oca-ocb-hr/odoo-bringout-oca-ocb-hr/hr/models/res_users.py
Ernad Husremovic e1d89e11e3 19.0 vanilla
2026-03-09 09:31:00 +01:00

339 lines
16 KiB
Python

# -*- coding: utf-8 -*-
# Part of Odoo. See LICENSE file for full copyright and licensing details.
import ast
from markupsafe import Markup
from odoo import api, models, fields, _, SUPERUSER_ID
from odoo.exceptions import AccessError
from odoo.fields import Domain
from odoo.tools.misc import clean_context
from odoo.addons.mail.tools.discuss import Store
HR_READABLE_FIELDS = [
'active',
'child_ids',
'employee_id',
'employee_ids',
'is_hr_user',
'is_system',
'employee_resource_calendar_id',
'work_contact_id',
'bank_account_ids',
]
HR_WRITABLE_FIELDS = [
'additional_note',
'private_street',
'private_street2',
'private_city',
'private_state_id',
'private_zip',
'private_country_id',
'private_phone',
'private_email',
'barcode',
'category_ids',
'display_name',
'emergency_contact',
'emergency_phone',
'employee_bank_account_ids',
'job_title',
'km_home_work',
'mobile_phone',
'pin',
'visa_expire',
'work_email',
'work_location_id',
'work_phone',
]
class ResUsers(models.Model):
_inherit = 'res.users'
def _employee_ids_domain(self):
# employee_ids is considered a safe field and as such will be fetched as sudo.
# So try to enforce the security rules on the field to make sure we do not load employees outside of active companies
return [('company_id', 'in', self.env.company.ids + self.env.context.get('allowed_company_ids', []))]
# note: a user can only be linked to one employee per company (see sql constraint in `hr.employee`)
employee_ids = fields.One2many('hr.employee', 'user_id', string='Related employee', domain=_employee_ids_domain)
employee_id = fields.Many2one('hr.employee', string="Company employee",
compute='_compute_company_employee', search='_search_company_employee', store=False)
job_title = fields.Char(related='employee_id.job_title')
work_phone = fields.Char(related='employee_id.work_phone', readonly=False, related_sudo=False)
mobile_phone = fields.Char(related='employee_id.mobile_phone', readonly=False, related_sudo=False)
work_email = fields.Char(related='employee_id.work_email', readonly=False, related_sudo=False)
category_ids = fields.Many2many(related='employee_id.category_ids', string="Employee Tags", readonly=False, related_sudo=False)
work_contact_id = fields.Many2one(related='employee_id.work_contact_id', readonly=False, related_sudo=False)
work_location_id = fields.Many2one(related='employee_id.work_location_id', readonly=False, related_sudo=False)
work_location_name = fields.Char(related="employee_id.work_location_name")
work_location_type = fields.Selection(related="employee_id.work_location_type")
private_street = fields.Char(related='employee_id.private_street', string="Private Street", readonly=False, related_sudo=False)
private_street2 = fields.Char(related='employee_id.private_street2', string="Private Street2", readonly=False, related_sudo=False)
private_city = fields.Char(related='employee_id.private_city', string="Private City", readonly=False, related_sudo=False)
private_state_id = fields.Many2one(
related='employee_id.private_state_id', string="Private State", readonly=False, related_sudo=False,
domain="[('country_id', '=?', private_country_id)]")
private_zip = fields.Char(related='employee_id.private_zip', readonly=False, string="Private Zip", related_sudo=False)
private_country_id = fields.Many2one(related='employee_id.private_country_id', string="Private Country", readonly=False, related_sudo=False)
private_phone = fields.Char(related='employee_id.private_phone', readonly=False, related_sudo=False)
private_email = fields.Char(related='employee_id.private_email', string="Private Email", readonly=False)
km_home_work = fields.Integer(related='employee_id.km_home_work', readonly=False, related_sudo=False)
