1 from types import StringTypes
2 from collections import defaultdict
4 from sfa.util.xrn import get_leaf, get_authority, urn_to_hrn
5 from sfa.util.plxrn import hrn_to_pl_slicename
6 from sfa.util.policy import Policy
7 from sfa.rspecs.rspec import RSpec
8 from sfa.plc.vlink import VLink
9 from sfa.util.xrn import Xrn
10 from sfa.util.sfalogging import logger
16 rspec_to_slice_tag = {'max_rate':'net_max_rate'}
18 #def __init__(self, api, ttl = .5, origin_hrn=None):
20 ##filepath = path + os.sep + filename
21 #self.policy = Policy(self.api)
22 #self.origin_hrn = origin_hrn
23 #self.registry = api.registries[api.hrn]
24 #self.credential = api.getCredential()
29 def __init__(self, driver):
31 #def get_slivers(self, xrn, node=None):
32 #hrn, type = urn_to_hrn(xrn)
34 #slice_name = hrn_to_pl_slicename(hrn)
35 ## XX Should we just call PLCAPI.GetSliceTicket(slice_name) instead
36 ## of doing all of this?
37 ##return self.api.driver.GetSliceTicket(self.auth, slice_name)
39 ## from PLCAPI.GetSlivers.get_slivers()
40 #slice_fields = ['slice_id', 'name', 'instantiation', 'expires', 'person_ids', 'slice_tag_ids']
41 #slices = self.api.driver.GetSlices(slice_name, slice_fields)
42 ## Build up list of users and slice attributes
44 #all_slice_tag_ids = set()
46 #person_ids.update(slice['person_ids'])
47 #all_slice_tag_ids.update(slice['slice_tag_ids'])
48 #person_ids = list(person_ids)
49 #all_slice_tag_ids = list(all_slice_tag_ids)
50 ## Get user information
51 #all_persons_list = self.api.driver.GetPersons({'person_id':person_ids,'enabled':True}, ['person_id', 'enabled', 'key_ids'])
53 #for person in all_persons_list:
54 #all_persons[person['person_id']] = person
56 ## Build up list of keys
58 #for person in all_persons.values():
59 #key_ids.update(person['key_ids'])
60 #key_ids = list(key_ids)
61 ## Get user account keys
62 #all_keys_list = self.api.driver.GetKeys(key_ids, ['key_id', 'key', 'key_type'])
64 #for key in all_keys_list:
65 #all_keys[key['key_id']] = key
66 ## Get slice attributes
67 #all_slice_tags_list = self.api.driver.GetSliceTags(all_slice_tag_ids)
69 #for slice_tag in all_slice_tags_list:
70 #all_slice_tags[slice_tag['slice_tag_id']] = slice_tag
75 #for person_id in slice['person_ids']:
76 #if person_id in all_persons:
77 #person = all_persons[person_id]
78 #if not person['enabled']:
80 #for key_id in person['key_ids']:
81 #if key_id in all_keys:
82 #key = all_keys[key_id]
83 #keys += [{'key_type': key['key_type'],
86 ## All (per-node and global) attributes for this slice
88 #for slice_tag_id in slice['slice_tag_ids']:
89 #if slice_tag_id in all_slice_tags:
90 #slice_tags.append(all_slice_tags[slice_tag_id])
91 ## Per-node sliver attributes take precedence over global
92 ## slice attributes, so set them first.
93 ## Then comes nodegroup slice attributes
94 ## Followed by global slice attributes
95 #sliver_attributes = []
98 #for sliver_attribute in filter(lambda a: a['node_id'] == node['node_id'], slice_tags):
99 #sliver_attributes.append(sliver_attribute['tagname'])
100 #attributes.append({'tagname': sliver_attribute['tagname'],
101 #'value': sliver_attribute['value']})
103 ## set nodegroup slice attributes
104 #for slice_tag in filter(lambda a: a['nodegroup_id'] in node['nodegroup_ids'], slice_tags):
105 ## Do not set any nodegroup slice attributes for
106 ## which there is at least one sliver attribute
108 #if slice_tag not in slice_tags:
109 #attributes.append({'tagname': slice_tag['tagname'],
110 #'value': slice_tag['value']})
112 #for slice_tag in filter(lambda a: a['node_id'] is None, slice_tags):
113 ## Do not set any global slice attributes for
114 ## which there is at least one sliver attribute
116 #if slice_tag['tagname'] not in sliver_attributes:
117 #attributes.append({'tagname': slice_tag['tagname'],
118 #'value': slice_tag['value']})
120 ## XXX Sanity check; though technically this should be a system invariant
121 ## checked with an assertion
122 #if slice['expires'] > MAXINT: slice['expires']= MAXINT
126 #'name': slice['name'],
127 #'slice_id': slice['slice_id'],
128 #'instantiation': slice['instantiation'],
129 #'expires': slice['expires'],
131 #'attributes': attributes
136 def get_peer(self, xrn):
137 hrn, type = urn_to_hrn(xrn)
138 #Does this slice belong to a local site or a peer senslab site?
