1 from unfold.loginrequired import LoginRequiredAutoLogoutView
4 from manifold.core.query import Query
5 from manifoldapi.manifoldapi import execute_query
6 from portal.actions import manifold_update_user, manifold_update_account, manifold_add_account, manifold_delete_account, sfa_update_user, sfa_get_user, clear_user_creds
8 from unfold.page import Page
9 from ui.topmenu import topmenu_items_live, the_user
11 from django.http import HttpResponse, HttpResponseRedirect
12 from django.contrib import messages
13 from django.contrib.auth.decorators import login_required
15 from myslice.configengine import ConfigEngine
16 from myslice.theme import ThemeView
18 from portal.account import Account, get_expiration
20 import json, os, re, itertools, time
21 from OpenSSL import crypto
22 from Crypto.PublicKey import RSA
25 class AccountView(LoginRequiredAutoLogoutView, ThemeView):
26 template_name = "account-view.html"
27 def dispatch(self, *args, **kwargs):
28 return super(AccountView, self).dispatch(*args, **kwargs)
31 def get_context_data(self, **kwargs):
32 self.template_name = self.template
33 page = Page(self.request)
34 metadata = page.get_metadata()
35 page.expose_js_metadata()
37 page.add_js_files ( [ "js/jquery.validate.js", "js/my_account.register.js", "js/my_account.edit_profile.js","js/jquery-ui.js" ] )
38 page.add_css_files ( [ "css/onelab.css", "css/account_view.css","css/plugin.css" ] )
40 # Execute a Query to delegate credentials if necessary
41 #sfa_user_query = Query().get('myslice:user').select('user_hrn').filter_by('user_hrn','==','$user_hrn')
42 #sfa_user_result = execute_query(self.request, sfa_user_query)
44 user_query = Query().get('local:user').select('config','email','status')
45 user_details = execute_query(self.request, user_query)
47 # not always found in user_details...
49 for user_detail in user_details:
50 # different significations of user_status
51 if user_detail['status'] == 0:
52 user_status = 'Disabled'
53 elif user_detail['status'] == 1:
54 user_status = 'Validation Pending'
55 elif user_detail['status'] == 2:
56 user_status = 'Enabled'
59 #email = user_detail['email']
60 if user_detail['config']:
61 config = json.loads(user_detail['config'])
63 platform_query = Query().get('local:platform').select('platform_id','platform','gateway_type','disabled')
64 account_query = Query().get('local:account').select('user_id','platform_id','auth_type','config')
65 platform_details = execute_query(self.request, platform_query)
66 account_details = execute_query(self.request, account_query)
68 # initial assignment needed for users having account.config = {}
74 account_reference = ''
79 principal_acc_list = ''
81 platform_name_list = []
82 platform_name_secondary_list = []
83 platform_access_list = []
84 platform_no_access_list = []
85 total_platform_list = []
86 account_type_list = []
87 account_type_secondary_list = []
88 account_reference_list = []
89 delegation_type_list = []
90 user_cred_exp_list = []
93 slice_cred_exp_list = []
94 auth_cred_exp_list = []
98 for platform_detail in platform_details:
99 if 'sfa' in platform_detail['gateway_type']:
100 total_platform = platform_detail['platform']
101 total_platform_list.append(total_platform)
103 for account_detail in account_details:
104 if platform_detail['platform_id'] == account_detail['platform_id']:
105 platform_name = platform_detail['platform']
106 if 'config' in account_detail and account_detail['config'] is not '':
107 account_config = json.loads(account_detail['config'])
108 account_usr_hrn = account_config.get('user_hrn','N/A')
109 account_pub_key = account_config.get('user_public_key','N/A')
110 account_reference = account_config.get ('reference_platform','N/A')
111 # credentials of myslice platform
112 if 'myslice' in platform_detail['platform']:
113 acc_user_cred = account_config.get('delegated_user_credential','N/A')
114 acc_slice_cred = account_config.get('delegated_slice_credentials','N/A')
115 acc_auth_cred = account_config.get('delegated_authority_credentials','N/A')
117 if 'N/A' not in acc_user_cred:
118 exp_date = re.search('<expires>(.*)</expires>', acc_user_cred)
120 user_exp_date = exp_date.group(1)
121 user_cred_exp_list.append(user_exp_date)
123 my_users = [{'cred_exp': t[0]}
124 for t in zip(user_cred_exp_list)]
127 if 'N/A' not in acc_slice_cred:
128 for key, value in acc_slice_cred.iteritems():
129 slice_list.append(key)
131 exp_date = re.search('<expires>(.*)</expires>', value)
133 exp_date = exp_date.group(1)
134 slice_cred_exp_list.append(exp_date)
136 my_slices = [{'slice_name': t[0], 'cred_exp': t[1]}
137 for t in zip(slice_list, slice_cred_exp_list)]
139 if 'N/A' not in acc_auth_cred:
140 for key, value in acc_auth_cred.iteritems():
141 auth_list.append(key)
143 exp_date = re.search('<expires>(.*)</expires>', value)
145 exp_date = exp_date.group(1)
146 auth_cred_exp_list.append(exp_date)
148 my_auths = [{'auth_name': t[0], 'cred_exp': t[1]}
149 for t in zip(auth_list, auth_cred_exp_list)]
152 # for reference accounts
153 if 'reference' in account_detail['auth_type']:
154 account_type = 'Reference'
156 platform_name_secondary_list.append(platform_name)
157 account_type_secondary_list.append(account_type)
158 account_reference_list.append(account_reference)
159 ref_acc_list = [{'platform_name': t[0], 'account_type': t[1], 'account_reference': t[2]}
160 for t in zip(platform_name_secondary_list, account_type_secondary_list, account_reference_list)]
162 elif 'managed' in account_detail['auth_type']:
163 account_type = 'Principal'
164 delegation = 'Automatic'
166 account_type = 'Principal'
167 delegation = 'Manual'
168 # for principal (auth_type=user/managed) accounts
169 if 'reference' not in account_detail['auth_type']:
170 platform_name_list.append(platform_name)
171 account_type_list.append(account_type)
172 delegation_type_list.append(delegation)
173 usr_hrn_list.append(account_usr_hrn)
174 pub_key_list.append(account_pub_key)
175 user_status_list.append(user_status)
176 # combining 5 lists into 1 [to render in the template]
177 principal_acc_list = [{'platform_name': t[0], 'account_type': t[1], 'delegation_type': t[2], 'usr_hrn':t[3], 'usr_pubkey':t[4], 'user_status':t[5],}
178 for t in zip(platform_name_list, account_type_list, delegation_type_list, usr_hrn_list, pub_key_list, user_status_list)]
179 # to hide private key row if it doesn't exist
180 if 'myslice' in platform_detail['platform']:
181 account_config = json.loads(account_detail['config'])
182 account_priv_key = account_config.get('user_private_key','N/A')
183 if 'sfa' in platform_detail['gateway_type']:
184 platform_access = platform_detail['platform']
185 platform_access_list.append(platform_access)
187 # Removing the platform which already has access
188 for platform in platform_access_list:
189 total_platform_list.remove(platform)
190 # we could use zip. this one is used if columns have unequal rows
191 platform_list = [{'platform_no_access': t[0]}
192 for t in itertools.izip_longest(total_platform_list)]
195 ## check user is pi or not
196 # platform_query = Query().get('local:platform').select('platform_id','platform','gateway_type','disabled')
197 # account_query = Query().get('local:account').select('user_id','platform_id','auth_type','config')
198 # platform_details = execute_query(self.request, platform_query)
199 # account_details = execute_query(self.request, account_query)
200 # for platform_detail in platform_details:
201 # for account_detail in account_details:
202 # if platform_detail['platform_id'] == account_detail['platform_id']:
203 # if 'config' in account_detail and account_detail['config'] is not '':
204 # account_config = json.loads(account_detail['config'])
205 # if 'myslice' in platform_detail['platform']:
206 # acc_auth_cred = account_config.get('delegated_authority_credentials','N/A')
208 if acc_auth_cred == {} or acc_auth_cred == 'N/A':
213 # check if the user has creds or not
214 if acc_user_cred == {} or acc_user_cred == 'N/A':
215 user_cred = 'no_creds'
217 exp_date = get_expiration(acc_user_cred, 'timestamp')
218 if exp_date < time.time():
219 user_cred = 'creds_expired'
221 user_cred = 'has_creds'
223 context = super(AccountView, self).get_context_data(**kwargs)
224 context['principal_acc'] = principal_acc_list
225 context['ref_acc'] = ref_acc_list
226 context['platform_list'] = platform_list
227 context['my_users'] = my_users
229 context['user_cred'] = user_cred
230 context['my_slices'] = my_slices
231 context['my_auths'] = my_auths
232 context['user_status'] = user_status
233 context['person'] = self.request.user
234 context['firstname'] = config.get('firstname',"?")
235 context['lastname'] = config.get('lastname',"?")
236 context['fullname'] = context['firstname'] +' '+ context['lastname']
237 context['authority'] = config.get('authority',"Unknown Authority")
238 context['user_private_key'] = account_priv_key
240 # XXX This is repeated in all pages
241 # more general variables expected in the template
242 context['title'] = 'Platforms connected to MySlice'
243 # the menu items on the top
244 context['topmenu_items'] = topmenu_items_live('My Account', page)
245 # so we can sho who is logged
246 context['username'] = the_user(self.request)
247 context['theme'] = self.theme
248 context['section'] = "User account"
249 # context ['firstname'] = config['firstname']
250 prelude_env = page.prelude_env()
251 context.update(prelude_env)
255 def get_myslice_platform(request):
256 platform_query = Query().get('local:platform').select('platform_id','platform','gateway_type','disabled','config').filter_by('platform','==','myslice')
257 platform_details = execute_query(request, platform_query)
258 for platform_detail in platform_details:
259 return platform_detail
262 def get_myslice_account(request):
263 platform_myslice = get_myslice_platform(request)
264 account_query = Query().get('local:account').select('user_id','platform_id','auth_type','config').filter_by('platform_id','==',platform_myslice['platform_id'])
265 account_details = execute_query(request, account_query)
266 for account_detail in account_details:
267 return account_detail
270 #my_acc form value processing
271 def account_process(request):
272 from sfa.trust.credential import Credential
273 from sfa.trust.certificate import Keypair
275 user_query = Query().get('local:user').select('user_id','email','password','config')
276 user_details = execute_query(request, user_query)
278 account_query = Query().get('local:account').select('user_id','platform_id','auth_type','config')
279 account_details = execute_query(request, account_query)
281 platform_query = Query().get('local:platform').select('platform_id','platform')
282 platform_details = execute_query(request, platform_query)
284 # getting the user_id from the session
285 for user_detail in user_details:
286 user_id = user_detail['user_id']
287 user_email = user_detail['email']
289 if user_email == request.user.email:
290 authorize_query = True
292 print "SECURITY: %s tried to update %s" % (user_email, request.user.email)
293 messages.error(request, 'You are not authorized to modify another user.')
294 return HttpResponseRedirect("/portal/account/")
296 print "Exception = %s" % e
298 for account_detail in account_details:
299 for platform_detail in platform_details:
300 # Add reference account to the platforms
301 if 'add_'+platform_detail['platform'] in request.POST or request.POST['button_value'] == 'add_'+platform_detail['platform']:
302 platform_id = platform_detail['platform_id']
303 user_params = {'platform_id': platform_id, 'user_id': user_id, 'auth_type': "reference", 'config': '{"reference_platform": "myslice"}'}
304 manifold_add_account(request,user_params)
305 messages.info(request, 'Reference Account is added to the selected platform successfully!')
