Manage Requests: authority startswith the list of auth_hrn the user manages
[myslice.git] / portal / actions.py
1 from django.http                import HttpResponse
2 from manifold.core.query        import Query
3 from manifoldapi.manifoldapi    import execute_query,execute_admin_query
4 from portal.models              import PendingUser, PendingSlice, PendingAuthority
5 import json
6
7 from django.contrib.auth.models  import User
8 from django.contrib.sites.models import Site
9 from django.contrib.auth        import get_user_model
10 from django.template.loader     import render_to_string
11 from django.core.mail           import EmailMultiAlternatives, send_mail
12
13 from myslice.theme              import ThemeView
14 from myslice.configengine       import ConfigEngine
15
16
17 theme = ThemeView()
18
19 import activity.slice
20
21 # Thierry: moving this right into the code so 
22 # most people can use myslice without having to install sfa
23 # XXX tmp sfa dependency, should be moved to SFA gateway
24 #from sfa.util.xrn                import Xrn 
25
26
27 # Get the list of authorities
28
29 def authority_get_pis(request, authority_hrn):
30
31     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
32     query = Query.get('authority').filter_by('authority_hrn', '==', authority_hrn).select('pi_users')
33     results = execute_admin_query(request, query)
34     print "authority_get_pis = %s" % results
35     # NOTE: temporarily commented. Because results is giving empty list. 
36     # Needs more debugging
37     #if not results:
38     #    raise Exception, "Authority not found: %s" % authority_hrn
39     #result, = results
40     #return result['pi_users']
41     return results
42
43 def authority_get_pi_emails(request, authority_hrn):
44     pi_users = authority_get_pis(request,authority_hrn)
45     print "pi_users = %s" % pi_users
46
47     if any(pi['pi_users'] == None or not pi['pi_users']  for pi in pi_users):
48         #theme.template_name = 'email_default_recipients.txt' 
49         #default_email = render_to_string(theme.template, request)
50         #default_email = default_email.replace('\n', '')
51         #return default_email
52         # the above doesn't work
53         return ['support@onelab.eu']
54     else:
55         pi_user_hrns = [ hrn for x in pi_users for hrn in x['pi_users'] ]
56
57         # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
58         query = Query.get('myslice:user').filter_by('user_hrn', 'included', pi_user_hrns).select('user_email')
59         results = execute_admin_query(request, query)
60         return [result['user_email'] for result in results]
61
62 #clear user credentials
63 def clear_user_creds(request, user_email):
64     try:
65         user_query  = Query().get('local:user').filter_by('email', '==', user_email).select('user_id','email','password','config')
66         user_details = execute_admin_query(request, user_query)
67     
68         # getting the user_id from the session
69         for user_detail in user_details:
70             user_id = user_detail['user_id']
71             user_email = user_detail['email']
72     
73         account_query  = Query().get('local:account').filter_by('user_id', '==', user_id).select('user_id','platform_id','auth_type','config')
74         account_details = execute_admin_query(request, account_query)
75     
76         platform_query  = Query().get('local:platform').select('platform_id','platform')
77         platform_details = execute_admin_query(request, platform_query)
78     
79         for account_detail in account_details:
80             for platform_detail in platform_details:
81                 if platform_detail['platform_id'] == account_detail['platform_id']:
82                     if 'myslice' in platform_detail['platform']:
83                         account_config = json.loads(account_detail['config'])
84                         #user_cred = account_config.get('delegated_user_credential','N/A')
85                         user_cred = account_config.get('user_credential','N/A')
86                         if 'N/A' not in user_cred:
87                             user_hrn = account_config.get('user_hrn','N/A')
88                             user_pub_key = json.dumps(account_config.get('user_public_key','N/A'))
89                             user_priv_key = json.dumps(account_config.get('user_private_key','N/A'))
90                             updated_config = '{"user_public_key":'+ user_pub_key + ', "user_private_key":'+ user_priv_key + ', "user_hrn":"'+ user_hrn + '"}'
91                             user_params = { 'config': updated_config}
92                             manifold_update_account(request, user_id,user_params)
93                             return user_email
94                         else:
95                             return None
96
97     except Exception,e:
98         print "Exception in actions.py in clear_user_creds %s" % e
99         return None
100
101 def is_pi(wsgi_request, user_hrn, authority_hrn):
102     # XXX could be done in a single query !
103
104     # seauthorities from user where user_hrn == "ple.upmc.jordan_auge"
105
106     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
107     query = Query.get('myslice:user').filter_by('user_hrn', '==', user_hrn).select('pi_authorities')
108     results = execute_admin_query(wsgi_request, query)
109     if not results:
110         # XXX Warning ?
