2 from __future__ import with_statement
4 # sfi -- slice-based facility interface
9 from optparse import OptionParser
10 from geni.util.cert import Keypair, Certificate
11 from geni.util.credential import Credential
12 from geni.util.geniclient import GeniClient, ServerException
13 from geni.util.gid import create_uuid
14 from geni.util.record import GeniRecord
15 from geni.util.rspec import Rspec
16 from types import StringTypes, ListType
18 sfi_dir = os.path.expanduser("~/.sfi/")
26 # Establish Connection to SliceMgr and Registry Servers
28 def set_servers(options):
35 if (options.sm is not None):
37 elif ("SFI_SM" in os.environ):
38 sm_url = os.environ["SFI_SM"]
40 print "No Known Slice Manager"
44 if (options.registry is not None):
45 reg_url = options.registry
46 elif ("SFI_REGISTRY" in os.environ):
47 reg_url = os.environ["SFI_REGISTRY"]
49 print "No Known Registry Server"
53 print "Contacting Slice Manager at:", sm_url
54 print "Contacting Registry at:", reg_url
57 if (options.user is not None):
59 elif ("SFI_USER" in os.environ):
60 user = os.environ["SFI_USER"]
62 print "No Known User Name"
66 if (options.auth is not None):
67 authority = options.auth
68 elif ("SFI_AUTH" in os.environ):
69 authority = os.environ["SFI_AUTH"]
73 # Get key and certificate
74 key_file = get_key_file()
75 cert_file = get_cert_file(key_file)
77 # Establish connection to server(s)
78 slicemgr = GeniClient(sm_url, key_file, cert_file)
79 registry = GeniClient(reg_url, key_file, cert_file)
83 # Get various credential and spec files
85 # Establishes limiting conventions
86 # - conflates MAs and SAs
87 # - assumes last token in slice name is unique
89 # Bootstraps credentials
90 # - bootstrap user credential from self-signed certificate
91 # - bootstrap authority credential from user credential
92 # - bootstrap slice credential from user credential
96 parts = name.split(".")
100 file = os.path.join(sfi_dir, get_leaf(user) + ".pkey")
101 if (os.path.isfile(file)):
104 print "Key file", file, "does not exist"
108 def get_cert_file(key_file):
111 file = os.path.join(sfi_dir, get_leaf(user) + ".cert")
112 if (os.path.isfile(file)):
115 k = Keypair(filename = key_file)
116 cert = Certificate(subject=user)
118 cert.set_issuer(k, user)
121 print "Writing self-signed certificate to", file
122 cert.save_to_file(file)
128 file = os.path.join(sfi_dir, get_leaf(user) + ".cred")
129 if (os.path.isfile(file)):
130 user_cred = Credential(filename=file)
133 # bootstrap user credential
134 user_cred = registry.get_credential(None, "user", user)
136 user_cred.save_to_file(file, save_parents=True)
138 print "Writing user credential to", file
141 print "Failed to get user credential"
148 print "no authority specified. Use -a or set SF_AUTH"
151 file = os.path.join(sfi_dir, get_leaf("authority") +".cred")
152 if (os.path.isfile(file)):
153 auth_cred = Credential(filename=file)
156 # bootstrap authority credential from user credential
157 user_cred = get_user_cred()
158 auth_cred = registry.get_credential(user_cred, "sa", authority)
160 auth_cred.save_to_file(file, save_parents=True)
162 print "Writing authority credential to", file
165 print "Failed to get authority credential"
168 def get_slice_cred(name):
169 file = os.path.join(sfi_dir, "slice_" + get_leaf(name) + ".cred")
170 if (os.path.isfile(file)):
171 slice_cred = Credential(filename=file)
174 # bootstrap slice credential from user credential
175 user_cred = get_user_cred()
176 slice_cred = registry.get_credential(user_cred, "slice", name)
178 slice_cred.save_to_file(file, save_parents=True)
180 print "Writing slice credential to", file
183 print "Failed to get slice credential"
186 def delegate_cred(cred, hrn, type = 'authority'):
187 # the gid and hrn of the object we are delegating
188 object_gid = cred.get_gid_object()
189 object_hrn = object_gid.get_hrn()
190 cred.set_delegate(True)
191 if not cred.get_delegate():
192 raise Exception, "Error: Object credential %(object_hrn)s does not have delegate bit set" % locals()
195 records = registry.resolve(cred, hrn)
196 records = filter_records(type, records)
199 raise Exception, "Error: Didn't find a %(type)s record for %(hrn)s" % locals()
201 # the gid of the user who will be delegated too
202 delegee_gid = records[0].get_gid_object()
203 delegee_hrn = delegee_gid.get_hrn()
205 # the key and hrn of the user who will be delegating
206 user_key = Keypair(filename = get_key_file())
207 user_hrn = cred.get_gid_caller().get_hrn()
209 dcred = Credential(subject=object_hrn + " delegated to " + delegee_hrn)
210 dcred.set_gid_caller(delegee_gid)
211 dcred.set_gid_object(object_gid)
212 dcred.set_privileges(cred.get_privileges())
213 dcred.set_delegate(True)
214 dcred.set_pubkey(object_gid.get_pubkey())
215 dcred.set_issuer(user_key, user_hrn)
216 dcred.set_parent(cred)
222 def get_rspec_file(rspec):
223 if (os.path.isabs(rspec)):
226 file = os.path.join(sfi_dir, rspec)
227 if (os.path.isfile(file)):
230 print "No such rspec file", rspec
233 def get_record_file(record):
234 if (os.path.isabs(record)):
237 file = os.path.join(sfi_dir, record)
238 if (os.path.isfile(file)):
241 print "No such registry record file", record
244 def load_publickey_string(fn):
246 key_string = f.read()
248 # if the filename is a private key file, then extract the public key
249 if "PRIVATE KEY" in key_string:
250 outfn = tempfile.mktemp()
251 cmd = "openssl rsa -in " + fn + " -pubout -outform PEM -out " + outfn
254 key_string = f.read()
260 # Generate sub-command parser
262 def create_cmd_parser(command, additional_cmdargs = None):
263 cmdargs = {"list": "name",
269 "resources": "[name]",
270 "create": "name rspec",
278 if additional_cmdargs:
279 cmdargs.update(additional_cmdargs)
281 if command not in cmdargs:
282 print "Invalid command\n"
284 for key in cmdargs.keys():
289 parser = OptionParser(usage="sfi [sfi_options] %s [options] %s" \
290 % (command, cmdargs[command]))
291 if command in ("resources"):
292 parser.add_option("-f", "--format", dest="format",type="choice",
293 help="display format (dns|ip|rspec)",default="rspec",
294 choices=("dns","ip","rspec"))
295 if command in ("list", "show", "remove"):
296 parser.add_option("-t", "--type", dest="type",type="choice",
297 help="type filter (user|slice|sa|ma|node|aggregate)",
298 choices=("user","slice","sa","ma","node","aggregate", "all"),
300 if command in ("show", "list", "resources"):
301 parser.add_option("-o", "--output", dest="file",
302 help="output XML to file", metavar="FILE", default=None)
303 if command in ("delegate"):
304 parser.add_option("-u", "--user",
305 action="store_true", dest="delegate_user", default=False,
306 help="delegate user credential")
307 parser.add_option("-s", "--slice", dest="delegate_slice",
308 help="delegate slice credential", metavar="HRN", default=None)
312 # Generate command line parser
313 parser = OptionParser(usage="sfi [options] command [command_options] [command_args]",
314 description="Commands: list,show,remove,add,update,nodes,slices,resources,create,delete,start,stop,reset")
315 parser.add_option("-r", "--registry", dest="registry",
316 help="root registry", metavar="URL", default=None)
317 parser.add_option("-s", "--slicemgr", dest="sm",
318 help="slice manager", metavar="URL", default=None)
319 parser.add_option("-d", "--dir", dest="dir",
320 help="working directory", metavar="PATH", default = sfi_dir)
321 parser.add_option("-u", "--user", dest="user",
322 help="user name", metavar="HRN", default=None)
323 parser.add_option("-a", "--auth", dest="auth",
324 help="authority name", metavar="HRN", default=None)
325 parser.add_option("-v", "--verbose",
326 action="store_true", dest="verbose", default=False,
328 parser.disable_interspersed_args()
332 def dispatch(command, cmd_opts, cmd_args):
333 globals()[command](cmd_opts, cmd_args)
336 # Main: parse arguments and dispatch to command
341 parser = create_parser()
342 (options, args) = parser.parse_args()
345 print "No command given. Use -h for help."
349 (cmd_opts, cmd_args) = create_cmd_parser(command).parse_args(args[1:])
350 verbose = options.verbose
352 print "Resgistry %s, sm %s, dir %s, user %s, auth %s" % (options.registry,
357 print "Command %s" %command
358 if command in ("resources"):
359 print "resources cmd_opts %s" %cmd_opts.format
360 elif command in ("list","show","remove"):
361 print "cmd_opts.type %s" %cmd_opts.type
362 print "cmd_args %s" %cmd_args
367 dispatch(command, cmd_opts, cmd_args)
369 print "Command not found:", command
375 # Following functions implement the commands
377 # Registry-related commands
380 # list entires in named authority registry
381 def list(opts, args):
383 user_cred = get_user_cred()
384 list = registry.list(user_cred, args[0])
385 # filter on person, slice, site, node, etc.
386 # THis really should be in the filter_records funct def comment...
387 list = filter_records(opts.type, list)
388 display_records(list)
390 save_records_to_file(opts.file, list)
393 # show named registry record
394 def show(opts, args):
396 user_cred = get_user_cred()
397 records = registry.resolve(user_cred, args[0])
398 records = filter_records(opts.type, records)
400 print "No record of type", opts.type
401 display_records(records, True)
403 save_records_to_file(opts.file, records)
406 def delegate(opts, args):
408 user_cred = get_user_cred()
409 if opts.delegate_user:
410 object_cred = user_cred
411 elif opts.delegate_slice:
412 object_cred = get_slice_cred(opts.delegate_slice)
414 print "Must specify either --user or --slice <hrn>"
417 # the gid and hrn of the object we are delegating
418 object_gid = object_cred.get_gid_object()
419 object_hrn = object_gid.get_hrn()
421 if not object_cred.get_delegate():
422 print "Error: Object credential", object_hrn, "does not have delegate bit set"
425 records = registry.resolve(user_cred, args[0])
426 records = filter_records("user", records)
429 print "Error: Didn't find a user record for", args[0]
432 # the gid of the user who will be delegated too
433 delegee_gid = records[0].get_gid_object()
434 delegee_hrn = delegee_gid.get_hrn()
436 # the key and hrn of the user who will be delegating
437 user_key = Keypair(filename = get_key_file())
438 user_hrn = user_cred.get_gid_caller().get_hrn()
440 dcred = Credential(subject=object_hrn + " delegated to " + delegee_hrn)
441 dcred.set_gid_caller(delegee_gid)
442 dcred.set_gid_object(object_gid)
443 dcred.set_privileges(object_cred.get_privileges())
444 dcred.set_delegate(True)
445 dcred.set_pubkey(object_gid.get_pubkey())
446 dcred.set_issuer(user_key, user_hrn)
447 dcred.set_parent(object_cred)
451 if opts.delegate_user:
452 dest_fn = os.path.join(sfi_dir, get_leaf(delegee_hrn) + "_" + get_leaf(object_hrn) + ".cred")
453 elif opts.delegate_slice:
454 dest_fn = os.path_join(sfi_dir, get_leaf(delegee_hrn) + "_slice_" + get_leaf(object_hrn) + ".cred")
456 dcred.save_to_file(dest_fn, save_parents = True)
458 print "delegated credential for", object_hrn, "to", delegee_hrn, "and wrote to", dest_fn
460 # removed named registry record
461 # - have to first retrieve the record to be removed
462 def remove(opts, args):
464 auth_cred = get_auth_cred()
465 return registry.remove(auth_cred, opts.type, args[0])
467 # add named registry record
470 auth_cred = get_auth_cred()
471 rec_file = get_record_file(args[0])
472 record = load_record_from_file(rec_file)
474 # check and see if we need to create a gid for this record. The creator
475 # of the record signals this by filling in the create_gid, create_gid_hrn,
476 # and create_gid_key members.
477 # (note: we'd use an unsigned GID in the record instead, but pyOpenSSL is
478 # broken and has no way for us to get the key back out of the gid)
479 geni_info = record.get_geni_info()
480 if "create_gid" in geni_info:
481 key_string = geni_info["create_gid_key"].replace("|","\n") # XXX smbaker: the rspec kills newlines
482 gid = registry.create_gid(auth_cred, geni_info["create_gid_hrn"], create_uuid(), key_string)
485 del geni_info["create_gid"]
486 del geni_info["create_gid_hrn"]
487 del geni_info["create_gid_key"]
489 return registry.register(auth_cred, record)
491 # update named registry entry
492 def update(opts, args):
494 user_cred = get_user_cred()
495 rec_file = get_record_file(args[0])
496 record = load_record_from_file(rec_file)
497 if record.get_type() == "user":
498 if record.get_name() == user_cred.get_gid_object().get_hrn():
501 create = get_auth_cred()
502 elif record.get_type() in ["slice"]:
504 cred = get_slice_cred(record.get_name())
505 except ServerException, e:
506 # XXX smbaker -- once we have better error return codes, update this
507 # to do something better than a string compare
508 if "Permission error" in e.args[0]:
509 cred = get_auth_cred()
512 elif record.get_type() in ["authority"]:
513 cred = get_auth_cred()
515 raise "unknown record type" + record.get_type()
516 return registry.update(cred, record)
519 # Slice-related commands
522 # list available nodes -- now use 'resources' w/ no argument instead
523 #def nodes(opts, args):
525 # user_cred = get_user_cred()
526 # if not opts.format:
529 # context = opts.format
530 # results = slicemgr.list_nodes(user_cred)
531 # if opts.format in ['rspec']:
532 # display_rspec(results)
534 # display_list(results)
535 # if (opts.file is not None):
536 # rspec = slicemgr.list_nodes(user_cred)
537 # save_rspec_to_file(rspec, opts.file)
540 # list instantiated slices
541 def slices(opts, args):
543 user_cred = get_user_cred()
544 results = slicemgr.get_slices(user_cred)
545 display_list(results)
548 # show rspec for named slice
549 def resources(opts, args):
552 slice_cred = get_slice_cred(args[0])
553 result = slicemgr.get_resources(slice_cred, args[0])
555 user_cred = get_user_cred()
556 result = slicemgr.get_resources(user_cred)
558 display_rspec(result, format)
559 if (opts.file is not None):
560 save_rspec_to_file(opts.file, result)
563 # created named slice with given rspec
564 def create(opts, args):
567 slice_cred = get_slice_cred(slice_hrn)
568 rspec_file = get_rspec_file(args[1])
569 with open(rspec_file) as f:
571 return slicemgr.create_slice(slice_cred, slice_hrn, rspec)
574 def delete(opts, args):
577 slice_cred = get_slice_cred(slice_hrn)
579 return slicemgr.delete_slice(slice_cred, slice_hrn)
582 def start(opts, args):
584 slice_cred = get_slice_cred(args[0])
585 return slicemgr.start_slice(slice_cred)
588 def stop(opts, args):
590 slice_cred = get_slice_cred(args[0])
591 return slicemgr.stop_slice(slice_cred)
594 def reset(opts, args):
596 slice_cred = get_slice_cred(args[0])
597 return slicemgr.reset_slice(slice_cred)
601 # Display, Save, and Filter RSpecs and Records
602 # - to be replace by EMF-generated routines
606 def display_rspec(rspec, format = 'rspec'):
607 if format in ['dns']:
609 spec.parseString(rspec)
611 nodespecs = spec.getDictsByTagName('NodeSpec')
612 for nodespec in nodespecs:
613 if nodespec.has_key('name') and nodespec['name']:
614 if isinstance(nodespec['name'], ListType):
615 hostnames.extend(nodespec['name'])
616 elif isinstance(nodespec['name'], StringTypes):
617 hostnames.append(nodespec['name'])
619 elif format in ['ip']:
621 spec.parseString(rspec)
623 ifspecs = spec.getDictsByTagName('IfSpec')
624 for ifspec in ifspecs:
625 if ifspec.has_key('addr') and ifspec['addr']:
626 ips.append(ifspec['addr'])
634 def display_list(results):
635 for result in results:
638 def save_rspec_to_file(rspec, filename):
639 if not filename.startswith(os.sep):
640 filename = sfi_dir + filename
641 if not filename.endswith(".rspec"):
642 filename = filename + ".rspec"
644 f = open(filename, 'w')
649 def display_records(recordList, dump = False):
650 ''' Print all fields in the record'''
651 for record in recordList:
652 display_record(record, dump)
654 def display_record(record, dump = False):
658 info = record.getdict()
659 print "%s (%s)" % (info['hrn'], info['type'])
662 def filter_records(type, records):
663 filtered_records = []
664 for record in records:
665 if (record.get_type() == type) or (type == "all"):
666 filtered_records.append(record)
667 return filtered_records
669 def save_records_to_file(filename, recordList):
671 for record in recordList:
673 save_record_to_file(filename + "." + str(index), record)
675 save_record_to_file(filename, record)
678 def save_record_to_file(filename, record):
679 if not filename.startswith(os.sep):
680 filename = sfi_dir + filename
681 str = record.save_to_string()
682 file(filename, "w").write(str)
685 def load_record_from_file(filename):
686 str = file(filename, "r").read()
687 record = GeniRecord(string=str)
690 if __name__=="__main__":