views.py 109 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
# Copyright 2014 Budapest University of Technology and Economics (BME IK)
#
# This file is part of CIRCLE Cloud.
#
# CIRCLE is free software: you can redistribute it and/or modify it under
# the terms of the GNU General Public License as published by the Free
# Software Foundation, either version 3 of the License, or (at your option)
# any later version.
#
# CIRCLE is distributed in the hope that it will be useful, but WITHOUT ANY
# WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
# FOR A PARTICULAR PURPOSE.  See the GNU General Public License for more
# details.
#
# You should have received a copy of the GNU General Public License along
# with CIRCLE.  If not, see <http://www.gnu.org/licenses/>.

18
from __future__ import unicode_literals, absolute_import
19

20
from collections import OrderedDict
21
from itertools import chain
22 23
from os import getenv
import json
Őry Máté committed
24
import logging
25
import re
26
import requests
27

28
from django.conf import settings
29
from django.contrib.auth.models import User, Group
Őry Máté committed
30
from django.contrib.auth.views import login, redirect_to_login
31
from django.contrib.messages import warning
32
from django.contrib.messages.views import SuccessMessageMixin
33
from django.core.exceptions import (
34
    PermissionDenied, SuspiciousOperation,
35
)
36 37
from django.core import signing
from django.core.urlresolvers import reverse, reverse_lazy
38
from django.db.models import Count
39
from django.http import HttpResponse, HttpResponseRedirect, Http404
Őry Máté committed
40
from django.shortcuts import redirect, render, get_object_or_404
41
from django.views.decorators.http import require_GET, require_POST
42
from django.views.generic.detail import SingleObjectMixin
43
from django.views.generic import (TemplateView, DetailView, View, DeleteView,
44
                                  UpdateView, CreateView, ListView)
45 46
from django.contrib import messages
from django.utils.translation import ugettext as _
47
from django.utils.translation import ungettext as __
48
from django.template.loader import render_to_string
49
from django.template import RequestContext
50

51
from django.forms.models import inlineformset_factory
52
from django_tables2 import SingleTableView
53 54
from braces.views import (LoginRequiredMixin, SuperuserRequiredMixin,
                          PermissionRequiredMixin)
55
from braces.views._access import AccessMixin
Kálmán Viktor committed
56

57 58
from django_sshkey.models import UserKey

59
from .forms import (
60
    CircleAuthenticationForm, HostForm, LeaseForm, MyProfileForm,
61
    NodeForm, TemplateForm, TraitForm, VmCustomizeForm, GroupCreateForm,
62
    UserCreationForm, GroupProfileUpdateForm, UnsubscribeForm,
63
    VmSaveForm, UserKeyForm,
64
    CirclePasswordChangeForm, VmCreateDiskForm, VmDownloadDiskForm,
65
    TraitsForm, RawDataForm, GroupPermissionForm
66
)
67 68 69

from .tables import (
    NodeListTable, NodeVmListTable, TemplateListTable, LeaseListTable,
70
    GroupListTable, UserKeyListTable
71
)
Őry Máté committed
72 73 74 75
from vm.models import (
    Instance, instance_activity, InstanceActivity, InstanceTemplate, Interface,
    InterfaceTemplate, Lease, Node, NodeActivity, Trait,
)
76
from storage.models import Disk
77
from firewall.models import Vlan, Host, Rule
78
from .models import Favourite, Profile, GroupProfile, FutureMember
79

Őry Máté committed
80
logger = logging.getLogger(__name__)
81
saml_available = hasattr(settings, "SAML_CONFIG")
82

83

84 85 86 87
def search_user(keyword):
    try:
        return User.objects.get(username=keyword)
    except User.DoesNotExist:
88 89 90 91
        try:
            return User.objects.get(profile__org_id=keyword)
        except User.DoesNotExist:
            return User.objects.get(email=keyword)
92 93


94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116
class GroupCodeMixin(object):

    @classmethod
    def get_available_group_codes(cls, request):
        newgroups = []
        if saml_available:
            from djangosaml2.cache import StateCache, IdentityCache
            from djangosaml2.conf import get_config
            from djangosaml2.views import _get_subject_id
            from saml2.client import Saml2Client

            state = StateCache(request.session)
            conf = get_config(None, request)
            client = Saml2Client(conf, state_cache=state,
                                 identity_cache=IdentityCache(request.session),
                                 logger=logger)
            subject_id = _get_subject_id(request.session)
            identity = client.users.get_identity(subject_id,
                                                 check_not_on_or_after=False)
            if identity:
                attributes = identity[0]
                owneratrs = getattr(
                    settings, 'SAML_GROUP_OWNER_ATTRIBUTES', [])
117 118
                for group in chain(*[attributes[i]
                                     for i in owneratrs if i in attributes]):
119 120 121 122 123 124 125 126
                    try:
                        GroupProfile.search(group)
                    except Group.DoesNotExist:
                        newgroups.append(group)

        return newgroups


127
class FilterMixin(object):
128

129 130 131 132
    def get_queryset_filters(self):
        filters = {}
        for item in self.allowed_filters:
            if item in self.request.GET:
133 134 135 136 137
                filters[self.allowed_filters[item]] = (
                    self.request.GET[item].split(",")
                    if self.allowed_filters[item].endswith("__in") else
                    self.request.GET[item])

