summaryrefslogtreecommitdiff
path: root/addons/mail/controllers/main.py
diff options
context:
space:
mode:
Diffstat (limited to 'addons/mail/controllers/main.py')
-rw-r--r--addons/mail/controllers/main.py296
1 files changed, 296 insertions, 0 deletions
diff --git a/addons/mail/controllers/main.py b/addons/mail/controllers/main.py
new file mode 100644
index 00000000..4ecd87d3
--- /dev/null
+++ b/addons/mail/controllers/main.py
@@ -0,0 +1,296 @@
+# -*- coding: utf-8 -*-
+# Part of Odoo. See LICENSE file for full copyright and licensing details.
+
+import base64
+import logging
+import psycopg2
+import werkzeug.utils
+import werkzeug.wrappers
+
+from werkzeug.urls import url_encode
+
+from odoo import api, http, registry, SUPERUSER_ID, _
+from odoo.exceptions import AccessError
+from odoo.http import request
+from odoo.tools import consteq
+
+_logger = logging.getLogger(__name__)
+
+
+class MailController(http.Controller):
+ _cp_path = '/mail'
+
+ @classmethod
+ def _redirect_to_messaging(cls):
+ url = '/web#%s' % url_encode({'action': 'mail.action_discuss'})
+ return werkzeug.utils.redirect(url)
+
+ @classmethod
+ def _check_token(cls, token):
+ base_link = request.httprequest.path
+ params = dict(request.params)
+ params.pop('token', '')
+ valid_token = request.env['mail.thread']._notify_encode_link(base_link, params)
+ return consteq(valid_token, str(token))
+
+ @classmethod
+ def _check_token_and_record_or_redirect(cls, model, res_id, token):
+ comparison = cls._check_token(token)
+ if not comparison:
+ _logger.warning('Invalid token in route %s', request.httprequest.url)
+ return comparison, None, cls._redirect_to_messaging()
+ try:
+ record = request.env[model].browse(res_id).exists()
+ except Exception:
+ record = None
+ redirect = cls._redirect_to_messaging()
+ else:
+ redirect = cls._redirect_to_record(model, res_id)
+ return comparison, record, redirect
+
+ @classmethod
+ def _redirect_to_record(cls, model, res_id, access_token=None, **kwargs):
+ # access_token and kwargs are used in the portal controller override for the Send by email or Share Link
+ # to give access to the record to a recipient that has normally no access.
+ uid = request.session.uid
+ user = request.env['res.users'].sudo().browse(uid)
+ cids = False
+
+ # no model / res_id, meaning no possible record -> redirect to login
+ if not model or not res_id or model not in request.env:
+ return cls._redirect_to_messaging()
+
+ # find the access action using sudo to have the details about the access link
+ RecordModel = request.env[model]
+ record_sudo = RecordModel.sudo().browse(res_id).exists()
+ if not record_sudo:
+ # record does not seem to exist -> redirect to login
+ return cls._redirect_to_messaging()
+
+ # the record has a window redirection: check access rights
+ if uid is not None:
+ if not RecordModel.with_user(uid).check_access_rights('read', raise_exception=False):
+ return cls._redirect_to_messaging()
+ try:
+ # We need here to extend the "allowed_company_ids" to allow a redirection
+ # to any record that the user can access, regardless of currently visible
+ # records based on the "currently allowed companies".
+ cids = request.httprequest.cookies.get('cids', str(user.company_id.id))
+ cids = [int(cid) for cid in cids.split(',')]
+ try:
+ record_sudo.with_user(uid).with_context(allowed_company_ids=cids).check_access_rule('read')
+ except AccessError:
+ # In case the allowed_company_ids from the cookies (i.e. the last user configuration
+ # on his browser) is not sufficient to avoid an ir.rule access error, try to following
+ # heuristic:
+ # - Guess the supposed necessary company to access the record via the method
+ # _get_mail_redirect_suggested_company
+ # - If no company, then redirect to the messaging
+ # - Merge the suggested company with the companies on the cookie
+ # - Make a new access test if it succeeds, redirect to the record. Otherwise,
+ # redirect to the messaging.
