Wipe addons/: full reset for clean re-upload

This commit is contained in:
Tower Deploy
2026-04-27 11:20:53 +03:00
parent 2cf3b5185d
commit 9bb80002c8
363 changed files with 0 additions and 112641 deletions

View File

@@ -1,44 +0,0 @@
<?xml version="1.0" encoding="utf-8" ?>
<odoo>
<record id="ir_module_category_tower" model="ir.module.category">
<field name="name">Cetmix Tower</field>
<field name="sequence">199</field>
</record>
<record id="ir_module_category_tower_server" model="ir.module.category">
<field name="parent_id" ref="ir_module_category_tower" />
<field name="name">Access Level</field>
</record>
<record id="group_user" model="res.groups">
<field name="name">User</field>
<field name="category_id" ref="ir_module_category_tower_server" />
<field name="comment">
Basic actions for selected servers.
</field>
</record>
<record id="group_manager" model="res.groups">
<field name="name">Manager</field>
<field name="category_id" ref="ir_module_category_tower_server" />
<field name="implied_ids" eval="[(4, ref('group_user'))]" />
<field name="comment">
Create and modify selected servers.
</field>
</record>
<record id="group_root" model="res.groups">
<field name="name">Root</field>
<field name="category_id" ref="ir_module_category_tower_server" />
<field name="implied_ids" eval="[(4, ref('group_manager'))]" />
<field name="comment">
Full control over all servers.
</field>
</record>
</odoo>

View File

@@ -1,34 +0,0 @@
<?xml version="1.0" encoding="utf-8" ?>
<odoo>
<record id="rule_cx_tower_command_log_group_user_read" model="ir.rule">
<field name="name">Tower command log: user access rule</field>
<field name="model_id" ref="model_cx_tower_command_log" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_user'))]" />
<field name="domain_force">[
("access_level", "=", "1"),
("create_uid", "=", user.id),
("server_id.user_ids", "in", [user.id])
]</field>
</record>
<record id="rule_cx_tower_command_log_group_manager_read" model="ir.rule">
<field name="name">Tower command log: manager access rule</field>
<field name="model_id" ref="model_cx_tower_command_log" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">[
"&amp;",
("access_level", "&lt;=", "2"),
"|",
("server_id.user_ids", "in", [user.id]),
("server_id.manager_ids", "in", [user.id])
]</field>
</record>
<record id="rule_cx_tower_command_log_group_root_full" model="ir.rule">
<field name="name">Tower command log: root access rule</field>
<field name="model_id" ref="model_cx_tower_command_log" />
<field name="domain_force">[(1, "=", 1)]</field>
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
</record>
</odoo>

View File

@@ -1,84 +0,0 @@
<?xml version="1.0" encoding="utf-8" ?>
<odoo>
<!-- User: read allowed if access_level == 1 and either command.user_ids or a related server grants access via user_ids -->
<record id="rule_cx_tower_command_group_user_read" model="ir.rule">
<field name="name">Command: User read</field>
<field name="model_id" ref="model_cx_tower_command" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_user'))]" />
<field name="domain_force">
["&amp;",
("access_level", "=", "1"),
"|",
("user_ids", "in", [user.id]),
("server_ids.user_ids", "in", [user.id])
]
</field>
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager: read allowed if access_level <= 2 and command or server grants access -->
<record id="rule_cx_tower_command_group_manager_read" model="ir.rule">
<field name="name">Command: Manager read</field>
<field name="model_id" ref="model_cx_tower_command" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">
["&amp;",
("access_level", "&lt;=", "2"),
"|",
"|", ("user_ids", "in", [user.id]), ("manager_ids", "in", [user.id]),
"|",
("server_ids", "=", False),
"|",
("server_ids.user_ids", "in", [user.id]),
("server_ids.manager_ids", "in", [user.id])
]
</field>
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager: write & create allowed if access_level <= 2 and in command.manager_ids -->
<record id="rule_cx_tower_command_group_manager_write" model="ir.rule">
<field name="name">Command: Manager write &amp; create</field>
<field name="model_id" ref="model_cx_tower_command" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">
[("access_level", "&lt;=", "2"), ("manager_ids", "in", [user.id])]
</field>
<field name="perm_read" eval="0" />
<field name="perm_write" eval="1" />
<field name="perm_create" eval="1" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager: unlink allowed if access_level <= 2, creator, and in manager_ids -->
<record id="rule_cx_tower_command_group_manager_unlink" model="ir.rule">
<field name="name">Command: Manager unlink</field>
<field name="model_id" ref="model_cx_tower_command" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">
[
("access_level", "&lt;=", "2"),
("create_uid", "=", user.id),
("manager_ids", "in", [user.id])
]
</field>
<field name="perm_read" eval="0" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="1" />
</record>
<!-- Root: unrestricted access -->
<record id="rule_cx_tower_command_group_root_full" model="ir.rule">
<field name="name">Command: Root unrestricted access</field>
<field name="model_id" ref="model_cx_tower_command" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
<field name="domain_force">[(1, '=', 1)]</field>
</record>
</odoo>

View File

@@ -1,52 +0,0 @@
<?xml version="1.0" encoding="utf-8" ?>
<odoo>
<!-- User: Read access rule: Allow reading file records when the current user is in the related Server's user_ids -->
<record id="rule_cx_tower_file_group_user_read" model="ir.rule">
<field name="name">File: User read via related server (user_ids)</field>
<field name="model_id" ref="model_cx_tower_file" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_user'))]" />
<field name="domain_force">[('server_id.user_ids', 'in', [user.id])]</field>
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager: Write and Create access rule: Allow update and creation when current user is in related Server's manager_ids -->
<record id="rule_cx_tower_file_group_manager_read_write" model="ir.rule">
<field
name="name"
>File: Manager write &amp; create via related server (manager_ids)</field>
<field name="model_id" ref="model_cx_tower_file" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">[('server_id.manager_ids', 'in', [user.id])]</field>
<field name="perm_read" eval="1" />
<field name="perm_write" eval="1" />
<field name="perm_create" eval="1" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager: Unlink access rule: Allow deletion only when the current user is in the related Server's manager_ids and is the record creator -->
<record id="rule_cx_tower_file_group_manager_unlink" model="ir.rule">
<field
name="name"
>File: Manager unlink via related server (manager_ids) and record creator</field>
<field name="model_id" ref="model_cx_tower_file" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">
[ ('server_id.manager_ids', 'in', [user.id]), ('create_uid', '=', user.id) ]
</field>
<field name="perm_read" eval="0" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="1" />
</record>
<!-- Root: Unrestricted access rule: Allow access to all files -->
<record id="rule_cx_tower_file_group_root_full" model="ir.rule">
<field name="name">File: Root Unrestricted Access</field>
<field name="model_id" ref="model_cx_tower_file" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
<field name="domain_force">[(1, '=', 1)]</field>
</record>
</odoo>

View File

@@ -1,52 +0,0 @@
<?xml version="1.0" encoding="utf-8" ?>
<odoo>
<!-- Manager: Read access (if the current user is in user_ids or manager_ids) -->
<record id="rule_cx_tower_file_template_group_manager_read" model="ir.rule">
<field name="name">File: Manager read (user_ids or manager_ids)</field>
<field name="model_id" ref="model_cx_tower_file_template" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">
["|", ("user_ids", "in", [user.id]), ("manager_ids", "in", [user.id])]
</field>
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager: Write and Create access (if the current user is in manager_ids) -->
<record id="rule_cx_tower_file_template_group_manager_write" model="ir.rule">
<field name="name">File: Manager write &amp; create (manager_ids)</field>
<field name="model_id" ref="model_cx_tower_file_template" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">[('manager_ids', 'in', [user.id])]</field>
<field name="perm_read" eval="0" />
<field name="perm_write" eval="1" />
<field name="perm_create" eval="1" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager: Unlink access (if the current user is in manager_ids and is the record creator) -->
<record id="rule_cx_tower_file_template_group_manager_unlink" model="ir.rule">
<field name="name">File: Manager unlink (manager_ids &amp; creator)</field>
<field name="model_id" ref="model_cx_tower_file_template" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">
[("manager_ids", "in", [user.id]), ("create_uid", "=", user.id)]
</field>
<field name="perm_read" eval="0" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="1" />
</record>
<!-- Root: unlimited access -->
<record id="rule_cx_tower_file_template_group_root_full" model="ir.rule">
<field name="name">File: Root unrestricted access</field>
<field name="model_id" ref="model_cx_tower_file_template" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
<field name="domain_force">[(1, '=', 1)]</field>
</record>
</odoo>

View File

@@ -1,75 +0,0 @@
<?xml version="1.0" encoding="utf-8" ?>
<odoo>
<!-- User Read Access -->
<!-- Action access level is "User" AND Template access level is "User" OR user is added in "Users" in the Jet Template OR user is added in "Users" of any Jets created from the template -->
<record id="rule_cx_tower_jet_action_user_read" model="ir.rule">
<field name="name">Jet Action: User Read Access</field>
<field name="model_id" ref="model_cx_tower_jet_action" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_user'))]" />
<field name="domain_force">
[
("access_level", "=", "1"),
"|",
("jet_template_id.access_level", "=", "1"),
"|",
("jet_template_id.user_ids", "in", [user.id]),
("jet_template_id.jet_ids.user_ids", "in", [user.id])
]
</field>
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager Read Access -->
<!-- Action access level is "Manager" or less AND Jet Template access level is "Manager" or less OR user is added in "Users" or "Managers" in the template -->
<record id="rule_cx_tower_jet_action_manager_read" model="ir.rule">
<field name="name">Jet Action: Manager Read Access</field>
<field name="model_id" ref="model_cx_tower_jet_action" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">
[
("access_level", "&lt;=", "2"),
"|",
("jet_template_id.access_level", "&lt;=", "2"),
"|",
("jet_template_id.user_ids", "in", [user.id]),
("jet_template_id.manager_ids", "in", [user.id])
]
</field>
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager Write/Create/Unlink Access -->
<!-- Action access level is "Manager" or less AND user is added to "Managers" of the Jet Template -->
<record id="rule_cx_tower_jet_action_manager_write" model="ir.rule">
<field name="name">Jet Action: Manager Write/Create/Unlink</field>
<field name="model_id" ref="model_cx_tower_jet_action" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">
[
("access_level", "&lt;=", "2"),
("jet_template_id.manager_ids", "in", [user.id])
]
</field>
<field name="perm_read" eval="0" />
<field name="perm_write" eval="1" />
<field name="perm_create" eval="1" />
<field name="perm_unlink" eval="1" />
</record>
<!-- Root Full Access -->
<!-- Any record -->
<record id="rule_cx_tower_jet_action_root_full" model="ir.rule">
<field name="name">Jet Action: Root Full Access</field>
<field name="model_id" ref="model_cx_tower_jet_action" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
<field name="domain_force">[(1, '=', 1)]</field>
</record>
</odoo>

View File

@@ -1,52 +0,0 @@
<?xml version="1.0" encoding="utf-8" ?>
<odoo>
<!-- Manager Read Access -->
<!-- User is in "Users" or "Managers" of both the Jet and the depended Jet -->
<record id="rule_cx_tower_jet_dependency_manager_read" model="ir.rule">
<field name="name">Jet Dependency: Manager Read Access</field>
<field name="model_id" ref="model_cx_tower_jet_dependency" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">
["&amp;",
"|",
("jet_id.user_ids", "in", [user.id]),
("jet_id.manager_ids", "in", [user.id]),
"|",
("jet_depends_on_id.user_ids", "in", [user.id]),
("jet_depends_on_id.manager_ids", "in", [user.id])
]
</field>
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager Write/Create/Delete Access -->
<!-- User is in "Managers" of the Jet AND in "Users" or "Managers" of the depended Jet -->
<record id="rule_cx_tower_jet_dependency_manager_crud" model="ir.rule">
<field
name="name"
>Jet Dependency: Manager write &amp; create &amp; unlink</field>
<field name="model_id" ref="model_cx_tower_jet_dependency" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">
[
("jet_id.manager_ids", "in", [user.id]),
"|",
("jet_depends_on_id.user_ids", "in", [user.id]),
("jet_depends_on_id.manager_ids", "in", [user.id])
]
</field>
<field name="perm_read" eval="0" />
</record>
<!-- Root Full Access -->
<record id="rule_cx_tower_jet_dependency_root_full" model="ir.rule">
<field name="name">Jet Dependency: Root Full Access</field>
<field name="model_id" ref="model_cx_tower_jet_dependency" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
<field name="domain_force">[(1, '=', 1)]</field>
</record>
</odoo>

