_root_full" model="ir.rule">
|
||||
<field name="name">Jet Waypoint: Root Full Access</field>
|
||||
<field name="model_id" ref="model_cx_tower_jet_waypoint" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
|
||||
<field name="domain_force">[(1, '=', 1)]</field>
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="1" />
|
||||
<field name="perm_create" eval="1" />
|
||||
<field name="perm_unlink" eval="1" />
|
||||
</record>
|
||||
|
||||
</odoo>
|
||||
@@ -1,70 +0,0 @@
|
||||
<?xml version="1.0" encoding="utf-8" ?>
|
||||
<odoo>
|
||||
|
||||
<!-- Manager Read Access -->
|
||||
<!-- Access level is Manager (2) and User is added in "Users" or "Managers" of the Jet Template -->
|
||||
<record id="rule_cx_tower_jet_waypoint_template_manager_read" model="ir.rule">
|
||||
<field name="name">Jet Waypoint Template: Manager Read Access</field>
|
||||
<field name="model_id" ref="model_cx_tower_jet_waypoint_template" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">
|
||||
[("access_level", "<=", "2"),
|
||||
"|",
|
||||
("jet_template_id.user_ids", "in", [user.id]),
|
||||
("jet_template_id.manager_ids", "in", [user.id])
|
||||
]
|
||||
</field>
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager Write/Create Access -->
|
||||
<!-- Access level is Manager (2) AND user is added to "Managers" of the Jet Template -->
|
||||
<record id="rule_cx_tower_jet_waypoint_template_manager_write" model="ir.rule">
|
||||
<field name="name">Jet Waypoint Template: Manager write & create</field>
|
||||
<field name="model_id" ref="model_cx_tower_jet_waypoint_template" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">
|
||||
[("access_level", "<=", "2"),
|
||||
("jet_template_id.manager_ids", "in", [user.id])
|
||||
]
|
||||
</field>
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="1" />
|
||||
<field name="perm_create" eval="1" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager Delete Access -->
|
||||
<!-- Access level is Manager (2) AND user is added to "Managers" of the Jet Template AND the record is created by the user -->
|
||||
<record id="rule_cx_tower_jet_waypoint_template_manager_unlink" model="ir.rule">
|
||||
<field name="name">Jet Waypoint Template: Manager unlink</field>
|
||||
<field name="model_id" ref="model_cx_tower_jet_waypoint_template" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">
|
||||
[("access_level", "<=", "2"),
|
||||
("jet_template_id.manager_ids", "in", [user.id]),
|
||||
("create_uid", "=", user.id)
|
||||
]
|
||||
</field>
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="1" />
|
||||
</record>
|
||||
|
||||
<!-- Root Full Access -->
|
||||
<record id="rule_cx_tower_jet_waypoint_template_root_full" model="ir.rule">
|
||||
<field name="name">Jet Waypoint Template: Root Full Access</field>
|
||||
<field name="model_id" ref="model_cx_tower_jet_waypoint_template" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
|
||||
<field name="domain_force">[(1, '=', 1)]</field>
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="1" />
|
||||
<field name="perm_create" eval="1" />
|
||||
<field name="perm_unlink" eval="1" />
|
||||
</record>
|
||||
|
||||
</odoo>
|
||||
@@ -1,99 +0,0 @@
|
||||
<?xml version="1.0" encoding="utf-8" ?>
|
||||
<odoo>
|
||||
<!-- Manager Read Rules -->
|
||||
<record id="rule_key_manager_read_users" model="ir.rule">
|
||||
<field name="name">Key: Manager Read Access - Users/Managers</field>
|
||||
<field name="model_id" ref="model_cx_tower_key" />
|
||||
<field
|
||||
name="domain_force"
|
||||
>['|', ('user_ids', 'in', [user.id]), ('manager_ids', 'in', [user.id])]</field>
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<record id="rule_key_manager_read_secret" model="ir.rule">
|
||||
<field name="name">Key: Manager Read Access - Secret Type</field>
|
||||
<field name="model_id" ref="model_cx_tower_key" />
|
||||
<field name="domain_force">[('key_type', '=', 's')]</field>
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<record id="rule_key_manager_read_ssh" model="ir.rule">
|
||||
<field name="name">Key: Manager Read Access - SSH Key</field>
|
||||
<field name="model_id" ref="model_cx_tower_key" />
|
||||
<field name="domain_force">[('key_type', '=', 'k'), '|',
|
||||
('server_ssh_ids.user_ids', 'in', [user.id]),
|
||||
('server_ssh_ids.manager_ids', 'in', [user.id])]</field>
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager Write/Create Rules -->
|
||||
<record id="rule_key_manager_write_managers" model="ir.rule">
|
||||
<field name="name">Key: Manager Write/Create Access - Managers</field>
|
||||
<field name="model_id" ref="model_cx_tower_key" />
|
||||
<field name="domain_force">[('manager_ids', 'in', [user.id])]</field>
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="1" />
|
||||
<field name="perm_create" eval="1" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<record id="rule_key_manager_write_ssh" model="ir.rule">
|
||||
<field name="name">Key: Manager Write/Create Access - SSH Key</field>
|
||||
<field name="model_id" ref="model_cx_tower_key" />
|
||||
<field name="domain_force">['&', ('key_type', '=', 'k'),
|
||||
('server_ssh_ids.manager_ids', 'in', [user.id])]</field>
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="1" />
|
||||
<field name="perm_create" eval="1" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager Delete Rules -->
|
||||
<record id="rule_key_manager_unlink_managers" model="ir.rule">
|
||||
<field name="name">Key: Manager Delete Access - Managers</field>
|
||||
<field name="model_id" ref="model_cx_tower_key" />
|
||||
<field
|
||||
name="domain_force"
|
||||
>[('manager_ids', 'in', [user.id]), ('create_uid', '=', user.id)]</field>
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="1" />
|
||||
</record>
|
||||
|
||||
<record id="rule_key_manager_unlink_ssh" model="ir.rule">
|
||||
<field name="name">Key: Manager Delete Access - SSH Key</field>
|
||||
<field name="model_id" ref="model_cx_tower_key" />
|
||||
<field name="domain_force">[('key_type', '=', 'k'),
|
||||
('server_ssh_ids.manager_ids', 'in', [user.id]),
|
||||
('create_uid', '=', user.id)]</field>
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="1" />
|
||||
</record>
|
||||
|
||||
<!-- Root Access Rule -->
|
||||
<record id="rule_key_root" model="ir.rule">
|
||||
<field name="name">Key: Root Full Access</field>
|
||||
<field name="model_id" ref="model_cx_tower_key" />
|
||||
<field name="domain_force">[(1, '=', 1)]</field>
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
|
||||
</record>
|
||||
</odoo>
|
||||
@@ -1,92 +0,0 @@
|
||||
<?xml version="1.0" encoding="utf-8" ?>
|
||||
<odoo>
|
||||
<!-- Manager Read Rules -->
|
||||
<record id="rule_key_value_manager_read_key" model="ir.rule">
|
||||
<field name="name">Key Value: Manager Read Access - Key Users/Managers</field>
|
||||
<field name="model_id" ref="model_cx_tower_key_value" />
|
||||
<field
|
||||
name="domain_force"
|
||||
>['|', ('key_id.user_ids', 'in', [user.id]), ('key_id.manager_ids', 'in', [user.id])]</field>
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<record id="rule_key_value_manager_read_server" model="ir.rule">
|
||||
<field
|
||||
name="name"
|
||||
>Key Value: Manager Read Access - Server Users/Managers</field>
|
||||
<field name="model_id" ref="model_cx_tower_key_value" />
|
||||
<field name="domain_force">[('key_id.key_type', '=', 's'),
|
||||
'|', '|', ('server_id', '=', False),
|
||||
('server_id.user_ids', 'in', [user.id]),
|
||||
('server_id.manager_ids', 'in', [user.id])]</field>
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager Write/Create Rules -->
|
||||
<record id="rule_key_value_manager_write_key" model="ir.rule">
|
||||
<field name="name">Key Value: Manager Write/Create Access - Key Managers</field>
|
||||
<field name="model_id" ref="model_cx_tower_key_value" />
|
||||
<field name="domain_force">[('key_id.manager_ids', 'in', [user.id])]</field>
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="1" />
|
||||
<field name="perm_create" eval="1" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<record id="rule_key_value_manager_write_server" model="ir.rule">
|
||||
<field
|
||||
