From 168272bec7536051f6c922bf1deb622f16438649 Mon Sep 17 00:00:00 2001 From: ArnauCForgeFlow Date: Thu, 25 Jan 2024 11:53:48 +0100 Subject: [PATCH] [ADD] base_user_role: added tests for group groups into a role --- base_user_role/tests/test_user_role.py | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) diff --git a/base_user_role/tests/test_user_role.py b/base_user_role/tests/test_user_role.py index b39440ac..2eb50c9b 100644 --- a/base_user_role/tests/test_user_role.py +++ b/base_user_role/tests/test_user_role.py @@ -16,6 +16,7 @@ class TestUserRole(TransactionCase): ) cls.user_model = cls.env["res.users"] cls.role_model = cls.env["res.users.role"] + cls.wiz_model = cls.env["group.groups.into.role"] cls.company1 = cls.env.ref("base.main_company") cls.company2 = cls.env["res.company"].create({"name": "company2"}) @@ -229,3 +230,18 @@ class TestUserRole(TransactionCase): AccessError, "You are not allowed to access 'User role'" ): role.read() + + def test_group_groups_into_role(self): + user_group_ids = [group.id for group in self.user_id.groups_id] + # Check that there is not a role with name: Test Role + self.assertFalse(self.role_model.search([("name", "=", "Test Role")])) + # Call create_role function to group groups into a role + wizard = self.wiz_model.with_context(selected_group_ids=user_group_ids).create( + {"name": "Test Role"} + ) + wizard.create_role() + # Check that a role with name: Test Role has been created + new_role = self.role_model.search([("name", "=", "Test Role")]) + self.assertTrue(new_role) + # Check that the role has the correct groups + self.assertEqual(new_role.implied_ids.ids, user_group_ids)