1 from __future__ import print_function
3 from django.http import HttpResponse
4 from manifold.core.query import Query
5 from manifoldapi.manifoldapi import execute_query,execute_admin_query
6 from portal.models import PendingUser, PendingSlice, PendingAuthority, PendingProject, PendingJoin
7 from unfold.page import Page
11 from django.contrib.auth.models import User
12 from django.contrib.sites.models import Site
13 from django.contrib.auth import get_user_model
14 from django.template.loader import render_to_string
15 from django.core.mail import EmailMultiAlternatives, send_mail
17 from myslice.theme import ThemeView
18 from myslice.configengine import ConfigEngine
25 # Thierry: moving this right into the code so
26 # most people can use myslice without having to install sfa
27 # XXX tmp sfa dependency, should be moved to SFA gateway
28 #from sfa.util.xrn import Xrn
31 # Get the list of pis in a given authority
32 def authority_get_pis(request, authority_hrn):
33 # CACHE PB with fields
35 metadata = page.get_metadata()
36 auth_md = metadata.details_by_object('authority')
37 auth_fields = [column['name'] for column in auth_md['column']]
39 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
40 query = Query.get('myslice:authority').filter_by('authority_hrn', '==', authority_hrn).select(auth_fields)
41 results = execute_admin_query(request, query)
42 #print "authority_get_pis = %s" % results
43 # NOTE: temporarily commented. Because results is giving empty list.
44 # Needs more debugging
46 # raise Exception, "Authority not found: %s" % authority_hrn
48 #return result['pi_users']
51 #check the user is pi or not in the registry
52 def authority_check_pis(request, user_email):
54 user_query = Query().get('local:user').filter_by('email', '==', user_email).select('user_id','email','password','config')
55 user_details = execute_admin_query(request, user_query)
57 # getting the authority_hrn
58 for user_detail in user_details:
59 user_id = user_detail['user_id']
60 if user_detail['config']:
61 config = json.loads(user_detail['config'])
62 authority_hrn = config.get('authority','Unknown Authority')
64 account_query = Query().get('local:account').filter_by('user_id', '==', user_id).select('user_id','platform_id','auth_type','config')
65 account_details = execute_admin_query(request, account_query)
67 platform_query = Query().get('local:platform').select('platform_id','platform')
68 platform_details = execute_admin_query(request, platform_query)
70 for account_detail in account_details:
71 for platform_detail in platform_details:
72 if platform_detail['platform_id'] == account_detail['platform_id']:
73 if 'myslice' in platform_detail['platform']:
74 account_config = json.loads(account_detail['config'])
75 user_hrn = account_config.get('user_hrn','N/A')
78 pis = authority_get_pis (request, authority_hrn)
80 pi_list = pi['pi_users']
82 if user_hrn in pi_list:
87 print("Exception in actions.py in authority_check_pis %s" % e)
91 def authority_add_pis(request, authority_hrn,user_hrn):
93 # getting pis of the authority of the user
94 pis = authority_get_pis (request, authority_hrn)
96 pi_list = pi['pi_users']
98 updated_pi_list = pi_list.append(user_hrn)
99 query = Query.update('myslice:authority').filter_by('authority_hrn', '==', authority_hrn).set({'pi_users':pi_list})
100 results = execute_query(request,query)
101 newpis = authority_get_pis (request, authority_hrn)
104 print("Exception in actions.py in authority_add_pis %s" % e)
108 def authority_remove_pis(request, authority_hrn,user_hrn):
110 # getting pis of the authority of the user
111 pis = authority_get_pis (request, authority_hrn)
113 pi_list = pi['pi_users']
115 updated_pi_list = pi_list.remove(user_hrn)
116 query = Query.update('authority').filter_by('authority_hrn', '==', authority_hrn).set({'pi_users':pi_list})
117 results = execute_query(request,query)
118 newpis = authority_get_pis (request, authority_hrn)
121 print("Exception in actions.py in authority_remove_pis %s" % e)
125 def authority_get_pi_emails(request, authority_hrn):
126 pi_users = authority_get_pis(request,authority_hrn)
127 print("pi_users = %s" % pi_users)
129 if any(pi['pi_users'] == None or not pi['pi_users'] for pi in pi_users):
130 #theme.template_name = 'email_default_recipients.txt'
131 #default_email = render_to_string(theme.template, request)
132 #default_email = default_email.replace('\n', '')
133 #return default_email
134 # the above doesn't work
135 return ['support@onelab.eu']
137 pi_user_hrns = [ hrn for x in pi_users for hrn in x['pi_users'] ]
139 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
140 query = Query.get('myslice:user').filter_by('user_hrn', 'included', pi_user_hrns).select('user_email')
141 results = execute_admin_query(request, query)
142 return [result['user_email'] for result in results]
144 #clear user credentials
145 def clear_user_creds(request, user_email):
147 user_query = Query().get('local:user').filter_by('email', '==', user_email).select('user_id','email','password','config')
148 user_details = execute_admin_query(request, user_query)
150 # getting the user_id from the session
151 for user_detail in user_details:
152 user_id = user_detail['user_id']
153 user_email = user_detail['email']
155 account_query = Query().get('local:account').filter_by('user_id', '==', user_id).select('user_id','platform_id','auth_type','config')
