cc4d9886fa898f99e46c41848d696c39a76ccf83
[unfold.git] / portal / actions.py
1 from django.http                    import HttpResponse
2 from manifold.core.query            import Query
3 from manifoldapi.manifoldapi        import execute_query,execute_admin_query
4 from portal.models                  import PendingUser, PendingSlice, PendingAuthority, PendingProject, PendingJoin
5 from unfold.page                    import Page
6
7 import json
8
9 from django.contrib.auth.models     import User
10 from django.contrib.sites.models    import Site
11 from django.contrib.auth            import get_user_model
12 from django.template.loader         import render_to_string
13 from django.core.mail               import EmailMultiAlternatives, send_mail
14
15 from myslice.theme                  import ThemeView
16 from myslice.configengine           import ConfigEngine
17 from myslice.settings               import logger
18
19 theme = ThemeView()
20
21 import activity.slice
22
23 # Thierry: moving this right into the code so 
24 # most people can use myslice without having to install sfa
25 # XXX tmp sfa dependency, should be moved to SFA gateway
26 #from sfa.util.xrn                import Xrn 
27
28 def get_myslice_platform(request):
29     platform_query  = Query().get('local:platform').select('platform_id','platform','gateway_type','disabled','config').filter_by('platform','==','myslice')
30     platform_details = execute_query(request, platform_query)
31     if isinstance(platform_details,list):
32         for platform_detail in platform_details:
33             return platform_detail
34     else:
35         return None
36
37 def get_myslice_account(request):
38     try:
39         platform_myslice = get_myslice_platform(request)
40         account_query  = Query().get('local:account').select('user_id','platform_id','auth_type','config').filter_by('platform_id','==',platform_myslice['platform_id'])
41         account_details = execute_query(request, account_query)
42         for account_detail in account_details:
43             return account_detail
44     except Exception as e:
45         print e
46         return None
47
48 def get_registry_url(request):
49     try:
50         platform_detail = get_myslice_platform(request)
51         platform_config = json.loads(platform_detail['config'])
52         import socket
53         hostname = socket.gethostbyaddr(socket.gethostname())[0]
54         registry = platform_config.get('registry','N/A')
55         if 'localhost' in registry:
56             port = registry.split(':')[-1:][0]
57             registry = "http://" + hostname +':'+ port
58         return registry
59     except Exception as e:
60         print e
61         return None
62
63 def get_jfed_identity(request):
64     try:
65         account_detail = get_myslice_account(request)
66         account_config = json.loads(account_detail['config'])
67         if 'user_private_key' in account_config:
68             private_key = account_config['user_private_key']
69             user_hrn = account_config.get('user_hrn','N/A')
70             platform_detail = get_myslice_platform(request)
71             registry = get_registry_url(request)
72             #registry = 'http://sfa-fed4fire.pl.sophia.inria.fr:12345/'
73             jfed_identity = user_hrn + '\n' + registry + '\n' + private_key 
74             return jfed_identity
75         else:
76             return None
77     except Exception as e:
78         print e
79         return None
80
81 # Get the list of pis in a given authority
82 def authority_get_pis(request, authority_hrn):
83     # CACHE PB with fields
84     page = Page(request)
85     metadata = page.get_metadata()
86     auth_md = metadata.details_by_object('authority')
87     auth_fields = [column['name'] for column in auth_md['column']]
88
89     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
90     query = Query.get('myslice:authority').filter_by('authority_hrn', '==', authority_hrn).select(auth_fields)
91     results = execute_admin_query(request, query)
92     #print "authority_get_pis = %s" % results
93     # NOTE: temporarily commented. Because results is giving empty list. 
94     # Needs more debugging
95     #if not results:
96     #    raise Exception, "Authority not found: %s" % authority_hrn
97     #result, = results
98     #return result['pi_users']
99     return results
100
101 #check the user is pi or not in the registry
102 def authority_check_pis(request, user_email):
103     try:
104         user_query  = Query().get('local:user').filter_by('email', '==', user_email).select('user_id','email','password','config')
105         user_details = execute_admin_query(request, user_query)
106     
107         # getting the authority_hrn
108         for user_detail in user_details:
109             user_id = user_detail['user_id']
110             if user_detail['config']:
111                 config = json.loads(user_detail['config'])
112                 authority_hrn = config.get('authority','Unknown Authority')
113  
114         account_query  = Query().get('local:account').filter_by('user_id', '==', user_id).select('user_id','platform_id','auth_type','config')
115         account_details = execute_admin_query(request, account_query)
116     
117         platform_query  = Query().get('local:platform').select('platform_id','platform')
118         platform_details = execute_admin_query(request, platform_query)
119     
120         for account_detail in account_details:
121             for platform_detail in platform_details:
122                 if platform_detail['platform_id'] == account_detail['platform_id']:
123                     if 'myslice' in platform_detail['platform']:
124                         account_config = json.loads(account_detail['config'])
125                         user_hrn = account_config.get('user_hrn','N/A')
126
127         pi_status = False
128         pis = authority_get_pis (request, authority_hrn)
129         for pi in pis:
130             pi_list = pi['pi_users']
131
132         if user_hrn in pi_list:
133             pi_status = True
134         return pi_status
135
136     except Exception as e:
137         logger.error("Exception in actions.py in authority_check_pis {}".format(e))
138         return None
139
140
141 def authority_add_pis(request, authority_hrn, user_hrn):
142     try:
143         pi_list = []
144         # getting pis of the authority of the user
145         pis = authority_get_pis (request, authority_hrn)
146         for pi in pis:
147             pi_list = pi['pi_users']
148    
149         updated_pi_list = pi_list.append(user_hrn) 
150         query = Query.update('myslice:authority').filter_by('authority_hrn', '==', authority_hrn).set({'pi_users':pi_list})
151         results = execute_query(request,query)
152         newpis = authority_get_pis (request, authority_hrn)
153        
154         # Add the user to the slices of the project he/she joined
155         if len(authority_hrn.split('.')) > 2:
156             # this authority_hrn is a project
157             query_slices = Query.get('myslice:slice').filter_by('parent_authority', '==', authority_hrn).select('slice_hrn')
158             results_slices = execute_query(request,query_slices)
159             for s in results_slices:
160                 sfa_add_user_to_slice(request, user_hrn, s['slice_hrn'])
161         # Clear Credentials of the user 
162         user_email = get_user_email(request, user_hrn)
163         clear_user_creds(request, user_email)
164
165         return newpis
166     except Exception as e: 
