views.py 126 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
# Copyright 2014 Budapest University of Technology and Economics (BME IK)
#
# This file is part of CIRCLE Cloud.
#
# CIRCLE is free software: you can redistribute it and/or modify it under
# the terms of the GNU General Public License as published by the Free
# Software Foundation, either version 3 of the License, or (at your option)
# any later version.
#
# CIRCLE is distributed in the hope that it will be useful, but WITHOUT ANY
# WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
# FOR A PARTICULAR PURPOSE.  See the GNU General Public License for more
# details.
#
# You should have received a copy of the GNU General Public License along
# with CIRCLE.  If not, see <http://www.gnu.org/licenses/>.

18
from __future__ import unicode_literals, absolute_import
19

20
from collections import OrderedDict
21
from itertools import chain
22
from os import getenv
23
from os.path import join, normpath, dirname, basename
24
from urlparse import urljoin
25
import json
Őry Máté committed
26
import logging
27
import re
28
import requests
29

30
from django.conf import settings
31
from django.contrib.auth.models import User, Group
Őry Máté committed
32
from django.contrib.auth.views import login, redirect_to_login
33
from django.contrib.auth.decorators import login_required
34
from django.contrib.messages.views import SuccessMessageMixin
35
from django.core.exceptions import (
36
    PermissionDenied, SuspiciousOperation,
37
)
Kálmán Viktor committed
38
from django.core.cache import get_cache
39 40
from django.core import signing
from django.core.urlresolvers import reverse, reverse_lazy
41
from django.db.models import Count, Q
42
from django.http import HttpResponse, HttpResponseRedirect, Http404
43 44 45
from django.shortcuts import (
    redirect, render, get_object_or_404, render_to_response,
)
46
from django.views.decorators.http import require_GET, require_POST
47
from django.views.generic.detail import SingleObjectMixin
48
from django.views.generic import (TemplateView, DetailView, View, DeleteView,
49
                                  UpdateView, CreateView, ListView)
50
from django.contrib import messages
51 52 53
from django.utils.translation import (
    ugettext as _, ugettext_noop, ungettext_lazy
)
54
from django.template.loader import render_to_string
55
from django.template import RequestContext
56

57
from django.forms.models import inlineformset_factory
58
from django_tables2 import SingleTableView
59 60
from braces.views import (LoginRequiredMixin, SuperuserRequiredMixin,
                          PermissionRequiredMixin)
61
from braces.views._access import AccessMixin
62
from celery.exceptions import TimeoutError
Kálmán Viktor committed
63

64 65
from django_sshkey.models import UserKey

66
from .forms import (
67
    CircleAuthenticationForm, HostForm, LeaseForm, MyProfileForm,
68
    NodeForm, TemplateForm, TraitForm, VmCustomizeForm, GroupCreateForm,
69
    UserCreationForm, GroupProfileUpdateForm, UnsubscribeForm,
70
    VmSaveForm, UserKeyForm, VmRenewForm, VmStateChangeForm,
71
    CirclePasswordChangeForm, VmCreateDiskForm, VmDownloadDiskForm,
72
    TraitsForm, RawDataForm, GroupPermissionForm, AclUserAddForm,
73 74
    VmResourcesForm, VmAddInterfaceForm, VmListSearchForm,
    TemplateListSearchForm,
75
)
76 77

from .tables import (
78
    NodeListTable, TemplateListTable, LeaseListTable,
79
    GroupListTable, UserKeyListTable
80
)
81
from common.models import (
82 83
    HumanReadableObject, HumanReadableException, fetch_human_exception,
    create_readable,
84
)
Őry Máté committed
85 86 87 88
from vm.models import (
    Instance, instance_activity, InstanceActivity, InstanceTemplate, Interface,
    InterfaceTemplate, Lease, Node, NodeActivity, Trait,
)
89
from storage.models import Disk
90
from firewall.models import Vlan, Host, Rule
91
from .models import Favourite, Profile, GroupProfile, FutureMember
92

93
from .store_api import Store, NoStoreException, NotOkException
Kálmán Viktor committed
94

Őry Máté committed
95
logger = logging.getLogger(__name__)
96
saml_available = hasattr(settings, "SAML_CONFIG")
97

98

99 100 101 102
def search_user(keyword):
    try:
        return User.objects.get(username=keyword)
    except User.DoesNotExist:
103 104 105 106
        try:
            return User.objects.get(profile__org_id=keyword)
        except User.DoesNotExist:
            return User.objects.get(email=keyword)
107 108


109 110 111 112 113 114 115 116 117 118 119 120 121
class RedirectToLoginMixin(AccessMixin):

    redirect_exception_classes = (PermissionDenied, )

    def dispatch(self, request, *args, **kwargs):
        try:
            return super(RedirectToLoginMixin, self).dispatch(
                request, *args, **kwargs)
        except self.redirect_exception_classes:
            if not request.user.is_authenticated():
                return redirect_to_login(request.get_full_path(),
                                         self.get_login_url(),
                                         self.get_redirect_field_name())
122 123
            else:
                raise
124 125


126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148
class GroupCodeMixin(object):

