X-Git-Url: http://git.onelab.eu/?a=blobdiff_plain;f=portal%2Fhomeview.py;h=1fe1d2a35ef626ea0b126800c78cfe7892d5712e;hb=012e4fea839c48e95dc8a174c256494f9b596537;hp=62b413668c1202fb5a0bf4c1728d24a2a930c84a;hpb=d08e5d9101b056425d1a00d2b7b434ee31eada74;p=unfold.git
diff --git a/portal/homeview.py b/portal/homeview.py
index 62b41366..1fe1d2a3 100644
--- a/portal/homeview.py
+++ b/portal/homeview.py
@@ -1,18 +1,28 @@
# this somehow is not used anymore - should it not be ?
-from django.core.context_processors import csrf
-from django.http import HttpResponseRedirect
-from django.contrib.auth import authenticate, login, logout
-from django.template import RequestContext
-from django.shortcuts import render_to_response
-from django.shortcuts import render
+from django.core.context_processors import csrf
+from django.http import HttpResponseRedirect
+from django.contrib.auth import authenticate, login, logout
+from django.template import RequestContext
+from django.shortcuts import render_to_response
+from django.shortcuts import render
-from unfold.loginrequired import FreeAccessView
-from manifoldapi.manifoldresult import ManifoldResult
-from ui.topmenu import topmenu_items, the_user
-from myslice.configengine import ConfigEngine
+from unfold.loginrequired import FreeAccessView
-from myslice.theme import ThemeView
+from manifold.core.query import Query
+from manifoldapi.manifoldapi import execute_query
+
+from manifoldapi.manifoldresult import ManifoldResult
+from ui.topmenu import topmenu_items, the_user
+from myslice.configengine import ConfigEngine
+
+from myslice.theme import ThemeView
+from portal.account import Account, get_expiration
+from portal.models import PendingSlice
+from portal.actions import authority_check_pis
+
+import json, time
+import activity.user
class HomeView (FreeAccessView, ThemeView):
template_name = 'home-view.html'
@@ -57,37 +67,177 @@ class HomeView (FreeAccessView, ThemeView):
if request.user.is_authenticated():
env['person'] = self.request.user
env['username'] = self.request.user
+
+ # log user activity
+ activity.user.login(self.request)
+
+ ## check user is pi or not
+ platform_details = {}
+ account_details = {}
+ acc_auth_cred = {}
+ acc_user_cred = {}
+ platform_query = Query().get('local:platform').select('platform_id','platform','gateway_type','disabled')
+ account_query = Query().get('local:account').select('user_id','platform_id','auth_type','config')
+ platform_details = execute_query(self.request, platform_query)
+ account_details = execute_query(self.request, account_query)
+ if platform_details is not None and platform_details != {}:
+ for platform_detail in platform_details:
+ for account_detail in account_details:
+ if platform_detail['platform_id'] == account_detail['platform_id']:
+ if 'config' in account_detail and account_detail['config'] is not '':
+ account_config = json.loads(account_detail['config'])
+ if 'myslice' in platform_detail['platform']:
+ acc_auth_cred = account_config.get('delegated_authority_credentials','N/A')
+ acc_user_cred = account_config.get('delegated_user_credential','N/A')
+ # assigning values
+ #if acc_auth_cred=={} or acc_auth_cred=='N/A':
+ # pi = "is_not_pi"
+ #else:
+ # pi = "is_pi"
+ user_email = str(self.request.user)
+ pi = authority_check_pis(self.request, user_email)
+
+ # check if the user has creds or not
+ if acc_user_cred == {} or acc_user_cred == 'N/A':
+ user_cred = 'no_creds'
+ else:
+ exp_date = get_expiration(acc_user_cred, 'timestamp')
+ if exp_date < time.time():
+ user_cred = 'creds_expired'
+ else:
+ user_cred = 'has_creds'
+
+ # list the pending slices of this user
+ pending_slices = []
+ for slices in PendingSlice.objects.filter(type_of_nodes__iexact=self.request.user).all():
+ pending_slices.append(slices.slice_name)
+
+ env['pending_slices'] = pending_slices
+ env['pi'] = pi
+ env['user_cred'] = user_cred
else:
env['person'] = None
return render_to_response(self.template,env, context_instance=RequestContext(request))
else:
+ # log user activity
+ activity.user.login(self.request, "notactive")
env['state'] = "Your account is not active, please contact the site admin."
env['layout_1_or_2']="layout-unfold2.html"
return render_to_response(self.template,env, context_instance=RequestContext(request))
# otherwise
else:
+ # log user activity
+ activity.user.login(self.request, "error")
env['state'] = "Your username and/or password were incorrect."
