FIX: pending_authority validation error and add authority password length
[unfold.git] / portal / actions.py
1 from django.http                    import HttpResponse
2 from manifold.core.query            import Query
3 from manifoldapi.manifoldapi        import execute_query,execute_admin_query
4 from portal.models                  import PendingUser, PendingSlice, PendingAuthority, PendingProject, PendingJoin
5 from unfold.page                    import Page
6
7 import json
8
9 from django.contrib.auth.models     import User
10 from django.contrib.auth            import get_user_model
11 from django.template.loader         import render_to_string
12 from django.core.mail               import EmailMultiAlternatives, send_mail
13
14 from myslice.theme                  import ThemeView
15 from myslice.configengine           import ConfigEngine
16
17 from myslice.settings import logger
18
19 theme = ThemeView()
20
21 import activity.slice
22
23 # Thierry: moving this right into the code so 
24 # most people can use myslice without having to install sfa
25 # XXX tmp sfa dependency, should be moved to SFA gateway
26 #from sfa.util.xrn                import Xrn 
27
28 def get_myslice_platform(request):
29     platform_query  = Query().get('local:platform').select('platform_id','platform','gateway_type','disabled','config').filter_by('platform','==','myslice')
30     platform_details = execute_query(request, platform_query)
31     if isinstance(platform_details,list):
32         for platform_detail in platform_details:
33             return platform_detail
34     else:
35         return None
36
37 def get_myslice_account(request):
38     try:
39         platform_myslice = get_myslice_platform(request)
40         account_query  = Query().get('local:account').select('user_id','platform_id','auth_type','config').filter_by('platform_id','==',platform_myslice['platform_id'])
41         account_details = execute_query(request, account_query)
42         for account_detail in account_details:
43             return account_detail
44     except Exception as e:
45         print e
46         return None
47
48 def get_registry_url(request):
49     try:
50         platform_detail = get_myslice_platform(request)
51         platform_config = json.loads(platform_detail['config'])
52         import socket
53         hostname = socket.gethostbyaddr(socket.gethostname())[0]
54         registry = platform_config.get('registry','N/A')
55         if 'localhost' in registry:
56             port = registry.split(':')[-1:][0]
57             registry = "http://" + hostname +':'+ port
58         return registry
59     except Exception as e:
60         print e
61         return None
62
63 def get_jfed_identity(request):
64     try:
65         account_detail = get_myslice_account(request)
66         account_config = json.loads(account_detail['config'])
67         if 'user_private_key' in account_config:
68             private_key = account_config['user_private_key']
69             user_hrn = account_config.get('user_hrn','N/A')
70             platform_detail = get_myslice_platform(request)
71             registry = get_registry_url(request)
72             #registry = 'http://sfa-fed4fire.pl.sophia.inria.fr:12345/'
73             jfed_identity = user_hrn + '\n' + registry + '\n' + private_key 
74             return jfed_identity
75         else:
76             return None
77     except Exception as e:
78         print e
79         return None
80
81 # Get the list of pis in a given authority
82 def authority_get_pis(request, authority_hrn):
83     # CACHE PB with fields
84     page = Page(request)
85     metadata = page.get_metadata()
86     auth_md = metadata.details_by_object('authority')
87     auth_fields = [column['name'] for column in auth_md['column']]
88
89     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
90     query = Query.get('myslice:authority').filter_by('authority_hrn', '==', authority_hrn).select(auth_fields)
91     results = execute_admin_query(request, query)
92     #print "authority_get_pis = %s" % results
93     # NOTE: temporarily commented. Because results is giving empty list. 
94     # Needs more debugging
95     #if not results:
96     #    raise Exception, "Authority not found: %s" % authority_hrn
97     #result, = results
98     #return result['pi_users']
99     return results
100
101 #check the user is pi or not in the registry
102 def authority_check_pis(request, user_email):
103     try:
104         user_query  = Query().get('local:user').filter_by('email', '==', user_email).select('user_id','email','password','config')
105         user_details = execute_admin_query(request, user_query)
106     
107         # getting the authority_hrn
108         for user_detail in user_details:
109             user_id = user_detail['user_id']
110             if user_detail['config']:
111                 config = json.loads(user_detail['config'])
112                 authority_hrn = config.get('authority','Unknown Authority')
113  
114         account_query  = Query().get('local:account').filter_by('user_id', '==', user_id).select('user_id','platform_id','auth_type','config')
115         account_details = execute_admin_query(request, account_query)
116     
117         platform_query  = Query().get('local:platform').select('platform_id','platform')
118         platform_details = execute_admin_query(request, platform_query)
119     
120         for account_detail in account_details:
121             for platform_detail in platform_details:
122                 if platform_detail['platform_id'] == account_detail['platform_id']:
123                     if 'myslice' in platform_detail['platform']:
124                         account_config = json.loads(account_detail['config'])
125                         user_hrn = account_config.get('user_hrn','N/A')
126
127         pi_status = False
128         pis = authority_get_pis (request, authority_hrn)
129         for pi in pis:
130             pi_list = pi['pi_users']
131
132         if user_hrn in pi_list:
133             pi_status = True
134         return pi_status
135
136     except Exception as e:
137         logger.error("Exception in actions.py in authority_check_pis {}".format(e))
138         return None
139
140
141 def authority_add_pis(request, authority_hrn, user_hrn):
142     try:
143         pi_list = []
144         # getting pis of the authority of the user
145         pis = authority_get_pis (request, authority_hrn)
146         for pi in pis:
147             pi_list = pi['pi_users']
148    
149         updated_pi_list = pi_list.append(user_hrn) 
150         query = Query.update('myslice:authority').filter_by('authority_hrn', '==', authority_hrn).set({'pi_users':pi_list})
151         results = execute_query(request,query)
152         newpis = authority_get_pis (request, authority_hrn)
153        
154         # Add the user to the slices of the project he/she joined
155         if len(authority_hrn.split('.')) > 2:
156             # this authority_hrn is a project
157             query_slices = Query.get('myslice:slice').filter_by('parent_authority', '==', authority_hrn).select('slice_hrn')
158             results_slices = execute_query(request,query_slices)
159             for s in results_slices:
160                 sfa_add_user_to_slice(request, user_hrn, s['slice_hrn'])
161         # Clear Credentials of the user 
162         user_email = get_user_email(request, user_hrn)
163         clear_user_creds(request, user_email)
164
165         return newpis
166     except Exception as e: 
