X-Git-Url: http://git.onelab.eu/?a=blobdiff_plain;f=portal%2Faccountview.py;h=cea49ee11107ea6aefe1282b12fad092917f83f1;hb=refs%2Fheads%2Ff4f-review;hp=429b2d88bc7c1da737eda489b6d0e4d01b5ef34c;hpb=0bf98d7dbb4eeb8314ba315db529a83247bcc6ec;p=myslice.git
diff --git a/portal/accountview.py b/portal/accountview.py
index 429b2d88..cea49ee1 100644
--- a/portal/accountview.py
+++ b/portal/accountview.py
@@ -1,35 +1,61 @@
from unfold.loginrequired import LoginRequiredAutoLogoutView
#
+#
from manifold.core.query import Query
-from manifold.manifoldapi import execute_query
-from portal.actions import manifold_update_user, manifold_update_account
+from manifoldapi.manifoldapi import execute_query
+from portal.actions import manifold_update_user, manifold_update_account, manifold_add_account, manifold_delete_account, sfa_update_user, sfa_get_user, clear_user_creds, get_myslice_account, get_myslice_platform, get_registry_url, get_jfed_identity
#
-from ui.topmenu import topmenu_items, the_user
+from unfold.page import Page
+from ui.topmenu import topmenu_items_live, the_user
#
from django.http import HttpResponse, HttpResponseRedirect
from django.contrib import messages
from django.contrib.auth.decorators import login_required
-from django.core.mail import send_mail
+from myslice.configengine import ConfigEngine
+from myslice.theme import ThemeView
+
+from portal.account import Account, get_expiration
#
-import json, os, re, itertools
+import json, os, re, itertools, time
+from OpenSSL import crypto
+from Crypto.PublicKey import RSA
# requires login
-class AccountView(LoginRequiredAutoLogoutView):
+class AccountView(LoginRequiredAutoLogoutView, ThemeView):
template_name = "account-view.html"
-
def dispatch(self, *args, **kwargs):
return super(AccountView, self).dispatch(*args, **kwargs)
def get_context_data(self, **kwargs):
+ self.template_name = self.template
+ page = Page(self.request)
+ metadata = page.get_metadata()
+ page.expose_js_metadata()
- user_query = Query().get('local:user').select('config','email')
+ page.add_js_files ( [ "js/jquery.validate.js", "js/my_account.register.js", "js/my_account.edit_profile.js","js/jquery-ui.js" ] )
+ page.add_css_files ( [ "css/onelab.css", "css/account_view.css","css/plugin.css" ] )
+
+ # Execute a Query to delegate credentials if necessary
+ #sfa_user_query = Query().get('myslice:user').select('user_hrn').filter_by('user_hrn','==','$user_hrn')
+ #sfa_user_result = execute_query(self.request, sfa_user_query)
+
+ user_query = Query().get('local:user').select('config','email','status')
user_details = execute_query(self.request, user_query)
# not always found in user_details...
config={}
for user_detail in user_details:
+ # different significations of user_status
+ if user_detail['status'] == 0:
+ user_status = 'Disabled'
+ elif user_detail['status'] == 1:
+ user_status = 'Validation Pending'
+ elif user_detail['status'] == 2:
+ user_status = 'Enabled'
+ else:
+ user_status = 'N/A'
#email = user_detail['email']
if user_detail['config']:
config = json.loads(user_detail['config'])
@@ -39,12 +65,19 @@ class AccountView(LoginRequiredAutoLogoutView):
platform_details = execute_query(self.request, platform_query)
account_details = execute_query(self.request, account_query)
- # initial assignment needed for users having no account
+ # initial assignment needed for users having account.config = {}
platform_name = ''
account_type = ''
account_usr_hrn = ''
account_pub_key = ''
+ account_priv_key = ''
account_reference = ''
+ my_users = ''
+ my_slices = ''
+ my_auths = ''
+ ref_acc_list = ''
+ principal_acc_list = ''
+ user_status_list = []
platform_name_list = []
platform_name_secondary_list = []
platform_access_list = []
@@ -54,7 +87,7 @@ class AccountView(LoginRequiredAutoLogoutView):
account_type_secondary_list = []
account_reference_list = []
delegation_type_list = []
- exp_user_cred_list = []
+ user_cred_exp_list = []
slice_list = []
auth_list = []
slice_cred_exp_list = []
@@ -63,51 +96,59 @@ class AccountView(LoginRequiredAutoLogoutView):
pub_key_list = []
for platform_detail in platform_details:
- if 'sfa' in platform_detail['gateway_type'] and platform_detail['disabled']==0:
+ if 'sfa' in platform_detail['gateway_type']:
total_platform = platform_detail['platform']
total_platform_list.append(total_platform)
for account_detail in account_details:
if platform_detail['platform_id'] == account_detail['platform_id']:
platform_name = platform_detail['platform']
- account_config = json.loads(account_detail['config'])
