- reasons for asking an account; rnp as a catch-all island; changing email messages...
[myslice.git] / portal / actions.py
1 from django.http                import HttpResponse
2 from manifold.core.query        import Query
3 from manifoldapi.manifoldapi    import execute_query,execute_admin_query
4 from portal.models              import PendingUser, PendingSlice, PendingAuthority
5 import json
6
7 from django.contrib.auth.models import User
8 from django.template.loader     import render_to_string
9 from django.core.mail           import EmailMultiAlternatives, send_mail
10
11 from myslice.theme              import ThemeView
12
13 theme = ThemeView()
14
15 # Thierry: moving this right into the code so 
16 # most people can use myslice without having to install sfa
17 # XXX tmp sfa dependency, should be moved to SFA gateway
18 #from sfa.util.xrn                import Xrn 
19
20
21 # Get the list of authorities
22
23 def authority_get_pis(request, authority_hrn):
24     query = Query.get('authority').filter_by('authority_hrn', '==', authority_hrn).select('pi_users')
25     results = execute_admin_query(request, query)
26     print "authority_get_pis = %s" % results
27     # NOTE: temporarily commented. Because results is giving empty list. 
28     # Needs more debugging
29     #if not results:
30     #    raise Exception, "Authority not found: %s" % authority_hrn
31     #result, = results
32     #return result['pi_users']
33     return results
34
35 def authority_get_pi_emails(request, authority_hrn):
36     pi_users = authority_get_pis(request,authority_hrn)
37     print "pi_users = %s" % pi_users
38
39     if any(pi['pi_users'] == None or not pi['pi_users']  for pi in pi_users):
40         #theme.template_name = 'email_default_recipients.txt' 
41         #default_email = render_to_string(theme.template, request)
42         #default_email = default_email.replace('\n', '')
43         #return default_email
44         # the above doesn't work
45         return ['support@myslice.info']
46     else:
47         pi_user_hrns = [ hrn for x in pi_users for hrn in x['pi_users'] ]
48         query = Query.get('user').filter_by('user_hrn', 'included', pi_user_hrns).select('user_email')
49         results = execute_admin_query(request, query)
50         return [result['user_email'] for result in results]
51
52 #clear user credentials
53 def clear_user_creds(request, user_email):
54     try:
55         user_query  = Query().get('local:user').filter_by('email', '==', user_email).select('user_id','email','password','config')
56         user_details = execute_admin_query(request, user_query)
57     
58         # getting the user_id from the session
59         for user_detail in user_details:
60             user_id = user_detail['user_id']
61             user_email = user_detail['email']
62     
63         account_query  = Query().get('local:account').filter_by('user_id', '==', user_id).select('user_id','platform_id','auth_type','config')
64         account_details = execute_admin_query(request, account_query)
65     
66         platform_query  = Query().get('local:platform').select('platform_id','platform')
67         platform_details = execute_admin_query(request, platform_query)
68     
69         for account_detail in account_details:
70             for platform_detail in platform_details:
71                 if platform_detail['platform_id'] == account_detail['platform_id']:
72                     if 'myslice' in platform_detail['platform']:
73                         account_config = json.loads(account_detail['config'])
74                         user_cred = account_config.get('delegated_user_credential','N/A')
75                         if 'N/A' not in user_cred:
76                             user_hrn = account_config.get('user_hrn','N/A')
77                             user_pub_key = json.dumps(account_config.get('user_public_key','N/A'))
78                             user_priv_key = json.dumps(account_config.get('user_private_key','N/A'))
79                             updated_config = '{"user_public_key":'+ user_pub_key + ', "user_private_key":'+ user_priv_key + ', "user_hrn":"'+ user_hrn + '"}'
80                             user_params = { 'config': updated_config}
81                             manifold_update_account(request, user_id,user_params)
82                             return user_email
83                         else:
84                             return None
85
86     except Exception,e:
87         print "Exception in actions.py in clear_user_creds %s" % e
88         return None
89
90 def is_pi(wsgi_request, user_hrn, authority_hrn):
91     # XXX could be done in a single query !
92
93     # select pi_authorities from user where user_hrn == "ple.upmc.jordan_auge"
94     query = Query.get('user').filter_by('user_hrn', '==', user_hrn).select('pi_authorities')
95     results = execute_admin_query(wsgi_request, query)
96     if not results:
97         # XXX Warning ?
