| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869 |
- from __future__ import unicode_literals
- from rest_framework import serializers
- from rest_framework.validators import UniqueTogetherValidator
- from dcim.api.serializers import NestedDeviceSerializer
- from secrets.models import Secret, SecretRole
- from utilities.api import ValidatedModelSerializer
- #
- # SecretRoles
- #
- class SecretRoleSerializer(ValidatedModelSerializer):
- class Meta:
- model = SecretRole
- fields = ['id', 'name', 'slug']
- class NestedSecretRoleSerializer(serializers.ModelSerializer):
- url = serializers.HyperlinkedIdentityField(view_name='secrets-api:secretrole-detail')
- class Meta:
- model = SecretRole
- fields = ['id', 'url', 'name', 'slug']
- #
- # Secrets
- #
- class SecretSerializer(serializers.ModelSerializer):
- device = NestedDeviceSerializer()
- role = NestedSecretRoleSerializer()
- class Meta:
- model = Secret
- fields = ['id', 'device', 'role', 'name', 'plaintext', 'hash', 'created', 'last_updated']
- class WritableSecretSerializer(serializers.ModelSerializer):
- plaintext = serializers.CharField()
- class Meta:
- model = Secret
- fields = ['id', 'device', 'role', 'name', 'plaintext', 'hash', 'created', 'last_updated']
- validators = []
- def validate(self, data):
- # Encrypt plaintext data using the master key provided from the view context
- if data.get('plaintext'):
- s = Secret(plaintext=data['plaintext'])
- s.encrypt(self.context['master_key'])
- data['ciphertext'] = s.ciphertext
- data['hash'] = s.hash
- # Validate uniqueness of name if one has been provided.
- if data.get('name'):
- validator = UniqueTogetherValidator(queryset=Secret.objects.all(), fields=('device', 'role', 'name'))
- validator.set_context(self)
- validator(data)
- # Enforce model validation
- super(WritableSecretSerializer, self).validate(data)
- return data
|