View File

@@ -1,93 +0,0 @@
<?xml version="1.0" encoding="utf-8" ?>
<odoo>
<!-- User Read Access -->
<!-- User is added to "Users" in jet AND user is added to "Users" in related Server -->
<record id="rule_cx_tower_jet_user_read" model="ir.rule">
<field name="name">Jet: User Read Access</field>
<field name="model_id" ref="model_cx_tower_jet" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_user'))]" />
<field name="domain_force">
[
("user_ids", "in", [user.id]),
("server_id.user_ids", "in", [user.id])
]
</field>
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager Read Access -->
<!-- User is added to "Users" or "Managers" in jet AND user is added to "Users" or "Managers" in related Server -->
<record id="rule_cx_tower_jet_manager_read" model="ir.rule">
<field name="name">Jet: Manager Read Access</field>
<field name="model_id" ref="model_cx_tower_jet" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">
["&amp;",
"|",
("user_ids", "in", [user.id]),
("manager_ids", "in", [user.id]),
"|",
("server_id.user_ids", "in", [user.id]),
("server_id.manager_ids", "in", [user.id])
]
</field>
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager Write/Create Access -->
<!-- User is added to "Managers" in jet AND user is added to "Users" or "Managers" in related Server -->
<record id="rule_cx_tower_jet_manager_write" model="ir.rule">
<field name="name">Jet: Manager write &amp; create</field>
<field name="model_id" ref="model_cx_tower_jet" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">
[
("manager_ids", "in", [user.id]),
"|",
("server_id.user_ids", "in", [user.id]),
("server_id.manager_ids", "in", [user.id])
]
</field>
<field name="perm_read" eval="0" />
<field name="perm_write" eval="1" />
<field name="perm_create" eval="1" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager Delete Access -->
<!-- User is added to "Managers" in jet AND record is created by the user AND user is added to "Users" or "Managers" in related Server -->
<record id="rule_cx_tower_jet_manager_unlink" model="ir.rule">
<field name="name">Jet: Manager unlink</field>
<field name="model_id" ref="model_cx_tower_jet" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">
[
("manager_ids", "in", [user.id]),
("create_uid", "=", user.id),
"|",
("server_id.user_ids", "in", [user.id]),
("server_id.manager_ids", "in", [user.id])
]
</field>
<field name="perm_read" eval="0" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="1" />
</record>
<!-- Root Full Access -->
<record id="rule_cx_tower_jet_root_full" model="ir.rule">
<field name="name">Jet: Root Full Access</field>
<field name="model_id" ref="model_cx_tower_jet" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
<field name="domain_force">[(1, '=', 1)]</field>
</record>
</odoo>

View File

@@ -1,53 +0,0 @@
<?xml version="1.0" encoding="utf-8" ?>
<odoo>
<!-- Manager Read Access -->
<!-- Template access level is "Manager" or less OR user is added in "Users" or "Managers" in the Jet Template -->
<record id="rule_cx_tower_jet_template_dependency_manager_read" model="ir.rule">
<field name="name">Jet Template Dependency: Manager Read Access</field>
<field name="model_id" ref="model_cx_tower_jet_template_dependency" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">
["|",
("template_id.access_level", "&lt;=", "2"),
"|",
("template_id.user_ids", "in", [user.id]),
("template_id.manager_ids", "in", [user.id])
]
</field>
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager Write/Create/Delete Access -->
<!-- Template access level is "Manager" or less AND user is added in "Managers" in the Jet Template -->
<record id="rule_cx_tower_jet_template_dependency_manager_crud" model="ir.rule">
<field
name="name"
>Jet Template Dependency: Manager write &amp; create &amp; unlink</field>
<field name="model_id" ref="model_cx_tower_jet_template_dependency" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">
[("template_id.access_level", "&lt;=", "2"), ("template_id.manager_ids", "in", [user.id])]
</field>
<field name="perm_read" eval="0" />
<field name="perm_write" eval="1" />
<field name="perm_create" eval="1" />
<field name="perm_unlink" eval="1" />
</record>
<!-- Root Full Access -->
<record id="rule_cx_tower_jet_template_dependency_root_full" model="ir.rule">
<field name="name">Jet Template Dependency: Root Full Access</field>
<field name="model_id" ref="model_cx_tower_jet_template_dependency" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
<field name="domain_force">[(1, '=', 1)]</field>
<field name="perm_read" eval="1" />
<field name="perm_write" eval="1" />
<field name="perm_create" eval="1" />
<field name="perm_unlink" eval="1" />
</record>
</odoo>

View File

@@ -1,34 +0,0 @@
<?xml version="1.0" encoding="utf-8" ?>
<odoo>
<!-- Manager Read Access -->
<!-- User is added to "Users" or "Managers" in the related server AND template access level is "Manager" or less OR user is added in "Users" -->
<record id="rule_cx_tower_jet_template_install_line_manager_read" model="ir.rule">
<field name="name">Jet Template Install Line: Manager Read Access</field>
<field name="model_id" ref="model_cx_tower_jet_template_install_line" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">
["&amp;",
"|",
("server_id.user_ids", "in", [user.id]),
("server_id.manager_ids", "in", [user.id]),
"|",
("jet_template_id.access_level", "&lt;=", "2"),
("jet_template_id.user_ids", "in", [user.id])
]
</field>
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Root Full Access -->
<record id="rule_cx_tower_jet_template_install_line_root_full" model="ir.rule">
<field name="name">Jet Template Install Line: Root Full Access</field>
<field name="model_id" ref="model_cx_tower_jet_template_install_line" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
<field name="domain_force">[(1, '=', 1)]</field>
</record>
</odoo>

View File

@@ -1,34 +0,0 @@
<?xml version="1.0" encoding="utf-8" ?>
<odoo>
<!-- Manager Read Access -->
<!-- User is added to "Users" or "Managers" in the related server AND template access level is "Manager" or less OR user is added in "Users" -->
<record id="rule_cx_tower_jet_template_install_manager_read" model="ir.rule">
<field name="name">Jet Template Install: Manager Read Access</field>
<field name="model_id" ref="model_cx_tower_jet_template_install" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">
["&amp;",
"|",
("server_id.user_ids", "in", [user.id]),
("server_id.manager_ids", "in", [user.id]),
"|",
("jet_template_id.access_level", "&lt;=", "2"),
("jet_template_id.user_ids", "in", [user.id])
]
</field>
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Root Full Access -->
<record id="rule_cx_tower_jet_template_install_root_full" model="ir.rule">
<field name="name">Jet Template Install: Root Full Access</field>
<field name="model_id" ref="model_cx_tower_jet_template_install" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
<field name="domain_force">[(1, '=', 1)]</field>
</record>
</odoo>

View File

@@ -1,87 +0,0 @@
<?xml version="1.0" encoding="utf-8" ?>
<odoo>
<!-- User Read Access -->
<!-- Access level is "User" or user is added in "Users" or user is added in "Users" of any Jets created from the template -->
<record id="rule_cx_tower_jet_template_user_read" model="ir.rule">
<field name="name">Jet Template: User Read Access</field>
<field name="model_id" ref="model_cx_tower_jet_template" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_user'))]" />
<field name="domain_force">
["|","|",
("access_level", "=", "1"),
("user_ids", "in", [user.id]),
("jet_ids.user_ids", "in", [user.id])
]
</field>
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager Read Access -->
<!-- Access level is "Manager" or less OR user is added in "Users" or "Managers" -->
<record id="rule_cx_tower_jet_template_manager_read" model="ir.rule">
<field name="name">Jet Template: Manager Read Access</field>
<field name="model_id" ref="model_cx_tower_jet_template" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">
["|",
("access_level", "&lt;=", "2"),
"|", "|",
("user_ids", "in", [user.id]),
("manager_ids", "in", [user.id]),
("jet_ids.manager_ids", "in", [user.id])
]
</field>
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager Write/Create Access -->
<!-- Access level is "Manager" or less AND user is added to "Managers" -->
<record id="rule_cx_tower_jet_template_manager_write" model="ir.rule">
<field name="name">Jet Template: Manager write &amp; create</field>
<field name="model_id" ref="model_cx_tower_jet_template" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">
[("access_level", "&lt;=", "2"), ("manager_ids", "in", [user.id])]
</field>
<field name="perm_read" eval="0" />
<field name="perm_write" eval="1" />
<field name="perm_create" eval="1" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager Delete Access -->
<!-- Access level is "Manager" or less AND user is added to "Managers" AND the record is created by the user -->
<record id="rule_cx_tower_jet_template_manager_unlink" model="ir.rule">
<field name="name">Jet Template: Manager unlink</field>
<field name="model_id" ref="model_cx_tower_jet_template" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">
[("access_level", "&lt;=", "2"), ("manager_ids", "in", [user.id]), ("create_uid", "=", user.id)]
</field>
<field name="perm_read" eval="0" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="1" />
</record>
<!-- Root Full Access -->
<record id="rule_cx_tower_jet_template_root_full" model="ir.rule">
<field name="name">Jet Template: Root Full Access</field>
<field name="model_id" ref="model_cx_tower_jet_template" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
<field name="domain_force">[(1, '=', 1)]</field>
<field name="perm_read" eval="1" />
<field name="perm_write" eval="1" />
<field name="perm_create" eval="1" />
<field name="perm_unlink" eval="1" />
</record>
</odoo>

View File

@@ -1,70 +0,0 @@
<?xml version="1.0" encoding="utf-8" ?>
<odoo>
<!-- Manager Read Access -->
<!-- Access level is Manager (2) and User is added in "Users" or "Managers" of the Jet -->
<record id="rule_cx_tower_jet_waypoint_manager_read" model="ir.rule">
<field name="name">Jet Waypoint: Manager Read Access</field>
<field name="model_id" ref="model_cx_tower_jet_waypoint" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">
[("access_level", "&lt;=", "2"),
"|",
("jet_id.user_ids", "in", [user.id]),
("jet_id.manager_ids", "in", [user.id])
]
</field>
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager Write/Create Access -->
<!-- Access level is Manager (2) AND user is added to "Managers" of the Jet Template -->
<record id="rule_cx_tower_jet_waypoint_manager_write" model="ir.rule">
<field name="name">Jet Waypoint: Manager write &amp; create</field>
<field name="model_id" ref="model_cx_tower_jet_waypoint" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">
[("access_level", "&lt;=", "2"),
("jet_id.jet_template_id.manager_ids", "in", [user.id])
]
</field>
<field name="perm_read" eval="0" />
<field name="perm_write" eval="1" />
<field name="perm_create" eval="1" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager Delete Access -->
<!-- Access level is Manager (2) AND user is added to "Managers" of the Jet Template AND the record is created by the user -->
<record id="rule_cx_tower_jet_waypoint_manager_unlink" model="ir.rule">
<field name="name">Jet Waypoint: Manager unlink</field>
<field name="model_id" ref="model_cx_tower_jet_waypoint" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">
[("access_level", "&lt;=", "2"),
("jet_id.jet_template_id.manager_ids", "in", [user.id]),
("create_uid", "=", user.id)
]
</field>
<field name="perm_read" eval="0" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="1" />
</record>
<!-- Root Full Access -->
<record id="rule_cx_tower_jet_waypoint_root_full" model="ir.rule">
<field name="name">Jet Waypoint: Root Full Access</field>
<field name="model_id" ref="model_cx_tower_jet_waypoint" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
<field name="domain_force">[(1, '=', 1)]</field>
<field name="perm_read" eval="1" />
<field name="perm_write" eval="1" />
<field name="perm_create" eval="1" />
<field name="perm_unlink" eval="1" />
</record>
</odoo>