# res.users already have a field bank_account_id and country_id from the res.partner inheritance: don't redefine them
# This field no longer appears to be in use. To avoid breaking anything it must only be removed after the freeze of v19.
employee_bank_account_ids = fields.Many2many('res.partner.bank', related='employee_id.bank_account_ids', string="Employee's Bank Accounts", related_sudo=False, readonly=False)
emergency_contact = fields.Char(related='employee_id.emergency_contact', readonly=False, related_sudo=False)
emergency_phone = fields.Char(related='employee_id.emergency_phone', readonly=False, related_sudo=False)
visa_expire = fields.Date(related='employee_id.visa_expire', readonly=False, related_sudo=False)
additional_note = fields.Text(related='employee_id.additional_note', readonly=False, related_sudo=False)
barcode = fields.Char(related='employee_id.barcode', readonly=False, related_sudo=False)
pin = fields.Char(related='employee_id.pin', readonly=False, related_sudo=False)
employee_count = fields.Integer(compute='_compute_employee_count')
employee_resource_calendar_id = fields.Many2one(related='employee_id.resource_calendar_id', string="Employee's Working Hours", readonly=True)
bank_account_ids = fields.Many2many(related="employee_id.bank_account_ids")
create_employee = fields.Boolean(store=False, default=False, copy=False, string="Technical field, whether to create an employee")
create_employee_id = fields.Many2one('hr.employee', store=False, copy=False, string="Technical field, bind user to this employee on create")
is_system = fields.Boolean(compute="_compute_is_system")
is_hr_user = fields.Boolean(compute='_compute_is_hr_user')
@api.depends_context('uid')
def _compute_is_system(self):
self.is_system = self.env.user._is_system()
def _compute_is_hr_user(self):
is_hr_user = self.env.user.has_group('hr.group_hr_user')
for user in self:
user.is_hr_user = is_hr_user
@api.depends('employee_ids')
def _compute_employee_count(self):
for user in self.with_context(active_test=False):
user.employee_count = len(user.employee_ids)
@property
def SELF_READABLE_FIELDS(self):
return super().SELF_READABLE_FIELDS + HR_READABLE_FIELDS + HR_WRITABLE_FIELDS
@property
def SELF_WRITEABLE_FIELDS(self):
return super().SELF_WRITEABLE_FIELDS + HR_WRITABLE_FIELDS
@api.onchange("private_state_id")
def _onchange_private_state_id(self):
if self.private_state_id:
self.private_country_id = self.private_state_id.country_id
@api.model
def get_views(self, views, options=None):
# Requests the My Preferences form view as last.
# Otherwise the fields of the 'search' view will take precedence
# and will omit the fields that are requested as SUPERUSER
# in `get_view()`.
preferences_view = self.env.ref("hr.res_users_view_form_preferences")
preferences_form = preferences_view and [preferences_view.id, 'form']
if preferences_form and preferences_form in views:
views.remove(preferences_form)
views.append(preferences_form)
result = super().get_views(views, options)
return result
@api.model
def get_view(self, view_id=None, view_type='form', **options):
# When the front-end loads the views it gets the list of available fields
# for the user (according to its access rights). Later, when the front-end wants to
# populate the view with data, it only asks to read those available fields.
# However, in this case, we want the user to be able to read/write its own data,
# even if they are protected by groups.
# We make the front-end aware of those fields by sending all field definitions.
# Note: limit the `sudo` to the only action of "editing own preferences" action in order to
# avoid breaking `groups` mecanism on res.users form view.
preferences_view = self.env.ref("hr.res_users_view_form_preferences")
if preferences_view and view_id == preferences_view.id:
self = self.with_user(SUPERUSER_ID)
result = super().get_view(view_id, view_type, **options)
return result
@api.model_create_multi
def create(self, vals_list):
res = super().create(vals_list)
employee_create_vals = []
for user, vals in zip(res, vals_list):
if not vals.get('create_employee') and not vals.get('create_employee_id'):
continue
if vals.get('create_employee_id'):
self.env['hr.employee'].browse(vals.get('create_employee_id')).user_id = user
else:
employee_create_vals.append(dict(
name=user.name,
company_id=user.env.company.id,
**self.env['hr.employee']._sync_user(user)
))
if employee_create_vals:
self.env['hr.employee'].with_context(clean_context(self.env.context)).create(employee_create_vals)
return res
def _get_employee_fields_to_sync(self):
"""Get values to sync to the related employee when the User is changed.
"""
return ['name', 'email', 'image_1920', 'tz']
def _get_personal_info_partner_ids_to_notify(self, employee):
if employee.version_id.hr_responsible_id:
return (
_("You are receiving this message because you are the HR Responsible of this employee."),
employee.version_id.hr_responsible_id.partner_id.ids,
)
return ('', [])
def write(self, vals):
"""
Synchronize user and its related employee
and check access rights if employees are not allowed to update
their own data (otherwise sudo is applied for self data).
"""
hr_fields = {
field_name: field
for field_name, field in self._fields.items()
if field.related_field and field.related_field.model_name == 'hr.employee' and field_name in vals
}
employee_domain = [
*self.env['hr.employee']._check_company_domain(self.env.company),
('user_id', 'in', self.ids),
]
if hr_fields:
employees = self.env['hr.employee'].sudo().search(employee_domain)
get_field = self.env['ir.model.fields']._get
field_names = Markup().join([
Markup("<li>%s</li>") % get_field("res.users", fname).field_description for fname in hr_fields
])
for employee in employees:
reason_message, partner_ids = self._get_personal_info_partner_ids_to_notify(employee)
if partner_ids:
employee.message_notify(
body=Markup("<p>%s</p><p>%s</p><ul>%s</ul><p><em>%s</em></p>") % (
_('Personal information update.'),
_("The following fields were modified by %s", employee.name),
field_names,
reason_message,
),
partner_ids=partner_ids,
)
result = super().write(vals)
employee_values = {}
for fname in [f for f in self._get_employee_fields_to_sync() if f in vals]:
employee_values[fname] = vals[fname]
if employee_values:
if 'email' in employee_values:
employee_values['work_email'] = employee_values.pop('email')
if 'image_1920' in vals:
without_image = self.env['hr.employee'].sudo().search(employee_domain + [('image_1920', '=', False)])
with_image = self.env['hr.employee'].sudo().search(employee_domain + [('image_1920', '!=', False)])
without_image.write(employee_values)
with_image.write(employee_values)
else:
employees = self.env['hr.employee'].sudo().search(employee_domain)
if employees:
employees.write(employee_values)
return result
@api.model
def action_get(self):
if self.env.user.employee_id:
action = self.env['ir.actions.act_window']._for_xml_id('hr.res_users_action_my')
groups = {
group_xml_id[0]: True
for group_xml_id in self.env.user.all_group_ids._get_external_ids().values()
if group_xml_id
}
action_context = ast.literal_eval(action['context']) if action['context'] else {}
action_context.update(groups)
action['context'] = str(action_context)
return action
return super().action_get()
@api.depends('employee_ids')
@api.depends_context('company')
def _compute_company_employee(self):
employee_per_user = {
employee.user_id: employee
for employee in self.env['hr.employee'].search([('user_id', 'in', self.ids), ('company_id', '=', self.env.company.id)])
}
for user in self:
user.employee_id = employee_per_user.get(user)
def _search_company_employee(self, operator, value):
# Equivalent to `[('employee_ids', operator, value)]`,
# but we inline the ids directly to simplify final queries and improve performance,
# as it's part of a few ir.rules.
# If we're going to inject too many `ids`, we fall back on the default behavior
# to avoid a performance regression.
IN_MAX = 10_000
domain = Domain('employee_ids', operator, value)
user_ids = self.env['res.users'].with_context(active_test=False)._search(domain, limit=IN_MAX).get_result_ids()
if len(user_ids) < IN_MAX:
return Domain('id', 'in', user_ids)
return domain
def action_create_employee(self):
self.ensure_one()
if self.env.company not in self.company_ids:
raise AccessError(_("You are not allowed to create an employee because the user does not have access rights for %s", self.env.company.name))
self.env['hr.employee'].create(dict(
name=self.name,
company_id=self.env.company.id,
**self.env['hr.employee']._sync_user(self)
))
def action_open_employees(self):
self.ensure_one()
employees = self.employee_ids
model = 'hr.employee' if self.env.user.has_group('hr.group_hr_user') else 'hr.employee.public'
if len(employees) > 1:
return {
'name': _('Related Employees'),
'type': 'ir.actions.act_window',
'res_model': model,
'view_mode': 'kanban,list,form',
'domain': [('id', 'in', employees.ids)],
}
return {
'name': _('Employee'),
'type': 'ir.actions.act_window',
'res_model': model,
'res_id': employees.id,
'view_mode': 'form',
}
def action_related_contact(self):
return {
'name': _("Related Contact"),
'res_id': self.partner_id.id,
'type': 'ir.actions.act_window',
'res_model': 'res.partner',
'view_mode': 'form',
}
def get_formview_action(self, access_uid=None):
""" Override this method in order to redirect many2one towards the full user form view
incase the user is ERP manager and the request coming from employee form."""
res = super().get_formview_action(access_uid=access_uid)
user = self.env.user
if access_uid:
user = self.env['res.users'].browse(access_uid).sudo()
if self.env.context.get('default_create_employee_id') and user.has_group('base.group_erp_manager'):
res['views'] = [(self.env.ref('base.view_users_form').id, 'form')]
return res