98         return False
99     result = results[0]
100     user_authority_hrns = result.get('pi_authorities', [])
101     return authority_hrn in user_authority_hrns
102     
103 # SFA get record
104
105 def sfa_get_user(request, user_hrn, pub):
106     query_sfa_user = Query.get('user').filter_by('user_hrn', '==', user_hrn)
107     result_sfa_user = execute_query(request, query_sfa_user)
108     return result_sfa_user                        
109
110 def sfa_update_user(request, user_hrn, user_params):
111     # user_params: keys [public_key] 
112     if 'email' in user_params:
113         user_params['user_email'] = user_params['email']
114     query = Query.update('user').filter_by('user_hrn', '==', user_hrn).set(user_params).select('user_hrn')
115     results = execute_query(request,query)
116     return results
117
118 def sfa_add_authority(request, authority_params):
119     query = Query.create('authority').set(authority_params).select('authority_hrn')
120     results = execute_query(request, query)
121     print "sfa_add_auth results=",results
122     if not results:
123         raise Exception, "Could not create %s. Already exists ?" % authority_params['hrn']
124     return results
125
126 def sfa_add_user_to_slice(request, user_hrn, slice_params):
127 # UPDATE myslice:slice SET researcher=['ple.upmc.jordan_auge','ple.inria.thierry_parmentelat','ple.upmc.loic_baron','ple.upmc.ciro_scognamiglio','ple.upmc.mohammed-yasin_rahman','ple.upmc.azerty'] where slice_hrn=='ple.upmc.myslicedemo'
128     query_current_users = Query.get('slice').select('user').filter_by('slice_hrn','==',slice_params['hrn'])
129     results_current_users = execute_query(request, query_current_users)
130     slice_params['researcher'] = slice_params['researcher'] | results_current_users
131     query = Query.update('slice').filter_by('user_hrn', '==', user_hrn).set(slice_params).select('slice_hrn')
132     results = execute_query(request, query)
133 # Also possible but not supported yet
134 # UPDATE myslice:user SET slice=['ple.upmc.agent','ple.upmc.myslicedemo','ple.upmc.tophat'] where user_hrn=='ple.upmc.azerty'
135     if not results:
136         raise Exception, "Could not create %s. Already exists ?" % slice_params['hrn']
137     return results
138
139 # Propose hrn
140
141 def manifold_add_user(wsgi_request, request):
142     """Add a Manifold user corresponding to a user request.
143
144     Args:
145         wsgi_request: a WSGIRequest instance
146         request (dict): a dictionary containing the user request built from the
147             form.
148
149     Returns:
150         The user_id of the inserted user.
151
152     Raises:
153         ?
154     
155     """
156
157     authority_hrn = request['authority_hrn']
158     request['authority_hrn'] = authority_hrn.split(".")[0]
159
160     USER_CONFIG = '{"firstname": "%(first_name)s", "lastname": "%(last_name)s", "authority": "%(authority_hrn)s"}'
161
162     user_params = {
163         'email'     : request['username'],
164         'password'  : request['password'],
165         'config'    : USER_CONFIG % request,
166         'status'    : 1,
167     }
168
169     request['authority_hrn'] = authority_hrn
170
171     query = Query.create('local:user').set(user_params).select('email')
172     results = execute_admin_query(request, query)
173     if not results:
174         raise Exception, "Failed creating manifold user: %s" % user_params['email']
175     result = results[0]
176     return result['email']
177
178 def manifold_update_user(request, email, user_params):
179     # user_params: password, config e.g., 
180     query = Query.update('local:user').filter_by('email', '==', email).set(user_params).select('email')
181     results = execute_admin_query(request,query)
182     # NOTE: results remains empty and goes to Exception. However, it updates the manifold DB.
