a96dfd63e0bd9c67a3f84bba6e673373faa147dd
[unfold.git] / portal / actions.py
1 from django.http                    import HttpResponse
2 from manifold.core.query            import Query
3 from manifoldapi.manifoldapi        import execute_query,execute_admin_query
4 from portal.models                  import PendingUser, PendingSlice, PendingAuthority, PendingProject, PendingJoin
5 from unfold.page                    import Page
6
7 import json
8
9 from django.contrib.auth.models     import User
10 from django.contrib.sites.models    import Site
11 from django.contrib.auth            import get_user_model
12 from django.template.loader         import render_to_string
13 from django.core.mail               import EmailMultiAlternatives, send_mail
14
15 from myslice.theme                  import ThemeView
16 from myslice.configengine           import ConfigEngine
17 from myslice.settings               import logger
18
19 theme = ThemeView()
20
21 import activity.slice
22
23 # Thierry: moving this right into the code so 
24 # most people can use myslice without having to install sfa
25 # XXX tmp sfa dependency, should be moved to SFA gateway
26 #from sfa.util.xrn                import Xrn 
27
28 def get_myslice_platform(request):
29     platform_query  = Query().get('local:platform').select('platform_id','platform','gateway_type','disabled','config').filter_by('platform','==','myslice')
30     platform_details = execute_query(request, platform_query)
31     if isinstance(platform_details,list):
32         for platform_detail in platform_details:
33             return platform_detail
34     else:
35         return None
36
37 def get_myslice_account(request):
38     try:
39         platform_myslice = get_myslice_platform(request)
40         account_query  = Query().get('local:account').select('user_id','platform_id','auth_type','config').filter_by('platform_id','==',platform_myslice['platform_id'])
41         account_details = execute_query(request, account_query)
42         for account_detail in account_details:
43             return account_detail
44     except Exception as e:
45         print e
46         return None
47
48 def get_registry_url(request):
49     try:
50         platform_detail = get_myslice_platform(request)
51         platform_config = json.loads(platform_detail['config'])
52         import socket
53         hostname = socket.gethostbyaddr(socket.gethostname())[0]
54         registry = platform_config.get('registry','N/A')
55         if 'localhost' in registry:
56             port = registry.split(':')[-1:][0]
57             registry = "http://" + hostname +':'+ port
58         return registry
59     except Exception as e:
60         print e
61         return None
62
63 def get_jfed_identity(request):
64     try:
65         account_detail = get_myslice_account(request)
66         account_config = json.loads(account_detail['config'])
67         if 'user_private_key' in account_config:
68             private_key = account_config['user_private_key']
69             user_hrn = account_config.get('user_hrn','N/A')
70             platform_detail = get_myslice_platform(request)
71             registry = get_registry_url(request)
72             #registry = 'http://sfa-fed4fire.pl.sophia.inria.fr:12345/'
73             jfed_identity = user_hrn + '\n' + registry + '\n' + private_key 
74             return jfed_identity
75         else:
76             return None
77     except Exception as e:
78         print e
79         return None
80
81 # Get the list of pis in a given authority
82 def authority_get_pis(request, authority_hrn):
83     # CACHE PB with fields
84     page = Page(request)
85     metadata = page.get_metadata()
86     auth_md = metadata.details_by_object('authority')
87     auth_fields = [column['name'] for column in auth_md['column']]
88
89     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
90     query = Query.get('myslice:authority').filter_by('authority_hrn', '==', authority_hrn).select(auth_fields)
91     results = execute_admin_query(request, query)
92     #print "authority_get_pis = %s" % results
93     # NOTE: temporarily commented. Because results is giving empty list. 
94     # Needs more debugging
95     #if not results:
96     #    raise Exception, "Authority not found: %s" % authority_hrn
97     #result, = results
98     #return result['pi_users']
99     return results
100
101 #check the user is pi or not in the registry
102 def authority_check_pis(request, user_email):
103     try:
104         user_query  = Query().get('local:user').filter_by('email', '==', user_email).select('user_id','email','password','config')
105         user_details = execute_admin_query(request, user_query)
106     
107         # getting the authority_hrn
108         for user_detail in user_details:
109             user_id = user_detail['user_id']
110             if user_detail['config']:
111                 config = json.loads(user_detail['config'])
112                 authority_hrn = config.get('authority','Unknown Authority')
113  
114         account_query  = Query().get('local:account').filter_by('user_id', '==', user_id).select('user_id','platform_id','auth_type','config')
115         account_details = execute_admin_query(request, account_query)
116     
117         platform_query  = Query().get('local:platform').select('platform_id','platform')
118         platform_details = execute_admin_query(request, platform_query)
119     
120         for account_detail in account_details:
121             for platform_detail in platform_details:
122                 if platform_detail['platform_id'] == account_detail['platform_id']:
123                     if 'myslice' in platform_detail['platform']:
124                         account_config = json.loads(account_detail['config'])
125                         user_hrn = account_config.get('user_hrn','N/A')
126
127         pi_status = False
128         pis = authority_get_pis (request, authority_hrn)
129         for pi in pis:
130             pi_list = pi['pi_users']
131
132         if user_hrn in pi_list:
133             pi_status = True
134         return pi_status
135
136     except Exception as e:
137         logger.error("Exception in actions.py in authority_check_pis {}".format(e))
138         return None
139
140
141 def authority_add_pis(request, authority_hrn, user_hrn):
142     try:
143         pi_list = []
144         # getting pis of the authority of the user
145         pis = authority_get_pis (request, authority_hrn)
146         for pi in pis:
147             pi_list = pi['pi_users']
148    
149         updated_pi_list = pi_list.append(user_hrn) 
150         query = Query.update('myslice:authority').filter_by('authority_hrn', '==', authority_hrn).set({'pi_users':pi_list})
151         results = execute_query(request,query)
152         newpis = authority_get_pis (request, authority_hrn)
153        
154         # Add the user to the slices of the project he/she joined
155         if len(authority_hrn.split('.')) > 2:
156             # this authority_hrn is a project
157             query_slices = Query.get('myslice:slice').filter_by('parent_authority', '==', authority_hrn).select('slice_hrn')
158             results_slices = execute_query(request,query_slices)
159             for s in results_slices:
160                 sfa_add_user_to_slice(request, user_hrn, s['slice_hrn'])
161         # Clear Credentials of the user 
162         user_email = get_user_email(request, user_hrn)
163         clear_user_creds(request, user_email)
164
165         return newpis
166     except Exception as e: 
