b7ee9a0a14c8ee2de4a6206c829bb14e0f2a188c
[unfold.git] / portal / actions.py
1 from django.http                    import HttpResponse
2 from manifold.core.query            import Query
3 from manifoldapi.manifoldapi        import execute_query,execute_admin_query
4 from portal.models                  import PendingUser, PendingSlice, PendingAuthority, PendingProject, PendingJoin
5 from unfold.page                    import Page
6
7 import json
8
9 from django.contrib.auth.models     import User
10 from django.contrib.auth            import get_user_model
11 from django.template.loader         import render_to_string
12 from django.core.mail               import EmailMultiAlternatives, send_mail
13
14 from myslice.theme                  import ThemeView
15 from myslice.configengine           import ConfigEngine
16
17 from myslice.settings import logger
18
19 theme = ThemeView()
20
21 import activity.slice
22
23 # Thierry: moving this right into the code so 
24 # most people can use myslice without having to install sfa
25 # XXX tmp sfa dependency, should be moved to SFA gateway
26 #from sfa.util.xrn                import Xrn 
27
28 def get_myslice_platform(request):
29     platform_query  = Query().get('local:platform').select('platform_id','platform','gateway_type','disabled','config').filter_by('platform','==','myslice')
30     platform_details = execute_query(request, platform_query)
31     if isinstance(platform_details,list):
32         for platform_detail in platform_details:
33             return platform_detail
34     else:
35         return None
36
37 def get_myslice_account(request):
38     try:
39         platform_myslice = get_myslice_platform(request)
40         account_query  = Query().get('local:account').select('user_id','platform_id','auth_type','config').filter_by('platform_id','==',platform_myslice['platform_id'])
41         account_details = execute_query(request, account_query)
42         for account_detail in account_details:
43             return account_detail
44     except Exception as e:
45         print e
46         return None
47
48 def get_registry_url(request):
49     try:
50         platform_detail = get_myslice_platform(request)
51         platform_config = json.loads(platform_detail['config'])
52         import socket
53         hostname = socket.gethostbyaddr(socket.gethostname())[0]
54         registry = platform_config.get('registry','N/A')
55         if 'localhost' in registry:
56             port = registry.split(':')[-1:][0]
57             registry = "http://" + hostname +':'+ port
58         return registry
59     except Exception as e:
60         print e
61         return None
62
63 def get_jfed_identity(request):
64     try:
65         account_detail = get_myslice_account(request)
66         account_config = json.loads(account_detail['config'])
67         if 'user_private_key' in account_config:
68             private_key = account_config['user_private_key']
69             user_hrn = account_config.get('user_hrn','N/A')
70             platform_detail = get_myslice_platform(request)
71             registry = get_registry_url(request)
72             #registry = 'http://sfa-fed4fire.pl.sophia.inria.fr:12345/'
73             jfed_identity = user_hrn + '\n' + registry + '\n' + private_key 
74             return jfed_identity
75         else:
76             return None
77     except Exception as e:
78         print e
79         return None
80
81 # Get the list of pis in a given authority
82 def authority_get_pis(request, authority_hrn):
83     # CACHE PB with fields
84     page = Page(request)
85     metadata = page.get_metadata()
86     auth_md = metadata.details_by_object('authority')
87     auth_fields = [column['name'] for column in auth_md['column']]
88
89     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
90     query = Query.get('myslice:authority').filter_by('authority_hrn', '==', authority_hrn).select(auth_fields)
91     results = execute_admin_query(request, query)
92     #print "authority_get_pis = %s" % results
93     # NOTE: temporarily commented. Because results is giving empty list. 
94     # Needs more debugging
95     #if not results:
96     #    raise Exception, "Authority not found: %s" % authority_hrn
97     #result, = results
98     #return result['pi_users']
99     return results
100
101 #check the user is pi or not in the registry
102 def authority_check_pis(request, user_email):
103     try:
104         user_query  = Query().get('local:user').filter_by('email', '==', user_email).select('user_id','email','password','config')
105         user_details = execute_admin_query(request, user_query)
106     
107         # getting the authority_hrn
108         for user_detail in user_details:
109             user_id = user_detail['user_id']
110             if user_detail['config']:
111                 config = json.loads(user_detail['config'])
112                 authority_hrn = config.get('authority','Unknown Authority')
113  
114         account_query  = Query().get('local:account').filter_by('user_id', '==', user_id).select('user_id','platform_id','auth_type','config')
115         account_details = execute_admin_query(request, account_query)
116     
117         platform_query  = Query().get('local:platform').select('platform_id','platform')
118         platform_details = execute_admin_query(request, platform_query)
119     
120         for account_detail in account_details:
121             for platform_detail in platform_details:
122                 if platform_detail['platform_id'] == account_detail['platform_id']:
123                     if 'myslice' in platform_detail['platform']:
124                         account_config = json.loads(account_detail['config'])
125                         user_hrn = account_config.get('user_hrn','N/A')
126
127         pi_status = False
128         pis = authority_get_pis (request, authority_hrn)
129         for pi in pis:
130             pi_list = pi['pi_users']
131
132         if user_hrn in pi_list:
133             pi_status = True
134         return pi_status
135
136     except Exception as e:
137         logger.error("Exception in actions.py in authority_check_pis {}".format(e))
138         return None
139
140
141 def authority_add_pis(request, authority_hrn, user_hrn):
142     try:
143         pi_list = []
144         # getting pis of the authority of the user
145         pis = authority_get_pis (request, authority_hrn)
146         for pi in pis:
147             pi_list = pi['pi_users']
148    
149         updated_pi_list = pi_list.append(user_hrn) 
150         query = Query.update('myslice:authority').filter_by('authority_hrn', '==', authority_hrn).set({'pi_users':pi_list})
151         results = execute_query(request,query)
152         newpis = authority_get_pis (request, authority_hrn)
153        
154         # Add the user to the slices of the project he/she joined
155         if len(authority_hrn.split('.')) > 2:
156             # this authority_hrn is a project
157             query_slices = Query.get('myslice:slice').filter_by('parent_authority', '==', authority_hrn).select('slice_hrn')
158             results_slices = execute_query(request,query_slices)
159             for s in results_slices:
160                 sfa_add_user_to_slice(request, user_hrn, s['slice_hrn'])
161         # Clear Credentials of the user 
162         user_email = get_user_email(request, user_hrn)
163         clear_user_creds(request, user_email)
164
165         return newpis
166     except Exception as e: 