- account_usr_hrn = account_config.get('user_hrn','N/A')
- account_pub_key = account_config.get('user_public_key','N/A')
- account_reference = account_config.get ('reference_platform','N/A')
- # credentials
- acc_slice_cred = account_config.get('delegated_slice_credentials','N/A')
- acc_auth_cred = account_config.get('delegated_authority_credentials','N/A')
+ if 'config' in account_detail and account_detail['config'] is not '':
+ account_config = json.loads(account_detail['config'])
+ account_usr_hrn = account_config.get('user_hrn','N/A')
+ account_pub_key = account_config.get('user_public_key','N/A')
+ account_reference = account_config.get ('reference_platform','N/A')
+ # credentials of myslice platform
+ if 'myslice' in platform_detail['platform']:
+ acc_user_cred = account_config.get('delegated_user_credential','N/A')
+ acc_slice_cred = account_config.get('delegated_slice_credentials','N/A')
+ acc_auth_cred = account_config.get('delegated_authority_credentials','N/A')
- if 'N/A' not in acc_slice_cred:
- for key, value in acc_slice_cred.iteritems():
- slice_list.append(key)
- # get cred_exp date
- exp_date = re.search('(.*)', value)
+ if 'N/A' not in acc_user_cred:
+ exp_date = re.search('(.*)', acc_user_cred)
if exp_date:
- exp_date = exp_date.group(1)
- slice_cred_exp_list.append(exp_date)
+ user_exp_date = exp_date.group(1)
+ user_cred_exp_list.append(user_exp_date)
- my_slices = [{'slice_name': t[0], 'cred_exp': t[1]}
- for t in zip(slice_list, slice_cred_exp_list)]
+ my_users = [{'cred_exp': t[0]}
+ for t in zip(user_cred_exp_list)]
+
- if 'N/A' not in acc_auth_cred:
- for key, value in acc_auth_cred.iteritems():
- auth_list.append(key)
- #get cred_exp date
- exp_date = re.search('(.*)', value)
- if exp_date:
- exp_date = exp_date.group(1)
- auth_cred_exp_list.append(exp_date)
+ if 'N/A' not in acc_slice_cred:
+ for key, value in acc_slice_cred.iteritems():
+ slice_list.append(key)
+ # get cred_exp date
+ exp_date = re.search('(.*)', value)
+ if exp_date:
+ exp_date = exp_date.group(1)
+ slice_cred_exp_list.append(exp_date)
+
+ my_slices = [{'slice_name': t[0], 'cred_exp': t[1]}
+ for t in zip(slice_list, slice_cred_exp_list)]
+
+ if 'N/A' not in acc_auth_cred:
+ for key, value in acc_auth_cred.iteritems():
+ auth_list.append(key)
+ #get cred_exp date
+ exp_date = re.search('(.*)', value)
+ if exp_date:
+ exp_date = exp_date.group(1)
+ auth_cred_exp_list.append(exp_date)
- my_auths = [{'auth_name': t[0], 'cred_exp': t[1]}
- for t in zip(auth_list, auth_cred_exp_list)]
+ my_auths = [{'auth_name': t[0], 'cred_exp': t[1]}
+ for t in zip(auth_list, auth_cred_exp_list)]
- account_user_credential = account_config.get('delegated_user_credential','N/A')
- # Expiration date
- result = re.search('(.*)', account_user_credential)
- if result:
- exp_user_cred = result.group(1)
# for reference accounts
if 'reference' in account_detail['auth_type']:
account_type = 'Reference'
@@ -115,7 +156,7 @@ class AccountView(LoginRequiredAutoLogoutView):
platform_name_secondary_list.append(platform_name)
account_type_secondary_list.append(account_type)
account_reference_list.append(account_reference)
- secondary_list = [{'platform_name': t[0], 'account_type': t[1], 'account_reference': t[2]}
+ ref_acc_list = [{'platform_name': t[0], 'account_type': t[1], 'account_reference': t[2]}
for t in zip(platform_name_secondary_list, account_type_secondary_list, account_reference_list)]
elif 'managed' in account_detail['auth_type']:
@@ -129,12 +170,12 @@ class AccountView(LoginRequiredAutoLogoutView):
platform_name_list.append(platform_name)
account_type_list.append(account_type)
delegation_type_list.append(delegation)
- exp_user_cred_list.append(exp_user_cred)
usr_hrn_list.append(account_usr_hrn)
pub_key_list.append(account_pub_key)
+ user_status_list.append(user_status)
# combining 5 lists into 1 [to render in the template]
- lst = [{'platform_name': t[0], 'account_type': t[1], 'delegation_type': t[2], 'credential_expiration':t[3], 'usr_hrn':t[4], 'usr_pubkey':t[5]}
- for t in zip(platform_name_list, account_type_list, delegation_type_list, exp_user_cred_list, usr_hrn_list, pub_key_list)]
+ principal_acc_list = [{'platform_name': t[0], 'account_type': t[1], 'delegation_type': t[2], 'usr_hrn':t[3], 'usr_pubkey':t[4], 'user_status':t[5],}
+ for t in zip(platform_name_list, account_type_list, delegation_type_list, usr_hrn_list, pub_key_list, user_status_list)]
# to hide private key row if it doesn't exist
if 'myslice' in platform_detail['platform']:
account_config = json.loads(account_detail['config'])
@@ -151,12 +192,44 @@ class AccountView(LoginRequiredAutoLogoutView):
for t in itertools.izip_longest(total_platform_list)]
+ ## check user is pi or not
+ # platform_query = Query().get('local:platform').select('platform_id','platform','gateway_type','disabled')
+ # account_query = Query().get('local:account').select('user_id','platform_id','auth_type','config')
+ # platform_details = execute_query(self.request, platform_query)
+ # account_details = execute_query(self.request, account_query)
+ # for platform_detail in platform_details:
+ # for account_detail in account_details:
+ # if platform_detail['platform_id'] == account_detail['platform_id']:
+ # if 'config' in account_detail and account_detail['config'] is not '':
+ # account_config = json.loads(account_detail['config'])
+ # if 'myslice' in platform_detail['platform']:
+ # acc_auth_cred = account_config.get('delegated_authority_credentials','N/A')
+ # assigning values
+ if acc_auth_cred == {} or acc_auth_cred == 'N/A':
+ pi = "is_not_pi"
+ else:
+ pi = "is_pi"
+
+ # check if the user has creds or not
+ if acc_user_cred == {} or acc_user_cred == 'N/A':
+ user_cred = 'no_creds'
+ else:
+ exp_date = get_expiration(acc_user_cred, 'timestamp')
+ if exp_date < time.time():
+ user_cred = 'creds_expired'
+ else:
+ user_cred = 'has_creds'
+
context = super(AccountView, self).get_context_data(**kwargs)
- context['data'] = lst
- context['ref_acc'] = secondary_list
+ context['principal_acc'] = principal_acc_list
+ context['ref_acc'] = ref_acc_list
context['platform_list'] = platform_list
+ context['my_users'] = my_users
+ context['pi'] = pi
+ context['user_cred'] = user_cred
context['my_slices'] = my_slices
context['my_auths'] = my_auths
+ context['user_status'] = user_status
context['person'] = self.request.user
context['firstname'] = config.get('firstname',"?")
context['lastname'] = config.get('lastname',"?")
@@ -168,18 +241,22 @@ class AccountView(LoginRequiredAutoLogoutView):
# more general variables expected in the template
context['title'] = 'Platforms connected to MySlice'
# the menu items on the top
- context['topmenu_items'] = topmenu_items('My Account', self.request)
+ context['topmenu_items'] = topmenu_items_live('My Account', page)
# so we can sho who is logged
context['username'] = the_user(self.request)
+ context['theme'] = self.theme
+ context['section'] = "User account"
# context ['firstname'] = config['firstname']
- #context.update(page.prelude_env())
+ prelude_env = page.prelude_env()
+ context.update(prelude_env)
return context
-
@login_required
-#my_acc form value processing
def account_process(request):
- user_query = Query().get('local:user').select('password','config')
+ from sfa.trust.credential import Credential
+ from sfa.trust.certificate import Keypair
+
+ user_query = Query().get('local:user').select('user_id','email','password','config')
user_details = execute_query(request, user_query)
account_query = Query().get('local:account').select('user_id','platform_id','auth_type','config')
@@ -187,18 +264,86 @@ def account_process(request):
platform_query = Query().get('local:platform').select('platform_id','platform')
platform_details = execute_query(request, platform_query)
+
+ # getting the user_id from the session
+ for user_detail in user_details:
+ user_id = user_detail['user_id']
+ user_email = user_detail['email']
+ try:
+ if user_email == request.user.email:
+ authorize_query = True
+ else:
+ print "SECURITY: %s tried to update %s" % (user_email, request.user.email)
+ messages.error(request, 'You are not authorized to modify another user.')
+ return HttpResponseRedirect("/portal/account/")
+ except Exception,e:
+ print "Exception = %s" % e
- # for account_detail in account_details:
- # if account_detail['platform_id'] == 5:
- # account_config = json.loads(account_detail['config'])
+ for account_detail in account_details:
+ for platform_detail in platform_details:
+ # Add reference account to the platforms
+ if 'add_'+platform_detail['platform'] in request.POST or request.POST['button_value'] == 'add_'+platform_detail['platform']:
+ platform_id = platform_detail['platform_id']
+ user_params = {'platform_id': platform_id, 'user_id': user_id, 'auth_type': "reference", 'config': '{"reference_platform": "myslice"}'}
+ manifold_add_account(request,user_params)
+ messages.info(request, 'Reference Account is added to the selected platform successfully!')
