-The slice can be validated, however still without user_hrn;
[myslice.git] / portal / actions.py
1 from django.http                import HttpResponse
2 from manifold.core.query        import Query
3 from manifoldapi.manifoldapi    import execute_query,execute_admin_query
4 from portal.models              import PendingUser, PendingSlice, PendingAuthority
5 import json
6
7 from django.contrib.auth.models  import User
8 from django.contrib.sites.models import Site
9 from django.contrib.auth        import get_user_model
10 from django.template.loader     import render_to_string
11 from django.core.mail           import EmailMultiAlternatives, send_mail
12
13 from myslice.theme              import ThemeView
14
15 # LS Client - By Bruno Soares (UFG)
16 from lsapiclient                import LaboraSchedulerClient
17
18 theme = ThemeView()
19
20 import activity.slice
21
22 # Thierry: moving this right into the code so 
23 # most people can use myslice without having to install sfa
24 # XXX tmp sfa dependency, should be moved to SFA gateway
25 #from sfa.util.xrn                import Xrn 
26
27
28 # Get the list of authorities
29
30 def authority_get_pis(request, authority_hrn):
31     query = Query.get('authority').filter_by('authority_hrn', '==', authority_hrn).select('pi_users')
32     results = execute_admin_query(request, query)
33     print "authority_get_pis = %s" % results
34     # NOTE: temporarily commented. Because results is giving empty list. 
35     # Needs more debugging
36     #if not results:
37     #    raise Exception, "Authority not found: %s" % authority_hrn
38     #result, = results
39     #return result['pi_users']
40     return results
41
42 def authority_get_pi_emails(request, authority_hrn):
43     pi_users = authority_get_pis(request,authority_hrn)
44     print "pi_users = %s" % pi_users
45
46     if any(pi['pi_users'] == None or not pi['pi_users']  for pi in pi_users):
47         #theme.template_name = 'email_default_recipients.txt' 
48         #default_email = render_to_string(theme.template, request)
49         #default_email = default_email.replace('\n', '')
50         #return default_email
51         # the above doesn't work
52         return ['support@onelab.eu']
53     else:
54         pi_user_hrns = [ hrn for x in pi_users for hrn in x['pi_users'] ]
55         query = Query.get('user').filter_by('user_hrn', 'included', pi_user_hrns).select('user_email')
56         results = execute_admin_query(request, query)
57         return [result['user_email'] for result in results]
58
59 #clear user credentials
60 def clear_user_creds(request, user_email):
61     try:
62         user_query  = Query().get('local:user').filter_by('email', '==', user_email).select('user_id','email','password','config')
63         user_details = execute_admin_query(request, user_query)
64         # getting the user_id from the session
65         for user_detail in user_details:
66             user_id = user_detail['user_id']
67             user_email = user_detail['email']
68     
69         account_query  = Query().get('local:account').filter_by('user_id', '==', user_id).select('user_id','platform_id','auth_type','config')
70         account_details = execute_admin_query(request, account_query)
71     
72         platform_query  = Query().get('local:platform').select('platform_id','platform')
73         platform_details = execute_admin_query(request, platform_query)
74     
75         for account_detail in account_details:
76             for platform_detail in platform_details:
77                 if platform_detail['platform_id'] == account_detail['platform_id']:
78                     if 'myslice' in platform_detail['platform']:
79                         account_config = json.loads(account_detail['config'])
80                         #user_cred = account_config.get('delegated_user_credential','N/A')
81                         user_cred = account_config.get('user_credential','N/A')
82                         if 'N/A' not in user_cred:
83                             user_hrn = account_config.get('user_hrn','N/A')
84                             user_pub_key = json.dumps(account_config.get('user_public_key','N/A'))
85                             user_priv_key = json.dumps(account_config.get('user_private_key','N/A'))
86                             updated_config = '{"user_public_key":'+ user_pub_key + ', "user_private_key":'+ user_priv_key + ', "user_hrn":"'+ user_hrn + '"}'
87                             user_params = { 'config': updated_config}
88                             manifold_update_account(request, user_id,user_params)
89                             return user_email
90                         else:
91                             return None
92
93     except Exception,e:
94         print "Exception in actions.py in clear_user_creds %s" % e
95         return None
96
97 def is_pi(wsgi_request, user_hrn, authority_hrn):
98     # XXX could be done in a single query !
99
100     # select pi_authorities from user where user_hrn == "ple.upmc.jordan_auge"
101     query = Query.get('user').filter_by('user_hrn', '==', user_hrn).select('pi_authorities')
102     results = execute_admin_query(wsgi_request, query)
103     if not results:
104         # XXX Warning ?
