odoo_account_ebics/account_ebics/models/ebics_userid.py

600 lines
22 KiB
Python
Raw Permalink Normal View History

2024-01-19 14:13:28 +00:00
# Copyright 2009-2024 Noviat.
2023-05-28 15:01:06 +00:00
# License LGPL-3 or later (http://www.gnu.org/licenses/lgpl).
import base64
import logging
import os
from sys import exc_info
from traceback import format_exception
from urllib.error import URLError
from odoo import _, api, fields, models
from odoo.exceptions import UserError
_logger = logging.getLogger(__name__)
try:
import fintech
2022-05-10 19:40:54 +00:00
from fintech.ebics import (
EbicsBank,
EbicsClient,
EbicsFunctionalError,
EbicsKeyRing,
EbicsTechnicalError,
EbicsUser,
)
fintech.cryptolib = "cryptography"
except ImportError:
2022-05-10 19:40:54 +00:00
_logger.warning("Failed to import fintech")
class EbicsBank(EbicsBank):
def _next_order_id(self, partnerid):
"""
EBICS protocol version H003 requires generation of the OrderID.
The OrderID must be a string between 'A000' and 'ZZZZ' and
unique for each partner id.
"""
2022-05-10 19:40:54 +00:00
return hasattr(self, "_order_number") and self._order_number or "A000"
class EbicsUserID(models.Model):
2022-05-10 19:40:54 +00:00
_name = "ebics.userid"
_description = "EBICS UserID"
_order = "name"
name = fields.Char(
2022-05-10 19:40:54 +00:00
string="EBICS UserID",
required=True,
help="Human users or a technical system that is/are "
2022-05-10 19:40:54 +00:00
"assigned to a customer. "
"\nOn the EBICS bank server it is identified "
"by the combination of UserID and PartnerID. "
"The technical subscriber serves only for the data exchange "
"between customer and financial institution. "
"The human user also can authorise orders.",
)
ebics_config_id = fields.Many2one(
2024-01-19 14:13:28 +00:00
comodel_name="ebics.config",
string="EBICS Configuration",
ondelete="cascade",
required=True,
2022-05-10 19:40:54 +00:00
)
ebics_version = fields.Selection(related="ebics_config_id.ebics_version")
user_ids = fields.Many2many(
2022-05-10 19:40:54 +00:00
comodel_name="res.users",
string="Users",
required=True,
help="Users who are allowed to use this EBICS UserID for "
2022-05-10 19:40:54 +00:00
" bank transactions.",
)
signature_class = fields.Selection(
2022-05-10 19:40:54 +00:00
selection=[("E", "Single signature"), ("T", "Transport signature")],
required=True,
default="T",
help="Default signature class."
2022-05-10 19:40:54 +00:00
"This default can be overriden for specific "
"EBICS transactions (cf. File Formats).",
)
transaction_rights = fields.Selection(
selection=[
("both", "Download and Upload"),
("down", "Download Only"),
("up", "Upload Only"),
],
string="Allowed Transactions",
default="both",
required=True,
help="Use this parameter to limit the transactions for this User "
"to downloads or uploads.",
)
2022-05-10 19:40:54 +00:00
ebics_keys_fn = fields.Char(compute="_compute_ebics_keys_fn")
ebics_keys_found = fields.Boolean(compute="_compute_ebics_keys_found")
ebics_passphrase = fields.Char(string="EBICS Passphrase")
ebics_passphrase_store = fields.Boolean(
string="Store EBICS Passphrase",
default=True,
help="When you uncheck this option the passphrase to unlock "
"your private key will not be stored in the database. "
"We recommend to use this if you want to upload signed "
"payment orders via EBICS.\nYou will be prompted to enter the "
"passphrase for every EBICS transaction, hence do not uncheck this "
"option on a userid for automated EBICS downloads.",
)
ebics_passphrase_required = fields.Boolean(
compute="_compute_ebics_passphrase_view_modifiers"
)
ebics_passphrase_invisible = fields.Boolean(
compute="_compute_ebics_passphrase_view_modifiers"
)
2024-01-19 14:13:28 +00:00
ebics_passphrase_store_readonly = fields.Boolean(
compute="_compute_ebics_passphrase_view_modifiers"
)
ebics_sig_passphrase = fields.Char(
string="EBICS Signature Passphrase",
help="You can set here a different passphrase for the EBICS "
"signing key. This passphrase will never be stored hence "
"you'll need to specify your passphrase for each transaction that "
"requires a digital signature.",
)
ebics_sig_passphrase_invisible = fields.Boolean(
compute="_compute_ebics_sig_passphrase_invisible"
)
