1 from django.http import HttpResponse
2 from manifold.core.query import Query
3 from manifoldapi.manifoldapi import execute_query,execute_admin_query
4 from portal.models import PendingUser, PendingSlice, PendingAuthority, PendingProject, PendingJoin
5 from unfold.page import Page
9 from django.contrib.auth.models import User
10 from django.contrib.sites.models import Site
11 from django.contrib.auth import get_user_model
12 from django.template.loader import render_to_string
13 from django.core.mail import EmailMultiAlternatives, send_mail
15 from myslice.theme import ThemeView
16 from myslice.configengine import ConfigEngine
23 # Thierry: moving this right into the code so
24 # most people can use myslice without having to install sfa
25 # XXX tmp sfa dependency, should be moved to SFA gateway
26 #from sfa.util.xrn import Xrn
29 # Get the list of pis in a given authority
30 def authority_get_pis(request, authority_hrn):
31 # CACHE PB with fields
33 metadata = page.get_metadata()
34 auth_md = metadata.details_by_object('authority')
35 auth_fields = [column['name'] for column in auth_md['column']]
37 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
38 query = Query.get('myslice:authority').filter_by('authority_hrn', '==', authority_hrn).select(auth_fields)
39 results = execute_admin_query(request, query)
40 #print "authority_get_pis = %s" % results
41 # NOTE: temporarily commented. Because results is giving empty list.
42 # Needs more debugging
44 # raise Exception, "Authority not found: %s" % authority_hrn
46 #return result['pi_users']
49 #check the user is pi or not in the registry
50 def authority_check_pis(request, user_email):
52 user_query = Query().get('local:user').filter_by('email', '==', user_email).select('user_id','email','password','config')
53 user_details = execute_admin_query(request, user_query)
55 # getting the authority_hrn
56 for user_detail in user_details:
57 user_id = user_detail['user_id']
58 if user_detail['config']:
59 config = json.loads(user_detail['config'])
60 authority_hrn = config.get('authority','Unknown Authority')
62 account_query = Query().get('local:account').filter_by('user_id', '==', user_id).select('user_id','platform_id','auth_type','config')
63 account_details = execute_admin_query(request, account_query)
65 platform_query = Query().get('local:platform').select('platform_id','platform')
66 platform_details = execute_admin_query(request, platform_query)
68 for account_detail in account_details:
69 for platform_detail in platform_details:
70 if platform_detail['platform_id'] == account_detail['platform_id']:
71 if 'myslice' in platform_detail['platform']:
72 account_config = json.loads(account_detail['config'])
73 user_hrn = account_config.get('user_hrn','N/A')
76 pis = authority_get_pis (request, authority_hrn)
78 pi_list = pi['pi_users']
80 if user_hrn in pi_list:
85 print "Exception in actions.py in authority_check_pis %s" % e
89 def authority_add_pis(request, authority_hrn,user_hrn):
91 # getting pis of the authority of the user
92 pis = authority_get_pis (request, authority_hrn)
94 pi_list = pi['pi_users']
96 updated_pi_list = pi_list.append(user_hrn)
97 query = Query.update('myslice:authority').filter_by('authority_hrn', '==', authority_hrn).set({'pi_users':pi_list})
98 results = execute_query(request,query)
99 newpis = authority_get_pis (request, authority_hrn)
102 print "Exception in actions.py in authority_add_pis %s" % e
106 def authority_remove_pis(request, authority_hrn,user_hrn):
108 # getting pis of the authority of the user
109 pis = authority_get_pis (request, authority_hrn)
111 pi_list = pi['pi_users']
113 updated_pi_list = pi_list.remove(user_hrn)
114 query = Query.update('authority').filter_by('authority_hrn', '==', authority_hrn).set({'pi_users':pi_list})
115 results = execute_query(request,query)
116 newpis = authority_get_pis (request, authority_hrn)
119 print "Exception in actions.py in authority_remove_pis %s" % e
123 def authority_get_pi_emails(request, authority_hrn):
124 pi_users = authority_get_pis(request,authority_hrn)
125 print "pi_users = %s" % pi_users
127 if any(pi['pi_users'] == None or not pi['pi_users'] for pi in pi_users):
128 #theme.template_name = 'email_default_recipients.txt'
129 #default_email = render_to_string(theme.template, request)
130 #default_email = default_email.replace('\n', '')
131 #return default_email
132 # the above doesn't work
133 return ['support@onelab.eu']
135 pi_user_hrns = [ hrn for x in pi_users for hrn in x['pi_users'] ]
137 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
138 query = Query.get('myslice:user').filter_by('user_hrn', 'included', pi_user_hrns).select('user_email')
139 results = execute_admin_query(request, query)
140 return [result['user_email'] for result in results]
142 #clear user credentials
143 def clear_user_creds(request, user_email):
145 user_query = Query().get('local:user').filter_by('email', '==', user_email).select('user_id','email','password','config')
146 user_details = execute_admin_query(request, user_query)
148 # getting the user_id from the session
149 for user_detail in user_details:
150 user_id = user_detail['user_id']
151 user_email = user_detail['email']
153 account_query = Query().get('local:account').filter_by('user_id', '==', user_id).select('user_id','platform_id','auth_type','config')
