Disabling policy retrieval for pci opt
[optf/osdf.git] / osdfapp.py
index f854dca..b1819ee 100755 (executable)
@@ -31,14 +31,11 @@ import json
 import osdf.adapters.policy.interface
 import osdf.config.credentials
 import osdf.config.loader
-import osdf.datasources.aai.aai_local_cached_data
 import osdf.operation.error_handling
 import osdf.operation.responses
 import traceback
 from osdf.adapters.policy.interface import get_policies
-from osdf.adapters.response_parsing.aots_ueb_cm_data import aots_ds_ueb_listener
-from osdf.config.base import osdf_config, DOCKER_CM_OPTIMIZER, AOTS_CM_MESSAGE_BUS
-from osdf.optimizers.cmopt.rcscheduler.local_opt_processor import process_local_cm_scheduler_opt
+from osdf.config.base import osdf_config
 from osdf.optimizers.placementopt.conductor.remote_opt_processor import process_placement_opt
 from osdf.webapp.appcontroller import auth_basic
 from optparse import OptionParser
@@ -46,45 +43,51 @@ from osdf.operation.exceptions import BusinessException
 from osdf.operation.error_handling import request_exception_to_json_body, internal_error_message
 from requests import RequestException
 from schematics.exceptions import DataError
-from osdf.logging.osdf_logging import MH, audit_log, error_log
-from osdf.models.placementRequest import PlacementAPI
-from osdf.models.schedulerRequest import SchedulerAPI
+from osdf.logging.osdf_logging import MH, audit_log, error_log, debug_log
+from osdf.models.api.placementRequest import PlacementAPI
+from osdf.models.api.pciOptimizationRequest import PCIOptimizationAPI
+from osdf.operation.responses import osdf_response_for_request_accept as req_accept
+from osdf.optimizers.routeopt.simple_route_opt import RouteOpt
+from osdf.optimizers.pciopt.pci_opt_processor import process_pci_optimation
+from osdf.utils import api_data_utils
 
 ERROR_TEMPLATE = osdf.ERROR_TEMPLATE
 
 app = Flask(__name__)
 
-
-
 BAD_CLIENT_REQUEST_MESSAGE = 'Client sent an invalid request'
 
-# An exception explicitly raised due to some business rule
+
 @app.errorhandler(BusinessException)
 def handle_business_exception(e):
+    """An exception explicitly raised due to some business rule"""
     error_log.error("Synchronous error for request id {} {}".format(g.request_id, traceback.format_exc()))
     err_msg = ERROR_TEMPLATE.render(description=str(e))
     response = Response(err_msg, content_type='application/json; charset=utf-8')
     response.status_code = 400
     return response
 
-# Returns a detailed synchronous message to the calling client when osdf fails due to a remote call to another system
+
 @app.errorhandler(RequestException)
 def handle_request_exception(e):
+    """Returns a detailed synchronous message to the calling client
+    when osdf fails due to a remote call to another system"""
     error_log.error("Synchronous error for request id {} {}".format(g.request_id, traceback.format_exc()))
     err_msg = request_exception_to_json_body(e)
     response = Response(err_msg, content_type='application/json; charset=utf-8')
     response.status_code = 400
     return response
 
-# Returns a detailed message to the calling client when the initial synchronous message is invalid
+
 @app.errorhandler(DataError)
 def handle_data_error(e):
+    """Returns a detailed message to the calling client when the initial synchronous message is invalid"""
     error_log.error("Synchronous error for request id {} {}".format(g.request_id, traceback.format_exc()))
 
     body_dictionary = {
         "serviceException": {
             "text": BAD_CLIENT_REQUEST_MESSAGE,
-            "exceptionMessage": str(e.messages),
+            "exceptionMessage": str(e.errors),
             "errorType": "InvalidClientRequest"
         }
     }
@@ -95,9 +98,26 @@ def handle_data_error(e):
     return response
 
 
-@app.route("/osdf/api/v2/placement", methods=["POST"])
+@app.route("/api/oof/v1/healthcheck", methods=["GET"])
+def do_osdf_health_check():
+    """Simple health check"""
+    audit_log.info("A health check request is processed!")
+    return "OK"
+
+
+@app.route("/api/oof/v1/placement", methods=["POST"])
 @auth_basic.login_required
 def do_placement_opt():
+    return placement_rest_api()
+
+
+@app.route("/api/oof/placement/v1", methods=["POST"])
+@auth_basic.login_required
+def do_placement_opt_common_versioning():
+    return placement_rest_api()
+
+
+def placement_rest_api():
     """Perform placement optimization after validating the request and fetching policies
     Make a call to the call-back URL with the output of the placement request.
     Note: Call to Conductor for placement optimization may have redirects, so account for them
@@ -106,47 +126,95 @@ def do_placement_opt():
     req_id = request_json['requestInfo']['requestId']
     g.request_id = req_id
     audit_log.info(MH.received_request(request.url, request.remote_addr, json.dumps(request_json)))
-
+    api_version_info = api_data_utils.retrieve_version_info(request, req_id)
     PlacementAPI(request_json).validate()
+    policies = get_policies(request_json, "placement")
+    audit_log.info(MH.new_worker_thread(req_id, "[for placement]"))
+    t = Thread(target=process_placement_opt, args=(request_json, policies, osdf_config))
+    t.start()
+    audit_log.info(MH.accepted_valid_request(req_id, request))
+    return req_accept(request_id=req_id,
+                      transaction_id=request_json['requestInfo']['transactionId'],
+                      version_info=api_version_info, request_status="accepted", status_message="")
 
-    # Currently policies are being used only during placement, so only fetch them if placement demands is not empty
-    policies = {}
 
-    if 'placementDemand' in request_json['placementInfo']['demandInfo']:
-        policies, prov_status = get_policies(request_json, "placement")
+@app.route("/api/oof/v1/route", methods=["POST"])
+def do_route_calc():
+    """
+    Perform the basic route calculations and returnn the vpn-bindings
+    """
+    request_json = request.get_json()
+    audit_log.info("Calculate Route request received!")
+    src_access_node_id = ""
+    dst_access_node_id = ""
+    try:
+        src_access_node_id = request_json["srcPort"]["src-access-node-id"]
+        audit_log.info( src_access_node_id )
+        dst_access_node_id = request_json["dstPort"]["dst-access-node-id"]
+    except Exception as ex:
+        error_log.error("Exception while retriving the src and dst node info")
+    # for the case of request_json for same domain, return the same node with destination update
+    if src_access_node_id == dst_access_node_id:
+        audit_log.info("src and dst are same")
+        data = '{'\
+                '"vpns":['\
+                    '{'\
+                        '"access-topology-id": "' + request_json["srcPort"]["src-access-topology-id"] + '",'\
+                        '"access-client-id": "' + request_json["srcPort"]["src-access-client-id"] + '",'\
+                        '"access-provider-id": "' + request_json["srcPort"]["src-access-provider-id"]+ '",'\
+                        '"access-node-id": "' + request_json["srcPort"]["src-access-node-id"]+ '",'\
+                        '"src-access-ltp-id": "' + request_json["srcPort"]["src-access-ltp-id"]+ '",'\
+                        '"dst-access-ltp-id": "' + request_json["dstPort"]["dst-access-ltp-id"]  +'"'\
+                    '}'\
+                ']'\
+            '}'
+        return data
+    else:
+        return RouteOpt.getRoute(request_json)
 
