c45a6a41100e64ead9f702c2393b0dc9485688e8
[sfa.git] / sfa / senslab / slabslices.py
1 from sfa.util.xrn import get_authority, urn_to_hrn
2 from sfa.util.sfalogging import logger
3
4
5 MAXINT =  2L**31-1
6
7 class SlabSlices:
8
9     rspec_to_slice_tag = {'max_rate':'net_max_rate'}
10
11     #def __init__(self, api, ttl = .5, origin_hrn=None):
12         #self.api = api
13         ##filepath = path + os.sep + filename
14         #self.policy = Policy(self.api)    
15         #self.origin_hrn = origin_hrn
16         #self.registry = api.registries[api.hrn]
17         #self.credential = api.getCredential()
18         #self.nodes = []
19         #self.persons = []
20
21
22     def __init__(self, driver):
23         self.driver = driver
24         
25     ##Used in SFACE?    
26     #def get_slivers(self, xrn, node=None):
27         #hrn, hrn_type = urn_to_hrn(xrn)
28          
29         #slice_name = hrn_to_pl_slicename(hrn)
30         ## XX Should we just call PLCAPI.GetSliceTicket(slice_name) instead
31         ## of doing all of this?
32         ##return self.api.driver.GetSliceTicket(self.auth, slice_name) 
33         
34
35        
36         #sfa_slice = self.driver.GetSlices(slice_filter = slice_name, \
37         #                                   slice_filter_type = 'slice_hrn')
38  
39
40         ## Get user information
41         ##TODO
42         #alchemy_person = dbsession.query(RegRecord).filter_by(record_id = \
43                                         #sfa_slice['record_id_user']).first()
44
45         #slivers = []
46         #sliver_attributes = []
47             
48         #if sfa_slice['oar_job_id'] is not -1:
49             #nodes_all = self.driver.GetNodes({'hostname': \
50                                                     #sfa_slice['node_ids']},
51                             #['node_id', 'hostname','site','boot_state'])
52             #nodeall_byhostname = dict([(n['hostname'], n) for n in nodes_all])
53             #nodes = sfa_slice['node_ids']
54             
55             #for node in nodes:
56                 ##for sliver_attribute in filter(lambda a: a['node_id'] == \
57                                                 #node['node_id'], slice_tags):
58                 #sliver_attribute['tagname'] = 'slab-tag'
59                 #sliver_attribute['value'] = 'slab-value'
60                 #sliver_attributes.append(sliver_attribute['tagname'])
61                 #attributes.append({'tagname': sliver_attribute['tagname'],
62                                     #'value': sliver_attribute['value']})
63
64             ## set nodegroup slice attributes
65             #for slice_tag in filter(lambda a: a['nodegroup_id'] \
66                                         #in node['nodegroup_ids'], slice_tags):
67                 ## Do not set any nodegroup slice attributes for
68                 ## which there is at least one sliver attribute
69                 ## already set.
70                 #if slice_tag not in slice_tags:
71                     #attributes.append({'tagname': slice_tag['tagname'],
72                         #'value': slice_tag['value']})
73
74             #for slice_tag in filter(lambda a: a['node_id'] is None, \
75                                                             #slice_tags):
76                 ## Do not set any global slice attributes for
77                 ## which there is at least one sliver attribute
78                 ## already set.
79                 #if slice_tag['tagname'] not in sliver_attributes:
80                     #attributes.append({'tagname': slice_tag['tagname'],
81                                    #'value': slice_tag['value']})
82
83             ## XXX Sanity check; though technically this should 
84             ## be a system invariant
85             ## checked with an assertion
86             #if sfa_slice['expires'] > MAXINT:  sfa_slice['expires']= MAXINT
87             
88             #slivers.append({
89                 #'hrn': hrn,
90                 #'name': sfa_slice['name'],
91                 #'slice_id': sfa_slice['slice_id'],
92                 #'instantiation': sfa_slice['instantiation'],
93                 #'expires': sfa_slice['expires'],
94                 #'keys': keys,
95                 #'attributes': attributes
96             #})
97
98         #return slivers
99         
100         
101         
102
103
104         #return slivers
105     def get_peer(self, xrn):
106         hrn, hrn_type = urn_to_hrn(xrn)
107         #Does this slice belong to a local site or a peer senslab site?