167         logger.error("Exception in actions.py in authority_add_pis {}".format(e))
168         raise Exception, "Exception in actions.py in authority_add_pis {}".format(e)
169
170 def authority_remove_pis(request, authority_hrn, user_hrn):
171     try:
172         pi_list = []
173         # getting pis of the authority of the user
174         pis = authority_get_pis (request, authority_hrn)
175         for pi in pis:
176             pi_list = pi['pi_users']
177  
178         updated_pi_list = pi_list.remove(user_hrn) 
179         query = Query.update('myslice:authority').filter_by('authority_hrn', '==', authority_hrn).set({'pi_users':pi_list})
180         results = execute_query(request,query)
181         newpis = authority_get_pis (request, authority_hrn)
182
183         # Remove the user from the slices of the project he/she left
184         if len(authority_hrn.split('.')) > 2:
185             # this authority_hrn is a project
186             query_slices = Query.get('myslice:slice').filter_by('parent_authority', '==', authority_hrn).select('slice_hrn')
187             results_slices = execute_query(request,query_slices)
188             for s in results_slices:
189                 print 'remove from slice %s' % s
190                 sfa_remove_user_from_slice(request, user_hrn, s['slice_hrn'])
191
192         # Clear Credentials of the user 
193         user_email = get_user_email(request, user_hrn)
194         clear_user_creds(request, user_email)
195
196         return newpis
197     except Exception as e: 
198         logger.error("Exception in actions.py in authority_remove_pis {}".format(e))
199         raise Exception, "Exception in actions.py in authority_remove_pis {}".format(e)
200
201
202 def authority_get_pi_emails(request, authority_hrn):
203     pi_users = authority_get_pis(request,authority_hrn)
204     logger.info("pi_users = %s" % pi_users)
205
206     if any(pi['pi_users'] == None or not pi['pi_users']  for pi in pi_users):
207         #theme.template_name = 'email_default_recipients.txt' 
208         #default_email = render_to_string(theme.template, request)
209         #default_email = default_email.replace('\n', '')
210         #return default_email
211         # the above doesn't work
212         return ['support@onelab.eu']
213     else:
214         pi_user_hrns = [ hrn for x in pi_users for hrn in x['pi_users'] ]
215
216         # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
217         query = Query.get('myslice:user').filter_by('user_hrn', 'included', pi_user_hrns).select('user_email')
218         results = execute_admin_query(request, query)
219         return [result['user_email'] for result in results]
220
221 def get_user_email(request, user_hrn):
222     query = Query.get('myslice:user').filter_by('user_hrn', '==', user_hrn).select('user_email')
223     results = execute_admin_query(request, query)
224     return results[0]['user_email'] 
225
226 #clear user credentials
227 def clear_user_creds(request, user_email):
228     try:
229         user_query  = Query().get('local:user').filter_by('email', '==', user_email).select('user_id','email','password','config')
230         user_details = execute_admin_query(request, user_query)
231     
232         # getting the user_id from the session
233         for user_detail in user_details:
234             user_id = user_detail['user_id']
235             user_email = user_detail['email']
236     
237         account_query  = Query().get('local:account').filter_by('user_id', '==', user_id).select('user_id','platform_id','auth_type','config')
238         account_details = execute_admin_query(request, account_query)
239     
240         platform_query  = Query().get('local:platform').select('platform_id','platform')
241         platform_details = execute_admin_query(request, platform_query)
242     
243         for account_detail in account_details:
244             for platform_detail in platform_details:
245                 if platform_detail['platform_id'] == account_detail['platform_id']:
246                     if 'myslice' in platform_detail['platform']:
247                         account_config = json.loads(account_detail['config'])
248                         #user_cred = account_config.get('delegated_user_credential','N/A')
249                         user_cred = account_config.get('user_credential','N/A')
250                         if 'N/A' not in user_cred:
251                             user_hrn = account_config.get('user_hrn','N/A')
252                             user_pub_key = json.dumps(account_config.get('user_public_key','N/A'))
253                             user_priv_key = json.dumps(account_config.get('user_private_key','N/A'))
254                             updated_config = '{"user_public_key":'+ user_pub_key + ', "user_private_key":'+ user_priv_key + ', "user_hrn":"'+ user_hrn + '"}'
255                             user_params = { 'config': updated_config}
256                             manifold_update_account(request, user_id,user_params)
257                             return user_email
258                         else:
259                             return None
260
261     except Exception as e:
262         logger.error("Exception in actions.py in clear_user_creds {}".format(e))
263         return None
264
265 def is_pi(wsgi_request, user_hrn, authority_hrn):
266     # authorities from user where user_hrn == "ple.upmc.jordan_auge"
267     logger.debug("#### actions.py is_pi authority_hrn = {}".format(authority_hrn))
268     try:
269         # CACHE PB with fields
270         page = Page(wsgi_request)
271         metadata = page.get_metadata()
272         user_md = metadata.details_by_object('user')
273         user_fields = [column['name'] for column in user_md['column']]
274         
275         # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
276         query  = Query().get('myslice:user').select(user_fields).filter_by('user_hrn','==',user_hrn)
277         #query = Query.get('myslice:user').filter_by('user_hrn', '==', user_hrn).select('pi_authorities')
278         results = execute_query(wsgi_request, query)
279         for user_detail in results:
280             if authority_hrn in user_detail['pi_authorities']:
281                 return True
282     except Exception as e:
283         logger.error("Exception in actions.py in is_pi {}".format(e))
284     return False
285     
286 # SFA get record
287
288 def sfa_get_user(request, user_hrn, pub=None):
289
290     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
291     query_sfa_user = Query.get('myslice:user').filter_by('user_hrn', '==', user_hrn)
292     result_sfa_user = execute_admin_query(request, query_sfa_user)
293     return result_sfa_user[0]                        
294
295 def sfa_update_user(request, user_hrn, user_params):
296     # user_params: keys [public_key] 
297     if 'email' in user_params:
298         user_params['user_email'] = user_params['email']
299
300     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
301     query = Query.update('myslice:user').filter_by('user_hrn', '==', user_hrn).set(user_params).select('user_hrn')
302     results = execute_admin_query(request,query)
303     return results
304
305 def sfa_add_authority(request, authority_params):
306
307     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
308     query = Query.create('myslice:authority').set(authority_params).select('authority_hrn')
309     results = execute_query(request, query)
310     logger.info("sfa_add_auth results={}".format(results))
