resolve conflict manually
authorBarış Metin <Talip-Baris.Metin@sophia.inria.fr>
Wed, 13 Oct 2010 14:56:24 +0000 (16:56 +0200)
committerBarış Metin <Talip-Baris.Metin@sophia.inria.fr>
Wed, 13 Oct 2010 14:56:24 +0000 (16:56 +0200)
sfa/client/sfi.py
sfa/managers/aggregate_manager_pl.py
sfa/managers/registry_manager_pl.py
sfa/managers/slice_manager_pl.py
sfa/methods/RenewSliver.py
sfa/plc/api-dev.py [deleted file]
sfa/trust/certificate.py
sfa/trust/credential.py
sfa/util/namespace.py
tests/testCred.py

index e3f65c9..1365342 100755 (executable)
@@ -18,6 +18,7 @@ import zlib
 
 from sfa.util.sfalogging import sfa_logger,sfa_logger_goes_to_console
 from sfa.trust.certificate import Keypair, Certificate
+from sfa.trust.gid import GID
 from sfa.trust.credential import Credential
 from sfa.util.sfaticket import SfaTicket
 from sfa.util.record import SfaRecord, UserRecord, SliceRecord, NodeRecord, AuthorityRecord
@@ -26,7 +27,6 @@ from sfa.util.xmlrpcprotocol import ServerException
 import sfa.util.xmlrpcprotocol as xmlrpcprotocol
 from sfa.util.config import Config
 
-
 AGGREGATE_PORT=12346
 CM_PORT=12346
 
@@ -400,8 +400,8 @@ class Sfi:
         if (os.path.isfile(file)):
             credential = Credential(filename=file)
             # make sure it isnt expired 
-            if not credential.get_lifetime or \
-               datetime.datetime.today() < credential.get_lifetime():
+            if not credential.get_expiration or \
+               datetime.datetime.today() < credential.get_expiration():
                 return credential
         return None 
  
index 05a1de2..d3422c9 100644 (file)
@@ -19,6 +19,7 @@ import sfa.plc.peers as peers
 from sfa.plc.network import *
 from sfa.plc.api import SfaAPI
 from sfa.plc.slices import *
+from dateutil.parser import parse
 
 
 def __get_registry_objects(slice_xrn, creds, users):
@@ -56,7 +57,7 @@ def __get_registry_objects(slice_xrn, creds, users):
         reg_objects['site'] = site
 
         slice = {}
-        slice['expires'] = int(time.mktime(Credential(string=creds[0]).get_lifetime().timetuple()))
+        slice['expires'] = int(time.mktime(Credential(string=creds[0]).get_expiration().timetuple()))
         slice['hrn'] = hrn
         slice['name'] = hrn_to_pl_slicename(hrn)
         slice['url'] = hrn
@@ -88,10 +89,41 @@ def get_version():
     return version
 
 def slice_status(api, slice_xrn, creds):
+    hrn, type = urn_to_hrn(slice_xrn)
+    # find out where this slice is currently running
+    api.logger.info(hrn)
+    slicename = hrn_to_pl_slicename(hrn)
+    
+    slices = api.plshell.GetSlices(api.plauth, [slicename], ['node_ids','person_ids','name','expires'])
+    if len(slices) == 0:        
+        raise Exception("Slice %s not found (used %s as slicename internally)" % slice_xrn, slicename)
+    slice = slices[0]
+    
+    nodes = api.plshell.GetNodes(api.plauth, slice['node_ids'],
+                                    ['hostname', 'boot_state', 'last_contact'])
+    api.logger.info(slice)
+    api.logger.info(nodes)
+    
     result = {}
     result['geni_urn'] = slice_xrn
     result['geni_status'] = 'unknown'
-    result['geni_resources'] = {}
+    result['pl_login'] = slice['name']
+    result['pl_expires'] = slice['expires']
+    
+    resources = []
+    
+    for node in nodes:
+        res = {}
+        res['pl_hostname'] = node['hostname']
+        res['pl_boot_state'] = node['boot_state']
+        res['pl_last_contact'] = node['last_contact']
+        res['geni_urn'] = ''
+        res['geni_status'] = 'unknown'
+        res['geni_error'] = ''
+
+        resources.append(res)
+        
+    result['geni_resources'] = resources
     return result
 
 def create_slice(api, slice_xrn, creds, rspec, users):
@@ -149,15 +181,16 @@ def create_slice(api, slice_xrn, creds, rspec, users):
     return True
 