name="name"
|
||||
>Key Value: Manager Write/Create Access - Server Managers</field>
|
||||
<field name="model_id" ref="model_cx_tower_key_value" />
|
||||
<field name="domain_force">[('server_id.manager_ids', 'in', [user.id])]</field>
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="1" />
|
||||
<field name="perm_create" eval="1" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager Delete Rules -->
|
||||
<record id="rule_key_value_manager_unlink_key" model="ir.rule">
|
||||
<field name="name">Key Value: Manager Delete Access - Key Managers</field>
|
||||
<field name="model_id" ref="model_cx_tower_key_value" />
|
||||
<field
|
||||
name="domain_force"
|
||||
>[('key_id.key_type', '=', 's'),('key_id.manager_ids', 'in', [user.id]), ('create_uid', '=', user.id)]</field>
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="1" />
|
||||
</record>
|
||||
|
||||
<record id="rule_key_value_manager_unlink_server" model="ir.rule">
|
||||
<field name="name">Key Value: Manager Delete Access - Server Managers</field>
|
||||
<field name="model_id" ref="model_cx_tower_key_value" />
|
||||
<field
|
||||
name="domain_force"
|
||||
>[('key_id.key_type', '=', 's'),('server_id.manager_ids', 'in', [user.id]), ('create_uid', '=', user.id)]</field>
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="1" />
|
||||
</record>
|
||||
|
||||
<!-- Root Access Rule -->
|
||||
<record id="rule_key_value_root" model="ir.rule">
|
||||
<field name="name">Key Value: Root Full Access</field>
|
||||
<field name="model_id" ref="model_cx_tower_key_value" />
|
||||
<field name="domain_force">[(1, '=', 1)]</field>
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
|
||||
</record>
|
||||
</odoo>
|
||||
@@ -1,90 +0,0 @@
|
||||
<?xml version="1.0" encoding="utf-8" ?>
|
||||
<odoo>
|
||||
<!-- User: read rule for cx.tower.plan_line.action -->
|
||||
<record id="rule_cx_tower_plan_line_action_group_user_read" model="ir.rule">
|
||||
<field name="name">Plan Line Action: User read</field>
|
||||
<field name="model_id" ref="model_cx_tower_plan_line_action" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_user'))]" />
|
||||
<field name="domain_force">
|
||||
["&",
|
||||
("access_level", "=", "1"),
|
||||
"|",
|
||||
("plan_id.user_ids", "in", [user.id]),
|
||||
("plan_id.server_ids.user_ids", "in", [user.id])
|
||||
]
|
||||
</field>
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager: read rule for cx.tower.plan.line.action -->
|
||||
<record id="rule_cx_tower_plan_line_action_group_manager_read" model="ir.rule">
|
||||
<field name="name">Plan Line Action: Manager read</field>
|
||||
<field name="model_id" ref="model_cx_tower_plan_line_action" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<!-- The domain requires:
|
||||
1. access_level <= "2"
|
||||
2. AND either the plan itself grants access via (user_ids OR manager_ids)
|
||||
OR there are no related servers
|
||||
OR a related server grants access via (server_ids.user_ids OR server_ids.manager_ids)
|
||||
-->
|
||||
<field name="domain_force">
|
||||
["&",
|
||||
("access_level", "<=", "2"),
|
||||
"|",
|
||||
"|", ("plan_id.user_ids", "in", [user.id]), ("plan_id.manager_ids", "in", [user.id]),
|
||||
"|",
|
||||
("plan_id.server_ids", "=", False),
|
||||
"|",
|
||||
("plan_id.server_ids.user_ids", "in", [user.id]),
|
||||
("plan_id.server_ids.manager_ids", "in", [user.id])
|
||||
]
|
||||
</field>
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager: write & create rule for cx.tower.plan_line_action -->
|
||||
<record id="rule_cx_tower_plan_line_action_group_manager_write" model="ir.rule">
|
||||
<field name="name">Plan Line Action: Manager write & create</field>
|
||||
<field name="model_id" ref="model_cx_tower_plan_line_action" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">
|
||||
["&", ("access_level", "<=", "2"), ("plan_id.manager_ids", "in", [user.id])]
|
||||
</field>
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="1" />
|
||||
<field name="perm_create" eval="1" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager: unlink rule for cx.tower.plan.line.action -->
|
||||
<record id="rule_cx_tower_plan_line_action_group_manager_unlink" model="ir.rule">
|
||||
<field name="name">Plan Line Action: Manager unlink</field>
|
||||
<field name="model_id" ref="model_cx_tower_plan_line_action" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">
|
||||
[
|
||||
("access_level", "<=", "2"),
|
||||
("create_uid", "=", user.id),
|
||||
("plan_id.manager_ids", "in", [user.id])
|
||||
]
|
||||
</field>
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="1" />
|
||||
</record>
|
||||
|
||||
<!-- Root: unrestricted access rule for cx.tower.plan.line.action -->
|
||||
<record id="rule_cx_tower_plan_line_action_group_root_full" model="ir.rule">
|
||||
<field name="name">Plan Line Action: Root unrestricted access</field>
|
||||
<field name="model_id" ref="model_cx_tower_plan_line_action" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
|
||||
<field name="domain_force">[(1, '=', 1)]</field>
|
||||
</record>
|
||||
</odoo>
|
||||
@@ -1,90 +0,0 @@
|
||||
<?xml version="1.0" encoding="utf-8" ?>
|
||||
<odoo>
|
||||
<!-- User: read rule for cx.tower.plan.line -->
|
||||
<record id="rule_cx_tower_plan_line_group_user_read" model="ir.rule">
|
||||
<field name="name">Plan Line: User read</field>
|
||||
<field name="model_id" ref="model_cx_tower_plan_line" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_user'))]" />
|
||||
<field name="domain_force">
|
||||
["&",
|
||||
("access_level", "=", "1"),
|
||||
"|",
|
||||
("plan_id.user_ids", "in", [user.id]),
|
||||
("plan_id.server_ids.user_ids", "in", [user.id])
|
||||
]
|
||||
</field>
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager: read rule for cx.tower.plan.line -->
|
||||
<record id="rule_cx_tower_plan_line_group_manager_read" model="ir.rule">
|
||||
<field name="name">Plan Line: Manager read</field>
|
||||
<field name="model_id" ref="model_cx_tower_plan_line" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<!-- The domain requires:
|
||||
1. access_level <= "2"
|
||||
2. AND either the plan itself grants access via (user_ids OR manager_ids)
|
||||
OR there are no related servers
|
||||
OR a related server grants access via (server_ids.user_ids OR server_ids.manager_ids)
|
||||
-->
|
||||
<field name="domain_force">
|
||||
["&",
|
||||
("access_level", "<=", "2"),
|
||||
"|",
|
||||
"|", ("plan_id.user_ids", "in", [user.id]), ("plan_id.manager_ids", "in", [user.id]),
|
||||
"|",
|
||||
("plan_id.server_ids", "=", False),
|
||||
"|",
|
||||
("plan_id.server_ids.user_ids", "in", [user.id]),
|
||||
("plan_id.server_ids.manager_ids", "in", [user.id])
|
||||
]
|
||||
</field>
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager: write & create rule for cx.tower.plan.line -->
|
||||
<record id="rule_cx_tower_plan_line_group_manager_write" model="ir.rule">
|
||||
<field name="name">Plan Line: Manager write & create</field>
|
||||
<field name="model_id" ref="model_cx_tower_plan_line" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">
|
||||
["&", ("access_level", "<=", "2"), ("plan_id.manager_ids", "in", [user.id])]
|
||||
</field>
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="1" />
|
||||
<field name="perm_create" eval="1" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager: unlink rule for cx.tower.plan.line -->
|
||||
<record id="rule_cx_tower_plan_line_group_manager_unlink" model="ir.rule">
|
||||
<field name="name">Plan Line: Manager unlink</field>
|
||||
<field name="model_id" ref="model_cx_tower_plan_line" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">
|
||||
[
|
||||
("access_level", "<=", "2"),
|
||||
("create_uid", "=", user.id),
|
||||
("plan_id.manager_ids", "in", [user.id])
|
||||
]
|
||||
</field>
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="1" />
|
||||
</record>
|
||||
|
||||
<!-- Root: unrestricted access rule for cx.tower.plan.line -->
|
||||
<record id="rule_cx_tower_plan_line_group_root_full" model="ir.rule">
|
||||
<field name="name">Plan Line: Root unrestricted access</field>
|
||||