167         logger.error("Exception in actions.py in authority_add_pis {}".format(e))
168         raise Exception, "Exception in actions.py in authority_add_pis {}".format(e)
169
170 def authority_remove_pis(request, authority_hrn, user_hrn):
171     try:
172         pi_list = []
173         # getting pis of the authority of the user
174         pis = authority_get_pis (request, authority_hrn)
175         for pi in pis:
176             pi_list = pi['pi_users']
177  
178         updated_pi_list = pi_list.remove(user_hrn) 
179         query = Query.update('myslice:authority').filter_by('authority_hrn', '==', authority_hrn).set({'pi_users':pi_list})
180         results = execute_query(request,query)
181         newpis = authority_get_pis (request, authority_hrn)
182
183         # Remove the user from the slices of the project he/she left
184         if len(authority_hrn.split('.')) > 2:
185             # this authority_hrn is a project
186             query_slices = Query.get('myslice:slice').filter_by('parent_authority', '==', authority_hrn).select('slice_hrn')
187             results_slices = execute_query(request,query_slices)
188             for s in results_slices:
189                 print 'remove from slice %s' % s
190                 sfa_remove_user_from_slice(request, user_hrn, s['slice_hrn'])
191
192         # Clear Credentials of the user 
193         user_email = get_user_email(request, user_hrn)
194         clear_user_creds(request, user_email)
195
196         return newpis
197     except Exception as e: 
198         logger.error("Exception in actions.py in authority_remove_pis {}".format(e))
199         raise Exception, "Exception in actions.py in authority_remove_pis {}".format(e)
200
201
202 def authority_get_pi_emails(request, authority_hrn):
203     pi_users = authority_get_pis(request,authority_hrn)
204     logger.info("pi_users = %s" % pi_users)
205
206     if any(pi['pi_users'] == None or not pi['pi_users']  for pi in pi_users):
207         #theme.template_name = 'email_default_recipients.txt' 
208         #default_email = render_to_string(theme.template, request)
209         #default_email = default_email.replace('\n', '')
210         #return default_email
211         # the above doesn't work
212         return ['support@onelab.eu']
213     else:
214         pi_user_hrns = [ hrn for x in pi_users for hrn in x['pi_users'] ]
215
216         # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
217         query = Query.get('myslice:user').filter_by('user_hrn', 'included', pi_user_hrns).select('user_email')
218         results = execute_admin_query(request, query)
219         return [result['user_email'] for result in results]
220
221 def get_user_email(request, user_hrn):
222     query = Query.get('myslice:user').filter_by('user_hrn', '==', user_hrn).select('user_email')
223     results = execute_admin_query(request, query)
224     return results[0]['user_email'] 
225
226 #clear user credentials
227 def clear_user_creds(request, user_email):
228     try:
229         user_query  = Query().get('local:user').filter_by('email', '==', user_email).select('user_id','email','password','config')
230         user_details = execute_admin_query(request, user_query)
231     
232         # getting the user_id from the session
233         for user_detail in user_details:
234             user_id = user_detail['user_id']
235             user_email = user_detail['email']
236     
237         account_query  = Query().get('local:account').filter_by('user_id', '==', user_id).select('user_id','platform_id','auth_type','config')
238         account_details = execute_admin_query(request, account_query)
239     
240         platform_query  = Query().get('local:platform').select('platform_id','platform')
241         platform_details = execute_admin_query(request, platform_query)
242     
243         for account_detail in account_details:
244             for platform_detail in platform_details:
245                 if platform_detail['platform_id'] == account_detail['platform_id']:
246                     if 'myslice' in platform_detail['platform']:
247                         account_config = json.loads(account_detail['config'])
248                         #user_cred = account_config.get('delegated_user_credential','N/A')
249                         user_cred = account_config.get('user_credential','N/A')
250                         if 'N/A' not in user_cred:
251                             user_hrn = account_config.get('user_hrn','N/A')
252                             user_pub_key = json.dumps(account_config.get('user_public_key','N/A'))
253                             user_priv_key = json.dumps(account_config.get('user_private_key','N/A'))
254                             updated_config = '{"user_public_key":'+ user_pub_key + ', "user_private_key":'+ user_priv_key + ', "user_hrn":"'+ user_hrn + '"}'
255                             user_params = { 'config': updated_config}
256                             manifold_update_account(request, user_id,user_params)
257                             return user_email
258                         else:
259                             return None
260
261     except Exception as e:
262         logger.error("Exception in actions.py in clear_user_creds {}".format(e))
263         return None
264
265 def is_pi(wsgi_request, user_hrn, authority_hrn):
266     # authorities from user where user_hrn == "ple.upmc.jordan_auge"
267     logger.debug("#### actions.py is_pi authority_hrn = {}".format(authority_hrn))
268     try:
269         # CACHE PB with fields
270         page = Page(wsgi_request)
271         metadata = page.get_metadata()
272         user_md = metadata.details_by_object('user')
273         user_fields = [column['name'] for column in user_md['column']]
274         
275         # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
276         query  = Query().get('myslice:user').select(user_fields).filter_by('user_hrn','==',user_hrn)
277         #query = Query.get('myslice:user').filter_by('user_hrn', '==', user_hrn).select('pi_authorities')
278         results = execute_query(wsgi_request, query)
279         for user_detail in results:
280             if authority_hrn in user_detail['pi_authorities']:
281                 return True
282     except Exception as e:
283         logger.error("Exception in actions.py in is_pi {}".format(e))
284     return False
285     
286 # SFA get record
287
288 def sfa_get_user(request, user_hrn, pub=None):
289
290     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
291     query_sfa_user = Query.get('myslice:user').filter_by('user_hrn', '==', user_hrn)
292     result_sfa_user = execute_admin_query(request, query_sfa_user)
293     return result_sfa_user[0]                        
294
295 def sfa_update_user(request, user_hrn, user_params):
296     # user_params: keys [public_key] 
297     if 'email' in user_params:
298         user_params['user_email'] = user_params['email']
299
300     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
301     query = Query.update('myslice:user').filter_by('user_hrn', '==', user_hrn).set(user_params).select('user_hrn')
302     results = execute_admin_query(request,query)
303     return results
304
305 def sfa_add_authority(request, authority_params):
306
307     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
308     query = Query.create('myslice:authority').set(authority_params).select('authority_hrn')
309     results = execute_query(request, query)
310     logger.info("sfa_add_auth results={}".format(results))
