1 from django.template import RequestContext
2 from django.shortcuts import render_to_response
4 from manifold.core.query import Query, AnalyzedQuery
5 from manifoldapi.manifoldapi import execute_query
7 from django.views.generic.base import TemplateView
9 from unfold.loginrequired import LoginRequiredView
10 from django.http import HttpResponse
11 from django.shortcuts import render
13 from manifold.core.query import Query, AnalyzedQuery
14 from manifoldapi.manifoldapi import execute_query
16 from portal.actions import get_requests
18 from myslice.theme import ThemeView
23 class ManagementRequestsView (LoginRequiredView, ThemeView):
24 template_name = "management-tab-requests.html"
26 def get_context_data(self, **kwargs):
28 ctx_my_authorities = {}
29 ctx_delegation_authorities = {}
30 ctx_sub_authorities = {}
35 # The user need to be logged in
36 if (self.request.user):
38 user_query = Query().get('local:user').filter_by('email', '==', self.request.user.username).select('user_id')
39 user, = execute_query(self.request, user_query)
40 user_id = user['user_id']
41 user_query = Query().get('local:user').filter_by('email', '==', self.request.user.username).select('config')
42 user, = execute_query(self.request, user_query)
43 user_config = user['config']
44 user_config = ast.literal_eval(user_config)
45 user_authority = user_config['authority']
46 user_username = self.request.user.username
47 # Query manifold to learn about available SFA platforms for more information
48 # In general we will at least have the portal
49 # For now we are considering all registries
52 sfa_platforms_query = Query().get('local:platform').filter_by('gateway_type', '==', 'sfa').select('platform_id', 'platform', 'auth_type')
53 sfa_platforms = execute_query(self.request, sfa_platforms_query)
54 for sfa_platform in sfa_platforms:
55 print "SFA PLATFORM > ", sfa_platform['platform']
56 if not 'auth_type' in sfa_platform:
58 auth = sfa_platform['auth_type']
59 if not auth in all_authorities:
60 all_authorities.append(auth)
61 platform_ids.append(sfa_platform['platform_id'])
63 print "W: Hardcoding platform myslice"
64 # There has been a tweak on how new platforms are referencing a
65 # so-called 'myslice' platform for storing authentication tokens.
66 # XXX This has to be removed in final versions.
67 myslice_platforms_query = Query().get('local:platform').filter_by('platform', '==', 'myslice').select('platform_id')
68 myslice_platforms = execute_query(self.request, myslice_platforms_query)
70 myslice_platform, = myslice_platforms
71 platform_ids.append(myslice_platform['platform_id'])
73 # We can check on which the user has authoritity credentials = PI rights
74 credential_authorities = set()
75 credential_authorities_expired = set()
77 # User account on these registries
78 user_accounts_query = Query.get('local:account').filter_by('user_id', '==', user_id).filter_by('platform_id', 'included', platform_ids).select('auth_type', 'config')
79 user_accounts = execute_query(self.request, user_accounts_query)
81 for user_account in user_accounts:
83 print "USER ACCOUNT", user_account
84 if user_account['auth_type'] == 'reference':
85 continue # we hardcoded the myslice platform...
87 config = json.loads(user_account['config'])
89 print "CONFIG KEYS", config.keys()
90 if 'authority_credentials' in config:
91 print "***", config['authority_credentials'].keys()
92 for authority_hrn, credential in config['authority_credentials'].items():
93 credential_authorities.add(authority_hrn)
94 if 'delegated_authority_credentials' in config:
95 print "***", config['delegated_authority_credentials'].keys()
96 for authority_hrn, credential in config['delegated_authority_credentials'].items():
97 credential_authorities.add(authority_hrn)
99 print 'credential_authorities =', credential_authorities
100 print 'credential_authorities_expired =', credential_authorities_expired
102 # ** Where am I a PI **
103 # For this we need to ask SFA (of all authorities) = PI function
104 pi_authorities_query = Query.get('user').filter_by('user_hrn', '==', '$user_hrn').select('pi_authorities')
105 pi_authorities_tmp = execute_query(self.request, pi_authorities_query)
106 pi_authorities = set()
108 for pa in pi_authorities_tmp:
109 pi_authorities |= set(pa['pi_authorities'])
111 print 'No pi_authorities'
113 pi_credential_authorities = pi_authorities & credential_authorities
114 pi_no_credential_authorities = pi_authorities - credential_authorities - credential_authorities_expired
115 pi_expired_credential_authorities = pi_authorities & credential_authorities_expired
116 # Authorities I've been delegated PI rights
117 pi_delegation_credential_authorities = credential_authorities - pi_authorities
118 pi_delegation_expired_authorities = credential_authorities_expired - pi_authorities
120 # Summary intermediary
121 pi_my_authorities = pi_credential_authorities | pi_no_credential_authorities | pi_expired_credential_authorities
122 pi_delegation_authorities = pi_delegation_credential_authorities | pi_delegation_expired_authorities
125 queried_pending_authorities = pi_my_authorities | pi_delegation_authorities #| pi_subauthorities
127 # iterate on the requests and check if the authority matches a prefix
128 # startswith an authority on which the user is PI
129 requests = get_requests()
132 auth_hrn = r['authority_hrn']
133 for my_auth in pi_my_authorities:
134 if auth_hrn.startswith(my_auth):
135 dest = ctx_my_authorities
136 r['allowed'] = 'allowed'
137 for my_auth in pi_delegation_authorities:
138 if auth_hrn.startswith(my_auth):
139 dest = ctx_delegation_authorities
140 r['allowed'] = 'allowed'
141 if auth_hrn in pi_expired_credential_authorities:
142 r['allowed'] = 'expired'
143 if 'allowed' not in r:
144 ## TEMP FIX for allowing new authority registration
145 #r['allowed'] = 'denied'
146 r['allowed'] = 'allowed'
148 if not auth_hrn in dest:
150 dest[auth_hrn].append(r)
154 # env['my_authorities'] = ctx_my_authorities
155 # env['sub_authorities'] = ctx_sub_authorities
156 # env['delegation_authorities'] = ctx_delegation_authorities
158 # # XXX This is repeated in all pages
159 # # more general variables expected in the template
160 # # the menu items on the top
161 # #env['topmenu_items'] = topmenu_items_live('Validation', page)
162 # # so we can sho who is logged
163 # env['username'] = request.user
164 # env['pi'] = "is_pi"
165 # env['theme'] = self.theme
166 # env['section'] = "Requests"
167 # auth_hrn = user_authority + '.' + user_username.split("@")[1]
168 ctx_list = [ctx_my_authorities, ctx_sub_authorities, ctx_delegation_authorities]
171 for authorities in ctx:
172 for requests in ctx[authorities]:
174 requests['object_auth'] = requests['user_hrn'].split('.')[0] + '.' + requests['user_hrn'].split('@')[1]
176 print "This object has no user_hrn"
178 pi_authority = user_authority + '.' + user_username.split("@")[1]
179 context = super(ManagementRequestsView, self).get_context_data(**kwargs)
181 print ctx_my_authorities
185 context['my_authorities'] = ctx_my_authorities
186 context['sub_authorities'] = ctx_sub_authorities
187 context['delegation_authorities'] = ctx_delegation_authorities
189 # XXX This is repeated in all pages
190 # more general variables expected in the template
191 context['title'] = 'Test view that combines various plugins'
192 # the menu items on the top
193 #context['topmenu_items'] = topmenu_items_live('Validation', page)
194 # so we can sho who is logged
195 context['username'] = self.request.user
196 context['pi'] = "is_pi"
197 context['theme'] = self.theme
198 context['section'] = "Requests"
199 context['pi_authority'] = pi_authority
200 # XXX We need to prepare the page for queries
201 #context.update(page.prelude_env())
205 #return render_to_response(self.template, env, context_instance=RequestContext(request))