# -*- coding: utf-8 -*- ############################################################################# # # Cybrosys Technologies Pvt. Ltd. # # Copyright (C) 2019-TODAY Cybrosys Technologies(). # Author: Cybrosys Techno Solutions(odoo@cybrosys.com) # # You can modify it under the terms of the GNU AFFERO # GENERAL PUBLIC LICENSE (AGPL v3), Version 3. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU AFFERO GENERAL PUBLIC LICENSE (AGPL v3) for more details. # # You should have received a copy of the GNU AFFERO GENERAL PUBLIC LICENSE # (AGPL v3) along with this program. # If not, see . # ############################################################################# from datetime import datetime, date, timedelta from odoo import models, fields, api, _ from odoo.exceptions import AccessError from collections import defaultdict class HrEmployeeDocument(models.Model): _name = 'hr.employee.document' _description = 'HR Employee Documents' def mail_reminder(self): now = datetime.now() + timedelta(days=1) date_now = now.date() match = self.search([]) for i in match: if i.expiry_date: exp_date = i.expiry_date - timedelta(days=7) if date_now >= exp_date: mail_content = " Hello " + i.employee_ref.name + ",
Your Document " + i.name + "is going to expire on " + \ str(i.expiry_date) + ". Please renew it before expiry date" main_content = { 'subject': _('Document-%s Expired On %s') % ( i.name, i.expiry_date), 'author_id': self.env.user.partner_id.id, 'body_html': mail_content, 'email_to': i.employee_ref.work_email, } self.env['mail.mail'].create(main_content).send() @api.onchange('expiry_date') def check_expr_date(self): for each in self: exp_date = each.expiry_date if exp_date and exp_date < date.today(): return { 'warning': { 'title': _('Document Expired.'), 'message': _("Your Document Is Already Expired.") } } name = fields.Char(string='Document Number', required=True, copy=False) document_name = fields.Many2one('employee.checklist', string='Document', required=True) description = fields.Text(string='Description', copy=False) expiry_date = fields.Date(string='Expiry Date', copy=False) employee_ref = fields.Many2one('hr.employee', copy=False) doc_attachment_id = fields.Many2many('ir.attachment', 'doc_attach_rel', 'doc_id', 'attach_id3', string="Attachment", help='You can attach the copy of your document', copy=False) issue_date = fields.Date(string='Issue Date', default=fields.Date.context_today, copy=False) class HrEmployee(models.Model): _inherit = 'hr.employee' def _document_count(self): for each in self: document_ids = self.env['hr.employee.document'].search( [('employee_ref', '=', each.id)]) each.document_count = len(document_ids) def document_view(self): self.ensure_one() domain = [ ('employee_ref', '=', self.id)] return { 'name': _('Documents'), 'domain': domain, 'res_model': 'hr.employee.document', 'type': 'ir.actions.act_window', 'view_id': False, 'view_mode': 'tree,form', 'view_type': 'form', 'help': _('''

Click to Create for New Documents

'''), 'limit': 80, 'context': "{'default_employee_ref': '%s'}" % self.id } document_count = fields.Integer(compute='_document_count', string='# Documents') class HrEmployeeAttachment(models.Model): _inherit = 'ir.attachment' doc_attach_rel = fields.Many2many('hr.employee.document', 'doc_attachment_id', 'attach_id3', 'doc_id', string="Attachment", invisible=1) @api.model def check(self, mode, values=None): """ Restricts the access to an ir.attachment, according to referred mode """ if self.env.is_superuser(): return True # Always require an internal user (aka, employee) to access to a attachment if not (self.env.is_admin() or self.env.user.has_group( 'base.group_user') or self.env.user.has_group( 'hr.group_hr_manager') or self.env.user.has_group( 'hr.group_hr_user')): raise AccessError( _("Sorry, you are not allowed to access this document.")) # collect the records to check (by model) model_ids = defaultdict(set) # {model_name: set(ids)} if self: # DLE P173: `test_01_portal_attachment` self.env['ir.attachment'].flush( ['res_model', 'res_id', 'create_uid', 'public', 'res_field']) self._cr.execute( 'SELECT res_model, res_id, create_uid, public, res_field FROM ir_attachment WHERE id IN %s', [tuple(self.ids)]) for res_model, res_id, create_uid, public, res_field in self._cr.fetchall(): if public and mode == 'read': continue if not self.env.uid and self.env.is_system(): raise AccessError( _("Sorry, you are not allowed to access this document.")) if not (res_model and res_id): continue model_ids[res_model].add(res_id) if values and values.get('res_model') and values.get('res_id'): model_ids[values['res_model']].add(values['res_id']) # check access rights on the records for res_model, res_ids in model_ids.items(): # ignore attachments that are not attached to a resource anymore # when checking access rights (resource was deleted but attachment # was not) if res_model not in self.env: continue if res_model == 'res.users' and len( res_ids) == 1 and self.env.uid == list(res_ids)[0]: # by default a user cannot write on itself, despite the list of writeable fields # e.g. in the case of a user inserting an image into his image signature # we need to bypass this check which would needlessly throw us away continue records = self.env[res_model].browse(res_ids).exists() # For related models, check if we can write to the model, as unlinking # and creating attachments can be seen as an update to the model access_mode = 'write' if mode in ('create', 'unlink') else mode records.check_access_rights(access_mode) records.check_access_rule(access_mode)