3 from random import randint
4 from hashlib import md5
6 from django.views.generic import View
7 from django.template.loader import render_to_string
8 from django.shortcuts import render
9 from django.contrib.auth import get_user_model
10 from django.contrib.sites.models import Site
12 from unfold.page import Page
13 from unfold.loginrequired import FreeAccessView
14 from ui.topmenu import topmenu_items_live
16 from manifoldapi.manifoldapi import execute_admin_query
17 from manifold.core.query import Query
19 from portal.models import PendingUser
20 #from portal.actions import create_pending_user
22 from portal.actions import create_pending_user, ldap_create_user
24 from myslice.theme import ThemeView
26 # since we inherit from FreeAccessView we cannot redefine 'dispatch'
27 # so let's override 'get' and 'post' instead
29 class RegistrationView (FreeAccessView, ThemeView):
30 template_name = 'registration_view.html'
32 def post (self, request):
33 return self.get_or_post (request, 'POST')
35 def get (self, request):
36 return self.get_or_post (request, 'GET')
38 def get_or_post(self, wsgi_request, method):
43 authorities_query = Query.get('authority').select('name','authority_hrn')
44 authorities = execute_admin_query(wsgi_request, authorities_query)
45 if authorities is not None:
46 authorities = sorted(authorities)
49 page = Page(wsgi_request)
50 page.add_js_files ( [ "js/jquery.validate.js", "js/my_account.register.js", "js/jquery.qtip.min.js","js/jquery-ui.js" ] )
51 page.add_css_files ( [ "css/onelab.css", "css/registration.css", "css/jquery.qtip.min.css" ] )
52 page.add_css_files ( [ "https://code.jquery.com/ui/1.10.3/themes/smoothness/jquery-ui.css" ] )
56 # The form has been submitted
59 current_site = Site.objects.get_current()
60 current_site = current_site.domain
62 #authorities_query = Query.get('authority').select('name', 'authority_hrn')
63 #authorities = execute_admin_query(wsgi_request, authorities_query)
65 for authority in authorities:
66 if authority['name'] == wsgi_request.POST.get('org_name', ''):
67 authority_hrn = authority['authority_hrn']
69 # Handle the case when the template uses only hrn and not name
70 if authority_hrn is None:
71 authority_hrn = wsgi_request.POST.get('org_name', '')
73 post_email = wsgi_request.POST.get('email','').lower()
74 salt = randint(1,100000)
75 email_hash = md5(str(salt)+post_email).hexdigest()
76 #email_hash = md5(post_email).digest().encode('base64')[:-1]
78 'first_name' : wsgi_request.POST.get('firstname', ''),
79 'last_name' : wsgi_request.POST.get('lastname', ''),
80 'organization' : wsgi_request.POST.get('org_name', ''),
81 'authority_hrn' : authority_hrn,
83 'password' : wsgi_request.POST.get('password', ''),
84 'current_site' : current_site,
85 'email_hash' : email_hash,
87 'validation_link': 'http://' + current_site + '/portal/email_activation/'+ email_hash
90 # Construct user_hrn from email (XXX Should use common code)
91 # split_email = user_request['email'].split("@")[0]
92 # split_email = split_email.replace(".", "_")
93 # user_request['user_hrn'] = user_request['authority_hrn'] \
96 split_email = user_request['email'].split("@")[0]
97 split_email = split_email.replace(".", "_")
98 split_authority = user_request['authority_hrn'].split(".")[1]
99 username = split_email + '@' + split_authority
100 split_authority = user_request['authority_hrn'].split(".")[0]
101 user_request['user_hrn'] = split_authority + '.' + username
104 UserModel = get_user_model()
105 if (re.search(r'^[\w+\s.@+-]+$', user_request['first_name']) == None):
106 errors.append('First name may contain only letters, numbers, spaces and @/./+/-/_ characters.')
107 if (re.search(r'^[\w+\s.@+-]+$', user_request['last_name']) == None):
108 errors.append('Last name may contain only letters, numbers, spaces and @/./+/-/_ characters.')
109 # checking in django_db !!
110 if PendingUser.objects.filter(email__iexact = user_request['email']):
111 errors.append('Email is pending for validation. Please provide a new email address.')
112 if UserModel._default_manager.filter(email__iexact = user_request['email']):
113 errors.append('This email is not usable. Please contact the administrator or try with another email.')
114 # Does the user exist in Manifold?
115 user_query = Query().get('local:user').select('user_id','email')
116 user_details = execute_admin_query(wsgi_request, user_query)
117 for user_detail in user_details:
118 if user_detail['email'] == user_request['email']:
119 errors.append('Email already registered in Manifold. Please provide a new email address.')
120 # Does the user exist in sfa? [query is very slow!!]
121 #user_query = Query().get('user').select('user_hrn','user_email')
122 # XXX Test based on the user_hrn is quick
123 user_query = Query().get('user').select('user_hrn','user_email').filter_by('user_hrn','==',user_request['user_hrn'])
124 user_details_sfa = execute_admin_query(wsgi_request, user_query)
126 for user in user_details_sfa:
127 if user['user_email'] == user_request['email']:
128 errors.append('Email already registered in SFA registry. Please use another email.')
129 if user['user_hrn'] == user_request['user_hrn']:
130 # add random number if user_hrn already exists in the registry
131 user_request['user_hrn'] = user_request['authority_hrn'] \
132 + '.' + split_email + str(randint(1,1000000))
134 # XXX TODO: Factorize with portal/accountview.py
135 if 'generate' in wsgi_request.POST['question']:
136 user_request['auth_type'] = 'managed'
138 # XXX Common code, dependency ?
139 from Crypto.PublicKey import RSA
140 private = RSA.generate(1024)
142 # Example: private_key = '-----BEGIN RSA PRIVATE KEY-----\nMIIC...'
143 # Example: public_key = 'ssh-rsa AAAAB3...'
144 user_request['private_key'] = private.exportKey()
145 user_request['public_key'] = private.publickey().exportKey(format='OpenSSH')
148 user_request['auth_type'] = 'user'
150 up_file = wsgi_request.FILES['user_public_key']
152 file_content = up_file.read().strip()
153 file_name = up_file.name
154 file_extension = os.path.splitext(file_name)[1]
156 ALLOWED_EXTENSIONS = ['.pub','.txt']
157 if file_extension not in ALLOWED_EXTENSIONS or not re.search(r'ssh-rsa',file_content):
158 errors.append('Please upload a valid RSA public key.')
159 # user_request['private_key'] can't be Null because all db fields are set as NOT NULL
160 user_request['private_key'] = ""
161 user_request['public_key'] = file_content
166 # verify if is a LDAP
167 mail = user_detail['email']
168 login = mail.split('@')[0]
169 org = mail.split('@')[1]
170 o = org.split('.')[-2]
171 dc = org.split('.')[-1]
172 # To know if user is a LDAP user - Need to has a 'dc' identifier
173 if dc == 'br' or 'eu':
174 # LDAP insert directly - but with userEnable = FALSE
175 ldap_create_user(wsgi_request, user_request, user_detail)
178 print "LDAP: problem em access the LDAP with this credentail"
180 create_pending_user(wsgi_request, user_request, user_detail)
181 self.template_name = 'user_register_complete.html'
183 return render(wsgi_request, self.template, {'theme': self.theme})
187 ## this is coming from onelab website onelab.eu
189 'first_name': wsgi_request.GET.get('first_name', ''),
190 'last_name': wsgi_request.GET.get('last_name', ''),
191 'email': wsgi_request.GET.get('email', ''),
195 'topmenu_items': topmenu_items_live('Register', page),
197 'authorities': authorities,
200 template_env.update(user_request)
201 template_env.update(reg_form)
202 template_env.update(page.prelude_env ())
203 return render(wsgi_request, self.template,template_env)