Initial commit: OCA Technical packages (595 packages)

This commit is contained in:
Ernad Husremovic 2025-08-29 15:43:03 +02:00
commit 2cc02aac6e
24950 changed files with 2318079 additions and 0 deletions

View file

@ -0,0 +1,3 @@
from . import auth_directory
from . import auth_partner
from . import res_partner

View file

@ -0,0 +1,209 @@
# Copyright 2024 Akretion (http://www.akretion.com).
# @author Sébastien BEAU <sebastien.beau@akretion.com>
# @author Florian Mounier <florian.mounier@akretion.com>
# License AGPL-3.0 or later (http://www.gnu.org/licenses/agpl).
from datetime import datetime, timezone
from secrets import token_urlsafe
import jwt
from odoo import _, fields, models
from odoo.exceptions import UserError
from odoo.addons.queue_job.delay import chain
class AuthDirectory(models.Model):
_name = "auth.directory"
_description = "Auth Directory"
_inherit = "server.env.mixin"
name = fields.Char(required=True)
auth_partner_ids = fields.One2many("auth.partner", "directory_id", "Auth Partners")
set_password_token_duration = fields.Integer(
default=1440, help="In minute, default 1440 minutes => 24h", required=True
)
impersonating_token_duration = fields.Integer(
default=60, help="In seconds, default 60 seconds", required=True
)
reset_password_template_id = fields.Many2one(
"mail.template",
"Mail Template Forget Password",
required=True,
default=lambda self: self.env.ref(
"auth_partner.email_reset_password",
raise_if_not_found=False,
),
)
set_password_template_id = fields.Many2one(
"mail.template",
"Mail Template New Password",
required=True,
default=lambda self: self.env.ref(
"auth_partner.email_set_password",
raise_if_not_found=False,
),
)
validate_email_template_id = fields.Many2one(
"mail.template",
"Mail Template Validate Email",
required=True,
default=lambda self: self.env.ref(
"auth_partner.email_validate_email",
raise_if_not_found=False,
),
)
secret_key = fields.Char(
groups="base.group_system",
required=True,
default=lambda self: self._generate_default_secret_key(),
)
count_partner = fields.Integer(compute="_compute_count_partner")
impersonating_user_ids = fields.Many2many(
"res.users",
"auth_directory_impersonating_user_rel",
"directory_id",
"user_id",
string="Impersonating Users",
help="These odoo users can impersonate any partner of this directory",
default=lambda self: (
self.env.ref("base.user_root") | self.env.ref("base.user_admin")
).ids,
groups="auth_partner.group_auth_partner_manager",
)
force_verified_email = fields.Boolean(
help="If checked, email must be verified to be able to log in"
)
def _generate_default_secret_key(self):
# generate random ~64 chars secret key
return token_urlsafe(64)
def action_regenerate_secret_key(self):
self.ensure_one()
self.secret_key = self._generate_default_secret_key()
def _compute_count_partner(self):
data = self.env["auth.partner"].read_group(
[
("directory_id", "in", self.ids),
],
["directory_id"],
groupby=["directory_id"],
