CONS levels shelving locations requires CONS level UPDATE_COPY permission

Bug #1976002 reported by Lindsay Stratton
16
This bug affects 3 people
Affects Status Importance Assigned to Milestone
Evergreen
Fix Released
High
Unassigned
3.8
Fix Released
High
Unassigned
3.9
Fix Released
High
Unassigned

Bug Description

Version 3.8

In a consortium that uses consortium-wide shelving locations, holdings maintenance staff must have the permission UPDATE_COPY set to 0 in order access and apply shelving locations.

This has the side effect of enabling holdings staff at all libraries to edit the item records of all other libraries' materials.

Revision history for this message
Mike Rylander (mrylander) wrote :

This is due to 61cbf11222e7 and ab5478b879e9e34 which combined to inverted the logic of the org filter in the presence of a permission filter. The eg-item-location-select says it wants to display locations at OR ABOVE the context filter, but then doesn't do that for permission filtered instances.

Branch forthcoming...

Changed in evergreen:
status: New → Confirmed
importance: Undecided → High
assignee: nobody → Mike Rylander (mrylander)
Revision history for this message
Mike Rylander (mrylander) wrote :
tags: added: angular pullrequest
Changed in evergreen:
assignee: Mike Rylander (mrylander) → nobody
Andrea Neiman (aneiman)
Changed in evergreen:
assignee: nobody → Andrea Neiman (aneiman)
Revision history for this message
Andrea Neiman (aneiman) wrote :

I have tested this code and consent to signing off with my name, Andrea Buntz Neiman, and email <email address hidden>

tags: added: signedoff
Changed in evergreen:
milestone: none → 3.next
assignee: Andrea Neiman (aneiman) → nobody
Revision history for this message
Jane Sandberg (sandbergja) wrote :

Thanks, Mike and Andrea! Pushed to 3.8 and above.

Changed in evergreen:
status: Confirmed → Fix Committed
Changed in evergreen:
milestone: 3.next → 3.10-beta
Changed in evergreen:
status: Fix Committed → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.