141 # get this slice's authority (site)
142 slice_authority = get_authority(hrn)
144 # get this site's authority (sfa root authority or sub authority)
145 site_authority = get_authority(slice_authority).lower()
146 print>>sys.stderr, " \r\n \r\n \t slices.py get_peer slice_authority %s site_authority %s " %(slice_authority, site_authority)
147 # check if we are already peered with this site_authority, if so
148 peers = self.driver.GetPeers({})
149 print>>sys.stderr, " \r\n \r\n \t slices.py get_peer peers %s " %(peers)
150 for peer_record in peers:
152 if site_authority == peer_record.hrn:
154 print>>sys.stderr, " \r\n \r\n \t slices.py get_peer peer %s " %(peer)
157 def get_sfa_peer(self, xrn):
158 hrn, type = urn_to_hrn(xrn)
160 # return the authority for this hrn or None if we are the authority
162 slice_authority = get_authority(hrn)
163 site_authority = get_authority(slice_authority)
165 if site_authority != self.driver.hrn:
166 sfa_peer = site_authority
170 def verify_slice_nodes(self, slice, requested_slivers, peer):
173 if slice['node_ids']:
174 nodes = self.driver.GetNodes(slice['node_ids'], ['hostname'])
175 current_slivers = [node['hostname'] for node in nodes]
177 # remove nodes not in rspec
178 deleted_nodes = list(set(current_slivers).difference(requested_slivers))
180 # add nodes from rspec
181 added_nodes = list(set(requested_slivers).difference(current_slivers))
182 print>>sys.stderr , "\r\n \r\n \t slices.py verify_slice_nodes added_nodes %s slice %s" %( added_nodes,slice)
185 #self.driver.UnBindObjectFromPeer('slice', slice['slice_id'], peer['shortname'])
186 #PI is a list, get the only username in this list
187 #so that the OAR/LDAP knows the user: remove the authority from the name
188 tmp= slice['PI'][0].split(".")
189 username = tmp[(len(tmp)-1)]
190 self.driver.AddSliceToNodes(slice['name'], added_nodes, username)
193 self.driver.DeleteSliceFromNodes(slice['name'], deleted_nodes)
196 logger.log_exc('Failed to add/remove slice from nodes')
198 def free_egre_key(self):
200 for tag in self.driver.GetSliceTags({'tagname': 'egre_key'}):
201 used.add(int(tag['value']))
203 for i in range(1, 256):
208 raise KeyError("No more EGRE keys available")
217 def handle_peer(self, site, slice, persons, peer):
222 self.driver.BindObjectToPeer('site', site['site_id'], peer['shortname'], slice['site_id'])
224 self.driver.DeleteSite(site['site_id'])
230 self.driver.BindObjectToPeer('slice', slice['slice_id'], peer['shortname'], slice['slice_id'])
232 self.driver.DeleteSlice(slice['slice_id'])
236 for person in persons:
238 self.driver.BindObjectToPeer('person',
239 person['person_id'], peer['shortname'], person['peer_person_id'])
241 for (key, remote_key_id) in zip(person['keys'], person['key_ids']):
243 self.driver.BindObjectToPeer( 'key', key['key_id'], peer['shortname'], remote_key_id)
245 self.driver.DeleteKey(key['key_id'])
246 logger("failed to bind key: %s to peer: %s " % (key['key_id'], peer['shortname']))
248 self.driver.DeletePerson(person['person_id'])
253 #def verify_site(self, slice_xrn, slice_record={}, peer=None, sfa_peer=None, options={}):
254 #(slice_hrn, type) = urn_to_hrn(slice_xrn)
255 #site_hrn = get_authority(slice_hrn)
256 ## login base can't be longer than 20 characters
257 ##slicename = hrn_to_pl_slicename(slice_hrn)
258 #authority_name = slice_hrn.split('.')[0]
259 #login_base = authority_name[:20]
260 #print >>sys.stderr, " \r\n \r\n \t\t SLABSLICES.PY verify_site authority_name %s login_base %s slice_hrn %s" %(authority_name,login_base,slice_hrn)
262 #sites = self.driver.GetSites(login_base)
264 ## create new site record
265 #site = {'name': 'geni.%s' % authority_name,
266 #'abbreviated_name': authority_name,
267 #'login_base': login_base,
269 #'max_slivers': 1000,
271 #'peer_site_id': None}
273 #site['peer_site_id'] = slice_record.get('site_id', None)
274 #site['site_id'] = self.driver.AddSite(site)
275 ## exempt federated sites from monitor policies
276 #self.driver.AddSiteTag(site['site_id'], 'exempt_site_until', "20200101")
278 ### is this still necessary?