311     if not results:
312         raise Exception, "Could not create %s. Already exists ?" % authority_params['hrn']
313     return results
314
315 def sfa_add_user_to_slice(request, user_hrn, slice_hrn):
316 # UPDATE myslice:slice SET users = ['fed4fire.upmc.loic_baron', 'fed4fire.upmc.mohammed-yasin_rahman', 'fed4fire.upmc.demo'] WHERE slice_hrn == 'fed4fire.upmc.project_y.test_under' SELECT slice_hrn, slice_urn
317     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
318     query_current_users = Query.get('myslice:slice').select('users').filter_by('slice_hrn','==',slice_hrn)
319     results_current_users = execute_query(request, query_current_users)
320     current_users = list()
321     for r in results_current_users:
322         current_users.extend(r['users'])
323     users = list(set([user_hrn]) | set(current_users))
324
325     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
326     query = Query.update('myslice:slice').filter_by('slice_hrn', '==', slice_hrn).set({'users':users}).select('slice_hrn')
327     results = execute_query(request, query)
328 # Also possible but not supported yet
329 # UPDATE myslice:user SET slice=['ple.upmc.agent','ple.upmc.myslicedemo','ple.upmc.tophat'] where user_hrn=='ple.upmc.azerty'
330     if not results:
331         raise Exception, "Could not add user %s to slice %s" % (user_hrn, slice_hrn)
332     return results
333
334 def sfa_remove_user_from_slice(request, user_hrn, slice_hrn):
335 # UPDATE myslice:slice SET users = ['fed4fire.upmc.loic_baron', 'fed4fire.upmc.demo'] WHERE slice_hrn == 'fed4fire.upmc.project_y.test_under' SELECT slice_hrn, slice_urn
336     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
337     query_current_users = Query.get('myslice:slice').select('users').filter_by('slice_hrn','==',slice_hrn)
338     results_current_users = execute_query(request, query_current_users)
339     current_users = list()
340     for r in results_current_users:
341         current_users.extend(r['users'])
342     if user_hrn in current_users:
343         current_users.remove(user_hrn)
344
345     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
346     query = Query.update('myslice:slice').filter_by('slice_hrn', '==', slice_hrn).set({'users':current_users}).select('slice_hrn')
347     results = execute_query(request, query)
348 # Also possible but not supported yet
349 # UPDATE myslice:user SET slice=['ple.upmc.agent','ple.upmc.myslicedemo','ple.upmc.tophat'] where user_hrn=='ple.upmc.azerty'
350     if not results:
351         raise Exception, "Could not remove user %s to slice %s" % (user_hrn, slice_hrn)
352     return results
353
354 # Propose hrn
355
356 def manifold_add_user(wsgi_request, request):
357     """Add a Manifold user corresponding to a user request.
358
359     Args:
360         wsgi_request: a WSGIRequest instance
361         request (dict): a dictionary containing the user request built from the
362             form.
363
364     Returns:
365         The user_id of the inserted user.
366
367     Raises:
368         ?
369     
370     """
371     USER_CONFIG = '{"firstname": "%(first_name)s", "lastname": "%(last_name)s", "authority": "%(authority_hrn)s"}'
372
373     user_params = {
374         'email'     : request['email'],
375         'password'  : request['password'],
376         'config'    : USER_CONFIG % request,
377         'status'    : 1,
378     }
379
380     query = Query.create('local:user').set(user_params).select('email')
381     results = execute_admin_query(request, query)
382     if not results:
383         raise Exception, "Failed creating manifold user: %s" % user_params['email']
384     result = results[0]
385     return result['email']
386
387 def manifold_update_user(request, email, user_params):
388     # user_params: password, config e.g., 
389     query = Query.update('local:user').filter_by('email', '==', email).set(user_params).select('email')
390     results = execute_admin_query(request,query)
391     # NOTE: results remains empty and goes to Exception. However, it updates the manifold DB.
392     # That's why I commented the exception part. -- Yasin 
393     #if not results:
394     #    raise Exception, "Failed updating manifold user: %s" % user_params['email']
395     #result, = results
396     return results
397
398 def manifold_add_account(request, account_params):
399     query = Query.create('local:account').set(account_params).select(['user', 'platform'])
400     results = execute_admin_query(request,query)
401     if not results:
402         raise Exception, "Failed creating manifold account on platform %s for user: %s" % (account_params['platform'], account_params['user'])
403     result, = results
404     return result['user_id']
405
406 def manifold_update_account(request,user_id,account_params):
407     # account_params: config
408     query = Query.update('local:account').filter_by('platform', '==', 'myslice').filter_by('user_id', '==', user_id).set(account_params).select('user_id')
409     results = execute_admin_query(request,query)
410     return results
411
412 #explicitly mention the platform_id
413 def manifold_delete_account(request, user_id, platform_id = None):
414     query = Query.delete('local:account').filter_by('user_id', '==', user_id)
415     if platform_id is not None:
416         query.filter_by('platform_id', '==', platform_id)
417     results = execute_admin_query(request,query)
418     return results
419
420 def manifold_delete_user(request, user_id):
421     query = Query.delete('local:user').filter_by('user_id', '==', user_id).select('user_id')
422     results = execute_admin_query(request,query)
423     return results
424
425
426 #not tested
427 def manifold_add_platform(request, platform_params):
428     query = Query.create('local:platform').set(platform_params).select(['user', 'platform'])
429     results = execute_admin_query(request,query)
430     if not results:
431         raise Exception, "Failed creating manifold platform %s for user: %s" % (platform_params['platform'], platform_params['user'])
432     result, = results
433     return result['platform_id']
434
435 def delete_local_user(wsgi_request, user_email):
436     user_query = Query().get('local:user') \
437         .filter_by('email', '==', user_email)           \
438         .select('user_id','config')
439     user = execute_admin_query(wsgi_request, user_query)
440     if len(user) == 0:
441         return False
442         #raise Exception, "User not found, check local DB"
443     else:
444         user_id = user[0]['user_id']
445         user_config = json.loads(user[0]['config'])
446         authority_hrn = user_config.get('authority', None)
447         
448         if is_pi(wsgi_request, '$user_hrn', authority_hrn):
449             # removing from Django auth_user
450             UserModel = get_user_model()
451             UserModel._default_manager.filter(email__iexact = user_email).delete()
452
453             # removing manifold account
454             manifold_delete_account(wsgi_request, user_id)           
455                      
456             # removing manifold user
457             manifold_delete_user(wsgi_request, user_id)
458         else:
459             return False
460             #raise Exception, "No sufficient rights on authority = ",authority_hrn
461
462     return True      
463
464
465 def make_request_user(user):
466     request = {}
467     request['type']          = 'user'
468     request['id']            = user.id
469     request['timestamp']     = user.created # XXX in DB ?
470     request['authority_hrn'] = user.authority_hrn
471     request['first_name']    = user.first_name
472     request['last_name']     = user.last_name
473     request['email']         = user.email
474     request['login']         = user.login
475     request['user_hrn']      = user.user_hrn
476     request['public_key']    = user.public_key
477     request['private_key']   = user.private_key
478     return request
479
480 def make_request_slice(slice):
481     request = {}
482     request['type'] = 'slice'
483     request['id'] = slice.id
484     request['user_hrn'] = slice.user_hrn
485     request['timestamp'] = slice.created
486     request['authority_hrn'] = slice.authority_hrn
487     request['slice_name'] = slice.slice_name
488     request['number_of_nodes'] = slice.number_of_nodes
489     request['type_of_nodes'] = slice.type_of_nodes
490     request['purpose'] = slice.purpose
491     return request
492
493 def make_request_project(project):
494     request = {}
495     request['type'] = 'project'
496     request['id'] = project.id
497     request['user_hrn'] = project.user_hrn
498     request['email'] = project.email
499     request['timestamp'] = project.created
500     request['authority_hrn'] = project.authority_hrn
501     request['project_name'] = project.project_name
502     request['purpose'] = project.purpose
503     return request
504
505 def make_request_join(join):
506     request = {}
507     request['type'] = 'join'
508     request['id'] = join.id
509     request['user_hrn'] = join.user_hrn
510     request['email'] = join.email
511     request['timestamp'] = join.created
512     request['authority_hrn'] = join.authority_hrn
513     request['project_name'] = join.project_name
514     return request
515
516 def make_request_authority(authority):
517     request = {}
518     request['type']                  = 'authority'
519     request['id']                    = authority.id
520     request['site_name']             = authority.site_name
521     request['site_latitude']         = authority.site_latitude
522     request['site_longitude']        = authority.site_longitude
523     request['site_url']              = authority.site_url
524     request['site_authority']        = authority.site_authority
525     request['site_abbreviated_name'] = authority.site_abbreviated_name
526     request['address_line1']         = authority.address_line1
527     request['address_line2']         = authority.address_line2
528     request['address_line3']         = authority.address_line3
529     request['address_city']          = authority.address_city
530     request['address_postalcode']    = authority.address_postalcode
531     request['address_state']         = authority.address_state
532     request['address_country']       = authority.address_country
533     request['authority_hrn']         = authority.authority_hrn
534     request['timestamp']             = authority.created
535     return request
536
537 def make_requests(pending_users, pending_slices, pending_authorities, pending_projects, pending_joins):
538     logger.info("$$$$$$$$$$$$$$$  make_request")
539     requests = []
540     for user in pending_users:
541         requests.append(make_request_user(user))
542     for slice in pending_slices:
543         requests.append(make_request_slice(slice))
544     for authority in pending_authorities:
545         requests.append(make_request_authority(authority))
546     for project in pending_projects:
547         requests.append(make_request_project(project))
548     for join in pending_joins:
549         requests.append(make_request_join(join))
550     return requests   
551
552 def get_request_by_id(ids):
553     logger.info("$$$$$$$$$$$$$$$$  get_request_by_id")
554     sorted_ids = { 'user': [], 'slice': [], 'authority': [], 'project': [], 'join': [] }
555     for type__id in ids:
556         type, id = type__id.split('__')
557         sorted_ids[type].append(id)
558         
559     if not ids:
560         pending_users  = PendingUser.objects.all()
561         pending_slices = PendingSlice.objects.all()
562         pending_authorities = PendingAuthority.objects.all()
563         pending_projects = PendingProject.objects.all()
564         pending_joins = PendingJoin.objects.all()
565     else:
566         pending_users  = PendingUser.objects.filter(id__in=sorted_ids['user']).all()
567         pending_slices = PendingSlice.objects.filter(id__in=sorted_ids['slice']).all()
568         pending_authorities = PendingAuthority.objects.filter(id__in=sorted_ids['authority']).all()
569         pending_projects = PendingProject.objects.filter(id__in=sorted_ids['project']).all()
570         pending_joins = PendingJoin.objects.filter(id__in=sorted_ids['join']).all()
571
572     return make_requests(pending_users, pending_slices, pending_authorities, pending_projects, pending_joins)
573
574 def get_requests(authority_hrns=None):
575     logger.info("$$$$$$$$$$$$$   get_request_by_authority auth_hrns = {}".format(authority_hrns))
576     if not authority_hrns:
577         ## get those pending users who have confirmed their emails
578         pending_users  = PendingUser.objects.filter(status__iexact = 'True')
579         pending_slices = PendingSlice.objects.all()
580         pending_authorities = PendingAuthority.objects.all()
581         pending_projects = PendingProject.objects.all()
582         pending_joins = PendingJoin.objects.all()
583     else:
584         pending_users  = PendingUser.objects
585         pending_slices = PendingSlice.objects
586         pending_authorities = PendingAuthority.objects
587         pending_projects = PendingProject.objects
588         pending_joins = PendingJoin.objects
589         from django.db.models import Q
590         list_user_Q = list()
591         list_slice_Q = list()
592         list_auth_Q = list()
593         list_proj_Q = list()
594         list_join_Q = list()
595         for hrn in authority_hrns:
596             list_user_Q.append(Q(authority_hrn__startswith=hrn, status__iexact = 'True'))
597             list_slice_Q.append(Q(authority_hrn__startswith=hrn))
598             list_auth_Q.append(Q(site_authority__startswith=hrn))
599             list_proj_Q.append(Q(authority_hrn__startswith=hrn))
600             list_join_Q.append(Q(authority_hrn__startswith=hrn))
601         from operator import __or__ as OR
602         pending_users        = pending_users.filter(reduce(OR, list_user_Q))
603         pending_slices       = pending_slices.filter(reduce(OR, list_slice_Q))
604         pending_authorities  = pending_authorities.filter(reduce(OR, list_auth_Q))
605         pending_projects     = pending_projects.filter(reduce(OR, list_proj_Q))
606         pending_joins        = pending_joins.filter(reduce(OR, list_join_Q))
607         #pending_authorities  = pending_authorities.all() #filter(reduce(OR, list_Q))
608
609     return make_requests(pending_users, pending_slices, pending_authorities, pending_projects, pending_joins)
610
611 # XXX Is it in sync with the form fields ?