<field name="model_id" ref="model_cx_tower_plan_line" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
|
||||
<field name="domain_force">[(1, '=', 1)]</field>
|
||||
</record>
|
||||
</odoo>
|
||||
@@ -1,43 +0,0 @@
|
||||
<?xml version="1.0" encoding="utf-8" ?>
|
||||
<odoo>
|
||||
|
||||
|
||||
<record id="rule_cx_tower_plan_log_group_user_read" model="ir.rule">
|
||||
<field name="name">Tower plan log: user access rule</field>
|
||||
<field name="model_id" ref="model_cx_tower_plan_log" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_user'))]" />
|
||||
<field name="domain_force">[
|
||||
("access_level", "=", "1"),
|
||||
("create_uid", "=", user.id),
|
||||
("server_id.user_ids", "in", [user.id])
|
||||
]</field>
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<record id="rule_cx_tower_plan_log_group_manager_read" model="ir.rule">
|
||||
<field name="name">Tower plan log: manager access rule</field>
|
||||
<field name="model_id" ref="model_cx_tower_plan_log" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">[
|
||||
"&",
|
||||
("access_level", "<=", "2"),
|
||||
"|",
|
||||
("server_id.user_ids", "in", [user.id]),
|
||||
("server_id.manager_ids", "in", [user.id])
|
||||
]</field>
|
||||
<field name="perm_read" eval="1" />
|
||||
</record>
|
||||
|
||||
|
||||
<record id="rule_cx_tower_plan_log_group_root_full" model="ir.rule">
|
||||
<field name="name">Tower plan log: root access rule</field>
|
||||
<field name="model_id" ref="model_cx_tower_plan_log" />
|
||||
<field name="domain_force">[(1, "=", 1)]</field>
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
|
||||
</record>
|
||||
|
||||
|
||||
</odoo>
|
||||
@@ -1,90 +0,0 @@
|
||||
<?xml version="1.0" encoding="utf-8" ?>
|
||||
<odoo>
|
||||
<!-- User: read rule for cx.tower.plan -->
|
||||
<record id="rule_cx_tower_plan_group_user_read" model="ir.rule">
|
||||
<field name="name">Plan: User read</field>
|
||||
<field name="model_id" ref="model_cx_tower_plan" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_user'))]" />
|
||||
<field name="domain_force">
|
||||
["&",
|
||||
("access_level", "=", "1"),
|
||||
"|",
|
||||
("user_ids", "in", [user.id]),
|
||||
("server_ids.user_ids", "in", [user.id])
|
||||
]
|
||||
</field>
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager: read rule for cx.tower.plan -->
|
||||
<record id="rule_cx_tower_plan_group_manager_read" model="ir.rule">
|
||||
<field name="name">Plan: Manager read</field>
|
||||
<field name="model_id" ref="model_cx_tower_plan" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<!-- The domain requires:
|
||||
1. access_level <= "2"
|
||||
2. AND either the plan itself grants access via (user_ids OR manager_ids)
|
||||
OR there are no related servers
|
||||
OR a related server grants access via (server_ids.user_ids OR server_ids.manager_ids)
|
||||
-->
|
||||
<field name="domain_force">
|
||||
["&",
|
||||
("access_level", "<=", "2"),
|
||||
"|",
|
||||
"|", ("user_ids", "in", [user.id]), ("manager_ids", "in", [user.id]),
|
||||
"|",
|
||||
("server_ids", "=", False),
|
||||
"|",
|
||||
("server_ids.user_ids", "in", [user.id]),
|
||||
("server_ids.manager_ids", "in", [user.id])
|
||||
]
|
||||
</field>
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager: write & create rule for cx.tower.plan -->
|
||||
<record id="rule_cx_tower_plan_group_manager_write" model="ir.rule">
|
||||
<field name="name">Plan: Manager write & create</field>
|
||||
<field name="model_id" ref="model_cx_tower_plan" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">
|
||||
["&", ("access_level", "<=", "2"), ("manager_ids", "in", [user.id])]
|
||||
</field>
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="1" />
|
||||
<field name="perm_create" eval="1" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager: unlink rule for cx.tower.plan -->
|
||||
<record id="rule_cx_tower_plan_group_manager_unlink" model="ir.rule">
|
||||
<field name="name">Plan: Manager unlink</field>
|
||||
<field name="model_id" ref="model_cx_tower_plan" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">
|
||||
[
|
||||
("access_level", "<=", "2"),
|
||||
("create_uid", "=", user.id),
|
||||
("manager_ids", "in", [user.id])
|
||||
]
|
||||
</field>
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="1" />
|
||||
</record>
|
||||
|
||||
<!-- Root: unrestricted access rule for cx.tower.plan -->
|
||||
<record id="rule_cx_tower_plan_group_root_full" model="ir.rule">
|
||||
<field name="name">Plan: Root unrestricted access</field>
|
||||
<field name="model_id" ref="model_cx_tower_plan" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
|
||||
<field name="domain_force">[(1, '=', 1)]</field>
|
||||
</record>
|
||||
</odoo>
|
||||
@@ -1,74 +0,0 @@
|
||||
<?xml version="1.0" encoding="utf-8" ?>
|
||||
<odoo>
|
||||
<!-- Manager: Read (see his records by user_ids or via server's user_ids/manager_ids) -->
|
||||
<record id="cx_tower_scheduled_task_cv_rule_manager_read" model="ir.rule">
|
||||
<field name="name">Scheduled Task CV: manager read access</field>
|
||||
<field name="model_id" ref="model_cx_tower_scheduled_task_cv" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
<field name="domain_force">
|
||||
['|',
|
||||
'|',
|
||||
('scheduled_task_id.user_ids', 'in', [user.id]),
|
||||
('scheduled_task_id.manager_ids', 'in', [user.id]),
|
||||
'|',
|
||||
'|',
|
||||
'|',
|
||||
'|',
|
||||
'|',
|
||||
'|',
|
||||
'|',
|
||||
('scheduled_task_id.server_ids.user_ids', 'in', [user.id]),
|
||||
('scheduled_task_id.server_ids.manager_ids', 'in', [user.id]),
|
||||
('scheduled_task_id.server_template_ids.user_ids', 'in', [user.id]),
|
||||
('scheduled_task_id.server_template_ids.manager_ids', 'in', [user.id]),
|
||||
('scheduled_task_id.jet_ids.user_ids', 'in', [user.id]),
|
||||
('scheduled_task_id.jet_ids.manager_ids', 'in', [user.id]),
|
||||
('scheduled_task_id.jet_template_ids.user_ids', 'in', [user.id]),
|
||||
('scheduled_task_id.jet_template_ids.manager_ids', 'in', [user.id])
|
||||
]
|
||||
</field>
|
||||
</record>
|
||||
|
||||
<!-- Manager: Create/Write -->
|
||||
<record id="cx_tower_scheduled_task_cv_rule_manager_write" model="ir.rule">
|
||||
<field name="name">Scheduled Task CV: manager write access</field>
|
||||
<field name="model_id" ref="model_cx_tower_scheduled_task_cv" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="1" />
|
||||
<field name="perm_create" eval="1" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
<field name="domain_force">
|
||||
[('scheduled_task_id.manager_ids', 'in', [user.id])]
|
||||
</field>
|
||||
</record>
|
||||
|
||||
<!-- Manager: Unlink (only if in manager_ids AND creator) -->
|
||||
<record id="cx_tower_scheduled_task_cv_rule_manager_unlink" model="ir.rule">
|
||||
<field name="name">Scheduled Task CV: manager unlink access</field>
|
||||
<field name="model_id" ref="model_cx_tower_scheduled_task_cv" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="1" />
|
||||
<field name="domain_force">
|
||||
[
|
||||
('scheduled_task_id.manager_ids', 'in', [user.id]),
|
||||
('create_uid', '=', user.id)
|
||||
]
|
||||
</field>
|
||||
</record>
|
||||
|
||||
<!-- Root: Full access -->
|
||||
<record id="cx_tower_scheduled_task_cv_rule_root_full" model="ir.rule">
|
||||
<field name="name">Scheduled Task CV: root full access</field>
|
||||
<field name="model_id" ref="model_cx_tower_scheduled_task_cv" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
|
||||
<field name="domain_force">[(1, '=', 1)]</field>
|
||||
</record>
|
||||
</odoo>
|
||||
@@ -1,78 +0,0 @@
|
||||
<?xml version="1.0" encoding="utf-8" ?>
|
||||
<odoo>
|
||||
<!-- Manager: Read (see his records by user_ids or via server's user_ids/manager_ids) -->
|
||||
<record id="cx_tower_scheduled_task_rule_manager_read" model="ir.rule">
|
||||
<field name="name">Scheduled Task: manager read access</field>
|
||||
<field name="model_id" ref="model_cx_tower_scheduled_task" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
<field name="domain_force">
|
||||
['|',
|
||||
'|',
|
||||
('user_ids', 'in', [user.id]),
|
||||
('manager_ids', 'in', [user.id]),
|
||||
'|',
|
||||
'|',
|
||||
'|',
|
||||
'|',
|
||||
'|',
|
||||
'|',
|
||||
