X-Git-Url: http://git.onelab.eu/?a=blobdiff_plain;f=sfa%2Fclient%2Fsfi.py;h=2f8a2a8ff18c3f843c25e6e267eff855b76b700c;hb=0f4b3c7754fe622c6ad7b4f3b418ea648967f21c;hp=14122e1576bc75cd59a2ec18dc390d818a646d89;hpb=6c7a0ade7e59f90e3a32fb72779362188ba54ca2;p=sfa.git diff --git a/sfa/client/sfi.py b/sfa/client/sfi.py index 14122e15..2f8a2a8f 100644 --- a/sfa/client/sfi.py +++ b/sfa/client/sfi.py @@ -492,6 +492,8 @@ use this if you mean an authority instead""") metavar="slice_hrn", help="delegate cred. for slice HRN") parser.add_option("-a", "--auths", dest='delegate_auths',action='append',default=[], metavar='auth_hrn', help="delegate PI cred for auth HRN") + parser.add_option('-d', '--delegate', dest='delegate', help="Override 'delegate' from the config file") + parser.add_option('-b', '--backend', dest='backend', help="Override 'backend' from the config file") return parser @@ -1508,21 +1510,31 @@ $ sfi m if len(args)>0: self.print_help() sys.exit(1) + # enable info by default + self.logger.setLevelFromOptVerbose(self.options.verbose+1) ### the rough sketch goes like this + # (0) produce a p12 file + self.client_bootstrap.my_pkcs12() + # (a) rain check for sufficient config in sfi_config - # we don't allow to override these settings for now myslice_dict={} myslice_keys=['backend', 'delegate', 'platform', 'username'] for key in myslice_keys: - full_key="MYSLICE_" + key.upper() - value=getattr(self.config_instance,full_key,None) + value=None + # oct 2013 - I'm finding myself juggling with config files + # so a couple of command-line options can now override config + if hasattr(args,key): + value=getattr(args,key) + else: + full_key="MYSLICE_" + key.upper() + value=getattr(self.config_instance,full_key,None) if value: myslice_dict[key]=value else: print "Unsufficient config, missing key %s in [myslice] section of sfi_config"%key if len(myslice_dict) != len(myslice_keys): sys.exit(1) # (b) figure whether we are PI for the authority where we belong - self.logger.info("Resolving our own id") + self.logger.info("Resolving our own id %s"%self.user) my_records=self.registry().Resolve(self.user,self.my_credential_string) if len(my_records)!=1: print "Cannot Resolve %s -- exiting"%self.user; sys.exit(1) my_record=my_records[0] @@ -1533,18 +1545,18 @@ $ sfi m my_auths = my_auths_all if options.delegate_auths: my_auths = list(set(my_auths_all).intersection(set(options.delegate_auths))) + self.logger.debug("Restricted to user-provided auths"%(my_auths)) - self.logger.info("Delegate PI creds for authorities: %s"%my_auths ) # (c) get the set of slices that we are in my_slices_all=my_record['reg-slices'] self.logger.info("Found %d slices that we are member of"%len(my_slices_all)) self.logger.debug("They are: %s"%(my_slices_all)) my_slices = my_slices_all + # if user provided slices, deal only with these - if they are found if options.delegate_slices: my_slices = list(set(my_slices_all).intersection(set(options.delegate_slices))) - - self.logger.info("Delegate slice creds for slices: %s"%my_slices) + self.logger.debug("Restricted to user-provided slices: %s"%(my_slices)) # (d) make sure we have *valid* credentials for all these hrn_credentials=[] @@ -1562,7 +1574,13 @@ $ sfi m hrn_delegated_credentials = [] for (hrn, htype, credential) in hrn_credentials: delegated_credential = self.client_bootstrap.delegate_credential_string (credential, delegatee_hrn, delegatee_type) - hrn_delegated_credentials.append ((hrn, htype, delegated_credential, )) + # save these so user can monitor what she's uploaded + filename = os.path.join ( self.options.sfi_dir, + "%s.%s_for_%s.%s.cred"%(hrn,htype,delegatee_hrn,delegatee_type)) + with file(filename,'w') as f: + f.write(delegated_credential) + self.logger.debug("(Over)wrote %s"%filename) + hrn_delegated_credentials.append ((hrn, htype, delegated_credential, filename, )) # (f) and finally upload them to manifold server # xxx todo add an option so the password can be set on the command line @@ -1574,7 +1592,7 @@ $ sfi m password=options.password) uploader.prompt_all() (count_all,count_success)=(0,0) - for (hrn,htype,delegated_credential) in hrn_delegated_credentials: + for (hrn,htype,delegated_credential,filename) in hrn_delegated_credentials: # inspect inspect=Credential(string=delegated_credential) expire_datetime=inspect.get_expiration() @@ -1582,8 +1600,8 @@ $ sfi m if uploader.upload(delegated_credential,message=message): count_success+=1 count_all+=1 - self.logger.info("Successfully uploaded %d/%d credentials"%(count_success,count_all)) + # at first I thought we would want to save these, # like 'sfi delegate does' but on second thought # it is probably not helpful as people would not @@ -1598,6 +1616,7 @@ $ sfi m """ trusted_certs = self.registry().get_trusted_certs() for trusted_cert in trusted_certs: + print "\n===========================================================\n" gid = GID(string=trusted_cert) gid.dump() cert = Certificate(string=trusted_cert)