blob: 46fd8cce40c8df20f3409a0dccaa1c16cb9a24bc [file] [log] [blame]
tiernoc94c3df2018-02-09 15:38:54 +01001#!/usr/bin/python3
2# -*- coding: utf-8 -*-
3
tiernod125caf2018-11-22 16:05:54 +00004# Licensed under the Apache License, Version 2.0 (the "License");
5# you may not use this file except in compliance with the License.
6# You may obtain a copy of the License at
7#
8# http://www.apache.org/licenses/LICENSE-2.0
9#
10# Unless required by applicable law or agreed to in writing, software
11# distributed under the License is distributed on an "AS IS" BASIS,
12# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
13# implied.
14# See the License for the specific language governing permissions and
15# limitations under the License.
16
tiernoc94c3df2018-02-09 15:38:54 +010017import cherrypy
18import time
19import json
20import yaml
tierno9c630112019-08-29 14:21:41 +000021import osm_nbi.html_out as html
tiernoc94c3df2018-02-09 15:38:54 +010022import logging
tiernof5298be2018-05-16 14:43:57 +020023import logging.handlers
24import getopt
25import sys
Eduardo Sousa2f988212018-07-26 01:04:11 +010026
tierno9c630112019-08-29 14:21:41 +000027from osm_nbi.authconn import AuthException, AuthconnException
28from osm_nbi.auth import Authenticator
29from osm_nbi.engine import Engine, EngineException
30from osm_nbi.subscriptions import SubscriptionThread
elumalai7802ff82023-04-24 20:38:32 +053031from osm_nbi.utils import cef_event, cef_event_builder
tierno9c630112019-08-29 14:21:41 +000032from osm_nbi.validation import ValidationError
tiernoa8d63632018-05-10 13:12:32 +020033from osm_common.dbbase import DbException
34from osm_common.fsbase import FsException
35from osm_common.msgbase import MsgException
tiernoc94c3df2018-02-09 15:38:54 +010036from http import HTTPStatus
tiernoc94c3df2018-02-09 15:38:54 +010037from codecs import getreader
tiernof5298be2018-05-16 14:43:57 +020038from os import environ, path
tiernob2e48bd2020-02-04 15:47:18 +000039from osm_nbi import version as nbi_version, version_date as nbi_version_date
tiernoc94c3df2018-02-09 15:38:54 +010040
41__author__ = "Alfonso Tierno <alfonso.tiernosepulveda@telefonica.com>"
tiernodfe09572018-04-24 10:41:10 +020042
garciadeblas4568a372021-03-24 09:19:48 +010043__version__ = "0.1.3" # file version, not NBI version
tierno9c630112019-08-29 14:21:41 +000044version_date = "Aug 2019"
45
garciadeblas4568a372021-03-24 09:19:48 +010046database_version = "1.2"
47auth_database_version = "1.0"
48nbi_server = None # instance of Server class
tierno932499c2019-01-28 17:28:10 +000049subscription_thread = None # instance of SubscriptionThread class
elumalai7802ff82023-04-24 20:38:32 +053050cef_logger = None
tiernoc94c3df2018-02-09 15:38:54 +010051
52"""
tiernof27c79b2018-03-12 17:08:42 +010053North Bound Interface (O: OSM specific; 5,X: SOL005 not implemented yet; O5: SOL005 implemented)
tiernoc94c3df2018-02-09 15:38:54 +010054URL: /osm GET POST PUT DELETE PATCH
garciadeblas9750c5a2018-10-15 16:20:35 +020055 /nsd/v1
tierno2236d202018-05-16 19:05:16 +020056 /ns_descriptors_content O O
57 /<nsdInfoId> O O O O
tiernoc94c3df2018-02-09 15:38:54 +010058 /ns_descriptors O5 O5
59 /<nsdInfoId> O5 O5 5
60 /nsd_content O5 O5
tiernof27c79b2018-03-12 17:08:42 +010061 /nsd O
62 /artifacts[/<artifactPath>] O
tiernoc94c3df2018-02-09 15:38:54 +010063 /pnf_descriptors 5 5
64 /<pnfdInfoId> 5 5 5
65 /pnfd_content 5 5
tiernof27c79b2018-03-12 17:08:42 +010066 /subscriptions 5 5
67 /<subscriptionId> 5 X
tiernoc94c3df2018-02-09 15:38:54 +010068
69 /vnfpkgm/v1
tierno55945e72018-04-06 16:40:27 +020070 /vnf_packages_content O O
tierno2236d202018-05-16 19:05:16 +020071 /<vnfPkgId> O O
tiernoc94c3df2018-02-09 15:38:54 +010072 /vnf_packages O5 O5
73 /<vnfPkgId> O5 O5 5
tiernoc94c3df2018-02-09 15:38:54 +010074 /package_content O5 O5
75 /upload_from_uri X
tiernof27c79b2018-03-12 17:08:42 +010076 /vnfd O5
77 /artifacts[/<artifactPath>] O5
78 /subscriptions X X
79 /<subscriptionId> X X
tiernoc94c3df2018-02-09 15:38:54 +010080
81 /nslcm/v1
tiernof27c79b2018-03-12 17:08:42 +010082 /ns_instances_content O O
tierno2236d202018-05-16 19:05:16 +020083 /<nsInstanceId> O O
tiernof27c79b2018-03-12 17:08:42 +010084 /ns_instances 5 5
tierno95692442018-05-24 18:05:28 +020085 /<nsInstanceId> O5 O5
tierno65acb4d2018-04-06 16:42:40 +020086 instantiate O5
87 terminate O5
88 action O
89 scale O5
elumalai8e3806c2022-04-28 17:26:24 +053090 migrate O
aticig544a2ae2022-04-05 09:00:17 +030091 update 05
garciadeblas0964edf2022-02-11 00:43:44 +010092 heal O5
tiernoc94c3df2018-02-09 15:38:54 +010093 /ns_lcm_op_occs 5 5
94 /<nsLcmOpOccId> 5 5 5
95 TO BE COMPLETED 5 5
tiernof759d822018-06-11 18:54:54 +020096 /vnf_instances (also vnfrs for compatibility) O
97 /<vnfInstanceId> O
tiernof27c79b2018-03-12 17:08:42 +010098 /subscriptions 5 5
99 /<subscriptionId> 5 X
garciadeblas9750c5a2018-10-15 16:20:35 +0200100
tiernocb83c942018-09-24 17:28:13 +0200101 /pdu/v1
tierno032916c2019-03-22 13:27:12 +0000102 /pdu_descriptors O O
tiernocb83c942018-09-24 17:28:13 +0200103 /<id> O O O O
garciadeblas9750c5a2018-10-15 16:20:35 +0200104
tiernof27c79b2018-03-12 17:08:42 +0100105 /admin/v1
106 /tokens O O
tierno2236d202018-05-16 19:05:16 +0200107 /<id> O O
tiernof27c79b2018-03-12 17:08:42 +0100108 /users O O
tiernocd54a4a2018-09-12 16:40:35 +0200109 /<id> O O O O
tiernof27c79b2018-03-12 17:08:42 +0100110 /projects O O
tierno2236d202018-05-16 19:05:16 +0200111 /<id> O O
tierno55ba2e62018-12-11 17:22:22 +0000112 /vim_accounts (also vims for compatibility) O O
113 /<id> O O O
114 /wim_accounts O O
tierno2236d202018-05-16 19:05:16 +0200115 /<id> O O O
tierno0f98af52018-03-19 10:28:22 +0100116 /sdns O O
tierno2236d202018-05-16 19:05:16 +0200117 /<id> O O O
delacruzramofe598fe2019-10-23 18:25:11 +0200118 /k8sclusters O O
119 /<id> O O O
120 /k8srepos O O
121 /<id> O O
Felipe Vicensb66b0412020-05-06 10:11:00 +0200122 /osmrepos O O
123 /<id> O O
tiernoc94c3df2018-02-09 15:38:54 +0100124
garciadeblas9750c5a2018-10-15 16:20:35 +0200125 /nst/v1 O O
126 /netslice_templates_content O O
127 /<nstInfoId> O O O O
128 /netslice_templates O O
129 /<nstInfoId> O O O
130 /nst_content O O
131 /nst O
132 /artifacts[/<artifactPath>] O
133 /subscriptions X X
134 /<subscriptionId> X X
135
136 /nsilcm/v1
137 /netslice_instances_content O O
138 /<SliceInstanceId> O O
139 /netslice_instances O O
140 /<SliceInstanceId> O O
141 instantiate O
142 terminate O
143 action O
144 /nsi_lcm_op_occs O O
145 /<nsiLcmOpOccId> O O O
146 /subscriptions X X
147 /<subscriptionId> X X
148
tierno2236d202018-05-16 19:05:16 +0200149query string:
150 Follows SOL005 section 4.3.2 It contains extra METHOD to override http method, FORCE to force.
tierno36ec8602018-11-02 17:27:11 +0100151 simpleFilterExpr := <attrName>["."<attrName>]*["."<op>]"="<value>[","<value>]*
152 filterExpr := <simpleFilterExpr>["&"<simpleFilterExpr>]*
153 op := "eq" | "neq" (or "ne") | "gt" | "lt" | "gte" | "lte" | "cont" | "ncont"
154 attrName := string
tierno2236d202018-05-16 19:05:16 +0200155 For filtering inside array, it must select the element of the array, or add ANYINDEX to apply the filtering over any
156 item of the array, that is, pass if any item of the array pass the filter.
157 It allows both ne and neq for not equal
158 TODO: 4.3.3 Attribute selectors
159 all_fields, fields=x,y,.., exclude_default, exclude_fields=x,y,...
tiernoc94c3df2018-02-09 15:38:54 +0100160 (none) … same as “exclude_default”
161 all_fields … all attributes.
tierno2236d202018-05-16 19:05:16 +0200162 fields=<list> … all attributes except all complex attributes with minimum cardinality of zero that are not
163 conditionally mandatory, and that are not provided in <list>.
164 exclude_fields=<list> … all attributes except those complex attributes with a minimum cardinality of zero that
165 are not conditionally mandatory, and that are provided in <list>.
166 exclude_default … all attributes except those complex attributes with a minimum cardinality of zero that are not
167 conditionally mandatory, and that are part of the "default exclude set" defined in the present specification for
168 the particular resource
169 exclude_default and include=<list> … all attributes except those complex attributes with a minimum cardinality
170 of zero that are not conditionally mandatory and that are part of the "default exclude set" defined in the
171 present specification for the particular resource, but that are not part of <list>
tierno65ca36d2019-02-12 19:27:52 +0100172 Additionally it admits some administrator values:
173 FORCE: To force operations skipping dependency checkings
174 ADMIN: To act as an administrator or a different project
175 PUBLIC: To get public descriptors or set a descriptor as public
176 SET_PROJECT: To make a descriptor available for other project
beierlmbc5a5242022-05-17 21:25:29 -0400177
tiernoc94c3df2018-02-09 15:38:54 +0100178Header field name Reference Example Descriptions
179 Accept IETF RFC 7231 [19] application/json Content-Types that are acceptable for the response.
180 This header field shall be present if the response is expected to have a non-empty message body.
181 Content-Type IETF RFC 7231 [19] application/json The MIME type of the body of the request.
182 This header field shall be present if the request has a non-empty message body.
tierno2236d202018-05-16 19:05:16 +0200183 Authorization IETF RFC 7235 [22] Bearer mF_9.B5f-4.1JqM The authorization token for the request.
184 Details are specified in clause 4.5.3.
tiernoc94c3df2018-02-09 15:38:54 +0100185 Range IETF RFC 7233 [21] 1000-2000 Requested range of bytes from a file
186Header field name Reference Example Descriptions
187 Content-Type IETF RFC 7231 [19] application/json The MIME type of the body of the response.
188 This header field shall be present if the response has a non-empty message body.
tierno2236d202018-05-16 19:05:16 +0200189 Location IETF RFC 7231 [19] http://www.example.com/vnflcm/v1/vnf_instances/123 Used in redirection, or when a
190 new resource has been created.
tiernoc94c3df2018-02-09 15:38:54 +0100191 This header field shall be present if the response status code is 201 or 3xx.
tierno2236d202018-05-16 19:05:16 +0200192 In the present document this header field is also used if the response status code is 202 and a new resource was
193 created.
194 WWW-Authenticate IETF RFC 7235 [22] Bearer realm="example" Challenge if the corresponding HTTP request has not
195 provided authorization, or error details if the corresponding HTTP request has provided an invalid authorization
196 token.
197 Accept-Ranges IETF RFC 7233 [21] bytes Used by the Server to signal whether or not it supports ranges for
198 certain resources.
199 Content-Range IETF RFC 7233 [21] bytes 21010-47021/ 47022 Signals the byte range that is contained in the
200 response, and the total length of the file.
tiernoc94c3df2018-02-09 15:38:54 +0100201 Retry-After IETF RFC 7231 [19] Fri, 31 Dec 1999 23:59:59 GMT
tiernoc94c3df2018-02-09 15:38:54 +0100202"""
203
tierno701018c2019-06-25 11:13:14 +0000204valid_query_string = ("ADMIN", "SET_PROJECT", "FORCE", "PUBLIC")
205# ^ Contains possible administrative query string words:
206# ADMIN=True(by default)|Project|Project-list: See all elements, or elements of a project
207# (not owned by my session project).