183     # That's why I commented the exception part. -- Yasin 
184     #if not results:
185     #    raise Exception, "Failed updating manifold user: %s" % user_params['email']
186     #result, = results
187     return results
188
189 def manifold_add_account(request, account_params):
190     query = Query.create('local:account').set(account_params).select(['user', 'platform'])
191     results = execute_admin_query(request,query)
192     if not results:
193         raise Exception, "Failed creating manifold account on platform %s for user: %s" % (account_params['platform'], account_params['user'])
194     result, = results
195     return result['user_id']
196
197 def manifold_update_account(request,user_id,account_params):
198     # account_params: config
199     query = Query.update('local:account').filter_by('platform', '==', 'myslice').filter_by('user_id', '==', user_id).set(account_params).select('user_id')
200     results = execute_admin_query(request,query)
201     return results
202
203 #explicitly mention the platform_id
204 def manifold_delete_account(request, platform_id, user_id, account_params):
205     query = Query.delete('local:account').filter_by('platform_id', '==', platform_id).filter_by('user_id', '==', user_id).set(account_params).select('user_id')
206     results = execute_admin_query(request,query)
207     return results
208
209
210 #not tested
211 def manifold_add_platform(request, platform_params):
212     query = Query.create('local:platform').set(platform_params).select(['user', 'platform'])
213     results = execute_admin_query(request,query)
214     if not results:
215         raise Exception, "Failed creating manifold platform %s for user: %s" % (platform_params['platform'], platform_params['user'])
216     result, = results
217     return result['platform_id']
218
219
220 def make_request_user(user):
221     request = {}
222     request['type']          = 'user'
223     request['id']            = user.id
224     request['timestamp']     = user.created # XXX in DB ?
225     request['authority_hrn'] = user.authority_hrn
226     request['first_name']    = user.first_name
227     request['last_name']     = user.last_name
228     request['email']         = user.email
229     request['login']         = user.login
230     request['user_hrn']      = user.user_hrn
231     request['public_key']    = user.public_key
232     request['private_key']   = user.private_key
233     request['username']      = user.login
234     return request
235
236 def make_request_slice(slice):
237     request = {}
238     request['type'] = 'slice'
239     request['id'] = slice.id
240     request['user_hrn'] = slice.user_hrn
241     request['timestamp'] = slice.created
242     request['authority_hrn'] = slice.authority_hrn
243     request['slice_name'] = slice.slice_name
244     request['number_of_nodes'] = slice.number_of_nodes
245     request['type_of_nodes'] = slice.type_of_nodes
246     request['purpose'] = slice.purpose
247     return request
248
249 def make_request_authority(authority):
250     request = {}
251     request['type']                  = 'authority'
252     request['id']                    = authority.id
253     request['site_name']             = authority.site_name
254     request['site_latitude']         = authority.site_latitude
255     request['site_longitude']        = authority.site_longitude
256     request['site_url']              = authority.site_url
257     request['site_authority']        = authority.site_authority
258     request['site_abbreviated_name'] = authority.site_abbreviated_name
259     request['address_line1']         = authority.address_line1
260     request['address_line2']         = authority.address_line2
261     request['address_line3']         = authority.address_line3
262     request['address_city']          = authority.address_city
263     request['address_postalcode']    = authority.address_postalcode
264     request['address_state']         = authority.address_state
265     request['address_country']       = authority.address_country
266     request['authority_hrn']         = authority.authority_hrn
267     request['timestamp']             = authority.created
268     return request
269
270 def make_requests(pending_users, pending_slices, pending_authorities):
271     requests = []
272     for user in pending_users:
273         requests.append(make_request_user(user))
274     for slice in pending_slices:
275         requests.append(make_request_slice(slice))
276     for authority in pending_authorities:
277         requests.append(make_request_authority(authority))
278     return requests   
279
280 def get_request_by_id(ids):
281     sorted_ids = { 'user': [], 'slice': [], 'authority': [] }
282     for type__id in ids:
283         type, id = type__id.split('__')
284         sorted_ids[type].append(id)
285         
286     if not ids:
287         pending_users  = PendingUser.objects.all()
288         pending_slices = PendingSlice.objects.all()
289         pending_authorities = PendingAuthority.objects.all()
290     else:
291         pending_users  = PendingUser.objects.filter(id__in=sorted_ids['user']).all()
292         pending_slices = PendingSlice.objects.filter(id__in=sorted_ids['slice']).all()
293         pending_authorities = PendingAuthority.objects.filter(id__in=sorted_ids['authority']).all()
294
295     return make_requests(pending_users, pending_slices, pending_authorities)
296
297 def get_requests(authority_hrns=None):
298     print "get_request_by_authority auth_hrns = ", authority_hrns
299     if not authority_hrns:
300         ## get those pending users who have confirmed their emails
301         pending_users  = PendingUser.objects.filter(status__iexact = 'True')
302         pending_slices = PendingSlice.objects.all()
303         pending_authorities = PendingAuthority.objects.all()
304     else:
305         pending_users  = PendingUser.objects.filter(authority_hrn__in=authority_hrns).all()
306         pending_slices = PendingSlice.objects.filter(authority_hrn__in=authority_hrns).all()
307         pending_authorities = PendingAuthority.objects.filter(authority_hrn__in=authority_hrns).all()
308
309     return make_requests(pending_users, pending_slices, pending_authorities)
310
311 # XXX Is it in sync with the form fields ?