108         peer = None
109         
110         # get this slice's authority (site)
111         slice_authority = get_authority(hrn)
112         site_authority = slice_authority
113         # get this site's authority (sfa root authority or sub authority)
114         #site_authority = get_authority(slice_authority).lower()
115         logger.debug("SLABSLICES \ get_peer slice_authority  %s \
116                     site_authority %s hrn %s" %(slice_authority, \
117                                         site_authority, hrn))
118         # check if we are already peered with this site_authority, if so
119         #peers = self.driver.GetPeers({})  
120         peers = self.driver.GetPeers(peer_filter = slice_authority)
121         for peer_record in peers:
122           
123             if site_authority == peer_record.hrn:
124                 peer = peer_record
125         logger.debug(" SLABSLICES \tget_peer peer  %s " %(peer))
126         return peer
127
128     def get_sfa_peer(self, xrn):
129         hrn, hrn_type = urn_to_hrn(xrn)
130
131         # return the authority for this hrn or None if we are the authority
132         sfa_peer = None
133         slice_authority = get_authority(hrn)
134         site_authority = get_authority(slice_authority)
135
136         if site_authority != self.driver.hrn:
137             sfa_peer = site_authority
138
139         return sfa_peer
140         
141         
142     def verify_slice_leases(self, sfa_slice, requested_jobs_dict, kept_leases, \
143         peer):
144
145        
146         #First get the list of current leases from OAR  
147         leases = self.driver.GetLeases({'name':sfa_slice['name']}, ['lease_id'])
148         if leases : 
149             current_leases = [lease['lease_id'] for lease in leases]
150             #Deleted leases are the ones with lease id not declared in the Rspec
151             deleted_leases = list(set(current_leases).difference(kept_leases))
152     
153             try:
154                 if peer:
155                     #peer = RegAuyhority object is unsubscriptable
156                     #TODO :UnBindObjectFromPeer Quick and dirty auth='senslab2 SA 27/07/12
157                     self.driver.UnBindObjectFromPeer('senslab2', 'slice', \
158                                     sfa_slice['record_id_slice'], peer.hrn)
159                 
160                 deleted = self.driver.DeleteLeases(deleted_leases, \
161                                         sfa_slice['name'])
162                
163             #TODO : catch other exception?
164             except KeyError: 
165                 logger.log_exc('Failed to add/remove slice leases')
166                 
167         #Add new leases        
168         for start_time in requested_jobs_dict:
169             job = requested_jobs_dict[start_time]
170             added = self.driver.AddLeases(job['hostname'], \
171                         sfa_slice, int(job['start_time']), \
172                         int(job['duration']))
173                         
174         return leases
175
176     def verify_slice_nodes(self, sfa_slice, requested_slivers, peer):
177         current_slivers = []
178         deleted_nodes = []
179         
180         if sfa_slice['node_ids']:
181             nodes = self.driver.GetNodes(sfa_slice['node_ids'], ['hostname'])
182             current_slivers = [node['hostname'] for node in nodes]
183     
184             # remove nodes not in rspec
185             deleted_nodes = list(set(current_slivers).\
186                                                 difference(requested_slivers))
187     
188         # add nodes from rspec
189         added_nodes = list(set(requested_slivers).difference(current_slivers))
190         try:
191             #if peer:
192                 #self.driver.UnBindObjectFromPeer('slice', slice['slice_id'], \
193                                                         #peer['shortname'])
194             #PI is a list, get the only username in this list
195             #so that the OAR/LDAP knows the user: 
196             #remove the authority from the name
197             tmp = sfa_slice['PI'][0].split(".")