311     if not results:
312         raise Exception, "Could not create %s. Already exists ?" % authority_params['hrn']
313     return results
314
315 def sfa_add_user_to_slice(request, user_hrn, slice_hrn):
316 # UPDATE myslice:slice SET users = ['fed4fire.upmc.loic_baron', 'fed4fire.upmc.mohammed-yasin_rahman', 'fed4fire.upmc.demo'] WHERE slice_hrn == 'fed4fire.upmc.project_y.test_under' SELECT slice_hrn, slice_urn
317     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
318     query_current_users = Query.get('myslice:slice').select('users').filter_by('slice_hrn','==',slice_hrn)
319     results_current_users = execute_query(request, query_current_users)
320     current_users = list()
321     for r in results_current_users:
322         current_users.extend(r['users'])
323     users = list(set([user_hrn]) | set(current_users))
324
325     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
326     query = Query.update('myslice:slice').filter_by('slice_hrn', '==', slice_hrn).set({'users':users}).select('slice_hrn')
327     results = execute_query(request, query)
328 # Also possible but not supported yet
329 # UPDATE myslice:user SET slice=['ple.upmc.agent','ple.upmc.myslicedemo','ple.upmc.tophat'] where user_hrn=='ple.upmc.azerty'
330     if not results:
331         raise Exception, "Could not add user %s to slice %s" % (user_hrn, slice_hrn)
332     return results
333
334 def sfa_remove_user_from_slice(request, user_hrn, slice_hrn):
335 # UPDATE myslice:slice SET users = ['fed4fire.upmc.loic_baron', 'fed4fire.upmc.demo'] WHERE slice_hrn == 'fed4fire.upmc.project_y.test_under' SELECT slice_hrn, slice_urn
336     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
337     query_current_users = Query.get('myslice:slice').select('users').filter_by('slice_hrn','==',slice_hrn)
338     results_current_users = execute_query(request, query_current_users)
339     current_users = list()
340     for r in results_current_users:
341         current_users.extend(r['users'])
342     if user_hrn in current_users:
343         current_users.remove(user_hrn)
344
345     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
346     query = Query.update('myslice:slice').filter_by('slice_hrn', '==', slice_hrn).set({'users':current_users}).select('slice_hrn')
347     results = execute_query(request, query)
348 # Also possible but not supported yet
349 # UPDATE myslice:user SET slice=['ple.upmc.agent','ple.upmc.myslicedemo','ple.upmc.tophat'] where user_hrn=='ple.upmc.azerty'
350     if not results:
351         raise Exception, "Could not remove user %s to slice %s" % (user_hrn, slice_hrn)
352     return results
353
354 # Propose hrn
355
356 def manifold_add_user(wsgi_request, request):
357     """Add a Manifold user corresponding to a user request.
358
359     Args:
360         wsgi_request: a WSGIRequest instance
361         request (dict): a dictionary containing the user request built from the
362             form.
363
364     Returns:
365         The user_id of the inserted user.
366
367     Raises:
368         ?
369     
370     """
371     USER_CONFIG = '{"firstname": "%(first_name)s", "lastname": "%(last_name)s", "authority": "%(authority_hrn)s"}'
372
373     user_params = {
374         'email'     : request['email'],
375         'password'  : request['password'],
376         'config'    : USER_CONFIG % request,
377         'status'    : 1,
378     }
379
380     query = Query.create('local:user').set(user_params).select('email')
381     results = execute_admin_query(request, query)
382     if not results:
383         raise Exception, "Failed creating manifold user: %s" % user_params['email']
384     result = results[0]
385     return result['email']
386
387 def manifold_update_user(request, email, user_params):
388     # user_params: password, config e.g., 
389     query = Query.update('local:user').filter_by('email', '==', email).set(user_params).select('email')
390     results = execute_admin_query(request,query)
391     # NOTE: results remains empty and goes to Exception. However, it updates the manifold DB.
392     # That's why I commented the exception part. -- Yasin 
393     #if not results:
394     #    raise Exception, "Failed updating manifold user: %s" % user_params['email']
395     #result, = results
396     return results
397
398 def manifold_add_account(request, account_params):
399     query = Query.create('local:account').set(account_params).select(['user', 'platform'])
400     results = execute_admin_query(request,query)
401     if not results:
402         raise Exception, "Failed creating manifold account on platform %s for user: %s" % (account_params['platform'], account_params['user'])
403     result, = results
404     return result['user_id']
405
406 def manifold_update_account(request,user_id,account_params):
407     # account_params: config
408     query = Query.update('local:account').filter_by('platform', '==', 'myslice').filter_by('user_id', '==', user_id).set(account_params).select('user_id')
409     results = execute_admin_query(request,query)
410     return results
411
412 #explicitly mention the platform_id
413 def manifold_delete_account(request, user_id, platform_id = None):
414     query = Query.delete('local:account').filter_by('user_id', '==', user_id)
415     if platform_id is not None:
416         query.filter_by('platform_id', '==', platform_id)
417     results = execute_admin_query(request,query)
418     return results
419
420 def manifold_delete_user(request, user_id):
421     query = Query.delete('local:user').filter_by('user_id', '==', user_id).select('user_id')
422     results = execute_admin_query(request,query)
423     return results
424
425
426 #not tested
427 def manifold_add_platform(request, platform_params):
428     query = Query.create('local:platform').set(platform_params).select(['user', 'platform'])
429     results = execute_admin_query(request,query)
430     if not results:
431         raise Exception, "Failed creating manifold platform %s for user: %s" % (platform_params['platform'], platform_params['user'])
432     result, = results
433     return result['platform_id']
434
435 def delete_local_user(wsgi_request, user_email):
436     user_query = Query().get('local:user') \
437         .filter_by('email', '==', user_email)           \
438         .select('user_id','config')
439     user = execute_admin_query(wsgi_request, user_query)
440     if len(user) == 0:
441         return False
442         #raise Exception, "User not found, check local DB"
443     else:
444         user_id = user[0]['user_id']
445         user_config = json.loads(user[0]['config'])
446         authority_hrn = user_config.get('authority', None)
447         
448         if is_pi(wsgi_request, '$user_hrn', authority_hrn):
449             # removing from Django auth_user
450             UserModel = get_user_model()
451             UserModel._default_manager.filter(email__iexact = user_email).delete()
452
453             # removing manifold account
454             manifold_delete_account(wsgi_request, user_id)           
455                      
456             # removing manifold user
457             manifold_delete_user(wsgi_request, user_id)
458         else:
459             return False
460             #raise Exception, "No sufficient rights on authority = ",authority_hrn
461
462     return True      
463
464
465 def make_request_user(user):
466     request = {}
467     request['type']          = 'user'
468     request['id']            = user.id
469     request['timestamp']     = user.created # XXX in DB ?