    @classmethod
    def get_available_group_codes(cls, request):
        newgroups = []
        if saml_available:
            from djangosaml2.cache import StateCache, IdentityCache
            from djangosaml2.conf import get_config
            from djangosaml2.views import _get_subject_id
            from saml2.client import Saml2Client

            state = StateCache(request.session)
            conf = get_config(None, request)
            client = Saml2Client(conf, state_cache=state,
                                 identity_cache=IdentityCache(request.session),
                                 logger=logger)
            subject_id = _get_subject_id(request.session)
            identity = client.users.get_identity(subject_id,
                                                 check_not_on_or_after=False)
            if identity:
                attributes = identity[0]
                owneratrs = getattr(
                    settings, 'SAML_GROUP_OWNER_ATTRIBUTES', [])
149 150
                for group in chain(*[attributes[i]
                                     for i in owneratrs if i in attributes]):
151 152 153 154 155 156 157 158
                    try:
                        GroupProfile.search(group)
                    except Group.DoesNotExist:
                        newgroups.append(group)

        return newgroups


159
class FilterMixin(object):
160

161 162 163 164
    def get_queryset_filters(self):
        filters = {}
        for item in self.allowed_filters:
            if item in self.request.GET:
165 166 167 168 169
                filters[self.allowed_filters[item]] = (
                    self.request.GET[item].split(",")
                    if self.allowed_filters[item].endswith("__in") else
                    self.request.GET[item])

170
        return filters
171

172 173 174
    def get_queryset(self):
        return super(FilterMixin,
                     self).get_queryset().filter(**self.get_queryset_filters())
175

176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221
    def create_fake_get(self):
        """
        Updates the request's GET dict to filter the vm list
        For example: "name:xy node:1" updates the GET dict
                     to resemble this URL ?name=xy&node=1

        "name:xy node:1".split(":") becomes ["name", "xy node", "1"]
        we pop the the first element and use it as the first dict key
        then we iterate over the rest of the list and split by the last
        whitespace, the first part of this list will be the previous key's
        value, then last part of the list will be the next key.
        The final dict looks like this: {'name': xy, 'node':1}
        """
        s = self.request.GET.get("s")
        if s:
            s = s.split(":")
            if len(s) < 2:  # if there is no ':' in the string, filter by name
                got = {'name': s[0]}
            else:
                latest = s.pop(0)
                got = {'%s' % latest: None}
                for i in s[:-1]:
                    new = i.rsplit(" ", 1)
                    got[latest] = new[0]
                    latest = new[1] if len(new) > 1 else None
                got[latest] = s[-1]

            # generate a new GET request, that is kinda fake
            fake = self.request.GET.copy()
            for k, v in got.iteritems():
                fake[k] = v

            self.request.GET = fake

    def create_acl_queryset(self, model):
        cleaned_data = self.search_form.cleaned_data
        stype = cleaned_data.get('stype', "all")
        superuser = stype == "all"
        shared = stype == "shared"
        level = "owner" if stype == "owned" else "user"
        queryset = model.get_objects_with_level(
            level, self.request.user,
            group_also=shared, disregard_superuser=not superuser,
        )
        return queryset

222

223
class IndexView(LoginRequiredMixin, TemplateView):
Kálmán Viktor committed
224
    template_name = "dashboard/index.html"
225

226
    def get_context_data(self, **kwargs):
227
        user = self.request.user
228
        context = super(IndexView, self).get_context_data(**kwargs)
229

230
        # instances
231
        favs = Instance.objects.filter(favourite__user=self.request.user)
232
        instances = Instance.get_objects_with_level(
233
            'user', user, disregard_superuser=True).filter(destroyed_at=None)
234 235 236
        display = list(favs) + list(set(instances) - set(favs))
        for d in display:
            d.fav = True if d in favs else False
237
        context.update({
238
            'instances': display[:5],
239
            'more_instances': instances.count() - len(instances[:5])
240 241
        })

242 243
        running = instances.filter(status='RUNNING')
        stopped = instances.exclude(status__in=('RUNNING', 'NOSTATE'))
244

245
        context.update({
246 247 248
            'running_vms': running[:20],
            'running_vm_num': running.count(),
            'stopped_vm_num': stopped.count()
249
        })
250

251 252 253 254
        # nodes
        if user.is_superuser:
            nodes = Node.objects.all()
            context.update({
255 256
                'nodes': nodes[:5],
                'more_nodes': nodes.count() - len(nodes[:5]),
257 258 259 260 261 262 263 264 265 266
                'sum_node_num': nodes.count(),
                'node_num': {
                    'running': Node.get_state_count(True, True),
                    'missing': Node.get_state_count(False, True),
                    'disabled': Node.get_state_count(True, False),
                    'offline': Node.get_state_count(False, False)
                }
            })

        # groups
267
        if user.has_module_perms('auth'):
268 269
            profiles = GroupProfile.get_objects_with_level('operator', user)
            groups = Group.objects.filter(groupprofile__in=profiles)
270 271 272 273
            context.update({
                'groups': groups[:5],
                'more_groups': groups.count() - len(groups[:5]),
            })
274 275 276 277

        # template
        if user.has_perm('vm.create_template'):
            context['templates'] = InstanceTemplate.get_objects_with_level(
278
                'operator', user, disregard_superuser=True).all()[:5]
279

