blob: e7454b8eb6a98d66741af818e50f61534740bc3d [file] [log] [blame]
Tony Macke4be32f2014-03-11 20:45:25 -04001import os
2import base64
3from collections import defaultdict
4from django.db.models import F, Q
5from planetstack.config import Config
6from observer.openstacksyncstep import OpenStackSyncStep
7from core.models.site import SiteDeployments
8from core.models.user import User, UserDeployments
9from util.logger import Logger, logging
10
11logger = Logger(level=logging.INFO)
12
13class SyncUserDeployments(OpenStackSyncStep):
14 provides=[User, UserDeployments]
15 requested_interval=0
16
17 def fetch_pending(self):
18 # user deployments are not visible to users. We must ensure
19 # user are deployed at all deploymets available to their sites.
20 site_deployments = SiteDeployment.objects.all()
21 site_deploy_lookup = defaultdict(list)
22 for site_deployment in site_deployments:
23 site_deploy_lookup[site_deployment.site].append(site_deployment.deployment)
24
25 user_deployments = UserDeployment.objects.all()
26 user_deploy_lookup = defaultdict(list)
27 for user_deployment in user_deployments:
28 user_deploy_lookup[user_deployment.user].append(user_deployment.deployment)
29
30 for user in User.objects.all():
31 expected_deployments = site_deploy_lookup[user.site]
32 for expected_deployment in expected_deployments:
33 if expected_deployment not in user_deploy_lookup[user]:
34 ud = UserDeployments(user=user, deployment=expected_deployment)
35 ud.save()
36
37 # now we can return all slice deployments that need to be enacted
38 return UserDeployments.objects.filter(Q(enacted__lt=F('updated')) | Q(enacted=None))
39
40 def sync_record(self, user_deployment):
41 logger.info("sync'ing user deployment %s" % user_deployment.name)
42 name = user_deployment.user.email[:user_deployment.user.email.find('@')]
43 user_fields = {'name': name,
44 'email': user_deployment.user.email,
45 'password': hashlib.md5(user_deployment.user.password).hexdigest()[:6],
46 'enabled': True}
47 driver = self.driver.admin_driver(deployment=user_deployment.deployment.name)
48 if not user_deployment.kuser_id:
49 keystone_user = self.driver.create_user(**user_fields)
50 user_deployment.kuser_id = keystone_user.id
51 else:
52 driver.update_user(user_deployment.kuser_id, user_fields)
53
54 # setup user deployment site roles
55 if user_deployment.user.site:
56 site_deployments = SiteDeployments.objects.filter(site=user_deployment.user.site,
57 deployment=user_deployment.deployment)
58 if site_deployments:
59 # need the correct tenant id for site at the deployment
60 tenant_id = site_deployments[0].tenant_id
61 driver.add_user_role(user_deployment.kuser_id,
62 tenant_id, 'user')
63 if user_deployment.user.is_admin:
64 driver.add_user_role(user_deployment.kuser_id, tenant_id, 'admin')
65 else:
66 # may have admin role so attempt to remove it
67 driver.delete_user_role(user_deployment.kuser_id, tenant_id, 'admin')
68
69 if user_deployment.user.public_key:
70 user_driver = self.driver.client_driver(caller=user, tenant=user.site.login_base,
71 deployment=user_deployment.deployment.name)
72 key_fields = {'name': user_deployment.user.keyname,
73 'public_key': user_deployment.user.public_key}
74 user_driver.create_keypair(**key_fields)
75
76 user_deployment.save()