ebics_ini_letter = fields.Binary(
2022-05-10 19:40:54 +00:00
string="EBICS INI Letter",
readonly=True,
help="INI-letter PDF document to be sent to your bank.",
)
ebics_ini_letter_fn = fields.Char(string="INI-letter Filename", readonly=True)
ebics_public_bank_keys = fields.Binary(
2022-05-10 19:40:54 +00:00
string="EBICS Public Bank Keys",
readonly=True,
help="EBICS Public Bank Keys to be checked for consistency.",
)
ebics_public_bank_keys_fn = fields.Char(
2022-05-10 19:40:54 +00:00
string="EBICS Public Bank Keys Filename", readonly=True
)
2020-08-07 15:12:02 +00:00
swift_3skey = fields.Boolean(
2022-05-10 19:40:54 +00:00
string="Enable 3SKey support",
2020-08-07 15:12:02 +00:00
help="Transactions for this user will be signed "
2022-05-10 19:40:54 +00:00
"by means of the SWIFT 3SKey token.",
)
swift_3skey_certificate = fields.Binary(string="3SKey Certficate")
2023-08-05 17:33:05 +00:00
swift_3skey_certificate_fn = fields.Char(string="3SKey Certificate Filename")
# X.509 Distinguished Name attributes used to
# create self-signed X.509 certificates
ebics_key_x509 = fields.Boolean(
2022-05-10 19:40:54 +00:00
string="X509 support",
help="Set this flag in order to work with " "self-signed X.509 certificates",
)
ebics_key_x509_dn_cn = fields.Char(
2022-05-10 19:40:54 +00:00
string="Common Name [CN]",
)
ebics_key_x509_dn_o = fields.Char(
2022-05-10 19:40:54 +00:00
string="Organization Name [O]",
)
ebics_key_x509_dn_ou = fields.Char(
2022-05-10 19:40:54 +00:00
string="Organizational Unit Name [OU]",
)
ebics_key_x509_dn_c = fields.Char(
2022-05-10 19:40:54 +00:00
string="Country Name [C]",
)
ebics_key_x509_dn_st = fields.Char(
2022-05-10 19:40:54 +00:00
string="State Or Province Name [ST]",
)
ebics_key_x509_dn_l = fields.Char(
2022-05-10 19:40:54 +00:00
string="Locality Name [L]",
)
ebics_key_x509_dn_e = fields.Char(
2022-05-10 19:40:54 +00:00
string="Email Address",
)
state = fields.Selection(
2022-05-10 19:40:54 +00:00
[
("draft", "Draft"),
("init", "Initialisation"),
("get_bank_keys", "Get Keys from Bank"),
("to_verify", "Verification"),
("active_keys", "Active Keys"),
],
default="draft",
required=True,
readonly=True,
)
2022-10-27 21:48:16 +00:00
active = fields.Boolean(default=True)
company_ids = fields.Many2many(
2022-05-10 19:40:54 +00:00
comodel_name="res.company",
string="Companies",
required=True,
2022-05-10 19:40:54 +00:00
help="Companies sharing this EBICS contract.",
)
2024-01-19 14:13:28 +00:00
@api.depends("name", "ebics_config_id.ebics_keys")
def _compute_ebics_keys_fn(self):
for rec in self:
keys_dir = rec.ebics_config_id.ebics_keys
rec.ebics_keys_fn = (
2022-11-18 09:27:25 +00:00
rec.name
and keys_dir
and (keys_dir + "/" + rec.name.replace(" ", "_") + "_keys")
2022-05-10 19:40:54 +00:00
)
2022-05-10 19:40:54 +00:00
@api.depends("ebics_keys_fn")
def _compute_ebics_keys_found(self):
for rec in self:
2022-05-10 19:40:54 +00:00
rec.ebics_keys_found = rec.ebics_keys_fn and os.path.isfile(
rec.ebics_keys_fn
)
@api.depends("state", "ebics_passphrase", "ebics_keys_found")
def _compute_ebics_passphrase_view_modifiers(self):
for rec in self:
rec.ebics_passphrase_required = False
rec.ebics_passphrase_invisible = True
2024-01-19 14:13:28 +00:00
rec.ebics_passphrase_store_readonly = True
if rec.state == "draft":
rec.ebics_passphrase_required = True
rec.ebics_passphrase_invisible = rec.ebics_keys_found and True or False
2024-01-19 14:13:28 +00:00
rec.ebics_passphrase_store_readonly = False
elif rec.state == "init":
rec.ebics_passphrase_required = False
rec.ebics_passphrase_invisible = True
elif rec.state in ("get_bank_keys", "to_verify"):
rec.ebics_passphrase_required = not rec.ebics_passphrase
rec.ebics_passphrase_invisible = rec.ebics_passphrase
@api.depends("state")
def _compute_ebics_sig_passphrase_invisible(self):
for rec in self:
rec.ebics_sig_passphrase_invisible = True
if fintech.__version_info__ < (7, 3, 1):
continue
if rec.transaction_rights != "down" and rec.state == "draft":
rec.ebics_sig_passphrase_invisible = False
@api.constrains("ebics_key_x509")
def _check_ebics_key_x509(self):
for cfg in self:
if cfg.ebics_version == "H005" and not cfg.ebics_key_x509:
raise UserError(_("X.509 certificates must be used with EBICS 3.0."))
