From 616014ac590c30ee9012087668d080df4147223e Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?R=C3=A9mi=20-=20Le=20Filament?= <30716308+remi-filament@users.noreply.github.com> Date: Thu, 13 Jun 2024 15:48:40 +0200 Subject: [PATCH] [ADD] group_user_management: Module creation --- group_user_management/README.rst | 120 +++++ group_user_management/__init__.py | 1 + group_user_management/__manifest__.py | 16 + group_user_management/i18n/fr.po | 54 ++ .../i18n/user_management_role.pot | 54 ++ group_user_management/models/__init__.py | 3 + group_user_management/models/res_groups.py | 48 ++ group_user_management/models/res_partner.py | 19 + group_user_management/models/res_users.py | 45 ++ group_user_management/readme/CONTEXT.md | 15 + group_user_management/readme/CONTRIBUTORS.md | 1 + group_user_management/readme/DESCRIPTION.md | 8 + group_user_management/readme/USAGE.md | 6 + .../readme/newsfragments/.gitkeep | 0 .../security/ir.model.access.csv | 8 + group_user_management/security/ir_ui_menu.xml | 13 + group_user_management/security/res_groups.xml | 21 + .../static/description/icon.png | Bin 0 -> 9455 bytes .../static/description/index.html | 468 ++++++++++++++++++ .../odoo/addons/group_user_management | 1 + setup/group_user_management/setup.py | 6 + 21 files changed, 907 insertions(+) create mode 100644 group_user_management/README.rst create mode 100644 group_user_management/__init__.py create mode 100644 group_user_management/__manifest__.py create mode 100644 group_user_management/i18n/fr.po create mode 100644 group_user_management/i18n/user_management_role.pot create mode 100644 group_user_management/models/__init__.py create mode 100644 group_user_management/models/res_groups.py create mode 100644 group_user_management/models/res_partner.py create mode 100644 group_user_management/models/res_users.py create mode 100644 group_user_management/readme/CONTEXT.md create mode 100644 group_user_management/readme/CONTRIBUTORS.md create mode 100644 group_user_management/readme/DESCRIPTION.md create mode 100644 group_user_management/readme/USAGE.md create mode 100644 group_user_management/readme/newsfragments/.gitkeep create mode 100644 group_user_management/security/ir.model.access.csv create mode 100644 group_user_management/security/ir_ui_menu.xml create mode 100644 group_user_management/security/res_groups.xml create mode 100644 group_user_management/static/description/icon.png create mode 100644 group_user_management/static/description/index.html create mode 120000 setup/group_user_management/odoo/addons/group_user_management create mode 100644 setup/group_user_management/setup.py diff --git a/group_user_management/README.rst b/group_user_management/README.rst new file mode 100644 index 000000000..38c89a1af --- /dev/null +++ b/group_user_management/README.rst @@ -0,0 +1,120 @@ +===================== +User management Group +===================== + +.. + !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! + !! This file is generated by oca-gen-addon-readme !! + !! changes will be overwritten. !! + !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! + !! source digest: sha256:e31aad4f0cb22a489d70478ebdebae4e94acfb5af11813f659b869be1a32f7ab + !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! + +.. |badge1| image:: https://img.shields.io/badge/maturity-Beta-yellow.png + :target: https://odoo-community.org/page/development-status + :alt: Beta +.. |badge2| image:: https://img.shields.io/badge/licence-AGPL--3-blue.png + :target: http://www.gnu.org/licenses/agpl-3.0-standalone.html + :alt: License: AGPL-3 +.. |badge3| image:: https://img.shields.io/badge/github-OCA%2Fserver--backend-lightgray.png?logo=github + :target: https://github.com/OCA/server-backend/tree/16.0/group_user_management + :alt: OCA/server-backend +.. |badge4| image:: https://img.shields.io/badge/weblate-Translate%20me-F47D42.png + :target: https://translation.odoo-community.org/projects/server-backend-16-0/server-backend-16-0-group_user_management + :alt: Translate me on Weblate +.. |badge5| image:: https://img.shields.io/badge/runboat-Try%20me-875A7B.png + :target: https://runboat.odoo-community.org/builds?repo=OCA/server-backend&target_branch=16.0 + :alt: Try me on Runboat + +|badge1| |badge2| |badge3| |badge4| |badge5| + +This module adds a group (a res_groups for granting access rights) "User +Management" which allows to read / create / update / delete users from +your companies : + +- including access rights management +- excluding Administration group access rights management + +The purpose of this new group is to grant user authorization to manage +users but without allowing configuration of other stuff of the instance +(as default Administration > Access Rights can do) + +**Table of contents** + +.. contents:: + :local: + +Use Cases / Context +=================== + +The purpose of this module is to add a new group for user management to +grant user authorization to manage users but without allowing +configuration of other stuff of the instance (as default Administration +> Access Rights can do) + +In other terms, if you want to get a user administrator on your instance +that will : + +- Create new users +- Update user rights +- Update passwords or generate renew password links +- Archive or remove users + +But is not authorized to : + +- Grant himself (or anyone else) Administration / Access Rights or + Administration / Settings role +- Update advanced configuration of the instance +- Update access rights / ir rules +- Create or Update existing groups + +Usage +===== + +To user this module, you need to: + +1. Activate debug mode +2. Go to Settings > Users & Companies > Users +3. Open the form view of the User to whom you want to grant User + Management access +4. Tick User Management (in Extra Rights Section) + +Bug Tracker +=========== + +Bugs are tracked on `GitHub Issues `_. +In case of trouble, please check there if your issue has already been reported. +If you spotted it first, help us to smash it by providing a detailed and welcomed +`feedback `_. + +Do not contact contributors directly about support or help with technical issues. + +Credits +======= + +Authors +------- + +* Le Filament + +Contributors +------------ + +- Rémi - Le Filament (https://le-filament.com) + +Maintainers +----------- + +This module is maintained by the OCA. + +.. image:: https://odoo-community.org/logo.png + :alt: Odoo Community Association + :target: https://odoo-community.org + +OCA, or the Odoo Community Association, is a nonprofit organization whose +mission is to support the collaborative development of Odoo features and +promote its widespread use. + +This module is part of the `OCA/server-backend `_ project on GitHub. + +You are welcome to contribute. To learn how please visit https://odoo-community.org/page/Contribute. diff --git a/group_user_management/__init__.py b/group_user_management/__init__.py new file mode 100644 index 000000000..0650744f6 --- /dev/null +++ b/group_user_management/__init__.py @@ -0,0 +1 @@ +from . import models diff --git a/group_user_management/__manifest__.py b/group_user_management/__manifest__.py new file mode 100644 index 000000000..8cf53ad75 --- /dev/null +++ b/group_user_management/__manifest__.py @@ -0,0 +1,16 @@ +{ + "name": "User management Group", + "version": "16.0.1.0.0", + "category": "Tools", + "author": "Le Filament, Odoo Community Association (OCA)", + "license": "AGPL-3", + "development_status": "Beta", + "website": "https://github.com/OCA/server-backend", + "depends": ["base", "auth_signup"], + "data": [ + "security/res_groups.xml", + "security/ir_ui_menu.xml", + "security/ir.model.access.csv", + ], + "installable": True, +} diff --git a/group_user_management/i18n/fr.po b/group_user_management/i18n/fr.po new file mode 100644 index 000000000..52203aec1 --- /dev/null +++ b/group_user_management/i18n/fr.po @@ -0,0 +1,54 @@ +# Translation of Odoo Server. +# This file contains the translation of the following modules: +# * group_user_management +# +msgid "" +msgstr "" +"Project-Id-Version: Odoo Server 16.0\n" +"Report-Msgid-Bugs-To: \n" +"POT-Creation-Date: 2024-06-11 08:28+0000\n" +"PO-Revision-Date: 