-    audit_log.info(MH.new_worker_thread(req_id, "[for placement]"))
-    t = Thread(target=process_placement_opt, args=(request_json, policies, osdf_config, prov_status))
+@app.route("/api/oof/v1/pci", methods=["POST"])
+@auth_basic.login_required
+def do_pci_optimization():
+    request_json = request.get_json()
+    req_id = request_json['requestInfo']['requestId']
+    g.request_id = req_id
+    audit_log.info(MH.received_request(request.url, request.remote_addr, json.dumps(request_json)))
+    PCIOptimizationAPI(request_json).validate()
+    #disable policy retrieval
+    # policies = get_policies(request_json, "pciopt")
+    audit_log.info(MH.new_worker_thread(req_id, "[for pciopt]"))
+    t = Thread(target=process_pci_optimation, args=(request_json, osdf_config, None))
     t.start()
     audit_log.info(MH.accepted_valid_request(req_id, request))
-    return osdf.operation.responses.osdf_response_for_request_accept(
-        req_id=req_id, text="Accepted placement request. Response will be posted to callback URL")
+    return req_accept(request_id=req_id,
+                      transaction_id=request_json['requestInfo']['transactionId'],
+                      request_status="accepted", status_message="")
 
 
-# Returned when unexpected coding errors occur during initial synchronous processing
 @app.errorhandler(500)
-def interal_failure(error):
+def internal_failure(error):
+    """Returned when unexpected coding errors occur during initial synchronous processing"""
     error_log.error("Synchronous error for request id {} {}".format(g.request_id, traceback.format_exc()))
     response = Response(internal_error_message, content_type='application/json; charset=utf-8')
     response.status_code = 500
     return response
 
 
-def getOptions(argv):
-    program_version_string = '%%prog %s' % ("v1.0")
-    #program_usage = '''usage: spam two eggs''' # optional - will be autogenerated by optparse
+def get_options(argv):
+    program_version_string = '%%prog %s' % "v1.0"
     program_longdesc = ""
     program_license = ""
 
-    # setup option parser
     parser = OptionParser(version=program_version_string, epilog=program_longdesc, description=program_license)
     parser.add_option("-l", "--local", dest="local", help="run locally", action="store_true", default=False)
-    parser.add_option("-t", "--devtest", dest="devtest", help="run in dev/test environment", action="store_true", default=False)
+    parser.add_option("-t", "--devtest", dest="devtest", help="run in dev/test environment", action="store_true",
+                      default=False)
     parser.add_option("-d", "--debughost", dest="debughost", help="IP Address of host running debug server", default='')
     parser.add_option("-p", "--debugport", dest="debugport", help="Port number of debug server", type=int, default=5678)
-    (opts, args) = parser.parse_args(argv)
-    if (opts.debughost != ''):
-        print('pydevd.settrace(%s, port=%s)' % (opts.debughost, opts.debugport))
+    opts, args = parser.parse_args(argv)
+
+    if opts.debughost:
+        debug_log.debug('pydevd.settrace({}, port={})'.format(opts.debughost, opts.debugport))
         pydevd.settrace(opts.debughost, port=opts.debugport)
     return opts
 
@@ -156,13 +224,17 @@ if __name__ == "__main__":
     sys_conf = osdf_config['core']['osdf_system']
     ports = sys_conf['osdf_ports']
     internal_port, external_port = ports['internal'], ports['external']
-    ssl_context = tuple(sys_conf['ssl_context'])
 
-    common_app_opts = dict(host='0.0.0.0', threaded=True, use_reloader=False)
+    local_host = sys_conf['osdf_ip_default']
+    common_app_opts = dict(host=local_host, threaded=True, use_reloader=False)
+
+    ssl_opts = sys_conf.get('ssl_context')
+    if ssl_opts:
+        common_app_opts.update({'ssl_context': tuple(ssl_opts)})
 
-    opts = getOptions(sys.argv)
-    if (opts.local == False and opts.devtest == False):  # normal deployment
-        app.run(port=internal_port, ssl_context=ssl_context, debug=False, **common_app_opts)
+    opts = get_options(sys.argv)
+    if not opts.local and not opts.devtest:  # normal deployment
+        app.run(port=internal_port, debug=False, **common_app_opts)
     else:
-        port = internal_port if opts.local == True else external_port
+        port = internal_port if opts.local else external_port
         app.run(port=port, debug=True, **common_app_opts)