blob: e286ef8fa21f1936c411a5f14ba2eb5168c67666 [file] [log] [blame]
Scott Bakerbba67b62019-01-28 17:38:21 -08001# Copyright 2017-present Open Networking Foundation
2#
3# Licensed under the Apache License, Version 2.0 (the "License");
4# you may not use this file except in compliance with the License.
5# You may obtain a copy of the License at
6#
7# http://www.apache.org/licenses/LICENSE-2.0
8#
9# Unless required by applicable law or agreed to in writing, software
10# distributed under the License is distributed on an "AS IS" BASIS,
11# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12# See the License for the specific language governing permissions and
13# limitations under the License.
14
15
16import os
17import base64
18import json
19from xossynchronizer.steps.syncstep import SyncStep
Scott Bakerbba67b62019-01-28 17:38:21 -080020
21class SyncControllerSitePrivileges(SyncStep):
Scott Bakerbba67b62019-01-28 17:38:21 -080022 requested_interval = 0
Scott Bakerc2fddaa2019-01-30 15:45:03 -080023 observes = "ControllerSitePrivilege"
Scott Bakerbba67b62019-01-28 17:38:21 -080024 playbook = "sync_controller_users.yaml"
25
26 def map_sync_inputs(self, controller_site_privilege):
27 controller_register = json.loads(
28 controller_site_privilege.controller.backend_register
29 )
30 if not controller_site_privilege.controller.admin_user:
31 return
32
33 roles = [controller_site_privilege.site_privilege.role.role]
34 # setup user home site roles at controller
35 if not controller_site_privilege.site_privilege.user.site:
36 raise Exception(
37 "Siteless user %s" % controller_site_privilege.site_privilege.user.email
38 )
39 else:
40 # look up tenant id for the user's site at the controller
41 # ctrl_site_deployments = SiteDeployment.objects.filter(
42 # site_deployment__site=controller_site_privilege.user.site,
43 # controller=controller_site_privilege.controller)
44
45 # if ctrl_site_deployments:
46 # # need the correct tenant id for site at the controller
47 # tenant_id = ctrl_site_deployments[0].tenant_id
48 # tenant_name = ctrl_site_deployments[0].site_deployment.site.login_base
49 user_fields = {
50 "endpoint": controller_site_privilege.controller.auth_url,
51 "endpoint_v3": controller_site_privilege.controller.auth_url_v3,
52 "domain": controller_site_privilege.controller.domain,
53 "name": controller_site_privilege.site_privilege.user.email,
54 "email": controller_site_privilege.site_privilege.user.email,
55 "password": controller_site_privilege.site_privilege.user.remote_password,
56 "admin_user": controller_site_privilege.controller.admin_user,
57 "admin_password": controller_site_privilege.controller.admin_password,
58 "ansible_tag": "%s@%s"
59 % (
60 controller_site_privilege.site_privilege.user.email.replace(
61 "@", "-at-"
62 ),
63 controller_site_privilege.controller.name,
64 ),
65 "admin_tenant": controller_site_privilege.controller.admin_tenant,
66 "roles": roles,
67 "tenant": controller_site_privilege.site_privilege.site.login_base,
68 }
69
70 return user_fields
71
72 def map_sync_outputs(self, controller_site_privilege, res):
73 # results is an array in which each element corresponds to an
74 # "ok" string received per operation. If we get as many oks as
75 # the number of operations we issued, that means a grand success.
76 # Otherwise, the number of oks tell us which operation failed.
77 controller_site_privilege.role_id = res[0]["id"]
78 controller_site_privilege.save()
79
80 def delete_record(self, controller_site_privilege):
81 controller_register = json.loads(
82 controller_site_privilege.controller.backend_register
83 )
84 if controller_register.get("disabled", False):
85 raise InnocuousException(
86 "Controller %s is disabled" % controller_site_privilege.controller.name
87 )
88
89 if controller_site_privilege.role_id:
90 driver = self.driver.admin_driver(
91 controller=controller_site_privilege.controller
92 )
93 user = ControllerUser.objects.get(
94 controller=controller_site_privilege.controller,
95 user=controller_site_privilege.site_privilege.user,
96 )
97 site = ControllerSite.objects.get(
98 controller=controller_site_privilege.controller,
99 user=controller_site_privilege.site_privilege.user,
100 )
101 driver.delete_user_role(
102 user.kuser_id,
103 site.tenant_id,
104 controller_site_privilege.site_prvilege.role.role,
105 )