@api.constrains("ebics_passphrase")
def _check_ebics_passphrase(self):
for rec in self:
if rec.ebics_passphrase and len(rec.ebics_passphrase) < 8:
raise UserError(_("The Passphrase must be at least 8 characters long"))
@api.constrains("ebics_sig_passphrase")
def _check_ebics_sig_passphrase(self):
for rec in self:
if rec.ebics_sig_passphrase and len(rec.ebics_sig_passphrase) < 8:
raise UserError(
_("The Signature Passphrase must be at least 8 characters long")
)
@api.onchange("ebics_version")
def _onchange_ebics_version(self):
if self.ebics_version == "H005":
self.ebics_key_x509 = True
2022-05-10 19:40:54 +00:00
@api.onchange("signature_class")
2020-08-07 15:12:02 +00:00
def _onchange_signature_class(self):
2022-05-10 19:40:54 +00:00
if self.signature_class == "T":
2020-08-07 15:12:02 +00:00
self.swift_3skey = False
2024-01-21 21:36:00 +00:00
@api.onchange("ebics_passphrase_store", "ebics_passphrase")
def _onchange_ebics_passphrase_store(self):
2024-01-19 14:13:28 +00:00
if self.ebics_passphrase_store:
2024-01-21 21:36:00 +00:00
if self.ebics_passphrase:
# check passphrase before db store
keyring_params = {
"keys": self.ebics_keys_fn,
"passphrase": self.ebics_passphrase,
}
keyring = EbicsKeyRing(**keyring_params)
try:
# fintech <= 7.4.3 does not have a call to check if a
# passphrase matches with the value stored in the keyfile.
# We get around this limitation as follows:
# Get user keys to check for valid passphrases
# It will raise a ValueError on invalid passphrases
keyring["#USER"]
except ValueError as err: # noqa: F841
raise UserError(_("Passphrase mismatch.")) # noqa: B904
else:
if self.state != "draft":
self.ebics_passphrase = False
2022-05-10 19:40:54 +00:00
@api.onchange("swift_3skey")
2020-08-07 15:12:02 +00:00
def _onchange_swift_3skey(self):
if self.swift_3skey:
self.ebics_key_x509 = True
def set_to_draft(self):
2022-05-10 19:40:54 +00:00
return self.write({"state": "draft"})
2020-07-14 21:18:32 +00:00
def set_to_active_keys(self):
2024-01-19 14:13:28 +00:00
vals = {"state": "active_keys"}
self._update_passphrase_vals(vals)
return self.write(vals)
2020-07-14 21:18:32 +00:00
def set_to_get_bank_keys(self):
self.ensure_one()
if self.ebics_config_id.state != "draft":
raise UserError(
_(
"Set the EBICS Configuation record to 'Draft' "
"before starting the Key Renewal process."
)
)
2022-05-10 19:40:54 +00:00
return self.write({"state": "get_bank_keys"})
2022-05-10 19:40:54 +00:00
def ebics_init_1(self): # noqa: C901
"""
Initialization of bank keys - Step 1:
Create new keys and certificates for this user
"""
self.ensure_one()
2022-05-10 19:40:54 +00:00
if self.state != "draft":
raise UserError(
2022-05-10 19:40:54 +00:00
_("Set state to 'draft' before Bank Key (re)initialisation.")
