Merge branch 'onelab' of ssh://git.onelab.eu/git/myslice into onelab
[myslice.git] / portal / actions.py
1 from django.http                    import HttpResponse
2 from manifold.core.query            import Query
3 from manifoldapi.manifoldapi        import execute_query,execute_admin_query
4 from portal.models                  import PendingUser, PendingSlice, PendingAuthority, PendingProject, PendingJoin
5 from unfold.page                    import Page
6
7 import json
8
9 from django.contrib.auth.models     import User
10 from django.contrib.sites.models    import Site
11 from django.contrib.auth            import get_user_model
12 from django.template.loader         import render_to_string
13 from django.core.mail               import EmailMultiAlternatives, send_mail
14
15 from myslice.theme                  import ThemeView
16 from myslice.configengine           import ConfigEngine
17 from myslice.settings               import logger
18
19 theme = ThemeView()
20
21 import activity.slice
22
23 # Thierry: moving this right into the code so 
24 # most people can use myslice without having to install sfa
25 # XXX tmp sfa dependency, should be moved to SFA gateway
26 #from sfa.util.xrn                import Xrn 
27
28 def get_myslice_platform(request):
29     platform_query  = Query().get('local:platform').select('platform_id','platform','gateway_type','disabled','config').filter_by('platform','==','myslice')
30     platform_details = execute_query(request, platform_query)
31     if isinstance(platform_details,list):
32         for platform_detail in platform_details:
33             return platform_detail
34     else:
35         return None
36
37 def get_myslice_account(request):
38     try:
39         platform_myslice = get_myslice_platform(request)
40         account_query  = Query().get('local:account').select('user_id','platform_id','auth_type','config').filter_by('platform_id','==',platform_myslice['platform_id'])
41         account_details = execute_query(request, account_query)
42         for account_detail in account_details:
43             return account_detail
44     except Exception as e:
45         print e
46         return None
47
48 def get_registry_url(request):
49     try:
50         platform_detail = get_myslice_platform(request)
51         platform_config = json.loads(platform_detail['config'])
52         import socket
53         hostname = socket.gethostbyaddr(socket.gethostname())[0]
54         registry = platform_config.get('registry','N/A')
55         if 'localhost' in registry:
56             port = registry.split(':')[-1:][0]
57             registry = "http://" + hostname +':'+ port
58         return registry
59     except Exception as e:
60         print e
61         return None
62
63 def get_jfed_identity(request):
64     try:
65         account_detail = get_myslice_account(request)
66         account_config = json.loads(account_detail['config'])
67         if 'user_private_key' in account_config:
68             private_key = account_config['user_private_key']
69             user_hrn = account_config.get('user_hrn','N/A')
70             platform_detail = get_myslice_platform(request)
71             registry = get_registry_url(request)
72             #registry = 'http://sfa-fed4fire.pl.sophia.inria.fr:12345/'
73             jfed_identity = user_hrn + '\n' + registry + '\n' + private_key 
74             return jfed_identity
75         else:
76             return None
77     except Exception as e:
78         print e
79         return None
80
81 # Get the list of pis in a given authority
82 def authority_get_pis(request, authority_hrn):
83     # CACHE PB with fields
84     page = Page(request)
85     metadata = page.get_metadata()
86     auth_md = metadata.details_by_object('authority')
87     auth_fields = [column['name'] for column in auth_md['column']]
88
89     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
90     query = Query.get('myslice:authority').filter_by('authority_hrn', '==', authority_hrn).select(auth_fields)
91     results = execute_admin_query(request, query)
92     #print "authority_get_pis = %s" % results
93     # NOTE: temporarily commented. Because results is giving empty list. 
94     # Needs more debugging
95     #if not results:
96     #    raise Exception, "Authority not found: %s" % authority_hrn
97     #result, = results
98     #return result['pi_users']
99     return results
100
101 #check the user is pi or not in the registry
102 def authority_check_pis(request, user_email):
103     try:
104         user_query  = Query().get('local:user').filter_by('email', '==', user_email).select('user_id','email','password','config')
105         user_details = execute_admin_query(request, user_query)
106     
107         # getting the authority_hrn
108         for user_detail in user_details:
109             user_id = user_detail['user_id']
110             if user_detail['config']:
111                 config = json.loads(user_detail['config'])
112                 authority_hrn = config.get('authority','Unknown Authority')
113  
114         account_query  = Query().get('local:account').filter_by('user_id', '==', user_id).select('user_id','platform_id','auth_type','config')
115         account_details = execute_admin_query(request, account_query)
116     
117         platform_query  = Query().get('local:platform').select('platform_id','platform')
118         platform_details = execute_admin_query(request, platform_query)
119     
120         for account_detail in account_details:
121             for platform_detail in platform_details:
122                 if platform_detail['platform_id'] == account_detail['platform_id']:
123                     if 'myslice' in platform_detail['platform']:
124                         account_config = json.loads(account_detail['config'])
125                         user_hrn = account_config.get('user_hrn','N/A')
126
127         pi_status = False
128         pis = authority_get_pis (request, authority_hrn)
129         for pi in pis:
130             pi_list = pi['pi_users']
131
132         if user_hrn in pi_list:
133             pi_status = True
134         return pi_status
135
136     except Exception as e:
137         logger.error("Exception in actions.py in authority_check_pis {}".format(e))
138         return None
139
140
141 def authority_add_pis(request, authority_hrn, user_hrn):
142     try:
143         pi_list = []
144         # getting pis of the authority of the user
145         pis = authority_get_pis (request, authority_hrn)
146         for pi in pis:
147             pi_list = pi['pi_users']
148    
149         updated_pi_list = pi_list.append(user_hrn) 
150         query = Query.update('myslice:authority').filter_by('authority_hrn', '==', authority_hrn).set({'pi_users':pi_list})
151         results = execute_query(request,query)
152         newpis = authority_get_pis (request, authority_hrn)
153        
154         # Add the user to the slices of the project he/she joined
155         if len(authority_hrn.split('.')) > 2:
156             # this authority_hrn is a project
157             query_slices = Query.get('myslice:slice').filter_by('parent_authority', '==', authority_hrn).select('slice_hrn')
158             results_slices = execute_query(request,query_slices)
159             for s in results_slices:
160                 sfa_add_user_to_slice(request, user_hrn, s['slice_hrn'])
161         # Clear Credentials of the user 
162         user_email = get_user_email(request, user_hrn)
163         clear_user_creds(request, user_email)
164
165         return newpis
166     except Exception as e: 
167         logger.error("Exception in actions.py in authority_add_pis {}".format(e))
168         raise Exception, "Exception in actions.py in authority_add_pis {}".format(e)
169
170 def authority_remove_pis(request, authority_hrn, user_hrn):
171     try:
172         print "-"*80
173         print "remove_pis"
174         pi_list = []
175         # getting pis of the authority of the user
176         pis = authority_get_pis (request, authority_hrn)
177         for pi in pis:
178             pi_list = pi['pi_users']
179  
180         updated_pi_list = pi_list.remove(user_hrn) 
181         query = Query.update('myslice:authority').filter_by('authority_hrn', '==', authority_hrn).set({'pi_users':pi_list})
182         results = execute_query(request,query)
183         newpis = authority_get_pis (request, authority_hrn)
184
185         # Remove the user from the slices of the project he/she left
186         if len(authority_hrn.split('.')) > 2:
187             # this authority_hrn is a project
188             query_slices = Query.get('myslice:slice').filter_by('parent_authority', '==', authority_hrn).select('slice_hrn')
189             results_slices = execute_query(request,query_slices)
190             for s in results_slices:
191                 print 'remove from slice %s' % s
192                 sfa_remove_user_from_slice(request, user_hrn, s['slice_hrn'])
193