612
613 def portal_validate_request(wsgi_request, request_ids):
614     status = {}
615
616     if not isinstance(request_ids, list):
617         request_ids = [request_ids]
618
619     requests = get_request_by_id(request_ids)
620     for request in requests:
621         # type, id, timestamp, details, allowed -- MISSING: authority_hrn
622         # CAREFUL about details
623         # user  : first name, last name, email, password, keypair
624         # slice : number of nodes, type of nodes, purpose
625         
626         request_status = {}
627         try:
628             if request['type'] == 'user':
629                 create_user(wsgi_request, request)
630                 request_status['SFA user'] = {'status': True }
631                 u = PendingUser.objects.get(id=request['id'])
632                 ctx = {
633                     'first_name'    : u.first_name, 
634                     'last_name'     : u.last_name,
635                     'email'         : u.email,        
636                 }      
637                 user_email = u.email
638
639                 PendingUser.objects.get(id=request['id']).delete()
640
641             elif request['type'] == 'slice':
642                 create_slice(wsgi_request, request)
643                 request_status['SFA slice'] = {'status': True }
644                 s = PendingSlice.objects.get(id=request['id'])
645                 ctx = {
646                     'slice_name'    : s.slice_name, 
647                     'url'           : s.url,
648                     'purpose'       : s.purpose,        
649                     'email'         : s.email,        
650                 }      
651                 user_email = s.email
652
653                 PendingSlice.objects.get(id=request['id']).delete()
654
655                 # Clear user's Credentials
656                 sfa_user = sfa_get_user(wsgi_request, request['user_hrn'])
657                 clear_user_creds(wsgi_request,sfa_user['user_email'])
658
659             elif request['type'] == 'authority':
660                 #hrn = "%s.%s" % (request['authority_hrn'], request['site_authority'])
661                 hrn = request['site_authority']
662                 # XXX tmp sfa dependency
663                 from sfa.util.xrn import Xrn 
664                 urn = Xrn(hrn, request['type']).get_urn()
665                 
666                 # Only hrn is required for Manifold Query 
667                 sfa_authority_params = {
668                     'authority_hrn'        : hrn,
669                     #'authority_urn'        : urn,
670                     #'type'       : request['type'],
671                     #'pi'        : None,
672                     #'enabled'    : True
673                 }
674                 logger.info("ADD Authority")
675                 sfa_add_authority(wsgi_request, sfa_authority_params)
676                 request_status['SFA authority'] = {'status': True }
677                 a = PendingAuthority.objects.get(id=request['id'])
678                 ctx = { 
679                     'site_name'     : a.site_name,
680                     'short_name'    : a.short_name,
681                     'url'           : a.url,
682                     'city'          : a.city,
683                     'country'       : a.country,                          
684                     'portal_url'    : a.current_site,
685                 }
686                 user_email = a.email
687
688                 PendingAuthority.objects.get(id=request['id']).delete()
689
690             elif request['type'] == 'project':
691                 hrn = request['authority_hrn'] + '.' + request['project_name']
692
693                 # Only hrn is required for Manifold Query 
694                 sfa_authority_params = {
695                     'authority_hrn'        : hrn
696                 }
697                 sfa_add_authority(wsgi_request, sfa_authority_params)
698                 
699                 # Add user as a PI of the project
700                 # Clear user's Credentials
701                 authority_add_pis(wsgi_request, hrn , request['user_hrn'])
702
703                 request_status['SFA project'] = {'status': True }
704                 p = PendingProject.objects.get(id=request['id'])
705                 ctx = {
706                     'project_name'  : p.project_name, 
707                     'authority_hrn' : p.authority_hrn,
708                     'email'         : p.email,        
709                     'purpose'       : p.purpose,
710                 }      
711                 user_email = p.email
712
713                 PendingProject.objects.get(id=request['id']).delete()
714
715             elif request['type'] == 'join':
716                 # Add user as a PI of the project
717                 # Clear user's Credentials
718                 authority_add_pis(wsgi_request, request['authority_hrn'] , request['user_hrn'])
719
720                 request_status['SFA join'] = {'status': True }
721                 j = PendingJoin.objects.get(id=request['id'])
722                 ctx = {
723                     'project_name'  : j.project_name, 
724                     'authority_hrn' : j.authority_hrn,
725                     'email'         : j.email,        
726                     'user_hrn'      : j.user_hrn,
727                 }      
728                 user_email = j.email
729
730                 PendingJoin.objects.get(id=request['id']).delete()
731             else:
732                 raise Exception, 'unknown type of request %s' % request['type']
733             # XXX Remove from Pendings in database
734
735             send_status_email(ctx, user_email, request['type'], 'validated')
736         except Exception, e:
737             request_status['SFA '+request['type']] = {'status': False, 'description': str(e)}
738
739         status['%s__%s' % (request['type'], request['id'])] = request_status
740
741     return status
742
743 def validate_action(request, **kwargs):
744     ids = filter(None, kwargs['id'].split('/'))
745     status = portal_validate_request(request, ids)
746     json_answer = json.dumps(status)
747     return HttpResponse (json_answer, content_type="application/json")
748
749
750 def reject_action(request, **kwargs):
751     ids = filter(None, kwargs['id'].split('/'))
752     status = portal_reject_request(request, ids)
753     json_answer = json.dumps(status)
754     return HttpResponse (json_answer, content_type="application/json")
755
756
757 def portal_reject_request(wsgi_request, request_ids):
758     status = {}
759     # get the domain url    
760     current_site = Site.objects.get_current()
761     current_site = current_site.domain
762
763
764     if not isinstance(request_ids, list):
765         request_ids = [request_ids]
766
767     requests = get_request_by_id(request_ids)
768     for request in requests:
769         # type, id, timestamp, details, allowed -- MISSING: authority_hrn
770         # CAREFUL about details
771         # user  : first name, last name, email, password, keypair
772         # slice : number of nodes, type of nodes, purpose
773         
774         request_status = {}
775
776         try:
777             if request['type'] == 'user':
778                 request_status['SFA user'] = {'status': True }
779                 # getting user email based on id 
780                 ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
781                 for user in PendingUser.objects.raw('SELECT * FROM portal_pendinguser WHERE id = %s', [request['id']]):
782                     user_email= user.email
783                     first_name = user.first_name
784                     last_name = user.last_name
785
786                 ctx = {
787                     'first_name'    : first_name, 
788                     'last_name'     : last_name, 
789                     'email'         : user_email,
790                     'portal_url'    : current_site,
791                     }
792
793                 # removing from Django portal_pendinguser
794                 PendingUser.objects.get(id=request['id']).delete()
795                 
796                 delete_local_user(wsgi_request, user_email)
797                           
798             elif request['type'] == 'slice':
799                 request_status['SFA slice'] = {'status': True } 
800
801                 # getting user email based on id 
802                 ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
803                 for user in PendingSlice.objects.raw('SELECT * FROM portal_pendingslice WHERE id = %s', [request['id']]):
804                     user_email= user.type_of_nodes # XXX type_of_nodes field contains the email [shd be renamed in DB]
805                     slice_name = user.slice_name
806                     purpose = user.purpose
807                     url = user.number_of_nodes
808
809                 ctx = {
810                     'slice_name': slice_name,
811                     'purpose': purpose,
812                     'url': url,
813                     'portal_url': current_site,
814                     }
815
816                 PendingSlice.objects.get(id=request['id']).delete()
817
818             elif request['type'] == 'authority':
819                 request_status['SFA authority'] = {'status': True }
820                 
821                 # getting user email based on id 
822                 ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
823                 for user in PendingAuthority.objects.raw('SELECT * FROM portal_pendingauthority WHERE id = %s', [request['id']]):
824                     user_email= user.address_line1 # XXX address_line1 field contains the email [shd be renamed in DB]
825                     site_name = user.site_name
826                     city = user.address_city
827                     country = user.address_country
828                     short_name = user.site_abbreviated_name
829                     url = user.site_url
830
831                 ctx = { 
832                     'site_name': site_name,
833                     'short_name': short_name,
834                     'url': url,
835                     'city': city,
836                     'country': country,                          
837                     'portal_url'    : current_site,
838                     }
839                     
840                 PendingAuthority.objects.get(id=request['id']).delete()
841
842             # XXX TMP we should send an email to the user to inform him/her
843             elif request['type'] == 'project':
844                 request_status['SFA project'] = {'status': True }
845                 p = PendingProject.objects.get(id=request['id'])
846                 ctx = {
847                     'project_name'  : p.project_name, 
848                     'authority_hrn' : p.authority_hrn,
849                     'email'         : p.email,        
850                     'purpose'       : p.purpose,
851                 }      
852                 user_email = p.email
853                 PendingProject.objects.get(id=request['id']).delete()
854
855             elif request['type'] == 'join':
856                 request_status['SFA join'] = {'status': True }
857                 j = PendingJoin.objects.get(id=request['id'])
858                 ctx = {
859                     'project_name'  : j.project_name, 
860                     'authority_hrn' : j.authority_hrn,
861                     'email'         : j.email,        
862                     'user_hrn'      : j.user_hrn,
863                 }      
864
865                 user_email = j.email
866                 PendingJoin.objects.get(id=request['id']).delete()
867             else:
868                 raise Exception, 'unknown type of request %s' % request['type']
869
870             send_status_email(ctx, user_email, request['type'], 'denied')
871         except Exception, e:
872             request_status['SFA '+request['type']] = {'status': False, 'description': str(e)}
873
874         status['%s__%s' % (request['type'], request['id'])] = request_status
875
876     return status
877
878 def send_status_email(ctx, user_email, obj_type, status):
879     try:
880         theme.template_name = obj_type + '_request_' + status + '.txt'
881         text_content = render_to_string(theme.template, ctx)
882         theme.template_name = obj_type + '_request_' + status + '.html'
883         html_content = render_to_string(theme.template, ctx)
884         theme.template_name = 'email_default_sender.txt'
885         sender =  render_to_string(theme.template, ctx)
886         sender = sender.replace('\n', '')
887                        
888         subject = obj_type + ' request '+ status +'.'
889     
890         msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
891         msg.attach_alternative(html_content, "text/html")
892         msg.send()
893     except Exception as e:
894         logger.error("Failed to send email, please check the mail templates and the SMTP configuration of your server")
895
896
897 # Django and ajax
898 # http://djangosnippets.org/snippets/942/
899
900
901
902 #-------------------------------------------------------------------------------
903 # REQUESTS - Slices
904 #-------------------------------------------------------------------------------
905
906 def create_slice(wsgi_request, request):
907     """
908     Arguments:
909         wsgi_request (~ WSGIRequest) : 
910         request (dict) : the slice request in our own dict format
911
912     Raises:
913         Exception
914     """
915     hrn = "%s.%s" % (request['authority_hrn'], request['slice_name'])
916     # XXX tmp sfa dependency
917     from sfa.util.xrn import Xrn 
918     urn = Xrn(hrn, request['type']).get_urn()
919     