+ return HttpResponseRedirect("/portal/account/")
+
+ # Delete reference account from the platforms
+ if 'delete_'+platform_detail['platform'] in request.POST or request.POST['button_value'] == 'delete_'+platform_detail['platform']:
+ platform_id = platform_detail['platform_id']
+ user_params = {'user_id':user_id}
+ manifold_delete_account(request,platform_id, user_id, user_params)
+ messages.info(request, 'Reference Account is removed from the selected platform')
+ return HttpResponseRedirect("/portal/account/")
+ if platform_detail['platform_id'] == account_detail['platform_id']:
+ if 'myslice' in platform_detail['platform']:
+ account_config = json.loads(account_detail['config'])
+ acc_slice_cred = account_config.get('delegated_slice_credentials','N/A')
+ acc_auth_cred = account_config.get('delegated_authority_credentials','N/A')
+
+
+
+
+ # adding the slices and corresponding credentials to list
+ if 'N/A' not in acc_slice_cred:
+ slice_list = []
+ slice_cred = []
+ for key, value in acc_slice_cred.iteritems():
+ slice_list.append(key)
+ slice_cred.append(value)
+ # special case: download each slice credentials separately
+ for i in range(0, len(slice_list)):
+ if 'dl_'+slice_list[i] in request.POST or request.POST['button_value'] == 'dl_'+slice_list[i]:
+ slice_detail = "Slice name: " + slice_list[i] +"\nSlice Credentials: \n"+ slice_cred[i]
+ response = HttpResponse(slice_detail, content_type='text/plain')
+ response['Content-Disposition'] = 'attachment; filename="slice_credential.txt"'
+ return response
+
+ # adding the authority and corresponding credentials to list
+ if 'N/A' not in acc_auth_cred:
+ auth_list = []
+ auth_cred = []
+ for key, value in acc_auth_cred.iteritems():
+ auth_list.append(key)
+ auth_cred.append(value)
+ # special case: download each slice credentials separately
+ for i in range(0, len(auth_list)):
+ if 'dl_'+auth_list[i] in request.POST or request.POST['button_value'] == 'dl_'+auth_list[i]:
+ auth_detail = "Authority: " + auth_list[i] +"\nAuthority Credentials: \n"+ auth_cred[i]
+ response = HttpResponse(auth_detail, content_type='text/plain')
+ response['Content-Disposition'] = 'attachment; filename="auth_credential.txt"'
+ return response
+
+ account_detail = get_myslice_account(request)
+
if 'submit_name' in request.POST:
edited_first_name = request.POST['fname']
edited_last_name = request.POST['lname']
config={}
for user_config in user_details:
- #email = user_detail['email']
if user_config['config']:
config = json.loads(user_config['config'])
config['firstname'] = edited_first_name
@@ -210,10 +355,8 @@ def account_process(request):
user_config['config']= '{"firstname":"' + edited_first_name + '", "lastname":"'+ edited_last_name + '", "authority": "Unknown Authority"}'
user_params = {'config': user_config['config']}
# updating config local:user in manifold
- #user_params = { 'config': updated_config}
- manifold_update_user(request,user_params)
+ manifold_update_user(request, request.user.email,user_params)
# this will be depricated, we will show the success msg in same page
-# return HttpResponse('Sucess: First Name and Last Name Updated!')
# Redirect to same page with success message
messages.success(request, 'Sucess: First Name and Last Name Updated.')
return HttpResponseRedirect("/portal/account/")
@@ -225,195 +368,270 @@ def account_process(request):
user_pass['password'] = edited_password
#updating password in local:user
user_params = { 'password': user_pass['password']}
- manifold_update_user(request,user_params)
+ manifold_update_user(request,request.user.email,user_params)
# return HttpResponse('Success: Password Changed!!')
messages.success(request, 'Sucess: Password Updated.')
return HttpResponseRedirect("/portal/account/")
# XXX TODO: Factorize with portal/registrationview.py
+# XXX TODO: Factorize with portal/registrationview.py
+# XXX TODO: Factorize with portal/joinview.py
elif 'generate' in request.POST:
- for account_detail in account_details:
- for platform_detail in platform_details:
- if platform_detail['platform_id'] == account_detail['platform_id']:
- if 'myslice' in platform_detail['platform']:
- from Crypto.PublicKey import RSA
- private = RSA.generate(1024)
- private_key = json.dumps(private.exportKey())
- public = private.publickey()
- public_key = json.dumps(public.exportKey(format='OpenSSH'))
- # Generate public and private keys using SFA Library
-# from sfa.trust.certificate import Keypair
-# k = Keypair(create=True)
-# public_key = k.get_pubkey_string()
-# private_key = k.as_pem()
-# private_key = ''.join(private_key.split())
-# public_key = "ssh-rsa " + public_key
- # now we overwrite the config field with keypair
- # once there will be user_hrn, we need to keep user_hrn and change only the keypair
- # see submit_name section for implementing this
-# keypair = re.sub("\r", "", keypair)
-# keypair = re.sub("\n", "\\n", keypair)
-# #keypair = keypair.rstrip('\r\n')
-# keypair = ''.join(keypair.split())
- # updating maniolf local:account table
- account_config = json.loads(account_detail['config'])
- # preserving user_hrn
- user_hrn = account_config.get('user_hrn','N/A')
- keypair = '{"user_public_key":'+ public_key + ', "user_private_key":'+ private_key + ', "user_hrn":"'+ user_hrn + '"}'
- updated_config = json.dumps(account_config)
-
- user_params = { 'config': keypair, 'auth_type':'managed'}
- manifold_update_account(request,user_params)
- messages.success(request, 'Sucess: New Keypair Generated!')