194         # Clear Credentials of the user 
195         user_email = get_user_email(request, user_hrn)
196         clear_user_creds(request, user_email)
197
198         return newpis
199     except Exception as e: 
200         logger.error("Exception in actions.py in authority_remove_pis {}".format(e))
201         raise Exception, "Exception in actions.py in authority_remove_pis {}".format(e)
202
203
204 def authority_get_pi_emails(request, authority_hrn):
205     pi_users = authority_get_pis(request,authority_hrn)
206     logger.info("pi_users = %s" % pi_users)
207
208     if any(pi['pi_users'] == None or not pi['pi_users']  for pi in pi_users):
209         #theme.template_name = 'email_default_recipients.txt' 
210         #default_email = render_to_string(theme.template, request)
211         #default_email = default_email.replace('\n', '')
212         #return default_email
213         # the above doesn't work
214         return ['support@onelab.eu']
215     else:
216         pi_user_hrns = [ hrn for x in pi_users for hrn in x['pi_users'] ]
217
218         # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
219         query = Query.get('myslice:user').filter_by('user_hrn', 'included', pi_user_hrns).select('user_email')
220         results = execute_admin_query(request, query)
221         return [result['user_email'] for result in results]
222
223 def get_user_email(request, user_hrn):
224     query = Query.get('myslice:user').filter_by('user_hrn', '==', user_hrn).select('user_email')
225     results = execute_admin_query(request, query)
226     return results[0]['user_email'] 
227
228 #clear user credentials
229 def clear_user_creds(request, user_email):
230     try:
231         user_query  = Query().get('local:user').filter_by('email', '==', user_email).select('user_id','email','password','config')
232         user_details = execute_admin_query(request, user_query)
233     
234         # getting the user_id from the session
235         for user_detail in user_details:
236             user_id = user_detail['user_id']
237             user_email = user_detail['email']
238     
239         account_query  = Query().get('local:account').filter_by('user_id', '==', user_id).select('user_id','platform_id','auth_type','config')
240         account_details = execute_admin_query(request, account_query)
241     
242         platform_query  = Query().get('local:platform').select('platform_id','platform')
243         platform_details = execute_admin_query(request, platform_query)
244     
245         for account_detail in account_details:
246             for platform_detail in platform_details:
247                 if platform_detail['platform_id'] == account_detail['platform_id']:
248                     if 'myslice' in platform_detail['platform']:
249                         account_config = json.loads(account_detail['config'])
250                         #user_cred = account_config.get('delegated_user_credential','N/A')
251                         user_cred = account_config.get('user_credential','N/A')
252                         if 'N/A' not in user_cred:
253                             user_hrn = account_config.get('user_hrn','N/A')
254                             user_pub_key = json.dumps(account_config.get('user_public_key','N/A'))
255                             user_priv_key = json.dumps(account_config.get('user_private_key','N/A'))
256                             updated_config = '{"user_public_key":'+ user_pub_key + ', "user_private_key":'+ user_priv_key + ', "user_hrn":"'+ user_hrn + '"}'
257                             user_params = { 'config': updated_config}
258                             manifold_update_account(request, user_id,user_params)
259                             return user_email
260                         else:
261                             return None
262
263     except Exception as e:
264         logger.error("Exception in actions.py in clear_user_creds {}".format(e))
265         return None
266
267 def is_pi(wsgi_request, user_hrn, authority_hrn):
268     # authorities from user where user_hrn == "ple.upmc.jordan_auge"
269     logger.debug("#### actions.py is_pi authority_hrn = {}".format(authority_hrn))
270     try:
271         # CACHE PB with fields
272         page = Page(wsgi_request)
273         metadata = page.get_metadata()
274         user_md = metadata.details_by_object('user')
275         user_fields = [column['name'] for column in user_md['column']]
276         
277         # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
278         query  = Query().get('myslice:user').select(user_fields).filter_by('user_hrn','==',user_hrn)
279         #query = Query.get('myslice:user').filter_by('user_hrn', '==', user_hrn).select('pi_authorities')
280         results = execute_query(wsgi_request, query)
281         for user_detail in results:
282             if authority_hrn in user_detail['pi_authorities']:
283                 return True
284     except Exception as e:
285         logger.error("Exception in actions.py in is_pi {}".format(e))
286     return False
287     
288 # SFA get record
289
290 def sfa_get_user(request, user_hrn, pub=None):
291
292     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
293     query_sfa_user = Query.get('myslice:user').filter_by('user_hrn', '==', user_hrn)
294     result_sfa_user = execute_admin_query(request, query_sfa_user)
295     return result_sfa_user[0]                        
296
297 def sfa_update_user(request, user_hrn, user_params):
298     # user_params: keys [public_key] 
299     if 'email' in user_params:
300         user_params['user_email'] = user_params['email']
301
302     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
303     query = Query.update('myslice:user').filter_by('user_hrn', '==', user_hrn).set(user_params).select('user_hrn')
304     results = execute_admin_query(request,query)
305     return results
306
307 def sfa_add_authority(request, authority_params):
308
309     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
310     query = Query.create('myslice:authority').set(authority_params).select('authority_hrn')
311     results = execute_query(request, query)
312     logger.info("sfa_add_auth results={}".format(results))
313     if not results:
314         raise Exception, "Could not create %s. Already exists ?" % authority_params['hrn']
315     return results
316
317 def sfa_add_user_to_slice(request, user_hrn, slice_hrn):
318 # UPDATE myslice:slice SET users = ['fed4fire.upmc.loic_baron', 'fed4fire.upmc.mohammed-yasin_rahman', 'fed4fire.upmc.demo'] WHERE slice_hrn == 'fed4fire.upmc.project_y.test_under' SELECT slice_hrn, slice_urn
319     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
320     query_current_users = Query.get('myslice:slice').select('users').filter_by('slice_hrn','==',slice_hrn)
321     results_current_users = execute_query(request, query_current_users)
322     current_users = list()
323     for r in results_current_users:
324         current_users.extend(r['users'])
325     users = list(set([user_hrn]) | set(current_users))
326
327     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
328     query = Query.update('myslice:slice').filter_by('slice_hrn', '==', slice_hrn).set({'users':users}).select('slice_hrn')
329     results = execute_query(request, query)
330 # Also possible but not supported yet
331 # UPDATE myslice:user SET slice=['ple.upmc.agent','ple.upmc.myslicedemo','ple.upmc.tophat'] where user_hrn=='ple.upmc.azerty'
332     if not results:
333         raise Exception, "Could not add user %s to slice %s" % (user_hrn, slice_hrn)
334     return results
335
336 def sfa_remove_user_from_slice(request, user_hrn, slice_hrn):
337 # UPDATE myslice:slice SET users = ['fed4fire.upmc.loic_baron', 'fed4fire.upmc.demo'] WHERE slice_hrn == 'fed4fire.upmc.project_y.test_under' SELECT slice_hrn, slice_urn
338     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
339     query_current_users = Query.get('myslice:slice').select('users').filter_by('slice_hrn','==',slice_hrn)
340     results_current_users = execute_query(request, query_current_users)
341     current_users = list()
342     for r in results_current_users:
343         current_users.extend(r['users'])
344     if user_hrn in current_users:
345         current_users.remove(user_hrn)
346
347     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
348     query = Query.update('myslice:slice').filter_by('slice_hrn', '==', slice_hrn).set({'users':current_users}).select('slice_hrn')
349     results = execute_query(request, query)
350 # Also possible but not supported yet
351 # UPDATE myslice:user SET slice=['ple.upmc.agent','ple.upmc.myslicedemo','ple.upmc.tophat'] where user_hrn=='ple.upmc.azerty'
352     if not results:
353         raise Exception, "Could not remove user %s to slice %s" % (user_hrn, slice_hrn)
354     return results
355
356 # Propose hrn
357
358 def manifold_add_user(wsgi_request, request):
359     """Add a Manifold user corresponding to a user request.
