use logger instead of print as often as possible
[myslice.git] / portal / actions.py
1 from django.http                    import HttpResponse
2 from manifold.core.query            import Query
3 from manifoldapi.manifoldapi        import execute_query,execute_admin_query
4 from portal.models                  import PendingUser, PendingSlice, PendingAuthority, PendingProject, PendingJoin
5 from unfold.page                    import Page
6
7 import json
8
9 from django.contrib.auth.models     import User
10 from django.contrib.sites.models    import Site
11 from django.contrib.auth            import get_user_model
12 from django.template.loader         import render_to_string
13 from django.core.mail               import EmailMultiAlternatives, send_mail
14
15 from myslice.theme                  import ThemeView
16 from myslice.configengine           import ConfigEngine
17 from myslice.settings               import logger
18
19 theme = ThemeView()
20
21 import activity.slice
22
23 # Thierry: moving this right into the code so 
24 # most people can use myslice without having to install sfa
25 # XXX tmp sfa dependency, should be moved to SFA gateway
26 #from sfa.util.xrn                import Xrn 
27
28
29 # Get the list of pis in a given authority
30 def authority_get_pis(request, authority_hrn):
31     # CACHE PB with fields
32     page = Page(request)
33     metadata = page.get_metadata()
34     auth_md = metadata.details_by_object('authority')
35     auth_fields = [column['name'] for column in auth_md['column']]
36
37     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
38     query = Query.get('myslice:authority').filter_by('authority_hrn', '==', authority_hrn).select(auth_fields)
39     results = execute_admin_query(request, query)
40     #print "authority_get_pis = %s" % results
41     # NOTE: temporarily commented. Because results is giving empty list. 
42     # Needs more debugging
43     #if not results:
44     #    raise Exception, "Authority not found: %s" % authority_hrn
45     #result, = results
46     #return result['pi_users']
47     return results
48
49 #check the user is pi or not in the registry
50 def authority_check_pis(request, user_email):
51     try:
52         user_query  = Query().get('local:user').filter_by('email', '==', user_email).select('user_id','email','password','config')
53         user_details = execute_admin_query(request, user_query)
54     
55         # getting the authority_hrn
56         for user_detail in user_details:
57             user_id = user_detail['user_id']
58             if user_detail['config']:
59                 config = json.loads(user_detail['config'])
60                 authority_hrn = config.get('authority','Unknown Authority')
61  
62         account_query  = Query().get('local:account').filter_by('user_id', '==', user_id).select('user_id','platform_id','auth_type','config')
63         account_details = execute_admin_query(request, account_query)
64     
65         platform_query  = Query().get('local:platform').select('platform_id','platform')
66         platform_details = execute_admin_query(request, platform_query)
67     
68         for account_detail in account_details:
69             for platform_detail in platform_details:
70                 if platform_detail['platform_id'] == account_detail['platform_id']:
71                     if 'myslice' in platform_detail['platform']:
72                         account_config = json.loads(account_detail['config'])
73                         user_hrn = account_config.get('user_hrn','N/A')
74
75         pi_status = False
76         pis = authority_get_pis (request, authority_hrn)
77         for pi in pis:
78             pi_list = pi['pi_users']
79
80         if user_hrn in pi_list:
81             pi_status = True
82         return pi_status
83
84     except Exception as e:
85         logger.error("Exception in actions.py in authority_check_pis {}".format(e))
86         return None
87
88
89 def authority_add_pis(request, authority_hrn,user_hrn):
90     try:
91         # getting pis of the authority of the user
92         pis = authority_get_pis (request, authority_hrn)
93         for pi in pis:
94             pi_list = pi['pi_users']
95    
96         updated_pi_list = pi_list.append(user_hrn) 
97         query = Query.update('myslice:authority').filter_by('authority_hrn', '==', authority_hrn).set({'pi_users':pi_list})
98         results = execute_query(request,query)
99         newpis = authority_get_pis (request, authority_hrn)
100         return newpis
101     except Exception as e: 
102         logger.error("Exception in actions.py in authority_add_pis {}".format(e))
103         return None
104
105
106 def authority_remove_pis(request, authority_hrn,user_hrn):
107     try:
108         # getting pis of the authority of the user
109         pis = authority_get_pis (request, authority_hrn)
110         for pi in pis:
111             pi_list = pi['pi_users']
112  
113         updated_pi_list = pi_list.remove(user_hrn) 
114         query = Query.update('authority').filter_by('authority_hrn', '==', authority_hrn).set({'pi_users':pi_list})
115         results = execute_query(request,query)
116         newpis = authority_get_pis (request, authority_hrn)
117         return newpis
118     except Exception as e: 
119         logger.error("Exception in actions.py in authority_remove_pis {}".format(e))
120         return None
121
122
123 def authority_get_pi_emails(request, authority_hrn):
124     pi_users = authority_get_pis(request,authority_hrn)
125     logger.info("pi_users = %s" % pi_users)
126
127     if any(pi['pi_users'] == None or not pi['pi_users']  for pi in pi_users):
128         #theme.template_name = 'email_default_recipients.txt' 
129         #default_email = render_to_string(theme.template, request)
130         #default_email = default_email.replace('\n', '')
131         #return default_email
132         # the above doesn't work
133         return ['support@onelab.eu']
134     else:
135         pi_user_hrns = [ hrn for x in pi_users for hrn in x['pi_users'] ]
136
137         # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
138         query = Query.get('myslice:user').filter_by('user_hrn', 'included', pi_user_hrns).select('user_email')
139         results = execute_admin_query(request, query)
140         return [result['user_email'] for result in results]
141
142 #clear user credentials
143 def clear_user_creds(request, user_email):
144     try:
145         user_query  = Query().get('local:user').filter_by('email', '==', user_email).select('user_id','email','password','config')
146         user_details = execute_admin_query(request, user_query)
147     
148         # getting the user_id from the session
149         for user_detail in user_details:
150             user_id = user_detail['user_id']
151             user_email = user_detail['email']
152     
153         account_query  = Query().get('local:account').filter_by('user_id', '==', user_id).select('user_id','platform_id','auth_type','config')
154         account_details = execute_admin_query(request, account_query)
155     
156         platform_query  = Query().get('local:platform').select('platform_id','platform')
157         platform_details = execute_admin_query(request, platform_query)
158     
159         for account_detail in account_details:
160             for platform_detail in platform_details:
161                 if platform_detail['platform_id'] == account_detail['platform_id']:
162                     if 'myslice' in platform_detail['platform']:
163                         account_config = json.loads(account_detail['config'])
164                         #user_cred = account_config.get('delegated_user_credential','N/A')
165                         user_cred = account_config.get('user_credential','N/A')
166                         if 'N/A' not in user_cred:
167                             user_hrn = account_config.get('user_hrn','N/A')
168                             user_pub_key = json.dumps(account_config.get('user_public_key','N/A'))
169                             user_priv_key = json.dumps(account_config.get('user_private_key','N/A'))
170                             updated_config = '{"user_public_key":'+ user_pub_key + ', "user_private_key":'+ user_priv_key + ', "user_hrn":"'+ user_hrn + '"}'
171                             user_params = { 'config': updated_config}
172                             manifold_update_account(request, user_id,user_params)
173                             return user_email
174                         else:
175                             return None
176
177     except Exception as e:
178         logger.error("Exception in actions.py in clear_user_creds {}".format(e))
179         return None
180
181 def is_pi(wsgi_request, user_hrn, authority_hrn):
182     # authorities from user where user_hrn == "ple.upmc.jordan_auge"
183     logger.debug("#### actions.py is_pi authority_hrn = {}".format(authority_hrn))
184     try:
185         # CACHE PB with fields
186         page = Page(wsgi_request)
187         metadata = page.get_metadata()
188         user_md = metadata.details_by_object('user')
189         user_fields = [column['name'] for column in user_md['column']]
190         
191         # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
192         query  = Query().get('myslice:user').select(user_fields).filter_by('user_hrn','==',user_hrn)
193         #query = Query.get('myslice:user').filter_by('user_hrn', '==', user_hrn).select('pi_authorities')
194         results = execute_query(wsgi_request, query)
195         for user_detail in results:
196             if authority_hrn in user_detail['pi_authorities']:
197                 return True
198     except Exception as e:
199         logger.error("Exception in actions.py in is_pi {}".format(e))
200     return False
201     
202 # SFA get record
203
204 def sfa_get_user(request, user_hrn, pub=None):
205
206     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
207     query_sfa_user = Query.get('myslice:user').filter_by('user_hrn', '==', user_hrn)
208     result_sfa_user = execute_admin_query(request, query_sfa_user)
209     return result_sfa_user[0]                        
210
211 def sfa_update_user(request, user_hrn, user_params):
212     # user_params: keys [public_key] 
213     if 'email' in user_params:
214         user_params['user_email'] = user_params['email']
215
216     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
217     query = Query.update('myslice:user').filter_by('user_hrn', '==', user_hrn).set(user_params).select('user_hrn')
218     results = execute_admin_query(request,query)
219     return results
220
221 def sfa_add_authority(request, authority_params):
222
223     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
224     query = Query.create('myslice:authority').set(authority_params).select('authority_hrn')
225     results = execute_query(request, query)
226     logger.info("sfa_add_auth results={}".format(results))
227     if not results:
228         raise Exception, "Could not create %s. Already exists ?" % authority_params['hrn']
229     return results
230
231 def sfa_add_user_to_slice(request, user_hrn, slice_params):
232 # UPDATE myslice:slice SET researcher=['ple.upmc.jordan_auge','ple.inria.thierry_parmentelat','ple.upmc.loic_baron','ple.upmc.ciro_scognamiglio','ple.upmc.mohammed-yasin_rahman','ple.upmc.azerty'] where slice_hrn=='ple.upmc.myslicedemo'
233
234     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
235     query_current_users = Query.get('myslice:slice').select('user').filter_by('slice_hrn','==',slice_params['hrn'])
236     results_current_users = execute_query(request, query_current_users)
237     slice_params['researcher'] = slice_params['researcher'] | results_current_users
238
239     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
240     query = Query.update('myslice:slice').filter_by('user_hrn', '==', user_hrn).set(slice_params).select('slice_hrn')
241     results = execute_query(request, query)
242 # Also possible but not supported yet
243 # UPDATE myslice:user SET slice=['ple.upmc.agent','ple.upmc.myslicedemo','ple.upmc.tophat'] where user_hrn=='ple.upmc.azerty'
244     if not results:
245         raise Exception, "Could not create %s. Already exists ?" % slice_params['hrn']
246     return results
247
248 # Propose hrn
249
250 def manifold_add_user(wsgi_request, request):
251     """Add a Manifold user corresponding to a user request.
252
253     Args:
254         wsgi_request: a WSGIRequest instance
255         request (dict): a dictionary containing the user request built from the
256             form.
257
258     Returns:
259         The user_id of the inserted user.
260
261     Raises:
262         ?
263     
264     """
265     USER_CONFIG = '{"firstname": "%(first_name)s", "lastname": "%(last_name)s", "authority": "%(authority_hrn)s"}'
266
267     user_params = {
268         'email'     : request['email'],
269         'password'  : request['password'],
270         'config'    : USER_CONFIG % request,
271         'status'    : 1,
272     }
273
274     query = Query.create('local:user').set(user_params).select('email')
275     results = execute_admin_query(request, query)
276     if not results:
277         raise Exception, "Failed creating manifold user: %s" % user_params['email']
278     result = results[0]
279     return result['email']
280
281 def manifold_update_user(request, email, user_params):
282     # user_params: password, config e.g., 
283     query = Query.update('local:user').filter_by('email', '==', email).set(user_params).select('email')
284     results = execute_admin_query(request,query)
285     # NOTE: results remains empty and goes to Exception. However, it updates the manifold DB.
