2016-08-19 14:44:58 +02:00
|
|
|
import json
|
2015-09-05 17:52:40 +02:00
|
|
|
import uuid
|
2015-06-29 12:08:15 +02:00
|
|
|
from collections import OrderedDict
|
|
|
|
from operator import attrgetter
|
2016-09-09 00:50:27 +02:00
|
|
|
from textwrap import dedent
|
2017-09-26 14:19:48 +02:00
|
|
|
from typing import Any, Dict, List, cast # noqa
|
2015-02-14 10:10:08 +01:00
|
|
|
|
2015-07-01 17:48:41 +02:00
|
|
|
from django.apps import apps
|
2015-06-18 21:48:20 +02:00
|
|
|
from django.conf import settings
|
2015-09-14 23:16:31 +02:00
|
|
|
from django.db.models import F
|
2015-06-29 12:08:15 +02:00
|
|
|
from django.http import Http404, HttpResponse
|
2015-09-24 21:28:30 +02:00
|
|
|
from django.utils.timezone import now
|
2016-10-17 16:56:19 +02:00
|
|
|
from django.utils.translation import ugettext as _
|
2017-08-24 12:26:55 +02:00
|
|
|
from mypy_extensions import TypedDict
|
2013-03-01 17:13:12 +01:00
|
|
|
|
2017-12-01 10:10:35 +01:00
|
|
|
from .. import __license__ as license
|
|
|
|
from .. import __url__ as url
|
2016-10-17 16:56:19 +02:00
|
|
|
from .. import __version__ as version
|
|
|
|
from ..utils import views as utils_views
|
2017-01-26 15:34:24 +01:00
|
|
|
from ..utils.auth import anonymous_is_enabled, has_perm
|
2016-11-08 21:29:26 +01:00
|
|
|
from ..utils.autoupdate import inform_changed_data, inform_deleted_data
|
2016-10-17 16:56:19 +02:00
|
|
|
from ..utils.plugins import (
|
2015-06-18 21:48:20 +02:00
|
|
|
get_plugin_description,
|
2017-12-01 10:10:35 +01:00
|
|
|
get_plugin_license,
|
|
|
|
get_plugin_url,
|
2015-06-18 21:48:20 +02:00
|
|
|
get_plugin_verbose_name,
|
|
|
|
get_plugin_version,
|
|
|
|
)
|
2016-10-17 16:56:19 +02:00
|
|
|
from ..utils.rest_api import (
|
2015-02-18 01:45:39 +01:00
|
|
|
ModelViewSet,
|
|
|
|
Response,
|
2015-06-29 12:08:15 +02:00
|
|
|
SimpleMetadata,
|
2015-02-18 01:45:39 +01:00
|
|
|
ValidationError,
|
2015-06-16 10:37:23 +02:00
|
|
|
detail_route,
|
2016-10-17 16:56:19 +02:00
|
|
|
list_route,
|
2015-02-18 01:45:39 +01:00
|
|
|
)
|
2016-02-11 22:58:32 +01:00
|
|
|
from .access_permissions import (
|
|
|
|
ChatMessageAccessPermissions,
|
|
|
|
ConfigAccessPermissions,
|
2016-10-21 11:05:24 +02:00
|
|
|
CountdownAccessPermissions,
|
2016-02-11 22:58:32 +01:00
|
|
|
ProjectorAccessPermissions,
|
2016-10-21 11:05:24 +02:00
|
|
|
ProjectorMessageAccessPermissions,
|
2016-02-11 22:58:32 +01:00
|
|
|
TagAccessPermissions,
|
|
|
|
)
|
2015-06-29 12:08:15 +02:00
|
|
|
from .config import config
|
|
|
|
from .exceptions import ConfigError, ConfigNotFound
|
2016-10-21 11:05:24 +02:00
|
|
|
from .models import (
|
|
|
|
ChatMessage,
|
|
|
|
ConfigStore,
|
|
|
|
Countdown,
|
|
|
|
ProjectionDefault,
|
|
|
|
Projector,
|
|
|
|
ProjectorMessage,
|
|
|
|
Tag,
|
|
|
|
)
|
2013-12-09 23:56:01 +01:00
|
|
|
|
|
|
|
|
2015-07-01 23:18:48 +02:00
|
|
|
# Special Django views
|
|
|
|
|
2017-09-28 09:35:05 +02:00
|
|
|
class IndexView(utils_views.CSRFMixin, utils_views.TemplateView):
|
2015-01-30 11:58:36 +01:00
|
|
|
"""
|
|
|
|
The primary view for OpenSlides using AngularJS.
|
|
|
|
|
|
|
|
The default base template is 'openslides/core/static/templates/index.html'.
|
|
|
|
You can override it by simply adding a custom 'templates/index.html' file
|
|
|
|
to the custom staticfiles directory. See STATICFILES_DIRS in settings.py.
|
|
|
|
"""
|
2017-09-26 14:19:48 +02:00
|
|
|
template_name = 'templates/index.html'
|
2015-01-30 11:58:36 +01:00
|
|
|
|
|
|
|
|
2017-09-28 09:35:05 +02:00
|
|
|
class ProjectorView(utils_views.TemplateView):
|
2015-06-17 09:45:00 +02:00
|
|
|
"""
|
2015-10-21 22:44:07 +02:00
|
|
|
The primary view for OpenSlides projector using AngularJS.
|
|
|
|
|
2016-08-25 16:40:34 +02:00
|
|
|
The projector container template is 'openslides/core/static/templates/projector-container.html'.
|
|
|
|
This container is for controlling the projector resolution.
|
|
|
|
"""
|
2017-09-26 14:19:48 +02:00
|
|
|
template_name = 'templates/projector-container.html'
|
2016-08-25 16:40:34 +02:00
|
|
|
|
|
|
|
|
2017-09-28 09:35:05 +02:00
|
|
|
class RealProjectorView(utils_views.TemplateView):
|
2016-08-25 16:40:34 +02:00
|
|
|
"""
|
|
|
|
The original view without resolutioncontrol for OpenSlides projector using AngularJS.
|
|
|
|
|
2015-10-21 22:44:07 +02:00
|
|
|
The default base template is 'openslides/core/static/templates/projector.html'.
|
|
|
|
You can override it by simply adding a custom 'templates/projector.html'
|
|
|
|
file to the custom staticfiles directory. See STATICFILES_DIRS in
|
|
|
|
settings.py.
