diff --git a/account_ebics/README.rst b/account_ebics/README.rst index fbc746a..cbb0493 100644 --- a/account_ebics/README.rst +++ b/account_ebics/README.rst @@ -67,3 +67,9 @@ EBICS_NO_DOWNLOAD_DATA_AVAILABLE (code: 90005) A detailled explanation of the codes can be found on http://www.ebics.org. You can also find this information in the doc folder of this module (file EBICS_Annex1_ReturnCodes). + +Known Issues / Roadmap +====================== + +- add support for 3SKEY signed transactions +- add support for EBICS 3.0 diff --git a/account_ebics/__init__.py b/account_ebics/__init__.py index 9b42961..aee8895 100644 --- a/account_ebics/__init__.py +++ b/account_ebics/__init__.py @@ -1,2 +1,2 @@ from . import models -from . import wizard +from . import wizards diff --git a/account_ebics/__manifest__.py b/account_ebics/__manifest__.py index 4db5efa..5a69a27 100644 --- a/account_ebics/__manifest__.py +++ b/account_ebics/__manifest__.py @@ -3,7 +3,7 @@ { 'name': 'EBICS banking protocol', - 'version': '13.0.1.0.3', + 'version': '13.0.1.1.0', 'license': 'LGPL-3', 'author': 'Noviat', 'category': 'Accounting & Finance', @@ -12,12 +12,13 @@ 'security/ebics_security.xml', 'security/ir.model.access.csv', 'data/ebics_file_format.xml', - 'views/menuitem.xml', - 'views/ebics_config.xml', - 'views/ebics_file.xml', - 'views/ebics_file_format.xml', - 'wizard/ebics_change_passphrase.xml', - 'wizard/ebics_xfer.xml', + 'views/ebics_config_views.xml', + 'views/ebics_file_views.xml', + 'views/ebics_userid_views.xml', + 'views/ebics_file_format_views.xml', + 'wizards/ebics_change_passphrase.xml', + 'wizards/ebics_xfer.xml', + 'views/menu.xml', ], 'installable': True, 'application': True, diff --git a/account_ebics/migrations/13.0.1.1/noupdate_changes.xml b/account_ebics/migrations/13.0.1.1/noupdate_changes.xml new file mode 100644 index 0000000..ae3cbe1 --- /dev/null +++ b/account_ebics/migrations/13.0.1.1/noupdate_changes.xml @@ -0,0 +1,18 @@ + + + + + EBICS Configuration model company rule + + + ['|', ('company_ids', '=', False), ('company_ids', 'in', user.company_ids.ids)] + + + + EBICS File model company rule + + + ['|', ('company_ids', '=', False), ('company_ids', 'in', user.company_ids.ids)] + + + diff --git a/account_ebics/migrations/13.0.1.1/post-migration.py b/account_ebics/migrations/13.0.1.1/post-migration.py new file mode 100644 index 0000000..9e9937e --- /dev/null +++ b/account_ebics/migrations/13.0.1.1/post-migration.py @@ -0,0 +1,73 @@ +# Copyright 2009-2020 Noviat. +# License AGPL-3.0 or later (http://www.gnu.org/licenses/agpl). + +from openupgradelib import openupgrade # pylint: disable=W7936 +import os + + +@openupgrade.migrate() +def migrate(env, version): + + _ebics_config_upgrade(env, version) + _noupdate_changes(env, version) + + +def _ebics_config_upgrade(env, version): + env.cr.execute("SELECT * FROM ebics_config") + cfg_datas = env.cr.dictfetchall() + for cfg_data in cfg_datas: + cfg = env['ebics.config'].browse(cfg_data['id']) + journal = env['account.journal'].search( + [('bank_account_id', '=', cfg_data['bank_id'])]) + keys_fn_old = cfg_data['ebics_keys'] + ebics_keys_root = os.path.dirname(keys_fn_old) + if os.path.isfile(keys_fn_old): + keys_fn = ebics_keys_root + '/' + cfg_data['ebics_user'] + os.rename(keys_fn_old, keys_fn) + state = cfg_data['state'] == 'active' and 'confirm' or 'draft' + cfg.write({ + 'company_ids': [(6, 0, [cfg_data['company_id']])], + 'journal_ids': [(6, 0, [journal.id])], + 'ebics_keys': ebics_keys_root, + 'state': state, + }) + + user_vals = { + 'ebics_config_id': cfg_data['id'], + 'name': cfg_data['ebics_user'], + } + for fld in [ + 'signature_class', 'ebics_passphrase', + 'ebics_ini_letter_fn', 'ebics_public_bank_keys_fn', + 'ebics_key_x509', 'ebics_key_x509_dn_cn', + 'ebics_key_x509_dn_o', 'ebics_key_x509_dn_ou', + 'ebics_key_x509_dn_c', 'ebics_key_x509_dn_st', + 'ebics_key_x509_dn_l', 'ebics_key_x509_dn_e', + 'ebics_file_format_ids', 'state']: + if cfg_data.get(fld): + if fld == 'ebics_file_format_ids': + user_vals[fld] = [(6, 0, cfg_data[fld])] + elif fld == 'state' and cfg_data['state'] == 'active': + user_vals['state'] = 'active_keys' + else: + user_vals[fld] = cfg_data[fld] + ebics_userid = env['ebics.userid'].create(user_vals) + env.cr.execute( + """ + UPDATE ir_attachment + SET res_model = 'ebics.userid', res_id = %s + WHERE name in ('ebics_ini_letter', 'ebics_public_bank_keys'); + """ + % ebics_userid.id) + + if len(cfg_datas) == 1: + env.cr.execute( + "UPDATE ebics_file SET ebics_userid_id = %s" % ebics_userid.id) + + +def _noupdate_changes(env, version): + openupgrade.load_data( + env.cr, + 'account_ebics', + 'migrations/13.0.1.1/noupdate_changes.xml' + ) diff --git a/account_ebics/migrations/13.0.1.1/pre-migration.py b/account_ebics/migrations/13.0.1.1/pre-migration.py new file mode 100644 index 0000000..53b714f --- /dev/null +++ b/account_ebics/migrations/13.0.1.1/pre-migration.py @@ -0,0 +1,9 @@ +# Copyright 2009-2020 Noviat. +# License AGPL-3.0 or later (http://www.gnu.org/licenses/agpl). + + +def migrate(cr, version): + if not version: + return + + cr.execute("DELETE FROM ebics_xfer;") diff --git a/account_ebics/models/__init__.py b/account_ebics/models/__init__.py index 01f4bfe..0a211c1 100644 --- a/account_ebics/models/__init__.py +++ b/account_ebics/models/__init__.py @@ -3,3 +3,4 @@ from . import account_bank_statement from . import ebics_config from . import ebics_file from . import ebics_file_format +from . import ebics_userid diff --git a/account_ebics/models/account_bank_statement.py b/account_ebics/models/account_bank_statement.py index 898a36a..dde134d 100644 --- a/account_ebics/models/account_bank_statement.py +++ b/account_ebics/models/account_bank_statement.py @@ -1,4 +1,4 @@ -# Copyright 2009-2018 Noviat. +# Copyright 2009-2020 Noviat. # License LGPL-3 or later (http://www.gnu.org/licenses/lpgl). from odoo import fields, models diff --git