167         logger.error("Exception in actions.py in authority_add_pis {}".format(e))
168         raise Exception, "Exception in actions.py in authority_add_pis {}".format(e)
169
170 def authority_remove_pis(request, authority_hrn, user_hrn):
171     try:
172         pi_list = []
173         # getting pis of the authority of the user
174         pis = authority_get_pis (request, authority_hrn)
175         for pi in pis:
176             pi_list = pi['pi_users']
177  
178         updated_pi_list = pi_list.remove(user_hrn) 
179         query = Query.update('myslice:authority').filter_by('authority_hrn', '==', authority_hrn).set({'pi_users':pi_list})
180         results = execute_query(request,query)
181         newpis = authority_get_pis (request, authority_hrn)
182
183         # Remove the user from the slices of the project he/she left
184         if len(authority_hrn.split('.')) > 2:
185             # this authority_hrn is a project
186             query_slices = Query.get('myslice:slice').filter_by('parent_authority', '==', authority_hrn).select('slice_hrn')
187             results_slices = execute_query(request,query_slices)
188             for s in results_slices:
189                 print 'remove from slice %s' % s
190                 sfa_remove_user_from_slice(request, user_hrn, s['slice_hrn'])
191
192         # Clear Credentials of the user 
193         user_email = get_user_email(request, user_hrn)
194         clear_user_creds(request, user_email)
195
196         return newpis
197     except Exception as e: 
198         logger.error("Exception in actions.py in authority_remove_pis {}".format(e))
199         raise Exception, "Exception in actions.py in authority_remove_pis {}".format(e)
200
201
202 def authority_get_pi_emails(request, authority_hrn):
203     pi_users = authority_get_pis(request,authority_hrn)
204     logger.info("pi_users = %s" % pi_users)
205
206     if any(pi['pi_users'] == None or not pi['pi_users']  for pi in pi_users):
207         #theme.template_name = 'email_default_recipients.txt' 
208         #default_email = render_to_string(theme.template, request)
209         #default_email = default_email.replace('\n', '')
210         #return default_email
211         # the above doesn't work
212         return ['support@onelab.eu']
213     else:
214         pi_user_hrns = [ hrn for x in pi_users for hrn in x['pi_users'] ]
215
216         # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
217         query = Query.get('myslice:user').filter_by('user_hrn', 'included', pi_user_hrns).select('user_email')
218         results = execute_admin_query(request, query)
219         return [result['user_email'] for result in results]
220
221 def get_user_email(request, user_hrn):
222     query = Query.get('myslice:user').filter_by('user_hrn', '==', user_hrn).select('user_email')
223     results = execute_admin_query(request, query)
224     return results[0]['user_email'] 
225
226 #clear user credentials
227 def clear_user_creds(request, user_email):
228     try:
229         user_query  = Query().get('local:user').filter_by('email', '==', user_email).select('user_id','email','password','config')
230         user_details = execute_admin_query(request, user_query)
231     
232         # getting the user_id from the session
233         for user_detail in user_details:
234             user_id = user_detail['user_id']
235             user_email = user_detail['email']
236     
237         account_query  = Query().get('local:account').filter_by('user_id', '==', user_id).select('user_id','platform_id','auth_type','config')
238         account_details = execute_admin_query(request, account_query)
239     
240         platform_query  = Query().get('local:platform').select('platform_id','platform')
241         platform_details = execute_admin_query(request, platform_query)
242     
243         for account_detail in account_details:
244             for platform_detail in platform_details:
245                 if platform_detail['platform_id'] == account_detail['platform_id']:
246                     if 'myslice' in platform_detail['platform']:
247                         account_config = json.loads(account_detail['config'])
248                         #user_cred = account_config.get('delegated_user_credential','N/A')
249                         user_cred = account_config.get('user_credential','N/A')
250                         if 'N/A' not in user_cred:
251                             user_hrn = account_config.get('user_hrn','N/A')
252                             user_pub_key = json.dumps(account_config.get('user_public_key','N/A'))
253                             user_priv_key = json.dumps(account_config.get('user_private_key','N/A'))
254                             updated_config = '{"user_public_key":'+ user_pub_key + ', "user_private_key":'+ user_priv_key + ', "user_hrn":"'+ user_hrn + '"}'
255                             user_params = { 'config': updated_config}
256                             manifold_update_account(request, user_id,user_params)
257                             return user_email
258                         else:
259                             return None
260
261     except Exception as e:
262         logger.error("Exception in actions.py in clear_user_creds {}".format(e))
263         return None
264
265 def is_pi(wsgi_request, user_hrn, authority_hrn):
266     # authorities from user where user_hrn == "ple.upmc.jordan_auge"
267     logger.debug("#### actions.py is_pi authority_hrn = {}".format(authority_hrn))
268     try:
269         # CACHE PB with fields
270         page = Page(wsgi_request)
271         metadata = page.get_metadata()
272         user_md = metadata.details_by_object('user')
273         user_fields = [column['name'] for column in user_md['column']]
274         
275         # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
276         query  = Query().get('myslice:user').select(user_fields).filter_by('user_hrn','==',user_hrn)
277         #query = Query.get('myslice:user').filter_by('user_hrn', '==', user_hrn).select('pi_authorities')
278         results = execute_query(wsgi_request, query)
279         for user_detail in results:
280             if authority_hrn in user_detail['pi_authorities']:
281                 return True
282     except Exception as e:
283         logger.error("Exception in actions.py in is_pi {}".format(e))
284     return False
285     
286 # SFA get record
287
288 def sfa_get_user(request, user_hrn, pub=None):
289
290     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
291     query_sfa_user = Query.get('myslice:user').filter_by('user_hrn', '==', user_hrn)
292     result_sfa_user = execute_admin_query(request, query_sfa_user)
293     return result_sfa_user[0]                        
294
295 def sfa_update_user(request, user_hrn, user_params):
296     # user_params: keys [public_key] 
297     if 'email' in user_params:
298         user_params['user_email'] = user_params['email']
299
300     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
301     query = Query.update('myslice:user').filter_by('user_hrn', '==', user_hrn).set(user_params).select('user_hrn')
302     results = execute_admin_query(request,query)
303     return results
304
305 def sfa_add_authority(request, authority_params):
306
307     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
308     query = Query.create('myslice:authority').set(authority_params).select('authority_hrn')
309     results = execute_query(request, query)
310     logger.info("sfa_add_auth results={}".format(results))
311     if not results:
312         raise Exception, "Could not create %s. Already exists ?" % authority_params['hrn']
313     return results
314
315 def sfa_add_user_to_slice(request, user_hrn, slice_hrn):
316 # UPDATE myslice:slice SET users = ['fed4fire.upmc.loic_baron', 'fed4fire.upmc.mohammed-yasin_rahman', 'fed4fire.upmc.demo'] WHERE slice_hrn == 'fed4fire.upmc.project_y.test_under' SELECT slice_hrn, slice_urn
317     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
318     query_current_users = Query.get('myslice:slice').select('users').filter_by('slice_hrn','==',slice_hrn)
319     results_current_users = execute_query(request, query_current_users)
320     current_users = list()
321     for r in results_current_users:
322         current_users.extend(r['users'])
323     users = list(set([user_hrn]) | set(current_users))
324
325     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
326     query = Query.update('myslice:slice').filter_by('slice_hrn', '==', slice_hrn).set({'users':users}).select('slice_hrn')
327     results = execute_query(request, query)
328 # Also possible but not supported yet
329 # UPDATE myslice:user SET slice=['ple.upmc.agent','ple.upmc.myslicedemo','ple.upmc.tophat'] where user_hrn=='ple.upmc.azerty'
330     if not results:
331         raise Exception, "Could not add user %s to slice %s" % (user_hrn, slice_hrn)
332     return results
333
334 def sfa_remove_user_from_slice(request, user_hrn, slice_hrn):
335 # UPDATE myslice:slice SET users = ['fed4fire.upmc.loic_baron', 'fed4fire.upmc.demo'] WHERE slice_hrn == 'fed4fire.upmc.project_y.test_under' SELECT slice_hrn, slice_urn
336     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
337     query_current_users = Query.get('myslice:slice').select('users').filter_by('slice_hrn','==',slice_hrn)
338     results_current_users = execute_query(request, query_current_users)
339     current_users = list()
340     for r in results_current_users:
341         current_users.extend(r['users'])
342     if user_hrn in current_users:
343         current_users.remove(user_hrn)
344
345     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
346     query = Query.update('myslice:slice').filter_by('slice_hrn', '==', slice_hrn).set({'users':current_users}).select('slice_hrn')
347     results = execute_query(request, query)
348 # Also possible but not supported yet
349 # UPDATE myslice:user SET slice=['ple.upmc.agent','ple.upmc.myslicedemo','ple.upmc.tophat'] where user_hrn=='ple.upmc.azerty'
350     if not results:
351         raise Exception, "Could not remove user %s to slice %s" % (user_hrn, slice_hrn)
352     return results
353
354 # Propose hrn
355
356 def manifold_add_user(wsgi_request, request):
357     """Add a Manifold user corresponding to a user request.
358
359     Args:
360         wsgi_request: a WSGIRequest instance
361         request (dict): a dictionary containing the user request built from the
362             form.
363
364     Returns:
365         The user_id of the inserted user.
366
367     Raises:
368         ?
369     
370     """
371     USER_CONFIG = '{"firstname": "%(first_name)s", "lastname": "%(last_name)s", "authority": "%(authority_hrn)s"}'
372
373     user_params = {
374         'email'     : request['email'],
375         'password'  : request['password'],
376         'config'    : USER_CONFIG % request,
377         'status'    : 1,
378     }
379
380     query = Query.create('local:user').set(user_params).select('email')
381     results = execute_admin_query(request, query)
382     if not results:
383         raise Exception, "Failed creating manifold user: %s" % user_params['email']
384     result = results[0]
385     return result['email']
386
387 def manifold_update_user(request, email, user_params):
388     # user_params: password, config e.g., 
389     query = Query.update('local:user').filter_by('email', '==', email).set(user_params).select('email')
390     results = execute_admin_query(request,query)
391     # NOTE: results remains empty and goes to Exception. However, it updates the manifold DB.
392     # That's why I commented the exception part. -- Yasin 
393     #if not results:
394     #    raise Exception, "Failed updating manifold user: %s" % user_params['email']
395     #result, = results
396     return results
397
398 def manifold_add_account(request, account_params):
399     query = Query.create('local:account').set(account_params).select(['user', 'platform'])
400     results = execute_admin_query(request,query)
401     if not results:
402         raise Exception, "Failed creating manifold account on platform %s for user: %s" % (account_params['platform'], account_params['user'])
403     result, = results
404     return result['user_id']
405
406 def manifold_update_account(request,user_id,account_params):
407     # account_params: config
408     query = Query.update('local:account').filter_by('platform', '==', 'myslice').filter_by('user_id', '==', user_id).set(account_params).select('user_id')
409     results = execute_admin_query(request,query)
410     return results
411
412 #explicitly mention the platform_id
413 def manifold_delete_account(request, user_id, platform_id = None):
414     query = Query.delete('local:account').filter_by('user_id', '==', user_id)
415     if platform_id is not None:
416         query.filter_by('platform_id', '==', platform_id)
417     results = execute_admin_query(request,query)
418     return results
419
420 def manifold_delete_user(request, user_id):
421     query = Query.delete('local:user').filter_by('user_id', '==', user_id).select('user_id')
422     results = execute_admin_query(request,query)
423     return results
424
425
426 #not tested
427 def manifold_add_platform(request, platform_params):
428     query = Query.create('local:platform').set(platform_params).select(['user', 'platform'])
429     results = execute_admin_query(request,query)
430     if not results:
431         raise Exception, "Failed creating manifold platform %s for user: %s" % (platform_params['platform'], platform_params['user'])
432     result, = results
433     return result['platform_id']
434
435 def delete_local_user(wsgi_request, user_email):
436     user_query = Query().get('local:user') \
437         .filter_by('email', '==', user_email)           \
438         .select('user_id','config')
439     user = execute_admin_query(wsgi_request, user_query)
440     if len(user) == 0:
441         return False
442         #raise Exception, "User not found, check local DB"
443     else:
444         user_id = user[0]['user_id']
445         user_config = json.loads(user[0]['config'])
446         authority_hrn = user_config.get('authority', None)
447         
448         if is_pi(wsgi_request, '$user_hrn', authority_hrn):
449             # removing from Django auth_user
450             UserModel = get_user_model()
451             UserModel._default_manager.filter(email__iexact = user_email).delete()
452
453             # removing manifold account
454             manifold_delete_account(wsgi_request, user_id)           
455                      
456             # removing manifold user
457             manifold_delete_user(wsgi_request, user_id)
458         else:
459             return False
460             #raise Exception, "No sufficient rights on authority = ",authority_hrn
461
462     return True      
463
464
465 def make_request_user(user):
466     request = {}
467     request['type']          = 'user'
468     request['id']            = user.id
469     request['timestamp']     = user.created # XXX in DB ?
470     request['authority_hrn'] = user.authority_hrn
471     request['first_name']    = user.first_name
472     request['last_name']     = user.last_name
473     request['email']         = user.email
474     request['login']         = user.login
475     request['user_hrn']      = user.user_hrn
476     request['public_key']    = user.public_key
477     request['private_key']   = user.private_key
478     return request
479
480 def make_request_slice(slice):
481     request = {}
482     request['type'] = 'slice'
483     request['id'] = slice.id
484     request['user_hrn'] = slice.user_hrn
485     request['timestamp'] = slice.created
486     request['authority_hrn'] = slice.authority_hrn
487     request['slice_name'] = slice.slice_name
488     request['number_of_nodes'] = slice.number_of_nodes
489     request['type_of_nodes'] = slice.type_of_nodes
490     request['purpose'] = slice.purpose
491     return request
492
493 def make_request_project(project):
494     request = {}
495     request['type'] = 'project'
496     request['id'] = project.id
497     request['user_hrn'] = project.user_hrn
498     request['email'] = project.email
499     request['timestamp'] = project.created
500     request['authority_hrn'] = project.authority_hrn
501     request['project_name'] = project.project_name
502     request['purpose'] = project.purpose
503     return request
504
505 def make_request_join(join):
506     request = {}
507     request['type'] = 'join'
508     request['id'] = join.id
509     request['user_hrn'] = join.user_hrn
510     request['email'] = join.email
511     request['timestamp'] = join.created
512     request['authority_hrn'] = join.authority_hrn
513     request['project_name'] = join.project_name
514     return request
515
516 def make_request_authority(authority):
517     request = {}
518     request['type']                  = 'authority'
519     request['id']                    = authority.id
520     request['site_name']             = authority.site_name
521     request['site_latitude']         = authority.site_latitude
522     request['site_longitude']        = authority.site_longitude
523     request['site_url']              = authority.site_url
524     request['site_authority']        = authority.site_authority
525     request['site_abbreviated_name'] = authority.site_abbreviated_name
526     request['address_line1']         = authority.address_line1
527     request['address_line2']         = authority.address_line2
528     request['address_line3']         = authority.address_line3
529     request['address_city']          = authority.address_city
530     request['address_postalcode']    = authority.address_postalcode
531     request['address_state']         = authority.address_state
532     request['address_country']       = authority.address_country
533     request['authority_hrn']         = authority.authority_hrn
534     request['timestamp']             = authority.created
535     return request
536
537 def make_requests(pending_users, pending_slices, pending_authorities, pending_projects, pending_joins):
538     logger.info("$$$$$$$$$$$$$$$  make_request")
539     requests = []
540     for user in pending_users:
541         requests.append(make_request_user(user))
542     for slice in pending_slices:
543         requests.append(make_request_slice(slice))
544     for authority in pending_authorities:
545         requests.append(make_request_authority(authority))
546     for project in pending_projects:
547         requests.append(make_request_project(project))
548     for join in pending_joins:
549         requests.append(make_request_join(join))
550     return requests   
551
552 def get_request_by_id(ids):
553     logger.info("$$$$$$$$$$$$$$$$  get_request_by_id")
554     sorted_ids = { 'user': [], 'slice': [], 'authority': [], 'project': [], 'join': [] }
555     for type__id in ids:
556         type, id = type__id.split('__')
557         sorted_ids[type].append(id)
558         
559     if not ids:
560         pending_users  = PendingUser.objects.all()
561         pending_slices = PendingSlice.objects.all()
562         pending_authorities = PendingAuthority.objects.all()
563         pending_projects = PendingProject.objects.all()
564         pending_joins = PendingJoin.objects.all()
565     else:
566         pending_users  = PendingUser.objects.filter(id__in=sorted_ids['user']).all()
567         pending_slices = PendingSlice.objects.filter(id__in=sorted_ids['slice']).all()
568         pending_authorities = PendingAuthority.objects.filter(id__in=sorted_ids['authority']).all()
569         pending_projects = PendingProject.objects.filter(id__in=sorted_ids['project']).all()
570         pending_joins = PendingJoin.objects.filter(id__in=sorted_ids['join']).all()
571
572     return make_requests(pending_users, pending_slices, pending_authorities, pending_projects, pending_joins)
573
574 def get_requests(authority_hrns=None):
575     logger.info("$$$$$$$$$$$$$   get_request_by_authority auth_hrns = {}".format(authority_hrns))
576     if not authority_hrns:
577         ## get those pending users who have confirmed their emails
578         pending_users  = PendingUser.objects.filter(status__iexact = 'True')
579         pending_slices = PendingSlice.objects.all()
580         pending_authorities = PendingAuthority.objects.all()
581         pending_projects = PendingProject.objects.all()
582         pending_joins = PendingJoin.objects.all()
583     else:
584         pending_users  = PendingUser.objects
585         pending_slices = PendingSlice.objects
586         pending_authorities = PendingAuthority.objects
587         pending_projects = PendingProject.objects
588         pending_joins = PendingJoin.objects
589         from django.db.models import Q
590         list_user_Q = list()
591         list_slice_Q = list()
592         list_auth_Q = list()
593         list_proj_Q = list()
594         list_join_Q = list()
595         for hrn in authority_hrns:
596             list_user_Q.append(Q(authority_hrn__startswith=hrn, status__iexact = 'True'))
597             list_slice_Q.append(Q(authority_hrn__startswith=hrn))
598             list_auth_Q.append(Q(site_authority__startswith=hrn))
599             list_proj_Q.append(Q(authority_hrn__startswith=hrn))
600             list_join_Q.append(Q(authority_hrn__startswith=hrn))
601         from operator import __or__ as OR
602         pending_users        = pending_users.filter(reduce(OR, list_user_Q))
603         pending_slices       = pending_slices.filter(reduce(OR, list_slice_Q))
604         pending_authorities  = pending_authorities.filter(reduce(OR, list_auth_Q))
605         pending_projects     = pending_projects.filter(reduce(OR, list_proj_Q))
606         pending_joins        = pending_joins.filter(reduce(OR, list_join_Q))
607         #pending_authorities  = pending_authorities.all() #filter(reduce(OR, list_Q))
608
609     return make_requests(pending_users, pending_slices, pending_authorities, pending_projects, pending_joins)
610
611 # XXX Is it in sync with the form fields ?