360
361     Args:
362         wsgi_request: a WSGIRequest instance
363         request (dict): a dictionary containing the user request built from the
364             form.
365
366     Returns:
367         The user_id of the inserted user.
368
369     Raises:
370         ?
371     
372     """
373     USER_CONFIG = '{"firstname": "%(first_name)s", "lastname": "%(last_name)s", "authority": "%(authority_hrn)s"}'
374
375     user_params = {
376         'email'     : request['email'],
377         'password'  : request['password'],
378         'config'    : USER_CONFIG % request,
379         'status'    : 1,
380     }
381
382     query = Query.create('local:user').set(user_params).select('email')
383     results = execute_admin_query(request, query)
384     if not results:
385         raise Exception, "Failed creating manifold user: %s" % user_params['email']
386     result = results[0]
387     return result['email']
388
389 def manifold_update_user(request, email, user_params):
390     # user_params: password, config e.g., 
391     query = Query.update('local:user').filter_by('email', '==', email).set(user_params).select('email')
392     results = execute_admin_query(request,query)
393     # NOTE: results remains empty and goes to Exception. However, it updates the manifold DB.
394     # That's why I commented the exception part. -- Yasin 
395     #if not results:
396     #    raise Exception, "Failed updating manifold user: %s" % user_params['email']
397     #result, = results
398     return results
399
400 def manifold_add_account(request, account_params):
401     query = Query.create('local:account').set(account_params).select(['user', 'platform'])
402     results = execute_admin_query(request,query)
403     if not results:
404         raise Exception, "Failed creating manifold account on platform %s for user: %s" % (account_params['platform'], account_params['user'])
405     result, = results
406     return result['user_id']
407
408 def manifold_update_account(request,user_id,account_params):
409     # account_params: config
410     query = Query.update('local:account').filter_by('platform', '==', 'myslice').filter_by('user_id', '==', user_id).set(account_params).select('user_id')
411     results = execute_admin_query(request,query)
412     return results
413
414 #explicitly mention the platform_id
415 def manifold_delete_account(request, user_id, platform_id = None):
416     query = Query.delete('local:account').filter_by('user_id', '==', user_id)
417     if platform_id is not None:
418         query.filter_by('platform_id', '==', platform_id)
419     results = execute_admin_query(request,query)
420     return results
421
422 def manifold_delete_user(request, user_id):
423     query = Query.delete('local:user').filter_by('user_id', '==', user_id).select('user_id')
424     results = execute_admin_query(request,query)
425     return results
426
427
428 #not tested
429 def manifold_add_platform(request, platform_params):
430     query = Query.create('local:platform').set(platform_params).select(['user', 'platform'])
431     results = execute_admin_query(request,query)
432     if not results:
433         raise Exception, "Failed creating manifold platform %s for user: %s" % (platform_params['platform'], platform_params['user'])
434     result, = results
435     return result['platform_id']
436
437 def delete_local_user(wsgi_request, user_email):
438     user_query = Query().get('local:user') \
439         .filter_by('email', '==', user_email)           \
440         .select('user_id','config')
441     user = execute_admin_query(wsgi_request, user_query)
442     if len(user) == 0:
443         return False
444         #raise Exception, "User not found, check local DB"
445     else:
446         user_id = user[0]['user_id']
447         user_config = json.loads(user[0]['config'])
448         authority_hrn = user_config.get('authority', None)
449         
450         if is_pi(wsgi_request, '$user_hrn', authority_hrn):
451             # removing from Django auth_user
452             UserModel = get_user_model()
453             UserModel._default_manager.filter(email__iexact = user_email).delete()
454
455             # removing manifold account
456             manifold_delete_account(wsgi_request, user_id)           
457                      
458             # removing manifold user
459             manifold_delete_user(wsgi_request, user_id)
460         else:
461             return False
462             #raise Exception, "No sufficient rights on authority = ",authority_hrn
463
464     return True      
465
466
467 def make_request_user(user):
468     request = {}
469     request['type']          = 'user'
470     request['id']            = user.id
471     request['timestamp']     = user.created # XXX in DB ?
472     request['authority_hrn'] = user.authority_hrn
473     request['first_name']    = user.first_name
474     request['last_name']     = user.last_name
475     request['email']         = user.email
476     request['login']         = user.login
477     request['user_hrn']      = user.user_hrn
478     request['public_key']    = user.public_key
479     request['private_key']   = user.private_key
480     return request
481
482 def make_request_slice(slice):
483     request = {}
484     request['type'] = 'slice'
485     request['id'] = slice.id
486     request['user_hrn'] = slice.user_hrn
487     request['timestamp'] = slice.created
488     request['authority_hrn'] = slice.authority_hrn
489     request['slice_name'] = slice.slice_name
490     request['number_of_nodes'] = slice.number_of_nodes
491     request['type_of_nodes'] = slice.type_of_nodes
492     request['purpose'] = slice.purpose
493     return request
494
495 def make_request_project(project):
496     request = {}
497     request['type'] = 'project'
498     request['id'] = project.id
499     request['user_hrn'] = project.user_hrn
500     request['email'] = project.email
501     request['timestamp'] = project.created
502     request['authority_hrn'] = project.authority_hrn
503     request['project_name'] = project.project_name
504     request['purpose'] = project.purpose
505     return request
506
507 def make_request_join(join):
508     request = {}
509     request['type'] = 'join'
510     request['id'] = join.id
511     request['user_hrn'] = join.user_hrn
512     request['email'] = join.email
513     request['timestamp'] = join.created
514     request['authority_hrn'] = join.authority_hrn
515     request['project_name'] = join.project_name
516     return request
517
518 def make_request_authority(authority):
519     request = {}
520     request['type']                  = 'authority'
521     request['id']                    = authority.id
522     request['site_name']             = authority.site_name
523     request['site_latitude']         = authority.site_latitude
524     request['site_longitude']        = authority.site_longitude
525     request['site_url']              = authority.site_url
526     request['site_authority']        = authority.site_authority
527     request['site_abbreviated_name'] = authority.site_abbreviated_name
528     request['address_line1']         = authority.address_line1
529     request['address_line2']         = authority.address_line2
530     request['address_line3']         = authority.address_line3
531     request['address_city']          = authority.address_city
532     request['address_postalcode']    = authority.address_postalcode
533     request['address_state']         = authority.address_state
534     request['address_country']       = authority.address_country
535     request['authority_hrn']         = authority.authority_hrn
536     request['timestamp']             = authority.created
537     return request
538
539 def make_requests(pending_users, pending_slices, pending_authorities, pending_projects, pending_joins):
540     logger.info("$$$$$$$$$$$$$$$  make_request")
541     requests = []
542     for user in pending_users:
543         requests.append(make_request_user(user))
544     for slice in pending_slices:
545         requests.append(make_request_slice(slice))
546     for authority in pending_authorities:
547         requests.append(make_request_authority(authority))
548     for project in pending_projects:
549         requests.append(make_request_project(project))
550     for join in pending_joins:
551         requests.append(make_request_join(join))
552     return requests   
553
554 def get_request_by_id(ids):
555     logger.info("$$$$$$$$$$$$$$$$  get_request_by_id")
556     sorted_ids = { 'user': [], 'slice': [], 'authority': [], 'project': [], 'join': [] }
557     for type__id in ids:
558         type, id = type__id.split('__')
559         sorted_ids[type].append(id)
560         
561     if not ids:
562         pending_users  = PendingUser.objects.all()
563         pending_slices = PendingSlice.objects.all()
564         pending_authorities = PendingAuthority.objects.all()
565         pending_projects = PendingProject.objects.all()
566         pending_joins = PendingJoin.objects.all()
567     else:
568         pending_users  = PendingUser.objects.filter(id__in=sorted_ids['user']).all()
569         pending_slices = PendingSlice.objects.filter(id__in=sorted_ids['slice']).all()
570         pending_authorities = PendingAuthority.objects.filter(id__in=sorted_ids['authority']).all()
571         pending_projects = PendingProject.objects.filter(id__in=sorted_ids['project']).all()
572         pending_joins = PendingJoin.objects.filter(id__in=sorted_ids['join']).all()
573
574     return make_requests(pending_users, pending_slices, pending_authorities, pending_projects, pending_joins)
575
576 def get_requests(authority_hrns=None):
577     logger.info("$$$$$$$$$$$$$   get_request_by_authority auth_hrns = {}".format(authority_hrns))
578     if not authority_hrns:
579         ## get those pending users who have confirmed their emails
580         pending_users  = PendingUser.objects.filter(status__iexact = 'True')
581         pending_slices = PendingSlice.objects.all()
582         pending_authorities = PendingAuthority.objects.all()
583         pending_projects = PendingProject.objects.all()
584         pending_joins = PendingJoin.objects.all()
585     else:
586         pending_users  = PendingUser.objects
587         pending_slices = PendingSlice.objects
588         pending_authorities = PendingAuthority.objects
589         pending_projects = PendingProject.objects
590         pending_joins = PendingJoin.objects
591         from django.db.models import Q
592         list_user_Q = list()
593         list_slice_Q = list()
594         list_auth_Q = list()
595         list_proj_Q = list()
596         list_join_Q = list()
597         for hrn in authority_hrns:
598             list_user_Q.append(Q(authority_hrn__startswith=hrn, status__iexact = 'True'))
599             list_slice_Q.append(Q(authority_hrn__startswith=hrn))
600             list_auth_Q.append(Q(site_authority__startswith=hrn))
601             list_proj_Q.append(Q(authority_hrn__startswith=hrn))
602             list_join_Q.append(Q(authority_hrn__startswith=hrn))
603         from operator import __or__ as OR
604         pending_users        = pending_users.filter(reduce(OR, list_user_Q))
605         pending_slices       = pending_slices.filter(reduce(OR, list_slice_Q))
606         pending_authorities  = pending_authorities.filter(reduce(OR, list_auth_Q))
607         pending_projects     = pending_projects.filter(reduce(OR, list_proj_Q))
608         pending_joins        = pending_joins.filter(reduce(OR, list_join_Q))
609         #pending_authorities  = pending_authorities.all() #filter(reduce(OR, list_Q))
610
611     return make_requests(pending_users, pending_slices, pending_authorities, pending_projects, pending_joins)
612
613 # XXX Is it in sync with the form fields ?
614
615 def portal_validate_request(wsgi_request, request_ids):
616     status = {}
617
618     if not isinstance(request_ids, list):
619         request_ids = [request_ids]
620
621     requests = get_request_by_id(request_ids)
622     for request in requests:
623         # type, id, timestamp, details, allowed -- MISSING: authority_hrn
624         # CAREFUL about details
625         # user  : first name, last name, email, password, keypair
626         # slice : number of nodes, type of nodes, purpose
627         
628         request_status = {}
629
630         if request['type'] == 'user':
631
632             try:
633                 create_user(wsgi_request, request)
634                 request_status['SFA user'] = {'status': True }
635                 PendingUser.objects.get(id=request['id']).delete()
636             except Exception, e:
637                  request_status['SFA user'] = {'status': False, 'description': str(e)}
638                        
639 #            user_params = {'status':2}
640 #            manifold_update_user(request, request['email'], user_params)
641
642             # MANIFOLD user should be added beforehand, during registration
643             #try:
644             #    manifold_user_params = { key: request[key] for key in MANIFOLD_USER_KEYS }
645             #    # XXX # manifold_add_user(manifold_user_params)
646             #    request_status['MySlice user'] = {'status': True }
647             #except Exception, e:
648             #    request_status['MySlice user'] = {'status': False, 'description': str(e)}
649
650             # XXX
651             #manifold_account_params = { key: request[key] for key in MANIFOLD_ACCOUNT_KEYS }
652             #manifold_add_account(manifold_account_params)
653             #request_status['MySlice testbed accounts'] = {'status': False }
654
655         elif request['type'] == 'slice':
656             try:
657                 create_slice(wsgi_request, request)
658                 request_status['SFA slice'] = {'status': True }
659                 PendingSlice.objects.get(id=request['id']).delete()
660
661                 # Clear user's Credentials
662                 sfa_user = sfa_get_user(wsgi_request, request['user_hrn'])
663                 clear_user_creds(wsgi_request,sfa_user['user_email'])
664
665             except Exception, e:
666                 request_status['SFA slice'] = {'status': False, 'description': str(e)}
667
668         elif request['type'] == 'authority':
669             try:
670                 #hrn = "%s.%s" % (request['authority_hrn'], request['site_authority'])
671                 hrn = request['site_authority']
672                 # XXX tmp sfa dependency
673                 from sfa.util.xrn import Xrn 
674                 urn = Xrn(hrn, request['type']).get_urn()
675                 
676                 # Only hrn is required for Manifold Query 
677                 sfa_authority_params = {
678                     'authority_hrn'        : hrn,
679                     #'authority_urn'        : urn,
680                     #'type'       : request['type'],
681                     #'pi'        : None,
682                     #'enabled'    : True
683                 }
684                 logger.info("ADD Authority")
685                 sfa_add_authority(wsgi_request, sfa_authority_params)
686                 request_status['SFA authority'] = {'status': True }
687                 PendingAuthority.objects.get(id=request['id']).delete()
688
689             except Exception, e:
690                 request_status['SFA authority'] = {'status': False, 'description': str(e)}
691
692         elif request['type'] == 'project':
693             try:
694                 hrn = request['authority_hrn'] + '.' + request['project_name']
695
696                 # Only hrn is required for Manifold Query 
697                 sfa_authority_params = {
698                     'authority_hrn'        : hrn
699                 }
700                 sfa_add_authority(wsgi_request, sfa_authority_params)
701                 
702                 # Add user as a PI of the project
703                 # Clear user's Credentials
704                 authority_add_pis(wsgi_request, hrn , request['user_hrn'])
705
706                 request_status['SFA project'] = {'status': True }
707                 PendingProject.objects.get(id=request['id']).delete()
708
709             except Exception, e:
710                 request_status['SFA project'] = {'status': False, 'description': str(e)}
711
712         elif request['type'] == 'join':
713             try:
714                 # Add user as a PI of the project
715                 # Clear user's Credentials
716                 authority_add_pis(wsgi_request, request['authority_hrn'] , request['user_hrn'])
717
718                 request_status['SFA join'] = {'status': True }
719                 PendingJoin.objects.get(id=request['id']).delete()
720
721             except Exception, e:
722                 request_status['SFA join'] = {'status': False, 'description': str(e)+' - '+str(request)}
723         else:
724             request_status['other'] = {'status': False, 'description': 'unknown type of request'}
725         # XXX Remove from Pendings in database
726
727         status['%s__%s' % (request['type'], request['id'])] = request_status
728
729     return status
730
731 def validate_action(request, **kwargs):
732     ids = filter(None, kwargs['id'].split('/'))
733     status = portal_validate_request(request, ids)
734     json_answer = json.dumps(status)
735     return HttpResponse (json_answer, content_type="application/json")
736
737
738 def reject_action(request, **kwargs):
739     ids = filter(None, kwargs['id'].split('/'))
740     status = portal_reject_request(request, ids)
741     json_answer = json.dumps(status)
742     return HttpResponse (json_answer, content_type="application/json")
743
744
745 def portal_reject_request(wsgi_request, request_ids):
746     status = {}
747     # get the domain url    
748     current_site = Site.objects.get_current()
749     current_site = current_site.domain
750
751
752     if not isinstance(request_ids, list):
753         request_ids = [request_ids]
754
755     requests = get_request_by_id(request_ids)
756     for request in requests:
757         # type, id, timestamp, details, allowed -- MISSING: authority_hrn
758         # CAREFUL about details
759         # user  : first name, last name, email, password, keypair
760         # slice : number of nodes, type of nodes, purpose
761         
762         request_status = {}
763
764         if request['type'] == 'user':
765             try:
766                 request_status['SFA user'] = {'status': True }
767                 # getting user email based on id 
768                 ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
769                 for user in PendingUser.objects.raw('SELECT * FROM portal_pendinguser WHERE id = %s', [request['id']]):
770                     user_email= user.email
771                     first_name = user.first_name
772                     last_name = user.last_name
773
774                 ctx = {
775                     'first_name'    : first_name, 
776                     'last_name'     : last_name, 
777                     'portal_url'    : current_site,
778                     }
779                 try:
780                     theme.template_name = 'user_request_denied.txt'
781                     text_content = render_to_string(theme.template, ctx)
782                     theme.template_name = 'user_request_denied.html'
783                     html_content = render_to_string(theme.template, ctx)
784                     theme.template_name = 'email_default_sender.txt'
785                     sender =  render_to_string(theme.template, ctx)
786                     sender = sender.replace('\n', '')
787                                
788                     subject = 'User request denied.'
789
790                     msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
791                     msg.attach_alternative(html_content, "text/html")
792                     msg.send()
793                 except Exception as e:
794                     logger.error("Failed to send email, please check the mail templates and the SMTP configuration of your server")   
795
796                 # removing from Django portal_pendinguser
797                 PendingUser.objects.get(id=request['id']).delete()
798             
799                 delete_local_user(wsgi_request, user_email)
800             except Exception, e:
801                 request_status['SFA authority'] = {'status': False, 'description': str(e)}
802                       
803         elif request['type'] == 'slice':
804             request_status['SFA slice'] = {'status': True } 
805
806             # getting user email based on id 
807             ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
808             for user in PendingSlice.objects.raw('SELECT * FROM portal_pendingslice WHERE id = %s', [request['id']]):
809                 user_email= user.type_of_nodes # XXX type_of_nodes field contains the email [shd be renamed in DB]
810                 slice_name = user.slice_name
811                 purpose = user.purpose
812                 url = user.number_of_nodes
813
814             ctx = {
815                 'slice_name': slice_name,
816                 'purpose': purpose,
817                 'url': url,
818                 'portal_url': current_site,
819                 }
820             try:
821                 theme.template_name = 'slice_request_denied.txt'
822                 text_content = render_to_string(theme.template, ctx)
823                 theme.template_name = 'slice_request_denied.html'
824                 html_content = render_to_string(theme.template, ctx)
825                 theme.template_name = 'email_default_sender.txt'
826                 sender =  render_to_string(theme.template, ctx)
827                 sender = sender.replace('\n', '')
828                                
829                 subject = 'Slice request denied.'