|
2015-06-17 09:45:00 +02:00
|
|
|
"""
|
2017-09-26 14:19:48 +02:00
|
|
|
template_name = 'templates/projector.html'
|
2015-06-17 09:45:00 +02:00
|
|
|
|
|
|
|
|
2016-09-09 00:50:27 +02:00
|
|
|
class WebclientJavaScriptView(utils_views.View):
|
2015-07-01 23:18:48 +02:00
|
|
|
"""
|
2016-09-09 00:50:27 +02:00
|
|
|
This view returns JavaScript code for the main entry point in the
|
|
|
|
AngularJS app for the requested realm (site or projector). Also code
|
|
|
|
for plugins is appended. The result is not uglified.
|
2015-07-01 23:18:48 +02:00
|
|
|
"""
|
2018-01-16 16:02:23 +01:00
|
|
|
cache = {} # type: Dict[str, str]
|
|
|
|
|
2017-09-26 14:19:48 +02:00
|
|
|
def __init__(self, *args: Any, **kwargs: Any) -> None:
|
|
|
|
super().__init__(*args, **kwargs)
|
2018-01-16 16:02:23 +01:00
|
|
|
|
|
|
|
if 'site' not in self.cache:
|
|
|
|
self.init_cache('site')
|
|
|
|
if 'projector' not in self.cache:
|
|
|
|
self.init_cache('projector')
|
2017-09-26 14:19:48 +02:00
|
|
|
|
|
|
|
def init_cache(self, realm: str) -> None:
|
|
|
|
angular_modules = [] # type: List[str]
|
2017-08-24 12:26:55 +02:00
|
|
|
js_files = [] # type: List[str]
|
2015-07-01 23:18:48 +02:00
|
|
|
for app_config in apps.get_app_configs():
|
2016-09-09 00:50:27 +02:00
|
|
|
# Add the angular app if the module has one.
|
|
|
|
if getattr(app_config, 'angular_{}_module'.format(realm), False):
|
|
|
|
angular_modules.append('OpenSlidesApp.{app_name}.{realm}'.format(
|
|
|
|
app_name=app_config.label,
|
|
|
|
realm=realm))
|
|
|
|
|
|
|
|
# Add all JavaScript files that the module needs. Our core apps
|
|
|
|
# are delivered by an extra file js/openslides.js which can be
|
|
|
|
# created via gulp.
|
|
|
|
core_apps = (
|
|
|
|
'openslides.core',
|
|
|
|
'openslides.agenda',
|
|
|
|
'openslides.motions',
|
|
|
|
'openslides.assignments',
|
|
|
|
'openslides.users',
|
|
|
|
'openslides.mediafiles',
|
|
|
|
)
|
|
|
|
if app_config.name not in core_apps:
|
|
|
|
try:
|
|
|
|
app_js_files = app_config.js_files
|
|
|
|
except AttributeError:
|
|
|
|
# The app needs no JavaScript files.
|
|
|
|
pass
|
|
|
|
else:
|
|
|
|
js_files.extend(app_js_files)
|
|
|
|
|
2017-01-20 10:23:14 +01:00
|
|
|
# angular constants
|
|
|
|
angular_constants = ''
|
|
|
|
for app in apps.get_app_configs():
|
2016-12-01 15:21:11 +01:00
|
|
|
try:
|
2017-01-20 10:23:14 +01:00
|
|
|
# Each app can deliver values to angular when implementing this method.
|
|
|
|
# It should return a list with dicts containing the 'name' and 'value'.
|
|
|
|
get_angular_constants = app.get_angular_constants
|
2016-12-01 15:21:11 +01:00
|
|
|
except AttributeError:
|
2017-01-20 10:23:14 +01:00
|
|
|
# The app doesn't have this method. Continue to next app.
|
|
|
|
continue
|
|
|
|
for constant in get_angular_constants():
|
|
|
|
value = json.dumps(constant['value'])
|
|
|
|
name = constant['name']
|
|
|
|
angular_constants += ".constant('{}', {})".format(name, value)
|
2016-12-01 15:21:11 +01:00
|
|
|
|
2016-09-09 00:50:27 +02:00
|
|
|
# Use JavaScript loadScript function from
|
2015-07-06 09:19:42 +02:00
|
|
|
# http://balpha.de/2011/10/jquery-script-insertion-and-its-consequences-for-debugging/
|
2016-09-09 00:50:27 +02:00
|
|
|
# jQuery is required.
|
|
|
|
content = dedent(
|
2015-07-06 09:19:42 +02:00
|
|
|
"""
|
2016-09-09 00:50:27 +02:00
|
|
|
(function () {
|
|
|
|
var loadScript = function (path) {
|
|
|
|
var result = $.Deferred(),
|
|
|
|
script = document.createElement("script");
|
|
|
|
script.async = "async";
|
|
|
|
script.type = "text/javascript";
|
|
|
|
script.src = path;
|
|
|
|
script.onload = script.onreadystatechange = function(_, isAbort) {
|
|
|
|
if (!script.readyState || /loaded|complete/.test(script.readyState)) {
|
|
|
|
if (isAbort)
|
|
|
|
result.reject();
|
|
|
|
else
|
|
|
|
result.resolve();
|
|
|
|
}
|
|
|
|
};
|
|
|
|
script.onerror = function () { result.reject(); };
|
|
|
|
$("head")[0].appendChild(script);
|
|
|
|
return result.promise();
|
2015-07-06 09:19:42 +02:00
|
|
|
};
|
|
|
|
""" +
|
2015-09-05 16:08:40 +02:00
|
|
|
"""
|
2017-01-20 10:23:14 +01:00
|
|
|
angular.module('OpenSlidesApp.{realm}', {angular_modules}){angular_constants};
|
2016-09-09 00:50:27 +02:00
|
|
|
var deferres = [];
|
|
|
|
{js_files}.forEach( function(js_file) {{ deferres.push(loadScript(js_file)); }} );
|
|
|
|
$.when.apply(this,deferres).done( function() {{
|
|
|
|
angular.bootstrap(document,['OpenSlidesApp.{realm}']);
|
|
|
|
}} );
|
2017-01-20 10:23:14 +01:00
|
|
|
""".format(realm=realm, angular_modules=angular_modules, angular_constants=angular_constants, js_files=js_files) +
|
2015-09-05 16:08:40 +02:00
|
|
|
"""
|
2016-09-09 00:50:27 +02:00
|
|
|
}());
|
2017-09-26 14:19:48 +02:00
|
|
|
""").replace('\n', '')
|
2017-09-26 14:19:48 +02:00
|
|
|
self.cache[realm] = content
|
2016-09-09 00:50:27 +02:00
|
|
|
|
2017-09-26 14:19:48 +02:00
|
|
|
def get(self, *args: Any, **kwargs: Any) -> HttpResponse:
|
|
|
|
realm = cast(str, kwargs.get('realm')) # Result is 'site' or 'projector'
|
|
|
|
return HttpResponse(self.cache[realm], content_type='application/javascript')
|
2015-07-01 23:18:48 +02:00
|
|
|
|
|
|
|
|
|
|
|
# Viewsets for the REST API
|
|
|
|
|
2016-09-12 11:05:34 +02:00
|
|
|
class ProjectorViewSet(ModelViewSet):
|
2015-02-18 01:45:39 +01:00
|
|
|
"""
|
2015-07-01 23:18:48 +02:00
|
|
|
API endpoint for the projector slide info.