198             username = tmp[(len(tmp)-1)]
199             #Update the table with the nodes that populate the slice
200             self.driver.db.update_job(sfa_slice['name'], nodes = added_nodes)
201             logger.debug("SLABSLICES \tverify_slice_nodes slice %s \r\n \r\n deleted_nodes %s"\
202                                                              %(sfa_slice,deleted_nodes))
203             #If there is a timeslot specified, then a job can be launched
204             #try:
205                 ##slot = sfa_slice['timeslot']
206                 #self.driver.LaunchExperimentOnOAR(sfa_slice, added_nodes, \
207                                                                     #username)
208             #except KeyError:  
209                 #logger.log_exc("SLABSLICES \verify_slice_nodes KeyError \
210                                                 #sfa_slice %s  " %(sfa_slice))
211
212
213             if deleted_nodes:
214                 self.driver.DeleteSliceFromNodes(sfa_slice['name'], \
215                                                                 deleted_nodes)
216
217         except: 
218             logger.log_exc('Failed to add/remove slice from nodes')
219             
220
221     def free_egre_key(self):
222         used = set()
223         for tag in self.driver.GetSliceTags({'tagname': 'egre_key'}):
224             used.add(int(tag['value']))
225
226         for i in range(1, 256):
227             if i not in used:
228                 key = i
229                 break
230         else:
231             raise KeyError("No more EGRE keys available")
232
233         return str(key)
234
235   
236        
237                         
238         
239
240     def handle_peer(self, site, sfa_slice, persons, peer):
241         if peer:
242             # bind site
243             try:
244                 if site:
245                     self.driver.BindObjectToPeer('site', site['site_id'], \
246                                         peer['shortname'], sfa_slice['site_id'])
247             except Exception, error:
248                 self.driver.DeleteSite(site['site_id'])
249                 raise error
250             
251             # bind slice
252             try:
253                 if sfa_slice:
254                     self.driver.BindObjectToPeer('slice', slice['slice_id'], \
255                                     peer['shortname'], sfa_slice['slice_id'])
256             except Exception, error:
257                 self.driver.DeleteSlice(sfa_slice['slice_id'])
258                 raise error 
259
260             # bind persons
261             for person in persons:
262                 try:
263                     self.driver.BindObjectToPeer('person', \
264                                     person['person_id'], peer['shortname'], \
265                                     person['peer_person_id'])
266
267                     for (key, remote_key_id) in zip(person['keys'], \
268                                                         person['key_ids']):
269                         try:
270                             self.driver.BindObjectToPeer( 'key', \
271                                             key['key_id'], peer['shortname'], \
272                                             remote_key_id)
273                         except:
274                             self.driver.DeleteKey(key['key_id'])
275                             logger.log_exc("failed to bind key: %s \
276                                             to peer: %s " % (key['key_id'], \
277                                             peer['shortname']))
278                 except Exception, error:
279                     self.driver.DeletePerson(person['person_id'])
280                     raise error       
281
282         return sfa_slice
283
284     #def verify_site(self, slice_xrn, slice_record={}, peer=None, \
285                                         #sfa_peer=None, options={}):
286         #(slice_hrn, type) = urn_to_hrn(slice_xrn)
287         #site_hrn = get_authority(slice_hrn)
288         ## login base can't be longer than 20 characters
289         ##slicename = hrn_to_pl_slicename(slice_hrn)
290         #authority_name = slice_hrn.split('.')[0]
291         #login_base = authority_name[:20]
292         #logger.debug(" SLABSLICES.PY \tverify_site authority_name %s  \
293                                         #login_base %s slice_hrn %s" \
294                                         #%(authority_name,login_base,slice_hrn)
295         
296         #sites = self.driver.GetSites(login_base)
297         #if not sites:
298             ## create new site record
299             #site = {'name': 'geni.%s' % authority_name,
300                     #'abbreviated_name': authority_name,
301                     #'login_base': login_base,
302                     #'max_slices': 100,
303                     #'max_slivers': 1000,
304                     #'enabled': True,
305                     #'peer_site_id': None}
306             #if peer:
307                 #site['peer_site_id'] = slice_record.get('site_id', None)
308             #site['site_id'] = self.driver.AddSite(site)
309             ## exempt federated sites from monitor policies
310             #self.driver.AddSiteTag(site['site_id'], 'exempt_site_until', \
311                                                                 #"20200101")
312             
313             ### is this still necessary?