208# PUBLIC=True(by default)|False: See/hide public elements. Set/Unset a topic to be public
209# FORCE=True(by default)|False: Force edition/deletion operations
210# SET_PROJECT=Project|Project-list: Add/Delete the topic to the projects portfolio
211
212valid_url_methods = {
213 # contains allowed URL and methods, and the role_permission name
214 "admin": {
215 "v1": {
garciadeblas4568a372021-03-24 09:19:48 +0100216 "tokens": {
217 "METHODS": ("GET", "POST", "DELETE"),
218 "ROLE_PERMISSION": "tokens:",
219 "<ID>": {"METHODS": ("GET", "DELETE"), "ROLE_PERMISSION": "tokens:id:"},
220 },
221 "users": {
222 "METHODS": ("GET", "POST"),
223 "ROLE_PERMISSION": "users:",
224 "<ID>": {
225 "METHODS": ("GET", "DELETE", "PATCH"),
226 "ROLE_PERMISSION": "users:id:",
227 },
228 },
229 "projects": {
230 "METHODS": ("GET", "POST"),
231 "ROLE_PERMISSION": "projects:",
232 "<ID>": {
233 "METHODS": ("GET", "DELETE", "PATCH"),
234 "ROLE_PERMISSION": "projects:id:",
235 },
236 },
237 "roles": {
238 "METHODS": ("GET", "POST"),
239 "ROLE_PERMISSION": "roles:",
240 "<ID>": {
241 "METHODS": ("GET", "DELETE", "PATCH"),
242 "ROLE_PERMISSION": "roles:id:",
243 },
244 },
245 "vims": {
246 "METHODS": ("GET", "POST"),
247 "ROLE_PERMISSION": "vims:",
248 "<ID>": {
249 "METHODS": ("GET", "DELETE", "PATCH"),
250 "ROLE_PERMISSION": "vims:id:",
251 },
252 },
253 "vim_accounts": {
254 "METHODS": ("GET", "POST"),
255 "ROLE_PERMISSION": "vim_accounts:",
256 "<ID>": {
257 "METHODS": ("GET", "DELETE", "PATCH"),
258 "ROLE_PERMISSION": "vim_accounts:id:",
259 },
260 },
261 "wim_accounts": {
262 "METHODS": ("GET", "POST"),
263 "ROLE_PERMISSION": "wim_accounts:",
264 "<ID>": {
265 "METHODS": ("GET", "DELETE", "PATCH"),
266 "ROLE_PERMISSION": "wim_accounts:id:",
267 },
268 },
269 "sdns": {
270 "METHODS": ("GET", "POST"),
271 "ROLE_PERMISSION": "sdn_controllers:",
272 "<ID>": {
273 "METHODS": ("GET", "DELETE", "PATCH"),
274 "ROLE_PERMISSION": "sdn_controllers:id:",
275 },
276 },
277 "k8sclusters": {
278 "METHODS": ("GET", "POST"),
279 "ROLE_PERMISSION": "k8sclusters:",
280 "<ID>": {
281 "METHODS": ("GET", "DELETE", "PATCH"),
282 "ROLE_PERMISSION": "k8sclusters:id:",
283 },
284 },
285 "vca": {
286 "METHODS": ("GET", "POST"),
287 "ROLE_PERMISSION": "vca:",
288 "<ID>": {
289 "METHODS": ("GET", "DELETE", "PATCH"),
290 "ROLE_PERMISSION": "vca:id:",
291 },
292 },
293 "k8srepos": {
294 "METHODS": ("GET", "POST"),
295 "ROLE_PERMISSION": "k8srepos:",
296 "<ID>": {
297 "METHODS": ("GET", "DELETE"),
298 "ROLE_PERMISSION": "k8srepos:id:",
299 },
300 },
301 "osmrepos": {
302 "METHODS": ("GET", "POST"),
303 "ROLE_PERMISSION": "osmrepos:",
304 "<ID>": {
305 "METHODS": ("GET", "DELETE", "PATCH"),
306 "ROLE_PERMISSION": "osmrepos:id:",
307 },
308 },
309 "domains": {
310 "METHODS": ("GET",),
311 "ROLE_PERMISSION": "domains:",
312 },
tierno701018c2019-06-25 11:13:14 +0000313 }
314 },
315 "pdu": {
316 "v1": {
garciadeblas4568a372021-03-24 09:19:48 +0100317 "pdu_descriptors": {
318 "METHODS": ("GET", "POST"),
319 "ROLE_PERMISSION": "pduds:",
320 "<ID>": {
321 "METHODS": ("GET", "POST", "DELETE", "PATCH", "PUT"),
322 "ROLE_PERMISSION": "pduds:id:",
323 },
324 },
tierno701018c2019-06-25 11:13:14 +0000325 }
326 },
327 "nsd": {
328 "v1": {
garciadeblas4568a372021-03-24 09:19:48 +0100329 "ns_descriptors_content": {
330 "METHODS": ("GET", "POST"),
331 "ROLE_PERMISSION": "nsds:",
332 "<ID>": {
333 "METHODS": ("GET", "PUT", "DELETE"),
334 "ROLE_PERMISSION": "nsds:id:",
335 },
336 },
337 "ns_descriptors": {
338 "METHODS": ("GET", "POST"),
339 "ROLE_PERMISSION": "nsds:",
340 "<ID>": {
341 "METHODS": ("GET", "DELETE", "PATCH"),
342 "ROLE_PERMISSION": "nsds:id:",
343 "nsd_content": {
344 "METHODS": ("GET", "PUT"),
345 "ROLE_PERMISSION": "nsds:id:content:",
346 },
347 "nsd": {
348 "METHODS": ("GET",), # descriptor inside package
349 "ROLE_PERMISSION": "nsds:id:content:",
350 },
351 "artifacts": {
352 "METHODS": ("GET",),
353 "ROLE_PERMISSION": "nsds:id:nsd_artifact:",
354 "*": None,
355 },
356 },
357 },
358 "pnf_descriptors": {
359 "TODO": ("GET", "POST"),
360 "<ID>": {
361 "TODO": ("GET", "DELETE", "PATCH"),
362 "pnfd_content": {"TODO": ("GET", "PUT")},
363 },
364 },
365 "subscriptions": {
366 "TODO": ("GET", "POST"),
367 "<ID>": {"TODO": ("GET", "DELETE")},
368 },
tierno701018c2019-06-25 11:13:14 +0000369 }
370 },
371 "vnfpkgm": {
372 "v1": {
garciadeblas4568a372021-03-24 09:19:48 +0100373 "vnf_packages_content": {
374 "METHODS": ("GET", "POST"),
375 "ROLE_PERMISSION": "vnfds:",
376 "<ID>": {
377 "METHODS": ("GET", "PUT", "DELETE"),
378 "ROLE_PERMISSION": "vnfds:id:",
379 },
380 },
381 "vnf_packages": {
382 "METHODS": ("GET", "POST"),
383 "ROLE_PERMISSION": "vnfds:",
384 "<ID>": {
385 "METHODS": ("GET", "DELETE", "PATCH"), # GET: vnfPkgInfo
386 "ROLE_PERMISSION": "vnfds:id:",
387 "package_content": {
388 "METHODS": ("GET", "PUT"), # package
389 "ROLE_PERMISSION": "vnfds:id:",
390 "upload_from_uri": {
391 "METHODS": (),
392 "TODO": ("POST",),
393 "ROLE_PERMISSION": "vnfds:id:upload:",
394 },
395 },
396 "vnfd": {
397 "METHODS": ("GET",), # descriptor inside package
398 "ROLE_PERMISSION": "vnfds:id:content:",
399 },
400 "artifacts": {
401 "METHODS": ("GET",),
402 "ROLE_PERMISSION": "vnfds:id:vnfd_artifact:",
403 "*": None,
404 },
405 "action": {
406 "METHODS": ("POST",),
407 "ROLE_PERMISSION": "vnfds:id:action:",
408 },
409 },
410 },
411 "subscriptions": {
412 "TODO": ("GET", "POST"),
413 "<ID>": {"TODO": ("GET", "DELETE")},
414 },
415 "vnfpkg_op_occs": {
416 "METHODS": ("GET",),
417 "ROLE_PERMISSION": "vnfds:vnfpkgops:",
418 "<ID>": {"METHODS": ("GET",), "ROLE_PERMISSION": "vnfds:vnfpkgops:id:"},
419 },
tierno701018c2019-06-25 11:13:14 +0000420 }
421 },
422 "nslcm": {
423 "v1": {
garciadeblas4568a372021-03-24 09:19:48 +0100424 "ns_instances_content": {
425 "METHODS": ("GET", "POST"),
426 "ROLE_PERMISSION": "ns_instances:",
427 "<ID>": {
428 "METHODS": ("GET", "DELETE"),
429 "ROLE_PERMISSION": "ns_instances:id:",
430 },
431 },
432 "ns_instances": {
433 "METHODS": ("GET", "POST"),
434 "ROLE_PERMISSION": "ns_instances:",
435 "<ID>": {
436 "METHODS": ("GET", "DELETE"),
437 "ROLE_PERMISSION": "ns_instances:id:",
garciadeblas0964edf2022-02-11 00:43:44 +0100438 "heal": {
439 "METHODS": ("POST",),
440 "ROLE_PERMISSION": "ns_instances:id:heal:",
441 },
garciadeblas4568a372021-03-24 09:19:48 +0100442 "scale": {
443 "METHODS": ("POST",),
444 "ROLE_PERMISSION": "ns_instances:id:scale:",
445 },
446 "terminate": {
447 "METHODS": ("POST",),
448 "ROLE_PERMISSION": "ns_instances:id:terminate:",
449 },
450 "instantiate": {
451 "METHODS": ("POST",),
452 "ROLE_PERMISSION": "ns_instances:id:instantiate:",
453 },
elumalai8e3806c2022-04-28 17:26:24 +0530454 "migrate": {
455 "METHODS": ("POST",),
456 "ROLE_PERMISSION": "ns_instances:id:migrate:",
457 },
garciadeblas4568a372021-03-24 09:19:48 +0100458 "action": {
459 "METHODS": ("POST",),
460 "ROLE_PERMISSION": "ns_instances:id:action:",
461 },
aticig544a2ae2022-04-05 09:00:17 +0300462 "update": {
463 "METHODS": ("POST",),
464 "ROLE_PERMISSION": "ns_instances:id:update:",
465 },
govindarajul519da482022-04-29 19:05:22 +0530466 "verticalscale": {
467 "METHODS": ("POST",),
garciadeblasf2af4a12023-01-24 16:56:54 +0100468 "ROLE_PERMISSION": "ns_instances:id:verticalscale:",
469 },
garciadeblas4568a372021-03-24 09:19:48 +0100470 },
471 },
472 "ns_lcm_op_occs": {
473 "METHODS": ("GET",),
474 "ROLE_PERMISSION": "ns_instances:opps:",
475 "<ID>": {
476 "METHODS": ("GET",),
477 "ROLE_PERMISSION": "ns_instances:opps:id:",
478 },
479 },
480 "vnfrs": {
481 "METHODS": ("GET",),
482 "ROLE_PERMISSION": "vnf_instances:",
483 "<ID>": {"METHODS": ("GET",), "ROLE_PERMISSION": "vnf_instances:id:"},
484 },
485 "vnf_instances": {
486 "METHODS": ("GET",),
487 "ROLE_PERMISSION": "vnf_instances:",
488 "<ID>": {"METHODS": ("GET",), "ROLE_PERMISSION": "vnf_instances:id:"},
489 },
490 "subscriptions": {
491 "METHODS": ("GET", "POST"),
492 "ROLE_PERMISSION": "ns_subscriptions:",
493 "<ID>": {
494 "METHODS": ("GET", "DELETE"),
495 "ROLE_PERMISSION": "ns_subscriptions:id:",
496 },
497 },
tierno701018c2019-06-25 11:13:14 +0000498 }
499 },
almagiae47b9132022-05-17 14:12:22 +0200500 "vnflcm": {
501 "v1": {
garciadeblasf2af4a12023-01-24 16:56:54 +0100502 "vnf_instances": {
503 "METHODS": ("GET", "POST"),
504 "ROLE_PERMISSION": "vnflcm_instances:",
505 "<ID>": {
506 "METHODS": ("GET", "DELETE"),
507 "ROLE_PERMISSION": "vnflcm_instances:id:",
508 "scale": {
509 "METHODS": ("POST",),
510 "ROLE_PERMISSION": "vnflcm_instances:id:scale:",
511 },
512 "terminate": {
513 "METHODS": ("POST",),
514 "ROLE_PERMISSION": "vnflcm_instances:id:terminate:",
515 },
516 "instantiate": {
517 "METHODS": ("POST",),
518 "ROLE_PERMISSION": "vnflcm_instances:id:instantiate:",
519 },
520 },
521 },
522 "vnf_lcm_op_occs": {
523 "METHODS": ("GET",),
524 "ROLE_PERMISSION": "vnf_instances:opps:",
525 "<ID>": {
526 "METHODS": ("GET",),
527 "ROLE_PERMISSION": "vnf_instances:opps:id:",
528 },
529 },
530 "subscriptions": {
531 "METHODS": ("GET", "POST"),
532 "ROLE_PERMISSION": "vnflcm_subscriptions:",
533 "<ID>": {
534 "METHODS": ("GET", "DELETE"),
535 "ROLE_PERMISSION": "vnflcm_subscriptions:id:",
536 },
537 },
almagiae47b9132022-05-17 14:12:22 +0200538 }
539 },
tierno701018c2019-06-25 11:13:14 +0000540 "nst": {
541 "v1": {
garciadeblas4568a372021-03-24 09:19:48 +0100542 "netslice_templates_content": {
543 "METHODS": ("GET", "POST"),
544 "ROLE_PERMISSION": "slice_templates:",
545 "<ID>": {
546 "METHODS": ("GET", "PUT", "DELETE"),
547 "ROLE_PERMISSION": "slice_templates:id:",
548 },
549 },
550 "netslice_templates": {
551 "METHODS": ("GET", "POST"),
552 "ROLE_PERMISSION": "slice_templates:",
553 "<ID>": {
554 "METHODS": ("GET", "DELETE"),
555 "TODO": ("PATCH",),
556 "ROLE_PERMISSION": "slice_templates:id:",
557 "nst_content": {
558 "METHODS": ("GET", "PUT"),
559 "ROLE_PERMISSION": "slice_templates:id:content:",
560 },
561 "nst": {
562 "METHODS": ("GET",), # descriptor inside package
563 "ROLE_PERMISSION": "slice_templates:id:content:",
564 },
565 "artifacts": {
566 "METHODS": ("GET",),
567 "ROLE_PERMISSION": "slice_templates:id:content:",
568 "*": None,
569 },
570 },
571 },
572 "subscriptions": {
573 "TODO": ("GET", "POST"),
574 "<ID>": {"TODO": ("GET", "DELETE")},
575 },
tierno701018c2019-06-25 11:13:14 +0000576 }
577 },
578 "nsilcm": {
579 "v1": {
garciadeblas4568a372021-03-24 09:19:48 +0100580 "netslice_instances_content": {
581 "METHODS": ("GET", "POST"),
582 "ROLE_PERMISSION": "slice_instances:",
583 "<ID>": {
584 "METHODS": ("GET", "DELETE"),
585 "ROLE_PERMISSION": "slice_instances:id:",
586 },
587 },
588 "netslice_instances": {
589 "METHODS": ("GET", "POST"),
590 "ROLE_PERMISSION": "slice_instances:",
591 "<ID>": {
592 "METHODS": ("GET", "DELETE"),
593 "ROLE_PERMISSION": "slice_instances:id:",
594 "terminate": {
595 "METHODS": ("POST",),
596 "ROLE_PERMISSION": "slice_instances:id:terminate:",
597 },
598 "instantiate": {
599 "METHODS": ("POST",),
600 "ROLE_PERMISSION": "slice_instances:id:instantiate:",
601 },
602 "action": {
603 "METHODS": ("POST",),
604 "ROLE_PERMISSION": "slice_instances:id:action:",
605 },
606 },
607 },
608 "nsi_lcm_op_occs": {
609 "METHODS": ("GET",),
610 "ROLE_PERMISSION": "slice_instances:opps:",
611 "<ID>": {
612 "METHODS": ("GET",),
613 "ROLE_PERMISSION": "slice_instances:opps:id:",
614 },
615 },
tierno701018c2019-06-25 11:13:14 +0000616 }
617 },
618 "nspm": {
619 "v1": {
620 "pm_jobs": {
621 "<ID>": {
622 "reports": {
garciadeblas4568a372021-03-24 09:19:48 +0100623 "<ID>": {
624 "METHODS": ("GET",),
625 "ROLE_PERMISSION": "reports:id:",
626 }
tierno701018c2019-06-25 11:13:14 +0000627 }
628 },
629 },
630 },
631 },
Atul Agarwalb6480fc2021-03-18 08:19:32 +0000632 "nsfm": {
633 "v1": {
garciadeblasf2af4a12023-01-24 16:56:54 +0100634 "alarms": {
635 "METHODS": ("GET", "PATCH"),
636 "ROLE_PERMISSION": "alarms:",
637 "<ID>": {
638 "METHODS": ("GET", "PATCH"),
639 "ROLE_PERMISSION": "alarms:id:",
640 },
641 }
Atul Agarwalb6480fc2021-03-18 08:19:32 +0000642 },
643 },
tierno701018c2019-06-25 11:13:14 +0000644}
645
tiernoc94c3df2018-02-09 15:38:54 +0100646
