+# DEPRECATED ## view for my_account
+# DEPRECATED # class MyAccountView(TemplateView):
+# DEPRECATED # template_name = "my_account.html"
+# DEPRECATED #
+# DEPRECATED # def from_process(self, request, **cleaned_data):
+# DEPRECATED # #if request.method == 'POST':
+# DEPRECATED # # if request.POST['submit_name']:
+# DEPRECATED # if 'fname' in request.POST:
+# DEPRECATED # messsag= "Got Name"
+# DEPRECATED # #return render(request, 'portal/my_account.html')
+# DEPRECATED # #response = HttpResponse("Here's the text of the Web page.")
+# DEPRECATED # return HttpResponse(message)
+# DEPRECATED #
+# DEPRECATED # def get_context_data(self, **kwargs):
+# DEPRECATED # page = Page(self.request)
+# DEPRECATED # context = super(MyAccountView, self).get_context_data(**kwargs)
+# DEPRECATED # context['person'] = self.request.user
+# DEPRECATED # # XXX This is repeated in all pages
+# DEPRECATED # # more general variables expected in the template
+# DEPRECATED # context['title'] = 'User Profile Page'
+# DEPRECATED # # the menu items on the top
+# DEPRECATED # context['topmenu_items'] = topmenu_items('my_account', self.request)
+# DEPRECATED # # so we can sho who is logged
+# DEPRECATED # context['username'] = the_user(self.request)
+# DEPRECATED # context.update(page.prelude_env())
+# DEPRECATED # return context
+
+
+
+# View for my_account form
+def my_account(request):
+ return render(request, 'my_account.html', {
+ #'form': form,
+ 'topmenu_items': topmenu_items('My Account', request),
+ 'username': the_user (request)
+ })
+
+
+#my_acc form value processing
+def acc_process(request):
+ # getting the user_id from the session [now hardcoded]
+ get_user = PendingUser.objects.get(id='1') # here we will get the id/email from session e.g., person.email
+ if 'submit_name' in request.POST:
+ edited_first_name = request.POST['fname']
+ edited_last_name = request.POST['lname']
+ #email = 'test_email@gmail.com'
+ #password = 'test_pp'
+ #message = 'F_Name: %s L_name: %s dummy_pp: %s' % (first_name, last_name, password)
+ #site = None
+
+ # insert into DB [needed for registration page]
+ #approach borrowed from register view
+ #new_user = PendingUser.objects.create_inactive_user(edited_first_name, edited_last_name, email, password, site)
+ #conventional approach
+ #b = PendingUser(first_name=edited_first_name, last_name=edited_last_name)
+ #b.save()
+
+ # select and update [will be used throughout this view]
+ # select the logged in user [for the moment hard coded]
+ #get_user = PendingUser.objects.get(id='1') # here we will get the id/email from session e.g., person.email
+ # update first and last name
+ get_user.first_name = edited_first_name
+ get_user.last_name = edited_last_name
+ get_user.save()
+
+ return HttpResponse('Success: Name Updated!!')
+ elif 'submit_pass' in request.POST:
+ edited_password = request.POST['password']
+ # select the logged in user [for the moment hard coded]
+ #get_user = PendingUser.objects.get(id='1') # here we will get the id/email from session e.g., person.email
+ # update password
+ get_user.password = edited_password
+ get_user.save()
+ return HttpResponse('Success: Password Changed!!')
+ elif 'generate' in request.POST:
+ #import os
+ #from M2Crypto import Rand, RSA, BIO
+
+ KEY_LENGTH = 2048
+
+ def blank_callback():
+ "Replace the default dashes"
+ return
+
+ # Random seed
+ Rand.rand_seed (os.urandom (KEY_LENGTH))
+ # Generate key pair
+ key = RSA.gen_key (KEY_LENGTH, 65537, blank_callback)
+ # Create memory buffers
+ pri_mem = BIO.MemoryBuffer()
+ pub_mem = BIO.MemoryBuffer()
+ # Save keys to buffers
+ key.save_key_bio(pri_mem, None)
+ key.save_pub_key_bio(pub_mem)
+
+ # Get keys
+ public_key = pub_mem.getvalue()
+ private_key = pri_mem.getvalue()
+ # Saving to DB
+ keypair = '{"user_public_key":"'+ public_key + '", "user_private_key":"'+ private_key + '"}'
+ keypair = re.sub("\r", "", keypair)
+ keypair = re.sub("\n", "\\n", keypair)
+ #keypair = keypair.rstrip('\r\n')
+ keypair = ''.join(keypair.split())
+ get_user.keypair = keypair
+ get_user.save()
+ return HttpResponse('Success: New Keypair Generated! %s' % keypair)
+
+ elif 'upload_key' in request.POST:
+ up_file = request.FILES['pubkey']
+ file_content = up_file.read()
+ file_name = up_file.name
+ file_extension = os.path.splitext(file_name)[1]
+ allowed_extension = ['.pub','.txt']
+ if file_extension in allowed_extension and re.search(r'ssh-rsa',file_content):
+ file_content = '{"user_public_key":"'+ file_content +'"}'
+ file_content = re.sub("\r", "", file_content)
+ file_content = re.sub("\n", "\\n",file_content)
+ file_content = ''.join(file_content.split())
+ get_user.keypair = file_content
+ get_user.save()
+ return HttpResponse('Success: Publickey uploaded! Old records overwritten')
+ else:
+ return HttpResponse('Please upload a valid RSA public key [.txt or .pub].')