- return HttpResponseRedirect("/portal/account/")
- else:
+ try:
+ private = RSA.generate(1024)
+ private_key = json.dumps(private.exportKey())
+ public = private.publickey()
+ public_key = json.dumps(public.exportKey(format='OpenSSH'))
+ # updating manifold local:account table
+ account_config = json.loads(account_detail['config'])
+ # preserving user_hrn
+ user_hrn = account_config.get('user_hrn','N/A')
+ keypair = '{"user_public_key":'+ public_key + ', "user_private_key":'+ private_key + ', "user_hrn":"'+ user_hrn + '"}'
+ #updated_config = json.dumps(account_config)
+ # updating manifold
+ #user_params = { 'config': keypair, 'auth_type':'managed'}
+ #manifold_update_account(request, user_id, user_params)
+ # updating sfa
+ public_key = public_key.replace('"', '');
+ user_pub_key = {'keys': public_key}
+
+ sfa_update_user(request, user_hrn, user_pub_key)
+ result_sfa_user = sfa_get_user(request, user_hrn, public_key)
+ try:
+ if 'keys' in result_sfa_user and result_sfa_user['keys'][0] == public_key:
+ # updating manifold
+ updated_config = json.dumps(account_config)
+ user_params = { 'config': keypair, 'auth_type':'managed'}
+ manifold_update_account(request, user_id, user_params)
+ messages.success(request, 'Sucess: New Keypair Generated! Delegation of your credentials will be automatic.')
+ else:
+ raise Exception,"Keys are not matching"
+ except Exception as e:
+ messages.error(request, 'Error: An error occured during the update of your public key at the Registry, or your public key is not matching the one stored.')
+ logger.error("Exception in accountview {}".format(e))
+ return HttpResponseRedirect("/portal/account/")
+ except Exception as e:
messages.error(request, 'Account error: You need an account in myslice platform to perform this action')
return HttpResponseRedirect("/portal/account/")
elif 'upload_key' in request.POST:
- for account_detail in account_details:
- for platform_detail in platform_details:
- if platform_detail['platform_id'] == account_detail['platform_id']:
- if 'myslice' in platform_detail['platform']:
- up_file = request.FILES['pubkey']
- file_content = up_file.read()
- file_name = up_file.name
- file_extension = os.path.splitext(file_name)[1]
- allowed_extension = ['.pub','.txt']
- if file_extension in allowed_extension and re.search(r'ssh-rsa',file_content):
- account_config = json.loads(account_detail['config'])
- # preserving user_hrn
- user_hrn = account_config.get('user_hrn','N/A')
- file_content = '{"user_public_key":"'+ file_content + '", "user_hrn":"'+ user_hrn +'"}'
- #file_content = re.sub("\r", "", file_content)
- #file_content = re.sub("\n", "\\n",file_content)
- file_content = ''.join(file_content.split())
- #update manifold local:account table
- user_params = { 'config': file_content, 'auth_type':'user'}
- manifold_update_account(request,user_params)
- messages.success(request, 'Publickey uploaded! Please delegate your credentials using SFA: http://trac.myslice.info/wiki/DelegatingCredentials')
- return HttpResponseRedirect("/portal/account/")
- else:
- messages.error(request, 'RSA key error: Please upload a valid RSA public key [.txt or .pub].')
- return HttpResponseRedirect("/portal/account/")
- else:
+ try:
+ up_file = request.FILES['pubkey']
+ file_content = up_file.read()
+ file_name = up_file.name
+ file_extension = os.path.splitext(file_name)[1]
+ allowed_extension = ['.pub','.txt']
+ if file_extension in allowed_extension and re.search(r'ssh-rsa',file_content):
+ account_config = json.loads(account_detail['config'])
+ # preserving user_hrn
+ user_hrn = account_config.get('user_hrn','N/A')
+ file_content = '{"user_public_key":"'+ file_content + '", "user_hrn":"'+ user_hrn +'"}'
+ #file_content = re.sub("\r", "", file_content)
+ #file_content = re.sub("\n", "\\n",file_content)
+ file_content = ''.join(file_content.split())
+ #update manifold local:account table
+ user_params = { 'config': file_content, 'auth_type':'user'}
+ manifold_update_account(request, user_id, user_params)
+ # updating sfa
+ user_pub_key = {'keys': file_content}
+ sfa_update_user(request, user_hrn, user_pub_key)
+ messages.success(request, 'Publickey uploaded! Please delegate your credentials using SFA: http://trac.myslice.info/wiki/DelegatingCredentials')
+ return HttpResponseRedirect("/portal/account/")
+ else:
+ messages.error(request, 'RSA key error: Please upload a valid RSA public key [.txt or .pub].')
