4 from collections import defaultdict
5 from django.db.models import F, Q
6 from planetstack.config import Config
7 from observer.openstacksyncstep import OpenStackSyncStep
8 from core.models.site import SiteDeployments, Deployment
9 from core.models.user import User
10 from core.models.userdeployments import UserDeployments
11 from util.logger import Logger, logging
13 logger = Logger(level=logging.INFO)
15 class SyncUserDeployments(OpenStackSyncStep):
16 provides=[User, UserDeployments]
19 def fetch_pending(self):
20 # user deployments are not visible to users. We must ensure
21 # user are deployed at all deploymets available to their sites.
23 deployments = Deployment.objects.all()
24 site_deployments = SiteDeployments.objects.all()
25 site_deploy_lookup = defaultdict(list)
26 for site_deployment in site_deployments:
27 site_deploy_lookup[site_deployment.site].append(site_deployment.deployment)
29 user_deploy_lookup = defaultdict(list)
30 for user_deployment in UserDeployments.objects.all():
31 user_deploy_lookup[user_deployment.user].append(user_deployment.deployment)
33 all_deployments = Deployment.objects.filter()
34 for user in User.objects.all():
36 # admins should have an account at all deployments
37 expected_deployments = deployments
39 # normal users should have an account at their site's deployments
40 #expected_deployments = site_deploy_lookup[user.site]
41 # users are added to all deployments for now
42 expected_deployments = deployments
43 for expected_deployment in expected_deployments:
44 if not user in user_deploy_lookup or \
45 expected_deployment not in user_deploy_lookup[user]:
47 ud = UserDeployments(user=user, deployment=expected_deployment)
49 #user_deployments.append(ud)
51 # # update existing record
52 # ud = UserDeployments.objects.get(user=user, deployment=expected_deployment)
53 # user_deployments.append(ud)
55 return UserDeployments.objects.filter(Q(enacted__lt=F('updated')) | Q(enacted=None))
57 def sync_record(self, user_deployment):
58 logger.info("sync'ing user %s at deployment %s" % (user_deployment.user, user_deployment.deployment.name))
59 name = user_deployment.user.email[:user_deployment.user.email.find('@')]
60 user_fields = {'name': user_deployment.user.email,
61 'email': user_deployment.user.email,
62 'password': hashlib.md5(user_deployment.user.password).hexdigest()[:6],
64 driver = self.driver.admin_driver(deployment=user_deployment.deployment.name)
65 if not user_deployment.kuser_id:
66 keystone_user = driver.create_user(**user_fields)
67 user_deployment.kuser_id = keystone_user.id
69 driver.update_user(user_deployment.kuser_id, user_fields)
71 # setup user deployment home site roles
72 if user_deployment.user.site:
73 site_deployments = SiteDeployments.objects.filter(site=user_deployment.user.site,
74 deployment=user_deployment.deployment)
76 # need the correct tenant id for site at the deployment
77 tenant_id = site_deployments[0].tenant_id
78 driver.add_user_role(user_deployment.kuser_id,
80 if user_deployment.user.is_admin:
81 driver.add_user_role(user_deployment.kuser_id, tenant_id, 'admin')
83 # may have admin role so attempt to remove it
84 driver.delete_user_role(user_deployment.kuser_id, tenant_id, 'admin')
86 #if user_deployment.user.public_key:
87 # if not user_deployment.user.keyname:
88 # keyname = user_deployment.user.email.lower().replace('@', 'AT').replace('.', '')
89 # user_deployment.user.keyname = keyname
90 # user_deployment.user.save()
92 # user_driver = driver.client_driver(caller=user_deployment.user,
93 # tenant=user_deployment.user.site.login_base,
94 # deployment=user_deployment.deployment.name)
95 # key_fields = {'name': user_deployment.user.keyname,
96 # 'public_key': user_deployment.user.public_key}
97 # user_driver.create_keypair(**key_fields)
99 user_deployment.save()