156 account_details = execute_admin_query(request, account_query)
158 platform_query = Query().get('local:platform').select('platform_id','platform')
159 platform_details = execute_admin_query(request, platform_query)
161 for account_detail in account_details:
162 for platform_detail in platform_details:
163 if platform_detail['platform_id'] == account_detail['platform_id']:
164 if 'myslice' in platform_detail['platform']:
165 account_config = json.loads(account_detail['config'])
166 #user_cred = account_config.get('delegated_user_credential','N/A')
167 user_cred = account_config.get('user_credential','N/A')
168 if 'N/A' not in user_cred:
169 user_hrn = account_config.get('user_hrn','N/A')
170 user_pub_key = json.dumps(account_config.get('user_public_key','N/A'))
171 user_priv_key = json.dumps(account_config.get('user_private_key','N/A'))
172 updated_config = '{"user_public_key":'+ user_pub_key + ', "user_private_key":'+ user_priv_key + ', "user_hrn":"'+ user_hrn + '"}'
173 user_params = { 'config': updated_config}
174 manifold_update_account(request, user_id,user_params)
180 print("Exception in actions.py in clear_user_creds %s" % e)
183 def is_pi(wsgi_request, user_hrn, authority_hrn):
184 # authorities from user where user_hrn == "ple.upmc.jordan_auge"
185 print("#### actions.py is_pi authority_hrn = ", authority_hrn)
187 # CACHE PB with fields
188 page = Page(wsgi_request)
189 metadata = page.get_metadata()
190 user_md = metadata.details_by_object('user')
191 user_fields = [column['name'] for column in user_md['column']]
193 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
194 query = Query().get('myslice:user').select(user_fields).filter_by('user_hrn','==',user_hrn)
195 #query = Query.get('myslice:user').filter_by('user_hrn', '==', user_hrn).select('pi_authorities')
196 results = execute_query(wsgi_request, query)
197 #print "is_pi results = ", results
198 for user_detail in results:
199 if authority_hrn in user_detail['pi_authorities']:
202 print("Exception in actions.py in is_pi %s" % e)
207 def sfa_get_user(request, user_hrn, pub=None):
209 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
210 query_sfa_user = Query.get('myslice:user').filter_by('user_hrn', '==', user_hrn)
211 result_sfa_user = execute_admin_query(request, query_sfa_user)
212 return result_sfa_user[0]
214 def sfa_update_user(request, user_hrn, user_params):
215 # user_params: keys [public_key]
216 if 'email' in user_params:
217 user_params['user_email'] = user_params['email']
219 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
220 query = Query.update('myslice:user').filter_by('user_hrn', '==', user_hrn).set(user_params).select('user_hrn')
221 results = execute_admin_query(request,query)
224 def sfa_add_authority(request, authority_params):
226 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
227 query = Query.create('myslice:authority').set(authority_params).select('authority_hrn')
228 results = execute_query(request, query)
229 print("sfa_add_auth results=",results)
231 raise Exception, "Could not create %s. Already exists ?" % authority_params['hrn']
234 def sfa_add_user_to_slice(request, user_hrn, slice_params):
235 # UPDATE myslice:slice SET researcher=['ple.upmc.jordan_auge','ple.inria.thierry_parmentelat','ple.upmc.loic_baron','ple.upmc.ciro_scognamiglio','ple.upmc.mohammed-yasin_rahman','ple.upmc.azerty'] where slice_hrn=='ple.upmc.myslicedemo'
237 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
238 query_current_users = Query.get('myslice:slice').select('user').filter_by('slice_hrn','==',slice_params['hrn'])
239 results_current_users = execute_query(request, query_current_users)
240 slice_params['researcher'] = slice_params['researcher'] | results_current_users
242 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
243 query = Query.update('myslice:slice').filter_by('user_hrn', '==', user_hrn).set(slice_params).select('slice_hrn')
244 results = execute_query(request, query)
245 # Also possible but not supported yet
246 # UPDATE myslice:user SET slice=['ple.upmc.agent','ple.upmc.myslicedemo','ple.upmc.tophat'] where user_hrn=='ple.upmc.azerty'
248 raise Exception, "Could not create %s. Already exists ?" % slice_params['hrn']
253 def manifold_add_user(wsgi_request, request):
254 """Add a Manifold user corresponding to a user request.
257 wsgi_request: a WSGIRequest instance
258 request (dict): a dictionary containing the user request built from the
262 The user_id of the inserted user.
268 USER_CONFIG = '{"firstname": "%(first_name)s", "lastname": "%(last_name)s", "authority": "%(authority_hrn)s"}'
271 'email' : request['email'],
272 'password' : request['password'],
273 'config' : USER_CONFIG % request,
277 query = Query.create('local:user').set(user_params).select('email')
278 results = execute_admin_query(request, query)
280 raise Exception, "Failed creating manifold user: %s" % user_params['email']
282 return result['email']
284 def manifold_update_user(request, email, user_params):
285 # user_params: password, config e.g.,
286 query = Query.update('local:user').filter_by('email', '==', email).set(user_params).select('email')
287 results = execute_admin_query(request,query)
288 # NOTE: results remains empty and goes to Exception. However, it updates the manifold DB.
