Source code for nvflare.private.fed.utils.fed_utils

# Copyright (c) 2021, NVIDIA CORPORATION.  All rights reserved.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# See the License for the specific language governing permissions and
# limitations under the License.
import importlib
import json
import logging
import logging.config
import os
import pkgutil
import sys
import warnings
from logging.handlers import RotatingFileHandler
from typing import List, Union

from nvflare.apis.app_validation import AppValidator
from nvflare.apis.client import Client
from nvflare.apis.event_type import EventType
from nvflare.apis.fl_component import FLContext
from nvflare.apis.fl_constant import ConfigVarName, FLContextKey, FLMetaKey, SiteType, WorkspaceConstants
from nvflare.apis.fl_exception import UnsafeComponentError
from nvflare.apis.job_def import JobMetaKey
from nvflare.apis.utils.decomposers import flare_decomposers
from nvflare.apis.workspace import Workspace
from nvflare.app_common.decomposers import common_decomposers
from nvflare.fuel.f3.stats_pool import CsvRecordHandler, StatsPoolManager
from nvflare.fuel.sec.audit import AuditService
from nvflare.fuel.sec.authz import AuthorizationService
from nvflare.fuel.sec.security_content_service import LoadResult, SecurityContentService
from nvflare.fuel.utils import fobs
from nvflare.fuel.utils.fobs.fobs import register_custom_folder
from nvflare.private.defs import RequestHeader, SSLConstants
from nvflare.private.event import fire_event
from nvflare.private.fed.utils.decomposers import private_decomposers
from nvflare.private.privacy_manager import PrivacyManager, PrivacyService
from import secure_format_exception
from import EmptyAuthorizer, FLAuthorizer

from ..simulator.simulator_const import SimulatorConstants
from .app_authz import AppAuthzService

[docs]def add_logfile_handler(log_file): root_logger = logging.getLogger() main_handler = root_logger.handlers[0] file_handler = RotatingFileHandler(log_file, maxBytes=20 * 1024 * 1024, backupCount=10) file_handler.setLevel(main_handler.level) file_handler.setFormatter(main_handler.formatter) root_logger.addHandler(file_handler)
def _check_secure_content(site_type: str) -> List[str]: """To check the security contents. Args: site_type (str): "server" or "client" Returns: A list of insecure content. """ if site_type == SiteType.SERVER: config_file_name = WorkspaceConstants.SERVER_STARTUP_CONFIG else: config_file_name = WorkspaceConstants.CLIENT_STARTUP_CONFIG insecure_list = [] data, sig = SecurityContentService.load_json(config_file_name) if sig != LoadResult.OK: insecure_list.append(config_file_name) sites_to_check = data["servers"] if site_type == SiteType.SERVER else [data["client"]] for site in sites_to_check: for filename in [SSLConstants.CERT, SSLConstants.PRIVATE_KEY, SSLConstants.ROOT_CERT]: content, sig = SecurityContentService.load_content(site.get(filename)) if sig != LoadResult.OK: insecure_list.append(site.get(filename)) if WorkspaceConstants.AUTHORIZATION_CONFIG in SecurityContentService.security_content_manager.signature: data, sig = SecurityContentService.load_json(WorkspaceConstants.AUTHORIZATION_CONFIG) if sig != LoadResult.OK: insecure_list.append(WorkspaceConstants.AUTHORIZATION_CONFIG) return insecure_list
[docs]def security_init(secure_train: bool, site_org: str, workspace: Workspace, app_validator: AppValidator, site_type: str): """To check the security content if running in security mode. Args: secure_train (bool): if run in secure mode or not. site_org: organization of the site workspace: the workspace object. app_validator: app validator for application validation site_type (str): server or client. fed_client.json or fed_server.json """ # initialize the SecurityContentService. # must do this before initializing other services since it may be needed by them! startup_dir = workspace.get_startup_kit_dir() SecurityContentService.initialize(content_folder=startup_dir) if secure_train: insecure_list = _check_secure_content(site_type=site_type) if len(insecure_list): print("The following files are not secure content.") for item in insecure_list: print(item) sys.exit(1) # initialize the AuditService, which is used by command processing. # The Audit Service can be used in other places as well. audit_file_name = workspace.get_audit_file_path() AuditService.initialize(audit_file_name) if app_validator: AppAuthzService.initialize(app_validator) # Initialize the AuthorizationService. It is used by command authorization # We use FLAuthorizer for policy processing. # AuthorizationService depends on SecurityContentService to read authorization policy file. authorizer = None if secure_train: policy_file_path = workspace.get_authorization_file_path() if policy_file_path and os.path.exists(policy_file_path): policy_config = json.load(open(policy_file_path, "rt")) authorizer = FLAuthorizer(site_org, policy_config) if not authorizer: authorizer = EmptyAuthorizer() _, err = AuthorizationService.initialize(authorizer) if err: print("AuthorizationService error: {}".format(err)) sys.exit(1)
[docs]def security_close(): AuditService.close()
[docs]def get_job_meta_from_workspace(workspace: Workspace, job_id: str) -> dict: job_meta_file_path = workspace.get_job_meta_path(job_id) with open(job_meta_file_path) as file: return json.load(file)
[docs]def create_job_processing_context_properties(workspace: Workspace, job_id: str) -> dict: job_meta = get_job_meta_from_workspace(workspace, job_id) assert isinstance(job_meta, dict), f"job_meta must be dict but got {type(job_meta)}" scope_name = job_meta.get(JobMetaKey.SCOPE, "") scope_object = PrivacyService.get_scope(scope_name) scope_props = None if scope_object: scope_props = scope_object.props effective_scope_name = else: effective_scope_name = "" return { FLContextKey.JOB_META: job_meta, FLContextKey.JOB_SCOPE_NAME: scope_name, FLContextKey.EFFECTIVE_JOB_SCOPE_NAME: effective_scope_name, FLContextKey.SCOPE_PROPERTIES: scope_props, FLContextKey.SCOPE_OBJECT: scope_object, }
[docs]def find_char_positions(s, ch): return [i for i, c in enumerate(s) if c == ch]
[docs]def configure_logging(workspace: Workspace): log_config_file_path = workspace.get_log_config_file_path() assert os.path.isfile(log_config_file_path), f"missing log config file {log_config_file_path}" logging.config.fileConfig(fname=log_config_file_path, disable_existing_loggers=False)
[docs]def get_scope_info(): try: privacy_manager = PrivacyService.get_manager() scope_names = [] default_scope_name = "" if privacy_manager: assert isinstance(privacy_manager, PrivacyManager) if privacy_manager.name_to_scopes: scope_names = sorted(privacy_manager.name_to_scopes.keys(), reverse=False) if privacy_manager.default_scope: default_scope_name = return scope_names, default_scope_name except: return [], "processing_error"
[docs]def fobs_initialize(workspace: Workspace = None, job_id: str = None): nvflare_fobs_initialize() custom_fobs_initialize(workspace, job_id)
[docs]def custom_fobs_initialize(workspace: Workspace = None, job_id: str = None): if workspace: site_custom_dir = workspace.get_client_custom_dir() decomposer_dir = os.path.join(site_custom_dir, ConfigVarName.DECOMPOSER_MODULE) if os.path.exists(decomposer_dir): register_custom_folder(decomposer_dir) if job_id: app_custom_dir = workspace.get_app_config_dir(job_id) decomposer_dir = os.path.join(app_custom_dir, ConfigVarName.DECOMPOSER_MODULE) if os.path.exists(decomposer_dir): register_custom_folder(decomposer_dir)
[docs]def nvflare_fobs_initialize(): flare_decomposers.register() common_decomposers.register() private_decomposers.register()
[docs]def register_ext_decomposers(decomposer_module: Union[str, List[str]]): if decomposer_module: if isinstance(decomposer_module, str): modules = [decomposer_module] elif isinstance(decomposer_module, list): modules = decomposer_module else: raise TypeError(f"decomposer_module must be str or list of strs but got {type(decomposer_module)}") for module in modules: register_decomposer_module(module)
[docs]def register_decomposer_module(decomposer_module): warnings.filterwarnings("ignore") try: package = importlib.import_module(decomposer_module) for module_info in pkgutil.walk_packages(path=package.__path__, prefix=package.__name__ + "."): if module_info.ispkg: folder_name = module_info.module_finder.path package_name = folder = os.path.join(folder_name, package_name.split(".")[-1]) fobs.register_folder(folder, package_name) except (ModuleNotFoundError, RuntimeError) as e: # logger.warning(f"Could not register decomposers from: {decomposer_module}") pass
[docs]def set_stats_pool_config_for_job(workspace: Workspace, job_id: str, prefix=None): job_meta = get_job_meta_from_workspace(workspace, job_id) config = job_meta.get(JobMetaKey.STATS_POOL_CONFIG) if config: StatsPoolManager.set_pool_config(config) record_file = workspace.get_stats_pool_records_path(job_id, prefix) record_writer = CsvRecordHandler(record_file) StatsPoolManager.set_record_writer(record_writer)
[docs]def create_stats_pool_files_for_job(workspace: Workspace, job_id: str, prefix=None): err = "" summary_file = workspace.get_stats_pool_summary_path(job_id, prefix) try: StatsPoolManager.dump_summary(summary_file) except Exception as e: err = f"Failed to create stats pool summary file {summary_file}: {secure_format_exception(e)}" StatsPoolManager.close() return err
[docs]def split_gpus(gpus) -> [str]: gpus = gpus.replace(" ", "") lefts = find_char_positions(gpus, "[") rights = find_char_positions(gpus, "]") if len(lefts) != len(rights): raise ValueError("brackets not paired") for i in range(len(lefts)): if i > 0 and lefts[i] < rights[i - 1]: raise ValueError("brackets cannot be nested") offset = 0 for i in range(len(lefts)): l: int = lefts[i] - offset r: int = rights[i] - offset if l > r: raise ValueError("brackets not properly paired") if l > 0 and gpus[l - 1] != ",": raise ValueError(f"invalid start of a group: {gpus[l - 1]}") if r < len(gpus) - 1 and gpus[r + 1] != ",": raise ValueError(f"invalid end of a group: {gpus[r + 1]}") g = gpus[l : r + 1] # include both left and right brackets p = g[1:-1].replace(",", "^") gpus = gpus.replace(g, p, 1) # only replace the first occurrence! offset += 2 # everything after the replacement is shifted to left by 2 (since the pair of brackets removed) result = gpus.split(",") result = [g.replace("^", ",") for g in result] return result
[docs]def authorize_build_component(config_dict, config_ctx, node, fl_ctx: FLContext, event_handlers) -> str: workspace = fl_ctx.get_prop(FLContextKey.WORKSPACE_OBJECT) if not workspace: raise RuntimeError("missing workspace object in fl_ctx") job_id = fl_ctx.get_prop(FLContextKey.CURRENT_JOB_ID) if not job_id: raise RuntimeError("missing job id in fl_ctx") meta = get_job_meta_from_workspace(workspace, job_id) fl_ctx.set_prop(FLContextKey.JOB_META, meta, sticky=False, private=True) fl_ctx.set_prop(FLContextKey.COMPONENT_CONFIG, config_dict, sticky=False, private=True) fl_ctx.set_prop(FLContextKey.CONFIG_CTX, config_ctx, sticky=False, private=True) fl_ctx.set_prop(FLContextKey.COMPONENT_NODE, node, sticky=False, private=True) fire_event(EventType.BEFORE_BUILD_COMPONENT, event_handlers, fl_ctx) err = fl_ctx.get_prop(FLContextKey.COMPONENT_BUILD_ERROR) if err: return err # check exceptions exceptions = fl_ctx.get_prop(FLContextKey.EXCEPTIONS) if exceptions and isinstance(exceptions, dict): for handler_name, ex in exceptions.items(): if isinstance(ex, UnsafeComponentError): err = str(ex) if not err: err = f"Unsafe component detected by {handler_name}" return err return ""
[docs]def set_message_security_data(request, job, fl_ctx): request.set_header(RequestHeader.SUBMITTER_NAME, job.meta.get(JobMetaKey.SUBMITTER_NAME)) request.set_header(RequestHeader.SUBMITTER_ORG, job.meta.get(JobMetaKey.SUBMITTER_ORG)) request.set_header(RequestHeader.SUBMITTER_ROLE, job.meta.get(JobMetaKey.SUBMITTER_ROLE)) request.set_header(RequestHeader.USER_NAME, job.meta.get(JobMetaKey.SUBMITTER_NAME)) request.set_header(RequestHeader.USER_ORG, job.meta.get(JobMetaKey.SUBMITTER_ORG)) request.set_header(RequestHeader.USER_ROLE, job.meta.get(JobMetaKey.SUBMITTER_ROLE)) request.set_header(RequestHeader.JOB_META, job.meta)
[docs]def get_target_names(targets): # validate targets target_names = [] for t in targets: if isinstance(t, str): name = t elif isinstance(t, Client): name = else: raise ValueError(f"invalid target in list: got {type(t)}") if not name: # ignore empty name continue if name not in target_names: target_names.append(name) return target_names
[docs]def get_return_code(process, job_id, workspace, logger): run_dir = os.path.join(workspace, job_id) rc_file = os.path.join(run_dir, FLMetaKey.PROCESS_RC_FILE) if os.path.exists(rc_file): try: with open(rc_file, "r") as f: return_code = int(f.readline()) os.remove(rc_file) except Exception: logger.warning( f"Could not get the return_code from {rc_file} of the job:{job_id}, " f"Return the RC from the process:{}" ) return_code = process.poll() else: return_code = process.poll() return return_code
[docs]def get_simulator_app_root(simulator_root, site_name): return os.path.join(simulator_root, site_name, SimulatorConstants.JOB_NAME, "app_" + site_name)