Merge branch 'onelab' of ssh://git.onelab.eu/git/myslice into onelab
[myslice.git] / portal / actions.py
1 from django.http                    import HttpResponse
2 from manifold.core.query            import Query
3 from manifoldapi.manifoldapi        import execute_query,execute_admin_query
4 from portal.models                  import PendingUser, PendingSlice, PendingAuthority, PendingProject
5 from unfold.page                    import Page
6
7 import json
8
9 from django.contrib.auth.models     import User
10 from django.contrib.sites.models    import Site
11 from django.contrib.auth            import get_user_model
12 from django.template.loader         import render_to_string
13 from django.core.mail               import EmailMultiAlternatives, send_mail
14
15 from myslice.theme                  import ThemeView
16 from myslice.configengine           import ConfigEngine
17
18
19 theme = ThemeView()
20
21 import activity.slice
22
23 # Thierry: moving this right into the code so 
24 # most people can use myslice without having to install sfa
25 # XXX tmp sfa dependency, should be moved to SFA gateway
26 #from sfa.util.xrn                import Xrn 
27
28
29 # Get the list of pis in a given authority
30 def authority_get_pis(request, authority_hrn):
31
32     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
33     query = Query.get('myslice:authority').filter_by('authority_hrn', '==', authority_hrn).select('pi_users')
34     results = execute_admin_query(request, query)
35     print "authority_get_pis = %s" % results
36     # NOTE: temporarily commented. Because results is giving empty list. 
37     # Needs more debugging
38     #if not results:
39     #    raise Exception, "Authority not found: %s" % authority_hrn
40     #result, = results
41     #return result['pi_users']
42     return results
43
44 #check the user is pi or not in the registry
45 def authority_check_pis(request, user_email):
46     try:
47         user_query  = Query().get('local:user').filter_by('email', '==', user_email).select('user_id','email','password','config')
48         user_details = execute_admin_query(request, user_query)
49     
50         # getting the authority_hrn
51         for user_detail in user_details:
52             user_id = user_detail['user_id']
53             if user_detail['config']:
54                 config = json.loads(user_detail['config'])
55                 authority_hrn = config.get('authority','Unknown Authority')
56  
57         account_query  = Query().get('local:account').filter_by('user_id', '==', user_id).select('user_id','platform_id','auth_type','config')
58         account_details = execute_admin_query(request, account_query)
59     
60         platform_query  = Query().get('local:platform').select('platform_id','platform')
61         platform_details = execute_admin_query(request, platform_query)
62     
63         for account_detail in account_details:
64             for platform_detail in platform_details:
65                 if platform_detail['platform_id'] == account_detail['platform_id']:
66                     if 'myslice' in platform_detail['platform']:
67                         account_config = json.loads(account_detail['config'])
68                         user_hrn = account_config.get('user_hrn','N/A')
69
70         pi_status = False
71         pis = authority_get_pis (request, authority_hrn)
72         for pi in pis:
73             pi_list = pi['pi_users']
74
75         if user_hrn in pi_list:
76             pi_status = True
77         return pi_status
78
79     except Exception,e:
80         print "Exception in actions.py in authority_check_pis %s" % e
81         return None
82
83
84 def authority_add_pis(request, authority_hrn,user_hrn):
85     try:
86         # getting pis of the authority of the user
87         pis = authority_get_pis (request, authority_hrn)
88         for pi in pis:
89             pi_list = pi['pi_users']
90    
91         updated_pi_list = pi_list.append(user_hrn) 
92         query = Query.update('authority').filter_by('authority_hrn', '==', authority_hrn).set({'pi_users':pi_list})
93         results = execute_query(request,query)
94         newpis = authority_get_pis (request, authority_hrn)
95         return newpis
96     except Exception,e: 
97         print "Exception in actions.py in authority_add_pis %s" % e
98         return None
99
100
101 def authority_remove_pis(request, authority_hrn,user_hrn):
102     try:
103         # getting pis of the authority of the user
104         pis = authority_get_pis (request, authority_hrn)
105         for pi in pis:
106             pi_list = pi['pi_users']
107  
108         updated_pi_list = pi_list.remove(user_hrn) 
109         query = Query.update('authority').filter_by('authority_hrn', '==', authority_hrn).set({'pi_users':pi_list})
110         results = execute_query(request,query)
111         newpis = authority_get_pis (request, authority_hrn)
112         return newpis
113     except Exception,e: 
114         print "Exception in actions.py in authority_remove_pis %s" % e
115         return None
116
117
118 def authority_get_pi_emails(request, authority_hrn):
119     pi_users = authority_get_pis(request,authority_hrn)
120     print "pi_users = %s" % pi_users
121
122     if any(pi['pi_users'] == None or not pi['pi_users']  for pi in pi_users):
123         #theme.template_name = 'email_default_recipients.txt' 
124         #default_email = render_to_string(theme.template, request)
125         #default_email = default_email.replace('\n', '')
126         #return default_email
127         # the above doesn't work
128         return ['support@onelab.eu']
129     else:
130         pi_user_hrns = [ hrn for x in pi_users for hrn in x['pi_users'] ]
131
132         # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
133         query = Query.get('myslice:user').filter_by('user_hrn', 'included', pi_user_hrns).select('user_email')
134         results = execute_admin_query(request, query)
135         return [result['user_email'] for result in results]
136
137 #clear user credentials
138 def clear_user_creds(request, user_email):
139     try:
140         user_query  = Query().get('local:user').filter_by('email', '==', user_email).select('user_id','email','password','config')
141         user_details = execute_admin_query(request, user_query)
142     
143         # getting the user_id from the session
144         for user_detail in user_details:
145             user_id = user_detail['user_id']
146             user_email = user_detail['email']
147     
148         account_query  = Query().get('local:account').filter_by('user_id', '==', user_id).select('user_id','platform_id','auth_type','config')
149         account_details = execute_admin_query(request, account_query)
150     
151         platform_query  = Query().get('local:platform').select('platform_id','platform')
152         platform_details = execute_admin_query(request, platform_query)
153     
154         for account_detail in account_details:
155             for platform_detail in platform_details:
156                 if platform_detail['platform_id'] == account_detail['platform_id']:
157                     if 'myslice' in platform_detail['platform']:
158                         account_config = json.loads(account_detail['config'])
159                         #user_cred = account_config.get('delegated_user_credential','N/A')
160                         user_cred = account_config.get('user_credential','N/A')
161                         if 'N/A' not in user_cred:
162                             user_hrn = account_config.get('user_hrn','N/A')
163                             user_pub_key = json.dumps(account_config.get('user_public_key','N/A'))
164                             user_priv_key = json.dumps(account_config.get('user_private_key','N/A'))
165                             updated_config = '{"user_public_key":'+ user_pub_key + ', "user_private_key":'+ user_priv_key + ', "user_hrn":"'+ user_hrn + '"}'
166                             user_params = { 'config': updated_config}
167                             manifold_update_account(request, user_id,user_params)
168                             return user_email
169                         else:
170                             return None
171
172     except Exception,e:
173         print "Exception in actions.py in clear_user_creds %s" % e
174         return None
175
176 def is_pi(wsgi_request, user_hrn, authority_hrn):
177     # authorities from user where user_hrn == "ple.upmc.jordan_auge"
178     print "#### actions.py is_pi authority_hrn = ", authority_hrn
179     try:
180         # CACHE PB with fields
181         page = Page(wsgi_request)
182         metadata = page.get_metadata()
183         user_md = metadata.details_by_object('user')
184         user_fields = [column['name'] for column in user_md['column']]
185         
186         # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
187         query  = Query().get('myslice:user').select(user_fields).filter_by('user_hrn','==',user_hrn)
188         #query = Query.get('myslice:user').filter_by('user_hrn', '==', user_hrn).select('pi_authorities')
189         results = execute_query(wsgi_request, query)
190         print "is_pi results = ", results
191         for user_detail in results:
192             if authority_hrn in user_detail['pi_authorities']:
193                 return True
194     except Exception,e:
195         print "Exception in actions.py in is_pi %s" % e
196     return False
197     
198 # SFA get record
199
200 def sfa_get_user(request, user_hrn, pub):
201
202     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
203     query_sfa_user = Query.get('myslice:user').filter_by('user_hrn', '==', user_hrn)
204     result_sfa_user = execute_admin_query(request, query_sfa_user)
205     return result_sfa_user                        
206
207 def sfa_update_user(request, user_hrn, user_params):
208     # user_params: keys [public_key] 
209     if 'email' in user_params:
210         user_params['user_email'] = user_params['email']
211
212     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
213     query = Query.update('myslice:user').filter_by('user_hrn', '==', user_hrn).set(user_params).select('user_hrn')
214     results = execute_admin_query(request,query)
215     return results
216
217 def sfa_add_authority(request, authority_params):
218
219     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
220     query = Query.create('authority').set(authority_params).select('authority_hrn')
221     results = execute_query(request, query)
222     print "sfa_add_auth results=",results
223     if not results:
224         raise Exception, "Could not create %s. Already exists ?" % authority_params['hrn']
225     return results
226
227 def sfa_add_user_to_slice(request, user_hrn, slice_params):
228 # UPDATE myslice:slice SET researcher=['ple.upmc.jordan_auge','ple.inria.thierry_parmentelat','ple.upmc.loic_baron','ple.upmc.ciro_scognamiglio','ple.upmc.mohammed-yasin_rahman','ple.upmc.azerty'] where slice_hrn=='ple.upmc.myslicedemo'
229
230     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
231     query_current_users = Query.get('myslice:slice').select('user').filter_by('slice_hrn','==',slice_params['hrn'])
232     results_current_users = execute_query(request, query_current_users)
233     slice_params['researcher'] = slice_params['researcher'] | results_current_users
234
235     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
236     query = Query.update('myslice:slice').filter_by('user_hrn', '==', user_hrn).set(slice_params).select('slice_hrn')
237     results = execute_query(request, query)
238 # Also possible but not supported yet
239 # UPDATE myslice:user SET slice=['ple.upmc.agent','ple.upmc.myslicedemo','ple.upmc.tophat'] where user_hrn=='ple.upmc.azerty'
240     if not results:
241         raise Exception, "Could not create %s. Already exists ?" % slice_params['hrn']
242     return results
243
244 # Propose hrn
245
246 def manifold_add_user(wsgi_request, request):
247     """Add a Manifold user corresponding to a user request.
248
249     Args:
250         wsgi_request: a WSGIRequest instance
251         request (dict): a dictionary containing the user request built from the
252             form.
253
254     Returns:
255         The user_id of the inserted user.
256
257     Raises:
258         ?
