aboutsummaryrefslogtreecommitdiffstats
path: root/osdf/adapters/aaf/sms.py
blob: 9c7af5146206d53da8b47edbe36f30d816237cb1 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
#
# -------------------------------------------------------------------------
#   Copyright (c) 2018 Intel Corporation Intellectual Property
#
#   Licensed under the Apache License, Version 2.0 (the "License");
#   you may not use this file except in compliance with the License.
#   You may obtain a copy of the License at
#
#       http://www.apache.org/licenses/LICENSE-2.0
#
#   Unless required by applicable law or agreed to in writing, software
#   distributed under the License is distributed on an "AS IS" BASIS,
#   WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
#   See the License for the specific language governing permissions and
#   limitations under the License.
#
# -------------------------------------------------------------------------
#

'''Secret Management Service Integration'''

from onapsmsclient import Client

import osdf.config.loader as config_loader
from osdf.config.base import osdf_config
from osdf.logging.osdf_logging import debug_log

config_spec = {
    "preload_secrets": "config/preload_secrets.yaml"
}


def preload_secrets():
    """ This is intended to load the secrets required for testing Application
        Actual deployment will have a preload script. Make sure the config is
        in sync"""
    preload_config = config_loader.load_config_file(
        config_spec.get("preload_secrets"))
    domain = preload_config.get("domain")
    config = osdf_config.deployment
    sms_url = config["aaf_sms_url"]
    timeout = config["aaf_sms_timeout"]
    cacert = config["aaf_ca_certs"]
    sms_client = Client(url=sms_url, timeout=timeout, cacert=cacert)
    domain_uuid = sms_client.createDomain(domain)
    debug_log.debug(
        "Created domain {} with uuid {}".format(domain, domain_uuid))
    secrets = preload_config.get("secrets")
    for secret in secrets:
        sms_client.storeSecret(domain, secret.get('name'),
                               secret.get('values'))
    debug_log.debug("Preload secrets complete")


def retrieve_secrets():
    """Get all secrets under the domain name"""
    secret_dict = dict()
    config = osdf_config.deployment
    sms_url = config["aaf_sms_url"]
    timeout = config["aaf_sms_timeout"]
    cacert = config["aaf_ca_certs"]
    domain = config["secret_domain"]
    sms_client = Client(url=sms_url, timeout=timeout, cacert=cacert)
    secrets = sms_client.getSecretNames(domain)
    for secret in secrets:
        values = sms_client.getSecret(domain, secret)
        secret_dict[secret] = values
    debug_log.debug("Secret Dictionary Retrieval Success")
    return secret_dict


def load_secrets():
    config = osdf_config.deployment
    secret_dict = retrieve_secrets()
    config['soUsername'] = secret_dict['so']['UserName']
    config['soPassword'] = secret_dict['so']['Password']
    config['conductorUsername'] = secret_dict['conductor']['UserName']
    config['conductorPassword'] = secret_dict['conductor']['Password']
    config['policyPlatformUsername'] = secret_dict['policyPlatform']['UserName']
    config['policyPlatformPassword'] = secret_dict['policyPlatform']['Password']
    config['policyClientUsername'] = secret_dict['policyClient']['UserName']
    config['policyClientPassword'] = secret_dict['policyClient']['Password']
    config['messageReaderAafUserId'] = secret_dict['dmaap']['UserName']
    config['messageReaderAafPassword'] = secret_dict['dmaap']['Password']
    config['sdcUsername'] = secret_dict['sdc']['UserName']
    config['sdcPassword'] = secret_dict['sdc']['Password']
    config['osdfPlacementUsername'] = secret_dict['osdfPlacement']['UserName']
    config['osdfPlacementPassword'] = secret_dict['osdfPlacement']['Password']
    config['osdfPlacementSOUsername'] = secret_dict['osdfPlacementSO']['UserName']
    config['osdfPlacementSOPassword'] = secret_dict['osdfPlacementSO']['Password']
    config['osdfPlacementVFCUsername'] = secret_dict['osdfPlacementVFC']['UserName']
    config['osdfPlacementVFCPassword'] = secret_dict['osdfPlacementVFC']['Password']
    config['osdfCMSchedulerUsername'] = secret_dict['osdfCMScheduler']['UserName']
    config['osdfCMSchedulerPassword'] = secret_dict['osdfCMScheduler']['Password']
    config['configDbUserName'] = secret_dict['configDb']['UserName']
    config['configDbPassword'] = secret_dict['configDb']['Password']
    config['pciHMSUsername'] = secret_dict['pciHMS']['UserName']
    config['pciHMSPassword'] = secret_dict['pciHMS']['Password']
    config['osdfPCIOptUsername'] = secret_dict['osdfPCIOpt']['UserName']
    config['osdfPCIOptPassword'] = secret_dict['osdfPCIOpt']['Password']


def delete_secrets():
    """ This is intended to delete the secrets for a clean initialization for
        testing Application. Actual deployment will have a preload script.
        Make sure the config is in sync"""
    config = osdf_config.deployment
    sms_url = config["aaf_sms_url"]
    timeout = config["aaf_sms_timeout"]
    cacert = config["aaf_ca_certs"]
    domain = config["secret_domain"]
    sms_client = Client(url=sms_url, timeout=timeout, cacert=cacert)
    ret_val = sms_client.deleteDomain(domain)
    debug_log.debug("Clean up complete")
    return ret_val


if __name__ == "__main__":
    # Initialize Secrets from SMS
    preload_secrets()

    # Retrieve Secrets from SMS and load to secret cache
    # Use the secret_cache instead of config files
    secret_cache = retrieve_secrets()

    # Clean up Delete secrets and domain
    delete_secrets()