Kálmán Viktor committed
280
        # toplist
281
        if settings.STORE_URL:
282
            cache_key = "files-%d" % self.request.user.pk
283
            cache = get_cache("default")
284 285
            files = cache.get(cache_key)
            if not files:
286
                try:
287 288 289 290
                    store = Store(self.request.user)
                    toplist = store.toplist()
                    quota = store.get_quota()
                    files = {'toplist': toplist, 'quota': quota}
291 292 293
                except Exception:
                    logger.exception("Unable to get tolist for %s",
                                     unicode(self.request.user))
294 295
                    files = {'toplist': []}
                cache.set(cache_key, files, 300)
Kálmán Viktor committed
296

297
            context['files'] = files
298 299
        else:
            context['no_store'] = True
Kálmán Viktor committed
300

301 302
        return context

303

304
class CheckedDetailView(LoginRequiredMixin, DetailView):
305 306
    read_level = 'user'

307 308 309
    def get_has_level(self):
        return self.object.has_level

310 311
    def get_context_data(self, **kwargs):
        context = super(CheckedDetailView, self).get_context_data(**kwargs)
312
        if not self.get_has_level()(self.request.user, self.read_level):
313 314 315 316
            raise PermissionDenied()
        return context


317 318 319 320 321 322 323 324
class VmDetailVncTokenView(CheckedDetailView):
    template_name = "dashboard/vm-detail.html"
    model = Instance

    def get(self, request, **kwargs):
        self.object = self.get_object()
        if not self.object.has_level(request.user, 'operator'):
            raise PermissionDenied()
325 326
        if not request.user.has_perm('vm.access_console'):
            raise PermissionDenied()
327
        if self.object.node:
328 329 330 331
            with instance_activity(
                    code_suffix='console-accessed', instance=self.object,
                    user=request.user, readable_name=ugettext_noop(
                        "console access"), concurrency_check=False):
332 333 334 335 336
                port = self.object.vnc_port
                host = str(self.object.node.host.ipv4)
                value = signing.dumps({'host': host, 'port': port},
                                      key=getenv("PROXY_SECRET", 'asdasd')),
                return HttpResponse('vnc/?d=%s' % value)
337 338 339 340
        else:
            raise Http404()


341
class VmDetailView(CheckedDetailView):
Kálmán Viktor committed
342
    template_name = "dashboard/vm-detail.html"
343
    model = Instance
344 345

    def get_context_data(self, **kwargs):
346
        context = super(VmDetailView, self).get_context_data(**kwargs)
347
        instance = context['instance']
348 349
        user = self.request.user
        ops = get_operations(instance, user)
350
        context.update({
Bach Dániel committed
351
            'graphite_enabled': settings.GRAPHITE_URL is not None,
352
            'vnc_url': reverse_lazy("dashboard.views.detail-vnc",
353
                                    kwargs={'pk': self.object.pk}),
354 355
            'ops': ops,
            'op': {i.op: i for i in ops},
356
        })
357 358

        # activity data
359
        activities = instance.get_merged_activities(user)
360 361
        show_show_all = len(activities) > 10
        activities = activities[:10]
362
        context['activities'] = _format_activities(activities)
363
        context['show_show_all'] = show_show_all
364 365
        latest = instance.get_latest_activity_in_progress()
        context['is_new_state'] = (latest and
366
                                   latest.resultant_state is not None and
367
                                   instance.status != latest.resultant_state)
368

369
        context['vlans'] = Vlan.get_objects_with_level(
370
            'user', self.request.user
371
        ).exclude(  # exclude already added interfaces
372 373 374
            pk__in=Interface.objects.filter(
                instance=self.get_object()).values_list("vlan", flat=True)
        ).all()
375 376
        context['acl'] = AclUpdateView.get_acl_data(
            instance, self.request.user, 'dashboard.views.vm-acl')
377
        context['aclform'] = AclUserAddForm()
378 379
        context['os_type_icon'] = instance.os_type.replace("unknown",
                                                           "question")
380 381 382
        # ipv6 infos
        context['ipv6_host'] = instance.get_connect_host(use_ipv6=True)
        context['ipv6_port'] = instance.get_connect_port(use_ipv6=True)
383 384

        # resources forms
385 386 387 388 389
        can_edit = (
            instance in Instance.get_objects_with_level("owner", user)
            and self.request.user.has_perm("vm.change_resources"))
        context['resources_form'] = VmResourcesForm(
            can_edit=can_edit, instance=instance)
390

391 392 393
        if self.request.user.is_superuser:
            context['traits_form'] = TraitsForm(instance=instance)
            context['raw_data_form'] = RawDataForm(instance=instance)
394

395 396 397
        # resources change perm
        context['can_change_resources'] = self.request.user.has_perm(
            "vm.change_resources")
398

399
        return context
Kálmán Viktor committed
400

401
    def post(self, request, *args, **kwargs):
402 403
        options = {
            'new_name': self.__set_name,
404
            'new_description': self.__set_description,
405 406
            'new_tag': self.__add_tag,
            'to_remove': self.__remove_tag,
407
            'port': self.__add_port,
408
            'abort_operation': self.__abort_operation,
409 410 411 412
        }
        for k, v in options.iteritems():
            if request.POST.get(k) is not None:
                return v(request)
413 414
        raise Http404()

415 416
    def __set_name(self, request):
        self.object = self.get_object()
417 418
        if not self.object.has_level(request.user, 'owner'):
            raise PermissionDenied()
419 420 421 422
        new_name = request.POST.get("new_name")
        Instance.objects.filter(pk=self.object.pk).update(
            **{'name': new_name})

