e1faf4b7b04fdfd7e4ce4dae01626b155f734334
[unfold.git] / portal / actions.py
1 from __future__ import print_function
2
3 from django.http                    import HttpResponse
4 from manifold.core.query            import Query
5 from manifoldapi.manifoldapi        import execute_query,execute_admin_query
6 from portal.models                  import PendingUser, PendingSlice, PendingAuthority, PendingProject, PendingJoin
7 from unfold.page                    import Page
8
9 import json
10
11 from django.contrib.auth.models     import User
12 from django.contrib.sites.models    import Site
13 from django.contrib.auth            import get_user_model
14 from django.template.loader         import render_to_string
15 from django.core.mail               import EmailMultiAlternatives, send_mail
16
17 from myslice.theme                  import ThemeView
18 from myslice.configengine           import ConfigEngine
19
20
21 theme = ThemeView()
22
23 import activity.slice
24
25 # Thierry: moving this right into the code so 
26 # most people can use myslice without having to install sfa
27 # XXX tmp sfa dependency, should be moved to SFA gateway
28 #from sfa.util.xrn                import Xrn 
29
30
31 # Get the list of pis in a given authority
32 def authority_get_pis(request, authority_hrn):
33     # CACHE PB with fields
34     page = Page(request)
35     metadata = page.get_metadata()
36     auth_md = metadata.details_by_object('authority')
37     auth_fields = [column['name'] for column in auth_md['column']]
38
39     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
40     query = Query.get('myslice:authority').filter_by('authority_hrn', '==', authority_hrn).select(auth_fields)
41     results = execute_admin_query(request, query)
42     #print "authority_get_pis = %s" % results
43     # NOTE: temporarily commented. Because results is giving empty list. 
44     # Needs more debugging
45     #if not results:
46     #    raise Exception, "Authority not found: %s" % authority_hrn
47     #result, = results
48     #return result['pi_users']
49     return results
50
51 #check the user is pi or not in the registry
52 def authority_check_pis(request, user_email):
53     try:
54         user_query  = Query().get('local:user').filter_by('email', '==', user_email).select('user_id','email','password','config')
55         user_details = execute_admin_query(request, user_query)
56     
57         # getting the authority_hrn
58         for user_detail in user_details:
59             user_id = user_detail['user_id']
60             if user_detail['config']:
61                 config = json.loads(user_detail['config'])
62                 authority_hrn = config.get('authority','Unknown Authority')
63  
64         account_query  = Query().get('local:account').filter_by('user_id', '==', user_id).select('user_id','platform_id','auth_type','config')
65         account_details = execute_admin_query(request, account_query)
66     
67         platform_query  = Query().get('local:platform').select('platform_id','platform')
68         platform_details = execute_admin_query(request, platform_query)
69     
70         for account_detail in account_details:
71             for platform_detail in platform_details:
72                 if platform_detail['platform_id'] == account_detail['platform_id']:
73                     if 'myslice' in platform_detail['platform']:
74                         account_config = json.loads(account_detail['config'])
75                         user_hrn = account_config.get('user_hrn','N/A')
76
77         pi_status = False
78         pis = authority_get_pis (request, authority_hrn)
79         for pi in pis:
80             pi_list = pi['pi_users']
81
82         if user_hrn in pi_list:
83             pi_status = True
84         return pi_status
85
86     except Exception,e:
87         print("Exception in actions.py in authority_check_pis %s" % e)
88         return None
89
90
91 def authority_add_pis(request, authority_hrn,user_hrn):
92     try:
93         # getting pis of the authority of the user
94         pis = authority_get_pis (request, authority_hrn)
95         for pi in pis:
96             pi_list = pi['pi_users']
97    
98         updated_pi_list = pi_list.append(user_hrn) 
99         query = Query.update('myslice:authority').filter_by('authority_hrn', '==', authority_hrn).set({'pi_users':pi_list})
100         results = execute_query(request,query)
101         newpis = authority_get_pis (request, authority_hrn)
102         return newpis
103     except Exception,e: 
104         print("Exception in actions.py in authority_add_pis %s" % e)
105         return None
106
107
108 def authority_remove_pis(request, authority_hrn,user_hrn):
109     try:
110         # getting pis of the authority of the user
111         pis = authority_get_pis (request, authority_hrn)
112         for pi in pis:
113             pi_list = pi['pi_users']
114  
115         updated_pi_list = pi_list.remove(user_hrn) 
116         query = Query.update('authority').filter_by('authority_hrn', '==', authority_hrn).set({'pi_users':pi_list})
117         results = execute_query(request,query)
118         newpis = authority_get_pis (request, authority_hrn)
119         return newpis
120     except Exception,e: 
121         print("Exception in actions.py in authority_remove_pis %s" % e)
122         return None
123
124
125 def authority_get_pi_emails(request, authority_hrn):
126     pi_users = authority_get_pis(request,authority_hrn)
127     print("pi_users = %s" % pi_users)
128
129     if any(pi['pi_users'] == None or not pi['pi_users']  for pi in pi_users):
130         #theme.template_name = 'email_default_recipients.txt' 
131         #default_email = render_to_string(theme.template, request)
132         #default_email = default_email.replace('\n', '')
133         #return default_email
134         # the above doesn't work
135         return ['support@onelab.eu']
136     else:
137         pi_user_hrns = [ hrn for x in pi_users for hrn in x['pi_users'] ]
138
139         # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
140         query = Query.get('myslice:user').filter_by('user_hrn', 'included', pi_user_hrns).select('user_email')
141         results = execute_admin_query(request, query)
142         return [result['user_email'] for result in results]
143
144 #clear user credentials
145 def clear_user_creds(request, user_email):
146     try:
147         user_query  = Query().get('local:user').filter_by('email', '==', user_email).select('user_id','email','password','config')
148         user_details = execute_admin_query(request, user_query)
149     
150         # getting the user_id from the session
151         for user_detail in user_details:
152             user_id = user_detail['user_id']
153             user_email = user_detail['email']
154     
