6 # read the planetlab database and update the local registry database accordingly
7 # (in other words, with this testbed, the SFA registry is *not* authoritative)
8 # so we update the following collections
9 # . authorities (from pl sites)
10 # . node (from pl nodes)
11 # . users+keys (from pl persons and attached keys)
12 # known limitation : *one* of the ssh keys is chosen at random here
13 # xxx todo/check xxx at the very least, when a key is known to the registry
14 # and is still current in plc
15 # then we should definitely make sure to keep that one in sfa...
16 # . slice+researchers (from pl slices and attached users)
21 from sfa.util.config import Config
22 from sfa.util.xrn import Xrn, get_leaf, get_authority, hrn_to_urn
24 from sfa.trust.gid import create_uuid
25 from sfa.trust.certificate import convert_public_key, Keypair
27 # using global alchemy.session() here is fine
28 # as importer is on standalone one-shot process
29 from sfa.storage.alchemy import global_dbsession
30 from sfa.storage.model import RegRecord, RegAuthority, RegSlice, RegNode, RegUser, RegKey
32 from sfa.planetlab.plshell import PlShell
33 from sfa.planetlab.plxrn import hostname_to_hrn, slicename_to_hrn, email_to_hrn, hrn_to_pl_slicename
35 def _get_site_hrn(interface_hrn, site):
36 # Hardcode 'internet2' into the hrn for sites hosting
37 # internet2 nodes. This is a special operation for some vini
39 hrn = ".".join([interface_hrn, site['login_base']])
40 if ".vini" in interface_hrn and interface_hrn.endswith('vini'):
41 if site['login_base'].startswith("i2") or site['login_base'].startswith("nlr"):
42 hrn = ".".join([interface_hrn, "internet2", site['login_base']])
48 def __init__ (self, auth_hierarchy, logger):
49 self.auth_hierarchy = auth_hierarchy
52 def add_options (self, parser):
53 # we don't have any options for now
56 # hrn hash is initialized from current db
57 # remember just-created records as we go
58 # xxx might make sense to add a UNIQUE constraint in the db itself
59 def remember_record_by_hrn (self, record):
60 tuple = (record.type, record.hrn)
61 if tuple in self.records_by_type_hrn:
62 self.logger.warning ("PlImporter.remember_record_by_hrn: duplicate (%s,%s)"%tuple)
64 self.records_by_type_hrn [ tuple ] = record
66 # ditto for pointer hash
67 def remember_record_by_pointer (self, record):
68 if record.pointer == -1:
69 self.logger.warning ("PlImporter.remember_record_by_pointer: pointer is void")
71 tuple = (record.type, record.pointer)
72 if tuple in self.records_by_type_pointer:
73 self.logger.warning ("PlImporter.remember_record_by_pointer: duplicate (%s,%s)"%tuple)
75 self.records_by_type_pointer [ ( record.type, record.pointer,) ] = record
77 def remember_record (self, record):
78 self.remember_record_by_hrn (record)
79 self.remember_record_by_pointer (record)
81 def locate_by_type_hrn (self, type, hrn):
82 return self.records_by_type_hrn.get ( (type, hrn), None)
84 def locate_by_type_pointer (self, type, pointer):
85 return self.records_by_type_pointer.get ( (type, pointer), None)
87 # a convenience/helper function to see if a record is already known
88 # a former, broken, attempt (in 2.1-9) had been made
89 # to try and use 'pointer' as a first, most significant attempt
90 # the idea being to preserve stuff as much as possible, and thus
91 # to avoid creating a new gid in the case of a simple hrn rename
92 # however this of course doesn't work as the gid depends on the hrn...
