#!/usr/bin/python
# -*- coding:utf-8 -*-
#yum -y install python-pip
#pip install requests
import requests
import xml.etree.ElementTree as ET
# parsing a xml content
import subprocess
# using for calling sfa code
import time
#import ldap
# will be use to authentice against bonfire's ldap
# module for bonfire to connect with sfa (following the Rspec)
# inspired by the following documenation:
# https://svn.planet-lab.org/wiki/SfaDeveloperDummyTutorial#RunningSFAinDummyflavour
# does not forget to launching this code:
#python /usr/lib/python2.7/site-packages/sfa/dummy/dummy_testbed_api.py
# documentation
# http://wiki.bonfire-project.eu/index.php/FED4FIRE_sfa
#1 - list resources
#2 - allocate
#3 - provisioning
#4 - create compute VM for fr-inria/uk-epcc
# 1) list all the resources of bonfire from sfa's point of view
# python -c 'import bonfire; print bonfire.bonsources()'
# 2) allocate: create an experiment bonfire with slice information (parameters : user_name, groups, description, walltime, slice_name)
# python -c 'import bonfire; print bonfire.allocate("nlebreto", "nlebreto", "tdes", "125", "topdomain.dummy.nicolas")'
# 3) provisioning: changing the status to running status for the experiment 2911
# python -c 'import bonfire; print bonfire.provisioning("2911")'
# 4) bonfire create virtual machine with these specific features 1) fr-inria storages n°1805 network 2 ip public 2) uk-epcc storages n°1364 network 0 bonfire wan
# python -c 'import bonfire; print bonfire.create_vm("fr-inria", "56910", "rester", "nlebreto")'
# python -c 'import bonfire; print bonfire.create_vm("uk-epcc", "56910", "rester", "nlebreto")'
# 5) retrieve the url, the name and the key for a compute N°3656 located at fr-inria
# python -c 'import bonfire; print bonfire.rsa_user_bonfire("fr-inria", "3656")'
# 6) create a new user and slice for sfa wrap
# python -c 'import bonfire; print bonfire.new_user_slice()'
# 7) stop virtual machine in bonfire testbed (ex n°3756 at fr-inira testbed)
# python -c 'import bonfire; print bonfire.stop_vm("fr-inria", "3756")'
# 8) remove slice or key
# python -c 'import bonfire; print bonfire.remove_slice("topdomain.dummy.alice_slice")'
# 9) attach slice to a user
# python -c 'import bonfire; print bonfire.create_slice_attach_user("topdomain.dummy.alice")'
# 10) verify bonfire authentication
# python -c 'import bonfire; print bonfire.callcurl("https://api.bonfire-project.eu/")'
# 11) bonfire ldap authentification
# python -c 'import bonfire; print bonfire.bonldap("nicolas.lebreton@inria.fr")'
# ########################################################## #
# ########################################################## #
# pseudo authentication for bonfire
def bonfire_authenticate():
h = {}
h["user"] = "nlebreto"
h["mail"] = "nicolas.lebreton@inria.fr"
h["user_pass"] = "GDRU_23tc$"
h["location"] = "https://api.integration.bonfire.grid5000.fr"
return h
# authentification against bonfire's ldap using a virtual machine
#def bonldap(mail):
# ldap.set_option(ldap.OPT_X_TLS_CACERTFILE, '/Fed4FIRE-SFA-Backend/puppet/modules/ca/ca.crt')
# using a certificate (client)
# ldap.set_option(ldap.OPT_PROTOCOL_VERSION, 3)
# ldap.set_option(ldap.OPT_X_TLS_REQUIRE_CERT, ldap.OPT_X_TLS_ALLOW)
# ld = ldap.initialize('ldaps://127.0.0.1:2636')
# connection with ldaps
# basedn = "ou=People,dc=bonfire-project,dc=eu"
# filter_test = "mail=" + mail
# filter = filter_test
# search email in the ldap
# results = ld.search_s(basedn, ldap.SCOPE_SUBTREE, filter)
# if not results:
# print ("error 401, you need to be register to the portal f4f")
# return results
# create a slice and attach a specific user to it
def create_slice_attach_user(user_slice):
call = "sfa.py add -x {0}_slice -t slice -r {0}@dummy.net".format(user_slice)
callcreateslice = subprocess.Popen(call, shell=True)
# remove slice or key
def remove_slice(name):
cmdremove = "sfaadmin.py reg remove {0}".format(name)
removeaction = subprocess.Popen(cmdremove, shell=True)
