1 from django.http import HttpResponse
2 from manifold.core.query import Query
3 from manifoldapi.manifoldapi import execute_query,execute_admin_query
4 from portal.models import PendingUser, PendingSlice, PendingAuthority, PendingProject, PendingJoin
5 from unfold.page import Page
9 from django.contrib.auth.models import User
10 from django.contrib.auth import get_user_model
11 from django.template.loader import render_to_string
12 from django.core.mail import EmailMultiAlternatives, send_mail
14 from myslice.theme import ThemeView
15 from myslice.configengine import ConfigEngine
17 from myslice.settings import logger
19 from rest.sfa_api import sfa_client
25 # Thierry: moving this right into the code so
26 # most people can use myslice without having to install sfa
27 # XXX tmp sfa dependency, should be moved to SFA gateway
28 #from sfa.util.xrn import Xrn
30 def get_myslice_platform(request):
31 platform_query = Query().get('local:platform').select('platform_id','platform','gateway_type','disabled','config').filter_by('platform','==','myslice')
32 platform_details = execute_query(request, platform_query)
33 if isinstance(platform_details,list):
34 for platform_detail in platform_details:
35 return platform_detail
39 def get_myslice_account(request):
41 platform_myslice = get_myslice_platform(request)
42 account_query = Query().get('local:account').select('user_id','platform_id','auth_type','config').filter_by('platform_id','==',platform_myslice['platform_id'])
43 account_details = execute_query(request, account_query)
44 for account_detail in account_details:
46 except Exception as e:
50 def get_registry_url(request):
52 platform_detail = get_myslice_platform(request)
53 platform_config = json.loads(platform_detail['config'])
55 hostname = socket.gethostbyaddr(socket.gethostname())[0]
56 registry = platform_config.get('registry','N/A')
57 if 'localhost' in registry:
58 port = registry.split(':')[-1:][0]
59 registry = "http://" + hostname +':'+ port
61 except Exception as e:
65 def get_jfed_identity(request):
67 account_detail = get_myslice_account(request)
68 account_config = json.loads(account_detail['config'])
69 if 'user_private_key' in account_config:
70 private_key = account_config['user_private_key']
71 user_hrn = account_config.get('user_hrn','N/A')
72 platform_detail = get_myslice_platform(request)
73 registry = get_registry_url(request)
74 #registry = 'http://sfa-fed4fire.pl.sophia.inria.fr:12345/'
75 jfed_identity = user_hrn + '\n' + registry + '\n' + private_key
79 except Exception as e:
83 def getAuthorities(request, admin = False):
84 # XXX theme has to be the same as the root authority
85 result = sfa_client(request,'List',hrn=theme.theme,object_type='authority',platforms=['myslice'],admin=admin)
87 for item in result['myslice']:
88 t_hrn = item['hrn'].split('.')
90 authorities.append({'authority_hrn':item['hrn'], 'name':item['name'], 'shortname':t_hrn[-1].upper()})
92 authorities.append({'authority_hrn':item['hrn']})
93 return sorted(authorities)
96 # Get the list of pis in a given authority
97 def authority_get_pis(request, authority_hrn):
98 # CACHE PB with fields
100 metadata = page.get_metadata()
101 auth_md = metadata.details_by_object('authority')
102 auth_fields = [column['name'] for column in auth_md['column']]
104 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
105 query = Query.get('myslice:authority').filter_by('authority_hrn', '==', authority_hrn).select(auth_fields)
106 results = execute_admin_query(request, query)
107 #print "authority_get_pis = %s" % results
108 # NOTE: temporarily commented. Because results is giving empty list.
109 # Needs more debugging
111 # raise Exception, "Authority not found: %s" % authority_hrn
113 #return result['pi_users']
116 #check the user is pi or not in the registry
117 def authority_check_pis(request, user_email):
119 user_query = Query().get('local:user').filter_by('email', '==', user_email).select('user_id','email','password','config')
120 user_details = execute_admin_query(request, user_query)
122 # getting the authority_hrn
123 for user_detail in user_details:
124 user_id = user_detail['user_id']
125 if user_detail['config']:
126 config = json.loads(user_detail['config'])
127 authority_hrn = config.get('authority','Unknown Authority')
129 account_query = Query().get('local:account').filter_by('user_id', '==', user_id).select('user_id','platform_id','auth_type','config')
130 account_details = execute_admin_query(request, account_query)
132 platform_query = Query().get('local:platform').select('platform_id','platform')
133 platform_details = execute_admin_query(request, platform_query)
135 for account_detail in account_details:
136 for platform_detail in platform_details:
137 if platform_detail['platform_id'] == account_detail['platform_id']:
138 if 'myslice' in platform_detail['platform']:
139 account_config = json.loads(account_detail['config'])
140 user_hrn = account_config.get('user_hrn','N/A')
143 pis = authority_get_pis (request, authority_hrn)
145 pi_list = pi['pi_users']
147 if user_hrn in pi_list:
151 except Exception as e:
152 logger.error("Exception in actions.py in authority_check_pis {}".format(e))
156 def authority_add_pis(request, authority_hrn, user_hrn):
159 # getting pis of the authority of the user
160 pis = authority_get_pis (request, authority_hrn)
162 pi_list = pi['pi_users']
164 updated_pi_list = pi_list.append(user_hrn)
165 query = Query.update('myslice:authority').filter_by('authority_hrn', '==', authority_hrn).set({'pi_users':pi_list})
166 results = execute_query(request,query)
167 newpis = authority_get_pis (request, authority_hrn)
169 # Add the user to the slices of the project he/she joined
170 if len(authority_hrn.split('.')) > 2:
171 # this authority_hrn is a project
172 query_slices = Query.get('myslice:slice').filter_by('parent_authority', '==', authority_hrn).select('slice_hrn')
173 results_slices = execute_query(request,query_slices)
174 for s in results_slices:
175 sfa_add_user_to_slice(request, user_hrn, s['slice_hrn'])
176 # Clear Credentials of the user
177 user_email = get_user_email(request, user_hrn)