279 ### add record to the local registry
280 ##if sfa_peer and slice_record:
281 ##peer_dict = {'type': 'authority', 'hrn': site_hrn, \
282 ##'peer_authority': sfa_peer, 'pointer': site['site_id']}
283 ##self.registry.register_peer_object(self.credential, peer_dict)
287 ## unbind from peer so we can modify if necessary. Will bind back later
288 #self.driver.UnBindObjectFromPeer('site', site['site_id'], peer['shortname'])
292 def verify_slice(self, slice_hrn, slice_record, peer, sfa_peer, options={} ):
293 #slicename = hrn_to_pl_slicename(slice_hrn)
294 #parts = hrn_to_pl_slicename(slice_hrn).split("_")
295 login_base = slice_hrn.split(".")[0]
296 slicename = slice_hrn
297 sl = self.driver.GetSlices(slice_filter=slicename, filter_type = 'slice_hrn')
299 #slices = self.driver.GetSlices(slice_filter={'slice_hrn': slicename})
300 #slices = self.driver.GetSlices([slicename])
301 print>>sys.stderr, " \r\n \r\rn Slices.py verify_slice slicename %s sl %s slice_record %s"%(slicename ,sl, slice_record)
303 print>>sys.stderr, " \r\n \r\rn Slices.py verify_slice UH-Oh..."
305 slice = {'name': slicename,
306 'url': slice_record.get('url', slice_hrn),
307 #'description': slice_record.get('description', slice_hrn)
310 slice['slice_id'] = self.driver.AddSlice(slice)
311 slice['node_ids'] = []
312 slice['person_ids'] = []
314 #slice['peer_slice_id'] = slice_record.get('slice_id', None)
315 # mark this slice as an sfa peer record
317 #peer_dict = {'type': 'slice', 'hrn': slice_hrn,
318 #'peer_authority': sfa_peer, 'pointer': slice['slice_id']}
319 #self.registry.register_peer_object(self.credential, peer_dict)
322 slice.update(slice_record)
323 #del slice['last_updated']
324 #del slice['date_created']
326 #slice['peer_slice_id'] = slice_record.get('slice_id', None)
327 ## unbind from peer so we can modify if necessary. Will bind back later
328 #self.driver.UnBindObjectFromPeer('slice', slice['slice_id'], peer['shortname'])
329 #Update existing record (e.g. expires field) it with the latest info.
330 ##if slice_record and slice['expires'] != slice_record['expires']:
331 ##self.driver.UpdateSlice( slice['slice_id'], {'expires' : slice_record['expires']})
335 #def get_existing_persons(self, users):
336 def verify_persons(self, slice_hrn, slice_record, users, peer, sfa_peer, options={}):
342 if 'person_id' in user and 'hrn' in user:
343 users_by_id[user['person_id']] = user
344 users_dict[user['person_id']] = {'person_id':user['person_id'], 'hrn':user['hrn']}
346 users_by_hrn[user['hrn']] = user
347 users_dict[user['hrn']] = {'person_id':user['person_id'], 'hrn':user['hrn']}
349 #print>>sys.stderr, " \r\n \r\n \t slabslices.py verify_person users_dict %s \r\n user_by_hrn %s \r\n \tusers_by_id %s " %( users_dict,users_by_hrn, users_by_id)
351 existing_user_ids = []
352 existing_user_hrns = []
354 #Check if user is in LDAP using its hrn.