289 # That's why I commented the exception part. -- Yasin
291 # raise Exception, "Failed updating manifold user: %s" % user_params['email']
295 def manifold_add_account(request, account_params):
296 query = Query.create('local:account').set(account_params).select(['user', 'platform'])
297 results = execute_admin_query(request,query)
299 raise Exception, "Failed creating manifold account on platform %s for user: %s" % (account_params['platform'], account_params['user'])
301 return result['user_id']
303 def manifold_update_account(request,user_id,account_params):
304 # account_params: config
305 query = Query.update('local:account').filter_by('platform', '==', 'myslice').filter_by('user_id', '==', user_id).set(account_params).select('user_id')
306 results = execute_admin_query(request,query)
309 #explicitly mention the platform_id
310 def manifold_delete_account(request, user_id, platform_id = None):
311 query = Query.delete('local:account').filter_by('user_id', '==', user_id)
312 if platform_id is not None:
313 query.filter_by('platform_id', '==', platform_id)
314 results = execute_admin_query(request,query)
317 def manifold_delete_user(request, user_id):
318 query = Query.delete('local:user').filter_by('user_id', '==', user_id).select('user_id')
319 results = execute_admin_query(request,query)
324 def manifold_add_platform(request, platform_params):
325 query = Query.create('local:platform').set(platform_params).select(['user', 'platform'])
326 results = execute_admin_query(request,query)
328 raise Exception, "Failed creating manifold platform %s for user: %s" % (platform_params['platform'], platform_params['user'])
330 return result['platform_id']
332 def delete_local_user(wsgi_request, user_email):
333 user_query = Query().get('local:user') \
334 .filter_by('email', '==', user_email) \
335 .select('user_id','config')
336 user = execute_admin_query(wsgi_request, user_query)
339 #raise Exception, "User not found, check local DB"
341 user_id = user[0]['user_id']
342 user_config = json.loads(user[0]['config'])
343 authority_hrn = user_config.get('authority', None)
345 if is_pi(wsgi_request, '$user_hrn', authority_hrn):
346 # removing from Django auth_user
347 UserModel = get_user_model()
348 UserModel._default_manager.filter(email__iexact = user_email).delete()
350 # removing manifold account
351 manifold_delete_account(wsgi_request, user_id)
353 # removing manifold user
354 manifold_delete_user(wsgi_request, user_id)
357 #raise Exception, "No sufficient rights on authority = ",authority_hrn
362 def make_request_user(user):
364 request['type'] = 'user'
365 request['id'] = user.id
366 request['timestamp'] = user.created # XXX in DB ?
367 request['authority_hrn'] = user.authority_hrn
368 request['first_name'] = user.first_name
369 request['last_name'] = user.last_name
370 request['email'] = user.email
371 request['login'] = user.login
372 request['user_hrn'] = user.user_hrn
373 request['public_key'] = user.public_key
374 request['private_key'] = user.private_key
377 def make_request_slice(slice):
379 request['type'] = 'slice'
380 request['id'] = slice.id
381 request['user_hrn'] = slice.user_hrn
382 request['timestamp'] = slice.created
383 request['authority_hrn'] = slice.authority_hrn
384 request['slice_name'] = slice.slice_name
385 request['number_of_nodes'] = slice.number_of_nodes
386 request['type_of_nodes'] = slice.type_of_nodes
387 request['purpose'] = slice.purpose
390 def make_request_project(project):
392 request['type'] = 'project'
393 request['id'] = project.id
394 request['user_hrn'] = project.user_hrn
395 request['email'] = project.email
396 request['timestamp'] = project.created
397 request['authority_hrn'] = project.authority_hrn
398 request['project_name'] = project.project_name
399 request['purpose'] = project.purpose
402 def make_request_join(join):
404 request['type'] = 'join'
405 request['id'] = join.id
406 request['user_hrn'] = join.user_hrn
407 request['email'] = join.email
408 request['timestamp'] = join.created
409 request['authority_hrn'] = join.authority_hrn
410 request['project_name'] = join.project_name
413 def make_request_authority(authority):
415 request['type'] = 'authority'
416 request['id'] = authority.id
417 request['site_name'] = authority.site_name
418 request['site_latitude'] = authority.site_latitude
419 request['site_longitude'] = authority.site_longitude
420 request['site_url'] = authority.site_url
421 request['site_authority'] = authority.site_authority
422 request['site_abbreviated_name'] = authority.site_abbreviated_name
423 request['address_line1'] = authority.address_line1
424 request['address_line2'] = authority.address_line2
425 request['address_line3'] = authority.address_line3
426 request['address_city'] = authority.address_city
427 request['address_postalcode'] = authority.address_postalcode
428 request['address_state'] = authority.address_state
429 request['address_country'] = authority.address_country
430 request['authority_hrn'] = authority.authority_hrn
431 request['timestamp'] = authority.created
434 def make_requests(pending_users, pending_slices, pending_authorities, pending_projects, pending_joins):
435 print("$$$$$$$$$$$$$$$ make_request")
437 for user in pending_users:
438 requests.append(make_request_user(user))
439 for slice in pending_slices:
440 requests.append(make_request_slice(slice))
441 for authority in pending_authorities:
442 requests.append(make_request_authority(authority))
443 for project in pending_projects:
444 requests.append(make_request_project(project))
445 for join in pending_joins:
446 requests.append(make_request_join(join))
