elif opt in ("-f", "--certificate"): if(arg.startswith('~')): arg = arg.replace('~',expanduser("~"),1) gemini_util.CERTIFICATE = arg elif opt in ( "-h", "--help" ): Usage() sys.exit( 0 ) elif opt in ( "-n", "--slicename" ): gemini_util.SLICENAME = arg # check if slicename is not empty if(gemini_util.SLICENAME == ''): print "Please provide a slicename" Usage() sys.exit(1) else: mylogbase = gemini_util.getLOGBASE(gemini_util.SLICENAME) LOCALTIME = time.strftime("%Y%m%dT%H:%M:%S",time.localtime(time.time())) LOGFILE = mylogbase+"/gdesktop-opstatus-"+LOCALTIME+".log" gemini_util.ensure_dir(LOGFILE) gemini_util.openLogPIPE(LOGFILE) elif opt in ( "-p", "--passphrase" ): if(arg.startswith('~')): arg = arg.replace('~',expanduser("~"),1) gemini_util.PASSPHRASEFILE = arg elif opt in ( "-k", "--pkey" ): if(arg.startswith('~')): arg = arg.replace('~',expanduser("~"),1) keyfile = arg if(not (keyfile != '' and os.path.isfile(keyfile))): print "Please provide a valid private key file" Usage()
elif opt in ("-f", "--certificate"): if (arg.startswith('~')): arg = arg.replace('~', expanduser("~"), 1) gemini_util.CERTIFICATE = arg elif opt in ("-h", "--help"): Usage() sys.exit(0) elif opt in ("-n", "--slicename"): gemini_util.SLICENAME = arg # check if slicename is not empty if (gemini_util.SLICENAME == ''): print "Please provide a slicename" Usage() sys.exit(1) else: mylogbase = gemini_util.getLOGBASE(gemini_util.SLICENAME) LOCALTIME = time.strftime("%Y%m%dT%H:%M:%S", time.localtime(time.time())) LOGFILE = mylogbase + "/gdesktop-opstatus-" + LOCALTIME + ".log" gemini_util.ensure_dir(LOGFILE) gemini_util.openLogPIPE(LOGFILE) elif opt in ("-p", "--passphrase"): if (arg.startswith('~')): arg = arg.replace('~', expanduser("~"), 1) gemini_util.PASSPHRASEFILE = arg elif opt in ("-k", "--pkey"): if (arg.startswith('~')): arg = arg.replace('~', expanduser("~"), 1) keyfile = arg if (not (keyfile != '' and os.path.isfile(keyfile))): print "Please provide a valid private key file"
sys.exit(1) elif opt in ( "-p", "--passphrasefile" ): gemini_util.PASSPHRASEFILE = arg elif opt in ( "-j", "--loadFromFile" ): FILE = arg # check if FILE exists if(not os.path.isfile(FILE)): print "Please provide a Slice/Exp Info File Name. (To be run only by the GENI Desktop)" sys.exit(1) else: f = open(FILE,'r') mylogbase = gemini_util.getLOGBASE() LOCALTIME = time.strftime("%Y%m%dT%H:%M:%S",time.localtime(time.time())) LOGFILE = mylogbase+"/gdesktop-opstatus-"+gemini_util.SLICENAME+"_"+LOCALTIME+".log" gemini_util.ensure_dir(LOGFILE) try: cf = open(gemini_util.CERTIFICATE,'r') except: msg = "Error opening Certificate" gemini_util.write_to_log(LOGFILE,msg,gemini_util.printtoscreen,debug) sys.exit(1) # Check if passphrase provided is valid # If passphrase is not provided prompt for it. try: ctx = M2Crypto.SSL.Context("sslv23")
def main(argv=None): ############################################# # MAIN PROCESS ############################################# other_details = "" managers = [] GN_Nodes = [] MP_Nodes = [] keyfile = "" force_refresh = False FILE = '' AMURNS = '' DONE = 0 parser = argparse.ArgumentParser( description= 'Print Experiment state summary for GeniDesktop in JSON Format') parser.add_argument('-d', '--debug', action='store_true', help='Be Verbose') parser.add_argument( '--devel', action='store_true', help= 'Use Development version of GEMINI repository code [only for GEMINI developers]' ) parser.add_argument( '--force_refresh', action='store_true', help= 'Force fetch all user/slice/sliver info rather than using locally cached version' ) parser.add_argument('-n', '--sliceurn', help='Slice URN of the Slice', required=True) parser.add_argument( '-a', '--amurns', help= 'Comma seperated list of AM URNs where the user has slivers for this slice' ) parser.add_argument('-k', '--pkey', help='Your private SSH RSA Key file') parser.add_argument('-s', '--speaksforcred', help='Read Speaks for credential from file') parser.add_argument('-f', '--certificate', help='Read SSL certificate from file', required=True) args = parser.parse_args() LOGFILE = None if (args.debug): gemini_util.debug = True if (args.devel): gemini_util.version = gemini_util.devel_version gemini_util.INSTOOLS_repo_url = gemini_util.mc_repo_rooturl + "GEMINI/" + gemini_util.version + "/" if (args.force_refresh): force_refresh = True if (args.amurns): result = gemini_util.isValidAMURNs(args.amurns) if (result): AMURNS = args.amurns else: print "Invalid AM URNS Provided" parser.print_help() sys.exit(1) if (args.speaksforcred): print "Using Speaks for Credentials from the GeniDesktop" speaks_for_cred_file = args.speaksforcred #get Cert from this credential try: cf = open(speaks_for_cred_file, 'r') except: msg = "Error opening Speaks for Credential File" gemini_util.write_to_log(msg, gemini_util.printtoscreen) sys.exit(1) CERTIFICATE_string = gemini_util.getCertFromCredfile( speaks_for_cred_file) if (CERTIFICATE_string == ''): msg = "Missing Certificate in the Speaks for Credential" gemini_util.write_to_log(msg, gemini_util.printtoscreen) sys.exit(1) # else: # f = tempfile.NamedTemporaryFile(delete=False) # f.write(CERTIFICATE_string) # gemini_util.CERTIFICATE = f.name if (args.certificate): if ((args.certificate).startswith('~')): gemini_util.CERTIFICATE = (args.certificate).replace( '~', expanduser("~"), 1) else: gemini_util.CERTIFICATE = args.certificate gemini_util.SLICEURN = args.sliceurn if (not gemini_util.isValidURN(gemini_util.SLICEURN, 'slice')): print "Not a valid SliceURN" parser.print_help() sys.exit(1) mylogbase = gemini_util.getLOGBASE(gemini_util.SLICEURN) LOCALTIME = time.strftime("%Y%m%dT%H:%M:%S", time.localtime(time.time())) LOGFILE = mylogbase + "/" + os.path.basename( __file__) + "-" + LOCALTIME + ".log" gemini_util.ensure_dir(LOGFILE) gemini_util.openLogPIPE(LOGFILE) if (args.pkey): if ((args.pkey).startswith('~')): keyfile = (args.pkey).replace('~', expanduser("~"), 1) else: keyfile = args.pkey if (not (keyfile != '' and os.path.isfile(keyfile))): print "Please provide a valid private key file" parser.print_help() sys.exit(1) else: SSH_pkey = gemini_util.getPkey(keyfile, "SSH key") if (LOGFILE is None): print "Please provide a slicename" parser.print_help() sys.exit(1) (CERT_ISSUER, username) = gemini_util.getCert_issuer_n_username(CERTIFICATE_string) pKey = SSH_pkey (UserInfo, Slices, Nodes) = gemini_util.getMyExpInfo(CERT_ISSUER, username, cf.read(), force_refresh, AMURNS) cf.close() username = UserInfo['uid'] email_id = UserInfo['email'] USERURN = UserInfo['userurn'] user_crypt = UserInfo['user_crypt'] framework = UserInfo['framework'] for SliceInfo in Slices: (junk, slicename_from_parser) = SliceInfo['sliceurn'].rsplit('+', 1) if (gemini_util.SLICEURN == SliceInfo['sliceurn']): found = True break if (not found): msg = "Slice : " + gemini_util.SLICEURN + ' does not exists' gemini_util.write_to_log(msg, gemini_util.printtoscreen) sys.exit(1) msg = "Found Slice Info for " + gemini_util.SLICEURN gemini_util.write_to_log(msg, gemini_util.printtoscreen) slice_crypt = SliceInfo['crypt'] expiry = SliceInfo['expires'] slice_uuid = SliceInfo['uuid'] if (isinstance(Nodes, basestring)): msg = Nodes + ": No Manifest Available for : " + SliceInfo['sliceurn'] gemini_util.write_to_log(msg, gemini_util.printtoscreen) sys.exit(1) for Node in Nodes: nodeid = Node['nodeid'] hostname = Node['hostname'] ismc = Node['ismc'] login_hostname = Node['login_hostname'] if (Node['login_username'] != username): msg = "Login Username obtained from manifest is " + Node[ 'login_username'] + " for node " + nodeid + ". Will change it to " + username + " for GEMINI Instrumentation setup" gemini_util.write_to_log(msg, gemini_util.printtoscreen) Node['login_username'] = username login_username = Node['login_username'] login_port = Node['login_port'] mchostname = Node['mchostname'] cmurn = Node['cmurn'] gemini_node_type = Node['gemini_node_type'] sliver_id = Node['sliver_id'] if (gemini_node_type == 'global_node'): GN_Nodes.append(Node) elif (gemini_node_type == 'mp_node'): MP_Nodes.append(Node) if (Node['cmurn'] not in managers): managers.append(Node['cmurn']) msg = "*****************************\n"+\ "NodeID => "+nodeid+"\n"+ \ "Hostname =>" +hostname+"\n"+ \ "isMC => "+ismc+"\n"+ \ "Hostname to login => "+login_hostname+"\n"+ \ "Username to login with => "+login_username+"\n"+ \ "SSH port to use for Login => "+login_port+"\n"+ \ "Sliver_id => "+sliver_id+"\n"+ \ "Its CMURN => "+cmurn+"\n"+ \ "Gemini Node Type => "+gemini_node_type+"\n"+ \ "MC Hostname => "+mchostname+"\n"+"**********************" gemini_util.write_to_log(msg, gemini_util.dontprinttoscreen) msg = "***********************************\n"+\ "You have "+str(len(MP_Nodes))+" MP Nodes and "+str(len(GN_Nodes))+" GN Nodes\n"+\ "***********************************\n" gemini_util.write_to_log(msg, gemini_util.printtoscreen) if (len(GN_Nodes) == 0): msg = "No GN Nodes Present. Will not proceed" gemini_util.write_to_log(msg, gemini_util.printtoscreen) sys.exit(1) msg = "Registering Slice Credential with UNIS" gemini_util.write_to_log(msg, gemini_util.printtoscreen) REGUNISJSON = gemini_util.register_experiment_with_UNIS( slice_crypt, user_crypt, 'register') try: REGUNISOBJ = json.loads(REGUNISJSON) gemini_util.write_to_log(REGUNISJSON, gemini_util.dontprinttoscreen) except ValueError: msg = "REGUNIS Info JSON Loading Error" gemini_util.write_to_log(msg, gemini_util.printtoscreen) sys.exit(1) if (REGUNISOBJ['code'] != 0): msg = "GeniDesktop to UNIS registration Error : " + REGUNISOBJ['output'] gemini_util.write_to_log(msg, gemini_util.printtoscreen) msg = "Active Services will be disabled to continue with the Instrumentation process" gemini_util.write_to_log(msg, gemini_util.printtoscreen) sys.exit(1) slice_lifetime = {} if (slice_uuid): expiration = datetime.datetime.strptime(expiry, "%Y-%m-%dT%H:%M:%SZ") now = datetime.datetime.now(expiration.tzinfo) td = expiration - now slice_lifetime = int(td.seconds + td.days * 24 * 3600) validity = datetime.timedelta(seconds=slice_lifetime) slice_lifetime = validity.days + 30 #Now setup a proxy cert for the instrumentize script so we can talk to UNIS without keypass gemini_util.makeInstrumentizeProxy(slice_lifetime, slice_uuid) if not (gemini_util.PROXY_ATTR): msg = "ERROR: Could not complete proxy certificate creation for instrumentize process" gemini_util.write_to_log(msg, gemini_util.printtoscreen) msg = "Active Services will be disabled to continue with the Instrumentation process" gemini_util.write_to_log(msg, gemini_util.printtoscreen) sys.exit(1) #Send the proxy cert to UNIS so we can use this identity to query UNIS later msg = "Trying to register the UNIS Tool Proxy cert as Slice Admin" gemini_util.write_to_log(msg, gemini_util.printtoscreen) f = open(gemini_util.PROXY_ATTR) res = gemini_util.postDataToUNIS(gemini_util.PROXY_KEY, gemini_util.PROXY_CERT, "/credentials/geniuser", f) f.close() os.remove(gemini_util.PROXY_ATTR) if res is None: msg = "Failed to register instrumentize proxy cert" gemini_util.write_to_log(msg, gemini_util.printtoscreen) msg = "Active Services will be disabled to continue with the Instrumentation process" gemini_util.write_to_log(msg, gemini_util.printtoscreen) sys.exit(1) else: msg = "Sucessfully registered the UNIS Tool Proxy cert as Slice Admin\n\nTrying to Post Manifests to UNIS" gemini_util.write_to_log(msg, gemini_util.printtoscreen) content1 = '' content2 = '' with open(gemini_util.PROXY_KEY, 'r') as content_file: content1 = content_file.read() with open(gemini_util.PROXY_CERT, 'r') as content_file: content2 = content_file.read() REGUNISJSON = gemini_util.register_experiment_with_UNIS( slice_crypt, user_crypt, 'postmanifest', content1 + "\n" + content2) try: REGUNISOBJ = json.loads(REGUNISJSON) gemini_util.write_to_log(REGUNISJSON, gemini_util.dontprinttoscreen) except ValueError: msg = "REGUNIS Info JSON Loading Error" gemini_util.write_to_log(msg, gemini_util.printtoscreen) msg = "Active Services will be disabled to continue with the Instrumentation process" gemini_util.write_to_log(msg, gemini_util.printtoscreen) sys.exit(1) if (REGUNISOBJ['code'] != 0): msg = "GeniDesktop Manifest-post to UNIS Error : " + REGUNISOBJ[ 'output'] gemini_util.write_to_log(msg, gemini_util.printtoscreen) msg = "Active Services will be disabled to continue with the Instrumentation process" gemini_util.write_to_log(msg, gemini_util.printtoscreen) sys.exit(1) else: msg = "Could not get slice UUID from slice credential. GEMINI Services may fail." gemini_util.write_to_log(msg, gemini_util.printtoscreen) sys.exit(1) gn_ms_proxycert_file = None gn_ms_proxykey_file = None mp_blipp_proxycert_file = None mp_blipp_proxykey_file = None (gn_ms_proxycert_file, gn_ms_proxykey_file, mp_blipp_proxycert_file, mp_blipp_proxykey_file) = gemini_util.generate_all_proxycerts( slice_lifetime, slice_uuid) for my_manager in managers: # STEP 1: Check nodes for OS Compatibilty pruned_GN_Nodes = gemini_util.pruneNodes(GN_Nodes, my_manager, 'GN') if (len(pruned_GN_Nodes) == 0): msg = "No GN Nodes that monitor MP Nodes at AM = " + my_manager + " present. Continuing with the next AM if available" gemini_util.write_to_log(msg, gemini_util.printtoscreen) continue if (len(pruned_GN_Nodes) > 1): msg = "Multiple GN Nodes that monitor MP Nodes at AM = " + my_manager + " present . This is not supported yet" gemini_util.write_to_log(msg, gemini_util.printtoscreen) sys.exit(1) pruned_MP_Nodes = gemini_util.pruneNodes(MP_Nodes, my_manager, '') msg = "Generating and installing certificates" gemini_util.write_to_log(msg, gemini_util.printtoscreen) if (not gemini_util.DISABLE_ACTIVE): gemini_util.install_GN_Certs(pruned_GN_Nodes, pKey, gn_ms_proxycert_file, gn_ms_proxykey_file) gemini_util.install_MP_Certs(pruned_MP_Nodes, pKey, mp_blipp_proxycert_file, mp_blipp_proxykey_file) DONE = 1 tmp_proxyfiles = [ gemini_util.PROXY_CERT, gemini_util.PROXY_KEY, gn_ms_proxycert_file, gn_ms_proxykey_file, mp_blipp_proxycert_file, mp_blipp_proxykey_file ] status = gemini_util.delete_all_temp_proxyfiles(tmp_proxyfiles) if (DONE): msg = "Gemini Instrumentize Complete\n Go to the GeniDesktop to login" gemini_util.write_to_log(msg, gemini_util.printtoscreen) gemini_util.closeLogPIPE(LOGFILE)
def main(argv=None): managers = [] jsonresult = {} GN_Nodes = [] MP_Nodes = [] keyfile = "" force_refresh = False FILE = '' AMURNS = '' CERTIFICATE_string = None parser = argparse.ArgumentParser(description='Print Experiment state summary for GeniDesktop in JSON Format') parser.add_argument('-d','--debug',action='store_true',help='Be Verbose') parser.add_argument('--devel',action='store_true',help='Use Development version of GEMINI repository code [only for GEMINI developers]') parser.add_argument('--force_refresh',action='store_true',help='Force fetch all user/slice/sliver info rather than using locally cached version') parser.add_argument('-n','--sliceurn',help='Slice URN of the Slice',required=True) parser.add_argument('-a','--amurns',help='Comma seperated list of AM URNs where the user has slivers for this slice') parser.add_argument('-k','--pkey',help='Your private SSH RSA Key file') parser.add_argument('-s','--speaksforcred',help='Read Speaks for credential from file') args = parser.parse_args() LOGFILE = None if (args.debug): gemini_util.debug = True if (args.devel): gemini_util.version = gemini_util.devel_version gemini_util.INSTOOLS_repo_url = gemini_util.mc_repo_rooturl+"GEMINI/"+gemini_util.version+"/" if (args.force_refresh): force_refresh = True if (args.amurns): result = gemini_util.isValidAMURNs(args.amurns) if(result): AMURNS = args.amurns else: print "Invalid AM URNS Provided" parser.print_help() sys.exit(1) if(args.speaksforcred): print "Using Speaks for Credentials from the GeniDesktop" speaks_for_cred_file = args.speaksforcred #get Cert from this credential try: cf = open(speaks_for_cred_file,'r') except: msg = "Error opening Speaks for Credential File" gemini_util.write_to_log(msg,gemini_util.printtoscreen) sys.exit(1) CERTIFICATE_string = gemini_util.getCertFromCredfile(speaks_for_cred_file) if(CERTIFICATE_string == ''): msg = "Missing Certificate in the Speaks for Credential" gemini_util.write_to_log(msg,gemini_util.printtoscreen) sys.exit(1) gemini_util.SLICEURN = args.sliceurn #print SLICEURN if (not gemini_util.isValidURN(gemini_util.SLICEURN,'slice')): print "Not a valid SliceURN" parser.print_help() sys.exit(1) mylogbase = gemini_util.getLOGBASE(gemini_util.SLICEURN) LOCALTIME = time.strftime("%Y%m%dT%H:%M:%S",time.localtime(time.time())) LOGFILE = mylogbase+"/"+os.path.basename(__file__)+"-"+LOCALTIME+".log" gemini_util.ensure_dir(LOGFILE) gemini_util.openLogPIPE(LOGFILE) if (args.pkey): if((args.pkey).startswith('~')): keyfile = (args.pkey).replace('~',expanduser("~"),1) else: keyfile = args.pkey if(not (keyfile != '' and os.path.isfile(keyfile))): print "Please provide a valid private key file" parser.print_help() sys.exit(1) else: SSH_pkey = gemini_util.getPkey(keyfile,"SSH key") if (LOGFILE is None): print "Please provide a slicename" parser.print_help() sys.exit(1) (CERT_ISSUER,username) = gemini_util.getCert_issuer_n_username(CERTIFICATE_string) pKey = SSH_pkey (UserInfo,Slices,Nodes) = gemini_util.getMyExpInfo(CERT_ISSUER,username,cf.read(),force_refresh,AMURNS) username = UserInfo['uid'] email_id = UserInfo['email'] USERURN = UserInfo['userurn'] user_crypt = UserInfo['user_crypt'] framework = UserInfo['framework'] for SliceInfo in Slices: if (gemini_util.SLICEURN == SliceInfo['sliceurn']): found = True break if(not found): msg = "Slice : "+gemini_util.SLICEURN+' does not exists' gemini_util.write_to_log(msg,gemini_util.printtoscreen) sys.exit(1) msg = "Found Slice Info for "+gemini_util.SLICEURN gemini_util.write_to_log(msg,gemini_util.printtoscreen) slice_crypt = SliceInfo['crypt'] if(isinstance(Nodes, basestring)): jsonresult["status"] = "CREATED" jsonresult["details"] = "No Resources Present" print json.dumps(jsonresult) sys.exit(0) if(len(Nodes) == 0): jsonresult["status"] = "ERROR" jsonresult["details"] = "Sliver with No Resources Present.Delete it before continuing." print json.dumps(jsonresult) sys.exit(0) for Node in Nodes: nodeid = Node['nodeid'] hostname = Node['hostname'] ismc = Node['ismc'] login_hostname = Node['login_hostname'] if(Node['login_username'] != username): msg = "Login Username obtained from manifest is "+Node['login_username']+ " for node "+nodeid+". Will change it to "+username+" for GEMINI Instrumentation setup" gemini_util.write_to_log(msg,gemini_util.printtoscreen) Node['login_username'] = username login_username = Node['login_username'] other_members = Node['additional_users'] login_port = Node['login_port'] mchostname = Node['mchostname'] cmurn = Node['cmurn'] gemini_node_type = Node['gemini_node_type'] sliver_id = Node['sliver_id'] if(gemini_node_type == 'global_node'): GN_Nodes.append(Node) elif(gemini_node_type == 'mp_node'): MP_Nodes.append(Node) if(Node['cmurn'] not in managers): managers.append(Node['cmurn']) msg = "*****************************\n"+\ "NodeID => "+nodeid+"\n"+ \ "Hostname =>" +hostname+"\n"+ \ "isMC => "+ismc+"\n"+ \ "Hostname to login => "+login_hostname+"\n"+ \ "Username to login with => "+login_username+"\n"+ \ "SSH port to use for Login => "+login_port+"\n"+ \ "Other members on this Node => "+' , '.join(other_members)+"\n"+ \ "Sliver_id => "+sliver_id+"\n"+ \ "Its CMURN => "+cmurn+"\n"+ \ "Gemini Node Type => "+gemini_node_type+"\n"+ \ "MC Hostname => "+mchostname+"\n"+"**********************" gemini_util.write_to_log(msg,gemini_util.dontprinttoscreen) msg = "***********************************\n"+\ "You have "+str(len(MP_Nodes))+" MP Nodes and "+str(len(GN_Nodes))+" GN Nodes\n"+\ "***********************************\n" gemini_util.write_to_log(msg,gemini_util.printtoscreen) details = {} result = {} if (len(GN_Nodes) == 0): msg = "No GN Nodes Present. Will not proceed" gemini_util.write_to_log(msg,gemini_util.printtoscreen) jsonresult["status"] = "CREATED" jsonresult["details"] = "Has Resources but no Global Node" else: proclist = [] results = [] for GN_Node in GN_Nodes: pruned_MP_Nodes = gemini_util.pruneNodes(MP_Nodes,GN_Node['gemini_urn_to_monitor'],'') result_queue = multiprocessing.Queue() p = multiprocessing.Process(target=opStatusProcess,args=(GN_Node,pruned_MP_Nodes,pKey,slice_crypt,user_crypt,result_queue,)) proclist.append(p) p.start() results.append(result_queue) myexitcode = 0 for i in proclist: i.join() if(i.exitcode != 0): myexitcode = i.exitcode mystates = [] for result in results: if(not result.empty()): l = result.get() if ((type(l) is str) or (type(l) is unicode)): jsonresult['details'] = l break else: sliver_id = l[0] status = l[1] mystates.append(status) details[sliver_id] = status jsonresult['details'] = details if (myexitcode != 0 ): jsonresult["status"] = "ERROR" else: jsonresult['status'] = gemini_util.getStateSummary(mystates) gemini_util.closeLogPIPE(LOGFILE) print json.dumps(jsonresult)
def main(argv=None): ############################################# # MAIN PROCESS ############################################# other_details = "" managers = [] GN_Nodes = [] MP_Nodes = [] keyfile = "" force_refresh = False FILE = '' AMURNS = '' DONE = 0 parser = argparse.ArgumentParser(description='Print Experiment state summary for GeniDesktop in JSON Format') parser.add_argument('-d','--debug',action='store_true',help='Be Verbose') parser.add_argument('--devel',action='store_true',help='Use Development version of GEMINI repository code [only for GEMINI developers]') parser.add_argument('--force_refresh',action='store_true',help='Force fetch all user/slice/sliver info rather than using locally cached version') parser.add_argument('-n','--sliceurn',help='Slice URN of the Slice',required=True) parser.add_argument('-a','--amurns',help='Comma seperated list of AM URNs where the user has slivers for this slice') parser.add_argument('-k','--pkey',help='Your private SSH RSA Key file') parser.add_argument('-f','--certificate',help='Read SSL certificate from file',required=True) parser.add_argument('-p','--passphrase',help='Read passphrase for certificate from file') args = parser.parse_args() LOGFILE = None if (args.debug): gemini_util.debug = True if (args.devel): gemini_util.version = gemini_util.devel_version gemini_util.INSTOOLS_repo_url = gemini_util.mc_repo_rooturl+"GEMINI/"+gemini_util.version+"/" if (args.force_refresh): force_refresh = True if (args.amurns): result = gemini_util.isValidAMURNs(args.amurns) if(result): AMURNS = args.amurns else: print "Invalid AM URNS Provided" parser.print_help() sys.exit(1) if(args.certificate): if ((args.certificate).startswith('~')): gemini_util.CERTIFICATE = (args.certificate).replace('~',expanduser("~"),1) else: gemini_util.CERTIFICATE = args.certificate gemini_util.SLICEURN = args.sliceurn if (not gemini_util.isValidURN(gemini_util.SLICEURN,'slice')): print "Not a valid SliceURN" parser.print_help() sys.exit(1) mylogbase = gemini_util.getLOGBASE(gemini_util.SLICEURN) LOCALTIME = time.strftime("%Y%m%dT%H:%M:%S",time.localtime(time.time())) LOGFILE = mylogbase+"/"+os.path.basename(__file__)+"-"+LOCALTIME+".log" gemini_util.ensure_dir(LOGFILE) gemini_util.openLogPIPE(LOGFILE) if (args.passphrase): if((args.passphrase).startswith('~')): gemini_util.PASSPHRASEFILE = (args.passphrase).replace('~',expanduser("~"),1) else: gemini_util.PASSPHRASEFILE = args.passphrase if (args.pkey): if((args.pkey).startswith('~')): keyfile = (args.pkey).replace('~',expanduser("~"),1) else: keyfile = args.pkey if(not (keyfile != '' and os.path.isfile(keyfile))): print "Please provide a valid private key file" parser.print_help() sys.exit(1) else: SSH_pkey = gemini_util.getPkey(keyfile,"SSH key") if (LOGFILE is None): print "Please provide a slicename" parser.print_help() sys.exit(1) try: cf = open(gemini_util.CERTIFICATE,'r') except: msg = "Error opening Certificate" gemini_util.write_to_log(msg,gemini_util.printtoscreen) sys.exit(1) # Check if passphrase provided is valid # If passphrase is not provided prompt for it. CERT_pkey = gemini_util.getPkey(gemini_util.CERTIFICATE,"certificate") (CERT_ISSUER,username) = gemini_util.getCert_issuer_n_username() if(not (keyfile != '' and os.path.isfile(keyfile))): pKey = CERT_pkey else: pKey = SSH_pkey (UserInfo,Slices,Nodes) = gemini_util.getMyExpInfo(CERT_ISSUER,username,cf.read(),force_refresh,AMURNS) cf.close() username = UserInfo['uid'] email_id = UserInfo['email'] USERURN = UserInfo['userurn'] user_crypt = UserInfo['user_crypt'] framework = UserInfo['framework'] for SliceInfo in Slices: if (gemini_util.SLICEURN == SliceInfo['sliceurn']): found = True break if(not found): msg = "Slice : "+gemini_util.SLICEURN+' does not exists' gemini_util.write_to_log(msg,gemini_util.printtoscreen) sys.exit(1) msg = "Found Slice Info for "+gemini_util.SLICEURN gemini_util.write_to_log(msg,gemini_util.printtoscreen) slice_crypt = SliceInfo['crypt'] expiry = SliceInfo['expires'] #expiration = datetime.datetime.strptime(expiry,"%Y-%m-%dT%H:%M:%SZ") #now = datetime.datetime.now(expiration.tzinfo) #td = expiration - now #slice_lifetime = int(td.seconds + td.days * 24 * 3600) #validity = datetime.timedelta(seconds=slice_lifetime) #slice_lifetime = validity.days + 1 slice_lifetime = 1 if(isinstance(Nodes, basestring)): msg = Nodes+": No Manifest Available for : "+ SliceInfo['sliceurn'] gemini_util.write_to_log(msg,gemini_util.printtoscreen) sys.exit(1) for Node in Nodes: nodeid = Node['nodeid'] hostname = Node['hostname'] ismc = Node['ismc'] login_hostname = Node['login_hostname'] if( Node['login_username'] != username): msg = "Login Username obtained from manifest is "+Node['login_username']+ " for node "+nodeid+". Will change it to "+username+" for GEMINI Instrumentation setup" gemini_util.write_to_log(msg,gemini_util.printtoscreen) Node['login_username'] = username login_username = Node['login_username'] other_members = Node['additional_users'] login_port = Node['login_port'] mchostname = Node['mchostname'] cmurn = Node['cmurn'] gemini_node_type = Node['gemini_node_type'] sliver_id = Node['sliver_id'] if(gemini_node_type == 'global_node'): GN_Nodes.append(Node) elif(gemini_node_type == 'mp_node'): MP_Nodes.append(Node) if(Node['cmurn'] not in managers): managers.append(Node['cmurn']) msg = "*****************************\n"+\ "NodeID => "+nodeid+"\n"+ \ "Hostname =>" +hostname+"\n"+ \ "isMC => "+ismc+"\n"+ \ "Hostname to login => "+login_hostname+"\n"+ \ "Username to login with => "+login_username+"\n"+ \ "SSH port to use for Login => "+login_port+"\n"+ \ "Other members on this Node => "+' , '.join(other_members)+"\n"+ \ "Sliver_id => "+sliver_id+"\n"+ \ "Its CMURN => "+cmurn+"\n"+ \ "Gemini Node Type => "+gemini_node_type+"\n"+ \ "MC Hostname => "+mchostname+"\n"+"**********************" gemini_util.write_to_log(msg,gemini_util.dontprinttoscreen)
def main(argv=None): ############################################# # MAIN PROCESS ############################################# other_details = "" managers = [] GN_Nodes = [] MP_Nodes = [] keyfile = "" force_refresh = False FILE = "" AMURNS = "" DONE = 0 parser = argparse.ArgumentParser(description="Print Experiment state summary for GeniDesktop in JSON Format") parser.add_argument("-d", "--debug", action="store_true", help="Be Verbose") parser.add_argument( "--devel", action="store_true", help="Use Development version of GEMINI repository code [only for GEMINI developers]", ) parser.add_argument( "--force_refresh", action="store_true", help="Force fetch all user/slice/sliver info rather than using locally cached version", ) parser.add_argument("-n", "--sliceurn", help="Slice URN of the Slice", required=True) parser.add_argument( "-a", "--amurns", help="Comma seperated list of AM URNs where the user has slivers for this slice" ) parser.add_argument("-k", "--pkey", help="Your private SSH RSA Key file") parser.add_argument("-s", "--speaksforcred", help="Read Speaks for credential from file") parser.add_argument("-f", "--certificate", help="Read SSL certificate from file", required=True) args = parser.parse_args() LOGFILE = None if args.debug: gemini_util.debug = True if args.devel: gemini_util.version = gemini_util.devel_version gemini_util.INSTOOLS_repo_url = gemini_util.mc_repo_rooturl + "GEMINI/" + gemini_util.version + "/" if args.force_refresh: force_refresh = True if args.amurns: result = gemini_util.isValidAMURNs(args.amurns) if result: AMURNS = args.amurns else: print "Invalid AM URNS Provided" parser.print_help() sys.exit(1) if args.speaksforcred: print "Using Speaks for Credentials from the GeniDesktop" speaks_for_cred_file = args.speaksforcred # get Cert from this credential try: cf = open(speaks_for_cred_file, "r") except: msg = "Error opening Speaks for Credential File" gemini_util.write_to_log(msg, gemini_util.printtoscreen) sys.exit(1) CERTIFICATE_string = gemini_util.getCertFromCredfile(speaks_for_cred_file) if CERTIFICATE_string == "": msg = "Missing Certificate in the Speaks for Credential" gemini_util.write_to_log(msg, gemini_util.printtoscreen) sys.exit(1) # else: # f = tempfile.NamedTemporaryFile(delete=False) # f.write(CERTIFICATE_string) # gemini_util.CERTIFICATE = f.name if args.certificate: if (args.certificate).startswith("~"): gemini_util.CERTIFICATE = (args.certificate).replace("~", expanduser("~"), 1) else: gemini_util.CERTIFICATE = args.certificate gemini_util.SLICEURN = args.sliceurn if not gemini_util.isValidURN(gemini_util.SLICEURN, "slice"): print "Not a valid SliceURN" parser.print_help() sys.exit(1) mylogbase = gemini_util.getLOGBASE(gemini_util.SLICEURN) LOCALTIME = time.strftime("%Y%m%dT%H:%M:%S", time.localtime(time.time())) LOGFILE = mylogbase + "/" + os.path.basename(__file__) + "-" + LOCALTIME + ".log" gemini_util.ensure_dir(LOGFILE) gemini_util.openLogPIPE(LOGFILE) if args.pkey: if (args.pkey).startswith("~"): keyfile = (args.pkey).replace("~", expanduser("~"), 1) else: keyfile = args.pkey if not (keyfile != "" and os.path.isfile(keyfile)): print "Please provide a valid private key file" parser.print_help() sys.exit(1) else: SSH_pkey = gemini_util.getPkey(keyfile, "SSH key") if LOGFILE is None: print "Please provide a slicename" parser.print_help() sys.exit(1) (CERT_ISSUER, username) = gemini_util.getCert_issuer_n_username(CERTIFICATE_string) pKey = SSH_pkey (UserInfo, Slices, Nodes) = gemini_util.getMyExpInfo(CERT_ISSUER, username, cf.read(), force_refresh, AMURNS) cf.close() username = UserInfo["uid"] email_id = UserInfo["email"] USERURN = UserInfo["userurn"] user_crypt = UserInfo["user_crypt"] framework = UserInfo["framework"] for SliceInfo in Slices: (junk, slicename_from_parser) = SliceInfo["sliceurn"].rsplit("+", 1) if gemini_util.SLICEURN == SliceInfo["sliceurn"]: found = True break if not found: msg = "Slice : " + gemini_util.SLICEURN + " does not exists" gemini_util.write_to_log(msg, gemini_util.printtoscreen) sys.exit(1) msg = "Found Slice Info for " + gemini_util.SLICEURN gemini_util.write_to_log(msg, gemini_util.printtoscreen) slice_crypt = SliceInfo["crypt"] expiry = SliceInfo["expires"] slice_uuid = SliceInfo["uuid"] if isinstance(Nodes, basestring): msg = Nodes + ": No Manifest Available for : " + SliceInfo["sliceurn"] gemini_util.write_to_log(msg, gemini_util.printtoscreen) sys.exit(1) for Node in Nodes: nodeid = Node["nodeid"] hostname = Node["hostname"] ismc = Node["ismc"] login_hostname = Node["login_hostname"] if Node["login_username"] != username: msg = ( "Login Username obtained from manifest is " + Node["login_username"] + " for node " + nodeid + ". Will change it to " + username + " for GEMINI Instrumentation setup" ) gemini_util.write_to_log(msg, gemini_util.printtoscreen) Node["login_username"] = username login_username = Node["login_username"] login_port = Node["login_port"] mchostname = Node["mchostname"] cmurn = Node["cmurn"] gemini_node_type = Node["gemini_node_type"] sliver_id = Node["sliver_id"] if gemini_node_type == "global_node": GN_Nodes.append(Node) elif gemini_node_type == "mp_node": MP_Nodes.append(Node) if Node["cmurn"] not in managers: managers.append(Node["cmurn"]) msg = ( "*****************************\n" + "NodeID => " + nodeid + "\n" + "Hostname =>" + hostname + "\n" + "isMC => " + ismc + "\n" + "Hostname to login => " + login_hostname + "\n" + "Username to login with => " + login_username + "\n" + "SSH port to use for Login => " + login_port + "\n" + "Sliver_id => " + sliver_id + "\n" + "Its CMURN => " + cmurn + "\n" + "Gemini Node Type => " + gemini_node_type + "\n" + "MC Hostname => " + mchostname + "\n" + "**********************" ) gemini_util.write_to_log(msg, gemini_util.dontprinttoscreen) msg = ( "***********************************\n" + "You have " + str(len(MP_Nodes)) + " MP Nodes and " + str(len(GN_Nodes)) + " GN Nodes\n" + "***********************************\n" ) gemini_util.write_to_log(msg, gemini_util.printtoscreen) if len(GN_Nodes) == 0: msg = "No GN Nodes Present. Will not proceed" gemini_util.write_to_log(msg, gemini_util.printtoscreen) sys.exit(1) msg = "Registering Slice Credential with UNIS" gemini_util.write_to_log(msg, gemini_util.printtoscreen) REGUNISJSON = gemini_util.register_experiment_with_UNIS(slice_crypt, user_crypt, "register") try: REGUNISOBJ = json.loads(REGUNISJSON) gemini_util.write_to_log(REGUNISJSON, gemini_util.dontprinttoscreen) except ValueError: msg = "REGUNIS Info JSON Loading Error" gemini_util.write_to_log(msg, gemini_util.printtoscreen) sys.exit(1) if REGUNISOBJ["code"] != 0: msg = "GeniDesktop to UNIS registration Error : " + REGUNISOBJ["output"] gemini_util.write_to_log(msg, gemini_util.printtoscreen) msg = "Active Services will be disabled to continue with the Instrumentation process" gemini_util.write_to_log(msg, gemini_util.printtoscreen) sys.exit(1) slice_lifetime = {} if slice_uuid: expiration = datetime.datetime.strptime(expiry, "%Y-%m-%dT%H:%M:%SZ") now = datetime.datetime.now(expiration.tzinfo) td = expiration - now slice_lifetime = int(td.seconds + td.days * 24 * 3600) validity = datetime.timedelta(seconds=slice_lifetime) slice_lifetime = validity.days + 30 # Now setup a proxy cert for the instrumentize script so we can talk to UNIS without keypass gemini_util.makeInstrumentizeProxy(slice_lifetime, slice_uuid) if not (gemini_util.PROXY_ATTR): msg = "ERROR: Could not complete proxy certificate creation for instrumentize process" gemini_util.write_to_log(msg, gemini_util.printtoscreen) msg = "Active Services will be disabled to continue with the Instrumentation process" gemini_util.write_to_log(msg, gemini_util.printtoscreen) sys.exit(1) # Send the proxy cert to UNIS so we can use this identity to query UNIS later msg = "Trying to register the UNIS Tool Proxy cert as Slice Admin" gemini_util.write_to_log(msg, gemini_util.printtoscreen) f = open(gemini_util.PROXY_ATTR) res = gemini_util.postDataToUNIS(gemini_util.PROXY_KEY, gemini_util.PROXY_CERT, "/credentials/geniuser", f) f.close() os.remove(gemini_util.PROXY_ATTR) if res is None: msg = "Failed to register instrumentize proxy cert" gemini_util.write_to_log(msg, gemini_util.printtoscreen) msg = "Active Services will be disabled to continue with the Instrumentation process" gemini_util.write_to_log(msg, gemini_util.printtoscreen) sys.exit(1) else: msg = "Sucessfully registered the UNIS Tool Proxy cert as Slice Admin\n\nTrying to Post Manifests to UNIS" gemini_util.write_to_log(msg, gemini_util.printtoscreen) content1 = "" content2 = "" with open(gemini_util.PROXY_KEY, "r") as content_file: content1 = content_file.read() with open(gemini_util.PROXY_CERT, "r") as content_file: content2 = content_file.read() REGUNISJSON = gemini_util.register_experiment_with_UNIS( slice_crypt, user_crypt, "postmanifest", content1 + "\n" + content2 ) try: REGUNISOBJ = json.loads(REGUNISJSON) gemini_util.write_to_log(REGUNISJSON, gemini_util.dontprinttoscreen) except ValueError: msg = "REGUNIS Info JSON Loading Error" gemini_util.write_to_log(msg, gemini_util.printtoscreen) msg = "Active Services will be disabled to continue with the Instrumentation process" gemini_util.write_to_log(msg, gemini_util.printtoscreen) sys.exit(1) if REGUNISOBJ["code"] != 0: msg = "GeniDesktop Manifest-post to UNIS Error : " + REGUNISOBJ["output"] gemini_util.write_to_log(msg, gemini_util.printtoscreen) msg = "Active Services will be disabled to continue with the Instrumentation process" gemini_util.write_to_log(msg, gemini_util.printtoscreen) sys.exit(1) else: msg = "Could not get slice UUID from slice credential. GEMINI Services may fail." gemini_util.write_to_log(msg, gemini_util.printtoscreen) sys.exit(1) gn_ms_proxycert_file = None gn_ms_proxykey_file = None mp_blipp_proxycert_file = None mp_blipp_proxykey_file = None ( gn_ms_proxycert_file, gn_ms_proxykey_file, mp_blipp_proxycert_file, mp_blipp_proxykey_file, ) = gemini_util.generate_all_proxycerts(slice_lifetime, slice_uuid) for my_manager in managers: # STEP 1: Check nodes for OS Compatibilty pruned_GN_Nodes = gemini_util.pruneNodes(GN_Nodes, my_manager, "GN") if len(pruned_GN_Nodes) == 0: msg = ( "No GN Nodes that monitor MP Nodes at AM = " + my_manager + " present. Continuing with the next AM if available" ) gemini_util.write_to_log(msg, gemini_util.printtoscreen) continue if len(pruned_GN_Nodes) > 1: msg = ( "Multiple GN Nodes that monitor MP Nodes at AM = " + my_manager + " present . This is not supported yet" ) gemini_util.write_to_log(msg, gemini_util.printtoscreen) sys.exit(1) pruned_MP_Nodes = gemini_util.pruneNodes(MP_Nodes, my_manager, "") msg = "Generating and installing certificates" gemini_util.write_to_log(msg, gemini_util.printtoscreen) if not gemini_util.DISABLE_ACTIVE: gemini_util.install_GN_Certs(pruned_GN_Nodes, pKey, gn_ms_proxycert_file, gn_ms_proxykey_file) gemini_util.install_MP_Certs(pruned_MP_Nodes, pKey, mp_blipp_proxycert_file, mp_blipp_proxykey_file) DONE = 1 tmp_proxyfiles = [ gemini_util.PROXY_CERT, gemini_util.PROXY_KEY, gn_ms_proxycert_file, gn_ms_proxykey_file, mp_blipp_proxycert_file, mp_blipp_proxykey_file, ] status = gemini_util.delete_all_temp_proxyfiles(tmp_proxyfiles) if DONE: msg = "Gemini Instrumentize Complete\n Go to the GeniDesktop to login" gemini_util.write_to_log(msg, gemini_util.printtoscreen) gemini_util.closeLogPIPE(LOGFILE)
def main(argv=None): managers = [] jsonresult = {} GN_Nodes = [] MP_Nodes = [] keyfile = "" force_refresh = False FILE = '' AMURNS = '' parser = argparse.ArgumentParser( description= 'Print Experiment state summary for GeniDesktop in JSON Format') parser.add_argument('-d', '--debug', action='store_true', help='Be Verbose') parser.add_argument( '--devel', action='store_true', help= 'Use Development version of GEMINI repository code [only for GEMINI developers]' ) parser.add_argument( '--force_refresh', action='store_true', help= 'Force fetch all user/slice/sliver info rather than using locally cached version' ) parser.add_argument('-n', '--sliceurn', help='Slice URN of the Slice', required=True) parser.add_argument( '-a', '--amurns', help= 'Comma seperated list of AM URNs where the user has slivers for this slice' ) parser.add_argument('-k', '--pkey', help='Your private SSH RSA Key file') parser.add_argument('-f', '--certificate', help='Read SSL certificate from file', required=True) parser.add_argument('-p', '--passphrase', help='Read passphrase for certificate from file') args = parser.parse_args() LOGFILE = None if (args.debug): gemini_util.debug = True if (args.devel): gemini_util.version = gemini_util.devel_version gemini_util.INSTOOLS_repo_url = gemini_util.mc_repo_rooturl + "GEMINI/" + gemini_util.version + "/" if (args.force_refresh): force_refresh = True if (args.amurns): result = gemini_util.isValidAMURNs(args.amurns) if (result): AMURNS = args.amurns else: print "Invalid AM URNS Provided" parser.print_help() sys.exit(1) if (args.certificate): if ((args.certificate).startswith('~')): gemini_util.CERTIFICATE = (args.certificate).replace( '~', expanduser("~"), 1) else: gemini_util.CERTIFICATE = args.certificate gemini_util.SLICEURN = args.sliceurn #print SLICEURN if (not gemini_util.isValidURN(gemini_util.SLICEURN, 'slice')): print "Not a valid SliceURN" parser.print_help() sys.exit(1) mylogbase = gemini_util.getLOGBASE(gemini_util.SLICEURN) LOCALTIME = time.strftime("%Y%m%dT%H:%M:%S", time.localtime(time.time())) LOGFILE = mylogbase + "/" + os.path.basename( __file__) + "-" + LOCALTIME + ".log" gemini_util.ensure_dir(LOGFILE) gemini_util.openLogPIPE(LOGFILE) if (args.passphrase): if ((args.passphrase).startswith('~')): gemini_util.PASSPHRASEFILE = (args.passphrase).replace( '~', expanduser("~"), 1) else: gemini_util.PASSPHRASEFILE = args.passphrase if (args.pkey): if ((args.pkey).startswith('~')): keyfile = (args.pkey).replace('~', expanduser("~"), 1) else: keyfile = args.pkey if (not (keyfile != '' and os.path.isfile(keyfile))): print "Please provide a valid private key file" parser.print_help() sys.exit(1) else: SSH_pkey = gemini_util.getPkey(keyfile, "SSH key") if (LOGFILE is None): print "Please provide a slicename" parser.print_help() sys.exit(1) try: cf = open(gemini_util.CERTIFICATE, 'r') except: msg = "Error opening Certificate" gemini_util.write_to_log(msg, gemini_util.printtoscreen) sys.exit(1) # Check if passphrase provided for certificate is valid # If passphrase is not provided prompt for it. CERT_pkey = gemini_util.getPkey(gemini_util.CERTIFICATE, "certificate") (CERT_ISSUER, username) = gemini_util.getCert_issuer_n_username() if (not (keyfile != '' and os.path.isfile(keyfile))): pKey = CERT_pkey else: pKey = SSH_pkey (UserInfo, Slices, Nodes) = gemini_util.getMyExpInfo(CERT_ISSUER, username, cf.read(), force_refresh, AMURNS) cf.close() username = UserInfo['uid'] email_id = UserInfo['email'] USERURN = UserInfo['userurn'] user_crypt = UserInfo['user_crypt'] framework = UserInfo['framework'] for SliceInfo in Slices: if (gemini_util.SLICEURN == SliceInfo['sliceurn']): found = True break if (not found): msg = "Slice : " + gemini_util.SLICEURN + ' does not exists' gemini_util.write_to_log(msg, gemini_util.printtoscreen) sys.exit(1) msg = "Found Slice Info for " + gemini_util.SLICEURN gemini_util.write_to_log(msg, gemini_util.printtoscreen) slice_crypt = SliceInfo['crypt'] if (isinstance(Nodes, basestring)): jsonresult["status"] = "CREATED" jsonresult["details"] = "No Resources Present" print json.dumps(jsonresult) sys.exit(0) if (len(Nodes) == 0): jsonresult["status"] = "ERROR" jsonresult[ "details"] = "Sliver with No Resources Present.Delete it before continuing." print json.dumps(jsonresult) sys.exit(0) for Node in Nodes: nodeid = Node['nodeid'] hostname = Node['hostname'] ismc = Node['ismc'] login_hostname = Node['login_hostname'] if (Node['login_username'] != username): msg = "Login Username obtained from manifest is " + Node[ 'login_username'] + " for node " + nodeid + ". Will change it to " + username + " for GEMINI Instrumentation setup" gemini_util.write_to_log(msg, gemini_util.printtoscreen) Node['login_username'] = username login_username = Node['login_username'] other_members = Node['additional_users'] login_port = Node['login_port'] mchostname = Node['mchostname'] cmurn = Node['cmurn'] gemini_node_type = Node['gemini_node_type'] sliver_id = Node['sliver_id'] if (gemini_node_type == 'global_node'): GN_Nodes.append(Node) elif (gemini_node_type == 'mp_node'): MP_Nodes.append(Node) if (Node['cmurn'] not in managers): managers.append(Node['cmurn']) msg = "*****************************\n"+\ "NodeID => "+nodeid+"\n"+ \ "Hostname =>" +hostname+"\n"+ \ "isMC => "+ismc+"\n"+ \ "Hostname to login => "+login_hostname+"\n"+ \ "Username to login with => "+login_username+"\n"+ \ "SSH port to use for Login => "+login_port+"\n"+ \ "Other members on this Node => "+' , '.join(other_members)+"\n"+ \ "Sliver_id => "+sliver_id+"\n"+ \ "Its CMURN => "+cmurn+"\n"+ \ "Gemini Node Type => "+gemini_node_type+"\n"+ \ "MC Hostname => "+mchostname+"\n"+"**********************" gemini_util.write_to_log(msg, gemini_util.dontprinttoscreen) msg = "***********************************\n"+\ "You have "+str(len(MP_Nodes))+" MP Nodes and "+str(len(GN_Nodes))+" GN Nodes\n"+\ "***********************************\n" gemini_util.write_to_log(msg, gemini_util.printtoscreen) details = {} result = {} if (len(GN_Nodes) == 0): msg = "No GN Nodes Present. Will not proceed" gemini_util.write_to_log(msg, gemini_util.printtoscreen) jsonresult["status"] = "CREATED" jsonresult["details"] = "Has Resources but no Global Node" else: proclist = [] results = [] for GN_Node in GN_Nodes: pruned_MP_Nodes = gemini_util.pruneNodes( MP_Nodes, GN_Node['gemini_urn_to_monitor'], '') result_queue = multiprocessing.Queue() p = multiprocessing.Process(target=opStatusProcess, args=( GN_Node, pruned_MP_Nodes, pKey, slice_crypt, user_crypt, result_queue, )) proclist.append(p) p.start() results.append(result_queue) myexitcode = 0 for i in proclist: i.join() if (i.exitcode != 0): myexitcode = i.exitcode mystates = [] for result in results: if (not result.empty()): l = result.get() if ((type(l) is str) or (type(l) is unicode)): jsonresult['details'] = l break else: sliver_id = l[0] status = l[1] mystates.append(status) details[sliver_id] = status jsonresult['details'] = details if (myexitcode != 0): jsonresult["status"] = "ERROR" else: jsonresult['status'] = gemini_util.getStateSummary(mystates) gemini_util.closeLogPIPE(LOGFILE) print json.dumps(jsonresult)
