mirror of https://github.com/muk-it/muk_base
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
136 lines
5.2 KiB
136 lines
5.2 KiB
###################################################################################
|
|
#
|
|
# Copyright (C) 2017 MuK IT GmbH
|
|
#
|
|
# This program is free software: you can redistribute it and/or modify
|
|
# it under the terms of the GNU Affero General Public License as
|
|
# published by the Free Software Foundation, either version 3 of the
|
|
# License, or (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU Affero General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU Affero General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
#
|
|
###################################################################################
|
|
|
|
import logging
|
|
|
|
from odoo import _
|
|
from odoo import models, api, fields
|
|
from odoo.exceptions import AccessError
|
|
|
|
_logger = logging.getLogger(__name__)
|
|
|
|
class BaseModelAccess(models.AbstractModel):
|
|
|
|
_name = 'muk_security.access'
|
|
_description = "MuK Access Model"
|
|
_inherit = 'muk_utils.model'
|
|
|
|
#----------------------------------------------------------
|
|
# Database
|
|
#----------------------------------------------------------
|
|
|
|
permission_read = fields.Boolean(
|
|
compute='_compute_permissions',
|
|
search='_search_permission_read',
|
|
string="Read Access")
|
|
|
|
permission_create = fields.Boolean(
|
|
compute='_compute_permissions',
|
|
search='_search_permission_create',
|
|
string="Create Access")
|
|
|
|
permission_write = fields.Boolean(
|
|
compute='_compute_permissions',
|
|
search='_search_permission_write',
|
|
string="Write Access")
|
|
|
|
permission_unlink = fields.Boolean(
|
|
compute='_compute_permissions',
|
|
search='_search_permission_unlink',
|
|
string="Delete Access")
|
|
|
|
#----------------------------------------------------------
|
|
# Function
|
|
#----------------------------------------------------------
|
|
|
|
@api.model
|
|
def check_access_rights(self, operation, raise_exception=True):
|
|
return super(BaseModelAccess, self).check_access_rights(operation, raise_exception)
|
|
|
|
@api.multi
|
|
def check_access_rule(self, operation):
|
|
return super(BaseModelAccess, self).check_access_rule(operation)
|
|
|
|
@api.model
|
|
def _apply_ir_rules(self, query, mode='read'):
|
|
return super(BaseModelAccess, self)._apply_ir_rules(query, mode)
|
|
|
|
@api.model
|
|
def check_field_access_rights(self, operation, fields):
|
|
return super(BaseModelAccess, self).check_field_access_rights(operation, fields)
|
|
|
|
@api.multi
|
|
def check_access(self, operation, raise_exception=False):
|
|
try:
|
|
access_right = self.check_access_rights(operation, raise_exception)
|
|
access_rule = self.check_access_rule(operation) == None
|
|
access = access_right and access_rule
|
|
if not access and raise_exception:
|
|
raise AccessError(_("This operation is forbidden!"))
|
|
return access
|
|
except AccessError:
|
|
if raise_exception:
|
|
raise AccessError(_("This operation is forbidden!"))
|
|
return False
|
|
|
|
#----------------------------------------------------------
|
|
# Search
|
|
#----------------------------------------------------------
|
|
|
|
@api.model
|
|
def _search_permission_read(self, operator, operand):
|
|
records = self.search([]).filtered(lambda r: r.check_access('read') == True)
|
|
if operator == '=' and operand:
|
|
return [('id', 'in', records.mapped('id'))]
|
|
return [('id', 'not in', records.mapped('id'))]
|
|
|
|
@api.model
|
|
def _search_permission_create(self, operator, operand):
|
|
records = self.search([]).filtered(lambda r: r.check_access('create') == True)
|
|
if operator == '=' and operand:
|
|
return [('id', 'in', records.mapped('id'))]
|
|
return [('id', 'not in', records.mapped('id'))]
|
|
|
|
@api.model
|
|
def _search_permission_write(self, operator, operand):
|
|
records = self.search([]).filtered(lambda r: r.check_access('write') == True)
|
|
if operator == '=' and operand:
|
|
return [('id', 'in', records.mapped('id'))]
|
|
return [('id', 'not in', records.mapped('id'))]
|
|
|
|
@api.model
|
|
def _search_permission_unlink(self, operator, operand):
|
|
records = self.search([]).filtered(lambda r: r.check_access('unlink') == True)
|
|
if operator == '=' and operand:
|
|
return [('id', 'in', records.mapped('id'))]
|
|
return [('id', 'not in', records.mapped('id'))]
|
|
|
|
#----------------------------------------------------------
|
|
# Read, View
|
|
#----------------------------------------------------------
|
|
|
|
@api.multi
|
|
def _compute_permissions(self):
|
|
for record in self:
|
|
record.update({
|
|
'permission_read': record.check_access('read'),
|
|
'permission_create': record.check_access('create'),
|
|
'permission_write': record.check_access('write'),
|
|
'permission_unlink': record.check_access('unlink'),
|
|
})
|