449 def get_request_by_id(ids):
450 print("$$$$$$$$$$$$$$$$ get_request_by_id")
451 sorted_ids = { 'user': [], 'slice': [], 'authority': [], 'project': [], 'join': [] }
453 type, id = type__id.split('__')
454 sorted_ids[type].append(id)
457 pending_users = PendingUser.objects.all()
458 pending_slices = PendingSlice.objects.all()
459 pending_authorities = PendingAuthority.objects.all()
460 pending_projects = PendingProject.objects.all()
461 pending_joins = PendingJoin.objects.all()
463 pending_users = PendingUser.objects.filter(id__in=sorted_ids['user']).all()
464 pending_slices = PendingSlice.objects.filter(id__in=sorted_ids['slice']).all()
465 pending_authorities = PendingAuthority.objects.filter(id__in=sorted_ids['authority']).all()
466 pending_projects = PendingProject.objects.filter(id__in=sorted_ids['project']).all()
467 pending_joins = PendingJoin.objects.filter(id__in=sorted_ids['join']).all()
469 return make_requests(pending_users, pending_slices, pending_authorities, pending_projects, pending_joins)
471 def get_requests(authority_hrns=None):
472 print("$$$$$$$$$$$$$ get_request_by_authority auth_hrns = ", authority_hrns)
473 if not authority_hrns:
474 ## get those pending users who have confirmed their emails
475 pending_users = PendingUser.objects.filter(status__iexact = 'True')
476 pending_slices = PendingSlice.objects.all()
477 pending_authorities = PendingAuthority.objects.all()
478 pending_projects = PendingProject.objects.all()
479 pending_joins = PendingJoin.objects.all()
481 pending_users = PendingUser.objects
482 pending_slices = PendingSlice.objects
483 pending_authorities = PendingAuthority.objects
484 pending_projects = PendingProject.objects
485 pending_joins = PendingJoin.objects
486 from django.db.models import Q
488 list_slice_Q = list()
492 for hrn in authority_hrns:
493 list_user_Q.append(Q(authority_hrn__startswith=hrn, status__iexact = 'True'))
494 list_slice_Q.append(Q(authority_hrn__startswith=hrn))
495 list_auth_Q.append(Q(site_authority__startswith=hrn))
496 list_proj_Q.append(Q(authority_hrn__startswith=hrn))
497 list_join_Q.append(Q(authority_hrn__startswith=hrn))
498 from operator import __or__ as OR
499 pending_users = pending_users.filter(reduce(OR, list_user_Q))
500 pending_slices = pending_slices.filter(reduce(OR, list_slice_Q))
501 pending_authorities = pending_authorities.filter(reduce(OR, list_auth_Q))
502 pending_projects = pending_projects.filter(reduce(OR, list_proj_Q))
503 pending_joins = pending_joins.filter(reduce(OR, list_join_Q))
504 #pending_authorities = pending_authorities.all() #filter(reduce(OR, list_Q))
506 return make_requests(pending_users, pending_slices, pending_authorities, pending_projects, pending_joins)
508 # XXX Is it in sync with the form fields ?
510 def portal_validate_request(wsgi_request, request_ids):
513 if not isinstance(request_ids, list):
514 request_ids = [request_ids]
516 requests = get_request_by_id(request_ids)
517 for request in requests:
518 # type, id, timestamp, details, allowed -- MISSING: authority_hrn
519 # CAREFUL about details
520 # user : first name, last name, email, password, keypair
521 # slice : number of nodes, type of nodes, purpose
525 if request['type'] == 'user':
528 create_user(wsgi_request, request)
529 request_status['SFA user'] = {'status': True }
530 PendingUser.objects.get(id=request['id']).delete()
532 request_status['SFA user'] = {'status': False, 'description': str(e)}
534 # user_params = {'status':2}
535 # manifold_update_user(request, request['email'], user_params)
537 # MANIFOLD user should be added beforehand, during registration
539 # manifold_user_params = { key: request[key] for key in MANIFOLD_USER_KEYS }
540 # # XXX # manifold_add_user(manifold_user_params)
541 # request_status['MySlice user'] = {'status': True }
542 #except Exception, e:
543 # request_status['MySlice user'] = {'status': False, 'description': str(e)}
546 #manifold_account_params = { key: request[key] for key in MANIFOLD_ACCOUNT_KEYS }
547 #manifold_add_account(manifold_account_params)
548 #request_status['MySlice testbed accounts'] = {'status': False }
550 elif request['type'] == 'slice':
552 create_slice(wsgi_request, request)
553 request_status['SFA slice'] = {'status': True }
554 PendingSlice.objects.get(id=request['id']).delete()
556 # Clear user's Credentials
557 sfa_user = sfa_get_user(wsgi_request, request['user_hrn'])
558 clear_user_creds(wsgi_request,sfa_user['user_email'])
561 request_status['SFA slice'] = {'status': False, 'description': str(e)}
563 elif request['type'] == 'authority':
565 #hrn = "%s.%s" % (request['authority_hrn'], request['site_authority'])
566 hrn = request['site_authority']
567 # XXX tmp sfa dependency
568 from sfa.util.xrn import Xrn
569 urn = Xrn(hrn, request['type']).get_urn()
571 # Only hrn is required for Manifold Query
572 sfa_authority_params = {
573 'authority_hrn' : hrn,
574 #'authority_urn' : urn,
575 #'type' : request['type'],
579 print("ADD Authority")
580 sfa_add_authority(wsgi_request, sfa_authority_params)
581 request_status['SFA authority'] = {'status': True }
582 PendingAuthority.objects.get(id=request['id']).delete()
585 request_status['SFA authority'] = {'status': False, 'description': str(e)}
587 elif request['type'] == 'project':
589 hrn = request['authority_hrn'] + '.' + request['project_name']
591 # Only hrn is required for Manifold Query
592 sfa_authority_params = {
593 'authority_hrn' : hrn
595 sfa_add_authority(wsgi_request, sfa_authority_params)
596 request_status['SFA project'] = {'status': True }
597 PendingProject.objects.get(id=request['id']).delete()