111         return False
112     result = results[0]
113     user_authority_hrns = result.get('pi_authorities', [])
114     return authority_hrn in user_authority_hrns
115     
116 # SFA get record
117
118 def sfa_get_user(request, user_hrn, pub):
119
120     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
121     query_sfa_user = Query.get('myslice:user').filter_by('user_hrn', '==', user_hrn)
122     result_sfa_user = execute_admin_query(request, query_sfa_user)
123     return result_sfa_user                        
124
125 def sfa_update_user(request, user_hrn, user_params):
126     # user_params: keys [public_key] 
127     if 'email' in user_params:
128         user_params['user_email'] = user_params['email']
129
130     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
131     query = Query.update('myslice:user').filter_by('user_hrn', '==', user_hrn).set(user_params).select('user_hrn')
132     results = execute_admin_query(request,query)
133     return results
134
135 def sfa_add_authority(request, authority_params):
136
137     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
138     query = Query.create('authority').set(authority_params).select('authority_hrn')
139     results = execute_query(request, query)
140     print "sfa_add_auth results=",results
141     if not results:
142         raise Exception, "Could not create %s. Already exists ?" % authority_params['hrn']
143     return results
144
145 def sfa_add_user_to_slice(request, user_hrn, slice_params):
146 # UPDATE myslice:slice SET researcher=['ple.upmc.jordan_auge','ple.inria.thierry_parmentelat','ple.upmc.loic_baron','ple.upmc.ciro_scognamiglio','ple.upmc.mohammed-yasin_rahman','ple.upmc.azerty'] where slice_hrn=='ple.upmc.myslicedemo'
147
148     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
149     query_current_users = Query.get('myslice:slice').select('user').filter_by('slice_hrn','==',slice_params['hrn'])
150     results_current_users = execute_query(request, query_current_users)
151     slice_params['researcher'] = slice_params['researcher'] | results_current_users
152
153     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
154     query = Query.update('myslice:slice').filter_by('user_hrn', '==', user_hrn).set(slice_params).select('slice_hrn')
155     results = execute_query(request, query)
156 # Also possible but not supported yet
157 # UPDATE myslice:user SET slice=['ple.upmc.agent','ple.upmc.myslicedemo','ple.upmc.tophat'] where user_hrn=='ple.upmc.azerty'
158     if not results:
159         raise Exception, "Could not create %s. Already exists ?" % slice_params['hrn']
160     return results
161
162 # Propose hrn
163
164 def manifold_add_user(wsgi_request, request):
165     """Add a Manifold user corresponding to a user request.
166
167     Args:
168         wsgi_request: a WSGIRequest instance
169         request (dict): a dictionary containing the user request built from the
170             form.
171
172     Returns:
173         The user_id of the inserted user.
174
175     Raises:
176         ?
177     
178     """
179     USER_CONFIG = '{"firstname": "%(first_name)s", "lastname": "%(last_name)s", "authority": "%(authority_hrn)s"}'
180
181     user_params = {
182         'email'     : request['email'],
183         'password'  : request['password'],
184         'config'    : USER_CONFIG % request,
185         'status'    : 1,
186     }
187
188     query = Query.create('local:user').set(user_params).select('email')
189     results = execute_admin_query(request, query)
190     if not results:
191         raise Exception, "Failed creating manifold user: %s" % user_params['email']
192     result = results[0]
193     return result['email']
194
195 def manifold_update_user(request, email, user_params):
196     # user_params: password, config e.g., 
197     query = Query.update('local:user').filter_by('email', '==', email).set(user_params).select('email')
198     results = execute_admin_query(request,query)
199     # NOTE: results remains empty and goes to Exception. However, it updates the manifold DB.
200     # That's why I commented the exception part. -- Yasin 
201     #if not results:
202     #    raise Exception, "Failed updating manifold user: %s" % user_params['email']
203     #result, = results
204     return results
205
206 def manifold_add_account(request, account_params):
207     query = Query.create('local:account').set(account_params).select(['user', 'platform'])
208     results = execute_admin_query(request,query)
209     if not results:
210         raise Exception, "Failed creating manifold account on platform %s for user: %s" % (account_params['platform'], account_params['user'])
211     result, = results
212     return result['user_id']
213
214 def manifold_update_account(request,user_id,account_params):
215     # account_params: config
216     query = Query.update('local:account').filter_by('platform', '==', 'myslice').filter_by('user_id', '==', user_id).set(account_params).select('user_id')
217     results = execute_admin_query(request,query)
218     return results
219
220 #explicitly mention the platform_id
221 def manifold_delete_account(request, platform_id, user_id, account_params):
222     query = Query.delete('local:account').filter_by('platform_id', '==', platform_id).filter_by('user_id', '==', user_id).set(account_params).select('user_id')
223     results = execute_admin_query(request,query)
224     return results
225
226 def manifold_delete_user(request, user_id, user_params):
227     query = Query.delete('local:user').filter_by('user_id', '==', user_id).set(user_params).select('user_id')
228     results = execute_admin_query(request,query)
229     return results
230
231
232 #not tested
233 def manifold_add_platform(request, platform_params):
234     query = Query.create('local:platform').set(platform_params).select(['user', 'platform'])
235     results = execute_admin_query(request,query)
236     if not results:
237         raise Exception, "Failed creating manifold platform %s for user: %s" % (platform_params['platform'], platform_params['user'])
238     result, = results
239     return result['platform_id']
240
241
242 def make_request_user(user):
243     request = {}
244     request['type']          = 'user'
245     request['id']            = user.id
246     request['timestamp']     = user.created # XXX in DB ?
