X-Git-Url: http://git.onelab.eu/?a=blobdiff_plain;f=portal%2Faccountview.py;h=fb9f6427693bed647b0973e98c83278f336eaa37;hb=7e8b243ba01f6ee786c44cf71a01963f936f67ea;hp=5c8d15fde57a191b6c84ff3655ba85dd8f8f8772;hpb=ba476841726dc818c0efd3ed25e42955a39fc504;p=myslice.git diff --git a/portal/accountview.py b/portal/accountview.py index 5c8d15fd..fb9f6427 100644 --- a/portal/accountview.py +++ b/portal/accountview.py @@ -1,5 +1,8 @@ from unfold.loginrequired import LoginRequiredAutoLogoutView # +from sfa.trust.credential import Credential +from sfa.trust.certificate import Keypair +# from manifold.core.query import Query from manifoldapi.manifoldapi import execute_query from portal.actions import manifold_update_user, manifold_update_account, manifold_add_account, manifold_delete_account, sfa_update_user, sfa_get_user @@ -15,6 +18,8 @@ from myslice.theme import ThemeView # import json, os, re, itertools +from OpenSSL import crypto +from Crypto.PublicKey import RSA # requires login class AccountView(LoginRequiredAutoLogoutView, ThemeView): @@ -26,9 +31,11 @@ class AccountView(LoginRequiredAutoLogoutView, ThemeView): def get_context_data(self, **kwargs): self.template_name = self.template page = Page(self.request) - page.add_js_files ( [ "js/jquery.validate.js", "js/my_account.register.js", "js/my_account.edit_profile.js" ] ) - page.add_css_files ( [ "css/onelab.css", "css/account_view.css","css/plugin.css" ] ) + metadata = page.get_metadata() + page.expose_js_metadata() + page.add_js_files ( [ "js/jquery.validate.js", "js/my_account.register.js", "js/my_account.edit_profile.js","js/jquery-ui.js" ] ) + page.add_css_files ( [ "css/onelab.css", "css/account_view.css","css/plugin.css" ] ) user_query = Query().get('local:user').select('config','email','status') user_details = execute_query(self.request, user_query) @@ -179,11 +186,32 @@ class AccountView(LoginRequiredAutoLogoutView, ThemeView): # we could use zip. this one is used if columns have unequal rows platform_list = [{'platform_no_access': t[0]} for t in itertools.izip_longest(total_platform_list)] + + + ## check user is pi or not + platform_query = Query().get('local:platform').select('platform_id','platform','gateway_type','disabled') + account_query = Query().get('local:account').select('user_id','platform_id','auth_type','config') + platform_details = execute_query(self.request, platform_query) + account_details = execute_query(self.request, account_query) + for platform_detail in platform_details: + for account_detail in account_details: + if platform_detail['platform_id'] == account_detail['platform_id']: + if 'config' in account_detail and account_detail['config'] is not '': + account_config = json.loads(account_detail['config']) + if 'myslice' in platform_detail['platform']: + acc_auth_cred = account_config.get('delegated_authority_credentials','N/A') + # assigning values + if acc_auth_cred == {} or acc_auth_cred == 'N/A': + pi = "is_not_pi" + else: + pi = "is_pi" + context = super(AccountView, self).get_context_data(**kwargs) context['principal_acc'] = principal_acc_list context['ref_acc'] = ref_acc_list context['platform_list'] = platform_list context['my_users'] = my_users + context['pi'] = pi context['my_slices'] = my_slices context['my_auths'] = my_auths context['user_status'] = user_status @@ -320,13 +348,14 @@ def account_process(request): return HttpResponseRedirect("/portal/account/") # XXX TODO: Factorize with portal/registrationview.py +# XXX TODO: Factorize with portal/registrationview.py +# XXX TODO: Factorize with portal/joinview.py elif 'generate' in request.POST: for account_detail in account_details: for platform_detail in platform_details: if platform_detail['platform_id'] == account_detail['platform_id']: if 'myslice' in platform_detail['platform']: - from Crypto.PublicKey import RSA private = RSA.generate(1024) private_key = json.dumps(private.exportKey()) public = private.publickey() @@ -511,9 +540,77 @@ def account_process(request): response['Content-Disposition'] = 'attachment; filename="user_cred.txt"' return response else: - messages.error(request, 'Download error: User credential is not stored in the server') + messages.error(request, 'Download error: User credential is not stored in the server') return HttpResponseRedirect("/portal/account/") - + + # Download user_cert + elif 'dl_user_cert' in request.POST: + if 'user_credential' in account_config: + user_cred = account_config['user_credential'] + obj_cred = Credential(string=user_cred) + obj_gid = obj_cred.get_gid_object() + str_cert = obj_gid.save_to_string() + response = HttpResponse(str_cert, content_type='text/plain') + response['Content-Disposition'] = 'attachment; filename="user_certificate.pem"' + return response + + elif 'delegated_user_credential' in account_config: + user_cred = account_config['delegated_user_credential'] + obj_cred = Credential(string=user_cred) + obj_gid = obj_cred.get_gid_object() + str_cert = obj_gid.save_to_string() + response = HttpResponse(str_cert, content_type='text/plain') + response['Content-Disposition'] = 'attachment; filename="user_certificate.pem"' + return response + else: + messages.error(request, 'Download error: User credential is not stored in the server') + return HttpResponseRedirect("/portal/account/") + + # Download user p12 = private_key + Certificate + elif 'dl_user_p12' in request.POST: + if 'user_credential' in account_config and 'user_private_key' in account_config: + user_cred = account_config['user_credential'] + obj_cred = Credential(string=user_cred) + obj_gid = obj_cred.get_gid_object() + str_cert = obj_gid.save_to_string() + cert = crypto.load_certificate(crypto.FILETYPE_PEM, str_cert) + + user_private_key = account_config['user_private_key'].encode('ascii') + pkey = crypto.load_privatekey(crypto.FILETYPE_PEM, user_private_key) + + p12 = crypto.PKCS12() + p12.set_privatekey(pkey) + p12.set_certificate(cert) + pkcs12 = p12.export() + + response = HttpResponse(pkcs12, content_type='text/plain') + response['Content-Disposition'] = 'attachment; filename="user_pkcs.p12"' + return response + + elif 'delegated_user_credential' in account_config and 'user_private_key' in account_config: + user_cred = account_config['delegated_user_credential'] + obj_cred = Credential(string=user_cred) + obj_gid = obj_cred.get_gid_object() + str_cert = obj_gid.save_to_string() + cert = crypto.load_certificate(crypto.FILETYPE_PEM, str_cert) + + user_private_key = account_config['user_private_key'].encode('ascii') + pkey = crypto.load_privatekey(crypto.FILETYPE_PEM, user_private_key) + + p12 = crypto.PKCS12() + p12.set_privatekey(pkey) + p12.set_certificate(cert) + pkcs12 = p12.export() + + response = HttpResponse(pkcs12, content_type='text/plain') + response['Content-Disposition'] = 'attachment; filename="user_pkcs.p12"' + return response + else: + messages.error(request, 'Download error: User private key or credential is not stored in the server') + return HttpResponseRedirect("/portal/account/") + + + else: messages.info(request, 'Under Construction. Please try again later!') return HttpResponseRedirect("/portal/account/")