312
313 def portal_validate_request(wsgi_request, request_ids):
314     status = {}
315
316     if not isinstance(request_ids, list):
317         request_ids = [request_ids]
318
319     requests = get_request_by_id(request_ids)
320     for request in requests:
321         # type, id, timestamp, details, allowed -- MISSING: authority_hrn
322         # CAREFUL about details
323         # user  : first name, last name, email, password, keypair
324         # slice : number of nodes, type of nodes, purpose
325         
326         request_status = {}
327
328         if request['type'] == 'user':
329
330             try:
331                 create_user(wsgi_request, request)
332                 request_status['SFA user'] = {'status': True }
333                 PendingUser.objects.get(id=request['id']).delete()
334             except Exception, e:
335                  request_status['SFA user'] = {'status': False, 'description': str(e)}
336                        
337 #            user_params = {'status':2}
338 #            manifold_update_user(request, request['email'], user_params)
339
340             # MANIFOLD user should be added beforehand, during registration
341             #try:
342             #    manifold_user_params = { key: request[key] for key in MANIFOLD_USER_KEYS }
343             #    # XXX # manifold_add_user(manifold_user_params)
344             #    request_status['MySlice user'] = {'status': True }
345             #except Exception, e:
346             #    request_status['MySlice user'] = {'status': False, 'description': str(e)}
347
348             # XXX
349             #manifold_account_params = { key: request[key] for key in MANIFOLD_ACCOUNT_KEYS }
350             #manifold_add_account(manifold_account_params)
351             #request_status['MySlice testbed accounts'] = {'status': False }
352
353         elif request['type'] == 'slice':
354             try:
355                 create_slice(wsgi_request, request)
356                 request_status['SFA slice'] = {'status': True }
357                 PendingSlice.objects.get(id=request['id']).delete()
358
359             except Exception, e:
360                 request_status['SFA slice'] = {'status': False, 'description': str(e)}
361
362         elif request['type'] == 'authority':
363             try:
364                 #hrn = "%s.%s" % (request['authority_hrn'], request['site_authority'])
365                 hrn = request['site_authority']
366                 # XXX tmp sfa dependency
367                 from sfa.util.xrn import Xrn 
368                 urn = Xrn(hrn, request['type']).get_urn()
369                 
370                 # Only hrn is required for Manifold Query 
371                 sfa_authority_params = {
372                     'authority_hrn'        : hrn,
373                     #'authority_urn'        : urn,
374                     #'type'       : request['type'],
375                     #'pi'        : None,
376                     #'enabled'    : True
377                 }
378                 print "ADD Authority"
379                 sfa_add_authority(wsgi_request, sfa_authority_params)
380                 request_status['SFA authority'] = {'status': True }
381                 PendingAuthority.objects.get(id=request['id']).delete()
382
383             except Exception, e:
384                 request_status['SFA authority'] = {'status': False, 'description': str(e)}
385
386         # XXX Remove from Pendings in database
387
388         status['%s__%s' % (request['type'], request['id'])] = request_status
389
390     return status
391
392
393 def validate_action(request, **kwargs):
394     ids = filter(None, kwargs['id'].split('/'))
395     status = portal_validate_request(request, ids)
396     json_answer = json.dumps(status)
397     return HttpResponse (json_answer, mimetype="application/json")
398
399 # Django and ajax
400 # http://djangosnippets.org/snippets/942/
401
402
403
404 #-------------------------------------------------------------------------------
405 # REQUESTS - Slices
406 #-------------------------------------------------------------------------------
407
408 def create_slice(wsgi_request, request):
409     """
410     Arguments:
411         wsgi_request (~ WSGIRequest) : 
412         request (dict) : the slice request in our own dict format
413
414     Raises:
415         Exception
416     """
417     hrn = "%s.%s" % (request['authority_hrn'], request['slice_name'])
418     # XXX tmp sfa dependency
419     from sfa.util.xrn import Xrn 
420     urn = Xrn(hrn, request['type']).get_urn()
421     
422     # Add User to Slice if we have the user_hrn in pendingslice table
423     user_hrn = request.get('user_hrn', None)
424     user_hrns = list([user_hrn]) if user_hrn else list()
425     
426     user_email = request.get
427
428     # XXX We should create a slice with Manifold terminology
429     slice_params = {
430         'slice_hrn'        : hrn, 
431         'slice_urn'        : urn,
432         'slice_type'       : request['type'],
433         'users'            : user_hrns,
434         'slice_enabled'    : True
435     }
436     # ignored in request: id, timestamp,  number_of_nodes, type_of_nodes, purpose
437
438     query = Query.create('slice').set(slice_params).select('slice_hrn')
439     results = execute_query(wsgi_request, query)
440     if not results:
441         raise Exception, "Could not create %s. Already exists ?" % slice_params['hrn']
442     ## We do not store the email in pendingslice table. As a result receiver's email is unknown ##
443     ## Need modification in pendingslice table ###
444     #else:
445     #    subject = 'Slice created'
446     #    msg = 'A manager of your institution has validated your slice request. You can now add resources to the slice and start experimenting.'
