2 from types import StringTypes
3 from collections import defaultdict
5 from sfa.util.sfatime import utcparse, datetime_to_epoch
6 from sfa.util.sfalogging import logger
7 from sfa.util.xrn import Xrn, get_leaf, get_authority, urn_to_hrn
8 from sfa.rspecs.rspec import RSpec
9 from sfa.planetlab.vlink import VLink
10 from sfa.planetlab.topology import Topology
11 from sfa.planetlab.plxrn import PlXrn, hrn_to_pl_slicename, xrn_to_hostname, xrn_to_ext_slicename, hrn_to_ext_loginbase, top_auth
12 from sfa.storage.model import SliverAllocation
18 rspec_to_slice_tag = {'max_rate':'net_max_rate'}
20 def __init__(self, driver):
23 def get_slivers(self, xrn, node=None):
24 hrn, type = urn_to_hrn(xrn)
26 slice_name = hrn_to_pl_slicename(hrn)
27 # XX Should we just call PLCAPI.GetSliceTicket(slice_name) instead
28 # of doing all of this?
29 #return self.driver.shell.GetSliceTicket(self.auth, slice_name)
31 # from PLCAPI.GetSlivers.get_slivers()
32 slice_fields = ['slice_id', 'name', 'instantiation', 'expires', 'person_ids', 'slice_tag_ids']
33 slices = self.driver.shell.GetSlices(slice_name, slice_fields)
34 # Build up list of users and slice attributes
36 all_slice_tag_ids = set()
38 person_ids.update(slice['person_ids'])
39 all_slice_tag_ids.update(slice['slice_tag_ids'])
40 person_ids = list(person_ids)
41 all_slice_tag_ids = list(all_slice_tag_ids)
42 # Get user information
43 all_persons_list = self.driver.shell.GetPersons({'person_id':person_ids,'enabled':True}, ['person_id', 'enabled', 'key_ids'])
45 for person in all_persons_list:
46 all_persons[person['person_id']] = person
48 # Build up list of keys
50 for person in all_persons.values():
51 key_ids.update(person['key_ids'])
52 key_ids = list(key_ids)
53 # Get user account keys
54 all_keys_list = self.driver.shell.GetKeys(key_ids, ['key_id', 'key', 'key_type'])
56 for key in all_keys_list:
57 all_keys[key['key_id']] = key
58 # Get slice attributes
59 all_slice_tags_list = self.driver.shell.GetSliceTags(all_slice_tag_ids)
61 for slice_tag in all_slice_tags_list:
62 all_slice_tags[slice_tag['slice_tag_id']] = slice_tag
67 for person_id in slice['person_ids']:
68 if person_id in all_persons:
69 person = all_persons[person_id]
70 if not person['enabled']:
72 for key_id in person['key_ids']:
73 if key_id in all_keys:
74 key = all_keys[key_id]
75 keys += [{'key_type': key['key_type'],
78 # All (per-node and global) attributes for this slice
80 for slice_tag_id in slice['slice_tag_ids']:
81 if slice_tag_id in all_slice_tags:
82 slice_tags.append(all_slice_tags[slice_tag_id])
83 # Per-node sliver attributes take precedence over global
84 # slice attributes, so set them first.
85 # Then comes nodegroup slice attributes
86 # Followed by global slice attributes
87 sliver_attributes = []
90 for sliver_attribute in filter(lambda a: a['node_id'] == node['node_id'], slice_tags):
91 sliver_attributes.append(sliver_attribute['tagname'])
92 attributes.append({'tagname': sliver_attribute['tagname'],
93 'value': sliver_attribute['value']})
95 # set nodegroup slice attributes
96 for slice_tag in filter(lambda a: a['nodegroup_id'] in node['nodegroup_ids'], slice_tags):
97 # Do not set any nodegroup slice attributes for
98 # which there is at least one sliver attribute
100 if slice_tag not in slice_tags:
101 attributes.append({'tagname': slice_tag['tagname'],
102 'value': slice_tag['value']})
104 for slice_tag in filter(lambda a: a['node_id'] is None, slice_tags):
105 # Do not set any global slice attributes for
106 # which there is at least one sliver attribute
108 if slice_tag['tagname'] not in sliver_attributes:
109 attributes.append({'tagname': slice_tag['tagname'],
110 'value': slice_tag['value']})
112 # XXX Sanity check; though technically this should be a system invariant
113 # checked with an assertion
114 if slice['expires'] > MAXINT: slice['expires']= MAXINT
118 'name': slice['name'],
119 'slice_id': slice['slice_id'],
120 'instantiation': slice['instantiation'],
121 'expires': slice['expires'],
123 'attributes': attributes
128 def get_peer(self, xrn):
129 hrn, type = urn_to_hrn(xrn)
130 # Becaues of myplc federation, we first need to determine if this
131 # slice belongs to out local plc or a myplc peer. We will assume it
132 # is a local site, unless we find out otherwise
135 # get this slice's authority (site)
136 slice_authority = get_authority(hrn)
138 # get this site's authority (sfa root authority or sub authority)
139 site_authority = get_authority(slice_authority).lower()
141 # check if we are already peered with this site_authority, if so
142 peers = self.driver.shell.GetPeers({}, ['peer_id', 'peername', 'shortname', 'hrn_root'])
143 for peer_record in peers:
144 names = [name.lower() for name in peer_record.values() if isinstance(name, StringTypes)]
145 if site_authority in names:
150 def get_sfa_peer(self, xrn):
151 hrn, type = urn_to_hrn(xrn)
153 # return the authority for this hrn or None if we are the authority
155 slice_authority = get_authority(hrn)
156 site_authority = get_authority(slice_authority)
158 if site_authority != self.driver.hrn:
159 sfa_peer = site_authority
163 def verify_slice_leases(self, slice, rspec_requested_leases, peer):
165 leases = self.driver.shell.GetLeases({'name':slice['name'], 'clip':int(time.time())}, ['lease_id','name', 'hostname', 't_from', 't_until'])
166 grain = self.driver.shell.GetLeaseGranularity()
168 requested_leases = []
169 for lease in rspec_requested_leases:
171 slice_hrn, _ = urn_to_hrn(lease['slice_id'])
172 top_auth_hrn = top_auth(slice_hrn)
173 if top_auth_hrn == self.driver.hrn:
174 slice_name = hrn_to_pl_slicename(lease['slice_id'])
176 slice_name = xrn_to_ext_slicename(lease['slice_id'])
177 if slice_name != slice['name']:
179 elif Xrn(lease['component_id']).get_authority_urn().split(':')[0] != self.driver.hrn:
182 hostname = xrn_to_hostname(lease['component_id'])
183 # fill the requested node with nitos ids
184 requested_lease['name'] = slice['name']
185 requested_lease['hostname'] = hostname
186 requested_lease['t_from'] = int(lease['start_time'])
187 requested_lease['t_until'] = int(lease['duration']) * grain + int(lease['start_time'])
188 requested_leases.append(requested_lease)
192 # prepare actual slice leases by lease_id
195 leases_by_id[lease['lease_id']] = {'name': lease['name'], 'hostname': lease['hostname'], \
196 't_from': lease['t_from'], 't_until': lease['t_until']}
200 deleted_leases_id = []
201 for lease_id in leases_by_id:
202 if leases_by_id[lease_id] not in requested_leases:
203 deleted_leases_id.append(lease_id)
205 kept_leases_id.append(lease_id)
206 requested_leases.remove(leases_by_id[lease_id])
207 added_leases = requested_leases
212 self.driver.shell.UnBindObjectFromPeer('slice', slice['slice_id'], peer['shortname'])
213 self.driver.shell.DeleteLeases(deleted_leases_id)
214 for lease in added_leases:
215 self.driver.shell.AddLeases(lease['hostname'], slice['name'], lease['t_from'], lease['t_until'])
218 logger.log_exc('Failed to add/remove slice leases')
223 def verify_slice_nodes(self, slice_urn, slice, rspec_nodes, peer):
226 for node in rspec_nodes:
227 hostname = node.get('component_name')
228 client_id = node.get('client_id')
229 component_id = node.get('component_id').strip()
231 hostname = hostname.strip()
233 hostname = xrn_to_hostname(component_id)
235 slivers[hostname] = {'client_id': client_id, 'component_id': component_id}
237 nodes = self.driver.shell.GetNodes(slice['node_ids'], ['node_id', 'hostname', 'interface_ids'])
238 current_slivers = [node['hostname'] for node in nodes]
240 # remove nodes not in rspec
241 deleted_nodes = list(set(current_slivers).difference(slivers.keys()))
243 # add nodes from rspec
244 added_nodes = list(set(slivers.keys()).difference(current_slivers))
248 self.driver.shell.UnBindObjectFromPeer('slice', slice['slice_id'], peer['shortname'])
249 self.driver.shell.AddSliceToNodes(slice['name'], added_nodes)
250 self.driver.shell.DeleteSliceFromNodes(slice['name'], deleted_nodes)
253 logger.log_exc('Failed to add/remove slice from nodes')
255 slices = self.driver.shell.GetSlices(slice['name'], ['node_ids'])
256 resulting_nodes = self.driver.shell.GetNodes(slices[0]['node_ids'])
258 # update sliver allocations
259 for node in resulting_nodes:
260 client_id = slivers[node['hostname']]['client_id']
261 component_id = slivers[node['hostname']]['component_id']
262 sliver_hrn = '%s.%s-%s' % (self.driver.hrn, slice['slice_id'], node['node_id'])
263 sliver_id = Xrn(sliver_hrn, type='sliver').urn
264 record = SliverAllocation(sliver_id=sliver_id, client_id=client_id,
265 component_id=component_id,
266 slice_urn = slice_urn,
267 allocation_state='geni_allocated')
268 record.sync(self.driver.api.dbsession)
269 return resulting_nodes
271 def free_egre_key(self):
273 for tag in self.driver.shell.GetSliceTags({'tagname': 'egre_key'}):
274 used.add(int(tag['value']))
276 for i in range(1, 256):
281 raise KeyError("No more EGRE keys available")
285 def verify_slice_links(self, slice, requested_links, nodes):
287 if not requested_links:
290 # exit if links are not supported here
291 topology = Topology()
295 # build dict of nodes
299 nodes_dict[node['node_id']] = node
300 interface_ids.extend(node['interface_ids'])
301 # build dict of interfaces
302 interfaces = self.driver.shell.GetInterfaces(interface_ids)
304 for interface in interfaces:
305 interfaces_dict[interface['interface_id']] = interface
310 slice_tags.append({'name': 'egre_key', 'value': self.free_egre_key()})
313 slice_tags.append({'name': 'netns', 'value': '1'})
316 # need to update the attribute string?
317 slice_tags.append({'name': 'capabilities', 'value': 'CAP_NET_ADMIN'})
319 for link in requested_links:
320 # get the ip address of the first node in the link
321 ifname1 = Xrn(link['interface1']['component_id']).get_leaf()
322 ifname_parts = ifname1.split(':')
323 node_raw = ifname_parts[0]
325 if len(ifname_parts) > 1:
326 device = ifname_parts[1]
327 node_id = int(node_raw.replace('node', ''))
328 node = nodes_dict[node_id]
329 if1 = interfaces_dict[node['interface_ids'][0]]
331 topo_rspec = VLink.get_topo_rspec(link, ipaddr)
333 slice_tags.append({'name': 'topo_rspec', 'value': str([topo_rspec]), 'node_id': node_id})
335 slice_tags.append({'name': 'vini_topo', 'value': 'manual', 'node_id': node_id})
336 #self.driver.shell.AddSliceTag(slice['name'], 'topo_rspec', str([topo_rspec]), node_id)
338 self.verify_slice_attributes(slice, slice_tags, {'append': True}, admin=True)
342 def handle_peer(self, site, slice, persons, peer):
347 self.driver.shell.BindObjectToPeer('site', site['site_id'], peer['shortname'], slice['site_id'])
349 self.driver.shell.DeleteSite(site['site_id'])
355 self.driver.shell.BindObjectToPeer('slice', slice['slice_id'], peer['shortname'], slice['slice_id'])
357 self.driver.shell.DeleteSlice(slice['slice_id'])
361 for person in persons:
363 self.driver.shell.BindObjectToPeer('person',
364 person['person_id'], peer['shortname'], person['peer_person_id'])
366 for (key, remote_key_id) in zip(person['keys'], person['key_ids']):
368 self.driver.shell.BindObjectToPeer( 'key', key['key_id'], peer['shortname'], remote_key_id)
370 self.driver.shell.DeleteKey(key['key_id'])
371 logger("failed to bind key: %s to peer: %s " % (key['key_id'], peer['shortname']))
373 self.driver.shell.DeletePerson(person['person_id'])
378 def verify_site(self, slice_xrn, slice_record={}, peer=None, sfa_peer=None, options={}):
379 (slice_hrn, type) = urn_to_hrn(slice_xrn)
380 top_auth_hrn = top_auth(slice_hrn)
381 if top_auth_hrn == self.driver.hrn:
382 # login base can't be longer than 20 characters
383 slicename = hrn_to_pl_slicename(slice_hrn)
384 authority_name = slicename.split('_')[0]
385 login_base = authority_name[:20]
387 login_base = hrn_to_ext_loginbase(slice_hrn)
388 authority_name = login_base
390 sites = self.driver.shell.GetSites(login_base)
392 # create new site record
393 site = {'name': 'sfa.%s' % authority_name,
394 'abbreviated_name': authority_name,
395 'login_base': login_base,
399 'peer_site_id': None}
401 site['peer_site_id'] = slice_record.get('site_id', None)
402 site['site_id'] = self.driver.shell.AddSite(site)
403 # exempt federated sites from monitor policies
404 self.driver.shell.AddSiteTag(site['site_id'], 'exempt_site_until', "20200101")
406 # # is this still necessary?
407 # # add record to the local registry
408 # if sfa_peer and slice_record:
409 # peer_dict = {'type': 'authority', 'hrn': site_hrn, \
410 # 'peer_authority': sfa_peer, 'pointer': site['site_id']}
411 # self.registry.register_peer_object(self.credential, peer_dict)
415 # unbind from peer so we can modify if necessary. Will bind back later
416 self.driver.shell.UnBindObjectFromPeer('site', site['site_id'], peer['shortname'])
421 def verify_slice(self, slice_hrn, slice_record, peer, sfa_peer, expiration, options={}):
422 top_auth_hrn = top_auth(slice_hrn)
423 if top_auth_hrn == self.driver.hrn:
424 slicename = hrn_to_pl_slicename(slice_hrn)
425 parts = slicename.split("_")
426 login_base = parts[0]
428 login_base = hrn_to_ext_loginbase(slice_hrn)
429 slicename = xrn_to_ext_slicename(slice_hrn)
431 slices = self.driver.shell.GetSlices([slicename])
432 expires = int(datetime_to_epoch(utcparse(expiration)))
434 slice = {'name': slicename,
435 'url': slice_record.get('url', slice_hrn),
436 'description': slice_record.get('description', slice_hrn)}
438 slice['slice_id'] = self.driver.shell.AddSlice(slice)
439 slice['node_ids'] = []
440 slice['person_ids'] = []
442 self.driver.shell.SetSliceHrn(int(slice['slice_id']), slice_hrn)
444 if peer and slice_record:
445 slice['peer_slice_id'] = slice_record.get('slice_id', None)
447 self.driver.shell.UpdateSlice(slice['slice_id'], {'expires': expires})
451 if self.driver.shell.GetSliceHrn(slice['slice_id']) != slice_hrn:
452 self.driver.shell.SetSliceHrn(slice['slice_id'], slice_hrn)
454 if peer and slice_record:
455 slice['peer_slice_id'] = slice_record.get('slice_id', None)
456 # unbind from peer so we can modify if necessary. Will bind back later
457 self.driver.shell.UnBindObjectFromPeer('slice', slice['slice_id'], peer['shortname'])
459 #Update expiration if necessary
460 if slice['expires'] != expires:
461 self.driver.shell.UpdateSlice( slice['slice_id'], {'expires' : expires})
465 #def get_existing_persons(self, users):
466 def verify_persons(self, slice_hrn, slice_record, users, peer, sfa_peer, options={}):
468 users_by_site = defaultdict(list)
471 user['urn'] = user['urn'].lower()
472 hrn, type = urn_to_hrn(user['urn'])
473 username = get_leaf(hrn)
474 user['username'] = username
476 top_auth_hrn = top_auth(hrn)
478 if top_auth_hrn == self.driver.hrn:
479 login_base = PlXrn(xrn=user['urn']).pl_login_base()
481 login_base = hrn_to_ext_loginbase(hrn)
483 user['site'] = login_base
485 user['email'] = user['email'].lower()
486 users_by_email[user['email']] = user
487 users_dict[user['email']] = user
489 users_by_site[user['site']].append(user)
491 # start building a list of existing users
492 existing_user_ids = []
493 existing_user_ids_filter = []
495 existing_user_ids_filter.extend(users_by_email.keys())
497 for login_base in users_by_site:
498 users = users_by_site[login_base]
500 existing_user_ids_filter.append(user['username']+'@geni.net')
502 if existing_user_ids_filter:
503 # get existing users by email
504 existing_users = self.driver.shell.GetPersons({'email': existing_user_ids_filter},
505 ['person_id', 'key_ids', 'email'])
506 existing_user_ids.extend([user['email'] for user in existing_users])
509 # get a list of user sites (based on requeste user urns
510 site_list = self.driver.shell.GetSites(users_by_site.keys(), \
511 ['site_id', 'login_base', 'person_ids'])
512 # get all existing users at these sites
515 for site in site_list:
516 sites[site['site_id']] = site
517 site_user_ids.extend(site['person_ids'])
519 existing_site_persons_list = self.driver.shell.GetPersons(site_user_ids,
520 ['person_id', 'key_ids', 'email', 'site_ids'])
522 # all requested users are either existing users or new (added) users
523 for login_base in users_by_site:
524 requested_site_users = users_by_site[login_base]
525 for requested_user in requested_site_users:
527 for existing_user in existing_site_persons_list:
528 for site_id in existing_user['site_ids']:
530 site = sites[site_id]
531 if login_base == site['login_base'] and \
532 existing_user['email'].startswith(requested_user['username']+'@'):
533 existing_user_ids.append(existing_user['email'])
534 requested_user['email'] = existing_user['email']
535 users_dict[existing_user['email']] = requested_user
541 if user_found == False:
542 fake_email = requested_user['username'] + '@geni.net'
543 requested_user['email'] = fake_email
544 users_dict[fake_email] = requested_user
546 # requested slice users
547 requested_user_ids = users_dict.keys()
548 # existing slice users
549 existing_slice_users_filter = {'person_id': slice_record.get('person_ids', [])}
550 existing_slice_users = self.driver.shell.GetPersons(existing_slice_users_filter,
551 ['person_id', 'key_ids', 'email'])
552 existing_slice_user_ids = [user['email'] for user in existing_slice_users]
554 # users to be added, removed or updated
555 added_user_ids = set(requested_user_ids).difference(existing_user_ids)
556 added_slice_user_ids = set(requested_user_ids).difference(existing_slice_user_ids)
557 removed_user_ids = set(existing_slice_user_ids).difference(requested_user_ids)
558 updated_user_ids = set(existing_slice_user_ids).intersection(requested_user_ids)
560 # Remove stale users (only if we are not appending).
562 append = options.get('append', True)
564 for removed_user_id in removed_user_ids:
565 self.driver.shell.DeletePersonFromSlice(removed_user_id, slice_record['name'])
566 # update_existing users
567 updated_users_list = [user for user in users_dict.values() if user['email'] in \
569 self.verify_keys(existing_slice_users, updated_users_list, peer, options)
573 for added_user_id in added_user_ids:
574 added_user = users_dict[added_user_id]
575 hrn, type = urn_to_hrn(added_user['urn'])
577 'first_name': added_user.get('first_name', hrn),
578 'last_name': added_user.get('last_name', hrn),
579 'email': added_user_id,
580 #'peer_person_id': None,
582 #'key_ids': added_user.get('key_ids', []),
584 person['person_id'] = self.driver.shell.AddPerson(person)
585 self.driver.shell.AddRoleToPerson('user', int(person['person_id']))
587 if self.driver.shell.GetPersonHrn(int(person['person_id'])) != hrn:
588 self.driver.shell.SetPersonHrn(int(person['person_id']), hrn)
591 person['peer_person_id'] = added_user['person_id']
592 added_persons.append(person)
595 self.driver.shell.UpdatePerson(person['person_id'], {'enabled': True})
598 self.driver.shell.AddPersonToSite(added_user_id, added_user['site'])
600 for key_string in added_user.get('keys', []):
601 key = {'key':key_string, 'key_type':'ssh'}
602 key['key_id'] = self.driver.shell.AddPersonKey(person['person_id'], key)
603 if 'keys' not in person:
605 person['keys'].append(key)
607 # add the registry record
609 # peer_dict = {'type': 'user', 'hrn': hrn, 'peer_authority': sfa_peer, \
610 # 'pointer': person['person_id']}
611 # self.registry.register_peer_object(self.credential, peer_dict)
613 for added_slice_user_id in added_slice_user_ids.union(added_user_ids):
614 # add person to the slice
615 self.driver.shell.AddPersonToSlice(added_slice_user_id, slice_record['name'])
616 # if this is a peer record then it should already be bound to a peer.
617 # no need to return worry about it getting bound later
622 def verify_keys(self, persons, users, peer, options={}):
625 for person in persons:
626 key_ids.extend(person['key_ids'])
627 keylist = self.driver.shell.GetKeys(key_ids, ['key_id', 'key'])
630 keydict[key['key']] = key['key_id']
631 existing_keys = keydict.keys()
633 for person in persons:
634 persondict[person['email']] = person
640 user_keys = user.get('keys', [])
641 updated_persons.append(user)
642 for key_string in user_keys:
643 requested_keys.append(key_string)
644 if key_string not in existing_keys:
645 key = {'key': key_string, 'key_type': 'ssh'}
648 person = persondict[user['email']]
649 self.driver.shell.UnBindObjectFromPeer('person', person['person_id'], peer['shortname'])
650 key['key_id'] = self.driver.shell.AddPersonKey(user['email'], key)
652 key_index = user_keys.index(key['key'])
653 remote_key_id = user['key_ids'][key_index]
654 self.driver.shell.BindObjectToPeer('key', key['key_id'], peer['shortname'], remote_key_id)
658 self.driver.shell.BindObjectToPeer('person', person['person_id'], peer['shortname'], user['person_id'])
660 # remove old keys (only if we are not appending)
661 append = options.get('append', True)
663 removed_keys = set(existing_keys).difference(requested_keys)
664 for existing_key_id in keydict:
665 if keydict[existing_key_id] in removed_keys:
668 self.driver.shell.UnBindObjectFromPeer('key', existing_key_id, peer['shortname'])
669 self.driver.shell.DeleteKey(existing_key_id)
673 def verify_slice_attributes(self, slice, requested_slice_attributes, options={}, admin=False):
674 append = options.get('append', True)
675 # get list of attributes users ar able to manage
676 filter = {'category': '*slice*'}
678 filter['|roles'] = ['user']
679 slice_attributes = self.driver.shell.GetTagTypes(filter)
680 valid_slice_attribute_names = [attribute['tagname'] for attribute in slice_attributes]
682 # get sliver attributes
683 added_slice_attributes = []
684 removed_slice_attributes = []
685 ignored_slice_attribute_names = []
686 existing_slice_attributes = self.driver.shell.GetSliceTags({'slice_id': slice['slice_id']})
688 # get attributes that should be removed
689 for slice_tag in existing_slice_attributes:
690 if slice_tag['tagname'] in ignored_slice_attribute_names:
691 # If a slice already has a admin only role it was probably given to them by an
692 # admin, so we should ignore it.
693 ignored_slice_attribute_names.append(slice_tag['tagname'])
695 # If an existing slice attribute was not found in the request it should
697 attribute_found=False
698 for requested_attribute in requested_slice_attributes:
699 if requested_attribute['name'] == slice_tag['tagname'] and \
700 requested_attribute['value'] == slice_tag['value']:
704 if not attribute_found and not append:
705 removed_slice_attributes.append(slice_tag)
707 # get attributes that should be added:
708 for requested_attribute in requested_slice_attributes:
709 # if the requested attribute wasn't found we should add it
710 if requested_attribute['name'] in valid_slice_attribute_names:
711 attribute_found = False
712 for existing_attribute in existing_slice_attributes:
713 if requested_attribute['name'] == existing_attribute['tagname'] and \
714 requested_attribute['value'] == existing_attribute['value']:
717 if not attribute_found:
718 added_slice_attributes.append(requested_attribute)
721 # remove stale attributes
722 for attribute in removed_slice_attributes:
724 self.driver.shell.DeleteSliceTag(attribute['slice_tag_id'])
726 logger.warn('Failed to remove sliver attribute. name: %s, value: %s, node_id: %s\nCause:%s'\
727 % (slice['name'], attribute['value'], attribute.get('node_id'), str(e)))
729 # add requested_attributes
730 for attribute in added_slice_attributes:
732 self.driver.shell.AddSliceTag(slice['name'], attribute['name'], attribute['value'], attribute.get('node_id', None))
734 logger.warn('Failed to add sliver attribute. name: %s, value: %s, node_id: %s\nCause:%s'\
735 % (slice['name'], attribute['value'], attribute.get('node_id'), str(e)))