259     
260     """
261     USER_CONFIG = '{"firstname": "%(first_name)s", "lastname": "%(last_name)s", "authority": "%(authority_hrn)s"}'
262
263     user_params = {
264         'email'     : request['email'],
265         'password'  : request['password'],
266         'config'    : USER_CONFIG % request,
267         'status'    : 1,
268     }
269
270     query = Query.create('local:user').set(user_params).select('email')
271     results = execute_admin_query(request, query)
272     if not results:
273         raise Exception, "Failed creating manifold user: %s" % user_params['email']
274     result = results[0]
275     return result['email']
276
277 def manifold_update_user(request, email, user_params):
278     # user_params: password, config e.g., 
279     query = Query.update('local:user').filter_by('email', '==', email).set(user_params).select('email')
280     results = execute_admin_query(request,query)
281     # NOTE: results remains empty and goes to Exception. However, it updates the manifold DB.
282     # That's why I commented the exception part. -- Yasin 
283     #if not results:
284     #    raise Exception, "Failed updating manifold user: %s" % user_params['email']
285     #result, = results
286     return results
287
288 def manifold_add_account(request, account_params):
289     query = Query.create('local:account').set(account_params).select(['user', 'platform'])
290     results = execute_admin_query(request,query)
291     if not results:
292         raise Exception, "Failed creating manifold account on platform %s for user: %s" % (account_params['platform'], account_params['user'])
293     result, = results
294     return result['user_id']
295
296 def manifold_update_account(request,user_id,account_params):
297     # account_params: config
298     query = Query.update('local:account').filter_by('platform', '==', 'myslice').filter_by('user_id', '==', user_id).set(account_params).select('user_id')
299     results = execute_admin_query(request,query)
300     return results
301
302 #explicitly mention the platform_id
303 def manifold_delete_account(request, platform_id, user_id, account_params):
304     query = Query.delete('local:account').filter_by('platform_id', '==', platform_id).filter_by('user_id', '==', user_id).set(account_params).select('user_id')
305     results = execute_admin_query(request,query)
306     return results
307
308 def manifold_delete_user(request, user_id, user_params):
309     query = Query.delete('local:user').filter_by('user_id', '==', user_id).set(user_params).select('user_id')
310     results = execute_admin_query(request,query)
311     return results
312
313
314 #not tested
315 def manifold_add_platform(request, platform_params):
316     query = Query.create('local:platform').set(platform_params).select(['user', 'platform'])
317     results = execute_admin_query(request,query)
318     if not results:
319         raise Exception, "Failed creating manifold platform %s for user: %s" % (platform_params['platform'], platform_params['user'])
320     result, = results
321     return result['platform_id']
322
323
324 def make_request_user(user):
325     request = {}
326     request['type']          = 'user'
327     request['id']            = user.id
328     request['timestamp']     = user.created # XXX in DB ?
329     request['authority_hrn'] = user.authority_hrn
330     request['first_name']    = user.first_name
331     request['last_name']     = user.last_name
332     request['email']         = user.email
333     request['login']         = user.login
334     request['user_hrn']      = user.user_hrn
335     request['public_key']    = user.public_key
336     request['private_key']   = user.private_key
337     return request
338
339 def make_request_slice(slice):
340     request = {}
341     request['type'] = 'slice'
342     request['id'] = slice.id
343     request['user_hrn'] = slice.user_hrn
344     request['timestamp'] = slice.created
345     request['authority_hrn'] = slice.authority_hrn
346     request['slice_name'] = slice.slice_name
347     request['number_of_nodes'] = slice.number_of_nodes
348     request['type_of_nodes'] = slice.type_of_nodes
349     request['purpose'] = slice.purpose
350     return request
351
352 def make_request_project(project):
353     request = {}
354     request['type'] = 'project'
355     request['user_hrn'] = project.user_hrn
356     request['timestamp'] = project.created
357     request['authority_hrn'] = project.authority_hrn
358     request['project_name'] = project.project_name
359     request['purpose'] = project.purpose
360     return request
361
362 def make_request_authority(authority):
363     request = {}
364     request['type']                  = 'authority'
365     request['id']                    = authority.id
366     request['site_name']             = authority.site_name
367     request['site_latitude']         = authority.site_latitude
368     request['site_longitude']        = authority.site_longitude
369     request['site_url']              = authority.site_url
370     request['site_authority']        = authority.site_authority
371     request['site_abbreviated_name'] = authority.site_abbreviated_name
372     request['address_line1']         = authority.address_line1
373     request['address_line2']         = authority.address_line2
374     request['address_line3']         = authority.address_line3
375     request['address_city']          = authority.address_city
376     request['address_postalcode']    = authority.address_postalcode
377     request['address_state']         = authority.address_state
378     request['address_country']       = authority.address_country
379     request['authority_hrn']         = authority.authority_hrn
380     request['timestamp']             = authority.created
381     return request
382
383 def make_requests(pending_users, pending_slices, pending_authorities, pending_projects):
384     requests = []
385     for user in pending_users:
386         requests.append(make_request_user(user))
387     for slice in pending_slices:
388         requests.append(make_request_slice(slice))
389     for authority in pending_authorities:
390         requests.append(make_request_authority(authority))
391     for project in pending_projects:
392         requests.append(make_request_project(project))
393     return requests   
394
395 def get_request_by_id(ids):
396     sorted_ids = { 'user': [], 'slice': [], 'authority': [] }
397     for type__id in ids:
398         type, id = type__id.split('__')
399         sorted_ids[type].append(id)
400         
401     if not ids:
402         pending_users  = PendingUser.objects.all()
403         pending_slices = PendingSlice.objects.all()
404         pending_authorities = PendingAuthority.objects.all()
405     else:
406         pending_users  = PendingUser.objects.filter(id__in=sorted_ids['user']).all()
407         pending_slices = PendingSlice.objects.filter(id__in=sorted_ids['slice']).all()
408         pending_authorities = PendingAuthority.objects.filter(id__in=sorted_ids['authority']).all()
409
410     return make_requests(pending_users, pending_slices, pending_authorities)
411
412 def get_requests(authority_hrns=None):
413     print "get_request_by_authority auth_hrns = ", authority_hrns
414     if not authority_hrns:
415         ## get those pending users who have confirmed their emails
416         pending_users  = PendingUser.objects.filter(status__iexact = 'True')
417         pending_slices = PendingSlice.objects.all()
418         pending_authorities = PendingAuthority.objects.all()
419         pending_projects = PendingProject.objects.all()
420         print "$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$" , pending_projects