lazy=False,
)
res = {item["directory_id"][0]: item["__count"] for item in data}
for record in self:
record.count_partner = res.get(record.id, 0)
def _get_template(self, type_or_template):
if isinstance(type_or_template, str):
return getattr(self, type_or_template + "_template_id", None)
return type_or_template
def _prepare_mail_context(self, context):
return context or {}
def _send_mail_background(
self, type_or_template, auth_partner, callback_job=None, **context
):
"""
Send an email asynchronously to the auth_partner
using the template defined in the directory
"""
self.ensure_one()
auth_partner.ensure_one()
# Load context synchronously
context = self._prepare_mail_context(context)
job = self.delayable()._send_mail_impl(
type_or_template, auth_partner, **context
)
if callback_job:
job = chain(job, callback_job)
return job.delay()
def _send_mail(self, type_or_template, auth_partner, **context):
"""Send an email to the auth_partner using the template defined in the directory"""
self.ensure_one()
auth_partner.ensure_one()
context = self._prepare_mail_context(context)
self._send_mail_impl(type_or_template, auth_partner, **context)
def _send_mail_impl(self, type_or_template, auth_partner, **context):
template = self.sudo()._get_template(type_or_template)
if not template:
raise UserError(
_("No email template defined for %(template)s in %(directory)s")
% {"template": type_or_template, "directory": self.name}
)
template.sudo().with_context(**context).send_mail(
auth_partner.id, force_send=True, raise_exception=True
)
return f"Mail {template.name} sent to {auth_partner.login}"
def _generate_token(self, action, auth_partner, expiration_delta, key_salt=""):
# We need to sudo here as secret_key is a protected field
self = self.sudo()
return jwt.encode(
{
"exp": datetime.now(tz=timezone.utc) + expiration_delta,
"aud": str(self.id),
"action": action,
"ap": auth_partner.id,
},
self.secret_key + key_salt,
algorithm="HS256",
)
def _decode_token(
self,
token,
action,
key_salt=None,
):
# We need to sudo here as secret_key is a protected field
self = self.sudo()
key = self.secret_key
if key_salt:
try:
obj = jwt.decode(
token, algorithms=["HS256"], options={"verify_signature": False}
)
except jwt.PyJWTError as e:
raise UserError(_("Invalid Token")) from e
probable_auth_partner = self.env["auth.partner"].browse(obj["ap"])
if not probable_auth_partner:
raise UserError(_("Invalid Token"))
key += key_salt(probable_auth_partner)
try:
obj = jwt.decode(
token,
key,
audience=str(self.id),
options={"require": ["exp", "aud", "ap", "action"]},
algorithms=["HS256"],
)
except jwt.PyJWTError as e:
raise UserError(_("Invalid Token")) from e
auth_partner = self.env["auth.partner"].browse(obj["ap"])
if (
obj["action"] != action
or not auth_partner
or auth_partner.directory_id != self
):
raise UserError(_("Invalid token"))
return auth_partner
@property
def _server_env_fields(self):
return {"secret_key": {}}