612
613 def portal_validate_request(wsgi_request, request_ids):
614     status = {}
615
616     if not isinstance(request_ids, list):
617         request_ids = [request_ids]
618
619     requests = get_request_by_id(request_ids)
620     for request in requests:
621         # type, id, timestamp, details, allowed -- MISSING: authority_hrn
622         # CAREFUL about details
623         # user  : first name, last name, email, password, keypair
624         # slice : number of nodes, type of nodes, purpose
625         
626         request_status = {}
627         try:
628             if request['type'] == 'user':
629                 create_user(wsgi_request, request)
630                 request_status['SFA user'] = {'status': True }
631                 u = PendingUser.objects.get(id=request['id'])
632                 ctx = {
633                     'first_name'    : u.first_name, 
634                     'last_name'     : u.last_name,
635                     'email'         : u.email,        
636                 }      
637                 user_email = u.email
638
639                 PendingUser.objects.get(id=request['id']).delete()
640
641             elif request['type'] == 'slice':
642                 create_slice(wsgi_request, request)
643                 request_status['SFA slice'] = {'status': True }
644                 s = PendingSlice.objects.get(id=request['id'])
645                 ctx = {
646                     'slice_name'    : s.slice_name, 
647                     'url'           : s.url,
648                     'purpose'       : s.purpose,        
649                     'email'         : s.email,        
650                 }      
651                 user_email = s.email
652
653                 PendingSlice.objects.get(id=request['id']).delete()
654
655                 # Clear user's Credentials
656                 sfa_user = sfa_get_user(wsgi_request, request['user_hrn'])
657                 clear_user_creds(wsgi_request,sfa_user['user_email'])
658
659             elif request['type'] == 'authority':
660                 #hrn = "%s.%s" % (request['authority_hrn'], request['site_authority'])
661                 hrn = request['site_authority']
662                 # XXX tmp sfa dependency
663                 from sfa.util.xrn import Xrn 
664                 urn = Xrn(hrn, request['type']).get_urn()
665                 
666                 # Only hrn is required for Manifold Query 
667                 sfa_authority_params = {
668                     'authority_hrn'        : hrn,
669                     #'authority_urn'        : urn,
670                     #'type'       : request['type'],
671                     #'pi'        : None,
672                     #'enabled'    : True
673                 }
674                 logger.info("ADD Authority")
675                 sfa_add_authority(wsgi_request, sfa_authority_params)
676                 request_status['SFA authority'] = {'status': True }
677                 a = PendingAuthority.objects.get(id=request['id'])
678                 ctx = { 
679                     'site_name'     : a.site_name,
680                     #'short_name'    : a.short_name,
681                     #'url'           : a.url,
682                     'city'          : a.address_city,
683                     'country'       : a.address_country,                          
684                     #'portal_url'    : a.current_site,
685                 }
686                 # address_line1 contains the email of the user in pending_authority table
687                 user_email = a.address_line1
688
689                 PendingAuthority.objects.get(id=request['id']).delete()
690                 
691                 # Clear Admin Cache as it is used to display the list of authorities in Registration page
692                 query = Query.update('myslice:authority').filter_by('authority_hrn', '==', sfa_authority_params['authority_hrn']).set({'authority_hrn':sfa_authority_params['authority_hrn']}).select('authority_hrn')
693                 res = execute_admin_query(request, query)
694
695             elif request['type'] == 'project':
696                 hrn = request['authority_hrn'] + '.' + request['project_name']
697
698                 # Only hrn is required for Manifold Query 
699                 sfa_authority_params = {
700                     'authority_hrn'        : hrn
701                 }
702                 sfa_add_authority(wsgi_request, sfa_authority_params)
703                 
704                 # Add user as a PI of the project
705                 # Clear user's Credentials
706                 authority_add_pis(wsgi_request, hrn , request['user_hrn'])
707
708                 request_status['SFA project'] = {'status': True }
709                 p = PendingProject.objects.get(id=request['id'])
710                 ctx = {
711                     'project_name'  : p.project_name, 
712                     'authority_hrn' : p.authority_hrn,
713                     'email'         : p.email,        
714                     'purpose'       : p.purpose,
715                 }      
716                 user_email = p.email
717
718                 PendingProject.objects.get(id=request['id']).delete()
719
720                 # Clear Admin Cache as it is used to display the list of projects in Slice request page
721                 query = Query.update('myslice:authority').filter_by('authority_hrn', '==', sfa_authority_params['authority_hrn']).set({'authority_hrn':sfa_authority_params['authority_hrn']}).select('authority_hrn')
722                 res = execute_admin_query(request, query)
723
724
725             elif request['type'] == 'join':
726                 # Add user as a PI of the project
727                 # Clear user's Credentials
728                 authority_add_pis(wsgi_request, request['authority_hrn'] , request['user_hrn'])
729
730                 request_status['SFA join'] = {'status': True }
731                 j = PendingJoin.objects.get(id=request['id'])
732                 ctx = {
733                     'project_name'  : j.project_name, 
734                     'authority_hrn' : j.authority_hrn,
735                     'email'         : j.email,        
736                     'user_hrn'      : j.user_hrn,
737                 }      
738                 user_email = j.email
739
740                 PendingJoin.objects.get(id=request['id']).delete()
741             else:
742                 raise Exception, 'unknown type of request %s' % request['type']
743             # XXX Remove from Pendings in database
744
745             send_status_email(wsgi_request, ctx, user_email, request['type'], 'validated')
746         except Exception, e:
747             request_status['SFA '+request['type']] = {'status': False, 'description': str(e)}
748             logger.error('ERROR - actions.py - portal_validate_request: %s' % e)
749             import traceback
750             logger.error(traceback.format_exc())
751
752         status['%s__%s' % (request['type'], request['id'])] = request_status
753
754     return status
755
756 def validate_action(request, **kwargs):
757     ids = filter(None, kwargs['id'].split('/'))
758     status = portal_validate_request(request, ids)
759     json_answer = json.dumps(status)
760     return HttpResponse (json_answer, content_type="application/json")
761
762
763 def reject_action(request, **kwargs):
764     ids = filter(None, kwargs['id'].split('/'))
765     status = portal_reject_request(request, ids)
766     json_answer = json.dumps(status)
767     return HttpResponse (json_answer, content_type="application/json")
768
769 def get_current_site(request):
770     if request.is_secure():
771         current_site = 'https://'
772     else:
773         current_site = 'http://'
774     current_site += request.META['HTTP_HOST']
775     return current_site
776
777 def portal_reject_request(wsgi_request, request_ids):
778     status = {}
779     current_site = get_current_site(wsgi_request)
780     if not isinstance(request_ids, list):
781         request_ids = [request_ids]
782
783     requests = get_request_by_id(request_ids)
784     for request in requests:
785         # type, id, timestamp, details, allowed -- MISSING: authority_hrn
786         # CAREFUL about details
787         # user  : first name, last name, email, password, keypair
788         # slice : number of nodes, type of nodes, purpose
789         
790         request_status = {}
791
792         try:
793             if request['type'] == 'user':
794                 request_status['SFA user'] = {'status': True }
795                 # getting user email based on id 
796                 ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
797                 for user in PendingUser.objects.raw('SELECT * FROM portal_pendinguser WHERE id = %s', [request['id']]):
798                     user_email= user.email
799                     first_name = user.first_name
800                     last_name = user.last_name
801
802                 ctx = {
803                     'first_name'    : first_name, 
804                     'last_name'     : last_name, 
805                     'email'         : user_email,
806                     'portal_url'    : current_site,
807                     }
808
809                 # removing from Django portal_pendinguser
810                 PendingUser.objects.get(id=request['id']).delete()
811                 
812                 delete_local_user(wsgi_request, user_email)
813                           
814             elif request['type'] == 'slice':
815                 request_status['SFA slice'] = {'status': True } 
816
817                 # getting user email based on id 
818                 ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
819                 for user in PendingSlice.objects.raw('SELECT * FROM portal_pendingslice WHERE id = %s', [request['id']]):
820                     user_email= user.type_of_nodes # XXX type_of_nodes field contains the email [shd be renamed in DB]
821                     slice_name = user.slice_name
822                     purpose = user.purpose
823                     url = user.number_of_nodes
824
825                 ctx = {
826                     'slice_name': slice_name,
827                     'purpose': purpose,
828                     'url': url,
829                     'portal_url': current_site,
830                     }
831
832                 PendingSlice.objects.get(id=request['id']).delete()
833
834             elif request['type'] == 'authority':
835                 request_status['SFA authority'] = {'status': True }
836                 
837                 # getting user email based on id 
838                 ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
839                 for user in PendingAuthority.objects.raw('SELECT * FROM portal_pendingauthority WHERE id = %s', [request['id']]):
840                     user_email= user.address_line1 # XXX address_line1 field contains the email [shd be renamed in DB]
841                     site_name = user.site_name
842                     city = user.address_city
843                     country = user.address_country
844                     short_name = user.site_abbreviated_name
845                     url = user.site_url
846
847                 ctx = { 
848                     'site_name': site_name,
849                     'short_name': short_name,
850                     'url': url,
851                     'city': city,
852                     'country': country,                          
853                     'portal_url'    : current_site,
854                     }
855                     
856                 PendingAuthority.objects.get(id=request['id']).delete()
857
858             # XXX TMP we should send an email to the user to inform him/her
859             elif request['type'] == 'project':
860                 request_status['SFA project'] = {'status': True }
861                 p = PendingProject.objects.get(id=request['id'])
862                 ctx = {
863                     'project_name'  : p.project_name, 
864                     'authority_hrn' : p.authority_hrn,
865                     'email'         : p.email,        
866                     'purpose'       : p.purpose,
867                 }      
868                 user_email = p.email
869                 PendingProject.objects.get(id=request['id']).delete()
870
871             elif request['type'] == 'join':
872                 request_status['SFA join'] = {'status': True }
873                 j = PendingJoin.objects.get(id=request['id'])
874                 ctx = {
875                     'project_name'  : j.project_name, 
876                     'authority_hrn' : j.authority_hrn,
877                     'email'         : j.email,        
878                     'user_hrn'      : j.user_hrn,
879                 }      
880
881                 user_email = j.email
882                 PendingJoin.objects.get(id=request['id']).delete()
883             else:
884                 raise Exception, 'unknown type of request %s' % request['type']
885
886             send_status_email(wsgi_request, ctx, user_email, request['type'], 'denied')
887         except Exception, e:
888             request_status['SFA '+request['type']] = {'status': False, 'description': str(e)}
889             logger.error('ERROR - actions.py - portal_reject_request: %s' % e)
890             import traceback
891             logger.error(traceback.format_exc())
892
893         status['%s__%s' % (request['type'], request['id'])] = request_status
894
895     return status
896
897 def send_status_email(request, ctx, user_email, obj_type, status):
898     try:
899         ctx['current_site'] = get_current_site(request)
900         ctx['theme'] = theme
901
902         theme.template_name = obj_type + '_request_' + status + '.txt'
903         text_content = render_to_string(theme.template, ctx)
904         theme.template_name = obj_type + '_request_' + status + '.html'
905         html_content = render_to_string(theme.template, ctx)
906         theme.template_name = 'email_default_sender.txt'
907
908         sender =  render_to_string(theme.template, ctx)
909         sender = sender.replace('\n', '')
910                        
911         subject = obj_type + ' request '+ status +'.'
912     
913         msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
914         msg.attach_alternative(html_content, "text/html")
915         msg.send()
916     except Exception as e:
917         print e
918         logger.error("Failed to send email, please check the mail templates and the SMTP configuration of your server")
919
920
921 # Django and ajax
922 # http://djangosnippets.org/snippets/942/
923
924
925
926 #-------------------------------------------------------------------------------
927 # REQUESTS - Slices
928 #-------------------------------------------------------------------------------
929
930 def create_slice(wsgi_request, request):
931     """
932     Arguments:
933         wsgi_request (~ WSGIRequest) : 