178 clear_user_creds(request, user_email)
181 except Exception as e:
182 logger.error("Exception in actions.py in authority_add_pis {}".format(e))
183 raise Exception, "Exception in actions.py in authority_add_pis {}".format(e)
185 def authority_remove_pis(request, authority_hrn, user_hrn):
188 # getting pis of the authority of the user
189 pis = authority_get_pis (request, authority_hrn)
191 pi_list = pi['pi_users']
193 updated_pi_list = pi_list.remove(user_hrn)
194 query = Query.update('myslice:authority').filter_by('authority_hrn', '==', authority_hrn).set({'pi_users':pi_list})
195 results = execute_query(request,query)
196 newpis = authority_get_pis (request, authority_hrn)
198 # Remove the user from the slices of the project he/she left
199 if len(authority_hrn.split('.')) > 2:
200 # this authority_hrn is a project
201 query_slices = Query.get('myslice:slice').filter_by('parent_authority', '==', authority_hrn).select('slice_hrn')
202 results_slices = execute_query(request,query_slices)
203 for s in results_slices:
204 print 'remove from slice %s' % s
205 sfa_remove_user_from_slice(request, user_hrn, s['slice_hrn'])
207 # Clear Credentials of the user
208 user_email = get_user_email(request, user_hrn)
209 clear_user_creds(request, user_email)
212 except Exception as e:
213 logger.error("Exception in actions.py in authority_remove_pis {}".format(e))
214 raise Exception, "Exception in actions.py in authority_remove_pis {}".format(e)
217 def authority_get_pi_emails(request, authority_hrn):
218 pi_users = authority_get_pis(request,authority_hrn)
219 logger.info("pi_users = %s" % pi_users)
221 if any(pi['pi_users'] == None or not pi['pi_users'] for pi in pi_users):
222 #theme.template_name = 'email_default_recipients.txt'
223 #default_email = render_to_string(theme.template, request)
224 #default_email = default_email.replace('\n', '')
225 #return default_email
226 # the above doesn't work
227 return ['support@onelab.eu']
229 pi_user_hrns = [ hrn for x in pi_users for hrn in x['pi_users'] ]
231 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
232 query = Query.get('myslice:user').filter_by('user_hrn', 'included', pi_user_hrns).select('user_email')
233 results = execute_admin_query(request, query)
234 return [result['user_email'] for result in results]
236 def get_user_email(request, user_hrn):
237 query = Query.get('myslice:user').filter_by('user_hrn', '==', user_hrn).select('user_email')
238 results = execute_admin_query(request, query)
239 return results[0]['user_email']
241 #clear user credentials
242 def clear_user_creds(request, user_email):
244 user_query = Query().get('local:user').filter_by('email', '==', user_email).select('user_id','email','password','config')
245 user_details = execute_admin_query(request, user_query)
247 # getting the user_id from the session
248 for user_detail in user_details:
249 user_id = user_detail['user_id']
250 user_email = user_detail['email']
252 account_query = Query().get('local:account').filter_by('user_id', '==', user_id).select('user_id','platform_id','auth_type','config')
253 account_details = execute_admin_query(request, account_query)
255 platform_query = Query().get('local:platform').select('platform_id','platform')
256 platform_details = execute_admin_query(request, platform_query)
258 for account_detail in account_details:
259 for platform_detail in platform_details:
260 if platform_detail['platform_id'] == account_detail['platform_id']:
261 if 'myslice' in platform_detail['platform']:
262 account_config = json.loads(account_detail['config'])
263 #user_cred = account_config.get('delegated_user_credential','N/A')
264 user_cred = account_config.get('user_credential','N/A')
265 if 'N/A' not in user_cred:
266 user_hrn = account_config.get('user_hrn','N/A')
267 user_pub_key = json.dumps(account_config.get('user_public_key','N/A'))
268 user_priv_key = json.dumps(account_config.get('user_private_key','N/A'))
269 updated_config = '{"user_public_key":'+ user_pub_key + ', "user_private_key":'+ user_priv_key + ', "user_hrn":"'+ user_hrn + '"}'
270 user_params = { 'config': updated_config}
271 manifold_update_account(request, user_id,user_params)
276 except Exception as e:
277 logger.error("Exception in actions.py in clear_user_creds {}".format(e))
280 def is_pi(wsgi_request, user_hrn, authority_hrn):
281 # authorities from user where user_hrn == "ple.upmc.jordan_auge"
282 logger.debug("#### actions.py is_pi authority_hrn = {}".format(authority_hrn))
284 # CACHE PB with fields
285 page = Page(wsgi_request)
286 metadata = page.get_metadata()
287 user_md = metadata.details_by_object('user')
288 user_fields = [column['name'] for column in user_md['column']]
290 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
291 query = Query().get('myslice:user').select(user_fields).filter_by('user_hrn','==',user_hrn)
292 #query = Query.get('myslice:user').filter_by('user_hrn', '==', user_hrn).select('pi_authorities')
293 results = execute_query(wsgi_request, query)
294 for user_detail in results:
295 if authority_hrn in user_detail['pi_authorities']:
297 except Exception as e:
298 logger.error("Exception in actions.py in is_pi {}".format(e))
303 def sfa_get_user(request, user_hrn, pub=None):
305 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
306 query_sfa_user = Query.get('myslice:user').filter_by('user_hrn', '==', user_hrn)
307 result_sfa_user = execute_admin_query(request, query_sfa_user)
308 return result_sfa_user[0]
310 def sfa_update_user(request, user_hrn, user_params):
311 # user_params: keys [public_key]
312 if 'email' in user_params:
313 user_params['user_email'] = user_params['email']
315 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
316 query = Query.update('myslice:user').filter_by('user_hrn', '==', user_hrn).set(user_params).select('user_hrn')
317 results = execute_admin_query(request,query)
320 def sfa_add_authority(request, authority_params):
322 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
323 query = Query.create('myslice:authority').set(authority_params).select('authority_hrn')
324 results = execute_query(request, query)