 
-def renew_slice(api, xrn, creds, exipration_time):
+def renew_slice(api, xrn, creds, expiration_time):
     hrn, type = urn_to_hrn(xrn)
     slicename = hrn_to_pl_slicename(hrn)
     slices = api.plshell.GetSlices(api.plauth, {'name': slicename}, ['slice_id'])
     if not slices:
         raise RecordNotFound(hrn)
     slice = slices[0]
-    slice['expires'] = expiration_time
-    api.plshell.UpdateSlice(api.plauth, slice['slice_id'], slice)
+    requested_time = parse(expiration_time)
+    record = {'expires': int(time.mktime(requested_time.timetuple()))}
+    api.plshell.UpdateSlice(api.plauth, slice['slice_id'], record)
     return 1         
 
 def start_slice(api, xrn, creds):
index 31496c2..f71915e 100644 (file)
@@ -66,6 +66,8 @@ def get_credential(api, xrn, type, is_self=False):
     #new_cred.set_pubkey(object_gid.get_pubkey())
     new_cred.set_privileges(rights)
     new_cred.get_privileges().delegate_all_privileges(True)
+    if 'expires' in record:
+        new_cred.set_expiration(int(record['expires']))
     auth_kind = "authority,ma,sa"
     # Parent not necessary, verify with certs
     #new_cred.set_parent(api.auth.hierarchy.get_auth_cred(auth_hrn, kind=auth_kind))
index eee8693..2c98e24 100644 (file)
@@ -31,10 +31,41 @@ def get_version():
     return version
 
 def slice_status(api, slice_xrn, creds ):
+    hrn, type = urn_to_hrn(slice_xrn)
+    # find out where this slice is currently running
+    api.logger.info(hrn)
+    slicename = hrn_to_pl_slicename(hrn)
+    api.logger.info("Checking status for %s" % slicename)
+    slices = api.plshell.GetSlices(api.plauth, [slicename], ['node_ids','person_ids','name','expires'])
+    if len(slices) == 0:        
+        raise Exception("Slice %s not found (used %s as slicename internally)" % (slice_xrn, slicename))
+    slice = slices[0]
+    
+    nodes = api.plshell.GetNodes(api.plauth, slice['node_ids'],
+                                    ['hostname', 'boot_state', 'last_contact'])
+    api.logger.info(slice)
+    api.logger.info(nodes)
+    
     result = {}
     result['geni_urn'] = slice_xrn
     result['geni_status'] = 'unknown'
-    result['geni_resources'] = {}
+    result['pl_login'] = slice['name']
+    result['pl_expires'] = slice['expires']
+    
+    resources = []
+    
+    for node in nodes:
+        res = {}
+        res['pl_hostname'] = node['hostname']
+        res['pl_boot_state'] = node['boot_state']
+        res['pl_last_contact'] = node['last_contact']
+        res['geni_urn'] = ''
+        res['geni_status'] = 'unknown'
+        res['geni_error'] = ''
+
+        resources.append(res)
+        
+    result['geni_resources'] = resources
     return result
 
 def create_slice(api, xrn, creds, rspec, users):
index 267410d..1d7c540 100644 (file)
@@ -31,11 +31,11 @@ class RenewSliver(Method):
 
         # Validate that the time does not go beyond the credential's expiration time
         requested_time = parse(expiration_time)
-        if requested_time > Credential(string=valid_creds[0]).get_lifetime():
+        if requested_time > Credential(string=valid_creds[0]).get_expiration():
             raise InsufficientRights('SliverStatus: Credential expires before requested expiration time')
        
         manager = self.api.get_interface_manager()
-        manager.renew_slice(self.api, xrn, valid_creds, requested_time)    
+        manager.renew_slice(self.api, slice_xrn, valid_creds, expiration_time)    
  