+ return HttpResponseRedirect("/portal/account/")
+
+ except Exception as e:
messages.error(request, 'Account error: You need an account in myslice platform to perform this action')
return HttpResponseRedirect("/portal/account/")
- elif 'dl_pubkey' in request.POST:
- for account_detail in account_details:
- for platform_detail in platform_details:
- if platform_detail['platform_id'] == account_detail['platform_id']:
- if 'myslice' in platform_detail['platform']:
- account_config = json.loads(account_detail['config'])
- public_key = account_config['user_public_key']
- response = HttpResponse(public_key, content_type='text/plain')
- response['Content-Disposition'] = 'attachment; filename="pubkey.txt"'
- return response
- break
- else:
+ elif 'dl_pubkey' in request.POST or request.POST['button_value'] == 'dl_pubkey':
+ try:
+ account_config = json.loads(account_detail['config'])
+ public_key = account_config['user_public_key']
+ response = HttpResponse(public_key, content_type='text/plain')
+ response['Content-Disposition'] = 'attachment; filename="pubkey.txt"'
+ return response
+ except Exception as e:
messages.error(request, 'Account error: You need an account in myslice platform to perform this action')
return HttpResponseRedirect("/portal/account/")
- elif 'dl_pkey' in request.POST:
- for account_detail in account_details:
- for platform_detail in platform_details:
- if platform_detail['platform_id'] == account_detail['platform_id']:
- if 'myslice' in platform_detail['platform']:
- account_config = json.loads(account_detail['config'])
- if 'user_private_key' in account_config:
- private_key = account_config['user_private_key']
- response = HttpResponse(private_key, content_type='text/plain')
- response['Content-Disposition'] = 'attachment; filename="privkey.txt"'
- return response
- else:
- messages.error(request, 'Download error: Private key is not stored in the server')
- return HttpResponseRedirect("/portal/account/")
+ elif 'dl_pkey' in request.POST or request.POST['button_value'] == 'dl_pkey':
+ try:
+ account_config = json.loads(account_detail['config'])
+ if 'user_private_key' in account_config:
+ private_key = account_config['user_private_key']
+ response = HttpResponse(private_key, content_type='text/plain')
+ response['Content-Disposition'] = 'attachment; filename="privkey.txt"'
+ return response
+ else:
+ messages.error(request, 'Download error: Private key is not stored in the server')
+ return HttpResponseRedirect("/portal/account/")
- else:
+ except Exception as e:
messages.error(request, 'Account error: You need an account in myslice platform to perform this action')
return HttpResponseRedirect("/portal/account/")
- elif 'delete' in request.POST:
- for account_detail in account_details:
- for platform_detail in platform_details:
- if platform_detail['platform_id'] == account_detail['platform_id']:
- if 'myslice' in platform_detail['platform']:
- account_config = json.loads(account_detail['config'])
- if 'user_private_key' in account_config:
- for key in account_config.keys():
- if key== 'user_private_key':
- del account_config[key]
-
- updated_config = json.dumps(account_config)
- user_params = { 'config': updated_config, 'auth_type':'user'}
- manifold_update_account(request,user_params)
- messages.success(request, 'Private Key deleted. You need to delegate credentials manually once it expires.')
- return HttpResponseRedirect("/portal/account/")
- else:
- messages.error(request, 'Delete error: Private key is not stored in the server')
- return HttpResponseRedirect("/portal/account/")
+ elif 'delete' in request.POST or request.POST['button_value'] == 'delete':
+ try:
+ account_config = json.loads(account_detail['config'])
+ if 'user_private_key' in account_config:
+ for key in account_config.keys():
+ if key == 'user_private_key':
+ del account_config[key]
+
+ updated_config = json.dumps(account_config)
+ user_params = { 'config': updated_config, 'auth_type':'user'}
+ manifold_update_account(request, user_id, user_params)
+ messages.success(request, 'Private Key deleted. You need to delegate credentials manually once it expires.')
