99 lines
3.9 KiB
Python
99 lines
3.9 KiB
Python
from extensions import db
|
|
from werkzeug.security import generate_password_hash, check_password_hash
|
|
|
|
class User(db.Model):
|
|
__tablename__ = "user"
|
|
|
|
id = db.Column(db.Integer, primary_key=True, autoincrement=True)
|
|
#dados basicos
|
|
username = db.Column(db.String(80), unique=True, nullable=True)
|
|
admission_date = db.Column(db.Date, nullable=True)
|
|
cargo = db.Column(db.String(80), nullable=True)
|
|
department = db.Column(db.String(80), nullable=True)
|
|
|
|
#contato
|
|
email = db.Column(db.String(120), unique=True, nullable=False)
|
|
password = db.Column(db.String(256), nullable=False)
|
|
status = db.Column(db.String(120), nullable=True, default="ativo")
|
|
|
|
profile_image = db.Column(db.String(255), nullable=True)
|
|
|
|
#escala id
|
|
shift_id = db.Column(db.Integer, db.ForeignKey('shift.id'), nullable=True)
|
|
|
|
created_at = db.Column(db.DateTime, default=db.func.current_timestamp())
|
|
updated_at = db.Column(db.DateTime, default=db.func.current_timestamp(), onupdate=db.func.current_timestamp())
|
|
|
|
#relacionamento service_instance
|
|
service_instance_id = db.Column(db.Integer, db.ForeignKey('service_instance.id'), nullable=True)
|
|
|
|
# Relacionamento hierárquico
|
|
parent_id = db.Column(db.Integer, db.ForeignKey('user.id'), nullable=True)
|
|
children = db.relationship("User", backref=db.backref('parent', remote_side=[id]), lazy=True)
|
|
|
|
# Relacionamento com Contato e Endereço
|
|
contacts = db.relationship('Contact', backref='user', lazy=True, cascade="all, delete-orphan")
|
|
addresses = db.relationship('Address', backref='user', lazy=True, cascade="all, delete-orphan")
|
|
|
|
|
|
# Relacionamento com ServiceRole (papéis do serviço)
|
|
service_roles = db.relationship(
|
|
"UserServiceRole",
|
|
backref="user_service_roles", # Renomeado para evitar conflito
|
|
lazy="dynamic",
|
|
cascade="all, delete-orphan"
|
|
)
|
|
|
|
# Relacionamento com ServiceRolePermission (permite buscar as permissões diretamente)
|
|
permissions = db.relationship(
|
|
"ServiceRolePermission",
|
|
primaryjoin="User.id == ServiceRolePermission.user_id", # Especificando a condição de junção
|
|
backref="user_permissions", # Renomeado para evitar conflito
|
|
lazy="dynamic",
|
|
cascade="all, delete-orphan"
|
|
)
|
|
|
|
# Relacionamento com Licenças
|
|
licenses = db.relationship(
|
|
"License",
|
|
backref="user_licenses", # Renomeado para evitar conflito
|
|
lazy="dynamic",
|
|
cascade="all, delete-orphan"
|
|
)
|
|
|
|
def __repr__(self):
|
|
return f"<User {self.username}>"
|
|
|
|
def set_password(self, password):
|
|
"""Gera o hash da senha"""
|
|
self.password = generate_password_hash(password)
|
|
|
|
def check_password(self, password):
|
|
"""Verifica se a senha é válida"""
|
|
return check_password_hash(self.password, password)
|
|
|
|
def has_permission(self, permission_name, service_instance_id=None):
|
|
"""Verifica se o usuário tem uma permissão específica."""
|
|
for perm in self.permissions:
|
|
if perm.permission.name == permission_name:
|
|
if service_instance_id is None or perm.service_instance_id == service_instance_id:
|
|
return True
|
|
return False
|
|
|
|
def has_role(self, role_name, service_instance_id=None):
|
|
"""Verifica se o usuário possui um papel específico em uma instância."""
|
|
for user_role in self.service_roles:
|
|
if user_role.service_role.name == role_name:
|
|
if service_instance_id is None or user_role.service_instance_id == service_instance_id:
|
|
return True
|
|
return False
|
|
|
|
def has_active_license(self, service_instance_id=None):
|
|
"""Verifica se o usuário possui uma licença ativa."""
|
|
for license in self.licenses:
|
|
if license.is_active() and (
|
|
service_instance_id is None or license.service_instance_id == service_instance_id
|
|
):
|
|
return True
|
|
return False
|