views.py 117 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
# Copyright 2014 Budapest University of Technology and Economics (BME IK)
#
# This file is part of CIRCLE Cloud.
#
# CIRCLE is free software: you can redistribute it and/or modify it under
# the terms of the GNU General Public License as published by the Free
# Software Foundation, either version 3 of the License, or (at your option)
# any later version.
#
# CIRCLE is distributed in the hope that it will be useful, but WITHOUT ANY
# WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
# FOR A PARTICULAR PURPOSE.  See the GNU General Public License for more
# details.
#
# You should have received a copy of the GNU General Public License along
# with CIRCLE.  If not, see <http://www.gnu.org/licenses/>.

18
from __future__ import unicode_literals, absolute_import
19

20
from collections import OrderedDict
21
from itertools import chain
22
from os import getenv
23
from os.path import join, normpath, dirname, basename
24
from urlparse import urljoin
25
import json
Őry Máté committed
26
import logging
27
import re
28
import requests
29

30
from django.conf import settings
31
from django.contrib.auth.models import User, Group
Őry Máté committed
32
from django.contrib.auth.views import login, redirect_to_login
33
from django.contrib.auth.decorators import login_required
34
from django.contrib.messages.views import SuccessMessageMixin
35
from django.core.exceptions import (
36
    PermissionDenied, SuspiciousOperation,
37
)
Kálmán Viktor committed
38
from django.core.cache import get_cache
39 40
from django.core import signing
from django.core.urlresolvers import reverse, reverse_lazy
41
from django.db.models import Count, Q
42
from django.http import HttpResponse, HttpResponseRedirect, Http404
43 44 45
from django.shortcuts import (
    redirect, render, get_object_or_404, render_to_response,
)
46
from django.views.decorators.http import require_GET, require_POST
47
from django.views.generic.detail import SingleObjectMixin
48
from django.views.generic import (TemplateView, DetailView, View, DeleteView,
49
                                  UpdateView, CreateView, ListView)
50
from django.contrib import messages
51 52 53
from django.utils.translation import (
    ugettext as _, ugettext_noop, ungettext_lazy
)
54
from django.template.loader import render_to_string
55
from django.template import RequestContext
56

57
from django.forms.models import inlineformset_factory
58
from django_tables2 import SingleTableView
59 60
from braces.views import (LoginRequiredMixin, SuperuserRequiredMixin,
                          PermissionRequiredMixin)
61
from braces.views._access import AccessMixin
62
from celery.exceptions import TimeoutError
Kálmán Viktor committed
63

64 65
from django_sshkey.models import UserKey

66
from .forms import (
67
    CircleAuthenticationForm, HostForm, LeaseForm, MyProfileForm,
68
    NodeForm, TemplateForm, TraitForm, VmCustomizeForm, GroupCreateForm,
69
    UserCreationForm, GroupProfileUpdateForm, UnsubscribeForm,
70
    VmSaveForm, UserKeyForm, VmRenewForm,
71
    CirclePasswordChangeForm, VmCreateDiskForm, VmDownloadDiskForm,
72 73
    TraitsForm, RawDataForm, GroupPermissionForm, AclUserAddForm,
    VmAddInterfaceForm,
74
)
75 76 77

from .tables import (
    NodeListTable, NodeVmListTable, TemplateListTable, LeaseListTable,
78
    GroupListTable, UserKeyListTable
79
)
80
from common.models import HumanReadableObject, HumanReadableException
Őry Máté committed
81 82 83 84
from vm.models import (
    Instance, instance_activity, InstanceActivity, InstanceTemplate, Interface,
    InterfaceTemplate, Lease, Node, NodeActivity, Trait,
)
85
from storage.models import Disk
86
from firewall.models import Vlan, Host, Rule
87
from .models import Favourite, Profile, GroupProfile, FutureMember
88

89
from .store_api import Store, NoStoreException, NotOkException
Kálmán Viktor committed
90

Őry Máté committed
91
logger = logging.getLogger(__name__)
92
saml_available = hasattr(settings, "SAML_CONFIG")
93

94

95 96 97 98
def search_user(keyword):
    try:
        return User.objects.get(username=keyword)
    except User.DoesNotExist:
99 100 101 102
        try:
            return User.objects.get(profile__org_id=keyword)
        except User.DoesNotExist:
            return User.objects.get(email=keyword)
103 104


105 106 107 108 109 110 111 112 113 114 115 116 117
class RedirectToLoginMixin(AccessMixin):

    redirect_exception_classes = (PermissionDenied, )

    def dispatch(self, request, *args, **kwargs):
        try:
            return super(RedirectToLoginMixin, self).dispatch(
                request, *args, **kwargs)
        except self.redirect_exception_classes:
            if not request.user.is_authenticated():
                return redirect_to_login(request.get_full_path(),
                                         self.get_login_url(),
                                         self.get_redirect_field_name())
118 119
            else:
                raise
120 121


122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144
class GroupCodeMixin(object):

