support differnt authority types
[sfa.git] / sfa / plc / sfaImport.py
index ecad66f..117a220 100644 (file)
@@ -69,8 +69,10 @@ class sfaImport:
           import PLC.Shell
           self.shell = PLC.Shell.Shell(globals = globals())        
 
-
     def create_top_level_auth_records(self, hrn):
+        """
+        Create top level records (includes root and sub authorities (local/remote)
+        """
         urn = hrn_to_urn(hrn, 'authority')
         # make sure parent exists
         parent_hrn = get_authority(hrn)
@@ -92,18 +94,41 @@ class sfaImport:
         if not auth_record:
             auth_record = SfaRecord(hrn=hrn, gid=auth_info.get_gid_object(), type="authority", pointer=-1)
             auth_record['authority'] = get_authority(auth_record['hrn'])
-            self.logger.info("Import: inserting authority record for " + hrn)
+            self.logger.info("Import: inserting authority record for %s"%hrn)
             table.insert(auth_record)
 
+    def create_interface_records(self):
+        """
+        Create a record for each SFA interface
+        """
+        # just create certs for all sfa interfaces even if they
+        # arent enabled
+        interface_hrn = self.config.SFA_INTERFACE_HRN
+        interfaces = ['authority+sa', 'authority+am', 'authority+sm']
+        table = SfaTable()
+        auth_info = self.AuthHierarchy.get_auth_info(interface_hrn)
+        pkey = auth_info.get_pkey_object()
+        for interface in interfaces:
+            interface_record = table.find({'type': interface, 'hrn': interface_hrn})
+            if not interface_record:
+                self.logger.info("Import: interface %s %s " % (interface_hrn, interface))
+                urn = hrn_to_urn(interface_hrn, interface)
+                gid = self.AuthHierarchy.create_gid(urn, create_uuid(), pkey)
+                record = SfaRecord(hrn=interface_hrn, gid=gid, type=interface, pointer=-1)  
+                record['authority'] = get_authority(interface_hrn)
+                table.insert(record) 
 
     def import_person(self, parent_hrn, person):
+        """
+        Register a user record 
+        """
         hrn = email_to_hrn(parent_hrn, person['email'])
 
         # ASN.1 will have problems with hrn's longer than 64 characters
         if len(hrn) > 64:
             hrn = hrn[:64]
 
-        self.logger.info("Import: person " + hrn)
+        self.logger.info("Import: person %s"%hrn)
         key_ids = []
         if 'key_ids' in person and person['key_ids']:
             key_ids = person["key_ids"]
@@ -141,11 +166,11 @@ class sfaImport:
         slicename = _cleanup_string(slicename)
 
         if not slicename:
-            self.logger.error("Import: failed to parse slice name " + slice['name'])
+            self.logger.error("Import: failed to parse slice name %s" %slice['name'])
             return
 
         hrn = parent_hrn + "." + slicename
-        self.logger.info("Import: slice " + hrn)
+        self.logger.info("Import: slice %s"%hrn)
 
         pkey = Keypair(create=True)
         urn = hrn_to_urn(hrn, 'slice')
@@ -167,7 +192,7 @@ class sfaImport:
         nodename = _cleanup_string(nodename)
         
         if not nodename:
-            self.logger.error("Import: failed to parse node name " + node['hostname'])
+            self.logger.error("Import: failed to parse node %s" %node['hostname'])
             return
 
         hrn = parent_hrn + "." + nodename
@@ -211,7 +236,7 @@ class sfaImport:
                 hrn = ".".join([parent_hrn, "internet2", sitename])
 
         urn = hrn_to_urn(hrn, 'authority')
-        self.logger.info("Import: site " + hrn)
+        self.logger.info("Import: site %s"%hrn)
 
         # create the authority
         if not self.AuthHierarchy.auth_exists(urn):