'|',
|
||||
('server_ids.user_ids', 'in', [user.id]),
|
||||
('server_ids.manager_ids', 'in', [user.id]),
|
||||
('server_template_ids.user_ids', 'in', [user.id]),
|
||||
('server_template_ids.manager_ids', 'in', [user.id]),
|
||||
('jet_ids.user_ids', 'in', [user.id]),
|
||||
('jet_ids.manager_ids', 'in', [user.id]),
|
||||
('jet_template_ids.user_ids', 'in', [user.id]),
|
||||
('jet_template_ids.manager_ids', 'in', [user.id])
|
||||
]
|
||||
</field>
|
||||
</record>
|
||||
|
||||
<!-- Manager: Create/Write -->
|
||||
<record id="cx_tower_scheduled_task_rule_manager_write" model="ir.rule">
|
||||
<field name="name">Scheduled Task: manager write access</field>
|
||||
<field name="model_id" ref="model_cx_tower_scheduled_task" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="1" />
|
||||
<field name="perm_create" eval="1" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
<field name="domain_force">
|
||||
[('manager_ids', 'in', [user.id])]
|
||||
</field>
|
||||
</record>
|
||||
|
||||
<!-- Manager: Unlink (only if in manager_ids AND creator) -->
|
||||
<record id="cx_tower_scheduled_task_rule_manager_unlink" model="ir.rule">
|
||||
<field name="name">Scheduled Task: manager unlink access</field>
|
||||
<field name="model_id" ref="model_cx_tower_scheduled_task" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="1" />
|
||||
<field name="domain_force">
|
||||
[
|
||||
('manager_ids', 'in', [user.id]),
|
||||
('create_uid', '=', user.id)
|
||||
]
|
||||
</field>
|
||||
</record>
|
||||
|
||||
<!-- Root: Full access -->
|
||||
<record id="cx_tower_scheduled_task_rule_root_full" model="ir.rule">
|
||||
<field name="name">Scheduled Task: root full access</field>
|
||||
<field name="model_id" ref="model_cx_tower_scheduled_task" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="1" />
|
||||
<field name="perm_create" eval="1" />
|
||||
<field name="perm_unlink" eval="1" />
|
||||
<field name="domain_force">[(1, '=', 1)]</field>
|
||||
</record>
|
||||
</odoo>
|
||||
@@ -1,206 +0,0 @@
|
||||
<?xml version="1.0" encoding="utf-8" ?>
|
||||
<odoo>
|
||||
|
||||
<!-- User access rule -->
|
||||
<record id="rule_cx_tower_server_log_group_user_read" model="ir.rule">
|
||||
<field name="name">Tower server log: user access rule</field>
|
||||
<field name="model_id" ref="model_cx_tower_server_log" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_user'))]" />
|
||||
<field name="domain_force">[
|
||||
("access_level", "=", "1"),
|
||||
("server_id.user_ids", "in", [user.id])
|
||||
]</field>
|
||||
</record>
|
||||
|
||||
<!-- Manager access rules -->
|
||||
<record id="rule_cx_tower_server_log_group_manager_read" model="ir.rule">
|
||||
<field name="name">Tower server log: manager read access rule</field>
|
||||
<field name="model_id" ref="model_cx_tower_server_log" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">[
|
||||
("access_level", "<=", "2"),
|
||||
"|",
|
||||
("server_id.user_ids", "in", [user.id]),
|
||||
("server_id.manager_ids", "in", [user.id])
|
||||
]</field>
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<record id="rule_cx_tower_server_log_group_manager_write" model="ir.rule">
|
||||
<field name="name">Tower server log: manager write access rule</field>
|
||||
<field name="model_id" ref="model_cx_tower_server_log" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">[
|
||||
("access_level", "<=", "2"),
|
||||
("server_id.manager_ids", "in", [user.id])
|
||||
]</field>
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="1" />
|
||||
<field name="perm_create" eval="1" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<record id="rule_cx_tower_server_log_group_manager_unlink" model="ir.rule">
|
||||
<field name="name">Tower server log: manager unlink access rule</field>
|
||||
<field name="model_id" ref="model_cx_tower_server_log" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">[
|
||||
("access_level", "<=", "2"),
|
||||
("create_uid", "=", user.id),
|
||||
("server_id.manager_ids", "in", [user.id])
|
||||
]</field>
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="1" />
|
||||
</record>
|
||||
|
||||
<!-- Root access rule -->
|
||||
<record id="rule_cx_tower_server_log_group_root_full" model="ir.rule">
|
||||
<field name="name">Tower server log: root access rule</field>
|
||||
<field name="model_id" ref="model_cx_tower_server_log" />
|
||||
<field name="domain_force">[(1, "=", 1)]</field>
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
|
||||
</record>
|
||||
|
||||
<!-- Jet-based User access rule -->
|
||||
<record id="rule_cx_tower_server_log_group_user_jet_read" model="ir.rule">
|
||||
<field name="name">Tower server log: user jet access rule</field>
|
||||
<field name="model_id" ref="model_cx_tower_server_log" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_user'))]" />
|
||||
<field name="domain_force">[
|
||||
("access_level", "=", "1"),
|
||||
("jet_id.user_ids", "in", [user.id])
|
||||
]</field>
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Jet-based Manager access rules -->
|
||||
<record id="rule_cx_tower_server_log_group_manager_jet_read" model="ir.rule">
|
||||
<field name="name">Tower server log: manager jet read access rule</field>
|
||||
<field name="model_id" ref="model_cx_tower_server_log" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">[
|
||||
("access_level", "<=", "2"),
|
||||
"|",
|
||||
("jet_id.user_ids", "in", [user.id]),
|
||||
("jet_id.manager_ids", "in", [user.id])
|
||||
]</field>
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<record id="rule_cx_tower_server_log_group_manager_jet_write" model="ir.rule">
|
||||
<field name="name">Tower server log: manager jet write access rule</field>
|
||||
<field name="model_id" ref="model_cx_tower_server_log" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">[
|
||||
("access_level", "<=", "2"),
|
||||
("jet_id.manager_ids", "in", [user.id])
|
||||
]</field>
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="1" />
|
||||
<field name="perm_create" eval="1" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<record id="rule_cx_tower_server_log_group_manager_jet_unlink" model="ir.rule">
|
||||
<field name="name">Tower server log: manager jet unlink access rule</field>
|
||||
<field name="model_id" ref="model_cx_tower_server_log" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">[
|
||||
("access_level", "<=", "2"),
|
||||
("jet_id.manager_ids", "in", [user.id]),
|
||||
("create_uid", "=", user.id)
|
||||
]</field>
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="1" />
|
||||
</record>
|
||||
|
||||
<!-- Jet Template-based User access rule -->
|
||||
<record id="rule_cx_tower_server_log_group_user_jet_template_read" model="ir.rule">
|
||||
<field name="name">Tower server log: user jet template access rule</field>
|
||||
<field name="model_id" ref="model_cx_tower_server_log" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_user'))]" />
|
||||
<field name="domain_force">[
|
||||
("access_level", "=", "1"),
|
||||
("jet_template_id.user_ids", "in", [user.id])
|
||||
]</field>
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Jet Template-based Manager access rules -->
|
||||
<record
|
||||
id="rule_cx_tower_server_log_group_manager_jet_template_read"
|
||||
model="ir.rule"
|
||||
>
|
||||
<field
|
||||
name="name"
|
||||
>Tower server log: manager jet template read access rule</field>
|
||||
<field name="model_id" ref="model_cx_tower_server_log" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">[
|
||||
("access_level", "<=", "2"),
|
||||
"|",
|
||||
("jet_template_id.user_ids", "in", [user.id]),
|
||||
("jet_template_id.manager_ids", "in", [user.id])
|
||||
]</field>
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<record
|
||||
id="rule_cx_tower_server_log_group_manager_jet_template_write"
|
||||
model="ir.rule"
|
||||
>
|
||||
<field
|
||||
name="name"
|
||||
>Tower server log: manager jet template write access rule</field>
|
||||
<field name="model_id" ref="model_cx_tower_server_log" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">[
|
||||
("access_level", "<=", "2"),
|
||||
("jet_template_id.manager_ids", "in", [user.id])
