[IMP]:make compatible to new signatures

bzr revid: nch@tinyerp.com-20111003054733-7q2au9vhy01ct5ga
This commit is contained in:
Naresh (OpenERP) 2011-10-03 11:17:33 +05:30
parent 2a6792c057
commit 29c44c4292
1 changed files with 56 additions and 104 deletions

View File

@ -43,20 +43,15 @@ class audittrail_rule(osv.osv):
"log_create": fields.boolean("Log Creates",help="Select this if you want to keep track of creation on any record of the object of this rule"),
"log_action": fields.boolean("Log Action",help="Select this if you want to keep track of actions on the object of this rule"),
"log_workflow": fields.boolean("Log Workflow",help="Select this if you want to keep track of workflow on any record of the object of this rule"),
"state": fields.selection((("draft", "Draft"),
("subscribed", "Subscribed")),
"State", required=True),
"state": fields.selection((("draft", "Draft"), ("subscribed", "Subscribed")), "State", required=True),
"action_id": fields.many2one('ir.actions.act_window', "Action ID"),
}
_defaults = {
'state': lambda *a: 'draft',
'log_create': lambda *a: 1,
'log_unlink': lambda *a: 1,
'log_write': lambda *a: 1,
}
_sql_constraints = [
('model_uniq', 'unique (object_id)', """There is a rule defined on this object\n You can not define other on the same!""")
]
@ -123,9 +118,6 @@ class audittrail_rule(osv.osv):
#End Loop
return True
audittrail_rule()
class audittrail_log(osv.osv):
"""
For Audittrail Log
@ -161,9 +153,6 @@ class audittrail_log(osv.osv):
}
_order = "timestamp desc"
audittrail_log()
class audittrail_log_line(osv.osv):
"""
Audittrail Log Line.
@ -181,8 +170,6 @@ class audittrail_log_line(osv.osv):
'field_description': fields.char('Field Description', size=64),
}
audittrail_log_line()
class audittrail_objects_proxy(object_proxy):
""" Uses Object proxy for auditing changes on object of subscribed Rules"""
@ -228,21 +215,20 @@ class audittrail_objects_proxy(object_proxy):
"field_description": field_obj.string
}
line_id = log_line_pool.create(cr, uid, vals)
cr.commit()
return True
def get_value_text(self, cr, db, uid, pool, resource_pool, method, field, value, recursive=True):
def get_value_text(self, cr, uid, pool, resource_pool, method, field, value, recursive=True):
field_obj = (resource_pool._all_columns.get(field)).column
if field_obj._type in ('one2many','many2many'):
if recursive:
self.log_fct(db, uid, field_obj._obj, method, None, value, 'child_relation_log')
self.log_fct(cr, uid, field_obj._obj, method, None, value, 'child_relation_log')
data = pool.get(field_obj._obj).name_get(cr, uid, value)
return map(lambda x:x[1], data)
elif field_obj._type == 'many2one':
return value and value[1] or value
return False
def start_log_process(self, cr, db, user_id, model, method, resource_data, pool, resource_pool):
def start_log_process(self, cr, user_id, model, method, resource_data, pool, resource_pool):
key1 = '%s_value'%(method == 'create' and 'new' or 'old')
key2 = '%s_value_text'%(method == 'create' and 'new' or 'old')
uid = 1
@ -253,7 +239,7 @@ class audittrail_objects_proxy(object_proxy):
lines = []
for field_key, value in fields.iteritems():
if field_key in ('__last_update', 'id'):continue
ret_val = self.get_value_text(cr, db, uid, pool, resource_pool, method, field_key, value, method != 'read')
ret_val = self.get_value_text(cr, uid, pool, resource_pool, method, field_key, value, method != 'read')
line = {
'name': field_key,
key1: value,
@ -263,7 +249,7 @@ class audittrail_objects_proxy(object_proxy):
self.create_log_line(cr, uid, log_id, model, lines)
return True
def log_fct(self, db, uid, model, method, fct_src, *args):
def log_fct(self, cr, uid, model, method, fct_src, *args):
"""
Logging function: This function is performs logging operations according to method
@param db: the current database
@ -276,13 +262,14 @@ class audittrail_objects_proxy(object_proxy):
"""
uid_orig = uid
uid = 1
pool = pooler.get_pool(db)
cr = pooler.get_db(db).cursor()
pool = pooler.get_pool(cr.dbname)
resource_pool = pool.get(model)
model_pool = pool.get('ir.model')
log_pool = pool.get('audittrail.log')
model = self.check_rule_subscription(cr, uid, pool, model, False)
assert model, _("'%s' Model does not exist..." %(model))
model_ids = model_pool.search(cr, 1, [('model', '=', model)])
model_id = model_ids and model_ids[0] or False
assert model_id, _("'%s' Model does not exist..." %(model))
model = model_pool.browse(cr, uid, model_id)
relational_table_log = args and args[-1] == 'child_relation_log' or False