647class NbiException(Exception):
tiernoc94c3df2018-02-09 15:38:54 +0100648 def __init__(self, message, http_code=HTTPStatus.METHOD_NOT_ALLOWED):
649 Exception.__init__(self, message)
650 self.http_code = http_code
651
652
653class Server(object):
654 instance = 0
655 # to decode bytes to str
656 reader = getreader("utf-8")
657
658 def __init__(self):
659 self.instance += 1
tierno701018c2019-06-25 11:13:14 +0000660 self.authenticator = Authenticator(valid_url_methods, valid_query_string)
delacruzramoad682a52019-12-10 16:26:34 +0100661 self.engine = Engine(self.authenticator)
tiernoc94c3df2018-02-09 15:38:54 +0100662
tiernoc94c3df2018-02-09 15:38:54 +0100663 def _format_in(self, kwargs):
garciadeblasf2af4a12023-01-24 16:56:54 +0100664 error_text = "" # error_text must be initialized outside try
tiernoc94c3df2018-02-09 15:38:54 +0100665 try:
666 indata = None
667 if cherrypy.request.body.length:
668 error_text = "Invalid input format "
669
670 if "Content-Type" in cherrypy.request.headers:
671 if "application/json" in cherrypy.request.headers["Content-Type"]:
672 error_text = "Invalid json format "
673 indata = json.load(self.reader(cherrypy.request.body))
gcalvinode4adfe2018-10-30 11:46:09 +0100674 cherrypy.request.headers.pop("Content-File-MD5", None)
tiernoc94c3df2018-02-09 15:38:54 +0100675 elif "application/yaml" in cherrypy.request.headers["Content-Type"]:
676 error_text = "Invalid yaml format "
garciadeblas4cd875d2023-02-14 19:05:34 +0100677 indata = yaml.safe_load(cherrypy.request.body)
gcalvinode4adfe2018-10-30 11:46:09 +0100678 cherrypy.request.headers.pop("Content-File-MD5", None)
garciadeblas4568a372021-03-24 09:19:48 +0100679 elif (
680 "application/binary" in cherrypy.request.headers["Content-Type"]
681 or "application/gzip"
682 in cherrypy.request.headers["Content-Type"]
683 or "application/zip" in cherrypy.request.headers["Content-Type"]
684 or "text/plain" in cherrypy.request.headers["Content-Type"]
685 ):
tiernof27c79b2018-03-12 17:08:42 +0100686 indata = cherrypy.request.body # .read()
garciadeblas4568a372021-03-24 09:19:48 +0100687 elif (
688 "multipart/form-data"
689 in cherrypy.request.headers["Content-Type"]
690 ):
tiernoc94c3df2018-02-09 15:38:54 +0100691 if "descriptor_file" in kwargs:
692 filecontent = kwargs.pop("descriptor_file")
693 if not filecontent.file:
garciadeblas4568a372021-03-24 09:19:48 +0100694 raise NbiException(
695 "empty file or content", HTTPStatus.BAD_REQUEST
696 )
tiernof27c79b2018-03-12 17:08:42 +0100697 indata = filecontent.file # .read()
tiernoc94c3df2018-02-09 15:38:54 +0100698 if filecontent.content_type.value:
garciadeblas4568a372021-03-24 09:19:48 +0100699 cherrypy.request.headers[
700 "Content-Type"
701 ] = filecontent.content_type.value
tiernoc94c3df2018-02-09 15:38:54 +0100702 else:
703 # raise cherrypy.HTTPError(HTTPStatus.Not_Acceptable,
704 # "Only 'Content-Type' of type 'application/json' or
705 # 'application/yaml' for input format are available")
706 error_text = "Invalid yaml format "
garciadeblas4cd875d2023-02-14 19:05:34 +0100707 indata = yaml.safe_load(cherrypy.request.body)
gcalvinode4adfe2018-10-30 11:46:09 +0100708 cherrypy.request.headers.pop("Content-File-MD5", None)
tiernoc94c3df2018-02-09 15:38:54 +0100709 else:
710 error_text = "Invalid yaml format "
garciadeblas4cd875d2023-02-14 19:05:34 +0100711 indata = yaml.safe_load(cherrypy.request.body)
gcalvinode4adfe2018-10-30 11:46:09 +0100712 cherrypy.request.headers.pop("Content-File-MD5", None)
tiernoc94c3df2018-02-09 15:38:54 +0100713 if not indata:
714 indata = {}
715
tiernoc94c3df2018-02-09 15:38:54 +0100716 format_yaml = False
717 if cherrypy.request.headers.get("Query-String-Format") == "yaml":
718 format_yaml = True
719
720 for k, v in kwargs.items():
721 if isinstance(v, str):
722 if v == "":
723 kwargs[k] = None
724 elif format_yaml:
725 try:
garciadeblas4cd875d2023-02-14 19:05:34 +0100726 kwargs[k] = yaml.safe_load(v)
tiernoe1281182018-05-22 12:24:36 +0200727 except Exception:
tiernoc94c3df2018-02-09 15:38:54 +0100728 pass
garciadeblas4568a372021-03-24 09:19:48 +0100729 elif (
730 k.endswith(".gt")
731 or k.endswith(".lt")
732 or k.endswith(".gte")
733 or k.endswith(".lte")
734 ):
tiernoc94c3df2018-02-09 15:38:54 +0100735 try:
736 kwargs[k] = int(v)
tiernoe1281182018-05-22 12:24:36 +0200737 except Exception:
tiernoc94c3df2018-02-09 15:38:54 +0100738 try:
739 kwargs[k] = float(v)
tiernoe1281182018-05-22 12:24:36 +0200740 except Exception:
tiernoc94c3df2018-02-09 15:38:54 +0100741 pass
742 elif v.find(",") > 0:
743 kwargs[k] = v.split(",")
744 elif isinstance(v, (list, tuple)):
745 for index in range(0, len(v)):
746 if v[index] == "":
747 v[index] = None
748 elif format_yaml:
749 try:
garciadeblas4cd875d2023-02-14 19:05:34 +0100750 v[index] = yaml.safe_load(v[index])
tiernoe1281182018-05-22 12:24:36 +0200751 except Exception:
tiernoc94c3df2018-02-09 15:38:54 +0100752 pass
753
tiernof27c79b2018-03-12 17:08:42 +0100754 return indata
tiernoc94c3df2018-02-09 15:38:54 +0100755 except (ValueError, yaml.YAMLError) as exc:
756 raise NbiException(error_text + str(exc), HTTPStatus.BAD_REQUEST)
757 except KeyError as exc:
garciadeblas4568a372021-03-24 09:19:48 +0100758 raise NbiException(
759 "Query string error: " + str(exc), HTTPStatus.BAD_REQUEST
760 )
tiernob92094f2018-05-11 13:44:22 +0200761 except Exception as exc:
762 raise NbiException(error_text + str(exc), HTTPStatus.BAD_REQUEST)
tiernoc94c3df2018-02-09 15:38:54 +0100763
764 @staticmethod
tierno701018c2019-06-25 11:13:14 +0000765 def _format_out(data, token_info=None, _format=None):
tiernoc94c3df2018-02-09 15:38:54 +0100766 """
767 return string of dictionary data according to requested json, yaml, xml. By default json
tiernof27c79b2018-03-12 17:08:42 +0100768 :param data: response to be sent. Can be a dict, text or file
tierno701018c2019-06-25 11:13:14 +0000769 :param token_info: Contains among other username and project
tierno5792d7d2019-08-30 15:37:12 +0000770 :param _format: The format to be set as Content-Type if data is a file
tiernoc94c3df2018-02-09 15:38:54 +0100771 :return: None
772 """
tierno0f98af52018-03-19 10:28:22 +0100773 accept = cherrypy.request.headers.get("Accept")
tiernof27c79b2018-03-12 17:08:42 +0100774 if data is None:
tierno0f98af52018-03-19 10:28:22 +0100775 if accept and "text/html" in accept:
garciadeblas4568a372021-03-24 09:19:48 +0100776 return html.format(
777 data, cherrypy.request, cherrypy.response, token_info
778 )
tierno09c073e2018-04-26 13:36:48 +0200779 # cherrypy.response.status = HTTPStatus.NO_CONTENT.value
tiernof27c79b2018-03-12 17:08:42 +0100780 return
781 elif hasattr(data, "read"): # file object
782 if _format:
783 cherrypy.response.headers["Content-Type"] = _format
784 elif "b" in data.mode: # binariy asssumig zip
garciadeblas4568a372021-03-24 09:19:48 +0100785 cherrypy.response.headers["Content-Type"] = "application/zip"
tiernof27c79b2018-03-12 17:08:42 +0100786 else:
garciadeblas4568a372021-03-24 09:19:48 +0100787 cherrypy.response.headers["Content-Type"] = "text/plain"
tiernof27c79b2018-03-12 17:08:42 +0100788 # TODO check that cherrypy close file. If not implement pending things to close per thread next
789 return data
tierno0f98af52018-03-19 10:28:22 +0100790 if accept:
Frank Bryden02e700c2020-06-03 13:34:16 +0000791 if "text/html" in accept:
garciadeblas4568a372021-03-24 09:19:48 +0100792 return html.format(
793 data, cherrypy.request, cherrypy.response, token_info
794 )
Frank Brydenb5422da2020-08-10 11:44:11 +0000795 elif "application/yaml" in accept or "*/*" in accept:
tiernoc94c3df2018-02-09 15:38:54 +0100796 pass
garciadeblas4568a372021-03-24 09:19:48 +0100797 elif "application/json" in accept or (
798 cherrypy.response.status and cherrypy.response.status >= 300
799 ):
800 cherrypy.response.headers[
801 "Content-Type"
802 ] = "application/json; charset=utf-8"
Frank Bryden02e700c2020-06-03 13:34:16 +0000803 a = json.dumps(data, indent=4) + "\n"
garciadeblas4568a372021-03-24 09:19:48 +0100804 return a.encode("utf8")
805 cherrypy.response.headers["Content-Type"] = "application/yaml"
806 return yaml.safe_dump(
807 data,
808 explicit_start=True,
809 indent=4,
810 default_flow_style=False,
811 tags=False,
812 encoding="utf-8",
813 allow_unicode=True,
814 ) # , canonical=True, default_style='"'
tiernoc94c3df2018-02-09 15:38:54 +0100815
816 @cherrypy.expose
817 def index(self, *args, **kwargs):
tierno701018c2019-06-25 11:13:14 +0000818 token_info = None
tiernoc94c3df2018-02-09 15:38:54 +0100819 try:
820 if cherrypy.request.method == "GET":
tierno701018c2019-06-25 11:13:14 +0000821 token_info = self.authenticator.authorize()
garciadeblas4568a372021-03-24 09:19:48 +0100822 outdata = token_info # Home page
tiernoc94c3df2018-02-09 15:38:54 +0100823 else:
garciadeblas4568a372021-03-24 09:19:48 +0100824 raise cherrypy.HTTPError(
825 HTTPStatus.METHOD_NOT_ALLOWED.value,
826 "Method {} not allowed for tokens".format(cherrypy.request.method),
827 )
tiernoc94c3df2018-02-09 15:38:54 +0100828
tierno701018c2019-06-25 11:13:14 +0000829 return self._format_out(outdata, token_info)
tiernoc94c3df2018-02-09 15:38:54 +0100830
Eduardo Sousa819d34c2018-07-31 01:20:02 +0100831 except (EngineException, AuthException) as e:
tierno701018c2019-06-25 11:13:14 +0000832 # cherrypy.log("index Exception {}".format(e))
tiernoc94c3df2018-02-09 15:38:54 +0100833 cherrypy.response.status = e.http_code.value
tierno701018c2019-06-25 11:13:14 +0000834 return self._format_out("Welcome to OSM!", token_info)
tiernoc94c3df2018-02-09 15:38:54 +0100835
836 @cherrypy.expose
tierno55945e72018-04-06 16:40:27 +0200837 def version(self, *args, **kwargs):
tiernodfe09572018-04-24 10:41:10 +0200838 # TODO consider to remove and provide version using the static version file
tierno55945e72018-04-06 16:40:27 +0200839 try:
840 if cherrypy.request.method != "GET":
garciadeblas4568a372021-03-24 09:19:48 +0100841 raise NbiException(
842 "Only method GET is allowed", HTTPStatus.METHOD_NOT_ALLOWED
843 )
tierno55945e72018-04-06 16:40:27 +0200844 elif args or kwargs:
garciadeblas4568a372021-03-24 09:19:48 +0100845 raise NbiException(
846 "Invalid URL or query string for version",
847 HTTPStatus.METHOD_NOT_ALLOWED,
848 )
tierno9c630112019-08-29 14:21:41 +0000849 # TODO include version of other modules, pick up from some kafka admin message
tierno5792d7d2019-08-30 15:37:12 +0000850 osm_nbi_version = {"version": nbi_version, "date": nbi_version_date}
851 return self._format_out(osm_nbi_version)
tierno55945e72018-04-06 16:40:27 +0200852 except NbiException as e:
853 cherrypy.response.status = e.http_code.value
854 problem_details = {
855 "code": e.http_code.name,
856 "status": e.http_code.value,
857 "detail": str(e),
858 }
859 return self._format_out(problem_details, None)
860
tierno12eac3c2020-03-19 23:22:08 +0000861 def domain(self):
862 try:
863 domains = {
garciadeblas4568a372021-03-24 09:19:48 +0100864 "user_domain_name": cherrypy.tree.apps["/osm"]
865 .config["authentication"]
866 .get("user_domain_name"),
867 "project_domain_name": cherrypy.tree.apps["/osm"]
868 .config["authentication"]
869 .get("project_domain_name"),
870 }
tierno12eac3c2020-03-19 23:22:08 +0000871 return self._format_out(domains)
872 except NbiException as e:
873 cherrypy.response.status = e.http_code.value
874 problem_details = {
875 "code": e.http_code.name,
876 "status": e.http_code.value,
877 "detail": str(e),
878 }
879 return self._format_out(problem_details, None)
880
tiernoa5035702019-07-29 08:54:42 +0000881 @staticmethod
882 def _format_login(token_info):
883 """
884 Changes cherrypy.request.login to include username/project_name;session so that cherrypy access log will
885 log this information
886 :param token_info: Dictionary with token content
887 :return: None
888 """
889 cherrypy.request.login = token_info.get("username", "-")
890 if token_info.get("project_name"):
891 cherrypy.request.login += "/" + token_info["project_name"]
892 if token_info.get("id"):
893 cherrypy.request.login += ";session=" + token_info["id"][0:12]
894
Atul Agarwalb6480fc2021-03-18 08:19:32 +0000895 # NS Fault Management
896 @cherrypy.expose