|
||||
]</field>
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="1" />
|
||||
<field name="perm_create" eval="1" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<record
|
||||
id="rule_cx_tower_server_log_group_manager_jet_template_unlink"
|
||||
model="ir.rule"
|
||||
>
|
||||
<field
|
||||
name="name"
|
||||
>Tower server log: manager jet template unlink access rule</field>
|
||||
<field name="model_id" ref="model_cx_tower_server_log" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">[
|
||||
("access_level", "<=", "2"),
|
||||
("jet_template_id.manager_ids", "in", [user.id]),
|
||||
("create_uid", "=", user.id)
|
||||
]</field>
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="1" />
|
||||
</record>
|
||||
|
||||
</odoo>
|
||||
@@ -1,77 +0,0 @@
|
||||
<?xml version="1.0" encoding="utf-8" ?>
|
||||
<odoo>
|
||||
|
||||
<!-- User Access -->
|
||||
<record id="rule_cx_tower_server_group_user_read" model="ir.rule">
|
||||
<field name="name">Tower Server: user visibility rule</field>
|
||||
<field name="model_id" ref="model_cx_tower_server" />
|
||||
<field name="groups" eval="[(4, ref('group_user'))]" />
|
||||
<!-- allow read if the user is in Users -->
|
||||
<field name="domain_force">[('user_ids', 'in', [user.id])]</field>
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager Access -->
|
||||
<!-- Rule 1: Read access if the current user is a follower or is in manager_ids -->
|
||||
<record id="rule_cx_tower_server_group_manager_read" model="ir.rule">
|
||||
<field
|
||||
name="name"
|
||||
>Tower Server: Manager Read (if follower or in manager_ids)</field>
|
||||
<field name="model_id" ref="model_cx_tower_server" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<!-- allow read if the user is in Users or Managers -->
|
||||
<field name="domain_force">
|
||||
['|', ('user_ids', 'in', [user.id]),
|
||||
('manager_ids', 'in', [user.id])]
|
||||
</field>
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Rule 2: Write and Create access if the current user is in manager_ids -->
|
||||
<record id="rule_cx_tower_server_group_manager_write" model="ir.rule">
|
||||
<field
|
||||
name="name"
|
||||
>Tower Server: Manager Write & Create (if in manager_ids)</field>
|
||||
<field name="model_id" ref="model_cx_tower_server" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<!-- allow write/create only if the user is in the manager_ids many2many field -->
|
||||
<field name="domain_force">[('manager_ids', 'in', [user.id])]</field>
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="1" />
|
||||
<field name="perm_create" eval="1" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Rule 3: Delete access if the current user is in manager_ids and is the creator -->
|
||||
<record id="rule_cx_tower_server_group_manager_unlink" model="ir.rule">
|
||||
<field
|
||||
name="name"
|
||||
>Tower Server: Manager Delete (if in manager_ids and creator)</field>
|
||||
<field name="model_id" ref="model_cx_tower_server" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<!-- allow deletion only if the user is in manager_ids and he is the record creator -->
|
||||
<field
|
||||
name="domain_force"
|
||||
>[('manager_ids', 'in', [user.id]), ('create_uid', '=', user.id)]</field>
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="1" />
|
||||
</record>
|
||||
|
||||
|
||||
<!-- Root Access -->
|
||||
<record id="rule_cx_tower_server_group_root_full" model="ir.rule">
|
||||
<field name="name">Tower Server: root visibility rule</field>
|
||||
<field name="model_id" ref="model_cx_tower_server" />
|
||||
<field name="domain_force">[(1, '=', 1)]</field>
|
||||
<field name="groups" eval="[(4,ref('group_root'))]" />
|
||||
</record>
|
||||
|
||||
</odoo>
|
||||
@@ -1,55 +0,0 @@
|
||||
<?xml version="1.0" encoding="utf-8" ?>
|
||||
<odoo>
|
||||
<!-- Manager Read Rule -->
|
||||
<record id="rule_cx_tower_server_template_manager_read" model="ir.rule">
|
||||
<field name="name">Server Template: Manager Read Access</field>
|
||||
<field name="model_id" ref="model_cx_tower_server_template" />
|
||||
<field
|
||||
name="domain_force"
|
||||
>['|', ('user_ids', 'in', [user.id]), ('manager_ids', 'in', [user.id])]</field>
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager Write Rule -->
|
||||
<record id="rule_cx_tower_server_template_manager_write" model="ir.rule">
|
||||
<field name="name">Server Template: Manager Write Access</field>
|
||||
<field name="model_id" ref="model_cx_tower_server_template" />
|
||||
<field name="domain_force">[('manager_ids', 'in', [user.id])]</field>
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="1" />
|
||||
<field name="perm_create" eval="1" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager Delete Rule -->
|
||||
<record id="rule_cx_tower_server_template_manager_unlink" model="ir.rule">
|
||||
<field name="name">Server Template: Manager Delete Access</field>
|
||||
<field name="model_id" ref="model_cx_tower_server_template" />
|
||||
<field
|
||||
name="domain_force"
|
||||
>[('manager_ids', 'in', [user.id]), ('create_uid','=', user.id)]</field>
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="1" />
|
||||
</record>
|
||||
|
||||
<!-- Root Access Rule -->
|
||||
<record id="cx_tower_server_template_rule_group_root_access" model="ir.rule">
|
||||
<field name="name">Server Template: Root Full Access</field>
|
||||
<field name="model_id" ref="model_cx_tower_server_template" />
|
||||
<field name="domain_force">[(1,'=',1)]</field>
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="1" />
|
||||
<field name="perm_create" eval="1" />
|
||||
<field name="perm_unlink" eval="1" />
|
||||
</record>
|
||||
|
||||
</odoo>
|
||||
@@ -1,110 +0,0 @@
|
||||
<?xml version="1.0" encoding="UTF-8" ?>
|
||||
<odoo noupdate="1">
|
||||
|
||||
<!-- cx.tower.command.run.wizard -->
|
||||
<record id="rule_cx_tower_command_run_wizard_creator_only" model="ir.rule">
|
||||
<field name="name">Creator only</field>
|
||||
<field name="model_id" ref="model_cx_tower_command_run_wizard" />
|
||||
<field name="global" eval="True" />
|
||||
<field name="domain_force">[('create_uid', '=', user.id)]</field>
|
||||
</record>
|
||||
|
||||
<!-- cx.tower.plan.run.wizard -->
|
||||
<record id="rule_cx_tower_plan_run_wizard_creator_only" model="ir.rule">
|
||||
<field name="name">Creator only</field>
|
||||
<field name="model_id" ref="model_cx_tower_plan_run_wizard" />
|
||||
<field name="global" eval="True" />
|
||||
<field name="domain_force">[('create_uid', '=', user.id)]</field>
|
||||
</record>
|
||||
|
||||
<!-- cx.tower.server.host.key.wizard -->
|
||||
<record id="rule_cx_tower_server_host_key_wizard_creator_only" model="ir.rule">
|
||||
<field name="name">Creator only</field>
|
||||
<field name="model_id" ref="model_cx_tower_server_host_key_wizard" />
|
||||
<field name="global" eval="True" />
|
||||
<field name="domain_force">[('create_uid', '=', user.id)]</field>
|
||||
</record>
|
||||
|
||||
<!-- cx.tower.server.template.create.wizard -->
|
||||
<record
|
||||
id="rule_cx_tower_server_template_create_wizard_creator_only"
|
||||
model="ir.rule"
|
||||
>
|
||||
<field name="name">Creator only</field>
|
||||
<field name="model_id" ref="model_cx_tower_server_template_create_wizard" />
|
||||
<field name="global" eval="True" />
|
||||
<field name="domain_force">[('create_uid', '=', user.id)]</field>
|
||||
</record>
|
||||
|
||||
<!-- cx.tower.jet.template.install.wiz -->
|
||||
<record
|
||||
id="rule_cx_tower_jet_template_install_wiz_creator_only"
|
||||
model="ir.rule"
|
||||
>
|
||||
<field name="name">Creator only</field>
|
||||
<field name="model_id" ref="model_cx_tower_jet_template_install_wiz" />
|
||||
<field name="global" eval="True" />
|
||||
<field name="domain_force">[('create_uid', '=', user.id)]</field>
|
||||
</record>
|
||||
|
||||
<!-- cx.tower.jet.action.wiz -->
|
||||
<record id="rule_cx_tower_jet_action_wiz_creator_only" model="ir.rule">
|
||||
<field name="name">Creator only</field>
|
||||
<field name="model_id" ref="model_cx_tower_jet_action_wizard" />
|
||||
<field name="global" eval="True" />
|
||||
<field name="domain_force">[('create_uid', '=', user.id)]</field>
