+@login_required
+#my_acc form value processing
+def account_process(request):
+ # getting the user_id from the session [now hardcoded]
+ get_user = PendingUser.objects.get(id='1') # here we will get the id/email from session e.g., person.email
+ # getting user info from manifold
+ if 'submit_name' in request.POST:
+ edited_first_name = request.POST['fname']
+ edited_last_name = request.POST['lname']
+ #email = 'test_email@gmail.com'
+ #password = 'test_pp'
+ #message = 'F_Name: %s L_name: %s dummy_pp: %s' % (first_name, last_name, password)
+ #site = None
+
+ # insert into DB [needed for registration page]
+ #approach borrowed from register view
+ #new_user = PendingUser.objects.create_inactive_user(edited_first_name, edited_last_name, email, password, site)
+ #conventional approach
+ #b = PendingUser(first_name=edited_first_name, last_name=edited_last_name)
+ #b.save()
+
+ # select and update [will be used throughout this view]
+ # select the logged in user [for the moment hard coded]
+ #get_user = PendingUser.objects.get(id='1') # here we will get the id/email from session e.g., person.email
+ # update first and last name
+ #get_user.first_name = edited_first_name
+ #get_user.last_name = edited_last_name
+ #get_user.save()
+ #user_params = {'config':'hello'}
+ #query = Query.update('local:user').set(user_params).select('config')
+ #results = execute_query(request,query)
+ #if not results:
+ # raise Exception, "Failed to update user: %s" % user_params['config']
+ #result, = results
+ #return result['config']
+ # create user is working fine :)
+ #user_params = ({'config':'"firstname":"HELLO"'},{'password':'hello'})
+ #user_params = { 'config':'{"firstname":"HEY"}'}
+ #user_params = {'email':'aa@aa.com','password':'demo'}
+ #manifold_add_user(request,user_params)
+ #manifold_update_user(request,user_params)
+
+ return HttpResponse('Sucess: First Name and Last Name Updated!')
+ elif 'submit_pass' in request.POST:
+ edited_password = request.POST['password']
+ # select the logged in user [for the moment hard coded]
+ #get_user = PendingUser.objects.get(id='1') # here we will get the id/email from session e.g., person.email
+ # update password
+ get_user.password = edited_password
+ get_user.save()
+ return HttpResponse('Success: Password Changed!!')
+ elif 'generate' in request.POST:
+ # Generate public and private keys using SFA Library
+ from sfa.trust.certificate import Keypair
+ k = Keypair(create=True)
+ public_key = k.get_pubkey_string()
+ private_key = k.as_pem()
+
+# DEPRECATED
+# KEY_LENGTH = 2048
+#
+# def blank_callback():
+# "Replace the default dashes"
+# return
+#
+# # Random seed
+# Rand.rand_seed (os.urandom (KEY_LENGTH))
+# # Generate key pair
+# key = RSA.gen_key (KEY_LENGTH, 65537, blank_callback)
+# # Create memory buffers
+# pri_mem = BIO.MemoryBuffer()
+# pub_mem = BIO.MemoryBuffer()
+# # Save keys to buffers
+# key.save_key_bio(pri_mem, None)
+# key.save_pub_key_bio(pub_mem)
+#
+# # Get keys
+# public_key = pub_mem.getvalue()
+# private_key = pri_mem.getvalue()
+ private_key = ''.join(private_key.split())
+ public_key = "ssh-rsa " + public_key
+ # Saving to DB
+ keypair = '{"user_public_key":"'+ public_key + '", "user_private_key":"'+ private_key + '"}'
+# keypair = re.sub("\r", "", keypair)
+# keypair = re.sub("\n", "\\n", keypair)
+# #keypair = keypair.rstrip('\r\n')
+# keypair = ''.join(keypair.split())
+ get_user.keypair = keypair
+ get_user.save()
+ return HttpResponse('Success: New Keypair Generated! %s' % keypair)
+
+ elif 'upload_key' in request.POST:
+ up_file = request.FILES['pubkey']
+ file_content = up_file.read()
+ file_name = up_file.name
+ file_extension = os.path.splitext(file_name)[1]
+ allowed_extension = ['.pub','.txt']
+ if file_extension in allowed_extension and re.search(r'ssh-rsa',file_content):
+ file_content = '{"user_public_key":"'+ file_content +'"}'
+ file_content = re.sub("\r", "", file_content)
+ file_content = re.sub("\n", "\\n",file_content)
+ file_content = ''.join(file_content.split())
+ get_user.keypair = file_content
+ get_user.save()
+ return HttpResponse('Success: Publickey uploaded! Old records overwritten')
+ else:
+ return HttpResponse('Please upload a valid RSA public key [.txt or .pub].')
+
+ else:
+ message = 'You submitted an empty form.'
+ return HttpResponse(message)
+
+def register_4m_f4f(request):
+ errors = []
+
+ authorities_query = Query.get('authority').filter_by('authority_hrn', 'included', ['ple.inria', 'ple.upmc']).select('name', 'authority_hrn')
+ #authorities_query = Query.get('authority').select('authority_hrn')
+ authorities = execute_query(request, authorities_query)
+
+ if request.method == 'POST':
+ # We shall use a form here
+
+ #get_email = PendingUser.objects.get(email)
+ reg_fname = request.POST.get('firstname', '')
+ reg_lname = request.POST.get('lastname', '')
+ reg_aff = request.POST.get('affiliation','')
+ reg_auth = request.POST.get('authority_hrn', '')
+ reg_email = request.POST.get('email','').lower()
+
+ #POST value validation
+ if (re.search(r'^[\w+\s.@+-]+$', reg_fname)==None):
+ errors.append('First Name may contain only letters, numbers, spaces and @/./+/-/_ characters.')
