views.py 103 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
# Copyright 2014 Budapest University of Technology and Economics (BME IK)
#
# This file is part of CIRCLE Cloud.
#
# CIRCLE is free software: you can redistribute it and/or modify it under
# the terms of the GNU General Public License as published by the Free
# Software Foundation, either version 3 of the License, or (at your option)
# any later version.
#
# CIRCLE is distributed in the hope that it will be useful, but WITHOUT ANY
# WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
# FOR A PARTICULAR PURPOSE.  See the GNU General Public License for more
# details.
#
# You should have received a copy of the GNU General Public License along
# with CIRCLE.  If not, see <http://www.gnu.org/licenses/>.

18
from __future__ import unicode_literals, absolute_import
19

20
from itertools import chain
21 22
from os import getenv
import json
Őry Máté committed
23
import logging
24
import re
25
from hashlib import md5
26
import requests
27

28
from django.conf import settings
29
from django.contrib.auth.models import User, Group
Őry Máté committed
30
from django.contrib.auth.views import login, redirect_to_login
31
from django.contrib.messages import warning
32
from django.contrib.messages.views import SuccessMessageMixin
33
from django.core.exceptions import (
34
    PermissionDenied, SuspiciousOperation,
35
)
36 37
from django.core import signing
from django.core.urlresolvers import reverse, reverse_lazy
38
from django.db.models import Count
39
from django.http import HttpResponse, HttpResponseRedirect, Http404
Őry Máté committed
40
from django.shortcuts import redirect, render, get_object_or_404
41
from django.views.decorators.http import require_GET, require_POST
42
from django.views.generic.detail import SingleObjectMixin
43
from django.views.generic import (TemplateView, DetailView, View, DeleteView,
44
                                  UpdateView, CreateView, ListView)
45 46
from django.contrib import messages
from django.utils.translation import ugettext as _
47
from django.utils.translation import ungettext as __
48
from django.template.loader import render_to_string
49
from django.template import RequestContext
50
from django.templatetags.static import static
51

52
from django.forms.models import inlineformset_factory
53
from django_tables2 import SingleTableView
54 55
from braces.views import (LoginRequiredMixin, SuperuserRequiredMixin,
                          PermissionRequiredMixin)
56
from braces.views._access import AccessMixin
Kálmán Viktor committed
57

58
from .forms import (
59
    CircleAuthenticationForm, HostForm, LeaseForm, MyProfileForm,
60
    NodeForm, TemplateForm, TraitForm, VmCustomizeForm, GroupCreateForm,
61
    UserCreationForm, GroupProfileUpdateForm, UnsubscribeForm,
62 63
    VmSaveForm,
    CirclePasswordChangeForm, VmCreateDiskForm, VmDownloadDiskForm,
64
)
65 66 67 68

from .tables import (
    NodeListTable, NodeVmListTable, TemplateListTable, LeaseListTable,
    GroupListTable,
69
)
Őry Máté committed
70 71 72 73
from vm.models import (
    Instance, instance_activity, InstanceActivity, InstanceTemplate, Interface,
    InterfaceTemplate, Lease, Node, NodeActivity, Trait,
)
74
from storage.models import Disk
75
from firewall.models import Vlan, Host, Rule
76
from .models import Favourite, Profile, GroupProfile
77

Őry Máté committed
78
logger = logging.getLogger(__name__)
79
saml_available = hasattr(settings, "SAML_CONFIG")
80

81

82 83 84 85
def search_user(keyword):
    try:
        return User.objects.get(username=keyword)
    except User.DoesNotExist:
86 87 88 89
        try:
            return User.objects.get(profile__org_id=keyword)
        except User.DoesNotExist:
            return User.objects.get(email=keyword)
90 91


92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114
class GroupCodeMixin(object):

    @classmethod
    def get_available_group_codes(cls, request):
        newgroups = []
        if saml_available:
            from djangosaml2.cache import StateCache, IdentityCache
            from djangosaml2.conf import get_config
            from djangosaml2.views import _get_subject_id
            from saml2.client import Saml2Client

            state = StateCache(request.session)
            conf = get_config(None, request)
            client = Saml2Client(conf, state_cache=state,
                                 identity_cache=IdentityCache(request.session),
                                 logger=logger)
            subject_id = _get_subject_id(request.session)
            identity = client.users.get_identity(subject_id,
                                                 check_not_on_or_after=False)
            if identity:
                attributes = identity[0]
                owneratrs = getattr(
                    settings, 'SAML_GROUP_OWNER_ATTRIBUTES', [])
115 116
                for group in chain(*[attributes[i]
                                     for i in owneratrs if i in attributes]):
117 118 119 120 121 122 123 124
                    try:
                        GroupProfile.search(group)
                    except Group.DoesNotExist:
                        newgroups.append(group)

        return newgroups


125
class FilterMixin(object):
126

127 128 129 130 131 132
    def get_queryset_filters(self):
        filters = {}
        for item in self.allowed_filters:
            if item in self.request.GET:
                filters[self.allowed_filters[item]] = self.request.GET[item]
        return filters
133

134 135 136
    def get_queryset(self):
        return super(FilterMixin,
                     self).get_queryset().filter(**self.get_queryset_filters())
137 138


139
class IndexView(LoginRequiredMixin, TemplateView):
Kálmán Viktor committed
140
    template_name = "dashboard/index.html"
141

142
    def get_context_data(self, **kwargs):
143
        user = self.request.user
144
        context = super(IndexView, self).get_context_data(**kwargs)
145

146
        # instances
147
        favs = Instance.objects.filter(favourite__user=self.request.user)
148
        instances = Instance.get_objects_with_level(
149
            'user', user, disregard_superuser=True).filter(destroyed_at=None)
150 151 152
        display = list(favs) + list(set(instances) - set(favs))
        for d in display:
            d.fav = True if d in favs else False
153
        context.update({
154
            'instances': display[:5],
155
            'more_instances': instances.count() - len(instances[:5])
156 157
        })

158 159
        running = instances.filter(status='RUNNING')
        stopped = instances.exclude(status__in=('RUNNING', 'NOSTATE'))
160

161
        context.update({
162 163 164
            'running_vms': running[:20],
            'running_vm_num': running.count(),
            'stopped_vm_num': stopped.count()
165
        })
166

167 168 169 170
        # nodes
        if user.is_superuser:
            nodes = Node.objects.all()
            context.update({
171 172
                'nodes': nodes[:5],
                'more_nodes': nodes.count() - len(nodes[:5]),
173 174 175 176 177 178 179 180 181 182
                'sum_node_num': nodes.count(),
                'node_num': {
                    'running': Node.get_state_count(True, True),
                    'missing': Node.get_state_count(False, True),
                    'disabled': Node.get_state_count(True, False),
                    'offline': Node.get_state_count(False, False)
                }
            })

        # groups
183
        if user.has_module_perms('auth'):
184 185
            profiles = GroupProfile.get_objects_with_level('operator', user)
            groups = Group.objects.filter(groupprofile__in=profiles)
186 187 188 189
            context.update({
                'groups': groups[:5],
                'more_groups': groups.count() - len(groups[:5]),
            })
190 191 192 193 194 195

        # template
        if user.has_perm('vm.create_template'):
            context['templates'] = InstanceTemplate.get_objects_with_level(
                'operator', user).all()[:5]

196 197
        return context

198

199
def get_vm_acl_data(obj):
200 201 202 203 204 205 206 207 208
    levels = obj.ACL_LEVELS
    users = obj.get_users_with_level()
    users = [{'user': u, 'level': l} for u, l in users]
    groups = obj.get_groups_with_level()
    groups = [{'group': g, 'level': l} for g, l in groups]
    return {'users': users, 'groups': groups, 'levels': levels,
            'url': reverse('dashboard.views.vm-acl', args=[obj.pk])}


209 210 211 212 213 214 215 216 217 218 219
def get_group_acl_data(obj):
    aclobj = obj.profile
    levels = aclobj.ACL_LEVELS
    users = aclobj.get_users_with_level()
    users = [{'user': u, 'level': l} for u, l in users]
    groups = aclobj.get_groups_with_level()
    groups = [{'group': g, 'level': l} for g, l in groups]
    return {'users': users, 'groups': groups, 'levels': levels,
            'url': reverse('dashboard.views.group-acl', args=[obj.pk])}


220
class CheckedDetailView(LoginRequiredMixin, DetailView):
221 222
    read_level = 'user'

223 224 225
    def get_has_level(self):
        return self.object.has_level

226 227
    def get_context_data(self, **kwargs):
        context = super(CheckedDetailView, self).get_context_data(**kwargs)
228
        if not self.get_has_level()(self.request.user, self.read_level):
229 230 231 232
            raise PermissionDenied()
        return context


233 234 235 236 237 238 239 240 241
class VmDetailVncTokenView(CheckedDetailView):
    template_name = "dashboard/vm-detail.html"
    model = Instance

    def get(self, request, **kwargs):
        self.object = self.get_object()
        if not self.object.has_level(request.user, 'operator'):
            raise PermissionDenied()
        if self.object.node:
242 243 244 245 246 247 248 249
            with instance_activity(code_suffix='console-accessed',
                                   instance=self.object, user=request.user,
                                   concurrency_check=False):
                port = self.object.vnc_port
                host = str(self.object.node.host.ipv4)
                value = signing.dumps({'host': host, 'port': port},
                                      key=getenv("PROXY_SECRET", 'asdasd')),
                return HttpResponse('vnc/?d=%s' % value)
250 251 252 253
        else:
            raise Http404()


254
class VmDetailView(CheckedDetailView):
Kálmán Viktor committed
255
    template_name = "dashboard/vm-detail.html"
256
    model = Instance
257 258

    def get_context_data(self, **kwargs):
259
        context = super(VmDetailView, self).get_context_data(**kwargs)
260
        instance = context['instance']
261
        ops = get_operations(instance, self.request.user)
262 263 264
        context.update({
            'graphite_enabled': VmGraphView.get_graphite_url() is not None,
            'vnc_url': reverse_lazy("dashboard.views.detail-vnc",
265
                                    kwargs={'pk': self.object.pk}),
266 267
            'ops': ops,
            'op': {i.op: i for i in ops},
268
        })
269 270

        # activity data
271
        context['activities'] = self.object.get_activities(self.request.user)
272

273
        context['vlans'] = Vlan.get_objects_with_level(
274
            'user', self.request.user
275
        ).exclude(  # exclude already added interfaces
276 277 278
            pk__in=Interface.objects.filter(
                instance=self.get_object()).values_list("vlan", flat=True)
        ).all()
279
        context['acl'] = get_vm_acl_data(instance)
280 281
        context['os_type_icon'] = instance.os_type.replace("unknown",
                                                           "question")
282 283 284
        # ipv6 infos
        context['ipv6_host'] = instance.get_connect_host(use_ipv6=True)
        context['ipv6_port'] = instance.get_connect_port(use_ipv6=True)
285
        return context
Kálmán Viktor committed
286

287 288 289 290 291
    def post(self, request, *args, **kwargs):
        if (request.POST.get('ram-size') and request.POST.get('cpu-count')
                and request.POST.get('cpu-priority')):
            return self.__set_resources(request)

292 293 294
        options = {
            'change_password': self.__change_password,
            'new_name': self.__set_name,
295
            'new_description': self.__set_description,
296 297
            'new_tag': self.__add_tag,
            'to_remove': self.__remove_tag,
298 299
            'port': self.__add_port,
            'new_network_vlan': self.__new_network,
300
            'abort_operation': self.__abort_operation,
301 302 303 304
        }
        for k, v in options.iteritems():
            if request.POST.get(k) is not None:
                return v(request)
Kálmán Viktor committed
305

306 307 308 309
    def __change_password(self, request):
        self.object = self.get_object()
        if not self.object.has_level(request.user, 'owner'):
            raise PermissionDenied()
Kálmán Viktor committed
310

311
        self.object.change_password(user=request.user)
312
        messages.success(request, _("Password changed."))
313
        if request.is_ajax():
314
            return HttpResponse("Success.")
315 316 317
        else:
            return redirect(reverse_lazy("dashboard.views.detail",
                                         kwargs={'pk': self.object.pk}))
318

319 320 321 322
    def __set_resources(self, request):
        self.object = self.get_object()
        if not self.object.has_level(request.user, 'owner'):
            raise PermissionDenied()
323 324
        if not request.user.has_perm('vm.change_resources'):
            raise PermissionDenied()
325 326 327 328

        resources = {
            'num_cores': request.POST.get('cpu-count'),
            'ram_size': request.POST.get('ram-size'),
329
            'max_ram_size': request.POST.get('ram-size'),  # TODO: max_ram
330 331 332 333
            'priority': request.POST.get('cpu-priority')
        }
        Instance.objects.filter(pk=self.object.pk).update(**resources)

334
        success_message = _("Resources successfully updated.")
335 336 337 338 339 340 341 342 343 344 345
        if request.is_ajax():
            response = {'message': success_message}
            return HttpResponse(
                json.dumps(response),
                content_type="application/json"
            )
        else:
            messages.success(request, success_message)
            return redirect(reverse_lazy("dashboard.views.detail",
                                         kwargs={'pk': self.object.pk}))

346 347
    def __set_name(self, request):
        self.object = self.get_object()
348 349
        if not self.object.has_level(request.user, 'owner'):
            raise PermissionDenied()
350 351 352 353
        new_name = request.POST.get("new_name")
        Instance.objects.filter(pk=self.object.pk).update(
            **{'name': new_name})

