4 # ==================================================================================
5 # Copyright (c) 2019-2020 Nokia
6 # Copyright (c) 2018-2020 AT&T Intellectual Property.
8 # Licensed under the Apache License, Version 2.0 (the "License");
9 # you may not use this file except in compliance with the License.
10 # You may obtain a copy of the License at
12 # http://www.apache.org/licenses/LICENSE-2.0
14 # Unless required by applicable law or agreed to in writing, software
15 # distributed under the License is distributed on an "AS IS" BASIS,
16 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
17 # See the License for the specific language governing permissions and
18 # limitations under the License.
19 # ==================================================================================
20 from flask import Response
21 from jsonschema import validate
22 from jsonschema.exceptions import ValidationError
24 from mdclogpy import Logger
25 from ricsdl.exceptions import RejectedByBackend, NotConnected, BackendError
26 from a1 import a1rmr, exceptions, data
29 mdc_logger = Logger(name=__name__)
32 def _try_func_return(func):
34 generic caller that returns the apporp http response if exceptions are raised
38 except (ValidationError, exceptions.PolicyTypeAlreadyExists, exceptions.CantDeleteNonEmptyType):
40 except (exceptions.PolicyTypeNotFound, exceptions.PolicyInstanceNotFound):
42 except (RejectedByBackend, NotConnected, BackendError):
44 These are SDL errors. At the time of development here, we do not have a good understanding which of these errors are "try again later it may work"
45 and which are "never going to work". There is some discussion that RejectedByBackend is in the latter category, suggesting it should map to 400,
46 but until we understand the root cause of these errors, it's confusing to clients to give them a 400 (a "your fault" code) because they won't know how to fix
47 For now, we log, and 503, and investigate the logs later to improve the handling/reporting.
49 # mdc_logger.exception(exc) # waiting for https://jira.o-ran-sc.org/browse/RIC-39
52 # catch all, should never happen...
53 # mdc_logger.exception(exc) # waiting for https://jira.o-ran-sc.org/browse/RIC-39
54 return Response(status=500)
60 def get_healthcheck():
62 Handles healthcheck GET
63 Currently, this checks:
64 1. whether the a1 webserver is up (if it isn't, this won't even be called, so even entering this function confirms it is)
65 2. checks whether the rmr thread is running and has completed a loop recently
66 TODO: make "seconds" to pass in a configurable parameter?
68 if a1rmr.healthcheck_rmr_thread():
70 return "rmr thread is unhealthy", 500
76 def get_all_policy_types():
78 Handles GET /a1-p/policytypes
80 return _try_func_return(data.get_type_list)
83 def create_policy_type(policy_type_id):
85 Handles PUT /a1-p/policytypes/policy_type_id
88 def put_type_handler():
89 data.store_policy_type(policy_type_id, body)
92 body = connexion.request.json
93 return _try_func_return(put_type_handler)
96 def get_policy_type(policy_type_id):
98 Handles GET /a1-p/policytypes/policy_type_id
100 return _try_func_return(lambda: data.get_policy_type(policy_type_id))
103 def delete_policy_type(policy_type_id):
105 Handles DELETE /a1-p/policytypes/policy_type_id
108 def delete_policy_type_handler():
109 data.delete_policy_type(policy_type_id)
112 return _try_func_return(delete_policy_type_handler)
118 def get_all_instances_for_type(policy_type_id):
120 Handles GET /a1-p/policytypes/policy_type_id/policies
122 return _try_func_return(lambda: data.get_instance_list(policy_type_id))
125 def get_policy_instance(policy_type_id, policy_instance_id):
127 Handles GET /a1-p/policytypes/polidyid/policies/policy_instance_id
129 return _try_func_return(lambda: data.get_policy_instance(policy_type_id, policy_instance_id))
132 def get_policy_instance_status(policy_type_id, policy_instance_id):
134 Handles GET /a1-p/policytypes/polidyid/policies/policy_instance_id/status
136 Return the aggregated status. The order of rules is as follows:
137 1. If a1 has received at least one status, and *all* received statuses are "DELETED", we blow away the instance and return a 404
138 2. if a1 has received at least one status and at least one is OK, we return "IN EFFECT"
139 3. "NOT IN EFFECT" otherwise (no statuses, or none are OK but not all are deleted)
142 return _try_func_return(lambda: data.get_policy_instance_status(policy_type_id, policy_instance_id))
145 def create_or_replace_policy_instance(policy_type_id, policy_instance_id):
147 Handles PUT /a1-p/policytypes/polidyid/policies/policy_instance_id
149 instance = connexion.request.json
151 def put_instance_handler():
153 Handles policy instance put
155 For now, policy_type_id is used as the message type
157 # validate the PUT against the schema
158 schema = data.get_policy_type(policy_type_id)["create_schema"]
159 validate(instance=instance, schema=schema)
162 data.store_policy_instance(policy_type_id, policy_instance_id, instance)
164 # queue rmr send (best effort)
165 a1rmr.queue_instance_send(("CREATE", policy_type_id, policy_instance_id, instance))
169 return _try_func_return(put_instance_handler)
172 def delete_policy_instance(policy_type_id, policy_instance_id):
174 Handles DELETE /a1-p/policytypes/polidyid/policies/policy_instance_id
177 def delete_instance_handler():
179 here we send out the DELETEs but we don't delete the instance until a GET is called where we check the statuses
180 We also set the status as deleted which would be reflected in a GET to ../status (before the DELETE completes)
182 data.delete_policy_instance(policy_type_id, policy_instance_id)
184 # queue rmr send (best effort)
185 a1rmr.queue_instance_send(("DELETE", policy_type_id, policy_instance_id, ""))
189 return _try_func_return(delete_instance_handler)