View File

@@ -1,70 +0,0 @@
<?xml version="1.0" encoding="utf-8" ?>
<odoo>
<!-- Manager Read Access -->
<!-- Access level is Manager (2) and User is added in "Users" or "Managers" of the Jet Template -->
<record id="rule_cx_tower_jet_waypoint_template_manager_read" model="ir.rule">
<field name="name">Jet Waypoint Template: Manager Read Access</field>
<field name="model_id" ref="model_cx_tower_jet_waypoint_template" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">
[("access_level", "&lt;=", "2"),
"|",
("jet_template_id.user_ids", "in", [user.id]),
("jet_template_id.manager_ids", "in", [user.id])
]
</field>
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager Write/Create Access -->
<!-- Access level is Manager (2) AND user is added to "Managers" of the Jet Template -->
<record id="rule_cx_tower_jet_waypoint_template_manager_write" model="ir.rule">
<field name="name">Jet Waypoint Template: Manager write &amp; create</field>
<field name="model_id" ref="model_cx_tower_jet_waypoint_template" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">
[("access_level", "&lt;=", "2"),
("jet_template_id.manager_ids", "in", [user.id])
]
</field>
<field name="perm_read" eval="0" />
<field name="perm_write" eval="1" />
<field name="perm_create" eval="1" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager Delete Access -->
<!-- Access level is Manager (2) AND user is added to "Managers" of the Jet Template AND the record is created by the user -->
<record id="rule_cx_tower_jet_waypoint_template_manager_unlink" model="ir.rule">
<field name="name">Jet Waypoint Template: Manager unlink</field>
<field name="model_id" ref="model_cx_tower_jet_waypoint_template" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">
[("access_level", "&lt;=", "2"),
("jet_template_id.manager_ids", "in", [user.id]),
("create_uid", "=", user.id)
]
</field>
<field name="perm_read" eval="0" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="1" />
</record>
<!-- Root Full Access -->
<record id="rule_cx_tower_jet_waypoint_template_root_full" model="ir.rule">
<field name="name">Jet Waypoint Template: Root Full Access</field>
<field name="model_id" ref="model_cx_tower_jet_waypoint_template" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
<field name="domain_force">[(1, '=', 1)]</field>
<field name="perm_read" eval="1" />
<field name="perm_write" eval="1" />
<field name="perm_create" eval="1" />
<field name="perm_unlink" eval="1" />
</record>
</odoo>

View File

@@ -1,99 +0,0 @@
<?xml version="1.0" encoding="utf-8" ?>
<odoo>
<!-- Manager Read Rules -->
<record id="rule_key_manager_read_users" model="ir.rule">
<field name="name">Key: Manager Read Access - Users/Managers</field>
<field name="model_id" ref="model_cx_tower_key" />
<field
name="domain_force"
>['|', ('user_ids', 'in', [user.id]), ('manager_ids', 'in', [user.id])]</field>
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
</record>
<record id="rule_key_manager_read_secret" model="ir.rule">
<field name="name">Key: Manager Read Access - Secret Type</field>
<field name="model_id" ref="model_cx_tower_key" />
<field name="domain_force">[('key_type', '=', 's')]</field>
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
</record>
<record id="rule_key_manager_read_ssh" model="ir.rule">
<field name="name">Key: Manager Read Access - SSH Key</field>
<field name="model_id" ref="model_cx_tower_key" />
<field name="domain_force">[('key_type', '=', 'k'), '|',
('server_ssh_ids.user_ids', 'in', [user.id]),
('server_ssh_ids.manager_ids', 'in', [user.id])]</field>
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager Write/Create Rules -->
<record id="rule_key_manager_write_managers" model="ir.rule">
<field name="name">Key: Manager Write/Create Access - Managers</field>
<field name="model_id" ref="model_cx_tower_key" />
<field name="domain_force">[('manager_ids', 'in', [user.id])]</field>
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="perm_read" eval="0" />
<field name="perm_write" eval="1" />
<field name="perm_create" eval="1" />
<field name="perm_unlink" eval="0" />
</record>
<record id="rule_key_manager_write_ssh" model="ir.rule">
<field name="name">Key: Manager Write/Create Access - SSH Key</field>
<field name="model_id" ref="model_cx_tower_key" />
<field name="domain_force">['&amp;', ('key_type', '=', 'k'),
('server_ssh_ids.manager_ids', 'in', [user.id])]</field>
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="perm_read" eval="0" />
<field name="perm_write" eval="1" />
<field name="perm_create" eval="1" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager Delete Rules -->
<record id="rule_key_manager_unlink_managers" model="ir.rule">
<field name="name">Key: Manager Delete Access - Managers</field>
<field name="model_id" ref="model_cx_tower_key" />
<field
name="domain_force"
>[('manager_ids', 'in', [user.id]), ('create_uid', '=', user.id)]</field>
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="perm_read" eval="0" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="1" />
</record>
<record id="rule_key_manager_unlink_ssh" model="ir.rule">
<field name="name">Key: Manager Delete Access - SSH Key</field>
<field name="model_id" ref="model_cx_tower_key" />
<field name="domain_force">[('key_type', '=', 'k'),
('server_ssh_ids.manager_ids', 'in', [user.id]),
('create_uid', '=', user.id)]</field>
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="perm_read" eval="0" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="1" />
</record>
<!-- Root Access Rule -->
<record id="rule_key_root" model="ir.rule">
<field name="name">Key: Root Full Access</field>
<field name="model_id" ref="model_cx_tower_key" />
<field name="domain_force">[(1, '=', 1)]</field>
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
</record>
</odoo>

View File

@@ -1,92 +0,0 @@
<?xml version="1.0" encoding="utf-8" ?>
<odoo>
<!-- Manager Read Rules -->
<record id="rule_key_value_manager_read_key" model="ir.rule">
<field name="name">Key Value: Manager Read Access - Key Users/Managers</field>
<field name="model_id" ref="model_cx_tower_key_value" />
<field
name="domain_force"
>['|', ('key_id.user_ids', 'in', [user.id]), ('key_id.manager_ids', 'in', [user.id])]</field>
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
</record>
<record id="rule_key_value_manager_read_server" model="ir.rule">
<field
name="name"
>Key Value: Manager Read Access - Server Users/Managers</field>
<field name="model_id" ref="model_cx_tower_key_value" />
<field name="domain_force">[('key_id.key_type', '=', 's'),
'|', '|', ('server_id', '=', False),
('server_id.user_ids', 'in', [user.id]),
('server_id.manager_ids', 'in', [user.id])]</field>
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager Write/Create Rules -->
<record id="rule_key_value_manager_write_key" model="ir.rule">
<field name="name">Key Value: Manager Write/Create Access - Key Managers</field>
<field name="model_id" ref="model_cx_tower_key_value" />
<field name="domain_force">[('key_id.manager_ids', 'in', [user.id])]</field>
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="perm_read" eval="0" />
<field name="perm_write" eval="1" />
<field name="perm_create" eval="1" />
<field name="perm_unlink" eval="0" />
</record>
<record id="rule_key_value_manager_write_server" model="ir.rule">
<field
name="name"
>Key Value: Manager Write/Create Access - Server Managers</field>
<field name="model_id" ref="model_cx_tower_key_value" />
<field name="domain_force">[('server_id.manager_ids', 'in', [user.id])]</field>
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="perm_read" eval="0" />
<field name="perm_write" eval="1" />
<field name="perm_create" eval="1" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager Delete Rules -->
<record id="rule_key_value_manager_unlink_key" model="ir.rule">
<field name="name">Key Value: Manager Delete Access - Key Managers</field>
<field name="model_id" ref="model_cx_tower_key_value" />
<field
name="domain_force"
>[('key_id.key_type', '=', 's'),('key_id.manager_ids', 'in', [user.id]), ('create_uid', '=', user.id)]</field>
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="perm_read" eval="0" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="1" />
</record>
<record id="rule_key_value_manager_unlink_server" model="ir.rule">
<field name="name">Key Value: Manager Delete Access - Server Managers</field>
<field name="model_id" ref="model_cx_tower_key_value" />
<field
name="domain_force"
>[('key_id.key_type', '=', 's'),('server_id.manager_ids', 'in', [user.id]), ('create_uid', '=', user.id)]</field>
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="perm_read" eval="0" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="1" />
</record>
<!-- Root Access Rule -->
<record id="rule_key_value_root" model="ir.rule">
<field name="name">Key Value: Root Full Access</field>
<field name="model_id" ref="model_cx_tower_key_value" />
<field name="domain_force">[(1, '=', 1)]</field>
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
</record>
</odoo>

View File

@@ -1,90 +0,0 @@
<?xml version="1.0" encoding="utf-8" ?>
<odoo>
<!-- User: read rule for cx.tower.plan_line.action -->
<record id="rule_cx_tower_plan_line_action_group_user_read" model="ir.rule">
<field name="name">Plan Line Action: User read</field>
<field name="model_id" ref="model_cx_tower_plan_line_action" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_user'))]" />
<field name="domain_force">
["&amp;",
("access_level", "=", "1"),
"|",
("plan_id.user_ids", "in", [user.id]),
("plan_id.server_ids.user_ids", "in", [user.id])
]
</field>
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager: read rule for cx.tower.plan.line.action -->
<record id="rule_cx_tower_plan_line_action_group_manager_read" model="ir.rule">
<field name="name">Plan Line Action: Manager read</field>
<field name="model_id" ref="model_cx_tower_plan_line_action" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<!-- The domain requires:
1. access_level <= "2"
2. AND either the plan itself grants access via (user_ids OR manager_ids)
OR there are no related servers
OR a related server grants access via (server_ids.user_ids OR server_ids.manager_ids)
-->
<field name="domain_force">
["&amp;",
("access_level", "&lt;=", "2"),
"|",
"|", ("plan_id.user_ids", "in", [user.id]), ("plan_id.manager_ids", "in", [user.id]),
"|",
("plan_id.server_ids", "=", False),
"|",
("plan_id.server_ids.user_ids", "in", [user.id]),
("plan_id.server_ids.manager_ids", "in", [user.id])
]
</field>
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager: write & create rule for cx.tower.plan_line_action -->
<record id="rule_cx_tower_plan_line_action_group_manager_write" model="ir.rule">
<field name="name">Plan Line Action: Manager write &amp; create</field>
<field name="model_id" ref="model_cx_tower_plan_line_action" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">
["&amp;", ("access_level", "&lt;=", "2"), ("plan_id.manager_ids", "in", [user.id])]
</field>
<field name="perm_read" eval="0" />
<field name="perm_write" eval="1" />
<field name="perm_create" eval="1" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager: unlink rule for cx.tower.plan.line.action -->
<record id="rule_cx_tower_plan_line_action_group_manager_unlink" model="ir.rule">
<field name="name">Plan Line Action: Manager unlink</field>
<field name="model_id" ref="model_cx_tower_plan_line_action" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">
[
("access_level", "&lt;=", "2"),
("create_uid", "=", user.id),
("plan_id.manager_ids", "in", [user.id])
]
</field>
<field name="perm_read" eval="0" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="1" />
</record>
<!-- Root: unrestricted access rule for cx.tower.plan.line.action -->
<record id="rule_cx_tower_plan_line_action_group_root_full" model="ir.rule">
<field name="name">Plan Line Action: Root unrestricted access</field>
<field name="model_id" ref="model_cx_tower_plan_line_action" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
<field name="domain_force">[(1, '=', 1)]</field>
</record>
</odoo>