154 account_details = execute_admin_query(request, account_query)
156 platform_query = Query().get('local:platform').select('platform_id','platform')
157 platform_details = execute_admin_query(request, platform_query)
159 for account_detail in account_details:
160 for platform_detail in platform_details:
161 if platform_detail['platform_id'] == account_detail['platform_id']:
162 if 'myslice' in platform_detail['platform']:
163 account_config = json.loads(account_detail['config'])
164 #user_cred = account_config.get('delegated_user_credential','N/A')
165 user_cred = account_config.get('user_credential','N/A')
166 if 'N/A' not in user_cred:
167 user_hrn = account_config.get('user_hrn','N/A')
168 user_pub_key = json.dumps(account_config.get('user_public_key','N/A'))
169 user_priv_key = json.dumps(account_config.get('user_private_key','N/A'))
170 updated_config = '{"user_public_key":'+ user_pub_key + ', "user_private_key":'+ user_priv_key + ', "user_hrn":"'+ user_hrn + '"}'
171 user_params = { 'config': updated_config}
172 manifold_update_account(request, user_id,user_params)
178 print "Exception in actions.py in clear_user_creds %s" % e
181 def is_pi(wsgi_request, user_hrn, authority_hrn):
182 # authorities from user where user_hrn == "ple.upmc.jordan_auge"
183 print "#### actions.py is_pi authority_hrn = ", authority_hrn
185 # CACHE PB with fields
186 page = Page(wsgi_request)
187 metadata = page.get_metadata()
188 user_md = metadata.details_by_object('user')
189 user_fields = [column['name'] for column in user_md['column']]
191 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
192 query = Query().get('myslice:user').select(user_fields).filter_by('user_hrn','==',user_hrn)
193 #query = Query.get('myslice:user').filter_by('user_hrn', '==', user_hrn).select('pi_authorities')
194 results = execute_query(wsgi_request, query)
195 print "is_pi results = ", results
196 for user_detail in results:
197 if authority_hrn in user_detail['pi_authorities']:
200 print "Exception in actions.py in is_pi %s" % e
205 def sfa_get_user(request, user_hrn, pub=None):
207 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
208 query_sfa_user = Query.get('myslice:user').filter_by('user_hrn', '==', user_hrn)
209 result_sfa_user = execute_admin_query(request, query_sfa_user)
210 return result_sfa_user[0]
212 def sfa_update_user(request, user_hrn, user_params):
213 # user_params: keys [public_key]
214 if 'email' in user_params:
215 user_params['user_email'] = user_params['email']
217 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
218 query = Query.update('myslice:user').filter_by('user_hrn', '==', user_hrn).set(user_params).select('user_hrn')
219 results = execute_admin_query(request,query)
222 def sfa_add_authority(request, authority_params):
224 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
225 query = Query.create('myslice:authority').set(authority_params).select('authority_hrn')
226 results = execute_query(request, query)
227 print "sfa_add_auth results=",results
229 raise Exception, "Could not create %s. Already exists ?" % authority_params['hrn']
232 def sfa_add_user_to_slice(request, user_hrn, slice_params):
233 # UPDATE myslice:slice SET researcher=['ple.upmc.jordan_auge','ple.inria.thierry_parmentelat','ple.upmc.loic_baron','ple.upmc.ciro_scognamiglio','ple.upmc.mohammed-yasin_rahman','ple.upmc.azerty'] where slice_hrn=='ple.upmc.myslicedemo'
235 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
236 query_current_users = Query.get('myslice:slice').select('user').filter_by('slice_hrn','==',slice_params['hrn'])
237 results_current_users = execute_query(request, query_current_users)
238 slice_params['researcher'] = slice_params['researcher'] | results_current_users
240 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
241 query = Query.update('myslice:slice').filter_by('user_hrn', '==', user_hrn).set(slice_params).select('slice_hrn')
242 results = execute_query(request, query)
243 # Also possible but not supported yet
244 # UPDATE myslice:user SET slice=['ple.upmc.agent','ple.upmc.myslicedemo','ple.upmc.tophat'] where user_hrn=='ple.upmc.azerty'
246 raise Exception, "Could not create %s. Already exists ?" % slice_params['hrn']
251 def manifold_add_user(wsgi_request, request):
252 """Add a Manifold user corresponding to a user request.
255 wsgi_request: a WSGIRequest instance
256 request (dict): a dictionary containing the user request built from the
260 The user_id of the inserted user.
266 USER_CONFIG = '{"firstname": "%(first_name)s", "lastname": "%(last_name)s", "authority": "%(authority_hrn)s"}'
269 'email' : request['email'],
270 'password' : request['password'],
271 'config' : USER_CONFIG % request,
275 query = Query.create('local:user').set(user_params).select('email')
276 results = execute_admin_query(request, query)
278 raise Exception, "Failed creating manifold user: %s" % user_params['email']
280 return result['email']
282 def manifold_update_user(request, email, user_params):
283 # user_params: password, config e.g.,
284 query = Query.update('local:user').filter_by('email', '==', email).set(user_params).select('email')
285 results = execute_admin_query(request,query)
286 # NOTE: results remains empty and goes to Exception. However, it updates the manifold DB.
287 # That's why I commented the exception part. -- Yasin
289 # raise Exception, "Failed updating manifold user: %s" % user_params['email']
293 def manifold_add_account(request, account_params):
294 query = Query.create('local:account').set(account_params).select(['user', 'platform'])
295 results = execute_admin_query(request,query)
297 raise Exception, "Failed creating manifold account on platform %s for user: %s" % (account_params['platform'], account_params['user'])
299 return result['user_id']
301 def manifold_update_account(request,user_id,account_params):
302 # account_params: config
303 query = Query.update('local:account').filter_by('platform', '==', 'myslice').filter_by('user_id', '==', user_id).set(account_params).select('user_id')
304 results = execute_admin_query(request,query)
307 #explicitly mention the platform_id
308 def manifold_delete_account(request, platform_id, user_id, account_params):
309 query = Query.delete('local:account').filter_by('platform_id', '==', platform_id).filter_by('user_id', '==', user_id).set(account_params).select('user_id')
310 results = execute_admin_query(request,query)
313 def manifold_delete_user(request, user_id, user_params):
314 query = Query.delete('local:user').filter_by('user_id', '==', user_id).set(user_params).select('user_id')
315 results = execute_admin_query(request,query)
320 def manifold_add_platform(request, platform_params):
321 query = Query.create('local:platform').set(platform_params).select(['user', 'platform'])
322 results = execute_admin_query(request,query)
324 raise Exception, "Failed creating manifold platform %s for user: %s" % (platform_params['platform'], platform_params['user'])
326 return result['platform_id']
329 def make_request_user(user):
331 request['type'] = 'user'
332 request['id'] = user.id
333 request['timestamp'] = user.created # XXX in DB ?
334 request['authority_hrn'] = user.authority_hrn
335 request['first_name'] = user.first_name
336 request['last_name'] = user.last_name
337 request['email'] = user.email
338 request['login'] = user.login
339 request['user_hrn'] = user.user_hrn
340 request['public_key'] = user.public_key
341 request['private_key'] = user.private_key
344 def make_request_slice(slice):
346 request['type'] = 'slice'
347 request['id'] = slice.id
348 request['user_hrn'] = slice.user_hrn
349 request['timestamp'] = slice.created
350 request['authority_hrn'] = slice.authority_hrn
351 request['slice_name'] = slice.slice_name
352 request['number_of_nodes'] = slice.number_of_nodes
353 request['type_of_nodes'] = slice.type_of_nodes
354 request['purpose'] = slice.purpose
357 def make_request_project(project):
359 request['type'] = 'project'
360 request['id'] = project.id
361 request['user_hrn'] = project.user_hrn
362 request['email'] = project.email
363 request['timestamp'] = project.created
364 request['authority_hrn'] = project.authority_hrn
365 request['project_name'] = project.project_name
366 request['purpose'] = project.purpose
369 def make_request_join(join):
371 request['type'] = 'join'
372 request['id'] = join.id
373 request['user_hrn'] = join.user_hrn
374 request['email'] = join.email
375 request['timestamp'] = join.created
376 request['authority_hrn'] = join.authority_hrn
377 request['project_name'] = join.project_name
380 def make_request_authority(authority):
382 request['type'] = 'authority'
383 request['id'] = authority.id
384 request['site_name'] = authority.site_name
385 request['site_latitude'] = authority.site_latitude
386 request['site_longitude'] = authority.site_longitude
387 request['site_url'] = authority.site_url
388 request['site_authority'] = authority.site_authority
389 request['site_abbreviated_name'] = authority.site_abbreviated_name
390 request['address_line1'] = authority.address_line1
391 request['address_line2'] = authority.address_line2
392 request['address_line3'] = authority.address_line3
393 request['address_city'] = authority.address_city
394 request['address_postalcode'] = authority.address_postalcode
395 request['address_state'] = authority.address_state
396 request['address_country'] = authority.address_country
397 request['authority_hrn'] = authority.authority_hrn
398 request['timestamp'] = authority.created
401 def make_requests(pending_users, pending_slices, pending_authorities, pending_projects, pending_joins):
402 print "$$$$$$$$$$$$$$$ make_request"
404 for user in pending_users:
405 requests.append(make_request_user(user))
406 for slice in pending_slices:
407 requests.append(make_request_slice(slice))
408 for authority in pending_authorities:
409 requests.append(make_request_authority(authority))
410 for project in pending_projects:
411 requests.append(make_request_project(project))
412 for join in pending_joins:
413 requests.append(make_request_join(join))
416 def get_request_by_id(ids):
417 print "$$$$$$$$$$$$$$$$ get_request_by_id"
418 sorted_ids = { 'user': [], 'slice': [], 'authority': [], 'project': [], 'join': [] }
420 type, id = type__id.split('__')
421 sorted_ids[type].append(id)
424 pending_users = PendingUser.objects.all()
425 pending_slices = PendingSlice.objects.all()
426 pending_authorities = PendingAuthority.objects.all()
427 pending_projects = PendingProject.objects.all()
428 pending_joins = PendingJoin.objects.all()
430 pending_users = PendingUser.objects.filter(id__in=sorted_ids['user']).all()
431 pending_slices = PendingSlice.objects.filter(id__in=sorted_ids['slice']).all()
432 pending_authorities = PendingAuthority.objects.filter(id__in=sorted_ids['authority']).all()
433 pending_projects = PendingProject.objects.filter(id__in=sorted_ids['project']).all()
434 pending_joins = PendingJoin.objects.filter(id__in=sorted_ids['join']).all()
436 return make_requests(pending_users, pending_slices, pending_authorities, pending_projects, pending_joins)
438 def get_requests(authority_hrns=None):
439 print "$$$$$$$$$$$$$ get_request_by_authority auth_hrns = ", authority_hrns
440 if not authority_hrns:
441 ## get those pending users who have confirmed their emails
442 pending_users = PendingUser.objects.filter(status__iexact = 'True')
443 pending_slices = PendingSlice.objects.all()
444 pending_authorities = PendingAuthority.objects.all()
445 pending_projects = PendingProject.objects.all()
446 pending_joins = PendingJoin.objects.all()
448 pending_users = PendingUser.objects
449 pending_slices = PendingSlice.objects
450 pending_authorities = PendingAuthority.objects
451 pending_projects = PendingProject.objects
452 pending_joins = PendingJoin.objects
453 from django.db.models import Q
455 list_slice_Q = list()
459 for hrn in authority_hrns:
460 list_user_Q.append(Q(authority_hrn__startswith=hrn, status__iexact = 'True'))
461 list_slice_Q.append(Q(authority_hrn__startswith=hrn))
462 list_auth_Q.append(Q(site_authority__startswith=hrn))
463 list_proj_Q.append(Q(authority_hrn__startswith=hrn))
464 list_join_Q.append(Q(authority_hrn__startswith=hrn))
465 from operator import __or__ as OR
466 pending_users = pending_users.filter(reduce(OR, list_user_Q))
467 pending_slices = pending_slices.filter(reduce(OR, list_slice_Q))
468 pending_authorities = pending_authorities.filter(reduce(OR, list_auth_Q))
469 pending_projects = pending_projects.filter(reduce(OR, list_proj_Q))
470 pending_joins = pending_joins.filter(reduce(OR, list_join_Q))
471 #pending_authorities = pending_authorities.all() #filter(reduce(OR, list_Q))
473 return make_requests(pending_users, pending_slices, pending_authorities, pending_projects, pending_joins)
475 # XXX Is it in sync with the form fields ?
477 def portal_validate_request(wsgi_request, request_ids):
480 if not isinstance(request_ids, list):
481 request_ids = [request_ids]
483 requests = get_request_by_id(request_ids)
484 for request in requests:
485 # type, id, timestamp, details, allowed -- MISSING: authority_hrn
486 # CAREFUL about details
487 # user : first name, last name, email, password, keypair
488 # slice : number of nodes, type of nodes, purpose
492 if request['type'] == 'user':
495 create_user(wsgi_request, request)
496 request_status['SFA user'] = {'status': True }
497 PendingUser.objects.get(id=request['id']).delete()
499 request_status['SFA user'] = {'status': False, 'description': str(e)}
501 # user_params = {'status':2}
502 # manifold_update_user(request, request['email'], user_params)
504 # MANIFOLD user should be added beforehand, during registration
506 # manifold_user_params = { key: request[key] for key in MANIFOLD_USER_KEYS }
507 # # XXX # manifold_add_user(manifold_user_params)
508 # request_status['MySlice user'] = {'status': True }
509 #except Exception, e:
510 # request_status['MySlice user'] = {'status': False, 'description': str(e)}
513 #manifold_account_params = { key: request[key] for key in MANIFOLD_ACCOUNT_KEYS }
514 #manifold_add_account(manifold_account_params)
515 #request_status['MySlice testbed accounts'] = {'status': False }
517 elif request['type'] == 'slice':
519 create_slice(wsgi_request, request)
520 request_status['SFA slice'] = {'status': True }
521 PendingSlice.objects.get(id=request['id']).delete()
523 # Clear user's Credentials
524 sfa_user = sfa_get_user(wsgi_request, request['user_hrn'])
525 clear_user_creds(wsgi_request,sfa_user['user_email'])
528 request_status['SFA slice'] = {'status': False, 'description': str(e)}
530 elif request['type'] == 'authority':
532 #hrn = "%s.%s" % (request['authority_hrn'], request['site_authority'])
533 hrn = request['site_authority']
534 # XXX tmp sfa dependency
535 from sfa.util.xrn import Xrn
536 urn = Xrn(hrn, request['type']).get_urn()
538 # Only hrn is required for Manifold Query
539 sfa_authority_params = {
540 'authority_hrn' : hrn,
541 #'authority_urn' : urn,
542 #'type' : request['type'],
546 print "ADD Authority"
547 sfa_add_authority(wsgi_request, sfa_authority_params)
548 request_status['SFA authority'] = {'status': True }
549 PendingAuthority.objects.get(id=request['id']).delete()
552 request_status['SFA authority'] = {'status': False, 'description': str(e)}
554 elif request['type'] == 'project':
556 hrn = request['authority_hrn'] + '.' + request['project_name']
558 # Only hrn is required for Manifold Query
559 sfa_authority_params = {
560 'authority_hrn' : hrn
562 sfa_add_authority(wsgi_request, sfa_authority_params)
563 request_status['SFA project'] = {'status': True }
564 PendingProject.objects.get(id=request['id']).delete()
566 # Add user as a PI of the project
567 authority_add_pis(wsgi_request, hrn , request['user_hrn'])
569 # Clear user's Credentials
570 #sfa_user = sfa_get_user(wsgi_request, request['user_hrn'])
571 clear_user_creds(wsgi_request,request['email'])
574 request_status['SFA project'] = {'status': False, 'description': str(e)}
576 elif request['type'] == 'join':
578 # Add user as a PI of the project
579 authority_add_pis(wsgi_request, request['authority_hrn'] , request['user_hrn'])
581 request_status['SFA join'] = {'status': True }
582 PendingJoin.objects.get(id=request['id']).delete()
584 # Clear user's Credentials
585 clear_user_creds(wsgi_request,request['email'])
588 request_status['SFA join'] = {'status': False, 'description': str(e)+' - '+str(request)}
590 request_status['other'] = {'status': False, 'description': 'unknown type of request'}
591 # XXX Remove from Pendings in database
593 status['%s__%s' % (request['type'], request['id'])] = request_status
597 def validate_action(request, **kwargs):
598 ids = filter(None, kwargs['id'].split('/'))
599 status = portal_validate_request(request, ids)
600 json_answer = json.dumps(status)
601 return HttpResponse (json_answer, mimetype="application/json")
604 def reject_action(request, **kwargs):
605 ids = filter(None, kwargs['id'].split('/'))
606 status = portal_reject_request(request, ids)
607 json_answer = json.dumps(status)
608 return HttpResponse (json_answer, mimetype="application/json")
611 def portal_reject_request(wsgi_request, request_ids):
614 current_site = Site.objects.get_current()
615 current_site = current_site.domain
618 if not isinstance(request_ids, list):
619 request_ids = [request_ids]
621 requests = get_request_by_id(request_ids)
622 for request in requests:
623 # type, id, timestamp, details, allowed -- MISSING: authority_hrn
624 # CAREFUL about details
625 # user : first name, last name, email, password, keypair
626 # slice : number of nodes, type of nodes, purpose
630 if request['type'] == 'user':
632 request_status['SFA user'] = {'status': True }
633 # getting user email based on id
634 ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
635 for user in PendingUser.objects.raw('SELECT * FROM portal_pendinguser WHERE id = %s', [request['id']]):
636 user_email= user.email
637 first_name = user.first_name
638 last_name = user.last_name
641 'first_name' : first_name,
642 'last_name' : last_name,
643 'portal_url' : current_site,
646 theme.template_name = 'user_request_denied.txt'
647 text_content = render_to_string(theme.template, ctx)
648 theme.template_name = 'user_request_denied.html'
649 html_content = render_to_string(theme.template, ctx)
650 theme.template_name = 'email_default_sender.txt'
651 sender = render_to_string(theme.template, ctx)
652 sender = sender.replace('\n', '')
654 subject = 'User request denied.'
656 msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
657 msg.attach_alternative(html_content, "text/html")
660 print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
662 # removing from Django auth_user
663 UserModel = get_user_model()
664 UserModel._default_manager.filter(email__iexact = user_email).delete()
665 # removing from Django portal_pendinguser
666 PendingUser.objects.get(id=request['id']).delete()
667 # removing from manifold
668 # removing manifold account
669 user_query = Query().get('local:user') \
670 .filter_by('email', '==', user_email) \
672 user = execute_admin_query(wsgi_request, user_query)
673 user_id = user[0]['user_id']
675 platform_query = Query().get('local:platform') \
676 .filter_by('platform', '==', 'myslice') \
677 .select('platform_id')
678 platform = execute_admin_query(wsgi_request, platform_query)
679 platform_id = platform[0]['platform_id']
680 account_params = {'user_id':user_id}
681 manifold_delete_account(request, platform_id, user_id, account_params)
683 # removing manifold user
684 user_params = {'user_id':user_id}
685 manifold_delete_user(request, user_id, user_params)
687 request_status['SFA authority'] = {'status': False, 'description': str(e)}
689 elif request['type'] == 'slice':
690 request_status['SFA slice'] = {'status': True }
692 # getting user email based on id
693 ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
694 for user in PendingSlice.objects.raw('SELECT * FROM portal_pendingslice WHERE id = %s', [request['id']]):
695 user_email= user.type_of_nodes # XXX type_of_nodes field contains the email [shd be renamed in DB]
696 slice_name = user.slice_name
697 purpose = user.purpose
698 url = user.number_of_nodes
701 'slice_name': slice_name,
704 'portal_url': current_site,
707 theme.template_name = 'slice_request_denied.txt'
708 text_content = render_to_string(theme.template, ctx)
709 theme.template_name = 'slice_request_denied.html'
710 html_content = render_to_string(theme.template, ctx)
711 theme.template_name = 'email_default_sender.txt'
712 sender = render_to_string(theme.template, ctx)
713 sender = sender.replace('\n', '')
715 subject = 'Slice request denied.'
717 msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
718 msg.attach_alternative(html_content, "text/html")
721 print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
723 PendingSlice.objects.get(id=request['id']).delete()
725 elif request['type'] == 'authority':
726 request_status['SFA authority'] = {'status': True }
728 # getting user email based on id
729 ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
730 for user in PendingAuthority.objects.raw('SELECT * FROM portal_pendingauthority WHERE id = %s', [request['id']]):
731 user_email= user.address_line1 # XXX address_line1 field contains the email [shd be renamed in DB]
732 site_name = user.site_name
733 city = user.address_city
734 country = user.address_country
735 short_name = user.site_abbreviated_name
739 'site_name': site_name,
740 'short_name': short_name,
744 'portal_url' : current_site,
748 theme.template_name = 'authority_request_denied.txt'
749 text_content = render_to_string(theme.template, ctx)
750 theme.template_name = 'authority_request_denied.html'
751 html_content = render_to_string(theme.template, ctx)
752 theme.template_name = 'email_default_sender.txt'
753 sender = render_to_string(theme.template, ctx)
754 sender = sender.replace('\n', '')
755 subject = 'Authority request denied.'
756 msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
757 msg.attach_alternative(html_content, "text/html")
760 print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
762 PendingAuthority.objects.get(id=request['id']).delete()
764 # XXX TMP we should send an email to the user to inform him/her
765 elif request['type'] == 'project':
766 request_status['SFA project'] = {'status': True }
767 PendingProject.objects.get(id=request['id']).delete()
769 elif request['type'] == 'join':
770 request_status['SFA join'] = {'status': True }
771 PendingJoin.objects.get(id=request['id']).delete()
773 status['%s__%s' % (request['type'], request['id'])] = request_status
778 # http://djangosnippets.org/snippets/942/
782 #-------------------------------------------------------------------------------
784 #-------------------------------------------------------------------------------
786 def create_slice(wsgi_request, request):
789 wsgi_request (~ WSGIRequest) :
790 request (dict) : the slice request in our own dict format
795 hrn = "%s.%s" % (request['authority_hrn'], request['slice_name'])
796 # XXX tmp sfa dependency
797 from sfa.util.xrn import Xrn
798 urn = Xrn(hrn, request['type']).get_urn()
800 # Add User to Slice if we have the user_hrn in pendingslice table
801 user_hrn = request.get('user_hrn', None)
802 user_hrns = list([user_hrn]) if user_hrn else list()
804 # CACHE PB with fields
805 page = Page(wsgi_request)
806 metadata = page.get_metadata()
807 user_md = metadata.details_by_object('user')
808 user_fields = [column['name'] for column in user_md['column']]
810 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
811 #user_query = Query().get('myslice:user').select('user_hrn','user_email').filter_by('user_hrn','==',user_hrn)
812 user_query = Query().get('myslice:user').select(user_fields).filter_by('user_hrn','==',user_hrn)
813 user_details_sfa = execute_admin_query(wsgi_request, user_query)
814 if not user_details_sfa:
815 raise Exception, "User %s doesn't exist, validate user before validating slice" % user_hrn
816 for user in user_details_sfa:
817 user_email = user['user_email']
819 # XXX LOIC Quick fix because this is totally inconsistent
820 if not 'number_of_nodes' in request:
821 request['number_of_nodes']=""
823 # XXX We should create a slice with Manifold terminology
827 'slice_type' : request['type'],
828 'url' : request['number_of_nodes'],
830 'slice_enabled' : True
832 # ignored in request: id, timestamp, number_of_nodes, type_of_nodes, purpose
834 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
835 query = Query.create('myslice:slice').set(slice_params).select('slice_hrn')
836 results = execute_query(wsgi_request, query)
838 raise Exception, "Could not create %s. Already exists ?" % slice_params['hrn']
840 clear_user_creds(wsgi_request,user_email)
842 activity.slice.validate(request, { "slice" : hrn })
844 theme.template_name = 'slice_request_validated.txt'
845 text_content = render_to_string(theme.template, request)
846 theme.template_name = 'slice_request_validated.html'
847 html_content = render_to_string(theme.template, request)
849 theme.template_name = 'email_default_sender.txt'
850 sender = render_to_string(theme.template, request)
851 sender = sender.replace('\n', '')
853 subject = 'Slice request validated'
855 msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
856 msg.attach_alternative(html_content, "text/html")
859 print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
863 def create_pending_slice(wsgi_request, request, email):
867 # Insert an entry in the PendingSlice table
869 slice_name = request['slice_name'],
870 user_hrn = request['user_hrn'],
871 authority_hrn = request['authority_hrn'],
872 number_of_nodes = request['url'], # field needs to be renamed
873 purpose = request['purpose'],
874 type_of_nodes = request['email'] # field needs to be renamed
879 # Send an email: the recipients are the PI of the authority
880 recipients = authority_get_pi_emails(wsgi_request, request['authority_hrn'])
882 theme.template_name = 'slice_request_email.txt'
883 text_content = render_to_string(theme.template, request)
885 theme.template_name = 'slice_request_email.html'
886 html_content = render_to_string(theme.template, request)
888 theme.template_name = 'slice_request_email_subject.txt'
889 subject = render_to_string(theme.template, request)
890 subject = subject.replace('\n', '')
893 msg = EmailMultiAlternatives(subject, text_content, sender, recipients)
894 msg.attach_alternative(html_content, "text/html")
897 print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
900 def create_pending_project(wsgi_request, request):
904 # Insert an entry in the PendingProject table
906 project_name = request['project_name'],
907 user_hrn = request['user_hrn'],
908 email = request['email'],
909 authority_hrn = request['authority_hrn'],
910 purpose = request['purpose'],
914 def create_pending_join(wsgi_request, request):
918 # Insert an entry in the PendingJoin table
920 user_hrn = request['user_hrn'],
921 email = request['email'],
922 project_name = request['project_name'],
923 authority_hrn = request['authority_hrn'],
929 # # Send an email: the recipients are the PI of the authority
930 # recipients = authority_get_pi_emails(wsgi_request, request['authority_hrn'])
932 # theme.template_name = 'slice_request_email.txt'
933 # text_content = render_to_string(theme.template, request)
935 # theme.template_name = 'slice_request_email.html'
936 # html_content = render_to_string(theme.template, request)
938 # theme.template_name = 'slice_request_email_subject.txt'
939 # subject = render_to_string(theme.template, request)
940 # subject = subject.replace('\n', '')
943 # msg = EmailMultiAlternatives(subject, text_content, sender, recipients)
944 # msg.attach_alternative(html_content, "text/html")
946 # except Exception, e:
947 # print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
950 #-------------------------------------------------------------------------------
952 #-------------------------------------------------------------------------------
954 def manifold_add_reference_user_accounts(wsgi_request, request):
955 """When a new user is created, add reference accounts to the reference platform.
957 # XXX XXX XXX The rest of this function has to be checked XXX XXX XXX
959 # Retrieve user information
960 user_query = Query().get('local:user') \
961 .select('user_id', 'config', 'email', 'status') \
962 .filter_by('email', '==', request['email'])
963 user_details = execute_admin_query(wsgi_request, user_query)
965 # USER MAIN ACCOUNT != reference
966 #print 'USER MAIN ACCOUNT != reference'
967 list_accounts_query = Query().get('local:account') \
968 .select('user_id', 'platform_id', 'auth_type', 'config') \
969 .filter_by('user_id', '==', user_details[0]['user_id']) \
970 .filter_by('auth_type', '!=', 'reference')
971 list_accounts = execute_admin_query(wsgi_request, list_accounts_query)
973 # XXX main_platform is being erased several times ???
974 for account in list_accounts:
975 main_platform_query = Query().get('local:platform') \
976 .select('platform_id', 'platform') \
977 .filter_by('platform_id', '==', account['platform_id'])
978 main_platform = execute_admin_query(wsgi_request, main_platform_query)
980 # Add reference accounts on SFA enabled platforms
981 platforms_query = Query().get('local:platform') \
982 .filter_by('disabled', '==', '0') \
983 .filter_by('gateway_type', '==', 'sfa') \
984 .select('platform_id', 'gateway_type')
985 platforms = execute_admin_query(wsgi_request, platforms_query)
986 for platform in platforms:
987 #print "add reference to platform ",platform
988 manifold_account_params = {
989 'user_id' : user_details[0]['user_id'],
990 'platform_id' : platform['platform_id'],
991 'auth_type' : 'reference',
992 'config' : '{"reference_platform": "' + main_platform[0]['platform'] + '"}',
994 manifold_add_account(wsgi_request, manifold_account_params)
996 def sfa_create_user(wsgi_request, request, namespace = None, as_admin = False):
999 wsgi_request (~ WSGIRequest) :
1000 request (dict) : the user request in our own dict format
1005 from sfa.util.xrn import Xrn
1007 auth_pi = request.get('pi', None)
1008 auth_pi = list([auth_pi]) if auth_pi else list()
1010 # We create a user request with Manifold terminology
1012 'user_hrn' : request['user_hrn'],
1013 'user_email' : request['email'],
1014 'user_urn' : Xrn(request['user_hrn'], request['type']).get_urn(),
1015 'user_type' : request['type'],
1016 'keys' : request['public_key'],
1017 'user_first_name' : request['first_name'],
1018 'user_last_name' : request['last_name'],
1019 'pi_authorities' : auth_pi,
1020 'user_enabled' : True
1023 if namespace is not None:
1024 query = Query.create('%s:user' % namespace).set(sfa_user_params).select('user_hrn')
1026 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
1027 query = Query.create('myslice:user').set(sfa_user_params).select('user_hrn')
1030 results = execute_admin_query(wsgi_request, query)
1032 results = execute_query(wsgi_request, query)
1035 raise Exception, "Could not create %s. Already exists ?" % sfa_user_params['user_hrn']
1038 theme.template_name = 'user_request_validated.txt'
1039 text_content = render_to_string(theme.template, request)
1040 theme.template_name = 'user_request_validated.html'
1041 html_content = render_to_string(theme.template, request)
1043 theme.template_name = 'email_default_sender.txt'
1044 sender = render_to_string(theme.template, request)
1045 sender = sender.replace('\n', '')
1048 subject = 'User validated'
1050 msg = EmailMultiAlternatives(subject, text_content, sender, [request['email']])
1051 msg.attach_alternative(html_content, "text/html")
1053 except Exception, e:
1054 print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
1058 def iotlab_create_user (wsgi_request, request, namespace = None, as_admin=False):
1062 from requests.auth import HTTPBasicAuth
1064 URL_REST = ConfigEngine.default_iotlab_url
1065 LOGIN_ADMIN = ConfigEngine.default_iotlab_admin_user
1066 PASSWORD_ADMIN = ConfigEngine.default_iotlab_admin_password
1068 auth = HTTPBasicAuth(LOGIN_ADMIN,PASSWORD_ADMIN)
1069 headers = {'content-type': 'application/json'}
1071 for user in PendingUser.objects.raw('SELECT * FROM portal_pendinguser WHERE email = %s', [request['email']]):
1072 password= user.password
1075 iotlab_user_params = {
1077 #"login" : request['email'], #auto generated by iotlab
1078 "password" : password,
1079 "firstName" : request['first_name'],
1080 "lastName" : request['last_name'],
1081 "email" : request['email'],
1082 "structure" : request['authority_hrn'],
1085 "sshPublicKey" : request['public_key'],
1086 "motivations" : "SFA federation",
1089 iotlab_user_params1 = json.dumps(iotlab_user_params)
1090 r=requests.post(url=URL_REST, data=iotlab_user_params1, headers=headers, auth=auth)
1091 print 'Create iotlab user : ', r.status_code, r.text
1094 def create_user(wsgi_request, request, namespace = None, as_admin = False):
1095 # XXX This has to be stored centrally
1096 USER_STATUS_ENABLED = 2
1098 # NOTE : if we were to create a user directly (just like we create slices,
1099 # we would have to perform the steps in create_pending_user too
1101 # Add the user to the SFA registry
1102 sfa_create_user(wsgi_request, request, namespace, as_admin)
1104 # Update Manifold user status
1105 manifold_update_user(wsgi_request, request['email'], {'status': USER_STATUS_ENABLED})
1107 # Add reference accounts for platforms
1108 manifold_add_reference_user_accounts(wsgi_request, request)
1110 # Add the user to iotlab portal if theme is set to onelab
1111 if theme.theme == 'onelab':
1112 iotlab_create_user (wsgi_request, request)
1114 def create_pending_user(wsgi_request, request, user_detail):
1118 # Insert an entry in the PendingUser table
1120 first_name = request['first_name'],
1121 last_name = request['last_name'],
1122 authority_hrn = request['authority_hrn'],
1123 email = request['email'],
1124 password = request['password'],
1125 public_key = request['public_key'],
1126 private_key = request['private_key'],
1127 user_hrn = request['user_hrn'],
1129 email_hash = request['email_hash'],
1133 # sends email to user to activate the email
1134 theme.template_name = 'activate_user.html'
1135 html_content = render_to_string(theme.template, request)
1136 theme.template_name = 'activate_user.txt'
1137 text_content = render_to_string(theme.template, request)
1138 theme.template_name = 'activate_user_email_subject.txt'
1139 subject = render_to_string(theme.template, request)
1140 subject = subject.replace('\n', '')
1141 theme.template_name = 'email_default_sender.txt'
1142 sender = render_to_string(theme.template, request)
1143 sender = sender.replace('\n', '')
1144 recipient = [request['email']]
1145 #recipient = recipient.append(request['email'])
1147 msg = EmailMultiAlternatives(subject, text_content, sender, recipient)
1148 msg.attach_alternative(html_content, "text/html")
1151 # saves the user to django auth_user table [needed for password reset]
1152 user = User.objects.create_user(request['email'], request['email'], request['password'])
1154 # Creating a manifold user
1155 user_id = manifold_add_user(wsgi_request, request)
1157 # Creating a Manifold account on the MySlice platform
1158 # Note the JSON representation of public and private keys already includes quotes
1160 'user_hrn' : request['user_hrn'],
1161 'user_public_key' : request['public_key'],
1163 if request['private_key']:
1164 account_config['user_private_key'] = request['private_key']
1166 user_id = user_detail['user_id'] + 1 # the user_id for the newly created user in local:user
1168 # XXX TODO: Require a myslice platform
1169 # ALERT: this will disapear with ROUTERV2 of Manifold
1170 # We have to consider the case where several registries can be used
1171 # Removed hardcoded platform = 5
1172 # This platform == 'myslice' is a TMP FIX !!
1174 reg_platform_query = Query().get('local:platform') \
1175 .filter_by('platform', '==', 'myslice') \
1176 .select('platform_id')
1177 reg_platform = execute_admin_query(wsgi_request, reg_platform_query)
1179 reg_platform_id = reg_platform[0]['platform_id']
1181 'platform_id' : reg_platform_id, # XXX ALERT !!
1182 'user_id' : user_id,
1183 'auth_type' : request['auth_type'],
1184 'config' : json.dumps(account_config),
1186 manifold_add_account(wsgi_request, account_params)
1187 except Exception, e:
1188 print "Failed creating manifold account on platform %s for user: %s" % ('myslice', request['email'])
1191 # Send an email: the recipients are the PI of the authority
1192 # If No PI is defined for this Authority, send to a default email (different for each theme)
1193 recipients = authority_get_pi_emails(wsgi_request, request['authority_hrn'])
1195 theme.template_name = 'user_request_email.html'
1196 html_content = render_to_string(theme.template, request)
1198 theme.template_name = 'user_request_email.txt'
1199 text_content = render_to_string(theme.template, request)
1201 theme.template_name = 'user_request_email_subject.txt'
1202 subject = render_to_string(theme.template, request)
1203 subject = subject.replace('\n', '')
1205 theme.template_name = 'email_default_sender.txt'
1206 sender = render_to_string(theme.template, request)
1207 sender = sender.replace('\n', '')
1209 msg = EmailMultiAlternatives(subject, text_content, sender, recipients)
1210 msg.attach_alternative(html_content, "text/html")
1212 except Exception, e:
1213 print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
1215 traceback.print_exc()