conflict fix
[myslice.git] / portal / actions.py
1 from django.http                import HttpResponse
2 from manifold.core.query        import Query
3 from manifoldapi.manifoldapi    import execute_query,execute_admin_query
4 from portal.models              import PendingUser, PendingSlice, PendingAuthority
5 import json
6
7 from django.contrib.auth.models  import User
8 from django.contrib.sites.models import Site
9 from django.contrib.auth        import get_user_model
10 from django.template.loader     import render_to_string
11 from django.core.mail           import EmailMultiAlternatives, send_mail
12
13 from myslice.theme              import ThemeView
14 from myslice.configengine       import ConfigEngine
15
16
17 theme = ThemeView()
18
19 import activity.slice
20
21 # Thierry: moving this right into the code so 
22 # most people can use myslice without having to install sfa
23 # XXX tmp sfa dependency, should be moved to SFA gateway
24 #from sfa.util.xrn                import Xrn 
25
26
27 # Get the list of pis in a given authority
28 def authority_get_pis(request, authority_hrn):
29
30     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
31     query = Query.get('authority').filter_by('authority_hrn', '==', authority_hrn).select('pi_users')
32     results = execute_admin_query(request, query)
33     print "authority_get_pis = %s" % results
34     # NOTE: temporarily commented. Because results is giving empty list. 
35     # Needs more debugging
36     #if not results:
37     #    raise Exception, "Authority not found: %s" % authority_hrn
38     #result, = results
39     #return result['pi_users']
40     return results
41
42 #check the user is pi or not in the registry
43 def authority_check_pis(request, user_email):
44     try:
45         user_query  = Query().get('local:user').filter_by('email', '==', user_email).select('user_id','email','password','config')
46         user_details = execute_admin_query(request, user_query)
47     
48         # getting the authority_hrn
49         for user_detail in user_details:
50             user_id = user_detail['user_id']
51             if user_detail['config']:
52                 config = json.loads(user_detail['config'])
53                 authority_hrn = config.get('authority','Unknown Authority')
54  
55         account_query  = Query().get('local:account').filter_by('user_id', '==', user_id).select('user_id','platform_id','auth_type','config')
56         account_details = execute_admin_query(request, account_query)
57     
58         platform_query  = Query().get('local:platform').select('platform_id','platform')
59         platform_details = execute_admin_query(request, platform_query)
60     
61         for account_detail in account_details:
62             for platform_detail in platform_details:
63                 if platform_detail['platform_id'] == account_detail['platform_id']:
64                     if 'myslice' in platform_detail['platform']:
65                         account_config = json.loads(account_detail['config'])
66                         user_hrn = account_config.get('user_hrn','N/A')
67
68         pi_status = False
69         pis = authority_get_pis (request, authority_hrn)
70         for pi in pis:
71             pi_list = pi['pi_users']
72
73         if user_hrn in pi_list:
74             pi_status = True
75         return pi_status
76
77     except Exception,e:
78         print "Exception in actions.py in authority_check_pis %s" % e
79         return None
80
81
82 def authority_add_pis(request, authority_hrn,user_hrn):
83     try:
84         # getting pis of the authority of the user
85         pis = authority_get_pis (request, authority_hrn)
86         for pi in pis:
87             pi_list = pi['pi_users']
88    
89         updated_pi_list = pi_list.append(user_hrn) 
90         query = Query.update('authority').filter_by('authority_hrn', '==', authority_hrn).set({'pi_users':pi_list})
91         results = execute_query(request,query)
92         newpis = authority_get_pis (request, authority_hrn)
93         return newpis
94     except Exception,e: 
95         print "Exception in actions.py in authority_add_pis %s" % e
96         return None
97
98
99 def authority_remove_pis(request, authority_hrn,user_hrn):
100     try:
101         # getting pis of the authority of the user
102         pis = authority_get_pis (request, authority_hrn)
103         for pi in pis:
104             pi_list = pi['pi_users']
105  
106         updated_pi_list = pi_list.remove(user_hrn) 
107         query = Query.update('authority').filter_by('authority_hrn', '==', authority_hrn).set({'pi_users':pi_list})
108         results = execute_query(request,query)
109         newpis = authority_get_pis (request, authority_hrn)
110         return newpis
111     except Exception,e: 
112         print "Exception in actions.py in authority_remove_pis %s" % e
113         return None
114
115
116 def authority_get_pi_emails(request, authority_hrn):
117     pi_users = authority_get_pis(request,authority_hrn)
118     print "pi_users = %s" % pi_users
119
120     if any(pi['pi_users'] == None or not pi['pi_users']  for pi in pi_users):
121         #theme.template_name = 'email_default_recipients.txt' 
122         #default_email = render_to_string(theme.template, request)
123         #default_email = default_email.replace('\n', '')
124         #return default_email
125         # the above doesn't work
126         return ['support@onelab.eu']
127     else:
128         pi_user_hrns = [ hrn for x in pi_users for hrn in x['pi_users'] ]
129
130         # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
131         query = Query.get('myslice:user').filter_by('user_hrn', 'included', pi_user_hrns).select('user_email')
132         results = execute_admin_query(request, query)
133         return [result['user_email'] for result in results]
134
