|
|
################################################################################### # # Copyright (C) 2017 MuK IT GmbH # # This program is free software: you can redistribute it and/or modify # it under the terms of the GNU Affero General Public License as # published by the Free Software Foundation, either version 3 of the # License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU Affero General Public License for more details. # # You should have received a copy of the GNU Affero General Public License # along with this program. If not, see <http://www.gnu.org/licenses/>. # ###################################################################################
import logging
from odoo import _, SUPERUSER_ID from odoo import models, api, fields from odoo.exceptions import AccessError
from odoo.addons.muk_security.tools import helper
_logger = logging.getLogger(__name__)
class BaseModelAccessGroups(models.AbstractModel): _name = 'muk_security.access_groups' _description = "MuK Access Groups Model" _inherit = 'muk_security.access' # Set it to True to enforced security even if no group has been set _strict_security = False # If set the group fields are restricted by the access group _field_groups = None # If set the suspend fields are restricted by the access group _suspend_groups = None #---------------------------------------------------------- # Datebase #----------------------------------------------------------
@api.model def _add_magic_fields(self): super(BaseModelAccessGroups, self)._add_magic_fields() def add(name, field): if name not in self._fields: self._add_field(name, field) base, model = self._name.split(".") add('suspend_security_read', fields.Boolean( _module=base, string="Suspend Security for Read", automatic=True, default=False, groups=self._suspend_groups)) add('suspend_security_create', fields.Boolean( _module=base, string="Suspend Security for Create", automatic=True, default=False, groups=self._suspend_groups)) add('suspend_security_write', fields.Boolean( _module=base, string="Suspend Security for Write", automatic=True, default=False, groups=self._suspend_groups)) add('suspend_security_unlink', fields.Boolean( _module=base, string="Suspend Security for Unlink", automatic=True, default=False, groups=self._suspend_groups)) add('groups', fields.Many2many( _module=base, comodel_name='muk_security.groups', relation='muk_groups_%s_rel' % model, column1='aid', column2='gid', string="Groups", automatic=True, groups=self._field_groups)) add('complete_groups', fields.Many2many( _module=base, comodel_name='muk_security.groups', relation='muk_groups_complete_%s_rel' % model, column1='aid', column2='gid', string="Complete Groups", compute='_compute_groups', store=True, automatic=True, groups=self._field_groups)) #---------------------------------------------------------- # Function #---------------------------------------------------------- @api.multi def trigger_computation(self, fields, *largs, **kwargs): super(BaseModelAccessGroups, self).trigger_computation(fields, *largs, **kwargs) if "complete_groups" in fields: self.suspend_security()._compute_groups() @api.model def check_group_values(self, values): if any(field in values for field in ['groups']): return True return False @api.multi @api.returns('muk_security.groups') def get_groups(self): self.ensure_one() groups = self.env['muk_security.groups'] groups |= self.groups return groups @api.model def _get_no_access_ids(self): base, model = self._name.split(".") if not self._strict_security: sql = '''
SELECT id FROM %s a WHERE NOT EXISTS ( SELECT * FROM muk_groups_complete_%s_rel r WHERE r.aid = a.id ); ''' % (self._table, model)
self.env.cr.execute(sql) fetch = self.env.cr.fetchall() return len(fetch) > 0 and list(map(lambda x: x[0], fetch)) or [] else: return [] @api.model def _get_suspended_access_ids(self, operation): base, model = self._name.split(".") sql = '''
SELECT id FROM %s a WHERE a.suspend_security_%s = true ''' % (self._table, operation)
self.env.cr.execute(sql) fetch = self.env.cr.fetchall() return len(fetch) > 0 and list(map(lambda x: x[0], fetch)) or [] @api.model def _get_access_ids(self): base, model = self._name.split(".") sql = '''
SELECT r.aid FROM muk_groups_complete_%s_rel r JOIN muk_security_groups g ON r.gid = g.id JOIN muk_security_groups_users_rel u ON r.gid = u.gid WHERE u.uid = %s AND g.perm_read = true ''' % (model, self.env.user.id)
