Skip to content

Commit

Permalink
Merge branch 'OCA:16.0' into 16.0
Browse files Browse the repository at this point in the history
  • Loading branch information
oh2fih authored Mar 30, 2024
2 parents 080ae25 + d4d03d3 commit 789dafd
Show file tree
Hide file tree
Showing 195 changed files with 18,604 additions and 264 deletions.
8 changes: 6 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -23,15 +23,17 @@ addon | version | maintainers | summary
--- | --- | --- | ---
[auth_admin_passkey](auth_admin_passkey/) | 16.0.1.0.0 | | Allows system administrator to authenticate with any account
[auth_api_key](auth_api_key/) | 16.0.1.0.0 | | Authenticate http requests from an API key
[auth_api_key_group](auth_api_key_group/) | 16.0.1.0.0 | [![simahawk](https://github.com/simahawk.png?size=30px)](https://github.com/simahawk) | Allow grouping API keys together. Grouping per se does nothing. This feature is supposed to be used by other modules to limit access to services or records based on groups of keys.
[auth_api_key_server_env](auth_api_key_server_env/) | 16.0.1.0.0 | | Configure api keys via server env. This can be very useful to avoid mixing your keys between your various environments when restoring databases. All you have to do is to add a new section to your configuration file according to the following convention:
[auth_jwt](auth_jwt/) | 16.0.1.1.0 | [![sbidoul](https://github.com/sbidoul.png?size=30px)](https://github.com/sbidoul) | JWT bearer token authentication.
[auth_jwt_demo](auth_jwt_demo/) | 16.0.1.1.1 | [![sbidoul](https://github.com/sbidoul.png?size=30px)](https://github.com/sbidoul) | Test/demo module for auth_jwt.
[auth_jwt_server_env](auth_jwt_server_env/) | 16.0.1.0.0 | | This addon adds auth.jwt.validator fields to server env
[auth_ldaps](auth_ldaps/) | 16.0.1.0.0 | | Allows to use LDAP over SSL authentication
[auth_oauth_multi_token](auth_oauth_multi_token/) | 16.0.1.0.0 | | Allow multiple connection with the same OAuth account
[auth_oauth_ropc](auth_oauth_ropc/) | 16.0.1.0.0 | | Allow to login with OAuth Resource Owner Password Credentials Grant
[auth_oidc](auth_oidc/) | 16.0.1.0.2 | [![sbidoul](https://github.com/sbidoul.png?size=30px)](https://github.com/sbidoul) | Allow users to login through OpenID Connect Provider
[auth_oidc](auth_oidc/) | 16.0.1.1.1 | [![sbidoul](https://github.com/sbidoul.png?size=30px)](https://github.com/sbidoul) | Allow users to login through OpenID Connect Provider
[auth_oidc_environment](auth_oidc_environment/) | 16.0.1.0.0 | | This module allows to use server env for OIDC configuration
[auth_saml](auth_saml/) | 16.0.1.0.3 | [![vincent-hatakeyama](https://github.com/vincent-hatakeyama.png?size=30px)](https://github.com/vincent-hatakeyama) | SAML2 Authentication
[auth_saml](auth_saml/) | 16.0.1.0.4 | [![vincent-hatakeyama](https://github.com/vincent-hatakeyama.png?size=30px)](https://github.com/vincent-hatakeyama) | SAML2 Authentication
[auth_session_timeout](auth_session_timeout/) | 16.0.1.0.0 | | This module disable all inactive sessions since a given delay
[auth_signup_verify_email](auth_signup_verify_email/) | 16.0.1.0.0 | | Force uninvited users to use a good email for signup
[auth_user_case_insensitive](auth_user_case_insensitive/) | 16.0.1.0.0 | | Makes the user login field case insensitive
Expand All @@ -41,6 +43,8 @@ addon | version | maintainers | summary
[users_ldap_groups](users_ldap_groups/) | 16.0.1.0.0 | | Adds user accounts to groups based on rules defined by the administrator.
[users_ldap_mail](users_ldap_mail/) | 16.0.1.0.0 | [![joao-p-marques](https://github.com/joao-p-marques.png?size=30px)](https://github.com/joao-p-marques) | LDAP mapping for user name and e-mail
[users_ldap_populate](users_ldap_populate/) | 16.0.1.0.0 | [![joao-p-marques](https://github.com/joao-p-marques.png?size=30px)](https://github.com/joao-p-marques) | LDAP Populate
[vault](vault/) | 16.0.1.0.0 | | Password vault integration in Odoo
[vault_share](vault_share/) | 16.0.1.0.0 | | Implementation of a mechanism to share secrets