    @classmethod
    def get_available_group_codes(cls, request):
        newgroups = []
        if saml_available:
            from djangosaml2.cache import StateCache, IdentityCache
            from djangosaml2.conf import get_config
            from djangosaml2.views import _get_subject_id
            from saml2.client import Saml2Client

            state = StateCache(request.session)
            conf = get_config(None, request)
            client = Saml2Client(conf, state_cache=state,
                                 identity_cache=IdentityCache(request.session),
                                 logger=logger)
            subject_id = _get_subject_id(request.session)
            identity = client.users.get_identity(subject_id,
                                                 check_not_on_or_after=False)
            if identity:
                attributes = identity[0]
                owneratrs = getattr(
                    settings, 'SAML_GROUP_OWNER_ATTRIBUTES', [])
145 146
                for group in chain(*[attributes[i]
                                     for i in owneratrs if i in attributes]):
147 148 149 150 151 152 153 154
                    try:
                        GroupProfile.search(group)
                    except Group.DoesNotExist:
                        newgroups.append(group)

        return newgroups


155
class FilterMixin(object):
156

157 158 159 160
    def get_queryset_filters(self):
        filters = {}
        for item in self.allowed_filters:
            if item in self.request.GET:
161 162 163 164 165
                filters[self.allowed_filters[item]] = (
                    self.request.GET[item].split(",")
                    if self.allowed_filters[item].endswith("__in") else
                    self.request.GET[item])

166
        return filters
167

168 169 170
    def get_queryset(self):
        return super(FilterMixin,
                     self).get_queryset().filter(**self.get_queryset_filters())
171 172


173
class IndexView(LoginRequiredMixin, TemplateView):
Kálmán Viktor committed
174
    template_name = "dashboard/index.html"
175

176
    def get_context_data(self, **kwargs):
177
        user = self.request.user
178
        context = super(IndexView, self).get_context_data(**kwargs)
179

180
        # instances
181
        favs = Instance.objects.filter(favourite__user=self.request.user)
182
        instances = Instance.get_objects_with_level(
183
            'user', user, disregard_superuser=True).filter(destroyed_at=None)
184 185 186
        display = list(favs) + list(set(instances) - set(favs))
        for d in display:
            d.fav = True if d in favs else False
187
        context.update({
188
            'instances': display[:5],
189
            'more_instances': instances.count() - len(instances[:5])
190 191
        })

192 193
        running = instances.filter(status='RUNNING')
        stopped = instances.exclude(status__in=('RUNNING', 'NOSTATE'))
194

195
        context.update({
196 197 198
            'running_vms': running[:20],
            'running_vm_num': running.count(),
            'stopped_vm_num': stopped.count()
199
        })
200

201 202 203 204
        # nodes
        if user.is_superuser:
            nodes = Node.objects.all()
            context.update({
205 206
                'nodes': nodes[:5],
                'more_nodes': nodes.count() - len(nodes[:5]),
207 208 209 210 211 212 213 214 215 216
                'sum_node_num': nodes.count(),
                'node_num': {
                    'running': Node.get_state_count(True, True),
                    'missing': Node.get_state_count(False, True),
                    'disabled': Node.get_state_count(True, False),
                    'offline': Node.get_state_count(False, False)
                }
            })

        # groups
217
        if user.has_module_perms('auth'):
218 219
            profiles = GroupProfile.get_objects_with_level('operator', user)
            groups = Group.objects.filter(groupprofile__in=profiles)
220 221 222 223
            context.update({
                'groups': groups[:5],
                'more_groups': groups.count() - len(groups[:5]),
            })
224 225 226 227 228 229

        # template
        if user.has_perm('vm.create_template'):
            context['templates'] = InstanceTemplate.get_objects_with_level(
                'operator', user).all()[:5]

Kálmán Viktor committed
230
        # toplist
231
        if settings.STORE_URL:
232
            cache_key = "files-%d" % self.request.user.pk
233
            cache = get_cache("default")
234 235
            files = cache.get(cache_key)
            if not files:
236
                try:
237 238 239 240
                    store = Store(self.request.user)
                    toplist = store.toplist()
                    quota = store.get_quota()
                    files = {'toplist': toplist, 'quota': quota}
241 242 243
                except Exception:
                    logger.exception("Unable to get tolist for %s",
                                     unicode(self.request.user))
244 245
                    files = {'toplist': []}
                cache.set(cache_key, files, 300)
Kálmán Viktor committed
246

247
            context['files'] = files
248 249
        else:
            context['no_store'] = True
Kálmán Viktor committed
250

251 252
        return context

253

254
class CheckedDetailView(LoginRequiredMixin, DetailView):
255 256
    read_level = 'user'

257 258 259
    def get_has_level(self):
        return self.object.has_level

260 261
    def get_context_data(self, **kwargs):
        context = super(CheckedDetailView, self).get_context_data(**kwargs)
262
        if not self.get_has_level()(self.request.user, self.read_level):
263 264 265 266
            raise PermissionDenied()
        return context


267 268 269 270 271 272 273 274
class VmDetailVncTokenView(CheckedDetailView):
    template_name = "dashboard/vm-detail.html"
    model = Instance

    def get(self, request, **kwargs):
        self.object = self.get_object()
        if not self.object.has_level(request.user, 'operator'):
            raise PermissionDenied()
275 276
        if not request.user.has_perm('vm.access_console'):
            raise PermissionDenied()
277
        if self.object.node:
278 279 280 281
            with instance_activity(
                    code_suffix='console-accessed', instance=self.object,
                    user=request.user, readable_name=ugettext_noop(
                        "console access"), concurrency_check=False):
282 283 284 285 286
                port = self.object.vnc_port
                host = str(self.object.node.host.ipv4)
                value = signing.dumps({'host': host, 'port': port},
                                      key=getenv("PROXY_SECRET", 'asdasd')),
                return HttpResponse('vnc/?d=%s' % value)
287 288 289 290
        else:
            raise Http404()


