X-Git-Url: https://gerrit.o-ran-sc.org/r/gitweb?a=blobdiff_plain;f=o2ims%2Fservice%2Fcommand%2Fregistration_handler.py;h=77ab28b9633976899783a8055b6d593082af905e;hb=5893fa9d751d3e00324b22dfbdea024722ab9272;hp=40cd3901ef92d4501fad7ba56d91221cac35afa2;hpb=9ee90ffa2414326c26fd10edc59bf315204254e2;p=pti%2Fo2.git diff --git a/o2ims/service/command/registration_handler.py b/o2ims/service/command/registration_handler.py index 40cd390..77ab28b 100644 --- a/o2ims/service/command/registration_handler.py +++ b/o2ims/service/command/registration_handler.py @@ -17,6 +17,7 @@ import json # import asyncio # import requests import http.client +import ssl from urllib.parse import urlparse from retry import retry @@ -42,15 +43,22 @@ def registry_to_smo( ocloud = uow.oclouds.get(data.id) if ocloud is None: return - logger.debug('O-Cloud Global UUID: {}'.format(ocloud.globalcloudId)) + logger.debug('O-Cloud Global UUID: {}'.format(ocloud.globalCloudId)) ocloud_dict = ocloud.serialize() if data.notificationEventType == NotificationEventEnum.CREATE: register_smo(uow, ocloud_dict) +class RegIMSToSMOExp(Exception): + def __init__(self, value): + self.value = value + + def register_smo(uow, ocloud_data): call_res = call_smo(ocloud_data) logger.debug('Call SMO response is {}'.format(call_res)) + if call_res is not True: + raise RegIMSToSMOExp('Register o2ims to SMO failed') # TODO: record the result for the smo register @@ -68,19 +76,55 @@ def register_smo(uow, ocloud_data): @retry((ConnectionRefusedError), tries=2, delay=2) def call_smo(reg_data: dict): + smo_token = conf.DEFAULT.smo_token_data + smo_token_info = { + 'iss': 'o2ims', + 'aud': 'smo', + 'smo_token_payload': smo_token, + 'smo_token_type': 'jwt', + 'smo_token_expiration': '', + 'smo_token_algo': 'RS256' + } + callback_data = json.dumps({ - 'consumerSubscriptionId': reg_data['globalcloudId'], - 'notificationEventType': 'CREATE', - 'objectRef': config.get_api_url(), - 'postObjectState': reg_data + 'globalCloudId': reg_data['globalCloudId'], + 'oCloudId': reg_data['oCloudId'], + 'IMS_EP': config.get_api_url(), + 'smo_token_data': smo_token_info }) logger.info('URL: {}, data: {}'.format( conf.DEFAULT.smo_register_url, callback_data)) - o = urlparse(conf.DEFAULT.smo_register_url) - conn = http.client.HTTPConnection(o.netloc) + if o.scheme == 'https': + sslctx = ssl.create_default_context(purpose=ssl.Purpose.SERVER_AUTH) + sslctx.check_hostname = True + sslctx.verify_mode = ssl.CERT_REQUIRED + sslctx.load_default_certs() + conn = http.client.HTTPSConnection(o.netloc, context=sslctx) + else: + conn = http.client.HTTPConnection(o.netloc) + + try: + return post_data(conn, o.path, callback_data) + except ssl.SSLCertVerificationError as e: + logger.info('post data except: {}'.format(e)) + if 'self signed' in str(e): + sslctx = ssl.create_default_context( + purpose=ssl.Purpose.SERVER_AUTH) + smo_ca_path = config.get_smo_ca_config_path() + sslctx.load_verify_locations(smo_ca_path) + sslctx.check_hostname = False + sslctx.verify_mode = ssl.CERT_REQUIRED + conn = http.client.HTTPSConnection(o.netloc, context=sslctx) + return post_data(conn, o.path, callback_data) + except Exception as e: + logger.info('except: {}'.format(e)) + return False + + +def post_data(conn, path, data): headers = {'Content-type': 'application/json'} - conn.request('POST', o.path, callback_data, headers) + conn.request('POST', path, data, headers) resp = conn.getresponse() data = resp.read().decode('utf-8') # json_data = json.loads(data)