View File

@@ -1,90 +0,0 @@
<?xml version="1.0" encoding="utf-8" ?>
<odoo>
<!-- User: read rule for cx.tower.plan.line -->
<record id="rule_cx_tower_plan_line_group_user_read" model="ir.rule">
<field name="name">Plan Line: User read</field>
<field name="model_id" ref="model_cx_tower_plan_line" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_user'))]" />
<field name="domain_force">
["&amp;",
("access_level", "=", "1"),
"|",
("plan_id.user_ids", "in", [user.id]),
("plan_id.server_ids.user_ids", "in", [user.id])
]
</field>
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager: read rule for cx.tower.plan.line -->
<record id="rule_cx_tower_plan_line_group_manager_read" model="ir.rule">
<field name="name">Plan Line: Manager read</field>
<field name="model_id" ref="model_cx_tower_plan_line" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<!-- The domain requires:
1. access_level <= "2"
2. AND either the plan itself grants access via (user_ids OR manager_ids)
OR there are no related servers
OR a related server grants access via (server_ids.user_ids OR server_ids.manager_ids)
-->
<field name="domain_force">
["&amp;",
("access_level", "&lt;=", "2"),
"|",
"|", ("plan_id.user_ids", "in", [user.id]), ("plan_id.manager_ids", "in", [user.id]),
"|",
("plan_id.server_ids", "=", False),
"|",
("plan_id.server_ids.user_ids", "in", [user.id]),
("plan_id.server_ids.manager_ids", "in", [user.id])
]
</field>
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager: write & create rule for cx.tower.plan.line -->
<record id="rule_cx_tower_plan_line_group_manager_write" model="ir.rule">
<field name="name">Plan Line: Manager write &amp; create</field>
<field name="model_id" ref="model_cx_tower_plan_line" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">
["&amp;", ("access_level", "&lt;=", "2"), ("plan_id.manager_ids", "in", [user.id])]
</field>
<field name="perm_read" eval="0" />
<field name="perm_write" eval="1" />
<field name="perm_create" eval="1" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager: unlink rule for cx.tower.plan.line -->
<record id="rule_cx_tower_plan_line_group_manager_unlink" model="ir.rule">
<field name="name">Plan Line: Manager unlink</field>
<field name="model_id" ref="model_cx_tower_plan_line" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">
[
("access_level", "&lt;=", "2"),
("create_uid", "=", user.id),
("plan_id.manager_ids", "in", [user.id])
]
</field>
<field name="perm_read" eval="0" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="1" />
</record>
<!-- Root: unrestricted access rule for cx.tower.plan.line -->
<record id="rule_cx_tower_plan_line_group_root_full" model="ir.rule">
<field name="name">Plan Line: Root unrestricted access</field>
<field name="model_id" ref="model_cx_tower_plan_line" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
<field name="domain_force">[(1, '=', 1)]</field>
</record>
</odoo>

View File

@@ -1,43 +0,0 @@
<?xml version="1.0" encoding="utf-8" ?>
<odoo>
<record id="rule_cx_tower_plan_log_group_user_read" model="ir.rule">
<field name="name">Tower plan log: user access rule</field>
<field name="model_id" ref="model_cx_tower_plan_log" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_user'))]" />
<field name="domain_force">[
("access_level", "=", "1"),
("create_uid", "=", user.id),
("server_id.user_ids", "in", [user.id])
]</field>
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
</record>
<record id="rule_cx_tower_plan_log_group_manager_read" model="ir.rule">
<field name="name">Tower plan log: manager access rule</field>
<field name="model_id" ref="model_cx_tower_plan_log" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">[
"&amp;",
("access_level", "&lt;=", "2"),
"|",
("server_id.user_ids", "in", [user.id]),
("server_id.manager_ids", "in", [user.id])
]</field>
<field name="perm_read" eval="1" />
</record>
<record id="rule_cx_tower_plan_log_group_root_full" model="ir.rule">
<field name="name">Tower plan log: root access rule</field>
<field name="model_id" ref="model_cx_tower_plan_log" />
<field name="domain_force">[(1, "=", 1)]</field>
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
</record>
</odoo>

View File

@@ -1,90 +0,0 @@
<?xml version="1.0" encoding="utf-8" ?>
<odoo>
<!-- User: read rule for cx.tower.plan -->
<record id="rule_cx_tower_plan_group_user_read" model="ir.rule">
<field name="name">Plan: User read</field>
<field name="model_id" ref="model_cx_tower_plan" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_user'))]" />
<field name="domain_force">
["&amp;",
("access_level", "=", "1"),
"|",
("user_ids", "in", [user.id]),
("server_ids.user_ids", "in", [user.id])
]
</field>
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager: read rule for cx.tower.plan -->
<record id="rule_cx_tower_plan_group_manager_read" model="ir.rule">
<field name="name">Plan: Manager read</field>
<field name="model_id" ref="model_cx_tower_plan" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<!-- The domain requires:
1. access_level <= "2"
2. AND either the plan itself grants access via (user_ids OR manager_ids)
OR there are no related servers
OR a related server grants access via (server_ids.user_ids OR server_ids.manager_ids)
-->
<field name="domain_force">
["&amp;",
("access_level", "&lt;=", "2"),
"|",
"|", ("user_ids", "in", [user.id]), ("manager_ids", "in", [user.id]),
"|",
("server_ids", "=", False),
"|",
("server_ids.user_ids", "in", [user.id]),
("server_ids.manager_ids", "in", [user.id])
]
</field>
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager: write & create rule for cx.tower.plan -->
<record id="rule_cx_tower_plan_group_manager_write" model="ir.rule">
<field name="name">Plan: Manager write &amp; create</field>
<field name="model_id" ref="model_cx_tower_plan" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">
["&amp;", ("access_level", "&lt;=", "2"), ("manager_ids", "in", [user.id])]
</field>
<field name="perm_read" eval="0" />
<field name="perm_write" eval="1" />
<field name="perm_create" eval="1" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager: unlink rule for cx.tower.plan -->
<record id="rule_cx_tower_plan_group_manager_unlink" model="ir.rule">
<field name="name">Plan: Manager unlink</field>
<field name="model_id" ref="model_cx_tower_plan" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">
[
("access_level", "&lt;=", "2"),
("create_uid", "=", user.id),
("manager_ids", "in", [user.id])
]
</field>
<field name="perm_read" eval="0" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="1" />
</record>
<!-- Root: unrestricted access rule for cx.tower.plan -->
<record id="rule_cx_tower_plan_group_root_full" model="ir.rule">
<field name="name">Plan: Root unrestricted access</field>
<field name="model_id" ref="model_cx_tower_plan" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
<field name="domain_force">[(1, '=', 1)]</field>
</record>
</odoo>

View File

@@ -1,74 +0,0 @@
<?xml version="1.0" encoding="utf-8" ?>
<odoo>
<!-- Manager: Read (see his records by user_ids or via server's user_ids/manager_ids) -->
<record id="cx_tower_scheduled_task_cv_rule_manager_read" model="ir.rule">
<field name="name">Scheduled Task CV: manager read access</field>
<field name="model_id" ref="model_cx_tower_scheduled_task_cv" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
<field name="domain_force">
['|',
'|',
('scheduled_task_id.user_ids', 'in', [user.id]),
('scheduled_task_id.manager_ids', 'in', [user.id]),
'|',
'|',
'|',
'|',
'|',
'|',
'|',
('scheduled_task_id.server_ids.user_ids', 'in', [user.id]),
('scheduled_task_id.server_ids.manager_ids', 'in', [user.id]),
('scheduled_task_id.server_template_ids.user_ids', 'in', [user.id]),
('scheduled_task_id.server_template_ids.manager_ids', 'in', [user.id]),
('scheduled_task_id.jet_ids.user_ids', 'in', [user.id]),
('scheduled_task_id.jet_ids.manager_ids', 'in', [user.id]),
('scheduled_task_id.jet_template_ids.user_ids', 'in', [user.id]),
('scheduled_task_id.jet_template_ids.manager_ids', 'in', [user.id])
]
</field>
</record>
<!-- Manager: Create/Write -->
<record id="cx_tower_scheduled_task_cv_rule_manager_write" model="ir.rule">
<field name="name">Scheduled Task CV: manager write access</field>
<field name="model_id" ref="model_cx_tower_scheduled_task_cv" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="perm_read" eval="0" />
<field name="perm_write" eval="1" />
<field name="perm_create" eval="1" />
<field name="perm_unlink" eval="0" />
<field name="domain_force">
[('scheduled_task_id.manager_ids', 'in', [user.id])]
</field>
</record>
<!-- Manager: Unlink (only if in manager_ids AND creator) -->
<record id="cx_tower_scheduled_task_cv_rule_manager_unlink" model="ir.rule">
<field name="name">Scheduled Task CV: manager unlink access</field>
<field name="model_id" ref="model_cx_tower_scheduled_task_cv" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="perm_read" eval="0" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="1" />
<field name="domain_force">
[
('scheduled_task_id.manager_ids', 'in', [user.id]),
('create_uid', '=', user.id)
]
</field>
</record>
<!-- Root: Full access -->
<record id="cx_tower_scheduled_task_cv_rule_root_full" model="ir.rule">
<field name="name">Scheduled Task CV: root full access</field>
<field name="model_id" ref="model_cx_tower_scheduled_task_cv" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
<field name="domain_force">[(1, '=', 1)]</field>
</record>
</odoo>

View File

@@ -1,78 +0,0 @@
<?xml version="1.0" encoding="utf-8" ?>
<odoo>
<!-- Manager: Read (see his records by user_ids or via server's user_ids/manager_ids) -->
<record id="cx_tower_scheduled_task_rule_manager_read" model="ir.rule">
<field name="name">Scheduled Task: manager read access</field>
<field name="model_id" ref="model_cx_tower_scheduled_task" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
<field name="domain_force">
['|',
'|',
('user_ids', 'in', [user.id]),
('manager_ids', 'in', [user.id]),
'|',
'|',
'|',
'|',
'|',
'|',
'|',
('server_ids.user_ids', 'in', [user.id]),
('server_ids.manager_ids', 'in', [user.id]),
('server_template_ids.user_ids', 'in', [user.id]),
('server_template_ids.manager_ids', 'in', [user.id]),
('jet_ids.user_ids', 'in', [user.id]),
('jet_ids.manager_ids', 'in', [user.id]),
('jet_template_ids.user_ids', 'in', [user.id]),
('jet_template_ids.manager_ids', 'in', [user.id])
]
</field>
</record>
<!-- Manager: Create/Write -->
<record id="cx_tower_scheduled_task_rule_manager_write" model="ir.rule">
<field name="name">Scheduled Task: manager write access</field>
<field name="model_id" ref="model_cx_tower_scheduled_task" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="perm_read" eval="0" />
<field name="perm_write" eval="1" />
<field name="perm_create" eval="1" />
<field name="perm_unlink" eval="0" />
<field name="domain_force">
[('manager_ids', 'in', [user.id])]
</field>
</record>
<!-- Manager: Unlink (only if in manager_ids AND creator) -->
<record id="cx_tower_scheduled_task_rule_manager_unlink" model="ir.rule">
<field name="name">Scheduled Task: manager unlink access</field>
<field name="model_id" ref="model_cx_tower_scheduled_task" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="perm_read" eval="0" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="1" />
<field name="domain_force">
[
('manager_ids', 'in', [user.id]),
('create_uid', '=', user.id)
]
</field>
</record>
<!-- Root: Full access -->
<record id="cx_tower_scheduled_task_rule_root_full" model="ir.rule">
<field name="name">Scheduled Task: root full access</field>
<field name="model_id" ref="model_cx_tower_scheduled_task" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
<field name="perm_read" eval="1" />
<field name="perm_write" eval="1" />
<field name="perm_create" eval="1" />
<field name="perm_unlink" eval="1" />
<field name="domain_force">[(1, '=', 1)]</field>
</record>
</odoo>