247     request['authority_hrn'] = user.authority_hrn
248     request['first_name']    = user.first_name
249     request['last_name']     = user.last_name
250     request['email']         = user.email
251     request['login']         = user.login
252     request['user_hrn']      = user.user_hrn
253     request['public_key']    = user.public_key
254     request['private_key']   = user.private_key
255     return request
256
257 def make_request_slice(slice):
258     request = {}
259     request['type'] = 'slice'
260     request['id'] = slice.id
261     request['user_hrn'] = slice.user_hrn
262     request['timestamp'] = slice.created
263     request['authority_hrn'] = slice.authority_hrn
264     request['slice_name'] = slice.slice_name
265     request['number_of_nodes'] = slice.number_of_nodes
266     request['type_of_nodes'] = slice.type_of_nodes
267     request['purpose'] = slice.purpose
268     return request
269
270 def make_request_authority(authority):
271     request = {}
272     request['type']                  = 'authority'
273     request['id']                    = authority.id
274     request['site_name']             = authority.site_name
275     request['site_latitude']         = authority.site_latitude
276     request['site_longitude']        = authority.site_longitude
277     request['site_url']              = authority.site_url
278     request['site_authority']        = authority.site_authority
279     request['site_abbreviated_name'] = authority.site_abbreviated_name
280     request['address_line1']         = authority.address_line1
281     request['address_line2']         = authority.address_line2
282     request['address_line3']         = authority.address_line3
283     request['address_city']          = authority.address_city
284     request['address_postalcode']    = authority.address_postalcode
285     request['address_state']         = authority.address_state
286     request['address_country']       = authority.address_country
287     request['authority_hrn']         = authority.authority_hrn
288     request['timestamp']             = authority.created
289     return request
290
291 def make_requests(pending_users, pending_slices, pending_authorities):
292     requests = []
293     for user in pending_users:
294         requests.append(make_request_user(user))
295     for slice in pending_slices:
296         requests.append(make_request_slice(slice))
297     for authority in pending_authorities:
298         requests.append(make_request_authority(authority))
299     return requests   
300
301 def get_request_by_id(ids):
302     sorted_ids = { 'user': [], 'slice': [], 'authority': [] }
303     for type__id in ids:
304         type, id = type__id.split('__')
305         sorted_ids[type].append(id)
306         
307     if not ids:
308         pending_users  = PendingUser.objects.all()
309         pending_slices = PendingSlice.objects.all()
310         pending_authorities = PendingAuthority.objects.all()
311     else:
312         pending_users  = PendingUser.objects.filter(id__in=sorted_ids['user']).all()
313         pending_slices = PendingSlice.objects.filter(id__in=sorted_ids['slice']).all()
314         pending_authorities = PendingAuthority.objects.filter(id__in=sorted_ids['authority']).all()
315
316     return make_requests(pending_users, pending_slices, pending_authorities)
317
318 def get_requests(authority_hrns=None):
319     print "get_request_by_authority auth_hrns = ", authority_hrns
320     if not authority_hrns:
321         ## get those pending users who have confirmed their emails
322         pending_users  = PendingUser.objects.filter(status__iexact = 'True')
323         pending_slices = PendingSlice.objects.all()
324         pending_authorities = PendingAuthority.objects.all()
325     else:
326         pending_users  = PendingUser.objects
327         pending_slices = PendingSlice.objects
328         pending_authorities = PendingAuthority.objects
329         from django.db.models import Q
330         list_user_Q = list()
331         list_slice_Q = list()
332         list_auth_Q = list()
333         for hrn in authority_hrns:
334             list_user_Q.append(Q(authority_hrn__startswith=hrn, status__iexact = 'True'))
335             list_slice_Q.append(Q(authority_hrn__startswith=hrn))
336             list_auth_Q.append(Q(site_authority__startswith=hrn))
337             print "startswith hrn = ",hrn
338         from operator import __or__ as OR
339         pending_users        = pending_users.filter(reduce(OR, list_user_Q))
340         pending_slices       = pending_slices.filter(reduce(OR, list_slice_Q))
341         pending_authorities  = pending_authorities.filter(reduce(OR, list_auth_Q))
342         #pending_authorities  = pending_authorities.all() #filter(reduce(OR, list_Q))
343
344     return make_requests(pending_users, pending_slices, pending_authorities)
345
346 # XXX Is it in sync with the form fields ?