286     # That's why I commented the exception part. -- Yasin 
287     #if not results:
288     #    raise Exception, "Failed updating manifold user: %s" % user_params['email']
289     #result, = results
290     return results
291
292 def manifold_add_account(request, account_params):
293     query = Query.create('local:account').set(account_params).select(['user', 'platform'])
294     results = execute_admin_query(request,query)
295     if not results:
296         raise Exception, "Failed creating manifold account on platform %s for user: %s" % (account_params['platform'], account_params['user'])
297     result, = results
298     return result['user_id']
299
300 def manifold_update_account(request,user_id,account_params):
301     # account_params: config
302     query = Query.update('local:account').filter_by('platform', '==', 'myslice').filter_by('user_id', '==', user_id).set(account_params).select('user_id')
303     results = execute_admin_query(request,query)
304     return results
305
306 #explicitly mention the platform_id
307 def manifold_delete_account(request, user_id, platform_id = None):
308     query = Query.delete('local:account').filter_by('user_id', '==', user_id)
309     if platform_id is not None:
310         query.filter_by('platform_id', '==', platform_id)
311     results = execute_admin_query(request,query)
312     return results
313
314 def manifold_delete_user(request, user_id):
315     query = Query.delete('local:user').filter_by('user_id', '==', user_id).select('user_id')
316     results = execute_admin_query(request,query)
317     return results
318
319
320 #not tested
321 def manifold_add_platform(request, platform_params):
322     query = Query.create('local:platform').set(platform_params).select(['user', 'platform'])
323     results = execute_admin_query(request,query)
324     if not results:
325         raise Exception, "Failed creating manifold platform %s for user: %s" % (platform_params['platform'], platform_params['user'])
326     result, = results
327     return result['platform_id']
328
329 def delete_local_user(wsgi_request, user_email):
330     user_query = Query().get('local:user') \
331         .filter_by('email', '==', user_email)           \
332         .select('user_id','config')
333     user = execute_admin_query(wsgi_request, user_query)
334     if len(user) == 0:
335         return False
336         #raise Exception, "User not found, check local DB"
337     else:
338         user_id = user[0]['user_id']
339         user_config = json.loads(user[0]['config'])
340         authority_hrn = user_config.get('authority', None)
341         
342         if is_pi(wsgi_request, '$user_hrn', authority_hrn):
343             # removing from Django auth_user
344             UserModel = get_user_model()
345             UserModel._default_manager.filter(email__iexact = user_email).delete()
346
347             # removing manifold account
348             manifold_delete_account(wsgi_request, user_id)           
349                      
350             # removing manifold user
351             manifold_delete_user(wsgi_request, user_id)
352         else:
353             return False
354             #raise Exception, "No sufficient rights on authority = ",authority_hrn
355
356     return True      
357
358
359 def make_request_user(user):
360     request = {}
361     request['type']          = 'user'
362     request['id']            = user.id
363     request['timestamp']     = user.created # XXX in DB ?
364     request['authority_hrn'] = user.authority_hrn
365     request['first_name']    = user.first_name
366     request['last_name']     = user.last_name
367     request['email']         = user.email
368     request['login']         = user.login
369     request['user_hrn']      = user.user_hrn
370     request['public_key']    = user.public_key
371     request['private_key']   = user.private_key
372     return request
373
374 def make_request_slice(slice):
375     request = {}
376     request['type'] = 'slice'
377     request['id'] = slice.id
378     request['user_hrn'] = slice.user_hrn
379     request['timestamp'] = slice.created
380     request['authority_hrn'] = slice.authority_hrn
381     request['slice_name'] = slice.slice_name
382     request['number_of_nodes'] = slice.number_of_nodes
383     request['type_of_nodes'] = slice.type_of_nodes
384     request['purpose'] = slice.purpose
385     return request
386
387 def make_request_project(project):
388     request = {}
389     request['type'] = 'project'
390     request['id'] = project.id
391     request['user_hrn'] = project.user_hrn
392     request['email'] = project.email
393     request['timestamp'] = project.created
394     request['authority_hrn'] = project.authority_hrn
395     request['project_name'] = project.project_name
396     request['purpose'] = project.purpose
397     return request
398
399 def make_request_join(join):
400     request = {}
401     request['type'] = 'join'
402     request['id'] = join.id
403     request['user_hrn'] = join.user_hrn
404     request['email'] = join.email
405     request['timestamp'] = join.created
406     request['authority_hrn'] = join.authority_hrn
407     request['project_name'] = join.project_name
408     return request
409
410 def make_request_authority(authority):
411     request = {}
412     request['type']                  = 'authority'
413     request['id']                    = authority.id
414     request['site_name']             = authority.site_name
415     request['site_latitude']         = authority.site_latitude
416     request['site_longitude']        = authority.site_longitude
417     request['site_url']              = authority.site_url
418     request['site_authority']        = authority.site_authority
419     request['site_abbreviated_name'] = authority.site_abbreviated_name
420     request['address_line1']         = authority.address_line1
421     request['address_line2']         = authority.address_line2
422     request['address_line3']         = authority.address_line3
423     request['address_city']          = authority.address_city
424     request['address_postalcode']    = authority.address_postalcode
425     request['address_state']         = authority.address_state
426     request['address_country']       = authority.address_country
427     request['authority_hrn']         = authority.authority_hrn
428     request['timestamp']             = authority.created
429     return request
430
431 def make_requests(pending_users, pending_slices, pending_authorities, pending_projects, pending_joins):
432     logger.info("$$$$$$$$$$$$$$$  make_request")
433     requests = []
434     for user in pending_users:
435         requests.append(make_request_user(user))
436     for slice in pending_slices:
437         requests.append(make_request_slice(slice))
438     for authority in pending_authorities:
439         requests.append(make_request_authority(authority))
440     for project in pending_projects:
441         requests.append(make_request_project(project))
442     for join in pending_joins:
443         requests.append(make_request_join(join))
444     return requests   
445
446 def get_request_by_id(ids):
447     logger.info("$$$$$$$$$$$$$$$$  get_request_by_id")
448     sorted_ids = { 'user': [], 'slice': [], 'authority': [], 'project': [], 'join': [] }
449     for type__id in ids:
450         type, id = type__id.split('__')
451         sorted_ids[type].append(id)
452         
453     if not ids:
454         pending_users  = PendingUser.objects.all()
455         pending_slices = PendingSlice.objects.all()
456         pending_authorities = PendingAuthority.objects.all()
