1 from types import StringTypes
2 from collections import defaultdict
4 from sfa.util.xrn import get_leaf, get_authority, urn_to_hrn
5 from sfa.util.plxrn import hrn_to_pl_slicename
6 from sfa.util.policy import Policy
7 from sfa.rspecs.rspec import RSpec
8 from sfa.plc.vlink import VLink
9 from sfa.util.xrn import Xrn
15 rspec_to_slice_tag = {'max_rate':'net_max_rate'}
17 def __init__(self, api, ttl = .5, origin_hrn=None):
19 #filepath = path + os.sep + filename
20 self.policy = Policy(self.api)
21 self.origin_hrn = origin_hrn
22 self.registry = api.registries[api.hrn]
23 self.credential = api.getCredential()
27 #def get_slivers(self, xrn, node=None):
28 #hrn, type = urn_to_hrn(xrn)
30 #slice_name = hrn_to_pl_slicename(hrn)
31 ## XX Should we just call PLCAPI.GetSliceTicket(slice_name) instead
32 ## of doing all of this?
33 ##return self.api.driver.GetSliceTicket(self.auth, slice_name)
35 ## from PLCAPI.GetSlivers.get_slivers()
36 #slice_fields = ['slice_id', 'name', 'instantiation', 'expires', 'person_ids', 'slice_tag_ids']
37 #slices = self.api.driver.GetSlices(slice_name, slice_fields)
38 ## Build up list of users and slice attributes
40 #all_slice_tag_ids = set()
42 #person_ids.update(slice['person_ids'])
43 #all_slice_tag_ids.update(slice['slice_tag_ids'])
44 #person_ids = list(person_ids)
45 #all_slice_tag_ids = list(all_slice_tag_ids)
46 ## Get user information
47 #all_persons_list = self.api.driver.GetPersons({'person_id':person_ids,'enabled':True}, ['person_id', 'enabled', 'key_ids'])
49 #for person in all_persons_list:
50 #all_persons[person['person_id']] = person
52 ## Build up list of keys
54 #for person in all_persons.values():
55 #key_ids.update(person['key_ids'])
56 #key_ids = list(key_ids)
57 ## Get user account keys
58 #all_keys_list = self.api.driver.GetKeys(key_ids, ['key_id', 'key', 'key_type'])
60 #for key in all_keys_list:
61 #all_keys[key['key_id']] = key
62 ## Get slice attributes
63 #all_slice_tags_list = self.api.driver.GetSliceTags(all_slice_tag_ids)
65 #for slice_tag in all_slice_tags_list:
66 #all_slice_tags[slice_tag['slice_tag_id']] = slice_tag
71 #for person_id in slice['person_ids']:
72 #if person_id in all_persons:
73 #person = all_persons[person_id]
74 #if not person['enabled']:
76 #for key_id in person['key_ids']:
77 #if key_id in all_keys:
78 #key = all_keys[key_id]
79 #keys += [{'key_type': key['key_type'],
82 ## All (per-node and global) attributes for this slice
84 #for slice_tag_id in slice['slice_tag_ids']:
85 #if slice_tag_id in all_slice_tags:
86 #slice_tags.append(all_slice_tags[slice_tag_id])
87 ## Per-node sliver attributes take precedence over global
88 ## slice attributes, so set them first.
89 ## Then comes nodegroup slice attributes
90 ## Followed by global slice attributes
91 #sliver_attributes = []
94 #for sliver_attribute in filter(lambda a: a['node_id'] == node['node_id'], slice_tags):
95 #sliver_attributes.append(sliver_attribute['tagname'])
96 #attributes.append({'tagname': sliver_attribute['tagname'],
97 #'value': sliver_attribute['value']})
99 ## set nodegroup slice attributes
100 #for slice_tag in filter(lambda a: a['nodegroup_id'] in node['nodegroup_ids'], slice_tags):
101 ## Do not set any nodegroup slice attributes for
102 ## which there is at least one sliver attribute
104 #if slice_tag not in slice_tags:
105 #attributes.append({'tagname': slice_tag['tagname'],
106 #'value': slice_tag['value']})
108 #for slice_tag in filter(lambda a: a['node_id'] is None, slice_tags):
109 ## Do not set any global slice attributes for
110 ## which there is at least one sliver attribute
112 #if slice_tag['tagname'] not in sliver_attributes:
113 #attributes.append({'tagname': slice_tag['tagname'],
114 #'value': slice_tag['value']})
116 ## XXX Sanity check; though technically this should be a system invariant
117 ## checked with an assertion
118 #if slice['expires'] > MAXINT: slice['expires']= MAXINT
122 #'name': slice['name'],
123 #'slice_id': slice['slice_id'],
124 #'instantiation': slice['instantiation'],
125 #'expires': slice['expires'],
127 #'attributes': attributes
132 def get_peer(self, xrn):
133 hrn, type = urn_to_hrn(xrn)
134 # Becaues of myplc federation, we first need to determine if this
135 # slice belongs to out local plc or a myplc peer. We will assume it
136 # is a local site, unless we find out otherwise
138 print>>sys.stderr, " \r\n \r\n \t slices.py get_peer slice_authority "
139 # get this slice's authority (site)
140 slice_authority = get_authority(hrn)
142 # get this site's authority (sfa root authority or sub authority)
143 site_authority = get_authority(slice_authority).lower()
144 print>>sys.stderr, " \r\n \r\n \t slices.py get_peer slice_authority %s site_authority %s" %(slice_authority,site_authority)
145 # check if we are already peered with this site_authority, if so
146 #peers = self.api.driver.GetPeers({}, ['peer_id', 'peername', 'shortname', 'hrn_root'])
147 #for peer_record in peers:
148 #names = [name.lower() for name in peer_record.values() if isinstance(name, StringTypes)]
149 #if site_authority in names:
154 def get_sfa_peer(self, xrn):
155 hrn, type = urn_to_hrn(xrn)
157 # return the authority for this hrn or None if we are the authority
159 slice_authority = get_authority(hrn)
160 site_authority = get_authority(slice_authority)
162 if site_authority != self.api.hrn:
163 sfa_peer = site_authority
167 def verify_slice_nodes(self, slice, requested_slivers, peer):
170 if slice['node_ids']:
171 nodes = self.api.driver.GetNodes(slice['node_ids'], ['hostname'])
172 current_slivers = [node['hostname'] for node in nodes]
174 # remove nodes not in rspec
175 deleted_nodes = list(set(current_slivers).difference(requested_slivers))
177 # add nodes from rspec
178 added_nodes = list(set(requested_slivers).difference(current_slivers))
179 print>>sys.stderr , "\r\n \r\n \t slices.py verify_slice_nodes added_nodes %s slice %s" %( added_nodes,slice)
182 self.api.driver.UnBindObjectFromPeer('slice', slice['slice_id'], peer['shortname'])
183 #PI is a list, get the only username in this list
184 #so that the OAR/LDAP knows the user: remove the authority from the name
185 tmp= slice['PI'][0].split(".")
186 username = tmp[(len(tmp)-1)]
187 self.api.driver.AddSliceToNodes(slice['name'], added_nodes, username)
189 self.api.driver.DeleteSliceFromNodes(slice['name'], deleted_nodes)
192 self.api.logger.log_exc('Failed to add/remove slice from nodes')
194 def free_egre_key(self):
196 for tag in self.api.driver.GetSliceTags({'tagname': 'egre_key'}):
197 used.add(int(tag['value']))
199 for i in range(1, 256):
204 raise KeyError("No more EGRE keys available")
208 def verify_slice_links(self, slice, links, aggregate):
216 def handle_peer(self, site, slice, persons, peer):
221 self.api.driver.BindObjectToPeer('site', site['site_id'], peer['shortname'], slice['site_id'])
223 self.api.driver.DeleteSite(site['site_id'])
229 self.api.driver.BindObjectToPeer('slice', slice['slice_id'], peer['shortname'], slice['slice_id'])
231 self.api.driver.DeleteSlice(slice['slice_id'])
235 for person in persons:
237 self.api.driver.BindObjectToPeer('person',
238 person['person_id'], peer['shortname'], person['peer_person_id'])
240 for (key, remote_key_id) in zip(person['keys'], person['key_ids']):
242 self.api.driver.BindObjectToPeer( 'key', key['key_id'], peer['shortname'], remote_key_id)
244 self.api.driver.DeleteKey(key['key_id'])
245 self.api.logger("failed to bind key: %s to peer: %s " % (key['key_id'], peer['shortname']))
247 self.api.driver.DeletePerson(person['person_id'])
252 def verify_site(self, slice_xrn, slice_record={}, peer=None, sfa_peer=None):
253 (slice_hrn, type) = urn_to_hrn(slice_xrn)
254 site_hrn = get_authority(slice_hrn)
255 # login base can't be longer than 20 characters
256 slicename = hrn_to_pl_slicename(slice_hrn)
257 authority_name = slicename.split('_')[0]
258 login_base = authority_name[:20]
259 sites = self.api.driver.GetSites(login_base)
261 # create new site record
262 site = {'name': 'geni.%s' % authority_name,
263 'abbreviated_name': authority_name,
264 'login_base': login_base,
268 'peer_site_id': None}
270 site['peer_site_id'] = slice_record.get('site_id', None)
271 site['site_id'] = self.api.driver.AddSite(site)
272 # exempt federated sites from monitor policies
273 self.api.driver.AddSiteTag(site['site_id'], 'exempt_site_until', "20200101")
275 # is this still necessary?