if method == 'create':
resource_data = {}
@ -290,33 +277,28 @@ class audittrail_objects_proxy(object_proxy):
if relational_table_log:
res_id = args[0]
else:
res_id = fct_src(db, uid_orig, model.model, method, *args)
cr.commit()
res_id = fct_src(cr, uid_orig, model.model, method, *args)
fields_to_read = args[0].keys()
if res_id:
resource = resource_pool.read(cr, uid, res_id, fields_to_read)
if not isinstance(resource,list):
resource = [resource]
map(lambda x: resource_data.setdefault(x['id'], x), resource)
self.start_log_process(cr, db, uid_orig, model, method, resource_data, pool, resource_pool)
cr.commit()
cr.close()
self.start_log_process(cr, uid_orig, model, method, resource_data, pool, resource_pool)
return res_id
elif method in('read', 'unlink'):
res_ids = args[0]
old_values = {}
if method == 'read':
res = fct_src(db, uid_orig, model.model, method, *args)
res = fct_src(cr, uid_orig, model.model, method, *args)
map(lambda x: old_values.setdefault(x['id'], x), res)
else:
res = resource_pool.read(cr, uid, res_ids)
map(lambda x:old_values.setdefault(x['id'], x), res)
self.start_log_process(cr, db, uid_orig, model, method, old_values, pool, resource_pool)
self.start_log_process(cr, uid_orig, model, method, old_values, pool, resource_pool)
if not relational_table_log and method == 'unlink':
res = fct_src(db, uid_orig, model.model, method, *args)
cr.commit()
cr.close()
res = fct_src(cr, uid_orig, model.model, method, *args)
return res
else:
res_ids = []
@ -344,10 +326,13 @@ class audittrail_objects_proxy(object_proxy):
if field in ('__last_update', 'id'):continue
field_obj = (resource_pool._all_columns.get(field)).column
if field_obj._type in ('one2many','many2many'):
x2m_rule_ids, x2m_model = self.check_rule_subscription(cr, uid, pool, field_obj._obj)
if x2m_rule_ids:
if self.check_rules(cr, uid, field_obj._obj, method):
x2m_model_ids = model_pool.search(cr, 1, [('model', '=', field_obj._obj)])
x2m_model_id = x2m_model_ids and x2m_model_ids[0] or False
assert x2m_model_id, _("'%s' Model does not exist..." %(field_obj._obj))
x2m_model = model_pool.browse(cr, uid, x2m_model_id)
x2m_old_values.update(inline_process_old_data(resource[field], field_obj._obj, x2m_model))
ret_val = self.get_value_text(cr, db, uid, pool, resource_pool, method, field, resource[field], False)
ret_val = self.get_value_text(cr, uid, pool, resource_pool, method, field, resource[field], False)
_old_value[field] = resource[field]
_old_values_text[field] = ret_val and ret_val or resource[field]
_old_values[resource_id] = {'text':_old_values_text, 'value': _old_value}
@ -355,8 +340,7 @@ class audittrail_objects_proxy(object_proxy):
_old_values[resource_id].update({'model_id':model_id})
return _old_values
old_values.update(inline_process_old_data(res_ids, model.model))
res = fct_src(db, uid_orig, model.model, method, *args)
cr.commit()
res = fct_src(cr, uid_orig, model.model, method, *args)
if res_ids:
def inline_process_new_data(res_ids, model, dict_to_use={}):
resource_pool = pool.get(model.model)
@ -371,10 +355,14 @@ class audittrail_objects_proxy(object_proxy):
if field in ('__last_update', 'id'):continue
field_obj = (resource_pool._all_columns.get(field)).column
if field_obj._type in ('one2many','many2many'):
x2m_rule_ids, x2m_model = self.check_rule_subscription(cr, uid, pool, field_obj._obj)
if x2m_rule_ids:
if self.check_rules(cr, uid, field_obj._obj, method):
x2m_model_ids = model_pool.search(cr, 1, [('model', '=', field_obj._obj)])
x2m_model_id = x2m_model_ids and x2m_model_ids[0] or False
assert x2m_model_id, _("'%s' Model does not exist..." %(field_obj._obj))
x2m_model = model_pool.browse(cr, uid, x2m_model_id)
x2m_old_values.update(inline_process_old_data(resource[field], field_obj._obj, x2m_model))
inline_process_new_data(resource[field], x2m_model, x2m_old_values)
ret_val = self.get_value_text(cr, db, uid, pool, resource_pool, method, field, resource[field], False)
ret_val = self.get_value_text(cr, uid, pool, resource_pool, method, field, resource[field], False)
line = {
'name': field,
'new_value': resource[field],
@ -386,72 +374,36 @@ class audittrail_objects_proxy(object_proxy):
self.create_log_line(cr, uid, log_id, model, lines)
return True
inline_process_new_data(res_ids, model, old_values)
cr.commit()
cr.close()
return res
return True
def check_rule_subscription(self, cr, uid, pool, model, rule_check=True):
'''
Test if the model has been subscribed to the audit rule
if yes then return the rule_ids also return the model browse_record object.
'''
model_ids = pool.get('ir.model').search(cr, uid, [('model', '=', model)])
model_obj = model_ids and model_ids[0] and pool.get('ir.model').browse(cr, uid, model_ids[0]) or False
if rule_check:
rule_ids = pool.get('audittrail.rule').search(cr, uid, [('object_id', '=', model_obj.id), ('state', '=', 'subscribed')])
return rule_ids, model_obj
return model_obj
def audit_log_call(self, db, uid, model, method, action_type, *args, **argv):
"""
Overrides Object Proxy execute method
@param db: the current database
@param uid: the current user's ID for security checks,
@param object: Object who's values are being changed
@param method: get any method and create log
@param action_type: either 'execute' or 'workflow'
@return: Returns result as per method of Object proxy
"""
uid_orig = uid
uid = 1
pool = pooler.get_pool(db)
logged_uids = []
cr = pooler.get_db(db).cursor()
cr.autocommit(True)
if action_type == 'execute':
ignore_methods = ['default_get','read','fields_view_get','fields_get','search',
'search_count','name_search','name_get','get','request_get',
'get_sc', 'unlink', 'write', 'create']
fct_src = super(audittrail_objects_proxy, self).execute
else:
fct_src = super(audittrail_objects_proxy, self).exec_workflow
try:
rule_ids, model_obj = self.check_rule_subscription(cr, uid, pool, model)
if not ('audittrail.rule' in pool.obj_list() and model_obj and rule_ids):
return fct_src(db, uid_orig, model, method, *args, **argv)
for model_rule in pool.get('audittrail.rule').browse(cr, uid, rule_ids):
logged_uids += map(lambda x:x.id, model_rule.user_id)
if not logged_uids or uid in logged_uids:
if action_type == 'execute':
if method in ('read', 'write', 'create', 'unlink'):
if getattr(model_rule, 'log_' + method):
return self.log_fct(db, uid_orig, model, method, fct_src, *args)
elif method not in ignore_methods:
if model_rule.log_action:
return self.log_fct(db, uid_orig, model, method, fct_src, *args)
else:
if model_rule.log_workflow:
return self.log_fct(db, uid_orig, model, method, fct_src, *args)
return fct_src(db, uid_orig, model, method, *args, **argv)
finally:
cr.close()
def check_rules(self, cr, uid, model, method):
pool = pooler.get_pool(cr.dbname)
# Check if auditrails is installed for that db and then if one rule match
if 'audittrail.rule' in pool.models:
model_ids = pool.get('ir.model').search(cr, 1, [('model', '=', model)])
model_id = model_ids and model_ids[0] or False
if model_id:
rule_ids = pool.get('audittrail.rule').search(cr, 1, [('object_id', '=', model_id), ('state', '=', 'subscribed')])
for rule in pool.get('audittrail.rule').read(cr, 1, rule_ids, ['user_id','log_read','log_write','log_create','log_unlink','log_action','log_workflow']):
if len(rule['user_id'])==0 or uid in rule['user_id']:
if rule.get('log_'+method,0):
return True
elif method not in ('default_get','read','fields_view_get','fields_get','search','search_count','name_search','name_get','get','request_get', 'get_sc', 'unlink', 'write', 'create'):
if rule['log_action']:
return True
def execute(self, db, uid, model, method, *args, **argv):
return self.audit_log_call(db, uid, model, method, 'execute', *args, **argv)
def execute_cr(self, cr, uid, model, method, *args, **kw):
fct_src = super(audittrail_objects_proxy, self).execute_cr
if self.check_rules(cr,uid,model,method):
return self.log_fct(cr, uid, model, method, fct_src, *args)
return fct_src(cr, uid, model, method, *args)
def exec_workflow(self, db, uid, model, method, *args, **argv):
return self.audit_log_call(db, uid, model, method, 'workflow', *args, **argv)
def exec_workflow_cr(self, cr, uid, model, method, *args, **argv):
fct_src = super(audittrail_objects_proxy, self).exec_workflow_cr
if self.check_rules(cr,uid,model,'workflow'):
return self.log_fct(cr, uid, model, method, fct_src, *args)
return fct_src(cr, uid, model, method, *args)
audittrail_objects_proxy()