2024-07-01 18:10:40 +02:00
|
|
|
"""Client serializers for the Meet core app."""
|
2024-07-30 16:48:26 +02:00
|
|
|
|
2024-07-10 21:16:07 +02:00
|
|
|
from django.conf import settings
|
2024-06-25 00:21:36 +02:00
|
|
|
from django.utils.translation import gettext_lazy as _
|
|
|
|
|
|
2024-01-09 15:30:36 +01:00
|
|
|
from rest_framework import serializers
|
2024-06-25 00:21:36 +02:00
|
|
|
from rest_framework.exceptions import PermissionDenied
|
2024-01-09 15:30:36 +01:00
|
|
|
|
2024-06-25 19:07:34 +02:00
|
|
|
from core import models, utils
|
2024-01-09 15:30:36 +01:00
|
|
|
|
|
|
|
|
|
|
|
|
|
class UserSerializer(serializers.ModelSerializer):
|
|
|
|
|
"""Serialize users."""
|
|
|
|
|
|
|
|
|
|
class Meta:
|
|
|
|
|
model = models.User
|
|
|
|
|
fields = ["id", "email"]
|
|
|
|
|
read_only_fields = ["id", "email"]
|
2024-06-25 00:21:36 +02:00
|
|
|
|
|
|
|
|
|
|
|
|
|
class ResourceAccessSerializerMixin:
|
|
|
|
|
"""
|
|
|
|
|
A serializer mixin to share controlling that the logged-in user submitting a room access object
|
|
|
|
|
is administrator on the targeted room.
|
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
# pylint: disable=too-many-boolean-expressions
|
|
|
|
|
def validate(self, data):
|
|
|
|
|
"""
|
|
|
|
|
Check access rights specific to writing (create/update)
|
|
|
|
|
"""
|
|
|
|
|
request = self.context.get("request", None)
|
|
|
|
|
user = getattr(request, "user", None)
|
|
|
|
|
if (
|
|
|
|
|
# Update
|
|
|
|
|
self.instance
|
|
|
|
|
and (
|
|
|
|
|
data["role"] == models.RoleChoices.OWNER
|
|
|
|
|
and not self.instance.resource.is_owner(user)
|
|
|
|
|
or self.instance.role == models.RoleChoices.OWNER
|
|
|
|
|
and not self.instance.user == user
|
|
|
|
|
)
|
|
|
|
|
) or (
|
|
|
|
|
# Create
|
|
|
|
|
not self.instance
|
|
|
|
|
and data.get("role") == models.RoleChoices.OWNER
|
|
|
|
|
and not data["resource"].is_owner(user)
|
|
|
|
|
):
|
|
|
|
|
raise PermissionDenied(
|
|
|
|
|
"Only owners of a room can assign other users as owners."
|
|
|
|
|
)
|
|
|
|
|
return data
|
|
|
|
|
|
|
|
|
|
def validate_resource(self, resource):
|
|
|
|
|
"""The logged-in user must be administrator of the resource."""
|
|
|
|
|
request = self.context.get("request", None)
|
|
|
|
|
user = getattr(request, "user", None)
|
|
|
|
|
|
|
|
|
|
if not (user and user.is_authenticated and resource.is_administrator(user)):
|
|
|
|
|
raise PermissionDenied(
|
|
|
|
|
_("You must be administrator or owner of a room to add accesses to it.")
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
return resource
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
class ResourceAccessSerializer(
|
|
|
|
|
ResourceAccessSerializerMixin, serializers.ModelSerializer
|
|
|
|
|
):
|
|
|
|
|
"""Serialize Room to User accesses for the API."""
|
|
|
|
|
|
|
|
|
|
class Meta:
|
|
|
|
|
model = models.ResourceAccess
|
|
|
|
|
fields = ["id", "user", "resource", "role"]
|
|
|
|
|
read_only_fields = ["id"]
|
|
|
|
|
|
|
|
|
|
def update(self, instance, validated_data):
|
|
|
|
|
"""Make "user" and "resource" fields readonly but only on update."""