155         account_query  = Query().get('local:account').filter_by('user_id', '==', user_id).select('user_id','platform_id','auth_type','config')
156         account_details = execute_admin_query(request, account_query)
157     
158         platform_query  = Query().get('local:platform').select('platform_id','platform')
159         platform_details = execute_admin_query(request, platform_query)
160     
161         for account_detail in account_details:
162             for platform_detail in platform_details:
163                 if platform_detail['platform_id'] == account_detail['platform_id']:
164                     if 'myslice' in platform_detail['platform']:
165                         account_config = json.loads(account_detail['config'])
166                         #user_cred = account_config.get('delegated_user_credential','N/A')
167                         user_cred = account_config.get('user_credential','N/A')
168                         if 'N/A' not in user_cred:
169                             user_hrn = account_config.get('user_hrn','N/A')
170                             user_pub_key = json.dumps(account_config.get('user_public_key','N/A'))
171                             user_priv_key = json.dumps(account_config.get('user_private_key','N/A'))
172                             updated_config = '{"user_public_key":'+ user_pub_key + ', "user_private_key":'+ user_priv_key + ', "user_hrn":"'+ user_hrn + '"}'
173                             user_params = { 'config': updated_config}
174                             manifold_update_account(request, user_id,user_params)
175                             return user_email
176                         else:
177                             return None
178
179     except Exception,e:
180         print("Exception in actions.py in clear_user_creds %s" % e)
181         return None
182
183 def is_pi(wsgi_request, user_hrn, authority_hrn):
184     # authorities from user where user_hrn == "ple.upmc.jordan_auge"
185     print("#### actions.py is_pi authority_hrn = ", authority_hrn)
186     try:
187         # CACHE PB with fields
188         page = Page(wsgi_request)
189         metadata = page.get_metadata()
190         user_md = metadata.details_by_object('user')
191         user_fields = [column['name'] for column in user_md['column']]
192         
193         # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
194         query  = Query().get('myslice:user').select(user_fields).filter_by('user_hrn','==',user_hrn)
195         #query = Query.get('myslice:user').filter_by('user_hrn', '==', user_hrn).select('pi_authorities')
196         results = execute_query(wsgi_request, query)
197         #print "is_pi results = ", results
198         for user_detail in results:
199             if authority_hrn in user_detail['pi_authorities']:
200                 return True
201     except Exception,e:
202         print("Exception in actions.py in is_pi %s" % e)
203     return False
204     
205 # SFA get record
206
207 def sfa_get_user(request, user_hrn, pub=None):
208
209     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
210     query_sfa_user = Query.get('myslice:user').filter_by('user_hrn', '==', user_hrn)
211     result_sfa_user = execute_admin_query(request, query_sfa_user)
212     return result_sfa_user[0]                        
213
214 def sfa_update_user(request, user_hrn, user_params):
215     # user_params: keys [public_key] 
216     if 'email' in user_params:
217         user_params['user_email'] = user_params['email']
218
219     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
220     query = Query.update('myslice:user').filter_by('user_hrn', '==', user_hrn).set(user_params).select('user_hrn')
221     results = execute_admin_query(request,query)
222     return results
223
224 def sfa_add_authority(request, authority_params):
225
226     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
227     query = Query.create('myslice:authority').set(authority_params).select('authority_hrn')
228     results = execute_query(request, query)
229     print("sfa_add_auth results=",results)
230     if not results:
231         raise Exception, "Could not create %s. Already exists ?" % authority_params['hrn']
232     return results
233
234 def sfa_add_user_to_slice(request, user_hrn, slice_params):
235 # UPDATE myslice:slice SET researcher=['ple.upmc.jordan_auge','ple.inria.thierry_parmentelat','ple.upmc.loic_baron','ple.upmc.ciro_scognamiglio','ple.upmc.mohammed-yasin_rahman','ple.upmc.azerty'] where slice_hrn=='ple.upmc.myslicedemo'
236
237     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
238     query_current_users = Query.get('myslice:slice').select('user').filter_by('slice_hrn','==',slice_params['hrn'])
239     results_current_users = execute_query(request, query_current_users)
240     slice_params['researcher'] = slice_params['researcher'] | results_current_users
241
242     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
243     query = Query.update('myslice:slice').filter_by('user_hrn', '==', user_hrn).set(slice_params).select('slice_hrn')
244     results = execute_query(request, query)
245 # Also possible but not supported yet
246 # UPDATE myslice:user SET slice=['ple.upmc.agent','ple.upmc.myslicedemo','ple.upmc.tophat'] where user_hrn=='ple.upmc.azerty'
247     if not results:
248         raise Exception, "Could not create %s. Already exists ?" % slice_params['hrn']
249     return results
250
251 # Propose hrn
252
253 def manifold_add_user(wsgi_request, request):
254     """Add a Manifold user corresponding to a user request.
255
256     Args:
257         wsgi_request: a WSGIRequest instance
258         request (dict): a dictionary containing the user request built from the
259             form.
260
261     Returns:
262         The user_id of the inserted user.
263
264     Raises:
265         ?
266     
267     """
268     USER_CONFIG = '{"firstname": "%(first_name)s", "lastname": "%(last_name)s", "authority": "%(authority_hrn)s"}'
269
270     user_params = {
271         'email'     : request['email'],
272         'password'  : request['password'],
273         'config'    : USER_CONFIG % request,
274         'status'    : 1,
275     }
276
277     query = Query.create('local:user').set(user_params).select('email')
278     results = execute_admin_query(request, query)
279     if not results:
280         raise Exception, "Failed creating manifold user: %s" % user_params['email']
281     result = results[0]
282     return result['email']
283
284 def manifold_update_user(request, email, user_params):
285     # user_params: password, config e.g., 
286     query = Query.update('local:user').filter_by('email', '==', email).set(user_params).select('email')
287     results = execute_admin_query(request,query)
288     # NOTE: results remains empty and goes to Exception. However, it updates the manifold DB.