return render_to_response(self.template, env, context_instance=RequestContext(request))
def get (self, request, state=None):
env = self.default_env()
+ acc_auth_cred={}
+ if request.user.is_authenticated():
+
+ ## check user is pi or not
+ platform_details = {}
+ account_details = {}
+ acc_auth_cred = {}
+ acc_user_cred = {}
+ platform_query = Query().get('local:platform').select('platform_id','platform','gateway_type','disabled')
+ account_query = Query().get('local:account').select('user_id','platform_id','auth_type','config')
+ # XXX Something like an invalid session seems to make the execute fail sometimes, and thus gives an error on the main page
+ platform_details = execute_query(self.request, platform_query)
+ account_details = execute_query(self.request, account_query)
+ if platform_details is not None and platform_details != {}:
+ for platform_detail in platform_details:
+ for account_detail in account_details:
+ if 'platform_id' in platform_detail:
+ if platform_detail['platform_id'] == account_detail['platform_id']:
+ if 'config' in account_detail and account_detail['config'] is not '':
+ account_config = json.loads(account_detail['config'])
+ if 'myslice' in platform_detail['platform']:
+ acc_auth_cred = account_config.get('delegated_authority_credentials','N/A')
+ acc_user_cred = account_config.get('delegated_user_credential','N/A')
+ # assigning values
+ #if acc_auth_cred=={} or acc_auth_cred=='N/A':
+ # pi = "is_not_pi"
+ #else:
+ # pi = "is_pi"
+ user_email = str(self.request.user)
+ pi = authority_check_pis(self.request, user_email)
+ # check if the user has creds or not
+ if acc_user_cred == {} or acc_user_cred == 'N/A':
+ user_cred = 'no_creds'
+ else:
+ exp_date = get_expiration(acc_user_cred, 'timestamp')
+ if exp_date < time.time():
+ user_cred = 'creds_expired'
+ else:
+ user_cred = 'has_creds'
- if request.user.is_authenticated():
+ # list the pending slices of this user
+ pending_slices = []
+ for slices in PendingSlice.objects.filter(type_of_nodes__iexact=self.request.user).all():
+ pending_slices.append(slices.slice_name)
+
+ env['pending_slices'] = pending_slices
+ env['pi'] = pi
+ env['user_cred'] = user_cred
env['person'] = self.request.user
else:
env['person'] = None
-
+
env['theme'] = self.theme
env['section'] = "Dashboard"
+
env['username']=the_user(request)
env['topmenu_items'] = topmenu_items(None, request)
if state: env['state'] = state
elif not env['username']: env['state'] = None
# use one or two columns for the layout - not logged in users will see the login prompt
+# account_query = Query().get('local:account').select('user_id','platform_id','auth_type','config')
+# account_details = execute_query(self.request, account_query)
+# for account_detail in account_details:
+# account_config = json.loads(account_detail['config'])
+# platform_name = platform_detail['platform']
+# if 'myslice' in platform_detail['platform']:
+# acc_user_cred = account_config.get('delegated_user_credential','N/A')
+# acc_slice_cred = account_config.get('delegated_slice_credentials','N/A')
+# acc_auth_cred = account_config.get('delegated_authority_credentials','N/A')
+#
+# if 'N/A' not in acc_user_cred:
+# exp_date = re.search('(.*)', acc_user_cred)
+# if exp_date:
+# user_exp_date = exp_date.group(1)
+# user_cred_exp_list.append(user_exp_date)
+#
+# my_users = [{'cred_exp': t[0]}
+# for t in zip(user_cred_exp_list)]
+#
+#
+# if 'N/A' not in acc_slice_cred:
+# for key, value in acc_slice_cred.iteritems():
+# slice_list.append(key)
+# # get cred_exp date
+# exp_date = re.search('(.*)', value)
+# if exp_date:
+# exp_date = exp_date.group(1)
+# slice_cred_exp_list.append(exp_date)
+#
+# my_slices = [{'slice_name': t[0], 'cred_exp': t[1]}
+# for t in zip(slice_list, slice_cred_exp_list)]
+#
+# if 'N/A' not in acc_auth_cred:
+# for key, value in acc_auth_cred.iteritems():
+# auth_list.append(key)
+# #get cred_exp date
+# exp_date = re.search('(.*)', value)
+# if exp_date:
+# exp_date = exp_date.group(1)
+# auth_cred_exp_list.append(exp_date)
+
return render_to_response(self.template, env, context_instance=RequestContext(request))