a/account_ebics/models/ebics_config.py b/account_ebics/models/ebics_config.py index 16b53cf..051b9df 100644 --- a/account_ebics/models/ebics_config.py +++ b/account_ebics/models/ebics_config.py @@ -1,22 +1,18 @@ # Copyright 2009-2020 Noviat. # License LGPL-3 or later (http://www.gnu.org/licenses/lpgl). -import base64 import logging import re import os -from sys import exc_info -from urllib.error import URLError -from odoo import api, fields, models, _ +from odoo import _, api, fields, models from odoo.exceptions import UserError _logger = logging.getLogger(__name__) try: import fintech - from fintech.ebics import EbicsKeyRing, EbicsBank, EbicsUser,\ - EbicsClient, EbicsFunctionalError, EbicsTechnicalError + from fintech.ebics import EbicsBank fintech.cryptolib = 'cryptography' except ImportError: EbicsBank = object @@ -38,27 +34,20 @@ class EbicsConfig(models.Model): """ EBICS configuration is stored in a separate object in order to allow extra security policies on this object. - - Remark: - This Configuration model implements a simple model of the relationship - between users and authorizations and may need to be adapted - in next versions of this module to cope with higher complexity . """ _name = 'ebics.config' _description = 'EBICS Configuration' _order = 'name' - name = fields.Char(string='Name', required=True) - company_partner_id = fields.Many2one( - comodel_name='res.partner', - related='company_id.partner_id', - string='Account Holder', - readonly=True, store=False) - bank_id = fields.Many2one( - comodel_name='res.partner.bank', + name = fields.Char( + string='Name', readonly=True, states={'draft': [('readonly', False)]}, - string='Bank Account', - domain="[('partner_id','=', company_partner_id)]", + required=True) + journal_ids = fields.Many2many( + comodel_name='account.journal', + readonly=True, states={'draft': [('readonly', False)]}, + string='Bank Accounts', + domain="[('type', '=', 'bank')]", required=True) ebics_host = fields.Char( string='EBICS HostID', required=True, @@ -88,8 +77,9 @@ class EbicsConfig(models.Model): "communicate with the EBICS bank server and the authorisations " "that these users will possess. " "\nIt is identified by the PartnerID.") - ebics_user = fields.Char( - string='EBICS UserID', required=True, + ebics_userid_ids = fields.One2many( + comodel_name='ebics.userid', + inverse_name='ebics_config_id', readonly=True, states={'draft': [('readonly', False)]}, help="Human users or a technical system that is/are " "assigned to a customer. " @@ -98,35 +88,18 @@ class EbicsConfig(models.Model): "The technical subscriber serves only for the data exchange " "between customer and financial institution. " "The human user also can authorise orders.") - # Currently only a singe signature class per user is supported - # Classes A and B are not yet supported. - signature_class = fields.Selection( - selection=[('E', 'Single signature'), - ('T', 'Transport signature')], - string='Signature Class', - required=True, default='T', - readonly=True, states={'draft': [('readonly', False)]}, - help="Default signature class." - "This default can be overriden for specific " - "EBICS transactions (cf. File Formats).") ebics_files = fields.Char( string='EBICS Files Root', required=True, readonly=True, states={'draft': [('readonly', False)]}, default=lambda self: self._default_ebics_files(), help="Root Directory for EBICS File Transfer Folders.") - # We store the EBICS keys in a separate directory in the file system. # This directory requires special protection to reduce fraude. ebics_keys = fields.Char( - string='EBICS Keys', required=True, + string='EBICS Keys Root', required=True, readonly=True, states={'draft': [('readonly', False)]}, default=lambda self: self._default_ebics_keys(), - help="File holding the EBICS Keys." - "\nSpecify the full path (directory + filename).") - ebics_keys_found = fields.Boolean( - compute='_compute_ebics_keys_found') - ebics_passphrase = fields.Char( - string='EBICS Passphrase') + help="Root Directory for storing the EBICS Keys.") ebics_key_version = fields.Selection( selection=[('A005', 'A005 (RSASSA-PKCS1-v1_5)'), ('A006', 'A006 (RSASSA-PSS)')], @@ -140,51 +113,6 @@ class EbicsConfig(models.Model): readonly=True, states={'draft': [('readonly', False)]}, help="The bit length of the generated keys. " "\nThe value must be between 1536 and 4096.") - ebics_ini_letter = fields.Binary( - string='EBICS INI Letter', readonly=True, - help="INI-letter PDF document to be sent to your bank.") - ebics_ini_letter_fn = fields.Char( - string='INI-letter Filename', readonly=True) - ebics_public_bank_keys = fields.Binary( - string='EBICS Public Bank Keys', readonly=True, - help="EBICS Public Bank Keys to be checked for consistency.") - ebics_public_bank_keys_fn = fields.Char( - string='EBICS Public Bank Keys Filename', readonly=True) - - # X.509 Distinguished Name attributes used to - # create self-signed X.509 certificates - ebics_key_x509 = fields.Boolean( - string='X509 support', - help="Set this flag in order to work with " - "self-signed X.509 certificates") - ebics_key_x509_dn_cn = fields.Char( - string='Common Name [CN]', - readonly=True, states={'draft': [('readonly', False)]}, - ) - ebics_key_x509_dn_o = fields.Char( - string='Organization Name [O]', - readonly=True, states={'draft': [('readonly', False)]}, - ) - ebics_key_x509_dn_ou = fields.Char( - string='Organizational Unit Name [OU]', - readonly=True, states={'draft': [('readonly', False)]}, - ) - ebics_key_x509_dn_c = fields.Char( - string='Country Name [C]', - readonly=True, states={'draft': [('readonly', False)]}, - ) - ebics_key_x509_dn_st = fields.Char( - string='State Or Province Name [ST]', - readonly=True, states={'draft': [('readonly', False)]}, - ) - ebics_key_x509_dn_l = fields.Char( - string='Locality Name [L]', - readonly=True, states={'draft': [('readonly', False)]}, - ) - ebics_key_x509_dn_e = fields.Char( - string='Email