306 return HttpResponseRedirect("/portal/account/")
308 # Delete reference account from the platforms
309 if 'delete_'+platform_detail['platform'] in request.POST or request.POST['button_value'] == 'delete_'+platform_detail['platform']:
310 platform_id = platform_detail['platform_id']
311 user_params = {'user_id':user_id}
312 manifold_delete_account(request,platform_id, user_id, user_params)
313 messages.info(request, 'Reference Account is removed from the selected platform')
314 return HttpResponseRedirect("/portal/account/")
316 if platform_detail['platform_id'] == account_detail['platform_id']:
317 if 'myslice' in platform_detail['platform']:
318 account_config = json.loads(account_detail['config'])
319 acc_slice_cred = account_config.get('delegated_slice_credentials','N/A')
320 acc_auth_cred = account_config.get('delegated_authority_credentials','N/A')
325 # adding the slices and corresponding credentials to list
326 if 'N/A' not in acc_slice_cred:
329 for key, value in acc_slice_cred.iteritems():
330 slice_list.append(key)
331 slice_cred.append(value)
332 # special case: download each slice credentials separately
333 for i in range(0, len(slice_list)):
334 if 'dl_'+slice_list[i] in request.POST or request.POST['button_value'] == 'dl_'+slice_list[i]:
335 slice_detail = "Slice name: " + slice_list[i] +"\nSlice Credentials: \n"+ slice_cred[i]
336 response = HttpResponse(slice_detail, content_type='text/plain')
337 response['Content-Disposition'] = 'attachment; filename="slice_credential.txt"'
340 # adding the authority and corresponding credentials to list
341 if 'N/A' not in acc_auth_cred:
344 for key, value in acc_auth_cred.iteritems():
345 auth_list.append(key)
346 auth_cred.append(value)
347 # special case: download each slice credentials separately
348 for i in range(0, len(auth_list)):
349 if 'dl_'+auth_list[i] in request.POST or request.POST['button_value'] == 'dl_'+auth_list[i]:
350 auth_detail = "Authority: " + auth_list[i] +"\nAuthority Credentials: \n"+ auth_cred[i]
351 response = HttpResponse(auth_detail, content_type='text/plain')
352 response['Content-Disposition'] = 'attachment; filename="auth_credential.txt"'
357 if 'submit_name' in request.POST:
358 edited_first_name = request.POST['fname']
359 edited_last_name = request.POST['lname']
362 for user_config in user_details:
363 if user_config['config']:
364 config = json.loads(user_config['config'])
365 config['firstname'] = edited_first_name
366 config['lastname'] = edited_last_name
367 config['authority'] = config.get('authority','Unknown Authority')
368 updated_config = json.dumps(config)
369 user_params = {'config': updated_config}
370 else: # it's needed if the config is empty
371 user_config['config']= '{"firstname":"' + edited_first_name + '", "lastname":"'+ edited_last_name + '", "authority": "Unknown Authority"}'
372 user_params = {'config': user_config['config']}
373 # updating config local:user in manifold
374 manifold_update_user(request, request.user.email,user_params)
375 # this will be depricated, we will show the success msg in same page
376 # Redirect to same page with success message
377 messages.success(request, 'Sucess: First Name and Last Name Updated.')
378 return HttpResponseRedirect("/portal/account/")
380 elif 'submit_pass' in request.POST:
381 edited_password = request.POST['password']
383 for user_pass in user_details:
384 user_pass['password'] = edited_password
385 #updating password in local:user
386 user_params = { 'password': user_pass['password']}
387 manifold_update_user(request,request.user.email,user_params)
388 # return HttpResponse('Success: Password Changed!!')
389 messages.success(request, 'Sucess: Password Updated.')
390 return HttpResponseRedirect("/portal/account/")
392 # XXX TODO: Factorize with portal/registrationview.py
393 # XXX TODO: Factorize with portal/registrationview.py
394 # XXX TODO: Factorize with portal/joinview.py
396 elif 'generate' in request.POST:
397 for account_detail in account_details:
398 for platform_detail in platform_details:
399 if platform_detail['platform_id'] == account_detail['platform_id']:
400 if 'myslice' in platform_detail['platform']:
401 private = RSA.generate(1024)
402 private_key = json.dumps(private.exportKey())
403 public = private.publickey()
404 public_key = json.dumps(public.exportKey(format='OpenSSH'))
405 # updating manifold local:account table
406 account_config = json.loads(account_detail['config'])
407 # preserving user_hrn
408 user_hrn = account_config.get('user_hrn','N/A')
409 keypair = '{"user_public_key":'+ public_key + ', "user_private_key":'+ private_key + ', "user_hrn":"'+ user_hrn + '"}'
410 #updated_config = json.dumps(account_config)
412 #user_params = { 'config': keypair, 'auth_type':'managed'}
413 #manifold_update_account(request, user_id, user_params)
415 public_key = public_key.replace('"', '');
416 user_pub_key = {'keys': public_key}
418 sfa_update_user(request, user_hrn, user_pub_key)
419 result_sfa_user = sfa_get_user(request, user_hrn, public_key)
421 if 'keys' in result_sfa_user and result_sfa_user['keys'][0] == public_key:
423 updated_config = json.dumps(account_config)
424 user_params = { 'config': keypair, 'auth_type':'managed'}
425 manifold_update_account(request, user_id, user_params)
426 messages.success(request, 'Sucess: New Keypair Generated! Delegation of your credentials will be automatic.')