325 logger.info("sfa_add_auth results={}".format(results))
327 raise Exception, "Could not create %s. Already exists ?" % authority_params['hrn']
330 def sfa_add_user_to_slice(request, user_hrn, slice_hrn):
331 # UPDATE myslice:slice SET users = ['fed4fire.upmc.loic_baron', 'fed4fire.upmc.mohammed-yasin_rahman', 'fed4fire.upmc.demo'] WHERE slice_hrn == 'fed4fire.upmc.project_y.test_under' SELECT slice_hrn, slice_urn
332 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
333 query_current_users = Query.get('myslice:slice').select('users').filter_by('slice_hrn','==',slice_hrn)
334 results_current_users = execute_query(request, query_current_users)
335 current_users = list()
336 for r in results_current_users:
337 current_users.extend(r['users'])
338 users = list(set([user_hrn]) | set(current_users))
340 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
341 query = Query.update('myslice:slice').filter_by('slice_hrn', '==', slice_hrn).set({'users':users}).select('slice_hrn')
342 results = execute_query(request, query)
343 # Also possible but not supported yet
344 # UPDATE myslice:user SET slice=['ple.upmc.agent','ple.upmc.myslicedemo','ple.upmc.tophat'] where user_hrn=='ple.upmc.azerty'
346 raise Exception, "Could not add user %s to slice %s" % (user_hrn, slice_hrn)
349 def sfa_remove_user_from_slice(request, user_hrn, slice_hrn):
350 # UPDATE myslice:slice SET users = ['fed4fire.upmc.loic_baron', 'fed4fire.upmc.demo'] WHERE slice_hrn == 'fed4fire.upmc.project_y.test_under' SELECT slice_hrn, slice_urn
351 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
352 query_current_users = Query.get('myslice:slice').select('users').filter_by('slice_hrn','==',slice_hrn)
353 results_current_users = execute_query(request, query_current_users)
354 current_users = list()
355 for r in results_current_users:
356 current_users.extend(r['users'])
357 if user_hrn in current_users:
358 current_users.remove(user_hrn)
360 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
361 query = Query.update('myslice:slice').filter_by('slice_hrn', '==', slice_hrn).set({'users':current_users}).select('slice_hrn')
362 results = execute_query(request, query)
363 # Also possible but not supported yet
364 # UPDATE myslice:user SET slice=['ple.upmc.agent','ple.upmc.myslicedemo','ple.upmc.tophat'] where user_hrn=='ple.upmc.azerty'
366 raise Exception, "Could not remove user %s to slice %s" % (user_hrn, slice_hrn)
371 def manifold_add_user(wsgi_request, request):
372 """Add a Manifold user corresponding to a user request.
375 wsgi_request: a WSGIRequest instance
376 request (dict): a dictionary containing the user request built from the
380 The user_id of the inserted user.
386 USER_CONFIG = '{"firstname": "%(first_name)s", "lastname": "%(last_name)s", "authority": "%(authority_hrn)s"}'
389 'email' : request['email'],
390 'password' : request['password'],
391 'config' : USER_CONFIG % request,
395 query = Query.create('local:user').set(user_params).select('email')
396 results = execute_admin_query(request, query)
398 raise Exception, "Failed creating manifold user: %s" % user_params['email']
400 return result['user_id']
402 def manifold_update_user(request, email, user_params):
403 # user_params: password, config e.g.,
404 query = Query.update('local:user').filter_by('email', '==', email).set(user_params).select('email')
405 results = execute_admin_query(request,query)
406 # NOTE: results remains empty and goes to Exception. However, it updates the manifold DB.
407 # That's why I commented the exception part. -- Yasin
409 # raise Exception, "Failed updating manifold user: %s" % user_params['email']
413 def manifold_add_account(request, account_params):
414 query = Query.create('local:account').set(account_params).select(['user', 'platform'])
415 results = execute_admin_query(request,query)
417 raise Exception, "Failed creating manifold account on platform %s for user: %s" % (account_params['platform'], account_params['user'])
419 return result['user_id']
421 def manifold_update_account(request,user_id,account_params):
422 # account_params: config
423 query = Query.update('local:account').filter_by('platform', '==', 'myslice').filter_by('user_id', '==', user_id).set(account_params).select('user_id')
424 results = execute_admin_query(request,query)
427 #explicitly mention the platform_id
428 def manifold_delete_account(request, user_id, platform_id = None):
429 query = Query.delete('local:account').filter_by('user_id', '==', user_id)
430 if platform_id is not None:
431 query.filter_by('platform_id', '==', platform_id)
432 results = execute_admin_query(request,query)
435 def manifold_delete_user(request, user_id):
436 query = Query.delete('local:user').filter_by('user_id', '==', user_id).select('user_id')
437 results = execute_admin_query(request,query)
442 def manifold_add_platform(request, platform_params):
443 query = Query.create('local:platform').set(platform_params).select(['user', 'platform'])
444 results = execute_admin_query(request,query)
446 raise Exception, "Failed creating manifold platform %s for user: %s" % (platform_params['platform'], platform_params['user'])
448 return result['platform_id']
450 def delete_local_user(wsgi_request, user_email):
451 user_query = Query().get('local:user') \
452 .filter_by('email', '==', user_email) \
453 .select('user_id','config')
454 user = execute_admin_query(wsgi_request, user_query)
457 #raise Exception, "User not found, check local DB"
459 user_id = user[0]['user_id']
460 user_config = json.loads(user[0]['config'])
461 authority_hrn = user_config.get('authority', None)
463 #if is_pi(wsgi_request, '$user_hrn', authority_hrn):
465 # removing from Django auth_user
466 UserModel = get_user_model()
467 UserModel._default_manager.filter(email__iexact = user_email).delete()
469 # removing manifold account
470 manifold_delete_account(wsgi_request, user_id)
472 # removing manifold user
473 manifold_delete_user(wsgi_request, user_id)
476 print "No sufficient rights on authority = ",authority_hrn
481 def make_request_user(user):
483 request['type'] = 'user'
484 request['id'] = user.id
485 request['timestamp'] = user.created # XXX in DB ?
