2 # The import tool assumes that the existing PLC hierarchy should all be part
3 # of "planetlab.us" (see the root_auth and level1_auth variables below).
5 # Public keys are extracted from the users' SSH keys automatically and used to
6 # create GIDs. This is relatively experimental as a custom tool had to be
7 # written to perform conversion from SSH to OpenSSL format. It only supports
8 # RSA keys at this time, not DSA keys.
11 from sfa.util.sfalogging import _SfaLogger
12 from sfa.util.xrn import get_authority, hrn_to_urn
13 from sfa.util.plxrn import email_to_hrn
14 from sfa.util.config import Config
15 from sfa.trust.certificate import convert_public_key, Keypair
16 from sfa.trust.trustedroots import TrustedRoots
17 from sfa.trust.hierarchy import Hierarchy
18 from sfa.trust.gid import create_uuid
19 from sfa.storage.persistentobjs import RegRecord, RegAuthority, RegUser
20 from sfa.storage.persistentobjs import RegAuthoritySa, RegAuthorityAm, RegAuthoritySm
21 from sfa.storage.alchemy import dbsession
24 if isinstance(str, unicode):
25 return str.encode("ascii", "ignore")
29 def _cleanup_string(str):
30 # pgsql has a fit with strings that have high ascii in them, so filter it
31 # out when generating the hrns.
38 str = _un_unicode(str)
39 str = str.replace(" ", "_")
40 str = str.replace(".", "_")
41 str = str.replace("(", "_")
42 str = str.replace("'", "_")
43 str = str.replace(")", "_")
44 str = str.replace('"', "_")
50 self.logger = _SfaLogger(logfile='/var/log/sfa_import.log', loggername='importlog')
51 self.AuthHierarchy = Hierarchy()
52 self.config = Config()
53 self.TrustedRoots = TrustedRoots(Config.get_trustedroots_dir(self.config))
54 self.root_auth = self.config.SFA_REGISTRY_ROOT_AUTH
56 def create_top_level_records(self):
58 Create top level and interface records
60 # create root authority
61 interface_hrn = self.config.SFA_INTERFACE_HRN
62 self.create_top_level_auth_records(interface_hrn)
64 # create s user record for the slice manager
65 self.create_sm_client_record()
67 # create interface records
68 self.logger.info("Import: creating interface records")
69 # xxx authority+ turning off the creation of authority+*
70 # in fact his is required - used in SfaApi._getCredentialRaw
71 # that tries to locate 'authority+sa'
72 self.create_interface_records()
74 # add local root authority's cert to trusted list
75 self.logger.info("Import: adding " + interface_hrn + " to trusted list")
76 authority = self.AuthHierarchy.get_auth_info(interface_hrn)
77 self.TrustedRoots.add_gid(authority.get_gid_object())
79 def create_top_level_auth_records(self, hrn):
81 Create top level db records (includes root and sub authorities (local/remote)
83 # make sure parent exists
84 parent_hrn = get_authority(hrn)
87 if not parent_hrn == hrn:
88 self.create_top_level_auth_records(parent_hrn)
90 # ensure key and cert exists:
91 self.AuthHierarchy.create_top_level_auth(hrn)
92 # create the db record if it doesnt already exist
93 auth_info = self.AuthHierarchy.get_auth_info(hrn)
94 auth_record = RegAuthority()
96 auth_record.gid=auth_info.get_gid_object()
97 auth_record.authority=get_authority(hrn)
98 auth_record.just_created()
99 dbsession.add (auth_record)
101 self.logger.info("Import: imported authority (parent) %s " % auth_record)
103 def create_sm_client_record(self):
105 Create a user record for the Slicemanager service.
107 hrn = self.config.SFA_INTERFACE_HRN + '.slicemanager'
108 urn = hrn_to_urn(hrn, 'user')
109 if not self.AuthHierarchy.auth_exists(urn):
110 self.logger.info("Import: creating Slice Manager user")
111 self.AuthHierarchy.create_auth(urn)
113 auth_info = self.AuthHierarchy.get_auth_info(hrn)
114 user_record = RegUser()
116 user_record.gid=auth_info.get_gid_object()
117 user_record.authority=get_authority(hrn)
118 user_record.just_created()
119 dbsession.add (user_record)
121 self.logger.info("Import: importing user (slicemanager) %s " % user_record)
123 def create_interface_records(self):
125 Create a record for each SFA interface
127 # just create certs for all sfa interfaces even if they
129 hrn = self.config.SFA_INTERFACE_HRN
130 reg_classes_info = [ (RegAuthoritySa, 'authority+sa'),
131 (RegAuthorityAm, 'authority+am'),
132 (RegAuthoritySm, 'authority+sm'), ]
133 auth_info = self.AuthHierarchy.get_auth_info(hrn)
134 pkey = auth_info.get_pkey_object()
135 for (reg_class, type) in reg_classes_info:
136 urn = hrn_to_urn(hrn, type)
137 gid = self.AuthHierarchy.create_gid(urn, create_uuid(), pkey)
138 # xxx this should probably use a RegAuthority, or a to-be-defined RegPeer object
139 # but for now we have to preserve the authority+<> stuff
140 interface_record = reg_class()
141 interface_record.hrn=hrn
142 interface_record.gid= gid
143 interface_record.authority=get_authority(hrn)
144 interface_record.just_created()
145 dbsession.add (interface_record)
147 self.logger.info("Import: imported authority (%s) %s " % (type,interface_record))
149 def delete_record(self, hrn, type):
151 for rec in dbsession.query(RegRecord).filter_by(type=type,hrn=hrn):
152 dbsession.delete(rec)