167         logger.error("Exception in actions.py in authority_add_pis {}".format(e))
168         raise Exception, "Exception in actions.py in authority_add_pis {}".format(e)
169
170 def authority_remove_pis(request, authority_hrn, user_hrn):
171     try:
172         pi_list = []
173         # getting pis of the authority of the user
174         pis = authority_get_pis (request, authority_hrn)
175         for pi in pis:
176             pi_list = pi['pi_users']
177  
178         updated_pi_list = pi_list.remove(user_hrn) 
179         query = Query.update('myslice:authority').filter_by('authority_hrn', '==', authority_hrn).set({'pi_users':pi_list})
180         results = execute_query(request,query)
181         newpis = authority_get_pis (request, authority_hrn)
182
183         # Remove the user from the slices of the project he/she left
184         if len(authority_hrn.split('.')) > 2:
185             # this authority_hrn is a project
186             query_slices = Query.get('myslice:slice').filter_by('parent_authority', '==', authority_hrn).select('slice_hrn')
187             results_slices = execute_query(request,query_slices)
188             for s in results_slices:
189                 print 'remove from slice %s' % s
190                 sfa_remove_user_from_slice(request, user_hrn, s['slice_hrn'])
191
192         # Clear Credentials of the user 
193         user_email = get_user_email(request, user_hrn)
194         clear_user_creds(request, user_email)
195
196         return newpis
197     except Exception as e: 
198         logger.error("Exception in actions.py in authority_remove_pis {}".format(e))
199         raise Exception, "Exception in actions.py in authority_remove_pis {}".format(e)
200
201
202 def authority_get_pi_emails(request, authority_hrn):
203     pi_users = authority_get_pis(request,authority_hrn)
204     logger.info("pi_users = %s" % pi_users)
205
206     if any(pi['pi_users'] == None or not pi['pi_users']  for pi in pi_users):
207         #theme.template_name = 'email_default_recipients.txt' 
208         #default_email = render_to_string(theme.template, request)
209         #default_email = default_email.replace('\n', '')
210         #return default_email
211         # the above doesn't work
212         return ['support@onelab.eu']
213     else:
214         pi_user_hrns = [ hrn for x in pi_users for hrn in x['pi_users'] ]
215
216         # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
217         query = Query.get('myslice:user').filter_by('user_hrn', 'included', pi_user_hrns).select('user_email')
218         results = execute_admin_query(request, query)
219         return [result['user_email'] for result in results]
220
221 def get_user_email(request, user_hrn):
222     query = Query.get('myslice:user').filter_by('user_hrn', '==', user_hrn).select('user_email')
223     results = execute_admin_query(request, query)
224     return results[0]['user_email'] 
225
226 #clear user credentials
227 def clear_user_creds(request, user_email):
228     try:
229         user_query  = Query().get('local:user').filter_by('email', '==', user_email).select('user_id','email','password','config')
230         user_details = execute_admin_query(request, user_query)
231     
232         # getting the user_id from the session
233         for user_detail in user_details:
234             user_id = user_detail['user_id']
235             user_email = user_detail['email']
236     
237         account_query  = Query().get('local:account').filter_by('user_id', '==', user_id).select('user_id','platform_id','auth_type','config')
238         account_details = execute_admin_query(request, account_query)
239     
240         platform_query  = Query().get('local:platform').select('platform_id','platform')
241         platform_details = execute_admin_query(request, platform_query)
242     
243         for account_detail in account_details:
244             for platform_detail in platform_details:
245                 if platform_detail['platform_id'] == account_detail['platform_id']:
246                     if 'myslice' in platform_detail['platform']:
247                         account_config = json.loads(account_detail['config'])
248                         #user_cred = account_config.get('delegated_user_credential','N/A')
249                         user_cred = account_config.get('user_credential','N/A')
250                         if 'N/A' not in user_cred:
251                             user_hrn = account_config.get('user_hrn','N/A')
252                             user_pub_key = json.dumps(account_config.get('user_public_key','N/A'))
253                             user_priv_key = json.dumps(account_config.get('user_private_key','N/A'))
254                             updated_config = '{"user_public_key":'+ user_pub_key + ', "user_private_key":'+ user_priv_key + ', "user_hrn":"'+ user_hrn + '"}'
255                             user_params = { 'config': updated_config}
256                             manifold_update_account(request, user_id,user_params)
257                             return user_email
258                         else:
259                             return None
260
261     except Exception as e:
262         logger.error("Exception in actions.py in clear_user_creds {}".format(e))
263         return None
264
265 def is_pi(wsgi_request, user_hrn, authority_hrn):
266     # authorities from user where user_hrn == "ple.upmc.jordan_auge"
267     logger.debug("#### actions.py is_pi authority_hrn = {}".format(authority_hrn))
268     try:
269         # CACHE PB with fields
270         page = Page(wsgi_request)
271         metadata = page.get_metadata()
272         user_md = metadata.details_by_object('user')
273         user_fields = [column['name'] for column in user_md['column']]
274         
275         # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
276         query  = Query().get('myslice:user').select(user_fields).filter_by('user_hrn','==',user_hrn)
277         #query = Query.get('myslice:user').filter_by('user_hrn', '==', user_hrn).select('pi_authorities')
278         results = execute_query(wsgi_request, query)
279         for user_detail in results:
280             if authority_hrn in user_detail['pi_authorities']:
281                 return True
282     except Exception as e:
283         logger.error("Exception in actions.py in is_pi {}".format(e))
284     return False
285     
286 # SFA get record
287
288 def sfa_get_user(request, user_hrn, pub=None):
289
290     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
291     query_sfa_user = Query.get('myslice:user').filter_by('user_hrn', '==', user_hrn)
292     result_sfa_user = execute_admin_query(request, query_sfa_user)
293     return result_sfa_user[0]                        
294
295 def sfa_update_user(request, user_hrn, user_params):
296     # user_params: keys [public_key] 
297     if 'email' in user_params:
298         user_params['user_email'] = user_params['email']
299
300     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
301     query = Query.update('myslice:user').filter_by('user_hrn', '==', user_hrn).set(user_params).select('user_hrn')
302     results = execute_admin_query(request,query)
303     return results
304
305 def sfa_add_authority(request, authority_params):
306
307     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
308     query = Query.create('myslice:authority').set(authority_params).select('authority_hrn')
309     results = execute_query(request, query)
310     logger.info("sfa_add_auth results={}".format(results))
311     if not results:
312         raise Exception, "Could not create %s. Already exists ?" % authority_params['hrn']
313     return results
314
315 def sfa_add_user_to_slice(request, user_hrn, slice_hrn):
316 # UPDATE myslice:slice SET users = ['fed4fire.upmc.loic_baron', 'fed4fire.upmc.mohammed-yasin_rahman', 'fed4fire.upmc.demo'] WHERE slice_hrn == 'fed4fire.upmc.project_y.test_under' SELECT slice_hrn, slice_urn
317     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
318     query_current_users = Query.get('myslice:slice').select('users').filter_by('slice_hrn','==',slice_hrn)
319     results_current_users = execute_query(request, query_current_users)
320     current_users = list()
321     for r in results_current_users:
322         current_users.extend(r['users'])
323     users = list(set([user_hrn]) | set(current_users))
324
325     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
326     query = Query.update('myslice:slice').filter_by('slice_hrn', '==', slice_hrn).set({'users':users}).select('slice_hrn')
327     results = execute_query(request, query)
328 # Also possible but not supported yet
329 # UPDATE myslice:user SET slice=['ple.upmc.agent','ple.upmc.myslicedemo','ple.upmc.tophat'] where user_hrn=='ple.upmc.azerty'
330     if not results:
331         raise Exception, "Could not add user %s to slice %s" % (user_hrn, slice_hrn)
332     return results
333
334 def sfa_remove_user_from_slice(request, user_hrn, slice_hrn):
335 # UPDATE myslice:slice SET users = ['fed4fire.upmc.loic_baron', 'fed4fire.upmc.demo'] WHERE slice_hrn == 'fed4fire.upmc.project_y.test_under' SELECT slice_hrn, slice_urn
336     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
337     query_current_users = Query.get('myslice:slice').select('users').filter_by('slice_hrn','==',slice_hrn)
338     results_current_users = execute_query(request, query_current_users)
339     current_users = list()
340     for r in results_current_users:
341         current_users.extend(r['users'])
342     if user_hrn in current_users:
343         current_users.remove(user_hrn)
344
345     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
346     query = Query.update('myslice:slice').filter_by('slice_hrn', '==', slice_hrn).set({'users':current_users}).select('slice_hrn')
347     results = execute_query(request, query)
348 # Also possible but not supported yet
349 # UPDATE myslice:user SET slice=['ple.upmc.agent','ple.upmc.myslicedemo','ple.upmc.tophat'] where user_hrn=='ple.upmc.azerty'
350     if not results:
351         raise Exception, "Could not remove user %s to slice %s" % (user_hrn, slice_hrn)
352     return results
353
354 # Propose hrn
355
356 def manifold_add_user(wsgi_request, request):
357     """Add a Manifold user corresponding to a user request.
358
359     Args:
360         wsgi_request: a WSGIRequest instance
361         request (dict): a dictionary containing the user request built from the
362             form.
363
364     Returns:
365         The user_id of the inserted user.
366
367     Raises:
368         ?
369     
370     """
371     USER_CONFIG = '{"firstname": "%(first_name)s", "lastname": "%(last_name)s", "authority": "%(authority_hrn)s"}'
372
373     user_params = {
374         'email'     : request['email'],
375         'password'  : request['password'],
376         'config'    : USER_CONFIG % request,
377         'status'    : 1,
378     }
379
380     query = Query.create('local:user').set(user_params).select('email')
381     results = execute_admin_query(request, query)
382     if not results:
383         raise Exception, "Failed creating manifold user: %s" % user_params['email']
384     result = results[0]
385     return result['email']
386
387 def manifold_update_user(request, email, user_params):
388     # user_params: password, config e.g., 
389     query = Query.update('local:user').filter_by('email', '==', email).set(user_params).select('email')
390     results = execute_admin_query(request,query)
391     # NOTE: results remains empty and goes to Exception. However, it updates the manifold DB.
392     # That's why I commented the exception part. -- Yasin 
393     #if not results:
394     #    raise Exception, "Failed updating manifold user: %s" % user_params['email']
395     #result, = results
396     return results
397
398 def manifold_add_account(request, account_params):
399     query = Query.create('local:account').set(account_params).select(['user', 'platform'])
400     results = execute_admin_query(request,query)
401     if not results:
402         raise Exception, "Failed creating manifold account on platform %s for user: %s" % (account_params['platform'], account_params['user'])
403     result, = results
404     return result['user_id']
405
406 def manifold_update_account(request,user_id,account_params):
407     # account_params: config
408     query = Query.update('local:account').filter_by('platform', '==', 'myslice').filter_by('user_id', '==', user_id).set(account_params).select('user_id')
409     results = execute_admin_query(request,query)
410     return results
411
412 #explicitly mention the platform_id
413 def manifold_delete_account(request, user_id, platform_id = None):
414     query = Query.delete('local:account').filter_by('user_id', '==', user_id)
415     if platform_id is not None:
416         query.filter_by('platform_id', '==', platform_id)
417     results = execute_admin_query(request,query)
418     return results
419
420 def manifold_delete_user(request, user_id):
421     query = Query.delete('local:user').filter_by('user_id', '==', user_id).select('user_id')
422     results = execute_admin_query(request,query)
423     return results
424
425
426 #not tested
427 def manifold_add_platform(request, platform_params):
428     query = Query.create('local:platform').set(platform_params).select(['user', 'platform'])
429     results = execute_admin_query(request,query)
430     if not results:
431         raise Exception, "Failed creating manifold platform %s for user: %s" % (platform_params['platform'], platform_params['user'])
432     result, = results
433     return result['platform_id']
434
435 def delete_local_user(wsgi_request, user_email):
436     user_query = Query().get('local:user') \
437         .filter_by('email', '==', user_email)           \
438         .select('user_id','config')
439     user = execute_admin_query(wsgi_request, user_query)
440     if len(user) == 0:
441         return False
442         #raise Exception, "User not found, check local DB"
443     else:
444         user_id = user[0]['user_id']
445         user_config = json.loads(user[0]['config'])
446         authority_hrn = user_config.get('authority', None)
447         
448         #if is_pi(wsgi_request, '$user_hrn', authority_hrn):
449         try:
450             # removing from Django auth_user
451             UserModel = get_user_model()
452             UserModel._default_manager.filter(email__iexact = user_email).delete()
453
454             # removing manifold account
455             manifold_delete_account(wsgi_request, user_id)           
456                      
457             # removing manifold user
458             manifold_delete_user(wsgi_request, user_id)
459         except Exception, e:
460             #return False
461             print "No sufficient rights on authority = ",authority_hrn
462
463     return True      
464
465
466 def make_request_user(user):
467     request = {}
468     request['type']          = 'user'
469     request['id']            = user.id
470     request['timestamp']     = user.created # XXX in DB ?
