Merge branch 'onelab' of ssh://git.onelab.eu/git/myslice into onelab
[myslice.git] / portal / actions.py
1 from django.http                import HttpResponse
2 from manifold.core.query        import Query
3 from manifoldapi.manifoldapi    import execute_query,execute_admin_query
4 from portal.models              import PendingUser, PendingSlice, PendingAuthority
5 import json
6
7 from django.contrib.auth.models  import User
8 from django.contrib.sites.models import Site
9 from django.contrib.auth        import get_user_model
10 from django.template.loader     import render_to_string
11 from django.core.mail           import EmailMultiAlternatives, send_mail
12
13 from myslice.theme              import ThemeView
14
15 theme = ThemeView()
16
17 import activity.slice
18
19 # Thierry: moving this right into the code so 
20 # most people can use myslice without having to install sfa
21 # XXX tmp sfa dependency, should be moved to SFA gateway
22 #from sfa.util.xrn                import Xrn 
23
24
25 # Get the list of authorities
26
27 def authority_get_pis(request, authority_hrn):
28
29     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
30     query = Query.get('authority').filter_by('authority_hrn', '==', authority_hrn).select('pi_users')
31     results = execute_admin_query(request, query)
32     print "authority_get_pis = %s" % results
33     # NOTE: temporarily commented. Because results is giving empty list. 
34     # Needs more debugging
35     #if not results:
36     #    raise Exception, "Authority not found: %s" % authority_hrn
37     #result, = results
38     #return result['pi_users']
39     return results
40
41 def authority_get_pi_emails(request, authority_hrn):
42     pi_users = authority_get_pis(request,authority_hrn)
43     print "pi_users = %s" % pi_users
44
45     if any(pi['pi_users'] == None or not pi['pi_users']  for pi in pi_users):
46         #theme.template_name = 'email_default_recipients.txt' 
47         #default_email = render_to_string(theme.template, request)
48         #default_email = default_email.replace('\n', '')
49         #return default_email
50         # the above doesn't work
51         return ['support@onelab.eu']
52     else:
53         pi_user_hrns = [ hrn for x in pi_users for hrn in x['pi_users'] ]
54
55         # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
56         query = Query.get('myslice:user').filter_by('user_hrn', 'included', pi_user_hrns).select('user_email')
57         results = execute_admin_query(request, query)
58         return [result['user_email'] for result in results]
59
60 #clear user credentials
61 def clear_user_creds(request, user_email):
62     try:
63         user_query  = Query().get('local:user').filter_by('email', '==', user_email).select('user_id','email','password','config')
64         user_details = execute_admin_query(request, user_query)
65     
66         # getting the user_id from the session
67         for user_detail in user_details:
68             user_id = user_detail['user_id']
69             user_email = user_detail['email']
70     
71         account_query  = Query().get('local:account').filter_by('user_id', '==', user_id).select('user_id','platform_id','auth_type','config')
72         account_details = execute_admin_query(request, account_query)
73     
74         platform_query  = Query().get('local:platform').select('platform_id','platform')
75         platform_details = execute_admin_query(request, platform_query)
76     
77         for account_detail in account_details:
78             for platform_detail in platform_details:
79                 if platform_detail['platform_id'] == account_detail['platform_id']:
80                     if 'myslice' in platform_detail['platform']:
81                         account_config = json.loads(account_detail['config'])
82                         #user_cred = account_config.get('delegated_user_credential','N/A')
83                         user_cred = account_config.get('user_credential','N/A')
84                         if 'N/A' not in user_cred:
85                             user_hrn = account_config.get('user_hrn','N/A')
86                             user_pub_key = json.dumps(account_config.get('user_public_key','N/A'))
87                             user_priv_key = json.dumps(account_config.get('user_private_key','N/A'))
88                             updated_config = '{"user_public_key":'+ user_pub_key + ', "user_private_key":'+ user_priv_key + ', "user_hrn":"'+ user_hrn + '"}'
89                             user_params = { 'config': updated_config}
90                             manifold_update_account(request, user_id,user_params)
91                             return user_email
92                         else:
93                             return None
94
95     except Exception,e:
96         print "Exception in actions.py in clear_user_creds %s" % e
97         return None
98
99 def is_pi(wsgi_request, user_hrn, authority_hrn):
100     # XXX could be done in a single query !
101
102     # seauthorities from user where user_hrn == "ple.upmc.jordan_auge"
103
104     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
105     query = Query.get('myslice:user').filter_by('user_hrn', '==', user_hrn).select('pi_authorities')
106     results = execute_admin_query(wsgi_request, query)
107     if not results:
108         # XXX Warning ?
