Controllable Unit Suspension Comment
Comment made by a party involved in a controllable unit suspension. Several comments can be added to a given suspension.
For information about comments as a concept see Communication and Coordination.
Relevant links
Fields
| Name | Description | Format | Reference |
|---|---|---|---|
| id | Unique surrogate identifier. | bigint Read only |
|
| controllable_unit_suspension_id | Reference to the controllable unit suspension. | bigint Required Non-updatable |
controllable_unit_suspension.id |
| created_by | Reference to the identity that created the comment. | bigint Read only |
|
| created_at | When the comment was added to the CUS. | date-time Read only |
|
| visibility | The level of visibility of the comment. | text One of: same_party, any_involved_partyDefault: same_partyComments marked same_party are visible only to the party that creates them, whereas comments marked any_involved_party can be seen by all parties involved in the CUS. |
|
| content | Free text content of the comment. | text Required Max length: 2048This field can contain rich text in raw HTML format. Its content should be sanitised on the client side before being displayed, as there is currently no check performed on the server. |
|
| recorded_at | When the resource was recorded (created or updated) in the system. | date-time Read only |
|
| recorded_by | The identity that recorded the resource. | bigint Read only |
Validation Rules
No validation rules
Notifications
| Action | Recipient | Comment |
|---|---|---|
| create, update | SP | Service provider with current contract to the suspended controllable unit when they can see the comment |
| create, update | SO | Impacted SO of CUS when they can see the comment |
Authorization
Resource Level Authorization
Below is the RLA for the resource. The default policy is deny.
Anonymous
No policies.
Common
No policies.
Balance Responsible Party
No policies.
End User
No policies.
Energy Supplier
No policies.
Flexibility Information System Operator
| Policy key | Policy | Status |
|---|---|---|
| CUSC-FISO001 | Create, read, update all CUSC. | DONE |
| CUSC-FISO002 | Read all CUSC history | DONE |
Organisation
No policies.
System Operator
| Policy key | Policy | Status |
|---|---|---|
| CUSC-SO001 | Create CUSC on CUS where they are impacted SO. | DONE |
| CUSC-SO002 | Read CUSC that the visibility allows. | DONE |
| CUSC-SO003 | Read history on CUSC that the latest visibility allows. | DONE |
Service Provider
| Policy key | Policy | Status |
|---|---|---|
| CUSC-SP001 | Create CUSC where they own the CU | DONE |
| CUSC-SP002 | Read CUSC that the visibility allows | DONE |
| CUSC-SP003 | Read history on CUSC that the latest visibility allows. | DONE |
Third Party
No policies.
Field Level Authorization
For party type abbreviations, check the authentication docs.
| FIELD | ANON | BRP | ES | EU | FISO | SO | SP | TP | ORG |
|---|---|---|---|---|---|---|---|---|---|
| id | R | R | R | R | R | R | R | ||
| controllable_unit_suspension_id | R | R | R | RC | RC | RC | R | ||
| created_at | R | R | R | R | R | R | R | ||
| created_by | R | R | R | R | R | R | R | ||
| visibility | R | R | R | RCU | RCU | RCU | R | ||
| content | R | R | R | RCU | RCU | RCU | R | ||
| recorded_at | R | R | R | R | R | R | R | ||
| recorded_by | R | R | R | R | R | R | R |