486 request['authority_hrn'] = user.authority_hrn
487 request['first_name'] = user.first_name
488 request['last_name'] = user.last_name
489 request['email'] = user.email
490 request['login'] = user.login
491 request['user_hrn'] = user.user_hrn
492 request['public_key'] = user.public_key
493 request['private_key'] = user.private_key
496 def make_request_slice(slice):
498 request['type'] = 'slice'
499 request['id'] = slice.id
500 request['user_hrn'] = slice.user_hrn
501 request['timestamp'] = slice.created
502 request['authority_hrn'] = slice.authority_hrn
503 request['slice_name'] = slice.slice_name
504 request['number_of_nodes'] = slice.number_of_nodes
505 request['type_of_nodes'] = slice.type_of_nodes
506 request['purpose'] = slice.purpose
509 def make_request_project(project):
511 request['type'] = 'project'
512 request['id'] = project.id
513 request['user_hrn'] = project.user_hrn
514 request['email'] = project.email
515 request['timestamp'] = project.created
516 request['authority_hrn'] = project.authority_hrn
517 request['project_name'] = project.project_name
518 request['purpose'] = project.purpose
521 def make_request_join(join):
523 request['type'] = 'join'
524 request['id'] = join.id
525 request['user_hrn'] = join.user_hrn
526 request['email'] = join.email
527 request['timestamp'] = join.created
528 request['authority_hrn'] = join.authority_hrn
529 request['project_name'] = join.project_name
532 def make_request_authority(authority):
534 request['type'] = 'authority'
535 request['id'] = authority.id
536 request['site_name'] = authority.site_name
537 request['site_latitude'] = authority.site_latitude
538 request['site_longitude'] = authority.site_longitude
539 request['site_url'] = authority.site_url
540 request['site_authority'] = authority.site_authority
541 request['site_abbreviated_name'] = authority.site_abbreviated_name
542 request['address_line1'] = authority.address_line1
543 request['address_line2'] = authority.address_line2
544 request['address_line3'] = authority.address_line3
545 request['address_city'] = authority.address_city
546 request['address_postalcode'] = authority.address_postalcode
547 request['address_state'] = authority.address_state
548 request['address_country'] = authority.address_country
549 request['authority_hrn'] = authority.authority_hrn
550 request['timestamp'] = authority.created
553 def make_requests(pending_users, pending_slices, pending_authorities, pending_projects, pending_joins):
554 logger.info("$$$$$$$$$$$$$$$ make_request")
556 for user in pending_users:
557 requests.append(make_request_user(user))
558 for slice in pending_slices:
559 requests.append(make_request_slice(slice))
560 for authority in pending_authorities:
561 requests.append(make_request_authority(authority))
562 for project in pending_projects:
563 requests.append(make_request_project(project))
564 for join in pending_joins:
565 requests.append(make_request_join(join))
568 def get_request_by_id(ids):
569 logger.info("$$$$$$$$$$$$$$$$ get_request_by_id")
570 sorted_ids = { 'user': [], 'slice': [], 'authority': [], 'project': [], 'join': [] }
572 type, id = type__id.split('__')
573 sorted_ids[type].append(id)
576 pending_users = PendingUser.objects.all()
577 pending_slices = PendingSlice.objects.all()
578 pending_authorities = PendingAuthority.objects.all()
579 pending_projects = PendingProject.objects.all()
580 pending_joins = PendingJoin.objects.all()
582 pending_users = PendingUser.objects.filter(id__in=sorted_ids['user']).all()
583 pending_slices = PendingSlice.objects.filter(id__in=sorted_ids['slice']).all()
584 pending_authorities = PendingAuthority.objects.filter(id__in=sorted_ids['authority']).all()
585 pending_projects = PendingProject.objects.filter(id__in=sorted_ids['project']).all()
586 pending_joins = PendingJoin.objects.filter(id__in=sorted_ids['join']).all()
588 return make_requests(pending_users, pending_slices, pending_authorities, pending_projects, pending_joins)
590 def get_requests(authority_hrns=None):
591 logger.info("$$$$$$$$$$$$$ get_request_by_authority auth_hrns = {}".format(authority_hrns))
592 if not authority_hrns:
593 ## get those pending users who have confirmed their emails
594 pending_users = PendingUser.objects.filter(status__iexact = 'True')
595 pending_slices = PendingSlice.objects.all()
596 pending_authorities = PendingAuthority.objects.all()
597 pending_projects = PendingProject.objects.all()
598 pending_joins = PendingJoin.objects.all()
600 pending_users = PendingUser.objects
601 pending_slices = PendingSlice.objects
602 pending_authorities = PendingAuthority.objects
603 pending_projects = PendingProject.objects
604 pending_joins = PendingJoin.objects
605 from django.db.models import Q
607 list_slice_Q = list()
611 for hrn in authority_hrns:
612 list_user_Q.append(Q(authority_hrn__startswith=hrn, status__iexact = 'True'))
613 list_slice_Q.append(Q(authority_hrn__startswith=hrn))
614 list_auth_Q.append(Q(site_authority__startswith=hrn))
615 list_proj_Q.append(Q(authority_hrn__startswith=hrn))
616 list_join_Q.append(Q(authority_hrn__startswith=hrn))
617 from operator import __or__ as OR
618 pending_users = pending_users.filter(reduce(OR, list_user_Q))
619 pending_slices = pending_slices.filter(reduce(OR, list_slice_Q))
620 pending_authorities = pending_authorities.filter(reduce(OR, list_auth_Q))
621 pending_projects = pending_projects.filter(reduce(OR, list_proj_Q))
622 pending_joins = pending_joins.filter(reduce(OR, list_join_Q))
623 #pending_authorities = pending_authorities.all() #filter(reduce(OR, list_Q))
625 return make_requests(pending_users, pending_slices, pending_authorities, pending_projects, pending_joins)
627 # XXX Is it in sync with the form fields ?
629 def portal_validate_request(wsgi_request, request_ids):
632 if not isinstance(request_ids, list):
633 request_ids = [request_ids]
635 requests = get_request_by_id(request_ids)
636 for request in requests:
637 # type, id, timestamp, details, allowed -- MISSING: authority_hrn
638 # CAREFUL about details
639 # user : first name, last name, email, password, keypair
640 # slice : number of nodes, type of nodes, purpose
644 if request['type'] == 'user':
645 create_user(wsgi_request, request)
646 request_status['SFA user'] = {'status': True }
647 u = PendingUser.objects.get(id=request['id'])
649 'first_name' : u.first_name,
650 'last_name' : u.last_name,
655 PendingUser.objects.get(id=request['id']).delete()
657 elif request['type'] == 'slice':
658 create_slice(wsgi_request, request)
659 request_status['SFA slice'] = {'status': True }
660 s = PendingSlice.objects.get(id=request['id'])
662 'slice_name' : s.slice_name,
664 'purpose' : s.purpose,
669 PendingSlice.objects.get(id=request['id']).delete()
671 # Clear user's Credentials
672 sfa_user = sfa_get_user(wsgi_request, request['user_hrn'])
673 clear_user_creds(wsgi_request,sfa_user['user_email'])
675 elif request['type'] == 'authority':
676 #hrn = "%s.%s" % (request['authority_hrn'], request['site_authority'])
677 hrn = request['site_authority']
678 name = request['site_name']
679 # XXX tmp sfa dependency
680 from sfa.util.xrn import Xrn
681 urn = Xrn(hrn, request['type']).get_urn()
683 # Only hrn is required for Manifold Query
684 sfa_authority_params = {
685 'authority_hrn' : hrn,
688 #logger.info("ADD Authority")
689 sfa_add_authority(wsgi_request, sfa_authority_params)
690 request_status['SFA authority'] = {'status': True }
691 a = PendingAuthority.objects.get(id=request['id'])
693 'site_name' : a.site_name,
694 #'short_name' : a.short_name,
696 'city' : a.address_city,
697 'country' : a.address_country,
698 #'portal_url' : a.current_site,
700 # address_line1 contains the email of the user in pending_authority table
701 user_email = a.address_line1
703 PendingAuthority.objects.get(id=request['id']).delete()
705 # Clear Admin Cache as it is used to display the list of authorities in Registration page
706 query = Query.update('myslice:authority').filter_by('authority_hrn', '==', sfa_authority_params['authority_hrn']).set({'authority_hrn':sfa_authority_params['authority_hrn']}).select('authority_hrn')
707 res = execute_admin_query(request, query)
709 elif request['type'] == 'project':
710 hrn = request['authority_hrn'] + '.' + request['project_name']
712 # Only hrn is required for Manifold Query
713 sfa_authority_params = {
714 'authority_hrn' : hrn
716 sfa_add_authority(wsgi_request, sfa_authority_params)
718 # Add user as a PI of the project
719 # Clear user's Credentials
720 authority_add_pis(wsgi_request, hrn , request['user_hrn'])
722 request_status['SFA project'] = {'status': True }
723 p = PendingProject.objects.get(id=request['id'])
725 'project_name' : p.project_name,
726 'authority_hrn' : p.authority_hrn,
728 'purpose' : p.purpose,
732 PendingProject.objects.get(id=request['id']).delete()
734 # Clear Admin Cache as it is used to display the list of projects in Slice request page
735 query = Query.update('myslice:authority').filter_by('authority_hrn', '==', sfa_authority_params['authority_hrn']).set({'authority_hrn':sfa_authority_params['authority_hrn']}).select('authority_hrn')
736 res = execute_admin_query(request, query)
739 elif request['type'] == 'join':
740 # Add user as a PI of the project
741 # Clear user's Credentials
742 authority_add_pis(wsgi_request, request['authority_hrn'] , request['user_hrn'])
744 request_status['SFA join'] = {'status': True }
745 j = PendingJoin.objects.get(id=request['id'])
747 'project_name' : j.project_name,
748 'authority_hrn' : j.authority_hrn,
750 'user_hrn' : j.user_hrn,
754 PendingJoin.objects.get(id=request['id']).delete()
756 raise Exception, 'unknown type of request %s' % request['type']
757 # XXX Remove from Pendings in database
759 send_status_email(wsgi_request, ctx, user_email, request['type'], 'validated')
761 request_status['SFA '+request['type']] = {'status': False, 'description': str(e)}
762 logger.error('ERROR - actions.py - portal_validate_request: %s' % e)
764 logger.error(traceback.format_exc())
766 status['%s__%s' % (request['type'], request['id'])] = request_status
770 def validate_action(request, **kwargs):
771 ids = filter(None, kwargs['id'].split('/'))
772 status = portal_validate_request(request, ids)
773 json_answer = json.dumps(status)
774 return HttpResponse (json_answer, content_type="application/json")
777 def reject_action(request, **kwargs):
778 ids = filter(None, kwargs['id'].split('/'))
779 status = portal_reject_request(request, ids)
780 json_answer = json.dumps(status)
781 return HttpResponse (json_answer, content_type="application/json")
783 def get_current_site(request):
784 if request.is_secure():
785 current_site = 'https://'
787 current_site = 'http://'
788 current_site += request.META['HTTP_HOST']
791 def portal_reject_request(wsgi_request, request_ids):
793 current_site = get_current_site(wsgi_request)
794 if not isinstance(request_ids, list):
795 request_ids = [request_ids]
797 requests = get_request_by_id(request_ids)
798 for request in requests:
799 # type, id, timestamp, details, allowed -- MISSING: authority_hrn
800 # CAREFUL about details
801 # user : first name, last name, email, password, keypair
802 # slice : number of nodes, type of nodes, purpose
807 if request['type'] == 'user':
808 request_status['SFA user'] = {'status': True }
809 # getting user email based on id
810 ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
811 for user in PendingUser.objects.raw('SELECT * FROM portal_pendinguser WHERE id = %s', [request['id']]):
812 user_email= user.email
813 first_name = user.first_name
814 last_name = user.last_name
817 'first_name' : first_name,
818 'last_name' : last_name,
819 'email' : user_email,
820 'portal_url' : current_site,
823 # removing from Django portal_pendinguser
824 PendingUser.objects.get(id=request['id']).delete()
826 delete_local_user(wsgi_request, user_email)
828 elif request['type'] == 'slice':
829 request_status['SFA slice'] = {'status': True }
831 # getting user email based on id
832 ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
833 for user in PendingSlice.objects.raw('SELECT * FROM portal_pendingslice WHERE id = %s', [request['id']]):
834 user_email= user.type_of_nodes # XXX type_of_nodes field contains the email [shd be renamed in DB]
835 slice_name = user.slice_name
836 purpose = user.purpose
837 url = user.number_of_nodes
840 'slice_name': slice_name,
843 'portal_url': current_site,
846 PendingSlice.objects.get(id=request['id']).delete()
848 elif request['type'] == 'authority':
849 request_status['SFA authority'] = {'status': True }
851 # getting user email based on id
852 ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
853 for user in PendingAuthority.objects.raw('SELECT * FROM portal_pendingauthority WHERE id = %s', [request['id']]):
854 user_email= user.address_line1 # XXX address_line1 field contains the email [shd be renamed in DB]
855 site_name = user.site_name
856 city = user.address_city
857 country = user.address_country
858 short_name = user.site_abbreviated_name
862 'site_name': site_name,
863 'short_name': short_name,
867 'portal_url' : current_site,
870 PendingAuthority.objects.get(id=request['id']).delete()
872 # XXX TMP we should send an email to the user to inform him/her
873 elif request['type'] == 'project':
874 request_status['SFA project'] = {'status': True }
875 p = PendingProject.objects.get(id=request['id'])
877 'project_name' : p.project_name,
878 'authority_hrn' : p.authority_hrn,
880 'purpose' : p.purpose,
883 PendingProject.objects.get(id=request['id']).delete()
885 elif request['type'] == 'join':
886 request_status['SFA join'] = {'status': True }
887 j = PendingJoin.objects.get(id=request['id'])
889 'project_name' : j.project_name,
890 'authority_hrn' : j.authority_hrn,
892 'user_hrn' : j.user_hrn,
896 PendingJoin.objects.get(id=request['id']).delete()
898 raise Exception, 'unknown type of request %s' % request['type']
900 send_status_email(wsgi_request, ctx, user_email, request['type'], 'denied')
902 request_status['SFA '+request['type']] = {'status': False, 'description': str(e)}
903 logger.error('ERROR - actions.py - portal_reject_request: %s' % e)
905 logger.error(traceback.format_exc())
907 status['%s__%s' % (request['type'], request['id'])] = request_status
911 def send_status_email(request, ctx, user_email, obj_type, status):
913 ctx['current_site'] = get_current_site(request)
916 theme.template_name = obj_type + '_request_' + status + '.txt'
917 text_content = render_to_string(theme.template, ctx)
918 theme.template_name = obj_type + '_request_' + status + '.html'
919 html_content = render_to_string(theme.template, ctx)
920 theme.template_name = 'email_default_sender.txt'
922 sender = render_to_string(theme.template, ctx)
923 sender = sender.replace('\n', '')
925 subject = obj_type.title() + ' request '+ status
927 msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
928 msg.attach_alternative(html_content, "text/html")
930 except Exception as e:
932 logger.error("Failed to send email, please check the mail templates and the SMTP configuration of your server")
936 # http://djangosnippets.org/snippets/942/
940 #-------------------------------------------------------------------------------
942 #-------------------------------------------------------------------------------
944 def create_slice(wsgi_request, request):
947 wsgi_request (~ WSGIRequest) :
948 request (dict) : the slice request in our own dict format
953 hrn = "%s.%s" % (request['authority_hrn'], request['slice_name'])
954 # XXX tmp sfa dependency
955 from sfa.util.xrn import Xrn
956 urn = Xrn(hrn, request['type']).get_urn()
958 # Add User to Slice if we have the user_hrn in pendingslice table
959 user_hrn = request.get('user_hrn', None)
960 user_hrns = list([user_hrn]) if user_hrn else list()
962 # CACHE PB with fields
963 page = Page(wsgi_request)
964 metadata = page.get_metadata()
965 user_md = metadata.details_by_object('user')
966 user_fields = [column['name'] for column in user_md['column']]
968 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
