|
|
# Copyright 2014 ABF OSIELL <http://osiell.com> # License LGPL-3.0 or later (http://www.gnu.org/licenses/lgpl). import datetime import logging
from odoo import SUPERUSER_ID, _, api, fields, models from odoo.exceptions import ValidationError
_logger = logging.getLogger(__name__)
class ResUsersRole(models.Model): _name = "res.users.role" _inherits = {"res.groups": "group_id"} _description = "User role"
group_id = fields.Many2one( comodel_name="res.groups", required=True, ondelete="cascade", readonly=True, string="Associated group", ) line_ids = fields.One2many( comodel_name="res.users.role.line", inverse_name="role_id", string="Role lines" ) user_ids = fields.One2many( comodel_name="res.users", string="Users list", compute="_compute_user_ids" ) group_category_id = fields.Many2one( related="group_id.category_id", default=lambda cls: cls.env.ref("base_user_role.ir_module_category_role").id, string="Associated category", help="Associated group's category", )
@api.depends("line_ids.user_id") def _compute_user_ids(self): for role in self: role.user_ids = role.line_ids.mapped("user_id")
@api.model def create(self, vals): new_record = super(ResUsersRole, self).create(vals) new_record.update_users() return new_record
def write(self, vals): res = super(ResUsersRole, self).write(vals) self.update_users() return res
def unlink(self): users = self.mapped("user_ids") res = super(ResUsersRole, self).unlink() users.set_groups_from_roles(force=True) return res
def update_users(self): """Update all the users concerned by the roles identified by `ids`.""" users = self.mapped("user_ids") users.set_groups_from_roles() return True
@api.model def cron_update_users(self): logging.info("Update user roles") self.search([]).update_users()
class ResUsersRoleLine(models.Model): _name = "res.users.role.line" _description = "Users associated to a role"
role_id = fields.Many2one( comodel_name="res.users.role", required=True, string="Role", ondelete="cascade" ) user_id = fields.Many2one( comodel_name="res.users", required=True, string="User", domain=[("id", "!=", SUPERUSER_ID)], ondelete="cascade", ) date_from = fields.Date("From") date_to = fields.Date("To") is_enabled = fields.Boolean("Enabled", compute="_compute_is_enabled") company_id = fields.Many2one( "res.company", "Company", default=lambda self: self.env.user.company_id )
@api.constrains("user_id", "company_id") def _check_company(self): for record in self: if ( record.company_id and record.company_id != record.user_id.company_id and record.company_id not in record.user_id.company_ids ): raise ValidationError( _('User "{}" does not have access to the company "{}"').format( record.user_id.name, record.company_id.name ) )
@api.depends("date_from", "date_to") def _compute_is_enabled(self): today = datetime.date.today() for role_line in self: role_line.is_enabled = True if role_line.date_from: date_from = role_line.date_from if date_from > today: role_line.is_enabled = False if role_line.date_to: date_to = role_line.date_to if today > date_to: role_line.is_enabled = False
def unlink(self): users = self.mapped("user_id") res = super(ResUsersRoleLine, self).unlink() users.set_groups_from_roles(force=True) return res
|