138
        return filters
139

140 141 142
    def get_queryset(self):
        return super(FilterMixin,
                     self).get_queryset().filter(**self.get_queryset_filters())
143 144


145
class IndexView(LoginRequiredMixin, TemplateView):
Kálmán Viktor committed
146
    template_name = "dashboard/index.html"
147

148
    def get_context_data(self, **kwargs):
149
        user = self.request.user
150
        context = super(IndexView, self).get_context_data(**kwargs)
151

152
        # instances
153
        favs = Instance.objects.filter(favourite__user=self.request.user)
154
        instances = Instance.get_objects_with_level(
155
            'user', user, disregard_superuser=True).filter(destroyed_at=None)
156 157 158
        display = list(favs) + list(set(instances) - set(favs))
        for d in display:
            d.fav = True if d in favs else False
159
        context.update({
160
            'instances': display[:5],
161
            'more_instances': instances.count() - len(instances[:5])
162 163
        })

164 165
        running = instances.filter(status='RUNNING')
        stopped = instances.exclude(status__in=('RUNNING', 'NOSTATE'))
166

167
        context.update({
168 169 170
            'running_vms': running[:20],
            'running_vm_num': running.count(),
            'stopped_vm_num': stopped.count()
171
        })
172

173 174 175 176
        # nodes
        if user.is_superuser:
            nodes = Node.objects.all()
            context.update({
177 178
                'nodes': nodes[:5],
                'more_nodes': nodes.count() - len(nodes[:5]),
179 180 181 182 183 184 185 186 187 188
                'sum_node_num': nodes.count(),
                'node_num': {
                    'running': Node.get_state_count(True, True),
                    'missing': Node.get_state_count(False, True),
                    'disabled': Node.get_state_count(True, False),
                    'offline': Node.get_state_count(False, False)
                }
            })

        # groups
189
        if user.has_module_perms('auth'):
190 191
            profiles = GroupProfile.get_objects_with_level('operator', user)
            groups = Group.objects.filter(groupprofile__in=profiles)
192 193 194 195
            context.update({
                'groups': groups[:5],
                'more_groups': groups.count() - len(groups[:5]),
            })
196 197 198 199 200 201

        # template
        if user.has_perm('vm.create_template'):
            context['templates'] = InstanceTemplate.get_objects_with_level(
                'operator', user).all()[:5]

202 203
        return context

204

205
def get_vm_acl_data(obj):
206 207 208 209 210 211 212 213 214
    levels = obj.ACL_LEVELS
    users = obj.get_users_with_level()
    users = [{'user': u, 'level': l} for u, l in users]
    groups = obj.get_groups_with_level()
    groups = [{'group': g, 'level': l} for g, l in groups]
    return {'users': users, 'groups': groups, 'levels': levels,
            'url': reverse('dashboard.views.vm-acl', args=[obj.pk])}


215 216 217 218 219 220 221 222 223 224 225
def get_group_acl_data(obj):
    aclobj = obj.profile
    levels = aclobj.ACL_LEVELS
    users = aclobj.get_users_with_level()
    users = [{'user': u, 'level': l} for u, l in users]
    groups = aclobj.get_groups_with_level()
    groups = [{'group': g, 'level': l} for g, l in groups]
    return {'users': users, 'groups': groups, 'levels': levels,
            'url': reverse('dashboard.views.group-acl', args=[obj.pk])}


226
class CheckedDetailView(LoginRequiredMixin, DetailView):
227 228
    read_level = 'user'

229 230 231
    def get_has_level(self):
        return self.object.has_level

232 233
    def get_context_data(self, **kwargs):
        context = super(CheckedDetailView, self).get_context_data(**kwargs)
234
        if not self.get_has_level()(self.request.user, self.read_level):
235 236 237 238
            raise PermissionDenied()
        return context


239 240 241 242 243 244 245 246
class VmDetailVncTokenView(CheckedDetailView):
    template_name = "dashboard/vm-detail.html"
    model = Instance

    def get(self, request, **kwargs):
        self.object = self.get_object()
        if not self.object.has_level(request.user, 'operator'):
            raise PermissionDenied()
247 248
        if not request.user.has_perm('vm.access_console'):
            raise PermissionDenied()
249
        if self.object.node:
250 251 252 253 254 255 256 257
            with instance_activity(code_suffix='console-accessed',
                                   instance=self.object, user=request.user,
                                   concurrency_check=False):
                port = self.object.vnc_port
                host = str(self.object.node.host.ipv4)
                value = signing.dumps({'host': host, 'port': port},
                                      key=getenv("PROXY_SECRET", 'asdasd')),
                return HttpResponse('vnc/?d=%s' % value)
258 259 260 261
        else:
            raise Http404()


262
class VmDetailView(CheckedDetailView):
Kálmán Viktor committed
263
    template_name = "dashboard/vm-detail.html"
264
    model = Instance
265 266

    def get_context_data(self, **kwargs):
267
        context = super(VmDetailView, self).get_context_data(**kwargs)
268
        instance = context['instance']
269
        ops = get_operations(instance, self.request.user)
270
        context.update({
Bach Dániel committed
271
            'graphite_enabled': settings.GRAPHITE_URL is not None,
272
            'vnc_url': reverse_lazy("dashboard.views.detail-vnc",
273
                                    kwargs={'pk': self.object.pk}),
274 275
            'ops': ops,
            'op': {i.op: i for i in ops},
276
        })
277 278

