Merge branch 'onelab' of ssh://git.onelab.eu/git/myslice into onelab
[myslice.git] / portal / managementtabrequests.py
1 from django.template                 import RequestContext
2 from django.shortcuts                import render_to_response
3
4 from manifold.core.query             import Query, AnalyzedQuery
5 from manifoldapi.manifoldapi         import execute_query
6
7 from django.views.generic.base      import TemplateView
8
9 from unfold.loginrequired           import LoginRequiredView
10 from django.http                    import HttpResponse
11 from django.shortcuts               import render
12
13 from manifold.core.query            import Query, AnalyzedQuery
14 from manifoldapi.manifoldapi        import execute_query
15
16 from portal.actions                 import get_requests
17
18 from myslice.theme import ThemeView
19
20 import json
21
22 class ManagementRequestsView (LoginRequiredView, ThemeView):
23     template_name = "management-tab-requests.html"
24     
25     def get_context_data(self, **kwargs):
26        
27         ctx_my_authorities = {}
28         ctx_delegation_authorities = {}
29         ctx_sub_authorities = {}
30         dest = {}
31
32
33         # The user need to be logged in
34         if (self.request.user):
35            
36             user_query = Query().get('local:user').filter_by('email', '==', self.request.user.email).select('user_id')
37             user, = execute_query(self.request, user_query)
38             user_id = user['user_id']
39
40             # Query manifold to learn about available SFA platforms for more information
41             # In general we will at least have the portal
42             # For now we are considering all registries
43             all_authorities = []
44             platform_ids = []
45             sfa_platforms_query = Query().get('local:platform').filter_by('gateway_type', '==', 'sfa').select('platform_id', 'platform', 'auth_type')
46             sfa_platforms = execute_query(self.request, sfa_platforms_query)
47             for sfa_platform in sfa_platforms:
48                 print "SFA PLATFORM > ", sfa_platform['platform']
49                 if not 'auth_type' in sfa_platform:
50                     continue
51                 auth = sfa_platform['auth_type']
52                 if not auth in all_authorities:
53                     all_authorities.append(auth)
54                 platform_ids.append(sfa_platform['platform_id'])
55
56             print "W: Hardcoding platform myslice"
57             # There has been a tweak on how new platforms are referencing a
58             # so-called 'myslice' platform for storing authentication tokens.
59             # XXX This has to be removed in final versions.
60             myslice_platforms_query = Query().get('local:platform').filter_by('platform', '==', 'myslice').select('platform_id')
61             myslice_platforms = execute_query(self.request, myslice_platforms_query)
62             if myslice_platforms:
63                 myslice_platform, = myslice_platforms
64                 platform_ids.append(myslice_platform['platform_id'])
65
66             # We can check on which the user has authoritity credentials = PI rights
67             credential_authorities = set()
68             credential_authorities_expired = set()
69
70             # User account on these registries
71             user_accounts_query = Query.get('local:account').filter_by('user_id', '==', user_id).filter_by('platform_id', 'included', platform_ids).select('auth_type', 'config')
72             user_accounts = execute_query(self.request, user_accounts_query)
73             
74             for user_account in user_accounts:
75
76                 if user_account['auth_type'] == 'reference':
77                     continue # we hardcoded the myslice platform...
78
79                 config = json.loads(user_account['config'])
80                 creds = []
81                 if 'authority_credentials' in config:
82                     for authority_hrn, credential in config['authority_credentials'].items():
83                         credential_authorities.add(authority_hrn)
84                 if 'delegated_authority_credentials' in config:
85                     for authority_hrn, credential in config['delegated_authority_credentials'].items():
86                         credential_authorities.add(authority_hrn)
87
88             # ** Where am I a PI **
89             # For this we need to ask SFA (of all authorities) = PI function
90             pi_authorities_query = Query.get('myslice:user').filter_by('user_hrn', '==', '$user_hrn').select('pi_authorities')
91             pi_authorities_tmp = execute_query(self.request, pi_authorities_query)
92             pi_authorities = set()
93             try:
94                 for pa in pi_authorities_tmp:
95                     pi_authorities |= set(pa['pi_authorities'])
96             except:
97                 print 'No pi_authorities'
98
99             pi_credential_authorities = pi_authorities & credential_authorities
100             pi_no_credential_authorities = pi_authorities - credential_authorities - credential_authorities_expired
101             pi_expired_credential_authorities = pi_authorities & credential_authorities_expired
102             # Authorities I've been delegated PI rights
103             pi_delegation_credential_authorities = credential_authorities - pi_authorities
104             pi_delegation_expired_authorities = credential_authorities_expired - pi_authorities
105
106             # Summary intermediary
107             pi_my_authorities = pi_credential_authorities | pi_no_credential_authorities | pi_expired_credential_authorities
108             pi_delegation_authorities = pi_delegation_credential_authorities | pi_delegation_expired_authorities
109
110             # Summary all
111             queried_pending_authorities = pi_my_authorities | pi_delegation_authorities #| pi_subauthorities
112
113             # iterate on the requests and check if the authority matches a prefix 
114             # startswith an authority on which the user is PI
115             if len(pi_my_authorities)>0:
116                 requests = get_requests(pi_my_authorities)
117             else:
118                 requests = get_requests()
119             for r in requests:
120                 auth_hrn = r['authority_hrn']
121                 for my_auth in pi_my_authorities: 
122                     if auth_hrn.startswith(my_auth):
123                         dest = ctx_my_authorities
124                         r['allowed'] = 'allowed'
125
126                 #for my_auth in pi_delegation_authorities:
127                 #    if auth_hrn.startswith(my_auth):
128                 #        dest = ctx_delegation_authorities
129                 #        r['allowed'] = 'allowed'
130                 if auth_hrn in pi_expired_credential_authorities:
131                     r['allowed'] = 'expired'
132                 if 'allowed' not in r:
133                     ## TEMP FIX for allowing new authority registration
134                     #r['allowed'] = 'denied'
135                     r['allowed'] = 'allowed'
136
137                 if not auth_hrn in dest:
138                     dest[auth_hrn] = []
139                 dest[auth_hrn].append(r)
140                 
141               
142 #         env = {}
143 #         env['my_authorities']   = ctx_my_authorities
144 #         env['sub_authorities']   = ctx_sub_authorities
145 #         env['delegation_authorities'] = ctx_delegation_authorities
146
147 #         # XXX This is repeated in all pages
148 #         # more general variables expected in the template
149 #         # the menu items on the top
150 #         #env['topmenu_items'] = topmenu_items_live('Validation', page) 
151 #         # so we can sho who is logged
152 #         env['username'] = request.user
153 #         env['pi'] = "is_pi"       
154 #         env['theme'] = self.theme
155 #         env['section'] = "Requests"
156         
157         context = super(ManagementRequestsView, self).get_context_data(**kwargs)
158         
159             
160         context['my_authorities']   = ctx_my_authorities
161         context['sub_authorities']   = ctx_sub_authorities
162         context['delegation_authorities'] = ctx_delegation_authorities
163
164         # XXX This is repeated in all pages
165         # more general variables expected in the template
166         context['title'] = 'Test view that combines various plugins'
167         # the menu items on the top
168         #context['topmenu_items'] = topmenu_items_live('Validation', page) 
169         # so we can sho who is logged
170         context['username'] = self.request.user 
171         context['pi'] = "is_pi"       
172         context['theme'] = self.theme
173         context['section'] = "Requests"
174         # XXX We need to prepare the page for queries
175         #context.update(page.prelude_env())
176
177         return context
178     
179         #return render_to_response(self.template, env, context_instance=RequestContext(request))