|
|
|
|
|
2017-02-27 15:37:01 +01:00
|
|
|
There are the following views: See strings in check_view_permissions().
|
2015-02-18 01:45:39 +01:00
|
|
|
"""
|
2016-02-11 22:58:32 +01:00
|
|
|
access_permissions = ProjectorAccessPermissions()
|
2015-02-18 01:45:39 +01:00
|
|
|
queryset = Projector.objects.all()
|
|
|
|
|
2015-07-01 23:18:48 +02:00
|
|
|
def check_view_permissions(self):
|
2015-02-18 01:45:39 +01:00
|
|
|
"""
|
2015-07-01 23:18:48 +02:00
|
|
|
Returns True if the user has required permissions.
|
2015-02-18 01:45:39 +01:00
|
|
|
"""
|
2016-09-17 22:26:23 +02:00
|
|
|
if self.action in ('list', 'retrieve'):
|
|
|
|
result = self.get_access_permissions().check_permissions(self.request.user)
|
|
|
|
elif self.action == 'metadata':
|
2017-01-26 15:34:24 +01:00
|
|
|
result = has_perm(self.request.user, 'core.can_see_projector')
|
2016-09-29 15:32:58 +02:00
|
|
|
elif self.action in (
|
|
|
|
'create', 'update', 'partial_update', 'destroy',
|
|
|
|
'activate_elements', 'prune_elements', 'update_elements', 'deactivate_elements', 'clear_elements',
|
|
|
|
'control_view', 'set_resolution', 'set_scroll', 'control_blank', 'broadcast',
|
|
|
|
'set_projectiondefault',
|
|
|
|
):
|
2017-01-26 15:34:24 +01:00
|
|
|
result = (has_perm(self.request.user, 'core.can_see_projector') and
|
|
|
|
has_perm(self.request.user, 'core.can_manage_projector'))
|
2015-07-01 23:18:48 +02:00
|
|
|
else:
|
|
|
|
result = False
|
|
|
|
return result
|
2015-02-18 01:45:39 +01:00
|
|
|
|
2016-09-12 11:05:34 +02:00
|
|
|
def destroy(self, *args, **kwargs):
|
2016-11-19 13:04:24 +01:00
|
|
|
"""
|
|
|
|
REST API operation for DELETE requests.
|
|
|
|
|
|
|
|
Assigns all ProjectionDefault objects from this projector to the
|
|
|
|
default projector (pk=1). Resets broadcast if set to this projector.
|
|
|
|
"""
|
2016-09-12 11:05:34 +02:00
|
|
|
projector_instance = self.get_object()
|
2016-09-29 15:32:58 +02:00
|
|
|
for projection_default in ProjectionDefault.objects.all():
|
|
|
|
if projection_default.projector.id == projector_instance.id:
|
|
|
|
projection_default.projector_id = 1
|
|
|
|
projection_default.save()
|
2016-11-19 13:04:24 +01:00
|
|
|
if config['projector_broadcast'] == projector_instance.pk:
|
|
|
|
config['projector_broadcast'] = 0
|
2016-09-12 11:05:34 +02:00
|
|
|
return super(ProjectorViewSet, self).destroy(*args, **kwargs)
|
|
|
|
|
2015-02-18 01:45:39 +01:00
|
|
|
@detail_route(methods=['post'])
|
|
|
|
def activate_elements(self, request, pk):
|
|
|
|
"""
|
|
|
|
REST API operation to activate projector elements. It expects a POST
|
|
|
|
request to /rest/core/projector/<pk>/activate_elements/ with a list
|
2015-09-06 13:28:25 +02:00
|
|
|
of dictionaries to be appended to the projector config entry.
|
2015-02-18 01:45:39 +01:00
|
|
|
"""
|
2015-09-06 13:28:25 +02:00
|
|
|
if not isinstance(request.data, list):
|
2016-02-06 00:02:22 +01:00
|
|
|
raise ValidationError({'detail': 'Data must be a list.'})
|
2015-09-06 13:28:25 +02:00
|
|
|
|
2015-02-18 01:45:39 +01:00
|
|
|
projector_instance = self.get_object()
|
|
|
|
projector_config = projector_instance.config
|
2015-09-06 13:28:25 +02:00
|
|
|
for element in request.data:
|
|
|
|
if element.get('name') is None:
|
2016-02-06 00:02:22 +01:00
|
|
|
raise ValidationError({'detail': 'Invalid projector element. Name is missing.'})
|
2015-09-06 13:28:25 +02:00
|
|
|
projector_config[uuid.uuid4().hex] = element
|
|
|
|
|
2015-02-18 01:45:39 +01:00
|
|
|
serializer = self.get_serializer(projector_instance, data={'config': projector_config}, partial=False)
|
|
|
|
serializer.is_valid(raise_exception=True)
|
|
|
|
serializer.save()
|
|
|
|
return Response(serializer.data)
|
|
|
|
|
|
|
|
@detail_route(methods=['post'])
|
|
|
|
def prune_elements(self, request, pk):
|
|
|
|
"""
|
|
|
|
REST API operation to activate projector elements. It expects a POST
|
|
|
|
request to /rest/core/projector/<pk>/prune_elements/ with a list of
|
|
|
|
dictionaries to write them to the projector config entry. All old
|
|
|
|
entries are deleted but not entries with stable == True.