def main(argv=None): ############################################# # MAIN PROCESS ############################################# other_details = "" managers = [] GN_Nodes = [] MP_Nodes = [] keyfile = "" force_refresh = False FILE = '' AMURNS = '' email_id = '' DONE = 0 gn_ms_proxycert_file = None gn_ms_proxykey_file = None mp_blipp_proxycert_file = None mp_blipp_proxykey_file = None parser = argparse.ArgumentParser( description= 'Print Experiment state summary for GeniDesktop in JSON Format') parser.add_argument('-d', '--debug', action='store_true', help='Be Verbose') parser.add_argument( '--devel', action='store_true', help= 'Use Development version of GEMINI repository code [only for GEMINI developers]' ) parser.add_argument( '--force_refresh', action='store_true', help= 'Force fetch all user/slice/sliver info rather than using locally cached version' ) parser.add_argument('--disable_active', action='store_true', help='Disable IU Active Measurement Install') parser.add_argument('-n', '--sliceurn', help='Slice URN of the Slice', required=True) parser.add_argument( '-a', '--amurns', help= 'Comma seperated list of AM URNs where the user has slivers for this slice' ) parser.add_argument('-k', '--pkey', help='Your private SSH RSA Key file') parser.add_argument('-f', '--certificate', help='Read SSL certificate from file', required=True) parser.add_argument('-p', '--passphrase', help='Read passphrase for certificate from file') args = parser.parse_args() LOGFILE = None if (args.debug): gemini_util.debug = True if (args.devel): gemini_util.version = gemini_util.devel_version gemini_util.INSTOOLS_repo_url = gemini_util.mc_repo_rooturl + "GEMINI/" + gemini_util.version + "/" if (args.force_refresh): force_refresh = True if (args.disable_active): print "User requested to disable Active Measurements setup" gemini_util.DISABLE_ACTIVE = True if (args.amurns): result = gemini_util.isValidAMURNs(args.amurns) if (result): AMURNS = args.amurns else: print "Invalid AM URNS Provided" parser.print_help() sys.exit(1) if (args.certificate): if ((args.certificate).startswith('~')): gemini_util.CERTIFICATE = (args.certificate).replace( '~', expanduser("~"), 1) else: gemini_util.CERTIFICATE = args.certificate gemini_util.SLICEURN = args.sliceurn if (not gemini_util.isValidURN(gemini_util.SLICEURN, 'slice')): print "Not a valid SliceURN" parser.print_help() sys.exit(1) mylogbase = gemini_util.getLOGBASE(gemini_util.SLICEURN) LOCALTIME = time.strftime("%Y%m%dT%H:%M:%S", time.localtime(time.time())) LOGFILE = mylogbase + "/" + os.path.basename( __file__) + "-" + LOCALTIME + ".log" gemini_util.ensure_dir(LOGFILE) gemini_util.openLogPIPE(LOGFILE) if (args.passphrase): if ((args.passphrase).startswith('~')): gemini_util.PASSPHRASEFILE = (args.passphrase).replace( '~', expanduser("~"), 1) else: gemini_util.PASSPHRASEFILE = args.passphrase if (args.pkey): if ((args.pkey).startswith('~')): keyfile = (args.pkey).replace('~', expanduser("~"), 1) else: keyfile = args.pkey if (not (keyfile != '' and os.path.isfile(keyfile))): print "Please provide a valid private key file" parser.print_help() sys.exit(1) else: SSH_pkey = gemini_util.getPkey(keyfile, "SSH key") if (LOGFILE is None): print "Please provide a slicename" parser.print_help() sys.exit(1) try: cf = open(gemini_util.CERTIFICATE, 'r') except: msg = "Error opening Certificate" gemini_util.write_to_log(msg, gemini_util.printtoscreen) sys.exit(1) # Check if passphrase provided is valid # If passphrase is not provided prompt for it. CERT_pkey = gemini_util.getPkey(gemini_util.CERTIFICATE, "certificate") (CERT_ISSUER, username) = gemini_util.getCert_issuer_n_username() if (not (keyfile != '' and os.path.isfile(keyfile))): pKey = CERT_pkey else: pKey = SSH_pkey (UserInfo, Slices, Nodes) = gemini_util.getMyExpInfo(CERT_ISSUER, username, cf.read(), force_refresh, AMURNS) cf.close() username = UserInfo['uid'] email_id = UserInfo['email'] USERURN = UserInfo['userurn'] user_crypt = UserInfo['user_crypt'] framework = UserInfo['framework'] for SliceInfo in Slices: if (gemini_util.SLICEURN == SliceInfo['sliceurn']): found = True break if (not found): msg = "Slice : " + gemini_util.SLICEURN + ' does not exists' gemini_util.write_to_log(msg, gemini_util.printtoscreen) sys.exit(1) msg = "Found Slice Info for " + gemini_util.SLICEURN gemini_util.write_to_log(msg, gemini_util.printtoscreen) slice_crypt = SliceInfo['crypt'] expiry = SliceInfo['expires'] slice_uuid = SliceInfo['uuid'] (project, SLICENAME) = gemini_util.getSlicename_N_Project(gemini_util.SLICEURN) if (isinstance(Nodes, basestring)): msg = Nodes + ": No Manifest Available for : " + SliceInfo['sliceurn'] gemini_util.write_to_log(msg, gemini_util.printtoscreen) sys.exit(1) for Node in Nodes: nodeid = Node['nodeid'] hostname = Node['hostname'] ismc = Node['ismc'] login_hostname = Node['login_hostname'] if (Node['login_username'] != username): msg = "Login Username obtained from manifest is " + Node[ 'login_username'] + " for node " + nodeid + ". Will change it to " + username + " for GEMINI Instrumentation setup" gemini_util.write_to_log(msg, gemini_util.printtoscreen) Node['login_username'] = username login_username = Node['login_username'] other_members = Node['additional_users'] login_port = Node['login_port'] mchostname = Node['mchostname'] cmurn = Node['cmurn'] gemini_node_type = Node['gemini_node_type'] sliver_id = Node['sliver_id'] if (gemini_node_type == 'global_node'): GN_Nodes.append(Node) elif (gemini_node_type == 'mp_node'): MP_Nodes.append(Node) if (Node['cmurn'] not in managers): managers.append(Node['cmurn']) msg = "*****************************\n"+\ "NodeID => "+nodeid+"\n"+ \ "Hostname =>" +hostname+"\n"+ \ "isMC => "+ismc+"\n"+ \ "Hostname to login => "+login_hostname+"\n"+ \ "Username to login with => "+login_username+"\n"+ \ "SSH port to use for Login => "+login_port+"\n"+ \ "Other members on this Node => "+' , '.join(other_members)+"\n"+ \ "Sliver_id => "+sliver_id+"\n"+ \ "Its CMURN => "+cmurn+"\n"+ \ "Gemini Node Type => "+gemini_node_type+"\n"+ \ "MC Hostname => "+mchostname+"\n"+"**********************" gemini_util.write_to_log(msg, gemini_util.dontprinttoscreen) msg = "***********************************\n"+\ "You have "+str(len(MP_Nodes))+" MP Nodes and "+str(len(GN_Nodes))+" GN Nodes\n"+\ "***********************************\n" gemini_util.write_to_log(msg, gemini_util.printtoscreen) if (len(GN_Nodes) == 0): msg = "No GN Nodes Present. Will not proceed" gemini_util.write_to_log(msg, gemini_util.printtoscreen) sys.exit(1) if (not gemini_util.DISABLE_ACTIVE): msg = "Registering Slice with UNIS and posting Manifests to UNIS" gemini_util.write_to_log(msg, gemini_util.printtoscreen) REGUNISJSON = gemini_util.register_experiment_with_UNIS( slice_crypt, user_crypt) try: REGUNISOBJ = json.loads(REGUNISJSON) gemini_util.write_to_log(REGUNISJSON, gemini_util.dontprinttoscreen) except ValueError: msg = "REGUNIS Info JSON Loading Error" gemini_util.write_to_log(msg, gemini_util.printtoscreen) sys.exit(1) if (REGUNISOBJ['code'] != 0): msg = "GeniDesktop to UNIS registration Error : " + REGUNISOBJ[ 'output'] gemini_util.write_to_log(msg, gemini_util.printtoscreen) msg = "Active Services will be disabled to continue with the Instrumentation process" gemini_util.write_to_log(msg, gemini_util.printtoscreen) gemini_util.DISABLE_ACTIVE = True if (not gemini_util.DISABLE_ACTIVE): slice_lifetime = {} if (slice_uuid): expiration = datetime.datetime.strptime(expiry, "%Y-%m-%dT%H:%M:%SZ") now = datetime.datetime.now(expiration.tzinfo) td = expiration - now slice_lifetime = int(td.seconds + td.days * 24 * 3600) validity = datetime.timedelta(seconds=slice_lifetime) # adding 30 days lifetime to avoid GEMINI proxy cert expiration for most experimenters slice_lifetime = validity.days + 30 #Now setup a proxy cert for the instrumentize script so we can talk to UNIS without keypass gemini_util.makeInstrumentizeProxy(slice_lifetime, slice_uuid) if not (gemini_util.PROXY_ATTR): msg = "ERROR: Could not complete proxy certificate creation for instrumentize process" gemini_util.write_to_log(msg, gemini_util.printtoscreen) msg = "Active Services will be disabled to continue with the Instrumentation process" gemini_util.write_to_log(msg, gemini_util.printtoscreen) gemini_util.DISABLE_ACTIVE = True #Send the proxy cert to UNIS so we can use this identity to query UNIS later f = open(gemini_util.PROXY_ATTR) res = gemini_util.postDataToUNIS(gemini_util.PROXY_KEY, gemini_util.PROXY_CERT, "/credentials/geniuser", f) f.close() os.remove(gemini_util.PROXY_ATTR) if res is None: msg = "Failed to register instrumentize proxy cert" gemini_util.write_to_log(msg, gemini_util.printtoscreen) msg = "Active Services will be disabled to continue with the Instrumentation process" gemini_util.write_to_log(msg, gemini_util.printtoscreen) gemini_util.DISABLE_ACTIVE = True else: msg = "Could not get slice UUID from slice credential. GEMINI Services may fail." gemini_util.write_to_log(msg, gemini_util.printtoscreen) sys.exit(1) (gn_ms_proxycert_file, gn_ms_proxykey_file, mp_blipp_proxycert_file, mp_blipp_proxykey_file) = gemini_util.generate_all_proxycerts( slice_lifetime, slice_uuid) proclist = [] results = [] unis_topo = {} for my_manager in managers: msg = "Starting instrumentize process for Nodes at " + my_manager gemini_util.write_to_log(msg, gemini_util.printtoscreen) # STEP 1: Check nodes for OS Compatibilty pruned_GN_Nodes = gemini_util.pruneNodes(GN_Nodes, my_manager, 'GN') if (len(pruned_GN_Nodes) == 0): msg = "No GN Nodes that monitor MP Nodes at AM = " + my_manager + " present. Continuing with the next AM if available" gemini_util.write_to_log(msg, gemini_util.printtoscreen) continue if (len(pruned_GN_Nodes) > 1): msg = "Multiple GN Nodes that monitor MP Nodes at AM = " + my_manager + " present . This is not supported yet" gemini_util.write_to_log(msg, gemini_util.printtoscreen) sys.exit(1) pruned_MP_Nodes = gemini_util.pruneNodes(MP_Nodes, my_manager, '') endpoint = "/domains/%s" % (my_manager.replace( 'urn:publicid:IDN+', '').replace('+authority+cm', '') + '+slice+' + SLICENAME).replace('+', '_') if (not gemini_util.DISABLE_ACTIVE): unis_topo[my_manager] = gemini_util.getUNISTopo( gemini_util.PROXY_KEY, gemini_util.PROXY_CERT, endpoint) my_queue = multiprocessing.Queue() p = multiprocessing.Process(target=InstrumentizeProcess, args=( my_manager, pruned_GN_Nodes, pruned_MP_Nodes, pKey, gn_ms_proxycert_file, gn_ms_proxykey_file, mp_blipp_proxycert_file, mp_blipp_proxykey_file, USERURN, email_id, gemini_util.SLICEURN, slice_uuid, unis_topo, my_queue, )) proclist.append(p) results.append(my_queue) p.start() #while(True): # pending_proclist = [] # for i in proclist: # if(i.exitcode is None): # pending_proclist.append(i) # continue # elif(i.exitcode != 0): # sys.exit(i.exitcode) # else: # continue # if not pending_proclist: # break # else: # proclist = pending_proclist # time.sleep(5) # pass for i in proclist: i.join() if (i.exitcode != 0): sys.exit(i.exitcode) for result in results: if (result.empty()): DONE = 1 if (not gemini_util.DISABLE_ACTIVE): tmp_proxyfiles = [ gemini_util.PROXY_CERT, gemini_util.PROXY_KEY, gn_ms_proxycert_file, gn_ms_proxykey_file, mp_blipp_proxycert_file, mp_blipp_proxykey_file ] status = gemini_util.delete_all_temp_proxyfiles(tmp_proxyfiles) if (DONE): msg = "Gemini Instrumentize Complete\n Go to the GeniDesktop to login" gemini_util.write_to_log(msg, gemini_util.printtoscreen) gemini_util.closeLogPIPE(LOGFILE)