289     # That's why I commented the exception part. -- Yasin 
290     #if not results:
291     #    raise Exception, "Failed updating manifold user: %s" % user_params['email']
292     #result, = results
293     return results
294
295 def manifold_add_account(request, account_params):
296     query = Query.create('local:account').set(account_params).select(['user', 'platform'])
297     results = execute_admin_query(request,query)
298     if not results:
299         raise Exception, "Failed creating manifold account on platform %s for user: %s" % (account_params['platform'], account_params['user'])
300     result, = results
301     return result['user_id']
302
303 def manifold_update_account(request,user_id,account_params):
304     # account_params: config
305     query = Query.update('local:account').filter_by('platform', '==', 'myslice').filter_by('user_id', '==', user_id).set(account_params).select('user_id')
306     results = execute_admin_query(request,query)
307     return results
308
309 #explicitly mention the platform_id
310 def manifold_delete_account(request, user_id, platform_id = None):
311     query = Query.delete('local:account').filter_by('user_id', '==', user_id)
312     if platform_id is not None:
313         query.filter_by('platform_id', '==', platform_id)
314     results = execute_admin_query(request,query)
315     return results
316
317 def manifold_delete_user(request, user_id):
318     query = Query.delete('local:user').filter_by('user_id', '==', user_id).select('user_id')
319     results = execute_admin_query(request,query)
320     return results
321
322
323 #not tested
324 def manifold_add_platform(request, platform_params):
325     query = Query.create('local:platform').set(platform_params).select(['user', 'platform'])
326     results = execute_admin_query(request,query)
327     if not results:
328         raise Exception, "Failed creating manifold platform %s for user: %s" % (platform_params['platform'], platform_params['user'])
329     result, = results
330     return result['platform_id']
331
332 def delete_local_user(wsgi_request, user_email):
333     user_query = Query().get('local:user') \
334         .filter_by('email', '==', user_email)           \
335         .select('user_id','config')
336     user = execute_admin_query(wsgi_request, user_query)
337     if len(user) == 0:
338         return False
339         #raise Exception, "User not found, check local DB"
340     else:
341         user_id = user[0]['user_id']
342         user_config = json.loads(user[0]['config'])
343         authority_hrn = user_config.get('authority', None)
344         
345         if is_pi(wsgi_request, '$user_hrn', authority_hrn):
346             # removing from Django auth_user
347             UserModel = get_user_model()
348             UserModel._default_manager.filter(email__iexact = user_email).delete()
349
350             # removing manifold account
351             manifold_delete_account(wsgi_request, user_id)           
352                      
353             # removing manifold user
354             manifold_delete_user(wsgi_request, user_id)
355         else:
356             return False
357             #raise Exception, "No sufficient rights on authority = ",authority_hrn
358
359     return True      
360
361
362 def make_request_user(user):
363     request = {}
364     request['type']          = 'user'
365     request['id']            = user.id
366     request['timestamp']     = user.created # XXX in DB ?
367     request['authority_hrn'] = user.authority_hrn
368     request['first_name']    = user.first_name
369     request['last_name']     = user.last_name
370     request['email']         = user.email
371     request['login']         = user.login
372     request['user_hrn']      = user.user_hrn
373     request['public_key']    = user.public_key
374     request['private_key']   = user.private_key
375     return request
376
377 def make_request_slice(slice):
378     request = {}
379     request['type'] = 'slice'
380     request['id'] = slice.id
381     request['user_hrn'] = slice.user_hrn
382     request['timestamp'] = slice.created
383     request['authority_hrn'] = slice.authority_hrn
384     request['slice_name'] = slice.slice_name
385     request['number_of_nodes'] = slice.number_of_nodes
386     request['type_of_nodes'] = slice.type_of_nodes
387     request['purpose'] = slice.purpose
388     return request
389
390 def make_request_project(project):
391     request = {}
392     request['type'] = 'project'
393     request['id'] = project.id
394     request['user_hrn'] = project.user_hrn
395     request['email'] = project.email
396     request['timestamp'] = project.created
397     request['authority_hrn'] = project.authority_hrn
398     request['project_name'] = project.project_name
399     request['purpose'] = project.purpose
400     return request
401
402 def make_request_join(join):
403     request = {}
404     request['type'] = 'join'
405     request['id'] = join.id
406     request['user_hrn'] = join.user_hrn
407     request['email'] = join.email
408     request['timestamp'] = join.created
409     request['authority_hrn'] = join.authority_hrn
410     request['project_name'] = join.project_name
411     return request
412
413 def make_request_authority(authority):
414     request = {}
415     request['type']                  = 'authority'
416     request['id']                    = authority.id
417     request['site_name']             = authority.site_name
418     request['site_latitude']         = authority.site_latitude
419     request['site_longitude']        = authority.site_longitude
420     request['site_url']              = authority.site_url
421     request['site_authority']        = authority.site_authority
422     request['site_abbreviated_name'] = authority.site_abbreviated_name
423     request['address_line1']         = authority.address_line1
424     request['address_line2']         = authority.address_line2
425     request['address_line3']         = authority.address_line3
426     request['address_city']          = authority.address_city
427     request['address_postalcode']    = authority.address_postalcode
428     request['address_state']         = authority.address_state
429     request['address_country']       = authority.address_country
430     request['authority_hrn']         = authority.authority_hrn
431     request['timestamp']             = authority.created
432     return request
433
434 def make_requests(pending_users, pending_slices, pending_authorities, pending_projects, pending_joins):
435     print("$$$$$$$$$$$$$$$  make_request")
436     requests = []
437     for user in pending_users:
438         requests.append(make_request_user(user))
439     for slice in pending_slices:
440         requests.append(make_request_slice(slice))
441     for authority in pending_authorities:
442         requests.append(make_request_authority(authority))
443     for project in pending_projects:
444         requests.append(make_request_project(project))
445     for join in pending_joins:
446         requests.append(make_request_join(join))
447     return requests   
448
449 def get_request_by_id(ids):
450     print("$$$$$$$$$$$$$$$$  get_request_by_id")
451     sorted_ids = { 'user': [], 'slice': [], 'authority': [], 'project': [], 'join': [] }
452     for type__id in ids:
453         type, id = type__id.split('__')
454         sorted_ids[type].append(id)
455         
456     if not ids:
457         pending_users  = PendingUser.objects.all()
458         pending_slices = PendingSlice.objects.all()
459         pending_authorities = PendingAuthority.objects.all()