920     # Add User to Slice if we have the user_hrn in pendingslice table
921     user_hrn = request.get('user_hrn', None)
922     user_hrns = list([user_hrn]) if user_hrn else list()
923    
924     # CACHE PB with fields
925     page = Page(wsgi_request)
926     metadata = page.get_metadata()
927     user_md = metadata.details_by_object('user')
928     user_fields = [column['name'] for column in user_md['column']]
929
930     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
931     #user_query  = Query().get('myslice:user').select('user_hrn','user_email').filter_by('user_hrn','==',user_hrn)
932     user_query  = Query().get('myslice:user').select(user_fields).filter_by('user_hrn','==',user_hrn)
933     user_details_sfa = execute_admin_query(wsgi_request, user_query)
934     if not user_details_sfa:
935         raise Exception, "User %s doesn't exist, validate user before validating slice" % user_hrn
936     for user in user_details_sfa:
937         user_email = user['user_email']
938
939     # XXX LOIC Quick fix because this is totally inconsistent
940     if not 'number_of_nodes' in request:
941         request['number_of_nodes']=""
942
943     # Slice is under a project
944     if len(request['authority_hrn'].split('.')) > 2:
945         pi_list = []
946         pis = authority_get_pis(wsgi_request, request['authority_hrn'])
947         for pi in pis:
948             pi_list = pi['pi_users']
949         user_hrns.extend(pi_list)
950
951     # XXX We should create a slice with Manifold terminology
952     slice_params = {
953         'slice_hrn'        : hrn, 
954         'slice_urn'        : urn,
955         'slice_type'       : request['type'],
956         'url'              : request['number_of_nodes'],
957         'users'            : user_hrns,
958         'slice_enabled'    : True
959     }
960     # ignored in request: id, timestamp,  number_of_nodes, type_of_nodes, purpose
961
962     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
963     query = Query.create('myslice:slice').set(slice_params).select('slice_hrn')
964     results = execute_query(wsgi_request, query)
965     if not results:
966         raise Exception, "Could not create %s. Already exists ?" % slice_params['hrn']
967     else:
968         try:
969             for u_hrn in user_hrns:
970                 u_email = get_user_email(wsgi_request, u_hrn)
971                 clear_user_creds(wsgi_request, u_email)
972         except Exception as e:
973             logger.error("Failed clear credentials for all users")
974             clear_user_creds(wsgi_request,user_email)
975         # log user activity
976         activity.slice.validate(request, { "slice" : hrn })
977        
978     return results
979
980 def create_pending_slice(wsgi_request, request, email):
981     """
982     """
983
984     # Insert an entry in the PendingSlice table
985     s = PendingSlice(
986         slice_name      = request['slice_name'],
987         user_hrn        = request['user_hrn'],
988         authority_hrn   = request['authority_hrn'],
989         number_of_nodes = request['url'], # field needs to be renamed
990         purpose         = request['purpose'],
991         type_of_nodes   = request['email'] # field needs to be renamed 
992     )
993     s.save()
994
995     send_email_to_pis(wsgi_request, request, 'slice')
996
997 def create_pending_project(wsgi_request, request):
998     """
999     """
1000
1001     # Insert an entry in the PendingProject table
1002     s = PendingProject(
1003         project_name    = request['project_name'],
1004         user_hrn        = request['user_hrn'],
1005         email           = request['email'],
1006         authority_hrn   = request['authority_hrn'],
1007         purpose         = request['purpose'],
1008     )
1009     s.save()
1010
1011     send_email_to_pis(wsgi_request, request, 'project')
1012
1013 def create_pending_join(wsgi_request, request):
1014     """
1015     """
1016
1017     # Insert an entry in the PendingJoin table
1018     s = PendingJoin(
1019         user_hrn        = request['user_hrn'],
1020         email           = request['email'],
1021         project_name    = request['project_name'],
1022         authority_hrn   = request['authority_hrn'],
1023     )
1024     s.save()
1025
1026     send_email_to_pis(wsgi_request, request, 'join')
1027
1028 #-------------------------------------------------------------------------------
1029 # SEND EMAILS
1030 #-------------------------------------------------------------------------------
1031
1032 def send_email_to_pis(wsgi_request, request, obj_type):
1033     try:
1034         # Send an email: the recipients are the PIs of the authority
1035         recipients = authority_get_pi_emails(wsgi_request, request['authority_hrn'])
1036
1037         theme.template_name = obj_type + '_request_email.txt' 
1038         text_content = render_to_string(theme.template, request)
1039
1040         theme.template_name = obj_type + '_request_email.html' 
1041         html_content = render_to_string(theme.template, request)
1042
1043         theme.template_name = obj_type + '_request_email_subject.txt'
1044         subject = render_to_string(theme.template, request)
1045         subject = subject.replace('\n', '')
1046
1047         theme.template_name = 'email_default_sender.txt'
1048         sender =  render_to_string(theme.template, request)
1049
1050         msg = EmailMultiAlternatives(subject, text_content, sender, recipients)
1051         msg.attach_alternative(html_content, "text/html")
1052         msg.send()
1053     except Exception, e:
1054         print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
1055
1056
1057 #-------------------------------------------------------------------------------
1058 # REQUESTS - Users
1059 #-------------------------------------------------------------------------------
1060
1061 def manifold_add_reference_user_accounts(wsgi_request, request):
1062     """When a new user is created, add reference accounts to the reference platform.
1063     """
1064     # XXX XXX XXX The rest of this function has to be checked XXX XXX XXX
1065
1066     # Retrieve user information
1067     user_query  = Query().get('local:user')             \
1068         .select('user_id', 'config', 'email', 'status') \
1069         .filter_by('email', '==', request['email'])
1070     user_details = execute_admin_query(wsgi_request, user_query)
1071
1072     # USER MAIN ACCOUNT != reference
1073     #print 'USER MAIN ACCOUNT != reference'
1074     list_accounts_query = Query().get('local:account')              \
1075         .select('user_id', 'platform_id', 'auth_type', 'config')    \
1076         .filter_by('user_id', '==', user_details[0]['user_id'])     \
1077         .filter_by('auth_type', '!=', 'reference')
1078     list_accounts = execute_admin_query(wsgi_request, list_accounts_query)
1079
1080     # XXX main_platform is being erased several times ???
