Tony Mack | ffe6d8b | 2015-01-06 23:48:02 -0500 | [diff] [blame] | 1 | import os |
| 2 | import base64 |
| 3 | from collections import defaultdict |
| 4 | from django.db.models import F, Q |
| 5 | from planetstack.config import Config |
| 6 | from observer.openstacksyncstep import OpenStackSyncStep |
| 7 | from core.models.slice import Controller, SlicePrivilege |
| 8 | from core.models.user import User |
| 9 | from core.models.controlleruser import ControllerUser, ControllerSlicePrivilege |
| 10 | from util.logger import Logger, logging |
| 11 | |
| 12 | from observer.ansible import * |
| 13 | |
| 14 | logger = Logger(level=logging.INFO) |
| 15 | |
| 16 | class SyncControllerSlicePrivileges(OpenStackSyncStep): |
Sapan Bhatia | 58243ad | 2015-01-16 22:15:53 +0000 | [diff] [blame] | 17 | provides=[ControllerSlicePrivilege, SlicePrivilege] |
Tony Mack | ffe6d8b | 2015-01-06 23:48:02 -0500 | [diff] [blame] | 18 | requested_interval=0 |
| 19 | |
| 20 | def fetch_pending(self, deleted): |
| 21 | |
| 22 | if (deleted): |
| 23 | return ControllerSlicePrivilege.deleted_objects.all() |
| 24 | else: |
| 25 | return ControllerSlicePrivilege.objects.filter(Q(enacted__lt=F('updated')) | Q(enacted=None)) |
| 26 | |
| 27 | def sync_record(self, controller_slice_privilege): |
| 28 | logger.info("sync'ing controler_slice_privilege %s at controller %s" % (controller_slice_privilege, controller_slice_privilege.controller)) |
| 29 | |
| 30 | if not controller_slice_privilege.controller.admin_user: |
| 31 | logger.info("controller %r has no admin_user, skipping" % controller_slice_privilege.controller) |
| 32 | return |
| 33 | |
| 34 | template = os_template_env.get_template('sync_controller_users.yaml') |
| 35 | roles = [controller_slice_privilege.slice_privilege.role.role] |
| 36 | # setup user home slice roles at controller |
| 37 | if not controller_slice_privilege.slice_privilege.user.site: |
| 38 | raise Exception('Sliceless user %s'%controller_slice_privilege.slice_privilege.user.email) |
| 39 | else: |
| 40 | # look up tenant id for the user's slice at the controller |
| 41 | #ctrl_slice_deployments = SliceDeployment.objects.filter( |
| 42 | # slice_deployment__slice=controller_slice_privilege.user.slice, |
| 43 | # controller=controller_slice_privilege.controller) |
| 44 | |
| 45 | #if ctrl_slice_deployments: |
| 46 | # # need the correct tenant id for slice at the controller |
| 47 | # tenant_id = ctrl_slice_deployments[0].tenant_id |
| 48 | # tenant_name = ctrl_slice_deployments[0].slice_deployment.slice.login_base |
| 49 | user_fields = { |
| 50 | 'endpoint':controller_slice_privilege.controller.auth_url, |
| 51 | 'name': controller_slice_privilege.slice_privilege.user.email, |
| 52 | 'email': controller_slice_privilege.slice_privilege.user.email, |
| 53 | 'password': controller_slice_privilege.slice_privilege.user.remote_password, |
| 54 | 'admin_user': controller_slice_privilege.controller.admin_user, |
| 55 | 'admin_password': controller_slice_privilege.controller.admin_password, |
| 56 | 'ansible_tag':'%s@%s'%(controller_slice_privilege.slice_privilege.user.email.replace('@','-at-'),controller_slice_privilege.controller.name), |
| 57 | 'admin_tenant': controller_slice_privilege.controller.admin_tenant, |
| 58 | 'roles':roles, |
| 59 | 'tenant':controller_slice_privilege.slice_privilege.slice.name} |
| 60 | |
| 61 | rendered = template.render(user_fields) |
| 62 | res = run_template('sync_controller_users.yaml', user_fields,path='controller_slice_privileges') |
| 63 | |
| 64 | # results is an array in which each element corresponds to an |
| 65 | # "ok" string received per operation. If we get as many oks as |
| 66 | # the number of operations we issued, that means a grand success. |
| 67 | # Otherwise, the number of oks tell us which operation failed. |
| 68 | expected_length = len(roles) + 1 |
| 69 | if (len(res)==expected_length): |
| 70 | controller_slice_privilege.role_id = res[0]['id'] |
| 71 | controller_slice_privilege.save() |
| 72 | elif (len(res)): |
| 73 | raise Exception('Could not assign roles for user %s'%user_fields['name']) |
| 74 | else: |
| 75 | raise Exception('Could not create or update user %s'%user_fields['name']) |
| 76 | |
| 77 | def delete_record(self, controller_slice_privilege): |
| 78 | if controller_slice_privilege.role_id: |
| 79 | driver = self.driver.admin_driver(controller=controller_slice_privilege.controller) |
| 80 | user = ControllerUser.objects.get( |
| 81 | controller=controller_slice_privilege.controller, |
| 82 | user=controller_slice_privilege.slice_privilege.user |
| 83 | ) |
| 84 | slice = ControllerSlice.objects.get( |
| 85 | controller=controller_slice_privilege.controller, |
| 86 | user=controller_slice_privilege.slice_privilege.user |
| 87 | ) |
| 88 | driver.delete_user_role( |
| 89 | user.kuser_id, |
| 90 | slice.tenant_id, |
| 91 | controller_slice_privilege.slice_prvilege.role.role |
| 92 | ) |