105         return False
106     result = results[0]
107     user_authority_hrns = result.get('pi_authorities', [])
108     return authority_hrn in user_authority_hrns
109     
110 # SFA get record
111
112 def sfa_get_user(request, user_hrn, pub):
113     query_sfa_user = Query.get('user').filter_by('user_hrn', '==', user_hrn)
114     result_sfa_user = execute_query(request, query_sfa_user)
115     return result_sfa_user                        
116
117 def sfa_update_user(request, user_hrn, user_params):
118     # user_params: keys [public_key] 
119     if 'email' in user_params:
120         user_params['user_email'] = user_params['email']
121     query = Query.update('user').filter_by('user_hrn', '==', user_hrn).set(user_params).select('user_hrn')
122     results = execute_query(request,query)
123     return results
124
125 def sfa_add_authority(request, authority_params):
126     query = Query.create('authority').set(authority_params).select('authority_hrn')
127     results = execute_query(request, query)
128     print "sfa_add_auth results=",results
129     if not results:
130         raise Exception, "Could not create %s. Already exists ?" % authority_params['hrn']
131     return results
132
133 def sfa_add_user_to_slice(request, user_hrn, slice_params):
134 # UPDATE myslice:slice SET researcher=['ple.upmc.jordan_auge','ple.inria.thierry_parmentelat','ple.upmc.loic_baron','ple.upmc.ciro_scognamiglio','ple.upmc.mohammed-yasin_rahman','ple.upmc.azerty'] where slice_hrn=='ple.upmc.myslicedemo'
135     query_current_users = Query.get('slice').select('user').filter_by('slice_hrn','==',slice_params['hrn'])
136     results_current_users = execute_query(request, query_current_users)
137     slice_params['researcher'] = slice_params['researcher'] | results_current_users
138     query = Query.update('slice').filter_by('user_hrn', '==', user_hrn).set(slice_params).select('slice_hrn')
139     results = execute_query(request, query)
140 # Also possible but not supported yet
141 # UPDATE myslice:user SET slice=['ple.upmc.agent','ple.upmc.myslicedemo','ple.upmc.tophat'] where user_hrn=='ple.upmc.azerty'
142     if not results:
143         raise Exception, "Could not create %s. Already exists ?" % slice_params['hrn']
144     return results
145
146 # Propose hrn
147
148 def manifold_add_user(wsgi_request, request):
149     """Add a Manifold user corresponding to a user request.
150
151     Args:
152         wsgi_request: a WSGIRequest instance
153         request (dict): a dictionary containing the user request built from the
154             form.
155
156     Returns:
157         The user_id of the inserted user.
158
159     Raises:
160         ?
161     
162     """
163
164     authority_hrn = request['authority_hrn']
165     request['authority_hrn'] = authority_hrn.split(".")[0]
166
167     USER_CONFIG = '{"firstname": "%(first_name)s", "lastname": "%(last_name)s", "authority": "%(authority_hrn)s"}'
168
169     user_params = {
170         'email'     : request['username'],
171         'password'  : request['password'],
172         'config'    : USER_CONFIG % request,
173         'status'    : 1
174     }
175
176     request['authority_hrn'] = authority_hrn
177
178     query = Query.create('local:user').set(user_params).select('email')
179     results = execute_admin_query(request, query)
180     if not results:
181         raise Exception, "Failed creating manifold user: %s" % user_params['email']
182     result = results[0]
183     return result['email']
184
185 def manifold_update_user(request, email, user_params):
186     # user_params: password, config e.g., 
187     query = Query.update('local:user').filter_by('email', '==', email).set(user_params).select('email')
188     results = execute_admin_query(request,query)
189     # NOTE: results remains empty and goes to Exception. However, it updates the manifold DB.
190     # That's why I commented the exception part. -- Yasin 
191     #if not results:
192     #    raise Exception, "Failed updating manifold user: %s" % user_params['email']
193     #result, = results
194     return results
195
196 def manifold_add_account(request, account_params):
197     query = Query.create('local:account').set(account_params).select(['user', 'platform'])
198     results = execute_admin_query(request,query)
199     if not results:
200         raise Exception, "Failed creating manifold account on platform %s for user: %s" % (account_params['platform'], account_params['user'])
201     result, = results
202     return result['user_id']
203
204 def manifold_update_account(request,user_id,account_params):
205     # account_params: config
206     query = Query.update('local:account').filter_by('platform', '==', 'myslice').filter_by('user_id', '==', user_id).set(account_params).select('user_id')
207     results = execute_admin_query(request,query)
208     return results
209
210 #explicitly mention the platform_id
211 def manifold_delete_account(request, platform_id, user_id, account_params):
212     query = Query.delete('local:account').filter_by('platform_id', '==', platform_id).filter_by('user_id', '==', user_id).set(account_params).select('user_id')
213     results = execute_admin_query(request,query)
214     return results
215
216 def manifold_delete_user(request, user_id, user_params):
217     query = Query.delete('local:user').filter_by('user_id', '==', user_id).set(user_params).select('user_id')
218     results = execute_admin_query(request,query)
219     return results
220
221
222 #not tested
223 def manifold_add_platform(request, platform_params):
224     query = Query.create('local:platform').set(platform_params).select(['user', 'platform'])
225     results = execute_admin_query(request,query)
226     if not results:
227         raise Exception, "Failed creating manifold platform %s for user: %s" % (platform_params['platform'], platform_params['user'])
228     result, = results
229     return result['platform_id']
230
231
232 def make_request_user(user):
233     request = {}
234     request['type']          = 'user'
235     request['id']            = user.id
236     request['timestamp']     = user.created # XXX in DB ?
237     request['authority_hrn'] = user.authority_hrn
238     request['first_name']    = user.first_name
239     request['last_name']     = user.last_name
240     request['email']         = user.email
241     request['login']         = user.login
242     request['user_hrn']      = user.user_hrn
243     request['public_key']    = user.public_key
244     request['private_key']   = user.private_key
245     request['username']      = user.login
246     request['reasons']       = user.reasons
247     return request
248
249 def make_request_slice(slice):
250     request = {}
251     request['type'] = 'slice'
252     request['id'] = slice.id
253     request['user_hrn'] = slice.user_hrn
254     request['timestamp'] = slice.created
255     request['authority_hrn'] = slice.authority_hrn
256     request['slice_name'] = slice.slice_name
257     request['number_of_nodes'] = slice.number_of_nodes
258     request['type_of_nodes'] = slice.type_of_nodes
259     request['purpose'] = slice.purpose
260     return request
261
262 def make_request_authority(authority):
263     request = {}
264     request['type']                  = 'authority'
265     request['id']                    = authority.id
266     request['site_name']             = authority.site_name
267     request['site_latitude']         = authority.site_latitude
268     request['site_longitude']        = authority.site_longitude
269     request['site_url']              = authority.site_url
270     request['site_authority']        = authority.site_authority
271     request['site_abbreviated_name'] = authority.site_abbreviated_name
272     request['address_line1']         = authority.address_line1
273     request['address_line2']         = authority.address_line2
274     request['address_line3']         = authority.address_line3
275     request['address_city']          = authority.address_city
276     request['address_postalcode']    = authority.address_postalcode
277     request['address_state']         = authority.address_state
278     request['address_country']       = authority.address_country
279     request['authority_hrn']         = authority.authority_hrn
280     request['timestamp']             = authority.created
281     return request
282
283 def make_requests(pending_users, pending_slices, pending_authorities):
284     requests = []
285     for user in pending_users:
286         requests.append(make_request_user(user))
287     for slice in pending_slices:
288         requests.append(make_request_slice(slice))
289     for authority in pending_authorities:
290         requests.append(make_request_authority(authority))
291     return requests   
292
293 def get_request_by_id(ids):
294     sorted_ids = { 'user': [], 'slice': [], 'authority': [] }
295     for type__id in ids:
296         type, id = type__id.split('__')
297         sorted_ids[type].append(id)
298         
299     if not ids:
300         pending_users  = PendingUser.objects.all()
301         pending_slices = PendingSlice.objects.all()
302         pending_authorities = PendingAuthority.objects.all()
303     else:
304         pending_users  = PendingUser.objects.filter(id__in=sorted_ids['user']).all()
305         pending_slices = PendingSlice.objects.filter(id__in=sorted_ids['slice']).all()
306         pending_authorities = PendingAuthority.objects.filter(id__in=sorted_ids['authority']).all()
307
308     return make_requests(pending_users, pending_slices, pending_authorities)
309
310 def get_requests(authority_hrns=None):
311     print "get_request_by_authority auth_hrns = ", authority_hrns
312     if not authority_hrns:
313         ## get those pending users who have confirmed their emails
314         pending_users  = PendingUser.objects.filter(status__iexact = 'True')
315         pending_slices = PendingSlice.objects.all()
316         pending_authorities = PendingAuthority.objects.all()
317     else:
318         pending_users  = PendingUser.objects.filter(authority_hrn__in=authority_hrns).all()
319         pending_slices = PendingSlice.objects.filter(authority_hrn__in=authority_hrns).all()
320         pending_authorities = PendingAuthority.objects.filter(authority_hrn__in=authority_hrns).all()
321
322     return make_requests(pending_users, pending_slices, pending_authorities)
323
324 # XXX Is it in sync with the form fields ?
325
326 def portal_validate_request(wsgi_request, request_ids):
327     status = {}
328
329     if not isinstance(request_ids, list):
330         request_ids = [request_ids]
331
332     requests = get_request_by_id(request_ids)
333     for request in requests:
334         # type, id, timestamp, details, allowed -- MISSING: authority_hrn
335         # CAREFUL about details
336         # user  : first name, last name, email, password, keypair
337         # slice : number of nodes, type of nodes, purpose
338         
339         request_status = {}
340
341         if request['type'] == 'user':
342
343             try:
344                 create_user(wsgi_request, request)
345                 request_status['SFA user'] = {'status': True }
346                 PendingUser.objects.get(id=request['id']).delete()
347             except Exception, e:
348                  request_status['SFA user'] = {'status': False, 'description': str(e)}
349                        
350 #            user_params = {'status':2}
351 #            manifold_update_user(request, request['email'], user_params)
352
353             # MANIFOLD user should be added beforehand, during registration
354             #try:
355             #    manifold_user_params = { key: request[key] for key in MANIFOLD_USER_KEYS }
356             #    # XXX # manifold_add_user(manifold_user_params)
357             #    request_status['MySlice user'] = {'status': True }
358             #except Exception, e:
359             #    request_status['MySlice user'] = {'status': False, 'description': str(e)}
360
361             # XXX
362             #manifold_account_params = { key: request[key] for key in MANIFOLD_ACCOUNT_KEYS }
363             #manifold_add_account(manifold_account_params)
364             #request_status['MySlice testbed accounts'] = {'status': False }
365
366         elif request['type'] == 'slice':
367             try:
368                 create_slice(wsgi_request, request)
369                 request_status['SFA slice'] = {'status': True }
370                 PendingSlice.objects.get(id=request['id']).delete()
371
372             except Exception, e:
373                 request_status['SFA slice'] = {'status': False, 'description': str(e)}
374
375         elif request['type'] == 'authority':
376             try:
377                 #hrn = "%s.%s" % (request['authority_hrn'], request['site_authority'])
378                 hrn = request['site_authority']
379                 # XXX tmp sfa dependency
380                 from sfa.util.xrn import Xrn 
381                 urn = Xrn(hrn, request['type']).get_urn()
382                 
383                 # Only hrn is required for Manifold Query 
384                 sfa_authority_params = {
385                     'authority_hrn'        : hrn,
386                     #'authority_urn'        : urn,
387                     #'type'       : request['type'],
388                     #'pi'        : None,
389                     #'enabled'    : True
390                 }
391                 print "ADD Authority"
392                 sfa_add_authority(wsgi_request, sfa_authority_params)
393                 request_status['SFA authority'] = {'status': True }
394                 PendingAuthority.objects.get(id=request['id']).delete()
395
396             except Exception, e:
397                 request_status['SFA authority'] = {'status': False, 'description': str(e)}
398
399         # XXX Remove from Pendings in database
400
401         status['%s__%s' % (request['type'], request['id'])] = request_status
402
403     return status
404
405 def validate_action(request, **kwargs):
406     ids = filter(None, kwargs['id'].split('/'))
407     status = portal_validate_request(request, ids)
408     json_answer = json.dumps(status)
409     return HttpResponse (json_answer, mimetype="application/json")
410
411
412 def reject_action(request, **kwargs):
413     ids = filter(None, kwargs['id'].split('/'))
414     status = portal_reject_request(request, ids)
415     json_answer = json.dumps(status)
416     return HttpResponse (json_answer, mimetype="application/json")
417
418
419 def portal_reject_request(wsgi_request, request_ids):
420     status = {}
421     # get the domain url    
422     current_site = Site.objects.get_current()
423     current_site = current_site.domain
424
425
426     if not isinstance(request_ids, list):
427         request_ids = [request_ids]
428
429     requests = get_request_by_id(request_ids)
430     for request in requests:
431         # type, id, timestamp, details, allowed -- MISSING: authority_hrn
432         # CAREFUL about details
433         # user  : first name, last name, email, password, keypair
434         # slice : number of nodes, type of nodes, purpose
435         
436         request_status = {}
437
438         if request['type'] == 'user':
439             try:
440                 request_status['SFA user'] = {'status': True }
441                 # getting user email based on id 
442                 ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
443                 for user in PendingUser.objects.raw('SELECT * FROM portal_pendinguser WHERE id = %s', [request['id']]):
444                     user_email= user.email
445                     first_name = user.first_name
446                     last_name = user.last_name
447
448                 ctx = {
449                     'first_name'    : first_name, 
450                     'last_name'     : last_name, 
451                     'portal_url'    : current_site,
452                     }
453                 try:
454                     theme.template_name = 'user_request_denied.txt'
455                     text_content = render_to_string(theme.template, ctx)
456                     theme.template_name = 'user_request_denied.html'
457                     html_content = render_to_string(theme.template, ctx)
458                     theme.template_name = 'email_default_sender.txt'
459                     sender =  render_to_string(theme.template, ctx)
460                     sender = sender.replace('\n', '')
461                                
462                     subject = 'User request denied.'
463
464                     msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
465                     msg.attach_alternative(html_content, "text/html")
466                     msg.send()
467                 except Exception, e:
468                     print "Failed to send email, please check the mail templates and the SMTP configuration of your server"   
469             
470                 # removing from Django auth_user
471                 UserModel = get_user_model()
472                 UserModel._default_manager.filter(email__iexact = user_email).delete()
473                 # removing from Django portal_pendinguser
474                 PendingUser.objects.get(id=request['id']).delete()
475                 # removing from manifold
476                 # removing manifold account
477                 user_query = Query().get('local:user') \
478                     .filter_by('email', '==', user_email)           \
479                     .select('user_id')
480                 user = execute_admin_query(wsgi_request, user_query)
481                 user_id = user[0]['user_id']
482         
483                 platform_query = Query().get('local:platform') \
484                     .filter_by('platform', '==', 'myslice')           \
485                     .select('platform_id')
486                 platform = execute_admin_query(wsgi_request, platform_query)
487                 platform_id = platform[0]['platform_id']
488                 account_params = {'user_id':user_id}
489                 manifold_delete_account(request, platform_id, user_id, account_params)           
490              
491                 # removing manifold user
492                 user_params = {'user_id':user_id}
493                 manifold_delete_user(request, user_id, user_params)
494             except Exception, e:
495                 request_status['SFA authority'] = {'status': False, 'description': str(e)}
496                       
497         elif request['type'] == 'slice':
498             request_status['SFA slice'] = {'status': True } 
499
500             # getting user email based on id 
501             ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
502             for user in PendingSlice.objects.raw('SELECT * FROM portal_pendingslice WHERE id = %s', [request['id']]):
503                 user_email= user.type_of_nodes # XXX type_of_nodes field contains the email [shd be renamed in DB]
504                 slice_name = user.slice_name
505                 purpose = user.purpose
506                 url = user.number_of_nodes
507
508             ctx = {
509                 'slice_name': slice_name,
510                 'purpose': purpose,
511                 'url': url,
512                 'portal_url': current_site,
513                 }
514             try:
515                 theme.template_name = 'slice_request_denied.txt'
516                 text_content = render_to_string(theme.template, ctx)
517                 theme.template_name = 'slice_request_denied.html'
518                 html_content = render_to_string(theme.template, ctx)
519                 theme.template_name = 'email_default_sender.txt'
520                 sender =  render_to_string(theme.template, ctx)
521                 sender = sender.replace('\n', '')
522                                
523                 subject = 'Slice request denied.'
524
525                 msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
526                 msg.attach_alternative(html_content, "text/html")
527                 msg.send()
528             except Exception, e:
529                 print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
530                       
531             PendingSlice.objects.get(id=request['id']).delete()
532
533         elif request['type'] == 'authority':
534             request_status['SFA authority'] = {'status': True }
535             
536             # getting user email based on id 
537             ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
538             for user in PendingAuthority.objects.raw('SELECT * FROM portal_pendingauthority WHERE id = %s', [request['id']]):
539                 user_email= user.address_line1 # XXX address_line1 field contains the email [shd be renamed in DB]
540                 site_name = user.site_name
541                 city = user.address_city
542                 country = user.address_country
543                 short_name = user.site_abbreviated_name
544                 url = user.site_url
545
546             ctx = { 
547                 'site_name': site_name,
548                 'short_name': short_name,
549                 'url': url,
550                 'city': city,
551                 'country': country,                          
552                 'portal_url'    : current_site,
553                 }
554                 
555             try:
556                 theme.template_name = 'authority_request_denied.txt'
557                 text_content = render_to_string(theme.template, ctx)
558                 theme.template_name = 'authority_request_denied.html'
559                 html_content = render_to_string(theme.template, ctx)
560                 theme.template_name = 'email_default_sender.txt'
561                 sender =  render_to_string(theme.template, ctx)
562                 sender = sender.replace('\n', '')
563                 subject = 'Authority request denied.'
564                 msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
565                 msg.attach_alternative(html_content, "text/html")
566                 msg.send()
567             except Exception, e:
568                 print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
569
570             PendingAuthority.objects.get(id=request['id']).delete()
571
572         status['%s__%s' % (request['type'], request['id'])] = request_status
573
574     return status
575
576 # Django and ajax
577 # http://djangosnippets.org/snippets/942/
578
579
580
581 #-------------------------------------------------------------------------------
582 # REQUESTS - Slices
583 #-------------------------------------------------------------------------------
584
585 def create_slice(wsgi_request, request):
586     """
587     Arguments:
588         wsgi_request (~ WSGIRequest) : 
589         request (dict) : the slice request in our own dict format
590
591     Raises:
592         Exception
593     """
594     hrn = "%s.%s" % (request['authority_hrn'], request['slice_name'])
595      
596     # XXX tmp sfa dependency
597     from sfa.util.xrn import Xrn 
598     urn = Xrn(hrn, request['type']).get_urn()
599     
600     # Add User to Slice if we have the user_hrn in pendingslice table
601     user_hrn = request.get('user_hrn', None)
602     user_obj = User.objects.get(username = user_hrn.split(".")[1])
603     list_users = []
604     user_hrns = list([user_hrn]) if user_hrn else list()
605     for user in user_hrns:
606         list_users +=[User.objects.get(username = user.split(".")[1])] 
607     
608     #user_query  = Query.get('local:user').select('email').filter_by('email','==',user.username)
609     #user_details_sfa = execute_admin_query(wsgi_request, user_query)
610     
611     pendinguser = PendingUser.objects.filter(login__iexact = user_obj.username)    
612     if pendinguser :
613         raise Exception, "User %s doesn't exist, validate user before validating slice" % user_obj.username
614     #if not user_details_sfa:
615     #    raise Exception, "User %s doesn't exist, validate user before validating slice" % user_hrn
616     #for user in list_users:
617      
618     user_email = user_obj.email
619     
620     # XXX LOIC Quick fix because this is totally inconsistent
621     if not 'number_of_nodes' in request:
622         request['number_of_nodes']=""
623
624     # XXX We should create a slice with Manifold terminology
625     slice_params = {
626         'slice_hrn'        : hrn, 
627         'slice_urn'        : urn,
628         'slice_type'       : request['type'],
629         'url'              : request['number_of_nodes'],
630         'users'            : user_hrns,
631         'slice_enabled'    : True
632     }
633     # ignored in request: id, timestamp,  number_of_nodes, type_of_nodes, purpose
634
635     query = Query.create('slice').set(slice_params).select('slice_hrn')
636     results = execute_admin_query(wsgi_request, query)
637     if not results:
638         raise Exception, "Could not create %s. Already exists ?" % slice_params['hrn']
639     else:       
640         clear_user_creds(wsgi_request,user_obj.username)
641         # log user activity
642         activity.slice.validate(request,{ "slice" : hrn }) #"Slice validation", { "slice" : hrn })
643         
644         try:
645             theme.template_name = 'slice_request_validated.txt'
646             text_content = render_to_string(theme.template, request)
647             theme.template_name = 'slice_request_validated.html'
648             html_content = render_to_string(theme.template, request)
649         
650             theme.template_name = 'email_default_sender.txt'
651             sender =  render_to_string(theme.template, request)
652             sender = sender.replace('\n', '')
653
654             subject = 'Slice request validated'
655
656             msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
657             msg.attach_alternative(html_content, "text/html")
658             msg.send()
659         except Exception, e:
660             print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
661        
662     return results
663
664 def create_pending_slice(wsgi_request, request, email):
665     """
666     """
667
668     # Insert an entry in the PendingSlice table
669     s = PendingSlice(
670         slice_name      = request['slice_name'],
671         user_hrn        = request['user_hrn'],
672         authority_hrn   = request['authority_hrn'],
673         number_of_nodes = request['url'], # field needs to be renamed
674         purpose         = request['purpose'],
675         type_of_nodes   = request['email'] # field needs to be renamed 
676     )
677     s.save()
678
679     try:
680         # Send an email: the recipients are the PI of the authority
681         recipients = authority_get_pi_emails(wsgi_request, request['authority_hrn'])
682         
683         pis = authority_get_pis(request, request['authority_hrn'])
684         pi_emails = []
685         for x in pis:
686             for e in x['pi_users']:
687                 try:
688                     u = e.split(".")[1]
689                     y = User.objects.get(username = u)
690                     print y.username
691                     if y.username.count("@") != 0:
692                         if y.username.split("@")[1] == request['user_hrn'].split("@")[1]:
693                             pi_emails += [y.email]
694                             print y.email
695                 except:
696                     print "fail"
697
698         theme.template_name = 'slice_request_email.txt' 
699         text_content = render_to_string(theme.template, request)
700     
701         theme.template_name = 'slice_request_email.html' 
702         html_content = render_to_string(theme.template, request)
703     
704         theme.template_name = 'slice_request_email_subject.txt'
705         subject = render_to_string(theme.template, request)
706         subject = subject.replace('\n', '')
707     
708         theme.template_name = 'email_default_sender.txt'
709         sender =  render_to_string(theme.template, request)
710         sender = sender.replace('\n', '')
711
712         #sender = email
713         msg = EmailMultiAlternatives(subject, text_content, sender, pi_emails)
714         msg.attach_alternative(html_content, "text/html")
715         msg.send()
716     except Exception, e:
717         print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
718
719 #-------------------------------------------------------------------------------
720 # REQUESTS - Users
721 #-------------------------------------------------------------------------------
722
723 def manifold_add_reference_user_accounts(wsgi_request, request):
724     """When a new user is created, add reference accounts to the reference platform.
725     """
726     # XXX XXX XXX The rest of this function has to be checked XXX XXX XXX
727
728     # Retrieve user information
729     user_query  = Query().get('local:user')             \
730         .select('user_id', 'config', 'email', 'status') \
731         .filter_by('email', '==', request['username'])
732     user_details = execute_admin_query(wsgi_request, user_query)
733
734     # USER MAIN ACCOUNT != reference
735     #print 'USER MAIN ACCOUNT != reference'
736     list_accounts_query = Query().get('local:account')              \
737         .select('user_id', 'platform_id', 'auth_type', 'config')    \
738         .filter_by('user_id', '==', user_details[0]['user_id'])     \
739         .filter_by('auth_type', '!=', 'reference')
740     list_accounts = execute_admin_query(wsgi_request, list_accounts_query)
741
742     # XXX main_platform is being erased several times ???
743     for account in list_accounts:
744         main_platform_query = Query().get('local:platform')         \
745             .select('platform_id', 'platform')                      \
746             .filter_by('platform_id', '==', account['platform_id'])
747         main_platform = execute_admin_query(wsgi_request, main_platform_query)
748
749     # Add reference accounts on SFA enabled platforms
750     platforms_query = Query().get('local:platform') \
751         .filter_by('disabled', '==', '0')           \
752         .filter_by('gateway_type', '==', 'sfa')     \
753         .select('platform_id', 'gateway_type')
754     platforms = execute_admin_query(wsgi_request, platforms_query)
755     for platform in platforms:
756         #print "add reference to platform ",platform
757         manifold_account_params = {
758             'user_id'       : user_details[0]['user_id'],
759             'platform_id'   : platform['platform_id'],
760             'auth_type'     : 'reference',
761             'config'        : '{"reference_platform": "' + main_platform[0]['platform'] + '"}',
762         }
763         manifold_add_account(wsgi_request, manifold_account_params)
764
765 def sfa_create_user(wsgi_request, request, namespace = None, as_admin = False):
766     """
767     Arguments:
768         wsgi_request (~ WSGIRequest) : 
769         request (dict) : the user request in our own dict format
770
771     Raises:
772         Exception
773     """
774     from sfa.util.xrn import Xrn 
775
776     auth_pi = request.get('pi', None)
777     auth_pi = list([auth_pi]) if auth_pi else list()
778
779     # We create a user request with Manifold terminology
780     sfa_user_params = {
781         'user_hrn'          : request['user_hrn'],
782         'user_email'        : request['email'],
783         'user_urn'          : Xrn(request['user_hrn'], request['type']).get_urn(),
784         'user_type'         : request['type'],
785         'keys'              : request['public_key'],
786         'user_first_name'   : request['first_name'],
787         'user_last_name'    : request['last_name'],
788         'pi_authorities'    : auth_pi,
789         'user_enabled'      : True
790     }
791
792     ## Conflict
793     #query = Query.create('user').set(sfa_user_params).select('user_hrn')
794     #results = execute_query(wsgi_request, query)
795
796     if namespace is not None:
797         query = Query.create('%s:user' % namespace).set(sfa_user_params).select('user_hrn')
798     else:
799         query = Query.create('user').set(sfa_user_params).select('user_hrn')
800
801     if as_admin:
802         results = execute_admin_query(wsgi_request, query)
803     else:
804         results = execute_query(wsgi_request, query)
805
806     if not results:
807         raise Exception, "Could not create %s. Already exists ?" % sfa_user_params['user_hrn']
808     else:
809         subject = 'User validated'
810         msg = 'A manager of your institution has validated your account. You have now full user access to the portal.'
811         send_mail(subject, msg, 'support@fibre.org.br',[request['email']], fail_silently=False)       
812     return results
813
814 def ls_create_user(wsgi_request, request, user_detail):
815     organization = request['username'].split('@')[1]
816     lsClient = LaboraSchedulerClient( organization )
817
818     orgGIDNumber = lsClient.get_testbed_info()['gidnumber']
819     userHomeDirectory = "/home/" + organization + "/" + request['username'].split('@')[0]
820     userHomeDirectory = userHomeDirectory.encode('utf-8')
821     
822     userData = {
823         'username'      : request['username'],
824         'email'         : request['email'].encode('utf-8'),
825         'password'      : request['password'].encode('utf-8'),
826         'name'          : str( request['first_name'].encode('latin1') ) + ' ' + str( request['last_name'].encode('latin1') ),
827         'gidnumber'     : orgGIDNumber,
828         'homedirectory' : userHomeDirectory,
829         'created_by'    : "myslice"
830     }
831     
832     # Add user in the island.
833     addUser = lsClient.add_user( userData )
834     
835     # User successfully created, upload user public key.