        # activity data
279 280
        context['activities'] = self.object.get_merged_activities(
            self.request.user)
281

282
        context['vlans'] = Vlan.get_objects_with_level(
283
            'user', self.request.user
284
        ).exclude(  # exclude already added interfaces
285 286 287
            pk__in=Interface.objects.filter(
                instance=self.get_object()).values_list("vlan", flat=True)
        ).all()
288
        context['acl'] = get_vm_acl_data(instance)
289 290
        context['os_type_icon'] = instance.os_type.replace("unknown",
                                                           "question")
291 292 293
        # ipv6 infos
        context['ipv6_host'] = instance.get_connect_host(use_ipv6=True)
        context['ipv6_port'] = instance.get_connect_port(use_ipv6=True)
294 295 296 297 298

        # resources forms
        if self.request.user.is_superuser:
            context['traits_form'] = TraitsForm(instance=instance)
            context['raw_data_form'] = RawDataForm(instance=instance)
299

300 301 302
        # resources change perm
        context['can_change_resources'] = self.request.user.has_perm(
            "vm.change_resources")
303

304
        return context
Kálmán Viktor committed
305

306
    def post(self, request, *args, **kwargs):
307 308 309
        options = {
            'change_password': self.__change_password,
            'new_name': self.__set_name,
310
            'new_description': self.__set_description,
311 312
            'new_tag': self.__add_tag,
            'to_remove': self.__remove_tag,
313 314
            'port': self.__add_port,
            'new_network_vlan': self.__new_network,
315
            'abort_operation': self.__abort_operation,
316 317 318 319
        }
        for k, v in options.iteritems():
            if request.POST.get(k) is not None:
                return v(request)
Kálmán Viktor committed
320

321 322 323 324
    def __change_password(self, request):
        self.object = self.get_object()
        if not self.object.has_level(request.user, 'owner'):
            raise PermissionDenied()
Kálmán Viktor committed
325

326
        self.object.change_password(user=request.user)
327
        messages.success(request, _("Password changed."))
328
        if request.is_ajax():
329
            return HttpResponse("Success.")
330 331 332
        else:
            return redirect(reverse_lazy("dashboard.views.detail",
                                         kwargs={'pk': self.object.pk}))
333

334 335
    def __set_name(self, request):
        self.object = self.get_object()
336 337
        if not self.object.has_level(request.user, 'owner'):
            raise PermissionDenied()
338 339 340 341
        new_name = request.POST.get("new_name")
        Instance.objects.filter(pk=self.object.pk).update(
            **{'name': new_name})

342
        success_message = _("VM successfully renamed.")
343 344 345 346 347 348 349 350 351 352 353 354
        if request.is_ajax():
            response = {
                'message': success_message,
                'new_name': new_name,
                'vm_pk': self.object.pk
            }
            return HttpResponse(
                json.dumps(response),
                content_type="application/json"
            )
        else:
            messages.success(request, success_message)
355 356 357 358 359 360 361 362 363 364 365
            return redirect(self.object.get_absolute_url())

    def __set_description(self, request):
        self.object = self.get_object()
        if not self.object.has_level(request.user, 'owner'):
            raise PermissionDenied()

        new_description = request.POST.get("new_description")
        Instance.objects.filter(pk=self.object.pk).update(
            **{'description': new_description})

366
        success_message = _("VM description successfully updated.")
367 368 369 370 371 372 373 374 375 376 377 378
        if request.is_ajax():
            response = {
                'message': success_message,
                'new_description': new_description,
            }
            return HttpResponse(
                json.dumps(response),
                content_type="application/json"
            )
        else:
            messages.success(request, success_message)
            return redirect(self.object.get_absolute_url())
379

Kálmán Viktor committed
380 381 382
    def __add_tag(self, request):
        new_tag = request.POST.get('new_tag')
        self.object = self.get_object()
383 384
        if not self.object.has_level(request.user, 'owner'):
            raise PermissionDenied()
Kálmán Viktor committed
385 386

        if len(new_tag) < 1:
387
            message = u"Please input something."
Kálmán Viktor committed
388
        elif len(new_tag) > 20:
389
            message = u"Tag name is too long."
Kálmán Viktor committed
390 391 392 393 394 395 396 397 398 399 400 401 402 403 404
        else:
            self.object.tags.add(new_tag)

        try:
            messages.error(request, message)
        except:
            pass

        return redirect(reverse_lazy("dashboard.views.detail",
                                     kwargs={'pk': self.object.pk}))

    def __remove_tag(self, request):
        try:
            to_remove = request.POST.get('to_remove')
            self.object = self.get_object()
405 406
            if not self.object.has_level(request.user, 'owner'):
                raise PermissionDenied()
Kálmán Viktor committed
407 408 409 410 411 412 413 414 415 416 417

            self.object.tags.remove(to_remove)
            message = u"Success"
        except:  # note this won't really happen
            message = u"Not success"

        if request.is_ajax():
            return HttpResponse(
                json.dumps({'message': message}),
                content_type="application=json"
            )
418 419 420
        else:
            return redirect(reverse_lazy("dashboard.views.detail",
                            kwargs={'pk': self.object.pk}))
Kálmán Viktor committed
421