1081     for account in list_accounts:
1082         main_platform_query = Query().get('local:platform')         \
1083             .select('platform_id', 'platform')                      \
1084             .filter_by('platform_id', '==', account['platform_id'])
1085         main_platform = execute_admin_query(wsgi_request, main_platform_query)
1086
1087     # Add reference accounts on SFA enabled platforms
1088     platforms_query = Query().get('local:platform') \
1089         .filter_by('disabled', '==', '0')           \
1090         .filter_by('gateway_type', '==', 'sfa')     \
1091         .select('platform_id', 'gateway_type')
1092     platforms = execute_admin_query(wsgi_request, platforms_query)
1093     for platform in platforms:
1094         #print "add reference to platform ",platform
1095         manifold_account_params = {
1096             'user_id'       : user_details[0]['user_id'],
1097             'platform_id'   : platform['platform_id'],
1098             'auth_type'     : 'reference',
1099             'config'        : '{"reference_platform": "' + main_platform[0]['platform'] + '"}',
1100         }
1101         manifold_add_account(wsgi_request, manifold_account_params)
1102
1103 def sfa_create_user(wsgi_request, request, namespace = None, as_admin = False):
1104     """
1105     Arguments:
1106         wsgi_request (~ WSGIRequest) : 
1107         request (dict) : the user request in our own dict format
1108
1109     Raises:
1110         Exception
1111     """
1112     from sfa.util.xrn import Xrn 
1113
1114     auth_pi = request.get('pi', None)
1115     auth_pi = list([auth_pi]) if auth_pi else list()
1116
1117     # We create a user request with Manifold terminology
1118     sfa_user_params = {
1119         'user_hrn'          : request['user_hrn'],
1120         'user_email'        : request['email'],
1121         'user_urn'          : Xrn(request['user_hrn'], request['type']).get_urn(),
1122         'user_type'         : request['type'],
1123         'keys'              : request['public_key'],
1124         'user_first_name'   : request['first_name'],
1125         'user_last_name'    : request['last_name'],
1126         'pi_authorities'    : auth_pi,
1127         'user_enabled'      : True
1128     }
1129
1130     if namespace is not None:
1131         query = Query.create('%s:user' % namespace).set(sfa_user_params).select('user_hrn')
1132     else:
1133         # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
1134         query = Query.create('myslice:user').set(sfa_user_params).select('user_hrn')
1135
1136     if as_admin:
1137         results = execute_admin_query(wsgi_request, query)
1138     else:
1139         results = execute_query(wsgi_request, query)
1140
1141     if not results:
1142         raise Exception, "Could not create %s. Already exists ?" % sfa_user_params['user_hrn']
1143
1144     return results
1145
1146 def iotlab_create_user (wsgi_request, request, namespace = None, as_admin=False):
1147    
1148     import requests
1149     import time
1150     from requests.auth import HTTPBasicAuth
1151    
1152     engine = ConfigEngine() 
1153     URL_REST = engine.iotlab_url()
1154     LOGIN_ADMIN = engine.iotlab_admin_user()
1155     PASSWORD_ADMIN = engine.iotlab_admin_password()
1156
1157     auth = HTTPBasicAuth(LOGIN_ADMIN,PASSWORD_ADMIN)
1158     headers = {'content-type': 'application/json'}
1159
1160     for user in PendingUser.objects.raw('SELECT * FROM portal_pendinguser WHERE email = %s', [request['email']]):
1161         password= user.password
1162
1163
1164     iotlab_user_params = {
1165         "type"          : "SA",
1166         #"login"         : request['email'], #auto generated by iotlab
1167         "password"      : password,
1168         "firstName"     : request['first_name'],
1169         "lastName"      : request['last_name'],
1170         "email"         : request['email'],
1171         "structure"     : request['authority_hrn'],
1172         "city"          : "N/A",
1173         "country"       : "N/A",
1174         "sshPublicKey"  : request['public_key'],
1175         "motivations"   : "SFA federation",
1176     }    
1177    
1178     iotlab_user_params1 = json.dumps(iotlab_user_params)
1179     r=requests.post(url=URL_REST, data=iotlab_user_params1, headers=headers, auth=auth)
1180     logger.info('Create iotlab user : {} {}'.format(r.status_code, r.text))
1181     return r.text
1182
1183 def create_user(wsgi_request, request, namespace = None, as_admin = False):
1184     # XXX This has to be stored centrally
1185     USER_STATUS_ENABLED = 2
1186
1187     # NOTE : if we were to create a user directly (just like we create slices,
1188     # we would have to perform the steps in create_pending_user too
1189
1190     # Add the user to the SFA registry
1191     sfa_create_user(wsgi_request, request, namespace, as_admin)
1192
1193     # Update Manifold user status
1194     manifold_update_user(wsgi_request, request['email'], {'status': USER_STATUS_ENABLED})
1195
1196     # Add reference accounts for platforms
1197     manifold_add_reference_user_accounts(wsgi_request, request)
1198
1199     # Add the user to iotlab portal if theme is set to onelab
1200     if theme.theme == 'onelab':
1201         iotlab_create_user (wsgi_request, request)
1202
1203 def create_pending_user(wsgi_request, request, user_detail):
1204     """
1205     """
1206
1207     # Insert an entry in the PendingUser table
1208     b = PendingUser(
1209         first_name    = request['first_name'],
1210         last_name     = request['last_name'],
1211         authority_hrn = request['authority_hrn'],
1212         email         = request['email'],
1213         password      = request['password'],
1214         public_key    = request['public_key'],
1215         private_key   = request['private_key'],
1216         user_hrn      = request['user_hrn'],
1217         pi            = request['pi'],
1218         email_hash    = request['email_hash'],
1219         status        = 'False',
1220     )
1221     b.save()
1222     # sends email to user to activate the email
1223     theme.template_name = 'activate_user.html'
1224     html_content = render_to_string(theme.template, request)
1225     theme.template_name = 'activate_user.txt'
1226     text_content = render_to_string(theme.template, request)
1227     theme.template_name = 'activate_user_email_subject.txt'
1228     subject = render_to_string(theme.template, request)
1229     subject = subject.replace('\n', '')
1230     theme.template_name = 'email_default_sender.txt'
1231     sender =  render_to_string(theme.template, request)
1232     sender = sender.replace('\n', '')
1233     recipient = [request['email']]
1234     #recipient = recipient.append(request['email'])
1235
1236     msg = EmailMultiAlternatives(subject, text_content, sender, recipient)
1237     msg.attach_alternative(html_content, "text/html")
1238     msg.send()
1239    
1240     # saves the user to django auth_user table [needed for password reset]
1241     user = User.objects.create_user(request['email'], request['email'], request['password'])
1242
1243     # Creating a manifold user
1244     user_id = manifold_add_user(wsgi_request, request)
1245
1246     # Creating a Manifold account on the MySlice platform
1247     # Note the JSON representation of public and private keys already includes quotes
1248     account_config = {
1249         'user_hrn'          : request['user_hrn'],
1250         'user_public_key'   : request['public_key'],
1251     }
1252     if request['private_key']:
1253         account_config['user_private_key'] = request['private_key']
1254
1255     user_id = user_detail['user_id'] + 1 # the user_id for the newly created user in local:user
1256
1257     # XXX TODO: Require a myslice platform
1258     # ALERT: this will disapear with ROUTERV2 of Manifold
1259     # We have to consider the case where several registries can be used
1260     # Removed hardcoded platform = 5
1261     # This platform == 'myslice' is a TMP FIX !!
1262     try:
1263         reg_platform_query = Query().get('local:platform') \
1264             .filter_by('platform', '==', 'myslice')           \
1265             .select('platform_id')
1266         reg_platform = execute_admin_query(wsgi_request, reg_platform_query)
1267
1268         reg_platform_id = reg_platform[0]['platform_id']
1269         account_params = {
1270             'platform_id'   : reg_platform_id, # XXX ALERT !!
1271             'user_id'       : user_id, 
1272             'auth_type'     : request['auth_type'], 
1273             'config'        : json.dumps(account_config),
1274         }
1275         manifold_add_account(wsgi_request, account_params)
1276
1277     # Email to PIs is sent when the user activates his email
1278     # portal/emailactivationview.py
1279
1280     except Exception as e:
1281         logger.error("Failed creating manifold account on platform {} for user: {}".format('myslice', request['email']))
1282