import os.path import re import json from random import randint from hashlib import md5 from django.views.generic import View from django.template.loader import render_to_string from django.shortcuts import render from django.contrib.auth import get_user_model from unfold.page import Page from unfold.loginrequired import FreeAccessView from ui.topmenu import topmenu_items_live from manifoldapi.manifoldapi import execute_admin_query from manifold.core.query import Query from portal.models import PendingUser from portal.actions import create_pending_user, getAuthorities from myslice.theme import ThemeView from myslice.settings import logger import activity.user # since we inherit from FreeAccessView we cannot redefine 'dispatch' # so let's override 'get' and 'post' instead # class RegistrationView (FreeAccessView, ThemeView): template_name = 'registration_view.html' def post (self, request): return self.get_or_post (request, 'POST') def get (self, request): return self.get_or_post (request, 'GET') def get_or_post(self, wsgi_request, method): """ """ errors = [] authorities = getAuthorities(wsgi_request, admin = True) #authority_hrn = None ## REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2 #authorities_query = Query.get('authority').select('name', 'authority_hrn') #authorities = execute_admin_query(wsgi_request, authorities_query) #if authorities is not None: # # Remove the root authority from the list # matching = [s for s in authorities if "." in s['authority_hrn']] # authorities = sorted(matching, key=lambda k: k['authority_hrn']) # authorities = sorted(matching, key=lambda k: k['name']) logger.debug("############ BREAKPOINT 1 #################") # Page rendering page = Page(wsgi_request) page.add_css_files ( [ "https://code.jquery.com/ui/1.11.2/themes/smoothness/jquery-ui.css" ] ) page.add_js_files ( [ "js/jquery.validate.js", "js/my_account.register.js", "js/jquery.qtip.min.js","js/jquery-ui.js","js/jquery-ui-combobox.js" ] ) page.add_css_files ( [ "css/onelab.css", "css/registration.css", "css/jquery.qtip.min.css", "css/jquery.ui.combobox.css" ] ) page.expose_js_metadata() logger.debug("############ BREAKPOINT 2 #################") if method == 'POST': reg_form = {} # The form has been submitted if wsgi_request.is_secure(): current_site = 'https://' else: current_site = 'http://' current_site += wsgi_request.META['HTTP_HOST'] logger.debug("############ BREAKPOINT 3 #################") post_email = wsgi_request.POST.get('email','').lower() salt = randint(1,100000) email_hash = md5(str(salt)+post_email).hexdigest() #email_hash = md5(post_email).digest().encode('base64')[:-1] user_request = { 'first_name' : wsgi_request.POST.get('firstname', ''), 'last_name' : wsgi_request.POST.get('lastname', ''), 'authority_hrn' : wsgi_request.POST.get('org_name', ''), 'email' : post_email, 'password' : wsgi_request.POST.get('password', ''), 'current_site' : current_site, 'email_hash' : email_hash, 'pi' : '', 'validation_link': current_site + '/portal/email_activation/'+ email_hash } logger.debug("############ BREAKPOINT 4 #################") auth = wsgi_request.POST.get('org_name', None) if auth is None or auth == "": errors.append('Organization required: please select one or request its addition') else: logger.debug("############ BREAKPOINT 5 #################") # Construct user_hrn from email (XXX Should use common code) split_email = user_request['email'].split("@")[0] split_email = split_email.replace(".", "_") # Replace + by _ => more convenient for testing and validate with a real email split_email = split_email.replace("+", "_") user_request['user_hrn'] = user_request['authority_hrn'] \ + '.' + split_email # Validate input UserModel = get_user_model() if (re.search(r'^[\w+\s.@+-]+$', user_request['first_name']) == None): errors.append('First name may contain only letters, numbers, spaces and @/./+/-/_ characters.') if (re.search(r'^[\w+\s.@+-]+$', user_request['last_name']) == None): errors.append('Last name may contain only letters, numbers, spaces and @/./+/-/_ characters.') # Does the user exist in Manifold? user_query = Query().get('local:user').select('user_id','email') user_details = execute_admin_query(wsgi_request, user_query) for user_detail in user_details: if user_detail['email'] == user_request['email']: errors.append('Email already registered. Login with your existing account. Forgot your password?') # Does the user exist in sfa? [query is very slow!!] #user_query = Query().get('user').select('user_hrn','user_email') # XXX Test based on the user_hrn is quick # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2 user_query = Query().get('myslice:user').select('user_hrn','user_email').filter_by('user_hrn','==',user_request['user_hrn']) user_details_sfa = execute_admin_query(wsgi_request, user_query) for user in user_details_sfa: if user['user_email'] == user_request['email']: errors.append('Email already registered in OneLab registry. Contact OneLab support or use another email.') if user['user_hrn'] == user_request['user_hrn']: # add random number if user_hrn already exists in the registry user_request['user_hrn'] = user_request['authority_hrn'] \ + '.' + split_email + str(randint(1,1000000)) # checking in django unfold db portal application pending users # sqlite3 /var/unfold/unfold.sqlite3 # select email from portal_pendinguser; if PendingUser.objects.filter(email__iexact = user_request['email']): errors.append('Account pending for validation. Please wait till your account is validated or contact OneLab support.') # checking in django_db !! # sqlite3 /var/unfold/unfold.sqlite3 # select email from auth_user; if UserModel._default_manager.filter(email__iexact = user_request['email']): errors.append('Contact support or try with another email.') # XXX TODO: Factorize with portal/accountview.py # XXX TODO: Factorize with portal/registrationview.py # XXX TODO: Factorize with portal/joinview.py if 'generate' in wsgi_request.POST['question']: user_request['auth_type'] = 'managed' # XXX Common code, dependency ? from Crypto.PublicKey import RSA private = RSA.generate(1024) # Example: private_key = '-----BEGIN RSA PRIVATE KEY-----\nMIIC...' # Example: public_key = 'ssh-rsa AAAAB3...' user_request['private_key'] = private.exportKey() user_request['public_key'] = private.publickey().exportKey(format='OpenSSH') else: user_request['auth_type'] = 'user' up_file = wsgi_request.FILES['user_public_key'] file_content = up_file.read().strip() file_name = up_file.name file_extension = os.path.splitext(file_name)[1] ALLOWED_EXTENSIONS = ['.pub','.txt'] if file_extension not in ALLOWED_EXTENSIONS or not re.search(r'ssh-rsa',file_content): errors.append('Please upload a valid RSA public key.') # user_request['private_key'] can't be Null because all db fields are set as NOT NULL user_request['private_key'] = "" user_request['public_key'] = file_content if not errors: create_pending_user(wsgi_request, user_request, user_detail) self.template_name = 'user_register_complete.html' # log user activity activity.user.registered(self.request) return render(wsgi_request, self.template, {'theme': self.theme}) else: logger.debug("############ BREAKPOINT A #################") user_request = {} ## this is coming from onelab website onelab.eu reg_form = { 'first_name': wsgi_request.GET.get('first_name', ''), 'last_name': wsgi_request.GET.get('last_name', ''), 'email': wsgi_request.GET.get('email', ''), } # log user activity activity.user.signup(self.request) logger.debug("############ BREAKPOINT B #################") template_env = { #'topmenu_items': topmenu_items_live('Register', page), 'errors': errors, 'authorities': authorities, 'theme': self.theme } template_env.update(user_request) template_env.update(reg_form) template_env.update(page.prelude_env ()) logger.debug("############ BREAKPOINT C #################") return render(wsgi_request, self.template,template_env)