93 #def locate (self, type, hrn=None, pointer=-1):
95 # attempt = self.locate_by_type_pointer (type, pointer)
96 # if attempt : return attempt
98 # attempt = self.locate_by_type_hrn (type, hrn,)
99 # if attempt : return attempt
102 # this makes the run method a bit abtruse - out of the way
103 def create_special_vini_record (self, interface_hrn):
104 # special case for vini
105 if ".vini" in interface_hrn and interface_hrn.endswith('vini'):
106 # create a fake internet2 site first
107 i2site = {'name': 'Internet2', 'login_base': 'internet2', 'site_id': -1}
108 site_hrn = _get_site_hrn(interface_hrn, i2site)
109 # import if hrn is not in list of existing hrns or if the hrn exists
110 # but its not a site record
111 if ( 'authority', site_hrn, ) not in self.records_by_type_hrn:
112 urn = hrn_to_urn(site_hrn, 'authority')
113 if not self.auth_hierarchy.auth_exists(urn):
114 self.auth_hierarchy.create_auth(urn)
115 auth_info = self.auth_hierarchy.get_auth_info(urn)
116 auth_record = RegAuthority(hrn=site_hrn, gid=auth_info.get_gid_object(),
117 pointer=site['site_id'],
118 authority=get_authority(site_hrn))
119 auth_record.just_created()
120 global_dbsession.add(auth_record)
121 global_dbsession.commit()
122 self.logger.info("PlImporter: Imported authority (vini site) %s"%auth_record)
123 self.remember_record ( site_record )
125 def run (self, options):
127 interface_hrn = config.SFA_INTERFACE_HRN
128 root_auth = config.SFA_REGISTRY_ROOT_AUTH
129 shell = PlShell (config)
131 ######## retrieve all existing SFA objects
132 all_records = global_dbsession.query(RegRecord).all()
134 # create hash by (type,hrn)
135 # we essentially use this to know if a given record is already known to SFA
136 self.records_by_type_hrn = \
137 dict ( [ ( (record.type, record.hrn) , record ) for record in all_records ] )
138 # create hash by (type,pointer)
139 self.records_by_type_pointer = \
140 dict ( [ ( (record.type, record.pointer) , record ) for record in all_records
141 if record.pointer != -1] )
143 # initialize record.stale to True by default, then mark stale=False on the ones that are in use
144 for record in all_records: record.stale=True
146 ######## retrieve PLC data
148 # retrieve only required stuf
149 sites = shell.GetSites({'peer_id': None, 'enabled' : True},
150 ['site_id','login_base','node_ids','slice_ids','person_ids', 'name'])
151 # create a hash of sites by login_base
152 # sites_by_login_base = dict ( [ ( site['login_base'], site ) for site in sites ] )
154 persons = shell.GetPersons({'peer_id': None, 'enabled': True},
155 ['person_id', 'email', 'key_ids', 'site_ids', 'role_ids'])
156 # create a hash of persons by person_id
157 persons_by_id = dict ( [ ( person['person_id'], person) for person in persons ] )
158 # also gather non-enabled user accounts so as to issue relevant warnings
159 disabled_persons = shell.GetPersons({'peer_id': None, 'enabled': False}, ['person_id'])
160 disabled_person_ids = [ person['person_id'] for person in disabled_persons ]
161 # Get all plc public keys
162 # accumulate key ids for keys retrieval
164 for person in persons:
165 key_ids.extend(person['key_ids'])
166 keys = shell.GetKeys( {'peer_id': None, 'key_id': key_ids,
168 # create a hash of keys by key_id
169 keys_by_id = dict ( [ ( key['key_id'], key ) for key in keys ] )
170 # create a dict person_id -> [ (plc)keys ]
171 keys_by_person_id = {}
172 for person in persons:
174 for key_id in person['key_ids']:
175 # by construction all the keys we fetched are ssh keys
176 # so gpg keys won't be in there
178 key = keys_by_id[key_id]
181 self.logger.warning("Could not spot key %d - probably non-ssh"%key_id)
182 keys_by_person_id[person['person_id']] = pubkeys
184 nodes = shell.GetNodes( {'peer_id': None}, ['node_id', 'hostname', 'site_id'])
185 # create hash by node_id
186 nodes_by_id = dict ( [ ( node['node_id'], node, ) for node in nodes ] )
188 slices = shell.GetSlices( {'peer_id': None}, ['slice_id', 'name', 'person_ids'])
189 # create hash by slice_id
190 slices_by_id = dict ( [ (slice['slice_id'], slice ) for slice in slices ] )
192 # isolate special vini case in separate method
193 self.create_special_vini_record (interface_hrn)
195 # Get top authority record
196 top_auth_record=self.locate_by_type_hrn ('authority', root_auth)
202 site_sfa_created = shell.GetSiteSfaCreated(site['site_id'])
204 site_sfa_created = None
205 if site['name'].startswith('sfa:') or site_sfa_created == 'True':
208 site_hrn = _get_site_hrn(interface_hrn, site)
209 # import if hrn is not in list of existing hrns or if the hrn exists
210 # but its not a site record
211 site_record=self.locate_by_type_hrn ('authority', site_hrn)
214 urn = hrn_to_urn(site_hrn, 'authority')
215 if not self.auth_hierarchy.auth_exists(urn):
216 self.auth_hierarchy.create_auth(urn)
217 auth_info = self.auth_hierarchy.get_auth_info(urn)
218 site_record = RegAuthority(hrn=site_hrn, gid=auth_info.get_gid_object(),
219 pointer=site['site_id'],
220 authority=get_authority(site_hrn))
221 site_record.just_created()
222 global_dbsession.add(site_record)
223 global_dbsession.commit()
224 self.logger.info("PlImporter: imported authority (site) : %s" % site_record)
225 self.remember_record (site_record)
227 # if the site import fails then there is no point in trying to import the
228 # site's child records (node, slices, persons), so skip them.