135 #clear user credentials
136 def clear_user_creds(request, user_email):
137     try:
138         user_query  = Query().get('local:user').filter_by('email', '==', user_email).select('user_id','email','password','config')
139         user_details = execute_admin_query(request, user_query)
140     
141         # getting the user_id from the session
142         for user_detail in user_details:
143             user_id = user_detail['user_id']
144             user_email = user_detail['email']
145     
146         account_query  = Query().get('local:account').filter_by('user_id', '==', user_id).select('user_id','platform_id','auth_type','config')
147         account_details = execute_admin_query(request, account_query)
148     
149         platform_query  = Query().get('local:platform').select('platform_id','platform')
150         platform_details = execute_admin_query(request, platform_query)
151     
152         for account_detail in account_details:
153             for platform_detail in platform_details:
154                 if platform_detail['platform_id'] == account_detail['platform_id']:
155                     if 'myslice' in platform_detail['platform']:
156                         account_config = json.loads(account_detail['config'])
157                         #user_cred = account_config.get('delegated_user_credential','N/A')
158                         user_cred = account_config.get('user_credential','N/A')
159                         if 'N/A' not in user_cred:
160                             user_hrn = account_config.get('user_hrn','N/A')
161                             user_pub_key = json.dumps(account_config.get('user_public_key','N/A'))
162                             user_priv_key = json.dumps(account_config.get('user_private_key','N/A'))
163                             updated_config = '{"user_public_key":'+ user_pub_key + ', "user_private_key":'+ user_priv_key + ', "user_hrn":"'+ user_hrn + '"}'
164                             user_params = { 'config': updated_config}
165                             manifold_update_account(request, user_id,user_params)
166                             return user_email
167                         else:
168                             return None
169
170     except Exception,e:
171         print "Exception in actions.py in clear_user_creds %s" % e
172         return None
173
174 def is_pi(wsgi_request, user_hrn, authority_hrn):
175     # XXX could be done in a single query !
176
177     # seauthorities from user where user_hrn == "ple.upmc.jordan_auge"
178
179     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
180     query = Query.get('myslice:user').filter_by('user_hrn', '==', user_hrn).select('pi_authorities')
181     results = execute_admin_query(wsgi_request, query)
182     if not results:
183         # XXX Warning ?
184         return False
185     result = results[0]
186     user_authority_hrns = result.get('pi_authorities', [])
187     return authority_hrn in user_authority_hrns
188     
189 # SFA get record
190
191 def sfa_get_user(request, user_hrn, pub):
192
193     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
194     query_sfa_user = Query.get('myslice:user').filter_by('user_hrn', '==', user_hrn)
195     result_sfa_user = execute_admin_query(request, query_sfa_user)
196     return result_sfa_user                        
197
198 def sfa_update_user(request, user_hrn, user_params):
199     # user_params: keys [public_key] 
200     if 'email' in user_params:
201         user_params['user_email'] = user_params['email']
202
203     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
204     query = Query.update('myslice:user').filter_by('user_hrn', '==', user_hrn).set(user_params).select('user_hrn')
205     results = execute_admin_query(request,query)
206     return results
207
208 def sfa_add_authority(request, authority_params):
209
210     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
211     query = Query.create('authority').set(authority_params).select('authority_hrn')
212     results = execute_query(request, query)
213     print "sfa_add_auth results=",results
214     if not results:
215         raise Exception, "Could not create %s. Already exists ?" % authority_params['hrn']
216     return results
217
218 def sfa_add_user_to_slice(request, user_hrn, slice_params):
219 # UPDATE myslice:slice SET researcher=['ple.upmc.jordan_auge','ple.inria.thierry_parmentelat','ple.upmc.loic_baron','ple.upmc.ciro_scognamiglio','ple.upmc.mohammed-yasin_rahman','ple.upmc.azerty'] where slice_hrn=='ple.upmc.myslicedemo'
220
221     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
222     query_current_users = Query.get('myslice:slice').select('user').filter_by('slice_hrn','==',slice_params['hrn'])
223     results_current_users = execute_query(request, query_current_users)
224     slice_params['researcher'] = slice_params['researcher'] | results_current_users
225
226     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
227     query = Query.update('myslice:slice').filter_by('user_hrn', '==', user_hrn).set(slice_params).select('slice_hrn')
228     results = execute_query(request, query)
229 # Also possible but not supported yet
230 # UPDATE myslice:user SET slice=['ple.upmc.agent','ple.upmc.myslicedemo','ple.upmc.tophat'] where user_hrn=='ple.upmc.azerty'
231     if not results:
232         raise Exception, "Could not create %s. Already exists ?" % slice_params['hrn']
233     return results
234
235 # Propose hrn
236
237 def manifold_add_user(wsgi_request, request):
238     """Add a Manifold user corresponding to a user request.
239
240     Args:
241         wsgi_request: a WSGIRequest instance
242         request (dict): a dictionary containing the user request built from the
243             form.
244
245     Returns:
246         The user_id of the inserted user.
247
248     Raises:
249         ?
250     
251     """
252     USER_CONFIG = '{"firstname": "%(first_name)s", "lastname": "%(last_name)s", "authority": "%(authority_hrn)s"}'
253
254     user_params = {
255         'email'     : request['email'],
256         'password'  : request['password'],
257         'config'    : USER_CONFIG % request,
258         'status'    : 1,
259     }
260
261     query = Query.create('local:user').set(user_params).select('email')
262     results = execute_admin_query(request, query)
263     if not results:
264         raise Exception, "Failed creating manifold user: %s" % user_params['email']
265     result = results[0]
266     return result['email']
267
268 def manifold_update_user(request, email, user_params):
269     # user_params: password, config e.g., 
270     query = Query.update('local:user').filter_by('email', '==', email).set(user_params).select('email')
271     results = execute_admin_query(request,query)
272     # NOTE: results remains empty and goes to Exception. However, it updates the manifold DB.
273     # That's why I commented the exception part. -- Yasin 
274     #if not results:
275     #    raise Exception, "Failed updating manifold user: %s" % user_params['email']
276     #result, = results
277     return results
278
279 def manifold_add_account(request, account_params):
280     query = Query.create('local:account').set(account_params).select(['user', 'platform'])
281     results = execute_admin_query(request,query)
282     if not results:
283         raise Exception, "Failed creating manifold account on platform %s for user: %s" % (account_params['platform'], account_params['user'])
284     result, = results
285     return result['user_id']
286
287 def manifold_update_account(request,user_id,account_params):
288     # account_params: config
289     query = Query.update('local:account').filter_by('platform', '==', 'myslice').filter_by('user_id', '==', user_id).set(account_params).select('user_id')
290     results = execute_admin_query(request,query)
291     return results
292
293 #explicitly mention the platform_id
294 def manifold_delete_account(request, platform_id, user_id, account_params):
295     query = Query.delete('local:account').filter_by('platform_id', '==', platform_id).filter_by('user_id', '==', user_id).set(account_params).select('user_id')
296     results = execute_admin_query(request,query)
297     return results
298
299 def manifold_delete_user(request, user_id, user_params):
300     query = Query.delete('local:user').filter_by('user_id', '==', user_id).set(user_params).select('user_id')
301     results = execute_admin_query(request,query)
302     return results
303
304
305 #not tested
306 def manifold_add_platform(request, platform_params):
307     query = Query.create('local:platform').set(platform_params).select(['user', 'platform'])
308     results = execute_admin_query(request,query)
309     if not results:
310         raise Exception, "Failed creating manifold platform %s for user: %s" % (platform_params['platform'], platform_params['user'])
311     result, = results
312     return result['platform_id']
313
314
315 def make_request_user(user):
316     request = {}
317     request['type']          = 'user'
318     request['id']            = user.id
319     request['timestamp']     = user.created # XXX in DB ?
320     request['authority_hrn'] = user.authority_hrn
321     request['first_name']    = user.first_name
322     request['last_name']     = user.last_name
323     request['email']         = user.email
324     request['login']         = user.login
325     request['user_hrn']      = user.user_hrn
326     request['public_key']    = user.public_key
327     request['private_key']   = user.private_key
328     return request
329
330 def make_request_slice(slice):
331     request = {}
332     request['type'] = 'slice'
333     request['id'] = slice.id
334     request['user_hrn'] = slice.user_hrn
335     request['timestamp'] = slice.created
336     request['authority_hrn'] = slice.authority_hrn
337     request['slice_name'] = slice.slice_name
338     request['number_of_nodes'] = slice.number_of_nodes
339     request['type_of_nodes'] = slice.type_of_nodes
340     request['purpose'] = slice.purpose
341     return request
342
343 def make_request_authority(authority):
344     request = {}
345     request['type']                  = 'authority'
346     request['id']                    = authority.id
347     request['site_name']             = authority.site_name
348     request['site_latitude']         = authority.site_latitude
349     request['site_longitude']        = authority.site_longitude
350     request['site_url']              = authority.site_url
351     request['site_authority']        = authority.site_authority
352     request['site_abbreviated_name'] = authority.site_abbreviated_name
353     request['address_line1']         = authority.address_line1
354     request['address_line2']         = authority.address_line2
355     request['address_line3']         = authority.address_line3
356     request['address_city']          = authority.address_city
357     request['address_postalcode']    = authority.address_postalcode
358     request['address_state']         = authority.address_state
359     request['address_country']       = authority.address_country
360     request['authority_hrn']         = authority.authority_hrn
361     request['timestamp']             = authority.created
362     return request
363
364 def make_requests(pending_users, pending_slices, pending_authorities):
365     requests = []
366     for user in pending_users:
367         requests.append(make_request_user(user))
368     for slice in pending_slices:
369         requests.append(make_request_slice(slice))
370     for authority in pending_authorities:
371         requests.append(make_request_authority(authority))
372     return requests   
373
374 def get_request_by_id(ids):
375     sorted_ids = { 'user': [], 'slice': [], 'authority': [] }
376     for type__id in ids:
377         type, id = type__id.split('__')
378         sorted_ids[type].append(id)
379         
380     if not ids:
381         pending_users  = PendingUser.objects.all()
382         pending_slices = PendingSlice.objects.all()
383         pending_authorities = PendingAuthority.objects.all()
384     else:
385         pending_users  = PendingUser.objects.filter(id__in=sorted_ids['user']).all()
386         pending_slices = PendingSlice.objects.filter(id__in=sorted_ids['slice']).all()
387         pending_authorities = PendingAuthority.objects.filter(id__in=sorted_ids['authority']).all()
388