422 423
    def __add_port(self, request):
        object = self.get_object()
424 425
        if (not object.has_level(request.user, 'owner') or
                not request.user.has_perm('vm.config_ports')):
426
            raise PermissionDenied()
427 428 429 430 431 432

        port = request.POST.get("port")
        proto = request.POST.get("proto")

        try:
            error = None
433 434 435
            interfaces = object.interface_set.all()
            host = Host.objects.get(pk=request.POST.get("host_pk"),
                                    interface__in=interfaces)
436
            host.add_port(proto, private=port)
437 438 439 440 441
        except Host.DoesNotExist:
            logger.error('Tried to add port to nonexistent host %d. User: %s. '
                         'Instance: %s', request.POST.get("host_pk"),
                         unicode(request.user), object)
            raise PermissionDenied()
442
        except ValueError:
443
            error = _("There is a problem with your input.")
444
        except Exception as e:
Bach Dániel committed
445 446
            error = _("Unknown error.")
            logger.error(e)
447 448 449 450 451 452 453 454 455

        if request.is_ajax():
            pass
        else:
            if error:
                messages.error(request, error)
            return redirect(reverse_lazy("dashboard.views.detail",
                                         kwargs={'pk': self.get_object().pk}))

456 457 458 459 460
    def __new_network(self, request):
        self.object = self.get_object()
        if not self.object.has_level(request.user, 'owner'):
            raise PermissionDenied()

461
        vlan = get_object_or_404(Vlan, pk=request.POST.get("new_network_vlan"))
462 463
        if not vlan.has_level(request.user, 'user'):
            raise PermissionDenied()
464
        try:
465
            self.object.add_interface(vlan=vlan, user=request.user)
466
            messages.success(request, _("Successfully added new interface."))
467 468 469 470 471 472 473
        except Exception, e:
            error = u' '.join(e.messages)
            messages.error(request, error)

        return redirect("%s#network" % reverse_lazy(
            "dashboard.views.detail", kwargs={'pk': self.object.pk}))

474
    def __abort_operation(self, request):
Kálmán Viktor committed
475 476 477 478
        self.object = self.get_object()

        activity = get_object_or_404(InstanceActivity,
                                     pk=request.POST.get("activity"))
479 480
        if not activity.is_abortable_for(request.user):
            raise PermissionDenied()
Kálmán Viktor committed
481 482 483
        activity.abort()
        return redirect("%s#activity" % self.object.get_absolute_url())

484

485
class VmTraitsUpdate(SuperuserRequiredMixin, UpdateView):
486 487 488 489 490 491 492
    form_class = TraitsForm
    model = Instance

    def get_success_url(self):
        return self.get_object().get_absolute_url() + "#resources"


493
class VmRawDataUpdate(SuperuserRequiredMixin, UpdateView):
494 495 496 497 498 499 500
    form_class = RawDataForm
    model = Instance

    def get_success_url(self):
        return self.get_object().get_absolute_url() + "#resources"


501
class OperationView(DetailView):
502

503
    template_name = 'dashboard/operate.html'
504
    show_in_toolbar = True
505
    effect = None
506

507 508 509
    @property
    def name(self):
        return self.get_op().name
510

511 512 513
    @property
    def description(self):
        return self.get_op().description
514

515 516 517
    def is_preferred(self):
        return self.get_op().is_preferred()

518 519 520
    @classmethod
    def get_urlname(cls):
        return 'dashboard.vm.op.%s' % cls.op
521

522 523
    def get_url(self):
        return reverse(self.get_urlname(), args=(self.get_object().pk, ))
524

525 526 527 528 529
    def get_wrapper_template_name(self):
        if self.request.is_ajax():
            return 'dashboard/_modal.html'
        else:
            return 'dashboard/_base.html'
530

531 532 533
    @classmethod
    def get_op_by_object(cls, obj):
        return getattr(obj, cls.op)
534

535 536 537 538
    def get_op(self):
        if not hasattr(self, '_opobj'):
            setattr(self, '_opobj', getattr(self.get_object(), self.op))
        return self._opobj
539

540
    def get_context_data(self, **kwargs):
541
        ctx = super(OperationView, self).get_context_data(**kwargs)
542
        ctx['op'] = self.get_op()
543
        ctx['opview'] = self
544 545
        ctx['url'] = self.request.path
        return ctx
546

547 548 549 550 551 552 553
    def get(self, request, *args, **kwargs):
        self.get_op().check_auth(request.user)
        response = super(OperationView, self).get(request, *args, **kwargs)
        response.render()
        response.content = render_to_string(self.get_wrapper_template_name(),
                                            {'body': response.content})
        return response
554

555
    def post(self, request, extra=None, *args, **kwargs):
556
        self.object = self.get_object()
557 558
        if extra is None:
            extra = {}
559
        try:
560
            self.get_op().async(user=request.user, **extra)
561 562 563
        except Exception as e:
            messages.error(request, _('Could not start operation.'))
            logger.error(e)
564
        return redirect("%s#activity" % self.object.get_absolute_url())
565

566
    @classmethod
567
    def factory(cls, op, icon='cog', effect='info'):
568
        return type(str(cls.__name__ + op),
569
                    (cls, ), {'op': op, 'icon': icon, 'effect': effect})
570