+ messages.success(request, 'Once your credentials expire, Please delegate manually using SFA: http://trac.myslice.info/wiki/DelegatingCredentials')
+ return HttpResponseRedirect("/portal/account/")
+ else:
+ messages.error(request, 'Delete error: Private key is not stored in the server')
+ return HttpResponseRedirect("/portal/account/")
- else:
+ except Exception as e:
messages.error(request, 'Account error: You need an account in myslice platform to perform this action')
return HttpResponseRedirect("/portal/account/")
-
- elif 'fuseco' in request.POST:
- # The recipients are the PI of the authority
- #recipients = authority_get_pi_emails(request, authority_hrn)
- recipients = ["support@myslice.info"]
- requester = request.user # current user
- sender = 'yasin.upmc@gmail.com' # the server email
- msg = "OneLab user %s requested account in fuseco Platform" % requester
- send_mail("Onelab user %s requested an account in Fuseco"%requester , msg, sender, recipients)
- messages.info(request, 'Request to get access on Fuseco platform received. Please wait for PI\'s reply.')
- return HttpResponseRedirect("/portal/account/")
+
+ # download identity for jfed
+ elif 'dl_identity' in request.POST or request.POST['button_value'] == 'dl_identity':
+ try:
+ jfed_identity = get_jfed_identity(request)
+ if jfed_identity is not None:
+ response = HttpResponse(jfed_identity, content_type='text/plain')
+ response['Content-Disposition'] = 'attachment; filename="jfed_identity.txt"'
+ return response
+ else:
+ messages.error(request, 'Download error: Private key is not stored in the server')
+ return HttpResponseRedirect("/portal/account/")
- elif 'ple' in request.POST:
- # The recipients are the PI of the authority
- #recipients = authority_get_pi_emails(request, authority_hrn)
- recipients = ["support@myslice.info"]
- requester = request.user # current user
- sender = 'yasin.upmc@gmail.com' # the server email
- msg = "OneLab user %s requested account in fuseco Platform" % requester
- send_mail("Onelab user %s requested an account in PLE"%requester , msg, sender, recipients)
- messages.info(request, 'Request to get access on PLE platform received. Please wait for PI\'s reply.')
- return HttpResponseRedirect("/portal/account/")
+ except Exception as e:
+ messages.error(request, 'Account error: You need an account in myslice platform to perform this action')
+ return HttpResponseRedirect("/portal/account/")
- elif 'omf' in request.POST:
- # The recipients are the PI of the authority
- #recipients = authority_get_pi_emails(request, authority_hrn)
- recipients = ["support@myslice.info"]
- requester = request.user # current user
- sender = 'yasin.upmc@gmail.com' # the server email
- msg = "OneLab user %s requested account in omf:nitos Platform" % requester
- send_mail("Onelab user %s requested an account in OMF:NITOS"%requester , msg, sender, recipients)
- messages.info(request, 'Request to get access on OMF:NITOS platform received. Please wait for PI\'s reply.')
- return HttpResponseRedirect("/portal/account/")
+ # Download sfi_config
+ elif 'dl_sfi_config' in request.POST or request.POST['button_value'] == 'dl_sfi_config':
+ platform_detail = get_myslice_platform(request)
+ platform_config = json.loads(platform_detail['config'])
+ account_detail = get_myslice_account(request)
+ account_config = json.loads(account_detail['config'])
- elif 'wilab' in request.POST:
- # The recipients are the PI of the authority
- #recipients = authority_get_pi_emails(request, authority_hrn)
- recipients = ["support@myslice.info"]
- requester = request.user # current user
- sender = 'yasin.upmc@gmail.com' # the server email
- msg = "OneLab user %s requested account in Wilab Platform" % requester
- send_mail("Onelab user %s requested an account in Wilab"%requester , msg, sender, recipients)
- messages.info(request, 'Request to get access on Wilab platform received. Please wait for PI\'s reply.')
- return HttpResponseRedirect("/portal/account/")
+ user_hrn = account_config.get('user_hrn','N/A')
+ t_user_hrn = user_hrn.split('.')
+ authority_hrn = t_user_hrn[0] + '.' + t_user_hrn[1]
+ registry = get_registry_url(request)
+ import socket
+ hostname = socket.gethostbyaddr(socket.gethostname())[0]
+ admin_user = platform_config.get('user','N/A')
+ manifold_host = ConfigEngine().manifold_url()
+ if 'localhost' in manifold_host:
+ manifold_host = manifold_host.replace('localhost',hostname)
+ sfi_config = '[sfi]\n'
+ sfi_config += 'auth = '+ authority_hrn +'\n'
+ sfi_config += 'user = '+ user_hrn +'\n'
+ sfi_config += 'registry = '+ registry +'\n'
+ sfi_config += 'sm = http://sfa3.planet-lab.eu:12346/\n\n'
+ sfi_config += '[myslice]\n'
+ sfi_config += 'backend = '+ manifold_host +'\n'
+ sfi_config += 'delegate = '+ admin_user +'\n'
+ sfi_config += 'platform = myslice\n'
+ sfi_config += 'username = '+ user_email +'\n'
+ response = HttpResponse(sfi_config, content_type='text/plain')
+ response['Content-Disposition'] = 'attachment; filename="sfi_config"'
+ return response
- elif 'iotlab' in request.POST:
- # The recipients are the PI of the authority
- #recipients = authority_get_pi_emails(request, authority_hrn)
- recipients = ["support@myslice.info"]
- requester = request.user # current user
- sender = 'yasin.upmc@gmail.com' # the server email
- msg = "OneLab user %s requested account in IOTLab Platform" % requester
- send_mail("Onelab user %s requested an account in IOTLab"%requester , msg, sender, recipients)
- messages.info(request, 'Request to get access on IOTLab platform received. Please wait for PI\'s reply.')