470     request['authority_hrn'] = user.authority_hrn
471     request['first_name']    = user.first_name
472     request['last_name']     = user.last_name
473     request['email']         = user.email
474     request['login']         = user.login
475     request['user_hrn']      = user.user_hrn
476     request['public_key']    = user.public_key
477     request['private_key']   = user.private_key
478     return request
479
480 def make_request_slice(slice):
481     request = {}
482     request['type'] = 'slice'
483     request['id'] = slice.id
484     request['user_hrn'] = slice.user_hrn
485     request['timestamp'] = slice.created
486     request['authority_hrn'] = slice.authority_hrn
487     request['slice_name'] = slice.slice_name
488     request['number_of_nodes'] = slice.number_of_nodes
489     request['type_of_nodes'] = slice.type_of_nodes
490     request['purpose'] = slice.purpose
491     return request
492
493 def make_request_project(project):
494     request = {}
495     request['type'] = 'project'
496     request['id'] = project.id
497     request['user_hrn'] = project.user_hrn
498     request['email'] = project.email
499     request['timestamp'] = project.created
500     request['authority_hrn'] = project.authority_hrn
501     request['project_name'] = project.project_name
502     request['purpose'] = project.purpose
503     return request
504
505 def make_request_join(join):
506     request = {}
507     request['type'] = 'join'
508     request['id'] = join.id
509     request['user_hrn'] = join.user_hrn
510     request['email'] = join.email
511     request['timestamp'] = join.created
512     request['authority_hrn'] = join.authority_hrn
513     request['project_name'] = join.project_name
514     return request
515
516 def make_request_authority(authority):
517     request = {}
518     request['type']                  = 'authority'
519     request['id']                    = authority.id
520     request['site_name']             = authority.site_name
521     request['site_latitude']         = authority.site_latitude
522     request['site_longitude']        = authority.site_longitude
523     request['site_url']              = authority.site_url
524     request['site_authority']        = authority.site_authority
525     request['site_abbreviated_name'] = authority.site_abbreviated_name
526     request['address_line1']         = authority.address_line1
527     request['address_line2']         = authority.address_line2
528     request['address_line3']         = authority.address_line3
529     request['address_city']          = authority.address_city
530     request['address_postalcode']    = authority.address_postalcode
531     request['address_state']         = authority.address_state
532     request['address_country']       = authority.address_country
533     request['authority_hrn']         = authority.authority_hrn
534     request['timestamp']             = authority.created
535     return request
536
537 def make_requests(pending_users, pending_slices, pending_authorities, pending_projects, pending_joins):
538     logger.info("$$$$$$$$$$$$$$$  make_request")
539     requests = []
540     for user in pending_users:
541         requests.append(make_request_user(user))
542     for slice in pending_slices:
543         requests.append(make_request_slice(slice))
544     for authority in pending_authorities:
545         requests.append(make_request_authority(authority))
546     for project in pending_projects:
547         requests.append(make_request_project(project))
548     for join in pending_joins:
549         requests.append(make_request_join(join))
550     return requests   
551
552 def get_request_by_id(ids):
553     logger.info("$$$$$$$$$$$$$$$$  get_request_by_id")
554     sorted_ids = { 'user': [], 'slice': [], 'authority': [], 'project': [], 'join': [] }
555     for type__id in ids:
556         type, id = type__id.split('__')
557         sorted_ids[type].append(id)
558         
559     if not ids:
560         pending_users  = PendingUser.objects.all()
561         pending_slices = PendingSlice.objects.all()
562         pending_authorities = PendingAuthority.objects.all()
563         pending_projects = PendingProject.objects.all()
564         pending_joins = PendingJoin.objects.all()
565     else:
566         pending_users  = PendingUser.objects.filter(id__in=sorted_ids['user']).all()
567         pending_slices = PendingSlice.objects.filter(id__in=sorted_ids['slice']).all()
568         pending_authorities = PendingAuthority.objects.filter(id__in=sorted_ids['authority']).all()
569         pending_projects = PendingProject.objects.filter(id__in=sorted_ids['project']).all()
570         pending_joins = PendingJoin.objects.filter(id__in=sorted_ids['join']).all()
571
572     return make_requests(pending_users, pending_slices, pending_authorities, pending_projects, pending_joins)
573
574 def get_requests(authority_hrns=None):
575     logger.info("$$$$$$$$$$$$$   get_request_by_authority auth_hrns = {}".format(authority_hrns))
576     if not authority_hrns:
577         ## get those pending users who have confirmed their emails
578         pending_users  = PendingUser.objects.filter(status__iexact = 'True')
579         pending_slices = PendingSlice.objects.all()
580         pending_authorities = PendingAuthority.objects.all()
581         pending_projects = PendingProject.objects.all()
582         pending_joins = PendingJoin.objects.all()
583     else:
584         pending_users  = PendingUser.objects
585         pending_slices = PendingSlice.objects
586         pending_authorities = PendingAuthority.objects
587         pending_projects = PendingProject.objects
588         pending_joins = PendingJoin.objects
589         from django.db.models import Q
590         list_user_Q = list()
591         list_slice_Q = list()
592         list_auth_Q = list()
593         list_proj_Q = list()
594         list_join_Q = list()
595         for hrn in authority_hrns:
596             list_user_Q.append(Q(authority_hrn__startswith=hrn, status__iexact = 'True'))
597             list_slice_Q.append(Q(authority_hrn__startswith=hrn))
598             list_auth_Q.append(Q(site_authority__startswith=hrn))
599             list_proj_Q.append(Q(authority_hrn__startswith=hrn))
600             list_join_Q.append(Q(authority_hrn__startswith=hrn))
601         from operator import __or__ as OR
602         pending_users        = pending_users.filter(reduce(OR, list_user_Q))
603         pending_slices       = pending_slices.filter(reduce(OR, list_slice_Q))
604         pending_authorities  = pending_authorities.filter(reduce(OR, list_auth_Q))
605         pending_projects     = pending_projects.filter(reduce(OR, list_proj_Q))
606         pending_joins        = pending_joins.filter(reduce(OR, list_join_Q))
607         #pending_authorities  = pending_authorities.all() #filter(reduce(OR, list_Q))
608
609     return make_requests(pending_users, pending_slices, pending_authorities, pending_projects, pending_joins)
610
611 # XXX Is it in sync with the form fields ?
612
613 def portal_validate_request(wsgi_request, request_ids):
614     status = {}
615
616     if not isinstance(request_ids, list):
617         request_ids = [request_ids]
618
619     requests = get_request_by_id(request_ids)
620     for request in requests:
621         # type, id, timestamp, details, allowed -- MISSING: authority_hrn
622         # CAREFUL about details
623         # user  : first name, last name, email, password, keypair
624         # slice : number of nodes, type of nodes, purpose
625         
626         request_status = {}
627         try:
628             if request['type'] == 'user':
629                 create_user(wsgi_request, request)
630                 request_status['SFA user'] = {'status': True }
631                 u = PendingUser.objects.get(id=request['id'])
632                 ctx = {
633                     'first_name'    : u.first_name, 
634                     'last_name'     : u.last_name,
635                     'email'         : u.email,        
636                 }      
637                 user_email = u.email
638
639                 PendingUser.objects.get(id=request['id']).delete()
640
641             elif request['type'] == 'slice':
642                 create_slice(wsgi_request, request)
643                 request_status['SFA slice'] = {'status': True }
644                 s = PendingSlice.objects.get(id=request['id'])
645                 ctx = {
646                     'slice_name'    : s.slice_name, 
647                     'url'           : s.url,
648                     'purpose'       : s.purpose,        
649                     'email'         : s.email,        
650                 }      
651                 user_email = s.email
652
653                 PendingSlice.objects.get(id=request['id']).delete()
654
655                 # Clear user's Credentials
656                 sfa_user = sfa_get_user(wsgi_request, request['user_hrn'])
657                 clear_user_creds(wsgi_request,sfa_user['user_email'])
658
659             elif request['type'] == 'authority':
660                 #hrn = "%s.%s" % (request['authority_hrn'], request['site_authority'])
661                 hrn = request['site_authority']
662                 # XXX tmp sfa dependency
663                 from sfa.util.xrn import Xrn 
664                 urn = Xrn(hrn, request['type']).get_urn()
665                 
666                 # Only hrn is required for Manifold Query 
667                 sfa_authority_params = {
668                     'authority_hrn'        : hrn,
669                     #'authority_urn'        : urn,
670                     #'type'       : request['type'],
671                     #'pi'        : None,
672                     #'enabled'    : True
673                 }
674                 logger.info("ADD Authority")
675                 sfa_add_authority(wsgi_request, sfa_authority_params)
676                 request_status['SFA authority'] = {'status': True }
677                 a = PendingAuthority.objects.get(id=request['id'])
678                 ctx = { 
679                     'site_name'     : a.site_name,
680                     'short_name'    : a.short_name,
681                     'url'           : a.url,
682                     'city'          : a.city,
683                     'country'       : a.country,                          
684                     'portal_url'    : a.current_site,
685                 }
686                 user_email = a.email
687
688                 PendingAuthority.objects.get(id=request['id']).delete()
689                 
690                 # Clear Admin Cache as it is used to display the list of authorities in Registration page
691                 query = Query.update('myslice:authority').filter_by('authority_hrn', '==', sfa_authority_params['authority_hrn']).set({'authority_hrn':sfa_authority_params['authority_hrn']}).select('authority_hrn')
692                 res = execute_admin_query(request, query)
693
694             elif request['type'] == 'project':
695                 hrn = request['authority_hrn'] + '.' + request['project_name']
696
697                 # Only hrn is required for Manifold Query 
698                 sfa_authority_params = {
699                     'authority_hrn'        : hrn
700                 }
701                 sfa_add_authority(wsgi_request, sfa_authority_params)
702                 
703                 # Add user as a PI of the project
704                 # Clear user's Credentials
705                 authority_add_pis(wsgi_request, hrn , request['user_hrn'])
706
707                 request_status['SFA project'] = {'status': True }
708                 p = PendingProject.objects.get(id=request['id'])
709                 ctx = {
710                     'project_name'  : p.project_name, 
711                     'authority_hrn' : p.authority_hrn,
712                     'email'         : p.email,        
713                     'purpose'       : p.purpose,
714                 }      
715                 user_email = p.email
716
717                 PendingProject.objects.get(id=request['id']).delete()
718
719                 # Clear Admin Cache as it is used to display the list of projects in Slice request page
720                 query = Query.update('myslice:authority').filter_by('authority_hrn', '==', sfa_authority_params['authority_hrn']).set({'authority_hrn':sfa_authority_params['authority_hrn']}).select('authority_hrn')
721                 res = execute_admin_query(request, query)
722
723
724             elif request['type'] == 'join':
725                 # Add user as a PI of the project
726                 # Clear user's Credentials
727                 authority_add_pis(wsgi_request, request['authority_hrn'] , request['user_hrn'])
728
729                 request_status['SFA join'] = {'status': True }
730                 j = PendingJoin.objects.get(id=request['id'])
731                 ctx = {
732                     'project_name'  : j.project_name, 
733                     'authority_hrn' : j.authority_hrn,
734                     'email'         : j.email,        
735                     'user_hrn'      : j.user_hrn,
736                 }      
737                 user_email = j.email
738
739                 PendingJoin.objects.get(id=request['id']).delete()
740             else:
741                 raise Exception, 'unknown type of request %s' % request['type']
742             # XXX Remove from Pendings in database
743
744             send_status_email(ctx, user_email, request['type'], 'validated')
745         except Exception, e:
746             request_status['SFA '+request['type']] = {'status': False, 'description': str(e)}
747
748         status['%s__%s' % (request['type'], request['id'])] = request_status
749
750     return status
751
752 def validate_action(request, **kwargs):
753     ids = filter(None, kwargs['id'].split('/'))
754     status = portal_validate_request(request, ids)
755     json_answer = json.dumps(status)
756     return HttpResponse (json_answer, content_type="application/json")
757
758
759 def reject_action(request, **kwargs):
760     ids = filter(None, kwargs['id'].split('/'))
761     status = portal_reject_request(request, ids)
762     json_answer = json.dumps(status)