830
831                 msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
832                 msg.attach_alternative(html_content, "text/html")
833                 msg.send()
834             except Exception as e:
835                 logger.error("Failed to send email, please check the mail templates and the SMTP configuration of your server")
836                       
837             PendingSlice.objects.get(id=request['id']).delete()
838
839         elif request['type'] == 'authority':
840             request_status['SFA authority'] = {'status': True }
841             
842             # getting user email based on id 
843             ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
844             for user in PendingAuthority.objects.raw('SELECT * FROM portal_pendingauthority WHERE id = %s', [request['id']]):
845                 user_email= user.address_line1 # XXX address_line1 field contains the email [shd be renamed in DB]
846                 site_name = user.site_name
847                 city = user.address_city
848                 country = user.address_country
849                 short_name = user.site_abbreviated_name
850                 url = user.site_url
851
852             ctx = { 
853                 'site_name': site_name,
854                 'short_name': short_name,
855                 'url': url,
856                 'city': city,
857                 'country': country,                          
858                 'portal_url'    : current_site,
859                 }
860                 
861             try:
862                 theme.template_name = 'authority_request_denied.txt'
863                 text_content = render_to_string(theme.template, ctx)
864                 theme.template_name = 'authority_request_denied.html'
865                 html_content = render_to_string(theme.template, ctx)
866                 theme.template_name = 'email_default_sender.txt'
867                 sender =  render_to_string(theme.template, ctx)
868                 sender = sender.replace('\n', '')
869                 subject = 'Authority request denied.'
870                 msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
871                 msg.attach_alternative(html_content, "text/html")
872                 msg.send()
873             except Exception as e:
874                 logger.error("Failed to send email, please check the mail templates and the SMTP configuration of your server")
875
876             PendingAuthority.objects.get(id=request['id']).delete()
877
878         # XXX TMP we should send an email to the user to inform him/her
879         elif request['type'] == 'project':
880             request_status['SFA project'] = {'status': True }
881             PendingProject.objects.get(id=request['id']).delete()
882
883         elif request['type'] == 'join':
884             request_status['SFA join'] = {'status': True }
885             PendingJoin.objects.get(id=request['id']).delete()
886
887         status['%s__%s' % (request['type'], request['id'])] = request_status
888
889     return status
890
891 # Django and ajax
892 # http://djangosnippets.org/snippets/942/
893
894
895
896 #-------------------------------------------------------------------------------
897 # REQUESTS - Slices
898 #-------------------------------------------------------------------------------
899
900 def create_slice(wsgi_request, request):
901     """
902     Arguments:
903         wsgi_request (~ WSGIRequest) : 
904         request (dict) : the slice request in our own dict format
905
906     Raises:
907         Exception
908     """
909     hrn = "%s.%s" % (request['authority_hrn'], request['slice_name'])
910     # XXX tmp sfa dependency
911     from sfa.util.xrn import Xrn 
912     urn = Xrn(hrn, request['type']).get_urn()
913     
914     # Add User to Slice if we have the user_hrn in pendingslice table
915     user_hrn = request.get('user_hrn', None)
916     user_hrns = list([user_hrn]) if user_hrn else list()
917    
918     # CACHE PB with fields
919     page = Page(wsgi_request)
920     metadata = page.get_metadata()
921     user_md = metadata.details_by_object('user')
922     user_fields = [column['name'] for column in user_md['column']]
923
924     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
925     #user_query  = Query().get('myslice:user').select('user_hrn','user_email').filter_by('user_hrn','==',user_hrn)
926     user_query  = Query().get('myslice:user').select(user_fields).filter_by('user_hrn','==',user_hrn)
927     user_details_sfa = execute_admin_query(wsgi_request, user_query)
928     if not user_details_sfa:
929         raise Exception, "User %s doesn't exist, validate user before validating slice" % user_hrn
930     for user in user_details_sfa:
931         user_email = user['user_email']
932
933     # XXX LOIC Quick fix because this is totally inconsistent
934     if not 'number_of_nodes' in request:
935         request['number_of_nodes']=""
936
937     # Slice is under a project
938     if len(request['authority_hrn'].split('.')) > 2:
939         pi_list = []
940         pis = authority_get_pis(wsgi_request, request['authority_hrn'])
941         for pi in pis:
942             pi_list = pi['pi_users']
943         user_hrns.extend(pi_list)
944
945     # XXX We should create a slice with Manifold terminology
946     slice_params = {
947         'slice_hrn'        : hrn, 
948         'slice_urn'        : urn,
949         'slice_type'       : request['type'],
950         'url'              : request['number_of_nodes'],
951         'users'            : user_hrns,
952         'slice_enabled'    : True
953     }
954     # ignored in request: id, timestamp,  number_of_nodes, type_of_nodes, purpose
955
956     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
957     query = Query.create('myslice:slice').set(slice_params).select('slice_hrn')
958     results = execute_query(wsgi_request, query)
959     if not results:
960         raise Exception, "Could not create %s. Already exists ?" % slice_params['hrn']
961     else:
962         try:
963             for u_hrn in user_hrns:
964                 u_email = get_user_email(wsgi_request, u_hrn)
965                 clear_user_creds(wsgi_request, u_email)
966         except Exception as e:
967             logger.error("Failed clear credentials for all users")
968             clear_user_creds(wsgi_request,user_email)
969         # log user activity
970         activity.slice.validate(request, { "slice" : hrn })
971         try:
972             theme.template_name = 'slice_request_validated.txt'
973             text_content = render_to_string(theme.template, request)
974             theme.template_name = 'slice_request_validated.html'
975             html_content = render_to_string(theme.template, request)
976         
977             theme.template_name = 'email_default_sender.txt'
978             sender =  render_to_string(theme.template, request)
979             sender = sender.replace('\n', '')
980
981             subject = 'Slice request validated'
982
983             msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
984             msg.attach_alternative(html_content, "text/html")
985             msg.send()
986         except Exception as e:
987             logger.error("Failed to send email, please check the mail templates and the SMTP configuration of your server")
988        
989     return results
990
991 def create_pending_slice(wsgi_request, request, email):
992     """
993     """
994
995     # Insert an entry in the PendingSlice table
996     s = PendingSlice(
997         slice_name      = request['slice_name'],
998         user_hrn        = request['user_hrn'],
999         authority_hrn   = request['authority_hrn'],