934         request (dict) : the slice request in our own dict format
935
936     Raises:
937         Exception
938     """
939     hrn = "%s.%s" % (request['authority_hrn'], request['slice_name'])
940     # XXX tmp sfa dependency
941     from sfa.util.xrn import Xrn 
942     urn = Xrn(hrn, request['type']).get_urn()
943     
944     # Add User to Slice if we have the user_hrn in pendingslice table
945     user_hrn = request.get('user_hrn', None)
946     user_hrns = list([user_hrn]) if user_hrn else list()
947    
948     # CACHE PB with fields
949     page = Page(wsgi_request)
950     metadata = page.get_metadata()
951     user_md = metadata.details_by_object('user')
952     user_fields = [column['name'] for column in user_md['column']]
953
954     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
955     #user_query  = Query().get('myslice:user').select('user_hrn','user_email').filter_by('user_hrn','==',user_hrn)
956     user_query  = Query().get('myslice:user').select(user_fields).filter_by('user_hrn','==',user_hrn)
957     user_details_sfa = execute_admin_query(wsgi_request, user_query)
958     if not user_details_sfa:
959         raise Exception, "User %s doesn't exist, validate user before validating slice" % user_hrn
960     for user in user_details_sfa:
961         user_email = user['user_email']
962
963     # XXX LOIC Quick fix because this is totally inconsistent
964     if not 'number_of_nodes' in request:
965         request['number_of_nodes']=""
966
967     # Slice is under a project
968     if len(request['authority_hrn'].split('.')) > 2:
969         pi_list = []
970         pis = authority_get_pis(wsgi_request, request['authority_hrn'])
971         for pi in pis:
972             pi_list = pi['pi_users']
973         user_hrns.extend(pi_list)
974
975     # XXX We should create a slice with Manifold terminology
976     slice_params = {
977         'slice_hrn'        : hrn, 
978         'slice_urn'        : urn,
979         'slice_type'       : request['type'],
980         'url'              : request['number_of_nodes'],
981         'users'            : user_hrns,
982         'slice_enabled'    : True
983     }
984     # ignored in request: id, timestamp,  number_of_nodes, type_of_nodes, purpose
985
986     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
987     query = Query.create('myslice:slice').set(slice_params).select('slice_hrn')
988     results = execute_query(wsgi_request, query)
989     if not results:
990         raise Exception, "Could not create %s. Already exists ?" % slice_params['hrn']
991     else:
992         try:
993             for u_hrn in user_hrns:
994                 u_email = get_user_email(wsgi_request, u_hrn)
995                 clear_user_creds(wsgi_request, u_email)
996         except Exception as e:
997             logger.error("Failed clear credentials for all users")
998             clear_user_creds(wsgi_request,user_email)
999         # log user activity
1000         activity.slice.validate(request, { "slice" : hrn })
1001        
1002     return results
1003
1004 def create_pending_slice(wsgi_request, request, email):
1005     """
1006     """
1007
1008     # Insert an entry in the PendingSlice table
1009     s = PendingSlice(
1010         slice_name      = request['slice_name'],
1011         user_hrn        = request['user_hrn'],
1012         authority_hrn   = request['authority_hrn'],
1013         number_of_nodes = request['url'], # field needs to be renamed
1014         purpose         = request['purpose'],
1015         type_of_nodes   = request['email'] # field needs to be renamed 
1016     )
1017     s.save()
1018
1019     send_email_to_pis(wsgi_request, request, 'slice')
1020
1021 def create_pending_project(wsgi_request, request):
1022     """
1023     """
1024
1025     # Insert an entry in the PendingProject table
1026     s = PendingProject(
1027         project_name    = request['project_name'],
1028         user_hrn        = request['user_hrn'],
1029         email           = request['email'],
1030         authority_hrn   = request['authority_hrn'],
1031         purpose         = request['purpose'],
1032     )
1033     s.save()
1034
1035     send_email_to_pis(wsgi_request, request, 'project')
1036
1037 def create_pending_join(wsgi_request, request):
1038     """
1039     """
1040
1041     # Insert an entry in the PendingJoin table
1042     s = PendingJoin(
1043         user_hrn        = request['user_hrn'],
1044         email           = request['email'],
1045         project_name    = request['project_name'],
1046         authority_hrn   = request['authority_hrn'],
1047     )
1048     s.save()
1049
1050     send_email_to_pis(wsgi_request, request, 'join')
1051
1052 #-------------------------------------------------------------------------------
1053 # SEND EMAILS
1054 #-------------------------------------------------------------------------------
1055
1056 def send_email_to_pis(request, context, obj_type):
1057     try:
1058         context['current_site'] = get_current_site(request)
1059         context['theme'] = theme
1060         # Send an email: the recipients are the PIs of the authority
1061         recipients = authority_get_pi_emails(request, context['authority_hrn'])
1062
1063         theme.template_name = obj_type + '_request_email.txt' 
1064         text_content = render_to_string(theme.template, context)
1065
1066         theme.template_name = obj_type + '_request_email.html' 
1067         html_content = render_to_string(theme.template, context)
1068
1069         #theme.template_name = obj_type + '_request_email_subject.txt'
1070         #subject = render_to_string(theme.template, request)
1071         #subject = subject.replace('\n', '')
1072         subject = "New "+obj_type+" request"
1073
1074         theme.template_name = 'email_default_sender.txt'
1075         sender =  render_to_string(theme.template, context)
1076         sender = sender.replace('\n', '')
1077
1078         msg = EmailMultiAlternatives(subject, text_content, sender, recipients)
1079         msg.attach_alternative(html_content, "text/html")
1080         msg.send()
1081     except Exception, e:
1082         print e
1083         print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
1084
1085
1086 #-------------------------------------------------------------------------------
1087 # REQUESTS - Users
1088 #-------------------------------------------------------------------------------
1089
1090 def manifold_add_reference_user_accounts(wsgi_request, request):
1091     """When a new user is created, add reference accounts to the reference platform.
1092     """
1093     # XXX XXX XXX The rest of this function has to be checked XXX XXX XXX
1094
1095     # Retrieve user information
1096     user_query  = Query().get('local:user')             \
1097         .select('user_id', 'config', 'email', 'status') \
1098         .filter_by('email', '==', request['email'])
1099     user_details = execute_admin_query(wsgi_request, user_query)
1100
1101     # USER MAIN ACCOUNT != reference
1102     #print 'USER MAIN ACCOUNT != reference'
1103     list_accounts_query = Query().get('local:account')              \
1104         .select('user_id', 'platform_id', 'auth_type', 'config')    \
1105         .filter_by('user_id', '==', user_details[0]['user_id'])     \
1106         .filter_by('auth_type', '!=', 'reference')
1107     list_accounts = execute_admin_query(wsgi_request, list_accounts_query)
1108
1109     # XXX main_platform is being erased several times ???