276 # add record to the local registry
277 if sfa_peer and slice_record:
278 peer_dict = {'type': 'authority', 'hrn': site_hrn, \
279 'peer_authority': sfa_peer, 'pointer': site['site_id']}
280 self.registry.register_peer_object(self.credential, peer_dict)
284 # unbind from peer so we can modify if necessary. Will bind back later
285 self.api.driver.UnBindObjectFromPeer('site', site['site_id'], peer['shortname'])
289 def verify_slice(self, slice_hrn, slice_record, peer, sfa_peer):
290 #slicename = hrn_to_pl_slicename(slice_hrn)
291 parts = hrn_to_pl_slicename(slice_hrn).split("_")
292 login_base = parts[0]
293 slicename = slice_hrn
294 slices = self.api.driver.GetSlices([slicename])
295 print>>sys.stderr, " \r\n \r\rn Slices.py verify_slice slicename %s slices %s slice_record %s"%(slicename ,slices, slice_record)
297 slice = {'name': slicename,
298 'url': slice_record.get('url', slice_hrn),
299 #'description': slice_record.get('description', slice_hrn)
302 slice['slice_id'] = self.api.driver.AddSlice(slice)
303 slice['node_ids'] = []
304 slice['person_ids'] = []
306 slice['peer_slice_id'] = slice_record.get('slice_id', None)
307 # mark this slice as an sfa peer record
309 peer_dict = {'type': 'slice', 'hrn': slice_hrn,
310 'peer_authority': sfa_peer, 'pointer': slice['slice_id']}
311 self.registry.register_peer_object(self.credential, peer_dict)
314 slice.update(slice_record)
315 del slice['last_updated']
316 del slice['date_created']
318 slice['peer_slice_id'] = slice_record.get('slice_id', None)
319 # unbind from peer so we can modify if necessary. Will bind back later
320 self.api.driver.UnBindObjectFromPeer('slice', slice['slice_id'], peer['shortname'])
321 #Update existing record (e.g. expires field) it with the latest info.
322 #if slice_record and slice['expires'] != slice_record['expires']:
323 #self.api.driver.UpdateSlice( slice['slice_id'], {'expires' : slice_record['expires']})
327 #def get_existing_persons(self, users):
328 def verify_persons(self, slice_hrn, slice_record, users, append=True):
334 if 'person_id' in user and 'hrn' in user:
335 users_by_id[user['person_id']] = user
336 users_dict[user['person_id']] = {'person_id':user['person_id'], 'hrn':user['hrn']}
338 #hrn, type = urn_to_hrn(user['urn'])
339 #username = get_leaf(hrn)
340 #login_base = get_leaf(get_authority(user['urn']))
341 #user['username'] = username
342 #users_by_site[login_base].append(user)
343 users_by_hrn[user['hrn']] = user
344 users_dict[user['hrn']] = {'person_id':user['person_id'], 'hrn':user['hrn']}
346 existing_user_ids = []
349 # get existing users by email
351 existing_users = self.api.driver.GetPersons({'hrn': users_by_hrn.keys()},
353 #print>>sys.stderr, " \r\n \r\n \t slices.py HEEEEEEEEY===========verify_person existing_users %s users_dict %s " %(existing_users, users_dict)
354 #existing_user_ids = [(users_dict[user['hrn']]['hrn'],users_dict[user['hrn']]['person_id'] ) for user in existing_users]
355 for user in existing_users :
356 for k in users_dict[user['hrn']] :
357 existing_user_ids.append (users_dict[user['hrn']][k])
359 #print>>sys.stderr, " \r\n \r\n slices.py verify_person existing_user_ids %s " %(existing_user_ids)
361 #existing_user_ids.extend([user for user in users_by_id])
363 ## get a list of user sites (based on requeste user urns
364 #site_list = self.api.driver.GetSites(users_by_site.keys(), \
365 #['site_id', 'login_base', 'person_ids'])
369 ## get all existing users at these sites
370 #for site in site_list:
371 #sites[site['site_id']] = site
372 #site_user_ids.extend(site['person_ids'])
374 #existing_site_persons_list = self.api.driver.GetPersons(site_user_ids,
375 #['person_id', 'key_ids', 'email', 'site_ids'])
377 ## all requested users are either existing users or new (added) users
378 #for login_base in users_by_site:
379 #requested_site_users = users_by_site[login_base]
380 #for requested_user in requested_site_users:
382 #for existing_user in existing_site_persons_list:
383 #for site_id in existing_user['site_ids']:
384 #site = sites[site_id]
385 #if login_base == site['login_base'] and \
386 #existing_user['email'].startswith(requested_user['username']):
387 #existing_user_ids.append(existing_user['email'])
388 #users_dict[existing_user['email']] = requested_user
394 #if user_found == False:
395 #fake_email = requested_user['username'] + '@geni.net'
396 #users_dict[fake_email] = requested_user
399 # requested slice users
400 requested_user_ids = users_dict.keys()
401 # existing slice users
402 existing_slice_users_filter = {'hrn': slice_record.get('PI', [])}
403 #print>>sys.stderr, " \r\n \r\n slices.py verify_person requested_user_ids %s existing_slice_users_filter %s slice_record %s" %(requested_user_ids,existing_slice_users_filter,slice_record)
405 existing_slice_users = self.api.driver.GetPersons(existing_slice_users_filter,['hrn'])
406 existing_slice_user_ids = []
407 for user in existing_slice_users :
408 for k in users_dict[user['hrn']] :
409 existing_slice_user_ids.append (users_dict[user['hrn']][k])
410 #existing_slice_user_ids = [user['hrn'] for user in existing_slice_users]
412 #print>>sys.stderr, " \r\n \r\n slices.py verify_person requested_user_ids %s existing_slice_user_ids%s " %(requested_user_ids,existing_slice_user_ids)
413 # users to be added, removed or updated
414 added_user_ids = set(requested_user_ids).difference(set(existing_user_ids))
415 added_slice_user_ids = set(requested_user_ids).difference(existing_slice_user_ids)
416 removed_user_ids = set(existing_slice_user_ids).difference(requested_user_ids)
417 #print>>sys.stderr, " \r\n \r\n slices.py verify_persons existing_slice_user_ids %s requested_user_ids %s " %(existing_slice_user_ids,requested_user_ids)
418 updated_user_ids = set(existing_slice_user_ids).intersection(requested_user_ids)
419 #print>>sys.stderr, " \r\n \r\n slices.py verify_persons added_user_ids %s added_slice_user_ids %s " %(added_user_ids,added_slice_user_ids)
420 #print>>sys.stderr, " \r\n \r\n slices.py verify_persons removed_user_ids %s updated_user_ids %s " %(removed_user_ids,updated_user_ids)
421 # Remove stale users (only if we are not appending).