2024-06-11 08:28+0000\n" +"Last-Translator: \n" +"Language-Team: \n" +"MIME-Version: 1.0\n" +"Content-Type: text/plain; charset=UTF-8\n" +"Content-Transfer-Encoding: \n" +"Plural-Forms: \n" + +#. module: group_user_management +#: model:ir.model,name:group_user_management.model_res_groups +msgid "Access Groups" +msgstr "Groupes" + +#. module: group_user_management +#: model:ir.model,name:group_user_management.model_res_partner +msgid "Contact" +msgstr "Contact" + +#. module: group_user_management +#: model:ir.model.fields,field_description:group_user_management.field_res_partner__signup_expiration +#: model:ir.model.fields,field_description:group_user_management.field_res_users__signup_expiration +msgid "Signup Expiration" +msgstr "Expiration de la session de connexion" + +#. module: group_user_management +#: model:ir.model.fields,field_description:group_user_management.field_res_partner__signup_token +#: model:ir.model.fields,field_description:group_user_management.field_res_users__signup_token +msgid "Signup Token" +msgstr "Jeton de connexion" + +#. module: group_user_management +#: model:ir.model.fields,field_description:group_user_management.field_res_partner__signup_type +#: model:ir.model.fields,field_description:group_user_management.field_res_users__signup_type +msgid "Signup Token Type" +msgstr "Type de jeton de connexion" + +#. module: group_user_management +#: model:res.groups,comment:group_user_management.group_user_manager +msgid "This group allows to manage users and related access rights" +msgstr "Ce groupe permet de gérer les utilisateurs et leurs droits d'accès" + +#. module: group_user_management +#: model:res.groups,name:group_user_management.group_user_manager +msgid "User Management" +msgstr "Gestion des Utilisateurs" diff --git a/group_user_management/i18n/user_management_role.pot b/group_user_management/i18n/user_management_role.pot new file mode 100644 index 000000000..9f5cf0240 --- /dev/null +++ b/group_user_management/i18n/user_management_role.pot @@ -0,0 +1,54 @@ +# Translation of Odoo Server. +# This file contains the translation of the following modules: +# * group_user_management +# +msgid "" +msgstr "" +"Project-Id-Version: Odoo Server 16.0\n" +"Report-Msgid-Bugs-To: \n" +"POT-Creation-Date: 2024-06-11 08:28+0000\n" +"PO-Revision-Date: 2024-06-11 08:28+0000\n" +"Last-Translator: \n" +"Language-Team: \n" +"MIME-Version: 1.0\n" +"Content-Type: text/plain; charset=UTF-8\n" +"Content-Transfer-Encoding: \n" +"Plural-Forms: \n" + +#. module: group_user_management +#: model:ir.model,name:group_user_management.model_res_groups +msgid "Access Groups" +msgstr "" + +#. module: group_user_management +#: model:ir.model,name:group_user_management.model_res_partner +msgid "Contact" +msgstr "" + +#. module: group_user_management +#: model:ir.model.fields,field_description:group_user_management.field_res_partner__signup_expiration +#: model:ir.model.fields,field_description:group_user_management.field_res_users__signup_expiration +msgid "Signup Expiration" +msgstr "" + +#. module: group_user_management +#: model:ir.model.fields,field_description:group_user_management.field_res_partner__signup_token +#: model:ir.model.fields,field_description:group_user_management.field_res_users__signup_token +msgid "Signup Token" +msgstr "" + +#. module: group_user_management +#: model:ir.model.fields,field_description:group_user_management.field_res_partner__signup_type +#: model:ir.model.fields,field_description:group_user_management.field_res_users__signup_type +msgid "Signup Token Type" +msgstr "" + +#. module: group_user_management +#: model:res.groups,comment:group_user_management.group_user_manager +msgid "This group allows to manage users and related access rights" +msgstr "" + +#. module: group_user_management +#: model:res.groups,name:group_user_management.group_user_manager +msgid "User Management" +msgstr "" diff --git a/group_user_management/models/__init__.py b/group_user_management/models/__init__.py new file mode 100644 index 000000000..23586e6a8 --- /dev/null +++ b/group_user_management/models/__init__.py @@ -0,0 +1,3 @@ +from . import res_groups +from . import res_partner +from . import res_users diff --git a/group_user_management/models/res_groups.py b/group_user_management/models/res_groups.py new file mode 100644 index 000000000..6c33db283 --- /dev/null +++ b/group_user_management/models/res_groups.py @@ -0,0 +1,48 @@ +# Copyright (c) 2024- Le Filament (https://le-filament.com) +# License AGPL-3.0 or later (http://www.gnu.org/licenses/agpl.html). + +from lxml import etree + +from odoo import api, models + +from odoo.addons.base.models.res_users import name_selection_groups + + +class ResGroups(models.Model): + _inherit = "res.groups" + + @api.model + def _update_user_groups_view(self): + """ + Modify the view with xmlid ``base.user_groups_view``, which inherits + the user form view, and introduces the reified group fields. + """ + res = super()._update_user_groups_view() + view = self.env.ref("base.user_groups_view") + arch = etree.fromstring(view.arch) + + modified = False + + # Get xpath to add group_erp_manager to Admin category + admin_categories = [ + category + for category in self.get_groups_by_application() + if category[0].xml_id + == "base.module_category_administration_administration" + ] + for _app, _kind, gs, _category_name in admin_categories: + field_name = name_selection_groups(gs.ids) + xpath_expr = "//group[field[@name='%s']]" % field_name + for group in arch.xpath(xpath_expr): + group.attrib["groups"] = "base.group_erp_manager" + modified = True + + # Only rewrite view if changes were made + if modified: + view_context = dict(view._context, lang=None) + view_context.pop("install_filename", None) + view.with_context(**view_context).write( + {"arch": etree.tostring(arch, pretty_print=True, encoding="unicode")} + ) + + return res diff --git a/group_user_management/models/res_partner.py b/group_user_management/models/res_partner.py new file mode 100644 index 000000000..14bffc3da --- /dev/null +++ b/group_user_management/models/res_partner.py @@ -0,0 +1,19 @@ +# Copyright (c) 2024- Le Filament (https://le-filament.com) +# License AGPL-3.0 or later (http://www.gnu.org/licenses/agpl.html). + +from odoo import fields, models + + +class ResPartner(models.Model): + _inherit = "res.partner" + + # Add new group_user_manager to the existing signup fields + signup_token = fields.Char( + groups="base.group_erp_manager, group_user_management.group_user_manager", + ) + signup_type = fields.Char( + groups="base.group_erp_manager, group_user_management.group_user_manager", + ) + signup_expiration = fields.Datetime( + groups="base.group_erp_manager, group_user_management.group_user_manager", + ) diff --git a/group_user_management/models/res_users.py b/group_user_management/models/res_users.py new file mode 100644 index 000000000..8d370d4cd --- /dev/null +++ b/group_user_management/models/res_users.py @@ -0,0 +1,45 @@ +# Copyright (c) 2024- Le Filament (https://le-filament.com) +# License AGPL-3.0 or later (http://www.gnu.org/licenses/agpl.html). + +from odoo import _, models +from odoo.exceptions import AccessError + + +class ResUsers(models.Model): + _inherit = "res.users" + + def _remove_reified_groups(self, values): + """ + Overrides default base module method to raise an AccessError in case user tries + to set/unset base.group_system or base.group_erp_manager from another user + if current user is not at least in base.group_erp_manager + """ + res = super()._remove_reified_groups(values) + if ( + "groups_id" in res + and not self.env.user._is_admin() + and not self.env.user._is_system() + and not self.env.user._is_superuser() + ): + admin_group = self.env.ref("base.group_erp_manager") + system_group = self.env.ref("base.group_system") + groups = res.get("groups_id") + if groups and any( + group == (3, admin_group.id) or group == (3, system_group.id) + for group in groups + ): + raise AccessError( + _( + "You are not allowed to unset an Administration group on admin user" + ) + ) + elif groups and any( + group == (4, admin_group.id) or group == (4, system_group.id) + for group in groups + ): + raise AccessError( + _( + "You are not allowed to set an Administration group on non-admin user" + ) + ) + return res diff --git a/group_user_management/readme/CONTEXT.md b/group_user_management/readme/CONTEXT.md new file mode 100644 index 000000000..74fabf380 --- /dev/null +++ b/group_user_management/readme/CONTEXT.md @@ -0,0 +1,15 @@ +The purpose of this module is to add a new group for user management to grant user +authorization to manage users but without allowing configuration of other stuff of the instance +(as default Administration > Access Rights can do) + +In other terms, if you want to get a user administrator on your instance that will : + - Create new users + - Update user rights + - Update passwords or generate renew password links + - Archive or remove users + +But is not authorized to : + - Grant himself (or anyone else) Administration / Access Rights or Administration / Settings role + - Update advanced configuration of the instance + - Update access rights / ir rules + - Create or Update existing groups diff --git a/group_user_management/readme/CONTRIBUTORS.md b/group_user_management/readme/CONTRIBUTORS.md new file mode 100644 index 000000000..40513934e --- /dev/null +++ b/group_user_management/readme/CONTRIBUTORS.md @@ -0,0 +1 @@ +- Rémi - Le Filament (https://le-filament.com) diff --git a/group_user_management/readme/DESCRIPTION.md b/group_user_management/readme/DESCRIPTION.md new file mode 100644 index 000000000..7d2227a23 --- /dev/null +++ b/group_user_management/readme/DESCRIPTION.md @@ -0,0 +1,8 @@ +This module adds a group (a res_groups for granting access rights) "User Management" +which allows to read / create / update / delete users from your companies : + * including access rights management + * excluding Administration group access rights management + +The purpose of this new group is to grant user authorization to manage users but without +allowing configuration of other stuff of the instance +(as default Administration > Access Rights can do) diff --git a/group_user_management/readme/USAGE.md b/group_user_management/readme/USAGE.md new file mode 100644 index 000000000..41a603e85 --- /dev/null +++ b/group_user_management/readme/USAGE.md @@ -0,0 +1,6 @@ +To user this module, you need to: + +1. Activate debug mode +1. Go to Settings > Users & Companies > Users +1. Open the form view of the User to whom you want to grant User Management access +1. Tick User Management (in Extra Rights Section) diff --git a/group_user_management/readme/newsfragments/.gitkeep b/group_user_management/readme/newsfragments/.gitkeep new file mode 100644 index 000000000..e69de29bb diff --git a/group_user_management/security/ir.model.access.csv b/group_user_management/security/ir.model.access.csv new file mode 100644 index 000000000..082a9ece8 --- /dev/null +++ b/group_user_management/security/ir.model.access.csv @@ -0,0 +1,8 @@ +"id","name","model_id:id","group_id:id","perm_read","perm_write","perm_create","perm_unlink" +"access_ir_model_access_group_user_manager","ir_model_access_group_user_manager","base.model_ir_model_access","group_user_manager",1,0,0,0 +"access_ir_rule_group_user_manager","ir_rule group_user_manager","base.model_ir_rule","group_user_manager",1,0,0,0 +"access_res_company_group_user_manager","res_company group_user_manager","base.model_res_company","group_user_manager",1,1,0,0 +"access_res_users_group_user_manager","res_users group_user_manager","base.model_res_users","group_user_manager",1,1,1,1 +"access_res_users_deletion_group_user_manager","res_users_deletion group_user_manager","base.model_res_users_deletion","group_user_manager",1,1,1,1 +"access_change_password_wizard","access.change.password.wizard","base.model_change_password_wizard","group_user_manager",1,1,1,0 +"access_change_password_user","access.change.password.user","base.model_change_password_user","group_user_manager",1,1,1,0 diff --git a/group_user_management/security/ir_ui_menu.xml b/group_user_management/security/ir_ui_menu.xml new file mode 100644 index 000000000..551ece8d5 --- /dev/null +++ b/group_user_management/security/ir_ui_menu.xml @@ -0,0 +1,13 @@ + + + + + + + diff --git a/group_user_management/security/res_groups.xml b/group_user_management/security/res_groups.xml new file mode 100644 index 000000000..3f8d2e3ae --- /dev/null +++ b/group_user_management/security/res_groups.xml @@ -0,0 +1,21 @@ + + + + + User Management + + + This group allows to manage users and related access rights + + + + + diff --git a/group_user_management/static/description/icon.png b/group_user_management/static/description/icon.png new file mode 100644 index 0000000000000000000000000000000000000000..3a0328b516c4980e8e44cdb63fd945757ddd132d GIT binary patch literal 9455 zcmW++2RxMjAAjx~&dlBk9S+%}OXg)AGE&Cb*&}d0jUxM@u(PQx^-s)697TX`ehR4?GS^qbkof1cslKgkU)h65qZ9Oc=ml_0temigYLJfnz{IDzUf>bGs4N!v3=Z3jMq&A#7%rM5eQ#dc?k~! zVpnB`o+K7|Al`Q_U;eD$B zfJtP*jH`siUq~{KE)`jP2|#TUEFGRryE2`i0**z#*^6~AI|YzIWy$Cu#CSLW3q=GA z6`?GZymC;dCPk~rBS%eCb`5OLr;RUZ;D`}um=H)BfVIq%7VhiMr)_#G0N#zrNH|__ zc+blN2UAB0=617@>_u;MPHN;P;N#YoE=)R#i$k_`UAA>WWCcEVMh~L_ zj--gtp&|K1#58Yz*AHCTMziU1Jzt_jG0I@qAOHsk$2}yTmVkBp_eHuY$A9)>P6o~I z%aQ?!(GqeQ-Y+b0I(m9pwgi(IIZZzsbMv+9w{PFtd_<_(LA~0H(xz{=FhLB@(1&qHA5EJw1>>=%q2f&^X>IQ{!GJ4e9U z&KlB)z(84HmNgm2hg2C0>WM{E(DdPr+EeU_N@57;PC2&DmGFW_9kP&%?X4}+xWi)( z;)z%wI5>D4a*5XwD)P--sPkoY(a~WBw;E~AW`Yue4kFa^LM3X`8x|}ZUeMnqr}>kH zG%WWW>3ml$Yez?i%)2pbKPI7?5o?hydokgQyZsNEr{a|mLdt;X2TX(#B1j35xPnPW z*bMSSOauW>o;*=kO8ojw91VX!qoOQb)zHJ!odWB}d+*K?#sY_jqPdg{Sm2HdYzdEx zOGVPhVRTGPtv0o}RfVP;Nd(|CB)I;*t&QO8h zFfekr30S!-LHmV_Su-W+rEwYXJ^;6&3|L$mMC8*bQptyOo9;>Qb9Q9`ySe3%V$A*9 zeKEe+b0{#KWGp$F+tga)0RtI)nhMa-K@JS}2krK~n8vJ=Ngm?R!9G<~RyuU0d?nz# z-5EK$o(!F?hmX*2Yt6+coY`6jGbb7tF#6nHA zuKk=GGJ;ZwON1iAfG$E#Y7MnZVmrY|j0eVI(DN_MNFJmyZ|;w4tf@=CCDZ#5N_0K= z$;R~bbk?}TpfDjfB&aiQ$VA}s?P}xPERJG{kxk5~R`iRS(SK5d+Xs9swCozZISbnS zk!)I0>t=A<-^z(cmSFz3=jZ23u13X><0b)P)^1T_))Kr`e!-pb#q&J*Q`p+B6la%C zuVl&0duN<;uOsB3%T9Fp8t{ED108<+W(nOZd?gDnfNBC3>M8WE61$So|P zVvqH0SNtDTcsUdzaMDpT=Ty0pDHHNL@Z0w$Y`XO z2M-_r1S+GaH%pz#Uy0*w$Vdl=X=rQXEzO}d6J^R6zjM1u&c9vYLvLp?W7w(?np9x1 zE_0JSAJCPB%i7p*Wvg)pn5T`8k3-uR?*NT|J`eS#_#54p>!p(mLDvmc-3o0mX*mp_ zN*AeS<>#^-{S%W<*mz^!X$w_2dHWpcJ6^j64qFBft-o}o_Vx80o0>}Du;>kLts;$8 zC`7q$QI(dKYG`Wa8#wl@V4jVWBRGQ@1dr-hstpQL)Tl+aqVpGpbSfN>5i&QMXfiZ> zaA?T1VGe?rpQ@;+pkrVdd{klI&jVS@I5_iz!=UMpTsa~mBga?1r}aRBm1WS;TT*s0f0lY=JBl66Upy)-k4J}lh=P^8(SXk~0xW=T9v*B|gzIhN z>qsO7dFd~mgxAy4V?&)=5ieYq?zi?ZEoj)&2o)RLy=@hbCRcfT5jigwtQGE{L*8<@Yd{zg;CsL5mvzfDY}P-wos_6PfprFVaeqNE%h zKZhLtcQld;ZD+>=nqN~>GvROfueSzJD&BE*}XfU|H&(FssBqY=hPCt`d zH?@s2>I(|;fcW&YM6#V#!kUIP8$Nkdh0A(bEVj``-AAyYgwY~jB zT|I7Bf@%;7aL7Wf4dZ%VqF$eiaC38OV6oy3Z#TER2G+fOCd9Iaoy6aLYbPTN{XRPz z;U!V|vBf%H!}52L2gH_+j;`bTcQRXB+y9onc^wLm5wi3-Be}U>k_u>2Eg$=k!(l@I zcCg+flakT2Nej3i0yn+g+}%NYb?ta;R?(g5SnwsQ49U8Wng8d|{B+lyRcEDvR3+`O{zfmrmvFrL6acVP%yG98X zo&+VBg@px@i)%o?dG(`T;n*$S5*rnyiR#=wW}}GsAcfyQpE|>a{=$Hjg=-*_K;UtD z#z-)AXwSRY?OPefw^iI+ z)AXz#PfEjlwTes|_{sB?4(O@fg0AJ^g8gP}ex9Ucf*@_^J(s_5jJV}c)s$`Myn|Kd z$6>}#q^n{4vN@+Os$m7KV+`}c%4)4pv@06af4-x5#wj!KKb%caK{A&Y#Rfs z-po?Dcb1({W=6FKIUirH&(yg=*6aLCekcKwyfK^JN5{wcA3nhO(o}SK#!CINhI`-I z1)6&n7O&ZmyFMuNwvEic#IiOAwNkR=u5it{B9n2sAJV5pNhar=j5`*N!Na;c7g!l$ z3aYBqUkqqTJ=Re-;)s!EOeij=7SQZ3Hq}ZRds%IM*PtM$wV z@;rlc*NRK7i3y5BETSKuumEN`Xu_8GP1Ri=OKQ$@I^ko8>H6)4rjiG5{VBM>B|%`&&s^)jS|-_95&yc=GqjNo{zFkw%%HHhS~e=s zD#sfS+-?*t|J!+ozP6KvtOl!R)@@-z24}`9{QaVLD^9VCSR2b`b!KC#o;Ki<+wXB6 zx3&O0LOWcg4&rv4QG0)4yb}7BFSEg~=IR5#ZRj8kg}dS7_V&^%#Do==#`u zpy6{ox?jWuR(;pg+f@mT>#HGWHAJRRDDDv~@(IDw&R>9643kK#HN`!1vBJHnC+RM&yIh8{gG2q zA%e*U3|N0XSRa~oX-3EAneep)@{h2vvd3Xvy$7og(sayr@95+e6~Xvi1tUqnIxoIH zVWo*OwYElb#uyW{Imam6f2rGbjR!Y3`#gPqkv57dB6K^wRGxc9B(t|aYDGS=m$&S!NmCtrMMaUg(c zc2qC=2Z`EEFMW-me5B)24AqF*bV5Dr-M5ig(l-WPS%CgaPzs6p_gnCIvTJ=Y<6!gT zVt@AfYCzjjsMEGi=rDQHo0yc;HqoRNnNFeWZgcm?f;cp(6CNylj36DoL(?TS7eU#+ z7&mfr#y))+CJOXQKUMZ7QIdS9@#-}7y2K1{8)cCt0~-X0O!O?Qx#E4Og+;A2SjalQ zs7r?qn0H044=sDN$SRG$arw~n=+T_DNdSrarmu)V6@|?1-ZB#hRn`uilTGPJ@fqEy zGt(f0B+^JDP&f=r{#Y_wi#AVDf-y!RIXU^0jXsFpf>=Ji*TeqSY!H~AMbJdCGLhC) zn7Rx+sXw6uYj;WRYrLd^5IZq@6JI1C^YkgnedZEYy<&4(z%Q$5yv#Boo{AH8n$a zhb4Y3PWdr269&?V%uI$xMcUrMzl=;w<_nm*qr=c3Rl@i5wWB;e-`t7D&c-mcQl7x! zZWB`UGcw=Y2=}~wzrfLx=uet<;m3~=8I~ZRuzvMQUQdr+yTV|ATf1Uuomr__nDf=X zZ3WYJtHp_ri(}SQAPjv+Y+0=fH4krOP@S&=zZ-t1jW1o@}z;xk8 z(Nz1co&El^HK^NrhVHa-_;&88vTU>_J33=%{if;BEY*J#1n59=07jrGQ#IP>@u#3A z;!q+E1Rj3ZJ+!4bq9F8PXJ@yMgZL;>&gYA0%_Kbi8?S=XGM~dnQZQ!yBSgcZhY96H zrWnU;k)qy`rX&&xlDyA%(a1Hhi5CWkmg(`Gb%m(HKi-7Z!LKGRP_B8@`7&hdDy5n= z`OIxqxiVfX@OX1p(mQu>0Ai*v_cTMiw4qRt3~NBvr9oBy0)r>w3p~V0SCm=An6@3n)>@z!|o-$HvDK z|3D2ZMJkLE5loMKl6R^ez@Zz%S$&mbeoqH5`Bb){Ei21q&VP)hWS2tjShfFtGE+$z zzCR$P#uktu+#!w)cX!lWN1XU%K-r=s{|j?)Akf@q#3b#{6cZCuJ~gCxuMXRmI$nGtnH+-h z+GEi!*X=AP<|fG`1>MBdTb?28JYc=fGvAi2I<$B(rs$;eoJCyR6_bc~p!XR@O-+sD z=eH`-ye})I5ic1eL~TDmtfJ|8`0VJ*Yr=hNCd)G1p2MMz4C3^Mj?7;!w|Ly%JqmuW zlIEW^Ft%z?*|fpXda>Jr^1noFZEwFgVV%|*XhH@acv8rdGxeEX{M$(vG{Zw+x(ei@ zmfXb22}8-?Fi`vo-YVrTH*C?a8%M=Hv9MqVH7H^J$KsD?>!SFZ;ZsvnHr_gn=7acz z#W?0eCdVhVMWN12VV^$>WlQ?f;P^{(&pYTops|btm6aj>_Uz+hqpGwB)vWp0Cf5y< zft8-je~nn?W11plq}N)4A{l8I7$!ks_x$PXW-2XaRFswX_BnF{R#6YIwMhAgd5F9X zGmwdadS6(a^fjHtXg8=l?Rc0Sm%hk6E9!5cLVloEy4eh(=FwgP`)~I^5~pBEWo+F6 zSf2ncyMurJN91#cJTy_u8Y}@%!bq1RkGC~-bV@SXRd4F{R-*V`bS+6;W5vZ(&+I<9$;-V|eNfLa5n-6% z2(}&uGRF;p92eS*sE*oR$@pexaqr*meB)VhmIg@h{uzkk$9~qh#cHhw#>O%)b@+(| z^IQgqzuj~Sk(J;swEM-3TrJAPCq9k^^^`q{IItKBRXYe}e0Tdr=Huf7da3$l4PdpwWDop%^}n;dD#K4s#DYA8SHZ z&1!riV4W4R7R#C))JH1~axJ)RYnM$$lIR%6fIVA@zV{XVyx}C+a-Dt8Y9M)^KU0+H zR4IUb2CJ{Hg>CuaXtD50jB(_Tcx=Z$^WYu2u5kubqmwp%drJ6 z?Fo40g!Qd<-l=TQxqHEOuPX0;^z7iX?Ke^a%XT<13TA^5`4Xcw6D@Ur&VT&CUe0d} z1GjOVF1^L@>O)l@?bD~$wzgf(nxX1OGD8fEV?TdJcZc2KoUe|oP1#=$$7ee|xbY)A zDZq+cuTpc(fFdj^=!;{k03C69lMQ(|>uhRfRu%+!k&YOi-3|1QKB z z?n?eq1XP>p-IM$Z^C;2L3itnbJZAip*Zo0aw2bs8@(s^~*8T9go!%dHcAz2lM;`yp zD=7&xjFV$S&5uDaiScyD?B-i1ze`+CoRtz`Wn+Zl&#s4&}MO{@N!ufrzjG$B79)Y2d3tBk&)TxUTw@QS0TEL_?njX|@vq?Uz(nBFK5Pq7*xj#u*R&i|?7+6# z+|r_n#SW&LXhtheZdah{ZVoqwyT{D>MC3nkFF#N)xLi{p7J1jXlmVeb;cP5?e(=f# zuT7fvjSbjS781v?7{)-X3*?>tq?)Yd)~|1{BDS(pqC zC}~H#WXlkUW*H5CDOo<)#x7%RY)A;ShGhI5s*#cRDA8YgqG(HeKDx+#(ZQ?386dv! zlXCO)w91~Vw4AmOcATuV653fa9R$fyK8ul%rG z-wfS zihugoZyr38Im?Zuh6@RcF~t1anQu7>#lPpb#}4cOA!EM11`%f*07RqOVkmX{p~KJ9 z^zP;K#|)$`^Rb{rnHGH{~>1(fawV0*Z#)}M`m8-?ZJV<+e}s9wE# z)l&az?w^5{)`S(%MRzxdNqrs1n*-=jS^_jqE*5XDrA0+VE`5^*p3CuM<&dZEeCjoz zR;uu_H9ZPZV|fQq`Cyw4nscrVwi!fE6ciMmX$!_hN7uF;jjKG)d2@aC4ropY)8etW=xJvni)8eHi`H$%#zn^WJ5NLc-rqk|u&&4Z6fD_m&JfSI1Bvb?b<*n&sfl0^t z=HnmRl`XrFvMKB%9}>PaA`m-fK6a0(8=qPkWS5bb4=v?XcWi&hRY?O5HdulRi4?fN zlsJ*N-0Qw+Yic@s0(2uy%F@ib;GjXt01Fmx5XbRo6+n|pP(&nodMoap^z{~q ziEeaUT@Mxe3vJSfI6?uLND(CNr=#^W<1b}jzW58bIfyWTDle$mmS(|x-0|2UlX+9k zQ^EX7Nw}?EzVoBfT(-LT|=9N@^hcn-_p&sqG z&*oVs2JSU+N4ZD`FhCAWaS;>|wH2G*Id|?pa#@>tyxX`+4HyIArWDvVrX)2WAOQff z0qyHu&-S@i^MS-+j--!pr4fPBj~_8({~e1bfcl0wI1kaoN>mJL6KUPQm5N7lB(ui1 zE-o%kq)&djzWJ}ob<-GfDlkB;F31j-VHKvQUGQ3sp`CwyGJk_i!y^sD0fqC@$9|jO zOqN!r!8-p==F@ZVP=U$qSpY(gQ0)59P1&t@y?5rvg<}E+GB}26NYPp4f2YFQrQtot5mn3wu_qprZ=>Ig-$ zbW26Ws~IgY>}^5w`vTB(G`PTZaDiGBo5o(tp)qli|NeV( z@H_=R8V39rt5J5YB2Ky?4eJJ#b`_iBe2ot~6%7mLt5t8Vwi^Jy7|jWXqa3amOIoRb zOr}WVFP--DsS`1WpN%~)t3R!arKF^Q$e12KEqU36AWwnCBICpH4XCsfnyrHr>$I$4 z!DpKX$OKLWarN7nv@!uIA+~RNO)l$$w}p(;b>mx8pwYvu;dD_unryX_NhT8*Tj>BTrTTL&!?O+%Rv;b?B??gSzdp?6Uug9{ zd@V08Z$BdI?fpoCS$)t4mg4rT8Q_I}h`0d-vYZ^|dOB*Q^S|xqTV*vIg?@fVFSmMpaw0qtTRbx} z({Pg?#{2`sc9)M5N$*N|4;^t$+QP?#mov zGVC@I*lBVrOU-%2y!7%)fAKjpEFsgQc4{amtiHb95KQEwvf<(3T<9-Zm$xIew#P22 zc2Ix|App^>v6(3L_MCU0d3W##AB0M~3D00EWoKZqsJYT(#@w$Y_H7G22M~ApVFTRHMI_3be)Lkn#0F*V8Pq zc}`Cjy$bE;FJ6H7p=0y#R>`}-m4(0F>%@P|?7fx{=R^uFdISRnZ2W_xQhD{YuR3t< z{6yxu=4~JkeA;|(J6_nv#>Nvs&FuLA&PW^he@t(UwFFE8)|a!R{`E`K`i^ZnyE4$k z;(749Ix|oi$c3QbEJ3b~D_kQsPz~fIUKym($a_7dJ?o+40*OLl^{=&oq$<#Q(yyrp z{J-FAniyAw9tPbe&IhQ|a`DqFTVQGQ&Gq3!C2==4x{6EJwiPZ8zub-iXoUtkJiG{} zPaR&}_fn8_z~(=;5lD-aPWD3z8PZS@AaUiomF!G8I}Mf>e~0g#BelA-5#`cj;O5>N Xviia!U7SGha1wx#SCgwmn*{w2TRX*I literal 0 HcmV?d00001 diff --git a/group_user_management/static/description/index.html b/group_user_management/static/description/index.html new file mode 100644 index 000000000..3b94f3781 --- /dev/null +++ b/group_user_management/static/description/index.html @@ -0,0 +1,468 @@ + + + + + +User management Group + + + +
+

User management Group

+ + +

Beta License: AGPL-3 OCA/server-backend Translate me on Weblate Try me on Runboat

+

This module adds a group (a res_groups for granting access rights) “User +Management” which allows to read / create / update / delete users from +your companies :

+
    +
  • including access rights management
  • +
  • excluding Administration group access rights management
  • +
+

The purpose of this new group is to grant user authorization to manage +users but without allowing configuration of other stuff of the instance +(as default Administration > Access Rights can do)

+

Table of contents

+ +
+

Use Cases / Context

+

The purpose of this module is to add a new group for user management to +grant user authorization to manage users but without allowing +configuration of other stuff of the instance (as default Administration +> Access Rights can do)

+

In other terms, if you want to get a user administrator on your instance +that will :

+
    +
  • Create new users
  • +
  • Update user rights
  • +
  • Update passwords or generate renew password links
  • +
  • Archive or remove users
  • +
+

But is not authorized to :

+
    +
  • Grant himself (or anyone else) Administration / Access Rights or +Administration / Settings role
  • +
  • Update advanced configuration of the instance
  • +
  • Update access rights / ir rules
  • +
  • Create or Update existing groups
  • +
+
+
+

Usage

+

To user this module, you need to:

+
    +
  1. Activate debug mode
  2. +
  3. Go to Settings > Users & Companies > Users
  4. +
  5. Open the form view of the User to whom you want to grant User +Management access
  6. +
  7. Tick User Management (in Extra Rights Section)
  8. +
+
+
+

Bug Tracker

+

Bugs are tracked on GitHub Issues. +In case of trouble, please check there if your issue has already been reported. +If you spotted it first, help us to smash it by providing a detailed and welcomed +feedback.

+

Do not contact contributors directly about support or help with technical issues.

+
+
+

Credits

+
+

Authors

+
    +
  • Le Filament
  • +
+
+
+

Contributors

+ +
+
+

Maintainers

+

This module is maintained by the OCA.

+ +Odoo Community Association + +

OCA, or the Odoo Community Association, is a nonprofit organization whose +mission is to support the collaborative development of Odoo features and +promote its widespread use.

+

This module is part of the OCA/server-backend project on GitHub.

+

You are welcome to contribute. To learn how please visit https://odoo-community.org/page/Contribute.

+
+
+
+ + diff --git a/setup/group_user_management/odoo/addons/group_user_management b/setup/group_user_management/odoo/addons/group_user_management new file mode 120000 index 000000000..db3887389 --- /dev/null +++ b/setup/group_user_management/odoo/addons/group_user_management @@ -0,0 +1 @@ +../../../../group_user_management \ No newline at end of file diff --git a/setup/group_user_management/setup.py b/setup/group_user_management/setup.py new file mode 100644 index 000000000..28c57bb64 --- /dev/null +++ b/setup/group_user_management/setup.py @@ -0,0 +1,6 @@ +import setuptools + +setuptools.setup( + setup_requires=['setuptools-odoo'], + odoo_addon=True, +)