599 # Add user as a PI of the project
600 authority_add_pis(wsgi_request, hrn , request['user_hrn'])
602 # Clear user's Credentials
603 #sfa_user = sfa_get_user(wsgi_request, request['user_hrn'])
604 clear_user_creds(wsgi_request,request['email'])
607 request_status['SFA project'] = {'status': False, 'description': str(e)}
609 elif request['type'] == 'join':
611 # Add user as a PI of the project
612 authority_add_pis(wsgi_request, request['authority_hrn'] , request['user_hrn'])
614 request_status['SFA join'] = {'status': True }
615 PendingJoin.objects.get(id=request['id']).delete()
617 # Clear user's Credentials
618 clear_user_creds(wsgi_request,request['email'])
621 request_status['SFA join'] = {'status': False, 'description': str(e)+' - '+str(request)}
623 request_status['other'] = {'status': False, 'description': 'unknown type of request'}
624 # XXX Remove from Pendings in database
626 status['%s__%s' % (request['type'], request['id'])] = request_status
630 def validate_action(request, **kwargs):
631 ids = filter(None, kwargs['id'].split('/'))
632 status = portal_validate_request(request, ids)
633 json_answer = json.dumps(status)
634 return HttpResponse (json_answer, mimetype="application/json")
637 def reject_action(request, **kwargs):
638 ids = filter(None, kwargs['id'].split('/'))
639 status = portal_reject_request(request, ids)
640 json_answer = json.dumps(status)
641 return HttpResponse (json_answer, mimetype="application/json")
644 def portal_reject_request(wsgi_request, request_ids):
647 current_site = Site.objects.get_current()
648 current_site = current_site.domain
651 if not isinstance(request_ids, list):
652 request_ids = [request_ids]
654 requests = get_request_by_id(request_ids)
655 for request in requests:
656 # type, id, timestamp, details, allowed -- MISSING: authority_hrn
657 # CAREFUL about details
658 # user : first name, last name, email, password, keypair
659 # slice : number of nodes, type of nodes, purpose
663 if request['type'] == 'user':
665 request_status['SFA user'] = {'status': True }
666 # getting user email based on id
667 ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
668 for user in PendingUser.objects.raw('SELECT * FROM portal_pendinguser WHERE id = %s', [request['id']]):
669 user_email= user.email
670 first_name = user.first_name
671 last_name = user.last_name
674 'first_name' : first_name,
675 'last_name' : last_name,
676 'portal_url' : current_site,
679 theme.template_name = 'user_request_denied.txt'
680 text_content = render_to_string(theme.template, ctx)
681 theme.template_name = 'user_request_denied.html'
682 html_content = render_to_string(theme.template, ctx)
683 theme.template_name = 'email_default_sender.txt'
684 sender = render_to_string(theme.template, ctx)
685 sender = sender.replace('\n', '')
687 subject = 'User request denied.'
689 msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
690 msg.attach_alternative(html_content, "text/html")
693 print("Failed to send email, please check the mail templates and the SMTP configuration of your server")
695 # removing from Django portal_pendinguser
696 PendingUser.objects.get(id=request['id']).delete()
698 delete_local_user(wsgi_request, user_email)
700 request_status['SFA authority'] = {'status': False, 'description': str(e)}
702 elif request['type'] == 'slice':
703 request_status['SFA slice'] = {'status': True }
705 # getting user email based on id
706 ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
707 for user in PendingSlice.objects.raw('SELECT * FROM portal_pendingslice WHERE id = %s', [request['id']]):
708 user_email= user.type_of_nodes # XXX type_of_nodes field contains the email [shd be renamed in DB]
709 slice_name = user.slice_name
710 purpose = user.purpose
711 url = user.number_of_nodes
714 'slice_name': slice_name,
717 'portal_url': current_site,
720 theme.template_name = 'slice_request_denied.txt'
721 text_content = render_to_string(theme.template, ctx)
722 theme.template_name = 'slice_request_denied.html'
723 html_content = render_to_string(theme.template, ctx)
724 theme.template_name = 'email_default_sender.txt'
725 sender = render_to_string(theme.template, ctx)
726 sender = sender.replace('\n', '')
728 subject = 'Slice request denied.'
730 msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
731 msg.attach_alternative(html_content, "text/html")
734 print("Failed to send email, please check the mail templates and the SMTP configuration of your server")
736 PendingSlice.objects.get(id=request['id']).delete()
738 elif request['type'] == 'authority':
739 request_status['SFA authority'] = {'status': True }
741 # getting user email based on id
742 ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
743 for user in PendingAuthority.objects.raw('SELECT * FROM portal_pendingauthority WHERE id = %s', [request['id']]):
744 user_email= user.address_line1 # XXX address_line1 field contains the email [shd be renamed in DB]
745 site_name = user.site_name
746 city = user.address_city
747 country = user.address_country
748 short_name = user.site_abbreviated_name
752 'site_name': site_name,
753 'short_name': short_name,
757 'portal_url' : current_site,
761 theme.template_name = 'authority_request_denied.txt'
762 text_content = render_to_string(theme.template, ctx)
763 theme.template_name = 'authority_request_denied.html'
764 html_content = render_to_string(theme.template, ctx)
765 theme.template_name = 'email_default_sender.txt'
766 sender = render_to_string(theme.template, ctx)
767 sender = sender.replace('\n', '')
768 subject = 'Authority request denied.'
769 msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
770 msg.attach_alternative(html_content, "text/html")
773 print("Failed to send email, please check the mail templates and the SMTP configuration of your server")
775 PendingAuthority.objects.get(id=request['id']).delete()
777 # XXX TMP we should send an email to the user to inform him/her
778 elif request['type'] == 'project':
779 request_status['SFA project'] = {'status': True }
780 PendingProject.objects.get(id=request['id']).delete()
782 elif request['type'] == 'join':
783 request_status['SFA join'] = {'status': True }
784 PendingJoin.objects.get(id=request['id']).delete()
786 status['%s__%s' % (request['type'], request['id'])] = request_status
791 # http://djangosnippets.org/snippets/942/
795 #-------------------------------------------------------------------------------
797 #-------------------------------------------------------------------------------
799 def create_slice(wsgi_request, request):
802 wsgi_request (~ WSGIRequest) :
803 request (dict) : the slice request in our own dict format
808 hrn = "%s.%s" % (request['authority_hrn'], request['slice_name'])
809 # XXX tmp sfa dependency
810 from sfa.util.xrn import Xrn
811 urn = Xrn(hrn, request['type']).get_urn()
813 # Add User to Slice if we have the user_hrn in pendingslice table
814 user_hrn = request.get('user_hrn', None)
815 user_hrns = list([user_hrn]) if user_hrn else list()
817 # CACHE PB with fields
818 page = Page(wsgi_request)
819 metadata = page.get_metadata()
820 user_md = metadata.details_by_object('user')
821 user_fields = [column['name'] for column in user_md['column']]
823 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
824 #user_query = Query().get('myslice:user').select('user_hrn','user_email').filter_by('user_hrn','==',user_hrn)
825 user_query = Query().get('myslice:user').select(user_fields).filter_by('user_hrn','==',user_hrn)
826 user_details_sfa = execute_admin_query(wsgi_request, user_query)
827 if not user_details_sfa:
828 raise Exception, "User %s doesn't exist, validate user before validating slice" % user_hrn
829 for user in user_details_sfa:
830 user_email = user['user_email']
832 # XXX LOIC Quick fix because this is totally inconsistent
833 if not 'number_of_nodes' in request:
834 request['number_of_nodes']=""
836 # XXX We should create a slice with Manifold terminology
840 'slice_type' : request['type'],
841 'url' : request['number_of_nodes'],
843 'slice_enabled' : True
845 # ignored in request: id, timestamp, number_of_nodes, type_of_nodes, purpose
847 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
848 query = Query.create('myslice:slice').set(slice_params).select('slice_hrn')
849 results = execute_query(wsgi_request, query)
851 raise Exception, "Could not create %s. Already exists ?" % slice_params['hrn']
853 clear_user_creds(wsgi_request,user_email)
855 activity.slice.validate(request, { "slice" : hrn })
857 theme.template_name = 'slice_request_validated.txt'
858 text_content = render_to_string(theme.template, request)
859 theme.template_name = 'slice_request_validated.html'
860 html_content = render_to_string(theme.template, request)
862 theme.template_name = 'email_default_sender.txt'
863 sender = render_to_string(theme.template, request)
864 sender = sender.replace('\n', '')
866 subject = 'Slice request validated'
868 msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
869 msg.attach_alternative(html_content, "text/html")
872 print("Failed to send email, please check the mail templates and the SMTP configuration of your server")
876 def create_pending_slice(wsgi_request, request, email):
880 # Insert an entry in the PendingSlice table
882 slice_name = request['slice_name'],
883 user_hrn = request['user_hrn'],
884 authority_hrn = request['authority_hrn'],
885 number_of_nodes = request['url'], # field needs to be renamed
886 purpose = request['purpose'],
887 type_of_nodes = request['email'] # field needs to be renamed
892 # Send an email: the recipients are the PI of the authority
893 recipients = authority_get_pi_emails(wsgi_request, request['authority_hrn'])
895 theme.template_name = 'slice_request_email.txt'
896 text_content = render_to_string(theme.template, request)
898 theme.template_name = 'slice_request_email.html'
899 html_content = render_to_string(theme.template, request)
901 theme.template_name = 'slice_request_email_subject.txt'
902 subject = render_to_string(theme.template, request)
903 subject = subject.replace('\n', '')
906 msg = EmailMultiAlternatives(subject, text_content, sender, recipients)
907 msg.attach_alternative(html_content, "text/html")
910 print("Failed to send email, please check the mail templates and the SMTP configuration of your server")
913 def create_pending_project(wsgi_request, request):
917 # Insert an entry in the PendingProject table
919 project_name = request['project_name'],
920 user_hrn = request['user_hrn'],
921 email = request['email'],
922 authority_hrn = request['authority_hrn'],
923 purpose = request['purpose'],
927 def create_pending_join(wsgi_request, request):
931 # Insert an entry in the PendingJoin table
933 user_hrn = request['user_hrn'],
934 email = request['email'],
935 project_name = request['project_name'],
936 authority_hrn = request['authority_hrn'],
942 # # Send an email: the recipients are the PI of the authority
943 # recipients = authority_get_pi_emails(wsgi_request, request['authority_hrn'])
945 # theme.template_name = 'slice_request_email.txt'
946 # text_content = render_to_string(theme.template, request)
948 # theme.template_name = 'slice_request_email.html'
949 # html_content = render_to_string(theme.template, request)
951 # theme.template_name = 'slice_request_email_subject.txt'
952 # subject = render_to_string(theme.template, request)
953 # subject = subject.replace('\n', '')
956 # msg = EmailMultiAlternatives(subject, text_content, sender, recipients)
957 # msg.attach_alternative(html_content, "text/html")
959 # except Exception, e:
960 # print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
963 #-------------------------------------------------------------------------------
965 #-------------------------------------------------------------------------------
967 def manifold_add_reference_user_accounts(wsgi_request, request):
968 """When a new user is created, add reference accounts to the reference platform.