garciadeblasf2af4a12023-01-24 16:56:54 +0100897 def nsfm(
898 self,
899 version=None,
900 topic=None,
901 uuid=None,
902 project_name=None,
903 ns_id=None,
904 *args,
905 **kwargs
906 ):
907 if topic == "alarms":
Atul Agarwalb6480fc2021-03-18 08:19:32 +0000908 try:
909 method = cherrypy.request.method
garciadeblasf2af4a12023-01-24 16:56:54 +0100910 role_permission = self._check_valid_url_method(
911 method, "nsfm", version, topic, None, None, *args
912 )
913 query_string_operations = self._extract_query_string_operations(
914 kwargs, method
915 )
Atul Agarwalb6480fc2021-03-18 08:19:32 +0000916
garciadeblasf2af4a12023-01-24 16:56:54 +0100917 self.authenticator.authorize(
918 role_permission, query_string_operations, None
919 )
Atul Agarwalb6480fc2021-03-18 08:19:32 +0000920
921 # to handle get request
garciadeblasf2af4a12023-01-24 16:56:54 +0100922 if cherrypy.request.method == "GET":
Atul Agarwalb6480fc2021-03-18 08:19:32 +0000923 # if request is on basis of uuid
garciadeblasf2af4a12023-01-24 16:56:54 +0100924 if uuid and uuid != "None":
Atul Agarwalb6480fc2021-03-18 08:19:32 +0000925 try:
926 alarm = self.engine.db.get_one("alarms", {"uuid": uuid})
garciadeblasf2af4a12023-01-24 16:56:54 +0100927 alarm_action = self.engine.db.get_one(
928 "alarms_action", {"uuid": uuid}
929 )
Atul Agarwalb6480fc2021-03-18 08:19:32 +0000930 alarm.update(alarm_action)
garciadeblasf2af4a12023-01-24 16:56:54 +0100931 vnf = self.engine.db.get_one(
932 "vnfrs", {"nsr-id-ref": alarm["tags"]["ns_id"]}
933 )
Atul Agarwalb6480fc2021-03-18 08:19:32 +0000934 alarm["vnf-id"] = vnf["_id"]
935 return self._format_out(str(alarm))
936 except Exception:
937 return self._format_out("Please provide valid alarm uuid")
garciadeblasf2af4a12023-01-24 16:56:54 +0100938 elif ns_id and ns_id != "None":
Atul Agarwalb6480fc2021-03-18 08:19:32 +0000939 # if request is on basis of ns_id
940 try:
garciadeblasf2af4a12023-01-24 16:56:54 +0100941 alarms = self.engine.db.get_list(
942 "alarms", {"tags.ns_id": ns_id}
943 )
Atul Agarwalb6480fc2021-03-18 08:19:32 +0000944 for alarm in alarms:
garciadeblasf2af4a12023-01-24 16:56:54 +0100945 alarm_action = self.engine.db.get_one(
946 "alarms_action", {"uuid": alarm["uuid"]}
947 )
Atul Agarwalb6480fc2021-03-18 08:19:32 +0000948 alarm.update(alarm_action)
949 return self._format_out(str(alarms))
950 except Exception:
951 return self._format_out("Please provide valid ns id")
952 else:
953 # to return only alarm which are related to given project
garciadeblasf2af4a12023-01-24 16:56:54 +0100954 project = self.engine.db.get_one(
955 "projects", {"name": project_name}
956 )
957 project_id = project.get("_id")
958 ns_list = self.engine.db.get_list(
959 "nsrs", {"_admin.projects_read": project_id}
960 )
Atul Agarwalb6480fc2021-03-18 08:19:32 +0000961 ns_ids = []
962 for ns in ns_list:
963 ns_ids.append(ns.get("_id"))
964 alarms = self.engine.db.get_list("alarms")
garciadeblasf2af4a12023-01-24 16:56:54 +0100965 alarm_list = [
966 alarm
967 for alarm in alarms
968 if alarm["tags"]["ns_id"] in ns_ids
969 ]
Atul Agarwalb6480fc2021-03-18 08:19:32 +0000970 for alrm in alarm_list:
garciadeblasf2af4a12023-01-24 16:56:54 +0100971 action = self.engine.db.get_one(
972 "alarms_action", {"uuid": alrm.get("uuid")}
973 )
Atul Agarwalb6480fc2021-03-18 08:19:32 +0000974 alrm.update(action)
975 return self._format_out(str(alarm_list))
976 # to handle patch request for alarm update
garciadeblasf2af4a12023-01-24 16:56:54 +0100977 elif cherrypy.request.method == "PATCH":
garciadeblas4cd875d2023-02-14 19:05:34 +0100978 data = yaml.safe_load(cherrypy.request.body)
Atul Agarwalb6480fc2021-03-18 08:19:32 +0000979 try:
980 # check if uuid is valid
981 self.engine.db.get_one("alarms", {"uuid": data.get("uuid")})
982 except Exception:
983 return self._format_out("Please provide valid alarm uuid.")
984 if data.get("is_enable") is not None:
985 if data.get("is_enable"):
garciadeblasf2af4a12023-01-24 16:56:54 +0100986 alarm_status = "ok"
Atul Agarwalb6480fc2021-03-18 08:19:32 +0000987 else:
garciadeblasf2af4a12023-01-24 16:56:54 +0100988 alarm_status = "disabled"
989 self.engine.db.set_one(
990 "alarms",
991 {"uuid": data.get("uuid")},
992 {"alarm_status": alarm_status},
993 )
Atul Agarwalb6480fc2021-03-18 08:19:32 +0000994 else:
garciadeblasf2af4a12023-01-24 16:56:54 +0100995 self.engine.db.set_one(
996 "alarms",
997 {"uuid": data.get("uuid")},
998 {"threshold": data.get("threshold")},
999 )
Atul Agarwalb6480fc2021-03-18 08:19:32 +00001000 return self._format_out("Alarm updated")
1001 except Exception as e:
garciadeblasf2af4a12023-01-24 16:56:54 +01001002 if isinstance(
1003 e,
1004 (
1005 NbiException,
1006 EngineException,
1007 DbException,
1008 FsException,
1009 MsgException,
1010 AuthException,
1011 ValidationError,
1012 AuthconnException,
1013 ),
1014 ):
Atul Agarwalb6480fc2021-03-18 08:19:32 +00001015 http_code_value = cherrypy.response.status = e.http_code.value
1016 http_code_name = e.http_code.name
1017 cherrypy.log("Exception {}".format(e))
1018 else:
garciadeblasf2af4a12023-01-24 16:56:54 +01001019 http_code_value = (
1020 cherrypy.response.status
1021 ) = HTTPStatus.BAD_REQUEST.value # INTERNAL_SERVER_ERROR
Atul Agarwalb6480fc2021-03-18 08:19:32 +00001022 cherrypy.log("CRITICAL: Exception {}".format(e), traceback=True)
1023 http_code_name = HTTPStatus.BAD_REQUEST.name
1024 problem_details = {
1025 "code": http_code_name,
1026 "status": http_code_value,
1027 "detail": str(e),
1028 }
1029 return self._format_out(problem_details)
1030
tierno55945e72018-04-06 16:40:27 +02001031 @cherrypy.expose
tiernof27c79b2018-03-12 17:08:42 +01001032 def token(self, method, token_id=None, kwargs=None):
tierno701018c2019-06-25 11:13:14 +00001033 token_info = None
tiernoc94c3df2018-02-09 15:38:54 +01001034 # self.engine.load_dbase(cherrypy.request.app.config)
tiernof27c79b2018-03-12 17:08:42 +01001035 indata = self._format_in(kwargs)
1036 if not isinstance(indata, dict):
garciadeblas4568a372021-03-24 09:19:48 +01001037 raise NbiException(
1038 "Expected application/yaml or application/json Content-Type",
1039 HTTPStatus.BAD_REQUEST,
1040 )
tiernoa5035702019-07-29 08:54:42 +00001041
1042 if method == "GET":
1043 token_info = self.authenticator.authorize()
1044 # for logging
1045 self._format_login(token_info)
1046 if token_id:
1047 outdata = self.authenticator.get_token(token_info, token_id)
tiernoc94c3df2018-02-09 15:38:54 +01001048 else:
tiernoa5035702019-07-29 08:54:42 +00001049 outdata = self.authenticator.get_token_list(token_info)
1050 elif method == "POST":
1051 try:
1052 token_info = self.authenticator.authorize()
1053 except Exception:
1054 token_info = None
1055 if kwargs:
1056 indata.update(kwargs)
1057 # This is needed to log the user when authentication fails
1058 cherrypy.request.login = "{}".format(indata.get("username", "-"))
garciadeblas4568a372021-03-24 09:19:48 +01001059 outdata = token_info = self.authenticator.new_token(
1060 token_info, indata, cherrypy.request.remote
1061 )
garciadeblasf2af4a12023-01-24 16:56:54 +01001062 cherrypy.session["Authorization"] = outdata["_id"] # pylint: disable=E1101
tiernoa5035702019-07-29 08:54:42 +00001063 self._set_location_header("admin", "v1", "tokens", outdata["_id"])
1064 # for logging
1065 self._format_login(token_info)
selvi.ja9a1fc82022-04-04 06:54:30 +00001066 # password expiry check
1067 if self.authenticator.check_password_expiry(outdata):
garciadeblasf2af4a12023-01-24 16:56:54 +01001068 outdata = {
1069 "id": outdata["id"],
1070 "message": "change_password",
1071 "user_id": outdata["user_id"],
1072 }
tiernoa5035702019-07-29 08:54:42 +00001073 # cherrypy.response.cookie["Authorization"] = outdata["id"]
1074 # cherrypy.response.cookie["Authorization"]['expires'] = 3600
elumalai7802ff82023-04-24 20:38:32 +05301075 cef_event(
1076 cef_logger,
1077 {
1078 "name": "User Login",
1079 "sourceUserName": token_info.get("username"),
1080 "message": "User Logged In, Project={} Outcome=Success".format(
1081 token_info.get("project_name")
1082 ),
1083 },
1084 )
1085 cherrypy.log("{}".format(cef_logger))
tiernoa5035702019-07-29 08:54:42 +00001086 elif method == "DELETE":
1087 if not token_id and "id" in kwargs:
1088 token_id = kwargs["id"]
1089 elif not token_id:
1090 token_info = self.authenticator.authorize()
1091 # for logging
1092 self._format_login(token_info)
1093 token_id = token_info["_id"]
elumalai7802ff82023-04-24 20:38:32 +05301094 token_details = self.engine.db.get_one("tokens", {"_id": token_id})
1095 current_user = token_details.get("username")
1096 current_project = token_details.get("project_name")
tiernoa5035702019-07-29 08:54:42 +00001097 outdata = self.authenticator.del_token(token_id)
1098 token_info = None
garciadeblasf2af4a12023-01-24 16:56:54 +01001099 cherrypy.session["Authorization"] = "logout" # pylint: disable=E1101
elumalai7802ff82023-04-24 20:38:32 +05301100 cef_event(
1101 cef_logger,
1102 {
1103 "name": "User Logout",
1104 "sourceUserName": current_user,
1105 "message": "User Logged Out, Project={} Outcome=Success".format(
1106 current_project
1107 ),
1108 },
1109 )
1110 cherrypy.log("{}".format(cef_logger))
tiernoa5035702019-07-29 08:54:42 +00001111 # cherrypy.response.cookie["Authorization"] = token_id
1112 # cherrypy.response.cookie["Authorization"]['expires'] = 0
1113 else:
garciadeblas4568a372021-03-24 09:19:48 +01001114 raise NbiException(
1115 "Method {} not allowed for token".format(method),
1116 HTTPStatus.METHOD_NOT_ALLOWED,
1117 )
tiernoa5035702019-07-29 08:54:42 +00001118 return self._format_out(outdata, token_info)
tiernoc94c3df2018-02-09 15:38:54 +01001119
1120 @cherrypy.expose
1121 def test(self, *args, **kwargs):
garciadeblas4568a372021-03-24 09:19:48 +01001122 if not cherrypy.config.get("server.enable_test") or (
1123 isinstance(cherrypy.config["server.enable_test"], str)
1124 and cherrypy.config["server.enable_test"].lower() == "false"
1125 ):
tierno4836bac2020-01-15 14:41:48 +00001126 cherrypy.response.status = HTTPStatus.METHOD_NOT_ALLOWED.value
1127 return "test URL is disabled"
tiernoc94c3df2018-02-09 15:38:54 +01001128 thread_info = None
tiernof27c79b2018-03-12 17:08:42 +01001129 if args and args[0] == "help":
garciadeblas4568a372021-03-24 09:19:48 +01001130 return (
1131 "<html><pre>\ninit\nfile/<name> download file\ndb-clear/table\nfs-clear[/folder]\nlogin\nlogin2\n"
1132 "sleep/<time>\nmessage/topic\n</pre></html>"
1133 )
tiernof27c79b2018-03-12 17:08:42 +01001134
1135 elif args and args[0] == "init":
tiernoc94c3df2018-02-09 15:38:54 +01001136 try:
1137 # self.engine.load_dbase(cherrypy.request.app.config)
garciadeblasf2af4a12023-01-24 16:56:54 +01001138 pid = self.authenticator.create_admin_project()
1139 self.authenticator.create_admin_user(pid)
tiernoc94c3df2018-02-09 15:38:54 +01001140 return "Done. User 'admin', password 'admin' created"
1141 except Exception:
1142 cherrypy.response.status = HTTPStatus.FORBIDDEN.value
1143 return self._format_out("Database already initialized")
tiernof27c79b2018-03-12 17:08:42 +01001144 elif args and args[0] == "file":
garciadeblas4568a372021-03-24 09:19:48 +01001145 return cherrypy.lib.static.serve_file(
1146 cherrypy.tree.apps["/osm"].config["storage"]["path"] + "/" + args[1],
1147 "text/plain",
1148 "attachment",
1149 )
tiernof27c79b2018-03-12 17:08:42 +01001150 elif args and args[0] == "file2":
garciadeblas4568a372021-03-24 09:19:48 +01001151 f_path = (
1152 cherrypy.tree.apps["/osm"].config["storage"]["path"] + "/" + args[1]
1153 )
tiernof27c79b2018-03-12 17:08:42 +01001154 f = open(f_path, "r")
1155 cherrypy.response.headers["Content-type"] = "text/plain"
tiernof27c79b2018-03-12 17:08:42 +01001156 return f
tierno55945e72018-04-06 16:40:27 +02001157
tiernof27c79b2018-03-12 17:08:42 +01001158 elif len(args) == 2 and args[0] == "db-clear":
tiernof717cbe2018-12-03 16:35:42 +00001159 deleted_info = self.engine.db.del_list(args[1], kwargs)
1160 return "{} {} deleted\n".format(deleted_info["deleted"], args[1])
1161 elif len(args) and args[0] == "fs-clear":
1162 if len(args) >= 2:
1163 folders = (args[1],)
1164 else:
1165 folders = self.engine.fs.dir_ls(".")
