From 6e3a9501228ef0f9f65c2123da1c4837f0603ebe Mon Sep 17 00:00:00 2001 From: Ciro Scognamiglio Date: Thu, 3 Jul 2014 17:58:50 +0200 Subject: [PATCH] management --- portal/managementtabrequests.py | 159 ++++++++++++++++++++++++++++++++ 1 file changed, 159 insertions(+) create mode 100644 portal/managementtabrequests.py diff --git a/portal/managementtabrequests.py b/portal/managementtabrequests.py new file mode 100644 index 00000000..f2cea926 --- /dev/null +++ b/portal/managementtabrequests.py @@ -0,0 +1,159 @@ +from django.template import RequestContext +from django.shortcuts import render_to_response + +from manifold.core.query import Query, AnalyzedQuery +from manifoldapi.manifoldapi import execute_query + +from django.views.generic.base import TemplateView + +from unfold.loginrequired import LoginRequiredView +from django.http import HttpResponse +from django.shortcuts import render + +from manifold.core.query import Query, AnalyzedQuery +from manifoldapi.manifoldapi import execute_query + +from portal.actions import get_requests + +from myslice.theme import ThemeView + +import json + +class ManagementRequestsView (LoginRequiredView, ThemeView): + template_name = "management-tab-requests.html" + + def get(self, request): + + ctx_my_authorities = {} + ctx_delegation_authorities = {} + ctx_sub_authorities = {} + dest = {} + + + # The user need to be logged in + if (request.user): + + user_query = Query().get('local:user').filter_by('email', '==', self.request.user.email).select('user_id') + user, = execute_query(self.request, user_query) + user_id = user['user_id'] + + # Query manifold to learn about available SFA platforms for more information + # In general we will at least have the portal + # For now we are considering all registries + all_authorities = [] + platform_ids = [] + sfa_platforms_query = Query().get('local:platform').filter_by('gateway_type', '==', 'sfa').select('platform_id', 'platform', 'auth_type') + sfa_platforms = execute_query(self.request, sfa_platforms_query) + for sfa_platform in sfa_platforms: + print "SFA PLATFORM > ", sfa_platform['platform'] + if not 'auth_type' in sfa_platform: + continue + auth = sfa_platform['auth_type'] + if not auth in all_authorities: + all_authorities.append(auth) + platform_ids.append(sfa_platform['platform_id']) + + print "W: Hardcoding platform myslice" + # There has been a tweak on how new platforms are referencing a + # so-called 'myslice' platform for storing authentication tokens. + # XXX This has to be removed in final versions. + myslice_platforms_query = Query().get('local:platform').filter_by('platform', '==', 'myslice').select('platform_id') + myslice_platforms = execute_query(self.request, myslice_platforms_query) + if myslice_platforms: + myslice_platform, = myslice_platforms + platform_ids.append(myslice_platform['platform_id']) + + # We can check on which the user has authoritity credentials = PI rights + credential_authorities = set() + credential_authorities_expired = set() + + # User account on these registries + user_accounts_query = Query.get('local:account').filter_by('user_id', '==', user_id).filter_by('platform_id', 'included', platform_ids).select('auth_type', 'config') + user_accounts = execute_query(self.request, user_accounts_query) + + for user_account in user_accounts: + + print "USER ACCOUNT", user_account + if user_account['auth_type'] == 'reference': + continue # we hardcoded the myslice platform... + + config = json.loads(user_account['config']) + creds = [] + print "CONFIG KEYS", config.keys() + if 'authority_credentials' in config: + print "***", config['authority_credentials'].keys() + for authority_hrn, credential in config['authority_credentials'].items(): + credential_authorities.add(authority_hrn) + if 'delegated_authority_credentials' in config: + print "***", config['delegated_authority_credentials'].keys() + for authority_hrn, credential in config['delegated_authority_credentials'].items(): + credential_authorities.add(authority_hrn) + + print 'credential_authorities =', credential_authorities + print 'credential_authorities_expired =', credential_authorities_expired + + # ** Where am I a PI ** + # For this we need to ask SFA (of all authorities) = PI function + pi_authorities_query = Query.get('user').filter_by('user_hrn', '==', '$user_hrn').select('pi_authorities') + pi_authorities_tmp = execute_query(self.request, pi_authorities_query) + pi_authorities = set() + try: + for pa in pi_authorities_tmp: + pi_authorities |= set(pa['pi_authorities']) + except: + print 'No pi_authorities' + + pi_credential_authorities = pi_authorities & credential_authorities + pi_no_credential_authorities = pi_authorities - credential_authorities - credential_authorities_expired + pi_expired_credential_authorities = pi_authorities & credential_authorities_expired + # Authorities I've been delegated PI rights + pi_delegation_credential_authorities = credential_authorities - pi_authorities + pi_delegation_expired_authorities = credential_authorities_expired - pi_authorities + + # Summary intermediary + pi_my_authorities = pi_credential_authorities | pi_no_credential_authorities | pi_expired_credential_authorities + pi_delegation_authorities = pi_delegation_credential_authorities | pi_delegation_expired_authorities + + # Summary all + queried_pending_authorities = pi_my_authorities | pi_delegation_authorities #| pi_subauthorities + + # iterate on the requests and check if the authority matches a prefix + # startswith an authority on which the user is PI + requests = get_requests() + for r in requests: + auth_hrn = r['authority_hrn'] + for my_auth in pi_my_authorities: + if auth_hrn.startswith(my_auth): + dest = ctx_my_authorities + r['allowed'] = 'allowed' + for my_auth in pi_delegation_authorities: + if auth_hrn.startswith(my_auth): + dest = ctx_delegation_authorities + r['allowed'] = 'allowed' + if auth_hrn in pi_expired_credential_authorities: + r['allowed'] = 'expired' + if 'allowed' not in r: + r['allowed'] = 'denied' + + + if not auth_hrn in dest: + dest[auth_hrn] = [] + dest[auth_hrn].append(request) + + + env = {} + env['my_authorities'] = ctx_my_authorities + env['sub_authorities'] = ctx_sub_authorities + env['delegation_authorities'] = ctx_delegation_authorities + + # XXX This is repeated in all pages + # more general variables expected in the template + # the menu items on the top + #env['topmenu_items'] = topmenu_items_live('Validation', page) + # so we can sho who is logged + env['username'] = request.user + env['pi'] = "is_pi" + env['theme'] = self.theme + env['section'] = "Requests" + + return render_to_response(self.template, env, context_instance=RequestContext(request)) -- 2.43.0