diff options
| author | stephanchrst <stephanchrst@gmail.com> | 2022-05-10 21:51:50 +0700 |
|---|---|---|
| committer | stephanchrst <stephanchrst@gmail.com> | 2022-05-10 21:51:50 +0700 |
| commit | 3751379f1e9a4c215fb6eb898b4ccc67659b9ace (patch) | |
| tree | a44932296ef4a9b71d5f010906253d8c53727726 /addons/rating/tests | |
| parent | 0a15094050bfde69a06d6eff798e9a8ddf2b8c21 (diff) | |
initial commit 2
Diffstat (limited to 'addons/rating/tests')
| -rw-r--r-- | addons/rating/tests/__init__.py | 4 | ||||
| -rw-r--r-- | addons/rating/tests/test_security.py | 76 |
2 files changed, 80 insertions, 0 deletions
diff --git a/addons/rating/tests/__init__.py b/addons/rating/tests/__init__.py new file mode 100644 index 00000000..d7f854e0 --- /dev/null +++ b/addons/rating/tests/__init__.py @@ -0,0 +1,4 @@ +# -*- coding: utf-8 -*- +# Part of Odoo. See LICENSE file for full copyright and licensing details. + +from . import test_security diff --git a/addons/rating/tests/test_security.py b/addons/rating/tests/test_security.py new file mode 100644 index 00000000..7aa0a145 --- /dev/null +++ b/addons/rating/tests/test_security.py @@ -0,0 +1,76 @@ +# -*- coding: utf-8 -*- +# Part of Odoo. See LICENSE file for full copyright and licensing details. + +from odoo.addons.mail.tests.common import mail_new_test_user +from odoo.exceptions import AccessError +from odoo.tests import tagged, common, new_test_user +from odoo.tools import mute_logger + + +@tagged('security') +class TestAccessRating(common.SavepointCase): + + @classmethod + def setUpClass(cls): + super(TestAccessRating, cls).setUpClass() + + cls.user_manager_partner = mail_new_test_user( + cls.env, name='Jean Admin', login='user_mana', email='admin@example.com', + groups='base.group_partner_manager,base.group_system' + ) + + cls.user_emp = mail_new_test_user( + cls.env, name='Eglantine Employee', login='user_emp', email='employee@example.com', + groups='base.group_user' + ) + + cls.user_portal = mail_new_test_user( + cls.env, name='Patrick Portal', login='user_portal', email='portal@example.com', + groups='base.group_portal' + ) + + cls.user_public = mail_new_test_user( + cls.env, name='Pauline Public', login='user_public', email='public@example.com', + groups='base.group_public' + ) + + cls.partner_to_rate = cls.env['res.partner'].with_user(cls.user_manager_partner).create({ + "name": "Partner to Rate :(" + }) + + + @mute_logger('odoo.addons.base.models.ir_model') + def test_rating_access(self): + """ Security test : only a employee (user group) can create and write rating object """ + # Public and portal user can't Access direclty to the ratings + with self.assertRaises(AccessError): + self.env['rating.rating'].with_user(self.user_portal).create({ + 'res_model_id': self.env['ir.model'].sudo().search([('model', '=', 'res.partner')], limit=1).id, + 'res_model': 'res.partner', + 'res_id': self.partner_to_rate.id, + 'rating': 1 + }) + with self.assertRaises(AccessError): + self.env['rating.rating'].with_user(self.user_public).create({ + 'res_model_id': self.env['ir.model'].sudo().search([('model', '=', 'res.partner')], limit=1).id, + 'res_model': 'res.partner', + 'res_id': self.partner_to_rate.id, + 'rating': 3 + }) + + # No error with employee + ratting = self.env['rating.rating'].with_user(self.user_emp).create({ + 'res_model_id': self.env['ir.model'].sudo().search([('model', '=', 'res.partner')], limit=1).id, + 'res_model': 'res.partner', + 'res_id': self.partner_to_rate.id, + 'rating': 3 + }) + + with self.assertRaises(AccessError): + ratting.with_user(self.user_portal).write({ + 'feedback': 'You should not pass!' + }) + with self.assertRaises(AccessError): + ratting.with_user(self.user_public).write({ + 'feedback': 'You should not pass!' + }) |