571
    @classmethod
572
    def bind_to_object(cls, instance, **kwargs):
573 574
        v = cls()
        v.get_object = lambda: instance
575 576
        for key, value in kwargs.iteritems():
            setattr(v, key, value)
577 578 579 580 581 582
        return v


class VmOperationView(OperationView):

    model = Instance
583
    context_object_name = 'instance'  # much simpler to mock object
584

585 586 587
    def post(self, request, extra=None, *args, **kwargs):
        resp = super(VmOperationView, self).post(request, extra, *args,
                                                 **kwargs)
588 589 590 591
        if request.is_ajax():
            store = messages.get_messages(request)
            store.used = True
            return HttpResponse(
592
                json.dumps({'success': True,
593 594 595 596 597 598
                            'messages': [unicode(m) for m in store]}),
                content_type="application=json"
            )
        else:
            return resp

599

600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617
class FormOperationMixin(object):

    form_class = None

    def get_context_data(self, **kwargs):
        ctx = super(FormOperationMixin, self).get_context_data(**kwargs)
        if self.request.method == 'POST':
            ctx['form'] = self.form_class(self.request.POST)
        else:
            ctx['form'] = self.form_class()
        return ctx

    def post(self, request, extra=None, *args, **kwargs):
        if extra is None:
            extra = {}
        form = self.form_class(self.request.POST)
        if form.is_valid():
            extra.update(form.cleaned_data)
618
            resp = super(FormOperationMixin, self).post(
619
                request, extra, *args, **kwargs)
620 621
            if request.is_ajax():
                return HttpResponse(
622
                    json.dumps({'success': True}),
623 624 625 626
                    content_type="application=json"
                )
            else:
                return resp
627 628 629 630
        else:
            return self.get(request)


631 632 633 634 635 636
class VmCreateDiskView(FormOperationMixin, VmOperationView):

    op = 'create_disk'
    form_class = VmCreateDiskForm
    show_in_toolbar = False
    icon = 'hdd'
637
    is_disk_operation = True
638 639 640 641 642 643 644 645


class VmDownloadDiskView(FormOperationMixin, VmOperationView):

    op = 'download_disk'
    form_class = VmDownloadDiskForm
    show_in_toolbar = False
    icon = 'download'
646
    is_disk_operation = True
647 648


649 650 651 652
class VmMigrateView(VmOperationView):

    op = 'migrate'
    icon = 'truck'
653
    effect = 'info'
654 655 656
    template_name = 'dashboard/_vm-migrate.html'

    def get_context_data(self, **kwargs):
657
        ctx = super(VmMigrateView, self).get_context_data(**kwargs)
658 659 660 661 662
        ctx['nodes'] = [n for n in Node.objects.filter(enabled=True)
                        if n.state == "ONLINE"]
        return ctx

    def post(self, request, extra=None, *args, **kwargs):
663 664
        if extra is None:
            extra = {}
665 666 667 668 669 670 671
        node = self.request.POST.get("node")
        if node:
            node = get_object_or_404(Node, pk=node)
            extra["to_node"] = node
        return super(VmMigrateView, self).post(request, extra, *args, **kwargs)


672
class VmSaveView(FormOperationMixin, VmOperationView):
673 674 675

    op = 'save_as_template'
    icon = 'save'
676
    effect = 'info'
677
    form_class = VmSaveForm
678

679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701

class VmResourcesChangeView(VmOperationView):
    op = 'resources_change'
    icon = "save"
    show_in_toolbar = False

    def post(self, request, extra=None, *args, **kwargs):
        if extra is None:
            extra = {}

        resources = {
            'num_cores': "cpu-count",
            'priority': "cpu-priority",
            'ram_size': "ram-size",
            "max_ram_size": "ram-size",  # TODO
        }
        for k, v in resources.iteritems():
            extra[k] = request.POST.get(v)

        return super(VmResourcesChangeView, self).post(request, extra,
                                                       *args, **kwargs)


702 703
vm_ops = OrderedDict([
    ('deploy', VmOperationView.factory(
704
        op='deploy', icon='play', effect='success')),
705
    ('wake_up', VmOperationView.factory(
706
        op='wake_up', icon='sun', effect='success')),
707
    ('sleep', VmOperationView.factory(
708
        op='sleep', icon='moon', effect='info')),
709 710 711
    ('migrate', VmMigrateView),
    ('save_as_template', VmSaveView),
    ('reboot', VmOperationView.factory(
712
        op='reboot', icon='refresh', effect='warning')),
713
    ('reset', VmOperationView.factory(
714
        op='reset', icon='bolt', effect='warning')),
715
    ('shutdown', VmOperationView.factory(
716
        op='shutdown', icon='off', effect='warning')),
717
    ('shut_off', VmOperationView.factory(
718
        op='shut_off', icon='ban-circle', effect='warning')),
719 720
    ('recover', VmOperationView.factory(
        op='recover', icon='medkit', effect='warning')),
721
    ('destroy', VmOperationView.factory(
722
        op='destroy', icon='remove', effect='danger')),
723 724 725
    ('create_disk', VmCreateDiskView),
    ('download_disk', VmDownloadDiskView),
])
726 727 728 729 730 731 732 733 734


def get_operations(instance, user):
    ops = []
    for k, v in vm_ops.iteritems():
        try:
            op = v.get_op_by_object(instance)
            op.check_auth(user)
            op.check_precond()
735
        except PermissionDenied as e:
736 737
            logger.debug('Not showing operation %s for %s: %s',
                         k, instance, unicode(e))
738 739
        except Exception:
            ops.append(v.bind_to_object(instance, disabled=True))
740 741 742
        else:
            ops.append(v.bind_to_object(instance))
    return ops
743