self.env.cr.execute(sql) fetch = self.env.cr.fetchall() access_ids = len(fetch) > 0 and list(map(lambda x: x[0], fetch)) or [] return access_ids @api.model def _get_ids_without_security(self, operation): no_access_ids = self._get_no_access_ids() suspended_access_ids = self._get_suspended_access_ids(operation) return list(set(no_access_ids).union(suspended_access_ids)) @api.model def _get_complete_access_ids(self, operation): access_ids = self._get_access_ids() no_access_ids = self._get_no_access_ids() suspended_access_ids = self._get_suspended_access_ids(operation) return list(set(access_ids).union(no_access_ids, suspended_access_ids)) @api.multi def _eval_access_skip(self, operation): if isinstance(self.env.uid, helper.NoSecurityUid): return True return False @api.multi def check_access_groups(self, operation): if self.env.user.id == SUPERUSER_ID or self._eval_access_skip(operation): return None base, model = self._name.split(".") filter_ids = self._get_ids_without_security(operation) for record in self.filtered(lambda rec: rec.id not in filter_ids): sql = '''
SELECT perm_%s FROM muk_groups_complete_%s_rel r JOIN muk_security_groups g ON g.id = r.gid JOIN muk_security_groups_users_rel u ON u.gid = g.id WHERE r.aid = %s AND u.uid = %s ''' % (operation, model, record.id, self.env.user.id)
self.env.cr.execute(sql) fetch = self.env.cr.fetchall() if not any(list(map(lambda x: x[0], fetch))): raise AccessError(_("This operation is forbidden!")) @api.multi def check_access(self, operation, raise_exception=False): res = super(BaseModelAccessGroups, self).check_access(operation, raise_exception) try: access_groups = self.check_access_groups(operation) == None access = res and access_groups if not access and raise_exception: raise AccessError(_("This operation is forbidden!")) return access except AccessError: if raise_exception: raise AccessError(_("This operation is forbidden!")) return False #---------------------------------------------------------- # Read #---------------------------------------------------------- @api.multi def _after_read(self, result, *largs, **kwargs): result = super(BaseModelAccessGroups, self)._after_read(result) if self.env.user.id == SUPERUSER_ID or self._eval_access_skip("read"): return result access_ids = self._get_complete_access_ids("read") result = [result] if not isinstance(result, list) else result if len(access_ids) > 0: access_result = [] for record in result: if record['id'] in access_ids: access_result.append(record) return access_result return [] @api.model def _after_search(self, result, *largs, **kwargs): result = super(BaseModelAccessGroups, self)._after_search(result) if self.env.user.id == SUPERUSER_ID or self._eval_access_skip("read"): return result access_ids = self._get_complete_access_ids("read") if len(access_ids) > 0: access_result = self.env[self._name] if isinstance(result, int): if result in access_ids: return result else: for record in result: if record.id in access_ids: access_result += record return access_result return self.env[self._name] @api.model def _after_name_search(self, result, *largs, **kwargs): result = super(BaseModelAccessGroups, self)._after_name_search(result) if self.env.user.id == SUPERUSER_ID or self._eval_access_skip("read"): return result access_ids = self._get_complete_access_ids("read") if len(access_ids) > 0: access_result = [] for tuple in result: if tuple[0] in access_ids: access_result.append(tuple) return access_result return [] #---------------------------------------------------------- # Read, View #---------------------------------------------------------- @api.multi def _compute_groups(self, write=True): if write: for record in self: record.complete_groups = record.get_groups() else: self.ensure_one() return {'complete_groups': [(6, 0, self.get_groups().mapped('id'))]} #---------------------------------------------------------- # Create, Update, Delete #---------------------------------------------------------- @api.multi def _before_write(self, vals, *largs, **kwargs): self.check_access_groups('write') return super(BaseModelAccessGroups, self)._before_write(vals, *largs, **kwargs)
@api.multi def _before_unlink(self, *largs, **kwargs): self.check_access_groups('unlink') return super(BaseModelAccessGroups, self)._before_unlink(*largs, **kwargs) @api.multi def _check_recomputation(self, vals, olds, *largs, **kwargs): super(BaseModelAccessGroups, self)._check_recomputation(vals, olds, *largs, **kwargs) fields = [] if self.check_group_values(vals): fields.extend(['complete_groups']) if fields: self.trigger_computation(fields)
|