354
        success_message = _("VM successfully renamed.")
355 356 357 358 359 360 361 362 363 364 365 366
        if request.is_ajax():
            response = {
                'message': success_message,
                'new_name': new_name,
                'vm_pk': self.object.pk
            }
            return HttpResponse(
                json.dumps(response),
                content_type="application/json"
            )
        else:
            messages.success(request, success_message)
367 368 369 370 371 372 373 374 375 376 377
            return redirect(self.object.get_absolute_url())

    def __set_description(self, request):
        self.object = self.get_object()
        if not self.object.has_level(request.user, 'owner'):
            raise PermissionDenied()

        new_description = request.POST.get("new_description")
        Instance.objects.filter(pk=self.object.pk).update(
            **{'description': new_description})

378
        success_message = _("VM description successfully updated.")
379 380 381 382 383 384 385 386 387 388 389 390
        if request.is_ajax():
            response = {
                'message': success_message,
                'new_description': new_description,
            }
            return HttpResponse(
                json.dumps(response),
                content_type="application/json"
            )
        else:
            messages.success(request, success_message)
            return redirect(self.object.get_absolute_url())
391

Kálmán Viktor committed
392 393 394
    def __add_tag(self, request):
        new_tag = request.POST.get('new_tag')
        self.object = self.get_object()
395 396
        if not self.object.has_level(request.user, 'owner'):
            raise PermissionDenied()
Kálmán Viktor committed
397 398

        if len(new_tag) < 1:
399
            message = u"Please input something."
Kálmán Viktor committed
400
        elif len(new_tag) > 20:
401
            message = u"Tag name is too long."
Kálmán Viktor committed
402 403 404 405 406 407 408 409 410 411 412 413 414 415 416
        else:
            self.object.tags.add(new_tag)

        try:
            messages.error(request, message)
        except:
            pass

        return redirect(reverse_lazy("dashboard.views.detail",
                                     kwargs={'pk': self.object.pk}))

    def __remove_tag(self, request):
        try:
            to_remove = request.POST.get('to_remove')
            self.object = self.get_object()
417 418
            if not self.object.has_level(request.user, 'owner'):
                raise PermissionDenied()
Kálmán Viktor committed
419 420 421 422 423 424 425 426 427 428 429

            self.object.tags.remove(to_remove)
            message = u"Success"
        except:  # note this won't really happen
            message = u"Not success"

        if request.is_ajax():
            return HttpResponse(
                json.dumps({'message': message}),
                content_type="application=json"
            )
430 431 432
        else:
            return redirect(reverse_lazy("dashboard.views.detail",
                            kwargs={'pk': self.object.pk}))
Kálmán Viktor committed
433

434 435
    def __add_port(self, request):
        object = self.get_object()
436 437
        if (not object.has_level(request.user, 'owner') or
                not request.user.has_perm('vm.config_ports')):
438
            raise PermissionDenied()
439 440 441 442 443 444

        port = request.POST.get("port")
        proto = request.POST.get("proto")

        try:
            error = None
445 446 447
            interfaces = object.interface_set.all()
            host = Host.objects.get(pk=request.POST.get("host_pk"),
                                    interface__in=interfaces)
448
            host.add_port(proto, private=port)
449 450 451 452 453
        except Host.DoesNotExist:
            logger.error('Tried to add port to nonexistent host %d. User: %s. '
                         'Instance: %s', request.POST.get("host_pk"),
                         unicode(request.user), object)
            raise PermissionDenied()
454
        except ValueError:
455
            error = _("There is a problem with your input.")
456
        except Exception as e:
Bach Dániel committed
457 458
            error = _("Unknown error.")
            logger.error(e)
459 460 461 462 463 464 465 466 467

        if request.is_ajax():
            pass
        else:
            if error:
                messages.error(request, error)
            return redirect(reverse_lazy("dashboard.views.detail",
                                         kwargs={'pk': self.get_object().pk}))

468 469 470 471 472
    def __new_network(self, request):
        self.object = self.get_object()
        if not self.object.has_level(request.user, 'owner'):
            raise PermissionDenied()

473
        vlan = get_object_or_404(Vlan, pk=request.POST.get("new_network_vlan"))
474 475
        if not vlan.has_level(request.user, 'user'):
            raise PermissionDenied()
476
        try:
477
            self.object.add_interface(vlan=vlan, user=request.user)
478
            messages.success(request, _("Successfully added new interface."))
479 480 481 482 483 484 485
        except Exception, e:
            error = u' '.join(e.messages)
            messages.error(request, error)

        return redirect("%s#network" % reverse_lazy(
            "dashboard.views.detail", kwargs={'pk': self.object.pk}))

486
    def __abort_operation(self, request):
Kálmán Viktor committed
487 488 489 490
        self.object = self.get_object()

        activity = get_object_or_404(InstanceActivity,
                                     pk=request.POST.get("activity"))
491 492
        if not activity.is_abortable_for(request.user):
            raise PermissionDenied()
Kálmán Viktor committed
493 494 495
        activity.abort()
        return redirect("%s#activity" % self.object.get_absolute_url())

496

497
class OperationView(DetailView):
498

499
    template_name = 'dashboard/operate.html'
500
    show_in_toolbar = True
501

502 503 504
    @property
    def name(self):
        return self.get_op().name
505

506 507 508
    @property
    def description(self):
        return self.get_op().description
509

510 511 512
    @classmethod
    def get_urlname(cls):
        return 'dashboard.vm.op.%s' % cls.op
513

514 515
    def get_url(self):
        return reverse(self.get_urlname(), args=(self.get_object().pk, ))
516

517 518 519 520 521
    def get_wrapper_template_name(self):
        if self.request.is_ajax():
            return 'dashboard/_modal.html'
        else:
            return 'dashboard/_base.html'
522

523 524 525
    @classmethod
    def get_op_by_object(cls, obj):
        return getattr(obj, cls.op)
526

527 528 529 530
    def get_op(self):
        if not hasattr(self, '_opobj'):
            setattr(self, '_opobj', getattr(self.get_object(), self.op))
        return self._opobj
531

532
    def get_context_data(self, **kwargs):
533
        ctx = super(OperationView, self).get_context_data(**kwargs)
534 535 536
        ctx['op'] = self.get_op()
        ctx['url'] = self.request.path
        return ctx
537

538 539 540 541 542 543 544
    def get(self, request, *args, **kwargs):
        self.get_op().check_auth(request.user)
        response = super(OperationView, self).get(request, *args, **kwargs)
        response.render()
        response.content = render_to_string(self.get_wrapper_template_name(),
                                            {'body': response.content})
        return response
545

546
    def post(self, request, extra=None, *args, **kwargs):
547
        self.object = self.get_object()
548 549
        if extra is None:
            extra = {}
550
        try:
551
            self.get_op().async(user=request.user, **extra)
552 553 554
        except Exception as e:
            messages.error(request, _('Could not start operation.'))
            logger.error(e)
555
        return redirect("%s#activity" % self.object.get_absolute_url())
556

557 558 559 560
    @classmethod
    def factory(cls, op, icon='cog'):
        return type(str(cls.__name__ + op),
                    (cls, ), {'op': op, 'icon': icon})
561

562 563 564 565 566 567 568 569 570 571
    @classmethod
    def bind_to_object(cls, instance):
        v = cls()
        v.get_object = lambda: instance
        return v


class VmOperationView(OperationView):

    model = Instance
572
    context_object_name = 'instance'  # much simpler to mock object
573

574

575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598
class FormOperationMixin(object):

    form_class = None

    def get_context_data(self, **kwargs):
        ctx = super(FormOperationMixin, self).get_context_data(**kwargs)
        if self.request.method == 'POST':
            ctx['form'] = self.form_class(self.request.POST)
        else:
            ctx['form'] = self.form_class()
        return ctx

    def post(self, request, extra=None, *args, **kwargs):
        if extra is None:
            extra = {}
        form = self.form_class(self.request.POST)
        if form.is_valid():
            extra.update(form.cleaned_data)
            return super(FormOperationMixin, self).post(
                request, extra, *args, **kwargs)
        else:
            return self.get(request)


599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614
class VmCreateDiskView(FormOperationMixin, VmOperationView):

    op = 'create_disk'
    form_class = VmCreateDiskForm
    show_in_toolbar = False
    icon = 'hdd'


class VmDownloadDiskView(FormOperationMixin, VmOperationView):

    op = 'download_disk'
    form_class = VmDownloadDiskForm
    show_in_toolbar = False
    icon = 'download'


615 616 617 618 619 620 621
class VmMigrateView(VmOperationView):

    op = 'migrate'
    icon = 'truck'
    template_name = 'dashboard/_vm-migrate.html'

    def get_context_data(self, **kwargs):
622
        ctx = super(VmMigrateView, self).get_context_data(**kwargs)
623 624 625 626 627
        ctx['nodes'] = [n for n in Node.objects.filter(enabled=True)
                        if n.state == "ONLINE"]
        return ctx

    def post(self, request, extra=None, *args, **kwargs):
628 629
        if extra is None:
            extra = {}
630 631 632 633 634 635 636
        node = self.request.POST.get("node")
        if node:
            node = get_object_or_404(Node, pk=node)
            extra["to_node"] = node
        return super(VmMigrateView, self).post(request, extra, *args, **kwargs)


637
class VmSaveView(FormOperationMixin, VmOperationView):
638 639 640

    op = 'save_as_template'
    icon = 'save'
641
    form_class = VmSaveForm
642

643 644 645
vm_ops = {
    'reset': VmOperationView.factory(op='reset', icon='bolt'),
    'deploy': VmOperationView.factory(op='deploy', icon='play'),
646
    'migrate': VmMigrateView,
647 648 649
    'reboot': VmOperationView.factory(op='reboot', icon='refresh'),
    'shut_off': VmOperationView.factory(op='shut_off', icon='ban-circle'),
    'shutdown': VmOperationView.factory(op='shutdown', icon='off'),
650
    'save_as_template': VmSaveView,
651 652 653
    'destroy': VmOperationView.factory(op='destroy', icon='remove'),
    'sleep': VmOperationView.factory(op='sleep', icon='moon'),
    'wake_up': VmOperationView.factory(op='wake_up', icon='sun'),
654 655
    'create_disk': VmCreateDiskView,
    'download_disk': VmDownloadDiskView,
656 657 658 659 660 661 662 663 664 665
}


def get_operations(instance, user):
    ops = []
    for k, v in vm_ops.iteritems():
        try:
            op = v.get_op_by_object(instance)
            op.check_auth(user)
            op.check_precond()
666 667 668
        except Exception as e:
            logger.debug('Not showing operation %s for %s: %s',
                         k, instance, unicode(e))
669 670 671
        else:
            ops.append(v.bind_to_object(instance))
    return ops
672

Kálmán Viktor committed
673

674
class NodeDetailView(LoginRequiredMixin, SuperuserRequiredMixin, DetailView):
675 676
    template_name = "dashboard/node-detail.html"
    model = Node
677 678
    form = None
    form_class = TraitForm
679

680 681 682
    def get_context_data(self, form=None, **kwargs):
        if form is None:
            form = self.form_class()
683
        context = super(NodeDetailView, self).get_context_data(**kwargs)
684 685
        instances = Instance.active.filter(node=self.object)
        context['table'] = NodeVmListTable(instances)
686 687 688 689
        na = NodeActivity.objects.filter(
            node=self.object, parent=None
        ).order_by('-started').select_related()
        context['activities'] = na
690
        context['trait_form'] = form
691 692
        context['graphite_enabled'] = (
            NodeGraphView.get_graphite_url() is not None)
693 694
        return context

695 696 697
    def post(self, request, *args, **kwargs):
        if request.POST.get('new_name'):
            return self.__set_name(request)
698 699
        if request.POST.get('to_remove'):
            return self.__remove_trait(request)
700 701
        return redirect(reverse_lazy("dashboard.views.node-detail",
                                     kwargs={'pk': self.get_object().pk}))
702 703 704 705 706 707 708

    def __set_name(self, request):
        self.object = self.get_object()
        new_name = request.POST.get("new_name")
        Node.objects.filter(pk=self.object.pk).update(
            **{'name': new_name})

709
        success_message = _("Node successfully renamed.")
710 711 712 713 714
        if request.is_ajax():
            response = {
                'message': success_message,
                'new_name': new_name,
                'node_pk': self.object.pk
715 716 717 718 719 720 721 722 723 724
            }
            return HttpResponse(
                json.dumps(response),
                content_type="application/json"
            )
        else:
            messages.success(request, success_message)
            return redirect(reverse_lazy("dashboard.views.node-detail",
                                         kwargs={'pk': self.object.pk}))

725 726 727 728
    def __remove_trait(self, request):
        try:
            to_remove = request.POST.get('to_remove')
            self.object = self.get_object()
729
            self.object.traits.remove(to_remove)
730 731 732 733 734 735 736
            message = u"Success"
        except:  # note this won't really happen
            message = u"Not success"

        if request.is_ajax():
            return HttpResponse(
                json.dumps({'message': message}),
737
                content_type="application/json"
738
            )
739
        else:
740
            return redirect(self.object.get_absolute_url())
741