460         pending_projects = PendingProject.objects.all()
461         pending_joins = PendingJoin.objects.all()
462     else:
463         pending_users  = PendingUser.objects.filter(id__in=sorted_ids['user']).all()
464         pending_slices = PendingSlice.objects.filter(id__in=sorted_ids['slice']).all()
465         pending_authorities = PendingAuthority.objects.filter(id__in=sorted_ids['authority']).all()
466         pending_projects = PendingProject.objects.filter(id__in=sorted_ids['project']).all()
467         pending_joins = PendingJoin.objects.filter(id__in=sorted_ids['join']).all()
468
469     return make_requests(pending_users, pending_slices, pending_authorities, pending_projects, pending_joins)
470
471 def get_requests(authority_hrns=None):
472     print("$$$$$$$$$$$$$   get_request_by_authority auth_hrns = ", authority_hrns)
473     if not authority_hrns:
474         ## get those pending users who have confirmed their emails
475         pending_users  = PendingUser.objects.filter(status__iexact = 'True')
476         pending_slices = PendingSlice.objects.all()
477         pending_authorities = PendingAuthority.objects.all()
478         pending_projects = PendingProject.objects.all()
479         pending_joins = PendingJoin.objects.all()
480     else:
481         pending_users  = PendingUser.objects
482         pending_slices = PendingSlice.objects
483         pending_authorities = PendingAuthority.objects
484         pending_projects = PendingProject.objects
485         pending_joins = PendingJoin.objects
486         from django.db.models import Q
487         list_user_Q = list()
488         list_slice_Q = list()
489         list_auth_Q = list()
490         list_proj_Q = list()
491         list_join_Q = list()
492         for hrn in authority_hrns:
493             list_user_Q.append(Q(authority_hrn__startswith=hrn, status__iexact = 'True'))
494             list_slice_Q.append(Q(authority_hrn__startswith=hrn))
495             list_auth_Q.append(Q(site_authority__startswith=hrn))
496             list_proj_Q.append(Q(authority_hrn__startswith=hrn))
497             list_join_Q.append(Q(authority_hrn__startswith=hrn))
498         from operator import __or__ as OR
499         pending_users        = pending_users.filter(reduce(OR, list_user_Q))
500         pending_slices       = pending_slices.filter(reduce(OR, list_slice_Q))
501         pending_authorities  = pending_authorities.filter(reduce(OR, list_auth_Q))
502         pending_projects     = pending_projects.filter(reduce(OR, list_proj_Q))
503         pending_joins        = pending_joins.filter(reduce(OR, list_join_Q))
504         #pending_authorities  = pending_authorities.all() #filter(reduce(OR, list_Q))
505
506     return make_requests(pending_users, pending_slices, pending_authorities, pending_projects, pending_joins)
507
508 # XXX Is it in sync with the form fields ?
509
510 def portal_validate_request(wsgi_request, request_ids):
511     status = {}
512
513     if not isinstance(request_ids, list):
514         request_ids = [request_ids]
515
516     requests = get_request_by_id(request_ids)
517     for request in requests:
518         # type, id, timestamp, details, allowed -- MISSING: authority_hrn
519         # CAREFUL about details
520         # user  : first name, last name, email, password, keypair
521         # slice : number of nodes, type of nodes, purpose
522         
523         request_status = {}
524
525         if request['type'] == 'user':
526
527             try:
528                 create_user(wsgi_request, request)
529                 request_status['SFA user'] = {'status': True }
530                 PendingUser.objects.get(id=request['id']).delete()
531             except Exception, e:
532                  request_status['SFA user'] = {'status': False, 'description': str(e)}
533                        
534 #            user_params = {'status':2}
535 #            manifold_update_user(request, request['email'], user_params)
536
537             # MANIFOLD user should be added beforehand, during registration
538             #try:
539             #    manifold_user_params = { key: request[key] for key in MANIFOLD_USER_KEYS }
540             #    # XXX # manifold_add_user(manifold_user_params)
541             #    request_status['MySlice user'] = {'status': True }
542             #except Exception, e:
543             #    request_status['MySlice user'] = {'status': False, 'description': str(e)}
544
545             # XXX
546             #manifold_account_params = { key: request[key] for key in MANIFOLD_ACCOUNT_KEYS }
547             #manifold_add_account(manifold_account_params)
548             #request_status['MySlice testbed accounts'] = {'status': False }
549
550         elif request['type'] == 'slice':
551             try:
552                 create_slice(wsgi_request, request)
553                 request_status['SFA slice'] = {'status': True }
554                 PendingSlice.objects.get(id=request['id']).delete()
555
556                 # Clear user's Credentials
557                 sfa_user = sfa_get_user(wsgi_request, request['user_hrn'])
558                 clear_user_creds(wsgi_request,sfa_user['user_email'])
559
560             except Exception, e:
561                 request_status['SFA slice'] = {'status': False, 'description': str(e)}
562
563         elif request['type'] == 'authority':
564             try:
565                 #hrn = "%s.%s" % (request['authority_hrn'], request['site_authority'])
566                 hrn = request['site_authority']
567                 # XXX tmp sfa dependency
568                 from sfa.util.xrn import Xrn 
569                 urn = Xrn(hrn, request['type']).get_urn()
570                 
571                 # Only hrn is required for Manifold Query 
572                 sfa_authority_params = {
573                     'authority_hrn'        : hrn,
574                     #'authority_urn'        : urn,
575                     #'type'       : request['type'],
576                     #'pi'        : None,
577                     #'enabled'    : True
578                 }
579                 print("ADD Authority")
580                 sfa_add_authority(wsgi_request, sfa_authority_params)
581                 request_status['SFA authority'] = {'status': True }
582                 PendingAuthority.objects.get(id=request['id']).delete()
583
584             except Exception, e:
585                 request_status['SFA authority'] = {'status': False, 'description': str(e)}
586
587         elif request['type'] == 'project':
588             try:
589                 hrn = request['authority_hrn'] + '.' + request['project_name']
590
591                 # Only hrn is required for Manifold Query 
592                 sfa_authority_params = {
593                     'authority_hrn'        : hrn
594                 }
595                 sfa_add_authority(wsgi_request, sfa_authority_params)
596                 request_status['SFA project'] = {'status': True }
597                 PendingProject.objects.get(id=request['id']).delete()
598                 
599                 # Add user as a PI of the project
600                 authority_add_pis(wsgi_request, hrn , request['user_hrn'])
601
602                 # Clear user's Credentials
603                 #sfa_user = sfa_get_user(wsgi_request, request['user_hrn'])
604                 clear_user_creds(wsgi_request,request['email'])
605
606             except Exception, e:
607                 request_status['SFA project'] = {'status': False, 'description': str(e)}
608
609         elif request['type'] == 'join':
610             try:
611                 # Add user as a PI of the project