1166 for folder in folders:
1167 self.engine.fs.file_delete(folder)
1168 return ",".join(folders) + " folders deleted\n"
tiernoc94c3df2018-02-09 15:38:54 +01001169 elif args and args[0] == "login":
1170 if not cherrypy.request.headers.get("Authorization"):
garciadeblas4568a372021-03-24 09:19:48 +01001171 cherrypy.response.headers[
1172 "WWW-Authenticate"
1173 ] = 'Basic realm="Access to OSM site", charset="UTF-8"'
tiernoc94c3df2018-02-09 15:38:54 +01001174 cherrypy.response.status = HTTPStatus.UNAUTHORIZED.value
1175 elif args and args[0] == "login2":
1176 if not cherrypy.request.headers.get("Authorization"):
garciadeblas4568a372021-03-24 09:19:48 +01001177 cherrypy.response.headers[
1178 "WWW-Authenticate"
1179 ] = 'Bearer realm="Access to OSM site"'
tiernoc94c3df2018-02-09 15:38:54 +01001180 cherrypy.response.status = HTTPStatus.UNAUTHORIZED.value
1181 elif args and args[0] == "sleep":
1182 sleep_time = 5
1183 try:
1184 sleep_time = int(args[1])
1185 except Exception:
1186 cherrypy.response.status = HTTPStatus.FORBIDDEN.value
1187 return self._format_out("Database already initialized")
1188 thread_info = cherrypy.thread_data
1189 print(thread_info)
1190 time.sleep(sleep_time)
1191 # thread_info
1192 elif len(args) >= 2 and args[0] == "message":
tiernob24258a2018-10-04 18:39:49 +02001193 main_topic = args[1]
1194 return_text = "<html><pre>{} ->\n".format(main_topic)
tiernoc94c3df2018-02-09 15:38:54 +01001195 try:
garciadeblas4568a372021-03-24 09:19:48 +01001196 if cherrypy.request.method == "POST":
garciadeblas4cd875d2023-02-14 19:05:34 +01001197 to_send = yaml.safe_load(cherrypy.request.body)
tierno55945e72018-04-06 16:40:27 +02001198 for k, v in to_send.items():
tiernob24258a2018-10-04 18:39:49 +02001199 self.engine.msg.write(main_topic, k, v)
tierno55945e72018-04-06 16:40:27 +02001200 return_text += " {}: {}\n".format(k, v)
garciadeblas4568a372021-03-24 09:19:48 +01001201 elif cherrypy.request.method == "GET":
tierno55945e72018-04-06 16:40:27 +02001202 for k, v in kwargs.items():
garciadeblas4cd875d2023-02-14 19:05:34 +01001203 v_dict = yaml.safe_load(v)
tiernof1509b22020-05-12 14:32:37 +00001204 self.engine.msg.write(main_topic, k, v_dict)
1205 return_text += " {}: {}\n".format(k, v_dict)
tiernoc94c3df2018-02-09 15:38:54 +01001206 except Exception as e:
tierno55945e72018-04-06 16:40:27 +02001207 return_text += "Error: " + str(e)
1208 return_text += "</pre></html>\n"
1209 return return_text
tiernoc94c3df2018-02-09 15:38:54 +01001210
1211 return_text = (
garciadeblas4568a372021-03-24 09:19:48 +01001212 "<html><pre>\nheaders:\n args: {}\n".format(args)
1213 + " kwargs: {}\n".format(kwargs)
1214 + " headers: {}\n".format(cherrypy.request.headers)
1215 + " path_info: {}\n".format(cherrypy.request.path_info)
1216 + " query_string: {}\n".format(cherrypy.request.query_string)
garciadeblasf2af4a12023-01-24 16:56:54 +01001217 + " session: {}\n".format(cherrypy.session) # pylint: disable=E1101
garciadeblas4568a372021-03-24 09:19:48 +01001218 + " cookie: {}\n".format(cherrypy.request.cookie)
1219 + " method: {}\n".format(cherrypy.request.method)
garciadeblasf2af4a12023-01-24 16:56:54 +01001220 + " session: {}\n".format(
1221 cherrypy.session.get("fieldname") # pylint: disable=E1101
1222 )
garciadeblas4568a372021-03-24 09:19:48 +01001223 + " body:\n"
1224 )
tiernoc94c3df2018-02-09 15:38:54 +01001225 return_text += " length: {}\n".format(cherrypy.request.body.length)
1226 if cherrypy.request.body.length:
1227 return_text += " content: {}\n".format(
garciadeblas4568a372021-03-24 09:19:48 +01001228 str(
1229 cherrypy.request.body.read(
1230 int(cherrypy.request.headers.get("Content-Length", 0))
1231 )
1232 )
1233 )
tiernoc94c3df2018-02-09 15:38:54 +01001234 if thread_info:
1235 return_text += "thread: {}\n".format(thread_info)
1236 return_text += "</pre></html>"
1237 return return_text
1238
tierno701018c2019-06-25 11:13:14 +00001239 @staticmethod
1240 def _check_valid_url_method(method, *args):
tiernof27c79b2018-03-12 17:08:42 +01001241 if len(args) < 3:
garciadeblas4568a372021-03-24 09:19:48 +01001242 raise NbiException(
1243 "URL must contain at least 'main_topic/version/topic'",
1244 HTTPStatus.METHOD_NOT_ALLOWED,
1245 )
tiernof27c79b2018-03-12 17:08:42 +01001246
tierno701018c2019-06-25 11:13:14 +00001247 reference = valid_url_methods
tiernof27c79b2018-03-12 17:08:42 +01001248 for arg in args:
1249 if arg is None:
1250 break
1251 if not isinstance(reference, dict):
garciadeblas4568a372021-03-24 09:19:48 +01001252 raise NbiException(
1253 "URL contains unexpected extra items '{}'".format(arg),
1254 HTTPStatus.METHOD_NOT_ALLOWED,
1255 )
tiernof27c79b2018-03-12 17:08:42 +01001256
1257 if arg in reference:
1258 reference = reference[arg]
1259 elif "<ID>" in reference:
1260 reference = reference["<ID>"]
1261 elif "*" in reference:
tierno74b53582020-06-18 10:52:37 +00001262 # if there is content
1263 if reference["*"]:
1264 reference = reference["*"]
tiernof27c79b2018-03-12 17:08:42 +01001265 break
1266 else:
garciadeblas4568a372021-03-24 09:19:48 +01001267 raise NbiException(
1268 "Unexpected URL item {}".format(arg), HTTPStatus.METHOD_NOT_ALLOWED
1269 )
tiernof27c79b2018-03-12 17:08:42 +01001270 if "TODO" in reference and method in reference["TODO"]:
garciadeblas4568a372021-03-24 09:19:48 +01001271 raise NbiException(
1272 "Method {} not supported yet for this URL".format(method),
1273 HTTPStatus.NOT_IMPLEMENTED,
1274 )
tierno2236d202018-05-16 19:05:16 +02001275 elif "METHODS" in reference and method not in reference["METHODS"]:
garciadeblas4568a372021-03-24 09:19:48 +01001276 raise NbiException(
1277 "Method {} not supported for this URL".format(method),
1278 HTTPStatus.METHOD_NOT_ALLOWED,
1279 )
tierno701018c2019-06-25 11:13:14 +00001280 return reference["ROLE_PERMISSION"] + method.lower()
tiernof27c79b2018-03-12 17:08:42 +01001281
1282 @staticmethod
tiernob24258a2018-10-04 18:39:49 +02001283 def _set_location_header(main_topic, version, topic, id):
tiernof27c79b2018-03-12 17:08:42 +01001284 """
1285 Insert response header Location with the URL of created item base on URL params
tiernob24258a2018-10-04 18:39:49 +02001286 :param main_topic:
tiernof27c79b2018-03-12 17:08:42 +01001287 :param version:
tiernob24258a2018-10-04 18:39:49 +02001288 :param topic:
tiernof27c79b2018-03-12 17:08:42 +01001289 :param id:
1290 :return: None
1291 """
1292 # Use cherrypy.request.base for absoluted path and make use of request.header HOST just in case behind aNAT
garciadeblas4568a372021-03-24 09:19:48 +01001293 cherrypy.response.headers["Location"] = "/osm/{}/{}/{}/{}".format(
1294 main_topic, version, topic, id
1295 )
tiernof27c79b2018-03-12 17:08:42 +01001296 return
1297
tierno65ca36d2019-02-12 19:27:52 +01001298 @staticmethod
tierno701018c2019-06-25 11:13:14 +00001299 def _extract_query_string_operations(kwargs, method):
1300 """
1301
1302 :param kwargs:
1303 :return:
1304 """
1305 query_string_operations = []
1306 if kwargs:
1307 for qs in ("FORCE", "PUBLIC", "ADMIN", "SET_PROJECT"):
1308 if qs in kwargs and kwargs[qs].lower() != "false":
1309 query_string_operations.append(qs.lower() + ":" + method.lower())
1310 return query_string_operations
1311
1312 @staticmethod
1313 def _manage_admin_query(token_info, kwargs, method, _id):
tierno65ca36d2019-02-12 19:27:52 +01001314 """
1315 Processes the administrator query inputs (if any) of FORCE, ADMIN, PUBLIC, SET_PROJECT
1316 Check that users has rights to use them and returs the admin_query
tierno701018c2019-06-25 11:13:14 +00001317 :param token_info: token_info rights obtained by token
tierno65ca36d2019-02-12 19:27:52 +01001318 :param kwargs: query string input.
1319 :param method: http method: GET, POSST, PUT, ...
