1 from __future__ import print_function
3 # this somehow is not used anymore - should it not be ?
4 from django.core.context_processors import csrf
5 from django.http import HttpResponseRedirect
6 from django.contrib.auth import authenticate, login, logout
7 from django.template import RequestContext
8 from django.shortcuts import render_to_response
9 from django.shortcuts import render
12 from unfold.loginrequired import FreeAccessView
14 from manifold.core.query import Query
15 from manifoldapi.manifoldapi import execute_query
17 from manifoldapi.manifoldresult import ManifoldResult
18 from ui.topmenu import topmenu_items, the_user
19 from myslice.configengine import ConfigEngine
21 from myslice.theme import ThemeView
22 from portal.account import Account, get_expiration
23 from portal.models import PendingSlice
24 from portal.actions import authority_check_pis
29 class HomeView (FreeAccessView, ThemeView):
30 template_name = 'home-view.html'
32 # expose this so we can mention the backend URL on the welcome page
33 def default_env (self):
35 'MANIFOLD_URL':ConfigEngine().manifold_url(),
38 def post (self,request):
39 env = self.default_env()
40 env['theme'] = self.theme
41 env['section'] = "Dashboard"
43 username = request.POST.get('username')
44 password = request.POST.get('password')
46 # pass request within the token, so manifold session key can be attached to the request session.
47 token = {'username': username, 'password': password, 'request': request}
49 # our authenticate function returns either
50 # . a ManifoldResult - when something has gone wrong, like e.g. backend is unreachable
51 # . a django User in case of success
52 # . or None if the backend could be reached but the authentication failed
53 auth_result = authenticate(token=token)
54 # use one or two columns for the layout - not logged in users will see the login prompt
55 # high-level errors, like connection refused or the like
56 if isinstance (auth_result, ManifoldResult):
57 manifoldresult = auth_result
58 # let's use ManifoldResult.__repr__
59 env['state']="%s"%manifoldresult
61 return render_to_response(self.template,env, context_instance=RequestContext(request))
62 # user was authenticated at the backend
63 elif auth_result is not None:
68 if request.user.is_authenticated():
69 env['person'] = self.request.user
70 env['username'] = self.request.user
73 activity.user.login(self.request)
75 ## check user is pi or not
80 platform_query = Query().get('local:platform').select('platform_id','platform','gateway_type','disabled')
81 account_query = Query().get('local:account').select('user_id','platform_id','auth_type','config')
82 platform_details = execute_query(self.request, platform_query)
83 account_details = execute_query(self.request, account_query)
84 if platform_details is not None and platform_details != {}:
85 for platform_detail in platform_details:
86 for account_detail in account_details:
87 if platform_detail['platform_id'] == account_detail['platform_id']:
88 if 'config' in account_detail and account_detail['config'] is not '':
89 account_config = json.loads(account_detail['config'])
90 if 'myslice' in platform_detail['platform']:
91 acc_auth_cred = account_config.get('delegated_authority_credentials','N/A')
92 acc_user_cred = account_config.get('delegated_user_credential','N/A')
94 #if acc_auth_cred=={} or acc_auth_cred=='N/A':
98 user_email = str(self.request.user)
99 pi = authority_check_pis(self.request, user_email)
101 # check if the user has creds or not
102 if acc_user_cred == {} or acc_user_cred == 'N/A':
103 user_cred = 'no_creds'
105 exp_date = get_expiration(acc_user_cred, 'timestamp')
106 if exp_date < time.time():
107 user_cred = 'creds_expired'
109 user_cred = 'has_creds'
111 # list the pending slices of this user
113 for slices in PendingSlice.objects.filter(type_of_nodes__iexact=self.request.user).all():
114 pending_slices.append(slices.slice_name)
116 env['pending_slices'] = pending_slices
118 env['user_cred'] = user_cred
121 return render_to_response(self.template,env, context_instance=RequestContext(request))
124 activity.user.login(self.request, "notactive")
125 env['state'] = "Your account is not active, please contact the site admin."
126 env['layout_1_or_2']="layout-unfold2.html"
128 return render_to_response(self.template,env, context_instance=RequestContext(request))
132 activity.user.login(self.request, "error")
133 env['state'] = "Your username and/or password were incorrect."