|
|
|
|
|
validated_data.pop("resource", None)
|
|
|
|
|
validated_data.pop("user", None)
|
|
|
|
|
return super().update(instance, validated_data)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
class NestedResourceAccessSerializer(ResourceAccessSerializer):
|
|
|
|
|
"""Serialize Room accesses for the API with full nested user."""
|
|
|
|
|
|
|
|
|
|
user = UserSerializer(read_only=True)
|
|
|
|
|
|
|
|
|
|
|
2024-11-06 17:00:23 +01:00
|
|
|
class ListRoomSerializer(serializers.ModelSerializer):
|
|
|
|
|
"""Serialize Room model for a list API endpoint."""
|
|
|
|
|
|
|
|
|
|
class Meta:
|
|
|
|
|
model = models.Room
|
|
|
|
|
fields = ["id", "name", "slug", "is_public"]
|
|
|
|
|
read_only_fields = ["id", "slug"]
|
|
|
|
|
|
|
|
|
|
|
2024-06-25 00:21:36 +02:00
|
|
|
class RoomSerializer(serializers.ModelSerializer):
|
|
|
|
|
"""Serialize Room model for the API."""
|
|
|
|
|
|
|
|
|
|
class Meta:
|
|
|
|
|
model = models.Room
|
|
|
|
|
fields = ["id", "name", "slug", "configuration", "is_public"]
|
|
|
|
|
read_only_fields = ["id", "slug"]
|
|
|
|
|
|
|
|
|
|
def to_representation(self, instance):
|
|
|
|
|
"""
|
|
|
|
|
Add users only for administrator users.
|
|
|
|
|
Add LiveKit credentials for public instance or related users/groups
|
|
|
|
|
"""
|
|
|
|
|
output = super().to_representation(instance)
|
|
|
|
|
request = self.context.get("request")
|
|
|
|
|
|
|
|
|
|
if not request:
|
|
|
|
|
return output
|
|
|
|
|
|
|
|
|
|
role = instance.get_role(request.user)
|
|
|
|
|
is_admin = models.RoleChoices.check_administrator_role(role)
|
|
|
|
|
|
|
|
|
|
if role is not None:
|
|
|
|
|
access_serializer = NestedResourceAccessSerializer(
|
|
|
|
|
instance.accesses.select_related("resource", "user").all(),
|
|
|
|
|
context=self.context,
|
|
|
|
|
many=True,
|
|
|
|
|
)
|
|
|
|
|
output["accesses"] = access_serializer.data
|
|
|
|
|
|
|
|
|
|
if not is_admin:
|
|
|
|
|
del output["configuration"]
|
|
|
|
|
|
|
|
|
|
if role is not None or instance.is_public:
|
2024-06-25 19:07:34 +02:00
|
|
|
slug = f"{instance.id!s}".replace("-", "")
|
|
|
|
|
|
2024-08-07 16:25:54 +02:00
|
|
|
username = request.query_params.get("username", None)
|
2024-07-17 17:36:25 +02:00
|
|
|
|
2024-06-25 00:21:36 +02:00
|
|
|
output["livekit"] = {
|
2024-07-10 21:16:07 +02:00
|
|
|
"url": settings.LIVEKIT_CONFIGURATION["url"],
|
2024-06-25 19:07:34 +02:00
|
|
|
"room": slug,
|
2024-07-17 17:36:25 +02:00
|
|
|
"token": utils.generate_token(
|
|
|
|
|
room=slug, user=request.user, username=username
|
|
|
|
|
),
|
2024-06-25 00:21:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
output["is_administrable"] = is_admin
|
|
|
|
|
|
|
|
|
|
return output
|
2024-11-06 17:00:23 +01:00
|
|
|
|
|
|
|
|
|
|
|
|
|
class RecordingSerializer(serializers.ModelSerializer):
|
|
|
|
|
"""Serialize Recording for the API."""
|
|
|
|
|
|
|
|
|
|
room = ListRoomSerializer(read_only=True)
|
|
|
|
|
|
|
|
|
|
class Meta:
|
|
|
|
|
model = models.Recording
|
|
|
|
|
fields = ["id", "room", "created_at", "updated_at", "status"]
|
|
|
|
|
read_only_fields = fields
|