View File

@@ -1,206 +0,0 @@
<?xml version="1.0" encoding="utf-8" ?>
<odoo>
<!-- User access rule -->
<record id="rule_cx_tower_server_log_group_user_read" model="ir.rule">
<field name="name">Tower server log: user access rule</field>
<field name="model_id" ref="model_cx_tower_server_log" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_user'))]" />
<field name="domain_force">[
("access_level", "=", "1"),
("server_id.user_ids", "in", [user.id])
]</field>
</record>
<!-- Manager access rules -->
<record id="rule_cx_tower_server_log_group_manager_read" model="ir.rule">
<field name="name">Tower server log: manager read access rule</field>
<field name="model_id" ref="model_cx_tower_server_log" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">[
("access_level", "&lt;=", "2"),
"|",
("server_id.user_ids", "in", [user.id]),
("server_id.manager_ids", "in", [user.id])
]</field>
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
</record>
<record id="rule_cx_tower_server_log_group_manager_write" model="ir.rule">
<field name="name">Tower server log: manager write access rule</field>
<field name="model_id" ref="model_cx_tower_server_log" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">[
("access_level", "&lt;=", "2"),
("server_id.manager_ids", "in", [user.id])
]</field>
<field name="perm_read" eval="0" />
<field name="perm_write" eval="1" />
<field name="perm_create" eval="1" />
<field name="perm_unlink" eval="0" />
</record>
<record id="rule_cx_tower_server_log_group_manager_unlink" model="ir.rule">
<field name="name">Tower server log: manager unlink access rule</field>
<field name="model_id" ref="model_cx_tower_server_log" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">[
("access_level", "&lt;=", "2"),
("create_uid", "=", user.id),
("server_id.manager_ids", "in", [user.id])
]</field>
<field name="perm_read" eval="0" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="1" />
</record>
<!-- Root access rule -->
<record id="rule_cx_tower_server_log_group_root_full" model="ir.rule">
<field name="name">Tower server log: root access rule</field>
<field name="model_id" ref="model_cx_tower_server_log" />
<field name="domain_force">[(1, "=", 1)]</field>
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
</record>
<!-- Jet-based User access rule -->
<record id="rule_cx_tower_server_log_group_user_jet_read" model="ir.rule">
<field name="name">Tower server log: user jet access rule</field>
<field name="model_id" ref="model_cx_tower_server_log" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_user'))]" />
<field name="domain_force">[
("access_level", "=", "1"),
("jet_id.user_ids", "in", [user.id])
]</field>
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Jet-based Manager access rules -->
<record id="rule_cx_tower_server_log_group_manager_jet_read" model="ir.rule">
<field name="name">Tower server log: manager jet read access rule</field>
<field name="model_id" ref="model_cx_tower_server_log" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">[
("access_level", "&lt;=", "2"),
"|",
("jet_id.user_ids", "in", [user.id]),
("jet_id.manager_ids", "in", [user.id])
]</field>
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
</record>
<record id="rule_cx_tower_server_log_group_manager_jet_write" model="ir.rule">
<field name="name">Tower server log: manager jet write access rule</field>
<field name="model_id" ref="model_cx_tower_server_log" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">[
("access_level", "&lt;=", "2"),
("jet_id.manager_ids", "in", [user.id])
]</field>
<field name="perm_read" eval="0" />
<field name="perm_write" eval="1" />
<field name="perm_create" eval="1" />
<field name="perm_unlink" eval="0" />
</record>
<record id="rule_cx_tower_server_log_group_manager_jet_unlink" model="ir.rule">
<field name="name">Tower server log: manager jet unlink access rule</field>
<field name="model_id" ref="model_cx_tower_server_log" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">[
("access_level", "&lt;=", "2"),
("jet_id.manager_ids", "in", [user.id]),
("create_uid", "=", user.id)
]</field>
<field name="perm_read" eval="0" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="1" />
</record>
<!-- Jet Template-based User access rule -->
<record id="rule_cx_tower_server_log_group_user_jet_template_read" model="ir.rule">
<field name="name">Tower server log: user jet template access rule</field>
<field name="model_id" ref="model_cx_tower_server_log" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_user'))]" />
<field name="domain_force">[
("access_level", "=", "1"),
("jet_template_id.user_ids", "in", [user.id])
]</field>
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Jet Template-based Manager access rules -->
<record
id="rule_cx_tower_server_log_group_manager_jet_template_read"
model="ir.rule"
>
<field
name="name"
>Tower server log: manager jet template read access rule</field>
<field name="model_id" ref="model_cx_tower_server_log" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">[
("access_level", "&lt;=", "2"),
"|",
("jet_template_id.user_ids", "in", [user.id]),
("jet_template_id.manager_ids", "in", [user.id])
]</field>
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
</record>
<record
id="rule_cx_tower_server_log_group_manager_jet_template_write"
model="ir.rule"
>
<field
name="name"
>Tower server log: manager jet template write access rule</field>
<field name="model_id" ref="model_cx_tower_server_log" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">[
("access_level", "&lt;=", "2"),
("jet_template_id.manager_ids", "in", [user.id])
]</field>
<field name="perm_read" eval="0" />
<field name="perm_write" eval="1" />
<field name="perm_create" eval="1" />
<field name="perm_unlink" eval="0" />
</record>
<record
id="rule_cx_tower_server_log_group_manager_jet_template_unlink"
model="ir.rule"
>
<field
name="name"
>Tower server log: manager jet template unlink access rule</field>
<field name="model_id" ref="model_cx_tower_server_log" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">[
("access_level", "&lt;=", "2"),
("jet_template_id.manager_ids", "in", [user.id]),
("create_uid", "=", user.id)
]</field>
<field name="perm_read" eval="0" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="1" />
</record>
</odoo>

View File

@@ -1,77 +0,0 @@
<?xml version="1.0" encoding="utf-8" ?>
<odoo>
<!-- User Access -->
<record id="rule_cx_tower_server_group_user_read" model="ir.rule">
<field name="name">Tower Server: user visibility rule</field>
<field name="model_id" ref="model_cx_tower_server" />
<field name="groups" eval="[(4, ref('group_user'))]" />
<!-- allow read if the user is in Users -->
<field name="domain_force">[('user_ids', 'in', [user.id])]</field>
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager Access -->
<!-- Rule 1: Read access if the current user is a follower or is in manager_ids -->
<record id="rule_cx_tower_server_group_manager_read" model="ir.rule">
<field
name="name"
>Tower Server: Manager Read (if follower or in manager_ids)</field>
<field name="model_id" ref="model_cx_tower_server" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<!-- allow read if the user is in Users or Managers -->
<field name="domain_force">
['|', ('user_ids', 'in', [user.id]),
('manager_ids', 'in', [user.id])]
</field>
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Rule 2: Write and Create access if the current user is in manager_ids -->
<record id="rule_cx_tower_server_group_manager_write" model="ir.rule">
<field
name="name"
>Tower Server: Manager Write &amp; Create (if in manager_ids)</field>
<field name="model_id" ref="model_cx_tower_server" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<!-- allow write/create only if the user is in the manager_ids many2many field -->
<field name="domain_force">[('manager_ids', 'in', [user.id])]</field>
<field name="perm_read" eval="0" />
<field name="perm_write" eval="1" />
<field name="perm_create" eval="1" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Rule 3: Delete access if the current user is in manager_ids and is the creator -->
<record id="rule_cx_tower_server_group_manager_unlink" model="ir.rule">
<field
name="name"
>Tower Server: Manager Delete (if in manager_ids and creator)</field>
<field name="model_id" ref="model_cx_tower_server" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<!-- allow deletion only if the user is in manager_ids and he is the record creator -->
<field
name="domain_force"
>[('manager_ids', 'in', [user.id]), ('create_uid', '=', user.id)]</field>
<field name="perm_read" eval="0" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="1" />
</record>
<!-- Root Access -->
<record id="rule_cx_tower_server_group_root_full" model="ir.rule">
<field name="name">Tower Server: root visibility rule</field>
<field name="model_id" ref="model_cx_tower_server" />
<field name="domain_force">[(1, '=', 1)]</field>
<field name="groups" eval="[(4,ref('group_root'))]" />
</record>
</odoo>

View File

@@ -1,55 +0,0 @@
<?xml version="1.0" encoding="utf-8" ?>
<odoo>
<!-- Manager Read Rule -->
<record id="rule_cx_tower_server_template_manager_read" model="ir.rule">
<field name="name">Server Template: Manager Read Access</field>
<field name="model_id" ref="model_cx_tower_server_template" />
<field
name="domain_force"
>['|', ('user_ids', 'in', [user.id]), ('manager_ids', 'in', [user.id])]</field>
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager Write Rule -->
<record id="rule_cx_tower_server_template_manager_write" model="ir.rule">
<field name="name">Server Template: Manager Write Access</field>
<field name="model_id" ref="model_cx_tower_server_template" />
<field name="domain_force">[('manager_ids', 'in', [user.id])]</field>
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="perm_read" eval="0" />
<field name="perm_write" eval="1" />
<field name="perm_create" eval="1" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager Delete Rule -->
<record id="rule_cx_tower_server_template_manager_unlink" model="ir.rule">
<field name="name">Server Template: Manager Delete Access</field>
<field name="model_id" ref="model_cx_tower_server_template" />
<field
name="domain_force"
>[('manager_ids', 'in', [user.id]), ('create_uid','=', user.id)]</field>
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="perm_read" eval="0" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="1" />
</record>
<!-- Root Access Rule -->
<record id="cx_tower_server_template_rule_group_root_access" model="ir.rule">
<field name="name">Server Template: Root Full Access</field>
<field name="model_id" ref="model_cx_tower_server_template" />
<field name="domain_force">[(1,'=',1)]</field>
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
<field name="perm_read" eval="1" />
<field name="perm_write" eval="1" />
<field name="perm_create" eval="1" />
<field name="perm_unlink" eval="1" />
</record>
</odoo>

View File

@@ -1,110 +0,0 @@
<?xml version="1.0" encoding="UTF-8" ?>
<odoo noupdate="1">
<!-- cx.tower.command.run.wizard -->
<record id="rule_cx_tower_command_run_wizard_creator_only" model="ir.rule">
<field name="name">Creator only</field>
<field name="model_id" ref="model_cx_tower_command_run_wizard" />
<field name="global" eval="True" />
<field name="domain_force">[('create_uid', '=', user.id)]</field>
</record>
<!-- cx.tower.plan.run.wizard -->
<record id="rule_cx_tower_plan_run_wizard_creator_only" model="ir.rule">
<field name="name">Creator only</field>
<field name="model_id" ref="model_cx_tower_plan_run_wizard" />
<field name="global" eval="True" />
<field name="domain_force">[('create_uid', '=', user.id)]</field>
</record>
<!-- cx.tower.server.host.key.wizard -->
<record id="rule_cx_tower_server_host_key_wizard_creator_only" model="ir.rule">
<field name="name">Creator only</field>
<field name="model_id" ref="model_cx_tower_server_host_key_wizard" />
<field name="global" eval="True" />
<field name="domain_force">[('create_uid', '=', user.id)]</field>
</record>
<!-- cx.tower.server.template.create.wizard -->
<record
id="rule_cx_tower_server_template_create_wizard_creator_only"
model="ir.rule"
>
<field name="name">Creator only</field>
<field name="model_id" ref="model_cx_tower_server_template_create_wizard" />
<field name="global" eval="True" />
<field name="domain_force">[('create_uid', '=', user.id)]</field>
</record>
<!-- cx.tower.jet.template.install.wiz -->
<record
id="rule_cx_tower_jet_template_install_wiz_creator_only"
model="ir.rule"
>
<field name="name">Creator only</field>
<field name="model_id" ref="model_cx_tower_jet_template_install_wiz" />
<field name="global" eval="True" />
<field name="domain_force">[('create_uid', '=', user.id)]</field>
</record>
<!-- cx.tower.jet.action.wiz -->
<record id="rule_cx_tower_jet_action_wiz_creator_only" model="ir.rule">
<field name="name">Creator only</field>
<field name="model_id" ref="model_cx_tower_jet_action_wizard" />
<field name="global" eval="True" />
<field name="domain_force">[('create_uid', '=', user.id)]</field>
</record>
<!-- cx.tower.jet.state.wiz -->
<record id="rule_cx_tower_jet_state_wiz_creator_only" model="ir.rule">
<field name="name">Creator only</field>
<field name="model_id" ref="model_cx_tower_jet_state_wizard" />
<field name="global" eval="True" />
<field name="domain_force">[('create_uid', '=', user.id)]</field>
</record>
<!-- cx.tower.jet.create.wizard -->
<record id="rule_cx_tower_jet_create_wizard_creator_only" model="ir.rule">
<field name="name">Creator only</field>
<field name="model_id" ref="model_cx_tower_jet_create_wizard" />
<field name="global" eval="True" />
<field name="domain_force">[('create_uid', '=', user.id)]</field>
</record>
<!-- cx.tower.jet.create.wizard.variable.line -->
<record
id="rule_cx_tower_jet_create_wizard_variable_line_creator_only"
model="ir.rule"
>
<field name="name">Creator only</field>
<field
name="model_id"
ref="model_cx_tower_jet_create_wizard_variable_line"
/>
<field name="global" eval="True" />
<field name="domain_force">[('create_uid', '=', user.id)]</field>
</record>
<!-- cx.tower.jet.clone.wizard -->
<record id="rule_cx_tower_jet_clone_wizard_creator_only" model="ir.rule">
<field name="name">Creator only</field>
<field name="model_id" ref="model_cx_tower_jet_clone_wizard" />
<field name="global" eval="True" />
<field name="domain_force">[('create_uid', '=', user.id)]</field>
</record>
<!-- cx.tower.jet.clone.wizard.variable.line -->
<record
id="rule_cx_tower_jet_clone_wizard_variable_line_creator_only"
model="ir.rule"
>
<field name="name">Creator only</field>
<field
name="model_id"
ref="model_cx_tower_jet_clone_wizard_variable_line"
/>
<field name="global" eval="True" />
<field name="domain_force">[('create_uid', '=', user.id)]</field>
</record>
</odoo>

View File

@@ -1,42 +0,0 @@
<?xml version="1.0" encoding="utf-8" ?>
<odoo>
<!--
Access rule checks for User and Manager:
1. Shortcut access
2. Access to shortcut servers
-->
<record id="cx_tower_shortcut_rule_group_user_visibility" model="ir.rule">
<field name="name">Tower Shortcut: user visibility rule</field>
<field name="model_id" ref="model_cx_tower_shortcut" />
<field name="groups" eval="[(4, ref('group_user'))]" />
<field name="domain_force">[
('server_ids.user_ids', 'in', [user.id]),
('access_level', '=', '1')
]</field>
</record>
<record id="cx_tower_shortcut_rule_group_manager_visibility" model="ir.rule">
<field name="name">Tower shortcut: manager visibility rule</field>
<field name="model_id" ref="model_cx_tower_shortcut" />
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="domain_force">[
('access_level', '&lt;=', '2'),
'|', '|', '|',
('server_ids.user_ids', 'in', [user.id]),
('server_ids.manager_ids', 'in', [user.id]),
('server_template_ids.user_ids', 'in', [user.id]),
('server_template_ids.manager_ids', 'in', [user.id]),
]
</field>
</record>
<record id="cx_tower_shortcut_rule_group_root_visibility" model="ir.rule">
<field name="name">Tower shortcut: root visibility rule</field>
<field name="model_id" ref="model_cx_tower_shortcut" />
<field name="domain_force">[(1, '=', 1)]</field>
<field name="groups" eval="[(4,ref('cetmix_tower_server.group_root'))]" />
</record>
</odoo>

View File

@@ -1,32 +0,0 @@
<?xml version="1.0" encoding="utf-8" ?>
<odoo>
<!-- Record Rules -->
<record id="rule_cx_tower_tag_user" model="ir.rule">
<field name="name">Tower Tag: User can read any record</field>
<field name="model_id" ref="model_cx_tower_tag" />
<field name="domain_force">[(1, '=', 1)]</field>
<field name="groups" eval="[(4, ref('group_user'))]" />
<field name="perm_read" eval="True" />
<field name="perm_write" eval="False" />
<field name="perm_create" eval="False" />
<field name="perm_unlink" eval="False" />
</record>
<record id="rule_cx_tower_tag_manager" model="ir.rule">
<field name="name">Tower Tag: Manager can create/edit/delete own records</field>
<field name="model_id" ref="model_cx_tower_tag" />
<field name="domain_force">[('create_uid', '=', user.id)]</field>
<field name="groups" eval="[(4, ref('group_manager'))]" />
<field name="perm_read" eval="False" />
<field name="perm_write" eval="True" />
<field name="perm_create" eval="True" />
<field name="perm_unlink" eval="True" />
</record>
<record id="rule_cx_tower_tag_root" model="ir.rule">
<field name="name">Tower Tag: Root has full access</field>
<field name="model_id" ref="model_cx_tower_tag" />
<field name="domain_force">[(1, '=', 1)]</field>
<field name="groups" eval="[(4, ref('group_root'))]" />
</record>
</odoo>

View File

@@ -1,52 +0,0 @@
<?xml version="1.0" encoding="utf-8" ?>
<odoo>
<!-- User Read Rules -->
<record id="rule_cx_tower_variable_option_user_read" model="ir.rule">
<field name="name">Variable Option: User Read Access</field>
<field name="model_id" ref="model_cx_tower_variable_option" />
<field name="domain_force">[('access_level', '=', '1')]</field>
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_user'))]" />
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager Read Rules -->
<record id="rule_cx_tower_variable_option_manager_read" model="ir.rule">
<field name="name">Variable Option: Manager Read Access</field>
<field name="model_id" ref="model_cx_tower_variable_option" />
<field name="domain_force">[('access_level', '&lt;=', '2')]</field>
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager Write/Create Rules -->
<record id="rule_cx_tower_variable_option_manager_write" model="ir.rule">
<field name="name">Variable Option: Manager Write/Create/Unlink Access</field>
<field name="model_id" ref="model_cx_tower_variable_option" />
<field
name="domain_force"
>[('access_level', '&lt;=', '2'), ('create_uid', '=', user.id)]</field>
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="perm_read" eval="0" />
<field name="perm_write" eval="1" />
<field name="perm_create" eval="1" />
<field name="perm_unlink" eval="1" />
</record>
<!-- Root Access Rule -->
<record id="rule_cx_tower_variable_option_root" model="ir.rule">
<field name="name">Variable Option: Root Full Access</field>
<field name="model_id" ref="model_cx_tower_variable_option" />
<field name="domain_force">[(1, '=', 1)]</field>
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
<field name="perm_read" eval="1" />
<field name="perm_write" eval="1" />
<field name="perm_create" eval="1" />
<field name="perm_unlink" eval="1" />
</record>
</odoo>

View File

@@ -1,52 +0,0 @@
<?xml version="1.0" encoding="utf-8" ?>
<odoo>
<!-- User Read Rule -->
<record id="rule_cx_tower_variable_user_read" model="ir.rule">
<field name="name">Variable: User Read Access</field>
<field name="model_id" ref="model_cx_tower_variable" />
<field name="domain_force">[('access_level', '=', '1')]</field>
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_user'))]" />
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager Read Rule -->
<record id="rule_cx_tower_variable_manager_read" model="ir.rule">
<field name="name">Variable: Manager Read Access</field>
<field name="model_id" ref="model_cx_tower_variable" />
<field name="domain_force">[('access_level', '&lt;=', '2')]</field>
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager Write/Create Rule -->
<record id="rule_cx_tower_variable_manager_write" model="ir.rule">
<field name="name">Variable: Manager Write/Create/Unlink Access</field>
<field name="model_id" ref="model_cx_tower_variable" />
<field
name="domain_force"
>[('access_level', '&lt;=', '2'), ('create_uid', '=', user.id)]</field>
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_manager'))]" />
<field name="perm_read" eval="0" />
<field name="perm_write" eval="1" />
<field name="perm_create" eval="1" />
<field name="perm_unlink" eval="1" />
</record>
<!-- Root Access Rule -->
<record id="rule_cx_tower_variable_root" model="ir.rule">
<field name="name">Variable: Root Full Access</field>
<field name="model_id" ref="model_cx_tower_variable" />
<field name="domain_force">[(1, '=', 1)]</field>
<field name="groups" eval="[(4, ref('cetmix_tower_server.group_root'))]" />
<field name="perm_read" eval="1" />
<field name="perm_write" eval="1" />
<field name="perm_create" eval="1" />
<field name="perm_unlink" eval="1" />
</record>
</odoo>

View File

@@ -1,104 +0,0 @@
<?xml version="1.0" encoding="utf-8" ?>
<odoo>
<!-- User Read Rules -->
<record id="rule_cx_tower_variable_value_user_read" model="ir.rule">
<field name="name">Variable Value: User Read Access</field>
<field name="model_id" ref="model_cx_tower_variable_value" />
<field name="domain_force">[
('access_level', '=', '1'),
'|', '|', '|', '|', '|',
('is_global', '=', True),
('server_id.user_ids', 'in', [user.id]),
('plan_line_action_id.plan_id.user_ids', 'in', [user.id]),
('plan_line_action_id.plan_id.server_ids.user_ids', 'in', [user.id]),
('jet_id.user_ids', 'in', [user.id]),
('jet_template_id.user_ids', 'in', [user.id])
]</field>
<field name="groups" eval="[(4, ref('group_user'))]" />
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager Read Rules -->
<record id="rule_cx_tower_variable_value_manager_read" model="ir.rule">
<field name="name">Variable Value: Manager Read Access</field>
<field name="model_id" ref="model_cx_tower_variable_value" />
<field name="domain_force">[
('access_level', '&lt;=', '2'),
'|', '|', '|', '|', '|', '|', '|', '|', '|', '|', '|', '|',
('is_global', '=', True),
('server_id.user_ids', 'in', [user.id]),
('server_id.manager_ids', 'in', [user.id]),
('server_template_id.user_ids', 'in', [user.id]),
('server_template_id.manager_ids', 'in', [user.id]),
('plan_line_action_id.plan_id.user_ids', 'in', [user.id]),
('plan_line_action_id.plan_id.manager_ids', 'in', [user.id]),
('plan_line_action_id.plan_id.server_ids.user_ids', 'in', [user.id]),
('plan_line_action_id.plan_id.server_ids.manager_ids', 'in', [user.id]),
('jet_id.user_ids', 'in', [user.id]),
('jet_id.manager_ids', 'in', [user.id]),
('jet_template_id.user_ids', 'in', [user.id]),
('jet_template_id.manager_ids', 'in', [user.id])
]</field>
<field name="groups" eval="[(4, ref('group_manager'))]" />
<field name="perm_read" eval="1" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager Write/Create Rules -->
<record id="rule_cx_tower_variable_value_manager_write" model="ir.rule">
<field name="name">Variable Value: Manager Write/Create Access</field>
<field name="model_id" ref="model_cx_tower_variable_value" />
<field name="domain_force">[
('access_level', '&lt;=', '2'),
'|', '|', '|', '|', '|',
('server_id.manager_ids', 'in', [user.id]),
('server_template_id.manager_ids', 'in', [user.id]),
('plan_line_action_id.plan_id.manager_ids', 'in', [user.id]),
('plan_line_action_id.plan_id.server_ids.manager_ids', 'in', [user.id]),
('jet_id.manager_ids', 'in', [user.id]),
('jet_template_id.manager_ids', 'in', [user.id])
]</field>
<field name="groups" eval="[(4, ref('group_manager'))]" />
<field name="perm_read" eval="0" />
<field name="perm_write" eval="1" />
<field name="perm_create" eval="1" />
<field name="perm_unlink" eval="0" />
</record>
<!-- Manager Unlink Rules -->
<record id="rule_cx_tower_variable_value_manager_unlink" model="ir.rule">
<field name="name">Variable Value: Manager Unlink Access</field>
<field name="model_id" ref="model_cx_tower_variable_value" />
<field name="domain_force">[
('access_level', '&lt;=', '2'),
('create_uid', '=', user.id),
'|', '|', '|', '|', '|',
('server_id.manager_ids', 'in', [user.id]),
('server_template_id.manager_ids', 'in', [user.id]),
('plan_line_action_id.plan_id.manager_ids', 'in', [user.id]),
('plan_line_action_id.plan_id.server_ids.manager_ids', 'in', [user.id]),
('jet_id.manager_ids', 'in', [user.id]),
('jet_template_id.manager_ids', 'in', [user.id])
]</field>
<field name="groups" eval="[(4, ref('group_manager'))]" />
<field name="perm_read" eval="0" />
<field name="perm_write" eval="0" />
<field name="perm_create" eval="0" />
<field name="perm_unlink" eval="1" />
</record>
<!-- Root Access Rule -->
<record id="rule_cx_tower_variable_value_root" model="ir.rule">
<field name="name">Variable Value: Root Full Access</field>
<field name="model_id" ref="model_cx_tower_variable_value" />
<field name="domain_force">[(1, '=', 1)]</field>
<field name="groups" eval="[(4, ref('group_root'))]" />
</record>
</odoo>

View File

@@ -1,100 +0,0 @@
id,name,model_id:id,group_id:id,perm_read,perm_write,perm_create,perm_unlink
access_variable_user,Variable->User,model_cx_tower_variable,group_user,1,0,0,0
access_variable_manager,Variable->Manager,model_cx_tower_variable,group_manager,1,1,1,0
access_variable_root,Variable->Root,model_cx_tower_variable,group_root,1,1,1,1
access_variable_value_user,Variable Value->User,model_cx_tower_variable_value,group_user,1,0,0,0
access_variable_value_manager,Variable Value->Manager,model_cx_tower_variable_value,group_manager,1,1,1,1
access_variable_value_root,Variable Value->Root,model_cx_tower_variable_value,group_root,1,1,1,1
access_os_user,OS->User,model_cx_tower_os,group_user,1,0,0,0
access_os_root,OS->Root,model_cx_tower_os,group_root,1,1,1,1
access_tag_user,Tag->User,model_cx_tower_tag,group_user,1,0,0,0
access_tag_manager,Tag->Manager,model_cx_tower_tag,group_manager,1,1,1,1
access_tag_root,Tag->Root,model_cx_tower_tag,group_root,1,1,1,1
access_server_user,Server->User,model_cx_tower_server,group_user,1,0,0,0
access_server_manager,Server->Manager,model_cx_tower_server,group_manager,1,1,1,1
access_server_root,Server->Root,model_cx_tower_server,group_root,1,1,1,1
access_command_user,Command->User,model_cx_tower_command,group_user,1,0,0,0
access_command_manager,Command->Manager,model_cx_tower_command,group_manager,1,1,1,1
access_command_root,Command->Root,model_cx_tower_command,group_root,1,1,1,1
access_run_command_user,Run Command->User,model_cx_tower_command_run_wizard,group_user,1,1,1,1
access_run_command_variable_value_user,Run Command Variable Value->User,model_cx_tower_command_run_wizard_variable_value,group_user,1,1,1,1
access_execute_plan_user,Run Plan->User,model_cx_tower_plan_run_wizard,group_user,1,1,1,1
access_execute_plan_variable_value_user,Run Plan Variable Value->User,model_cx_tower_plan_run_wizard_variable_value,group_user,1,1,1,1
access_key_user,Key->User,model_cx_tower_key,group_user,0,0,0,0
access_key_manager,Key->Manager,model_cx_tower_key,group_manager,1,1,1,1
access_key_root,Key->Root,model_cx_tower_key,group_root,1,1,1,1
access_key_value_manager,Key Value->Manager,model_cx_tower_key_value,group_manager,1,1,1,1
access_key_value_root,Key Value->Root,model_cx_tower_key_value,group_root,1,1,1,1
access_command_log_user,Command Log->User,model_cx_tower_command_log,group_user,1,0,0,0
access_command_log_manager,Command Log->Manager,model_cx_tower_command_log,group_manager,1,0,0,0
access_command_log_root,Command Log->Root,model_cx_tower_command_log,group_root,1,0,0,0
access_plan_user,Plan->User,model_cx_tower_plan,group_user,1,0,0,0
access_plan_manager,Plan->Manager,model_cx_tower_plan,group_manager,1,1,1,1
access_plan_root,Plan->Root,model_cx_tower_plan,group_root,1,1,1,1
access_plan_line_user,Plan Line->User,model_cx_tower_plan_line,group_user,1,0,0,0
access_plan_line_manager,Plan Line->Manager,model_cx_tower_plan_line,group_manager,1,1,1,1
access_plan_line_root,Plan Line->Root,model_cx_tower_plan_line,group_root,1,1,1,1
access_plan_line_action_user,Plan Line Action->User,model_cx_tower_plan_line_action,group_user,1,0,0,0
access_plan_line_action_manager,Plan Line Action->Manager,model_cx_tower_plan_line_action,group_manager,1,1,1,1
access_plan_line_action_root,Plan Line Action->Root,model_cx_tower_plan_line_action,group_root,1,1,1,1
access_plan_log_user,Plan Log->User,model_cx_tower_plan_log,group_user,1,0,0,0
access_plan_log_manager,Plan Log->Manager,model_cx_tower_plan_log,group_manager,1,0,0,0
access_plan_log_root,Plan Log->Root,model_cx_tower_plan_log,group_root,1,0,0,0
access_file_user,File->User,model_cx_tower_file,group_user,1,0,0,0
access_file_manager,File->Manager,model_cx_tower_file,group_manager,1,1,1,1
access_file_root,File->Root,model_cx_tower_file,group_root,1,1,1,1
access_file_template_manager,File Template->Manager,model_cx_tower_file_template,group_manager,1,1,1,1
access_file_template_root,File Template->Root,model_cx_tower_file_template,group_root,1,1,1,1
access_server_log_user,Server Log->User,model_cx_tower_server_log,group_user,1,0,0,0
access_server_log_manager,Server Log->Manager,model_cx_tower_server_log,group_manager,1,1,1,1
access_server_log_root,Server Log->Root,model_cx_tower_server_log,group_root,1,1,1,1
access_server_template_manager,Server Template->Manager,model_cx_tower_server_template,group_manager,1,1,1,1
access_server_template_root,Server Template->Root,model_cx_tower_server_template,group_root,1,1,1,1
access_create_server_from_template_manager,Create Server From Template->Manager,model_cx_tower_server_template_create_wizard,group_manager,1,1,1,1
access_create_server_from_template_line_manager,Create Server From Template Line->Manager,model_cx_tower_server_template_create_wizard_line,group_manager,1,1,1,1
access_cx_tower_variable_option_user,Variable Option->User,model_cx_tower_variable_option,group_user,1,0,0,0
access_cx_tower_variable_option_manager,Variable Option->Manager,model_cx_tower_variable_option,group_manager,1,1,1,1
access_cx_tower_variable_option_root,Variable Option->Root,model_cx_tower_variable_option,group_root,1,1,1,1
access_cx_tower_vault_no_access,cx.tower.vault no access,model_cx_tower_vault,group_user,0,0,0,0
access_cx_tower_server_host_key_wizard_manager,Show Host Key->Manager,model_cx_tower_server_host_key_wizard,group_manager,1,1,1,1
access_cx_tower_server_host_key_wizard_root,Show Host Key->Root,model_cx_tower_server_host_key_wizard,group_root,1,1,1,1
access_cetmix_tower_user,Cetmix Tower->User,model_cetmix_tower,group_user,1,1,0,0
access_shortcut_user,Shortcut->User,model_cx_tower_shortcut,group_user,1,0,0,0
access_shortcut_manager,Shortcut->Manager,model_cx_tower_shortcut,group_manager,1,0,0,0
access_shortcut_root,Shortcut->Root,model_cx_tower_shortcut,group_root,1,1,1,1
access_scheduled_task_user,Scheduled Task->User,model_cx_tower_scheduled_task,group_user,0,0,0,0
access_scheduled_task_manager,Scheduled Task->Manager,model_cx_tower_scheduled_task,group_manager,1,1,1,1
access_scheduled_task_root,Scheduled Task->Root,model_cx_tower_scheduled_task,group_root,1,1,1,1
access_scheduled_task_cv_user,Scheduled Task Custom Variable Value->User,model_cx_tower_scheduled_task_cv,group_user,0,0,0,0
access_scheduled_task_cv_manager,Scheduled Task Custom Variable Value->Manager,model_cx_tower_scheduled_task_cv,group_manager,1,1,1,1
access_scheduled_task_cv_root,Scheduled Task Custom Variable Value->Root,model_cx_tower_scheduled_task_cv,group_root,1,1,1,1
access_cx_tower_jet_state_user,cx.tower.jet.state user,model_cx_tower_jet_state,group_user,1,0,0,0
access_cx_tower_jet_state_manager,cx.tower.jet.state manager,model_cx_tower_jet_state,group_manager,1,0,0,0
access_cx_tower_jet_state_root,cx.tower.jet.state root,model_cx_tower_jet_state,group_root,1,1,1,1
access_cx_tower_jet_action_user,cx.tower.jet.action user,model_cx_tower_jet_action,group_user,1,0,0,0
access_cx_tower_jet_action_manager,cx.tower.jet.action manager,model_cx_tower_jet_action,group_manager,1,1,1,1
access_cx_tower_jet_action_root,cx.tower.jet.action root,model_cx_tower_jet_action,group_root,1,1,1,1
access_cx_tower_jet_template_user,cx.tower.jet.template user,model_cx_tower_jet_template,group_user,1,0,0,0
access_cx_tower_jet_template_manager,cx.tower.jet.template manager,model_cx_tower_jet_template,group_manager,1,1,1,1
access_cx_tower_jet_template_dependency_manager,cx.tower.jet.template.dependency manager,model_cx_tower_jet_template_dependency,group_manager,1,1,1,1
access_cx_tower_jet_template_install_manager,Jet Template Install->Manager,model_cx_tower_jet_template_install,group_manager,1,0,0,0
access_cx_tower_jet_template_install_root,Jet Template Install->Root,model_cx_tower_jet_template_install,group_root,1,1,1,1
access_cx_tower_jet_template_install_line_manager,Jet Template Install Line->Manager,model_cx_tower_jet_template_install_line,group_manager,1,0,0,0
access_cx_tower_jet_template_install_line_root,Jet Template Install Line->Root,model_cx_tower_jet_template_install_line,group_root,1,1,1,1
access_cx_tower_jet_template_install_wiz_manager,Jet Template Install Wizard->Manager,model_cx_tower_jet_template_install_wiz,group_manager,1,1,1,1
access_cx_tower_jet_user,cx.tower.jet user,model_cx_tower_jet,group_user,1,0,0,0
access_cx_tower_jet_manager,cx.tower.jet manager,model_cx_tower_jet,group_manager,1,1,1,1
access_cx_tower_jet_root,cx.tower.jet root,model_cx_tower_jet,group_root,1,1,1,1
access_cx_tower_jet_request_root,Jet Request->Root,model_cx_tower_jet_request,group_root,1,1,1,1
access_cx_tower_jet_dependency_manager,cx.tower.jet.dependency manager,model_cx_tower_jet_dependency,group_manager,1,1,1,1
access_cx_tower_jet_dependency_root,cx.tower.jet.dependency root,model_cx_tower_jet_dependency,group_root,1,1,1,1
access_cx_tower_jet_state_wizard_user,Jet State Wizard->User,model_cx_tower_jet_state_wizard,group_user,1,1,1,1
access_cx_tower_jet_action_wizard_user,Jet Action Wizard->User,model_cx_tower_jet_action_wizard,group_user,1,1,1,1
access_cx_tower_jet_create_wizard_user,Jet Create Wizard->User,model_cx_tower_jet_create_wizard,group_user,1,1,1,1
access_cx_tower_jet_create_wizard_variable_line_user,Jet Create Wizard Variable Line->User,model_cx_tower_jet_create_wizard_variable_line,group_user,1,1,1,1
access_cx_tower_jet_clone_wizard_user,Jet Clone Wizard->User,model_cx_tower_jet_clone_wizard,group_user,1,1,1,1
access_cx_tower_jet_clone_wizard_variable_line_user,Jet Clone Wizard Variable Line->User,model_cx_tower_jet_clone_wizard_variable_line,group_user,1,1,1,1
access_cx_tower_jet_waypoint_template_manager,Jet Waypoint Template->Manager,model_cx_tower_jet_waypoint_template,group_manager,1,1,1,1
access_cx_tower_jet_waypoint_template_root,Jet Waypoint Template->Root,model_cx_tower_jet_waypoint_template,group_root,1,1,1,1
access_cx_tower_jet_waypoint_manager,Jet Waypoint->Manager,model_cx_tower_jet_waypoint,group_manager,1,1,1,1
access_cx_tower_jet_waypoint_root,Jet Waypoint->Root,model_cx_tower_jet_waypoint,group_root,1,1,1,1
1 id name model_id:id group_id:id perm_read perm_write perm_create perm_unlink
2 access_variable_user Variable->User model_cx_tower_variable group_user 1 0 0 0