423
        success_message = _("VM successfully renamed.")
424 425 426 427 428 429 430 431 432 433 434 435
        if request.is_ajax():
            response = {
                'message': success_message,
                'new_name': new_name,
                'vm_pk': self.object.pk
            }
            return HttpResponse(
                json.dumps(response),
                content_type="application/json"
            )
        else:
            messages.success(request, success_message)
436 437 438 439 440 441 442 443 444 445 446
            return redirect(self.object.get_absolute_url())

    def __set_description(self, request):
        self.object = self.get_object()
        if not self.object.has_level(request.user, 'owner'):
            raise PermissionDenied()

        new_description = request.POST.get("new_description")
        Instance.objects.filter(pk=self.object.pk).update(
            **{'description': new_description})

447
        success_message = _("VM description successfully updated.")
448 449 450 451 452 453 454 455 456 457 458 459
        if request.is_ajax():
            response = {
                'message': success_message,
                'new_description': new_description,
            }
            return HttpResponse(
                json.dumps(response),
                content_type="application/json"
            )
        else:
            messages.success(request, success_message)
            return redirect(self.object.get_absolute_url())
460

Kálmán Viktor committed
461 462 463
    def __add_tag(self, request):
        new_tag = request.POST.get('new_tag')
        self.object = self.get_object()
464 465
        if not self.object.has_level(request.user, 'owner'):
            raise PermissionDenied()
Kálmán Viktor committed
466 467

        if len(new_tag) < 1:
468
            message = u"Please input something."
Kálmán Viktor committed
469
        elif len(new_tag) > 20:
470
            message = u"Tag name is too long."
Kálmán Viktor committed
471 472 473 474 475 476 477 478 479 480 481 482 483 484 485
        else:
            self.object.tags.add(new_tag)

        try:
            messages.error(request, message)
        except:
            pass

        return redirect(reverse_lazy("dashboard.views.detail",
                                     kwargs={'pk': self.object.pk}))

    def __remove_tag(self, request):
        try:
            to_remove = request.POST.get('to_remove')
            self.object = self.get_object()
486 487
            if not self.object.has_level(request.user, 'owner'):
                raise PermissionDenied()
Kálmán Viktor committed
488 489 490 491 492 493 494 495 496 497 498

            self.object.tags.remove(to_remove)
            message = u"Success"
        except:  # note this won't really happen
            message = u"Not success"

        if request.is_ajax():
            return HttpResponse(
                json.dumps({'message': message}),
                content_type="application=json"
            )
499 500 501
        else:
            return redirect(reverse_lazy("dashboard.views.detail",
                            kwargs={'pk': self.object.pk}))
Kálmán Viktor committed
502

503 504
    def __add_port(self, request):
        object = self.get_object()
505 506
        if (not object.has_level(request.user, 'owner') or
                not request.user.has_perm('vm.config_ports')):
507
            raise PermissionDenied()
508 509 510 511 512 513

        port = request.POST.get("port")
        proto = request.POST.get("proto")

        try:
            error = None
514 515 516
            interfaces = object.interface_set.all()
            host = Host.objects.get(pk=request.POST.get("host_pk"),
                                    interface__in=interfaces)
517
            host.add_port(proto, private=port)
518 519 520 521 522
        except Host.DoesNotExist:
            logger.error('Tried to add port to nonexistent host %d. User: %s. '
                         'Instance: %s', request.POST.get("host_pk"),
                         unicode(request.user), object)
            raise PermissionDenied()
523
        except ValueError:
524
            error = _("There is a problem with your input.")
525
        except Exception as e:
Bach Dániel committed
526 527
            error = _("Unknown error.")
            logger.error(e)
528 529 530 531 532 533 534 535 536

        if request.is_ajax():
            pass
        else:
            if error:
                messages.error(request, error)
            return redirect(reverse_lazy("dashboard.views.detail",
                                         kwargs={'pk': self.get_object().pk}))

537
    def __abort_operation(self, request):
Kálmán Viktor committed
538 539 540 541
        self.object = self.get_object()

        activity = get_object_or_404(InstanceActivity,
                                     pk=request.POST.get("activity"))
542 543
        if not activity.is_abortable_for(request.user):
            raise PermissionDenied()
Kálmán Viktor committed
544 545 546
        activity.abort()
        return redirect("%s#activity" % self.object.get_absolute_url())

547

548
class VmTraitsUpdate(SuperuserRequiredMixin, UpdateView):
549 550 551 552 553 554 555
    form_class = TraitsForm
    model = Instance

    def get_success_url(self):
        return self.get_object().get_absolute_url() + "#resources"


556
class VmRawDataUpdate(SuperuserRequiredMixin, UpdateView):
557 558
    form_class = RawDataForm
    model = Instance
559
    template_name = 'dashboard/vm-detail/raw_data.html'
560 561 562 563 564

    def get_success_url(self):
        return self.get_object().get_absolute_url() + "#resources"


565
class OperationView(RedirectToLoginMixin, DetailView):
566

567
    template_name = 'dashboard/operate.html'
568
    show_in_toolbar = True
569
    effect = None
570
    wait_for_result = None
571
    with_reload = False
572

573 574 575
    @property
    def name(self):
        return self.get_op().name
576

577 578 579
    @property
    def description(self):
        return self.get_op().description
580

581 582 583
    def is_preferred(self):
        return self.get_op().is_preferred()

584 585 586
    @classmethod
    def get_urlname(cls):
        return 'dashboard.vm.op.%s' % cls.op
587

588 589 590 591 592 593 594 595 596 597
    @classmethod
    def get_instance_url(cls, pk, key=None, *args, **kwargs):
        url = reverse(cls.get_urlname(), args=(pk, ) + args, kwargs=kwargs)
        if key is None:
            return url
        else:
            return "%s?k=%s" % (url, key)

    def get_url(self, **kwargs):
        return self.get_instance_url(self.get_object().pk, **kwargs)
598

599
    def get_template_names(self):
600
        if self.request.is_ajax():
601
            return ['dashboard/_modal.html']
602
        else:
603
            return ['dashboard/_base.html']
604

605 606 607
    @classmethod
    def get_op_by_object(cls, obj):
        return getattr(obj, cls.op)
608

609 610 611 612
    def get_op(self):
        if not hasattr(self, '_opobj'):
            setattr(self, '_opobj', getattr(self.get_object(), self.op))
        return self._opobj
613

614 615 616 617
    @classmethod
    def get_operation_class(cls):
        return cls.model.get_operation_class(cls.op)

618
    def get_context_data(self, **kwargs):
619
        ctx = super(OperationView, self).get_context_data(**kwargs)
620
        ctx['op'] = self.get_op()
621
        ctx['opview'] = self
622 623 624 625
        url = self.request.path
        if self.request.GET:
            url += '?' + self.request.GET.urlencode()
        ctx['url'] = url
626
        ctx['template'] = super(OperationView, self).get_template_names()[0]
627
        return ctx
628

629 630 631 632
    def check_auth(self):
        logger.debug("OperationView.check_auth(%s)", unicode(self))
        self.get_op().check_auth(self.request.user)

633 634 635 636
    @classmethod
    def check_perms(cls, user):
        cls.get_operation_class().check_perms(user)

637
    def get(self, request, *args, **kwargs):
638
        self.check_auth()
639
        return super(OperationView, self).get(request, *args, **kwargs)
640

641
    def get_response_data(self, result, done, extra=None, **kwargs):
642 643 644 645 646 647
        """Return serializable data to return to agents requesting json
        response to POST"""

        if extra is None:
            extra = {}
        extra["success"] = not isinstance(result, Exception)
648 649 650
        extra["done"] = done
        if isinstance(result, HumanReadableObject):
            extra["message"] = result.get_user_text()
651 652
        return extra

653
    def post(self, request, extra=None, *args, **kwargs):
654
        self.check_auth()
655
        self.object = self.get_object()
656 657
        if extra is None:
            extra = {}
658
        result = None
659
        done = False
660
        try:
661
            task = self.get_op().async(user=request.user, **extra)
662 663 664 665
        except HumanReadableException as e:
            e.send_message(request)
            logger.exception("Could not start operation")
            result = e
666 667
        except Exception as e:
            messages.error(request, _('Could not start operation.'))
668
            logger.exception("Could not start operation")
669
            result = e
670
        else:
671 672 673 674 675 676 677 678
            wait = self.wait_for_result
            if wait:
                try:
                    result = task.get(timeout=wait,
                                      interval=min((wait / 5, .5)))
                except TimeoutError:
                    logger.debug("Result didn't arrive in %ss",
                                 self.wait_for_result, exc_info=True)
679 680 681 682
                except HumanReadableException as e:
                    e.send_message(request)
                    logger.exception(e)
                    result = e
683 684 685 686 687
                except Exception as e:
                    messages.error(request, _('Operation failed.'))
                    logger.debug("Operation failed.", exc_info=True)
                    result = e
                else:
688
                    done = True
689
                    messages.success(request, _('Operation succeeded.'))
690
            if result is None and not done:
691
                messages.success(request, _('Operation is started.'))
692 693

        if "/json" in request.META.get("HTTP_ACCEPT", ""):
694 695
            data = self.get_response_data(result, done,
                                          post_extra=extra, **kwargs)
696 697 698 699
            return HttpResponse(json.dumps(data),
                                content_type="application/json")
        else:
            return redirect("%s#activity" % self.object.get_absolute_url())
700

701
    @classmethod
702 703
    def factory(cls, op, icon='cog', effect='info', extra_bases=(), **kwargs):
        kwargs.update({'op': op, 'icon': icon, 'effect': effect})
704
        return type(str(cls.__name__ + op),
705
                    tuple(list(extra_bases) + [cls]), kwargs)
706

707
    @classmethod
708
    def bind_to_object(cls, instance, **kwargs):
709 710
        me = cls()
        me.get_object = lambda: instance
711
        for key, value in kwargs.iteritems():
712 713
            setattr(me, key, value)
        return me
714 715


716
class AjaxOperationMixin(object):
717

718
    def post(self, request, extra=None, *args, **kwargs):
719 720
        resp = super(AjaxOperationMixin, self).post(
            request, extra, *args, **kwargs)
721
        if request.is_ajax():
722
            if not self.with_reload:
723 724
                store = messages.get_messages(request)
                store.used = True
725 726
            else:
                store = []
727
            return HttpResponse(
728
                json.dumps({'success': True,
729
                            'with_reload': self.with_reload,
730 731 732 733 734 735
                            'messages': [unicode(m) for m in store]}),
                content_type="application=json"
            )
        else:
            return resp

