Tony Mack | e4be32f | 2014-03-11 20:45:25 -0400 | [diff] [blame^] | 1 | import os |
| 2 | import base64 |
| 3 | from collections import defaultdict |
| 4 | from django.db.models import F, Q |
| 5 | from planetstack.config import Config |
| 6 | from observer.openstacksyncstep import OpenStackSyncStep |
| 7 | from core.models.site import SiteDeployments |
| 8 | from core.models.user import User, UserDeployments |
| 9 | from util.logger import Logger, logging |
| 10 | |
| 11 | logger = Logger(level=logging.INFO) |
| 12 | |
| 13 | class SyncUserDeployments(OpenStackSyncStep): |
| 14 | provides=[User, UserDeployments] |
| 15 | requested_interval=0 |
| 16 | |
| 17 | def fetch_pending(self): |
| 18 | # user deployments are not visible to users. We must ensure |
| 19 | # user are deployed at all deploymets available to their sites. |
| 20 | site_deployments = SiteDeployment.objects.all() |
| 21 | site_deploy_lookup = defaultdict(list) |
| 22 | for site_deployment in site_deployments: |
| 23 | site_deploy_lookup[site_deployment.site].append(site_deployment.deployment) |
| 24 | |
| 25 | user_deployments = UserDeployment.objects.all() |
| 26 | user_deploy_lookup = defaultdict(list) |
| 27 | for user_deployment in user_deployments: |
| 28 | user_deploy_lookup[user_deployment.user].append(user_deployment.deployment) |
| 29 | |
| 30 | for user in User.objects.all(): |
| 31 | expected_deployments = site_deploy_lookup[user.site] |
| 32 | for expected_deployment in expected_deployments: |
| 33 | if expected_deployment not in user_deploy_lookup[user]: |
| 34 | ud = UserDeployments(user=user, deployment=expected_deployment) |
| 35 | ud.save() |
| 36 | |
| 37 | # now we can return all slice deployments that need to be enacted |
| 38 | return UserDeployments.objects.filter(Q(enacted__lt=F('updated')) | Q(enacted=None)) |
| 39 | |
| 40 | def sync_record(self, user_deployment): |
| 41 | logger.info("sync'ing user deployment %s" % user_deployment.name) |
| 42 | name = user_deployment.user.email[:user_deployment.user.email.find('@')] |
| 43 | user_fields = {'name': name, |
| 44 | 'email': user_deployment.user.email, |
| 45 | 'password': hashlib.md5(user_deployment.user.password).hexdigest()[:6], |
| 46 | 'enabled': True} |
| 47 | driver = self.driver.admin_driver(deployment=user_deployment.deployment.name) |
| 48 | if not user_deployment.kuser_id: |
| 49 | keystone_user = self.driver.create_user(**user_fields) |
| 50 | user_deployment.kuser_id = keystone_user.id |
| 51 | else: |
| 52 | driver.update_user(user_deployment.kuser_id, user_fields) |
| 53 | |
| 54 | # setup user deployment site roles |
| 55 | if user_deployment.user.site: |
| 56 | site_deployments = SiteDeployments.objects.filter(site=user_deployment.user.site, |
| 57 | deployment=user_deployment.deployment) |
| 58 | if site_deployments: |
| 59 | # need the correct tenant id for site at the deployment |
| 60 | tenant_id = site_deployments[0].tenant_id |
| 61 | driver.add_user_role(user_deployment.kuser_id, |
| 62 | tenant_id, 'user') |
| 63 | if user_deployment.user.is_admin: |
| 64 | driver.add_user_role(user_deployment.kuser_id, tenant_id, 'admin') |
| 65 | else: |
| 66 | # may have admin role so attempt to remove it |
| 67 | driver.delete_user_role(user_deployment.kuser_id, tenant_id, 'admin') |
| 68 | |
| 69 | if user_deployment.user.public_key: |
| 70 | user_driver = self.driver.client_driver(caller=user, tenant=user.site.login_base, |
| 71 | deployment=user_deployment.deployment.name) |
| 72 | key_fields = {'name': user_deployment.user.keyname, |
| 73 | 'public_key': user_deployment.user.public_key} |
| 74 | user_driver.create_keypair(**key_fields) |
| 75 | |
| 76 | user_deployment.save() |