Address', - readonly=True, states={'draft': [('readonly', False)]}, - ) ebics_file_format_ids = fields.Many2many( comodel_name='ebics.file.format', column1='config_id', column2='format_id', @@ -193,10 +121,7 @@ class EbicsConfig(models.Model): ) state = fields.Selection( [('draft', 'Draft'), - ('init', 'Initialisation'), - ('get_bank_keys', 'Get Keys from Bank'), - ('to_verify', 'Verification'), - ('active', 'Active')], + ('confirm', 'Confirmed')], string='State', default='draft', required=True, readonly=True) @@ -207,10 +132,11 @@ class EbicsConfig(models.Model): "[A-Z]{1}[A-Z0-9]{3}") active = fields.Boolean( string='Active', default=True) - company_id = fields.Many2one( - 'res.company', string='Company', - default=lambda self: self.env.user.company_id, - required=True) + company_ids = fields.Many2many( + comodel_name='res.company', + string='Companies', + required=True, + help="Companies sharing this EBICS contract.") @api.model def _default_ebics_files(self): @@ -218,22 +144,7 @@ class EbicsConfig(models.Model): @api.model def _default_ebics_keys(self): - return '/'.join(['/etc/odoo/ebics_keys', - self._cr.dbname, - 'mykeys']) - - @api.depends('ebics_keys') - def _compute_ebics_keys_found(self): - for cfg in self: - cfg.ebics_keys_found = ( - cfg.ebics_keys and os.path.isfile(cfg.ebics_keys)) - - @api.constrains('ebics_passphrase') - def _check_ebics_passphrase(self): - for cfg in self: - if not cfg.ebics_passphrase or len(cfg.ebics_passphrase) < 8: - raise UserError(_( - "The passphrase must be at least 8 characters long")) + return '/'.join(['/etc/odoo/ebics_keys', self._cr.dbname]) @api.constrains('order_number') def _check_order_number(self): @@ -252,223 +163,22 @@ class EbicsConfig(models.Model): "Order Number should comply with the following pattern:" "\n[A-Z]{1}[A-Z0-9]{3}")) + @api.onchange('journal_ids') + def _onchange_journal_ids(self): + self.company_ids = self.journal_ids.mapped('company_id') + def unlink(self): for ebics_config in self: if ebics_config.state == 'active': raise UserError(_( - "You cannot remove active EBICS congirations.")) + "You cannot remove active EBICS configurations.")) return super(EbicsConfig, self).unlink() def set_to_draft(self): return self.write({'state': 'draft'}) - def set_to_get_bank_keys(self): - return self.write({'state': 'get_bank_keys'}) - - def set_to_active(self): - return self.write({'state': 'active'}) - - def ebics_init_1(self): - """ - Initialization of bank keys - Step 1: - Create new keys and certificates for this user - """ - self.ensure_one() - self._check_ebics_files() - if self.state != 'draft': - raise UserError( - _("Set state to 'draft' before Bank Key (re)initialisation.")) - - if not self.ebics_passphrase: - raise UserError( - _("Set a passphrase.")) - - try: - keyring = EbicsKeyRing( - keys=self.ebics_keys, - passphrase=self.ebics_passphrase) - bank = EbicsBank( - keyring=keyring, hostid=self.ebics_host, url=self.ebics_url) - user = EbicsUser( - keyring=keyring, partnerid=self.ebics_partner, - userid=self.ebics_user) - except Exception: - exctype, value = exc_info()[:2] - error = _("EBICS Initialisation Error:") - error += '\n' + str(exctype) + '\n' + str(value) - raise UserError(error) - - self._check_ebics_keys() - if not os.path.isfile(self.ebics_keys): - try: - user.create_keys( - keyversion=self.ebics_key_version, - bitlength=self.ebics_key_bitlength) - except Exception: - exctype, value = exc_info()[:2] - error = _("EBICS Initialisation Error:") - error += '\n' + str(exctype) + '\n' + str(value) - raise UserError(error) - - if self.ebics_key_x509: - dn_attrs = { - 'commonName': self.ebics_key_x509_dn_cn, - 'organizationName': self.ebics_key_x509_dn_o, - 'organizationalUnitName': self.ebics_key_x509_dn_ou, - 'countryName': self.ebics_key_x509_dn_c, - 'stateOrProvinceName': self.ebics_key_x509_dn_st, - 'localityName': self.ebics_key_x509_dn_l, - 'emailAddress': self.ebics_key_x509_dn_e, - } - kwargs = {k: v for k, v in dn_attrs.items() if v} - user.create_certificates(**kwargs) - - client = EbicsClient(bank, user, version=self.ebics_version) - - # Send the public electronic signature key to the bank. - try: - if self.ebics_version == 'H003': - bank._order_number = self._get_order_number() - OrderID = client.INI() - _logger.info( - '%s, EBICS INI command, OrderID=%s', self._name, OrderID) - if self.ebics_version == 'H003': - self._update_order_number(OrderID) - except URLError: - exctype, value = exc_info()[:2] - raise UserError(_( - "urlopen error:\n url '%s' - %s") - % (self.ebics_url, str(value))) - except EbicsFunctionalError: - e = exc_info() - error = _("EBICS Functional Error:") - error += '\n' - error += '%s (code: %s)' % (e[1].message, e[1].code) - raise UserError(error) - except EbicsTechnicalError: - e = exc_info() - error = _("EBICS Technical Error:") - error += '\n' - error += '%s (code: %s)' % (e[1].message, e[1].code) - raise UserError(error) - - # Send the public authentication and encryption keys to the bank. - if self.ebics_version == 'H003': - bank._order_number = self._get_order_number() - OrderID = client.HIA() - _logger.info('%s, EBICS HIA command, OrderID=%s', self._name, OrderID) - if self.ebics_version == 'H003': - self._update_order_number(OrderID) - - # Create an INI-letter which must be printed and sent to the bank. - cc = self.bank_id.bank_id.country.code - if cc in ['FR', 'DE']: - lang = cc - else: - lang = self.env.user.lang or \ - self.env['res.lang'].search([])[0].code - lang = lang[:2] - tmp_dir = os.path.normpath(self.ebics_files + '/tmp') - if not os.path.isdir(tmp_dir): - os.makedirs(tmp_dir, mode=0o700) - fn_date = fields.Date.today().isoformat() - fn = '_'.join([self.ebics_host, 'ini_letter', fn_date]) + '.pdf' - full_tmp_fn = os.path.normpath(tmp_dir + '/' + fn) - user.create_ini_letter( - bankname=self.bank_id.bank_id.name, - path=full_tmp_fn, - lang=lang) - with open(full_tmp_fn, 'rb') as f: - letter = f.read() - self.write({ - 'ebics_ini_letter': base64.encodestring(letter), - 'ebics_ini_letter_fn': fn, - }) - - return self.write({'state': 'init'}) - - def ebics_init_2(self): - """ - Initialization of bank keys - Step 2: - Activation of the account by the bank. - """ - if self.state != 'init': - raise UserError( - _("Set state to 'Initialisation'.")) - self.ensure_one() - return self.write({'state': 'get_bank_keys'}) - - def ebics_init_3(self): - """ - Initialization of bank keys - Step 3: - - After the account has been activated the public bank keys - must be downloaded and checked for consistency. - """ - self.ensure_one() - self._check_ebics_files() - if self.state != 'get_bank_keys': - raise UserError( - _("Set state to 'Get Keys from Bank'.")) - keyring = EbicsKeyRing( - keys=self.ebics_keys, passphrase=self.ebics_passphrase) - bank = EbicsBank( - keyring=keyring, hostid=self.ebics_host, url=self.ebics_url) - user = EbicsUser( - keyring=keyring, partnerid=self.ebics_partner, - userid=self.ebics_user) - client = EbicsClient( - bank, user, version=self.ebics_version) - - public_bank_keys = client.HPB() - public_bank_keys = public_bank_keys.encode() - tmp_dir = os.path.normpath(self.ebics_files + '/tmp') - if not os.path.isdir(tmp_dir): - os.makedirs(tmp_dir, mode=0o700) - fn_date = fields.Date.today().isoformat() - fn = '_'.join([self.ebics_host, 'public_bank_keys', fn_date]) + '.txt' - self.write({ - 'ebics_public_bank_keys': base64.encodestring(public_bank_keys), - 'ebics_public_bank_keys_fn': fn, - 'state': 'to_verify', - }) - - return True - - def ebics_init_4(self): - """ - Initialization of bank keys - Step 2: - Confirm Verification of the public bank keys - and activate the bank keyu. - """ - self.ensure_one() - if self.state != 'to_verify': - raise UserError( - _("Set state to 'Verification'.")) - - keyring = EbicsKeyRing( - keys=self.ebics_keys, passphrase=self.ebics_passphrase) - bank = EbicsBank( - keyring=keyring, hostid=self.ebics_host, url=self.ebics_url) - bank.activate_keys() - return self.write({'state': 'active'}) - - def change_passphrase(self): - self.ensure_one() - ctx = dict(self._context, default_ebics_config_id=self.id) - module = __name__.split('addons.')[1].split('.')[0] - view = self.env.ref( - '%s.ebics_change_passphrase_view_form' % module) - return { - 'name': _('EBICS keys change passphrase'), - 'view_type': 'form', - 'view_mode': 'form', - 'res_model': 'ebics.change.passphrase', - 'view_id': view.id, - 'target': 'new', - 'context': ctx, - 'type': 'ir.actions.act_window', - } + def set_to_confirm(self): + return self.write({'state': 'confirm'}) def _get_order_number(self): return self.order_number @@ -490,18 +200,12 @@ class EbicsConfig(models.Model): self.order_number = next def _check_ebics_keys(self): - if self.ebics_keys: - dirname = os.path.dirname(self.ebics_keys) - if not os.path.exists(dirname): - raise UserError(_( - "EBICS Keys Directory '%s' is not available." - "\nPlease contact your system administrator.") - % dirname) - if os.path.isdir(self.ebics_keys): + dirname = self.ebics_keys or '' + if not os.path.exists(dirname): raise UserError(_( - "Configuration Error.\n" - "The 'EBICS Keys' parameter should be a full path " - "(directory + filename) not a directory name.")) + "EBICS Keys Root Directory %s is not available." + "\nPlease contact your system administrator.") + % dirname) def _check_ebics_files(self): dirname = self.ebics_files or '' diff --git a/account_ebics/models/ebics_file.py b/account_ebics/models/ebics_file.py index 622c709..1a8e810 100644 --- a/account_ebics/models/ebics_file.py +++ b/account_ebics/models/ebics_file.py @@ -1,9 +1,10 @@ # Copyright 2009-2020 Noviat. # License LGPL-3 or later (http://www.gnu.org/licenses/lpgl). +import base64 import logging -from odoo import api, fields, models, _ +from odoo import _, fields, models from odoo.exceptions import UserError _logger = logging.getLogger(__name__) @@ -13,6 +14,10 @@ class EbicsFile(models.Model): _name = 'ebics.file' _description = 'Object to store EBICS Data Files' _order = 'date desc' + _sql_constraints = [ + ('name_uniq', 'unique (name, format_id)', + 'This File has already been down- or uploaded !') + ] name = fields.Char(string='Filename') data = fields.Binary(string='File', readonly=True) @@ -46,25 +51,17 @@ class EbicsFile(models.Model): comodel_name='res.users', string='User', default=lambda self: self.env.user, readonly=True) + ebics_userid_id = fields.Many2one( + comodel_name='ebics.userid', + string='EBICS UserID', + ondelete='restrict', + readonly=True) note = fields.Text(string='Notes') note_process = fields.Text(string='Notes') - company_id = fields.Many2one( + company_ids = fields.Many2many( comodel_name='res.company', - string='Company', - default=lambda self: self._default_company_id()) - - _sql_constraints = [ - ('name_company_uniq', 'unique (name, company_id, format_id)', - 'This File has already been imported !') - ] - - @api.model - def _default_company_id(self): - """ - Adapt this method in case your bank provides transactions - of multiple legal entities in a single EBICS File. - """ - return self.env.user.company_id + string='Companies', + help="Companies sharing this EBICS file.") def unlink(self): ff_methods = self._file_format_methods() @@ -168,11 +165,25 @@ class EbicsFile(models.Model): import_module = 'account_bank_statement_import_fr_cfonb' self._check_import_module(import_module) wiz_model = 'account.bank.statement.import' - wiz_vals = { - 'attachment_ids': [(0, 0, {'name': self.name, - 'datas': self.data, - 'store_fname': self.name})]} - wiz = self.env[wiz_model].create(wiz_vals) + data_file = base64.b64decode(self.data) + lines = data_file.split(b'\n') + att_vals = [] + st_lines = b'' + for line in lines: + rec_type = line[0:2] + acc_number = line[21:32] + st_lines += line + b'\n' + if rec_type == b'07': + fn = '_'.join([acc_number.decode(), self.name]) + att_vals.append({ + 'name': fn, + 'store_fname': fn, + 'datas': base64.b64encode(st_lines) + }) + st_lines = b'' + wiz_vals = {'attachment_ids': [(0, 0, x) for x in att_vals]} + wiz_ctx = dict(self.env.context, active_model='ebics.file') + wiz = self.env[wiz_model].with_context(wiz_ctx).create(wiz_vals) res = wiz.import_file() notifications = [] statement_ids = [] @@ -224,10 +235,11 @@ class EbicsFile(models.Model): import_module = 'account_bank_statement_import_camt%' self._check_import_module(import_module) wiz_model = 'account.bank.statement.import' + wiz_vals = { - 'data_file': self.data, - 'filename': self.name, - } + 'attachment_ids': [(0, 0, {'name': self.name, + 'datas': self.data, + 'store_fname': self.name})]} ctx = dict(self.env.context, active_model='ebics.file') wiz = self.env[wiz_model].with_context(ctx).create(wiz_vals) res = wiz.import_file() diff --git a/account_ebics/models/ebics_userid.py b/account_ebics/models/ebics_userid.py new file mode 100644 index 0000000..c5773fd --- /dev/null +++ b/account_ebics/models/ebics_userid.py @@ -0,0 +1,358 @@ +# Copyright 2009-2020 Noviat. +# License LGPL-3 or later (http://www.gnu.org/licenses/lpgl). + +import base64 +import logging +import os +from sys import exc_info +from urllib.error import URLError + +from odoo import _, api, fields, models +from odoo.exceptions import UserError + +_logger = logging.getLogger(__name__) + +try: + import fintech + from fintech.ebics import EbicsKeyRing, EbicsBank, EbicsUser,\ + EbicsClient, EbicsFunctionalError, EbicsTechnicalError + fintech.cryptolib = 'cryptography' +except ImportError: + _logger.warning('Failed to import fintech') + + +class EbicsUserID(models.Model): + _name = 'ebics.userid' + _description = 'EBICS UserID' + _order = 'name' + + name = fields.Char( + string='EBICS UserID', required=True, + readonly=True, states={'draft': [('readonly', False)]}, + help="Human users or a technical system that is/are " + "assigned to a customer. " + "\nOn the EBICS bank server it is identified " + "by the combination of UserID and PartnerID. " + "The technical subscriber serves only for the data exchange " + "between customer and financial institution. " + "The human user also can authorise orders.") + ebics_config_id = fields.Many2one( + comodel_name='ebics.config', + string='EBICS Configuration', + ondelete='cascade') + user_ids = fields.Many2many( + comodel_name='res.users', + string='Users', + required=True, + help="Users who are allowed to use this EBICS UserID for " + " bank transactions.") + # Currently only a singe signature class per user is supported + # Classes A and B are not yet supported. + signature_class = fields.Selection( + selection=[('E', 'Single signature'), + ('T', 'Transport signature')], + string='Signature Class', + required=True, default='T', + readonly=True, states={'draft': [('readonly', False)]}, + help="Default signature class." + "This default can be overriden for specific " + "EBICS transactions (cf. File Formats).") + ebics_keys_fn = fields.Char( + compute='_compute_ebics_keys_fn') + ebics_keys_found = fields.Boolean( + compute='_compute_ebics_keys_found') + ebics_passphrase = fields.Char( + string='EBICS Passphrase') + ebics_ini_letter = fields.Binary( + string='EBICS INI Letter', readonly=True, + help="INI-letter PDF document to be sent to your bank.") + ebics_ini_letter_fn = fields.Char( + string='INI-letter Filename', readonly=True) + ebics_public_bank_keys = fields.Binary( + string='EBICS Public Bank Keys', readonly=True, + help="EBICS Public Bank Keys to be checked for consistency.") + ebics_public_bank_keys_fn = fields.Char( + string='EBICS Public Bank Keys Filename', readonly=True) + # X.509 Distinguished Name attributes used to + # create self-signed X.509 certificates + ebics_key_x509 = fields.Boolean( + string='X509 support', + help="Set this flag in order to work with " + "self-signed X.509 certificates") + ebics_key_x509_dn_cn = fields.Char( + string='Common Name [CN]', + readonly=True, states={'draft': [('readonly', False)]}, + ) + ebics_key_x509_dn_o = fields.Char( + string='Organization Name [O]', + readonly=True, states={'draft': [('readonly', False)]}, + ) + ebics_key_x509_dn_ou = fields.Char( + string='Organizational Unit Name [OU]', + readonly=True, states={'draft': [('readonly', False)]}, + ) + ebics_key_x509_dn_c = fields.Char( + string='Country Name [C]', + readonly=True, states={'draft': [('readonly', False)]}, + ) + ebics_key_x509_dn_st = fields.Char( + string='State Or Province Name [ST]', + readonly=True, states={'draft': [('readonly', False)]}, + ) + ebics_key_x509_dn_l = fields.Char( + string='Locality Name [L]', + readonly=True, states={'draft': [('readonly', False)]}, + ) + ebics_key_x509_dn_e = fields.Char( + string='Email Address', + readonly=True, states={'draft': [('readonly', False)]}, + ) + state = fields.Selection( + [('draft', 'Draft'), + ('init', 'Initialisation'), + ('get_bank_keys', 'Get Keys from Bank'), + ('to_verify', 'Verification'), + ('active_keys', 'Active Keys')], + string='State', + default='draft', + required=True, readonly=True) + active = fields.Boolean( + string='Active', default=True) + company_ids = fields.Many2many( + comodel_name='res.company', + string='Companies', + required=True, + help="Companies sharing this EBICS contract.") + + @api.depends('name') + def _compute_ebics_keys_fn(self): + for rec in self: + keys_dir = rec.ebics_config_id.ebics_keys + rec.ebics_keys_fn = ( + rec.name + and keys_dir + and os.path.isfile( + keys_dir + '/' + rec.name + '_keys')) + + @api.depends('ebics_keys_fn') + def _compute_ebics_keys_found(self): + for rec in self: + rec.ebics_keys_found = ( + rec.ebics_keys_fn + and os.path.isfile(rec.ebics_keys_fn) + ) + + @api.constrains('ebics_passphrase') + def _check_ebics_passphrase(self): + for rec in self: + if not rec.ebics_passphrase or len(rec.ebics_passphrase) < 8: + raise UserError(_( + "The passphrase must be at least 8 characters long")) + + def set_to_draft(self): + return self.write({'state': 'draft'}) + + def set_to_get_bank_keys(self): + return self.write({'state': 'get_bank_keys'}) + + def ebics_init_1(self): + """ + Initialization of bank keys - Step 1: + Create new keys and certificates for this user + """ + self.ensure_one() + self._check_ebics_files() + if self.state != 'draft': + raise UserError( + _("Set state to 'draft' before Bank Key (re)initialisation.")) + + if not self.ebics_passphrase: + raise UserError( + _("Set a passphrase.")) + + try: + keyring = EbicsKeyRing( + keys=self.ebics_keys, + passphrase=self.ebics_passphrase) + bank = EbicsBank( + keyring=keyring, hostid=self.ebics_host, url=self.ebics_url) + user = EbicsUser( + keyring=keyring, partnerid=self.ebics_partner, + userid=self.name) + except Exception: + exctype, value = exc_info()[:2] + error = _("EBICS Initialisation Error:") + error += '\n' + str(exctype) + '\n' + str(value) + raise UserError(error) + + self._check_ebics_keys() + if not os.path.isfile(self.ebics_keys): + try: + user.create_keys( + keyversion=self.ebics_key_version, + bitlength=self.ebics_key_bitlength) + except Exception: + exctype, value = exc_info()[:2] + error = _("EBICS Initialisation Error:") + error += '\n' + str(exctype) + '\n' + str(value) + raise UserError(error) + + if self.ebics_key_x509: + dn_attrs = { + 'commonName': self.ebics_key_x509_dn_cn, + 'organizationName': self.ebics_key_x509_dn_o, + 'organizationalUnitName': self.ebics_key_x509_dn_ou, + 'countryName': self.ebics_key_x509_dn_c, + 'stateOrProvinceName': self.ebics_key_x509_dn_st, + 'localityName': self.ebics_key_x509_dn_l, + 'emailAddress': self.ebics_key_x509_dn_e, + } + kwargs = {k: v for k, v in dn_attrs.items() if v} + user.create_certificates(**kwargs) + + client = EbicsClient(bank, user, version=self.ebics_version) + + # Send the public electronic signature key to the bank. + try: + if self.ebics_version == 'H003': + bank._order_number = self._get_order_number() + OrderID = client.INI() + _logger.info( + '%s, EBICS INI command, OrderID=%s', self._name, OrderID) + if self.ebics_version == 'H003': + self._update_order_number(OrderID) + except URLError: + exctype, value = exc_info()[:2] + raise UserError(_( + "urlopen error:\n url '%s' - %s") + % (self.ebics_url, str(value))) + except EbicsFunctionalError: + e = exc_info() + error = _("EBICS Functional Error:") + error += '\n' + error += '%s (code: %s)' % (e[1].message, e[1].code) + raise UserError(error) + except EbicsTechnicalError: + e = exc_info() + error = _("EBICS Technical Error:") + error += '\n' + error += '%s (code: %s)' % (e[1].message, e[1].code) + raise UserError(error) + + # Send the public authentication and encryption keys to the bank. + if self.ebics_version == 'H003': + bank._order_number = self._get_order_number() + OrderID = client.HIA() + _logger.info('%s, EBICS HIA command, OrderID=%s', self._name, OrderID) + if self.ebics_version == 'H003': + self._update_order_number(OrderID) + + # Create an INI-letter which must be printed and sent to the bank. + cc = self.bank_id.bank_id.country.code + if cc in ['FR', 'DE']: + lang = cc + else: + lang = self.env.user.lang or \ + self.env['res.lang'].search([])[0].code + lang = lang[:2] + tmp_dir = os.path.normpath(self.ebics_files + '/tmp') + if not os.path.isdir(tmp_dir): + os.makedirs(tmp_dir, mode=0o700) + fn_date = fields.Date.today().isoformat() + fn = '_'.join([self.ebics_host, 'ini_letter', fn_date]) + '.pdf' + full_tmp_fn = os.path.normpath(tmp_dir + '/' + fn) + user.create_ini_letter( + bankname=self.bank_id.bank_id.name, + path=full_tmp_fn, + lang=lang) + with open(full_tmp_fn, 'rb') as f: + letter = f.read() + self.write({ + 'ebics_ini_letter': base64.encodestring(letter), + 'ebics_ini_letter_fn': fn, + }) + + return self.write({'state': 'init'}) + + def ebics_init_2(self): + """ + Initialization of bank keys - Step 2: + Activation of the account by the bank. + """ + if self.state != 'init': + raise UserError( + _("Set state to 'Initialisation'.")) + self.ensure_one() + return self.write({'state': 'get_bank_keys'}) + + def ebics_init_3(self): + """ + Initialization of bank keys - Step 3: + + After the account has been activated the public bank keys + must be downloaded and checked for consistency. + """ + self.ensure_one() + self._check_ebics_files() + if self.state != 'get_bank_keys': + raise UserError( + _("Set state to 'Get Keys from Bank'.")) + keyring = EbicsKeyRing( + keys=self.ebics_keys, passphrase=self.ebics_passphrase) + bank = EbicsBank( + keyring=keyring, hostid=self.ebics_host, url=self.ebics_url) + user = EbicsUser( + keyring=keyring, partnerid=self.ebics_partner, + userid=self.name) + client = EbicsClient( + bank, user, version=self.ebics_version) + + public_bank_keys = client.HPB() + public_bank_keys = public_bank_keys.encode() + tmp_dir = os.path.normpath(self.ebics_files + '/tmp') + if not os.path.isdir(tmp_dir): + os.makedirs(tmp_dir, mode=0o700) + fn_date = fields.Date.today().isoformat() + fn = '_'.join([self.ebics_host, 'public_bank_keys', fn_date]) + '.txt' + self.write({ + 'ebics_public_bank_keys': base64.encodestring(public_bank_keys), + 'ebics_public_bank_keys_fn': fn, + 'state': 'to_verify', + }) + + return True + + def ebics_init_4(self): + """ + Initialization of bank keys - Step 2: + Confirm Verification of the public bank keys + and activate the bank keyu. + """ + self.ensure_one() + if self.state != 'to_verify': + raise UserError( + _("Set state to 'Verification'.")) + + keyring = EbicsKeyRing( + keys=self.ebics_keys, passphrase=self.ebics_passphrase) + bank = EbicsBank( + keyring=keyring, hostid=self.ebics_host, url=self.ebics_url) + bank.activate_keys() + return self.write({'state': 'active_keys'}) + + def change_passphrase(self): + self.ensure_one() + ctx = dict(self._context, default_ebics_config_id=self.id) + module = __name__.split('addons.')