421     else:
422         pending_users  = PendingUser.objects
423         pending_slices = PendingSlice.objects
424         pending_authorities = PendingAuthority.objects
425         pending_projects = PendingProject.objects
426         from django.db.models import Q
427         list_user_Q = list()
428         list_slice_Q = list()
429         list_auth_Q = list()
430         list_proj_Q = list()
431         for hrn in authority_hrns:
432             list_user_Q.append(Q(authority_hrn__startswith=hrn, status__iexact = 'True'))
433             list_slice_Q.append(Q(authority_hrn__startswith=hrn))
434             list_auth_Q.append(Q(site_authority__startswith=hrn))
435             list_proj_Q.append(Q(authority_hrn__startswith=hrn))
436             print "$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$" , list_proj_Q
437             print "startswith hrn = ",hrn
438         from operator import __or__ as OR
439         pending_users        = pending_users.filter(reduce(OR, list_user_Q))
440         pending_slices       = pending_slices.filter(reduce(OR, list_slice_Q))
441         pending_authorities  = pending_authorities.filter(reduce(OR, list_auth_Q))
442         pending_projects     = pending_projects.filter(reduce(OR, list_auth_Q))
443         #pending_authorities  = pending_authorities.all() #filter(reduce(OR, list_Q))
444
445     return make_requests(pending_users, pending_slices, pending_authorities, pending_projects)
446
447 # XXX Is it in sync with the form fields ?
448
449 def portal_validate_request(wsgi_request, request_ids):
450     status = {}
451
452     if not isinstance(request_ids, list):
453         request_ids = [request_ids]
454
455     requests = get_request_by_id(request_ids)
456     for request in requests:
457         # type, id, timestamp, details, allowed -- MISSING: authority_hrn
458         # CAREFUL about details
459         # user  : first name, last name, email, password, keypair
460         # slice : number of nodes, type of nodes, purpose
461         
462         request_status = {}
463
464         if request['type'] == 'user':
465
466             try:
467                 create_user(wsgi_request, request)
468                 request_status['SFA user'] = {'status': True }
469                 PendingUser.objects.get(id=request['id']).delete()
470             except Exception, e:
471                  request_status['SFA user'] = {'status': False, 'description': str(e)}
472                        
473 #            user_params = {'status':2}
474 #            manifold_update_user(request, request['email'], user_params)
475
476             # MANIFOLD user should be added beforehand, during registration
477             #try:
478             #    manifold_user_params = { key: request[key] for key in MANIFOLD_USER_KEYS }
479             #    # XXX # manifold_add_user(manifold_user_params)
480             #    request_status['MySlice user'] = {'status': True }
481             #except Exception, e:
482             #    request_status['MySlice user'] = {'status': False, 'description': str(e)}
483
484             # XXX
485             #manifold_account_params = { key: request[key] for key in MANIFOLD_ACCOUNT_KEYS }
486             #manifold_add_account(manifold_account_params)
487             #request_status['MySlice testbed accounts'] = {'status': False }
488
489         elif request['type'] == 'slice':
490             try:
491                 create_slice(wsgi_request, request)
492                 request_status['SFA slice'] = {'status': True }
493                 PendingSlice.objects.get(id=request['id']).delete()
494
495             except Exception, e:
496                 request_status['SFA slice'] = {'status': False, 'description': str(e)}
497
498         elif request['type'] == 'authority':
499             try:
500                 #hrn = "%s.%s" % (request['authority_hrn'], request['site_authority'])
501                 hrn = request['site_authority']
502                 # XXX tmp sfa dependency
503                 from sfa.util.xrn import Xrn 
504                 urn = Xrn(hrn, request['type']).get_urn()
505                 
506                 # Only hrn is required for Manifold Query 
507                 sfa_authority_params = {
508                     'authority_hrn'        : hrn,
509                     #'authority_urn'        : urn,
510                     #'type'       : request['type'],
511                     #'pi'        : None,
512                     #'enabled'    : True
513                 }
514                 print "ADD Authority"
515                 sfa_add_authority(wsgi_request, sfa_authority_params)
516                 request_status['SFA authority'] = {'status': True }
517                 PendingAuthority.objects.get(id=request['id']).delete()
518
519             except Exception, e:
520                 request_status['SFA authority'] = {'status': False, 'description': str(e)}
521
522         # XXX Remove from Pendings in database
523
524         status['%s__%s' % (request['type'], request['id'])] = request_status
525
526     return status
527
528 def validate_action(request, **kwargs):
529     ids = filter(None, kwargs['id'].split('/'))
530     status = portal_validate_request(request, ids)
531     json_answer = json.dumps(status)
532     return HttpResponse (json_answer, mimetype="application/json")
533
534
535 def reject_action(request, **kwargs):
536     ids = filter(None, kwargs['id'].split('/'))
537     status = portal_reject_request(request, ids)
538     json_answer = json.dumps(status)
539     return HttpResponse (json_answer, mimetype="application/json")
540
541
542 def portal_reject_request(wsgi_request, request_ids):
543     status = {}
544     # get the domain url    
545     current_site = Site.objects.get_current()
546     current_site = current_site.domain
547
548
549     if not isinstance(request_ids, list):
550         request_ids = [request_ids]
551
552     requests = get_request_by_id(request_ids)
553     for request in requests:
554         # type, id, timestamp, details, allowed -- MISSING: authority_hrn
555         # CAREFUL about details
556         # user  : first name, last name, email, password, keypair
557         # slice : number of nodes, type of nodes, purpose
558         
559         request_status = {}
560
561         if request['type'] == 'user':
562             try:
563                 request_status['SFA user'] = {'status': True }
564                 # getting user email based on id 
565                 ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
566                 for user in PendingUser.objects.raw('SELECT * FROM portal_pendinguser WHERE id = %s', [request['id']]):
567                     user_email= user.email
568                     first_name = user.first_name
569                     last_name = user.last_name
570
571                 ctx = {
572                     'first_name'    : first_name, 
573                     'last_name'     : last_name, 
574                     'portal_url'    : current_site,
575                     }
576                 try:
577                     theme.template_name = 'user_request_denied.txt'
578                     text_content = render_to_string(theme.template, ctx)
579                     theme.template_name = 'user_request_denied.html'
580                     html_content = render_to_string(theme.template, ctx)
581                     theme.template_name = 'email_default_sender.txt'
582                     sender =  render_to_string(theme.template, ctx)
583                     sender = sender.replace('\n', '')
584                                
585                     subject = 'User request denied.'