763     return HttpResponse (json_answer, content_type="application/json")
764
765
766 def portal_reject_request(wsgi_request, request_ids):
767     status = {}
768     # get the domain url    
769     current_site = Site.objects.get_current()
770     current_site = current_site.domain
771
772
773     if not isinstance(request_ids, list):
774         request_ids = [request_ids]
775
776     requests = get_request_by_id(request_ids)
777     for request in requests:
778         # type, id, timestamp, details, allowed -- MISSING: authority_hrn
779         # CAREFUL about details
780         # user  : first name, last name, email, password, keypair
781         # slice : number of nodes, type of nodes, purpose
782         
783         request_status = {}
784
785         try:
786             if request['type'] == 'user':
787                 request_status['SFA user'] = {'status': True }
788                 # getting user email based on id 
789                 ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
790                 for user in PendingUser.objects.raw('SELECT * FROM portal_pendinguser WHERE id = %s', [request['id']]):
791                     user_email= user.email
792                     first_name = user.first_name
793                     last_name = user.last_name
794
795                 ctx = {
796                     'first_name'    : first_name, 
797                     'last_name'     : last_name, 
798                     'email'         : user_email,
799                     'portal_url'    : current_site,
800                     }
801
802                 # removing from Django portal_pendinguser
803                 PendingUser.objects.get(id=request['id']).delete()
804                 
805                 delete_local_user(wsgi_request, user_email)
806                           
807             elif request['type'] == 'slice':
808                 request_status['SFA slice'] = {'status': True } 
809
810                 # getting user email based on id 
811                 ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
812                 for user in PendingSlice.objects.raw('SELECT * FROM portal_pendingslice WHERE id = %s', [request['id']]):
813                     user_email= user.type_of_nodes # XXX type_of_nodes field contains the email [shd be renamed in DB]
814                     slice_name = user.slice_name
815                     purpose = user.purpose
816                     url = user.number_of_nodes
817
818                 ctx = {
819                     'slice_name': slice_name,
820                     'purpose': purpose,
821                     'url': url,
822                     'portal_url': current_site,
823                     }
824
825                 PendingSlice.objects.get(id=request['id']).delete()
826
827             elif request['type'] == 'authority':
828                 request_status['SFA authority'] = {'status': True }
829                 
830                 # getting user email based on id 
831                 ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
832                 for user in PendingAuthority.objects.raw('SELECT * FROM portal_pendingauthority WHERE id = %s', [request['id']]):
833                     user_email= user.address_line1 # XXX address_line1 field contains the email [shd be renamed in DB]
834                     site_name = user.site_name
835                     city = user.address_city
836                     country = user.address_country
837                     short_name = user.site_abbreviated_name
838                     url = user.site_url
839
840                 ctx = { 
841                     'site_name': site_name,
842                     'short_name': short_name,
843                     'url': url,
844                     'city': city,
845                     'country': country,                          
846                     'portal_url'    : current_site,
847                     }
848                     
849                 PendingAuthority.objects.get(id=request['id']).delete()
850
851             # XXX TMP we should send an email to the user to inform him/her
852             elif request['type'] == 'project':
853                 request_status['SFA project'] = {'status': True }
854                 p = PendingProject.objects.get(id=request['id'])
855                 ctx = {
856                     'project_name'  : p.project_name, 
857                     'authority_hrn' : p.authority_hrn,
858                     'email'         : p.email,        
859                     'purpose'       : p.purpose,
860                 }      
861                 user_email = p.email
862                 PendingProject.objects.get(id=request['id']).delete()
863
864             elif request['type'] == 'join':
865                 request_status['SFA join'] = {'status': True }
866                 j = PendingJoin.objects.get(id=request['id'])
867                 ctx = {
868                     'project_name'  : j.project_name, 
869                     'authority_hrn' : j.authority_hrn,
870                     'email'         : j.email,        
871                     'user_hrn'      : j.user_hrn,
872                 }      
873
874                 user_email = j.email
875                 PendingJoin.objects.get(id=request['id']).delete()
876             else:
877                 raise Exception, 'unknown type of request %s' % request['type']
878
879             send_status_email(ctx, user_email, request['type'], 'denied')
880         except Exception, e:
881             request_status['SFA '+request['type']] = {'status': False, 'description': str(e)}
882
883         status['%s__%s' % (request['type'], request['id'])] = request_status
884
885     return status
886
887 def send_status_email(ctx, user_email, obj_type, status):
888     try:
889         theme.template_name = obj_type + '_request_' + status + '.txt'
890         text_content = render_to_string(theme.template, ctx)
891         theme.template_name = obj_type + '_request_' + status + '.html'
892         html_content = render_to_string(theme.template, ctx)
893         theme.template_name = 'email_default_sender.txt'
894
895         sender =  render_to_string(theme.template, ctx)
896         sender = sender.replace('\n', '')
897                        
898         subject = obj_type + ' request '+ status +'.'
899     
900         msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
901         msg.attach_alternative(html_content, "text/html")
902         msg.send()
903     except Exception as e:
904         print e
905         logger.error("Failed to send email, please check the mail templates and the SMTP configuration of your server")
906
907
908 # Django and ajax
909 # http://djangosnippets.org/snippets/942/
910
911
912
913 #-------------------------------------------------------------------------------
914 # REQUESTS - Slices
915 #-------------------------------------------------------------------------------
916
917 def create_slice(wsgi_request, request):
918     """
919     Arguments:
920         wsgi_request (~ WSGIRequest) : 
921         request (dict) : the slice request in our own dict format
922
923     Raises:
924         Exception
925     """
926     hrn = "%s.%s" % (request['authority_hrn'], request['slice_name'])
