X-Git-Url: https://gerrit.o-ran-sc.org/r/gitweb?a=blobdiff_plain;f=a1-go%2Fpkg%2Fresthooks%2Fresthooks.go;h=6d9ad2964740fb0fe1e444f771ae04c08a3cc83e;hb=dd7944b7069298a8c162c5dd0be6b7c9defd231d;hp=2767bda918ee334322be898fe56528dcb05ef1a4;hpb=584d75571c8035f21051d26d3a020e8eb1ae89a0;p=ric-plt%2Fa1.git diff --git a/a1-go/pkg/resthooks/resthooks.go b/a1-go/pkg/resthooks/resthooks.go index 2767bda..6d9ad29 100644 --- a/a1-go/pkg/resthooks/resthooks.go +++ b/a1-go/pkg/resthooks/resthooks.go @@ -30,6 +30,7 @@ import ( "gerrit.o-ran-sc.org/r/ric-plt/a1/pkg/a1" "gerrit.o-ran-sc.org/r/ric-plt/a1/pkg/models" + "gerrit.o-ran-sc.org/r/ric-plt/a1/pkg/rmr" "gerrit.o-ran-sc.org/r/ric-plt/sdlgo" "github.com/santhosh-tekuri/jsonschema/v5" "gopkg.in/yaml.v2" @@ -49,6 +50,11 @@ var typeMismatchError = errors.New("Policytype Mismatch") var invalidJsonSchema = errors.New("Invalid Json ") var policyInstanceNotFoundError = errors.New("Policy Instance Not Found") var policyTypeNotFoundError = errors.New("Policy Type Not Found") +var policyTypeCanNotBeDeletedError = errors.New("tried to delete a type that isn't empty") + +func (rh *Resthook) CanPolicyTypeBeDeleted(err error) bool { + return err == policyTypeCanNotBeDeletedError +} func (rh *Resthook) IsPolicyTypePresent(err error) bool { return err == policyTypeNotFoundError @@ -72,12 +78,13 @@ func (rh *Resthook) IsValidJson(err error) bool { return err == invalidJsonSchema } func NewResthook() *Resthook { - return createResthook(sdlgo.NewSyncStorage()) + return createResthook(sdlgo.NewSyncStorage(), rmr.NewRMRSender()) } -func createResthook(sdlInst iSdl) *Resthook { +func createResthook(sdlInst iSdl, rmrSenderInst rmr.IRmrSender) *Resthook { return &Resthook{ - db: sdlInst, + db: sdlInst, + iRmrSenderInst: rmrSenderInst, } } @@ -213,7 +220,7 @@ func toStringKeys(val interface{}) (interface{}, error) { } } -var validate(httpBodyString string, schemaString string) bool { +func validate(httpBodyString string, schemaString string) bool { var m interface{} err := yaml.Unmarshal([]byte(httpBodyString), &m) if err != nil { @@ -363,6 +370,13 @@ func (rh *Resthook) CreatePolicyInstance(policyTypeId models.PolicyTypeID, polic if iscreated { a1.Logger.Debug("policy instance metadata created") } + isSent := rh.iRmrSenderInst.RmrSendToXapp(httpBodyString) + if isSent { + a1.Logger.Debug("rmrSendToXapp : message sent") + } else { + a1.Logger.Debug("rmrSendToXapp : message not sent") + } + } else { a1.Logger.Error("%+v", invalidJsonSchema) return invalidJsonSchema @@ -445,3 +459,112 @@ func (rh *Resthook) GetAllPolicyInstance(policyTypeId models.PolicyTypeID) ([]mo a1.Logger.Debug("return : %+v", policyTypeInstances) return policyTypeInstances, nil } + +func (rh *Resthook) DeletePolicyType(policyTypeId models.PolicyTypeID) error { + a1.Logger.Debug("DeletePolicyType") + + policyinstances, err := rh.GetAllPolicyInstance(policyTypeId) + if err != nil { + a1.Logger.Error("error in retrieving policy. err: %v", err) + return err + } + + var keys [1]string + key := a1PolicyPrefix + strconv.FormatInt((int64(policyTypeId)), 10) + keys[0] = key + if len(policyinstances) == 0 { + err := rh.db.Remove(a1MediatorNs, keys[:]) + if err != nil { + a1.Logger.Error("error in deleting policy type err: %v", err) + return err + } + } else { + a1.Logger.Error("tried to delete a type that isn't