109         return False
110     result = results[0]
111     user_authority_hrns = result.get('pi_authorities', [])
112     return authority_hrn in user_authority_hrns
113     
114 # SFA get record
115
116 def sfa_get_user(request, user_hrn, pub):
117
118     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
119     query_sfa_user = Query.get('myslice:user').filter_by('user_hrn', '==', user_hrn)
120     result_sfa_user = execute_admin_query(request, query_sfa_user)
121     return result_sfa_user                        
122
123 def sfa_update_user(request, user_hrn, user_params):
124     # user_params: keys [public_key] 
125     if 'email' in user_params:
126         user_params['user_email'] = user_params['email']
127
128     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
129     query = Query.update('myslice:user').filter_by('user_hrn', '==', user_hrn).set(user_params).select('user_hrn')
130     results = execute_admin_query(request,query)
131     return results
132
133 def sfa_add_authority(request, authority_params):
134
135     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
136     query = Query.create('authority').set(authority_params).select('authority_hrn')
137     results = execute_query(request, query)
138     print "sfa_add_auth results=",results
139     if not results:
140         raise Exception, "Could not create %s. Already exists ?" % authority_params['hrn']
141     return results
142
143 def sfa_add_user_to_slice(request, user_hrn, slice_params):
144 # UPDATE myslice:slice SET researcher=['ple.upmc.jordan_auge','ple.inria.thierry_parmentelat','ple.upmc.loic_baron','ple.upmc.ciro_scognamiglio','ple.upmc.mohammed-yasin_rahman','ple.upmc.azerty'] where slice_hrn=='ple.upmc.myslicedemo'
145
146     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
147     query_current_users = Query.get('myslice:slice').select('user').filter_by('slice_hrn','==',slice_params['hrn'])
148     results_current_users = execute_query(request, query_current_users)
149     slice_params['researcher'] = slice_params['researcher'] | results_current_users
150
151     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
152     query = Query.update('myslice:slice').filter_by('user_hrn', '==', user_hrn).set(slice_params).select('slice_hrn')
153     results = execute_query(request, query)
154 # Also possible but not supported yet
155 # UPDATE myslice:user SET slice=['ple.upmc.agent','ple.upmc.myslicedemo','ple.upmc.tophat'] where user_hrn=='ple.upmc.azerty'
156     if not results:
157         raise Exception, "Could not create %s. Already exists ?" % slice_params['hrn']
158     return results
159
160 # Propose hrn
161
162 def manifold_add_user(wsgi_request, request):
163     """Add a Manifold user corresponding to a user request.
164
165     Args:
166         wsgi_request: a WSGIRequest instance
167         request (dict): a dictionary containing the user request built from the
168             form.
169
170     Returns:
171         The user_id of the inserted user.
172
173     Raises:
174         ?
175     
176     """
177     USER_CONFIG = '{"firstname": "%(first_name)s", "lastname": "%(last_name)s", "authority": "%(authority_hrn)s"}'
178
179     user_params = {
180         'email'     : request['email'],
181         'password'  : request['password'],
182         'config'    : USER_CONFIG % request,
183         'status'    : 1,
184     }
185
186     query = Query.create('local:user').set(user_params).select('email')
187     results = execute_admin_query(request, query)
188     if not results:
189         raise Exception, "Failed creating manifold user: %s" % user_params['email']
190     result = results[0]
191     return result['email']
192
193 def manifold_update_user(request, email, user_params):
194     # user_params: password, config e.g., 
195     query = Query.update('local:user').filter_by('email', '==', email).set(user_params).select('email')
196     results = execute_admin_query(request,query)
197     # NOTE: results remains empty and goes to Exception. However, it updates the manifold DB.
198     # That's why I commented the exception part. -- Yasin 
199     #if not results:
200     #    raise Exception, "Failed updating manifold user: %s" % user_params['email']
201     #result, = results
202     return results
203
204 def manifold_add_account(request, account_params):
205     query = Query.create('local:account').set(account_params).select(['user', 'platform'])
206     results = execute_admin_query(request,query)
207     if not results:
208         raise Exception, "Failed creating manifold account on platform %s for user: %s" % (account_params['platform'], account_params['user'])
209     result, = results
210     return result['user_id']
211
212 def manifold_update_account(request,user_id,account_params):
213     # account_params: config
214     query = Query.update('local:account').filter_by('platform', '==', 'myslice').filter_by('user_id', '==', user_id).set(account_params).select('user_id')
215     results = execute_admin_query(request,query)
216     return results
217
218 #explicitly mention the platform_id
219 def manifold_delete_account(request, platform_id, user_id, account_params):
220     query = Query.delete('local:account').filter_by('platform_id', '==', platform_id).filter_by('user_id', '==', user_id).set(account_params).select('user_id')
221     results = execute_admin_query(request,query)
222     return results
223
224 def manifold_delete_user(request, user_id, user_params):
225     query = Query.delete('local:user').filter_by('user_id', '==', user_id).set(user_params).select('user_id')
226     results = execute_admin_query(request,query)
227     return results
228
229
230 #not tested
231 def manifold_add_platform(request, platform_params):
232     query = Query.create('local:platform').set(platform_params).select(['user', 'platform'])
233     results = execute_admin_query(request,query)
234     if not results:
235         raise Exception, "Failed creating manifold platform %s for user: %s" % (platform_params['platform'], platform_params['user'])
236     result, = results
237     return result['platform_id']
238
239
240 def make_request_user(user):
241     request = {}
242     request['type']          = 'user'
243     request['id']            = user.id
244     request['timestamp']     = user.created # XXX in DB ?