447     #    send_mail(subject, msg, 'support@onelab.eu',['yasin.upmc@gmail.com'], fail_silently=False)
448        
449     return results
450
451 def create_pending_slice(wsgi_request, request, email):
452     """
453     """
454
455     # Insert an entry in the PendingSlice table
456     s = PendingSlice(
457         slice_name      = request['slice_name'],
458         user_hrn        = request['user_hrn'],
459         authority_hrn   = request['authority_hrn'],
460         number_of_nodes = request['exp_url'],
461         purpose         = request['purpose'],
462     )
463     s.save()
464
465     try:
466         # Send an email: the recipients are the PI of the authority
467         recipients = authority_get_pi_emails(wsgi_request, request['authority_hrn'])
468
469         theme.template_name = 'slice_request_email.txt' 
470         text_content = render_to_string(theme.template, request)
471     
472         theme.template_name = 'slice_request_email.html' 
473         html_content = render_to_string(theme.template, request)
474     
475         theme.template_name = 'slice_request_email_subject.txt'
476         subject = render_to_string(theme.template, request)
477         subject = subject.replace('\n', '')
478     
479         theme.template_name = 'email_default_sender.txt'
480         sender =  render_to_string(theme.template, request)
481         sender = sender.replace('\n', '')
482
483         #sender = email
484         msg = EmailMultiAlternatives(subject, text_content, sender, recipients)
485         msg.attach_alternative(html_content, "text/html")
486         msg.send()
487     except Exception, e:
488         print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
489
490 #-------------------------------------------------------------------------------
491 # REQUESTS - Users
492 #-------------------------------------------------------------------------------
493
494 def manifold_add_reference_user_accounts(wsgi_request, request):
495     """When a new user is created, add reference accounts to the reference platform.
496     """
497     # XXX XXX XXX The rest of this function has to be checked XXX XXX XXX
498
499     # Retrieve user information
500     user_query  = Query().get('local:user')             \
501         .select('user_id', 'config', 'email', 'status') \
502         .filter_by('email', '==', request['username'])
503     user_details = execute_admin_query(wsgi_request, user_query)
504
505     # USER MAIN ACCOUNT != reference
506     #print 'USER MAIN ACCOUNT != reference'
507     list_accounts_query = Query().get('local:account')              \
508         .select('user_id', 'platform_id', 'auth_type', 'config')    \
509         .filter_by('user_id', '==', user_details[0]['user_id'])     \
510         .filter_by('auth_type', '!=', 'reference')
511     list_accounts = execute_admin_query(wsgi_request, list_accounts_query)
512
513     # XXX main_platform is being erased several times ???
