-
-
Notifications
You must be signed in to change notification settings - Fork 859
[16.0][ADD] account_move_group_restriction #2191
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: 16.0
Are you sure you want to change the base?
[16.0][ADD] account_move_group_restriction #2191
Conversation
e452009 to
34496b9
Compare
account_move_group_restriction/security/account_move_group_restriction_security.xml
Outdated
Show resolved
Hide resolved
account_move_group_restriction/security/account_move_group_restriction_security.xml
Outdated
Show resolved
Hide resolved
account_move_group_restriction/security/account_move_group_restriction_security.xml
Outdated
Show resolved
Hide resolved
67006b5 to
0741960
Compare
| <field name="domain_force"> | ||
| ['|', | ||
| ('move_id.account_security_group_ids', '=', False), | ||
| ('move_id.account_security_group_ids', 'in', user.groups_id.ids) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This allows users to access the move when they have ANY of the access groups involved (instead of all), which should not be something intended.
We may leave the design as is, since most use cases will involve only one such group, but we should add a ROADMAP.md to explain this limitation.
0741960 to
d98fba6
Compare
yostashiro
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Code review. Just a couple of minor non-blocking points.
account_move_group_restriction/tests/test_account_move_group_restriction.py
Outdated
Show resolved
Hide resolved
d98fba6 to
b403a84
Compare
|
This PR has the |
This module adds an "Allowed User Groups" field on accounts. By assigning this field, you can restrict which users are allowed to see journal items and journal entries that use those accounts.
@qrtl QT6166