empty") + return policyTypeCanNotBeDeletedError + } + return nil +} + +func (rh *Resthook) typeValidity(policyTypeId models.PolicyTypeID) error { + var keys [1]string + + typekey := a1PolicyPrefix + strconv.FormatInt((int64(policyTypeId)), 10) + keys[0] = typekey + + a1.Logger.Debug("key1 : %+v", typekey) + valmap, err := rh.db.Get(a1MediatorNs, keys[:]) + if err != nil { + a1.Logger.Error("error in retrieving policytype err: %v", err) + return err + } + if len(valmap) == 0 { + a1.Logger.Error("policy type Not Present for policyid : %v", policyTypeId) + return policyTypeNotFoundError + } +} + +func (rh *Resthook) instanceValidity(policyTypeId models.PolicyTypeID, policyInstanceID models.PolicyInstanceID) error { + err := rh.typeValidity(policyTypeId) + if err != nil { + return err + } + policyTypeInstances, err := rh.GetPolicyInstance(policyTypeId, policyInstanceID) + if err != nil { + a1.Logger.Error("policy instance error : %v", err) + return err + } + if len(policyTypeInstances.(string)) == 0 { + a1.Logger.Debug("policy instance Not Present ") + return policyInstanceNotFoundError + } +} + +func (rh *Resthook) getMetaData(policyTypeId models.PolicyTypeID, policyInstanceID models.PolicyInstanceID) (map[string]interface{}, error) { + instanceMetadataKey := a1InstanceMetadataPrefix + strconv.FormatInt((int64(policyTypeId)), 10) + "." + string(policyInstanceID) + a1.Logger.Debug("instanceMetadata key : %+v", instanceMetadataKey) + var keys [1]string + keys[0] = instanceMetadataKey + instanceMetadataMap, err := rh.db.Get(a1MediatorNs, keys[:]) + if err != nil { + a1.Logger.Error("policy instance error : %v", err) + } + a1.Logger.Debug("instanceMetadata map : %+v", instanceMetadataMap) + if instanceMetadataMap[instanceMetadataKey] == nil { + a1.Logger.Error("policy instance Not Present for policyinstaneid : %v", policyInstanceID) + return map[string]interface{}{}, policyInstanceNotFoundError + } + return instanceMetadataMap, nil +} + +func (rh *Resthook) GetPolicyInstanceStatus(policyTypeId models.PolicyTypeID, policyInstanceID models.PolicyInstanceID) (*a1_mediator.A1ControllerGetPolicyInstanceStatusOKBody, error) { + err := rh.instanceValidity(policyTypeId, policyInstanceID) + if err != nil && err == policyInstanceNotFoundError || err == policyTypeNotFoundError { + policyInstanceStatus.InstanceStatus = "NOT IN EFFECT" + return &policyInstanceStatus, err + } + policyInstanceStatus := a1_mediator.A1ControllerGetPolicyInstanceStatusOKBody{} + metadata, err := rh.getMetaData(policyTypeId, policyInstanceID) + a1.Logger.Debug(" metadata %v", metadata) + if err != nil { + a1.Logger.Error("policy instance error : %v", err) + policyInstanceStatus.InstanceStatus = "NOT IN EFFECT" + return &policyInstanceStatus, err + } + jsonbody, err := json.Marshal(metadata) + if err != nil { + a1.Logger.Error("marshal error : %v", err) + return &policyInstanceStatus, err + } + + if err := json.Unmarshal(jsonbody, &policyInstanceStatus); err != nil { + a1.Logger.Error("unmarshal error : %v", err) + //this error maps to 503 error but can be mapped to 500: internal error + return &policyInstanceStatus, err + } + if policyInstanceStatus.HasBeenDeleted == false { + policyInstanceStatus.InstanceStatus = "IN EFFECT" + } else { + policyInstanceStatus.InstanceStatus = "NOT IN EFFECT" + } + return &policyInstanceStatus, nil +}