514     for account in list_accounts:
515         main_platform_query = Query().get('local:platform')         \
516             .select('platform_id', 'platform')                      \
517             .filter_by('platform_id', '==', account['platform_id'])
518         main_platform = execute_admin_query(wsgi_request, main_platform_query)
519
520     # Add reference accounts on SFA enabled platforms
521     platforms_query = Query().get('local:platform') \
522         .filter_by('disabled', '==', '0')           \
523         .filter_by('gateway_type', '==', 'sfa')     \
524         .select('platform_id', 'gateway_type')
525     platforms = execute_admin_query(wsgi_request, platforms_query)
526     for platform in platforms:
527         #print "add reference to platform ",platform
528         manifold_account_params = {
529             'user_id'       : user_details[0]['user_id'],
530             'platform_id'   : platform['platform_id'],
531             'auth_type'     : 'reference',
532             'config'        : '{"reference_platform": "' + main_platform[0]['platform'] + '"}',
533         }
534         manifold_add_account(wsgi_request, manifold_account_params)
535
536 def sfa_create_user(wsgi_request, request):
537     """
538     Arguments:
539         wsgi_request (~ WSGIRequest) : 
540         request (dict) : the user request in our own dict format
541
542     Raises:
543         Exception
544     """
545     from sfa.util.xrn import Xrn 
546
547     auth_pi = request.get('pi', None)
548     auth_pi = list([auth_pi]) if auth_pi else list()
549
550     # We create a user request with Manifold terminology
551     sfa_user_params = {
552         'user_hrn'          : request['user_hrn'],
553         'user_email'        : request['email'],
554         'user_urn'          : Xrn(request['user_hrn'], request['type']).get_urn(),
555         'user_type'         : request['type'],
556         'keys'              : request['public_key'],
557         'user_first_name'   : request['first_name'],
558         'user_last_name'    : request['last_name'],
559         'pi_authorities'    : auth_pi,
560         'user_enabled'      : True
561     }
562
563     query = Query.create('user').set(sfa_user_params).select('user_hrn')
564     results = execute_query(wsgi_request, query)
565     if not results:
566         raise Exception, "Could not create %s. Already exists ?" % sfa_user_params['user_hrn']
567     else:
568         subject = 'User validated'
569         msg = 'A manager of your institution has validated your account. You have now full user access to the portal.'
570         send_mail(subject, msg, 'support@fibre.org.br',[request['email']], fail_silently=False)       
571     return results
572
573 def ldap_create_user(wsgi_request, request, user_detail):
574     """
575     Populating LDAP withuser data - Edelberto 10/03/2014
576     """
577     # import needed modules
578     import ldap
579     import ldap.modlist as modlist
580
581     # Open a connection
582     # XXX We need to create this in settings
583     # ldap.open is deprecated!
584     #l = ldap.open("127.0.0.1")
585     l = ldap.initialize('ldap://127.0.0.1:389')
586
587     # you should  set this to ldap.VERSION2 if you're using a v2 directory
588     l.protocol_version = ldap.VERSION3
589
590     # Bind/authenticate with a user with apropriate rights to add objects
591     # XXX Now we set the force rootd but after we need to set this in settings file for could change the dn and password of root
592     l.simple_bind_s("cn=Manager,dc=br","fibre")
593
594     # The dn of our new entry/object
595     #dn="uid=addtest@uff.br,ou=people,o=uff,dc=br"
596
597     # we need to create the dn entry
598     # Receiving an email address, how can we split and mount it in DN format?
599     #mail = "debora@uff.br"
600     mail = request['email']
601     login = mail.split('@')[0]
602     org = mail.split('@')[1]
603     o = org.split('.')[-2]
604     dc = org.split('.')[-1]
605
606     # DN format to authenticate - IMPORTANT!
607     #FIBRE-BR format
608     dn = "uid="+mail+",ou=people,o="+o+",dc="+dc
609
610     # DEBUG
611     print "dn:"+dn
612     print request['password']
613
614     # Creating a unique uidNumber - Necessary for experiments
615     # Was defined to began in 100000
616     unique = int(user_detail['user_id']) + 100000
617     #unique = int(unique)
618     print unique
619
620     # A dict to help build the "body" of the object
621     attrs = {}
622     attrs['objectclass'] = ['person','inetOrgPerson','posixAccount','eduPerson','brPerson','schacPersonalCharacteristics','fibre', 'ldapPublicKey']
623     # XXX Converting all unicodes to string
624     attrs['uid'] = mail.encode('utf-8')
625     attrs['cn'] = request['first_name'].encode('latin1')
626     attrs['sn'] = request['last_name'].encode('latin1')
627     # XXX we need to set a unique uidNumber. How?