135 return render_to_response(self.template, env, context_instance=RequestContext(request))
137 def get (self, request, state=None):
138 env = self.default_env()
140 if request.user.is_authenticated():
142 ## check user is pi or not
143 platform_details = {}
147 platform_query = Query().get('local:platform').select('platform_id','platform','gateway_type','disabled')
148 account_query = Query().get('local:account').select('user_id','platform_id','auth_type','config')
149 # XXX Something like an invalid session seems to make the execute fail sometimes, and thus gives an error on the main page
150 platform_details = execute_query(self.request, platform_query)
151 account_details = execute_query(self.request, account_query)
152 if platform_details is not None and platform_details != {}:
153 for platform_detail in platform_details:
154 for account_detail in account_details:
155 if 'platform_id' in platform_detail:
156 if platform_detail['platform_id'] == account_detail['platform_id']:
157 if 'config' in account_detail and account_detail['config'] is not '':
158 account_config = json.loads(account_detail['config'])
159 if 'myslice' in platform_detail['platform']:
160 acc_auth_cred = account_config.get('delegated_authority_credentials','N/A')
161 acc_user_cred = account_config.get('delegated_user_credential','N/A')
163 #if acc_auth_cred=={} or acc_auth_cred=='N/A':
167 user_email = str(self.request.user)
168 pi = authority_check_pis(self.request, user_email)
169 # check if the user has creds or not
170 if acc_user_cred == {} or acc_user_cred == 'N/A':
171 user_cred = 'no_creds'
173 exp_date = get_expiration(acc_user_cred, 'timestamp')
174 if exp_date < time.time():
175 user_cred = 'creds_expired'
177 user_cred = 'has_creds'
179 # list the pending slices of this user
181 for slices in PendingSlice.objects.filter(type_of_nodes__iexact=self.request.user).all():
182 pending_slices.append(slices.slice_name)
184 env['pending_slices'] = pending_slices
186 env['user_cred'] = user_cred
187 env['person'] = self.request.user
191 env['theme'] = self.theme
192 env['section'] = "Dashboard"
195 env['username']=the_user(request)
196 env['topmenu_items'] = topmenu_items(None, request)
197 if state: env['state'] = state
198 elif not env['username']: env['state'] = None
199 # use one or two columns for the layout - not logged in users will see the login prompt
201 # account_query = Query().get('local:account').select('user_id','platform_id','auth_type','config')
202 # account_details = execute_query(self.request, account_query)
203 # for account_detail in account_details:
204 # account_config = json.loads(account_detail['config'])
205 # platform_name = platform_detail['platform']
206 # if 'myslice' in platform_detail['platform']:
207 # acc_user_cred = account_config.get('delegated_user_credential','N/A')
208 # acc_slice_cred = account_config.get('delegated_slice_credentials','N/A')
209 # acc_auth_cred = account_config.get('delegated_authority_credentials','N/A')
211 # if 'N/A' not in acc_user_cred:
212 # exp_date = re.search('<expires>(.*)</expires>', acc_user_cred)
214 # user_exp_date = exp_date.group(1)
215 # user_cred_exp_list.append(user_exp_date)
217 # my_users = [{'cred_exp': t[0]}
218 # for t in zip(user_cred_exp_list)]
221 # if 'N/A' not in acc_slice_cred:
222 # for key, value in acc_slice_cred.iteritems():
223 # slice_list.append(key)
224 # # get cred_exp date
225 # exp_date = re.search('<expires>(.*)</expires>', value)
227 # exp_date = exp_date.group(1)
228 # slice_cred_exp_list.append(exp_date)
230 # my_slices = [{'slice_name': t[0], 'cred_exp': t[1]}
231 # for t in zip(slice_list, slice_cred_exp_list)]
233 # if 'N/A' not in acc_auth_cred:
234 # for key, value in acc_auth_cred.iteritems():
235 # auth_list.append(key)
237 # exp_date = re.search('<expires>(.*)</expires>', value)
239 # exp_date = exp_date.group(1)
240 # auth_cred_exp_list.append(exp_date)
243 return render_to_response(self.template, env, context_instance=RequestContext(request))