347
348 def portal_validate_request(wsgi_request, request_ids):
349     status = {}
350
351     if not isinstance(request_ids, list):
352         request_ids = [request_ids]
353
354     requests = get_request_by_id(request_ids)
355     for request in requests:
356         # type, id, timestamp, details, allowed -- MISSING: authority_hrn
357         # CAREFUL about details
358         # user  : first name, last name, email, password, keypair
359         # slice : number of nodes, type of nodes, purpose
360         
361         request_status = {}
362
363         if request['type'] == 'user':
364
365             try:
366                 create_user(wsgi_request, request)
367                 request_status['SFA user'] = {'status': True }
368                 PendingUser.objects.get(id=request['id']).delete()
369             except Exception, e:
370                  request_status['SFA user'] = {'status': False, 'description': str(e)}
371                        
372 #            user_params = {'status':2}
373 #            manifold_update_user(request, request['email'], user_params)
374
375             # MANIFOLD user should be added beforehand, during registration
376             #try:
377             #    manifold_user_params = { key: request[key] for key in MANIFOLD_USER_KEYS }
378             #    # XXX # manifold_add_user(manifold_user_params)
379             #    request_status['MySlice user'] = {'status': True }
380             #except Exception, e:
381             #    request_status['MySlice user'] = {'status': False, 'description': str(e)}
382
383             # XXX
384             #manifold_account_params = { key: request[key] for key in MANIFOLD_ACCOUNT_KEYS }
385             #manifold_add_account(manifold_account_params)
386             #request_status['MySlice testbed accounts'] = {'status': False }
387
388         elif request['type'] == 'slice':
389             try:
390                 create_slice(wsgi_request, request)
391                 request_status['SFA slice'] = {'status': True }
392                 PendingSlice.objects.get(id=request['id']).delete()
393
394             except Exception, e:
395                 request_status['SFA slice'] = {'status': False, 'description': str(e)}
396
397         elif request['type'] == 'authority':
398             try:
399                 #hrn = "%s.%s" % (request['authority_hrn'], request['site_authority'])
400                 hrn = request['site_authority']
401                 # XXX tmp sfa dependency
402                 from sfa.util.xrn import Xrn 
403                 urn = Xrn(hrn, request['type']).get_urn()
404                 
405                 # Only hrn is required for Manifold Query 
406                 sfa_authority_params = {
407                     'authority_hrn'        : hrn,
408                     #'authority_urn'        : urn,
409                     #'type'       : request['type'],
410                     #'pi'        : None,
411                     #'enabled'    : True
412                 }
413                 print "ADD Authority"
414                 sfa_add_authority(wsgi_request, sfa_authority_params)
415                 request_status['SFA authority'] = {'status': True }
416                 PendingAuthority.objects.get(id=request['id']).delete()
417
418             except Exception, e:
419                 request_status['SFA authority'] = {'status': False, 'description': str(e)}
420
421         # XXX Remove from Pendings in database
422
423         status['%s__%s' % (request['type'], request['id'])] = request_status
424
425     return status
426
427 def validate_action(request, **kwargs):
428     ids = filter(None, kwargs['id'].split('/'))
429     status = portal_validate_request(request, ids)
430     json_answer = json.dumps(status)
431     return HttpResponse (json_answer, mimetype="application/json")
432
433
434 def reject_action(request, **kwargs):
435     ids = filter(None, kwargs['id'].split('/'))
436     status = portal_reject_request(request, ids)
437     json_answer = json.dumps(status)
438     return HttpResponse (json_answer, mimetype="application/json")
439
440
441 def portal_reject_request(wsgi_request, request_ids):
442     status = {}
443     # get the domain url    
444     current_site = Site.objects.get_current()
445     current_site = current_site.domain
446
447
448     if not isinstance(request_ids, list):
449         request_ids = [request_ids]
450
451     requests = get_request_by_id(request_ids)
452     for request in requests:
453         # type, id, timestamp, details, allowed -- MISSING: authority_hrn
454         # CAREFUL about details
455         # user  : first name, last name, email, password, keypair
456         # slice : number of nodes, type of nodes, purpose
457         
458         request_status = {}
459
460         if request['type'] == 'user':
461             try:
462                 request_status['SFA user'] = {'status': True }
463                 # getting user email based on id 
464                 ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
465                 for user in PendingUser.objects.raw('SELECT * FROM portal_pendinguser WHERE id = %s', [request['id']]):
466                     user_email= user.email
467                     first_name = user.first_name
468                     last_name = user.last_name
469
470                 ctx = {
471                     'first_name'    : first_name, 
472                     'last_name'     : last_name, 
473                     'portal_url'    : current_site,
474                     }
475                 try:
476                     theme.template_name = 'user_request_denied.txt'
477                     text_content = render_to_string(theme.template, ctx)
478                     theme.template_name = 'user_request_denied.html'
479                     html_content = render_to_string(theme.template, ctx)
480                     theme.template_name = 'email_default_sender.txt'
481                     sender =  render_to_string(theme.template, ctx)
482                     sender = sender.replace('\n', '')
483                                
484                     subject = 'User request denied.'