586
587                     msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
588                     msg.attach_alternative(html_content, "text/html")
589                     msg.send()
590                 except Exception, e:
591                     print "Failed to send email, please check the mail templates and the SMTP configuration of your server"   
592             
593                 # removing from Django auth_user
594                 UserModel = get_user_model()
595                 UserModel._default_manager.filter(email__iexact = user_email).delete()
596                 # removing from Django portal_pendinguser
597                 PendingUser.objects.get(id=request['id']).delete()
598                 # removing from manifold
599                 # removing manifold account
600                 user_query = Query().get('local:user') \
601                     .filter_by('email', '==', user_email)           \
602                     .select('user_id')
603                 user = execute_admin_query(wsgi_request, user_query)
604                 user_id = user[0]['user_id']
605         
606                 platform_query = Query().get('local:platform') \
607                     .filter_by('platform', '==', 'myslice')           \
608                     .select('platform_id')
609                 platform = execute_admin_query(wsgi_request, platform_query)
610                 platform_id = platform[0]['platform_id']
611                 account_params = {'user_id':user_id}
612                 manifold_delete_account(request, platform_id, user_id, account_params)           
613              
614                 # removing manifold user
615                 user_params = {'user_id':user_id}
616                 manifold_delete_user(request, user_id, user_params)
617             except Exception, e:
618                 request_status['SFA authority'] = {'status': False, 'description': str(e)}
619                       
620         elif request['type'] == 'slice':
621             request_status['SFA slice'] = {'status': True } 
622
623             # getting user email based on id 
624             ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
625             for user in PendingSlice.objects.raw('SELECT * FROM portal_pendingslice WHERE id = %s', [request['id']]):
626                 user_email= user.type_of_nodes # XXX type_of_nodes field contains the email [shd be renamed in DB]
627                 slice_name = user.slice_name
628                 purpose = user.purpose
629                 url = user.number_of_nodes
630
631             ctx = {
632                 'slice_name': slice_name,
633                 'purpose': purpose,
634                 'url': url,
635                 'portal_url': current_site,
636                 }
637             try:
638                 theme.template_name = 'slice_request_denied.txt'
639                 text_content = render_to_string(theme.template, ctx)
640                 theme.template_name = 'slice_request_denied.html'
641                 html_content = render_to_string(theme.template, ctx)
642                 theme.template_name = 'email_default_sender.txt'
643                 sender =  render_to_string(theme.template, ctx)
644                 sender = sender.replace('\n', '')
645                                
646                 subject = 'Slice request denied.'
647
648                 msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
649                 msg.attach_alternative(html_content, "text/html")
650                 msg.send()
651             except Exception, e:
652                 print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
653                       
654             PendingSlice.objects.get(id=request['id']).delete()
655
656         elif request['type'] == 'authority':
657             request_status['SFA authority'] = {'status': True }
658             
659             # getting user email based on id 
660             ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
661             for user in PendingAuthority.objects.raw('SELECT * FROM portal_pendingauthority WHERE id = %s', [request['id']]):
662                 user_email= user.address_line1 # XXX address_line1 field contains the email [shd be renamed in DB]
663                 site_name = user.site_name
664                 city = user.address_city
665                 country = user.address_country
666                 short_name = user.site_abbreviated_name
667                 url = user.site_url
668
669             ctx = { 
670                 'site_name': site_name,
671                 'short_name': short_name,
672                 'url': url,
673                 'city': city,
674                 'country': country,                          
675                 'portal_url'    : current_site,
676                 }
677                 
678             try:
679                 theme.template_name = 'authority_request_denied.txt'
680                 text_content = render_to_string(theme.template, ctx)
681                 theme.template_name = 'authority_request_denied.html'
682                 html_content = render_to_string(theme.template, ctx)
683                 theme.template_name = 'email_default_sender.txt'
684                 sender =  render_to_string(theme.template, ctx)
685                 sender = sender.replace('\n', '')
686                 subject = 'Authority request denied.'