291
class VmDetailView(CheckedDetailView):
Kálmán Viktor committed
292
    template_name = "dashboard/vm-detail.html"
293
    model = Instance
294 295

    def get_context_data(self, **kwargs):
296
        context = super(VmDetailView, self).get_context_data(**kwargs)
297
        instance = context['instance']
298
        ops = get_operations(instance, self.request.user)
299
        context.update({
Bach Dániel committed
300
            'graphite_enabled': settings.GRAPHITE_URL is not None,
301
            'vnc_url': reverse_lazy("dashboard.views.detail-vnc",
302
                                    kwargs={'pk': self.object.pk}),
303 304
            'ops': ops,
            'op': {i.op: i for i in ops},
305
        })
306 307

        # activity data
308 309 310 311 312
        activities = instance.get_merged_activities(self.request.user)
        show_show_all = len(activities) > 10
        activities = activities[:10]
        context['activities'] = activities
        context['show_show_all'] = show_show_all
313

314
        context['vlans'] = Vlan.get_objects_with_level(
315
            'user', self.request.user
316
        ).exclude(  # exclude already added interfaces
317 318 319
            pk__in=Interface.objects.filter(
                instance=self.get_object()).values_list("vlan", flat=True)
        ).all()
320 321
        context['acl'] = AclUpdateView.get_acl_data(
            instance, self.request.user, 'dashboard.views.vm-acl')
322
        context['aclform'] = AclUserAddForm()
323 324
        context['os_type_icon'] = instance.os_type.replace("unknown",
                                                           "question")
325 326 327
        # ipv6 infos
        context['ipv6_host'] = instance.get_connect_host(use_ipv6=True)
        context['ipv6_port'] = instance.get_connect_port(use_ipv6=True)
328 329 330 331 332

        # resources forms
        if self.request.user.is_superuser:
            context['traits_form'] = TraitsForm(instance=instance)
            context['raw_data_form'] = RawDataForm(instance=instance)
333

334 335 336
        # resources change perm
        context['can_change_resources'] = self.request.user.has_perm(
            "vm.change_resources")
337

338
        return context
Kálmán Viktor committed
339

340
    def post(self, request, *args, **kwargs):
341 342
        options = {
            'new_name': self.__set_name,
343
            'new_description': self.__set_description,
344 345
            'new_tag': self.__add_tag,
            'to_remove': self.__remove_tag,
346
            'port': self.__add_port,
347
            'abort_operation': self.__abort_operation,
348 349 350 351
        }
        for k, v in options.iteritems():
            if request.POST.get(k) is not None:
                return v(request)
352 353 354
        raise Http404()

        raise Http404()
355

356 357
    def __set_name(self, request):
        self.object = self.get_object()
358 359
        if not self.object.has_level(request.user, 'owner'):
            raise PermissionDenied()
360 361 362 363
        new_name = request.POST.get("new_name")
        Instance.objects.filter(pk=self.object.pk).update(
            **{'name': new_name})

364
        success_message = _("VM successfully renamed.")
365 366 367 368 369 370 371 372 373 374 375 376
        if request.is_ajax():
            response = {
                'message': success_message,
                'new_name': new_name,
                'vm_pk': self.object.pk
            }
            return HttpResponse(
                json.dumps(response),
                content_type="application/json"
            )
        else:
            messages.success(request, success_message)
377 378 379 380 381 382 383 384 385 386 387
            return redirect(self.object.get_absolute_url())

    def __set_description(self, request):
        self.object = self.get_object()
        if not self.object.has_level(request.user, 'owner'):
            raise PermissionDenied()

        new_description = request.POST.get("new_description")
        Instance.objects.filter(pk=self.object.pk).update(
            **{'description': new_description})

388
        success_message = _("VM description successfully updated.")
389 390 391 392 393 394 395 396 397 398 399 400
        if request.is_ajax():
            response = {
                'message': success_message,
                'new_description': new_description,
            }
            return HttpResponse(
                json.dumps(response),
                content_type="application/json"
            )
        else:
            messages.success(request, success_message)
            return redirect(self.object.get_absolute_url())
401

Kálmán Viktor committed
402 403 404
    def __add_tag(self, request):
        new_tag = request.POST.get('new_tag')
        self.object = self.get_object()
405 406
        if not self.object.has_level(request.user, 'owner'):
            raise PermissionDenied()
Kálmán Viktor committed
407 408

        if len(new_tag) < 1:
409
            message = u"Please input something."
Kálmán Viktor committed
410
        elif len(new_tag) > 20:
411
            message = u"Tag name is too long."
Kálmán Viktor committed
412 413 414 415 416 417 418 419 420 421 422 423 424 425 426
        else:
            self.object.tags.add(new_tag)

        try:
            messages.error(request, message)
        except:
            pass

        return redirect(reverse_lazy("dashboard.views.detail",
                                     kwargs={'pk': self.object.pk}))

    def __remove_tag(self, request):
        try:
            to_remove = request.POST.get('to_remove')
            self.object = self.get_object()
427 428
            if not self.object.has_level(request.user, 'owner'):
                raise PermissionDenied()
Kálmán Viktor committed
429 430 431 432 433 434 435 436 437 438 439

            self.object.tags.remove(to_remove)
            message = u"Success"
        except:  # note this won't really happen
            message = u"Not success"

        if request.is_ajax():
            return HttpResponse(
                json.dumps({'message': message}),
                content_type="application=json"
            )
440 441 442
        else:
            return redirect(reverse_lazy("dashboard.views.detail",
                            kwargs={'pk': self.object.pk}))
Kálmán Viktor committed
443

444 445
    def __add_port(self, request):
        object = self.get_object()
446 447
        if (not object.has_level(request.user, 'owner') or
                not request.user.has_perm('vm.config_ports')):
448
            raise PermissionDenied()
449 450 451 452 453 454

        port = request.POST.get("port")
        proto = request.POST.get("proto")

        try:
            error = None
455 456 457
            interfaces = object.interface_set.all()
            host = Host.objects.get(pk=request.POST.get("host_pk"),
                                    interface__in=interfaces)
458
            host.add_port(proto, private=port)
459 460 461 462 463
        except Host.DoesNotExist:
            logger.error('Tried to add port to nonexistent host %d. User: %s. '
                         'Instance: %s', request.POST.get("host_pk"),
                         unicode(request.user), object)
            raise PermissionDenied()
464
        except ValueError:
465
            error = _("There is a problem with your input.")
466
        except Exception as e:
Bach Dániel committed
467 468
            error = _("Unknown error.")
            logger.error(e)
469 470 471 472 473 474 475 476 477

        if request.is_ajax():
            pass
        else:
            if error:
                messages.error(request, error)
            return redirect(reverse_lazy("dashboard.views.detail",
                                         kwargs={'pk': self.get_object().pk}))

478
    def __abort_operation(self, request):
Kálmán Viktor committed
479 480 481 482
        self.object = self.get_object()

        activity = get_object_or_404(InstanceActivity,
                                     pk=request.POST.get("activity"))
483 484
        if not activity.is_abortable_for(request.user):
            raise PermissionDenied()
Kálmán Viktor committed
485 486 487
        activity.abort()
        return redirect("%s#activity" % self.object.get_absolute_url())

488

489
class VmTraitsUpdate(SuperuserRequiredMixin, UpdateView):
490 491 492 493 494 495 496
    form_class = TraitsForm
    model = Instance

    def get_success_url(self):
        return self.get_object().get_absolute_url() + "#resources"


497
class VmRawDataUpdate(SuperuserRequiredMixin, UpdateView):
498 499
    form_class = RawDataForm
    model = Instance
500
    template_name = 'dashboard/vm-detail/raw_data.html'
501 502 503 504 505

    def get_success_url(self):
        return self.get_object().get_absolute_url() + "#resources"


506
class OperationView(RedirectToLoginMixin, DetailView):
507

508
    template_name = 'dashboard/operate.html'
509
    show_in_toolbar = True
510
    effect = None
511
    wait_for_result = None
512

513 514 515
    @property
    def name(self):
        return self.get_op().name
516

517 518 519
    @property
    def description(self):
        return self.get_op().description
520

521 522 523
    def is_preferred(self):
        return self.get_op().is_preferred()

524 525 526
    @classmethod
    def get_urlname(cls):
        return 'dashboard.vm.op.%s' % cls.op
527

528 529 530 531 532 533 534 535 536 537
    @classmethod
    def get_instance_url(cls, pk, key=None, *args, **kwargs):
        url = reverse(cls.get_urlname(), args=(pk, ) + args, kwargs=kwargs)
        if key is None:
            return url
        else:
            return "%s?k=%s" % (url, key)

    def get_url(self, **kwargs):
        return self.get_instance_url(self.get_object().pk, **kwargs)
538

539
    def get_template_names(self):
540
        if self.request.is_ajax():
541
            return ['dashboard/_modal.html']
542
        else:
543
            return ['dashboard/_base.html']
544

545 546 547
    @classmethod
    def get_op_by_object(cls, obj):
        return getattr(obj, cls.op)
548

549 550 551 552
    def get_op(self):
        if not hasattr(self, '_opobj'):
            setattr(self, '_opobj', getattr(self.get_object(), self.op))
        return self._opobj
553

554
    def get_context_data(self, **kwargs):
555
        ctx = super(OperationView, self).get_context_data(**kwargs)
556
        ctx['op'] = self.get_op()
557
        ctx['opview'] = self
558 559 560 561
        url = self.request.path
        if self.request.GET:
            url += '?' + self.request.GET.urlencode()
        ctx['url'] = url
562
        ctx['template'] = super(OperationView, self).get_template_names()[0]
563
        return ctx
564

565 566 567 568
    def check_auth(self):
        logger.debug("OperationView.check_auth(%s)", unicode(self))
        self.get_op().check_auth(self.request.user)

569
    def get(self, request, *args, **kwargs):
570
        self.check_auth()
571
        return super(OperationView, self).get(request, *args, **kwargs)
572

573
    def get_response_data(self, result, done, extra=None, **kwargs):
574 575 576 577 578 579
        """Return serializable data to return to agents requesting json
        response to POST"""

        if extra is None:
            extra = {}
        extra["success"] = not isinstance(result, Exception)
580 581 582
        extra["done"] = done
        if isinstance(result, HumanReadableObject):
            extra["message"] = result.get_user_text()
583 584
        return extra