485
486                     msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
487                     msg.attach_alternative(html_content, "text/html")
488                     msg.send()
489                 except Exception, e:
490                     print "Failed to send email, please check the mail templates and the SMTP configuration of your server"   
491             
492                 # removing from Django auth_user
493                 UserModel = get_user_model()
494                 UserModel._default_manager.filter(email__iexact = user_email).delete()
495                 # removing from Django portal_pendinguser
496                 PendingUser.objects.get(id=request['id']).delete()
497                 # removing from manifold
498                 # removing manifold account
499                 user_query = Query().get('local:user') \
500                     .filter_by('email', '==', user_email)           \
501                     .select('user_id')
502                 user = execute_admin_query(wsgi_request, user_query)
503                 user_id = user[0]['user_id']
504         
505                 platform_query = Query().get('local:platform') \
506                     .filter_by('platform', '==', 'myslice')           \
507                     .select('platform_id')
508                 platform = execute_admin_query(wsgi_request, platform_query)
509                 platform_id = platform[0]['platform_id']
510                 account_params = {'user_id':user_id}
511                 manifold_delete_account(request, platform_id, user_id, account_params)           
512              
513                 # removing manifold user
514                 user_params = {'user_id':user_id}
515                 manifold_delete_user(request, user_id, user_params)
516             except Exception, e:
517                 request_status['SFA authority'] = {'status': False, 'description': str(e)}
518                       
519         elif request['type'] == 'slice':
520             request_status['SFA slice'] = {'status': True } 
521
522             # getting user email based on id 
523             ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
524             for user in PendingSlice.objects.raw('SELECT * FROM portal_pendingslice WHERE id = %s', [request['id']]):
525                 user_email= user.type_of_nodes # XXX type_of_nodes field contains the email [shd be renamed in DB]
526                 slice_name = user.slice_name
527                 purpose = user.purpose
528                 url = user.number_of_nodes
529
530             ctx = {
531                 'slice_name': slice_name,
532                 'purpose': purpose,
533                 'url': url,
534                 'portal_url': current_site,
535                 }
536             try:
537                 theme.template_name = 'slice_request_denied.txt'
538                 text_content = render_to_string(theme.template, ctx)
539                 theme.template_name = 'slice_request_denied.html'
540                 html_content = render_to_string(theme.template, ctx)
541                 theme.template_name = 'email_default_sender.txt'
542                 sender =  render_to_string(theme.template, ctx)
543                 sender = sender.replace('\n', '')
544                                
545                 subject = 'Slice request denied.'
546
547                 msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
548                 msg.attach_alternative(html_content, "text/html")
549                 msg.send()
550             except Exception, e:
551                 print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
552                       
553             PendingSlice.objects.get(id=request['id']).delete()
554
555         elif request['type'] == 'authority':
556             request_status['SFA authority'] = {'status': True }
557             
558             # getting user email based on id 
559             ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
560             for user in PendingAuthority.objects.raw('SELECT * FROM portal_pendingauthority WHERE id = %s', [request['id']]):
561                 user_email= user.address_line1 # XXX address_line1 field contains the email [shd be renamed in DB]
562                 site_name = user.site_name
563                 city = user.address_city
564                 country = user.address_country
565                 short_name = user.site_abbreviated_name
566                 url = user.site_url
567
568             ctx = { 
569                 'site_name': site_name,
570                 'short_name': short_name,
571                 'url': url,
572                 'city': city,
573                 'country': country,                          
574                 'portal_url'    : current_site,
575                 }
576                 
577             try:
578                 theme.template_name = 'authority_request_denied.txt'
579                 text_content = render_to_string(theme.template, ctx)
580                 theme.template_name = 'authority_request_denied.html'
581                 html_content = render_to_string(theme.template, ctx)
582                 theme.template_name = 'email_default_sender.txt'
583                 sender =  render_to_string(theme.template, ctx)
584                 sender = sender.replace('\n', '')
585                 subject = 'Authority request denied.'