687                 msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
688                 msg.attach_alternative(html_content, "text/html")
689                 msg.send()
690             except Exception, e:
691                 print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
692
693             PendingAuthority.objects.get(id=request['id']).delete()
694
695         status['%s__%s' % (request['type'], request['id'])] = request_status
696
697     return status
698
699 # Django and ajax
700 # http://djangosnippets.org/snippets/942/
701
702
703
704 #-------------------------------------------------------------------------------
705 # REQUESTS - Slices
706 #-------------------------------------------------------------------------------
707
708 def create_slice(wsgi_request, request):
709     """
710     Arguments:
711         wsgi_request (~ WSGIRequest) : 
712         request (dict) : the slice request in our own dict format
713
714     Raises:
715         Exception
716     """
717     hrn = "%s.%s" % (request['authority_hrn'], request['slice_name'])
718     # XXX tmp sfa dependency
719     from sfa.util.xrn import Xrn 
720     urn = Xrn(hrn, request['type']).get_urn()
721     
722     # Add User to Slice if we have the user_hrn in pendingslice table
723     user_hrn = request.get('user_hrn', None)
724     user_hrns = list([user_hrn]) if user_hrn else list()
725    
726     # CACHE PB with fields
727     page = Page(wsgi_request)
728     metadata = page.get_metadata()
729     user_md = metadata.details_by_object('user')
730     user_fields = [column['name'] for column in user_md['column']]
731
732     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
733     #user_query  = Query().get('myslice:user').select('user_hrn','user_email').filter_by('user_hrn','==',user_hrn)
734     user_query  = Query().get('myslice:user').select(user_fields).filter_by('user_hrn','==',user_hrn)
735     user_details_sfa = execute_admin_query(wsgi_request, user_query)
736     if not user_details_sfa:
737         raise Exception, "User %s doesn't exist, validate user before validating slice" % user_hrn
738     for user in user_details_sfa:
739         user_email = user['user_email']
740
741     # XXX LOIC Quick fix because this is totally inconsistent
742     if not 'number_of_nodes' in request:
743         request['number_of_nodes']=""
744
745     # XXX We should create a slice with Manifold terminology
746     slice_params = {
747         'slice_hrn'        : hrn, 
748         'slice_urn'        : urn,
749         'slice_type'       : request['type'],
750         'url'              : request['number_of_nodes'],
751         'users'            : user_hrns,
752         'slice_enabled'    : True
753     }
754     # ignored in request: id, timestamp,  number_of_nodes, type_of_nodes, purpose
755
756     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
757     query = Query.create('myslice:slice').set(slice_params).select('slice_hrn')
758     results = execute_query(wsgi_request, query)
759     if not results:
760         raise Exception, "Could not create %s. Already exists ?" % slice_params['hrn']
761     else:
762         clear_user_creds(wsgi_request,user_email)
763         # log user activity
764         activity.slice.validate(request, { "slice" : hrn })
765         try:
766             theme.template_name = 'slice_request_validated.txt'
767             text_content = render_to_string(theme.template, request)
768             theme.template_name = 'slice_request_validated.html'
769             html_content = render_to_string(theme.template, request)
770         
771             theme.template_name = 'email_default_sender.txt'
772             sender =  render_to_string(theme.template, request)
773             sender = sender.replace('\n', '')
774
775             subject = 'Slice request validated'
776
777             msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
778             msg.attach_alternative(html_content, "text/html")
779             msg.send()
780         except Exception, e:
781             print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
782        
783     return results
784
785 def create_pending_slice(wsgi_request, request, email):
786     """
787     """
788
789     # Insert an entry in the PendingSlice table
790     s = PendingSlice(
791         slice_name      = request['slice_name'],
792         user_hrn        = request['user_hrn'],
793         authority_hrn   = request['authority_hrn'],
794         number_of_nodes = request['url'], # field needs to be renamed
795         purpose         = request['purpose'],
796         type_of_nodes   = request['email'] # field needs to be renamed 
797     )
798     s.save()
799
800     try:
801         # Send an email: the recipients are the PI of the authority
802         recipients = authority_get_pi_emails(wsgi_request, request['authority_hrn'])
803
804         theme.template_name = 'slice_request_email.txt' 
805         text_content = render_to_string(theme.template, request)
806     
807         theme.template_name = 'slice_request_email.html' 
808         html_content = render_to_string(theme.template, request)
809     
810         theme.template_name = 'slice_request_email_subject.txt'
811         subject = render_to_string(theme.template, request)
812         subject = subject.replace('\n', '')
813     
814         sender = email
815         msg = EmailMultiAlternatives(subject, text_content, sender, recipients)
816         msg.attach_alternative(html_content, "text/html")
817         msg.send()
818     except Exception, e:
819         print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
820
821
822 def create_pending_project(wsgi_request, request):
823     """
824     """
825
826     # Insert an entry in the PendingProject table
827     s = PendingProject(
828         project_name    = request['project_name'],
829         user_hrn        = request['user_hrn'],
830         authority_hrn   = request['authority_hrn'],
831         purpose         = request['purpose'],
832     )
833     s.save()
834
835 #     try:
836 #         # Send an email: the recipients are the PI of the authority
837 #         recipients = authority_get_pi_emails(wsgi_request, request['authority_hrn'])
838
839 #         theme.template_name = 'slice_request_email.txt' 
840 #         text_content = render_to_string(theme.template, request)
841 #     
842 #         theme.template_name = 'slice_request_email.html' 
843 #         html_content = render_to_string(theme.template, request)
844 #     
845 #         theme.template_name = 'slice_request_email_subject.txt'
846 #         subject = render_to_string(theme.template, request)
847 #         subject = subject.replace('\n', '')
848 #     
849 #         sender = email
850 #         msg = EmailMultiAlternatives(subject, text_content, sender, recipients)
851 #         msg.attach_alternative(html_content, "text/html")
852 #         msg.send()
853 #     except Exception, e:
854 #         print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
855
856
857 #-------------------------------------------------------------------------------
858 # REQUESTS - Users
859 #-------------------------------------------------------------------------------
860
861 def manifold_add_reference_user_accounts(wsgi_request, request):
862     """When a new user is created, add reference accounts to the reference platform.
