diff --git a/sql_request_abstract/models/sql_request_mixin.py b/sql_request_abstract/models/sql_request_mixin.py index c42b201a8..c85934c68 100644 --- a/sql_request_abstract/models/sql_request_mixin.py +++ b/sql_request_abstract/models/sql_request_mixin.py @@ -95,7 +95,6 @@ class SQLRequestMixin(models.AbstractModel): ) # Action Section - @api.multi def button_validate_sql_expression(self): for item in self: if item._clean_query_enabled: @@ -106,12 +105,10 @@ class SQLRequestMixin(models.AbstractModel): item._check_execution() item.state = "sql_valid" - @api.multi def button_set_draft(self): self.write({"state": "draft"}) # API Section - @api.multi def _execute_sql_request( self, params=None, @@ -229,7 +226,6 @@ class SQLRequestMixin(models.AbstractModel): % (minor_version) ) - @api.multi def _clean_query(self): self.ensure_one() query = self.query.strip() @@ -237,7 +233,6 @@ class SQLRequestMixin(models.AbstractModel): query = query[:-1] self.query = query - @api.multi def _check_prohibited_words(self): """Check if the query contains prohibited words, to avoid maliscious SQL requests""" @@ -255,7 +250,6 @@ class SQLRequestMixin(models.AbstractModel): % (word) ) - @api.multi def _check_execution(self): """Ensure that the query is valid, trying to execute it. A rollback is done after.""" @@ -273,7 +267,6 @@ class SQLRequestMixin(models.AbstractModel): self._rollback_savepoint(rollback_name) return res - @api.multi def _prepare_request_check_execution(self): """Overload me to replace some part of the query, if it contains parameters""" diff --git a/sql_request_abstract/readme/CONTRIBUTORS.rst b/sql_request_abstract/readme/CONTRIBUTORS.rst index 60e47e0b7..51b353221 100644 --- a/sql_request_abstract/readme/CONTRIBUTORS.rst +++ b/sql_request_abstract/readme/CONTRIBUTORS.rst @@ -1,2 +1,3 @@ * Florian da Costa * Sylvain LE GAL (https://twitter.com/legalsylvain) +* Alfadil Tabar (alfadil.tabar@gmail.com)