3 access_variable_manager Variable->Manager model_cx_tower_variable group_manager 1 1 1 0
4 access_variable_root Variable->Root model_cx_tower_variable group_root 1 1 1 1
5 access_variable_value_user Variable Value->User model_cx_tower_variable_value group_user 1 0 0 0
6 access_variable_value_manager Variable Value->Manager model_cx_tower_variable_value group_manager 1 1 1 1
7 access_variable_value_root Variable Value->Root model_cx_tower_variable_value group_root 1 1 1 1
8 access_os_user OS->User model_cx_tower_os group_user 1 0 0 0
9 access_os_root OS->Root model_cx_tower_os group_root 1 1 1 1
10 access_tag_user Tag->User model_cx_tower_tag group_user 1 0 0 0
11 access_tag_manager Tag->Manager model_cx_tower_tag group_manager 1 1 1 1
12 access_tag_root Tag->Root model_cx_tower_tag group_root 1 1 1 1
13 access_server_user Server->User model_cx_tower_server group_user 1 0 0 0
14 access_server_manager Server->Manager model_cx_tower_server group_manager 1 1 1 1
15 access_server_root Server->Root model_cx_tower_server group_root 1 1 1 1
16 access_command_user Command->User model_cx_tower_command group_user 1 0 0 0
17 access_command_manager Command->Manager model_cx_tower_command group_manager 1 1 1 1
18 access_command_root Command->Root model_cx_tower_command group_root 1 1 1 1
19 access_run_command_user Run Command->User model_cx_tower_command_run_wizard group_user 1 1 1 1
20 access_run_command_variable_value_user Run Command Variable Value->User model_cx_tower_command_run_wizard_variable_value group_user 1 1 1 1
21 access_execute_plan_user Run Plan->User model_cx_tower_plan_run_wizard group_user 1 1 1 1
22 access_execute_plan_variable_value_user Run Plan Variable Value->User model_cx_tower_plan_run_wizard_variable_value group_user 1 1 1 1
23 access_key_user Key->User model_cx_tower_key group_user 0 0 0 0
24 access_key_manager Key->Manager model_cx_tower_key group_manager 1 1 1 1
25 access_key_root Key->Root model_cx_tower_key group_root 1 1 1 1
26 access_key_value_manager Key Value->Manager model_cx_tower_key_value group_manager 1 1 1 1
27 access_key_value_root Key Value->Root model_cx_tower_key_value group_root 1 1 1 1
28 access_command_log_user Command Log->User model_cx_tower_command_log group_user 1 0 0 0
29 access_command_log_manager Command Log->Manager model_cx_tower_command_log group_manager 1 0 0 0
30 access_command_log_root Command Log->Root model_cx_tower_command_log group_root 1 0 0 0
31 access_plan_user Plan->User model_cx_tower_plan group_user 1 0 0 0
32 access_plan_manager Plan->Manager model_cx_tower_plan group_manager 1 1 1 1
33 access_plan_root Plan->Root model_cx_tower_plan group_root 1 1 1 1
34 access_plan_line_user Plan Line->User model_cx_tower_plan_line group_user 1 0 0 0
35 access_plan_line_manager Plan Line->Manager model_cx_tower_plan_line group_manager 1 1 1 1
36 access_plan_line_root Plan Line->Root model_cx_tower_plan_line group_root 1 1 1 1
37 access_plan_line_action_user Plan Line Action->User model_cx_tower_plan_line_action group_user 1 0 0 0
38 access_plan_line_action_manager Plan Line Action->Manager model_cx_tower_plan_line_action group_manager 1 1 1 1
39 access_plan_line_action_root Plan Line Action->Root model_cx_tower_plan_line_action group_root 1 1 1 1
40 access_plan_log_user Plan Log->User model_cx_tower_plan_log group_user 1 0 0 0
41 access_plan_log_manager Plan Log->Manager model_cx_tower_plan_log group_manager 1 0 0 0
42 access_plan_log_root Plan Log->Root model_cx_tower_plan_log group_root 1 0 0 0
43 access_file_user File->User model_cx_tower_file group_user 1 0 0 0
44 access_file_manager File->Manager model_cx_tower_file group_manager 1 1 1 1
45 access_file_root File->Root model_cx_tower_file group_root 1 1 1 1
46 access_file_template_manager File Template->Manager model_cx_tower_file_template group_manager 1 1 1 1
47 access_file_template_root File Template->Root model_cx_tower_file_template group_root 1 1 1 1
48 access_server_log_user Server Log->User model_cx_tower_server_log group_user 1 0 0 0
49 access_server_log_manager Server Log->Manager model_cx_tower_server_log group_manager 1 1 1 1
50 access_server_log_root Server Log->Root model_cx_tower_server_log group_root 1 1 1 1
51 access_server_template_manager Server Template->Manager model_cx_tower_server_template group_manager 1 1 1 1
52 access_server_template_root Server Template->Root model_cx_tower_server_template group_root 1 1 1 1
53 access_create_server_from_template_manager Create Server From Template->Manager model_cx_tower_server_template_create_wizard group_manager 1 1 1 1
54 access_create_server_from_template_line_manager Create Server From Template Line->Manager model_cx_tower_server_template_create_wizard_line group_manager 1 1 1 1
55 access_cx_tower_variable_option_user Variable Option->User model_cx_tower_variable_option group_user 1 0 0 0
56 access_cx_tower_variable_option_manager Variable Option->Manager model_cx_tower_variable_option group_manager 1 1 1 1
57 access_cx_tower_variable_option_root Variable Option->Root model_cx_tower_variable_option group_root 1 1 1 1
58 access_cx_tower_vault_no_access cx.tower.vault no access model_cx_tower_vault group_user 0 0 0 0
59 access_cx_tower_server_host_key_wizard_manager Show Host Key->Manager model_cx_tower_server_host_key_wizard group_manager 1 1 1 1
60 access_cx_tower_server_host_key_wizard_root Show Host Key->Root model_cx_tower_server_host_key_wizard group_root 1 1 1 1
61 access_cetmix_tower_user Cetmix Tower->User model_cetmix_tower group_user 1 1 0 0
62 access_shortcut_user Shortcut->User model_cx_tower_shortcut group_user 1 0 0 0
63 access_shortcut_manager Shortcut->Manager model_cx_tower_shortcut group_manager 1 0 0 0
64 access_shortcut_root Shortcut->Root model_cx_tower_shortcut group_root 1 1 1 1
65 access_scheduled_task_user Scheduled Task->User model_cx_tower_scheduled_task group_user 0 0 0 0
66 access_scheduled_task_manager Scheduled Task->Manager model_cx_tower_scheduled_task group_manager 1 1 1 1
67 access_scheduled_task_root Scheduled Task->Root model_cx_tower_scheduled_task group_root 1 1 1 1
68 access_scheduled_task_cv_user Scheduled Task Custom Variable Value->User model_cx_tower_scheduled_task_cv group_user 0 0 0 0
69 access_scheduled_task_cv_manager Scheduled Task Custom Variable Value->Manager model_cx_tower_scheduled_task_cv group_manager 1 1 1 1
70 access_scheduled_task_cv_root Scheduled Task Custom Variable Value->Root model_cx_tower_scheduled_task_cv group_root 1 1 1 1
71 access_cx_tower_jet_state_user cx.tower.jet.state user model_cx_tower_jet_state group_user 1 0 0 0
72 access_cx_tower_jet_state_manager cx.tower.jet.state manager model_cx_tower_jet_state group_manager 1 0 0 0
73 access_cx_tower_jet_state_root cx.tower.jet.state root model_cx_tower_jet_state group_root 1 1 1 1
74 access_cx_tower_jet_action_user cx.tower.jet.action user model_cx_tower_jet_action group_user 1 0 0 0
75 access_cx_tower_jet_action_manager cx.tower.jet.action manager model_cx_tower_jet_action group_manager 1 1 1 1
76 access_cx_tower_jet_action_root cx.tower.jet.action root model_cx_tower_jet_action group_root 1 1 1 1
77 access_cx_tower_jet_template_user cx.tower.jet.template user model_cx_tower_jet_template group_user 1 0 0 0
78 access_cx_tower_jet_template_manager cx.tower.jet.template manager model_cx_tower_jet_template group_manager 1 1 1 1
79 access_cx_tower_jet_template_dependency_manager cx.tower.jet.template.dependency manager model_cx_tower_jet_template_dependency group_manager 1 1 1 1
80 access_cx_tower_jet_template_install_manager Jet Template Install->Manager model_cx_tower_jet_template_install group_manager 1 0 0 0
81 access_cx_tower_jet_template_install_root Jet Template Install->Root model_cx_tower_jet_template_install group_root 1 1 1 1
82 access_cx_tower_jet_template_install_line_manager Jet Template Install Line->Manager model_cx_tower_jet_template_install_line group_manager 1 0 0 0
83 access_cx_tower_jet_template_install_line_root Jet Template Install Line->Root model_cx_tower_jet_template_install_line group_root 1 1 1 1
84 access_cx_tower_jet_template_install_wiz_manager Jet Template Install Wizard->Manager model_cx_tower_jet_template_install_wiz group_manager 1 1 1 1
85 access_cx_tower_jet_user cx.tower.jet user model_cx_tower_jet group_user 1 0 0 0
86 access_cx_tower_jet_manager cx.tower.jet manager model_cx_tower_jet group_manager 1 1 1 1
87 access_cx_tower_jet_root cx.tower.jet root model_cx_tower_jet group_root 1 1 1 1
88 access_cx_tower_jet_request_root Jet Request->Root model_cx_tower_jet_request group_root 1 1 1 1
89 access_cx_tower_jet_dependency_manager cx.tower.jet.dependency manager model_cx_tower_jet_dependency group_manager 1 1 1 1
90 access_cx_tower_jet_dependency_root cx.tower.jet.dependency root model_cx_tower_jet_dependency group_root 1 1 1 1
91 access_cx_tower_jet_state_wizard_user Jet State Wizard->User model_cx_tower_jet_state_wizard group_user 1 1 1 1
92 access_cx_tower_jet_action_wizard_user Jet Action Wizard->User model_cx_tower_jet_action_wizard group_user 1 1 1 1
93 access_cx_tower_jet_create_wizard_user Jet Create Wizard->User model_cx_tower_jet_create_wizard group_user 1 1 1 1
94 access_cx_tower_jet_create_wizard_variable_line_user Jet Create Wizard Variable Line->User model_cx_tower_jet_create_wizard_variable_line group_user 1 1 1 1
95 access_cx_tower_jet_clone_wizard_user Jet Clone Wizard->User model_cx_tower_jet_clone_wizard group_user 1 1 1 1
96 access_cx_tower_jet_clone_wizard_variable_line_user Jet Clone Wizard Variable Line->User model_cx_tower_jet_clone_wizard_variable_line group_user 1 1 1 1
97 access_cx_tower_jet_waypoint_template_manager Jet Waypoint Template->Manager model_cx_tower_jet_waypoint_template group_manager 1 1 1 1
98 access_cx_tower_jet_waypoint_template_root Jet Waypoint Template->Root model_cx_tower_jet_waypoint_template group_root 1 1 1 1
99 access_cx_tower_jet_waypoint_manager Jet Waypoint->Manager model_cx_tower_jet_waypoint group_manager 1 1 1 1
100 access_cx_tower_jet_waypoint_root Jet Waypoint->Root model_cx_tower_jet_waypoint group_root 1 1 1 1