View file

@ -0,0 +1,310 @@
# Copyright 2024 Akretion (http://www.akretion.com).
# @author Sébastien BEAU <sebastien.beau@akretion.com>
# @author Florian Mounier <florian.mounier@akretion.com>
# License AGPL-3.0 or later (http://www.gnu.org/licenses/agpl).
import logging
from datetime import timedelta
import passlib
from odoo import _, api, fields, models
from odoo.exceptions import AccessDenied
# please read passlib great documentation
# https://passlib.readthedocs.io
# https://passlib.readthedocs.io/en/stable/narr/quickstart.html#choosing-a-hash
# be carefull odoo requirements use an old version of passlib
DEFAULT_CRYPT_CONTEXT = passlib.context.CryptContext(["pbkdf2_sha512"])
_logger = logging.getLogger(__name__)
class AuthPartner(models.Model):
_name = "auth.partner"
_description = "Auth Partner"
_rec_name = "login"
partner_id = fields.Many2one(
"res.partner", "Partner", required=True, ondelete="cascade", index=True
)
directory_id = fields.Many2one(
"auth.directory", "Directory", required=True, index=True
)
user_can_impersonate = fields.Boolean(
compute="_compute_user_can_impersonate",
help="Technical field to check if the user can impersonate",
)
impersonating_user_ids = fields.Many2many(
related="directory_id.impersonating_user_ids",
)
login = fields.Char(
compute="_compute_login",
store=True,
required=True,
index=True,
precompute=True,
)
password = fields.Char(compute="_compute_password", inverse="_inverse_password")
encrypted_password = fields.Char(index=True)
nbr_pending_reset_sent = fields.Integer(
index=True,
help=(
"Number of pending reset sent from your customer."
"This field is usefull when after a migration from an other system "
"you ask all you customer to reset their password and you send"
"different mail depending on the number of reminder"
),
)
date_last_request_reset_pwd = fields.Datetime(
help="Date of the last password reset request"
)
date_last_sucessfull_reset_pwd = fields.Datetime(
help="Date of the last sucessfull password reset"
)
date_last_impersonation = fields.Datetime(
help="Date of the last sucessfull impersonation"
)
mail_verified = fields.Boolean(
help="This field is set to True when the user has clicked on the link sent by email"
)
_sql_constraints = [
(
"directory_login_uniq",
"unique (directory_id, login)",
"Login must be uniq per directory !",
),
]
@api.depends("partner_id.email")
def _compute_login(self):
for record in self:
record.login = record.partner_id.email
def _crypt_context(self):
return DEFAULT_CRYPT_CONTEXT
def _check_no_empty(self, login, password):
# double check by security but calling this through a service should
# already have check this
if not (
isinstance(password, str) and password and isinstance(login, str) and login
):
_logger.warning("Invalid login/password for sign in")
raise AccessDenied()
def _get_hashed_password(self, directory, login):
self.flush()
self.env.cr.execute(
"""
SELECT id, COALESCE(encrypted_password, '')
FROM auth_partner
WHERE login=%s AND directory_id=%s""",
(login, directory.id),
)
hashed = self.env.cr.fetchone()
if hashed and hashed[1]:
# ensure that we have a auth.partner and this partner have a password set
return hashed
else:
raise AccessDenied()
def _compute_password(self):
for record in self:
record.password = ""
def _inverse_password(self):
for record in self:
ctx = record._crypt_context()
hash_ = getattr(ctx, "hash", ctx.encrypt)
record.encrypted_password = hash_(record.password)
record.password = ""
def _prepare_partner_auth_signup(self, directory, vals):
return {
"login": vals["login"].lower(),
"password": vals["password"],
"directory_id": directory.id,
}
def _prepare_partner_signup(self, directory, vals):
return {
"name": vals["name"],
"email": vals["login"].lower(),
"auth_partner_ids": [
(0, 0, self._prepare_partner_auth_signup(directory, vals))
],
}
@api.model
def _signup(self, directory, **kwargs):
partner = self.env["res.partner"].create(
[
self._prepare_partner_signup(directory, kwargs),
]
)
auth_partner = partner.auth_partner_ids
directory._send_mail_background(
"validate_email",
auth_partner,
token=auth_partner._generate_validate_email_token(),
)
return auth_partner
@api.model
def _login(self, directory, login, password, **kwargs):
self._check_no_empty(login, password)
login = login.lower()
try:
_id, hashed = self._get_hashed_password(directory, login)
valid, replacement = self._crypt_context().verify_and_update(
password, hashed
)
auth_partner = valid and self.browse(_id)
except AccessDenied:
# We do not want to leak information about the login,
# always raise the same exception
auth_partner = None
if not auth_partner or not auth_partner.partner_id.active:
raise AccessDenied(_("Invalid Login or Password"))
if directory.sudo().force_verified_email and not auth_partner.mail_verified:
raise AccessDenied(
_(
"Email address not validated. Validate your email address by "
"clicking on the link in the email sent to you or request a new "
"password. "
)
)
if replacement is not None:
auth_partner.encrypted_password = replacement
return auth_partner
@api.model
def _validate_email(self, directory, token):
auth_partner = directory._decode_token(token, "validate_email")
auth_partner.write({"mail_verified": True})
return auth_partner
def _get_impersonate_url(self, token, **kwargs):
# You should override this method according to the impersonation url
# your framework is using
base = self.env["ir.config_parameter"].sudo().get_param("web.base.url")
url = f"{base}/auth/impersonate/{token}"
return url
def _get_impersonate_action(self, token, **kwargs):
return {
"type": "ir.actions.act_url",
"url": self._get_impersonate_url(token, **kwargs),
"target": "new",
}
def impersonate(self):
self.ensure_one()
if self.env.user not in self.impersonating_user_ids:
raise AccessDenied(_("You are not allowed to impersonate this user"))
token = self._generate_impersonating_token()
return self._get_impersonate_action(token)
@api.depends_context("uid")
def _compute_user_can_impersonate(self):
for record in self:
record.user_can_impersonate = self.env.user in record.impersonating_user_ids
@api.model
def _impersonating(self, directory, token):
partner_auth = directory._decode_token(
token,
"impersonating",
key_salt=lambda auth_partner: (
auth_partner.date_last_impersonation.isoformat()
if auth_partner.date_last_impersonation
else "never"
),
)
partner_auth.date_last_impersonation = fields.Datetime.now()
return partner_auth
def _on_reset_password_sent(self):
self.ensure_one()
self.date_last_request_reset_pwd = fields.Datetime.now()
self.date_last_sucessfull_reset_pwd = None
self.nbr_pending_reset_sent += 1
def _send_invite(self):
self.ensure_one()
self.directory_id._send_mail_background(
"set_password",
self,
callback_job=self.delayable()._on_reset_password_sent(),
token=self._generate_set_password_token(),
)
def send_invite(self):
for rec in self:
rec._send_invite()
def _request_reset_password(self):
return self.directory_id._send_mail_background(
"reset_password",
self,
callback_job=self.delayable()._on_reset_password_sent(),
token=self._generate_set_password_token(),
)
def _set_password(self, directory, token, password):
auth_partner = directory._decode_token(
token,
"set_password",
# See `_generate_set_password_token` for the key_salt
key_salt=lambda auth_partner: auth_partner.encrypted_password or "empty",
)
auth_partner.write(
{
"password": password,
"mail_verified": True,
}
)
auth_partner.date_last_sucessfull_reset_pwd = fields.Datetime.now()
auth_partner.nbr_pending_reset_sent = 0
return auth_partner
def _generate_set_password_token(self, expiration_delta=None):
# Here we use the current encrypted_password as key_salt to ensure that
# the token will be used to reset the password only once.
return self.directory_id._generate_token(
"set_password",
self,
expiration_delta
or timedelta(minutes=self.directory_id.set_password_token_duration),
key_salt=self.encrypted_password or "empty",
)
def _generate_validate_email_token(self):
return self.directory_id._generate_token(
# 30 days seem to be a good value, no need for configuration
"validate_email",
self,
timedelta(days=30),
)
def _generate_impersonating_token(self):
return self.directory_id._generate_token(
"impersonating",
self,
timedelta(minutes=self.directory_id.impersonating_token_duration),
key_salt=(
self.date_last_impersonation.isoformat()
if self.date_last_impersonation
else "never"
),
)

View file

@ -0,0 +1,34 @@
# Copyright 2024 Akretion (http://www.akretion.com).
# @author Sébastien BEAU <sebastien.beau@akretion.com>
# @author Florian Mounier <florian.mounier@akretion.com>
# License AGPL-3.0 or later (http://www.gnu.org/licenses/agpl).
from odoo import fields, models
class ResPartner(models.Model):
_inherit = "res.partner"
auth_partner_ids = fields.One2many("auth.partner", "partner_id", "Partner Auth")
auth_partner_count = fields.Integer(
compute="_compute_auth_partner_count", compute_sudo=True
)
def _compute_auth_partner_count(self):
data = self.env["auth.partner"].read_group(
[
("partner_id", "in", self.ids),
],
["partner_id"],
groupby=["partner_id"],
lazy=False,
)
res = {item["partner_id"][0]: item["__count"] for item in data}
for record in self:
record.auth_partner_count = res.get(record.id, 0)
def _get_auth_partner_for_directory(self, directory):
return self.sudo().auth_partner_ids.filtered(
lambda r: r.directory_id == directory
)