+ suggested_company = record_sudo._get_mail_redirect_suggested_company()
+ if not suggested_company:
+ raise AccessError('')
+ cids = cids + [suggested_company.id]
+ record_sudo.with_user(uid).with_context(allowed_company_ids=cids).check_access_rule('read')
+ except AccessError:
+ return cls._redirect_to_messaging()
+ else:
+ record_action = record_sudo.get_access_action(access_uid=uid)
+ else:
+ record_action = record_sudo.get_access_action()
+ if record_action['type'] == 'ir.actions.act_url' and record_action.get('target_type') != 'public':
+ return cls._redirect_to_messaging()
+
+ record_action.pop('target_type', None)
+ # the record has an URL redirection: use it directly
+ if record_action['type'] == 'ir.actions.act_url':
+ return werkzeug.utils.redirect(record_action['url'])
+ # other choice: act_window (no support of anything else currently)
+ elif not record_action['type'] == 'ir.actions.act_window':
+ return cls._redirect_to_messaging()
+
+ url_params = {
+ 'model': model,
+ 'id': res_id,
+ 'active_id': res_id,
+ 'action': record_action.get('id'),
+ }
+ view_id = record_sudo.get_formview_id()
+ if view_id:
+ url_params['view_id'] = view_id
+
+ if cids:
+ url_params['cids'] = ','.join([str(cid) for cid in cids])
+ url = '/web?#%s' % url_encode(url_params)
+ return werkzeug.utils.redirect(url)
+
+ @http.route('/mail/read_followers', type='json', auth='user')
+ def read_followers(self, res_model, res_id):
+ request.env['mail.followers'].check_access_rights("read")
+ request.env[res_model].check_access_rights("read")
+ request.env[res_model].browse(res_id).check_access_rule("read")
+ follower_recs = request.env['mail.followers'].search([('res_model', '=', res_model), ('res_id', '=', res_id)])
+
+ followers = []
+ follower_id = None
+ for follower in follower_recs:
+ if follower.partner_id == request.env.user.partner_id:
+ follower_id = follower.id
+ followers.append({
+ 'id': follower.id,
+ 'partner_id': follower.partner_id.id,
+ 'channel_id': follower.channel_id.id,
+ 'name': follower.name,
+ 'display_name': follower.display_name,
+ 'email': follower.email,
+ 'is_active': follower.is_active,
+ # When editing the followers, the "pencil" icon that leads to the edition of subtypes
+ # should be always be displayed and not only when "debug" mode is activated.
+ 'is_editable': True
+ })
+ return {
+ 'followers': followers,
+ 'subtypes': self.read_subscription_data(follower_id) if follower_id else None
+ }
+
+ @http.route('/mail/read_subscription_data', type='json', auth='user')
+ def read_subscription_data(self, follower_id):
+ """ Computes:
+ - message_subtype_data: data about document subtypes: which are
+ available, which are followed if any """
+ request.env['mail.followers'].check_access_rights("read")
+ follower = request.env['mail.followers'].sudo().browse(follower_id)
+ follower.ensure_one()
+ request.env[follower.res_model].check_access_rights("read")
+ request.env[follower.res_model].browse(follower.res_id).check_access_rule("read")
+
+ # find current model subtypes, add them to a dictionary
+ subtypes = request.env['mail.message.subtype'].search([
+ '&', ('hidden', '=', False),
+ '|', ('res_model', '=', follower.res_model), ('res_model', '=', False)])
+ followed_subtypes_ids = set(follower.subtype_ids.ids)
+ subtypes_list = [{
+ 'name': subtype.name,
+ 'res_model': subtype.res_model,
+ 'sequence': subtype.sequence,
+ 'default': subtype.default,
+ 'internal': subtype.internal,
+ 'followed': subtype.id in followed_subtypes_ids,
+ 'parent_model': subtype.parent_id.res_model,
+ 'id': subtype.id
+ } for subtype in subtypes]
+ return sorted(subtypes_list,
+ key=lambda it: (it['parent_model'] or '', it['res_model'] or '', it['internal'], it['sequence']))
+
+ @http.route('/mail/view', type='http', auth='public')
+ def mail_action_view(self, model=None, res_id=None, access_token=None, **kwargs):
+ """ Generic access point from notification emails. The heuristic to
+ choose where to redirect the user is the following :
+
+ - find a public URL
+ - if none found
+ - users with a read access are redirected to the document
+ - users without read access are redirected to the Messaging
+ - not logged users are redirected to the login page
+
+ models that have an access_token may apply variations on this.
+ """
+ # ==============================================================================================
+ # This block of code disappeared on saas-11.3 to be reintroduced by TBE.
+ # This is needed because after a migration from an older version to saas-11.3, the link
+ # received by mail with a message_id no longer work.
+ # So this block of code is needed to guarantee the backward compatibility of those links.
