The new UI will display the number of accesses on each document.
/!\ Once team accesses will be used, this will not represent the number
of people with access anymore and will have to be improved by
computing the number of people in each team.
433 lines
14 KiB
Python
433 lines
14 KiB
Python
"""Client serializers for the impress core app."""
|
|
|
|
import mimetypes
|
|
|
|
from django.conf import settings
|
|
from django.db.models import Q
|
|
from django.utils.translation import gettext_lazy as _
|
|
|
|
import magic
|
|
from rest_framework import exceptions, serializers
|
|
|
|
from core import enums, models
|
|
from core.services.ai_services import AI_ACTIONS
|
|
|
|
|
|
class UserSerializer(serializers.ModelSerializer):
|
|
"""Serialize users."""
|
|
|
|
class Meta:
|
|
model = models.User
|
|
fields = ["id", "email", "full_name", "short_name"]
|
|
read_only_fields = ["id", "email", "full_name", "short_name"]
|
|
|
|
|
|
class BaseAccessSerializer(serializers.ModelSerializer):
|
|
"""Serialize template accesses."""
|
|
|
|
abilities = serializers.SerializerMethodField(read_only=True)
|
|
|
|
def update(self, instance, validated_data):
|
|
"""Make "user" field is readonly but only on update."""
|
|
validated_data.pop("user", None)
|
|
return super().update(instance, validated_data)
|
|
|
|
def get_abilities(self, access) -> dict:
|
|
"""Return abilities of the logged-in user on the instance."""
|
|
request = self.context.get("request")
|
|
if request:
|
|
return access.get_abilities(request.user)
|
|
return {}
|
|
|
|
def validate(self, attrs):
|
|
"""
|
|
Check access rights specific to writing (create/update)
|
|
"""
|
|
request = self.context.get("request")
|
|
user = getattr(request, "user", None)
|
|
role = attrs.get("role")
|
|
|
|
# Update
|
|
if self.instance:
|
|
can_set_role_to = self.instance.get_abilities(user)["set_role_to"]
|
|
|
|
if role and role not in can_set_role_to:
|
|
message = (
|
|
f"You are only allowed to set role to {', '.join(can_set_role_to)}"
|
|
if can_set_role_to
|
|
else "You are not allowed to set this role for this template."
|
|
)
|
|
raise exceptions.PermissionDenied(message)
|
|
|
|
# Create
|
|
else:
|
|
try:
|
|
resource_id = self.context["resource_id"]
|
|
except KeyError as exc:
|
|
raise exceptions.ValidationError(
|
|
"You must set a resource ID in kwargs to create a new access."
|
|
) from exc
|
|
|
|
if not self.Meta.model.objects.filter( # pylint: disable=no-member
|
|
Q(user=user) | Q(team__in=user.teams),
|
|
role__in=[models.RoleChoices.OWNER, models.RoleChoices.ADMIN],
|
|
**{self.Meta.resource_field_name: resource_id}, # pylint: disable=no-member
|
|
).exists():
|
|
raise exceptions.PermissionDenied(
|
|
"You are not allowed to manage accesses for this resource."
|
|
)
|
|
|
|
if (
|
|
role == models.RoleChoices.OWNER
|
|
and not self.Meta.model.objects.filter( # pylint: disable=no-member
|
|
Q(user=user) | Q(team__in=user.teams),
|
|
role=models.RoleChoices.OWNER,
|
|
**{self.Meta.resource_field_name: resource_id}, # pylint: disable=no-member
|
|
).exists()
|
|
):
|
|
raise exceptions.PermissionDenied(
|
|
"Only owners of a resource can assign other users as owners."
|
|
)
|
|
|
|
# pylint: disable=no-member
|
|
attrs[f"{self.Meta.resource_field_name}_id"] = self.context["resource_id"]
|
|
return attrs
|
|
|
|
|
|
class DocumentAccessSerializer(BaseAccessSerializer):
|
|
"""Serialize document accesses."""
|
|
|
|
user_id = serializers.PrimaryKeyRelatedField(
|
|
queryset=models.User.objects.all(),
|
|
write_only=True,
|
|
source="user",
|
|
required=False,
|
|
allow_null=True,
|
|
)
|
|
user = UserSerializer(read_only=True)
|
|
|
|
class Meta:
|
|
model = models.DocumentAccess
|
|
resource_field_name = "document"
|
|
fields = ["id", "user", "user_id", "team", "role", "abilities"]
|
|
read_only_fields = ["id", "abilities"]
|
|
|
|
|
|
class TemplateAccessSerializer(BaseAccessSerializer):
|
|
"""Serialize template accesses."""
|
|
|
|
class Meta:
|
|
model = models.TemplateAccess
|
|
resource_field_name = "template"
|
|
fields = ["id", "user", "team", "role", "abilities"]
|
|
read_only_fields = ["id", "abilities"]
|
|
|
|
|
|
class BaseResourceSerializer(serializers.ModelSerializer):
|
|
"""Serialize documents."""
|
|
|
|
abilities = serializers.SerializerMethodField(read_only=True)
|
|
accesses = TemplateAccessSerializer(many=True, read_only=True)
|
|
|
|
def get_abilities(self, document) -> dict:
|
|
"""Return abilities of the logged-in user on the instance."""
|
|
request = self.context.get("request")
|
|
if request:
|
|
return document.get_abilities(request.user)
|
|
return {}
|
|
|
|
|
|
class ListDocumentSerializer(BaseResourceSerializer):
|
|
"""Serialize documents with limited fields for display in lists."""
|
|
|
|
is_favorite = serializers.BooleanField(read_only=True)
|
|
nb_accesses = serializers.IntegerField(read_only=True)
|
|
|
|
class Meta:
|
|
model = models.Document
|
|
fields = [
|
|
"id",
|
|
"abilities",
|
|
"content",
|
|
"created_at",
|
|
"is_favorite",
|
|
"link_role",
|
|
"link_reach",
|
|
"nb_accesses",
|
|
"title",
|
|
"updated_at",
|
|
]
|
|
read_only_fields = [
|
|
"id",
|
|
"abilities",
|
|
"created_at",
|
|
"is_favorite",
|
|
"link_role",
|
|
"link_reach",
|
|
"nb_accesses",
|
|
"updated_at",
|
|
]
|
|
|
|
|
|
class DocumentSerializer(ListDocumentSerializer):
|
|
"""Serialize documents with all fields for display in detail views."""
|
|
|
|
content = serializers.CharField(required=False)
|
|
|
|
class Meta:
|
|
model = models.Document
|
|
fields = [
|
|
"id",
|
|
"abilities",
|
|
"content",
|
|
"created_at",
|
|
"is_favorite",
|
|
"link_role",
|
|
"link_reach",
|
|
"nb_accesses",
|
|
"title",
|
|
"updated_at",
|
|
]
|
|
read_only_fields = [
|
|
"id",
|
|
"abilities",
|
|
"created_at",
|
|
"is_avorite",
|
|
"link_role",
|
|
"link_reach",
|
|
"nb_accesses",
|
|
"updated_at",
|
|
]
|
|
|
|
def get_fields(self):
|
|
"""Dynamically make `id` read-only on PUT requests but writable on POST requests."""
|
|
fields = super().get_fields()
|
|
|
|
request = self.context.get("request")
|
|
if request and request.method == "POST":
|
|
fields["id"].read_only = False
|
|
|
|
return fields
|
|
|
|
def validate_id(self, value):
|
|
"""Ensure the provided ID does not already exist when creating a new document."""
|
|
request = self.context.get("request")
|
|
|
|
# Only check this on POST (creation)
|
|
if request and request.method == "POST":
|
|
if models.Document.objects.filter(id=value).exists():
|
|
raise serializers.ValidationError(
|
|
"A document with this ID already exists. You cannot override it."
|
|
)
|
|
|
|
return value
|
|
|
|
|
|
class LinkDocumentSerializer(BaseResourceSerializer):
|
|
"""
|
|
Serialize link configuration for documents.
|
|
We expose it separately from document in order to simplify and secure access control.
|
|
"""
|
|
|
|
class Meta:
|
|
model = models.Document
|
|
fields = [
|
|
"link_role",
|
|
"link_reach",
|
|
]
|
|
|
|
|
|
# Suppress the warning about not implementing `create` and `update` methods
|
|
# since we don't use a model and only rely on the serializer for validation
|
|
# pylint: disable=abstract-method
|
|
class FileUploadSerializer(serializers.Serializer):
|
|
"""Receive file upload requests."""
|
|
|
|
file = serializers.FileField()
|
|
|
|
def validate_file(self, file):
|
|
"""Add file size and type constraints as defined in settings."""
|
|
# Validate file size
|
|
if file.size > settings.DOCUMENT_IMAGE_MAX_SIZE:
|
|
max_size = settings.DOCUMENT_IMAGE_MAX_SIZE // (1024 * 1024)
|
|
raise serializers.ValidationError(
|
|
f"File size exceeds the maximum limit of {max_size:d} MB."
|
|
)
|
|
|
|
extension = file.name.rpartition(".")[-1] if "." in file.name else None
|
|
|
|
# Read the first few bytes to determine the MIME type accurately
|
|
mime = magic.Magic(mime=True)
|
|
magic_mime_type = mime.from_buffer(file.read(1024))
|
|
file.seek(0) # Reset file pointer to the beginning after reading
|
|
|
|
self.context["is_unsafe"] = (
|
|
magic_mime_type in settings.DOCUMENT_UNSAFE_MIME_TYPES
|
|
)
|
|
|
|
extension_mime_type, _ = mimetypes.guess_type(file.name)
|
|
|
|
# Try guessing a coherent extension from the mimetype
|
|
if extension_mime_type != magic_mime_type:
|
|
self.context["is_unsafe"] = True
|
|
|
|
guessed_ext = mimetypes.guess_extension(magic_mime_type)
|
|
# Missing extensions or extensions longer than 5 characters (it's as long as an extension
|
|
# can be) are replaced by the extension we eventually guessed from mimetype.
|
|
if (extension is None or len(extension) > 5) and guessed_ext:
|
|
extension = guessed_ext[1:]
|
|
|
|
if extension is None:
|
|
raise serializers.ValidationError("Could not determine file extension.")