457         pending_projects = PendingProject.objects.all()
458         pending_joins = PendingJoin.objects.all()
459     else:
460         pending_users  = PendingUser.objects.filter(id__in=sorted_ids['user']).all()
461         pending_slices = PendingSlice.objects.filter(id__in=sorted_ids['slice']).all()
462         pending_authorities = PendingAuthority.objects.filter(id__in=sorted_ids['authority']).all()
463         pending_projects = PendingProject.objects.filter(id__in=sorted_ids['project']).all()
464         pending_joins = PendingJoin.objects.filter(id__in=sorted_ids['join']).all()
465
466     return make_requests(pending_users, pending_slices, pending_authorities, pending_projects, pending_joins)
467
468 def get_requests(authority_hrns=None):
469     logger.info("$$$$$$$$$$$$$   get_request_by_authority auth_hrns = {}".format(authority_hrns))
470     if not authority_hrns:
471         ## get those pending users who have confirmed their emails
472         pending_users  = PendingUser.objects.filter(status__iexact = 'True')
473         pending_slices = PendingSlice.objects.all()
474         pending_authorities = PendingAuthority.objects.all()
475         pending_projects = PendingProject.objects.all()
476         pending_joins = PendingJoin.objects.all()
477     else:
478         pending_users  = PendingUser.objects
479         pending_slices = PendingSlice.objects
480         pending_authorities = PendingAuthority.objects
481         pending_projects = PendingProject.objects
482         pending_joins = PendingJoin.objects
483         from django.db.models import Q
484         list_user_Q = list()
485         list_slice_Q = list()
486         list_auth_Q = list()
487         list_proj_Q = list()
488         list_join_Q = list()
489         for hrn in authority_hrns:
490             list_user_Q.append(Q(authority_hrn__startswith=hrn, status__iexact = 'True'))
491             list_slice_Q.append(Q(authority_hrn__startswith=hrn))
492             list_auth_Q.append(Q(site_authority__startswith=hrn))
493             list_proj_Q.append(Q(authority_hrn__startswith=hrn))
494             list_join_Q.append(Q(authority_hrn__startswith=hrn))
495         from operator import __or__ as OR
496         pending_users        = pending_users.filter(reduce(OR, list_user_Q))
497         pending_slices       = pending_slices.filter(reduce(OR, list_slice_Q))
498         pending_authorities  = pending_authorities.filter(reduce(OR, list_auth_Q))
499         pending_projects     = pending_projects.filter(reduce(OR, list_proj_Q))
500         pending_joins        = pending_joins.filter(reduce(OR, list_join_Q))
501         #pending_authorities  = pending_authorities.all() #filter(reduce(OR, list_Q))
502
503     return make_requests(pending_users, pending_slices, pending_authorities, pending_projects, pending_joins)
504
505 # XXX Is it in sync with the form fields ?
506
507 def portal_validate_request(wsgi_request, request_ids):
508     status = {}
509
510     if not isinstance(request_ids, list):
511         request_ids = [request_ids]
512
513     requests = get_request_by_id(request_ids)
514     for request in requests:
515         # type, id, timestamp, details, allowed -- MISSING: authority_hrn
516         # CAREFUL about details
517         # user  : first name, last name, email, password, keypair
518         # slice : number of nodes, type of nodes, purpose
519         
520         request_status = {}
521
522         if request['type'] == 'user':
523
524             try:
525                 create_user(wsgi_request, request)
526                 request_status['SFA user'] = {'status': True }
527                 PendingUser.objects.get(id=request['id']).delete()
528             except Exception, e:
529                  request_status['SFA user'] = {'status': False, 'description': str(e)}
530                        
531 #            user_params = {'status':2}
532 #            manifold_update_user(request, request['email'], user_params)
533
534             # MANIFOLD user should be added beforehand, during registration
535             #try:
536             #    manifold_user_params = { key: request[key] for key in MANIFOLD_USER_KEYS }
537             #    # XXX # manifold_add_user(manifold_user_params)
538             #    request_status['MySlice user'] = {'status': True }
539             #except Exception, e:
540             #    request_status['MySlice user'] = {'status': False, 'description': str(e)}
541
542             # XXX
543             #manifold_account_params = { key: request[key] for key in MANIFOLD_ACCOUNT_KEYS }
544             #manifold_add_account(manifold_account_params)
545             #request_status['MySlice testbed accounts'] = {'status': False }
546
547         elif request['type'] == 'slice':
548             try:
549                 create_slice(wsgi_request, request)
550                 request_status['SFA slice'] = {'status': True }
551                 PendingSlice.objects.get(id=request['id']).delete()
552
553                 # Clear user's Credentials
554                 sfa_user = sfa_get_user(wsgi_request, request['user_hrn'])
555                 clear_user_creds(wsgi_request,sfa_user['user_email'])
556
557             except Exception, e:
558                 request_status['SFA slice'] = {'status': False, 'description': str(e)}
559
560         elif request['type'] == 'authority':
561             try:
562                 #hrn = "%s.%s" % (request['authority_hrn'], request['site_authority'])
563                 hrn = request['site_authority']
564                 # XXX tmp sfa dependency
565                 from sfa.util.xrn import Xrn 
566                 urn = Xrn(hrn, request['type']).get_urn()
567                 
568                 # Only hrn is required for Manifold Query 
569                 sfa_authority_params = {
570                     'authority_hrn'        : hrn,
571                     #'authority_urn'        : urn,
572                     #'type'       : request['type'],
573                     #'pi'        : None,
574                     #'enabled'    : True
575                 }
576                 logger.info("ADD Authority")
577                 sfa_add_authority(wsgi_request, sfa_authority_params)
578                 request_status['SFA authority'] = {'status': True }
579                 PendingAuthority.objects.get(id=request['id']).delete()
580
581             except Exception, e:
582                 request_status['SFA authority'] = {'status': False, 'description': str(e)}
583
584         elif request['type'] == 'project':
585             try:
586                 hrn = request['authority_hrn'] + '.' + request['project_name']
587
588                 # Only hrn is required for Manifold Query 
589                 sfa_authority_params = {
590                     'authority_hrn'        : hrn
591                 }
592                 sfa_add_authority(wsgi_request, sfa_authority_params)
593                 request_status['SFA project'] = {'status': True }
594                 PendingProject.objects.get(id=request['id']).delete()
595                 
596                 # Add user as a PI of the project
597                 authority_add_pis(wsgi_request, hrn , request['user_hrn'])
598
599                 # Clear user's Credentials
600                 #sfa_user = sfa_get_user(wsgi_request, request['user_hrn'])
601                 clear_user_creds(wsgi_request,request['email'])
602
603             except Exception, e:
604                 request_status['SFA project'] = {'status': False, 'description': str(e)}
605
606         elif request['type'] == 'join':
607             try:
608                 # Add user as a PI of the project
