2 # The import tool assumes that the existing PLC hierarchy should all be part
3 # of "planetlab.us" (see the root_auth and level1_auth variables below).
5 # Public keys are extracted from the users' SSH keys automatically and used to
6 # create GIDs. This is relatively experimental as a custom tool had to be
7 # written to perform conversion from SSH to OpenSSL format. It only supports
8 # RSA keys at this time, not DSA keys.
15 from sfa.util.record import *
16 from sfa.util.genitable import GeniTable
17 from sfa.util.misc import *
18 from sfa.util.config import Config
19 from sfa.util.report import trace, error
21 from sfa.trust.certificate import convert_public_key, Keypair
22 from sfa.trust.trustedroot import *
23 from sfa.trust.hierarchy import *
24 from sfa.trust.gid import create_uuid
28 if isinstance(str, unicode):
29 return str.encode("ascii", "ignore")
33 def cleanup_string(str):
34 # pgsql has a fit with strings that have high ascii in them, so filter it
35 # out when generating the hrns.
43 str = str.replace(" ", "_")
44 str = str.replace(".", "_")
45 str = str.replace("(", "_")
46 str = str.replace("'", "_")
47 str = str.replace(")", "_")
48 str = str.replace('"', "_")
51 def person_to_hrn(parent_hrn, person):
52 # the old way - Lastname_Firstname
53 #personname = person['last_name'] + "_" + person['first_name']
55 # the new way - use email address up to the "@"
56 personname = person['email'].split("@")[0]
58 personname = cleanup_string(personname)
60 hrn = parent_hrn + "." + personname
67 self.AuthHierarchy = Hierarchy()
68 self.TrustedRoots = TrustedRootList()
70 self.config = Config()
71 self.plc_auth = self.config.get_plc_auth()
72 self.root_auth = self.config.SFA_REGISTRY_ROOT_AUTH
73 self.level1_auth = self.config.SFA_REGISTRY_LEVEL1_AUTH
74 if not self.level1_auth or self.level1_auth in ['']:
75 self.level1_auth = None
77 # connect to planetlab
79 if "Url" in self.plc_auth:
80 from sfa.plc.remoteshell import RemoteShell
81 self.shell = RemoteShell()
84 self.shell = PLC.Shell.Shell(globals = globals())
87 def create_top_level_auth_records(self, hrn):
88 AuthHierarchy = self.AuthHierarchy
90 # if auth records for this hrn dont exist, create it
91 if not AuthHierarchy.auth_exists(hrn):
92 AuthHierarchy.create_auth(hrn)
95 # get the auth info of the newly created root auth (parent)
96 # or level1_auth if it exists
98 auth_info = AuthHierarchy.get_auth_info(hrn)
101 parent_hrn = get_authority(hrn)
104 auth_info = AuthHierarchy.get_auth_info(parent_hrn)
107 auth_record = table.find({'type': 'authority', 'hrn': hrn})
110 auth_record = GeniRecord(hrn=hrn, gid=auth_info.get_gid_object(), type="authority", pointer=-1)
111 trace(" inserting authority record for " + hrn)
112 table.insert(auth_record)
115 def import_person(self, parent_hrn, person):
116 AuthHierarchy = self.AuthHierarchy
117 hrn = person_to_hrn(parent_hrn, person)
119 # ASN.1 will have problems with hrn's longer than 64 characters
123 trace("Import: importing person " + hrn)
128 if 'key_ids' in person and person['key_ids']:
129 key_ids = person["key_ids"]
131 # get the user's private key from the SSH keys they have uploaded
133 keys = self.shell.GetKeys(self.plc_auth, key_ids)
135 pkey = convert_public_key(key)
137 # the user has no keys
138 trace(" person " + hrn + " does not have a PL public key")
140 # if a key is unavailable, then we still need to put something in the
141 # user's GID. So make one up.