314             ### add record to the local registry 
315             ##if sfa_peer and slice_record:
316                 ##peer_dict = {'type': 'authority', 'hrn': site_hrn, \
317                              ##'peer_authority': sfa_peer, 'pointer': \
318                                                         #site['site_id']}
319                 ##self.registry.register_peer_object(self.credential, peer_dict)
320         #else:
321             #site =  sites[0]
322             #if peer:
323                 ## unbind from peer so we can modify if necessary.
324                 ## Will bind back later
325                 #self.driver.UnBindObjectFromPeer('site', site['site_id'], \
326                                                             #peer['shortname']) 
327         
328         #return site        
329
330     def verify_slice(self, slice_hrn, slice_record, peer, sfa_peer, options={}):
331
332         #login_base = slice_hrn.split(".")[0]
333         slicename = slice_hrn
334         slices_list = self.driver.GetSlices(slice_filter = slicename, \
335                                             slice_filter_type = 'slice_hrn') 
336         if slices_list:
337             for sl in slices_list:
338             
339                 logger.debug("SLABSLICE \tverify_slice slicename %s sl %s \
340                                     slice_record %s"%(slicename, sl, slice_record))
341                 sfa_slice = sl
342                 sfa_slice.update(slice_record)
343                 #del slice['last_updated']
344                 #del slice['date_created']
345                 #if peer:
346                     #slice['peer_slice_id'] = slice_record.get('slice_id', None)
347                     ## unbind from peer so we can modify if necessary. 
348                     ## Will bind back later
349                     #self.driver.UnBindObjectFromPeer('slice', slice['slice_id'], \
350                                                                 #peer['shortname'])
351                 #Update existing record (e.g. expires field) 
352                     #it with the latest info.
353                 ##if slice_record and slice['expires'] != slice_record['expires']:
354                     ##self.driver.UpdateSlice( slice['slice_id'], {'expires' : \
355                                                         #slice_record['expires']})
356         else:
357             logger.debug(" SLABSLICES \tverify_slice Oups \
358                         slice_record %s peer %s sfa_peer %s "\
359                         %(slice_record, peer,sfa_peer))
360             sfa_slice = {'slice_hrn': slicename,
361                      #'url': slice_record.get('url', slice_hrn), 
362                      #'description': slice_record.get('description', slice_hrn)
363                      'node_list' : [],
364                      'record_id_user' : slice_record['person_ids'][0],
365                      'record_id_slice': slice_record['record_id'],
366                      'peer_authority':str(peer.hrn)
367                     
368                      }
369             # add the slice  
370             self.driver.AddSlice(sfa_slice)                         
371             #slice['slice_id'] = self.driver.AddSlice(slice)
372             logger.debug("SLABSLICES \tverify_slice ADDSLICE OK") 
373             #slice['node_ids']=[]
374             #slice['person_ids'] = []
375             #if peer:
376                 #slice['peer_slice_id'] = slice_record.get('slice_id', None) 
377             # mark this slice as an sfa peer record
378             #if sfa_peer:
379                 #peer_dict = {'type': 'slice', 'hrn': slice_hrn, 
380                              #'peer_authority': sfa_peer, 'pointer': \
381                                                     #slice['slice_id']}
382                 #self.registry.register_peer_object(self.credential, peer_dict)
383             
384
385        
386         return sfa_slice
387
388
389     def verify_persons(self, slice_hrn, slice_record, users,  peer, sfa_peer, \
390                                                                 options={}):
391         users_by_id = {}
392         users_by_hrn = {}
393         users_dict = {}
394       
395         for user in users:
396             
397             if 'urn' in user and (not 'hrn' in user ) :
398                 user['hrn'], user['type'] = urn_to_hrn(user['urn'])
399                
400             if 'person_id' in user and 'hrn' in user:
401                 users_by_id[user['person_id']] = user
402                 users_dict[user['person_id']] = {'person_id':\
403                                         user['person_id'], 'hrn':user['hrn']}
404
405                 users_by_hrn[user['hrn']] = user
406                 users_dict[user['hrn']] = {'person_id':user['person_id'], \
407                                                         'hrn':user['hrn']}
408                 
409         logger.debug( "SLABSLICE.PY \tverify_person  \
410                         users_dict %s \r\n user_by_hrn %s \r\n \
411                         \tusers_by_id %s " \
412                         %(users_dict,users_by_hrn, users_by_id))
413         
414         existing_user_ids = []
415         existing_user_hrns = []
416         existing_users = []
417         #Check if user is in LDAP using its hrn.
418         #Assuming Senslab is centralised :  one LDAP for all sites, 
419         # user_id unknown from LDAP
420         # LDAP does not provide users id, therfore we rely on hrns
421         if users_by_hrn:
422             #Construct the list of filters for GetPersons
423             filter_user = []
424             for hrn in users_by_hrn:
425                 #filter_user.append ( {'hrn':hrn}) 
426                 filter_user.append (users_by_hrn[hrn])
427             logger.debug(" SLABSLICE.PY \tverify_person  filter_user %s " \
428                                                     %(filter_user))   
429             existing_users = self.driver.GetPersons(filter_user)                
430             #existing_users = self.driver.GetPersons({'hrn': \
431                                             #users_by_hrn.keys()})
432             #existing_users = self.driver.GetPersons({'hrn': \
433                                                     #users_by_hrn.keys()}, \ 
434                                                     #['hrn','pkey'])
435             if existing_users:
436                 for user in existing_users :
437                     #for  k in users_dict[user['hrn']] :
438                     existing_user_hrns.append(users_dict[user['hrn']]['hrn'])
439                     existing_user_ids.\
440                                     append(users_dict[user['hrn']]['person_id'])
441          
442             #User from another federated site , 
443             #does not have a senslab account yet?
444             #or have multiple SFA accounts
445             #Check before adding  them to LDAP
446             
447             else: 
448                
449                 if isinstance(users, list):
450                     ldap_reslt = self.driver.ldap.LdapSearch(users[0])
451                 else:
452                     ldap_reslt = self.driver.ldap.LdapSearch(users)
453                 if ldap_reslt:
454                     existing_users = ldap_reslt[0]
455                     existing_user_hrns.append(users_dict[user['hrn']]['hrn'])
456                     existing_user_ids.\
457                                     append(users_dict[user['hrn']]['person_id'])
458                 else:
459                     #User not existing in LDAP
460             
461                     logger.debug(" SLABSLICE.PY \tverify_person users \
462                                 not in ldap ... %s \r\n \t ldap_reslt %s "  \
463                                                 %(users, ldap_reslt))
464
465                 
466         # requested slice users        
467         requested_user_ids = users_by_id.keys() 
468         requested_user_hrns = users_by_hrn.keys()
469         logger.debug("SLABSLICE.PY \tverify_person requested_user_ids  %s \
470                         user_by_hrn %s " %(requested_user_ids, users_by_hrn)) 
471         # existing slice users
472
473         #existing_slice_users_filter = {'hrn': slice_record['PI'][0]}
474         #logger.debug(" SLABSLICE.PY \tverify_person requested_user_ids %s \
475         #existing_slice_users_filter %s slice_record %s" %(requested_user_ids,\
476         #existing_slice_users_filter,slice_record))
477         
478         #existing_slice_users = \
479                         #self.driver.GetPersons([existing_slice_users_filter])
480         #existing_slice_users = \
481                         #self.driver.GetPersons(existing_slice_users_filter, \
482                         #['hrn','pkey'])
483         #logger.debug("SLABSLICE.PY \tverify_person  existing_slice_users %s " \
484                                     #%(existing_slice_users))
485         #Check that the user of the slice in the slice record
486         #matches the existing users 
487         try:
488             if slice_record['record_id_user'] in requested_user_ids and \
489                                 slice_record['PI'][0] in requested_user_hrns:
490                 logger.debug(" SLABSLICE  \tverify_person  \
491                         requested_user_ids %s = \
492                         slice_record['record_id_user'] %s" \
493                         %(requested_user_ids,slice_record['record_id_user']))
494            
495         except KeyError:
496             pass
497             
498         #existing_slice_user_hrns = [user['hrn'] for \
499                                         #user in existing_slice_users]
500
501         # users to be added, removed or updated
502         #One user in one senslab slice : there should be no need
503         #to remove/ add any user from/to a slice.