471     request['authority_hrn'] = user.authority_hrn
472     request['first_name']    = user.first_name
473     request['last_name']     = user.last_name
474     request['email']         = user.email
475     request['login']         = user.login
476     request['user_hrn']      = user.user_hrn
477     request['public_key']    = user.public_key
478     request['private_key']   = user.private_key
479     return request
480
481 def make_request_slice(slice):
482     request = {}
483     request['type'] = 'slice'
484     request['id'] = slice.id
485     request['user_hrn'] = slice.user_hrn
486     request['timestamp'] = slice.created
487     request['authority_hrn'] = slice.authority_hrn
488     request['slice_name'] = slice.slice_name
489     request['number_of_nodes'] = slice.number_of_nodes
490     request['type_of_nodes'] = slice.type_of_nodes
491     request['purpose'] = slice.purpose
492     return request
493
494 def make_request_project(project):
495     request = {}
496     request['type'] = 'project'
497     request['id'] = project.id
498     request['user_hrn'] = project.user_hrn
499     request['email'] = project.email
500     request['timestamp'] = project.created
501     request['authority_hrn'] = project.authority_hrn
502     request['project_name'] = project.project_name
503     request['purpose'] = project.purpose
504     return request
505
506 def make_request_join(join):
507     request = {}
508     request['type'] = 'join'
509     request['id'] = join.id
510     request['user_hrn'] = join.user_hrn
511     request['email'] = join.email
512     request['timestamp'] = join.created
513     request['authority_hrn'] = join.authority_hrn
514     request['project_name'] = join.project_name
515     return request
516
517 def make_request_authority(authority):
518     request = {}
519     request['type']                  = 'authority'
520     request['id']                    = authority.id
521     request['site_name']             = authority.site_name
522     request['site_latitude']         = authority.site_latitude
523     request['site_longitude']        = authority.site_longitude
524     request['site_url']              = authority.site_url
525     request['site_authority']        = authority.site_authority
526     request['site_abbreviated_name'] = authority.site_abbreviated_name
527     request['address_line1']         = authority.address_line1
528     request['address_line2']         = authority.address_line2
529     request['address_line3']         = authority.address_line3
530     request['address_city']          = authority.address_city
531     request['address_postalcode']    = authority.address_postalcode
532     request['address_state']         = authority.address_state
533     request['address_country']       = authority.address_country
534     request['authority_hrn']         = authority.authority_hrn
535     request['timestamp']             = authority.created
536     return request
537
538 def make_requests(pending_users, pending_slices, pending_authorities, pending_projects, pending_joins):
539     logger.info("$$$$$$$$$$$$$$$  make_request")
540     requests = []
541     for user in pending_users:
542         requests.append(make_request_user(user))
543     for slice in pending_slices:
544         requests.append(make_request_slice(slice))
545     for authority in pending_authorities:
546         requests.append(make_request_authority(authority))
547     for project in pending_projects:
548         requests.append(make_request_project(project))
549     for join in pending_joins:
550         requests.append(make_request_join(join))
551     return requests   
552
553 def get_request_by_id(ids):
554     logger.info("$$$$$$$$$$$$$$$$  get_request_by_id")
555     sorted_ids = { 'user': [], 'slice': [], 'authority': [], 'project': [], 'join': [] }
556     for type__id in ids:
557         type, id = type__id.split('__')
558         sorted_ids[type].append(id)
559         
560     if not ids:
561         pending_users  = PendingUser.objects.all()
562         pending_slices = PendingSlice.objects.all()
563         pending_authorities = PendingAuthority.objects.all()
564         pending_projects = PendingProject.objects.all()
565         pending_joins = PendingJoin.objects.all()
566     else:
567         pending_users  = PendingUser.objects.filter(id__in=sorted_ids['user']).all()
568         pending_slices = PendingSlice.objects.filter(id__in=sorted_ids['slice']).all()
569         pending_authorities = PendingAuthority.objects.filter(id__in=sorted_ids['authority']).all()
570         pending_projects = PendingProject.objects.filter(id__in=sorted_ids['project']).all()
571         pending_joins = PendingJoin.objects.filter(id__in=sorted_ids['join']).all()
572
573     return make_requests(pending_users, pending_slices, pending_authorities, pending_projects, pending_joins)
574
575 def get_requests(authority_hrns=None):
576     logger.info("$$$$$$$$$$$$$   get_request_by_authority auth_hrns = {}".format(authority_hrns))
577     if not authority_hrns:
578         ## get those pending users who have confirmed their emails
579         pending_users  = PendingUser.objects.filter(status__iexact = 'True')
580         pending_slices = PendingSlice.objects.all()
581         pending_authorities = PendingAuthority.objects.all()
582         pending_projects = PendingProject.objects.all()
583         pending_joins = PendingJoin.objects.all()
584     else:
585         pending_users  = PendingUser.objects
586         pending_slices = PendingSlice.objects
587         pending_authorities = PendingAuthority.objects
588         pending_projects = PendingProject.objects
589         pending_joins = PendingJoin.objects
590         from django.db.models import Q
591         list_user_Q = list()
592         list_slice_Q = list()
593         list_auth_Q = list()
594         list_proj_Q = list()
595         list_join_Q = list()
596         for hrn in authority_hrns:
597             list_user_Q.append(Q(authority_hrn__startswith=hrn, status__iexact = 'True'))
598             list_slice_Q.append(Q(authority_hrn__startswith=hrn))
599             list_auth_Q.append(Q(site_authority__startswith=hrn))
600             list_proj_Q.append(Q(authority_hrn__startswith=hrn))
601             list_join_Q.append(Q(authority_hrn__startswith=hrn))
602         from operator import __or__ as OR
603         pending_users        = pending_users.filter(reduce(OR, list_user_Q))
604         pending_slices       = pending_slices.filter(reduce(OR, list_slice_Q))
605         pending_authorities  = pending_authorities.filter(reduce(OR, list_auth_Q))
606         pending_projects     = pending_projects.filter(reduce(OR, list_proj_Q))
607         pending_joins        = pending_joins.filter(reduce(OR, list_join_Q))
608         #pending_authorities  = pending_authorities.all() #filter(reduce(OR, list_Q))
609
610     return make_requests(pending_users, pending_slices, pending_authorities, pending_projects, pending_joins)
611
612 # XXX Is it in sync with the form fields ?
613
614 def portal_validate_request(wsgi_request, request_ids):
615     status = {}
616
617     if not isinstance(request_ids, list):
618         request_ids = [request_ids]
619
620     requests = get_request_by_id(request_ids)
621     for request in requests:
622         # type, id, timestamp, details, allowed -- MISSING: authority_hrn
623         # CAREFUL about details
624         # user  : first name, last name, email, password, keypair
625         # slice : number of nodes, type of nodes, purpose
626         
627         request_status = {}
628         try:
629             if request['type'] == 'user':
630                 create_user(wsgi_request, request)
631                 request_status['SFA user'] = {'status': True }
632                 u = PendingUser.objects.get(id=request['id'])
633                 ctx = {
634                     'first_name'    : u.first_name, 
635                     'last_name'     : u.last_name,
636                     'email'         : u.email,        
637                 }      
638                 user_email = u.email
639
640                 PendingUser.objects.get(id=request['id']).delete()
641
642             elif request['type'] == 'slice':
643                 create_slice(wsgi_request, request)
644                 request_status['SFA slice'] = {'status': True }
645                 s = PendingSlice.objects.get(id=request['id'])
646                 ctx = {
647                     'slice_name'    : s.slice_name, 
648                     'url'           : s.url,
649                     'purpose'       : s.purpose,        
650                     'email'         : s.email,        
651                 }      
652                 user_email = s.email
653
654                 PendingSlice.objects.get(id=request['id']).delete()
655
656                 # Clear user's Credentials
657                 sfa_user = sfa_get_user(wsgi_request, request['user_hrn'])
658                 clear_user_creds(wsgi_request,sfa_user['user_email'])
659
660             elif request['type'] == 'authority':
661                 #hrn = "%s.%s" % (request['authority_hrn'], request['site_authority'])
662                 hrn = request['site_authority']
663                 # XXX tmp sfa dependency
664                 from sfa.util.xrn import Xrn 
665                 urn = Xrn(hrn, request['type']).get_urn()
666                 
667                 # Only hrn is required for Manifold Query 
668                 sfa_authority_params = {
669                     'authority_hrn'        : hrn,
670                     #'authority_urn'        : urn,
671                     #'type'       : request['type'],
672                     #'pi'        : None,
673                     #'enabled'    : True
674                 }
675                 logger.info("ADD Authority")
676                 sfa_add_authority(wsgi_request, sfa_authority_params)
677                 request_status['SFA authority'] = {'status': True }
678                 a = PendingAuthority.objects.get(id=request['id'])
679                 ctx = { 
680                     'site_name'     : a.site_name,
681                     #'short_name'    : a.short_name,
682                     #'url'           : a.url,
683                     'city'          : a.address_city,
684                     'country'       : a.address_country,                          
685                     #'portal_url'    : a.current_site,
686                 }
687                 # address_line1 contains the email of the user in pending_authority table
688                 user_email = a.address_line1
689
690                 PendingAuthority.objects.get(id=request['id']).delete()
691                 
692                 # Clear Admin Cache as it is used to display the list of authorities in Registration page
693                 query = Query.update('myslice:authority').filter_by('authority_hrn', '==', sfa_authority_params['authority_hrn']).set({'authority_hrn':sfa_authority_params['authority_hrn']}).select('authority_hrn')
694                 res = execute_admin_query(request, query)
695
696             elif request['type'] == 'project':
697                 hrn = request['authority_hrn'] + '.' + request['project_name']
698
699                 # Only hrn is required for Manifold Query 
700                 sfa_authority_params = {
701                     'authority_hrn'        : hrn
702                 }
703                 sfa_add_authority(wsgi_request, sfa_authority_params)
704                 
705                 # Add user as a PI of the project
706                 # Clear user's Credentials
707                 authority_add_pis(wsgi_request, hrn , request['user_hrn'])
708
709                 request_status['SFA project'] = {'status': True }
710                 p = PendingProject.objects.get(id=request['id'])
711                 ctx = {
712                     'project_name'  : p.project_name, 
713                     'authority_hrn' : p.authority_hrn,
714                     'email'         : p.email,        
715                     'purpose'       : p.purpose,
716                 }      
717                 user_email = p.email
718
719                 PendingProject.objects.get(id=request['id']).delete()
720
721                 # Clear Admin Cache as it is used to display the list of projects in Slice request page
722                 query = Query.update('myslice:authority').filter_by('authority_hrn', '==', sfa_authority_params['authority_hrn']).set({'authority_hrn':sfa_authority_params['authority_hrn']}).select('authority_hrn')
723                 res = execute_admin_query(request, query)
724
725
726             elif request['type'] == 'join':
727                 # Add user as a PI of the project
728                 # Clear user's Credentials
729                 authority_add_pis(wsgi_request, request['authority_hrn'] , request['user_hrn'])
730
731                 request_status['SFA join'] = {'status': True }
732                 j = PendingJoin.objects.get(id=request['id'])
733                 ctx = {
734                     'project_name'  : j.project_name, 
735                     'authority_hrn' : j.authority_hrn,
736                     'email'         : j.email,        
737                     'user_hrn'      : j.user_hrn,
738                 }      
739                 user_email = j.email
740
741                 PendingJoin.objects.get(id=request['id']).delete()
742             else:
743                 raise Exception, 'unknown type of request %s' % request['type']
744             # XXX Remove from Pendings in database
745
746             send_status_email(wsgi_request, ctx, user_email, request['type'], 'validated')
747         except Exception, e:
748             request_status['SFA '+request['type']] = {'status': False, 'description': str(e)}
749             logger.error('ERROR - actions.py - portal_validate_request: %s' % e)
750             import traceback
751             logger.error(traceback.format_exc())
752
753         status['%s__%s' % (request['type'], request['id'])] = request_status
754
755     return status
756
757 def validate_action(request, **kwargs):
758     ids = filter(None, kwargs['id'].split('/'))
759     status = portal_validate_request(request, ids)
760     json_answer = json.dumps(status)
761     return HttpResponse (json_answer, content_type="application/json")
762
763
764 def reject_action(request, **kwargs):
765     ids = filter(None, kwargs['id'].split('/'))
766     status = portal_reject_request(request, ids)
767     json_answer = json.dumps(status)
768     return HttpResponse (json_answer, content_type="application/json")
769
770 def get_current_site(request):
771     if request.is_secure():
772         current_site = 'https://'
773     else:
774         current_site = 'http://'
775     current_site += request.META['HTTP_HOST']
776     return current_site
777
778 def portal_reject_request(wsgi_request, request_ids):
779     status = {}
780     current_site = get_current_site(wsgi_request)
781     if not isinstance(request_ids, list):
782         request_ids = [request_ids]
783
784     requests = get_request_by_id(request_ids)
785     for request in requests:
786         # type, id, timestamp, details, allowed -- MISSING: authority_hrn
787         # CAREFUL about details
788         # user  : first name, last name, email, password, keypair
789         # slice : number of nodes, type of nodes, purpose
790         
791         request_status = {}
792
793         try:
794             if request['type'] == 'user':
795                 request_status['SFA user'] = {'status': True }
796                 # getting user email based on id 
797                 ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
798                 for user in PendingUser.objects.raw('SELECT * FROM portal_pendinguser WHERE id = %s', [request['id']]):
799                     user_email= user.email
800                     first_name = user.first_name
801                     last_name = user.last_name
802
803                 ctx = {
804                     'first_name'    : first_name, 
805                     'last_name'     : last_name, 
806                     'email'         : user_email,
807                     'portal_url'    : current_site,
808                     }
809
810                 # removing from Django portal_pendinguser
811                 PendingUser.objects.get(id=request['id']).delete()
812                 
813                 delete_local_user(wsgi_request, user_email)
814                           
815             elif request['type'] == 'slice':
816                 request_status['SFA slice'] = {'status': True } 
817
818                 # getting user email based on id 
819                 ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
820                 for user in PendingSlice.objects.raw('SELECT * FROM portal_pendingslice WHERE id = %s', [request['id']]):
821                     user_email= user.type_of_nodes # XXX type_of_nodes field contains the email [shd be renamed in DB]
822                     slice_name = user.slice_name
823                     purpose = user.purpose
824                     url = user.number_of_nodes
825
826                 ctx = {
827                     'slice_name': slice_name,
828                     'purpose': purpose,
829                     'url': url,
830                     'portal_url': current_site,
831                     }
832
833                 PendingSlice.objects.get(id=request['id']).delete()
834
835             elif request['type'] == 'authority':
836                 request_status['SFA authority'] = {'status': True }
837                 
838                 # getting user email based on id 
839                 ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
840                 for user in PendingAuthority.objects.raw('SELECT * FROM portal_pendingauthority WHERE id = %s', [request['id']]):
841                     user_email= user.address_line1 # XXX address_line1 field contains the email [shd be renamed in DB]
842                     site_name = user.site_name
843                     city = user.address_city
844                     country = user.address_country
845                     short_name = user.site_abbreviated_name
846                     url = user.site_url
847
848                 ctx = { 
849                     'site_name': site_name,
850                     'short_name': short_name,
851                     'url': url,
852                     'city': city,
853                     'country': country,                          
854                     'portal_url'    : current_site,
855                     }
856                     
857                 PendingAuthority.objects.get(id=request['id']).delete()
858
859             # XXX TMP we should send an email to the user to inform him/her
860             elif request['type'] == 'project':
861                 request_status['SFA project'] = {'status': True }
862                 p = PendingProject.objects.get(id=request['id'])
863                 ctx = {
864                     'project_name'  : p.project_name, 
865                     'authority_hrn' : p.authority_hrn,
866                     'email'         : p.email,        
867                     'purpose'       : p.purpose,
868                 }      
869                 user_email = p.email
870                 PendingProject.objects.get(id=request['id']).delete()
871
872             elif request['type'] == 'join':
873                 request_status['SFA join'] = {'status': True }
874                 j = PendingJoin.objects.get(id=request['id'])
875                 ctx = {
876                     'project_name'  : j.project_name, 
877                     'authority_hrn' : j.authority_hrn,
878                     'email'         : j.email,        
879                     'user_hrn'      : j.user_hrn,
880                 }      
881
882                 user_email = j.email
883                 PendingJoin.objects.get(id=request['id']).delete()
884             else:
885                 raise Exception, 'unknown type of request %s' % request['type']
886
887             send_status_email(wsgi_request, ctx, user_email, request['type'], 'denied')
888         except Exception, e:
889             request_status['SFA '+request['type']] = {'status': False, 'description': str(e)}
890             logger.error('ERROR - actions.py - portal_reject_request: %s' % e)
891             import traceback
892             logger.error(traceback.format_exc())
893
894         status['%s__%s' % (request['type'], request['id'])] = request_status
895
896     return status
897
898 def send_status_email(request, ctx, user_email, obj_type, status):
899     try:
900         ctx['current_site'] = get_current_site(request)
901         ctx['theme'] = theme
902
903         theme.template_name = obj_type + '_request_' + status + '.txt'
904         text_content = render_to_string(theme.template, ctx)
905         theme.template_name = obj_type + '_request_' + status + '.html'
906         html_content = render_to_string(theme.template, ctx)
907         theme.template_name = 'email_default_sender.txt'
908
909         sender =  render_to_string(theme.template, ctx)
910         sender = sender.replace('\n', '')
911                        
912         subject = obj_type.title() + ' request '+ status
913     
914         msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
915         msg.attach_alternative(html_content, "text/html")
916         msg.send()
917     except Exception as e:
918         print e
919         logger.error("Failed to send email, please check the mail templates and the SMTP configuration of your server")
920
921
922 # Django and ajax
923 # http://djangosnippets.org/snippets/942/
924
925
926
927 #-------------------------------------------------------------------------------
928 # REQUESTS - Slices
929 #-------------------------------------------------------------------------------
930
931 def create_slice(wsgi_request, request):
932     """
933     Arguments:
934         wsgi_request (~ WSGIRequest) : 