612                 authority_add_pis(wsgi_request, request['authority_hrn'] , request['user_hrn'])
613
614                 request_status['SFA join'] = {'status': True }
615                 PendingJoin.objects.get(id=request['id']).delete()
616
617                 # Clear user's Credentials
618                 clear_user_creds(wsgi_request,request['email'])
619
620             except Exception, e:
621                 request_status['SFA join'] = {'status': False, 'description': str(e)+' - '+str(request)}
622         else:
623             request_status['other'] = {'status': False, 'description': 'unknown type of request'}
624         # XXX Remove from Pendings in database
625
626         status['%s__%s' % (request['type'], request['id'])] = request_status
627
628     return status
629
630 def validate_action(request, **kwargs):
631     ids = filter(None, kwargs['id'].split('/'))
632     status = portal_validate_request(request, ids)
633     json_answer = json.dumps(status)
634     return HttpResponse (json_answer, mimetype="application/json")
635
636
637 def reject_action(request, **kwargs):
638     ids = filter(None, kwargs['id'].split('/'))
639     status = portal_reject_request(request, ids)
640     json_answer = json.dumps(status)
641     return HttpResponse (json_answer, mimetype="application/json")
642
643
644 def portal_reject_request(wsgi_request, request_ids):
645     status = {}
646     # get the domain url    
647     current_site = Site.objects.get_current()
648     current_site = current_site.domain
649
650
651     if not isinstance(request_ids, list):
652         request_ids = [request_ids]
653
654     requests = get_request_by_id(request_ids)
655     for request in requests:
656         # type, id, timestamp, details, allowed -- MISSING: authority_hrn
657         # CAREFUL about details
658         # user  : first name, last name, email, password, keypair
659         # slice : number of nodes, type of nodes, purpose
660         
661         request_status = {}
662
663         if request['type'] == 'user':
664             try:
665                 request_status['SFA user'] = {'status': True }
666                 # getting user email based on id 
667                 ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
668                 for user in PendingUser.objects.raw('SELECT * FROM portal_pendinguser WHERE id = %s', [request['id']]):
669                     user_email= user.email
670                     first_name = user.first_name
671                     last_name = user.last_name
672
673                 ctx = {
674                     'first_name'    : first_name, 
675                     'last_name'     : last_name, 
676                     'portal_url'    : current_site,
677                     }
678                 try:
679                     theme.template_name = 'user_request_denied.txt'
680                     text_content = render_to_string(theme.template, ctx)
681                     theme.template_name = 'user_request_denied.html'
682                     html_content = render_to_string(theme.template, ctx)
683                     theme.template_name = 'email_default_sender.txt'
684                     sender =  render_to_string(theme.template, ctx)
685                     sender = sender.replace('\n', '')
686                                
687                     subject = 'User request denied.'
688
689                     msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
690                     msg.attach_alternative(html_content, "text/html")
691                     msg.send()
692                 except Exception, e:
693                     print("Failed to send email, please check the mail templates and the SMTP configuration of your server")   
694
695                 # removing from Django portal_pendinguser
696                 PendingUser.objects.get(id=request['id']).delete()
697             
698                 delete_local_user(wsgi_request, user_email)
699             except Exception, e:
700                 request_status['SFA authority'] = {'status': False, 'description': str(e)}
701                       
702         elif request['type'] == 'slice':
703             request_status['SFA slice'] = {'status': True } 
704
705             # getting user email based on id 
706             ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
707             for user in PendingSlice.objects.raw('SELECT * FROM portal_pendingslice WHERE id = %s', [request['id']]):
708                 user_email= user.type_of_nodes # XXX type_of_nodes field contains the email [shd be renamed in DB]
709                 slice_name = user.slice_name
710                 purpose = user.purpose
711                 url = user.number_of_nodes
712
713             ctx = {
714                 'slice_name': slice_name,
715                 'purpose': purpose,
716                 'url': url,
717                 'portal_url': current_site,
718                 }
719             try:
720                 theme.template_name = 'slice_request_denied.txt'
721                 text_content = render_to_string(theme.template, ctx)
722                 theme.template_name = 'slice_request_denied.html'
723                 html_content = render_to_string(theme.template, ctx)
724                 theme.template_name = 'email_default_sender.txt'
725                 sender =  render_to_string(theme.template, ctx)
726                 sender = sender.replace('\n', '')
727                                
728                 subject = 'Slice request denied.'
729
730                 msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
731                 msg.attach_alternative(html_content, "text/html")
732                 msg.send()
733             except Exception, e:
734                 print("Failed to send email, please check the mail templates and the SMTP configuration of your server")
735                       
736             PendingSlice.objects.get(id=request['id']).delete()
737
738         elif request['type'] == 'authority':
739             request_status['SFA authority'] = {'status': True }
740             
741             # getting user email based on id 
742             ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
743             for user in PendingAuthority.objects.raw('SELECT * FROM portal_pendingauthority WHERE id = %s', [request['id']]):
744                 user_email= user.address_line1 # XXX address_line1 field contains the email [shd be renamed in DB]
745                 site_name = user.site_name
746                 city = user.address_city
747                 country = user.address_country
748                 short_name = user.site_abbreviated_name
749                 url = user.site_url
750
751             ctx = { 
752                 'site_name': site_name,
753                 'short_name': short_name,
754                 'url': url,
755                 'city': city,
756                 'country': country,                          
757                 'portal_url'    : current_site,
758                 }
759                 
760             try:
761                 theme.template_name = 'authority_request_denied.txt'
762                 text_content = render_to_string(theme.template, ctx)
763                 theme.template_name = 'authority_request_denied.html'
764                 html_content = render_to_string(theme.template, ctx)
765                 theme.template_name = 'email_default_sender.txt'
766                 sender =  render_to_string(theme.template, ctx)
767                 sender = sender.replace('\n', '')
768                 subject = 'Authority request denied.'