836     if addUser:
837         ls_update_public_key( wsgi_request, request, lsClient, addUser )
838     
839     return addUser
840
841 def ls_validate_user(wsgi_request, request):
842     organization = request['username'].split('@')[1]
843     lsClient = LaboraSchedulerClient( organization )
844     
845     userId = lsClient.get_user_id_by_username( { 'username': str( request['username'] ) } )
846     
847     validate = False
848     if userId:
849         userData = {
850             'user_id'       : userId,
851             'new_user_data' : { 'enable': 'TRUE' }
852         }
853         
854         validate = lsClient.update_user( userData )
855         
856     return validate and addUserPublicKey
857
858 def ls_update_public_key( wsgi_request, request, lsClient, userId ):
859     userPbKey = {
860         'user_id'       : userId,
861         'public_key'    : request['public_key']
862     }
863     
864     addUserPublicKey = lsClient.add_user_public_key( userPbKey )
865     
866     return addUserPublicKey
867
868 def iotlab_create_user (wsgi_request, request, namespace = None, as_admin=False):
869    
870     import requests
871     import time
872     from requests.auth import HTTPBasicAuth
873     
874     URL_REST = 'https://devgrenoble.senslab.info/rest/admin/users'
875     LOGIN_ADMIN = "auge"
876     PASSWORD_ADMIN = "k,mfg1+Q"
877
878     auth = HTTPBasicAuth(LOGIN_ADMIN,PASSWORD_ADMIN)
879     headers = {'content-type': 'application/json'}
880
881     for user in PendingUser.objects.raw('SELECT * FROM portal_pendinguser WHERE email = %s', [request['email']]):
882         password= user.password
883
884
885     iotlab_user_params = {
886         "type"          : "SA",
887         "login"         : request['email'],
888         "password"      : password,
889         "firstName"     : request['first_name'],
890         "lastName"      : request['last_name'],
891         "email"         : request['email'],
892         "structure"     : request['authority_hrn'],
893         "city"          : "N/A",
894         "country"       : "N/A",
895         "sshPublicKey"  : request['public_key'],
896         "motivations"   : "SFA federation",
897     }    
898    
899     iotlab_user_params1 = json.dumps(iotlab_user_params)
900     r=requests.post(url=URL_REST, data=iotlab_user_params1, headers=headers, auth=auth)
901     print 'Create iotlab user : ', r.status_code, r.text
902     return r.text
903
904 def create_user(wsgi_request, request, namespace = None, as_admin = False):
905     # XXX This has to be stored centrally
906     USER_STATUS_ENABLED = 2
907
908     # NOTE : if we were to create a user directly (just like we create slices,
909     # we would have to perform the steps in create_pending_user too
910     
911     # Edelberto - I put this more below
912     # Add the user to the SFA registry
913     #sfa_create_user(wsgi_request, request)
914
915     # Update Manifold user status
916     manifold_update_user(wsgi_request, request['username'], {'status': USER_STATUS_ENABLED})
917
918     # Add reference accounts for platforms
919     manifold_add_reference_user_accounts(wsgi_request, request)
920     
921     # Conflict 
922     # sfa_create_user(wsgi_request, request)
923     # Add the user to the SFA registry
924     sfa_create_user(wsgi_request, request, namespace, as_admin)
925   
926     # Validate the user using the LS API ( By Bruno - UFG ):
927     try:
928         ls_validate_user( wsgi_request, request )
929     except Exception, e:
930         "Error to validate the user in Labora Scheduler."
931
932 def create_user_in_ldap(wsgi_request, request, user_detail):
933     """
934     """
935    
936     # saves the user to django auth_user table [needed for password reset]
937     user = User.objects.create_user(request['username'], request['email'], request['password'])
938
939     # Creating a manifold user
940     user_id = manifold_add_user(wsgi_request, request)
941
942     # Creating a Manifold account on the MySlice platform
943     # Note the JSON representation of public and private keys already includes quotes
944     account_config = {
945         'user_hrn'          : request['user_hrn'],
946         'user_public_key'   : request['public_key'],
947     }
948     if request['private_key']:
949         account_config['user_private_key'] = request['private_key']
950
951     user_id = user_detail['user_id'] + 1 # the user_id for the newly created user in local:user
952
953     # XXX TODO: Require a myslice platform
954     # ALERT: this will disapear with ROUTERV2 of Manifold
955     # We have to consider the case where several registries can be used
956     # Removed hardcoded platform = 5
957     # This platform == 'myslice' is a TMP FIX !!
958     try:
959         reg_platform_query = Query().get('local:platform') \
960             .filter_by('platform', '==', 'myslice')           \
961             .select('platform_id')
962         reg_platform = execute_admin_query(wsgi_request, reg_platform_query)
963         reg_platform_id = reg_platform[0]['platform_id']
964         account_params = {
965             'platform_id'   : reg_platform_id, # XXX ALERT !!
966             'user_id'       : user_id, 
967             'auth_type'     : request['auth_type'], 
968             'config'        : json.dumps(account_config),
969         }
970         manifold_add_account(wsgi_request, account_params)
971     except Exception, e:
972        print "Failed creating manifold account on platform %s for user: %s" % ('myslice', request['email'])
973
974     # XXX This has to be stored centrally
975     USER_STATUS_ENABLED = 2
976
977     # Update Manifold user status
978     manifold_update_user(wsgi_request, request['username'], {'status': USER_STATUS_ENABLED})
979
980     # Add reference accounts for platforms
981     manifold_add_reference_user_accounts(wsgi_request, request)
982     
983     organization = request['username'].split('@')[1]
984     lsClient = LaboraSchedulerClient( organization )
985     
986     userId = lsClient.get_user_id_by_username( { 'username': str( request['username'] ) } )
987
988     ls_up_pkey = ls_update_public_key( wsgi_request, request, lsClient, userId )
989     
990     if ls_up_pkey:
991         print "OK PKEY"
992
993     from sfa.util.xrn import Xrn 
994
995     auth_pi = request.get('pi', None)
996     auth_pi = list([auth_pi]) if auth_pi else list()
997
998     # We create a user request with Manifold terminology
999     sfa_user_params = {
1000         'user_hrn'          : request['user_hrn'],
1001         'user_email'        : request['email'],
1002         'user_urn'          : Xrn(request['user_hrn'], request['type']).get_urn(),
1003         'user_type'         : request['type'],
1004         'keys'              : request['public_key'],
1005         'user_first_name'   : request['first_name'],
1006         'user_last_name'    : request['last_name'],
1007         'pi_authorities'    : auth_pi,
1008         'user_enabled'      : True
1009     }
1010
1011     print request['user_hrn']
1012     print request['email']
1013     print request['first_name']
1014     print request['last_name']
1015     print request['type']
1016     print request['public_key']
1017
1018     query = Query.create('user').set(sfa_user_params).select('user_hrn')
1019
1020     print query
1021
1022     results = execute_admin_query(wsgi_request, query)
1023
1024     print results
1025
1026     if not results:
1027         raise Exception, "Could not create %s. Already exists ?" % sfa_user_params['user_hrn']
1028     else:
1029         subject = 'User validated'
1030         msg = 'A manager of your institution has validated your account. You have now full user access to the portal.'