1320 :param _id:
1321 :return: admin_query dictionary with keys:
1322 public: True, False or None
1323 force: True or False
1324 project_id: tuple with projects used for accessing an element
1325 set_project: tuple with projects that a created element will belong to
1326 method: show, list, delete, write
1327 """
garciadeblas4568a372021-03-24 09:19:48 +01001328 admin_query = {
1329 "force": False,
1330 "project_id": (token_info["project_id"],),
1331 "username": token_info["username"],
1332 "admin": token_info["admin"],
1333 "public": None,
1334 "allow_show_user_project_role": token_info["allow_show_user_project_role"],
1335 }
tierno65ca36d2019-02-12 19:27:52 +01001336 if kwargs:
1337 # FORCE
1338 if "FORCE" in kwargs:
garciadeblas4568a372021-03-24 09:19:48 +01001339 if (
1340 kwargs["FORCE"].lower() != "false"
1341 ): # if None or True set force to True
tierno65ca36d2019-02-12 19:27:52 +01001342 admin_query["force"] = True
1343 del kwargs["FORCE"]
1344 # PUBLIC
1345 if "PUBLIC" in kwargs:
garciadeblas4568a372021-03-24 09:19:48 +01001346 if (
1347 kwargs["PUBLIC"].lower() != "false"
1348 ): # if None or True set public to True
tierno65ca36d2019-02-12 19:27:52 +01001349 admin_query["public"] = True
1350 else:
1351 admin_query["public"] = False
1352 del kwargs["PUBLIC"]
1353 # ADMIN
1354 if "ADMIN" in kwargs:
1355 behave_as = kwargs.pop("ADMIN")
1356 if behave_as.lower() != "false":
tierno701018c2019-06-25 11:13:14 +00001357 if not token_info["admin"]:
garciadeblas4568a372021-03-24 09:19:48 +01001358 raise NbiException(
1359 "Only admin projects can use 'ADMIN' query string",
1360 HTTPStatus.UNAUTHORIZED,
1361 )
1362 if (
1363 not behave_as or behave_as.lower() == "true"
1364 ): # convert True, None to empty list
tierno65ca36d2019-02-12 19:27:52 +01001365 admin_query["project_id"] = ()
1366 elif isinstance(behave_as, (list, tuple)):
1367 admin_query["project_id"] = behave_as
garciadeblas4568a372021-03-24 09:19:48 +01001368 else: # isinstance(behave_as, str)
1369 admin_query["project_id"] = (behave_as,)
tierno65ca36d2019-02-12 19:27:52 +01001370 if "SET_PROJECT" in kwargs:
1371 set_project = kwargs.pop("SET_PROJECT")
1372 if not set_project:
1373 admin_query["set_project"] = list(admin_query["project_id"])
1374 else:
1375 if isinstance(set_project, str):
garciadeblas4568a372021-03-24 09:19:48 +01001376 set_project = (set_project,)
tierno65ca36d2019-02-12 19:27:52 +01001377 if admin_query["project_id"]:
1378 for p in set_project:
1379 if p not in admin_query["project_id"]:
garciadeblas4568a372021-03-24 09:19:48 +01001380 raise NbiException(
1381 "Unauthorized for 'SET_PROJECT={p}'. Try with 'ADMIN=True' or "
1382 "'ADMIN='{p}'".format(p=p),
1383 HTTPStatus.UNAUTHORIZED,
1384 )
tierno65ca36d2019-02-12 19:27:52 +01001385 admin_query["set_project"] = set_project
1386
1387 # PROJECT_READ
1388 # if "PROJECT_READ" in kwargs:
1389 # admin_query["project"] = kwargs.pop("project")
tierno701018c2019-06-25 11:13:14 +00001390 # if admin_query["project"] == token_info["project_id"]:
tierno65ca36d2019-02-12 19:27:52 +01001391 if method == "GET":
1392 if _id:
1393 admin_query["method"] = "show"
1394 else:
1395 admin_query["method"] = "list"
1396 elif method == "DELETE":
1397 admin_query["method"] = "delete"
1398 else:
1399 admin_query["method"] = "write"
1400 return admin_query
1401
tiernoc94c3df2018-02-09 15:38:54 +01001402 @cherrypy.expose
garciadeblas4568a372021-03-24 09:19:48 +01001403 def default(
1404 self,
1405 main_topic=None,
1406 version=None,
1407 topic=None,
1408 _id=None,
1409 item=None,
1410 *args,
1411 **kwargs
1412 ):
tierno701018c2019-06-25 11:13:14 +00001413 token_info = None
selvi.j9919bbc2023-04-26 12:22:13 +00001414 outdata = {}
tiernof27c79b2018-03-12 17:08:42 +01001415 _format = None
tierno0f98af52018-03-19 10:28:22 +01001416 method = "DONE"
tiernob24258a2018-10-04 18:39:49 +02001417 engine_topic = None
tiernodb9dc582018-06-20 17:27:29 +02001418 rollback = []
tierno701018c2019-06-25 11:13:14 +00001419 engine_session = None
elumalai7802ff82023-04-24 20:38:32 +05301420 url_id = ""
1421 log_mapping = {
1422 "POST": "Creating",
1423 "GET": "Fetching",
1424 "DELETE": "Deleting",
1425 "PUT": "Updating",
1426 "PATCH": "Updating",
1427 }
tiernoc94c3df2018-02-09 15:38:54 +01001428 try:
tiernob24258a2018-10-04 18:39:49 +02001429 if not main_topic or not version or not topic:
garciadeblas4568a372021-03-24 09:19:48 +01001430 raise NbiException(
1431 "URL must contain at least 'main_topic/version/topic'",
1432 HTTPStatus.METHOD_NOT_ALLOWED,
1433 )
1434 if main_topic not in (
1435 "admin",
1436 "vnfpkgm",
1437 "nsd",
1438 "nslcm",
1439 "pdu",
1440 "nst",
1441 "nsilcm",
1442 "nspm",
almagiae47b9132022-05-17 14:12:22 +02001443 "vnflcm",
garciadeblas4568a372021-03-24 09:19:48 +01001444 ):
1445 raise NbiException(
1446 "URL main_topic '{}' not supported".format(main_topic),
1447 HTTPStatus.METHOD_NOT_ALLOWED,
1448 )
1449 if version != "v1":
1450 raise NbiException(
1451 "URL version '{}' not supported".format(version),
1452 HTTPStatus.METHOD_NOT_ALLOWED,
1453 )
elumalai7802ff82023-04-24 20:38:32 +05301454 if _id is not None:
1455 url_id = _id
tiernoc94c3df2018-02-09 15:38:54 +01001456
garciadeblas4568a372021-03-24 09:19:48 +01001457 if (
1458 kwargs
1459 and "METHOD" in kwargs
1460 and kwargs["METHOD"] in ("PUT", "POST", "DELETE", "GET", "PATCH")
1461 ):
tiernof27c79b2018-03-12 17:08:42 +01001462 method = kwargs.pop("METHOD")
1463 else:
1464 method = cherrypy.request.method
tierno65ca36d2019-02-12 19:27:52 +01001465
garciadeblas4568a372021-03-24 09:19:48 +01001466 role_permission = self._check_valid_url_method(
1467 method, main_topic, version, topic, _id, item, *args
1468 )
1469 query_string_operations = self._extract_query_string_operations(
1470 kwargs, method
1471 )
tiernob24258a2018-10-04 18:39:49 +02001472 if main_topic == "admin" and topic == "tokens":
tiernof27c79b2018-03-12 17:08:42 +01001473 return self.token(method, _id, kwargs)
garciadeblas4568a372021-03-24 09:19:48 +01001474 token_info = self.authenticator.authorize(
1475 role_permission, query_string_operations, _id
1476 )
tierno12eac3c2020-03-19 23:22:08 +00001477 if main_topic == "admin" and topic == "domains":
1478 return self.domain()
tierno701018c2019-06-25 11:13:14 +00001479 engine_session = self._manage_admin_query(token_info, kwargs, method, _id)
tiernof27c79b2018-03-12 17:08:42 +01001480 indata = self._format_in(kwargs)
tiernob24258a2018-10-04 18:39:49 +02001481 engine_topic = topic
preethika.p329b8182020-04-22 12:25:39 +05301482
vijay.r35ef2f72019-04-30 17:55:49 +05301483 if item and topic != "pm_jobs":
tiernob24258a2018-10-04 18:39:49 +02001484 engine_topic = item
tiernoc94c3df2018-02-09 15:38:54 +01001485
tiernob24258a2018-10-04 18:39:49 +02001486 if main_topic == "nsd":
1487 engine_topic = "nsds"
1488 elif main_topic == "vnfpkgm":
1489 engine_topic = "vnfds"
delacruzramo271d2002019-12-02 21:00:37 +01001490 if topic == "vnfpkg_op_occs":
1491 engine_topic = "vnfpkgops"
1492 if topic == "vnf_packages" and item == "action":
1493 engine_topic = "vnfpkgops"
tiernob24258a2018-10-04 18:39:49 +02001494 elif main_topic == "nslcm":
1495 engine_topic = "nsrs"
1496 if topic == "ns_lcm_op_occs":
1497 engine_topic = "nslcmops"
1498 if topic == "vnfrs" or topic == "vnf_instances":
1499 engine_topic = "vnfrs"
almagiae47b9132022-05-17 14:12:22 +02001500 elif main_topic == "vnflcm":
1501 if topic == "vnf_lcm_op_occs":
1502 engine_topic = "vnflcmops"
garciadeblas9750c5a2018-10-15 16:20:35 +02001503 elif main_topic == "nst":
1504 engine_topic = "nsts"
1505 elif main_topic == "nsilcm":
1506 engine_topic = "nsis"
1507 if topic == "nsi_lcm_op_occs":
delacruzramoc061f562019-04-05 11:00:02 +02001508 engine_topic = "nsilcmops"
tiernob24258a2018-10-04 18:39:49 +02001509 elif main_topic == "pdu":
1510 engine_topic = "pdus"
garciadeblas4568a372021-03-24 09:19:48 +01001511 if (
1512 engine_topic == "vims"
1513 ): # TODO this is for backward compatibility, it will be removed in the future
tiernob24258a2018-10-04 18:39:49 +02001514 engine_topic = "vim_accounts"
tiernoc94c3df2018-02-09 15:38:54 +01001515
preethika.p329b8182020-04-22 12:25:39 +05301516 if topic == "subscriptions":
1517 engine_topic = main_topic + "_" + topic
1518
tiernoc94c3df2018-02-09 15:38:54 +01001519 if method == "GET":
garciadeblas4568a372021-03-24 09:19:48 +01001520 if item in (
1521 "nsd_content",
1522 "package_content",
1523 "artifacts",
1524 "vnfd",
1525 "nsd",
1526 "nst",
1527 "nst_content",
1528 ):
garciadeblas9750c5a2018-10-15 16:20:35 +02001529 if item in ("vnfd", "nsd", "nst"):
tiernof27c79b2018-03-12 17:08:42 +01001530 path = "$DESCRIPTOR"
1531 elif args:
1532 path = args
tiernob24258a2018-10-04 18:39:49 +02001533 elif item == "artifacts":
tiernof27c79b2018-03-12 17:08:42 +01001534 path = ()
1535 else:
1536 path = None
garciadeblas4568a372021-03-24 09:19:48 +01001537 file, _format = self.engine.get_file(
1538 engine_session,
1539 engine_topic,
1540 _id,
1541 path,
1542 cherrypy.request.headers.get("Accept"),
1543 )
tiernof27c79b2018-03-12 17:08:42 +01001544 outdata = file
1545 elif not _id:
garciadeblas4568a372021-03-24 09:19:48 +01001546 outdata = self.engine.get_item_list(
1547 engine_session, engine_topic, kwargs, api_req=True
1548 )
tiernoc94c3df2018-02-09 15:38:54 +01001549 else:
vijay.r35ef2f72019-04-30 17:55:49 +05301550 if item == "reports":
1551 # TODO check that project_id (_id in this context) has permissions
1552 _id = args[0]
K Sai Kiran57589552021-01-27 21:38:34 +05301553 filter_q = None
1554 if "vcaStatusRefresh" in kwargs:
1555 filter_q = {"vcaStatusRefresh": kwargs["vcaStatusRefresh"]}
garciadeblasf2af4a12023-01-24 16:56:54 +01001556 outdata = self.engine.get_item(
1557 engine_session, engine_topic, _id, filter_q, True
1558 )
delacruzramo271d2002019-12-02 21:00:37 +01001559
tiernof27c79b2018-03-12 17:08:42 +01001560 elif method == "POST":
tiernobdebce92019-07-01 15:36:49 +00001561 cherrypy.response.status = HTTPStatus.CREATED.value
garciadeblas4568a372021-03-24 09:19:48 +01001562 if topic in (
1563 "ns_descriptors_content",
1564 "vnf_packages_content",
1565 "netslice_templates_content",
1566 ):
tiernof27c79b2018-03-12 17:08:42 +01001567 _id = cherrypy.request.headers.get("Transaction-Id")
1568 if not _id:
garciadeblas4568a372021-03-24 09:19:48 +01001569 _id, _ = self.engine.new_item(
1570 rollback,
1571 engine_session,
1572 engine_topic,
1573 {},
1574 None,
1575 cherrypy.request.headers,
1576 )
1577 completed = self.engine.upload_content(
1578 engine_session,
1579 engine_topic,
1580 _id,
1581 indata,
1582 kwargs,
1583 cherrypy.request.headers,
1584 )
tiernof27c79b2018-03-12 17:08:42 +01001585 if completed:
tiernob24258a2018-10-04 18:39:49 +02001586 self._set_location_header(main_topic, version, topic, _id)
tiernof27c79b2018-03-12 17:08:42 +01001587 else:
1588 cherrypy.response.headers["Transaction-Id"] = _id
1589 outdata = {"id": _id}
tiernob24258a2018-10-04 18:39:49 +02001590 elif topic == "ns_instances_content":
1591 # creates NSR
garciadeblas4568a372021-03-24 09:19:48 +01001592 _id, _ = self.engine.new_item(
1593 rollback, engine_session, engine_topic, indata, kwargs
1594 )
tiernob24258a2018-10-04 18:39:49 +02001595 # creates nslcmop
1596 indata["lcmOperationType"] = "instantiate"
1597 indata["nsInstanceId"] = _id
garciadeblas4568a372021-03-24 09:19:48 +01001598 nslcmop_id, _ = self.engine.new_item(
1599 rollback, engine_session, "nslcmops", indata, None
1600 )
tiernob24258a2018-10-04 18:39:49 +02001601 self._set_location_header(main_topic, version, topic, _id)
kuuse078f55e2019-05-16 19:24:21 +02001602 outdata = {"id": _id, "nslcmop_id": nslcmop_id}
tiernob24258a2018-10-04 18:39:49 +02001603 elif topic == "ns_instances" and item:
1604 indata["lcmOperationType"] = item
1605 indata["nsInstanceId"] = _id
garciadeblas4568a372021-03-24 09:19:48 +01001606 _id, _ = self.engine.new_item(
1607 rollback, engine_session, "nslcmops", indata, kwargs
1608 )
1609 self._set_location_header(
1610 main_topic, version, "ns_lcm_op_occs", _id
1611 )
tierno65acb4d2018-04-06 16:42:40 +02001612 outdata = {"id": _id}
1613 cherrypy.response.status = HTTPStatus.ACCEPTED.value
garciadeblas9750c5a2018-10-15 16:20:35 +02001614 elif topic == "netslice_instances_content":
Felipe Vicens07f31722018-10-29 15:16:44 +01001615 # creates NetSlice_Instance_record (NSIR)
garciadeblas4568a372021-03-24 09:19:48 +01001616 _id, _ = self.engine.new_item(
1617 rollback, engine_session, engine_topic, indata, kwargs
1618 )
Felipe Vicens07f31722018-10-29 15:16:44 +01001619 self._set_location_header(main_topic, version, topic, _id)
garciadeblas9750c5a2018-10-15 16:20:35 +02001620 indata["lcmOperationType"] = "instantiate"
Felipe Vicens126af572019-06-05 19:13:04 +02001621 indata["netsliceInstanceId"] = _id
garciadeblas4568a372021-03-24 09:19:48 +01001622 nsilcmop_id, _ = self.engine.new_item(
1623 rollback, engine_session, "nsilcmops", indata, kwargs
1624 )
kuuse078f55e2019-05-16 19:24:21 +02001625 outdata = {"id": _id, "nsilcmop_id": nsilcmop_id}
garciadeblas9750c5a2018-10-15 16:20:35 +02001626 elif topic == "netslice_instances" and item:
1627 indata["lcmOperationType"] = item
Felipe Vicens126af572019-06-05 19:13:04 +02001628 indata["netsliceInstanceId"] = _id
garciadeblas4568a372021-03-24 09:19:48 +01001629 _id, _ = self.engine.new_item(
1630 rollback, engine_session, "nsilcmops", indata, kwargs
1631 )
1632 self._set_location_header(
1633 main_topic, version, "nsi_lcm_op_occs", _id
1634 )
garciadeblas9750c5a2018-10-15 16:20:35 +02001635 outdata = {"id": _id}
1636 cherrypy.response.status = HTTPStatus.ACCEPTED.value
delacruzramo271d2002019-12-02 21:00:37 +01001637 elif topic == "vnf_packages" and item == "action":
1638 indata["lcmOperationType"] = item
1639 indata["vnfPkgId"] = _id
garciadeblas4568a372021-03-24 09:19:48 +01001640 _id, _ = self.engine.new_item(
1641 rollback, engine_session, "vnfpkgops", indata, kwargs
1642 )
1643 self._set_location_header(
1644 main_topic, version, "vnfpkg_op_occs", _id
1645 )
delacruzramo271d2002019-12-02 21:00:37 +01001646 outdata = {"id": _id}
1647 cherrypy.response.status = HTTPStatus.ACCEPTED.value
preethika.p329b8182020-04-22 12:25:39 +05301648 elif topic == "subscriptions":
garciadeblas4568a372021-03-24 09:19:48 +01001649 _id, _ = self.engine.new_item(
1650 rollback, engine_session, engine_topic, indata, kwargs
1651 )
preethika.p329b8182020-04-22 12:25:39 +05301652 self._set_location_header(main_topic, version, topic, _id)
1653 link = {}
1654 link["self"] = cherrypy.response.headers["Location"]
garciadeblas4568a372021-03-24 09:19:48 +01001655 outdata = {
1656 "id": _id,
1657 "filter": indata["filter"],
1658 "callbackUri": indata["CallbackUri"],
1659 "_links": link,
1660 }
preethika.p329b8182020-04-22 12:25:39 +05301661 cherrypy.response.status = HTTPStatus.CREATED.value
almagiae47b9132022-05-17 14:12:22 +02001662 elif topic == "vnf_instances" and item:
1663 indata["lcmOperationType"] = item
1664 indata["vnfInstanceId"] = _id
garciadeblasf2af4a12023-01-24 16:56:54 +01001665 _id, _ = self.engine.new_item(
1666 rollback, engine_session, "vnflcmops", indata, kwargs
1667 )
1668 self._set_location_header(
1669 main_topic, version, "vnf_lcm_op_occs", _id
1670 )
almagiae47b9132022-05-17 14:12:22 +02001671 outdata = {"id": _id}
1672 cherrypy.response.status = HTTPStatus.ACCEPTED.value
tiernof27c79b2018-03-12 17:08:42 +01001673 else:
garciadeblas4568a372021-03-24 09:19:48 +01001674 _id, op_id = self.engine.new_item(
1675 rollback,
1676 engine_session,
1677 engine_topic,
1678 indata,
1679 kwargs,
1680 cherrypy.request.headers,
1681 )
tiernob24258a2018-10-04 18:39:49 +02001682 self._set_location_header(main_topic, version, topic, _id)
tiernof27c79b2018-03-12 17:08:42 +01001683 outdata = {"id": _id}
tiernobdebce92019-07-01 15:36:49 +00001684 if op_id:
1685 outdata["op_id"] = op_id
1686 cherrypy.response.status = HTTPStatus.ACCEPTED.value
tiernob24258a2018-10-04 18:39:49 +02001687 # TODO form NsdInfo when topic in ("ns_descriptors", "vnf_packages")
tierno09c073e2018-04-26 13:36:48 +02001688
tiernoc94c3df2018-02-09 15:38:54 +01001689 elif method == "DELETE":
1690 if not _id:
garciadeblas4568a372021-03-24 09:19:48 +01001691 outdata = self.engine.del_item_list(
1692 engine_session, engine_topic, kwargs
1693 )
tierno09c073e2018-04-26 13:36:48 +02001694 cherrypy.response.status = HTTPStatus.OK.value
tiernoc94c3df2018-02-09 15:38:54 +01001695 else: # len(args) > 1
tierno22577432020-04-08 15:16:57 +00001696 # for NS NSI generate an operation
1697 op_id = None
tierno701018c2019-06-25 11:13:14 +00001698 if topic == "ns_instances_content" and not engine_session["force"]:
tiernob24258a2018-10-04 18:39:49 +02001699 nslcmop_desc = {
1700 "lcmOperationType": "terminate",
1701 "nsInstanceId": _id,
garciadeblas4568a372021-03-24 09:19:48 +01001702 "autoremove": True,
tiernob24258a2018-10-04 18:39:49 +02001703 }
garciadeblas4568a372021-03-24 09:19:48 +01001704 op_id, _ = self.engine.new_item(
1705 rollback, engine_session, "nslcmops", nslcmop_desc, kwargs
1706 )
tierno22577432020-04-08 15:16:57 +00001707 if op_id:
1708 outdata = {"_id": op_id}
garciadeblas4568a372021-03-24 09:19:48 +01001709 elif (
1710 topic == "netslice_instances_content"
1711 and not engine_session["force"]
1712 ):
garciadeblas9750c5a2018-10-15 16:20:35 +02001713 nsilcmop_desc = {
1714 "lcmOperationType": "terminate",
Felipe Vicens126af572019-06-05 19:13:04 +02001715 "netsliceInstanceId": _id,
garciadeblas4568a372021-03-24 09:19:48 +01001716 "autoremove": True,
garciadeblas9750c5a2018-10-15 16:20:35 +02001717 }
garciadeblas4568a372021-03-24 09:19:48 +01001718 op_id, _ = self.engine.new_item(
1719 rollback, engine_session, "nsilcmops", nsilcmop_desc, None
1720 )
tierno22577432020-04-08 15:16:57 +00001721 if op_id:
1722 outdata = {"_id": op_id}
1723 # if there is not any deletion in process, delete
1724 if not op_id:
1725 op_id = self.engine.del_item(engine_session, engine_topic, _id)
1726 if op_id:
1727 outdata = {"op_id": op_id}
garciadeblas4568a372021-03-24 09:19:48 +01001728 cherrypy.response.status = (
1729 HTTPStatus.ACCEPTED.value
1730 if op_id
1731 else HTTPStatus.NO_CONTENT.value
1732 )
tierno09c073e2018-04-26 13:36:48 +02001733
tierno7ae10112018-05-18 14:36:02 +02001734 elif method in ("PUT", "PATCH"):
tiernobdebce92019-07-01 15:36:49 +00001735 op_id = None
tierno701018c2019-06-25 11:13:14 +00001736 if not indata and not kwargs and not engine_session.get("set_project"):
garciadeblas4568a372021-03-24 09:19:48 +01001737 raise NbiException(
1738 "Nothing to update. Provide payload and/or query string",
1739 HTTPStatus.BAD_REQUEST,
1740 )
1741 if (
1742 item in ("nsd_content", "package_content", "nst_content")
1743 and method == "PUT"
1744 ):
1745 completed = self.engine.upload_content(
1746 engine_session,
1747 engine_topic,
1748 _id,
1749 indata,
1750 kwargs,
1751 cherrypy.request.headers,
1752 )
tiernof27c79b2018-03-12 17:08:42 +01001753 if not completed:
1754 cherrypy.response.headers["Transaction-Id"] = id
tiernof27c79b2018-03-12 17:08:42 +01001755 else:
garciadeblas4568a372021-03-24 09:19:48 +01001756 op_id = self.engine.edit_item(
1757 engine_session, engine_topic, _id, indata, kwargs
1758 )
tiernobdebce92019-07-01 15:36:49 +00001759
1760 if op_id:
1761 cherrypy.response.status = HTTPStatus.ACCEPTED.value
1762 outdata = {"op_id": op_id}
1763 else:
1764 cherrypy.response.status = HTTPStatus.NO_CONTENT.value
1765 outdata = None
tiernoc94c3df2018-02-09 15:38:54 +01001766 else:
garciadeblas4568a372021-03-24 09:19:48 +01001767 raise NbiException(
1768 "Method {} not allowed".format(method),
1769 HTTPStatus.METHOD_NOT_ALLOWED,
1770 )
tiernoa6bb45d2019-06-14 09:45:39 +00001771
1772 # if Role information changes, it is needed to reload the information of roles
1773 if topic == "roles" and method != "GET":
1774 self.authenticator.load_operation_to_allowed_roles()
delacruzramoad682a52019-12-10 16:26:34 +01001775
garciadeblas4568a372021-03-24 09:19:48 +01001776 if (
1777 topic == "projects"
1778 and method == "DELETE"
1779 or topic in ["users", "roles"]
1780 and method in ["PUT", "PATCH", "DELETE"]
1781 ):
delacruzramoad682a52019-12-10 16:26:34 +01001782 self.authenticator.remove_token_from_cache()
1783
elumalai7802ff82023-04-24 20:38:32 +05301784 if item is not None:
1785 cef_event(
1786 cef_logger,
1787 {
1788 "name": "User Operation",
1789 "sourceUserName": token_info.get("username"),
1790 "message": "Performing {} operation on {} {}, Project={} Outcome=Success".format(
1791 item,
1792 topic,
1793 url_id,
1794 token_info.get("project_name"),
1795 ),
1796 },
1797 )
1798 cherrypy.log("{}".format(cef_logger))
1799 else:
1800 cef_event(
1801 cef_logger,
1802 {
1803 "name": "User Operation",
1804 "sourceUserName": token_info.get("username"),
1805 "message": "{} {} {}, Project={} Outcome=Success".format(
1806 log_mapping[method],
1807 topic,
1808 url_id,
1809 token_info.get("project_name"),
1810 ),
1811 },
1812 )
1813 cherrypy.log("{}".format(cef_logger))
tierno701018c2019-06-25 11:13:14 +00001814 return self._format_out(outdata, token_info, _format)
tiernob24258a2018-10-04 18:39:49 +02001815 except Exception as e:
garciadeblas4568a372021-03-24 09:19:48 +01001816 if isinstance(
1817 e,
1818 (
1819 NbiException,
1820 EngineException,
1821 DbException,
1822 FsException,
1823 MsgException,
1824 AuthException,
1825 ValidationError,
1826 AuthconnException,
1827 ),
1828 ):
tiernob24258a2018-10-04 18:39:49 +02001829 http_code_value = cherrypy.response.status = e.http_code.value
1830 http_code_name = e.http_code.name
1831 cherrypy.log("Exception {}".format(e))
1832 else:
garciadeblas4568a372021-03-24 09:19:48 +01001833 http_code_value = (
1834 cherrypy.response.status
1835 ) = HTTPStatus.BAD_REQUEST.value # INTERNAL_SERVER_ERROR
Felipe Vicense36ab852018-11-23 14:12:09 +01001836 cherrypy.log("CRITICAL: Exception {}".format(e), traceback=True)
tiernob24258a2018-10-04 18:39:49 +02001837 http_code_name = HTTPStatus.BAD_REQUEST.name
tierno3ace63c2018-05-03 17:51:43 +02001838 if hasattr(outdata, "close"): # is an open file
1839 outdata.close()
tiernob24258a2018-10-04 18:39:49 +02001840 error_text = str(e)
1841 rollback.reverse()
tiernodb9dc582018-06-20 17:27:29 +02001842 for rollback_item in rollback:
tierno3ace63c2018-05-03 17:51:43 +02001843 try:
tiernocc103432018-10-19 14:10:35 +02001844 if rollback_item.get("operation") == "set":
garciadeblas4568a372021-03-24 09:19:48 +01001845 self.engine.db.set_one(
1846 rollback_item["topic"],
1847 {"_id": rollback_item["_id"]},
1848 rollback_item["content"],
1849 fail_on_empty=False,
1850 )
preethika.p329b8182020-04-22 12:25:39 +05301851 elif rollback_item.get("operation") == "del_list":
garciadeblas4568a372021-03-24 09:19:48 +01001852 self.engine.db.del_list(
1853 rollback_item["topic"],
1854 rollback_item["filter"],
garciadeblas4568a372021-03-24 09:19:48 +01001855 )
tiernocc103432018-10-19 14:10:35 +02001856 else:
garciadeblas4568a372021-03-24 09:19:48 +01001857 self.engine.db.del_one(
1858 rollback_item["topic"],
1859 {"_id": rollback_item["_id"]},
1860 fail_on_empty=False,
1861 )
tierno3ace63c2018-05-03 17:51:43 +02001862 except Exception as e2:
garciadeblas4568a372021-03-24 09:19:48 +01001863 rollback_error_text = "Rollback Exception {}: {}".format(
1864 rollback_item, e2
1865 )
tiernob24258a2018-10-04 18:39:49 +02001866 cherrypy.log(rollback_error_text)
1867 error_text += ". " + rollback_error_text
1868 # if isinstance(e, MsgException):
1869 # error_text = "{} has been '{}' but other modules cannot be informed because an error on bus".format(
1870 # engine_topic[:-1], method, error_text)
tiernoc94c3df2018-02-09 15:38:54 +01001871 problem_details = {
tiernob24258a2018-10-04 18:39:49 +02001872 "code": http_code_name,
1873 "status": http_code_value,
1874 "detail": error_text,
tiernoc94c3df2018-02-09 15:38:54 +01001875 }
elumalai7802ff82023-04-24 20:38:32 +05301876 if item is not None and token_info is not None:
1877 cef_event(
1878 cef_logger,
1879 {
1880 "name": "User Operation",
1881 "sourceUserName": token_info.get("username", None),
1882 "message": "Performing {} operation on {} {}, Project={} Outcome=Failure".format(
1883 item,
1884 topic,
1885 url_id,
1886 token_info.get("project_name", None),
1887 ),
1888 "severity": "2",
1889 },
1890 )
1891 cherrypy.log("{}".format(cef_logger))
1892 elif token_info is not None:
1893 cef_event(
1894 cef_logger,
1895 {
1896 "name": "User Operation",
1897 "sourceUserName": token_info.get("username", None),
1898 "message": "{} {} {}, Project={} Outcome=Failure".format(
1899 item,
1900 topic,
1901 url_id,
1902 token_info.get("project_name", None),
1903 ),
1904 "severity": "2",
1905 },
1906 )
1907 cherrypy.log("{}".format(cef_logger))
tierno701018c2019-06-25 11:13:14 +00001908 return self._format_out(problem_details, token_info)
tiernoc94c3df2018-02-09 15:38:54 +01001909 # raise cherrypy.HTTPError(e.http_code.value, str(e))
tiernoa5035702019-07-29 08:54:42 +00001910 finally:
1911 if token_info:
1912 self._format_login(token_info)
1913 if method in ("PUT", "PATCH", "POST") and isinstance(outdata, dict):
1914 for logging_id in ("id", "op_id", "nsilcmop_id", "nslcmop_id"):
1915 if outdata.get(logging_id):
garciadeblas4568a372021-03-24 09:19:48 +01001916 cherrypy.request.login += ";{}={}".format(
1917 logging_id, outdata[logging_id][:36]
1918 )
tiernoc94c3df2018-02-09 15:38:54 +01001919
1920
tiernoc94c3df2018-02-09 15:38:54 +01001921def _start_service():
1922 """
1923 Callback function called when cherrypy.engine starts
1924 Override configuration with env variables
1925 Set database, storage, message configuration
1926 Init database with admin/admin user password
1927 """
tierno932499c2019-01-28 17:28:10 +00001928 global nbi_server
1929 global subscription_thread
elumalai7802ff82023-04-24 20:38:32 +05301930 global cef_logger
tiernoc94c3df2018-02-09 15:38:54 +01001931 cherrypy.log.error("Starting osm_nbi")
1932 # update general cherrypy configuration
1933 update_dict = {}
1934
garciadeblas4568a372021-03-24 09:19:48 +01001935 engine_config = cherrypy.tree.apps["/osm"].config
tiernoc94c3df2018-02-09 15:38:54 +01001936 for k, v in environ.items():
garciadeblas6d83f8f2023-06-19 22:34:49 +02001937 if k == "OSMNBI_USER_MANAGEMENT":
1938 feature_state = eval(v.title())
1939 engine_config["authentication"]["user_management"] = feature_state
tiernoc94c3df2018-02-09 15:38:54 +01001940 if not k.startswith("OSMNBI_"):
1941 continue
tiernoe1281182018-05-22 12:24:36 +02001942 k1, _, k2 = k[7:].lower().partition("_")
tiernoc94c3df2018-02-09 15:38:54 +01001943 if not k2:
1944 continue
1945 try:
1946 # update static configuration
garciadeblas4568a372021-03-24 09:19:48 +01001947 if k == "OSMNBI_STATIC_DIR":
1948 engine_config["/static"]["tools.staticdir.dir"] = v
1949 engine_config["/static"]["tools.staticdir.on"] = True
1950 elif k == "OSMNBI_SOCKET_PORT" or k == "OSMNBI_SERVER_PORT":
1951 update_dict["server.socket_port"] = int(v)
1952 elif k == "OSMNBI_SOCKET_HOST" or k == "OSMNBI_SERVER_HOST":
1953 update_dict["server.socket_host"] = v
tiernof5298be2018-05-16 14:43:57 +02001954 elif k1 in ("server", "test", "auth", "log"):
garciadeblas4568a372021-03-24 09:19:48 +01001955 update_dict[k1 + "." + k2] = v
Eduardo Sousa819d34c2018-07-31 01:20:02 +01001956 elif k1 in ("message", "database", "storage", "authentication"):
tiernof5298be2018-05-16 14:43:57 +02001957 # k2 = k2.replace('_', '.')