389     return make_requests(pending_users, pending_slices, pending_authorities)
390
391 def get_requests(authority_hrns=None):
392     print "get_request_by_authority auth_hrns = ", authority_hrns
393     if not authority_hrns:
394         ## get those pending users who have confirmed their emails
395         pending_users  = PendingUser.objects.filter(status__iexact = 'True')
396         pending_slices = PendingSlice.objects.all()
397         pending_authorities = PendingAuthority.objects.all()
398     else:
399         pending_users  = PendingUser.objects
400         pending_slices = PendingSlice.objects
401         pending_authorities = PendingAuthority.objects
402         from django.db.models import Q
403         list_user_Q = list()
404         list_slice_Q = list()
405         list_auth_Q = list()
406         for hrn in authority_hrns:
407             list_user_Q.append(Q(authority_hrn__startswith=hrn, status__iexact = 'True'))
408             list_slice_Q.append(Q(authority_hrn__startswith=hrn))
409             list_auth_Q.append(Q(site_authority__startswith=hrn))
410             print "startswith hrn = ",hrn
411         from operator import __or__ as OR
412         pending_users        = pending_users.filter(reduce(OR, list_user_Q))
413         pending_slices       = pending_slices.filter(reduce(OR, list_slice_Q))
414         pending_authorities  = pending_authorities.filter(reduce(OR, list_auth_Q))
415         #pending_authorities  = pending_authorities.all() #filter(reduce(OR, list_Q))
416
417     return make_requests(pending_users, pending_slices, pending_authorities)
418
419 # XXX Is it in sync with the form fields ?
420
421 def portal_validate_request(wsgi_request, request_ids):
422     status = {}
423
424     if not isinstance(request_ids, list):
425         request_ids = [request_ids]
426
427     requests = get_request_by_id(request_ids)
428     for request in requests:
429         # type, id, timestamp, details, allowed -- MISSING: authority_hrn
430         # CAREFUL about details
431         # user  : first name, last name, email, password, keypair
432         # slice : number of nodes, type of nodes, purpose
433         
434         request_status = {}
435
436         if request['type'] == 'user':
437
438             try:
439                 create_user(wsgi_request, request)
440                 request_status['SFA user'] = {'status': True }
441                 PendingUser.objects.get(id=request['id']).delete()
442             except Exception, e:
443                  request_status['SFA user'] = {'status': False, 'description': str(e)}
444                        
445 #            user_params = {'status':2}
446 #            manifold_update_user(request, request['email'], user_params)
447
448             # MANIFOLD user should be added beforehand, during registration
449             #try:
450             #    manifold_user_params = { key: request[key] for key in MANIFOLD_USER_KEYS }
451             #    # XXX # manifold_add_user(manifold_user_params)
452             #    request_status['MySlice user'] = {'status': True }
453             #except Exception, e:
454             #    request_status['MySlice user'] = {'status': False, 'description': str(e)}
455
456             # XXX
457             #manifold_account_params = { key: request[key] for key in MANIFOLD_ACCOUNT_KEYS }
458             #manifold_add_account(manifold_account_params)
459             #request_status['MySlice testbed accounts'] = {'status': False }
460
461         elif request['type'] == 'slice':
462             try:
463                 create_slice(wsgi_request, request)
464                 request_status['SFA slice'] = {'status': True }
465                 PendingSlice.objects.get(id=request['id']).delete()
466
467             except Exception, e:
468                 request_status['SFA slice'] = {'status': False, 'description': str(e)}
469
470         elif request['type'] == 'authority':
471             try:
472                 #hrn = "%s.%s" % (request['authority_hrn'], request['site_authority'])
473                 hrn = request['site_authority']
474                 # XXX tmp sfa dependency
475                 from sfa.util.xrn import Xrn 
476                 urn = Xrn(hrn, request['type']).get_urn()
477                 
478                 # Only hrn is required for Manifold Query 
479                 sfa_authority_params = {
480                     'authority_hrn'        : hrn,
481                     #'authority_urn'        : urn,
482                     #'type'       : request['type'],
483                     #'pi'        : None,
484                     #'enabled'    : True
485                 }
486                 print "ADD Authority"
487                 sfa_add_authority(wsgi_request, sfa_authority_params)
488                 request_status['SFA authority'] = {'status': True }
489                 PendingAuthority.objects.get(id=request['id']).delete()
490
491             except Exception, e:
492                 request_status['SFA authority'] = {'status': False, 'description': str(e)}
493
494         # XXX Remove from Pendings in database
495
496         status['%s__%s' % (request['type'], request['id'])] = request_status
497
498     return status
499
500 def validate_action(request, **kwargs):
501     ids = filter(None, kwargs['id'].split('/'))
502     status = portal_validate_request(request, ids)
503     json_answer = json.dumps(status)
504     return HttpResponse (json_answer, mimetype="application/json")
505
506
507 def reject_action(request, **kwargs):
508     ids = filter(None, kwargs['id'].split('/'))
509     status = portal_reject_request(request, ids)
510     json_answer = json.dumps(status)
511     return HttpResponse (json_answer, mimetype="application/json")
512
513
514 def portal_reject_request(wsgi_request, request_ids):
515     status = {}
516     # get the domain url    
517     current_site = Site.objects.get_current()
518     current_site = current_site.domain
519
520
521     if not isinstance(request_ids, list):
522         request_ids = [request_ids]
523
524     requests = get_request_by_id(request_ids)
525     for request in requests:
526         # type, id, timestamp, details, allowed -- MISSING: authority_hrn
527         # CAREFUL about details
528         # user  : first name, last name, email, password, keypair
529         # slice : number of nodes, type of nodes, purpose
530         
531         request_status = {}
532
533         if request['type'] == 'user':
534             try:
535                 request_status['SFA user'] = {'status': True }
536                 # getting user email based on id 