1031         send_mail(subject, msg, 'support@fibre.org.br',[request['email']], fail_silently=False)       
1032     return results
1033
1034     # Add the user to iotlab portal if theme is set to onelab
1035     if theme.theme == 'onelab':
1036         iotlab_create_user (wsgi_request, request)
1037
1038 def create_pending_user(wsgi_request, request, user_detail):
1039     """
1040     """
1041
1042     # Insert an entry in the PendingUser table
1043     b = PendingUser(
1044         first_name    = request['first_name'],
1045         last_name     = request['last_name'],
1046         authority_hrn = request['authority_hrn'],
1047         email         = request['email'],
1048         login         = request['username'],
1049         password      = request['password'],
1050         public_key    = request['public_key'],
1051         private_key   = request['private_key'],
1052         user_hrn      = request['user_hrn'],
1053         pi            = request['pi'],
1054         email_hash    = request['email_hash'],
1055         reasons       = request['reasons'],
1056         status        = 'False',
1057     )
1058     b.save()
1059
1060     # sends email to user to activate the email
1061     theme.template_name = 'activate_user.html'
1062     html_content = render_to_string(theme.template, request)
1063     theme.template_name = 'activate_user.txt'
1064     text_content = render_to_string(theme.template, request)
1065     theme.template_name = 'activate_user_email_subject.txt'
1066     subject = render_to_string(theme.template, request)
1067     subject = subject.replace('\n', '')
1068     theme.template_name = 'email_default_sender.txt'
1069     sender =  render_to_string(theme.template, request)
1070     sender = sender.replace('\n', '')
1071     recipient = [request['email']]
1072     #recipient = recipient.append(request['email'])
1073
1074     msg = EmailMultiAlternatives(subject, text_content, sender, recipient)
1075     msg.attach_alternative(html_content, "text/html")
1076     msg.send()
1077    
1078     # saves the user to django auth_user table [needed for password reset]
1079     user = User.objects.create_user(request['username'], request['email'], request['password'])
1080
1081     # Creating a manifold user
1082     user_id = manifold_add_user(wsgi_request, request)
1083
1084     # Creating a Manifold account on the MySlice platform
1085     # Note the JSON representation of public and private keys already includes quotes
1086     account_config = {
1087         'user_hrn'          : request['user_hrn'],
1088         'user_public_key'   : request['public_key'],
1089     }
1090     if request['private_key']:
1091         account_config['user_private_key'] = request['private_key']
1092
1093     user_id = user_detail['user_id'] + 1 # the user_id for the newly created user in local:user
1094
1095     # XXX TODO: Require a myslice platform
1096     # ALERT: this will disapear with ROUTERV2 of Manifold
1097     # We have to consider the case where several registries can be used
1098     # Removed hardcoded platform = 5
1099     # This platform == 'myslice' is a TMP FIX !!
1100     try:
1101         reg_platform_query = Query().get('local:platform') \
1102             .filter_by('platform', '==', 'myslice')           \
1103             .select('platform_id')
1104         reg_platform = execute_admin_query(wsgi_request, reg_platform_query)
1105         reg_platform_id = reg_platform[0]['platform_id']
1106         account_params = {
1107             'platform_id'   : reg_platform_id, # XXX ALERT !!
1108             'user_id'       : user_id, 
1109             'auth_type'     : request['auth_type'], 
1110             'config'        : json.dumps(account_config),
1111         }
1112         manifold_add_account(wsgi_request, account_params)
1113     except Exception, e:
1114        print "Failed creating manifold account on platform %s for user: %s" % ('myslice', request['email'])
1115
1116     # Add user to island using LS API ( By Bruno - UFG )
1117     ls_user_create = ls_create_user( wsgi_request, request, user_detail )
1118
1119     try:
1120         # Send an email: the recipients are the PI of the authority
1121         # If No PI is defined for this Authority, send to a default email (different for each theme)
1122
1123         split_authority_hrn = request['authority_hrn'].split(".")[0]
1124
1125         recipients = authority_get_pi_emails(wsgi_request, split_authority_hrn)
1126
1127         pis = authority_get_pis(request, split_authority_hrn)
1128         pi_emails = []
1129         for x in pis:
1130             for e in x['pi_users']:
1131                 try:
1132                     u = e.split(".")[1]
1133                     y = User.objects.get(username = u)
1134                     if y.username.count("@") != 0:
1135                         if y.username.split("@")[1] == request['username'].split("@")[1]:
1136                             pi_emails += [y.email]
1137                 except:
1138                     print "fail"
1139
1140         theme.template_name = 'user_request_email.html'
1141         html_content = render_to_string(theme.template, request)
1142  
1143         theme.template_name = 'user_request_email.txt'
1144         text_content = render_to_string(theme.template, request)
1145     
1146         theme.template_name = 'user_request_email_subject.txt'
1147         subject = render_to_string(theme.template, request)
1148         subject = subject.replace('\n', '')
1149     
1150         theme.template_name = 'email_default_sender.txt'
1151         sender =  render_to_string(theme.template, request)
1152         sender = sender.replace('\n', '')
1153     
1154         msg = EmailMultiAlternatives(subject, text_content, sender, pi_emails)
1155
1156         msg.attach_alternative(html_content, "text/html")
1157         msg.send()
1158         print pi_emails
1159     except Exception, e:
1160         print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
1161         import traceback
1162         traceback.print_exc()