245     request['authority_hrn'] = user.authority_hrn
246     request['first_name']    = user.first_name
247     request['last_name']     = user.last_name
248     request['email']         = user.email
249     request['login']         = user.login
250     request['user_hrn']      = user.user_hrn
251     request['public_key']    = user.public_key
252     request['private_key']   = user.private_key
253     return request
254
255 def make_request_slice(slice):
256     request = {}
257     request['type'] = 'slice'
258     request['id'] = slice.id
259     request['user_hrn'] = slice.user_hrn
260     request['timestamp'] = slice.created
261     request['authority_hrn'] = slice.authority_hrn
262     request['slice_name'] = slice.slice_name
263     request['number_of_nodes'] = slice.number_of_nodes
264     request['type_of_nodes'] = slice.type_of_nodes
265     request['purpose'] = slice.purpose
266     return request
267
268 def make_request_authority(authority):
269     request = {}
270     request['type']                  = 'authority'
271     request['id']                    = authority.id
272     request['site_name']             = authority.site_name
273     request['site_latitude']         = authority.site_latitude
274     request['site_longitude']        = authority.site_longitude
275     request['site_url']              = authority.site_url
276     request['site_authority']        = authority.site_authority
277     request['site_abbreviated_name'] = authority.site_abbreviated_name
278     request['address_line1']         = authority.address_line1
279     request['address_line2']         = authority.address_line2
280     request['address_line3']         = authority.address_line3
281     request['address_city']          = authority.address_city
282     request['address_postalcode']    = authority.address_postalcode
283     request['address_state']         = authority.address_state
284     request['address_country']       = authority.address_country
285     request['authority_hrn']         = authority.authority_hrn
286     request['timestamp']             = authority.created
287     return request
288
289 def make_requests(pending_users, pending_slices, pending_authorities):
290     requests = []
291     for user in pending_users:
292         requests.append(make_request_user(user))
293     for slice in pending_slices:
294         requests.append(make_request_slice(slice))
295     for authority in pending_authorities:
296         requests.append(make_request_authority(authority))
297     return requests   
298
299 def get_request_by_id(ids):
300     sorted_ids = { 'user': [], 'slice': [], 'authority': [] }
301     for type__id in ids:
302         type, id = type__id.split('__')
303         sorted_ids[type].append(id)
304         
305     if not ids:
306         pending_users  = PendingUser.objects.all()
307         pending_slices = PendingSlice.objects.all()
308         pending_authorities = PendingAuthority.objects.all()
309     else:
310         pending_users  = PendingUser.objects.filter(id__in=sorted_ids['user']).all()
311         pending_slices = PendingSlice.objects.filter(id__in=sorted_ids['slice']).all()
312         pending_authorities = PendingAuthority.objects.filter(id__in=sorted_ids['authority']).all()
313
314     return make_requests(pending_users, pending_slices, pending_authorities)
315
316 def get_requests(authority_hrns=None):
317     print "get_request_by_authority auth_hrns = ", authority_hrns
318     if not authority_hrns:
319         ## get those pending users who have confirmed their emails
320         pending_users  = PendingUser.objects.filter(status__iexact = 'True')
321         pending_slices = PendingSlice.objects.all()
322         pending_authorities = PendingAuthority.objects.all()
323     else:
324         pending_users  = PendingUser.objects.filter(authority_hrn__in=authority_hrns).all()
325         pending_slices = PendingSlice.objects.filter(authority_hrn__in=authority_hrns).all()
326         pending_authorities = PendingAuthority.objects.filter(authority_hrn__in=authority_hrns).all()
327
328     return make_requests(pending_users, pending_slices, pending_authorities)
329
330 # XXX Is it in sync with the form fields ?
331
332 def portal_validate_request(wsgi_request, request_ids):
333     status = {}
334
335     if not isinstance(request_ids, list):
336         request_ids = [request_ids]
337
338     requests = get_request_by_id(request_ids)
339     for request in requests:
340         # type, id, timestamp, details, allowed -- MISSING: authority_hrn
341         # CAREFUL about details
342         # user  : first name, last name, email, password, keypair
343         # slice : number of nodes, type of nodes, purpose
344         
345         request_status = {}
346
347         if request['type'] == 'user':
348
349             try:
350                 create_user(wsgi_request, request)
351                 request_status['SFA user'] = {'status': True }
352                 PendingUser.objects.get(id=request['id']).delete()
353             except Exception, e:
354                  request_status['SFA user'] = {'status': False, 'description': str(e)}
355                        
356 #            user_params = {'status':2}
357 #            manifold_update_user(request, request['email'], user_params)
358
359             # MANIFOLD user should be added beforehand, during registration
360             #try:
361             #    manifold_user_params = { key: request[key] for key in MANIFOLD_USER_KEYS }
362             #    # XXX # manifold_add_user(manifold_user_params)
363             #    request_status['MySlice user'] = {'status': True }
364             #except Exception, e:
365             #    request_status['MySlice user'] = {'status': False, 'description': str(e)}
366
367             # XXX
368             #manifold_account_params = { key: request[key] for key in MANIFOLD_ACCOUNT_KEYS }
369             #manifold_add_account(manifold_account_params)
370             #request_status['MySlice testbed accounts'] = {'status': False }
371
372         elif request['type'] == 'slice':
373             try:
374                 create_slice(wsgi_request, request)
375                 request_status['SFA slice'] = {'status': True }
376                 PendingSlice.objects.get(id=request['id']).delete()
377
378             except Exception, e:
379                 request_status['SFA slice'] = {'status': False, 'description': str(e)}
380
381         elif request['type'] == 'authority':
382             try:
383                 #hrn = "%s.%s" % (request['authority_hrn'], request['site_authority'])
384                 hrn = request['site_authority']
385                 # XXX tmp sfa dependency
386                 from sfa.util.xrn import Xrn 
387                 urn = Xrn(hrn, request['type']).get_urn()
388                 
389                 # Only hrn is required for Manifold Query 
390                 sfa_authority_params = {
391                     'authority_hrn'        : hrn,
392                     #'authority_urn'        : urn,
393                     #'type'       : request['type'],
394                     #'pi'        : None,
395                     #'enabled'    : True
396                 }
397                 print "ADD Authority"
398                 sfa_add_authority(wsgi_request, sfa_authority_params)
399                 request_status['SFA authority'] = {'status': True }
400                 PendingAuthority.objects.get(id=request['id']).delete()
401
402             except Exception, e:
403                 request_status['SFA authority'] = {'status': False, 'description': str(e)}
404
405         # XXX Remove from Pendings in database
406
407         status['%s__%s' % (request['type'], request['id'])] = request_status
408
409     return status
410
411 def validate_action(request, **kwargs):
412     ids = filter(None, kwargs['id'].split('/'))
413     status = portal_validate_request(request, ids)
414     json_answer = json.dumps(status)
415     return HttpResponse (json_answer, mimetype="application/json")
416
417
418 def reject_action(request, **kwargs):
419     ids = filter(None, kwargs['id'].split('/'))
420     status = portal_reject_request(request, ids)
421     json_answer = json.dumps(status)
422     return HttpResponse (json_answer, mimetype="application/json")
423
424
425 def portal_reject_request(wsgi_request, request_ids):
426     status = {}
427     # get the domain url    
428     current_site = Site.objects.get_current()
429     current_site = current_site.domain
430
431
432     if not isinstance(request_ids, list):
433         request_ids = [request_ids]
434
435     requests = get_request_by_id(request_ids)
436     for request in requests:
437         # type, id, timestamp, details, allowed -- MISSING: authority_hrn
438         # CAREFUL about details
439         # user  : first name, last name, email, password, keypair
440         # slice : number of nodes, type of nodes, purpose
441         
442         request_status = {}
443
444         if request['type'] == 'user':
445             try:
446                 request_status['SFA user'] = {'status': True }
447                 # getting user email based on id 
448                 ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
449                 for user in PendingUser.objects.raw('SELECT * FROM portal_pendinguser WHERE id = %s', [request['id']]):
450                     user_email= user.email
451                     first_name = user.first_name
452                     last_name = user.last_name
453
454                 ctx = {
455                     'first_name'    : first_name, 
456                     'last_name'     : last_name, 
457                     'portal_url'    : current_site,
458                     }
459                 try:
460                     theme.template_name = 'user_request_denied.txt'
461                     text_content = render_to_string(theme.template, ctx)
462                     theme.template_name = 'user_request_denied.html'
463                     html_content = render_to_string(theme.template, ctx)
464                     theme.template_name = 'email_default_sender.txt'
465                     sender =  render_to_string(theme.template, ctx)
466                     sender = sender.replace('\n', '')
467                                
468                     subject = 'User request denied.'
469
470                     msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
471                     msg.attach_alternative(html_content, "text/html")
472                     msg.send()
473                 except Exception, e:
474                     print "Failed to send email, please check the mail templates and the SMTP configuration of your server"   
475             
476                 # removing from Django auth_user
477                 UserModel = get_user_model()
478                 UserModel._default_manager.filter(email__iexact = user_email).delete()
479                 # removing from Django portal_pendinguser
480                 PendingUser.objects.get(id=request['id']).delete()
481                 # removing from manifold
482                 # removing manifold account
483                 user_query = Query().get('local:user') \
484                     .filter_by('email', '==', user_email)           \
485                     .select('user_id')
486                 user = execute_admin_query(wsgi_request, user_query)
487                 user_id = user[0]['user_id']
488         
489                 platform_query = Query().get('local:platform') \
490                     .filter_by('platform', '==', 'myslice')           \
491                     .select('platform_id')
492                 platform = execute_admin_query(wsgi_request, platform_query)
493                 platform_id = platform[0]['platform_id']
494                 account_params = {'user_id':user_id}
495                 manifold_delete_account(request, platform_id, user_id, account_params)           
496              
497                 # removing manifold user
498                 user_params = {'user_id':user_id}
499                 manifold_delete_user(request, user_id, user_params)
500             except Exception, e:
501                 request_status['SFA authority'] = {'status': False, 'description': str(e)}
502                       
503         elif request['type'] == 'slice':
504             request_status['SFA slice'] = {'status': True } 
505
506             # getting user email based on id 
507             ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
508             for user in PendingSlice.objects.raw('SELECT * FROM portal_pendingslice WHERE id = %s', [request['id']]):
509                 user_email= user.type_of_nodes # XXX type_of_nodes field contains the email [shd be renamed in DB]
510                 slice_name = user.slice_name
511                 purpose = user.purpose
512                 url = user.number_of_nodes
513
514             ctx = {
515                 'slice_name': slice_name,
516                 'purpose': purpose,
517                 'url': url,
518                 'portal_url': current_site,
519                 }
520             try:
521                 theme.template_name = 'slice_request_denied.txt'
522                 text_content = render_to_string(theme.template, ctx)
523                 theme.template_name = 'slice_request_denied.html'
524                 html_content = render_to_string(theme.template, ctx)
525                 theme.template_name = 'email_default_sender.txt'
526                 sender =  render_to_string(theme.template, ctx)
527                 sender = sender.replace('\n', '')
528                                
529                 subject = 'Slice request denied.'
530
531                 msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
532                 msg.attach_alternative(html_content, "text/html")
533                 msg.send()
534             except Exception, e:
535                 print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
536                       
537             PendingSlice.objects.get(id=request['id']).delete()
538
539         elif request['type'] == 'authority':
540             request_status['SFA authority'] = {'status': True }
541             
542             # getting user email based on id 
543             ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
544             for user in PendingAuthority.objects.raw('SELECT * FROM portal_pendingauthority WHERE id = %s', [request['id']]):
545                 user_email= user.address_line1 # XXX address_line1 field contains the email [shd be renamed in DB]
546                 site_name = user.site_name
547                 city = user.address_city
548                 country = user.address_country
549                 short_name = user.site_abbreviated_name
550                 url = user.site_url
551
552             ctx = { 
553                 'site_name': site_name,
554                 'short_name': short_name,
555                 'url': url,
556                 'city': city,
557                 'country': country,                          
558                 'portal_url'    : current_site,
559                 }
560                 
561             try:
562                 theme.template_name = 'authority_request_denied.txt'
563                 text_content = render_to_string(theme.template, ctx)
564                 theme.template_name = 'authority_request_denied.html'
565                 html_content = render_to_string(theme.template, ctx)
566                 theme.template_name = 'email_default_sender.txt'
567                 sender =  render_to_string(theme.template, ctx)
568                 sender = sender.replace('\n', '')
569                 subject = 'Authority request denied.'
570                 msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
571                 msg.attach_alternative(html_content, "text/html")
572                 msg.send()
573             except Exception, e:
574                 print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
575
576             PendingAuthority.objects.get(id=request['id']).delete()
577
578         status['%s__%s' % (request['type'], request['id'])] = request_status
579
580     return status
581
582 # Django and ajax
583 # http://djangosnippets.org/snippets/942/
584
585
586
587 #-------------------------------------------------------------------------------
588 # REQUESTS - Slices
589 #-------------------------------------------------------------------------------
590
591 def create_slice(wsgi_request, request):
592     """
593     Arguments:
594         wsgi_request (~ WSGIRequest) : 
595         request (dict) : the slice request in our own dict format
596
597     Raises:
598         Exception
599     """
600     hrn = "%s.%s" % (request['authority_hrn'], request['slice_name'])
601     # XXX tmp sfa dependency
602     from sfa.util.xrn import Xrn 
603     urn = Xrn(hrn, request['type']).get_urn()
604     
605     # Add User to Slice if we have the user_hrn in pendingslice table
606     user_hrn = request.get('user_hrn', None)
607     user_hrns = list([user_hrn]) if user_hrn else list()
608     
609     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
610     user_query  = Query().get('myslice:user').select('user_hrn','user_email').filter_by('user_hrn','==',user_hrn)
611     user_details_sfa = execute_admin_query(wsgi_request, user_query)
612     if not user_details_sfa:
613         raise Exception, "User %s doesn't exist, validate user before validating slice" % user_hrn
614     for user in user_details_sfa:
615         user_email = user['user_email']
616
617     # XXX LOIC Quick fix because this is totally inconsistent
618     if not 'number_of_nodes' in request:
619         request['number_of_nodes']=""
620
621     # XXX We should create a slice with Manifold terminology
622     slice_params = {
623         'slice_hrn'        : hrn, 
624         'slice_urn'        : urn,
625         'slice_type'       : request['type'],
626         'url'              : request['number_of_nodes'],
627         'users'            : user_hrns,
628         'slice_enabled'    : True
629     }
630     # ignored in request: id, timestamp,  number_of_nodes, type_of_nodes, purpose
631
632     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
633     query = Query.create('myslice:slice').set(slice_params).select('slice_hrn')
634     results = execute_query(wsgi_request, query)
635     if not results:
636         raise Exception, "Could not create %s. Already exists ?" % slice_params['hrn']
637     else:
638         clear_user_creds(wsgi_request,user_email)
639         # log user activity
640         activity.slice.validate(request, { "slice" : hrn })
641         try:
642             theme.template_name = 'slice_request_validated.txt'
643             text_content = render_to_string(theme.template, request)
644             theme.template_name = 'slice_request_validated.html'
645             html_content = render_to_string(theme.template, request)
646         
647             theme.template_name = 'email_default_sender.txt'
648             sender =  render_to_string(theme.template, request)
649             sender = sender.replace('\n', '')
650
651             subject = 'Slice request validated'
652
653             msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
654             msg.attach_alternative(html_content, "text/html")
655             msg.send()
656         except Exception, e:
657             print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
658        
659     return results
660
661 def create_pending_slice(wsgi_request, request, email):
662     """
663     """
664
665     # Insert an entry in the PendingSlice table
666     s = PendingSlice(
667         slice_name      = request['slice_name'],
668         user_hrn        = request['user_hrn'],
669         authority_hrn   = request['authority_hrn'],
670         number_of_nodes = request['url'], # field needs to be renamed
671         purpose         = request['purpose'],
672         type_of_nodes   = request['email'] # field needs to be renamed 
673     )
674     s.save()
675
676     try:
677         # Send an email: the recipients are the PI of the authority
678         recipients = authority_get_pi_emails(wsgi_request, request['authority_hrn'])
679
680         theme.template_name = 'slice_request_email.txt' 
681         text_content = render_to_string(theme.template, request)
682     
683         theme.template_name = 'slice_request_email.html' 
684         html_content = render_to_string(theme.template, request)
685     
686         theme.template_name = 'slice_request_email_subject.txt'
687         subject = render_to_string(theme.template, request)
688         subject = subject.replace('\n', '')
689     
690         sender = email
691         msg = EmailMultiAlternatives(subject, text_content, sender, recipients)
692         msg.attach_alternative(html_content, "text/html")
693         msg.send()
694     except Exception, e:
695         print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
696
697 #-------------------------------------------------------------------------------
698 # REQUESTS - Users
699 #-------------------------------------------------------------------------------
700
701 def manifold_add_reference_user_accounts(wsgi_request, request):
702     """When a new user is created, add reference accounts to the reference platform.
703     """
704     # XXX XXX XXX The rest of this function has to be checked XXX XXX XXX
705
706     # Retrieve user information
707     user_query  = Query().get('local:user')             \
708         .select('user_id', 'config', 'email', 'status') \
709         .filter_by('email', '==', request['email'])
710     user_details = execute_admin_query(wsgi_request, user_query)
711
712     # USER MAIN ACCOUNT != reference
713     #print 'USER MAIN ACCOUNT != reference'
714     list_accounts_query = Query().get('local:account')              \
715         .select('user_id', 'platform_id', 'auth_type', 'config')    \
716         .filter_by('user_id', '==', user_details[0]['user_id'])     \
717         .filter_by('auth_type', '!=', 'reference')
718     list_accounts = execute_admin_query(wsgi_request, list_accounts_query)
719
720     # XXX main_platform is being erased several times ???
721     for account in list_accounts:
722         main_platform_query = Query().get('local:platform')         \
723             .select('platform_id', 'platform')                      \
724             .filter_by('platform_id', '==', account['platform_id'])
725         main_platform = execute_admin_query(wsgi_request, main_platform_query)
726
727     # Add reference accounts on SFA enabled platforms
728     platforms_query = Query().get('local:platform') \
729         .filter_by('disabled', '==', '0')           \
730         .filter_by('gateway_type', '==', 'sfa')     \
731         .select('platform_id', 'gateway_type')
732     platforms = execute_admin_query(wsgi_request, platforms_query)
733     for platform in platforms:
734         #print "add reference to platform ",platform
735         manifold_account_params = {
736             'user_id'       : user_details[0]['user_id'],
737             'platform_id'   : platform['platform_id'],
738             'auth_type'     : 'reference',
739             'config'        : '{"reference_platform": "' + main_platform[0]['platform'] + '"}',
740         }
741         manifold_add_account(wsgi_request, manifold_account_params)
742
743 def sfa_create_user(wsgi_request, request, namespace = None, as_admin = False):
744     """
745     Arguments:
746         wsgi_request (~ WSGIRequest) : 
747         request (dict) : the user request in our own dict format
748
749     Raises:
750         Exception
751     """
752     from sfa.util.xrn import Xrn 
753
754     auth_pi = request.get('pi', None)
755     auth_pi = list([auth_pi]) if auth_pi else list()
756
757     # We create a user request with Manifold terminology
758     sfa_user_params = {
759         'user_hrn'          : request['user_hrn'],
760         'user_email'        : request['email'],
761         'user_urn'          : Xrn(request['user_hrn'], request['type']).get_urn(),
762         'user_type'         : request['type'],
763         'keys'              : request['public_key'],
764         'user_first_name'   : request['first_name'],
765         'user_last_name'    : request['last_name'],
766         'pi_authorities'    : auth_pi,
767         'user_enabled'      : True
768     }
769
770     if namespace is not None:
771         query = Query.create('%s:user' % namespace).set(sfa_user_params).select('user_hrn')
772     else:
773         # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
774         query = Query.create('myslice:user').set(sfa_user_params).select('user_hrn')
775
776     if as_admin:
777         results = execute_admin_query(wsgi_request, query)
778     else:
779         results = execute_query(wsgi_request, query)
780
781     if not results:
782         raise Exception, "Could not create %s. Already exists ?" % sfa_user_params['user_hrn']
783     else:
784         try:
785             theme.template_name = 'user_request_validated.txt'
786             text_content = render_to_string(theme.template, request)
787             theme.template_name = 'user_request_validated.html'
788             html_content = render_to_string(theme.template, request)
789         
790             theme.template_name = 'email_default_sender.txt'
791             sender =  render_to_string(theme.template, request)
792             sender = sender.replace('\n', '')
793
794
795             subject = 'User validated'
796
797             msg = EmailMultiAlternatives(subject, text_content, sender, [request['email']])
798             msg.attach_alternative(html_content, "text/html")
799             msg.send()
800         except Exception, e:
801             print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
802
803     return results
804
805 def iotlab_create_user (wsgi_request, request, namespace = None, as_admin=False):
806    
807     import requests
808     import time
809     from requests.auth import HTTPBasicAuth
810     
811     URL_REST = 'https://devgrenoble.senslab.info/rest/admin/users'
812     LOGIN_ADMIN = "auge"
813     PASSWORD_ADMIN = "k,mfg1+Q"
814
815     auth = HTTPBasicAuth(LOGIN_ADMIN,PASSWORD_ADMIN)
816     headers = {'content-type': 'application/json'}
817
818     for user in PendingUser.objects.raw('SELECT * FROM portal_pendinguser WHERE email = %s', [request['email']]):
819         password= user.password
820
821
822     iotlab_user_params = {
823         "type"          : "SA",
824         #"login"         : request['email'], #auto generated by iotlab
825         "password"      : password,
826         "firstName"     : request['first_name'],
827         "lastName"      : request['last_name'],
828         "email"         : request['email'],
829         "structure"     : request['authority_hrn'],
830         "city"          : "N/A",
831         "country"       : "N/A",
832         "sshPublicKey"  : request['public_key'],
833         "motivations"   : "SFA federation",
834     }    
835    
836     iotlab_user_params1 = json.dumps(iotlab_user_params)
837     r=requests.post(url=URL_REST, data=iotlab_user_params1, headers=headers, auth=auth)
838     print 'Create iotlab user : ', r.status_code, r.text
839     return r.text
840
841 def create_user(wsgi_request, request, namespace = None, as_admin = False):
842     # XXX This has to be stored centrally
843     USER_STATUS_ENABLED = 2
844
845     # NOTE : if we were to create a user directly (just like we create slices,
846     # we would have to perform the steps in create_pending_user too
847
848     # Add the user to the SFA registry
849     sfa_create_user(wsgi_request, request, namespace, as_admin)
850
851     # Update Manifold user status
852     manifold_update_user(wsgi_request, request['email'], {'status': USER_STATUS_ENABLED})
853
854     # Add reference accounts for platforms
855     manifold_add_reference_user_accounts(wsgi_request, request)
856
857     # Add the user to iotlab portal if theme is set to onelab
858     if theme.theme == 'onelab':
859         iotlab_create_user (wsgi_request, request)
860
861 def create_pending_user(wsgi_request, request, user_detail):
862     """
863     """
864
865     # Insert an entry in the PendingUser table
866     b = PendingUser(
867         first_name    = request['first_name'],
868         last_name     = request['last_name'],
869         authority_hrn = request['authority_hrn'],
870         email         = request['email'],
871         password      = request['password'],
872         public_key    = request['public_key'],
873         private_key   = request['private_key'],
874         user_hrn      = request['user_hrn'],
875         pi            = request['pi'],
876         email_hash    = request['email_hash'],
877         status        = 'False',
878     )
879     b.save()
880     # sends email to user to activate the email
881     theme.template_name = 'activate_user.html'
882     html_content = render_to_string(theme.template, request)
883     theme.template_name = 'activate_user.txt'
884     text_content = render_to_string(theme.template, request)
885     theme.template_name = 'activate_user_email_subject.txt'
886     subject = render_to_string(theme.template, request)
887     subject = subject.replace('\n', '')
888     theme.template_name = 'email_default_sender.txt'
889     sender =  render_to_string(theme.template, request)
890     sender = sender.replace('\n', '')
891     recipient = [request['email']]
892     #recipient = recipient.append(request['email'])
893
894     msg = EmailMultiAlternatives(subject, text_content, sender, recipient)
895     msg.attach_alternative(html_content, "text/html")
896     msg.send()
897    
898     # saves the user to django auth_user table [needed for password reset]
899     user = User.objects.create_user(request['email'], request['email'], request['password'])
900
901     # Creating a manifold user
902     user_id = manifold_add_user(wsgi_request, request)
903
904     # Creating a Manifold account on the MySlice platform
905     # Note the JSON representation of public and private keys already includes quotes
906     account_config = {
907         'user_hrn'          : request['user_hrn'],
908         'user_public_key'   : request['public_key'],
909     }
910     if request['private_key']:
911         account_config['user_private_key'] = request['private_key']
912
913     user_id = user_detail['user_id'] + 1 # the user_id for the newly created user in local:user
914
915     # XXX TODO: Require a myslice platform
916     # ALERT: this will disapear with ROUTERV2 of Manifold
917     # We have to consider the case where several registries can be used
918     # Removed hardcoded platform = 5
919     # This platform == 'myslice' is a TMP FIX !!
920     try:
921         reg_platform_query = Query().get('local:platform') \
922             .filter_by('platform', '==', 'myslice')           \
923             .select('platform_id')
924         reg_platform = execute_admin_query(wsgi_request, reg_platform_query)
925
926         reg_platform_id = reg_platform[0]['platform_id']
927         account_params = {
928             'platform_id'   : reg_platform_id, # XXX ALERT !!
929             'user_id'       : user_id, 
930             'auth_type'     : request['auth_type'], 
931             'config'        : json.dumps(account_config),
932         }
933         manifold_add_account(wsgi_request, account_params)
934     except Exception, e:
935         print "Failed creating manifold account on platform %s for user: %s" % ('myslice', request['email'])
936
937     try:
938         # Send an email: the recipients are the PI of the authority
939         # If No PI is defined for this Authority, send to a default email (different for each theme)
940         recipients = authority_get_pi_emails(wsgi_request, request['authority_hrn'])
941         
942         theme.template_name = 'user_request_email.html'
943         html_content = render_to_string(theme.template, request)
944  
945         theme.template_name = 'user_request_email.txt'
946         text_content = render_to_string(theme.template, request)
947     
948         theme.template_name = 'user_request_email_subject.txt'
949         subject = render_to_string(theme.template, request)
950         subject = subject.replace('\n', '')
951     
952         theme.template_name = 'email_default_sender.txt'
953         sender =  render_to_string(theme.template, request)
954         sender = sender.replace('\n', '')
955     
956         msg = EmailMultiAlternatives(subject, text_content, sender, recipients)
957         msg.attach_alternative(html_content, "text/html")
958         msg.send()
959     except Exception, e:
960         print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
961         import traceback
962         traceback.print_exc()