WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
+
+ This source code is part of the near-RT RIC (RAN Intelligent Controller)
+ platform project (RICP).
+
==================================================================================
*/
/*
package sbi
import (
+ "bytes"
+ "crypto/md5"
"errors"
- "nanomsg.org/go/mangos/v2"
- "nanomsg.org/go/mangos/v2/protocol/push"
- _ "nanomsg.org/go/mangos/v2/transport/all"
+ "gerrit.o-ran-sc.org/r/ric-plt/xapp-frame/pkg/xapp"
"routing-manager/pkg/rtmgr"
"strconv"
+ "time"
+ "fmt"
)
type NngPush struct {
Sbi
- NewSocket CreateNewNngSocketHandler
+ rcChan chan *xapp.RMRParams
}
-func NewNngPush() *NngPush {
- instance := new(NngPush)
- instance.NewSocket = createNewPushSocket
- return instance
+type RMRParams struct {
+ *xapp.RMRParams
}
-func createNewPushSocket() (NngSocket, error) {
- rtmgr.Logger.Debug("Invoked: createNewPushSocket()")
- socket, err := push.NewSocket()
- if err != nil {
- return nil, errors.New("can't create new push socket due to:" + err.Error())
- }
- socket.SetPipeEventHook(pipeEventHandler)
- return socket, nil
+
+func (params *RMRParams) String() string {
+ var b bytes.Buffer
+ sum := md5.Sum(params.Payload)
+ fmt.Fprintf(&b, "params(Src=%s Mtype=%d SubId=%d Xid=%s Meid=%s Paylens=%d/%d Payhash=%x)", params.Src, params.Mtype, params.SubId, params.Xid, params.Meid.RanName, params.PayloadLen, len(params.Payload), sum)
+ return b.String()
}
-func pipeEventHandler(event mangos.PipeEvent, pipe mangos.Pipe) {
- rtmgr.Logger.Debug("Invoked: pipeEventHandler()")
- for _, ep := range rtmgr.Eps {
- uri := DEFAULT_NNG_PIPELINE_SOCKET_PREFIX + ep.Ip + ":" + strconv.Itoa(DEFAULT_NNG_PIPELINE_SOCKET_NUMBER)
- if uri == pipe.Address() {
- switch event {
- case 1:
- ep.IsReady = true
- rtmgr.Logger.Debug("Endpoint " + uri + " successfully attached")
- default:
- ep.IsReady = false
- rtmgr.Logger.Debug("Endpoint " + uri + " has been detached")
- }
- }
- }
+func NewNngPush() *NngPush {
+ instance := new(NngPush)
+ return instance
}
func (c *NngPush) Initialize(ip string) error {
}
func (c *NngPush) AddEndpoint(ep *rtmgr.Endpoint) error {
- var err error
- var socket NngSocket
- rtmgr.Logger.Debug("Invoked sbi.AddEndpoint")
- rtmgr.Logger.Debug("args: %v", (*ep))
- socket, err = c.NewSocket()
- if err != nil {
- return errors.New("can't add new socket to endpoint:" + ep.Uuid + " due to: " + err.Error())
- }
- ep.Socket = socket
- err = c.dial(ep)
- if err != nil {
- return errors.New("can't dial to endpoint:" + ep.Uuid + " due to: " + err.Error())
+
+ xapp.Logger.Debug("Invoked sbi.AddEndpoint")
+ endpoint := ep.Ip + ":" + strconv.Itoa(DefaultNngPipelineSocketNumber)
+ ep.Whid = int(xapp.Rmr.Openwh(endpoint))
+ if ep.Whid < 0 {
+ return errors.New("can't open warmhole connection for endpoint:" + ep.Uuid + " due to invalid Wormhole ID: " + string(ep.Whid))
+ }else {
+ xapp.Logger.Debug("Wormhole ID is %v and EP is %v",ep.Whid,endpoint)
}
+
return nil
}
func (c *NngPush) DeleteEndpoint(ep *rtmgr.Endpoint) error {
- rtmgr.Logger.Debug("Invoked sbi. DeleteEndpoint")
- rtmgr.Logger.Debug("args: %v", (*ep))
- if err := ep.Socket.(NngSocket).Close(); err != nil {
- return errors.New("can't close push socket of endpoint:" + ep.Uuid + " due to: " + err.Error())
- }
+ xapp.Logger.Debug("Invoked sbi. DeleteEndpoint")
+ xapp.Logger.Debug("args: %v", *ep)
+
+ xapp.Rmr.Closewh(ep.Whid)
return nil
}
c.updateEndpoints(rcs, c)
}
-/*
-NOTE: Asynchronous dial starts a goroutine which keep maintains the connection to the given endpoint
-*/
-func (c *NngPush) dial(ep *rtmgr.Endpoint) error {
- rtmgr.Logger.Debug("Dialing to endpoint: " + ep.Uuid)
- uri := DEFAULT_NNG_PIPELINE_SOCKET_PREFIX + ep.Ip + ":" + strconv.Itoa(DEFAULT_NNG_PIPELINE_SOCKET_NUMBER)
- options := make(map[string]interface{})
- options[mangos.OptionDialAsynch] = true
- if err := ep.Socket.(NngSocket).DialOptions(uri, options); err != nil {
- return errors.New("can't dial on push socket to " + uri + " due to: " + err.Error())
- }
- return nil
-}
-
func (c *NngPush) DistributeAll(policies *[]string) error {
- rtmgr.Logger.Debug("Invoked: sbi.DistributeAll")
- rtmgr.Logger.Debug("args: %v", (*policies))
+ xapp.Logger.Debug("Invoked: sbi.DistributeAll")
+ xapp.Logger.Debug("args: %v", *policies)
+
for _, ep := range rtmgr.Eps {
- if ep.IsReady {
- go c.send(ep, policies)
- } else {
- rtmgr.Logger.Warn("Endpoint " + ep.Uuid + " is not ready")
- }
+ go c.send(ep, policies)
}
+
return nil
}
func (c *NngPush) send(ep *rtmgr.Endpoint, policies *[]string) {
- rtmgr.Logger.Debug("Push policy to endpoint: " + ep.Uuid)
+ xapp.Logger.Debug("Push policy to endpoint: " + ep.Uuid)
+
for _, pe := range *policies {
- if err := ep.Socket.(NngSocket).Send([]byte(pe)); err != nil {
- rtmgr.Logger.Error("Unable to send policy entry due to: " + err.Error())
- }
+ params := &RMRParams{&xapp.RMRParams{}}
+ params.Mtype = 20
+ params.PayloadLen = len([]byte(pe))
+ params.Payload =[]byte(pe)
+ params.Mbuf = nil
+ params.Whid = ep.Whid
+ time.Sleep(1 * time.Millisecond)
+ xapp.Rmr.SendMsg(params.RMRParams)
}
- rtmgr.Logger.Info("NNG PUSH to endpoint " + ep.Uuid + ": OK (# of Entries:" + strconv.Itoa(len((*policies))) + ")")
+ xapp.Logger.Info("NNG PUSH to endpoint " + ep.Uuid + ": OK (# of Entries:" + strconv.Itoa(len(*policies)) + ")")
}
+
+func (c *NngPush) CreateEndpoint(payload string) (*rtmgr.Endpoint){
+ return c.createEndpoint(payload, c)
+}
+
+func (c *NngPush) DistributeToEp(policies *[]string, ep *rtmgr.Endpoint) error {
+ xapp.Logger.Debug("Invoked: sbi.DistributeToEp")
+ xapp.Logger.Debug("args: %v", *policies)
+
+ go c.send(ep, policies)
+
+ return nil
+}
+