Git Product home page Git Product logo

Comments (1)

yajo avatar yajo commented on July 2, 2024

I want to clarify that this only applies to Odoo 16+ because it was in this version that Odoo added the credit limit feature in odoo/odoo#83205. In previous versions there might still be some inconsistency, but we didn't check.

Views should be managed with standard permission: billing, full accounting and accounting manager

I agree.

Indeed this permission level seems to be completely useless now:

<record id="group_account_financial_risk_user" model="res.groups">
<field name="name">User</field>
<field name="category_id" ref="category_financial_risk" />
<field name="comment">Read only access to financial risk info</field>
</record>

By removing it, we'd be able to undo the inconsistency. This way, also, installing other modules that used that core Odoo feature would be able to follow core permissions model without having to deal with the fact that there's an OCA module that introduces a separate permissions model.

Approve or not a sale or invoice which is blocked by exceded risk should be manager with a special security group as is in this moment with Financial Risk Manager

This also seems a good solution to me. It's about this permission, and it is still useful:

<record id="group_account_financial_risk_manager" model="res.groups">
<field name="name">Manager</field>
<field name="category_id" ref="category_financial_risk" />
<field
name="implied_ids"
eval="[(4, ref('account_financial_risk.group_account_financial_risk_user'))]"
/>
<field
name="comment"
>Can edit risk limit and overpass partner risk exceptions</field>
</record>

These users will be able to:

  • Set up specific limits (not warnings, like upstream Odoo does (although they call them limits)).
  • Skip those limits in specific occasions.

However, be warned that any other billing/full-accounting user would still be able to edit the global limit, just like with upstream Odoo. This is a bit inconsistent too, but at least it seems the lesser evil, given the current situation.

The module account_financial_risk would be adding that group and at the same time giving it some functionality, so it makes sense in that regard too.

Thanks for the analyisis and detailed explanation @rafaelbn.

from credit-control.

Related Issues (20)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.