DocManagerBackend/docmanager_backend/authorization_requests/serializers.py

212 lines
7.9 KiB
Python
Raw Normal View History

2025-01-09 02:10:42 +08:00
from rest_framework import serializers
from accounts.models import CustomUser
from emails.templates import RequestUpdateEmail
2025-01-19 20:18:19 +08:00
from .models import AuthorizationRequest, AuthorizationRequestUnit
class AuthorizationRequestUnitCreationSerializer(serializers.ModelSerializer):
document = serializers.CharField()
copies = serializers.IntegerField(min_value=1)
pages = serializers.IntegerField(min_value=1)
class Meta:
model = AuthorizationRequestUnit
fields = ["document", "copies", "pages", "status"]
class AuthorizationRequestUnitSerializer(serializers.ModelSerializer):
class Meta:
model = AuthorizationRequestUnit
fields = ["id", "document", "status", "copies", "pages"]
read_only_fields = ["id", "document", "status," "copies", "pages"]
2025-01-09 02:10:42 +08:00
class AuthorizationRequestCreationSerializer(serializers.ModelSerializer):
requester = serializers.SlugRelatedField(
many=False, slug_field="id", queryset=CustomUser.objects.all(), required=False
)
2025-01-19 20:18:19 +08:00
documents = AuthorizationRequestUnitCreationSerializer(
many=True, required=True)
2025-01-09 02:10:42 +08:00
college = serializers.CharField(max_length=64)
purpose = serializers.CharField(max_length=512)
class Meta:
model = AuthorizationRequest
fields = ["requester", "college", "purpose", "documents"]
def create(self, validated_data):
user = self.context["request"].user
2025-01-19 20:18:19 +08:00
documents_data = validated_data.pop("documents")
if not documents_data:
raise serializers.ValidationError(
{"error": "No documents provided"}
)
2025-01-09 02:10:42 +08:00
# Set requester to user who sent HTTP request to prevent spoofing
validated_data["requester"] = user
2025-01-19 20:18:19 +08:00
AUTHORIZATION_REQUEST = AuthorizationRequest.objects.create(
**validated_data)
AUTHORIZATION_REQUEST_UNITS = []
for AUTHORIZATION_REQUEST_UNIT in documents_data:
AUTHORIZATION_REQUEST_UNIT = AuthorizationRequestUnit.objects.create(
authorization_request=AUTHORIZATION_REQUEST,
document=AUTHORIZATION_REQUEST_UNIT["document"],
copies=AUTHORIZATION_REQUEST_UNIT["copies"],
pages=AUTHORIZATION_REQUEST_UNIT["pages"]
)
AUTHORIZATION_REQUEST_UNITS.append(AUTHORIZATION_REQUEST_UNIT)
AUTHORIZATION_REQUEST.documents.set(AUTHORIZATION_REQUEST_UNITS)
AUTHORIZATION_REQUEST.save()
return AUTHORIZATION_REQUEST
2025-01-09 02:10:42 +08:00
class AuthorizationRequestSerializer(serializers.ModelSerializer):
requester = serializers.SlugRelatedField(
many=False,
slug_field="full_name",
queryset=CustomUser.objects.all(),
)
date_requested = serializers.DateTimeField(
format="%m-%d-%Y %I:%M %p", read_only=True
)
2025-01-19 20:18:19 +08:00
documents = AuthorizationRequestUnitSerializer(many=True)
2025-01-09 02:10:42 +08:00
class Meta:
model = AuthorizationRequest
fields = [
"id",
"requester",
"college",
"purpose",
"date_requested",
"documents",
"remarks",
"status",
]
read_only_fields = [
"id",
"requester",
"college",
"purpose",
"date_requested",
"documents",
"remarks,"
"status",
]
2025-01-19 20:18:19 +08:00
class AuthorizationRequestUnitUpdateSerializer(serializers.ModelSerializer):
status = serializers.ChoiceField(
choices=AuthorizationRequestUnit.STATUS_CHOICES, required=True
)
class Meta:
model = AuthorizationRequestUnit
fields = ["id", "status"]
read_only_fields = ["id"]
def update(self, instance, validated_data):
if instance.authorization_request.status != "pending":
raise serializers.ValidationError(
{
"error": "Already approved/denied requests cannot be updated. You should instead create a new request and approve it from there"