)
if not self.ebics_passphrase:
2022-05-10 19:40:54 +00:00
raise UserError(_("Set a passphrase."))
2020-07-22 19:31:10 +00:00
2020-09-11 09:08:08 +00:00
if self.swift_3skey and not self.swift_3skey_certificate:
2022-05-10 19:40:54 +00:00
raise UserError(_("3SKey certificate missing."))
2020-08-07 15:12:02 +00:00
2020-07-22 19:31:10 +00:00
ebics_version = self.ebics_config_id.ebics_version
try:
keyring_params = {
"keys": self.ebics_keys_fn,
"passphrase": self.ebics_passphrase,
}
if self.ebics_sig_passphrase:
keyring_params["sig_passphrase"] = self.ebics_sig_passphrase
keyring = EbicsKeyRing(**keyring_params)
bank = EbicsBank(
2020-07-14 21:18:32 +00:00
keyring=keyring,
hostid=self.ebics_config_id.ebics_host,
2022-05-10 19:40:54 +00:00
url=self.ebics_config_id.ebics_url,
)
user = EbicsUser(
2020-07-14 21:18:32 +00:00
keyring=keyring,
partnerid=self.ebics_config_id.ebics_partner,
2022-05-10 19:40:54 +00:00
userid=self.name,
)
2022-10-27 21:48:16 +00:00
except Exception as err:
exctype, value = exc_info()[:2]
error = _("EBICS Initialisation Error:")
2022-05-10 19:40:54 +00:00
error += "\n" + str(exctype) + "\n" + str(value)
2022-10-27 21:48:16 +00:00
raise UserError(error) from err
2020-07-14 21:18:32 +00:00
self.ebics_config_id._check_ebics_keys()
if not os.path.isfile(self.ebics_keys_fn):
try:
2020-08-07 15:12:02 +00:00
# TODO:
# enable import of all type of certicates: A00x, X002, E002
if self.swift_3skey:
kwargs = {
2022-11-18 09:27:25 +00:00
self.ebics_config_id.ebics_key_version: base64.decodebytes(
2022-05-10 19:40:54 +00:00
self.swift_3skey_certificate
),
2020-08-07 15:12:02 +00:00
}
user.import_certificates(**kwargs)
user.create_keys(
2020-07-14 21:18:32 +00:00
keyversion=self.ebics_config_id.ebics_key_version,
2022-05-10 19:40:54 +00:00
bitlength=self.ebics_config_id.ebics_key_bitlength,
)
2022-10-27 21:48:16 +00:00
except Exception as err:
exctype, value = exc_info()[:2]
error = _("EBICS Initialisation Error:")
2022-05-10 19:40:54 +00:00
error += "\n" + str(exctype) + "\n" + str(value)
2022-10-27 21:48:16 +00:00
raise UserError(error) from err
2020-08-07 15:12:02 +00:00
if self.swift_3skey and not self.ebics_key_x509:
2022-05-10 19:40:54 +00:00
raise UserError(
_(
"The current version of this module "
"requires to X509 support when enabling 3SKey"
)
)
2020-08-07 15:12:02 +00:00
if self.ebics_key_x509:
dn_attrs = {
2022-05-10 19:40:54 +00:00
"commonName": self.ebics_key_x509_dn_cn,
"organizationName": self.ebics_key_x509_dn_o,
"organizationalUnitName": self.ebics_key_x509_dn_ou,
"countryName": self.ebics_key_x509_dn_c,
"stateOrProvinceName": self.ebics_key_x509_dn_st,
"localityName": self.ebics_key_x509_dn_l,
"emailAddress": self.ebics_key_x509_dn_e,
}
kwargs = {k: v for k, v in dn_attrs.items() if v}
user.create_certificates(**kwargs)
try:
client = EbicsClient(bank, user, version=ebics_version)
except RuntimeError as err:
e = exc_info()
error = _("EBICS Initialization Error:")
error += "\n"
error += err.args[0]
raise UserError(error) from err
# Send the public electronic signature key to the bank.
ebics_config_bank = self.ebics_config_id.journal_ids[0].bank_id
if not ebics_config_bank:
2022-05-10 19:40:54 +00:00
raise UserError(
_("No bank defined for the financial journal " "of the EBICS Config")
)
try:
2020-07-22 19:31:10 +00:00
supported_versions = client.HEV()
2022-11-18 09:27:25 +00:00
if supported_versions and ebics_version not in supported_versions:
2020-07-22 19:31:10 +00:00
err_msg = _("EBICS version mismatch.") + "\n"
err_msg += _("Versions supported by your bank:")
for k in supported_versions:
err_msg += f"\n{k}: {supported_versions[k]} "
2020-07-22 19:31:10 +00:00
raise UserError(err_msg)
2022-05-10 19:40:54 +00:00
if ebics_version == "H003":
2020-07-14 21:18:32 +00:00
bank._order_number = self.ebics_config_id._get_order_number()
OrderID = client.INI()
2022-05-10 19:40:54 +00:00
_logger.info("%s, EBICS INI command, OrderID=%s", self._name, OrderID)
if ebics_version == "H003":
2020-07-14 21:18:32 +00:00
self.ebics_config_id._update_order_number(OrderID)
2022-10-27 21:48:16 +00:00
except URLError as err:
exctype, value = exc_info()[:2]
tb = "".join(format_exception(*exc_info()))
_logger.error(
"EBICS INI command error\nUserID: %s\n%s",
self.name,
tb,
)
2022-05-10 19:40:54 +00:00
raise UserError(
2022-11-18 09:27:25 +00:00
_(
"urlopen error:\n url '%(url)s' - %(val)s",
url=self.ebics_config_id.ebics_url,
val=str(value),
)
2022-10-27 21:48:16 +00:00
) from err
except EbicsFunctionalError as err:
e = exc_info()
error = _("EBICS Functional Error:")
2022-05-10 19:40:54 +00:00
error += "\n"
error += f"{e[1].message} (code: {e[1].code})"
2022-10-27 21:48:16 +00:00
raise UserError(error) from err
except EbicsTechnicalError as err:
e = exc_info()
error = _("EBICS Technical Error:")
2022-05-10 19:40:54 +00:00
error += "\n"
error += f"{e[1].message} (code: {e[1].code})"
2022-10-27 21:48:16 +00:00
raise UserError(error) from err
# Send the public authentication and encryption keys to the bank.
2022-05-10 19:40:54 +00:00
if ebics_version == "H003":
2020-07-14 21:18:32 +00:00
bank._order_number = self.ebics_config_id._get_order_number()
OrderID = client.HIA()
2022-05-10 19:40:54 +00:00
_logger.info("%s, EBICS HIA command, OrderID=%s", self._name, OrderID)
if ebics_version == "H003":
2020-07-14 21:18:32 +00:00
self.ebics_config_id._update_order_number(OrderID)
# Create an INI-letter which must be printed and sent to the bank.
ebics_config_bank = self.ebics_config_id.journal_ids[0].bank_id
cc = ebics_config_bank.country.code
2022-05-10 19:40:54 +00:00
if cc in ["FR", "DE"]:
lang = cc
else:
2022-05-10 19:40:54 +00:00
lang = self.env.user.lang or self.env["res.lang"].search([])[0].code
lang = lang[:2]
fn_date = fields.Date.today().isoformat()
2022-05-10 19:40:54 +00:00
fn = "_".join([self.ebics_config_id.ebics_host, "ini_letter", fn_date]) + ".pdf"
letter = user.create_ini_letter(bankname=ebics_config_bank.name, lang=lang)
vals = {
"ebics_ini_letter": base64.encodebytes(letter),
"ebics_ini_letter_fn": fn,
"state": "init",
}
2024-01-19 14:13:28 +00:00
self._update_passphrase_vals(vals)
return self.write(vals)
def ebics_init_2(self):
"""
Initialization of bank keys - Step 2:
Activation of the account by the bank.
"""
self.ensure_one()
2022-05-10 19:40:54 +00:00
if self.state != "init":
raise UserError(_("Set state to 'Initialisation'."))
vals = {"state": "get_bank_keys"}
2024-01-19 14:13:28 +00:00
self._update_passphrase_vals(vals)
return self.write(vals)
def ebics_init_3(self):
"""
Initialization of bank keys - Step 3:
After the account has been activated the public bank keys
must be downloaded and checked for consistency.
"""
self.ensure_one()
2022-05-10 19:40:54 +00:00
if self.state != "get_bank_keys":
raise UserError(_("Set state to 'Get Keys from Bank'."))
