diff --git a/.gitignore b/.gitignore new file mode 100644 index 0000000000000000000000000000000000000000..1b86f679226098cc6f795cd48bb079a5a45dc19a_LmdpdGlnbm9yZQ== --- /dev/null +++ b/.gitignore @@ -0,0 +1,7 @@ +*.pyc +*.py~ +.project +.directory +.pydevproject +i18n/fr.po~ +.idea diff --git a/__init__.py b/__init__.py index dff262e3b1c8dd1e490a99a01cfa6cd1235066dc_X19pbml0X18ucHk=..1b86f679226098cc6f795cd48bb079a5a45dc19a_X19pbml0X18ucHk= 100644 --- a/__init__.py +++ b/__init__.py @@ -1,4 +1,4 @@ import controllers import auth_saml import res_users -import token +import saml_token diff --git a/saml_token.py b/saml_token.py new file mode 100644 index 0000000000000000000000000000000000000000..1b86f679226098cc6f795cd48bb079a5a45dc19a_c2FtbF90b2tlbi5weQ== --- /dev/null +++ b/saml_token.py @@ -0,0 +1,31 @@ +# -*- encoding: utf-8 -*- +__author__ = 'faide' + + +import logging +from openerp.osv import osv, fields + +_logger = logging.getLogger(__name__) + + +class saml_token(osv.Model): + _name = "auth_saml.token" + _rec_name = "user_id" + + _columns = { + 'saml_provider_id': fields.many2one( + 'auth.saml.provider', + string='SAML Provider that issued the token', + ), + 'user_id': fields.many2one( + 'res.users', + string="User", + # we want the token to be destroyed if the corresponding res.users + # is deleted + ondelete="cascade" + ), + 'saml_access_token': fields.char( + 'Current SAML token for this user', + help="The current SAML token in use", + ), + } diff --git a/token.py b/token.py deleted file mode 100644 index dff262e3b1c8dd1e490a99a01cfa6cd1235066dc_dG9rZW4ucHk=..0000000000000000000000000000000000000000 --- a/token.py +++ /dev/null @@ -1,31 +0,0 @@ -# -*- encoding: utf-8 -*- -__author__ = 'faide' - - -import logging -from openerp.osv import osv, fields - -_logger = logging.getLogger(__name__) - - -class saml_token(osv.Model): - _name = "auth_saml.token" - _rec_name = "user_id" - - _columns = { - 'saml_provider_id': fields.many2one( - 'auth.saml.provider', - string='SAML Provider that issued the token', - ), - 'user_id': fields.many2one( - 'res.users', - string="User", - # we want the token to be destroyed if the corresponding res.users - # is deleted - ondelete="cascade" - ), - 'saml_access_token': fields.char( - 'Current SAML token for this user', - help="The current SAML token in use", - ), - }