# show specific credential of a slice (see the content of a specific file /root/.sfi/*.slice.cred)
def show_slice_credential(slice_name):
path = "/root/.sfi/{0}.slice.cred".format(slice_name)
tree = ET.parse(path)
root = tree.getroot()
hash = {}
hash["slice_native"] = root.findall(".//signatures//{http://www.w3.org/2000/09/xmldsig#}Signature//{http://www.w3.org/2000/09/xmldsig#}KeyInfo//{http://www.w3.org/2000/09/xmldsig#}X509Data//{http://www.w3.org/2000/09/xmldsig#}X509SubjectName")[0].text
hash["X509IssuerName"] = root.findall(".//signatures//{http://www.w3.org/2000/09/xmldsig#}Signature//{http://www.w3.org/2000/09/xmldsig#}KeyInfo//{http://www.w3.org/2000/09/xmldsig#}X509Data//{http://www.w3.org/2000/09/xmldsig#}X509IssuerName")[0].text
for target in root.findall('credential'):
hash["slice_user_urn"] = target.find('owner_urn').text
hash["slice_urn"] = target.find('target_urn').text
hash["serial"] = target.find('serial').text
return hash
# create a bonfire experiment from a sfa point of view
def allocate(user_name, groups, description, walltime, slice_name):
hash ={}
hash = show_slice_credential(slice_name)
create_fed4fire_exp(user_name, groups, description, walltime, hash["slice_urn"], hash["slice_user_urn"], hash["slice_native"], "https://api.integration.bonfire.grid5000.fr/experiments")
# create a new user and slice for sfa wrap
def new_user_slice():
n = rsa_user_bonfire("fr-inria", "3656")
#url = n["url"] + "." + n["name"]
# fix to do add -k id_rsa.pub (pb key convert)
url = "topdomain.dummy." + n["name"]
txtcreateuser = "sfaadmin.py reg register -x {0} -t user -e {1}@dummy.net".format(url, n["name"])
createusersfa = subprocess.Popen(txtcreateuser, shell=True)
#slice = n["url"] + "." + n["name"] + "_" + n["name"]
slice = "topdomain.dummy." + n["name"] + "_slice"
txtslice = "sfaadmin.py reg register -x {0} -t slice -r {1}".format(slice, url)
createslice = subprocess.Popen(txtslice, shell=True)
# create a experiment bonfire with the slice urn and the experiment owner
def create_fed4fire_exp(name, groups, description, walltime, slice_urn, slice_user_urn, slice_native, url_experiment_bonfire):
xmldescription='' + name +'' + groups + '' + description + '' + walltime + 'ready' + slice_urn + '' + slice_user_urn + '' + slice_native + ''
postexp(url_experiment_bonfire, xmldescription)
# create a virtual machine with these specific features 1) fr-inria storages n°1805 network 2 ip public 2) uk-epcc storages n°1364 network 0 bonfire wan
def create_vm(testbed, nb_experiment, name_compute, groups):
url = 'https://api.integration.bonfire.grid5000.fr/experiments/' + num_experiment + '/computes'
if testbed == "fr-inria":
xmldescription='' + name_compute + '' + groups + 'liteOShda'
if testbed == "uk-epcc":
xmldescription='' + name_compute + '' + groups + 'liteOShda'
postexp(url, xmldescription)
# simple post method for request
def postexp(url, xmldescription):
headers = {'content-type': 'application/vnd.bonfire+xml'}
h = bonfire_authenticate()
r = requests.post(url, data=xmldescription, headers=headers, verify=False, auth=(h["user"], h["user_pass"]))
# stop a virtual machine for bonfire
# changing the state to stopped state
def stop_vm(testbed, num_compute):
url = "https://api.integration.bonfire.grid5000.fr/" + "locations/" + testbed + "/computes/" + num_compute
xmldescription = 'stopped'
headers = {'content-type': 'application/vnd.bonfire+xml'}
h = bonfire_authenticate()
r = requests.post(url, data=xmldescription, headers=headers, verify=False, auth=(h["user"], h["user_pass"]))
# provisioning : set a bonfire's experiment to running
# changing the status to running status
def provisioning(num_experiment):
url = "https://api.integration.bonfire.grid5000.fr/experiments/" + num_experiment
xmldescription = 'running'
headers = {'content-type': 'application/vnd.bonfire+xml'}
h = bonfire_authenticate()
r = requests.post(url, data=xmldescription, headers=headers, verify=False, auth=(h["user"], h["user_pass"]))
# retrieving the url, the name and the keys for a specific compute
def rsa_user_bonfire(testbed, num_compute):
url = "https://api.integration.bonfire.grid5000.fr/" + "locations/" + testbed + "/computes/" + num_compute
pagebonfirecompute = callcurl(url)
xmlreduit = ET.fromstring(pagebonfirecompute)
hash = {}
hash["url"] = url
for name in xmlreduit:
if name.tag == "{http://api.bonfire-project.eu/doc/schemas/occi}groups":
hash["name"] = name.text
for context in name:
if context.tag == "{http://api.bonfire-project.eu/doc/schemas/occi}authorized_keys":
hash["keys"] = context.text
return hash
# do a curl request
def callcurl(url):
h = bonfire_authenticate()
r = requests.get(url, verify=False, auth=(h["user"], h["user_pass"]))
# with the authentication against the ldap, peuhaps these two ligns below is not necessary
if r.status_code == 401:
return "error 401, you need to be register to the portal f4f"
if r.status_code == 200:
return r.text
# create the url page
def buildpagehttp(part1, part2, locations):
res = []
for page in locations:
res.append(part1 + page + "/" + part2)
return res
def boucle(itemname, xmltree, hashrspec, name):
for item in xmltree.findall(itemname):
hashrspec[name.text][itemname] = item.text
# method to list all information from testbeds
def jfedfeat(bonfires, pageurl):
pageforstatus = callcurl(pageurl)
xmlreduit = ET.fromstring(pageforstatus)
hashrspec = {}
itemshost = ["DISK_USAGE", "MEM_USAGE", "CPU_USAGE", "MAX_DISK", "MAX_MEM", "MAX_CPU",
"FREE_DISK", "FREE_MEM", "FREE_CPU", "FREE_MEM", "FREE_CPU", "USED_DISK",
"USED_MEM", "USED_CPU", "RUNNING_VMS"
]
# retrieve info for xml tree
for host in xmlreduit.findall('HOST'):
for name in host.findall('NAME'):
hashrspec[name.text] = {"name" : name.text}
for hostshare in host.findall('HOST_SHARE'):
for itemshostname in itemshost:
boucle(itemshostname, hostshare, hashrspec, name)
# jfed feature
for clef in hashrspec:
bonfires.append("" +
" " +
" " +
" " +
" " +
" " +
" ")
for infohost in itemshost:
bonfires.append(" ")
bonfires.append("")
# remove the useless xml tag version
def remove_needless_txt(txt):
txt=str(txt)
txt=txt.replace("\n","\n")
txt=txt.replace("\n","\n")
return txt
# list all bonfire resources following the sfa specification in a rspec way
def bonsources():
# parameters
locations = ["fr-inria", "be-ibbt", "uk-epcc"]
urlnetworks = buildpagehttp("https://api.integration.bonfire.grid5000.fr/locations/", "networks", locations)
urlstorages = buildpagehttp("https://api.integration.bonfire.grid5000.fr/locations/", "storages", locations)
urlcomputes = buildpagehttp("https://api.integration.bonfire.grid5000.fr/locations/", "computes", locations)
# main code
bonfires = []
generatedtime = time.strftime("%FT%T%Z")
sfabegin = ""
bonfires.append("")
bonfires.append(sfabegin)
bonfires.append("")
manag_exp = remove_needless_txt(callcurl("https://api.bonfire-project.eu/managed_experiments"))
bonfires.append(manag_exp)
bonfires.append("")
jfedfeat(bonfires, "http://frontend.bonfire.grid5000.fr/one-status.xml")
jfedfeat(bonfires, "http://bonfire.epcc.ed.ac.uk/one-status.xml")
jfedfeat(bonfires, "http://bonfire.psnc.pl/one-status.xml")
jfedfeat(bonfires, "http://nebulosus.rus.uni-stuttgart.de/one-status.xml")
bonfires.append("")
# adding networks information
for xmlnetworks in urlnetworks:
bonfires.append(remove_needless_txt(callcurl(xmlnetworks)))
bonfires.append("")
# adding storages information
for xmlstorages in urlstorages:
bonfires.append(remove_needless_txt(callcurl(xmlstorages)))
bonfires.append("")
# adding computes information
for xmlcomputes in urlcomputes:
bonfires.append(remove_needless_txt(callcurl(xmlcomputes)))
bonfires.append("")
exp = callcurl("https://api.integration.bonfire.grid5000.fr/experiments")
rexp = remove_needless_txt(exp)
bonfires.append(rexp)
bonfires.append("")
# adding reservation information
reserv = callcurl("https://api.integration.bonfire.grid5000.fr/locations/fr-inria/reservations")
rreserv = remove_needless_txt(reserv)
bonfires.append(rreserv)
bonfires.append("")
bonfires.append("")
bonfires = "\n".join(bonfires)
bonfires = bonfires.replace("\n\n","")
return bonfires