609                 authority_add_pis(wsgi_request, request['authority_hrn'] , request['user_hrn'])
610
611                 request_status['SFA join'] = {'status': True }
612                 PendingJoin.objects.get(id=request['id']).delete()
613
614                 # Clear user's Credentials
615                 clear_user_creds(wsgi_request,request['email'])
616
617             except Exception, e:
618                 request_status['SFA join'] = {'status': False, 'description': str(e)+' - '+str(request)}
619         else:
620             request_status['other'] = {'status': False, 'description': 'unknown type of request'}
621         # XXX Remove from Pendings in database
622
623         status['%s__%s' % (request['type'], request['id'])] = request_status
624
625     return status
626
627 def validate_action(request, **kwargs):
628     ids = filter(None, kwargs['id'].split('/'))
629     status = portal_validate_request(request, ids)
630     json_answer = json.dumps(status)
631     return HttpResponse (json_answer, mimetype="application/json")
632
633
634 def reject_action(request, **kwargs):
635     ids = filter(None, kwargs['id'].split('/'))
636     status = portal_reject_request(request, ids)
637     json_answer = json.dumps(status)
638     return HttpResponse (json_answer, mimetype="application/json")
639
640
641 def portal_reject_request(wsgi_request, request_ids):
642     status = {}
643     # get the domain url    
644     current_site = Site.objects.get_current()
645     current_site = current_site.domain
646
647
648     if not isinstance(request_ids, list):
649         request_ids = [request_ids]
650
651     requests = get_request_by_id(request_ids)
652     for request in requests:
653         # type, id, timestamp, details, allowed -- MISSING: authority_hrn
654         # CAREFUL about details
655         # user  : first name, last name, email, password, keypair
656         # slice : number of nodes, type of nodes, purpose
657         
658         request_status = {}
659
660         if request['type'] == 'user':
661             try:
662                 request_status['SFA user'] = {'status': True }
663                 # getting user email based on id 
664                 ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
665                 for user in PendingUser.objects.raw('SELECT * FROM portal_pendinguser WHERE id = %s', [request['id']]):
666                     user_email= user.email
667                     first_name = user.first_name
668                     last_name = user.last_name
669
670                 ctx = {
671                     'first_name'    : first_name, 
672                     'last_name'     : last_name, 
673                     'portal_url'    : current_site,
674                     }
675                 try:
676                     theme.template_name = 'user_request_denied.txt'
677                     text_content = render_to_string(theme.template, ctx)
678                     theme.template_name = 'user_request_denied.html'
679                     html_content = render_to_string(theme.template, ctx)
680                     theme.template_name = 'email_default_sender.txt'
681                     sender =  render_to_string(theme.template, ctx)
682                     sender = sender.replace('\n', '')
683                                
684                     subject = 'User request denied.'
685
686                     msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
687                     msg.attach_alternative(html_content, "text/html")
688                     msg.send()
689                 except Exception as e:
690                     logger.error("Failed to send email, please check the mail templates and the SMTP configuration of your server")   
691
692                 # removing from Django portal_pendinguser
693                 PendingUser.objects.get(id=request['id']).delete()
694             
695                 delete_local_user(wsgi_request, user_email)
696             except Exception, e:
697                 request_status['SFA authority'] = {'status': False, 'description': str(e)}
698                       
699         elif request['type'] == 'slice':
700             request_status['SFA slice'] = {'status': True } 
701
702             # getting user email based on id 
703             ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
704             for user in PendingSlice.objects.raw('SELECT * FROM portal_pendingslice WHERE id = %s', [request['id']]):
705                 user_email= user.type_of_nodes # XXX type_of_nodes field contains the email [shd be renamed in DB]
706                 slice_name = user.slice_name
707                 purpose = user.purpose
708                 url = user.number_of_nodes
709
710             ctx = {
711                 'slice_name': slice_name,
712                 'purpose': purpose,
713                 'url': url,
714                 'portal_url': current_site,
715                 }
716             try:
717                 theme.template_name = 'slice_request_denied.txt'
718                 text_content = render_to_string(theme.template, ctx)
719                 theme.template_name = 'slice_request_denied.html'
720                 html_content = render_to_string(theme.template, ctx)
721                 theme.template_name = 'email_default_sender.txt'
722                 sender =  render_to_string(theme.template, ctx)
723                 sender = sender.replace('\n', '')
724                                
725                 subject = 'Slice request denied.'
726
727                 msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
728                 msg.attach_alternative(html_content, "text/html")
729                 msg.send()
730             except Exception as e:
731                 logger.error("Failed to send email, please check the mail templates and the SMTP configuration of your server")
732                       
733             PendingSlice.objects.get(id=request['id']).delete()
734
735         elif request['type'] == 'authority':
736             request_status['SFA authority'] = {'status': True }
737             
738             # getting user email based on id 
739             ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
740             for user in PendingAuthority.objects.raw('SELECT * FROM portal_pendingauthority WHERE id = %s', [request['id']]):
741                 user_email= user.address_line1 # XXX address_line1 field contains the email [shd be renamed in DB]
742                 site_name = user.site_name
743                 city = user.address_city
744                 country = user.address_country
745                 short_name = user.site_abbreviated_name
746                 url = user.site_url
747
748             ctx = { 
749                 'site_name': site_name,
750                 'short_name': short_name,
751                 'url': url,
752                 'city': city,
753                 'country': country,                          
754                 'portal_url'    : current_site,
755                 }
756                 
757             try:
758                 theme.template_name = 'authority_request_denied.txt'
759                 text_content = render_to_string(theme.template, ctx)
760                 theme.template_name = 'authority_request_denied.html'
761                 html_content = render_to_string(theme.template, ctx)
762                 theme.template_name = 'email_default_sender.txt'
763                 sender =  render_to_string(theme.template, ctx)
764                 sender = sender.replace('\n', '')
765                 subject = 'Authority request denied.'