742

743
class GroupDetailView(CheckedDetailView):
744 745
    template_name = "dashboard/group-detail.html"
    model = Group
746
    read_level = 'operator'
747 748 749

    def get_has_level(self):
        return self.object.profile.has_level
750 751 752

    def get_context_data(self, **kwargs):
        context = super(GroupDetailView, self).get_context_data(**kwargs)
753 754 755
        context['group'] = self.object
        context['users'] = self.object.user_set.all()
        context['acl'] = get_group_acl_data(self.object)
756 757
        context['group_profile_form'] = GroupProfileUpdate.get_form_object(
            self.request, self.object.profile)
758 759 760
        return context

    def post(self, request, *args, **kwargs):
761 762 763
        self.object = self.get_object()
        if not self.get_has_level()(request.user, 'operator'):
            raise PermissionDenied()
764 765
        if request.POST.get('new_name'):
            return self.__set_name(request)
766
        if request.POST.get('list-new-name'):
767
            return self.__add_user(request)
768
        if request.POST.get('list-new-namelist'):
769
            return self.__add_list(request)
770 771 772 773
        if (request.POST.get('list-new-name') is not None) and \
                (request.POST.get('list-new-namelist') is not None):
            return redirect(reverse_lazy("dashboard.views.group-detail",
                                         kwargs={'pk': self.get_object().pk}))
774 775

    def __add_user(self, request):
776
        name = request.POST['list-new-name']
777 778 779
        self.__add_username(request, name)
        return redirect(reverse_lazy("dashboard.views.group-detail",
                                     kwargs={'pk': self.object.pk}))
780 781

    def __add_username(self, request, name):
782
        if not name:
783
            return
784 785
        try:
            entity = User.objects.get(username=name)
786
            self.object.user_set.add(entity)
787 788
        except User.DoesNotExist:
            warning(request, _('User "%s" not found.') % name)
789

790
    def __add_list(self, request):
791 792
        if not self.get_has_level()(request.user, 'operator'):
            raise PermissionDenied()
793 794 795
        userlist = request.POST.get('list-new-namelist').split('\r\n')
        for line in userlist:
            self.__add_username(request, line)
796 797
        return redirect(reverse_lazy("dashboard.views.group-detail",
                                     kwargs={'pk': self.object.pk}))
798 799 800 801 802 803

    def __set_name(self, request):
        new_name = request.POST.get("new_name")
        Group.objects.filter(pk=self.object.pk).update(
            **{'name': new_name})

804
        success_message = _("Group successfully renamed.")
805 806 807 808
        if request.is_ajax():
            response = {
                'message': success_message,
                'new_name': new_name,
809
                'group_pk': self.object.pk
810 811 812 813 814 815 816 817 818 819 820
            }
            return HttpResponse(
                json.dumps(response),
                content_type="application/json"
            )
        else:
            messages.success(request, success_message)
            return redirect(reverse_lazy("dashboard.views.group-detail",
                                         kwargs={'pk': self.object.pk}))


821
class AclUpdateView(LoginRequiredMixin, View, SingleObjectMixin):
822

823
    def post(self, request, *args, **kwargs):
824
        instance = self.get_object()
825 826
        if not (instance.has_level(request.user, "owner") or
                getattr(instance, 'owner', None) == request.user):
Őry Máté committed
827 828
            logger.warning('Tried to set permissions of %s by non-owner %s.',
                           unicode(instance), unicode(request.user))
829
            raise PermissionDenied()
830
        self.set_levels(request, instance)
831
        self.remove_levels(request, instance)
832
        self.add_levels(request, instance)
833
        return redirect("%s#access" % instance.get_absolute_url())
834 835

    def set_levels(self, request, instance):
836 837 838
        for key, value in request.POST.items():
            m = re.match('perm-([ug])-(\d+)', key)
            if m:
839 840
                typ, id = m.groups()
                entity = {'u': User, 'g': Group}[typ].objects.get(id=id)
841
                if getattr(instance, "owner", None) == entity:
842 843 844
                    logger.info("Tried to set owner's acl level for %s by %s.",
                                unicode(instance), unicode(request.user))
                    continue
845
                instance.set_level(entity, value)
Őry Máté committed
846 847 848
                logger.info("Set %s's acl level for %s to %s by %s.",
                            unicode(entity), unicode(instance),
                            value, unicode(request.user))
849

850 851 852 853 854 855 856 857 858 859
    def remove_levels(self, request, instance):
        for key, value in request.POST.items():
            if key.startswith("remove"):
                typ = key[7:8]  # len("remove-")
                id = key[9:]  # len("remove-x-")
                entity = {'u': User, 'g': Group}[typ].objects.get(id=id)
                if getattr(instance, "owner", None) == entity:
                    logger.info("Tried to remove owner from %s by %s.",
                                unicode(instance), unicode(request.user))
                    msg = _("The original owner cannot be removed, however "
860
                            "you can transfer ownership.")
861 862 863 864 865 866 867
                    messages.warning(request, msg)
                    continue
                instance.set_level(entity, None)
                logger.info("Revoked %s's access to %s by %s.",
                            unicode(entity), unicode(instance),
                            unicode(request.user))

868
    def add_levels(self, request, instance):
869 870
        name = request.POST['perm-new-name']
        value = request.POST['perm-new']
871 872 873 874 875 876
        if not name:
            return
        try:
            entity = User.objects.get(username=name)
        except User.DoesNotExist:
            entity = None
877 878
            try:
                entity = Group.objects.get(name=name)
879 880 881 882
            except Group.DoesNotExist:
                warning(request, _('User or group "%s" not found.') % name)
                return

883
        instance.set_level(entity, value)
Őry Máté committed
884 885 886
        logger.info("Set %s's new acl level for %s to %s by %s.",
                    unicode(entity), unicode(instance),
                    value, unicode(request.user))
887

Kálmán Viktor committed
888

889 890 891 892 893 894 895 896 897 898
class TemplateAclUpdateView(AclUpdateView):
    model = InstanceTemplate

    def post(self, request, *args, **kwargs):
        template = self.get_object()
        if not (template.has_level(request.user, "owner") or
                getattr(template, 'owner', None) == request.user):
            logger.warning('Tried to set permissions of %s by non-owner %s.',
                           unicode(template), unicode(request.user))
            raise PermissionDenied()
899 900 901 902 903 904 905 906 907

        name = request.POST['perm-new-name']
        if (User.objects.filter(username=name).count() +
                Group.objects.filter(name=name).count() < 1
                and len(name) > 0):
            warning(request, _('User or group "%s" not found.') % name)
        else:
            self.set_levels(request, template)
            self.add_levels(request, template)
908
            self.remove_levels(request, template)
909 910 911 912 913 914

            post_for_disk = request.POST.copy()
            post_for_disk['perm-new'] = 'user'
            request.POST = post_for_disk
            for d in template.disks.all():
                self.add_levels(request, d)
915

916
        return redirect(template)
917 918


919 920 921 922 923 924 925 926 927 928
class GroupAclUpdateView(AclUpdateView):
    model = Group

    def post(self, request, *args, **kwargs):
        instance = self.get_object().profile
        if not (instance.has_level(request.user, "owner") or
                getattr(instance, 'owner', None) == request.user):
            logger.warning('Tried to set permissions of %s by non-owner %s.',
                           unicode(instance), unicode(request.user))
            raise PermissionDenied()
Kálmán Viktor committed
929 930 931

        self.set_levels(request, instance)
        self.add_levels(request, instance)
932 933 934 935
        return redirect(reverse("dashboard.views.group-detail",
                                kwargs=self.kwargs))


936 937 938 939 940 941 942 943 944 945
class TemplateChoose(TemplateView):

    def get_template_names(self):
        if self.request.is_ajax():
            return ['dashboard/modal-wrapper.html']
        else:
            return ['dashboard/nojs-wrapper.html']

    def get_context_data(self, *args, **kwargs):
        context = super(TemplateChoose, self).get_context_data(*args, **kwargs)
946
        templates = InstanceTemplate.get_objects_with_level("user",
947 948 949 950
                                                            self.request.user)
        context.update({
            'box_title': _('Choose template'),
            'ajax_title': False,
951
            'template': "dashboard/_template-choose.html",
952
            'templates': templates.all(),
953 954 955
        })
        return context

956 957 958 959 960 961 962
    def post(self, request, *args, **kwargs):
        if not request.user.has_perm('vm.create_template'):
            raise PermissionDenied()

        template = request.POST.get("parent")
        if template == "base_vm":
            return redirect(reverse("dashboard.views.template-create"))
963
        elif template is None:
964
            messages.warning(request, _("Select an option to proceed."))
965
            return redirect(reverse("dashboard.views.template-choose"))
966 967 968 969 970 971 972 973
        else:
            template = get_object_or_404(InstanceTemplate, pk=template)

        instance = Instance.create_from_template(
            template=template, owner=request.user, is_base=True)

        return redirect(instance.get_absolute_url())

974

975 976 977 978
class TemplateCreate(SuccessMessageMixin, CreateView):
    model = InstanceTemplate
    form_class = TemplateForm

979 980
    def get_template_names(self):
        if self.request.is_ajax():
981
            pass
982 983 984 985 986 987 988
        else:
            return ['dashboard/nojs-wrapper.html']

    def get_context_data(self, *args, **kwargs):
        context = super(TemplateCreate, self).get_context_data(*args, **kwargs)

        context.update({
989
            'box_title': _("Create a new base VM"),
990
            'template': "dashboard/_template-create.html",
991
            'leases': Lease.objects.count()
992 993 994
        })
        return context

995
    def get(self, *args, **kwargs):
996 997
        if not self.request.user.has_perm('vm.create_template'):
            raise PermissionDenied()
998

999 1000 1001 1002
        return super(TemplateCreate, self).get(*args, **kwargs)

    def get_form_kwargs(self):
        kwargs = super(TemplateCreate, self).get_form_kwargs()
1003
        kwargs['user'] = self.request.user
1004 1005
        return kwargs

1006 1007 1008
    def post(self, request, *args, **kwargs):
        if not self.request.user.has_perm('vm.create_template'):
            raise PermissionDenied()
1009 1010

        form = self.form_class(request.POST, user=request.user)
1011 1012
        if not form.is_valid():
            return self.get(request, form, *args, **kwargs)
1013
        else:
1014
            post = form.cleaned_data
1015 1016
            networks = self.__create_networks(post.pop("networks"),
                                              request.user)
1017
            post.pop("parent")
1018
            post['max_ram_size'] = post['ram_size']
1019 1020 1021 1022 1023 1024 1025
            req_traits = post.pop("req_traits")
            tags = post.pop("tags")
            post['pw'] = User.objects.make_random_password()
            post['is_base'] = True
            inst = Instance.create(params=post, disks=[],
                                   networks=networks,
                                   tags=tags, req_traits=req_traits)
1026

1027
            return redirect("%s#resources" % inst.get_absolute_url())
1028

1029 1030
        return super(TemplateCreate, self).post(self, request, args, kwargs)

1031
    def __create_networks(self, vlans, user):
1032 1033
        networks = []
        for v in vlans:
1034 1035
            if not v.has_level(user, "user"):
                raise PermissionDenied()
1036 1037 1038
            networks.append(InterfaceTemplate(vlan=v, managed=v.managed))
        return networks

1039 1040 1041 1042
    def get_success_url(self):
        return reverse_lazy("dashboard.views.template-list")


1043
class TemplateDetail(LoginRequiredMixin, SuccessMessageMixin, UpdateView):
1044
    model = InstanceTemplate
1045 1046
    template_name = "dashboard/template-edit.html"
    form_class = TemplateForm
1047
    success_message = _("Successfully modified template.")
1048 1049

    def get(self, request, *args, **kwargs):
1050
        template = self.get_object()
1051
        if not template.has_level(request.user, 'user'):
1052
            raise PermissionDenied()
1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073
        if request.is_ajax():
            template = {
                'num_cores': template.num_cores,
                'ram_size': template.ram_size,
                'priority': template.priority,
                'arch': template.arch,
                'description': template.description,
                'system': template.system,
                'name': template.name,
                'disks': [{'pk': d.pk, 'name': d.name}
                          for d in template.disks.all()],
                'network': [
                    {'vlan_pk': i.vlan.pk, 'vlan': i.vlan.name,
                     'managed': i.managed}
                    for i in InterfaceTemplate.objects.filter(
                        template=self.get_object()).all()
                ]
            }
            return HttpResponse(json.dumps(template),
                                content_type="application/json")
        else:
1074 1075
            return super(TemplateDetail, self).get(request, *args, **kwargs)

1076
    def get_context_data(self, **kwargs):
1077
        obj = self.get_object()
1078
        context = super(TemplateDetail, self).get_context_data(**kwargs)
1079 1080
        context['acl'] = get_vm_acl_data(obj)
        context['disks'] = obj.disks.all()
1081 1082
        return context

1083 1084 1085 1086
    def get_success_url(self):
        return reverse_lazy("dashboard.views.template-detail",
                            kwargs=self.kwargs)

1087 1088 1089 1090 1091 1092 1093
    def post(self, request, *args, **kwargs):
        template = self.get_object()
        if not template.has_level(request.user, 'owner'):
            raise PermissionDenied()
        for disk in self.get_object().disks.all():
            if not disk.has_level(request.user, 'user'):
                raise PermissionDenied()
1094 1095 1096
        for network in self.get_object().interface_set.all():
            if not network.vlan.has_level(request.user, "user"):
                raise PermissionDenied()
1097 1098
        return super(TemplateDetail, self).post(self, request, args, kwargs)

1099 1100 1101 1102 1103
    def get_form_kwargs(self):
        kwargs = super(TemplateDetail, self).get_form_kwargs()
        kwargs['user'] = self.request.user
        return kwargs

1104

1105
class TemplateList(LoginRequiredMixin, SingleTableView):
1106 1107 1108 1109 1110 1111 1112
    template_name = "dashboard/template-list.html"
    model = InstanceTemplate
    table_class = TemplateListTable
    table_pagination = False

    def get_context_data(self, *args, **kwargs):
        context = super(TemplateList, self).get_context_data(*args, **kwargs)
1113 1114
        context['lease_table'] = LeaseListTable(Lease.objects.all(),
                                                request=self.request)
1115
        return context
1116

1117 1118 1119 1120 1121 1122
    def get_queryset(self):
        logger.debug('TemplateList.get_queryset() called. User: %s',
                     unicode(self.request.user))
        return InstanceTemplate.get_objects_with_level(
            'user', self.request.user).all()

1123

1124 1125 1126 1127 1128 1129 1130 1131 1132 1133 1134 1135 1136 1137 1138 1139 1140 1141 1142
class TemplateDelete(LoginRequiredMixin, DeleteView):
    model = InstanceTemplate

    def get_success_url(self):
        return reverse("dashboard.views.template-list")

    def get_template_names(self):
        if self.request.is_ajax():
            return ['dashboard/confirm/ajax-delete.html']
        else:
            return ['dashboard/confirm/base-delete.html']

    def delete(self, request, *args, **kwargs):
        object = self.get_object()
        if not object.has_level(request.user, 'owner'):
            raise PermissionDenied()

        object.delete()
        success_url = self.get_success_url()
1143
        success_message = _("Template successfully deleted.")
1144 1145 1146 1147 1148 1149 1150 1151 1152 1153 1154

        if request.is_ajax():
            return HttpResponse(
                json.dumps({'message': success_message}),
                content_type="application/json",
            )
        else:
            messages.success(request, success_message)
            return HttpResponseRedirect(success_url)


1155
class VmList(LoginRequiredMixin, FilterMixin, ListView):
Kálmán Viktor committed
1156
    template_name = "dashboard/vm-list.html"
1157 1158 1159 1160 1161
    allowed_filters = {
        'name': "name__icontains",
        'node': "node__name__icontains",
        'status': "status__iexact",
        'tags': "tags__name__in",  # note: use it as ?tags[]=a,b
Kálmán Viktor committed
1162
        'owner': "owner__username",
1163
    }
1164

1165 1166
    def get(self, *args, **kwargs):
        if self.request.is_ajax():
1167 1168 1169 1170
            favs = Instance.objects.filter(
                favourite__user=self.request.user).values_list('pk', flat=True)
            instances = Instance.get_objects_with_level(
                'user', self.request.user).filter(
1171
                destroyed_at=None).all()
1172 1173 1174
            instances = [{
                'pk': i.pk,
                'name': i.name,
1175 1176 1177
                'icon': i.get_status_icon(),
                'host': "" if not i.primary_host else i.primary_host.hostname,
                'status': i.get_status_display(),
1178
                'fav': i.pk in favs} for i in instances]
1179
            return HttpResponse(
1180
                json.dumps(list(instances)),  # instances is ValuesQuerySet
1181 1182 1183 1184 1185
                content_type="application/json",
            )
        else:
            return super(VmList, self).get(*args, **kwargs)

1186
    def get_queryset(self):
1187
        logger.debug('VmList.get_queryset() called. User: %s',
1188
                     unicode(self.request.user))
1189
        queryset = Instance.get_objects_with_level(
1190
            'user', self.request.user).filter(destroyed_at=None)
1191

1192
        self.create_fake_get()
1193 1194 1195 1196
        sort = self.request.GET.get("sort")
        # remove "-" that means descending order
        # also check if the column name is valid
        if (sort and
1197
            (sort[1:] if sort[0] == "-" else sort)
1198
                in [i.name for i in Instance._meta.fields] + ["pk"]):
1199
            queryset = queryset.order_by(sort)
1200 1201
        return queryset.filter(**self.get_queryset_filters()
                               ).select_related('owner', 'node')
1202

1203 1204 1205 1206 1207 1208 1209 1210 1211 1212 1213 1214 1215
    def create_fake_get(self):
        """
        Updates the request's GET dict to filter the vm list
        For example: "name:xy node:1" updates the GET dict
                     to resemble this URL ?name=xy&node=1

        "name:xy node:1".split(":") becomes ["name", "xy node", "1"]
        we pop the the first element and use it as the first dict key
        then we iterate over the rest of the list and split by the last
        whitespace, the first part of this list will be the previous key's
        value, then last part of the list will be the next key.
        The final dict looks like this: {'name': xy, 'node':1}
        """
Kálmán Viktor committed
1216 1217 1218
        s = self.request.GET.get("s")
        if s:
            s = s.split(":")
1219
            if len(s) < 2:  # if there is no ':' in the string, filter by name
1220
                got = {'name': s[0]}
Kálmán Viktor committed
1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236
            else:
                latest = s.pop(0)
                got = {'%s' % latest: None}
                for i in s[:-1]:
                    new = i.rsplit(" ", 1)
                    got[latest] = new[0]
                    latest = new[1] if len(new) > 1 else None
                got[latest] = s[-1]

            # generate a new GET request, that is kinda fake
            fake = self.request.GET.copy()
            for k, v in got.iteritems():
                fake["%s%s" % (
                    k, "[]" if len(v.split(",")) > 1 else "")] = v

            self.request.GET = fake
1237

1238

1239
class NodeList(LoginRequiredMixin, SuperuserRequiredMixin, SingleTableView):
1240 1241 1242
    template_name = "dashboard/node-list.html"
    table_class = NodeListTable
    table_pagination = False
1243

1244 1245 1246 1247 1248
    def get(self, *args, **kwargs):
        if self.request.is_ajax():
            nodes = Node.objects.all()
            nodes = [{
                'name': i.name,
1249 1250
                'icon': i.get_status_icon(),
                'url': i.get_absolute_url(),
1251
                'label': i.get_status_label(),
1252
                'status': i.state.lower()} for i in nodes]
1253 1254

            return HttpResponse(
1255
                json.dumps(list(nodes)),
1256 1257 1258 1259 1260
                content_type="application/json",
            )
        else:
            return super(NodeList, self).get(*args, **kwargs)

1261 1262 1263 1264
    def get_queryset(self):
        return Node.objects.annotate(
            number_of_VMs=Count('instance_set')).select_related('host')

Őry Máté committed
1265

1266
class GroupList(LoginRequiredMixin, SingleTableView):
1267 1268 1269 1270 1271
    template_name = "dashboard/group-list.html"
    model = Group
    table_class = GroupListTable
    table_pagination = False

1272 1273 1274 1275 1276
    def get(self, *args, **kwargs):
        if self.request.is_ajax():
            groups = [{
                'url': reverse("dashboard.views.group-detail",
                               kwargs={'pk': i.pk}),
1277
                'name': i.name} for i in self.get_queryset()]
1278 1279 1280 1281 1282 1283
            return HttpResponse(
                json.dumps(list(groups)),
                content_type="application/json",
            )
        else:
            return super(GroupList, self).get(*args, **kwargs)
1284

1285 1286 1287
    def get_queryset(self):
        logger.debug('GroupList.get_queryset() called. User: %s',
                     unicode(self.request.user))
1288 1289 1290
        profiles = GroupProfile.get_objects_with_level(
            'operator', self.request.user)
        groups = Group.objects.filter(groupprofile__in=profiles)
1291 1292 1293 1294
        s = self.request.GET.get("s")
        if s:
            groups = groups.filter(name__icontains=s)
        return groups
1295

1296

1297
class GroupRemoveUserView(CheckedDetailView, DeleteView):
1298 1299 1300
    model = Group
    slug_field = 'pk'
    slug_url_kwarg = 'group_pk'
1301
    read_level = 'operator'
1302

1303 1304 1305
    def get_has_level(self):
        return self.object.profile.has_level

1306 1307 1308
    def get_context_data(self, **kwargs):
        context = super(GroupRemoveUserView, self).get_context_data(**kwargs)
        try:
1309
            context['member'] = User.objects.get(pk=self.member_pk)
1310 1311 1312 1313
        except User.DoesNotExist:
            raise Http404()
        return context

1314 1315 1316 1317 1318
    def get_success_url(self):
        next = self.request.POST.get('next')
        if next:
            return next
        else:
1319 1320
            return reverse_lazy("dashboard.views.group-detail",
                                kwargs={'pk': self.get_object().pk})
1321

1322 1323
    def get(self, request, member_pk, *args, **kwargs):
        self.member_pk = member_pk
1324
        return super(GroupRemoveUserView, self).get(request, *args, **kwargs)
1325 1326 1327

    def get_template_names(self):
        if self.request.is_ajax():
1328
            return ['dashboard/confirm/ajax-remove.html']
1329
        else:
1330
            return ['dashboard/confirm/base-remove.html']
1331

1332
    def remove_member(self, pk):
1333
        container = self.get_object()
1334
        container.user_set.remove(User.objects.get(pk=pk))
1335

1336
    def get_success_message(self):
1337
        return _("Member successfully removed from group.")
1338 1339 1340

    def delete(self, request, *args, **kwargs):
        object = self.get_object()
1341 1342
        if not object.profile.has_level(request.user, 'operator'):
            raise PermissionDenied()
1343
        self.remove_member(kwargs["member_pk"])
1344
        success_url = self.get_success_url()
1345
        success_message = self.get_success_message()
1346 1347 1348 1349 1350 1351 1352 1353 1354 1355
        if request.is_ajax():
            return HttpResponse(
                json.dumps({'message': success_message}),
                content_type="application/json",
            )
        else:
            messages.success(request, success_message)
            return HttpResponseRedirect(success_url)


1356
class GroupRemoveAclUserView(GroupRemoveUserView):
1357

1358
    def remove_member(self, pk):
1359
        container = self.get_object().profile
1360
        container.set_level(User.objects.get(pk=pk), None)
1361 1362

    def get_success_message(self):
1363
        return _("Acl user successfully removed from group.")
1364

1365 1366 1367

class GroupRemoveAclGroupView(GroupRemoveUserView):

1368 1369 1370
    def get_context_data(self, **kwargs):
        context = super(GroupRemoveUserView, self).get_context_data(**kwargs)
        try:
1371
            context['member'] = Group.objects.get(pk=self.member_pk)
1372 1373 1374 1375
        except User.DoesNotExist:
            raise Http404()
        return context

1376 1377 1378 1379 1380
    def remove_member(self, pk):
        container = self.get_object().profile
        container.set_level(Group.objects.get(pk=pk), None)

    def get_success_message(self):
1381
        return _("Acl group successfully removed from group.")
1382 1383


1384
class GroupDelete(CheckedDetailView, DeleteView):
1385 1386 1387 1388 1389

    """This stuff deletes the group.
    """
    model = Group
    template_name = "dashboard/confirm/base-delete.html"
1390 1391 1392 1393
    read_level = 'operator'

    def get_has_level(self):
        return self.object.profile.has_level
1394 1395 1396 1397 1398 1399 1400 1401 1402 1403

    def get_template_names(self):
        if self.request.is_ajax():
            return ['dashboard/confirm/ajax-delete.html']
        else:
            return ['dashboard/confirm/base-delete.html']

    # github.com/django/django/blob/master/django/views/generic/edit.py#L245
    def delete(self, request, *args, **kwargs):
        object = self.get_object()
1404
        if not object.profile.has_level(request.user, 'owner'):
1405
            raise PermissionDenied()
1406 1407
        object.delete()
        success_url = self.get_success_url()
1408
        success_message = _("Group successfully deleted.")
1409 1410 1411 1412 1413 1414 1415 1416 1417 1418 1419 1420 1421 1422 1423 1424 1425 1426 1427 1428

        if request.is_ajax():
            if request.POST.get('redirect').lower() == "true":
                messages.success(request, success_message)
            return HttpResponse(
                json.dumps({'message': success_message}),
                content_type="application/json",
            )
        else:
            messages.success(request, success_message)
            return HttpResponseRedirect(success_url)

    def get_success_url(self):
        next = self.request.POST.get('next')
        if next:
            return next
        else:
            return reverse_lazy('dashboard.index')


1429
class VmCreate(LoginRequiredMixin, TemplateView):
1430

1431
    form_class = VmCustomizeForm
1432 1433
    form = None

1434 1435
    def get_template_names(self):
        if self.request.is_ajax():
1436
            return ['dashboard/modal-wrapper.html']
1437
        else:
1438
            return ['dashboard/nojs-wrapper.html']
1439

1440
    def get(self, request, form=None, *args, **kwargs):
1441 1442 1443
        form_error = form is not None
        template = (form.template.pk if form_error
                    else request.GET.get("template"))
1444 1445
        templates = InstanceTemplate.get_objects_with_level('user',
                                                            request.user)
1446 1447 1448 1449
        if form is None and template:
            form = self.form_class(user=request.user,
                                   template=templates.get(pk=template))

