def to_internal_value(self, data):
return data
-class SiteAllocationField(serializers.WritableField): # note: maybe just Field in rest_framework 3.x instead of WritableField
+class DictionaryField(serializers.WritableField): # note: maybe just Field in rest_framework 3.x instead of WritableField
+ def to_representation(self, obj):
+ return json.dumps(obj)
+
+ def to_internal_value(self, data):
+ return json.loads(data)
+
+class ListField(serializers.WritableField): # note: maybe just Field in rest_framework 3.x instead of WritableField
def to_representation(self, obj):
return json.dumps(obj)
sliceInfo = serializers.SerializerMethodField("getSliceInfo")\r
humanReadableName = serializers.SerializerMethodField("getHumanReadableName")\r
network_ports = NetworkPortsField(required=False)\r
- site_allocation = SiteAllocationField(required=False)\r
+ site_allocation = DictionaryField(required=False)\r
+ site_ready = DictionaryField(required=False)\r
+ users = ListField(required=False)\r
+ user_names = ListField(required=False) # readonly = True ?\r
+ current_user_can_see = serializers.SerializerMethodField("getCurrentUserCanSee")\r
+\r
+ def getCurrentUserCanSee(self, slice):\r
+ # user can 'see' the slice if he is the creator or he has a role\r
+ current_user = self.context['request'].user\r
+ if (slice.creator and slice.creator==current_user):\r
+ return True;\r
+ return (len(slice.getSliceInfo(current_user)["roles"]) > 0)\r
\r
def getSliceInfo(self, slice):\r
return slice.getSliceInfo(user=self.context['request'].user)\r
return str(obj)\r
\r
networks = serializers.PrimaryKeyRelatedField(many=True, read_only=True)\r
-# availableNetworks = serializers.PrimaryKeyRelatedField(many=True, read_only=True, view_name='network-detail')\r
\r
class Meta:\r
model = SlicePlus\r
- fields = ('humanReadableName', 'id','created','updated','enacted','name','enabled','omf_friendly','description','slice_url','site','max_slivers','image_preference','service','network','mount_data_sets',
- 'serviceClass','creator','networks','sliceInfo','network_ports','backendIcon','backendHtml','site_allocation')
+ fields = ('humanReadableName', 'id','created','updated','enacted','name','enabled','omf_friendly','description','slice_url','site','max_slivers','service','network','mount_data_sets',
+ 'default_image', 'default_flavor',
+ 'serviceClass','creator','networks','sliceInfo','network_ports','backendIcon','backendHtml','site_allocation','site_ready','users',"user_names","current_user_can_see")
-class SlicePlusList(PlusListCreateAPIView): #generics.ListCreateAPIView):
+class SlicePlusList(PlusListCreateAPIView):
queryset = SlicePlus.objects.select_related().all()
serializer_class = SlicePlusIdSerializer
method_name = "slicesplus"
def get_queryset(self):
- return SlicePlus.select_by_user(self.request.user)
+ current_user_can_see = self.request.QUERY_PARAMS.get('current_user_can_see', False)
+
+ slices = SlicePlus.select_by_user(self.request.user)
+
+ # If current_user_can_see is set, then filter the queryset to return
+ # only those slices that the user is either creator or has privilege
+ # on.
+ if (current_user_can_see):
+ slice_ids = []
+ for slice in slices:
+ if (self.request.user == slice.creator) or (len(slice.getSliceInfo(self.request.user)["roles"]) > 0):
+ slice_ids.append(slice.id)
+
+ slices = SlicePlus.objects.filter(id__in=slice_ids)
+
+ return slices
class SlicePlusDetail(PlusRetrieveUpdateDestroyAPIView):
queryset = SlicePlus.objects.select_related().all()