|
|
|
|
"""
|
2015-09-06 13:28:25 +02:00
|
|
|
if not isinstance(request.data, list):
|
2016-02-06 00:02:22 +01:00
|
|
|
raise ValidationError({'detail': 'Data must be a list.'})
|
2015-09-06 13:28:25 +02:00
|
|
|
|
2015-02-18 01:45:39 +01:00
|
|
|
projector_instance = self.get_object()
|
2015-09-06 13:28:25 +02:00
|
|
|
projector_config = {}
|
|
|
|
for key, value in projector_instance.config.items():
|
|
|
|
if value.get('stable'):
|
|
|
|
projector_config[key] = value
|
|
|
|
for element in request.data:
|
|
|
|
if element.get('name') is None:
|
2016-02-06 00:02:22 +01:00
|
|
|
raise ValidationError({'detail': 'Invalid projector element. Name is missing.'})
|
2015-09-06 13:28:25 +02:00
|
|
|
projector_config[uuid.uuid4().hex] = element
|
|
|
|
|
2015-02-18 01:45:39 +01:00
|
|
|
serializer = self.get_serializer(projector_instance, data={'config': projector_config}, partial=False)
|
|
|
|
serializer.is_valid(raise_exception=True)
|
|
|
|
serializer.save()
|
|
|
|
return Response(serializer.data)
|
|
|
|
|
|
|
|
@detail_route(methods=['post'])
|
2015-09-05 17:52:40 +02:00
|
|
|
def update_elements(self, request, pk):
|
2015-02-18 01:45:39 +01:00
|
|
|
"""
|
2015-09-05 17:52:40 +02:00
|
|
|
REST API operation to update projector elements. It expects a POST
|
2015-09-14 23:16:31 +02:00
|
|
|
request to /rest/core/projector/<pk>/update_elements/ with a
|
|
|
|
dictonary to update the projector config. This must be a dictionary
|
|
|
|
with UUIDs as keys and projector element dictionaries as values.
|
|
|
|
|
|
|
|
Example:
|
|
|
|
|
|
|
|
{
|
|
|
|
"191c0878cdc04abfbd64f3177a21891a": {
|
|
|
|
"name": "core/countdown",
|
|
|
|
"stable": true,
|
|
|
|
"status": "running",
|
|
|
|
"countdown_time": 1374321600.0,
|
|
|
|
"visable": true,
|
|
|
|
"default": 42
|
|
|
|
}
|
|
|
|
}
|
2015-02-18 01:45:39 +01:00
|
|
|
"""
|
2015-09-06 13:28:25 +02:00
|
|
|
if not isinstance(request.data, dict):
|
2016-02-06 00:02:22 +01:00
|
|
|
raise ValidationError({'detail': 'Data must be a dictionary.'})
|
|
|
|
error = {'detail': 'Data must be a dictionary with UUIDs as keys and dictionaries as values.'}
|
2015-09-06 13:28:25 +02:00
|
|
|
for key, value in request.data.items():
|
2015-09-05 17:52:40 +02:00
|
|
|
try:
|
2015-09-06 13:28:25 +02:00
|
|
|
uuid.UUID(hex=str(key))
|
2015-09-05 17:52:40 +02:00
|
|
|
except ValueError:
|
|
|
|
raise ValidationError(error)
|
2015-09-06 13:28:25 +02:00
|
|
|
if not isinstance(value, dict):
|
2015-09-05 17:52:40 +02:00
|
|
|
raise ValidationError(error)
|
2015-02-18 01:45:39 +01:00
|
|
|
|
|
|
|
projector_instance = self.get_object()
|
|
|
|
projector_config = projector_instance.config
|
2015-09-06 13:28:25 +02:00
|
|
|
for key, value in request.data.items():
|
|
|
|
if key not in projector_config:
|
2016-02-06 00:02:22 +01:00
|
|
|
raise ValidationError({'detail': 'Invalid projector element. Wrong UUID.'})
|
2015-09-05 23:32:10 +02:00
|
|
|
projector_config[key].update(request.data[key])
|
2015-09-06 13:28:25 +02:00
|
|
|
|
2015-09-05 17:52:40 +02:00
|
|
|
serializer = self.get_serializer(projector_instance, data={'config': projector_config}, partial=False)
|
|
|
|
serializer.is_valid(raise_exception=True)
|
|
|
|
serializer.save()
|
|
|
|
return Response(serializer.data)
|
|
|
|
|
|
|
|
@detail_route(methods=['post'])
|
|
|
|
def deactivate_elements(self, request, pk):
|
|
|
|
"""
|
|
|
|
REST API operation to deactivate projector elements. It expects a
|
|
|
|
POST request to /rest/core/projector/<pk>/deactivate_elements/ with
|
|
|
|
a list of hex UUIDs. These are the projector_elements in the config
|
|
|
|
that should be deleted.
|
|
|
|
"""
|
|
|
|
if not isinstance(request.data, list):
|
2016-02-06 00:02:22 +01:00
|
|
|
raise ValidationError({'detail': 'Data must be a list of hex UUIDs.'})
|
2015-09-05 17:52:40 +02:00
|
|
|
for item in request.data:
|
2015-02-18 01:45:39 +01:00
|
|
|
try:
|
2015-09-05 17:52:40 +02:00
|
|
|
uuid.UUID(hex=str(item))
|
2015-02-18 01:45:39 +01:00
|
|
|
except ValueError:
|
2016-02-06 00:02:22 +01:00
|
|
|
raise ValidationError({'detail': 'Data must be a list of hex UUIDs.'})
|
2015-09-05 17:52:40 +02:00
|
|
|
|
|
|
|
projector_instance = self.get_object()
|
2015-09-06 13:28:25 +02:00
|
|
|
projector_config = projector_instance.config
|
|
|
|
for key in request.data:
|
|
|
|
try:
|
|
|
|
del projector_config[key]
|
|
|
|
except KeyError:
|
2016-02-06 00:02:22 +01:00
|
|
|
raise ValidationError({'detail': 'Invalid UUID.'})
|
2015-09-06 13:28:25 +02:00
|
|
|
|
|
|
|
serializer = self.get_serializer(projector_instance, data={'config': projector_config}, partial=False)
|
2015-02-18 01:45:39 +01:00
|
|
|
serializer.is_valid(raise_exception=True)
|
|
|
|
serializer.save()
|
|
|
|
return Response(serializer.data)
|
|
|
|
|
|
|
|
@detail_route(methods=['post'])
|
|
|
|
def clear_elements(self, request, pk):
|
|
|
|
"""
|
|
|
|
REST API operation to deactivate all projector elements but not
|
|
|
|
entries with stable == True. It expects a POST request to
|
|
|
|
/rest/core/projector/<pk>/clear_elements/.