355 #Assuming Senslab is centralised : one LDAP for all sites, user_id unknown from LDAP
356 # LDAP does not provide users id, therfore we rely on hrns
358 existing_users = self.driver.GetPersons({'hrn': users_by_hrn.keys()},
361 for user in existing_users :
362 #for k in users_dict[user['hrn']] :
363 existing_user_hrns.append (users_dict[user['hrn']]['hrn'])
364 existing_user_ids.append (users_dict[user['hrn']]['person_id'])
365 #print>>sys.stderr, " \r\n \r\n \t slabslices.py verify_person existing_user_ids.append (users_dict[user['hrn']][k]) %s \r\n existing_users %s " %( existing_user_ids,existing_users)
368 # requested slice users
369 requested_user_ids = users_by_id.keys()
370 requested_user_hrns = users_by_hrn.keys()
371 #print>>sys.stderr, " \r\n \r\n \t slabslices.py verify_person requested_user_ids %s user_by_hrn %s " %( requested_user_ids,users_by_hrn)
372 # existing slice users
373 existing_slice_users_filter = {'hrn': slice_record.get('PI', [])}
374 #print>>sys.stderr, " \r\n \r\n slices.py verify_person requested_user_ids %s existing_slice_users_filter %s slice_record %s" %(requested_user_ids,existing_slice_users_filter,slice_record)
376 existing_slice_users = self.driver.GetPersons(existing_slice_users_filter,['hrn','pkey'])
377 #print>>sys.stderr, " \r\n \r\n slices.py verify_person existing_slice_users %s " %(existing_slice_users)
379 existing_slice_user_hrns = [user['hrn'] for user in existing_slice_users]
381 #print>>sys.stderr, " \r\n \r\n slices.py verify_person requested_user_ids %s existing_slice_user_hrns %s " %(requested_user_ids,existing_slice_user_hrns)
382 # users to be added, removed or updated
384 added_user_hrns = set(requested_user_hrns).difference(set(existing_user_hrns))
386 added_slice_user_hrns = set(requested_user_hrns).difference(existing_slice_user_hrns)
388 removed_user_hrns = set(existing_slice_user_hrns).difference(requested_user_hrns)
391 updated_user_hrns = set(existing_slice_user_hrns).intersection(requested_user_hrns)
392 #print>>sys.stderr, " \r\n \r\n slices.py verify_persons added_user_ids %s added_slice_user_ids %s " %(added_user_ids,added_slice_user_ids)
393 #print>>sys.stderr, " \r\n \r\n slices.py verify_persons removed_user_hrns %s updated_user_hrns %s " %(removed_user_hrns,updated_user_hrns)
394 # Remove stale users (only if we are not appending)
395 append = options.get('append', True)
397 for removed_user_hrn in removed_user_hrns:
398 self.driver.DeletePersonFromSlice(removed_user_hrn, slice_record['name'])
399 # update_existing users
400 updated_users_list = [user for user in existing_slice_users if user['hrn'] in \
402 print>>sys.stderr, " \r\n \r\n slices.py verify_persons removed_user_hrns %s updated_users_list %s " %(removed_user_hrns,updated_users_list)
403 #self.verify_keys(existing_slice_users, updated_users_list, peer, append)
407 for added_user_hrn in added_user_hrns:
408 added_user = users_dict[added_user_hrn]
409 #hrn, type = urn_to_hrn(added_user['urn'])
411 #'first_name': added_user.get('first_name', hrn),
412 #'last_name': added_user.get('last_name', hrn),
413 'person_id': added_user['person_id'],
414 #'peer_person_id': None,
416 #'key_ids': added_user.get('key_ids', []),
419 #print>>sys.stderr, " \r\n \r\n slices.py verify_persons added_user_ids %s " %(added_user_ids)
420 person['person_id'] = self.driver.AddPerson(person)
422 person['peer_person_id'] = added_user['person_id']
423 added_persons.append(person)
426 self.driver.UpdatePerson(person['person_id'], {'enabled': True})
429 #self.driver.AddPersonToSite(added_user_id, login_base)
431 #for key_string in added_user.get('keys', []):
432 #key = {'key':key_string, 'key_type':'ssh'}
433 #key['key_id'] = self.driver.AddPersonKey(person['person_id'], key)
434 #person['keys'].append(key)
436 # add the registry record
438 #peer_dict = {'type': 'user', 'hrn': hrn, 'peer_authority': sfa_peer, \
439 #'pointer': person['person_id']}
440 #self.registry.register_peer_object(self.credential, peer_dict)
441 for added_slice_user_hrn in added_slice_user_hrns.union(added_user_hrns):
442 self.driver.AddPersonToSlice(added_slice_user_hrn, slice_record['name'])
443 #for added_slice_user_id in added_slice_user_ids.union(added_user_ids):
444 # add person to the slice
445 #self.driver.AddPersonToSlice(added_slice_user_id, slice_record['name'])
446 # if this is a peer record then it should already be bound to a peer.