229 self.logger.log_exc("PlImporter: failed to import site %s. Skipping child records"%site_hrn)
232 # xxx update the record ...
234 site_record.stale=False
236 # import node records
237 for node_id in site['node_ids']:
239 node = nodes_by_id[node_id]
241 self.logger.warning ("PlImporter: cannot find node_id %s - ignored"%node_id)
243 site_auth = get_authority(site_hrn)
244 site_name = site['login_base']
245 node_hrn = hostname_to_hrn(site_auth, site_name, node['hostname'])
246 # xxx this sounds suspicious
247 if len(node_hrn) > 64: node_hrn = node_hrn[:64]
248 node_record = self.locate_by_type_hrn ( 'node', node_hrn )
251 pkey = Keypair(create=True)
252 urn = hrn_to_urn(node_hrn, 'node')
253 node_gid = self.auth_hierarchy.create_gid(urn, create_uuid(), pkey)
254 node_record = RegNode (hrn=node_hrn, gid=node_gid,
255 pointer =node['node_id'],
256 authority=get_authority(node_hrn))
257 node_record.just_created()
258 global_dbsession.add(node_record)
259 global_dbsession.commit()
260 self.logger.info("PlImporter: imported node: %s" % node_record)
261 self.remember_record (node_record)
263 self.logger.log_exc("PlImporter: failed to import node %s"%node_hrn)
266 # xxx update the record ...
268 node_record.stale=False
272 for person_id in site['person_ids']:
274 if person_id in persons_by_id:
275 person=persons_by_id[person_id]
277 elif person_id in disabled_person_ids:
280 self.logger.warning ("PlImporter: cannot locate person_id %s in site %s - ignored"%(person_id,site_hrn))
281 # make sure to NOT run this if anything is wrong
282 if not proceed: continue
284 person_hrn = email_to_hrn(site_hrn, person['email'])
285 # xxx suspicious again
286 if len(person_hrn) > 64: person_hrn = person_hrn[:64]
287 person_urn = hrn_to_urn(person_hrn, 'user')
289 user_record = self.locate_by_type_hrn ( 'user', person_hrn)
291 # return a tuple pubkey (a plc key object) and pkey (a Keypair object)
292 def init_person_key (person, plc_keys):
294 if person['key_ids']:
295 # randomly pick first key in set
298 pkey = convert_public_key(pubkey['key'])
300 self.logger.warn('PlImporter: unable to convert public key for %s' % person_hrn)
301 pkey = Keypair(create=True)
303 # the user has no keys. Creating a random keypair for the user's gid
304 self.logger.warn("PlImporter: person %s does not have a PL public key"%person_hrn)
305 pkey = Keypair(create=True)
306 return (pubkey, pkey)
310 plc_keys = keys_by_person_id.get(person['person_id'],[])
312 (pubkey,pkey) = init_person_key (person, plc_keys )
313 person_gid = self.auth_hierarchy.create_gid(person_urn, create_uuid(), pkey, email=person['email'])
314 user_record = RegUser (hrn=person_hrn, gid=person_gid,
315 pointer=person['person_id'],
316 authority=get_authority(person_hrn),
317 email=person['email'])
319 user_record.reg_keys=[RegKey (pubkey['key'], pubkey['key_id'])]
321 self.logger.warning("No key found for user %s"%user_record)
322 user_record.just_created()
323 global_dbsession.add (user_record)
324 global_dbsession.commit()
325 self.logger.info("PlImporter: imported person: %s" % user_record)
326 self.remember_record ( user_record )
328 # update the record ?
330 # if a user key has changed then we need to update the
331 # users gid by forcing an update here
333 # right now, SFA only has *one* key attached to a user, and this is
334 # the key that the GID was made with
335 # so the logic here is, we consider that things are OK (unchanged) if
336 # all the SFA keys are present as PLC keys
337 # otherwise we trigger the creation of a new gid from *some* plc key
338 # and record this on the SFA side
339 # it would make sense to add a feature in PLC so that one could pick a 'primary'
340 # key but this is not available on the myplc side for now
341 # = or = it would be much better to support several keys in SFA but that
342 # does not seem doable without a major overhaul in the data model as
343 # a GID is attached to a hrn, but it's also linked to a key, so...