628     attrs['uidNumber'] = str(unique)
629     attrs['gidNumber'] = '500'
630     attrs['homeDirectory'] = "/home/"+org+"/"+mail
631     attrs['homeDirectory'] = attrs['homeDirectory'].encode('utf-8')
632     attrs['mail'] = mail.encode('utf-8')
633     attrs['eppn'] = mail.encode('utf8')
634     attrs['userPassword'] = request['password'].encode('utf-8')
635     attrs['sshPublicKey'] = request['public_key'].encode('utf-8')
636     # XXX We really set TRUE for those attributes? 
637     #attrs['userEnable'] = 'TRUE'
638     # set FALSE and change after when the user is validated
639     attrs['userEnable'] = 'FALSE'
640     attrs['omfAdmin'] = 'TRUE'
641
642     # Convert our dict to nice syntax for the add-function using modlist-module
643     ldif = modlist.addModlist(attrs)
644
645     # DEBUG
646     print attrs['userPassword']
647     print attrs['cn']
648     print attrs['sn']
649     print attrs['homeDirectory']
650     #print ldif
651
652     # Do the actual synchronous add-operation to the ldapserver
653     l.add_s(dn,ldif)
654
655     # Its nice to the server to disconnect and free resources when done
656     l.unbind_s()
657
658     return ldif
659
660 def ldap_modify_user(wsgi_request, request):
661     #Modify entries in an LDAP Directory
662
663     #Synchrounous modify
664     # import needed modules
665     import ldap
666     import ldap.modlist as modlist
667
668     # Open a connection
669     l = ldap.initialize("ldap://localhost:389/")
670
671     # Bind/authenticate with a user with apropriate rights to add objects
672     l.simple_bind_s("cn=Manager,dc=br","fibre")
673
674     # we need to create the dn entry
675     # Receiving an email address, how can we split and mount it in DN format?
676     #mail = "debora@uff.br"
677     mail = request['email']
678     login = mail.split('@')[0]
679     org = mail.split('@')[1]
680     o = org.split('.')[-2]
681     dc = org.split('.')[-1]
682
683     # DN format to authenticate - IMPORTANT!
684     #FIBRE-BR format
685     dn = "uid="+mail+",ou=people,o="+o+",dc="+dc
686
687     # The dn of our existing entry/object
688     #dn="uid=mario@uff.br,ou=people,o=uff,dc=br"
689
690     # Some place-holders for old and new values
691     old = {'userEnable':'FALSE'}
692     new = {'userEnable':'TRUE'}
693
694     # Convert place-holders for modify-operation using modlist-module
695     ldif = modlist.modifyModlist(old,new)
696
697     # Do the actual modification
698     l.modify_s(dn,ldif)
699
700     # Its nice to the server to disconnect and free resources when done
701     l.unbind_s()
702
703     return ldif
704
705 def create_user(wsgi_request, request):
706     
707     # XXX This has to be stored centrally
708     USER_STATUS_ENABLED = 2
709
710     # NOTE : if we were to create a user directly (just like we create slices,
711     # we would have to perform the steps in create_pending_user too
712     
713     # Edelberto - I put this more below
714     # Add the user to the SFA registry
715     #sfa_create_user(wsgi_request, request)
716
717     # Update Manifold user status
718     manifold_update_user(wsgi_request, request['username'], {'status': USER_STATUS_ENABLED})
719
720     # Add reference accounts for platforms
721     manifold_add_reference_user_accounts(wsgi_request, request)
722     
723 # Add the user to the SFA registry
724     sfa_create_user(wsgi_request, request)
725
726     '''   
727     # LDAP update user userEnabled = True
728     try:
729         mail = request['email']
730         login = mail.split('@')[0]
731         org = mail.split('@')[1]
732         o = org.split('.')[-2]
733         dc = org.split('.')[-1]
734         # To know if user is a LDAP user - Need to has a 'dc' identifier
735         if dc == 'br' or 'eu':
736             ldap_modify_user(wsgi_request, request)
737     except Exception, e:
738         "LDAP create user failed"
739     '''
740 def create_pending_user(wsgi_request, request, user_detail):
741     """
742     """
743
744     # Insert an entry in the PendingUser table
745     b = PendingUser(
746         first_name    = request['first_name'],
747         last_name     = request['last_name'],
748         authority_hrn = request['authority_hrn'],
749         email         = request['email'],
750         login         = request['username'],
751         password      = request['password'],
752         public_key    = request['public_key'],
753         private_key   = request['private_key'],
754         user_hrn      = request['user_hrn'],
755         pi            = request['pi'],
756         email_hash    = request['email_hash'],
757         reasons       = request['reasons'],
758         status        = 'False',
759     )
760     b.save()
761
762     # sends email to user to activate the email
763     theme.template_name = 'activate_user.html'