447 # no need to return worry about it getting bound later
452 def verify_keys(self, persons, users, peer, options={}):
455 for person in persons:
456 key_ids.extend(person['key_ids'])
457 keylist = self.driver.GetKeys(key_ids, ['key_id', 'key'])
460 keydict[key['key']] = key['key_id']
461 existing_keys = keydict.keys()
463 for person in persons:
464 persondict[person['email']] = person
470 user_keys = user.get('keys', [])
471 updated_persons.append(user)
472 for key_string in user_keys:
473 requested_keys.append(key_string)
474 if key_string not in existing_keys:
475 key = {'key': key_string, 'key_type': 'ssh'}
478 person = persondict[user['email']]
479 self.driver.UnBindObjectFromPeer('person', person['person_id'], peer['shortname'])
480 key['key_id'] = self.driver.AddPersonKey(user['email'], key)
482 key_index = user_keys.index(key['key'])
483 remote_key_id = user['key_ids'][key_index]
484 self.driver.BindObjectToPeer('key', key['key_id'], peer['shortname'], remote_key_id)
488 self.driver.BindObjectToPeer('person', person['person_id'], peer['shortname'], user['person_id'])
490 # remove old keys (only if we are not appending)
492 removed_keys = set(existing_keys).difference(requested_keys)
493 for existing_key_id in keydict:
494 if keydict[existing_key_id] in removed_keys:
497 self.driver.UnBindObjectFromPeer('key', existing_key_id, peer['shortname'])
498 self.driver.DeleteKey(existing_key_id)
502 #def verify_slice_attributes(self, slice, requested_slice_attributes, append=False, admin=False):
503 ## get list of attributes users ar able to manage
504 #filter = {'category': '*slice*'}
506 #filter['|roles'] = ['user']
507 #slice_attributes = self.driver.GetTagTypes(filter)
508 #valid_slice_attribute_names = [attribute['tagname'] for attribute in slice_attributes]
510 ## get sliver attributes
511 #added_slice_attributes = []
512 #removed_slice_attributes = []
513 #ignored_slice_attribute_names = []
514 #existing_slice_attributes = self.driver.GetSliceTags({'slice_id': slice['slice_id']})
516 ## get attributes that should be removed
517 #for slice_tag in existing_slice_attributes:
518 #if slice_tag['tagname'] in ignored_slice_attribute_names:
519 ## If a slice already has a admin only role it was probably given to them by an
520 ## admin, so we should ignore it.
521 #ignored_slice_attribute_names.append(slice_tag['tagname'])
523 ## If an existing slice attribute was not found in the request it should
525 #attribute_found=False
526 #for requested_attribute in requested_slice_attributes:
527 #if requested_attribute['name'] == slice_tag['tagname'] and \
528 #requested_attribute['value'] == slice_tag['value']:
529 #attribute_found=True
532 #if not attribute_found and not append:
533 #removed_slice_attributes.append(slice_tag)
535 ## get attributes that should be added:
536 #for requested_attribute in requested_slice_attributes:
537 ## if the requested attribute wasn't found we should add it
538 #if requested_attribute['name'] in valid_slice_attribute_names:
539 #attribute_found = False
540 #for existing_attribute in existing_slice_attributes:
541 #if requested_attribute['name'] == existing_attribute['tagname'] and \
542 #requested_attribute['value'] == existing_attribute['value']:
543 #attribute_found=True
545 #if not attribute_found:
546 #added_slice_attributes.append(requested_attribute)
549 ## remove stale attributes
550 #for attribute in removed_slice_attributes:
552 #self.driver.DeleteSliceTag(attribute['slice_tag_id'])
553 #except Exception, e:
554 #self.logger.warn('Failed to remove sliver attribute. name: %s, value: %s, node_id: %s\nCause:%s'\
555 #% (name, value, node_id, str(e)))
557 ## add requested_attributes
558 #for attribute in added_slice_attributes:
560 #self.driver.AddSliceTag(slice['name'], attribute['name'], attribute['value'], attribute.get('node_id', None))
561 #except Exception, e:
562 #self.logger.warn('Failed to add sliver attribute. name: %s, value: %s, node_id: %s\nCause:%s'\
563 #% (name, value, node_id, str(e)))
565 #def create_slice_aggregate(self, xrn, rspec):
566 #hrn, type = urn_to_hrn(xrn)
567 ## Determine if this is a peer slice
568 #peer = self.get_peer(hrn)
569 #sfa_peer = self.get_sfa_peer(hrn)
572 ## Get the slice record from sfa
573 #slicename = hrn_to_pl_slicename(hrn)
576 #registry = self.api.registries[self.api.hrn]
577 #credential = self.api.getCredential()
579 #site_id, remote_site_id = self.verify_site(registry, credential, hrn, peer, sfa_peer)
580 #slice = self.verify_slice(registry, credential, hrn, site_id, remote_site_id, peer, sfa_peer)
582 ## find out where this slice is currently running
583 #nodelist = self.driver.GetNodes(slice['node_ids'], ['hostname'])
584 #hostnames = [node['hostname'] for node in nodelist]
586 ## get netspec details
587 #nodespecs = spec.getDictsByTagName('NodeSpec')
589 ## dict in which to store slice attributes to set for the nodes
591 #for nodespec in nodespecs:
592 #if isinstance(nodespec['name'], list):
593 #for nodename in nodespec['name']:
594 #nodes[nodename] = {}
595 #for k in nodespec.keys():
596 #rspec_attribute_value = nodespec[k]
597 #if (self.rspec_to_slice_tag.has_key(k)):
598 #slice_tag_name = self.rspec_to_slice_tag[k]
599 #nodes[nodename][slice_tag_name] = rspec_attribute_value
600 #elif isinstance(nodespec['name'], StringTypes):
601 #nodename = nodespec['name']
602 #nodes[nodename] = {}
603 #for k in nodespec.keys():
604 #rspec_attribute_value = nodespec[k]
605 #if (self.rspec_to_slice_tag.has_key(k)):
606 #slice_tag_name = self.rspec_to_slice_tag[k]
607 #nodes[nodename][slice_tag_name] = rspec_attribute_value
609 #for k in nodespec.keys():
610 #rspec_attribute_value = nodespec[k]
611 #if (self.rspec_to_slice_tag.has_key(k)):
612 #slice_tag_name = self.rspec_to_slice_tag[k]
613 #nodes[nodename][slice_tag_name] = rspec_attribute_value
615 #node_names = nodes.keys()
616 ## remove nodes not in rspec
617 #deleted_nodes = list(set(hostnames).difference(node_names))
618 ## add nodes from rspec
619 #added_nodes = list(set(node_names).difference(hostnames))
623 #self.driver.UnBindObjectFromPeer('slice', slice['slice_id'], peer)
625 #self.driver.AddSliceToNodes(slicename, added_nodes)
627 ## Add recognized slice tags
628 #for node_name in node_names:
629 #node = nodes[node_name]
630 #for slice_tag in node.keys():
631 #value = node[slice_tag]
632 #if (isinstance(value, list)):
635 #self.driver.AddSliceTag(slicename, slice_tag, value, node_name)
637 #self.driver.DeleteSliceFromNodes(slicename, deleted_nodes)
640 #self.driver.BindObjectToPeer('slice', slice['slice_id'], peer, slice['peer_slice_id'])