970 # XXX XXX XXX The rest of this function has to be checked XXX XXX XXX
972 # Retrieve user information
973 user_query = Query().get('local:user') \
974 .select('user_id', 'config', 'email', 'status') \
975 .filter_by('email', '==', request['email'])
976 user_details = execute_admin_query(wsgi_request, user_query)
978 # USER MAIN ACCOUNT != reference
979 #print 'USER MAIN ACCOUNT != reference'
980 list_accounts_query = Query().get('local:account') \
981 .select('user_id', 'platform_id', 'auth_type', 'config') \
982 .filter_by('user_id', '==', user_details[0]['user_id']) \
983 .filter_by('auth_type', '!=', 'reference')
984 list_accounts = execute_admin_query(wsgi_request, list_accounts_query)
986 # XXX main_platform is being erased several times ???
987 for account in list_accounts:
988 main_platform_query = Query().get('local:platform') \
989 .select('platform_id', 'platform') \
990 .filter_by('platform_id', '==', account['platform_id'])
991 main_platform = execute_admin_query(wsgi_request, main_platform_query)
993 # Add reference accounts on SFA enabled platforms
994 platforms_query = Query().get('local:platform') \
995 .filter_by('disabled', '==', '0') \
996 .filter_by('gateway_type', '==', 'sfa') \
997 .select('platform_id', 'gateway_type')
998 platforms = execute_admin_query(wsgi_request, platforms_query)
999 for platform in platforms:
1000 #print "add reference to platform ",platform
1001 manifold_account_params = {
1002 'user_id' : user_details[0]['user_id'],
1003 'platform_id' : platform['platform_id'],
1004 'auth_type' : 'reference',
1005 'config' : '{"reference_platform": "' + main_platform[0]['platform'] + '"}',
1007 manifold_add_account(wsgi_request, manifold_account_params)
1009 def sfa_create_user(wsgi_request, request, namespace = None, as_admin = False):
1012 wsgi_request (~ WSGIRequest) :
1013 request (dict) : the user request in our own dict format
1018 from sfa.util.xrn import Xrn
1020 auth_pi = request.get('pi', None)
1021 auth_pi = list([auth_pi]) if auth_pi else list()
1023 # We create a user request with Manifold terminology
1025 'user_hrn' : request['user_hrn'],
1026 'user_email' : request['email'],
1027 'user_urn' : Xrn(request['user_hrn'], request['type']).get_urn(),
1028 'user_type' : request['type'],
1029 'keys' : request['public_key'],
1030 'user_first_name' : request['first_name'],
1031 'user_last_name' : request['last_name'],
1032 'pi_authorities' : auth_pi,
1033 'user_enabled' : True
1036 if namespace is not None:
1037 query = Query.create('%s:user' % namespace).set(sfa_user_params).select('user_hrn')
1039 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
1040 query = Query.create('myslice:user').set(sfa_user_params).select('user_hrn')
1043 results = execute_admin_query(wsgi_request, query)
1045 results = execute_query(wsgi_request, query)
1048 raise Exception, "Could not create %s. Already exists ?" % sfa_user_params['user_hrn']
1051 theme.template_name = 'user_request_validated.txt'
1052 text_content = render_to_string(theme.template, request)
1053 theme.template_name = 'user_request_validated.html'
1054 html_content = render_to_string(theme.template, request)
1056 theme.template_name = 'email_default_sender.txt'
1057 sender = render_to_string(theme.template, request)
1058 sender = sender.replace('\n', '')
1061 subject = 'User validated'
1063 msg = EmailMultiAlternatives(subject, text_content, sender, [request['email']])
1064 msg.attach_alternative(html_content, "text/html")
1066 except Exception, e:
1067 print("Failed to send email, please check the mail templates and the SMTP configuration of your server")
1071 def iotlab_create_user (wsgi_request, request, namespace = None, as_admin=False):
1075 from requests.auth import HTTPBasicAuth
1077 engine = ConfigEngine()
1078 URL_REST = engine.iotlab_url()
1079 LOGIN_ADMIN = engine.iotlab_admin_user()
1080 PASSWORD_ADMIN = engine.iotlab_admin_password()
1082 auth = HTTPBasicAuth(LOGIN_ADMIN,PASSWORD_ADMIN)
1083 headers = {'content-type': 'application/json'}
1085 for user in PendingUser.objects.raw('SELECT * FROM portal_pendinguser WHERE email = %s', [request['email']]):
1086 password= user.password
1089 iotlab_user_params = {
1091 #"login" : request['email'], #auto generated by iotlab
1092 "password" : password,
1093 "firstName" : request['first_name'],
1094 "lastName" : request['last_name'],
1095 "email" : request['email'],
1096 "structure" : request['authority_hrn'],
1099 "sshPublicKey" : request['public_key'],
1100 "motivations" : "SFA federation",
1103 iotlab_user_params1 = json.dumps(iotlab_user_params)
1104 r=requests.post(url=URL_REST, data=iotlab_user_params1, headers=headers, auth=auth)
1105 print('Create iotlab user : ', r.status_code, r.text)
1108 def create_user(wsgi_request, request, namespace = None, as_admin = False):
1109 # XXX This has to be stored centrally
1110 USER_STATUS_ENABLED = 2
1112 # NOTE : if we were to create a user directly (just like we create slices,
1113 # we would have to perform the steps in create_pending_user too
1115 # Add the user to the SFA registry
1116 sfa_create_user(wsgi_request, request, namespace, as_admin)
1118 # Update Manifold user status
1119 manifold_update_user(wsgi_request, request['email'], {'status': USER_STATUS_ENABLED})
1121 # Add reference accounts for platforms
1122 manifold_add_reference_user_accounts(wsgi_request, request)
1124 # Add the user to iotlab portal if theme is set to onelab
1125 if theme.theme == 'onelab':
1126 iotlab_create_user (wsgi_request, request)
1128 def create_pending_user(wsgi_request, request, user_detail):
1132 # Insert an entry in the PendingUser table
1134 first_name = request['first_name'],
1135 last_name = request['last_name'],
1136 authority_hrn = request['authority_hrn'],
1137 email = request['email'],
1138 password = request['password'],
1139 public_key = request['public_key'],
1140 private_key = request['private_key'],
1141 user_hrn = request['user_hrn'],
1143 email_hash = request['email_hash'],
1147 # sends email to user to activate the email
1148 theme.template_name = 'activate_user.html'
1149 html_content = render_to_string(theme.template, request)
1150 theme.template_name = 'activate_user.txt'
1151 text_content = render_to_string(theme.template, request)
1152 theme.template_name = 'activate_user_email_subject.txt'
1153 subject = render_to_string(theme.template, request)
1154 subject = subject.replace('\n', '')
1155 theme.template_name = 'email_default_sender.txt'
1156 sender = render_to_string(theme.template, request)
1157 sender = sender.replace('\n', '')
1158 recipient = [request['email']]
1159 #recipient = recipient.append(request['email'])
1161 msg = EmailMultiAlternatives(subject, text_content, sender, recipient)
1162 msg.attach_alternative(html_content, "text/html")
1165 # saves the user to django auth_user table [needed for password reset]
1166 user = User.objects.create_user(request['email'], request['email'], request['password'])
1168 # Creating a manifold user
1169 user_id = manifold_add_user(wsgi_request, request)
1171 # Creating a Manifold account on the MySlice platform
1172 # Note the JSON representation of public and private keys already includes quotes
1174 'user_hrn' : request['user_hrn'],
1175 'user_public_key' : request['public_key'],
1177 if request['private_key']:
1178 account_config['user_private_key'] = request['private_key']
1180 user_id = user_detail['user_id'] + 1 # the user_id for the newly created user in local:user
1182 # XXX TODO: Require a myslice platform
1183 # ALERT: this will disapear with ROUTERV2 of Manifold
1184 # We have to consider the case where several registries can be used
1185 # Removed hardcoded platform = 5
1186 # This platform == 'myslice' is a TMP FIX !!
1188 reg_platform_query = Query().get('local:platform') \
1189 .filter_by('platform', '==', 'myslice') \
1190 .select('platform_id')
1191 reg_platform = execute_admin_query(wsgi_request, reg_platform_query)
1193 reg_platform_id = reg_platform[0]['platform_id']
1195 'platform_id' : reg_platform_id, # XXX ALERT !!
1196 'user_id' : user_id,
1197 'auth_type' : request['auth_type'],
1198 'config' : json.dumps(account_config),
1200 manifold_add_account(wsgi_request, account_params)
1201 except Exception, e:
1202 print("Failed creating manifold account on platform %s for user: %s" % ('myslice', request['email']))
1205 # Send an email: the recipients are the PI of the authority
1206 # If No PI is defined for this Authority, send to a default email (different for each theme)
1207 recipients = authority_get_pi_emails(wsgi_request, request['authority_hrn'])
1209 theme.template_name = 'user_request_email.html'
1210 html_content = render_to_string(theme.template, request)
1212 theme.template_name = 'user_request_email.txt'
1213 text_content = render_to_string(theme.template, request)
1215 theme.template_name = 'user_request_email_subject.txt'
1216 subject = render_to_string(theme.template, request)
1217 subject = subject.replace('\n', '')
1219 theme.template_name = 'email_default_sender.txt'
1220 sender = render_to_string(theme.template, request)
1221 sender = sender.replace('\n', '')
1223 msg = EmailMultiAlternatives(subject, text_content, sender, recipients)
1224 msg.attach_alternative(html_content, "text/html")
1226 except Exception, e:
1227 print("Failed to send email, please check the mail templates and the SMTP configuration of your server")
1229 traceback.print_exc()