Eduardo Sousa819d34c2018-07-31 01:20:02 +01001958 if k2 in ("port", "db_port"):
tiernoc94c3df2018-02-09 15:38:54 +01001959 engine_config[k1][k2] = int(v)
1960 else:
1961 engine_config[k1][k2] = v
Eduardo Sousa819d34c2018-07-31 01:20:02 +01001962
tiernoc94c3df2018-02-09 15:38:54 +01001963 except ValueError as e:
1964 cherrypy.log.error("Ignoring environ '{}': " + str(e))
1965 except Exception as e:
garciadeblasf2af4a12023-01-24 16:56:54 +01001966 cherrypy.log(
1967 "WARNING: skipping environ '{}' on exception '{}'".format(k, e)
1968 )
tiernoc94c3df2018-02-09 15:38:54 +01001969
1970 if update_dict:
1971 cherrypy.config.update(update_dict)
tiernof5298be2018-05-16 14:43:57 +02001972 engine_config["global"].update(update_dict)
tiernoc94c3df2018-02-09 15:38:54 +01001973
1974 # logging cherrypy
garciadeblas4568a372021-03-24 09:19:48 +01001975 log_format_simple = (
1976 "%(asctime)s %(levelname)s %(name)s %(filename)s:%(lineno)s %(message)s"
1977 )
1978 log_formatter_simple = logging.Formatter(
1979 log_format_simple, datefmt="%Y-%m-%dT%H:%M:%S"
1980 )
tiernoc94c3df2018-02-09 15:38:54 +01001981 logger_server = logging.getLogger("cherrypy.error")
1982 logger_access = logging.getLogger("cherrypy.access")
1983 logger_cherry = logging.getLogger("cherrypy")
1984 logger_nbi = logging.getLogger("nbi")
1985
tiernof5298be2018-05-16 14:43:57 +02001986 if "log.file" in engine_config["global"]:
garciadeblas4568a372021-03-24 09:19:48 +01001987 file_handler = logging.handlers.RotatingFileHandler(
1988 engine_config["global"]["log.file"], maxBytes=100e6, backupCount=9, delay=0
1989 )
tiernoc94c3df2018-02-09 15:38:54 +01001990 file_handler.setFormatter(log_formatter_simple)
1991 logger_cherry.addHandler(file_handler)
1992 logger_nbi.addHandler(file_handler)
tiernob24258a2018-10-04 18:39:49 +02001993 # log always to standard output
garciadeblas4568a372021-03-24 09:19:48 +01001994 for format_, logger in {
1995 "nbi.server %(filename)s:%(lineno)s": logger_server,
1996 "nbi.access %(filename)s:%(lineno)s": logger_access,
1997 "%(name)s %(filename)s:%(lineno)s": logger_nbi,
1998 }.items():
tiernob24258a2018-10-04 18:39:49 +02001999 log_format_cherry = "%(asctime)s %(levelname)s {} %(message)s".format(format_)
garciadeblas4568a372021-03-24 09:19:48 +01002000 log_formatter_cherry = logging.Formatter(
2001 log_format_cherry, datefmt="%Y-%m-%dT%H:%M:%S"
2002 )
tiernob24258a2018-10-04 18:39:49 +02002003 str_handler = logging.StreamHandler()
2004 str_handler.setFormatter(log_formatter_cherry)
2005 logger.addHandler(str_handler)
tiernoc94c3df2018-02-09 15:38:54 +01002006
tiernof5298be2018-05-16 14:43:57 +02002007 if engine_config["global"].get("log.level"):
2008 logger_cherry.setLevel(engine_config["global"]["log.level"])
2009 logger_nbi.setLevel(engine_config["global"]["log.level"])
tiernoc94c3df2018-02-09 15:38:54 +01002010
2011 # logging other modules
garciadeblas4568a372021-03-24 09:19:48 +01002012 for k1, logname in {
2013 "message": "nbi.msg",
2014 "database": "nbi.db",
2015 "storage": "nbi.fs",
2016 }.items():
tiernoc94c3df2018-02-09 15:38:54 +01002017 engine_config[k1]["logger_name"] = logname
2018 logger_module = logging.getLogger(logname)
2019 if "logfile" in engine_config[k1]:
garciadeblas4568a372021-03-24 09:19:48 +01002020 file_handler = logging.handlers.RotatingFileHandler(
2021 engine_config[k1]["logfile"], maxBytes=100e6, backupCount=9, delay=0
2022 )
tiernoc94c3df2018-02-09 15:38:54 +01002023 file_handler.setFormatter(log_formatter_simple)
2024 logger_module.addHandler(file_handler)
2025 if "loglevel" in engine_config[k1]:
2026 logger_module.setLevel(engine_config[k1]["loglevel"])
2027 # TODO add more entries, e.g.: storage
garciadeblas4568a372021-03-24 09:19:48 +01002028 cherrypy.tree.apps["/osm"].root.engine.start(engine_config)
2029 cherrypy.tree.apps["/osm"].root.authenticator.start(engine_config)
2030 cherrypy.tree.apps["/osm"].root.engine.init_db(target_version=database_version)
2031 cherrypy.tree.apps["/osm"].root.authenticator.init_db(
2032 target_version=auth_database_version
2033 )
tiernobee508e2019-01-21 11:21:49 +00002034
elumalai7802ff82023-04-24 20:38:32 +05302035 cef_logger = cef_event_builder(engine_config["authentication"])
2036
tierno932499c2019-01-28 17:28:10 +00002037 # start subscriptions thread:
garciadeblas4568a372021-03-24 09:19:48 +01002038 subscription_thread = SubscriptionThread(
2039 config=engine_config, engine=nbi_server.engine
2040 )
tierno932499c2019-01-28 17:28:10 +00002041 subscription_thread.start()
2042 # Do not capture except SubscriptionException
2043
tiernob2e48bd2020-02-04 15:47:18 +00002044 backend = engine_config["authentication"]["backend"]
garciadeblas4568a372021-03-24 09:19:48 +01002045 cherrypy.log.error(
2046 "Starting OSM NBI Version '{} {}' with '{}' authentication backend".format(
2047 nbi_version, nbi_version_date, backend
2048 )
2049 )
tiernoc94c3df2018-02-09 15:38:54 +01002050
2051
2052def _stop_service():
2053 """
2054 Callback function called when cherrypy.engine stops
2055 TODO: Ending database connections.
2056 """
tierno932499c2019-01-28 17:28:10 +00002057 global subscription_thread
tierno65ca36d2019-02-12 19:27:52 +01002058 if subscription_thread:
2059 subscription_thread.terminate()
tierno932499c2019-01-28 17:28:10 +00002060 subscription_thread = None
garciadeblas4568a372021-03-24 09:19:48 +01002061 cherrypy.tree.apps["/osm"].root.engine.stop()
tiernoc94c3df2018-02-09 15:38:54 +01002062 cherrypy.log.error("Stopping osm_nbi")
2063
tierno2236d202018-05-16 19:05:16 +02002064
tiernof5298be2018-05-16 14:43:57 +02002065def nbi(config_file):
tierno932499c2019-01-28 17:28:10 +00002066 global nbi_server
tiernoc94c3df2018-02-09 15:38:54 +01002067 # conf = {
2068 # '/': {
2069 # #'request.dispatch': cherrypy.dispatch.MethodDispatcher(),
2070 # 'tools.sessions.on': True,
2071 # 'tools.response_headers.on': True,
2072 # # 'tools.response_headers.headers': [('Content-Type', 'text/plain')],
2073 # }
2074 # }
2075 # cherrypy.Server.ssl_module = 'builtin'
2076 # cherrypy.Server.ssl_certificate = "http/cert.pem"
2077 # cherrypy.Server.ssl_private_key = "http/privkey.pem"
2078 # cherrypy.Server.thread_pool = 10
2079 # cherrypy.config.update({'Server.socket_port': config["port"], 'Server.socket_host': config["host"]})
2080
2081 # cherrypy.config.update({'tools.auth_basic.on': True,
2082 # 'tools.auth_basic.realm': 'localhost',
2083 # 'tools.auth_basic.checkpassword': validate_password})
tierno932499c2019-01-28 17:28:10 +00002084 nbi_server = Server()
garciadeblas4568a372021-03-24 09:19:48 +01002085 cherrypy.engine.subscribe("start", _start_service)
2086 cherrypy.engine.subscribe("stop", _stop_service)
2087 cherrypy.quickstart(nbi_server, "/osm", config_file)
tiernof5298be2018-05-16 14:43:57 +02002088
2089
2090def usage():
garciadeblas4568a372021-03-24 09:19:48 +01002091 print(
2092 """Usage: {} [options]
tiernof5298be2018-05-16 14:43:57 +02002093 -c|--config [configuration_file]: loads the configuration file (default: ./nbi.cfg)
2094 -h|--help: shows this help
garciadeblas4568a372021-03-24 09:19:48 +01002095 """.format(
2096 sys.argv[0]
2097 )
2098 )
tierno2236d202018-05-16 19:05:16 +02002099 # --log-socket-host HOST: send logs to this host")
2100 # --log-socket-port PORT: send logs using this port (default: 9022)")
tiernoc94c3df2018-02-09 15:38:54 +01002101
2102
garciadeblas4568a372021-03-24 09:19:48 +01002103if __name__ == "__main__":
tiernof5298be2018-05-16 14:43:57 +02002104 try:
2105 # load parameters and configuration
2106 opts, args = getopt.getopt(sys.argv[1:], "hvc:", ["config=", "help"])
2107 # TODO add "log-socket-host=", "log-socket-port=", "log-file="
2108 config_file = None
2109 for o, a in opts:
2110 if o in ("-h", "--help"):
2111 usage()
2112 sys.exit()
2113 elif o in ("-c", "--config"):
2114 config_file = a
2115 # elif o == "--log-socket-port":
2116 # log_socket_port = a
2117 # elif o == "--log-socket-host":
2118 # log_socket_host = a
2119 # elif o == "--log-file":
2120 # log_file = a
2121 else:
2122 assert False, "Unhandled option"
2123 if config_file:
2124 if not path.isfile(config_file):
garciadeblas4568a372021-03-24 09:19:48 +01002125 print(
2126 "configuration file '{}' that not exist".format(config_file),
2127 file=sys.stderr,
2128 )
tiernof5298be2018-05-16 14:43:57 +02002129 exit(1)
2130 else:
garciadeblas4568a372021-03-24 09:19:48 +01002131 for config_file in (
2132 __file__[: __file__.rfind(".")] + ".cfg",
2133 "./nbi.cfg",
2134 "/etc/osm/nbi.cfg",
2135 ):
tiernof5298be2018-05-16 14:43:57 +02002136 if path.isfile(config_file):
2137 break
2138 else:
garciadeblas4568a372021-03-24 09:19:48 +01002139 print(
2140 "No configuration file 'nbi.cfg' found neither at local folder nor at /etc/osm/",
2141 file=sys.stderr,
2142 )
tiernof5298be2018-05-16 14:43:57 +02002143 exit(1)
2144 nbi(config_file)
2145 except getopt.GetoptError as e:
2146 print(str(e), file=sys.stderr)
2147 # usage()
2148 exit(1)