X-Git-Url: https://gerrit.o-ran-sc.org/r/gitweb?a=blobdiff_plain;f=pkg%2Fsbi%2Fsbi.go;h=b65e7788a1a36d79ec3f0ffda804949335adf033;hb=HEAD;hp=5b94cbd314599e0c4ecf7d0736ef7c55800f5f72;hpb=eb2ff0d217caf158dd15424bf70f8aa79c3742b1;p=ric-plt%2Frtmgr.git diff --git a/pkg/sbi/sbi.go b/pkg/sbi/sbi.go index 5b94cbd..b65e778 100644 --- a/pkg/sbi/sbi.go +++ b/pkg/sbi/sbi.go @@ -15,6 +15,10 @@ w WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. + + This source code is part of the near-RT RIC (RAN Intelligent Controller) + platform project (RICP). + ================================================================================== */ /* @@ -27,27 +31,31 @@ package sbi import ( "errors" + "fmt" + "gerrit.o-ran-sc.org/r/ric-plt/xapp-frame/pkg/xapp" + "net" "routing-manager/pkg/rtmgr" "strconv" + "strings" ) -const DEFAULT_NNG_PIPELINE_SOCKET_PREFIX = "tcp://" -const DEFAULT_NNG_PIPELINE_SOCKET_NUMBER = 4561 -const PLATFORMTYPE = "platform" +const DefaultRmrPipelineSocketPrefix = "tcp://" +const DefaultRmrPipelineSocketNumber = 4561 +const PlatformType = "platform" var ( - SupportedSbis = []*SbiEngineConfig{ - &SbiEngineConfig{ - Name: "nngpush", + SupportedSbis = []*EngineConfig{ + { + Name: "rmrpush", Version: "v1", - Protocol: "nngpipeline", - Instance: NewNngPush(), + Protocol: "rmrpipeline", + Instance: NewRmrPush(), IsAvailable: true, }, } ) -func GetSbi(sbiName string) (SbiEngine, error) { +func GetSbi(sbiName string) (Engine, error) { for _, sbi := range SupportedSbis { if sbi.Name == sbiName && sbi.IsAvailable { return sbi.Instance, nil @@ -59,74 +67,156 @@ func GetSbi(sbiName string) (SbiEngine, error) { type Sbi struct { } -func (s *Sbi) pruneEndpointList(sbi SbiEngine) { +func (s *Sbi) pruneEndpointList(sbi Engine) { + xapp.Logger.Debug("pruneEndpointList invoked.") for _, ep := range rtmgr.Eps { if !ep.Keepalive { - rtmgr.Logger.Debug("deleting %v", ep) + xapp.Logger.Debug("deleting %v", ep) sbi.DeleteEndpoint(ep) delete(rtmgr.Eps, ep.Uuid) } else { - rtmgr.Eps[ep.Uuid].Keepalive = false + if rtmgr.Eps[ep.Uuid] != nil { + rtmgr.Eps[ep.Uuid].Keepalive = false + } } } } -func (s *Sbi) updateEndpoints(rcs *rtmgr.RicComponents, sbii SbiEngine) { - for _, xapp := range (*rcs).Xapps { - for _, instance := range xapp.Instances { +func (s *Sbi) updateEndpoints(rcs *rtmgr.RicComponents, sbi Engine) { + for _, xapps := range (*rcs).XApps { + for _, instance := range xapps.Instances { uuid := instance.Ip + ":" + strconv.Itoa(int(instance.Port)) if _, ok := rtmgr.Eps[uuid]; ok { rtmgr.Eps[uuid].Keepalive = true } else { ep := &rtmgr.Endpoint{ - uuid, - instance.Name, - xapp.Name, - instance.Ip, - instance.Port, - instance.TxMessages, - instance.RxMessages, - nil, - false, - true, + Uuid: uuid, + Name: instance.Name, + XAppType: xapps.Name, + Ip: instance.Ip, + Port: instance.Port, + TxMessages: instance.TxMessages, + RxMessages: instance.RxMessages, + Policies: instance.Policies, + Socket: nil, + IsReady: false, + Keepalive: true, } - if err := sbii.AddEndpoint(ep); err != nil { - rtmgr.Logger.Error("can't create socket for endpoint: " + ep.Name + " due to:" + err.Error()) + if err := sbi.AddEndpoint(ep); err != nil { + xapp.Logger.Error("Cannot create socket for endpoint: " + ep.Name + " due to:" + err.Error()) continue } rtmgr.Eps[uuid] = ep } } } - s.updatePlatformEndpoints(&((*rcs).Pcs), sbii) - s.pruneEndpointList(sbii) + s.updatePlatformEndpoints(&((*rcs).Pcs), sbi) + s.updateE2TEndpoints(&((*rcs).E2Ts), sbi) + s.pruneEndpointList(sbi) } -func (s *Sbi) updatePlatformEndpoints(pcs *rtmgr.PlatformComponents, sbii SbiEngine) { - rtmgr.Logger.Debug("updatePlatformEndpoints invoked. PCS: %v", *pcs) +func (s *Sbi) updatePlatformEndpoints(pcs *rtmgr.PlatformComponents, sbi Engine) { + xapp.Logger.Debug("updatePlatformEndpoints invoked. PCS: %v", *pcs) for _, pc := range *pcs { uuid := pc.Fqdn + ":" + strconv.Itoa(int(pc.Port)) if _, ok := rtmgr.Eps[uuid]; ok { rtmgr.Eps[uuid].Keepalive = true } else { ep := &rtmgr.Endpoint{ - uuid, - pc.Name, - PLATFORMTYPE, - pc.Fqdn, - pc.Port, - rtmgr.PLATFORMMESSAGETYPES[pc.Name]["tx"], - rtmgr.PLATFORMMESSAGETYPES[pc.Name]["rx"], - nil, - false, - true, + Uuid: uuid, + Name: pc.Name, + XAppType: PlatformType, + Ip: pc.Fqdn, + Port: pc.Port, + //TxMessages: rtmgr.PLATFORMMESSAGETYPES[pc.Name]["tx"], + //RxMessages: rtmgr.PLATFORMMESSAGETYPES[pc.Name]["rx"], + Socket: nil, + IsReady: false, + Keepalive: true, + } + xapp.Logger.Debug("ep created: %v", ep) + if err := sbi.AddEndpoint(ep); err != nil { + xapp.Logger.Error("Cannot create socket for endpoint: " + ep.Name + " due to:" + err.Error()) + continue + } + rtmgr.Eps[uuid] = ep + } + } +} + +func (s *Sbi) updateE2TEndpoints(E2Ts *map[string]rtmgr.E2TInstance, sbi Engine) { + xapp.Logger.Debug("updateE2TEndpoints invoked. E2T: %v", *E2Ts) + for _, e2t := range *E2Ts { + uuid := e2t.Fqdn + stringSlice := strings.Split(e2t.Fqdn, ":") + ipaddress := stringSlice[0] + port, _ := strconv.Atoi(stringSlice[1]) + if _, ok := rtmgr.Eps[uuid]; ok { + rtmgr.Eps[uuid].Keepalive = true + } else { + ep := &rtmgr.Endpoint{ + Uuid: uuid, + Name: e2t.Name, + XAppType: PlatformType, + Ip: ipaddress, + Port: uint16(port), + //TxMessages: rtmgr.PLATFORMMESSAGETYPES[e2t.Name]["tx"], + //RxMessages: rtmgr.PLATFORMMESSAGETYPES[e2t.Name]["rx"], + Socket: nil, + IsReady: false, + Keepalive: true, } - rtmgr.Logger.Debug("ep created: %v", ep) - if err := sbii.AddEndpoint(ep); err != nil { - rtmgr.Logger.Error("can't create socket for endpoint: " + ep.Name + " due to:" + err.Error()) + xapp.Logger.Debug("ep created: %v", ep) + if err := sbi.AddEndpoint(ep); err != nil { + xapp.Logger.Error("Cannot create socket for endpoint: " + ep.Name + " due to:" + err.Error()) continue } rtmgr.Eps[uuid] = ep } } } + +func (s *Sbi) checkEndpoint(payload string) *rtmgr.Endpoint { + /* Payload contains endpoint in the form of IP:Port. + Port is data port of sender endpoint. + Eps contains the UUID in the form of IP:Port. + Port is the Application Port(http) */ + + xapp.Logger.Debug("Invoked checkEndPoint %v", payload) + stringSlice := strings.Split(payload, " ") + uuid := stringSlice[0] + stringsubsplit := strings.Split(uuid, ":") + xapp.Logger.Debug(">>> uuid %v", stringSlice[0]) + for _, ep := range rtmgr.Eps { + if strings.Contains(ep.Uuid, stringsubsplit[0]) == true { + endpoint := rtmgr.Eps[ep.Uuid] + return endpoint + } + } + + /* incase the stored Endpoint list is in the form of IP:port*/ + addr, err := net.LookupIP(stringsubsplit[0]) + if err == nil { + convertedUuid := fmt.Sprintf("%s:%s", addr[0], stringsubsplit[1]) + xapp.Logger.Info(" IP:Port received is %s", convertedUuid) + IP := fmt.Sprintf("%s", addr[0]) + for _, ep := range rtmgr.Eps { + res := strings.Contains(ep.Uuid, IP) + if res == true { + endpoint := rtmgr.Eps[ep.Uuid] + return endpoint + } + } + } + return nil +} + +func (s *Sbi) createEndpoint(rmrsrc string) (*string, int) { + /* Create a new mapping, this case is assumed for multiple process sending RMR request from a container */ + srcString := strings.Split(rmrsrc, " ") + srcStringSlice := strings.Split(srcString[0], "=") + Whid := int(xapp.Rmr.Openwh(srcStringSlice[1])) + + xapp.Logger.Info("Wormhole Id created is %d for EndPoint %s", Whid, srcStringSlice[1]) + return &srcStringSlice[1], Whid +}