586                 msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
587                 msg.attach_alternative(html_content, "text/html")
588                 msg.send()
589             except Exception, e:
590                 print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
591
592             PendingAuthority.objects.get(id=request['id']).delete()
593
594         status['%s__%s' % (request['type'], request['id'])] = request_status
595
596     return status
597
598 # Django and ajax
599 # http://djangosnippets.org/snippets/942/
600
601
602
603 #-------------------------------------------------------------------------------
604 # REQUESTS - Slices
605 #-------------------------------------------------------------------------------
606
607 def create_slice(wsgi_request, request):
608     """
609     Arguments:
610         wsgi_request (~ WSGIRequest) : 
611         request (dict) : the slice request in our own dict format
612
613     Raises:
614         Exception
615     """
616     hrn = "%s.%s" % (request['authority_hrn'], request['slice_name'])
617     # XXX tmp sfa dependency
618     from sfa.util.xrn import Xrn 
619     urn = Xrn(hrn, request['type']).get_urn()
620     
621     # Add User to Slice if we have the user_hrn in pendingslice table
622     user_hrn = request.get('user_hrn', None)
623     user_hrns = list([user_hrn]) if user_hrn else list()
624     
625     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
626     user_query  = Query().get('myslice:user').select('user_hrn','user_email').filter_by('user_hrn','==',user_hrn)
627     user_details_sfa = execute_admin_query(wsgi_request, user_query)
628     if not user_details_sfa:
629         raise Exception, "User %s doesn't exist, validate user before validating slice" % user_hrn
630     for user in user_details_sfa:
631         user_email = user['user_email']
632
633     # XXX LOIC Quick fix because this is totally inconsistent
634     if not 'number_of_nodes' in request:
635         request['number_of_nodes']=""
636
637     # XXX We should create a slice with Manifold terminology
638     slice_params = {
639         'slice_hrn'        : hrn, 
640         'slice_urn'        : urn,
641         'slice_type'       : request['type'],
642         'url'              : request['number_of_nodes'],
643         'users'            : user_hrns,
644         'slice_enabled'    : True
645     }
646     # ignored in request: id, timestamp,  number_of_nodes, type_of_nodes, purpose
647
648     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
649     query = Query.create('myslice:slice').set(slice_params).select('slice_hrn')
650     results = execute_query(wsgi_request, query)
651     if not results:
652         raise Exception, "Could not create %s. Already exists ?" % slice_params['hrn']
653     else:
654         clear_user_creds(wsgi_request,user_email)
655         # log user activity
656         activity.slice.validate(request, { "slice" : hrn })
657         try:
658             theme.template_name = 'slice_request_validated.txt'
659             text_content = render_to_string(theme.template, request)
660             theme.template_name = 'slice_request_validated.html'
661             html_content = render_to_string(theme.template, request)
662         
663             theme.template_name = 'email_default_sender.txt'
664             sender =  render_to_string(theme.template, request)
665             sender = sender.replace('\n', '')
666
667             subject = 'Slice request validated'
668
669             msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
670             msg.attach_alternative(html_content, "text/html")
671             msg.send()
672         except Exception, e:
673             print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
674        
675     return results
676
677 def create_pending_slice(wsgi_request, request, email):
678     """
679     """
680
681     # Insert an entry in the PendingSlice table
682     s = PendingSlice(
683         slice_name      = request['slice_name'],
684         user_hrn        = request['user_hrn'],
685         authority_hrn   = request['authority_hrn'],
686         number_of_nodes = request['url'], # field needs to be renamed
687         purpose         = request['purpose'],
688         type_of_nodes   = request['email'] # field needs to be renamed 
689     )
690     s.save()
691
692     try:
693         # Send an email: the recipients are the PI of the authority
694         recipients = authority_get_pi_emails(wsgi_request, request['authority_hrn'])
695
696         theme.template_name = 'slice_request_email.txt' 
697         text_content = render_to_string(theme.template, request)
698     
699         theme.template_name = 'slice_request_email.html' 
700         html_content = render_to_string(theme.template, request)
701     
702         theme.template_name = 'slice_request_email_subject.txt'
703         subject = render_to_string(theme.template, request)
704         subject = subject.replace('\n', '')
705     
706         sender = email
707         msg = EmailMultiAlternatives(subject, text_content, sender, recipients)
708         msg.attach_alternative(html_content, "text/html")
709         msg.send()
710     except Exception, e:
711         print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
712
713 #-------------------------------------------------------------------------------
714 # REQUESTS - Users
715 #-------------------------------------------------------------------------------
716
717 def manifold_add_reference_user_accounts(wsgi_request, request):
718     """When a new user is created, add reference accounts to the reference platform.
719     """
720     # XXX XXX XXX The rest of this function has to be checked XXX XXX XXX
721
722     # Retrieve user information
723     user_query  = Query().get('local:user')             \
724         .select('user_id', 'config', 'email', 'status') \
725         .filter_by('email', '==', request['email'])
726     user_details = execute_admin_query(wsgi_request, user_query)
727
728     # USER MAIN ACCOUNT != reference
729     #print 'USER MAIN ACCOUNT != reference'
730     list_accounts_query = Query().get('local:account')              \
731         .select('user_id', 'platform_id', 'auth_type', 'config')    \
732         .filter_by('user_id', '==', user_details[0]['user_id'])     \
733         .filter_by('auth_type', '!=', 'reference')
734     list_accounts = execute_admin_query(wsgi_request, list_accounts_query)
735
736     # XXX main_platform is being erased several times ???