}
)
if instance.status == "checked":
raise serializers.ValidationError(
{
"error": "Already approved/denied request units cannot be updated. You should instead create a new request and approve it from there"
}
)
elif "status" not in validated_data:
raise serializers.ValidationError(
{
"error": "No status value update provided"
}
)
elif validated_data["status"] == instance.status:
raise serializers.ValidationError(
{"error": "Request unit status provided is the same as current status"}
)
representation = super().update(instance, validated_data)
# Check if the parent Authorization Request has had all its documents approved
approved_all = True
for AUTHORIZATION_REQUEST_UNIT in instance.authorization_request.documents.all():
if AUTHORIZATION_REQUEST_UNIT.status != "checked":
approved_all = False
# If all documents have been checked
if approved_all:
# Set the parent request as approved
instance.authorization_request.status = "approved"
instance.authorization_request.save()
# And send an email notification
email = RequestUpdateEmail()
email.context = {"request_status": "approved"}
email.send(to=[instance.authorization_request.requester.email])
return representation
2025-01-09 02:10:42 +08:00
class AuthorizationRequestUpdateSerializer(serializers.ModelSerializer):
status = serializers.ChoiceField(
choices=AuthorizationRequest.STATUS_CHOICES, required=True
)
class Meta:
model = AuthorizationRequest
fields = ["id", "status", "remarks"]
read_only_fields = ["id"]
def update(self, instance, validated_data):
2025-01-19 20:18:19 +08:00
if "status" not in validated_data:
2025-01-09 02:10:42 +08:00
raise serializers.ValidationError(
{
2025-01-19 20:18:19 +08:00
"error": "No status value update provided"
2025-01-09 02:10:42 +08:00
}
)
2025-01-19 20:18:19 +08:00
elif instance.status == "denied" or instance.status == "claimed":
2025-01-09 02:10:42 +08:00
raise serializers.ValidationError(
{
2025-01-19 20:18:19 +08:00
"error": "Already claimed/denied requests cannot be updated. You should instead create a new request and approve it from there"
2025-01-09 02:10:42 +08:00
}
)
elif validated_data["status"] == instance.status:
raise serializers.ValidationError(
{"error": "Request form status provided is the same as current status"}
)
2025-01-19 20:18:19 +08:00
elif instance.status == "approved" and validated_data["status"] not in ["claimed", "unclaimed"]:
raise serializers.ValidationError(
{"error": "Approved request forms can only be marked as claimed or unclaimed"}
)
elif instance.status == "unclaimed" and validated_data["status"] not in ["claimed"]:
raise serializers.ValidationError(
{"error": "Unclaimed request forms can only be marked as claimed"}
)
2025-01-09 02:10:42 +08:00
elif validated_data["status"] == "denied" and "remarks" not in validated_data:
raise serializers.ValidationError(
{"error": "Request denial requires remarks"}
)
representation = super().update(instance, validated_data)
# Send an email on request status update
try:
email = RequestUpdateEmail()
if validated_data["status"] == "denied":
2025-01-19 20:18:19 +08:00
email.context = {"request_status": "denied"}
2025-01-09 02:10:42 +08:00
email.context = {"remarks": validated_data["remarks"]}
else:
2025-01-19 20:18:19 +08:00
email.context = {"request_status": "approved"}
2025-01-09 02:10:42 +08:00
email.context = {"remarks": "N/A"}
email.send(to=[instance.requester.email])
2025-01-19 20:18:19 +08:00
except Exception as e:
2025-01-09 02:10:42 +08:00
# Silence out errors if email sending fails
2025-01-19 20:18:19 +08:00
print(e)
2025-01-09 02:10:42 +08:00
pass
return representation