|
|
|
|
self.context["expected_extension"] = extension
|
|
|
|
return file
|
|
|
|
def validate(self, attrs):
|
|
"""Override validate to add the computed extension to validated_data."""
|
|
attrs["expected_extension"] = self.context["expected_extension"]
|
|
attrs["is_unsafe"] = self.context["is_unsafe"]
|
|
return attrs
|
|
|
|
|
|
class TemplateSerializer(BaseResourceSerializer):
|
|
"""Serialize templates."""
|
|
|
|
class Meta:
|
|
model = models.Template
|
|
fields = [
|
|
"id",
|
|
"title",
|
|
"accesses",
|
|
"abilities",
|
|
"css",
|
|
"code",
|
|
"is_public",
|
|
]
|
|
read_only_fields = ["id", "accesses", "abilities"]
|
|
|
|
|
|
# pylint: disable=abstract-method
|
|
class DocumentGenerationSerializer(serializers.Serializer):
|
|
"""Serializer to receive a request to generate a document on a template."""
|
|
|
|
body = serializers.CharField(label=_("Body"))
|
|
body_type = serializers.ChoiceField(
|
|
choices=["html", "markdown"],
|
|
label=_("Body type"),
|
|
required=False,
|
|
default="html",
|
|
)
|
|
format = serializers.ChoiceField(
|
|
choices=["pdf", "docx"],
|
|
label=_("Format"),
|
|
required=False,
|
|
default="pdf",
|
|
)
|
|
|
|
|
|
class InvitationSerializer(serializers.ModelSerializer):
|
|
"""Serialize invitations."""
|
|
|
|
abilities = serializers.SerializerMethodField(read_only=True)
|
|
|
|
class Meta:
|
|
model = models.Invitation
|
|
fields = [
|
|
"id",
|
|
"abilities",
|
|
"created_at",
|
|
"email",
|
|
"document",
|
|
"role",
|
|
"issuer",
|
|
"is_expired",
|
|
]
|
|
read_only_fields = [
|
|
"id",
|
|
"abilities",
|
|
"created_at",
|
|
"document",
|
|
"issuer",
|
|
"is_expired",
|
|
]
|
|
|
|
def get_abilities(self, invitation) -> dict:
|
|
"""Return abilities of the logged-in user on the instance."""
|
|
request = self.context.get("request")
|
|
if request:
|
|
return invitation.get_abilities(request.user)
|
|
return {}
|
|
|
|
def validate(self, attrs):
|
|
"""Validate invitation data."""
|
|
request = self.context.get("request")
|
|
user = getattr(request, "user", None)
|
|
|
|
attrs["document_id"] = self.context["resource_id"]
|
|
|
|
# Only set the issuer if the instance is being created
|
|
if self.instance is None:
|
|
attrs["issuer"] = user
|
|
|
|
return attrs
|
|
|
|
def validate_role(self, role):
|
|
"""Custom validation for the role field."""
|
|
request = self.context.get("request")
|
|
user = getattr(request, "user", None)
|
|
document_id = self.context["resource_id"]
|
|
|
|
# If the role is OWNER, check if the user has OWNER access
|
|
if role == models.RoleChoices.OWNER:
|
|
if not models.DocumentAccess.objects.filter(
|
|
Q(user=user) | Q(team__in=user.teams),
|
|
document=document_id,
|
|
role=models.RoleChoices.OWNER,
|
|
).exists():
|
|
raise serializers.ValidationError(
|
|
"Only owners of a document can invite other users as owners."
|
|
)
|
|
|
|
return role
|
|
|
|
|
|
class VersionFilterSerializer(serializers.Serializer):
|
|
"""Validate version filters applied to the list endpoint."""
|
|
|
|
version_id = serializers.CharField(required=False, allow_blank=True)
|
|
page_size = serializers.IntegerField(
|
|
required=False, min_value=1, max_value=50, default=20
|
|
)
|
|
|
|
|
|
class AITransformSerializer(serializers.Serializer):
|
|
"""Serializer for AI transform requests."""
|
|
|
|
action = serializers.ChoiceField(choices=AI_ACTIONS, required=True)
|
|
text = serializers.CharField(required=True)
|
|
|
|
def validate_text(self, value):
|
|
"""Ensure the text field is not empty."""
|
|
|
|
if len(value.strip()) == 0:
|
|
raise serializers.ValidationError("Text field cannot be empty.")
|
|
return value
|
|
|
|
|
|
class AITranslateSerializer(serializers.Serializer):
|
|
"""Serializer for AI translate requests."""
|
|
|
|
language = serializers.ChoiceField(
|
|
choices=tuple(enums.ALL_LANGUAGES.items()), required=True
|
|
)
|
|
text = serializers.CharField(required=True)
|
|
|
|
def validate_text(self, value):
|
|
"""Ensure the text field is not empty."""
|
|
|
|
if len(value.strip()) == 0:
|
|
raise serializers.ValidationError("Text field cannot be empty.")
|
|
return value
|