428 raise Exception,"Keys are not matching"
430 messages.error(request, 'Error: An error occured during the update of your public key at the Registry, or your public key is not matching the one stored.')
431 print "Exception in accountview ", e
432 return HttpResponseRedirect("/portal/account/")
434 messages.error(request, 'Account error: You need an account in myslice platform to perform this action')
435 return HttpResponseRedirect("/portal/account/")
437 elif 'upload_key' in request.POST:
438 for account_detail in account_details:
439 for platform_detail in platform_details:
440 if platform_detail['platform_id'] == account_detail['platform_id']:
441 if 'myslice' in platform_detail['platform']:
442 up_file = request.FILES['pubkey']
443 file_content = up_file.read()
444 file_name = up_file.name
445 file_extension = os.path.splitext(file_name)[1]
446 allowed_extension = ['.pub','.txt']
447 if file_extension in allowed_extension and re.search(r'ssh-rsa',file_content):
448 account_config = json.loads(account_detail['config'])
449 # preserving user_hrn
450 user_hrn = account_config.get('user_hrn','N/A')
451 file_content = '{"user_public_key":"'+ file_content + '", "user_hrn":"'+ user_hrn +'"}'
452 #file_content = re.sub("\r", "", file_content)
453 #file_content = re.sub("\n", "\\n",file_content)
454 file_content = ''.join(file_content.split())
455 #update manifold local:account table
456 user_params = { 'config': file_content, 'auth_type':'user'}
457 manifold_update_account(request, user_id, user_params)
459 user_pub_key = {'keys': file_content}
460 sfa_update_user(request, user_hrn, user_pub_key)
461 messages.success(request, 'Publickey uploaded! Please delegate your credentials using SFA: http://trac.myslice.info/wiki/DelegatingCredentials')
462 return HttpResponseRedirect("/portal/account/")
464 messages.error(request, 'RSA key error: Please upload a valid RSA public key [.txt or .pub].')
465 return HttpResponseRedirect("/portal/account/")
467 messages.error(request, 'Account error: You need an account in myslice platform to perform this action')
468 return HttpResponseRedirect("/portal/account/")
470 elif 'dl_pubkey' in request.POST or request.POST['button_value'] == 'dl_pubkey':
471 for account_detail in account_details:
472 for platform_detail in platform_details:
473 if platform_detail['platform_id'] == account_detail['platform_id']:
474 if 'myslice' in platform_detail['platform']:
475 account_config = json.loads(account_detail['config'])
476 public_key = account_config['user_public_key']
477 response = HttpResponse(public_key, content_type='text/plain')
478 response['Content-Disposition'] = 'attachment; filename="pubkey.txt"'
482 messages.error(request, 'Account error: You need an account in myslice platform to perform this action')
483 return HttpResponseRedirect("/portal/account/")
485 elif 'dl_pkey' in request.POST or request.POST['button_value'] == 'dl_pkey':
486 for account_detail in account_details:
487 for platform_detail in platform_details:
488 if platform_detail['platform_id'] == account_detail['platform_id']:
489 if 'myslice' in platform_detail['platform']:
490 account_config = json.loads(account_detail['config'])
491 if 'user_private_key' in account_config:
492 private_key = account_config['user_private_key']
493 response = HttpResponse(private_key, content_type='text/plain')
494 response['Content-Disposition'] = 'attachment; filename="privkey.txt"'
497 messages.error(request, 'Download error: Private key is not stored in the server')
498 return HttpResponseRedirect("/portal/account/")
501 messages.error(request, 'Account error: You need an account in myslice platform to perform this action')
502 return HttpResponseRedirect("/portal/account/")
504 elif 'delete' in request.POST or request.POST['button_value'] == 'delete':
505 for account_detail in account_details:
506 for platform_detail in platform_details:
507 if platform_detail['platform_id'] == account_detail['platform_id']:
508 if 'myslice' in platform_detail['platform']:
509 account_config = json.loads(account_detail['config'])
510 if 'user_private_key' in account_config:
511 for key in account_config.keys():
512 if key == 'user_private_key':
513 del account_config[key]
515 updated_config = json.dumps(account_config)
516 user_params = { 'config': updated_config, 'auth_type':'user'}
517 manifold_update_account(request, user_id, user_params)
518 messages.success(request, 'Private Key deleted. You need to delegate credentials manually once it expires.')
519 messages.success(request, 'Once your credentials expire, Please delegate manually using SFA: http://trac.myslice.info/wiki/DelegatingCredentials')
520 return HttpResponseRedirect("/portal/account/")
522 messages.error(request, 'Delete error: Private key is not stored in the server')
523 return HttpResponseRedirect("/portal/account/")
526 messages.error(request, 'Account error: You need an account in myslice platform to perform this action')
527 return HttpResponseRedirect("/portal/account/")
529 # download identity for jfed
530 elif 'dl_identity' in request.POST or request.POST['button_value'] == 'dl_identity':
531 for account_detail in account_details:
532 for platform_detail in platform_details:
533 if platform_detail['platform_id'] == account_detail['platform_id']:
534 if 'myslice' in platform_detail['platform']:
535 account_config = json.loads(account_detail['config'])
536 if 'user_private_key' in account_config:
537 private_key = account_config['user_private_key']
538 user_hrn = account_config.get('user_hrn','N/A')
539 registry = 'http://sfa-fed4fire.pl.sophia.inria.fr:12345/'
540 jfed_identity = user_hrn + '\n' + registry + '\n' + private_key
541 response = HttpResponse(jfed_identity, content_type='text/plain')
542 response['Content-Disposition'] = 'attachment; filename="jfed_identity.txt"'
545 messages.error(request, 'Download error: Private key is not stored in the server')
546 return HttpResponseRedirect("/portal/account/")
549 messages.error(request, 'Account error: You need an account in myslice platform to perform this action')
550 return HttpResponseRedirect("/portal/account/")
552 # Download sfi_config
553 elif 'dl_sfi_config' in request.POST or request.POST['button_value'] == 'dl_sfi_config':
554 platform_detail = get_myslice_platform(request)
555 platform_config = json.loads(platform_detail['config'])
556 account_detail = get_myslice_account(request)
557 account_config = json.loads(account_detail['config'])
559 user_hrn = account_config.get('user_hrn','N/A')
560 t_user_hrn = user_hrn.split('.')
561 authority_hrn = t_user_hrn[0] + '.' + t_user_hrn[1]
563 hostname = socket.gethostbyaddr(socket.gethostname())[0]
564 registry = platform_config.get('registry','N/A')
565 admin_user = platform_config.get('user','N/A')
566 if 'localhost' in registry:
567 port = registry.split(':')[-1:][0]
568 registry = "http://" + hostname +':'+ port
569 manifold_host = ConfigEngine().manifold_url()
570 if 'localhost' in manifold_host:
571 manifold_host = manifold_host.replace('localhost',hostname)
572 sfi_config = '[sfi]\n'
573 sfi_config += 'auth = '+ authority_hrn +'\n'
574 sfi_config += 'user = '+ user_hrn +'\n'
575 sfi_config += 'registry = '+ registry +'\n'
576 sfi_config += 'sm = http://sfa3.planet-lab.eu:12346/\n\n'
577 sfi_config += '[myslice]\n'
578 sfi_config += 'backend = '+ manifold_host +'\n'
579 sfi_config += 'delegate = '+ admin_user +'\n'
580 sfi_config += 'platform = myslice\n'
581 sfi_config += 'username = '+ user_email +'\n'
582 response = HttpResponse(sfi_config, content_type='text/plain')
583 response['Content-Disposition'] = 'attachment; filename="sfi_config"'
587 elif 'clear_cred' in request.POST or request.POST['button_value'] == 'clear_cred':
589 result = clear_user_creds(request, user_email)
590 if result is not None:
591 messages.success(request, 'All Credentials cleared')
593 messages.error(request, 'Delete error: Credentials are not stored in the server')
595 print "Exception in accountview.py in clear_user_creds %s" % e
596 messages.error(request, 'Account error: You need an account in myslice platform to perform this action')
597 return HttpResponseRedirect("/portal/account/")
599 # Download delegated_user_cred
600 elif 'dl_user_cred' in request.POST or request.POST['button_value'] == 'dl_user_cred':
601 if 'delegated_user_credential' in account_config:
602 user_cred = account_config['delegated_user_credential']
603 response = HttpResponse(user_cred, content_type='text/plain')
604 response['Content-Disposition'] = 'attachment; filename="user_cred.txt"'
607 messages.error(request, 'Download error: User credential is not stored in the server')
608 return HttpResponseRedirect("/portal/account/")
611 elif 'dl_user_cert' in request.POST or request.POST['button_value'] == 'dl_user_cert':
612 if 'user_credential' in account_config:
613 user_cred = account_config['user_credential']
614 obj_cred = Credential(string=user_cred)
615 obj_gid = obj_cred.get_gid_object()
616 str_cert = obj_gid.save_to_string()
617 response = HttpResponse(str_cert, content_type='text/plain')
618 response['Content-Disposition'] = 'attachment; filename="user_certificate.pem"'
621 elif 'delegated_user_credential' in account_config:
622 user_cred = account_config['delegated_user_credential']
623 obj_cred = Credential(string=user_cred)
624 obj_gid = obj_cred.get_gid_object()
625 str_cert = obj_gid.save_to_string()
626 response = HttpResponse(str_cert, content_type='text/plain')
627 response['Content-Disposition'] = 'attachment; filename="user_certificate.pem"'
630 messages.error(request, 'Download error: User credential is not stored in the server')
631 return HttpResponseRedirect("/portal/account/")
633 # Download user p12 = private_key + Certificate
634 elif 'dl_user_p12' in request.POST or request.POST['button_value'] == 'dl_user_p12':
635 if 'user_credential' in account_config and 'user_private_key' in account_config:
636 user_cred = account_config['user_credential']
637 obj_cred = Credential(string=user_cred)
638 obj_gid = obj_cred.get_gid_object()
639 str_cert = obj_gid.save_to_string()
640 cert = crypto.load_certificate(crypto.FILETYPE_PEM, str_cert)
642 user_private_key = account_config['user_private_key'].encode('ascii')
643 pkey = crypto.load_privatekey(crypto.FILETYPE_PEM, user_private_key)
645 p12 = crypto.PKCS12()
646 p12.set_privatekey(pkey)
647 p12.set_certificate(cert)
648 pkcs12 = p12.export()
650 response = HttpResponse(pkcs12, content_type='text/plain')
651 response['Content-Disposition'] = 'attachment; filename="user_pkcs.p12"'
654 elif 'delegated_user_credential' in account_config and 'user_private_key' in account_config:
655 user_cred = account_config['delegated_user_credential']
656 obj_cred = Credential(string=user_cred)
657 obj_gid = obj_cred.get_gid_object()
658 str_cert = obj_gid.save_to_string()
659 cert = crypto.load_certificate(crypto.FILETYPE_PEM, str_cert)
661 user_private_key = account_config['user_private_key'].encode('ascii')
662 pkey = crypto.load_privatekey(crypto.FILETYPE_PEM, user_private_key)
664 p12 = crypto.PKCS12()
665 p12.set_privatekey(pkey)
666 p12.set_certificate(cert)
667 pkcs12 = p12.export()
669 response = HttpResponse(pkcs12, content_type='text/plain')
670 response['Content-Disposition'] = 'attachment; filename="user_pkcs.p12"'
673 messages.error(request, 'Download error: User private key or credential is not stored in the server')
674 return HttpResponseRedirect("/portal/account/")
677 messages.info(request, 'Under Construction. Please try again later!')
678 return HttpResponseRedirect("/portal/account/")