764     html_content = render_to_string(theme.template, request)
765     theme.template_name = 'activate_user.txt'
766     text_content = render_to_string(theme.template, request)
767     theme.template_name = 'activate_user_email_subject.txt'
768     subject = render_to_string(theme.template, request)
769     subject = subject.replace('\n', '')
770     #sender = 'support@myslice.info'
771     theme.template_name = 'email_default_sender.txt'
772     sender =  render_to_string(theme.template, request)
773     sender = sender.replace('\n', '')
774     recipient = [request['email']]
775     #recipient = recipient.append(request['email'])
776
777     msg = EmailMultiAlternatives(subject, text_content, sender, recipient)
778     msg.attach_alternative(html_content, "text/html")
779     msg.send()
780    
781     # saves the user to django auth_user table [needed for password reset]
782     user = User.objects.create_user(request['username'], request['email'], request['password'])
783
784     # Creating a manifold user
785     user_id = manifold_add_user(wsgi_request, request)
786
787     # Creating a Manifold account on the MySlice platform
788     # Note the JSON representation of public and private keys already includes quotes
789     account_config = {
790         'user_hrn'          : request['user_hrn'],
791         'user_public_key'   : request['public_key'],
792     }
793     if request['private_key']:
794         account_config['user_private_key'] = request['private_key']
795
796     user_id = user_detail['user_id'] + 1 # the user_id for the newly created user in local:user
797
798     # XXX TODO: Require a myslice platform
799     # ALERT: this will disapear with ROUTERV2 of Manifold
800     # We have to consider the case where several registries can be used
801     # Removed hardcoded platform = 5
802     # This platform == 'myslice' is a TMP FIX !!
803     try:
804         reg_platform_query = Query().get('local:platform') \
805             .filter_by('platform', '==', 'myslice')           \
806             .select('platform_id')
807         reg_platform = execute_admin_query(wsgi_request, reg_platform_query)
808         reg_platform_id = reg_platform[0]['platform_id']
809         account_params = {
810             'platform_id'   : reg_platform_id, # XXX ALERT !!
811             'user_id'       : user_id, 
812             'auth_type'     : request['auth_type'], 
813             'config'        : json.dumps(account_config),
814         }
815         manifold_add_account(wsgi_request, account_params)
816     except Exception, e:
817        print "Failed creating manifold account on platform %s for user: %s" % ('myslice', request['email'])
818
819     # Add user to LDAP userEnabled = False
820     # Not more here. Create before directly to the registrationview.py
821     # After we change userEnable = TRUE when validate the user
822
823     try:
824         # Send an email: the recipients are the PI of the authority
825         # If No PI is defined for this Authority, send to a default email (different for each theme)
826
827         split_authority_hrn = request['authority_hrn'].split(".")[0]
828
829         recipients = authority_get_pi_emails(wsgi_request, split_authority_hrn)
830
831         pis = authority_get_pis(request, split_authority_hrn)
832         pi_emails = []
833         for x in pis:
834             for e in x['pi_users']:
835                 try:
836                     u = e.split(".")[1]
837                     y = User.objects.get(username = u)
838                     if y.username.count("@") != 0:
839                         if y.username.split("@")[1] == request['username'].split("@")[1]:
840                             pi_emails += [y.email]
841                 except:
842                     print "fail"
843
844         theme.template_name = 'user_request_email.html'
845         html_content = render_to_string(theme.template, request)
846  
847         theme.template_name = 'user_request_email.txt'
848         text_content = render_to_string(theme.template, request)
849     
850         theme.template_name = 'user_request_email_subject.txt'
851         subject = render_to_string(theme.template, request)
852         subject = subject.replace('\n', '')
853     
854         theme.template_name = 'email_default_sender.txt'
855         sender =  render_to_string(theme.template, request)
856         sender = sender.replace('\n', '')
857     
858         msg = EmailMultiAlternatives(subject, text_content, sender, pi_emails)
859
860         msg.attach_alternative(html_content, "text/html")
861         msg.send()
862         print pi_emails
863     except Exception, e:
864         print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
865         import traceback
866         traceback.print_exc()