[1].split('.')[0] + view = self.env.ref( + '%s.ebics_change_passphrase_view_form' % module) + return { + 'name': _('EBICS keys change passphrase'), + 'view_type': 'form', + 'view_mode': 'form', + 'res_model': 'ebics.change.passphrase', + 'view_id': view.id, + 'target': 'new', + 'context': ctx, + 'type': 'ir.actions.act_window', + } diff --git a/account_ebics/security/ebics_security.xml b/account_ebics/security/ebics_security.xml index e518901..99fb018 100644 --- a/account_ebics/security/ebics_security.xml +++ b/account_ebics/security/ebics_security.xml @@ -12,14 +12,21 @@ EBICS Configuration model company rule - ['|', ('company_id', '=', False), ('company_id', 'in', company_ids)] + ['|', ('company_ids', '=', False), ('company_ids', 'in', user.company_ids.ids)] + + + + EBICS UserID model company rule + + + ['|', ('company_ids', '=', False), ('company_ids', 'in', user.company_ids.ids)] EBICS File model company rule - ['|', ('company_id', '=', False), ('company_id', 'in', company_ids)] + ['|', ('company_ids', '=', False), ('company_isd', 'in', user.company_ids.ids)] diff --git a/account_ebics/security/ir.model.access.csv b/account_ebics/security/ir.model.access.csv index d398706..3d71939 100644 --- a/account_ebics/security/ir.model.access.csv +++ b/account_ebics/security/ir.model.access.csv @@ -1,7 +1,9 @@ id,name,model_id:id,group_id:id,perm_read,perm_write,perm_create,perm_unlink -access_ebics_config_manager,ebics_config manager,model_ebics_config,account_ebics.group_ebics_manager,1,1,1,1 +access_ebics_config_manager,ebics_config manager,model_ebics_config,group_ebics_manager,1,1,1,1 access_ebics_config_user,ebics_config user,model_ebics_config,account.group_account_invoice,1,0,0,0 -access_ebics_file_format_manager,ebics_file_format manager,model_ebics_file_format,account_ebics.group_ebics_manager,1,1,1,1 +access_ebics_userid_manager,ebics_userid manager,model_ebics_userid,group_ebics_manager,1,1,1,1 +access_ebics_userid_user,ebics_userid user,model_ebics_userid,account.group_account_invoice,1,0,0,0 +access_ebics_file_format_manager,ebics_file_format manager,model_ebics_file_format,group_ebics_manager,1,1,1,1 access_ebics_file_format_user,ebics_file_format user,model_ebics_file_format,account.group_account_invoice,1,0,0,0 -access_ebics_file_manager,ebics_file manager,model_ebics_file,account_ebics.group_ebics_manager,1,1,1,1 +access_ebics_file_manager,ebics_file manager,model_ebics_file,group_ebics_manager,1,1,1,1 access_ebics_file_user,ebics_file user,model_ebics_file,account.group_account_invoice,1,1,1,0 diff --git a/account_ebics/views/ebics_config.xml b/account_ebics/views/ebics_config.xml deleted file mode 100644 index a2e4c24..0000000 --- a/account_ebics/views/ebics_config.xml +++ /dev/null @@ -1,127 +0,0 @@ - - - - - ebics.config.tree - ebics.config - - - - - - - - - - - - - - ebics.config.form - ebics.config - -
-
-
- - - - - - - - - - - - - - - - - -
-
- - - - - - - - - - - - - - - - - - - - Distinguished Name attributes used to create self-signed X.509 certificates: - - - - - - - - - - - - - -
- - - -
-
-
-
- - - EBICS Configuration - ebics.config - tree,form - - - - -
diff --git a/account_ebics/views/ebics_config_views.xml b/account_ebics/views/ebics_config_views.xml new file mode 100644 index 0000000..f76c619 --- /dev/null +++ b/account_ebics/views/ebics_config_views.xml @@ -0,0 +1,74 @@ + + + + + ebics.config.tree + ebics.config + + + + + + + + + + + + ebics.config.form + ebics.config + +
+
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
+
+ + + EBICS Configuration + ebics.config + tree,form + {'active_test': False} + + +
diff --git a/account_ebics/views/ebics_file_format.xml b/account_ebics/views/ebics_file_format_views.xml similarity index 84% rename from account_ebics/views/ebics_file_format.xml rename to account_ebics/views/ebics_file_format_views.xml index fa31d6f..7e901ac 100644 --- a/account_ebics/views/ebics_file_format.xml +++ b/account_ebics/views/ebics_file_format_views.xml @@ -39,11 +39,4 @@ tree,form - - diff --git a/account_ebics/views/ebics_file.xml b/account_ebics/views/ebics_file_views.xml similarity index 88% rename from account_ebics/views/ebics_file.xml rename to account_ebics/views/ebics_file_views.xml index badf32c..36f4d7d 100644 --- a/account_ebics/views/ebics_file.xml +++ b/account_ebics/views/ebics_file_views.xml @@ -1,11 +1,6 @@ - - ebics.file.search ebics.file @@ -17,14 +12,13 @@ - + - @@ -44,7 +38,7 @@ - + @@ -75,7 +69,8 @@ - + + @@ -131,12 +126,6 @@ - - @@ -149,7 +138,7 @@ - + @@ -171,7 +160,8 @@ - + + @@ -206,10 +196,4 @@ - - diff --git a/account_ebics/views/ebics_userid_views.xml b/account_ebics/views/ebics_userid_views.xml new file mode 100644 index 0000000..268133e --- /dev/null +++ b/account_ebics/views/ebics_userid_views.xml @@ -0,0 +1,82 @@ + + + + + ebics.userid.tree + ebics.userid + + + + + + + + + + + + ebics.userid.form + ebics.userid + +
+
+
+ + + + + + + + + + + + + + + + + Distinguished Name attributes used to create self-signed X.509 certificates: + + + + + + + + + + + + + + + + + + + + + +
+
+
+ +
diff --git a/account_ebics/views/menu.xml b/account_ebics/views/menu.xml new file mode 100644 index 0000000..a2a2c6a --- /dev/null +++ b/account_ebics/views/menu.xml @@ -0,0 +1,58 @@ + + + + + + + + + + + + + + + + + + + + + + diff --git a/account_ebics/views/menuitem.xml b/account_ebics/views/menuitem.xml deleted file mode 100644 index 7bfca0e..0000000 --- a/account_ebics/views/menuitem.xml +++ /dev/null @@ -1,15 +0,0 @@ - - - - - - - - diff --git a/account_ebics/wizard/__init__.py b/account_ebics/wizards/__init__.py similarity index 100% rename from account_ebics/wizard/__init__.py rename to account_ebics/wizards/__init__.py diff --git a/account_ebics/wizard/account_bank_statement_import.py b/account_ebics/wizards/account_bank_statement_import.py similarity index 90% rename from account_ebics/wizard/account_bank_statement_import.py rename to account_ebics/wizards/account_bank_statement_import.py index 507e678..3e1d331 100644 --- a/account_ebics/wizard/account_bank_statement_import.py +++ b/account_ebics/wizards/account_bank_statement_import.py @@ -1,4 +1,4 @@ -# Copyright 2009-2019 Noviat. +# Copyright 2009-2020 Noviat. # License LGPL-3 or later (http://www.gnu.org/licenses/lpgl). import logging @@ -11,12 +11,12 @@ _logger = logging.getLogger(__name__) class AccountBankStatementImport(models.TransientModel): _inherit = 'account.bank.statement.import' - def _check_parsed_data(self, stmts_vals): + def _check_parsed_data(self, stmts_vals, account_number): """ Basic and structural verifications """ if self.env.context.get('active_model') == 'ebics.file': message = False if len(stmts_vals) == 0: - message = _('This file doesn\'t contain any statement.') + message = _("This file doesn't contain any statement.") if not message: no_st_line = True for vals in stmts_vals: @@ -31,7 +31,7 @@ class AccountBankStatementImport(models.TransientModel): ) + ':\n' + message _logger.warn(log_msg) return - super()._check_parsed_data(stmts_vals) + super()._check_parsed_data(stmts_vals, account_number) def _create_bank_statements(self, stmts_vals): """ diff --git a/account_ebics/wizard/ebics_change_passphrase.py b/account_ebics/wizards/ebics_change_passphrase.py similarity index 100% rename from account_ebics/wizard/ebics_change_passphrase.py rename to account_ebics/wizards/ebics_change_passphrase.py diff --git a/account_ebics/wizard/ebics_change_passphrase.xml b/account_ebics/wizards/ebics_change_passphrase.xml similarity index 100% rename from account_ebics/wizard/ebics_change_passphrase.xml rename to account_ebics/wizards/ebics_change_passphrase.xml diff --git a/account_ebics/wizard/ebics_xfer.py b/account_ebics/wizards/ebics_xfer.py similarity index 94% rename from account_ebics/wizard/ebics_xfer.py rename to account_ebics/wizards/ebics_xfer.py index 991bad2..902c978 100644 --- a/account_ebics/wizard/ebics_xfer.py +++ b/account_ebics/wizards/ebics_xfer.py @@ -47,8 +47,12 @@ class EbicsXfer(models.TransientModel): ebics_config_id = fields.Many2one( comodel_name='ebics.config', string='EBICS Configuration', - domain=[('state', '=', 'active')], + domain=[('state', '=', 'confirm')], default=lambda self: self._default_ebics_config_id()) + ebics_userid_id = fields.Many2one( + comodel_name='ebics.userid', + string='EBICS UserID', + required=True) ebics_passphrase = fields.Char( string='EBICS Passphrase') date_from = fields.Date() @@ -81,8 +85,8 @@ class EbicsXfer(models.TransientModel): def _default_ebics_config_id(self): cfg_mod = self.env['ebics.config'] cfg = cfg_mod.search( - [('company_id', '=', self.env.user.company_id.id), - ('state', '=', 'active')]) + [('company_ids', 'in', self.env.user.company_ids.ids), + ('state', '=', 'confirm')]) if cfg and len(cfg) == 1: return cfg else: @@ -94,7 +98,8 @@ class EbicsXfer(models.TransientModel): @api.onchange('ebics_config_id') def _onchange_ebics_config_id(self): - domain = {} + ebics_userids = self.ebics_config_id.ebics_userid_ids + domain = {'ebics_userid_id': [('id', 'in', ebics_userids.ids)]} if self._context.get('ebics_download'): download_formats = self.ebics_config_id.ebics_file_format_ids\ .filtered(lambda r: r.type == 'down') @@ -102,6 +107,13 @@ class EbicsXfer(models.TransientModel): self.format_id = download_formats domain['format_id'] = [('type', '=', 'down'), ('id', 'in', download_formats.ids)] + if len(ebics_userids) == 1: + self.ebics_userid_id = ebics_userids + else: + transport_users = ebics_userids.filtered( + lambda r: r.signature_class == 'T') + if len(transport_users) == 1: + self.ebics_userid_id = transport_users else: upload_formats = self.ebics_config_id.ebics_file_format_ids\ .filtered(lambda r: r.type == 'up') @@ -109,6 +121,8 @@ class EbicsXfer(models.TransientModel): self.format_id = upload_formats domain['format_id'] = [('type', '=', 'up'), ('id', 'in', upload_formats.ids)] + if len(ebics_userids) == 1: + self.ebics_userid_id = ebics_userids return {'domain': domain} @api.onchange('upload_data') @@ -298,7 +312,9 @@ class EbicsXfer(models.TransientModel): 'format_id': self.format_id.id, 'state': 'done', 'user_id': self._uid, + 'ebics_userid_id': self.ebics_userid_id.id, 'note': ef_note, + 'company_ids': [self.env.user.company_id.id], } self._update_ef_vals(ef_vals) ebics_file = self.env['ebics.file'].create(ef_vals) @@ -441,7 +457,8 @@ class EbicsXfer(models.TransientModel): tmp_dir = os.path.normpath(ebics_files_root + '/tmp') if not os.path.isdir(tmp_dir): os.makedirs(tmp_dir, mode=0o700) - fn_parts = [self.ebics_config_id.ebics_host] + fn_parts = [self.ebics_config_id.ebics_host, + self.ebics_config_id.ebics_partner] if docname: fn_parts.append(docname) else: @@ -479,6 +496,8 @@ class EbicsXfer(models.TransientModel): 'date_to': self.date_from, 'format_id': file_format.id, 'user_id': self._uid, + 'ebics_userid_id': self.ebics_userid_id.id, + 'company_ids': self.ebics_config_id.company_ids.ids, } self._update_ef_vals(ef_vals) ebics_file = self.env['ebics.file'].create(ef_vals) @@ -487,10 +506,7 @@ class EbicsXfer(models.TransientModel): def _check_duplicate_ebics_file(self, fn, file_format): dups = self.env['ebics.file'].search( [('name', '=', fn), - ('format_id', '=', file_format.id), - '|', - ('company_id', '=', self.env.user.company_id.id), - ('company_id', '=', False)]) + ('format_id', '=', file_format.id)]) return dups def _detect_upload_format(self): diff --git a/account_ebics/wizard/ebics_xfer.xml b/account_ebics/wizards/ebics_xfer.xml similarity index 92% rename from account_ebics/wizard/ebics_xfer.xml rename to account_ebics/wizards/ebics_xfer.xml index 337ca01..594e55e 100644 --- a/account_ebics/wizard/ebics_xfer.xml +++ b/account_ebics/wizards/ebics_xfer.xml @@ -10,6 +10,7 @@ + @@ -32,6 +33,7 @@ + @@ -86,7 +88,4 @@ - - -