Kálmán Viktor committed
744

745
class NodeDetailView(LoginRequiredMixin, SuperuserRequiredMixin, DetailView):
746 747
    template_name = "dashboard/node-detail.html"
    model = Node
748 749
    form = None
    form_class = TraitForm
750

751 752 753
    def get_context_data(self, form=None, **kwargs):
        if form is None:
            form = self.form_class()
754
        context = super(NodeDetailView, self).get_context_data(**kwargs)
755 756
        instances = Instance.active.filter(node=self.object)
        context['table'] = NodeVmListTable(instances)
757 758 759 760
        na = NodeActivity.objects.filter(
            node=self.object, parent=None
        ).order_by('-started').select_related()
        context['activities'] = na
761
        context['trait_form'] = form
762
        context['graphite_enabled'] = (
Bach Dániel committed
763
            settings.GRAPHITE_URL is not None)
764 765
        return context

766 767 768
    def post(self, request, *args, **kwargs):
        if request.POST.get('new_name'):
            return self.__set_name(request)
769 770
        if request.POST.get('to_remove'):
            return self.__remove_trait(request)
771 772
        return redirect(reverse_lazy("dashboard.views.node-detail",
                                     kwargs={'pk': self.get_object().pk}))
773 774 775 776 777 778 779

    def __set_name(self, request):
        self.object = self.get_object()
        new_name = request.POST.get("new_name")
        Node.objects.filter(pk=self.object.pk).update(
            **{'name': new_name})

780
        success_message = _("Node successfully renamed.")
781 782 783 784 785
        if request.is_ajax():
            response = {
                'message': success_message,
                'new_name': new_name,
                'node_pk': self.object.pk
786 787 788 789 790 791 792 793 794 795
            }
            return HttpResponse(
                json.dumps(response),
                content_type="application/json"
            )
        else:
            messages.success(request, success_message)
            return redirect(reverse_lazy("dashboard.views.node-detail",
                                         kwargs={'pk': self.object.pk}))

796 797 798 799
    def __remove_trait(self, request):
        try:
            to_remove = request.POST.get('to_remove')
            self.object = self.get_object()
800
            self.object.traits.remove(to_remove)
801 802 803 804 805 806 807
            message = u"Success"
        except:  # note this won't really happen
            message = u"Not success"

        if request.is_ajax():
            return HttpResponse(
                json.dumps({'message': message}),
808
                content_type="application/json"
809
            )
810
        else:
811
            return redirect(self.object.get_absolute_url())
812

813

814
class GroupDetailView(CheckedDetailView):
815 816
    template_name = "dashboard/group-detail.html"
    model = Group
817
    read_level = 'operator'
818 819 820

    def get_has_level(self):
        return self.object.profile.has_level
821 822 823

    def get_context_data(self, **kwargs):
        context = super(GroupDetailView, self).get_context_data(**kwargs)
824 825
        context['group'] = self.object
        context['users'] = self.object.user_set.all()
826 827
        context['future_users'] = FutureMember.objects.filter(
            group=self.object)
828
        context['acl'] = get_group_acl_data(self.object)
829 830
        context['group_profile_form'] = GroupProfileUpdate.get_form_object(
            self.request, self.object.profile)
831 832 833 834 835

        if self.request.user.is_superuser:
            context['group_perm_form'] = GroupPermissionForm(
                instance=self.object)

836 837 838
        return context

    def post(self, request, *args, **kwargs):
839 840 841
        self.object = self.get_object()
        if not self.get_has_level()(request.user, 'operator'):
            raise PermissionDenied()
842

843 844
        if request.POST.get('new_name'):
            return self.__set_name(request)
845
        if request.POST.get('list-new-name'):
846
            return self.__add_user(request)
847
        if request.POST.get('list-new-namelist'):
848
            return self.__add_list(request)
849 850 851 852
        if (request.POST.get('list-new-name') is not None) and \
                (request.POST.get('list-new-namelist') is not None):
            return redirect(reverse_lazy("dashboard.views.group-detail",
                                         kwargs={'pk': self.get_object().pk}))
853 854

    def __add_user(self, request):
855
        name = request.POST['list-new-name']
856 857 858
        self.__add_username(request, name)
        return redirect(reverse_lazy("dashboard.views.group-detail",
                                     kwargs={'pk': self.object.pk}))
859 860

    def __add_username(self, request, name):
861
        if not name:
862
            return
863 864
        try:
            entity = User.objects.get(username=name)
865
            self.object.user_set.add(entity)
866
        except User.DoesNotExist:
867 868 869 870 871
            if saml_available:
                FutureMember.objects.get_or_create(org_id=name,
                                                   group=self.object)
            else:
                warning(request, _('User "%s" not found.') % name)
872