         return 1
     
diff --git a/sfa/plc/api-dev.py b/sfa/plc/api-dev.py
deleted file mode 100644 (file)
index 21d4ae8..0000000
+++ /dev/null
@@ -1,562 +0,0 @@
-#
-# SFA XML-RPC and SOAP interfaces
-#
-### $Id: api.py 17793 2010-04-26 21:40:57Z tmack $
-### $URL: https://svn.planet-lab.org/svn/sfa/trunk/sfa/plc/api.py $
-#
-
-import sys
-import os
-import traceback
-import string
-import xmlrpclib
-
-from sfa.util.sfalogging import sfa_logger
-from sfa.trust.auth import Auth
-from sfa.util.config import *
-from sfa.util.faults import *
-from sfa.trust.rights import *
-from sfa.trust.credential import Credential
-from sfa.trust.certificate import *
-from sfa.util.namespace import *
-from sfa.util.api import *
-from sfa.util.nodemanager import NodeManager
-from collections import defaultdict
-
-
-class RecordInfo():
-    
-    shell = None
-    auth = None
-    
-    # pl records
-    sites = {}
-    slices = {}
-    persons = {}
-    nodes = {}
-    keys = {}
-
-    # sfa records
-    sfa_authorities = {}
-    sfa_slices = {}
-    sfa_users = {}
-    sfa_nodes = {}
-     
-    records = []
-
-    def __init__(self, api, records):
-        self.api = api
-        self.shell = api.plshell
-        self.auth = api.plauth
-        
-        site_ids = []
-        slice_ids = []
-        person_ids = []
-        node_ids = []
-
-        # put records into groups based on types
-        for record in records:
-            pointer = record['pointer']
-            if record['type'] == 'authority':
-                self.sfa_authorities[pointer] = record
-                self.records.append(record)
-                site_ids.append(record['pointer'])
-            elif record['type'] == 'slice':
-                self.sfa_slices[pointer] = record
-                self.records.append(record)
-                slice_ids.append(record['pointer'])
-            elif record['type'] == 'user':
-                self.sfa_users[pointer] = record
-                self.records.append(record)
-                person_ids.append(record['pointer'])
-            elif record['type'] == 'node':
-                self.sfa_nodes[pointer] = record
-                self.records.append(record)
-                node_ids.append(record['pointer']) 
-
-        # get pl info for these records
-        self.update_pl_sites(site_ids)
-        self.update_pl_slices(slice_ids)
-        self.update_pl_persons(person_ids)
-        self.update_pl_nodes(node_ids)
-       
-        site_ids = []
-        slice_ids = []
-        person_ids = []
-        node_ids = []
-        # now get pl records for all ids associated with 
-        # these records
-        for record in records:
-            if 'site_id' in record:
-                site_ids.append(record['site_id'])
-            if 'site_ids' in records:
-                site_ids.extend(record['site_ids'])
-            if 'person_ids' in record:
-                person_ids.extend(record['person_ids'])
-            if 'slice_ids' in record:
-                slice_ids.extend(record['slice_ids'])
-            if 'node_ids' in record:
-                node_ids.extend(record['node_ids'])
-
-        # get pl info for these records
-        self.update_pl_sites(site_ids)
-        self.update_pl_slices(slice_ids)
-        self.update_pl_persons(person_ids)
-        self.update_pl_nodes(node_ids)
-
-        # convert pl ids to hrns  
-        self.update_hrns()
-
-        # update sfa info
-        self.update_sfa_info(person_ids)
-
-    def update_pl_sites(self, site_ids):
-        """
-        Update site records with PL info 
-        """
-        if not site_ids:
-            return
-        sites = self.shell.GetSites(self.auth, site_ids)
-        for site in sites:
-            site_id = site['site_id']
-            self.sites[site_id] = site
-            if site_id in self.sfa_authorities:
-                self.sfa_authorities[site_id].update(site)
-
-    def update_pl_slices(self, slice_ids):
-        """
-        Update slice records with PL info
-        """
-        if not slice_ids:
-            return
-        slices = self.shell.GetSlices(self.auth, slice_ids)
-        for slice in slices:
-            slice_id = slice['slice_id']
-            self.slices[slice_id] = slice
-            if slice_id in self.sfa_slices:
-                self.sfa_slices[slice_id].update(slice)
-
-    def update_pl_persons(self, person_ids):
-        """
-        Update person records with PL info
-        """
-        key_ids = []
-        if not person_ids:
-            return
-        persons = self.shell.GetPersons(self.auth, person_ids)
-        for person in persons:
-            person_id = person['person_id']
-            self.persons[person_id] = person 
-            key_ids.extend(person['key_ids'])
-            if person_id in self.sfa_users:
-                self.sfa_users[person_id].update(person)
-        self.update_pl_keys(key_ids)
-
-    def update_pl_keys(self, key_ids):
-        """
-        Update user records with PL public key info
-        """
-        if not key_ids:
-            return
-        keys = self.shell.GetKeys(self.auth, key_ids)
-        for key in keys:
-            person_id = key['person_id']
-            self.keys[key['key_id']] = key
-            if person_id in self.sfa_users:
-                person = self.sfa_users[person_id]    
-                if not 'keys' in person:
-                    person['keys'] = [key['key']]
-                else: 
-                    person['keys'].append(key['key'])
-
-    def update_pl_nodes(self, node_ids):
-        """
-        Update node records with PL info
-        """
-        if not node_ids:
-            return 
-        nodes = self.shell.GetNodes(self.auth, node_ids)
-        for node in nodes:
-            node_id = node['node_id']
-            self.nodes[node['node_id']] = node
-            if node_id in self.sfa_nodes:
-                self.sfa_nodes[node_id].update(node)
-    
-
-    def update_hrns(self):
-        """
-        Convert pl ids to hrns
-        """
-        for record in self.records:
-            # get all necessary data
-            type = record['type']
-            pointer = record['pointer']
-            auth_hrn = self.api.hrn
-            login_base = ''
-            if pointer == -1:
-                continue       
-
-            if 'site_id' in record:
-                site = self.sites[record['site_id']]
-                login_base = site['login_base']
-                record['site'] = ".".join([auth_hrn, login_base])
-            if 'person_ids' in record:
-                emails = [self.persons[person_id]['email'] for person_id in record['person_ids'] \
-                          if person_id in self.persons]
-                usernames = [email.split('@')[0] for email in emails]
-                person_hrns = [".".join([auth_hrn, login_base, username]) for username in usernames]
-                record['persons'] = person_hrns
-            if 'slice_ids' in record:
-                slicenames = [self.slices[slice_id]['name'] for slice_id in record['slice_ids'] \
