commit | f4701ae89482275c798937a358aace180d1fa7a9 | [log] [tgz] |
---|---|---|
author | raviteja.karumuri <raviteja.karumuri@est.tech> | Tue Oct 22 14:09:18 2024 +0100 |
committer | RAVITEJA KARUMURI <raviteja.karumuri@est.tech> | Tue Oct 22 13:23:06 2024 +0000 |
tree | 90295933de72d9b6515719425e8b43a47dfe5773 | |
parent | 1fc3814bb33b91395460e46c266bff7d7a83d699 [diff] |
Update A1PMS from ONAP OSLO Issue-ID: NONRTRIC-1039 Change-Id: Ie2ccc9f9057880d2e170b9981b892e43ebaa5bb1 Signed-off-by: Raviteja Karumuri <raviteja.karumuri@est.tech>
The O-RAN-SC A1 Policy Management Service provides a REST API for the management of policies within the O-RAN architecture. This README provides details on the features, configuration, and running instructions for the A1 Policy Management Service. For detailed API documentation and further information, refer to the NONRTRIC documentation at NONRTRIC Wiki. For additional detailed documentation, also refer to the NONRTRIC documentation at A1 Policy Management Service Documentation site.
The A1 Policy Management Service is homed in ONAP. For additional documentation see ONAP CCSDK documentation. and wiki.
The A1 Policy Management Service is a microservice which maintains a transient repository of:
The service provides :
The A1 Policy Management Service uses default keystore and truststore files included in the container. The paths and passwords for these stores are specified in a YAML configuration file located at:
The default truststore includes the following trusted certificates:
You can override the default keystore, truststore, and application.yaml files by mounting new files using the volumes
field in Docker Compose or the docker run
command.
Assuming the new keystore, truststore, and application.yaml files are located in the same directory as your Docker Compose file, the volumes
field should include these entries:
volumes: - ./new_keystore.jks:/opt/app/policy-agent/etc/cert/keystore.jks:ro - ./new_truststore.jks:/opt/app/policy-agent/etc/cert/truststore.jks:ro - ./new_application.yaml:/opt/app/policy-agent/config/application.yaml:ro
The target paths in the container should remain unchanged.
Example Docker Run Command To run the Policy Agent container and mount the new configuration files, use the following docker run command:
docker run -p 8081:8081 -p 8433:8433 --name=policy-agent-container --network=nonrtric-docker-net \ --volume "$PWD/new_keystore.jks:/opt/app/policy-agent/etc/cert/keystore.jks" \ --volume "$PWD/new_truststore.jks:/opt/app/policy-agent/etc/cert/truststore.jks" \ --volume "$PWD/new_application.yaml:/opt/app/policy-agent/config/application.yaml" \ nexus3.o-ran-sc.org:10002/o-ran-sc/nonrtric-plt-a1policymanagementservice:2.8.0
To run the Policy Agent locally in a simulated test mode, follow these steps:
ln -s <path to test_application_configuration.json> application_configuration.json
mvn -Dtest=MockPolicyAgent test
This will start the agent in a simulated mode, where it mimics the behavior of RICs. The REST API will be available on port 8081.
The backend server publishes live API documentation, which can be accessed at:
http://your-host-name-here:8081/swagger-ui.html
Copyright (C) 2019-2023 Nordix Foundation. All rights reserved. Copyright (C) 2024: OpenInfra Foundation Europe. All rights reserved. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.