969 #user_query = Query().get('myslice:user').select('user_hrn','user_email').filter_by('user_hrn','==',user_hrn)
970 user_query = Query().get('myslice:user').select(user_fields).filter_by('user_hrn','==',user_hrn)
971 user_details_sfa = execute_admin_query(wsgi_request, user_query)
972 if not user_details_sfa:
973 raise Exception, "User %s doesn't exist, validate user before validating slice" % user_hrn
974 for user in user_details_sfa:
975 user_email = user['user_email']
977 # XXX LOIC Quick fix because this is totally inconsistent
978 if not 'number_of_nodes' in request:
979 request['number_of_nodes']=""
981 # Slice is under a project
982 if len(request['authority_hrn'].split('.')) > 2:
984 pis = authority_get_pis(wsgi_request, request['authority_hrn'])
986 pi_list = pi['pi_users']
987 user_hrns.extend(pi_list)
989 # XXX We should create a slice with Manifold terminology
993 'slice_type' : request['type'],
994 'url' : request['number_of_nodes'],
996 'slice_enabled' : True
998 # ignored in request: id, timestamp, number_of_nodes, type_of_nodes, purpose
1000 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
1001 query = Query.create('myslice:slice').set(slice_params).select('slice_hrn')
1002 results = execute_query(wsgi_request, query)
1004 raise Exception, "Could not create %s. Already exists ?" % slice_params['hrn']
1007 for u_hrn in user_hrns:
1008 u_email = get_user_email(wsgi_request, u_hrn)
1009 clear_user_creds(wsgi_request, u_email)
1010 except Exception as e:
1011 logger.error("Failed clear credentials for all users")
1012 clear_user_creds(wsgi_request,user_email)
1014 activity.slice.validate(request, { "slice" : hrn })
1018 def create_pending_slice(wsgi_request, request, email):
1022 # Insert an entry in the PendingSlice table
1024 slice_name = request['slice_name'],
1025 user_hrn = request['user_hrn'],
1026 authority_hrn = request['authority_hrn'],
1027 number_of_nodes = request['url'], # field needs to be renamed
1028 purpose = request['purpose'],
1029 type_of_nodes = request['email'] # field needs to be renamed
1033 send_email_to_pis(wsgi_request, request, 'slice')
1035 def create_pending_project(wsgi_request, request):
1039 # Insert an entry in the PendingProject table
1041 project_name = request['project_name'],
1042 user_hrn = request['user_hrn'],
1043 email = request['email'],
1044 authority_hrn = request['authority_hrn'],
1045 purpose = request['purpose'],
1049 send_email_to_pis(wsgi_request, request, 'project')
1051 def create_pending_join(wsgi_request, request):
1055 # Insert an entry in the PendingJoin table
1057 user_hrn = request['user_hrn'],
1058 email = request['email'],
1059 project_name = request['project_name'],
1060 authority_hrn = request['authority_hrn'],
1064 send_email_to_pis(wsgi_request, request, 'join')
1066 #-------------------------------------------------------------------------------
1068 #-------------------------------------------------------------------------------
1070 def send_email_to_pis(request, context, obj_type):
1072 context['current_site'] = get_current_site(request)
1073 context['theme'] = theme
1074 # Send an email: the recipients are the PIs of the authority
1075 recipients = authority_get_pi_emails(request, context['authority_hrn'])
1077 theme.template_name = obj_type + '_request_email.txt'
1078 text_content = render_to_string(theme.template, context)
1080 theme.template_name = obj_type + '_request_email.html'
1081 html_content = render_to_string(theme.template, context)
1083 #theme.template_name = obj_type + '_request_email_subject.txt'
1084 #subject = render_to_string(theme.template, request)
1085 #subject = subject.replace('\n', '')
1086 subject = "New "+obj_type+" request"
1088 theme.template_name = 'email_default_sender.txt'
1089 sender = render_to_string(theme.template, context)
1090 sender = sender.replace('\n', '')
1092 msg = EmailMultiAlternatives(subject, text_content, sender, recipients)
1093 msg.attach_alternative(html_content, "text/html")
1095 except Exception, e:
1097 print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
1100 #-------------------------------------------------------------------------------
1102 #-------------------------------------------------------------------------------
1104 def manifold_add_reference_user_accounts(wsgi_request, request):
1105 """When a new user is created, add reference accounts to the reference platform.
1107 # XXX XXX XXX The rest of this function has to be checked XXX XXX XXX
1109 # Retrieve user information
1110 user_query = Query().get('local:user') \
1111 .select('user_id', 'config', 'email', 'status') \
1112 .filter_by('email', '==', request['email'])
1113 user_details = execute_admin_query(wsgi_request, user_query)
1115 # USER MAIN ACCOUNT != reference
1116 #print 'USER MAIN ACCOUNT != reference'
1117 list_accounts_query = Query().get('local:account') \
1118 .select('user_id', 'platform_id', 'auth_type', 'config') \
1119 .filter_by('user_id', '==', user_details[0]['user_id']) \
1120 .filter_by('auth_type', '!=', 'reference')
1121 list_accounts = execute_admin_query(wsgi_request, list_accounts_query)
1123 # XXX main_platform is being erased several times ???
1124 for account in list_accounts:
1125 main_platform_query = Query().get('local:platform') \
1126 .select('platform_id', 'platform') \
1127 .filter_by('platform_id', '==', account['platform_id'])
1128 main_platform = execute_admin_query(wsgi_request, main_platform_query)
1130 # Add reference accounts on SFA enabled platforms
1131 platforms_query = Query().get('local:platform') \
1132 .filter_by('disabled', '==', '0') \
1133 .filter_by('gateway_type', '==', 'sfa') \
1134 .select('platform_id', 'gateway_type')
1135 platforms = execute_admin_query(wsgi_request, platforms_query)
1136 for platform in platforms:
1137 #print "add reference to platform ",platform
1138 manifold_account_params = {
1139 'user_id' : user_details[0]['user_id'],
1140 'platform_id' : platform['platform_id'],
1141 'auth_type' : 'reference',
1142 'config' : '{"reference_platform": "' + main_platform[0]['platform'] + '"}',
1144 manifold_add_account(wsgi_request, manifold_account_params)
1146 def sfa_create_user(wsgi_request, request, namespace = None, as_admin = False):
1149 wsgi_request (~ WSGIRequest) :
1150 request (dict) : the user request in our own dict format
1155 from sfa.util.xrn import Xrn
1157 auth_pi = request.get('pi', None)
1158 auth_pi = list([auth_pi]) if auth_pi else list()
1160 # We create a user request with Manifold terminology
1162 'user_hrn' : request['user_hrn'],
1163 'user_email' : request['email'],
1164 'user_urn' : Xrn(request['user_hrn'], request['type']).get_urn(),
1165 'user_type' : request['type'],
1166 'keys' : request['public_key'],
1167 'user_first_name' : request['first_name'],
1168 'user_last_name' : request['last_name'],
1169 'pi_authorities' : auth_pi,
1170 'user_enabled' : True
1173 if namespace is not None:
1174 query = Query.create('%s:user' % namespace).set(sfa_user_params).select('user_hrn')
1176 # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
1177 query = Query.create('myslice:user').set(sfa_user_params).select('user_hrn')
1180 results = execute_admin_query(wsgi_request, query)
1182 results = execute_query(wsgi_request, query)
1185 raise Exception, "Could not create %s. Already exists ?" % sfa_user_params['user_hrn']
1189 def iotlab_create_user (wsgi_request, request, namespace = None, as_admin=False):
1193 from requests.auth import HTTPBasicAuth
1195 engine = ConfigEngine()
1196 URL_REST = engine.iotlab_url()
1197 LOGIN_ADMIN = engine.iotlab_admin_user()
1198 PASSWORD_ADMIN = engine.iotlab_admin_password()
1200 auth = HTTPBasicAuth(LOGIN_ADMIN,PASSWORD_ADMIN)
1201 headers = {'content-type': 'application/json'}
1203 for user in PendingUser.objects.raw('SELECT * FROM portal_pendinguser WHERE email = %s', [request['email']]):
1204 password= user.password
1207 iotlab_user_params = {
1209 #"login" : request['email'], #auto generated by iotlab
1210 "password" : password,
1211 "firstName" : request['first_name'],
1212 "lastName" : request['last_name'],
1213 "email" : request['email'],
1214 "structure" : request['authority_hrn'],
1217 "sshPublicKey" : request['public_key'],
1218 "motivations" : "SFA federation",
1221 iotlab_user_params1 = json.dumps(iotlab_user_params)
1222 r=requests.post(url=URL_REST, data=iotlab_user_params1, headers=headers, auth=auth)
1223 logger.info('Create iotlab user : {} {}'.format(r.status_code, r.text))
1226 def create_user(wsgi_request, request, namespace = None, as_admin = False):
1227 # XXX This has to be stored centrally
1228 USER_STATUS_ENABLED = 2
1230 # NOTE : if we were to create a user directly (just like we create slices,
1231 # we would have to perform the steps in create_pending_user too
1233 # Add the user to the SFA registry
1234 sfa_create_user(wsgi_request, request, namespace, as_admin)
1236 # Update Manifold user status
1237 manifold_update_user(wsgi_request, request['email'], {'status': USER_STATUS_ENABLED})
1239 # Add reference accounts for platforms
1240 manifold_add_reference_user_accounts(wsgi_request, request)
1242 # Add the user to iotlab portal if theme is set to onelab
1243 if theme.theme == 'onelab':
1244 iotlab_create_user (wsgi_request, request)
1246 def create_pending_user(wsgi_request, request, user_detail):
1250 # Insert an entry in the PendingUser table
1252 first_name = request['first_name'],
1253 last_name = request['last_name'],
1254 authority_hrn = request['authority_hrn'],
1255 email = request['email'],
1256 password = request['password'],
1257 public_key = request['public_key'],
1258 private_key = request['private_key'],
1259 user_hrn = request['user_hrn'],
1261 email_hash = request['email_hash'],
1265 # sends email to user to activate the email
1266 request['current_site'] = get_current_site(wsgi_request)
1267 request['theme'] = theme
1268 theme.template_name = 'activate_user.html'
1269 html_content = render_to_string(theme.template, request)
1270 theme.template_name = 'activate_user.txt'
1271 text_content = render_to_string(theme.template, request)
1272 theme.template_name = 'activate_user_email_subject.txt'
1273 subject = render_to_string(theme.template, request)
1274 subject = subject.replace('\n', '')
1275 theme.template_name = 'email_default_sender.txt'
1276 sender = render_to_string(theme.template, request)
1277 sender = sender.replace('\n', '')
1278 recipient = [request['email']]
1279 #recipient = recipient.append(request['email'])
1281 msg = EmailMultiAlternatives(subject, text_content, sender, recipient)
1282 msg.attach_alternative(html_content, "text/html")
1285 # saves the user to django auth_user table [needed for password reset]
1286 user = User.objects.create_user(request['email'], request['email'], request['password'])
1288 # Creating a manifold user
1289 user_id = manifold_add_user(wsgi_request, request)
1291 # Creating a Manifold account on the MySlice platform
1292 # Note the JSON representation of public and private keys already includes quotes
1294 'user_hrn' : request['user_hrn'],
1295 'user_public_key' : request['public_key'],
1297 if request['private_key']:
1298 account_config['user_private_key'] = request['private_key']
1300 # XXX TODO: Require a myslice platform
1301 # ALERT: this will disapear with ROUTERV2 of Manifold
1302 # We have to consider the case where several registries can be used
1303 # Removed hardcoded platform = 5
1304 # This platform == 'myslice' is a TMP FIX !!
1306 reg_platform_query = Query().get('local:platform') \
1307 .filter_by('platform', '==', 'myslice') \
1308 .select('platform_id')
1309 reg_platform = execute_admin_query(wsgi_request, reg_platform_query)
1311 reg_platform_id = reg_platform[0]['platform_id']
1313 'platform_id' : reg_platform_id, # XXX ALERT !!
1314 'user_id' : user_id,
1315 'auth_type' : request['auth_type'],
1316 'config' : json.dumps(account_config),
1318 manifold_add_account(wsgi_request, account_params)
1320 # Email to PIs is sent when the user activates his email
1321 # portal/emailactivationview.py
1323 except Exception as e:
1324 logger.error("Failed creating manifold account on platform {} for user: {}".format('myslice', request['email']))