769                 msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
770                 msg.attach_alternative(html_content, "text/html")
771                 msg.send()
772             except Exception, e:
773                 print("Failed to send email, please check the mail templates and the SMTP configuration of your server")
774
775             PendingAuthority.objects.get(id=request['id']).delete()
776
777         # XXX TMP we should send an email to the user to inform him/her
778         elif request['type'] == 'project':
779             request_status['SFA project'] = {'status': True }
780             PendingProject.objects.get(id=request['id']).delete()
781
782         elif request['type'] == 'join':
783             request_status['SFA join'] = {'status': True }
784             PendingJoin.objects.get(id=request['id']).delete()
785
786         status['%s__%s' % (request['type'], request['id'])] = request_status
787
788     return status
789
790 # Django and ajax
791 # http://djangosnippets.org/snippets/942/
792
793
794
795 #-------------------------------------------------------------------------------
796 # REQUESTS - Slices
797 #-------------------------------------------------------------------------------
798
799 def create_slice(wsgi_request, request):
800     """
801     Arguments:
802         wsgi_request (~ WSGIRequest) : 
803         request (dict) : the slice request in our own dict format
804
805     Raises:
806         Exception
807     """
808     hrn = "%s.%s" % (request['authority_hrn'], request['slice_name'])
809     # XXX tmp sfa dependency
810     from sfa.util.xrn import Xrn 
811     urn = Xrn(hrn, request['type']).get_urn()
812     
813     # Add User to Slice if we have the user_hrn in pendingslice table
814     user_hrn = request.get('user_hrn', None)
815     user_hrns = list([user_hrn]) if user_hrn else list()
816    
817     # CACHE PB with fields
818     page = Page(wsgi_request)
819     metadata = page.get_metadata()
820     user_md = metadata.details_by_object('user')
821     user_fields = [column['name'] for column in user_md['column']]
822
823     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
824     #user_query  = Query().get('myslice:user').select('user_hrn','user_email').filter_by('user_hrn','==',user_hrn)
825     user_query  = Query().get('myslice:user').select(user_fields).filter_by('user_hrn','==',user_hrn)
826     user_details_sfa = execute_admin_query(wsgi_request, user_query)
827     if not user_details_sfa:
828         raise Exception, "User %s doesn't exist, validate user before validating slice" % user_hrn
829     for user in user_details_sfa:
830         user_email = user['user_email']
831
832     # XXX LOIC Quick fix because this is totally inconsistent
833     if not 'number_of_nodes' in request:
834         request['number_of_nodes']=""
835
836     # XXX We should create a slice with Manifold terminology
837     slice_params = {
838         'slice_hrn'        : hrn, 
839         'slice_urn'        : urn,
840         'slice_type'       : request['type'],
841         'url'              : request['number_of_nodes'],
842         'users'            : user_hrns,
843         'slice_enabled'    : True
844     }
845     # ignored in request: id, timestamp,  number_of_nodes, type_of_nodes, purpose
846
847     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
848     query = Query.create('myslice:slice').set(slice_params).select('slice_hrn')
849     results = execute_query(wsgi_request, query)
850     if not results:
851         raise Exception, "Could not create %s. Already exists ?" % slice_params['hrn']
852     else:
853         clear_user_creds(wsgi_request,user_email)
854         # log user activity
855         activity.slice.validate(request, { "slice" : hrn })
856         try:
857             theme.template_name = 'slice_request_validated.txt'
858             text_content = render_to_string(theme.template, request)
859             theme.template_name = 'slice_request_validated.html'
860             html_content = render_to_string(theme.template, request)
861         
862             theme.template_name = 'email_default_sender.txt'
863             sender =  render_to_string(theme.template, request)
864             sender = sender.replace('\n', '')
865
866             subject = 'Slice request validated'
867
868             msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
869             msg.attach_alternative(html_content, "text/html")
870             msg.send()
871         except Exception, e:
872             print("Failed to send email, please check the mail templates and the SMTP configuration of your server")
873        
874     return results
875
876 def create_pending_slice(wsgi_request, request, email):
877     """
878     """
879
880     # Insert an entry in the PendingSlice table
881     s = PendingSlice(
882         slice_name      = request['slice_name'],
883         user_hrn        = request['user_hrn'],
884         authority_hrn   = request['authority_hrn'],
885         number_of_nodes = request['url'], # field needs to be renamed
886         purpose         = request['purpose'],
887         type_of_nodes   = request['email'] # field needs to be renamed 
888     )
889     s.save()
890
891     try:
892         # Send an email: the recipients are the PI of the authority
893         recipients = authority_get_pi_emails(wsgi_request, request['authority_hrn'])
894
895         theme.template_name = 'slice_request_email.txt' 
896         text_content = render_to_string(theme.template, request)
897     
898         theme.template_name = 'slice_request_email.html' 
899         html_content = render_to_string(theme.template, request)
900     
901         theme.template_name = 'slice_request_email_subject.txt'
902         subject = render_to_string(theme.template, request)
903         subject = subject.replace('\n', '')
904     
905         sender = email
906         msg = EmailMultiAlternatives(subject, text_content, sender, recipients)
907         msg.attach_alternative(html_content, "text/html")
908         msg.send()
909     except Exception, e:
910         print("Failed to send email, please check the mail templates and the SMTP configuration of your server")
911
912
913 def create_pending_project(wsgi_request, request):
914     """
915     """
916
917     # Insert an entry in the PendingProject table
918     s = PendingProject(
919         project_name    = request['project_name'],
920         user_hrn        = request['user_hrn'],
921         email           = request['email'],
922         authority_hrn   = request['authority_hrn'],
923         purpose         = request['purpose'],
924     )
925     s.save()
926
927 def create_pending_join(wsgi_request, request):
928     """
929     """
930
931     # Insert an entry in the PendingJoin table
932     s = PendingJoin(
933         user_hrn        = request['user_hrn'],
934         email           = request['email'],
935         project_name    = request['project_name'],
936         authority_hrn   = request['authority_hrn'],
937     )
938     s.save()
939
940
941 #     try:
942 #         # Send an email: the recipients are the PI of the authority
943 #         recipients = authority_get_pi_emails(wsgi_request, request['authority_hrn'])
944
945 #         theme.template_name = 'slice_request_email.txt' 
946 #         text_content = render_to_string(theme.template, request)
947 #     
948 #         theme.template_name = 'slice_request_email.html' 
949 #         html_content = render_to_string(theme.template, request)
950 #     
951 #         theme.template_name = 'slice_request_email_subject.txt'
952 #         subject = render_to_string(theme.template, request)
953 #         subject = subject.replace('\n', '')
954 #     
955 #         sender = email
956 #         msg = EmailMultiAlternatives(subject, text_content, sender, recipients)
957 #         msg.attach_alternative(html_content, "text/html")
958 #         msg.send()
959 #     except Exception, e:
960 #         print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
961
962
963 #-------------------------------------------------------------------------------
964 # REQUESTS - Users
965 #-------------------------------------------------------------------------------
966
967 def manifold_add_reference_user_accounts(wsgi_request, request):
968     """When a new user is created, add reference accounts to the reference platform.