504         #However a user from SFA which is not registered in Senslab yet
505         #should be added to the LDAP.
506
507         added_user_hrns = set(requested_user_hrns).\
508                                             difference(set(existing_user_hrns))
509
510         #self.verify_keys(existing_slice_users, updated_users_list, \
511                                                             #peer, append)
512
513         added_persons = []
514         # add new users
515         for added_user_hrn in added_user_hrns:
516             added_user = users_dict[added_user_hrn]
517             #hrn, type = urn_to_hrn(added_user['urn'])  
518             person = {
519                 'first_name': added_user.get('first_name', hrn),
520                 'last_name': added_user.get('last_name', hrn),
521                 'person_id': added_user['person_id'],
522                 'peer_person_id': None,
523                 'keys': [],
524                 'key_ids': added_user.get('key_ids', []),
525                 
526             } 
527             person['person_id'] = self.driver.AddPerson(person)
528             if peer:
529                 person['peer_person_id'] = added_user['person_id']
530             added_persons.append(person)
531            
532             # enable the account 
533             self.driver.UpdatePerson(person['person_id'], {'enabled': True})
534             
535             # add person to site
536             #self.driver.AddPersonToSite(added_user_id, login_base)
537
538             #for key_string in added_user.get('keys', []):
539                 #key = {'key':key_string, 'key_type':'ssh'}
540                 #key['key_id'] = self.driver.AddPersonKey(person['person_id'], \
541                                                 #                       key)
542                 #person['keys'].append(key)
543
544             # add the registry record
545             #if sfa_peer:
546                 #peer_dict = {'type': 'user', 'hrn': hrn, 'peer_authority': \
547                                                 #sfa_peer, \
548                                                 #'pointer': person['person_id']}
549                 #self.registry.register_peer_object(self.credential, peer_dict)
550         #for added_slice_user_hrn in \
551                                 #added_slice_user_hrns.union(added_user_hrns):
552             #self.driver.AddPersonToSlice(added_slice_user_hrn, \
553                                                     #slice_record['name'])
554         #for added_slice_user_id in \
555                                     #added_slice_user_ids.union(added_user_ids):
556             # add person to the slice 
557             #self.driver.AddPersonToSlice(added_slice_user_id, \
558                                                 #slice_record['name'])
559             # if this is a peer record then it 
560             # should already be bound to a peer.
