3 from random import randint
4 from hashlib import md5
6 from django.views.generic import View
7 from django.template.loader import render_to_string
9 from django.shortcuts import render
10 from django.contrib.auth import get_user_model
11 from django.contrib.sites.models import Site
13 from unfold.page import Page
14 from unfold.loginrequired import FreeAccessView
15 from ui.topmenu import topmenu_items_live
17 from manifoldapi.manifoldapi import execute_admin_query
18 from manifold.core.query import Query
20 from portal.models import PendingUser
21 from portal.actions import create_pending_user
23 from myslice.theme import ThemeView
27 # since we inherit from FreeAccessView we cannot redefine 'dispatch'
28 # so let's override 'get' and 'post' instead
30 class RegistrationView (FreeAccessView, ThemeView):
31 template_name = 'registration_view.html'
33 def post (self, request):
34 return self.get_or_post (request, 'POST')
36 def get (self, request):
37 return self.get_or_post (request, 'GET')
39 def get_or_post(self, wsgi_request, method):
44 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
45 authorities_query = Query.get('authority').select('name', 'authority_hrn')
46 authorities = execute_admin_query(wsgi_request, authorities_query)
47 print "RegistrationView authorities = ", authorities
48 if authorities is not None:
49 # Remove the root authority from the list
50 matching = [s for s in authorities if "." in s['authority_hrn']]
51 authorities = sorted(matching, key=lambda k: k['authority_hrn'])
52 authorities = sorted(matching, key=lambda k: k['name'])
54 print "############ BREAKPOINT 1 #################"
56 page = Page(wsgi_request)
58 page.add_css_files ( [ "https://code.jquery.com/ui/1.11.2/themes/smoothness/jquery-ui.css" ] )
60 page.add_js_files ( [ "js/jquery.validate.js", "js/my_account.register.js", "js/jquery.qtip.min.js","js/jquery-ui.js","js/jquery-ui-combobox.js" ] )
62 page.add_css_files ( [ "css/onelab.css", "css/registration.css", "css/jquery.qtip.min.css", "css/jquery.ui.combobox.css" ] )
63 page.expose_js_metadata()
64 print "############ BREAKPOINT 2 #################"
67 # The form has been submitted
70 current_site = Site.objects.get_current()
71 current_site = current_site.domain
73 print "############ BREAKPOINT 3 #################"
74 post_email = wsgi_request.POST.get('email','').lower()
75 salt = randint(1,100000)
76 email_hash = md5(str(salt)+post_email).hexdigest()
77 #email_hash = md5(post_email).digest().encode('base64')[:-1]
79 'first_name' : wsgi_request.POST.get('firstname', ''),
80 'last_name' : wsgi_request.POST.get('lastname', ''),
81 'authority_hrn' : wsgi_request.POST.get('org_name', ''),
83 'password' : wsgi_request.POST.get('password', ''),
84 'current_site' : current_site,
85 'email_hash' : email_hash,
87 'validation_link': 'https://' + current_site + '/portal/email_activation/'+ email_hash
90 print "############ BREAKPOINT 4 #################"
91 auth = wsgi_request.POST.get('org_name', None)
92 if auth is None or auth == "":
93 errors.append('Organization required: please select one or request its addition')
96 print "############ BREAKPOINT 5 #################"
98 # Construct user_hrn from email (XXX Should use common code)
99 split_email = user_request['email'].split("@")[0]
100 split_email = split_email.replace(".", "_")
101 # Replace + by _ => more convenient for testing and validate with a real email
102 split_email = split_email.replace("+", "_")
103 user_request['user_hrn'] = user_request['authority_hrn'] \
107 UserModel = get_user_model()
108 if (re.search(r'^[\w+\s.@+-]+$', user_request['first_name']) == None):
109 errors.append('First name may contain only letters, numbers, spaces and @/./+/-/_ characters.')
110 if (re.search(r'^[\w+\s.@+-]+$', user_request['last_name']) == None):
111 errors.append('Last name may contain only letters, numbers, spaces and @/./+/-/_ characters.')
112 # Does the user exist in Manifold?
113 user_query = Query().get('local:user').select('user_id','email')
114 user_details = execute_admin_query(wsgi_request, user_query)
115 for user_detail in user_details:
116 if user_detail['email'] == user_request['email']:
117 errors.append('Email already registered. <a href="/">Login</a> with your existing account. <a href="/portal/pass_reset/">Forgot your password?</a>')
119 # Does the user exist in sfa? [query is very slow!!]
120 #user_query = Query().get('user').select('user_hrn','user_email')
121 # XXX Test based on the user_hrn is quick
123 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
124 user_query = Query().get('myslice:user').select('user_hrn','user_email').filter_by('user_hrn','==',user_request['user_hrn'])
125 user_details_sfa = execute_admin_query(wsgi_request, user_query)
127 for user in user_details_sfa:
128 if user['user_email'] == user_request['email']:
129 errors.append('Email already registered in OneLab registry. <a href="/contact">Contact OneLab support</a> or use another email.')
130 if user['user_hrn'] == user_request['user_hrn']:
131 # add random number if user_hrn already exists in the registry
132 user_request['user_hrn'] = user_request['authority_hrn'] \
133 + '.' + split_email + str(randint(1,1000000))
135 # checking in django unfold db portal application pending users
136 # sqlite3 /var/unfold/unfold.sqlite3
137 # select email from portal_pendinguser;
138 if PendingUser.objects.filter(email__iexact = user_request['email']):
139 errors.append('Account pending for validation. Please wait till your account is validated or contact OneLab support.')
141 # checking in django_db !!
142 # sqlite3 /var/unfold/unfold.sqlite3
143 # select email from auth_user;
144 if UserModel._default_manager.filter(email__iexact = user_request['email']):
145 errors.append('<a href="/contact">Contact support</a> or try with another email.')
147 # XXX TODO: Factorize with portal/accountview.py
148 # XXX TODO: Factorize with portal/registrationview.py
149 # XXX TODO: Factorize with portal/joinview.py
150 if 'generate' in wsgi_request.POST['question']:
151 user_request['auth_type'] = 'managed'
153 # XXX Common code, dependency ?
154 from Crypto.PublicKey import RSA
155 private = RSA.generate(1024)
157 # Example: private_key = '-----BEGIN RSA PRIVATE KEY-----\nMIIC...'
158 # Example: public_key = 'ssh-rsa AAAAB3...'
159 user_request['private_key'] = private.exportKey()
160 user_request['public_key'] = private.publickey().exportKey(format='OpenSSH')
163 user_request['auth_type'] = 'user'
165 up_file = wsgi_request.FILES['user_public_key']
167 file_content = up_file.read().strip()
168 file_name = up_file.name
169 file_extension = os.path.splitext(file_name)[1]
171 ALLOWED_EXTENSIONS = ['.pub','.txt']
172 if file_extension not in ALLOWED_EXTENSIONS or not re.search(r'ssh-rsa',file_content):
173 errors.append('Please upload a valid RSA public key.')
174 # user_request['private_key'] can't be Null because all db fields are set as NOT NULL
175 user_request['private_key'] = ""
176 user_request['public_key'] = file_content
179 create_pending_user(wsgi_request, user_request, user_detail)
180 self.template_name = 'user_register_complete.html'
182 activity.user.registered(self.request)
183 return render(wsgi_request, self.template, {'theme': self.theme})
186 print "############ BREAKPOINT A #################"
188 ## this is coming from onelab website onelab.eu
190 'first_name': wsgi_request.GET.get('first_name', ''),
191 'last_name': wsgi_request.GET.get('last_name', ''),
192 'email': wsgi_request.GET.get('email', ''),
195 activity.user.signup(self.request)
196 print "############ BREAKPOINT B #################"
199 #'topmenu_items': topmenu_items_live('Register', page),
201 'authorities': authorities,
204 template_env.update(user_request)
205 template_env.update(reg_form)
206 template_env.update(page.prelude_env ())
207 print "############ BREAKPOINT C #################"
208 return render(wsgi_request, self.template,template_env)