863     """
864     # XXX XXX XXX The rest of this function has to be checked XXX XXX XXX
865
866     # Retrieve user information
867     user_query  = Query().get('local:user')             \
868         .select('user_id', 'config', 'email', 'status') \
869         .filter_by('email', '==', request['email'])
870     user_details = execute_admin_query(wsgi_request, user_query)
871
872     # USER MAIN ACCOUNT != reference
873     #print 'USER MAIN ACCOUNT != reference'
874     list_accounts_query = Query().get('local:account')              \
875         .select('user_id', 'platform_id', 'auth_type', 'config')    \
876         .filter_by('user_id', '==', user_details[0]['user_id'])     \
877         .filter_by('auth_type', '!=', 'reference')
878     list_accounts = execute_admin_query(wsgi_request, list_accounts_query)
879
880     # XXX main_platform is being erased several times ???
881     for account in list_accounts:
882         main_platform_query = Query().get('local:platform')         \
883             .select('platform_id', 'platform')                      \
884             .filter_by('platform_id', '==', account['platform_id'])
885         main_platform = execute_admin_query(wsgi_request, main_platform_query)
886
887     # Add reference accounts on SFA enabled platforms
888     platforms_query = Query().get('local:platform') \
889         .filter_by('disabled', '==', '0')           \
890         .filter_by('gateway_type', '==', 'sfa')     \
891         .select('platform_id', 'gateway_type')
892     platforms = execute_admin_query(wsgi_request, platforms_query)
893     for platform in platforms:
894         #print "add reference to platform ",platform
895         manifold_account_params = {
896             'user_id'       : user_details[0]['user_id'],
897             'platform_id'   : platform['platform_id'],
898             'auth_type'     : 'reference',
899             'config'        : '{"reference_platform": "' + main_platform[0]['platform'] + '"}',
900         }
901         manifold_add_account(wsgi_request, manifold_account_params)
902
903 def sfa_create_user(wsgi_request, request, namespace = None, as_admin = False):
904     """
905     Arguments:
906         wsgi_request (~ WSGIRequest) : 
907         request (dict) : the user request in our own dict format
908
909     Raises:
910         Exception
911     """
912     from sfa.util.xrn import Xrn 
913
914     auth_pi = request.get('pi', None)
915     auth_pi = list([auth_pi]) if auth_pi else list()
916
917     # We create a user request with Manifold terminology
918     sfa_user_params = {
919         'user_hrn'          : request['user_hrn'],
920         'user_email'        : request['email'],
921         'user_urn'          : Xrn(request['user_hrn'], request['type']).get_urn(),
922         'user_type'         : request['type'],
923         'keys'              : request['public_key'],
924         'user_first_name'   : request['first_name'],
925         'user_last_name'    : request['last_name'],
926         'pi_authorities'    : auth_pi,
927         'user_enabled'      : True
928     }
929
930     if namespace is not None:
931         query = Query.create('%s:user' % namespace).set(sfa_user_params).select('user_hrn')
932     else:
933         # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
934         query = Query.create('myslice:user').set(sfa_user_params).select('user_hrn')
935
936     if as_admin:
937         results = execute_admin_query(wsgi_request, query)
938     else:
939         results = execute_query(wsgi_request, query)
940
941     if not results:
942         raise Exception, "Could not create %s. Already exists ?" % sfa_user_params['user_hrn']
943     else:
944         try:
945             theme.template_name = 'user_request_validated.txt'
946             text_content = render_to_string(theme.template, request)
947             theme.template_name = 'user_request_validated.html'
948             html_content = render_to_string(theme.template, request)
949         
950             theme.template_name = 'email_default_sender.txt'
951             sender =  render_to_string(theme.template, request)
952             sender = sender.replace('\n', '')
953
954
955             subject = 'User validated'
956
957             msg = EmailMultiAlternatives(subject, text_content, sender, [request['email']])
958             msg.attach_alternative(html_content, "text/html")
959             msg.send()
960         except Exception, e:
961             print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
962
963     return results
964
965 def iotlab_create_user (wsgi_request, request, namespace = None, as_admin=False):
966    
967     import requests
968     import time
969     from requests.auth import HTTPBasicAuth
970     
971     URL_REST = ConfigEngine.default_iotlab_url
972     LOGIN_ADMIN = ConfigEngine.default_iotlab_admin_user
973     PASSWORD_ADMIN = ConfigEngine.default_iotlab_admin_password
974
975     auth = HTTPBasicAuth(LOGIN_ADMIN,PASSWORD_ADMIN)
976     headers = {'content-type': 'application/json'}
977
978     for user in PendingUser.objects.raw('SELECT * FROM portal_pendinguser WHERE email = %s', [request['email']]):
979         password= user.password
980
981
982     iotlab_user_params = {
983         "type"          : "SA",
984         #"login"         : request['email'], #auto generated by iotlab
985         "password"      : password,
986         "firstName"     : request['first_name'],
987         "lastName"      : request['last_name'],
988         "email"         : request['email'],
989         "structure"     : request['authority_hrn'],
990         "city"          : "N/A",
991         "country"       : "N/A",
992         "sshPublicKey"  : request['public_key'],
993         "motivations"   : "SFA federation",
994     }    
995    
996     iotlab_user_params1 = json.dumps(iotlab_user_params)
997     r=requests.post(url=URL_REST, data=iotlab_user_params1, headers=headers, auth=auth)
998     print 'Create iotlab user : ', r.status_code, r.text
999     return r.text
1000
1001 def create_user(wsgi_request, request, namespace = None, as_admin = False):
1002     # XXX This has to be stored centrally
1003     USER_STATUS_ENABLED = 2
1004
1005     # NOTE : if we were to create a user directly (just like we create slices,
1006     # we would have to perform the steps in create_pending_user too
1007
1008     # Add the user to the SFA registry
1009     sfa_create_user(wsgi_request, request, namespace, as_admin)
1010
1011     # Update Manifold user status
1012     manifold_update_user(wsgi_request, request['email'], {'status': USER_STATUS_ENABLED})
1013
1014     # Add reference accounts for platforms
1015     manifold_add_reference_user_accounts(wsgi_request, request)
1016
1017     # Add the user to iotlab portal if theme is set to onelab
1018     if theme.theme == 'onelab':
1019         iotlab_create_user (wsgi_request, request)
1020
1021 def create_pending_user(wsgi_request, request, user_detail):
1022     """
1023     """
1024
1025     # Insert an entry in the PendingUser table
1026     b = PendingUser(
1027         first_name    = request['first_name'],
1028         last_name     = request['last_name'],
1029         authority_hrn = request['authority_hrn'],
1030         email         = request['email'],
1031         password      = request['password'],
1032         public_key    = request['public_key'],
1033         private_key   = request['private_key'],
1034         user_hrn      = request['user_hrn'],
1035         pi            = request['pi'],
1036         email_hash    = request['email_hash'],
1037         status        = 'False',
1038     )
1039     b.save()
1040     # sends email to user to activate the email
1041     theme.template_name = 'activate_user.html'
1042     html_content = render_to_string(theme.template, request)
1043     theme.template_name = 'activate_user.txt'
1044     text_content = render_to_string(theme.template, request)
1045     theme.template_name = 'activate_user_email_subject.txt'
1046     subject = render_to_string(theme.template, request)
1047     subject = subject.replace('\n', '')
1048     theme.template_name = 'email_default_sender.txt'
1049     sender =  render_to_string(theme.template, request)
1050     sender = sender.replace('\n', '')
1051     recipient = [request['email']]
1052     #recipient = recipient.append(request['email'])
1053
1054     msg = EmailMultiAlternatives(subject, text_content, sender, recipient)
1055     msg.attach_alternative(html_content, "text/html")
1056     msg.send()
1057    
1058     # saves the user to django auth_user table [needed for password reset]
1059     user = User.objects.create_user(request['email'], request['email'], request['password'])
1060
1061     # Creating a manifold user
1062     user_id = manifold_add_user(wsgi_request, request)
1063
1064     # Creating a Manifold account on the MySlice platform
1065     # Note the JSON representation of public and private keys already includes quotes
1066     account_config = {
1067         'user_hrn'          : request['user_hrn'],
1068         'user_public_key'   : request['public_key'],
1069     }
1070     if request['private_key']:
1071         account_config['user_private_key'] = request['private_key']
1072
1073     user_id = user_detail['user_id'] + 1 # the user_id for the newly created user in local:user
1074
1075     # XXX TODO: Require a myslice platform
1076     # ALERT: this will disapear with ROUTERV2 of Manifold
1077     # We have to consider the case where several registries can be used
1078     # Removed hardcoded platform = 5
1079     # This platform == 'myslice' is a TMP FIX !!
1080     try:
1081         reg_platform_query = Query().get('local:platform') \
1082             .filter_by('platform', '==', 'myslice')           \
1083             .select('platform_id')
1084         reg_platform = execute_admin_query(wsgi_request, reg_platform_query)
1085
1086         reg_platform_id = reg_platform[0]['platform_id']
1087         account_params = {
1088             'platform_id'   : reg_platform_id, # XXX ALERT !!
1089             'user_id'       : user_id, 
1090             'auth_type'     : request['auth_type'], 
1091             'config'        : json.dumps(account_config),
1092         }
1093         manifold_add_account(wsgi_request, account_params)
1094     except Exception, e:
1095         print "Failed creating manifold account on platform %s for user: %s" % ('myslice', request['email'])
1096
1097     try:
1098         # Send an email: the recipients are the PI of the authority
1099         # If No PI is defined for this Authority, send to a default email (different for each theme)
1100         recipients = authority_get_pi_emails(wsgi_request, request['authority_hrn'])
1101         
1102         theme.template_name = 'user_request_email.html'
1103         html_content = render_to_string(theme.template, request)
1104  
1105         theme.template_name = 'user_request_email.txt'
1106         text_content = render_to_string(theme.template, request)
1107     
1108         theme.template_name = 'user_request_email_subject.txt'
1109         subject = render_to_string(theme.template, request)
1110         subject = subject.replace('\n', '')
1111     
1112         theme.template_name = 'email_default_sender.txt'
1113         sender =  render_to_string(theme.template, request)
1114         sender = sender.replace('\n', '')
1115     
1116         msg = EmailMultiAlternatives(subject, text_content, sender, recipients)
1117         msg.attach_alternative(html_content, "text/html")
1118         msg.send()
1119     except Exception, e:
1120         print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
1121         import traceback
1122         traceback.print_exc()