[//]: # (end addons)

Expand Down
17 changes: 13 additions & 4 deletions auth_admin_passkey/i18n/it.po
Original file line number Diff line number Diff line change
Expand Up @@ -9,15 +9,15 @@ msgstr ""
"Project-Id-Version: Odoo Server 10.0\n"
"Report-Msgid-Bugs-To: \n"
"POT-Creation-Date: 2017-08-01 02:43+0000\n"
"PO-Revision-Date: 2022-02-21 12:17+0000\n"
"Last-Translator: Simone Rubino <[email protected]>\n"
"PO-Revision-Date: 2024-01-03 14:33+0000\n"
"Last-Translator: mymage <[email protected]>\n"
"Language-Team: Italian (https://www.transifex.com/oca/teams/23907/it/)\n"
"Language: it\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: \n"
"Plural-Forms: nplurals=2; plural=n != 1;\n"
"X-Generator: Weblate 4.3.2\n"
"X-Generator: Weblate 4.17\n"

#. module: auth_admin_passkey
#. odoo-python
Expand All @@ -40,11 +40,20 @@ msgid ""
"- Login date : %(login_date)s\n"
"\n"
msgstr ""
"L'utente amministratore di sistemaha usato la sua passkey per accedere con "
"%(login)s.\n"
"\n"
"\n"
"\n"
"Informazioni tecniche di seguito: \n"
"\n"
"- Data accesso : %(login_date)s\n"
"\n"

#. module: auth_admin_passkey
#: model:ir.model,name:auth_admin_passkey.model_res_users
msgid "User"
msgstr ""
msgstr "Utente"

#, python-format
#~ msgid "<pre>User with login '%s' has the same password as you.</pre>"
Expand Down
87 changes: 87 additions & 0 deletions auth_api_key_group/README.rst
Original file line number Diff line number Diff line change
@@ -0,0 +1,87 @@
==================
Auth API key group
==================

..
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!! This file is generated by oca-gen-addon-readme !!
!! changes will be overwritten. !!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!! source digest: sha256:e231a34a3fe2c3a2a8c78305131ba9e90af3725f3cf0b0878d313439f511f6fe
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
.. |badge1| image:: https://img.shields.io/badge/maturity-Beta-yellow.png
:target: https://odoo-community.org/page/development-status
:alt: Beta
.. |badge2| image:: https://img.shields.io/badge/licence-LGPL--3-blue.png
:target: http://www.gnu.org/licenses/lgpl-3.0-standalone.html
:alt: License: LGPL-3
.. |badge3| image:: https://img.shields.io/badge/github-OCA%2Fserver--auth-lightgray.png?logo=github
:target: https://github.com/OCA/server-auth/tree/16.0/auth_api_key_group
:alt: OCA/server-auth
.. |badge4| image:: https://img.shields.io/badge/weblate-Translate%20me-F47D42.png
:target: https://translation.odoo-community.org/projects/server-auth-16-0/server-auth-16-0-auth_api_key_group
:alt: Translate me on Weblate
.. |badge5| image:: https://img.shields.io/badge/runboat-Try%20me-875A7B.png
:target: https://runboat.odoo-community.org/builds?repo=OCA/server-auth&target_branch=16.0
:alt: Try me on Runboat

|badge1| |badge2| |badge3| |badge4| |badge5|

Allow grouping API keys together.

