X-Git-Url: http://git.onelab.eu/?a=blobdiff_plain;f=plugins%2Fsliverauth.py;h=61349daabe0c218f0f0769c087bde7c2faf0887a;hb=1b4f53e648b13f7629970787b6ec03387e2d966a;hp=6e3d25f896cab28dc691cb7820dac302dc3dffce;hpb=74efa942e977277b6bc63b6897ae5defdd4418b6;p=nodemanager.git diff --git a/plugins/sliverauth.py b/plugins/sliverauth.py index 6e3d25f..61349da 100644 --- a/plugins/sliverauth.py +++ b/plugins/sliverauth.py @@ -1,14 +1,13 @@ #!/usr/bin/python -tt # vim:set ts=4 sw=4 expandtab: # -# $Id$ -# $URL$ -# # NodeManager plugin for creating credentials in slivers # (*) empower slivers to make API calls throught hmac # (*) also create a ssh key - used by the OMF resource controller # for authenticating itself with its Experiment Controller -# xxx todo : a config option for turning these 2 things on or off ? +# in order to avoid spamming the DB with huge amounts of such tags, +# (*) slices need to have the 'enable_hmac' tag set +# (*) or the 'omf_control' tag set, respectively """ Sliver authentication support for NodeManager. @@ -24,7 +23,7 @@ import socket import logger import tools -def start(options, conf): +def start(): logger.log("sliverauth: (dummy) plugin starting up...") def GetSlivers(data, config, plc): @@ -46,8 +45,18 @@ def GetSlivers(data, config, plc): logger.log("sliverauth: plc-instantiated slice %s does not yet exist. IGNORING!" % sliver['name']) continue - manage_hmac (plc, sliver) - manage_sshkey (plc, sliver) + system_slice = False + for chunk in sliver['attributes']: + if chunk['tagname'] == "system": + if chunk['value'] in (True, 1, '1') or chunk['value'].lower() == "true": + system_slice = True + + for chunk in sliver['attributes']: + if chunk['tagname']=='enable_hmac' and not system_slice: + manage_hmac (plc, sliver) + + if chunk['tagname']=='omf_control': + manage_sshkey (plc, sliver) def SetSliverTag(plc, slice, tagname, value): @@ -92,19 +101,24 @@ def manage_hmac (plc, sliver): # create the key if needed and returns the key contents def generate_sshkey (sliver): - keyfile="/vservers/%s/home/%s/.ssh/id_rsa"%(sliver['name'],sliver['name']) +# initial version was storing stuff in the sliver directly +# keyfile="/vservers/%s/home/%s/.ssh/id_rsa"%(sliver['name'],sliver['name']) +# we're now storing this in the same place as the authorized_keys, which in turn +# gets mounted to the user's home directory in the sliver + keyfile="/home/%s/.ssh/id_rsa"%(sliver['name']) pubfile="%s.pub"%keyfile dotssh=os.path.dirname(keyfile) # create dir if needed if not os.path.isdir (dotssh): os.mkdir (dotssh, 0700) logger.log_call ( [ 'chown', "%s:slices"%(sliver['name']), dotssh ] ) - if not os.path.isfile (pubfile): + if not os.path.isfile(pubfile): comment="%s@%s"%(sliver['name'],socket.gethostname()) logger.log_call( [ 'ssh-keygen', '-t', 'rsa', '-N', '', '-f', keyfile , '-C', comment] ) os.chmod (keyfile, 0400) logger.log_call ( [ 'chown', "%s:slices"%(sliver['name']), keyfile, pubfile ] ) - return file(pubfile).read() + with open(pubfile) as f: + return f.read().strip() # a sliver can get created, deleted and re-created # the slice having the tag is not sufficient to skip key geneneration