737     for account in list_accounts:
738         main_platform_query = Query().get('local:platform')         \
739             .select('platform_id', 'platform')                      \
740             .filter_by('platform_id', '==', account['platform_id'])
741         main_platform = execute_admin_query(wsgi_request, main_platform_query)
742
743     # Add reference accounts on SFA enabled platforms
744     platforms_query = Query().get('local:platform') \
745         .filter_by('disabled', '==', '0')           \
746         .filter_by('gateway_type', '==', 'sfa')     \
747         .select('platform_id', 'gateway_type')
748     platforms = execute_admin_query(wsgi_request, platforms_query)
749     for platform in platforms:
750         #print "add reference to platform ",platform
751         manifold_account_params = {
752             'user_id'       : user_details[0]['user_id'],
753             'platform_id'   : platform['platform_id'],
754             'auth_type'     : 'reference',
755             'config'        : '{"reference_platform": "' + main_platform[0]['platform'] + '"}',
756         }
757         manifold_add_account(wsgi_request, manifold_account_params)
758
759 def sfa_create_user(wsgi_request, request, namespace = None, as_admin = False):
760     """
761     Arguments:
762         wsgi_request (~ WSGIRequest) : 
763         request (dict) : the user request in our own dict format
764
765     Raises:
766         Exception
767     """
768     from sfa.util.xrn import Xrn 
769
770     auth_pi = request.get('pi', None)
771     auth_pi = list([auth_pi]) if auth_pi else list()
772
773     # We create a user request with Manifold terminology
774     sfa_user_params = {
775         'user_hrn'          : request['user_hrn'],
776         'user_email'        : request['email'],
777         'user_urn'          : Xrn(request['user_hrn'], request['type']).get_urn(),
778         'user_type'         : request['type'],
779         'keys'              : request['public_key'],
780         'user_first_name'   : request['first_name'],
781         'user_last_name'    : request['last_name'],
782         'pi_authorities'    : auth_pi,
783         'user_enabled'      : True
784     }
785
786     if namespace is not None:
787         query = Query.create('%s:user' % namespace).set(sfa_user_params).select('user_hrn')
788     else:
789         # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
790         query = Query.create('myslice:user').set(sfa_user_params).select('user_hrn')
791
792     if as_admin:
793         results = execute_admin_query(wsgi_request, query)
794     else:
795         results = execute_query(wsgi_request, query)
796
797     if not results:
798         raise Exception, "Could not create %s. Already exists ?" % sfa_user_params['user_hrn']
799     else:
800         try:
801             theme.template_name = 'user_request_validated.txt'
802             text_content = render_to_string(theme.template, request)
803             theme.template_name = 'user_request_validated.html'
804             html_content = render_to_string(theme.template, request)
805         
806             theme.template_name = 'email_default_sender.txt'
807             sender =  render_to_string(theme.template, request)
808             sender = sender.replace('\n', '')
809
810
811             subject = 'User validated'
812
813             msg = EmailMultiAlternatives(subject, text_content, sender, [request['email']])
814             msg.attach_alternative(html_content, "text/html")
815             msg.send()
816         except Exception, e:
817             print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
818
819     return results
820
821 def iotlab_create_user (wsgi_request, request, namespace = None, as_admin=False):
822    
823     import requests
824     import time
825     from requests.auth import HTTPBasicAuth
826     
827     URL_REST = ConfigEngine.default_iotlab_url
828     LOGIN_ADMIN = ConfigEngine.default_iotlab_admin_user
829     PASSWORD_ADMIN = ConfigEngine.default_iotlab_admin_password
830
831     auth = HTTPBasicAuth(LOGIN_ADMIN,PASSWORD_ADMIN)
832     headers = {'content-type': 'application/json'}
833
834     for user in PendingUser.objects.raw('SELECT * FROM portal_pendinguser WHERE email = %s', [request['email']]):
835         password= user.password
836
837
838     iotlab_user_params = {
839         "type"          : "SA",
840         #"login"         : request['email'], #auto generated by iotlab
841         "password"      : password,
842         "firstName"     : request['first_name'],
843         "lastName"      : request['last_name'],
844         "email"         : request['email'],
845         "structure"     : request['authority_hrn'],
846         "city"          : "N/A",
847         "country"       : "N/A",
848         "sshPublicKey"  : request['public_key'],
849         "motivations"   : "SFA federation",
850     }    
851    
852     iotlab_user_params1 = json.dumps(iotlab_user_params)
853     r=requests.post(url=URL_REST, data=iotlab_user_params1, headers=headers, auth=auth)
854     print 'Create iotlab user : ', r.status_code, r.text
855     return r.text
856
857 def create_user(wsgi_request, request, namespace = None, as_admin = False):
858     # XXX This has to be stored centrally
859     USER_STATUS_ENABLED = 2
860
861     # NOTE : if we were to create a user directly (just like we create slices,
862     # we would have to perform the steps in create_pending_user too
863
864     # Add the user to the SFA registry
865     sfa_create_user(wsgi_request, request, namespace, as_admin)
866
867     # Update Manifold user status
868     manifold_update_user(wsgi_request, request['email'], {'status': USER_STATUS_ENABLED})
869
870     # Add reference accounts for platforms
871     manifold_add_reference_user_accounts(wsgi_request, request)
872
873     # Add the user to iotlab portal if theme is set to onelab
874     if theme.theme == 'onelab':
875         iotlab_create_user (wsgi_request, request)
876
877 def create_pending_user(wsgi_request, request, user_detail):
878     """
879     """
880
881     # Insert an entry in the PendingUser table
882     b = PendingUser(
883         first_name    = request['first_name'],
884         last_name     = request['last_name'],
885         authority_hrn = request['authority_hrn'],
886         email         = request['email'],
887         password      = request['password'],
888         public_key    = request['public_key'],
889         private_key   = request['private_key'],
890         user_hrn      = request['user_hrn'],
891         pi            = request['pi'],
892         email_hash    = request['email_hash'],
893         status        = 'False',
894     )
895     b.save()
896     # sends email to user to activate the email
897     theme.template_name = 'activate_user.html'
898     html_content = render_to_string(theme.template, request)
899     theme.template_name = 'activate_user.txt'
900     text_content = render_to_string(theme.template, request)
901     theme.template_name = 'activate_user_email_subject.txt'
902     subject = render_to_string(theme.template, request)
903     subject = subject.replace('\n', '')
904     theme.template_name = 'email_default_sender.txt'
905     sender =  render_to_string(theme.template, request)
906     sender = sender.replace('\n', '')
907     recipient = [request['email']]
908     #recipient = recipient.append(request['email'])
909
910     msg = EmailMultiAlternatives(subject, text_content, sender, recipient)
911     msg.attach_alternative(html_content, "text/html")
912     msg.send()
913    
914     # saves the user to django auth_user table [needed for password reset]
915     user = User.objects.create_user(request['email'], request['email'], request['password'])
916
917     # Creating a manifold user
918     user_id = manifold_add_user(wsgi_request, request)
919
920     # Creating a Manifold account on the MySlice platform
921     # Note the JSON representation of public and private keys already includes quotes
922     account_config = {
923         'user_hrn'          : request['user_hrn'],
924         'user_public_key'   : request['public_key'],
925     }
926     if request['private_key']:
927         account_config['user_private_key'] = request['private_key']
928
929     user_id = user_detail['user_id'] + 1 # the user_id for the newly created user in local:user
930
931     # XXX TODO: Require a myslice platform
932     # ALERT: this will disapear with ROUTERV2 of Manifold
933     # We have to consider the case where several registries can be used
934     # Removed hardcoded platform = 5
935     # This platform == 'myslice' is a TMP FIX !!
936     try:
937         reg_platform_query = Query().get('local:platform') \
938             .filter_by('platform', '==', 'myslice')           \
939             .select('platform_id')
940         reg_platform = execute_admin_query(wsgi_request, reg_platform_query)
941
942         reg_platform_id = reg_platform[0]['platform_id']
943         account_params = {
944             'platform_id'   : reg_platform_id, # XXX ALERT !!
945             'user_id'       : user_id, 
946             'auth_type'     : request['auth_type'], 
947             'config'        : json.dumps(account_config),
948         }
949         manifold_add_account(wsgi_request, account_params)
950     except Exception, e:
951         print "Failed creating manifold account on platform %s for user: %s" % ('myslice', request['email'])
952
953     try:
954         # Send an email: the recipients are the PI of the authority
955         # If No PI is defined for this Authority, send to a default email (different for each theme)
956         recipients = authority_get_pi_emails(wsgi_request, request['authority_hrn'])
957         
958         theme.template_name = 'user_request_email.html'
959         html_content = render_to_string(theme.template, request)
960  
961         theme.template_name = 'user_request_email.txt'
962         text_content = render_to_string(theme.template, request)
963     
964         theme.template_name = 'user_request_email_subject.txt'
965         subject = render_to_string(theme.template, request)
966         subject = subject.replace('\n', '')
967     
968         theme.template_name = 'email_default_sender.txt'
969         sender =  render_to_string(theme.template, request)
970         sender = sender.replace('\n', '')
971     
972         msg = EmailMultiAlternatives(subject, text_content, sender, recipients)
973         msg.attach_alternative(html_content, "text/html")
974         msg.send()
975     except Exception, e:
976         print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
977         import traceback
978         traceback.print_exc()