1110     for account in list_accounts:
1111         main_platform_query = Query().get('local:platform')         \
1112             .select('platform_id', 'platform')                      \
1113             .filter_by('platform_id', '==', account['platform_id'])
1114         main_platform = execute_admin_query(wsgi_request, main_platform_query)
1115
1116     # Add reference accounts on SFA enabled platforms
1117     platforms_query = Query().get('local:platform') \
1118         .filter_by('disabled', '==', '0')           \
1119         .filter_by('gateway_type', '==', 'sfa')     \
1120         .select('platform_id', 'gateway_type')
1121     platforms = execute_admin_query(wsgi_request, platforms_query)
1122     for platform in platforms:
1123         #print "add reference to platform ",platform
1124         manifold_account_params = {
1125             'user_id'       : user_details[0]['user_id'],
1126             'platform_id'   : platform['platform_id'],
1127             'auth_type'     : 'reference',
1128             'config'        : '{"reference_platform": "' + main_platform[0]['platform'] + '"}',
1129         }
1130         manifold_add_account(wsgi_request, manifold_account_params)
1131
1132 def sfa_create_user(wsgi_request, request, namespace = None, as_admin = False):
1133     """
1134     Arguments:
1135         wsgi_request (~ WSGIRequest) : 
1136         request (dict) : the user request in our own dict format
1137
1138     Raises:
1139         Exception
1140     """
1141     from sfa.util.xrn import Xrn 
1142
1143     auth_pi = request.get('pi', None)
1144     auth_pi = list([auth_pi]) if auth_pi else list()
1145
1146     # We create a user request with Manifold terminology
1147     sfa_user_params = {
1148         'user_hrn'          : request['user_hrn'],
1149         'user_email'        : request['email'],
1150         'user_urn'          : Xrn(request['user_hrn'], request['type']).get_urn(),
1151         'user_type'         : request['type'],
1152         'keys'              : request['public_key'],
1153         'user_first_name'   : request['first_name'],
1154         'user_last_name'    : request['last_name'],
1155         'pi_authorities'    : auth_pi,
1156         'user_enabled'      : True
1157     }
1158
1159     if namespace is not None:
1160         query = Query.create('%s:user' % namespace).set(sfa_user_params).select('user_hrn')
1161     else:
1162         # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
1163         query = Query.create('myslice:user').set(sfa_user_params).select('user_hrn')
1164
1165     if as_admin:
1166         results = execute_admin_query(wsgi_request, query)
1167     else:
1168         results = execute_query(wsgi_request, query)
1169
1170     if not results:
1171         raise Exception, "Could not create %s. Already exists ?" % sfa_user_params['user_hrn']
1172
1173     return results
1174
1175 def iotlab_create_user (wsgi_request, request, namespace = None, as_admin=False):
1176    
1177     import requests
1178     import time
1179     from requests.auth import HTTPBasicAuth
1180    
1181     engine = ConfigEngine() 
1182     URL_REST = engine.iotlab_url()
1183     LOGIN_ADMIN = engine.iotlab_admin_user()
1184     PASSWORD_ADMIN = engine.iotlab_admin_password()
1185
1186     auth = HTTPBasicAuth(LOGIN_ADMIN,PASSWORD_ADMIN)
1187     headers = {'content-type': 'application/json'}
1188
1189     for user in PendingUser.objects.raw('SELECT * FROM portal_pendinguser WHERE email = %s', [request['email']]):
1190         password= user.password
1191
1192
1193     iotlab_user_params = {
1194         "type"          : "SA",
1195         #"login"         : request['email'], #auto generated by iotlab
1196         "password"      : password,
1197         "firstName"     : request['first_name'],
1198         "lastName"      : request['last_name'],
1199         "email"         : request['email'],
1200         "structure"     : request['authority_hrn'],
1201         "city"          : "N/A",
1202         "country"       : "N/A",
1203         "sshPublicKey"  : request['public_key'],
1204         "motivations"   : "SFA federation",
1205     }    
1206    
1207     iotlab_user_params1 = json.dumps(iotlab_user_params)
1208     r=requests.post(url=URL_REST, data=iotlab_user_params1, headers=headers, auth=auth)
1209     logger.info('Create iotlab user : {} {}'.format(r.status_code, r.text))
1210     return r.text
1211
1212 def create_user(wsgi_request, request, namespace = None, as_admin = False):
1213     # XXX This has to be stored centrally
1214     USER_STATUS_ENABLED = 2
1215
1216     # NOTE : if we were to create a user directly (just like we create slices,
1217     # we would have to perform the steps in create_pending_user too
1218
1219     # Add the user to the SFA registry
1220     sfa_create_user(wsgi_request, request, namespace, as_admin)
1221
1222     # Update Manifold user status
1223     manifold_update_user(wsgi_request, request['email'], {'status': USER_STATUS_ENABLED})
1224
1225     # Add reference accounts for platforms
1226     manifold_add_reference_user_accounts(wsgi_request, request)
1227
1228     # Add the user to iotlab portal if theme is set to onelab
1229     if theme.theme == 'onelab':
1230         iotlab_create_user (wsgi_request, request)
1231
1232 def create_pending_user(wsgi_request, request, user_detail):
1233     """
1234     """
1235
1236     # Insert an entry in the PendingUser table
1237     b = PendingUser(
1238         first_name    = request['first_name'],
1239         last_name     = request['last_name'],
1240         authority_hrn = request['authority_hrn'],
1241         email         = request['email'],
1242         password      = request['password'],
1243         public_key    = request['public_key'],
1244         private_key   = request['private_key'],
1245         user_hrn      = request['user_hrn'],
1246         pi            = request['pi'],
1247         email_hash    = request['email_hash'],
1248         status        = 'False',
1249     )
1250     b.save()
1251     # sends email to user to activate the email
1252     request['current_site'] = get_current_site(wsgi_request)
1253     request['theme'] = theme
1254     theme.template_name = 'activate_user.html'
1255     html_content = render_to_string(theme.template, request)
1256     theme.template_name = 'activate_user.txt'
1257     text_content = render_to_string(theme.template, request)
1258     theme.template_name = 'activate_user_email_subject.txt'
1259     subject = render_to_string(theme.template, request)
1260     subject = subject.replace('\n', '')
1261     theme.template_name = 'email_default_sender.txt'
1262     sender =  render_to_string(theme.template, request)
1263     sender = sender.replace('\n', '')
1264     recipient = [request['email']]
1265     #recipient = recipient.append(request['email'])
1266
1267     msg = EmailMultiAlternatives(subject, text_content, sender, recipient)
1268     msg.attach_alternative(html_content, "text/html")
1269     msg.send()
1270    
1271     # saves the user to django auth_user table [needed for password reset]
1272     user = User.objects.create_user(request['email'], request['email'], request['password'])
1273
1274     # Creating a manifold user
1275     user_id = manifold_add_user(wsgi_request, request)
1276
1277     # Creating a Manifold account on the MySlice platform
1278     # Note the JSON representation of public and private keys already includes quotes
1279     account_config = {
1280         'user_hrn'          : request['user_hrn'],
1281         'user_public_key'   : request['public_key'],
1282     }
1283     if request['private_key']:
1284         account_config['user_private_key'] = request['private_key']
1285
1286     user_id = user_detail['user_id'] + 1 # the user_id for the newly created user in local:user
1287
1288     # XXX TODO: Require a myslice platform
1289     # ALERT: this will disapear with ROUTERV2 of Manifold
1290     # We have to consider the case where several registries can be used
1291     # Removed hardcoded platform = 5
1292     # This platform == 'myslice' is a TMP FIX !!
1293     try:
1294         reg_platform_query = Query().get('local:platform') \
1295             .filter_by('platform', '==', 'myslice')           \
1296             .select('platform_id')
1297         reg_platform = execute_admin_query(wsgi_request, reg_platform_query)
1298
1299         reg_platform_id = reg_platform[0]['platform_id']
1300         account_params = {
1301             'platform_id'   : reg_platform_id, # XXX ALERT !!
1302             'user_id'       : user_id, 
1303             'auth_type'     : request['auth_type'], 
1304             'config'        : json.dumps(account_config),
1305         }
1306         manifold_add_account(wsgi_request, account_params)
1307
1308     # Email to PIs is sent when the user activates his email
1309     # portal/emailactivationview.py
1310
1311     except Exception as e:
1312         logger.error("Failed creating manifold account on platform {} for user: {}".format('myslice', request['email']))
1313