873
    def __add_list(self, request):
874 875
        if not self.get_has_level()(request.user, 'operator'):
            raise PermissionDenied()
876 877 878
        userlist = request.POST.get('list-new-namelist').split('\r\n')
        for line in userlist:
            self.__add_username(request, line)
879 880
        return redirect(reverse_lazy("dashboard.views.group-detail",
                                     kwargs={'pk': self.object.pk}))
881 882 883 884 885 886

    def __set_name(self, request):
        new_name = request.POST.get("new_name")
        Group.objects.filter(pk=self.object.pk).update(
            **{'name': new_name})

887
        success_message = _("Group successfully renamed.")
888 889 890 891
        if request.is_ajax():
            response = {
                'message': success_message,
                'new_name': new_name,
892
                'group_pk': self.object.pk
893 894 895 896 897 898 899 900 901 902 903
            }
            return HttpResponse(
                json.dumps(response),
                content_type="application/json"
            )
        else:
            messages.success(request, success_message)
            return redirect(reverse_lazy("dashboard.views.group-detail",
                                         kwargs={'pk': self.object.pk}))


904 905 906 907 908 909 910
class GroupPermissionsView(SuperuserRequiredMixin, UpdateView):
    model = Group
    form_class = GroupPermissionForm
    slug_field = "pk"
    slug_url_kwarg = "group_pk"

    def get_success_url(self):
911
        return "%s#group-detail-permissions" % (
912 913 914
            self.get_object().groupprofile.get_absolute_url())


915
class AclUpdateView(LoginRequiredMixin, View, SingleObjectMixin):
916

917
    def post(self, request, *args, **kwargs):
918
        instance = self.get_object()
919 920
        if not (instance.has_level(request.user, "owner") or
                getattr(instance, 'owner', None) == request.user):
Őry Máté committed
921 922
            logger.warning('Tried to set permissions of %s by non-owner %s.',
                           unicode(instance), unicode(request.user))
923
            raise PermissionDenied()
924
        self.set_levels(request, instance)
925
        self.remove_levels(request, instance)
926
        self.add_levels(request, instance)
927
        return redirect("%s#access" % instance.get_absolute_url())
928 929

    def set_levels(self, request, instance):
930 931 932
        for key, value in request.POST.items():
            m = re.match('perm-([ug])-(\d+)', key)
            if m:
933 934
                typ, id = m.groups()
                entity = {'u': User, 'g': Group}[typ].objects.get(id=id)
935
                if getattr(instance, "owner", None) == entity:
936 937 938
                    logger.info("Tried to set owner's acl level for %s by %s.",
                                unicode(instance), unicode(request.user))
                    continue
939
                instance.set_level(entity, value)
Őry Máté committed
940 941 942
                logger.info("Set %s's acl level for %s to %s by %s.",
                            unicode(entity), unicode(instance),
                            value, unicode(request.user))
943

944 945 946 947 948 949 950 951 952 953
    def remove_levels(self, request, instance):
        for key, value in request.POST.items():
            if key.startswith("remove"):
                typ = key[7:8]  # len("remove-")
                id = key[9:]  # len("remove-x-")
                entity = {'u': User, 'g': Group}[typ].objects.get(id=id)
                if getattr(instance, "owner", None) == entity:
                    logger.info("Tried to remove owner from %s by %s.",
                                unicode(instance), unicode(request.user))
                    msg = _("The original owner cannot be removed, however "
954
                            "you can transfer ownership.")
955 956 957 958 959 960 961
                    messages.warning(request, msg)
                    continue
                instance.set_level(entity, None)
                logger.info("Revoked %s's access to %s by %s.",
                            unicode(entity), unicode(instance),
                            unicode(request.user))

962
    def add_levels(self, request, instance):
963 964
        name = request.POST['perm-new-name']
        value = request.POST['perm-new']
965 966 967 968 969 970
        if not name:
            return
        try:
            entity = User.objects.get(username=name)
        except User.DoesNotExist:
            entity = None
971 972
            try:
                entity = Group.objects.get(name=name)
973 974 975 976
            except Group.DoesNotExist:
                warning(request, _('User or group "%s" not found.') % name)
                return

977
        instance.set_level(entity, value)
Őry Máté committed
978 979 980
        logger.info("Set %s's new acl level for %s to %s by %s.",
                    unicode(entity), unicode(instance),
                    value, unicode(request.user))
981

Kálmán Viktor committed
982

983 984 985 986 987 988 989 990 991 992
class TemplateAclUpdateView(AclUpdateView):
    model = InstanceTemplate

    def post(self, request, *args, **kwargs):
        template = self.get_object()
        if not (template.has_level(request.user, "owner") or
                getattr(template, 'owner', None) == request.user):
            logger.warning('Tried to set permissions of %s by non-owner %s.',
                           unicode(template), unicode(request.user))
            raise PermissionDenied()
993 994 995 996 997 998 999 1000 1001

        name = request.POST['perm-new-name']
        if (User.objects.filter(username=name).count() +
                Group.objects.filter(name=name).count() < 1
                and len(name) > 0):
            warning(request, _('User or group "%s" not found.') % name)
        else:
            self.set_levels(request, template)
            self.add_levels(request, template)
1002
            self.remove_levels(request, template)
1003 1004 1005 1006 1007

            post_for_disk = request.POST.copy()
            post_for_disk['perm-new'] = 'user'
            request.POST = post_for_disk
            for d in template.disks.all():
1008
                self.set_levels(request, d)
1009
                self.add_levels(request, d)
1010
                self.remove_levels(request, d)
1011

1012
        return redirect(template)
1013 1014


1015 1016 1017 1018 1019 1020 1021 1022 1023 1024
class GroupAclUpdateView(AclUpdateView):
    model = Group

    def post(self, request, *args, **kwargs):
        instance = self.get_object().profile
        if not (instance.has_level(request.user, "owner") or
                getattr(instance, 'owner', None) == request.user):
            logger.warning('Tried to set permissions of %s by non-owner %s.',
                           unicode(instance), unicode(request.user))
            raise PermissionDenied()
Kálmán Viktor committed
1025 1026 1027

        self.set_levels(request, instance)
        self.add_levels(request, instance)
1028 1029 1030 1031
        return redirect(reverse("dashboard.views.group-detail",
                                kwargs=self.kwargs))


1032
class TemplateChoose(LoginRequiredMixin, TemplateView):
1033 1034 1035 1036 1037 1038 1039 1040 1041

    def get_template_names(self):
        if self.request.is_ajax():
            return ['dashboard/modal-wrapper.html']
        else:
            return ['dashboard/nojs-wrapper.html']

    def get_context_data(self, *args, **kwargs):
        context = super(TemplateChoose, self).get_context_data(*args, **kwargs)
1042
        templates = InstanceTemplate.get_objects_with_level("user",
1043 1044 1045 1046
                                                            self.request.user)
        context.update({
            'box_title': _('Choose template'),
            'ajax_title': False,
1047
            'template': "dashboard/_template-choose.html",
1048
            'templates': templates.all(),
1049 1050 1051
        })
        return context

1052 1053 1054 1055 1056 1057 1058
    def post(self, request, *args, **kwargs):
        if not request.user.has_perm('vm.create_template'):
            raise PermissionDenied()

        template = request.POST.get("parent")
        if template == "base_vm":
            return redirect(reverse("dashboard.views.template-create"))
1059
        elif template is None:
1060
            messages.warning(request, _("Select an option to proceed."))
1061
            return redirect(reverse("dashboard.views.template-choose"))
1062 1063 1064
        else:
            template = get_object_or_404(InstanceTemplate, pk=template)

1065
        if not template.has_level(request.user, "user"):
1066 1067
            raise PermissionDenied()

1068 1069 1070 1071 1072
        instance = Instance.create_from_template(
            template=template, owner=request.user, is_base=True)

        return redirect(instance.get_absolute_url())

1073

1074 1075 1076 1077
class TemplateCreate(SuccessMessageMixin, CreateView):
    model = InstanceTemplate
    form_class = TemplateForm

1078 1079
    def get_template_names(self):
        if self.request.is_ajax():
1080
            pass
1081 1082 1083 1084 1085 1086 1087
        else:
            return ['dashboard/nojs-wrapper.html']

    def get_context_data(self, *args, **kwargs):
        context = super(TemplateCreate, self).get_context_data(*args, **kwargs)

        context.update({
1088
            'box_title': _("Create a new base VM"),
1089
            'template': "dashboard/_template-create.html",
1090
            'leases': Lease.objects.count()
1091 1092 1093
        })
        return context

1094
    def get(self, *args, **kwargs):
1095
        if not self.request.user.has_perm('vm.create_base_template'):
1096
            raise PermissionDenied()
1097

1098 1099 1100 1101
        return super(TemplateCreate, self).get(*args, **kwargs)

    def get_form_kwargs(self):
        kwargs = super(TemplateCreate, self).get_form_kwargs()
1102
        kwargs['user'] = self.request.user
1103 1104
        return kwargs

1105
    def post(self, request, *args, **kwargs):
1106
        if not self.request.user.has_perm('vm.create_base_template'):
1107
            raise PermissionDenied()
1108 1109

        form = self.form_class(request.POST, user=request.user)
1110 1111
        if not form.is_valid():
            return self.get(request, form, *args, **kwargs)
1112
        else:
1113
            post = form.cleaned_data
1114 1115
            networks = self.__create_networks(post.pop("networks"),
                                              request.user)
1116
            post.pop("parent")
1117
            post['max_ram_size'] = post['ram_size']
1118 1119 1120 1121 1122 1123 1124
            req_traits = post.pop("req_traits")
            tags = post.pop("tags")
            post['pw'] = User.objects.make_random_password()
            post['is_base'] = True
            inst = Instance.create(params=post, disks=[],
                                   networks=networks,
                                   tags=tags, req_traits=req_traits)
1125

1126
            return redirect("%s#resources" % inst.get_absolute_url())
1127

1128
    def __create_networks(self, vlans, user):
1129 1130
        networks = []
        for v in vlans:
1131 1132
            if not v.has_level(user, "user"):
                raise PermissionDenied()
1133 1134 1135
            networks.append(InterfaceTemplate(vlan=v, managed=v.managed))
        return networks

1136 1137 1138 1139
    def get_success_url(self):
        return reverse_lazy("dashboard.views.template-list")


1140
class TemplateDetail(LoginRequiredMixin, SuccessMessageMixin, UpdateView):
1141
    model = InstanceTemplate
1142 1143
    template_name = "dashboard/template-edit.html"
    form_class = TemplateForm
1144
    success_message = _("Successfully modified template.")