561             # no need to return worry about it getting bound later 
562
563         return added_persons
564             
565     #Unused
566     def verify_keys(self, persons, users, peer, options={}):
567         # existing keys 
568         key_ids = []
569         for person in persons:
570             key_ids.extend(person['key_ids'])
571         keylist = self.driver.GetKeys(key_ids, ['key_id', 'key'])
572         keydict = {}
573         for key in keylist:
574             keydict[key['key']] = key['key_id']     
575         existing_keys = keydict.keys()
576         persondict = {}
577         for person in persons:
578             persondict[person['email']] = person    
579     
580         # add new keys
581         requested_keys = []
582         updated_persons = []
583         for user in users:
584             user_keys = user.get('keys', [])
585             updated_persons.append(user)
586             for key_string in user_keys:
587                 requested_keys.append(key_string)
588                 if key_string not in existing_keys:
589                     key = {'key': key_string, 'key_type': 'ssh'}
590                     try:
591                         if peer:
592                             person = persondict[user['email']]
593                             self.driver.UnBindObjectFromPeer('person', \
594                                         person['person_id'], peer['shortname'])
595                         key['key_id'] = \
596                                 self.driver.AddPersonKey(user['email'], key)
597                         if peer:
598                             key_index = user_keys.index(key['key'])
599                             remote_key_id = user['key_ids'][key_index]
600                             self.driver.BindObjectToPeer('key', \
601                                             key['key_id'], peer['shortname'], \
602                                             remote_key_id)
603                             
604                     finally:
605                         if peer:
606                             self.driver.BindObjectToPeer('person', \
607                                     person['person_id'], peer['shortname'], \
608                                     user['person_id'])
609         
610         # remove old keys (only if we are not appending)
611         append = options.get('append', True)
612         if append == False: 
613             removed_keys = set(existing_keys).difference(requested_keys)
614             for existing_key_id in keydict:
615                 if keydict[existing_key_id] in removed_keys:
616                     try:
617                         if peer:
618                             self.driver.UnBindObjectFromPeer('key', \
619                                             existing_key_id, peer['shortname'])
620                         self.driver.DeleteKey(existing_key_id)
621                     except:
622                         pass   
623
624     #def verify_slice_attributes(self, slice, requested_slice_attributes, \
625                                             #append=False, admin=False):
626         ## get list of attributes users ar able to manage
627         #filter = {'category': '*slice*'}
628         #if not admin:
629             #filter['|roles'] = ['user']
630         #slice_attributes = self.driver.GetTagTypes(filter)
631         #valid_slice_attribute_names = [attribute['tagname'] \
632                                             #for attribute in slice_attributes]
633
634         ## get sliver attributes
635         #added_slice_attributes = []
636         #removed_slice_attributes = []
637         #ignored_slice_attribute_names = []
638         #existing_slice_attributes = self.driver.GetSliceTags({'slice_id': \
639                                                             #slice['slice_id']})
640
641         ## get attributes that should be removed
642         #for slice_tag in existing_slice_attributes:
643             #if slice_tag['tagname'] in ignored_slice_attribute_names:
644                 ## If a slice already has a admin only role 
645                 ## it was probably given to them by an
646                 ## admin, so we should ignore it.
647                 #ignored_slice_attribute_names.append(slice_tag['tagname'])
648             #else:
649                 ## If an existing slice attribute was not 
650                 ## found in the request it should
651                 ## be removed
652                 #attribute_found=False
653                 #for requested_attribute in requested_slice_attributes:
654                     #if requested_attribute['name'] == slice_tag['tagname'] \
655                         #and requested_attribute['value'] == slice_tag['value']:
656                         #attribute_found=True
657                         #break
658
659             #if not attribute_found and not append:
660                 #removed_slice_attributes.append(slice_tag)
661         
662         ## get attributes that should be added:
663         #for requested_attribute in requested_slice_attributes:
664             ## if the requested attribute wasn't found  we should add it
665             #if requested_attribute['name'] in valid_slice_attribute_names:
666                 #attribute_found = False
667                 #for existing_attribute in existing_slice_attributes:
668                     #if requested_attribute['name'] == \