|
||||
</record>
|
||||
|
||||
<!-- cx.tower.jet.state.wiz -->
|
||||
<record id="rule_cx_tower_jet_state_wiz_creator_only" model="ir.rule">
|
||||
<field name="name">Creator only</field>
|
||||
<field name="model_id" ref="model_cx_tower_jet_state_wizard" />
|
||||
<field name="global" eval="True" />
|
||||
<field name="domain_force">[('create_uid', '=', user.id)]</field>
|
||||
</record>
|
||||
|
||||
<!-- cx.tower.jet.create.wizard -->
|
||||
<record id="rule_cx_tower_jet_create_wizard_creator_only" model="ir.rule">
|
||||
<field name="name">Creator only</field>
|
||||
<field name="model_id" ref="model_cx_tower_jet_create_wizard" />
|
||||
<field name="global" eval="True" />
|
||||
<field name="domain_force">[('create_uid', '=', user.id)]</field>
|
||||
</record>
|
||||
|
||||
<!-- cx.tower.jet.create.wizard.variable.line -->
|
||||
<record
|
||||
id="rule_cx_tower_jet_create_wizard_variable_line_creator_only"
|
||||
model="ir.rule"
|
||||
>
|
||||
<field name="name">Creator only</field>
|
||||
<field
|
||||
name="model_id"
|
||||
ref="model_cx_tower_jet_create_wizard_variable_line"
|
||||
/>
|
||||
<field name="global" eval="True" />
|
||||
<field name="domain_force">[('create_uid', '=', user.id)]</field>
|
||||
</record>
|
||||
|
||||
<!-- cx.tower.jet.clone.wizard -->
|
||||
<record id="rule_cx_tower_jet_clone_wizard_creator_only" model="ir.rule">
|
||||
<field name="name">Creator only</field>
|
||||
<field name="model_id" ref="model_cx_tower_jet_clone_wizard" />
|
||||
<field name="global" eval="True" />
|
||||
<field name="domain_force">[('create_uid', '=', user.id)]</field>
|
||||
</record>
|
||||
|
||||
<!-- cx.tower.jet.clone.wizard.variable.line -->
|
||||
<record
|
||||
id="rule_cx_tower_jet_clone_wizard_variable_line_creator_only"
|
||||
model="ir.rule"
|
||||
>
|
||||
<field name="name">Creator only</field>
|
||||
<field
|
||||
name="model_id"
|
||||
ref="model_cx_tower_jet_clone_wizard_variable_line"
|
||||
/>
|
||||
<field name="global" eval="True" />
|
||||
<field name="domain_force">[('create_uid', '=', user.id)]</field>
|
||||
</record>
|
||||
|
||||
</odoo>
|
||||
@@ -1,42 +0,0 @@
|
||||
<?xml version="1.0" encoding="utf-8" ?>
|
||||
<odoo>
|
||||
<!--
|
||||
Access rule checks for User and Manager:
|
||||
1. Shortcut access
|
||||
2. Access to shortcut servers
|
||||
-->
|
||||
|
||||
<record id="cx_tower_shortcut_rule_group_user_visibility" model="ir.rule">
|
||||
<field name="name">Tower Shortcut: user visibility rule</field>
|
||||
<field name="model_id" ref="model_cx_tower_shortcut" />
|
||||
<field name="groups" eval="[(4, ref('group_user'))]" />
|
||||
<field name="domain_force">[
|
||||
('server_ids.user_ids', 'in', [user.id]),
|
||||
('access_level', '=', '1')
|
||||
]</field>
|
||||
|
||||
</record>
|
||||
|
||||
|
||||
<record id="cx_tower_shortcut_rule_group_manager_visibility" model="ir.rule">
|
||||
<field name="name">Tower shortcut: manager visibility rule</field>
|
||||
<field name="model_id" ref="model_cx_tower_shortcut" />
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="domain_force">[
|
||||
('access_level', '<=', '2'),
|
||||
'|', '|', '|',
|
||||
('server_ids.user_ids', 'in', [user.id]),
|
||||
('server_ids.manager_ids', 'in', [user.id]),
|
||||
('server_template_ids.user_ids', 'in', [user.id]),
|
||||
('server_template_ids.manager_ids', 'in', [user.id]),
|
||||
]
|
||||
</field>
|
||||
</record>
|
||||
|
||||
<record id="cx_tower_shortcut_rule_group_root_visibility" model="ir.rule">
|
||||
<field name="name">Tower shortcut: root visibility rule</field>
|
||||
<field name="model_id" ref="model_cx_tower_shortcut" />
|
||||
<field name="domain_force">[(1, '=', 1)]</field>
|
||||
<field name="groups" eval="[(4,ref('cetmix_tower_server.group_root'))]" />
|
||||
</record>
|
||||
</odoo>
|
||||
@@ -1,32 +0,0 @@
|
||||
<?xml version="1.0" encoding="utf-8" ?>
|
||||
<odoo>
|
||||
<!-- Record Rules -->
|
||||
<record id="rule_cx_tower_tag_user" model="ir.rule">
|
||||
<field name="name">Tower Tag: User can read any record</field>
|
||||
<field name="model_id" ref="model_cx_tower_tag" />
|
||||
<field name="domain_force">[(1, '=', 1)]</field>
|
||||
<field name="groups" eval="[(4, ref('group_user'))]" />
|
||||
<field name="perm_read" eval="True" />
|
||||
<field name="perm_write" eval="False" />
|
||||
<field name="perm_create" eval="False" />
|
||||
<field name="perm_unlink" eval="False" />
|
||||
</record>
|
||||
|
||||
<record id="rule_cx_tower_tag_manager" model="ir.rule">
|
||||
<field name="name">Tower Tag: Manager can create/edit/delete own records</field>
|
||||
<field name="model_id" ref="model_cx_tower_tag" />
|
||||
<field name="domain_force">[('create_uid', '=', user.id)]</field>
|
||||
<field name="groups" eval="[(4, ref('group_manager'))]" />
|
||||
<field name="perm_read" eval="False" />
|
||||
<field name="perm_write" eval="True" />
|
||||
<field name="perm_create" eval="True" />
|
||||
<field name="perm_unlink" eval="True" />
|
||||
</record>
|
||||
|
||||
<record id="rule_cx_tower_tag_root" model="ir.rule">
|
||||
<field name="name">Tower Tag: Root has full access</field>
|
||||
<field name="model_id" ref="model_cx_tower_tag" />
|
||||
<field name="domain_force">[(1, '=', 1)]</field>
|
||||
<field name="groups" eval="[(4, ref('group_root'))]" />
|
||||
</record>
|
||||
</odoo>
|
||||
@@ -1,52 +0,0 @@
|
||||
<?xml version="1.0" encoding="utf-8" ?>
|
||||
<odoo>
|
||||
<!-- User Read Rules -->
|
||||
<record id="rule_cx_tower_variable_option_user_read" model="ir.rule">
|
||||
<field name="name">Variable Option: User Read Access</field>
|
||||
<field name="model_id" ref="model_cx_tower_variable_option" />
|
||||
<field name="domain_force">[('access_level', '=', '1')]</field>
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_user'))]" />
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager Read Rules -->
|
||||
<record id="rule_cx_tower_variable_option_manager_read" model="ir.rule">
|
||||
<field name="name">Variable Option: Manager Read Access</field>
|
||||
<field name="model_id" ref="model_cx_tower_variable_option" />
|
||||
<field name="domain_force">[('access_level', '<=', '2')]</field>
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager Write/Create Rules -->
|
||||
<record id="rule_cx_tower_variable_option_manager_write" model="ir.rule">
|
||||
<field name="name">Variable Option: Manager Write/Create/Unlink Access</field>
|
||||
<field name="model_id" ref="model_cx_tower_variable_option" />
|
||||
<field
|
||||
name="domain_force"
|
||||
>[('access_level', '<=', '2'), ('create_uid', '=', user.id)]</field>
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="1" />
|
||||
<field name="perm_create" eval="1" />
|
||||
<field name="perm_unlink" eval="1" />
|
||||
</record>
|
||||
|
||||
<!-- Root Access Rule -->
|
||||
<record id="rule_cx_tower_variable_option_root" model="ir.rule">
|
||||
<field name="name">Variable Option: Root Full Access</field>
|
||||
<field name="model_id" ref="model_cx_tower_variable_option" />
|
||||
<field name="domain_force">[(1, '=', 1)]</field>
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="1" />
|
||||
<field name="perm_create" eval="1" />
|
||||
<field name="perm_unlink" eval="1" />
|
||||
</record>
|
||||
</odoo>
|
||||
@@ -1,52 +0,0 @@
|
||||
<?xml version="1.0" encoding="utf-8" ?>
|
||||
<odoo>
|
||||
<!-- User Read Rule -->
|
||||
<record id="rule_cx_tower_variable_user_read" model="ir.rule">
|
||||
<field name="name">Variable: User Read Access</field>
|
||||
<field name="model_id" ref="model_cx_tower_variable" />
|
||||
<field name="domain_force">[('access_level', '=', '1')]</field>
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_user'))]" />
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager Read Rule -->
|
||||
<record id="rule_cx_tower_variable_manager_read" model="ir.rule">
|
||||
<field name="name">Variable: Manager Read Access</field>
|
||||
<field name="model_id" ref="model_cx_tower_variable" />
|
||||
<field name="domain_force">[('access_level', '<=', '2')]</field>
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager Write/Create Rule -->
|