935         request (dict) : the slice request in our own dict format
936
937     Raises:
938         Exception
939     """
940     hrn = "%s.%s" % (request['authority_hrn'], request['slice_name'])
941     # XXX tmp sfa dependency
942     from sfa.util.xrn import Xrn 
943     urn = Xrn(hrn, request['type']).get_urn()
944     
945     # Add User to Slice if we have the user_hrn in pendingslice table
946     user_hrn = request.get('user_hrn', None)
947     user_hrns = list([user_hrn]) if user_hrn else list()
948    
949     # CACHE PB with fields
950     page = Page(wsgi_request)
951     metadata = page.get_metadata()
952     user_md = metadata.details_by_object('user')
953     user_fields = [column['name'] for column in user_md['column']]
954
955     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
956     #user_query  = Query().get('myslice:user').select('user_hrn','user_email').filter_by('user_hrn','==',user_hrn)
957     user_query  = Query().get('myslice:user').select(user_fields).filter_by('user_hrn','==',user_hrn)
958     user_details_sfa = execute_admin_query(wsgi_request, user_query)
959     if not user_details_sfa:
960         raise Exception, "User %s doesn't exist, validate user before validating slice" % user_hrn
961     for user in user_details_sfa:
962         user_email = user['user_email']
963
964     # XXX LOIC Quick fix because this is totally inconsistent
965     if not 'number_of_nodes' in request:
966         request['number_of_nodes']=""
967
968     # Slice is under a project
969     if len(request['authority_hrn'].split('.')) > 2:
970         pi_list = []
971         pis = authority_get_pis(wsgi_request, request['authority_hrn'])
972         for pi in pis:
973             pi_list = pi['pi_users']
974         user_hrns.extend(pi_list)
975
976     # XXX We should create a slice with Manifold terminology
977     slice_params = {
978         'slice_hrn'        : hrn, 
979         'slice_urn'        : urn,
980         'slice_type'       : request['type'],
981         'url'              : request['number_of_nodes'],
982         'users'            : user_hrns,
983         'slice_enabled'    : True
984     }
985     # ignored in request: id, timestamp,  number_of_nodes, type_of_nodes, purpose
986
987     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
988     query = Query.create('myslice:slice').set(slice_params).select('slice_hrn')
989     results = execute_query(wsgi_request, query)
990     if not results:
991         raise Exception, "Could not create %s. Already exists ?" % slice_params['hrn']
992     else:
993         try:
994             for u_hrn in user_hrns:
995                 u_email = get_user_email(wsgi_request, u_hrn)
996                 clear_user_creds(wsgi_request, u_email)
997         except Exception as e:
998             logger.error("Failed clear credentials for all users")
999             clear_user_creds(wsgi_request,user_email)
1000         # log user activity
1001         activity.slice.validate(request, { "slice" : hrn })
1002        
1003     return results
1004
1005 def create_pending_slice(wsgi_request, request, email):
1006     """
1007     """
1008
1009     # Insert an entry in the PendingSlice table
1010     s = PendingSlice(
1011         slice_name      = request['slice_name'],
1012         user_hrn        = request['user_hrn'],
1013         authority_hrn   = request['authority_hrn'],
1014         number_of_nodes = request['url'], # field needs to be renamed
1015         purpose         = request['purpose'],
1016         type_of_nodes   = request['email'] # field needs to be renamed 
1017     )
1018     s.save()
1019
1020     send_email_to_pis(wsgi_request, request, 'slice')
1021
1022 def create_pending_project(wsgi_request, request):
1023     """
1024     """
1025
1026     # Insert an entry in the PendingProject table
1027     s = PendingProject(
1028         project_name    = request['project_name'],
1029         user_hrn        = request['user_hrn'],
1030         email           = request['email'],
1031         authority_hrn   = request['authority_hrn'],
1032         purpose         = request['purpose'],
1033     )
1034     s.save()
1035
1036     send_email_to_pis(wsgi_request, request, 'project')
1037
1038 def create_pending_join(wsgi_request, request):
1039     """
1040     """
1041
1042     # Insert an entry in the PendingJoin table
1043     s = PendingJoin(
1044         user_hrn        = request['user_hrn'],
1045         email           = request['email'],
1046         project_name    = request['project_name'],
1047         authority_hrn   = request['authority_hrn'],
1048     )
1049     s.save()
1050
1051     send_email_to_pis(wsgi_request, request, 'join')
1052
1053 #-------------------------------------------------------------------------------
1054 # SEND EMAILS
1055 #-------------------------------------------------------------------------------
1056
1057 def send_email_to_pis(request, context, obj_type):
1058     try:
1059         context['current_site'] = get_current_site(request)
1060         context['theme'] = theme
1061         # Send an email: the recipients are the PIs of the authority
1062         recipients = authority_get_pi_emails(request, context['authority_hrn'])
1063
1064         theme.template_name = obj_type + '_request_email.txt' 
1065         text_content = render_to_string(theme.template, context)
1066
1067         theme.template_name = obj_type + '_request_email.html' 
1068         html_content = render_to_string(theme.template, context)
1069
1070         #theme.template_name = obj_type + '_request_email_subject.txt'
1071         #subject = render_to_string(theme.template, request)
1072         #subject = subject.replace('\n', '')
1073         subject = "New "+obj_type+" request"
1074
1075         theme.template_name = 'email_default_sender.txt'
1076         sender =  render_to_string(theme.template, context)
1077         sender = sender.replace('\n', '')
1078
1079         msg = EmailMultiAlternatives(subject, text_content, sender, recipients)
1080         msg.attach_alternative(html_content, "text/html")
1081         msg.send()
1082     except Exception, e:
1083         print e
1084         print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
1085
1086
1087 #-------------------------------------------------------------------------------
1088 # REQUESTS - Users
1089 #-------------------------------------------------------------------------------
1090
1091 def manifold_add_reference_user_accounts(wsgi_request, request):
1092     """When a new user is created, add reference accounts to the reference platform.
1093     """
1094     # XXX XXX XXX The rest of this function has to be checked XXX XXX XXX
1095
1096     # Retrieve user information
1097     user_query  = Query().get('local:user')             \
1098         .select('user_id', 'config', 'email', 'status') \
1099         .filter_by('email', '==', request['email'])
1100     user_details = execute_admin_query(wsgi_request, user_query)
1101
1102     # USER MAIN ACCOUNT != reference
1103     #print 'USER MAIN ACCOUNT != reference'
1104     list_accounts_query = Query().get('local:account')              \
1105         .select('user_id', 'platform_id', 'auth_type', 'config')    \
1106         .filter_by('user_id', '==', user_details[0]['user_id'])     \
1107         .filter_by('auth_type', '!=', 'reference')
1108     list_accounts = execute_admin_query(wsgi_request, list_accounts_query)
1109
1110     # XXX main_platform is being erased several times ???