-                              if slice_id in self.slices]
-                slice_hrns = [slicename_to_hrn(auth_hrn, slicename) for slicename in slicenames]
-                record['slices'] = slice_hrns
-            if 'node_ids' in record:
-                hostnames = [self.nodes[node_id]['hostname'] for node_id in record['node_ids'] \
-                             if node_id in self.nodes]
-                node_hrns = [hostname_to_hrn(auth_hrn, login_base, hostname) for hostname in hostnames]
-                record['nodes'] = node_hrns
-            if 'site_ids' in record:
-                login_bases = [self.sites[site_id]['login_base'] for site_id in record['site_ids'] \
-                               if site_id in self.sites]
-                site_hrns = [".".join([auth_hrn, lbase]) for lbase in login_bases]
-                record['sites'] = site_hrns 
-
-    def update_sfa_info(self, person_ids):
-        from sfa.util.table import SfaTable
-        table = SfaTable()
-        persons = table.find({'type': 'user', 'pointer': person_ids})
-        # create a hrns keyed on the sfa record's pointer.
-        # Its possible for  multiple records to have the same pointer so 
-        # the dict's value will be a list of hrns.
-        person_dict = defaultdict(list)
-        for person in persons:
-            person_dict[person['pointer']].append(person['hrn'])                       
-
-        def startswith(prefix, values):
-            return [value for value in values if value.startswith(prefix)]
-
-        for record in self.records:
-            authority = record['authority']
-            if record['pointer'] == -1:
-                continue
-            
-            if record['type'] == 'slice':
-                # all slice users are researchers
-                record['PI'] = []
-                record['researchers'] = []    
-                for person_id in record['person_ids']:
-                    record['researchers'].extend(person_dict[person_id])
-                # also add the pis at the slice's site
-                site = self.sites[record['site_id']]    
-                for person_id in site['person_ids']:
-                    person = self.persons[person_id]
-                    if 'pi' in person['roles']:
-                        # PLCAPI doesn't support per site roles 
-                        # (a pi has the pi role at every site he belongs to).
-                        # We shouldnt allow this in SFA         
-                        record['PI'].extend(startswith(authority, person_dict[person_id]))    
-
-            elif record['type'] == 'authority':
-                record['PI'] = []
-                record['operator'] = []
-                record['owner'] = []
-                for person_id in record['person_ids']:
-                    person = self.persons[person_id]
-                    if 'pi' in person['roles']:
-                        # only get PI's at this site
-                        record['PI'].extend(startswith(record['hrn'], person_dict[person_id]))
-                    if 'tech' in person['roles']:
-                        # only get PI's at this site
-                        record['operator'].extend(startswith(record['hrn'], person_dict[person_id]))
-                    if 'admin' in person['roles']:
-                        record['owner'].extend(startswith(record['hrn'], person_dict[person_id]))
-                            
-            elif record['type'] == 'node':
-                record['dns'] = record['hostname']
-
-            elif record['type'] == 'user':
-                record['email'] = record['email']                   
-                                   
-                  
-                 
-                
-                    
-    def get_records(self):
-        return self.records
-
-class SfaAPI(BaseAPI):
-
-    # flat list of method names
-    import sfa.methods
-    methods = sfa.methods.all
-    
-    def __init__(self, config = "/etc/sfa/sfa_config.py", encoding = "utf-8", 
-                 methods='sfa.methods', peer_cert = None, interface = None, 
-                key_file = None, cert_file = None, cache = None):
-        BaseAPI.__init__(self, config=config, encoding=encoding, methods=methods, \
-                         peer_cert=peer_cert, interface=interface, key_file=key_file, \
-                         cert_file=cert_file, cache=cache)
-        self.encoding = encoding
-
-        from sfa.util.table import SfaTable
-        self.SfaTable = SfaTable
-        # Better just be documenting the API
-        if config is None:
-            return
-
-        # Load configuration
-        self.config = Config(config)
-        self.auth = Auth(peer_cert)
-        self.interface = interface
-        self.key_file = key_file
-        self.key = Keypair(filename=self.key_file)
-        self.cert_file = cert_file
-        self.cert = Certificate(filename=self.cert_file)
-        self.credential = None
-        # Initialize the PLC shell only if SFA wraps a myPLC
-        rspec_type = self.config.get_aggregate_type()
-        if (rspec_type == 'pl' or rspec_type == 'vini'):
-            self.plshell = self.getPLCShell()
-            self.plshell_version = "4.3"
-
-        self.hrn = self.config.SFA_INTERFACE_HRN
-        self.time_format = "%Y-%m-%d %H:%M:%S"
-        self.logger=sfa_logger()
-
-    def getPLCShell(self):
-        self.plauth = {'Username': self.config.SFA_PLC_USER,
-                       'AuthMethod': 'password',
-                       'AuthString': self.config.SFA_PLC_PASSWORD}
-
-        self.plshell_type = 'xmlrpc' 
-        # connect via xmlrpc
-        url = self.config.SFA_PLC_URL
-        shell = xmlrpclib.Server(url, verbose = 0, allow_none = True)
-        return shell
-
-    def getCredential(self):
-        if self.interface in ['registry']:
-            return self.getCredentialFromLocalRegistry()
-        else:
-            return self.getCredentialFromRegistry()
-    
-    def getCredentialFromRegistry(self):
-        """ 
-        Get our credential from a remote registry 
-        """
-        type = 'authority'
-        path = self.config.SFA_DATA_DIR
-        filename = ".".join([self.interface, self.hrn, type, "cred"])
-        cred_filename = path + os.sep + filename
-        try:
-            credential = Credential(filename = cred_filename)
-            return credential.save_to_string(save_parents=True)
-        except IOError:
-            from sfa.server.registry import Registries
-            registries = Registries(self)
-            registry = registries[self.hrn]
-            cert_string=self.cert.save_to_string(save_parents=True)
-            # get self credential
-            self_cred = registry.GetSelfCredential(cert_string, self.hrn, type)
-            # get credential
-            cred = registry.GetCredential(self_cred, type, self.hrn)
-            
-            # save cred to file
-            Credential(string=cred).save_to_file(cred_filename, save_parents=True)
-            return cred
-
-    def getCredentialFromLocalRegistry(self):
-        """
-        Get our current credential directly from the local registry.
-        """
-
-        hrn = self.hrn
-        auth_hrn = self.auth.get_authority(hrn)
-    
-        # is this a root or sub authority
-        if not auth_hrn or hrn == self.config.SFA_INTERFACE_HRN:
-            auth_hrn = hrn
-        auth_info = self.auth.get_auth_info(auth_hrn)
-        table = self.SfaTable()
-        records = table.findObjects(hrn)
-        if not records:
-            raise RecordNotFound
-        record = records[0]
-        type = record['type']
-        object_gid = record.get_gid_object()
-        new_cred = Credential(subject = object_gid.get_subject())
-        new_cred.set_gid_caller(object_gid)
-        new_cred.set_gid_object(object_gid)
-        new_cred.set_issuer(key=auth_info.get_pkey_object(), subject=auth_hrn)
-        new_cred.set_pubkey(object_gid.get_pubkey())
-        r1 = determine_rights(type, hrn)
-        new_cred.set_privileges(r1)
-
-        auth_kind = "authority,ma,sa"
-
-        new_cred.set_parent(self.auth.hierarchy.get_auth_cred(auth_hrn, kind=auth_kind))
-
-        new_cred.encode()
-        new_cred.sign()
-
-        return new_cred.save_to_string(save_parents=True)
-   
-
-    def loadCredential (self):
-        """
-        Attempt to load credential from file if it exists. If it doesnt get
-        credential from registry.
-        """
-
-        # see if this file exists
-        # XX This is really the aggregate's credential. Using this is easier than getting
-        # the registry's credential from iteslf (ssl errors).   
-        ma_cred_filename = self.config.SFA_DATA_DIR + os.sep + self.interface + self.hrn + ".ma.cred"
-        try:
-            self.credential = Credential(filename = ma_cred_filename)
-        except IOError:
-            self.credential = self.getCredentialFromRegistry()
-
-    ##
-    # Convert SFA fields to PLC fields for use when registering up updating
-    # registry record in the PLC database
-    #
-    # @param type type of record (user, slice, ...)
-    # @param hrn human readable name
-    # @param sfa_fields dictionary of SFA fields
-    # @param pl_fields dictionary of PLC fields (output)
-
-    def sfa_fields_to_pl_fields(self, type, hrn, record):
-
-        def convert_ints(tmpdict, int_fields):
-            for field in int_fields:
-                if field in tmpdict:
-                    tmpdict[field] = int(tmpdict[field])
-
-        pl_record = {}
-        #for field in record:
-        #    pl_record[field] = record[field]
-        if type == "slice":
-            if not "instantiation" in pl_record:
-                pl_record["instantiation"] = "plc-instantiated"
-            pl_record["name"] = hrn_to_pl_slicename(hrn)
-           if "url" in record:
-               pl_record["url"] = record["url"]
-           if "description" in record:
-               pl_record["description"] = record["description"]
-           if "expires" in record:
-               pl_record["expires"] = int(record["expires"])
-
-        elif type == "node":
-            if not "hostname" in pl_record:
-                if not "hostname" in record:
-                    raise MissingSfaInfo("hostname")
-                pl_record["hostname"] = record["hostname"]
-            if not "model" in pl_record:
-                pl_record["model"] = "geni"
-
-        elif type == "authority":
-            pl_record["login_base"] = hrn_to_pl_login_base(hrn)
-
-            if not "name" in pl_record:
-                pl_record["name"] = hrn
-
-            if not "abbreviated_name" in pl_record:
-                pl_record["abbreviated_name"] = hrn
-
-            if not "enabled" in pl_record:
-                pl_record["enabled"] = True
-
-            if not "is_public" in pl_record:
-                pl_record["is_public"] = True
-
-        return pl_record
-
-
-    def fill_record_info(self, records):
-        """
-        Given a SFA record, fill in the PLC specific and SFA specific
-        fields in the record. 
-        """
-        if not isinstance(records, list):
-            records = [records]
-
-        record_info = RecordInfo(self, records)
-        return record_info.get_records()
-
-    def update_membership_list(self, oldRecord, record, listName, addFunc, delFunc):
-        # get a list of the HRNs tht are members of the old and new records
-        if oldRecord:
-            oldList = oldRecord.get(listName, [])
-        else:
-            oldList = []     
-        newList = record.get(listName, [])
-
-        # if the lists are the same, then we don't have to update anything
-        if (oldList == newList):
-            return
-
-        # build a list of the new person ids, by looking up each person to get
-        # their pointer
-        newIdList = []
-        table = self.SfaTable()
-        records = table.find({'type': 'user', 'hrn': newList})
-        for rec in records:
-            newIdList.append(rec['pointer'])
-
-        # build a list of the old person ids from the person_ids field 
-        if oldRecord:
-            oldIdList = oldRecord.get("person_ids", [])
-            containerId = oldRecord.get_pointer()
-        else:
-            # if oldRecord==None, then we are doing a Register, instead of an
-            # update.
-            oldIdList = []
-            containerId = record.get_pointer()
-
-    # add people who are in the new list, but not the oldList
-        for personId in newIdList:
-            if not (personId in oldIdList):
-                addFunc(self.plauth, personId, containerId)
-
-        # remove people who are in the old list, but not the new list
-        for personId in oldIdList:
-            if not (personId in newIdList):
-                delFunc(self.plauth, personId, containerId)
-
-    def update_membership(self, oldRecord, record):
-        if record.type == "slice":
-            self.update_membership_list(oldRecord, record, 'researcher',
-                                        self.plshell.AddPersonToSlice,
-                                        self.plshell.DeletePersonFromSlice)
-        elif record.type == "authority":
-            # xxx TODO
-            pass
-
-
-
-class ComponentAPI(BaseAPI):
-
-    def __init__(self, config = "/etc/sfa/sfa_config.py", encoding = "utf-8", methods='sfa.methods',
-                 peer_cert = None, interface = None, key_file = None, cert_file = None):
-
-        BaseAPI.__init__(self, config=config, encoding=encoding, methods=methods, peer_cert=peer_cert,
-                         interface=interface, key_file=key_file, cert_file=cert_file)
-        self.encoding = encoding
-
-        # Better just be documenting the API
-        if config is None:
-            return
-
-        self.nodemanager = NodeManager(self.config)
-
-    def sliver_exists(self):
-        sliver_dict = self.nodemanager.GetXIDs()
-        if slicename in sliver_dict.keys():
-            return True
-        else:
-            return False
index 98588a9..25bb99a 100644 (file)
@@ -312,11 +312,18 @@ class Certificate:
         # load it (support for the ---parent--- tag as well as normal chained certs)
 