736

737 738 739 740 741 742
class VmOperationView(AjaxOperationMixin, OperationView):

    model = Instance
    context_object_name = 'instance'  # much simpler to mock object


743 744 745 746
class FormOperationMixin(object):

    form_class = None

747 748 749
    def get_form_kwargs(self):
        return {}

750 751 752
    def get_context_data(self, **kwargs):
        ctx = super(FormOperationMixin, self).get_context_data(**kwargs)
        if self.request.method == 'POST':
753 754
            ctx['form'] = self.form_class(self.request.POST,
                                          **self.get_form_kwargs())
755
        else:
756
            ctx['form'] = self.form_class(**self.get_form_kwargs())
757 758 759 760 761
        return ctx

    def post(self, request, extra=None, *args, **kwargs):
        if extra is None:
            extra = {}
762
        form = self.form_class(self.request.POST, **self.get_form_kwargs())
763 764
        if form.is_valid():
            extra.update(form.cleaned_data)
765
            resp = super(FormOperationMixin, self).post(
766
                request, extra, *args, **kwargs)
767 768
            if request.is_ajax():
                return HttpResponse(
769 770
                    json.dumps({
                        'success': True,
771 772
                        'with_reload': self.with_reload}),
                    content_type="application=json")
773 774
            else:
                return resp
775 776 777 778
        else:
            return self.get(request)


779 780 781
class RequestFormOperationMixin(FormOperationMixin):

    def get_form_kwargs(self):
782
        val = super(RequestFormOperationMixin, self).get_form_kwargs()
783 784 785 786
        val.update({'request': self.request})
        return val


787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805
class VmAddInterfaceView(FormOperationMixin, VmOperationView):

    op = 'add_interface'
    form_class = VmAddInterfaceForm
    show_in_toolbar = False
    icon = 'globe'
    effect = 'success'
    with_reload = True

    def get_form_kwargs(self):
        inst = self.get_op().instance
        choices = Vlan.get_objects_with_level(
            "user", self.request.user).exclude(
            vm_interface__instance__in=[inst])
        val = super(VmAddInterfaceView, self).get_form_kwargs()
        val.update({'choices': choices})
        return val


806 807 808 809 810
class VmCreateDiskView(FormOperationMixin, VmOperationView):

    op = 'create_disk'
    form_class = VmCreateDiskForm
    show_in_toolbar = False
811
    icon = 'hdd-o'
812
    effect = "success"
813
    is_disk_operation = True
814 815 816 817 818 819 820 821


class VmDownloadDiskView(FormOperationMixin, VmOperationView):

    op = 'download_disk'
    form_class = VmDownloadDiskForm
    show_in_toolbar = False
    icon = 'download'
822
    effect = "success"
823
    is_disk_operation = True
824 825


826 827 828 829
class VmMigrateView(VmOperationView):

    op = 'migrate'
    icon = 'truck'
830
    effect = 'info'
831 832 833
    template_name = 'dashboard/_vm-migrate.html'

    def get_context_data(self, **kwargs):
834
        ctx = super(VmMigrateView, self).get_context_data(**kwargs)
835 836 837 838 839
        ctx['nodes'] = [n for n in Node.objects.filter(enabled=True)
                        if n.state == "ONLINE"]
        return ctx

    def post(self, request, extra=None, *args, **kwargs):
840 841
        if extra is None:
            extra = {}
842 843 844 845 846 847 848
        node = self.request.POST.get("node")
        if node:
            node = get_object_or_404(Node, pk=node)
            extra["to_node"] = node
        return super(VmMigrateView, self).post(request, extra, *args, **kwargs)


849
class VmSaveView(FormOperationMixin, VmOperationView):
850 851 852

    op = 'save_as_template'
    icon = 'save'
853
    effect = 'info'
854
    form_class = VmSaveForm
855

856 857 858 859 860

class VmResourcesChangeView(VmOperationView):
    op = 'resources_change'
    icon = "save"
    show_in_toolbar = False
861
    wait_for_result = 0.5
862 863 864 865 866

    def post(self, request, extra=None, *args, **kwargs):
        if extra is None:
            extra = {}

867
        instance = get_object_or_404(Instance, pk=kwargs['pk'])
868

869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885
        form = VmResourcesForm(request.POST, instance=instance)
        if not form.is_valid():
            for f in form.errors:
                messages.error(request, "<strong>%s</strong>: %s" % (
                    f, form.errors[f].as_text()
                ))
            if request.is_ajax():  # this is not too nice
                store = messages.get_messages(request)
                store.used = True
                return HttpResponse(
                    json.dumps({'success': False,
                                'messages': [unicode(m) for m in store]}),
                    content_type="application=json"
                )
            else:
                return redirect(instance.get_absolute_url() + "#resources")
        else:
886 887
            extra = form.cleaned_data
            extra['max_ram_size'] = extra['ram_size']
888 889
            return super(VmResourcesChangeView, self).post(request, extra,
                                                           *args, **kwargs)
890 891


892 893 894 895 896 897
class TokenOperationView(OperationView):
    """Abstract operation view with token support.

    User can do the action with a valid token instead of logging in.
    """
    token_max_age = 3 * 24 * 3600
898
    redirect_exception_classes = (PermissionDenied, SuspiciousOperation, )
899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932

    @classmethod
    def get_salt(cls):
        return unicode(cls)

    @classmethod
    def get_token(cls, instance, user):
        t = tuple([getattr(i, 'pk', i) for i in [instance, user]])
        return signing.dumps(t, salt=cls.get_salt(), compress=True)

    @classmethod
    def get_token_url(cls, instance, user):
        key = cls.get_token(instance, user)
        return cls.get_instance_url(instance.pk, key)

    def check_auth(self):
        if 'k' in self.request.GET:
            try:  # check if token is needed at all
                return super(TokenOperationView, self).check_auth()
            except Exception:
                op = self.get_op()
                pk = op.instance.pk
                key = self.request.GET.get('k')

                logger.debug("checking token supplied to %s",
                             self.request.get_full_path())
                try:
                    user = self.validate_key(pk, key)
                except signing.SignatureExpired:
                    messages.error(self.request, _('The token has expired.'))
                else:
                    logger.info("Request user changed to %s at %s",
                                user, self.request.get_full_path())
                    self.request.user = user
933
                    self.request.token_user = True
934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968
        else:
            logger.debug("no token supplied to %s",
                         self.request.get_full_path())

        return super(TokenOperationView, self).check_auth()

    def validate_key(self, pk, key):
        """Get object based on signed token.
        """
        try:
            data = signing.loads(key, salt=self.get_salt())
            logger.debug('Token data: %s', unicode(data))
            instance, user = data
            logger.debug('Extracted token data: instance: %s, user: %s',
                         unicode(instance), unicode(user))
        except (signing.BadSignature, ValueError, TypeError) as e:
            logger.warning('Tried invalid token. Token: %s, user: %s. %s',
                           key, unicode(self.request.user), unicode(e))
            raise SuspiciousOperation()

        try:
            instance, user = signing.loads(key, max_age=self.token_max_age,
                                           salt=self.get_salt())
            logger.debug('Extracted non-expired token data: %s, %s',
                         unicode(instance), unicode(user))
        except signing.BadSignature as e:
            raise signing.SignatureExpired()

        if pk != instance:
            logger.debug('pk (%d) != instance (%d)', pk, instance)
            raise SuspiciousOperation()
        user = User.objects.get(pk=user)
        return user


969 970
class VmRenewView(FormOperationMixin, TokenOperationView, VmOperationView):

971 972 973 974
    op = 'renew'
    icon = 'calendar'
    effect = 'info'
    show_in_toolbar = False
975
    form_class = VmRenewForm
976
    wait_for_result = 0.5
977 978 979 980 981

    def get_form_kwargs(self):
        choices = Lease.get_objects_with_level("user", self.request.user)
        default = self.get_op().instance.lease
        if default and default not in choices:
982 983
            choices = (choices.distinct() |
                       Lease.objects.filter(pk=default.pk).distinct())
984 985 986 987

        val = super(VmRenewView, self).get_form_kwargs()
        val.update({'choices': choices, 'default': default})
        return val
988

989 990
    def get_response_data(self, result, done, extra=None, **kwargs):
        extra = super(VmRenewView, self).get_response_data(result, done,
991 992 993 994 995
                                                           extra, **kwargs)
        extra["new_suspend_time"] = unicode(self.get_op().
                                            instance.time_of_suspend)
        return extra

996

997 998 999 1000 1001 1002 1003 1004 1005 1006
class VmStateChangeView(FormOperationMixin, VmOperationView):
    op = 'emergency_change_state'
    icon = 'legal'
    effect = 'danger'
    show_in_toolbar = True
    form_class = VmStateChangeForm
    wait_for_result = 0.5

    def get_form_kwargs(self):
        inst = self.get_op().instance
1007 1008
        active_activities = InstanceActivity.objects.filter(
            finished__isnull=True, instance=inst)
1009 1010
        show_interrupt = active_activities.exists()
        val = super(VmStateChangeView, self).get_form_kwargs()
1011
        val.update({'show_interrupt': show_interrupt, 'status': inst.status})
1012 1013 1014
        return val


1015 1016
vm_ops = OrderedDict([
    ('deploy', VmOperationView.factory(
1017
        op='deploy', icon='play', effect='success')),
1018
    ('wake_up', VmOperationView.factory(
1019
        op='wake_up', icon='sun-o', effect='success')),
1020
    ('sleep', VmOperationView.factory(
1021
        extra_bases=[TokenOperationView],
1022
        op='sleep', icon='moon-o', effect='info')),
1023 1024 1025
    ('migrate', VmMigrateView),
    ('save_as_template', VmSaveView),
    ('reboot', VmOperationView.factory(
1026
        op='reboot', icon='refresh', effect='warning')),
1027
    ('reset', VmOperationView.factory(
1028
        op='reset', icon='bolt', effect='warning')),
1029
    ('shutdown', VmOperationView.factory(
1030
        op='shutdown', icon='power-off', effect='warning')),
1031
    ('shut_off', VmOperationView.factory(
1032
        op='shut_off', icon='ban', effect='warning')),
1033 1034
    ('recover', VmOperationView.factory(
        op='recover', icon='medkit', effect='warning')),
1035
    ('nostate', VmStateChangeView),
1036
    ('destroy', VmOperationView.factory(
1037
        extra_bases=[TokenOperationView],
1038
        op='destroy', icon='times', effect='danger')),
1039 1040
    ('create_disk', VmCreateDiskView),
    ('download_disk', VmDownloadDiskView),
1041
    ('add_interface', VmAddInterfaceView),
1042
    ('renew', VmRenewView),
1043
    ('resources_change', VmResourcesChangeView),
1044 1045
    ('password_reset', VmOperationView.factory(
        op='password_reset', icon='unlock', effect='warning',
1046
        show_in_toolbar=False, wait_for_result=0.5, with_reload=True)),
1047 1048 1049 1050
    ('mount_store', VmOperationView.factory(
        op='mount_store', icon='briefcase', effect='info',
        show_in_toolbar=False,
    )),
1051
])
1052 1053 1054 1055 1056 1057 1058 1059 1060


def get_operations(instance, user):
    ops = []
    for k, v in vm_ops.iteritems():
        try:
            op = v.get_op_by_object(instance)
            op.check_auth(user)
            op.check_precond()
1061
        except PermissionDenied as e:
1062 1063
            logger.debug('Not showing operation %s for %s: %s',
                         k, instance, unicode(e))
1064 1065
        except Exception:
            ops.append(v.bind_to_object(instance, disabled=True))
1066 1067 1068
        else:
            ops.append(v.bind_to_object(instance))
    return ops
1069

Kálmán Viktor committed
1070

1071 1072 1073
class MassOperationView(OperationView):
    template_name = 'dashboard/mass-operate.html'

1074
    def check_auth(self):
1075
        self.get_op().check_perms(self.request.user)
1076 1077 1078 1079
        for i in self.get_object():
            if not i.has_level(self.request.user, "user"):
                raise PermissionDenied(
                    "You have no user access to instance %d" % i.pk)
1080

1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096
    @classmethod
    def get_urlname(cls):
        return 'dashboard.vm.mass-op.%s' % cls.op

    @classmethod
    def get_url(cls):
        return reverse("dashboard.vm.mass-op.%s" % cls.op)

    def get_op(self, instance=None):
        if instance:
            return getattr(instance, self.op)
        else:
            return Instance._ops[self.op]

    def get_context_data(self, **kwargs):
        ctx = super(MassOperationView, self).get_context_data(**kwargs)
1097 1098
        instances = self.get_object()
        ctx['instances'] = self._get_operable_instances(
1099
            instances, self.request.user)
1100
        ctx['vm_count'] = sum(1 for i in ctx['instances'] if not i.disabled)
1101 1102
        return ctx

1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118
    def _call_operations(self, extra):
        request = self.request
        user = request.user
        instances = self.get_object()
        for i in instances:
            try:
                self.get_op(i).async(user=user, **extra)
            except HumanReadableException as e:
                e.send_message(request)
            except Exception as e:
                # pre-existing errors should have been catched when the
                # confirmation dialog was constructed
                messages.error(request, _(
                    "Failed to execute %(op)s operation on "
                    "instance %(instance)s.") % {"op": self.name,
                                                 "instance": i})
1119 1120

    def get_object(self):
1121 1122
        vms = getattr(self.request, self.request.method).getlist("vm")
        return Instance.objects.filter(pk__in=vms)
1123

1124
    def _get_operable_instances(self, instances, user):
1125 1126
        for i in instances:
            try:
1127 1128 1129
                op = self.get_op(i)
                op.check_auth(user)
                op.check_precond()
1130 1131 1132 1133 1134
            except PermissionDenied as e:
                i.disabled = create_readable(
                    _("You are not permitted to execute %(op)s on instance "
                      "%(instance)s."), instance=i.pk, op=self.name)
                i.disabled_icon = "lock"
1135 1136
            except Exception as e:
                i.disabled = fetch_human_exception(e)
1137
            else:
1138
                i.disabled = None
1139
        return instances
1140

1141
    def post(self, request, extra=None, *args, **kwargs):
1142
        self.check_auth()
1143 1144
        if extra is None:
            extra = {}
1145
        self._call_operations(extra)
1146 1147 1148 1149 1150
        if request.is_ajax():
            store = messages.get_messages(request)
            store.used = True
            return HttpResponse(
                json.dumps({'messages': [unicode(m) for m in store]}),
1151
                content_type="application/json"
1152 1153 1154
            )
        else:
            return redirect(reverse("dashboard.views.vm-list"))
1155

1156 1157 1158
    @classmethod
    def factory(cls, vm_op, extra_bases=(), **kwargs):
        return type(str(cls.__name__ + vm_op.op),
1159
                    tuple(list(extra_bases) + [cls, vm_op]), kwargs)
1160

1161

1162
class MassMigrationView(MassOperationView, VmMigrateView):
1163
    template_name = 'dashboard/_vm-mass-migrate.html'
1164

1165
vm_mass_ops = OrderedDict([
1166 1167 1168 1169 1170 1171
    ('deploy', MassOperationView.factory(vm_ops['deploy'])),
    ('wake_up', MassOperationView.factory(vm_ops['wake_up'])),
    ('sleep', MassOperationView.factory(vm_ops['sleep'])),
    ('reboot', MassOperationView.factory(vm_ops['reboot'])),
    ('reset', MassOperationView.factory(vm_ops['reset'])),
    ('shut_off', MassOperationView.factory(vm_ops['shut_off'])),
1172
    ('migrate', MassMigrationView),
1173
    ('destroy', MassOperationView.factory(vm_ops['destroy'])),
1174 1175 1176
])


1177
class NodeDetailView(LoginRequiredMixin, SuperuserRequiredMixin, DetailView):
1178