1 from django.http import HttpResponse
2 from manifold.core.query import Query
3 from manifoldapi.manifoldapi import execute_query,execute_admin_query
4 from portal.models import PendingUser, PendingSlice, PendingAuthority
7 from django.contrib.auth.models import User
8 from django.template.loader import render_to_string
9 from django.core.mail import EmailMultiAlternatives, send_mail
11 from myslice.theme import ThemeView
15 # Thierry: moving this right into the code so
16 # most people can use myslice without having to install sfa
17 # XXX tmp sfa dependency, should be moved to SFA gateway
18 #from sfa.util.xrn import Xrn
21 # Get the list of authorities
23 def authority_get_pis(request, authority_hrn):
24 query = Query.get('authority').filter_by('authority_hrn', '==', authority_hrn).select('pi_users')
25 results = execute_admin_query(request, query)
26 print "authority_get_pis = %s" % results
27 # NOTE: temporarily commented. Because results is giving empty list.
28 # Needs more debugging
30 # raise Exception, "Authority not found: %s" % authority_hrn
32 #return result['pi_users']
35 def authority_get_pi_emails(request, authority_hrn):
36 pi_users = authority_get_pis(request,authority_hrn)
37 print "pi_users = %s" % pi_users
39 if any(pi['pi_users'] == None or not pi['pi_users'] for pi in pi_users):
40 #theme.template_name = 'email_default_recipients.txt'
41 #default_email = render_to_string(theme.template, request)
42 #default_email = default_email.replace('\n', '')
44 # the above doesn't work
45 return ['support@myslice.info']
47 pi_user_hrns = [ hrn for x in pi_users for hrn in x['pi_users'] ]
48 query = Query.get('user').filter_by('user_hrn', 'included', pi_user_hrns).select('user_email')
49 results = execute_admin_query(request, query)
50 return [result['user_email'] for result in results]
52 #clear user credentials
53 def clear_user_creds(request, user_email):
55 user_query = Query().get('local:user').filter_by('email', '==', user_email).select('user_id','email','password','config')
56 user_details = execute_admin_query(request, user_query)
58 # getting the user_id from the session
59 for user_detail in user_details:
60 user_id = user_detail['user_id']
61 user_email = user_detail['email']
63 account_query = Query().get('local:account').filter_by('user_id', '==', user_id).select('user_id','platform_id','auth_type','config')
64 account_details = execute_admin_query(request, account_query)
66 platform_query = Query().get('local:platform').select('platform_id','platform')
67 platform_details = execute_admin_query(request, platform_query)
69 for account_detail in account_details:
70 for platform_detail in platform_details:
71 if platform_detail['platform_id'] == account_detail['platform_id']:
72 if 'myslice' in platform_detail['platform']:
73 account_config = json.loads(account_detail['config'])
74 user_cred = account_config.get('delegated_user_credential','N/A')
75 if 'N/A' not in user_cred:
76 user_hrn = account_config.get('user_hrn','N/A')
77 user_pub_key = json.dumps(account_config.get('user_public_key','N/A'))
78 user_priv_key = json.dumps(account_config.get('user_private_key','N/A'))
79 updated_config = '{"user_public_key":'+ user_pub_key + ', "user_private_key":'+ user_priv_key + ', "user_hrn":"'+ user_hrn + '"}'
80 user_params = { 'config': updated_config}
81 manifold_update_account(request, user_id,user_params)
87 print "Exception in actions.py in clear_user_creds %s" % e
90 def is_pi(wsgi_request, user_hrn, authority_hrn):
91 # XXX could be done in a single query !
93 # select pi_authorities from user where user_hrn == "ple.upmc.jordan_auge"
94 query = Query.get('user').filter_by('user_hrn', '==', user_hrn).select('pi_authorities')
95 results = execute_admin_query(wsgi_request, query)
100 user_authority_hrns = result.get('pi_authorities', [])
101 return authority_hrn in user_authority_hrns
105 def sfa_get_user(request, user_hrn, pub):
106 query_sfa_user = Query.get('user').filter_by('user_hrn', '==', user_hrn)
107 result_sfa_user = execute_query(request, query_sfa_user)
108 return result_sfa_user
110 def sfa_update_user(request, user_hrn, user_params):
111 # user_params: keys [public_key]
112 if 'email' in user_params:
113 user_params['user_email'] = user_params['email']
114 query = Query.update('user').filter_by('user_hrn', '==', user_hrn).set(user_params).select('user_hrn')
115 results = execute_query(request,query)
118 def sfa_add_authority(request, authority_params):
119 query = Query.create('authority').set(authority_params).select('authority_hrn')
120 results = execute_query(request, query)
121 print "sfa_add_auth results=",results
123 raise Exception, "Could not create %s. Already exists ?" % authority_params['hrn']
126 def sfa_add_user_to_slice(request, user_hrn, slice_params):
127 # UPDATE myslice:slice SET researcher=['ple.upmc.jordan_auge','ple.inria.thierry_parmentelat','ple.upmc.loic_baron','ple.upmc.ciro_scognamiglio','ple.upmc.mohammed-yasin_rahman','ple.upmc.azerty'] where slice_hrn=='ple.upmc.myslicedemo'
128 query_current_users = Query.get('slice').select('user').filter_by('slice_hrn','==',slice_params['hrn'])
129 results_current_users = execute_query(request, query_current_users)
130 slice_params['researcher'] = slice_params['researcher'] | results_current_users
131 query = Query.update('slice').filter_by('user_hrn', '==', user_hrn).set(slice_params).select('slice_hrn')
132 results = execute_query(request, query)
133 # Also possible but not supported yet
134 # UPDATE myslice:user SET slice=['ple.upmc.agent','ple.upmc.myslicedemo','ple.upmc.tophat'] where user_hrn=='ple.upmc.azerty'
136 raise Exception, "Could not create %s. Already exists ?" % slice_params['hrn']
141 def manifold_add_user(wsgi_request, request):
142 """Add a Manifold user corresponding to a user request.
145 wsgi_request: a WSGIRequest instance
146 request (dict): a dictionary containing the user request built from the
150 The user_id of the inserted user.
157 authority_hrn = request['authority_hrn']
158 request['authority_hrn'] = authority_hrn.split(".")[0]
160 USER_CONFIG = '{"firstname": "%(first_name)s", "lastname": "%(last_name)s", "authority": "%(authority_hrn)s"}'
163 'email' : request['username'],
164 'password' : request['password'],
165 'config' : USER_CONFIG % request,
169 request['authority_hrn'] = authority_hrn
171 query = Query.create('local:user').set(user_params).select('email')
172 results = execute_admin_query(request, query)
174 raise Exception, "Failed creating manifold user: %s" % user_params['email']
176 return result['email']
178 def manifold_update_user(request, email, user_params):
179 # user_params: password, config e.g.,
180 query = Query.update('local:user').filter_by('email', '==', email).set(user_params).select('email')
181 results = execute_admin_query(request,query)
182 # NOTE: results remains empty and goes to Exception. However, it updates the manifold DB.
183 # That's why I commented the exception part. -- Yasin
185 # raise Exception, "Failed updating manifold user: %s" % user_params['email']
189 def manifold_add_account(request, account_params):
190 query = Query.create('local:account').set(account_params).select(['user', 'platform'])
191 results = execute_admin_query(request,query)
193 raise Exception, "Failed creating manifold account on platform %s for user: %s" % (account_params['platform'], account_params['user'])
195 return result['user_id']
197 def manifold_update_account(request,user_id,account_params):
198 # account_params: config
199 query = Query.update('local:account').filter_by('platform', '==', 'myslice').filter_by('user_id', '==', user_id).set(account_params).select('user_id')
200 results = execute_admin_query(request,query)
203 #explicitly mention the platform_id
204 def manifold_delete_account(request, platform_id, user_id, account_params):
205 query = Query.delete('local:account').filter_by('platform_id', '==', platform_id).filter_by('user_id', '==', user_id).set(account_params).select('user_id')
206 results = execute_admin_query(request,query)
211 def manifold_add_platform(request, platform_params):
212 query = Query.create('local:platform').set(platform_params).select(['user', 'platform'])
213 results = execute_admin_query(request,query)
215 raise Exception, "Failed creating manifold platform %s for user: %s" % (platform_params['platform'], platform_params['user'])
217 return result['platform_id']
220 def make_request_user(user):
222 request['type'] = 'user'
223 request['id'] = user.id
224 request['timestamp'] = user.created # XXX in DB ?
225 request['authority_hrn'] = user.authority_hrn
226 request['first_name'] = user.first_name
227 request['last_name'] = user.last_name
228 request['email'] = user.email
229 request['login'] = user.login
230 request['user_hrn'] = user.user_hrn
231 request['public_key'] = user.public_key
232 request['private_key'] = user.private_key
235 def make_request_slice(slice):
237 request['type'] = 'slice'
238 request['id'] = slice.id
239 request['user_hrn'] = slice.user_hrn
240 request['timestamp'] = slice.created
241 request['authority_hrn'] = slice.authority_hrn
242 request['slice_name'] = slice.slice_name
243 request['number_of_nodes'] = slice.number_of_nodes
244 request['type_of_nodes'] = slice.type_of_nodes
245 request['purpose'] = slice.purpose
248 def make_request_authority(authority):
250 request['type'] = 'authority'
251 request['id'] = authority.id
252 request['site_name'] = authority.site_name
253 request['site_latitude'] = authority.site_latitude
254 request['site_longitude'] = authority.site_longitude
255 request['site_url'] = authority.site_url
256 request['site_authority'] = authority.site_authority
257 request['site_abbreviated_name'] = authority.site_abbreviated_name
258 request['address_line1'] = authority.address_line1
259 request['address_line2'] = authority.address_line2
260 request['address_line3'] = authority.address_line3
261 request['address_city'] = authority.address_city
262 request['address_postalcode'] = authority.address_postalcode
263 request['address_state'] = authority.address_state
264 request['address_country'] = authority.address_country
265 request['authority_hrn'] = authority.authority_hrn
266 request['timestamp'] = authority.created
269 def make_requests(pending_users, pending_slices, pending_authorities):
271 for user in pending_users:
272 requests.append(make_request_user(user))
273 for slice in pending_slices:
274 requests.append(make_request_slice(slice))
275 for authority in pending_authorities:
276 requests.append(make_request_authority(authority))
279 def get_request_by_id(ids):
280 sorted_ids = { 'user': [], 'slice': [], 'authority': [] }
282 type, id = type__id.split('__')
283 sorted_ids[type].append(id)
286 pending_users = PendingUser.objects.all()
287 pending_slices = PendingSlice.objects.all()
288 pending_authorities = PendingAuthority.objects.all()
290 pending_users = PendingUser.objects.filter(id__in=sorted_ids['user']).all()
291 pending_slices = PendingSlice.objects.filter(id__in=sorted_ids['slice']).all()
292 pending_authorities = PendingAuthority.objects.filter(id__in=sorted_ids['authority']).all()
294 return make_requests(pending_users, pending_slices, pending_authorities)
296 def get_requests(authority_hrns=None):
297 print "get_request_by_authority auth_hrns = ", authority_hrns
298 if not authority_hrns:
299 ## get those pending users who have confirmed their emails
300 pending_users = PendingUser.objects.filter(status__iexact = 'True')
301 pending_slices = PendingSlice.objects.all()
302 pending_authorities = PendingAuthority.objects.all()
304 pending_users = PendingUser.objects.filter(authority_hrn__in=authority_hrns).all()
305 pending_slices = PendingSlice.objects.filter(authority_hrn__in=authority_hrns).all()
306 pending_authorities = PendingAuthority.objects.filter(authority_hrn__in=authority_hrns).all()
308 return make_requests(pending_users, pending_slices, pending_authorities)
310 # XXX Is it in sync with the form fields ?
312 def portal_validate_request(wsgi_request, request_ids):
315 if not isinstance(request_ids, list):
316 request_ids = [request_ids]
318 requests = get_request_by_id(request_ids)
319 for request in requests:
320 # type, id, timestamp, details, allowed -- MISSING: authority_hrn
321 # CAREFUL about details
322 # user : first name, last name, email, password, keypair
323 # slice : number of nodes, type of nodes, purpose
327 if request['type'] == 'user':
330 split_email = request['email'].split("@")[0]
331 split_email = split_email.replace(".", "_")
332 split_authority = request['authority_hrn'].split(".")[1]
333 request['username'] = split_email + '@' + split_authority
334 create_user(wsgi_request, request)
335 request_status['SFA user'] = {'status': True }
336 PendingUser.objects.get(id=request['id']).delete()
338 request_status['SFA user'] = {'status': False, 'description': str(e)}
340 # user_params = {'status':2}
341 # manifold_update_user(request, request['email'], user_params)
343 # MANIFOLD user should be added beforehand, during registration
345 # manifold_user_params = { key: request[key] for key in MANIFOLD_USER_KEYS }
346 # # XXX # manifold_add_user(manifold_user_params)
347 # request_status['MySlice user'] = {'status': True }
348 #except Exception, e:
349 # request_status['MySlice user'] = {'status': False, 'description': str(e)}
352 #manifold_account_params = { key: request[key] for key in MANIFOLD_ACCOUNT_KEYS }
353 #manifold_add_account(manifold_account_params)
354 #request_status['MySlice testbed accounts'] = {'status': False }
356 elif request['type'] == 'slice':
358 create_slice(wsgi_request, request)
359 request_status['SFA slice'] = {'status': True }
360 PendingSlice.objects.get(id=request['id']).delete()
363 request_status['SFA slice'] = {'status': False, 'description': str(e)}
365 elif request['type'] == 'authority':
367 #hrn = "%s.%s" % (request['authority_hrn'], request['site_authority'])
368 hrn = request['site_authority']
369 # XXX tmp sfa dependency
370 from sfa.util.xrn import Xrn
371 urn = Xrn(hrn, request['type']).get_urn()
373 # Only hrn is required for Manifold Query
374 sfa_authority_params = {
375 'authority_hrn' : hrn,
376 #'authority_urn' : urn,
377 #'type' : request['type'],
381 print "ADD Authority"
382 sfa_add_authority(wsgi_request, sfa_authority_params)
383 request_status['SFA authority'] = {'status': True }
384 PendingAuthority.objects.get(id=request['id']).delete()
387 request_status['SFA authority'] = {'status': False, 'description': str(e)}
389 # XXX Remove from Pendings in database
391 status['%s__%s' % (request['type'], request['id'])] = request_status
396 def validate_action(request, **kwargs):
397 ids = filter(None, kwargs['id'].split('/'))
398 status = portal_validate_request(request, ids)
399 json_answer = json.dumps(status)
400 return HttpResponse (json_answer, mimetype="application/json")
403 # http://djangosnippets.org/snippets/942/
407 #-------------------------------------------------------------------------------
409 #-------------------------------------------------------------------------------
411 def create_slice(wsgi_request, request):
414 wsgi_request (~ WSGIRequest) :
415 request (dict) : the slice request in our own dict format
420 hrn = "%s.%s" % (request['authority_hrn'], request['slice_name'])
421 # XXX tmp sfa dependency
422 from sfa.util.xrn import Xrn
423 urn = Xrn(hrn, request['type']).get_urn()
425 # Add User to Slice if we have the user_hrn in pendingslice table
426 user_hrn = request.get('user_hrn', None)
427 user_hrns = list([user_hrn]) if user_hrn else list()
429 user_email = request.get
431 # XXX We should create a slice with Manifold terminology
435 'slice_type' : request['type'],
437 'slice_enabled' : True
439 # ignored in request: id, timestamp, number_of_nodes, type_of_nodes, purpose
441 query = Query.create('slice').set(slice_params).select('slice_hrn')
442 results = execute_query(wsgi_request, query)
444 raise Exception, "Could not create %s. Already exists ?" % slice_params['hrn']
445 ## We do not store the email in pendingslice table. As a result receiver's email is unknown ##
446 ## Need modification in pendingslice table ###
448 # subject = 'Slice created'
449 # msg = 'A manager of your institution has validated your slice request. You can now add resources to the slice and start experimenting.'
450 # send_mail(subject, msg, 'support@onelab.eu',['yasin.upmc@gmail.com'], fail_silently=False)
454 def create_pending_slice(wsgi_request, request, email):
458 # Insert an entry in the PendingSlice table
460 slice_name = request['slice_name'],
461 user_hrn = request['user_hrn'],
462 authority_hrn = request['authority_hrn'],
463 number_of_nodes = request['exp_url'],
464 purpose = request['purpose'],
469 # Send an email: the recipients are the PI of the authority
470 recipients = authority_get_pi_emails(wsgi_request, request['authority_hrn'])
472 theme.template_name = 'slice_request_email.txt'
473 text_content = render_to_string(theme.template, request)
475 theme.template_name = 'slice_request_email.html'
476 html_content = render_to_string(theme.template, request)
478 theme.template_name = 'slice_request_email_subject.txt'
479 subject = render_to_string(theme.template, request)
480 subject = subject.replace('\n', '')
482 theme.template_name = 'email_default_sender.txt'
483 sender = render_to_string(theme.template, request)
484 sender = sender.replace('\n', '')
487 msg = EmailMultiAlternatives(subject, text_content, sender, recipients)
488 msg.attach_alternative(html_content, "text/html")
491 print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
493 #-------------------------------------------------------------------------------
495 #-------------------------------------------------------------------------------
497 def manifold_add_reference_user_accounts(wsgi_request, request):
498 """When a new user is created, add reference accounts to the reference platform.
500 # XXX XXX XXX The rest of this function has to be checked XXX XXX XXX
502 # Retrieve user information
503 user_query = Query().get('local:user') \
504 .select('user_id', 'config', 'email', 'status') \
505 .filter_by('email', '==', request['username'])
506 user_details = execute_admin_query(wsgi_request, user_query)
508 # USER MAIN ACCOUNT != reference
509 #print 'USER MAIN ACCOUNT != reference'
510 list_accounts_query = Query().get('local:account') \
511 .select('user_id', 'platform_id', 'auth_type', 'config') \
512 .filter_by('user_id', '==', user_details[0]['user_id']) \
513 .filter_by('auth_type', '!=', 'reference')
514 list_accounts = execute_admin_query(wsgi_request, list_accounts_query)
516 # XXX main_platform is being erased several times ???
517 for account in list_accounts:
518 main_platform_query = Query().get('local:platform') \
519 .select('platform_id', 'platform') \
520 .filter_by('platform_id', '==', account['platform_id'])
521 main_platform = execute_admin_query(wsgi_request, main_platform_query)
523 # Add reference accounts on SFA enabled platforms
524 platforms_query = Query().get('local:platform') \
525 .filter_by('disabled', '==', '0') \
526 .filter_by('gateway_type', '==', 'sfa') \
527 .select('platform_id', 'gateway_type')
528 platforms = execute_admin_query(wsgi_request, platforms_query)
529 for platform in platforms:
530 #print "add reference to platform ",platform
531 manifold_account_params = {
532 'user_id' : user_details[0]['user_id'],
533 'platform_id' : platform['platform_id'],
534 'auth_type' : 'reference',
535 'config' : '{"reference_platform": "' + main_platform[0]['platform'] + '"}',
537 manifold_add_account(wsgi_request, manifold_account_params)
539 def sfa_create_user(wsgi_request, request):
542 wsgi_request (~ WSGIRequest) :
543 request (dict) : the user request in our own dict format
548 from sfa.util.xrn import Xrn
550 auth_pi = request.get('pi', None)
551 auth_pi = list([auth_pi]) if auth_pi else list()
553 # We create a user request with Manifold terminology
555 'user_hrn' : request['user_hrn'],
556 'user_email' : request['email'],
557 'user_urn' : Xrn(request['user_hrn'], request['type']).get_urn(),
558 'user_type' : request['type'],
559 'keys' : request['public_key'],
560 'user_first_name' : request['first_name'],
561 'user_last_name' : request['last_name'],
562 'pi_authorities' : auth_pi,
563 'user_enabled' : True
566 query = Query.create('user').set(sfa_user_params).select('user_hrn')
567 results = execute_query(wsgi_request, query)
569 raise Exception, "Could not create %s. Already exists ?" % sfa_user_params['user_hrn']
571 subject = 'User validated'
572 msg = 'A manager of your institution has validated your account. You have now full user access to the portal.'
573 send_mail(subject, msg, 'support@fibre.org.br',[request['email']], fail_silently=False)
576 def ldap_create_user(wsgi_request, request, user_detail):
578 Populating LDAP withuser data - Edelberto 10/03/2014
580 # import needed modules
582 import ldap.modlist as modlist
585 # XXX We need to create this in settings
586 # ldap.open is deprecated!
587 #l = ldap.open("127.0.0.1")
588 l = ldap.initialize('ldap://127.0.0.1:389')
590 # you should set this to ldap.VERSION2 if you're using a v2 directory
591 l.protocol_version = ldap.VERSION3
593 # Bind/authenticate with a user with apropriate rights to add objects
594 # XXX Now we set the force rootd but after we need to set this in settings file for could change the dn and password of root
595 l.simple_bind_s("cn=Manager,dc=br","fibre")
597 # The dn of our new entry/object
598 #dn="uid=addtest@uff.br,ou=people,o=uff,dc=br"
600 # we need to create the dn entry
601 # Receiving an email address, how can we split and mount it in DN format?
602 #mail = "debora@uff.br"
603 mail = request['email']
604 login = mail.split('@')[0]
605 org = mail.split('@')[1]
606 o = org.split('.')[-2]
607 dc = org.split('.')[-1]
609 # DN format to authenticate - IMPORTANT!
611 dn = "uid="+mail+",ou=people,o="+o+",dc="+dc
615 print request['password']
617 # Creating a unique uidNumber - Necessary for experiments
618 # Was defined to began in 100000
619 unique = int(user_detail['user_id']) + 100000
620 #unique = int(unique)
623 # A dict to help build the "body" of the object
625 attrs['objectclass'] = ['person','inetOrgPerson','posixAccount','eduPerson','brPerson','schacPersonalCharacteristics','fibre', 'ldapPublicKey']
626 # XXX Converting all unicodes to string
627 attrs['uid'] = mail.encode('utf-8')
628 attrs['cn'] = request['first_name'].encode('latin1')
629 attrs['sn'] = request['last_name'].encode('latin1')
630 # XXX we need to set a unique uidNumber. How?
631 attrs['uidNumber'] = str(unique)
632 attrs['gidNumber'] = '500'
633 attrs['homeDirectory'] = "/home/"+org+"/"+mail
634 attrs['homeDirectory'] = attrs['homeDirectory'].encode('utf-8')
635 attrs['mail'] = mail.encode('utf-8')
636 attrs['eppn'] = mail.encode('utf8')
637 attrs['userPassword'] = request['password'].encode('utf-8')
638 attrs['sshPublicKey'] = request['public_key'].encode('utf-8')
639 # XXX We really set TRUE for those attributes?
640 #attrs['userEnable'] = 'TRUE'
641 # set FALSE and change after when the user is validated
642 attrs['userEnable'] = 'FALSE'
643 attrs['omfAdmin'] = 'TRUE'
645 # Convert our dict to nice syntax for the add-function using modlist-module
646 ldif = modlist.addModlist(attrs)
649 print attrs['userPassword']
652 print attrs['homeDirectory']
655 # Do the actual synchronous add-operation to the ldapserver
658 # Its nice to the server to disconnect and free resources when done
663 def ldap_modify_user(wsgi_request, request):
664 #Modify entries in an LDAP Directory
667 # import needed modules
669 import ldap.modlist as modlist
672 l = ldap.initialize("ldap://localhost:389/")
674 # Bind/authenticate with a user with apropriate rights to add objects
675 l.simple_bind_s("cn=Manager,dc=br","fibre")
677 # we need to create the dn entry
678 # Receiving an email address, how can we split and mount it in DN format?
679 #mail = "debora@uff.br"
680 mail = request['email']
681 login = mail.split('@')[0]
682 org = mail.split('@')[1]
683 o = org.split('.')[-2]
684 dc = org.split('.')[-1]
686 # DN format to authenticate - IMPORTANT!
688 dn = "uid="+mail+",ou=people,o="+o+",dc="+dc
690 # The dn of our existing entry/object
691 #dn="uid=mario@uff.br,ou=people,o=uff,dc=br"
693 # Some place-holders for old and new values
694 old = {'userEnable':'FALSE'}
695 new = {'userEnable':'TRUE'}
697 # Convert place-holders for modify-operation using modlist-module
698 ldif = modlist.modifyModlist(old,new)
700 # Do the actual modification
703 # Its nice to the server to disconnect and free resources when done
708 def create_user(wsgi_request, request):
710 # XXX This has to be stored centrally
711 USER_STATUS_ENABLED = 2
713 # NOTE : if we were to create a user directly (just like we create slices,
714 # we would have to perform the steps in create_pending_user too
716 # Edelberto - I put this more below
717 # Add the user to the SFA registry
718 #sfa_create_user(wsgi_request, request)
720 # Update Manifold user status
721 manifold_update_user(wsgi_request, request['username'], {'status': USER_STATUS_ENABLED})
723 # Add reference accounts for platforms
724 manifold_add_reference_user_accounts(wsgi_request, request)
726 # Add the user to the SFA registry
727 sfa_create_user(wsgi_request, request)
730 # LDAP update user userEnabled = True
732 mail = request['email']
733 login = mail.split('@')[0]
734 org = mail.split('@')[1]
735 o = org.split('.')[-2]
736 dc = org.split('.')[-1]
737 # To know if user is a LDAP user - Need to has a 'dc' identifier
738 if dc == 'br' or 'eu':
739 ldap_modify_user(wsgi_request, request)
741 "LDAP create user failed"
743 def create_pending_user(wsgi_request, request, user_detail):
747 # Insert an entry in the PendingUser table
749 first_name = request['first_name'],
750 last_name = request['last_name'],
751 authority_hrn = request['authority_hrn'],
752 email = request['email'],
753 password = request['password'],
754 public_key = request['public_key'],
755 private_key = request['private_key'],
756 user_hrn = request['user_hrn'],
758 email_hash = request['email_hash'],
763 split_email = request['email'].split("@")[0]
764 split_email = split_email.replace(".", "_")
765 split_authority = request['authority_hrn'].split(".")[1]
766 request['username'] = split_email + '@' + split_authority
768 # sends email to user to activate the email
769 theme.template_name = 'activate_user.html'
770 html_content = render_to_string(theme.template, request)
771 theme.template_name = 'activate_user.txt'
772 text_content = render_to_string(theme.template, request)
773 theme.template_name = 'activate_user_email_subject.txt'
774 subject = render_to_string(theme.template, request)
775 subject = subject.replace('\n', '')
776 #sender = 'support@myslice.info'
777 theme.template_name = 'email_default_sender.txt'
778 sender = render_to_string(theme.template, request)
779 sender = sender.replace('\n', '')
780 recipient = [request['email']]
781 #recipient = recipient.append(request['email'])
783 msg = EmailMultiAlternatives(subject, text_content, sender, recipient)
784 msg.attach_alternative(html_content, "text/html")
787 # saves the user to django auth_user table [needed for password reset]
788 user = User.objects.create_user(request['username'], request['email'], request['password'])
790 # Creating a manifold user
791 user_id = manifold_add_user(wsgi_request, request)
793 # Creating a Manifold account on the MySlice platform
794 # Note the JSON representation of public and private keys already includes quotes
796 'user_hrn' : request['user_hrn'],
797 'user_public_key' : request['public_key'],
799 if request['private_key']:
800 account_config['user_private_key'] = request['private_key']
802 user_id = user_detail['user_id'] + 1 # the user_id for the newly created user in local:user
804 # XXX TODO: Require a myslice platform
805 # ALERT: this will disapear with ROUTERV2 of Manifold
806 # We have to consider the case where several registries can be used
807 # Removed hardcoded platform = 5
808 # This platform == 'myslice' is a TMP FIX !!
810 reg_platform_query = Query().get('local:platform') \
811 .filter_by('platform', '==', 'myslice') \
812 .select('platform_id')
813 reg_platform = execute_admin_query(wsgi_request, reg_platform_query)
814 reg_platform_id = reg_platform[0]['platform_id']
816 'platform_id' : reg_platform_id, # XXX ALERT !!
818 'auth_type' : request['auth_type'],
819 'config' : json.dumps(account_config),
821 manifold_add_account(wsgi_request, account_params)
823 print "Failed creating manifold account on platform %s for user: %s" % ('myslice', request['email'])
825 # Add user to LDAP userEnabled = False
826 # Not more here. Create before directly to the registrationview.py
827 # After we change userEnable = TRUE when validate the user
830 # Send an email: the recipients are the PI of the authority
831 # If No PI is defined for this Authority, send to a default email (different for each theme)
833 split_authority_hrn = request['authority_hrn'].split(".")[0]
835 recipients = authority_get_pi_emails(wsgi_request, split_authority_hrn)
837 theme.template_name = 'user_request_email.html'
838 html_content = render_to_string(theme.template, request)
840 theme.template_name = 'user_request_email.txt'
841 text_content = render_to_string(theme.template, request)
843 theme.template_name = 'user_request_email_subject.txt'
844 subject = render_to_string(theme.template, request)
845 subject = subject.replace('\n', '')
847 theme.template_name = 'email_default_sender.txt'
848 sender = render_to_string(theme.template, request)
849 sender = sender.replace('\n', '')
851 msg = EmailMultiAlternatives(subject, text_content, sender, recipients)
852 msg.attach_alternative(html_content, "text/html")
855 print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
857 traceback.print_exc()