         string = string.strip()
-
-
-        if not string.startswith('-----'):
+        
+        # If it's not in proper PEM format, wrap it
+        if string.count('-----BEGIN CERTIFICATE') == 0:
             string = '-----BEGIN CERTIFICATE-----\n%s\n-----END CERTIFICATE-----' % string
 
+        # If there is a PEM cert in there, but there is some other text first
+        # such as the text of the certificate, skip the text
+        beg = string.find('-----BEGIN CERTIFICATE')
+        if beg > 0:
+            # skipping over non cert beginning                                                                                                              
+            string = string[beg:]
+
         parts = []
 
         if string.count('-----BEGIN CERTIFICATE-----') > 1 and \
index 1290532..43dc768 100644 (file)
@@ -43,8 +43,8 @@ from sfa.trust.rights import Right, Rights
 from sfa.trust.gid import GID
 from sfa.util.namespace import urn_to_hrn
 
-# Two years, in seconds 
-DEFAULT_CREDENTIAL_LIFETIME = 60 * 60 * 24 * 365 * 2
+# 2 weeks, in seconds 
+DEFAULT_CREDENTIAL_LIFETIME = 86400 * 14
 
 
 # TODO:
@@ -257,10 +257,9 @@ class Credential(object):
         self.gidObject = legacy.get_gid_object()
         lifetime = legacy.get_lifetime()
         if not lifetime:
-            # Default to two years
-            self.set_lifetime(DEFAULT_CREDENTIAL_LIFETIME)
+            self.set_expiration(datetime.datetime.utcnow() + datetime.timedelta(seconds=DEFAULT_CREDENTIAL_LIFETIME))
         else:
-            self.set_lifetime(int(lifetime))
+            self.set_expiration(int(lifetime))
         self.lifeTime = legacy.get_lifetime()
         self.set_privileges(legacy.get_privileges())
         self.get_privileges().delegate_all_privileges(legacy.get_delegate())
@@ -315,28 +314,30 @@ class Credential(object):
             self.decode()
         return self.gidObject
 
+
+            
     ##
-    # set the lifetime of this credential
-    #
-    # @param lifetime lifetime of credential
-    # . if lifeTime is a datetime object, it is used for the expiration time
-    # . if lifeTime is an integer value, it is considered the number of seconds
-    #   remaining before expiration
-
-    def set_lifetime(self, lifeTime):
-        if isinstance(lifeTime, int):
-            self.expiration = datetime.timedelta(seconds=lifeTime) + datetime.datetime.utcnow()
+    # Expiration: an absolute UTC time of expiration (as either an int or datetime)
+    # 
+    def set_expiration(self, expiration):
+        if isinstance(expiration, int):
+            self.expiration = datetime.datetime.fromtimestamp(expiration)
         else:
-            self.expiration = lifeTime
+            self.expiration = expiration
+            
 
     ##
     # get the lifetime of the credential (in datetime format)
 
-    def get_lifetime(self):
+    def get_expiration(self):
         if not self.expiration:
             self.decode()
         return self.expiration
 
+    ##
+    # For legacy sake
+    def get_lifetime(self):
+        return self.get_expiration()
  
     ##
     # set the privileges
@@ -399,7 +400,7 @@ class Credential(object):
         append_sub(doc, cred, "target_urn", self.gidObject.get_urn())
         append_sub(doc, cred, "uuid", "")
         if not self.expiration:
-            self.set_lifetime(DEFAULT_CREDENTIAL_LIFETIME)
+            self.set_expiration(datetime.datetime.utcnow() + datetime.timedelta(seconds=DEFAULT_CREDENTIAL_LIFETIME))
         self.expiration = self.expiration.replace(microsecond=0)
         append_sub(doc, cred, "expires", self.expiration.isoformat())
         privileges = doc.createElement("privileges")
@@ -583,7 +584,7 @@ class Credential(object):
         
 
         self.set_refid(cred.getAttribute("xml:id"))
-        self.set_lifetime(parse(getTextNode(cred, "expires")))
+        self.set_expiration(parse(getTextNode(cred, "expires")))
         self.gidCaller = GID(string=getTextNode(cred, "owner_gid"))
         self.gidObject = GID(string=getTextNode(cred, "target_gid"))   
 
@@ -675,7 +676,7 @@ class Credential(object):
             return True
         
         # make sure it is not expired
-        if self.get_lifetime() < datetime.datetime.utcnow():
+        if self.get_expiration() < datetime.datetime.utcnow():
             raise CredentialNotVerifiable("Credential expired at %s" % self.expiration.isoformat())
 
         # Verify the signatures
@@ -783,7 +784,7 @@ class Credential(object):
             raise CredentialNotVerifiable("Target gid not equal between parent and child")
 
         # make sure my expiry time is <= my parent's
-        if not parent_cred.get_lifetime() >= self.get_lifetime():
+        if not parent_cred.get_expiration() >= self.get_expiration():
             raise CredentialNotVerifiable("Delegated credential expires after parent")
 
         # make sure my signer is the parent's caller
@@ -816,7 +817,7 @@ class Credential(object):
         dcred.set_gid_caller(delegee_gid)
         dcred.set_gid_object(object_gid)
         dcred.set_parent(self)
-        dcred.set_lifetime(self.get_lifetime())
+        dcred.set_expiration(self.get_expiration())
         dcred.set_privileges(self.get_privileges())
         dcred.get_privileges().delegate_all_privileges(True)
         #dcred.set_issuer_keys(keyfile, delegee_gidfile)
index 1595a63..7e3c03c 100644 (file)
@@ -2,37 +2,53 @@ import re
 from sfa.util.faults import *
 URN_PREFIX = "urn:publicid:IDN"
 
+def __get_hierarchy_delim_indexes(hrn):
+    # find all non escaped '.'
+    hierarchy_delim = '([a-zA-Z0-9][\.])'
+    parts = re.findall(hierarchy_delim, hrn)
+    # list of indexes for every  hierarchy delimieter
+    indexes = []
+    for part in parts:
+        indexes.append(hrn.index(part) + 1)
+    return indexes 
+
 def get_leaf(hrn):
-    parts = hrn.split(".")
-    return ".".join(parts[-1:])
+    delim_indexes = __get_hierarchy_delim_indexes(hrn)
+    if not delim_indexes:
+        return hrn
+    
+    last_delim_index = delim_indexes[-1:][0] + 1
+    return hrn[last_delim_index:] 
 
 def get_authority(xrn):
     hrn, type = urn_to_hrn(xrn)
     if type and type == 'authority':
         return hrn
+  
+    delim_indexes = __get_hierarchy_delim_indexes(hrn)
+    if not delim_indexes:
+        return ''
+    last_delim_index = delim_indexes[-1:][0] 
+    return hrn[:last_delim_index] 
     
-    parts = hrn.split(".")
-    return ".".join(parts[:-1])
-
 def hrn_to_pl_slicename(hrn):
     # remove any escaped no alpah numeric characters
     #hrn = re.sub('\\\[^a-zA-Z0-9]', '', hrn)
-    # remove any escaped '.' (i.e. '\.')
-    hrn = hrn.replace('\\.', '')
+    hrn = re.sub(r'\\(.)', '', hrn)
     parts = hrn.split(".")
     return parts[-2] + "_" + parts[-1]
 