537                 ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
538                 for user in PendingUser.objects.raw('SELECT * FROM portal_pendinguser WHERE id = %s', [request['id']]):
539                     user_email= user.email
540                     first_name = user.first_name
541                     last_name = user.last_name
542
543                 ctx = {
544                     'first_name'    : first_name, 
545                     'last_name'     : last_name, 
546                     'portal_url'    : current_site,
547                     }
548                 try:
549                     theme.template_name = 'user_request_denied.txt'
550                     text_content = render_to_string(theme.template, ctx)
551                     theme.template_name = 'user_request_denied.html'
552                     html_content = render_to_string(theme.template, ctx)
553                     theme.template_name = 'email_default_sender.txt'
554                     sender =  render_to_string(theme.template, ctx)
555                     sender = sender.replace('\n', '')
556                                
557                     subject = 'User request denied.'
558
559                     msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
560                     msg.attach_alternative(html_content, "text/html")
561                     msg.send()
562                 except Exception, e:
563                     print "Failed to send email, please check the mail templates and the SMTP configuration of your server"   
564             
565                 # removing from Django auth_user
566                 UserModel = get_user_model()
567                 UserModel._default_manager.filter(email__iexact = user_email).delete()
568                 # removing from Django portal_pendinguser
569                 PendingUser.objects.get(id=request['id']).delete()
570                 # removing from manifold
571                 # removing manifold account
572                 user_query = Query().get('local:user') \
573                     .filter_by('email', '==', user_email)           \
574                     .select('user_id')
575                 user = execute_admin_query(wsgi_request, user_query)
576                 user_id = user[0]['user_id']
577         
578                 platform_query = Query().get('local:platform') \
579                     .filter_by('platform', '==', 'myslice')           \
580                     .select('platform_id')
581                 platform = execute_admin_query(wsgi_request, platform_query)
582                 platform_id = platform[0]['platform_id']
583                 account_params = {'user_id':user_id}
584                 manifold_delete_account(request, platform_id, user_id, account_params)           
585              
586                 # removing manifold user
587                 user_params = {'user_id':user_id}
588                 manifold_delete_user(request, user_id, user_params)
589             except Exception, e:
590                 request_status['SFA authority'] = {'status': False, 'description': str(e)}
591                       
592         elif request['type'] == 'slice':
593             request_status['SFA slice'] = {'status': True } 
594
595             # getting user email based on id 
596             ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
597             for user in PendingSlice.objects.raw('SELECT * FROM portal_pendingslice WHERE id = %s', [request['id']]):
598                 user_email= user.type_of_nodes # XXX type_of_nodes field contains the email [shd be renamed in DB]
599                 slice_name = user.slice_name
600                 purpose = user.purpose
601                 url = user.number_of_nodes
602
603             ctx = {
604                 'slice_name': slice_name,
605                 'purpose': purpose,
606                 'url': url,
607                 'portal_url': current_site,
608                 }
609             try:
610                 theme.template_name = 'slice_request_denied.txt'
611                 text_content = render_to_string(theme.template, ctx)
612                 theme.template_name = 'slice_request_denied.html'
613                 html_content = render_to_string(theme.template, ctx)
614                 theme.template_name = 'email_default_sender.txt'
615                 sender =  render_to_string(theme.template, ctx)
616                 sender = sender.replace('\n', '')
617                                
618                 subject = 'Slice request denied.'
619
620                 msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
621                 msg.attach_alternative(html_content, "text/html")
622                 msg.send()
623             except Exception, e:
624                 print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
625                       
626             PendingSlice.objects.get(id=request['id']).delete()
627
628         elif request['type'] == 'authority':
629             request_status['SFA authority'] = {'status': True }
630             
631             # getting user email based on id 
632             ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
633             for user in PendingAuthority.objects.raw('SELECT * FROM portal_pendingauthority WHERE id = %s', [request['id']]):
634                 user_email= user.address_line1 # XXX address_line1 field contains the email [shd be renamed in DB]
635                 site_name = user.site_name
636                 city = user.address_city
637                 country = user.address_country
638                 short_name = user.site_abbreviated_name
639                 url = user.site_url
640
641             ctx = { 
642                 'site_name': site_name,
643                 'short_name': short_name,
644                 'url': url,
645                 'city': city,
646                 'country': country,                          
647                 'portal_url'    : current_site,
648                 }
649                 
650             try:
651                 theme.template_name = 'authority_request_denied.txt'
652                 text_content = render_to_string(theme.template, ctx)
653                 theme.template_name = 'authority_request_denied.html'
654                 html_content = render_to_string(theme.template, ctx)
655                 theme.template_name = 'email_default_sender.txt'
656                 sender =  render_to_string(theme.template, ctx)
657                 sender = sender.replace('\n', '')
658                 subject = 'Authority request denied.'
659                 msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
660                 msg.attach_alternative(html_content, "text/html")
661                 msg.send()
662             except Exception, e:
663                 print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
664
665             PendingAuthority.objects.get(id=request['id']).delete()
666
667         status['%s__%s' % (request['type'], request['id'])] = request_status
668
669     return status
670
671 # Django and ajax
672 # http://djangosnippets.org/snippets/942/
673
674
675
676 #-------------------------------------------------------------------------------
677 # REQUESTS - Slices
678 #-------------------------------------------------------------------------------
679
680 def create_slice(wsgi_request, request):
681     """
682     Arguments:
683         wsgi_request (~ WSGIRequest) : 
684         request (dict) : the slice request in our own dict format
685
686     Raises:
687         Exception
688     """
689     hrn = "%s.%s" % (request['authority_hrn'], request['slice_name'])
690     # XXX tmp sfa dependency
691     from sfa.util.xrn import Xrn 
692     urn = Xrn(hrn, request['type']).get_urn()
693     
694     # Add User to Slice if we have the user_hrn in pendingslice table
695     user_hrn = request.get('user_hrn', None)
696     user_hrns = list([user_hrn]) if user_hrn else list()
697     
698     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
699     user_query  = Query().get('myslice:user').select('user_hrn','user_email').filter_by('user_hrn','==',user_hrn)
700     user_details_sfa = execute_admin_query(wsgi_request, user_query)
701     if not user_details_sfa:
702         raise Exception, "User %s doesn't exist, validate user before validating slice" % user_hrn
703     for user in user_details_sfa:
704         user_email = user['user_email']
705
706     # XXX LOIC Quick fix because this is totally inconsistent
707     if not 'number_of_nodes' in request:
708         request['number_of_nodes']=""
709
710     # XXX We should create a slice with Manifold terminology
711     slice_params = {
712         'slice_hrn'        : hrn, 
713         'slice_urn'        : urn,
714         'slice_type'       : request['type'],
715         'url'              : request['number_of_nodes'],
716         'users'            : user_hrns,
717         'slice_enabled'    : True
718     }
719     # ignored in request: id, timestamp,  number_of_nodes, type_of_nodes, purpose
720
721     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
722     query = Query.create('myslice:slice').set(slice_params).select('slice_hrn')
723     results = execute_query(wsgi_request, query)
724     if not results:
725         raise Exception, "Could not create %s. Already exists ?" % slice_params['hrn']
726     else:
727         clear_user_creds(wsgi_request,user_email)
728         # log user activity
729         activity.slice.validate(request, { "slice" : hrn })
730         try:
731             theme.template_name = 'slice_request_validated.txt'
732             text_content = render_to_string(theme.template, request)
733             theme.template_name = 'slice_request_validated.html'
734             html_content = render_to_string(theme.template, request)
735         
736             theme.template_name = 'email_default_sender.txt'
737             sender =  render_to_string(theme.template, request)
738             sender = sender.replace('\n', '')
739
740             subject = 'Slice request validated'
741
742             msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
743             msg.attach_alternative(html_content, "text/html")
744             msg.send()
745         except Exception, e:
746             print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
747        
748     return results
749
750 def create_pending_slice(wsgi_request, request, email):
751     """
752     """
753
754     # Insert an entry in the PendingSlice table
755     s = PendingSlice(
756         slice_name      = request['slice_name'],
757         user_hrn        = request['user_hrn'],
758         authority_hrn   = request['authority_hrn'],
759         number_of_nodes = request['url'], # field needs to be renamed
760         purpose         = request['purpose'],
761         type_of_nodes   = request['email'] # field needs to be renamed 
762     )
763     s.save()
764
765     try:
766         # Send an email: the recipients are the PI of the authority
767         recipients = authority_get_pi_emails(wsgi_request, request['authority_hrn'])
768
769         theme.template_name = 'slice_request_email.txt' 
770         text_content = render_to_string(theme.template, request)
771     
772         theme.template_name = 'slice_request_email.html' 
773         html_content = render_to_string(theme.template, request)
774     
775         theme.template_name = 'slice_request_email_subject.txt'
776         subject = render_to_string(theme.template, request)
777         subject = subject.replace('\n', '')
778     
779         sender = email
780         msg = EmailMultiAlternatives(subject, text_content, sender, recipients)
781         msg.attach_alternative(html_content, "text/html")
782         msg.send()
783     except Exception, e:
784         print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
785
786 #-------------------------------------------------------------------------------
787 # REQUESTS - Users
788 #-------------------------------------------------------------------------------
789
790 def manifold_add_reference_user_accounts(wsgi_request, request):
791     """When a new user is created, add reference accounts to the reference platform.
792     """
793     # XXX XXX XXX The rest of this function has to be checked XXX XXX XXX
794
795     # Retrieve user information
796     user_query  = Query().get('local:user')             \
797         .select('user_id', 'config', 'email', 'status') \
798         .filter_by('email', '==', request['email'])
799     user_details = execute_admin_query(wsgi_request, user_query)
800
801     # USER MAIN ACCOUNT != reference
802     #print 'USER MAIN ACCOUNT != reference'
803     list_accounts_query = Query().get('local:account')              \
804         .select('user_id', 'platform_id', 'auth_type', 'config')    \
805         .filter_by('user_id', '==', user_details[0]['user_id'])     \
806         .filter_by('auth_type', '!=', 'reference')
807     list_accounts = execute_admin_query(wsgi_request, list_accounts_query)
808
809     # XXX main_platform is being erased several times ???
810     for account in list_accounts:
811         main_platform_query = Query().get('local:platform')         \
812             .select('platform_id', 'platform')                      \
813             .filter_by('platform_id', '==', account['platform_id'])
814         main_platform = execute_admin_query(wsgi_request, main_platform_query)
815
816     # Add reference accounts on SFA enabled platforms
817     platforms_query = Query().get('local:platform') \
818         .filter_by('disabled', '==', '0')           \
819         .filter_by('gateway_type', '==', 'sfa')     \
820         .select('platform_id', 'gateway_type')
821     platforms = execute_admin_query(wsgi_request, platforms_query)
822     for platform in platforms:
823         #print "add reference to platform ",platform
824         manifold_account_params = {
825             'user_id'       : user_details[0]['user_id'],
826             'platform_id'   : platform['platform_id'],
827             'auth_type'     : 'reference',
828             'config'        : '{"reference_platform": "' + main_platform[0]['platform'] + '"}',
829         }
830         manifold_add_account(wsgi_request, manifold_account_params)
831
832 def sfa_create_user(wsgi_request, request, namespace = None, as_admin = False):
833     """
834     Arguments:
835         wsgi_request (~ WSGIRequest) : 
836         request (dict) : the user request in our own dict format
837
838     Raises:
839         Exception
840     """
841     from sfa.util.xrn import Xrn 
842
843     auth_pi = request.get('pi', None)
844     auth_pi = list([auth_pi]) if auth_pi else list()
845
846     # We create a user request with Manifold terminology
847     sfa_user_params = {
848         'user_hrn'          : request['user_hrn'],
849         'user_email'        : request['email'],
850         'user_urn'          : Xrn(request['user_hrn'], request['type']).get_urn(),
851         'user_type'         : request['type'],
852         'keys'              : request['public_key'],
853         'user_first_name'   : request['first_name'],
854         'user_last_name'    : request['last_name'],
855         'pi_authorities'    : auth_pi,
856         'user_enabled'      : True
857     }
858
859     if namespace is not None:
860         query = Query.create('%s:user' % namespace).set(sfa_user_params).select('user_hrn')
861     else:
862         # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
863         query = Query.create('myslice:user').set(sfa_user_params).select('user_hrn')
864
865     if as_admin:
866         results = execute_admin_query(wsgi_request, query)
867     else:
868         results = execute_query(wsgi_request, query)
869
870     if not results:
871         raise Exception, "Could not create %s. Already exists ?" % sfa_user_params['user_hrn']
872     else:
873         try:
874             theme.template_name = 'user_request_validated.txt'
875             text_content = render_to_string(theme.template, request)
876             theme.template_name = 'user_request_validated.html'
877             html_content = render_to_string(theme.template, request)
878         
879             theme.template_name = 'email_default_sender.txt'
880             sender =  render_to_string(theme.template, request)
881             sender = sender.replace('\n', '')
882
883
884             subject = 'User validated'
885
886             msg = EmailMultiAlternatives(subject, text_content, sender, [request['email']])
887             msg.attach_alternative(html_content, "text/html")
888             msg.send()
889         except Exception, e:
890             print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
891
892     return results
893
894 def iotlab_create_user (wsgi_request, request, namespace = None, as_admin=False):
895    
896     import requests
897     import time
898     from requests.auth import HTTPBasicAuth
899     
900     URL_REST = ConfigEngine.default_iotlab_url
901     LOGIN_ADMIN = ConfigEngine.default_iotlab_admin_user
902     PASSWORD_ADMIN = ConfigEngine.default_iotlab_admin_password
903
904     auth = HTTPBasicAuth(LOGIN_ADMIN,PASSWORD_ADMIN)
905     headers = {'content-type': 'application/json'}
906
907     for user in PendingUser.objects.raw('SELECT * FROM portal_pendinguser WHERE email = %s', [request['email']]):
908         password= user.password
909
910
911     iotlab_user_params = {
912         "type"          : "SA",
913         #"login"         : request['email'], #auto generated by iotlab
914         "password"      : password,
915         "firstName"     : request['first_name'],
916         "lastName"      : request['last_name'],
917         "email"         : request['email'],
918         "structure"     : request['authority_hrn'],
919         "city"          : "N/A",
920         "country"       : "N/A",
921         "sshPublicKey"  : request['public_key'],
922         "motivations"   : "SFA federation",
923     }    
924    
925     iotlab_user_params1 = json.dumps(iotlab_user_params)
926     r=requests.post(url=URL_REST, data=iotlab_user_params1, headers=headers, auth=auth)
927     print 'Create iotlab user : ', r.status_code, r.text
928     return r.text
929
930 def create_user(wsgi_request, request, namespace = None, as_admin = False):
931     # XXX This has to be stored centrally
932     USER_STATUS_ENABLED = 2
933
934     # NOTE : if we were to create a user directly (just like we create slices,
935     # we would have to perform the steps in create_pending_user too
936
937     # Add the user to the SFA registry
938     sfa_create_user(wsgi_request, request, namespace, as_admin)
939
940     # Update Manifold user status
941     manifold_update_user(wsgi_request, request['email'], {'status': USER_STATUS_ENABLED})
942
943     # Add reference accounts for platforms
944     manifold_add_reference_user_accounts(wsgi_request, request)
945
946     # Add the user to iotlab portal if theme is set to onelab
947     if theme.theme == 'onelab':
948         iotlab_create_user (wsgi_request, request)
949
950 def create_pending_user(wsgi_request, request, user_detail):
951     """
952     """
953
954     # Insert an entry in the PendingUser table
955     b = PendingUser(
956         first_name    = request['first_name'],
957         last_name     = request['last_name'],
958         authority_hrn = request['authority_hrn'],
959         email         = request['email'],
960         password      = request['password'],
961         public_key    = request['public_key'],
962         private_key   = request['private_key'],
963         user_hrn      = request['user_hrn'],
964         pi            = request['pi'],
965         email_hash    = request['email_hash'],
966         status        = 'False',
967     )
968     b.save()
969     # sends email to user to activate the email
970     theme.template_name = 'activate_user.html'
971     html_content = render_to_string(theme.template, request)
972     theme.template_name = 'activate_user.txt'
973     text_content = render_to_string(theme.template, request)
974     theme.template_name = 'activate_user_email_subject.txt'
975     subject = render_to_string(theme.template, request)
976     subject = subject.replace('\n', '')
977     theme.template_name = 'email_default_sender.txt'
978     sender =  render_to_string(theme.template, request)
979     sender = sender.replace('\n', '')
980     recipient = [request['email']]
981     #recipient = recipient.append(request['email'])
982
983     msg = EmailMultiAlternatives(subject, text_content, sender, recipient)
984     msg.attach_alternative(html_content, "text/html")
985     msg.send()
986    
987     # saves the user to django auth_user table [needed for password reset]
988     user = User.objects.create_user(request['email'], request['email'], request['password'])
989
990     # Creating a manifold user
991     user_id = manifold_add_user(wsgi_request, request)
992
993     # Creating a Manifold account on the MySlice platform
994     # Note the JSON representation of public and private keys already includes quotes
995     account_config = {
996         'user_hrn'          : request['user_hrn'],
997         'user_public_key'   : request['public_key'],
998     }
999     if request['private_key']:
1000         account_config['user_private_key'] = request['private_key']
1001
1002     user_id = user_detail['user_id'] + 1 # the user_id for the newly created user in local:user
1003
1004     # XXX TODO: Require a myslice platform
1005     # ALERT: this will disapear with ROUTERV2 of Manifold
1006     # We have to consider the case where several registries can be used
1007     # Removed hardcoded platform = 5
1008     # This platform == 'myslice' is a TMP FIX !!
1009     try:
1010         reg_platform_query = Query().get('local:platform') \
1011             .filter_by('platform', '==', 'myslice')           \
1012             .select('platform_id')
1013         reg_platform = execute_admin_query(wsgi_request, reg_platform_query)
1014
1015         reg_platform_id = reg_platform[0]['platform_id']
1016         account_params = {
1017             'platform_id'   : reg_platform_id, # XXX ALERT !!
1018             'user_id'       : user_id, 
1019             'auth_type'     : request['auth_type'], 
1020             'config'        : json.dumps(account_config),
1021         }
1022         manifold_add_account(wsgi_request, account_params)
1023     except Exception, e:
1024         print "Failed creating manifold account on platform %s for user: %s" % ('myslice', request['email'])
1025
1026     try:
1027         # Send an email: the recipients are the PI of the authority
1028         # If No PI is defined for this Authority, send to a default email (different for each theme)
1029         recipients = authority_get_pi_emails(wsgi_request, request['authority_hrn'])
1030         
1031         theme.template_name = 'user_request_email.html'
1032         html_content = render_to_string(theme.template, request)
1033  
1034         theme.template_name = 'user_request_email.txt'
1035         text_content = render_to_string(theme.template, request)
1036     
1037         theme.template_name = 'user_request_email_subject.txt'
1038         subject = render_to_string(theme.template, request)
1039         subject = subject.replace('\n', '')
1040     
1041         theme.template_name = 'email_default_sender.txt'
1042         sender =  render_to_string(theme.template, request)
1043         sender = sender.replace('\n', '')
1044     
1045         msg = EmailMultiAlternatives(subject, text_content, sender, recipients)
1046         msg.attach_alternative(html_content, "text/html")
1047         msg.send()
1048     except Exception, e:
1049         print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
1050         import traceback
1051         traceback.print_exc()