+
+ else:
+ message = 'You submitted an empty form.'
+ return HttpResponse(message)
+
+def register_4m_f4f(request):
+ #return render(request, 'register_4m_f4f.html')
+
+#def reg_4m_f4f_process(request):
+ if 'submit' in request.POST:
+ #get_email = PendingUser.objects.get(email)
+ reg_fname = request.POST['firstname']
+ reg_lname = request.POST['lastname']
+ reg_aff = request.POST['affiliation']
+ reg_email = request.POST['email'].lower()
+
+ #POST value validation
+ if (re.search(r'^[\w+\s.@+-]+$', reg_fname)==None):
+ messages.error(request, 'First Name may contain only letters, numbers, spaces and @/./+/-/_ characters.')
+ #return HttpResponse("Only Letters, Numbers, - and _ allowd in First Name")
+ return render(request, 'register_4m_f4f.html')
+ if (re.search(r'^[\w+\s.@+-]+$', reg_lname) == None):
+ messages.error(request, 'Last Name may contain only letters, numbers, spaces and @/./+/-/_ characters.')
+ #return HttpResponse("Only Letters, Numbers, - and _ is allowed in Last name")
+ return render(request, 'register_4m_f4f.html')
+ if (re.search(r'^[\w+\s.@+-]+$', reg_aff) == None):
+ messages.error(request, 'Affiliation may contain only letters, numbers, spaces and @/./+/-/_ characters.')
+ #return HttpResponse("Only Letters, Numbers and _ is allowed in Affiliation")
+ return render(request, 'register_4m_f4f.html')
+ if PendingUser.objects.filter(email__iexact=reg_email):
+ messages.error(request, 'Email already registered.Please provide a new email address.')
+ #return HttpResponse("Email Already exists")
+ return render(request, 'register_4m_f4f.html')
+ if 'generate' in request.POST['question']:
+ #import os
+ #from M2Crypto import Rand, RSA, BIO
+
+ KEY_LENGTH = 2048
+
+ def blank_callback():
+ "Replace the default dashes"
+ return
+
+ # Random seed
+ Rand.rand_seed (os.urandom (KEY_LENGTH))
+ # Generate key pair
+ key = RSA.gen_key (KEY_LENGTH, 65537, blank_callback)
+ # Create memory buffers
+ pri_mem = BIO.MemoryBuffer()
+ pub_mem = BIO.MemoryBuffer()
+ # Save keys to buffers
+ key.save_key_bio(pri_mem, None)
+ key.save_pub_key_bio(pub_mem)
+ # Get keys
+ public_key = pub_mem.getvalue()
+ private_key = pri_mem.getvalue()
+ # Saving to DB
+ keypair = '{"user_public_key":"'+ public_key + '", "user_private_key":"'+ private_key + '"}'
+ keypair = re.sub("\r", "", keypair)
+ keypair = re.sub("\n", "\\n", keypair)
+ #keypair = keypair.rstrip('\r\n')
+ keypair = ''.join(keypair.split())
+ #return HttpResponse(keypair)
+ else:
+ up_file = request.FILES['user_public_key']
+ file_content = up_file.read()
+ file_name = up_file.name
+ file_extension = os.path.splitext(file_name)[1]
+ allowed_extension = ['.pub','.txt']
+ if file_extension in allowed_extension and re.search(r'ssh-rsa',file_content):
+ keypair = '{"user_public_key":"'+ file_content +'"}'
+ keypair = re.sub("\r", "", keypair)
+ keypair = re.sub("\n", "\\n",keypair)
+ keypair = ''.join(keypair.split())
+ else:
+ return HttpResponse('Please upload a valid RSA public key [.txt or .pub].')
+
+ b = PendingUser(first_name=reg_fname, last_name=reg_lname, affiliation=reg_aff,
+ email=reg_email, password=request.POST['password'], keypair=keypair)
+ b.save()
+
+ return render(request, 'user_register_complete.html')
+ return render(request, 'register_4m_f4f.html')
+
+