Grouping per se does nothing. This feature is supposed to be used by other modules
to limit access to services or records based on groups of keys.

**Table of contents**

.. contents::
:local:

Bug Tracker
===========

Bugs are tracked on `GitHub Issues <https://github.com/OCA/server-auth/issues>`_.
In case of trouble, please check there if your issue has already been reported.
If you spotted it first, help us to smash it by providing a detailed and welcomed
`feedback <https://github.com/OCA/server-auth/issues/new?body=module:%20auth_api_key_group%0Aversion:%2016.0%0A%0A**Steps%20to%20reproduce**%0A-%20...%0A%0A**Current%20behavior**%0A%0A**Expected%20behavior**>`_.

Do not contact contributors directly about support or help with technical issues.

Credits
=======

Authors
~~~~~~~

* Camptcamp

Contributors
~~~~~~~~~~~~

* Simone Orsi <[email protected]>

Maintainers
~~~~~~~~~~~

This module is maintained by the OCA.

.. image:: https://odoo-community.org/logo.png
:alt: Odoo Community Association
:target: https://odoo-community.org

OCA, or the Odoo Community Association, is a nonprofit organization whose
mission is to support the collaborative development of Odoo features and
promote its widespread use.

.. |maintainer-simahawk| image:: https://github.com/simahawk.png?size=40px
:target: https://github.com/simahawk
:alt: simahawk

Current `maintainer <https://odoo-community.org/page/maintainer-role>`__:

|maintainer-simahawk|

This module is part of the `OCA/server-auth <https://github.com/OCA/server-auth/tree/16.0/auth_api_key_group>`_ project on GitHub.

You are welcome to contribute. To learn how please visit https://odoo-community.org/page/Contribute.
1 change: 1 addition & 0 deletions auth_api_key_group/__init__.py
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
from . import models
24 changes: 24 additions & 0 deletions auth_api_key_group/__manifest__.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
# Copyright 2021 Camptcamp SA
# @author: Simone Orsi <[email protected]>
# License LGPL-3.0 or later (http://www.gnu.org/licenses/lgpl).

{
"name": "Auth API key group",
"summary": """
Allow grouping API keys together.
Grouping per se does nothing. This feature is supposed to be used by other modules
to limit access to services or records based on groups of keys.
""",
"version": "16.0.1.0.0",
"license": "LGPL-3",
"website": "https://github.com/OCA/server-auth",
"author": "Camptcamp,Odoo Community Association (OCA)",
"maintainers": ["simahawk"],
"depends": ["auth_api_key"],
"data": [
"security/ir.model.access.csv",
"views/auth_api_key_view.xml",
"views/auth_api_key_group_view.xml",
],
}
85 changes: 85 additions & 0 deletions auth_api_key_group/i18n/auth_api_key_group.pot
Original file line number Diff line number Diff line change
@@ -0,0 +1,85 @@
# Translation of Odoo Server.
# This file contains the translation of the following modules:
# * auth_api_key_group
#
msgid ""
msgstr ""
"Project-Id-Version: Odoo Server 16.0\n"
"Report-Msgid-Bugs-To: \n"
"Last-Translator: \n"
"Language-Team: \n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: \n"
"Plural-Forms: \n"

#. module: auth_api_key_group
#: model:ir.model,name:auth_api_key_group.model_auth_api_key
msgid "API Key"
msgstr ""

#. module: auth_api_key_group
#: model:ir.model,name:auth_api_key_group.model_auth_api_key_group
msgid "API Key auth group"
msgstr ""

#. module: auth_api_key_group
#: model:ir.model.fields,field_description:auth_api_key_group.field_auth_api_key_group__auth_api_key_ids
msgid "API Keys"
msgstr ""

#. module: auth_api_key_group
#: model:ir.actions.act_window,name:auth_api_key_group.auth_api_key_group_act_window
#: model:ir.ui.menu,name:auth_api_key_group.auth_api_key_group_menu
msgid "Auth Api Key Groups"
msgstr ""

#. module: auth_api_key_group
#: model:ir.model.fields,field_description:auth_api_key_group.field_auth_api_key__auth_api_key_group_ids
msgid "Auth Groups"
msgstr ""

#. module: auth_api_key_group
#: model:ir.model.fields,field_description:auth_api_key_group.field_auth_api_key_group__code
msgid "Code"
msgstr ""

#. module: auth_api_key_group
#: model:ir.model.fields,field_description:auth_api_key_group.field_auth_api_key_group__create_uid
msgid "Created by"
msgstr ""

#. module: auth_api_key_group
#: model:ir.model.fields,field_description:auth_api_key_group.field_auth_api_key_group__create_date
msgid "Created on"
msgstr ""

#. module: auth_api_key_group
#: model:ir.model.fields,field_description:auth_api_key_group.field_auth_api_key_group__display_name
msgid "Display Name"
msgstr ""

#. module: auth_api_key_group
#: model:ir.model.fields,field_description:auth_api_key_group.field_auth_api_key_group__id
msgid "ID"
msgstr ""

#. module: auth_api_key_group
#: model:ir.model.fields,field_description:auth_api_key_group.field_auth_api_key_group____last_update
msgid "Last Modified on"
msgstr ""

#. module: auth_api_key_group
#: model:ir.model.fields,field_description:auth_api_key_group.field_auth_api_key_group__write_uid
msgid "Last Updated by"
msgstr ""

#. module: auth_api_key_group
#: model:ir.model.fields,field_description:auth_api_key_group.field_auth_api_key_group__write_date
msgid "Last Updated on"
msgstr ""

#. module: auth_api_key_group
#: model:ir.model.fields,field_description:auth_api_key_group.field_auth_api_key_group__name
msgid "Name"
msgstr ""
2 changes: 2 additions & 0 deletions auth_api_key_group/models/__init__.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
from . import auth_api_key
from . import auth_api_key_group
19 changes: 19 additions & 0 deletions auth_api_key_group/models/auth_api_key.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,19 @@
# Copyright 2021 Camptcamp SA
# @author: Simone Orsi <[email protected]>
# License LGPL-3.0 or later (http://www.gnu.org/licenses/lgpl).


from odoo import fields, models


class AuthApiKey(models.Model):

_inherit = "auth.api.key"

auth_api_key_group_ids = fields.Many2many(
comodel_name="auth.api.key.group",
relation="auth_api_key_group_rel",
column1="key_id",
column2="group_id",
string="Auth Groups",
)
23 changes: 23 additions & 0 deletions auth_api_key_group/models/auth_api_key_group.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,23 @@
# Copyright 2021 Camptcamp SA
# @author: Simone Orsi <[email protected]>
# License LGPL-3.0 or later (http://www.gnu.org/licenses/lgpl).


from odoo import fields, models


class AuthApiKeyGroup(models.Model):
"""Group API keys together."""

_name = "auth.api.key.group"
_description = "API Key auth group"

name = fields.Char(required=True)
code = fields.Char(required=True)
auth_api_key_ids = fields.Many2many(
comodel_name="auth.api.key",
relation="auth_api_key_group_rel",
column1="group_id",
column2="key_id",
string="API Keys",
)
1 change: 1 addition & 0 deletions auth_api_key_group/readme/CONTRIBUTORS.rst
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
* Simone Orsi <[email protected]>
4 changes: 4 additions & 0 deletions auth_api_key_group/readme/DESCRIPTION.rst
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
Allow grouping API keys together.

Grouping per se does nothing. This feature is supposed to be used by other modules
to limit access to services or records based on groups of keys.
2 changes: 2 additions & 0 deletions auth_api_key_group/security/ir.model.access.csv
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
id,name,model_id:id,group_id:id,perm_read,perm_write,perm_create,perm_unlink
access_auth_api_key_group,access_auth_api_key_group,model_auth_api_key_group,base.group_system,1,1,1,1
Binary file added auth_api_key_group/static/description/icon.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading

0 comments on commit 789dafd

Please sign in to comment.