344 # NOTE: with this logic, the first key entered in PLC remains the one
345 # current in SFA until it is removed from PLC
346 sfa_keys = user_record.reg_keys
347 def sfa_key_in_list (sfa_key,plc_keys):
348 for plc_key in plc_keys:
349 if plc_key['key']==sfa_key.key:
352 # are all the SFA keys known to PLC ?
354 if not sfa_keys and plc_keys:
357 for sfa_key in sfa_keys:
358 if not sfa_key_in_list (sfa_key,plc_keys):
361 (pubkey,pkey) = init_person_key (person, plc_keys)
362 person_gid = self.auth_hierarchy.create_gid(person_urn, create_uuid(), pkey)
363 person_gid.set_email(person['email'])
365 user_record.reg_keys=[]
367 user_record.reg_keys=[ RegKey (pubkey['key'], pubkey['key_id'])]
368 user_record.gid = person_gid
369 user_record.just_updated()
370 self.logger.info("PlImporter: updated person: %s" % user_record)
371 user_record.email = person['email']
372 global_dbsession.commit()
373 user_record.stale=False
374 # accumulate PIs - PLCAPI has a limitation that when someone has PI role
375 # this is valid for all sites she is in..
376 # PI is coded with role_id==20
377 if 20 in person['role_ids']:
378 site_pis.append (user_record)
380 # PL Admins need to marked as PI of the top authority record
381 if 10 in person['role_ids'] and user_record not in top_auth_record.reg_pis:
382 admins.append(user_record)
385 self.logger.log_exc("PlImporter: failed to import person %d %s"%(person['person_id'],person['email']))
387 # maintain the list of PIs for a given site
388 # for the record, Jordan had proposed the following addition as a welcome hotfix to a previous version:
389 # site_pis = list(set(site_pis))
390 # this was likely due to a bug in the above logic, that had to do with disabled persons
391 # being improperly handled, and where the whole loop on persons
392 # could be performed twice with the same person...
393 # so hopefully we do not need to eliminate duplicates explicitly here anymore
394 site_record.reg_pis = list(set(site_pis))
395 global_dbsession.commit()
398 for slice_id in site['slice_ids']:
400 slice = slices_by_id[slice_id]
402 self.logger.warning ("PlImporter: cannot locate slice_id %s - ignored"%slice_id)
403 slice_hrn = slicename_to_hrn(interface_hrn, slice['name'])
404 slice_record = self.locate_by_type_hrn ('slice', slice_hrn)
407 pkey = Keypair(create=True)
408 urn = hrn_to_urn(slice_hrn, 'slice')
409 slice_gid = self.auth_hierarchy.create_gid(urn, create_uuid(), pkey)
410 slice_record = RegSlice (hrn=slice_hrn, gid=slice_gid,
411 pointer=slice['slice_id'],
412 authority=get_authority(slice_hrn))
413 slice_record.just_created()
414 global_dbsession.add(slice_record)
415 global_dbsession.commit()
416 self.logger.info("PlImporter: imported slice: %s" % slice_record)
417 self.remember_record ( slice_record )
419 self.logger.log_exc("PlImporter: failed to import slice %s (%s)"%(slice_hrn,slice['name']))
421 # xxx update the record ...
422 # given that we record the current set of users anyways, there does not seem to be much left to do here
423 # self.logger.warning ("Slice update not yet implemented on slice %s (%s)"%(slice_hrn,slice['name']))
425 # record current users affiliated with the slice
426 slice_record.reg_researchers = \
427 [ self.locate_by_type_pointer ('user',user_id) for user_id in slice['person_ids'] ]
428 global_dbsession.commit()
429 slice_record.stale=False
431 # Set PL Admins as PI's of the top authority
433 top_auth_record.reg_pis = list(set(admins))
434 global_dbsession.commit()
435 self.logger.info('PlImporter: set PL admins %s as PIs of %s'%(admins,top_auth_record.hrn))
437 ### remove stale records
438 # special records must be preserved
439 system_hrns = [interface_hrn, root_auth, interface_hrn + '.slicemanager']
440 for record in all_records:
441 if record.hrn in system_hrns:
443 if record.peer_authority:
445 if ".vini" in interface_hrn and interface_hrn.endswith('vini') and \
446 record.hrn.endswith("internet2"):
449 for record in all_records:
450 try: stale=record.stale
453 self.logger.warning("stale not found with %s"%record)
455 self.logger.info("PlImporter: deleting stale record: %s" % record)
456 global_dbsession.delete(record)
457 global_dbsession.commit()