423 for removed_user_id in removed_user_ids:
424 self.api.driver.DeletePersonFromSlice(removed_user_id, slice_record['name'])
425 # update_existing users
426 updated_users_list = [user for user in existing_slice_users if user['hrn'] in \
428 #self.verify_keys(existing_slice_users, updated_users_list, peer, append)
432 for added_user_id in added_user_ids:
433 added_user = users_dict[added_user_id]
434 #hrn, type = urn_to_hrn(added_user['urn'])
436 #'first_name': added_user.get('first_name', hrn),
437 #'last_name': added_user.get('last_name', hrn),
438 'person_id': added_user_id,
439 #'peer_person_id': None,
441 #'key_ids': added_user.get('key_ids', []),
444 #print>>sys.stderr, " \r\n \r\n slices.py verify_persons added_user_ids %s " %(added_user_ids)
445 person['person_id'] = self.api.driver.AddPerson(person)
447 person['peer_person_id'] = added_user['person_id']
448 added_persons.append(person)
451 self.api.driver.UpdatePerson(person['person_id'], {'enabled': True})
454 #self.api.driver.AddPersonToSite(added_user_id, login_base)
456 #for key_string in added_user.get('keys', []):
457 #key = {'key':key_string, 'key_type':'ssh'}
458 #key['key_id'] = self.api.driver.AddPersonKey(person['person_id'], key)
459 #person['keys'].append(key)
461 # add the registry record
463 #peer_dict = {'type': 'user', 'hrn': hrn, 'peer_authority': sfa_peer, \
464 #'pointer': person['person_id']}
465 #self.registry.register_peer_object(self.credential, peer_dict)
467 for added_slice_user_id in added_slice_user_ids.union(added_user_ids):
468 # add person to the slice
469 self.api.driver.AddPersonToSlice(added_slice_user_id, slice_record['name'])
470 # if this is a peer record then it should already be bound to a peer.
471 # no need to return worry about it getting bound later
476 def verify_keys(self, persons, users, peer, append=True):
479 for person in persons:
480 key_ids.extend(person['key_ids'])
481 keylist = self.api.driver.GetKeys(key_ids, ['key_id', 'key'])
484 keydict[key['key']] = key['key_id']
485 existing_keys = keydict.keys()
487 for person in persons:
488 persondict[person['email']] = person
494 user_keys = user.get('keys', [])
495 updated_persons.append(user)
496 for key_string in user_keys:
497 requested_keys.append(key_string)
498 if key_string not in existing_keys:
499 key = {'key': key_string, 'key_type': 'ssh'}
502 person = persondict[user['email']]
503 self.api.driver.UnBindObjectFromPeer('person', person['person_id'], peer['shortname'])
504 key['key_id'] = self.api.driver.AddPersonKey(user['email'], key)
506 key_index = user_keys.index(key['key'])
507 remote_key_id = user['key_ids'][key_index]
508 self.api.driver.BindObjectToPeer('key', key['key_id'], peer['shortname'], remote_key_id)
512 self.api.driver.BindObjectToPeer('person', person['person_id'], peer['shortname'], user['person_id'])
514 # remove old keys (only if we are not appending)
516 removed_keys = set(existing_keys).difference(requested_keys)
517 for existing_key_id in keydict:
518 if keydict[existing_key_id] in removed_keys:
521 self.api.driver.UnBindObjectFromPeer('key', existing_key_id, peer['shortname'])
522 self.api.driver.DeleteKey(existing_key_id)
526 def verify_slice_attributes(self, slice, requested_slice_attributes, append=False, admin=False):
527 # get list of attributes users ar able to manage
528 filter = {'category': '*slice*'}
530 filter['|roles'] = ['user']
531 slice_attributes = self.api.driver.GetTagTypes(filter)
532 valid_slice_attribute_names = [attribute['tagname'] for attribute in slice_attributes]
534 # get sliver attributes
535 added_slice_attributes = []
536 removed_slice_attributes = []
537 ignored_slice_attribute_names = []
538 existing_slice_attributes = self.api.driver.GetSliceTags({'slice_id': slice['slice_id']})
540 # get attributes that should be removed
541 for slice_tag in existing_slice_attributes:
542 if slice_tag['tagname'] in ignored_slice_attribute_names:
543 # If a slice already has a admin only role it was probably given to them by an
544 # admin, so we should ignore it.
545 ignored_slice_attribute_names.append(slice_tag['tagname'])
547 # If an existing slice attribute was not found in the request it should
549 attribute_found=False
550 for requested_attribute in requested_slice_attributes:
551 if requested_attribute['name'] == slice_tag['tagname'] and \
552 requested_attribute['value'] == slice_tag['value']:
556 if not attribute_found and not append:
557 removed_slice_attributes.append(slice_tag)
559 # get attributes that should be added:
560 for requested_attribute in requested_slice_attributes:
561 # if the requested attribute wasn't found we should add it
562 if requested_attribute['name'] in valid_slice_attribute_names:
563 attribute_found = False
564 for existing_attribute in existing_slice_attributes:
565 if requested_attribute['name'] == existing_attribute['tagname'] and \
566 requested_attribute['value'] == existing_attribute['value']:
569 if not attribute_found:
570 added_slice_attributes.append(requested_attribute)
573 # remove stale attributes
574 for attribute in removed_slice_attributes:
576 self.api.driver.DeleteSliceTag(attribute['slice_tag_id'])
578 self.api.logger.warn('Failed to remove sliver attribute. name: %s, value: %s, node_id: %s\nCause:%s'\
579 % (name, value, node_id, str(e)))
581 # add requested_attributes
582 for attribute in added_slice_attributes:
584 self.api.driver.AddSliceTag(slice['name'], attribute['name'], attribute['value'], attribute.get('node_id', None))
586 self.api.logger.warn('Failed to add sliver attribute. name: %s, value: %s, node_id: %s\nCause:%s'\
587 % (name, value, node_id, str(e)))
589 def create_slice_aggregate(self, xrn, rspec):
590 hrn, type = urn_to_hrn(xrn)
591 # Determine if this is a peer slice
592 peer = self.get_peer(hrn)
593 sfa_peer = self.get_sfa_peer(hrn)
596 # Get the slice record from sfa
597 slicename = hrn_to_pl_slicename(hrn)
600 registry = self.api.registries[self.api.hrn]
601 credential = self.api.getCredential()
603 site_id, remote_site_id = self.verify_site(registry, credential, hrn, peer, sfa_peer)
604 slice = self.verify_slice(registry, credential, hrn, site_id, remote_site_id, peer, sfa_peer)
606 # find out where this slice is currently running
607 nodelist = self.api.driver.GetNodes(slice['node_ids'], ['hostname'])
608 hostnames = [node['hostname'] for node in nodelist]
610 # get netspec details
611 nodespecs = spec.getDictsByTagName('NodeSpec')
613 # dict in which to store slice attributes to set for the nodes
615 for nodespec in nodespecs:
616 if isinstance(nodespec['name'], list):
617 for nodename in nodespec['name']:
619 for k in nodespec.keys():
620 rspec_attribute_value = nodespec[k]
621 if (self.rspec_to_slice_tag.has_key(k)):
622 slice_tag_name = self.rspec_to_slice_tag[k]
623 nodes[nodename][slice_tag_name] = rspec_attribute_value
624 elif isinstance(nodespec['name'], StringTypes):
625 nodename = nodespec['name']
627 for k in nodespec.keys():
628 rspec_attribute_value = nodespec[k]
629 if (self.rspec_to_slice_tag.has_key(k)):
630 slice_tag_name = self.rspec_to_slice_tag[k]
631 nodes[nodename][slice_tag_name] = rspec_attribute_value
633 for k in nodespec.keys():
634 rspec_attribute_value = nodespec[k]
635 if (self.rspec_to_slice_tag.has_key(k)):
636 slice_tag_name = self.rspec_to_slice_tag[k]
637 nodes[nodename][slice_tag_name] = rspec_attribute_value
639 node_names = nodes.keys()
640 # remove nodes not in rspec
641 deleted_nodes = list(set(hostnames).difference(node_names))
642 # add nodes from rspec
643 added_nodes = list(set(node_names).difference(hostnames))
647 self.api.driver.UnBindObjectFromPeer('slice', slice['slice_id'], peer)
649 self.api.driver.AddSliceToNodes(slicename, added_nodes)
651 # Add recognized slice tags
652 for node_name in node_names:
653 node = nodes[node_name]
654 for slice_tag in node.keys():
655 value = node[slice_tag]
656 if (isinstance(value, list)):
659 self.api.driver.AddSliceTag(slicename, slice_tag, value, node_name)
661 self.api.driver.DeleteSliceFromNodes(slicename, deleted_nodes)
664 self.api.driver.BindObjectToPeer('slice', slice['slice_id'], peer, slice['peer_slice_id'])