1450
        context = self.get_context_data(**kwargs)
1451 1452 1453 1454 1455 1456 1457 1458 1459 1460 1461 1462 1463 1464 1465
        if template:
            context.update({
                'template': 'dashboard/_vm-create-2.html',
                'box_title': _('Customize VM'),
                'ajax_title': False,
                'vm_create_form': form,
                'template_o': templates.get(pk=template),
            })
        else:
            context.update({
                'template': 'dashboard/_vm-create-1.html',
                'box_title': _('Create a VM'),
                'ajax_title': False,
                'templates': templates.all(),
            })
1466
        return self.render_to_response(context)
1467

1468 1469 1470 1471 1472 1473 1474 1475 1476
    def __create_normal(self, request, *args, **kwargs):
        user = request.user
        template = InstanceTemplate.objects.get(
            pk=request.POST.get("template"))

        # permission check
        if not template.has_level(request.user, 'user'):
            raise PermissionDenied()

1477 1478 1479
        instances = [Instance.create_from_template(
            template=template, owner=user)]
        return self.__deploy(request, instances)
1480 1481 1482 1483 1484 1485 1486 1487 1488

    def __create_customized(self, request, *args, **kwargs):
        user = request.user
        form = self.form_class(
            request.POST, user=request.user,
            template=InstanceTemplate.objects.get(
                pk=request.POST.get("template")
            )
        )
1489 1490 1491 1492
        if not form.is_valid():
            return self.get(request, form, *args, **kwargs)
        post = form.cleaned_data

1493 1494 1495
        template = InstanceTemplate.objects.get(pk=post['template'])
        # permission check
        if not template.has_level(user, 'user'):
1496
            raise PermissionDenied()
1497

1498 1499
        if request.user.has_perm('vm.set_resources'):
            ikwargs = {
1500
                'name': post['name'],
1501 1502 1503 1504
                'num_cores': post['cpu_count'],
                'ram_size': post['ram_size'],
                'priority': post['cpu_priority'],
            }
1505 1506
            networks = [InterfaceTemplate(vlan=l, managed=l.managed)
                        for l in post['networks']]
1507
            disks = post['disks']
1508 1509 1510 1511 1512 1513 1514 1515 1516 1517 1518 1519

            ikwargs.update({
                'template': template,
                'owner': user,
                'networks': networks,
                'disks': disks,
            })

            amount = post['amount']
            instances = Instance.mass_create_from_template(amount=amount,
                                                           **ikwargs)
            return self.__deploy(request, instances)
1520
        else:
1521 1522
            raise PermissionDenied()

1523 1524
    def __deploy(self, request, instances, *args, **kwargs):
        for i in instances:
Dudás Ádám committed
1525
            i.deploy.async(user=request.user)
1526 1527

        if len(instances) > 1:
1528 1529 1530 1531
            messages.success(request, __(
                "Successfully created %(count)d VM.",  # this should not happen
                "Successfully created %(count)d VMs.", len(instances)) % {
                'count': len(instances)})
1532 1533
            path = reverse("dashboard.index")
        else:
1534
            messages.success(request, _("VM successfully created."))
1535 1536
            path = instances[0].get_absolute_url()

1537
        if request.is_ajax():
1538 1539
            return HttpResponse(json.dumps({'redirect': path}),
                                content_type="application/json")
1540
        else:
1541 1542 1543 1544 1545 1546 1547 1548 1549 1550 1551 1552 1553 1554 1555 1556 1557 1558 1559 1560 1561 1562 1563 1564 1565 1566 1567
            return redirect("%s#activity" % path)

    def post(self, request, *args, **kwargs):
        user = request.user

        # limit chekcs
        try:
            limit = user.profile.instance_limit
        except Exception as e:
            logger.debug('No profile or instance limit: %s', e)
        else:
            current = Instance.active.filter(owner=user).count()
            logger.debug('current use: %d, limit: %d', current, limit)
            if limit < current:
                messages.error(request,
                               _('Instance limit (%d) exceeded.') % limit)
                if request.is_ajax():
                    return HttpResponse(json.dumps({'redirect': '/'}),
                                        content_type="application/json")
                else:
                    return redirect('/')

        create_func = (self.__create_normal if
                       request.POST.get("customized") is None else
                       self.__create_customized)

        return create_func(request, *args, **kwargs)
Kálmán Viktor committed
1568

1569

1570
class NodeCreate(LoginRequiredMixin, SuperuserRequiredMixin, TemplateView):
1571

1572 1573 1574 1575 1576 1577
    form_class = HostForm
    hostform = None

    formset_class = inlineformset_factory(Host, Node, form=NodeForm, extra=1)
    formset = None

1578 1579 1580 1581 1582 1583
    def get_template_names(self):
        if self.request.is_ajax():
            return ['dashboard/modal-wrapper.html']
        else:
            return ['dashboard/nojs-wrapper.html']

1584 1585 1586 1587 1588
    def get(self, request, hostform=None, formset=None, *args, **kwargs):
        if hostform is None:
            hostform = self.form_class()
        if formset is None:
            formset = self.formset_class(instance=Host())
1589 1590 1591
        context = self.get_context_data(**kwargs)
        context.update({
            'template': 'dashboard/node-create.html',
1592 1593 1594 1595
            'box_title': 'Create a Node',
            'hostform': hostform,
            'formset': formset,

1596 1597 1598 1599 1600
        })
        return self.render_to_response(context)

    # TODO handle not ajax posts
    def post(self, request, *args, **kwargs):
1601 1602
        if not self.request.user.is_authenticated():
            raise PermissionDenied()
1603

1604 1605 1606 1607 1608 1609 1610 1611 1612 1613 1614 1615
        hostform = self.form_class(request.POST)
        formset = self.formset_class(request.POST, Host())
        if not hostform.is_valid():
            return self.get(request, hostform, formset, *args, **kwargs)
        hostform.setowner(request.user)
        savedform = hostform.save(commit=False)
        formset = self.formset_class(request.POST, instance=savedform)
        if not formset.is_valid():
            return self.get(request, hostform, formset, *args, **kwargs)

        savedform.save()
        nodemodel = formset.save()
1616
        messages.success(request, _('Node successfully created.'))
1617
        path = nodemodel[0].get_absolute_url()
1618
        if request.is_ajax():
1619 1620
            return HttpResponse(json.dumps({'redirect': path}),
                                content_type="application/json")
1621
        else:
1622
            return redirect(path)
1623 1624


1625
class GroupCreate(GroupCodeMixin, LoginRequiredMixin, TemplateView):
1626 1627 1628 1629 1630 1631 1632 1633 1634 1635

    form_class = GroupCreateForm

    def get_template_names(self):
        if self.request.is_ajax():
            return ['dashboard/modal-wrapper.html']
        else:
            return ['dashboard/nojs-wrapper.html']

    def get(self, request, form=None, *args, **kwargs):
1636 1637
        if not request.user.has_module_perms('auth'):
            raise PermissionDenied()
1638
        if form is None:
1639 1640
            form = self.form_class(
                new_groups=self.get_available_group_codes(request))
1641 1642 1643 1644 1645 1646 1647 1648 1649 1650
        context = self.get_context_data(**kwargs)
        context.update({
            'template': 'dashboard/group-create.html',
            'box_title': 'Create a Group',
            'form': form,

        })
        return self.render_to_response(context)

    def post(self, request, *args, **kwargs):
1651 1652
        if not request.user.has_module_perms('auth'):
            raise PermissionDenied()
1653 1654
        form = self.form_class(
            request.POST, new_groups=self.get_available_group_codes(request))
1655 1656 1657 1658
        if not form.is_valid():
            return self.get(request, form, *args, **kwargs)
        form.cleaned_data
        savedform = form.save()
1659
        savedform.profile.set_level(request.user, 'owner')
1660
        messages.success(request, _('Group successfully created.'))
1661 1662 1663 1664 1665 1666 1667 1668
        if request.is_ajax():
            return HttpResponse(json.dumps({'redirect':
                                savedform.profile.get_absolute_url()}),
                                content_type="application/json")
        else:
            return redirect(savedform.profile.get_absolute_url())


1669 1670
class GroupProfileUpdate(SuccessMessageMixin, GroupCodeMixin,
                         LoginRequiredMixin, UpdateView):
1671 1672 1673

    form_class = GroupProfileUpdateForm
    model = Group
1674
    success_message = _('Group is successfully updated.')
1675 1676 1677 1678 1679

    @classmethod
    def get_available_group_codes(cls, request, extra=None):
        result = super(GroupProfileUpdate, cls).get_available_group_codes(
            request)
1680
        if extra and extra not in result:
1681 1682 1683 1684 1685 1686 1687 1688 1689 1690 1691 1692 1693 1694 1695 1696
            result += [extra]
        return result

    def get_object(self):
        group = super(GroupProfileUpdate, self).get_object()
        profile = group.profile
        if not profile.has_level(self.request.user, 'owner'):
            raise PermissionDenied
        else:
            return profile

    @classmethod
    def get_form_object(cls, request, instance, *args, **kwargs):
        kwargs['instance'] = instance
        kwargs['new_groups'] = cls.get_available_group_codes(
            request, instance.org_id)
1697
        kwargs['superuser'] = request.user.is_superuser
1698 1699 1700 1701 1702 1703 1704 1705 1706 1707 1708 1709 1710 1711 1712
        return cls.form_class(*args, **kwargs)

    def get(self, request, form=None, *args, **kwargs):
        self.object = self.get_object()
        if form is None:
            form = self.get_form_object(request, self.object)
        return super(GroupProfileUpdate, self).get(
            request, form, *args, **kwargs)

    def post(self, request, *args, **kwargs):
        if not request.user.has_module_perms('auth'):
            raise PermissionDenied()
        self.object = self.get_object()
        form = self.get_form_object(request, self.object, self.request.POST)
        if not form.is_valid():
1713
            return self.form_invalid(form)
1714
        form.save()
1715
        return self.form_valid(form)
1716 1717


1718
class VmDelete(LoginRequiredMixin, DeleteView):
1719
    model = Instance
1720 1721 1722 1723 1724 1725 1726
    template_name = "dashboard/confirm/base-delete.html"

    def get_template_names(self):
        if self.request.is_ajax():
            return ['dashboard/confirm/ajax-delete.html']
        else:
            return ['dashboard/confirm/base-delete.html']
1727 1728 1729 1730 1731 1732 1733

    def get_success_url(self):
        next = self.request.POST.get('next')
        if next:
            return next
        else:
            return reverse_lazy('dashboard.index')
1734

1735
    def get_context_data(self, **kwargs):
1736 1737 1738
        object = self.get_object()
        if not object.has_level(self.request.user, 'owner'):
            raise PermissionDenied()
1739

1740 1741 1742 1743 1744 1745 1746 1747 1748
        context = super(VmDelete, self).get_context_data(**kwargs)
        return context

    # github.com/django/django/blob/master/django/views/generic/edit.py#L245
    def delete(self, request, *args, **kwargs):
        object = self.get_object()
        if not object.has_level(request.user, 'owner'):
            raise PermissionDenied()

1749
        object.destroy.async(user=request.user)
1750
        success_url = self.get_success_url()
1751
        success_message = _("VM successfully deleted.")
1752 1753 1754 1755 1756 1757 1758 1759 1760 1761 1762 1763 1764

        if request.is_ajax():
            if request.POST.get('redirect').lower() == "true":
                messages.success(request, success_message)
            return HttpResponse(
                json.dumps({'message': success_message}),
                content_type="application/json",
            )
        else:
            messages.success(request, success_message)
            return HttpResponseRedirect(success_url)


1765
class NodeDelete(LoginRequiredMixin, SuperuserRequiredMixin, DeleteView):
1766 1767 1768 1769 1770 1771 1772 1773 1774 1775 1776 1777 1778 1779 1780 1781 1782 1783

    """This stuff deletes the node.
    """
    model = Node
    template_name = "dashboard/confirm/base-delete.html"

    def get_template_names(self):
        if self.request.is_ajax():
            return ['dashboard/confirm/ajax-delete.html']
        else:
            return ['dashboard/confirm/base-delete.html']

    # github.com/django/django/blob/master/django/views/generic/edit.py#L245
    def delete(self, request, *args, **kwargs):
        object = self.get_object()

        object.delete()
        success_url = self.get_success_url()
1784
        success_message = _("Node successfully deleted.")
1785 1786 1787 1788 1789 1790 1791 1792 1793 1794 1795 1796 1797 1798 1799 1800 1801 1802

        if request.is_ajax():
            if request.POST.get('redirect').lower() == "true":
                messages.success(request, success_message)
            return HttpResponse(
                json.dumps({'message': success_message}),
                content_type="application/json",
            )
        else:
            messages.success(request, success_message)
            return HttpResponseRedirect(success_url)

    def get_success_url(self):
        next = self.request.POST.get('next')
        if next:
            return next
        else:
            return reverse_lazy('dashboard.index')
1803

1804

1805 1806 1807 1808 1809 1810 1811 1812 1813
class NodeAddTraitView(SuperuserRequiredMixin, DetailView):
    model = Node
    template_name = "dashboard/node-add-trait.html"

    def get_success_url(self):
        next = self.request.GET.get('next')
        if next:
            return next
        else:
1814
            return self.object.get_absolute_url()
1815 1816 1817 1818 1819 1820 1821 1822 1823 1824 1825 1826 1827 1828 1829 1830 1831 1832 1833 1834 1835 1836 1837

    def get_context_data(self, **kwargs):
        self.object = self.get_object()
        context = super(NodeAddTraitView, self).get_context_data(**kwargs)
        context['form'] = (TraitForm(self.request.POST) if self.request.POST
                           else TraitForm())
        return context

    def post(self, request, pk, *args, **kwargs):
        context = self.get_context_data(**kwargs)
        form = context['form']
        if form.is_valid():
            node = self.object
            n = form.cleaned_data['name']
            trait, created = Trait.objects.get_or_create(name=n)
            node.traits.add(trait)
            success_message = _("Trait successfully added to node.")
            messages.success(request, success_message)
            return redirect(self.get_success_url())
        else:
            return self.get(self, request, pk, *args, **kwargs)


1838 1839 1840 1841
class NodeStatus(LoginRequiredMixin, SuperuserRequiredMixin, DetailView):
    template_name = "dashboard/confirm/node-status.html"
    model = Node

1842 1843 1844 1845 1846 1847
    def get_template_names(self):
        if self.request.is_ajax():
            return ['dashboard/confirm/ajax-node-status.html']
        else:
            return ['dashboard/confirm/node-status.html']

1848 1849 1850 1851 1852 1853 1854 1855 1856 1857
    def get_success_url(self):
        next = self.request.GET.get('next')
        if next:
            return next
        else:
            return reverse_lazy("dashboard.views.node-detail",
                                kwargs={'pk': self.object.pk})

    def get_context_data(self, **kwargs):
        context = super(NodeStatus, self).get_context_data(**kwargs)
1858 1859 1860 1861
        if self.object.enabled:
            context['status'] = "disable"
        else:
            context['status'] = "enable"
1862 1863 1864
        return context

    def post(self, request, *args, **kwargs):
1865
        if request.POST.get('change_status') is not None:
1866
            return self.__set_status(request)
1867 1868
        return redirect(reverse_lazy("dashboard.views.node-detail",
                                     kwargs={'pk': self.get_object().pk}))
1869 1870 1871

    def __set_status(self, request):
        self.object = self.get_object()
1872
        if not self.object.enabled:
1873
            self.object.enable(user=request.user)
1874
        else:
1875
            self.object.disable(user=request.user)
1876
        success_message = _("Node successfully changed status.")
1877 1878 1879 1880 1881 1882 1883 1884 1885 1886 1887 1888 1889 1890 1891

        if request.is_ajax():
            response = {
                'message': success_message,
                'node_pk': self.object.pk
            }
            return HttpResponse(
                json.dumps(response),
                content_type="application/json"
            )
        else:
            messages.success(request, success_message)
            return redirect(self.get_success_url())


1892 1893 1894 1895 1896 1897 1898 1899 1900 1901 1902 1903 1904 1905 1906 1907 1908 1909 1910 1911 1912 1913 1914 1915 1916 1917 1918 1919 1920 1921
class NodeFlushView(LoginRequiredMixin, SuperuserRequiredMixin, DetailView):
    template_name = "dashboard/confirm/node-flush.html"
    model = Node

    def get_template_names(self):
        if self.request.is_ajax():
            return ['dashboard/confirm/ajax-node-flush.html']
        else:
            return ['dashboard/confirm/node-flush.html']

    def get_success_url(self):
        next = self.request.GET.get('next')
        if next:
            return next
        else:
            return reverse_lazy("dashboard.views.node-detail",
                                kwargs={'pk': self.object.pk})

    def get_context_data(self, **kwargs):
        context = super(NodeFlushView, self).get_context_data(**kwargs)
        return context

    def post(self, request, *args, **kwargs):
        if request.POST.get('flush') is not None:
            return self.__flush(request)
        return redirect(reverse_lazy("dashboard.views.node-detail",
                                     kwargs={'pk': self.get_object().pk}))

    def __flush(self, request):
        self.object = self.get_object()
1922
        self.object.flush.async(user=request.user)
1923
        success_message = _("Node successfully flushed.")
1924 1925
        messages.success(request, success_message)
        return redirect(self.get_success_url())
1926 1927


1928
class PortDelete(LoginRequiredMixin, DeleteView):
1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950 1951 1952 1953 1954 1955 1956 1957
    model = Rule
    pk_url_kwarg = 'rule'

    def get_template_names(self):
        if self.request.is_ajax():
            return ['dashboard/confirm/ajax-delete.html']
        else:
            return ['dashboard/confirm/base-delete.html']

    def get_context_data(self, **kwargs):
        context = super(PortDelete, self).get_context_data(**kwargs)
        rule = kwargs.get('object')
        instance = rule.host.interface_set.get().instance
        context['title'] = _("Port delete confirmation")
        context['text'] = _("Are you sure you want to close %(port)d/"
                            "%(proto)s on %(vm)s?" % {'port': rule.dport,
                                                      'proto': rule.proto,
                                                      'vm': instance})
        return context

    def delete(self, request, *args, **kwargs):
        rule = Rule.objects.get(pk=kwargs.get("rule"))
        instance = rule.host.interface_set.get().instance
        if not instance.has_level(request.user, 'owner'):
            raise PermissionDenied()

        super(PortDelete, self).delete(request, *args, **kwargs)

        success_url = self.get_success_url()
1958
        success_message = _("Port successfully removed.")
1959 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973

        if request.is_ajax():
            return HttpResponse(
                json.dumps({'message': success_message}),
                content_type="application/json",
            )
        else:
            messages.success(request, success_message)
            return HttpResponseRedirect("%s#network" % success_url)

    def get_success_url(self):
        return reverse_lazy('dashboard.views.detail',
                            kwargs={'pk': self.kwargs.get("pk")})


1974
class VmMassDelete(LoginRequiredMixin, View):
1975
    def get(self, request, *args, **kwargs):
1976 1977 1978 1979 1980
        vms = request.GET.getlist('v[]')
        objects = Instance.objects.filter(pk__in=vms)
        return render(request, "dashboard/confirm/mass-delete.html",
                      {'objects': objects})

1981 1982 1983 1984 1985 1986 1987 1988 1989
    def post(self, request, *args, **kwargs):
        vms = request.POST.getlist('vms')
        names = []
        if vms is not None:
            for i in Instance.objects.filter(pk__in=vms):
                if not i.has_level(request.user, 'owner'):
                    logger.info('Tried to delete instance #%d without owner '
                                'permission by %s.', i.pk,
                                unicode(request.user))
Őry Máté committed
1990 1991 1992
                    # no need for rollback or proper error message, this can't
                    # normally happen:
                    raise PermissionDenied()
1993 1994 1995 1996 1997
                try:
                    i.destroy.async(user=request.user)
                    names.append(i.name)
                except Exception as e:
                    logger.error(e)
1998

1999 2000 2001 2002
        success_message = __(
            "Mass delete complete, the following VM was deleted: %s.",
            "Mass delete complete, the following VMs were deleted: %s.",
            len(names)) % u', '.join(names)
2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013

        # we can get this only via AJAX ...
        if request.is_ajax():
            return HttpResponse(
                json.dumps({'message': success_message}),
                content_type="application/json"
            )
        else:
            messages.success(request, success_message)
            next = request.GET.get('next')
            return redirect(next if next else reverse_lazy('dashboard.index'))
2014 2015


2016 2017
class LeaseCreate(LoginRequiredMixin, SuperuserRequiredMixin,
                  SuccessMessageMixin, CreateView):
2018 2019 2020
    model = Lease
    form_class = LeaseForm
    template_name = "dashboard/lease-create.html"
2021
    success_message = _("Successfully created a new lease.")
2022 2023 2024 2025 2026

    def get_success_url(self):
        return reverse_lazy("dashboard.views.template-list")


2027 2028
class LeaseDetail(LoginRequiredMixin, SuperuserRequiredMixin,
                  SuccessMessageMixin, UpdateView):
2029 2030 2031
    model = Lease
    form_class = LeaseForm
    template_name = "dashboard/lease-edit.html"
2032
    success_message = _("Successfully modified lease.")
2033 2034 2035 2036 2037

    def get_success_url(self):
        return reverse_lazy("dashboard.views.lease-detail", kwargs=self.kwargs)


2038 2039 2040 2041 2042 2043 2044 2045 2046 2047 2048 2049
class LeaseDelete(LoginRequiredMixin, SuperuserRequiredMixin, DeleteView):
    model = Lease

    def get_success_url(self):
        return reverse("dashboard.views.template-list")

    def get_template_names(self):
        if self.request.is_ajax():
            return ['dashboard/confirm/ajax-delete.html']
        else:
            return ['dashboard/confirm/base-delete.html']

2050 2051 2052 2053 2054 2055 2056 2057 2058 2059 2060 2061 2062 2063
    def get_context_data(self, *args, **kwargs):
        c = super(LeaseDelete, self).get_context_data(*args, **kwargs)
        lease = self.get_object()
        templates = lease.instancetemplate_set
        if templates.count() > 0:
            text = _("You can't delete this lease because some templates "
                     "are still using it, modify these to proceed: ")

            c['text'] = text + ", ".join("<strong>%s (#%d)</strong>"
                                         "" % (o.name, o.pk)
                                         for o in templates.all())
            c['disable_submit'] = True
        return c

2064 2065 2066
    def delete(self, request, *args, **kwargs):
        object = self.get_object()

2067 2068 2069
        if (object.instancetemplate_set.count() > 0):
            raise SuspiciousOperation()

2070 2071
        object.delete()
        success_url = self.get_success_url()
2072
        success_message = _("Lease successfully deleted.")
2073 2074 2075 2076 2077 2078 2079 2080 2081 2082 2083

        if request.is_ajax():
            return HttpResponse(
                json.dumps({'message': success_message}),
                content_type="application/json",
            )
        else:
            messages.success(request, success_message)
            return HttpResponseRedirect(success_url)


2084
@require_GET
2085
def vm_activity(request, pk):
2086 2087
    instance = Instance.objects.get(pk=pk)
    if not instance.has_level(request.user, 'owner'):
2088 2089
        raise PermissionDenied()

2090
    response = {}
2091
    only_status = request.GET.get("only_status", "false")
2092

2093 2094
    response['human_readable_status'] = instance.get_status_display()
    response['status'] = instance.status
2095
    response['icon'] = instance.get_status_icon()
2096
    if only_status == "false":  # instance activity
2097
        context = {
2098
            'instance': instance,
2099
            'activities': instance.get_activities(request.user),
2100
            'ops': get_operations(instance, request.user),
2101 2102
        }

2103
        response['activities'] = render_to_string(
2104
            "dashboard/vm-detail/_activity-timeline.html",
2105
            RequestContext(request, context),
2106
        )
2107 2108 2109 2110
        response['ops'] = render_to_string(
            "dashboard/vm-detail/_operations.html",
            RequestContext(request, context),
        )
2111 2112 2113 2114 2115

    return HttpResponse(
        json.dumps(response),
        content_type="application/json"
    )
2116 2117


2118 2119 2120 2121 2122
class FavouriteView(TemplateView):

    def post(self, *args, **kwargs):
        user = self.request.user
        vm = Instance.objects.get(pk=self.request.POST.get("vm"))
2123 2124
        if not vm.has_level(user, 'user'):
            raise PermissionDenied()
2125 2126
        try:
            Favourite.objects.get(instance=vm, user=user).delete()
2127
            return HttpResponse("Deleted.")
2128 2129
        except Favourite.DoesNotExist:
            Favourite(instance=vm, user=user).save()
2130
            return HttpResponse("Added.")
2131 2132


2133 2134
class TransferOwnershipView(LoginRequiredMixin, DetailView):
    model = Instance
2135
    template_name = 'dashboard/vm-detail/tx-owner.html'
2136 2137 2138

    def post(self, request, *args, **kwargs):
        try:
2139
            new_owner = search_user(request.POST['name'])
2140 2141 2142
        except User.DoesNotExist:
            messages.error(request, _('Can not find specified user.'))
            return self.get(request, *args, **kwargs)
2143 2144 2145 2146 2147 2148 2149 2150 2151 2152
        except KeyError:
            raise SuspiciousOperation()

        obj = self.get_object()
        if not (obj.owner == request.user or
                request.user.is_superuser):
            raise PermissionDenied()

        token = signing.dumps((obj.pk, new_owner.pk),
                              salt=TransferOwnershipConfirmView.get_salt())
2153 2154 2155 2156 2157 2158 2159 2160 2161 2162 2163 2164 2165 2166 2167 2168
        token_path = reverse(
            'dashboard.views.vm-transfer-ownership-confirm', args=[token])
        try:
            new_owner.profile.notify(
                _('Ownership offer'),
                'dashboard/notifications/ownership-offer.html',
                {'instance': obj, 'token': token_path})
        except Profile.DoesNotExist:
            messages.error(request, _('Can not notify selected user.'))
        else:
            messages.success(request,
                             _('User %s is notified about the offer.') % (
                                 unicode(new_owner), ))

        return redirect(reverse_lazy("dashboard.views.detail",
                                     kwargs={'pk': obj.pk}))
2169 2170


Őry Máté committed
2171 2172 2173 2174 2175 2176 2177 2178 2179 2180 2181 2182 2183 2184 2185 2186 2187 2188 2189 2190 2191 2192 2193 2194 2195
class AbstractVmFunctionView(AccessMixin, View):
    """Abstract instance-action view.

    User can do the action with a valid token or if has at least required_level
    ACL level for the instance.

    Children should at least implement/add template_name, success_message,
    url_name, and do_action().
    """
    token_max_age = 3 * 24 * 3600
    required_level = 'owner'
    success_message = _("Failed to perform requested action.")

    @classmethod
    def check_acl(cls, instance, user):
        if not instance.has_level(user, cls.required_level):
            raise PermissionDenied()

    @classmethod
    def get_salt(cls):
        return unicode(cls)

    @classmethod
    def get_token(cls, instance, user, *args):
        t = tuple([getattr(i, 'pk', i) for i in [instance, user] + list(args)])
2196
        return signing.dumps(t, salt=cls.get_salt(), compress=True)
Őry Máté committed
2197 2198 2199 2200 2201 2202 2203 2204 2205 2206 2207 2208 2209 2210 2211 2212 2213 2214 2215 2216 2217 2218 2219 2220 2221 2222 2223 2224 2225 2226 2227 2228 2229 2230 2231 2232 2233 2234 2235 2236 2237 2238

    @classmethod
    def get_token_url(cls, instance, user, *args):
        key = cls.get_token(instance, user, *args)
        args = (instance.pk, key) + args
        return reverse(cls.url_name, args=args)
        # this wont work, CBVs suck: reverse(cls.as_view(), args=args)

    def get_template_names(self):
        return [self.template_name]

    def get(self, request, pk, key=None, *args, **kwargs):
        class LoginNeeded(Exception):
            pass
        pk = int(pk)
        instance = get_object_or_404(Instance, pk=pk)
        try:
            if key:
                logger.debug('Confirm dialog for token %s.', key)
                try:
                    self.validate_key(pk, key)
                except signing.SignatureExpired:
                    messages.error(request, _(
                        'The token has expired, please log in.'))
                    raise LoginNeeded()
                self.key = key
            else:
                if not request.user.is_authenticated():
                    raise LoginNeeded()
                self.check_acl(instance, request.user)
        except LoginNeeded:
            return redirect_to_login(request.get_full_path(),
                                     self.get_login_url(),
                                     self.get_redirect_field_name())
        except SuspiciousOperation as e:
            messages.error(request, _('This token is invalid.'))
            logger.warning('This token %s is invalid. %s', key, unicode(e))
            raise PermissionDenied()
        return render(request, self.get_template_names(),
                      self.get_context(instance))

    def post(self, request, pk, key=None, *args, **kwargs):
2239 2240
        class LoginNeeded(Exception):
            pass
Őry Máté committed
2241 2242
        pk = int(pk)
        instance = get_object_or_404(Instance, pk=pk)
2243 2244 2245 2246 2247 2248 2249 2250 2251 2252 2253 2254 2255 2256 2257 2258 2259 2260 2261 2262 2263

        try:
            if not request.user.is_authenticated() and key:
                try:
                    user = self.validate_key(pk, key)
                except signing.SignatureExpired:
                    messages.error(request, _(
                        'The token has expired, please log in.'))
                    raise LoginNeeded()
                self.key = key
            else:
                user = request.user
                self.check_acl(instance, request.user)
        except LoginNeeded:
            return redirect_to_login(request.get_full_path(),
                                     self.get_login_url(),
                                     self.get_redirect_field_name())
        except SuspiciousOperation as e:
            messages.error(request, _('This token is invalid.'))
            logger.warning('This token %s is invalid. %s', key, unicode(e))
            raise PermissionDenied()
Őry Máté committed
2264 2265 2266 2267 2268 2269 2270 2271 2272 2273 2274 2275 2276 2277 2278 2279 2280 2281 2282 2283 2284 2285 2286 2287 2288 2289 2290 2291 2292 2293 2294 2295 2296 2297 2298

        if self.do_action(instance, user):
            messages.success(request, self.success_message)
        else:
            messages.error(request, self.fail_message)
        return HttpResponseRedirect(instance.get_absolute_url())

    def validate_key(self, pk, key):
        """Get object based on signed token.
        """
        try:
            data = signing.loads(key, salt=self.get_salt())
            logger.debug('Token data: %s', unicode(data))
            instance, user = data
            logger.debug('Extracted token data: instance: %s, user: %s',
                         unicode(instance), unicode(user))
        except (signing.BadSignature, ValueError, TypeError) as e:
            logger.warning('Tried invalid token. Token: %s, user: %s. %s',
                           key, unicode(self.request.user), unicode(e))
            raise SuspiciousOperation()

        try:
            instance, user = signing.loads(key, max_age=self.token_max_age,
                                           salt=self.get_salt())
            logger.debug('Extracted non-expired token data: %s, %s',
                         unicode(instance), unicode(user))
        except signing.BadSignature as e:
            raise signing.SignatureExpired()

        if pk != instance:
            logger.debug('pk (%d) != instance (%d)', pk, instance)
            raise SuspiciousOperation()
        user = User.objects.get(pk=user)
        return user

2299
    def do_action(self, instance, user):  # noqa
Őry Máté committed
2300 2301 2302 2303 2304 2305 2306 2307 2308 2309 2310 2311 2312 2313 2314 2315 2316 2317 2318 2319 2320 2321 2322 2323 2324 2325 2326 2327
        raise NotImplementedError('Please override do_action(instance, user)')

    def get_context(self, instance):
        context = {'instance': instance}
        if getattr(self, 'key', None) is not None:
            context['key'] = self.key
        return context


class VmRenewView(AbstractVmFunctionView):
    """User can renew an instance."""
    template_name = 'dashboard/confirm/base-renew.html'
    success_message = _("Virtual machine is successfully renewed.")
    url_name = 'dashboard.views.vm-renew'

    def get_context(self, instance):
        context = super(VmRenewView, self).get_context(instance)
        (context['time_of_suspend'],
         context['time_of_delete']) = instance.get_renew_times()
        return context

    def do_action(self, instance, user):
        instance.renew(user=user)
        logger.info('Instance %s renewed by %s.', unicode(instance),
                    unicode(user))
        return True


2328
class TransferOwnershipConfirmView(LoginRequiredMixin, View):
2329 2330
    """User can accept an ownership offer."""

2331
    max_age = 3 * 24 * 3600
2332
    success_message = _("Ownership successfully transferred to you.")
2333 2334 2335 2336 2337

    @classmethod
    def get_salt(cls):
        return unicode(cls)

2338
    def get(self, request, key, *args, **kwargs):
2339 2340
        """Confirm ownership transfer based on token.
        """
2341
        logger.debug('Confirm dialog for token %s.', key)
2342 2343
        try:
            instance, new_owner = self.get_instance(key, request.user)
2344
        except PermissionDenied:
2345 2346 2347 2348 2349 2350 2351 2352 2353
            messages.error(request, _('This token is for an other user.'))
            raise
        except SuspiciousOperation:
            messages.error(request, _('This token is invalid or has expired.'))
            raise PermissionDenied()
        return render(request,
                      "dashboard/confirm/base-transfer-ownership.html",
                      dictionary={'instance': instance, 'key': key})

2354
    def post(self, request, key, *args, **kwargs):
2355 2356
        """Really transfer ownership based on token.
        """
2357
        instance, owner = self.get_instance(key, request.user)
2358 2359 2360 2361 2362 2363 2364 2365 2366 2367

        old = instance.owner
        with instance_activity(code_suffix='ownership-transferred',
                               instance=instance, user=request.user):
            instance.owner = request.user
            instance.clean()
            instance.save()
        messages.success(request, self.success_message)
        logger.info('Ownership of %s transferred from %s to %s.',
                    unicode(instance), unicode(old), unicode(request.user))
2368 2369 2370 2371 2372
        if old.profile:
            old.profile.notify(
                _('Ownership accepted'),
                'dashboard/notifications/ownership-accepted.html',
                {'instance': instance})
2373 2374 2375 2376 2377 2378 2379 2380 2381
        return HttpResponseRedirect(instance.get_absolute_url())

    def get_instance(self, key, user):
        """Get object based on signed token.
        """
        try:
            instance, new_owner = (
                signing.loads(key, max_age=self.max_age,
                              salt=self.get_salt()))
2382
        except (signing.BadSignature, ValueError, TypeError) as e:
2383 2384 2385 2386 2387 2388 2389 2390 2391 2392 2393 2394 2395 2396 2397 2398 2399
            logger.error('Tried invalid token. Token: %s, user: %s. %s',
                         key, unicode(user), unicode(e))
            raise SuspiciousOperation()

        try:
            instance = Instance.objects.get(id=instance)
        except Instance.DoesNotExist as e:
            logger.error('Tried token to nonexistent instance %d. '
                         'Token: %s, user: %s. %s',
                         instance, key, unicode(user), unicode(e))
            raise Http404()

        if new_owner != user.pk:
            logger.error('%s (%d) tried the token for %s. Token: %s.',
                         unicode(user), user.pk, new_owner, key)
            raise PermissionDenied()
        return (instance, new_owner)
2400 2401


2402 2403 2404
class GraphViewBase(LoginRequiredMixin, View):
    @staticmethod
    def get_graphite_url():
2405 2406 2407 2408 2409
        graphite_host = getenv("GRAPHITE_HOST", None)
        graphite_port = getenv("GRAPHITE_PORT", None)

        if (graphite_host in ['', None] or graphite_port in ['', None]):
            logger.debug('GRAPHITE_HOST is empty.')
2410 2411 2412 2413 2414 2415 2416
            return None

        return 'http://%s:%s' % (graphite_host, graphite_port)

    def get(self, request, pk, metric, time, *args, **kwargs):
        graphite_url = GraphViewBase.get_graphite_url()
        if graphite_url is None:
2417
            raise Http404()
2418

2419
        if metric not in self.metrics.keys():
2420
            raise SuspiciousOperation()
2421

2422
        try:
2423 2424
            instance = self.get_object(request, pk)
        except self.model.DoesNotExist:
2425 2426
            raise Http404()

2427
        prefix = self.get_prefix(instance)
2428
        target = self.metrics[metric] % {'prefix': prefix}
2429
        title = self.get_title(instance, metric)
2430 2431 2432 2433 2434
        params = {'target': target,
                  'from': '-%s' % time,
                  'title': title.encode('UTF-8'),
                  'width': '500',
                  'height': '200'}
2435 2436
        logger.debug('%s %s', graphite_url, params)
        response = requests.get('%s/render/' % graphite_url, params=params)
2437
        return HttpResponse(response.content, mimetype="image/png")
2438 2439 2440 2441 2442 2443 2444 2445 2446 2447 2448 2449 2450 2451 2452

    def get_prefix(self, instance):
        raise NotImplementedError("Subclass must implement abstract method")

    def get_title(self, instance, metric):
        raise NotImplementedError("Subclass must implement abstract method")

    def get_object(self, request, pk):
        instance = self.model.objects.get(id=pk)
        if not instance.has_level(request.user, 'user'):
            raise PermissionDenied()
        return instance


class VmGraphView(GraphViewBase):
2453 2454 2455 2456 2457 2458 2459 2460 2461 2462 2463 2464
    metrics = {
        'cpu': ('cactiStyle(alias(nonNegativeDerivative(%(prefix)s.cpu.usage),'
                '"cpu usage (%%)"))'),
        'memory': ('cactiStyle(alias(%(prefix)s.memory.usage,'
                   '"memory usage (%%)"))'),
        'network': (
            'group('
            'aliasSub(nonNegativeDerivative(%(prefix)s.network.bytes_recv*),'
            ' ".*-(\d+)\\)", "out (vlan \\1)"),'
            'aliasSub(nonNegativeDerivative(%(prefix)s.network.bytes_sent*),'
            ' ".*-(\d+)\\)", "in (vlan \\1)"))'),
    }
2465 2466 2467 2468 2469 2470 2471
    model = Instance

    def get_prefix(self, instance):
        return 'vm.%s' % instance.vm_name

    def get_title(self, instance, metric):
        return '%s (%s) - %s' % (instance.name, instance.vm_name, metric)
2472 2473 2474


class NodeGraphView(SuperuserRequiredMixin, GraphViewBase):
2475
    metrics = {
2476
        'cpu': ('cactiStyle(alias(nonNegativeDerivative(%(prefix)s.cpu.times),'
2477
                '"cpu usage (%%)"))'),
2478
        'memory': ('cactiStyle(alias(%(prefix)s.memory.usage,'
2479 2480
                   '"memory usage (%%)"))'),
        'network': ('cactiStyle(aliasByMetric('
2481
                    'nonNegativeDerivative(%(prefix)s.network.bytes_*)))'),
2482
    }
2483 2484 2485 2486 2487 2488 2489 2490 2491 2492
    model = Node

    def get_prefix(self, instance):
        return 'circle.%s' % instance.name

    def get_title(self, instance, metric):
        return '%s - %s' % (instance.name, metric)

    def get_object(self, request, pk):
        return self.model.objects.get(id=pk)
2493 2494 2495


class NotificationView(LoginRequiredMixin, TemplateView):
2496 2497 2498 2499 2500 2501

    def get_template_names(self):
        if self.request.is_ajax():
            return ['dashboard/_notifications-timeline.html']
        else:
            return ['dashboard/notifications.html']
2502 2503 2504 2505 2506 2507 2508

    def get_context_data(self, *args, **kwargs):
        context = super(NotificationView, self).get_context_data(
            *args, **kwargs)
        # we need to convert it to list, otherwise it's gonna be
        # similar to a QuerySet and update everything to
        # read status after get
2509
        n = 10 if self.request.is_ajax() else 1000
2510
        context['notifications'] = list(
2511
            self.request.user.notification_set.values()[:n])
2512 2513 2514 2515 2516 2517 2518 2519 2520
        return context

    def get(self, *args, **kwargs):
        response = super(NotificationView, self).get(*args, **kwargs)
        un = self.request.user.notification_set.filter(status="new")
        for u in un:
            u.status = "read"
            u.save()
        return response
2521 2522


2523 2524 2525
def circle_login(request):
    authentication_form = CircleAuthenticationForm
    extra_context = {
2526
        'saml2': saml_available,
2527
    }
2528 2529 2530 2531
    response = login(request, authentication_form=authentication_form,
                     extra_context=extra_context)
    set_language_cookie(request, response)
    return response
2532 2533


2534 2535
class MyPreferencesView(UpdateView):
    model = Profile
2536 2537 2538 2539 2540 2541 2542 2543 2544 2545

    def get_context_data(self, *args, **kwargs):
        context = super(MyPreferencesView, self).get_context_data(*args,
                                                                  **kwargs)
        context['forms'] = {
            'change_password': CirclePasswordChangeForm(
                user=self.request.user),
            'change_language': MyProfileForm(instance=self.get_object()),
        }
        return context
2546 2547 2548 2549 2550 2551 2552 2553 2554

    def get_object(self, queryset=None):
        if self.request.user.is_anonymous():
            raise PermissionDenied()
        try:
            return self.request.user.profile
        except Profile.DoesNotExist:
            raise Http404(_("You don't have a profile."))

2555 2556 2557
    def post(self, request, *args, **kwargs):
        self.ojbect = self.get_object()
        redirect_response = HttpResponseRedirect(
2558
            reverse("dashboard.views.profile-preferences"))
2559 2560 2561 2562 2563 2564 2565 2566 2567 2568 2569 2570 2571 2572 2573 2574 2575 2576 2577 2578 2579 2580 2581 2582 2583 2584
        if "preferred_language" in request.POST:
            form = MyProfileForm(request.POST, instance=self.get_object())
            if form.is_valid():
                lang = form.cleaned_data.get("preferred_language")
                set_language_cookie(self.request, redirect_response, lang)
                form.save()
        else:
            form = CirclePasswordChangeForm(user=request.user,
                                            data=request.POST)
            if form.is_valid():
                form.save()

        if form.is_valid():
            return redirect_response
        else:
            return self.get(request, form=form, *args, **kwargs)

    def get(self, request, form=None, *args, **kwargs):
        # if this is not here, it won't work
        self.object = self.get_object()
        context = self.get_context_data(*args, **kwargs)
        if form is not None:
            # a little cheating, users can't post invalid
            # language selection forms (without modifying the HTML)
            context['forms']['change_password'] = form
        return self.render_to_response(context)
2585 2586


2587 2588 2589 2590 2591 2592
class UnsubscribeFormView(SuccessMessageMixin, UpdateView):
    model = Profile
    form_class = UnsubscribeForm
    template_name = "dashboard/unsubscribe.html"
    success_message = _("Successfully modified subscription.")

2593 2594 2595 2596 2597 2598
    def get_success_url(self):
        if self.request.user.is_authenticated():
            return super(UnsubscribeFormView, self).get_success_url()
        else:
            return self.request.path

2599 2600 2601 2602 2603 2604
    @classmethod
    def get_salt(cls):
        return unicode(cls)

    @classmethod
    def get_token(cls, user):
2605
        return signing.dumps(user.pk, salt=cls.get_salt(), compress=True)
2606 2607

    def get_object(self, queryset=None):
2608 2609
        key = self.kwargs['token']
        try:
2610
            pk = signing.loads(key, salt=self.get_salt(), max_age=48 * 3600)
2611 2612 2613 2614 2615 2616 2617 2618 2619 2620 2621 2622 2623 2624 2625
        except signing.SignatureExpired:
            raise
        except (signing.BadSignature, ValueError, TypeError) as e:
            logger.warning('Tried invalid token. Token: %s, user: %s. %s',
                           key, unicode(self.request.user), unicode(e))
            raise Http404
        else:
            return (queryset or self.get_queryset()).get(user_id=pk)

    def dispatch(self, request, *args, **kwargs):
        try:
            return super(UnsubscribeFormView, self).dispatch(
                request, *args, **kwargs)
        except signing.SignatureExpired:
            return redirect('dashboard.views.profile-preferences')
2626 2627


2628 2629 2630 2631 2632 2633 2634 2635 2636
def set_language_cookie(request, response, lang=None):
    if lang is None:
        try:
            lang = request.user.profile.preferred_language
        except:
            return

    cname = getattr(settings, 'LANGUAGE_COOKIE_NAME', 'django_language')
    response.set_cookie(cname, lang, 365 * 86400)
2637 2638 2639 2640 2641 2642 2643 2644 2645 2646 2647 2648 2649 2650 2651 2652 2653 2654 2655 2656 2657 2658 2659 2660 2661 2662 2663 2664 2665 2666 2667


class DiskRemoveView(DeleteView):
    model = Disk

    def get_template_names(self):
        if self.request.is_ajax():
            return ['dashboard/confirm/ajax-delete.html']
        else:
            return ['dashboard/confirm/base-delete.html']

    def get_context_data(self, **kwargs):
        context = super(DiskRemoveView, self).get_context_data(**kwargs)
        disk = self.get_object()
        app = disk.get_appliance()
        context['title'] = _("Disk remove confirmation")
        context['text'] = _("Are you sure you want to remove "
                            "<strong>%(disk)s</strong> from "
                            "<strong>%(app)s</strong>?" % {'disk': disk,
                                                           'app': app}
                            )
        return context

    def delete(self, request, *args, **kwargs):
        disk = self.get_object()
        if not disk.has_level(request.user, 'owner'):
            raise PermissionDenied()

        disk = self.get_object()
        app = disk.get_appliance()

2668
        app.remove_disk(disk=disk, user=request.user)
2669 2670 2671 2672
        disk.destroy()

        next_url = request.POST.get("next")
        success_url = next_url if next_url else app.get_absolute_url()
2673
        success_message = _("Disk successfully removed.")
2674 2675 2676 2677 2678 2679 2680 2681 2682

        if request.is_ajax():
            return HttpResponse(
                json.dumps({'message': success_message}),
                content_type="application/json",
            )
        else:
            messages.success(request, success_message)
            return HttpResponseRedirect("%s#resources" % success_url)
2683 2684 2685 2686 2687 2688 2689 2690 2691 2692 2693 2694 2695 2696 2697


@require_GET
def get_disk_download_status(request, pk):
    disk = Disk.objects.get(pk=pk)
    if not disk.has_level(request.user, 'owner'):
        raise PermissionDenied()

    return HttpResponse(
        json.dumps({
            'percentage': disk.get_download_percentage(),
            'failed': disk.failed
        }),
        content_type="application/json",
    )
2698 2699 2700 2701


class InstanceActivityDetail(SuperuserRequiredMixin, DetailView):
    model = InstanceActivity
2702
    context_object_name = 'instanceactivity'  # much simpler to mock object
2703 2704 2705 2706
    template_name = 'dashboard/instanceactivity_detail.html'

    def get_context_data(self, **kwargs):
        ctx = super(InstanceActivityDetail, self).get_context_data(**kwargs)
2707 2708
        ctx['activities'] = self.object.instance.get_activities(
            self.request.user)
2709
        return ctx
2710 2711


2712 2713
class UserCreationView(LoginRequiredMixin, PermissionRequiredMixin,
                       CreateView):
2714 2715 2716
    form_class = UserCreationForm
    model = User
    template_name = 'dashboard/user-create.html'
2717
    permission_required = "auth.add_user"
2718 2719 2720 2721 2722 2723 2724 2725 2726 2727 2728 2729 2730 2731 2732 2733 2734 2735 2736 2737 2738 2739

    def get_group(self, group_pk):
        self.group = get_object_or_404(Group, pk=group_pk)
        if not self.group.profile.has_level(self.request.user, 'owner'):
            raise PermissionDenied()

    def get(self, *args, **kwargs):
        self.get_group(kwargs.pop('group_pk'))
        return super(UserCreationView, self).get(*args, **kwargs)

    def post(self, *args, **kwargs):
        group_pk = kwargs.pop('group_pk')
        self.get_group(group_pk)
        ret = super(UserCreationView, self).post(*args, **kwargs)
        if self.object:
            self.object.groups.add(self.group)
            return redirect(
                reverse('dashboard.views.group-detail', args=[group_pk]))
        else:
            return ret


2740 2741 2742 2743 2744 2745 2746 2747 2748 2749 2750 2751 2752 2753 2754 2755 2756 2757 2758
class InterfaceDeleteView(DeleteView):
    model = Interface

    def get_template_names(self):
        if self.request.is_ajax():
            return ['dashboard/confirm/ajax-delete.html']
        else:
            return ['dashboard/confirm/base-delete.html']

    def get_context_data(self, **kwargs):
        context = super(InterfaceDeleteView, self).get_context_data(**kwargs)
        interface = self.get_object()
        context['text'] = _("Are you sure you want to remove this interface "
                            "from <strong>%(vm)s</strong>?" %
                            {'vm': interface.instance.name})
        return context

    def delete(self, request, *args, **kwargs):
        self.object = self.get_object()
2759
        instance = self.object.instance
2760

2761
        if not instance.has_level(request.user, "owner"):
2762 2763
            raise PermissionDenied()

2764
        instance.remove_interface(interface=self.object, user=request.user)
2765
        success_url = self.get_success_url()
2766
        success_message = _("Interface successfully deleted.")
2767 2768 2769

        if request.is_ajax():
            return HttpResponse(
2770 2771 2772 2773 2774 2775 2776
                json.dumps(
                    {'message': success_message,
                     'removed_network': {
                         'vlan': self.object.vlan.name,
                         'vlan_pk': self.object.vlan.pk,
                         'managed': self.object.host is not None,
                     }}),
2777 2778 2779 2780 2781 2782 2783 2784 2785 2786 2787
                content_type="application/json",
            )
        else:
            messages.success(request, success_message)
            return HttpResponseRedirect("%s#network" % success_url)

    def get_success_url(self):
        redirect = self.request.POST.get("next")
        if redirect:
            return redirect
        self.object.instance.get_absolute_url()
2788 2789 2790 2791 2792 2793 2794 2795 2796 2797 2798 2799 2800


@require_GET
def get_vm_screenshot(request, pk):
    instance = get_object_or_404(Instance, pk=pk)
    try:
        image = instance.screenshot(instance=instance,
                                    user=request.user).getvalue()
    except:
        # TODO handle this better
        raise Http404()

    return HttpResponse(image, mimetype="image/png")
2801 2802


2803
class ProfileView(LoginRequiredMixin, DetailView):
2804 2805
    template_name = "dashboard/profile.html"
    model = User
2806 2807
    slug_field = "username"
    slug_url_kwarg = "username"
2808 2809 2810

    def get_context_data(self, **kwargs):
        context = super(ProfileView, self).get_context_data(**kwargs)
2811 2812 2813
        user = self.get_object()
        context['profile'] = user
        context['avatar_url'] = get_user_avatar_url(user)
2814
        context['instances_owned'] = Instance.get_objects_with_level(
2815
            "owner", user, disregard_superuser=True).filter(destroyed_at=None)
2816
        context['instances_with_access'] = Instance.get_objects_with_level(
2817
            "user", user, disregard_superuser=True
2818
        ).filter(destroyed_at=None).exclude(pk__in=context['instances_owned'])
2819 2820 2821 2822

        group_profiles = GroupProfile.get_objects_with_level(
            "operator", self.request.user)
        groups = Group.objects.filter(groupprofile__in=group_profiles)
2823
        context['groups'] = user.groups.filter(pk__in=groups)
2824

2825 2826 2827 2828 2829
        # permissions
        # show groups only if the user is superuser, or have access
        # to any of the groups the user belongs to
        context['perm_group_list'] = (
            self.request.user.is_superuser or len(context['groups']) > 0)
2830 2831
        context['perm_email'] = (
            context['perm_group_list'] or self.request.user == user)
2832 2833 2834 2835 2836

        # filter the virtual machine list
        # if the logged in user is not superuser or not the user itself
        # filter the list so only those virtual machines are shown that are
        # originated from templates the logged in user is operator or higher
2837
        if not (self.request.user.is_superuser or self.request.user == user):
2838 2839 2840 2841 2842 2843
            it = InstanceTemplate.get_objects_with_level("operator",
                                                         self.request.user)
            context['instances_owned'] = context['instances_owned'].filter(
                template__in=it)
            context['instances_with_access'] = context[
                'instances_with_access'].filter(template__in=it)
2844 2845
        return context

2846 2847 2848

@require_POST
def toggle_use_gravatar(request, **kwargs):
2849
    user = get_object_or_404(User, username=kwargs['username'])
2850 2851 2852 2853 2854 2855 2856 2857 2858 2859 2860 2861 2862 2863 2864 2865
    if not request.user == user:
        raise PermissionDenied()

    profile = user.profile
    profile.use_gravatar = not profile.use_gravatar
    profile.save()

    new_avatar_url = get_user_avatar_url(user)
    return HttpResponse(
        json.dumps({'new_avatar_url': new_avatar_url}),
        content_type="application/json",
    )


def get_user_avatar_url(user):
    if user.profile.use_gravatar:
2866
        gravatar_hash = md5(user.email).hexdigest()
2867 2868 2869
        return "https://secure.gravatar.com/avatar/%s?s=200" % gravatar_hash
    else:
        return static("dashboard/img/avatar.png")