+ #return HttpResponse("Only Letters, Numbers, - and _ allowd in First Name")
+ #return render(request, 'register_4m_f4f.html')
+ if (re.search(r'^[\w+\s.@+-]+$', reg_lname) == None):
+ errors.append('Last Name may contain only letters, numbers, spaces and @/./+/-/_ characters.')
+ #return HttpResponse("Only Letters, Numbers, - and _ is allowed in Last name")
+ #return render(request, 'register_4m_f4f.html')
+ if (re.search(r'^[\w+\s.@+-]+$', reg_aff) == None):
+ errors.append('Affiliation may contain only letters, numbers, spaces and @/./+/-/_ characters.')
+ #return HttpResponse("Only Letters, Numbers and _ is allowed in Affiliation")
+ #return render(request, 'register_4m_f4f.html')
+ # XXX validate authority hrn !!
+ if PendingUser.objects.filter(email__iexact=reg_email):
+ errors.append('Email already registered.Please provide a new email address.')
+ #return HttpResponse("Email Already exists")
+ #return render(request, 'register_4m_f4f.html')
+ if 'generate' in request.POST['question']:
+ # Generate public and private keys using SFA Library
+ from sfa.trust.certificate import Keypair
+ k = Keypair(create=True)
+ public_key = k.get_pubkey_string()
+ private_key = k.as_pem()
+
+# DEPRECATED
+# #import os
+# #from M2Crypto import Rand, RSA, BIO
+#
+# KEY_LENGTH = 2048
+#
+# def blank_callback():
+# "Replace the default dashes"
+# return
+#
+# # Random seed
+# Rand.rand_seed (os.urandom (KEY_LENGTH))
+# # Generate key pair
+# key = RSA.gen_key (KEY_LENGTH, 65537, blank_callback)
+# # Create memory buffers
+# pri_mem = BIO.MemoryBuffer()
+# pub_mem = BIO.MemoryBuffer()
+# # Save keys to buffers
+# key.save_key_bio(pri_mem, None)
+# key.save_pub_key_bio(pub_mem)
+# # Get keys
+# public_key = pub_mem.getvalue()
+# private_key = pri_mem.getvalue()
+
+ private_key = ''.join(private_key.split())
+ public_key = "ssh-rsa " + public_key
+ # Saving to DB
+ keypair = '{"user_public_key":"'+ public_key + '", "user_private_key":"'+ private_key + '"}'
+# keypair = re.sub("\r", "", keypair)
+# keypair = re.sub("\n", "\\n", keypair)
+# #keypair = keypair.rstrip('\r\n')
+# keypair = ''.join(keypair.split())
+ else:
+ up_file = request.FILES['user_public_key']
+ file_content = up_file.read()
+ file_name = up_file.name
+ file_extension = os.path.splitext(file_name)[1]
+ allowed_extension = ['.pub','.txt']
+ if file_extension in allowed_extension and re.search(r'ssh-rsa',file_content):
+ keypair = '{"user_public_key":"'+ file_content +'"}'
+ keypair = re.sub("\r", "", keypair)
+ keypair = re.sub("\n", "\\n",keypair)
+ keypair = ''.join(keypair.split())
+ else:
+ errors.append('Please upload a valid RSA public key [.txt or .pub].')
+
+ #b = PendingUser(first_name=reg_fname, last_name=reg_lname, affiliation=reg_aff,
+ # email=reg_email, password=request.POST['password'], keypair=keypair)
+ #b.save()
+ if not errors:
+ b = PendingUser(
+ first_name=reg_fname,
+ last_name=reg_lname,
+ affiliation=reg_aff,
+ authority_hrn=reg_auth,
+ email=reg_email,
+ password=request.POST['password'],
+ keypair=keypair
+ )
+ b.save()
+
+ # Send email
+ ctx = {
+ first_name : reg_fname,
+ last_name : reg_lname,
+ affiliation : reg_aff,
+ authority_hrn: reg_auth,
+ email : reg_email,
+ keypair : keypair,
+ cc_myself : True # form.cleaned_data['cc_myself']
+ }
+
+ recipients = authority_get_pi_emails(authority_hrn)
+ if ctx['cc_myself']:
+ recipients.append(ctx['email'])
+
+ msg = render_to_string('user_request_email.txt', ctx)
+ send_mail("Onelab New User request submitted", msg, email, recipients)
+
+ return render(request, 'user_register_complete.html')
+
+ return render(request, 'register_4m_f4f.html',{
+ 'topmenu_items': topmenu_items('Register', request),
+ 'errors': errors,
+ 'firstname': request.POST.get('firstname', ''),
+ 'lastname': request.POST.get('lastname', ''),
+ 'affiliation': request.POST.get('affiliation', ''),
+ 'authority_hrn': request.POST.get('authority_hrn', ''),
+ 'email': request.POST.get('email', ''),
+ 'password': request.POST.get('password', ''),
+ 'authorities': authorities
+ })