+ if kwargs.get('message_id'):
+ try:
+ message = request.env['mail.message'].sudo().browse(int(kwargs['message_id'])).exists()
+ except:
+ message = request.env['mail.message']
+ if message:
+ model, res_id = message.model, message.res_id
+ # ==============================================================================================
+
+ if res_id and isinstance(res_id, str):
+ res_id = int(res_id)
+ return self._redirect_to_record(model, res_id, access_token, **kwargs)
+
+ @http.route('/mail/assign', type='http', auth='user', methods=['GET'])
+ def mail_action_assign(self, model, res_id, token=None):
+ comparison, record, redirect = self._check_token_and_record_or_redirect(model, int(res_id), token)
+ if comparison and record:
+ try:
+ record.write({'user_id': request.uid})
+ except Exception:
+ return self._redirect_to_messaging()
+ return redirect
+
+ @http.route('/mail/<string:res_model>/<int:res_id>/avatar/<int:partner_id>', type='http', auth='public')
+ def avatar(self, res_model, res_id, partner_id):
+ headers = [('Content-Type', 'image/png')]
+ status = 200
+ content = 'R0lGODlhAQABAIABAP///wAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==' # default image is one white pixel
+ if res_model in request.env:
+ try:
+ # if the current user has access to the document, get the partner avatar as sudo()
+ request.env[res_model].browse(res_id).check_access_rule('read')
+ if partner_id in request.env[res_model].browse(res_id).sudo().exists().message_ids.mapped('author_id').ids:
+ status, headers, _content = request.env['ir.http'].sudo().binary_content(
+ model='res.partner', id=partner_id, field='image_128', default_mimetype='image/png')
+ # binary content return an empty string and not a placeholder if obj[field] is False
+ if _content != '':
+ content = _content
+ if status == 304:
+ return werkzeug.wrappers.Response(status=304)
+ except AccessError:
+ pass
+ image_base64 = base64.b64decode(content)
+ headers.append(('Content-Length', len(image_base64)))
+ response = request.make_response(image_base64, headers)
+ response.status = str(status)
+ return response
+
+ @http.route('/mail/needaction', type='json', auth='user')
+ def needaction(self):
+ return request.env['res.partner'].get_needaction_count()
+
+ @http.route('/mail/init_messaging', type='json', auth='user')
+ def mail_init_messaging(self):
+ values = {
+ 'needaction_inbox_counter': request.env['res.partner'].get_needaction_count(),
+ 'starred_counter': request.env['res.partner'].get_starred_count(),
+ 'channel_slots': request.env['mail.channel'].channel_fetch_slot(),
+ 'mail_failures': request.env['mail.message'].message_fetch_failed(),
+ 'commands': request.env['mail.channel'].get_mention_commands(),
+ 'mention_partner_suggestions': request.env['res.partner'].get_static_mention_suggestions(),
+ 'shortcodes': request.env['mail.shortcode'].sudo().search_read([], ['source', 'substitution', 'description']),
+ 'menu_id': request.env['ir.model.data'].xmlid_to_res_id('mail.menu_root_discuss'),
+ 'moderation_counter': request.env.user.moderation_counter,
+ 'moderation_channel_ids': request.env.user.moderation_channel_ids.ids,
+ 'partner_root': request.env.ref('base.partner_root').sudo().mail_partner_format(),
+ 'public_partner': request.env.ref('base.public_partner').sudo().mail_partner_format(),
+ 'public_partners': [partner.mail_partner_format() for partner in request.env.ref('base.group_public').sudo().with_context(active_test=False).users.partner_id],
+ 'current_partner': request.env.user.partner_id.mail_partner_format(),
+ 'current_user_id': request.env.user.id,
+ }
+ return values
+
+ @http.route('/mail/get_partner_info', type='json', auth='user')
+ def message_partner_info_from_emails(self, model, res_ids, emails, link_mail=False):
+ records = request.env[model].browse(res_ids)
+ try:
+ records.check_access_rule('read')
+ records.check_access_rights('read')
+ except:
+ return []
+ return records._message_partner_info_from_emails(emails, link_mail=link_mail)
+
+ @http.route('/mail/get_suggested_recipients', type='json', auth='user')
+ def message_get_suggested_recipients(self, model, res_ids):
+ records = request.env[model].browse(res_ids)
+ try:
+ records.check_access_rule('read')
+ records.check_access_rights('read')
+ except:
+ return {}
+ return records._message_get_suggested_recipients()