142 pkey = Keypair(create=True)
145 person_gid = AuthHierarchy.create_gid(hrn, create_uuid(), pkey)
146 person_record = table.find({'type': 'user', 'hrn': hrn})
147 if not person_record:
148 trace(" inserting user record for " + hrn)
149 person_record = GeniRecord(hrn=hrn, gid=person_gid, type="user", pointer=person['person_id'])
150 table.insert(person_record)
152 trace(" updating user record for " + hrn)
153 person_record = GeniRecord(hrn=hrn, gid=person_gid, type="user", pointer=person['person_id'])
154 table.update(person_record)
156 def import_slice(self, parent_hrn, slice):
157 AuthHierarchy = self.AuthHierarchy
158 slicename = slice['name'].split("_",1)[-1]
159 slicename = cleanup_string(slicename)
162 error("Import_Slice: failed to parse slice name " + slice['name'])
165 hrn = parent_hrn + "." + slicename
166 trace("Import: importing slice " + hrn)
170 slice_record = table.find({'type': 'sslice', 'hrn': hrn})
172 pkey = Keypair(create=True)
173 slice_gid = AuthHierarchy.create_gid(hrn, create_uuid(), pkey)
174 slice_record = GeniRecord(hrn=hrn, gid=slice_gid, type="slice", pointer=slice['slice_id'])
175 trace(" inserting slice record for " + hrn)
176 table.insert(slice_record)
178 def import_node(self, parent_hrn, node):
179 AuthHierarchy = self.AuthHierarchy
180 nodename = node['hostname'].replace(".", "_")
181 nodename = cleanup_string(nodename)
184 error("Import_node: failed to parse node name " + node['hostname'])
187 hrn = parent_hrn + "." + nodename
189 # ASN.1 will have problems with hrn's longer than 64 characters
193 trace("Import: importing node " + hrn)
197 node_record = table.find({'type': 'node', 'hrn': hrn})
199 pkey = Keypair(create=True)
200 node_gid = AuthHierarchy.create_gid(hrn, create_uuid(), pkey)
201 node_record = GeniRecord(hrn=hrn, gid=node_gid, type="node", pointer=node['node_id'])
202 trace(" inserting node record for " + hrn)
203 table.insert(node_record)
207 def import_site(self, parent_hrn, site):
208 AuthHierarchy = self.AuthHierarchy
210 plc_auth = self.plc_auth
211 sitename = site['login_base']
212 sitename = cleanup_string(sitename)
214 hrn = parent_hrn + "." + sitename
216 # Hardcode 'internet2' into the hrn for sites hosting
217 # internet2 nodes. This is a special operation for some vini
219 if ".vini" in parent_hrn and parent_hrn.endswith('vini'):
220 if sitename.startswith("ii"):
221 sitename = sitename.replace("ii", "")
222 hrn = ".".join([parent_hrn, "internet2", sitename])
223 elif sitename.startswith("nlr"):
224 hrn = ".".join([parent_hrn, "internet2", sitename])
225 sitename = sitename.replace("nlr", "")
227 trace("Import_Site: importing site " + hrn)
229 # create the authority
230 if not AuthHierarchy.auth_exists(hrn):
231 AuthHierarchy.create_auth(hrn)
233 auth_info = AuthHierarchy.get_auth_info(hrn)
237 auth_record = table.find({'type': 'authority', 'hrn': 'hrn'})
239 auth_record = GeniRecord(hrn=hrn, gid=auth_info.get_gid_object(), type="authority", pointer=site['site_id'])
240 trace(" inserting authority record for " + hrn)
241 table.insert(auth_record)
243 if 'person_ids' in site:
244 for person_id in site['person_ids']:
245 persons = shell.GetPersons(plc_auth, [person_id])
248 self.import_person(hrn, persons[0])
250 trace("Failed to import: %s (%s)" % (persons[0], e))
251 if 'slice_ids' in site:
252 for slice_id in site['slice_ids']:
253 slices = shell.GetSlices(plc_auth, [slice_id])
256 self.import_slice(hrn, slices[0])
258 trace("Failed to import: %s (%s)" % (slices[0], e))
259 if 'node_ids' in site:
260 for node_id in site['node_ids']:
261 nodes = shell.GetNodes(plc_auth, [node_id])
264 self.import_node(hrn, nodes[0])
266 trace("Failed to import: %s (%s)" % (nodes[0], e))
268 def delete_record(self, parent_hrn, object, type):
272 if type in ['slice'] and 'name' in object and object['name']:
273 slice_name = object['name'].split("_")[0]
274 hrn = parent_hrn + "." + slice_name
275 elif type in ['user'] and 'email' in object and object['email']:
276 person_name = object['email'].split('@')[0]
277 hrn = parent_hrn + "." + person_name
278 elif type in ['node'] and 'hostname' in object and object['hostname']:
279 node_name = object['hostname'].replace('.','_')
280 hrn = parent_hrn + "." + node_name
281 elif type in ['site'] and 'login_base' in object and object['login_base']:
282 site_name = object['login_base']
284 parent_hrn = get_authority(hrn)
286 # delete all records whos authority is this site
287 records = table.find({'authority': hrn})
288 for record in records:
294 record_list = table.find({'type': type, 'hrn': hrn})
295 for record in record_list: