1 from django.http import HttpResponse
2 from manifold.core.query import Query
3 from manifoldapi.manifoldapi import execute_query,execute_admin_query
4 from portal.models import PendingUser, PendingSlice, PendingAuthority
7 from django.contrib.auth.models import User
8 from django.contrib.sites.models import Site
9 from django.contrib.auth import get_user_model
10 from django.template.loader import render_to_string
11 from django.core.mail import EmailMultiAlternatives, send_mail
13 from myslice.theme import ThemeView
15 # LS Client - By Bruno Soares (UFG)
16 from lsapiclient import LaboraSchedulerClient
22 # Thierry: moving this right into the code so
23 # most people can use myslice without having to install sfa
24 # XXX tmp sfa dependency, should be moved to SFA gateway
25 #from sfa.util.xrn import Xrn
28 # Get the list of authorities
30 def authority_get_pis(request, authority_hrn):
31 query = Query.get('authority').filter_by('authority_hrn', '==', authority_hrn).select('pi_users')
32 results = execute_admin_query(request, query)
33 print "authority_get_pis = %s" % results
34 # NOTE: temporarily commented. Because results is giving empty list.
35 # Needs more debugging
37 # raise Exception, "Authority not found: %s" % authority_hrn
39 #return result['pi_users']
42 def authority_get_pi_emails(request, authority_hrn):
43 pi_users = authority_get_pis(request,authority_hrn)
44 print "pi_users = %s" % pi_users
46 if any(pi['pi_users'] == None or not pi['pi_users'] for pi in pi_users):
47 #theme.template_name = 'email_default_recipients.txt'
48 #default_email = render_to_string(theme.template, request)
49 #default_email = default_email.replace('\n', '')
51 # the above doesn't work
52 return ['support@onelab.eu']
54 pi_user_hrns = [ hrn for x in pi_users for hrn in x['pi_users'] ]
55 query = Query.get('user').filter_by('user_hrn', 'included', pi_user_hrns).select('user_email')
56 results = execute_admin_query(request, query)
57 return [result['user_email'] for result in results]
59 #clear user credentials
60 def clear_user_creds(request, user_email):
62 user_query = Query().get('local:user').filter_by('email', '==', user_email).select('user_id','email','password','config')
63 user_details = execute_admin_query(request, user_query)
65 # getting the user_id from the session
66 for user_detail in user_details:
67 user_id = user_detail['user_id']
68 user_email = user_detail['email']
70 account_query = Query().get('local:account').filter_by('user_id', '==', user_id).select('user_id','platform_id','auth_type','config')
71 account_details = execute_admin_query(request, account_query)
73 platform_query = Query().get('local:platform').select('platform_id','platform')
74 platform_details = execute_admin_query(request, platform_query)
76 for account_detail in account_details:
77 for platform_detail in platform_details:
78 if platform_detail['platform_id'] == account_detail['platform_id']:
79 if 'myslice' in platform_detail['platform']:
80 account_config = json.loads(account_detail['config'])
81 #user_cred = account_config.get('delegated_user_credential','N/A')
82 user_cred = account_config.get('user_credential','N/A')
83 if 'N/A' not in user_cred:
84 user_hrn = account_config.get('user_hrn','N/A')
85 user_pub_key = json.dumps(account_config.get('user_public_key','N/A'))
86 user_priv_key = json.dumps(account_config.get('user_private_key','N/A'))
87 updated_config = '{"user_public_key":'+ user_pub_key + ', "user_private_key":'+ user_priv_key + ', "user_hrn":"'+ user_hrn + '"}'
88 user_params = { 'config': updated_config}
89 manifold_update_account(request, user_id,user_params)
95 print "Exception in actions.py in clear_user_creds %s" % e
98 def is_pi(wsgi_request, user_hrn, authority_hrn):
99 # XXX could be done in a single query !
101 # select pi_authorities from user where user_hrn == "ple.upmc.jordan_auge"
102 query = Query.get('user').filter_by('user_hrn', '==', user_hrn).select('pi_authorities')
103 results = execute_admin_query(wsgi_request, query)
108 user_authority_hrns = result.get('pi_authorities', [])
109 return authority_hrn in user_authority_hrns
113 def sfa_get_user(request, user_hrn, pub):
114 query_sfa_user = Query.get('user').filter_by('user_hrn', '==', user_hrn)
115 result_sfa_user = execute_query(request, query_sfa_user)
116 return result_sfa_user
118 def sfa_update_user(request, user_hrn, user_params):
119 # user_params: keys [public_key]
120 if 'email' in user_params:
121 user_params['user_email'] = user_params['email']
122 query = Query.update('user').filter_by('user_hrn', '==', user_hrn).set(user_params).select('user_hrn')
123 results = execute_query(request,query)
126 def sfa_add_authority(request, authority_params):
127 query = Query.create('authority').set(authority_params).select('authority_hrn')
128 results = execute_query(request, query)
129 print "sfa_add_auth results=",results
131 raise Exception, "Could not create %s. Already exists ?" % authority_params['hrn']
134 def sfa_add_user_to_slice(request, user_hrn, slice_params):
135 # UPDATE myslice:slice SET researcher=['ple.upmc.jordan_auge','ple.inria.thierry_parmentelat','ple.upmc.loic_baron','ple.upmc.ciro_scognamiglio','ple.upmc.mohammed-yasin_rahman','ple.upmc.azerty'] where slice_hrn=='ple.upmc.myslicedemo'
136 query_current_users = Query.get('slice').select('user').filter_by('slice_hrn','==',slice_params['hrn'])
137 results_current_users = execute_query(request, query_current_users)
138 slice_params['researcher'] = slice_params['researcher'] | results_current_users
139 query = Query.update('slice').filter_by('user_hrn', '==', user_hrn).set(slice_params).select('slice_hrn')
140 results = execute_query(request, query)
141 # Also possible but not supported yet
142 # UPDATE myslice:user SET slice=['ple.upmc.agent','ple.upmc.myslicedemo','ple.upmc.tophat'] where user_hrn=='ple.upmc.azerty'
144 raise Exception, "Could not create %s. Already exists ?" % slice_params['hrn']
149 def manifold_add_user(wsgi_request, request):
150 """Add a Manifold user corresponding to a user request.
153 wsgi_request: a WSGIRequest instance
154 request (dict): a dictionary containing the user request built from the
158 The user_id of the inserted user.
165 authority_hrn = request['authority_hrn']
166 request['authority_hrn'] = authority_hrn.split(".")[0]
168 USER_CONFIG = '{"firstname": "%(first_name)s", "lastname": "%(last_name)s", "authority": "%(authority_hrn)s"}'
171 'email' : request['username'],
172 'password' : request['password'],
173 'config' : USER_CONFIG % request,
177 request['authority_hrn'] = authority_hrn
179 query = Query.create('local:user').set(user_params).select('email')
180 results = execute_admin_query(request, query)
182 raise Exception, "Failed creating manifold user: %s" % user_params['email']
184 return result['email']
186 def manifold_update_user(request, email, user_params):
187 # user_params: password, config e.g.,
188 query = Query.update('local:user').filter_by('email', '==', email).set(user_params).select('email')
189 results = execute_admin_query(request,query)
190 # NOTE: results remains empty and goes to Exception. However, it updates the manifold DB.
191 # That's why I commented the exception part. -- Yasin
193 # raise Exception, "Failed updating manifold user: %s" % user_params['email']
197 def manifold_add_account(request, account_params):
198 query = Query.create('local:account').set(account_params).select(['user', 'platform'])
199 results = execute_admin_query(request,query)
201 raise Exception, "Failed creating manifold account on platform %s for user: %s" % (account_params['platform'], account_params['user'])
203 return result['user_id']
205 def manifold_update_account(request,user_id,account_params):
206 # account_params: config
207 query = Query.update('local:account').filter_by('platform', '==', 'myslice').filter_by('user_id', '==', user_id).set(account_params).select('user_id')
208 results = execute_admin_query(request,query)
211 #explicitly mention the platform_id
212 def manifold_delete_account(request, platform_id, user_id, account_params):
213 query = Query.delete('local:account').filter_by('platform_id', '==', platform_id).filter_by('user_id', '==', user_id).set(account_params).select('user_id')
214 results = execute_admin_query(request,query)
217 def manifold_delete_user(request, user_id, user_params):
218 query = Query.delete('local:user').filter_by('user_id', '==', user_id).set(user_params).select('user_id')
219 results = execute_admin_query(request,query)
224 def manifold_add_platform(request, platform_params):
225 query = Query.create('local:platform').set(platform_params).select(['user', 'platform'])
226 results = execute_admin_query(request,query)
228 raise Exception, "Failed creating manifold platform %s for user: %s" % (platform_params['platform'], platform_params['user'])
230 return result['platform_id']
233 def make_request_user(user):
235 request['type'] = 'user'
236 request['id'] = user.id
237 request['timestamp'] = user.created # XXX in DB ?
238 request['authority_hrn'] = user.authority_hrn
239 request['first_name'] = user.first_name
240 request['last_name'] = user.last_name
241 request['email'] = user.email
242 request['login'] = user.login
243 request['user_hrn'] = user.user_hrn
244 request['public_key'] = user.public_key
245 request['private_key'] = user.private_key
246 request['username'] = user.login
247 request['reasons'] = user.reasons
250 def make_request_slice(slice):
252 request['type'] = 'slice'
253 request['id'] = slice.id
254 request['user_hrn'] = slice.user_hrn
255 request['timestamp'] = slice.created
256 request['authority_hrn'] = slice.authority_hrn
257 request['slice_name'] = slice.slice_name
258 request['number_of_nodes'] = slice.number_of_nodes
259 request['type_of_nodes'] = slice.type_of_nodes
260 request['purpose'] = slice.purpose
263 def make_request_authority(authority):
265 request['type'] = 'authority'
266 request['id'] = authority.id
267 request['site_name'] = authority.site_name
268 request['site_latitude'] = authority.site_latitude
269 request['site_longitude'] = authority.site_longitude
270 request['site_url'] = authority.site_url
271 request['site_authority'] = authority.site_authority
272 request['site_abbreviated_name'] = authority.site_abbreviated_name
273 request['address_line1'] = authority.address_line1
274 request['address_line2'] = authority.address_line2
275 request['address_line3'] = authority.address_line3
276 request['address_city'] = authority.address_city
277 request['address_postalcode'] = authority.address_postalcode
278 request['address_state'] = authority.address_state
279 request['address_country'] = authority.address_country
280 request['authority_hrn'] = authority.authority_hrn
281 request['timestamp'] = authority.created
284 def make_requests(pending_users, pending_slices, pending_authorities):
286 for user in pending_users:
287 requests.append(make_request_user(user))
288 for slice in pending_slices:
289 requests.append(make_request_slice(slice))
290 for authority in pending_authorities:
291 requests.append(make_request_authority(authority))
294 def get_request_by_id(ids):
295 sorted_ids = { 'user': [], 'slice': [], 'authority': [] }
297 type, id = type__id.split('__')
298 sorted_ids[type].append(id)
301 pending_users = PendingUser.objects.all()
302 pending_slices = PendingSlice.objects.all()
303 pending_authorities = PendingAuthority.objects.all()
305 pending_users = PendingUser.objects.filter(id__in=sorted_ids['user']).all()
306 pending_slices = PendingSlice.objects.filter(id__in=sorted_ids['slice']).all()
307 pending_authorities = PendingAuthority.objects.filter(id__in=sorted_ids['authority']).all()
309 return make_requests(pending_users, pending_slices, pending_authorities)
311 def get_requests(authority_hrns=None):
312 print "get_request_by_authority auth_hrns = ", authority_hrns
313 if not authority_hrns:
314 ## get those pending users who have confirmed their emails
315 pending_users = PendingUser.objects.filter(status__iexact = 'True')
316 pending_slices = PendingSlice.objects.all()
317 pending_authorities = PendingAuthority.objects.all()
319 pending_users = PendingUser.objects.filter(authority_hrn__in=authority_hrns).all()
320 pending_slices = PendingSlice.objects.filter(authority_hrn__in=authority_hrns).all()
321 pending_authorities = PendingAuthority.objects.filter(authority_hrn__in=authority_hrns).all()
323 return make_requests(pending_users, pending_slices, pending_authorities)
325 # XXX Is it in sync with the form fields ?
327 def portal_validate_request(wsgi_request, request_ids):
330 if not isinstance(request_ids, list):
331 request_ids = [request_ids]
333 requests = get_request_by_id(request_ids)
334 for request in requests:
335 # type, id, timestamp, details, allowed -- MISSING: authority_hrn
336 # CAREFUL about details
337 # user : first name, last name, email, password, keypair
338 # slice : number of nodes, type of nodes, purpose
342 if request['type'] == 'user':
345 create_user(wsgi_request, request)
346 request_status['SFA user'] = {'status': True }
347 PendingUser.objects.get(id=request['id']).delete()
349 request_status['SFA user'] = {'status': False, 'description': str(e)}
351 # user_params = {'status':2}
352 # manifold_update_user(request, request['email'], user_params)
354 # MANIFOLD user should be added beforehand, during registration
356 # manifold_user_params = { key: request[key] for key in MANIFOLD_USER_KEYS }
357 # # XXX # manifold_add_user(manifold_user_params)
358 # request_status['MySlice user'] = {'status': True }
359 #except Exception, e:
360 # request_status['MySlice user'] = {'status': False, 'description': str(e)}
363 #manifold_account_params = { key: request[key] for key in MANIFOLD_ACCOUNT_KEYS }
364 #manifold_add_account(manifold_account_params)
365 #request_status['MySlice testbed accounts'] = {'status': False }
367 elif request['type'] == 'slice':
369 create_slice(wsgi_request, request)
370 request_status['SFA slice'] = {'status': True }
371 PendingSlice.objects.get(id=request['id']).delete()
374 request_status['SFA slice'] = {'status': False, 'description': str(e)}
376 elif request['type'] == 'authority':
378 #hrn = "%s.%s" % (request['authority_hrn'], request['site_authority'])
379 hrn = request['site_authority']
380 # XXX tmp sfa dependency
381 from sfa.util.xrn import Xrn
382 urn = Xrn(hrn, request['type']).get_urn()
384 # Only hrn is required for Manifold Query
385 sfa_authority_params = {
386 'authority_hrn' : hrn,
387 #'authority_urn' : urn,
388 #'type' : request['type'],
392 print "ADD Authority"
393 sfa_add_authority(wsgi_request, sfa_authority_params)
394 request_status['SFA authority'] = {'status': True }
395 PendingAuthority.objects.get(id=request['id']).delete()
398 request_status['SFA authority'] = {'status': False, 'description': str(e)}
400 # XXX Remove from Pendings in database
402 status['%s__%s' % (request['type'], request['id'])] = request_status
406 def validate_action(request, **kwargs):
407 ids = filter(None, kwargs['id'].split('/'))
408 status = portal_validate_request(request, ids)
409 json_answer = json.dumps(status)
410 return HttpResponse (json_answer, mimetype="application/json")
413 def reject_action(request, **kwargs):
414 ids = filter(None, kwargs['id'].split('/'))
415 status = portal_reject_request(request, ids)
416 json_answer = json.dumps(status)
417 return HttpResponse (json_answer, mimetype="application/json")
420 def portal_reject_request(wsgi_request, request_ids):
423 current_site = Site.objects.get_current()
424 current_site = current_site.domain
427 if not isinstance(request_ids, list):
428 request_ids = [request_ids]
430 requests = get_request_by_id(request_ids)
431 for request in requests:
432 # type, id, timestamp, details, allowed -- MISSING: authority_hrn
433 # CAREFUL about details
434 # user : first name, last name, email, password, keypair
435 # slice : number of nodes, type of nodes, purpose
439 if request['type'] == 'user':
441 request_status['SFA user'] = {'status': True }
442 # getting user email based on id
443 ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
444 for user in PendingUser.objects.raw('SELECT * FROM portal_pendinguser WHERE id = %s', [request['id']]):
445 user_email= user.email
446 first_name = user.first_name
447 last_name = user.last_name
450 'first_name' : first_name,
451 'last_name' : last_name,
452 'portal_url' : current_site,
455 theme.template_name = 'user_request_denied.txt'
456 text_content = render_to_string(theme.template, ctx)
457 theme.template_name = 'user_request_denied.html'
458 html_content = render_to_string(theme.template, ctx)
459 theme.template_name = 'email_default_sender.txt'
460 sender = render_to_string(theme.template, ctx)
461 sender = sender.replace('\n', '')
463 subject = 'User request denied.'
465 msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
466 msg.attach_alternative(html_content, "text/html")
469 print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
471 # removing from Django auth_user
472 UserModel = get_user_model()
473 UserModel._default_manager.filter(email__iexact = user_email).delete()
474 # removing from Django portal_pendinguser
475 PendingUser.objects.get(id=request['id']).delete()
476 # removing from manifold
477 # removing manifold account
478 user_query = Query().get('local:user') \
479 .filter_by('email', '==', user_email) \
481 user = execute_admin_query(wsgi_request, user_query)
482 user_id = user[0]['user_id']
484 platform_query = Query().get('local:platform') \
485 .filter_by('platform', '==', 'myslice') \
486 .select('platform_id')
487 platform = execute_admin_query(wsgi_request, platform_query)
488 platform_id = platform[0]['platform_id']
489 account_params = {'user_id':user_id}
490 manifold_delete_account(request, platform_id, user_id, account_params)
492 # removing manifold user
493 user_params = {'user_id':user_id}
494 manifold_delete_user(request, user_id, user_params)
496 request_status['SFA authority'] = {'status': False, 'description': str(e)}
498 elif request['type'] == 'slice':
499 request_status['SFA slice'] = {'status': True }
501 # getting user email based on id
502 ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
503 for user in PendingSlice.objects.raw('SELECT * FROM portal_pendingslice WHERE id = %s', [request['id']]):
504 user_email= user.type_of_nodes # XXX type_of_nodes field contains the email [shd be renamed in DB]
505 slice_name = user.slice_name
506 purpose = user.purpose
507 url = user.number_of_nodes
510 'slice_name': slice_name,
513 'portal_url': current_site,
516 theme.template_name = 'slice_request_denied.txt'
517 text_content = render_to_string(theme.template, ctx)
518 theme.template_name = 'slice_request_denied.html'
519 html_content = render_to_string(theme.template, ctx)
520 theme.template_name = 'email_default_sender.txt'
521 sender = render_to_string(theme.template, ctx)
522 sender = sender.replace('\n', '')
524 subject = 'Slice request denied.'
526 msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
527 msg.attach_alternative(html_content, "text/html")
530 print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
532 PendingSlice.objects.get(id=request['id']).delete()
534 elif request['type'] == 'authority':
535 request_status['SFA authority'] = {'status': True }
537 # getting user email based on id
538 ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
539 for user in PendingAuthority.objects.raw('SELECT * FROM portal_pendingauthority WHERE id = %s', [request['id']]):
540 user_email= user.address_line1 # XXX address_line1 field contains the email [shd be renamed in DB]
541 site_name = user.site_name
542 city = user.address_city
543 country = user.address_country
544 short_name = user.site_abbreviated_name
548 'site_name': site_name,
549 'short_name': short_name,
553 'portal_url' : current_site,
557 theme.template_name = 'authority_request_denied.txt'
558 text_content = render_to_string(theme.template, ctx)
559 theme.template_name = 'authority_request_denied.html'
560 html_content = render_to_string(theme.template, ctx)
561 theme.template_name = 'email_default_sender.txt'
562 sender = render_to_string(theme.template, ctx)
563 sender = sender.replace('\n', '')
564 subject = 'Authority request denied.'
565 msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
566 msg.attach_alternative(html_content, "text/html")
569 print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
571 PendingAuthority.objects.get(id=request['id']).delete()
573 status['%s__%s' % (request['type'], request['id'])] = request_status
578 # http://djangosnippets.org/snippets/942/
582 #-------------------------------------------------------------------------------
584 #-------------------------------------------------------------------------------
586 def create_slice(wsgi_request, request):
589 wsgi_request (~ WSGIRequest) :
590 request (dict) : the slice request in our own dict format
595 hrn = "%s.%s" % (request['authority_hrn'], request['slice_name'])
597 # XXX tmp sfa dependency
598 from sfa.util.xrn import Xrn
599 urn = Xrn(hrn, request['type']).get_urn()
601 # Add User to Slice if we have the user_hrn in pendingslice table
602 user_hrn = request.get('user_hrn', None)
603 user_obj = User.objects.get(username = user_hrn.split(".")[1])
605 user_hrns = list([user_hrn]) if user_hrn else list()
606 for user in user_hrns:
607 list_users +=[User.objects.get(username = user.split(".")[1])]
609 #user_query = Query.get('local:user').select('email').filter_by('email','==',user.username)
610 #user_details_sfa = execute_admin_query(wsgi_request, user_query)
612 pendinguser = PendingUser.objects.filter(login__iexact = user_obj.username)
614 raise Exception, "User %s doesn't exist, validate user before validating slice" % user_obj.username
615 #if not user_details_sfa:
616 # raise Exception, "User %s doesn't exist, validate user before validating slice" % user_hrn
617 #for user in list_users:
619 user_email = user_obj.email
621 # XXX LOIC Quick fix because this is totally inconsistent
622 if not 'number_of_nodes' in request:
623 request['number_of_nodes']=""
625 # XXX We should create a slice with Manifold terminology
629 'slice_type' : request['type'],
630 'url' : request['number_of_nodes'],
632 'slice_enabled' : True
634 # ignored in request: id, timestamp, number_of_nodes, type_of_nodes, purpose
636 query = Query.create('slice').set(slice_params).select('slice_hrn')
637 results = execute_query(wsgi_request, query)
639 raise Exception, "Could not create %s. Already exists ?" % slice_params['hrn']
641 clear_user_creds(wsgi_request,user_obj.username)
643 activity.slice.validate(request, "Slice validation")#, { "slice" : hrn })
646 theme.template_name = 'slice_request_validated.txt'
647 text_content = render_to_string(theme.template, request)
648 theme.template_name = 'slice_request_validated.html'
649 html_content = render_to_string(theme.template, request)
651 theme.template_name = 'email_default_sender.txt'
652 sender = render_to_string(theme.template, request)
653 sender = sender.replace('\n', '')
655 subject = 'Slice request validated'
657 msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
658 msg.attach_alternative(html_content, "text/html")
661 print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
665 def create_pending_slice(wsgi_request, request, email):
669 # Insert an entry in the PendingSlice table
671 slice_name = request['slice_name'],
672 user_hrn = request['user_hrn'],
673 authority_hrn = request['authority_hrn'],
674 number_of_nodes = request['url'], # field needs to be renamed
675 purpose = request['purpose'],
676 type_of_nodes = request['email'] # field needs to be renamed
681 # Send an email: the recipients are the PI of the authority
682 recipients = authority_get_pi_emails(wsgi_request, request['authority_hrn'])
684 pis = authority_get_pis(request, request['authority_hrn'])
687 for e in x['pi_users']:
690 y = User.objects.get(username = u)
692 if y.username.count("@") != 0:
693 if y.username.split("@")[1] == request['user_hrn'].split("@")[1]:
694 pi_emails += [y.email]
699 theme.template_name = 'slice_request_email.txt'
700 text_content = render_to_string(theme.template, request)
702 theme.template_name = 'slice_request_email.html'
703 html_content = render_to_string(theme.template, request)
705 theme.template_name = 'slice_request_email_subject.txt'
706 subject = render_to_string(theme.template, request)
707 subject = subject.replace('\n', '')
709 theme.template_name = 'email_default_sender.txt'
710 sender = render_to_string(theme.template, request)
711 sender = sender.replace('\n', '')
714 msg = EmailMultiAlternatives(subject, text_content, sender, pi_emails)
715 msg.attach_alternative(html_content, "text/html")
718 print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
720 #-------------------------------------------------------------------------------
722 #-------------------------------------------------------------------------------
724 def manifold_add_reference_user_accounts(wsgi_request, request):
725 """When a new user is created, add reference accounts to the reference platform.
727 # XXX XXX XXX The rest of this function has to be checked XXX XXX XXX
729 # Retrieve user information
730 user_query = Query().get('local:user') \
731 .select('user_id', 'config', 'email', 'status') \
732 .filter_by('email', '==', request['username'])
733 user_details = execute_admin_query(wsgi_request, user_query)
735 # USER MAIN ACCOUNT != reference
736 #print 'USER MAIN ACCOUNT != reference'
737 list_accounts_query = Query().get('local:account') \
738 .select('user_id', 'platform_id', 'auth_type', 'config') \
739 .filter_by('user_id', '==', user_details[0]['user_id']) \
740 .filter_by('auth_type', '!=', 'reference')
741 list_accounts = execute_admin_query(wsgi_request, list_accounts_query)
743 # XXX main_platform is being erased several times ???
744 for account in list_accounts:
745 main_platform_query = Query().get('local:platform') \
746 .select('platform_id', 'platform') \
747 .filter_by('platform_id', '==', account['platform_id'])
748 main_platform = execute_admin_query(wsgi_request, main_platform_query)
750 # Add reference accounts on SFA enabled platforms
751 platforms_query = Query().get('local:platform') \
752 .filter_by('disabled', '==', '0') \
753 .filter_by('gateway_type', '==', 'sfa') \
754 .select('platform_id', 'gateway_type')
755 platforms = execute_admin_query(wsgi_request, platforms_query)
756 for platform in platforms:
757 #print "add reference to platform ",platform
758 manifold_account_params = {
759 'user_id' : user_details[0]['user_id'],
760 'platform_id' : platform['platform_id'],
761 'auth_type' : 'reference',
762 'config' : '{"reference_platform": "' + main_platform[0]['platform'] + '"}',
764 manifold_add_account(wsgi_request, manifold_account_params)
766 def sfa_create_user(wsgi_request, request, namespace = None, as_admin = False):
769 wsgi_request (~ WSGIRequest) :
770 request (dict) : the user request in our own dict format
775 from sfa.util.xrn import Xrn
777 auth_pi = request.get('pi', None)
778 auth_pi = list([auth_pi]) if auth_pi else list()
780 # We create a user request with Manifold terminology
782 'user_hrn' : request['user_hrn'],
783 'user_email' : request['email'],
784 'user_urn' : Xrn(request['user_hrn'], request['type']).get_urn(),
785 'user_type' : request['type'],
786 'keys' : request['public_key'],
787 'user_first_name' : request['first_name'],
788 'user_last_name' : request['last_name'],
789 'pi_authorities' : auth_pi,
790 'user_enabled' : True
794 #query = Query.create('user').set(sfa_user_params).select('user_hrn')
795 #results = execute_query(wsgi_request, query)
797 if namespace is not None:
798 query = Query.create('%s:user' % namespace).set(sfa_user_params).select('user_hrn')
800 query = Query.create('user').set(sfa_user_params).select('user_hrn')
803 results = execute_admin_query(wsgi_request, query)
805 results = execute_query(wsgi_request, query)
808 raise Exception, "Could not create %s. Already exists ?" % sfa_user_params['user_hrn']
810 subject = 'User validated'
811 msg = 'A manager of your institution has validated your account. You have now full user access to the portal.'
812 send_mail(subject, msg, 'support@fibre.org.br',[request['email']], fail_silently=False)
815 def ls_create_user(wsgi_request, request, user_detail):
816 organization = request['username'].split('@')[1]
817 lsClient = LaboraSchedulerClient( organization )
819 orgGIDNumber = lsClient.get_testbed_info()['gidnumber']
820 userHomeDirectory = "/home/" + organization + "/" + request['username'].split('@')[0]
821 userHomeDirectory = userHomeDirectory.encode('utf-8')
824 'username' : request['username'],
825 'email' : request['email'].encode('utf-8'),
826 'password' : request['password'].encode('utf-8'),
827 'name' : str( request['first_name'].encode('latin1') ) + ' ' + str( request['last_name'].encode('latin1') ),
828 'gidnumber' : orgGIDNumber,
829 'homedirectory' : userHomeDirectory,
830 'created_by' : "myslice"
833 # Add user in the island.
834 addUser = lsClient.add_user( userData )
836 # User successfully created, upload user public key.
838 ls_update_public_key( wsgi_request, request, lsClient, addUser )
842 def ls_validate_user(wsgi_request, request):
843 organization = request['username'].split('@')[1]
844 lsClient = LaboraSchedulerClient( organization )
846 userId = lsClient.get_user_id_by_username( { 'username': str( request['username'] ) } )
852 'new_user_data' : { 'enable': 'TRUE' }
855 validate = lsClient.update_user( userData )
857 return validate and addUserPublicKey
859 def ls_update_public_key( wsgi_request, request, lsClient, userId ):
862 'public_key' : request['public_key']
865 addUserPublicKey = lsClient.add_user_public_key( userPbKey )
867 return addUserPublicKey
869 def iotlab_create_user (wsgi_request, request, namespace = None, as_admin=False):
873 from requests.auth import HTTPBasicAuth
875 URL_REST = 'https://devgrenoble.senslab.info/rest/admin/users'
877 PASSWORD_ADMIN = "k,mfg1+Q"
879 auth = HTTPBasicAuth(LOGIN_ADMIN,PASSWORD_ADMIN)
880 headers = {'content-type': 'application/json'}
882 for user in PendingUser.objects.raw('SELECT * FROM portal_pendinguser WHERE email = %s', [request['email']]):
883 password= user.password
886 iotlab_user_params = {
888 "login" : request['email'],
889 "password" : password,
890 "firstName" : request['first_name'],
891 "lastName" : request['last_name'],
892 "email" : request['email'],
893 "structure" : request['authority_hrn'],
896 "sshPublicKey" : [request['public_key']],
897 "motivations" : "SFA federation",
900 iotlab_user_params1 = json.dumps(iotlab_user_params)
901 r=requests.post(url=URL_REST, data=iotlab_user_params1, headers=headers, auth=auth)
902 print 'Create iotlab user : ', r.status_code, r.text
905 def create_user(wsgi_request, request, namespace = None, as_admin = False):
906 # XXX This has to be stored centrally
907 USER_STATUS_ENABLED = 2
909 # NOTE : if we were to create a user directly (just like we create slices,
910 # we would have to perform the steps in create_pending_user too
912 # Edelberto - I put this more below
913 # Add the user to the SFA registry
914 #sfa_create_user(wsgi_request, request)
916 # Update Manifold user status
917 manifold_update_user(wsgi_request, request['username'], {'status': USER_STATUS_ENABLED})
919 # Add reference accounts for platforms
920 manifold_add_reference_user_accounts(wsgi_request, request)
923 # sfa_create_user(wsgi_request, request)
924 # Add the user to the SFA registry
925 sfa_create_user(wsgi_request, request, namespace, as_admin)
927 # Validate the user using the LS API ( By Bruno - UFG ):
929 ls_validate_user( wsgi_request, request )
931 "Error to validate the user in Labora Scheduler."
933 def create_user_in_ldap(wsgi_request, request, user_detail):
937 # saves the user to django auth_user table [needed for password reset]
938 user = User.objects.create_user(request['username'], request['email'], request['password'])
940 # Creating a manifold user
941 user_id = manifold_add_user(wsgi_request, request)
943 # Creating a Manifold account on the MySlice platform
944 # Note the JSON representation of public and private keys already includes quotes
946 'user_hrn' : request['user_hrn'],
947 'user_public_key' : request['public_key'],
949 if request['private_key']:
950 account_config['user_private_key'] = request['private_key']
952 user_id = user_detail['user_id'] + 1 # the user_id for the newly created user in local:user
954 # XXX TODO: Require a myslice platform
955 # ALERT: this will disapear with ROUTERV2 of Manifold
956 # We have to consider the case where several registries can be used
957 # Removed hardcoded platform = 5
958 # This platform == 'myslice' is a TMP FIX !!
960 reg_platform_query = Query().get('local:platform') \
961 .filter_by('platform', '==', 'myslice') \
962 .select('platform_id')
963 reg_platform = execute_admin_query(wsgi_request, reg_platform_query)
964 reg_platform_id = reg_platform[0]['platform_id']
966 'platform_id' : reg_platform_id, # XXX ALERT !!
968 'auth_type' : request['auth_type'],
969 'config' : json.dumps(account_config),
971 manifold_add_account(wsgi_request, account_params)
973 print "Failed creating manifold account on platform %s for user: %s" % ('myslice', request['email'])
975 # XXX This has to be stored centrally
976 USER_STATUS_ENABLED = 2
978 # Update Manifold user status
979 manifold_update_user(wsgi_request, request['username'], {'status': USER_STATUS_ENABLED})
981 # Add reference accounts for platforms
982 manifold_add_reference_user_accounts(wsgi_request, request)
984 organization = request['username'].split('@')[1]
985 lsClient = LaboraSchedulerClient( organization )
987 userId = lsClient.get_user_id_by_username( { 'username': str( request['username'] ) } )
989 ls_up_pkey = ls_update_public_key( wsgi_request, request, lsClient, userId )
994 from sfa.util.xrn import Xrn
996 auth_pi = request.get('pi', None)
997 auth_pi = list([auth_pi]) if auth_pi else list()
999 # We create a user request with Manifold terminology
1001 'user_hrn' : request['user_hrn'],
1002 'user_email' : request['email'],
1003 'user_urn' : Xrn(request['user_hrn'], request['type']).get_urn(),
1004 'user_type' : request['type'],
1005 'keys' : request['public_key'],
1006 'user_first_name' : request['first_name'],
1007 'user_last_name' : request['last_name'],
1008 'pi_authorities' : auth_pi,
1009 'user_enabled' : True
1012 print request['user_hrn']
1013 print request['email']
1014 print request['first_name']
1015 print request['last_name']
1016 print request['type']
1017 print request['public_key']
1019 query = Query.create('user').set(sfa_user_params).select('user_hrn')
1023 results = execute_admin_query(wsgi_request, query)
1028 raise Exception, "Could not create %s. Already exists ?" % sfa_user_params['user_hrn']
1030 subject = 'User validated'
1031 msg = 'A manager of your institution has validated your account. You have now full user access to the portal.'
1032 send_mail(subject, msg, 'support@fibre.org.br',[request['email']], fail_silently=False)
1035 # Add the user to iotlab portal if theme is set to onelab
1036 if theme.theme == 'onelab':
1037 iotlab_create_user (wsgi_request, request)
1039 def create_pending_user(wsgi_request, request, user_detail):
1043 # Insert an entry in the PendingUser table
1045 first_name = request['first_name'],
1046 last_name = request['last_name'],
1047 authority_hrn = request['authority_hrn'],
1048 email = request['email'],
1049 login = request['username'],
1050 password = request['password'],
1051 public_key = request['public_key'],
1052 private_key = request['private_key'],
1053 user_hrn = request['user_hrn'],
1055 email_hash = request['email_hash'],
1056 reasons = request['reasons'],
1061 # sends email to user to activate the email
1062 theme.template_name = 'activate_user.html'
1063 html_content = render_to_string(theme.template, request)
1064 theme.template_name = 'activate_user.txt'
1065 text_content = render_to_string(theme.template, request)
1066 theme.template_name = 'activate_user_email_subject.txt'
1067 subject = render_to_string(theme.template, request)
1068 subject = subject.replace('\n', '')
1069 theme.template_name = 'email_default_sender.txt'
1070 sender = render_to_string(theme.template, request)
1071 sender = sender.replace('\n', '')
1072 recipient = [request['email']]
1073 #recipient = recipient.append(request['email'])
1075 msg = EmailMultiAlternatives(subject, text_content, sender, recipient)
1076 msg.attach_alternative(html_content, "text/html")
1079 # saves the user to django auth_user table [needed for password reset]
1080 user = User.objects.create_user(request['username'], request['email'], request['password'])
1082 # Creating a manifold user
1083 user_id = manifold_add_user(wsgi_request, request)
1085 # Creating a Manifold account on the MySlice platform
1086 # Note the JSON representation of public and private keys already includes quotes
1088 'user_hrn' : request['user_hrn'],
1089 'user_public_key' : request['public_key'],
1091 if request['private_key']:
1092 account_config['user_private_key'] = request['private_key']
1094 user_id = user_detail['user_id'] + 1 # the user_id for the newly created user in local:user
1096 # XXX TODO: Require a myslice platform
1097 # ALERT: this will disapear with ROUTERV2 of Manifold
1098 # We have to consider the case where several registries can be used
1099 # Removed hardcoded platform = 5
1100 # This platform == 'myslice' is a TMP FIX !!
1102 reg_platform_query = Query().get('local:platform') \
1103 .filter_by('platform', '==', 'myslice') \
1104 .select('platform_id')
1105 reg_platform = execute_admin_query(wsgi_request, reg_platform_query)
1106 reg_platform_id = reg_platform[0]['platform_id']
1108 'platform_id' : reg_platform_id, # XXX ALERT !!
1109 'user_id' : user_id,
1110 'auth_type' : request['auth_type'],
1111 'config' : json.dumps(account_config),
1113 manifold_add_account(wsgi_request, account_params)
1114 except Exception, e:
1115 print "Failed creating manifold account on platform %s for user: %s" % ('myslice', request['email'])
1117 # Add user to island using LS API ( By Bruno - UFG )
1118 ls_user_create = ls_create_user( wsgi_request, request, user_detail )
1121 # Send an email: the recipients are the PI of the authority
1122 # If No PI is defined for this Authority, send to a default email (different for each theme)
1124 split_authority_hrn = request['authority_hrn'].split(".")[0]
1126 recipients = authority_get_pi_emails(wsgi_request, split_authority_hrn)
1128 pis = authority_get_pis(request, split_authority_hrn)
1131 for e in x['pi_users']:
1134 y = User.objects.get(username = u)
1135 if y.username.count("@") != 0:
1136 if y.username.split("@")[1] == request['username'].split("@")[1]:
1137 pi_emails += [y.email]
1141 theme.template_name = 'user_request_email.html'
1142 html_content = render_to_string(theme.template, request)
1144 theme.template_name = 'user_request_email.txt'
1145 text_content = render_to_string(theme.template, request)
1147 theme.template_name = 'user_request_email_subject.txt'
1148 subject = render_to_string(theme.template, request)
1149 subject = subject.replace('\n', '')
1151 theme.template_name = 'email_default_sender.txt'
1152 sender = render_to_string(theme.template, request)
1153 sender = sender.replace('\n', '')
1155 msg = EmailMultiAlternatives(subject, text_content, sender, pi_emails)
1157 msg.attach_alternative(html_content, "text/html")
1160 except Exception, e:
1161 print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
1163 traceback.print_exc()