585
    def post(self, request, extra=None, *args, **kwargs):
586
        self.check_auth()
587
        self.object = self.get_object()
588 589
        if extra is None:
            extra = {}
590
        result = None
591
        done = False
592
        try:
593
            task = self.get_op().async(user=request.user, **extra)
594 595 596 597
        except HumanReadableException as e:
            e.send_message(request)
            logger.exception("Could not start operation")
            result = e
598 599
        except Exception as e:
            messages.error(request, _('Could not start operation.'))
600
            logger.exception("Could not start operation")
601
            result = e
602
        else:
603 604 605 606 607 608 609 610
            wait = self.wait_for_result
            if wait:
                try:
                    result = task.get(timeout=wait,
                                      interval=min((wait / 5, .5)))
                except TimeoutError:
                    logger.debug("Result didn't arrive in %ss",
                                 self.wait_for_result, exc_info=True)
611 612 613 614
                except HumanReadableException as e:
                    e.send_message(request)
                    logger.exception(e)
                    result = e
615 616 617 618 619
                except Exception as e:
                    messages.error(request, _('Operation failed.'))
                    logger.debug("Operation failed.", exc_info=True)
                    result = e
                else:
620
                    done = True
621
                    messages.success(request, _('Operation succeeded.'))
622
            if result is None and not done:
623
                messages.success(request, _('Operation is started.'))
624 625

        if "/json" in request.META.get("HTTP_ACCEPT", ""):
626 627
            data = self.get_response_data(result, done,
                                          post_extra=extra, **kwargs)
628 629 630 631
            return HttpResponse(json.dumps(data),
                                content_type="application/json")
        else:
            return redirect("%s#activity" % self.object.get_absolute_url())
632

633
    @classmethod
634 635
    def factory(cls, op, icon='cog', effect='info', extra_bases=(), **kwargs):
        kwargs.update({'op': op, 'icon': icon, 'effect': effect})
636
        return type(str(cls.__name__ + op),
637
                    tuple(list(extra_bases) + [cls]), kwargs)
638

639
    @classmethod
640
    def bind_to_object(cls, instance, **kwargs):
641 642
        me = cls()
        me.get_object = lambda: instance
643
        for key, value in kwargs.iteritems():
644 645
            setattr(me, key, value)
        return me
646 647


648
class AjaxOperationMixin(object):
649

650
    def post(self, request, extra=None, *args, **kwargs):
651 652
        resp = super(AjaxOperationMixin, self).post(
            request, extra, *args, **kwargs)
653 654 655 656
        if request.is_ajax():
            store = messages.get_messages(request)
            store.used = True
            return HttpResponse(
657
                json.dumps({'success': True,
658
                            'with_reload': getattr(self, 'with_reload', False),
659 660 661 662 663 664
                            'messages': [unicode(m) for m in store]}),
                content_type="application=json"
            )
        else:
            return resp

665

666 667 668 669 670 671
class VmOperationView(AjaxOperationMixin, OperationView):

    model = Instance
    context_object_name = 'instance'  # much simpler to mock object


672 673 674 675
class FormOperationMixin(object):

    form_class = None

676 677 678
    def get_form_kwargs(self):
        return {}

679 680 681
    def get_context_data(self, **kwargs):
        ctx = super(FormOperationMixin, self).get_context_data(**kwargs)
        if self.request.method == 'POST':
682 683
            ctx['form'] = self.form_class(self.request.POST,
                                          **self.get_form_kwargs())
684
        else:
685
            ctx['form'] = self.form_class(**self.get_form_kwargs())
686 687 688 689 690
        return ctx

    def post(self, request, extra=None, *args, **kwargs):
        if extra is None:
            extra = {}
691
        form = self.form_class(self.request.POST, **self.get_form_kwargs())
692 693
        if form.is_valid():
            extra.update(form.cleaned_data)
694
            resp = super(FormOperationMixin, self).post(
695
                request, extra, *args, **kwargs)
696 697
            if request.is_ajax():
                return HttpResponse(
698 699 700
                    json.dumps({
                        'success': True,
                        'with_reload': getattr(self, 'with_reload', False)}),
701 702 703 704
                    content_type="application=json"
                )
            else:
                return resp
705 706 707 708
        else:
            return self.get(request)


709 710 711 712 713 714 715 716
class RequestFormOperationMixin(FormOperationMixin):

    def get_form_kwargs(self):
        val = super(FormOperationMixin, self).get_form_kwargs()
        val.update({'request': self.request})
        return val


717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735
class VmAddInterfaceView(FormOperationMixin, VmOperationView):

    op = 'add_interface'
    form_class = VmAddInterfaceForm
    show_in_toolbar = False
    icon = 'globe'
    effect = 'success'
    with_reload = True

    def get_form_kwargs(self):
        inst = self.get_op().instance
        choices = Vlan.get_objects_with_level(
            "user", self.request.user).exclude(
            vm_interface__instance__in=[inst])
        val = super(VmAddInterfaceView, self).get_form_kwargs()
        val.update({'choices': choices})
        return val


736 737 738 739 740
class VmCreateDiskView(FormOperationMixin, VmOperationView):

    op = 'create_disk'
    form_class = VmCreateDiskForm
    show_in_toolbar = False
741
    icon = 'hdd-o'
742
    effect = "success"
743
    is_disk_operation = True
744 745 746 747 748 749 750 751


class VmDownloadDiskView(FormOperationMixin, VmOperationView):

    op = 'download_disk'
    form_class = VmDownloadDiskForm
    show_in_toolbar = False
    icon = 'download'
752
    effect = "success"
753
    is_disk_operation = True
754 755


756 757 758 759
class VmMigrateView(VmOperationView):

    op = 'migrate'
    icon = 'truck'
760
    effect = 'info'
761 762 763
    template_name = 'dashboard/_vm-migrate.html'

    def get_context_data(self, **kwargs):
764
        ctx = super(VmMigrateView, self).get_context_data(**kwargs)
765 766 767 768 769
        ctx['nodes'] = [n for n in Node.objects.filter(enabled=True)
                        if n.state == "ONLINE"]
        return ctx

    def post(self, request, extra=None, *args, **kwargs):
770 771
        if extra is None:
            extra = {}
772 773 774 775 776 777 778
        node = self.request.POST.get("node")
        if node:
            node = get_object_or_404(Node, pk=node)
            extra["to_node"] = node
        return super(VmMigrateView, self).post(request, extra, *args, **kwargs)


779
class VmSaveView(FormOperationMixin, VmOperationView):
780 781 782

    op = 'save_as_template'
    icon = 'save'
783
    effect = 'info'
784
    form_class = VmSaveForm
785

786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808

class VmResourcesChangeView(VmOperationView):
    op = 'resources_change'
    icon = "save"
    show_in_toolbar = False

    def post(self, request, extra=None, *args, **kwargs):
        if extra is None:
            extra = {}

        resources = {
            'num_cores': "cpu-count",
            'priority': "cpu-priority",
            'ram_size': "ram-size",
            "max_ram_size": "ram-size",  # TODO
        }
        for k, v in resources.iteritems():
            extra[k] = request.POST.get(v)

        return super(VmResourcesChangeView, self).post(request, extra,
                                                       *args, **kwargs)


809 810 811 812 813 814
class TokenOperationView(OperationView):
    """Abstract operation view with token support.

    User can do the action with a valid token instead of logging in.
    """
    token_max_age = 3 * 24 * 3600
815
    redirect_exception_classes = (PermissionDenied, SuspiciousOperation, )
816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849

    @classmethod
    def get_salt(cls):
        return unicode(cls)

    @classmethod
    def get_token(cls, instance, user):
        t = tuple([getattr(i, 'pk', i) for i in [instance, user]])
        return signing.dumps(t, salt=cls.get_salt(), compress=True)

    @classmethod
    def get_token_url(cls, instance, user):
        key = cls.get_token(instance, user)
        return cls.get_instance_url(instance.pk, key)

    def check_auth(self):
        if 'k' in self.request.GET:
            try:  # check if token is needed at all
                return super(TokenOperationView, self).check_auth()
            except Exception:
                op = self.get_op()
                pk = op.instance.pk
                key = self.request.GET.get('k')

                logger.debug("checking token supplied to %s",
                             self.request.get_full_path())
                try:
                    user = self.validate_key(pk, key)
                except signing.SignatureExpired:
                    messages.error(self.request, _('The token has expired.'))
                else:
                    logger.info("Request user changed to %s at %s",
                                user, self.request.get_full_path())
                    self.request.user = user
850
                    self.request.token_user = True
851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885
        else:
            logger.debug("no token supplied to %s",
                         self.request.get_full_path())

        return super(TokenOperationView, self).check_auth()

    def validate_key(self, pk, key):
        """Get object based on signed token.
        """
        try:
            data = signing.loads(key, salt=self.get_salt())
            logger.debug('Token data: %s', unicode(data))
            instance, user = data
            logger.debug('Extracted token data: instance: %s, user: %s',
                         unicode(instance), unicode(user))
        except (signing.BadSignature, ValueError, TypeError) as e:
            logger.warning('Tried invalid token. Token: %s, user: %s. %s',
                           key, unicode(self.request.user), unicode(e))
            raise SuspiciousOperation()

        try:
            instance, user = signing.loads(key, max_age=self.token_max_age,
                                           salt=self.get_salt())
            logger.debug('Extracted non-expired token data: %s, %s',
                         unicode(instance), unicode(user))
        except signing.BadSignature as e:
            raise signing.SignatureExpired()

        if pk != instance:
            logger.debug('pk (%d) != instance (%d)', pk, instance)
            raise SuspiciousOperation()
        user = User.objects.get(pk=user)
        return user


886 887
class VmRenewView(FormOperationMixin, TokenOperationView, VmOperationView):

888 889 890 891
    op = 'renew'
    icon = 'calendar'
    effect = 'info'
    show_in_toolbar = False
892
    form_class = VmRenewForm
893
    wait_for_result = 0.5
894 895 896 897 898

    def get_form_kwargs(self):
        choices = Lease.get_objects_with_level("user", self.request.user)
        default = self.get_op().instance.lease
        if default and default not in choices:
899 900
            choices = (choices.distinct() |
                       Lease.objects.filter(pk=default.pk).distinct())
901 902 903 904

        val = super(VmRenewView, self).get_form_kwargs()
        val.update({'choices': choices, 'default': default})
        return val
905