1000         number_of_nodes = request['url'], # field needs to be renamed
1001         purpose         = request['purpose'],
1002         type_of_nodes   = request['email'] # field needs to be renamed 
1003     )
1004     s.save()
1005
1006     try:
1007         # Send an email: the recipients are the PI of the authority
1008         recipients = authority_get_pi_emails(wsgi_request, request['authority_hrn'])
1009
1010         theme.template_name = 'slice_request_email.txt' 
1011         text_content = render_to_string(theme.template, request)
1012     
1013         theme.template_name = 'slice_request_email.html' 
1014         html_content = render_to_string(theme.template, request)
1015     
1016         theme.template_name = 'slice_request_email_subject.txt'
1017         subject = render_to_string(theme.template, request)
1018         subject = subject.replace('\n', '')
1019     
1020         sender = email
1021         msg = EmailMultiAlternatives(subject, text_content, sender, recipients)
1022         msg.attach_alternative(html_content, "text/html")
1023         msg.send()
1024     except Exception as e:
1025         logger.error("Failed to send email, please check the mail templates and the SMTP configuration of your server")
1026
1027
1028 def create_pending_project(wsgi_request, request):
1029     """
1030     """
1031
1032     # Insert an entry in the PendingProject table
1033     s = PendingProject(
1034         project_name    = request['project_name'],
1035         user_hrn        = request['user_hrn'],
1036         email           = request['email'],
1037         authority_hrn   = request['authority_hrn'],
1038         purpose         = request['purpose'],
1039     )
1040     s.save()
1041
1042 def create_pending_join(wsgi_request, request):
1043     """
1044     """
1045
1046     # Insert an entry in the PendingJoin table
1047     s = PendingJoin(
1048         user_hrn        = request['user_hrn'],
1049         email           = request['email'],
1050         project_name    = request['project_name'],
1051         authority_hrn   = request['authority_hrn'],
1052     )
1053     s.save()
1054
1055
1056 #     try:
1057 #         # Send an email: the recipients are the PI of the authority
1058 #         recipients = authority_get_pi_emails(wsgi_request, request['authority_hrn'])
1059
1060 #         theme.template_name = 'slice_request_email.txt' 
1061 #         text_content = render_to_string(theme.template, request)
1062 #     
1063 #         theme.template_name = 'slice_request_email.html' 
1064 #         html_content = render_to_string(theme.template, request)
1065 #     
1066 #         theme.template_name = 'slice_request_email_subject.txt'
1067 #         subject = render_to_string(theme.template, request)
1068 #         subject = subject.replace('\n', '')
1069 #     
1070 #         sender = email
1071 #         msg = EmailMultiAlternatives(subject, text_content, sender, recipients)
1072 #         msg.attach_alternative(html_content, "text/html")
1073 #         msg.send()
1074 #     except Exception, e:
1075 #         print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
1076
1077
1078 #-------------------------------------------------------------------------------
1079 # REQUESTS - Users
1080 #-------------------------------------------------------------------------------
1081
1082 def manifold_add_reference_user_accounts(wsgi_request, request):
1083     """When a new user is created, add reference accounts to the reference platform.
1084     """
1085     # XXX XXX XXX The rest of this function has to be checked XXX XXX XXX
1086
1087     # Retrieve user information
1088     user_query  = Query().get('local:user')             \
1089         .select('user_id', 'config', 'email', 'status') \
1090         .filter_by('email', '==', request['email'])
1091     user_details = execute_admin_query(wsgi_request, user_query)
1092
1093     # USER MAIN ACCOUNT != reference
1094     #print 'USER MAIN ACCOUNT != reference'
1095     list_accounts_query = Query().get('local:account')              \
1096         .select('user_id', 'platform_id', 'auth_type', 'config')    \
1097         .filter_by('user_id', '==', user_details[0]['user_id'])     \
1098         .filter_by('auth_type', '!=', 'reference')
1099     list_accounts = execute_admin_query(wsgi_request, list_accounts_query)
1100
1101     # XXX main_platform is being erased several times ???
1102     for account in list_accounts:
1103         main_platform_query = Query().get('local:platform')         \
1104             .select('platform_id', 'platform')                      \
1105             .filter_by('platform_id', '==', account['platform_id'])
1106         main_platform = execute_admin_query(wsgi_request, main_platform_query)
1107
1108     # Add reference accounts on SFA enabled platforms
1109     platforms_query = Query().get('local:platform') \
1110         .filter_by('disabled', '==', '0')           \
1111         .filter_by('gateway_type', '==', 'sfa')     \
1112         .select('platform_id', 'gateway_type')
1113     platforms = execute_admin_query(wsgi_request, platforms_query)
1114     for platform in platforms:
1115         #print "add reference to platform ",platform
1116         manifold_account_params = {
1117             'user_id'       : user_details[0]['user_id'],
1118             'platform_id'   : platform['platform_id'],
1119             'auth_type'     : 'reference',
1120             'config'        : '{"reference_platform": "' + main_platform[0]['platform'] + '"}',
1121         }
1122         manifold_add_account(wsgi_request, manifold_account_params)
1123
1124 def sfa_create_user(wsgi_request, request, namespace = None, as_admin = False):
1125     """
1126     Arguments:
1127         wsgi_request (~ WSGIRequest) : 
1128         request (dict) : the user request in our own dict format
1129
1130     Raises:
1131         Exception
1132     """
1133     from sfa.util.xrn import Xrn 
1134
1135     auth_pi = request.get('pi', None)
1136     auth_pi = list([auth_pi]) if auth_pi else list()
1137
1138     # We create a user request with Manifold terminology
1139     sfa_user_params = {
1140         'user_hrn'          : request['user_hrn'],
1141         'user_email'        : request['email'],
1142         'user_urn'          : Xrn(request['user_hrn'], request['type']).get_urn(),
1143         'user_type'         : request['type'],
1144         'keys'              : request['public_key'],
1145         'user_first_name'   : request['first_name'],
1146         'user_last_name'    : request['last_name'],
1147         'pi_authorities'    : auth_pi,
1148         'user_enabled'      : True
1149     }
1150
1151     if namespace is not None:
1152         query = Query.create('%s:user' % namespace).set(sfa_user_params).select('user_hrn')
1153     else:
1154         # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
1155         query = Query.create('myslice:user').set(sfa_user_params).select('user_hrn')
1156
1157     if as_admin:
1158         results = execute_admin_query(wsgi_request, query)
1159     else:
1160         results = execute_query(wsgi_request, query)
1161
1162     if not results:
1163         raise Exception, "Could not create %s. Already exists ?" % sfa_user_params['user_hrn']
1164     else:
1165         try:
1166             theme.template_name = 'user_request_validated.txt'
1167             text_content = render_to_string(theme.template, request)
1168             theme.template_name = 'user_request_validated.html'
1169             html_content = render_to_string(theme.template, request)
1170         
1171             theme.template_name = 'email_default_sender.txt'
1172             sender =  render_to_string(theme.template, request)
1173             sender = sender.replace('\n', '')
1174
1175
1176             subject = 'Account validated'
1177
1178             msg = EmailMultiAlternatives(subject, text_content, sender, [request['email']])
1179             msg.attach_alternative(html_content, "text/html")
1180             msg.send()
1181         except Exception as e:
1182             logger.error("Failed to send email, please check the mail templates and the SMTP configuration of your server")
1183
1184     return results
1185
1186 def iotlab_create_user (wsgi_request, request, namespace = None, as_admin=False):
1187    
1188     import requests
1189     import time
1190     from requests.auth import HTTPBasicAuth
1191    
1192     engine = ConfigEngine() 
1193     URL_REST = engine.iotlab_url()
1194     LOGIN_ADMIN = engine.iotlab_admin_user()
1195     PASSWORD_ADMIN = engine.iotlab_admin_password()
1196
1197     auth = HTTPBasicAuth(LOGIN_ADMIN,PASSWORD_ADMIN)
1198     headers = {'content-type': 'application/json'}
1199
1200     for user in PendingUser.objects.raw('SELECT * FROM portal_pendinguser WHERE email = %s', [request['email']]):
1201         password= user.password
1202
1203
1204     iotlab_user_params = {
1205         "type"          : "SA",
1206         #"login"         : request['email'], #auto generated by iotlab
1207         "password"      : password,
1208         "firstName"     : request['first_name'],
1209         "lastName"      : request['last_name'],
1210         "email"         : request['email'],
1211         "structure"     : request['authority_hrn'],
1212         "city"          : "N/A",
1213         "country"       : "N/A",
1214         "sshPublicKey"  : request['public_key'],
1215         "motivations"   : "SFA federation",
1216     }    
1217    
1218     iotlab_user_params1 = json.dumps(iotlab_user_params)
1219     r=requests.post(url=URL_REST, data=iotlab_user_params1, headers=headers, auth=auth)
1220     logger.info('Create iotlab user : {} {}'.format(r.status_code, r.text))
1221     return r.text
1222
1223 def create_user(wsgi_request, request, namespace = None, as_admin = False):
1224     # XXX This has to be stored centrally
1225     USER_STATUS_ENABLED = 2
1226
1227     # NOTE : if we were to create a user directly (just like we create slices,
1228     # we would have to perform the steps in create_pending_user too
1229
1230     # Add the user to the SFA registry
1231     sfa_create_user(wsgi_request, request, namespace, as_admin)
1232
1233     # Update Manifold user status
1234     manifold_update_user(wsgi_request, request['email'], {'status': USER_STATUS_ENABLED})
1235
1236     # Add reference accounts for platforms
1237     manifold_add_reference_user_accounts(wsgi_request, request)
1238
1239     # Add the user to iotlab portal if theme is set to onelab
1240     if theme.theme == 'onelab':
1241         iotlab_create_user (wsgi_request, request)
1242
1243 def create_pending_user(wsgi_request, request, user_detail):
1244     """
1245     """
1246
1247     # Insert an entry in the PendingUser table
1248     b = PendingUser(
1249         first_name    = request['first_name'],
1250         last_name     = request['last_name'],
1251         authority_hrn = request['authority_hrn'],
1252         email         = request['email'],
1253         password      = request['password'],
1254         public_key    = request['public_key'],
1255         private_key   = request['private_key'],
1256         user_hrn      = request['user_hrn'],
1257         pi            = request['pi'],
1258         email_hash    = request['email_hash'],
1259         status        = 'False',
1260     )
1261     b.save()
1262     # sends email to user to activate the email
1263     theme.template_name = 'activate_user.html'
1264     html_content = render_to_string(theme.template, request)
1265     theme.template_name = 'activate_user.txt'
1266     text_content = render_to_string(theme.template, request)
1267     theme.template_name = 'activate_user_email_subject.txt'
1268     subject = render_to_string(theme.template, request)
1269     subject = subject.replace('\n', '')
1270     theme.template_name = 'email_default_sender.txt'
1271     sender =  render_to_string(theme.template, request)
1272     sender = sender.replace('\n', '')
1273     recipient = [request['email']]
1274     #recipient = recipient.append(request['email'])
1275
1276     msg = EmailMultiAlternatives(subject, text_content, sender, recipient)
1277     msg.attach_alternative(html_content, "text/html")
1278     msg.send()
1279    
1280     # saves the user to django auth_user table [needed for password reset]
1281     user = User.objects.create_user(request['email'], request['email'], request['password'])
1282
1283     # Creating a manifold user
1284     user_id = manifold_add_user(wsgi_request, request)
1285
1286     # Creating a Manifold account on the MySlice platform
1287     # Note the JSON representation of public and private keys already includes quotes
1288     account_config = {
1289         'user_hrn'          : request['user_hrn'],
1290         'user_public_key'   : request['public_key'],
1291     }
1292     if request['private_key']:
1293         account_config['user_private_key'] = request['private_key']
1294
1295     user_id = user_detail['user_id'] + 1 # the user_id for the newly created user in local:user
1296
1297     # XXX TODO: Require a myslice platform
1298     # ALERT: this will disapear with ROUTERV2 of Manifold
1299     # We have to consider the case where several registries can be used
1300     # Removed hardcoded platform = 5
1301     # This platform == 'myslice' is a TMP FIX !!
1302     try:
1303         reg_platform_query = Query().get('local:platform') \
1304             .filter_by('platform', '==', 'myslice')           \
1305             .select('platform_id')
1306         reg_platform = execute_admin_query(wsgi_request, reg_platform_query)
1307
1308         reg_platform_id = reg_platform[0]['platform_id']
1309         account_params = {
1310             'platform_id'   : reg_platform_id, # XXX ALERT !!
1311             'user_id'       : user_id, 
1312             'auth_type'     : request['auth_type'], 
1313             'config'        : json.dumps(account_config),
1314         }
1315         manifold_add_account(wsgi_request, account_params)
1316     except Exception as e:
1317         logger.error("Failed creating manifold account on platform {} for user: {}".format('myslice', request['email']))
1318
1319     try:
1320         # Send an email: the recipients are the PI of the authority
1321         # If No PI is defined for this Authority, send to a default email (different for each theme)
1322         recipients = authority_get_pi_emails(wsgi_request, request['authority_hrn'])
1323         
1324         theme.template_name = 'user_request_email.html'
1325         html_content = render_to_string(theme.template, request)
1326  
1327         theme.template_name = 'user_request_email.txt'
1328         text_content = render_to_string(theme.template, request)
1329     
1330         theme.template_name = 'user_request_email_subject.txt'
1331         subject = render_to_string(theme.template, request)
1332         subject = subject.replace('\n', '')
1333     
1334         theme.template_name = 'email_default_sender.txt'
1335         sender =  render_to_string(theme.template, request)
1336         sender = sender.replace('\n', '')
1337     
1338         msg = EmailMultiAlternatives(subject, text_content, sender, recipients)
1339         msg.attach_alternative(html_content, "text/html")
1340         msg.send()
1341     except Exception, e:
1342         logger.error("Failed to send email, please check the mail templates and the SMTP configuration of your server")
1343         import traceback
1344         logger.error(traceback.format_exc())