669                         #existing_attribute['tagname'] and \
670                        #requested_attribute['value'] == \
671                        #existing_attribute['value']:
672                         #attribute_found=True
673                         #break
674                 #if not attribute_found:
675                     #added_slice_attributes.append(requested_attribute)
676
677
678         ## remove stale attributes
679         #for attribute in removed_slice_attributes:
680             #try:
681                 #self.driver.DeleteSliceTag(attribute['slice_tag_id'])
682             #except Exception, error:
683                 #self.logger.warn('Failed to remove sliver attribute. name: \
684                                 #%s, value: %s, node_id: %s\nCause:%s'\
685                                 #% (name, value,  node_id, str(error)))
686
687         ## add requested_attributes
688         #for attribute in added_slice_attributes:
689             #try:
690                 #self.driver.AddSliceTag(slice['name'], attribute['name'], \
691                             #attribute['value'], attribute.get('node_id', None))
692             #except Exception, error:
693                 #self.logger.warn('Failed to add sliver attribute. name: %s, \
694                                 #value: %s, node_id: %s\nCause:%s'\
695                                 #% (name, value,  node_id, str(error)))
696
697     #def create_slice_aggregate(self, xrn, rspec):
698         #hrn, type = urn_to_hrn(xrn)
699         ## Determine if this is a peer slice
700         #peer = self.get_peer(hrn)
701         #sfa_peer = self.get_sfa_peer(hrn)
702
703         #spec = RSpec(rspec)
704         ## Get the slice record from sfa
705         #slicename = hrn_to_pl_slicename(hrn) 
706         #slice = {}
707         #slice_record = None
708         #registry = self.api.registries[self.api.hrn]
709         #credential = self.api.getCredential()
710
711         #site_id, remote_site_id = self.verify_site(registry, \
712                                         #credential, hrn, peer, sfa_peer)
713         #slice = self.verify_slice(registry, credential, \
714                                 #hrn, site_id, remote_site_id, peer, sfa_peer)
715
716         ## find out where this slice is currently running
717         #nodelist = self.driver.GetNodes(slice['node_ids'], ['hostname'])
718         #hostnames = [node['hostname'] for node in nodelist]
719
720         ## get netspec details
721         #nodespecs = spec.getDictsByTagName('NodeSpec')
722
723         ## dict in which to store slice attributes to set for the nodes
724         #nodes = {}
725         #for nodespec in nodespecs:
726             #if isinstance(nodespec['name'], list):
727                 #for nodename in nodespec['name']:
728                     #nodes[nodename] = {}
729                     #for k in nodespec.keys():
730                         #rspec_attribute_value = nodespec[k]
731                         #if (self.rspec_to_slice_tag.has_key(k)):
732                             #slice_tag_name = self.rspec_to_slice_tag[k]
733                             #nodes[nodename][slice_tag_name] = \
734                                                         #rspec_attribute_value
735             #elif isinstance(nodespec['name'], StringTypes):
736                 #nodename = nodespec['name']
737                 #nodes[nodename] = {}
738                 #for k in nodespec.keys():
739                     #rspec_attribute_value = nodespec[k]
740                     #if (self.rspec_to_slice_tag.has_key(k)):
741                         #slice_tag_name = self.rspec_to_slice_tag[k]
742                         #nodes[nodename][slice_tag_name] = rspec_attribute_value
743
744                 #for k in nodespec.keys():
745                     #rspec_attribute_value = nodespec[k]
746                     #if (self.rspec_to_slice_tag.has_key(k)):
747                         #slice_tag_name = self.rspec_to_slice_tag[k]
748                         #nodes[nodename][slice_tag_name] = rspec_attribute_value
749
750         #node_names = nodes.keys()
751         ## remove nodes not in rspec
752         #deleted_nodes = list(set(hostnames).difference(node_names))
753         ## add nodes from rspec
754         #added_nodes = list(set(node_names).difference(hostnames))
755
756         #try:
757             #if peer:
758                 #self.driver.UnBindObjectFromPeer('slice', \
759                                                     #slice['slice_id'], peer)
760
761             #self.driver.LaunchExperimentOnOAR(slicename, added_nodes) 
762
763             ## Add recognized slice tags
764             #for node_name in node_names:
765                 #node = nodes[node_name]
766                 #for slice_tag in node.keys():
767                     #value = node[slice_tag]
768                     #if (isinstance(value, list)):
769                         #value = value[0]
770
771                     #self.driver.AddSliceTag(slicename, slice_tag, \
772                                                         #value, node_name)
773
774             #self.driver.DeleteSliceFromNodes(slicename, deleted_nodes)
775         #finally:
776             #if peer:
777                 #self.driver.BindObjectToPeer('slice', slice['slice_id'], \
778                                                 #peer, slice['peer_slice_id'])
779
780         #return 1
781