906 907
    def get_response_data(self, result, done, extra=None, **kwargs):
        extra = super(VmRenewView, self).get_response_data(result, done,
908 909 910 911 912
                                                           extra, **kwargs)
        extra["new_suspend_time"] = unicode(self.get_op().
                                            instance.time_of_suspend)
        return extra

913

914 915
vm_ops = OrderedDict([
    ('deploy', VmOperationView.factory(
916
        op='deploy', icon='play', effect='success')),
917
    ('wake_up', VmOperationView.factory(
918
        op='wake_up', icon='sun-o', effect='success')),
919
    ('sleep', VmOperationView.factory(
920
        extra_bases=[TokenOperationView],
921
        op='sleep', icon='moon-o', effect='info')),
922 923 924
    ('migrate', VmMigrateView),
    ('save_as_template', VmSaveView),
    ('reboot', VmOperationView.factory(
925
        op='reboot', icon='refresh', effect='warning')),
926
    ('reset', VmOperationView.factory(
927
        op='reset', icon='bolt', effect='warning')),
928
    ('shutdown', VmOperationView.factory(
929
        op='shutdown', icon='power-off', effect='warning')),
930
    ('shut_off', VmOperationView.factory(
931
        op='shut_off', icon='ban', effect='warning')),
932 933
    ('recover', VmOperationView.factory(
        op='recover', icon='medkit', effect='warning')),
934
    ('nostate', VmOperationView.factory(
935
        op='emergency_change_state', icon='legal', effect='danger')),
936
    ('destroy', VmOperationView.factory(
937
        extra_bases=[TokenOperationView],
938
        op='destroy', icon='times', effect='danger')),
939 940
    ('create_disk', VmCreateDiskView),
    ('download_disk', VmDownloadDiskView),
941
    ('add_interface', VmAddInterfaceView),
942
    ('renew', VmRenewView),
943
    ('resources_change', VmResourcesChangeView),
944 945
    ('password_reset', VmOperationView.factory(
        op='password_reset', icon='unlock', effect='warning',
946
        show_in_toolbar=False, wait_for_result=0.5, with_reload=True)),
947
])
948 949 950 951 952 953 954 955 956


def get_operations(instance, user):
    ops = []
    for k, v in vm_ops.iteritems():
        try:
            op = v.get_op_by_object(instance)
            op.check_auth(user)
            op.check_precond()
957
        except PermissionDenied as e:
958 959
            logger.debug('Not showing operation %s for %s: %s',
                         k, instance, unicode(e))
960 961
        except Exception:
            ops.append(v.bind_to_object(instance, disabled=True))
962 963 964
        else:
            ops.append(v.bind_to_object(instance))
    return ops
965

Kálmán Viktor committed
966

967
class NodeDetailView(LoginRequiredMixin, SuperuserRequiredMixin, DetailView):
968 969
    template_name = "dashboard/node-detail.html"
    model = Node
970 971
    form = None
    form_class = TraitForm
972

973 974 975
    def get_context_data(self, form=None, **kwargs):
        if form is None:
            form = self.form_class()
976
        context = super(NodeDetailView, self).get_context_data(**kwargs)
977 978
        instances = Instance.active.filter(node=self.object)
        context['table'] = NodeVmListTable(instances)
979 980 981 982
        na = NodeActivity.objects.filter(
            node=self.object, parent=None
        ).order_by('-started').select_related()
        context['activities'] = na
983
        context['trait_form'] = form
984
        context['graphite_enabled'] = (
Bach Dániel committed
985
            settings.GRAPHITE_URL is not None)
986 987
        return context

988 989 990
    def post(self, request, *args, **kwargs):
        if request.POST.get('new_name'):
            return self.__set_name(request)
991 992
        if request.POST.get('to_remove'):
            return self.__remove_trait(request)
993 994
        return redirect(reverse_lazy("dashboard.views.node-detail",
                                     kwargs={'pk': self.get_object().pk}))
995 996 997 998 999 1000 1001

    def __set_name(self, request):
        self.object = self.get_object()
        new_name = request.POST.get("new_name")
        Node.objects.filter(pk=self.object.pk).update(
            **{'name': new_name})

1002
        success_message = _("Node successfully renamed.")
1003 1004 1005 1006 1007
        if request.is_ajax():
            response = {
                'message': success_message,
                'new_name': new_name,
                'node_pk': self.object.pk
1008 1009 1010 1011 1012 1013 1014 1015 1016 1017
            }
            return HttpResponse(
                json.dumps(response),
                content_type="application/json"
            )
        else:
            messages.success(request, success_message)
            return redirect(reverse_lazy("dashboard.views.node-detail",
                                         kwargs={'pk': self.object.pk}))

1018 1019 1020 1021
    def __remove_trait(self, request):
        try:
            to_remove = request.POST.get('to_remove')
            self.object = self.get_object()
1022
            self.object.traits.remove(to_remove)
1023 1024 1025 1026 1027 1028 1029
            message = u"Success"
        except:  # note this won't really happen
            message = u"Not success"

        if request.is_ajax():
            return HttpResponse(
                json.dumps({'message': message}),
1030
                content_type="application/json"
1031
            )
1032
        else:
1033
            return redirect(self.object.get_absolute_url())
1034

1035

1036
class GroupDetailView(CheckedDetailView):
1037 1038
    template_name = "dashboard/group-detail.html"
    model = Group
1039
    read_level = 'operator'
1040 1041 1042

    def get_has_level(self):
        return self.object.profile.has_level
1043 1044 1045

    def get_context_data(self, **kwargs):
        context = super(GroupDetailView, self).get_context_data(**kwargs)
1046 1047
        context['group'] = self.object
        context['users'] = self.object.user_set.all()
1048 1049
        context['future_users'] = FutureMember.objects.filter(
            group=self.object)
1050 1051 1052
        context['acl'] = AclUpdateView.get_acl_data(
            self.object.profile, self.request.user,
            'dashboard.views.group-acl')
1053
        context['aclform'] = AclUserAddForm()
1054 1055
        context['group_profile_form'] = GroupProfileUpdate.get_form_object(
            self.request, self.object.profile)
1056 1057 1058 1059 1060

        if self.request.user.is_superuser:
            context['group_perm_form'] = GroupPermissionForm(
                instance=self.object)

1061 1062 1063
        return context

    def post(self, request, *args, **kwargs):
1064 1065 1066
        self.object = self.get_object()
        if not self.get_has_level()(request.user, 'operator'):
            raise PermissionDenied()
1067

1068 1069
        if request.POST.get('new_name'):
            return self.__set_name(request)
1070
        if request.POST.get('list-new-name'):
1071
            return self.__add_user(request)
1072
        if request.POST.get('list-new-namelist'):
1073
            return self.__add_list(request)
1074 1075 1076 1077
        if (request.POST.get('list-new-name') is not None) and \
                (request.POST.get('list-new-namelist') is not None):
            return redirect(reverse_lazy("dashboard.views.group-detail",
                                         kwargs={'pk': self.get_object().pk}))
1078 1079

    def __add_user(self, request):
1080
        name = request.POST['list-new-name']
1081 1082 1083
        self.__add_username(request, name)
        return redirect(reverse_lazy("dashboard.views.group-detail",
                                     kwargs={'pk': self.object.pk}))
1084 1085

    def __add_username(self, request, name):
1086
        if not name:
1087
            return
1088
        try:
1089
            entity = search_user(name)
1090
            self.object.user_set.add(entity)
1091
        except User.DoesNotExist:
1092 1093 1094 1095
            if saml_available:
                FutureMember.objects.get_or_create(org_id=name,
                                                   group=self.object)
            else:
1096
                messages.warning(request, _('User "%s" not found.') % name)
1097

1098
    def __add_list(self, request):
1099 1100
        if not self.get_has_level()(request.user, 'operator'):
            raise PermissionDenied()
1101 1102 1103
        userlist = request.POST.get('list-new-namelist').split('\r\n')
        for line in userlist:
            self.__add_username(request, line)
1104 1105
        return redirect(reverse_lazy("dashboard.views.group-detail",
                                     kwargs={'pk': self.object.pk}))
1106 1107 1108 1109 1110 1111

    def __set_name(self, request):
        new_name = request.POST.get("new_name")
        Group.objects.filter(pk=self.object.pk).update(
            **{'name': new_name})

1112
        success_message = _("Group successfully renamed.")
1113 1114 1115 1116
        if request.is_ajax():
            response = {
                'message': success_message,
                'new_name': new_name,
1117
                'group_pk': self.object.pk
1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128
            }
            return HttpResponse(
                json.dumps(response),
                content_type="application/json"
            )
        else:
            messages.success(request, success_message)
            return redirect(reverse_lazy("dashboard.views.group-detail",
                                         kwargs={'pk': self.object.pk}))


1129 1130 1131 1132 1133 1134 1135
class GroupPermissionsView(SuperuserRequiredMixin, UpdateView):
    model = Group
    form_class = GroupPermissionForm
    slug_field = "pk"
    slug_url_kwarg = "group_pk"

    def get_success_url(self):
1136
        return "%s#group-detail-permissions" % (
1137 1138 1139
            self.get_object().groupprofile.get_absolute_url())


1140
class AclUpdateView(LoginRequiredMixin, View, SingleObjectMixin):
1141 1142 1143 1144 1145 1146 1147 1148 1149 1150 1151 1152 1153 1154 1155
    def send_success_message(self, whom, old_level, new_level):
        if old_level and new_level:
            msg = _("Acl user/group %(w)s successfully modified.")
        elif not old_level and new_level:
            msg = _("Acl user/group %(w)s successfully added.")
        elif old_level and not new_level:
            msg = _("Acl user/group %(w)s successfully removed.")
        if msg:
            messages.success(self.request, msg % {'w': whom})

    def get_level(self, whom):
        for u, level in self.acl_data:
            if u == whom:
                return level
        return None
1156

1157 1158 1159
    @classmethod
    def get_acl_data(cls, obj, user, url):
        levels = obj.ACL_LEVELS
1160 1161
        allowed_levels = list(l for l in OrderedDict(levels)
                              if cls.has_next_level(user, obj, l))
1162 1163
        is_owner = 'owner' in allowed_levels

1164 1165
        allowed_users = cls.get_allowed_users(user)
        allowed_groups = cls.get_allowed_groups(user)
1166 1167 1168 1169 1170 1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181 1182