1111     for account in list_accounts:
1112         main_platform_query = Query().get('local:platform')         \
1113             .select('platform_id', 'platform')                      \
1114             .filter_by('platform_id', '==', account['platform_id'])
1115         main_platform = execute_admin_query(wsgi_request, main_platform_query)
1116
1117     # Add reference accounts on SFA enabled platforms
1118     platforms_query = Query().get('local:platform') \
1119         .filter_by('disabled', '==', '0')           \
1120         .filter_by('gateway_type', '==', 'sfa')     \
1121         .select('platform_id', 'gateway_type')
1122     platforms = execute_admin_query(wsgi_request, platforms_query)
1123     for platform in platforms:
1124         #print "add reference to platform ",platform
1125         manifold_account_params = {
1126             'user_id'       : user_details[0]['user_id'],
1127             'platform_id'   : platform['platform_id'],
1128             'auth_type'     : 'reference',
1129             'config'        : '{"reference_platform": "' + main_platform[0]['platform'] + '"}',
1130         }
1131         manifold_add_account(wsgi_request, manifold_account_params)
1132
1133 def sfa_create_user(wsgi_request, request, namespace = None, as_admin = False):
1134     """
1135     Arguments:
1136         wsgi_request (~ WSGIRequest) : 
1137         request (dict) : the user request in our own dict format
1138
1139     Raises:
1140         Exception
1141     """
1142     from sfa.util.xrn import Xrn 
1143
1144     auth_pi = request.get('pi', None)
1145     auth_pi = list([auth_pi]) if auth_pi else list()
1146
1147     # We create a user request with Manifold terminology
1148     sfa_user_params = {
1149         'user_hrn'          : request['user_hrn'],
1150         'user_email'        : request['email'],
1151         'user_urn'          : Xrn(request['user_hrn'], request['type']).get_urn(),
1152         'user_type'         : request['type'],
1153         'keys'              : request['public_key'],
1154         'user_first_name'   : request['first_name'],
1155         'user_last_name'    : request['last_name'],
1156         'pi_authorities'    : auth_pi,
1157         'user_enabled'      : True
1158     }
1159
1160     if namespace is not None:
1161         query = Query.create('%s:user' % namespace).set(sfa_user_params).select('user_hrn')
1162     else:
1163         # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
1164         query = Query.create('myslice:user').set(sfa_user_params).select('user_hrn')
1165
1166     if as_admin:
1167         results = execute_admin_query(wsgi_request, query)
1168     else:
1169         results = execute_query(wsgi_request, query)
1170
1171     if not results:
1172         raise Exception, "Could not create %s. Already exists ?" % sfa_user_params['user_hrn']
1173
1174     return results
1175
1176 def iotlab_create_user (wsgi_request, request, namespace = None, as_admin=False):
1177    
1178     import requests
1179     import time
1180     from requests.auth import HTTPBasicAuth
1181    
1182     engine = ConfigEngine() 
1183     URL_REST = engine.iotlab_url()
1184     LOGIN_ADMIN = engine.iotlab_admin_user()
1185     PASSWORD_ADMIN = engine.iotlab_admin_password()
1186
1187     auth = HTTPBasicAuth(LOGIN_ADMIN,PASSWORD_ADMIN)
1188     headers = {'content-type': 'application/json'}
1189
1190     for user in PendingUser.objects.raw('SELECT * FROM portal_pendinguser WHERE email = %s', [request['email']]):
1191         password= user.password
1192
1193
1194     iotlab_user_params = {
1195         "type"          : "SA",
1196         #"login"         : request['email'], #auto generated by iotlab
1197         "password"      : password,
1198         "firstName"     : request['first_name'],
1199         "lastName"      : request['last_name'],
1200         "email"         : request['email'],
1201         "structure"     : request['authority_hrn'],
1202         "city"          : "N/A",
1203         "country"       : "N/A",
1204         "sshPublicKey"  : request['public_key'],
1205         "motivations"   : "SFA federation",
1206     }    
1207    
1208     iotlab_user_params1 = json.dumps(iotlab_user_params)
1209     r=requests.post(url=URL_REST, data=iotlab_user_params1, headers=headers, auth=auth)
1210     logger.info('Create iotlab user : {} {}'.format(r.status_code, r.text))
1211     return r.text
1212
1213 def create_user(wsgi_request, request, namespace = None, as_admin = False):
1214     # XXX This has to be stored centrally
1215     USER_STATUS_ENABLED = 2
1216
1217     # NOTE : if we were to create a user directly (just like we create slices,
1218     # we would have to perform the steps in create_pending_user too
1219
1220     # Add the user to the SFA registry
1221     sfa_create_user(wsgi_request, request, namespace, as_admin)
1222
1223     # Update Manifold user status
1224     manifold_update_user(wsgi_request, request['email'], {'status': USER_STATUS_ENABLED})
1225
1226     # Add reference accounts for platforms
1227     manifold_add_reference_user_accounts(wsgi_request, request)
1228
1229     # Add the user to iotlab portal if theme is set to onelab
1230     if theme.theme == 'onelab':
1231         iotlab_create_user (wsgi_request, request)
1232
1233 def create_pending_user(wsgi_request, request, user_detail):
1234     """
1235     """
1236
1237     # Insert an entry in the PendingUser table
1238     b = PendingUser(
1239         first_name    = request['first_name'],
1240         last_name     = request['last_name'],
1241         authority_hrn = request['authority_hrn'],
1242         email         = request['email'],
1243         password      = request['password'],
1244         public_key    = request['public_key'],
1245         private_key   = request['private_key'],
1246         user_hrn      = request['user_hrn'],
1247         pi            = request['pi'],
1248         email_hash    = request['email_hash'],
1249         status        = 'False',
1250     )
1251     b.save()
1252     # sends email to user to activate the email
1253     request['current_site'] = get_current_site(wsgi_request)
1254     request['theme'] = theme
1255     theme.template_name = 'activate_user.html'
1256     html_content = render_to_string(theme.template, request)
1257     theme.template_name = 'activate_user.txt'
1258     text_content = render_to_string(theme.template, request)
1259     theme.template_name = 'activate_user_email_subject.txt'
1260     subject = render_to_string(theme.template, request)
1261     subject = subject.replace('\n', '')
1262     theme.template_name = 'email_default_sender.txt'
1263     sender =  render_to_string(theme.template, request)
1264     sender = sender.replace('\n', '')
1265     recipient = [request['email']]
1266     #recipient = recipient.append(request['email'])
1267
1268     msg = EmailMultiAlternatives(subject, text_content, sender, recipient)
1269     msg.attach_alternative(html_content, "text/html")
1270     msg.send()
1271    
1272     # saves the user to django auth_user table [needed for password reset]
1273     user = User.objects.create_user(request['email'], request['email'], request['password'])
1274
1275     # Creating a manifold user
1276     user_id = manifold_add_user(wsgi_request, request)
1277
1278     # Creating a Manifold account on the MySlice platform
1279     # Note the JSON representation of public and private keys already includes quotes
1280     account_config = {
1281         'user_hrn'          : request['user_hrn'],
1282         'user_public_key'   : request['public_key'],
1283     }
1284     if request['private_key']:
1285         account_config['user_private_key'] = request['private_key']
1286
1287     user_id = user_detail['user_id'] + 1 # the user_id for the newly created user in local:user
1288
1289     # XXX TODO: Require a myslice platform
1290     # ALERT: this will disapear with ROUTERV2 of Manifold
1291     # We have to consider the case where several registries can be used
1292     # Removed hardcoded platform = 5
1293     # This platform == 'myslice' is a TMP FIX !!
1294     try:
1295         reg_platform_query = Query().get('local:platform') \
1296             .filter_by('platform', '==', 'myslice')           \
1297             .select('platform_id')
1298         reg_platform = execute_admin_query(wsgi_request, reg_platform_query)
1299
1300         reg_platform_id = reg_platform[0]['platform_id']
1301         account_params = {
1302             'platform_id'   : reg_platform_id, # XXX ALERT !!
1303             'user_id'       : user_id, 
1304             'auth_type'     : request['auth_type'], 
1305             'config'        : json.dumps(account_config),
1306         }
1307         manifold_add_account(wsgi_request, account_params)
1308
1309     # Email to PIs is sent when the user activates his email
1310     # portal/emailactivationview.py
1311
1312     except Exception as e:
1313         logger.error("Failed creating manifold account on platform {} for user: {}".format('myslice', request['email']))
1314