766                 msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
767                 msg.attach_alternative(html_content, "text/html")
768                 msg.send()
769             except Exception as e:
770                 logger.error("Failed to send email, please check the mail templates and the SMTP configuration of your server")
771
772             PendingAuthority.objects.get(id=request['id']).delete()
773
774         # XXX TMP we should send an email to the user to inform him/her
775         elif request['type'] == 'project':
776             request_status['SFA project'] = {'status': True }
777             PendingProject.objects.get(id=request['id']).delete()
778
779         elif request['type'] == 'join':
780             request_status['SFA join'] = {'status': True }
781             PendingJoin.objects.get(id=request['id']).delete()
782
783         status['%s__%s' % (request['type'], request['id'])] = request_status
784
785     return status
786
787 # Django and ajax
788 # http://djangosnippets.org/snippets/942/
789
790
791
792 #-------------------------------------------------------------------------------
793 # REQUESTS - Slices
794 #-------------------------------------------------------------------------------
795
796 def create_slice(wsgi_request, request):
797     """
798     Arguments:
799         wsgi_request (~ WSGIRequest) : 
800         request (dict) : the slice request in our own dict format
801
802     Raises:
803         Exception
804     """
805     hrn = "%s.%s" % (request['authority_hrn'], request['slice_name'])
806     # XXX tmp sfa dependency
807     from sfa.util.xrn import Xrn 
808     urn = Xrn(hrn, request['type']).get_urn()
809     
810     # Add User to Slice if we have the user_hrn in pendingslice table
811     user_hrn = request.get('user_hrn', None)
812     user_hrns = list([user_hrn]) if user_hrn else list()
813    
814     # CACHE PB with fields
815     page = Page(wsgi_request)
816     metadata = page.get_metadata()
817     user_md = metadata.details_by_object('user')
818     user_fields = [column['name'] for column in user_md['column']]
819
820     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
821     #user_query  = Query().get('myslice:user').select('user_hrn','user_email').filter_by('user_hrn','==',user_hrn)
822     user_query  = Query().get('myslice:user').select(user_fields).filter_by('user_hrn','==',user_hrn)
823     user_details_sfa = execute_admin_query(wsgi_request, user_query)
824     if not user_details_sfa:
825         raise Exception, "User %s doesn't exist, validate user before validating slice" % user_hrn
826     for user in user_details_sfa:
827         user_email = user['user_email']
828
829     # XXX LOIC Quick fix because this is totally inconsistent
830     if not 'number_of_nodes' in request:
831         request['number_of_nodes']=""
832
833     # XXX We should create a slice with Manifold terminology
834     slice_params = {
835         'slice_hrn'        : hrn, 
836         'slice_urn'        : urn,
837         'slice_type'       : request['type'],
838         'url'              : request['number_of_nodes'],
839         'users'            : user_hrns,
840         'slice_enabled'    : True
841     }
842     # ignored in request: id, timestamp,  number_of_nodes, type_of_nodes, purpose
843
844     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
845     query = Query.create('myslice:slice').set(slice_params).select('slice_hrn')
846     results = execute_query(wsgi_request, query)
847     if not results:
848         raise Exception, "Could not create %s. Already exists ?" % slice_params['hrn']
849     else:
850         clear_user_creds(wsgi_request,user_email)
851         # log user activity
852         activity.slice.validate(request, { "slice" : hrn })
853         try:
854             theme.template_name = 'slice_request_validated.txt'
855             text_content = render_to_string(theme.template, request)
856             theme.template_name = 'slice_request_validated.html'
857             html_content = render_to_string(theme.template, request)
858         
859             theme.template_name = 'email_default_sender.txt'
860             sender =  render_to_string(theme.template, request)
861             sender = sender.replace('\n', '')
862
863             subject = 'Slice request validated'
864
865             msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
866             msg.attach_alternative(html_content, "text/html")
867             msg.send()
868         except Exception as e:
869             logger.error("Failed to send email, please check the mail templates and the SMTP configuration of your server")
870        
871     return results
872
873 def create_pending_slice(wsgi_request, request, email):
874     """
875     """
876
877     # Insert an entry in the PendingSlice table
878     s = PendingSlice(
879         slice_name      = request['slice_name'],
880         user_hrn        = request['user_hrn'],
881         authority_hrn   = request['authority_hrn'],
882         number_of_nodes = request['url'], # field needs to be renamed
883         purpose         = request['purpose'],
884         type_of_nodes   = request['email'] # field needs to be renamed 
885     )
886     s.save()
887
888     try:
889         # Send an email: the recipients are the PI of the authority
890         recipients = authority_get_pi_emails(wsgi_request, request['authority_hrn'])
891
892         theme.template_name = 'slice_request_email.txt' 
893         text_content = render_to_string(theme.template, request)
894     
895         theme.template_name = 'slice_request_email.html' 
896         html_content = render_to_string(theme.template, request)
897     
898         theme.template_name = 'slice_request_email_subject.txt'
899         subject = render_to_string(theme.template, request)
900         subject = subject.replace('\n', '')
901     
902         sender = email
903         msg = EmailMultiAlternatives(subject, text_content, sender, recipients)
904         msg.attach_alternative(html_content, "text/html")
905         msg.send()
906     except Exception as e:
907         logger.error("Failed to send email, please check the mail templates and the SMTP configuration of your server")
908
909
910 def create_pending_project(wsgi_request, request):
911     """
912     """
913
914     # Insert an entry in the PendingProject table
915     s = PendingProject(
916         project_name    = request['project_name'],
917         user_hrn        = request['user_hrn'],
918         email           = request['email'],
919         authority_hrn   = request['authority_hrn'],
920         purpose         = request['purpose'],
921     )
922     s.save()
923
924 def create_pending_join(wsgi_request, request):
925     """
926     """
927
928     # Insert an entry in the PendingJoin table
929     s = PendingJoin(
930         user_hrn        = request['user_hrn'],
931         email           = request['email'],
932         project_name    = request['project_name'],
933         authority_hrn   = request['authority_hrn'],
934     )
935     s.save()
936
937
938 #     try:
939 #         # Send an email: the recipients are the PI of the authority
940 #         recipients = authority_get_pi_emails(wsgi_request, request['authority_hrn'])
941
942 #         theme.template_name = 'slice_request_email.txt' 
943 #         text_content = render_to_string(theme.template, request)
944 #     
945 #         theme.template_name = 'slice_request_email.html' 
946 #         html_content = render_to_string(theme.template, request)
947 #     
948 #         theme.template_name = 'slice_request_email_subject.txt'
949 #         subject = render_to_string(theme.template, request)
950 #         subject = subject.replace('\n', '')
951 #     
952 #         sender = email
953 #         msg = EmailMultiAlternatives(subject, text_content, sender, recipients)
954 #         msg.attach_alternative(html_content, "text/html")
955 #         msg.send()
956 #     except Exception, e:
957 #         print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
958
959
960 #-------------------------------------------------------------------------------
961 # REQUESTS - Users
962 #-------------------------------------------------------------------------------
963
964 def manifold_add_reference_user_accounts(wsgi_request, request):
965     """When a new user is created, add reference accounts to the reference platform.