||||
<record id="rule_cx_tower_variable_manager_write" model="ir.rule">
|
||||
<field name="name">Variable: Manager Write/Create/Unlink Access</field>
|
||||
<field name="model_id" ref="model_cx_tower_variable" />
|
||||
<field
|
||||
name="domain_force"
|
||||
>[('access_level', '<=', '2'), ('create_uid', '=', user.id)]</field>
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="1" />
|
||||
<field name="perm_create" eval="1" />
|
||||
<field name="perm_unlink" eval="1" />
|
||||
</record>
|
||||
|
||||
<!-- Root Access Rule -->
|
||||
<record id="rule_cx_tower_variable_root" model="ir.rule">
|
||||
<field name="name">Variable: Root Full Access</field>
|
||||
<field name="model_id" ref="model_cx_tower_variable" />
|
||||
<field name="domain_force">[(1, '=', 1)]</field>
|
||||
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="1" />
|
||||
<field name="perm_create" eval="1" />
|
||||
<field name="perm_unlink" eval="1" />
|
||||
</record>
|
||||
</odoo>
|
||||
@@ -1,104 +0,0 @@
|
||||
<?xml version="1.0" encoding="utf-8" ?>
|
||||
<odoo>
|
||||
|
||||
<!-- User Read Rules -->
|
||||
<record id="rule_cx_tower_variable_value_user_read" model="ir.rule">
|
||||
<field name="name">Variable Value: User Read Access</field>
|
||||
<field name="model_id" ref="model_cx_tower_variable_value" />
|
||||
<field name="domain_force">[
|
||||
('access_level', '=', '1'),
|
||||
'|', '|', '|', '|', '|',
|
||||
('is_global', '=', True),
|
||||
('server_id.user_ids', 'in', [user.id]),
|
||||
('plan_line_action_id.plan_id.user_ids', 'in', [user.id]),
|
||||
('plan_line_action_id.plan_id.server_ids.user_ids', 'in', [user.id]),
|
||||
('jet_id.user_ids', 'in', [user.id]),
|
||||
('jet_template_id.user_ids', 'in', [user.id])
|
||||
]</field>
|
||||
<field name="groups" eval="[(4, ref('group_user'))]" />
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager Read Rules -->
|
||||
<record id="rule_cx_tower_variable_value_manager_read" model="ir.rule">
|
||||
<field name="name">Variable Value: Manager Read Access</field>
|
||||
<field name="model_id" ref="model_cx_tower_variable_value" />
|
||||
<field name="domain_force">[
|
||||
('access_level', '<=', '2'),
|
||||
'|', '|', '|', '|', '|', '|', '|', '|', '|', '|', '|', '|',
|
||||
('is_global', '=', True),
|
||||
('server_id.user_ids', 'in', [user.id]),
|
||||
('server_id.manager_ids', 'in', [user.id]),
|
||||
('server_template_id.user_ids', 'in', [user.id]),
|
||||
('server_template_id.manager_ids', 'in', [user.id]),
|
||||
('plan_line_action_id.plan_id.user_ids', 'in', [user.id]),
|
||||
('plan_line_action_id.plan_id.manager_ids', 'in', [user.id]),
|
||||
('plan_line_action_id.plan_id.server_ids.user_ids', 'in', [user.id]),
|
||||
('plan_line_action_id.plan_id.server_ids.manager_ids', 'in', [user.id]),
|
||||
('jet_id.user_ids', 'in', [user.id]),
|
||||
('jet_id.manager_ids', 'in', [user.id]),
|
||||
('jet_template_id.user_ids', 'in', [user.id]),
|
||||
('jet_template_id.manager_ids', 'in', [user.id])
|
||||
]</field>
|
||||
<field name="groups" eval="[(4, ref('group_manager'))]" />
|
||||
<field name="perm_read" eval="1" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager Write/Create Rules -->
|
||||
<record id="rule_cx_tower_variable_value_manager_write" model="ir.rule">
|
||||
<field name="name">Variable Value: Manager Write/Create Access</field>
|
||||
<field name="model_id" ref="model_cx_tower_variable_value" />
|
||||
<field name="domain_force">[
|
||||
('access_level', '<=', '2'),
|
||||
'|', '|', '|', '|', '|',
|
||||
('server_id.manager_ids', 'in', [user.id]),
|
||||
('server_template_id.manager_ids', 'in', [user.id]),
|
||||
('plan_line_action_id.plan_id.manager_ids', 'in', [user.id]),
|
||||
('plan_line_action_id.plan_id.server_ids.manager_ids', 'in', [user.id]),
|
||||
('jet_id.manager_ids', 'in', [user.id]),
|
||||
('jet_template_id.manager_ids', 'in', [user.id])
|
||||
]</field>
|
||||
<field name="groups" eval="[(4, ref('group_manager'))]" />
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="1" />
|
||||
<field name="perm_create" eval="1" />
|
||||
<field name="perm_unlink" eval="0" />
|
||||
</record>
|
||||
|
||||
<!-- Manager Unlink Rules -->
|
||||
<record id="rule_cx_tower_variable_value_manager_unlink" model="ir.rule">
|
||||
<field name="name">Variable Value: Manager Unlink Access</field>
|
||||
<field name="model_id" ref="model_cx_tower_variable_value" />
|
||||
<field name="domain_force">[
|
||||
('access_level', '<=', '2'),
|
||||
('create_uid', '=', user.id),
|
||||
'|', '|', '|', '|', '|',
|
||||
('server_id.manager_ids', 'in', [user.id]),
|
||||
('server_template_id.manager_ids', 'in', [user.id]),
|
||||
('plan_line_action_id.plan_id.manager_ids', 'in', [user.id]),
|
||||
('plan_line_action_id.plan_id.server_ids.manager_ids', 'in', [user.id]),
|
||||
('jet_id.manager_ids', 'in', [user.id]),
|
||||
('jet_template_id.manager_ids', 'in', [user.id])
|
||||
]</field>
|
||||
<field name="groups" eval="[(4, ref('group_manager'))]" />
|
||||
<field name="perm_read" eval="0" />
|
||||
<field name="perm_write" eval="0" />
|
||||
<field name="perm_create" eval="0" />
|
||||
<field name="perm_unlink" eval="1" />
|
||||
</record>
|
||||
|
||||
<!-- Root Access Rule -->
|
||||
<record id="rule_cx_tower_variable_value_root" model="ir.rule">
|
||||
<field name="name">Variable Value: Root Full Access</field>
|
||||
<field name="model_id" ref="model_cx_tower_variable_value" />
|
||||
<field name="domain_force">[(1, '=', 1)]</field>
|
||||
<field name="groups" eval="[(4, ref('group_root'))]" />
|
||||
</record>
|
||||
|
||||
</odoo>
|
||||
@@ -1,100 +0,0 @@
|
||||
id,name,model_id:id,group_id:id,perm_read,perm_write,perm_create,perm_unlink
|
||||
access_variable_user,Variable->User,model_cx_tower_variable,group_user,1,0,0,0
|
||||
access_variable_manager,Variable->Manager,model_cx_tower_variable,group_manager,1,1,1,0
|
||||
access_variable_root,Variable->Root,model_cx_tower_variable,group_root,1,1,1,1
|
||||
access_variable_value_user,Variable Value->User,model_cx_tower_variable_value,group_user,1,0,0,0
|
||||
access_variable_value_manager,Variable Value->Manager,model_cx_tower_variable_value,group_manager,1,1,1,1
|
||||
access_variable_value_root,Variable Value->Root,model_cx_tower_variable_value,group_root,1,1,1,1
|
||||
access_os_user,OS->User,model_cx_tower_os,group_user,1,0,0,0
|
||||
access_os_root,OS->Root,model_cx_tower_os,group_root,1,1,1,1
|
||||
access_tag_user,Tag->User,model_cx_tower_tag,group_user,1,0,0,0
|
||||
access_tag_manager,Tag->Manager,model_cx_tower_tag,group_manager,1,1,1,1
|
||||
access_tag_root,Tag->Root,model_cx_tower_tag,group_root,1,1,1,1
|
||||
access_server_user,Server->User,model_cx_tower_server,group_user,1,0,0,0
|
||||
access_server_manager,Server->Manager,model_cx_tower_server,group_manager,1,1,1,1
|
||||
access_server_root,Server->Root,model_cx_tower_server,group_root,1,1,1,1
|
||||
access_command_user,Command->User,model_cx_tower_command,group_user,1,0,0,0
|
||||
access_command_manager,Command->Manager,model_cx_tower_command,group_manager,1,1,1,1
|
||||
access_command_root,Command->Root,model_cx_tower_command,group_root,1,1,1,1
|
||||
access_run_command_user,Run Command->User,model_cx_tower_command_run_wizard,group_user,1,1,1,1
|
||||
access_run_command_variable_value_user,Run Command Variable Value->User,model_cx_tower_command_run_wizard_variable_value,group_user,1,1,1,1
|
||||
access_execute_plan_user,Run Plan->User,model_cx_tower_plan_run_wizard,group_user,1,1,1,1
|
||||
access_execute_plan_variable_value_user,Run Plan Variable Value->User,model_cx_tower_plan_run_wizard_variable_value,group_user,1,1,1,1
|
||||
access_key_user,Key->User,model_cx_tower_key,group_user,0,0,0,0
|
||||
access_key_manager,Key->Manager,model_cx_tower_key,group_manager,1,1,1,1
|
||||
access_key_root,Key->Root,model_cx_tower_key,group_root,1,1,1,1
|
||||
access_key_value_manager,Key Value->Manager,model_cx_tower_key_value,group_manager,1,1,1,1
|
||||
access_key_value_root,Key Value->Root,model_cx_tower_key_value,group_root,1,1,1,1
|
||||
access_command_log_user,Command Log->User,model_cx_tower_command_log,group_user,1,0,0,0
|
||||
access_command_log_manager,Command Log->Manager,model_cx_tower_command_log,group_manager,1,0,0,0
|
||||
access_command_log_root,Command Log->Root,model_cx_tower_command_log,group_root,1,0,0,0
|
||||
access_plan_user,Plan->User,model_cx_tower_plan,group_user,1,0,0,0
|
||||
access_plan_manager,Plan->Manager,model_cx_tower_plan,group_manager,1,1,1,1
|
||||
access_plan_root,Plan->Root,model_cx_tower_plan,group_root,1,1,1,1
|
||||
access_plan_line_user,Plan Line->User,model_cx_tower_plan_line,group_user,1,0,0,0
|
||||
access_plan_line_manager,Plan Line->Manager,model_cx_tower_plan_line,group_manager,1,1,1,1
|
||||
access_plan_line_root,Plan Line->Root,model_cx_tower_plan_line,group_root,1,1,1,1
|
||||
access_plan_line_action_user,Plan Line Action->User,model_cx_tower_plan_line_action,group_user,1,0,0,0
|
||||
access_plan_line_action_manager,Plan Line Action->Manager,model_cx_tower_plan_line_action,group_manager,1,1,1,1
|
||||
access_plan_line_action_root,Plan Line Action->Root,model_cx_tower_plan_line_action,group_root,1,1,1,1
|
||||
access_plan_log_user,Plan Log->User,model_cx_tower_plan_log,group_user,1,0,0,0
|
||||
access_plan_log_manager,Plan Log->Manager,model_cx_tower_plan_log,group_manager,1,0,0,0
|
||||
access_plan_log_root,Plan Log->Root,model_cx_tower_plan_log,group_root,1,0,0,0
|
||||
access_file_user,File->User,model_cx_tower_file,group_user,1,0,0,0
|
||||
access_file_manager,File->Manager,model_cx_tower_file,group_manager,1,1,1,1
|
||||
access_file_root,File->Root,model_cx_tower_file,group_root,1,1,1,1
|
||||
access_file_template_manager,File Template->Manager,model_cx_tower_file_template,group_manager,1,1,1,1
|
||||
access_file_template_root,File Template->Root,model_cx_tower_file_template,group_root,1,1,1,1
|
||||
access_server_log_user,Server Log->User,model_cx_tower_server_log,group_user,1,0,0,0
|
||||
access_server_log_manager,Server Log->Manager,model_cx_tower_server_log,group_manager,1,1,1,1
|
||||
access_server_log_root,Server Log->Root,model_cx_tower_server_log,group_root,1,1,1,1
|
||||
access_server_template_manager,Server Template->Manager,model_cx_tower_server_template,group_manager,1,1,1,1
|
||||
access_server_template_root,Server Template->Root,model_cx_tower_server_template,group_root,1,1,1,1
|
||||
access_create_server_from_template_manager,Create Server From Template->Manager,model_cx_tower_server_template_create_wizard,group_manager,1,1,1,1
|
||||
access_create_server_from_template_line_manager,Create Server From Template Line->Manager,model_cx_tower_server_template_create_wizard_line,group_manager,1,1,1,1
|
||||
access_cx_tower_variable_option_user,Variable Option->User,model_cx_tower_variable_option,group_user,1,0,0,0
|
||||
access_cx_tower_variable_option_manager,Variable Option->Manager,model_cx_tower_variable_option,group_manager,1,1,1,1
|
||||
access_cx_tower_variable_option_root,Variable Option->Root,model_cx_tower_variable_option,group_root,1,1,1,1
|
||||
access_cx_tower_vault_no_access,cx.tower.vault no access,model_cx_tower_vault,group_user,0,0,0,0
|
||||
access_cx_tower_server_host_key_wizard_manager,Show Host Key->Manager,model_cx_tower_server_host_key_wizard,group_manager,1,1,1,1
|
||||
access_cx_tower_server_host_key_wizard_root,Show Host Key->Root,model_cx_tower_server_host_key_wizard,group_root,1,1,1,1
|
||||
access_cetmix_tower_user,Cetmix Tower->User,model_cetmix_tower,group_user,1,1,0,0
|
||||
access_shortcut_user,Shortcut->User,model_cx_tower_shortcut,group_user,1,0,0,0
|
||||
access_shortcut_manager,Shortcut->Manager,model_cx_tower_shortcut,group_manager,1,0,0,0
|
||||
access_shortcut_root,Shortcut->Root,model_cx_tower_shortcut,group_root,1,1,1,1
|
||||
access_scheduled_task_user,Scheduled Task->User,model_cx_tower_scheduled_task,group_user,0,0,0,0
|
||||
access_scheduled_task_manager,Scheduled Task->Manager,model_cx_tower_scheduled_task,group_manager,1,1,1,1
|
||||
access_scheduled_task_root,Scheduled Task->Root,model_cx_tower_scheduled_task,group_root,1,1,1,1
|
||||
access_scheduled_task_cv_user,Scheduled Task Custom Variable Value->User,model_cx_tower_scheduled_task_cv,group_user,0,0,0,0
|
||||
access_scheduled_task_cv_manager,Scheduled Task Custom Variable Value->Manager,model_cx_tower_scheduled_task_cv,group_manager,1,1,1,1
|
||||
access_scheduled_task_cv_root,Scheduled Task Custom Variable Value->Root,model_cx_tower_scheduled_task_cv,group_root,1,1,1,1
|
||||
access_cx_tower_jet_state_user,cx.tower.jet.state user,model_cx_tower_jet_state,group_user,1,0,0,0
|
||||
access_cx_tower_jet_state_manager,cx.tower.jet.state manager,model_cx_tower_jet_state,group_manager,1,0,0,0
|
||||
access_cx_tower_jet_state_root,cx.tower.jet.state root,model_cx_tower_jet_state,group_root,1,1,1,1
|
||||
access_cx_tower_jet_action_user,cx.tower.jet.action user,model_cx_tower_jet_action,group_user,1,0,0,0
|
||||
access_cx_tower_jet_action_manager,cx.tower.jet.action manager,model_cx_tower_jet_action,group_manager,1,1,1,1
|
||||
access_cx_tower_jet_action_root,cx.tower.jet.action root,model_cx_tower_jet_action,group_root,1,1,1,1
|
||||
access_cx_tower_jet_template_user,cx.tower.jet.template user,model_cx_tower_jet_template,group_user,1,0,0,0
|
||||
access_cx_tower_jet_template_manager,cx.tower.jet.template manager,model_cx_tower_jet_template,group_manager,1,1,1,1
|
||||
access_cx_tower_jet_template_dependency_manager,cx.tower.jet.template.dependency manager,model_cx_tower_jet_template_dependency,group_manager,1,1,1,1
|
||||
access_cx_tower_jet_template_install_manager,Jet Template Install->Manager,model_cx_tower_jet_template_install,group_manager,1,0,0,0
|
||||
access_cx_tower_jet_template_install_root,Jet Template Install->Root,model_cx_tower_jet_template_install,group_root,1,1,1,1
|
||||
access_cx_tower_jet_template_install_line_manager,Jet Template Install Line->Manager,model_cx_tower_jet_template_install_line,group_manager,1,0,0,0
|
||||
access_cx_tower_jet_template_install_line_root,Jet Template Install Line->Root,model_cx_tower_jet_template_install_line,group_root,1,1,1,1
|
||||
access_cx_tower_jet_template_install_wiz_manager,Jet Template Install Wizard->Manager,model_cx_tower_jet_template_install_wiz,group_manager,1,1,1,1
|
||||
access_cx_tower_jet_user,cx.tower.jet user,model_cx_tower_jet,group_user,1,0,0,0
|
||||
access_cx_tower_jet_manager,cx.tower.jet manager,model_cx_tower_jet,group_manager,1,1,1,1
|
||||
access_cx_tower_jet_root,cx.tower.jet root,model_cx_tower_jet,group_root,1,1,1,1
|
||||
access_cx_tower_jet_request_root,Jet Request->Root,model_cx_tower_jet_request,group_root,1,1,1,1
|
||||
access_cx_tower_jet_dependency_manager,cx.tower.jet.dependency manager,model_cx_tower_jet_dependency,group_manager,1,1,1,1
|
||||
access_cx_tower_jet_dependency_root,cx.tower.jet.dependency root,model_cx_tower_jet_dependency,group_root,1,1,1,1
|
||||
access_cx_tower_jet_state_wizard_user,Jet State Wizard->User,model_cx_tower_jet_state_wizard,group_user,1,1,1,1
|
||||
access_cx_tower_jet_action_wizard_user,Jet Action Wizard->User,model_cx_tower_jet_action_wizard,group_user,1,1,1,1
|
||||
access_cx_tower_jet_create_wizard_user,Jet Create Wizard->User,model_cx_tower_jet_create_wizard,group_user,1,1,1,1
|
||||
access_cx_tower_jet_create_wizard_variable_line_user,Jet Create Wizard Variable Line->User,model_cx_tower_jet_create_wizard_variable_line,group_user,1,1,1,1
|
||||
access_cx_tower_jet_clone_wizard_user,Jet Clone Wizard->User,model_cx_tower_jet_clone_wizard,group_user,1,1,1,1
|
||||
access_cx_tower_jet_clone_wizard_variable_line_user,Jet Clone Wizard Variable Line->User,model_cx_tower_jet_clone_wizard_variable_line,group_user,1,1,1,1
|
||||
access_cx_tower_jet_waypoint_template_manager,Jet Waypoint Template->Manager,model_cx_tower_jet_waypoint_template,group_manager,1,1,1,1
|
||||
access_cx_tower_jet_waypoint_template_root,Jet Waypoint Template->Root,model_cx_tower_jet_waypoint_template,group_root,1,1,1,1
|
||||
access_cx_tower_jet_waypoint_manager,Jet Waypoint->Manager,model_cx_tower_jet_waypoint,group_manager,1,1,1,1
|
||||
access_cx_tower_jet_waypoint_root,Jet Waypoint->Root,model_cx_tower_jet_waypoint,group_root,1,1,1,1
|
||||
|
Reference in New Issue
Block a user