927     # XXX tmp sfa dependency
928     from sfa.util.xrn import Xrn 
929     urn = Xrn(hrn, request['type']).get_urn()
930     
931     # Add User to Slice if we have the user_hrn in pendingslice table
932     user_hrn = request.get('user_hrn', None)
933     user_hrns = list([user_hrn]) if user_hrn else list()
934    
935     # CACHE PB with fields
936     page = Page(wsgi_request)
937     metadata = page.get_metadata()
938     user_md = metadata.details_by_object('user')
939     user_fields = [column['name'] for column in user_md['column']]
940
941     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
942     #user_query  = Query().get('myslice:user').select('user_hrn','user_email').filter_by('user_hrn','==',user_hrn)
943     user_query  = Query().get('myslice:user').select(user_fields).filter_by('user_hrn','==',user_hrn)
944     user_details_sfa = execute_admin_query(wsgi_request, user_query)
945     if not user_details_sfa:
946         raise Exception, "User %s doesn't exist, validate user before validating slice" % user_hrn
947     for user in user_details_sfa:
948         user_email = user['user_email']
949
950     # XXX LOIC Quick fix because this is totally inconsistent
951     if not 'number_of_nodes' in request:
952         request['number_of_nodes']=""
953
954     # Slice is under a project
955     if len(request['authority_hrn'].split('.')) > 2:
956         pi_list = []
957         pis = authority_get_pis(wsgi_request, request['authority_hrn'])
958         for pi in pis:
959             pi_list = pi['pi_users']
960         user_hrns.extend(pi_list)
961
962     # XXX We should create a slice with Manifold terminology
963     slice_params = {
964         'slice_hrn'        : hrn, 
965         'slice_urn'        : urn,
966         'slice_type'       : request['type'],
967         'url'              : request['number_of_nodes'],
968         'users'            : user_hrns,
969         'slice_enabled'    : True
970     }
971     # ignored in request: id, timestamp,  number_of_nodes, type_of_nodes, purpose
972
973     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
974     query = Query.create('myslice:slice').set(slice_params).select('slice_hrn')
975     results = execute_query(wsgi_request, query)
976     if not results:
977         raise Exception, "Could not create %s. Already exists ?" % slice_params['hrn']
978     else:
979         try:
980             for u_hrn in user_hrns:
981                 u_email = get_user_email(wsgi_request, u_hrn)
982                 clear_user_creds(wsgi_request, u_email)
983         except Exception as e:
984             logger.error("Failed clear credentials for all users")
985             clear_user_creds(wsgi_request,user_email)
986         # log user activity
987         activity.slice.validate(request, { "slice" : hrn })
988        
989     return results
990
991 def create_pending_slice(wsgi_request, request, email):
992     """
993     """
994
995     # Insert an entry in the PendingSlice table
996     s = PendingSlice(
997         slice_name      = request['slice_name'],
998         user_hrn        = request['user_hrn'],
999         authority_hrn   = request['authority_hrn'],
1000         number_of_nodes = request['url'], # field needs to be renamed
1001         purpose         = request['purpose'],
1002         type_of_nodes   = request['email'] # field needs to be renamed 
1003     )
1004     s.save()
1005
1006     send_email_to_pis(wsgi_request, request, 'slice')
1007
1008 def create_pending_project(wsgi_request, request):
1009     """
1010     """
1011
1012     # Insert an entry in the PendingProject table
1013     s = PendingProject(
1014         project_name    = request['project_name'],
1015         user_hrn        = request['user_hrn'],
1016         email           = request['email'],
1017         authority_hrn   = request['authority_hrn'],
1018         purpose         = request['purpose'],
1019     )
1020     s.save()
1021
1022     send_email_to_pis(wsgi_request, request, 'project')
1023
1024 def create_pending_join(wsgi_request, request):
1025     """
1026     """
1027
1028     # Insert an entry in the PendingJoin table
1029     s = PendingJoin(
1030         user_hrn        = request['user_hrn'],
1031         email           = request['email'],
1032         project_name    = request['project_name'],
1033         authority_hrn   = request['authority_hrn'],
1034     )
1035     s.save()
1036
1037     send_email_to_pis(wsgi_request, request, 'join')
1038
1039 #-------------------------------------------------------------------------------
1040 # SEND EMAILS
1041 #-------------------------------------------------------------------------------
1042
1043 def send_email_to_pis(wsgi_request, request, obj_type):
1044     try:
1045         # Send an email: the recipients are the PIs of the authority
1046         recipients = authority_get_pi_emails(wsgi_request, request['authority_hrn'])
1047
1048         theme.template_name = obj_type + '_request_email.txt' 
1049         text_content = render_to_string(theme.template, request)
1050
1051         theme.template_name = obj_type + '_request_email.html' 
1052         html_content = render_to_string(theme.template, request)
1053
1054         #theme.template_name = obj_type + '_request_email_subject.txt'
1055         #subject = render_to_string(theme.template, request)
1056         #subject = subject.replace('\n', '')
1057         subject = "New "+obj_type+" request"
1058
1059         theme.template_name = 'email_default_sender.txt'
1060         sender =  render_to_string(theme.template, request)
1061         sender = sender.replace('\n', '')
1062
1063         msg = EmailMultiAlternatives(subject, text_content, sender, recipients)
1064         msg.attach_alternative(html_content, "text/html")
1065         msg.send()
1066     except Exception, e:
1067         print e
1068         print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
1069
1070
1071 #-------------------------------------------------------------------------------
1072 # REQUESTS - Users
1073 #-------------------------------------------------------------------------------
1074
1075 def manifold_add_reference_user_accounts(wsgi_request, request):
1076     """When a new user is created, add reference accounts to the reference platform.
1077     """
1078     # XXX XXX XXX The rest of this function has to be checked XXX XXX XXX
1079
1080     # Retrieve user information
1081     user_query  = Query().get('local:user')             \
1082         .select('user_id', 'config', 'email', 'status') \
1083         .filter_by('email', '==', request['email'])
1084     user_details = execute_admin_query(wsgi_request, user_query)
1085
1086     # USER MAIN ACCOUNT != reference
1087     #print 'USER MAIN ACCOUNT != reference'
1088     list_accounts_query = Query().get('local:account')              \
1089         .select('user_id', 'platform_id', 'auth_type', 'config')    \
1090         .filter_by('user_id', '==', user_details[0]['user_id'])     \
1091         .filter_by('auth_type', '!=', 'reference')
1092     list_accounts = execute_admin_query(wsgi_request, list_accounts_query)
1093
1094     # XXX main_platform is being erased several times ???
1095     for account in list_accounts:
1096         main_platform_query = Query().get('local:platform')         \
1097             .select('platform_id', 'platform')                      \
1098             .filter_by('platform_id', '==', account['platform_id'])
1099         main_platform = execute_admin_query(wsgi_request, main_platform_query)
1100
1101     # Add reference accounts on SFA enabled platforms
1102     platforms_query = Query().get('local:platform') \
1103         .filter_by('disabled', '==', '0')           \
1104         .filter_by('gateway_type', '==', 'sfa')     \
1105         .select('platform_id', 'gateway_type')
1106     platforms = execute_admin_query(wsgi_request, platforms_query)
1107     for platform in platforms:
1108         #print "add reference to platform ",platform
1109         manifold_account_params = {
1110             'user_id'       : user_details[0]['user_id'],
1111             'platform_id'   : platform['platform_id'],
1112             'auth_type'     : 'reference',
1113             'config'        : '{"reference_platform": "' + main_platform[0]['platform'] + '"}',
1114         }
1115         manifold_add_account(wsgi_request, manifold_account_params)
1116
1117 def sfa_create_user(wsgi_request, request, namespace = None, as_admin = False):
1118     """
1119     Arguments:
1120         wsgi_request (~ WSGIRequest) : 
1121         request (dict) : the user request in our own dict format
1122
1123     Raises:
1124         Exception
1125     """
1126     from sfa.util.xrn import Xrn 
1127
1128     auth_pi = request.get('pi', None)
1129     auth_pi = list([auth_pi]) if auth_pi else list()
1130
1131     # We create a user request with Manifold terminology
1132     sfa_user_params = {
1133         'user_hrn'          : request['user_hrn'],
1134         'user_email'        : request['email'],
1135         'user_urn'          : Xrn(request['user_hrn'], request['type']).get_urn(),
1136         'user_type'         : request['type'],
1137         'keys'              : request['public_key'],
1138         'user_first_name'   : request['first_name'],
1139         'user_last_name'    : request['last_name'],
1140         'pi_authorities'    : auth_pi,
1141         'user_enabled'      : True
1142     }
1143
1144     if namespace is not None:
1145         query = Query.create('%s:user' % namespace).set(sfa_user_params).select('user_hrn')
1146     else:
1147         # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
1148         query = Query.create('myslice:user').set(sfa_user_params).select('user_hrn')
1149
1150     if as_admin:
1151         results = execute_admin_query(wsgi_request, query)
1152     else:
1153         results = execute_query(wsgi_request, query)
1154
1155     if not results:
1156         raise Exception, "Could not create %s. Already exists ?" % sfa_user_params['user_hrn']
1157
1158     return results
1159
1160 def iotlab_create_user (wsgi_request, request, namespace = None, as_admin=False):
1161    
1162     import requests
1163     import time
1164     from requests.auth import HTTPBasicAuth
1165    
1166     engine = ConfigEngine() 
1167     URL_REST = engine.iotlab_url()
1168     LOGIN_ADMIN = engine.iotlab_admin_user()
1169     PASSWORD_ADMIN = engine.iotlab_admin_password()
1170
1171     auth = HTTPBasicAuth(LOGIN_ADMIN,PASSWORD_ADMIN)
1172     headers = {'content-type': 'application/json'}
1173
1174     for user in PendingUser.objects.raw('SELECT * FROM portal_pendinguser WHERE email = %s', [request['email']]):
1175         password= user.password
1176
1177
1178     iotlab_user_params = {
1179         "type"          : "SA",
1180         #"login"         : request['email'], #auto generated by iotlab
1181         "password"      : password,
1182         "firstName"     : request['first_name'],
1183         "lastName"      : request['last_name'],
1184         "email"         : request['email'],
1185         "structure"     : request['authority_hrn'],
1186         "city"          : "N/A",
1187         "country"       : "N/A",
1188         "sshPublicKey"  : request['public_key'],
1189         "motivations"   : "SFA federation",
1190     }    
1191    
1192     iotlab_user_params1 = json.dumps(iotlab_user_params)
1193     r=requests.post(url=URL_REST, data=iotlab_user_params1, headers=headers, auth=auth)
1194     logger.info('Create iotlab user : {} {}'.format(r.status_code, r.text))
1195     return r.text
1196
1197 def create_user(wsgi_request, request, namespace = None, as_admin = False):
1198     # XXX This has to be stored centrally
1199     USER_STATUS_ENABLED = 2
1200
1201     # NOTE : if we were to create a user directly (just like we create slices,
1202     # we would have to perform the steps in create_pending_user too
1203
1204     # Add the user to the SFA registry
1205     sfa_create_user(wsgi_request, request, namespace, as_admin)
1206
1207     # Update Manifold user status
1208     manifold_update_user(wsgi_request, request['email'], {'status': USER_STATUS_ENABLED})
1209
1210     # Add reference accounts for platforms
1211     manifold_add_reference_user_accounts(wsgi_request, request)
1212
1213     # Add the user to iotlab portal if theme is set to onelab
1214     if theme.theme == 'onelab':
1215         iotlab_create_user (wsgi_request, request)
1216
1217 def create_pending_user(wsgi_request, request, user_detail):
1218     """
1219     """
1220
1221     # Insert an entry in the PendingUser table
1222     b = PendingUser(
1223         first_name    = request['first_name'],
1224         last_name     = request['last_name'],
1225         authority_hrn = request['authority_hrn'],
1226         email         = request['email'],
1227         password      = request['password'],
1228         public_key    = request['public_key'],
1229         private_key   = request['private_key'],
1230         user_hrn      = request['user_hrn'],
1231         pi            = request['pi'],
1232         email_hash    = request['email_hash'],
1233         status        = 'False',
1234     )
1235     b.save()
1236     # sends email to user to activate the email
1237     theme.template_name = 'activate_user.html'
1238     html_content = render_to_string(theme.template, request)
1239     theme.template_name = 'activate_user.txt'
1240     text_content = render_to_string(theme.template, request)
1241     theme.template_name = 'activate_user_email_subject.txt'
1242     subject = render_to_string(theme.template, request)
1243     subject = subject.replace('\n', '')
1244     theme.template_name = 'email_default_sender.txt'
1245     sender =  render_to_string(theme.template, request)
1246     sender = sender.replace('\n', '')
1247     recipient = [request['email']]
1248     #recipient = recipient.append(request['email'])
1249
1250     msg = EmailMultiAlternatives(subject, text_content, sender, recipient)
1251     msg.attach_alternative(html_content, "text/html")
1252     msg.send()
1253    
1254     # saves the user to django auth_user table [needed for password reset]
1255     user = User.objects.create_user(request['email'], request['email'], request['password'])
1256
1257     # Creating a manifold user
1258     user_id = manifold_add_user(wsgi_request, request)
1259
1260     # Creating a Manifold account on the MySlice platform
1261     # Note the JSON representation of public and private keys already includes quotes
1262     account_config = {
1263         'user_hrn'          : request['user_hrn'],
1264         'user_public_key'   : request['public_key'],
1265     }
1266     if request['private_key']:
1267         account_config['user_private_key'] = request['private_key']
1268
1269     user_id = user_detail['user_id'] + 1 # the user_id for the newly created user in local:user
1270
1271     # XXX TODO: Require a myslice platform
1272     # ALERT: this will disapear with ROUTERV2 of Manifold
1273     # We have to consider the case where several registries can be used
1274     # Removed hardcoded platform = 5
1275     # This platform == 'myslice' is a TMP FIX !!
1276     try:
1277         reg_platform_query = Query().get('local:platform') \
1278             .filter_by('platform', '==', 'myslice')           \
1279             .select('platform_id')
1280         reg_platform = execute_admin_query(wsgi_request, reg_platform_query)
1281
1282         reg_platform_id = reg_platform[0]['platform_id']
1283         account_params = {
1284             'platform_id'   : reg_platform_id, # XXX ALERT !!
1285             'user_id'       : user_id, 
1286             'auth_type'     : request['auth_type'], 
1287             'config'        : json.dumps(account_config),
1288         }
1289         manifold_add_account(wsgi_request, account_params)
1290
1291     # Email to PIs is sent when the user activates his email
1292     # portal/emailactivationview.py
1293
1294     except Exception as e:
1295         logger.error("Failed creating manifold account on platform {} for user: {}".format('myslice', request['email']))
1296