|
|
|
|
"""
|
|
|
|
projector_instance = self.get_object()
|
2015-09-06 13:28:25 +02:00
|
|
|
projector_config = {}
|
|
|
|
for key, value in projector_instance.config.items():
|
|
|
|
if value.get('stable'):
|
|
|
|
projector_config[key] = value
|
|
|
|
|
2015-02-18 01:45:39 +01:00
|
|
|
serializer = self.get_serializer(projector_instance, data={'config': projector_config}, partial=False)
|
|
|
|
serializer.is_valid(raise_exception=True)
|
|
|
|
serializer.save()
|
|
|
|
return Response(serializer.data)
|
|
|
|
|
2016-08-25 16:40:34 +02:00
|
|
|
@detail_route(methods=['post'])
|
|
|
|
def set_resolution(self, request, pk):
|
|
|
|
"""
|
|
|
|
REST API operation to set the resolution.
|
|
|
|
|
|
|
|
It is actually unused, because the resolution is currently set in the config.
|
|
|
|
But with the multiprojector feature this will become importent to set the
|
|
|
|
resolution per projector individually.
|
|
|
|
|
|
|
|
It expects a POST request to
|
|
|
|
/rest/core/projector/<pk>/set_resolution/ with a dictionary with the width
|
|
|
|
and height and the values.
|
|
|
|
|
|
|
|
Example:
|
|
|
|
|
|
|
|
{
|
|
|
|
"width": "1024",
|
|
|
|
"height": "768"
|
|
|
|
}
|
|
|
|
"""
|
|
|
|
if not isinstance(request.data, dict):
|
|
|
|
raise ValidationError({'detail': 'Data must be a dictionary.'})
|
|
|
|
if request.data.get('width') is None or request.data.get('height') is None:
|
|
|
|
raise ValidationError({'detail': 'A width and a height have to be given.'})
|
|
|
|
if not isinstance(request.data['width'], int) or not isinstance(request.data['height'], int):
|
|
|
|
raise ValidationError({'detail': 'Data has to be integers.'})
|
|
|
|
if (request.data['width'] < 800 or request.data['width'] > 3840 or
|
2017-06-21 13:09:20 +02:00
|
|
|
request.data['height'] < 340 or request.data['height'] > 2880):
|
|
|
|
raise ValidationError({'detail': 'The Resolution have to be between 800x340 and 3840x2880.'})
|
2016-08-25 16:40:34 +02:00
|
|
|
|
|
|
|
projector_instance = self.get_object()
|
|
|
|
projector_instance.width = request.data['width']
|
|
|
|
projector_instance.height = request.data['height']
|
|
|
|
projector_instance.save()
|
|
|
|
|
|
|
|
message = 'Changing resolution to {width}x{height} was successful.'.format(
|
|
|
|
width=request.data['width'],
|
|
|
|
height=request.data['height'])
|
|
|
|
return Response({'detail': message})
|
|
|
|
|
2015-09-14 23:16:31 +02:00
|
|
|
@detail_route(methods=['post'])
|
|
|
|
def control_view(self, request, pk):
|
|
|
|
"""
|
|
|
|
REST API operation to control the projector view, i. e. scale and
|
|
|
|
scroll the projector.
|
|
|
|
|
|
|
|
It expects a POST request to
|
|
|
|
/rest/core/projector/<pk>/control_view/ with a dictionary with an
|
|
|
|
action ('scale' or 'scroll') and a direction ('up', 'down' or
|
|
|
|
'reset').
|
|
|
|
|
|
|
|
Example:
|
|
|
|
|
|
|
|
{
|
|
|
|
"action": "scale",
|
|
|
|
"direction": "up"
|
|
|
|
}
|
|
|
|
"""
|
|
|
|
if not isinstance(request.data, dict):
|
2016-02-06 00:02:22 +01:00
|
|
|
raise ValidationError({'detail': 'Data must be a dictionary.'})
|
2015-09-14 23:16:31 +02:00
|
|
|
if (request.data.get('action') not in ('scale', 'scroll') or
|
|
|
|
request.data.get('direction') not in ('up', 'down', 'reset')):
|
2016-02-06 00:02:22 +01:00
|
|
|
raise ValidationError({'detail': "Data must be a dictionary with an action ('scale' or 'scroll') "
|
|
|
|
"and a direction ('up', 'down' or 'reset')."})
|
2015-09-14 23:16:31 +02:00
|
|
|
|
|
|
|
projector_instance = self.get_object()
|
|
|
|
if request.data['action'] == 'scale':
|
|
|
|
if request.data['direction'] == 'up':
|
|
|
|
projector_instance.scale = F('scale') + 1
|
|
|
|
elif request.data['direction'] == 'down':
|
|
|
|
projector_instance.scale = F('scale') - 1
|
|
|
|
else:
|
|
|
|
# request.data['direction'] == 'reset'
|
|
|
|
projector_instance.scale = 0
|
|
|
|
else:
|
|
|
|
# request.data['action'] == 'scroll'
|
|
|
|
if request.data['direction'] == 'up':
|
|
|
|
projector_instance.scroll = F('scroll') + 1
|
|
|
|
elif request.data['direction'] == 'down':
|
|
|
|
projector_instance.scroll = F('scroll') - 1
|
|
|
|
else:
|
|
|
|
# request.data['direction'] == 'reset'
|
|
|
|
projector_instance.scroll = 0
|
|
|
|
|
2016-11-08 21:29:26 +01:00
|
|
|
projector_instance.save(skip_autoupdate=True)
|
|
|
|
projector_instance.refresh_from_db()
|
|
|
|
inform_changed_data(projector_instance)
|
2015-09-14 23:16:31 +02:00
|
|
|
message = '{action} {direction} was successful.'.format(
|
|
|
|
action=request.data['action'].capitalize(),
|
|
|
|
direction=request.data['direction'])
|
|
|
|
return Response({'detail': message})
|
|
|
|
|
2016-09-05 16:23:44 +02:00
|
|
|
@detail_route(methods=['post'])
|
|
|
|
def set_scroll(self, request, pk):
|
|
|
|
"""
|
|
|
|
REST API operation to scroll the projector.
|
|
|
|
|
|
|
|
It expects a POST request to
|
|
|
|
/rest/core/projector/<pk>/set_scroll/ with a new value for scroll.
|
|
|
|
"""
|
|
|
|
if not isinstance(request.data, int):
|
|
|
|
raise ValidationError({'detail': 'Data must be an int.'})
|
|
|
|
|
|
|
|
projector_instance = self.get_object()
|
|
|
|
projector_instance.scroll = request.data
|
|
|
|
|
|
|
|
projector_instance.save()
|
|
|
|
message = 'Setting scroll to {scroll} was successful.'.format(
|
|
|
|
scroll=request.data)
|
|
|
|
return Response({'detail': message})
|
|
|
|
|
2016-09-12 11:05:34 +02:00
|
|
|
@detail_route(methods=['post'])
|
|
|
|
def control_blank(self, request, pk):
|
|
|
|
"""
|
|
|
|
REST API operation to blank the projector.
|
|
|
|
|
|
|
|
It expects a POST request to
|
|
|
|
/rest/core/projector/<pk>/control_blank/ with a value for blank.
|
|
|
|
"""
|
|
|
|
if not isinstance(request.data, bool):
|
|
|
|
raise ValidationError({'detail': 'Data must be a bool.'})
|
|
|
|
|
|
|
|
projector_instance = self.get_object()
|
|
|
|
projector_instance.blank = request.data
|
|
|
|
projector_instance.save()
|
|
|
|
message = "Setting 'blank' to {blank} was successful.".format(
|
|
|
|
blank=request.data)
|
|
|
|
return Response({'detail': message})
|
|
|
|
|
|
|
|
@detail_route(methods=['post'])
|
|
|
|
def broadcast(self, request, pk):
|
|
|
|
"""
|
|
|
|
REST API operation to (un-)broadcast the given projector.
|
|
|
|
This method takes care, that all other projectors get the new requirements.
|
|
|
|
|
|
|
|
It expects a POST request to
|
|
|
|
/rest/core/projector/<pk>/broadcast/ without an argument
|
|
|
|
"""
|
|
|
|
if config['projector_broadcast'] == 0:
|
|
|
|
config['projector_broadcast'] = pk
|
|
|
|
message = "Setting projector {id} as broadcast projector was successful.".format(
|
|
|
|
id=pk)
|
|
|
|
else:
|
|
|
|
config['projector_broadcast'] = 0
|
|
|
|
message = "Disabling broadcast was successful."
|
|
|
|
return Response({'detail': message})
|
|
|
|
|
|
|
|
@detail_route(methods=['post'])
|
|
|
|
def set_projectiondefault(self, request, pk):
|
|
|
|
"""
|
|
|
|
REST API operation to set a projectiondefault to the requested projector. The argument
|
|
|
|
has to be an int representing the pk from the projectiondefault to be set.
|
|
|
|
|
|
|
|
It expects a POST request to
|
|
|
|
/rest/core/projector/<pk>/set_projectiondefault/ with the projectiondefault id as the argument
|
|
|
|
"""
|
|
|
|
if not isinstance(request.data, int):
|
|
|
|
raise ValidationError({'detail': 'Data must be an int.'})
|
|
|
|
|
|
|
|
try:
|
|
|
|
projectiondefault = ProjectionDefault.objects.get(pk=request.data)
|
|
|
|
except ProjectionDefault.DoesNotExist:
|
|
|
|
raise ValidationError({'detail': 'The projectiondefault with pk={pk} was not found.'.format(
|
|
|
|
pk=request.data)})
|
|
|
|
else:
|
|
|
|
projector_instance = self.get_object()
|
|
|
|
projectiondefault.projector = projector_instance
|
|
|
|
projectiondefault.save()
|
|
|
|
|
|
|
|
return Response('Setting projectiondefault "{name}" to projector {projector_id} was successful.'.format(
|
|
|
|
name=projectiondefault.display_name,
|
|
|
|
projector_id=projector_instance.pk))
|
|
|
|
|
2015-02-18 01:45:39 +01:00
|
|
|
|
|
|
|
class TagViewSet(ModelViewSet):
|
|
|
|
"""
|
2015-07-01 23:18:48 +02:00
|
|
|
API endpoint for tags.
|
|
|
|
|
2015-08-31 14:07:24 +02:00
|
|
|
There are the following views: metadata, list, retrieve, create,
|
|
|
|
partial_update, update and destroy.
|
2015-02-18 01:45:39 +01:00
|
|
|
"""
|
2016-02-11 22:58:32 +01:00
|
|
|
access_permissions = TagAccessPermissions()
|
2015-02-18 01:45:39 +01:00
|
|
|
queryset = Tag.objects.all()
|
|
|
|
|
2015-07-01 23:18:48 +02:00
|
|
|
def check_view_permissions(self):
|
2015-02-18 01:45:39 +01:00
|
|
|
"""
|
2015-07-01 23:18:48 +02:00
|
|
|
Returns True if the user has required permissions.
|
2015-02-18 01:45:39 +01:00
|
|
|
"""
|
2016-09-17 22:26:23 +02:00
|
|
|
if self.action in ('list', 'retrieve'):
|
|
|
|
result = self.get_access_permissions().check_permissions(self.request.user)
|
|
|
|
elif self.action == 'metadata':
|
2016-12-17 09:30:20 +01:00
|
|
|
# Every authenticated user can see the metadata.
|
2016-02-11 22:58:32 +01:00
|
|
|
# Anonymous users can do so if they are enabled.
|
2017-01-15 13:33:54 +01:00
|
|
|
result = self.request.user.is_authenticated() or anonymous_is_enabled()
|
2017-02-27 15:37:01 +01:00
|
|
|
elif self.action in ('create', 'partial_update', 'update', 'destroy'):
|
2017-01-26 15:34:24 +01:00
|
|
|
result = has_perm(self.request.user, 'core.can_manage_tags')
|
2015-07-01 23:18:48 +02:00
|
|
|
else:
|
|
|
|
result = False
|
2015-06-18 21:48:20 +02:00
|
|
|
return result
|
2015-06-29 12:08:15 +02:00
|
|
|
|
|
|
|
|
|
|
|
class ConfigMetadata(SimpleMetadata):
|
|
|
|
"""
|
|
|
|
Custom metadata class to add config info to responses on OPTIONS requests.
|
|
|
|
"""
|
|
|
|
def determine_metadata(self, request, view):
|
|
|
|
# Build tree.
|
2017-08-24 12:26:55 +02:00
|
|
|
config_groups = [] # type: List[Any] # TODO: Replace Any by correct type
|
2016-06-02 12:47:01 +02:00
|
|
|
for config_variable in sorted(config.config_variables.values(), key=attrgetter('weight')):
|
2016-02-14 21:38:26 +01:00
|
|
|
if config_variable.is_hidden():
|
|
|
|
# Skip hidden config variables. Do not even check groups and subgroups.
|
|
|
|
continue
|
2015-06-29 12:08:15 +02:00
|
|
|
if not config_groups or config_groups[-1]['name'] != config_variable.group:
|
2016-02-14 21:38:26 +01:00
|
|
|
# Add new group.
|
2015-06-29 12:08:15 +02:00
|
|
|
config_groups.append(OrderedDict(
|
|
|
|
name=config_variable.group,
|
|
|
|
subgroups=[]))
|
|
|
|
if not config_groups[-1]['subgroups'] or config_groups[-1]['subgroups'][-1]['name'] != config_variable.subgroup:
|
2016-02-14 21:38:26 +01:00
|
|
|
# Add new subgroup.
|
2015-06-29 12:08:15 +02:00
|
|
|
config_groups[-1]['subgroups'].append(OrderedDict(
|
|
|
|
name=config_variable.subgroup,
|
|
|
|
items=[]))
|
2016-02-14 21:38:26 +01:00
|
|
|
# Add the config variable to the current group and subgroup.
|
2015-06-29 12:08:15 +02:00
|
|
|
config_groups[-1]['subgroups'][-1]['items'].append(config_variable.data)
|
|
|
|
|
|
|
|
# Add tree to metadata.
|
|
|
|
metadata = super().determine_metadata(request, view)
|
|
|
|
metadata['config_groups'] = config_groups
|
|
|
|
return metadata
|
|
|
|
|
|
|
|
|
2017-08-22 14:17:20 +02:00
|
|
|
class ConfigViewSet(ModelViewSet):
|
2015-06-29 12:08:15 +02:00
|
|
|
"""
|
2015-07-01 23:18:48 +02:00
|
|
|
API endpoint for the config.
|
|
|
|
|
2017-02-27 15:37:01 +01:00
|
|
|
There are the following views: metadata, list, retrieve, update and
|
|
|
|
partial_update.
|
2015-06-29 12:08:15 +02:00
|
|
|
"""
|
2016-02-11 22:58:32 +01:00
|
|
|
access_permissions = ConfigAccessPermissions()
|
2017-08-22 14:17:20 +02:00
|
|
|
queryset = ConfigStore.objects.all()
|
2015-06-29 12:08:15 +02:00
|
|
|
metadata_class = ConfigMetadata
|
|
|
|
|
2015-07-01 23:18:48 +02:00
|
|
|
def check_view_permissions(self):
|
|
|
|
"""
|
|
|
|
Returns True if the user has required permissions.
|
|
|
|
"""
|
2016-09-17 22:26:23 +02:00
|
|
|
if self.action in ('list', 'retrieve'):
|
|
|
|
result = self.get_access_permissions().check_permissions(self.request.user)
|
|
|
|
elif self.action == 'metadata':
|
2015-08-31 14:07:24 +02:00
|
|
|
# Every authenticated user can see the metadata and list or
|
|
|
|
# retrieve the config. Anonymous users can do so if they are
|
|
|
|
# enabled.
|
2017-01-15 13:33:54 +01:00
|
|
|
result = self.request.user.is_authenticated() or anonymous_is_enabled()
|
2017-02-27 15:37:01 +01:00
|
|
|
elif self.action in ('partial_update', 'update'):
|
2017-03-31 13:48:41 +02:00
|
|
|
# The user needs 'core.can_manage_logos' for all config values
|
|
|
|
# starting with 'logo'. For all other config values th euser needs
|
|
|
|
# the default permissions 'core.can_manage_config'.
|
|
|
|
if self.kwargs['pk'].startswith('logo'):
|
|
|
|
result = has_perm(self.request.user, 'core.can_manage_logos')
|
|
|
|
else:
|
|
|
|
result = has_perm(self.request.user, 'core.can_manage_config')
|
2015-07-01 23:18:48 +02:00
|
|
|
else:
|
|
|
|
result = False
|
|
|
|
return result
|
|
|
|
|
2015-06-29 12:08:15 +02:00
|
|
|
def update(self, request, *args, **kwargs):
|
|
|
|
"""
|
|
|
|
Updates a config variable. Only managers can do this.
|
|
|
|
|
|
|
|
Example: {"value": 42}
|
|
|
|
"""
|
|
|
|
key = kwargs['pk']
|
2016-01-13 15:04:47 +01:00
|
|
|
value = request.data.get('value')
|
|
|
|
if value is None:
|
|
|
|
raise ValidationError({'detail': 'Invalid input. Config value is missing.'})
|
2015-06-29 12:08:15 +02:00
|
|
|
|
|
|
|
# Validate and change value.
|
|
|
|
try:
|
|
|
|
config[key] = value
|
|
|
|
except ConfigNotFound:
|
|
|
|
raise Http404
|
|
|
|
except ConfigError as e:
|
2015-08-31 14:07:24 +02:00
|
|
|
raise ValidationError({'detail': str(e)})
|
2015-06-29 12:08:15 +02:00
|
|
|
|
|
|
|
# Return response.
|
|
|
|
return Response({'key': key, 'value': value})
|
2015-07-01 17:48:41 +02:00
|
|
|
|
|
|
|
|
2015-09-07 16:46:04 +02:00
|
|
|
class ChatMessageViewSet(ModelViewSet):
|
|
|
|
"""
|
|
|
|
API endpoint for chat messages.
|
|
|
|
|
|
|
|
There are the following views: metadata, list, retrieve and create.
|
|
|
|
The views partial_update, update and destroy are disabled.
|
|
|
|
"""
|
2016-02-11 22:58:32 +01:00
|
|
|
access_permissions = ChatMessageAccessPermissions()
|
2015-09-07 16:46:04 +02:00
|
|
|
queryset = ChatMessage.objects.all()
|
|
|
|
|
|
|
|
def check_view_permissions(self):
|
|
|
|
"""
|
|
|
|
Returns True if the user has required permissions.
|
|
|
|
"""
|
2016-09-17 22:26:23 +02:00
|
|
|
if self.action in ('list', 'retrieve'):
|
|
|
|
result = self.get_access_permissions().check_permissions(self.request.user)
|
2016-10-17 16:56:19 +02:00
|
|
|
elif self.action in ('metadata', 'create'):
|
2016-02-11 22:58:32 +01:00
|
|
|
# We do not want anonymous users to use the chat even the anonymous
|
|
|
|
# group has the permission core.can_use_chat.
|
|
|
|
result = (
|
2015-09-07 16:46:04 +02:00
|
|
|
self.request.user.is_authenticated() and
|
2017-01-26 15:34:24 +01:00
|
|
|
has_perm(self.request.user, 'core.can_use_chat'))
|
2016-10-17 16:56:19 +02:00
|
|
|
elif self.action == 'clear':
|
|
|
|
result = (
|
2017-01-26 15:34:24 +01:00
|
|
|
has_perm(self.request.user, 'core.can_use_chat') and
|
|
|
|
has_perm(self.request.user, 'core.can_manage_chat'))
|
2016-10-17 16:56:19 +02:00
|
|
|
else:
|
|
|
|
result = False
|
2016-02-11 22:58:32 +01:00
|
|
|
return result
|
2015-09-07 16:46:04 +02:00
|
|
|
|
|
|
|
def perform_create(self, serializer):
|
|
|
|
"""
|
|
|
|
Customized method to inject the request.user into serializer's save
|
|
|
|
method so that the request.user can be saved into the model field.
|
|
|
|
"""
|
|
|
|
serializer.save(user=self.request.user)
|
2017-04-28 22:10:18 +02:00
|
|
|
# Send chatter via autoupdate because users without permission
|
|
|
|
# to see users may not have it but can get it now.
|
|
|
|
inform_changed_data([self.request.user])
|
2015-09-07 16:46:04 +02:00
|
|
|
|
2016-10-17 16:56:19 +02:00
|
|
|
@list_route(methods=['post'])
|
|
|
|
def clear(self, request):
|
|
|
|
"""
|
|
|
|
Deletes all chat messages.
|
|
|
|
"""
|
|
|
|
# Collect all chat messages with their collection_string and id
|
|
|
|
chatmessages = ChatMessage.objects.all()
|
|
|
|
args = []
|
|
|
|
for chatmessage in chatmessages:
|
2017-09-04 00:25:45 +02:00
|
|
|
args.append((chatmessage.get_collection_string(), chatmessage.pk))
|
2016-10-17 16:56:19 +02:00
|
|
|
chatmessages.delete()
|
|
|
|
# Trigger autoupdate and setup response.
|
2017-04-13 10:41:13 +02:00
|
|
|
if len(args) > 0:
|
2017-09-04 00:25:45 +02:00
|
|
|
inform_deleted_data(args)
|
2016-10-17 16:56:19 +02:00
|
|
|
return Response({'detail': _('All chat messages deleted successfully.')})
|
|
|
|
|
2015-09-07 16:46:04 +02:00
|
|
|
|
2016-10-21 11:05:24 +02:00
|
|
|
class ProjectorMessageViewSet(ModelViewSet):
|
|
|
|
"""
|
|
|
|
API endpoint for messages.
|
|
|
|
|
2017-02-27 15:37:01 +01:00
|
|
|
There are the following views: list, retrieve, create, update,
|
|
|
|
partial_update and destroy.
|
2016-10-21 11:05:24 +02:00
|
|
|
"""
|
|
|
|
access_permissions = ProjectorMessageAccessPermissions()
|
|
|
|
queryset = ProjectorMessage.objects.all()
|
|
|
|
|
|
|
|
def check_view_permissions(self):
|
|
|
|
"""
|
|
|
|
Returns True if the user has required permissions.
|
|
|
|
"""
|
|
|
|
if self.action in ('list', 'retrieve'):
|
|
|
|
result = self.get_access_permissions().check_permissions(self.request.user)
|
2017-02-27 15:37:01 +01:00
|
|
|
elif self.action in ('create', 'partial_update', 'update', 'destroy'):
|
2017-01-26 15:34:24 +01:00
|
|
|
result = has_perm(self.request.user, 'core.can_manage_projector')
|
2016-10-21 11:05:24 +02:00
|
|
|
else:
|
|
|
|
result = False
|
|
|
|
return result
|
|
|
|
|
|
|
|
|
|
|
|
class CountdownViewSet(ModelViewSet):
|
|
|
|
"""
|
|
|
|
API endpoint for Countdown.
|
|
|
|
|
2017-02-27 15:37:01 +01:00
|
|
|
There are the following views: list, retrieve, create, update,
|
|
|
|
partial_update and destroy.
|
2016-10-21 11:05:24 +02:00
|
|
|
"""
|
|
|
|
access_permissions = CountdownAccessPermissions()
|
|
|
|
queryset = Countdown.objects.all()
|
|
|
|
|
|
|
|
def check_view_permissions(self):
|
|
|
|
"""
|
|
|
|
Returns True if the user has required permissions.
|
|
|
|
"""
|
|
|
|
if self.action in ('list', 'retrieve'):
|
|
|
|
result = self.get_access_permissions().check_permissions(self.request.user)
|
2017-02-27 15:37:01 +01:00
|
|
|
elif self.action in ('create', 'partial_update', 'update', 'destroy'):
|
2017-01-26 15:34:24 +01:00
|
|
|
result = has_perm(self.request.user, 'core.can_manage_projector')
|
2016-10-21 11:05:24 +02:00
|
|
|
else:
|
|
|
|
result = False
|
|
|
|
return result
|
|
|
|
|
|
|
|
|
2015-07-01 23:18:48 +02:00
|
|
|
# Special API views
|
2015-07-01 17:48:41 +02:00
|
|
|
|
2015-09-24 21:28:30 +02:00
|
|
|
class ServerTime(utils_views.APIView):
|
|
|
|
"""
|
|
|
|
Returns the server time as UNIX timestamp.
|
|
|
|
"""
|
|
|
|
http_method_names = ['get']
|
|
|
|
|
|
|
|
def get_context_data(self, **context):
|
|
|
|
return now().timestamp()
|
|
|
|
|
|
|
|
|
2015-07-01 23:18:48 +02:00
|
|
|
class VersionView(utils_views.APIView):
|
|
|
|
"""
|
|
|
|
Returns a dictionary with the OpenSlides version and the version of all
|
|
|
|
plugins.
|
|
|
|
"""
|
|
|
|
http_method_names = ['get']
|
|
|
|
|
|
|
|
def get_context_data(self, **context):
|
2017-12-01 10:10:35 +01:00
|
|
|
Result = TypedDict('Result', { # noqa
|
|
|
|
'openslides_version': str,
|
|
|
|
'openslides_license': str,
|
|
|
|
'openslides_url': str,
|
|
|
|
'plugins': List[Dict[str, str]]})
|
|
|
|
result = dict(
|
|
|
|
openslides_version=version,
|
|
|
|
openslides_license=license,
|
|
|
|
openslides_url=url,
|
|
|
|
plugins=[]) # type: Result
|
2015-07-01 23:18:48 +02:00
|
|
|
# Versions of plugins.
|
|
|
|
for plugin in settings.INSTALLED_PLUGINS:
|
|
|
|
result['plugins'].append({
|
|
|
|
'verbose_name': get_plugin_verbose_name(plugin),
|
|
|
|
'description': get_plugin_description(plugin),
|
2017-12-01 10:10:35 +01:00
|
|
|
'version': get_plugin_version(plugin),
|
|
|
|
'license': get_plugin_license(plugin),
|
|
|
|
'url': get_plugin_url(plugin)})
|
2015-07-01 23:18:48 +02:00
|
|
|
return result
|