 # assuming hrn is the hrn of an authority, return the plc authority name
 def hrn_to_pl_authname(hrn):
-    # remove any escaped '.' (i.e. '\.')
-    hrn = hrn.replace('\\.', '')
+    # remove any escaped no alpah numeric characters
+    hrn = re.sub(r'\\(.)', '', hrn)
     parts = hrn.split(".")
     return parts[-1]
 
 # assuming hrn is the hrn of an authority, return the plc login_base
 def hrn_to_pl_login_base(hrn):
-    # remove any escaped '.' (i.e. '\.')
-    hrn = hrn.replace('\\.', '')
+    # remove any escaped no alpah numeric characters
+    hrn = re.sub(r'\\(.)', '', hrn)
     return hrn_to_pl_authname(hrn)
 
 def hostname_to_hrn(auth_hrn, login_base, hostname):
@@ -70,20 +86,21 @@ def urn_to_hrn(urn):
         return urn, None
 
     name = urn[len(URN_PREFIX):]
-    hrn_parts = name.split("+")
-    type = hrn_parts.pop(2)
+    urn_parts = name.split("+")
+    type = urn_parts.pop(2)
     
          
     # Remove the authority name (e.g. '.sa')
     if type == 'authority':
-        hrn_parts = hrn_parts[:-1]
+        urn_parts = urn_parts[:-1]
 
     # convert hrn_parts (list) into hrn (str) by doing the following
     # 1. remove blank elements
-    # 2. escape '.'            # '.' exists in protogeni object names and are not delimiters
-    # 3. replace ':' with '.'  # ':' is the urn hierarchy delimiter
+    # 2. escape all non alpha numeric chars (excluding ':')
+    # 3. replace ':' with '.'  (':' is the urn hierarchy delimiter)
     # 4. join list elements using '.' 
-    hrn = '.'.join([part.replace('.', '\\.').replace(':', '.') for part in hrn_parts if part]) 
+    #hrn = '.'.join([part.replace('.', '\\.').replace(':', '.') for part in hrn_parts if part]) 
+    hrn = '.'.join([re.sub(r'([^a-zA-Z0-9\:])', r'\\\1', part).replace(':', '.') for part in urn_parts if part]) 
     
     return str(hrn), str(type) 
     
@@ -102,16 +119,11 @@ def hrn_to_urn(hrn, type=None):
     else:
         authority = get_authority(hrn)
         name = get_leaf(hrn)   
-   
-    # We have to do the following conversion
-    # '\\.'  -> '.'    # where '.' belongs in the urn name
-    # '.'    -> ':"    # where ':' is the urn hierarchy delimiter
-    # by doing the following
-    # 1. split authority around '\\.'
-    # 2. replace '.' with ':' in all parts
-    # 3. join parts around '.'  
-    parts = authority.split('\\.')
-    authority = '.'.join([part.replace('.', ':') for part in parts])
+  
+    # convert from hierarchy delimiter from '.' to ':'   
+    authority = re.sub(r'([a-zA-Z0-9])[\.]', r'\1:', authority) 
+    # unescape escaped characters
+    authority = re.sub(r'\\(.)', r'\1', authority)
     
     if type == None:
         urn = "+".join(['',authority,name])
index 32fac4a..5a563d6 100755 (executable)
@@ -32,7 +32,7 @@ class TestCred(unittest.TestCase):
       cred.set_gid_object(gidObject)
       self.assertEqual(cred.get_gid_object().get_subject(), gidObject.get_subject())
 
-      cred.set_lifetime(lifeTime)
+      cred.set_expiration(datetime.datetime.utcnow() + datetime.timedelta(seconds=lifeTime))
       
       cred.set_privileges(rights)
       self.assertEqual(cred.get_privileges().save_to_string(), rights)
@@ -81,7 +81,7 @@ class TestCred(unittest.TestCase):
       cred = Credential()
       cred.set_gid_caller(gidCaller)
       cred.set_gid_object(gidObject)
-      cred.set_lifetime(3600)
+      cred.set_expiration(datetime.datetime.utcnow() + datetime.timedelta(seconds=3600))
       cred.set_privileges("embed:1, bind:1")
       cred.encode()
 
@@ -103,7 +103,7 @@ class TestCred(unittest.TestCase):
       delegated.set_gid_caller(gidDelegatee)
       delegated.set_gid_object(gidObject)      
       delegated.set_parent(cred)
-      delegated.set_lifetime(600)
+      delegated.set_expiration(datetime.datetime.utcnow() + datetime.timedelta(seconds=600))
       delegated.set_privileges("embed:1, bind:1")
       gidCaller.save_to_file("/tmp/caller_gid")
       ckeys.save_to_file("/tmp/caller_pkey")      
@@ -120,7 +120,7 @@ class TestCred(unittest.TestCase):
       backup = Credential(string=delegated.get_xml())
 
       # Test that verify catches an incorrect lifetime      
-      delegated.set_lifetime(6000)
+      delegated.set_expiration(datetime.datetime.utcnow() + datetime.timedelta(seconds=6000))
       delegated.encode()
       delegated.sign()
       try: