- 02 Sep, 2020 9 commits
-
-
Alain Takoudjou authored
If 2 lines have the same effective date (catalog has a 1 second precision), always return the validate and open first. Commit: 02d06501 Changes applied from history: http://git.erp5.org/gitweb/erp5.git/history/refs/heads/interaction-drop:/product/ERP5/Document/SubscriptionItem.py?js=1
-
Rafael Monnerat authored
Original commit from : Lukasz Nowak <luke@nexedi.com> 3e45ec35
-
Alain Takoudjou authored
From Lukasz Nowak: 1- Compensation is undesired. (51c8a250) Raise loudly with message. 2- Disallow any compensation. (3c74ed07) 3- Emit more informative log. (534b2e77)
-
Łukasz Nowak authored
Also minimise activity hurricane by calling expand directly. Open Orders are searched using indexation timestamp, which allows to see them in "windows", and does not repeat expand if not needed. Generate activities and allow to pass the tag. Use search and activate everywhere which will allow to walk through objects without killing the cluster even in case of really big documents. Avoid calling isDivergent which can take few minutes to finish. causality_state comes from well designed causality workflow, which informs enough about delivery state. Fetching causality_state property is extremely fast.
-
Rafael Monnerat authored
Notes: Do nothing on 'calculate' instead of disabling *_causality_interaction_workflow as these interaction workflows do not generate activities directly, and do work that can't be postponed. By contrast, 'calculate' transition of delivery_causality_workflow is modified so that no 'updateCausalityState' activity is created by default. This commit also update list of method_id which should not call calculate_causality
-
Romain Courteaud authored
Conflicts: bt5/erp5_crm/bt/revision
-
Romain Courteaud authored
-
Jérome Perrin authored
This reverts commit bc67c2c4. This is seem to stall testFunctionalAdvancedECommerce with this error: Module script, line 5, in Workflow_ensureUserId - <PythonScript at /erp5_portal_7f1517681f85de9695ca475d69c4d66f/portal_workflow/login_interaction_workflow/scripts/Workflow_ensureUserId> - Line 5 user = state_change['object'].getParentValue() Module AccessControl.ZopeGuards, line 87, in guarded_getitem if getSecurityManager().validate(object, object, None, v): Unauthorized: You are not allowed to access '2' in this context let's revert for now, we'll re-do this with more tests.
-
Romain Courteaud authored
New dependencies were added in nexedi/erp5@206a8e25
-
- 01 Sep, 2020 9 commits
-
-
Ludovic Kiefer authored
-
Ludovic Kiefer authored
-
Ludovic Kiefer authored
-
Ludovic Kiefer authored
-
Ludovic Kiefer authored
-
Ludovic Kiefer authored
-
Ludovic Kiefer authored
-
Romain Courteaud authored
See nexedi/jio@24b938cb
-
Romain Courteaud authored
-
- 31 Aug, 2020 8 commits
-
-
Vincent Pelletier authored
Should fix most of the cases where reloading components cause breakage. There is still a race condition between a transaction's cache being actually flushed (which can only happen at transaction boundaries) and another transaction doing the actual class reload, which will immediately affect all the started transactions in the same process.
-
Jérome Perrin authored
Once a portal type class became available again, instances of this classes should no longer be broken and can be modified again
-
Jérome Perrin authored
Some other types (Gadget Type) are currently lacking the interaction workflow which resets the dynamic classes.
-
Jérome Perrin authored
-
Jérome Perrin authored
Persons created before the introduction of ERP5 Login and user_id will only have a user_id after migration if they were already user before migration, otherwise they will not have a user_id and creating assignments and ERP5 Login for this person creates a user which can not log in the system. To make it possible for these persons to login anyway, we ensure person has a user id when validating a login
-
Jérome Perrin authored
while setting an initial user id should be allowed for any user which can create a person, changing an already set user id can have security implications, so we protect it with a more strict permission
-
Jérome Perrin authored
user_id are technical things that should not be displayed to users. In the case of tokens, for now we show "something that's not user id / not the token secret". That's not ideal but as far as I know whe don't really have use cases of tokens to show a page where user caption would be displayed.
-
Jérome Perrin authored
Person.setUserId is heavy, it serializes person module to prevent concurrency, but in some cases we the risk of having duplicate user ids is under control, so we don't want to pay the performance price. See merge request !1242
-
- 27 Aug, 2020 1 commit
-
-
Arnaud Fontaine authored
-
- 26 Aug, 2020 1 commit
-
-
Gabriel Monnerat authored
-
- 25 Aug, 2020 3 commits
-
-
Xiaowu Zhang authored
-
Arnaud Fontaine authored
-
Arnaud Fontaine authored
-
- 24 Aug, 2020 4 commits
-
-
Arnaud Fontaine authored
-
Arnaud Fontaine authored
-
Xiaowu Zhang authored
-
Xiaowu Zhang authored
-
- 21 Aug, 2020 5 commits
-
-
Xiaowu Zhang authored
-
Xiaowu Zhang authored
-
Xiaowu Zhang authored
-
Xiaowu Zhang authored
-
Xiaowu Zhang authored
-