1 from django.http import HttpResponse
2 from manifold.core.query import Query
3 from manifoldapi.manifoldapi import execute_query,execute_admin_query
4 from portal.models import PendingUser, PendingSlice, PendingAuthority, PendingProject, PendingJoin
5 from unfold.page import Page
9 from django.contrib.auth.models import User
10 from django.contrib.sites.models import Site
11 from django.contrib.auth import get_user_model
12 from django.template.loader import render_to_string
13 from django.core.mail import EmailMultiAlternatives, send_mail
15 from myslice.theme import ThemeView
16 from myslice.configengine import ConfigEngine
17 from myslice.settings import logger
23 # Thierry: moving this right into the code so
24 # most people can use myslice without having to install sfa
25 # XXX tmp sfa dependency, should be moved to SFA gateway
26 #from sfa.util.xrn import Xrn
28 def get_myslice_platform(request):
29 platform_query = Query().get('local:platform').select('platform_id','platform','gateway_type','disabled','config').filter_by('platform','==','myslice')
30 platform_details = execute_query(request, platform_query)
31 if isinstance(platform_details,list):
32 for platform_detail in platform_details:
33 return platform_detail
37 def get_myslice_account(request):
39 platform_myslice = get_myslice_platform(request)
40 account_query = Query().get('local:account').select('user_id','platform_id','auth_type','config').filter_by('platform_id','==',platform_myslice['platform_id'])
41 account_details = execute_query(request, account_query)
42 for account_detail in account_details:
44 except Exception as e:
48 def get_registry_url(request):
50 platform_detail = get_myslice_platform(request)
51 platform_config = json.loads(platform_detail['config'])
53 hostname = socket.gethostbyaddr(socket.gethostname())[0]
54 registry = platform_config.get('registry','N/A')
55 if 'localhost' in registry:
56 port = registry.split(':')[-1:][0]
57 registry = "http://" + hostname +':'+ port
59 except Exception as e:
63 def get_jfed_identity(request):
65 account_detail = get_myslice_account(request)
66 account_config = json.loads(account_detail['config'])
67 if 'user_private_key' in account_config:
68 private_key = account_config['user_private_key']
69 user_hrn = account_config.get('user_hrn','N/A')
70 platform_detail = get_myslice_platform(request)
71 registry = get_registry_url(request)
72 #registry = 'http://sfa-fed4fire.pl.sophia.inria.fr:12345/'
73 jfed_identity = user_hrn + '\n' + registry + '\n' + private_key
77 except Exception as e:
81 # Get the list of pis in a given authority
82 def authority_get_pis(request, authority_hrn):
83 # CACHE PB with fields
85 metadata = page.get_metadata()
86 auth_md = metadata.details_by_object('authority')
87 auth_fields = [column['name'] for column in auth_md['column']]
89 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
90 query = Query.get('myslice:authority').filter_by('authority_hrn', '==', authority_hrn).select(auth_fields)
91 results = execute_admin_query(request, query)
92 #print "authority_get_pis = %s" % results
93 # NOTE: temporarily commented. Because results is giving empty list.
94 # Needs more debugging
96 # raise Exception, "Authority not found: %s" % authority_hrn
98 #return result['pi_users']
101 #check the user is pi or not in the registry
102 def authority_check_pis(request, user_email):
104 user_query = Query().get('local:user').filter_by('email', '==', user_email).select('user_id','email','password','config')
105 user_details = execute_admin_query(request, user_query)
107 # getting the authority_hrn
108 for user_detail in user_details:
109 user_id = user_detail['user_id']
110 if user_detail['config']:
111 config = json.loads(user_detail['config'])
112 authority_hrn = config.get('authority','Unknown Authority')
114 account_query = Query().get('local:account').filter_by('user_id', '==', user_id).select('user_id','platform_id','auth_type','config')
115 account_details = execute_admin_query(request, account_query)
117 platform_query = Query().get('local:platform').select('platform_id','platform')
118 platform_details = execute_admin_query(request, platform_query)
120 for account_detail in account_details:
121 for platform_detail in platform_details:
122 if platform_detail['platform_id'] == account_detail['platform_id']:
123 if 'myslice' in platform_detail['platform']:
124 account_config = json.loads(account_detail['config'])
125 user_hrn = account_config.get('user_hrn','N/A')
128 pis = authority_get_pis (request, authority_hrn)
130 pi_list = pi['pi_users']
132 if user_hrn in pi_list:
136 except Exception as e:
137 logger.error("Exception in actions.py in authority_check_pis {}".format(e))
141 def authority_add_pis(request, authority_hrn, user_hrn):
144 # getting pis of the authority of the user
145 pis = authority_get_pis (request, authority_hrn)
147 pi_list = pi['pi_users']
149 updated_pi_list = pi_list.append(user_hrn)
150 query = Query.update('myslice:authority').filter_by('authority_hrn', '==', authority_hrn).set({'pi_users':pi_list})
151 results = execute_query(request,query)
152 newpis = authority_get_pis (request, authority_hrn)
154 # Add the user to the slices of the project he/she joined
155 if len(authority_hrn.split('.')) > 2:
156 # this authority_hrn is a project
157 query_slices = Query.get('myslice:slice').filter_by('parent_authority', '==', authority_hrn).select('slice_hrn')
158 results_slices = execute_query(request,query_slices)
159 for s in results_slices:
160 sfa_add_user_to_slice(request, user_hrn, s['slice_hrn'])
161 # Clear Credentials of the user
162 user_email = get_user_email(request, user_hrn)
163 clear_user_creds(request, user_email)
166 except Exception as e:
167 logger.error("Exception in actions.py in authority_add_pis {}".format(e))
168 raise Exception, "Exception in actions.py in authority_add_pis {}".format(e)
170 def authority_remove_pis(request, authority_hrn, user_hrn):
173 # getting pis of the authority of the user
174 pis = authority_get_pis (request, authority_hrn)
176 pi_list = pi['pi_users']
178 updated_pi_list = pi_list.remove(user_hrn)
179 query = Query.update('myslice:authority').filter_by('authority_hrn', '==', authority_hrn).set({'pi_users':pi_list})
180 results = execute_query(request,query)
181 newpis = authority_get_pis (request, authority_hrn)
183 # Remove the user from the slices of the project he/she left
184 if len(authority_hrn.split('.')) > 2:
185 # this authority_hrn is a project
186 query_slices = Query.get('myslice:slice').filter_by('parent_authority', '==', authority_hrn).select('slice_hrn')
187 results_slices = execute_query(request,query_slices)
188 for s in results_slices:
189 print 'remove from slice %s' % s
190 sfa_remove_user_from_slice(request, user_hrn, s['slice_hrn'])
192 # Clear Credentials of the user
193 user_email = get_user_email(request, user_hrn)
194 clear_user_creds(request, user_email)
197 except Exception as e:
198 logger.error("Exception in actions.py in authority_remove_pis {}".format(e))
199 raise Exception, "Exception in actions.py in authority_remove_pis {}".format(e)
202 def authority_get_pi_emails(request, authority_hrn):
203 pi_users = authority_get_pis(request,authority_hrn)
204 logger.info("pi_users = %s" % pi_users)
206 if any(pi['pi_users'] == None or not pi['pi_users'] for pi in pi_users):
207 #theme.template_name = 'email_default_recipients.txt'
208 #default_email = render_to_string(theme.template, request)
209 #default_email = default_email.replace('\n', '')
210 #return default_email
211 # the above doesn't work
212 return ['support@onelab.eu']
214 pi_user_hrns = [ hrn for x in pi_users for hrn in x['pi_users'] ]
216 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
217 query = Query.get('myslice:user').filter_by('user_hrn', 'included', pi_user_hrns).select('user_email')
218 results = execute_admin_query(request, query)
219 return [result['user_email'] for result in results]
221 def get_user_email(request, user_hrn):
222 query = Query.get('myslice:user').filter_by('user_hrn', '==', user_hrn).select('user_email')
223 results = execute_admin_query(request, query)
224 return results[0]['user_email']
226 #clear user credentials
227 def clear_user_creds(request, user_email):
229 user_query = Query().get('local:user').filter_by('email', '==', user_email).select('user_id','email','password','config')
230 user_details = execute_admin_query(request, user_query)
232 # getting the user_id from the session
233 for user_detail in user_details:
234 user_id = user_detail['user_id']
235 user_email = user_detail['email']
237 account_query = Query().get('local:account').filter_by('user_id', '==', user_id).select('user_id','platform_id','auth_type','config')
238 account_details = execute_admin_query(request, account_query)
240 platform_query = Query().get('local:platform').select('platform_id','platform')
241 platform_details = execute_admin_query(request, platform_query)
243 for account_detail in account_details:
244 for platform_detail in platform_details:
245 if platform_detail['platform_id'] == account_detail['platform_id']:
246 if 'myslice' in platform_detail['platform']:
247 account_config = json.loads(account_detail['config'])
248 #user_cred = account_config.get('delegated_user_credential','N/A')
249 user_cred = account_config.get('user_credential','N/A')
250 if 'N/A' not in user_cred:
251 user_hrn = account_config.get('user_hrn','N/A')
252 user_pub_key = json.dumps(account_config.get('user_public_key','N/A'))
253 user_priv_key = json.dumps(account_config.get('user_private_key','N/A'))
254 updated_config = '{"user_public_key":'+ user_pub_key + ', "user_private_key":'+ user_priv_key + ', "user_hrn":"'+ user_hrn + '"}'
255 user_params = { 'config': updated_config}
256 manifold_update_account(request, user_id,user_params)
261 except Exception as e:
262 logger.error("Exception in actions.py in clear_user_creds {}".format(e))
265 def is_pi(wsgi_request, user_hrn, authority_hrn):
266 # authorities from user where user_hrn == "ple.upmc.jordan_auge"
267 logger.debug("#### actions.py is_pi authority_hrn = {}".format(authority_hrn))
269 # CACHE PB with fields
270 page = Page(wsgi_request)
271 metadata = page.get_metadata()
272 user_md = metadata.details_by_object('user')
273 user_fields = [column['name'] for column in user_md['column']]
275 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
276 query = Query().get('myslice:user').select(user_fields).filter_by('user_hrn','==',user_hrn)
277 #query = Query.get('myslice:user').filter_by('user_hrn', '==', user_hrn).select('pi_authorities')
278 results = execute_query(wsgi_request, query)
279 for user_detail in results:
280 if authority_hrn in user_detail['pi_authorities']:
282 except Exception as e:
283 logger.error("Exception in actions.py in is_pi {}".format(e))
288 def sfa_get_user(request, user_hrn, pub=None):
290 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
291 query_sfa_user = Query.get('myslice:user').filter_by('user_hrn', '==', user_hrn)
292 result_sfa_user = execute_admin_query(request, query_sfa_user)
293 return result_sfa_user[0]
295 def sfa_update_user(request, user_hrn, user_params):
296 # user_params: keys [public_key]
297 if 'email' in user_params:
298 user_params['user_email'] = user_params['email']
300 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
301 query = Query.update('myslice:user').filter_by('user_hrn', '==', user_hrn).set(user_params).select('user_hrn')
302 results = execute_admin_query(request,query)
305 def sfa_add_authority(request, authority_params):
307 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
308 query = Query.create('myslice:authority').set(authority_params).select('authority_hrn')
309 results = execute_query(request, query)
310 logger.info("sfa_add_auth results={}".format(results))
312 raise Exception, "Could not create %s. Already exists ?" % authority_params['hrn']
315 def sfa_add_user_to_slice(request, user_hrn, slice_hrn):
316 # UPDATE myslice:slice SET users = ['fed4fire.upmc.loic_baron', 'fed4fire.upmc.mohammed-yasin_rahman', 'fed4fire.upmc.demo'] WHERE slice_hrn == 'fed4fire.upmc.project_y.test_under' SELECT slice_hrn, slice_urn
317 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
318 query_current_users = Query.get('myslice:slice').select('users').filter_by('slice_hrn','==',slice_hrn)
319 results_current_users = execute_query(request, query_current_users)
320 current_users = list()
321 for r in results_current_users:
322 current_users.extend(r['users'])
323 users = list(set([user_hrn]) | set(current_users))
325 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
326 query = Query.update('myslice:slice').filter_by('slice_hrn', '==', slice_hrn).set({'users':users}).select('slice_hrn')
327 results = execute_query(request, query)
328 # Also possible but not supported yet
329 # UPDATE myslice:user SET slice=['ple.upmc.agent','ple.upmc.myslicedemo','ple.upmc.tophat'] where user_hrn=='ple.upmc.azerty'
331 raise Exception, "Could not add user %s to slice %s" % (user_hrn, slice_hrn)
334 def sfa_remove_user_from_slice(request, user_hrn, slice_hrn):
335 # UPDATE myslice:slice SET users = ['fed4fire.upmc.loic_baron', 'fed4fire.upmc.demo'] WHERE slice_hrn == 'fed4fire.upmc.project_y.test_under' SELECT slice_hrn, slice_urn
336 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
337 query_current_users = Query.get('myslice:slice').select('users').filter_by('slice_hrn','==',slice_hrn)
338 results_current_users = execute_query(request, query_current_users)
339 current_users = list()
340 for r in results_current_users:
341 current_users.extend(r['users'])
342 if user_hrn in current_users:
343 current_users.remove(user_hrn)
345 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
346 query = Query.update('myslice:slice').filter_by('slice_hrn', '==', slice_hrn).set({'users':current_users}).select('slice_hrn')
347 results = execute_query(request, query)
348 # Also possible but not supported yet
349 # UPDATE myslice:user SET slice=['ple.upmc.agent','ple.upmc.myslicedemo','ple.upmc.tophat'] where user_hrn=='ple.upmc.azerty'
351 raise Exception, "Could not remove user %s to slice %s" % (user_hrn, slice_hrn)
356 def manifold_add_user(wsgi_request, request):
357 """Add a Manifold user corresponding to a user request.
360 wsgi_request: a WSGIRequest instance
361 request (dict): a dictionary containing the user request built from the
365 The user_id of the inserted user.
371 USER_CONFIG = '{"firstname": "%(first_name)s", "lastname": "%(last_name)s", "authority": "%(authority_hrn)s"}'
374 'email' : request['email'],
375 'password' : request['password'],
376 'config' : USER_CONFIG % request,
380 query = Query.create('local:user').set(user_params).select('email')
381 results = execute_admin_query(request, query)
383 raise Exception, "Failed creating manifold user: %s" % user_params['email']
385 return result['email']
387 def manifold_update_user(request, email, user_params):
388 # user_params: password, config e.g.,
389 query = Query.update('local:user').filter_by('email', '==', email).set(user_params).select('email')
390 results = execute_admin_query(request,query)
391 # NOTE: results remains empty and goes to Exception. However, it updates the manifold DB.
392 # That's why I commented the exception part. -- Yasin
394 # raise Exception, "Failed updating manifold user: %s" % user_params['email']
398 def manifold_add_account(request, account_params):
399 query = Query.create('local:account').set(account_params).select(['user', 'platform'])
400 results = execute_admin_query(request,query)
402 raise Exception, "Failed creating manifold account on platform %s for user: %s" % (account_params['platform'], account_params['user'])
404 return result['user_id']
406 def manifold_update_account(request,user_id,account_params):
407 # account_params: config
408 query = Query.update('local:account').filter_by('platform', '==', 'myslice').filter_by('user_id', '==', user_id).set(account_params).select('user_id')
409 results = execute_admin_query(request,query)
412 #explicitly mention the platform_id
413 def manifold_delete_account(request, user_id, platform_id = None):
414 query = Query.delete('local:account').filter_by('user_id', '==', user_id)
415 if platform_id is not None:
416 query.filter_by('platform_id', '==', platform_id)
417 results = execute_admin_query(request,query)
420 def manifold_delete_user(request, user_id):
421 query = Query.delete('local:user').filter_by('user_id', '==', user_id).select('user_id')
422 results = execute_admin_query(request,query)
427 def manifold_add_platform(request, platform_params):
428 query = Query.create('local:platform').set(platform_params).select(['user', 'platform'])
429 results = execute_admin_query(request,query)
431 raise Exception, "Failed creating manifold platform %s for user: %s" % (platform_params['platform'], platform_params['user'])
433 return result['platform_id']
435 def delete_local_user(wsgi_request, user_email):
436 user_query = Query().get('local:user') \
437 .filter_by('email', '==', user_email) \
438 .select('user_id','config')
439 user = execute_admin_query(wsgi_request, user_query)
442 #raise Exception, "User not found, check local DB"
444 user_id = user[0]['user_id']
445 user_config = json.loads(user[0]['config'])
446 authority_hrn = user_config.get('authority', None)
448 if is_pi(wsgi_request, '$user_hrn', authority_hrn):
449 # removing from Django auth_user
450 UserModel = get_user_model()
451 UserModel._default_manager.filter(email__iexact = user_email).delete()
453 # removing manifold account
454 manifold_delete_account(wsgi_request, user_id)
456 # removing manifold user
457 manifold_delete_user(wsgi_request, user_id)
460 #raise Exception, "No sufficient rights on authority = ",authority_hrn
465 def make_request_user(user):
467 request['type'] = 'user'
468 request['id'] = user.id
469 request['timestamp'] = user.created # XXX in DB ?
470 request['authority_hrn'] = user.authority_hrn
471 request['first_name'] = user.first_name
472 request['last_name'] = user.last_name
473 request['email'] = user.email
474 request['login'] = user.login
475 request['user_hrn'] = user.user_hrn
476 request['public_key'] = user.public_key
477 request['private_key'] = user.private_key
480 def make_request_slice(slice):
482 request['type'] = 'slice'
483 request['id'] = slice.id
484 request['user_hrn'] = slice.user_hrn
485 request['timestamp'] = slice.created
486 request['authority_hrn'] = slice.authority_hrn
487 request['slice_name'] = slice.slice_name
488 request['number_of_nodes'] = slice.number_of_nodes
489 request['type_of_nodes'] = slice.type_of_nodes
490 request['purpose'] = slice.purpose
493 def make_request_project(project):
495 request['type'] = 'project'
496 request['id'] = project.id
497 request['user_hrn'] = project.user_hrn
498 request['email'] = project.email
499 request['timestamp'] = project.created
500 request['authority_hrn'] = project.authority_hrn
501 request['project_name'] = project.project_name
502 request['purpose'] = project.purpose
505 def make_request_join(join):
507 request['type'] = 'join'
508 request['id'] = join.id
509 request['user_hrn'] = join.user_hrn
510 request['email'] = join.email
511 request['timestamp'] = join.created
512 request['authority_hrn'] = join.authority_hrn
513 request['project_name'] = join.project_name
516 def make_request_authority(authority):
518 request['type'] = 'authority'
519 request['id'] = authority.id
520 request['site_name'] = authority.site_name
521 request['site_latitude'] = authority.site_latitude
522 request['site_longitude'] = authority.site_longitude
523 request['site_url'] = authority.site_url
524 request['site_authority'] = authority.site_authority
525 request['site_abbreviated_name'] = authority.site_abbreviated_name
526 request['address_line1'] = authority.address_line1
527 request['address_line2'] = authority.address_line2
528 request['address_line3'] = authority.address_line3
529 request['address_city'] = authority.address_city
530 request['address_postalcode'] = authority.address_postalcode
531 request['address_state'] = authority.address_state
532 request['address_country'] = authority.address_country
533 request['authority_hrn'] = authority.authority_hrn
534 request['timestamp'] = authority.created
537 def make_requests(pending_users, pending_slices, pending_authorities, pending_projects, pending_joins):
538 logger.info("$$$$$$$$$$$$$$$ make_request")
540 for user in pending_users:
541 requests.append(make_request_user(user))
542 for slice in pending_slices:
543 requests.append(make_request_slice(slice))
544 for authority in pending_authorities:
545 requests.append(make_request_authority(authority))
546 for project in pending_projects:
547 requests.append(make_request_project(project))
548 for join in pending_joins:
549 requests.append(make_request_join(join))
552 def get_request_by_id(ids):
553 logger.info("$$$$$$$$$$$$$$$$ get_request_by_id")
554 sorted_ids = { 'user': [], 'slice': [], 'authority': [], 'project': [], 'join': [] }
556 type, id = type__id.split('__')
557 sorted_ids[type].append(id)
560 pending_users = PendingUser.objects.all()
561 pending_slices = PendingSlice.objects.all()
562 pending_authorities = PendingAuthority.objects.all()
563 pending_projects = PendingProject.objects.all()
564 pending_joins = PendingJoin.objects.all()
566 pending_users = PendingUser.objects.filter(id__in=sorted_ids['user']).all()
567 pending_slices = PendingSlice.objects.filter(id__in=sorted_ids['slice']).all()
568 pending_authorities = PendingAuthority.objects.filter(id__in=sorted_ids['authority']).all()
569 pending_projects = PendingProject.objects.filter(id__in=sorted_ids['project']).all()
570 pending_joins = PendingJoin.objects.filter(id__in=sorted_ids['join']).all()
572 return make_requests(pending_users, pending_slices, pending_authorities, pending_projects, pending_joins)
574 def get_requests(authority_hrns=None):
575 logger.info("$$$$$$$$$$$$$ get_request_by_authority auth_hrns = {}".format(authority_hrns))
576 if not authority_hrns:
577 ## get those pending users who have confirmed their emails
578 pending_users = PendingUser.objects.filter(status__iexact = 'True')
579 pending_slices = PendingSlice.objects.all()
580 pending_authorities = PendingAuthority.objects.all()
581 pending_projects = PendingProject.objects.all()
582 pending_joins = PendingJoin.objects.all()
584 pending_users = PendingUser.objects
585 pending_slices = PendingSlice.objects
586 pending_authorities = PendingAuthority.objects
587 pending_projects = PendingProject.objects
588 pending_joins = PendingJoin.objects
589 from django.db.models import Q
591 list_slice_Q = list()
595 for hrn in authority_hrns:
596 list_user_Q.append(Q(authority_hrn__startswith=hrn, status__iexact = 'True'))
597 list_slice_Q.append(Q(authority_hrn__startswith=hrn))
598 list_auth_Q.append(Q(site_authority__startswith=hrn))
599 list_proj_Q.append(Q(authority_hrn__startswith=hrn))
600 list_join_Q.append(Q(authority_hrn__startswith=hrn))
601 from operator import __or__ as OR
602 pending_users = pending_users.filter(reduce(OR, list_user_Q))
603 pending_slices = pending_slices.filter(reduce(OR, list_slice_Q))
604 pending_authorities = pending_authorities.filter(reduce(OR, list_auth_Q))
605 pending_projects = pending_projects.filter(reduce(OR, list_proj_Q))
606 pending_joins = pending_joins.filter(reduce(OR, list_join_Q))
607 #pending_authorities = pending_authorities.all() #filter(reduce(OR, list_Q))
609 return make_requests(pending_users, pending_slices, pending_authorities, pending_projects, pending_joins)
611 # XXX Is it in sync with the form fields ?
613 def portal_validate_request(wsgi_request, request_ids):
616 if not isinstance(request_ids, list):
617 request_ids = [request_ids]
619 requests = get_request_by_id(request_ids)
620 for request in requests:
621 # type, id, timestamp, details, allowed -- MISSING: authority_hrn
622 # CAREFUL about details
623 # user : first name, last name, email, password, keypair
624 # slice : number of nodes, type of nodes, purpose
628 if request['type'] == 'user':
629 create_user(wsgi_request, request)
630 request_status['SFA user'] = {'status': True }
631 u = PendingUser.objects.get(id=request['id'])
633 'first_name' : u.first_name,
634 'last_name' : u.last_name,
639 PendingUser.objects.get(id=request['id']).delete()
641 elif request['type'] == 'slice':
642 create_slice(wsgi_request, request)
643 request_status['SFA slice'] = {'status': True }
644 s = PendingSlice.objects.get(id=request['id'])
646 'slice_name' : s.slice_name,
648 'purpose' : s.purpose,
653 PendingSlice.objects.get(id=request['id']).delete()
655 # Clear user's Credentials
656 sfa_user = sfa_get_user(wsgi_request, request['user_hrn'])
657 clear_user_creds(wsgi_request,sfa_user['user_email'])
659 elif request['type'] == 'authority':
660 #hrn = "%s.%s" % (request['authority_hrn'], request['site_authority'])
661 hrn = request['site_authority']
662 # XXX tmp sfa dependency
663 from sfa.util.xrn import Xrn
664 urn = Xrn(hrn, request['type']).get_urn()
666 # Only hrn is required for Manifold Query
667 sfa_authority_params = {
668 'authority_hrn' : hrn,
669 #'authority_urn' : urn,
670 #'type' : request['type'],
674 logger.info("ADD Authority")
675 sfa_add_authority(wsgi_request, sfa_authority_params)
676 request_status['SFA authority'] = {'status': True }
677 a = PendingAuthority.objects.get(id=request['id'])
679 'site_name' : a.site_name,
680 'short_name' : a.short_name,
683 'country' : a.country,
684 'portal_url' : a.current_site,
688 PendingAuthority.objects.get(id=request['id']).delete()
690 # Clear Admin Cache as it is used to display the list of authorities in Registration page
691 query = Query.update('myslice:authority').filter_by('authority_hrn', '==', sfa_authority_params['authority_hrn']).set({'authority_hrn':sfa_authority_params['authority_hrn']}).select('authority_hrn')
692 res = execute_admin_query(request, query)
694 elif request['type'] == 'project':
695 hrn = request['authority_hrn'] + '.' + request['project_name']
697 # Only hrn is required for Manifold Query
698 sfa_authority_params = {
699 'authority_hrn' : hrn
701 sfa_add_authority(wsgi_request, sfa_authority_params)
703 # Add user as a PI of the project
704 # Clear user's Credentials
705 authority_add_pis(wsgi_request, hrn , request['user_hrn'])
707 request_status['SFA project'] = {'status': True }
708 p = PendingProject.objects.get(id=request['id'])
710 'project_name' : p.project_name,
711 'authority_hrn' : p.authority_hrn,
713 'purpose' : p.purpose,
717 PendingProject.objects.get(id=request['id']).delete()
719 # Clear Admin Cache as it is used to display the list of projects in Slice request page
720 query = Query.update('myslice:authority').filter_by('authority_hrn', '==', sfa_authority_params['authority_hrn']).set({'authority_hrn':sfa_authority_params['authority_hrn']}).select('authority_hrn')
721 res = execute_admin_query(request, query)
724 elif request['type'] == 'join':
725 # Add user as a PI of the project
726 # Clear user's Credentials
727 authority_add_pis(wsgi_request, request['authority_hrn'] , request['user_hrn'])
729 request_status['SFA join'] = {'status': True }
730 j = PendingJoin.objects.get(id=request['id'])
732 'project_name' : j.project_name,
733 'authority_hrn' : j.authority_hrn,
735 'user_hrn' : j.user_hrn,
739 PendingJoin.objects.get(id=request['id']).delete()
741 raise Exception, 'unknown type of request %s' % request['type']
742 # XXX Remove from Pendings in database
744 send_status_email(ctx, user_email, request['type'], 'validated')
746 request_status['SFA '+request['type']] = {'status': False, 'description': str(e)}
748 status['%s__%s' % (request['type'], request['id'])] = request_status
752 def validate_action(request, **kwargs):
753 ids = filter(None, kwargs['id'].split('/'))
754 status = portal_validate_request(request, ids)
755 json_answer = json.dumps(status)
756 return HttpResponse (json_answer, content_type="application/json")
759 def reject_action(request, **kwargs):
760 ids = filter(None, kwargs['id'].split('/'))
761 status = portal_reject_request(request, ids)
762 json_answer = json.dumps(status)
763 return HttpResponse (json_answer, content_type="application/json")
766 def portal_reject_request(wsgi_request, request_ids):
769 current_site = Site.objects.get_current()
770 current_site = current_site.domain
773 if not isinstance(request_ids, list):
774 request_ids = [request_ids]
776 requests = get_request_by_id(request_ids)
777 for request in requests:
778 # type, id, timestamp, details, allowed -- MISSING: authority_hrn
779 # CAREFUL about details
780 # user : first name, last name, email, password, keypair
781 # slice : number of nodes, type of nodes, purpose
786 if request['type'] == 'user':
787 request_status['SFA user'] = {'status': True }
788 # getting user email based on id
789 ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
790 for user in PendingUser.objects.raw('SELECT * FROM portal_pendinguser WHERE id = %s', [request['id']]):
791 user_email= user.email
792 first_name = user.first_name
793 last_name = user.last_name
796 'first_name' : first_name,
797 'last_name' : last_name,
798 'email' : user_email,
799 'portal_url' : current_site,
802 # removing from Django portal_pendinguser
803 PendingUser.objects.get(id=request['id']).delete()
805 delete_local_user(wsgi_request, user_email)
807 elif request['type'] == 'slice':
808 request_status['SFA slice'] = {'status': True }
810 # getting user email based on id
811 ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
812 for user in PendingSlice.objects.raw('SELECT * FROM portal_pendingslice WHERE id = %s', [request['id']]):
813 user_email= user.type_of_nodes # XXX type_of_nodes field contains the email [shd be renamed in DB]
814 slice_name = user.slice_name
815 purpose = user.purpose
816 url = user.number_of_nodes
819 'slice_name': slice_name,
822 'portal_url': current_site,
825 PendingSlice.objects.get(id=request['id']).delete()
827 elif request['type'] == 'authority':
828 request_status['SFA authority'] = {'status': True }
830 # getting user email based on id
831 ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
832 for user in PendingAuthority.objects.raw('SELECT * FROM portal_pendingauthority WHERE id = %s', [request['id']]):
833 user_email= user.address_line1 # XXX address_line1 field contains the email [shd be renamed in DB]
834 site_name = user.site_name
835 city = user.address_city
836 country = user.address_country
837 short_name = user.site_abbreviated_name
841 'site_name': site_name,
842 'short_name': short_name,
846 'portal_url' : current_site,
849 PendingAuthority.objects.get(id=request['id']).delete()
851 # XXX TMP we should send an email to the user to inform him/her
852 elif request['type'] == 'project':
853 request_status['SFA project'] = {'status': True }
854 p = PendingProject.objects.get(id=request['id'])
856 'project_name' : p.project_name,
857 'authority_hrn' : p.authority_hrn,
859 'purpose' : p.purpose,
862 PendingProject.objects.get(id=request['id']).delete()
864 elif request['type'] == 'join':
865 request_status['SFA join'] = {'status': True }
866 j = PendingJoin.objects.get(id=request['id'])
868 'project_name' : j.project_name,
869 'authority_hrn' : j.authority_hrn,
871 'user_hrn' : j.user_hrn,
875 PendingJoin.objects.get(id=request['id']).delete()
877 raise Exception, 'unknown type of request %s' % request['type']
879 send_status_email(ctx, user_email, request['type'], 'denied')
881 request_status['SFA '+request['type']] = {'status': False, 'description': str(e)}
883 status['%s__%s' % (request['type'], request['id'])] = request_status
887 def send_status_email(ctx, user_email, obj_type, status):
889 theme.template_name = obj_type + '_request_' + status + '.txt'
890 text_content = render_to_string(theme.template, ctx)
891 theme.template_name = obj_type + '_request_' + status + '.html'
892 html_content = render_to_string(theme.template, ctx)
893 theme.template_name = 'email_default_sender.txt'
895 sender = render_to_string(theme.template, ctx)
896 sender = sender.replace('\n', '')
898 subject = obj_type + ' request '+ status +'.'
900 msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
901 msg.attach_alternative(html_content, "text/html")
903 except Exception as e:
905 logger.error("Failed to send email, please check the mail templates and the SMTP configuration of your server")
909 # http://djangosnippets.org/snippets/942/
913 #-------------------------------------------------------------------------------
915 #-------------------------------------------------------------------------------
917 def create_slice(wsgi_request, request):
920 wsgi_request (~ WSGIRequest) :
921 request (dict) : the slice request in our own dict format
926 hrn = "%s.%s" % (request['authority_hrn'], request['slice_name'])
927 # XXX tmp sfa dependency
928 from sfa.util.xrn import Xrn
929 urn = Xrn(hrn, request['type']).get_urn()
931 # Add User to Slice if we have the user_hrn in pendingslice table
932 user_hrn = request.get('user_hrn', None)
933 user_hrns = list([user_hrn]) if user_hrn else list()
935 # CACHE PB with fields
936 page = Page(wsgi_request)
937 metadata = page.get_metadata()
938 user_md = metadata.details_by_object('user')
939 user_fields = [column['name'] for column in user_md['column']]
941 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
942 #user_query = Query().get('myslice:user').select('user_hrn','user_email').filter_by('user_hrn','==',user_hrn)
943 user_query = Query().get('myslice:user').select(user_fields).filter_by('user_hrn','==',user_hrn)
944 user_details_sfa = execute_admin_query(wsgi_request, user_query)
945 if not user_details_sfa:
946 raise Exception, "User %s doesn't exist, validate user before validating slice" % user_hrn
947 for user in user_details_sfa:
948 user_email = user['user_email']
950 # XXX LOIC Quick fix because this is totally inconsistent
951 if not 'number_of_nodes' in request:
952 request['number_of_nodes']=""
954 # Slice is under a project
955 if len(request['authority_hrn'].split('.')) > 2:
957 pis = authority_get_pis(wsgi_request, request['authority_hrn'])
959 pi_list = pi['pi_users']
960 user_hrns.extend(pi_list)
962 # XXX We should create a slice with Manifold terminology
966 'slice_type' : request['type'],
967 'url' : request['number_of_nodes'],
969 'slice_enabled' : True
971 # ignored in request: id, timestamp, number_of_nodes, type_of_nodes, purpose
973 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
974 query = Query.create('myslice:slice').set(slice_params).select('slice_hrn')
975 results = execute_query(wsgi_request, query)
977 raise Exception, "Could not create %s. Already exists ?" % slice_params['hrn']
980 for u_hrn in user_hrns:
981 u_email = get_user_email(wsgi_request, u_hrn)
982 clear_user_creds(wsgi_request, u_email)
983 except Exception as e:
984 logger.error("Failed clear credentials for all users")
985 clear_user_creds(wsgi_request,user_email)
987 activity.slice.validate(request, { "slice" : hrn })
991 def create_pending_slice(wsgi_request, request, email):
995 # Insert an entry in the PendingSlice table
997 slice_name = request['slice_name'],
998 user_hrn = request['user_hrn'],
999 authority_hrn = request['authority_hrn'],
1000 number_of_nodes = request['url'], # field needs to be renamed
1001 purpose = request['purpose'],
1002 type_of_nodes = request['email'] # field needs to be renamed
1006 send_email_to_pis(wsgi_request, request, 'slice')
1008 def create_pending_project(wsgi_request, request):
1012 # Insert an entry in the PendingProject table
1014 project_name = request['project_name'],
1015 user_hrn = request['user_hrn'],
1016 email = request['email'],
1017 authority_hrn = request['authority_hrn'],
1018 purpose = request['purpose'],
1022 send_email_to_pis(wsgi_request, request, 'project')
1024 def create_pending_join(wsgi_request, request):
1028 # Insert an entry in the PendingJoin table
1030 user_hrn = request['user_hrn'],
1031 email = request['email'],
1032 project_name = request['project_name'],
1033 authority_hrn = request['authority_hrn'],
1037 send_email_to_pis(wsgi_request, request, 'join')
1039 #-------------------------------------------------------------------------------
1041 #-------------------------------------------------------------------------------
1043 def send_email_to_pis(wsgi_request, request, obj_type):
1045 # Send an email: the recipients are the PIs of the authority
1046 recipients = authority_get_pi_emails(wsgi_request, request['authority_hrn'])
1048 theme.template_name = obj_type + '_request_email.txt'
1049 text_content = render_to_string(theme.template, request)
1051 theme.template_name = obj_type + '_request_email.html'
1052 html_content = render_to_string(theme.template, request)
1054 #theme.template_name = obj_type + '_request_email_subject.txt'
1055 #subject = render_to_string(theme.template, request)
1056 #subject = subject.replace('\n', '')
1057 subject = "New "+obj_type+" request"
1059 theme.template_name = 'email_default_sender.txt'
1060 sender = render_to_string(theme.template, request)
1061 sender = sender.replace('\n', '')
1063 msg = EmailMultiAlternatives(subject, text_content, sender, recipients)
1064 msg.attach_alternative(html_content, "text/html")
1066 except Exception, e:
1068 print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
1071 #-------------------------------------------------------------------------------
1073 #-------------------------------------------------------------------------------
1075 def manifold_add_reference_user_accounts(wsgi_request, request):
1076 """When a new user is created, add reference accounts to the reference platform.
1078 # XXX XXX XXX The rest of this function has to be checked XXX XXX XXX
1080 # Retrieve user information
1081 user_query = Query().get('local:user') \
1082 .select('user_id', 'config', 'email', 'status') \
1083 .filter_by('email', '==', request['email'])
1084 user_details = execute_admin_query(wsgi_request, user_query)
1086 # USER MAIN ACCOUNT != reference
1087 #print 'USER MAIN ACCOUNT != reference'
1088 list_accounts_query = Query().get('local:account') \
1089 .select('user_id', 'platform_id', 'auth_type', 'config') \
1090 .filter_by('user_id', '==', user_details[0]['user_id']) \
1091 .filter_by('auth_type', '!=', 'reference')
1092 list_accounts = execute_admin_query(wsgi_request, list_accounts_query)
1094 # XXX main_platform is being erased several times ???
1095 for account in list_accounts:
1096 main_platform_query = Query().get('local:platform') \
1097 .select('platform_id', 'platform') \
1098 .filter_by('platform_id', '==', account['platform_id'])
1099 main_platform = execute_admin_query(wsgi_request, main_platform_query)
1101 # Add reference accounts on SFA enabled platforms
1102 platforms_query = Query().get('local:platform') \
1103 .filter_by('disabled', '==', '0') \
1104 .filter_by('gateway_type', '==', 'sfa') \
1105 .select('platform_id', 'gateway_type')
1106 platforms = execute_admin_query(wsgi_request, platforms_query)
1107 for platform in platforms:
1108 #print "add reference to platform ",platform
1109 manifold_account_params = {
1110 'user_id' : user_details[0]['user_id'],
1111 'platform_id' : platform['platform_id'],
1112 'auth_type' : 'reference',
1113 'config' : '{"reference_platform": "' + main_platform[0]['platform'] + '"}',
1115 manifold_add_account(wsgi_request, manifold_account_params)
1117 def sfa_create_user(wsgi_request, request, namespace = None, as_admin = False):
1120 wsgi_request (~ WSGIRequest) :
1121 request (dict) : the user request in our own dict format
1126 from sfa.util.xrn import Xrn
1128 auth_pi = request.get('pi', None)
1129 auth_pi = list([auth_pi]) if auth_pi else list()
1131 # We create a user request with Manifold terminology
1133 'user_hrn' : request['user_hrn'],
1134 'user_email' : request['email'],
1135 'user_urn' : Xrn(request['user_hrn'], request['type']).get_urn(),
1136 'user_type' : request['type'],
1137 'keys' : request['public_key'],
1138 'user_first_name' : request['first_name'],
1139 'user_last_name' : request['last_name'],
1140 'pi_authorities' : auth_pi,
1141 'user_enabled' : True
1144 if namespace is not None:
1145 query = Query.create('%s:user' % namespace).set(sfa_user_params).select('user_hrn')
1147 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
1148 query = Query.create('myslice:user').set(sfa_user_params).select('user_hrn')
1151 results = execute_admin_query(wsgi_request, query)
1153 results = execute_query(wsgi_request, query)
1156 raise Exception, "Could not create %s. Already exists ?" % sfa_user_params['user_hrn']
1160 def iotlab_create_user (wsgi_request, request, namespace = None, as_admin=False):
1164 from requests.auth import HTTPBasicAuth
1166 engine = ConfigEngine()
1167 URL_REST = engine.iotlab_url()
1168 LOGIN_ADMIN = engine.iotlab_admin_user()
1169 PASSWORD_ADMIN = engine.iotlab_admin_password()
1171 auth = HTTPBasicAuth(LOGIN_ADMIN,PASSWORD_ADMIN)
1172 headers = {'content-type': 'application/json'}
1174 for user in PendingUser.objects.raw('SELECT * FROM portal_pendinguser WHERE email = %s', [request['email']]):
1175 password= user.password
1178 iotlab_user_params = {
1180 #"login" : request['email'], #auto generated by iotlab
1181 "password" : password,
1182 "firstName" : request['first_name'],
1183 "lastName" : request['last_name'],
1184 "email" : request['email'],
1185 "structure" : request['authority_hrn'],
1188 "sshPublicKey" : request['public_key'],
1189 "motivations" : "SFA federation",
1192 iotlab_user_params1 = json.dumps(iotlab_user_params)
1193 r=requests.post(url=URL_REST, data=iotlab_user_params1, headers=headers, auth=auth)
1194 logger.info('Create iotlab user : {} {}'.format(r.status_code, r.text))
1197 def create_user(wsgi_request, request, namespace = None, as_admin = False):
1198 # XXX This has to be stored centrally
1199 USER_STATUS_ENABLED = 2
1201 # NOTE : if we were to create a user directly (just like we create slices,
1202 # we would have to perform the steps in create_pending_user too
1204 # Add the user to the SFA registry
1205 sfa_create_user(wsgi_request, request, namespace, as_admin)
1207 # Update Manifold user status
1208 manifold_update_user(wsgi_request, request['email'], {'status': USER_STATUS_ENABLED})
1210 # Add reference accounts for platforms
1211 manifold_add_reference_user_accounts(wsgi_request, request)
1213 # Add the user to iotlab portal if theme is set to onelab
1214 if theme.theme == 'onelab':
1215 iotlab_create_user (wsgi_request, request)
1217 def create_pending_user(wsgi_request, request, user_detail):
1221 # Insert an entry in the PendingUser table
1223 first_name = request['first_name'],
1224 last_name = request['last_name'],
1225 authority_hrn = request['authority_hrn'],
1226 email = request['email'],
1227 password = request['password'],
1228 public_key = request['public_key'],
1229 private_key = request['private_key'],
1230 user_hrn = request['user_hrn'],
1232 email_hash = request['email_hash'],
1236 # sends email to user to activate the email
1237 theme.template_name = 'activate_user.html'
1238 html_content = render_to_string(theme.template, request)
1239 theme.template_name = 'activate_user.txt'
1240 text_content = render_to_string(theme.template, request)
1241 theme.template_name = 'activate_user_email_subject.txt'
1242 subject = render_to_string(theme.template, request)
1243 subject = subject.replace('\n', '')
1244 theme.template_name = 'email_default_sender.txt'
1245 sender = render_to_string(theme.template, request)
1246 sender = sender.replace('\n', '')
1247 recipient = [request['email']]
1248 #recipient = recipient.append(request['email'])
1250 msg = EmailMultiAlternatives(subject, text_content, sender, recipient)
1251 msg.attach_alternative(html_content, "text/html")
1254 # saves the user to django auth_user table [needed for password reset]
1255 user = User.objects.create_user(request['email'], request['email'], request['password'])
1257 # Creating a manifold user
1258 user_id = manifold_add_user(wsgi_request, request)
1260 # Creating a Manifold account on the MySlice platform
1261 # Note the JSON representation of public and private keys already includes quotes
1263 'user_hrn' : request['user_hrn'],
1264 'user_public_key' : request['public_key'],
1266 if request['private_key']:
1267 account_config['user_private_key'] = request['private_key']
1269 user_id = user_detail['user_id'] + 1 # the user_id for the newly created user in local:user
1271 # XXX TODO: Require a myslice platform
1272 # ALERT: this will disapear with ROUTERV2 of Manifold
1273 # We have to consider the case where several registries can be used
1274 # Removed hardcoded platform = 5
1275 # This platform == 'myslice' is a TMP FIX !!
1277 reg_platform_query = Query().get('local:platform') \
1278 .filter_by('platform', '==', 'myslice') \
1279 .select('platform_id')
1280 reg_platform = execute_admin_query(wsgi_request, reg_platform_query)
1282 reg_platform_id = reg_platform[0]['platform_id']
1284 'platform_id' : reg_platform_id, # XXX ALERT !!
1285 'user_id' : user_id,
1286 'auth_type' : request['auth_type'],
1287 'config' : json.dumps(account_config),
1289 manifold_add_account(wsgi_request, account_params)
1291 # Email to PIs is sent when the user activates his email
1292 # portal/emailactivationview.py
1294 except Exception as e:
1295 logger.error("Failed creating manifold account on platform {} for user: {}".format('myslice', request['email']))