966     """
967     # XXX XXX XXX The rest of this function has to be checked XXX XXX XXX
968
969     # Retrieve user information
970     user_query  = Query().get('local:user')             \
971         .select('user_id', 'config', 'email', 'status') \
972         .filter_by('email', '==', request['email'])
973     user_details = execute_admin_query(wsgi_request, user_query)
974
975     # USER MAIN ACCOUNT != reference
976     #print 'USER MAIN ACCOUNT != reference'
977     list_accounts_query = Query().get('local:account')              \
978         .select('user_id', 'platform_id', 'auth_type', 'config')    \
979         .filter_by('user_id', '==', user_details[0]['user_id'])     \
980         .filter_by('auth_type', '!=', 'reference')
981     list_accounts = execute_admin_query(wsgi_request, list_accounts_query)
982
983     # XXX main_platform is being erased several times ???
984     for account in list_accounts:
985         main_platform_query = Query().get('local:platform')         \
986             .select('platform_id', 'platform')                      \
987             .filter_by('platform_id', '==', account['platform_id'])
988         main_platform = execute_admin_query(wsgi_request, main_platform_query)
989
990     # Add reference accounts on SFA enabled platforms
991     platforms_query = Query().get('local:platform') \
992         .filter_by('disabled', '==', '0')           \
993         .filter_by('gateway_type', '==', 'sfa')     \
994         .select('platform_id', 'gateway_type')
995     platforms = execute_admin_query(wsgi_request, platforms_query)
996     for platform in platforms:
997         #print "add reference to platform ",platform
998         manifold_account_params = {
999             'user_id'       : user_details[0]['user_id'],
1000             'platform_id'   : platform['platform_id'],
1001             'auth_type'     : 'reference',
1002             'config'        : '{"reference_platform": "' + main_platform[0]['platform'] + '"}',
1003         }
1004         manifold_add_account(wsgi_request, manifold_account_params)
1005
1006 def sfa_create_user(wsgi_request, request, namespace = None, as_admin = False):
1007     """
1008     Arguments:
1009         wsgi_request (~ WSGIRequest) : 
1010         request (dict) : the user request in our own dict format
1011
1012     Raises:
1013         Exception
1014     """
1015     from sfa.util.xrn import Xrn 
1016
1017     auth_pi = request.get('pi', None)
1018     auth_pi = list([auth_pi]) if auth_pi else list()
1019
1020     # We create a user request with Manifold terminology
1021     sfa_user_params = {
1022         'user_hrn'          : request['user_hrn'],
1023         'user_email'        : request['email'],
1024         'user_urn'          : Xrn(request['user_hrn'], request['type']).get_urn(),
1025         'user_type'         : request['type'],
1026         'keys'              : request['public_key'],
1027         'user_first_name'   : request['first_name'],
1028         'user_last_name'    : request['last_name'],
1029         'pi_authorities'    : auth_pi,
1030         'user_enabled'      : True
1031     }
1032
1033     if namespace is not None:
1034         query = Query.create('%s:user' % namespace).set(sfa_user_params).select('user_hrn')
1035     else:
1036         # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
1037         query = Query.create('myslice:user').set(sfa_user_params).select('user_hrn')
1038
1039     if as_admin:
1040         results = execute_admin_query(wsgi_request, query)
1041     else:
1042         results = execute_query(wsgi_request, query)
1043
1044     if not results:
1045         raise Exception, "Could not create %s. Already exists ?" % sfa_user_params['user_hrn']
1046     else:
1047         try:
1048             theme.template_name = 'user_request_validated.txt'
1049             text_content = render_to_string(theme.template, request)
1050             theme.template_name = 'user_request_validated.html'
1051             html_content = render_to_string(theme.template, request)
1052         
1053             theme.template_name = 'email_default_sender.txt'
1054             sender =  render_to_string(theme.template, request)
1055             sender = sender.replace('\n', '')
1056
1057
1058             subject = 'User validated'
1059
1060             msg = EmailMultiAlternatives(subject, text_content, sender, [request['email']])
1061             msg.attach_alternative(html_content, "text/html")
1062             msg.send()
1063         except Exception as e:
1064             logger.error("Failed to send email, please check the mail templates and the SMTP configuration of your server")
1065
1066     return results
1067
1068 def iotlab_create_user (wsgi_request, request, namespace = None, as_admin=False):
1069    
1070     import requests
1071     import time
1072     from requests.auth import HTTPBasicAuth
1073    
1074     engine = ConfigEngine() 
1075     URL_REST = engine.iotlab_url()
1076     LOGIN_ADMIN = engine.iotlab_admin_user()
1077     PASSWORD_ADMIN = engine.iotlab_admin_password()
1078
1079     auth = HTTPBasicAuth(LOGIN_ADMIN,PASSWORD_ADMIN)
1080     headers = {'content-type': 'application/json'}
1081
1082     for user in PendingUser.objects.raw('SELECT * FROM portal_pendinguser WHERE email = %s', [request['email']]):
1083         password= user.password
1084
1085
1086     iotlab_user_params = {
1087         "type"          : "SA",
1088         #"login"         : request['email'], #auto generated by iotlab
1089         "password"      : password,
1090         "firstName"     : request['first_name'],
1091         "lastName"      : request['last_name'],
1092         "email"         : request['email'],
1093         "structure"     : request['authority_hrn'],
1094         "city"          : "N/A",
1095         "country"       : "N/A",
1096         "sshPublicKey"  : request['public_key'],
1097         "motivations"   : "SFA federation",
1098     }    
1099    
1100     iotlab_user_params1 = json.dumps(iotlab_user_params)
