|
|
# Copyright 2014 ABF OSIELL <http://osiell.com> # License LGPL-3.0 or later (http://www.gnu.org/licenses/lgpl). import datetime import logging
from odoo import _, api, fields, models from odoo import SUPERUSER_ID from odoo.exceptions import ValidationError
_logger = logging.getLogger(__name__)
class ResUsersRole(models.Model): _name = 'res.users.role' _inherits = {'res.groups': 'group_id'} _description = "User role"
group_id = fields.Many2one( comodel_name='res.groups', required=True, ondelete='cascade', readonly=True, string="Associated group") line_ids = fields.One2many( comodel_name='res.users.role.line', inverse_name='role_id', string="Role lines") user_ids = fields.One2many( comodel_name='res.users', string="Users list", compute='_compute_user_ids') group_category_id = fields.Many2one( related='group_id.category_id', default=lambda cls: cls.env.ref( 'base_user_role.ir_module_category_role').id, string="Associated category", help="Associated group's category")
@api.multi @api.depends('line_ids.user_id') def _compute_user_ids(self): for role in self: role.user_ids = role.line_ids.mapped('user_id')
@api.model def create(self, vals): new_record = super(ResUsersRole, self).create(vals) new_record.update_users() return new_record
@api.multi def write(self, vals): res = super(ResUsersRole, self).write(vals) self.update_users() return res
@api.multi def unlink(self): users = self.mapped('user_ids') res = super(ResUsersRole, self).unlink() users.set_groups_from_roles(force=True) return res
@api.multi def update_users(self): """Update all the users concerned by the roles identified by `ids`.""" users = self.mapped('user_ids') users.set_groups_from_roles() return True
@api.model def cron_update_users(self): logging.info("Update user roles") self.search([]).update_users()
class ResUsersRoleLine(models.Model): _name = 'res.users.role.line' _description = 'Users associated to a role'
role_id = fields.Many2one( comodel_name='res.users.role', required=True, string="Role", ondelete='cascade') user_id = fields.Many2one( comodel_name='res.users', required=True, string="User", domain=[('id', '!=', SUPERUSER_ID)], ondelete='cascade') date_from = fields.Date("From") date_to = fields.Date("To") is_enabled = fields.Boolean("Enabled", compute='_compute_is_enabled') company_id = fields.Many2one( 'res.company', 'Company', default=lambda self: self.env.user.company_id)
@api.multi @api.constrains('user_id', 'company_id') def _check_company(self): for record in self: if (self.company_id and self.company_id != self.user_id.company_id and self.company_id not in self.user_id.company_ids): raise ValidationError( _('User "{}" does not have access to the company "{}"') .format(self.user_id.name, self.company_id.name))
@api.multi @api.depends('date_from', 'date_to') def _compute_is_enabled(self): today = datetime.date.today() for role_line in self: role_line.is_enabled = True if role_line.date_from: date_from = role_line.date_from if date_from > today: role_line.is_enabled = False if role_line.date_to: date_to = role_line.date_to if today > date_to: role_line.is_enabled = False
@api.multi def unlink(self): users = self.mapped('user_id') res = super(ResUsersRoleLine, self).unlink() users.set_groups_from_roles(force=True) return res
|