Commit d177ce29 authored by Rafael Monnerat's avatar Rafael Monnerat

slapos_erp5: The administrador shouldn't be able to edit Payzen/Wechat Events

   This is part of automated process, so no reason for give write access on those events.
parent fdcc621d
<type_roles> <type_roles>
<role id='Assignor'> <role id='Auditor'>
<property id='title'>Group company</property> <property id='title'>Group company</property>
<multi_property id='categories'>local_role_group/group</multi_property> <multi_property id='categories'>local_role_group/group</multi_property>
<multi_property id='category'>group/company</multi_property> <multi_property id='category'>group/company</multi_property>
......
<type_roles> <type_roles>
<role id='Assignor'> <role id='Auditor'>
<property id='title'>Group company</property> <property id='title'>Group company</property>
<multi_property id='categories'>local_role_group/group</multi_property> <multi_property id='categories'>local_role_group/group</multi_property>
<multi_property id='category'>group/company</multi_property> <multi_property id='category'>group/company</multi_property>
......
...@@ -2091,7 +2091,7 @@ class TestPayzenEvent(TestSlapOSGroupRoleSecurityMixin): ...@@ -2091,7 +2091,7 @@ class TestPayzenEvent(TestSlapOSGroupRoleSecurityMixin):
event.updateLocalRolesOnSecurityGroups() event.updateLocalRolesOnSecurityGroups()
self.assertSecurityGroup(event, self.assertSecurityGroup(event,
['G-COMPANY', self.user_id], False) ['G-COMPANY', self.user_id], False)
self.assertRoles(event, 'G-COMPANY', ['Assignor']) self.assertRoles(event, 'G-COMPANY', ['Auditor'])
self.assertRoles(event, self.user_id, ['Owner']) self.assertRoles(event, self.user_id, ['Owner'])
def test_ShadowUser(self): def test_ShadowUser(self):
...@@ -2107,7 +2107,7 @@ class TestPayzenEvent(TestSlapOSGroupRoleSecurityMixin): ...@@ -2107,7 +2107,7 @@ class TestPayzenEvent(TestSlapOSGroupRoleSecurityMixin):
shadow_user_id = 'SHADOW-%s' % person.getUserId() shadow_user_id = 'SHADOW-%s' % person.getUserId()
self.assertSecurityGroup(event, self.assertSecurityGroup(event,
['G-COMPANY', self.user_id, shadow_user_id], False) ['G-COMPANY', self.user_id, shadow_user_id], False)
self.assertRoles(event, 'G-COMPANY', ['Assignor']) self.assertRoles(event, 'G-COMPANY', ['Auditor'])
self.assertRoles(event, shadow_user_id, ['Assignee']) self.assertRoles(event, shadow_user_id, ['Assignee'])
self.assertRoles(event, self.user_id, ['Owner']) self.assertRoles(event, self.user_id, ['Owner'])
...@@ -2118,7 +2118,7 @@ class TestWechatEvent(TestSlapOSGroupRoleSecurityMixin): ...@@ -2118,7 +2118,7 @@ class TestWechatEvent(TestSlapOSGroupRoleSecurityMixin):
event.updateLocalRolesOnSecurityGroups() event.updateLocalRolesOnSecurityGroups()
self.assertSecurityGroup(event, self.assertSecurityGroup(event,
['G-COMPANY', self.user_id], False) ['G-COMPANY', self.user_id], False)
self.assertRoles(event, 'G-COMPANY', ['Assignor']) self.assertRoles(event, 'G-COMPANY', ['Auditor'])
self.assertRoles(event, self.user_id, ['Owner']) self.assertRoles(event, self.user_id, ['Owner'])
def test_ShadowUser(self): def test_ShadowUser(self):
...@@ -2134,7 +2134,7 @@ class TestWechatEvent(TestSlapOSGroupRoleSecurityMixin): ...@@ -2134,7 +2134,7 @@ class TestWechatEvent(TestSlapOSGroupRoleSecurityMixin):
shadow_user_id = 'SHADOW-%s' % person.getUserId() shadow_user_id = 'SHADOW-%s' % person.getUserId()
self.assertSecurityGroup(event, self.assertSecurityGroup(event,
['G-COMPANY', self.user_id, shadow_user_id], False) ['G-COMPANY', self.user_id, shadow_user_id], False)
self.assertRoles(event, 'G-COMPANY', ['Assignor']) self.assertRoles(event, 'G-COMPANY', ['Auditor'])
self.assertRoles(event, shadow_user_id, ['Assignee']) self.assertRoles(event, shadow_user_id, ['Assignee'])
self.assertRoles(event, self.user_id, ['Owner']) self.assertRoles(event, self.user_id, ['Owner'])
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment