+# -*- coding: utf-8 -*-
+#
+# portal/views.py: views for the portal application
+# This file is part of the Manifold project.
+#
+# Authors:
+# Jordan Augé <jordan.auge@lip6.fr>
+# Mohammed Yasin Rahman <mohammed-yasin.rahman@lip6.fr>
+# Copyright 2013, UPMC Sorbonne Universités / LIP6
+#
+# This program is free software; you can redistribute it and/or modify it under
+# the terms of the GNU General Public License as published by the Free Software
+# Foundation; either version 3, or (at your option) any later version.
+#
+# This program is distributed in the hope that it will be useful, but WITHOUT
+# ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
+# FOR A PARTICULAR PURPOSE. See the GNU General Public License for more
+# details.
+#
+# You should have received a copy of the GNU General Public License along with
+# this program; see the file COPYING. If not, write to the Free Software
+# Foundation, 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
+
+import os.path, re
+import json
+
+from django.views.generic.base import TemplateView
+from django.shortcuts import render
+from django.template.loader import render_to_string
+from django.core.mail import send_mail
+from django.utils.decorators import method_decorator
+from django.contrib.auth.decorators import login_required
+
+from plugins.lists.simplelist import SimpleList
+from plugins.hazelnut import Hazelnut
+from plugins.pres_view import PresView
+from portal.event import Event
+
+from portal import signals
+from portal.forms import SliceRequestForm
+from portal.util import RegistrationView, ActivationView
+from portal.models import PendingUser, PendingSlice
+from portal.actions import authority_get_pi_emails, get_request_by_authority, manifold_add_user, manifold_update_user
+from manifold.manifoldapi import execute_query
+from manifold.core.query import Query
+from unfold.page import Page
+from myslice.viewutils import topmenu_items, the_user
+from django.http import HttpResponseRedirect, HttpResponse
+
+
+def register_4m_f4f(request):
+ errors = []
+
+ authorities_query = Query.get('authority').filter_by('authority_hrn', 'included', ['ple.inria', 'ple.upmc']).select('name', 'authority_hrn')
+ #authorities_query = Query.get('authority').select('authority_hrn')
+ authorities = execute_query(request, authorities_query)
+
+ if request.method == 'POST':
+ # We shall use a form here
+
+ #get_email = PendingUser.objects.get(email)
+ reg_fname = request.POST.get('firstname', '')
+ reg_lname = request.POST.get('lastname', '')
+ #reg_aff = request.POST.get('affiliation','')
+ reg_auth = request.POST.get('authority_hrn', '')
+ reg_email = request.POST.get('email','').lower()
+
+ #POST value validation
+ if (re.search(r'^[\w+\s.@+-]+$', reg_fname)==None):
+ errors.append('First Name may contain only letters, numbers, spaces and @/./+/-/_ characters.')
+ #return HttpResponse("Only Letters, Numbers, - and _ allowd in First Name")
+ #return render(request, 'register_4m_f4f.html')
+ if (re.search(r'^[\w+\s.@+-]+$', reg_lname) == None):
+ errors.append('Last Name may contain only letters, numbers, spaces and @/./+/-/_ characters.')
+ #return HttpResponse("Only Letters, Numbers, - and _ is allowed in Last name")
+ #return render(request, 'register_4m_f4f.html')
+# if (re.search(r'^[\w+\s.@+-]+$', reg_aff) == None):
+# errors.append('Affiliation may contain only letters, numbers, spaces and @/./+/-/_ characters.')
+ #return HttpResponse("Only Letters, Numbers and _ is allowed in Affiliation")
+ #return render(request, 'register_4m_f4f.html')
+ # XXX validate authority hrn !!
+ if PendingUser.objects.filter(email__iexact=reg_email):
+ errors.append('Email already registered.Please provide a new email address.')
+ #return HttpResponse("Email Already exists")
+ #return render(request, 'register_4m_f4f.html')
+ if 'generate' in request.POST['question']:
+ # Generate public and private keys using SFA Library
+ from sfa.trust.certificate import Keypair
+ k = Keypair(create=True)
+ public_key = k.get_pubkey_string()
+ private_key = k.as_pem()
+ private_key = ''.join(private_key.split())
+ public_key = "ssh-rsa " + public_key
+ # Saving to DB
+ keypair = '{"user_public_key":"'+ public_key + '", "user_private_key":"'+ private_key + '"}'
+# keypair = re.sub("\r", "", keypair)
+# keypair = re.sub("\n", "\\n", keypair)
+# #keypair = keypair.rstrip('\r\n')
+# keypair = ''.join(keypair.split())
+ else:
+ up_file = request.FILES['user_public_key']
+ file_content = up_file.read()
+ file_name = up_file.name
+ file_extension = os.path.splitext(file_name)[1]
+ allowed_extension = ['.pub','.txt']
+ if file_extension in allowed_extension and re.search(r'ssh-rsa',file_content):
+ keypair = '{"user_public_key":"'+ file_content +'"}'
+ keypair = re.sub("\r", "", keypair)
+ keypair = re.sub("\n", "\\n",keypair)
+ keypair = ''.join(keypair.split())
+ else:
+ errors.append('Please upload a valid RSA public key [.txt or .pub].')
+
+ #b = PendingUser(first_name=reg_fname, last_name=reg_lname, affiliation=reg_aff,
+ # email=reg_email, password=request.POST['password'], keypair=keypair)
+ #b.save()
+ if not errors:
+ b = PendingUser(
+ first_name=reg_fname,
+ last_name=reg_lname,
+ #affiliation=reg_aff,
+ authority_hrn=reg_auth,
+ email=reg_email,
+ password=request.POST['password'],
+ keypair=keypair
+ )
+ b.save()
+
+ # Send email
+ ctx = {
+ first_name : reg_fname,
+ last_name : reg_lname,
+ #affiliation : reg_aff,
+ authority_hrn: reg_auth,
+ email : reg_email,
+ keypair : keypair,
+ cc_myself : True # form.cleaned_data['cc_myself']
+ }
+
+ recipients = authority_get_pi_emails(authority_hrn)
+ if ctx['cc_myself']:
+ recipients.append(ctx['email'])
+
+ msg = render_to_string('user_request_email.txt', ctx)
+ send_mail("Onelab New User request submitted", msg, email, recipients)
+
+ return render(request, 'user_register_complete.html')
+
+ return render(request, 'register_4m_f4f.html',{
+ 'topmenu_items': topmenu_items('Register', request),
+ 'errors': errors,
+ 'firstname': request.POST.get('firstname', ''),
+ 'lastname': request.POST.get('lastname', ''),
+ #'affiliation': request.POST.get('affiliation', ''),
+ 'authority_hrn': request.POST.get('authority_hrn', ''),
+ 'email': request.POST.get('email', ''),
+ 'password': request.POST.get('password', ''),
+ 'authorities': authorities
+ })
+
+
+@login_required
+def slice_request(request):
+ errors = []
+
+ authorities_query = Query.get('authority').filter_by('authority_hrn', 'included', ['ple.inria', 'ple.upmc']).select('name', 'authority_hrn')
+ #authorities_query = Query.get('authority').select('authority_hrn')
+ authorities = execute_query(request, authorities_query)
+
+ authority_hrn_tuple = []
+ for authority in authorities:
+ authority_hrn_tuple.append((authority['authority_hrn'], authority['name']))
+ authority_hrn_initial = {'authority_hrn': authority_hrn_tuple}
+
+ # request.POST or None ?
+ if request.method == 'POST':
+ # The form has been submitted
+ form = SliceRequestForm(request.POST, initial=authority_hrn_initial)
+
+ if form.is_valid():
+ slice_name = form.cleaned_data['slice_name']
+ authority_hrn = form.cleaned_data['authority_hrn']
+ number_of_nodes = form.cleaned_data['number_of_nodes']
+ type_of_nodes = form.cleaned_data['type_of_nodes']
+ purpose = form.cleaned_data['purpose']
+
+ s = PendingSlice(
+ slice_name = slice_name,
+ authority_hrn = authority_hrn,
+ number_of_nodes = number_of_nodes,
+ type_of_nodes = type_of_nodes,
+ purpose = purpose
+ )
+ s.save()
+
+ # All validation rules pass; process data in form.cleaned_data
+ # slice_name, number_of_nodes, type_of_nodes, purpose
+ email = form.cleaned_data['email'] # email of the sender
+ cc_myself = form.cleaned_data['cc_myself']
+
+ # The recipients are the PI of the authority
+ recipients = authority_get_pi_emails(authority_hrn)
+ #recipients = ['yasin.upmc@gmail.com','jordan.auge@lip6.fr']
+ if cc_myself:
+ recipients.append(email)
+ msg = render_to_string('slice_request_email.txt', form.cleaned_data)
+ send_mail("Onelab New Slice request form submitted", msg, email, recipients)
+
+ return render(request,'slicereq_recvd.html') # Redirect after POST