+ #clear all creds
+ elif 'clear_cred' in request.POST or request.POST['button_value'] == 'clear_cred':
+ try:
+ result = clear_user_creds(request, user_email)
+ if result is not None:
+ messages.success(request, 'All Credentials cleared')
+ else:
+ messages.error(request, 'Delete error: Credentials are not stored in the server')
+ except Exception,e:
+ print "Exception in accountview.py in clear_user_creds %s" % e
+ messages.error(request, 'Account error: You need an account in myslice platform to perform this action')
return HttpResponseRedirect("/portal/account/")
-
+
+ # Download delegated_user_cred
+ elif 'dl_user_cred' in request.POST or request.POST['button_value'] == 'dl_user_cred':
+ if 'delegated_user_credential' in account_config:
+ user_cred = account_config['delegated_user_credential']
+ response = HttpResponse(user_cred, content_type='text/plain')
+ response['Content-Disposition'] = 'attachment; filename="user_cred.txt"'
+ return response
+ else:
+ messages.error(request, 'Download error: User credential is not stored in the server')
+ return HttpResponseRedirect("/portal/account/")
+
+ # Download user_cert
+ elif 'dl_user_cert' in request.POST or request.POST['button_value'] == 'dl_user_cert':
+ if 'user_credential' in account_config:
+ user_cred = account_config['user_credential']
+ obj_cred = Credential(string=user_cred)
+ obj_gid = obj_cred.get_gid_object()
+ str_cert = obj_gid.save_to_string()
+ response = HttpResponse(str_cert, content_type='text/plain')
+ response['Content-Disposition'] = 'attachment; filename="user_certificate.pem"'
+ return response
+
+ elif 'delegated_user_credential' in account_config:
+ user_cred = account_config['delegated_user_credential']
+ obj_cred = Credential(string=user_cred)
+ obj_gid = obj_cred.get_gid_object()
+ str_cert = obj_gid.save_to_string()
+ response = HttpResponse(str_cert, content_type='text/plain')
+ response['Content-Disposition'] = 'attachment; filename="user_certificate.pem"'
+ return response
+ else:
+ messages.error(request, 'Download error: User credential is not stored in the server')
+ return HttpResponseRedirect("/portal/account/")
+
+ # Download user p12 = private_key + Certificate
+ elif 'dl_user_p12' in request.POST or request.POST['button_value'] == 'dl_user_p12':
+ if 'user_credential' in account_config and 'user_private_key' in account_config:
+ user_cred = account_config['user_credential']
+ obj_cred = Credential(string=user_cred)
+ obj_gid = obj_cred.get_gid_object()
+ str_cert = obj_gid.save_to_string()
+ cert = crypto.load_certificate(crypto.FILETYPE_PEM, str_cert)
+
+ user_private_key = account_config['user_private_key'].encode('ascii')
+ pkey = crypto.load_privatekey(crypto.FILETYPE_PEM, user_private_key)
+
+ p12 = crypto.PKCS12()
+ p12.set_privatekey(pkey)
+ p12.set_certificate(cert)
+ pkcs12 = p12.export()
+
+ response = HttpResponse(pkcs12, content_type='text/plain')
+ response['Content-Disposition'] = 'attachment; filename="user_pkcs.p12"'
+ return response
+
+ elif 'delegated_user_credential' in account_config and 'user_private_key' in account_config:
+ user_cred = account_config['delegated_user_credential']
+ obj_cred = Credential(string=user_cred)
+ obj_gid = obj_cred.get_gid_object()
+ str_cert = obj_gid.save_to_string()
+ cert = crypto.load_certificate(crypto.FILETYPE_PEM, str_cert)
+
+ user_private_key = account_config['user_private_key'].encode('ascii')
+ pkey = crypto.load_privatekey(crypto.FILETYPE_PEM, user_private_key)
+
+ p12 = crypto.PKCS12()
+ p12.set_privatekey(pkey)
+ p12.set_certificate(cert)
+ pkcs12 = p12.export()
+
+ response = HttpResponse(pkcs12, content_type='text/plain')
+ response['Content-Disposition'] = 'attachment; filename="user_pkcs.p12"'
+ return response
+ else:
+ messages.error(request, 'Download error: User private key or credential is not stored in the server')
+ return HttpResponseRedirect("/portal/account/")
+
else:
messages.info(request, 'Under Construction. Please try again later!')
return HttpResponseRedirect("/portal/account/")