From 03a13e93ba48e52e39c5ffbf19ad1e8d68f75173 Mon Sep 17 00:00:00 2001 From: Xavier Morel <xmo@odoo.com> Date: Wed, 18 Dec 2019 12:39:42 +0000 Subject: [PATCH] [IMP] base, test_access_rights: mute ir_rule logging on ACL tests The tests are willfully triggering ACL failures, logging the information is noisy and not useful. --- odoo/addons/base/tests/test_orm.py | 2 +- odoo/addons/test_access_rights/tests/test_ir_rules.py | 4 ++++ 2 files changed, 5 insertions(+), 1 deletion(-) diff --git a/odoo/addons/base/tests/test_orm.py b/odoo/addons/base/tests/test_orm.py index ee169def6559..d4bf0ab8631f 100644 --- a/odoo/addons/base/tests/test_orm.py +++ b/odoo/addons/base/tests/test_orm.py @@ -39,7 +39,7 @@ class TestORM(TransactionCase): with self.assertRaises(MissingError): p1.write({'name': 'foo'}) - @mute_logger('odoo.models') + @mute_logger('odoo.models', 'odoo.addons.base.models.ir_rule') def test_access_filtered_records(self): """ Verify that accessing filtered records works as expected for non-admin user """ p1 = self.env['res.partner'].create({'name': 'W'}) diff --git a/odoo/addons/test_access_rights/tests/test_ir_rules.py b/odoo/addons/test_access_rights/tests/test_ir_rules.py index 114474760700..ce33a368434a 100644 --- a/odoo/addons/test_access_rights/tests/test_ir_rules.py +++ b/odoo/addons/test_access_rights/tests/test_ir_rules.py @@ -3,6 +3,8 @@ from odoo.exceptions import AccessError from odoo.tests.common import TransactionCase +from odoo.tools import mute_logger + class TestRules(TransactionCase): def setUp(self): @@ -28,6 +30,7 @@ class TestRules(TransactionCase): 'domain_force': "[('categ_id', 'in', user.env['test_access_right.obj_categ'].search([]).ids)]" }) + @mute_logger('odoo.addons.base.models.ir_rule') def test_basic_access(self): env = self.env(user=self.browse_ref('base.public_user')) @@ -44,6 +47,7 @@ class TestRules(TransactionCase): with self.assertRaises(AccessError): self.assertEqual(browse2.val, -1) + @mute_logger('odoo.addons.base.models.ir_rule') def test_group_rule(self): env = self.env(user=self.browse_ref('base.public_user')) -- GitLab