1101     r=requests.post(url=URL_REST, data=iotlab_user_params1, headers=headers, auth=auth)
1102     logger.info('Create iotlab user : {} {}'.format(r.status_code, r.text))
1103     return r.text
1104
1105 def create_user(wsgi_request, request, namespace = None, as_admin = False):
1106     # XXX This has to be stored centrally
1107     USER_STATUS_ENABLED = 2
1108
1109     # NOTE : if we were to create a user directly (just like we create slices,
1110     # we would have to perform the steps in create_pending_user too
1111
1112     # Add the user to the SFA registry
1113     sfa_create_user(wsgi_request, request, namespace, as_admin)
1114
1115     # Update Manifold user status
1116     manifold_update_user(wsgi_request, request['email'], {'status': USER_STATUS_ENABLED})
1117
1118     # Add reference accounts for platforms
1119     manifold_add_reference_user_accounts(wsgi_request, request)
1120
1121     # Add the user to iotlab portal if theme is set to onelab
1122     if theme.theme == 'onelab':
1123         iotlab_create_user (wsgi_request, request)
1124
1125 def create_pending_user(wsgi_request, request, user_detail):
1126     """
1127     """
1128
1129     # Insert an entry in the PendingUser table
1130     b = PendingUser(
1131         first_name    = request['first_name'],
1132         last_name     = request['last_name'],
1133         authority_hrn = request['authority_hrn'],
1134         email         = request['email'],
1135         password      = request['password'],
1136         public_key    = request['public_key'],
1137         private_key   = request['private_key'],
1138         user_hrn      = request['user_hrn'],
1139         pi            = request['pi'],
1140         email_hash    = request['email_hash'],
1141         status        = 'False',
1142     )
1143     b.save()
1144     # sends email to user to activate the email
1145     theme.template_name = 'activate_user.html'
1146     html_content = render_to_string(theme.template, request)
1147     theme.template_name = 'activate_user.txt'
1148     text_content = render_to_string(theme.template, request)
1149     theme.template_name = 'activate_user_email_subject.txt'
1150     subject = render_to_string(theme.template, request)
1151     subject = subject.replace('\n', '')
1152     theme.template_name = 'email_default_sender.txt'
1153     sender =  render_to_string(theme.template, request)
1154     sender = sender.replace('\n', '')
1155     recipient = [request['email']]
1156     #recipient = recipient.append(request['email'])
1157
1158     msg = EmailMultiAlternatives(subject, text_content, sender, recipient)
1159     msg.attach_alternative(html_content, "text/html")
1160     msg.send()
1161    
1162     # saves the user to django auth_user table [needed for password reset]
1163     user = User.objects.create_user(request['email'], request['email'], request['password'])
1164
1165     # Creating a manifold user
1166     user_id = manifold_add_user(wsgi_request, request)
1167
1168     # Creating a Manifold account on the MySlice platform
1169     # Note the JSON representation of public and private keys already includes quotes
1170     account_config = {
1171         'user_hrn'          : request['user_hrn'],
1172         'user_public_key'   : request['public_key'],
1173     }
1174     if request['private_key']:
1175         account_config['user_private_key'] = request['private_key']
1176
1177     user_id = user_detail['user_id'] + 1 # the user_id for the newly created user in local:user
1178
1179     # XXX TODO: Require a myslice platform
1180     # ALERT: this will disapear with ROUTERV2 of Manifold
1181     # We have to consider the case where several registries can be used
1182     # Removed hardcoded platform = 5
1183     # This platform == 'myslice' is a TMP FIX !!
1184     try:
1185         reg_platform_query = Query().get('local:platform') \
1186             .filter_by('platform', '==', 'myslice')           \
1187             .select('platform_id')
1188         reg_platform = execute_admin_query(wsgi_request, reg_platform_query)
1189
1190         reg_platform_id = reg_platform[0]['platform_id']
1191         account_params = {
1192             'platform_id'   : reg_platform_id, # XXX ALERT !!
1193             'user_id'       : user_id, 
1194             'auth_type'     : request['auth_type'], 
1195             'config'        : json.dumps(account_config),
1196         }
1197         manifold_add_account(wsgi_request, account_params)
1198     except Exception as e:
1199         logger.error("Failed creating manifold account on platform {} for user: {}".format('myslice', request['email']))
1200
1201     try:
1202         # Send an email: the recipients are the PI of the authority
1203         # If No PI is defined for this Authority, send to a default email (different for each theme)
1204         recipients = authority_get_pi_emails(wsgi_request, request['authority_hrn'])
1205         
1206         theme.template_name = 'user_request_email.html'
1207         html_content = render_to_string(theme.template, request)
1208  
1209         theme.template_name = 'user_request_email.txt'
1210         text_content = render_to_string(theme.template, request)
1211     
1212         theme.template_name = 'user_request_email_subject.txt'
1213         subject = render_to_string(theme.template, request)
1214         subject = subject.replace('\n', '')
1215     
1216         theme.template_name = 'email_default_sender.txt'
1217         sender =  render_to_string(theme.template, request)
1218         sender = sender.replace('\n', '')
1219     
1220         msg = EmailMultiAlternatives(subject, text_content, sender, recipients)
1221         msg.attach_alternative(html_content, "text/html")
1222         msg.send()
1223     except Exception, e:
1224         logger.error("Failed to send email, please check the mail templates and the SMTP configuration of your server")
1225         import traceback
1226         logger.error(traceback.format_exc())