969     """
970     # XXX XXX XXX The rest of this function has to be checked XXX XXX XXX
971
972     # Retrieve user information
973     user_query  = Query().get('local:user')             \
974         .select('user_id', 'config', 'email', 'status') \
975         .filter_by('email', '==', request['email'])
976     user_details = execute_admin_query(wsgi_request, user_query)
977
978     # USER MAIN ACCOUNT != reference
979     #print 'USER MAIN ACCOUNT != reference'
980     list_accounts_query = Query().get('local:account')              \
981         .select('user_id', 'platform_id', 'auth_type', 'config')    \
982         .filter_by('user_id', '==', user_details[0]['user_id'])     \
983         .filter_by('auth_type', '!=', 'reference')
984     list_accounts = execute_admin_query(wsgi_request, list_accounts_query)
985
986     # XXX main_platform is being erased several times ???
987     for account in list_accounts:
988         main_platform_query = Query().get('local:platform')         \
989             .select('platform_id', 'platform')                      \
990             .filter_by('platform_id', '==', account['platform_id'])
991         main_platform = execute_admin_query(wsgi_request, main_platform_query)
992
993     # Add reference accounts on SFA enabled platforms
994     platforms_query = Query().get('local:platform') \
995         .filter_by('disabled', '==', '0')           \
996         .filter_by('gateway_type', '==', 'sfa')     \
997         .select('platform_id', 'gateway_type')
998     platforms = execute_admin_query(wsgi_request, platforms_query)
999     for platform in platforms:
1000         #print "add reference to platform ",platform
1001         manifold_account_params = {
1002             'user_id'       : user_details[0]['user_id'],
1003             'platform_id'   : platform['platform_id'],
1004             'auth_type'     : 'reference',
1005             'config'        : '{"reference_platform": "' + main_platform[0]['platform'] + '"}',
1006         }
1007         manifold_add_account(wsgi_request, manifold_account_params)
1008
1009 def sfa_create_user(wsgi_request, request, namespace = None, as_admin = False):
1010     """
1011     Arguments:
1012         wsgi_request (~ WSGIRequest) : 
1013         request (dict) : the user request in our own dict format
1014
1015     Raises:
1016         Exception
1017     """
1018     from sfa.util.xrn import Xrn 
1019
1020     auth_pi = request.get('pi', None)
1021     auth_pi = list([auth_pi]) if auth_pi else list()
1022
1023     # We create a user request with Manifold terminology
1024     sfa_user_params = {
1025         'user_hrn'          : request['user_hrn'],
1026         'user_email'        : request['email'],
1027         'user_urn'          : Xrn(request['user_hrn'], request['type']).get_urn(),
1028         'user_type'         : request['type'],
1029         'keys'              : request['public_key'],
1030         'user_first_name'   : request['first_name'],
1031         'user_last_name'    : request['last_name'],
1032         'pi_authorities'    : auth_pi,
1033         'user_enabled'      : True
1034     }
1035
1036     if namespace is not None:
1037         query = Query.create('%s:user' % namespace).set(sfa_user_params).select('user_hrn')
1038     else:
1039         # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
1040         query = Query.create('myslice:user').set(sfa_user_params).select('user_hrn')
1041
1042     if as_admin:
1043         results = execute_admin_query(wsgi_request, query)
1044     else:
1045         results = execute_query(wsgi_request, query)
1046
1047     if not results:
1048         raise Exception, "Could not create %s. Already exists ?" % sfa_user_params['user_hrn']
1049     else:
1050         try:
1051             theme.template_name = 'user_request_validated.txt'
1052             text_content = render_to_string(theme.template, request)
1053             theme.template_name = 'user_request_validated.html'
1054             html_content = render_to_string(theme.template, request)
1055         
1056             theme.template_name = 'email_default_sender.txt'
1057             sender =  render_to_string(theme.template, request)
1058             sender = sender.replace('\n', '')
1059
1060
1061             subject = 'User validated'
1062
1063             msg = EmailMultiAlternatives(subject, text_content, sender, [request['email']])
1064             msg.attach_alternative(html_content, "text/html")
1065             msg.send()
1066         except Exception, e:
1067             print("Failed to send email, please check the mail templates and the SMTP configuration of your server")
1068
1069     return results
1070
1071 def iotlab_create_user (wsgi_request, request, namespace = None, as_admin=False):
1072    
1073     import requests
1074     import time
1075     from requests.auth import HTTPBasicAuth
1076    
1077     engine = ConfigEngine() 
1078     URL_REST = engine.iotlab_url()
1079     LOGIN_ADMIN = engine.iotlab_admin_user()
1080     PASSWORD_ADMIN = engine.iotlab_admin_password()
1081
1082     auth = HTTPBasicAuth(LOGIN_ADMIN,PASSWORD_ADMIN)
1083     headers = {'content-type': 'application/json'}
1084
1085     for user in PendingUser.objects.raw('SELECT * FROM portal_pendinguser WHERE email = %s', [request['email']]):
1086         password= user.password
1087
1088
1089     iotlab_user_params = {
1090         "type"          : "SA",
1091         #"login"         : request['email'], #auto generated by iotlab
1092         "password"      : password,
1093         "firstName"     : request['first_name'],
1094         "lastName"      : request['last_name'],
1095         "email"         : request['email'],
1096         "structure"     : request['authority_hrn'],
1097         "city"          : "N/A",
1098         "country"       : "N/A",
1099         "sshPublicKey"  : request['public_key'],
1100         "motivations"   : "SFA federation",
1101     }    
1102    
1103     iotlab_user_params1 = json.dumps(iotlab_user_params)
1104     r=requests.post(url=URL_REST, data=iotlab_user_params1, headers=headers, auth=auth)
1105     print('Create iotlab user : ', r.status_code, r.text)
1106     return r.text
1107
1108 def create_user(wsgi_request, request, namespace = None, as_admin = False):
1109     # XXX This has to be stored centrally
1110     USER_STATUS_ENABLED = 2
1111
1112     # NOTE : if we were to create a user directly (just like we create slices,
1113     # we would have to perform the steps in create_pending_user too
1114
1115     # Add the user to the SFA registry
1116     sfa_create_user(wsgi_request, request, namespace, as_admin)
1117
1118     # Update Manifold user status
1119     manifold_update_user(wsgi_request, request['email'], {'status': USER_STATUS_ENABLED})
1120
1121     # Add reference accounts for platforms
1122     manifold_add_reference_user_accounts(wsgi_request, request)
1123
1124     # Add the user to iotlab portal if theme is set to onelab
1125     if theme.theme == 'onelab':
1126         iotlab_create_user (wsgi_request, request)
1127
1128 def create_pending_user(wsgi_request, request, user_detail):
1129     """
1130     """
1131
1132     # Insert an entry in the PendingUser table
1133     b = PendingUser(
1134         first_name    = request['first_name'],
1135         last_name     = request['last_name'],
1136         authority_hrn = request['authority_hrn'],
1137         email         = request['email'],
1138         password      = request['password'],
1139         public_key    = request['public_key'],
1140         private_key   = request['private_key'],
1141         user_hrn      = request['user_hrn'],
1142         pi            = request['pi'],
1143         email_hash    = request['email_hash'],
1144         status        = 'False',
1145     )
1146     b.save()
1147     # sends email to user to activate the email
1148     theme.template_name = 'activate_user.html'
1149     html_content = render_to_string(theme.template, request)
1150     theme.template_name = 'activate_user.txt'
1151     text_content = render_to_string(theme.template, request)
1152     theme.template_name = 'activate_user_email_subject.txt'
1153     subject = render_to_string(theme.template, request)
1154     subject = subject.replace('\n', '')
1155     theme.template_name = 'email_default_sender.txt'
1156     sender =  render_to_string(theme.template, request)
1157     sender = sender.replace('\n', '')
1158     recipient = [request['email']]
1159     #recipient = recipient.append(request['email'])
1160
1161     msg = EmailMultiAlternatives(subject, text_content, sender, recipient)
1162     msg.attach_alternative(html_content, "text/html")
1163     msg.send()
1164    
1165     # saves the user to django auth_user table [needed for password reset]
1166     user = User.objects.create_user(request['email'], request['email'], request['password'])
1167
1168     # Creating a manifold user
1169     user_id = manifold_add_user(wsgi_request, request)
1170
1171     # Creating a Manifold account on the MySlice platform
1172     # Note the JSON representation of public and private keys already includes quotes
1173     account_config = {
1174         'user_hrn'          : request['user_hrn'],
1175         'user_public_key'   : request['public_key'],
1176     }
1177     if request['private_key']:
1178         account_config['user_private_key'] = request['private_key']
1179
1180     user_id = user_detail['user_id'] + 1 # the user_id for the newly created user in local:user
1181
1182     # XXX TODO: Require a myslice platform
1183     # ALERT: this will disapear with ROUTERV2 of Manifold
1184     # We have to consider the case where several registries can be used
1185     # Removed hardcoded platform = 5
1186     # This platform == 'myslice' is a TMP FIX !!
1187     try:
1188         reg_platform_query = Query().get('local:platform') \
1189             .filter_by('platform', '==', 'myslice')           \
1190             .select('platform_id')
1191         reg_platform = execute_admin_query(wsgi_request, reg_platform_query)
1192
1193         reg_platform_id = reg_platform[0]['platform_id']
1194         account_params = {
1195             'platform_id'   : reg_platform_id, # XXX ALERT !!
1196             'user_id'       : user_id, 
1197             'auth_type'     : request['auth_type'], 
1198             'config'        : json.dumps(account_config),
1199         }
1200         manifold_add_account(wsgi_request, account_params)
1201     except Exception, e:
1202         print("Failed creating manifold account on platform %s for user: %s" % ('myslice', request['email']))
1203
1204     try:
1205         # Send an email: the recipients are the PI of the authority
1206         # If No PI is defined for this Authority, send to a default email (different for each theme)
1207         recipients = authority_get_pi_emails(wsgi_request, request['authority_hrn'])
1208         
1209         theme.template_name = 'user_request_email.html'
1210         html_content = render_to_string(theme.template, request)
1211  
1212         theme.template_name = 'user_request_email.txt'
1213         text_content = render_to_string(theme.template, request)
1214     
1215         theme.template_name = 'user_request_email_subject.txt'
1216         subject = render_to_string(theme.template, request)
1217         subject = subject.replace('\n', '')
1218     
1219         theme.template_name = 'email_default_sender.txt'
1220         sender =  render_to_string(theme.template, request)
1221         sender = sender.replace('\n', '')
1222     
1223         msg = EmailMultiAlternatives(subject, text_content, sender, recipients)
1224         msg.attach_alternative(html_content, "text/html")
1225         msg.send()
1226     except Exception, e:
1227         print("Failed to send email, please check the mail templates and the SMTP configuration of your server")
1228         import traceback
1229         traceback.print_exc()