def main(argv=None): ############################################# # MAIN PROCESS ############################################# other_details = "" managers = [] GN_Nodes = [] MP_Nodes = [] keyfile = "" force_refresh = False FILE = '' AMURNS = '' email_id = '' DONE=0 CERTIFICATE_string = None gn_ms_proxycert_file = None gn_ms_proxykey_file= None mp_blipp_proxycert_file = None mp_blipp_proxykey_file = None parser = argparse.ArgumentParser(description='Print Experiment state summary for GeniDesktop in JSON Format') parser.add_argument('-d','--debug',action='store_true',help='Be Verbose') parser.add_argument('--devel',action='store_true',help='Use Development version of GEMINI repository code [only for GEMINI developers]') parser.add_argument('--force_refresh',action='store_true',help='Force fetch all user/slice/sliver info rather than using locally cached version') parser.add_argument('--disable_active',action='store_true',help='Disable IU Active Measurement Install') parser.add_argument('-n','--sliceurn',help='Slice URN of the Slice',required=True) parser.add_argument('-a','--amurns',help='Comma seperated list of AM URNs where the user has slivers for this slice') parser.add_argument('-k','--pkey',help='Your private SSH RSA Key file') parser.add_argument('-s','--speaksforcred',help='Read Speaks for credential from file') parser.add_argument('-f','--certificate',help='Read User/UNIStool SSL certificate from file',required=True) args = parser.parse_args() LOGFILE = None if (args.debug): gemini_util.debug = True if (args.devel): gemini_util.version = gemini_util.devel_version gemini_util.INSTOOLS_repo_url = gemini_util.mc_repo_rooturl+"GEMINI/"+gemini_util.version+"/" if (args.force_refresh): force_refresh = True if (args.disable_active): print "User requested to disable Active Measurements setup" gemini_util.DISABLE_ACTIVE = True if (args.amurns): result = gemini_util.isValidAMURNs(args.amurns) if(result): AMURNS = args.amurns else: print "Invalid AM URNS Provided" parser.print_help() sys.exit(1) if(args.speaksforcred): print "Using Speaks for Credentials from the GeniDesktop" speaks_for_cred_file = args.speaksforcred #get Cert from this credential try: cf = open(speaks_for_cred_file,'r') except: msg = "Error opening Speaks for Credential File" gemini_util.write_to_log(msg,gemini_util.printtoscreen) sys.exit(1) CERTIFICATE_string = gemini_util.getCertFromCredfile(speaks_for_cred_file) if(CERTIFICATE_string == ''): msg = "Missing Certificate in the Speaks for Credential" gemini_util.write_to_log(msg,gemini_util.printtoscreen) sys.exit(1) # else: # f = tempfile.NamedTemporaryFile(delete=False) # f.write(CERTIFICATE_string) # gemini_util.CERTIFICATE = f.name if(args.certificate): if ((args.certificate).startswith('~')): gemini_util.CERTIFICATE = (args.certificate).replace('~',expanduser("~"),1) else: gemini_util.CERTIFICATE = args.certificate gemini_util.SLICEURN = args.sliceurn if (not gemini_util.isValidURN(gemini_util.SLICEURN,'slice')): print "Not a valid SliceURN" parser.print_help() sys.exit(1) mylogbase = gemini_util.getLOGBASE(gemini_util.SLICEURN) LOCALTIME = time.strftime("%Y%m%dT%H:%M:%S",time.localtime(time.time())) LOGFILE = mylogbase+"/"+os.path.basename(__file__)+"-"+LOCALTIME+".log" gemini_util.ensure_dir(LOGFILE) gemini_util.openLogPIPE(LOGFILE) if (args.pkey): if((args.pkey).startswith('~')): keyfile = (args.pkey).replace('~',expanduser("~"),1) else: keyfile = args.pkey if(not (keyfile != '' and os.path.isfile(keyfile))): print "Please provide a valid private key file" parser.print_help() sys.exit(1) else: SSH_pkey = gemini_util.getPkey(keyfile,"SSH key") if (LOGFILE is None): print "Please provide a slicename" parser.print_help() sys.exit(1) (CERT_ISSUER,username) = gemini_util.getCert_issuer_n_username(CERTIFICATE_string) pKey = SSH_pkey (UserInfo,Slices,Nodes) = gemini_util.getMyExpInfo(CERT_ISSUER,username,cf.read(),force_refresh,AMURNS) cf.close() username = UserInfo['uid'] email_id = UserInfo['email'] USERURN = UserInfo['userurn'] user_crypt = UserInfo['user_crypt'] framework = UserInfo['framework'] for SliceInfo in Slices: if (gemini_util.SLICEURN == SliceInfo['sliceurn']): found = True break if(not found): msg = "Slice : "+gemini_util.SLICEURN+' does not exists' gemini_util.write_to_log(msg,gemini_util.printtoscreen) sys.exit(1) msg = "Found Slice Info for "+gemini_util.SLICEURN gemini_util.write_to_log(msg,gemini_util.printtoscreen) slice_crypt = SliceInfo['crypt'] expiry = SliceInfo['expires'] slice_uuid = SliceInfo['uuid'] (project,SLICENAME) = gemini_util.getSlicename_N_Project(gemini_util.SLICEURN) if(isinstance(Nodes, basestring)): msg = Nodes+": No Manifest Available for : "+ SliceInfo['sliceurn'] gemini_util.write_to_log(msg,gemini_util.printtoscreen) sys.exit(1) for Node in Nodes: nodeid = Node['nodeid'] hostname = Node['hostname'] ismc = Node['ismc'] login_hostname = Node['login_hostname'] if( Node['login_username'] != username): msg = "Login Username obtained from manifest is "+Node['login_username']+ " for node "+nodeid+". Will change it to "+username+" for GEMINI Instrumentation setup" gemini_util.write_to_log(msg,gemini_util.printtoscreen) Node['login_username'] = username login_username = Node['login_username'] other_members = Node['additional_users'] login_port = Node['login_port'] mchostname = Node['mchostname'] cmurn = Node['cmurn'] gemini_node_type = Node['gemini_node_type'] sliver_id = Node['sliver_id'] if(gemini_node_type == 'global_node'): GN_Nodes.append(Node) elif(gemini_node_type == 'mp_node'): MP_Nodes.append(Node) if(Node['cmurn'] not in managers): managers.append(Node['cmurn']) msg = "*****************************\n"+\ "NodeID => "+nodeid+"\n"+ \ "Hostname =>" +hostname+"\n"+ \ "isMC => "+ismc+"\n"+ \ "Hostname to login => "+login_hostname+"\n"+ \ "Username to login with => "+login_username+"\n"+ \ "SSH port to use for Login => "+login_port+"\n"+ \ "Other members on this Node => "+' , '.join(other_members)+"\n"+ \ "Sliver_id => "+sliver_id+"\n"+ \ "Its CMURN => "+cmurn+"\n"+ \ "Gemini Node Type => "+gemini_node_type+"\n"+ \ "MC Hostname => "+mchostname+"\n"+"**********************" gemini_util.write_to_log(msg,gemini_util.dontprinttoscreen) msg = "***********************************\n"+\ "You have "+str(len(MP_Nodes))+" MP Nodes and "+str(len(GN_Nodes))+" GN Nodes\n"+\ "***********************************\n" gemini_util.write_to_log(msg,gemini_util.printtoscreen) if (len(GN_Nodes) == 0): msg = "No GN Nodes Present. Will not proceed" gemini_util.write_to_log(msg,gemini_util.printtoscreen) sys.exit(1) if(not gemini_util.DISABLE_ACTIVE): msg = "Registering Slice Credential with UNIS" gemini_util.write_to_log(msg,gemini_util.printtoscreen) REGUNISJSON = gemini_util.register_experiment_with_UNIS(slice_crypt,user_crypt,'register') try: REGUNISOBJ = json.loads(REGUNISJSON) gemini_util.write_to_log(REGUNISJSON,gemini_util.dontprinttoscreen) except ValueError: msg ="REGUNIS Info JSON Loading Error" gemini_util.write_to_log(msg,gemini_util.printtoscreen) msg = "Active Services will be disabled to continue with the Instrumentation process" gemini_util.write_to_log(msg,gemini_util.printtoscreen) gemini_util.DISABLE_ACTIVE = True if (REGUNISOBJ['code'] != 0): msg = "GeniDesktop to UNIS registration Error : "+ REGUNISOBJ['output'] gemini_util.write_to_log(msg,gemini_util.printtoscreen) msg = "Active Services will be disabled to continue with the Instrumentation process" gemini_util.write_to_log(msg,gemini_util.printtoscreen) gemini_util.DISABLE_ACTIVE = True if(not gemini_util.DISABLE_ACTIVE): slice_lifetime = {} if (slice_uuid): expiration = datetime.datetime.strptime(expiry,"%Y-%m-%dT%H:%M:%SZ") now = datetime.datetime.now(expiration.tzinfo) td = expiration - now slice_lifetime = int(td.seconds + td.days * 24 * 3600) validity = datetime.timedelta(seconds=slice_lifetime) # adding 30 days lifetime to avoid GEMINI proxy cert expiration for most experimenters slice_lifetime = validity.days + 30 #Now setup a proxy cert for the instrumentize script so we can talk to UNIS without keypass gemini_util.makeInstrumentizeProxy(slice_lifetime,slice_uuid) if not (gemini_util.PROXY_ATTR): msg = "ERROR: Could not complete proxy certificate creation for instrumentize process" gemini_util.write_to_log(msg,gemini_util.printtoscreen) msg = "Active Services will be disabled to continue with the Instrumentation process" gemini_util.write_to_log(msg,gemini_util.printtoscreen) gemini_util.DISABLE_ACTIVE = True #Send the proxy cert to UNIS so we can use this identity to query UNIS later msg = "Trying to register the UNIS Tool Proxy cert as Slice Admin" gemini_util.write_to_log(msg,gemini_util.printtoscreen) f = open(gemini_util.PROXY_ATTR) res = gemini_util.postDataToUNIS(gemini_util.PROXY_KEY,gemini_util.PROXY_CERT,"/credentials/geniuser",f) f.close() os.remove(gemini_util.PROXY_ATTR) if res is None: msg="Failed to register instrumentize proxy cert" gemini_util.write_to_log(msg,gemini_util.printtoscreen) msg = "Active Services will be disabled to continue with the Instrumentation process" gemini_util.write_to_log(msg,gemini_util.printtoscreen) gemini_util.DISABLE_ACTIVE = True else: msg = "Sucessfully registered the UNIS Tool Proxy cert as Slice Admin\n\nTrying to Post Manifests to UNIS" gemini_util.write_to_log(msg,gemini_util.printtoscreen) content1 = '' content2 = '' with open(gemini_util.PROXY_KEY,'r') as content_file: content1 = content_file.read() with open(gemini_util.PROXY_CERT,'r') as content_file: content2 = content_file.read() REGUNISJSON = gemini_util.register_experiment_with_UNIS(slice_crypt,user_crypt,'postmanifest',content1+"\n"+content2) try: REGUNISOBJ = json.loads(REGUNISJSON) gemini_util.write_to_log(REGUNISJSON,gemini_util.dontprinttoscreen) except ValueError: msg ="REGUNIS Info JSON Loading Error" gemini_util.write_to_log(msg,gemini_util.printtoscreen) msg = "Active Services will be disabled to continue with the Instrumentation process" gemini_util.write_to_log(msg,gemini_util.printtoscreen) gemini_util.DISABLE_ACTIVE = True if (REGUNISOBJ['code'] != 0): msg = "GeniDesktop Manifest-post to UNIS Error : "+ REGUNISOBJ['output'] gemini_util.write_to_log(msg,gemini_util.printtoscreen) msg = "Active Services will be disabled to continue with the Instrumentation process" gemini_util.write_to_log(msg,gemini_util.printtoscreen) gemini_util.DISABLE_ACTIVE = True else: (gn_ms_proxycert_file,gn_ms_proxykey_file,mp_blipp_proxycert_file,mp_blipp_proxykey_file) = gemini_util.generate_all_proxycerts(slice_lifetime,slice_uuid) else: msg = "Could not get slice UUID from slice credential. GEMINI Services may fail." gemini_util.write_to_log(msg,gemini_util.printtoscreen) sys.exit(1) proclist = [] results = [] unis_topo = {} for my_manager in managers: msg = "Starting instrumentize process for Nodes at "+my_manager gemini_util.write_to_log(msg,gemini_util.printtoscreen) # STEP 1: Check nodes for OS Compatibilty pruned_GN_Nodes = gemini_util.pruneNodes(GN_Nodes,my_manager,'GN') if (len(pruned_GN_Nodes) == 0): msg = "No GN Nodes that monitor MP Nodes at AM = "+my_manager+" present. Continuing with the next AM if available" gemini_util.write_to_log(msg,gemini_util.printtoscreen) continue if (len(pruned_GN_Nodes) > 1): msg = "Multiple GN Nodes that monitor MP Nodes at AM = "+my_manager+" present . This is not supported yet" gemini_util.write_to_log(msg,gemini_util.printtoscreen) sys.exit(1) pruned_MP_Nodes = gemini_util.pruneNodes(MP_Nodes,my_manager,'') endpoint = "/domains/%s" % (my_manager.replace('urn:publicid:IDN+','').replace('+authority+cm','')+'+slice+'+SLICENAME).replace('+','_') if(not gemini_util.DISABLE_ACTIVE): unis_topo[my_manager] = gemini_util.getUNISTopo(gemini_util.PROXY_KEY,gemini_util.PROXY_CERT,endpoint) my_queue = multiprocessing.Queue() p = multiprocessing.Process(target=InstrumentizeProcess,args=(my_manager,pruned_GN_Nodes,pruned_MP_Nodes,pKey,gn_ms_proxycert_file,gn_ms_proxykey_file,mp_blipp_proxycert_file,mp_blipp_proxykey_file,USERURN,email_id,gemini_util.SLICEURN,slice_uuid,unis_topo,my_queue,)) proclist.append(p) results.append(my_queue) p.start() #while(True): # pending_proclist = [] # for i in proclist: # if(i.exitcode is None): # pending_proclist.append(i) # continue # elif(i.exitcode != 0): # sys.exit(i.exitcode) # else: # continue # if not pending_proclist: # break # else: # proclist = pending_proclist # time.sleep(5) # pass for i in proclist: i.join() if(i.exitcode != 0): sys.exit(i.exitcode) for result in results: if(result.empty()): DONE = 1 if(not gemini_util.DISABLE_ACTIVE): tmp_proxyfiles = [gemini_util.PROXY_CERT,gemini_util.PROXY_KEY,gn_ms_proxycert_file,gn_ms_proxykey_file,mp_blipp_proxycert_file,mp_blipp_proxykey_file] status = gemini_util.delete_all_temp_proxyfiles(tmp_proxyfiles) if(DONE): msg = "Gemini Instrumentize Complete\n Go to the GeniDesktop to login" gemini_util.write_to_log(msg,gemini_util.printtoscreen) gemini_util.closeLogPIPE(LOGFILE)
def main(argv=None): ############################################# # MAIN PROCESS ############################################# other_details = "" managers = [] GN_Nodes = [] MP_Nodes = [] keyfile = "" force_refresh = False FILE = '' AMURNS = '' CERTIFICATE_string = None parser = argparse.ArgumentParser( description= 'Print Experiment state summary for GeniDesktop in JSON Format') parser.add_argument('-d', '--debug', action='store_true', help='Be Verbose') parser.add_argument( '--devel', action='store_true', help= 'Use Development version of GEMINI repository code [only for GEMINI developers]' ) parser.add_argument( '--force_refresh', action='store_true', help= 'Force fetch all user/slice/sliver info rather than using locally cached version' ) parser.add_argument('-n', '--sliceurn', help='Slice URN of the Slice', required=True) parser.add_argument( '-a', '--amurns', help= 'Comma seperated list of AM URNs where the user has slivers for this slice' ) parser.add_argument('-k', '--pkey', help='Your private SSH RSA Key file') parser.add_argument('-s', '--speaksforcred', help='Read Speaks for credential from file') args = parser.parse_args() LOGFILE = None if (args.debug): gemini_util.debug = True if (args.devel): gemini_util.version = gemini_util.devel_version gemini_util.INSTOOLS_repo_url = gemini_util.mc_repo_rooturl + "GEMINI/" + gemini_util.version + "/" if (args.force_refresh): force_refresh = True if (args.amurns): result = gemini_util.isValidAMURNs(args.amurns) if (result): AMURNS = args.amurns else: print "Invalid AM URNS Provided" parser.print_help() sys.exit(1) if (args.speaksforcred): print "Using Speaks for Credentials from the GeniDesktop" speaks_for_cred_file = args.speaksforcred #get Cert from this credential try: cf = open(speaks_for_cred_file, 'r') except: msg = "Error opening Speaks for Credential File" gemini_util.write_to_log(msg, gemini_util.printtoscreen) sys.exit(1) CERTIFICATE_string = gemini_util.getCertFromCredfile( speaks_for_cred_file) if (CERTIFICATE_string == ''): msg = "Missing Certificate in the Speaks for Credential" gemini_util.write_to_log(msg, gemini_util.printtoscreen) sys.exit(1) gemini_util.SLICEURN = args.sliceurn if (not gemini_util.isValidURN(gemini_util.SLICEURN, 'slice')): print "Not a valid SliceURN" parser.print_help() sys.exit(1) mylogbase = gemini_util.getLOGBASE(gemini_util.SLICEURN) LOCALTIME = time.strftime("%Y%m%dT%H:%M:%S", time.localtime(time.time())) LOGFILE = mylogbase + "/" + os.path.basename( __file__) + "-" + LOCALTIME + ".log" gemini_util.ensure_dir(LOGFILE) gemini_util.openLogPIPE(LOGFILE) if (args.pkey): if ((args.pkey).startswith('~')): keyfile = (args.pkey).replace('~', expanduser("~"), 1) else: keyfile = args.pkey if (not (keyfile != '' and os.path.isfile(keyfile))): print "Please provide a valid private key file" parser.print_help() sys.exit(1) else: SSH_pkey = gemini_util.getPkey(keyfile, "SSH key") if (LOGFILE is None): print "Please provide a slicename" parser.print_help() sys.exit(1) (CERT_ISSUER, username) = gemini_util.getCert_issuer_n_username(CERTIFICATE_string) pKey = SSH_pkey (UserInfo, Slices, Nodes) = gemini_util.getMyExpInfo(CERT_ISSUER, username, cf.read(), force_refresh, AMURNS) cf.close() username = UserInfo['uid'] email_id = UserInfo['email'] USERURN = UserInfo['userurn'] user_crypt = UserInfo['user_crypt'] framework = UserInfo['framework'] for SliceInfo in Slices: if (gemini_util.SLICEURN == SliceInfo['sliceurn']): found = True break if (not found): msg = "Slice : " + gemini_util.SLICEURN + ' does not exists' gemini_util.write_to_log(msg, gemini_util.printtoscreen) sys.exit(1) msg = "Found Slice Info for " + gemini_util.SLICEURN gemini_util.write_to_log(msg, gemini_util.printtoscreen) slice_crypt = SliceInfo['crypt'] if (isinstance(Nodes, basestring)): msg = Nodes + ": No Manifest Available for : " + SliceInfo['sliceurn'] gemini_util.write_to_log(msg, gemini_util.printtoscreen) sys.exit(1) for Node in Nodes: nodeid = Node['nodeid'] hostname = Node['hostname'] ismc = Node['ismc'] login_hostname = Node['login_hostname'] if (Node['login_username'] != username): msg = "Login Username obtained from manifest is " + Node[ 'login_username'] + " for node " + nodeid + ". Will change it to " + username + " for GEMINI Instrumentation setup" gemini_util.write_to_log(msg, gemini_util.printtoscreen) Node['login_username'] = username login_username = Node['login_username'] other_members = Node['additional_users'] login_port = Node['login_port'] mchostname = Node['mchostname'] cmurn = Node['cmurn'] gemini_node_type = Node['gemini_node_type'] sliver_id = Node['sliver_id'] if (gemini_node_type == 'global_node'): GN_Nodes.append(Node) elif (gemini_node_type == 'mp_node'): MP_Nodes.append(Node) if (Node['cmurn'] not in managers): managers.append(Node['cmurn']) msg = "*****************************\n"+\ "NodeID => "+nodeid+"\n"+ \ "Hostname =>" +hostname+"\n"+ \ "isMC => "+ismc+"\n"+ \ "Hostname to login => "+login_hostname+"\n"+ \ "Username to login with => "+login_username+"\n"+ \ "SSH port to use for Login => "+login_port+"\n"+ \ "Other members on this Node => "+' , '.join(other_members)+"\n"+ \ "Sliver_id => "+sliver_id+"\n"+ \ "Its CMURN => "+cmurn+"\n"+ \ "Gemini Node Type => "+gemini_node_type+"\n"+ \ "MC Hostname => "+mchostname+"\n"+"**********************" gemini_util.write_to_log(msg, gemini_util.dontprinttoscreen) msg = "***********************************\n"+\ "You have "+str(len(MP_Nodes))+" MP Nodes and "+str(len(GN_Nodes))+" GN Nodes\n"+\ "***********************************\n" gemini_util.write_to_log(msg, gemini_util.printtoscreen) if (len(GN_Nodes) == 0): msg = "No GN Nodes Present. Will not proceed" gemini_util.write_to_log(msg, gemini_util.printtoscreen) sys.exit(1) dpadmin_username = "******" dpadmin_passwd = gemini_util.random_password() m = hashlib.sha1(slice_crypt) user_password_for_drupal = m.hexdigest() proclist = [] for my_manager in managers: msg = "Starting initialization process for Nodes at [" + my_manager + "] " gemini_util.write_to_log(msg, gemini_util.printtoscreen) pruned_GN_Nodes = gemini_util.pruneNodes(GN_Nodes, my_manager, 'GN') if (len(pruned_GN_Nodes) == 0): msg = "No GN Nodes Present that monitor MP Nodes at AM = " + my_manager + " . Continuing with the next AM if available" gemini_util.write_to_log(msg, gemini_util.printtoscreen) continue if (len(pruned_GN_Nodes) > 1): msg = "Multiple GN Nodes Present that monitor this AM = " + my_manager + " . This is not supported yet" gemini_util.write_to_log(msg, gemini_util.printtoscreen) sys.exit(1) pruned_MP_Nodes = gemini_util.pruneNodes(MP_Nodes, my_manager, '') p = multiprocessing.Process(target=InitProcess, args=( my_manager, pruned_GN_Nodes, pruned_MP_Nodes, USERURN, email_id, user_password_for_drupal, gemini_util.SLICEURN, dpadmin_username, dpadmin_passwd, slice_crypt, pKey, )) proclist.append(p) p.start() while (True): pending_proclist = [] for i in proclist: if (i.exitcode is None): pending_proclist.append(i) continue elif (i.exitcode != 0): sys.exit(i.exitcode) else: continue if not pending_proclist: break else: proclist = pending_proclist time.sleep(5) pass gemini_util.closeLogPIPE(LOGFILE)
def main(argv=None): ############################################# # MAIN PROCESS ############################################# other_details = "" managers = [] GN_Nodes = [] MP_Nodes = [] keyfile = "" force_refresh = False FILE = '' AMURNS = '' DONE=0 parser = argparse.ArgumentParser(description='Print Experiment state summary for GeniDesktop in JSON Format') parser.add_argument('-d','--debug',action='store_true',help='Be Verbose') parser.add_argument('--devel',action='store_true',help='Use Development version of GEMINI repository code [only for GEMINI developers]') parser.add_argument('--force_refresh',action='store_true',help='Force fetch all user/slice/sliver info rather than using locally cached version') parser.add_argument('-n','--sliceurn',help='Slice URN of the Slice',required=True) parser.add_argument('-a','--amurns',help='Comma seperated list of AM URNs where the user has slivers for this slice') parser.add_argument('-k','--pkey',help='Your private SSH RSA Key file') parser.add_argument('-f','--certificate',help='Read SSL certificate from file',required=True) parser.add_argument('-p','--passphrase',help='Read passphrase for certificate from file') args = parser.parse_args() LOGFILE = None if (args.debug): gemini_util.debug = True if (args.devel): gemini_util.version = gemini_util.devel_version gemini_util.INSTOOLS_repo_url = gemini_util.mc_repo_rooturl+"GEMINI/"+gemini_util.version+"/" if (args.force_refresh): force_refresh = True if (args.amurns): result = gemini_util.isValidAMURNs(args.amurns) if(result): AMURNS = args.amurns else: print "Invalid AM URNS Provided" parser.print_help() sys.exit(1) if(args.certificate): if ((args.certificate).startswith('~')): gemini_util.CERTIFICATE = (args.certificate).replace('~',expanduser("~"),1) else: gemini_util.CERTIFICATE = args.certificate gemini_util.SLICEURN = args.sliceurn if (not gemini_util.isValidURN(gemini_util.SLICEURN,'slice')): print "Not a valid SliceURN" parser.print_help() sys.exit(1) mylogbase = gemini_util.getLOGBASE(gemini_util.SLICEURN) LOCALTIME = time.strftime("%Y%m%dT%H:%M:%S",time.localtime(time.time())) LOGFILE = mylogbase+"/"+os.path.basename(__file__)+"-"+LOCALTIME+".log" gemini_util.ensure_dir(LOGFILE) gemini_util.openLogPIPE(LOGFILE) if (args.passphrase): if((args.passphrase).startswith('~')): gemini_util.PASSPHRASEFILE = (args.passphrase).replace('~',expanduser("~"),1) else: gemini_util.PASSPHRASEFILE = args.passphrase if (args.pkey): if((args.pkey).startswith('~')): keyfile = (args.pkey).replace('~',expanduser("~"),1) else: keyfile = args.pkey if(not (keyfile != '' and os.path.isfile(keyfile))): print "Please provide a valid private key file" parser.print_help() sys.exit(1) else: SSH_pkey = gemini_util.getPkey(keyfile,"SSH key") if (LOGFILE is None): print "Please provide a slicename" parser.print_help() sys.exit(1) try: cf = open(gemini_util.CERTIFICATE,'r') except: msg = "Error opening Certificate" gemini_util.write_to_log(LOGFILE,msg,gemini_util.printtoscreen,debug) sys.exit(1) # Check if passphrase provided is valid # If passphrase is not provided prompt for it. CERT_pkey = gemini_util.getPkey(gemini_util.CERTIFICATE,"certificate") (CERT_ISSUER,username) = gemini_util.getCert_issuer_n_username() if(not (keyfile != '' and os.path.isfile(keyfile))): pKey = CERT_pkey else: pKey = SSH_pkey (UserInfo,Slices,Nodes) = gemini_util.getMyExpInfo(CERT_ISSUER,username,cf.read(),force_refresh,AMURNS) cf.close() username = UserInfo['uid'] email_id = UserInfo['email'] USERURN = UserInfo['userurn'] user_crypt = UserInfo['user_crypt'] framework = UserInfo['framework'] for SliceInfo in Slices: (junk,slicename_from_parser) = SliceInfo['sliceurn'].rsplit('+',1) if (gemini_util.SLICEURN == SliceInfo['sliceurn']): found = True break if(not found): msg = "Slice : "+gemini_util.SLICEURN+' does not exists' gemini_util.write_to_log(msg,gemini_util.printtoscreen) sys.exit(1) msg = "Found Slice Info for "+gemini_util.SLICEURN gemini_util.write_to_log(msg,gemini_util.printtoscreen) slice_crypt = SliceInfo['crypt'] expiry = SliceInfo['expires'] slice_uuid = SliceInfo['uuid'] if(isinstance(Nodes, basestring)): msg = Nodes+": No Manifest Available for : "+ SliceInfo['sliceurn'] gemini_util.write_to_log(msg,gemini_util.printtoscreen) sys.exit(1) for Node in Nodes: nodeid = Node['nodeid'] hostname = Node['hostname'] ismc = Node['ismc'] login_hostname = Node['login_hostname'] if( Node['login_username'] != username): msg = "Login Username obtained from manifest is "+Node['login_username']+ " for node "+nodeid+". Will change it to "+username+" for GEMINI Instrumentation setup" gemini_util.write_to_log(msg,gemini_util.printtoscreen) Node['login_username'] = username login_username = Node['login_username'] login_port = Node['login_port'] mchostname = Node['mchostname'] cmurn = Node['cmurn'] gemini_node_type = Node['gemini_node_type'] sliver_id = Node['sliver_id'] if(gemini_node_type == 'global_node'): GN_Nodes.append(Node) elif(gemini_node_type == 'mp_node'): MP_Nodes.append(Node) if(Node['cmurn'] not in managers): managers.append(Node['cmurn']) msg = "*****************************\n"+\ "NodeID => "+nodeid+"\n"+ \ "Hostname =>" +hostname+"\n"+ \ "isMC => "+ismc+"\n"+ \ "Hostname to login => "+login_hostname+"\n"+ \ "Username to login with => "+login_username+"\n"+ \ "SSH port to use for Login => "+login_port+"\n"+ \ "Sliver_id => "+sliver_id+"\n"+ \ "Its CMURN => "+cmurn+"\n"+ \ "Gemini Node Type => "+gemini_node_type+"\n"+ \ "MC Hostname => "+mchostname+"\n"+"**********************" gemini_util.write_to_log(msg,gemini_util.dontprinttoscreen) msg = "***********************************\n"+\ "You have "+str(len(MP_Nodes))+" MP Nodes and "+str(len(GN_Nodes))+" GN Nodes\n"+\ "***********************************\n" gemini_util.write_to_log(msg,gemini_util.printtoscreen) if (len(GN_Nodes) == 0): msg = "No GN Nodes Present. Will not proceed" gemini_util.write_to_log(msg,gemini_util.printtoscreen) sys.exit(1) msg = "Registering Slice with UNIS and posting Manifests to UNIS" gemini_util.write_to_log(msg,gemini_util.printtoscreen) REGUNISJSON = gemini_util.register_experiment_with_UNIS(slice_crypt,user_crypt) try: REGUNISOBJ = json.loads(REGUNISJSON) gemini_util.write_to_log(REGUNISJSON,gemini_util.dontprinttoscreen) except ValueError: msg ="REGUNIS Info JSON Loading Error" gemini_util.write_to_log(msg,gemini_util.printtoscreen) sys.exit(1) if (REGUNISOBJ['code'] != 0): msg = "GeniDesktop to UNIS registration Error : "+ REGUNISOBJ['output'] gemini_util.write_to_log(msg,gemini_util.printtoscreen) msg = "Active Services will be disabled to continue with the Instrumentation process" gemini_util.write_to_log(msg,gemini_util.printtoscreen) gemini_util.DISABLE_ACTIVE = True slice_lifetime = {} if (slice_uuid): expiration = datetime.datetime.strptime(expiry,"%Y-%m-%dT%H:%M:%SZ") now = datetime.datetime.now(expiration.tzinfo) td = expiration - now slice_lifetime = int(td.seconds + td.days * 24 * 3600) validity = datetime.timedelta(seconds=slice_lifetime) slice_lifetime = validity.days + 30 #Now setup a proxy cert for the instrumentize script so we can talk to UNIS without keypass gemini_util.makeInstrumentizeProxy(slice_lifetime,slice_uuid) if not (gemini_util.PROXY_ATTR): msg = "ERROR: Could not complete proxy certificate creation for instrumentize process" gemini_util.write_to_log(msg,gemini_util.printtoscreen) msg = "Active Services will be disabled to continue with the Instrumentation process" gemini_util.write_to_log(msg,gemini_util.printtoscreen) gemini_util.DISABLE_ACTIVE = True else: msg = "Could not get slice UUID from slice credential. GEMINI Services may fail." gemini_util.write_to_log(msg,gemini_util.printtoscreen) sys.exit(1) gn_ms_proxycert_file = None gn_ms_proxykey_file= None mp_blipp_proxycert_file = None mp_blipp_proxykey_file = None (gn_ms_proxycert_file,gn_ms_proxykey_file,mp_blipp_proxycert_file,mp_blipp_proxykey_file) = gemini_util.generate_all_proxycerts(slice_lifetime,slice_uuid) for my_manager in managers: # STEP 1: Check nodes for OS Compatibilty pruned_GN_Nodes = gemini_util.pruneNodes(GN_Nodes,my_manager,'GN') if (len(pruned_GN_Nodes) == 0): msg = "No GN Nodes that monitor MP Nodes at AM = "+my_manager+" present. Continuing with the next AM if available" gemini_util.write_to_log(msg,gemini_util.printtoscreen) continue if (len(pruned_GN_Nodes) > 1): msg = "Multiple GN Nodes that monitor MP Nodes at AM = "+my_manager+" present . This is not supported yet" gemini_util.write_to_log(msg,gemini_util.printtoscreen) sys.exit(1) pruned_MP_Nodes = gemini_util.pruneNodes(MP_Nodes,my_manager,'') msg = "Generating and installing certificates" gemini_util.write_to_log(msg,gemini_util.printtoscreen) if(not gemini_util.DISABLE_ACTIVE): gemini_util.install_GN_Certs(pruned_GN_Nodes,pKey,gn_ms_proxycert_file,gn_ms_proxykey_file) gemini_util.install_MP_Certs(pruned_MP_Nodes,pKey,mp_blipp_proxycert_file,mp_blipp_proxykey_file) DONE=1 tmp_proxyfiles = [gemini_util.PROXY_CERT,gemini_util.PROXY_KEY,gn_ms_proxycert_file,gn_ms_proxykey_file,mp_blipp_proxycert_file,mp_blipp_proxykey_file] status = gemini_util.delete_all_temp_proxyfiles(tmp_proxyfiles) if(DONE): msg = "Gemini Instrumentize Complete\n Go to the GeniDesktop to login" gemini_util.write_to_log(msg,gemini_util.printtoscreen) gemini_util.closeLogPIPE(LOGFILE)
def main(argv=None): ############################################# # MAIN PROCESS ############################################# other_details = "" managers = [] GN_Nodes = [] MP_Nodes = [] keyfile = "" force_refresh = False FILE = '' AMURNS = '' parser = argparse.ArgumentParser(description='Print Experiment state summary for GeniDesktop in JSON Format') parser.add_argument('-d','--debug',action='store_true',help='Be Verbose') parser.add_argument('--devel',action='store_true',help='Use Development version of GEMINI repository code [only for GEMINI developers]') parser.add_argument('--force_refresh',action='store_true',help='Force fetch all user/slice/sliver info rather than using locally cached version') parser.add_argument('-n','--sliceurn',help='Slice URN of the Slice',required=True) parser.add_argument('-a','--amurns',help='Comma seperated list of AM URNs where the user has slivers for this slice') parser.add_argument('-k','--pkey',help='Your private SSH RSA Key file') parser.add_argument('-f','--certificate',help='Read SSL certificate from file',required=True) parser.add_argument('-p','--passphrase',help='Read passphrase for certificate from file') args = parser.parse_args() LOGFILE = None if (args.debug): gemini_util.debug = True if (args.devel): gemini_util.version = gemini_util.devel_version gemini_util.INSTOOLS_repo_url = gemini_util.mc_repo_rooturl+"GEMINI/"+gemini_util.version+"/" if (args.force_refresh): force_refresh = True if (args.amurns): result = gemini_util.isValidAMURNs(args.amurns) if(result): AMURNS = args.amurns else: print "Invalid AM URNS Provided" parser.print_help() sys.exit(1) if(args.certificate): if ((args.certificate).startswith('~')): gemini_util.CERTIFICATE = (args.certificate).replace('~',expanduser("~"),1) else: gemini_util.CERTIFICATE = args.certificate gemini_util.SLICEURN = args.sliceurn if (not gemini_util.isValidURN(gemini_util.SLICEURN,'slice')): print "Not a valid SliceURN" parser.print_help() sys.exit(1) mylogbase = gemini_util.getLOGBASE(gemini_util.SLICEURN) LOCALTIME = time.strftime("%Y%m%dT%H:%M:%S",time.localtime(time.time())) LOGFILE = mylogbase+"/"+os.path.basename(__file__)+"-"+LOCALTIME+".log" gemini_util.ensure_dir(LOGFILE) gemini_util.openLogPIPE(LOGFILE) if (args.passphrase): if((args.passphrase).startswith('~')): gemini_util.PASSPHRASEFILE = (args.passphrase).replace('~',expanduser("~"),1) else: gemini_util.PASSPHRASEFILE = args.passphrase if (args.pkey): if((args.pkey).startswith('~')): keyfile = (args.pkey).replace('~',expanduser("~"),1) else: keyfile = args.pkey if(not (keyfile != '' and os.path.isfile(keyfile))): print "Please provide a valid private key file" parser.print_help() sys.exit(1) else: SSH_pkey = gemini_util.getPkey(keyfile,"SSH key") if (LOGFILE is None): print "Please provide a slicename" parser.print_help() sys.exit(1) try: cf = open(gemini_util.CERTIFICATE,'r') except: msg = "Error opening Certificate" gemini_util.write_to_log(msg,gemini_util.printtoscreen) sys.exit(1) # Check if passphrase provided is valid # If passphrase is not provided prompt for it. CERT_pkey = gemini_util.getPkey(gemini_util.CERTIFICATE,"certificate") (CERT_ISSUER,username) = gemini_util.getCert_issuer_n_username() if(not (keyfile != '' and os.path.isfile(keyfile))): pKey = CERT_pkey else: pKey = SSH_pkey (UserInfo,Slices,Nodes) = gemini_util.getMyExpInfo(CERT_ISSUER,username,cf.read(),force_refresh,AMURNS) cf.close() username = UserInfo['uid'] email_id = UserInfo['email'] USERURN = UserInfo['userurn'] user_crypt = UserInfo['user_crypt'] framework = UserInfo['framework'] for SliceInfo in Slices: if (gemini_util.SLICEURN == SliceInfo['sliceurn']): found = True break if(not found): msg = "Slice : "+gemini_util.SLICEURN+' does not exists' gemini_util.write_to_log(msg,gemini_util.printtoscreen) sys.exit(1) msg = "Found Slice Info for "+gemini_util.SLICEURN gemini_util.write_to_log(msg,gemini_util.printtoscreen) slice_crypt = SliceInfo['crypt'] if(isinstance(Nodes, basestring)): msg = Nodes+": No Manifest Available for : "+ SliceInfo['sliceurn'] gemini_util.write_to_log(msg,gemini_util.printtoscreen) sys.exit(1) for Node in Nodes: nodeid = Node['nodeid'] hostname = Node['hostname'] ismc = Node['ismc'] login_hostname = Node['login_hostname'] if( Node['login_username'] != username): msg = "Login Username obtained from manifest is "+Node['login_username']+ " for node "+nodeid+". Will change it to "+username+" for GEMINI Instrumentation setup" gemini_util.write_to_log(msg,gemini_util.printtoscreen) Node['login_username'] = username login_username = Node['login_username'] other_members = Node['additional_users'] login_port = Node['login_port'] mchostname = Node['mchostname'] cmurn = Node['cmurn'] gemini_node_type = Node['gemini_node_type'] sliver_id = Node['sliver_id'] if(gemini_node_type == 'global_node'): GN_Nodes.append(Node) elif(gemini_node_type == 'mp_node'): MP_Nodes.append(Node) if(Node['cmurn'] not in managers): managers.append(Node['cmurn']) msg = "*****************************\n"+\ "NodeID => "+nodeid+"\n"+ \ "Hostname =>" +hostname+"\n"+ \ "isMC => "+ismc+"\n"+ \ "Hostname to login => "+login_hostname+"\n"+ \ "Username to login with => "+login_username+"\n"+ \ "SSH port to use for Login => "+login_port+"\n"+ \ "Other members on this Node => "+' , '.join(other_members)+"\n"+ \ "Sliver_id => "+sliver_id+"\n"+ \ "Its CMURN => "+cmurn+"\n"+ \ "Gemini Node Type => "+gemini_node_type+"\n"+ \ "MC Hostname => "+mchostname+"\n"+"**********************" gemini_util.write_to_log(msg,gemini_util.dontprinttoscreen) msg = "***********************************\n"+\ "You have "+str(len(MP_Nodes))+" MP Nodes and "+str(len(GN_Nodes))+" GN Nodes\n"+\ "***********************************\n" gemini_util.write_to_log(msg,gemini_util.printtoscreen) if (len(GN_Nodes) == 0): msg = "No GN Nodes Present. Will not proceed" gemini_util.write_to_log(msg,gemini_util.printtoscreen) sys.exit(1) dpadmin_username = "******" dpadmin_passwd = gemini_util.random_password() m = hashlib.sha1(slice_crypt) user_password_for_drupal = m.hexdigest() proclist = [] for my_manager in managers: msg = "Starting initialization process for Nodes at ["+my_manager+"] " gemini_util.write_to_log(msg,gemini_util.printtoscreen) pruned_GN_Nodes = gemini_util.pruneNodes(GN_Nodes,my_manager,'GN') if (len(pruned_GN_Nodes) == 0): msg = "No GN Nodes Present that monitor MP Nodes at AM = "+my_manager+" . Continuing with the next AM if available" gemini_util.write_to_log(msg,gemini_util.printtoscreen) continue if (len(pruned_GN_Nodes) > 1): msg = "Multiple GN Nodes Present that monitor this AM = "+my_manager+" . This is not supported yet" gemini_util.write_to_log(msg,gemini_util.printtoscreen) sys.exit(1) pruned_MP_Nodes = gemini_util.pruneNodes(MP_Nodes,my_manager,'') p = multiprocessing.Process(target=InitProcess,args=(my_manager,pruned_GN_Nodes,pruned_MP_Nodes,USERURN,email_id,user_password_for_drupal,gemini_util.SLICEURN,dpadmin_username,dpadmin_passwd,slice_crypt,pKey,)) proclist.append(p) p.start() while(True): pending_proclist = [] for i in proclist: if(i.exitcode is None): pending_proclist.append(i) continue elif(i.exitcode != 0): sys.exit(i.exitcode) else: continue if not pending_proclist: break else: proclist = pending_proclist time.sleep(5) pass gemini_util.closeLogPIPE(LOGFILE)