oca-ocb-pos/odoo-bringout-oca-ocb-pos_hr/pos_hr/models/hr_employee.py
Ernad Husremovic 3ca647e428 19.0 vanilla
2026-03-09 09:29:53 +01:00

80 lines
3.7 KiB
Python

# -*- coding: utf-8 -*-
# Part of Odoo. See LICENSE file for full copyright and licensing details.
import hashlib
from odoo import api, models, _
from odoo.exceptions import UserError
class HrEmployee(models.Model):
_name = 'hr.employee'
_inherit = ['hr.employee', 'pos.load.mixin']
@api.model
def _load_pos_data_domain(self, data, config):
return config._employee_domain(config.current_user_id.id)
@api.model
def _load_pos_data_fields(self, config):
return ['name', 'user_id', 'work_contact_id']
def _server_date_to_domain(self, domain):
return domain
@api.model
def _load_pos_data_read(self, records, config):
# NOTE:
# hr.employee have a public fallback mechanism
# where users without read access may still receive records from
# the corresponding public model (hr.employee.public) so thats why we are bypassing
# the access right.
fields = self._load_pos_data_fields(config)
read_records = records.read(fields, load=False)
manager_ids = records.filtered(lambda emp: config.group_pos_manager_id.id in emp.user_id.all_group_ids.ids).ids
employees_barcode_pin = records.get_barcodes_and_pin_hashed()
bp_per_employee_id = {bp_e['id']: bp_e for bp_e in employees_barcode_pin}
for employee in read_records:
if employee['id'] in manager_ids:
role = 'manager'
employee['_user_role'] = 'admin'
elif employee['id'] in config.advanced_employee_ids.ids:
role = 'manager'
elif employee['id'] in config.minimal_employee_ids.ids:
role = 'minimal'
else:
role = 'cashier'
employee['_role'] = role
employee['_barcode'] = bp_per_employee_id[employee['id']]['barcode']
employee['_pin'] = bp_per_employee_id[employee['id']]['pin']
return read_records
def get_barcodes_and_pin_hashed(self):
if not self.env.user.has_group('point_of_sale.group_pos_user'):
return []
# Apply visibility filters (record rules)
visible_emp_ids = self.search([('id', 'in', self.ids)])
employees_data = self.sudo().search_read([('id', 'in', visible_emp_ids.ids)], ['barcode', 'pin'])
for e in employees_data:
e['barcode'] = hashlib.sha1(e['barcode'].encode('utf8')).hexdigest() if e['barcode'] else False
e['pin'] = hashlib.sha1(e['pin'].encode('utf8')).hexdigest() if e['pin'] else False
return employees_data
@api.ondelete(at_uninstall=False)
def _unlink_except_active_pos_session(self):
configs_with_employees = self.env['pos.config'].sudo().search([('module_pos_hr', '=', True)]).filtered(lambda c: c.current_session_id)
configs_with_all_employees = configs_with_employees.filtered(lambda c: not c.basic_employee_ids and not c.advanced_employee_ids and not c.minimal_employee_ids)
configs_with_specific_employees = configs_with_employees.filtered(lambda c: (c.basic_employee_ids or c.advanced_employee_ids or c.minimal_employee_ids) & self)
if configs_with_all_employees or configs_with_specific_employees:
error_msg = _("You cannot delete an employee that may be used in an active PoS session, close the session(s) first: \n")
for employee in self:
config_ids = configs_with_all_employees | configs_with_specific_employees.filtered(lambda c: employee in c.basic_employee_ids)
if config_ids:
error_msg += _("Employee: %(employee)s - PoS Config(s): %(config_list)s \n", employee=employee.name, config_list=config_ids.mapped("name"))
raise UserError(error_msg)