2020-12-12 18:20:47 +00:00
try:
keyring = EbicsKeyRing(
2022-05-10 19:40:54 +00:00
keys=self.ebics_keys_fn, passphrase=self.ebics_passphrase
)
2020-12-12 18:20:47 +00:00
bank = EbicsBank(
keyring=keyring,
hostid=self.ebics_config_id.ebics_host,
2022-05-10 19:40:54 +00:00
url=self.ebics_config_id.ebics_url,
)
2020-12-12 18:20:47 +00:00
user = EbicsUser(
keyring=keyring,
partnerid=self.ebics_config_id.ebics_partner,
2022-05-10 19:40:54 +00:00
userid=self.name,
)
client = EbicsClient(bank, user, version=self.ebics_config_id.ebics_version)
2022-10-27 21:48:16 +00:00
except Exception as err:
2020-12-12 18:20:47 +00:00
exctype, value = exc_info()[:2]
error = _("EBICS Initialisation Error:")
2022-05-10 19:40:54 +00:00
error += "\n" + str(exctype) + "\n" + str(value)
2022-10-27 21:48:16 +00:00
raise UserError(error) from err
2020-12-12 18:20:47 +00:00
try:
public_bank_keys = client.HPB()
2022-10-27 21:48:16 +00:00
except EbicsFunctionalError as err:
2020-12-12 18:20:47 +00:00
e = exc_info()
error = _("EBICS Functional Error:")
2022-05-10 19:40:54 +00:00
error += "\n"
error += f"{e[1].message} (code: {e[1].code})"
2022-10-27 21:48:16 +00:00
raise UserError(error) from err
except Exception as err:
2020-12-12 18:20:47 +00:00
exctype, value = exc_info()[:2]
error = _("EBICS Initialisation Error:")
2022-05-10 19:40:54 +00:00
error += "\n" + str(exctype) + "\n" + str(value)
2022-10-27 21:48:16 +00:00
raise UserError(error) from err
public_bank_keys = public_bank_keys.encode()
fn_date = fields.Date.today().isoformat()
2022-05-10 19:40:54 +00:00
fn = (
"_".join([self.ebics_config_id.ebics_host, "public_bank_keys", fn_date])
+ ".txt"
)
vals = {
"ebics_public_bank_keys": base64.encodebytes(public_bank_keys),
"ebics_public_bank_keys_fn": fn,
"state": "to_verify",
}
2024-01-19 14:13:28 +00:00
self._update_passphrase_vals(vals)
return self.write(vals)
def ebics_init_4(self):
"""
Initialization of bank keys - Step 2:
Confirm Verification of the public bank keys
and activate the bank keys.
"""
self.ensure_one()
2022-05-10 19:40:54 +00:00
if self.state != "to_verify":
raise UserError(_("Set state to 'Verification'."))
keyring = EbicsKeyRing(
2022-05-10 19:40:54 +00:00
keys=self.ebics_keys_fn, passphrase=self.ebics_passphrase
)
bank = EbicsBank(
2020-07-14 21:18:32 +00:00
keyring=keyring,
hostid=self.ebics_config_id.ebics_host,
2022-05-10 19:40:54 +00:00
url=self.ebics_config_id.ebics_url,
)
bank.activate_keys()
vals = {"state": "active_keys"}
2024-01-19 14:13:28 +00:00
self._update_passphrase_vals(vals)
return self.write(vals)
def change_passphrase(self):
self.ensure_one()
ctx = dict(self.env.context, default_ebics_userid_id=self.id)
2022-05-10 19:40:54 +00:00
module = __name__.split("addons.")[1].split(".")[0]
view = self.env.ref("%s.ebics_change_passphrase_view_form" % module)
return {
2022-05-10 19:40:54 +00:00
"name": _("EBICS keys change passphrase"),
"view_type": "form",
"view_mode": "form",
"res_model": "ebics.change.passphrase",
"view_id": view.id,
"target": "new",
"context": ctx,
"type": "ir.actions.act_window",
}
2024-01-19 14:13:28 +00:00
def _update_passphrase_vals(self, vals):
"""
Remove non-stored passphrases from db after e.g. successfull init_1
"""
if vals["state"] in ("init", "get_bank_keys", "to_verify", "active_keys"):
if not self.ebics_passphrase_store:
vals["ebics_passphrase"] = False
if self.ebics_sig_passphrase:
vals["ebics_sig_passphrase"] = False